- Sort Score
- Num 10 results
- Language All
Results 211 - 215 of 215 for transformed (0.12 seconds)
-
docs/changelogs/changelog_3x.md
challenge. * Fix: Use the proxy authenticator when authenticating HTTP proxies. This regression was introduced in OkHttp 3.0. * Fix: Fail fast if network interceptors transform the response body such that closing it doesn't also close the underlying stream. We had a bug where OkHttp would attempt to reuse a connection but couldn't because it was still held by a prior request.Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Sun Feb 06 14:55:54 GMT 2022 - 50.8K bytes - Click Count (0) -
RELEASE.md
* Add `tf.contrib.bayesflow.metropolis_hastings`. * Add `log_rate` parameter to `tf.contrib.distributions.Poisson`. * Extend `tf.contrib.distributions.bijector` API to handle some non-injective transforms. * Java: * Generics (e.g., `Tensor<Integer>`) for improved type-safety (courtesy @andrewcmyers). * Support for multi-dimensional string tensors.Created: Tue Dec 30 12:39:10 GMT 2025 - Last Modified: Tue Oct 28 22:27:41 GMT 2025 - 740.4K bytes - Click Count (3) -
CREDITS
specifically for use in, a User Product, and the conveying occurs as part of a transaction in which the right of possession and use of the User Product is transferred to the recipient in perpetuity or for a fixed term (regardless of how the transaction is characterized), the Corresponding Source conveyed under this section must be accompanied
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Thu Mar 13 05:29:51 GMT 2025 - 1.8M bytes - Click Count (0) -
lib/fips140/v1.0.0-c2097c7c.zip
) << 24) } else if nk > 6 && i%nk == 4 { t = subw(t) } c.enc[i] = c.enc[i-nk] ^ t } // Derive decryption key from encryption key. // Reverse the 4-word round key sets from enc to produce dec. // All sets but the first and last get the MixColumn transform applied. n := c.roundKeysSize() for i := 0; i < n; i += 4 { ei := n - i - 4 for j := 0; j < 4; j++ { x := c.enc[ei+j] if i > 0 && i+4 < n { x = td0[sbox0[x>>24]] ^ td1[sbox0[x>>16&0xff]] ^ td2[sbox0[x>>8&0xff]] ^ td3[sbox0[x&0xff]] } c.dec[i+j] =...
Created: Tue Dec 30 11:13:12 GMT 2025 - Last Modified: Thu Sep 25 19:53:19 GMT 2025 - 642.7K bytes - Click Count (0) -
lib/fips140/v1.1.0-rc1.zip
) << 24) } else if nk > 6 && i%nk == 4 { t = subw(t) } c.enc[i] = c.enc[i-nk] ^ t } // Derive decryption key from encryption key. // Reverse the 4-word round key sets from enc to produce dec. // All sets but the first and last get the MixColumn transform applied. n := c.roundKeysSize() for i := 0; i < n; i += 4 { ei := n - i - 4 for j := 0; j < 4; j++ { x := c.enc[ei+j] if i > 0 && i+4 < n { x = td0[sbox0[x>>24]] ^ td1[sbox0[x>>16&0xff]] ^ td2[sbox0[x>>8&0xff]] ^ td3[sbox0[x&0xff]] } c.dec[i+j] =...
Created: Tue Dec 30 11:13:12 GMT 2025 - Last Modified: Thu Dec 11 16:27:41 GMT 2025 - 663K bytes - Click Count (0)