Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 351 - 360 of 416 for weights (0.05 seconds)

  1. ci/official/utilities/code_check_full.bats

    # vim: filetype=bash
    #
    # Copyright 2022 The TensorFlow Authors. All Rights Reserved.
    #
    # Licensed under the Apache License, Version 2.0 (the "License");
    # you may not use this file except in compliance with the License.
    # You may obtain a copy of the License at
    #
    #     http://www.apache.org/licenses/LICENSE-2.0
    #
    # Unless required by applicable law or agreed to in writing, software
    # distributed under the License is distributed on an "AS IS" BASIS,
    Created: Tue Dec 30 12:39:10 GMT 2025
    - Last Modified: Fri Dec 19 18:47:57 GMT 2025
    - 13.5K bytes
    - Click Count (0)
  2. src/main/resources/fess_config.properties

    thumbnail.html.image.min.width=100
    # Minimum height for HTML images in thumbnails.
    thumbnail.html.image.min.height=100
    # Maximum aspect ratio for HTML images in thumbnails.
    thumbnail.html.image.max.aspect.ratio=3.0
    # Width of generated thumbnail images.
    thumbnail.html.image.thumbnail.width=100
    # Height of generated thumbnail images.
    thumbnail.html.image.thumbnail.height=100
    # Format of generated thumbnail images.
    Created: Sat Dec 20 09:19:18 GMT 2025
    - Last Modified: Thu Dec 11 09:47:03 GMT 2025
    - 54.8K bytes
    - Click Count (0)
  3. tensorflow/c/c_api_experimental.cc

    /* Copyright 2018 The TensorFlow Authors. All Rights Reserved.
    
    Licensed under the Apache License, Version 2.0 (the "License");
    you may not use this file except in compliance with the License.
    You may obtain a copy of the License at
    
        http://www.apache.org/licenses/LICENSE-2.0
    
    Unless required by applicable law or agreed to in writing, software
    distributed under the License is distributed on an "AS IS" BASIS,
    Created: Tue Dec 30 12:39:10 GMT 2025
    - Last Modified: Sat Oct 04 05:55:32 GMT 2025
    - 29.4K bytes
    - Click Count (0)
  4. android/guava/src/com/google/common/hash/HashCode.java

       * {@code int} value in little-endian order.
       *
       * @throws IllegalStateException if {@code bits() < 32}
       */
      public abstract int asInt();
    
      /**
       * Returns the first eight bytes of {@linkplain #asBytes() this hashcode's bytes}, converted to a
       * {@code long} value in little-endian order.
       *
       * @throws IllegalStateException if {@code bits() < 64}
       */
      public abstract long asLong();
    
    Created: Fri Dec 26 12:43:10 GMT 2025
    - Last Modified: Mon Aug 11 19:31:30 GMT 2025
    - 12.6K bytes
    - Click Count (0)
  5. src/cmd/asm/internal/asm/testdata/armerror.s

    // Copyright 2017 The Go Authors. All rights reserved.
    // Use of this source code is governed by a BSD-style
    // license that can be found in the LICENSE file.
    
    TEXT errors(SB),$0
    	MOVW	(F0), R1           // ERROR "illegal base register"
    	MOVB	(F0), R1           // ERROR "illegal base register"
    	MOVH	(F0), R1           // ERROR "illegal base register"
    	MOVF	(F0), F1           // ERROR "illegal base register"
    	MOVD	(F0), F1           // ERROR "illegal base register"
    Created: Tue Dec 30 11:13:12 GMT 2025
    - Last Modified: Wed Oct 23 15:18:14 GMT 2024
    - 14.5K bytes
    - Click Count (0)
  6. lib/wasm/wasm_exec.js

    // Copyright 2018 The Go Authors. All rights reserved.
    // Use of this source code is governed by a BSD-style
    // license that can be found in the LICENSE file.
    
    "use strict";
    
    (() => {
    	const enosys = () => {
    		const err = new Error("not implemented");
    		err.code = "ENOSYS";
    		return err;
    	};
    
    	if (!globalThis.fs) {
    		let outputBuf = "";
    		globalThis.fs = {
    Created: Tue Dec 30 11:13:12 GMT 2025
    - Last Modified: Sun Dec 08 15:34:47 GMT 2024
    - 16.6K bytes
    - Click Count (0)
  7. docs/smb3-features/05-rdma-smb-direct-design.md

        public void validateMemoryAccess(RdmaMemoryRegion region, RdmaAccess requestedAccess) {
            if (!region.hasAccess(requestedAccess)) {
                throw new SecurityException("Insufficient RDMA memory access rights");
            }
        }
        
        public void validateRemoteAccess(long remoteAddress, int length, int remoteKey) {
            // Validate that remote memory access is authorized
    Created: Sat Dec 20 13:44:44 GMT 2025
    - Last Modified: Sat Aug 16 02:53:50 GMT 2025
    - 35.9K bytes
    - Click Count (0)
  8. android/guava/src/com/google/common/hash/HashFunction.java

     *       in the hash code should be as evenly "spread out" through the hash code's bits as possible.
     *       The result is that, for example, when choosing a bucket in a hash table of size 2^8,
     *       <i>any</i> eight bits could be consistently used.
     *   <li><b>cryptographic:</b> certain hash functions such as {@link Hashing#sha512} are designed to
     *       make it as infeasible as possible to reverse-engineer the input that produced a given hash
    Created: Fri Dec 26 12:43:10 GMT 2025
    - Last Modified: Mon Mar 17 20:26:29 GMT 2025
    - 10.9K bytes
    - Click Count (0)
  9. guava/src/com/google/common/hash/HashCode.java

       * {@code int} value in little-endian order.
       *
       * @throws IllegalStateException if {@code bits() < 32}
       */
      public abstract int asInt();
    
      /**
       * Returns the first eight bytes of {@linkplain #asBytes() this hashcode's bytes}, converted to a
       * {@code long} value in little-endian order.
       *
       * @throws IllegalStateException if {@code bits() < 64}
       */
      public abstract long asLong();
    
    Created: Fri Dec 26 12:43:10 GMT 2025
    - Last Modified: Mon Aug 11 19:31:30 GMT 2025
    - 12.6K bytes
    - Click Count (0)
  10. guava/src/com/google/common/hash/HashFunction.java

     *       in the hash code should be as evenly "spread out" through the hash code's bits as possible.
     *       The result is that, for example, when choosing a bucket in a hash table of size 2^8,
     *       <i>any</i> eight bits could be consistently used.
     *   <li><b>cryptographic:</b> certain hash functions such as {@link Hashing#sha512} are designed to
     *       make it as infeasible as possible to reverse-engineer the input that produced a given hash
    Created: Fri Dec 26 12:43:10 GMT 2025
    - Last Modified: Mon Mar 17 20:26:29 GMT 2025
    - 10.9K bytes
    - Click Count (0)
Back to Top