- Sort Score
- Result 10 results
- Languages All
Results 721 - 730 of 801 for weights (0.24 sec)
-
src/cmd/asm/internal/asm/testdata/riscv64.s
// Copyright 2019 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. #include "../../../../../runtime/textflag.h" TEXT asmtest(SB),DUPOK|NOSPLIT,$0 start: // // Unprivileged ISA // // 2.4: Integer Computational Instructions ADDI $2047, X5 // 9382f27f ADDI $-2048, X5 // 93820280 ADDI $2048, X5 // 9382024093820240
Registered: Tue Nov 05 11:13:11 UTC 2024 - Last Modified: Fri Oct 25 12:05:29 UTC 2024 - 16.8K bytes - Viewed (0) -
src/main/resources/fess_config.properties
searchlog.agg.shard.size=-1 searchlog.request.headers= searchlog.process.batch_size=100 thumbnail.html.image.min.width=100 thumbnail.html.image.min.height=100 thumbnail.html.image.max.aspect.ratio=3.0 thumbnail.html.image.thumbnail.width=100 thumbnail.html.image.thumbnail.height=100 thumbnail.html.image.format=png thumbnail.html.image.xpath=//IMG thumbnail.html.image.exclude.extensions=svg,html,css,js thumbnail.generator.interval=0
Registered: Thu Oct 31 13:40:30 UTC 2024 - Last Modified: Tue Oct 01 14:13:38 UTC 2024 - 30.9K bytes - Viewed (0) -
android/guava/src/com/google/common/hash/HashFunction.java
* in the hash code should be as evenly "spread out" through the hash code's bits as possible. * The result is that, for example, when choosing a bucket in a hash table of size 2^8, * <i>any</i> eight bits could be consistently used. * <li><b>cryptographic:</b> certain hash functions such as {@link Hashing#sha512} are designed to * make it as infeasible as possible to reverse-engineer the input that produced a given hash
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue May 25 18:22:59 UTC 2021 - 10.9K bytes - Viewed (0) -
guava/src/com/google/common/hash/HashCode.java
* {@code int} value in little-endian order. * * @throws IllegalStateException if {@code bits() < 32} */ public abstract int asInt(); /** * Returns the first eight bytes of {@linkplain #asBytes() this hashcode's bytes}, converted to a * {@code long} value in little-endian order. * * @throws IllegalStateException if {@code bits() < 64} */ public abstract long asLong();
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Wed Oct 30 19:54:59 UTC 2024 - 12.6K bytes - Viewed (0) -
guava/src/com/google/common/hash/HashFunction.java
* in the hash code should be as evenly "spread out" through the hash code's bits as possible. * The result is that, for example, when choosing a bucket in a hash table of size 2^8, * <i>any</i> eight bits could be consistently used. * <li><b>cryptographic:</b> certain hash functions such as {@link Hashing#sha512} are designed to * make it as infeasible as possible to reverse-engineer the input that produced a given hash
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue May 25 18:22:59 UTC 2021 - 10.9K bytes - Viewed (0) -
tensorflow/c/c_test_util.cc
/* Copyright 2017 The TensorFlow Authors. All Rights Reserved. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS,
Registered: Tue Nov 05 12:39:12 UTC 2024 - Last Modified: Fri Oct 15 03:16:52 UTC 2021 - 17.8K bytes - Viewed (0) -
src/cmd/cgo/ast.go
// Copyright 2009 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. // Parse input AST and prepare Prog structure. package main import ( "fmt" "go/ast" "go/format" "go/parser" "go/scanner" "go/token" "os" "strings" ) func parse(name string, src []byte, flags parser.Mode) *ast.File {
Registered: Tue Nov 05 11:13:11 UTC 2024 - Last Modified: Mon Oct 14 15:47:06 UTC 2024 - 14.3K bytes - Viewed (0) -
tensorflow/c/eager/c_api_distributed_test.cc
/* Copyright 2020 The TensorFlow Authors. All Rights Reserved. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS,
Registered: Tue Nov 05 12:39:12 UTC 2024 - Last Modified: Sat Oct 12 05:11:17 UTC 2024 - 23.4K bytes - Viewed (0) -
tensorflow/c/eager/c_api_experimental_test.cc
/* Copyright 2017 The TensorFlow Authors. All Rights Reserved. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS,
Registered: Tue Nov 05 12:39:12 UTC 2024 - Last Modified: Thu Aug 03 03:14:26 UTC 2023 - 31.5K bytes - Viewed (0) -
src/main/webapp/js/admin/plugins/timepicker/bootstrap-timepicker.min.js
this.highlightHour()}return!1}},changeToNearestStep:function(a,b){return a%b===0?a:Math.round(a%b/b)?(a+(b-a%b))%60:a-a%b},place:function(){if(!this.isInline){var c=this.$widget.outerWidth(),d=this.$widget.outerHeight(),e=10,f=a(b).width(),g=a(b).height(),h=a(b).scrollTop(),i=parseInt(this.$element.parents().filter(function(){return"auto"!==a(this).css("z-index")}).first().css("z-index"),10)+10,j=this.component?this.component.parent().offset():this.$element.offset(),k=this.component?this.compone...
Registered: Thu Oct 31 13:40:30 UTC 2024 - Last Modified: Thu Feb 13 04:21:06 UTC 2020 - 18.2K bytes - Viewed (0)