Search Options

Results per page
Sort
Preferred Languages
Advance

Results 731 - 740 of 841 for point$ (0.13 sec)

  1. tensorflow/c/eager/c_api.cc

    }
    
    // This function will block till the operation that produces `h` has
    // completed. This is only valid on local TFE_TensorHandles. Returns the size in
    // bytes of the memory pointed to by the device pointer returned above.
    size_t TFE_TensorHandleDeviceMemorySize(TFE_TensorHandle* h,
                                            TF_Status* status) {
      if (h == nullptr) {
    Registered: Tue Nov 05 12:39:12 UTC 2024
    - Last Modified: Sat Oct 12 05:11:17 UTC 2024
    - 43.9K bytes
    - Viewed (0)
  2. schema/field.go

    				if _, ok := field.TagSettings["EMBEDDED"]; ok || !fieldStruct.Anonymous {
    					ef.EmbeddedBindNames = append([]string{fieldStruct.Name}, ef.EmbeddedBindNames...)
    				}
    				// index is negative means is pointer
    				if field.FieldType.Kind() == reflect.Struct {
    					ef.StructField.Index = append([]int{fieldStruct.Index[0]}, ef.StructField.Index...)
    				} else {
    Registered: Sun Nov 03 09:35:10 UTC 2024
    - Last Modified: Mon Apr 15 03:20:20 UTC 2024
    - 32K bytes
    - Viewed (0)
  3. android/guava/src/com/google/common/hash/HashFunction.java

     *       to <i>some</i> degree to make this unlikely. (Without this condition, a function that
     *       always returns zero could be called a hash function. It is not.)
     * </ul>
     *
     * <p>Summarizing the last two points: "equal yield equal <i>always</i>; unequal yield unequal
     * <i>often</i>." This is the most important characteristic of all hash functions.
     *
     * <h3>Desirable properties</h3>
     *
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Tue May 25 18:22:59 UTC 2021
    - 10.9K bytes
    - Viewed (0)
  4. guava/src/com/google/common/hash/HashFunction.java

     *       to <i>some</i> degree to make this unlikely. (Without this condition, a function that
     *       always returns zero could be called a hash function. It is not.)
     * </ul>
     *
     * <p>Summarizing the last two points: "equal yield equal <i>always</i>; unequal yield unequal
     * <i>often</i>." This is the most important characteristic of all hash functions.
     *
     * <h3>Desirable properties</h3>
     *
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Tue May 25 18:22:59 UTC 2021
    - 10.9K bytes
    - Viewed (0)
  5. src/main/java/jcifs/smb/SmbFileOutputStream.java

                if ( this.append ) {
                    this.fp = this.handle.getInitialSize();
                    if ( log.isDebugEnabled() ) {
                        log.debug("File pointer is at " + this.fp);
                    }
                }
                return this.handle;
            }
    
            log.trace("File already open");
            return this.handle.acquire();
        }
    
    
    Registered: Sun Nov 03 00:10:13 UTC 2024
    - Last Modified: Sat Nov 13 15:14:04 UTC 2021
    - 11.9K bytes
    - Viewed (0)
  6. misc/ios/go_ios_exec.go

    	// the package being tested and the source root.
    	pkgpath = ""
    	for _, element := range strings.Split(finalPkgpath, string(filepath.Separator)) {
    		if debug {
    			log.Printf("copying %s", pkgpath)
    		}
    		pkgpath = filepath.Join(pkgpath, element)
    		dst := filepath.Join(dstbase, pkgpath)
    		src := filepath.Join(cwd, pkgpath)
    		if err := copyLocalDir(dst, src); err != nil {
    			return "", err
    Registered: Tue Nov 05 11:13:11 UTC 2024
    - Last Modified: Tue Jun 18 16:32:49 UTC 2024
    - 8.7K bytes
    - Viewed (0)
  7. android/guava-tests/test/com/google/common/graph/AbstractStandardUndirectedNetworkTest.java

       * will silently add the missing nodes to the graph, then add the edge connecting them. We are not
       * using the proxy methods here as we want to test {@code addEdge} when the end-points are not
       * elements of the graph.
       */
      @Test
      public void addEdge_nodesNotInGraph() {
        assume().that(graphIsMutable()).isTrue();
    
        networkAsMutableNetwork.addNode(N1);
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Tue Jul 02 18:21:29 UTC 2024
    - 18.6K bytes
    - Viewed (0)
  8. common-protos/k8s.io/api/flowcontrol/v1beta3/generated.proto

      // `items` is a list of request-priorities.
      repeated PriorityLevelConfiguration items = 2;
    }
    
    // PriorityLevelConfigurationReference contains information that points to the "request-priority" being used.
    message PriorityLevelConfigurationReference {
      // `name` is the name of the priority level configuration being referenced
      // Required.
      optional string name = 1;
    }
    
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Mon Mar 11 18:43:24 UTC 2024
    - 19.5K bytes
    - Viewed (0)
  9. internal/logger/console.go

    	for _, line := range strings.Split(errMsg, "\n") {
    		if len(line) == 0 {
    			// No more text to print, just quit.
    			break
    		}
    
    		for {
    			// Save the attributes of the current cursor helps
    			// us save the text color of the passed error message
    			ansiSaveAttributes()
    			// Print banner with or without the log tag
    			if !tagPrinted {
    				fmt.Fprint(Output, logBanner)
    				tagPrinted = true
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri Jul 12 20:51:54 UTC 2024
    - 7.5K bytes
    - Viewed (0)
  10. docs/nl/docs/environment-variables.md

    Je kunt bijvoorbeeld een bestand `main.py` hebben met:
    
    ```Python hl_lines="3"
    import os
    
    name = os.getenv("MY_NAME", "World")
    print(f"Hello {name} from Python")
    ```
    
    /// tip
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Fri Sep 20 11:13:32 UTC 2024
    - 8.6K bytes
    - Viewed (0)
Back to top