- Sort Score
- Result 10 results
- Languages All
Results 41 - 50 of 126 for Peak (0.1 sec)
-
tensorflow/c/c_api_macros.h
#else #define TF_CAPI_EXPORT __declspec(dllimport) #endif // TF_COMPILE_LIBRARY #else #ifdef TF_CAPI_WEAK #define TF_CAPI_EXPORT \ __attribute__((visibility("default"))) __attribute((weak)) #else #define TF_CAPI_EXPORT __attribute__((visibility("default"))) #endif // TF_CAPI_WEAK #endif // _WIN32 #endif // SWIG // TF_Bool is the C API typedef for unsigned char, while TF_BOOL is
Registered: Tue Sep 09 12:39:10 UTC 2025 - Last Modified: Sat May 13 04:44:45 UTC 2023 - 1.6K bytes - Viewed (0) -
api/go1.24.txt
pkg time, method (Time) AppendBinary([]uint8) ([]uint8, error) #62384 pkg time, method (Time) AppendText([]uint8) ([]uint8, error) #62384 pkg weak, func Make[$0 interface{}](*$0) Pointer[$0] #67552 pkg weak, method (Pointer[$0]) Value() *$0 #67552
Registered: Tue Sep 09 11:13:09 UTC 2025 - Last Modified: Tue Dec 17 21:28:29 UTC 2024 - 14.2K bytes - Viewed (0) -
SECURITY.md
research](https://scholar.google.com/scholar?q=gpu+side+channel) shows that it might be possible to use side channel attacks on the GPU to leak data from other running models or processes in the same system. GPUs can also have implementation bugs that might allow attackers to leave malicious code running and leak or tamper with applications from other users. Please report vulnerabilities to the vendor of the affected hardware accelerator.
Registered: Tue Sep 09 12:39:10 UTC 2025 - Last Modified: Wed Oct 16 16:10:43 UTC 2024 - 9.6K bytes - Viewed (0) -
guava/src/com/google/common/eventbus/SubscriberRegistry.java
import com.google.common.primitives.Primitives; import com.google.common.reflect.TypeToken; import com.google.common.util.concurrent.UncheckedExecutionException; import com.google.j2objc.annotations.Weak; import java.lang.reflect.Method; import java.util.Arrays; import java.util.Collection; import java.util.HashMap; import java.util.Iterator; import java.util.List; import java.util.Map; import java.util.Map.Entry;
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Tue Jul 08 18:32:10 UTC 2025 - 10.8K bytes - Viewed (0) -
guava/src/com/google/common/util/concurrent/Striped.java
* #lock(int) strong} and {@linkplain #lazyWeakLock(int) weak} {@code Striped<Lock>}, {@linkplain * #semaphore(int, int) strong} and {@linkplain #lazyWeakSemaphore(int, int) weak} {@code * Striped<Semaphore>}, and {@linkplain #readWriteLock(int) strong} and {@linkplain * #lazyWeakReadWriteLock(int) weak} {@code Striped<ReadWriteLock>}. <i>Strong</i> means that all
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Sat Aug 09 01:14:59 UTC 2025 - 20.6K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/cache/LocalCacheTest.java
assertSame(EntryFactory.WEAK, EntryFactory.getFactory(Strength.WEAK, false, false)); assertSame(EntryFactory.WEAK_ACCESS, EntryFactory.getFactory(Strength.WEAK, true, false)); assertSame(EntryFactory.WEAK_WRITE, EntryFactory.getFactory(Strength.WEAK, false, true)); assertSame(EntryFactory.WEAK_ACCESS_WRITE, EntryFactory.getFactory(Strength.WEAK, true, true)); } // computation tests
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Mon Aug 11 19:31:30 UTC 2025 - 110.5K bytes - Viewed (0) -
android/guava/src/com/google/common/collect/Platform.java
return Arrays.copyOfRange(source, from, to, (Class<? extends T[]>) arrayOfType.getClass()); } /** * Configures the given map maker to use weak keys, if possible; does nothing otherwise (i.e., in * GWT). This is sometimes acceptable, when only server-side code could generate enough volume * that reclamation becomes important. */ @J2ktIncompatible
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Thu Aug 07 16:05:33 UTC 2025 - 5.3K bytes - Viewed (0) -
cmd/dynamic-timeouts.go
if duration < 0 { return } entries := int(atomic.AddInt64(&dt.entries, 1)) index := entries - 1 if index < dynamicTimeoutLogSize { dt.mutex.Lock() dt.log[index] = duration // We leak entries while we copy if entries == dynamicTimeoutLogSize { // Make copy on stack in order to call adjust() logCopy := [dynamicTimeoutLogSize]time.Duration{} copy(logCopy[:], dt.log[:])
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 4.5K bytes - Viewed (0) -
docs/changelogs/changelog_2x.md
client.networkInterceptors().add(loggingInterceptor); ``` **Warning:** Avoid `Level.HEADERS` and `Level.BODY` in production because they could leak passwords and other authentication credentials to insecure logs. * **WebSocket API now uses `RequestBody` and `ResponseBody` for messages.** This is a backwards-incompatible API change.
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Sun Feb 06 02:19:09 UTC 2022 - 26.6K bytes - Viewed (0) -
guava/src/com/google/common/collect/Platform.java
return Arrays.copyOfRange(source, from, to, (Class<? extends T[]>) arrayOfType.getClass()); } /** * Configures the given map maker to use weak keys, if possible; does nothing otherwise (i.e., in * GWT). This is sometimes acceptable, when only server-side code could generate enough volume * that reclamation becomes important. */ @J2ktIncompatible
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Thu Aug 07 16:05:33 UTC 2025 - 5.5K bytes - Viewed (0)