Search Options

Results per page
Sort
Preferred Languages
Advance

Results 41 - 50 of 126 for Peak (0.1 sec)

  1. tensorflow/c/c_api_macros.h

    #else
    #define TF_CAPI_EXPORT __declspec(dllimport)
    #endif  // TF_COMPILE_LIBRARY
    #else
    #ifdef TF_CAPI_WEAK
    #define TF_CAPI_EXPORT \
      __attribute__((visibility("default"))) __attribute((weak))
    #else
    #define TF_CAPI_EXPORT __attribute__((visibility("default")))
    #endif  // TF_CAPI_WEAK
    #endif  // _WIN32
    #endif  // SWIG
    
    // TF_Bool is the C API typedef for unsigned char, while TF_BOOL is
    Registered: Tue Sep 09 12:39:10 UTC 2025
    - Last Modified: Sat May 13 04:44:45 UTC 2023
    - 1.6K bytes
    - Viewed (0)
  2. api/go1.24.txt

    pkg time, method (Time) AppendBinary([]uint8) ([]uint8, error) #62384
    pkg time, method (Time) AppendText([]uint8) ([]uint8, error) #62384
    pkg weak, func Make[$0 interface{}](*$0) Pointer[$0] #67552
    pkg weak, method (Pointer[$0]) Value() *$0 #67552
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Tue Dec 17 21:28:29 UTC 2024
    - 14.2K bytes
    - Viewed (0)
  3. SECURITY.md

    research](https://scholar.google.com/scholar?q=gpu+side+channel) shows that it
    might be possible to use side channel attacks on the GPU to leak data from other
    running models or processes in the same system. GPUs can also have
    implementation bugs that might allow attackers to leave malicious code running
    and leak or tamper with applications from other users. Please report
    vulnerabilities to the vendor of the affected hardware accelerator.
    
    Registered: Tue Sep 09 12:39:10 UTC 2025
    - Last Modified: Wed Oct 16 16:10:43 UTC 2024
    - 9.6K bytes
    - Viewed (0)
  4. guava/src/com/google/common/eventbus/SubscriberRegistry.java

    import com.google.common.primitives.Primitives;
    import com.google.common.reflect.TypeToken;
    import com.google.common.util.concurrent.UncheckedExecutionException;
    import com.google.j2objc.annotations.Weak;
    import java.lang.reflect.Method;
    import java.util.Arrays;
    import java.util.Collection;
    import java.util.HashMap;
    import java.util.Iterator;
    import java.util.List;
    import java.util.Map;
    import java.util.Map.Entry;
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Tue Jul 08 18:32:10 UTC 2025
    - 10.8K bytes
    - Viewed (0)
  5. guava/src/com/google/common/util/concurrent/Striped.java

     * #lock(int) strong} and {@linkplain #lazyWeakLock(int) weak} {@code Striped<Lock>}, {@linkplain
     * #semaphore(int, int) strong} and {@linkplain #lazyWeakSemaphore(int, int) weak} {@code
     * Striped<Semaphore>}, and {@linkplain #readWriteLock(int) strong} and {@linkplain
     * #lazyWeakReadWriteLock(int) weak} {@code Striped<ReadWriteLock>}. <i>Strong</i> means that all
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Sat Aug 09 01:14:59 UTC 2025
    - 20.6K bytes
    - Viewed (0)
  6. android/guava-tests/test/com/google/common/cache/LocalCacheTest.java

        assertSame(EntryFactory.WEAK, EntryFactory.getFactory(Strength.WEAK, false, false));
        assertSame(EntryFactory.WEAK_ACCESS, EntryFactory.getFactory(Strength.WEAK, true, false));
        assertSame(EntryFactory.WEAK_WRITE, EntryFactory.getFactory(Strength.WEAK, false, true));
        assertSame(EntryFactory.WEAK_ACCESS_WRITE, EntryFactory.getFactory(Strength.WEAK, true, true));
      }
    
      // computation tests
    
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Mon Aug 11 19:31:30 UTC 2025
    - 110.5K bytes
    - Viewed (0)
  7. android/guava/src/com/google/common/collect/Platform.java

        return Arrays.copyOfRange(source, from, to, (Class<? extends T[]>) arrayOfType.getClass());
      }
    
      /**
       * Configures the given map maker to use weak keys, if possible; does nothing otherwise (i.e., in
       * GWT). This is sometimes acceptable, when only server-side code could generate enough volume
       * that reclamation becomes important.
       */
      @J2ktIncompatible
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Aug 07 16:05:33 UTC 2025
    - 5.3K bytes
    - Viewed (0)
  8. cmd/dynamic-timeouts.go

    	if duration < 0 {
    		return
    	}
    	entries := int(atomic.AddInt64(&dt.entries, 1))
    	index := entries - 1
    	if index < dynamicTimeoutLogSize {
    		dt.mutex.Lock()
    		dt.log[index] = duration
    
    		// We leak entries while we copy
    		if entries == dynamicTimeoutLogSize {
    			// Make copy on stack in order to call adjust()
    			logCopy := [dynamicTimeoutLogSize]time.Duration{}
    			copy(logCopy[:], dt.log[:])
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 4.5K bytes
    - Viewed (0)
  9. docs/changelogs/changelog_2x.md

        client.networkInterceptors().add(loggingInterceptor);
        ```
    
        **Warning:** Avoid `Level.HEADERS` and `Level.BODY` in production because
        they could leak passwords and other authentication credentials to insecure
        logs.
    
     *  **WebSocket API now uses `RequestBody` and `ResponseBody` for messages.**
        This is a backwards-incompatible API change.
    
    Registered: Fri Sep 05 11:42:10 UTC 2025
    - Last Modified: Sun Feb 06 02:19:09 UTC 2022
    - 26.6K bytes
    - Viewed (0)
  10. guava/src/com/google/common/collect/Platform.java

        return Arrays.copyOfRange(source, from, to, (Class<? extends T[]>) arrayOfType.getClass());
      }
    
      /**
       * Configures the given map maker to use weak keys, if possible; does nothing otherwise (i.e., in
       * GWT). This is sometimes acceptable, when only server-side code could generate enough volume
       * that reclamation becomes important.
       */
      @J2ktIncompatible
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Aug 07 16:05:33 UTC 2025
    - 5.5K bytes
    - Viewed (0)
Back to top