- Sort Score
- Result 10 results
- Languages All
Results 51 - 60 of 106 for evaluate (0.05 sec)
-
tensorflow/c/c_api.h
// TF_DeleteFunction is a noop if `func` is null. // Deleting a function does not remove it from any graphs it was copied to. TF_CAPI_EXPORT extern void TF_DeleteFunction(TF_Function* func); // Attempts to evaluate `output`. This will only be possible if `output` doesn't // depend on any graph inputs (this function is safe to call if this isn't the // case though). //
Registered: Tue Sep 09 12:39:10 UTC 2025 - Last Modified: Thu Oct 26 21:08:15 UTC 2023 - 82.3K bytes - Viewed (0) -
cmd/bucket-handlers.go
apiErr := errorCodes.ToAPIErr(ErrInvalidRequest) apiErr.Description = err.Error() writeErrorResponse(ctx, w, apiErr, r.URL) return } // if force delete header is set, we need to evaluate the policy anyways // regardless of it being true or not. if s3Error := checkRequestAuthType(ctx, r, policy.ForceDeleteBucketAction, bucket, ""); s3Error != ErrNone {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 63.9K bytes - Viewed (0) -
guava/src/com/google/common/net/InetAddresses.java
* machine. * * @param ipString {@code String} to evaluated as an IP URI host string literal * @return {@code true} if the argument is a valid IP URI host */ public static boolean isUriInetAddress(String ipString) { return forUriStringOrNull(ipString, /* parseScope= */ false) != null; } /** * Evaluates whether the argument is an IPv6 "compat" address. *
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Wed Feb 19 21:24:11 UTC 2025 - 47.4K bytes - Viewed (0) -
android/guava/src/com/google/common/net/InetAddresses.java
* machine. * * @param ipString {@code String} to evaluated as an IP URI host string literal * @return {@code true} if the argument is a valid IP URI host */ public static boolean isUriInetAddress(String ipString) { return forUriStringOrNull(ipString, /* parseScope= */ false) != null; } /** * Evaluates whether the argument is an IPv6 "compat" address. *
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Wed Feb 19 21:24:11 UTC 2025 - 47.4K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.5.md
the ability of the controller to replace pods because the controllers do not reuse pod names (they use generate-name). * User-written controllers that reuse names of pod objects should evaluate this change. * When deleting an object with `kubectl delete ... --grace-period=0`, the client will begin a graceful deletion and wait until the resource is fully deleted. To force
Registered: Fri Sep 05 09:05:11 UTC 2025 - Last Modified: Thu Dec 24 02:28:26 UTC 2020 - 136.4K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.29.md
- `GetPodQOS(pod *core.Pod)` function now returns the stored value from `PodStatus.QOSClass`, if set. To compute/evaluate the value of `QOSClass` from scratch, `ComputePodQOS(pod*core.Pod)` must be used. ([#119665](https://github.com/kubernetes/kubernetes/pull/119665), [@vinaykul](https://github.com/vinaykul))
Registered: Fri Sep 05 09:05:11 UTC 2025 - Last Modified: Wed Mar 12 00:36:01 UTC 2025 - 429.6K bytes - Viewed (1) -
compat/maven-compat/src/main/java/org/apache/maven/project/interpolation/ModelInterpolationException.java
super("The POM expression: " + expression + " could not be evaluated. Reason: " + message, cause); this.expression = expression; this.originalMessage = message; } public ModelInterpolationException(String expression, String message) { super("The POM expression: " + expression + " could not be evaluated. Reason: " + message); this.expression = expression;
Registered: Sun Sep 07 03:35:12 UTC 2025 - Last Modified: Fri Oct 25 12:31:46 UTC 2024 - 1.9K bytes - Viewed (0) -
guava/src/com/google/common/graph/Network.java
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Mon Aug 11 22:03:02 UTC 2025 - 22.5K bytes - Viewed (0) -
src/main/java/jcifs/internal/dtyp/ACE.java
* we recommend reading the section on Access Control in Keith Brown's * "The .NET Developer's Guide to Windows Security" (which is also * available online). * <p> * Direct ACEs are evaluated first in order. The SID of the user performing * the operation and the desired access bits are compared to the SID * and access mask of each ACE. If the SID matches, the allow/deny flags
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 5.6K bytes - Viewed (0) -
src/main/java/jcifs/ACE.java
* we recommend reading the section on Access Control in Keith Brown's * "The .NET Developer's Guide to Windows Security" (which is also * available online). * <p> * Direct ACEs are evaluated first in order. The SID of the user performing * the operation and the desired access bits are compared to the SID * and access mask of each ACE. If the SID matches, the allow/deny flags
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 7.1K bytes - Viewed (0)