/third_party/glib/gio/ |
D | gnetworkmonitorbase.c | 48 GHashTable *networks /* (element-type GInetAddressMask) (owned) */; member 81 monitor->priv->networks = g_hash_table_new_full (inet_address_mask_hash, in g_network_monitor_base_init() 157 g_hash_table_unref (monitor->priv->networks); in g_network_monitor_base_finalize() 195 g_hash_table_iter_init (&iter, base->priv->networks); in g_network_monitor_base_can_reach_sockaddr() 216 if (g_hash_table_size (base->priv->networks) == 0) in g_network_monitor_base_can_reach() 320 if (g_hash_table_size (G_NETWORK_MONITOR_BASE (monitor)->priv->networks) == 0) in g_network_monitor_base_can_reach_async() 499 if (!g_hash_table_add (monitor->priv->networks, g_object_ref (network))) in g_network_monitor_base_add_network() 540 if (!g_hash_table_remove (monitor->priv->networks, network)) in g_network_monitor_base_remove_network() 572 GInetAddressMask **networks, in g_network_monitor_base_set_networks() argument 577 g_hash_table_remove_all (monitor->priv->networks); in g_network_monitor_base_set_networks() [all …]
|
D | gwin32networkmonitor.c | 129 GPtrArray *networks; in win_network_monitor_process_table() local 143 networks = g_ptr_array_new_full (routes->NumEntries, g_object_unref); in win_network_monitor_process_table() 160 g_ptr_array_add (networks, network); in win_network_monitor_process_table() 164 (GInetAddressMask **) networks->pdata, in win_network_monitor_process_table() 165 networks->len); in win_network_monitor_process_table()
|
D | gnetworkmonitorbase.h | 63 GInetAddressMask **networks,
|
/third_party/mindspore/tests/st/networks/models/resnet50/ |
D | test_resnet50_imagenet.py | 35 from tests.st.networks.models.resnet50.src.resnet import resnet50 36 from tests.st.networks.models.resnet50.src.dataset import create_dataset 37 from tests.st.networks.models.resnet50.src.lr_generator import get_learning_rate 38 from tests.st.networks.models.resnet50.src.config import config 39 from tests.st.networks.models.resnet50.src.metric import DistAccuracy, ClassifyCorrectCell 40 from tests.st.networks.models.resnet50.src.CrossEntropySmooth import CrossEntropySmooth 41 from tests.st.networks.models.resnet50.src_thor.config import config as thor_config 42 from tests.st.networks.models.resnet50.src_thor.dataset import create_dataset as create_dataset_thor 43 from tests.st.networks.models.resnet50.src_thor.model_thor import Model as THOR_Model 44 from tests.st.networks.models.resnet50.src_thor.resnet import resnet50 as resnet50_thor
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
D | win_example.reg | 25 [HKEY_LOCAL_MACHINE\SOFTWARE\wpa_supplicant\configs\test\networks] 27 [HKEY_LOCAL_MACHINE\SOFTWARE\wpa_supplicant\configs\test\networks\0000]
|
D | README-HS20 | 31 work with multiple networks as an alternative to configuration of 115 # By default, all networks and credentials get the same priority group 189 # networks. 263 # selection purposes for home networks. If the AP does not advertise 273 # network connection. This policy is not used in home networks. 334 Remove configured networks and credentials: 419 The preferred credentials/networks can be indicated with the priority
|
D | README-Windows.txt | 288 networks. Under each profile, there is a networks key that lists all 289 networks as a subkey. Each network has set of values in the same way as 293 HKEY_LOCAL_MACHINE\SOFTWARE\wpa_supplicant\configs\test\networks\0000
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
D | win_example.reg | 25 [HKEY_LOCAL_MACHINE\SOFTWARE\wpa_supplicant\configs\test\networks] 27 [HKEY_LOCAL_MACHINE\SOFTWARE\wpa_supplicant\configs\test\networks\0000]
|
D | README-HS20 | 31 work with multiple networks as an alternative to configuration of 115 # By default, all networks and credentials get the same priority group 189 # networks. 263 # selection purposes for home networks. If the AP does not advertise 273 # network connection. This policy is not used in home networks. 328 Remove configured networks and credentials: 413 The preferred credentials/networks can be indicated with the priority
|
D | README-Windows.txt | 288 networks. Under each profile, there is a networks key that lists all 289 networks as a subkey. Each network has set of values in the same way as 293 HKEY_LOCAL_MACHINE\SOFTWARE\wpa_supplicant\configs\test\networks\0000
|
D | wpa_cli.c | 63 static DEFINE_DL_LIST(networks); /* struct cli_txt_entry */ 1486 res = cli_txt_list_array(&networks); in wpa_cli_complete_network() 1506 return cli_txt_list_array(&networks); in wpa_cli_complete_network_id() 1538 res = cli_txt_list_array(&networks); in wpa_cli_complete_dup_network() 4435 cli_txt_list_flush(&networks); in update_networks() 4451 cli_txt_list_add_word(&networks, pos, '\t'); in update_networks() 4524 cli_txt_list_flush(&networks); in wpa_cli_interactive()
|
/third_party/mindspore/.jenkins/check/config/ |
D | filter_pylint.txt | 107 "mindspore/tests/st/networks/test_gpu_resnet.py" … 108 "mindspore/tests/st/networks/test_gpu_resnet.py" … 109 "mindspore/tests/st/networks/test_gpu_lstm.py" … 110 "mindspore/tests/st/networks/test_gpu_lstm.py" … 111 "mindspore/tests/st/networks/test_gpu_lstm.py" … 112 "mindspore/tests/st/networks/test_gpu_alexnet.py" … 113 "mindspore/tests/st/networks/test_gpu_lenet.py" …
|
/third_party/curl/docs/cmdline-opts/ |
D | max-time.d | 10 networks or links going down. Since 7.32.0, this option accepts decimal
|
/third_party/libphonenumber/resources/carrier/en/ |
D | 355.txt | 17 # advised to port to other networks. http://www.plus.al/
|
/third_party/iptables/etc/ |
D | ethertypes | 4 # protocol types that are used on Ethernet networks.
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/doc/docbook/ |
D | wpa_supplicant.sgml | 27 Wireless networks do not require physical access to the network equipment 28 in the same way as wired networks. This makes it easier for unauthorized 38 wireless networks. The original wireless LAN standard, IEEE 802.11, 45 a much improvement mechanism for securing wireless networks. IEEE 802.11i 46 enabled networks that are using CCMP (encryption mechanism based on strong 633 <para>the configuration file describing all networks that the 660 <filename>/etc/wpa_supplicant.conf</filename>, that describes the networks
|
D | wpa_background.sgml | 17 most networks that require some kind of security. Task group I 34 algorithm for protecting wireless networks. WEP uses RC4 with
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/doc/docbook/ |
D | wpa_supplicant.sgml | 31 Wireless networks do not require physical access to the network equipment 32 in the same way as wired networks. This makes it easier for unauthorized 42 wireless networks. The original wireless LAN standard, IEEE 802.11, 49 a much improved mechanism for securing wireless networks. IEEE 802.11i 50 enabled networks that are using CCMP (encryption mechanism based on strong 637 <para>the configuration file describing all networks that the 664 <filename>/etc/wpa_supplicant.conf</filename>, that describes the networks
|
D | wpa_background.sgml | 21 most networks that require some kind of security. Task group I 38 algorithm for protecting wireless networks. WEP uses RC4 with
|
/third_party/python/Doc/howto/ |
D | ipaddress.rst | 84 Host addresses are usually grouped together into IP networks, so 119 While the string form offers significantly more flexibility, networks can 152 Integer inputs are accepted (as with networks), and use of a particular IP 240 It's sometimes useful to treat networks as lists. This means it is possible
|
/third_party/python/Doc/library/ |
D | ipaddress.rst | 14 operate on IPv4 and IPv6 addresses and networks. 38 IP addresses, networks and interfaces: 58 representing the IP network. Either IPv4 or IPv6 networks may be supplied; 191 ``True`` if the address is allocated for private networks. See 197 ``True`` if the address is allocated for public networks. See 562 network address itself and the network broadcast address. For networks 734 Subnet-Router anycast address. For networks with a mask length of 127, 912 are first compared by their networks and, if those are the same, then by their 973 Return a key suitable for sorting between networks and addresses. Address
|
/third_party/boost/libs/math/doc/distributions/ |
D | logistic.qbk | 32 and feedforward neural networks. Among other applications,
|
/third_party/mindspore/mindspore/lite/ |
D | README.md | 60 We test a couple of networks on HUAWEI Mate40 (Hisilicon Kirin9000) mobile phone, and get the test …
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hostapd/ |
D | README-WPS | 19 While WPS can enable more home networks to use encryption in the 265 also be used to add additional networks if the Registrar is used to 266 configure credentials for multiple networks.
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/hostapd/ |
D | README-WPS | 19 While WPS can enable more home networks to use encryption in the 265 also be used to add additional networks if the Registrar is used to 266 configure credentials for multiple networks.
|