Home
last modified time | relevance | path

Searched refs:approach (Results 1 – 25 of 1041) sorted by relevance

12345678910>>...42

/external/arm-trusted-firmware/docs/security_advisories/
Dsecurity-advisory-tfv-7.rst39 approach by mitigating Variant 4 in hardware wherever possible during secure
54 For affected CPUs, this approach enables the mitigation during EL3
58 This approach permanently mitigates the entire software stack and no additional
61 TF-A implements this approach for the following affected CPUs:
75 For affected CPUs, this approach also enables the mitigation during EL3
76 initialization, following every PE reset. In addition, this approach implements
79 context, where the risk is deemed low enough. This approach enables mitigation
81 on exit from EL3. For more information on this approach, see `Firmware
84 This approach may be complemented by additional mitigation code in other
87 approach will effectively permanently mitigate the entire software stack, since
[all …]
/external/zstd/contrib/match_finders/
DREADME.md7 * The original motivation for studying this approach was to try and optimize
29 * Note: after some experimentation, this approach proved to not provide enough
31 * where this approach consistenly outperforms Zstandard even on level 19 is
34 * (large similar files) this approach by itself took 5-10X longer than zstd-19 and
36 * over this appraoch for match finding is the overlapping matches. This approach
/external/flatbuffers/docs/source/
DCUsage.md78 the top-down approach.
83 The tutorial uses a bottom up approach. In C it is also possible to use
84 a top-down approach by starting and ending objects nested within each
171 The `FLATBUFFERS_WRAP_NAMESPACE` approach used in the tutorial is convenient
173 the best approach. If the namespace is absent, or simple and
176 mentioned above uses this approach.
/external/linux-kselftest/tools/testing/selftests/net/forwarding/
DREADME29 This approach for testing switch ASICs has several advantages over the
38 not always available. With the VRF-based approach one merely needs to
/external/tensorflow/tensorflow/lite/delegates/utils/dummy_delegate/
DREADME.md32 The former approach requires few changes as detailed below. The latter one
36 delegate-registrar approach is slightly preferred here.
41 In this approach, create a delegate provider like the
125 In this **alternative approach to reuse existing Tensorflow Lite kernel testing
138 via this external-delegate approach. We could use similar commands for testing
/external/rust/cxx/tests/ui/
Dasync_fn.stderr1 …nc function is not directly supported yet, but see https://cxx.rs/async.html for a working approach
/external/ply/ply/
DTODO14 than the reflection approach used by PLY.
/external/perfetto/docs/design-docs/
Dheapprofd-sampling.md10 approach that handles a statistically meaningful subset of allocations. This
16 Bernoulli trial. The reason we use a random sampling approach, as opposed to
53 exponential draw approach, as for a non-sample, we only need to decrement a
121 Benchmarking of the STL distributions on a Pixel 4 reinforces our approach of
148 The most obvious impact is that with the old approach we would expect to sample
/external/googletest/googletest/
DREADME.md66 And a more robust and flexible approach is to build GoogleTest as part of that
76 location. This is the least flexible approach and can make it more difficult
79 source tree. This is often the simplest approach, but is also the hardest to
85 approach doesn't have the limitations of the other methods.
109 Note that this approach requires CMake 3.14 or later due to its use of the
/external/curl/docs/cmdline-opts/
Dproxytunnel.d8 the proxy. The tunnel approach is made with the HTTP proxy CONNECT request and
/external/libcap/doc/
Dcapability.notes11 this fine grained approach to constraining the danger to your system
17 Adopting a role approach to system security:
/external/angle/src/libANGLE/renderer/metal/doc/
DTransformFeedback.md52 - Instead of executing the same Vertex Shader's logic twice, one alternative approach is writing the
60 - However, this approach might even be slower than executing the Vertex Shader twice. Because a
65 enabled, the original approach will just simply executes the Vertex Shader once and use a cheap
/external/llvm-project/mlir/include/mlir/Dialect/Tosa/Transforms/
DPasses.td21 approach similar to step 1 of Numpy 4-step broadcasting:
/external/python/pybind11/docs/advanced/
Dmisc.rst206 This approach has the potential downside that instances of classes exposed
221 call from Python might lead to undefined behavior). Yet another approach that
241 approach (which also works on CPython) is to use the :py:mod:`atexit` module [#f7]_,
260 simple example repository which uses this approach.
262 There are two potential gotchas when using this approach: first, make sure that
/external/openscreen/cast/cast_core/api/metrics/
Dmetrics_recorder.proto23 // This repliciates the Fuchsia approach to Cast metrics; for documentation on
/external/icu/tools/srcgen/javadoc_patches/patches/src/main/java/android/icu/util/
DIslamicCalendar.java.patch8 - * which approach is used to determine the start of a month. By default, the
/external/ruy/ruy/profiler/
DREADME.md18 A discussion of pros/cons of this approach is appended below.
143 Another key aspect determining what profiling approach is suitable for a given
146 instrument the known possibly-critical code as per the present approach. On the
/external/sqlite/
DAndroid.bp5 // Added automatically by a large-scale-change that took the approach of
/external/ksoap2/
DAndroid.bp5 // Added automatically by a large-scale-change that took the approach of
/external/gemmlowp/meta/
DREADME34 The basic kernel used in this approach is of shape 3x3x8. Obviously this
56 This approach allowed moving all unnecessary branching and conditional execution
/external/grpc-grpc/examples/cpp/helloworld/
DCMakeLists.txt33 # This approach is very simple to use, but the are some potential
43 # A more robust approach to add dependency on gRPC is using
/external/python/pyopenssl/doc/
Dinternals.rst43 methods are declared static. One approach would be to have :py:mod:`.OpenSSL` as
47 importing the :py:mod:`socket` module. The other approach is to somehow get a
/external/shaderc/spirv-headers/
DAndroid.bp5 // Added automatically by a large-scale-change that took the approach of
/external/scapy/
DAndroid.bp5 // Added automatically by a large-scale-change that took the approach of
/external/selinux/
DAndroid.bp5 // Added automatically by a large-scale-change that took the approach of

12345678910>>...42