Home
last modified time | relevance | path

Searched full:techniques (Results 1 – 25 of 371) sorted by relevance

12345678910>>...15

/external/tensorflow/tensorflow/lite/g3doc/examples/convert/
Dindex.md23 the option to refactor your model or use advanced conversion techniques.
72 models may require refactoring or use of advanced conversion techniques to
110 * Topics under the Model compatibility overview cover advanced techniques for
120 guidance on how to optimize your converted model using techniques like
/external/one-true-awk/testdir/
Dfunstack.in622 classcodes = "C6130 (Data handling techniques)",
775 classcodes = "C6130 (Data handling techniques)",
793 classcodes = "C6130 (Data handling techniques)",
811 classcodes = "C6130 (Data handling techniques)",
950 …abstract = "Several specialized techniques are shown for efficiently incorporating spelling co…
1036 classcodes = "B0260 (Optimisation techniques); C1180 (Optimisation techniques)",
1231 classcodes = "C6130 (Data handling techniques); C6140D (High level languages)",
1274 classcodes = "B0260 (Optimisation techniques); C1180 (Optimisation techniques)",
1529 …classcodes = "C6130 (Data handling techniques); C6150C (Compilers, interpreters and other proces…
1630 classcodes = "C6130 (Data handling techniques); C6140D (High level languages)",
[all …]
/external/testng/doc/
Dbook.html29techniques and TestNG, a powerful open source Java testing platform.</p><p>C�dric Beust, TestNG's …
30 …E APIs, databases, Web pages, and XML files </li><li>Presents advanced techniques: testing partial…
/external/python/google-api-python-client/docs/dyn/
Dsecuritycenter_v1.organizations.sources.findings.html163 …ATT&amp;CK tactics and techniques related to this finding. See: https://attack.mitre.org # MITRE A…
167 …Additional MITRE ATT&amp;CK techniques related to this finding, if any, along with any of their re…
171 …a repeated field because there are multiple levels of MITRE ATT&amp;CK techniques. If the techniqu…
263 …ATT&amp;CK tactics and techniques related to this finding. See: https://attack.mitre.org # MITRE A…
267 …Additional MITRE ATT&amp;CK techniques related to this finding, if any, along with any of their re…
271 …a repeated field because there are multiple levels of MITRE ATT&amp;CK techniques. If the techniqu…
434 …ATT&amp;CK tactics and techniques related to this finding. See: https://attack.mitre.org # MITRE A…
438 …Additional MITRE ATT&amp;CK techniques related to this finding, if any, along with any of their re…
442 …a repeated field because there are multiple levels of MITRE ATT&amp;CK techniques. If the techniqu…
571 …ATT&amp;CK tactics and techniques related to this finding. See: https://attack.mitre.org # MITRE A…
[all …]
Dsecuritycenter_v1.folders.sources.findings.html230 …ATT&amp;CK tactics and techniques related to this finding. See: https://attack.mitre.org # MITRE A…
234 …Additional MITRE ATT&amp;CK techniques related to this finding, if any, along with any of their re…
238 …a repeated field because there are multiple levels of MITRE ATT&amp;CK techniques. If the techniqu…
367 …ATT&amp;CK tactics and techniques related to this finding. See: https://attack.mitre.org # MITRE A…
371 …Additional MITRE ATT&amp;CK techniques related to this finding, if any, along with any of their re…
375 …a repeated field because there are multiple levels of MITRE ATT&amp;CK techniques. If the techniqu…
467 …ATT&amp;CK tactics and techniques related to this finding. See: https://attack.mitre.org # MITRE A…
471 …Additional MITRE ATT&amp;CK techniques related to this finding, if any, along with any of their re…
475 …a repeated field because there are multiple levels of MITRE ATT&amp;CK techniques. If the techniqu…
580 …ATT&amp;CK tactics and techniques related to this finding. See: https://attack.mitre.org # MITRE A…
[all …]
Dsecuritycenter_v1.projects.sources.findings.html230 …ATT&amp;CK tactics and techniques related to this finding. See: https://attack.mitre.org # MITRE A…
234 …Additional MITRE ATT&amp;CK techniques related to this finding, if any, along with any of their re…
238 …a repeated field because there are multiple levels of MITRE ATT&amp;CK techniques. If the techniqu…
367 …ATT&amp;CK tactics and techniques related to this finding. See: https://attack.mitre.org # MITRE A…
371 …Additional MITRE ATT&amp;CK techniques related to this finding, if any, along with any of their re…
375 …a repeated field because there are multiple levels of MITRE ATT&amp;CK techniques. If the techniqu…
467 …ATT&amp;CK tactics and techniques related to this finding. See: https://attack.mitre.org # MITRE A…
471 …Additional MITRE ATT&amp;CK techniques related to this finding, if any, along with any of their re…
475 …a repeated field because there are multiple levels of MITRE ATT&amp;CK techniques. If the techniqu…
580 …ATT&amp;CK tactics and techniques related to this finding. See: https://attack.mitre.org # MITRE A…
[all …]
Dfirebasedynamiclinks_v1.v1.html160 …ring&quot;, # The deep-link attributed post-install via one of several techniques (fingerprint, co…
163 …ring&quot;, # Invitation ID attributed post-install via one of several techniques (fingerprint, co…
167 … Entire FDL (short or long) attributed post-install via one of several techniques (fingerprint, co…
/external/llvm/lib/Transforms/ObjCARC/
DProvenanceAnalysis.h14 /// use various techniques to determine if locally
42 /// techniques, except it uses special ObjC-specific reasoning about pointer
/external/swiftshader/third_party/llvm-10.0/llvm/lib/Transforms/ObjCARC/
DProvenanceAnalysis.h14 /// use various techniques to determine if locally
43 /// techniques, except it uses special ObjC-specific reasoning about pointer
/external/icing/icing/
Dicing-search-engine_fuzz_test.cc44 // TODO (sidchhabra): Added more optimized fuzzing techniques. in MakeDocument()
57 // TODO (sidchhabra): Added more optimized fuzzing techniques. in SetSearchSpec()
/external/jacoco/org.jacoco.doc/docroot/doc/
Dimplementation.html46 each approach different implementation techniques are known. The following
47 diagram gives an overview with the techniques used by JaCoCo highlighted:
50 <img src="resources/implementation.png" alt="Coverage Implementation Techniques"/>
/external/libaom/doc/dev_guide/
Dav1_decoder.dox3 Describe AV1 decoding techniques here.
/external/skia/demos.skia.org/demos/sampling_types/
Dindex.html2 <title>Image sampling techniques</title>
18 <h1>Image sampling techniques</h1>
/external/tensorflow/tensorflow/lite/g3doc/examples/build/
Dindex.md117 topic for more details on these techniques. TensorFlow also provides a
119 which provides an API that implements these techniques.
/external/ImageMagick/www/
Dlinks.html95 …ces">Program Interface Tutorials</a> • <a href="links.html#techniques">ImageMagick Techniques</a> …
138 <h2><a class="anchor" id="techniques"></a>ImageMagick Techniques</h2>
/external/zstd/contrib/largeNbDicts/
DREADME.md11 and experiment mitigation techniques.
/external/libxml2/python/tests/
Dreader5.py15 <emph>Compilers: Principles, Techniques, and Tools</emph>.
/external/javassist/sample/duplicate/
DMain.java9 of the implementation techniques of fault tolernacy is to make a copy
/external/libpng/intel/
Dintel_init.c22 /* The techniques used to implement each of these filters in SSE operate on in png_init_filter_functions_sse2()
/external/zstd/contrib/match_finders/
DREADME.md4 /* This match finder leverages techniques used in file comparison algorithms
/external/grpc-grpc/third_party/nanopb/examples/using_union_messages/
DREADME.txt7 https://developers.google.com/protocol-buffers/docs/techniques#union
/external/curl/docs/libcurl/opts/
DCURLOPT_RANGE.342 techniques). Unfortunately, the HTTP standard (RFC 7233 section 3.1) allows
/external/nanopb-c/examples/using_union_messages/
DREADME.txt7 https://developers.google.com/protocol-buffers/docs/techniques#union
/external/tensorflow/tensorflow/lite/schema/
Dconversion_metadata.fbs61 // Applied the optimization techniques.
/external/llvm/docs/
DBugpoint.rst90 the JIT or the static LLC compiler. It uses several techniques to reduce the
161 following steps may help. These same techniques are useful with TargetLowering

12345678910>>...15