Searched full:techniques (Results 1 – 25 of 371) sorted by relevance
12345678910>>...15
| /external/tensorflow/tensorflow/lite/g3doc/examples/convert/ |
| D | index.md | 23 the option to refactor your model or use advanced conversion techniques. 72 models may require refactoring or use of advanced conversion techniques to 110 * Topics under the Model compatibility overview cover advanced techniques for 120 guidance on how to optimize your converted model using techniques like
|
| /external/one-true-awk/testdir/ |
| D | funstack.in | 622 classcodes = "C6130 (Data handling techniques)", 775 classcodes = "C6130 (Data handling techniques)", 793 classcodes = "C6130 (Data handling techniques)", 811 classcodes = "C6130 (Data handling techniques)", 950 …abstract = "Several specialized techniques are shown for efficiently incorporating spelling co… 1036 classcodes = "B0260 (Optimisation techniques); C1180 (Optimisation techniques)", 1231 classcodes = "C6130 (Data handling techniques); C6140D (High level languages)", 1274 classcodes = "B0260 (Optimisation techniques); C1180 (Optimisation techniques)", 1529 …classcodes = "C6130 (Data handling techniques); C6150C (Compilers, interpreters and other proces… 1630 classcodes = "C6130 (Data handling techniques); C6140D (High level languages)", [all …]
|
| /external/testng/doc/ |
| D | book.html | 29 …techniques and TestNG, a powerful open source Java testing platform.</p><p>C�dric Beust, TestNG's … 30 …E APIs, databases, Web pages, and XML files </li><li>Presents advanced techniques: testing partial…
|
| /external/python/google-api-python-client/docs/dyn/ |
| D | securitycenter_v1.organizations.sources.findings.html | 163 …ATT&CK tactics and techniques related to this finding. See: https://attack.mitre.org # MITRE A… 167 …Additional MITRE ATT&CK techniques related to this finding, if any, along with any of their re… 171 …a repeated field because there are multiple levels of MITRE ATT&CK techniques. If the techniqu… 263 …ATT&CK tactics and techniques related to this finding. See: https://attack.mitre.org # MITRE A… 267 …Additional MITRE ATT&CK techniques related to this finding, if any, along with any of their re… 271 …a repeated field because there are multiple levels of MITRE ATT&CK techniques. If the techniqu… 434 …ATT&CK tactics and techniques related to this finding. See: https://attack.mitre.org # MITRE A… 438 …Additional MITRE ATT&CK techniques related to this finding, if any, along with any of their re… 442 …a repeated field because there are multiple levels of MITRE ATT&CK techniques. If the techniqu… 571 …ATT&CK tactics and techniques related to this finding. See: https://attack.mitre.org # MITRE A… [all …]
|
| D | securitycenter_v1.folders.sources.findings.html | 230 …ATT&CK tactics and techniques related to this finding. See: https://attack.mitre.org # MITRE A… 234 …Additional MITRE ATT&CK techniques related to this finding, if any, along with any of their re… 238 …a repeated field because there are multiple levels of MITRE ATT&CK techniques. If the techniqu… 367 …ATT&CK tactics and techniques related to this finding. See: https://attack.mitre.org # MITRE A… 371 …Additional MITRE ATT&CK techniques related to this finding, if any, along with any of their re… 375 …a repeated field because there are multiple levels of MITRE ATT&CK techniques. If the techniqu… 467 …ATT&CK tactics and techniques related to this finding. See: https://attack.mitre.org # MITRE A… 471 …Additional MITRE ATT&CK techniques related to this finding, if any, along with any of their re… 475 …a repeated field because there are multiple levels of MITRE ATT&CK techniques. If the techniqu… 580 …ATT&CK tactics and techniques related to this finding. See: https://attack.mitre.org # MITRE A… [all …]
|
| D | securitycenter_v1.projects.sources.findings.html | 230 …ATT&CK tactics and techniques related to this finding. See: https://attack.mitre.org # MITRE A… 234 …Additional MITRE ATT&CK techniques related to this finding, if any, along with any of their re… 238 …a repeated field because there are multiple levels of MITRE ATT&CK techniques. If the techniqu… 367 …ATT&CK tactics and techniques related to this finding. See: https://attack.mitre.org # MITRE A… 371 …Additional MITRE ATT&CK techniques related to this finding, if any, along with any of their re… 375 …a repeated field because there are multiple levels of MITRE ATT&CK techniques. If the techniqu… 467 …ATT&CK tactics and techniques related to this finding. See: https://attack.mitre.org # MITRE A… 471 …Additional MITRE ATT&CK techniques related to this finding, if any, along with any of their re… 475 …a repeated field because there are multiple levels of MITRE ATT&CK techniques. If the techniqu… 580 …ATT&CK tactics and techniques related to this finding. See: https://attack.mitre.org # MITRE A… [all …]
|
| D | firebasedynamiclinks_v1.v1.html | 160 …ring", # The deep-link attributed post-install via one of several techniques (fingerprint, co… 163 …ring", # Invitation ID attributed post-install via one of several techniques (fingerprint, co… 167 … Entire FDL (short or long) attributed post-install via one of several techniques (fingerprint, co…
|
| /external/llvm/lib/Transforms/ObjCARC/ |
| D | ProvenanceAnalysis.h | 14 /// use various techniques to determine if locally 42 /// techniques, except it uses special ObjC-specific reasoning about pointer
|
| /external/swiftshader/third_party/llvm-10.0/llvm/lib/Transforms/ObjCARC/ |
| D | ProvenanceAnalysis.h | 14 /// use various techniques to determine if locally 43 /// techniques, except it uses special ObjC-specific reasoning about pointer
|
| /external/icing/icing/ |
| D | icing-search-engine_fuzz_test.cc | 44 // TODO (sidchhabra): Added more optimized fuzzing techniques. in MakeDocument() 57 // TODO (sidchhabra): Added more optimized fuzzing techniques. in SetSearchSpec()
|
| /external/jacoco/org.jacoco.doc/docroot/doc/ |
| D | implementation.html | 46 each approach different implementation techniques are known. The following 47 diagram gives an overview with the techniques used by JaCoCo highlighted: 50 <img src="resources/implementation.png" alt="Coverage Implementation Techniques"/>
|
| /external/libaom/doc/dev_guide/ |
| D | av1_decoder.dox | 3 Describe AV1 decoding techniques here.
|
| /external/skia/demos.skia.org/demos/sampling_types/ |
| D | index.html | 2 <title>Image sampling techniques</title> 18 <h1>Image sampling techniques</h1>
|
| /external/tensorflow/tensorflow/lite/g3doc/examples/build/ |
| D | index.md | 117 topic for more details on these techniques. TensorFlow also provides a 119 which provides an API that implements these techniques.
|
| /external/ImageMagick/www/ |
| D | links.html | 95 …ces">Program Interface Tutorials</a> • <a href="links.html#techniques">ImageMagick Techniques</a> … 138 <h2><a class="anchor" id="techniques"></a>ImageMagick Techniques</h2>
|
| /external/zstd/contrib/largeNbDicts/ |
| D | README.md | 11 and experiment mitigation techniques.
|
| /external/libxml2/python/tests/ |
| D | reader5.py | 15 <emph>Compilers: Principles, Techniques, and Tools</emph>.
|
| /external/javassist/sample/duplicate/ |
| D | Main.java | 9 of the implementation techniques of fault tolernacy is to make a copy
|
| /external/libpng/intel/ |
| D | intel_init.c | 22 /* The techniques used to implement each of these filters in SSE operate on in png_init_filter_functions_sse2()
|
| /external/zstd/contrib/match_finders/ |
| D | README.md | 4 /* This match finder leverages techniques used in file comparison algorithms
|
| /external/grpc-grpc/third_party/nanopb/examples/using_union_messages/ |
| D | README.txt | 7 https://developers.google.com/protocol-buffers/docs/techniques#union
|
| /external/curl/docs/libcurl/opts/ |
| D | CURLOPT_RANGE.3 | 42 techniques). Unfortunately, the HTTP standard (RFC 7233 section 3.1) allows
|
| /external/nanopb-c/examples/using_union_messages/ |
| D | README.txt | 7 https://developers.google.com/protocol-buffers/docs/techniques#union
|
| /external/tensorflow/tensorflow/lite/schema/ |
| D | conversion_metadata.fbs | 61 // Applied the optimization techniques.
|
| /external/llvm/docs/ |
| D | Bugpoint.rst | 90 the JIT or the static LLC compiler. It uses several techniques to reduce the 161 following steps may help. These same techniques are useful with TargetLowering
|
12345678910>>...15