Searched full:leveraging (Results 1 – 25 of 129) sorted by relevance
123456
14 …ncerns: 1) dangling pointer bugs and 2) the potential vulnerability of leveraging other bugs to ac…69 GRP-01-003 will be addressed through leveraging gRPC Core fuzzer tests to actively identify and res…
16 ; Check that we correctly detect a splat/broadcast by leveraging the60 ; leveraging the commutativity property of `xor`.
15 …pplications running on Google Cloud can achieve extreme performance by leveraging the highly scala…
1 # Leveraging file capabilities on shared libraries
3 * leveraging a file capable shared library.
15 … that makes it easier for customers to optimize their EC2 instances by leveraging multiple CPU arc…
36 are PNG encoding and decoding. The PNG encode and decode tests leveraging procedurally
31 …ate custom machine learning models specific to their business needs by leveraging Google's state-o…
12 * thus we are leveraging it here and use 19_500 as a marker no one us allowed to use.
70 `constexpr` by leveraging compiler intrinsics. This is
30 …lation to your content and applications directly from your audio data. Leveraging Google’s machine…
27 // Emulate Sdp Server capability leveraging the production SDP server to
19 // this example show how to wrap multiple attributes into one leveraging std::tuple.
15 difficult to find the root cause of performance problems. By leveraging traces,
11 as running at full native (rather than WebAssembly) performance, leveraging
149 /// An encrypted encoder leveraging MIC for verification.151 /// An encrypted encoder leveraging signatures for verification.
256 for you, including lazily downloading them only when needed. By leveraging263 Pigweed users, and leveraging remote builds should allow us to dramatically
19 # The combined library is an intermediate product made by leveraging the LLVM
21 models specific to their business needs, by leveraging Google's
128 /// is leveraging a public identity, and hence, doesn't have an associated salt.
53 by leveraging shared hardware that both Mbed TLS and the attacker have access
27 # process-safe. In here, we implement the safe port allocation by leveraging