Home
last modified time | relevance | path

Searched full:thus (Results 1 – 25 of 10314) sorted by relevance

12345678910>>...413

/external/tensorflow/tensorflow/core/api_def/base_api/
Dapi_def_LoadAllTPUEmbeddingParameters.pbtxt17 training loop updates. The shape of each entry is ignored (and thus can be
27 embedding training loop updates. The shape of each entry is ignored (and thus
37 training loop updates. The shape of each entry is ignored (and thus can be
47 embedding training loop updates. The shape of each entry is ignored (and thus
57 training loop updates. The shape of each entry is ignored (and thus can be
67 embedding training loop updates. The shape of each entry is ignored (and thus
77 training loop updates. The shape of each entry is ignored (and thus can be
/external/oj-libjdwp/src/share/classes/com/sun/jdi/request/
DEventRequestManager.java241 * after the first step is detected. Thus a next line method
406 * This list is a live view of these requests and thus changes as requests
414 * This list is a live view of these requests and thus changes as requests
422 * This list is a live view of these requests and thus changes as requests
430 * This list is a live view of these requests and thus changes as requests
438 * This list is a live view of these requests and thus changes as requests
446 * This list is a live view of these requests and thus changes as requests
454 * This list is a live view of these requests and thus changes as requests
463 * This list is a live view of these requests and thus changes as requests
472 * This list is a live view of these requests and thus changes as requests
[all …]
/external/brotli/tests/testdata/
Dplrabn12.txt153 Breaking the horrid silence, thus began:--
197 And him thus answered soon his bold compeer:--
207 In horrible destruction laid thus low,
262 Thus Satan, talking to his nearest mate,
336 Lie thus astonished on th' oblivious pool,
342 Thus answered:--"Leader of those armies bright
398 Thus drooping, or with linked thunderbolts
629 From mortal or immortal minds. Thus they,
657 By Fontarabbia. Thus far these beyond
816 On Lemnos, th' Aegaean isle. Thus they relate,
[all …]
/external/webrtc/modules/rtp_rtcp/source/
Dflexfec_header_reader_writer.cc98 "support this, thus discarding the packet."; in ReadFecHeader()
105 "not yet support this, thus discarding packet."; in ReadFecHeader()
112 "yet support this, thus discarding packet."; in ReadFecHeader()
124 // the packed packet masks out-of-band, thus leaving the FlexFEC header as is. in ReadFecHeader()
140 // The first K-bit is set, and the packet mask is thus only 2 bytes long. in ReadFecHeader()
150 // to the left, thus removing K-bit 0. We will now shift the next four bytes in ReadFecHeader()
161 // mask is thus 6 bytes long. We have now read the entire FEC header, in ReadFecHeader()
172 // The packet mask is thus 14 bytes long. We have now read the entire in ReadFecHeader()
277 tmp_mask_part0 >>= 1; // Shift, thus clearing K-bit 0. in FinalizeFecHeader()
280 tmp_mask_part1 >>= 2; // Shift, thus clearing K-bit 1 and bit 15. in FinalizeFecHeader()
[all …]
/external/openthread/third_party/mbedtls/repo/tests/include/test/
Dthreading_helpers.h43 * thus not considered part of the public API of
44 * MbedTLS and thus may change without notice.
76 * and thus not considered part of the public API of
77 * MbedTLS and thus may change without notice.
/external/harfbuzz_ng/test/shape/data/text-rendering-tests/fonts/
DSelawik-README.md11 … because its vertical metrics do not change anywhere in the design space, thus there is no need fo…
50 …position to the rest of the font: lighter at bold weights and vice versa. Thus, if you use this ch…
60thus doesn't vary CVTs, thus doesn't need a cvar. So, to make it more interesting, we added CVT-ba…
/external/cpuinfo/deps/clog/src/
Dclog.c56 …/* The first call to vsnprintf will clobber args, thus need a copy in case a second vsnprintf call… in clog_vlog_fatal()
74 * Prefix + suffix alone would overflow the on-stack buffer, thus need to use on-heap buffer. in clog_vlog_fatal()
134 …/* The first call to vsnprintf will clobber args, thus need a copy in case a second vsnprintf call… in clog_vlog_error()
152 * Prefix + suffix alone would overflow the on-stack buffer, thus need to use on-heap buffer. in clog_vlog_error()
212 …/* The first call to vsnprintf will clobber args, thus need a copy in case a second vsnprintf call… in clog_vlog_warning()
230 * Prefix + suffix alone would overflow the on-stack buffer, thus need to use on-heap buffer. in clog_vlog_warning()
290 …/* The first call to vsnprintf will clobber args, thus need a copy in case a second vsnprintf call… in clog_vlog_info()
308 * Prefix + suffix alone would overflow the on-stack buffer, thus need to use on-heap buffer. in clog_vlog_info()
368 …/* The first call to vsnprintf will clobber args, thus need a copy in case a second vsnprintf call… in clog_vlog_debug()
386 * Prefix + suffix alone would overflow the on-stack buffer, thus need to use on-heap buffer. in clog_vlog_debug()
/external/pytorch/aten/src/ATen/native/quantized/cpu/qnnpack/deps/clog/src/
Dclog.c61 /* The first call to vsnprintf will clobber args, thus need a copy in case a in clog_vlog_fatal()
82 * Prefix + suffix alone would overflow the on-stack buffer, thus need to in clog_vlog_fatal()
155 /* The first call to vsnprintf will clobber args, thus need a copy in case a in clog_vlog_error()
176 * Prefix + suffix alone would overflow the on-stack buffer, thus need to in clog_vlog_error()
249 /* The first call to vsnprintf will clobber args, thus need a copy in case a in clog_vlog_warning()
273 * Prefix + suffix alone would overflow the on-stack buffer, thus need to in clog_vlog_warning()
346 /* The first call to vsnprintf will clobber args, thus need a copy in case a in clog_vlog_info()
367 * Prefix + suffix alone would overflow the on-stack buffer, thus need to in clog_vlog_info()
440 /* The first call to vsnprintf will clobber args, thus need a copy in case a in clog_vlog_debug()
461 * Prefix + suffix alone would overflow the on-stack buffer, thus need to in clog_vlog_debug()
/external/cronet/stable/third_party/boringssl/src/crypto/fipsmodule/
DFIPS.md35 …break-hash.go` can be used to corrupt the FIPS module inside a binary and thus trigger a failure o…
47 …suggesting that there is any security advantage at all to doing this, and thus recommend that Andr…
49 The CTR-DRBG is reseeded every 4096 calls to `RAND_bytes`. Thus the process will randomly crash abo…
55 …to stop all other threads from using the RNG once this process has begun. Thus the main thread exi…
61 …ibraries and ASLR, some relocations can only be resolved at run-time, and thus targets of those re…
75 …that causes them is when we have a static `EVP_MD` or `EVP_CIPHER` object thus, inside the module,…
81 The static build cannot depend on the shared-object link to resolve relocations and thus must take …
91Thus calls to these functions are rewritten into an IP-relative jump to a redirector function. The…
107 …dule and thus not hashed. A relocation record is emitted to instruct the linker to poke the final …
/external/boringssl/src/crypto/fipsmodule/
DFIPS.md35 …break-hash.go` can be used to corrupt the FIPS module inside a binary and thus trigger a failure o…
47 …suggesting that there is any security advantage at all to doing this, and thus recommend that Andr…
49 The CTR-DRBG is reseeded every 4096 calls to `RAND_bytes`. Thus the process will randomly crash abo…
55 …to stop all other threads from using the RNG once this process has begun. Thus the main thread exi…
61 …ibraries and ASLR, some relocations can only be resolved at run-time, and thus targets of those re…
75 …that causes them is when we have a static `EVP_MD` or `EVP_CIPHER` object thus, inside the module,…
81 The static build cannot depend on the shared-object link to resolve relocations and thus must take …
91Thus calls to these functions are rewritten into an IP-relative jump to a redirector function. The…
107 …dule and thus not hashed. A relocation record is emitted to instruct the linker to poke the final …
/external/cronet/tot/third_party/boringssl/src/crypto/fipsmodule/
DFIPS.md35 …break-hash.go` can be used to corrupt the FIPS module inside a binary and thus trigger a failure o…
47 …suggesting that there is any security advantage at all to doing this, and thus recommend that Andr…
49 The CTR-DRBG is reseeded every 4096 calls to `RAND_bytes`. Thus the process will randomly crash abo…
55 …to stop all other threads from using the RNG once this process has begun. Thus the main thread exi…
61 …ibraries and ASLR, some relocations can only be resolved at run-time, and thus targets of those re…
75 …that causes them is when we have a static `EVP_MD` or `EVP_CIPHER` object thus, inside the module,…
81 The static build cannot depend on the shared-object link to resolve relocations and thus must take …
91Thus calls to these functions are rewritten into an IP-relative jump to a redirector function. The…
107 …dule and thus not hashed. A relocation record is emitted to instruct the linker to poke the final …
/external/gemmlowp/doc/
Dless-than-8-bit.md52 becomes very low). Thus, no particular work would be needed in the packing
100 data to less-than-8-bit depths by scaling them, thus shrinking the range of the
103 GEMM kernel to use narrower accumulators without risking overflow, thus
151 to be smaller than 2^M, each product is thus guaranteed to be smaller than
152 2^(M+N). Thus, one may accumulate 2^(16-(M+N)) such products and still be
153 guaranteed that such an accumulator will be smaller than 2^16, and thus can be
157 entries are on 5 bits (M=5), so each product fits in 12 bits and one can thus
253 occurs many times, the mean requantized value will thus tend to 3.8.
276 Thus, for fixed input values and bit depths, we expect that probabilistic
299 that minimizes the "clumpiness" of the random offsets (Thus, for example,
/external/rust/android-crates-io/crates/zerocopy/src/util/
Dmod.rs134 // SAFETY: Per [1], `MaybeUninit<T>` has the same layout as `T`, and thus
142 // SAFETY: `MaybeUninit` has no validity invariants. Thus, a valid
149 // layout as `T`. Thus, this cast preserves size. in cast_into_inner()
158 // layout as `T`. Thus, this cast preserves size. in cast_from_inner()
186 // SAFETY: Per [1], `ManuallyDrop<T>` has the same layout as `T`, and thus
202 // layout as `T`. Thus, this cast preserves size even if `T` is unsized. in cast_into_inner()
212 // layout as `T`. Thus, this cast preserves size even if `T` is unsized. in cast_from_inner()
232 // add or remove fields. Thus, we know that `Wrapping<T>` contains a `T` (as
234 // or post-padding. Thus, `Wrapping<T>` must have `UnsafeCell`s covering the
241 // SAFETY: Per [1], `Wrapping<T>` has the same layout as `T`, and thus has
[all …]
/external/cronet/tot/third_party/icu/patches/
Dwordbrk.patch15 +# Thus, although the upstream intent was to not break "user.name@example.com" at
21 +# (and thus this patch) for '.' and now '@'.
56 +# Thus, although the upstream intent was to not break "user.name@example.com" at
62 +# (and thus this patch) for '.' and now '@'.
92 +# Thus, although the upstream intent was to not break "user.name@example.com" at
98 +# (and thus this patch) for '.' and now '@'.
/external/cronet/stable/third_party/icu/patches/
Dwordbrk.patch15 +# Thus, although the upstream intent was to not break "user.name@example.com" at
21 +# (and thus this patch) for '.' and now '@'.
56 +# Thus, although the upstream intent was to not break "user.name@example.com" at
62 +# (and thus this patch) for '.' and now '@'.
92 +# Thus, although the upstream intent was to not break "user.name@example.com" at
98 +# (and thus this patch) for '.' and now '@'.
/external/pytorch/torch/csrc/jit/backends/
Dbackend_debug_handler.h33 * Thus simplifies the runtime API for throwing exception. Exception throwing
52 * Without access to graph it is hard to generate model level debug info. Thus
58 * model source code. Thus we can either do eager symbolication by converting
109 * instead of inlined CS. Thus to get full stack: [N.forward, source range] ->
129 // can throw, and throwing with dtor will call terminate and thus voids any
/external/libchrome/base/android/java/src/org/chromium/base/
DMemoryPressureListener.java31 * thus simulating a low memory situations.
37 * thus simulating a low memory situations.
43 * with notification level TRIM_MEMORY_RUNNING_CRITICAL thus simulating a low memory situation
50 * with notification level TRIM_MEMORY_MODERATE thus simulating a low memory situation
/external/cronet/test_runner/
DAndroid.bp44 // that are used by this test. Thus, disable this on target windows.
77 // that are used by this test. Thus, disable this on target windows.
100 // that are used by this test. Thus, disable this on target windows.
130 // that are used by this test. Thus, disable this on target windows.
/external/cronet/tot/third_party/boringssl/src/crypto/fipsmodule/ec/
Dutil.cc.inc132 // Thus a_j = t_j ≠ 0 (mod n). Note a_i and t_i may not be reduced mod n. t_i is
156 // This is compensated by t_(i-w)'s subtraction term. Thus, a_i may be computed
166 // terms thus far were zero.)
180 // n is much larger than 2^w, so this is impossible. Thus, j = 0: only the final
192 // Divide n into n_H + n_M + n_L similarly. We thus have:
214 // Contradiction (n_M + n_L is the bottom w bits of n). Thus k_H < n_H. Suppose
221 // Contradiction. Thus, k_H = n_H - 2^w. (Note 2^w divides n_H and k_H.) Thus,
229 // Thus n_M + n_L < 2^(w-1), so n_M is zero, proving our condition.
/external/cronet/stable/third_party/boringssl/src/crypto/fipsmodule/ec/
Dutil.cc.inc132 // Thus a_j = t_j ≠ 0 (mod n). Note a_i and t_i may not be reduced mod n. t_i is
156 // This is compensated by t_(i-w)'s subtraction term. Thus, a_i may be computed
166 // terms thus far were zero.)
180 // n is much larger than 2^w, so this is impossible. Thus, j = 0: only the final
192 // Divide n into n_H + n_M + n_L similarly. We thus have:
214 // Contradiction (n_M + n_L is the bottom w bits of n). Thus k_H < n_H. Suppose
221 // Contradiction. Thus, k_H = n_H - 2^w. (Note 2^w divides n_H and k_H.) Thus,
229 // Thus n_M + n_L < 2^(w-1), so n_M is zero, proving our condition.
/external/rust/android-crates-io/crates/quiche/deps/boringssl/src/crypto/fipsmodule/ec/
Dutil.c132 // Thus a_j = t_j ≠ 0 (mod n). Note a_i and t_i may not be reduced mod n. t_i is
156 // This is compensated by t_(i-w)'s subtraction term. Thus, a_i may be computed
166 // terms thus far were zero.)
180 // n is much larger than 2^w, so this is impossible. Thus, j = 0: only the final
192 // Divide n into n_H + n_M + n_L similarly. We thus have:
214 // Contradiction (n_M + n_L is the bottom w bits of n). Thus k_H < n_H. Suppose
221 // Contradiction. Thus, k_H = n_H - 2^w. (Note 2^w divides n_H and k_H.) Thus,
229 // Thus n_M + n_L < 2^(w-1), so n_M is zero, proving our condition.
/external/rust/android-crates-io/crates/ring/crypto/fipsmodule/ec/
Dutil.h135 // Thus a_j = t_j ≠ 0 (mod n). Note a_i and t_i may not be reduced mod n. t_i is
159 // This is compensated by t_(i-w)'s subtraction term. Thus, a_i may be computed
169 // terms thus far were zero.)
183 // n is much larger than 2^w, so this is impossible. Thus, j = 0: only the final
195 // Divide n into n_H + n_M + n_L similarly. We thus have:
217 // Contradiction (n_M + n_L is the bottom w bits of n). Thus k_H < n_H. Suppose
224 // Contradiction. Thus, k_H = n_H - 2^w. (Note 2^w divides n_H and k_H.) Thus,
232 // Thus n_M + n_L < 2^(w-1), so n_M is zero, proving our condition.
/external/boringssl/src/crypto/fipsmodule/ec/
Dutil.cc.inc132 // Thus a_j = t_j ≠ 0 (mod n). Note a_i and t_i may not be reduced mod n. t_i is
156 // This is compensated by t_(i-w)'s subtraction term. Thus, a_i may be computed
166 // terms thus far were zero.)
180 // n is much larger than 2^w, so this is impossible. Thus, j = 0: only the final
192 // Divide n into n_H + n_M + n_L similarly. We thus have:
214 // Contradiction (n_M + n_L is the bottom w bits of n). Thus k_H < n_H. Suppose
221 // Contradiction. Thus, k_H = n_H - 2^w. (Note 2^w divides n_H and k_H.) Thus,
229 // Thus n_M + n_L < 2^(w-1), so n_M is zero, proving our condition.
/external/curl/docs/libcurl/
DABI.md34 output name and thus can in fact be installed in parallel with an older
35 installed lib (on most systems). Thus, old applications built against the
52 downgrade so far so you cross an ABI break border and thus a different
/external/libbrillo/install_attributes/
Dlibinstallattributes.cc15 // thus guaranteed to be unadulterated.
40 // attributes can never change and thus never need reloading. in GetAttribute()
66 // Parse errors are unrecoverable (lockbox does atomic write), thus mark as in TryToLoad()

12345678910>>...413