/frameworks/av/media/libstagefright/codecs/on2/h264dec/omxdl/reference/vc/m4p10/src/ |
omxVCM4P10_TransformDequantChromaDCFromPair.c | 85 * Reconstruct the 2x2 ChromaDC block from coefficient-position pair buffer,
|
omxVCM4P10_DequantTransformResidualFromPairAndAdd.c | 51 * Reconstruct the 4x4 residual block from coefficient-position pair buffer,
|
/frameworks/ex/common/java/com/android/common/ |
GoogleLogTags.logtags | 43 # @param changes Number of changes made to database in reconstruct
|
/external/chromium_org/cc/resources/ |
picture_unittest.cc | 60 // Reconstruct the picture. 88 // Reconstruct the picture.
|
/external/chromium_org/third_party/skia/src/utils/ |
SkCanvasStateUtils.cpp | 258 // reconstruct the matrix 264 // reconstruct the clip
|
/external/pixman/demos/ |
scale.ui | 197 <property name="label" translatable="yes"><b>Reconstruct X:</b></property> 205 <property name="label" translatable="yes"><b>Reconstruct Y:</b></property>
|
/external/skia/src/utils/ |
SkCanvasStateUtils.cpp | 255 // reconstruct the matrix 261 // reconstruct the clip
|
/dalvik/vm/compiler/template/armv5te/ |
footer.S | 67 add rPC, r0, #6 @ reconstruct new rPC (advance 6 bytes)
|
/dalvik/vm/compiler/template/mips/ |
footer.S | 85 add rPC, a0, 3*2 # reconstruct new rPC
|
/external/chromium_org/cc/quads/ |
draw_quad.h | 83 // efficiency. There is special treatment to reconstruct these pointers
|
/external/chromium_org/v8/src/arm/ |
constants-arm.cc | 39 // Reconstruct a double from the immediate encoded in the vmov instruction.
|
/external/clang/include/clang/Lex/ |
PTHManager.h | 91 /// GetIdentifierInfo - Used to reconstruct IdentifierInfo objects from the
|
/external/libvpx/libvpx/test/ |
fdct4x4_test.cc | 170 // inverse transform and reconstruct the pixel block
|
/external/llvm/test/Transforms/LoopStrengthReduce/ |
addrec-gep.ll | 11 ; be able to reconstruct the full getelementptr, despite it having a few
|
/external/openssh/ |
auth2-hostbased.c | 107 /* reconstruct packet */
|
/external/proguard/src/proguard/classfile/instruction/ |
SimpleInstruction.java | 139 // Reconstruct the opcode of the shortest instruction, if there are
|
/external/v8/src/arm/ |
constants-arm.cc | 39 // Reconstruct a double from the immediate encoded in the vmov instruction.
|
/external/valgrind/main/none/tests/x86/ |
bt_literal.c | 9 also reconstruct the original bits 0, 1, 2, 3 by looking at the
|
/frameworks/av/media/libstagefright/codecs/on2/h264dec/omxdl/reference/vc/m4p2/src/ |
omxVCM4P2_DecodePadMV_PVOP.c | 206 /* Adding the difference to the predicted MV to reconstruct MV */
|
/frameworks/base/core/java/android/database/ |
CursorToBulkCursorAdaptor.java | 136 * Returns an object that contains sufficient metadata to reconstruct
|
/external/elfutils/libdwfl/ |
elf-from-memory.c | 0 /* Reconstruct an ELF file by reading the segments out of remote memory. 62 /* Reconstruct an ELF file by reading the segments out of remote memory
|
/external/llvm/include/llvm/CodeGen/ |
LiveIntervalAnalysis.h | 161 /// EndPoints such that extendToIndices(LI, EndPoints) will reconstruct the 164 /// Calling pruneValue() and extendToIndices() can be used to reconstruct
|
/external/proguard/docs/ |
FAQ.html | 39 <li><a href="#stacktrace">Can <b>ProGuard</b> reconstruct obfuscated stack 238 <h3>Can <b>ProGuard</b> reconstruct obfuscated stack traces?</h3>
|
/prebuilts/tools/common/proguard/proguard4.7/docs/ |
FAQ.html | 53 <li><a href="#stacktrace">Can <b>ProGuard</b> reconstruct obfuscated stack 236 <h3><a name="stacktrace">Can <b>ProGuard</b> reconstruct obfuscated stack traces?</a></h3>
|
/development/samples/BackupRestore/src/com/example/android/backuprestore/ |
MultiRecordExampleAgent.java | 155 * then reconstruct the application's data file inside the shared lock. A
|