HomeSort by relevance Sort by last modified time
    Searched full:technique (Results 126 - 150 of 492) sorted by null

1 2 3 4 56 7 8 91011>>

  /docs/source.android.com/src/devices/
tuning.jd 147 <td>Selects the text gamma correction technique. There are four possible choices:
159 Lookup gamma corrections function best on GPUs with limited shader math. Shader gamma corrections are best to save memory. We recommend using the default <code>lookup</code> technique, which offers a good compromise in terms of quality, speed, and memory usage.
  /frameworks/base/docs/html/training/contacts-provider/
retrieve-names.jd 57 technique can return a list of matches.
62 data such as an email address. For example, this technique allows you to list all of the
69 this technique allows you to accept any type of data for a search string and then list the
96 This technique tries to match a search string to the name of a contact or contacts in the
149 {@link android.support.v4.app.Fragment} is a more flexible technique, because you can use
520 This technique allows you to specify the type of data you want to match. Retrieving
709 data. This is the best technique to use if your app focuses on a particular type of data, such
    [all...]
  /bionic/libc/private/
bionic_atomic_arm.h 23 * problem, we're going to use the same technique than libatomics_ops,
  /development/samples/devbytes/animation/SlidingFragments/src/com/example/android/slidingfragments/
SlidingFragments.java 32 * This application shows a simple technique to animate and overlay two fragments
  /external/antlr/antlr-3.4/runtime/CSharp2/Sources/Antlr3.Runtime/Antlr.Runtime.Tree/
TreeFilter.cs 62 using this technique in your own ANTLR-based application, don't sweat
  /external/antlr/antlr-3.4/runtime/Java/src/main/java/org/antlr/runtime/tree/
TreeFilter.java 58 using this technique in your own ANTLR-based application, don't sweat
  /external/bison/lib/
spawn-pipe.h 120 * will produce, the usual technique of calling read (fd, buf, BUFSIZ)
  /external/ceres-solver/internal/ceres/
low_rank_inverse_hessian.cc 121 // technique is widely reported to often improve convergence, however this
  /external/chromium/chrome/common/extensions/docs/static/
xhr.html 20 For an example of this technique, see the
  /external/chromium_org/third_party/WebKit/Source/core/plugins/
IFrameShimSupport.cpp 119 // technique of overlaying a windowed plugin with content from the
  /external/chromium_org/third_party/libjingle/source/talk/xmpp/
xmpptask.h 58 // This technique (synchronous recognize, but asynchronous processing)
  /external/chromium_org/third_party/libjpeg/
LICENSE 68 "uncompressed GIFs". This technique does not use the LZW algorithm; the
  /external/clang/test/Sema/
builtins.c 160 // Ensure that a technique used in glibc is handled correctly.
  /external/kernel-headers/original/asm-x86/
spinlock_32.h 145 * Changed to use the same technique as rw semaphores. See
  /external/libvorbis/doc/vorbisfile/
crosslap.html 20 cause clicks or thumps are eliminated or blended away. The technique
  /external/skia/tests/
PointTest.cpp 68 // force_as_float is meant to capture our latest technique (horrible as
  /external/smack/src/com/kenai/jbosh/
ServiceLib.java 92 * the Jar SPI technique. The order in which the class names occur
  /external/stlport/doc/
stlport_namespaces.txt 14 user code by a different name. This technique has has some drawback but also
  /external/valgrind/main/drd/
drd_segment.c 57 * @note This function copies the vector clock of thread 'creator', a technique
  /frameworks/base/docs/html/training/efficient-downloads/
redundant_redundant.jd 36 <p>Another important technique is to avoid downloading duplicate data. You can do this by aggressive caching. Always cache static resources, including on-demand downloads such as full size images, for as long as reasonably possible. On-demand resources should be stored separately to enable you to regularly flush your on-demand cache to manage its size.</p>
  /frameworks/base/docs/html/training/monitoring-device-state/
connectivity-monitoring.jd 90 <p>This technique requires toggling broadcast receivers you've declard in the manifest, which is
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/
_weakrefset.py 14 # This technique should be relatively thread-safe (since sets are).
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/
_weakrefset.py 14 # This technique should be relatively thread-safe (since sets are).
  /sdk/apps/SdkController/src/com/android/tools/sdkcontroller/lib/
Socket.java 97 // Same technique is used everywhere in this class where mSocket member
  /frameworks/base/docs/html/guide/components/
bound-services.jd 118 section discusses each technique.</p>
136 <p>This is the preferred technique when your service is merely a background worker for your own
157 IPC. The previous technique, using a {@link android.os.Messenger}, is actually based on AIDL as
209 and client must also be in the same process, because this technique does not perform any
349 {@link android.os.Messenger} to provide the interface for your service. This technique allows

Completed in 1928 milliseconds

1 2 3 4 56 7 8 91011>>