/external/srtp/crypto/include/ |
crypto_types.h | 62 * strongest available authentication function and cipher, 63 * respectively. They are resolved at compile time to the strongest 65 * the keep of a medieval fortification; they provide the strongest 82 * The identifier STRONGHOLD_CIPHER indicates the strongest available 83 * cipher, allowing an application to choose the strongest available 124 * @brief Strongest available cipher. 126 * This identifier resolves to the strongest cipher type available. 147 * The identifier STRONGHOLD_AUTH indicates the strongest available 149 * strongest available algorithm without any advance knowledge about 152 * strongest defense (or the last refuge) [all...] |
/external/opencv3/doc/py_tutorials/py_feature2d/py_shi_tomasi/ |
py_shi_tomasi.markdown | 36 OpenCV has a function, **cv2.goodFeaturesToTrack()**. It finds N strongest corners in the image by 44 Then function takes first strongest corner, throws away all the nearby corners in the range of 45 minimum distance and returns N strongest corners.
|
/hardware/bsp/intel/peripheral/libupm/examples/c++/ |
guvas12d.cxx | 50 // It has a sensing range from between 200-400nm. It's strongest
|
/external/opencv3/modules/core/misc/java/src/java/ |
core+KeyPoint.java | 21 * The response, by which the strongest keypoints have been selected. Can
|
/frameworks/base/docs/html/distribute/users/ |
app-invites.jd | 10 <p>Personal recommendations can be one of the strongest motivators for a user installing your app. With this in mind, App Invites helps you organically find valuable users to download and use your app. With intelligent friend recommendations, smart invite delivery, and the ability to add offers or incentives, new users will get immediate access to your app and can be deep linked to a personalized onboarding flow.</p>
|
/toolchain/binutils/binutils-2.25/config/ |
no-executables.m4 | 63 # Use the strongest available test out of AC_TRY_COMPILE and AC_TRY_LINK.
|
/external/curl/tests/data/ |
test2006 | 57 <hash type="md5">we-only-check-the-strongest-hash-provided</hash>
|
test2007 | 58 <hash type="md5">we-only-check-the-strongest-hash-provided</hash>
|
test2008 | 50 <hash type="md5">we-only-check-the-strongest-hash-provided</hash>
|
test2009 | 51 <hash type="md5">we-only-check-the-strongest-hash-provided</hash>
|
test2010 | 50 <hash type="md5">we-only-check-the-strongest-hash-provided</hash>
|
/external/llvm/include/llvm/Transforms/Utils/ |
GlobalStatus.h | 70 /// Set to the strongest atomic ordering requirement.
|
/external/tlsdate/ |
HARDENING | 7 suggestions and improvements are welcome! We always want the strongest set of
|
/frameworks/base/media/java/android/media/audiofx/ |
BassBoost.java | 120 * where 0 per mille designates the mildest effect and 1000 per mille designates the strongest. 133 * mille designates the mildest effect and 1000 per mille the strongest
|
/external/ceres-solver/data/nist/ |
ENSO.dat | 16 strongest, but cycles with periods of approximately 44
|
/external/icu/icu4c/source/common/ |
locresdata.cpp | 69 /* set the "strongest" error code (success->fallback->default->failure) */
|
/external/opencv/cv/src/ |
cvfeatureselect.cpp | 187 /* select the strongest features */
|
/packages/apps/Email/provider_src/com/android/email/ |
SecurityPolicy.java | 107 * password mode take the max (strongest mode) 111 * password history take the max (strongest mode) 112 * password expiration take the min (strongest mode) 113 * password complex chars take the max (strongest mode) 116 * @return a policy representing the strongest aggregate. If no policy sets are defined, [all...] |
/external/libcxx/www/ |
atomic_design_c.html | 359 there are six memory orderings (listed here from strongest to weakest): 451 Again, the compiler supplies intrinsics only for the strongest orderings where
|
/external/webrtc/webrtc/modules/audio_coding/neteq/ |
merge.cc | 84 // Downsample, correlate, and find strongest correlation period for the 90 // Calculate the lag of the strongest correlation period.
|
time_stretch.cc | 61 // Find the strongest correlation peak.
|
/libcore/ojluni/src/main/java/java/lang/ref/ |
package-info.java | 105 * Going from strongest to weakest, the different levels of reachability reflect
|
/libcore/ojluni/src/main/java/sun/net/www/protocol/http/ |
AuthenticationHeader.java | 228 * The preferred scheme is the strongest of the schemes proposed by the server.
|
/external/aac/libSBRenc/src/ |
invf_est.cpp | 234 includeing the x strongest copmponents. 245 Calculate the mean value for the x strongest components 262 The value for the strongest component
|
/cts/tests/tests/bluetooth/src/android/bluetooth/cts/ |
BluetoothLeScanTest.java | 148 // Find the beacon with strongest signal strength, which is the target device for filter
|