Searched
full:technique (Results
376 -
400 of
811) sorted by null
<<11121314151617181920>>
/external/boringssl/src/crypto/fipsmodule/ecdsa/ |
ecdsa.c | 439 // same technique as the previous multiplication works.
|
/external/boringssl/src/third_party/android-cmake/ |
README.md | 139 * **ANDROID_RELRO** = `ON` - Enables RELRO - a memory corruption mitigation technique (`-Wl,-z,relro -Wl,-z,now`);
|
/external/eigen/Eigen/src/IterativeLinearSolvers/ |
IncompleteCholesky.h | 41 * the info() method, then you can either increase the initial shift, or better use another preconditioning technique.
|
/external/google-breakpad/src/common/mac/ |
GTMDefines.h | 175 // We got this technique from here:
|
/external/guava/guava/src/com/google/common/collect/ |
MultimapBuilder.java | 74 * parameters to be left implicit more often. CacheBuilder uses the same technique.
|
/external/guava/guava-gwt/src-super/com/google/common/math/super/com/google/common/math/ |
IntMath.java | 271 // We bend over backwards to avoid branching, adapting a technique from
|
/external/javassist/tutorial/ |
tutorial3.html | 248 <p>The generics of Java is implemented by the erasure technique.
|
/external/libjpeg-turbo/ |
README | 171 "uncompressed GIFs". This technique does not use the LZW algorithm; the
|
README.ijg | 171 to produce "uncompressed GIFs". This technique does not use the LZW
|
/external/libusb/ |
INSTALL | 193 Unfortunately, this technique does not work for `CONFIG_SHELL' due to
|
/external/libusb-compat/ |
INSTALL | 193 Unfortunately, this technique does not work for `CONFIG_SHELL' due to
|
/external/libvpx/libvpx/examples/ |
vp9cx_set_ref.c | 16 // current frame. This technique could be used to bounce between two cameras.
|
/external/libyuv/files/docs/ |
filtering.md | 179 Extruding is practical when the image is already copied to a temporary buffer. It could be done to the original image, as long as the original memory is restored, but valgrind and/or memory protection would disallow this, so it requires a memcpy to a temporary buffer, which may hurt performance. The memcpy has a performance advantage, from a cache point of view, that can actually make this technique faster, depending on hardware characteristics.
|
/external/oj-libjdwp/src/share/back/ |
transport.c | 164 * search technique to happen.
|
/external/pdfium/third_party/bigint/ |
BigUnsigned.hh | 322 /* The following technique is slightly faster than copying *this first
|
/external/protobuf/java/core/src/main/java/com/google/protobuf/ |
ExtensionRegistry.java | 77 * is a popular technique, but is bad design; among other things, it creates a
|
/external/python/cpython2/Doc/library/ |
asyncore.rst | 21 popular way to do it, but there is another very different technique, that lets
|
/external/python/cpython2/Tools/scripts/ |
fixdiv.py | 18 script may also trigger warnings. In fact a useful technique is to
|
/external/python/cpython3/Tools/scripts/ |
fixdiv.py | 18 script may also trigger warnings. In fact a useful technique is to
|
/external/strace/ |
INSTALL | 243 Unfortunately, this technique does not work for 'CONFIG_SHELL' due to an
|
/external/syslinux/gpxe/src/drivers/net/ |
amd8111e.h | 45 Registers CMD0, CMD2, CMD3,CMD7 and INTEN0 uses a write access technique called command style access. It allows the write to selected bits of this register without altering the bits that are not selected. Command style registers are divided into 4 bytes that can be written independently. Higher order bit of each byte is the value bit that specifies the value that will be written into the selected bits of register.
|
/frameworks/layoutlib/bridge/tests/src/com/android/layoutlib/bridge/intensive/util/ |
ImageUtils.java | 232 // technique of repeatedly scaling the image into half; this will cause
|
/hardware/intel/common/libmix/mix_common/ |
INSTALL | 232 Unfortunately, this technique does not work for `CONFIG_SHELL' due to
|
/libcore/ojluni/src/main/java/java/util/ |
SortedMap.java | 89 * A similar technique can be used to generate an <em>open range</em>
|
SortedSet.java | 85 * A similar technique can be used to generate an <i>open range</i> (which
|
Completed in 1687 milliseconds
<<11121314151617181920>>