Home
last modified time | relevance | path

Searched full:approach (Results 1 – 25 of 627) sorted by relevance

12345678910>>...26

/freebsd/share/doc/papers/diskperf/
H A Dmethodology.ms35 These might be termed the \fIindirect\fR and the \fIdirect\fR approach.
36 The approach used by DEC in producing most of the performance data
38 approach.
39 We chose to use the direct approach.
41 The indirect approach used by DEC involves two steps.
55 The problems encountered with this indirect approach often
81 The advantage of this approach is the implicit accuracy in
89 A more significant disadvantage to the direct approach
/freebsd/contrib/ntp/
H A DREADME.leapsmear61 but of course the smearing server approach also works.
64 The Leap Smear Approach
79 With this approach the time an NTP server sends to its clients still matches
92 Pros and Cons of the Smearing Approach
94 The disadvantages of this approach are:
107 better approach may be to slew the time in a well defined way, over a
155 Google's leap smear approach is a very efficient solution for this, for
165 the -x approach. The current leap second code in ntpd determines the point
/freebsd/lib/libsys/
H A Dffclock.251 approach radically different from the feedback alternative implemented by the
53 The feed-forward approach has demonstrated better performance and higher
54 robustness than a feedback approach when synchronising over the network.
82 The feed-forward approach does not require that the clock estimates be retrieved
/freebsd/contrib/googletest/googletest/
H A DREADME.md66 And a more robust and flexible approach is to build GoogleTest as part of that
76 location. This is the least flexible approach and can make it more difficult
79 source tree. This is often the simplest approach, but is also the hardest to
85 approach doesn't have the limitations of the other methods.
109 Note that this approach requires CMake 3.14 or later due to its use of the
/freebsd/contrib/llvm-project/llvm/include/llvm/CodeGen/GlobalISel/
H A DCSEMIRBuilder.h37 // TODO: Another approach for checking dominance is having two iterators and
39 // approach is better? Should this even change dynamically? For G_CONSTANTS
40 // most of which will be at the top of the BB, the top down approach would be
/freebsd/contrib/libarchive/libarchive/test/
H A Dtest_write_disk_hardlink.c63 * First, use a tar-like approach; a regular file, then in DEFINE_TEST()
93 * Repeat tar approach test, but use unset to mark the in DEFINE_TEST()
123 * Second, try an old-cpio-like approach; a regular file, then in DEFINE_TEST()
152 * Third, try a new-cpio-like approach, where the initial in DEFINE_TEST()
/freebsd/contrib/llvm-project/libcxx/include/__pstl/internal/omp/
H A Dparallel_for_each.h
/freebsd/crypto/openssl/doc/man7/
H A Dfips_module.pod14 with the FIPS module. Which is the correct approach to use will depend on your
50 One simple approach is to cause all applications that are using OpenSSL to only
53 This approach can be done purely via configuration. As long as applications are
110 This approach has the primary advantage that it is simple, and no code changes
112 some disadvantages to this approach:
148 A variation on the above approach is to do the same thing on an individual
/freebsd/sys/dev/chromebook_platform/
H A Dchromebook_platform.c62 * A stopgap approach to preserve the status quo. in chromebook_i2c_identify()
63 * A more intelligent approach is required to correctly in chromebook_i2c_identify()
/freebsd/secure/lib/libcrypto/man/man7/
H A Dfips_module.7147 with the \s-1FIPS\s0 module. Which is the correct approach to use will depend on your
172 One simple approach is to cause all applications that are using OpenSSL to only
175 This approach can be done purely via configuration. As long as applications are
238 This approach has the primary advantage that it is simple, and no code changes
240 some disadvantages to this approach:
263 A variation on the above approach is to do the same thing on an individual
/freebsd/lib/msun/man/
H A Dexp.3164 approach anything or nothing as x and y approach 0
/freebsd/share/man/man4/
H A Dtcp_rack.454 threshold approach, RACK-TLP detects losses more efficiently
59 DupAck threshold approach.
H A Dfdt.451 platform and architecture independent approach for resolving such problems.
83 embedded applications (eliminates hard-coded configuration approach, enforces
/freebsd/sys/contrib/zstd/zlibWrapper/examples/
H A Dfitblk_original.c11 Add detailed description of approach
14 /* Approach to just fitting a requested compressed size:
43 two pass approach similar to the above. That shortfall is due to
H A Dfitblk.c15 Add detailed description of approach
18 /* Approach to just fitting a requested compressed size:
47 two pass approach similar to the above. That shortfall is due to
/freebsd/lib/libc/include/
H A Dreentrant.h49 * One approach for thread safety is to provide discrete versions of the
54 * Another approach is to provide a single thread safe library. However,
/freebsd/sys/contrib/device-tree/Bindings/
H A Dxilinx.txt17 The new approach is to export the parameters into the device tree and
89 That covers the general approach to binding xilinx IP cores into the
/freebsd/sbin/mount_nullfs/
H A Dmount_nullfs.8240 The first approach is to call the aliasing layer's bypass routine.
249 A second approach is to directly invoke vnode operations on
/freebsd/crypto/heimdal/lib/wind/
H A Drfc4518.txt97 document are based upon the "stringprep" approach [RFC3454]. In
102 The approach used here is a refinement of the "stringprep" [RFC3454]
103 approach. Each algorithm involves two additional preparation steps.
422 The approach used in this document is based upon design principles
643 In designing an appropriate approach for space handling for
/freebsd/contrib/arm-optimized-routines/pl/math/
H A Dtanf_3u3.c37 /* Reduction of the input argument x using Cody-Waite approach, such that x = r
164 This 2-interval approach requires 2 different sets of coefficients P and in tanf()
/freebsd/lib/libc/gen/
H A Dbasename.342 The advantage of the former approach is that it ensures thread-safety,
H A Ddirname.345 The advantage of the former approach is that it ensures thread-safety,
/freebsd/sys/net80211/
H A Dieee80211_amrr.h25 * "IEEE 802.11 Rate Adaptation: A Practical Approach"
/freebsd/crypto/openssl/include/crypto/
H A Dchacha.h21 * order. Same approach applies to nonce: the |counter| argument is
/freebsd/sys/crypto/openssl/
H A Dossl_chacha.h20 * order. Same approach applies to nonce: the |counter| argument is

12345678910>>...26