/freebsd/share/doc/papers/diskperf/ |
H A D | methodology.ms | 35 These might be termed the \fIindirect\fR and the \fIdirect\fR approach. 36 The approach used by DEC in producing most of the performance data 38 approach. 39 We chose to use the direct approach. 41 The indirect approach used by DEC involves two steps. 55 The problems encountered with this indirect approach often 81 The advantage of this approach is the implicit accuracy in 89 A more significant disadvantage to the direct approach
|
/freebsd/contrib/ntp/ |
H A D | README.leapsmear | 61 but of course the smearing server approach also works. 64 The Leap Smear Approach 79 With this approach the time an NTP server sends to its clients still matches 92 Pros and Cons of the Smearing Approach 94 The disadvantages of this approach are: 107 better approach may be to slew the time in a well defined way, over a 155 Google's leap smear approach is a very efficient solution for this, for 165 the -x approach. The current leap second code in ntpd determines the point
|
/freebsd/lib/libsys/ |
H A D | ffclock.2 | 51 approach radically different from the feedback alternative implemented by the 53 The feed-forward approach has demonstrated better performance and higher 54 robustness than a feedback approach when synchronising over the network. 82 The feed-forward approach does not require that the clock estimates be retrieved
|
/freebsd/contrib/googletest/googletest/ |
H A D | README.md | 66 And a more robust and flexible approach is to build GoogleTest as part of that 76 location. This is the least flexible approach and can make it more difficult 79 source tree. This is often the simplest approach, but is also the hardest to 85 approach doesn't have the limitations of the other methods. 109 Note that this approach requires CMake 3.14 or later due to its use of the
|
/freebsd/contrib/llvm-project/llvm/include/llvm/CodeGen/GlobalISel/ |
H A D | CSEMIRBuilder.h | 37 // TODO: Another approach for checking dominance is having two iterators and 39 // approach is better? Should this even change dynamically? For G_CONSTANTS 40 // most of which will be at the top of the BB, the top down approach would be
|
/freebsd/contrib/libarchive/libarchive/test/ |
H A D | test_write_disk_hardlink.c | 63 * First, use a tar-like approach; a regular file, then in DEFINE_TEST() 93 * Repeat tar approach test, but use unset to mark the in DEFINE_TEST() 123 * Second, try an old-cpio-like approach; a regular file, then in DEFINE_TEST() 152 * Third, try a new-cpio-like approach, where the initial in DEFINE_TEST()
|
/freebsd/contrib/llvm-project/libcxx/include/__pstl/internal/omp/ |
H A D | parallel_for_each.h |
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | fips_module.pod | 14 with the FIPS module. Which is the correct approach to use will depend on your 50 One simple approach is to cause all applications that are using OpenSSL to only 53 This approach can be done purely via configuration. As long as applications are 110 This approach has the primary advantage that it is simple, and no code changes 112 some disadvantages to this approach: 148 A variation on the above approach is to do the same thing on an individual
|
/freebsd/sys/dev/chromebook_platform/ |
H A D | chromebook_platform.c | 62 * A stopgap approach to preserve the status quo. in chromebook_i2c_identify() 63 * A more intelligent approach is required to correctly in chromebook_i2c_identify()
|
/freebsd/secure/lib/libcrypto/man/man7/ |
H A D | fips_module.7 | 147 with the \s-1FIPS\s0 module. Which is the correct approach to use will depend on your 172 One simple approach is to cause all applications that are using OpenSSL to only 175 This approach can be done purely via configuration. As long as applications are 238 This approach has the primary advantage that it is simple, and no code changes 240 some disadvantages to this approach: 263 A variation on the above approach is to do the same thing on an individual
|
/freebsd/lib/msun/man/ |
H A D | exp.3 | 164 approach anything or nothing as x and y approach 0
|
/freebsd/share/man/man4/ |
H A D | tcp_rack.4 | 54 threshold approach, RACK-TLP detects losses more efficiently 59 DupAck threshold approach.
|
H A D | fdt.4 | 51 platform and architecture independent approach for resolving such problems. 83 embedded applications (eliminates hard-coded configuration approach, enforces
|
/freebsd/sys/contrib/zstd/zlibWrapper/examples/ |
H A D | fitblk_original.c | 11 Add detailed description of approach 14 /* Approach to just fitting a requested compressed size: 43 two pass approach similar to the above. That shortfall is due to
|
H A D | fitblk.c | 15 Add detailed description of approach 18 /* Approach to just fitting a requested compressed size: 47 two pass approach similar to the above. That shortfall is due to
|
/freebsd/lib/libc/include/ |
H A D | reentrant.h | 49 * One approach for thread safety is to provide discrete versions of the 54 * Another approach is to provide a single thread safe library. However,
|
/freebsd/sys/contrib/device-tree/Bindings/ |
H A D | xilinx.txt | 17 The new approach is to export the parameters into the device tree and 89 That covers the general approach to binding xilinx IP cores into the
|
/freebsd/sbin/mount_nullfs/ |
H A D | mount_nullfs.8 | 240 The first approach is to call the aliasing layer's bypass routine. 249 A second approach is to directly invoke vnode operations on
|
/freebsd/crypto/heimdal/lib/wind/ |
H A D | rfc4518.txt | 97 document are based upon the "stringprep" approach [RFC3454]. In 102 The approach used here is a refinement of the "stringprep" [RFC3454] 103 approach. Each algorithm involves two additional preparation steps. 422 The approach used in this document is based upon design principles 643 In designing an appropriate approach for space handling for
|
/freebsd/contrib/arm-optimized-routines/pl/math/ |
H A D | tanf_3u3.c | 37 /* Reduction of the input argument x using Cody-Waite approach, such that x = r 164 This 2-interval approach requires 2 different sets of coefficients P and in tanf()
|
/freebsd/lib/libc/gen/ |
H A D | basename.3 | 42 The advantage of the former approach is that it ensures thread-safety,
|
H A D | dirname.3 | 45 The advantage of the former approach is that it ensures thread-safety,
|
/freebsd/sys/net80211/ |
H A D | ieee80211_amrr.h | 25 * "IEEE 802.11 Rate Adaptation: A Practical Approach"
|
/freebsd/crypto/openssl/include/crypto/ |
H A D | chacha.h | 21 * order. Same approach applies to nonce: the |counter| argument is
|
/freebsd/sys/crypto/openssl/ |
H A D | ossl_chacha.h | 20 * order. Same approach applies to nonce: the |counter| argument is
|