search for: characterise

Displaying 20 results from an estimated 48 matches for "characterise".

2008 Dec 12
1
mixed model nested ANOVA
Hi, I'm working on leaf characteristics of trees. Each tree is characterised by about 10 leaf traits. The trees were sampled at 9 different locations (about 20 to 30 trees/location, NOT balanced), grouped in 3 different climatic zones (Sahelian, Soudanian and Guinean) (NOT balanced). Further, each tree is characterised by some degree of human pressure (mutilation degree),...
2015 Jul 01
4
[LLVMdev] C as used/implemented in practice: analysis of responses
On 1 July 2015 at 11:34, Russell Wallace <russell.wallace at gmail.com> wrote: > Why do you say spin? You're dismissing all use-cases other than this very narrow one I'd (with my own spin) characterise as "Do What I Mean, I Can't Be Bothered To Get My Code Right". Fair enough, you're arguing in favour of a point; but it's not one I agree with. Tim.
2014 May 15
2
[LLVMdev] 3.4 branch gcc 4.9 build error
...econdary symptom of the wider problem reported by >> distributions. >> > So does this mean there is an additional fix that is required for the 3.4 branch? Nope, the two proposed patches should resolve the underlying issue just fine as well as the self-host problem. Just writing to characterise the problem, which is slightly different to the OP's description. Alp. -- http://www.nuanti.com the browser experts
1997 Nov 02
0
R-beta: A vector of lists == Data Frame?
I hope a very basic R/S programming question is appropriate for this list... I have a function which returns a list of several (named) numeric values characterising an event history for a person. I want to invoke the function many (1000) times and create a vector of these lists to represent the histories of a population. At first, I thought that a data frame would be the appropriate way to
2010 Mar 02
3
[LLVMdev] Embedding LLVM
Is there a guide anywhere to embedding LLVM into a program to compile and run a DSEL? Thanks, Sean
2003 Nov 24
2
1.8.1 and subsetting dataframes
...using earlier versions of R (Linux). A dataframe is created and new columns added to it by doing calculations using apply with various functions on some of the original columns. It's somewhat too involved to give a toy example that's reproducible. However, the resulting phenemonon can be characterised by the following: Browse[1]> dim(mod.df) [1] 409 5 Browse[1]> object.size(mod.df) [1] 31520 Browse[1]> is.array(mod.df) [1] FALSE Browse[1]> mod.df[1:5,] Error in as.data.frame.default(x[[i]], optional = TRUE) : can't coerce array into a data.frame The whole dataframe would d...
2010 May 14
1
nonlinearity and interaction
...ion: Suppose that the system is nonlinear such that the response to the sequence 0,2 is not the same as the response to 2, 0 -- it is not just a change of the response by the same amount. Or nonlinear in other weird ways (I don't just mean simple things like y~x^2). I am thinking that a way to characterise this might be to pretend that x is not a continuous variable and to represent it with 5 indicator variables. And then interactions between them would tell me about nonlinear effects? e.g. lm(y~ d1 + d2 + d3 + d4 + d5 + d1*d2) etc Does this make any sense? If so, please suggest a good way to go abou...
2006 Oct 09
1
regarding bootstrapping
Hi All, Thanks for all your discussions which I read offline and enhance my knowledge. I just want to know how to make yield curve by bootstrapping using R. Please give me some subject-matter links and code links. Especially the Spot Yield Curve and YTM Curve. Sayonara With Smile & With Warm Regards :-) G a u r a v Y a d a v Senior Executive Officer, Economic Research &
2009 Jul 14
11
Lenny DomU Crash!
Hi all, i have a CentoOS based Xen Dom0 running gitco xen3.3.1. I''m experiencing problems with debian Lenny FV domU. After some days of perfect working the VM start to consume all cpu and than i can only connect via ssh to VM and nothing work, neither the "top" command! Any idea? Thanks a lot and regards, Francesco
2001 Jul 30
1
ext3-2.4-0.9.5
...eb site. The intent here is that the external journal be an NVRAM device (or a disk) which can be used to accelerate full-data journalling. Simulation using a normal RAM drive indicates that we can double throughput with some loads (dbench) but not others (synctest). More work is needed to fully characterise this. For the synchronous operations I've put together an application which attempts to simulate an MTA's behaviour. The simulator is called `synctest' and it is in ext3 CVS. There's a copy at http://www.uow.edu.au/~andrewm/synctest.c - I'd really appreciate it if the MTA gu...
2015 Jul 02
5
[LLVMdev] C as used/implemented in practice: analysis of responses
...;mailto:t.p.northover at gmail.com>> wrote: On 1 July 2015 at 11:34, Russell Wallace <russell.wallace at gmail.com<mailto:russell.wallace at gmail.com>> wrote: > Why do you say spin? You're dismissing all use-cases other than this very narrow one I'd (with my own spin) characterise as "Do What I Mean, I Can't Be Bothered To Get My Code Right". Fair enough, you're arguing in favour of a point; but it's not one I agree with. Tim. --------------------------------------------------------------------- Intel Israel (74) Limited This e-mail and any attachmen...
2017 Nov 14
0
IMAP connections with ".eml" in the username - bot attack.
...t? Mitigate what? Even by your account, this won't get them anywhere, unless it's so fast and heavy, it's DoS'ing your system. Other than that, they're just bloating your logs, nothing more. If you want to pre-empt this via firewall, you'll need to get extremely lucky to characterise these IPs (a sample of 2 is not enough) in such a way as to able to formulate a firewall rule. Mostly likely, this is a rented botnet. If you somehow figure out an oracular rule to discern bot from some user road-warrior *before* they connect, give me a call. Sean Greenslade <sean at seangree...
2009 Oct 08
0
Suggestions for low level RTP stream generator?
Hi, I need to build a simple, command-line method to generate a legal and "perfect" RTP stream across a network link, and analyse it on the other side and measure network performance. Want to do this for a number of links and over long periods. I'm trying to characterise performance of various available Internet links locally as input into a design project. Asterisk isn't ideal for me because I just want a one-way stream and in the case of things like Echo, Milliwatt, MusicOnHold etc the generated RTP stream is "synchronised" to the incoming RTP and...
2010 May 10
1
Number and colon precedes some package names in yum.log
What is the meaning of the "4:", "2:", "30:" and "1:" prefixes for the following entries in yum.log? Most entries in yum.log don't have them. grep "Installed: [0-9]*:" /var/log/yum.log May 07 16:45:53 Installed: 4:perl-5.8.8-27.el5.i386 May 07 16:58:21 Installed: 2:xinetd-2.3.14-10.el5.i386 May 07 17:03:43 Installed:
2005 Jun 30
3
Delay
Hello. I'm programing a tool for ip telephony in hifi quality (diploma) ... I want to know what coding delay ogg produces. Are there low delay variantes? Can anyone help me? Thanks
2013 Jan 04
0
ncRNAs and chromatin
Jenner lab, University College London Our laboratory uses genomics and biochemical techniques to identify how transcription factors, chromatin modifiers and non-coding RNAs act to regulate cell differentiation. Our research has led to the characterisation of a class of short RNAs transcribed from polycomb target genes that interact with polycomb repressive complex-2 (Kanhere et al., Mol Cell
2010 May 07
0
Cluster procedure using geographical neighborhood
...owledge in DS> Statistics, but not in numerical computation. DS> I found your email at the Cran website. DS> At now I am working on segmentation of a GIS database. My problem is DS> that I have a set of points over a region and I need to define sub DS> region characterised by small inside variability. DS> The application seems to apply a hierarchical cluster analysis, but the DS> agglomeration procedure should consider only pairs of clusters or of DS> points that are neighbours. DS> This can be performed deleting the dissimilarities in...
2005 Jan 04
0
Re: trusted computing
...rmation > # about the software stack running on a Linux system. This information can > # be used by remote parties to determine the integrity of the execution > # environment. > > Can it, though? The assumption seems to be that fingerprinting executables > is sufficient to characterise the security configuration of a system. > AFAICS that"s patently false: the security of a system is dependent on its > complete configuration, including many non-executable files. IOW, anyone > can compromise a system without changing any executable files. > > # We instru...
2008 Jan 11
0
Behaviour of standard error estimates in lmRob and the like
I am looking at MM-estimates for some interlab comparison work. The usual situation in this particular context is a modest number of results from very expensive methods with abnormally well-characterised performance, so for once we have good "variance" estimates (which can differ substantially for good reason) from most labs. But there remains room for human error or unexpected chemistry which still causes some outliers. MM-estimates from robust regression with variance weights is a sugg...
2015 Jun 28
2
[LLVMdev] C as used/implemented in practice: analysis of responses
...ompilers assume about it, to detect errors without too many false positives. We had quite a few survey responses saying something like "sanitisers have to allow XYZ, despite the ISO standard, because code really does it"; in a sense, what we're doing is trying to clearly and precisely characterise all those cases. If you or others can help with that, please do! But such tools are, useful and impressive though they are, aren't really testing code against all the behaviour ISO permits - as I understand it, they are essentially checking properties of single (instrumented) executions, whi...