Displaying 20 results from an estimated 223 matches for "credible".
2009 Aug 16
2
Question regarding finding credible interval using r2winbugs
Dear
I am trying to find a 90% credible interval. I am using the following
code.
fit<-bugs(
model.file=BUGScode,
data=data,
inits = list(geninits1,geninits2),
parameters.to.save=keepers,
n.chains=nchains,
n.iter=runs,
n.burnin=burn,
n.thin=nthin,
DIC= TRUE,
bugs.directory="C:/Program Files/WINBUGS...
2011 Jun 16
2
Bayesian Credible Intervals for a Proportion
I am trying to calculate Bayesian Credible Intervals for a proportion
(disease prevalence values to be more specific) and am having trouble using
R to do this. I am working with ncredint() function but have not had success
with it. Please help!
Example:
Positive samples = 3
Total sampled = 10
Prevalence = 0.3
pvec <- seq(1,10,by=1)
np...
2012 Apr 06
2
Bayesian 95% Credible interval
Hi all,
I have the data from the posterior distribution for some parameter. I want
to find the 95% credible interval. I think "t.test(data)" is only for the
confidence interval. I did not fine function for the Bayesian credible
interval. Could some one suggest me?
Thanks
[[alternative HTML version deleted]]
2011 Jun 19
1
Multivariate HPD credible volume -- is it computable in R?
Hi all,
I'm new to the list and am hoping to get some advice. I have a set of
multivariate data and would like to find the densest part of the data cloud
containing 95% of the data, like a 95% HPD credible volume. Is there any R
code available to compute that?
Thank you very much! Your help and patience are much appreciated.
G.S.
[[alternative HTML version deleted]]
2009 Aug 17
2
Polygon function
Dear all,
I would like to plot credible interval for a function estimate in R. I
would like to plot the credible intervals as shaded region using polygon
function. Does anyone ever used that? I tried several times but I could
not obtain the right figure.
xis=sort(xi,decreasing=TRUE)
plot(xi,fm)
polygon(c(xi,xis),c(f05m,f95m))
The abov...
2017 Jun 30
4
[Fwd: CIA Outlaw Country attack against CentOS / Rhel (and Fedora?) Is this credible?]
...his?
Dario
------- Messaggio inoltrato -------
Da: stan <stanl-fedorauser at vfemail.net>
Reply-to: Community support for Fedora users
<users at lists.fedoraproject.org>
A: users at lists.fedoraproject.org
Oggetto: CIA Outlaw Country attack against CentOS / Rhel (and Fedora?)
Is this credible?
Data: Thu, 29 Jun 2017 15:51:43 -0700
Wikileaks released a document about an attack against CentOS / Rhel.
https://wikileaks.org/vault7/#OutlawCountry
Here's the text, there are some docs there also.
OutlawCountry
29 June, 2017
Today, June 29th 2017, WikiLeaks publishes documents from the...
2017 Jun 30
0
[Fwd: CIA Outlaw Country attack against CentOS / Rhel (and Fedora?) Is this credible?]
> Do you know this?
"For operational use, shell access is assumed, and root privileges are
required."
It's not much of a secret that you can mess with a system if you have
root access...
Yves Bellefeuille
<yan at storm.ca>
2007 Nov 16
0
New version of actuar
UseRs,
Version 0.9-4 of actuar should be making its way to CRAN mirrors. The
main highlights of this new version are speed enhancements for a few
functions, support for phase-type distributions and functions for ruin
theory.
The relevant section of the NEWS file follows
Version 0.9-4
=============
Maintenance and new features release.
NEW FEATURES -- LOSS DISTRIBUTIONS
o Functions
2007 Nov 16
0
New version of actuar
UseRs,
Version 0.9-4 of actuar should be making its way to CRAN mirrors. The
main highlights of this new version are speed enhancements for a few
functions, support for phase-type distributions and functions for ruin
theory.
The relevant section of the NEWS file follows
Version 0.9-4
=============
Maintenance and new features release.
NEW FEATURES -- LOSS DISTRIBUTIONS
o Functions
2002 Jun 24
10
code optimization
...ptimize the code? Thank you very much.
Peter B.
Function:
eval.delta <- function(delta){
cat("VALUES\n")
vlr <- NULL
k <- 0
for(j in 1:length(delta)) if(delta[j] <= 2){
k <- k+1
vlr[k] <- delta[j]
}
cat("<= 2 (no credible evidence)\t",k,"\t",vlr,"\n")
vlr <- NULL
k <- 0
for(j in 1:length(delta)) if(delta[j]>2 & delta[j] <= 4){
k <- k+1
vlr[k] <- delta[j]
}
cat("> 2 y <= 4 (weak evidence)\t",k,"\t",vlr,...
2007 Apr 23
0
New version of actuar
UseRs,
actuar is a package for Actuarial Science. A rather preliminary
version (0.1-3) of the package has been available on CRAN since February 2006.
We now announce the immediate availability of version 0.9-2 sporting a large
number of new features.
Non actuaries behold! There can be some features of interest for you,
especially those related to new probability distribution and to the
2007 Apr 23
0
New version of actuar
UseRs,
actuar is a package for Actuarial Science. A rather preliminary
version (0.1-3) of the package has been available on CRAN since February 2006.
We now announce the immediate availability of version 0.9-2 sporting a large
number of new features.
Non actuaries behold! There can be some features of interest for you,
especially those related to new probability distribution and to the
2010 Aug 03
1
Metafor
This is a question of clarification.
IN 2009 Higgins, Thompson and Spiegelhalter (J R Statist Soc A 172:137-159) gave WinBUGs code to get credible intervals from random effects meta analysis for the prediction interval of a new study.
It appears that the predict.rma function creates approximate credible intervals (pending a function revision by the author) for that purpose.
Is my assumption correct?
Nathan
--
Nathan Pace, MD, MStat
Departm...
2002 Apr 29
0
code optimization
...ptimize the code? Thank you very much.
Peter B.
Function:
eval.delta <- function(delta){
cat("VALUES\n")
vlr <- NULL
k <- 0
for(j in 1:length(delta)) if(delta[j] <= 2){
k <- k+1
vlr[k] <- delta[j]
}
cat("<= 2 (no credible evidence)\t",k,"\t",vlr,"\n")
vlr <- NULL
k <- 0
for(j in 1:length(delta)) if(delta[j]>2 & delta[j] <= 4){
k <- k+1
vlr[k] <- delta[j]
}
cat("> 2 y <= 4 (weak evidence)\t",k,"\t",vlr,...
2004 Jan 03
2
STOP THIS THREAD New to asterisk? RUN... don't walk.
Hi All,
Can we stop this thread pl. This lady has no
intentions to learn asterisk.
She is just a troll and wasting our time. With her
corporate attitude, what
she expects is support that available with paid
commercial products. Her
company has enough money to buy commercial products,
let she go there. Hey
lady, whoever u are, dont waste our time. this is not
for u.
Lets move on to something
2008 Sep 15
0
New version of actuar
=== actuar: An R Package for Actuarial Science ===
We are pleased to announce the immediate availability of version 1.0-0
of actuar. This release follows publication of our papers in JSS (*)
and R News (**). From the NEWS file:
Version 1.0-0
=============
NEW FEATURES
o Improved support for regression credibility models. There is now
an option to make the computations with the
2008 Sep 15
0
New version of actuar
=== actuar: An R Package for Actuarial Science ===
We are pleased to announce the immediate availability of version 1.0-0
of actuar. This release follows publication of our papers in JSS (*)
and R News (**). From the NEWS file:
Version 1.0-0
=============
NEW FEATURES
o Improved support for regression credibility models. There is now
an option to make the computations with the
2011 Mar 20
2
Question about "extracting" unwanted e-mails from mdbox
Imagine the following scenario
Last Saturday, 3:00 AM a big phishing attack hits our e-mail inboxes. Spamassassin does not mark them as spam, and our 50.000+ users have in their mdbox a very credible phishing attack. What doveadm-fu could I use to delete (or move to spam) that e-mail from each user INBOX (let?s imagine the Subject or a Header is known)?
I repeat: already delivered e-mail, how to filter/prune it.
Regards
Maria
2019 Nov 14
4
how to know when a system is compromised
...IPS logs, I have logwatch setup and mailing daily
summaries to me and I dive deeper into logs if something looks suspicious.
What am I missing or not looking at that you security gurus are looking at?
I subscribe to the centos and SANS newsletters, and I try to keep
current on all technology with credible sources of articles online and
with the Lynda library.
What other sources of information do you use to stay current about the
latest threats and technology updates?
I appreciate the feedback.
Chris
2009 Mar 16
0
the effect of blocking on the size of confidence intervals - analysis using lme and lmer
...s its possible to use lme without a random term, or alternatively
with a trivial random term?
- Is the overall approach: use of blocking factors to reduce the
residual varaince, and hence to decrease the width of the confidence
intervals valid?
Using lmer, alternatively to the calculation of CIs, credible intervals
can be calculated:
> m1.sample = mcmcsamp( m1.lmer, n =10000 )
> m1.ci = apply( m1.sample, 2, function(x)quantile(x, prob=c(.025,0.975)))
> m1.ci[,"methodFTREES"]
2.5% 97.5%
0.2405115 0.4424920
...
> m2.ci[,"methodFTREES"]
2.5% 97.5%
0.2...