Displaying 9 results from an estimated 9 matches for "neuman".
Did you mean:
neumann
2007 Jul 19
0
tukey or Neuman-Keuls
hello,
I need to groupe some means and I wonder how to do to get critical range table for tukey or for Neuman-Keuls
I think it's possible to do that with the qtukey() function?
thanks.
_____________________________________________________________________________
[[alternative HTML version deleted]]
2007 Jul 18
1
Neuman-Keuls
hello,
I have programmed this function to calculate the Neuman-Keuls test but I have a problem the function return an empty list and I don't know why.
summary(fm1)
E <- sqrt((summary(fm1)[[1]]["Residuals","Mean Sq"])/length(LR))
lst <- list()
lst1 <- list()
lst2 <- list()
NK <- function (x) {
if (length(x) == 2) {
Tst...
2007 Jul 10
0
TukeyHSD test
Hello,
I think that to apply the Neuman-Keuls test under R it's possible with the TukeyHSD function and I know that to do a Neuman-Keuls test I have to sort the means but I can't use the TukeyHSD function I don't understand how to do to apply this function to my data.
In the R help they use the TukeyHSD function to a aov() do...
2000 Feb 13
1
Windows 2000 and TNG
...indows NT workstation
joining the domain. Now I just need specific instructions to get the 2000
box on joined up. Any help would be greatly appreciated! Thanks in
advance. Please CC any responses to neubyneu@twcny.rr.com so I don't have
to keep checking the archives. Thanks.
--
Michael P. Neuman - UNIX Admin CMSNet.net
neubyneu@twcny.rr.com
--
2009 Apr 01
1
include/exclude tutorial
Maybe I am tired. I have been reading man page, and these messages, and
the website, I just dont understand how include/exclude works.
Is there a decent tutorial on the subject, I missed, for some reason?
all I want is to take /var/tmp/*.conf files. I dont want to recurse down
thru directories (but, for reasons hard to explain, I must have the
recursive option on)
Reminds me when I tried to
2006 Mar 22
0
www::mechanize help
...lib/tasks/mechanize-test.rb:1
Am i doing something wrong? What is the proper way to require external
classes in ruby? Futhermore in a rails project? Anyone worked with
mechanize before? please help.
Here is the test script (which i copied from the example given on the
creator''s, Mike Neuman?, blog)
require ''mechanize''
agent = WWW::Mechanize.new {|a| a.log = Logger.new(STDERR) }
page = agent.get(''http://rubyforge.org/'')
link = page.links.find {|l| l.node.text =~ /Log In/ }
page = agent.click(link)
form = page.forms[1]
form.fields.find {|f| f.name =...
2005 Jun 09
1
handling duplicate names deterministically and adding alternative checksum algorithms
Thanks, rsync developers, for creating such a great tool.
I'm a member of a team of system administrators and integrators that
use rsync with SystemImager and Cfengine to rapidly deploy and
prescriptively maintain systems. Our current practices would benefit
if rsync were enhanced to handle duplicate names deterministically as
described in the todo list. If we were able to use rsync to
1996 Nov 14
0
setgid binaries
...id GAA12548 for <linux-security@redhat.com>; Thu, 28 Nov 1996 06:04:43 -0800 (PST)
Sender: mike@uplex.net
Message-ID: <329D2D7E.24CA51FC@uplex.net>
Date: Thu, 28 Nov 1996 06:13:18 +0000
From: Abraham Bodizapha Ozzda Igy Asok Marfund Garduchey Soco Swanawehak Fenway Buisquali Montecarlo Neuman Smith <mike@uplex.net>
Approved: R.E.Wolff@BitWizard.nl
Organization: UltraPLEX
X-Mailer: Mozilla 3.0 (X11; I; Linux 2.1.0 i586)
MIME-Version: 1.0
To: linux-security@redhat.com
Subject: Re: [linux-security] denial of service attack on login
References: <Pine.GSO.3.95.961128114119.12757S-10...
1997 Apr 22
1
SNI-12: BIND Vulnerabilities and Solutions (fwd)
...nal Information:
~~~~~~~~~~~~~~~~~~~~~~~
[1] Vixie P. , "DNS and BIND security issues".
This was originally published in the proceedings of the
5th USENIX Security Symposium and its included in the BIND
distribution under the doc/misc directory.
[2] Kumar A., Postel J., Neuman C., Danzig P. , Miller S.
"RFC1536: Common DNS implementation errors and suggested fixes"
Refer to problem 2 for a description of other weaknesses previously
found in the recursion scheme.
[3] Lottor, M., "RFC1033: Domain administrators operations guide"
[4] Mocka...