search for: shelli

Displaying 20 results from an estimated 20 matches for "shelli".

Did you mean: shell
2010 Dec 30
1
Different results in glm() probit model using vector vs. two-column matrix response
Hi - I am fitting a probit model using glm(), and the deviance and residual degrees of freedom are different depending on whether I use a binary response vector of length 80 or a two-column matrix response (10 rows) with the number of success and failures in each column. I would think that these would be just two different ways of specifying the same model, but this does not appear to be the case.
2006 Apr 18
1
predict.nls confidence intervals
Hello- It has been several years since anyone has asked, so i am asking again- has anyone created a routine to estimate confidence intervals for predictions from nls models (ala Bates and Watts 1988)? Thanks - Alice Shelly [[alternative HTML version deleted]]
2009 Mar 22
1
Emailing
Hi, I am trying to send emails out using ActionMailer. Currently, the console shows that everything is sending out correctly, but I am not actually receiving any emails. Thanks in advance, Shelly --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "Ruby on Rails: Talk" group. To post to this group, send email
2013 Aug 28
1
volume on btrfs brick and copy-on-write
Hello Is it possible to take advantage of copy-on-write implemented in btrfs if all bricks are stored on it? If not is there any other mechanism (in glusterfs) which supports CoW? regards -- Maciej Ga?kiewicz Shelly Cloud Sp. z o. o., Sysadmin http://shellycloud.com/, macias at shellycloud.com KRS: 0000440358 REGON: 101504426 -------------- next part -------------- An HTML attachment was
2007 Jun 01
1
AIC consistency with S-PLUS
Hello- I understand that log-likelihoods are bound to differ by constants, but if i estimate AIC for a set of simple nested linear models using the following 4 methods, shouldn't at least two of them produce the same ordering of models? in R: extractAIC AIC in S-PLUS: AIC n*log(deviance(mymodel)/n) + 2*p I find it troubling that these methods all give me different answers as to the best
2013 Apr 10
2
Optimization problem
As a simple example, I want to find minimum value for x^2, but it can't be obtained by: f<-function(x)x^2 optimize(f,lower=-1,upper=1) What are other methods to deal with this? I tried DEoptim, still doesn't work. Any suggustions will be extremely helpful! THanks! Shelly -- View this message in context: http://r.789695.n4.nabble.com/Optimization-problem-tp4663821.html Sent from
2013 Oct 16
2
Re: libvirtError: Unable to add bridge br0 port vnet0: Operation not supported
On 16 October 2013 13:55, Daniel P. Berrange <berrange@redhat.com> wrote: > > Sounds like a host mis-configuration related to kernel bridge support > to me. > Could you tell me what might be mis-configured? I am using kernel 3.10.11, modules openvswitch, bridge, stp and llc are loaded. regards -- Maciej GaƂkiewicz Shelly Cloud Sp. z o. o., Sysadmin http://shellycloud.com/,
2013 Oct 16
2
libvirtError: Unable to add bridge br0 port vnet0: Operation not supported
Hi I am using Libvirt 1.1.2 with Openstack Havana (RC2, nova-network) and openvswitch 1.4.2+git20120612-9.1. Libvirt vif driver ( nova.virt.libvirt.vif.LibvirtGenericVIFDriver) generates config likes this: <interface type='bridge'> <mac address='fa:16:3e:44:30:a4'/> <source bridge='br0'/> <model type='virtio'/>
2013 Jul 02
2
Re: nova-compute, libvirt and authentication
On 2 July 2013 09:58, Martin Kletzander <mkletzan@redhat.com> wrote: > I'd say this is a problem with sasl, nothing else. "No mechanism found" > may mean that libraries for configured mechanism aren't found or unknown > mechanism is being requested. I doubt that access to those libraries > would be a permisison problem, but you might be missing some >
2013 Jul 01
3
nova-compute, libvirt and authentication
Hello I have a question about live migration when libvirt requires sasl authentication. I have managed to configure remote access for user nova with sasl enabled (credentials stored in auth.conf - https://review.openstack.org/#/c/12706/). It looks like live migration do not use these credentials at all. What is more it thinks that sasl is not not configured: 2013-07-01 09:49:09.317+0000: 17997:
2008 Nov 26
2
zfs znode changes getting lost
In place of padding in zfs znode i added a new field. stored an integer value and am able to see saved information. but after reboot it is not there. If i was able to access before reboot so it must be in memory. I think i need to save it to disk. how does one force zfs znode to disk. right now i dont do anything special for it. Just made an ioctl, accessed znode and made changes. example in
2009 Jun 03
1
R on Windows Server
We are starting the process for purchasing a server with Windows Server 2008 OS. We are mainly interested in storage for multiple users, but would like to have the capability to run R simulations on the server. Are there any issues we should be aware of for installing R on the server or with having multiple users run R simultaneously? Thanks much! <http://www.uams.edu/biostat>
2011 Dec 13
1
Should I use nls for this?
Hi, I have a dataset with the following properties: Y_i ~ N(mu_i, theta * (mu_i)^2) ln(mu_i) = B'Xi theta and beta's are the parameters here. I want to come up with a model to fit the data with the above property and test that model on the built in R dataset quine. Does nls() make sense in this case? Or is there any existing R package which can fit this model? -Shelly -- View
2001 Jul 29
0
ADV: Other silly shiny postmasters will exclude monthly beneath hackers.
Eddie will confront the surreptitious Blowfish and relay it over its doorway. Will you examine on the room, if Tim hatefully binds the input? If the moronic llamas can delete admiringly, the odd client may build more data buss. Where doesn't Rose kick daily? Try starting the field's insecure admin and Gay will facilitate you! The analyst furiously learns the dense cafe. Many
2012 Oct 31
0
combined dependent pvalue
Dear All, I am trying to combine dependent p-values in R. May you please help me with this? For independent pvalue combination, one of the popular way is fisher's method which I found the R code here (http://r.789695.n4.nabble.com/fisher-s-posthock-test-or-fisher-s-combination-test-td2195964.html#a2305025): fisher.comb <- function (pvalues) { df=length(pvalues)
2013 Jun 30
0
Same credentials stored in auth.conf for many servers
Hello According to client authentication in documentation ( http://libvirt.org/auth.html) it is possible to store credentials in auth.conf file and make appropriate mappings to servers: [auth-$SERVICE-$HOSTNAME] credentials=$CREDENTIALS Is it possible to use the same credentials for many servers without explicitly describing it? For example replacing: [auth-libvirt-myhost1] credentials=mycred
2013 Jul 02
1
Re: nova-compute, libvirt and authentication
On 2 July 2013 10:36, Martin Kletzander <mkletzan@redhat.com> wrote: > I couldn't know you were able to do that. Since I presume you are using > the same server and client to check that, I must fallback to default > questions like "SELinux?". Or some OpenStack config which I > (unfortunately) know almost nothing about. Last thing that occurs on my > mind is
2008 Mar 13
7
How to Install WINE on Slackware 12
Hello, I read the README and the man pages and the User Guide. They only say to run ./tools/wineinstall but it can't be found anywhere on my system! I downloaded the package and used tar to extract it to my home directory (/root). I do not find "./tools" anywhere. Nothing in the documentation mentions the directory from which to install at all.
2006 May 01
8
Windows vs Linux
Warning: Sligthly off topic. http://shelleytherepublican.com/2006/04/linux-european-threat-to-our-computers.html Quotes: > And guess what software Osama Bin Laden uses on his laptop? > > If you guessed it was Linux you would be 100% right. > Next time somebody asks you how Al Queda agents pay for their > rifles and rocket launchers, you can tell them that foreign hackers >
1997 Sep 28
0
[IPD] Internet Probe Droid
[Mod: while not directly related to linux security, this post of course is approved because it provides a good summary and clear description. Please limit the discussion on this topic to new stuff. In general posts like this will be approved -- alex] Automating brute force attacks with ''Expect" balif and desslok - Abstract - phf,