search for: unfeasible

Displaying 20 results from an estimated 69 matches for "unfeasible".

Did you mean: infeasible
2015 May 29
1
Bug#787193: xen-utils-common: xen-init-list crashes with TypeError, renders reboots unfeasible after upgrade from wheezy to jessie
Package: xen-utils-common Version: 4.4.1-9 Severity: important This bug was already reported as #763102 and was brushed off because maintainer says it implicates xend which is not there in 4.4 anymore. However, this problem is present during upgrade from wheezy to jessie and means that reboots are not possible without physical interventions. As noted in #763102, during shutdown, we can see this
2015 Aug 21
0
Bug#787193: xen-utils-common: xen-init-list crashes with TypeError, renders reboots unfeasible after upgrade from wheezy to jessie
> This bug was already reported as #763102 and was brushed off because maintainer > says it implicates xend which is not there in 4.4 anymore. Quoting the explanation sent when closing #763102: If you think a bug has been associated with xend in error please check if it still reproduces with the packages in Jessie (currently 4.4.1-3) and reopen. I'm sorry you felt this was
2019 May 14
4
Handling of the x18 register in Wine on AArch64
...x18, the caller will restore the register on return. The most robust way to intitialize it is right before handing control over to native code. 5) Enclose every callback call in Wine with a wrapper/thunk that sets up the register correctly. This would be a perfect solution, but is practically unfeasible. As far as I know, this is the approach that was used for Win16 back in the day, calling WOWCallback16Ex every time Wine code should call back into Win16 code. Given the size of Wine today and the number of different places where callbacks are made (where the function pointers are called withou...
2011 Nov 10
3
counting columns that match criteria
...n R but I'm finding it extremely useful :) Here's my tiny question: I've got a table with a lot of columns. What I am interested now is to evaluate how many of 4 columns have a value greater than 1. I think it can be done with subset() but it will take a very long condition and become unfeasible if I want to compare more than 4 columns. I put here a small example Col1 Col2 Col3 Col 4 1 1 1 1 <-0 columns greater than 1 2 1 1 1 <-1 column greater than 1 4 1 4 1 <-2 columns greater than...
2012 Oct 22
4
Help with applying a function to all possible 2x2 submatrices
Hi all, I'm working with a large data set (on the order of 300X300) and trying to apply a function which compares the elements of all possible 2x2 submatrices. There are rc(r-1)(c-1) such submatrices, so obviously the naive method of looping through the rows and columns is computationally unfeasible for my data set: for(i in 1:(nrow(data)-1)) { for(j in (i+1):nrow(data)) { for (m in 1:(ncol(data)-1)) { for (n in (m+1):ncol(data)) { I have tried using the outer and apply functions to vectorize the task, but I can't seem to figure out the best method (or any method, for...
2007 Jan 31
2
mca-graphics: all elements overlapping in the help-example for multiple correspondence analysis
Dear all, I tried out the example in the help document for mca (the multiple correspondence analysis of the MASS package): farms.mca <- mca(farms, abbrev=TRUE) farms.mca plot(farms.mca) But the graphic that I get seems unfeasible to me: I cannot recognize the numbers (printed in black) because they are all overlapping and concealing each other. I don ?t dare using my own data, which consist of several hundred cases - I guess I won ?t see anything. How can I solve this? Thank you for any idea! Michael
2011 Mar 11
2
Ifs in formula
...if z > 0 y = f1(x,y), else y = f2(x,t) . In other words, the functional form of f(.) changes according to some criteria z. Natural approach would be to fit two models, i.e. model1 <- nlm(y ~ ..., data=data[data$z > 0,]), model2 <- nlm(y ~ ..., data=data[data$z <= 0,]). But this is unfeasible since both models contain the same variable x and I would like to estimate the coefficient on x using both subsets of the data. My first shot would be to do something like this: formula <- ifelse(z > 0, "y ~ f(x,y).", "y ~ f(x,t)") nlm(formula, data=data) .. but prelimin...
2014 Sep 27
5
Bug#763102: xen-utils-common: xen-init-list fails to parse xm output -> cannot shutdown domains with service xendomains
Package: xen-utils-common Version: 4.4.0-5 Severity: important Tags: patch Hello, xen-init-list fails to parse output of xen list -l when using XM toolstack. Therefore, /etc/init.d/xendomains stop fails to shutdown any guests still running on shutdown. xen-init-list fails with the following message: /usr/lib/xen-common/bin/xen-init-list Traceback (most recent call last): File
2017 Apr 12
2
Upcoming laws and the state of privacy in Europe?
Hi, I'm not trying to rock any boats or make noise and I'm not interested in discussing politics either, but I just wanted to get a general feel for what the rest of the tinc community felt in regards to how the EU looks like it wants to completely break encryption and make tools like tinc unfeasible. Both Germany and France want this to happen and in the UK the snoopers charter has provisions for this (although not tested in court yet). I think Netherlands, Norway and Finland are considering similar laws. Not sure which country isn't doing this. Any ideas on how we can keep tinc safe if f...
2019 Apr 07
2
April LLVM Austin social is this Thursday!
Thursday 11 April Meet you at 6:00pm at Pour House (west of 183). Pour House 11835 Jollyville Rd, Austin, TX 78759 http://pourhousepintsandpies.com/ -- -Brian -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.llvm.org/pipermail/llvm-dev/attachments/20190407/030ce223/attachment.html>
2017 Dec 13
1
Mail-crypt plugin clarification
...he idea is > to make it impossible for my hosting provider (who has access to my VPS) to > read the mail from the disk. Just to be clear, if at any point your VPS has access to the plaintext mail (or keys that decrypt mail), then the VPS provider could access your decrypted mail. To make it unfeasible for your VPS to read your mail, it has to arrive at your VPS pre-encrypted. I can envision a system where you import encrypted mail into your mail store, then use client IMAP access to be decrypted locally by your mail reader. However, metadata is still accessible by your VPS provider. If your V...
2010 Jan 04
1
glmer (lme4), glmmPQL (MASS) and xtmepoisson (Stata)
...e MASS package and replicated the analysis with Stata's 'xtmepoisson'. I obtained very different results, so I would like to try 'glmer' in the lme4 package. I guess the default correlation for the random effects in 'glmer' is unstructured, but this choice is absolutely unfeasible for this complex random effect nesting structure. Unfortunately, I couldn't find a way to input simpler correlation structures (namely diagonal or identity), in the same way as the using the functions pdDiag or pdIdent with 'glmmPQL'. I wonder if this option is still to be implemented...
2008 May 05
3
MeetMeAdmin() working problem
...he 1) kicking out a particular participant 2)Muting/unmuting of a particular participant so for the above things i should go for the MeetMeAdmin() but with a DID inward dialing if i want to call a particular command of MeetMeAdmin() exten => DID ,1,MeetMe(confnumber,command,user) This is an unfeasible solution Then how can i do that as i cannot create 'n' conferences for 'n' users and monitor them by entering their appropriate extensions as i have seen in the case of vicidial ? -- Srinivas Antarvedi
2011 Mar 11
2
[LLVMdev] LLVM vs GCC binary performance
Dear LLVM Team, As a developer I'm very excited and interested in the LLVM project. Though my knowledge of the details is cursory my general understanding is that the SSA code that LLVM front ends produce is supposed to allow for optimizations that are unfeasible in GCC. I also expect most important optimizations from GCC would have been incorporated into LLVM by now since GCC code is open for everyone to see. Therefore I'm surprised to see that in most benchmarks LLVM produces binaries are 10-15% slower than their GCC counterparts. Would you mind expl...
2006 May 13
4
undesireable lazy loading
Hi, My work with Rails has been fairly straightforward, until yesterday... I''ve encountered rather a peculiar problem that I''m not able to solve myself as a rails-newbie. The model code looks like this: class Link < ActiveRecord::Base has_one :user_vote end class UserVote < ActiveRecord::Base belongs_to :user belongs_to :link end I have a SQL query that is
2005 Oct 08
1
*wildcard* support?
Hello, First I wanted to say thanks for a great piece of software, thanks Olly and others who've contributed! I know that Xapian supports right-truncating, if that's the proper name for wildcard support, as in a search for "xapia*". I don't believe Xapian supports wildcards on both sides of a term, correct? Is this something that is technically unfeasable, unpalatable
2019 Jul 23
2
[RFC] A new multidimensional array indexing intrinsic
...e i64 %j, i64 %n It should be clear that this breaks a lot of assumptions then went into writing code that handle GEPs, not only the number of arguments the GEP should have. As a result, existing code may trigger assertions, crash, or miscompile when encountering such a modified GEP. I think it is unfeasible to change all code to properly handle the new form at once. 2. Johannes' interpretation is to add some kind of metadata to GEPs, in addition to the naive computation, such as: %offset1= mul i64. %i, %n %offset2 = add i64, %j, %offset1 %1 = getelementptr double, double* %A, inrang...
2020 Feb 17
3
[flang-dev] MLIR for clang
Hi Michael- 1. We intent to fork clang for MLIR at a particular release and develop. We will mostly merge with the master as soon as we reach a good milestones. Most of the development is expected to happen in github or some such version control system. 2. MLIR is extensible and we are hoping that constructs like exceptions can be represented in MLIR. As we dive deep into design we might be able
2012 Nov 15
1
hessian fails for box-constrained problems when close to boundary?
...ying to recover the hessian of a problem optimised with box-constraints. The problem is that in some cases, my estimates are very close to the boundary, which will make optim(..., hessian=TRUE) or optimHessian() fail, as they do not follow the box-constraints, and hence estimate the function in the unfeasible parameter space. As a simple example (my problem is more complex though, simple param transformations do not apply ashere), imagine estimating mu and sigma (restricted to be >0) of a simple normally distributed data, where however the true sigma is very close to zero: LLNorm <- function(par...
2012 Mar 12
1
Speeding up lots of calls to GLM
...zation to run the analysis in the end but I don't know how many CPU's I am going to have access to but I'd say it won't be more than 8. In addition I have been advised that the best way to account for multiple testing here is by permutation test, which in this context becomes almost unfeasible, since I would have to run each interaction ~10,000 times. Thanks in advance, Cheers Davy. getInteractions2 = function(data, fSNPcol, ccCol) { #fSNPcol is the number of the column that contains the first SNP #ccCol is the number of the column that contains the outcome variable require(lmtest)...