search for: withot

Displaying 5 results from an estimated 5 matches for "withot".

Did you mean: without
2004 Jul 01
2
Bug in SOM package (PR#7038)
Bug in "SOM" package in R. This simple code withot for loop runs:-------simple.r-------- library(som) A <- as.matrix(read.table("C:/code/h.txt", sep="\t", header=TRUE, row.names=1)) print(som(A,1,2)$visual) print(som(A,1,3)$visual) ---------------------------------------- The same code if inserted in for loop generates &q...
2011 Apr 16
1
windows and type=paravirtualised
Hi! What benefits do I get if I put "type=paravirtualised" in my network card config for a Win2k8 domU with PV drivers installed? Is it necessary, will it improve performance? I have read about this option here: http://plone.lucidsolutions.co.nz/linux/xen/windows/windows-server-2008-r2-xen-hvm-installation-with-gpvpv-drivers Thanks, Daniel
2003 Jun 16
0
new package: eha
...the corresponding standard errors. The analysis is up to the user for now. The 'boot' package? 2. 'mlreg': A discrete time proportional hazards model is fitted along the lines of Kalbfleisch & Prentice (1980, pp. 98--103). See also Brostr?m (2002): "Cox regression; Ties withot tears", Communications in Statistics, Theory & Methods 31, 285--297. This function has two methods; "ML", the purely discrete model with one parameter per observed distinct event time, and "MPPL", which is a hybrid between Cox regression and the discrete model: Only...
2003 Jun 16
0
new package: eha
...the corresponding standard errors. The analysis is up to the user for now. The 'boot' package? 2. 'mlreg': A discrete time proportional hazards model is fitted along the lines of Kalbfleisch & Prentice (1980, pp. 98--103). See also Brostr?m (2002): "Cox regression; Ties withot tears", Communications in Statistics, Theory & Methods 31, 285--297. This function has two methods; "ML", the purely discrete model with one parameter per observed distinct event time, and "MPPL", which is a hybrid between Cox regression and the discrete model: Only...
1997 May 29
1
Vulnerability of suid/sgid programs using libXt
...that by doing this you are allowing those who have access to the trusted accounts exploit the vulnerability and gain access to the euid of the program. XTERM(1) and xterm derived programs Unfortunately, you cannot remove suid bit from the xterm(1) and programs derived from it withot losing part of functionality. The advice by authors of exploits from bugtraq to squash suid bit prevents xterm(1) from changing ownerships of tty devices allowing any user on a system to read information from terminal devices. This looks like a lose-lose situation unless you ar...