Displaying 5 results from an estimated 5 matches for "withot".
Did you mean:
without
2004 Jul 01
2
Bug in SOM package (PR#7038)
Bug in "SOM" package in R.
This simple code withot for loop runs:-------simple.r--------
library(som)
A <- as.matrix(read.table("C:/code/h.txt", sep="\t", header=TRUE,
row.names=1))
print(som(A,1,2)$visual)
print(som(A,1,3)$visual)
----------------------------------------
The same code if inserted in for loop generates &q...
2011 Apr 16
1
windows and type=paravirtualised
Hi!
What benefits do I get if I put "type=paravirtualised" in my network card
config for a Win2k8 domU with PV drivers installed?
Is it necessary, will it improve performance?
I have read about this option here:
http://plone.lucidsolutions.co.nz/linux/xen/windows/windows-server-2008-r2-xen-hvm-installation-with-gpvpv-drivers
Thanks,
Daniel
2003 Jun 16
0
new package: eha
...the corresponding
standard errors. The analysis is up to the user for now.
The 'boot' package?
2. 'mlreg': A discrete time proportional hazards model is fitted along
the lines of Kalbfleisch & Prentice (1980, pp. 98--103). See also
Brostr?m (2002): "Cox regression; Ties withot tears", Communications
in Statistics, Theory & Methods 31, 285--297. This function has two methods;
"ML", the purely discrete model with one parameter per observed distinct
event time, and "MPPL", which is a hybrid between Cox regression and
the discrete model: Only...
2003 Jun 16
0
new package: eha
...the corresponding
standard errors. The analysis is up to the user for now.
The 'boot' package?
2. 'mlreg': A discrete time proportional hazards model is fitted along
the lines of Kalbfleisch & Prentice (1980, pp. 98--103). See also
Brostr?m (2002): "Cox regression; Ties withot tears", Communications
in Statistics, Theory & Methods 31, 285--297. This function has two methods;
"ML", the purely discrete model with one parameter per observed distinct
event time, and "MPPL", which is a hybrid between Cox regression and
the discrete model: Only...
1997 May 29
1
Vulnerability of suid/sgid programs using libXt
...that by doing this you are allowing those who have access to
the trusted accounts exploit the vulnerability and gain access to the
euid of the program.
XTERM(1) and xterm derived programs
Unfortunately, you cannot remove suid bit from the xterm(1) and
programs derived from it withot losing part of functionality. The
advice by authors of exploits from bugtraq to squash suid bit prevents
xterm(1) from changing ownerships of tty devices allowing any user on a
system to read information from terminal devices.
This looks like a lose-lose situation unless you ar...