similar to: Physical or Statistical Explanation for the "Funnel" Plot?

Displaying 20 results from an estimated 900 matches similar to: "Physical or Statistical Explanation for the "Funnel" Plot?"

2009 Jun 12
0
funnel plots
for the function funnelplot(), how do I include 95% confidence intervals for the effect estimate ( ie. / \ )? -- View this message in context: http://www.nabble.com/funnel-plots-tp24003106p24003106.html Sent from the R help mailing list archive at Nabble.com.
2019 Feb 25
2
funnel shift, select, and poison
On 2/25/2019 11:15 AM, John Regehr via llvm-dev wrote: > I'd just like to add that the general question here is "where does > poison stop propagating" and this question needs to be definitively > answered by this community. Does a call stop poison? Whatever the decision is may be contradicted after inlining, so what should such a call return? A superposition of poison
2019 Feb 25
2
funnel shift, select, and poison
On 2/25/2019 12:28 PM, John Regehr via llvm-dev wrote: > Poison has to propagate through calls and loads/stores, or else > basically nothing works. Consider this: %v0 = call i32 @foo(poison) nounwind/readnone store i32 %v0, i32* %valid_address If we assume that poison propagates through calls, we could then optimize this to %v0 = poison store poison, i32* %valid_address If
2019 Feb 25
2
funnel shift, select, and poison
On 2/25/2019 1:24 PM, John Regehr via llvm-dev wrote: > > This is a sound transformation only if foo() returns poison when it is > called with poison as an argument. Then how do you interpret "poison has to propagate through calls"? A typical analysis of a function will either see a call or the inlined body. If "call(poison)" cannot be assumed to be a poison, then
2015 Feb 24
2
[LLVMdev] Question about shouldMergeGEPs in InstructionCombining
On Mon, Feb 23, 2015 at 2:17 PM, Hal Finkel <hfinkel at anl.gov> wrote: > ----- Original Message ----- > > From: "Francois Pichet" <pichet2000 at gmail.com> > > To: "LLVM Developers Mailing List" <llvmdev at cs.uiuc.edu> > > Sent: Sunday, February 22, 2015 5:34:11 PM > > Subject: [LLVMdev] Question about shouldMergeGEPs in
2011 Mar 25
0
Bounding ellipse for any set of points
After a lot of effort I developed the following function to compute the bounding ellipse (also known a as minimum volume enclosing ellipsoid) for any set of points. This script is limited to two dimensions, but I believe with minor modification the algorithm should work for 3 or more dimensions. It seems to work well (although I don't know if can be optimized to run faster) and
2019 Feb 26
2
funnel shift, select, and poison
> Transforms/InstCombine/select.ll > ================================ > define i1 @trueval_is_true(i1 %C, i1 %X) { >  %R = select i1 %C, i1 1, i1 %X >  ret i1 %R > } > => > define i1 @trueval_is_true(i1 %C, i1 %X) { >  %R = or i1 %C, %X >  ret i1 %R > } > ERROR: Target is more poisonous than source (when %C = #x1 & %X = poison) > > (there are
2019 Feb 25
4
funnel shift, select, and poison
There's a question about the behavior of funnel shift [1] + select and poison here that reminds me of previous discussions about select and poison [2]: https://github.com/AliveToolkit/alive2/pull/32#discussion_r257528880 Example: define i8 @fshl_zero_shift_guard(i8 %x, i8 %y, i8 %sh) { %c = icmp eq i8 %sh, 0 %f = fshl i8 %x, i8 %y, i8 %sh %s = select i1 %c, i8 %x, i8 %f ; shift amount is 0
2019 Feb 25
2
funnel shift, select, and poison
Don't we need to distinguish funnel shift from the more specific rotate? I'm not seeing how rotate (a single input op shifted by some amount) gets into trouble like funnel shift (two variables concatenated and shifted by some amount). Eg, if in pseudo IR we have: %funnel_shift = fshl %x, %y, %sh ; this is problematic because either x or y can be poison, but we may not touch the poison when
2011 Jul 21
0
Bounding ellipse for any set of points
The mvee() function is intended to be released under the BSD license. Copyright (c) 2009, Nima Moshtagh Copyright (c) 2011, Andy Lyons All rights reserved. http://www.opensource.org/licenses/bsd-license.php Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source code must
2019 Feb 26
2
funnel shift, select, and poison
If I got poison propagation right, it's probably only by luck! Hopefully, the funnel shift bug is fixed here: https://reviews.llvm.org/rL354905 Nuno, IIUC this means that you do *not* need to change the funnel shift semantics in Alive. So I think that means we're still on track to go with John's suggestion that only select and phi can block poison? (I don't know of any
2015 Feb 25
2
[LLVMdev] Question about shouldMergeGEPs in InstructionCombining
----- Original Message ----- > From: "Hal Finkel" <hfinkel at anl.gov> > To: "Francois Pichet" <pichet2000 at gmail.com> > Cc: "LLVM Developers Mailing List" <llvmdev at cs.uiuc.edu>, "chandlerc" <chandlerc at gmail.com> > Sent: Tuesday, February 24, 2015 11:27:43 PM > Subject: Re: [LLVMdev] Question about
2019 Feb 25
3
funnel shift, select, and poison
We have these transforms from funnel shift to a simpler shift op: // fshl(X, 0, C) -> shl X, C // fshl(X, undef, C) -> shl X, C // fshl(0, X, C) -> lshr X, (BW-C) // fshl(undef, X, C) -> lshr X, (BW-C) These were part of: https://reviews.llvm.org/D54778 In all cases, one operand must be 0 or undef and the shift amount is a constant, so I think these are safe.
2019 Feb 27
3
funnel shift, select, and poison
You are right: select in SDAG has to be poison-blocking as well, otherwise the current lowering from IR's select to SDAG's select would be wrong. Which makes the select->or transformation incorrect at SDAG level as well. I guess until recently people believed that poison in SDAG wasn't much of a problem (myself included). I was convinced otherwise with the test cases that
2009 Mar 31
3
'for Loop'
Hello, I'm trying to create a for loop for a data set, I have a list of results in this data set and I want to take the 1st two add them together and divide by the mean of the 1st to, then do the same for the 3rd and 4th values in the list and so on and each time return a value for the calculation on each pair. Any help would be appreciated. Thanks, Al [[alternative HTML version
2008 Sep 15
1
Jitter Buffer issues
I am trying to using Speex for some Wireless voice transfers. I am using the 8K narrow band but am feeding it 11025 sample rate. Each Speex frame is about 14.5ms instead of 20ms. In order to minimize WiFi packet traffic I am sending 7 Speex frames at a time for a packet rate of about 10 per second so each WiFi packet has about 101ms of voice data. I have three modes 1. Simplex - voice messaging
2018 Dec 18
2
RFE: OpenSSH Support for PKCS11 Funneling to PAM for Kerberos/PKINIT
I know OpenSSH currently supports PKCS11 devices (such as smartcards) for publickey authentication, but I would love to see PKCS11 extended further. It is currently possible to perform PKCS11 certificate authentication, via pam_krb5.so (on Linux at least and likely something similar on other *NIX) which allows smartcard auth to a Kerberos (including AD) server, where a TGT can also be granted.
2012 Jan 27
1
repeat function for entire list of matrices
hi all. perhaps someone can help me with subsetting here............ i'm trying to use the nested() function in the bipartite package. my problem is that i have a list of 10,000 matrices and i want the output to be a vector of the nested() function on each of the 10,000 matrices (so i can use these numbers in a statistical test). here is what i'm working with currently: #to store
2018 Dec 18
2
RFE: OpenSSH Support for PKCS11 Funneling to PAM for Kerberos/PKINIT
Alon, I should have provided more background. You are assuming that I could perform the PKINIT prior to connecting to the SSH server. In this case (and others) there is an interest in not exposing the kerberos servers to the world and thus someone connecting remotely would not be able to obtain a TGT or do a PKINIT. The goal would be for SSH to handle all the auth and only after connecting to
2018 Dec 19
2
RFE: OpenSSH Support for PKCS11 Funneling to PAM for Kerberos/PKINIT
Alon, On 12/18/2018 06:52 PM, Alon Bar-Lev wrote: > OK... So you have an issue... > > First, you need to delegate your smartcard to remote machine, probably > using unix socket redirection managed by openssh. This can be done in > many levels... > 1. Delegate USB device, this will enable only exclusive usage of the > smartcard by remote machine. > 2. Delegate PC/SC, this