similar to: Masked objects

Displaying 20 results from an estimated 10000 matches similar to: "Masked objects"

1999 Nov 18
1
Am I an idiot?
Hey everyone, What am I doing wrong? I loaded the MASS package with library(MASS), and now when I type library() I get > library() Packages in library `F:\r\rw0651/library': MASS Main Library of Venables and Ripley's MASS base The R base package . . . That's fine. The problem is that when I try to use a function that I know is built
1999 Nov 04
1
Mathematical niceties
I'd like to make axis titles, chart titles, legends and the like mathematically nice (e.g., have proper superscripts and subscripts, variables in italics, and so on). Ideally, one could go into ``math mode" a la LaTeX, and write something like plot(blah, xlab="Methane in $\mbox{cm}^3$ / g", blah). This is just an ideal, but it would be nice. Is some approximation of this
1999 Nov 13
1
Anonymous cvs access
With Tony Rossini's help we have established anonymous CVS access to a read-only copy of the main R CVS tree at cvs.r-project.org. This would be of interest primarily to those who want to track the development version (and who have access to CVS, of course). To use anonymous cvs you must log in to the server under the name "anoncvs" and with the password "anoncvs". You
1999 Nov 13
1
Anonymous cvs access
With Tony Rossini's help we have established anonymous CVS access to a read-only copy of the main R CVS tree at cvs.r-project.org. This would be of interest primarily to those who want to track the development version (and who have access to CVS, of course). To use anonymous cvs you must log in to the server under the name "anoncvs" and with the password "anoncvs". You
1999 Sep 22
1
Brace highlighting in R for the PC?
Hey everyone, Might it be possible for future versions of PC-R to highlight the opening brace in a pair, a la emacs? Programs that do that are infinitely friendlier than those that don't. Thanks, Steve Stephen R. Laniel | "I've got a match: Carnegie Mellon University | Your embrace and my collapse." laniel at cmu.edu | --They Might Be
2000 Feb 23
1
Large datasets under R
Hello, I recall reading a thread months ago on this mailing list about handling very datasets under R, but I can't seem to find it. This has become particularly important recently, because I've been playing with a dataset containing information about every fatal car accident in the U.S. since 1975; in total, the relevant files are about 120 megs. I'd like to load all of these into R
1999 Oct 21
1
left.solve
I have sort of an emergency question for the list. One of my professors for an S-Plus intensive class distributed a function to produce partial regression plots. I need to run it under R, because I'm doing the homework on my home computer with a modem; hence I don't have the speed required to emulate X-Windows and run S Plus off one of the campus servers. Bottom line: I'm using R.
2007 Jun 16
1
Binary packagers: BSD license issues
Adding this SHA256 code made me read the BSD license once again. It says: * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. Then there are a few files from Cyrus as well which contain: * 4. Redistributions of any form
2003 Aug 13
0
All "GNU" software potentially Trojaned
-----BEGIN PGP SIGNED MESSAGE----- CERT Advisory CA-2003-21 GNU Project FTP Server Compromise Original issue date: August 13, 2003 Last revised: -- Source: CERT/CC A complete revision history is at the end of this file. Overview The CERT/CC has received a report that the system housing the primary FTP servers for the GNU software project was compromised. I. Description
1998 Dec 22
0
CERT Advisory CA-98.13 - TCP/IP Denial of Service (fwd)
The following advisory was issued by CERT yesterday. Because it affects FreeBSD systems as well, we are forwarding it to the appropriate FreeBSD mailing lists. We would like to thanks CERT for cooperation with the FreeBSD security officer on this subject. -----BEGIN PGP SIGNED MESSAGE----- CERT Advisory CA-98-13-tcp-denial-of-service Original Issue Date: December 21, 1998 Last Revised
2000 Feb 29
1
No subject
Does anyone know of any comprehensive literature (like a book, collection of articles, etc.) that walk thorugh example of ARIMA modeling with the ts package of R? Genarlly if you've just started to learn the R-language and are all week long with ARIMA, what is a fast-pace source that you would recommend (to a beginner) ? Thank you, Krasi
1999 Nov 11
0
CERT Advisory CA-99.14 - Multiple Vulnerabilities in BIND (fwd)
For those who are unaware... [mod: This whole bind affair has gone a bit out of hand. Elias from Bugtraq found "public" info indicating the problem. ISC/CERT were working on releasing the bugfix together with the fix. Now everybody is scurrying to get fixes out now that "the public" knows about this. As far as I know, Red Hat (& Caldera) made a new RPM, based on the most
1998 Oct 13
0
FW: CERT Advisory CA-98.12 - mountd
-------- Is this old? I couldn''t find it in the linux-security archives. If so, please disregard. Dan ------- Forwarded Message Return-Path: cppm_reg_sysadmins-owner@fnal.gov Received: from FNAL.FNAL.Gov (fnal.fnal.gov [131.225.9.8]) by sapphire.fnal.gov (8.8.7/8.8.7) with ESMTP id LAA27322 for <yocum@sapphire.fnal.gov>; Tue, 13 Oct 1998 11:12:23 -0500 Received: from raven
2000 Apr 30
0
Help Need with aov()
Hi there, I'm using R1.0.1 Windows 98. This file contains some inputs and an aov function code. Can someone check it for me? Somehow I got completely different answer when typing them in R and in Splus. Splus gives me this: > summary( Turnip.aov ) Error: Blocks Df Sum of Sq Mean Sq F Value Pr(F) Residuals 3 163.7367 54.57891 Error: Plots %in% Blocks
1998 Aug 11
0
Fwd: CERT Advisory CA-98.10 - mime_buffer_overflows
>Date: Tue, 11 Aug 1998 13:21:06 -0400 >From: CERT Advisory <cert-advisory@cert.org> >To: cert-advisory@coal.cert.org >Subject: CERT Advisory CA-98.10 - mime_buffer_overflows >Reply-To: cert-advisory-request@cert.org >Organization: CERT(sm) Coordination Center - +1 412-268-7090 > >-----BEGIN PGP SIGNED MESSAGE----- >
2003 Apr 17
1
[Fwd: CERT Advisory CA-2003-13 Multiple Vulnerabilities in Snort Preprocessors]
I figured that someone reading this list might want to take a look at the proceeding, considering that the version of Snort in FreeBSD ports -is- affected. -----Forwarded Message----- > From: CERT Advisory <cert-advisory@cert.org> > To: cert-advisory@cert.org > Subject: CERT Advisory CA-2003-13 Multiple Vulnerabilities in Snort Preprocessors > Date: 17 Apr 2003 11:30:47 -0400
1999 Aug 31
1
basic help
Sorry to ask this but does anyone knows a good text that helps with the basic programming side of R. I understand the statistics behind most of R but i have real difficulty with the data types and how R views them. As a part of that could you help me with another problem. I know how to read data in from a file in terms of read.table but how do i single a column out or even just download a
2003 Jul 18
1
Status of database integration / Willing to help
I a PhD student here at Carnegie Mellon. I have ten years of experience working in C in industry. I am working on a research project here at Carnegie Mellon that needs to integrate a database with mail clients. We are planning to use the IMAP protocol to communicate with the mail client. After I spent some time looking at the code of various IMAP server implementations, I got very interested in
1999 Sep 30
1
Cluster graphs
I posted this to the sci.math newsgroup but didn't get any responses so I was hoping someone here could help. I have a number of items with "distances" of differences between each other. What I want to do is to plot each item on a two dimensional plot such that the positions on the plot indicate the approximate distance between each item. What I want to look at, basically, is a map
2002 Mar 13
3
zlib compression, the exploit, and OpenSSH
Attached is a zlib advisory and a debug dump of ssh with compression enabled. Most of the debug is superflous, so I have underlined the two points to look at. When creating an ssh connection, compression on the line is done *before* authentication -- This means an unauthorized attacker could, conceivable, leverage root access by connecting with to the ssh server requesting zlib compression and