Displaying 20 results from an estimated 10000 matches similar to: "Masked objects"
1999 Nov 18
1
Am I an idiot?
Hey everyone,
What am I doing wrong? I loaded the MASS package with library(MASS), and
now when I type library() I get
> library()
Packages in library `F:\r\rw0651/library':
MASS Main Library of Venables and Ripley's MASS
base The R base package
.
.
.
That's fine. The problem is that when I try to use a function that I know
is built
1999 Nov 04
1
Mathematical niceties
I'd like to make axis titles, chart titles, legends and the like
mathematically nice (e.g., have proper superscripts and subscripts,
variables in italics, and so on). Ideally, one could go into ``math mode"
a la LaTeX, and write something like
plot(blah, xlab="Methane in $\mbox{cm}^3$ / g", blah).
This is just an ideal, but it would be nice. Is some approximation of this
1999 Nov 13
1
Anonymous cvs access
With Tony Rossini's help we have established anonymous CVS access to a
read-only copy of the main R CVS tree at cvs.r-project.org. This
would be of interest primarily to those who want to track the
development version (and who have access to CVS, of course).
To use anonymous cvs you must log in to the server under the name
"anoncvs" and with the password "anoncvs". You
1999 Nov 13
1
Anonymous cvs access
With Tony Rossini's help we have established anonymous CVS access to a
read-only copy of the main R CVS tree at cvs.r-project.org. This
would be of interest primarily to those who want to track the
development version (and who have access to CVS, of course).
To use anonymous cvs you must log in to the server under the name
"anoncvs" and with the password "anoncvs". You
1999 Sep 22
1
Brace highlighting in R for the PC?
Hey everyone,
Might it be possible for future versions of PC-R to highlight the opening
brace in a pair, a la emacs? Programs that do that are infinitely
friendlier than those that don't.
Thanks,
Steve
Stephen R. Laniel | "I've got a match:
Carnegie Mellon University | Your embrace and my collapse."
laniel at cmu.edu | --They Might Be
2000 Feb 23
1
Large datasets under R
Hello,
I recall reading a thread months ago on this mailing list about handling
very datasets under R, but I can't seem to find it. This has become
particularly important recently, because I've been playing with a dataset
containing information about every fatal car accident in the U.S. since
1975; in total, the relevant files are about 120 megs. I'd like to load
all of these into R
1999 Oct 21
1
left.solve
I have sort of an emergency question for the list. One of my professors
for an S-Plus intensive class distributed a function to produce partial
regression plots. I need to run it under R, because I'm doing the
homework on my home computer with a modem; hence I don't have the speed
required to emulate X-Windows and run S Plus off one of the campus
servers. Bottom line: I'm using R.
2007 Jun 16
1
Binary packagers: BSD license issues
Adding this SHA256 code made me read the BSD license once again. It
says:
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
Then there are a few files from Cyrus as well which contain:
* 4. Redistributions of any form
2003 Aug 13
0
All "GNU" software potentially Trojaned
-----BEGIN PGP SIGNED MESSAGE-----
CERT Advisory CA-2003-21 GNU Project FTP Server Compromise
Original issue date: August 13, 2003
Last revised: --
Source: CERT/CC
A complete revision history is at the end of this file.
Overview
The CERT/CC has received a report that the system housing the primary
FTP servers for the GNU software project was compromised.
I. Description
1998 Dec 22
0
CERT Advisory CA-98.13 - TCP/IP Denial of Service (fwd)
The following advisory was issued by CERT yesterday. Because it affects
FreeBSD systems as well, we are forwarding it to the appropriate FreeBSD
mailing lists. We would like to thanks CERT for cooperation with the
FreeBSD security officer on this subject.
-----BEGIN PGP SIGNED MESSAGE-----
CERT Advisory CA-98-13-tcp-denial-of-service
Original Issue Date: December 21, 1998
Last Revised
2000 Feb 29
1
No subject
Does anyone know of any comprehensive literature (like a book, collection of
articles, etc.) that walk thorugh example of ARIMA modeling with the ts
package of R? Genarlly if you've just started to learn the R-language and
are all week long with ARIMA, what is a fast-pace source that you would
recommend (to a beginner) ?
Thank you,
Krasi
1999 Nov 11
0
CERT Advisory CA-99.14 - Multiple Vulnerabilities in BIND (fwd)
For those who are unaware...
[mod: This whole bind affair has gone a bit out of hand. Elias from
Bugtraq found "public" info indicating the problem. ISC/CERT were
working on releasing the bugfix together with the fix. Now everybody
is scurrying to get fixes out now that "the public" knows about this.
As far as I know, Red Hat (& Caldera) made a new RPM, based on the
most
1998 Oct 13
0
FW: CERT Advisory CA-98.12 - mountd
--------
Is this old? I couldn''t find it in the linux-security archives.
If so, please disregard.
Dan
------- Forwarded Message
Return-Path: cppm_reg_sysadmins-owner@fnal.gov
Received: from FNAL.FNAL.Gov (fnal.fnal.gov [131.225.9.8])
by sapphire.fnal.gov (8.8.7/8.8.7) with ESMTP id LAA27322
for <yocum@sapphire.fnal.gov>; Tue, 13 Oct 1998 11:12:23 -0500
Received: from raven
2000 Apr 30
0
Help Need with aov()
Hi there,
I'm using R1.0.1 Windows 98.
This file contains some inputs and an aov function code. Can someone
check it for me? Somehow I got completely different answer when typing
them in R and in Splus.
Splus gives me this:
> summary( Turnip.aov )
Error: Blocks
Df Sum of Sq Mean Sq F Value Pr(F)
Residuals 3 163.7367 54.57891
Error: Plots %in% Blocks
1998 Aug 11
0
Fwd: CERT Advisory CA-98.10 - mime_buffer_overflows
>Date: Tue, 11 Aug 1998 13:21:06 -0400
>From: CERT Advisory <cert-advisory@cert.org>
>To: cert-advisory@coal.cert.org
>Subject: CERT Advisory CA-98.10 - mime_buffer_overflows
>Reply-To: cert-advisory-request@cert.org
>Organization: CERT(sm) Coordination Center - +1 412-268-7090
>
>-----BEGIN PGP SIGNED MESSAGE-----
>
2003 Apr 17
1
[Fwd: CERT Advisory CA-2003-13 Multiple Vulnerabilities in Snort Preprocessors]
I figured that someone reading this list might want to take a look at
the proceeding, considering that the version of Snort in FreeBSD ports
-is- affected.
-----Forwarded Message-----
> From: CERT Advisory <cert-advisory@cert.org>
> To: cert-advisory@cert.org
> Subject: CERT Advisory CA-2003-13 Multiple Vulnerabilities in Snort Preprocessors
> Date: 17 Apr 2003 11:30:47 -0400
1999 Aug 31
1
basic help
Sorry to ask this but does anyone knows a good text that helps with the
basic programming side of R. I understand the statistics behind most
of R but i have real difficulty with the data types and how R views
them.
As a part of that could you help me with another problem. I know how
to read data in from a file in terms of read.table but how do i single
a column out or even just download a
2003 Jul 18
1
Status of database integration / Willing to help
I a PhD student here at Carnegie Mellon. I have ten years of experience
working in C in industry.
I am working on a research project here at Carnegie Mellon that needs to
integrate a database with mail clients. We are planning to use the IMAP
protocol to communicate with the mail client. After I spent some time
looking at the code of various IMAP server implementations, I got very
interested in
1999 Sep 30
1
Cluster graphs
I posted this to the sci.math newsgroup but didn't get any responses so I
was hoping someone here could help.
I have a number of items with "distances" of differences between each other.
What I want to do is to plot each item on a two dimensional plot such that
the positions on the plot indicate the approximate distance between each
item.
What I want to look at, basically, is a map
2002 Mar 13
3
zlib compression, the exploit, and OpenSSH
Attached is a zlib advisory and a debug dump of ssh with compression
enabled. Most of the debug is superflous, so I have underlined the two
points to look at. When creating an ssh connection, compression on the
line is done *before* authentication -- This means an unauthorized
attacker could, conceivable, leverage root access by connecting with to
the ssh server requesting zlib compression and