similar to: Anomaly in sample() function

Displaying 20 results from an estimated 8000 matches similar to: "Anomaly in sample() function"

2003 Jul 04
1
bug? exactRankTests install anomaly (PR#3394)
Full_Name: Michael W. Grant Version: 1.7.1(2003-06-16) OS: Windows 98 Second Edition 4.10.2222 A Submission from: (NULL) (24.55.165.101) I just installed version 1.7.1 tonight. In the process I installed via CRAN from the menu several packages. One installation, exactRankTests, had a distinct anomaly. A DLL attempt to change FPU control word as seem in the last line of the following listing:
2006 Oct 03
2
strverscmp, scandir, alphasort and versionsort
Hello, These are implementations of strverscmp, scandir, alphasort and versionsort, and some test cases for them. I know these aren't in POSIX, but they're useful, nonetheless, and someone else might be interested in them. Regards, Luciano Rocha -- lfr 0/0 -------------- next part -------------- /* ----------------------------------------------------------------------- * * *
2009 Mar 16
1
Uniroot and Newton-Raphson Anomaly
I have the following function for which I need to find the root of a: f <- function(R,a,c,q) sum((1 - (1-R)^a)^(1/a)) - c * q To give context for the problem, this is a psychometric issue where R is a vector denoting the percentage of students scoring correct on test item i in class j, c is the proportion correct on the test by student k, and q is the number of items on the test in total. I
2000 Mar 03
0
nmdb anomaly in SWAT
G'day, We are running Samba 2.04b on a Solaris 2.6 box as well as Samba 2.04b on a Solaris 7 box. In SWAT on the Solaris 7 box the nmbd service is seen to be running. On the Solaris 2.6 box SWAT says the nmbd service is not running. Doing a ps on the Solaris 2.6 box shows nmbd to be running. What is responsible for this anomaly? Any help would be greatly appreciated. Regards, Dave Lovett
1999 Dec 20
4
2.0.6/Sol. 251/NTW4 - Drive mapping anomaly
Has anyone seen the following anomaly? When I first connect to the Samba server, I run a logon script that maps 5 shares to drives F,G,H,L,M. Some time later, when I check "My Computer", I find that the share mapped to H: has been mapped to all the remaining drive letters as well! For example, after I mount /users on G: and /programs on H:, I'll notice at some point later that I
2011 Apr 12
4
anomaly warzone earth
Hello, trying to get this game to run on wine 1.3.16 on a debian sid amd64 box. This is what the error output when running it : Code: $ wine /media/Data/Program\ Files/Anomaly\ -\ Warzone\ Earth/AnomalyWarzoneEarth.exe err:winedevice:ServiceMain driver L"SecDrv" failed to load wine: Unhandled page fault on read access to 0x00000000 at address 0x7e084c95 (thread 0009), starting
1999 Jan 28
0
win95 & NT4 concurent access to paradox database
Hi, I use samba for one year only, but with full satisfaction. Only with latest cvs tree I discovered some (maybe particular) problem. In mixed environment of win95oemII and NT4 workst (sp3 or sp4) we share some Paradox 7.0 database on linux server (Rh5.2 and 2.2.0-pre1 kernel). Paradox controls multiuser access to the data with three files: PDOXUSRS.NET (user names etc?), and two lock files,
2014 Apr 03
0
CentOS-announce Digest, Vol 110, Issue 2
Send CentOS-announce mailing list submissions to centos-announce at centos.org To subscribe or unsubscribe via the World Wide Web, visit http://lists.centos.org/mailman/listinfo/centos-announce or, via email, send a message with subject or body 'help' to centos-announce-request at centos.org You can reach the person managing the list at centos-announce-owner at centos.org When
2007 Mar 09
1
Applying some equations over all unique combinations of 4 variables
#I have a data set that looks like this. A bit more complicated actually with # three factor levels but these calculations need to be done on one factor at a #I then have a set of different rates that are applied #to it. #dataset cata <- c( 1,1,6,1,1,2) catb <- c( 1,2,3,4,5,6) doga <- c(3,5,3,6,4, 0) data1 <- data.frame(cata, catb, doga) rm(cata,catb,doga) data1 # start rates #
2014 Sep 30
0
CESA-2014:1319 Moderate CentOS 6 xerces-j2 Security Update
CentOS Errata and Security Advisory 2014:1319 Moderate Upstream details at : https://rhn.redhat.com/errata/RHSA-2014-1319.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 2c2635bab62b2ffa381649ce2643ba6a0e0edba62c5dcf07481f9de71eebdd68 xerces-j2-2.7.1-12.7.el6_5.i686.rpm
2014 Apr 02
0
CESA-2014:0348 Important CentOS 5 xalan-j2 Update
CentOS Errata and Security Advisory 2014:0348 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2014-0348.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 0a93cd521aa9197ef5e08abbc130eddae7b0d7d7bdc8de2e3e417e0ceb72789b xalan-j2-2.7.0-6jpp.2.i386.rpm
2014 Apr 02
0
CESA-2014:0348 Important CentOS 6 xalan-j2 Update
CentOS Errata and Security Advisory 2014:0348 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2014-0348.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 4791c5a062d2fafdbc3281552de6770ffcfb2e678913af78a76e8160e7398343 xalan-j2-2.7.0-9.9.el6_5.noarch.rpm
2006 Mar 09
1
HCLUST subroutine question -- FORTRAN DO loops
Shown below is most of the FORTRAN subroutine named HCLUST. My question concerns the DO loop labeled as '10'. What happened to its CONTINUE statement? I will assume that after FLAG(I)=.TRUE. is executed that control returns to DO 10 I=1,N. Am I correct? Dave ---------------------------- C Initializations C DO 10 I=1,N C We do not initialize MEMBR in order to be able to
2010 Mar 05
3
How to match vector with a list ?
Dear list, I have a vector of characters and a list of two named elements : i <- c("a","a","b","b","b","c","c","d") j <- list(j1 = c("a","c"), j2 = c("b","d")) I'm looking for a fast way to obtain a vector with names, as follows : [1] "j1" "j1"
2007 Dec 10
2
squat also not working in beta11
Hi Timo, Just tried squat in beta11. I also get the same error in the log: dovecot: Dec 10 14:21:17 Error: IMAP(joewong99:joew.outblaze.com): Corrupted squat uidlist file /mailfs/4/22/3/joewon g99:joew.outblaze.com at joew_outblaze_com/Maildir/dovecot.index.search.uids: Broken uidlists There is not change in my configuration file. # 1.1.beta11: /usr/local/etc/dovecot.conf log_path:
2011 Mar 29
0
[LLVMdev] Anomaly with CallGraph construction
Hi Gabriel, ... > Summarizing, I have two questions: 1) is the CallGraph analysis "working as > intended" here?; and 2) what would be the correct approach > to modifying the proposed analysis in order to detect that randlc() is being > called in that CallInst ? the reason that the callgraph analysis does not try to understand indirect calls like this is that other passes
2008 May 03
2
Stacked bar plot anomaly When column contains a negative and a positive value
Hello users, I've noticed a problem when creating a stacked column plot when a column contains a negative and a positive value. e.g. series1<-c(-1,-2, 3, 4, 5) series2<-c( 5, -4,-3,-2, 1) data<-rbind(series1,series2) barplot(as.matrix(data), beside=FALSE) In these cases (i.e. first, third and fifth columns) the plotting is not handled correctly. Compare this output with that
2004 Jul 21
0
list archive anomaly
At the list archive page (http://mailman.ds9a.nl/pipermail/lartc/) there is an amazing message from the future: the year 2032 (q1). Not that I know anything about mailman, but someone might want to "maintain" that. -- ****************************************************************** Glen W. Mabey Glen.Mabey@usu.edu http://mabeys.homelinux.com/glen/
2008 Jun 10
0
Seeking Collaboration in Development and Validation of an Anomaly Detection System for Asterisk
We are currently doing research and development on an open-source runtime application monitoring system for Asterisk. This system is aimed at detecting and mitigating problems or vulnerabilities that arise from residual errors--whether unintentional or malicious--either in the application code or in its configuration or usage patterns. It can, for example, be used to detect and prevent
2011 Aug 08
0
Re: anomaly warzone earth
I did all you posted scripts and it all worked out...Finally miracle happened. :D