On May 28, 2012, at 13:50 , Immanuel B wrote:

> Hello,
> I could use some feedback on how to best set-up a benchmark for these models:
>    l2 loss*
>    log loss*
>    multi-logit*
> with l1 and l1 & l2 penalty
> 
> Please have a look at the following file:
> https://docs.google.com/document/d/1VjRCU9xAP0hdeMiEQJwIKumMQTQZXdV1oRL_gh38iE8/edit
> 
> @Vlad
> I'm very interested in your opinion on the data set selection and use of 
> vbench.

Hi Immanuel, great work preparing the report. If you haven't already, blog it. 
I will tell you my opinion about the datasets in a short while. Also +1 for the 
phrase 'data set selection' (nod towards JMLG)

Did you check out the vbench repo that I started? I think it fits our purposes, 
but it is a little bit overkill and also the code-as-string design could use 
improvement. An alternative could be the unladen-swallow benchmark script
http://code.google.com/p/unladen-swallow/wiki/Benchmarks

but I haven't had the time to look into it yet. 

I am only starting serious work today -- I've been in a trip to Istanbul for 
the LREC conference last week and traveling by train got me tired. We can 
correlate the work on linear models and hope to have running benchmarks in 2 
weeks for now. How does this sound?

> best,
> Immanuel
> 
> ------------------------------------------------------------------------------
> Live Security Virtual Conference
> Exclusive live event will cover all the ways today's security and 
> threat landscape has changed and how IT managers can respond. Discussions 
> will include endpoint security, mobile security and the latest in malware 
> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
> _______________________________________________
> Scikit-learn-general mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/scikit-learn-general

------------------
Vlad N.
http://vene.ro





------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
Scikit-learn-general mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/scikit-learn-general

Reply via email to