Honestly, I'm not sure if i'm wrong but for example:

https://github.com/scikit-learn/scikit-learn/blob/master/sklearn/kernel_approximation.py
I'm reasonably sure kernel approximation is from a paper?

https://github.com/scikit-learn/scikit-learn/blob/master/sklearn/cluster/_k_means.pyx
K means clustering

https://github.com/scikit-learn/scikit-learn/blob/master/sklearn/neighbors/classification.py
This
doesn't seem to ...?

I'm looking at ones that do not look like
https://github.com/scikit-learn/scikit-learn/blob/master/sklearn/naive_bayes.py
,
which has a nice list at the bottom.

Please do tell me if i'm completely wrong as that is likely.

As a sidenote, where would you suggest I begin working on the project - I
was thinking of fixing issues listed in the Github Issues tab.

Thanks,
Ronnie

On 28 August 2012 18:21, Robert Layton <[email protected]> wrote:

> On 29 August 2012 08:17, Ronnie Ghose <[email protected]> wrote:
>
>> Where do you guys get your algorithms from? Some algorithms have
>> different variations and I personally don't really see any sources.
>>
>> Thanks,
>> Ronnie
>>
>>
>> ------------------------------------------------------------------------------
>> Live Security Virtual Conference
>> Exclusive live event will cover all the ways today's security and
>> threat landscape has changed and how IT managers can respond. Discussions
>> will include endpoint security, mobile security and the latest in malware
>> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
>> _______________________________________________
>> Scikit-learn-general mailing list
>> [email protected]
>> https://lists.sourceforge.net/lists/listinfo/scikit-learn-general
>>
>>
> Hi Ronnie,
>
> Could you give some examples? The algorithms I've coded have references to
> the original paper, and most algorithms should have them too.
>
> - Robert
>
> --
>
> Public key at: http://pgp.mit.edu/ Search for this email address and
> select the key from "2011-08-19" (key id: 54BA8735)
>
>
>
> ------------------------------------------------------------------------------
> Live Security Virtual Conference
> Exclusive live event will cover all the ways today's security and
> threat landscape has changed and how IT managers can respond. Discussions
> will include endpoint security, mobile security and the latest in malware
> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
> _______________________________________________
> Scikit-learn-general mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/scikit-learn-general
>
>
------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
Scikit-learn-general mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/scikit-learn-general

Reply via email to