Honestly, I'm not sure if i'm wrong but for example:
https://github.com/scikit-learn/scikit-learn/blob/master/sklearn/kernel_approximation.py
I'm reasonably sure kernel approximation is from a paper?
https://github.com/scikit-learn/scikit-learn/blob/master/sklearn/cluster/_k_means.pyx
K means clustering
https://github.com/scikit-learn/scikit-learn/blob/master/sklearn/neighbors/classification.py
This
doesn't seem to ...?
I'm looking at ones that do not look like
https://github.com/scikit-learn/scikit-learn/blob/master/sklearn/naive_bayes.py
,
which has a nice list at the bottom.
Please do tell me if i'm completely wrong as that is likely.
As a sidenote, where would you suggest I begin working on the project - I
was thinking of fixing issues listed in the Github Issues tab.
Thanks,
Ronnie
On 28 August 2012 18:21, Robert Layton <[email protected]> wrote:
> On 29 August 2012 08:17, Ronnie Ghose <[email protected]> wrote:
>
>> Where do you guys get your algorithms from? Some algorithms have
>> different variations and I personally don't really see any sources.
>>
>> Thanks,
>> Ronnie
>>
>>
>> ------------------------------------------------------------------------------
>> Live Security Virtual Conference
>> Exclusive live event will cover all the ways today's security and
>> threat landscape has changed and how IT managers can respond. Discussions
>> will include endpoint security, mobile security and the latest in malware
>> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
>> _______________________________________________
>> Scikit-learn-general mailing list
>> [email protected]
>> https://lists.sourceforge.net/lists/listinfo/scikit-learn-general
>>
>>
> Hi Ronnie,
>
> Could you give some examples? The algorithms I've coded have references to
> the original paper, and most algorithms should have them too.
>
> - Robert
>
> --
>
> Public key at: http://pgp.mit.edu/ Search for this email address and
> select the key from "2011-08-19" (key id: 54BA8735)
>
>
>
> ------------------------------------------------------------------------------
> Live Security Virtual Conference
> Exclusive live event will cover all the ways today's security and
> threat landscape has changed and how IT managers can respond. Discussions
> will include endpoint security, mobile security and the latest in malware
> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
> _______________________________________________
> Scikit-learn-general mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/scikit-learn-general
>
>
------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and
threat landscape has changed and how IT managers can respond. Discussions
will include endpoint security, mobile security and the latest in malware
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
Scikit-learn-general mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/scikit-learn-general