Hi Ronnie.
I don't really understand the comment about the kernel approximation.
Each of the algorithms has a reference to the paper it is from.
As Robert said, the others are textbook algorithms. But even these
have often References, mostly in the documentation, though, as for
example naive Bayes:
http://scikit-learn.org/dev/modules/naive_bayes.html

In general "Elements of Statistical Learning" is a textbook we reference often. It is available online for free. Another standard reference is Chris Bishop's
"Pattern Recognition and Machine Learning".

If you  want to start contributing, I can talk you through some
of the issues. I try to hang out in IRC this week. I can also just sent
you a list and we can discuss on the issue tracker.

Cheers,
Andy


On 08/29/2012 12:59 AM, Robert Layton wrote:
On 29 August 2012 08:47, Ronnie Ghose <[email protected] <mailto:[email protected]>> wrote:

    Honestly, I'm not sure if i'm wrong but for example:

    
https://github.com/scikit-learn/scikit-learn/blob/master/sklearn/kernel_approximation.py
    I'm reasonably sure kernel approximation is from a paper?

    
https://github.com/scikit-learn/scikit-learn/blob/master/sklearn/cluster/_k_means.pyx
    K means clustering

    
https://github.com/scikit-learn/scikit-learn/blob/master/sklearn/neighbors/classification.py
 This
    doesn't seem to ...?

    I'm looking at ones that do not look like
    
https://github.com/scikit-learn/scikit-learn/blob/master/sklearn/naive_bayes.py 
,
    which has a nice list at the bottom.

    Please do tell me if i'm completely wrong as that is likely.

    As a sidenote, where would you suggest I begin working on the
    project - I was thinking of fixing issues listed in the Github
    Issues tab.

    Thanks,
    Ronnie


    On 28 August 2012 18:21, Robert Layton <[email protected]
    <mailto:[email protected]>> wrote:

        On 29 August 2012 08:17, Ronnie Ghose <[email protected]
        <mailto:[email protected]>> wrote:

            Where do you guys get your algorithms from? Some
            algorithms have different variations and I personally
            don't really see any sources.

            Thanks,
            Ronnie

            
------------------------------------------------------------------------------
            Live Security Virtual Conference
            Exclusive live event will cover all the ways today's
            security and
            threat landscape has changed and how IT managers can
            respond. Discussions
            will include endpoint security, mobile security and the
            latest in malware
            threats.
            http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
            _______________________________________________
            Scikit-learn-general mailing list
            [email protected]
            <mailto:[email protected]>
            https://lists.sourceforge.net/lists/listinfo/scikit-learn-general


        Hi Ronnie,

        Could you give some examples? The algorithms I've coded have
        references to the original paper, and most algorithms should
        have them too.

        - Robert

--
        Public key at: http://pgp.mit.edu/ Search for this email
        address and select the key from "2011-08-19" (key id: 54BA8735)


        
------------------------------------------------------------------------------
        Live Security Virtual Conference
        Exclusive live event will cover all the ways today's security and
        threat landscape has changed and how IT managers can respond.
        Discussions
        will include endpoint security, mobile security and the latest
        in malware
        threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
        _______________________________________________
        Scikit-learn-general mailing list
        [email protected]
        <mailto:[email protected]>
        https://lists.sourceforge.net/lists/listinfo/scikit-learn-general



    
------------------------------------------------------------------------------
    Live Security Virtual Conference
    Exclusive live event will cover all the ways today's security and
    threat landscape has changed and how IT managers can respond.
    Discussions
    will include endpoint security, mobile security and the latest in
    malware
    threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
    _______________________________________________
    Scikit-learn-general mailing list
    [email protected]
    <mailto:[email protected]>
    https://lists.sourceforge.net/lists/listinfo/scikit-learn-general


Hi Ronnie,

Thanks for that.
The k-nearest neighbours is a fairly obvious algorithm I don't believe it is generally /cited/ in academic papers anymore. k-means is a bit similar (that does have a reference in the kmeans.py file), and Naive Bayes less so. Most of the files do have (sometimes poor) references in the "notes" section of the specific classes, but some of the ones you pointed to do not. Thanks for pointing that out!

It's hard to say exactly where to start. We generally point new contributors to the easyfix bugs in the bug tracker: https://github.com/scikit-learn/scikit-learn/issues?direction=desc&labels=EasyFix&page=1&sort=created&state=open If you aren't a very strong coder, you could learn a lot by helping us review pull requests (this is true even if you are a strong coder). If you really aren't a strong coder, start with the documentation and examples - do all the examples work? Do the tutorials make sense? If you *are* a strong coder, this issue (https://github.com/scikit-learn/scikit-learn/issues/339) may be a good spot to start -- some of the tests are slow, which makes building annoying. We have improved significantly and have a test suite which is very useful: http://jenkins-scikit-learn.github.com/scikit-learn-speed/

Thanks!

- Robert


--

Public key at: http://pgp.mit.edu/ Search for this email address and select the key from "2011-08-19" (key id: 54BA8735)



------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and
threat landscape has changed and how IT managers can respond. Discussions
will include endpoint security, mobile security and the latest in malware
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/


_______________________________________________
Scikit-learn-general mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/scikit-learn-general

------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
Scikit-learn-general mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/scikit-learn-general

Reply via email to