Open lorenzwalthert opened 3 years ago
You mean the significance marker on +.25 +3.25%?
We actually don't calculate anything (we could ofc do t.test and check p value) but rather check if the confidence interval contains zero or not (as you laid out in the doc). And this meets the requirements.
Not the marker, but the result itself. This PR has no speed implications and our confidence interval is not overlapping with 0. If our computation is correct, this should happen once in a blue moon, but I’ve seen it already more than once.
Hm I haven't touched that part of the code yet but I can have a look.
it's a linear model. Nothing fancy. Maybe it was just chance. But let's keep an eye on this.
It is a blue moon: https://github.com/kgoldfeld/simstudy/pull/122
tangential to this issue: I have started a little project to collect data about GHA benchmarking, we could also use it to check this issue. You can have a look here https://github.com/assignUser/touchstone.collect the data is stored on the data branch.
On another tangent: while working on the project above I streamlined the github action for benchmarking and commenting into a single yaml and without using the cancle action: https://github.com/assignUser/simstudy/blob/new-gha/.github/workflows/touchstone-receive.yaml Should I PR that?
Re one action: I don't think it's documented (apart maybe got commits, PRs) but the reason there are two actions is purely security. It used to be one, but it is gauged unsafe:
https://securitylab.github.com/research/github-actions-preventing-pwn-requests/
You can always open an issue and ask questions about the current design and challenge it. This will only iMovie Code quality. There are no stupid questions. I just did not expect anyone to contribute to {touchstone} so soon, but I am glad we are two now. 😊
Re: {touchstone.collect}, cool. I am not sure I fully understand, but I'll watch this space.
Re one action: I don't think it's documented (apart maybe got commits, PRs) but the reason there are two actions is purely security. It used to be one, but it is gauged unsafe:
https://securitylab.github.com/research/github-actions-preventing-pwn-requests/
Interesting read, thanks for the link! There is a comment about tokens at the top of the commen yaml, now I understand. My file would fail for PRs from outside of the repo due to the missing secret access. I'll add that as a document to do.
{touchstone.collect}: I wanted to have some data/graphs to show the inconsistency in runner performance you mention anecdotally in the doc, possibly to add some meat to a JOSS paper. But I also have a benchmark in there with the same speed in both branches, so we could use that data to investigate this issue or test/dial in another way to analyse or display the results.
I just looked at https://github.com/kgoldfeld/simstudy/pull/129 And I wondered if the users could be a able to specify a threshold himself for the icon. Does it always make sense to check if 0 is contained? One could argue that a ci that contains a 1% performance drop is still not enough to justify a 🐌 icon, so if the user specifies a custom value for null_boundary
(Better name needed I think ), we check if the confidence interval overlaps with it.
The following seems suspicious: