-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

~  turns out I don't need to look at the C code.

~  if one uses the mu/size parameterization of the
negative binomial, R computes size/(size+mu) to
switch parameterizations.  If size>>mu this
gets rounded to 1 ... should be easy enough
to test and return NA under these circumstances?

function (x, size, prob, mu, log = FALSE)
{
~    if (!missing(mu)) {
~        if (!missing(prob))
~            stop("'prob' and 'mu' both specified")
~        prob <- size/(size + mu)
~    }
~    .Internal(dnbinom(x, size, prob, log))
}

~  Ben Bolker


- --------------------------
~  Check it out:

curve(dnbinom(1,mu=0.5,size=x),log="x",from=1,to=1e18)
abline(h=dpois(1,lambda=0.5),col=2,lty=2)
text(1,dpois(1,lambda=0.5)+0.02,"Poisson",col=2,pos=4)

~  I will take a look in the C code when I get
a chance to see if I can offer
a patch, but in the meantime wanted to alert people to
this "feature" ...  (it looks like I will have to go
through dnbinom and dbinom_raw to see where the problem
is ...)

~   Ben Bolker

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFIbYyRc5UpGjwzenMRAh57AJ49SUuWs1++D7sacUnFZud2MAROhACfThzD
OmM9WuuFZrk4kO1s9MafLlk=
=wzaH
-----END PGP SIGNATURE-----

______________________________________________
R-devel@r-project.org mailing list
https://stat.ethz.ch/mailman/listinfo/r-devel

Reply via email to