Skip to content

Commit 710eca3

Browse files
README
1 parent 1639e19 commit 710eca3

File tree

1 file changed

+18
-18
lines changed

1 file changed

+18
-18
lines changed

README.md

Lines changed: 18 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -21,31 +21,31 @@ Contents
2121

2222
(This is all rendered via the *nbviewer* is is read-only. Editable notebooks + examples can be downloaded too by forking! )
2323

24-
1. [Chapter 1: Introduction to Bayesian Methods](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter1_Introduction/Chapter1_Introduction.ipynb)
25-
Introduction to the philosophy and practice of Bayesian methods and answering the question "What is probabilistic programming?"
26-
1. Example: Inferring human behaviour changes from text message rates.
24+
1. [**Chapter 1: Introduction to Bayesian Methods**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter1_Introduction/Chapter1_Introduction.ipynb)
25+
Introduction to the philosophy and practice of Bayesian methods and answering the question "What is probabilistic programming?" Examples include:
26+
- Inferring human behaviour changes from text message rates.
2727

28-
2. [Chapter 2: A little more on PyMC](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter2_MorePyMC/MorePyMC.ipynb)
29-
We explore modeling Bayesian problems using Python's PyMC library through examples. How do we create Bayesian models?
30-
1. Example: Definitive linking between smoking and death.
31-
2. Example: Calculating probabilities of space-shuttle disasters.
28+
2. [**Chapter 2: A little more on PyMC**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter2_MorePyMC/MorePyMC.ipynb)
29+
We explore modeling Bayesian problems using Python's PyMC library through examples. How do we create Bayesian models? Examples include:
30+
- Definitive linking between smoking and death.
31+
- Calculating probabilities of space-shuttle disasters.
3232

33-
3. [Chapter 3: Opening the Black Box of MCMC](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter3_MCMC/IntroMCMC.ipynb)
33+
3. [**Chapter 3: Opening the Black Box of MCMC**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter3_MCMC/IntroMCMC.ipynb)
3434
We discuss how MCMC operates and diagnostic tools.
3535

36-
4. [Chapter 4: The Greatest Theorem Never Told](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter4_TheGreatestTheoremNeverTold/LawOfLargeNumbers.ipynb)
37-
We explore an incredibly useful, and dangerous, theorem: The Law of Large Numbers
38-
1. Example: Exploring a Kaggle dataset and the pitfalls of naive analysis
36+
4. [**Chapter 4: The Greatest Theorem Never Told**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter4_TheGreatestTheoremNeverTold/LawOfLargeNumbers.ipynb)
37+
We explore an incredibly useful, and dangerous, theorem: The Law of Large Numbers. Examples include:
38+
- Exploring a Kaggle dataset and the pitfalls of naive analysis
3939

40-
5. [Chapter 5: Would you rather loss an arm or a leg?](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter5_/LossFunctions.ipynb)
41-
The introduction of Loss functions and there (awesome) use in Bayesian methods.
42-
1. Example: Solving the Price is Right's Showdown
43-
2. Example: Optimizing financial predictions
44-
3. Example: Winning solution to the Kaggle Dark World's competition.
40+
5. [**Chapter 5: Would you rather loss an arm or a leg?**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter5_/LossFunctions.ipynb)
41+
The introduction of Loss functions and there (awesome) use in Bayesian methods. Examples include:
42+
- Example: Solving the Price is Right's Showdown
43+
- Example: Optimizing financial predictions
44+
- Example: Winning solution to the Kaggle Dark World's competition.
4545

4646
10\. Chapter 10: More PyMC Hackery
47-
We explore the gritty details of PyMC through code and examples.
48-
1. Example: Analysis on real-time GitHub repo stars and forks.
47+
We explore the gritty details of PyMC through code and examples. Examples include:
48+
- Example: Analysis on real-time GitHub repo stars and forks.
4949

5050

5151
Using the book

0 commit comments

Comments
 (0)