You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I've corrected a few comma errors and properly formatted some nouns (e.g., correcting "Scipy" to "SciPy" or italicizing a television show name), thus making the text impervious to assaults from future grammarians.
Copy file name to clipboardExpand all lines: README.md
+15-15Lines changed: 15 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,13 +32,13 @@ Interactive notebooks + examples can be downloaded by cloning! )
32
32
*[**Prologue:**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Prologue/Prologue.ipynb) Why we do it.
33
33
34
34
*[**Chapter 1: Introduction to Bayesian Methods**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter1_Introduction/Chapter1_Introduction.ipynb)
35
-
Introduction to the philosophy and practice of Bayesian methods and answering the question "What is probabilistic programming?" Examples include:
36
-
- Inferring human behaviour changes from text message rates.
35
+
Introduction to the philosophy and practice of Bayesian methods and answering the question, "What is probabilistic programming?" Examples include:
36
+
- Inferring human behaviour changes from text message rates
37
37
38
38
*[**Chapter 2: A little more on PyMC**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter2_MorePyMC/MorePyMC.ipynb)
39
39
We explore modeling Bayesian problems using Python's PyMC library through examples. How do we create Bayesian models? Examples include:
40
-
- Detecting the frequency of cheating students, while avoiding liars.
41
-
- Calculating probabilities of the Challenger space-shuttle disaster.
40
+
- Detecting the frequency of cheating students, while avoiding liars
41
+
- Calculating probabilities of the Challenger space-shuttle disaster
42
42
43
43
*[**Chapter 3: Opening the Black Box of MCMC**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter3_MCMC/IntroMCMC.ipynb)
44
44
We discuss how MCMC operates and diagnostic tools. Examples include:
@@ -50,21 +50,21 @@ Interactive notebooks + examples can be downloaded by cloning! )
50
50
- How to sort Reddit comments from best to worst (not as easy as you think)
51
51
52
52
*[**Chapter 5: Would you rather lose an arm or a leg?**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter5_LossFunctions/LossFunctions.ipynb)
53
-
The introduction of Loss functions and their (awesome) use in Bayesian methods. Examples include:
54
-
- Solving the Price is Right's Showdown
53
+
The introduction of loss functions and their (awesome) use in Bayesian methods. Examples include:
54
+
- Solving the *Price is Right*'s Showdown
55
55
- Optimizing financial predictions
56
-
- Winning solution to the Kaggle Dark World's competition.
56
+
- Winning solution to the Kaggle Dark World's competition
Probably the most important chapter. We draw on expert opinions to answer questions. Examples include:
60
60
- Multi-Armed Bandits and the Bayesian Bandit solution.
61
-
-what is the relationship between data sample size and prior?
62
-
-estimating financial unknowns using expert priors.
61
+
-What is the relationship between data sample size and prior?
62
+
-Estimating financial unknowns using expert priors
63
63
64
-
We explore useful tips to be objective in analysis, and common pitfalls of priors.
64
+
We explore useful tips to be objective in analysis as well as common pitfalls of priors.
65
65
66
66
***Chapter X1: Bayesian methods in Machine Learning and Model Validation**
67
-
We explore how to resolve the overfitting problem plus popular ML methods. Also included are probablistic explainations of Ridge Regression and LASSO Regression.
67
+
We explore how to resolve the overfitting problem plus popular ML methods. Also included are probablistic explainations of ridge regression and LASSO regression.
68
68
- Tim Saliman's winning solution to Kaggle's *Don't Overfit* problem
69
69
70
70
***Chapter X2: More PyMC Hackery**
@@ -86,7 +86,7 @@ The book can be read in three different ways, starting from most recommended to
86
86
chapters in your browser *plus* edit and run the code provided (and try some practice questions). This is the preferred option to read
87
87
this book, though it comes with some dependencies.
88
88
- IPython 0.13 is a requirement to view the ipynb files. It can be downloaded [here](http://ipython.org/)
89
-
- For Linux users, you should not have a problem installing Numpy, Scipy, Matplotlib and PyMC. For Windows users, check out [pre-compiled versions](http://www.lfd.uci.edu/~gohlke/pythonlibs/) if you have difficulty.
89
+
- For Linux users, you should not have a problem installing NumPy, SciPy, Matplotlib and PyMC. For Windows users, check out [pre-compiled versions](http://www.lfd.uci.edu/~gohlke/pythonlibs/) if you have difficulty.
90
90
- In the styles/ directory are a number of files (.matplotlirc) that used to make things pretty. These are not only designed for the book, but they offer many improvements over the default settings of matplotlib and the IPython notebook.
91
91
- while technically not required, it may help to run the IPython notebook with `--pylab inline` if you encounter runtime errors.
92
92
2. The second, preferred, option is to use the nbviewer.ipython.org site, which display IPython notebooks in the browser ([example](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter1_Introduction/Chapter1_Introduction.ipynb)).
@@ -99,7 +99,7 @@ Installation and configuration
99
99
------
100
100
If you would like to run the IPython notebooks locally, (option 1. above), you'll need to install the following:
101
101
- IPython 0.13 is a requirement to view the ipynb files. It can be downloaded [here](http://ipython.org/ipython-doc/dev/install/index.html)
102
-
- For Linux users, you should not have a problem installing Numpy, Scipy and PyMC. For Windows users, check out [pre-compiled versions](http://www.lfd.uci.edu/~gohlke/pythonlibs/) if you have difficulty.
102
+
- For Linux users, you should not have a problem installing NumPy, SciPy and PyMC. For Windows users, check out [pre-compiled versions](http://www.lfd.uci.edu/~gohlke/pythonlibs/) if you have difficulty.
103
103
- also recommended, for data-mining exercises, are [PRAW](https://github.com/praw-dev/praw) and [requests](https://github.com/kennethreitz/requests).
104
104
105
105
- In the styles/ directory are a number of files that are customized for the notebook.
@@ -120,11 +120,11 @@ Authors submit content or revisions using the GitHub interface.
120
120
121
121
- The current chapter list is not finalized. If you see something that is missing (MCMC, MAP, Bayesian networks, good prior choices, Potential classes etc.),
122
122
feel free to start there.
123
-
- Cleaning up Python code and making code more PyMC-esque.
123
+
- Cleaning up Python code and making code more PyMC-esque
0 commit comments