|
48 | 48 | "\n",
|
49 | 49 | "* [**Prologue:**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Prologue/Prologue.ipynb) Why we do it.\n",
|
50 | 50 | "\n",
|
51 |
| - "* [**Chapter 1: Introduction to Bayesian Methods**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter1_Introduction/Chapter1.ipynb)\n", |
| 51 | + "* [**Chapter 1: Introduction to Bayesian Methods**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter1_Introduction/Ch1_Introduction_PyMC3.ipynb)\n", |
52 | 52 | " Introduction to the philosophy and practice of Bayesian methods and answering the question \"What is probabilistic programming?\" Examples include:\n",
|
53 | 53 | " - Inferring human behaviour changes from text message rates.\n",
|
54 | 54 | " \n",
|
55 |
| - "* [**Chapter 2: A little more on PyMC**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter2_MorePyMC/Chapter2.ipynb)\n", |
| 55 | + "* [**Chapter 2: A little more on PyMC**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter2_MorePyMC/Ch2_MorePyMC_PyMC3.ipynb)\n", |
56 | 56 | " We explore modeling Bayesian problems using Python's PyMC library through examples. How do we create Bayesian models? Examples include:\n",
|
57 | 57 | " - Detecting the frequency of cheating students, while avoiding liars.\n",
|
58 | 58 | " - Calculating probabilities of the Challenger space-shuttle disaster.\n",
|
59 | 59 | " \n",
|
60 |
| - "* [**Chapter 3: Opening the Black Box of MCMC**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter3_MCMC/Chapter3.ipynb)\n", |
| 60 | + "* [**Chapter 3: Opening the Black Box of MCMC**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter3_MCMC/Ch3_IntroMCMC_PyMC3.ipynb)\n", |
61 | 61 | " We discuss how MCMC operates and diagnostic tools. Examples include:\n",
|
62 | 62 | " - Bayesian clustering with mixture models\n",
|
63 | 63 | " \n",
|
64 |
| - "* [**Chapter 4: The Greatest Theorem Never Told**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter4_TheGreatestTheoremNeverTold/Chapter4.ipynb)\n", |
| 64 | + "* [**Chapter 4: The Greatest Theorem Never Told**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter4_TheGreatestTheoremNeverTold/Ch4_LawOfLargeNumbers_PyMC3.ipynb)\n", |
65 | 65 | " We explore an incredibly useful, and dangerous, theorem: The Law of Large Numbers. Examples include:\n",
|
66 | 66 | " - Exploring a Kaggle dataset and the pitfalls of naive analysis\n",
|
67 | 67 | " - How to sort Reddit comments from best to worst (not as easy as you think)\n",
|
68 | 68 | " \n",
|
69 |
| - "* [**Chapter 5: Would you rather loss an arm or a leg?**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter5_LossFunctions/Chapter5.ipynb)\n", |
| 69 | + "* [**Chapter 5: Would you rather loss an arm or a leg?**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter5_LossFunctions/Ch5_LossFunctions_PyMC3.ipynb)\n", |
70 | 70 | " The introduction of Loss functions and their (awesome) use in Bayesian methods. Examples include:\n",
|
71 | 71 | " - Solving the Price is Right's Showdown\n",
|
72 | 72 | " - Optimizing financial predictions\n",
|
73 | 73 | " - Winning solution to the Kaggle Dark World's competition.\n",
|
74 | 74 | " \n",
|
75 |
| - "* [**Chapter 6: Getting our *prior*-ities straight**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter6_Priorities/Chapter6.ipynb)\n", |
| 75 | + "* [**Chapter 6: Getting our *prior*-ities straight**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter6_Priorities/Ch6_Priors_PyMC3.ipynb)\n", |
76 | 76 | " Probably the most important chapter. We draw on expert opinions to answer questions. Examples include:\n",
|
77 | 77 | " - Multi-Armed Bandits and the Bayesian Bandit solution.\n",
|
78 | 78 | " - what is the relationship between data sample size and prior?\n",
|
79 | 79 | " - estimating financial unknowns using expert priors.\n",
|
80 | 80 | " \n",
|
81 | 81 | " We explore useful tips to be objective in analysis, and common pitfalls of priors. \n",
|
82 |
| - " \n", |
83 |
| - "* **Chapter X1: Bayesian Markov Models**\n", |
84 |
| - " \n", |
85 |
| - "* **Chapter X2: Bayesian methods in Machine Learning** \n", |
86 |
| - " We explore how to resolve the overfitting problem plus popular ML methods. Also included are probablistic explanations of Ridge Regression and LASSO Regression.\n", |
87 |
| - " - Bayesian spam filtering plus *how to defeat Bayesian spam filtering*\n", |
88 |
| - " - Tim Saliman's winning solution to Kaggle's *Don't Overfit* problem \n", |
89 |
| - " \n", |
90 |
| - "* **Chapter X3: More PyMC Hackery**\n", |
91 |
| - " We explore the gritty details of PyMC. Examples include:\n", |
92 |
| - " - Analysis on real-time GitHub repo stars and forks.\n", |
93 |
| - "\n", |
94 |
| - "* **Chapter X4: Troubleshooting and debugging**\n", |
95 |
| - "\n", |
| 82 | + " \n", |
96 | 83 | " \n",
|
97 | 84 | "**More questions about PyMC?**\n",
|
98 | 85 | "Please post your modeling, convergence, or any other PyMC question on [cross-validated](http://stats.stackexchange.com/), the statistics stack-exchange.\n",
|
|
291 | 278 | "name": "python",
|
292 | 279 | "nbconvert_exporter": "python",
|
293 | 280 | "pygments_lexer": "ipython2",
|
294 |
| - "version": "2.7.10" |
| 281 | + "version": "2.7.11" |
295 | 282 | }
|
296 | 283 | },
|
297 | 284 | "nbformat": 4,
|
|
0 commit comments