Skip to content

Commit c463261

Browse files
adding section on printed BMH + differences
1 parent 9bdc36a commit c463261

File tree

2 files changed

+21
-9
lines changed

2 files changed

+21
-9
lines changed

Chapter1_Introduction/Chapter1.ipynb

Lines changed: 9 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -4,13 +4,16 @@
44
"cell_type": "markdown",
55
"metadata": {},
66
"source": [
7-
"Probabilistic Programming\n",
8-
"=====\n",
9-
"and Bayesian Methods for Hackers \n",
7+
"Probabilistic Programming and Bayesian Methods for Hackers \n",
108
"========\n",
119
"\n",
12-
"##### Version 0.1\n",
13-
"Welcome to *Bayesian Methods for Hackers*. The full Github repository is available at [github/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers](https://github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers). The other chapters can be found on the project's [homepage](https://camdavidsonpilon.github.io/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/). We hope you enjoy the book, and we encourage any contributions!"
10+
"Welcome to *Bayesian Methods for Hackers*. The full Github repository is available at [github/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers](https://github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers). The other chapters can be found on the project's [homepage](https://camdavidsonpilon.github.io/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/). We hope you enjoy the book, and we encourage any contributions!\n",
11+
"\n",
12+
"#### Looking for a printed version of Bayesian Methods for Hackers?\n",
13+
"\n",
14+
"_Bayesian Methods for Hackers_ is now a published book by Addison-Wesley, available on [Amazon](http://www.amazon.com/Bayesian-Methods-Hackers-Probabilistic-Addison-Wesley/dp/0133902838)! \n",
15+
"\n",
16+
"![BMH](http://www-fp.pearsonhighered.com/assets/hip/images/bigcovers/0133902838.jpg)"
1417
]
1518
},
1619
{
@@ -1123,7 +1126,7 @@
11231126
"name": "python",
11241127
"nbconvert_exporter": "python",
11251128
"pygments_lexer": "ipython2",
1126-
"version": "2.7.10"
1129+
"version": "2.7.9"
11271130
}
11281131
},
11291132
"nbformat": 4,

README.md

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,12 +2,10 @@
22
#### *Using Python and PyMC*
33

44

5-
6-
75
The Bayesian method is the natural approach to inference, yet it is hidden from readers behind chapters of slow, mathematical analysis. The typical text on Bayesian inference involves two to three chapters on probability theory, then enters what Bayesian inference is. Unfortunately, due to mathematical intractability of most Bayesian models, the reader is only shown simple, artificial examples. This can leave the user with a *so-what* feeling about Bayesian inference. In fact, this was the author's own prior opinion.
86

97

10-
<div style="float: right; margin-left: 30px;"><img title="created by Stef Gibson at StefGibson.com"style="float: right;margin-left: 30px;" src="http://i.imgur.com/6DKYbPb.png?1" align=right height = 350 /></div>
8+
<div style="float: right; margin-left: 30px;"><img title="created by Stef Gibson"style="float: right;margin-left: 30px;" src="http://i.imgur.com/6DKYbPb.png?1" align=right height = 350 /></div>
119

1210
After some recent success of Bayesian methods in machine-learning competitions, I decided to investigate the subject again. Even with my mathematical background, it took me three straight-days of reading examples and trying to put the pieces together to understand the methods. There was simply not enough literature bridging theory to practice. The problem with my misunderstanding was the disconnect between Bayesian mathematics and probabilistic programming. That being said, I suffered then so the reader would not have to now. This book attempts to bridge the gap.
1311

@@ -20,6 +18,17 @@ The choice of PyMC as the probabilistic programming language is two-fold. As of
2018
PyMC does have dependencies to run, namely NumPy and (optionally) SciPy. To not limit the user, the examples in this book will rely only on PyMC, NumPy, SciPy and Matplotlib only.
2119

2220

21+
Printed Version by Addison-Wesley
22+
------
23+
24+
**Bayesian Methods for Hackers is now available as a printed book!** You can pick up a copy on [Amazon](http://www.amazon.com/Bayesian-Methods-Hackers-Probabilistic-Addison-Wesley/dp/0133902838). What are the differences between the online version and the printed version?
25+
26+
<div style="float: right; margin-left: 30px;"><img title="created by Stef Gibson"style="float: right;margin-left: 30px;" src="http://www-fp.pearsonhighered.com/assets/hip/images/bigcovers/0133902838.jpg" align=right height = 350 /></div>
27+
28+
- Additional Chapter on Bayesian A/B testing
29+
- Updated examples
30+
- Answers to the end of chapter questions
31+
- Additional explaination, and rewritten sections to aid the reader.
2332

2433

2534
Contents

0 commit comments

Comments
 (0)