Skip to content

Commit d77af86

Browse files
Merge pull request CamDavidsonPilon#244 from sausaw/patch-2
Fix links to chapters from 1-6
2 parents 7369463 + bab2569 commit d77af86

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

Prologue/Prologue.ipynb

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -55,31 +55,31 @@
5555
"\n",
5656
"* [**Prologue:**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Prologue/Prologue.ipynb) Why we do it.\n",
5757
"\n",
58-
"* [**Chapter 1: Introduction to Bayesian Methods**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter1_Introduction/Chapter1_Introduction.ipynb)\n",
58+
"* [**Chapter 1: Introduction to Bayesian Methods**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter1_Introduction/Chapter1.ipynb)\n",
5959
" Introduction to the philosophy and practice of Bayesian methods and answering the question \"What is probabilistic programming?\" Examples include:\n",
6060
" - Inferring human behaviour changes from text message rates.\n",
6161
" \n",
62-
"* [**Chapter 2: A little more on PyMC**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter2_MorePyMC/MorePyMC.ipynb)\n",
62+
"* [**Chapter 2: A little more on PyMC**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter2_MorePyMC/Chapter2.ipynb)\n",
6363
" We explore modeling Bayesian problems using Python's PyMC library through examples. How do we create Bayesian models? Examples include:\n",
6464
" - Detecting the frequency of cheating students, while avoiding liars.\n",
6565
" - Calculating probabilities of the Challenger space-shuttle disaster.\n",
6666
" \n",
67-
"* [**Chapter 3: Opening the Black Box of MCMC**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter3_MCMC/IntroMCMC.ipynb)\n",
67+
"* [**Chapter 3: Opening the Black Box of MCMC**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter3_MCMC/Chapter3.ipynb)\n",
6868
" We discuss how MCMC operates and diagnostic tools. Examples include:\n",
6969
" - Bayesian clustering with mixture models\n",
7070
" \n",
71-
"* [**Chapter 4: The Greatest Theorem Never Told**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter4_TheGreatestTheoremNeverTold/LawOfLargeNumbers.ipynb)\n",
71+
"* [**Chapter 4: The Greatest Theorem Never Told**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter4_TheGreatestTheoremNeverTold/Chapter4.ipynb)\n",
7272
" We explore an incredibly useful, and dangerous, theorem: The Law of Large Numbers. Examples include:\n",
7373
" - Exploring a Kaggle dataset and the pitfalls of naive analysis\n",
7474
" - How to sort Reddit comments from best to worst (not as easy as you think)\n",
7575
" \n",
76-
"* [**Chapter 5: Would you rather loss an arm or a leg?**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter5_LossFunctions/LossFunctions.ipynb)\n",
76+
"* [**Chapter 5: Would you rather loss an arm or a leg?**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter5_LossFunctions/Chapter5.ipynb)\n",
7777
" The introduction of Loss functions and their (awesome) use in Bayesian methods. Examples include:\n",
7878
" - Solving the Price is Right's Showdown\n",
7979
" - Optimizing financial predictions\n",
8080
" - Winning solution to the Kaggle Dark World's competition.\n",
8181
" \n",
82-
"* [**Chapter 6: Getting our *prior*-ities straight**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter6_Priorities/Priors.ipynb)\n",
82+
"* [**Chapter 6: Getting our *prior*-ities straight**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter6_Priorities/Chapter6.ipynb)\n",
8383
" Probably the most important chapter. We draw on expert opinions to answer questions. Examples include:\n",
8484
" - Multi-Armed Bandits and the Bayesian Bandit solution.\n",
8585
" - what is the relationship between data sample size and prior?\n",

0 commit comments

Comments
 (0)