|
55 | 55 | "\n",
|
56 | 56 | "* [**Prologue:**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Prologue/Prologue.ipynb) Why we do it.\n",
|
57 | 57 | "\n",
|
58 |
| - "* [**Chapter 1: Introduction to Bayesian Methods**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter1_Introduction/Chapter1_Introduction.ipynb)\n", |
| 58 | + "* [**Chapter 1: Introduction to Bayesian Methods**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter1_Introduction/Chapter1.ipynb)\n", |
59 | 59 | " Introduction to the philosophy and practice of Bayesian methods and answering the question \"What is probabilistic programming?\" Examples include:\n",
|
60 | 60 | " - Inferring human behaviour changes from text message rates.\n",
|
61 | 61 | " \n",
|
62 |
| - "* [**Chapter 2: A little more on PyMC**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter2_MorePyMC/MorePyMC.ipynb)\n", |
| 62 | + "* [**Chapter 2: A little more on PyMC**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter2_MorePyMC/Chapter2.ipynb)\n", |
63 | 63 | " We explore modeling Bayesian problems using Python's PyMC library through examples. How do we create Bayesian models? Examples include:\n",
|
64 | 64 | " - Detecting the frequency of cheating students, while avoiding liars.\n",
|
65 | 65 | " - Calculating probabilities of the Challenger space-shuttle disaster.\n",
|
66 | 66 | " \n",
|
67 |
| - "* [**Chapter 3: Opening the Black Box of MCMC**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter3_MCMC/IntroMCMC.ipynb)\n", |
| 67 | + "* [**Chapter 3: Opening the Black Box of MCMC**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter3_MCMC/Chapter3.ipynb)\n", |
68 | 68 | " We discuss how MCMC operates and diagnostic tools. Examples include:\n",
|
69 | 69 | " - Bayesian clustering with mixture models\n",
|
70 | 70 | " \n",
|
71 |
| - "* [**Chapter 4: The Greatest Theorem Never Told**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter4_TheGreatestTheoremNeverTold/LawOfLargeNumbers.ipynb)\n", |
| 71 | + "* [**Chapter 4: The Greatest Theorem Never Told**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter4_TheGreatestTheoremNeverTold/Chapter4.ipynb)\n", |
72 | 72 | " We explore an incredibly useful, and dangerous, theorem: The Law of Large Numbers. Examples include:\n",
|
73 | 73 | " - Exploring a Kaggle dataset and the pitfalls of naive analysis\n",
|
74 | 74 | " - How to sort Reddit comments from best to worst (not as easy as you think)\n",
|
75 | 75 | " \n",
|
76 |
| - "* [**Chapter 5: Would you rather loss an arm or a leg?**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter5_LossFunctions/LossFunctions.ipynb)\n", |
| 76 | + "* [**Chapter 5: Would you rather loss an arm or a leg?**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter5_LossFunctions/Chapter5.ipynb)\n", |
77 | 77 | " The introduction of Loss functions and their (awesome) use in Bayesian methods. Examples include:\n",
|
78 | 78 | " - Solving the Price is Right's Showdown\n",
|
79 | 79 | " - Optimizing financial predictions\n",
|
80 | 80 | " - Winning solution to the Kaggle Dark World's competition.\n",
|
81 | 81 | " \n",
|
82 |
| - "* [**Chapter 6: Getting our *prior*-ities straight**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter6_Priorities/Priors.ipynb)\n", |
| 82 | + "* [**Chapter 6: Getting our *prior*-ities straight**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter6_Priorities/Chapter6.ipynb)\n", |
83 | 83 | " Probably the most important chapter. We draw on expert opinions to answer questions. Examples include:\n",
|
84 | 84 | " - Multi-Armed Bandits and the Bayesian Bandit solution.\n",
|
85 | 85 | " - what is the relationship between data sample size and prior?\n",
|
|
0 commit comments