|
55 | 55 | "\n", |
56 | 56 | "* [**Prologue:**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Prologue/Prologue.ipynb) Why we do it.\n", |
57 | 57 | "\n", |
58 | | - "* [**Chapter 1: Introduction to Bayesian Methods**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter1_Introduction/Chapter1_Introduction.ipynb)\n", |
| 58 | + "* [**Chapter 1: Introduction to Bayesian Methods**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter1_Introduction/Chapter1.ipynb)\n", |
59 | 59 | " Introduction to the philosophy and practice of Bayesian methods and answering the question \"What is probabilistic programming?\" Examples include:\n", |
60 | 60 | " - Inferring human behaviour changes from text message rates.\n", |
61 | 61 | " \n", |
62 | | - "* [**Chapter 2: A little more on PyMC**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter2_MorePyMC/MorePyMC.ipynb)\n", |
| 62 | + "* [**Chapter 2: A little more on PyMC**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter2_MorePyMC/Chapter2.ipynb)\n", |
63 | 63 | " We explore modeling Bayesian problems using Python's PyMC library through examples. How do we create Bayesian models? Examples include:\n", |
64 | 64 | " - Detecting the frequency of cheating students, while avoiding liars.\n", |
65 | 65 | " - Calculating probabilities of the Challenger space-shuttle disaster.\n", |
66 | 66 | " \n", |
67 | | - "* [**Chapter 3: Opening the Black Box of MCMC**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter3_MCMC/IntroMCMC.ipynb)\n", |
| 67 | + "* [**Chapter 3: Opening the Black Box of MCMC**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter3_MCMC/Chapter3.ipynb)\n", |
68 | 68 | " We discuss how MCMC operates and diagnostic tools. Examples include:\n", |
69 | 69 | " - Bayesian clustering with mixture models\n", |
70 | 70 | " \n", |
71 | | - "* [**Chapter 4: The Greatest Theorem Never Told**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter4_TheGreatestTheoremNeverTold/LawOfLargeNumbers.ipynb)\n", |
| 71 | + "* [**Chapter 4: The Greatest Theorem Never Told**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter4_TheGreatestTheoremNeverTold/Chapter4.ipynb)\n", |
72 | 72 | " We explore an incredibly useful, and dangerous, theorem: The Law of Large Numbers. Examples include:\n", |
73 | 73 | " - Exploring a Kaggle dataset and the pitfalls of naive analysis\n", |
74 | 74 | " - How to sort Reddit comments from best to worst (not as easy as you think)\n", |
75 | 75 | " \n", |
76 | | - "* [**Chapter 5: Would you rather loss an arm or a leg?**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter5_LossFunctions/LossFunctions.ipynb)\n", |
| 76 | + "* [**Chapter 5: Would you rather loss an arm or a leg?**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter5_LossFunctions/Chapter5.ipynb)\n", |
77 | 77 | " The introduction of Loss functions and their (awesome) use in Bayesian methods. Examples include:\n", |
78 | 78 | " - Solving the Price is Right's Showdown\n", |
79 | 79 | " - Optimizing financial predictions\n", |
80 | 80 | " - Winning solution to the Kaggle Dark World's competition.\n", |
81 | 81 | " \n", |
82 | | - "* [**Chapter 6: Getting our *prior*-ities straight**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter6_Priorities/Priors.ipynb)\n", |
| 82 | + "* [**Chapter 6: Getting our *prior*-ities straight**](http://nbviewer.ipython.org/urls/raw.github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/master/Chapter6_Priorities/Chapter6.ipynb)\n", |
83 | 83 | " Probably the most important chapter. We draw on expert opinions to answer questions. Examples include:\n", |
84 | 84 | " - Multi-Armed Bandits and the Bayesian Bandit solution.\n", |
85 | 85 | " - what is the relationship between data sample size and prior?\n", |
|
0 commit comments