Contact
CoCalc Logo Icon
StoreFeaturesDocsShareSupport News AboutSign UpSign In
| Download
Views: 3200
1
# Bayesian Methods for Hackers Layout
2
3
\section{ Preamble}
4
5
6
\chapter1{ Introduction }
7
8
9
\chapter2{More PyMC / Modeling in PyMC}
10
#flexible about what this section is. Basically it's more intro to the
11
syntax of PyMC, with examples + distributions.
12
13
\chapter3{ Intro to MCMC and Diagnogstics }
14
15
16
\chapter4{ The greatest theorem never told }
17
#This is about the law of large numbers and how a bayesian uses it for estimates.
18
19
20
21
\chapter5{ Would you rather lose an arm or a leg? }
22
#Introduction to loss functions and point estimation.
23
24
25
26
>>>>>>>>>
27
Below is subject to change
28
29
\chapter6{What should my prior look like?}
30
\subsection{Noninformative priors...}
31
\subsection{Noninformative priors do not exist}
32
\subsection{Good choices of priors }
33
34
\chapter7{ Bayesian Networks }
35
#I do not know too much about this.
36
37
38
\chapter8{ Gaussian Processes }
39
# pymc.gp
40
41
42
\chapter9{ Large Scale systems }
43
#how can we scale PyMC to larger systems/datasets?
44
45
\chapter10{More hacking with PyMC}
46
#some examples from PyMC.
47
# Potential class?
48
49
50
51
52
\section{Appendix}
53
\subsection{A}
54
#Chart of distributions and their support
55
\subsection{B}
56
#Appendix on MCMC
57
\section{C}
58
#Proofs
59
60