0% found this document useful (0 votes)
78K views3 pages

TOC ML4Hackers

The table of contents for Machine Learning for Hackers

Uploaded by

Drew Conway
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
78K views3 pages

TOC ML4Hackers

The table of contents for Machine Learning for Hackers

Uploaded by

Drew Conway
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Table of Contents

Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
1. Using R . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
R loi Machine Leaining 2
Downloauing anu Installing R 5
IDEs anu Text Euitois S
Loauing anu Installing R Packages 9
R Basics loi Machine Leaining 12
Fuithei Reauing on R 27
2. Data Exploration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Exploiation veisus Conliimation 29
Vhat Is Data? 30
Inleiiing the Types ol Columns in Youi Data 3+
Inleiiing Meaning 36
Numeiic Summaiies 37
Means, Meuians, anu Moues 37
Quantiles +0
Stanuaiu Deviations anu Vaiiances +1
Exploiatoiy Data Visualization ++
Visualizing the Relationships Between Columns 61
3. Classification: Spam Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
This oi That: Binaiy Classilication 73
Moving Gently into Conuitional PioLaLility 77
Viiting Oui Fiist Bayesian Spam Classiliei 7S
Delining the Classiliei anu Testing It with Haiu Ham S5
Testing the Classiliei Against All Email Types SS
Impioving the Results 90
iii
4. Ranking: Priority Inbox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
How Do You Soit Something Vhen You Don`t Know the Oiuei? 93
Oiueiing Email Messages Ly Piioiity 95
Piioiity Featuies ol Email 95
Viiting a Piioiity InLox 99
Functions loi Extiacting the Featuie Set 100
Cieating a Veighting Scheme loi Ranking 10S
Veighting liom Email Thieau Activity 113
Tiaining anu Testing the Rankei 117
5. Regression: Predicting Page Views . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
Intiouucing Regiession 127
The Baseline Mouel 127
Regiession Using Dummy VaiiaLles 132
Lineai Regiession in a Nutshell 133
Pieuicting VeL Tiallic 1+1
Delining Coiielation 152
6. Regularization: Text Regression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
Nonlineai Relationships Between Columns: Beyonu Stiaight Lines 155
Intiouucing Polynomial Regiession 15S
Methous loi Pieventing Oveilitting 165
Pieventing Oveilitting with Regulaiization 169
Text Regiession 17+
Logistic Regiession to the Rescue 17S
7. Optimization: Breaking Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
Intiouuction to Optimization 1S3
Riuge Regiession 190
Coue Bieaking as Optimization 193
8. PCA: Building a Market Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
Unsupeiviseu Leaining 205
9. MDS: Visually Exploring US Senator Similarity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
Clusteiing Baseu on Similaiity 215
A Biiel Intiouuction to Distance Metiics anu Multiuiiectional Scaling 216
How Do US Senatois Clustei? 222
Analyzing US Senatoi Roll Call Data (101st111th Congiesses) 223
10. kNN: Recommendation Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
The -Neaiest NeighLois Algoiithm 233
iv | Table of Contents
R Package Installation Data 239
11. Analyzing Social Graphs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243
Social Netwoik Analysis 2+3
Thinking Giaphically 2+6
Hacking Twittei Social Giaph Data 2+S
Voiking with the Google SocialGiaph API 250
Analyzing Twittei Netwoiks 256
Local Community Stiuctuie 257
Visualizing the Clusteieu Twittei Netwoik with Gephi 261
Builuing Youi Own Vho to Follow Engine 267
12. Model Comparison . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
SVMs: The Suppoit Vectoi Machine 275
Compaiing Algoiithms 2S+
Works Cited . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295
Table of Contents | v

You might also like