Bayesian Methods for Hackers : An intro to Bayesian methods + probabilistic programming with a computation/understanding-first, mathematics-second point of view.
M. Kwiatkowska, G. Norman, and D. Parker. Computer Performance Evaluation: Modelling Techniques and Tools, page 200--204. Berlin, Heidelberg, Springer Berlin Heidelberg, (2002)
I. Chatzigiannakis, S. Dolev, S. Fekete, O. Michail, and P. Spirakis. In 13th International Conference on Principles of Distributed Systems (OPODIS), volume 5923 of Lecture Notes in Computer Science, page 33--47. Springer-Verlag, (2009)
M. Goodrich. Proceedings of the Twenty-first Annual ACM-SIAM Symposium on Discrete Algorithms, page 1262--1277. Philadelphia, PA, USA, Society for Industrial and Applied Mathematics, (2010)
Y. Han, and J. Tang. Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, page 407--416. New York, NY, USA, ACM, (2015)
G. Krempl, D. Kottke, and M. Spiliopoulou. Proceedings of the 21st European Conference on Artificial Intelligence (ECAI2014), August 18 -- 22, 2014, Prague, Czech Republic, volume 263 of Frontiers in Artificial Intelligence and Applications, IOS Press, (2014)