Bayesian ignorance

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Circumscriptive Ignorance

In formal systems that reason about knowledge, inferring that an agent actually does not know a particular fact can be problematic. Collins [l] has shown that there are many different modes of reasoning that a subject can use to show that he is ignorant of something; some of these, for example, involve the subject reasoning about the limitations of his own information-gathering and memory abili...

متن کامل

On the detection of Lorentzian profiles in a power spectrum: A Bayesian approach using ignorance priors

Aims. Deriving accurate frequencies, amplitudes, and mode lifetimes from stochastically driven pulsation is challenging, more so, if one demands that realistic error estimates be given for all model fitting parameters. As has been shown by other authors, the traditional method of fitting Lorentzian profiles to the power spectrum of time-resolved photometric or spectroscopic data via the Maximum...

متن کامل

Does ignorance of the whole imply ignorance of the parts?

In this appendix, we provide a detailed derivation of our results. To this end, we first provide some more detailed background on the entropic quantities we use in Section I. In Section II we show that the splitting inequality (16) is satisfied in any deterministic non-contextual hidden variable model (NC-HV model for short). This is a minor twist on the existing classical proof [1] due to Wull...

متن کامل

Exploiting User Ignorance

A browser is considered to be a functional window to the Internet. It is interface software that serves as a communication medium between the users and the Internet. Sophisticated attack patterns and design flaws in browsers pose serious threats to user security, privacy, and integrity. Recent advancements have shown that browser User Interface (UI) design flaws catalyze the vulnerability explo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Theoretical Computer Science

سال: 2012

ISSN: 0304-3975

DOI: 10.1016/j.tcs.2012.05.017