A method for evaluating elicitation schemes for probabilistic models

نویسندگان

  • Haiqin Wang
  • Denver Dash
  • Marek J. Druzdzel
چکیده

We present an objective approach for evaluating probability and structure elicitation methods in probabilistic models. The main idea is to use the model derived from the experts' experience rather than the true model as the standard to compare the elicited model. We describe a general procedure by which it is possible to capture the data corresponding to the expert's beliefs, and we present a simple experiment in which we utilize this technique to compare three methods for eliciting discrete probabilities: 1) direct numerical assessment, 2) the probability wheel, and 3) the scaled probability bar. We show that for our domain, the scaled probability bar is the most effective tool for probability elicitation.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Method for Evaluating Elicitation Schemes for Probabilities

We present an objective approach for evaluating probability elicitation methods in probabilistic models. Our method draws on ideas from research on learning Bayesian networks: if we assume that the expert’s knowledge is manifested essentially as a database of records that have been collected in the course of the expert’s experience, and if this database of records were available to us, then the...

متن کامل

Vote Elicitation with Probabilistic Preference Models: Empirical Estimation and Cost Tradeoffs

Abstract. A variety of preference aggregation schemes and voting rules have been developed in social choice to support group decision making. However, the requirement that participants provide full preference information in the form of a complete ranking of alternatives is a severe impediment to their practical deployment. Only recently have incremental elicitation schemes been proposed that al...

متن کامل

LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring

Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...

متن کامل

A Probabilistic Approach to Language Change

We present a probabilistic approach to language change in which word forms are represented by phoneme sequences that undergo stochastic edits along the branches of a phylogenetic tree. This framework combines the advantages of the classical comparative method with the robustness of corpus-based probabilistic models. We use this framework to explore the consequences of two different schemes for ...

متن کامل

یک الگوریتم سیل‌آسای مبتنی بر احتمال تطابقی برای شبکه‌های موردی سیار

Broadcasting is one of the most fundamental operations in mobile ad hoc networks. Broadcasting serves as a building block in many routing protocols. The simplest approach for broadcasting is flooding. However, it generates many redundant messages that cause to loss of scarce resources such bandwidth and battery powers and it may lead to contention, collision and extreme decrease of network perf...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IEEE transactions on systems, man, and cybernetics. Part B, Cybernetics : a publication of the IEEE Systems, Man, and Cybernetics Society

دوره 32 1  شماره 

صفحات  -

تاریخ انتشار 2002