Active Tuples-based Scheme for Bounding Posterior Beliefs
نویسندگان
چکیده
The paper presents a scheme for computing lower and upper bounds on the posterior marginals in Bayesian networks with discrete variables. Its power lies in its ability to use any available scheme that bounds the probability of evidence or posterior marginals and enhance its performance in an anytime manner. The scheme uses the cutset conditioning principle to tighten existing bounding schemes and to facilitate anytime behavior, utilizing a fixed number of cutset tuples. The accuracy of the bounds improves as the number of used cutset tuples increases and so does the computation time. We demonstrate empirically the value of our scheme for bounding posterior marginals and probability of evidence using a variant of the bound propagation algorithm as a plug-in scheme.
منابع مشابه
An Anytime Scheme for Bounding Posterior Beliefs
This paper presents an any-time scheme for computing lower and upper bounds on posterior marginals in Bayesian networks. The scheme draws from two previously proposed methods, bounded conditioning (Horvitz, Suermondt, & Cooper 1989) and bound propagation (Leisink & Kappen 2003). Following the principles of cutset conditioning (Pearl 1988), our method enumerates a subset of cutset tuples and app...
متن کاملAn Anytime Boosting Scheme for Bounding Posterior Beliefs
This paper presents an any-time scheme for computing lower and upper bounds on the posterior marginals in Bayesian networks with discrete variables. Its power is in that it can use any available scheme that bounds the probability of evidence, enhance its performance in an anytime manner, and transform it effectively into bounds for posterior marginals. The scheme is novel in that using the cuts...
متن کاملMetacognitive Beliefs and Students’ Tendency toward Drug Abbuse and Cross-level Effect of School-Bounding
Objective: The present research aimed to examine positive and negative beliefs about worry and tendency of students to drug abuse in terms of cross-level effect of school-bounding. Methods: In this multi-level investigation, 1000 students of high schools were selected by means of multi-stage sampling technique. Then, they completed metacognitive questionnaire (MCQ), school-bound...
متن کاملA Formal Approach to Distance-Bounding RFID Protocols
Distance-Bounding identification protocols aim at impeding man-in-themiddle attacks by measuring response times. There are three kinds of attacks such protocols could address: (1) Mafia attacks where the adversary relays communication between honest prover and honest verifier in different sessions; (2) Terrorist attacks where the adversary gets limited active support from the prover to imperson...
متن کاملModel Predictive Control of Distributed Energy Resources with Predictive Set-Points for Grid-Connected Operation
This paper proposes an MPC - based (model predictive control) scheme to control active and reactive powers of DERs (distributed energy resources) in a grid - connected mode (either through a bus with its associated loads as a PCC (point of common coupling) or an MG (micro - grid)). DER may be a DG (distributed generation) or an ESS (energy storage system). In the proposed scheme, the set - poin...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- J. Artif. Intell. Res.
دوره 39 شماره
صفحات -
تاریخ انتشار 2010