Implementing and Approximating DempsterShafer Theory - PowerPoint PPT Presentation

1 / 23
About This Presentation
Title:

Implementing and Approximating DempsterShafer Theory

Description:

Normalized degree of incompleteness: Theorem 4: (normalized plausibility) ... Theorem 5: (combination preserves incompleteness) ... – PowerPoint PPT presentation

Number of Views:86
Avg rating:3.0/5.0
Slides: 24
Provided by: Rolfh6
Category:

less

Transcript and Presenter's Notes

Title: Implementing and Approximating DempsterShafer Theory


1
Implementing and ApproximatingDempster-Shafer
Theory
Rolf Haenni Computer Science Department University
of California, Los Angeles
Contents
1. Introduction 2. Implementing DS-Theory 3.
Incomplete Belief Potentials 4. Resource-Bounded
Approximation 5. Conclusion
2
1. Introduction
R. Haenni, N. Lehmann. Implementing Belief
Function Computations. Submitted to
International Journal of Intelligent Systems.
2002.
R. Haenni, N. Lehmann. Resource-Bounded and
Anytime Approximation of Belief Function
Computations. Submitted to Int. Journal of
Approx. Reasoning. 2002.
R. Haenni. Ordered Valuation Algebras a Generic
Framework for Approximating Inference. Submitted
to Artificial Intelligence. 2002.
R. Haenni, N. Lehmann. Probabilistic
Argumentation Systems a New Perspective on
Dempster- Shafer Theory. Submitted to Int.
Journal of Intelligent Systems. 2002.
3
(No Transcript)
4
(No Transcript)
5
2. Implementing DS-Theory
6
Representing Focal Sets
1) List of vectors ? beyond practical
applicability
7
Bit String Representation
8
Regrouping
9
Quasi-Projection
10
(No Transcript)
11
3. Incomplete Belief Potentials
12
(No Transcript)
13
(No Transcript)
14
(No Transcript)
15
(No Transcript)
16
(No Transcript)
17
4. Resource-Bounded Approximation
Example
  • computation often infeasible
  • effective running time is not predictable

18
Resource-bounded combination
19
Problem choose parameters t during propagation
(if the total time is restricted to T
milliseconds)
Solution share T equally among the nodes of the
join tree and redistribute unused portions
20
Inward propagation
21
Remarks
  • the procedure stops after at most T milliseconds
  • method relies on the assumption that the time for
    marginalization is neglectable
  • the same idea can be used for the outward
    propagation phase
  • a refining procedure exists for cases where the
    accuracy of the results is not satisfactory (this
    leads to convenient anytime algorithms)

22
5. Conclusion
  • Important tools for implementing Dempster-Shafer
    theory are bit strings, hash tables,
    quasi-projection, fusion, and memoizing
  • Incomplete belief potentials allow to approximate
    belief and plausibility by lower and upper bounds
  • The resource-bounded combination operator allows
    to define inward and outward propagation as a
    resource-bounded procedure
  • Refining leads to convenient anytime algorithms
  • Idea can be generalized for valuation algebras
    (axioms)

23
(No Transcript)
Write a Comment
User Comments (0)
About PowerShow.com