Title: Implementing and Approximating DempsterShafer Theory
1Implementing and ApproximatingDempster-Shafer
Theory
Rolf Haenni Computer Science Department University
of California, Los Angeles
Contents
1. Introduction 2. Implementing DS-Theory 3.
Incomplete Belief Potentials 4. Resource-Bounded
Approximation 5. Conclusion
21. Introduction
R. Haenni, N. Lehmann. Implementing Belief
Function Computations. Submitted to
International Journal of Intelligent Systems.
2002.
R. Haenni, N. Lehmann. Resource-Bounded and
Anytime Approximation of Belief Function
Computations. Submitted to Int. Journal of
Approx. Reasoning. 2002.
R. Haenni. Ordered Valuation Algebras a Generic
Framework for Approximating Inference. Submitted
to Artificial Intelligence. 2002.
R. Haenni, N. Lehmann. Probabilistic
Argumentation Systems a New Perspective on
Dempster- Shafer Theory. Submitted to Int.
Journal of Intelligent Systems. 2002.
3(No Transcript)
4(No Transcript)
52. Implementing DS-Theory
6Representing Focal Sets
1) List of vectors ? beyond practical
applicability
7Bit String Representation
8Regrouping
9Quasi-Projection
10(No Transcript)
113. Incomplete Belief Potentials
12(No Transcript)
13(No Transcript)
14(No Transcript)
15(No Transcript)
16(No Transcript)
174. Resource-Bounded Approximation
Example
- computation often infeasible
- effective running time is not predictable
18Resource-bounded combination
19Problem choose parameters t during propagation
(if the total time is restricted to T
milliseconds)
Solution share T equally among the nodes of the
join tree and redistribute unused portions
20Inward propagation
21Remarks
- the procedure stops after at most T milliseconds
- method relies on the assumption that the time for
marginalization is neglectable
- the same idea can be used for the outward
propagation phase
- a refining procedure exists for cases where the
accuracy of the results is not satisfactory (this
leads to convenient anytime algorithms)
225. Conclusion
- Important tools for implementing Dempster-Shafer
theory are bit strings, hash tables,
quasi-projection, fusion, and memoizing
- Incomplete belief potentials allow to approximate
belief and plausibility by lower and upper bounds
- The resource-bounded combination operator allows
to define inward and outward propagation as a
resource-bounded procedure
- Refining leads to convenient anytime algorithms
- Idea can be generalized for valuation algebras
(axioms)
23(No Transcript)