RADAR Oxford Brookes University Research Archive and Digital Asset Repository (RADAR)

Size: px
Start display at page:

Download "RADAR Oxford Brookes University Research Archive and Digital Asset Repository (RADAR)"

Transcription

1 RADAR Oxford Brookes University Research Archive and Digital Asset Repository (RADAR) Cuzzolin, F Alternative formulations of the theory of evidence ased on asic plausiility and commonality assignments. Cuzzolin, F (2008) Alternative formulations of the theory of evidence ased on asic plausiility and commonality assignments. In: PRICAI 2008: Trends in Artificial Intelligence 10th Pacific Rim International Conference on Artificial Intelligence, Hanoi, Vietnam, Decemer 15 19, Proceedings,, Springer Berlin / Heidelerg. pp Doi: / _12 This version is availale: 516c 5a6 069d 52c4139f66c0/1/ Availale in the RADAR: May 2011 Copyright and Moral Rights are retained y the author(s) and/ or other copyright owners. A copy can e downloaded for personal non commercial research or study, without prior permission or charge. This item cannot e reproduced or quoted extensively from without first otaining permission in writing from the copyright holder(s). The content must not e changed in any way or sold commercially in any format or medium without the formal permission of the copyright holders. This document is thepostprint version of theconference paper. Some differences etween the pulished version and this version may remain and you are advised to consult the pulished version if you wish to cite from it. Directorate of Learning Resources

2 Alternative formulations of the theory of evidence ased on asic plausiility and commonality assignments Faio Cuzzolin INRIA Rhone-Alpes Astract. In this paper we introduce indeed two alternative formulations of the theory of evidence y proving that oth plausiility and commonality functions share the same cominatorial structure of sum function of elief functions, and computing their Moeius inverses called asic plausiility and commonality assignments. The equivalence of the associated formulations of the ToE is mirrored y the geometric congruence of the related simplices. Applications to the proailistic approximation prolem are riefly presented. 1 Introduction The theory of evidence (ToE) is one of the most popular uncertainty theory [1, 2], in which sujective proaility is represented y elief function (.f.) rather than a Bayesian mass distriution, assigning proaility values to sets of possiilities rather than single events. Variants or continuous extensions of the ToE in terms of hints [3] or allocations of proaility [4] have since een proposed. From a cominatorial point of view, in their finite incarnation,.f.s are sum functions, i.e. functions on the power set 2 Θ = {A Θ} of a finite domain Θ (A) = B A m (B) induced y a asic proaility assignment (.p.a.) m : 2 Θ [0, 1] which is cominatorially the Moeius inverse [5] of. The same evidence associated with a.f. is carried y the related plausiility (pl.f.) pl (A) = 1 (A c ) and commonality Q (A) = B A m (B) (comm.f.) functions, which lack though a similar coherent mathematical characterization. In this paper we introduce indeed two alternative formulations of the theory of evidence y proving that oth pl.f.s and comm.f.s share the same cominatorial structure of sum function, and computing their Moeius inverses which is natural to call asic plausiility and commonality assignments. We achieve this y resorting to a recent geometric approach to the theory of evidence [6] in which elief functions are represented y points of a Cartesian space. Besides giving the overall mathematical structure of the theory of evidence a more elegant symmetry, the notions of.pl.a.s and.comm.a.s turn out to e useful when solving prolems like finding proailistic approximations [7 9] of elief functions, or computing the canonical decomposition of support functions. Moreover, as they are discovered through geometric methods, asic plausiility and commonality

3 assignments inherit the same simplicial geometry as that of.f.s. The novel contriutions of this paper are then the proofs that: commonality functions have a Moeius inverse that we call asic commonality assignment (Theorem 1), the study of its properties and geometries (Theorems 2 and 3); the equivalence of the alternative formulations of the ToE is geometrically mirrored y the congruence of the corresponding simplices (Theorem 4); To support the usefulness of these alternative formulations, some applications of asic plausiility assignments to the approximation prolem are discussed. We first recall the asic notions of the ToE and its geometric approach. 2 Belief, plausiility, and commonality functions Even though elief functions can e given several alternative ut equivalent definitions in terms of multi-valued mappings, random sets [10, 11], inner measures [12], in Shafer s formulation [1] a central role is played y the notion of asic proaility assignment. A asic proaility assignment (.p.a.) over a finite set (frame of discernment [1]) Θ is a function m : 2 Θ [0, 1] on its power set 2 Θ = {A Θ} such that m( ) = 0, A Θ m(a) = 1, m(a) 0 A Θ. Susets of Θ associated with non-zero values of m are called focal elements. The elief function (.f.) : 2 Θ [0, 1] associated with a.p.a. m is (A) = B A m (B). (1) A finite proaility or Bayesian elief function is a special.f. assigning nonzero masses only to singletons : m (A) = 0, A > 1. Functions of the form (1) on a partially ordered set are called sum functions [5]. A elief function is then the sum function associated with a asic proaility assignment m on the partially ordered set (2 Θ, ). Conversely, the unique asic proaility assignment m associated with a given elief function can e recovered y means of the Moeius inversion formula m (A) = B A( 1) A B (B). (2) A sum function can e seen as the discrete counterpart of the indefinite integral in calculus, and Moeius inversion as the discrete counterpart of the derivative. A dual mathematical representation of the evidence encoded y a elief function is the plausiility function (pl.f.) pl : 2 Θ [0, 1], A pl (A), where pl (A) =. 1 (A c ) = 1 m (B) = m (B) B A c expresses the amount of evidence not against A. B A

4 A third mathematical model of the evidence carried y a.f. is represented y the commonality function (comm.f.) Q : 2 Θ [0, 1], A Q (A), where the commonality numer Q (A) can e interpreted as the amount of mass which can move freely through the entire event A, Q (A). = B A m (B). (3) Example. Let us consider a.f. on a frame of size 3, Θ = {x, y, z} with.p.a. (see Figure 1) m (x) = 1/3, m (Θ) = 2/3. The elief values of on all possile Θ m = 2/3 x m = 1/3 y A = {x,y} z Fig. 1. The elief function of the example has two focal elements, {x} and Θ. events of Θ are (Eq. 1): (x) = m (x) = 1/3, (y) = (z) = 0, (Θ) = m (x) + m (Θ) = 1, ({x, y}) = m (x) = 1/3, ({x, z}) = m (x) = 1/3, ({y, z}) = 0. To appreciate the difference etween elief, plausiility, and commonality let us consider in particular the event A = {x, y}. Its elief value ({x, y}) = A {x,y} m (A) = m (x) = 1/3 represents the amount of evidence which surely support {x, y} as it counts all the events which imply {x, y} On the other side, pl ({x, y}) = 1 ({x, y} c ) = 1 (z) = 1 measures the evidence not surely against it, as it counts all the events which no not imply its complement {x, y} c. Finally, the commonality numer Q ({x, y}) = A {x,y} m (A) = m (Θ) = 2/3 tells us which is the amount of evidence which can (possily) equally support each of the outcomes in {x, y} (i.e. x and y), as the evidence represented y events A {x, y} can focus on oth elements. 3 Two alternative formulations of the ToE As plausiility and commonality functions are oth equivalent representations of the evidence carried y a elief function, it is natural to guess that they should share the form of sum function on the power set 2 Θ. We can indeed use results and tools provided y the geometric interpretation of the ToE to develop alternative models of uncertainty which are parallel to the standard formulation of the ToE. Evidence is there represented y cumulating asic proailities on intervals of events {B A} (yielding a elief value (A) = B A m(b)). Equivalently we can represent pieces of evidence as asic

5 plausiility (commonality) assignments on the power set, and compute the related plausiility (commonality) set function y adding asic assignments over intervals. Let us first recall the geometry of elief measures. Belief space. A.f. : 2 Θ [0, 1] on a frame of discernment Θ is completely specified y its N 2 elief values {(A), A Θ}, N =. 2 Θ (since ( ) = 0, (Θ) = 1 always). It can then e represented as a point of R N 2 like = (A)v A A Θ where {v A : A Θ} is a reference frame in R N 2. The set of points B of R N 1 which correspond to a.f. is called elief space [6], i.e. the simplex B = Cl( A, A Θ), where A is the unique elief function assigning all the mass to a single suset A of Θ (A-th dogmatic elief function), and Cl denotes the convex closure operator: Cl( 1,..., k ) = { B : = α α k k, i α i = 1, α i 0 i}. The faces of a simplex Cl( 1,..., k ) are all possile simplices generated y a suset of its vertices. Each.f. B can e written as a convex sum as follows: = m (A) A. (4) A Θ A.p.a. (the Moeius inverse of a elief function) is then the set of simplicial coordinates of in B: The simplicial form of B is the geometric counterpart of the nature of.f.s as sum functions. The set P of all Bayesian.f.s is the simplex formed y all dogmatic.f.s associated with singletons: P = Cl( {x}, x Θ). Binary case. Consider as an example a frame of discernment with just two elements Θ 2 = {x, y}. Each.f. : 2 Θ 2 [0, 1] is completely determined y its elief values (x), (y) (since ( ) = 0, (Θ) = 1 for all ). This means that we can represent as the vector (x)v x + (x)v y = [(x), (y)] = [m (x), m (y)] R 2. (5) where v x = [1, 0] is the versor of the x axis, and v y = [0, 1] that of the y axis. Since m (x) 0, m (y) 0, and m (x) + m (y) 1 the set B 2 of all the possile elief functions on Θ 2 is the triangle in the Cartesian plane of Figure 2, whose vertices are the vacuous elief function Θ = [0, 0] with m Θ (Θ) = 1, the Bayesian.f. x = [1, 0] with m x (x) = 1, and the Bayesian.f. y = [0, 1] with m y (y) = 1. Bayesian.f.s on Θ 2 oey the constraint m (x) + m (y) = 1 and form then the points of the segment P 2 joining x = [1, 0] and y = [0, 1]. In the inary case each.f. decomposes according to Equation (4) as = m (x) x + m (y) y. Change of reference frame. In the case of a general domain Θ, the dogmatic elief functions { A : A Θ} form a set of independent vectors in R N 2, so that the collections {v A } and { A } represent two distinct coordinate frames in B. We can then compute the transformation linking them [13].

6 y=[0,1]'=ply pl =[1,1]' Θ PL 1 m (x) B P P[] pl m (y) =[0,0]' Θ a(,pl ) m (x) 1 m (y) x=[1,0]'=pl x Fig. 2. The elief space B for a inary frame is a triangle in R 2 whose vertices are the dogmatic.f.s focused on {x}, {y} and Θ, x, y, Θ respectively. The proaility region is the segment P = Cl( x, y ). Belief and plausiility functions lie on opposite locations with respect to P. The line a(, pl ) joining them intersect P in the intersection proaility p[] (Section 5). Lemma 1. The two coordinate frames {v A : A Θ} and { A : A Θ} are linked y the relation v A = B A ( 1) B\A B. 3.1 Basic plausiility assignment The geometry of elief measures can e exploited to prove the structure of sum function of oth plausiility and commonality functions, estalishing this way two equivalent formulations of the ToE in terms of asic plausiilities and commonalities. To get there we need to compute the Moeius inverse of pl.f.s and comm.f.s respectively. Plausiility space. Plausiility functions are indeed also completely specified y their N 2 plausiility values {pl (A), A Θ} and can then e represented in the same reference frames as efore as It can e proved that [13] pl = A Θ pl (A)v A R N 2. (6) Proposition 1. The region PL of R N 2 whose points correspond to admissile pl.f.s is a simplex PL = Cl(pl A, A Θ) whose vertices are given y pl A = B A ( 1) B B, and represent the plausiility functions associated with all dogmatic elief functions A : pl A = pl A.

7 Figure 2 shows the geometry of elief and plausiility spaces for a inary frame Θ 2 = {x, y}, where pl.f.s are also vectors of R 2 : pl = [pl (x) = 1 m (y), pl (y) = 1 m (x)]. The two simplices B = Cl( Θ = 0, x, y ), PL = Cl(pl Θ = 1, pl x = x, pl y = y ) are symmetric with respect to the segment of all proaility measures P and congruent, so that they can e moved onto each other y means of a rigid transformation. Plausiility assignment. We can use Lemma 1 to compute the Moeius inverse of a pl.f., y putting (6) in the same form as Equation (4). We get that pl = A Θ µ (A) A, where µ (A). = B A( 1) A B pl (B). (7) It is natural to call the function µ : 2 Θ R defined y expression (7) asic plausiility assignment (.pl.a.). By comparing (7) with the Moeius formula for.f.s (2) it is easy to recognize the Moeius equation for plausiilities: hence pl (A) = B A µ (B). (8) PL.F.s are then sum functions on 2 Θ of the form (8), whose Moeius inverse is the.pl.a. (7). Basic proailities and plausiilities are oviously related. Proposition 2. µ (A) = ( 1) A +1 C A m (C) for A, µ ( ) = 0. As.p.a.s do, asic plausiility assignments meet the normalization constraint. In other words, pl.f.s are normalized sum functions [5]. However, µ (A) is not always positive on all events A Θ. Example. Let us consider as an example a.f. on the inary frame Θ 2 = {x, y} with.p.a. m (x) = 1 3, m (Θ) = 2 3. The corresponding pl. vector is pl = [pl (x), pl (y)] = [1 ({x} c ), 1 ({y} c )] = [1, 2/3]. Using Equation (7) we can compute its.pl.a. as µ (x) = ( 1) x +1 C x m (C) = ( 1) 2 (m (x) + m (Θ)) = 1, µ (y) = ( 1) y +1 C y m (C) = ( 1) 2 m (Θ) = 2/3, µ (Θ) = ( 1) Θ +1 C Θ m (C) = ( 1)m (Θ = 2/3 < 0 confirming that.pl.a. meet the normalization ut not the positivity constraint. 3.2 Basic commonality assignment It is straightforward to prove that commonality functions are also sum functions and possess some interesting similarities with pl.f.s. They present though some peculiarities we need to take care of. We know that.f.s and pl.f.s are such that ( ) = pl ( ) = 0, (Θ) = pl (Θ) = 1;

8 in other words, oth and pl can e represented y vectors with N 2 coordinates as we have previously seen. On the other side Q ( ) = A m (A) = A Θ m (A) = 1, Q (Θ) = A Θ m (A) = m (Θ) so that Q needs N coordinates to e represented (even though the dimension of Q is still N 2). A comm.f. corresponds then to a vector of R N = R 2 Θ Q = Q (A)v A A Θ where {v A : A Θ} is an extended reference frame in R N (A = Θ, this time included). Commonality assignment. We can as efore express Q as a sum function y computing its Moeius inverse. We can use Lemma 1 to change the coordinate ase and get the coordinates of Q with respect to the ase { A, A Θ}: Q = Q (A) ( B ( 1) B\A ) A Θ = B Θ B A ( B ( 1) B\A Q (A) ) = A B B Θ q (B) B i.e. Q is a sum function with Moeius inverse q : 2 Θ [0, 1], B q (B) with q (B) = ( 1) B\A Q (A) A B which we can call asic commonality assignment (.comm.a.). q has an interesting interpretation in terms of elief values. Theorem 1. q (B) = ( 1) B (B c ). Proof. q (B) = A B +( 1) B C ( 1) B\A ( m (C) ) = m (C) = C A B C m (C) ( A B A B C But now, since B \ A = B \ C + B C \ A, we have that ( 1) B\A = ( 1) B\C A B C A B C ( 1) B\A ( m (C) ) + ( 1) B C A C A ( 1) B\A ) + ( 1) B. = ( 1) B\C [(1 1) B C ( 1) B C ] = ( 1) B +1 so that the.comm.a. q (B) can e expressed as q (B) = ( 1) B +1 m (C) + ( 1) B = ( 1) B (1 B C B C m (C)) = (9) = ( 1) B (1 pl (B)) i.e. we have as desired. Note that q ( ) = ( 1) ( ) = 1.

9 Properties of asic commonality assignments. Basic commonality assignments are not normalized, as q (B) = Q (Θ) = m (Θ). B Θ In other words, whereas elief functions are normalized sum functions (n.s.f.) with non-negative Moeius inverse, and plausiility functions are normalized sum functions, commonality functions are unnormalized sum functions. Going ack to the aove example, the.comm.a. associated with m (x) = 1/3, m (Θ) = 2/3 is (y Equation (9)) q ( ) = ( 1) (Θ) = 1, q (x) = ( 1) x (y) = m (y) = 0, q (y) = ( 1) y (x) = m (x) = 1/3, q (Θ) = ( 1) Θ ( ) = 0 so that B Θ q (B) = 2/3 = m (Θ) = Q (Θ). Commonality space. Analogously to the case of elief and plausiility functions, we can use here the notion of asic commonality assignment (Theorem 1) to recover the shape of the space Q R N of all commonality functions, or commonality space. Theorem 2. The commonality space Q is a simplex whose vertices are Proof. Q = B Θ = A Θ Q = Cl(Q A, A Θ) Q A. = ( ) ( 1) B B m (A) = A B c m (A)Q A with Q A given y Equation (10). B A c ( 1) B B. (10) A Θ ( ) m (A) ( 1) B B B A c Theorem 3. Q A is the commonality function associated with the dogmatic elief function A, i.e. Q A = q A (B) B. B Θ Proof. Indeed q A (B) = ( 1) B if B c A i.e. B A c, while q A (B) = 0 otherwise, so that Q A = B A c ( 1) B B = Q A and the two quantities coincide. Binary case. In the inary case Q 2 needs N 1 = 3 coordinates to e represented. We have indeed Q ( ) = 1, Q (x) = A {x} m (A) = pl (x),

10 Q (Θ) Q = [1 1 1]' Θ Q (y) Q = [0 1 0]' y Q Q = [1 0 0 ]' x Q (x) Fig. 3. Commonality space in the inary case. Q (y) = A {y} m (A) = pl (y), and Q (Θ) = m (Θ). If we neglect the coordinate Q ( ) which is constant, the commonality space Q 2 can then e drawn as in Figure 3. The vertices of Q 2 are, according to Equation (10) and using all N coordinates, Q Θ = = [1111], Q x = ( 1) B B = y = [1111] [0011] = [1100] = Q x Q y = B {y} B {x} ( 1) B B = x = [1111] [0101] = [1010] = Q y. 4 Congruence of equivalent models The equivalence of the three models ased on asic proaility, plausiility, and commonality assignments as descriptions of uncertainty geometrically translates as congruence of the associated simplices. We saw that for inary frames, B and PL are congruent, i.e. they can e superposed y means of a rigid transformation. This is indeed a general property. Lemma 2. The corresponding 1-dimensional sides Cl( A, B ) and Cl(pl A, pl B ) of elief and plausiility spaces are congruent, namely pl B pl A p = A B p where p denotes the classical norm v p. = N i=1 v i p, for all p = 1, 2,..., +. Proof. This a direct consequence of the definition of plausiility function. Let us denote with C, D two generic susets of Θ. As pl A (C) = 1 A (C c ) we have A (C c ) = 1 pl A (C), which implies A (C c ) B (C c ) = 1 pl A (C) 1 + pl B (C) = pl B (C) pl A (C).

11 This in turn means that pl B (C) pl A (C) p = A (C c ) B (C c ) p = A (D) B (D) p p. C Θ C Θ D Θ A straightforward implication is then that Theorem 4. B and PL are congruent. as their corresponding 1-dimensional faces have the same length. This is due to the generalization of a well-known Euclid s theorem stating that triangles with sides of the same length are congruent. 2 The situation is a it more complicated for plausiility and commonality spaces, ut we can still prove that Q and PL are congruent in the case of unnormalized elief functions [14]. 5 Applications of asic plausiility assignments Besides eing a natural complement to the mathematical apparatus of the theory of evidence, these alternative models of the ToE and the related asic assignments can actually e useful in the solution of practical prolems. This is true when dealing with plausiility functions as we can recur to their equivalent asic assignments and operate on them. In particular, it ecomes necessary when we need to apply comination rules for the aggregation of evidence to those plausiility functions. Relative elief of singletons. The prolem of approximating a given elief function with a proaility, for instance, has een studied y many researchers [7, 8, 15]. The relative plausiility of singletons pl (x) = pl (x) y Θ pl (y), in particular, is an interesting candidate as it can e proven that it commutes with Dempster s comination [2, 15] and it perfectly represents a elief function when comined with a proaility: pl p = p for all p P. Definition 1. The Dempster s sum of two elief functions 1, 2 on the same frame Θ is a new elief function 1 2 on Θ with.p.a. m 1 2 (A) = B C=A m 1 (B) m 2 (C) B C m (11) 1 (B) m 2 (C) where m i denotes the.p.a. associated with i. 2 Note that this holds for simplices ut not for polytopes in general, think of a square and a rhomus with sides of length 1.

12 However, as elief and plausiilities are dual representations of the same evidence, a dual proaility can e defined as the relative elief of singletons (x). = (x) (12) (y). y Θ We can prove that meets a set of dual properties with respect to, which are the dual of those of pl [8, 15]. These dual properties involve the Dempster s sum of plausiility functions (instead of elief functions). This should not surprise at this point. We have proven in Section 3.1 that plausiility functions are themselves sum functions, which admit a Moeius inverse: the asic plausiility assignment. But then nothing prevents from applying Equation (11) to the.pl.a.s of a pair of plausiility functions, instead of elief functions. We can then easily prove that Proposition 3. The relative elief of singletons represents perfectly the corresponding plausiility function pl when comined with any proaility through (extended) Dempster s rule: p = pl p p P. Intersection proaility. From a different point of view, each elief function determines an interval proaility, i.e. a set of proaility measures p : Θ [0, 1] on the same domain Θ which meet a lower ound associated with the elief values on all outcomes x Θ, and an upper ound determined y the corresponding plausiility values: (, pl ). = { (x) p(x) pl (x), x Θ }. (13) Now, there are clearly many ways of selecting one of those measures as representative of the aove interval proaility. However, as each interval [(x), pl (x)] has the same weight in the interval proaility, there is no reason for the different singletons x to e treated differently. Mathematically this translates into seeking the unique proaility p[] such that p[](x) = (x) + α(pl (x) (x)), α [0, 1]. This function has een called intersection proaility [16], as it is geometrically located on the segment joining a pair of elief-plausiility functions. The situation is clearly visile in the inary case of Figure 2, where the line a(, pl ) joining such a pair is drawn: p[] lies at the intersection of this line with the region P of all proaility functions. Again, as linear comination of a.f. and a pl.f., its analysis requires the Moeius inversion of pl [16]. 6 Conclusions In this paper we introduced two alternative formulations of the theory of evidence y proving that oth pl.f.s and comm.f.s share with elief functions the cominatorial structure of sum function, and computing their Moeius inverses which

13 we called asic plausiility and commonality assignments. From a cominatorial point of view,.f.s, pl.f.s and comm.f.s form a hierarchy of sum functions whose Moeius inverse meets oth normalization and positivity axiom (.p.a.), only the normalization constraint (.pl.a.), and none of them (.comm.a.) respectively. The related spaces possess a similar convex geometry. Their congruence is the geometric reflection of the equivalence of those alternative formulations, which can e successfully applied to prolems like the proailistic approximation of a elief function. References 1. Shafer, G.: A Mathematical Theory of Evidence. Princeton University Press (1976) 2. Dempster, A.: Upper and lower proailities generated y a random closed interval. Annals of Mathematical Statistics 39 (1968) Kohlas, J.: Mathematical foundations of evidence theory. In Coletti, G., Duois, D., Scozzafava, R., eds.: Mathematical Models for Handling Partial Knowledge in Artificial Intelligence. Plenum Press (1995) Shafer, G.: Allocations of proaility. Annals of Proaility 7:5 (1979) Aigner, M.: Cominatorial Theory. Classics in Mathematics, Springer, New York (1979) 6. Cuzzolin, F.: A geometric approach to the theory of evidence. IEEE Transactions on Systems, Man and Cyernetics - Part C (2008) 7. Smets, P.: Belief functions versus proaility functions. In Bouchon B., S.L., R., Y., eds.: Uncertainty and Intelligent Systems. Springer Verlag (1988) Voorraak, F.: A computationally efficient approximation of Dempster-Shafer theory. International Journal on Man-Machine Studies 30 (1989) Bauer, M.: Approximation algorithms and decision making in the Dempster-Shafer theory of evidence an empirical study. International Journal of Approximate Reasoning 17 (1997) Nguyen, H.: On random sets and elief functions. J. Mathematical Analysis and Applications 65 (1978) Hestir, H., Nguyen, H., Rogers, G.: A random set formalism for evidential reasoning. In: Conditional Logic in Expert Systems. North Holland (1991) Fagin, R., Halpern, J.: Uncertainty, elief and proaility. In: Proc. of IJCAI 88. (1988) Cuzzolin, F.: Geometry of upper proailities. In: Proceedings of ISIPTA 03. (2003) 14. Smets, P.: The nature of the unnormalized eliefs encountered in the transferale elief model. In: Proceedings of UAI 92, San Mateo, CA, Morgan Kaufmann (1992) Co, B.R., Shenoy, P.P.: A comparison of ayesian and elief function reasoning. Information Systems Frontiers 5(4) (2003) Cuzzolin, F.: Two new Bayesian approximations of elief functions ased on convex geometry. IEEE Transactions on Systems, Man and Cyernetics part B 37(4) (2007)

The intersection probability and its properties

The intersection probability and its properties The intersection proaility and its properties Faio Cuzzolin INRIA Rhône-Alpes 655 avenue de l Europe, 38334 Montonnot, France Faio.Cuzzolin@inrialpes.fr Astract In this paper we discuss the properties

More information

Semantics of the relative belief of singletons

Semantics of the relative belief of singletons Semantics of the relative belief of singletons Fabio Cuzzolin INRIA Rhône-Alpes 655 avenue de l Europe, 38334 SAINT ISMIER CEDEX, France Fabio.Cuzzolin@inrialpes.fr Summary. In this paper we introduce

More information

The intersection probability and its properties

The intersection probability and its properties The intersection probability and its properties Fabio Cuzzolin INRIA Rhône-Alpes 655 avenue de l Europe Montbonnot, France Abstract In this paper we introduce the intersection probability, a Bayesian approximation

More information

On Conditional Independence in Evidence Theory

On Conditional Independence in Evidence Theory 6th International Symposium on Imprecise Probability: Theories and Applications, Durham, United Kingdom, 2009 On Conditional Independence in Evidence Theory Jiřina Vejnarová Institute of Information Theory

More information

The internal conflict of a belief function

The internal conflict of a belief function The internal conflict of a belief function Johan Schubert 1 Abstract In this paper we define and derive an internal conflict of a belief function We decompose the belief function in question into a set

More information

On Markov Properties in Evidence Theory

On Markov Properties in Evidence Theory On Markov Properties in Evidence Theory 131 On Markov Properties in Evidence Theory Jiřina Vejnarová Institute of Information Theory and Automation of the ASCR & University of Economics, Prague vejnar@utia.cas.cz

More information

The cautious rule of combination for belief functions and some extensions

The cautious rule of combination for belief functions and some extensions The cautious rule of combination for belief functions and some extensions Thierry Denœux UMR CNRS 6599 Heudiasyc Université de Technologie de Compiègne BP 20529 - F-60205 Compiègne cedex - France Thierry.Denoeux@hds.utc.fr

More information

Reducing t-norms and augmenting t-conorms

Reducing t-norms and augmenting t-conorms Reducing t-norms and augmenting t-conorms Marcin Detyniecki LIP6 - CNRS -University of Paris VI 4, place Jussieu 75230 Paris Cedex 05, France Marcin.Detyniecki@lip6.fr Ronald R. Yager Machine Intelligence

More information

Upper Bounds for Stern s Diatomic Sequence and Related Sequences

Upper Bounds for Stern s Diatomic Sequence and Related Sequences Upper Bounds for Stern s Diatomic Sequence and Related Sequences Colin Defant Department of Mathematics University of Florida, U.S.A. cdefant@ufl.edu Sumitted: Jun 18, 01; Accepted: Oct, 016; Pulished:

More information

Introduction to belief functions

Introduction to belief functions Introduction to belief functions Thierry Denœux 1 1 Université de Technologie de Compiègne HEUDIASYC (UMR CNRS 6599) http://www.hds.utc.fr/ tdenoeux Spring School BFTA 2011 Autrans, April 4-8, 2011 Thierry

More information

Lecture 12: Grover s Algorithm

Lecture 12: Grover s Algorithm CPSC 519/619: Quantum Computation John Watrous, University of Calgary Lecture 12: Grover s Algorithm March 7, 2006 We have completed our study of Shor s factoring algorithm. The asic technique ehind Shor

More information

Genetic Algorithms applied to Problems of Forbidden Configurations

Genetic Algorithms applied to Problems of Forbidden Configurations Genetic Algorithms applied to Prolems of Foridden Configurations R.P. Anstee Miguel Raggi Department of Mathematics University of British Columia Vancouver, B.C. Canada V6T Z2 anstee@math.uc.ca mraggi@gmail.com

More information

Managing Decomposed Belief Functions

Managing Decomposed Belief Functions Managing Decomposed Belief Functions Johan Schubert Department of Decision Support Systems, Division of Command and Control Systems, Swedish Defence Research Agency, SE-164 90 Stockholm, Sweden schubert@foi.se

More information

Rough operations on Boolean algebras

Rough operations on Boolean algebras Rough operations on Boolean algebras Guilin Qi and Weiru Liu School of Computer Science, Queen s University Belfast Belfast, BT7 1NN, UK Abstract In this paper, we introduce two pairs of rough operations

More information

Approximation of Belief Functions by Minimizing Euclidean Distances

Approximation of Belief Functions by Minimizing Euclidean Distances Approximation of Belief Functions by Minimizing Euclidean Distances Thomas Weiler and Ulrich Bodenhofer Software Competence Center Hagenberg A-4232 Hagenberg, Austria e-mail: {thomas.weiler,ulrich.bodenhofer}@scch.at

More information

Dempster's Rule of Combination is. #P -complete. Pekka Orponen. Department of Computer Science, University of Helsinki

Dempster's Rule of Combination is. #P -complete. Pekka Orponen. Department of Computer Science, University of Helsinki Dempster's Rule of Combination is #P -complete Pekka Orponen Department of Computer Science, University of Helsinki eollisuuskatu 23, SF{00510 Helsinki, Finland Abstract We consider the complexity of combining

More information

On the relative belief transform

On the relative belief transform On the relative belief transform Fabio Cuzzolin a a Department of Computing and Communication Technologies Oxford Brookes University Wheatley campus, Oxford OX33 1HX, United Kingdom Abstract In this paper

More information

MAT 3271: Selected solutions to problem set 7

MAT 3271: Selected solutions to problem set 7 MT 3271: Selected solutions to problem set 7 Chapter 3, Exercises: 16. Consider the Real ffine Plane (that is what the text means by the usual Euclidean model ), which is a model of incidence geometry.

More information

1 Caveats of Parallel Algorithms

1 Caveats of Parallel Algorithms CME 323: Distriuted Algorithms and Optimization, Spring 2015 http://stanford.edu/ reza/dao. Instructor: Reza Zadeh, Matroid and Stanford. Lecture 1, 9/26/2015. Scried y Suhas Suresha, Pin Pin, Andreas

More information

Optimal Routing in Chord

Optimal Routing in Chord Optimal Routing in Chord Prasanna Ganesan Gurmeet Singh Manku Astract We propose optimal routing algorithms for Chord [1], a popular topology for routing in peer-to-peer networks. Chord is an undirected

More information

Multiplication of Multinomial Subjective Opinions

Multiplication of Multinomial Subjective Opinions Multiplication of Multinomial Subjective Opinions Audun Jøsang 1 and Stephen O Hara 2 1 UNIK Graduate Center University of Oslo, Norway josang@unik.no 2 21st Century Systems Inc. USA sohara@21csi.com Abstract.

More information

On the Independence of the Formal System L *

On the Independence of the Formal System L * 6 International Journal of Fuzzy Systems, Vol. 4, No., June On the Independence of the Formal System L * Daowu Pei Astract The formal system L * of fuzzy propositional logic has een successfully applied

More information

The Semi-Pascal Triangle of Maximum Deng Entropy

The Semi-Pascal Triangle of Maximum Deng Entropy The Semi-Pascal Triangle of Maximum Deng Entropy Xiaozhuan Gao a, Yong Deng a, a Institute of Fundamental and Frontier Science, University of Electronic Science and Technology of China, Chengdu, 610054,

More information

The Unnormalized Dempster s Rule of Combination: a New Justification from the Least Commitment Principle and some Extensions

The Unnormalized Dempster s Rule of Combination: a New Justification from the Least Commitment Principle and some Extensions J Autom Reasoning manuscript No. (will be inserted by the editor) 0 0 0 The Unnormalized Dempster s Rule of Combination: a New Justification from the Least Commitment Principle and some Extensions Frédéric

More information

Hierarchical Proportional Redistribution Principle for Uncertainty Reduction and BBA Approximation

Hierarchical Proportional Redistribution Principle for Uncertainty Reduction and BBA Approximation Hierarchical Proportional Redistribution Principle for Uncertainty Reduction and BBA Approximation Jean Dezert Deqiang Han Zhun-ga Liu Jean-Marc Tacnet Abstract Dempster-Shafer evidence theory is very

More information

Fuzzy Systems. Possibility Theory.

Fuzzy Systems. Possibility Theory. Fuzzy Systems Possibility Theory Rudolf Kruse Christian Moewes {kruse,cmoewes}@iws.cs.uni-magdeburg.de Otto-von-Guericke University of Magdeburg Faculty of Computer Science Department of Knowledge Processing

More information

Representation theory of SU(2), density operators, purification Michael Walter, University of Amsterdam

Representation theory of SU(2), density operators, purification Michael Walter, University of Amsterdam Symmetry and Quantum Information Feruary 6, 018 Representation theory of S(), density operators, purification Lecture 7 Michael Walter, niversity of Amsterdam Last week, we learned the asic concepts of

More information

At first numbers were used only for counting, and 1, 2, 3,... were all that was needed. These are called positive integers.

At first numbers were used only for counting, and 1, 2, 3,... were all that was needed. These are called positive integers. 1 Numers One thread in the history of mathematics has een the extension of what is meant y a numer. This has led to the invention of new symols and techniques of calculation. When you have completed this

More information

3.5 Solving Quadratic Equations by the

3.5 Solving Quadratic Equations by the www.ck1.org Chapter 3. Quadratic Equations and Quadratic Functions 3.5 Solving Quadratic Equations y the Quadratic Formula Learning ojectives Solve quadratic equations using the quadratic formula. Identify

More information

Combining Belief Functions Issued from Dependent Sources

Combining Belief Functions Issued from Dependent Sources Combining Belief Functions Issued from Dependent Sources MARCO E.G.V. CATTANEO ETH Zürich, Switzerland Abstract Dempster s rule for combining two belief functions assumes the independence of the sources

More information

2. On integer geometry (22 March 2011)

2. On integer geometry (22 March 2011) 2. On integer geometry (22 March 2011) 2.1. asic notions and definitions. notion of geometry in general can be interpreted in many different ways. In our course we think of geometry as of a set of objects

More information

POL502: Foundations. Kosuke Imai Department of Politics, Princeton University. October 10, 2005

POL502: Foundations. Kosuke Imai Department of Politics, Princeton University. October 10, 2005 POL502: Foundations Kosuke Imai Department of Politics, Princeton University October 10, 2005 Our first task is to develop the foundations that are necessary for the materials covered in this course. 1

More information

Boolean Algebra CHAPTER 15

Boolean Algebra CHAPTER 15 CHAPTER 15 Boolean Algebra 15.1 INTRODUCTION Both sets and propositions satisfy similar laws, which are listed in Tables 1-1 and 4-1 (in Chapters 1 and 4, respectively). These laws are used to define an

More information

1 Hoeffding s Inequality

1 Hoeffding s Inequality Proailistic Method: Hoeffding s Inequality and Differential Privacy Lecturer: Huert Chan Date: 27 May 22 Hoeffding s Inequality. Approximate Counting y Random Sampling Suppose there is a ag containing

More information

Exploring Lucas s Theorem. Abstract: Lucas s Theorem is used to express the remainder of the binomial coefficient of any two

Exploring Lucas s Theorem. Abstract: Lucas s Theorem is used to express the remainder of the binomial coefficient of any two Delia Ierugan Exploring Lucas s Theorem Astract: Lucas s Theorem is used to express the remainder of the inomial coefficient of any two integers m and n when divided y any prime integer p. The remainder

More information

Module 9: Further Numbers and Equations. Numbers and Indices. The aim of this lesson is to enable you to: work with rational and irrational numbers

Module 9: Further Numbers and Equations. Numbers and Indices. The aim of this lesson is to enable you to: work with rational and irrational numbers Module 9: Further Numers and Equations Lesson Aims The aim of this lesson is to enale you to: wor with rational and irrational numers wor with surds to rationalise the denominator when calculating interest,

More information

CHAPTER 5. Linear Operators, Span, Linear Independence, Basis Sets, and Dimension

CHAPTER 5. Linear Operators, Span, Linear Independence, Basis Sets, and Dimension A SERIES OF CLASS NOTES TO INTRODUCE LINEAR AND NONLINEAR PROBLEMS TO ENGINEERS, SCIENTISTS, AND APPLIED MATHEMATICIANS LINEAR CLASS NOTES: A COLLECTION OF HANDOUTS FOR REVIEW AND PREVIEW OF LINEAR THEORY

More information

Number Plane Graphs and Coordinate Geometry

Number Plane Graphs and Coordinate Geometry Numer Plane Graphs and Coordinate Geometr Now this is m kind of paraola! Chapter Contents :0 The paraola PS, PS, PS Investigation: The graphs of paraolas :0 Paraolas of the form = a + + c PS Fun Spot:

More information

Evidence combination for a large number of sources

Evidence combination for a large number of sources Evidence combination for a large number of sources Kuang Zhou a, Arnaud Martin b, and Quan Pan a a. Northwestern Polytechnical University, Xi an, Shaanxi 710072, PR China. b. DRUID, IRISA, University of

More information

Belief Update in CLG Bayesian Networks With Lazy Propagation

Belief Update in CLG Bayesian Networks With Lazy Propagation Belief Update in CLG Bayesian Networks With Lazy Propagation Anders L Madsen HUGIN Expert A/S Gasværksvej 5 9000 Aalborg, Denmark Anders.L.Madsen@hugin.com Abstract In recent years Bayesian networks (BNs)

More information

Neutral Geometry. October 25, c 2009 Charles Delman

Neutral Geometry. October 25, c 2009 Charles Delman Neutral Geometry October 25, 2009 c 2009 Charles Delman Taking Stock: where we have been; where we are going Set Theory & Logic Terms of Geometry: points, lines, incidence, betweenness, congruence. Incidence

More information

Independence Concepts for Convex Sets of Probabilities. Luis M. De Campos and Serafn Moral. Departamento de Ciencias de la Computacion e I.A.

Independence Concepts for Convex Sets of Probabilities. Luis M. De Campos and Serafn Moral. Departamento de Ciencias de la Computacion e I.A. Independence Concepts for Convex Sets of Probabilities Luis M. De Campos and Serafn Moral Departamento de Ciencias de la Computacion e I.A. Universidad de Granada, 18071 - Granada - Spain e-mails: lci@robinson.ugr.es,smc@robinson.ugr

More information

A novel k-nn approach for data with uncertain attribute values

A novel k-nn approach for data with uncertain attribute values A novel -NN approach for data with uncertain attribute values Asma Trabelsi 1,2, Zied Elouedi 1, and Eric Lefevre 2 1 Université de Tunis, Institut Supérieur de Gestion de Tunis, LARODEC, Tunisia trabelsyasma@gmail.com,zied.elouedi@gmx.fr

More information

Entropy and Specificity in a Mathematical Theory of Evidence

Entropy and Specificity in a Mathematical Theory of Evidence Entropy and Specificity in a Mathematical Theory of Evidence Ronald R. Yager Abstract. We review Shafer s theory of evidence. We then introduce the concepts of entropy and specificity in the framework

More information

Reversal of regular languages and state complexity

Reversal of regular languages and state complexity Reversal of regular languages and state complexity Juraj Šeej Institute of Computer Science, Faculty of Science, P. J. Šafárik University Jesenná 5, 04001 Košice, Slovakia juraj.seej@gmail.com Astract.

More information

MA 460 Supplement: Analytic geometry

MA 460 Supplement: Analytic geometry M 460 Supplement: nalytic geometry Donu rapura In the 1600 s Descartes introduced cartesian coordinates which changed the way we now do geometry. This also paved for subsequent developments such as calculus.

More information

Sample Solutions from the Student Solution Manual

Sample Solutions from the Student Solution Manual 1 Sample Solutions from the Student Solution Manual 1213 If all the entries are, then the matrix is certainly not invertile; if you multiply the matrix y anything, you get the matrix, not the identity

More information

Zeroing the baseball indicator and the chirality of triples

Zeroing the baseball indicator and the chirality of triples 1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 7 (2004), Article 04.1.7 Zeroing the aseall indicator and the chirality of triples Christopher S. Simons and Marcus Wright Department of Mathematics

More information

MA257: INTRODUCTION TO NUMBER THEORY LECTURE NOTES

MA257: INTRODUCTION TO NUMBER THEORY LECTURE NOTES MA257: INTRODUCTION TO NUMBER THEORY LECTURE NOTES 2018 57 5. p-adic Numbers 5.1. Motivating examples. We all know that 2 is irrational, so that 2 is not a square in the rational field Q, but that we can

More information

STRONG NORMALITY AND GENERALIZED COPELAND ERDŐS NUMBERS

STRONG NORMALITY AND GENERALIZED COPELAND ERDŐS NUMBERS #A INTEGERS 6 (206) STRONG NORMALITY AND GENERALIZED COPELAND ERDŐS NUMBERS Elliot Catt School of Mathematical and Physical Sciences, The University of Newcastle, Callaghan, New South Wales, Australia

More information

arxiv:cs/ v2 [cs.ai] 29 Nov 2006

arxiv:cs/ v2 [cs.ai] 29 Nov 2006 Belief Conditioning Rules arxiv:cs/0607005v2 [cs.ai] 29 Nov 2006 Florentin Smarandache Department of Mathematics, University of New Mexico, Gallup, NM 87301, U.S.A. smarand@unm.edu Jean Dezert ONERA, 29

More information

arxiv: v1 [cs.gt] 4 May 2015

arxiv: v1 [cs.gt] 4 May 2015 Econometrics for Learning Agents DENIS NEKIPELOV, University of Virginia, denis@virginia.edu VASILIS SYRGKANIS, Microsoft Research, vasy@microsoft.com EVA TARDOS, Cornell University, eva.tardos@cornell.edu

More information

Probabilistic Modelling and Reasoning: Assignment Modelling the skills of Go players. Instructor: Dr. Amos Storkey Teaching Assistant: Matt Graham

Probabilistic Modelling and Reasoning: Assignment Modelling the skills of Go players. Instructor: Dr. Amos Storkey Teaching Assistant: Matt Graham Mechanics Proailistic Modelling and Reasoning: Assignment Modelling the skills of Go players Instructor: Dr. Amos Storkey Teaching Assistant: Matt Graham Due in 16:00 Monday 7 th March 2016. Marks: This

More information

Depth versus Breadth in Convolutional Polar Codes

Depth versus Breadth in Convolutional Polar Codes Depth versus Breadth in Convolutional Polar Codes Maxime Tremlay, Benjamin Bourassa and David Poulin,2 Département de physique & Institut quantique, Université de Sherrooke, Sherrooke, Quéec, Canada JK

More information

Scheduling Two Agents on a Single Machine: A Parameterized Analysis of NP-hard Problems

Scheduling Two Agents on a Single Machine: A Parameterized Analysis of NP-hard Problems Scheduling Two Agents on a Single Machine: A Parameterized Analysis of NP-hard Prolems Danny Hermelin 1, Judith-Madeleine Kuitza 2, Dvir Shatay 1, Nimrod Talmon 3, and Gerhard Woeginger 4 arxiv:1709.04161v1

More information

Pseudo-automata for generalized regular expressions

Pseudo-automata for generalized regular expressions Pseudo-automata for generalized regular expressions B. F. Melnikov A. A. Melnikova Astract In this paper we introduce a new formalism which is intended for representing a special extensions of finite automata.

More information

The Capacity Region of 2-Receiver Multiple-Input Broadcast Packet Erasure Channels with Channel Output Feedback

The Capacity Region of 2-Receiver Multiple-Input Broadcast Packet Erasure Channels with Channel Output Feedback IEEE TRANSACTIONS ON INFORMATION THEORY, ONLINE PREPRINT 2014 1 The Capacity Region of 2-Receiver Multiple-Input Broadcast Packet Erasure Channels with Channel Output Feedack Chih-Chun Wang, Memer, IEEE,

More information

Shedding New Light on Zadeh s Criticism of Dempster s Rule of Combination

Shedding New Light on Zadeh s Criticism of Dempster s Rule of Combination Shedding New Light on Zadeh s Criticism of Dempster s Rule of Combination Rolf Haenni Institute of Computer Science and Applied Mathematics University of Berne CH-3012 Bern, Switzerland e-mail: haenni@iam.unibe.ch

More information

BASIC MATHEMATICAL TECHNIQUES

BASIC MATHEMATICAL TECHNIQUES CHAPTER 1 ASIC MATHEMATICAL TECHNIQUES 1.1 Introduction To understand automata theory, one must have a strong foundation about discrete mathematics. Discrete mathematics is a branch of mathematics dealing

More information

MATH 225: Foundations of Higher Matheamatics. Dr. Morton. 3.4: Proof by Cases

MATH 225: Foundations of Higher Matheamatics. Dr. Morton. 3.4: Proof by Cases MATH 225: Foundations of Higher Matheamatics Dr. Morton 3.4: Proof y Cases Chapter 3 handout page 12 prolem 21: Prove that for all real values of y, the following inequality holds: 7 2y + 2 2y 5 7. You

More information

Comparing Three Ways to Update Choquet Beliefs

Comparing Three Ways to Update Choquet Beliefs 26 February 2009 Comparing Three Ways to Update Choquet Beliefs Abstract We analyze three rules that have been proposed for updating capacities. First we consider their implications for updating the Choquet

More information

TIGHT BOUNDS FOR THE FIRST ORDER MARCUM Q-FUNCTION

TIGHT BOUNDS FOR THE FIRST ORDER MARCUM Q-FUNCTION TIGHT BOUNDS FOR THE FIRST ORDER MARCUM Q-FUNCTION Jiangping Wang and Dapeng Wu Department of Electrical and Computer Engineering University of Florida, Gainesville, FL 3611 Correspondence author: Prof.

More information

#A50 INTEGERS 14 (2014) ON RATS SEQUENCES IN GENERAL BASES

#A50 INTEGERS 14 (2014) ON RATS SEQUENCES IN GENERAL BASES #A50 INTEGERS 14 (014) ON RATS SEQUENCES IN GENERAL BASES Johann Thiel Dept. of Mathematics, New York City College of Technology, Brooklyn, New York jthiel@citytech.cuny.edu Received: 6/11/13, Revised:

More information

Index. admissible matrix, 82, 83 admissible perturbation, 72 argument, 23, 24, 49, 57, 98

Index. admissible matrix, 82, 83 admissible perturbation, 72 argument, 23, 24, 49, 57, 98 References 1. RH. Bartlett, D.W. Roloff, RC. Cornell, A.F. Andrews, P.W. Dillon, and J.B. Zwischenberger, Extracorporeal Circulation in Neonatal Respiratory Failure: A Prospective Randomized Study, Pediatrics

More information

A Sufficient Condition for Optimality of Digital versus Analog Relaying in a Sensor Network

A Sufficient Condition for Optimality of Digital versus Analog Relaying in a Sensor Network A Sufficient Condition for Optimality of Digital versus Analog Relaying in a Sensor Network Chandrashekhar Thejaswi PS Douglas Cochran and Junshan Zhang Department of Electrical Engineering Arizona State

More information

Two-Stage Improved Group Plans for Burr Type XII Distributions

Two-Stage Improved Group Plans for Burr Type XII Distributions American Journal of Mathematics and Statistics 212, 2(3): 33-39 DOI: 1.5923/j.ajms.21223.4 Two-Stage Improved Group Plans for Burr Type XII Distriutions Muhammad Aslam 1,*, Y. L. Lio 2, Muhammad Azam 1,

More information

Data Fusion with Imperfect Implication Rules

Data Fusion with Imperfect Implication Rules Data Fusion with Imperfect Implication Rules J. N. Heendeni 1, K. Premaratne 1, M. N. Murthi 1 and M. Scheutz 2 1 Elect. & Comp. Eng., Univ. of Miami, Coral Gables, FL, USA, j.anuja@umiami.edu, kamal@miami.edu,

More information

SVETLANA KATOK AND ILIE UGARCOVICI (Communicated by Jens Marklof)

SVETLANA KATOK AND ILIE UGARCOVICI (Communicated by Jens Marklof) JOURNAL OF MODERN DYNAMICS VOLUME 4, NO. 4, 010, 637 691 doi: 10.3934/jmd.010.4.637 STRUCTURE OF ATTRACTORS FOR (a, )-CONTINUED FRACTION TRANSFORMATIONS SVETLANA KATOK AND ILIE UGARCOVICI (Communicated

More information

Conditional Belief Functions: a Comparison among Different Definitions

Conditional Belief Functions: a Comparison among Different Definitions Conditional Belief Functions: a Comparison among Different Definitions Giulianella Coletti Marcello Mastroleo Dipartimento di Matematica e Informatica University of Perugia (coletti,mastroleo)@dipmat.unipg.it

More information

10 Lorentz Group and Special Relativity

10 Lorentz Group and Special Relativity Physics 129 Lecture 16 Caltech, 02/27/18 Reference: Jones, Groups, Representations, and Physics, Chapter 10. 10 Lorentz Group and Special Relativity Special relativity says, physics laws should look the

More information

CPM: A Covariance-preserving Projection Method

CPM: A Covariance-preserving Projection Method CPM: A Covariance-preserving Projection Method Jieping Ye Tao Xiong Ravi Janardan Astract Dimension reduction is critical in many areas of data mining and machine learning. In this paper, a Covariance-preserving

More information

Appeared in: International Journal of Approximate Reasoning, 41(3), April 2006, ON THE PLAUSIBILITY TRANSFORMATION METHOD FOR TRANSLATING

Appeared in: International Journal of Approximate Reasoning, 41(3), April 2006, ON THE PLAUSIBILITY TRANSFORMATION METHOD FOR TRANSLATING Appeared in: International Journal of Approximate Reasoning, 41(3), April 2006, 314--330. ON THE PLAUSIBILITY TRANSFORMATION METHOD FOR TRANSLATING BELIEF FUNCTION MODELS TO PROBABILITY MODELS Barry R.

More information

Mathematical Reasoning & Proofs

Mathematical Reasoning & Proofs Mathematical Reasoning & Proofs MAT 1362 Fall 2018 Alistair Savage Department of Mathematics and Statistics University of Ottawa This work is licensed under a Creative Commons Attribution-ShareAlike 4.0

More information

A THEORY OF ROBUST EXPERIMENTS FOR CHOICE UNDER UNCERTAINTY

A THEORY OF ROBUST EXPERIMENTS FOR CHOICE UNDER UNCERTAINTY A THEORY OF ROBUST EXPERIMENTS FOR CHOICE UNDER UNCERTAINTY S. GRANT, J. KLINE, I. MENEGHEL, J. QUIGGIN, AND R. TOURKY Astract. Thought experiments are commonly used in the theory of ehavior in the presence

More information

arxiv: v1 [cs.ai] 4 Sep 2007

arxiv: v1 [cs.ai] 4 Sep 2007 Qualitative Belief Conditioning Rules (QBCR) arxiv:0709.0522v1 [cs.ai] 4 Sep 2007 Florentin Smarandache Department of Mathematics University of New Mexico Gallup, NM 87301, U.S.A. smarand@unm.edu Jean

More information

A Tabu Search Algorithm to Construct BIBDs Using MIP Solvers

A Tabu Search Algorithm to Construct BIBDs Using MIP Solvers The Eighth International Symposium on Operations Research and Its Applications (ISORA 09) Zhangjiajie, China, Septemer 20 22, 2009 Copyright 2009 ORSC & APORC, pp. 179 189 A Tau Search Algorithm to Construct

More information

Hyperbolic Transformations

Hyperbolic Transformations C H A P T E R 17 Hyperbolic Transformations Though the text of your article on Crystal Symmetry and Its Generalizations is much too learned for a simple, selfmade pattern man like me, some of the text-illustrations

More information

Branching Bisimilarity with Explicit Divergence

Branching Bisimilarity with Explicit Divergence Branching Bisimilarity with Explicit Divergence Ro van Glaeek National ICT Australia, Sydney, Australia School of Computer Science and Engineering, University of New South Wales, Sydney, Australia Bas

More information

Math 309 Notes and Homework for Days 4-6

Math 309 Notes and Homework for Days 4-6 Math 309 Notes and Homework for Days 4-6 Day 4 Read Section 1.2 and the notes below. The following is the main definition of the course. Definition. A vector space is a set V (whose elements are called

More information

11. Prove that the Missing Strip Plane is an. 12. Prove the above proposition.

11. Prove that the Missing Strip Plane is an. 12. Prove the above proposition. 10 Pasch Geometries Definition (Pasch s Postulate (PP)) A metric geometry satisfies Pasch s Postulate (PP) if for any line l, any triangle ABC, and any point D l such that A D B, then either l AC or l

More information

Load Balancing Congestion Games and their Asymptotic Behavior

Load Balancing Congestion Games and their Asymptotic Behavior Load Balancing Congestion Games and their Asymptotic Behavior Eitan Altman, Corinne Touati Inria CRS, LIG, Univ. Grenole Alpes, LIG, F-38000 Grenole, France Email: {eitan.altman, corinne.touati}@inria.fr

More information

Robot Position from Wheel Odometry

Robot Position from Wheel Odometry Root Position from Wheel Odometry Christopher Marshall 26 Fe 2008 Astract This document develops equations of motion for root position as a function of the distance traveled y each wheel as a function

More information

Comparison of two versions of the Ferrers property of fuzzy interval orders

Comparison of two versions of the Ferrers property of fuzzy interval orders Comparison of two versions of the Ferrers property of fuzzy interval orders Susana Díaz 1 Bernard De Baets 2 Susana Montes 1 1.Dept. Statistics and O. R., University of Oviedo 2.Dept. Appl. Math., Biometrics

More information

Is Entropy Enough to Evaluate the Probability Transformation Approach of Belief Function?

Is Entropy Enough to Evaluate the Probability Transformation Approach of Belief Function? Is Entropy Enough to Evaluate the Probability Transformation Approach of Belief Function? Deqiang Han Jean Dezert Chongzhao Han Yi Yang Originally published as Han D., Dezert J., Han C., Is Entropy Enough

More information

Scientific/Technical Approach

Scientific/Technical Approach Network based Hard/Soft Information Fusion: Soft Information and its Fusion Ronald R. Yager, Tel. 212 249 2047, E Mail: yager@panix.com Objectives: Support development of hard/soft information fusion Develop

More information

Jeffrey s rule of conditioning generalized to belief functions.

Jeffrey s rule of conditioning generalized to belief functions. Jeffrey s rule of conditioning generalized to belief functions. Philippe SMETS 1 IRIDIA, Université Libre de Bruxelles 50 av. F. Roosevelt, CP194/6. B-1050 Brussels, Belgium. Abstract: Jeffrey s rule of

More information

Knowledge spaces from a topological point of view

Knowledge spaces from a topological point of view Knowledge spaces from a topological point of view V.I.Danilov Central Economics and Mathematics Institute of RAS Abstract In this paper we consider the operations of restriction, extension and gluing of

More information

FIDUCIAL INFERENCE: AN APPROACH BASED ON BOOTSTRAP TECHNIQUES

FIDUCIAL INFERENCE: AN APPROACH BASED ON BOOTSTRAP TECHNIQUES U.P.B. Sci. Bull., Series A, Vol. 69, No. 1, 2007 ISSN 1223-7027 FIDUCIAL INFERENCE: AN APPROACH BASED ON BOOTSTRAP TECHNIQUES H.-D. HEIE 1, C-tin TÂRCOLEA 2, Adina I. TARCOLEA 3, M. DEMETRESCU 4 În prima

More information

A generic framework for resolving the conict in the combination of belief structures E. Lefevre PSI, Universite/INSA de Rouen Place Emile Blondel, BP

A generic framework for resolving the conict in the combination of belief structures E. Lefevre PSI, Universite/INSA de Rouen Place Emile Blondel, BP A generic framework for resolving the conict in the combination of belief structures E. Lefevre PSI, Universite/INSA de Rouen Place Emile Blondel, BP 08 76131 Mont-Saint-Aignan Cedex, France Eric.Lefevre@insa-rouen.fr

More information

Deng entropy in hyper power set and super power set

Deng entropy in hyper power set and super power set Deng entropy in hyper power set and super power set Bingyi Kang a, Yong Deng a,b, a School of Computer and Information Science, Southwest University, Chongqing, 40075, China b Institute of Integrated Automation,

More information

Boundary of the Set of Separable States

Boundary of the Set of Separable States Boundary of the Set of Separale States Mingjun Shi, Jiangfeng Du Laoratory of Quantum Communication and Quantum Computation, Department of Modern Physics, University of Science and Technology of China,

More information

Contradiction Measures and Specificity Degrees of Basic Belief Assignments

Contradiction Measures and Specificity Degrees of Basic Belief Assignments Contradiction Measures and Specificity Degrees of Basic Belief Assignments Florentin Smarandache Arnaud Martin Christophe Osswald Originally published as: Smarandache F., Martin A., Osswald C - Contradiction

More information

Max-margin structured output learning in L 1 norm space

Max-margin structured output learning in L 1 norm space Max-margin structured output learning in L norm space Sandor Szedmak ISIS Group, Electronics and Computer Science University of Southampton Southampton, United Kingdom ss03v@ecssotonacuk Yizhao Ni ISIS

More information

Evidence with Uncertain Likelihoods

Evidence with Uncertain Likelihoods Evidence with Uncertain Likelihoods Joseph Y. Halpern Cornell University Ithaca, NY 14853 USA halpern@cs.cornell.edu Riccardo Pucella Cornell University Ithaca, NY 14853 USA riccardo@cs.cornell.edu Abstract

More information

Motivation: Can the equations of physics be derived from information-theoretic principles?

Motivation: Can the equations of physics be derived from information-theoretic principles? 10. Physics from Fisher Information. Motivation: Can the equations of physics e derived from information-theoretic principles? I. Fisher Information. Task: To otain a measure of the accuracy of estimated

More information

Weak bidders prefer first-price (sealed-bid) auctions. (This holds both ex-ante, and once the bidders have learned their types)

Weak bidders prefer first-price (sealed-bid) auctions. (This holds both ex-ante, and once the bidders have learned their types) Econ 805 Advanced Micro Theory I Dan Quint Fall 2007 Lecture 9 Oct 4 2007 Last week, we egan relaxing the assumptions of the symmetric independent private values model. We examined private-value auctions

More information

Hierarchical DSmP Transformation for Decision-Making under Uncertainty

Hierarchical DSmP Transformation for Decision-Making under Uncertainty Hierarchical DSmP Transformation for Decision-Making under Uncertainty Jean Dezert Deqiang Han Zhun-ga Liu Jean-Marc Tacnet Originally published as Dezert J., Han D., Liu Z., Tacnet J.-M., Hierarchical

More information

Estimating a Finite Population Mean under Random Non-Response in Two Stage Cluster Sampling with Replacement

Estimating a Finite Population Mean under Random Non-Response in Two Stage Cluster Sampling with Replacement Open Journal of Statistics, 07, 7, 834-848 http://www.scirp.org/journal/ojs ISS Online: 6-798 ISS Print: 6-78X Estimating a Finite Population ean under Random on-response in Two Stage Cluster Sampling

More information

Geometry GENERAL GEOMETRY

Geometry GENERAL GEOMETRY Geometry GENERAL GEOMETRY Essential Vocabulary: point, line, plane, segment, segment bisector, midpoint, congruence I can use the distance formula to determine the area and perimeters of triangles and

More information

Towards a Structured Analysis of Approximate Problem Solving: ACaseStudy in Classification

Towards a Structured Analysis of Approximate Problem Solving: ACaseStudy in Classification Towards a Structured Analysis of Approximate Problem Solving: ACaseStudy in Classification Perry Groot and Annette ten Teije and Frank van Harmelen Division of Mathematics and Computer Science, Faculty

More information