19 research outputs found

    Positive dependence in qualitative probabilistic networks

    Full text link
    Qualitative probabilistic networks (QPNs) combine the conditional independence assumptions of Bayesian networks with the qualitative properties of positive and negative dependence. They formalise various intuitive properties of positive dependence to allow inferences over a large network of variables. However, we will demonstrate in this paper that, due to an incorrect symmetry property, many inferences obtained in non-binary QPNs are not mathematically true. We will provide examples of such incorrect inferences and briefly discuss possible resolutions.Comment: 10 pages, 3 figure

    Interactive Problem Structuring with ICZM Stakeholders

    Get PDF
    Integrated Coastal Zone Management (ICZM) is struggling with a lack of science-management integration. Many computer systems, usually known as “decision support systems”, have been developed with the intention to make scientific knowledge about complex systems more accessible for coastal managers. These tools, allowing a multi-disciplinary approach with multi-criteria analyses, are designed for well-defined, structured problems. However, in practice stakeholder consensus on the problem structure is usually lacking. Aim of this paper is to explore the practical opportunities for the new so-called Quasta approach to structure complex problems in a group setting. This approach is based on a combination of Cognitive Mapping and Qualitative Probabilistic Networks. It comprehends a new type of computer system which is quite simple and flexible as well. The tool is tested in two workshops in which various coastal management issues were discussed. Evaluations of these workshops show that (1) this system helps stakeholders to make them aware of causal relationships, (2) it is useful for a qualitative exploration of scenarios, (3) it identifies the quantitative knowledge gaps of the problem being discussed and (4) the threshold for non technicians to use this tool is quite low.Integrated Coastal Zone Management, Problem Structuring, Stakeholder Participation, Cognitive Mapping, Interactive Policy Making

    Explaining inference on a population of independent agents using Bayesian networks

    Get PDF
    The main goal of this research is to design, implement, and evaluate a novel explanation method, the hierarchical explanation method (HEM), for explaining Bayesian network (BN) inference when the network is modeling a population of conditionally independent agents, each of which is modeled as a subnetwork. For example, consider disease-outbreak detection in which the agents are patients who are modeled as independent, conditioned on the factors that cause disease spread. Given evidence about these patients, such as their symptoms, suppose that the BN system infers that a respiratory anthrax outbreak is highly likely. A public-health official who received such a report would generally want to know why anthrax is being given a high posterior probability. The HEM explains such inferences. The explanation approach is applicable in general to inference on BNs that model conditionally independent agents; it complements previous approaches for explaining inference on BNs that model a single agent (e.g., for explaining the diagnostic inference for a single patient using a BN that models just that patient). The hypotheses that were tested are: (1) the proposed explanation method provides information that helps a user to understand how and why the inference results have been obtained, (2) the proposed explanation method helps to improve the quality of the inferences that users draw from evidence

    A Framework for Cyber Vulnerability Assessments of InfiniBand Networks

    Get PDF
    InfiniBand is a popular Input/Output interconnect technology used in High Performance Computing clusters. It is employed in over a quarter of the world’s 500 fastest computer systems. Although it was created to provide extremely low network latency with a high Quality of Service, the cybersecurity aspects of InfiniBand have yet to be thoroughly investigated. The InfiniBand Architecture was designed as a data center technology, logically separated from the Internet, so defensive mechanisms such as packet encryption were not implemented. Cyber communities do not appear to have taken an interest in InfiniBand, but that is likely to change as attackers branch out from traditional computing devices. This thesis considers the security implications of InfiniBand features and constructs a framework for conducting Cyber Vulnerability Assessments. Several attack primitives are tested and analyzed. Finally, new cyber tools and security devices for InfiniBand are proposed, and changes to existing products are recommended

    Modelling Event-Based Interactions in Component-Based Architectures for Quantitative System Evaluation

    Get PDF
    This dissertation thesis presents an approach enabling the modelling and quality-of-service prediction of event-based systems at the architecture-level. Applying a two-step model refinement transformation, the approach integrates platform-specific performance influences of the underlying middleware while enabling the use of different existing analytical and simulation-based prediction techniques
    corecore