


default search action
6th UAI 1990: Cambridge, MA, USA
- Piero P. Bonissone, Max Henrion, Laveen N. Kanal, John F. Lemmer:
UAI '90: Proceedings of the Sixth Annual Conference on Uncertainty in Artificial Intelligence, MIT, Cambridge, MA, USA, July 27-29, 1990. Elsevier 1991, ISBN 0-444-89264-8 - Michael P. Wellman:
Exploiting functional dependencies in qualitative probabilistic reasoning. 3-16 - Max Henrion, Marek J. Druzdzel:
Qualtitative propagation and scenario-based scheme for exploiting probabilistic reasoning. 17-32 - Thomas R. Shultz:
Propagating uncertainty in rule based cognitive modelling. 33-40 - Yizong Cheng:
Context-dependent similarity. 41-50 - David Heckerman:
Similarity networks for the construction of multiple-faults belief networks. 51-64 - Dan Geiger, David Heckerman:
separable and transitive graphoids. 65-76 - Dekang Lin, Randy Goebel:
Integrating probabilistic, taxonomic and causal knowledge in abductive diagnosis. 77-88 - David L. Poole, Gregory M. Provan:
What is the most likely diagnosis? 89-106 - Thomas D. Wu:
Probabilistic evaluation of candidate sets for multidisorder diagnosis. 107-116 - Edward Herskovits, Gregory F. Cooper:
an entropy-driven system for construction of probabilistic expert systems from databases. 117-128 - Jack S. Breese, Eric Horvitz:
Ideal reformulation of belief networks. 129-144 - David Heckerman, Eric Horvitz:
Problem formulation as the reduction of a decision model. 159-170 - Robert P. Goldman, Eugene Charniak:
Dynamic construction of belief networks. 171-184 - Solomon Eyal Shimony, Eugene Charniak:
A new algorithm for finding MAP assignments to belief networks. 185-196 - Ross D. Shachter, Stig K. Andersen, Kim-Leng Poh:
Directed reduction algorithms and decomposable graphs. 197-208 - Wilson X. Wen:
Optimal decomposition of belief networks. 209-224 - Michelle Baker, Terrance E. Boult:
Pruning bayesian networks for efficient computation. 225-232 - Behzad Parviz:
On heuristics for finding loop cutsets in multiply-connected belief networks. 233-244 - Henri Jacques Suermondt, Gregory F. Cooper, David Heckerman:
A combination of cutset conditioning with clique-tree propagation in the Pathfinder system. 245-254 - Thomas Verma, Judea Pearl:
Equivalence and synthesis of causal models. 255-270 - Enrique H. Ruspini:
Possibility as similarity; the semantics of fuzzy logic. 271-280 - Soumitra Dutta, Piero P. Bonissone:
Integrating case-based and rule based reasoning: the possibilistic connection. 281-298 - Ronald R. Yager:
Credibility discounting in the theory of approximate reasoning. 299-310 - Didier Dubois, Henri Prade:
Updating with belief functions, ordinal conditional functions and possibility measures. 311-330 - Hamid R. Berenji, Yung-Yaw Chen, Chuen-Chien Lee, Jyh-Shing Roger Jang, S. Murugesan:
A hierarchical approach to designing approximate reasoning-based controllers for dynamic physical systems. 331-346 - Ronald Fagin, Joseph Y. Halpern:
A new approach to updating beliefs. 347-374 - Philippe Smets:
The transferable belief model and other interpretations of Dempster-Shafer's model. 375-384 - Prakash P. Shenoy:
Valuation-based systems for discrete optimisation. 385-400 - Robert Kennes, Philippe Smets:
Computational aspects of the Mobius transformation. 401-416 - Alessandro Saffiotti:
Using Dempster-Shafer theory in knowledge representation. 417-434 - Kuo-Chu Chang, Robert M. Fung:
Refinement and coarsening of Bayesian networks. 435-446 - Gerhard Paass:
Second order probabilities for uncertain and conflicting evidence. 447-456 - Linda C. van der Gaag:
Computing probability intervals under independency constraints. 457-466 - Jack S. Breese, Kenneth W. Fertig:
Decision making with interval influence diagrams. 467-480 - Mary McLeish:
A model for non-monotonic reasoning using Dempster's rule. 481-494 - Philippe Smets, Yen-Teh Hsia:
Default reasoning and the transferable belief model. 495-504 - Peter Haddawy:
Time, chance and action. 505-518 - Finn Verner Jensen, Bo Chamberlain, Torsten Nordahl, Frank Jensen:
Analysis in HUGIN of data conflict. 519-528

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.