[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Skip header Section
Bayesian Networks: An IntroductionNovember 2009
Publisher:
  • Wiley Publishing
ISBN:978-0-470-74304-1
Published:16 November 2009
Pages:
366
Skip Bibliometrics Section
Reflects downloads up to 17 Dec 2024Bibliometrics
Skip Abstract Section
Abstract

Bayesian Networks: An Introduction provides a self-contained introduction to the theory and applications of Bayesian networks, a topic of interest and importance for statisticians, computer scientists and those involved in modelling complex data sets. The material has been extensively tested in classroom teaching and assumes a basic knowledge of probability, statistics and mathematics. All notions are carefully explained and feature exercises throughout. Features include: An introduction to Dirichlet Distribution, Exponential Families and their applications. A detailed description of learning algorithms and Conditional Gaussian Distributions using Junction Tree methods. A discussion of Pearl's intervention calculus, with an introduction to the notion of see and do conditioning. All concepts are clearly defined and illustrated with examples and exercises. Solutions are provided online. This book will prove a valuable resource for postgraduate students of statistics, computer engineering, mathematics, data mining, artificial intelligence, and biology. Researchers and users of comparable modelling or statistical techniques such as neural networks will also find this book of interest.

Cited By

  1. Chiang Y, Lin Y, Chang C and Hong Y (2024). Throughput Analysis for Parallel Decoding of Irregular Repetition Slotted ALOHA With Noise, IEEE/ACM Transactions on Networking, 32:4, (3544-3558), Online publication date: 1-Aug-2024.
  2. Yu C, Huang L, Chang C and Lee D (2021). Poisson Receivers: A Probabilistic Framework for Analyzing Coded Random Access, IEEE/ACM Transactions on Networking, 29:2, (862-875), Online publication date: 1-Apr-2021.
  3. Ishizaki T, Ku R and Imura J Eigenstructure analysis from symmetrical graph motives with application to aggregated controller design 2016 IEEE 55th Conference on Decision and Control (CDC), (5744-5749)
  4. Mansouri N, Javidi M and Mohammad Hasani Zade B (2019). Using data mining techniques to improve replica management in cloud environment, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 24:10, (7335-7360), Online publication date: 1-May-2020.
  5. Laskey K, Sun W, Hanson R, Twardy C, Matsumoto S and Goldfedder B (2019). Graphical model market maker for combinatorial prediction markets, Journal of Artificial Intelligence Research, 63:1, (421-460), Online publication date: 1-Sep-2018.
  6. ACM
    Setiawan F, Budiardjo E, Basaruddin T and Aminah S A Systematic Literature Review on Combining Ontology with Bayesian Network to Support Logical and Probabilistic Reasoning Proceedings of the 2017 International Conference on Software and e-Business, (1-12)
  7. Zafarani R and Liu H (2016). Users joining multiple sites, Information Fusion, 28:C, (83-89), Online publication date: 1-Mar-2016.
  8. Sipahi D, Dalklç G and Özcanhan M (2015). Detecting spam through their Sender Policy Framework records, Security and Communication Networks, 8:18, (3555-3563), Online publication date: 1-Dec-2015.
  9. Xu Y, Xu H and Zhang D (2015). A novel disjoint community detection algorithm for social networks based on backbone degree and expansion, Expert Systems with Applications: An International Journal, 42:21, (8349-8360), Online publication date: 30-Nov-2015.
  10. Liu Z, Jiang C, Wang J and Yu H (2015). The node importance in actual complex networks based on a multi-attribute ranking method, Knowledge-Based Systems, 84:C, (56-66), Online publication date: 1-Aug-2015.
  11. ACM
    Jin X, Liu H, Gandhi R, Kandula S, Mahajan R, Zhang M, Rexford J and Wattenhofer R (2014). Dynamic scheduling of network updates, ACM SIGCOMM Computer Communication Review, 44:4, (539-550), Online publication date: 25-Feb-2015.
  12. ACM
    Jin X, Liu H, Gandhi R, Kandula S, Mahajan R, Zhang M, Rexford J and Wattenhofer R Dynamic scheduling of network updates Proceedings of the 2014 ACM conference on SIGCOMM, (539-550)
  13. ACM
    Devooght R, Mantrach A, Kivimäki I, Bersini H, Jaimes A and Saerens M Random walks based modularity Proceedings of the 23rd international conference on World wide web, (213-224)
  14. ACM
    Homan C, Lu N, Tu X, Lytle M and Silenzio V Social structure and depression in TrevorSpace Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing, (615-625)
  15. ACM
    Van Vlasselaer V, Meskens J, Van Dromme D and Baesens B Using social network knowledge for detecting spider constructions in social security fraud Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (813-820)
  16. ACM
    Gunasekara R, Mehrotra K and Mohan C Multi-objective restructuring in social networks Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (277-281)
  17. Matuszak M and Miękisz J Stochastic techniques in influence diagrams for learning bayesian network structure Proceedings of the 22nd international conference on Artificial Neural Networks and Machine Learning - Volume Part I, (33-40)
  18. Sun W, Hanson R, Laskey K and Twardy C Probability and asset updating using Bayesian networks for combinatorial prediction markets Proceedings of the Twenty-Eighth Conference on Uncertainty in Artificial Intelligence, (815-824)
  19. Matuszak M, Miekisz J and Schreiber T Smooth conditional transition paths in dynamical gaussian networks Proceedings of the 34th Annual German conference on Advances in artificial intelligence, (204-215)
Contributors
  • KTH Royal Institute of Technology
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations