[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Skip header Section
Graphical models for machine learning and digital communicationSeptember 1998
Publisher:
  • MIT Press
  • 55 Hayward St.
  • Cambridge
  • MA
  • United States
ISBN:978-0-262-06202-2
Published:14 September 1998
Pages:
195
Reflects downloads up to 07 Mar 2025Bibliometrics
Abstract

No abstract available.

Cited By

  1. Megahed M and Mohammed A (2024). A comprehensive review of generative adversarial networks, WIREs Computational Statistics, 16:1, Online publication date: 21-Jan-2024.
  2. Ghalebikesabi S, Holmes C, Fong E and Lehmann B Quasi-Bayesian nonparametric density estimation via autoregressive predictive updates Proceedings of the Thirty-Ninth Conference on Uncertainty in Artificial Intelligence, (658-668)
  3. Shi D, Song L, Zhou W, Gao X, Wang C and Ye Li G (2023). Channel Acquisition for HF Skywave Massive MIMO-OFDM Communications, IEEE Transactions on Wireless Communications, 22:6, (4074-4089), Online publication date: 1-Jun-2023.
  4. Liu X, Wang W, Song X, Gao X and Fettweis G (2021). Sparse Channel Estimation via Hierarchical Hybrid Message Passing for Massive MIMO-OFDM Systems, IEEE Transactions on Wireless Communications, 20:11, (7118-7134), Online publication date: 1-Nov-2021.
  5. ACM
    Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A and Bengio Y (2020). Generative adversarial networks, Communications of the ACM, 63:11, (139-144), Online publication date: 22-Oct-2020.
  6. Rangan S, Fletcher A, Goyal V, Byrne E and Schniter P (2017). Hybrid Approximate Message Passing, IEEE Transactions on Signal Processing, 65:17, (4577-4592), Online publication date: 1-Sep-2017.
  7. Goessling M (2017). LogitBoost autoregressive networks, Computational Statistics & Data Analysis, 112:C, (88-98), Online publication date: 1-Aug-2017.
  8. Nicolescu R, Gimel'farb G, Morris J, Delmas P and Gong R (2014). Regularising Ill-posed Discrete Optimisation, Fundamenta Informaticae, 131:3-4, (465-483), Online publication date: 1-Jul-2014.
  9. Park I, Archer E, Latimer K and Pillow J Universal models for binary spike patterns using centered Dirichlet processes Proceedings of the 27th International Conference on Neural Information Processing Systems - Volume 2, (2463-2471)
  10. Uria B, Murray I and Larochelle H RNADE Proceedings of the 27th International Conference on Neural Information Processing Systems - Volume 2, (2175-2183)
  11. Gelfand A and Welling M Generalized Belief Propagation on tree robust structured region graphs Proceedings of the Twenty-Eighth Conference on Uncertainty in Artificial Intelligence, (296-305)
  12. Graves A Practical variational inference for neural networks Proceedings of the 25th International Conference on Neural Information Processing Systems, (2348-2356)
  13. Moallemi C and Van Roy B (2011). Resource Allocation via Message Passing, INFORMS Journal on Computing, 23:2, (205-219), Online publication date: 1-Apr-2011.
  14. ACM
    Darwiche A (2010). Bayesian networks, Communications of the ACM, 53:12, (80-90), Online publication date: 1-Dec-2010.
  15. Hazan T and Shashua A (2010). Norm-product belief propagation, IEEE Transactions on Information Theory, 56:12, (6294-6316), Online publication date: 1-Dec-2010.
  16. Wang C, Teboul O, Michel F, Essafi S and Paragios N 3D knowledge-based segmentation using pose-invariant higher-order graphs Proceedings of the 13th international conference on Medical image computing and computer-assisted intervention: Part III, (189-196)
  17. ACM
    Wang C, Han J, Jia Y, Tang J, Zhang D, Yu Y and Guo J Mining advisor-advisee relationships from research publication networks Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, (203-212)
  18. Baron D, Sarvotham S and Baraniuk R (2010). Bayesian compressive sensing via belief propagation, IEEE Transactions on Signal Processing, 58:1, (269-280), Online publication date: 1-Jan-2010.
  19. Lin D and Lim T (2009). A variational inference framework for soft-in soft-out detection in multiple-access channels, IEEE Transactions on Information Theory, 55:5, (2345-2364), Online publication date: 1-May-2009.
  20. Komodakis N, Tziritas G and Paragios N (2008). Performance vs computational efficiency for optimizing single and dynamic MRFs, Computer Vision and Image Understanding, 112:1, (14-29), Online publication date: 1-Oct-2008.
  21. Bishop C A new framework for machine learning Proceedings of the 2008 IEEE world conference on Computational intelligence: research frontiers, (1-24)
  22. Rizzo T, Stéger J, Pollner P, Csabai I and Vattay G High quality queueing information from accelerated active network tomography Proceedings of the 4th International Conference on Testbeds and research infrastructures for the development of networks & communities, (1-10)
  23. Jian Ni and Tatikonda S Performance Evaluation of Loss Networks via Factor Graphs and the Sum-Product Algorithm Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (409-417)
  24. Tan Z (2006). Fuzzy Metagraph and Its Combination with the Indexing Approach in Rule-Based Systems, IEEE Transactions on Knowledge and Data Engineering, 18:6, (829-841), Online publication date: 1-Jun-2006.
  25. Ralaivola L, Swamidass S, Saigo H and Baldi P (2005). 2005 Speical Issue, Neural Networks, 18:8, (1093-1110), Online publication date: 1-Oct-2005.
  26. Veeramachaneni S, Sarkar P and Nagy G Modeling context as statistical dependence Proceedings of the 5th international conference on Modeling and Using Context, (515-528)
  27. Bugallo M, Míguez J and Castedo L (2003). Decision-feedback interference suppression in CDMA systems, Signal Processing, 83:10, (2179-2193), Online publication date: 1-Oct-2003.
  28. Stainvas I and Lowe D (2003). A Generative Probabilistic Oriented Wavelet Model for Texture Segmentation, Neural Processing Letters, 17:3, (217-238), Online publication date: 1-Jun-2003.
  29. Mohit B and Narayanan S Semantic extraction with wide-coverage lexical resources Proceedings of the 2003 Conference of the North American Chapter of the Association for Computational Linguistics on Human Language Technology: companion volume of the Proceedings of HLT-NAACL 2003--short papers - Volume 2, (64-66)
  30. Fischer B and Schumann J (2003). AutoBayes: a system for generating data analysis programs from statistical models, Journal of Functional Programming, 13:3, (483-508), Online publication date: 1-May-2003.
  31. ACM
    Dechter R and Rish I (2003). Mini-buckets, Journal of the ACM, 50:2, (107-153), Online publication date: 1-Mar-2003.
  32. Yedidia J, Freeman W and Weiss Y Understanding belief propagation and its generalizations Exploring artificial intelligence in the new millennium, (239-269)
  33. Frey B and Jojic N (2003). Transformation-Invariant Clustering Using the EM Algorithm, IEEE Transactions on Pattern Analysis and Machine Intelligence, 25:1, (1-17), Online publication date: 1-Jan-2003.
  34. Rezek I, Gibbs M and Roberts S (2002). Maximum a Posteriori Estimation of Coupled Hidden Markov Models, Journal of VLSI Signal Processing Systems, 32:1-2, (55-66), Online publication date: 1-Aug-2002.
  35. Freeman W, Pasztor E and Carmichael O (2000). Learning Low-Level Vision, International Journal of Computer Vision, 40:1, (25-47), Online publication date: 1-Oct-2000.
  36. Schuurmans D and Southey F Monte Carlo inference via greedy importance sampling Proceedings of the Sixteenth conference on Uncertainty in artificial intelligence, (523-532)
  37. Yedidia J, Freeman W and Weiss Y Generalized belief propagation Proceedings of the 14th International Conference on Neural Information Processing Systems, (668-674)
  38. Frey B, Patrascu R, Jaakkola T and Moran J Sequentially fitting "Inclusive" trees for inference in noisy-OR networks Proceedings of the 14th International Conference on Neural Information Processing Systems, (472-478)
  39. Wong K and Nishimori H Stagewise processing in error-correcting codes and image restoration Proceedings of the 14th International Conference on Neural Information Processing Systems, (325-331)
  40. Schuurmans D Greedy importance sampling Proceedings of the 13th International Conference on Neural Information Processing Systems, (596-602)
  41. Frey B Local probability propagation for factor analysis Proceedings of the 13th International Conference on Neural Information Processing Systems, (442-448)
  42. Bengio Y and Bengio S Modeling high-dimensional discrete data with multi-layer neural networks Proceedings of the 13th International Conference on Neural Information Processing Systems, (400-406)
  43. Lafferty J and Vardy A (1999). Ordered Binary Decision Diagrams and Minimal Trellises, IEEE Transactions on Computers, 48:9, (971-986), Online publication date: 1-Sep-1999.
  44. ACM
    Davies S and Moore A Bayesian networks for lossless dataset compression Proceedings of the fifth ACM SIGKDD international conference on Knowledge discovery and data mining, (387-391)
  45. Pavlovic V, Frey B and Huang T Variational learning in mixed-state dynamic graphical models Proceedings of the Fifteenth conference on Uncertainty in artificial intelligence, (522-530)
  46. Mühlenbein H, Mahnig T and Rodriguez A (1999). Schemata, Distributions and Graphical Models in Evolutionary Optimization, Journal of Heuristics, 5:2, (215-247), Online publication date: 1-Jul-1999.
  47. Johnson M, Geman S, Canon S, Chi Z and Riezler S Estimators for stochastic "Unification-Based" grammars Proceedings of the 37th annual meeting of the Association for Computational Linguistics on Computational Linguistics, (535-541)
  48. Kabashima Y and Saad D The belief in TAP Proceedings of the 12th International Conference on Neural Information Processing Systems, (246-252)
  49. Frey B and MacKay D A revolution Proceedings of the 11th International Conference on Neural Information Processing Systems, (479-485)
Contributors
  • University of Toronto

Reviews

Cecilia G. Manrique

Frey uses probability theory and graphical models to connect information theory and machine learning. Graphical models become useful in identifying and classifying patterns, in understanding nonsequential learning, and in data compression and channel coding. Various examples of graphical models are used in the work, such as Markov random fills, Bayesian networks, chain graphs, and factor graphs. Many of these models have applications in genetics to identify clique, generational, and ancestral relations. Frey believes in the use of these graphical models to develop algorithms for pattern classification, nonsequential learning, data compression, and channel coding. His ultimate goal is to come up with code that will give excellent performance as well as good results. The use of humor and examples makes this work quite entertaining. The first interesting example is how the United States Postal Service Office of Advanced Technology has worked on the machine identification of handwritten digits in zip codes. With the use of the nearest neighbor classifier and the k -nearest neighbor classifier, they have been able to reduce the misclassification rate to 6.7 percent on a test set of 4000 handwriting patterns. Clearly, pattern classification is possible here. The second example is the burglar alarm problem of determining whether the alarm was set off by a real burglar and not just tripped by an earthquake. Frey's discussion of this problem shows how biological systems respond to their environment and how multiple-cause networks can be supervised and trained to identify a pattern even though there may be meaningful hidden causes for the sensory input. The system is then trained to respond to nonsequential learning patterns. The goal of data compression is to exploit the redundancy in input patterns to represent individual patterns concisely on average. The best result is lossless data compression, whereby the original pattern can be completely recovered despite the compression. The concern of channel coding is to come up with efficient, reliable methods of communicating discrete messages over physical channels that may introduce errors. The author's sense of humor is also shown by the use of such witticisms as “A code by any other network would not decode as sweetly” or “Just toss the graphical model in a bag and shake.” By interspersing his mathematical and graphical presentations with examples and humor, he helped ease the intellectual burden on readers who are less mathematically inclined or have less of a mathematical background. The author's emphasis on future research directions is also valuable. He sees this work as part of a larger scientific process, and suggests ways of describing problems and developing useful algorithms that will allow us to treat what are deemed to be complicated problems in simple ways. This would mean improving model structures, as he has tried to do in this work. It co<__?__Pub Caret>uld also mean getting into interactive decoding. He believes that coming up with snappy algorithms will bring about faster influence and learning, but he recognizes the researcher's dilemma: How do you know when to stop__?__ How do you know it is meaningful__?__ According to Frey, solving this could mean “scaling up the brain.”

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Please enable JavaScript to view thecomments powered by Disqus.

Recommendations

Skip Bibliometrics Section