2004
DOI: 10.1142/s0218488504002552
|View full text |Cite
|
Sign up to set email alerts
|

An Extension of Lazy Evaluation for Influence Diagrams Avoiding Redundant Variables in the Potentials

Abstract: Standard methods for solving influence diagrams consist in stepwise elimination of variables, and along with elimination of a variable a set of new potentials over new domains is calculated. It is well known that these methods tend to produce unnecessarily large domains resulting in excessive consumption of time and memory. The lazy evaluation method represents only a partial solution to the problem. In this paper we extend any potential with two graphs over its domain representing the dependencies of variable… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0
1

Year Published

2005
2005
2010
2010

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 5 publications
0
4
0
1
Order By: Relevance
“…3 However, variable-elimination algorithms developed up to date (Shenoy, 1992;Jensen et al, 1994;Jensen, 2001) were not able to deal with IDs having a structure of super-value nodes such as the one in our example. The algorithms for detecting structural redundancies (Faguiouli and Zaffalon, 1998;Shachter, 1998;Nielsen and Jensen, 1999;Nilsson and Lauritzen, 2000;Vomlelova and Jensen, 2002) have the same shortcoming, so they cannot help the Tatman-Shachter algorithm to remove redundant variables.…”
Section: Related Work and Future Researchmentioning
confidence: 99%
See 1 more Smart Citation
“…3 However, variable-elimination algorithms developed up to date (Shenoy, 1992;Jensen et al, 1994;Jensen, 2001) were not able to deal with IDs having a structure of super-value nodes such as the one in our example. The algorithms for detecting structural redundancies (Faguiouli and Zaffalon, 1998;Shachter, 1998;Nielsen and Jensen, 1999;Nilsson and Lauritzen, 2000;Vomlelova and Jensen, 2002) have the same shortcoming, so they cannot help the Tatman-Shachter algorithm to remove redundant variables.…”
Section: Related Work and Future Researchmentioning
confidence: 99%
“…All these algorithms try to keep the separability of the utility function as long as possible during the evaluation of the ID, not only for the sake of efficiency, but also to avoid the introduction of redundant variables in the resulting policies. However, all of them may introduce redundant variables, and for this reason some authors have proposed other algorithms that analyze the graph in order to detect those actually required (Faguiouli and Zaffalon, 1998;Shachter, 1998;Nielsen and Jensen, 1999;Nilsson and Lauritzen, 2000;Vomlelova and Jensen, 2002).…”
Section: Introductionmentioning
confidence: 99%
“…Finding explanations is a goal pursued within a number of disciplines, such as knowledge-based systems and machine learning. Thus, our approach bears some resemblance to knowledge extraction techniques, such as are used to construct tree-based classifiers [3], oblivious read-once decision graphs [11], rough sets [17], and to identify which nodes are relevant for each decision node in an influence diagram [13,20]. As explained in detail in [7], the KBM2L method tries to reorganize a knowledge structure by a global search for good, representative candidates.…”
Section: Introductionmentioning
confidence: 99%
“…The problem of redundant variables is not specific for UIDs, but also occurs when solving e.g. influence diagrams using standard solution algorithms (see alsoVomlelova and Jensen (2004)). …”
mentioning
confidence: 99%