2017
DOI: 10.1007/978-3-319-67190-1_7
|View full text |Cite
|
Sign up to set email alerts
|

Preventing Groundings and Handling Evidence in the Lifted Junction Tree Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
5

Relationship

3
2

Authors

Journals

citations
Cited by 9 publications
(14 citation statements)
references
References 10 publications
0
14
0
Order By: Relevance
“…Lauritzen and Spiegelhalter (1988) introduce the junction tree algorithm. To benefit from the ideas of the junction tree algorithm and LVE, Braun and Möller (2016) present LJT, which efficiently performs exact first-order probabilistic inference on relational models given a set of queries.…”
Section: Arxiv:180700744v1 [Csai] 2 Jul 2018mentioning
confidence: 99%
See 2 more Smart Citations
“…Lauritzen and Spiegelhalter (1988) introduce the junction tree algorithm. To benefit from the ideas of the junction tree algorithm and LVE, Braun and Möller (2016) present LJT, which efficiently performs exact first-order probabilistic inference on relational models given a set of queries.…”
Section: Arxiv:180700744v1 [Csai] 2 Jul 2018mentioning
confidence: 99%
“…To provide means to answer queries for PMs, we introduce LJT, mainly based on (Braun and Möller 2017). Afterwards, we present LDJT (Gehrke, Braun, and Möller 2018) consisting of FO jtree constructions for a PDM and a filtering and prediction algorithm.…”
Section: Lifted Dynamic Junction Tree Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…A known universe means that logvars in parfactors or Markov logic networks have a domain and possibly a constraint restricting domains to certain constants for specific parfactors or formulas. Lifted inference algorithms such as (i) lifted variable elimination (LVE) (Poole 2003;Taghipour et al 2013), (ii) the lifted junction tree algorithm (Braun and Möller 2017), (iii) first-order knowledge compilation (Van den Broeck et al 2011), (iv) probabilistic theorem proving (Gogate and Domingos 2011), or (v) lifted belief propagation (Ahmadi et al 2013), use domains or constraints to determine the number of individuals represented to be able to perform efficient inference.…”
Section: Introductionmentioning
confidence: 99%
“…More specifically, IT security involves network dependencies (relational) for many components (objects), streams of attacks over time (temporal), and uncertainties due to, for example, missing or incomplete information, caused by faulty sensor data. By performing model counting, probabilistic databases (PDBs) can answer queries for relational temporal models with uncertainties (Dignös, Böhlen, and Gamper 2012;Dylla, Miliaraki, and Theobald 2013). However, each query embeds a process behaviour, resulting in huge queries with possibly redundant information.…”
Section: Introductionmentioning
confidence: 99%