Understanding Bayes Net Inference Algorithm from Russel & Norvig

  • Thread starter Thread starter 0rthodontist
  • Start date Start date
  • Tags Tags
    Net
AI Thread Summary
The discussion centers on the confusion surrounding the Bayes Net Inference Algorithm, specifically the Enumerate-All function from Russel & Norvig's work. The user seeks clarity on how the probability P(y | parents(Y)) is calculated when the values of the parent variables are unknown. It is highlighted that the algorithm requires extending the evidence set with possible values for the variable Y, which allows for the computation of probabilities based on the known parent values. The normalization step at the end ensures that the distribution over X is valid. Understanding these steps is crucial for grasping how the algorithm computes the distribution of the query variable X given observed values.
0rthodontist
Science Advisor
Messages
1,229
Reaction score
0
I don't understand this simple algorithm from Russel & Norvig for computing a distribution of X given certain observed values e:

Code:
function Enumeration-Ask(X, e, bn) returns a distribution over X
	inputs: X, the query variable
		e, observed values for variables E
		bn, a Bayes net with variables {X} u E u Y /* Y = hidden variables */
	
	Q(X) <- a distribution over X, initially empty
	for each value xi of X do
		extend e with value xi for X
		Q(xi) <- Enumerate-All(Vars[bn], e)
	return Normalize(Q(X))
	
function Enumerate-All(vars, e) returns a real number
	if Empty?(vars) then return 1.0
	Y <- First(vars)
	if Y has value y in e
		then return P(y | parents(Y)) * Enumerate-All(Rest(vars), e)
		else return the sum over y of P(y | parents(Y)) * Enumerate-All(Rest(vars), ey)
			where ey is e extended with Y = y

I am having trouble understanding exactly what Enumerate-All does. Specifically I do not understand how P(y | parents(Y)) is computed. We don't know the values that the parents of Y take, do we?
 
Thread 'Is this public key encryption?'
I've tried to intuit public key encryption but never quite managed. But this seems to wrap it up in a bow. This seems to be a very elegant way of transmitting a message publicly that only the sender and receiver can decipher. Is this how PKE works? No, it cant be. In the above case, the requester knows the target's "secret" key - because they have his ID, and therefore knows his birthdate.

Similar threads

Replies
1
Views
2K
Replies
9
Views
2K
Replies
15
Views
2K
Replies
8
Views
2K
Replies
1
Views
2K
Replies
5
Views
2K
Back
Top