Threshold-based belief change: Rankings and semiorders

被引:0
|
作者
Raidl, Eric [1 ]
Rott, Hans [2 ]
机构
[1] Univ Tubingen, Tubingen, Germany
[2] Univ Regensburg, Regensburg, Germany
关键词
belief revision; belief contraction; thresholds for belief; ranking theory; semiorders; plausibility; REVISION; CONTRACTION; LOGIC;
D O I
暂无
中图分类号
B81 [逻辑学(论理学)];
学科分类号
010104 ; 010105 ;
摘要
In this paper we study changes of beliefs in a ranking-theoretic setting using non-extremal implausibility thresholds for belief. We represent implausibilities as ranks and introduce natural rank changes subject to a minimal change criterion. We show that many of the traditional AGM postulates for revision and contraction are preserved, except for the postulate of Preservation which is invalid. The diagnosis for belief contraction is similar, but not exactly the same. We demonstrate that the one-shot versions of both revision and contraction can be represented as revisions based on semiorders, but in two subtly different ways. We provide sets of postulates that are sound and complete in the sense that they allow us to prove representation theorems. We show that, and explain why, the classical duality between revision and contraction, as exhibited by the Levi and Harper identities, is partly broken by threshold-based belief changes. We also study the logic of iterated threshold-based revision and contraction. The traditional Darwiche-Pearl postulates for iterated revision continue to hold, as well as two additional postulates that characterize ranking-based revision as a restricted 'improvement' operator. We investigate the dual notion of iterated threshold-based belief contraction and provide a new set of postulates for it, characterizing contraction as a restricted 'degrading' operator.
引用
收藏
页码:429 / 477
页数:49
相关论文
共 50 条
  • [31] Threshold-based congestion control in ATM networks
    Ilyas, M
    Alsaka, Y
    SOUTHCON/96 - CONFERENCE RECORD, 1996, : 45 - 48
  • [32] Threshold-based clustering for intrusion detection systems
    Nikulin, Vladimir
    DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2006, 2006, 6241
  • [33] A Threshold-Based Approach for Acoustic Signal Processing
    Chen, Dongming
    Zhu, Zhiliang
    2010 CHINESE CONTROL AND DECISION CONFERENCE, VOLS 1-5, 2010, : 1039 - 1042
  • [34] Join processing with threshold-based filtering in MapReduce
    Taewhi Lee
    Hye-Chan Bae
    Hyoung-Joo Kim
    The Journal of Supercomputing, 2014, 69 : 793 - 813
  • [35] On Quasi-Isometry of Threshold-Based Sampling
    Moser, Bernhard A.
    Lunglmayr, Michael
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2019, 67 (14) : 3832 - 3841
  • [36] Join processing with threshold-based filtering in MapReduce
    Lee, Taewhi
    Bae, Hye-Chan
    Kim, Hyoung-Joo
    JOURNAL OF SUPERCOMPUTING, 2014, 69 (02): : 793 - 813
  • [37] Threshold-based multicast for continuous media delivery
    Gao, L.
    Towsley, D.
    IEEE Transactions on Multimedia, 2001, 3 (04) : 405 - 414
  • [38] Threshold-based Multichannel Access with Energy Constraint
    Yang, Bo
    Shen, Yanyan
    Johansson, Mikael
    Guan, Xinping
    2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2010,
  • [39] Bias adjustment for threshold-based climate indicators
    Hoffmann, Peter
    Menz, Christoph
    Spekat, Arne
    ADVANCES IN SCIENCE AND RESEARCH, 2018, 15 : 107 - 116
  • [40] The Optimization of Threshold-Based Naive Bayesian Algorithm
    Wang Xin
    Jiang Hua
    THIRD INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING, 2009, : 762 - 764