From: watson@tds.com
To: cypherpunks@toad.com
Message Hash: 4f8d4dd458b87c676d04a7887c3a54a07fd0cc7ca9fff72ac6d90bac7cf60466
Message ID: <Pine.SOL.3.91.960508221153.24982B-100000@mailman.tds.com>
Reply To: N/A
UTC Datetime: 1996-05-09 10:52:36 UTC
Raw Date: Thu, 9 May 1996 18:52:36 +0800
From: watson@tds.com
Date: Thu, 9 May 1996 18:52:36 +0800
To: cypherpunks@toad.com
Subject: re: Dempster-Shafer...(re: Transitive
Message-ID: <Pine.SOL.3.91.960508221153.24982B-100000@mailman.tds.com>
MIME-Version: 1.0
Content-Type: text/plain
tcmay's approach is elegant, and it's refreshing to find a practical use
for AI approaches. I think it needs one more step, though. If we learn
to quantify our trust in a key, we still need to know what the threshold
should be for a given application. Maybe I can get by with a 0.05 Bel
for posting to cypherpunks, but maybe I want a 0.95 for a monetary
transaction. Seems to need a comprehensive risk management approach,
Return to May 1996
Return to “watson@tds.com”
1996-05-09 (Thu, 9 May 1996 18:52:36 +0800) - re: Dempster-Shafer…(re: Transitive - watson@tds.com