1996-05-09 - re: Dempster-Shafer…(re: Transitive

Header Data

From: watson@tds.com
To: cypherpunks@toad.com
Message Hash: 4f8d4dd458b87c676d04a7887c3a54a07fd0cc7ca9fff72ac6d90bac7cf60466
Message ID: <Pine.SOL.3.91.960508221153.24982B-100000@mailman.tds.com>
Reply To: N/A
UTC Datetime: 1996-05-09 10:52:36 UTC
Raw Date: Thu, 9 May 1996 18:52:36 +0800

Raw message

From: watson@tds.com
Date: Thu, 9 May 1996 18:52:36 +0800
To: cypherpunks@toad.com
Subject: re: Dempster-Shafer...(re: Transitive
Message-ID: <Pine.SOL.3.91.960508221153.24982B-100000@mailman.tds.com>
MIME-Version: 1.0
Content-Type: text/plain


tcmay's approach is elegant, and it's refreshing to find a practical use 
for AI approaches.  I think it needs one more step, though.  If we learn 
to quantify our trust in a key, we still need to know what the threshold 
should be for a given application.  Maybe I can get by with a 0.05 Bel 
for posting to cypherpunks, but maybe I want a 0.95 for a monetary 
transaction.  Seems to need a comprehensive risk management approach,





Thread