Information Theoretic Models of Memory in Human Decisionmaking Models
نویسندگان
چکیده
منابع مشابه
Information-Theoretic Models of Tagging
In earlier work, we showed using Kulback-Leibler (KL) divergence that tags form a power law distribution very quickly. Yet there is one major observed deviation from the ideal power law distribution for the top 25 tags, a large “bump” in increased frequency for the top 7-10 tags. We originally hypothesized that the “bump” in the data could be caused by a preferential attachment mechanism. Howev...
متن کاملInformation Theoretic Models in Language Evolution
We study a model for language evolution which was introduced by Nowak and Krakauer ([12]). We analyze discrete distance spaces and prove a conjecture of Nowak for all metrics with a positive semidefinite associated matrix. This natural class of metrics includes all metrics studied by different authors in this connection. In particular it includes all ultra-metric spaces. Furthermore, the role o...
متن کاملInformation-Theoretic Exploration and Evaluation of Models
No information-theoretic quantity, such as entropy or Kullback-Leibler divergence, is meaningful without first assuming a probabilistic model. In Bayesian statistics, the model itself is uncertain, so the resulting information-theoretic quantities should also be treated as uncertain. Information theory provides a language for asking meaningful decision-theoretic questions about blackbox probabi...
متن کاملInformation theoretic models of social interaction
This dissertation demonstrates, in a non-semantic information-theoretic framework, how the principles of “maximisation of relevant information” and “information parsimony” can guide the adaptation of an agent towards agent-agent interaction. Central to this thesis is the concept of digested information; I argue that an agent is intrinsically motivated to a.) process the relevant information in ...
متن کاملInformation Theoretic and Statistical Drive Sanitization Models
Current enterprise drive sanitization techniques employ little or no intelligence to determine if the area being sanitized, with data overwriting, actually contains sensitive resident data. All data blocks in the target area are sanitized, utilizing bruteforce sanitization techniques of one to several wipe passes. In reality, a significant number of drives needing sanitization may contain areas...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IFAC Proceedings Volumes
سال: 1984
ISSN: 1474-6670
DOI: 10.1016/s1474-6670(17)61367-3