Professional Documents
Culture Documents
Sensitivity Analysis in Bayesian Networks - From Single To Multiple Parameters
Sensitivity Analysis in Bayesian Networks - From Single To Multiple Parameters
Figure 1: Finding parameter changes using the sensitivity analysis tool in SamIam.
many parameters that are irrelevant to the query in volved. Therefore, practically, we can only compute
this case. suggestions of parameter changes involving a small
subset of CPTs.
Single parameter changes are easy to visualize and
compute, but they are only a subset of possible pa- As expected, the solution space for multiple parame-
rameter changes. We may generally be interested in ters will be a region in the k-dimensional space, where
changing multiple parameters in the network simulta- k is the number of involved parameters. For example,
neously to ensure the query constraint. To facilitate for the case where we change two parameters in the
this, we need to understand the interaction between same CPT, the solution space will be a half–plane, in
any joint probability and any set of network parame- the form of α1 ∆θ1 + α2 ∆θ2 ≥ c. These results are dif-
ters [5, 6]. One common case involves changing multi- ficult to visualize and present to users. Hence, we may
ple parameters but within the same conditional prob- want to identify and report a particular point in the
ability table (CPT) of some variable. The first contri- solution space, i.e., a specific amount of change in θ1
bution of this paper is that of showing how to identify and θ2 . Now, the key question becomes: Which point
such changes, with little extra computation beyond in the solution space should we report? The approach
that needed for single–parameter changes. This is sig- we shall adopt is to report the point which minimizes
nificant since multiple parameter changes can be more model disturbance. But this brings another question:
meaningful, and may disturb the probability distribu- How to measure and quantify model disturbance?
tion less significantly than single parameter changes.
To address this question, we will quantify the distur-
Practically speaking, this new technique allows us to
bance to a model by measuring the distance between
change both the false–positive and false–negative rates
the original distribution pr and the new one Pr (af-
of a certain information source, which can allow the
ter the parameters have been changed) using a specific
enforcement of certain constraints that cannot be en-
distance measure [3] for reasons we will discuss later.
forced by only changing either the false–positive or the
false–negative rate. A third contribution in this paper relates to the appli-
cation of our results to the problem of reasoning about
Our second contribution involves techniques for find-
uncertain evidence. Specifically, we show how our re-
ing parameter changes that involve multiple CPTs.
sults allow us to identify the weakest uncertain evi-
However, as we will show, the complexity increases
dence, and on what network variables, that is needed
linearly in the size of each additional CPT that is in-
to confirm a given hypothesis to some degree.
UAI 2004 CHAN & DARWICHE 69
Figure 4: Finding single CPT changes using the sensitivity analysis tool of SamIam.
distance measure for points on that curve in terms of ing the minimum amount of soft evidence to ensure a
∆θF . The minimum is attained when ∆θF = −.0039 certain query constraint. To do that, we must first add
and ∆θT = .0056, i.e., the new prior probabilities are a child Qi to each variable Ri of interest, set the CPT
.61% and 2.56% respectively. The distance measure of each Qi such that all parameters are trivial, i.e.,
given by the optimal solution is .745. 50%, and then observe the evidence qi for every Qi .
Doing this will not have any impact on the results of
Because of the computations involved in finding solu-
any queries. We then run the sensitivity analysis pro-
tions involving multiple CPTs, the key to any auto-
cedure on multiple parameters, and find the optimal
mated sensitivity analysis tool which implements this
solution of parameter changes, restricted to parame-
procedure is to find relevant CPTs to check for so-
ters in the CPTs of variables Qi . This solution gives
lutions, instead of trying all combinations of CPTs,
us the optimal combination of soft evidence on vari-
which would be computationally too costly. The first
ables Ri , as it minimizes the distance measure, and
partial derivatives computed for finding single CPT
hence, disturbs the network least significantly.
changes can serve as a guide for identifying these rel-
evant CPTs. For many CPTs, the first partial deriva- For an example, we go back to the fire network, where
tives with respect to the parameters are 0, eliminat- we now face a scenario that the alarm is triggered. The
ing them from consideration. On the other hand, we probability of having a fire is now 36.67%. We now
should definitely consider CPTs where small param- wish to install a smoke detector, such that when it is
eters changes can induce large changes in the user- also triggered, the probability of fire is at least 80%.
selected queries. Hence, the numerical procedure is not To find the reliability required for this detector, we
as straightforward as the one for single CPT changes. add a “detector” node as a child of the Smoke variable,
while setting all its parameters as trivial. We then add
the observation of the detector being triggered as part
5 Searching for the Optimal Soft of evidence, and perform our sensitivity analysis pro-
Evidence cedure. The result suggests that if the false–positive
and the false–negative rates of the detector are both
One application of sensitivity analysis with multiple 10.98%, the reliability of the hypothesis is achieved.
parameters is to find the optimal soft evidence that This is equivalent to having soft evidence on the pres-
would enforce a certain constraint. Soft evidence is ence of smoke with a likelihood ratio of λ = 8.113.
formally defined as follows. Given two events of inter-
est, q (virtual event) and r (hypothesis), we specify the
soft evidence that q bears on r by the likelihood ratio, 6 Conclusion
λ = Pr (q | r)/Pr (q | r̄) [13, 7]. The virtual event q
serves as soft evidence on r, representing a partial con-
firmation or denial of r. If λ is more than 1, q argues This paper made contributions to the problem of sen-
for r, while if λ is less than 1, q argues against r. If sitivity analysis in Bayesian networks with respect to
λ equals 1, q is trivial and does not shed any new in- multiple parameter changes. Specifically, we presented
formation on r. The likelihood ratio λ also quantifies the technical and practical details involved in identi-
the strength of the soft evidence, with values closer to fying multiple parameter changes that are needed to
infinity or zero indicating more convincing arguments. satisfy query constraints. The main highlight was the
ability to identify optimal, multiple parameter changes
From a Bayesian network perspective, the virtual evi- that are restricted to a single CPT, where we showed
dence q can be implemented as a dummy node Q which the complexity of achieving this is similar to the one for
is added as a child of the variable R it is reporting on. single parameter changes, except for an additional cost
The likelihood ratio λ will be encoded in the CPT of Q involved with a simple numerical method. We also ad-
by specifying λ = θq|r /θq|r̄ . The soft evidence is then dressed the problem when multiple CPTs are involved,
incorporated by setting the value of Q to q [13]. where we characterized the corresponding solution and
For example, in the fire network we showed previously, its (higher) complexity. Finally, we discussed a num-
we can add a smoke detector to the network, which ber of applications of these results, including model
generates a sound when it detects smoke, but is not debugging and information–system design.
perfect and is associated with small false–positive and
false–negative rates. The triggering of the detector can
be viewed as soft evidence on the presence of smoke, Acknowledgments
as it argues for the presence of smoke.
Given a number of variables that we can potentially This work has been partially supported by NSF grant
gather soft evidence on, we may be interested in find- IIS-9988543 and MURI grant N00014-00-1-0617.
UAI 2004 CHAN & DARWICHE 75