#### Filter Results:

#### Publication Year

1986

2011

#### Publication Type

#### Co-author

#### Publication Venue

#### Key Phrases

Learn More

We introduce a method for computing corrections to Bethe approximation for spin models on arbitrary lattices. Unlike cluster variational methods, the new approach takes into account fluctuations on all length scales. The derivation of the leading correction is explained and applied to two simple examples: the ferromagnetic Ising model on d-dimensional… (More)

The nucleotide sequence of RNA2 of the Fny strain (subgroup 1) of cucumber mosaic virus (CMV) was determined and compared at both the nucleic acid and protein level with the previously determined corresponding sequence of RNA 2 of the Q strain (subgroup 2) of CMV. Fny -CMV RNA II 2 consisted of 3050 nucleotides and contained a single open reading frame… (More)

We propose a method for improving Belief Propagation (BP) that takes into account the influence of loops in the graphical model. The method is a variation on and generalization of the method recently introduced by Montanari and Rizzo [2005]. It consists of two steps: (i) standard BP is used to calculate cavity distributions for each variable (i.e.… (More)

We reformulate the Cavity Approximation (CA), a class of algorithms recently introduced for improving the Bethe approximation estimates of marginals in graphical models. In our new formulation , which allows for the treatment of multivalued variables, a further generalization to factor graphs with arbitrary order of interaction factors is explicitly carried… (More)

The nucleotide sequence of RNA 1 of the Fny strain (Subgroup I) of cucumber mosaic virus (CMV) was determined and compared at both the nucleic acid and protein levels with the corresponding sequence of RNA 1 of the Q strain (Subgroup II) of CMV. Fny-CMV RNA 1 consisted of 3357 nucleotides and contained a single long open reading frame (ORF) of 2979… (More)

Monitoring network state can be crucial in Future Internet infrastructures. Passive monitoring of all the routers is expensive and prohibitive. Storing, accessing and sharing the data is a technological challenge among networks with conflicting economic interests. Active monitoring methods can be attractive alternatives as they are free from most of these… (More)

We study the performance of different message passing algorithms in the two dimensional Edwards Anderson model. We show that the standard Belief Propagation (BP) algorithm converges only at high temperature to a paramagnetic solution. Then, we test a Generalized Belief Propagation (GBP) algorithm, derived from a Cluster Variational Method (CVM) at the… (More)

- P E Bishop, R Premakumar, D R Dean, M R Jacobson, J R Chisnell, T M Rizzo +1 other
- Science
- 1986

Phenotypic reversal of Nif(-) mutant strains to Nif(+) under molybdenum-deficient conditions has been cited as evidence that Azotobacter vinelandii possesses two nitrogen fixation systems: the conventional molybdenum-enzyme system and an alternative nitrogen-fixation system. Since explanations other than the existence of an alternative system were possible,… (More)

- Tommaso Rizzo
- 2008

We study the problem of chaos in temperature in some mean-field spin-glass models by means of a replica computation over a model of coupled systems. We propose a set of solutions of the saddle point equations which are intrinsically non-chaotic and solve a general problem regarding the consistency of their structure. These solutions are relevant in the case… (More)

- ‹
- 1
- ›