Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,135,844 papers from all fields of science
Search
Sign In
Create Free Account
Junction tree algorithm
Known as:
JTA
, Junction-tree algorithm
The junction tree algorithm (also known as 'Clique Tree') is a method used in machine learning to extract marginalization in general graphs. In…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
10 relations
Bayesian network
Belief propagation
Cycle (graph theory)
Decomposition method (constraint satisfaction)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Counting and Conjunctive Queries in the Lifted Junction Tree Algorithm
Tanya Braun
,
Ralf Möller
International Workshop on Graph Structures for…
2017
Corpus ID: 4470201
Standard approaches for inference in probabilistic formalisms with first-order constructs include lifted variable elimination…
Expand
2017
2017
A metal 3D-printed T-junction OMT with an offset stepped post
H. Yukawa
,
Yu Ushijima
,
M. Abe
,
N. Yoneda
,
M. Miyazaki
European Microwave Conference
2017
Corpus ID: 3219999
We propose a T-junction OMT consists of an offset stepped post. The offset stepped post contributes to the matching of two…
Expand
2013
2013
A mobile picture tagging system using tree-structured layered Bayesian networks
Youngseol Lee
,
Sung-Bae Cho
Mobile Information Systems
2013
Corpus ID: 16762030
Advances in digital media technology have increased in multimedia content. Tagging is one of the most effective methods to manage…
Expand
2013
2013
Context processing for automotive human-machine interfaces
L. Mercep
,
A. Knoll
,
G. Spiegelberg
Sai
2013
Corpus ID: 11317016
In this work, we focus on the improvement of human-machine interaction inside the automobile by reducing the complexity of…
Expand
2011
2011
Cyber Insider Threats Situation Awareness Using Game Theory and Information Fusion-based User Behavior Predicting Algorithm
K. Tang
,
Mingyuan Zhao
,
Mingtian Zhou
2011
Corpus ID: 15930824
Cyber insider threat is a difficult problem because it is always covered by a legal identity. Researchers have proposed many…
Expand
2010
2010
Exploiting Within-Clique Factorizations in Junction-Tree Algorithms
Julian McAuley
,
T. Caetano
International Conference on Artificial…
2010
Corpus ID: 9535568
We show that the expected computational complexity of the Junction-Tree Algorithm for maximum a posteriori inference in graphical…
Expand
2009
2009
Faster Algorithms for Max-Product Message-Passing
Julian McAuley
,
T. Caetano
Journal of machine learning research
2009
Corpus ID: 3257886
Maximum A Posteriori inference in graphical models is often solved via message-passing algorithms, such as the junction-tree…
Expand
2009
2009
Fault Diagnosis in an Industrial Process Using Bayesian Networks: Application of the Junction Tree Algorithm
J. Ramirez
,
Guillermina Munoz
,
L. Gutierrez
Electronics, Robotics and Automotive Mechanics…
2009
Corpus ID: 6068245
In this paper we present a Bayesian Network for faultdiagnosis used in an industrial tanks system. We obtain theBayesian Network…
Expand
2004
2004
A DBN inference algorithm using junction tree
Fengzhan Tian
,
Yuchang Lu
Fifth World Congress on Intelligent Control and…
2004
Corpus ID: 11892681
Dynamic bayesian networks (DBNs) is a compact representation of complex stochastic processes and has been used for many purposes…
Expand
2000
2000
Microwave device modeling exploiting generalized space mapping
J. Bandler
,
M. Ismail
,
J. Rayas-Sánchez
2000
Corpus ID: 88502641
We present a comprehensive framework to engineering device modeling which we call Generalized Space Mapping (GSM). GSM…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE