Dempster-Shafer...(re: Transitive

Timothy C. May tcmay at got.net
Fri May 10 00:19:57 PDT 1996


At 5:18 AM 5/9/96, watson at tds.com wrote:
>tcmay's approach is elegant, and it's refreshing to find a practical use
>for AI approaches.  I think it needs one more step, though.  If we learn
>to quantify our trust in a key, we still need to know what the threshold
>should be for a given application.  Maybe I can get by with a 0.05 Bel
>for posting to cypherpunks, but maybe I want a 0.95 for a monetary
>transaction.  Seems to need a comprehensive risk management approach,

[was the rest accidentally cut off?]

Anyway, I agree that a more comprehensive system is needed. But even
attaching belief estimates to keys, for example, goes a long way in letting
others than do some transitive calculations.

--Tim May


Boycott "Big Brother Inside" software!
We got computers, we're tapping phone lines, we know that that ain't allowed.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist         | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."










More information about the cypherpunks-legacy mailing list