{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,3,21]],"date-time":"2023-03-21T23:31:00Z","timestamp":1679441460091},"reference-count":29,"publisher":"Faculty of Electrical Engineering and Computing, Univ. of Zagreb","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CIT"],"published-print":{"date-parts":[[2012]]},"DOI":"10.2498\/cit.1001998","type":"journal-article","created":{"date-parts":[[2012,12,17]],"date-time":"2012-12-17T06:23:36Z","timestamp":1355725416000},"source":"Crossref","is-referenced-by-count":1,"title":["Using Influence Nets in Financial Informatics: A Case Study of Pakistan"],"prefix":"10.20532","volume":"20","author":[{"given":"Sajjad","family":"Haider","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Muhammad","family":"Shafqat","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shabih","family":"Haider","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"8460","reference":[{"key":"ref1","volume-title":"Probabilistic Reasoning in Intelligent Systems Networks of Plausible Inference","author":"Pearl","year":"1988","unstructured":"[1] J. Pearl, Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference, Morgan Kaufmann, 1988."},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-59904-141-4"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1002\/9780470994559","volume-title":"Bayesian Networks A Practical Guide to Applications","author":"Pourret","year":"2008","unstructured":"[3] O. Pourret, P. Nadm and B. Marcot, Bayesian Networks: A Practical Guide to Applications, Wiley, 2008."},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1002\/0470091754"},{"key":"ref5","volume-title":"Probabilistic Methods for Financial and Marketing Informatics","author":"Neapolitan","year":"2007","unstructured":"[5] R. E. Neapolitan and X. Jiang, Probabilistic Methods for Financial and Marketing Informatics, Morgan Kaufmann, 2007."},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/0888-613X(96)00013-8"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1613\/jair.764","article-title":"AIS-BN: An Adaptive Importance Sampling Algorithm for Evidential Reasoning in Large Bayesian Networks","volume":"13","author":"Cheng","year":"2000","unstructured":"[7] J. Cheng and M. J. Druzdzel, AIS-BN: An Adaptive Importance Sampling Algorithm for Evidential Reasoning in Large Bayesian Networks, Journal of Artificial Intelligence Research, Vol. 13, 2000, pp. 13\u2013155.","journal-title":"J Artif Intell Res","ISSN":"http:\/\/id.crossref.org\/issn\/1076-9757","issn-type":"print"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(99)00059-4"},{"key":"ref9","first-page":"415","volume-title":"Local computations with probabilities on graphical structures and their application to expert systems Readings in uncertain reasoning","author":"Lauritzen","year":"1990","unstructured":"[9] S. L. Lauritzen and D. J. Spiegelhalter, Local computations with probabilities on graphical structures and their application to expert systems, Readings in uncertain reasoning, Morgan Kaufmann Publishers Inc., 1990, pp. 415\u2013448."},{"key":"ref10","first-page":"171","article-title":"A simple approach to Bayesian network computations","volume-title":"Proceedings of 10th Canadian Conference on Artificial Intelligence","author":"Poole","unstructured":"[10] D. Poole and N. L. Zhang, A simple approach to Bayesian network computations, Proceedings of 10th Canadian Conference on Artificial Intelligence, pp. 171\u2013178."},{"key":"ref11","first-page":"9","article-title":"Conditional inter-causally independent node distributions, a property of noisy-or models","volume-title":"Proceedings of the 7th Conference","author":"Agosta","year":"1991","unstructured":"[12] J. M. Agosta, Conditional inter-causally independent node distributions, a property of noisy-or models, Proceedings of the 7th Conference (1991) on Uncertainty in Artificial Intelligence, Los Angeles, California, United States: Morgan Kaufmann Publishers Inc., 1991, pp. 9\u201316."},{"key":"ref12","first-page":"699","volume-title":"Influence Net Modeling with Causal Strengths An Evolutionary Approach","author":"Rosen","year":"1996","unstructured":"[13] J. A. Rosen and W. L. Smith, Influence Net Modeling with Causal Strengths: An Evolutionary Approach, Command Control Research Technology Sumposium,Monterary, CA: 1996, pp. 699\u2013708."},{"key":"ref13","volume-title":"On Causal Influence Logic","author":"Chang","year":"1994","unstructured":"[14] K. C. Chang, P. E. Lehner, A. H. Levis, A. K. Zaidi and X. Zhao, On Causal Influence Logic, George Mason University, 1994."},{"key":"ref14","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1016\/B978-1-4832-1451-1.50016-0","article-title":"Parameter adjustment in Bayes networks: The generalized noisy or-gate","volume-title":"Proceedings of the 9th Conference on Uncertainty in Artificial Intelligence","author":"Diez","year":"1993","unstructured":"[15] F. Diez, Parameter adjustment in Bayes networks: The generalized noisy or-gate, Proceedings of the 9th Conference on Uncertainty in Artificial Intelligence, 1993, pp. 99\u2013105."},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-2217(99)00368-9"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2005.06.036"},{"key":"ref17","first-page":"548","article-title":"Efficient Reasoning in Qualitative Probabilistic Networks","volume-title":"Proceedings of the 11th National Conference on Artificial Intelligence","author":"Druzdzel","year":"1993","unstructured":"[19] M. J. Druzdzel and M. Henrion, Efficient Reasoning in Qualitative Probabilistic Networks, Proceedings of the 11th National Conference on Artificial Intelligence, 1993, pp. 548\u2013553."},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s100090050025"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijar.2008.04.007"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1002\/int.20367"},{"key":"ref21","article-title":"WAGENHALS, J. T. RIED, R. J. SMILLE AND ALEXANDER H. LEVIS, Course of Action Analysis for Coalition Operations","volume-title":"Proceedings of the 6th International Command and Control Research and Technology Symposium","author":"Lee","year":"2001","unstructured":"[23] Lee W. WAGENHALS, J. T. RIED, R. J. SMILLE AND ALEXANDER H. LEVIS, Course of Action Analysis for Coalition Operations, Proceedings of the 6th International Command and Control Research and Technology Symposium, Annapolis, MD: 2001."},{"key":"ref22","article-title":"WAGENHALS AND ALEXANDER H. LEVIS, Course of Action Analysis in a Cultural Landscape Using Influence Nets","volume-title":"Proceedings of the IEEE Symposium on Computational Intelligence for Security and Defense Applications","author":"Lee","year":"2007","unstructured":"[24] Lee W. WAGENHALS AND ALEXANDER H. LEVIS, Course of Action Analysis in a Cultural Landscape Using Influence Nets, Proceedings of the IEEE Symposium on Computational Intelligence for Security and Defense Applications, Honolulu: 2007."},{"key":"ref23","article-title":"Effects Based Operations for Transnational Terrorist Organizations: Assessing Alternative Courses of Action to Mitigate Terrorist Threats","volume-title":"Proceedings of the 9th International Command and Control Research and Technology Symposium","author":"Wentz","year":"2004","unstructured":"[25] L. Wentz and L. Wagenhals, Effects Based Operations for Transnational Terrorist Organizations: Assessing Alternative Courses of Action to Mitigate Terrorist Threats, Proceedings of the 9th International Command and Control Research and Technology Symposium, San Diego, CA: 2004."},{"key":"ref24","article-title":"Model Interoperation for Effects Based Planning","volume-title":"Proceedings of the 9th International Command and Control Research and Technology Symposium","author":"Wagenhals","year":"2004","unstructured":"[26] L. Wagenhals, R. Janssen and E. Degregorio, Model Interoperation for Effects Based Planning, Proceedings of the 9th International Command and Control Research and Technology Symposium, San Diego, CA: 2004."},{"key":"ref25","article-title":"New Effects-based Operations Models in War Games","volume-title":"Proceedings of the 8th International Command and Control Research and Technology Symposium","author":"Wagenhals","year":"2003","unstructured":"[27] L. Wagenhals and L. Wentz, New Effects-based Operations Models in War Games, Proceedings of the 8th International Command and Control Research and Technology Symposium, Washington, DC: 2003."},{"key":"ref26","doi-asserted-by":"crossref","first-page":"19","DOI":"10.3233\/HIS-2008-5102","article-title":"Identification of best sets of actions in Influence Nets","volume":"5","author":"Haider","year":"2008","unstructured":"[28] S. Haider, A. K. Zaidi and A. H. Levis, Identification of best sets of actions in Influence Nets, Int. J. Hybrid Intell. Syst., Vol. 5, 2008, pp. 19\u201329.","journal-title":"Int J Hybrid Intell Syst"},{"key":"ref27","first-page":"600","article-title":"A heuristic approach for best sets of actions determination in influence nets, Information Reuse and Integration","volume-title":"Proceedings of the 2004 IEEE International Conference","author":"Haider","year":"2004","unstructured":"[29] S. Haider, A. Zaidi and A. Levis, A heuristic approach for best sets of actions determination in influence nets, Information Reuse and Integration, 2004. IRI 2004. Proceedings of the 2004 IEEE International Conference, 2004, pp. 600\u2013605."},{"key":"ref27","unstructured":"[11] G. Cooper, The computational complexity of probabilistic inference using bayesian belief networks, Artificial Intelligence, Vol. 42, Mar. 1990, pp. 405, 393."},{"key":"ref27","doi-asserted-by":"crossref","unstructured":"[16] J. Lemmer and D. Gossink, Recursive noisy OR a rule for estimating complex probabilistic interactions, IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, Vol. 34, 2004, pp. 2261, 2252.","DOI":"10.1109\/TSMCB.2004.834424"}],"container-title":["Journal of Computing and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/cit.fer.hr\/index.php\/CIT\/article\/view\/1998\/1533","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,18]],"date-time":"2020-07-18T21:16:41Z","timestamp":1595107001000},"score":1,"resource":{"primary":{"URL":"http:\/\/cit.srce.unizg.hr\/index.php\/CIT\/article\/view\/1998"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"references-count":29,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2012,6]]}},"URL":"https:\/\/doi.org\/10.2498\/cit.1001998","relation":{},"ISSN":["1330-1136"],"issn-type":[{"value":"1330-1136","type":"print"}],"subject":[],"published":{"date-parts":[[2012]]}}}