-
Ignorable and non-ignorable missing data in hidden Markov models
Authors:
Maarten Speekenbrink,
Ingmar Visser
Abstract:
We consider missing data in the context of hidden Markov models with a focus on situations where data is missing not at random (MNAR) and missingness depends on the identity of the hidden states. In simulations, we show that including a submodel for state-dependent missingness reduces bias when data is MNAR and state-dependent, whilst not reducing accuracy when data is missing at random (MAR). Whe…
▽ More
We consider missing data in the context of hidden Markov models with a focus on situations where data is missing not at random (MNAR) and missingness depends on the identity of the hidden states. In simulations, we show that including a submodel for state-dependent missingness reduces bias when data is MNAR and state-dependent, whilst not reducing accuracy when data is missing at random (MAR). When missingness depends on time but not the hidden states, a model which only allows for state-dependent missingness is biased, whilst a model that allows for both state- and time-dependent missingness is not. Overall, these results show that modelling missingness as state-dependent, and including other relevant covariates, is a useful strategy in applications of hidden Markov models to time-series with missing data. We conclude with an application of the state- and time-dependent MNAR hidden Markov model to a real dataset, involving severity of schizophrenic symptoms in a clinical trial.
△ Less
Submitted 6 September, 2021;
originally announced September 2021.
-
Simple trees in complex forests: Growing Take The Best by Approximate Bayesian Computation
Authors:
Eric Schulz,
Maarten Speekenbrink,
Björn Meder
Abstract:
How can heuristic strategies emerge from smaller building blocks? We propose Approximate Bayesian Computation as a computational solution to this problem. As a first proof of concept, we demonstrate how a heuristic decision strategy such as Take The Best (TTB) can be learned from smaller, probabilistically updated building blocks. Based on a self-reinforcing sampling scheme, different building blo…
▽ More
How can heuristic strategies emerge from smaller building blocks? We propose Approximate Bayesian Computation as a computational solution to this problem. As a first proof of concept, we demonstrate how a heuristic decision strategy such as Take The Best (TTB) can be learned from smaller, probabilistically updated building blocks. Based on a self-reinforcing sampling scheme, different building blocks are combined and, over time, tree-like non-compensatory heuristics emerge. This new algorithm, coined Approximately Bayesian Computed Take The Best (ABC-TTB), is able to recover a data set that was generated by TTB, leads to sensible inferences about cue importance and cue directions, can outperform traditional TTB, and allows to trade-off performance and computational effort explicitly.
△ Less
Submitted 14 May, 2016; v1 submitted 5 May, 2016;
originally announced May 2016.
-
Better safe than sorry: Risky function exploitation through safe optimization
Authors:
Eric Schulz,
Quentin J. M. Huys,
Dominik R. Bach,
Maarten Speekenbrink,
Andreas Krause
Abstract:
Exploration-exploitation of functions, that is learning and optimizing a map** between inputs and expected outputs, is ubiquitous to many real world situations. These situations sometimes require us to avoid certain outcomes at all cost, for example because they are poisonous, harmful, or otherwise dangerous. We test participants' behavior in scenarios in which they have to find the optimum of a…
▽ More
Exploration-exploitation of functions, that is learning and optimizing a map** between inputs and expected outputs, is ubiquitous to many real world situations. These situations sometimes require us to avoid certain outcomes at all cost, for example because they are poisonous, harmful, or otherwise dangerous. We test participants' behavior in scenarios in which they have to find the optimum of a function while at the same time avoid outputs below a certain threshold. In two experiments, we find that Safe-Optimization, a Gaussian Process-based exploration-exploitation algorithm, describes participants' behavior well and that participants seem to care firstly whether a point is safe and then try to pick the optimal point from all such safe points. This means that their trade-off between exploration and exploitation can be seen as an intelligent, approximate, and homeostasis-driven strategy.
△ Less
Submitted 14 May, 2016; v1 submitted 2 February, 2016;
originally announced February 2016.