Deutsches Institut für Ernährungsforschung Potsdam-Rehbrücke. DAG program (v0.21)
|
|
- Tobias Owen
- 7 years ago
- Views:
Transcription
1 Deutsches Institut für Ernährungsforschung Potsdam-Rehbrücke DAG program (v0.21) Causal diagrams: A computer program to identify minimally sufficient adjustment sets SHORT TUTORIAL Sven Knüppel May 12,
2 General notes Confounding is an important source of bias in epidemiologic studies. With the introduction of causal diagrams (directed acyclic graphs, DAG) a new approach to conceptualize confounding and new rules to identify the minimal sufficient adjustment set have been established (Greenland, Pearl & Robins, Epidemiology, 1999, 10(1):37-48). The DAG program is a analysis tool, designed to select minimal sufficient adjustment sets within directed acyclic graphs. The first version (v0.12) of the DAG program can be used as MS DOS command line program. Using the framework Qt ( we have developed a Windows GUI that allows analyzing and changing causal diagrams more easier. 2
3 General notes If you use DAG program (v0.21), you need the same input files as they used in the previous version. To visualize causal diagrams we refer to the webtool DAGitty ( developed by Johannes Textor (University of Luebeck). Please note that we continuously improve the DAG program. If you have any problems, would like to report a bug or comment on the DAG program, please send an to sven.knueppel@dife.de. 3
4 Background: How to identify a minimally sufficient set? Definition: Back-door criterion A set of variables S satisfies the back-door criterion of exposure and outcome in a DAG if: (i) no node in S is a descendant of exposure; and (ii) S blocks every path between exposure and outcome that contains an arrow into exposure. Theorem If a set of variables S satisfies the back-door criterion, then the causal effect of exposure on outcome is identifiable. Pearl, Causality, 2009, p.79 4
5 Background: How to identify a minimally sufficient set? Theorem The problem of finding a minimum d-separating set S for exposure and outcome in a dag G is equivalent to the problem of finding a minimum separating set for exposure and outcome in the undirected moral graph. Acid and Campos (1996), p10 As introduction of the usage of moral graph see Pearl, Causality (2009, pp ) or Shrier and Platt (2008). 5
6 Citing DAG program If you use DAG program in any published work, please cite both the software (as an electronic resource/url) and the research letter describing the methods. Package: Author: URL: DAG program (including version number) Sven Knüppel Knüppel S, Stang A (2010) DAG program: identifying minimal sufficient adjustment sets. Epidemiology,21(1):159. 6
7 Run DAG program The DAG program runs as Windows program and can be started by clicking on the program icon. While running the program you need to set variable information and a graph description (adjacency list or adjacency matrix). If you wish to determine if a given set of covariates is a sufficient, minimally sufficient, or insufficient then specify these sets. 7
8 Main window 8
9 Input data: variable information The variable information is a white-space (space or tab) delimited text consisting of two columns: Column 1: Name of variable Alphanumeric value (without blanks or other white-spaces) Column 2: Measurement status Measurement status is set to 1 if the variable is measured otherwise it is set to 0. The first line must contain the exposure of interest. The second line needs to contain the event of interest. Thereafter, you can add covariates in any order. Add the variable information in the variable information text field. 9
10 Input data: graph description Adjacency list ( edge statements ) The first possibility to define a DAG is a list of white-space delimited edge statements. All statements are edge statements that name a tail node (parent) and a list of head nodes (childs). Edge starts from the parent and means edge from parent to child_1, to child_2 etc. Only one edge statement is allowed per line. Every parent needs to be described in this file. For further information see section examples. Add the graph description in the Adjacency matrix / Adjacency list text field. 10
11 Input data: graph description Adjacency matrix The second possibility to define a DAG is a adjacency matrix that describes the graph by a matrix containing all arrow directions. Create a matrix consisting of all variables in the same order as in the information text field and code their connection by 1 (arrow) and 0 (no arrow). For better understanding see the examples. Add the graph description in the Adjacency matrix / Adjacency list text field. 11
12 Example 1: Classical confounder triangle Suppose the following DAG is given. E is the exposure of interest, D is the outcome, and C is a possible confounder. All three variables are measured. Create information and graph description. 1. Variable information 2. Definition of causal graph E C? D Variable name E 1 D 1 C 1 Status 1 = measured 0 = unmeasured 1th line: exposure 2nd line: outcome Other variable(s) a. Adjacency list ( edge statements ) edge from parent to child_1, to child_2 etc. E D C E D The edge statement E D makes an edge from E to D. The next edge statement C E D makes an edge from C to E and another from C to D. 12
13 Example 1: Find minimally sufficient set 13
14 Example 1: Variable description 14
15 Example 1: Graph description and minimally sufficient set Suppose the following DAG is given. E is the exposure of interest, D is the outcome, and C is a possible confounder. All three variables are measured. Create information and graph description. 1. Variable information 2. Definition of causal graph E C? D Variable name E 1 D 1 C 1 Status 1 = measured 0 = unmeasured 1th line: exposure 2nd line: outcome Other variable(s) a. Adjacency list ( edge statements ) edge from parent to child_1, to child_2 etc. E D C E D The edge statement E D makes an edge from E to D. The next edge statement C E D makes an edge from C to E and another from C to D. 15
16 Example 1: Classical confounder triangle (cont.) Suppose the following DAG is given. E is the exposure of interest, D is the outcome, and C is a possible confounder. All three variables are measured. C Alternatively, you can specify the DAG with an adjacency matrix. E? D 2. Definition of causal graph b. Adjacency matrix Make a matrix of all arrow directions. Set 1 if there is an arrow otherwise set 0. to E D C E From D C
17 Example 1: Classical confounder triangle (cont.) 17
18 Example 2: DAG including collider adjustment A B C E Z? D Variable information E 1 D 1 A 1 B 1 C 1 Z 1 Adjacency list E D A E Z B Z D C Z D Z E D 18
19 Example 2: Variable description Variable information Adjacency list 19
20 Example 3: Specification of a set of covariates Suppose the DAG from example 2 is given. A B C Z E? D We would like to test three different sets of covariates if they are sufficient. Set 1 = {A} Set 2 = {A, Z} Set 3 = {A, B, C, Z} Additional to the variable information and graph definition we need a definition which specified the test sets. 20
21 Example 3: Specification of a set of covariates The numbers are the path numbers from the graph description. 21
22 Example 3: Specification of a set of covariates 22
23 Remark DAG program distincts between three types of paths: Front-door paths: starting with in arrow pointing away from the exposure Back-door paths: starting with an arrow pointing into the exposure Other paths: starting with an arrow pointing away from the outcome Other paths are unconditional no biasing paths. Other paths could be opened by conditioning on a specified set. 23
24 Remark If a specified set contains a descendant of exposure or outcome, the total effect might not estimated. In this case the found minimally sufficient set conditional on specified set (MSA) means that all backdoor and other paths are closed conditional on this MSA. Those MSAs must not fullfill the Backdoor criterion and therefore should be used carefully. Direct paths from outcome to exposure are not allowed because this would violate the temporality assumption that the exposure should not be a consequence of the outcome. Such a path would create a loop between exposure and outcome. 24
25 Loading existing files To load a graph you need the two input files: Variable information (often saved as *.info) Graph description file (often saved as *.txt) By clicking on File>New you can load the graph. 25
26 Loading existing files 26
27 Save You can save your result by clicking on File>Save. 27
28 Save 28
29 Options It is possible to specify the maximum number to show paths and it is also possible to set a upper limit for counting paths. 29
30 Integrated examples Sehrndt A, Stang A, Lehmkuhl E, Regitz-Zagrosek V, Babitsch B (2010). Influence of the socioeconomic status on the health related quality of life in patients before and after coronary artery bypass grafting an example of using DAG. Presentation at DAG workshop of DGEpi at BAuA (Berlin), 26.Nov.2010 Polzer et al. personal communication, Schipf S, Haring R, Friedrich N, Nauck M, Lau K, Alte D, Stang A, Völzke H, Wallaschofski H. Low total testosterone is associated with increased risk of incident type 2 diabetes mellitus in men: Results from the study of health in pomerania (SHIP). The Aging Male, in press. Shrier I, Platt WP Reducing bias through directed acyclic graphs. BMC Medical Research Methodology 2008, 8:70. Acid S, De Campos LM. An algorithm for finding minimum d-separating sets in belief networks. In Proceedings of the twelfth Conference of Uncertainty in Artificial Intelligence, pages 3-10,
31 References Acid S, De Campos L.M. (1996).. An algorithm for finding minimum d-separating sets in belief networks. In Proceedings of the twelfth Conference of Uncertainty in Artificial Intelligence, pages 3-10 Clark, J. and Holton, D.A. (1994). Graphentheorie. Grundlagen und Anwendungen. Heidelberg: Spektrum Akad. Vlg. Glymour, M.M. and Greenland, S. (2008). Causal diagrams. Ch. 12 in: Rothman, K.J., Greenland, S., Lash,T.L. Modern Epidemiology, 3rd ed. Philadelphia: Lippincott. Greenland, S., Pearl, J. and Robins, J.M. (1999). Causal diagrams for epidemiologic research. Epidemiology, 10, Greenland, S. and Brumback, B.A. (2002). An overview of relations among causal modelling methods. International Journal of Epidemiology, 31, Hernán, M.A., Hernandez-Diaz, S., Werler, M.M., Mitchell, A.A. (2002). Causal knowledge as a prerequisite for confounding evaluation. American Journal of Epidemiology, 155,
32 References Pearl, J. (1995). Causal diagrams for empirical research (with discussion). Biometrika,82, Pearl, J. (2009). Causality. New York: Cambridge University Press. 2nd Edition. Pearl, J., (2009). Causal inference in statistics: An overview. Statistics Surveys, 3, Robins, J.M. (2001). Data, design, and background knowledge in etiologic inference. Epidemiology;12: Schipf S, Haring R, Friedrich N, Nauck M, Lau K, Alte D, Stang A, Völzke H, Wallaschofski H. (2010). Low total testosterone is associated with increased risk of incident type 2 diabetes mellitus in men: Results from the study of health in pomerania (SHIP). The Aging Male. in press. 32
33 References Sehrndt A, Stang A, Lehmkuhl E, Regitz-Zagrosek V, Babitsch B (2010). Influence of the socioeconomic status on the health related quality of life in patients before and after coronary artery bypass grafting an example of using DAG. Presentation at DAG workshop of DGEpi at BAuA (Berlin), 26.Nov.2010 Shrier I, Platt W.P. (2008). Reducing bias through directed acyclic graphs. BMC Medical Research Methodology, 8:70. Skienna S.S. (2008). The Algorithm Design Manual, 2n ed., Berlin, Springer. Spirtes, P., Glymour, C., Scheines, R. (2001). Causation, Prediction, and Search, 2nd ed. Cambridge, MA: MIT Press. 33
34 Sven Knüppel Department Epidemiology Deutsches Institut für Ernährungsforschung German Institute of Human Nutrition Potsdam-Rehbrücke DAG program: Thanks to Johannes Textor, Juliane Hardt, Dagmar Drogan, and Karina Meidtner for helpful comments. Special thanks to Andreas Stang and Charles Poole for their helpful comments on the first version of DAG program. 34
Deutsches Institut für Ernährungsforschung. DAG-Programm I: Minimierung von Confounding bei komplexen kausalen Graphen (directed acyclic graphs)
Deutsches Institut für Ernährungsforschung DAG-Programm I: Minimierung von Confounding bei komplexen kausalen Graphen (directed acyclic graphs) Sven Knüppel 1, Johannes Textor 2 Workshop 26. November 2010
More informationCausal Inference and Major League Baseball
Causal Inference and Major League Baseball Jamie Thornton Department of Mathematical Sciences Montana State University May 4, 2012 A writing project submitted in partial fulfillment of the requirements
More information5 Directed acyclic graphs
5 Directed acyclic graphs (5.1) Introduction In many statistical studies we have prior knowledge about a temporal or causal ordering of the variables. In this chapter we will use directed graphs to incorporate
More informationEpidemiologists typically seek to answer causal questions using statistical data:
c16.qxd 2/8/06 12:43 AM Page 387 Y CHAPTER SIXTEEN USING CAUSAL DIAGRAMS TO UNDERSTAND COMMON PROBLEMS IN SOCIAL EPIDEMIOLOGY M. Maria Glymour Epidemiologists typically seek to answer causal questions
More informationCommentary: Is it time to redefine Cognitive Epidemiology?
Commentary: Is it time to redefine Cognitive Epidemiology? Archana Singh-Manoux 1,2,3 * Corresponding author & address: 1 INSERM, U1018 Centre for Research in Epidemiology and Population Health Hôpital
More informationCommentator: A Front-End User-Interface Module for Graphical and Structural Equation Modeling
Commentator: A Front-End User-Interface Module for Graphical and Structural Equation Modeling Trent Mamoru Kyono May 2010 Technical Report R-364 Cognitive Systems Laboratory Department of Computer Science
More informationModule 223 Major A: Concepts, methods and design in Epidemiology
Module 223 Major A: Concepts, methods and design in Epidemiology Module : 223 UE coordinator Concepts, methods and design in Epidemiology Dates December 15 th to 19 th, 2014 Credits/ECTS UE description
More informationAnalysis of Algorithms, I
Analysis of Algorithms, I CSOR W4231.002 Eleni Drinea Computer Science Department Columbia University Thursday, February 26, 2015 Outline 1 Recap 2 Representing graphs 3 Breadth-first search (BFS) 4 Applications
More informationA Comparison of Novel and State-of-the-Art Polynomial Bayesian Network Learning Algorithms
A Comparison of Novel and State-of-the-Art Polynomial Bayesian Network Learning Algorithms Laura E. Brown Ioannis Tsamardinos Constantin F. Aliferis Vanderbilt University, Department of Biomedical Informatics
More informationNetwork Analysis of Project Communication Based on Graph Theory
Proceedings of the 8th International Conference on Innovation & Management 481 Network Analysis of Project Communication Based on Graph Theory Naoki Ohshima 1, Akihito Kawashima 2 1 School of MOT, Yamaguchi
More informationChapter 14 Managing Operational Risks with Bayesian Networks
Chapter 14 Managing Operational Risks with Bayesian Networks Carol Alexander This chapter introduces Bayesian belief and decision networks as quantitative management tools for operational risks. Bayesian
More informationThe PageRank Citation Ranking: Bring Order to the Web
The PageRank Citation Ranking: Bring Order to the Web presented by: Xiaoxi Pang 25.Nov 2010 1 / 20 Outline Introduction A ranking for every page on the Web Implementation Convergence Properties Personalized
More informationXPC Algorithms For Structured Learning in Bayesian Networks
An Algorithm to Handle Structural Uncertainties in Learning Bayesian Network Cleuber Moreira Fernandes Politec Informática Ltda SIG quadra 4 lote 173, Zip Code 70.610-440, Brasília, DF, Brazil cleuber@compeduc.net
More informationSYSM 6304: Risk and Decision Analysis Lecture 5: Methods of Risk Analysis
SYSM 6304: Risk and Decision Analysis Lecture 5: Methods of Risk Analysis M. Vidyasagar Cecil & Ida Green Chair The University of Texas at Dallas Email: M.Vidyasagar@utdallas.edu October 17, 2015 Outline
More informationMonitoring the Behaviour of Credit Card Holders with Graphical Chain Models
Journal of Business Finance & Accounting, 30(9) & (10), Nov./Dec. 2003, 0306-686X Monitoring the Behaviour of Credit Card Holders with Graphical Chain Models ELENA STANGHELLINI* 1. INTRODUCTION Consumer
More informationA Hybrid Anytime Algorithm for the Construction of Causal Models From Sparse Data.
142 A Hybrid Anytime Algorithm for the Construction of Causal Models From Sparse Data. Denver Dash t Department of Physics and Astronomy and Decision Systems Laboratory University of Pittsburgh Pittsburgh,
More informationModel-based Synthesis. Tony O Hagan
Model-based Synthesis Tony O Hagan Stochastic models Synthesising evidence through a statistical model 2 Evidence Synthesis (Session 3), Helsinki, 28/10/11 Graphical modelling The kinds of models that
More informationConfounding in health research
Confounding in health research Part 1: Definition and conceptual issues Madhukar Pai, MD, PhD Assistant Professor of Epidemiology McGill University madhukar.pai@mcgill.ca 1 Why is confounding so important
More informationData Structures and Algorithms Written Examination
Data Structures and Algorithms Written Examination 22 February 2013 FIRST NAME STUDENT NUMBER LAST NAME SIGNATURE Instructions for students: Write First Name, Last Name, Student Number and Signature where
More informationGraphical Models for Recovering Probabilistic and Causal Queries from Missing Data
Graphical Models for Recovering Probabilistic and Causal Queries from Missing Data Karthika Mohan and Judea Pearl Cognitive Systems Laboratory Computer Science Department University of California, Los
More informationA permutation can also be represented by describing its cycles. What do you suppose is meant by this?
Shuffling, Cycles, and Matrices Warm up problem. Eight people stand in a line. From left to right their positions are numbered,,,... 8. The eight people then change places according to THE RULE which directs
More informationCommentary: A structural approach to Berkson s fallacy and a guide to a history of opinions about it
515 International Journal of Epidemiology, 2014, Vol. 43, No. 2 the hospital population by any device that does not involve the acquisition of data which would themselves answer the primary question. For
More informationA Bayesian Approach for on-line max auditing of Dynamic Statistical Databases
A Bayesian Approach for on-line max auditing of Dynamic Statistical Databases Gerardo Canfora Bice Cavallo University of Sannio, Benevento, Italy, {gerardo.canfora,bice.cavallo}@unisannio.it ABSTRACT In
More informationLearning a Bayesian network model for predicting wildfire behavior
Learning a Bayesian network model for predicting wildfire behavior K. Zwirglmaier, P. Papakosta, D. Straub Engineering Risk Analysis Group, Technische Universität München, Germany ABSTRACT: A Bayesian
More informationMany research questions in epidemiology are concerned. Estimation of Direct Causal Effects ORIGINAL ARTICLE
ORIGINAL ARTICLE Maya L. Petersen, Sandra E. Sinisi, and Mark J. van der Laan Abstract: Many common problems in epidemiologic and clinical research involve estimating the effect of an exposure on an outcome
More informationUCINET Visualization and Quantitative Analysis Tutorial
UCINET Visualization and Quantitative Analysis Tutorial Session 1 Network Visualization Session 2 Quantitative Techniques Page 2 An Overview of UCINET (6.437) Page 3 Transferring Data from Excel (From
More informationMicrosoft Project 2010
Tutorial 1: Planning a Project Microsoft Project 2010 In Tutorial Section 1.1 you will: Learn project management terminology Understand the benefits of project management Explore the Project 2010 window
More informationCausal inference from big data: Theoretical foundations and the data-fusion problem Elias Bareinboim and Judea Pearl
Written for the Proceedings of the National Academy of ciences. r450 2015/6/30 23:48 page 1 #1 Causal inference from big data: Theoretical foundations and the data-fusion problem Elias Bareinboim and Judea
More informationWeek 3&4: Z tables and the Sampling Distribution of X
Week 3&4: Z tables and the Sampling Distribution of X 2 / 36 The Standard Normal Distribution, or Z Distribution, is the distribution of a random variable, Z N(0, 1 2 ). The distribution of any other normal
More informationProspective, retrospective, and cross-sectional studies
Prospective, retrospective, and cross-sectional studies Patrick Breheny April 3 Patrick Breheny Introduction to Biostatistics (171:161) 1/17 Study designs that can be analyzed with χ 2 -tests One reason
More informationFuzzy Cognitive Map for Software Testing Using Artificial Intelligence Techniques
Fuzzy ognitive Map for Software Testing Using Artificial Intelligence Techniques Deane Larkman 1, Masoud Mohammadian 1, Bala Balachandran 1, Ric Jentzsch 2 1 Faculty of Information Science and Engineering,
More informationGraphical Modeling for Genomic Data
Graphical Modeling for Genomic Data Carel F.W. Peeters cf.peeters@vumc.nl Joint work with: Wessel N. van Wieringen Mark A. van de Wiel Molecular Biostatistics Unit Dept. of Epidemiology & Biostatistics
More informationHandling missing data in Stata a whirlwind tour
Handling missing data in Stata a whirlwind tour 2012 Italian Stata Users Group Meeting Jonathan Bartlett www.missingdata.org.uk 20th September 2012 1/55 Outline The problem of missing data and a principled
More informationCenter for Causal Discovery (CCD) of Biomedical Knowledge from Big Data University of Pittsburgh Carnegie Mellon University Pittsburgh Supercomputing
Center for Causal Discovery (CCD) of Biomedical Knowledge from Big Data University of Pittsburgh Carnegie Mellon University Pittsburgh Supercomputing Center Yale University PIs: Ivet Bahar, Jeremy Berg,
More informationGeneral and Abdominal Adiposity and Risk of Death in Europe
Deutsches Institut für Ernährungsforschung Potsdam-Rehbrücke General and Abdominal Adiposity and Risk of Death in Europe Tobias Pischon Department of Epidemiology German Institute of Human Nutrition Potsdam-Rehbruecke
More informationRandomized trials versus observational studies
Randomized trials versus observational studies The case of postmenopausal hormone therapy and heart disease Miguel Hernán Harvard School of Public Health www.hsph.harvard.edu/causal Joint work with James
More informationModel Simulation in Rational Software Architect: Business Process Simulation
Model Simulation in Rational Software Architect: Business Process Simulation Mattias Mohlin Senior Software Architect IBM The BPMN (Business Process Model and Notation) is the industry standard notation
More informationAccept And Refund Payments In A PayPal Personal Account
Accept And Refund Payments In A PayPal Personal Account If you run a PayPal personal account, when payment is received, it does not get credited automatically to your account. The merchant has to Login
More informationMy work provides a distinction between the national inputoutput model and three spatial models: regional, interregional y multiregional
Mexico, D. F. 25 y 26 de Julio, 2013 My work provides a distinction between the national inputoutput model and three spatial models: regional, interregional y multiregional Walter Isard (1951). Outline
More informationGephi Tutorial Visualization
Gephi Tutorial Welcome to this Gephi tutorial. It will guide you to the basic and advanced visualization settings in Gephi. The selection and interaction with tools will also be introduced. Follow the
More informationJustClust User Manual
JustClust User Manual Contents 1. Installing JustClust 2. Running JustClust 3. Basic Usage of JustClust 3.1. Creating a Network 3.2. Clustering a Network 3.3. Applying a Layout 3.4. Saving and Loading
More informationAgenda. Interface Agents. Interface Agents
Agenda Marcelo G. Armentano Problem Overview Interface Agents Probabilistic approach Monitoring user actions Model of the application Model of user intentions Example Summary ISISTAN Research Institute
More informationBusiness Intelligence Overview. BW/BI Security. BW/BI Architecture. Business Explorer (BEx) BW/BI BEx Tools Overview. What is BEx?
SAP Business Warehouse/Business Intelligence Reporting Business Explorer (BEx) Washington State HRMS Business Warehouse/Business Intelligence (BW/BI) BW/BI Power User Workshop Materials General Topics
More informationIntroduction to Microsoft Access 2010
Introduction to Microsoft Access 2010 A database is a collection of information that is related. Access allows you to manage your information in one database file. Within Access there are four major objects:
More informationBayesian Statistics: Indian Buffet Process
Bayesian Statistics: Indian Buffet Process Ilker Yildirim Department of Brain and Cognitive Sciences University of Rochester Rochester, NY 14627 August 2012 Reference: Most of the material in this note
More informationIntroduction to Microsoft Access 2013
Introduction to Microsoft Access 2013 A database is a collection of information that is related. Access allows you to manage your information in one database file. Within Access there are four major objects:
More informationGraphical Analyses of Clinical Trial Safety Data
Graphical Analyses of Clinical Trial Safety Data Haijun Ma, Kefei Zhou, Amy ia, Matt Austin, George Li, Michael Connell 08/10/07, GBE Scientific Forum verview Current situation of clinical trial safety
More informationMicrosoft Access Rollup Procedure for Microsoft Office 2007. 2. Click on Blank Database and name it something appropriate.
Microsoft Access Rollup Procedure for Microsoft Office 2007 Note: You will need tax form information in an existing Excel spreadsheet prior to beginning this tutorial. 1. Start Microsoft access 2007. 2.
More informationEuler Paths and Euler Circuits
Euler Paths and Euler Circuits An Euler path is a path that uses every edge of a graph exactly once. An Euler circuit is a circuit that uses every edge of a graph exactly once. An Euler path starts and
More informationWhen to use Excel. When NOT to use Excel 9/24/2014
Analyzing Quantitative Assessment Data with Excel October 2, 2014 Jeremy Penn, Ph.D. Director When to use Excel You want to quickly summarize or analyze your assessment data You want to create basic visual
More informationCS&SS / STAT 566 CAUSAL MODELING
CS&SS / STAT 566 CAUSAL MODELING Instructor: Thomas Richardson E-mail: thomasr@u.washington.edu Lecture: MWF 2:30-3:20 SIG 227; WINTER 2016 Office hour: W 3.30-4.20 in Padelford (PDL) B-313 (or by appointment)
More informationAPA-STYLE TABLES in MICROSOFT WORD 2007
Twin Cities Writing Center APA-STYLE TABLES in MICROSOFT WORD 2007 Before inserting a table into your paper, make sure a table is an appropriate way to communicate your information. Read about the use
More informationTimeValue Software Due Date Tracking and Task Management Software
User s Guide TM TimeValue Software Due Date Tracking and Task Management Software File In Time Software User s Guide Copyright TimeValue Software, Inc. (a California Corporation) 1992-2010. All rights
More information1 Definitions. Supplementary Material for: Digraphs. Concept graphs
Supplementary Material for: van Rooij, I., Evans, P., Müller, M., Gedge, J. & Wareham, T. (2008). Identifying Sources of Intractability in Cognitive Models: An Illustration using Analogical Structure Mapping.
More informationChapter 2 Introduction to Sequence Analysis for Human Behavior Understanding
Chapter 2 Introduction to Sequence Analysis for Human Behavior Understanding Hugues Salamin and Alessandro Vinciarelli 2.1 Introduction Human sciences recognize sequence analysis as a key aspect of any
More informationHands on Microsoft Project (Part I) From a WBS to a Complete Schedule Emanuele Della Valle, Lecturer: Dario Cerizza http://emanueledellavalle.
Planning and Managing Software Projects 2011-12 Class 10 Hands on Microsoft Project (Part I) From a WBS to a Complete Schedule Emanuele Della Valle, Lecturer: Dario Cerizza http://emanueledellavalle.org
More informationApplication of the TETRAD II Program to the Study of Student Retention in U.S. Colleges
From: AAAI Technical Report WS-94-03. Compilation copyright 1994, AAAI (www.aaai.org). All rights reserved. Application of the TETRAD II Program to the Study of Student Retention in U.S. Colleges Marek
More informationLarge-Sample Learning of Bayesian Networks is NP-Hard
Journal of Machine Learning Research 5 (2004) 1287 1330 Submitted 3/04; Published 10/04 Large-Sample Learning of Bayesian Networks is NP-Hard David Maxwell Chickering David Heckerman Christopher Meek Microsoft
More informationLab 2: MS ACCESS Tables
Lab 2: MS ACCESS Tables Summary Introduction to Tables and How to Build a New Database Creating Tables in Datasheet View and Design View Working with Data on Sorting and Filtering 1. Introduction Creating
More informationBest Practice Manual Testing of E2E processes using SAP Solution Manager 7.1 - Test Option 1. Marcus Wefers, ALM Solution Management, AGS, SAP AG
Best Practice Manual Testing of E2E processes using SAP Solution Manager 7.1 - Test Option 1 Marcus Wefers, ALM Solution Management, AGS, SAP AG Agenda 1. Approaches for manual testing of E2E Business
More informationINCIDENT INVESTIGATION BASED ON CAUSALITY NETWORKS
IChemE SYMPOSIUM SERIES NO. 153 INCIDENT INVESTIGATION BASED ON CAUSALITY NETWORKS Yukiyasu Shimada 1, Rafael Batres 2, Tetsuo Fuchino 3 and Toshinori Kawabata 1 1 Chemical Safety Research Group, National
More informationA Review And Evaluations Of Shortest Path Algorithms
A Review And Evaluations Of Shortest Path Algorithms Kairanbay Magzhan, Hajar Mat Jani Abstract: Nowadays, in computer networks, the routing is based on the shortest path problem. This will help in minimizing
More informationService Desk Manager QUICK TIP: Service Desk Manager 12.6 Upgrade New Features and Known Issues
Service Desk Manager QUICK TIP: Service Desk Manager 12.6 Upgrade New Features and Known Issues New Features: Firefox Functionality Analysts now have the ability to use the most up-to-date versions of
More informationABAQUS/CAE Tutorial: Analysis of an Aluminum Bracket
H. Kim FEA Tutorial 1 ABAQUS/CAE Tutorial: Analysis of an Aluminum Bracket Hyonny Kim last updated: August 2004 In this tutorial, you ll learn how to: 1. Sketch 2D geometry & define part. 2. Define material
More informationChapter 6. Using the SQL Server
Chapter 6 Using the SQL Server BC30 Using the SQL Server 1 5/2010 Content 1 Installing and setting up the SQL Server... 3 2 Exporting an SQL database... 7 3 Importing an SQL database... 9 4 Opening the
More informationSocial Media Mining. Network Measures
Klout Measures and Metrics 22 Why Do We Need Measures? Who are the central figures (influential individuals) in the network? What interaction patterns are common in friends? Who are the like-minded users
More informationNetBeans Profiler is an
NetBeans Profiler Exploring the NetBeans Profiler From Installation to a Practical Profiling Example* Gregg Sporar* NetBeans Profiler is an optional feature of the NetBeans IDE. It is a powerful tool that
More informationScheduling Document Creation
Scheduling Document Creation What is a Schedule in epm? Schedules The epm Schedule application is an integral part of the Portfolio Management suite of applications. Start and end dates for each summary
More informationSimple Graphs Degrees, Isomorphism, Paths
Mathematics for Computer Science MIT 6.042J/18.062J Simple Graphs Degrees, Isomorphism, Types of Graphs Simple Graph this week Multi-Graph Directed Graph next week Albert R Meyer, March 10, 2010 lec 6W.1
More informationFault Localization in a Software Project using Back- Tracking Principles of Matrix Dependency
Fault Localization in a Software Project using Back- Tracking Principles of Matrix Dependency ABSTRACT Fault identification and testing has always been the most specific concern in the field of software
More informationAn Application of the G-formula to Asbestos and Lung Cancer. Stephen R. Cole. Epidemiology, UNC Chapel Hill. Slides: www.unc.
An Application of the G-formula to Asbestos and Lung Cancer Stephen R. Cole Epidemiology, UNC Chapel Hill Slides: www.unc.edu/~colesr/ 1 Acknowledgements Collaboration with David B. Richardson, Haitao
More informationDiscrete Mathematics & Mathematical Reasoning Chapter 10: Graphs
Discrete Mathematics & Mathematical Reasoning Chapter 10: Graphs Kousha Etessami U. of Edinburgh, UK Kousha Etessami (U. of Edinburgh, UK) Discrete Mathematics (Chapter 6) 1 / 13 Overview Graphs and Graph
More informationMicrosoft Project From the WBS to a Complete Schedule Emanuele Della Valle, Lecturer: Dario Cerizza http://emanueledellavalle.org
Planning and Managing Software Projects 2010-11 Session 6 Microsoft Project From the WBS to a Complete Schedule Emanuele Della Valle, Lecturer: Dario Cerizza http://emanueledellavalle.org Credits 2 These
More informationThe Basics of Graphical Models
The Basics of Graphical Models David M. Blei Columbia University October 3, 2015 Introduction These notes follow Chapter 2 of An Introduction to Probabilistic Graphical Models by Michael Jordan. Many figures
More informationUsing graphical modelling in official statistics
Quaderni di Statistica Vol. 6, 2004 Using graphical modelling in official statistics Richard N. Penny Fidelio Consultancy E-mail: cpenny@xtra.co.nz Marco Reale Mathematics and Statistics Department, University
More informationA Framework of Context-Sensitive Visualization for User-Centered Interactive Systems
Proceedings of 10 th International Conference on User Modeling, pp423-427 Edinburgh, UK, July 24-29, 2005. Springer-Verlag Berlin Heidelberg 2005 A Framework of Context-Sensitive Visualization for User-Centered
More informationIPDET Module 6: Descriptive, Normative, and Impact Evaluation Designs
IPDET Module 6: Descriptive, Normative, and Impact Evaluation Designs Intervention or Policy Evaluation Questions Design Questions Elements Types Key Points Introduction What Is Evaluation Design? Connecting
More informationCorrelational Research
Correlational Research Chapter Fifteen Correlational Research Chapter Fifteen Bring folder of readings The Nature of Correlational Research Correlational Research is also known as Associational Research.
More informationNetwork Analysis: Lecture 1. Sacha Epskamp 02-09-2014
: Lecture 1 University of Amsterdam Department of Psychological Methods 02-09-2014 Who are you? What is your specialization? Why are you here? Are you familiar with the network perspective? How familiar
More information2: Entering Data. Open SPSS and follow along as your read this description.
2: Entering Data Objectives Understand the logic of data files Create data files and enter data Insert cases and variables Merge data files Read data into SPSS from other sources The Logic of Data Files
More informationGetting Started with the DCHR Service Desk. District Service Management Program
Getting Started with the DCHR Service Desk District Service Management Program October 30, 2008 Contacting the District Service Management Group You can access the District Service Management group s website
More informationCloud UC Call Recording Interface in SAP dashboard
FUSION CLOUD UC CALL RECORDING ADMIN GUIDE Contents: INTRODUCTION...3 LOGGING ON...4 HOME TAB (DASHBOARD)...6 First Look...6 Calls by Category...8 Frequent Callers...9 Calls by Location... 10 Call Handler
More informationVisual Analysis Tool for Bipartite Networks
Visual Analysis Tool for Bipartite Networks Kazuo Misue Department of Computer Science, University of Tsukuba, 1-1-1 Tennoudai, Tsukuba, 305-8573 Japan misue@cs.tsukuba.ac.jp Abstract. To find hidden features
More informationACCESS 2007 BASICS. Best Practices in MS Access. Information Technology. MS Access 2007 Users Guide. IT Training & Development (818) 677-1700
Information Technology MS Access 2007 Users Guide ACCESS 2007 BASICS Best Practices in MS Access IT Training & Development (818) 677-1700 Email: training@csun.edu Website: www.csun.edu/it/training Access
More informationThe Main Page of RE STATS will provide the range of data at the very top of the page.
RE STATS Navigator can be accessed from Tempo under the Financials Tab at the top. It will be your bottom option under the drop down menu. The Main Page of RE STATS will provide the range of data at the
More informationLearn how to create web enabled (browser) forms in InfoPath 2013 and publish them in SharePoint 2013. InfoPath 2013 Web Enabled (Browser) forms
Learn how to create web enabled (browser) forms in InfoPath 2013 and publish them in SharePoint 2013. InfoPath 2013 Web Enabled (Browser) forms InfoPath 2013 Web Enabled (Browser) forms Creating Web Enabled
More informationSegmenting sales forecasting accuracy
Segmenting sales forecasting accuracy An ABC-XYZ-analysis on the accuracy of Neural Networks, SAP APO-DP and Judgmental Forecasting at Beiersdorf Michael Tramnitzke Dr. Sven Crone 2 The target of the study:
More information15.062 Data Mining: Algorithms and Applications Matrix Math Review
.6 Data Mining: Algorithms and Applications Matrix Math Review The purpose of this document is to give a brief review of selected linear algebra concepts that will be useful for the course and to develop
More information. 0 1 10 2 100 11 1000 3 20 1 2 3 4 5 6 7 8 9
Introduction The purpose of this note is to find and study a method for determining and counting all the positive integer divisors of a positive integer Let N be a given positive integer We say d is a
More informationFDA s Vulnerability Assessment Software tool
FDA s Vulnerability Assessment Software tool Quick Instruction Guide The FDA s Vulnerability Assessment Software tool uses the CARVER + Shock methodology. The software tool is a user-friendly, interactive
More informationWorking with Tables: How to use tables in OpenOffice.org Writer
Working with Tables: How to use tables in OpenOffice.org Writer Title: Working with Tables: How to use tables in OpenOffice.org Writer Version: 1.0 First edition: January 2005 First English edition: January
More informationDealing with Missing Data
Dealing with Missing Data Roch Giorgi email: roch.giorgi@univ-amu.fr UMR 912 SESSTIM, Aix Marseille Université / INSERM / IRD, Marseille, France BioSTIC, APHM, Hôpital Timone, Marseille, France January
More informationTutorial 2 Online and offline Ship Visualization tool Table of Contents
Tutorial 2 Online and offline Ship Visualization tool Table of Contents 1.Tutorial objective...2 1.1.Standard that will be used over this document...2 2. The online tool...2 2.1.View all records...3 2.2.Search
More informationCircuits 1 M H Miller
Introduction to Graph Theory Introduction These notes are primarily a digression to provide general background remarks. The subject is an efficient procedure for the determination of voltages and currents
More informationSAS/GRAPH Network Visualization Workshop 2.1
SAS/GRAPH Network Visualization Workshop 2.1 User s Guide SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc 2009. SAS/GRAPH : Network Visualization Workshop
More informationDETERMINING THE CONDITIONAL PROBABILITIES IN BAYESIAN NETWORKS
Hacettepe Journal of Mathematics and Statistics Volume 33 (2004), 69 76 DETERMINING THE CONDITIONAL PROBABILITIES IN BAYESIAN NETWORKS Hülya Olmuş and S. Oral Erbaş Received 22 : 07 : 2003 : Accepted 04
More informationTHE TOP TEN TIPS FOR USING QUALTRICS AT BYU
THE TOP TEN TIPS FOR USING QUALTRICS AT BYU TIP #1: CREATING A SURVEY FROM A COPY AND COLLABORATING ON SURVEYS TIP #2: CREATING AND USING PANELS TIP #3: LIBRARIES AND HOW TO USE THEM TIP #4: BASIC SKIP
More informationEnterprise Organization and Communication Network
Enterprise Organization and Communication Network Hideyuki Mizuta IBM Tokyo Research Laboratory 1623-14, Shimotsuruma, Yamato-shi Kanagawa-ken 242-8502, Japan E-mail: e28193@jp.ibm.com Fusashi Nakamura
More informationVisualizing e-government Portal and Its Performance in WEBVS
Visualizing e-government Portal and Its Performance in WEBVS Ho Si Meng, Simon Fong Department of Computer and Information Science University of Macau, Macau SAR ccfong@umac.mo Abstract An e-government
More informationSELECTING NEURAL NETWORK ARCHITECTURE FOR INVESTMENT PROFITABILITY PREDICTIONS
UDC: 004.8 Original scientific paper SELECTING NEURAL NETWORK ARCHITECTURE FOR INVESTMENT PROFITABILITY PREDICTIONS Tonimir Kišasondi, Alen Lovren i University of Zagreb, Faculty of Organization and Informatics,
More information