scispace - formally typeset
Search or ask a question
Author

Edwin B. Wilson

Bio: Edwin B. Wilson is an academic researcher from Harvard University. The author has contributed to research in topics: Population & Theory of relativity. The author has an hindex of 24, co-authored 142 publications receiving 6408 citations. Previous affiliations of Edwin B. Wilson include Massachusetts Institute of Technology & University of Glasgow.


Papers
More filters
Journal ArticleDOI
TL;DR: In this article, Probable Inference, the Law of Succession, and Statistical Inference are discussed, with a focus on the law of succession in probabilistic inference.
Abstract: (1927). Probable Inference, the Law of Succession, and Statistical Inference. Journal of the American Statistical Association: Vol. 22, No. 158, pp. 209-212.

3,253 citations

Journal ArticleDOI
16 May 1913-Science
TL;DR: The parallelism between monetary stocks and prices is somewhat remarkable in view of the incompleteness of the data as mentioned in this paper, for the increasing volume of trade and the successive demonetization of silver by various countries.
Abstract: RareBooksClub. Paperback. Book Condition: New. This item is printed on demand. Paperback. 142 pages. Dimensions: 9.7in. x 7.4in. x 0.3in.This historic book may have numerous typos and missing text. Purchasers can usually download a free scanned copy of the original book (without typos) from the publisher. Not indexed. Not illustrated. 1920 edition. Excerpt: . . . for by the increasing volume of trade and the successive demonetization of silver by various countries. The foregoing parallelism between monetary stocks and prices is somewhat remarkable in view of the incompleteness of the data. 1 In the table there are lacking, not only exact statistics as to the volume of trade and all statistics whatever of velocity of circulation, but also statistics of the volume of bank notes, government notes, and deposit currency. We know, however, that modern banking, which had scarcely developed at all before the French Revolution, developed rapidly throughout the nineteenth century. It is also known that banking and deposit currency developed more rapidly during the third period in the table (1849-1873) than during the fourth (1873-1896), 2 which fact contributes somewhat to explain the contrast between the price movements of these two periods. 4 We may, therefore, summarize the...

229 citations


Cited by
More filters
Book ChapterDOI
TL;DR: The analysis of censored failure times is considered in this paper, where the hazard function is taken to be a function of the explanatory variables and unknown regression coefficients multiplied by an arbitrary and unknown function of time.
Abstract: The analysis of censored failure times is considered. It is assumed that on each individual arc available values of one or more explanatory variables. The hazard function (age-specific failure rate) is taken to be a function of the explanatory variables and unknown regression coefficients multiplied by an arbitrary and unknown function of time. A conditional likelihood is obtained, leading to inferences about the unknown regression coefficients. Some generalizations are outlined.

28,264 citations

Journal ArticleDOI
TL;DR: This article gives an introduction to the subject of classification and regression trees by reviewing some widely available algorithms and comparing their capabilities, strengths, and weakness in two examples.
Abstract: Classification and regression trees are machine-learning methods for constructing prediction models from data. The models are obtained by recursively partitioning the data space and fitting a simple prediction model within each partition. As a result, the partitioning can be represented graphically as a decision tree. Classification trees are designed for dependent variables that take a finite number of unordered values, with prediction error measured in terms of misclassification cost. Regression trees are for dependent variables that take continuous or ordered discrete values, with prediction error typically measured by the squared difference between the observed and predicted values. This article gives an introduction to the subject by reviewing some widely available algorithms and comparing their capabilities, strengths, and weakness in two examples. © 2011 John Wiley & Sons, Inc. WIREs Data Mining Knowl Discov 2011 1 14-23 DOI: 10.1002/widm.8 This article is categorized under: Technologies > Classification Technologies > Machine Learning Technologies > Prediction Technologies > Statistical Fundamentals

16,974 citations

Journal ArticleDOI
TL;DR: This paper presents a meta-modelling procedure called "Continuum Methods within MD and MC Simulations 3072", which automates the very labor-intensive and therefore time-heavy and expensive process of integrating discrete and continuous components into a discrete-time model.
Abstract: 6.2.2. Definition of Effective Properties 3064 6.3. Response Properties to Magnetic Fields 3066 6.3.1. Nuclear Shielding 3066 6.3.2. Indirect Spin−Spin Coupling 3067 6.3.3. EPR Parameters 3068 6.4. Properties of Chiral Systems 3069 6.4.1. Electronic Circular Dichroism (ECD) 3069 6.4.2. Optical Rotation (OR) 3069 6.4.3. VCD and VROA 3070 7. Continuum and Discrete Models 3071 7.1. Continuum Methods within MD and MC Simulations 3072

13,286 citations

Journal ArticleDOI
TL;DR: The authors showed that bank deposit contracts can provide allocations superior to those of exchange markets, offering an explanation of how banks subject to runs can attract deposits, and showed that there are circumstances when government provision of deposit insurance can produce superior contracts.
Abstract: This paper shows that bank deposit contracts can provide allocations superior to those of exchange markets, offering an explanation of how banks subject to runs can attract deposits. Investors face privately observed risks which lead to a demand for liquidity. Traditional demand deposit contracts which provide liquidity have multiple equilibria, one of which is a bank run. Bank runs in the model cause real economic damage, rather than simply reflecting other problems. Contracts which can prevent runs are studied, and the analysis shows that there are circumstances when government provision of deposit insurance can produce superior contracts.

9,099 citations

Journal ArticleDOI
TL;DR: In this article, a Bayesian approach for learning Bayesian networks from a combination of prior knowledge and statistical data is presented, which is derived from a set of assumptions made previously as well as the assumption of likelihood equivalence, which says that data should not help to discriminate network structures that represent the same assertions of conditional independence.
Abstract: We describe a Bayesian approach for learning Bayesian networks from a combination of prior knowledge and statistical data. First and foremost, we develop a methodology for assessing informative priors needed for learning. Our approach is derived from a set of assumptions made previously as well as the assumption of likelihood equivalence, which says that data should not help to discriminate network structures that represent the same assertions of conditional independence. We show that likelihood equivalence when combined with previously made assumptions implies that the user's priors for network parameters can be encoded in a single Bayesian network for the next case to be seen—a prior network—and a single measure of confidence for that network. Second, using these priors, we show how to compute the relative posterior probabilities of network structures given data. Third, we describe search methods for identifying network structures with high posterior probabilities. We describe polynomial algorithms for finding the highest-scoring network structures in the special case where every node has at most k e 1 parent. For the general case (k > 1), which is NP-hard, we review heuristic search algorithms including local search, iterative local search, and simulated annealing. Finally, we describe a methodology for evaluating Bayesian-network learning algorithms, and apply this approach to a comparison of various approaches.

4,124 citations