Decision theory and bayesian inference

Assignment Help Basic Computer Science
Reference no: EM13922141

Decision Theory and Bayesian Inference

An organization uses a spam filtering software to block email messages that may potentially be spam messages. The spam filter can be set to one of two security modes: High-Security-Mode () or Low-Security-Mode ().

Extensive evaluation using a benchmark corpus consisting exclusively of spam messages yields the following performance statistics for the spam filter:

  • 96% of the spam messages are blocked in the High-Security-Mode.
  • 90% of the spam messages are blocked in the Low-Security-Mode.

Extensive evaluation using a benchmark corpus consisting exclusively of non-spam (legitimate) messages yields the following performance statistics for the spam filter:

  • 10% of the non-spam messages are blocked in the High-Security-Mode
  • 4% of the non-spam messages are blocked in the Low-Security-Mode

The organization estimates that 80% of the messages that it receives are spam messages.

(a) Let  denote the conditional probability that a message that is not blocked by the spam filter operating in the High-Security-Mode is actually a spam message. Estimate .

(b) Let  denote the conditional probability that a message that is blocked by the spam filter operating in the High-Security-Mode is actually not a spam message. Estimate .

(c) Let  denote the conditional probability that a message that is not blocked by the spam filter operating in the Low-Security-Mode is actually a spam message. Estimate .

(d) Let  denote the conditional probability that a message that is blocked by the spam filter operating in the Low-Security-Mode is actually not a spam message. Estimate .

(e) If the cost of not blocking a spam message is $1 and the cost of blocking a non-spam message is $10, should the organization operate the spam filter in the High-Security-Mode? Why?

(f) Recall that the cost of not blocking a spam message is $1. At least how high should the cost of blocking a non-spam message be for a risk-neutral rational decision maker to prefer operating the spam filter in the Low-Security-Mode?

(g) Let  be the amortized cost per message of operating the spam filter. Write a short memo the CIO of the organization explaining at most how high  could be for the organization to use the spam filter with the specified performance?

Reference no: EM13922141

Questions Cloud

Target debt-equity ratio-what is the cost of equity : Frye, Inc., has a target debt-equity ratio of 1.60. Its WACC is 9.9 percent, and the tax rate is 38 percent. If the company's cost of equity is 16 percent, what is its pretax cost of debt? If instead you know that the aftertax cost of debt is 6.6 per..
Discuss key points of the recent dodd-frank legislation : Find the current beta for an S & P 500 company and discuss why you believe the firm has such a Beta, and discuss the ovweall riskiness of the firm from a stockholders viewpoint.
Complex numbers need to have explicitly stated values : How many nickels does a coin counter manufacturer need to weigh so that she can be 98% confident that her sample mean is within 25 milligrams of the true average weight of a nickel?
How would you respond to such an given argument : It has been argued that mutual insurance companies are dinosaurs-they are large, slow, bureaucratic, and inefficient. How would you respond to such an argument?
Decision theory and bayesian inference : An organization uses a spam filtering software to block email messages that may potentially be spam messages. The spam filter can be set to one of two security modes: High-Security-Mode () or Low-Security-Mode ().
Discuss general power of appointment for property decedent : Explain and discuss general power of appointment for property of a decedent, including the tax implications of appointing someone. Give some examples.
How will bobs optimal consumption choice change : How will Bob's optimal consumption choice change if the government imposes a $10/unit tax on the material welfare good?
Performance and diversity of employees in factory : Analyze different group and team concepts that could be implemented in order to improve the performance and diversity of employees in the factory.
Problem regarding the conflict management approaches : Write a 700- to 1,050-word paper that identifies the conflict management approaches used in your agency or place of work. How does this match or contradict your personal conflict management preference or style? Format your paper consistent with A..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd