Symmetry Exploits for Bayesian Cubature Methods

09/26/2018
by   Toni Karvonen, et al.
0

Bayesian cubature provides a flexible framework for numerical integration, in which a priori knowledge on the integrand can be encoded and exploited. This additional flexibility, compared to many classical cubature methods, comes at a computational cost which is cubic in the number of evaluations of the integrand. It has been recently observed that fully symmetric point sets can be exploited in order to reduce - in some cases substantially - the computational cost of the standard Bayesian cubature method. This work identifies several additional symmetry exploits within the Bayesian cubature framework. In particular, we go beyond earlier work in considering non-symmetric measures and, in addition to the standard Bayesian cubature method, present exploits for the Bayes-Sard cubature method and the multi-output Bayesian cubature method.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/20/2020

Flexible placements of graphs with rotational symmetry

We study the existence of an n-fold rotationally symmetric placement of ...
research
05/03/2021

Bayesian tests of symmetry for the generalized von Mises distribution

Bayesian tests on the symmetry of the generalized von Mises model for pl...
research
07/02/2015

Classical vs. Bayesian methods for linear system identification: point estimators and confidence sets

This paper compares classical parametric methods with recently developed...
research
06/30/2016

Contextual Symmetries in Probabilistic Graphical Models

An important approach for efficient inference in probabilistic graphical...
research
05/22/2023

Bayesian Numerical Integration with Neural Networks

Bayesian probabilistic numerical methods for numerical integration offer...
research
11/01/2019

Learning-based Real-time Detection of Intrinsic Reflectional Symmetry

Reflectional symmetry is ubiquitous in nature. While extrinsic reflectio...
research
03/18/2017

Fully symmetric kernel quadrature

Kernel quadratures and other kernel-based approximation methods typicall...

Please sign up or login with your details

Forgot password? Click here to reset