1. F. Bex and S. Renooij . 2016. From arguments to constraints on a Bayesian Network. In Computational Models of Argument . Proceedings of COMMA 2016 . IOS Press, Amsterdam, 95--106. F. Bex and S. Renooij. 2016. From arguments to constraints on a Bayesian Network. In Computational Models of Argument. Proceedings of COMMA 2016. IOS Press, Amsterdam, 95--106.
2. GENERATIVE EXPLANATIONS OF CRIME: USING SIMULATION TO TEST CRIMINOLOGICAL THEORY*
3. A hierarchy of propositions: deciding which level to address in casework
4. De‐Biasing Legal Fact‐Finders With Bayesian Thinking
5. A. P. Dawid . 2010 . Beware of the DAG! In JMLR Workshop and Conference Proceedings: Volume 6 . Causality: Objectives and Assessment (NIPS 2008 Workshop), I. Guyon, D. Janzing, and B. Schölkopf (Eds.). jmlr.org, 59--86 . A. P. Dawid. 2010. Beware of the DAG! In JMLR Workshop and Conference Proceedings: Volume 6. Causality: Objectives and Assessment (NIPS 2008 Workshop), I. Guyon, D. Janzing, and B. Schölkopf (Eds.). jmlr.org, 59--86.