نتایج جستجو برای: majority voter mv

تعداد نتایج: 199968  

2010
PAUL LARSON

Suppose we are given a family of choice functions on pairs from a given finite set. The set is considered as a set of alternatives (say candidates for an office) and the functions as potential “voters.” The question is, what choice functions agree, on every pair, with the majority of some finite subfamily of the voters? For the problem as stated, a complete characterization was given in Shelah ...

2010
Arianna Degan Arnaud Dellis Stéphane Auray

Should voter awareness policies and get-out-the-vote movements be promoted? We address this question using a model of political advertising that incorporates both the mobilization and the persuasion aspects of advertising. An uncertainvoter model of two-candidate political competition is proposed, where candidates have fixed symmetric ideological positions and unknown qualities and can use poli...

Journal: :Synthese 2013
Christopher Thompson

The standard epistemic justification for inclusiveness in political decision making is the Condorcet Jury Theorem, which states that the probability of a correct decision using majority rule increases in group size (given certain assumptions). Informally, majority rule acts as a mechanism to pool the information contained in the judgements of individual agents. I aim to extend the explanation o...

2017
Alan D. Miller

I introduce a model of corporate voting. I characterize the shareholder majority rule as the unique corporate voting rule that satisfies four axioms: anonymity, neutrality, share monotonicity, and merger, a property that requires consistency in election outcomes following stock-for-stock mergers. JEL classification: D71, D72, K22

Journal: :Journal of neurodevelopmental cognition 2022

In this article, we try to model the effect of changes in threshold voltage two positive inputs negative ones using nanotechnology based on Quantum Dot Cellular automata (QCA). order do so, voter a Majority cell has been modified resulting amplifying upper and lower cells. Besides Brain-inspired approach can be used design very fast function with QCA.

Journal: :CoRR 2016
Nikos Chondros Bingsheng Zhang Thomas Zacharias Panos Diamantopoulos Stathis Maneas Christos Patsonakis Alex Delis Aggelos Kiayias Mema Roussopoulos

E-voting systems are a powerful technology for improving democracy by reducing election cost, increasing voter participation, and even allowing voters to directly verify the entire election procedure. Unfortunately, prior internet voting systems have single points of failure, which may result in the compromise of availability, voter secrecy, or integrity of the election results. In this paper, ...

2008
Victor Morales-Rocha Jordi Puiggali Miguel Soriano

Voter registration is an important issue in election processes. In order to protect the election accuracy, it is necessary to have an accurate electoral roll of eligible voters. The electoral roll is usually constructed by means of a voter registration system that compiles voter data either in person or remotely. Current solutions for remote voter registration lack effective methods to prevent ...

Journal: :J. Algorithms 2009
Hugo L. Jonker Sjouke Mauw Jun Pang

Privacy is a necessary requirement for voting. Without privacy, voters can be forced to vote in specific ways, and the forcing party can check their compliance. But offering privacy does not suffice: if a voter can reduce her privacy, an attacker can force her to do so. In this paper, we distinguish various ways that a voter can communicate with the intruder to reduce her privacy and classify t...

2016
Vincent Conitzer Toby Walsh

Example 6.1 Consider an election with three alternatives, a, b, and c, and three voters, 1, 2, and 3. Suppose the rule used is plurality—an alternative gets a point each time it is ranked first by a voter, and the alternative with the most points wins—with ties broken towards alternatives earlier in the alphabet. Suppose voter 3 knows (or strongly suspects) that voter 1 will rank a first in her...

Journal: :Microelectronics Reliability 2005
Milos D. Krstic Mile K. Stojcev Goran Lj. Djordjevic Ivan D. Andrejic

Hardware redundancy may be used in a variety of manners to achieve fault tolerance. One of the most popular techniques is a triple modular redundancy (TMR) scheme. Such a scheme has also been referred to as masking redundancy because failures those affect only if one of the three modules is masked by the majority of the nonfailed modules. Most of the published works on TMR make one crucial assu...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید