Mining Ballots

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Sigma Ballots

We present Sigma ballots, a new type of ballot designed to be used in secure elections. Sigma ballots use the random order of candidates introduced by Prêt à Voter, combined with the confirmation codes of Scantegrity II. These ballots can be produced by a DRE machine with a slightly modified VVPAT, or can be similar to optical scan ballots. Sigma ballots work in conjunction with existing public...

متن کامل

Voting Equipment and Ballots

Voting machine failures stood front and center in the recount of the 2000 presidential election vote in Florida. The election dispute between George Bush and Al Gore exposed problems in the absentee and registration systems, in the management of polling places, and even in the definition of a vote in Florida’s law. However, a single image captured the heart of the election controversy: Judge Ro...

متن کامل

Characterizing challenged Minnesota ballots

Photocopies of the ballots challenged in the 2008 Minnesota elections, which constitute a public record, were scanned on a high-speed scanner and made available on a public radio website. The PDF files were downloaded, converted to TIF images, and posted on the PERFECT website. Based on a review of relevant image-processing aspects of paper-based election machinery and on additional statistics ...

متن کامل

Auditing Australian Senate Ballots

We explain why the AEC should perform an audit of the paper Senate ballots against the published preference data files. We suggest four different post-election audit methods appropriate for Australian Senate elections. We have developed prototype code for all of them and tested it on preference data from the 2016 election. Authors are grouped by institution, in alphabetical order, and then list...

متن کامل

Secure Ballots Using Quantum Cryptography

Quantum cryptography is an emerging technology in the field of cryptographic systems where quantum mechanics is used to guarantee secure communication between two parties. In simple terms, quantum cryptography uses the principles of quantum mechanics to provide communication between two parties where eavesdropping can be detected by both the sender and the receiver. The first commercial applica...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Reference & User Services Quarterly

سال: 2009

ISSN: 1094-9054

DOI: 10.5860/rusq.49n2.112