More Style, Less Work: Card-style Data Decrease Risk-limiting Audit Sample Sizes

نویسندگان

چکیده

U.S. elections rely heavily on computers such as voter registration databases, electronic pollbooks, voting machines, scanners, tabulators, and results reporting websites. These introduce digital threats to election outcomes. Risk-limiting audits (RLAs) mitigate some of these systems by manually inspecting random samples ballot cards. RLAs have a large chance correcting wrong outcomes (by conducting full manual tabulation trustworthy record the votes), but can save labor when reported are correct. This efficiency is eroded sampling cannot be targeted cards that contain contest(s) under audit. If sample drawn from all cast cards, then RLA sizes scale like reciprocal fraction That shrinks number per grows (i.e., more contests) ballots contest decreases smaller percentage voters eligible vote in contest). States conduct contests multi-card or small dramatically reduce using information about which contests—by keeping track card-style data (CSD). For instance, CSD expected draws needed audit single countywide 4-card 75%. Similarly, 95% for an two with same margin if one every other 10% ballots. In realistic examples, savings several orders magnitude.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Sample manuscript showing specifications and style

The Complex Ambiguity Function (CAF) used in emitter location measurement is a 2-dimensional complex-valued function of time-difference-of-arrival (TDOA) and frequency-difference-of-arrival (FDOA). In classical TDOA/FDOA systems, pairs of sensors share data (using compression) to compute the CAF, which is then used to estimate the TDOA/FDOA for each pair; the sets of TDOA/FDOA measurements are ...

متن کامل

Sample manuscript showing specifications and style

Barten’s model of spatio-temporal contrast sensitivity function of human visual system is embedded in a multi-slice channelized Hotelling observer. This is done by 3D filtering of the stack of images with the spatio-temporal contrast sensitivity function and feeding the result (i.e., the perceived image stack) to the multi-slice channelized Hotelling observer. The proposed procedure of consider...

متن کامل

Illustrative Data Graphic Style Elements

We describe a set of straight-forward techniques for the precise ink rendering of lines, hatching patterns, and hatched portraits that we employed in a personal data graphics poster inspired by 18th and 19th century visualizations. We outline our approach and rendering techniques and also discuss the relationship and relevance of our techniques to illustrative visualization.

متن کامل

Towards Style Transformation from Written-Style to Audio-Style

In this paper, we address the problem of optimizing the style of textual content to make it more suitable to being listened to by a user as opposed to being read. We study the differences between the written style and the audio style by consulting the linguistics and journalism literatures. Guided by this study, we suggest a number of linguistic features to distinguish between the two styles. W...

متن کامل

Relating Church-Style and Curry-Style Subtyping

Type theories with higher-order subtyping or singleton types are examples of systems where computation rules for variables are affected by type information in the context. A complication for these systems is that bounds declared in the context do not interact well with the logical relation proof of completeness or termination. This paper proposes a natural modification to the type syntax for Fω...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Digital threats

سال: 2021

ISSN: ['2692-1626', '2576-5337']

DOI: https://doi.org/10.1145/3457907