منابع مشابه
Trading Votes for Votes . ∗ A Decentralized Matching
We study vote trading—trading of votes for votes—through the tools of the matching literature. Decentralized vote trading is modeled via an algorithm that executes a sequence of binding, myopic, strictly improving pair-wise trades. We show that with binary alternatives, an odd number of voters, and separable preferences, the sequence always converges to a stable vote allocation—a distribution o...
متن کاملTrading Votes for Votes: An Experimental Study∗
Trading votes for votes is believed to be ubiquitous in committees and legislatures, and yet we know very little of its properties. We return to this old question with a laboratory experiment and a simple theoretical framework. We posit a family of minimally rational trading rules such that pairs of voters can exchange votes when mutually advantageous. Such rules always lead to stable vote allo...
متن کاملNegotiable Interfaces for Components
Component specifications are vital for communicating a component’s requirements, as components are subject to third-party composition. Most modern programming languages lack sufficient features to express the full requirements of a component, however, much less enforce them. Preand post-conditions can capture functional aspects of a component’s requirements, but are unable to express many tempo...
متن کاملStorable votes
Motivated by the need for more flexible decision-making mechanisms in the European Union, the paper proposes a simple but novel voting scheme for binary decisions taken by committees that meet regularly over time. At each meeting, committee members are allowed to store their vote for future use; the decision is then taken according to the majority of votes cast. The possibility of shifting vote...
متن کاملBuying random votes is as hard as buying no-votes
In voting systems where a mark in a fixed position may mean a vote for Alice on a ballot, and a vote for Bob on another ballot, an attacker may coerce voters to put their mark at a certain position, enforcing effectively a random vote. This attack is meaningful if the voting system allows to take receipts with them and/or posts them to a bulletin board. The coercer may also ask for a blank rece...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Artificial Intelligence Research
سال: 2019
ISSN: 1076-9757
DOI: 10.1613/jair.1.11446