Preference aggregation theory without acyclicity: The core without majority dissatisfaction

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Preference aggregation theory without acyclicity: The core without majority dissatisfaction

Acyclicity of individual preferences is a minimal assumption in social choice theory. We replace that assumption by the direct assumption that preferences have maximal elements on a fixed agenda. We show that the core of a simple game is nonempty for all profiles of such preferences if and only if the number of alternatives in the agenda is less than the Nakamura number of the game. The same is...

متن کامل

Preference without a Difference

Background: There are certain universally accepted tenets that support the continued adoption of sensory evaluation methods. One of these strongly held beliefs is that a person cannot have a preference between two perceptually identical products. This idea justifies the existence of difference testing sensory programs in many consumer product companies and is the basis for the argument that if ...

متن کامل

Preference aggregation and game theory

1 Non-strategic point of view Arrow Harsanyi and utilitarianism Interpersonal comparison of utilities 2 Strategic aspects and game theory Strategic voting, and G-S " Small worlds " Computational issues 3 A broader picture Great confusion under the sky: excellent situation! To put the cart before the horses Non welfarist approaches F. Patrone Preference aggregation and GT Non-strategic point of ...

متن کامل

Information-Theoretic Security Without an Honest Majority

We present six multiparty protocols with information-theoretic security that tolerate an arbitrary number of corrupt participants. All protocols assume pairwise authentic private channels and a broadcast channel (in a single case, we require a simultaneous broadcast channel). We give protocols for veto, vote, anonymous bit transmission, collision detection, notification and anonymous message tr...

متن کامل

Identifying Cheaters without an Honest Majority

Motivated by problems in secure multiparty computation (MPC), we study a natural extension of identifiable secret sharing to the case where an arbitrary number of players may be corrupted. An identifiable secret sharing scheme is a secret sharing scheme in which the reconstruction algorithm, after receiving shares from all players, either outputs the correct secret or publicly identifies the se...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Games and Economic Behavior

سال: 2011

ISSN: 0899-8256

DOI: 10.1016/j.geb.2010.06.008