منابع مشابه
Voting and different ranking orders in DEA
Data Envelopment Analysis (DEA) technique now widely use for efficiency evaluation of a set of Decision Making Units (DMUs). As regards of the necessity for ranking efficient units different DEA models presented each of which has advantages and rank efficient units from special aspects. Note that all the existing ranking models have disadvantages, as well and there is not a model in which all t...
متن کاملPresent, not voting: Digital Humanities in the Panopticon: closing plenary speech, Digital Humanities 2010
The field of Digital Humanities continues to change and evolve rapidly, as we utilise, appropriate, and develop internet, communication, and computational technologies. In this plenary, a specific focus will be placed on one individual project – The Transcribe Bentham project at UCL k/transcribe-bentham/) – as a viewpoint through which to witness the changing demands and needs placed on those w...
متن کاملE-Voting and the Need for Rigourous Software Engineering - The Past, Present and Future
In many jurisdictions around the world, the introduction of e-voting has been subject to wide-ranging debate amongst voters, politicians, political scientists, computer scientists and software engineers. A central issue is one of public trust and confidence: should voters be expected to put their faith in “closed” electronic systems where previously they trusted “open” manual systems? As the me...
متن کاملFuzzy Neighbor Voting for Automatic Image Annotation
With quick development of digital images and the availability of imaging tools, massive amounts of images are created. Therefore, efficient management and suitable retrieval, especially by computers, is one of themost challenging fields in image processing. Automatic image annotation (AIA) or refers to attaching words, keywords or comments to an image or to a selected part of it. In this paper,...
متن کاملDouble voter perceptible blind signature based electronic voting protocol
Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill these properties. However, many of them suffer from the same weaknesses. In this p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: SAGE Open
سال: 2013
ISSN: 2158-2440,2158-2440
DOI: 10.1177/2158244013515684