The Majority Rule and Combinatorial Geometry (via the Symmetric Group)
نویسنده
چکیده
The Marquis du Condorcet recognized 200 years ago that majority rule can produce intransitive group preferences if the domain of possible (transitive) individual preference orders is unrestricted. We present results on the cardinality and structure of those maximal sets of permutations for which majority rule produces transitive results (consistent sets). Consistent sets that contain a maximal chain in the Weak Bruhat Order inherit from it an upper semimodular sublattice structure. They are intrinsically related to a special class of hamiltonian graphs called persistent graphs. These graphs in turn have a clean geometric interpretation: they are precisely visibility graphs of staircase polygons. We highlight the main tools used to prove these connections and indicate possible social choice and computational research directions.
منابع مشابه
An Ab Initio SCF-MO Study of Conformational Properties of Cyclodeca-1,2,3-triene
Ab initio calculation at HF/6-31G* level of theory for geometry optimization and MP2/6-31G*//HF/6-31G* for a single point total energy calculation are reported for the important energyminimumconformations and transition-state geometries of of cyclodeca-1,2,3-triene (1). The mostfavorable conformation of 1 is a unsymmetrical twist-chair (1-TC) structure. Degenerateinterconversion of 1-TC with it...
متن کاملHydraulic Model Studies of Non-Symmetric Y Branches In Karun I (RESEARCH NOTE)
Power stations with high heads are nowadays almost without exception designed so as to have one pipeline, or a few pipelines, supplying the water to the turbines. The penstocks are connected to a distributor, which has the task of distributing the flow with the lowest possible losses of energy to the individual turbines. The function and location of this section of the plant make it understanda...
متن کاملHybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design
Key distribution is an important problem in wireless sensor networks where sensor nodesare randomly scattered in adversarial environments.Due to the random deployment of sensors, a list of keys must be pre-distributed to each sensor node before deployment. To establish a secure communication, two nodes must share common key from their key-rings. Otherwise, they can find a key- path in which ens...
متن کاملDosimetric evaluation of a treatment planning system using pencil beam convolution algorithm for enhanced dynamic wedges with symmetric and asymmetric fields
Background: The dosimetric performance of Eclipse 6.5 three dimensional treatment planning system (3DTPS) is evaluated by comparing the calculated and measured dose in two dimensions following the guide lines of American Association for Physicists in Medicine Task Group 53. Materials and Methods: The calculations were performed by the 3DTPS for symmetric as well as asymmetric fields for standar...
متن کاملBoundary qKZ equation and generalized Razumov-Stroganov sum rules for open IRF models
for Ak−1 models with open boundaries, by constructing polynomial solutions of level one boundary quantum Knizhnik–Zamolodchikov equations for Uq(sl(k)). The result takes the form of a character of the symplectic group, that leads to a generalization of the number of vertically symmetric alternating sign matrices. We also investigate the other combinatorial point q = −1, presumably related to th...
متن کامل