نتایج جستجو برای: anonymity of voter

تعداد نتایج: 21164998  

2011
Maria Montero Alex Possajennikov Martin Sefton

We report experiments on the following lobbying game. Two lobbyists have identical budgets and simultaneously distribute them across voters in a legislature. Each voter votes for the lobbyist who pays them most and the lobbyist who receives most votes wins a prize. Taking the share of the budget distributed to a voter as a measure of the voter‟s voting power we investigate how voting power vari...

2008
ANJA STURM JAN M. SWART

Consider a long-range, one-dimensional voter model started with all zeroes on the negative integers and all ones on the positive integers. If the process obtained by identifying states that are translations of each other is positively recurrent, then it is said that the voter model exhibits interface tightness. In 1995, Cox and Durrett proved that one-dimensional voter models exhibit interface ...

Journal: :IEICE Electronic Express 2014
Xiaopeng Liu Yan Han Bin Zhang

A Triple-modular redundancy (TMR) system will have a failure if Single Event Transient (SET) faults affect the voter. In this paper, we propose a full SET-tolerance dual-modular majority voter (DMV) circuit for all internal nodes. The DMV consisting of two simplex-modular voters, two inverters, a C-element inverter and a weak keeper is implemented in CMOS 40 nm technology. A novel XOR gate and ...

2014
Swati Dhingra Scott Gehlbach Jim Lin Devashish Mitra

Median voter theory applied to trade policy predicts positive tariffs in capital-abundant countries and negative tariffs in labor-abundant countries. Negative tariffs are rare, and this paper reconciles the median voter theory with observed protectionism across countries. By considering large countries, I show the optimal tariff is a sum of the median voter component and a positive in terms of ...

2017

There are many systems that provide anonymity service for the users. Most of these systems work on the separation between the users’ identity and the final destination. The level of anonymity these services provide affected by several factors. Some of these factors are related to the design of the anonymity service itself. Others are related to how the system is used or what is the application/...

Journal: :CoRR 2013
Manoj Gopalkrishnan

We present a protocol that allows voters to phone in their votes. Our protocol makes it expensive for a candidate and a voter to cooperate to prove to the candidate who the voter voted for. When the electoral pool is large enough, the cost to the candidate of manipulating sufficiently many votes to have an influence on the election results becomes impossibly expensive. Hence, the protocol provi...

2006
John McAvoy Tom Butler

Social loafing refers to the behaviour of individual members of a team who have tendency not to work as hard as they could or should, because social groups provide a degree of anonymity such that individual team members feel that their poor performance will be hidden by the overall output of the team. Agile Software Development philosophy espouses the importance of cohesive project teams, the e...

2004
RUSSELL S. SOBEL GARY A. WAGNER

Models of expressive voting postulate that voters will ‘consume’ ideological stances on issues by voting for them, even when they are against the voter’s own narrow self interest, if the probability of being a decisive voter is low. When a voter is unlikely to sway the outcome, the odds that a voter will incur any real personal cost (a higher tax burden, for example) from her own expressive vot...

2013
Michael Backes Aniket Kate Praveen Manoharan Sebastian Meiser Esfandiar Mohammadi

Protecting individuals’ privacy in online communications has become a challenge of paramount importance. To this end, anonymous communication (AC) protocols such as the widely used Tor network have been designed to provide anonymity to their participating users. While AC protocols have been the subject of several security and anonymity analyses in the last years, there still does not exist a fr...

2004
Simonas Šaltenis Janne Skyt Giedrius Slivinskas Kristian Torp Kwang W. Nam Keun H. Ryu

The ability to perform meaningful empirical studies is of essence in research in spatio-temporal query processing. Such studies are often necessary to gain detailed insight into the functional and performance characteristics of proposals for new query processing techniques. We present a collection of spatio-temporal data, collected during an intelligent speed adaptation project, termed INFATI, ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید