نتایج جستجو برای: majority voting

تعداد نتایج: 186977  

2004
Werner Kirsch

Voting in the EU-Council – a brief sketch At least since the EU-summit in Nice in December 2000 there has been an intensive discussion about the voting procedure in the EU-Council. The Treaty of Nice contains a very complicated procedure which consists of three voting criteria. A proposal is accepted by the Council if: 1) the (simple) majority of states support the proposal 2) the proposal rece...

Journal: :Games and Economic Behavior 2010
Curtis R. Taylor Huseyin Yildirim

We provide a unified analysis of the canonical rational voting model with privately known political preferences and costs of voting. Focusing on type-symmetric equilibrium, we show that for small electorates, members of the minority group vote with a strictly higher probability than do those in the majority, but the majority is strictly more likely to win the election. As the electorate size gr...

Journal: :FO & DM 2009
José Luis García-Lapresta Miguel Martínez-Panero

Two linguistic-based voting systems have been introduced in recent years, namely: Majority Judgement (Balinski and Laraki, 2007) and Range Voting (Smith, 2000). The keys for them are aggregation procedures based on the median and the arithmetic mean of the grades assessed to the alternatives, respectively. In this paper a comprehensive framework based on centered OWA operators (Yager, 2007) and...

2016
Christine L. Gray Brian W. Pence Lynne C. Messer Jan Ostermann Rachel A. Whetten Nathan M. Thielman Karen O’Donnell Kathryn Whetten

BACKGROUND Communities and nations seeking to foster social responsibility in their youth are interested in understanding factors that predict and promote youth involvement in public activities. Orphans and separated children (OSC) are a vulnerable population whose numbers are increasing, particularly in resource-poor settings. Understanding whether and how OSC are engaged in civic activities i...

Journal: :IEEE Access 2022

Many of the IoT devices connected to Internet are insecure which expose a variety cybersecurity threats. The Distributed Denial Service (DDoS) attack is considered one most critical threats on Internet, blocking legitimate users from accessing online services. Botnets have exploited and used them launch DDoS attacks. Providing with ability detect attacks will prevent being contributors these Th...

2016
Frank Reichert

This study presents evidence for the mediation effect of political knowledge through political self-efficacy (i.e. internal political efficacy) in the prediction of political participation. It employs an action theoretic approach-by and large grounded on the Theory of Planned Behaviour-and uses data from the German Longitudinal Election Study to examine whether political knowledge has distinct ...

1999
Priya Narasimhan Kim Potter Kihlstrom Louise E. Moser P. M. Melliar-Smith

The Immune system aims to provide survivability to CORBA applications, enabling them to continue to operate despite malicious attacks, accidents, or faults. Every object within the CORBA application is actively replicated by the Immune system, with majority voting applied on incoming invocations and responses to each replica of the object. The Secure Multicast Protocols are employed to enable t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید