نتایج جستجو برای: voting
تعداد نتایج: 14982 فیلتر نتایج به سال:
Voting protocols guarantee consistency of replicated data in the presence of any scenar io involving non-Byzantine site failures and networ k par titions. While Static Majority Consensus Voting algorithms use static quorums, Dynamic Voting algorithms dynamically adjust quorums to changes in the status of the networ k of sites holding the copies. We propose in this paper two novel dynamic voting...
An Electronic voting (E-voting) system is a voting system in which the election data is recorded, stored and processed primarily as digital information. E-voting may become the quickest, cheapest, and the most efficient way to administer election and count vote since it only consists of simple process or procedure and require a few worker within the process. The main task of this paper is to in...
Voting is a commonly used technique in combining results from peer experts. In distributed decision making systems, voting mechanisms are used to obtain a decision by incorporating the opinion of multiple units. Voting systems has many applications in fault tolerant systems, mutual exclusion in distributed systems, and replicated databases. We are specifically interested in voting systems as us...
India is one of the world’s largest democracies with a community of 1.1 billion; India has an electorate of 714 million persons over 828 thousands polling stations, 1.37 million voting machines and 5.5 million polling officials cover 543 parliamentary constituencies. Past experience of electoral process enforced us to focus on the use of latest technology in E-voting process. The current voting...
This paper examines the property of the m votes to win mechanism. Voting is an effective way to make a collective decision but voting behaviors, e.g., monitoring the voting process, may incur a cost, that is, voting is often costly. In this case, compulsory voting incurs a larger cost. Random decision making can reduce the cost for voting but is skeptical in the quality of decision making. That...
In recent years, computer and network-based voting technologies have been gradually adopted for various elections. However, due to the fragile nature of electronic ballots and voting software, computer voting has posed serious security challenges. This chapter studies the security of computer voting and focuses on a cryptographic solution based on mix-nets. Like traditional voting systems, mix-...
In this paper, we propose and have implemented the first verifiable classroom voting system. The subject of secure classroom voting has so far received almost no attention from the security community. Though several commercial classroom voting systems have been available, none of them is verifiable. State-of-the-art verifiable voting protocols all rely on finding a set of trustworthy tallying a...
Malicious software (malware) represents a threat to the security and the privacy of computer users. Traditional signature-based and heuristic-based methods are inadequate for detecting some forms of malware. This paper presents a malware detection method based on supervised learning. The main contributions of the paper are two ensemble learning algorithms, two pre-processing techniques, and an ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید