471 Hits in 7.0 sec

The Value of Research Based on Simple Assumptions about Voters' Preferences [chapter]

William V. Gehrlein, Dominique Lepelley
2011 Studies in Choice and Welfare  
The objective of this study is to clarify the intent and value of the basic research that is based on these simple assumptions.  ...  While no claim has ever been made that any of these assumptions reflect realistic scenarios, they still do add very significant value to research on the probability that various paradoxical election outcomes  ...  For example, Berg (1985) shows an interesting connection between IC and IAC through a discussion of Pólya-Eggenberger (P-E) probability models.  ... 
doi:10.1007/978-3-642-20441-8_7 fatcat:ymjpadczwffcfn5fqrubj4tkca

On the stability of a scoring rules set under the IAC

Vincent Merlin, Mostapha Diss, Ahmed Louichi, Hatem Smaoui, Felix Brandt, Vincent Conitzer, Lane A. Hemaspaandra, Jean-Francois Laslier, William S. Zwicker
Under the Impartial Anonymous Culture assumption (IAC), we will derive a probability for the stability of this triplet of voting rules. We use Ehrhart polynomials in order to solve our problems.  ...  We discuss briefly recent algorithmic solutions to this method and use it to determine the probability of stabillity of {Borda, Plurality, Antiplurality} set.  ...  The latter profile answers the stability question for {A, B, P} in the negative. The rest of the paper calculates the probability for stability of {A, B, P} under IAC.  ... 
doi:10.4230/dagsemproc.10101.6 fatcat:d7wfryi3ybbndacymdkhxbenma

Computational Social Choice: Theory and Applications (Dagstuhl Seminar 15241)

Craig Boutilier, Britta Dorn, Nicolas Maudet, Vincent Merlin, Marc Herbstritt
2016 Dagstuhl Reports  
This report documents the program and the outcomes of Dagstuhl Seminar 15241 "Computational Social Choice: Theory and Applications".  ...  The seminar featured a mixture of classic scientific talks (including three overview talks), open problem presentations, working group sessions, and five-minute contributions ("rump session").  ...  Several research talks were presented: Vincent Merlin took the example of the Eurovision European Song Contest to illustrate the problem of the determination of potential and necessary winners for scoring  ... 
doi:10.4230/dagrep.5.6.1 dblp:journals/dagstuhl-reports/BoutilierDMM15 fatcat:shjhvv4u5nfktdgfwlntjrfg6i

On Ehrhart polynomials and probability calculations in voting theory

Dominique Lepelley, Ahmed Louichi, Hatem Smaoui
2007 Social Choice and Welfare  
In voting theory, analyzing the frequency of an event (e.g. a voting paradox), under some specific but widely used assumptions, is equivalent to computing the exact number of integer solutions in a system  ...  of linear constraints.  ...  Under this assumption, computing the desired probability amounts to evaluating the number of situations corresponding to the voting event under consideration.  ... 
doi:10.1007/s00355-007-0236-1 fatcat:c6imqko3ijfibozl6rhgd46evy

Anti-Patterns in Infrastructure as Code

Akond Rahman
2018 2018 IEEE 11th International Conference on Software Testing, Verification and Validation (ICST)  
We hope outcomes of the thesis i.e. findings, tools, and datasets will facilitate further research in the area of IaC. DEDICATION To my mother, Dr.  ...  The goal of this thesis is to help practitioners in increasing quality of IaC scripts by identifying development and security anti-patterns in the development of infrastructure as code scripts.  ...  . • Naive Bayes (NB): The Naive Bayes (NB) classification technique computes the posterior probability of each class to make prediction decisions.  ... 
doi:10.1109/icst.2018.00057 dblp:conf/icst/Rahman18 fatcat:vrytux7oi5aatdr5cvg5bpuuee

Decoding properties of tRNA leave a detectable signal in codon usage bias

Alexander C. Roth
2012 Computer applications in the biosciences : CABIOS  
Instead, the codon reading is approximated from theoretical inferences of nucleotide binding, the wobble rules. Unfortunately, these rules fail to capture all of the nuances of codon reading.  ...  Results: Using three different computational methods, the signal of tRNA decoding in codon usage bias is identified.  ...  Figure 3 illustrates an example, of the structure of the HMM for alanine.  ... 
doi:10.1093/bioinformatics/bts403 pmid:22962450 pmcid:PMC3436830 fatcat:xlxdsiyaongd7e5gu64oeisife

On the Discriminative Power of Tournament Solutions [chapter]

Felix Brandt, Hans Georg Seedig
2016 Operations Research Proceedings  
Tournament solutions constitute an important class of social choice functions that only depend on the pairwise majority comparisons between alternatives.  ...  In this work, we aim to fill the gap between these extremes by examining the distribution of the number of alternatives returned by common tournament solutions for empirical data as well as data generated  ...  Under this assumption, it was shown by Fey [15] that BA almost always selects all alternatives as the number of alternatives goes to infinity.  ... 
doi:10.1007/978-3-319-28697-6_8 dblp:conf/or/BrandtS14 fatcat:uqaakfpfjjffhigpvutnx56p5i

Toward Brain-Actuated Humanoid Robots: Asynchronous Direct Control Using an EEG-Based BCI

Yongwook Chae, Jaeseung Jeong, Sungho Jo
2012 IEEE Transactions on robotics  
The aim of this study is to apply an asynchronous direct-control system for humanoid robot navigation using an electroencephalograph (EEG), based active BCI.  ...  head of the robot.  ...  Fig. 8 illustrates an example of the command selection procedure. For the first 1 s, the consecutive "rest" commands appear.  ... 
doi:10.1109/tro.2012.2201310 fatcat:chlm2p2einhlpjhjnppgcmhijq

Energy Balancing of Covariate Distributions [article]

Jared D. Huling, Simon Mak
2022 arXiv   pre-print
individualized treatment rules.  ...  Finally, the proposed method is computationally efficient and has desirable theoretical guarantees under mild conditions.  ...  To demonstrate the effectiveness of using energy balancing weights in optimal ITR estimation, we provide an illustrative example under two data-generating scenarios.  ... 
arXiv:2004.13962v5 fatcat:q5euafitmnf43iv3cxj23shi3i

D2.1 Requirements, KPIs, evaluation plan and architecture - First version

Luciano Baresi
2020 Zenodo  
In particular, D6.1, among the other data, provides a list of the used technologies with the corresponding references, the time plan for the development of the SODALITE platform, as well as the implementation  ...  plan of the SODALITE case studies, and describes how the SODALITE case studies plan to cover the UML use cases defined in this document.  ...  Acknowledgement The work described in this document has been conducted within the Research & Innovation action SODALITE (project no. 825480), started in February 2019, and co-funded by the European Commis  ... 
doi:10.5281/zenodo.4280682 fatcat:ajp6mvopmfhdlgr2gj7g4cep4e

How Likely A Coalition of Voters Can Influence A Large Election? [article]

Lirong Xia
2022 arXiv   pre-print
Our main theorem provides asymptotically tight bounds on the semi-random likelihood of the existence of a size-B coalition that can successfully influence the election under a wide range of voting rules  ...  ) upper bound and an Ω(1/n^67) lower bound for many commonly studied voting rules under the i.i.d. uniform distribution, known as Impartial Culture (IC) in social choice, where n is the number is voters  ...  In words, Score ì 𝑠 𝑎,𝑏 is the score vector of 𝑎 (under all linear orders) minus the score vector of 𝑏.  ... 
arXiv:2202.06411v1 fatcat:pvfxfi723baghpqstmftueayvy

How Likely Are Large Elections Tied? [article]

Lirong Xia
2021 arXiv   pre-print
We prove dichotomy theorems on the smoothed likelihood of ties under positional scoring rules, edge-order-based rules, and some multi-round score-based elimination rules, which include commonly studied  ...  Despite a large body of literature and the common belief that ties are rare, little is known about how rare ties are in large elections except for a few simple positional scoring rules under the i.i.d.  ...  Acknowledgements We thank Rupert Freeman, Qishen Han, Ao Liu, Marcus Pivato, Sikai Ruan, Rohit Vaish, Weiqiang Zheng, Bill Zwicker, participants of the COMSOC video seminar, and anonymous reviewers for  ... 
arXiv:2011.03791v3 fatcat:gauswsse3bcmnfmxj4grrfmgie

Summary report on the methodological framework at micro level

Andrea Povellato, Valentina Lasorella, Davide Longhitano
2015 Zenodo  
Field measurements, farm management surveys and farming system models essentially refer to the farm as the simplest management unit of an agricultural system, analysed from the point of view of a farmer  ...  The environmental impact assessment of rural development policies is an issue that needs to be constantly monitored by both practitioners and policy makers within the EU and its Member States.  ...  Claims for measures commonly cover only part of a field, which means that there is an over-estimation of the area under measure.  ... 
doi:10.5281/zenodo.7058169 fatcat:f7djiu5dibe77iyt4xx66vh4uy

A socio‐ecological model for predicting impacts of land‐use and climate change on regional plant diversity in the Austrian Alps

Iwona Dullinger, Andreas Gattringer, Johannes Wessely, Dietmar Moser, Christoph Plutzar, Wolfgang Willner, Claudine Egger, Veronika Gaube, Helmut Haberl, Andreas Mayer, Andreas Bohner, Christian Gilli (+3 others)
2020 Global Change Biology  
Here, we use an ABM parameterized for 1,329 agents, mostly farmers, in a Central European model region, and simulate the changes to land-use patterns resulting from their response to three scenarios of  ...  changing socio-economic conditions and three scenarios of climate change until the mid of the century.  ...  As an example, types of land use that have no recent history in the area but could become attractive under a warming climate, such as winegrowing, did hardly play a role in decision-making according to  ... 
doi:10.1111/gcb.14977 pmid:31994267 fatcat:7kj27yz6enbkbfs64nnqdd7bhe

Let's Face It: Faceted Values for Taint Tracking [chapter]

Daniel Schoepe, Musard Balliu, Frank Piessens, Andrei Sabelfeld
2016 Lecture Notes in Computer Science  
Instead, we include shadow memories in the execution context, so that a single run of a program has the effect of computing on both tainted and untainted data.  ...  This paper presents an approach to taint tracking, which does not involve tracking taints throughout computation.  ...  Acknowledgments This work was funded by the European Community under the ProSecuToR project and the Swedish research agencies SSF and VR.  ... 
doi:10.1007/978-3-319-45744-4_28 fatcat:jscyfz6j2jal3fp5ayjy5mq75i
« Previous Showing results 1 — 15 out of 471 results