Results 81 to 90 of about 449,369 (221)

And the loser is... Plurality Voting [PDF]

open access: yes
This paper reports on a vote for choosing the best voting rules that was organized among the participants of the Voting Procedures workshop in July, 2010. Among 18 voting rules, Approval Voting won the contest, and Plurality Voting received no support at
Jean-François Laslier
core  

Minimal stable voting rules

open access: yesGames and Economic Behavior
In this paper, I characterize minimal stable voting rules and minimal self-stable constitutions (i.e., pairs of voting rules) for societies in which only power matters. To do so, I first let players' preference profiles over voting rules satisfy four natural axioms commonly used in the analysis of power: non-dominance, anonymity, null player and swing ...
openaire   +2 more sources

Majority‐Voting Overlapping Method for Error Correction in DNA Data Storage

open access: yesAdvanced Intelligent Discovery, EarlyView.
We propose an overlapping‐based majority‐voting method for DNA data storage error correction. By aligning multiple reads and choosing the most frequent base per position, it suppresses substitution errors without prior models. Validated on synthetic and real sequencing data, it achieves high‐fidelity, scalable, and cost‐effective reconstruction ...
Thi Bich Ngoc Nguyen   +5 more
wiley   +1 more source

Impacto das instituições estaduais na unidade das coalizões parlamentares no Brasil

open access: yesDados: Revista de Ciências Sociais, 2003
Research on political institutions suggests that sub-national factors affect the proclivity of legislators from the same party or coalition to vote together.
Carey John M., Reinhardt Gina Yannitell
doaj  

In Silico Voting Experiments [PDF]

open access: yes
This paper presents computer simulations of voting rules: Plurality rule, Approval voting and the Copeland and Borda rules, with voters voting sincerly or strategically.
Jean-François Laslier
core  

Most Equitable Voting Rules

open access: yes, 2022
In social choice theory, anonymity (all agents being treated equally) and neutrality (all alternatives being treated equally) are widely regarded as ``minimal demands'' and ``uncontroversial'' axioms of equity and fairness. However, the ANR impossibility -- there is no voting rule that satisfies anonymity, neutrality, and resolvability (always choosing
openaire   +2 more sources

AI‐Driven Cancer Multi‐Omics: A Review From the Data Pipeline Perspective

open access: yesAdvanced Intelligent Discovery, EarlyView.
The exponential growth of cancer multi‐omics data brings opportunities and challenges for precision oncology. This review systematically examines AI's role in addressing these challenges, covering generative models, integration architectures, Explainable AI for clinical trust, clinical applications, and key directions for clinical translation.
Shilong Liu, Shunxiang Li, Kun Qian
wiley   +1 more source

The Political Complexity of Regional Electricity Policy Formation

open access: yesComplexity, 2018
The integration of renewable power supplies into existing electrical grids, or other major technology transitions in electric power, is a complex sociotechnical process.
Kyungjin Yoo, Seth Blumsack
doaj   +1 more source

Reforming IMF and World Bank governance : in search of simplicity, transparency and democratic legitimacy in the voting rules [PDF]

open access: yes
We discuss the reform of the voting rules at the heart of the governance of the IMF and World Bank (the BWIs) in terms of three principles that we suggest ought to be fundamental: simplicity, transparency and democratic legitimacy.
Leech, Dennis, Leech, Robert
core  

An Intelligent Feature Engineering‐Driven Hybrid Framework for Adversarial Domain Name System Tunneling Detection

open access: yesAdvanced Intelligent Systems, EarlyView.
This study presents a novel framework that enhances the reliability of DNS traffic monitoring using a hybrid long short‐term memory‐deep neural network (LSMT‐DNN) architecture, enabling robust detection of adversarial DNS tunneling. The proposed framework leverages feature extraction from DNS traffic patterns, including domain request sequences, query ...
Ahmad Almadhor   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy