Sciweavers

116 search results - page 6 / 24
» Anonymity-Proof Voting Rules
Sort
View
GECCO
2003
Springer
110views Optimization» more  GECCO 2003»
14 years 21 days ago
Evolutionary Multiobjective Optimization for Generating an Ensemble of Fuzzy Rule-Based Classifiers
One advantage of evolutionary multiobjective optimization (EMO) algorithms over classical approaches is that many non-dominated solutions can be simultaneously obtained by their si...
Hisao Ishibuchi, Takashi Yamamoto
IJCAI
2007
13 years 9 months ago
Winner Determination in Sequential Majority Voting
Voting rules map collections of preference orderings over a set of candidates (one for each voter) to candidates. Now, in many contexts, we have to consider the case where either t...
Jérôme Lang, Maria Silvia Pini, Franc...
KDD
2002
ACM
148views Data Mining» more  KDD 2002»
14 years 8 months ago
Tumor cell identification using features rules
Advances in imaging techniques have led to large repositories of images. There is an increasing demand for automated systems that can analyze complex medical images and extract me...
Bin Fang, Wynne Hsu, Mong-Li Lee
FC
2005
Springer
104views Cryptology» more  FC 2005»
14 years 1 months ago
Event Driven Private Counters
We define and instantiate a cryptographic scheme called “private counters”, which can be used in applications such as preferential voting to express and update preferences (or...
Eu-Jin Goh, Philippe Golle
ECAI
2010
Springer
13 years 8 months ago
An Empirical Study of the Manipulability of Single Transferable Voting
Abstract. Voting is a simple mechanism to combine together the preferences of multiple agents. Agents may try to manipulate the result of voting by mis-reporting their preferences....
Toby Walsh