Sciweavers

2678 search results - page 5 / 536
» Voting in social networks
Sort
View
SIGECOM
2005
ACM
105views ECommerce» more  SIGECOM 2005»
14 years 1 months ago
Communication complexity of common voting rules
We determine the communication complexity of the common voting rules. The rules (sorted by their communication complexity from low to high) are plurality, plurality with runoff, ...
Vincent Conitzer, Tuomas Sandholm
ACMDIS
2004
ACM
14 years 29 days ago
Jukola: democratic music choice in a public space
Jukola is an interactive MP3 Jukebox device designed to allow a group of people in a public space to democratically choose the music being played. A public display is used to nomi...
Kenton O'Hara, Matthew Lipson, Marcel Jansen, Axel...
SIGCOMM
2006
ACM
14 years 1 months ago
SybilGuard: defending against sybil attacks via social networks
Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to sybil attacks. In a sybil attack, a malicious user obtains multiple fake ident...
Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, ...
EVOTING
2004
94views Hardware» more  EVOTING 2004»
13 years 9 months ago
How Security Problems can Compromise Remote Internet Voting Systems
: Remote Internet voting systems still suffer from many security problems which rely on the clients, the servers, and the network connections. Denial-ofservice attacks and viruses ...
Guido Schryen
AAAI
2010
13 years 9 months ago
Voting Almost Maximizes Social Welfare Despite Limited Communication
In cooperative multiagent systems an alternative that maximizes the social welfare--the sum of utilities--can only be selected if each agent reports its full utility function. Thi...
Ioannis Caragiannis, Ariel D. Procaccia