Sciweavers

162 search results - page 14 / 33
» The Design of a Trustworthy Voting System
Sort
View
ATAL
2008
Springer
15 years 1 months ago
Automated design of scoring rules by learning from examples
Scoring rules are a broad and concisely-representable class of voting rules which includes, for example, Plurality and Borda. Our main result asserts that the class of scoring rul...
Ariel D. Procaccia, Aviv Zohar, Jeffrey S. Rosensc...
IEEEARES
2006
IEEE
15 years 5 months ago
E-voting: Dependability Requirements and Design for Dependability
Elections are increasingly dependent on computers and telecommunication systems. Such “E-voting” schemes create socio-technical systems (combinations of technology and human o...
Jeremy Bryans, Bev Littlewood, Peter Y. A. Ryan, L...
IEEESCC
2010
IEEE
15 years 1 months ago
Accountability as a Service for the Cloud
— Computing resource provisioning through the use of the Cloud computing paradigm has triggered revolutions in modern day computing. It is a new paradigm for deploying services o...
Jinhui Yao, Shiping Chen, Chen Wang, David Levy, J...
ESOP
2005
Springer
15 years 5 months ago
Programming with Explicit Security Policies
Are computing systems trustworthy? To answer this, we need to know three things: what the systems are supposed to do, what they are not supposed to do, and what they actually do. A...
Andrew C. Myers
SRDS
2000
IEEE
15 years 4 months ago
Performance of Mobile, Single-Object, Replication Protocols
This paper discusses the implementation and performance of bounded voting: a new object replication protocol designed for use in mobile and weakly-connected environments. We show ...
Ugur Çetintemel, Peter J. Keleher