Search results
Jump to navigation
Jump to search
- {{Short description|Multiwinner voting rules}} '''Thiele's voting rules''' are rules for [[multiwinner voting]]. They allow voters to vote for individual candidates rather than parties, ...12 KB (1,822 words) - 17:43, 6 October 2024
- {{short description|E2E verifiable e-voting system}} ...|last7=Hao |first7=Feng |title=On the feasibility of E2E verifiable online voting – A case study from Durga Puja trial |journal=Journal of Information Securi ...12 KB (1,867 words) - 22:36, 14 February 2025
- ...w.gutenberg.org/ebooks/9630 |title=Proportional Representation: A Study in Methods of Election |date=2006-01-01 |language=English |access-date=2022-05-11 |arc ...ean-François Laslier |editor2=M. Remzi Sanver |title=Handbook on Approval Voting |chapter-url=https://books.google.com/books?id=mQBEAAAAQBAJ&pg=PA114 |date= ...11 KB (1,530 words) - 08:43, 27 January 2025
- ...d system|runoffs]] or [[Primary election|primaries]], and [[Instant-runoff voting|RCV]] (center-left column) is clearly visible.]] ...tion rules, among them [[Two-round system|two-round]] and [[Instant-runoff voting|instant runoff]].<ref name="Merril 198522422232">{{Cite journal |last=Merri ...40 KB (5,441 words) - 15:47, 28 February 2025
- {{Short description|Point-based ranked voting system}} ...ch candidate a number of points equal to the number of candidates [[Ranked voting|ranked]] below them: the lowest-ranked candidate gets 0 points, the second- ...43 KB (6,248 words) - 20:54, 24 January 2025
- ...[[George Blakley]]'s geometric secret sharing scheme, which uses geometric methods to recover the secret {{math|''S''}}. [[Threshold cryptosystem|Threshold]] ...ring Based on the Chinese Remainder Theorem with Applications in E-Voting. Electronic Notes in Theoretical Computer Science (ENTCS). Volume 186, (July 2007). P ...12 KB (1,923 words) - 17:25, 23 November 2023
- ...hod, they show that in practice it often works better than other insertion methods with better provable approximation ratios.{{r|rosste}} ...uclidean plane]], rather than from a finite set of candidate points, these methods will not work directly, because there would be an infinite number of distan ...28 KB (3,716 words) - 07:53, 11 March 2024
- ...rcuit rebreathers are yet more mechanically complex, and generally rely on electronic instruments and control systems to monitor and maintain a safe breathing ga [[File:Deepursuit.jpg|frame|Narked at 90 Ltd – deep pursuit advanced electronic rebreather controller]] ...175 KB (26,717 words) - 05:57, 18 February 2025
- ...https://ieeexplore.ieee.org/document/5219146 |journal=IEEE Transactions on Electronic Computers |volume=EC-10 |issue=1 |pages=6–16 |doi=10.1109/TEC.1961.5219146 ..."impossible" problems for perceptrons had already been solved using other methods.<ref name=":1" /> ...37 KB (5,465 words) - 20:39, 10 October 2024
- ...ched with the second best CEO and so forth. While there have been numerous methods for formulating executive compensation, some complex and some very basic, t ...| title=Stock Buybacks as an Executive Compensation Problem | journal=SSRN Electronic Journal | publisher=Elsevier BV | year=2020 | issn=1556-5068 | doi=10.2139/ ...47 KB (6,772 words) - 17:07, 20 January 2025
- ...ace|interfaces}} in some computer languages.<ref>{{cite web|title=Abstract Methods and Classes|url=http://docs.oracle.com/javase/tutorial/java/IandI/abstract. {{defn|A [[character encoding]] standard for electronic communications. ASCII codes represent text in computers, [[telecommunicatio ...214 KB (29,880 words) - 09:50, 28 January 2025
- {{defn|When voters have three or more distinct options, no [[ranked voting]] [[electoral system]] can convert the ranked preferences of individuals in ...{{gli|applied economics}} which uses [[economic theory]] and quantitative methods to analyze [[Business|business enterprises]] and the factors contributing t ...230 KB (32,456 words) - 19:30, 4 February 2025
- ...beyond one's current range of experience. Potential points of failure and methods for managing the risk may require research beyond existing personal knowled The [[Hierarchy of hazard controls|classic methods of hazard control]] are applied when reasonably practicable: ...158 KB (23,408 words) - 19:41, 23 February 2025
- ...al principles governing [[ordinary care]] and the [[duty of care]] for all methods of conveyance, and is frequently used to determine if a driver is in proper ...e cannot declare such conduct to be negligence as a matter of law.}}</ref> Electronic access to precise EDR data and rulings with new ideological modeling tools, ...224 KB (33,127 words) - 16:16, 15 January 2025