969 resultados para Sophisticated voting
Resumo:
In this paper, we describe a voting mechanism for accurate named entity (NE) translation in English–Chinese question answering (QA). This mechanism involves translations from three different sources: machine translation,online encyclopaedia, and web documents. The translation with the highest number of votes is selected. We evaluated this approach using test collection, topics and assessment results from the NTCIR-8 evaluation forum. This mechanism achieved 95% accuracy in NEs translation and 0.3756 MAP in English–Chinese cross-lingual information retrieval of QA.
Resumo:
The US Securities and Exchange Comission requires registered management investment companies to disclose how they vote proxies relating to portfolio securities they hold. The primary purpose of this rule is to enable fund investors to monitor the role of institutional shareholders in the corporate governance practices of public companies. In Australia, despite reform proposals, there are no regulations requiring institutional investors to report proxy voting procedures and practises. There is little evidence of voluntary disclosure of proxy voting by Australian managed investment schemes in equities, indicating that there are costs involved in such disclosure.
Resumo:
We describe and analyze opinion polling results from interactive voting procedures undertaken before and after presentations during the Outcome Measures in Rheumatoid Arthritis Clinical Trials Conference (OMERACT II) in Ottawa, Canada, June 30-July 2, 1994. The scoring procedure was a matched voting design; when a participant used the same keypad at the beginning and end of voting, change within a participant could be estimated. Participants, experienced in the rheumatic diseases included clinicians, researchers, methodologists, regulators, and representatives of the pharmaceutical industry. Patients under consideration were those with any rheumatic diseases. Questions were constructed to evaluate the change in voting behavior expected from the content of the presentation. Statistically significant and substantively important changes were evident in most questions.
Resumo:
Availability has become a primary goal of information security and is as significant as other goals, in particular, confidentiality and integrity. Maintaining availability of essential services on the public Internet is an increasingly difficult task in the presence of sophisticated attackers. Attackers may abuse limited computational resources of a service provider and thus managing computational costs is a key strategy for achieving the goal of availability. In this thesis we focus on cryptographic approaches for managing computational costs, in particular computational effort. We focus on two cryptographic techniques: computational puzzles in cryptographic protocols and secure outsourcing of cryptographic computations. This thesis contributes to the area of cryptographic protocols in the following ways. First we propose the most efficient puzzle scheme based on modular exponentiations which, unlike previous schemes of the same type, involves only a few modular multiplications for solution verification; our scheme is provably secure. We then introduce a new efficient gradual authentication protocol by integrating a puzzle into a specific signature scheme. Our software implementation results for the new authentication protocol show that our approach is more efficient and effective than the traditional RSA signature-based one and improves the DoSresilience of Secure Socket Layer (SSL) protocol, the most widely used security protocol on the Internet. Our next contributions are related to capturing a specific property that enables secure outsourcing of cryptographic tasks in partial-decryption. We formally define the property of (non-trivial) public verifiability for general encryption schemes, key encapsulation mechanisms (KEMs), and hybrid encryption schemes, encompassing public-key, identity-based, and tag-based encryption avors. We show that some generic transformations and concrete constructions enjoy this property and then present a new public-key encryption (PKE) scheme having this property and proof of security under the standard assumptions. Finally, we combine puzzles with PKE schemes for enabling delayed decryption in applications such as e-auctions and e-voting. For this we first introduce the notion of effort-release PKE (ER-PKE), encompassing the well-known timedrelease encryption and encapsulated key escrow techniques. We then present a security model for ER-PKE and a generic construction of ER-PKE complying with our security notion.
Resumo:
We exploit a voting reform in France to estimate the causal effect of exit poll information on turnout and bandwagon voting. Before the change in legislation, individuals in some French overseas territories voted after the election result had already been made public via exit poll information from mainland France. We estimate that knowing the exit poll information decreases voter turnout by about 12 percentage points. Our study is the first clean empirical design outside of the laboratory to demonstrate the effect of such knowledge on voter turnout. Furthermore, we find that exit poll information significantly increases bandwagon voting; that is, voters who choose to turn out are more likely to vote for the expected winner.
Resumo:
Using a quasi-natural voting experiment encompassing a 160-year period (1848–2009) in Switzerland, we investigate whether a higher level of complexity leads to increased reliance on trusted parliamentary representatives. We find that when more referenda are held on the same day, constituents are more likely to refer to parliamentary recommendations when making their decisions. This finding holds true even when we narrow our focus to referenda with a relatively lower voter turnout on days on which more than one referendum is held. We also demonstrate that when constituents face a higher level of complexity, they follow the parliamentary recommendations rather than those of interest groups. "Viewed as a geometric figure, the ant’s path is irregular, complex, hard to describe. But its complexity is really a complexity in the surface of the beach, not a complexity in the ant." ([1] p. 51)
Resumo:
This thesis presents four essays in the political economy of elections and reforms. The first study exploits discontinuities around school entry cut-off dates to show that early childhood conditions can impact the probability to become a top-flight politician. The second study provides empirical estimates of the effect of sequential voting on turnout and bandwagon voting outside the laboratory. The third work describes a novel nonparametric strategy to identify tactical voting patterns directly from balloting results using British election data. Finally, a study is put forward that examines the political feasibility of reforms.
Resumo:
Twitter is a very popular social network website that allows users to publish short posts called tweets. Users in Twitter can follow other users, called followees. A user can see the posts of his followees on his Twitter profile home page. An information overload problem arose, with the increase of the number of followees, related to the number of tweets available in the user page. Twitter, similar to other social network websites, attempts to elevate the tweets the user is expected to be interested in to increase overall user engagement. However, Twitter still uses the chronological order to rank the tweets. The tweets ranking problem was addressed in many current researches. A sub-problem of this problem is to rank the tweets for a single followee. In this paper we represent the tweets using several features and then we propose to use a weighted version of the famous voting system Borda-Count (BC) to combine several ranked lists into one. A gradient descent method and collaborative filtering method are employed to learn the optimal weights. We also employ the Baldwin voting system for blending features (or predictors). Finally we use the greedy feature selection algorithm to select the best combination of features to ensure the best results.
Resumo:
Transfer schemes are an alternative means of acquiring control of a company to making a takeover bid under the provisions in Ch 6 of the Corporations Act 2001 (Cth). The recent decision Re Kumarina Resources Ltd [2013] FCA 549 overturned long-standing practice in relation to a certain type of transfer scheme. If followed, the decision would allow a “bidder” to vote at scheme meetings where the scheme consideration for the acquisition of the target shares are shares in another company, and the scheme results in a merger. But the bidder is not allowed to vote where the scheme consideration is cash. The article points out the difficulties arising from this decision and argues that it should not be followed. In providing a “no objection” statement, the Australian Securities and Investments Commission (ASIC) has created uncertainty as to the approach it will take towards the bidders being allowed to vote at scheme meetings where the scheme consideration for the acquisition of target shares are shares in another company. The article also points out that in providing the no objection statement in Kumarina, ASIC appears to have ignored breaches of s 606(1) of the Corporations Act. There is a pressing need for ASIC to clarify its position and, in particular, whether or not it will provide a no objection statement in respect of future transfer schemes where a bidder (or its parent company) votes at the scheme meeting.
Resumo:
In this chapter we describe a critical fairytales unit taught to 4.5 to 5.5 year olds in a context of intensifying pressure to raise literacy achievement. The unit was infused with lessons on reinterpreted fairytales followed by process drama activities built around a sophisticated picture book, Beware of the Bears (MacDonald, 2004). The latter entailed a text analytic approach to critical literacy derived from systemic functional linguistics (Halliday, 1978; Halliday & Matthiessen, 2004). This approach provides a way of analysing how words and discourse are used to represent the world in a particular way and shape reader relations with the author in a particular field (Janks, 2010).
Resumo:
We exploit a voting reform in France to estimate the causal effect of exit poll information on turnout and bandwagon voting. Before the change in legislation, individuals in some French overseas territories voted after the election result had already been made public via exit poll information from mainland France. We estimate that knowing the exit poll information decreases voter turnout by about 11 percentage points. Our study is the first clean empirical design outside of the laboratory to demonstrate the effect of such knowledge on voter turnout. Furthermore, we find that exit poll information significantly increases bandwagon voting; that is, voters who choose to turn out are more likely to vote for the expected winner.
Resumo:
Although tactical voting attracts a great deal of attention, it is very hard to measure as it requires knowledge of both individuals’ voting choices as well as their unobserved preferences. In this article, we present a simple empirical strategy to nonparametrically identify tactical voting patterns directly from balloting results. This approach allows us to study the magnitude and direction of strategic voting as well as to verify which information voters and parties take into account to determine marginal constituencies. We show that tactical voting played a significant role in the 2010 election, mainly for Liberal–Democratic voters supporting Labour. Moreover, our results suggest that voters seem to form their expectations based on a national swing in vote shares rather than newspaper guides published in the main media outlets or previous election outcomes. We also present some evidence that suggests that campaign spending is not driving tactical voting.
Resumo:
We present a clustering-only approach to the problem of speaker diarization to eliminate the need for the commonly employed and computationally expensive Viterbi segmentation and realignment stage. We use multiple linear segmentations of a recording and carry out complete-linkage clustering within each segmentation scenario to obtain a set of clustering decisions for each case. We then collect all clustering decisions, across all cases, to compute a pairwise vote between the segments and conduct complete-linkage clustering to cluster them at a resolution equal to the minimum segment length used in the linear segmentations. We use our proposed cluster-voting approach to carry out speaker diarization and linking across the SAIVT-BNEWS corpus of Australian broadcast news data. We compare our technique to an equivalent baseline system with Viterbi realignment and show that our approach can outperform the baseline technique with respect to the diarization error rate (DER) and attribution error rate (AER).
Resumo:
This chapter examines patterns in social media activity around Australian elections, focusing primarily on the 2013 federal election and supplemented by extended research into social media and Australian politics between 2007 and 2015. The coverage of Australian elections on social media is analysed from three perspectives: the evolution of the use of online platforms during elections; politician and party social media strategies during the 2013 election, focusing on Twitter; and citizen engagement with elections as demonstrated through election day tweeting practices. The specific context of Australian politics, where voting is compulsory, and the popularity of social media platforms like Twitter makes this case notably different from other Western democracies. It also demonstrates the extended mediation of politics through social media, for politicians and citizens alike.
Resumo:
This paper examines the 2013 Australian federal election to test two competing models of vote choice: spatial politics and valence issues. Using data from the 2013 Australian Election Study, the analysis finds that spatial politics (measured by party identification and self-placement on the left-right spectrum) and valence issues both have significant effects on vote choice. However, spatial measures are more important than valence issues in explaining vote choice, in contrast with recent studies from Britain, Canada and the United States. Explanations for these differences are speculative, but may relate to Australia’s stable party and electoral system, including compulsory voting and the frequency of elections. The consequently high information burden faced by Australian voters may lead to a greater reliance on spatial heuristics than is found elsewhere.