Declared-strategy voting: an instrument for group decision-making
暂无分享,去创建一个
[1] E. Rowland. Theory of Games and Economic Behavior , 1946, Nature.
[2] L. A. Goodman,et al. Social Choice and Individual Values , 1951 .
[3] Voting in Democracies: A Study of Majority and Proportional Electoral Systems , 1955 .
[4] William Vickrey,et al. Utility, Strategy, and Social Decision Rules , 1960 .
[5] G. Thompson,et al. The Theory of Committees and Elections. , 1959 .
[6] Michael Dummett,et al. Stability in Voting , 1961 .
[7] R. Buckminster Fuller. No More Secondhand God: And Other Writings , 1963 .
[8] W. Riker,et al. A Theory of the Calculus of Voting , 1968, American Political Science Review.
[9] A. Gibbard. Manipulation of Voting Schemes: A General Result , 1973 .
[10] P. Fishburn. The Theory Of Social Choice , 1973 .
[11] Enid Lakeman. How democracies vote: A study of electoral systems , 1974 .
[12] M. Satterthwaite. Strategy-proofness and Arrow's conditions: Existence and correspondence theorems for voting procedures and social welfare functions , 1975 .
[13] Televote; A New Civic Communication System. , 1975 .
[14] P. Gärdenfors. Manipulation of social choice functions , 1976 .
[15] James S. Dyer,et al. An Actual Application of Collective Choice Theory to the Selection of Trajectories for the Mariner Jupiter/Saturn 1977 Project , 1976, Oper. Res..
[16] Gordon Tullock,et al. A New and Superior Process for Making Social Choices , 1976, Journal of Political Economy.
[17] Salvador Barberà,et al. THE MANIPULATION OF SOCIAL CHOICE MECHANISMS THAT DO NOT LEAVE "TOO MUCH" TO CHANCE' , 1977 .
[18] Practical problems and practical solutions , 1977 .
[19] Gideon Doron,et al. Single Transferrable Vote: An Example of a Perverse Social Choice Function , 1977 .
[20] Jerome H. Black,et al. The Multicandidate Calculus of Voting: Application to Canadian Federal Elections , 1978 .
[21] Bruce E. Cain,et al. Strategic voting in Britain , 1978 .
[22] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[23] Cornelius O'Leary,et al. Irish Elections, 1918-77: Parties, Voters, and Proportional Representation , 1979 .
[24] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[25] S. Merrill,et al. Strategic Voting in Multicandidate Elections under Uncertainty and under Risk , 1981 .
[26] Steven J. Brams,et al. Strategic information and voting behavior , 1982 .
[27] Dale T. Hoffman,et al. A MODEL FOR STRATEGIC VOTING , 1982 .
[28] H. Nurmi. Voting Procedures: A Summary Analysis , 1983, British Journal of Political Science.
[29] Michael Merritt,et al. Protocols for Data Security , 1983, Computer.
[30] Peter C. Fishburn,et al. Some Logical Defects of the Single Transferable Vote , 1984 .
[31] Jack H. Nagel. A Debut for Approval Voting , 1984 .
[32] B. Grofman,et al. Choosing an Electoral System: Issues and Alternatives , 1984 .
[33] Michael J. Fischer,et al. A robust and verifiable cryptographically secure election scheme , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[34] David Chaum,et al. Security without identification: transaction systems to make big brother obsolete , 1985, CACM.
[35] John R. Chamberlin. An investigation into the relative manipulability of four voting systems , 1985 .
[36] M. Gallagher. The political consequences of the electoral system in the Republic of Ireland , 1986 .
[37] Josh D. Cohen,et al. Improving Privacy in Cryptographic Elections , 1986 .
[38] Josh Benaloh. Verifiable secret-ballot elections , 1987 .
[39] Roy G. Saltman. Accuracy, integrity and security in computerized vote-tallying , 1988, CACM.
[40] David Chaum,et al. Elections with Unconditionally-Secret Ballots and Disruption Equivalent to Breaking RSA , 1988, EUROCRYPT.
[41] Peter C. Fishburn,et al. Does Approval Voting Elect the Lowest Common Denominator , 1988 .
[42] D. Mueller. Public choice II , 1989 .
[43] M. Trick,et al. Voting schemes for which it can be difficult to tell who won the election , 1989 .
[44] M. Trick,et al. The computational difficulty of manipulating an election , 1989 .
[45] Cincinnati's 1988 proportional representation initiative , 1990 .
[46] Lila Kari,et al. Secret ballot elections in computer networks , 1991, Computers & security.
[47] Arto Salomaa,et al. Verifying and Recasting Secret Ballots in Computer Networks , 1991, New Results and New Trends in Computer Science.
[48] C. Slaton. Televote: Expanding Citizen Participation in the Quantum Age , 1991 .
[49] Steven J. Brams,et al. Approval voting in practice , 1991 .
[50] John J. Bartholdi,et al. Single transferable vote resists strategic voting , 2015 .
[51] Eric S. Raymond,et al. The New Hacker's Dictionary , 1991 .
[52] Arto Salomaa,et al. A cryptographic approach to the secret ballot , 1991 .
[53] Duff Spafford,et al. The international almanac of electoral history , 1992 .
[54] Atsushi Fujioka,et al. A Practical Secret Voting Scheme for Large Scale Elections , 1992, AUSCRYPT.
[55] R. Weber,et al. A Theory of Voting Equilibria , 1993, American Political Science Review.
[56] Areno Lijphart,et al. A Study of Twenty-Seven Democracies 1945-1990 , 1995 .
[57] S. Brams,et al. Would Ross Perot Have Won the 1992 Presidential Election Under Approval Voting? , 1994, PS: Political Science & Politics.
[58] Josh Benaloh,et al. Receipt-Free Secret-Ballot Elections , 1994, STOC 1994.
[59] J. Knight,et al. Aggregation and Deliberation: On the Possibility of Democratic Legitimacy , 1994 .
[60] Kazue Sako. Electronic Voting Scheme Allowing Open Objection to the Tally , 1994 .
[61] Kazue Sako,et al. Secure Voting Using Partially Compatible Homomorphisms , 1994, CRYPTO.
[62] G. Cox. Strategic Voting Equilibria under the Single Nontransferable Vote , 1994, American Political Science Review.
[63] Lorrie Faith Cranor,et al. Design and Implementation of a Practical Security-Conscious Electronic Polling System , 1996 .
[64] R. McAfee,et al. Analyzing the Airwaves Auction , 1996 .
[65] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[66] John B. Anderson,et al. Proportional representation and election reform in Ohio , 1997 .
[67] P. Fishburn,et al. Voting Procedures , 2022 .