Last edited by Akilabar
Thursday, April 30, 2020 | History

2 edition of Threats, counter-threats and strategic manipulation for non-binary group decision rules. found in the catalog.

Threats, counter-threats and strategic manipulation for non-binary group decision rules.

Taradas Bandyopadhyay

Threats, counter-threats and strategic manipulation for non-binary group decision rules.

  • 5 Want to read
  • 12 Currently reading

Published by University of Hull. Department of Economics and Commerce in Hull .
Written in English


Edition Notes

SeriesHull economic papers / University of Hull. Department of Economics and Commerce -- No.80, Hull economic papers -- No.80.
ID Numbers
Open LibraryOL13774730M


Share this book
You might also like
Representative descendants of the Scotch-Irish brothers, Moses and Hugh White, c. 1700-2000

Representative descendants of the Scotch-Irish brothers, Moses and Hugh White, c. 1700-2000

Ethiopian journeys

Ethiopian journeys

Report of a special committee of bill Q.

Report of a special committee of bill Q.

Termination of waiver authority

Termination of waiver authority

Film music

Film music

Ahns method of learning the German language

Ahns method of learning the German language

Three plays

Three plays

Waymarks in church history.

Waymarks in church history.

Comparison of the submerged tube technique with conventional tunnelling methods.

Comparison of the submerged tube technique with conventional tunnelling methods.

Test bank for Klein, Peterson and Simington teaching reading in the elementary grades

Test bank for Klein, Peterson and Simington teaching reading in the elementary grades

Third annual report

Third annual report

history of Canada in stamps

history of Canada in stamps

International commodity arrangements and policies

International commodity arrangements and policies

Bernhard Reuter.

Bernhard Reuter.

Threats, counter-threats and strategic manipulation for non-binary group decision rules. by Taradas Bandyopadhyay Download PDF EPUB FB2

Mathematical Social Sciences 2 () North-Holland Publishing Company THREATS COUNTER-THREATS AND STRATEGIC MANIPULATION FOR NON-BINARY GROUP DECISION RULES Taradas BANDY~OPADHYAY Department of Economics, University oj' Hull, Hull HU6 7RX, England Communicated by 1F.W.

Roush Received 9 February Revised 23 March We prove that a class of unanimity rules Cited by: 7. Corrections. All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:matsoc:vyipSee general information about how to correct material in RePEc.

For technical questions regarding this item, or to correct its Cited by: 7. “Threats, Counter-Threats and Strategic Manipulation for Non-Binary Group Decision Rules”, Mathematical Social Sciences, 2, – CrossRef Google Scholar Bandyopadhyay, T.

Cited by: 1. Bandyopadhyay, T.: Threats, counter-threats and strategic manipulation for non-binary group decision rules. Math. Soc. Sci. 2, – () CrossRef Google ScholarAuthor: Hayrullah Dindar, Gilbert Laffond, Jean Lainé, Jean Lainé.

Prasanta Kumar Pattanaik (born 5 April ), is emeritus professor at the Department of Economics at the University of is a Fellow of the Econometric Society. Along with Amartya Sen and Kenneth Arrow, Pattanaik is an advisory Alma mater: University of Delhi.

Request PDF | Vote Swapping in Representative Democracy | We investigate group manipulation by vote exchange in twotiers elections, where voters are. We prove that a class of unanimity rules (the k-Pareto rule, 1≤ k ≤ N) is the only class of group decision functions which is non-manipulable even after the possibility of counter-threats is Author: Felix Brandt.

"Threats, counter-threats and strategic manipulation for non-binary group decision rules," Mathematical Social Sciences, Elsevier, vol. 2(2), pages. Book series.

Pattanaik is one of the series editors for the Springer series Studies in Choice and Welfare, which included being co-editor of Rational choice and social welfare theory and applications: essays in honor of Kotaro Suzumura. Books. Pattanaik, Prasanta K. Prasanta Kumar Pattanaik (born 5 April ), is emeritus professor at the Department of Economics at the University of California, a research associate for the Oxford Poverty & Human Development Initiative (OPHI), and a fellow of the Human Development and Capability Association.

Prasanta Pattanaik. Prasanta Kumar Pattanaik (born 4 May ), is emeritus professor at the Department of Economics at the University of California, a research associate for the Oxford Poverty & Human Development Initiative (OPHI), and a fellow of.

This chapter discusses the social choice theory. There is social choice problems, which deals with methods of marshalling information, particularly those relating to the people involved, to arrive at correct social judgments or acceptable group by: Issuu is a digital publishing platform that makes it simple to publish magazines, catalogs, newspapers, books, and more online.

Easily share your. This banner text can have markup. web; books; video; audio; software; images; Toggle navigation.

Insider Threats in Cyber Security Advances in Information Security Sushil Jajodia Consulting Editor Center for Secure Information Systems George Mason University Fairfax, VA email: [email protected] The goals of the Springer International Series on ADVANCES IN INFORMATION SECURITY are, one, to establish the state of the art of, and set the course for.

Prasanta Kumar Pattanaik (born 4 May ), is emeritus professor at the Department of Economics at the University of California, a research associate for the Oxford Poverty & Human Development Initiative (OPHI), and a fellow of the Human Development and.

Organization of the book The book you are about to read has been structured in three main parts: The first part “A brief introduction to privacy and security” comprises Chapter 2 and 3. The aim of this first part is to introduce the main problems related .