IEEE Intell. Informatics Bull.最新文献

筛选
英文 中文
Strategic Voting 战略投
IEEE Intell. Informatics Bull. Pub Date : 2018-06-11 DOI: 10.2200/S00849ED1V01Y201804AIM038
R. Meir
{"title":"Strategic Voting","authors":"R. Meir","doi":"10.2200/S00849ED1V01Y201804AIM038","DOIUrl":"https://doi.org/10.2200/S00849ED1V01Y201804AIM038","url":null,"abstract":"In a typical voting scenario, a group of voters with diverse preferences need to collectively choose one out of several alternatives. Examples include a committee that selects a candidate for a faculty position or an award, countries in an international forum voting on the adoption of a new environmental treaty, or even automated agents that vote on the preferred meeting time on behalf of their users. As the satisfaction of each voter is determined by the selected alternative, which is in turn affected by the actions (namely, the ballots) of others, casting a vote is in fact playing a strategic game. The study of strategic voting is an effort to utilize game theory, which merits to model and predict rational behavior in a wide range of economic and social interactions, to explain and even direct the strategic decisions of voters. This review paper is a hyper-condensed version of a book on strategic voting that is forthcoming this year. 1 The main purpose of the book is to overview the main approaches to strategic voting, in a way that makes these approaches comparable across fields and disciplines. In this paper I will mention the main directions and lines of work, but almost without going into the technical details. Our starting point will be the seminal Gibbard-Satterthwaite theorem, which states that under a set of natural requirements, one cannot hope to construct a voting rule that is immune to strategic manipulations by the voters. This mean that there will always be situations where some voters have an incentive to misreport their true preferences. From this strong negative result emerged two lines of research. One continues to shape the boundaries and limitations of truthful voting mechanisms, by relaxing some of the assumptions that lead to the G-S impossibility result. The other line forgoes the attempt to elicit truthful votes, and instead applies game theory and equilibrium analysis to understand how strategic voters would vote in existing mechanisms.","PeriodicalId":209034,"journal":{"name":"IEEE Intell. Informatics Bull.","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134100332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 57
Book Review: Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data 书评:《网络数据挖掘:探索超链接、内容和使用数据》
IEEE Intell. Informatics Bull. Pub Date : 1900-01-01 DOI: 10.5860/choice.49-2718
Russell S. Johnson
{"title":"Book Review: Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data","authors":"Russell S. Johnson","doi":"10.5860/choice.49-2718","DOIUrl":"https://doi.org/10.5860/choice.49-2718","url":null,"abstract":"Not so long ago only a small proportion of the information generated by organizations – that stored in structured data sources like databases and spreadsheets – was accessible for systematic computer-based search, classification and analysis. The techniques and algorithms of data mining were developed to extract useful patterns and knowledge from these structured sources. Today, the explosive growth of the World-Wide-Web, and a parallel development of private intranets, means that a much greater amount of information is potentially available for search and analysis, in a wider variety of formats and encompassing structured, semi-structured and unstructured data, from organized tables to multi-media clips. The established techniques of data mining have proved insufficient for this task.","PeriodicalId":209034,"journal":{"name":"IEEE Intell. Informatics Bull.","volume":"33 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131810009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信