Couldn't you replace the CCD with an adapter, connect the adapter to the video out of a computer, and then use the camera to "take a picture" of your already edited picture?
It seems to me that any "paper trail" scheme of the sort you describe would have to solve the problems of DRM to work: making the elements that report on the real world (in this case, the CCD) tamper-proof, making the encryption key impossible to extract, designing robust watermarks to avoid analog holes, etc.
The axioms just state what criteria the Swiss system (but not the Icelandic) obeys. You don't need to know them in order to vote in Iceland any more than you need to know that first past the post fails the Condorcet criterion in order to vote in the US.
You might need some kind of MMP part if you want it to be truly proportional. If the voters can only rank about ten candidates before it gets unwieldy, that would give an effective 9% absolute threshold. A party that gains 8% support everywhere would get no candidates elected.
Yes, STV is non perfect but IMHO it’s worth it to not have party lists.
Also one of the main criticism of people opposed to proportional system is the lack of direct representation. STV solves that and even is superior to FPTP in that way because you are more likely to find a MP who is more sympathetic towards your cause/views if there are e.g. 3-5 members in your district.
Of course I’m not talking about the system proposed in the paper your linked, but rather about how MMP works in Germany. You get both part list and FPTP style party appointed candidates.
Yeah but helicopters fly. The problem with cyc is that it never really got off the ground.
Symbolic AI wasn't a failure but it never really worked for any problem space without rigid rules you could define and that's with some of the greatest minds trying for decades to make it happen.
At this point real-world intelligent symbolic AI only exists in fiction and our collective imaginations. Technically, no one has proven it can't work, but at some point you have to face the reality.
A scam might, for instance, say "If you don't go to phishingpage.xyz RIGHT NOW your account will be DELETED!" to capitalize on urgency. That appeal to urgency can be detected. The scammers could of course just choose not to appeal to urgency, but then that would reduce the number of people who'd fall for their scam.
On the other hand, proofs sometimes give you more than you'd expect. A proof that the implementation of a function always returns some value automatically proves that there's no arbitrary code execution, for instance.
A lot of the points also seem to apply to algorithms or mathematical programming, just because the libraries do what you expect and mathematics isn't messy the way web framework du jour is. At least until you get to tweaks that seem to work but there are no good proven bounds for their performance.
I didn’t realize how many small changes were added to the BluRay version. The worst part for me is the re-colorization into cooler tones to make it look more modern. 4K77 version looks more goofy - just like I remember it from my childhood!
It seems to me that any "paper trail" scheme of the sort you describe would have to solve the problems of DRM to work: making the elements that report on the real world (in this case, the CCD) tamper-proof, making the encryption key impossible to extract, designing robust watermarks to avoid analog holes, etc.
reply