• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

Strategy-Proofness and Arrow’s Conditions: Existence and Correspondence Theorems for Voting Procedures and Social Welfare Functions.” Journal of Economic Theory 10(2):187–217 (1975)

by Mark A Satterthwaite
Add To MetaCart

Tools

Sorted by:
Results 11 - 20 of 553
Next 10 →

Nonexistence of voting rules that are usually hard to manipulate

by Vincent Conitzer, Tuomas Sandholm - IN AAAI , 2006
"... Aggregating the preferences of self-interested agents is a key problem for multiagent systems, and one general method for doing so is to vote over the alternatives (candidates). Unfor-tunately, the Gibbard-Satterthwaite theorem shows that when there are three or more candidates, all reasonable votin ..."
Abstract - Cited by 88 (8 self) - Add to MetaCart
Aggregating the preferences of self-interested agents is a key problem for multiagent systems, and one general method for doing so is to vote over the alternatives (candidates). Unfor-tunately, the Gibbard-Satterthwaite theorem shows that when there are three or more candidates, all reasonable voting rules are manipulable (in the sense that there exist situations in which a voter would benefit from reporting its preferences insincerely). To circumvent this impossibility result, recent research has investigated whether it is possible to make find-ing a beneficial manipulation computationally hard. This ap-proach has had some limited success, exhibiting rules under which the problem of finding a beneficial manipulation is NP-hard, #P-hard, or even PSPACE-hard. Thus, under these rules, it is unlikely that a computationally efficient algorithm can be constructed that always finds a beneficial manipulation (when it exists). However, this still does not preclude the ex-istence of an efficient algorithm that often finds a successful manipulation (when it exists). There have been attempts to design a rule under which finding a beneficial manipulation is usually hard, but they have failed. To explain this failure, in this paper, we show that it is in fact impossible to design such a rule, if the rule is also required to satisfy another prop-erty: a large fraction of the manipulable instances are both weakly monotone, and allow the manipulators to make either of exactly two candidates win. We argue why one should expect voting rules to have this property, and show experi-mentally that common voting rules clearly satisfy it. We also discuss approaches for potentially circumventing this impos-sibility result.

Complexity of Manipulating Elections with Few Candidates

by Vincent Conitzer , Tuomas Sandholm , 2002
"... ..."
Abstract - Cited by 78 (11 self) - Add to MetaCart
Abstract not found

The theory of implementation in Nash equilibrium: A survey. In: Hurwicz,

by Eric Maskin , 1985
"... The theory of implementation concerns the problem of designing game forms (sometimes called "mechanisms" or "outcome functions") the equilibria of which have properties that are desirable according to a specified criterion of social welfare called a social choice rule . A game f ..."
Abstract - Cited by 75 (4 self) - Add to MetaCart
The theory of implementation concerns the problem of designing game forms (sometimes called "mechanisms" or "outcome functions") the equilibria of which have properties that are desirable according to a specified criterion of social welfare called a social choice rule . A game form, in effect, decentralizes decision-making. The social alternative is selected by the joint actions of all individuals in society rather than by a central planner. Formally, a social choice rule assigns a set of alternatives to each profile of preferences (or other characteristics) that individuals in society might have; the set consists of the "welfare optima" relative to the preference profile. A game form is a rule that specifies an alternative (or outcome ) for each configuration of actions that individuals take. A game form implements (technically, fully implements) a social choice rule if, for each possible profile of preferences, the equilibrium outcomes of the game form coincide with the welfare optima of the social choice rule. Of course, the equilibrium set depends on the particular solution concept being used. Implementation theory has considered a variety of solution concepts, including equilibrium in dominant strategies, Bayesian equilibrium, and Hash equilibrium. Other chapters of this volume treat the first two equilibrium concepts. In the .main, this article is confined to implementation in Nash equilibrium, although it relates this theory to those of other solution concepts, dominant strategies in particular. Nash equilibrium is the noncooperative solution concept par excellence , and so it is not surprising that implementation theory should have employed it extensively. Nonetheless, one reason often advanced for the desirability
(Show Context)

Citation Context

...SCR , he"wriirget no extra mileage from using the ostensibly weaker concept of Nash implementation if the domain of utility functions is monotonically closed. In particular, we have the following negative result. Corollary 1 (Dasgupta, Hammond, and Maskin (1979), Roberts (1979): Suppose that A contains at least three elements and that f : U -^ A is an n-person SSCR that is onto A. If f is implementable in Nash equilibrium, it is dictatorial. Proof : Because U is monotonically closed, Theorem 6 implies that f is truthfully implementable in dominant strategies. But then, from the Gibbard (1973)/Satterthwaite (1975) theorem on dominant strategies, f is dictatorial . Q.E.L. Roberts (1979) extends Corollary 1 to the case of "conjectural" equilibria, where, rather than taking other players' strategies as given, an individual conjectures that others will respond to his strategy choice. This result is, in turn, closely related to one of Pattanaik (1976). Another implications we can draw "from Theorem 6 is a set of conditions under which an implementable f can be thought of as maximizing a social aggregation function. Social Aggregation Function : Let B. be the class of all complete, reflexive, binary relation...

Elections Can be Manipulated Often

by Ehud Friedgut, Gil Kalai, Noam Nisan
"... The Gibbard-Satterthwaite theorem states that every non-trivial voting method between at least 3 alternatives can be strategically manipulated. We prove a quantitative version of the Gibbard-Satterthwaite theorem: a random manipulation by a single random voter will succeed with non-negligible probab ..."
Abstract - Cited by 66 (1 self) - Add to MetaCart
The Gibbard-Satterthwaite theorem states that every non-trivial voting method between at least 3 alternatives can be strategically manipulated. We prove a quantitative version of the Gibbard-Satterthwaite theorem: a random manipulation by a single random voter will succeed with non-negligible probability for every neutral voting method between 3 alternatives that is far from being a dictatorship.

Generalized scoring rules and the frequency of coalitional manipulability

by Lirong Xia - In Proceedings of the Ninth ACM Conference on Electronic Commerce (EC , 2008
"... We introduce a class of voting rules called generalized scoring rules. Under such a rule, each vote generates a vector of k scores, and the outcome of the voting rule is based only on the sum of these vectors—more specifically, only on the order (in terms of score) of the sum’s components. This clas ..."
Abstract - Cited by 66 (20 self) - Add to MetaCart
We introduce a class of voting rules called generalized scoring rules. Under such a rule, each vote generates a vector of k scores, and the outcome of the voting rule is based only on the sum of these vectors—more specifically, only on the order (in terms of score) of the sum’s components. This class is extremely general: we do not know of any commonly studied rule that is not a generalized scoring rule. We then study the coalitional manipulation problem for gener-alized scoring rules. We prove that under certain natural assump-), then tions, if the number of manipulators is O(n p) (for any p < 1 2 the probability that a random profile is manipulable is O(n p − 1 2), where n is the number of voters. We also prove that under another set of natural assumptions, if the number of manipulators is Ω(n p) (for any p> 1) and o(n), then the probability that a random pro-2 file is manipulable (to any possible winner under the voting rule) is 1 − O(e −Ω(n2p−1)). We also show that common voting rules satisfy these conditions (for the uniform distribution). These results generalize earlier results by Procaccia and Rosenschein as well as even earlier results on the probability of an election being tied.
(Show Context)

Citation Context

...at is, a voter can sometimes make herself better off by declaring her preferences insincerely. A rule that is not vulnerable to manipulation is called strategy-proof. The GibbardSatterthwaite theorem =-=[13, 18]-=- states that when there are three or more alternatives, there is no strategy-proof voting rule that satisfies non-imposition (for every alternative, there exist votes that would make that alternative ...

RANKING SETS OF OBJECTS

by Salvador Barberà, Walter Bossert, Prasanta K. Pattanaik , 2001
"... ..."
Abstract - Cited by 65 (6 self) - Add to MetaCart
Abstract not found

Determining possible and necessary winners under common voting rules given partial orders.

by Lirong Xia , Vincent Conitzer - In Proceedings of the National Conference on Artificial Intelligence (AAAI), , 2008
"... Abstract Usually a voting rule requires agents to give their preferences as linear orders. However, in some cases it is impractical for an agent to give a linear order over all the alternatives. It has been suggested to let agents submit partial orders instead. Then, given a voting rule, a profile ..."
Abstract - Cited by 63 (11 self) - Add to MetaCart
Abstract Usually a voting rule requires agents to give their preferences as linear orders. However, in some cases it is impractical for an agent to give a linear order over all the alternatives. It has been suggested to let agents submit partial orders instead. Then, given a voting rule, a profile of partial orders, and an alternative (candidate) c, two important questions arise: first, is it still possible for c to win, and second, is c guaranteed to win? These are the possible winner and necessary winner problems, respectively. Each of these two problems is further divided into two sub-problems: determining whether c is a unique winner (that is, c is the only winner), or determining whether c is a co-winner (that is, c is in the set of winners). We consider the setting where the number of alternatives is unbounded and the votes are unweighted. We completely characterize the complexity of possible/necessary winner problems for the following common voting rules: a class of positional scoring rules (including Borda), Copeland, maximin, Bucklin, ranked pairs, voting trees, and plurality with runoff.
(Show Context)

Citation Context

...ner. Preference elicitation has found many applications in multiagent systems, especially in combinatorial auctions (for overviews, see Parkes, 2006; Sandholm & Boutilier, 2006) and in voting settings as well (Conitzer & Sandholm, 2002, 2005b; Conitzer, 2009). The problem of deciding whether we can terminate preference elicitation and declare a winner is exactly the necessary winner problem. Manipulation is said to occur when an agent casts a vote that does not correspond to its true preferences, in order to obtain a result that it prefers. By the Gibbard–Satterthwaite Theorem (Gibbard, 1973; Satterthwaite, 1975), for any reasonable voting rule, there are situations where an agent can successfully manipulate the rule. To prevent manipulation, one approach that has been taken in the computational social choice community is to study whether manipulation is (or can be made) computationally hard (Bartholdi, Tovey, & Trick, 1989a; Bartholdi & Orlin, 1991; Hemaspaandra & Hemaspaandra, 2007; Elkind & Lipmaa, 2005; Conitzer, Sandholm, & Lang, 2007; Faliszewski, Hemaspaandra, & Schnoor, 2008; Zuckerman, Procaccia, & Rosenschein, 2009; Xia, Zuckerman, Procaccia, Conitzer, & Rosenschein, 2009; Faliszewski, Hemas...

Llull and Copeland voting computationally resist bribery and control

by Piotr Faliszewski, Edith Hemaspaandra, Lane A. Hemaspaandra, Jörg Rothe , 2009
"... Control and bribery are settings in which an external agent seeks to influence the outcome of an election. Constructive control of elections refers to attempts by an agent to, via such actions as addition/deletion/partition of candidates or voters, ensure that a given candidate wins. Destructive con ..."
Abstract - Cited by 63 (30 self) - Add to MetaCart
Control and bribery are settings in which an external agent seeks to influence the outcome of an election. Constructive control of elections refers to attempts by an agent to, via such actions as addition/deletion/partition of candidates or voters, ensure that a given candidate wins. Destructive control refers to attempts by an agent to, via the same actions, preclude a given candidate’s victory. An election system in which an agent can sometimes affect the result and it can be determined in polynomial time on which inputs the agent can succeed is said to be vulnerable to the given type of control. An election system in which an agent can sometimes affect the result, yet in which it is NP-hard to recognize the inputs on which the agent can succeed, is said to be resistant to the given type of control. Aside from election systems with an NP-hard winner problem, the only systems previously known to be resistant to all the standard control types were highly artificial election systems created by hybridization. This paper studies a parameterized version of Copeland voting, denoted by Copeland α, where the parameter α is a rational number between 0 and 1 that specifies how ties are valued in the pairwise comparisons of candidates. In every previously studied constructive or destructive

Dichotomy for voting systems

by Edith Hemaspaandra, Lane A. Hemaspaandra - Journal of Computer and System Sciences
"... Scoring protocols are a broad class of voting systems. Each is defined by a vector (α1, α2,..., αm), α1 ≥ α2 ≥ · · · ≥ αm, of integers such that each voter contributes α1 points to his/her first choice, α2 points to his/her second choice, and so on, and any candidate receiving the most points is ..."
Abstract - Cited by 62 (18 self) - Add to MetaCart
Scoring protocols are a broad class of voting systems. Each is defined by a vector (α1, α2,..., αm), α1 ≥ α2 ≥ · · · ≥ αm, of integers such that each voter contributes α1 points to his/her first choice, α2 points to his/her second choice, and so on, and any candidate receiving the most points is a winner. What is it about scoring-protocol election systems that makes some have the desirable property of being NP-complete to manipulate, while others can be manipulated in polynomial time? We find the complete, dichotomizing answer: Diversity of dislike. Every scoring-protocol election system having two or more point values assigned to candidates other than the favorite—i.e., having ||{αi |2 ≤ i ≤ m}| | ≥ 2—is NP-complete to manipulate. Every other scoring-protocol election system can be manipulated in polynomial time. In effect, we show that—other than trivial systems (where all candidates alway tie), plurality voting, and plurality voting’s transparently disguised translations—every scoring-protocol election system is NP-complete to manipulate. 1

Compilation complexity of common voting rules

by Lirong Xia, Vincent Conitzer , 2010
"... In computational social choice, one important problem is to take the votes of a subelectorate (subset of the voters), and summarize them using a small number of bits. This needs to be done in such a way that, if all that we know is the summary, as well as the votes of voters outside the subelectorat ..."
Abstract - Cited by 58 (13 self) - Add to MetaCart
In computational social choice, one important problem is to take the votes of a subelectorate (subset of the voters), and summarize them using a small number of bits. This needs to be done in such a way that, if all that we know is the summary, as well as the votes of voters outside the subelectorate, we can conclude which of the m alternatives wins. This corresponds to the notion of compilation complexity, the minimum number of bits required to summarize the votes for a particular rule, which was introduced by Chevaleyre et al. [IJCAI-09]. We study three different types of compilation complexity. The first, studied by Chevaleyre et al., depends on the size of the subelectorate but not on the size of the complement (the voters outside the subelectorate). The second depends on the size of the complement but not on the size of the subelectorate. The third depends on both. We first investigate the relations among the three types of compilation complexity. Then, we give upper and lower bounds on all three types of compilation complexity for the most prominent voting rules. We show that for l-approval (when l ≤ m/2), Borda, and Bucklin, the bounds for all three types are asymptotically tight, up to a multiplicative constant; for l-approval (when l> m/2), plurality with runoff, all Condorcet consistent rules that are based on unweighted majority graphs (including Copeland and voting trees), and all Condorcet consistent rules that are based on the order of pairwise elections (including ranked pairs and maximin), the bounds for all three types are asymptotically tight up to a multiplicative constant when the sizes of the subelectorate and its complement are both larger than m 1+ǫ for some ǫ> 0.
(Show Context)

Citation Context

...l voters declare their entire votes simultaneously. Of course, even the single-stage communication protocol is not strategy-proof4 for any reasonable voting rule, by the Gibbard-Satterthwaite theorem =-=[10, 19]-=-. However, this does not mean that we should not be concerned about adding even more opportunities for strategic voting. In fact, many of the communication protocols introduced in this paper do introd...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University