• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

Nonexistence of voting rules that are usually hard to manipulate (2006)

by V Conitzer, T Sandholm
Add To MetaCart

Tools

Sorted by:
Results 1 - 10 of 88
Next 10 →

When are elections with few candidates hard to manipulate?

by Vincent Conitzer, TUOMAS SANDHOLM, Jérôme Lang - JOURNAL OF THE ACM , 2007
"... In multiagent settings where the agents have different preferences, preference aggregation is a central issue. Voting is a general method for preference aggregation, but seminal results have shown that all general voting protocols are manipulable. One could try to avoid manipulation by using protoco ..."
Abstract - Cited by 158 (18 self) - Add to MetaCart
In multiagent settings where the agents have different preferences, preference aggregation is a central issue. Voting is a general method for preference aggregation, but seminal results have shown that all general voting protocols are manipulable. One could try to avoid manipulation by using protocols where determining a beneficial manipulation is hard. Especially among computational agents, it is reasonable to measure this hardness by computational complexity. Some earlier work has been done in this area, but it was assumed that the number of voters and candidates is unbounded. Such hardness results lose relevance when the number of candidates is small, because manipulation algorithms that are exponential only in the number of candidates (and only slightly so) might be available. We give such an algorithm for an individual agent to manipulate the Single Transferable Vote (STV) protocol, which has been shown hard to manipulate in the above sense. This motivates the core of this paper, which derives hardness results for realistic elections where the number of candidates is a small constant (but the number of voters can be large). The main manipulation question we study is that of coalitional manipulation by weighted voters. (We show that for simpler manipulation problems, manipulation cannot be hard with few candidates.) We study both constructive manipulation (making a given candidate win) and de-

Junta distributions and the average-case complexity of manipulating elections

by Ariel D. Procaccia, Jeffrey S. Rosenschein - In AAMAS , 2006
"... Encouraging voters to truthfully reveal their preferences in an election has long been an important issue. Recently, computational complexity has been suggested as a means of precluding strategic behavior. Previous studies have shown that some voting protocols are hard to manipulate, but used N P-ha ..."
Abstract - Cited by 106 (23 self) - Add to MetaCart
Encouraging voters to truthfully reveal their preferences in an election has long been an important issue. Recently, computational complexity has been suggested as a means of precluding strategic behavior. Previous studies have shown that some voting protocols are hard to manipulate, but used N P-hardness as the complexity measure. Such a worst-case analysis may be an insufficient guarantee of resistance to manipulation. Indeed, we demonstrate that N P-hard manipulations may be tractable in the averagecase. For this purpose, we augment the existing theory of average-case complexity with some new concepts. In particular, we consider elections distributed with respect to junta distributions, which concentrate on hard instances. We use our techniques to prove that scoring protocols are susceptible to manipulation by coalitions, when the number of candidates is constant. 1.

A short introduction to computational social choice

by Yann Chevaleyre, Ulle Endriss, Jérôme Lang, Nicolas Maudet - Proc. 33rd Conference on Current Trends in Theory and Practice of Computer Science , 2007
"... ..."
Abstract - Cited by 72 (17 self) - Add to MetaCart
Abstract not found
(Show Context)

Citation Context

...wed by rule Y . They study the impact of hybridization on the complexity of manipulation in various cases (including hybridizing a voting rule with itself). As recently noted by Conitzer and Sandholm =-=[32]-=-, computational hardness concepts such as NP- hardness or PSPACE-hardness are worst case settings. Thus, they only ensure that there exist cases in which manipulation gets hard to compute. In fact, th...

Elections Can be Manipulated Often

by Ehud Friedgut, Gil Kalai, Noam Nisan
"... The Gibbard-Satterthwaite theorem states that every non-trivial voting method between at least 3 alternatives can be strategically manipulated. We prove a quantitative version of the Gibbard-Satterthwaite theorem: a random manipulation by a single random voter will succeed with non-negligible probab ..."
Abstract - Cited by 66 (1 self) - Add to MetaCart
The Gibbard-Satterthwaite theorem states that every non-trivial voting method between at least 3 alternatives can be strategically manipulated. We prove a quantitative version of the Gibbard-Satterthwaite theorem: a random manipulation by a single random voter will succeed with non-negligible probability for every neutral voting method between 3 alternatives that is far from being a dictatorship.

Generalized scoring rules and the frequency of coalitional manipulability

by Lirong Xia - In Proceedings of the Ninth ACM Conference on Electronic Commerce (EC , 2008
"... We introduce a class of voting rules called generalized scoring rules. Under such a rule, each vote generates a vector of k scores, and the outcome of the voting rule is based only on the sum of these vectors—more specifically, only on the order (in terms of score) of the sum’s components. This clas ..."
Abstract - Cited by 66 (20 self) - Add to MetaCart
We introduce a class of voting rules called generalized scoring rules. Under such a rule, each vote generates a vector of k scores, and the outcome of the voting rule is based only on the sum of these vectors—more specifically, only on the order (in terms of score) of the sum’s components. This class is extremely general: we do not know of any commonly studied rule that is not a generalized scoring rule. We then study the coalitional manipulation problem for gener-alized scoring rules. We prove that under certain natural assump-), then tions, if the number of manipulators is O(n p) (for any p < 1 2 the probability that a random profile is manipulable is O(n p − 1 2), where n is the number of voters. We also prove that under another set of natural assumptions, if the number of manipulators is Ω(n p) (for any p> 1) and o(n), then the probability that a random pro-2 file is manipulable (to any possible winner under the voting rule) is 1 − O(e −Ω(n2p−1)). We also show that common voting rules satisfy these conditions (for the uniform distribution). These results generalize earlier results by Procaccia and Rosenschein as well as even earlier results on the probability of an election being tied.
(Show Context)

Citation Context

...at can find a manipulation for most instances. Several recent results seem to suggest that indeed, in various senses, hard instances of the manipulation problem are the exception rather than the rule =-=[17, 8, 16, 21]-=-. The results in this paper add to the body of work that suggests that the manipulation problem is usually easy to solve. For a very large class of voting rules, we show that in most cases, as the num...

Llull and Copeland voting computationally resist bribery and control

by Piotr Faliszewski, Edith Hemaspaandra, Lane A. Hemaspaandra, Jörg Rothe , 2009
"... Control and bribery are settings in which an external agent seeks to influence the outcome of an election. Constructive control of elections refers to attempts by an agent to, via such actions as addition/deletion/partition of candidates or voters, ensure that a given candidate wins. Destructive con ..."
Abstract - Cited by 63 (30 self) - Add to MetaCart
Control and bribery are settings in which an external agent seeks to influence the outcome of an election. Constructive control of elections refers to attempts by an agent to, via such actions as addition/deletion/partition of candidates or voters, ensure that a given candidate wins. Destructive control refers to attempts by an agent to, via the same actions, preclude a given candidate’s victory. An election system in which an agent can sometimes affect the result and it can be determined in polynomial time on which inputs the agent can succeed is said to be vulnerable to the given type of control. An election system in which an agent can sometimes affect the result, yet in which it is NP-hard to recognize the inputs on which the agent can succeed, is said to be resistant to the given type of control. Aside from election systems with an NP-hard winner problem, the only systems previously known to be resistant to all the standard control types were highly artificial election systems created by hybridization. This paper studies a parameterized version of Copeland voting, denoted by Copeland α, where the parameter α is a rational number between 0 and 1 that specifies how ties are valued in the pairwise comparisons of candidates. In every previously studied constructive or destructive

AI’s war on manipulation: Are we winning?

by Piotr Faliszewski, Ariel D. Procaccia - AI MAGAZINE
"... We provide an overview of more than two decades of work, mostly in AI, that studies computational complexity as a barrier against manipulation in elections. ..."
Abstract - Cited by 57 (9 self) - Add to MetaCart
We provide an overview of more than two decades of work, mostly in AI, that studies computational complexity as a barrier against manipulation in elections.

How Hard Is Bribery in Elections?

by Piotr Faliszewski, Edith Hemaspaandra, Lane A. Hemaspaandra
"... We study the complexity of influencing elections through bribery: How computationally complex is it for an external actor to determine whether by paying certain voters to change their preferences a specified candidate can be made the election’s winner? We study this problem for election systems as v ..."
Abstract - Cited by 56 (23 self) - Add to MetaCart
We study the complexity of influencing elections through bribery: How computationally complex is it for an external actor to determine whether by paying certain voters to change their preferences a specified candidate can be made the election’s winner? We study this problem for election systems as varied as scoring protocols and Dodgson voting, and in a variety of settings regarding homogeneous-vs.-nonhomogeneous electorate bribability, bounded-size-vs.-arbitrary-sized candidate sets, weighted-vs.-unweighted voters, and succinct-vs.-nonsuccinct input specification. We obtain both polynomial-time bribery algorithms and proofs of the intractability of bribery, and indeed our results show that the complexity of bribery is extremely sensitive to the setting. For example, we find settings in which bribery is NP-complete but manipulation (by voters) is in P, and we find settings in which bribing weighted voters is NP-complete but bribing voters with individual bribe thresholds is in P. For the broad class of elections (including plurality, Borda, k-approval, and veto) known as scoring protocols, we prove a dichotomy result for bribery of weighted voters: We find a simple-to-evaluate condition that classifies every case as either NP-complete or in P. 1.
(Show Context)

Citation Context

...8) obtained a fullypolynomial approximation scheme for plurality-weighted-$bribery. Many researchers ask about typical-case complexity of practically encountered NP-complete problems (see the work of =-=Conitzer & Sandholm, 2006-=-; Procaccia & Rosenschein, 2007; Erdélyi, Hemaspaandra, Rothe, & Spakowski, 2007, for discussions of this issue in the context of voting problems; see also Erdélyi, Hemaspaandra, Rothe, & Spakowski, t...

Algorithms for the coalitional manipulation problem

by Michael Zuckerman, Ariel D. Procaccia, Jeffrey S. Rosenschein - In The ACM-SIAM Symposium on Discrete Algorithms (SODA , 2008
"... We investigate the problem of coalitional manipulation in elections, which is known to be hard in a variety of voting rules. We put forward efficient algorithms for the problem in Scoring rules, Maximin and Plurality with Runoff, and analyze their windows of error. Specifically, given an instance on ..."
Abstract - Cited by 53 (8 self) - Add to MetaCart
We investigate the problem of coalitional manipulation in elections, which is known to be hard in a variety of voting rules. We put forward efficient algorithms for the problem in Scoring rules, Maximin and Plurality with Runoff, and analyze their windows of error. Specifically, given an instance on which an algorithm fails, we bound the additional power the manipulators need in order to succeed. We finally discuss the implications of our results with respect to the popular approach of employing computational hardness to preclude manipulation. 1
(Show Context)

Citation Context

...ential manipulators. Recent work regarding the average-case complexity of manipulation has argued that manipulation with respect to many worst-case-hard-to-manipulate voting rules is easy in practice =-=[7, 14]-=-. In particular, Procaccia and Rosenschein [23, 22] have established some theoretical results regarding the tractability of the coalitional manipulation problem in practice. The matter was further dis...

Copeland voting: Ties matter

by Piotr Faliszewski, Edith Hemaspaandra, Henning Schnoor - In To appear in Proceedings of AAMAS’08 , 2008
"... We study the complexity of manipulation for a family of election systems derived from Copeland voting via introducing a parameter α that describes how ties in head-to-head contests are valued. We show that the thus obtained problem of manipulation for unweighted Copeland α elections is NP-complete e ..."
Abstract - Cited by 51 (10 self) - Add to MetaCart
We study the complexity of manipulation for a family of election systems derived from Copeland voting via introducing a parameter α that describes how ties in head-to-head contests are valued. We show that the thus obtained problem of manipulation for unweighted Copeland α elections is NP-complete even if the size of the manipulating coalition is limited to two. Our result holds for all rational values of α such that 0 < α < 1 except for α = 1. Since it is 2 well known that manipulation via a single voter is easy for Copeland, our result is the first one where an election system originally known to be vulnerable to manipulation via a single voter is shown to be resistant to manipulation via a coalition of a constant number of voters. We also study the complexity of manipulation for Copeland α for the case of a constant number of candidates. We show that here the exact complexity of manipulation often depends closely on the α: Depending on whether we try to make our favorite candidate a winner or a unique winner and whether α is 0, 1 or between these values, the problem of weighted manipulation for Copeland α with three candidates is either in P or is NP-complete. Our results show that ways in which ties are treated in an election system, here Copeland voting, can be crucial to establishing complexity results for this system.
(Show Context)

Citation Context

...litions of weighted voters. Recent years also brought several papers that call for more detailed study of the complexity of manipulation via arguing that NP-completeness results may not be sufficient =-=[7, 16, 20]-=-. In this paper, following [12], we focus on a family of election systems derived from Copeland voting via introducing value-of-tie parameter α. Intuitively, Copeland α voting works as follows: For ea...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University