Results 1  10
of
51
Junta distributions and the averagecase complexity of manipulating elections
 In AAMAS
, 2006
"... Encouraging voters to truthfully reveal their preferences in an election has long been an important issue. Recently, computational complexity has been suggested as a means of precluding strategic behavior. Previous studies have shown that some voting protocols are hard to manipulate, but used N Pha ..."
Abstract

Cited by 88 (23 self)
 Add to MetaCart
Encouraging voters to truthfully reveal their preferences in an election has long been an important issue. Recently, computational complexity has been suggested as a means of precluding strategic behavior. Previous studies have shown that some voting protocols are hard to manipulate, but used N Phardness as the complexity measure. Such a worstcase analysis may be an insufficient guarantee of resistance to manipulation. Indeed, we demonstrate that N Phard manipulations may be tractable in the averagecase. For this purpose, we augment the existing theory of averagecase complexity with some new concepts. In particular, we consider elections distributed with respect to junta distributions, which concentrate on hard instances. We use our techniques to prove that scoring protocols are susceptible to manipulation by coalitions, when the number of candidates is constant. 1.
Generalized scoring rules and the frequency of coalitional manipulability
 In Proceedings of the Ninth ACM Conference on Electronic Commerce (EC
, 2008
"... We introduce a class of voting rules called generalized scoring rules. Under such a rule, each vote generates a vector of k scores, and the outcome of the voting rule is based only on the sum of these vectors—more specifically, only on the order (in terms of score) of the sum’s components. This clas ..."
Abstract

Cited by 58 (18 self)
 Add to MetaCart
We introduce a class of voting rules called generalized scoring rules. Under such a rule, each vote generates a vector of k scores, and the outcome of the voting rule is based only on the sum of these vectors—more specifically, only on the order (in terms of score) of the sum’s components. This class is extremely general: we do not know of any commonly studied rule that is not a generalized scoring rule. We then study the coalitional manipulation problem for generalized scoring rules. We prove that under certain natural assump), then tions, if the number of manipulators is O(n p) (for any p < 1 2 the probability that a random profile is manipulable is O(n p − 1 2), where n is the number of voters. We also prove that under another set of natural assumptions, if the number of manipulators is Ω(n p) (for any p> 1) and o(n), then the probability that a random pro2 file is manipulable (to any possible winner under the voting rule) is 1 − O(e −Ω(n2p−1)). We also show that common voting rules satisfy these conditions (for the uniform distribution). These results generalize earlier results by Procaccia and Rosenschein as well as even earlier results on the probability of an election being tied.
Determining Possible and Necessary Winners under Common Voting Rules Given Partial Orders
"... Usually a voting rule or correspondence requires agents to give their preferences as linear orders. However, in some cases it is impractical for an agent to give a linear order over all the alternatives. It has been suggested to let agents submit partial orders instead. Then, given a profile of part ..."
Abstract

Cited by 46 (13 self)
 Add to MetaCart
Usually a voting rule or correspondence requires agents to give their preferences as linear orders. However, in some cases it is impractical for an agent to give a linear order over all the alternatives. It has been suggested to let agents submit partial orders instead. Then, given a profile of partial orders and a candidate c, two important questions arise: first, is c guaranteed to win, and second, is it still possible for c to win? These are the necessary winner and possible winner problems, respectively. We consider the setting where the number of alternatives is unbounded and the votes are unweighted. We prove that for Copeland, maximin, Bucklin, and ranked pairs, the possible winner problem is NPcomplete; also, we give a sufficient condition on scoring rules for the possible winner problem to be NPcomplete (Borda satisfies this condition). We also prove that for Copeland and ranked pairs, the necessary winner problem is coNPcomplete. All the hardness results hold even when the number of undetermined pairs in each vote is no more than a constant. We also present polynomialtime algorithms for the necessary winner problem for scoring rules, maximin, and Bucklin.
The Complexity of Bribery in Elections
, 2006
"... We study the complexity of influencing elections through bribery: How computationally complex is it for an external actor to determine whether by a certain amount of bribing voters a specified candidate can be made the election’s winner? We study this problem for election systems as varied as scorin ..."
Abstract

Cited by 42 (16 self)
 Add to MetaCart
We study the complexity of influencing elections through bribery: How computationally complex is it for an external actor to determine whether by a certain amount of bribing voters a specified candidate can be made the election’s winner? We study this problem for election systems as varied as scoring protocols and Dodgson voting, and in a variety of settings regarding the nature of the voters, the size of the candidate set, and the specification of the input. We obtain both polynomialtime bribery algorithms and proofs of the intractability of bribery. Our results indicate that the complexity of bribery is extremely sensitive to the setting. For example, we find settings where bribing weighted voters is NPcomplete in general but if weights are represented in unary then the bribery problem is in P. We provide a complete classification of the complexity of bribery for the broad class of elections (including plurality, Borda, kapproval, and veto) known as scoring protocols.
A sufficient condition for voting rules to be frequently manipulable
 In Proceedings of the Ninth ACM Conference on Electronic Commerce (EC
, 2008
"... The GibbardSatterthwaite Theorem states that (in unrestricted settings) any reasonable voting rule is manipulable. Recently, a quantitative version of this theorem was proved by Ehud Friedgut, Gil Kalai, and Noam Nisan: when the number of alternatives is three, for any neutral voting rule that is f ..."
Abstract

Cited by 35 (10 self)
 Add to MetaCart
The GibbardSatterthwaite Theorem states that (in unrestricted settings) any reasonable voting rule is manipulable. Recently, a quantitative version of this theorem was proved by Ehud Friedgut, Gil Kalai, and Noam Nisan: when the number of alternatives is three, for any neutral voting rule that is far from any dictatorship, there exists a voter such that a random manipulation—that is, the true preferences and the strategic vote are all drawn i.i.d., uniformly at random—will succeed with a probability of Ω ( 1), where n is the n number of voters. However, it seems that the techniques used to prove this theorem can not be fully extended to more than three alternatives. In this paper, we give a more limited result that does apply to four or more alternatives. We give a sufficient condition for a voting rule to be randomly manipulable with a probability of Ω ( 1) for at least one voter, when the number of alternatives is held n fixed. Specifically, our theorem states that if a voting rule r satisfies 1. homogeneity, 2. anonymity, 3. nonimposition, 4. a cancelingout condition, and 5. there exists a stable profile that is still stable after one given alternative is uniformly moved to different positions; then there exists a voter such that a random manipulation for that voter will succeed with a probability of Ω ( 1). We show that n many common voting rules satisfy these conditions, for example any positional scoring rule, Copeland, STV, maximin, and ranked pairs.
Copeland voting: Ties matter
 In To appear in Proceedings of AAMAS’08
, 2008
"... We study the complexity of manipulation for a family of election systems derived from Copeland voting via introducing a parameter α that describes how ties in headtohead contests are valued. We show that the thus obtained problem of manipulation for unweighted Copeland α elections is NPcomplete e ..."
Abstract

Cited by 35 (7 self)
 Add to MetaCart
We study the complexity of manipulation for a family of election systems derived from Copeland voting via introducing a parameter α that describes how ties in headtohead contests are valued. We show that the thus obtained problem of manipulation for unweighted Copeland α elections is NPcomplete even if the size of the manipulating coalition is limited to two. Our result holds for all rational values of α such that 0 < α < 1 except for α = 1. Since it is 2 well known that manipulation via a single voter is easy for Copeland, our result is the first one where an election system originally known to be vulnerable to manipulation via a single voter is shown to be resistant to manipulation via a coalition of a constant number of voters. We also study the complexity of manipulation for Copeland α for the case of a constant number of candidates. We show that here the exact complexity of manipulation often depends closely on the α: Depending on whether we try to make our favorite candidate a winner or a unique winner and whether α is 0, 1 or between these values, the problem of weighted manipulation for Copeland α with three candidates is either in P or is NPcomplete. Our results show that ways in which ties are treated in an election system, here Copeland voting, can be crucial to establishing complexity results for this system.
Llull and Copeland voting computationally resist bribery and control
, 2009
"... Control and bribery are settings in which an external agent seeks to influence the outcome of an election. Constructive control of elections refers to attempts by an agent to, via such actions as addition/deletion/partition of candidates or voters, ensure that a given candidate wins. Destructive con ..."
Abstract

Cited by 34 (15 self)
 Add to MetaCart
Control and bribery are settings in which an external agent seeks to influence the outcome of an election. Constructive control of elections refers to attempts by an agent to, via such actions as addition/deletion/partition of candidates or voters, ensure that a given candidate wins. Destructive control refers to attempts by an agent to, via the same actions, preclude a given candidate’s victory. An election system in which an agent can sometimes affect the result and it can be determined in polynomial time on which inputs the agent can succeed is said to be vulnerable to the given type of control. An election system in which an agent can sometimes affect the result, yet in which it is NPhard to recognize the inputs on which the agent can succeed, is said to be resistant to the given type of control. Aside from election systems with an NPhard winner problem, the only systems previously known to be resistant to all the standard control types were highly artificial election systems created by hybridization. This paper studies a parameterized version of Copeland voting, denoted by Copeland α, where the parameter α is a rational number between 0 and 1 that specifies how ties are valued in the pairwise comparisons of candidates. In every previously studied constructive or destructive
AI’s war on manipulation: Are we winning?
 AI MAGAZINE
"... We provide an overview of more than two decades of work, mostly in AI, that studies computational complexity as a barrier against manipulation in elections. ..."
Abstract

Cited by 32 (5 self)
 Add to MetaCart
We provide an overview of more than two decades of work, mostly in AI, that studies computational complexity as a barrier against manipulation in elections.
Eliciting singlepeaked preferences using comparison queries
 In Proceedings of the International Conference on Autonomous Agents and Multiagent Systems
, 2007
"... Voting is a general method for aggregating the preferences of multiple agents. Each agent ranks all the possible alternatives, and based on this, an aggregate ranking of the alternatives (or at least a winning alternative) is produced. However, when there are many alternatives, it is impractical to ..."
Abstract

Cited by 26 (4 self)
 Add to MetaCart
Voting is a general method for aggregating the preferences of multiple agents. Each agent ranks all the possible alternatives, and based on this, an aggregate ranking of the alternatives (or at least a winning alternative) is produced. However, when there are many alternatives, it is impractical to simply ask agents to report their complete preferences. Rather, the agents’ preferences, or at least the relevant parts thereof, need to be elicited. This is done by asking the agents a (hopefully small) number of simple queries about their preferences, such as comparison queries, which ask an agent to compare two of the alternatives. Prior work on preference elicitation in voting has focused on the case of unrestricted preferences. It has been shown that in this setting, it is sometimes necessary to ask each agent (almost) as many queries as would be required to determine an arbitrary ranking of the alternatives. In contrast, in this paper, we focus on singlepeaked preferences. We show that such preferences can be elicited using only a linear number of comparison queries, if either the order with respect to which preferences are singlepeaked is known, or at least one other agent’s complete preferences are known. We show that using a sublinear number of queries does not suffice. We also consider the case of cardinally singlepeaked preferences. For this case, we show that if the alternatives ’ cardinal positions are known, then an agent’s preferences can be elicited using only a logarithmic number of queries; however, we also show that if the cardinal positions are not known, then a sublinear number of queries does not suffice. We present experimental results for all elicitation algorithms. We also consider the problem of only eliciting enough information to determine the aggregate ranking, and show that even for this more modest objective, a sublinear number of queries per agent does not suffice for known ordinal or unknown cardinal positions. Finally, we discuss whether and how these techniques can be applied when preferences are almost singlepeaked. 1 1