Bypassing Combinatorial Protections: Polynomial-Time Algorithms for Single-Peaked Electorates
Brandt, Felix, Brill, Markus, Hemaspaandra, Edith, Hemaspaandra, Lane A.
–Journal of Artificial Intelligence Research
For many election systems, bribery (and related) attacks have been shown NP-hard using constructions on combinatorially rich structures such as partitions and covers. This paper shows that for voters who follow the most central political-science model of electorates---single-peaked preferences---those hardness protections vanish. By using single-peaked preferences to simplify combinatorial covering challenges, we for the first time show that NP-hard bribery problems---including those for Kemeny and Llull elections---fall to polynomial time for single-peaked electorates. By using single-peaked preferences to simplify combinatorial partition challenges, we for the first time show that NP-hard partition-of-voters problems fall to polynomial time for single-peaked electorates. We show that for single-peaked electorates, the winner problems for Dodgson and Kemeny elections, though Theta-two-complete in the general case, fall to polynomial time. And we completely classify the complexity of weighted coalition manipulation for scoring protocols in single-peaked electorates.
Journal of Artificial Intelligence Research
Jul-22-2015
- Country:
- Europe
- Germany > North Rhine-Westphalia
- Düsseldorf Region > Düsseldorf (0.04)
- Upper Bavaria > Munich (0.04)
- United Kingdom > England
- Cambridgeshire > Cambridge (0.04)
- Germany > North Rhine-Westphalia
- North America > United States
- Illinois > Cook County
- Chicago (0.04)
- Michigan (0.04)
- New York > Monroe County
- Rochester (0.04)
- North Carolina > Durham County
- Durham (0.04)
- Illinois > Cook County
- Europe
- Genre:
- Research Report > New Finding (0.45)
- Industry:
- Government > Voting & Elections (1.00)
- Technology: