Not enough data to create a plot.
Try a different view from the menu above.
Conitzer, Vincent
Commitment to Correlated Strategies
Conitzer, Vincent (Duke University) | Korzhyk, Dmytro (Duke University)
Without commitment, this game is solvable by iterated Game theory provides a mathematical framework for rational strict dominance: U strictly dominates D for player 1; after action in settings with multiple agents. As such, algorithms removing D, L strictly dominates R for player 2. So for computing game-theoretic solutions are of great the iterated strict dominance outcome (and hence the only interest to the multiagent systems community in AI. equilibrium outcome) is (U, L), resulting in a utility of 1 for It has long been well known in game theory that being player 1. However, if player 1 can commit to a pure strategy able to commit to a course of action before the before player 2 moves, then player 1 is better off committing other player(s) move(s)--often referred to as a Stackelberg to D, thereby incentivizing player 2 to play R, resulting model (von Stackelberg 1934)--can bestow significant in a utility of 2 for player 1. Even better for player 1 is to advantages. In recent years, the problem of computing commit to a mixed strategy of (.49U,.51D); this still incentivizes an optimal strategy to commit to has started to receive player 2 to play R and results in an expected utility a significant amount of attention, especially in the multiagent of.49
Dominating Manipulations in Voting with Partial Information
Conitzer, Vincent, Walsh, Toby, Xia, Lirong
We consider manipulation problems when the manipulator only has partial information about the votes of the nonmanipulators. Such partial information is described by an information set, which is the set of profiles of the nonmanipulators that are indistinguishable to the manipulator. Given such an information set, a dominating manipulation is a non-truthful vote that the manipulator can cast which makes the winner at least as preferable (and sometimes more preferable) as the winner when the manipulator votes truthfully. When the manipulator has full information, computing whether or not there exists a dominating manipulation is in P for many common voting rules (by known results). We show that when the manipulator has no information, there is no dominating manipulation for many common voting rules. When the manipulator's information is represented by partial orders and only a small portion of the preferences are unknown, computing a dominating manipulation is NP-hard for many common voting rules. Our results thus throw light on whether we can prevent strategic behavior by limiting information about the votes of other voters.
Using Mechanism Design to Prevent False-Name Manipulations
Conitzer, Vincent (Duke University) | Yokoo, Makoto (Kyushu University)
The basic notion of false-name-proofness allows for useful mechanisms under certain circumstances, but in general there are impossibility results that show that false-name-proof mechanisms have severe limitations. One may react to these impossibility results by saying that, since false-name-proof mechanisms are unsatisfactory, we should not run any important mechanisms in highly anonymous settings--unless, perhaps, we can find some methodology that directly prevents false-name manipulation even in such settings, so that we are back in a more typical mechanism design context. Because the Internet is so attractive as a platform for running certain types of mechanisms, it seems unlikely that the organizations running these mechanisms will take them offline. As a result, perhaps the most promising approaches at this point are those that combine techniques from mechanism design with other techniques discussed in this article.
Using Mechanism Design to Prevent False-Name Manipulations
Conitzer, Vincent (Duke University) | Yokoo, Makoto (Kyushu University)
The basic notion of false-name-proofness allows for useful mechanisms under certain circumstances, but in general there are impossibility results that show that false-name-proof mechanisms have severe limitations. One may react to these impossibility results by saying that, since false-name-proof mechanisms are unsatisfactory, we should not run any important mechanisms in highly anonymous settings—unless, perhaps, we can find some methodology that directly prevents false-name manipulation even in such settings, so that we are back in a more typical mechanism design context. However, it seems unlikely that the phenomenon of false-name manipulation will disappear anytime soon. Because the Internet is so attractive as a platform for running certain types of mechanisms, it seems unlikely that the organizations running these mechanisms will take them offline. Moreover, because a goal of these organizations is often to get as many users to participate as possible, they will be reluctant to use high-overhead solutions that discourage users from participating. As a result, perhaps the most promising approaches at this point are those that combine techniques from mechanism design with other techniques discussed in this article. It appears that this is a rich domain for new, creative approaches that can have significant practical impact.
Complexity of Computing Optimal Stackelberg Strategies in Security Resource Allocation Games
Korzhyk, Dmytro (Duke University) | Conitzer, Vincent (Duke University) | Parr, Ronald (Duke University)
Recently, algorithms for computing game-theoretic solutions have been deployed in real-world security applications, such as the placement of checkpoints and canine units at Los Angeles International Airport. These algorithms assume that the defender (security personnel) can commit to a mixed strategy, a so-called Stackelberg model. As pointed out by Kiekintveld et al. (2009), in these applications, generally, multiple resources need to be assigned to multiple targets, resulting in an exponential number of pure strategies for the defender. In this paper, we study how to compute optimal Stackelberg strategies in such games, showing that this can be done in polynomial time in some cases, and is NP-hard in others.
Compilation Complexity of Common Voting Rules
Xia, Lirong (Duke University) | Conitzer, Vincent (Duke University)
In computational social choice, one important problem is to take the votes of a subelectorate (subset of the voters), and summarize them using a small number of bits. This needs to be done in such a way that, if all that we know is the summary, as well as the votes of voters outside the subelectorate, we can conclude which of the m alternatives wins. This corresponds to the notion of compilation complexity, the minimum number of bits required to summarize the votes for a particular rule, which was introduced by Chevaleyre et al. [IJCAI-09]. We study three different types of compilation complexity. The first, studied by Chevaleyre et al., depends on the size of the subelectorate but not on the size of the complement (the voters outside the subelectorate). The second depends on the size of the complement but not on the size of the subelectorate. The third depends on both. We first investigate the relations among the three types of compilation complexity. Then, we give upper and lower bounds on all three types of compilation complexity for the most prominent voting rules. We show that for l -approval (when l ≤ m /2), Borda, and Bucklin, the bounds for all three types are asymptotically tight, up to a multiplicative constant; for l-approval (when l > m /2), plurality with runoff, all Condorcet consistent rules that are based on unweighted majority graphs (including Copeland and voting trees), and all Condorcet consistent rules that are based on the order of pairwise elections (including ranked pairs and maximin), the bounds for all three types are asymptotically tight up to a multiplicative constant when the sizes of the subelectorate and its complement are both larger than m 1+ε for some ε > 0.
Stackelberg Voting Games: Computational Aspects and Paradoxes
Xia, Lirong (Duke University) | Conitzer, Vincent (Duke University)
We consider settings in which voters vote in sequence, each voter knows the votes of the earlier voters and the preferences of the later voters, and voters are strategic. This can be modeled as an extensive-form game of perfect information, which we call a Stackelberg voting game. We first propose a dynamic-programming algorithm for finding the backward-induction outcome for any Stackelberg voting game when the rule is anonymous; this algorithm is efficient if the number of alternatives is no more than a constant. We show how to use compilation functions to further reduce the time and space requirements. Our main theoretical results are paradoxes for the backward-induction outcomes of Stackelberg voting games. We show that for any n ≥ 5 and any voting rule that satisfies nonimposition and with a low domination index, there exists a profile consisting of n voters, such that the backward-induction outcome is ranked somewhere in the bottom two positions in almost every voter’s preferences. Moreover, this outcome loses all but one of its pairwise elections. Furthermore, we show that many common voting rules have a very low (= 1) domination index, including all majority-consistent voting rules. For the plurality and nomination rules, we show even stronger paradoxes. Finally, using our dynamic-programming algorithm, we run simulations to compare the backward-induction outcome of the Stackelberg voting game to the winner when voters vote truthfully, for the plurality and veto rules. Surprisingly, our experimental results suggest that on average, more voters prefer the backward-induction outcome.
Computationally Feasible Automated Mechanism Design: General Approach and Case Studies
Guo, Mingyu (Duke University) | Conitzer, Vincent (Duke University)
In many multiagent settings, a decision must be made based on the preferences of multiple agents, and agents may lie about their preferences if this is to their benefit. In mechanism design, the goal is to design procedures (mechanisms) for making the decision that work in spite of such strategic behavior, usually by making untruthful behavior suboptimal. In automated mechanism design, the idea is to computationally search through the space of feasible mechanisms, rather than to design them analytically by hand. Unfortunately, the most straightforward approach to automated mechanism design does not scale to large instances, because it requires searching over a very large space of possible functions. In this paper, we describe an approach to automated mechanism design that is computationally feasible. Instead of optimizing over all feasible mechanisms, we carefully choose a parameterized subfamily of mechanisms. Then we optimize over mechanisms within this family, and analyze whether and to what extent the resulting mechanism is suboptimal outside the subfamily. We demonstrate the usefulness of our approach with two case studies.
Complexity of Unweighted Coalitional Manipulation Under Some Common Voting Rules
Xia, Lirong (Duke University) | Zuckerman, Michael (Hebrew University) | Procaccia, Ariel D. (Microsoft Israel R&D Center) | Conitzer, Vincent (Duke University) | Rosenschein, Jeffrey S. (Hebrew University)
Understanding the computational complexity of manipulation in elections is arguably the most central agenda in Computational Social Choice. One of the influential variations of the the problem involves a coalition of manipulators trying to make a favorite candidate win the election. Although the complexity of the problem is well-studied under the assumption that the voters are weighted, there were very few successful attempts to abandon this strong assumption. In this paper, we study the complexity of the unweighted coalitional manipulation problem (UCM) under several prominent voting rules. Our main result is that UCM is NP-complete under the maximin rule; this resolves an enigmatic open question. We then show that UCM is NP-complete under the ranked pairs rule, even with respect to a single manipulator. Furthermore, we provide an extreme hardness-of-approximation result for an optimization version of UCM under ranked pairs. Finally, we show that UCM under the Bucklin rule is in P.
AAAI 2008 Workshop Reports
Anand, Sarabjot Singh (University of Warwick) | Bunescu, Razvan C. (Ohio University) | Carvalho, Vitor R. (Microsoft Live Labs) | Chomicki, Jan (University of Buffalo) | Conitzer, Vincent (Duke University) | Cox, Michael T. (BBN Technologies) | Dignum, Virginia (Utrecht University) | Dodds, Zachary (Harvey Mudd College) | Dredze, Mark (University of Pennsylvania) | Furcy, David (University of Wisconsin Oshkosh) | Gabrilovich, Evgeniy (Yahoo! Research) | Göker, Mehmet H. (PricewaterhouseCoopers) | Guesgen, Hans Werner (Massey University) | Hirsh, Haym (Rutgers University) | Jannach, Dietmar (Dortmund University of Technology) | Junker, Ulrich (ILOG) | Ketter, Wolfgang (Erasmus University) | Kobsa, Alfred (University of California, Irvine) | Koenig, Sven (University of Southern California) | Lau, Tessa (IBM Almaden Research Center) | Lewis, Lundy (Southern New Hampshire University) | Matson, Eric (Purdue University) | Metzler, Ted (Oklahoma City University) | Mihalcea, Rada (University of North Texas) | Mobasher, Bamshad (DePaul University) | Pineau, Joelle (McGill University) | Poupart, Pascal (University of Waterloo) | Raja, Anita (University of North Carolina at Charlotte) | Ruml, Wheeler (University of New Hampshire) | Sadeh, Norman M. (Carnegie Mellon University) | Shani, Guy (Microsoft Research) | Shapiro, Daniel (Applied Reactivity, Inc.) | Smith, Trey (Carnegie Mellon University West) | Taylor, Matthew E. (University of Southern California) | Wagstaff, Kiri (Jet Propulsion Laboratory) | Walsh, William (CombineNet) | Zhou, Ron (Palo Alto Research Center)