Goto

Collaborating Authors

 single-peaked electorate


Reinstating Combinatorial Protections for Manipulation and Bribery in Single-Peaked and Nearly Single-Peaked Electorates

Menon, Vijay (University of Waterloo) | Larson, Kate (University of Waterloo)

AAAI Conferences

Understanding when and how computational complexity can be used to protect elections against different manipulative actions has been a highly active research area over the past two decades. A recent body of work, however, has shown that many of the NP-hardness shields, previously obtained, vanish when the electorate has single-peaked or nearly single-peaked preferences. In light of these results, we investigate whether it is possible to reimpose NP-hardness shields for such electorates by allowing the voters to specify partial preferences instead of insisting they cast complete ballots. In particular, we show that in single-peaked and nearly single-peaked electorates, if voters are allowed to submit top-truncated ballots, then the complexity of manipulation and bribery for many voting rules increases from being in P to being NP-complete.


Bypassing Combinatorial Protections: Polynomial-Time Algorithms for Single-Peaked Electorates

Brandt, Felix, Brill, Markus, Hemaspaandra, Edith, Hemaspaandra, Lane A.

Journal of Artificial Intelligence Research

For many election systems, bribery (and related) attacks have been shown NP-hard using constructions on combinatorially rich structures such as partitions and covers. This paper shows that for voters who follow the most central political-science model of electorates---single-peaked preferences---those hardness protections vanish. By using single-peaked preferences to simplify combinatorial covering challenges, we for the first time show that NP-hard bribery problems---including those for Kemeny and Llull elections---fall to polynomial time for single-peaked electorates. By using single-peaked preferences to simplify combinatorial partition challenges, we for the first time show that NP-hard partition-of-voters problems fall to polynomial time for single-peaked electorates. We show that for single-peaked electorates, the winner problems for Dodgson and Kemeny elections, though Theta-two-complete in the general case, fall to polynomial time. And we completely classify the complexity of weighted coalition manipulation for scoring protocols in single-peaked electorates.


The Complexity of Manipulative Attacks in Nearly Single-Peaked Electorates (Extended Abstract)

Faliszewski, Piotr (AGH Univesity of Science and Technology) | Hemaspaandra, Edith (Rochester Institute of Technology) | Hemaspaandra, Lane A. (University of Rochester)

AAAI Conferences

Many electoral control and manipulation problems — which we will refer to in general as manipulative actions problems — are NP-hard in the general case.  Many of these problems fall into polynomial time if the electorate is single-peaked, i.e., is  polarized along some axis/issue. However, real-world electorates are not truly single-peaked — for example, there may be some maverick voters — and to take this into account, we study the complexity of manipulative-action algorithms for  the case of nearly single-peaked electorates.


Computational Aspects of Nearly Single-Peaked Electorates

Erdélyi, Gábor (University of Siegen) | Lackner, Martin (Vienna University of Technology) | Pfandler, Andreas (Vienna University of Technology)

AAAI Conferences

Manipulation, bribery, and control are well-studied ways of changing the outcome of an election. Many voting systems are, in the general case, computationally resistant to some of these manipulative actions. However when restricted to single-peaked electorates, these systems suddenly become easy to manipulate. Recently, Faliszewski, Hemaspaandra, and Hemaspaandra studied the complexity of dishonest behavior in nearly single-peaked electorates. These are electorates that are not single-peaked but close to it according to some distance measure. In this paper we introduce several new distance measures regarding single-peakedness. We prove that determining whether a given profile is nearly single-peaked is NP-complete in many cases. For one case we present a polynomial-time algorithm. Furthermore, we explore the relations between several notions of nearly single-peakedness.


Bypassing Combinatorial Protections: Polynomial-Time Algorithms for Single-Peaked Electorates

Brandt, Felix (Ludwig-Maximilians-Universität München) | Brill, Markus (Ludwig-Maximilians-Universität München) | Hemaspaandra, Edith (Rochester Institute of Technology) | Hemaspaandra, Lane A. (University of Rochester)

AAAI Conferences

For many election systems, bribery (and related) attacks have been shown NP-hard using constructions on combinatorially rich structures such as partitions and covers. It is important to learn how robust these hardness protection results are, in order to find whether they can be relied on in practice. This paper shows that for voters who follow the most central political-science model of electorates — single-peaked preferences — those protections vanish. By using single-peaked preferences to simplify combinatorial covering challenges, we show that NP-hard bribery problems — including those for Kemeny and Llull elections- — fall to polynomial time. By using single-peaked preferences to simplify combinatorial partition challenges, we show that NP-hard partition-of-voters problems fall to polynomial time. We furthermore show that for single-peaked electorates, the winner problems for Dodgson and Kemeny elections, though Θ 2 p -complete in the general case, fall to polynomial time. And we completely classify the complexity of weighted coalition manipulation for scoring protocols in single-peaked electorates.