Abstract
Computational complexity may truly be the shield against election manipulation.
- Ajtai, M. Worst-case complexity, average-case complexity and lattice problems. Documenta Mathematica, Extra Volume ICM III (1998), 421--428.Google Scholar
- Bartholdi, III, J. and Orlin, J. Single transferable vote resists strategic voting. Social Choice and Welfare 8, 4 (1991) 341--354.Google ScholarCross Ref
- Bartholdi, III, J., Tovey, C. and Trick, M. The computational difficulty of manipulating an election. Social Choice and Welfare 6, 3 (1989) 227--241.Google ScholarCross Ref
- Bartholdi, III, J., Tovey, C. and Trick, M. Voting schemes for which it can be difficult to tell who won the election. Social Choice and Welfare 6, 2 (1989) 157--165.Google ScholarCross Ref
- Bartholdi, III, J., Tovey, C. and Trick, M. How hard is it to control an election? Mathematical and Computer Modeling 16, 8/9 (1992), 27--40.Google ScholarDigital Library
- Betzler, N., Fellows, M., Guo, J., Niedermeier, R. and Rosamond, F. Fixed-parameter algorithms for Kemeny scores. In Proceedings of the 4th International Conference on Algorithmic Aspects in Information and Management. Lecture Notes in Computer Science #5034 (June 2008). Springer-Verlag, 60--71. Google ScholarDigital Library
- Betzler, N., Guo, J., Niedermeier, R. Parameterized computational complexity of Dodgson and Young elections. In Proceedings of the 11th Scandinavian Workshop on Algorithm Theory. Lecture Notes in Computer Science #5124 (July 2008). Springer-Verlag, 402--413. Google ScholarDigital Library
- Brelsford, E., Faliszewski, P., Hemaspaandra, E., Schnoor, H., and Schnoor, I. Approximability of manipulating elections. In Proceedings of the 23rd AAAI Conference on Artificial Intelligence (July 2008). AAAI Press, 44--49. Google ScholarDigital Library
- Caragiannis, I., Covey, J., Feldman, M., Homan, C. Kaklamanis, C., Karanikolas, N., Procaccia, A. and Rosenschein, J. On the approximability of Dodgson and Young elections. In Proceedings of the 20th Annual ACM-SIAM Symposium on Discrete Algorithms (Jan. 2009). Society for Industrial and Applied Mathematics, 1058--1067. Google ScholarDigital Library
- Chevaleyre, Y., Endriss, U., Lang, J. and Maudet, N. A short introduction to computational social choice. In Proceedings of the 33rd International Conference on Current Trends in Theory and Practice of Computer Science. Lecture Notes in Computer Science #4362 (Jan. 2007). Springer-Verlag, 51--69. Google ScholarDigital Library
- Christian, R., Fellows, M., Rosamond, F. and Slinko, A. On complexity of lobbying in multiple referenda. Review of Economic Design 11, 3 (2007), 217--224.Google ScholarCross Ref
- Conitzer, V., Davenport, A. and Kalagnanam, J. Improved bounds for computing Kemeny rankings. In Proceedings of the 21st National Conference on Artificial Intelligence (July 2006). AAAI Press, 620--626. Google ScholarDigital Library
- Conitzer, V., and Sandholm, T. Universal voting protocol tweaks to make manipulation hard. In Proceedings of the 18th International Joint Conference on Artificial Intelligence (Aug. 2003). Morgan Kaufmann, 781--788. Google ScholarDigital Library
- Conitzer, V. and Sandholm, T. Nonexistence of voting rules that are usually hard to manipulate. In Proceedings of the 21st National Conference on Artificial Intelligence (July 2006). AAAI Press, 627--634. Google ScholarDigital Library
- Conitzer, V., Sandholm, T. and Lang, J. When are elections with few candidates hard to manipulate? Journal of the ACM 54, 3 (2007), Article 14. Google ScholarDigital Library
- Dobzinski, S. and Procaccia, A. Frequent manipulability of elections: The case of two voters. In Proceedings of the 4th International Workshop on Internet and Network Economics. (Dec. 2008). Springer-Verlag Lecture Notes in Computer Science #5385, 653--664 Google ScholarDigital Library
- Duggan, J. and Schwartz, T. Strategic manipulability without resoluteness or shared beliefs: Gibbard--Satterthwaite generalized. Social Choice and Welfare 17, 1 (2000), 85--93Google ScholarCross Ref
- Dwork, C., Kumar, R., Naor, M. and Sivakumar, D. Rank aggregation methods for the Web. In Proceedings of the 10th International World Wide Web Conference (Mar. 2001). ACM Press, NY, 613--622. Google ScholarDigital Library
- Elkind, E. and Lipmaa, H. Hybrid voting protocols and hardness of manipulation. In Proceedings of the 16th Annual International Symposium on Algorithms and Computation (Dec. 2005). Springer-Verlag Lecture Notes in Computer Science #3872, 206--215. Google ScholarDigital Library
- Ephrati, E. and Rosenschein, J. A heuristic technique for multi-agent planning. Annals of Mathematics and Artificial Intelligence 20, 1--4 (1997), 13--67. Google ScholarDigital Library
- Erdélyi, G., Hemaspaandra, L., Rothe, J. and Spakowski, H. Generalized juntas and NP-hard sets. Theoretical Computer Science 410, 38--40 (2009), 3995--4000. Google ScholarDigital Library
- Erdélyi, G., Nowak, M. and Rothe, J. Sincere-strategy preference-based approval voting fully resists constructive control and broadly resists destructive control. Mathematical Logic Quarterly 55, 4 (2009), 425--443.Google ScholarCross Ref
- Faliszewski, P. Nonuniform bribery (short paper). In Proceedings of the 7th International Conference on Autonomous Agents and Multiagent Systems (May 2008), 1569--1572. Google ScholarDigital Library
- Faliszewski, P., Hemaspaandra, E. and Hemaspaandra, L. How hard is bribery in elections? Journal of Artificial Intelligence Research 35 (2009), 485--532. Google ScholarCross Ref
- Faliszewski, P., Hemaspaandra, E., Hemaspaandra, L. and Rothe, J. Llull and Copeland voting computationally resist bribery and constructive control. Journal of Artificial Intelligence Research 35 (2009), 275--341. Google ScholarDigital Library
- Faliszewski, P., Hemaspaandra, E., Hemaspaandra, L. and Rothe, J. A richer understanding of the complexity of election systems. In Fundamental Problems in Computing: Essays in Honor of Professor Daniel J. Rosenkrantz. S. Ravi and S. Shukla, eds. Springer, 2009, 375--406.Google Scholar
- Faliszewski, P., Hemaspaandra, E., Hemaspaandra, L. and Rothe, J. The shield that never was: Societies with single-peaked preferences are more open to manipulation and control. In Proceedings of the 12th Conference on Theoretical Aspects of Rationality and Knowledge (July 2009). ACM Digital Library, 118--127. Google ScholarDigital Library
- Friedgut, E., Kalai, G. and Nisan, N. Elections can be manipulated often. In Proceedings of the 49th IEEE Symposium on Foundations of Computer Science (Oct. 2008). IEEE Computer Society, 243--249. Google ScholarDigital Library
- Hemaspaandra, E., Hemaspaandra, L. Dichotomy for voting systems. Journal of Computer and System Sciences 73, 1 (2007), 73--83. Google ScholarDigital Library
- Hemaspaandra, E., Hemaspaandra, L. and Rothe, J. Exact analysis of Dodgson elections: Lewis Carroll's 1876 voting system is complete for parallel access to NP. Journal of the ACM 44, 6 (1997), 806--825. Google ScholarDigital Library
- Hemaspaandra, E., Hemaspaandra, L. and Rothe, J. Anyone but him: The complexity of precluding an alternative. Artificial Intelligence 171, 5--6 (2007), 255--285. Google ScholarDigital Library
- Hemaspaandra, E., Hemaspaandra, L. and Rothe, J. Hybrid elections broaden complexity-theoretic resistance to control. Mathematical Logic Quarterly 55, 4 (2009), 397--424.Google ScholarCross Ref
- Hemaspaandra, E., Spakowski, H. and Vogel, J. The complexity of Kemeny elections. Theoretical Computer Science 349, 3 (2005), 382--391. Google ScholarDigital Library
- Hemaspaandra, L. and Zimand, M. Strong self-reducibility precludes strong immunity. Mathematical Systems Theory 29, 5 (1996), 535--548.Google ScholarCross Ref
- Homan, C. and Hemaspaandra, L. Guarantees for the success frequency of an algorithm for finding Dodgson-election winners. Journal of Heuristics 15, 4 (2009), 403--423. Google ScholarDigital Library
- Kenyon-Mathieu, C. and Schudy, W. How to rank with few errors. In Proceedings of the 39th ACM Symposium on Theory of Computing (June 2007). ACM Press, 95--103. Google ScholarDigital Library
- Levin, L. Average case complete problems. SIAM Journal of Computing 15, 1 (1986), 285--286. Google ScholarDigital Library
- Li, M. and Vitányi, P. Average case complexity under the universal distribution equals worst-case complexity. Information Processing Letters 42, 3 (1992), 145--149. Google ScholarDigital Library
- McCabe-Dansted, J., Pritchard, G. and Slinko, A. Approximability of Dodgson's rule. Social Choice and Welfare 31, 2 (2008), 311--330.Google ScholarCross Ref
- Meir, R., Procaccia, A., Rosenschein, J. and Zohar, A. The complexity of strategic behavior in multi-winner elections. Journal of Artificial Intelligence Research 33 (2008), 149--178. Google ScholarDigital Library
- Pennock, D., Horvitz, E. and Giles, C. Social choice theory and recommender systems: Analysis of the axiomatic foundations of collaborative filtering. In Proceedings of the 17th National Conference on Artificial Intelligence (July/Aug. 2000). AAAI Press, 729--734. Google ScholarDigital Library
- Procaccia, A. and Rosenschein, J. Junta distributions and the average-case complexity of manipulating elections. Journal of Artificial Intelligence Research 28 (2007), 157--181. Google ScholarDigital Library
- Rothe, J., Spakowski, H. and Vogel, J. Exact complexity of the winner problem for Young elections. Theory of Computing Systems 36, 4 (2003), 375--386.Google ScholarCross Ref
- Schöning, U. Complete sets and closeness to complexity classes. Mathematical Systems Theory 19, 1 (1986), 29--42.Google ScholarCross Ref
- Simon, H. The Sciences of the Artificial. MIT Press, 1969. Third edition, 1996. Google ScholarDigital Library
- Walsh, T. Uncertainty in preference elicitation and aggregation. In Proceedings of the 22nd AAAI Conference on Artificial Intelligence (July 2007), AAAI Press, 3--8. Google ScholarDigital Library
- Xia, L. and Conitzer, V. Generalized scoring rules and the frequency of coalitional manipulability. In Proceedings of the 9th ACM Conference on Electronic Commerce (July 2008). ACM Press, NY, 109--118. Google ScholarDigital Library
- Xia, L. and Conitzer, V. A sufficient condition for voting rules to be frequently manipulable. In Proceedings of the 9th ACM Conference on Electronic Commerce (July 2008). ACM Press, NY, 99--108. Google ScholarDigital Library
- Zuckerman, M. Procaccia, A. and Rosenschein, J. Algorithms for the coalitional manipulation problem. Artificial Intelligence 173, 2 (2009), 392--412. Google ScholarDigital Library
Index Terms
- Using complexity to protect elections
Recommendations
The complexity of bribery in elections
AAAI'06: Proceedings of the 21st national conference on Artificial intelligence - Volume 1We study the complexity of influencing elections through bribery: How computationally complex is it for an external actor to determine whether by a certain amount of bribing voters a specified candidate can be made the election's winner? We study this ...
Computational Complexity Characterization of Protecting Elections from Bribery
Computing and CombinatoricsAbstractThe bribery problem in election has received considerable attention in the literature, upon which various algorithmic and complexity results have been obtained. It is thus natural to ask whether we can protect an election from potential bribery. ...
Complexity of Shift Bribery in Iterative Elections
AAMAS '18: Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent SystemsIn iterative voting systems, candidates are eliminated in consecutive rounds until either a fixed number of rounds is reached or the set of remaining candidates does not change anymore. We focus on iterative voting systems based on the positional ...
Comments