Bypassing Combinatorial Protections
Polynomial-Time Algorithms for Single-Peaked Electorates
Markus Brill
COMSOC 2010 Düsseldorf Joint work with Felix Brandt, Edith Hemaspaandra, and Lane Hemaspaandra
Bypassing Combinatorial Protections Polynomial-Time Algorithms for - - PowerPoint PPT Presentation
Bypassing Combinatorial Protections Polynomial-Time Algorithms for Single-Peaked Electorates Markus Brill COMSOC 2010 Dsseldorf Joint work with Felix Brandt, Edith Hemaspaandra, and Lane Hemaspaandra Voting Rules C = {a,b,c,...} is a
COMSOC 2010 Düsseldorf Joint work with Felix Brandt, Edith Hemaspaandra, and Lane Hemaspaandra
Bypassing Combinatorial Protections
2
Bypassing Combinatorial Protections
(majority graphs)
pairwise defeats
Condorcet winners whenever at least one exists
defeats
3
Bypassing Combinatorial Protections
(e.g., bribery, campaigning, strategic manipulation)
(e.g., introducing primaries, adding/deleting voters and/or candidates)
combinatorial challenges (e.g., covering or partition problems) [BTT 1989]
4
Bypassing Combinatorial Protections
5
25 50 75 100
Jörg Vince Markus
€50 €75 €0 €25 €100 €25 €75 €50 €50 €0 €25 €75 €100 €0 €100
Bypassing Combinatorial Protections
approved candidates form an interval
in polynomial time [BT 1986]
(nice characterization in terms of median voters)
6
25 50 75 100
Bypassing Combinatorial Protections
approval bribery is in P
7
v7 v6 v5 v4 v3 v2 v1 sc’(p)=sc(p)+k sc(c)>sc’(p)
Bypassing Combinatorial Protections
approval bribery is in P
weakCondorcet rules
Young, Llull, Kemeny, Schwartz, Nanson, etc.
8
Bypassing Combinatorial Protections
Young’s rule
all weakCondorcet rules
this problem is in P for all weakCondorcet rules
9
2x 1x 2x 1x b a c a a b a c c c b b
Bypassing Combinatorial Protections
10
Bypassing Combinatorial Protections
11