Bypassing combinatorial protections: Polynomial-time algorithms for single-peaked electorates

Felix Brandt, Markus Brill, Edith Hemaspaandra, Lane A. Hemaspaandra

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

48 Scopus citations

Abstract

For many election systems, bribery (and related) attacks have been shown NP-hard using constructions on combinatori-ally rich structures such as partitions and covers. It is important to learn how robust these hardness protection results are, in order to find whether they can be relied on in practice. This paper shows that for voters who follow the most central political-science model of electorates-single-peaked preferences-those protections vanish. By using single-peaked preferences to simplify combinatorial covering challenges, we show that NP-hard bribery problems-including those for Kemeny and Llull elections-fall to polynomial time. By using single-peaked preferences to simplify combinatorial partition challenges, we show that NP-hard partition-of-voters problems fall to polynomial time. We furthermore show that for single-peaked electorates, the winner problems for Dodgson and Kemeny elections, though ⊖2p-complete in the general case, fall to polynomial time. And we completely classify the complexity of weighted coalition manipulation for scoring protocols in single-peaked electorates.

Original languageEnglish
Title of host publicationAAAI-10 / IAAI-10 - Proceedings of the 24th AAAI Conference on Artificial Intelligence and the 22nd Innovative Applications of Artificial Intelligence Conference
PublisherAI Access Foundation
Pages715-722
Number of pages8
ISBN (Print)9781577354659
StatePublished - 2010
Externally publishedYes
Event24th AAAI Conference on Artificial Intelligence and the 22nd Innovative Applications of Artificial Intelligence Conference, AAAI-10 / IAAI-10 - Atlanta, GA, United States
Duration: 11 Jul 201015 Jul 2010

Publication series

NameProceedings of the National Conference on Artificial Intelligence
Volume2

Conference

Conference24th AAAI Conference on Artificial Intelligence and the 22nd Innovative Applications of Artificial Intelligence Conference, AAAI-10 / IAAI-10
Country/TerritoryUnited States
CityAtlanta, GA
Period11/07/1015/07/10

Fingerprint

Dive into the research topics of 'Bypassing combinatorial protections: Polynomial-time algorithms for single-peaked electorates'. Together they form a unique fingerprint.

Cite this