When Are Elections with Few Candidates Hard to Manipulate V. Conitzer, T. Sandholm, and J. Lang Subhash Arja CS 286r October 29, 2008.

Slides:



Advertisements
Similar presentations
On the Robustness of Preference Aggregation in Noisy Environments Ariel D. Procaccia, Jeffrey S. Rosenschein and Gal A. Kaminka.
Advertisements

The Computational Difficulty of Manipulating an Election Tetiana Zinchenko 05/12/
Common Voting Rules as Maximum Likelihood Estimators Vincent Conitzer (Joint work with Tuomas Sandholm) Early version of this work appeared in UAI-05.
Presented by: Katherine Goulde
Voting and social choice Vincent Conitzer
How Hard Is It To Manipulate Voting? Edith Elkind, U. of Warwick Helger Lipmaa, Tartu U.
Algorithmic Game Theory Uri Feige Robi Krauthgamer Moni Naor Lecture 9: Social Choice Lecturer: Moni Naor.
CS 886: Electronic Market Design Social Choice (Preference Aggregation) September 20.
An Approximate Truthful Mechanism for Combinatorial Auctions An Internet Mathematics paper by Aaron Archer, Christos Papadimitriou, Kunal Talwar and Éva.
Complexity of manipulating elections with few candidates Vincent Conitzer and Tuomas Sandholm Carnegie Mellon University Computer Science Department.
Computing Kemeny and Slater Rankings Vincent Conitzer (Joint work with Andrew Davenport and Jayant Kalagnanam at IBM Research.)
Manipulation Toby Walsh NICTA and UNSW. Manipulation Constructive  Can we change result so a given candidate wins Destructive  Can we change result.
+ Random Tie Breaking Toby Walsh NICTA and UNSW. + Random Tie Breaking Haris Aziz, Serge Gaspers, Nick Mattei, Nina Narodytska, Toby Walsh NICTA and UNSW.
Using computational hardness as a barrier against manipulation Vincent Conitzer
Using computational hardness as a barrier against manipulation Vincent Conitzer
The Distortion of Cardinal Preferences in Voting Ariel D. Procaccia and Jeffrey S. Rosenschein.
Speaker: Ariel Procaccia Joint work with: Michael Zuckerman, Jeff Rosenschein Hebrew University of Jerusalem.
Ties Matter: Complexity of Voting Manipulation Revisited based on joint work with Svetlana Obraztsova (NTU/PDMI) and Noam Hazon (CMU) Edith Elkind (Nanyang.
Preference elicitation Vincent Conitzer
CPS Voting and social choice
Social choice theory = preference aggregation = voting assuming agents tell the truth about their preferences Tuomas Sandholm Professor Computer Science.
An Algorithm for Automatically Designing Deterministic Mechanisms without Payments Vincent Conitzer and Tuomas Sandholm Computer Science Department Carnegie.
CS 206 Introduction to Computer Science II 12 / 05 / 2008 Instructor: Michael Eckmann.
How Hard Is It To Manipulate Voting? Edith Elkind, Princeton Helger Lipmaa, HUT.
CS 206 Introduction to Computer Science II 12 / 03 / 2008 Instructor: Michael Eckmann.
Junta Distributions and the Average Case Complexity of Manipulating Elections A. D. Procaccia & J. S. Rosenschein.
Common Voting Rules as Maximum Likelihood Estimators Vincent Conitzer and Tuomas Sandholm Carnegie Mellon University, Computer Science Department.
Complexity of unweighted coalitional manipulation under some common voting rules Lirong XiaVincent Conitzer COMSOC08, Sep. 3-5, 2008 TexPoint fonts used.
Complexity of Mechanism Design Vincent Conitzer and Tuomas Sandholm Carnegie Mellon University Computer Science Department.
Reshef Meir School of Computer Science and Engineering Hebrew University, Jerusalem, Israel Joint work with Maria Polukarov, Jeffery S. Rosenschein and.
Social choice theory = preference aggregation = truthful voting Tuomas Sandholm Professor Computer Science Department Carnegie Mellon University.
Strategic Behavior in Multi-Winner Elections A follow-up on previous work by Ariel Procaccia, Aviv Zohar and Jeffrey S. Rosenschein Reshef Meir The School.
Introduction complexity has been suggested as a means of precluding strategic behavior. Previous studies have shown that some voting protocols are hard.
Social choice (voting) Vincent Conitzer > > > >
Online Manipulation and Control in Sequential Voting Lane A. Hemaspaandra Jörg Rothe Edith Hemaspaandra.
Historically Interesting Voting Rules: Electing the Doge Lirong Xia Toby Walsh Auckland, Feb 20 th 2012.
An efficient distributed protocol for collective decision- making in combinatorial domains CMSS Feb , 2012 Minyi Li Intelligent Agent Technology.
CPS Voting and social choice Vincent Conitzer
An Algorithm for the Coalitional Manipulation Problem under Maximin Michael Zuckerman, Omer Lev and Jeffrey S. Rosenschein AAMAS’11.
An Algorithm for the Coalitional Manipulation Problem under Maximin Michael Zuckerman, Omer Lev and Jeffrey S. Rosenschein (Simulations by Amitai Levy)
Projektseminar Computational Social Choice -Eine Einführung- Jörg Rothe & Lena Schend SS 2012, HHU Düsseldorf 4. April 2012.
Mechanism design for computationally limited agents (previous slide deck discussed the case where valuation determination was complex) Tuomas Sandholm.
Incompleteness and incomparability in preference aggregation: complexity results M. Silvia Pini*, Francesca Rossi*, K. Brent Venable*, and Toby Walsh**
Elections and Strategic Voting: Condorcet and Borda E. Maskin Harvard University.
Optimal Manipulation of Voting Rules Edith Elkind Nanyang Technological University, Singapore (based on joint work with Svetlana Obraztsova)
Complexity of Determining Nonemptiness of the Core Vincent Conitzer, Tuomas Sandholm Computer Science Department Carnegie Mellon University.
CS 206 Introduction to Computer Science II 04 / 22 / 2009 Instructor: Michael Eckmann.
Junta Distributions and the Average-Case Complexity of Manipulating Elections A presentation by Jeremy Clark Ariel D. Procaccia Jeffrey S. Rosenschein.
Mechanism design (strategic “voting”) Tuomas Sandholm Professor Computer Science Department Carnegie Mellon University.
Avoiding manipulation in elections through computational complexity Vincent Conitzer Computer Science Department Carnegie Mellon University Guest lecture.
Social choice theory = preference aggregation = voting assuming agents tell the truth about their preferences Tuomas Sandholm Professor Computer Science.
How Should Presidents Be Elected? E. Maskin Institute for Advanced Study.
11/24/2008CS Common Voting Rules as Maximum Likelihood Estimators - Matthew Kay 1 Common Voting Rules as Maximum Likelihood Estimators Vincent Conitzer,
Voting Theory Part II: Solutions. Proposed Solutions Approval Voting Range Voting Instant Runoff Voting Borda Count Modifications –Borda Preferendum –Quota.
Mechanism design for computationally limited agents (previous slide deck discussed the case where valuation determination was complex) Tuomas Sandholm.
Mechanism design for computationally limited agents (last lecture discussed the case where valuation determination was complex) Tuomas Sandholm Computer.
Complexity of Determining Nonemptiness of the Core
Failures of the VCG Mechanism in Combinatorial Auctions and Exchanges
Social choice theory = preference aggregation = voting assuming agents tell the truth about their preferences Tuomas Sandholm Professor Computer Science.
Applied Mechanism Design For Social Good
Computational Social Choice and Moral Artificial Intelligence
Manipulation Lirong Xia Fall, Manipulation Lirong Xia Fall, 2016.
Voting systems Chi-Kwong Li.
Voting and social choice
Vincent Conitzer Mechanism design Vincent Conitzer
Vincent Conitzer CPS 173 Mechanism design Vincent Conitzer
Preference elicitation/ iterative mechanisms
CPS 173 Voting and social choice
Approximability of Manipulating Elections
CPS Voting and social choice
Presentation transcript:

When Are Elections with Few Candidates Hard to Manipulate V. Conitzer, T. Sandholm, and J. Lang Subhash Arja CS 286r October 29, 2008

Motivation Avoid coalitional manipulation by a group of weighted voters in regular voting protocols. Study constructive manipulation and destructive manipulation Find the exact number of candidates that makes manipulation hard Expand this result to manipulation by an individual in un-weighted and uncertain setting.

Outline Prior Work Background information – Voting protocols – Conditions Proof of easiness for constant number of candidates Proof of NP-hard through reduction of Partition problem Extend to case of destructive manipulation and weighted voters Conclusion and future work

Applications Political elections Surveys Shareholder meetings Allocation of goods and resources Any application where the goal to achieve optimal preference aggregation.

Prior Work Number of candidates and voters was unbounded Method 1: Voters’ preferences are restricted – Problem: protocol designer cannot guarantee that the agents’ preferences fall within restrictions Method 2: randomization approach – Problem: too much noise, could introduce manipulation possibilities Method 3: make it hard to manipulate so agents will be unlikely to succeed.

Voting Protocols Positional scoring protocols – α = (α 1, α 2,…, α m ) where α 1 ≥ α 2 ≥ … ≥ α m – For each voter, a candidate receives α 1 if it is ranked first by the voter, etc. The score of a candidate is the total number of points he receives. – Examples: Borda, plurality, veto Maximin – For two distinct candidates, i and j, N(i,j) = number of voters who prefer i to j. The score of i is s(i) = min j≠i N(i,j) Copeland – For two distinct candidates, i and j, let C(i,j) = 1 if N(i,j) > N(j,i), C(i,j) = 0 if N(i,j) = N(j,i), and C(i,j) = -1 if N(i,j) < N(j,i) – Score of candidate: s(i) = ∑ j≠i C(i,j)

Voting Protocols Single Transferable Vote (STV) – Series of m-1 rounds. – In each round, candidate with the lowest number of voters ranking it first among the remaining candidates is eliminated. – Votes for that candidate transfer to the next remaining candidate. Plurality with Run-off – All candidates except two with the highest plurality scores. – Scores are transferred to the winners and second round determines the winner.

Voting Protocols Cup – Balanced binary tree with each leaf representing each candidate. – Each non-leaf node is assigned the winner of its children. – In randomized version, assignment of candidates to leaves is chosen at random after voters have voted.

Conditions Complete information – hardness results directly imply hardness for the incomplete information setting Coalitional Manipulation – individuals have a small effect on the outcome Weighted voters – the case of un-weighted voters is easy. Constructive and Destructive

Easiness Results Plurality protocol: constructive manipulation can be solved in polynomial time (any number of candidates) – Proof: manipulators check if p will win if they vote for p. Otherwise, they cannot make p win. Cup protocol: constructive manipulation can be solved in polynomial time for any number of candidates – Proof: key claim is that a candidate can win a sub-election iff it can win one of its children and beat the potential winners of the sibling child. – Coalition ranks all candidates in p’s half above those in h’s half. h = potential winner of other half. – When p and h win their halves, p will defeat h in the final.

Easiness Results Copeland protocol: easy if there are 3 candidates and all manipulators vote identically – Proof: involves four cases 1.Weights of manipulators’ votes are greater than weights for nonmanipulators votes for both candidates other than p. – Any configuration of votes where p ranks first wins the election. 2.Weights of manipulators’ votes are equal to that of nonmanipulators for one candidate and greater for the other candidate (K > D s (a,p) and K = D s (b,p) ) – It is proven that all manipulators must vote in the order (p,a,b)

Easiness Results 3.Same case as above but reverse “a” and “b” 4.Weights of manipulators’ votes are less than weights of nonmanipulators’ votes. (K < D s (a,p) and K < D s (b,p)) – p cannot be guaranteed to win, therefore there is no successful manipulation Maximin protocol: easy with 3 candidates and all manipulators vote identically. – Proof: all manipulators set p as rank 1 and two cases involve the ranking of other two candidates. – When all of the coalition votes same way for other two candidates with p as rank 1, p will win. Randomized cup protocol: easy if there are six candidates and all manipulators vote identically. – Proof: divide candidates into two sets – B = candidates that defeat p and G = candidates that p defeats

Easiness Results – Have to make sure that p doesn’t face an opponent from set B. – Rest of the proof goes over how the manipulators should choose the order of candidates within B and within G.

Hardness Results Basic idea: proved P results for protocols with l candidates and now prove each is NP-complete for l+1 candidates. Partition problem: given a set of S of integers, determine two disjoint subsets S 1 and S 2 where sum(S 1 ) = sum(S 2 ) – NP-complete problem. – Use reduction from the Partition problem to show that a protocol is NP-complete. – All the proofs use this idea with variations. S = non-manipulators’ votes, T = weights of manipulators’ votes, and K = total weight in T.

Hardness Results Any positional scoring rule other than the plurality protocol is NP-complete for 3 candidates -Proof: one half of the partition in T are (p,a,b) and the other half is (p,b,a) => this makes p the winner -This only happens in the case where the total weight of the voters voting (p,a,b) equals the total weight of the manipulators voting (p,b,a). Copeland Protocol: manipulation is NP-complete for 4 candidates. – Proof: p wins if two other candidates tie, and the third loses. – This only happens if the combined weight of the manipulators’ votes maintain this tie => requires a partition.

Hardness Results Maximin protocol: manipulation is NP- complete for 4 candidates STV protocol: manipulation is NP-complete for 3 candidates Plurality with Runoff: NP-complete for 3 candidates

Destructive Manipulation Destructive manipulation can never be harder than constructive manipulation. Can be done in polynomial time for veto, Borda, Copeland, and maximin protocols – Proof: each colluder places candidate h at the bottom and order the other candidates in any order. – A total of m-1 winner determinations are done to and each winner determination is in P.

Destructive Manipulation STV Protocol: with 3 candidates, manipulation is NP-complete – Proof: reduce partition to case where three candidates are a, b, and h. – Show that in T for every k i there is a vote of weight 2k i Plurality with runoff: with 3 candidates, manipulation is NP-complete – Proof: coincides with the STV protocol for 3 candidates.

Uncertainty about others’ votes Only the distribution over the other voters is known – Restricted probability distributions. Overall conclusions: – With weighted voters, whenever coalitional manipulation is hard, evaluating a candidate’s probability to win is hard when there is uncertainty. Individual manipulation is also hard – An individual cannot find the strategically optimal vote for him to make.

Uncertainty about others’ votes Approval protocol: each candidate either approves or disapproves of a candidate – Easy for constructive, non-weighted case. – In weighted case, manipulation is NP-hard

Un-weighted Voters Special case of weighted voting where each vote is assigned the same weight. General conclusion: – For every protocol that is hard in the weighted case, it is also hard in the un-weighted case.

Conclusions # of candidates234,5,6≥ 7 BordaPNP-complete VetoPNP-complete STVPNP-complete Plurality w/ runoffPNP-complete CopelandPPNP-complete MaximinPPNP-complete Randomized CupPPPNP-complete Regular cupPPPP pluralityPPPP Adopted from V. Conitzer, et al. Constructive CW-Manipulation

Conclusions Adopted from V. Conitzer, et al. Destructive CW-Manipulation Number of Candidates23 STVPNP-complete Plurality with runoffPNP-complete BordaPP VetoPP CopelandPP MaximinPP Regular cupPP PluralityPP

Future Work Ideal case: make all or most instances hard to manipulate. Prove hardness of protocols that are more restricted (e.g. auctions) “Can manipulation be made hard for most instances?” It is too much to ask for every instance hard to manipulate. Combine some amount of randomization with computational complexity. Pivotal voters will not benefit or lose from the chosen candidate. – Pivotal voters could be “banished”. – Achieve a middle ground between making voting truthfully a dominant strategy and altering the definition of the voting rule.

Future Work Make the voting rule itself hard to execute. – Simulations become complex and manipulation is thwarted. – Disadvantage: determining the election winner also becomes difficult.