Overview of Computational Foundations of Social Choice GASICS Workshop Aachen, October 2009 Jörg Rothe.

Slides:



Advertisements
Similar presentations
Manipulation and Control for Approval Voting and Other Voting Systems Jörg Rothe Oxford Meeting for COST Action IC1205 on Computational Social Choice April.
Advertisements

1 AI and Economics: The Dynamic Duo Ariel Procaccia Center for Research on Computation and Society Harvard SEAS AI AND ECONOMICS DYNAMIC DUO THE.
The Computational Difficulty of Manipulating an Election Tetiana Zinchenko 05/12/
Voting and social choice Vincent Conitzer
Algorithmic Game Theory Uri Feige Robi Krauthgamer Moni Naor Lecture 9: Social Choice Lecturer: Moni Naor.
Voting and social choice Looking at a problem from the designers point of view.
Speaker: Ariel Procaccia 1 Joint work with: Ioannis Caragiannis 2, Jason Covey 3, Michal Feldman 1, Chris Homan 3, Christos Kaklamanis 2, Nikos Karanikolas.
CS 886: Electronic Market Design Social Choice (Preference Aggregation) September 20.
Complexity of manipulating elections with few candidates Vincent Conitzer and Tuomas Sandholm Carnegie Mellon University Computer Science Department.
Computing Kemeny and Slater Rankings Vincent Conitzer (Joint work with Andrew Davenport and Jayant Kalagnanam at IBM Research.)
Arrow’s impossibility theorem EC-CS reading group Kenneth Arrow Journal of Political Economy, 1950.
Llull and Copeland Voting Computationally Resist Bribery and Control Piotr Faliszewski University of Rochester Jörg Rothe Heinrich-Heine-Universität Düsseldorf.
Manipulation Toby Walsh NICTA and UNSW. Manipulation Constructive  Can we change result so a given candidate wins Destructive  Can we change result.
The Complexity of Elections: A New Domain for Heuristic Computation Piotr Faliszewski AGH University of Science and Technology, Kraków, Poland
Socially desirable approximations for Dodgson’s voting rule Ioannis Caragiannis (University of Patras) Christos Kaklamanis (University of Patras) Nikos.
Using computational hardness as a barrier against manipulation Vincent Conitzer
Using computational hardness as a barrier against manipulation Vincent Conitzer
Edith Elkind Nanyang Technological University, Singapore Piotr Faliszewski AGH Univeristy of Science and Technology, Poland Arkadii Slinko University of.
Where are the hard manipulation problems? Toby Walsh NICTA and UNSW Sydney Australia LogICCC Day, COMSOC 2010.
Manipulation and Control in Weighted Voting Games Based on: Bachrach, Elkind, AAMAS’08 Zuckerman, Faliszewski, Bachrach, Elkind, AAAI’08.
Speaker: Ariel Procaccia Joint work with: Michael Zuckerman, Jeff Rosenschein Hebrew University of Jerusalem.
Ties Matter: Complexity of Voting Manipulation Revisited based on joint work with Svetlana Obraztsova (NTU/PDMI) and Noam Hazon (CMU) Edith Elkind (Nanyang.
The Complexity of Llull’s Thirteenth-Century Election System
Preference elicitation Vincent Conitzer
CPS Voting and social choice
Social choice theory = preference aggregation = voting assuming agents tell the truth about their preferences Tuomas Sandholm Professor Computer Science.
Social Choice Theory By Shiyan Li. History The theory of social choice and voting has had a long history in the social sciences, dating back to early.
Junta Distributions and the Average Case Complexity of Manipulating Elections A. D. Procaccia & J. S. Rosenschein.
Complexity of unweighted coalitional manipulation under some common voting rules Lirong XiaVincent Conitzer COMSOC08, Sep. 3-5, 2008 TexPoint fonts used.
Reshef Meir School of Computer Science and Engineering Hebrew University, Jerusalem, Israel Joint work with Maria Polukarov, Jeffery S. Rosenschein and.
Social choice theory = preference aggregation = truthful voting Tuomas Sandholm Professor Computer Science Department Carnegie Mellon University.
Strategic Behavior in Multi-Winner Elections A follow-up on previous work by Ariel Procaccia, Aviv Zohar and Jeffrey S. Rosenschein Reshef Meir The School.
Preference Aggregation on Structured Preference Domains Edith Elkind University of Oxford.
Computational aspects of stability in weighted voting games Edith Elkind (NTU, Singapore) Based on joint work with Leslie Ann Goldberg, Paul W. Goldberg,
Introduction complexity has been suggested as a means of precluding strategic behavior. Previous studies have shown that some voting protocols are hard.
Social choice (voting) Vincent Conitzer > > > >
Online Manipulation and Control in Sequential Voting Lane A. Hemaspaandra Jörg Rothe Edith Hemaspaandra.
An efficient distributed protocol for collective decision- making in combinatorial domains CMSS Feb , 2012 Minyi Li Intelligent Agent Technology.
Voting Geometry: A Mathematical Study of Voting Methods and Their Properties Alan T. Sherman Dept. of CSEE, UMBC March 27, 2006.
CPS Voting and social choice Vincent Conitzer
An Algorithm for the Coalitional Manipulation Problem under Maximin Michael Zuckerman, Omer Lev and Jeffrey S. Rosenschein AAMAS’11.
An Algorithm for the Coalitional Manipulation Problem under Maximin Michael Zuckerman, Omer Lev and Jeffrey S. Rosenschein (Simulations by Amitai Levy)
Projektseminar Computational Social Choice -Eine Einführung- Jörg Rothe & Lena Schend SS 2012, HHU Düsseldorf 4. April 2012.
Bounding the Cost of Stability in Games with Restricted Interaction Reshef Meir, Yair Zick, Edith Elkind and Jeffrey S. Rosenschein COMSOC 2012 (to appear)
The Shield that Never Was: Societies with Single-Peaked Preferences are More Open to Manipulation and Control Piotr Faliszewski AGH University of Science.
Mechanism design for computationally limited agents (previous slide deck discussed the case where valuation determination was complex) Tuomas Sandholm.
Incompleteness and incomparability in preference aggregation: complexity results M. Silvia Pini*, Francesca Rossi*, K. Brent Venable*, and Toby Walsh**
Elections and Strategic Voting: Condorcet and Borda E. Maskin Harvard University.
Complexity of Determining Nonemptiness of the Core Vincent Conitzer, Tuomas Sandholm Computer Science Department Carnegie Mellon University.
Junta Distributions and the Average-Case Complexity of Manipulating Elections A presentation by Jeremy Clark Ariel D. Procaccia Jeffrey S. Rosenschein.
Automated Mechanism Design Tuomas Sandholm Presented by Dimitri Mostinski November 17, 2004.
Manipulating the Quota in Weighted Voting Games (M. Zuckerman, P. Faliszewski, Y. Bachrach, and E. Elkind) ‏ Presented by: Sen Li Software Technologies.
Algorithmic, Game-theoretic and Logical Foundations
Avoiding manipulation in elections through computational complexity Vincent Conitzer Computer Science Department Carnegie Mellon University Guest lecture.
Social choice theory = preference aggregation = voting assuming agents tell the truth about their preferences Tuomas Sandholm Professor Computer Science.
Empirical Aspects of Plurality Elections David R. M. Thompson, Omer Lev, Kevin Leyton-Brown & Jeffrey S. Rosenschein COMSOC 2012 Kraków, Poland.
Generalized Point Based Value Iteration for Interactive POMDPs Prashant Doshi Dept. of Computer Science and AI Institute University of Georgia
When Are Elections with Few Candidates Hard to Manipulate V. Conitzer, T. Sandholm, and J. Lang Subhash Arja CS 286r October 29, 2008.
Mechanism design for computationally limited agents (previous slide deck discussed the case where valuation determination was complex) Tuomas Sandholm.
Social choice theory = preference aggregation = voting assuming agents tell the truth about their preferences Tuomas Sandholm Professor Computer Science.
Applied Mechanism Design For Social Good
A Brief Introductory Tutorial on Computational Social Choice
Algorithmic Analysis of Elections: Voting Rules and Manipulability (minicourse) Piotr Faliszewski AGH University Kraków, Poland.
Computational Social Choice and Moral Artificial Intelligence
Voting and social choice
CPS 173 Voting and social choice
Approximability of Manipulating Elections
Computational Social Choice (Part II: Bribery and Friends)
CPS Voting and social choice
The Complexity of Bribery in Elections
Presentation transcript:

Overview of Computational Foundations of Social Choice GASICS Workshop Aachen, October 2009 Jörg Rothe

2 Computational Social Choice  What is computational social choice? A new interdisciplinary field of study at the interface of social choice theory and computer science  What is social choice theory? Social choice theory studies the aggregation of individual preferences  Key concepts Preference relation: typically transitive and complete  Set of preference relations over a given set of alternatives : Social welfare function Social choice function Social choice correspondence

3 Computational Social Choice  Bidirectional transfer  Computer science ➠ Social choice Apply complexity theory, algorithms, learning theory to problems of social choice  Social choice ➠ Computer science Import concepts from social choice to solve questions arising in AI (e.g., in societies of autonomous software agents), webpage ranking, or collaborative filtering Social Choice Theory Computer Science Computational Social Choice

4 Game TheorySocial Choice Theory precursors Cournot ( ) Borel ( ) Llull ( ) Condorcet ( ) Borda ( ) Dodgson / Carroll ( ) early positive results 2-Player zero-sum games: security level (Minimax Theorem, v. Neumann, 1928) Voting among 2 alternatives: majority rule (May’s Theorem, 1952) seminal monograph Theory of Games and Economic Behavior (v. Neumann & Morgenstern, 1944) Social Choice and Individual Values (Arrow, 1951) Various “solution concepts” recent trend“Algorithmic Game Theory”“Computational Social Choice” Theorem (Arrow, 1951): There is no nondictatorial social welfare function satisfying Pareto-optimality and independence of irrelevant alternatives. Theorem (Arrow, 1951): There is no nondictatorial social welfare function satisfying Pareto-optimality and independence of irrelevant alternatives. I‘ll show you some solution concepts!

5 Project Participants  Principal Investigators: Felix Brandt (München) Ulle Endriss (Amsterdam) Jeffrey Rosenschein (Jerusalem) Jörg Rothe (Düsseldorf) Remzi Sanver (Instanbul)  Associated Partners: Vincent Conitzer (Duke University) Edith Elkind (Singapore/Southampton) Edith Hemaspaandra (Rochester) Lane Hemaspaandra (Rochester) Jerome Lang (Paris/Toulouse) Jean-Fran ç ois Laslier (Paris) Nicolas Maudet (Paris) AI TCS AI LOG AI TCS ECON AI ECON TCS TCS LOG TCS AI LOG ECON AI

6 Aims & Objectives  Social choice and theoretical computer science To deepen our understanding of algorithmic and complexity-theoretic issues in social choice  Social choice and logic To develop logic-based languages for modeling and reasoning about social choice problems and preference structures  Social choice and artificial intelligence To apply established techniques from AI, such as preference elicitation and learning, to problems of social choice

7 The Community  Where do we meet? International Workshop on Computational Social Choice (COMSOC), coordinated by Ulle Endriss & Jérôme Lang)  1st COMSOC, Amsterdam, 6-8 December 2006  2nd COMSOC, Liverpool, 2-5 September 2008  3rd COMSOC, Düsseldorf, September 2010 Dagstuhl Seminars  Computational Issues in Social Choice, October 2007  Computational Foundations of Social Choice, 7-12 March 2010  Where do we publish? Conferences: AAAI, AAMAS, IJCAI, SODA, TARK, WINE,... Journals: AIJ, IC, JACM, JAIR, MSS, SCW, TCS, TOCS,... MLQ special issue (edited by Paul Goldberg and Jörg Rothe): “Logic and Complexity within Computational Social Choice”

8 Main Topics  Computational aspects of evaluating voting rules Theorem (Bartholdi et al., 1989): There is no social welfare function that is neutral, consistent, Condorcet, and efficiently computable (unless P=NP). Other issues: efficient algorithms, approximation, exact computational complexity, etc.  Computational hardness of manipulation Theorem (Bartholdi et al., 1989): There is a social welfare function that is easy to compute, but not efficiently manipulable (unless P=NP).  Moreover, this function is neutral, Condorcet, Pareto- optimal, etc. Other issues: few alternatives, weighted voting, typical- case, approximation, heuristics, other types of manipulation (control, bribery,...), etc.

9 Main Topics (cont.)  Computational aspects of fair division How to fairly divide divisible goods or resources among several agents or players  e.g., cutting a cake Indivisible goods (multiagent resource allocation)  e.g., complexity of social welfare optimization  e.g., (combinatorial) auctions and mechanism design  Social choice in combinatorial domains Combinatorial structure gives rise to exponential growth  multiple referenda, committee election Representation of preferences (graphical or logical)  CP-nets, weighted propositional formulas  important factors: compactness, expressiveness, computational properties I‘ll show you how to cut a cake!

10 Main Topics (cont.)  Computational aspects of coalitional voting games Voting settings are often modeled as cooperative games  e.g., weighted voting games: compact representation Complexity of game-theoretic solution concepts  e.g., the core, the Shapley-Shubik and Banzhaf power index Manipulation and control  e.g., false identities/splitting weight, changing threshold, adding/deleting voters  Epistemic issues in social choice Incomplete preferences Elicitation of preferences  Communication complexity

11 What did the Düsseldorf Group do in 2009? This is Nadja Betzler from Jena, not Magnus Roos from D’dorf. Claudia Doro Gábor Jörg

12 What did the Düsseldorf Group do in 2009? Magnus Jörg Gábor Frank Doro Edith E. Claudia Düsseldorf Felix Ulle Jeff Piotr Remzi Edith H. Lane Vince Jérôme Yann Nicolas Jean- François The Cost of Stability in Coalitional Games. Joint with Y. Bachrach, R. Meir, D. Pasechnik, M. Zuckerman. To appear at SAGT’09; extended abstract: AAMAS’09

13 What did the Düsseldorf Group do in 2009? Magnus Jörg Gábor Frank Doro Claudia Düsseldorf Felix Ulle Jeff Piotr Remzi Edith H. Lane Vince Edith E. Jérôme Yann Nicolas Jean- François The Complexity of Probabilistic Lobbying. Joint with H. Fernau J. Goldsmith, N. Mattei, D. Raible. To appear at ADT’09

14 What did the Düsseldorf Group do in 2009? Magnus Jörg Gábor Frank Doro Claudia Düsseldorf Felix Ulle Jeff Piotr Remzi Edith H. Lane Vince Edith E. Jérôme Yann Nicolas Jean- François Generalized Juntas and NP-Hard Sets. Joint with H. Spakowski. FCT’07; Theoretical Computer Science 2009

15 What did the Düsseldorf Group do in 2009? Magnus Jörg Gábor Frank Doro Claudia Düsseldorf Felix Ulle Jeff Piotr Remzi Edith H. Lane Vince Edith E. Jérôme Yann Nicolas Jean- François Frequency of Correctness versus Average Polynomial Time. Joint with H. Spakowski. FCT’07; Information Processing Letters 2009

16 What did the Düsseldorf Group do in 2009? Magnus Jörg Gábor Frank Doro Claudia Düsseldorf Felix Ulle Jeff Piotr Remzi Edith H. Lane Vince Edith E. Jérôme Yann Nicolas Jean- François Satisfiability Parsimoniously Reduces to the Tantrix(TM) Rotation Puzzle Problem. MCU’07; Fundamenta Informaticae 2009

17 What did the Düsseldorf Group do in 2009? Magnus Jörg Gábor Frank Doro Claudia Düsseldorf Felix Ulle Jeff Piotr Remzi Edith H. Lane Vince Edith E. Jérôme Yann Nicolas Jean- François The Three-Color and Two-Color Tantrix(TM) Rotation Puzzle Problems are NP-Complete Via Parsimonious Reductions. LATA’08; Information & Computation 2009

18 What did the Düsseldorf Group do in 2009? Magnus Jörg Gábor Frank Doro Claudia Düsseldorf Felix Ulle Jeff Piotr Remzi Edith H. Lane Vince Edith E. Jérôme Yann Nicolas Jean- François The Complexity of Computing Minimal Unidirectional Covering Sets. Joint with F. Fischer and J. Hoffman. Submitted

19 What did the Düsseldorf Group do in 2009? Magnus Jörg Gábor Frank Doro Claudia Düsseldorf Felix Ulle Jeff Piotr Remzi Edith H. Lane Vince Edith E. Jérôme Yann Nicolas Jean- François Degrees of Guaranteed Envy-Freeness in Finite Bounded Cake-Cutting Protocols. WINE’09

20 What did the Düsseldorf Group do in 2009? Magnus Jörg Gábor Frank Doro Claudia Düsseldorf Felix Ulle Jeff Piotr Remzi Edith H. Lane Vince Edith E. Jérôme Yann Nicolas Jean- François Complexity of Social Welfare Optimization in Multiagent Resource Allocation. Submitted

21 What did the Düsseldorf Group do in 2009? Magnus Jörg Gábor Frank Doro Claudia Düsseldorf Felix Ulle Jeff Piotr Remzi Edith H. Lane Vince Edith E. Jérôme Yann Nicolas Jean- François Hybrid Elections Broaden Complexity-Theoretic Resistance to Control. IJCAI’07; Mathematical Logic Quarterly 2009

22 What did the Düsseldorf Group do in 2009? Magnus Jörg Gábor Frank Doro Claudia Düsseldorf Felix Ulle Jeff Piotr Remzi Edith H. Lane Vince Edith E. Jérôme Yann Nicolas Jean- François Llull and Copeland Voting Computationally Resist Bribery and Constructive Control. AAAI’07; AAIM’08; Journal of Artificial Intelligence Research 2009

23 What did the Düsseldorf Group do in 2009? Magnus Jörg Gábor Frank Doro Claudia Düsseldorf Felix Ulle Jeff Piotr Remzi Edith H. Lane Vince Edith E. Jérôme Yann Nicolas Jean- François Sincere-Strategy Preference-Based Approval Voting Fully Resists Constructive Control and Broadly Resists Destructive Control. Joint with M. Nowak. MFCS’08; Mathematical Logic Quarterly 2009

24 What did the Düsseldorf Group do in 2009? Magnus Jörg Gábor Frank Doro Claudia Düsseldorf Felix Ulle Jeff Piotr Remzi Edith H. Lane Vince Edith E. Jérôme Yann Nicolas Jean- François Control Complexity in Fallback Voting. To appear at CATS’10

25 What did the Düsseldorf Group do in 2009? Magnus Jörg Gábor Frank Doro Claudia Düsseldorf Felix Ulle Jeff Piotr Remzi Edith H. Lane Vince Edith E. Jérôme Yann Nicolas Jean- François A Richer Understanding of the Complexity of Election Systems. In „Fundamental Problems in Computing: Essays in Honor of Professor Daniel J. Rosenkrantz“ S. Ravi & S. Shukla, eds., Springer, 2009

26 What did the Düsseldorf Group do in 2009? Magnus Jörg Gábor Frank Doro Claudia Düsseldorf Felix Ulle Jeff Piotr Remzi Edith H. Lane Vince Edith E. Nicolas Jérôme Yann Jean- François Computational Aspects of Approval Voting. To appear in „Handbook of Approval Voting“ J.-F. Laslier & R. Sanver, eds., Springer

27 What did the Düsseldorf Group do in 2009? Magnus Jörg Gábor Frank Doro Claudia Düsseldorf Felix Ulle Jeff Piotr Remzi Edith H. Lane Vince Edith E. Jérôme Yann Nicolas Jean- François The Shield that Never Was: Societies with Single-Peaked Preferences are More Open to Manipulation and Control. TARK’09

The Shield that Never Was: Societies with Single-Peaked Preferences are More Open to Manipulation and Control Piotr Faliszewski AGH University of Science and Technology Jörg Rothe Heinrich-Heine-Universität Düsseldorf Lane A. Hemaspaandra University of Rochester Edith Hemaspaandra Rochester Institute of Technology TARK XII, Palo Alto, USA, July 2009

Outline  Introduction Elections and Single-Peaked Preferences. Thanks, Toby! Control and Manipulation  Overview of Results Control: Single-Peakedness Removing NP-Hardness Shields Manipulation: Single-Peaked Preferences  Removing NP-Hardness Shields  Leaving them in Place  Erecting them  Giving a Dichotomy for 3-Candidate Scoring Protocols  A Sample Proof Sketch Single-Peaked Approval Voting is Vulnerable to Constructive Control by Adding Voters

Introduction  Computational Social Choice Applications in AI  Multiagent systems  Multicriteria decision making  Meta search-engines  Planning Applications in social choice theory and political science  Computational barrier to prevent cheating in elections Manipulation Control Bribery Computational agents can systematically analyze an election to find the optimal behavior.

Introduction Computational agents can systematically analyze an election to find the optimal behavior. Using the power of NP-hardness, vulcans have created complexity shields to protect elections against many types of manipulation and procedural control.

Introduction Computational agents can systematically analyze an election to find the optimal behavior. Using the power of NP-hardness, vulcans have created complexity shields to protect elections against many types of manipulation and procedural control. Our Main Theme: Complexity shields may evaporate in single- peaked societies

Elections  Candidates and voters: C = {c 1,..., c m } V = {v 1,..., v n }  Each voter v i is represented via his or her preferences over C: Linear orders: c > e > a > b > d Approval vectors: (0,1,1,0,1)  Election system aggregates these preferences and outputs the set of winners. Hi v 7, I hope you are not one of those awful people who support c 3 ! Hi, my name is v 7. How will they aggregate our votes?!

Election Systems  Approval (any number of candidates): Every vote is an approval vector from  Scoring protocols for m candidates are specified by scoring vectors with where each voter‘s i-th candidate gets points: m-candidate plurality: m-candidate j-veto: Borda:  Plurality (any number of candidates):  Veto (any number of candidates): All candidates with the most points are winners.

Single-Peaked Preferences  A collection V of votes is said to be single-peaked if there exists a linear order L over C such that each voter‘s „degree of preference“ rises to a peak and then falls (or just rises or just falls).

Single-Peaked Preferences  A collection V of votes is said to be single-peaked if there exists a linear order L over C such that each voter‘s „degree of preference“ rises to a peak and then falls (or just rises or just falls). A voter‘s preference curve on galactic taxes low galactic taxes high galactic taxes

 A collection V of votes is said to be single-peaked if there exists a linear order L over C such that each voter‘s „degree of preference“ rises to a peak and then falls (or just rises or just falls). A voter‘s > > > preference curve on galactic taxes low galactic taxes high galactic taxes Single-Peaked Preferences Single-peaked preference consistent with linear order of candidates

 A collection V of votes is said to be single-peaked if there exists a linear order L over C such that each voter‘s „degree of preference“ rises to a peak and then falls (or just rises or just falls). A voter‘s > > > preference curve on galactic taxes low galactic taxes high galactic taxes Single-Peaked Preferences Preference that is inconsistent with linear order of candidates

Single-Peaked Preferences  A collection V of votes is said to be single-peaked if there exists a linear order L over C such that each voter‘s „degree of preference“ rises to a peak and then falls (or just rises or just falls).  If each vote v i in V is a linear order > i over C, this means that for each triple of candidates c, d, and e: (c L d L e or e L d L c) implies that for each i, if c > i d then d > i e.

Single-Peaked Preferences  A collection V of votes is said to be single-peaked if there exists a linear order L over C such that each voter‘s „degree of preference“ rises to a peak and then falls (or just rises or just falls).  If each vote v i in V is a linear order > i over C, this means that for each triple of candidates c, d, and e: (c L d L e or e L d L c) implies that for each i, if c > i d then d > i e.  Bartholdi & Trick (1986); Escoffier, Lang & Öztürk (2008): Given a collection V of linear orders over C, in polynomial time we can produce a linear order L witnessing V‘s single- peakedness or can determine that V is not single-peaked.

Single-Peaked Preferences  A collection V of votes is said to be single-peaked if there exists a linear order L over C such that each voter‘s „degree of preference“ rises to a peak and then falls (or just rises or just falls).  If each vote v i in V is an approval vector over C, this means that for each triple of candidates c, d, and e: c L d L e implies that for each i, if v i approves of both c and e then v i approves of d.

Single-Peaked Preferences  A collection V of votes is said to be single-peaked if there exists a linear order L over C such that each voter‘s „degree of preference“ rises to a peak and then falls (or just rises or just falls).  If each vote v i in V is an approval vector over C, this means that for each triple of candidates c, d, and e: c L d L e implies that for each i, if v i approves of both c and e then v i approves of d.  Theorem 1: Given a collection V of approval vectors over C, in polynomial time we can produce a linear order L witnessing V‘s single-peakedness or can determine that V is not single-peaked.

Control and Manipulation  The bad guy wants to make someone win (constructive) or prevent someone from winning (destructive).  The bad guy knows everybody else’s votes.  In control, the chair modifies an election‘s structure by: Adding candidates (limited/unlimited number) Deleting candidates Partition of candidates with/without runoff Adding/deleting voters Partition of voters  In manipulation, a coalition of agents change their votes to obtain their desired effect. Both nonmanipulators and manipulators are weighted. In the single-peaked case, both nonmanipulators and manipulators are single-peaked w.r.t. the same order L.  See Bartholdi, Tovey & Trick (1989; 1992), Conitzer, Sandholm & Lang (2007), Hemaspaandra, Hemaspaandra & Rothe (2007).

Outline  Introduction Elections and Single-Peaked Preferences Control and Manipulation  Overview of Results Control: Single-Peakedness Removing NP-Hardness Shields Manipulation: Single-Peaked Preferences  Removing NP-Hardness Shields  Leaving them in Place  Erecting them  Giving a Dichotomy for 3-Candidate Scoring Protocols  A Sample Proof Sketch Single-Peaked Approval Voting is Vulnerable to Constructive Control by Adding Voters

Control Results: Approval  Theorem 2: For the single-peaked case, approval voting is vulnerable to constructive control by adding voters and constructive control by deleting voters, in the unique-winner and the nonunique-winner model, for the standard and the succinct input model.

Control Results: Approval  Theorem 2: For the single-peaked case, approval voting is vulnerable to constructive control by adding voters and constructive control by deleting voters, in the unique-winner and the nonunique-winner model, for the standard and the succinct input model.  For comparison: Among all types of control by adding/deleting candidates/voters, the above two cases are the only two resistances in the general case. (Hemaspaandra, Hemaspaandra & Rothe, AAAI’05; Artificial Intelligence 2007 )

Control Results: Plurality  Theorem 3: For the single-peaked case, plurality voting is vulnerable to constructive and destructive control by adding candidates, adding an unlimited number of candidates, and deleting candidates in the unique-winner and the nonunique-winner model.

Control Results: Plurality  Theorem 3: For the single-peaked case, plurality voting is vulnerable to constructive and destructive control by adding candidates, adding an unlimited number of candidates, and deleting candidates in the unique-winner and the nonunique-winner model.  For comparison: For each of these six types of candidate control plurality voting is resistant in the general case, but is vulnerable to the four types of control involving adding/deleting voters. (Bartholdi, Tovey & Trick, 1992; Hemaspaandra, Hemaspaandra & Rothe, 2007)

Outline  Introduction Elections and Single-Peaked Preferences Control and Manipulation  Overview of Results Control: Single-Peakedness Removing NP-Hardness Shields Manipulation: Single-Peaked Preferences  Removing NP-Hardness Shields  Leaving them in Place  Erecting them  Giving a Dichotomy for 3-Candidate Scoring Protocols  A Sample Proof Sketch Single-Peaked Approval Voting is Vulnerable to Constructive Control by Adding Voters

Manipulation: Removing NP-Hardness Shields  Theorem 4: For the single-peaked case, the constructive coalition weighted manipulation problem (in both the unique-winner and the nonunique-winner model) for each of the following election systems is in P: The scoring protocol, i.e., 3-candidate Borda. Each of the scoring protocols,. Veto.

Manipulation: Removing NP-Hardness Shields  Theorem 4: For the single-peaked case, the constructive coalition weighted manipulation problem (in both the unique-winner and the nonunique-winner model) for each of the following election systems is in P: The scoring protocol, i.e., 3-candidate Borda. Each of the scoring protocols,. Veto.  For comparison: 3-candidate Borda, Veto, and the „ “ cases of,, are NP-complete in the general case (and the rest is in P). (Hemaspaandra & Hemaspaandra, 2007; Procaccia & Rosenschein, 2007; Conitzer, Sandholm & Lang, 2007).

Manipulation: Removing NP-Hardness Shields  Theorem 5: For the single-peaked case, the constructive coalition weighted manipulation problem for m-candidate 3-veto is in P for m in {3,4,6,7,8,…} and is resistant (indeed, NP-complete) for m=5 candidates.

Manipulation: Removing NP-Hardness Shields  Theorem 5: For the single-peaked case, the constructive coalition weighted manipulation problem for m-candidate 3-veto is in P for m in {3,4,6,7,8,…} and is resistant (indeed, NP-complete) for m=5 candidates.  For comparison: m-candidate 3-veto is in P for m in {3,4} and is resistant (indeed, NP-complete) for five or more candidates. (Hemaspaandra & Hemaspaandra; Journal of Computer and System Sciences 2007 ).

Manipulation: Leaving them in Place  Theorem 6: For the single-peaked case, the constructive coalition weighted manipulation problem (in both the unique-winner and the nonunique-winner model) is resistant (indeed, NP-complete) for  the scoring protocol and  the scoring protocol, i.e., 4-candidate Borda.

Manipulation: Leaving them in Place  Theorem 6: For the single-peaked case, the constructive coalition weighted manipulation problem (in both the unique-winner and the nonunique-winner model) is resistant (indeed, NP-complete) for  the scoring protocol and  the scoring protocol, i.e., 4-candidate Borda.  For comparison: These problems are known to be NP-complete also in the general case. (Hemaspaandra & Hemaspaandra, 2007).  These results are particularly inspired by Walsh (2007) who proved the same for Single Transferable Voting.

Manipulation: Erecting NP-Hardness Shields  Can restricting to single-peaked preferences ever erect a complexity shield? General case Single-peaked case

Manipulation: Erecting NP-Hardness Shields  Can restricting to single-peaked preferences ever erect a complexity shield?  Theorem 7: There exists an election system, whose votes are approval vectors, for which constructive size-3-coalition unweighted manipulation  is in P for the general case  but is NP-complete in the single-peaked case. General case Single-peaked case

Manipulation: A Dichotomy Result  Theorem 8: Consider a 3-candidate scoring protocol For the single-peaked case, the constructive coalition weighted manipulation problem (in both the unique- winner and the nonunique-winner model)  is resistant (indeed, NP-complete) when and  is in P otherwise.

Outline  Introduction Elections and Single-Peaked Preferences Control and Manipulation  Overview of Results Control: Single-Peakedness Removing NP-Hardness Shields Manipulation: Single-Peaked Preferences  Removing NP-Hardness Shields  Leaving them in Place  Erecting them  Giving a Dichotomy for 3-Candidate Scoring Protocols  A Sample Proof Sketch Single-Peaked Approval Voting is Vulnerable to Constructive Control by Adding Voters

A Sample Proof Sketch  Theorem 2: For the single-peaked case, approval voting is vulnerable to constructive control by adding voters and constructive control by deleting voters, in the unique-winner and the nonunique-winner model, for the standard and the succinct input model.

A Sample Proof Sketch  Theorem 2: For the single-peaked case, approval voting is vulnerable to constructive control by adding voters and constructive control by deleting voters, in the unique-winner and the nonunique-winner model, for the standard and the succinct input model.  We focus on: constructive control by adding voters in the unique-winner model for the succinct input model.

A Sample Proof Sketch  Theorem 2: For the single-peaked case, approval voting is vulnerable to constructive control by adding voters and constructive control by deleting voters, in the unique-winner and the nonunique-winner model, for the standard and the succinct input model.  We focus on: constructive control by adding voters in the unique-winner model for the succinct input model.  We give a poly-time algorithm that, given collections V and V‘ of votes over candidate set C and single-peaked w.r.t. order L, a candidate p in C, and an addition limit k, decides if by adding at most k votes from V‘ we can make p the unique winner.

A Sample Proof Sketch number of approvals from voters in V for candidates that are votes in V‘ that can be added (with multiplicities)

A Sample Proof Sketch number of approvals from voters in V for candidates that are votes in V‘ that can be added (with multiplicities) Which vote types from V‘ should we add? Especially if they are incomparable?

A Sample Proof Sketch number of approvals from voters in V for candidates that are votes in V‘ that can be added (with multiplicities) We‘ll handle this by a „smart greedy“ algorithm.

A Sample Proof Sketch number of approvals from voters in V for candidates that are votes in V‘ that can be added (with multiplicities) Why are F, C, B, c, f, and j dangerous but the remaining candidates can be ignored?

A Sample Proof Sketch number of approvals from voters in V for candidates that are votes in V‘ that can be added (with multiplicities) First, each added vote will be an interval including p. So drop all others.

A Sample Proof Sketch number of approvals from voters in V for candidates that are votes in V‘ that can be added (with multiplicities) First, each added vote will be an interval including p. So drop all others.

A Sample Proof Sketch number of approvals from voters in V for candidates that are votes in V‘ that can be added (with multiplicities) Now, if adding votes from V‘ causes p to beat c then p must also beat a and b.

A Sample Proof Sketch number of approvals from voters in V for candidates that are votes in V‘ that can be added (with multiplicities) Thus, c is a dangerous rival for p but a and b can safely be ignored.

A Sample Proof Sketch number of approvals from voters in V for candidates that are votes in V‘ that can be added (with multiplicities) Likewise, f is dangerous but d and e can safely be ignored.

A Sample Proof Sketch number of approvals from voters in V for candidates that are votes in V‘ that can be added (with multiplicities) Likewise, j is dangerous but g, h, and i can safely be ignored.

A Sample Proof Sketch number of approvals from voters in V for candidates that are votes in V‘ that can be added (with multiplicities) Hey, why do you do that step by step? Just say j is dangerous and ignore a, …, i.

A Sample Proof Sketch number of approvals from voters in V for candidates that are votes in V‘ that can be added (with multiplicities) No! Look what happens if we add 6 votes of the type with multiplicity 7!

A Sample Proof Sketch votes in V‘ that can be added (with multiplicities) No! Look what happens if we add 6 votes of the type with multiplicity 7!

A Sample Proof Sketch number of approvals from voters in V for candidates that are votes in V‘ that can be added (with multiplicities) OK, that‘s not illogical. But how does your „smart greedy“ algorithm work?

Smart Greedy Algorithm  OK, first I need more space for that!

Smart Greedy Algorithm  OK, first I need more space for that!  In smart greedy, we eat through all dangerous rivals to the right of p starting with the leftmost: c.  To become the unique winner, p must beat c.  Only votes in V‘ whose right endpoints fall in can help. Let B be the set of those votes.  Choose votes from B starting with the rightmost left endpoint. This is a perfectly safe strategy!

Smart Greedy Algorithm votes in V‘ that can be added (with multiplicities)

Smart Greedy Algorithm votes in B that can be added (with multiplicities)

Smart Greedy Algorithm votes in B that can be added (with multiplicities)

Smart Greedy Algorithm 1 First rival defeated 1 votes in B that can be added (with multiplicities)

Smart Greedy Algorithm  OK, first I need more space for that!  In smart greedy, we eat through all dangerous rivals to the right of p starting with the leftmost: c.  To become the unique winner, p must beat c.  Only votes in V‘ whose right endpoints fall in can help. Let B be the set of those votes.  Choose votes from B starting with the rightmost left endpoint. This is a perfectly safe strategy!  Iterate.  If you run out of dangerous candidates on the right of p, mirror image the societal order (i.e., reverse L) and finish off the remaining dangerous candidates until you either succeed or reach the addition limit.

Summary and Future Directions  Single-peakedness removes many complexity shields against control and manipulation leaves others in place can even erect complexity shields  When choosing election systems for single-peaked electorates, one must not rely on such shields.

Summary and Future Directions  Single-peakedness removes many complexity shields against control and manipulation leaves others in place can even erect complexity shields  When choosing election systems for single-peaked electorates, one must not rely on such shields.  Do such shield removals hold in two-dimensional (or k-dimensional) analogues of our unidimensional single-peakedness?  Can our results be extended to „very nearly“ single-peaked societies?

... and a Call for (Reading) Papers „Logic and Complexity within Computational Social Choice“ Special issue of Mathematical Logic Quarterly, August 2009 Edited by Paul Goldberg and Jörg Rothe

... and a Call for (Writing) Papers Third International Workshop on Computational Social Choice Düsseldorf, Germany, September 13–16, 2010 Important Dates Paper submission deadline: June 1, 2010 Notification of authors: July 15, 2010 Camera-ready copies due: August 1, 2010 Early registration deadline: August 1, 2010 Tutorial day: September 13, 2010 Workshop dates: September 14–16, 2010

Thank you! Stop it! No more questions please!