Edith Elkind Nanyang Technological University, Singapore Piotr Faliszewski AGH Univeristy of Science and Technology, Poland Arkadii Slinko University of.

Slides:



Advertisements
Similar presentations
On the Robustness of Preference Aggregation in Noisy Environments Ariel D. Procaccia, Jeffrey S. Rosenschein and Gal A. Kaminka.
Advertisements

The Computational Difficulty of Manipulating an Election Tetiana Zinchenko 05/12/
Common Voting Rules as Maximum Likelihood Estimators Vincent Conitzer (Joint work with Tuomas Sandholm) Early version of this work appeared in UAI-05.
Voting and social choice Vincent Conitzer
1 EC9A4 Social Choice and Voting Lecture 3 EC9A4 Social Choice and Voting Lecture 3 Prof. Francesco Squintani
Algorithmic Game Theory Uri Feige Robi Krauthgamer Moni Naor Lecture 9: Social Choice Lecturer: Moni Naor.
Voting and social choice Looking at a problem from the designers point of view.
Speaker: Ariel Procaccia 1 Joint work with: Ioannis Caragiannis 2, Jason Covey 3, Michal Feldman 1, Chris Homan 3, Christos Kaklamanis 2, Nikos Karanikolas.
IMPOSSIBILITY AND MANIPULABILITY Section 9.3 and Chapter 10.
CS 886: Electronic Market Design Social Choice (Preference Aggregation) September 20.
Complexity of manipulating elections with few candidates Vincent Conitzer and Tuomas Sandholm Carnegie Mellon University Computer Science Department.
Computing Kemeny and Slater Rankings Vincent Conitzer (Joint work with Andrew Davenport and Jayant Kalagnanam at IBM Research.)
MAT 105 Spring  There are many more methods for determining the winner of an election with more than two candidates  We will only discuss a few.
Lirong Xia Friday, May 2, 2014 Introduction to Social Choice.
The Complexity of Elections: A New Domain for Heuristic Computation Piotr Faliszewski AGH University of Science and Technology, Kraków, Poland
Socially desirable approximations for Dodgson’s voting rule Ioannis Caragiannis (University of Patras) Christos Kaklamanis (University of Patras) Nikos.
Robust Winners and Winner Determination Policies under Candidate Uncertainty JOEL OREN, UNIVERSITY OF TORONTO JOINT WORK WITH CRAIG BOUTILIER, JÉRÔME LANG.
+ Random Tie Breaking Toby Walsh NICTA and UNSW. + Random Tie Breaking Haris Aziz, Serge Gaspers, Nick Mattei, Nina Narodytska, Toby Walsh NICTA and UNSW.
Convergence of Iterative Voting AAMAS 2012 Valencia, Spain Omer Lev & Jeffrey S. Rosenschein.
Using computational hardness as a barrier against manipulation Vincent Conitzer
Using computational hardness as a barrier against manipulation Vincent Conitzer
The Distortion of Cardinal Preferences in Voting Ariel D. Procaccia and Jeffrey S. Rosenschein.
Speaker: Ariel Procaccia Joint work with: Michael Zuckerman, Jeff Rosenschein Hebrew University of Jerusalem.
Ties Matter: Complexity of Voting Manipulation Revisited based on joint work with Svetlana Obraztsova (NTU/PDMI) and Noam Hazon (CMU) Edith Elkind (Nanyang.
Preference elicitation Vincent Conitzer
CPS Voting and social choice
Social choice theory = preference aggregation = voting assuming agents tell the truth about their preferences Tuomas Sandholm Professor Computer Science.
Campaign Management via Bribery Piotr Faliszewski AGH University of Science and Technology, Poland Joint work with Edith Elkind and Arkadii Slinko.
Common Voting Rules as Maximum Likelihood Estimators Vincent Conitzer and Tuomas Sandholm Carnegie Mellon University, Computer Science Department.
Complexity of unweighted coalitional manipulation under some common voting rules Lirong XiaVincent Conitzer COMSOC08, Sep. 3-5, 2008 TexPoint fonts used.
Automated Design of Voting Rules by Learning From Examples Ariel D. Procaccia, Aviv Zohar, Jeffrey S. Rosenschein.
Strategic Behavior in Multi-Winner Elections A follow-up on previous work by Ariel Procaccia, Aviv Zohar and Jeffrey S. Rosenschein Reshef Meir The School.
Preference Aggregation on Structured Preference Domains Edith Elkind University of Oxford.
Introduction complexity has been suggested as a means of precluding strategic behavior. Previous studies have shown that some voting protocols are hard.
Social choice (voting) Vincent Conitzer > > > >
Online Manipulation and Control in Sequential Voting Lane A. Hemaspaandra Jörg Rothe Edith Hemaspaandra.
Historically Interesting Voting Rules: Electing the Doge Lirong Xia Toby Walsh Auckland, Feb 20 th 2012.
Edith Elkind Nanyang Technological University, Singapore Piotr Faliszewski AGH Univeristy of Science and Technology, Poland Arkadii Slinko University of.
Voting Geometry: A Mathematical Study of Voting Methods and Their Properties Alan T. Sherman Dept. of CSEE, UMBC March 27, 2006.
CPS Voting and social choice Vincent Conitzer
An Algorithm for the Coalitional Manipulation Problem under Maximin Michael Zuckerman, Omer Lev and Jeffrey S. Rosenschein AAMAS’11.
An Algorithm for the Coalitional Manipulation Problem under Maximin Michael Zuckerman, Omer Lev and Jeffrey S. Rosenschein (Simulations by Amitai Levy)
The Shield that Never Was: Societies with Single-Peaked Preferences are More Open to Manipulation and Control Piotr Faliszewski AGH University of Science.
Elections and Strategic Voting: Condorcet and Borda E. Maskin Harvard University.
1 Elections and Manipulations: Ehud Friedgut, Gil Kalai, and Noam Nisan Hebrew University of Jerusalem and EF: U. of Toronto, GK: Yale University, NN:
Optimal Manipulation of Voting Rules Edith Elkind Nanyang Technological University, Singapore (based on joint work with Svetlana Obraztsova)
Great Theoretical Ideas in Computer Science.
6.853: Topics in Algorithmic Game Theory Fall 2011 Constantinos Daskalakis Lecture 22.
Copyright 2013, 2010, 2007, Pearson, Education, Inc. Section 15.2 Flaws of Voting.
When Are Elections with Few Candidates Hard to Manipulate V. Conitzer, T. Sandholm, and J. Lang Subhash Arja CS 286r October 29, 2008.
Impossibility and Other Alternative Voting Methods
Chapter 10: The Manipulability of Voting Systems Lesson Plan
Social choice theory = preference aggregation = voting assuming agents tell the truth about their preferences Tuomas Sandholm Professor Computer Science.
Algorithmic Analysis of Elections: Voting Rules and Manipulability (minicourse) Piotr Faliszewski AGH University Kraków, Poland.
Impossibility and Other Alternative Voting Methods
1.3 The Borda Count Method.
Manipulation Lirong Xia Fall, Manipulation Lirong Xia Fall, 2016.
Section 15.2 Flaws of Voting
5-2 Election Theory Flaws of Voting.
Voting systems Chi-Kwong Li.
Voting and social choice
MAT 105 Fall 2008 More Voting Methods.
Introduction to Social Choice
CPS 173 Voting and social choice
Approximability of Manipulating Elections
Computational Social Choice (Part II: Bribery and Friends)
Quiz – 1/24 - Friday How many people voted in the election?
Flaws of the Voting Methods
CPS Voting and social choice
The Complexity of Bribery in Elections
Presentation transcript:

Edith Elkind Nanyang Technological University, Singapore Piotr Faliszewski AGH Univeristy of Science and Technology, Poland Arkadii Slinko University of Auckland New Zealand

C = {,,, } Borda voting

R1:R1: R2:R2: R3:R3:  18  17

R1:R1: R2:R2: R3:R3:  18  17

R1:R1: R2:R2: R3:R3:  18  17  6  7 Not so easy! Which candidates to colapse?

R1:R1: R2:R2: R3:R3:

We start with an election with possible clones: For each set of clones we have some likelihood that exactly this set resulted from cloning We seek a clone cover that has highest likelihood  0.01  0.8  0.5  0.3  1 All other subsets have likelihood 0. set

 0.01  0.8  0.5  0.3  1 All other subsets have likelihood 0.  1  0.3  0.5  0.8

We start with an election with possible clones, and with a preferred candidate: For each set of clones we have some likelihood that exactly this set resulted from cloning We seek a clone cover that ensures that our guy wins.  0.01  0.8  0.5  0.3  1 All other subsets have likelihood 0.

 What is the complexity of the decloning problem?  What other problem is it like?  Voting rules? ◦ Plurality ◦ K-approval ◦ Veto ◦ Maximin ◦ Borda ◦ Copeland Control by deleting candidates  we are allowed to delete some of the clones Problem 1: Discovering the true election! Independnce of irrelevant clones: The score of a candidate remains constant irrespective how other candidates are clones

Algorithm for rules satisfying IIC: 1. Let p be your preferred candidate 2. For each clone set including p: 1.Declone it 2.Remove all clone sets that intersect it 3.Compute its score (after decloning) 4.For each other clone set that does not intersect 1.Compute its score (after decloning) 2.If higher than score of p’s clone set then remove from possible clone sets 5.Compute the best clone cover with given clone sets Independnce of irrelevant clones: The score of a candidate remains constant irrespective how other candidates are clones

Thereom. For every voting rule that satisfies IIC, the problem of decloning to become a winner is in P. Corollary. The problem of decloning to become a winner is in P for Plurality, Veto, and Maximin.

 What is the complexity of the decloning problem?  What other problem is it like?  Voting rules? ◦ Plurality ◦ K-approval ◦ Veto ◦ Maximin ◦ Borda ◦ Copeland Control by deleting candidates  we are allowed to delete some of the clones Problem 1: Discovering the true election!

 What is the complexity of the decloning problem?  What other problem is it like?  Voting rules? ◦ Plurality ◦ K-approval ◦ Veto ◦ Maximin ◦ Borda ◦ Copeland Control by deleting candidates  we are allowed to delete some of the clones NP-completeness proofs ended up being quite simple… after we understood clone structures

R1:R1: R2:R2: R3:R3: C(R 1, R 2, R 3 ) = {{ }, { }, { }, { }, { } { }, { }, { }, { }, { }, { }, { }, { }, { }}

Question 1: Is there a profile that implements this clone structure? Question 2: What properties do clone structures have? Question 3: How to represent clone structures? Question 4: How many voters do you need for a given clone structure? We provide an axiomatic characterization of possible clone structures.

A – alternative set F – a family of A subsets F is a clone structure if and only if: A1 {a} ∈ F for each a ∈ A A2 ∅ ∉ F, A ∈ F

A – alternative set F – a family of A subsets F is a clone structure if and only if: A1 {a} ∈ F for each a ∈ A A2 ∅ ∉ F, A ∈ F A3 If C 1 and C 2 are in F and C 1 ⋂ C 2 ≠∅ then C 1 ⋂ C 2 and C 1 ⋃ C 2 are in F

A – alternative set F – a family of A subsets F is a clone structure if and only if: A1 {a} ∈ F for each a ∈ A A2 ∅ ∉ F, A ∈ F A3 If C 1 and C 2 are in F and C 1 ⋂ C 2 ≠∅ then C 1 ⋂ C 2 and C 1 ⋃ C 2 are in F A4 If C 1 and C 2 are in F and C 1 ⋈ C 2 then C 1 - C 2 and C 2 - C 1 are in F C 1 ⋈ C 2 : C 1 ⋂ C 2 ≠∅ and C 1 - C 2 ≠∅, C 2 - C 1 ≠∅

A – alternative set F – a family of A subsets F is a clone structure if and only if: A1 {a} ∈ F for each a ∈ A A2 ∅ ∉ F, A ∈ F A3 If C 1 and C 2 are in F and C 1 ⋂ C 2 ≠∅ then C 1 ⋂ C 2 and C 1 ⋃ C 2 are in F A4 If C 1 and C 2 are in F and C 1 ⋈ C 2 then C 1 - C 2 and C 2 - C 1 are in F A5 Each member of F has at most two minimal supersets in F.

A – alternative set F – a family of A subsets F is a clone structure if and only if: A1 {a} ∈ F for each a ∈ A A2 ∅ ∉ F, A ∈ F A3 If C 1 and C 2 are in F and C 1 ⋂ C 2 ≠∅ then C 1 ⋂ C 2 and C 1 ⋃ C 2 are in F A4 If C 1 and C 2 are in F and C 1 ⋈ C 2 then C 1 - C 2 and C 2 - C 1 are in F A5 Each member of F has at most two minimal supersets in F. A6 F is „acyclic”

 There are only two basic types of clone structures  Both satisfy our axioms, both compose  induction (a) a string of sausages(b) a fat sausage

 How to conveniently represent the above clone structure?

X X = {,,,,,,,, } X

Y Z X = {,,,,,,,, } Y = {,,, }, Z = {,, } X Y Z

Y X = {,,,,,,,, } Y = {,,, }, Z = {,, } X Y Z

X U U X = {,,,,,,,, } Y = {,,, }, Z = {,, } U = {, }

X Y Z U X = {,,,,,,,, } Y = {,,, }, Z = {,, } U = {, }

C(R 1, R 2, R 3 ) = {{ }, { }, { }, { }, { } { }, { }, { }, { }, { }, { }, { }, { }, { }} Question 1: Is there a profile that implements this clone structure? Question 2: What properties do clone structures have? Question 3: How to represent clone structures? Question 4: How many voters do you need for a given clone structure?

a b c d Strings of sausages a > b > c > d A single voter suffices a b c d Fat sausages a > b > c > d c > a > d > b Two voters suffice … a b c a > b > c a > c > b b > a > c The only fat sausage that needs three voters!

a b c X a c a > b > c b > a > c 1 > 2 > 3 > 4 4 > 2 > 3 > 1 a > 1 > 2 > 3 > 4 > c 4 > 2 > 3 > 1 > a > c YX with Y in place of b

a b c X Y X with Y in place of b a c a > b > c b > a > c 1 > 2 > 3 > 4 4 > 2 > 3 > 1 a > 1 > 2 > 3 > 4 > c 4 > 2 > 3 > 1 > a > c 1 > 3 > 2 > 4 > a > c

a b c X Y X with Y in place of b a c a > b > c b > a > c 1 > 2 > 3 > 4 4 > 2 > 3 > 1 Theorem. For every clone structure F over alternative set A, there are three orders R 1, R 2, R 3 that jointly generate F. a > 1 > 2 > 3 > 4 > c 4 > 2 > 3 > 1 > a > c 1 > 3 > 2 > 4 > a > c

 What is the complexity of the decloning problem?  What other problem is it like?  Voting rules? ◦ Plurality ◦ K-approval ◦ Veto ◦ Maximin ◦ Borda ◦ Copeland Control by deleting candidates  we are allowed to delete some of the clones

We start with an election; Perhaps the elections satisfied:  Single-peakedness?  Single-crossingness? But clones destroyed the structure? Goal: Declone as little as possible to discover single-peakedness or single-crossingness.

Single-peakedness models votes in natural elections Def. An election (A,R) is single-peaked with respect to an order > if for all c, d, e in A such that c > d > e (or e > d > c) and all R i it holds that: c R i d ⇒ c R i e

Single-peakedness models votes in natural elections Def. An election (A,R) is single-peaked with respect to an order > if for all c, d, e in A such that c > d > e (or e > d > c) and all R i it holds that: c R i d ⇒ c R i e Profile loses single-peakedness due to cloning

 Decloning a clone set in (A,R) ◦ Operation of contracting a clone-set into a single candidate  We have a polynomial-time algorithm that finds a decloning of a preference profile such that: ◦ The profile becomes single-peaked ◦ Maximum number of candidates remain in the election

 Decloning ◦ Operation of contracting a clone-set into a single candidate  We have a polynomial-time algorithm that finds a decloning of a preference profile such that: ◦ The profile becomes single-peaked ◦ Maximum number of candidates remain in the election

 Decloning ◦ Operation of contracting a clone-set into a single candidate  We have a polynomial-time algorithm that finds a decloning of a preference profile such that: ◦ The profile becomes single-peaked ◦ Maximum number of candidates remain in the election

 Decloning ◦ Operation of contracting a clone-set into a single candidate  We have a polynomial-time algorithm that finds a decloning of a preference profile such that: ◦ The profile becomes single-peaked ◦ Maximum number of candidates remain in the election

 It would be interesting to know what clones structures can be implemented by single-peaked profiles ◦ Not all clone structures can be! ◦ However, all clone structures whose tree representation contains P-nodes only can be implemented ◦ Work in progress!

Single-CrossingPreferences a > b > c > d > e b > a > c > d > e b > c > a > d > e c > b > a > e > d c > b > e > a > d

Single-Crossing Preferences a > b > c > d > e b > a > c > d > e b > c > a > d > e c > b > a > e > d c > b > e > a > d Every clone structure can be implemented. Decloning toward single-crossing preferences is NP-complete. Unless the order of voters is fixed; then it is in P.

 Clone structures form an interesting mathematical object  Clones can be used in various ways to manipulate elections; understanding clone structures helps in this respect.  Clones can spoil single-peakedness of an election; decloning toward single-peakedness can be a useful preprocessing step when holding an election. Thank You!