Introduction complexity has been suggested as a means of precluding strategic behavior. Previous studies have shown that some voting protocols are hard.

Slides:



Advertisements
Similar presentations
6.896: Topics in Algorithmic Game Theory Lecture 18 Constantinos Daskalakis.
Advertisements

The Computational Difficulty of Manipulating an Election Tetiana Zinchenko 05/12/
Voting and social choice Vincent Conitzer
How Hard Is It To Manipulate Voting? Edith Elkind, U. of Warwick Helger Lipmaa, Tartu U.
Algorithmic Game Theory Uri Feige Robi Krauthgamer Moni Naor Lecture 9: Social Choice Lecturer: Moni Naor.
Plurality Voting with Truth-biased Agents Vangelis Markakis Joint work with: Svetlana Obraztsova, David R. M. Thompson Athens University of Economics and.
IMPOSSIBILITY AND MANIPULABILITY Section 9.3 and Chapter 10.
CS 886: Electronic Market Design Social Choice (Preference Aggregation) September 20.
Complexity of manipulating elections with few candidates Vincent Conitzer and Tuomas Sandholm Carnegie Mellon University Computer Science Department.
Computing Kemeny and Slater Rankings Vincent Conitzer (Joint work with Andrew Davenport and Jayant Kalagnanam at IBM Research.)
Negotiating a stable distribution of the payoff among agents may prove challenging. The issue of coalition formation has been investigated extensively,
Manipulation Toby Walsh NICTA and UNSW. Manipulation Constructive  Can we change result so a given candidate wins Destructive  Can we change result.
The Complexity of Elections: A New Domain for Heuristic Computation Piotr Faliszewski AGH University of Science and Technology, Kraków, Poland
+ Random Tie Breaking Toby Walsh NICTA and UNSW. + Random Tie Breaking Haris Aziz, Serge Gaspers, Nick Mattei, Nina Narodytska, Toby Walsh NICTA and UNSW.
Using computational hardness as a barrier against manipulation Vincent Conitzer
Using computational hardness as a barrier against manipulation Vincent Conitzer
Where are the hard manipulation problems? Toby Walsh NICTA and UNSW Sydney Australia LogICCC Day, COMSOC 2010.
The Distortion of Cardinal Preferences in Voting Ariel D. Procaccia and Jeffrey S. Rosenschein.
Complexity Results about Nash Equilibria
Shahar Dobzinski (Hebrew U) Ariel D. Procaccia (MS Israel R&D Center)
Speaker: Ariel Procaccia Joint work with: Michael Zuckerman, Jeff Rosenschein Hebrew University of Jerusalem.
Ties Matter: Complexity of Voting Manipulation Revisited based on joint work with Svetlana Obraztsova (NTU/PDMI) and Noam Hazon (CMU) Edith Elkind (Nanyang.
Preference elicitation Vincent Conitzer
CPS Voting and social choice
Social choice theory = preference aggregation = voting assuming agents tell the truth about their preferences Tuomas Sandholm Professor Computer Science.
Campaign Management via Bribery Piotr Faliszewski AGH University of Science and Technology, Poland Joint work with Edith Elkind and Arkadii Slinko.
How Hard Is It To Manipulate Voting? Edith Elkind, Princeton Helger Lipmaa, HUT.
The Theory of NP-Completeness
Junta Distributions and the Average Case Complexity of Manipulating Elections A. D. Procaccia & J. S. Rosenschein.
Computational Complexity, Physical Mapping III + Perl CIS 667 March 4, 2004.
Complexity of unweighted coalitional manipulation under some common voting rules Lirong XiaVincent Conitzer COMSOC08, Sep. 3-5, 2008 TexPoint fonts used.
Automated Design of Voting Rules by Learning From Examples Ariel D. Procaccia, Aviv Zohar, Jeffrey S. Rosenschein.
1 Manipulation of Voting Schemes: A General Result By Allan Gibbard Presented by Rishi Kant.
Complexity of Mechanism Design Vincent Conitzer and Tuomas Sandholm Carnegie Mellon University Computer Science Department.
Reshef Meir School of Computer Science and Engineering Hebrew University, Jerusalem, Israel Joint work with Maria Polukarov, Jeffery S. Rosenschein and.
Social choice theory = preference aggregation = truthful voting Tuomas Sandholm Professor Computer Science Department Carnegie Mellon University.
Strategic Behavior in Multi-Winner Elections A follow-up on previous work by Ariel Procaccia, Aviv Zohar and Jeffrey S. Rosenschein Reshef Meir The School.
Social choice (voting) Vincent Conitzer > > > >
Online Manipulation and Control in Sequential Voting Lane A. Hemaspaandra Jörg Rothe Edith Hemaspaandra.
1.1 Chapter 1: Introduction What is the course all about? Problems, instances and algorithms Running time v.s. computational complexity General description.
Historically Interesting Voting Rules: Electing the Doge Lirong Xia Toby Walsh Auckland, Feb 20 th 2012.
CPS 173 Mechanism design Vincent Conitzer
Chapter 13: Weighted Voting Banzhaf Power Index Shapley-Shubik Power Index Equivalent Systems Examples.
CPS Voting and social choice Vincent Conitzer
An Algorithm for the Coalitional Manipulation Problem under Maximin Michael Zuckerman, Omer Lev and Jeffrey S. Rosenschein AAMAS’11.
Projektseminar Computational Social Choice -Eine Einführung- Jörg Rothe & Lena Schend SS 2012, HHU Düsseldorf 4. April 2012.
Mechanism Design CS 886 Electronic Market Design University of Waterloo.
Mechanism design for computationally limited agents (previous slide deck discussed the case where valuation determination was complex) Tuomas Sandholm.
Complexity of Determining Nonemptiness of the Core Vincent Conitzer, Tuomas Sandholm Computer Science Department Carnegie Mellon University.
Junta Distributions and the Average-Case Complexity of Manipulating Elections A presentation by Jeremy Clark Ariel D. Procaccia Jeffrey S. Rosenschein.
Automated Mechanism Design Tuomas Sandholm Presented by Dimitri Mostinski November 17, 2004.
Manipulating the Quota in Weighted Voting Games (M. Zuckerman, P. Faliszewski, Y. Bachrach, and E. Elkind) ‏ Presented by: Sen Li Software Technologies.
Avoiding manipulation in elections through computational complexity Vincent Conitzer Computer Science Department Carnegie Mellon University Guest lecture.
Social choice theory = preference aggregation = voting assuming agents tell the truth about their preferences Tuomas Sandholm Professor Computer Science.
CPS Computational problems, algorithms, runtime, hardness (a ridiculously brief introduction to theoretical computer science) Vincent Conitzer.
Chapter 11 Introduction to Computational Complexity Copyright © 2011 The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 1.
11/24/2008CS Common Voting Rules as Maximum Likelihood Estimators - Matthew Kay 1 Common Voting Rules as Maximum Likelihood Estimators Vincent Conitzer,
Arrow’s Impossibility Theorem
Computing Shapley values, manipulating value division schemes, and checking core membership in multi-issue domains Vincent Conitzer, Tuomas Sandholm Computer.
When Are Elections with Few Candidates Hard to Manipulate V. Conitzer, T. Sandholm, and J. Lang Subhash Arja CS 286r October 29, 2008.
Mechanism design for computationally limited agents (previous slide deck discussed the case where valuation determination was complex) Tuomas Sandholm.
Mechanism design for computationally limited agents (last lecture discussed the case where valuation determination was complex) Tuomas Sandholm Computer.
Social choice theory = preference aggregation = voting assuming agents tell the truth about their preferences Tuomas Sandholm Professor Computer Science.
Applied Mechanism Design For Social Good
Manipulation Lirong Xia Fall, Manipulation Lirong Xia Fall, 2016.
Voting and social choice
Vincent Conitzer CPS 173 Mechanism design Vincent Conitzer
CPS 173 Voting and social choice
Approximability of Manipulating Elections
CPS Voting and social choice
Presentation transcript:

Introduction complexity has been suggested as a means of precluding strategic behavior. Previous studies have shown that some voting protocols are hard to manipulate, but used NP-hardness as the complexity measure. Such a worst-case analysis may be an insufficient guarantee of resistance to manipulation. Indeed, we demonstrate that NP-hard manipulations may be tractable in the average-case. For this purpose, we augment the existing theory of average-case complexity with new concepts; we consider elections distributed with respect to junta distributions, which concentrate on hard instances, and introduce a notion of heuristic polynomial time. We use our techniques to prove that scoring protocols are susceptible to manipulation by coalitions, when the number of candidates is constant. This fundamental impossibility result implies that one cannot design a voting rule which is average-case hard to manipulate on the basis of scoring protocols. E ncouraging voters to truthfully reveal their preferences in an election has long been an important issue. In particular, computational Conitzer & Sandholm Complexity of Manipulating Elections with Few Candidates. AAAI, pp , Elkind & Lipmaa Small Coalitions Cannot Manipulate Voting. FC, pp , Bartholdi & Orlin Single Transferable Vote Resists Strategic Voting. Social Choice and Welfare 8(4): , In multiagent settings, agents often have conflicting preferences – reaching consensus may be difficult. Voting is often applied to this end, as it is well-studied and provides theoretical guarantees. In an election, each of the n voters ranks m candidates; the winner is determined according to a voting protocol. Strategic behavior on the part of voters may be a problem when voting is used – and computational complexity may be the solution. Indeed, Conitzer & Sandholm have demonstrated that many prominent voting protocols are NP- hard to manipulate by coalitions. Nevertheless, it may still be the case that manipulation is usually possible. Preliminaries Definition: A Scoring protocol is defined by a vector  =  1,...,  m . Each candidate receives j points for every voter which ranks it in j’th place. The candidate with the highest score is elected. Definition: In the Coalitional-Weighted- Manipulation (CWM) problem, we are given a set of weighted votes S, a set of votes T, and a preferred candidate p. We are asked whether there is a way to cast the votes in T so that p wins. Our Approach We consider distributions over the CWM problem which concentrate on hard instances. Presumably, if the problem can usually be decided w.r.t. such a distribution, then it can usually be decided w.r.t. any distribution. Hardness: the restriction of the problem to instances with non-zero probability is NP-hard. Balance: there is at least constant probability for “yes” and “no” instances. Dichotomy: all instances are either probable or impossible. Symmetry: different candidates have same probability of receiving a certain initial score. Refinement: Manipulators cannot succeed by voting identically. Definition: A distribution over the instances of the CWM problem is a junta distribution iff it satisfies: Definition: An algorithm A is a heuristic polynomial time algorithm for a decision problem, w.r.t. a distribution , if the probability that the algorithm errs is inverse-polynomial, when the instances of the problem are distributed w.r.t. . Definition: We say that a voting protocol P is susceptible to coalitional manipulation if there exists a heuristic polynomial time algorithm for CWM in P, w.r.t. a junta distribution . Main Result Theorem: Let P be a scoring protocol, and let m=O(1). Then P is susceptible to coalitional manipulation. On the other hand, it is known that CWM is NP- hard in scoring protocols where  m-1 <  m, even when m=O(1). If so, this is an explicit class of important voting protocols (which includes Borda and Veto) which are NP-hard to manipulate in the worst-case, but easy to manipulate in the average-case.