Projektseminar Computational Social Choice -Eine Einführung- Jörg Rothe & Lena Schend SS 2012, HHU Düsseldorf 4. April 2012.

Slides:



Advertisements
Similar presentations
Manipulation and Control for Approval Voting and Other Voting Systems Jörg Rothe Oxford Meeting for COST Action IC1205 on Computational Social Choice April.
Advertisements

On the Robustness of Preference Aggregation in Noisy Environments Ariel D. Procaccia, Jeffrey S. Rosenschein and Gal A. Kaminka.
Common Voting Rules as Maximum Likelihood Estimators Vincent Conitzer (Joint work with Tuomas Sandholm) Early version of this work appeared in UAI-05.
Learning Voting Trees Ariel D. Procaccia, Aviv Zohar, Yoni Peleg, Jeffrey S. Rosenschein.
Voting and social choice Vincent Conitzer
How Hard Is It To Manipulate Voting? Edith Elkind, U. of Warwick Helger Lipmaa, Tartu U.
Algorithmic Game Theory Uri Feige Robi Krauthgamer Moni Naor Lecture 9: Social Choice Lecturer: Moni Naor.
Voting and social choice Looking at a problem from the designers point of view.
Overview of Computational Foundations of Social Choice GASICS Workshop Aachen, October 2009 Jörg Rothe.
Complexity of manipulating elections with few candidates Vincent Conitzer and Tuomas Sandholm Carnegie Mellon University Computer Science Department.
Computing Kemeny and Slater Rankings Vincent Conitzer (Joint work with Andrew Davenport and Jayant Kalagnanam at IBM Research.)
Manipulation Toby Walsh NICTA and UNSW. Manipulation Constructive  Can we change result so a given candidate wins Destructive  Can we change result.
The Complexity of Elections: A New Domain for Heuristic Computation Piotr Faliszewski AGH University of Science and Technology, Kraków, Poland
Socially desirable approximations for Dodgson’s voting rule Ioannis Caragiannis (University of Patras) Christos Kaklamanis (University of Patras) Nikos.
+ Random Tie Breaking Toby Walsh NICTA and UNSW. + Random Tie Breaking Haris Aziz, Serge Gaspers, Nick Mattei, Nina Narodytska, Toby Walsh NICTA and UNSW.
Convergence of Iterative Voting AAMAS 2012 Valencia, Spain Omer Lev & Jeffrey S. Rosenschein.
Using computational hardness as a barrier against manipulation Vincent Conitzer
Using computational hardness as a barrier against manipulation Vincent Conitzer
Where are the hard manipulation problems? Toby Walsh NICTA and UNSW Sydney Australia LogICCC Day, COMSOC 2010.
The Distortion of Cardinal Preferences in Voting Ariel D. Procaccia and Jeffrey S. Rosenschein.
Manipulation and Control in Weighted Voting Games Based on: Bachrach, Elkind, AAMAS’08 Zuckerman, Faliszewski, Bachrach, Elkind, AAAI’08.
Approximability and Inapproximability of Dodgson and Young Elections Ariel D. Procaccia, Michal Feldman and Jeffrey S. Rosenschein.
Speaker: Ariel Procaccia Joint work with: Michael Zuckerman, Jeff Rosenschein Hebrew University of Jerusalem.
Ties Matter: Complexity of Voting Manipulation Revisited based on joint work with Svetlana Obraztsova (NTU/PDMI) and Noam Hazon (CMU) Edith Elkind (Nanyang.
Preference elicitation Vincent Conitzer
CPS Voting and social choice
Social choice theory = preference aggregation = voting assuming agents tell the truth about their preferences Tuomas Sandholm Professor Computer Science.
Tutorial: Computational Voting Theory Vincent Conitzer & Ariel D. Procaccia.
Campaign Management via Bribery Piotr Faliszewski AGH University of Science and Technology, Poland Joint work with Edith Elkind and Arkadii Slinko.
How Hard Is It To Manipulate Voting? Edith Elkind, Princeton Helger Lipmaa, HUT.
Junta Distributions and the Average Case Complexity of Manipulating Elections A. D. Procaccia & J. S. Rosenschein.
Common Voting Rules as Maximum Likelihood Estimators Vincent Conitzer and Tuomas Sandholm Carnegie Mellon University, Computer Science Department.
Complexity of unweighted coalitional manipulation under some common voting rules Lirong XiaVincent Conitzer COMSOC08, Sep. 3-5, 2008 TexPoint fonts used.
Automated Design of Voting Rules by Learning From Examples Ariel D. Procaccia, Aviv Zohar, Jeffrey S. Rosenschein.
Reshef Meir School of Computer Science and Engineering Hebrew University, Jerusalem, Israel Joint work with Maria Polukarov, Jeffery S. Rosenschein and.
Social choice theory = preference aggregation = truthful voting Tuomas Sandholm Professor Computer Science Department Carnegie Mellon University.
Strategic Behavior in Multi-Winner Elections A follow-up on previous work by Ariel Procaccia, Aviv Zohar and Jeffrey S. Rosenschein Reshef Meir The School.
Preference Aggregation on Structured Preference Domains Edith Elkind University of Oxford.
Introduction complexity has been suggested as a means of precluding strategic behavior. Previous studies have shown that some voting protocols are hard.
Social choice (voting) Vincent Conitzer > > > >
Online Manipulation and Control in Sequential Voting Lane A. Hemaspaandra Jörg Rothe Edith Hemaspaandra.
Historically Interesting Voting Rules: Electing the Doge Lirong Xia Toby Walsh Auckland, Feb 20 th 2012.
An efficient distributed protocol for collective decision- making in combinatorial domains CMSS Feb , 2012 Minyi Li Intelligent Agent Technology.
Social Choice Lecture 19 John Hey.
CPS Voting and social choice Vincent Conitzer
An Algorithm for the Coalitional Manipulation Problem under Maximin Michael Zuckerman, Omer Lev and Jeffrey S. Rosenschein AAMAS’11.
An Algorithm for the Coalitional Manipulation Problem under Maximin Michael Zuckerman, Omer Lev and Jeffrey S. Rosenschein (Simulations by Amitai Levy)
The Shield that Never Was: Societies with Single-Peaked Preferences are More Open to Manipulation and Control Piotr Faliszewski AGH University of Science.
Mechanism design for computationally limited agents (previous slide deck discussed the case where valuation determination was complex) Tuomas Sandholm.
Junta Distributions and the Average-Case Complexity of Manipulating Elections A presentation by Jeremy Clark Ariel D. Procaccia Jeffrey S. Rosenschein.
Manipulating the Quota in Weighted Voting Games (M. Zuckerman, P. Faliszewski, Y. Bachrach, and E. Elkind) ‏ Presented by: Sen Li Software Technologies.
Avoiding manipulation in elections through computational complexity Vincent Conitzer Computer Science Department Carnegie Mellon University Guest lecture.
Empirical Aspects of Plurality Elections David R. M. Thompson, Omer Lev, Kevin Leyton-Brown & Jeffrey S. Rosenschein COMSOC 2012 Kraków, Poland.
11/24/2008CS Common Voting Rules as Maximum Likelihood Estimators - Matthew Kay 1 Common Voting Rules as Maximum Likelihood Estimators Vincent Conitzer,
When Are Elections with Few Candidates Hard to Manipulate V. Conitzer, T. Sandholm, and J. Lang Subhash Arja CS 286r October 29, 2008.
Mechanism design for computationally limited agents (previous slide deck discussed the case where valuation determination was complex) Tuomas Sandholm.
Mechanism design for computationally limited agents (last lecture discussed the case where valuation determination was complex) Tuomas Sandholm Computer.
Social choice theory = preference aggregation = voting assuming agents tell the truth about their preferences Tuomas Sandholm Professor Computer Science.
A Brief Introductory Tutorial on Computational Social Choice
Algorithmic Analysis of Elections: Voting Rules and Manipulability (minicourse) Piotr Faliszewski AGH University Kraków, Poland.
A Crash Course on Computational Social Choice and Fair Division
Warm Up – 5/27 - Monday How many people voted in the election?
Computational Social Choice and Moral Artificial Intelligence
Manipulation Lirong Xia Fall, Manipulation Lirong Xia Fall, 2016.
Voting systems Chi-Kwong Li.
Voting and social choice
CPS 173 Voting and social choice
Approximability of Manipulating Elections
Computational Social Choice (Part II: Bribery and Friends)
CPS Voting and social choice
Presentation transcript:

Projektseminar Computational Social Choice -Eine Einführung- Jörg Rothe & Lena Schend SS 2012, HHU Düsseldorf 4. April 2012

Introduction Social Choice Theory  voting theory  preference aggregation  judgment aggregation Computer Science  artificial intelligence  algorithm design  computational complexity theory - worst-case/average-case complexity - optimization, etc. voting in multiagent systems multi-criteria decision making meta search, etc.... Software agents can systematically analyze elections to find optimal strategies

Introduction Social Choice Theory  voting theory  preference aggregation  judgment aggregation Computational Social Choice Computer Science  artificial intelligence  algorithm design  computational complexity theory - worst-case/average-case complexity - optimization, etc. computational barriers to prevent manipulation control bribery Software agents can systematically analyze elections to find optimal strategies

Computational Social Choice With the power of NP-hardness vulcans have constructed complexity shields to protect elections against many types of manipulation and control.

Computational Social Choice With the power of NP-hardness vulcans have constructed complexity shields to protect elections against many types of manipulation and control. Question: Are worst-case complexity shields enough? Or do they evaporate on "typical elections"?

NP-Hardness Shields Evaporating? NP-hardness shields single-peaked electorates junta distributions approximation experimental analysis

Elections  An election is a pair (C,V) with a finite set C of candidates: a finite list V of voters.  Voters are represented by their preferences over C: either by linear orders: > > > or by approval vectors: (1,1,0,1)  Voting system: determines winners from the preferences

Voting Systems Approval Voting (AV)  votes are approval vectors in v1v v2v v3v v4v v5v v6v6 1001

Voting Systems Approval Voting (AV)  votes are approval vectors in  winners: all candidates with the most approvals v1v v2v v3v v4v v5v v6v ∑ 4324

Voting Systems Approval Voting (AV)  votes are approval vectors in  winners: all candidates with the most approvals winners: v1v v2v v3v v4v v5v v6v ∑ 4324

Voting Systems Positional Scoring Rules (for m candidates)  defined by scoring vector with  each voter gives points to the candidate on position i  winners: all candidates with maximum score Borda:Plurality Voting (PV): k-Approval (m-k-Veto):Veto (Anti-Plurality):

-4:02:23:1 0:4-1:32:2 3:1-2:2 1:32:2 - Voting Systems Pairwise Comparison v 1 : >>> v 3 : > > > v 2 : >>> v 4 : > > > Condorcet: beats all other candidates strictly Copeland : 1 point for victory points for tie Maximin: maximum of the worst pairwise comparison

Voting Systems Round-based: Single Transferable Vote (STV) v 1 : >>> v 2 : > > > v 3 : > >> v 4 : > > > Round 1 over eliminate cand. with lowest plurality score Round 2 over eliminate cand. with lowest plurality score Final Round over eliminate cand. with lowest plurality score

Voting Systems Round-based: Single Transferable Vote (STV) v 1 : >> v 2 : > > v 3 : > > v 4 : > > Round 1 over eliminate cand. with lowest plurality score Round 2 over eliminate cand. with lowest plurality score Final Round over eliminate cand. with lowest plurality score

Voting Systems Round-based: Single Transferable Vote (STV) v 1 : v 2 : v 3 : v 4 : Round 1 over eliminate cand. with lowest plurality score Round 2 over eliminate cand. with lowest plurality score Final Round over … and the winner is…

Voting Systems Level-based: Bucklin Voting (BV) v 1 : > > > v 2 : > > > v 3 : > > > v 4 : > > > v 5 : > > >  5 voters => strict majority threshold is 3 Lvl 11220

Voting Systems Level-based: Bucklin Voting (BV) v 1 : > > > v 2 : > > > v 3 : > > > v 4 : > > > v 5 : > > >  5 voters => strict majority threshold is 3 Lvl Lvl 22233

Voting Systems Level-based: Bucklin Voting (BV) v 1 : > > > v 2 : > > > v 3 : > > > v 4 : > > > Level 2 Bucklin v 5 : > > > winners:  5 voters => strict majority threshold is 3 Lvl Lvl 22233

Voting Systems Level-based: Fallback Voting (FV)  combines AV and BV Candidates: v: {, } | {, } v: > | {, }  Bucklin winners are fallback winners.  If no Bucklin winner exists (due to disapprovals), then approval winners win.

War on Electoral Control AV winners: "chair": knows all preferences v1v v2v v3v v4v v5v v6v ∑ 4324

War on Electoral Control AV winner: "chair": knows all preferences and can change the structure of an election v1v v2v v3v v4v v5v v6v ∑ 2312

War on Electoral Control AV winner: "chair": knows all preferences and can change the structure Other types of control: of an election  adding/partitioning voters  deleting/adding/partitioning candidates v1v v2v v3v v4v v5v v6v ∑ 2312

NP-Hardness Shields for Control Resistance = NP-hardness, Vulnerability = P, Immunity, and Susceptibility

Cope- land Score -4:02:23:12.5 0:4-1:32:20.5 2:23:1-2:22 1:32:2 -1 War on Manipulation Copeland : winner v 1 : >>> v 3 : > > > v 2 : >>> v 4 : > > > I like Spock but I don‘t want him to be the captain!!

Copeland : winner v 1 : >>> v 3 : > > > v 2 : >>> v 4 : > > > assumption:. v 4 knows the other voters‘ votes v 4 lies to make his most preferred candidate win Cope- land Score -4:02:23:12.5 0:4-1:32:20.5 2:23:1-2:22 1:32:2 -1 War on Manipulation I like Spock but I don‘t want him to be the captain!!

Copeland : winners v 1 : >>> v 3 : > > > v 2 : >>> v 4 : > > > Here: unweighted voters, single manipulator. Other types: - coalitional manipulation - weighted voters Cope- land Score -3:12:2 2 1:3- 0 2:23:1-2:22 3:12:2-2 War on Manipulation I like Spock but I don‘t want him to be the captain!!

NP-Hardness Shields for Manipulation Results due to Conitzer, Sandholm, Lang (J.ACM 2007)

NP-Hardness Shields Evaporating? NP-hardness shields single-peaked electorates junta distributions approximation experimental analysis

Junta Distributions of Procaccia and Rosenschein (JAAMAS 2007) are omitted here, as they are a rather technical concept.

NP-Hardness Shields Evaporating? NP-hardness shields single-peaked electorates junta distributions approximation experimental analysis

Experiments Manipulation  testing (heuristic) algorithms for manipulation problem at hand on given elections sample real elections generate random elections: Impartial Culture (IC) Polya-Eggenberger (PE) voters vote independently all preferences are equally likely voters are highly correlated v 1 v 2 v 3... Walsh (IJCAI 2009; ECAI 2010)

Experiments Manipulation  testing (heuristic) algorithms for manipulation problem at hand on given elections sample real elections generate random elections: Impartial Culture (IC) Polya-Eggenberger (PE) voters vote independently all preferences are equally likely voters are highly correlated v 1 v 2 v 3... Walsh (IJCAI 2009; ECAI 2010)

Experiments Manipulation  testing (heuristic) algorithms for manipulation problem at hand on given elections sample real elections generate random elections: Impartial Culture (IC) Polya-Eggenberger (PE) voters vote independently all preferences are equally likely voters are highly correlated v 1 v 2 v 3... Walsh (IJCAI 2009; ECAI 2010)

Experiments Manipulation  testing (heuristic) algorithms for manipulation problem at hand on given elections sample real elections generate random elections: Impartial Culture (IC) Polya-Eggenberger (PE) voters vote independently all preferences are equally likely voters are highly correlated v 1 v 2 v 3... Walsh (IJCAI 2009; ECAI 2010)

Experiments Manipulation  testing (heuristic) algorithms for manipulation problem at hand on given elections sample real elections generate random elections: Impartial Culture (IC) Polya-Eggenberger (PE) voters vote independently all preferences are equally likely voters are highly correlated v 1 v 2 v 3... Walsh (IJCAI 2009; ECAI 2010)

Experiments Manipulation  testing (heuristic) algorithms for manipulation problem at hand on given elections sample real elections generate random elections: Impartial Culture (IC) Polya-Eggenberger (PE) voters vote independently all preferences are equally likely voters are highly correlated v 1 v 2 v 3... Walsh (IJCAI 2009; ECAI 2010)

Experiments Manipulation  Results for STV Single Manipulation:  for up to 128 candidates/voters manipulation has low computational costs (for all voter distributions)  chance of successful manipulation decreases with increasing number of nonmanipulative voters Coalitional Manipulation:  larger coalitions are more likely to be successful  again: computational costs are low for up to 128 candidates/voters  Results for Veto (weighted) if manipulators‘ weights are too big/small => trivial even in critical region: computational costs are low only correlated voters increase computational costs Walsh (IJCAI 2009; ECAI 2010)

NP-Hardness Shields Evaporating? NP-hardness shields single-peaked electorates junta distributions approximation experimental analysis

Approximating Manipulation Before: Is manipulation possible?

Approximating Manipulation Before: Is manipulation possible? Now: How many manipulators are needed? (min!) Approximation Algorithms: -efficient algorithms -do not always find optimal solution -can be analyzed both theoretically and experimentally

Approximating Borda 3x > > > > > > 2x > > > > > > Borda winner manipulators prefer B-Score

Approximating Borda Algorithm for Borda-CCUM : "Reverse" m 1 > > > > > > B-Score Zuckerman, Procaccia & Rosenschein (Artificial Intelligence 2009)

Approximating Borda Algorithm for Borda-CCUM : "Reverse" m 1 > > > > > > B-Score Zuckerman, Procaccia & Rosenschein (Artificial Intelligence 2009)

Approximating Borda Algorithm for Borda-CCUM : "Reverse" m 1 > > > > > > m 2 > > > > > > B-Score Zuckerman, Procaccia & Rosenschein (Artificial Intelligence 2009)

Approximating Borda Algorithm for Borda-CCUM : "Reverse" m 1 > > > > > > m 2 > > > > > > B-Score Zuckerman, Procaccia & Rosenschein (Artificial Intelligence 2009)

Approximating Borda Algorithm for Borda-CCUM : "Reverse" m 1 > > > > > > m 2 > > > > > > m 3 > > > > > > B-Score Zuckerman, Procaccia & Rosenschein (Artificial Intelligence 2009)

Approximating Borda Algorithm for Borda-CCUM : "Reverse" m 1 > > > > > > m 2 > > > > > > m 3 > > > > > > B-Score Zuckerman, Procaccia & Rosenschein (Artificial Intelligence 2009)

Approximating Borda Algorithm for Borda-CCUM : "Reverse" m 1 > > > > > > m 2 > > > > > > m 3 > > > > > > m 4 > > > > > > B-Score Zuckerman, Procaccia & Rosenschein (Artificial Intelligence 2009)

Approximating Borda Algorithm for Borda-CCUM : "Reverse" m 1 > > > > > > m 2 > > > > > > m 3 > > > > > > m 4 > > > > > > B-Score Zuckerman, Procaccia & Rosenschein (Artificial Intelligence 2009)

Approximating Borda Algorithm for Borda-CCUM : "Reverse" m 1 > > > > > > m 2 > > > > > > m 3 > > > > > > m 4 > > > > > > m 5 > > > > > > B-Score Zuckerman, Procaccia & Rosenschein (Artificial Intelligence 2009)

Approximating Borda Algorithm for Borda-CCUM : "Reverse" m 1 > > > > > > m 2 > > > > > > m 3 > > > > > > m 4 > > > > > > m 5 > > > > > > B-Score Zuckerman, Procaccia & Rosenschein (Artificial Intelligence 2009)

Approximating Borda Optimal solution: 4 manipulators m 1 > > > > > > m 2 > > > > > > m 3 > > > > > > m 4 > > > > > > "Reverse" needs one manipulator more than optimal B-Score Zuckerman, Procaccia & Rosenschein (Artificial Intelligence 2009)

Approximation Results  Maximin: factor 2 (twice number of optimal manipulators) factor 5/3 (not better than 3/2 unless P=NP)  Borda: Reverse: additional 1 Largest Fit unbounded additional number Average Fit of manipulators,, and are theoretically incomparable experimental comparison: IC model 76%83%99% PE model 76%43%99% Zuckerman, Lev & Rosenschein (AAMAS 2011) Davies, Katsirelos, Narodytska & Walsh (AAAI 2011)

NP-Hardness Shields Evaporating? NP-hardness shields single-peaked electorates junta distributions approximation experimental analysis

Single-Peaked Preferences  A collection V of votes is said to be single-peaked if there exists a linear order L over C such that each voter‘s „degree of preference“ rises to a peak and then falls (or just rises or just falls). A voter‘s preference curve on galactic taxes low galactic taxes high galactic taxes

 A collection V of votes is said to be single-peaked if there exists a linear order L over C such that each voter‘s „degree of preference“ rises to a peak and then falls (or just rises or just falls). A voter‘s > > > preference curve on galactic taxes low galactic taxes high galactic taxes Single-Peaked Preferences Single-peaked preference consistent with linear order of candidates

 A collection V of votes is said to be single-peaked if there exists a linear order L over C such that each voter‘s „degree of preference“ rises to a peak and then falls (or just rises or just falls). A voter‘s > > > preference curve on galactic taxes low galactic taxes high galactic taxes Single-Peaked Preferences Preference that is inconsistent with this linear order of candidates

Single-Peaked Preferences  A collection V of votes is said to be single-peaked if there exists a linear order L over C such that each voter‘s „degree of preference“ rises to a peak and then falls (or just rises or just falls).  If each vote v i in V is a linear order > i over C, this means that for each triple of candidates c, d, and e: (c L d L e or e L d L c) implies that for each i, if c > i d then d > i e.

Single-Peaked Preferences  A collection V of votes is said to be single-peaked if there exists a linear order L over C such that each voter‘s „degree of preference“ rises to a peak and then falls (or just rises or just falls).  If each vote v i in V is a linear order > i over C, this means that for each triple of candidates c, d, and e: (c L d L e or e L d L c) implies that for each i, if c > i d then d > i e.  Bartholdi & Trick (1986); Escoffier, Lang & Öztürk (2008): Given a collection V of linear orders over C, in polynomial time we can produce a linear order L witnessing V‘s single- peakedness or can determine that V is not single-peaked.

 A collection V of votes is said to be single-peaked if there exists a linear order L over C such that each voter‘s „degree of preference“ rises to a peak and then falls (or just rises or just falls). Single-peaked w.r.t. this order? v1v no v2v yes v3v no v4v yes v5v no v6v Single-Peaked Approval Vectors

 Removing NP-hardness shields:  3-candidate Borda  veto  every scoring protocol for  -candidate 3-veto,  Leaving them in place:  STV (Walsh AAAI 2007)  4-candidate Borda  5-candidate 3-veto  Erecting NP-hardness shields:  Artificial election system with approval votes, for size-3-coalition unweighted manipulation Results due to Faliszewski, Hemaspaandra, Hemaspaandra & Rothe (Information & Computation 2011) GeneralSingle-peaked Constructive Coalitional Weighted Manipulation

 Removing NP-hardness shields:  Approval  Constructive control by adding voters  Constructive control by deleting voters  Plurality  constructive control by adding candidates  destructive control by adding candidates  constructive control by deleting candidates  destructive control by deleting candidates Results due to Faliszewski, Hemaspaandra, Hemaspaandra & Rothe (2011)  Brandt, Brill, Hemaspaandra & Hemaspaandra (AAAI 2010) achieved similar results for other voting systems as well (e.g., for systems satisfying the weak Condorcet criterion) and also for constructive control by partition of voters. GeneralSingle-peaked Control for Single-Peaked Electorates

More Results on Single-Peaked Preferences  Faliszewski, Hemaspaandra, Hemaspaandra & Rothe (2011) also prove a dichotomy result for the scoring protocol CCWM is NP-complete if and in P otherwise.  Brandt, Brill, Hemaspaandra & Hemaspaandra (AAAI 2010) generalize this dichotomoy to scoring protocols with any fixed number of candidates.  Mattei (ADT 2011) empirically investigates huge data sets from real-world elections (drawn from the Netflix Prize) and observes that single-peaked preferences very rarely occur in practice.  Faliszewski, Hemaspaandra & Hemaspaandra (TARK 2011) study manipulative attacks in nearly single-peaked electorates.

NP-Hardness Shields Evaporating? NP-hardness shields single-peaked electorates junta distributions approximation experimental analysis

Experiments Control  same approach as for manipulation  testing (heuristic) algorithms for control problem at hand on given elections sample real elections generate random elections: Impartial Culture (IC) Two Mainstreams (TM) voters vote independently all preferences are equally likely voters are correlated

Experiments Control  same approach as for manipulation  testing (heuristic) algorithms for control problem at hand on given elections sample real elections generate random elections: Impartial Culture (IC) Two Mainstreams (TM) voters vote independently all preferences are equally likely voters are correlated

Experiments Control  same approach as for manipulation  testing (heuristic) algorithms for control problem at hand on given elections sample real elections generate random elections: Impartial Culture (IC) Two Mainstreams (TM) voters vote independently all preferences are equally likely voters are correlated v 1 v 2 v 3 v 4...

Experiments Control Observations:  destructive control shows more yes-instances (up to 100%) and lower computational costs  DCPV-TP in FV

Experiments Control Observations:  destructive control shows more yes-instances (up to 100%) and lower computational costs  CCPV-TP in FV

Experiments Control Observations:  destructive control shows more yes-instances (up to 100%) and lower computational costs  FV and BV show similar tendencies  voter control in PV has lower computational costs  deleting/adding voters show similar tendencies  for constructive control: voter control shows more yes-instances than candidate control  as expected: more yes-instances in the IC model than in the TM model

Thank you very much! That‘s typical for you humans! Please wait until the talk ist finished before you start asking questions!