Junta Distributions and the Average-Case Complexity of Manipulating Elections A presentation by Jeremy Clark Ariel D. Procaccia Jeffrey S. Rosenschein.

Slides:



Advertisements
Similar presentations
Shortest Vector In A Lattice is NP-Hard to approximate
Advertisements

On the Robustness of Preference Aggregation in Noisy Environments Ariel D. Procaccia, Jeffrey S. Rosenschein and Gal A. Kaminka.
Ioannis Caragiannis, Jason A. Covey, Michal Feldman, Christopher M. Homan, Christos Kaklamanis, Nikos Karanikolask, Ariel D. Procaccia, Je ff rey S. Rosenschein.
The Computational Difficulty of Manipulating an Election Tetiana Zinchenko 05/12/
Learning Voting Trees Ariel D. Procaccia, Aviv Zohar, Yoni Peleg, Jeffrey S. Rosenschein.
Voting and social choice Vincent Conitzer
How Hard Is It To Manipulate Voting? Edith Elkind, U. of Warwick Helger Lipmaa, Tartu U.
Algorithmic Game Theory Uri Feige Robi Krauthgamer Moni Naor Lecture 9: Social Choice Lecturer: Moni Naor.
Plurality Voting with Truth-biased Agents Vangelis Markakis Joint work with: Svetlana Obraztsova, David R. M. Thompson Athens University of Economics and.
Speaker: Ariel Procaccia 1 Joint work with: Ioannis Caragiannis 2, Jason Covey 3, Michal Feldman 1, Chris Homan 3, Christos Kaklamanis 2, Nikos Karanikolas.
Mark Wang John Sturm Sanjeev Kulkarni Paul Cuff.  Basic Background – What is the problem?  Condorcet = IIA  Survey Data  Pairwise Boundaries = No.
How “impossible” is it to design a Voting rule? Angelina Vidali University of Athens.
IMPOSSIBILITY AND MANIPULABILITY Section 9.3 and Chapter 10.
Analysis of Algorithms
Complexity of manipulating elections with few candidates Vincent Conitzer and Tuomas Sandholm Carnegie Mellon University Computer Science Department.
Computing Kemeny and Slater Rankings Vincent Conitzer (Joint work with Andrew Davenport and Jayant Kalagnanam at IBM Research.)
Manipulation Toby Walsh NICTA and UNSW. Manipulation Constructive  Can we change result so a given candidate wins Destructive  Can we change result.
Socially desirable approximations for Dodgson’s voting rule Ioannis Caragiannis (University of Patras) Christos Kaklamanis (University of Patras) Nikos.
+ Random Tie Breaking Toby Walsh NICTA and UNSW. + Random Tie Breaking Haris Aziz, Serge Gaspers, Nick Mattei, Nina Narodytska, Toby Walsh NICTA and UNSW.
Convergence of Iterative Voting AAMAS 2012 Valencia, Spain Omer Lev & Jeffrey S. Rosenschein.
Using computational hardness as a barrier against manipulation Vincent Conitzer
Using computational hardness as a barrier against manipulation Vincent Conitzer
The Distortion of Cardinal Preferences in Voting Ariel D. Procaccia and Jeffrey S. Rosenschein.
Approximating Optimal Social Choice under Metric Preferences Elliot Anshelevich Onkar Bhardwaj John Postl Rensselaer Polytechnic Institute (RPI), Troy,
1 Introduction to Computability Theory Lecture12: Reductions Prof. Amos Israeli.
Speaker: Ariel Procaccia Joint work with: Michael Zuckerman, Jeff Rosenschein Hebrew University of Jerusalem.
Ties Matter: Complexity of Voting Manipulation Revisited based on joint work with Svetlana Obraztsova (NTU/PDMI) and Noam Hazon (CMU) Edith Elkind (Nanyang.
Strategy-Proof Classification Reshef Meir School of Computer Science and Engineering, Hebrew University A joint work with Ariel. D. Procaccia and Jeffrey.
CPS Voting and social choice
Social choice theory = preference aggregation = voting assuming agents tell the truth about their preferences Tuomas Sandholm Professor Computer Science.
How Hard Is It To Manipulate Voting? Edith Elkind, Princeton Helger Lipmaa, HUT.
Approximation algorithms and mechanism design for minimax approval voting Ioannis Caragiannis Dimitris Kalaitzis University of Patras Vangelis Markakis.
Analysis of Algorithms CS 477/677
Junta Distributions and the Average Case Complexity of Manipulating Elections A. D. Procaccia & J. S. Rosenschein.
Complexity of unweighted coalitional manipulation under some common voting rules Lirong XiaVincent Conitzer COMSOC08, Sep. 3-5, 2008 TexPoint fonts used.
Automated Design of Voting Rules by Learning From Examples Ariel D. Procaccia, Aviv Zohar, Jeffrey S. Rosenschein.
Reshef Meir School of Computer Science and Engineering Hebrew University, Jerusalem, Israel Joint work with Maria Polukarov, Jeffery S. Rosenschein and.
NP-complete and NP-hard problems. Decision problems vs. optimization problems The problems we are trying to solve are basically of two kinds. In decision.
Strategic Behavior in Multi-Winner Elections A follow-up on previous work by Ariel Procaccia, Aviv Zohar and Jeffrey S. Rosenschein Reshef Meir The School.
Foundations of Cryptography Lecture 2 Lecturer: Moni Naor.
Introduction complexity has been suggested as a means of precluding strategic behavior. Previous studies have shown that some voting protocols are hard.
Social choice (voting) Vincent Conitzer > > > >
Online Manipulation and Control in Sequential Voting Lane A. Hemaspaandra Jörg Rothe Edith Hemaspaandra.
Ch. 8 & 9 – Linear Sorting and Order Statistics What do you trade for speed?
Complexity Classes (Ch. 34) The class P: class of problems that can be solved in time that is polynomial in the size of the input, n. if input size is.
Ragesh Jaiswal Indian Institute of Technology Delhi Threshold Direct Product Theorems: a survey.
CPS Voting and social choice Vincent Conitzer
1 Introduction to Approximation Algorithms. 2 NP-completeness Do your best then.
An Algorithm for the Coalitional Manipulation Problem under Maximin Michael Zuckerman, Omer Lev and Jeffrey S. Rosenschein AAMAS’11.
An Algorithm for the Coalitional Manipulation Problem under Maximin Michael Zuckerman, Omer Lev and Jeffrey S. Rosenschein (Simulations by Amitai Levy)
Projektseminar Computational Social Choice -Eine Einführung- Jörg Rothe & Lena Schend SS 2012, HHU Düsseldorf 4. April 2012.
Mechanism design for computationally limited agents (previous slide deck discussed the case where valuation determination was complex) Tuomas Sandholm.
1 The Theory of NP-Completeness 2 Cook ’ s Theorem (1971) Prof. Cook Toronto U. Receiving Turing Award (1982) Discussing difficult problems: worst case.
1 Chapter 34: NP-Completeness. 2 About this Tutorial What is NP ? How to check if a problem is in NP ? Cook-Levin Theorem Showing one of the most difficult.
Manipulating the Quota in Weighted Voting Games (M. Zuckerman, P. Faliszewski, Y. Bachrach, and E. Elkind) ‏ Presented by: Sen Li Software Technologies.
A Membrane Algorithm for the Min Storage problem Dipartimento di Informatica, Sistemistica e Comunicazione Università degli Studi di Milano – Bicocca WMC.
NP-Complete Problems Algorithm : Design & Analysis [23]
CS 3343: Analysis of Algorithms Lecture 25: P and NP Some slides courtesy of Carola Wenk.
Unique Games Approximation Amit Weinstein Complexity Seminar, Fall 2006 Based on: “Near Optimal Algorithms for Unique Games" by M. Charikar, K. Makarychev,
Empirical Aspects of Plurality Elections David R. M. Thompson, Omer Lev, Kevin Leyton-Brown & Jeffrey S. Rosenschein COMSOC 2012 Kraków, Poland.
11/24/2008CS Common Voting Rules as Maximum Likelihood Estimators - Matthew Kay 1 Common Voting Rules as Maximum Likelihood Estimators Vincent Conitzer,
On the Ability of Graph Coloring Heuristics to Find Substructures in Social Networks David Chalupa By, Tejaswini Nallagatla.
When Are Elections with Few Candidates Hard to Manipulate V. Conitzer, T. Sandholm, and J. Lang Subhash Arja CS 286r October 29, 2008.
PROBABILITY AND COMPUTING RANDOMIZED ALGORITHMS AND PROBABILISTIC ANALYSIS CHAPTER 1 IWAMA and ITO Lab. M1 Sakaidani Hikaru 1.
Voting Theory Part II: Solutions. Proposed Solutions Approval Voting Range Voting Instant Runoff Voting Borda Count Modifications –Borda Preferendum –Quota.
Chapter 10: The Manipulability of Voting Systems Lesson Plan
Voting and social choice
CPS 173 Voting and social choice
Approximability of Manipulating Elections
CPS Voting and social choice
Presentation transcript:

Junta Distributions and the Average-Case Complexity of Manipulating Elections A presentation by Jeremy Clark Ariel D. Procaccia Jeffrey S. Rosenschein

Outline Introduction Manipulability Design Goals Paper Theorems Preliminaries Junta Distribution Proof of Theorems Concluding Remarks Jeremy Clark2

Introduction This paper considers the computational complexity of manipulating an election outcome A manipulatable election is one where the addition of a set number of votes will change the election outcome to a preferred outcome Jeremy Clark3

Manipulability The ability to manipulate an election depends on the current results (whether exactly known or not) and the weight of the votes at the manipulator’s disposal Given these, we can form a decisional problem Jeremy Clark4

5 Manipulation can be constructive or destructive Constructive: make a candidate win Destructive: make a candidate lose Constructive is equivalent to multiple destructive manipulations: one for each candidate ahead of your preferred candidate

In real elections Strategic voting (destructive) You are a Liberal and a federalist in a Quebec riding. Current polls have the Bloc in first, Conservatives in second, and the Liberals trailing far behind. A manipulative vote: vote Conservative to prevent the Bloc from winning Jeremy Clark6

In real (US) elections Gerrymandering (Constructive) You are a Democrat in charge of election zoning. The Republicans beat you marginally in two neighbouring districts. You restructure the districts by packing Democratic voters in one of the regions. Jeremy Clark7

8

Goal Design a voting system such that manipulability is impossible Jeremy Clark9

Goal Design a voting system such that manipulability is impossible Gibbard-Satterthwaite Theorem: Any deterministic, non-dictatorial voting system contain manipulatable instances Jeremy Clark10

Goal Design a voting system such that manipulability is intractable Jeremy Clark11

Goal Design a voting system such that manipulability is intractable Lots of interesting systems where manipulability is NP-Hard However is worst-time complexity the right metric? Jeremy Clark12

Goal Design a voting system such that manipulability is average-case intractable Jeremy Clark13

Goal Design a voting system such that manipulability is average-case intractable This paper examines average-case complexity on manipulation problems It proves that general classes of NP-hard manipulation problems are polynomial in the average-case Jeremy Clark14

Outline Introduction Manipulability Design Goals Paper Theorems Preliminaries Junta Distribution Proof of Theorems Concluding Remarks Jeremy Clark15

Preliminaries Election has m candidates Election has n+N voters: n manipulatable voters and N non-manipulatable voters Voters can have different weights (reduces to a voter having multiple votes) Jeremy Clark16

Preliminaries A vote is an ordered list of candidates that gives  i points to the i th candidate. A scoring protocol,  =, is a vector of scores for each position where  i ≥  i+1. 1.Plurality: 2.Veto: 3.Borda: Jeremy Clark17

Preliminaries A voting protocol uses multiple contests, each decided with a scoring protocol For example, Exhaustive Ballot is an iterated plurality protocol where a candidate with over 50% of the vote wins. If no candidate wins, then the last place candidate is eliminated and the election is rerun. Others include Copeland, Maximin, and STV Jeremy Clark18

Sensitive Scoring Protocol In sensitive scoring protocols,  m =0 and  m-1 >  m → Jeremy Clark19

Manipulation Problems Individual Manipulation (IM): Given knowledge of all other votes, can I cast my vote for my preferred candidate such that she wins? Note: ties are considered losses P-Time in most scoring protocols (can be hard in voting protocols with unbounded candidates) Jeremy Clark20

Manipulation Problems Coalitional-Weighted-Manipulations (CWM): Given knowledge of all other votes, can I cast a set of votes for my preferred candidate such that she wins? NP-Hard in sensitive scoring protocols with just 3 candidates. Why? You are increasing the score of more than one candidate. Jeremy Clark21

Manipulation Problems Score-CWM (SCWM): Given the tally of all other candidates, can I cast a set of votes for my preferred candidate such that she wins? Assumptions: Weights are linear in precision Output is a linear (decisional) Score determination is linear/P-time Jeremy Clark22

Junta Distribution Hardness: instances are full-sized and hard Balance: both yes and no instances exist Dichotomy: instances can be impossible or have non-negligible probability. Ignore negligible cases Jeremy Clark23

Junta Distribution Symmetry: instance is unbiased toward any candidate Refinement: Manipulation fails if all manipulative votes are identical Jeremy Clark24

Theorem Let P be a sensitive scoring protocol. If m=O(1) then P, with candidates C={p,c 1,c 2,…,c m-1 }, is susceptible to SCWM. Jeremy Clark25

Theorem Let P be a sensitive scoring protocol. If m=O(1) then P, with candidates C={p,c 1,c 2,…,c m-1 }, is susceptible to SCWM.  m-1 >  m =0 such as Borda but not Plurality Jeremy Clark26

Theorem Let P be a sensitive scoring protocol. If m=O(1) then P, with candidates C={p,c 1,c 2,…,c m-1 }, is susceptible to SCWM. Fixed number of candidates Jeremy Clark27

Theorem Let P be a sensitive scoring protocol. If m=O(1) then P, with candidates C={p,c 1,c 2,…,c m-1 }, is susceptible to SCWM. p is candidate to manipulate, c i are others Jeremy Clark28

Theorem Let P be a sensitive scoring protocol. If m=O(1) then P, with candidates C={p,c 1,c 2,…,c m-1 }, is susceptible to SCWM. There exists a heuristic polynomial time algorithm A to solve decisional problem M with a junta distribution  over set of inputs to M Jeremy Clark29

Proposition 1 Let P be a sensitive scoring protocol. Then CWM in P is NP-Hard (with m  3) Sketch of proof: CWM  P Partition Jeremy Clark30

Proposition 1 Partition: given a set of integers that sum to 2K, does there exist a subset that sums to K? Let m=3. Set n~2K. Structure N such that CWM is true iff exactly K vote p>a>b and K vote p>b>a. If, say, K+1 vote p>a>b and K-1 vote p>b>a, then CWM is false. Jeremy Clark31

Corollary Let P be a sensitive scoring protocol. Then SCWM in P is NP-Hard (with m  3) Sketch: If CWM is NP-Hard, then SCWM is as well as partitioning does not depend on generating tally from votes Jeremy Clark32

Proposition 2 Let P be a sensitive scoring protocol. Then  * is a junta distribution for SCWM in P with C={p,c 1,c 2,…,c m-1 } and m=O(1). Where  * is the following distribution: 1.Independently randomly choose w(v) from [0,1] (with discrete precision). 2.Independently randomly choose S[c i ] from [W,(m-1)W]. Jeremy Clark33

Is this Junta? Hard? Yes Balance? Authors calculate bounds using Chernoff’s bounds Dichotomy? First discrete step is non-negligible Symmetry? Invariant to candidates Refinement? 2nd ranked candidate will at least tie p Jeremy Clark34

Greedy Algorithm 1.Sort candidates from lowest score to highest 2.Choose p as first choice, and rest in sorted order 3.Recalculate scores and repeat for each vote 4.When finished, return true iff p has highest score Jeremy Clark35

Example Borda:, n=5 S[Con]= 20 S[Lib]= 19 S[NDP]= 17 S[Gre]= 10  p Jeremy Clark36

Example S[Con]= 20 S[Lib]= 19 S[NDP]= 17 S[Gre]= 10 t 1 : Gre<NDP<Lib<Con Jeremy Clark37

Example S[Con]= = 20 S[Lib]= = 20 S[NDP]= = 18 S[Gre]= = 13 t 1 : Gre<NDP<Lib<Con Jeremy Clark38

Example S[Con]= 20 S[Lib]= 20 S[NDP]= 18 S[Gre]= 13 Jeremy Clark39

Example S[Con]= 20, 20, 20, 21, 23, 23 S[Lib]= 19, 20, 21, 21, 22, 24 S[NDP]= 17, 18, 20, 22, 22, 23 S[Gre]= 10, 13, 16, 19, 22, 25 t 1 : Gre<NDP<Lib<Con t 2 : Gre<NDP<Lib<Con t 3 : Gre<NDP<Con<Lib t 4 : Gre<Con<Lib<NDP t 5 : Gre<Lib<NDP<Con Jeremy Clark40

Greedy Properties Greedy is P-time Greedy never issues false positives Greedy does issue false negatives, however these are bounded to Pr[err]  1/p(n) Therefore Greedy is deterministic heuristic polynomial time Jeremy Clark41

Theorem Let P be a sensitive scoring protocol. If m=O(1) then P, with candidates C={p,c 1,c 2,…,c m-1 }, is susceptible to SCWM. There exists a heuristic polynomial time algorithm A to solve decisional problem M with a junta distribution  over set of inputs to M  Jeremy Clark42

Theorem 2 The paper contains a second theorem, related to the first, regarding uncertainty about the other votes We are allowed to sample the distribution of the other votes Essentially, we try every (m+1)! orders of candidates and sample the distribution Jeremy Clark43

Outline Introduction Manipulability Design Goals Paper Theorems Preliminaries Junta Distribution Proof of Theorems Concluding Remarks Jeremy Clark44

Conclusions Complexity is best considered in the average-case, not worst-case Manipulation problems have been demonstrated to be worst-case intractable and average-case tractable This is bad news if it generalizes to any NP-Hard manipulation problem Jeremy Clark45

There is still hope These results are for scoring protocols. Voting protocols may offer intractable manipulation. Large number of candidates may increase average case complexity (intuitively seems the case with Theorem 2: (m+1)! grows very fast) Junta distributions may be too permissible to easy instances Jeremy Clark46

Questions? Jeremy Clark47

Discussion What if we make manipulability as easy as possible and let voters adapt to voting strategically? What happens with (non-sensitive) cardinal voting schemes instead of ordinal ones, such as range voting? Jeremy Clark48