Skip to main content

Manipulation of k-Approval in Nearly Single-Peaked Electorates

  • Conference paper
  • First Online:
Book cover Algorithmic Decision Theory (ADT 2015)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 9346))

Included in the following conference series:

Abstract

For agents it can be advantageous to vote insincerely in order to change the outcome of an election. This behavior is called manipulation. The Gibbard-Satterthwaite theorem states that in principle every non-trivial voting rule with at least three candidates is susceptible to manipulation. Since the seminal paper by Bartholdi, Tovey, and Trick in 1989, (coalitional) manipulation has been shown \(\mathrm{NP}\)-hard for many voting rules. However, under single-peaked preferences – one of the most influential domain restrictions – the complexity of manipulation often drops from \(\mathrm{NP}\)-hard to \(\mathrm{P}\).

In this paper, we investigate the complexity of manipulation for the k-approval and veto families of voting rules in nearly single-peaked elections, exploring the limits where the manipulation problem turns from \(\mathrm{P}\) to \(\mathrm{NP}\)-hard. Compared to the classical notion of single-peakedness, notions of nearly single-peakedness are more robust and thus more likely to appear in real-world data sets.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bartholdi, J., Tovey, C., Trick, M.: The computational difficulty of manipulating an election. Soc. Choice Welfare 6(3), 227–241 (1989)

    Article  MathSciNet  Google Scholar 

  2. Black, D.: On the rationale of group decision making. J. Polit. Econ. 56(1), 23–34 (1948)

    Article  Google Scholar 

  3. Brandt, F., Brill, M., Hemaspaandra, E., Hemaspaandra, L.A.: Bypassing combinatorial protections: polynomial-time algorithms for single-peaked electorates. In: Proceedings of the 24th AAAI Conference on Artificial Intelligence (AAAI 2010), pp. 715–722. AAAI Press (2010)

    Google Scholar 

  4. Bredereck, R., Chen, J., Woeginger, G.J.: Are there any nicely structured preference profiles nearby? In: Proceedings of the 23rd International Joint Conference on Artificial Intelligence (IJCAI 2013), pp. 62–68. AAAI Press (2013)

    Google Scholar 

  5. Conitzer, V., Sandholm, T., Lang, J.: When are elections with few candidates hard to manipulate? J. ACM vol. 54(3), Article 14 (2007)

    Google Scholar 

  6. Cornaz, D., Galand, L., Spanjaard, O.: Bounded single-peaked width and proportional representation. In: Proceedings of the 20th European Conference on Artificial Intelligence (ECAI 2012). Frontiers in Artificial Intelligence and Applications, vol. 242, pp. 270–275. IOS Press (2012)

    Google Scholar 

  7. Cornaz, D., Galand, L., Spanjaard, O.: Kemeny elections with bounded single-peaked or single-crossing width. In: Proceedings of the 23rd International Joint Conference on Artificial Intelligence (IJCAI 2013). pp. 76–82. AAAI Press (2013)

    Google Scholar 

  8. Elkind, E., Lackner, M.: On detecting nearly structured preference profiles. In: Proceedings of the 28th AAAI Conference on Artificial Intelligence (AAAI 2014). pp. 661–667. AAAI Press (2014)

    Google Scholar 

  9. Elkind, E., Lackner, M.: Structure in dichotomous preferences. In: Proceedings of the 24th International Joint Conference on Artificial Intelligence (IJCAI 2015). AAAI Press (to appear 2015)

    Google Scholar 

  10. Ephrati, E., Rosenschein, J.: A heuristic technique for multi-agent planning. Ann. Math. Artif. Intell. 20(1–4), 13–67 (1997)

    Article  MathSciNet  Google Scholar 

  11. Erdélyi, G., Lackner, M., Pfandler, A.: Computational aspects of nearly single-peaked electorates. In: Proceedings of the 27th AAAI Conference on Artificial Intelligence (AAAI 2013), pp. 283–289. AAAI Press (July 2013)

    Google Scholar 

  12. Escoffier, B., Lang, J., Öztürk, M.: Single-peaked consistency and its complexity. In: Proceedings of the 18th European Conference on Artificial Intelligence (ECAI 2008). Frontiers in Artificial Intelligence and Applications, vol. 178, pp. 366–370. IOS Press (2008)

    Google Scholar 

  13. Faliszewski, P., Hemaspaandra, E., Hemaspaandra, L.A., Rothe, J.: The shield that never was: societies with single-peaked preferences are more open to manipulation and control. Inf. Comput. 209(2), 89–107 (2011)

    Article  MathSciNet  Google Scholar 

  14. Faliszewski, P., Hemaspaandra, E., Hemaspaandra, L.A.: The complexity of manipulative attacks in nearly single-peaked electorates. Artif. Intell. 207, 69–99 (2014)

    Article  MathSciNet  Google Scholar 

  15. Garey, M., Johnson, D.: Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman and Company, New York (1979)

    MATH  Google Scholar 

  16. Ghosh, S., Mundhe, M., Hernandez, K., Sen, S.: Voting for movies: The anatomy of recommender systems. In: Proceedings of the 3rd Annual Conference on Autonomous Agents (AGENTS 1999), pp. 434–435. ACM Press (1999)

    Google Scholar 

  17. Gibbard, A.: Manipulation of voting schemes. Econometrica 41(4), 587–601 (1973)

    Article  MathSciNet  Google Scholar 

  18. Hemaspaandra, E., Hemaspaandra, L.: Dichotomy for voting systems. J. Comput. Syst. Sci. 73(1), 73–83 (2007)

    Article  MathSciNet  Google Scholar 

  19. Procaccia, A.D., Rosenschein, J.S.: Junta distributions and the average-case complexity of manipulating elections. J. Artif. Intell. Res. (JAIR) 28, 157–181 (2007)

    Article  MathSciNet  Google Scholar 

  20. Satterthwaite, M.: Strategy-proofness and Arrow’s conditions: existence and correspondence theorems for voting procedures and social welfare functions. J. Econ. Theor. 10(2), 187–217 (1975)

    Article  MathSciNet  Google Scholar 

  21. Walsh, T.: Uncertainty in preference elicitation and aggregation. In: Proceedings of the 22nd AAAI Conference on Artificial Intelligence (AAAI 2007). pp. 3–8. AAAI Press (2007)

    Google Scholar 

  22. Xia, L.: Designing social choice mechanisms using machine learning. In: Proceedings of the 12th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2013), pp. 471–474. International Foundation for Autonomous Agents and Multiagent Systems (2013)

    Google Scholar 

Download references

Acknowledgments

We thank the anonymous ADT-2015 referees for their very helpful comments and suggestions. This work was supported by the Austrian Science Fund (FWF): P25518, Y698, and the German Research Foundation (DFG): ER 738/2-1.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Gábor Erdélyi , Martin Lackner or Andreas Pfandler .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Erdélyi, G., Lackner, M., Pfandler, A. (2015). Manipulation of k-Approval in Nearly Single-Peaked Electorates. In: Walsh, T. (eds) Algorithmic Decision Theory. ADT 2015. Lecture Notes in Computer Science(), vol 9346. Springer, Cham. https://doi.org/10.1007/978-3-319-23114-3_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-23114-3_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-23113-6

  • Online ISBN: 978-3-319-23114-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics