Abstract
We study the parameterized complexity of voter control problems in κ-peaked elections, where κ is a positive integer. In particular, we focus on the constructive/destructive control by adding/deleting votes for Condorcet, Maximin and Copelandα. It is known that in general elections all these problems are NP-hard, except for the destructive control by adding/deleting votes for Condorcet which is polynomial-time solvable. We strengthen these results by showing that, when restricted to κ-peaked elections where κ = 3,4, the above NP-hard problems not only remain NP-hard but also are W[1]-hard with respect to the number of added/deleted votes.
Similar content being viewed by others
Notes
A voting correspondence is weakCondorcet consistent if whenever weak Condorcet winners exist the correspondence selects exactly all weak Condorcet winners as winners. There are several variants of weakCondorcet consistent (see, e.g., [27]). The one we mentioned here is the notion used by Brandt et al. [7] to establish their polynomial-time solvability results.
The reduction is still correct without the candidate y (i.e., simply removing y from \(\mathcal {C}\) and all constructed votes does not affect the correctness). However, the subsequent reduction for DCAV-Copeland0-UNI needs the candidate y and is obtained from the reduction for DCAV-Copeland0-NON by creating polynomially many dummy candidates. Hence, for ease of exposition of the reduction for DCAV-Copeland0-UNI, we keep the candidate y in the reduction.
References
Arrow, K.J.: A difficulty in the concept of social welfare. J. Polit. Econ. 58 (4), 328–346 (1950)
Ballester, M.A., Haeringer, G.: A characterization of the single-peaked domain. Soc. Choice Welf. 36(2), 305–322 (2011)
Bartholdi, J. J., III, Tovey, C.A., Trick, M.A.: How hard is it to control an election? Math. Comput. Model. 16(8-9), 27–40 (1992)
Betzler, N., Slinko, A., Uhlmann, J.: On the computation of fully propotional representation. J. Artif. Intell. Res. 47, 475–519 (2013)
Betzler, N., Uhlmann, J.: Parameterized complexity of candidate control in elections and related digraph problems. Theor. Comput. Sci. 410(52), 5425–5442 (2009)
Black, D.: On the rationale of group decision-making. J. Polit. Econ. 56(1), 23–34 (1948)
Brandt, F., Brill, M., Hemaspaandra, E., Hemaspaandra, L.A.: Bypassing combinatorial protections: Polynomial-time algorithms for single-peaked electorates. J. Artif. Intell. Res. 53, 439–496 (2015)
Bredereck, R., Chen, J., Woeginger, G.J.: Are there any nicely structured preference profiles nearby. Math. Soc. Sci. 79, 61–73 (2016)
Bulteau, L., Chen, J., Faliszewski, P., Niedermeier, R., Talmon, N.: Combinatorial voter control in elections. Theor. Comput. Sci. 589, 99–120 (2015)
Conitzer, V.: Making decisions based on the preferences of multiple agents. Commun. ACM 53(3), 84–94 (2010)
Cornaz, D., Galand, L., Spanjaard, O.: Kemeny elections with bounded single-peaked or single-crossing width. In: IJCAI, pp. 76–82 (2013)
Demange, G.: Single-peaked orders on a tree. Math. Soc. Sci. 3(3), 389–396 (1983)
Doignon, J.P., Falmagne, J.C.: A polynomial time algorithm for unidimensional unfolding representations. J. Algorithm. 16(2), 218–233 (1994)
Downey, R.G., Fellows, M.R.: Fundamentals of parameterized complexity texts in computer science. Springer, Berlin (2013)
Egan, P.J.: Do something politics and double-peaked policy preferences. J. Polit. 76(2), 333–349 (2014)
Erdėlyi, G., Hemaspaandra, E., Hemaspaandra, L.A.: More natural models of electoral control by partition. In: ADT, pp. 396–413 (2015)
Erdélyi, G., Lackner, M., Pfandler, A.: Computational aspects of nearly single-peaked electorates. J. Artif. Intell. Res. 58, 297–337 (2017)
Erdélyi, G., Nowak, M., Rothe, J.: Sincere-strategy preference-based approval voting fully resists constructive control and broadly resists destructive control. Math. Log. Q. 55(4), 425–443 (2009)
Erdélyi, G., Reger, C., Yang, Y.: The complexity of bribery and control in group identification. In: AAMAS, pp. 1142–1150 (2017)
Escoffier, B., Lang, J., Öztürk, M.: Single-peaked consistency and its complexity. In: ECAI, pp. 366–370 (2008)
Faliszewski, P., Hemaspaandra, E., Hemaspaandra, L.A.: Multimode control attacks on elections. J. Artif. Intell. Res. 40, 305–351 (2011)
Faliszewski, P., Hemaspaandra, E., Hemaspaandra, L.A.: The complexity of manipulative attacks in nearly single-peaked electorates. Artif. Intell. 207, 69–99 (2014)
Faliszewski, P., Hemaspaandra, E., Hemaspaandra, L.A., Rothe, J.: Llull and Copeland voting computationally resist bribery and constructive control. J. Artif. Intell. Res. 35, 275–341 (2009)
Faliszewski, P., Hemaspaandra, E., Hemaspaandra, L.A., Rothe, J.: The shield that never was: Societies with single-peaked preferences are more open to manipulation and control. Inf. Comput. 209(2), 89–107 (2011)
Faliszewski, P., Rothe, J.: Control and bribery in voting. In: Brandt, F., Conitzer, V., Endriss, U., Lang, J., Procaccia, A. (eds.) Handbook of Computational Social Choice, chapter 7, pp 146–168. Cambridge University Press (2016)
Fellows, M.R., Hermelin, D., Rosamond, F.A., Vialette, S.: On the parameterized complexity of multiple-interval graph problems. Theor. Comput. Sci. 410(1), 53–61 (2009)
Felsenthal, D.S., Tideman, N.: Weak Condorcet winner(s) revisited. Public Choice 160(3), 313–326 (2014)
Gupta, U.I., Lee, D.T., Leung, J. Y. -T.: Efficient algorithms for interval graphs and circular-arc graphs. Networks 12(4), 459–467 (1982)
Hemaspaandra, E., Hemaspaandra, L.A., Rothe, J.: Anyone but him: The complexity of precluding an alternative. Artif. Intell. 171(5-6), 255–285 (2007)
Liu, H., Feng, H., Zhu, D., Luan, J.: Parameterized computational complexity of control problems in voting systems. Theor. Comput. Sci. 410(27-29), 2746–2753 (2009)
Liu, H., Zhu, D.: Parameterized complexity of control problems in Maximin election. Inf. Process. Lett. 110(10), 383–388 (2010)
Liu, H., Zhu, D.: Parameterized complexity of control by voter selection in Maximin, Copeland, Borda, Bucklin, and Approval election systems. Theor. Comput. Sci. 498, 115–123 (2013)
Russell, N.F.: Complexity of control of Borda count elections. Master’s thesis, Rochester Institute of Technology (2007)
Stiglitz, J.E.: The demand for education in public and private school systems. J. Pubilc Econ. 3, 349–385 (1974)
Walsh, T.: Uncertainty in preference elicitation and aggregation. In: AAAI, pp. 3–8 (2007)
Yang, Y.: Election attacks with few candidates. In: ECAI, pp. 1131–1132 (2014)
Yang, Y.: Manipulation with bounded single-peaked width: A parameterized study. In: AAMAS, pp. 77–85 (2015)
Yang, Y.: The complexity of control and bribery in majority judgement. In AAMAS, pp. 1169–1177 (2017)
Yang, Y.: On the complexity of Borda control in single-peaked elections. In: AAMAS, pp. 1178–1186 (2017)
Yang, Y., Guo, J.: Controlling elections with bounded single-peaked width. In: AAMAS, pp. 629–636 (2014)
Yang, Y., Guo, J.: How hard is control in multi-peaked elections: A parameterized study. In: AAMAS, pp. 1729–1730 (2015)
Yang, Y., Guo, J.: The control complexity of r-approval: From the single-peaked case to the general case. J. Comput. Syst. Sci. 89, 432–449 (2017)
Yang, Y., Wang, J.: Anyone but them: The complexity challenge for a resolute election controller. In: AAMAS, pp. 1133–1141 (2017)
Acknowledgments
The authors would like to thank the anonymous reviewer of Theory of Computing Systems for the constructive comments.
Author information
Authors and Affiliations
Corresponding author
Additional information
A preliminary version of this paper was presented at the international conference AAMAS 2015 [41] and the workshop EXPLORE 2015. This paper was supported by the National Natural Science Foundation of China (Grants No. 61702557, 6177050581), the China Postdoctoral Science Foundation (Grant No. 2017M612584), and the Postdoctoral Science Foundation of Central South University.
Appendices
Appendix: Missing Proof in Theorem 2
In the appendix, we prove the W[1]-hardness of constructive/destructive control by adding votes for Copelandα where 0 < α ≤ 1 in 3-peaked elections. Consider first the case where 0 < α < 1. Let α be a fixed rational number with 0 < α < 1. We first consider DCAV-Copelandα-UNI. The W[1]-hardness reduction is adapted from that for DCAV-Copeland0-UNI by creating polynomially many dummy candidates. The role of these dummy candidates is to enlarge the score gap between p and q to a certain extent, when two unregistered votes corresponding to two intersected 2-intervals are added to the registered votes; hence guarantees that q would still be the unique winner when a multiset of at most k unregistered votes corresponding to a non-independent set are added. To this end, we also adopt the same restriction on 2-intervals here as we did for DCAV-Copeland0-UNI: every two 2-intervals either do not intersect or they intersect in a non-trivial interval. We create these dummy candidates in a way so that any nonempty intersection of two 2-intervals corresponds to at least \(\lceil \frac {1}{1-\alpha }\rceil + 2\) candidates. To this end, we do the following. We call an intersection [x1, x2] with x1 < x2 of two 2-intervals a minimal intersection if there is no other 2-interval which has at least one of its endpoints in [x1, x2]. Clearly, given a 2-interval representation of a 2-interval graph, all minimal intersections can be found in polynomial time. Apart from creating all the candidates as in the reduction for DCAV-Copeland0-UNI, we create for each minimal intersection [x1, x2] a set of \(\lceil \frac {1}{1-\alpha }\rceil \) dummy candidates which lie in distinguished places between x1 and x2. See Fig. 10 for an illustration. This construction ensures that p can prevent q from being the unique winner only if p beats every other candidate in the final election. The observation is that once p ties or is beaten by some candidate x ∈Γ, then p actually ties or is beaten by at least \(\lceil \frac {1}{1-\alpha }\rceil + 2\) candidates. The amount \(\lceil \frac {1}{1-\alpha }\rceil + 2\) is large enough to make p have a strictly less score than that of q, and hence cannot prevent q from being the unique winner. However, p beats every other candidate if and only if there is an independent set of size k for \(\mathcal {F}\), implying the correctness of the reduction. The proofs for other three problems DCAV-Copelandα-NON, CCAV-Copelandα-UNI and CCAV-Copelandα-NON are adapted from DCAV-Copeland0-NON, CCAV-Copeland0-UNI and CCAV-Copeland0-NON, respectively. The constructions are analogous to the above reduction.
Finally we consider Copeland1. The reductions for the four problems DCAV-Copeland1-UNI, DCAV-Copeland1-NON, CCAV-Copeland1-UNI, CCAV-Copeland1-NON are adapted from DCAV-Copeland0-UNI, DCAV-Copeland0-NON, CCAV-Copeland0-UNI, CCAV-Copeland0-NON, respectively. Precisely, each reduction is different from the corresponding one in the way that we set R = k − 1. Moreover, instead of searching for an independent set of size k, we search for an independent set of size k − 1. \(\square \)
Missing Proof in Theorem 5
We consider the missing proof for DCDV-Copelandα-UNI in Theorem 5. The reduction is similar to the one for CCDV-Copelandα-UNI with the difference that we create one more dummy candidate q′ which lies immediately on the right side of q in \(\mathcal {L}\). That is, the candidate set is Γ ∪{p,q,q′} with q being the distinguished candidate, and we define \(\mathcal {L}=(q,q^{\prime },\vec {\Gamma },p)\). The role of the dummy candidate q′ is to guarantee that, in the final election, every candidate in Γ is beaten by both q and q′. This excludes the possibility that some xi would have a higher score than that of q in the final election. To achieve this goal, we rank q′ immediately after q in every vote and remains the order of other candidates unchanged. Precisely, we create n − 1 votes defined as \((\mathcal {L}[x_{1},p],q,q^{\prime })\), and n − k + 2 votes defined as \((p,\mathcal {L}[q, x_{|{\Gamma }|}])\). Besides, for every 2-interval \(I_{i}=\{{I_{i}^{1}}=[x_{\alpha }, x_{\beta }], {I_{i}^{2}}=[x_{\gamma },x_{\delta }]\}\) with xβ < xγ, we create two votes as follows.
The comparisons are shown in Table 7.
Using the same argument for CCDV-Copelandα-UNI, we can conclude that if there is an independent set of size k, the candidate p can prevent q from being the unique winner by deleting k votes. For the other direction, observe first that no candidate xi ∈Γ has a chance to have a higher score than that of q since every xi is beaten by both q and q′ in the final election. Clearly, q′ also has no chance to prevent q from being the unique winner since every vote ranks q above q′. Therefore, the only candidate which can prevent q from being the unique winner is p and, moreover, this happens only if p beats every candidate in Γ. The remaining argument is the same as for CCDV-Copelandα-UNI.
Rights and permissions
About this article
Cite this article
Yang, Y., Guo, J. Parameterized Complexity of Voter Control in Multi-Peaked Elections. Theory Comput Syst 62, 1798–1825 (2018). https://doi.org/10.1007/s00224-018-9843-8
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00224-018-9843-8