Skip to main content
Log in

Parameterized Complexity of Voter Control in Multi-Peaked Elections

  • Published:
Theory of Computing Systems Aims and scope Submit manuscript

Abstract

We study the parameterized complexity of voter control problems in κ-peaked elections, where κ is a positive integer. In particular, we focus on the constructive/destructive control by adding/deleting votes for Condorcet, Maximin and Copelandα. It is known that in general elections all these problems are NP-hard, except for the destructive control by adding/deleting votes for Condorcet which is polynomial-time solvable. We strengthen these results by showing that, when restricted to κ-peaked elections where κ = 3,4, the above NP-hard problems not only remain NP-hard but also are W[1]-hard with respect to the number of added/deleted votes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Notes

  1. A voting correspondence is weakCondorcet consistent if whenever weak Condorcet winners exist the correspondence selects exactly all weak Condorcet winners as winners. There are several variants of weakCondorcet consistent (see, e.g., [27]). The one we mentioned here is the notion used by Brandt et al. [7] to establish their polynomial-time solvability results.

  2. The reduction is still correct without the candidate y (i.e., simply removing y from \(\mathcal {C}\) and all constructed votes does not affect the correctness). However, the subsequent reduction for DCAV-Copeland0-UNI needs the candidate y and is obtained from the reduction for DCAV-Copeland0-NON by creating polynomially many dummy candidates. Hence, for ease of exposition of the reduction for DCAV-Copeland0-UNI, we keep the candidate y in the reduction.

References

  1. Arrow, K.J.: A difficulty in the concept of social welfare. J. Polit. Econ. 58 (4), 328–346 (1950)

    Article  Google Scholar 

  2. Ballester, M.A., Haeringer, G.: A characterization of the single-peaked domain. Soc. Choice Welf. 36(2), 305–322 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  3. Bartholdi, J. J., III, Tovey, C.A., Trick, M.A.: How hard is it to control an election? Math. Comput. Model. 16(8-9), 27–40 (1992)

    Article  MathSciNet  MATH  Google Scholar 

  4. Betzler, N., Slinko, A., Uhlmann, J.: On the computation of fully propotional representation. J. Artif. Intell. Res. 47, 475–519 (2013)

    Article  MATH  Google Scholar 

  5. Betzler, N., Uhlmann, J.: Parameterized complexity of candidate control in elections and related digraph problems. Theor. Comput. Sci. 410(52), 5425–5442 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  6. Black, D.: On the rationale of group decision-making. J. Polit. Econ. 56(1), 23–34 (1948)

    Article  Google Scholar 

  7. Brandt, F., Brill, M., Hemaspaandra, E., Hemaspaandra, L.A.: Bypassing combinatorial protections: Polynomial-time algorithms for single-peaked electorates. J. Artif. Intell. Res. 53, 439–496 (2015)

    Article  MathSciNet  MATH  Google Scholar 

  8. Bredereck, R., Chen, J., Woeginger, G.J.: Are there any nicely structured preference profiles nearby. Math. Soc. Sci. 79, 61–73 (2016)

    Article  MathSciNet  MATH  Google Scholar 

  9. Bulteau, L., Chen, J., Faliszewski, P., Niedermeier, R., Talmon, N.: Combinatorial voter control in elections. Theor. Comput. Sci. 589, 99–120 (2015)

    Article  MathSciNet  MATH  Google Scholar 

  10. Conitzer, V.: Making decisions based on the preferences of multiple agents. Commun. ACM 53(3), 84–94 (2010)

    Article  MathSciNet  Google Scholar 

  11. Cornaz, D., Galand, L., Spanjaard, O.: Kemeny elections with bounded single-peaked or single-crossing width. In: IJCAI, pp. 76–82 (2013)

  12. Demange, G.: Single-peaked orders on a tree. Math. Soc. Sci. 3(3), 389–396 (1983)

    MathSciNet  MATH  Google Scholar 

  13. Doignon, J.P., Falmagne, J.C.: A polynomial time algorithm for unidimensional unfolding representations. J. Algorithm. 16(2), 218–233 (1994)

    Article  MathSciNet  MATH  Google Scholar 

  14. Downey, R.G., Fellows, M.R.: Fundamentals of parameterized complexity texts in computer science. Springer, Berlin (2013)

  15. Egan, P.J.: Do something politics and double-peaked policy preferences. J. Polit. 76(2), 333–349 (2014)

    Article  Google Scholar 

  16. Erdėlyi, G., Hemaspaandra, E., Hemaspaandra, L.A.: More natural models of electoral control by partition. In: ADT, pp. 396–413 (2015)

  17. Erdélyi, G., Lackner, M., Pfandler, A.: Computational aspects of nearly single-peaked electorates. J. Artif. Intell. Res. 58, 297–337 (2017)

    Article  MathSciNet  MATH  Google Scholar 

  18. Erdélyi, G., Nowak, M., Rothe, J.: Sincere-strategy preference-based approval voting fully resists constructive control and broadly resists destructive control. Math. Log. Q. 55(4), 425–443 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  19. Erdélyi, G., Reger, C., Yang, Y.: The complexity of bribery and control in group identification. In: AAMAS, pp. 1142–1150 (2017)

  20. Escoffier, B., Lang, J., Öztürk, M.: Single-peaked consistency and its complexity. In: ECAI, pp. 366–370 (2008)

  21. Faliszewski, P., Hemaspaandra, E., Hemaspaandra, L.A.: Multimode control attacks on elections. J. Artif. Intell. Res. 40, 305–351 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  22. Faliszewski, P., Hemaspaandra, E., Hemaspaandra, L.A.: The complexity of manipulative attacks in nearly single-peaked electorates. Artif. Intell. 207, 69–99 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  23. Faliszewski, P., Hemaspaandra, E., Hemaspaandra, L.A., Rothe, J.: Llull and Copeland voting computationally resist bribery and constructive control. J. Artif. Intell. Res. 35, 275–341 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  24. Faliszewski, P., Hemaspaandra, E., Hemaspaandra, L.A., Rothe, J.: The shield that never was: Societies with single-peaked preferences are more open to manipulation and control. Inf. Comput. 209(2), 89–107 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  25. Faliszewski, P., Rothe, J.: Control and bribery in voting. In: Brandt, F., Conitzer, V., Endriss, U., Lang, J., Procaccia, A. (eds.) Handbook of Computational Social Choice, chapter 7, pp 146–168. Cambridge University Press (2016)

  26. Fellows, M.R., Hermelin, D., Rosamond, F.A., Vialette, S.: On the parameterized complexity of multiple-interval graph problems. Theor. Comput. Sci. 410(1), 53–61 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  27. Felsenthal, D.S., Tideman, N.: Weak Condorcet winner(s) revisited. Public Choice 160(3), 313–326 (2014)

    Article  Google Scholar 

  28. Gupta, U.I., Lee, D.T., Leung, J. Y. -T.: Efficient algorithms for interval graphs and circular-arc graphs. Networks 12(4), 459–467 (1982)

    Article  MathSciNet  MATH  Google Scholar 

  29. Hemaspaandra, E., Hemaspaandra, L.A., Rothe, J.: Anyone but him: The complexity of precluding an alternative. Artif. Intell. 171(5-6), 255–285 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  30. Liu, H., Feng, H., Zhu, D., Luan, J.: Parameterized computational complexity of control problems in voting systems. Theor. Comput. Sci. 410(27-29), 2746–2753 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  31. Liu, H., Zhu, D.: Parameterized complexity of control problems in Maximin election. Inf. Process. Lett. 110(10), 383–388 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  32. Liu, H., Zhu, D.: Parameterized complexity of control by voter selection in Maximin, Copeland, Borda, Bucklin, and Approval election systems. Theor. Comput. Sci. 498, 115–123 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  33. Russell, N.F.: Complexity of control of Borda count elections. Master’s thesis, Rochester Institute of Technology (2007)

  34. Stiglitz, J.E.: The demand for education in public and private school systems. J. Pubilc Econ. 3, 349–385 (1974)

    Article  Google Scholar 

  35. Walsh, T.: Uncertainty in preference elicitation and aggregation. In: AAAI, pp. 3–8 (2007)

  36. Yang, Y.: Election attacks with few candidates. In: ECAI, pp. 1131–1132 (2014)

  37. Yang, Y.: Manipulation with bounded single-peaked width: A parameterized study. In: AAMAS, pp. 77–85 (2015)

  38. Yang, Y.: The complexity of control and bribery in majority judgement. In AAMAS, pp. 1169–1177 (2017)

  39. Yang, Y.: On the complexity of Borda control in single-peaked elections. In: AAMAS, pp. 1178–1186 (2017)

  40. Yang, Y., Guo, J.: Controlling elections with bounded single-peaked width. In: AAMAS, pp. 629–636 (2014)

  41. Yang, Y., Guo, J.: How hard is control in multi-peaked elections: A parameterized study. In: AAMAS, pp. 1729–1730 (2015)

  42. Yang, Y., Guo, J.: The control complexity of r-approval: From the single-peaked case to the general case. J. Comput. Syst. Sci. 89, 432–449 (2017)

    Article  MathSciNet  MATH  Google Scholar 

  43. Yang, Y., Wang, J.: Anyone but them: The complexity challenge for a resolute election controller. In: AAMAS, pp. 1133–1141 (2017)

Download references

Acknowledgments

The authors would like to thank the anonymous reviewer of Theory of Computing Systems for the constructive comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yongjie Yang.

Additional information

A preliminary version of this paper was presented at the international conference AAMAS 2015 [41] and the workshop EXPLORE 2015. This paper was supported by the National Natural Science Foundation of China (Grants No. 61702557, 6177050581), the China Postdoctoral Science Foundation (Grant No. 2017M612584), and the Postdoctoral Science Foundation of Central South University.

Appendices

Appendix: Missing Proof in Theorem 2

In the appendix, we prove the W[1]-hardness of constructive/destructive control by adding votes for Copelandα where 0 < α ≤ 1 in 3-peaked elections. Consider first the case where 0 < α < 1. Let α be a fixed rational number with 0 < α < 1. We first consider DCAV-Copelandα-UNI. The W[1]-hardness reduction is adapted from that for DCAV-Copeland0-UNI by creating polynomially many dummy candidates. The role of these dummy candidates is to enlarge the score gap between p and q to a certain extent, when two unregistered votes corresponding to two intersected 2-intervals are added to the registered votes; hence guarantees that q would still be the unique winner when a multiset of at most k unregistered votes corresponding to a non-independent set are added. To this end, we also adopt the same restriction on 2-intervals here as we did for DCAV-Copeland0-UNI: every two 2-intervals either do not intersect or they intersect in a non-trivial interval. We create these dummy candidates in a way so that any nonempty intersection of two 2-intervals corresponds to at least \(\lceil \frac {1}{1-\alpha }\rceil + 2\) candidates. To this end, we do the following. We call an intersection [x1, x2] with x1 < x2 of two 2-intervals a minimal intersection if there is no other 2-interval which has at least one of its endpoints in [x1, x2]. Clearly, given a 2-interval representation of a 2-interval graph, all minimal intersections can be found in polynomial time. Apart from creating all the candidates as in the reduction for DCAV-Copeland0-UNI, we create for each minimal intersection [x1, x2] a set of \(\lceil \frac {1}{1-\alpha }\rceil \) dummy candidates which lie in distinguished places between x1 and x2. See Fig. 10 for an illustration. This construction ensures that p can prevent q from being the unique winner only if p beats every other candidate in the final election. The observation is that once p ties or is beaten by some candidate x ∈Γ, then p actually ties or is beaten by at least \(\lceil \frac {1}{1-\alpha }\rceil + 2\) candidates. The amount \(\lceil \frac {1}{1-\alpha }\rceil + 2\) is large enough to make p have a strictly less score than that of q, and hence cannot prevent q from being the unique winner. However, p beats every other candidate if and only if there is an independent set of size k for \(\mathcal {F}\), implying the correctness of the reduction. The proofs for other three problems DCAV-Copelandα-NON, CCAV-Copelandα-UNI and CCAV-Copelandα-NON are adapted from DCAV-Copeland0-NON, CCAV-Copeland0-UNI and CCAV-Copeland0-NON, respectively. The constructions are analogous to the above reduction.

Fig. 10
figure 10

An illustration of the dummy candidates in the W[1]-hardness reduction for DCAV-Copelandα-UNI in Theorem 2. The figure on the left-hand side shows two 2-intervals (the black one above and the gray one below) which intersect in a non-trivial interval [x2, x3]. Moreover, there is no other 2-interval whose endpoint is in [x2, x3]. We create exactly \(\lceil \frac {1}{1-\alpha }\rceil \) dummy candidates between x2 and x3. The figure on the right-hand side shows four 2-intervals, with only one interval of each 2-intervals is shown. There are \(\lceil \frac {1}{1-\alpha }\rceil + 2\) candidates corresponding to the intersection (this is a minimal intersection since no other 2-interval has any of its endpoints in this intersection) of the second 2-interval and the fourth 2-interval, and \(\lceil \frac {1}{1-\alpha }\rceil + 2\) candidates corresponding to the intersection (a minimal intersection) of the first 2-interval and the third 2-interval

Finally we consider Copeland1. The reductions for the four problems DCAV-Copeland1-UNI, DCAV-Copeland1-NON, CCAV-Copeland1-UNI, CCAV-Copeland1-NON are adapted from DCAV-Copeland0-UNI, DCAV-Copeland0-NON, CCAV-Copeland0-UNI, CCAV-Copeland0-NON, respectively. Precisely, each reduction is different from the corresponding one in the way that we set R = k − 1. Moreover, instead of searching for an independent set of size k, we search for an independent set of size k − 1. \(\square \)

Missing Proof in Theorem 5

We consider the missing proof for DCDV-Copelandα-UNI in Theorem 5. The reduction is similar to the one for CCDV-Copelandα-UNI with the difference that we create one more dummy candidate q which lies immediately on the right side of q in \(\mathcal {L}\). That is, the candidate set is Γ ∪{p,q,q} with q being the distinguished candidate, and we define \(\mathcal {L}=(q,q^{\prime },\vec {\Gamma },p)\). The role of the dummy candidate q is to guarantee that, in the final election, every candidate in Γ is beaten by both q and q. This excludes the possibility that some xi would have a higher score than that of q in the final election. To achieve this goal, we rank q immediately after q in every vote and remains the order of other candidates unchanged. Precisely, we create n − 1 votes defined as \((\mathcal {L}[x_{1},p],q,q^{\prime })\), and nk + 2 votes defined as \((p,\mathcal {L}[q, x_{|{\Gamma }|}])\). Besides, for every 2-interval \(I_{i}=\{{I_{i}^{1}}=[x_{\alpha }, x_{\beta }], {I_{i}^{2}}=[x_{\gamma },x_{\delta }]\}\) with xβ < xγ, we create two votes as follows.

$$(\mathcal{L}[q,x_{\alpha}),\mathcal{L}(x_{\beta},x_{\gamma}),\mathcal{L}(x_{\delta},p],\mathcal{L}[x_{\alpha},x_{\beta}],\mathcal{L}[x_{\gamma},x_{\delta}]); \text{and}$$
$$(q,q^{\prime},\mathcal{L}[x_{\alpha},x_{\beta}],\mathcal{L}[x_{\gamma},x_{\delta}],p,\mathcal{L}[x_{1},x_{\alpha}),\mathcal{L}(x_{\beta},x_{\gamma}),\mathcal{L}(x_{\delta},x_{|{\Gamma}|}]).$$

The comparisons are shown in Table 7.

Table 7 Comparisons between candidates in the W[1]-hardness proof for DCDV-Copelandα-UNI in Theorem 5

Using the same argument for CCDV-Copelandα-UNI, we can conclude that if there is an independent set of size k, the candidate p can prevent q from being the unique winner by deleting k votes. For the other direction, observe first that no candidate xi ∈Γ has a chance to have a higher score than that of q since every xi is beaten by both q and q in the final election. Clearly, q also has no chance to prevent q from being the unique winner since every vote ranks q above q. Therefore, the only candidate which can prevent q from being the unique winner is p and, moreover, this happens only if p beats every candidate in Γ. The remaining argument is the same as for CCDV-Copelandα-UNI.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yang, Y., Guo, J. Parameterized Complexity of Voter Control in Multi-Peaked Elections. Theory Comput Syst 62, 1798–1825 (2018). https://doi.org/10.1007/s00224-018-9843-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00224-018-9843-8

Keywords

Navigation