Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2018
In a tournament, n players enter the competition. In each round, they are paired-up to compete against each other. Losers are thrown, while winners proceed to the next round, until only one player (the winner) is left. Given a prediction of the outcome, for every pair of players, of a match between them (modeled by a digraph D), the competitive nature of a tournament makes it attractive for manipulators. In the Tournament Fixing (TF) problem, the goal is to decide if we can conduct the competition (by controlling how players are paired-up) so that our favorite player w wins. A common form of manipulation is to bribe players to alter the outcome of matches. Kim and Williams [IJCAI 2015] integrated such deceit into TF, and showed that the resulting problem is NP-hard when < (1 −) log n alterations are possible (for any fixed > 0). For this problem, our contribution is fourfold. First, we present two operations that "obfuscate deceit": given one solution, they produce another solution. Second, we present a combinatorial result, stating that there is always a solution with all reversals incident to w and "elite players". Third, we give a closed formula for the case where D is a DAG. Finally, we present exact exponential-time and parameterized algorithms for the general case.
Journal of Applied Logic, 2015
We study the computational complexity of optimal bribery and manipulation schemes for sports tournaments with uncertain information: cup; challenge or caterpillar; and round robin. Our results carry over to the equivalent voting rules: sequential pair-wise elections, cup, and Copeland, when the set of candidates is exactly the set of voters. This restriction creates new difficulties for most existing algorithms. The complexity of bribery and manipulation are well studied, almost always assuming deterministic information about votes and results. We assume that for candidates i and j the probability that i beats j and the costs of lowering each probability by fixed increments are known to the manipulators. We provide complexity analyses for cup, challenge, and round robin competitions ranging from polynomial time to NP PP . This shows that the introduction of uncertainty into the reasoning process drastically increases the complexity of bribery problems in some instances.
… of the thirteenth Australasian symposium on …, 2007
We study the manipulation of voting schemes, where a voter lies about their preferences in the hope of improving the election's outcome. All voting schemes are potentially manipulable. However, some, such as the Single Transferable Vote (STV) scheme used in Australian elections, are resistant to manipulation because it is N P-hard to compute the manipulating vote(s). We concentrate on STV and some natural generalisations of it called Scoring Elimination Protocols. We show that the hardness result for STV is true only if both the number of voters and the number of candidates are unbounded-we provide algorithms for a manipulation if either of these is fixed. This means that manipulation would not be hard in practice when either number is small. Next we show that the weighted version of the manipulation problem is N P-hard for all Scoring Elimination Protocols except one, which we provide an algorithm for manipulating. Finally we experimentally test a heuristic for solving the manipulation problem and conclude that it would not usually be effective.
2008
We investigate the extent to which it is possible to rig the agenda of an election or competition so as to favor a particular candidate in the presence of imperfect information about the preferences of the electorate. We assume that what is known about an electorate is the probability that any given candidate will beat another. As well as presenting some analytical results relating to the complexity of finding and verifying agenda, we develop heuristics for agenda rigging, and investigate the performance of these heuristics for both randomly generated data and real-world data from tennis and basketball competitions.
2012
In recent papers, Obraztsova et al. initiated the study of the computational complexity of voting manipulation under randomized tie-breaking . The authors provided a polynomial-time algorithm for the problem of finding an optimal vote for the manipulator (a vote maximizing the manipulator's expected utility) under the Maximin voting rule, for the case where the manipulator's utilities of the candidates are given by the vector (1, 0, . . . , 0). On the other hand, they showed that this problem is NP-hard for the case where the utilities are (1, . . . , 1, 0). This paper continues that line of research. We prove that when the manipulator's utilities of the candidates are given by the vector (1, . . . , 1, 0, . . . , 0), with k 1's and (m − k) 0's, then the problem of finding an optimal vote for the manipulator is fixed-parameter tractable when parameterized by k. Also, by exploring the properties of the graph built by the algorithm, we prove that when a certain sub-graph of this graph contains a 2-cycle, then the solution returned by the algorithm is optimal.
Social Choice and Welfare, 1989
We show how computational complexity might protect the integrity of social choice. We exhibit a voting rule that efficiently computes winners but is computationally resistant to strategic manipulation. It is NP-complete for a manipulative voter to determine how to exploit knowledge of the preferences of others. In contrast, many standard voting schemes can be manipulated with only polynomial computational effort. for stimulating discussions.
Journal of Artificial Intelligence Research, 2011
Weighted voting is a classic model of cooperation among agents in decision-making domains. In such games, each player has a weight, and a coalition of players wins the game if its total weight meets or exceeds a given quota. A player's power in such games is usually not directly proportional to his weight, and is measured by a power index, the most prominent among which are the Shapley-Shubik index and the Banzhaf index.
Lecture Notes in Computer Science, 2014
False-name manipulation refers to the question of whether a player in a weighted voting game can increase her power by splitting into several players and distributing her weight among these false identities. Analogously to this splitting problem, the beneficial merging problem asks whether a coalition of players can increase their power in a weighted voting game by merging their weights. Aziz et al. [ABEP11] analyze the problem of whether merging or splitting players in weighted voting games is beneficial in terms of the Shapley-Shubik and the normalized Banzhaf index, and so do Rey and Rothe [RR10] for the probabilistic Banzhaf index. All these results provide merely NP-hardness lower bounds for these problems, leaving the question about their exact complexity open. For the Shapley-Shubik and the probabilistic Banzhaf index, we raise these lower bounds to hardness for PP, "probabilistic polynomial time," and provide matching upper bounds for beneficial merging and, whenever the number of false identities is fixed, also for beneficial splitting, thus resolving previous conjectures in the affirmative. It follows from our results that beneficial merging and splitting for these two power indices cannot be solved in NP, unless the polynomial hierarchy collapses, which is considered highly unlikely.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence
Strategic behavior in two-sided matching markets has been traditionally studied in a "one-sided" manipulation setting where the agent who misreports is also the intended beneficiary. Our work investigates "two-sided" manipulation of the deferred acceptance algorithm where the misreporting agent and the manipulator (or beneficiary) are on different sides. Specifically, we generalize the recently proposed accomplice manipulation model (where a man misreports on behalf of a woman) along two complementary dimensions: (a) the two for one model, with a pair of misreporting agents (man and woman) and a single beneficiary (the misreporting woman), and (b) the one for all model, with one misreporting agent (man) and a coalition of beneficiaries (all women). Our main contribution is to develop polynomial-time algorithms for finding an optimal manipulation in both settings. We obtain these results despite the fact that an optimal one for all strategy fails to be inconspicuo...
Information and Computation, 1998
Consider a group of colluders each with certain knowledge such as identity of some other colluders, some cryptographic keys, and some data, possibly multiply encrypted. Two colluders can combine their knowledge if their current knowledge satis es certain condition. Their cryptographic keys can help decrypt each other's encrypted data, expanding their knowledge and revealing more collusion opportunities, and the process of collusion continues. The question we address is whether it is possible for them to uncover a target set of unencrypted data. In this paper we formulate the collusion problem and provide an algorithm that determines whether a collusion problem has a solution and if so, computes one. A solution is a speci c way by which the colluders can uncover the hidden information. The solution generated by our algorithm is generally not one that involves the minimum number of colluders. We show however that to nd such a solution is NP-complete. Complex communications protocols employing cryptographic building blocks are being developed to transfer information among some users and hide from others. The algorithm presented here can be applied to determine whether and how a subset of protocol users can discover during or after the protocol's execution the information that is to be hidden from them.
2011
In their groundbreaking paper, Bartholdi, Tovey and Trick [1] argued that many well-known voting rules, such as Plurality, Borda, Copeland and Maximin are easy to manipulate. An important assumption made in that paper is that the manipulator's goal is to ensure that his preferred candidate is among the candidates with the maximum score, or, equivalently, that ties are broken in favor of the manipulator's preferred candidate. In this paper, we examine the role of this assumption in the easiness results of [1]. We observe that the algorithm presented in [1] extends to all rules that break ties according to a fixed ordering over the candidates. We then show that all scoring rules are easy to manipulate if the winner is selected from all tied candidates uniformly at random. This result extends to Maximin under an additional assumption on the manipulator's utility function that is inspired by the original model of . In contrast, we show that manipulation becomes hard when arbitrary polynomial-time tie-breaking rules are allowed, both for the rules considered in [1], and for a large class of scoring rules.
Journal of Graph Theory, 1998
We survey results concerning various generalizations of tournaments. The reader will see that tournaments are by no means the only class of directed graphs with a very rich structure. We describe, among numerous other topics mostly related to paths and cycles, results on hamiltonian paths and cycles. The reader will see that although these problems are polynomially solvable for all of the classes described, they can be highly non-trivial, even for these "tournament-like" digraphs.
We study the Maker-Breaker tournament game played on the edge set of a given graph $G$. Two players, Maker and Breaker claim unclaimed edges of $G$ in turns, and Maker wins if by the end of the game she claims all the edges of a pre-defined goal tournament. Given a tournament $T_k$ on $k$ vertices, we determine the threshold bias for the $(1:b)$ $T_k$-tournament game on $K_n$. We also look at the $(1:1)$ $T_k$-tournament game played on the edge set of a random graph ${\mathcal{G}_{n,p}}$ and determine the threshold probability for Maker's win. We compare these games with the clique game and discuss whether a random graph intuition is satisfied.
Combinatorics, Probability and Computing, 2015
In the tournament game two players, called Maker and Breaker, alternately take turns in claiming an unclaimed edge of the complete graph K n and selecting one of the two possible orientations. Before the game starts, Breaker fixes an arbitrary tournament T k on k vertices. Maker wins if, at the end of the game, her digraph contains a copy of T k ; otherwise Breaker wins. In our main result, we show that Maker has a winning strategy for k = (2 − o(1)) log 2 n, improving the constant factor in previous results of Beck and the second author. This is asymptotically tight since it is known that for k = (2 − o(1)) log 2 n Breaker can prevent that the underlying graph of Maker's graph contains a k-clique. Moreover the precise value of our lower bound differs from the upper bound only by an additive constant of 12.
2011
Computational complexity of voting manipulation is one of the most actively studied topics in the area of computational social choice, starting with the groundbreaking work of . Most of the existing work in this area, including that of , implicitly assumes that whenever several candidates receive the top score with respect to the given voting rule, the resulting tie is broken according to a lexicographic ordering over the candidates. However, till recently, an equally appealing method of tiebreaking, namely, selecting the winner uniformly at random among all tied candidates, has not been considered in the computational social choice literature. The first paper to analyze the complexity of voting manipulation under randomized tiebreaking is , where the authors provide polynomial-time algorithms for this problem under scoring rules and-under an additional assumption on the manipulator's utilitiesfor Maximin. In this paper, we extend the results of by showing that finding an optimal vote under randomized tie-breaking is computationally hard for Copeland and Maximin (with general utilities), as well as for STV and Ranked Pairs, but easy for the Bucklin rule and Plurality with Runoff.
Journal of Institutional and Theoretical Economics JITE, 2010
We use a real-effort task to investigate the responsiveness of both sabotage and performance in a tournament to: (1) changes in the payoff structure of the tournament, and (2) changes in the identity of competitors over a series of tournaments (rematching versus constant pairings). Constant pairings shows significantly lower performance than rematching because of weak performance by low-ability participants. Constant pairings also depresses the rate at which participants choose sabotage, but causes higher sabotage levels given that the sabotage option is selected. Finally, sabotage is used far less effectively in the constant-pairings than it is in the rematching condition.
American Economic Journal: Microeconomics, 2013
Artificial Intelligence, 2009
We investigate the problem of coalitional manipulation in elections, which is known to be hard in a variety of voting rules. We put forward efficient algorithms for the problem in Scoring rules, Maximin and Plurality with Runoff, and analyze their windows of error. Specifically, given an instance on which an algorithm fails, we bound the additional power the manipulators need in order to succeed. We finally discuss the implications of our results with respect to the popular approach of employing computational hardness to preclude manipulation. * A significantly shorter version of this paper (with most of the proofs omitted) appears in the
2012
Let G be an undirected graph and let T be a tournament on the same vertex set as G. Define the cost of G relative to T to be ∑ u,v∈E(G) (T (u, v) + T (v, u)) + |E|, where T (u, v) denotes the number of two-step paths from u v, in T . In this paper, we determine for several classes of graphs which tournaments minimize the cost. Pelsmajer, et al. [5] conjecture that for each graph there is a transitive tournament that minimizes the graph’s cost. We prove that a transitive tournament minimizes the cost for complete graphs, nearly complete graphs, paths, star graphs, and cycles.
Springer eBooks, 2015
Determining the winner of a Parity Game is a major problem in computational complexity with a number of applications in verification. In a parameterized complexity setting, the problem has often been considered with parameters such as (directed versions of) treewidth or clique-width, by applying dynamic programming techniques. In this paper we adopt a parameterized approach which is more inspired by well-known (non-parameterized) algorithms for this problem. We consider a number of natural parameterizations, such as by Directed Feedback Vertex Set, Distance to Tournament, and Modular Width. We show that, for these parameters, it is possible to obtain recursive parameterized algorithms which are simpler, faster and only require polynomial space. We complement these results with some algorithmic lower bounds which, among others, rule out a possible avenue for improving the bestknown sub-exponential time algorithm for parity games.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.