A heuristic technique for multi-agent planning
Annals of Mathematics and Artificial Intelligence
Proceedings of the Seventeenth National Conference on Artificial Intelligence and Twelfth Conference on Innovative Applications of Artificial Intelligence
Journal of Computer and System Sciences
When are elections with few candidates hard to manipulate?
Journal of the ACM (JACM)
Anyone but him: The complexity of precluding an alternative
Artificial Intelligence
Elections Can be Manipulated Often
FOCS '08 Proceedings of the 2008 49th Annual IEEE Symposium on Foundations of Computer Science
Single-peaked consistency and its complexity
Proceedings of the 2008 conference on ECAI 2008: 18th European Conference on Artificial Intelligence
Nonexistence of voting rules that are usually hard to manipulate
AAAI'06 Proceedings of the 21st national conference on Artificial intelligence - Volume 1
The complexity of bribery in elections
AAAI'06 Proceedings of the 21st national conference on Artificial intelligence - Volume 1
Uncertainty in preference elicitation and aggregation
AAAI'07 Proceedings of the 22nd national conference on Artificial intelligence - Volume 1
Llull and copeland voting broadly resist bribery and control
AAAI'07 Proceedings of the 22nd national conference on Artificial intelligence - Volume 1
Approximability of manipulating elections
AAAI'08 Proceedings of the 23rd national conference on Artificial intelligence - Volume 1
Junta distributions and the average-case complexity of manipulating elections
Journal of Artificial Intelligence Research
Hybrid elections broaden complexity-theoretic resistance to control
IJCAI'07 Proceedings of the 20th international joint conference on Artifical intelligence
Eliciting single-peaked preferences using comparison queries
Journal of Artificial Intelligence Research
Manipulation of copeland elections
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 1 - Volume 1
Using complexity to protect elections
Communications of the ACM
Towards a dichotomy for the Possible Winner problem in elections based on scoring rules
Journal of Computer and System Sciences
Control complexity in fallback voting
CATS '10 Proceedings of the Sixteenth Symposium on Computing: the Australasian Theory - Volume 109
Information and Computation
The complexity of manipulative attacks in nearly single-peaked electorates
Proceedings of the 13th Conference on Theoretical Aspects of Rationality and Knowledge
Solving election manipulation using integer partitioning problems
The 10th International Conference on Autonomous Agents and Multiagent Systems - Volume 2
Is computational complexity a barrier to manipulation?
Annals of Mathematics and Artificial Intelligence
Where are the hard manipulation problems?
Journal of Artificial Intelligence Research
Hi-index | 0.02 |
Much work has been devoted, during the past twenty years, to using complexity to protect elections from manipulation and control. Many results have been obtained showing NP-hardness shields, and recently there has been much focus on whether such worst-case hardness protections can be bypassed by frequently correct heuristics or by approximations. This paper takes a very different approach: We argue that when electorates follow the canonical political science model of societal preferences the complexity shield never existed in the first place. In particular, we show that for electorates having single-peaked preferences, many existing NP-hardness results on manipulation and control evaporate.