Average case complete problems
SIAM Journal on Computing
On reductions of NP sets to sparse sets
Journal of Computer and System Sciences
ACM SIGACT News
Superpolynomial Circuits, Almost Sparse Oracles and the Exponential Hierarchy
Proceedings of the 12th Conference on Foundations of Software Technology and Theoretical Computer Science
Journal of Computer and System Sciences
When are elections with few candidates hard to manipulate?
Journal of the ACM (JACM)
Elections Can be Manipulated Often
FOCS '08 Proceedings of the 2008 49th Annual IEEE Symposium on Foundations of Computer Science
Proceedings of the 12th Conference on Theoretical Aspects of Rationality and Knowledge
Single-peaked consistency and its complexity
Proceedings of the 2008 conference on ECAI 2008: 18th European Conference on Artificial Intelligence
Note: Generalized juntas and NP-hard sets
Theoretical Computer Science
Uncertainty in preference elicitation and aggregation
AAAI'07 Proceedings of the 22nd national conference on Artificial intelligence - Volume 1
Junta distributions and the average-case complexity of manipulating elections
Journal of Artificial Intelligence Research
Eliciting single-peaked preferences using comparison queries
Journal of Artificial Intelligence Research
Llull and Copeland voting computationally resist bribery and constructive control
Journal of Artificial Intelligence Research
How hard is bribery in elections?
Journal of Artificial Intelligence Research
Multimode control attacks on elections
IJCAI'09 Proceedings of the 21st international jont conference on Artifical intelligence
Where are the really hard manipulation problems? the phase transition in manipulating the veto rule
IJCAI'09 Proceedings of the 21st international jont conference on Artifical intelligence
On the role of distances in defining voting rules
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 1 - Volume 1
Using complexity to protect elections
Communications of the ACM
Control complexity in fallback voting
CATS '10 Proceedings of the Sixteenth Symposium on Computing: the Australasian Theory - Volume 109
Information and Computation
Proceedings of the 2013 international conference on Autonomous agents and multi-agent systems
Are there any nicely structured preference profiles nearby?
IJCAI'13 Proceedings of the Twenty-Third international joint conference on Artificial Intelligence
Kemeny elections with bounded single-peaked or single-crossing width
IJCAI'13 Proceedings of the Twenty-Third international joint conference on Artificial Intelligence
Multi-dimensional single-peaked consistency and its approximations
IJCAI'13 Proceedings of the Twenty-Third international joint conference on Artificial Intelligence
The complexity of manipulative attacks in nearly single-peaked electorates
Artificial Intelligence
On the computation of fully proportional representation
Journal of Artificial Intelligence Research
Annals of Mathematics and Artificial Intelligence
Hi-index | 0.00 |
Many electoral bribery, control, and manipulation problems (which we will refer to in general as "manipulative actions" problems) are NP-hard in the general case. It has recently been noted that many of these problems fall into polynomial time if the electorate is single-peaked (i.e., is polarized along some axis/issue). However, real-world electorates are not truly single-peaked. There are usually some mavericks, and so real-world electorates tend to merely be nearly single-peaked. This paper studies the complexity of manipulative-action algorithms for elections over nearly single-peaked electorates, for various notions of nearness and various election systems. We provide instances where even one maverick jumps the manipulative-action complexity up to NP-hardness, but we also provide many instances where a reasonable number of mavericks can be tolerated without increasing the manipulative-action complexity.