Computers and Intractability: A Guide to the Theory of NP-Completeness
Computers and Intractability: A Guide to the Theory of NP-Completeness
Complexity Theory and Cryptology
Complexity Theory and Cryptology
Computing the Banzhaf power index in network flow games
Proceedings of the 6th international joint conference on Autonomous agents and multiagent systems
The equivalence problem for regular expressions with squaring requires exponential space
SWAT '72 Proceedings of the 13th Annual Symposium on Switching and Automata Theory (swat 1972)
Power in threshold network flow games
Autonomous Agents and Multi-Agent Systems
False name manipulations in weighted voting games: splitting, merging and annexation
Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems - Volume 1
Note: Generalized juntas and NP-hard sets
Theoretical Computer Science
Computational complexity of weighted threshold games
AAAI'07 Proceedings of the 22nd national conference on Artificial intelligence - Volume 1
Junta distributions and the average-case complexity of manipulating elections
Journal of Artificial Intelligence Research
Llull and Copeland voting computationally resist bribery and constructive control
Journal of Artificial Intelligence Research
How hard is bribery in elections?
Journal of Artificial Intelligence Research
Where are the really hard manipulation problems? the phase transition in manipulating the veto rule
IJCAI'09 Proceedings of the 21st international jont conference on Artifical intelligence
The Cost of Stability in Coalitional Games
SAGT '09 Proceedings of the 2nd International Symposium on Algorithmic Game Theory
SAGT '09 Proceedings of the 2nd International Symposium on Algorithmic Game Theory
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 1 - Volume 1
An Empirical Study of the Manipulability of Single Transferable Voting
Proceedings of the 2010 conference on ECAI 2010: 19th European Conference on Artificial Intelligence
Proceedings of the 2010 conference on STAIRS 2010: Proceedings of the Fifth Starting AI Researchers' Symposium
A double oracle algorithm for zero-sum security games on graphs
The 10th International Conference on Autonomous Agents and Multiagent Systems - Volume 1
Hi-index | 0.00 |
Bachrach and Porat [1] introduced path-disruption games. In these coalitional games, agents are placed on the vertices of a graph, and one or more adversaries want to travel from a source vertex to a target vertex. In order to prevent them from doing so, the agents can form coalitions, and a coalition wins if it succeeds in blocking all paths for the adversaries. In this paper, we introduce the notion of bribery for path-disruption games. We analyze the question of how hard it is to decide whether the adversaries can bribe some of the agents such that no coalition can be formed that blocks all paths for the adversaries. We show that this problem is NP-complete, even for a single adversary. For the case of multiple adversaries, we provide an upper bound by showing that the corresponding problem is in Σ2p, the second level of the polynomial hierarchy, and we suspect it is complete for this class.