Strategic Behavior in Multi-Winner Elections A follow-up on previous work by Ariel Procaccia, Aviv Zohar and Jeffrey S. Rosenschein Reshef Meir The School.

Slides:



Advertisements
Similar presentations
110/6/2014CSE Suprakash Datta datta[at]cse.yorku.ca CSE 3101: Introduction to the Design and Analysis of Algorithms.
Advertisements

Minimum Clique Partition Problem with Constrained Weight for Interval Graphs Jianping Li Department of Mathematics Yunnan University Jointed by M.X. Chen.
On the Robustness of Preference Aggregation in Noisy Environments Ariel D. Procaccia, Jeffrey S. Rosenschein and Gal A. Kaminka.
Ioannis Caragiannis, Jason A. Covey, Michal Feldman, Christopher M. Homan, Christos Kaklamanis, Nikos Karanikolask, Ariel D. Procaccia, Je ff rey S. Rosenschein.
The Computational Difficulty of Manipulating an Election Tetiana Zinchenko 05/12/
Lecture 24 Coping with NPC and Unsolvable problems. When a problem is unsolvable, that's generally very bad news: it means there is no general algorithm.
Learning Voting Trees Ariel D. Procaccia, Aviv Zohar, Yoni Peleg, Jeffrey S. Rosenschein.
Voting and social choice Vincent Conitzer
Algorithmic Game Theory Uri Feige Robi Krauthgamer Moni Naor Lecture 9: Social Choice Lecturer: Moni Naor.
Plurality Voting with Truth-biased Agents Vangelis Markakis Joint work with: Svetlana Obraztsova, David R. M. Thompson Athens University of Economics and.
Speaker: Ariel Procaccia 1 Joint work with: Ioannis Caragiannis 2, Jason Covey 3, Michal Feldman 1, Chris Homan 3, Christos Kaklamanis 2, Nikos Karanikolas.
IMPOSSIBILITY AND MANIPULABILITY Section 9.3 and Chapter 10.
An Approximate Truthful Mechanism for Combinatorial Auctions An Internet Mathematics paper by Aaron Archer, Christos Papadimitriou, Kunal Talwar and Éva.
Complexity of manipulating elections with few candidates Vincent Conitzer and Tuomas Sandholm Carnegie Mellon University Computer Science Department.
1 EE5900 Advanced Embedded System For Smart Infrastructure Static Scheduling.
Computing Kemeny and Slater Rankings Vincent Conitzer (Joint work with Andrew Davenport and Jayant Kalagnanam at IBM Research.)
1 NP-completeness Lecture 2: Jan P The class of problems that can be solved in polynomial time. e.g. gcd, shortest path, prime, etc. There are many.
CSCI 256 Data Structures and Algorithm Analysis Lecture 22 Some slides by Kevin Wayne copyright 2005, Pearson Addison Wesley all rights reserved, and some.
NP-complete and NP-hard problems Transitivity of polynomial-time many-one reductions Concept of Completeness and hardness for a complexity class Definition.
Complexity ©D Moshkovitz 1 Approximation Algorithms Is Close Enough Good Enough?
Parallel Scheduling of Complex DAGs under Uncertainty Grzegorz Malewicz.
The Distortion of Cardinal Preferences in Voting Ariel D. Procaccia and Jeffrey S. Rosenschein.
Approximability and Inapproximability of Dodgson and Young Elections Ariel D. Procaccia, Michal Feldman and Jeffrey S. Rosenschein.
Introduction to Approximation Algorithms Lecture 12: Mar 1.
Computational problems, algorithms, runtime, hardness
Speaker: Ariel Procaccia Joint work with: Michael Zuckerman, Jeff Rosenschein Hebrew University of Jerusalem.
Ties Matter: Complexity of Voting Manipulation Revisited based on joint work with Svetlana Obraztsova (NTU/PDMI) and Noam Hazon (CMU) Edith Elkind (Nanyang.
Strategy-Proof Classification Reshef Meir School of Computer Science and Engineering, Hebrew University A joint work with Ariel. D. Procaccia and Jeffrey.
CPS Voting and social choice
Social choice theory = preference aggregation = voting assuming agents tell the truth about their preferences Tuomas Sandholm Professor Computer Science.
Approximation algorithms and mechanism design for minimax approval voting Ioannis Caragiannis Dimitris Kalaitzis University of Patras Vangelis Markakis.
1 CSE 417: Algorithms and Computational Complexity Winter 2001 Lecture 23 Instructor: Paul Beame.
Junta Distributions and the Average Case Complexity of Manipulating Elections A. D. Procaccia & J. S. Rosenschein.
Reshef Meir Jeff Rosenschein Hebrew University of Jerusalem, Israel Maria Polukarov Nick Jennings University of Southampton, United Kingdom COMSOC 2010,
Complexity of unweighted coalitional manipulation under some common voting rules Lirong XiaVincent Conitzer COMSOC08, Sep. 3-5, 2008 TexPoint fonts used.
Automated Design of Voting Rules by Learning From Examples Ariel D. Procaccia, Aviv Zohar, Jeffrey S. Rosenschein.
1 Manipulation of Voting Schemes: A General Result By Allan Gibbard Presented by Rishi Kant.
Reshef Meir School of Computer Science and Engineering Hebrew University, Jerusalem, Israel Joint work with Maria Polukarov, Jeffery S. Rosenschein and.
Social choice theory = preference aggregation = truthful voting Tuomas Sandholm Professor Computer Science Department Carnegie Mellon University.
Introduction complexity has been suggested as a means of precluding strategic behavior. Previous studies have shown that some voting protocols are hard.
Social choice (voting) Vincent Conitzer > > > >
Strategy-Proof Classification Reshef Meir School of Computer Science and Engineering, Hebrew University A joint work with Ariel. D. Procaccia and Jeffrey.
The Theory of NP-Completeness 1. Nondeterministic algorithms A nondeterminstic algorithm consists of phase 1: guessing phase 2: checking If the checking.
The Theory of NP-Completeness 1. What is NP-completeness? Consider the circuit satisfiability problem Difficult to answer the decision problem in polynomial.
Nattee Niparnan. Easy & Hard Problem What is “difficulty” of problem? Difficult for computer scientist to derive algorithm for the problem? Difficult.
CPS Voting and social choice Vincent Conitzer
An Algorithm for the Coalitional Manipulation Problem under Maximin Michael Zuckerman, Omer Lev and Jeffrey S. Rosenschein AAMAS’11.
An Algorithm for the Coalitional Manipulation Problem under Maximin Michael Zuckerman, Omer Lev and Jeffrey S. Rosenschein (Simulations by Amitai Levy)
CSCI-256 Data Structures & Algorithm Analysis Lecture Note: Some slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved. 27.
EMIS 8373: Integer Programming NP-Complete Problems updated 21 April 2009.
1 Elections and Manipulations: Ehud Friedgut, Gil Kalai, and Noam Nisan Hebrew University of Jerusalem and EF: U. of Toronto, GK: Yale University, NN:
Optimal Manipulation of Voting Rules Edith Elkind Nanyang Technological University, Singapore (based on joint work with Svetlana Obraztsova)
Complexity of Determining Nonemptiness of the Core Vincent Conitzer, Tuomas Sandholm Computer Science Department Carnegie Mellon University.
Junta Distributions and the Average-Case Complexity of Manipulating Elections A presentation by Jeremy Clark Ariel D. Procaccia Jeffrey S. Rosenschein.
Manipulating the Quota in Weighted Voting Games (M. Zuckerman, P. Faliszewski, Y. Bachrach, and E. Elkind) ‏ Presented by: Sen Li Software Technologies.
1/19 Minimizing weighted completion time with precedence constraints Nikhil Bansal (IBM) Subhash Khot (NYU)
Math for Liberal Studies.  We have seen many methods, all of them flawed in some way  Which method should we use?  Maybe we shouldn’t use any of them,
Great Theoretical Ideas in Computer Science.
Social choice theory = preference aggregation = voting assuming agents tell the truth about their preferences Tuomas Sandholm Professor Computer Science.
28.
The Theory of NP-Completeness 1. Nondeterministic algorithms A nondeterminstic algorithm consists of phase 1: guessing phase 2: checking If the checking.
Optimization and Stability in Games with Restricted Interactions Reshef Meir, Yair Zick and Jeffrey S. Rosenschein CoopMAS 2012.
The Theory of NP-Completeness
P & NP.
Social choice theory = preference aggregation = voting assuming agents tell the truth about their preferences Tuomas Sandholm Professor Computer Science.
NP-Completeness Yin Tat Lee
NP-Completeness Yin Tat Lee
CSE 6408 Advanced Algorithms.
Approximability of Manipulating Elections
The Theory of NP-Completeness
Presentation transcript:

Strategic Behavior in Multi-Winner Elections A follow-up on previous work by Ariel Procaccia, Aviv Zohar and Jeffrey S. Rosenschein Reshef Meir The School of Engineering and Computer Science Hebrew University, Jerusalem, Israel

Lecture content definitions previous work problems left open by previous work more definitions 3½ theorems and proofs results and summary

Voting A way of aggregating the preferences of multiple agents regarding a set of possible alternatives C={c 1,…,c m } Each agent is assumed to have a ranking of the alternatives (or perhaps even a utility function) A voting protocol / scheme takes these preferences and selects one of the alternatives Procaccia et al. ‘07

Single Winner Elections Only one candidate is elected Many well-known election mechanisms that essentially boil down to plurality/majority –The candidate with the most votes gets elected –The difference between schemes is usually in how votes are distributed, and in the number of election rounds Procaccia et al. ‘07

Example: Single non-Transferable Vote Each voter votes for a single specific candidate Votes are counted and the candidate with the most votes is elected Procaccia et al. ‘07

More voting schemes BLOC - the voter selects L preferred candidates, and gives 1 point to each Approval - the voter approves/disapproves each candidate independently Cumulative - the voter distributes a ”pool” of L points between the candidates

Multi-Winner Elections The elected assembly is of size k This means that if we have m candidates, there are possible assemblies Procaccia et al. ‘07

Manipulation A voter is said to manipulate an election if it votes strategically. It misreports its preferences to achieve a better result. In single-winner elections, the manipulator simply attempts to change the winner In multi-winner elections there can be several forms of manipulation: –Can a voter make a specific candidate win? –Can a voter make some candidate lose? –Can a voter make a set of candidates win? –…–… Procaccia et al. ‘07

Manipulation We use a general formulation (single manipulator): Given –a set of candidates C –a set of voters V that have already voted –and a utility function of the manipulator u:C  Z we ask whether the manipulator can, by some vote, get some group of winners with value of at least t Procaccia et al. ‘07

Example of Manipulation (SNTV) 1000 votes 900 votes U(Kermit)=50 U(Gonzo)=20 U(Miss Piggy)=70 Elmo prefers Miss Piggy, but is better off voting for Kermit! Winners Procaccia et al. ‘07

The Gibbard-Satterthwaite Impossibility Result One of several impossibility results regarding voting No voting rule with 3 or more alternatives in which voters give a full ranking over alternatives has all 3 properties: 1.Every alternative can be selected (with some preference profiles of the voters) 2.Non-dictatorial 3.No voter can manipulate the vote Procaccia et al. ‘07

The Complexity of Manipulation Alternative One way to address the problem of manipulability of reasonable voting schemes: find schemes that are computationally hard to manipulate What we would like to see are proofs that voting is always or usually hard to manipulate We present here analysis of the worst case of the problem –Not enough to convince of hardness of manipulation in all cases, but it gives some bounds Procaccia et al. ‘07

Control (add voters) This is another form of manipulation This time not by voters, but by someone that can register new voters (a Chairman) Given: –Candidates C –A set V of registered voters (with their known votes) –A set V' of unregistered voters (also with known preferences) –A utility function of the manipulator u:C  Z choose a subset of voters V'' from V' of size at most r that will be registered to vote, and will get a better result Procaccia et al. ‘07

Results from Procaccia et al.

Other problems Other voting rules –scoring rules Other types of manipulation Other types of control

Other types of Manipulation Can a voter: Force a distinguished candidate to win? Force a distinguished candidate to loose? Force a subset of candidates to win/lose? All these are special cases of the general case with boolean utility function

Other types of Control Control by removing Voters –The chairman is allowed to remove at most r voters from V Control by adding / removing Candidates –The chairman is allowed to remove at most r candidates from C, or add at most r from C’ –We assume the chairman knows the voters’ preferences over ALL candidates

Results so far ???

Theorem 1 Manipulation under Cumulative voting with boolean utility function is in P.

Observations After voting, each candidate has a final score There is some “threshold”, such that all (and only) candidates with score above the threshold are elected The threshold is dynamic, and may change as the Manipulator distributes his score

Algorithm Sort all candidates with decreasing score D  all candidates with utility 1 Find j* = max( j : |{1…j-1}  D| + k + 1- j  t, and j not in D) threshold  score(j*) Return TRUE iff :

Proof idea In order to be included in the winner set, there is some “bad” candidate j*, that all t “good” candidates have to win Since all “good” candidates have the utility 1, the manipulator should focus on giving his score to those that have the best chances We check if it is possible to bring the t good candidates with highest score, to pass the threshold (i.e. win j*)

Illustration j* = 5 k = 6 t = 3 Manipulation possible iff L 

Theorem 2 Control by adding candidates under Approval is in P.

Observations Each candidate c in C,C’ has a fixed number of votes: score(c) It is only effective to add candidates that will actually be winners If we can solve for adding exactly r candidates, then we can do it with ≤ r

Algorithm Sort C and C’ by decreasing score threshold  score(c k+1-r ) Return the best r candidates from C’, whose score is above threshold

“proof” by illustration k=8 20 =Thresh(3) r = 3

Theorem 3 Control by removing candidates under SNTV is in NPc, even in a single winner setting.

Min Set-Cover Definition: in the problem of Min Set- Cover, we are given a set U = {1…m}, a family F of subsets of U, and integers s,r. we ask whether it is possible to choose (at least) s subsets from F, such that their union covers at most r points in U.

Min Set-Cover Reduction from CLIQUE –Each vertex is an element –Each edge is a set –Can we find sets, which cover no more than r vertices? Min Set-Cover is NP-hard

Proof I will show a reduction from Min Set-Cover The reduction lies on representing the Voting problem in a “convenient” way The exact details of the constructed instance appear, but are not as important

Proof idea Given an instance of Min Set-Cover: –Add a candidate for each element in U –Add a distinguished candidate c’ –Add a voter for each set in F: this is the set of candidates that this voter prefers over c’

Proof idea Each voter represents a set of candidates that are preferred over c’ Show that: c’ wins iff at least s voters vote for him r candidates that are preferred by s voters are equivalent to r elements covered by s sets. Denote by R the subset of r selected elements/candidates c’ gets 1 vote for each set from F contained in R

Proof idea Each voter represents a set of candidates that are preferred over c’ c’ gets 1 vote for each set from F contained in R Thus: –c’ wins iff at least s voters vote for him –iff we choose s subsets contained in r elements Control is possible iff there is Min Set-Cover

Illustration c’

Formal construction Let (U,F,t,s) an instance of MIN Set-Cover r := t C1 := U C2 := {c(1),…,c(r+1)} C := C1  C2  {c’}

Formal construction For each set f in F, add a voter v(f) to V1, which votes: f > c’ > C1\f > C2 For each candidate c in C2, add n+s-1 voters to V2, which vote: c > C2\{c} > others Add n voters to V3, all vote: c’ > others

Formal proof outline Claim I: c’ will win iff at least s voters from V1 will vote for him. Claim II: s voters from V1 will vote for c’ iff there are at least s subsets in F, that cover at most r elements in U. proof: each v(f) in V1 votes for c’ iff all candidates in f are removed.

Results Black – from Procaccia et al. Blue – from my paper

Summary Different voting schemes may be more resistant to some strategic behaviors, but more prone to others Each problem can be represented in different ways. We need to find “convenient” representations for our purposes