The shield that never was: societies with single-peaked preferences are more open to manipulation and control

Much work has been devoted, during the past twenty years, to using complexity to protect elections from manipulation and control. Many results have been obtained showing NP-hardness shields, and recently there has been much focus on whether such worst-case hardness protections can be bypassed by frequently correct heuristics or by approximations. This paper takes a very different approach: We argue that when electorates follow the canonical political science model of societal preferences the complexity shield never existed in the first place. In particular, we show that for electorates having single-peaked preferences, many existing NP-hardness results on manipulation and control evaporate.

[1]  M. Trick,et al.  The computational difficulty of manipulating an election , 1989 .

[2]  Edith Hemaspaandra,et al.  Bypassing Combinatorial Protections: Polynomial-Time Algorithms for Single-Peaked Electorates , 2010, AAAI.

[3]  Jean-Claude Falmagne,et al.  A Polynomial Time Algorithm for Unidimensional Unfolding Representations , 1994, J. Algorithms.

[4]  Vincent Conitzer Eliciting single-peaked preferences using comparison queries , 2007, AAMAS '07.

[5]  Guillaume Haeringer,et al.  A characterization of the single-peaked domain , 2011, Soc. Choice Welf..

[6]  Piotr Faliszewski,et al.  Llull and Copeland Voting Broadly Resist Bribery and Control , 2007, AAAI.

[7]  Eric Horvitz,et al.  Social Choice Theory and Recommender Systems: Analysis of the Axiomatic Foundations of Collaborative Filtering , 2000, AAAI/IAAI.

[8]  John R. Wright,et al.  Voting cycles and the structure of individual preferences , 1987 .

[9]  Jörg Rothe,et al.  Anyone but him: The complexity of precluding an alternative , 2005, Artif. Intell..

[10]  D. Black On the Rationale of Group Decision-making , 1948, Journal of Political Economy.

[11]  K. T. Poole,et al.  Congress: A Political-Economic History of Roll Call Voting , 1997 .

[12]  N. Schofield,et al.  The Political Economy of Democracy , 2009 .

[13]  Piotr Faliszewski,et al.  How Hard Is Bribery in Elections? , 2006, J. Artif. Intell. Res..

[14]  Michael A. Trick,et al.  How hard is it to control an election? Math , 1992 .

[15]  Keith Krehbiel,et al.  Pivotal Politics: A Theory of U.S. Lawmaking , 1998 .

[16]  Ariel D. Procaccia,et al.  Junta distributions and the average-case complexity of manipulating elections , 2006, AAMAS '06.

[17]  Piotr Faliszewski,et al.  The shield that never was: Societies with single-peaked preferences are more open to manipulation and control , 2011, Inf. Comput..

[18]  Kellogg S. Booth,et al.  Testing for the Consecutive Ones Property, Interval Graphs, and Graph Planarity Using PQ-Tree Algorithms , 1976, J. Comput. Syst. Sci..

[19]  John J. Bartholdi,et al.  Single transferable vote resists strategic voting , 2015 .

[20]  M. Hinich,et al.  An Expository Development of a Mathematical Model of the Electoral Process , 1970, American Political Science Review.

[21]  David S. Johnson,et al.  Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .

[22]  Salvador Barberà,et al.  An introduction to strategy-proof social choice functions , 2001, Soc. Choice Welf..

[23]  D. R. Fulkerson,et al.  Incidence matrices and interval graphs , 1965 .

[24]  E. Schickler Pivotal Politics: A Theory of U.S. Lawmaking . By Keith Krehbiel. Chicago and London: University of Chicago Press, 1998. 258p. $50.00 cloth, $17.00 paper. , 2000 .

[25]  Vincent Conitzer,et al.  Generalized scoring rules and the frequency of coalitional manipulability , 2008, EC '08.

[26]  Jörg Rothe,et al.  Sincere‐Strategy Preference‐Based Approval Voting Fully Resists Constructive Control and Broadly Resists Destructive Control , 2008, Math. Log. Q..

[27]  Jérôme Lang,et al.  Single-peaked consistency and its complexity , 2008, ECAI.

[28]  Edith Hemaspaandra,et al.  Dichotomy for voting systems , 2005, J. Comput. Syst. Sci..

[29]  G. Thompson,et al.  The Theory of Committees and Elections. , 1959 .

[30]  Piotr Faliszewski,et al.  The Complexity of Bribery in Elections , 2006, AAAI.

[31]  L. A. Hemaspaandra,et al.  Computational Aspects of Approval Voting , 2010 .

[32]  D. Lepelley Constant scoring rules, condorcet criteria and single-peaked preferences , 1996 .

[33]  Eithan Ephrati,et al.  The Clarke Tax as a Consensus Mechanism Among Automated Agents , 1991, AAAI.

[34]  Jörg Rothe,et al.  Hybrid Elections Broaden Complexity‐Theoretic Resistance to Control , 2006, IJCAI.

[35]  Piotr Faliszewski,et al.  Approximability of Manipulating Elections , 2008, AAAI.

[36]  B. Peleg,et al.  Single-peakedness and coalition-proofness , 1999 .

[37]  Vincent Conitzer,et al.  When are elections with few candidates hard to manipulate? , 2007, J. ACM.

[38]  Noam Nisan,et al.  Elections Can be Manipulated Often , 2008, 2008 49th Annual IEEE Symposium on Foundations of Computer Science.

[39]  John W. Patty,et al.  Arrow ’ s Theorem on Single-Peaked Domains , 2008 .

[40]  Michael A. Trick,et al.  Recognizing single-peaked preferences on a tree , 1989 .

[41]  Piotr Faliszewski,et al.  Llull and Copeland Voting Computationally Resist Bribery and Constructive Control , 2009, J. Artif. Intell. Res..

[42]  Eithan Ephrati,et al.  A heuristic technique for multi‐agent planning , 1997, Annals of Mathematics and Artificial Intelligence.

[43]  Michael A. Trick,et al.  Stable matching with preferences derived from a psychological model , 1986 .

[44]  Vincent Conitzer,et al.  Nonexistence of Voting Rules That Are Usually Hard to Manipulate , 2006, AAAI.

[45]  Vincent Conitzer,et al.  A sufficient condition for voting rules to be frequently manipulable , 2008, EC '08.

[46]  Toby Walsh,et al.  Uncertainty in Preference Elicitation and Aggregation , 2007, AAAI.

[47]  David Austen-Smith,et al.  Positive Political Theory II: Strategy and Structure , 2005 .

[48]  Siddhartha Bandyopadhyay Positive Political Theory II: Strategy and Structure. , 2006 .