The shield that never was: societies with single-peaked preferences are more open to manipulation and control
暂无分享,去创建一个
Piotr Faliszewski | Jörg Rothe | Edith Hemaspaandra | Lane A. Hemaspaandra | L. A. Hemaspaandra | P. Faliszewski | J. Rothe | E. Hemaspaandra | L. Hemaspaandra
[1] M. Trick,et al. The computational difficulty of manipulating an election , 1989 .
[2] Edith Hemaspaandra,et al. Bypassing Combinatorial Protections: Polynomial-Time Algorithms for Single-Peaked Electorates , 2010, AAAI.
[3] Jean-Claude Falmagne,et al. A Polynomial Time Algorithm for Unidimensional Unfolding Representations , 1994, J. Algorithms.
[4] Vincent Conitzer. Eliciting single-peaked preferences using comparison queries , 2007, AAMAS '07.
[5] Guillaume Haeringer,et al. A characterization of the single-peaked domain , 2011, Soc. Choice Welf..
[6] Piotr Faliszewski,et al. Llull and Copeland Voting Broadly Resist Bribery and Control , 2007, AAAI.
[7] Eric Horvitz,et al. Social Choice Theory and Recommender Systems: Analysis of the Axiomatic Foundations of Collaborative Filtering , 2000, AAAI/IAAI.
[8] John R. Wright,et al. Voting cycles and the structure of individual preferences , 1987 .
[9] Jörg Rothe,et al. Anyone but him: The complexity of precluding an alternative , 2005, Artif. Intell..
[10] D. Black. On the Rationale of Group Decision-making , 1948, Journal of Political Economy.
[11] K. T. Poole,et al. Congress: A Political-Economic History of Roll Call Voting , 1997 .
[12] N. Schofield,et al. The Political Economy of Democracy , 2009 .
[13] Piotr Faliszewski,et al. How Hard Is Bribery in Elections? , 2006, J. Artif. Intell. Res..
[14] Michael A. Trick,et al. How hard is it to control an election? Math , 1992 .
[15] Keith Krehbiel,et al. Pivotal Politics: A Theory of U.S. Lawmaking , 1998 .
[16] Ariel D. Procaccia,et al. Junta distributions and the average-case complexity of manipulating elections , 2006, AAMAS '06.
[17] Piotr Faliszewski,et al. The shield that never was: Societies with single-peaked preferences are more open to manipulation and control , 2011, Inf. Comput..
[18] Kellogg S. Booth,et al. Testing for the Consecutive Ones Property, Interval Graphs, and Graph Planarity Using PQ-Tree Algorithms , 1976, J. Comput. Syst. Sci..
[19] John J. Bartholdi,et al. Single transferable vote resists strategic voting , 2015 .
[20] M. Hinich,et al. An Expository Development of a Mathematical Model of the Electoral Process , 1970, American Political Science Review.
[21] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[22] Salvador Barberà,et al. An introduction to strategy-proof social choice functions , 2001, Soc. Choice Welf..
[23] D. R. Fulkerson,et al. Incidence matrices and interval graphs , 1965 .
[24] E. Schickler. Pivotal Politics: A Theory of U.S. Lawmaking . By Keith Krehbiel. Chicago and London: University of Chicago Press, 1998. 258p. $50.00 cloth, $17.00 paper. , 2000 .
[25] Vincent Conitzer,et al. Generalized scoring rules and the frequency of coalitional manipulability , 2008, EC '08.
[26] Jörg Rothe,et al. Sincere‐Strategy Preference‐Based Approval Voting Fully Resists Constructive Control and Broadly Resists Destructive Control , 2008, Math. Log. Q..
[27] Jérôme Lang,et al. Single-peaked consistency and its complexity , 2008, ECAI.
[28] Edith Hemaspaandra,et al. Dichotomy for voting systems , 2005, J. Comput. Syst. Sci..
[29] G. Thompson,et al. The Theory of Committees and Elections. , 1959 .
[30] Piotr Faliszewski,et al. The Complexity of Bribery in Elections , 2006, AAAI.
[31] L. A. Hemaspaandra,et al. Computational Aspects of Approval Voting , 2010 .
[32] D. Lepelley. Constant scoring rules, condorcet criteria and single-peaked preferences , 1996 .
[33] Eithan Ephrati,et al. The Clarke Tax as a Consensus Mechanism Among Automated Agents , 1991, AAAI.
[34] Jörg Rothe,et al. Hybrid Elections Broaden Complexity‐Theoretic Resistance to Control , 2006, IJCAI.
[35] Piotr Faliszewski,et al. Approximability of Manipulating Elections , 2008, AAAI.
[36] B. Peleg,et al. Single-peakedness and coalition-proofness , 1999 .
[37] Vincent Conitzer,et al. When are elections with few candidates hard to manipulate? , 2007, J. ACM.
[38] Noam Nisan,et al. Elections Can be Manipulated Often , 2008, 2008 49th Annual IEEE Symposium on Foundations of Computer Science.
[39] John W. Patty,et al. Arrow ’ s Theorem on Single-Peaked Domains , 2008 .
[40] Michael A. Trick,et al. Recognizing single-peaked preferences on a tree , 1989 .
[41] Piotr Faliszewski,et al. Llull and Copeland Voting Computationally Resist Bribery and Constructive Control , 2009, J. Artif. Intell. Res..
[42] Eithan Ephrati,et al. A heuristic technique for multi‐agent planning , 1997, Annals of Mathematics and Artificial Intelligence.
[43] Michael A. Trick,et al. Stable matching with preferences derived from a psychological model , 1986 .
[44] Vincent Conitzer,et al. Nonexistence of Voting Rules That Are Usually Hard to Manipulate , 2006, AAAI.
[45] Vincent Conitzer,et al. A sufficient condition for voting rules to be frequently manipulable , 2008, EC '08.
[46] Toby Walsh,et al. Uncertainty in Preference Elicitation and Aggregation , 2007, AAAI.
[47] David Austen-Smith,et al. Positive Political Theory II: Strategy and Structure , 2005 .
[48] Siddhartha Bandyopadhyay. Positive Political Theory II: Strategy and Structure. , 2006 .