暂无分享,去创建一个
Piotr Faliszewski | Edith Hemaspaandra | Lane A. Hemaspaandra | L. A. Hemaspaandra | P. Faliszewski | E. Hemaspaandra | L. Hemaspaandra | Piotr Faliszewski
[1] David Eppstein,et al. Simultaneous strong separations of probabilistic and unambiguous complexity classes , 1992, Mathematical systems theory.
[2] Piotr Faliszewski,et al. Using complexity to protect elections , 2010, Commun. ACM.
[3] Hong Liu,et al. Parameterized complexity of control problems in Maximin election , 2010, Inf. Process. Lett..
[4] Yoav Shoham,et al. Multiagent Systems - Algorithmic, Game-Theoretic, and Logical Foundations , 2009 .
[5] Lane A. Hemaspaandra,et al. Lower bounds and the hardness of counting properties , 2004, Theor. Comput. Sci..
[6] Kenneth Kunen,et al. On the Structure and Complexity of Infinite Sets with Minimal Perfect Hash Functions , 1991, FSTTCS.
[7] Lane A. Hemaspaandra,et al. Guarantees for the success frequency of an algorithm for finding Dodgson-election winners , 2009, J. Heuristics.
[8] Mohammed J. Zaki,et al. The Complexity of Finding Top-Toda-Equivalence-Class Members , 2004, Theory of Computing Systems.
[9] Lane A. Hemaspaandra,et al. A Note on Linear-Nondeterminism, Linear-Sized, Karp-Lipton Advice for the P-Selective Sets , 1998, J. Univers. Comput. Sci..
[10] Noam Nisan,et al. Elections Can be Manipulated Often , 2008, 2008 49th Annual IEEE Symposium on Foundations of Computer Science.
[11] Lane A. Hemaspaandra. Teaching Computational Complexity: Resources to Treasure , 1994, SIGA.
[12] Piotr Faliszewski,et al. The shield that never was: societies with single-peaked preferences are more open to manipulation and control , 2009, TARK '09.
[13] Lane A. Hemachandra. Algorithms from complexity theory: polynomial-time operations for complex sets , 1990 .
[14] Rüdiger Reischuk,et al. Proceedings of the 14th Annual Symposium on Theoretical Aspects of Computer Science , 1996 .
[15] Lane A. Hemaspaandra,et al. Rice-Style Theorems for Complexity Theory , 2001 .
[16] Rolf Niedermeier,et al. Invitation to Fixed-Parameter Algorithms , 2006 .
[17] Paul G. Spirakis,et al. Proceedings of the 28th International Colloquium on Automata, Languages and Programming, , 2001 .
[18] Piotr Faliszewski,et al. Llull and Copeland Voting Computationally Resist Bribery and Constructive Control , 2009, J. Artif. Intell. Res..
[19] Costas S. Iliopoulos,et al. Symposium on Theoretical Aspects of Computer Science , 2008 .
[20] Ariel D. Procaccia,et al. Socially desirable approximations for Dodgson's voting rule , 2010, EC '10.
[21] Lane A. Hemaspaandra,et al. On Sets with Efficient Implicit Membership Tests , 1991, SIAM J. Comput..
[22] Jörg Rothe,et al. Powers-of-Two Acceptance Suffices for Equivalence and Bounded Ambiguity Problems , 1996, Electron. Colloquium Comput. Complex..
[23] Lane A. Hemaspaandra,et al. Guarantees for the success frequency of an algorithm for finding Dodgson-election winners , 2005, J. Heuristics.
[24] Mogens Nielsen,et al. Proceedings of the 25th International Symposium on Mathematical Foundations of Computer Science , 2000 .
[25] Piotr Faliszewski,et al. The complexity of manipulative attacks in nearly single-peaked electorates , 2011, TARK XIII.
[26] Jörg Rothe,et al. A second step towards complexity-theoretic analogs of Rice's Theorem , 2000, Theor. Comput. Sci..
[27] D. Wallace,et al. Some Properties of a Probabilistic Model for Global Wiring , 1981, 18th Design Automation Conference.
[28] Yann Chevaleyre,et al. Possible Winners when New Candidates Are Added: The Case of Scoring Rules , 2010, AAAI.
[29] Juris Hartmanis,et al. On Sparse Oracles Separating Feasible Complexity Classes , 1988, Inf. Process. Lett..
[30] Jörg Rothe,et al. Hybrid Elections Broaden Complexity‐Theoretic Resistance to Control , 2006, IJCAI.
[31] Giorgio Ausiello,et al. Proceedings of the 16th International Colloquium on Automata, Languages and Programming , 1989 .
[32] Lane A. Hemaspaandra,et al. Optimal Series-Parallel Trade-offs for Reducing a Function to Its Own Graph , 2002, Inf. Comput..
[33] Piotr Faliszewski,et al. Open questions in the theory of semifeasible computation , 2006, SIGA.
[34] Lane A. Hemaspaandra,et al. Optimal Separations for Parallel versus Sequential Self-Checking: Parallelism Can Exponentially Incr , 1998 .
[35] Cristian S. Calude,et al. Journal of Universal Computer Science , 1994, J. Univers. Comput. Sci..
[36] M. Trick,et al. Voting schemes for which it can be difficult to tell who won the election , 1989 .
[37] Piotr Faliszewski,et al. Copeland voting: ties matter , 2008, AAMAS.
[38] Rolf Niedermeier,et al. A logic for causal reasoning , 2003, IJCAI 2003.
[39] Jörg Rothe,et al. Creating Strong, Total, Commutative, Associative One-Way Functions from Any One-Way Function in Complexity Theory , 1999, J. Comput. Syst. Sci..
[40] Jörg Rothe,et al. Exact analysis of Dodgson elections: Lewis Carroll's 1876 voting system is complete for parallel access to NP , 1997, JACM.
[41] Lane A. Hemaspaandra,et al. SIGACT news complexity theory column 61 , 2008, SIGA.
[42] Piotr Faliszewski,et al. The Complexity of Bribery in Elections , 2006, AAAI.
[43] Nadja Betzler,et al. Parameterized complexity of candidate control in elections and related digraph problems , 2008, Theor. Comput. Sci..
[44] Piotr Faliszewski,et al. How Hard Is Bribery in Elections? , 2006, J. Artif. Intell. Res..
[45] Ildikó Schlotter,et al. Multivariate Complexity Analysis of Swap Bribery , 2010, Algorithmica.
[46] Friedrich Pukelsheim,et al. The electoral writings of Ramon Llull , 2001 .
[47] Sanjay Jain,et al. On the Limitations of Locally Robust Positive Reductions , 1989, FSTTCS.
[48] Russell Bent,et al. On Bounded-Weight Error-Correcting Codes , 1999, ArXiv.
[49] Jörg Rothe,et al. On Approximating Optimal Weighted Lobbying, and Frequency of Correctness Versus Average-Case Polynomial Time , 2007, FCT.
[50] Patrice Enjalbert,et al. Proceedings of the 11th Annual Symposium on Theoretical Aspects of Computer Science , 1994 .
[51] Michael A. Trick,et al. How hard is it to control an election? Math , 1992 .
[52] L. A. Hemaspaandra,et al. Computational Aspects of Approval Voting , 2010 .
[53] Heribert Vollmer,et al. The satanic notations , 1995, SIGACT News.
[54] Jin-Yi Cai,et al. On the Power of Parity Polynomial Time , 1989, STACS.
[55] Gabriel Ciobanu,et al. Proceedings of the 12th International Symposium on Fundamentals of Computation Theory , 1999 .
[56] Piotr Faliszewski,et al. Llull and Copeland Voting Broadly Resist Bribery and Control , 2007, AAAI.
[57] Ariel D. Procaccia,et al. Complexity of Strategic Behavior in Multi-Winner Elections , 2008, J. Artif. Intell. Res..
[58] Ariel D. Procaccia,et al. Junta distributions and the average-case complexity of manipulating elections , 2006, AAMAS '06.
[59] Edith Hemaspaandra,et al. The complexity of Kemeny elections , 2005, Theor. Comput. Sci..
[60] Lane A. Hemaspaandra,et al. Space-efficient recognition of sparse self-reducible languages , 2005, computational complexity.
[61] Lane A. Hemaspaandra,et al. A note on relativizing complexity classes with tally , 1990, Proceedings Fifth Annual Structure in Complexity Theory Conference.
[62] Jörg Rothe,et al. One-way functions in worst-case cryptography: algebraic and security properties are on the house , 1999, SIGA.
[63] S. Shapiro,et al. Mathematics without Numbers , 1993 .
[64] Gábor Erdélyi,et al. Control Complexity in Fallback Voting , 2010, CATS.
[65] Vincent Conitzer,et al. Generalized scoring rules and the frequency of coalitional manipulability , 2008, EC '08.
[66] Hong Liu,et al. Parameterized computational complexity of control problems in voting systems , 2009, Theor. Comput. Sci..
[67] Edith Hemaspaandra,et al. Query Order in the Polynomial Hierarchy , 1997, FCT.
[68] Vincent Conitzer,et al. A sufficient condition for voting rules to be frequently manipulable , 2008, EC '08.
[69] Jörg Rothe,et al. Unambiguous Computation: Boolean Hierarchies and Sparse Turing-Complete Sets , 1997, SIAM J. Comput..
[70] Uwe Schöning,et al. Complete sets and closeness to complexity classes , 1986, Mathematical systems theory.
[71] Geoffrey Pritchard,et al. Approximability of Dodgson’s rule , 2008, Soc. Choice Welf..
[72] Jörg Rothe,et al. Sincere‐Strategy Preference‐Based Approval Voting Fully Resists Constructive Control and Broadly Resists Destructive Control , 2008, Math. Log. Q..
[73] Pierpaolo Degano,et al. Proceedings of 6th Italian Conference on Theoretical Computer Science , 1998 .
[74] J. van Leeuwen,et al. Theoretical Computer Science , 2003, Lecture Notes in Computer Science.
[75] D. Black. The theory of committees and elections , 1959 .
[76] Edith Hemaspaandra,et al. RSN1-tt(NP) Distinguishes Robust Many-One and Turing Completeness , 1998, Theory of Computing Systems.
[77] Rolf Niedermeier,et al. Parameterized computational complexity of Dodgson and Young elections , 2010, Inf. Comput..
[78] Edith Hemaspaandra,et al. Dichotomy for voting systems , 2005, J. Comput. Syst. Sci..
[79] Jörg Rothe,et al. Bucklin Voting is Broadly Resistant to Control , 2010, ArXiv.
[80] Nadja Betzler,et al. Towards a Dichotomy of Finding Possible Winners in Elections Based on Scoring Rules , 2009, MFCS.
[81] Rusins Freivalds. Proceedings of the 13th International Symposium on Fundamentals of Computation Theory , 2001 .
[82] Guy Kindler,et al. The Geometry of Manipulation: A Quantitative Proof of the Gibbard-Satterthwaite Theorem , 2010, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.
[83] Juris Hartmanis,et al. One-Way Functions and the Nonisomorphism of NP-Complete Sets , 1991, Theor. Comput. Sci..
[84] Ariel D. Procaccia,et al. Complexity of unweighted coalitional manipulation under some common voting rules , 2009, IJCAI 2009.
[85] Lane A. Hemaspaandra,et al. Computation with Absolutely No Space Overhead , 2003, Developments in Language Theory.
[86] Lane A. Hemaspaandra,et al. P-immune sets with holes lack self-reducibility properties , 2003, Theor. Comput. Sci..
[87] Piotr Faliszewski,et al. Manipulation of copeland elections , 2010, AAMAS.
[88] Poland ÃLódź,et al. International Journal of Foundations of Computer Science c ○ World Scientific Publishing Company EFFICIENT ALGORITHMS FOR (δ, γ, α) AND , 2008 .
[89] Jörg Rothe,et al. Enforcing and Defying Associativity, Commutativity, Totality, and Strong Noninvertibility for One-Way Functions in Complexity Theory , 2005, ICTCS.
[90] Lane A. Hemaspaandra,et al. A moment of perfect clarity I: the parallel census technique , 2000, SIGA.
[91] Lane A. Hemaspaandra,et al. Almost-Everywhere Superiority for Quantum Polynomial-Time Languages , 2002 .
[92] L. Hemachandra,et al. On Relativization and the Existence of Turing Complete Sets , 1989 .
[93] Juris Hartmanis,et al. Complexity Classes without Machines: On Complete Languages for UP , 1986, Theor. Comput. Sci..
[94] John J. Bartholdi,et al. Single transferable vote resists strategic voting , 2015 .
[95] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[96] Kenneth H. Rosen. Handbook of Discrete and Combinatorial Mathematics, Second Edition , 2010 .
[97] Piotr Faliszewski,et al. On distance rationalizability of some voting rules , 2009, TARK '09.
[98] Felix Brandt,et al. Some Remarks on Dodgson's Voting Rule , 2009, Math. Log. Q..
[99] Piotr Faliszewski,et al. Cloning in Elections , 2010, AAAI.
[100] Edith Hemaspaandra,et al. Extending Downward Collapse from 1-versus-2 Queries to j-versus-j+1 Queries , 1999, STACS.
[101] Vincent Conitzer,et al. When are elections with few candidates hard to manipulate? , 2007, J. ACM.
[102] Thomas Lengauer,et al. Proceedings of the 7th Annual Symposium on Theoretical Aspects of Computer Science , 1990 .
[103] Piotr Faliszewski,et al. Advice for semifeasible sets and the complexity-theoretic cost(lessness) of algebraic properties , 2004, Int. J. Found. Comput. Sci..
[104] Howard Straubing,et al. Theory of Computing Systems , 2008 .
[105] Lane A. Hemaspaandra. Structure of Complexity Classes: Separations, Collapses, and Completeness , 1988, International Symposium on Mathematical Foundations of Computer Science.
[106] Edith Hemaspaandra,et al. Bypassing Combinatorial Protections: Polynomial-Time Algorithms for Single-Peaked Electorates , 2010, AAAI.
[107] Piotr Faliszewski,et al. Copeland Voting Fully Resists Constructive Control , 2007, AAIM.
[108] Jin-Yi Cai,et al. Exact Counting is as Easy as Approximate Counting , 1986 .
[109] Lane A. Hemaspaandra,et al. On Checking Versus Evaluation of Multiple Queries , 1990, Inf. Comput..
[110] M. Trick,et al. The computational difficulty of manipulating an election , 1989 .
[111] Juris Hartmanis,et al. On the Structure of Solutions of Computable Real Functions , 1988 .
[112] Lane A. Hemaspaandra,et al. Separating Complexity Classes With Tally Oracles , 1992, Theor. Comput. Sci..
[113] H. Young,et al. A Consistent Extension of Condorcet’s Election Principle , 1978 .
[114] Ariel D. Procaccia,et al. Frequent Manipulability of Elections: The Case of Two Voters , 2008, WINE.
[115] Werner Kuich,et al. Proceedings of the 19th International Colloquium on Automata, Languages and Programming , 1992 .
[116] Hannu Nurmi,et al. Closeness Counts in Social Choice , 2008 .
[117] Edith Hemaspaandra,et al. Almost-Everywhere Superiority for Quantum Polynomial Time , 2002, Inf. Comput..
[118] Lane A. Hemaspaandra,et al. Using Inductive Counting to Simulate Nondeterministic Computation , 1990, MFCS.
[119] Ding-Zhu Du,et al. Proceedings of the 5th International Symposium on Algorithms and Computation , 1994 .
[120] Vincent Conitzer,et al. Nonexistence of Voting Rules That Are Usually Hard to Manipulate , 2006, AAAI.
[121] Dan Suciu,et al. Journal of the ACM , 2006 .
[122] Piotr Faliszewski,et al. On the role of distances in defining voting rules , 2010, AAMAS.
[123] Edith Hemaspaandra,et al. What's up with downward collapse: using the easy-hard technique to link Boolean and polynomial hierarchy collapses , 1998, SIGA.
[124] Hendrik W. Lenstra,et al. Integer Programming with a Fixed Number of Variables , 1983, Math. Oper. Res..
[125] Andrzej Lingas,et al. Proceedings of the 20th International Colloquium on Automata, Languages and Programming , 1993 .
[126] Jörg Rothe,et al. A Second Step Towards Circuit Complexity-Theoretic Analogs of Rice's Theorem , 1998, MFCS.
[127] Rudolf Fleischer,et al. Proceedings of the 4th international conference on Algorithmic Aspects in Information and Management , 2008 .
[128] Ian McLean,et al. Voting in the Medieval Papacy and Religious Orders , 2007, MDAI.
[129] Jörg Rothe,et al. Anyone but him: The complexity of precluding an alternative , 2005, Artif. Intell..
[130] Jin-Yi Cai,et al. Promise Problems and Access to Unambiguous Computation , 1992, MFCS.
[131] Lane A. Hemaspaandra,et al. Algebraic Properties for Selector Functions , 2004, SIAM J. Comput..
[132] Lane A. Hemaspaandra,et al. Reductions to Sets of Low Information Content , 1992, Complexity Theory: Current Research.
[133] Edith Hemaspaandra,et al. Using the No-Search Easy-Hard Technique for Downward Collapse , 2001, ArXiv.
[134] Christian Glaßer,et al. A moment of perfect clarity II: consequences of sparse sets hard for NP with respect to weak reductions , 2000, SIGA.
[135] Jörg Rothe,et al. Sincere-Strategy Preference-Based Approval Voting Broadly Resists Control , 2008, MFCS.
[136] Piotr Faliszewski,et al. Good Rationalizations of Voting Rules , 2010, AAAI.
[137] Manfred J. Holler,et al. Power, freedom, and voting , 2008 .
[138] Kam-Wing Ng,et al. Proceedings of the 4th International Symposium on Algorithms and Computation , 1993 .
[139] Ariel D. Procaccia,et al. Algorithms for the coalitional manipulation problem , 2008, SODA '08.
[140] Arnold B. Urken,et al. Classics of social choice , 1995 .
[141] Lane A. Hemaspaandra,et al. Witness-Isomorphic Reductions and the Local Search Problem (Extended Abstract) , 1995, MFCS.
[142] Lane A. Hemaspaandra,et al. Complexity-Theoretic Analogs of Rice''s Theorem , 1997 .
[143] Lane A. Hemaspaandra,et al. Computing Solutions Uniquely Collapses the Polynomial Hierarchy , 1994, SIAM J. Comput..
[144] Donald G. Saari,et al. A geometric examination of Kemeny's rule , 2000, Soc. Choice Welf..
[145] Salil P. Vadhan,et al. Computational Complexity , 2005, Encyclopedia of Cryptography and Security.
[146] Tibor Gyimóthy,et al. Proceedings of the 37th international conference on Current trends in theory and practice of computer science , 2011 .
[147] Lane A. Hemaspaandra,et al. Reducing the Number of Solutions of NP Functions , 2002, J. Comput. Syst. Sci..