1,001 research outputs found

    SVVAMP: Simulator of Various Voting Algorithms in Manipulating Populations

    Get PDF
    We present SVVAMP, a Python package dedicated to the study of voting systems with an emphasis on manipulation analysis. Voters' preferences can be imported from external files or generated by a variety of probabilistic models. SVVAMP currently implements more than 20 voting systems, and its object-oriented design facilitates the implementation of new voting systems. Special attention has been paid to Coalitional Manipulability (CM) and its variants. Algorithms for Condorcet efficiency, Individual Manipulability (IM) and Independence of Irrelevant Alternatives (IIA) are also implemented

    An Empirical Study of the Manipulability of Single Transferable Voting

    Full text link
    Voting is a simple mechanism to combine together the preferences of multiple agents. Agents may try to manipulate the result of voting by mis-reporting their preferences. One barrier that might exist to such manipulation is computational complexity. In particular, it has been shown that it is NP-hard to compute how to manipulate a number of different voting rules. However, NP-hardness only bounds the worst-case complexity. Recent theoretical results suggest that manipulation may often be easy in practice. In this paper, we study empirically the manipulability of single transferable voting (STV) to determine if computational complexity is really a barrier to manipulation. STV was one of the first voting rules shown to be NP-hard. It also appears one of the harder voting rules to manipulate. We sample a number of distributions of votes including uniform and real world elections. In almost every election in our experiments, it was easy to compute how a single agent could manipulate the election or to prove that manipulation by a single agent was impossible.Comment: To appear in Proceedings of the 19th European Conference on Artificial Intelligence (ECAI 2010

    Strategy-proof judgment aggregation.

    Get PDF
    Which rules for aggregating judgments on logically connected propositions are manipulable and which not? In this paper, we introduce a preference-free concept of non-manipulability and contrast it with a preference-theoretic concept of strategy-proofness. We characterize all non-manipulable and all strategy-proof judgment aggregation rules and prove an impossibility theorem similar to the Gibbard--Satterthwaite theorem. We also discuss weaker forms of non-manipulability and strategy-proofness. Comparing two frequently discussed aggregation rules, we show that “conclusion-based voting” is less vulnerable to manipulation than “premise-based voting”, which is strategy-proof only for “reason-oriented” individuals. Surprisingly, for “outcome-oriented” individuals, the two rules are strategically equivalent, generating identical judgments in equilibrium. Our results introduce game-theoretic considerations into judgment aggregation and have implications for debates on deliberative democracy.

    Anonymous voting and minimal manipulability

    Get PDF
    We compare the manipulability of different choice rules by considering the number of manipulable profiles. We establish the minimal number of such profiles for tops-only, anonymous, and surjective choice rules, and show that this number is attained by unanimity rules with status quo.public economics ;

    The Pareto Frontier for Random Mechanisms

    Full text link
    We study the trade-offs between strategyproofness and other desiderata, such as efficiency or fairness, that often arise in the design of random ordinal mechanisms. We use approximate strategyproofness to define manipulability, a measure to quantify the incentive properties of non-strategyproof mechanisms, and we introduce the deficit, a measure to quantify the performance of mechanisms with respect to another desideratum. When this desideratum is incompatible with strategyproofness, mechanisms that trade off manipulability and deficit optimally form the Pareto frontier. Our main contribution is a structural characterization of this Pareto frontier, and we present algorithms that exploit this structure to compute it. To illustrate its shape, we apply our results for two different desiderata, namely Plurality and Veto scoring, in settings with 3 alternatives and up to 18 agents.Comment: Working Pape

    On Ehrhart Polynomials and Probability Calculations in Voting Theory

    Get PDF
    In voting theory, analyzing how frequent is an event (e.g. a voting paradox) is, under some specific but widely used assumptions, equivalent to computing the exact number of integer solutions in a system of linear constraints. Recently, some algorithms for computing this number have been proposed in social choice literature by Huang and Chua [17] and by Gehrlein ([12, 14]). The purpose of this paper is threefold. Firstly, we want to do justice to Eug`ene Ehrhart, who, more than forty years ago, discovered the theoretical foundations of the above mentioned algorithms. Secondly, we present some efficient algorithms that have been recently developed by computer scientists, independently from voting theorists. Thirdly, we illustrate the use of these algorithms by providing some original results in voting theory.voting rules, manipulability, polytopes, lattice points, algorithms.

    How many candidates are needed to make elections hard to manipulate?

    Full text link
    In multiagent settings where the agents have different preferences, preference aggregation is a central issue. Voting is a general method for preference aggregation, but seminal results have shown that all general voting protocols are manipulable. One could try to avoid manipulation by using voting protocols where determining a beneficial manipulation is hard computationally. The complexity of manipulating realistic elections where the number of candidates is a small constant was recently studied (Conitzer 2002), but the emphasis was on the question of whether or not a protocol becomes hard to manipulate for some constant number of candidates. That work, in many cases, left open the question: How many candidates are needed to make elections hard to manipulate? This is a crucial question when comparing the relative manipulability of different voting protocols. In this paper we answer that question for the voting protocols of the earlier study: plurality, Borda, STV, Copeland, maximin, regular cup, and randomized cup. We also answer that question for two voting protocols for which no results on the complexity of manipulation have been derived before: veto and plurality with runoff. It turns out that the voting protocols under study become hard to manipulate at 3 candidates, 4 candidates, 7 candidates, or never
    • …
    corecore