1,001 research outputs found
SVVAMP: Simulator of Various Voting Algorithms in Manipulating Populations
We present SVVAMP, a Python package dedicated to the study of voting systems with an emphasis on manipulation analysis. Voters' preferences can be imported from external files or generated by a variety of probabilistic models. SVVAMP currently implements more than 20 voting systems, and its object-oriented design facilitates the implementation of new voting systems. Special attention has been paid to Coalitional Manipulability (CM) and its variants. Algorithms for Condorcet efficiency, Individual Manipulability (IM) and Independence of Irrelevant Alternatives (IIA) are also implemented
An Empirical Study of the Manipulability of Single Transferable Voting
Voting is a simple mechanism to combine together the preferences of multiple
agents. Agents may try to manipulate the result of voting by mis-reporting
their preferences. One barrier that might exist to such manipulation is
computational complexity. In particular, it has been shown that it is NP-hard
to compute how to manipulate a number of different voting rules. However,
NP-hardness only bounds the worst-case complexity. Recent theoretical results
suggest that manipulation may often be easy in practice. In this paper, we
study empirically the manipulability of single transferable voting (STV) to
determine if computational complexity is really a barrier to manipulation. STV
was one of the first voting rules shown to be NP-hard. It also appears one of
the harder voting rules to manipulate. We sample a number of distributions of
votes including uniform and real world elections. In almost every election in
our experiments, it was easy to compute how a single agent could manipulate the
election or to prove that manipulation by a single agent was impossible.Comment: To appear in Proceedings of the 19th European Conference on
Artificial Intelligence (ECAI 2010
Strategy-proof judgment aggregation.
Which rules for aggregating judgments on logically connected propositions are manipulable and which not? In this paper, we introduce a preference-free concept of non-manipulability and contrast it with a preference-theoretic concept of strategy-proofness. We characterize all non-manipulable and all strategy-proof judgment aggregation rules and prove an impossibility theorem similar to the Gibbard--Satterthwaite theorem. We also discuss weaker forms of non-manipulability and strategy-proofness. Comparing two frequently discussed aggregation rules, we show that âconclusion-based votingâ is less vulnerable to manipulation than âpremise-based votingâ, which is strategy-proof only for âreason-orientedâ individuals. Surprisingly, for âoutcome-orientedâ individuals, the two rules are strategically equivalent, generating identical judgments in equilibrium. Our results introduce game-theoretic considerations into judgment aggregation and have implications for debates on deliberative democracy.
Anonymous voting and minimal manipulability
We compare the manipulability of different choice rules by considering the number of manipulable profiles. We establish the minimal number of such profiles for tops-only, anonymous, and surjective choice rules, and show that this number is attained by unanimity rules with status quo.public economics ;
The Pareto Frontier for Random Mechanisms
We study the trade-offs between strategyproofness and other desiderata, such
as efficiency or fairness, that often arise in the design of random ordinal
mechanisms. We use approximate strategyproofness to define manipulability, a
measure to quantify the incentive properties of non-strategyproof mechanisms,
and we introduce the deficit, a measure to quantify the performance of
mechanisms with respect to another desideratum. When this desideratum is
incompatible with strategyproofness, mechanisms that trade off manipulability
and deficit optimally form the Pareto frontier. Our main contribution is a
structural characterization of this Pareto frontier, and we present algorithms
that exploit this structure to compute it. To illustrate its shape, we apply
our results for two different desiderata, namely Plurality and Veto scoring, in
settings with 3 alternatives and up to 18 agents.Comment: Working Pape
On Ehrhart Polynomials and Probability Calculations in Voting Theory
In voting theory, analyzing how frequent is an event (e.g. a voting paradox) is, under some specific but widely used assumptions, equivalent to computing the exact number of integer solutions in a system of linear constraints. Recently, some algorithms for computing this number have been proposed in social choice literature by Huang and Chua [17] and by Gehrlein ([12, 14]). The purpose of this paper is threefold. Firstly, we want to do justice to Eug`ene Ehrhart, who, more than forty years ago, discovered the theoretical foundations of the above mentioned algorithms. Secondly, we present some efficient algorithms that have been recently developed by computer scientists, independently from voting theorists. Thirdly, we illustrate the use of these algorithms by providing some original results in voting theory.voting rules, manipulability, polytopes, lattice points, algorithms.
How many candidates are needed to make elections hard to manipulate?
In multiagent settings where the agents have different preferences,
preference aggregation is a central issue. Voting is a general method for
preference aggregation, but seminal results have shown that all general voting
protocols are manipulable. One could try to avoid manipulation by using voting
protocols where determining a beneficial manipulation is hard computationally.
The complexity of manipulating realistic elections where the number of
candidates is a small constant was recently studied (Conitzer 2002), but the
emphasis was on the question of whether or not a protocol becomes hard to
manipulate for some constant number of candidates. That work, in many cases,
left open the question: How many candidates are needed to make elections hard
to manipulate? This is a crucial question when comparing the relative
manipulability of different voting protocols. In this paper we answer that
question for the voting protocols of the earlier study: plurality, Borda, STV,
Copeland, maximin, regular cup, and randomized cup. We also answer that
question for two voting protocols for which no results on the complexity of
manipulation have been derived before: veto and plurality with runoff. It turns
out that the voting protocols under study become hard to manipulate at 3
candidates, 4 candidates, 7 candidates, or never
- âŚ