34 research outputs found

    Manipulating Tournaments in Cup and Round Robin Competitions

    Full text link
    In sports competitions, teams can manipulate the result by, for instance, throwing games. We show that we can decide how to manipulate round robin and cup competitions, two of the most popular types of sporting competitions in polynomial time. In addition, we show that finding the minimal number of games that need to be thrown to manipulate the result can also be determined in polynomial time. Finally, we show that there are several different variations of standard cup competitions where manipulation remains polynomial.Comment: Proceedings of Algorithmic Decision Theory, First International Conference, ADT 2009, Venice, Italy, October 20-23, 200

    Combinatorial Voter Control in Elections

    Get PDF
    Voter control problems model situations such as an external agent trying to affect the result of an election by adding voters, for example by convincing some voters to vote who would otherwise not attend the election. Traditionally, voters are added one at a time, with the goal of making a distinguished alternative win by adding a minimum number of voters. In this paper, we initiate the study of combinatorial variants of control by adding voters: In our setting, when we choose to add a voter~vv, we also have to add a whole bundle κ(v)\kappa(v) of voters associated with vv. We study the computational complexity of this problem for two of the most basic voting rules, namely the Plurality rule and the Condorcet rule.Comment: An extended abstract appears in MFCS 201

    Improved Parameterized Algorithms for the Kemeny Aggregation Problem

    Full text link
    We give improvements over fixed parameter tractable (FPT) algo-rithms to solve the Kemeny aggregation problem, where the task is to summarize a multi-set of preference lists, called votes, over a set of alternatives, called candidates, into a single preference list that has the minimum total τ-distance from the votes. The τ-distance between two preference lists is the number of pairs of candidates that are or-dered differently in the two lists. We study the problem for preference lists that are total orders. We develop algorithms of running times O∗(1.403kt), O∗(5.823kt/m) ≤ O∗(5.823kavg) and O∗(4.829kmax) for the problem, ignoring the polynomial factors in the O ∗ notation, where kt is the optimum total τ-distance, m is the number of votes, and kavg (resp, kmax) is the average (resp, maximum) over pairwise τ-distances of votes. Our algorithms improve the best previously known running times of O∗(1.53kt) and O∗(16kavg) ≤ O∗(16kmax) [4, 5], which also implies an O∗(164kt/m) running time. We also show how to enumerate all optimal solutions in O∗(36kt/m) ≤ O∗(36kavg) time.

    On the Introduction of an Agile, Temporary Workforce into a Tandem Queueing System

    Full text link
    We consider a two-station tandem queueing system where customers arrive according to a Poisson process and must receive service at both stations before leaving the system. Neither queue is equipped with dedicated servers. Instead, we consider three scenarios for the fluctuations of workforce level. In the first, a decision-maker can increase and decrease the capacity as is deemed appropriate; the unrestricted case. In the other two cases, workers arrive randomly and can be rejected or allocated to either station. In one case the number of workers can then be reduced (the controlled capacity reduction case). In the other they leave randomly (the uncontrolled capacity reduction case). All servers are capable of working collaboratively on a single job and can work at either station as long as they remain in the system. We show in each scenario that all workers should be allocated to one queue or the other (never split between queues) and that they should serve exhaustively at one of the queues depending on the direction of an inequality. This extends previous studies on flexible systems to the case where the capacity varies over time. We then show in the unrestricted case that the optimal number of workers to have in the system is non-decreasing in the number of customers in either queue.Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/47647/1/11134_2005_Article_2441.pd

    Fixed-Parameter Algorithms in Analysis of Heuristics for Extracting Networks in Linear Programs

    Full text link
    We consider the problem of extracting a maximum-size reflected network in a linear program. This problem has been studied before and a state-of-the-art SGA heuristic with two variations have been proposed. In this paper we apply a new approach to evaluate the quality of SGA\@. In particular, we solve majority of the instances in the testbed to optimality using a new fixed-parameter algorithm, i.e., an algorithm whose runtime is polynomial in the input size but exponential in terms of an additional parameter associated with the given problem. This analysis allows us to conclude that the the existing SGA heuristic, in fact, produces solutions of a very high quality and often reaches the optimal objective values. However, SGA contain two components which leave some space for improvement: building of a spanning tree and searching for an independent set in a graph. In the hope of obtaining even better heuristic, we tried to replace both of these components with some equivalent algorithms. We tried to use a fixed-parameter algorithm instead of a greedy one for searching of an independent set. But even the exact solution of this subproblem improved the whole heuristic insignificantly. Hence, the crucial part of SGA is building of a spanning tree. We tried three different algorithms, and it appears that the Depth-First search is clearly superior to the other ones in building of the spanning tree for SGA. Thereby, by application of fixed-parameter algorithms, we managed to check that the existing SGA heuristic is of a high quality and selected the component which required an improvement. This allowed us to intensify the research in a proper direction which yielded a superior variation of SGA

    Hybrid Voting Protocols and Hardness of Manipulation

    No full text

    Relation Algebra and RelView Applied to Approval Voting

    No full text
    corecore