Efficient, Private, and eps-Strategyproof Elicitation of Tournament Voting Rules

نویسنده

  • David Timothy Lee
چکیده

Voting is commonly used as a method for aggregating information in crowdsourcing and human computation. In many settings, one would like to use voting rules which can be efficiently elicited, preserve voter privacy, and are robust to strategic manipulation. In this paper, we give algorithms which elicit approximate winners in a way which provably satisfies all three of these requirements simultaneously. Our results hold for tournament voting rules, which we define to be the voting rules which can be expressed solely as a function of the table of pairwise comparisons containing the number of voters preferring one candidate to another1. Tournament voting rules include many common voting rules such as the Borda, Copeland, Maximin, Nanson, Baldwin, Kemeny-Young, Ranked Pairs, Cup, and Schulze voting rules. Our results significantly expand the set of voting rules for which efficient elicitation was known to be possible and improve the known approximation factors for strategyproof voting in the regime where the number of candidates is large.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Can Approximation Circumvent Gibbard-Satterthwaite?

The Gibbard-Satterthwaite Theorem asserts that any reasonable voting rule cannot be strategyproof. A large body of research in AI deals with circumventing this theorem via computational considerations; the goal is to design voting rules that are computationally hard, in the worst-case, to manipulate. However, recent work indicates that the prominent voting rules are usually easy to manipulate. ...

متن کامل

Strategyproof approximations of distance rationalizable voting rules

This paper considers randomized strategyproof approximations to distance rationalizable voting rules. It is shown that the Random Dictator voting rule (return the top choice of a random voter) nontrivially approximates a large class of distances with respect to unanimity. Any randomized voting rule that deviates too greatly from the Random Dictator voting rule is shown to obtain a trivial appro...

متن کامل

Computational Aspects of Multi-Winner Approval Voting

We study computational aspects of three prominent voting rules that use approval ballots to elect multiple winners. These rules are satisfaction approval voting, proportional approval voting, and reweighted approval voting. We first show that computing the winner for proportional approval voting is NP-hard, closing a long standing open problem. As none of the rules are strategyproof, even for d...

متن کامل

Efficient Vote Elicitation under Candidate Uncertainty

Top-k voting is an especially natural form of partial vote elicitation in which only length k prefixes of rankings are elicited. We analyze the ability of top-k vote elicitation to correctly determine true winners, with high probability, given probabilistic models of voter preferences and candidate availability. We provide bounds on the minimal value of k required to determine the correct winne...

متن کامل

The Computational Impact of Partial Votes on Strategic Voting

In many real world elections, agents are not required to rank all candidates. We study three of the most common methods used to modify voting rules to deal with such partial votes. These methods modify scoring rules (like the Borda count), elimination style rules (like single transferable vote) and rules based on the tournament graph (like Copeland) respectively. We argue that with an eliminati...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015