Copeland Voting Fully Resists Constructive Control

نویسندگان

  • Piotr Faliszewski
  • Edith Hemaspaandra
  • Lane A. Hemaspaandra
  • Jörg Rothe
چکیده

Control and bribery are settings in which an external agent seeks to influence the outcome of an election. Faliszewski et al. [7] proved that Llull voting (which is here denoted by Copeland) and a variant (here denoted by Copeland) of Copeland voting are computationally resistant to many, yet not all, types of constructive control and that they also provide broad resistance to bribery. We study a parameterized version of Copeland voting, denoted by Copelandα, where the parameter α is a rational number between 0 and 1 that specifies how ties are valued in the pairwise comparisons of candidates in Copeland elections. We establish resistance or vulnerability results, in every previously studied control scenario, for Copelandα for each rational α, 0 < α < 1. In particular, we prove that Copeland, the system commonly referred to as “Copeland voting,” provides full resistance to constructive control. Among the systems with a polynomial-time winner problem, this is the first natural election system proven to have full resistance to constructive control. Results on bribery and fixed-parameter tractability of bounded-case control proven for Copeland and Copeland in [7] are extended to Copelandα for each rational α, 0 < α < 1; we also give results in more flexible models such as microbribery and extended control.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Sincere-Strategy Preference-Based Approval Voting Fully Resists Constructive Control and Broadly Resists Destructive Control

We study sincere-strategy preference-based approval voting (SP-AV), a system proposed by Brams and Sanver [1] and here adjusted so as to coerce admissibility of the votes (rather than excluding inadmissible votes a priori), with respect to procedural control. In such control scenarios, an external agent seeks to change the outcome of an election via actions such as adding/deleting/partitioning ...

متن کامل

ar X iv : 0 71 1 . 47 59 v 1 [ cs . G T ] 2 9 N ov 2 00 7 Copeland Voting Fully

Control and bribery are settings in which an external agent seeks to influence the outcome of an election. Faliszewski et al. [7] proved that Llull voting (which is here denoted by Copeland) and a variant (here denoted by Copeland) of Copeland voting are computationally resistant to many, yet not all, types of constructive control and that they also provide broad resistance to bribery. We study...

متن کامل

Control Complexity in Fallback Voting

We study the control complexity of fallback voting. Like manipulation and bribery, electoral control describes ways of changing the outcome of an election; unlike manipulation or bribery attempts, control actions—such as adding/deleting/partitioning either candidates or voters— modify the participative structure of an election. Via such actions one can try to either make a favorite candidate wi...

متن کامل

Llull and Copeland Voting Computationally Resist Bribery and Constructive Control

Control and bribery are settings in which an external agent seeks to influence the outcome of an election. Constructive control of elections refers to attempts by an agent to, via such actions as addition/deletion/partition of candidates or voters, ensure that a given candidate wins. Destructive control refers to attempts by an agent to, via the same actions, preclude a given candidate’s victor...

متن کامل

Controlling elections with bounded single-peaked width

The problems of controlling an election have been shown NP-complete in general but polynomial-time solvable in single-peaked elections for many voting correspondences. To explore the complexity border, we consider these control problems by adding/deleting votes in elections with bounded single-peaked width k. Single-peaked elections have singlepeaked width k = 1. We prove that the constructive ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008