Compilation Complexity of Common Voting Rules

Size: px
Start display at page:

Download "Compilation Complexity of Common Voting Rules"

Transcription

1 Compilation Complexity of Common Voting Rules Lirong Xia Department of Computer Science Duke University Durham, NC 27708, USA Vincent Conitzer Department of Computer Science Duke University Durham, NC 27708, USA Abstract In computational social choice, one important problem is to take the votes of a subelectorate (subset of the voters), and summarize them using a small number of bits. This needs to be done in such a way that, if all that we know is the summary, as well as the votes of voters outside the subelectorate, we can conclude which of the m alternatives wins. This corresponds to the notion of compilation complexity, the minimum number of bits required to summarize the votes for a particular rule, which was introduced by Chevaleyre et al. [IJCAI-09]. We study three different types of compilation complexity. The first, studied by Chevaleyre et al., depends on the size of the subelectorate but not on the size of the complement (the voters outside the subelectorate). The second depends on the size of the complement but not on the size of the subelectorate. The third depends on both. We first investigate the relations among the three types of compilation complexity. Then, we give upper and lower bounds on all three types of compilation complexity for the most prominent voting rules. We show that for l-approval (when l m/2), Borda, and Bucklin, the bounds for all three types are asymptotically tight, up to a multiplicative constant; for l-approval (when l > m/2), plurality with runoff, all Condorcet consistent rules that are based on unweighted majority graphs (including Copeland and voting trees), and all Condorcet consistent rules that are based on the order of pairwise elections (including ranked pairs and maximin), the bounds for all three types are asymptotically tight up to a multiplicative constant when the sizes of the subelectorate and its complement are both larger than m 1+ǫ for some ǫ > 0. Introduction In multiagent systems, often the agents want to make a joint decision, despite the fact that they have different preferences over the m alternatives. A natural way to do this is by voting over the alternatives. In a typical voting setting, the voters (agents) first report their (ordinal) preferences simultaneously. Then, a voting rule is applied to choose the winning We thank Yann Chevaleyre, Jérôme Lang, Nicolas Maudet, and anonymous AAAI reviewers for helpful comments. Lirong Xia is supported by a James B. Duke Fellowship and Vincent Conitzer is supported by an Alfred P. Sloan Research Fellowship. We also thank NSF for support under award numbers IIS and CA- REER Copyright c 2011, Association for the Advancement of Artificial Intelligence ( All rights reserved. alternative. However, the assumption that the voters report their votes simultaneously is often violated in real-life: usually, there is some period for voting, and each agent can cast her vote anywhere in this period (but only once). In this case, it can be practical to concisely summarize (compile) the votes that have arrived so far. This has a potential privacy benefit: in principle, the detailed information of exactly which voter cast which vote can be thrown away, so that there is less risk that an outside party finds out how a particular voter voted. 1 As we will see, this approach in some cases also allows the winner to be announced much faster after the last vote arrives, compared to the case where we do not do any computation until the very end. There are additional benefits to compiling the votes of a subelectorate. For example, suppose that votes are collected in multiple locations. Rather than bringing all the votes (whether in physical or digital form) to the same place, the votes can simply be compiled locally, and then forwarded to a central office. Compiling the votes of subelectorates is also algorithmically useful for computing the backward induction winner in Stackelberg voting games (Xia and Conitzer 2010). Chevaleyre et al. (2009) introduced the notion of compilation complexity as the minimum number of bits needed to store the summary of the votes of the subelectorate for a voting rule. More precisely, the setting is as follows. Suppose the votes are divided into the subelectorate, consisting of k known votes, and the complement, consisting of u unknown votes. In the Chevaleyre et al. framework, u is considered to be unknown. Hence, the compilation complexity is defined as a function of the voting rule r and k, as follows. It is the least number of bits needed to be able to summarize any profile of k votes, in such a way that for any number u, if we are given any profile of the u votes in the complement, then from this profile and the summary of the subelectorate, we can infer the winner under r for the total electorate. Formally, when summarizing a subelectorate, a profile P for the subelectorate is mapped to a string of bits f(p) {0, 1}, representing the votes in the subelectorate. We require that for any two profiles P 1 and P 2, if f(p 1 ) = f(p 2 ), then for any profile Q for the complement 1 This may make it more difficult to verify the winner of the election later so it requires a large degree of trust in the system.

2 (which can have any size in the Chevaleyre et al. setting), we must have r(p 1 Q) = r(p 2 Q), where r is the voting rule. (If not, then f is leaving out relevant information.) f is called a compilation function. For given r, m, k, some compilation function f uses the minimum number of bits; that number of bits is the compilation complexity, denoted by C m,k,? (r). The question mark indicates that the number u is unknown. It has been pointed out (Chevaleyre et al. 2009) that C m,k,? (r) is related to the following core computational social choice problems. It is related to the complexity of terminating elicitation (Conitzer and Sandholm 2002; Walsh 2008): given a subset of the votes, is the winner already determined? This problem, in turn, is related to the complexity of possible and necessary winner determination (Konczak and Lang 2005; Pini et al. 2007; Xia and Conitzer 2008a; Betzler, Hemmann, and Niedermeier 2009): given a set of incomplete votes (modeled as partial orders) and an alternative c, we are asked whether there exists an extension (resp., for any extension), c is the winner. Another related problem is the communication complexity of voting rules (Conitzer and Sandholm 2005): what is the smallest number of bits that must be transferred (among the voters and the center) to compute the winner? We can extend the Chevaleyre et al. framework by considering cases where the number of unknown votes, u, is known (even though the votes themselves are not). This is a natural assumption in many cases where we know the size of the electorate. When both k and u are known, the compilation complexity is C m,k,u (r). We note that C m,k,u (r) C m,k,? (r), because if the summary contains enough information to infer the winner for any number of additional votes, it also contains enough to infer it for a specific number u of unknown votes. Moreover, in some cases this inequality is strict. As an illustrative example, in the extreme case where u = 0, the only summary that we need is simply which alternative won, so that C m,k,0 (r) = log m for any m and r. In fact, that argument does not even depend on k so we can also say that C m,?,0 (r) = log m. Here, C (r) corresponds to using a compilation function that works for any profile consisting of any number of known votes, but a fixed number of unknown votes in some sense, the opposite of the Chevaleyre et al. framework. It always holds that C m,k,u (r) C (r). Chevaleyre et al. focused strictly on C m,k,? (r), and conducted case studies for some common voting rules. While these results provide upper bounds on C m,k,u (r), these upper bounds are good only when u is much larger than k; and, as we will see, they will become quite loose when k is much larger than u. The authors briefly discussed the idea of using C (r) as another upper bound. However, no tight bound was proved for the most intriguing, general case C m,k,u (r) (both k and u are known) for any common voting rule. Our contributions. In this paper, we first study the relations among C m,k,? (r), C (r), and C m,k,u (r). (For all common voting rules r, C m,?,? (r) =.) We recall that C m,k,? (r) and C (r) are upper bounds on C m,k,u (r) (Chevaleyre et al. 2009). Our first result shows that, conversely, C m,k,? (r) and C (r) can also be bounded above by a function that takes limits of C m,k,u (r) in a particular way, for anonymous voting rules r satisfying a condition called h-canceling-out (which includes all the rules in this paper). Then, we study upper and lower bounds on compilation complexity for most common voting rules in use, including l-approval, Borda, Bucklin, Copeland, maximin, plurality with runoff, ranked pairs, and voting trees. We obtain asymptotically tight bounds on the three types of compilation complexity for some rules. Notably, when k and u are both at least slightly larger than m (more precisely, both are larger than m 1+ǫ for some ǫ > 0), all bounds derived in this paper are asymptotically tight. Our results are summarized in Table 1. Discussion. Among the three types of compilation complexity, C m,k,? and C m,k,u seem the most natural. The former is useful when we do not know how many unknown votes there are; the latter is useful when we do. The former also serves as a useful upper bound on the latter. It must be admitted that C is clearly less natural. Nevertheless, it does fit certain situations. For example, suppose that the members of a coalition want to manipulate the election and vote at the last moment, based on everybody else s votes. They need to summarize the votes submitted by everyone else, and then submit their votes in response immediately. A natural strategy for them is the following: in advance of the election, build a lookup table that maps each possible summary of the others votes to a bundle of votes that the coalition will submit. Hence, the coalition requires a compilation function, preferably one that results in a small table (that is, one with low compilation complexity). However, when the coalition builds the table, it may not be clear yet how large the number k of voters outside the coalition will be. If so, their summarization scheme needs to work for subelectorate profiles of all possible sizes, corresponding to C. (If k is known in advance, this problem corresponds to C m,k,u.) Indeed, as we will see, if u (the coalition size) is small, then the lookup table will be small. That being said, we believe that the main use of C is as an upper bound on C m,k,u, as suggested by Chevaleyre et al. In fact, perhaps the simplest approach to compiling votes when both k and u are known is the following. If k is smaller than u, the chair compiles the votes as if she does not know u (corresponding to C m,k,? ); if u is smaller than k, the chair compiles the votes as if she does not know k (corresponding to C ). Our lower bounds on C m,k,u show that, surprisingly, this very intuitive and simple approach is almost the best we can do for most common voting rules, in an asymptotic sense. Preliminaries Let X be the set of alternatives, X = m. A vote is a linear order over X. The set of all linear orders over X is denoted by L(X). An n-profile P is a collection of n votes for some n N, that is, P L(X) n. A voting rule r is a mapping that assigns to each profile a unique winning alternative. That is, r : { } L(X) L(X) 2... X. Some common voting rules are listed below. Ties are assumed to be broken according to a fixed order over the alternatives, c 1 >... > c m.

3 (Positional) scoring rules: Given a scoring vector v = (v(1),..., v(m)), for any vote V L(X) and any c X, let s(v, c) = v(j), where j is the rank of c in V. For any profile P = (V 1,..., V n ), let s(p, c) = n i=1 s(v i, c). The rule will select c X so that s(p, c) is maximized. Some examples of positional scoring rules are Borda, for which the scoring vector is (m 1, m 2,...,0); l-approval (App l, with l m), for which the scoring vector is v(1) =... = v(l) = 1 and v l+1 =... = v m = 0; plurality, for which the scoring vector is (1, 0,...,0); and veto, for which the scoring vector is (1,...,1, 0). Copeland: For any two alternatives c i and c j, we can simulate a pairwise election between them, by seeing how many votes prefer c i to c j, and how many prefer c j to c i ; the winner of the pairwise election is the one preferred more often. Then, an alternative receives one point for each win in a pairwise election, and zero points for each loss. (The results in this paper hold regardless of the number of points for a tie.) The winner is the alternative that has the highest score. Bucklin: An alternative c s Bucklin score is the smallest number t such that more than half of the votes rank c among the top t alternatives. The winner is the alternative that has the lowest Bucklin score. (We do not consider any further tie-breaking for Bucklin.) Maximin: Let N P (c i, c j ) denote the number of votes that rank c i ahead of c j in P. The winner is the alternative c that maximizes min{n P (c, c ) : c X, c c}. Plurality with runoff: The election has two rounds. In the first round, all alternatives are eliminated except the two with the highest plurality scores. In the second round (runoff), the winner is the alternative that wins the pairwise election between them. Ranked pairs: This rule first creates an entire ranking of all the alternatives. N P (c i, c j ) is defined as for the maximin rule. In each step, we will consider a pair of alternatives c i, c j that we have not previously considered; specifically, we choose the remaining pair with the highest N P (c i, c j ). We then fix the ordering c i c j, unless this contradicts orderings that we fixed previously (that is, it violates transitivity). We continue until we have considered all pairs of alternatives (hence we end up with a full ranking). The alternative at the top of the ranking wins. Voting trees: A voting tree is a binary tree with m leaves, where each leaf is associated with an alternative. In each round, there is a pairwise election between an alternative c i and its sibling c j : if a majority of voters prefers c i to c j, then c j is eliminated, and c i is associated with the parent of these two nodes; and vice versa. The alternative that is associated with the root of the tree (wins all its rounds) is the winner. The voting rule that corresponds to a balanced voting tree is also known as the cup rule. For any profile P, we let M P denote the weighted majority graph of P, defined as follows. M P is a directed graph whose vertices are the alternatives. For i j, if N P (c i, c j ) > 0, then there is an edge (c i, c j ) with weight w ij (M P ) = N P (c i, c j ). Also, for i < j, if N P (c i, c j ) = 0, then there is an edge (c i, c j ) with weight w ij (M P ) = 0. We say a voting rule r is based on the: Weighted majority graph (WMG), if for any pair of profiles P 1, P 2 such that M P1 = M P2, we have r(p 1 ) = r(p 2 ). Order of pairwise elections (OPE), if for any pair of profiles P 1, P 2 with the property that for any i 1, i 2, j 1, j 2 m, w i1j 1 (M P1 ) w i2j 2 (M P1 ) w i1j 1 (M P2 ) w i2j 2 (M P2 ), we must have r(p 1 ) = r(p 2 ). That is, the winner can be determined by comparing the magnitudes of pairwise results. Unweighted majority graph (UMG), if for any pair of profiles P 1, P 2 such that for any i, j, w ij (M P1 ) 0 w ij (M P2 ) 0, we have r(p 1 ) = r(p 2 ). That is, only the signs (but not the magnitudes) of the pairwise results are used to determine the winner. Note that any UMG-based rule is an OPE-based rule, and any OPE-based rule is a WMG-based rule. Copeland and voting trees are based on UMG; maximin and ranked pairs are based on OPE; and all of them are based on WMG. A voting rule r is Condorcet consistent if it always selects the Condorcet winner (that is, the alternative that wins each of its pairwise elections) whenever one exists. Let k denote the number of known votes in the subelectorate and let u denote the number of unknown votes in the complement. We first consider the case where k is known and u is not. For a voting rule r, a function fm,k,? r : L(X)k {0, 1} is a compilation function if for any P 1, P 2 L(X) k with fm,k,? r (P 1) = fm,k,? r (P 2), and any profile Q, we must have that r(p 1 Q) = r(p 2 Q). Similarly, we can define compilation functions for the other two cases (u is known but k is unknown, and both u and k are known). In these cases, f r : { } L(X)1 L(X) 2... {0, 1} (resp., fm,k,u r : L(X)k {0, 1} ) is a compilation function if for any pair of profiles (resp., k-profiles) P 1 and P 2, if f r (P 1) = f r (P 2) (resp., fm,k,u r (P 1) = fm,k,u r (P 2)), then for any u-profile Q, we have that r(p 1 Q) = r(p 2 Q). Now, we are ready to define the three types of compilation complexity. Let len : {0, 1} N return the length of a string. Then, for the case where k is known but u is not, C m,k,? (r) = min f r m,k,? max P L(X) k len(fm,k,? r (P)) gives the length of strings that we need to compile profiles, i.e., the compilation complexity. Similarly, C m,k,u (r) = min f r m,k,u max P L(X) k len(fm,k,u r (P)) and C (r) = min f r max P { } L(X) 1 L(X) 2... len(f r (P)). In each case, the min must be taken over valid compilation functions for that case. Relations among the three types of compilation complexity In this section, we invesigate the relations among the three types of compilation complexity for the same voting rule r. First, as Chevaleyre et al. (2009) pointed out, C m,k,? (r) and C (r) are both at least as large as C m,k,u (r). They also provided loose upper bounds for any rule r (O(k log(m!)) on C m,k,?, and O((m!) u log m) on C ). Lemma 1 (Chevaleyre et al. 2009) m, k, u N, and for any rule r, C m,k,u (r) min ( C m,k,? (r), C (r) ). This lemma will be frequently used in the paper in the following way. Once we obtain an upper bound on C m,k,? (r)

4 or C (r), we immediately obtain an upper bound on C m,k,u (r); conversely, once we obtain a lower bound on C m,k,u (r), we immediately have lower bounds on C m,k,? (r) and C (r), respectively. We may also ask: If we obtain an upper bound on C m,k,u (r), can we use this to derive upper bounds on C m,k,? (r) and C (r) in some way? One naïve approach is to take the limit of C m,k,u (r) as u (to obtain a bound on C m,k,? (r)). However, this approach does not work well. For one, it is not guaranteed that the limit of C m,k,u (r) when u goes to infinity exists. Another issue is that, even if lim u C m,k,u (r) does exist, it might be smaller than C m,k,? (r), as shown in the following example. (A similar example exists for C (r).) Example 1 Let {A, B, C} be an arbitrary partition of the possible votes, L(X). Let r be the voting rule defined as follows. For { any profile P, we let: c1 if P A r(p) = if P is odd; c 2 otherwise { c1 if P B r(p) = if P is even. c 2 otherwise If we know in advance that the total number of votes will be odd (even), then we only need to keep track of one bit of information, namely, whether there has been a vote in A (B). Hence, for any u, we have that C m,k,u (r) = 1, so lim u C m,k,u (r) = 1. However, if we do not know whether there will be an odd or even number of votes, then when we want to compile P, we need to keep track of which of four possible states we are in: (1) P (A B) =, (2) P A but P B =, (3) P B but P A =, (4) P B and P A. Hence, we need two bits to keep track of all possibilities, so C m,k,? (r) = 2. Of course, the rule in Example 1 is very artificial. It turns out that common voting rules have structure that does allow us to obtain upper bounds on C m,k,? (r) and C (r) from an upper bound on C m,k,u (r). This result works for all anonymous voting rules for which there exists an h-profile P that always cancels out. Definition 1 An anonymous voting rule r satisfies h- canceling-out, for h N, if there exists an h-profile P such that for any profile P, r(p P ) = r(p ). Most common voting rules satisfy h-canceling-out for some h, e.g., all common rules studied in this paper (except Bucklin). Proposition 1 Plurality with runoff satisfies 2m-cancelingout; all positional scoring rules satisfy m-canceling-out; Borda and all WMG-based voting rules satisfy 2-cancelingout. The next proposition states that for any r that satisfies h- canceling-out, the limit of C m,k,u (r) as u (or k) goes to infinity does exist, if we increase u (or k) by h each time. Proposition 2 Let r be an anonymous voting rule that satisfies h-canceling-out. For any k (resp., u) and any 0 h h 1, lim i C m,k,h +ih(r) (resp., lim i C m,h +ih,u(r)) exists and is finite. Finally, we obtain the following bounds on C m,k,? (r) and C (r): C m,k,? (r) (resp., C (r)) is bounded below by the largest lim i C m,k,h +ih(r) (resp., lim i C m,h +ih,u(r)) among all h < h, and is bounded above by the sum of such limits over all h < h. This implies the lower and upper bounds are within a factor h. Proposition 3 Let r be an anonymous voting rule that satisfies h-canceling-out. For any 0 h h 1, let p k,h = lim i C m,k,h +ih(r) and ˆp u,h = lim i C m,h +ih,u(r). For any k, u, m N, we have max h p k,h h 1 h =0 p k,h and max h ˆp u,h C m,k,? (r) C (r) h 1 h =0 ˆp u,h. Compilation complexity of common rules In this section, we study upper and lower bounds on all three types of compilation complexity for common voting rules, including l-approval, Borda, Bucklin, plurality with runoff, all Condorcet-consistent rules (including Copeland, maximin, ranked pairs, and voting trees), all WMG-based rules (including all OPE-based rules and all UMG-based rules), all OPE-based rules (including maximin, ranked pairs, and all UMG-based rules), and all UMG-based rules (including Copeland and voting trees). For each voting rule r, we obtain bounds in the following way. We first derive upper bounds on C m,k,? (r) and C (r), and apply Lemma 1 to obtain an upper bound on C m,k,u (r). Then, we derive a lower bound on C m,k,u (r), and apply Lemma 1 to obtain lower bounds on C m,k,? (r) and C (r). For each rule that we study, the upper bounds on C m,k,? (r) and C (r) are proved by explicitly giving compilation functions fm,k,? r and fr. All our compilation functions share a common characteristic: fm,k,? r maps each profile P to a vector that represents some type of scores (different types for different rules) that the alternatives obtain in the profile P. For example, in a plurality election, we only need to keep track of all alternatives current plurality scores. For any k-profile P, f r (P) is obtained by deriving a (rule-specific) lower bound, such that if the value of one of the scores in fm,k,? r (P) is below the lower bound, it will not make any difference to increase it to the lower bound as long as there are only u remaining votes. For example, if in a plurality election, a receives 10 votes from the subelectorate and b only 3, and only u = 4 votes remain in the complement, we can increase b s score to 5 and b is still guaranteed to lose. Better yet, we can then subtract 5 from everyone s score (so that a is at 5 and b is at 0). If we do this, then we are guaranteed that the largest score that we ever need in fm,?,4 Plu (P) is 5. The compilation functions fm,k,? r and fr naturally induce a compilation function fm,k,u r for C m,k,u(r), as follows. If the upper bound for C m,k,? (r) is smaller than the upper bound for C (r), then we let fm,k,u r = fr m,k,? ; otherwise, we let fm,k,u r = fr. If we can prove a matching lower bound for C m,k,u (r) (in the asymptotic sense), then the compilation function fm,k,u r defined above is optimal up to a multiplicative constant. To prove a lower bound on fm,k,u r (r), we construct a set of k-profiles P that must be mapped to different strings by any compilation function. The lower bound is obtained by taking the logarithm of the set s size. The proofs for the lower bounds are technically much more involved. We only show how to construct compilation functions (in proof sketches). The remaining parts

5 of the proofs are omitted due to the space constraint. The full version with all proofs can be found online. Theorem 1 (l-approval) Let l = m l. When l m/2, C m,k,? (App l ) is Θ ( m log(1 + kl/m) + kl log(1 + m/kl) ) ; C (App l ) is Θ(m logu); and C m,k,u (App l ) is Θ ( min(m log(1+kl/m)+kllog(1+ m/kl), m logu) ). When l > m/2, C m,k,? (App l ) is Θ ( m log(1+kl /m)+ kl log(1 + m/kl ) ) ; C (App l ) is Ω ( m log(ul /m) ) and is O(m log u); and C m,k,u (App l ) is Ω ( min(m log(1 + kl /m) + kl log(1 + m/kl ), m log(ul /m)) ) and is O ( min(m log(1 + kl /m) + kl log(1 + m/kl ), m log u) ). Proof sketch. [C m,k,? (App l )] When l m/2, we let f App l m,k,? (P) = (s(p, c 1),...,s(P, c m )), that is, the total scores of the alternatives in P ; when l > m/2, we let f App l m,k,? (P) = (k s(p, c 1),..., k s(p, c 1 )), that is, the complements of the total scores of the alternatives in P. [C (App l )] Let P be a k-profile. Let c be an alternative that obtains the highest score under P. The idea in f App l is that if the score of an alternative is smaller than s(p, c) u, then that alternative cannot be the winner. Therefore, P can be compiled into a vector consisting of the differences between s(p, c) and the scores of the alternatives in P, where the differences are capped above by u + 1. Formally, let e max = max ( s(p, c 1 ),..., s(p, c m ) ). We let f App l (P) = (max(s(p, c 1 )+u+1 e max, 0),...,max(s(P, c m )+u+ 1 e max, 0)). Theorem 2 (Borda) C m,k,? (Borda) is Θ(m log(km)), 2 C (Borda) is Θ(m log(um)), and C m,k,u (Borda) is Θ(m log(min(km, um))). Proof sketch. [C m,k,? (Borda)] Let fm,k,? Borda be the compilation function that maps each k-profile to a vector of m natural numbers representing the total score of each alternative. That is, for any k-profile P, fm,k,? Borda (P) = (s(p, c 1 ),..., s(p, c m )) (Chevaleyre et al. 2009). [C (Borda)] We let f Borda be the compilation function defined as follows. For any k-profile, suppose fm,k,? Borda (P) = (e 1,...,e m ). Let e max = max(e 1,...,e m ). We let f Borda (P) = (max(e 1 + um + 1 e max, 0),..., max(e m + um + 1 e max, 0)). Theorem 3 (Bucklin) For any k, u such that min(k, u) m 12, C m,k,? (Bu) is Θ(m 2 log(1 + k/m)), C (Bu) is Θ(m 2 log(1 + u/m)), and C m,k,u (Bu) is Θ(m 2 log(1 + min(k, u)/m)). Proof sketch. [C m,k,? (Bu)] Let fm,k,? Bu be the compilation function that maps each profile to a vector of m 2 natural numbers, representing the number of times that each alternative is ranked in each position in the profile. Formally, let f Bu (P, c, i) be the number of times that c is ranked in the ith position. For any k-profile P, 2 This was proved in (Chevaleyre et al. 2009). There was a small mistake in the proof for the lower bound, which can be fixed. we let fm,k,? Bu (P) = (f Bu(P, c 1, 1),..., f Bu (P, c 1, m),..., f Bu (P, c m, 1),..., f Bu (P, c m, m)). We note that for any c X, m i=1 f Bu(P, c, i) = k. [C (Bu)] Let fbu (P, c, i) be the number of times that c is ranked anywhere in the top i positions. We note that if fbu (P, c, i) is no more than (k+u)/2 u, then effectively it is the same as if fbu (P, c, i) is (k + u)/2 u, because there are only u remaining voters. Similarly, if fbu (P, c, i) is at least (k + u)/2 + 1, then it is the same as if fbu (P, c, i) is (k + u)/ Therefore, we let f Bu (P) consist of all the fbu (P, c, i), bounded by the interval [ (k + u)/2 u, (k + u)/2 + 1] (we can subtract (k + u)/2 u] to make the interval start at 0). Proposition 4 For any UMG-based rule r UMG, C (r UMG ) is O(m 2 log u); for any OPE-based rule r OPE, C (r OPE ) is O(m 2 log(um)). Proof sketch. For any UMG-based rule, the compilation function f UMG (P) produces a modified weighted majority graph M P (from the original majority graph M P with weights w ij (M P )) in the following way. For each edge c i c j such that w ij (M P ) > u + 1, let w ij (M P ) = u + 1; for any other edge c i c j, let w ij (M P ) = w ij(m P ). For any OPE-based rule, the compilation function f OPE (P) produces a different modified weighted majority graph M P : First, we order the non-negative weights of the edges in M P from large to small. Let e 1... e m(m+1)/2 0 denote the weights. Then, we construct another set of weights for these edges, denoted by e 1... e m(m+1)/2 0, such that for any j m(m + 1)/2, if e j e j+1 > u + 1, then e j e j+1 = u + 1; otherwise, e j e j+1 = e j e j+1 (and e m(m+1)/2+1 = 0). Let M P denote the graph with the weights e 1,...,e m(m+1)/2. Proposition 5 There exists a constant q > 0 such that for any Condorcet consistent voting rule r, C m,k,u (r) is Ω(m 2 log(min( k log m/(qm) 1, u))), C m,k,? (r) is Ω(m 2 log( k/(qm) 2)), 3 and C (r) is Ω(m 2 log u). The following two theorems follow directly from Propositions 4 and 5. Theorem 4 (Condorcet-consistent OPE-based rules) Let r be a Condorcet-consistent OPE-based rule (e.g., maximin or ranked pairs). There exists a constant q > 0 such that the following holds. C m,k,? (r) is Ω(m 2 log( k/qm 2)) and is O(m 2 log k); C (r) is Ω(m 2 log u) and is O(m 2 log(um)); C m,k,u (r) is Ω(m 2 log(min( k log m/(qm) 1, u))) and is O(m 2 log(min(k, um))). Theorem 5 (Condorcet consistent UMG-based rules) Let r be a Condorcet-consistent UMG-based rule (e.g., Copeland or a voting tree). There exists a constant q > 0 such that the following holds. C m,k,? (r) is Ω(m 2 log( k/qm 2)) and is O(m 2 log k); C (r) is Θ(m 2 log u); 3 It was claimed that C m,k,? (r) = Ω(m 2 log k) in (Chevaleyre et al. 2009). However, there was a small bug in their proof. Our proof uses a theorem by Erdös and Moser (1964).

6 l-approval (l m/2) l-approval (l > m/2) Voting rule C m,k,? C C m,k,u Θ`m log(1 + kl/m) Θ` min(mlog(1 + kl/m) (Theorem 1) Θ(mlog u) +kl log(1 + m/kl) +kl log(1 + m/kl), m log u) (Theorem 1) Θ`mlog(1 + kl /m) +kl log(1 + m/kl ) Ω`m log(ul /m) O(m log u) Θ`mlog(um) Ω`m log(ul /m), and O` min(mlog(1 + kl /m) +kl log(1 + m/kl ), m log u) Θ`m log min(km, um) Borda (Theorem 2) 4 Θ`m log(km) Bucklin (min(u, k) m 12) (Theorem 3) Θ(m 2 log(1 + k/m)) Θ(m 2 log(1 + u/m)) Θ`m 2 log(1 + min(k, u)/m) Plurality with runoff (k = Ω(m 1+ǫ )) (Theorem 6) Θ(m 2 log k) Θ(m 2 log u) Θ`m 2 log(min(k, u)) WMG-based rules (incl. UMG/OPE-based rules) (Proposition 4) O(m 2 log k) 4 O((m!) u log m) 4 O` min(m 2 log k, mu log u) OPE-based rules (incl. maximin and ranked pairs) (Proposition 4) O(m 2 log k) 4 O`m log(um) 2 O`m 2 log(min(k, um)) UMG-based rules (incl. Copeland and voting trees) (Proposition 4) O(m 2 log k) 4 O(m 2 log u) O`m 2 log(min(k, u)) Condorcet consistent rules (incl. Copeland, maximin, ranked pairs, voting trees) (Proposition 5) Ω`m 2 log( k/(qm) 2) Ω(m 2 log u) Ω`m 2 log(min(u, k log m/(qm) 1)) C m,k,u (r) is Ω(m 2 log(min( k log m/(qm) 1, u))) and is O(m 2 log(min(k, u))). Theorem 6 (Plurality with runoff) For any ǫ > 0, any k = Ω(m 1+ǫ ), and any u N, C m,k,? (Pluo) is Θ(m 2 log k), C (Pluo) is Θ(m 2 log u), and C m,k,u (Pluo) is Θ(m 2 log(min(k, u))). Proof sketch. For any k-profile P, let fm,k,? Pluo (P) = (fm,k,? Plu UMG (P), fm,k,? (P)) (Chevaleyre et al. 2009); for any profile P, we let f Pluo Plu UMG (P) = (f(p), f (P)). Remark. For any compilation function f in this section and any profile P in the domain of f, computing f(p) only takes polynomial time. Conclusion and future work In this paper, we studied three types of compilation complexity, denoted by C m,k,?, C, and C m,k,u. We first discussed the relations among them and showed that for any anonymous voting rule r that satisfies h-canceling-out, the limit of C m,k,u (r) when u (resp., k) goes to infinity can be used to compute an upper bound for C m,k,? (r) (resp., C (r)). We then conducted case studies of the three types of compilation complexity for common voting rules. The results are summarized in Table 1. We note that the bounds for l-approval (l m/2), Borda, and Bucklin are asymptotically tight. For the others, when k and u are both sufficiently large (both are m 1+ǫ for some ǫ > 0), the bounds are asymptotically tight. The upper bounds correspond to easy-to-compute compilation functions that can be used to compile the results of subelectorates, and the lower bounds show that we cannot do (much) better. Generally, the lower bounds are more difficult to prove. Future research can take a number of directions. A natural direction is to investigate the compilation complexity of other rules, such as STV. Another direction is to consider situations where the votes come in one at a time and we need 4 Proved in (Chevaleyre et al. 2009). Table 1: Compilation complexity of common voting rules. to maintain the compilation of the votes that have been cast so far, throughout the election. It is not difficult to see that the compilation functions in this paper can easily be updated as more votes come in. A larger direction is to more deeply understand the connections between compilation complexity and other concepts in computational social choice. For example, compilation complexity has similarities to communication complexity, as discussed in (Chevaleyre et al. 2009). Also, there is a relationship to the interpretation of voting rules as generalized scoring rules (GSRs) (Xia and Conitzer 2008b): we can always compile a voting rule by keeping track of the current GSR scores, resulting in an upper bound that depends on the number of scores in the GSR. References Betzler, N.; Hemmann, S.; and Niedermeier, R A multivariate complexity analysis of determining possible winners given incomplete votes. In IJCAI, Chevaleyre, Y.; Lang, J.; Maudet, N.; and Ravilly-Abadie, G Compiling the votes of a subelectorate. In IJCAI, Conitzer, V., and Sandholm, T Vote elicitation: Complexity and strategy-proofness. In AAAI, Conitzer, V., and Sandholm, T Communication complexity of common voting rules. In EC, Erdös, P., and Moser, L On the representation of directed graphs as unions of orderings. Math. Inst. Hung. Acad. Sci. 9: Konczak, K., and Lang, J Voting procedures with incomplete preferences. In Multidisciplinary Workshop on Advances in Preference Handling. Pini, M. S.; Rossi, F.; Venable, K. B.; and Walsh, T Incompleteness and incomparability in preference aggregation. In IJCAI, Walsh, T Complexity of terminating preference elicitation. In AAMAS, Xia, L., and Conitzer, V. 2008a. Determining possible and necessary winners under common voting rules given partial orders. In AAAI, Xia, L., and Conitzer, V. 2008b. Generalized scoring rules and the frequency of coalitional manipulability. In EC,

7 Xia, L., and Conitzer, V Stackelberg Voting Games: Computational Aspects and Paradoxes. In AAAI. Proofs Proof of Proposition 1: Let π be the cyclic permutation among all alternatives: π : c 1 c 2... c m. For any i m, we let V i = [π i (c 1 )... π i (c m )] and W i = [π i (c m )... π i (c 1 )]. The profiles P that cancels out is defined for specific voting rules as follows. Plurality with runoff: P = (V 1,..., V m, W 1,..., W m ). Positional scoring rules: P = (V 1,..., V m ). Borda or any WMG-based rules: P = (V 1, W 1 ). Proof of Proposition 2: We prove that for any k and any 0 h h 1, lim i C m,k,h +ih(r) exists and is finite. The other case can be proved similarly. We will show that for any i N, C m,k,h +ih(r) C m,k,h +(i+1)h(r). Notice that for any pair of k-profiles P 1 and P 2, if there exists an (h + ih)-profile Q such that r(p 1 Q) r(p 2 Q), then we must have that r(p 1 Q P ) = r(p 1 Q) r(p 2 Q) = r(p 2 Q P ), where P = h and P is the canceling-out profile. That is, if a pair of profile P 1 and P 2 are different when there are h + ih unknown votes, then P 1 and P 2 must be different when there are h + (i + 1)h unknown votes. It follows that C m,k,h +ih(r) C m,k,h +(i+1)h(r). We recall that for any i, C m,k,h +ih(r) m log(p!) (Proposition 2 of (Chevaleyre et al. 2009)). Therefore, C m,k,h +ih(r) is monotonically increasing and has an upper bound, which means that lim i C m,k,h +ih(r) exists and is finite. Proof of Proposition 3: We only prove max h p k,h C m,k,? (r) h 1 h =0 p k,h, other inequalities can be proved similarly. Because for any i N, C m,k,h +ih(r) C m,k,?, we have that max h p k,h C m,k,? (r). It follows from the proof of Proposition 2 that for any 0 h h 1, there exists a compilation function f h that has the compilation complexity p k,h (because the equivalence relation becomes finer and finer as i goes to infinity). We define a function f as follows. For any profile P, we let f(p) = (f 0 (P), f 1 (P),..., f h 1 (P)). It follows that f is a compilation function for the case in which k is known but u is not, and f(l(x) k ) = h 1 h =0 p u,h. Proof of Theorem 1: The upper bounds are obvious (by using the compilation functions f App l m,k,u ). We prove the following matching lower bounds. { If l m/2, then C m,k,u (App l ) = Ω(m log(1 + kl/m) + kl log(1 + m/kl)) if u 3 kl/m Ω(m log u) otherwise { if l > m/2, then C m,k,u (App l ) = Ω(m log(1 + ul /m)) if k u m/l Ω(m log(1 + kl /m)) if u k m/l, where l = m l. Let f App l m,k,? and f App l be the same as defined in the sketch of proof in the main text. We first make the following claim. Claim 1 For any e N m 0, e f App l m,k,? (L(X)k ) if and only if m i=1 e i = kl and max(e 1,..., e m ) k.

8 Claim 1 states that a vector e can be realized by a profile of k votes under App l, if and only if the sum of all components of e is kl, and the largest component of e is no more than k. The proof is by induction on k. Proof of Claim 1: We first prove the if part by induction on k. The base case in which k = 1 is obviously true. Suppose the claim is true for k. Let e N m 0 and m i=1 e i = (k +1)l. W.l.o.g. let e 1,...,e l be the largest l elements. We note that for any l + 1 i m, e i k, otherwise we have m i=1 e i > (k + 1)(l + 1) > (k + 1)l, which contradicts the assumption. We let V k+1 = [c 1 c 2... c m ], and let e 1 = e 1 1,...,e l = e l 1, e l+1 = e l+1,..., e m = e m. It follows that m i=1 e i = kl and max(e 1,..., e m ) k. By induction hypothesis, there exists a profile P = (V 1,...,V k ) such that f App l m,k,? (P {V k+1}) = e. The only part is obviously true. For any k, let E k = { e N m 0 : e m = 0, ( i (m 1)/2)(e i kl/m), ( i t)(e i + e (m 1)/2+i = 2kl/(m 1) ), ( t i (m 1)/2)(e i + e (m 1)/2+i = 2kl/(m 1) )}, where t = kl m 1 2 2kl/(m 1). Since l (m 1)/2, we have that 2kl/(m 1) k. We note that E k = (1 + kl/m ) (m 1)/2, and for any e E k, we have m i=1 e m = kl. It follows from Claim 1 that E k f Appl (L(X) k ). Let g be a mapping E k L(X) k such that f App l m,k,? (g( e)) = e. We make the following claim. Claim 2 If l m/2, then for any u 3 kl/m, C m,k,u (App l ) = Ω(m log(1 + kl/m) + kl log(1 + m/kl)). Proof of Claim 2: We first prove that if kl m, then for any a, b E k with a b, and any u 3 kl/m, there exists a profile P L(X) u such that App l (g( a) P) App l (g( b) P). W.l.o.g. a 1 > b 1. Let e N m 0 be such that m i=1 e i = ul, e 1 = u a, e m = u, and for any 2 i m 1, e i 2 3u. Such e always exists, because u + u a 1 + (m 2) 2 3 u m 2 u ul. It follows from Claim 1 that e f App l m,k,? (L(X)u. We have App l (g( a) g( e)) = c 1 and App l (g( b) g( e)) = c m. Therefore, when l m/2 and kl m, C m,k,? (App l ) = Ω(m log(1 + kl/m)). Next, if kl m, then we prove that C m,k,? (App l ) = Ω(kl log(1 + m/kl)). Let E k denote the set of all e {0, 1} m such that e 1 = 1 and m i=1 e i = kl. For any e E k, there exists a profile P L(X) k such that f App l m,k,? (P) = e. We next show that for any a, b E k with a b, there exists a profile P L(X) u such that App l (g( a) P) App l (g( b) P). W.l.o.g. a 2 > b 2, that is, a 2 = 1 and b 2 = 0. Let e N u 0 be a vector that satisfies the following conditions. m i=1 e i = kl; if l = 1, then e 1 = u/2 1, e 2 = u/2, e 3 = u u/2, e 4 =... = e m = 0; if l > 1, then e 1 = u 1, e 2 = u, and for any 3 i m, e i u 1. It follows from Claim 1 that g( e) is well-defined. We have that App l (g( a) g( e)) = c 2 c 1 = App l (g( b) g( e)) (ties are broken in favor of c 1 ). Therefore, if kl m, then C m,k,? (App l ) ( m 1 kl 1) = Ω(kl log(1 + m/kl)). Therefore, when l m/2 and u 3 kl/m, we have that C m,k,u (App l ) = Ω(m log(1 + kl/m) + kl log(1 + m/kl)). Claim 3 When l m/2, for any k mu 3l, C m,k,u (App l ) = Ω(m log u). Proof of Claim 3: For any k mu 3l, any 0 e 1,...e m/2 u/3, there exists P L(X) k such that the first m/2 components of f App l (P) are (e 1,..., e m/2 ), and the last component of f App l (P) is 0. For any e = (e 1,..., e m/2 ) with 0 e 1,...e m/2 u/3, we let g k ( e) be a profile that is composed of k votes and satisfies the conditions in Claim 3. There exists a profile P that is composed of u voters such that for any e 1, e 2 [0, u/3 ] m/2, there exists P L(X) u such that App l (g k ( e 1 ) P) App l (g k ( e 2 ) P). (The proof is similar with the proof for Claim 2.) Therefore, we have that C (App l ) log {0,..., u/3 } m/2 = Ω(m log u). Claim 4 When l > m/2, for any k u m/l, C m,k,u (App l ) = Ω(m log(ul /m)). Proof of Claim 4: We first prove that for any k u m/l, any k ul /m e 1,...e m/2 k, there exists P L(X) k such that the first m/2 components of f App l (P) are (e 1,..., e m/2 ), and the last component of f App l (P) is k. Because ( m/2 )(k ul /m) m 1 i=1 e i m/2 k, we have that kl m 1 i=1 e i +( m/2 )k and m 1 i=1 e i +k kl. Therefore, there exist 0 e m/2 +1,..., e m 1 k such that m 1 i=1 e i + k = kl. It follows from Claim 1 that there exists P L(X) k such that f App l m,k,? (P) = (e 1,...,e m); we also let g k (e 1,...,e m/2 ) = P. Let E k = { e = (e 1,..., e m/2 ) : k ul /m e 1,...e m/2 k}. That is, E k is the set of vectors, each of which is composed of m/2 natural numbers, each of which is chosen in [k ul /m, k]. We next show that for any a, b E k, there exists a profile P L(X) u such that App l (g ( a) P) App l (g ( b) P). W.l.o.g. a 1 > b 1. We note that u + a 1 ul u + a 1 + (m 2)(u ul /m ). Therefore, from Claim 1, there exist a profile P L(X) u such that f App l m,k,? (P) = (u, e 2,..., e m 1, a 1 ), such that for any 2 i m 1, e i u ul /m, and m 1 i=2 e i + u + a 2 = ul. It follows that App l (g ( a) P) = c 1 App l (g ( b) P) = c m. Therefore, we have that C m,k,u (App l ) log((1 + ul /m ) m/2 ) = Ω(m log(1 + ul /m)). We let E k = { e Nm 0 : e m = k, ( i (m 1)/2)(k kl /m e i k), ( i t)(e i + e (m 1)/2+i = 2k 2kl /(m 1) ), ( t i (m 1)/2)(e i + e (m 1)/2+i = 2k 2kl /(m 1) )}. Claim 5 When l > m/2, for any u k m/l, C m,k,u (App l ) = Ω(m log(1 + kl /m)).

9 Proof of Claim 5: The proof is by first showing that for any a, b E k with a b, and any u k m/l, there exists a profile P L(X) u such that App l (g( a) P) App l (g( b) P). Then, following a similar argument as in the proof for Claim 4, we have that C m,k,u (App l ) = Ω(m log(1 + kl /m)). It follows from the claims that the proposition is true. Proof of Theorem 2: The upper bounds are shown by the compilation functions fm,k,? Borda, f Borda Borda and fm,k,u We prove the theorem for the case in which k is even. The case in which k is odd can be proved similarly. Let fm,k,? Borda Borda and f be the same as defined in the sketch of proof for Theorem 2. Claim 6 For any k > k such that k k is even, any e 1,...,e (m 1)/2 such that for any i (m 1)/2, k i e i k (i + 1), and any permutation π over {1,..., (m 1)/2 }, there exists a profile P L(X) k such that the first (m 1)/2 components of f B (P) are e π(1),...,e π( (m 1)/2 ), and the last component of f B (P) is 0. Proof of Claim 6: Similar as the proof of Proposition 4 in (Chevaleyre et al. 2009). For any such (e 1,..., e (m 1)/2 ) in Claim 6, and any permutation π of {1,..., (m 1)/2 }, let g(e π(1),...,e π( (m 1)/2 ) ) be a profile that is composed of k votes and satisfies the conditions in Claim 6. Let E k,k = {g(e π(1),...,e π( (m 1)/2 ) )}. Claim 7 For any even number k, any u 5k, and any P 1, P 2 E k,k, there exists a profile P L(X) u such that Borda(P 1 P) Borda(P 2 P) Proof of Claim 7: For any P 1, P 2 E k,k with P 1 P 2, let a = fm,k,? Borda (P 1) and b = fm,k,? Borda (P 2). W.l.o.g. a 1 > b 1 and u is even (the proof for the case in which u is odd is slightly different). Let P be a profile that is composed of k votes and P satisfies the following conditions. S P (c 1 ) = (m 1)k a 1, S P (c m ) = (m 1)k. for any 2 i m 1, S P (c i ) (m 1)k /2 + m 2. P is well-defined, because we simply put c m in the first place of each vote, and rank c 1 properly to ensure that S P (c 1 ) = (m 1)k a 1 (we note that a 1 k ). Then, we divide the k votes into k /2 pairs, such that in each pair of votes, c 2... c m 1 in one of the two votes, and c m 1... c 2 in the other vote. It follows that the profile defined in this way satisfies the two conditions above. Let P be the profile that is composed of u u/5 votes, such that half of P are c 1 c m c 2... c m 1, and the other half of P are c m c 1 c m 1... c 2. We have that S P P (c 1)+a 1 = S P P (c m), and for any 2 i m 1, S P P (c m) S P P (c i)+(m 1)k. Let P = P P. It follows that Borda(P 1 P) = c 1 c m = Borda(P 2 P). It follows from Claim 6 and Claim 7 that if k u/5, then C m,k,u (Borda) log E k, u/5 = Ω(m log mu); if k u/5, then C m,k,u (Borda) log E k,k = Ω(m log mk). The lower bounds in the theorem is obtained by letting k (resp., u) go to infinity. Proof of Theorem 3: Again, the upper bounds are easily observed in the compilation functions given in the sketch of the proof in the main text. We assume m is divided by 6 to simplify the proof. The other cases can be proved similarly. Let A, B, D 1, D 2, D 3, D 4, D be a partition of X such that A = B = D 1 = D 2 = D 3 = D 4 = m, where m = m/6. Let A = {a 1,..., a m } and B = {b 1,..., b m }. Here D is the alternatives that will be ranked in the bottom positions in all votes. For any q N, we let E q N (m ) 2 0 be the set of vectors for each of which, all components are no more than q. That is, E q = { e N (m ) 2 0 : i, j (m ) 2, e i,j q}. Let π 1 be the cyclic permutation over {1,..., m }, that is, π 1 : m 1; let π 2 be the cyclic permutation over {1, 2, 3, 4}, that is, π 2 : Case 1: u > k m. We make the following claim. Claim 8 For any e E k/m, there exists a k-profile P such that fm,k,? Bu (P) = e, and for any alternative c, the number of times that c is ranked within top m/6 positions is no more than k/2. Proof of Claim 8: We construct the profile P = (V 1,..., V k ) in the following steps. For any j k, let V j = [D π j 2 (1) b π 1(1)... b π1(m ) D π j 2 (2) D π j 2 (3) D π j 2 (4) A D ]. We note that for any i, j m, b i is ranked in the (m + j)th position for at least k/m times. For any i, j m, in e i,j differently votes in P such that b i is ranked in the (m + j)th position, we exchanges a i and b i. It is easy to see that fm,k,? Bu (P) = e, and we note that the alternatives in D 1, D 2, D 3, D 4 are ranked in a cyclic way. It follows that each alternative is ranked in top 2m positions for no more than k/2 times. Let g be a function that assigns each e E k/m a k-profile that satisfies all conditions in Claim 8. We remember that g(e k/m ) = {g( e) : e E k/m }. Let E E k/m be a set that is composed of all vectors e E k/m such that the last m components of e are 0. That is, for any e E, a m is never ranked in the top 2m positions in g( e). Claim 9 For any P 1, P 2 g(e ) with P 1 P 2, there exists a u-profile P such that Bucklin(P 1 P) Bucklin(P 2 P). Proof of Claim 9: Let fm,k,? Bu (P 1) = e 1 = (e 1 1,1,..., e 1 m,m ) and fbu m,k,? (P 2) = e 2 = (e 2 1,1,..., e2 m,m ). Because P 1 P 2, there exist i, j m such that the e ( i, j) 1 e ( i, j) 2 and for all j < j, e ( i, j) 1 = e ( i, j) 2. W.l.o.g. e ( i, j) 1 > e ( i, j) 2. Let u = j j =1 e (i, j) 1. We have that u k. We let P be a u-profile, defined in the following steps.

10 For any j u, let V j = [D π2(1) D π2(2) D π2(3) D π2(4) A B D ], where π 2 is the cyclic permutation over {1, 2, 3, 4}. For any j (k + u)/2 u, in V j we exchange a i and the alternative that is ranked in the top position. For any j (k + u)/2, in V j we exchange a m and the alternative that is ranked in the second position. It follows that in P 1 P, the Bucklin score of a i and a m is j, and the Bucklin score of any other alternative is larger than j; in P 2 P, the Bucklin score of a m is j, and the Bucklin score of any other alternative is larger than j. Therefore, Bucklin(P 1 P) = a i (because ties are broken in favor of a i ), and Bucklin(P 2 P) = a m. This completes the proof for the Claim. It follows from Claim 9 that C m,k,u (Bucklin) log E = log( k/m 1) (m ) 2 = Ω(m 2 log(1 + k/m)). Case 2: k u m. Let k = k u + 1. Wl.o.g. k is even (otherwise we let k = k u + 2). We let the first k votes be defined as follows. For any j k such that j is odd, we let V j = [A D π j+1(1) D π j+1(2) D π j+1(3) D π j+1(4) B D ]. For any j k such that j is even, we let V j = [B D π j+1(1) D π j+1(2) D π j+1(3) D π j+1(4) A D ]. Let P = (V 1,..., V k ). It follows that in P, for any c A B, c is ranked in top m positions for exactly k /2 times; and any other alternative is ranked in top top m positions for no more than k /2 times. We note that for any profile P such that Bucklin(P) A and the Bucklin score of Bucklin(P) is between m and 2m, then Bucklin(P P) = Bucklin(P). That means, the votes in P cancels out in some sense. Therefore, the problem to a new instance in which k = k k = u 1 and u = u, which is covered by Case 1. Hence, we have that C m,k,u (Bucklin) C m,u 1,u (Bucklin) = Ω(m 2 log(1 + u/m)). Proof of Proposition 4: The proposition follows from the following observation: For any profile P, the absolute value of every component of f UMG (P) is no more than u + 1, and the absolute value of every component of f OPE (P) is no more than (u + 1)m. Proof of Proposition 5: We prove that there exists a constant q > 0 such that if k q(u 1)m/ logm, then C m,k,u (r) = Ω(m 2 log( k log m/qm 1)); if q(u 1)m/ logm k, then C m,k,u (r) = Ω(m 2 log u). To prove the theorem, we first make a claim, which follows from a theorem proved by Erdös and Moser (Erdös and Moser 1964). (Their studied a slightly different problem, but the proof can be easily extended to prove the following claim.) Claim 10 (Follows from the main result of (Erdös and Moser 1964)) Let l N, M be a weighted-majority graph such that 1. the weights on all edges are even, and the absolute value of the any weight is no more than l. There exists a profile P that is composed of O(lm/ log m) votes such that M P = M. We first prove that there exists a constant q > 0 such that for any k qum/ logm, C m,k,u (r) = Ω(m 2 log u). For any l N, let M 1 l (M 2 l ) be the set of all weighted majority graphs of m vertices, such that the absolute weight of each edge is odd (even), and no more than l. It follows from Claim 10 that there exists a constant q > 0 such that for any k qm(u 1)/ logm, if k is odd (even), then each weighted majority graph in M 1 u 1 (M 2 u 1) can be realized by k votes. Chevaleyre et al (2009) has proved that for any pair of profiles P 1, P 2 whose corresponding weighted majority graphs are different and either both in M 1 u 1 or in M 2 u 1, there exists a profile P that is composed of u votes, and r(p 1 P) r(p 2 P). We also note that log M 1 u 1 = Θ(m2 log u) and log M 2 u 1 = Θ(m 2 log u). Therefore, we have that C m,k,u (r) = Ω(m 2 log u). Next, we prove the lower bound for the case in which k < qm(u 1)/ log m. It follows that if k is odd (even), then any weighted majority graph in M 1 k log m/qm (M 2 k log m/qm ) can be realized by k votes. We note that log M 1 k log m/qm m2 log( k log m/qm 1), log M 2 k log m/qm m2 log( k log m/qm 1). Therefore, we have that C m,k,u (r) = Ω(m 2 log( k log m/qm 1). Proof of Theorem 6: The upper bound can be easily observed from the compilation function shown in the sketch of the proof. Let q be the positive number in Claim 10. We prove the following claim. Claim 11 { Ω(m C m,k,u (r) = 2 log k) if k q(u 1)m/(2 logm) Ω(m 2 log u) if q(u 1)m/(2 logm) k Proof of Claim 11: The proof is similar with the proof for Proposition 5. First we prove the proposition for the case k q(u 1)m/(2 logm). We remember that in the proof of Proposition 5, for any P 1, P 2 whose weighted majority graphs are different, and both graphs are in M 1 k log m/qm (or both in M 2 k log m/qm ), there exists a k log m/qm -profile P such that the Condorcet winner for P 1 P is different from the Condorcet winner for P 2 P. Let the Condorcet winner for P 1 P and P 2 P be a and b, respectively. We next show that there exists a u-profile P such that Pluo(P 1 P ) = a and Pluo(P 1 P ) = b. We obtain P as follows. The fist k log m/qm votes of P comes from P by raising a and b to the first and second positions (while keeping their relative positions the same); in the remaining u k log m/qm votes, in half of the votes a is ranked in the top position, and in the remaining half, b is ranked in the top position. We note that because k q(u 1)m/(2 log m), we must have u k log m/qm k. Therefore, a and b enters the runoffs for both P 1 P and P 2 P. It follows that Pluo(P 1 P ) = a and Pluo(P 1 P ) = b. Hence, C m,k,u (Pluo) C m,k, k log m/qm (Pluo) = Ω(m 2 log( k log m/qm 1)) = Ω(m 2 log k) (because k = Ω(m 1+ǫ )). Similarly we can prove that if q(u 1)m/(2 log m) k, C m,k,u (Pluo) = Ω(m 2 log u).

Stackelberg Voting Games: Computational Aspects and Paradoxes

Stackelberg Voting Games: Computational Aspects and Paradoxes Stackelberg Voting Games: Computational Aspects and Paradoxes Lirong Xia Department of Computer Science Duke University Durham, NC 7708, USA lxia@cs.duke.edu Vincent Conitzer Department of Computer Science

More information

Dominating Manipulations in Voting with Partial Information

Dominating Manipulations in Voting with Partial Information Dominating Manipulations in Voting with Partial Information Vincent Conitzer Department of Computer Science Duke University Durham, NC 27708, USA conitzer@cs.duke.edu Toby Walsh NICTA and UNSW Sydney,

More information

Combining Voting Rules Together

Combining Voting Rules Together Combining Voting Rules Together Nina Narodytska and Toby Walsh and Lirong Xia 3 Abstract. We propose a simple method for combining together voting rules that performs a run-off between the different winners

More information

Complexity of unweighted coalitional manipulation under some common voting rules

Complexity of unweighted coalitional manipulation under some common voting rules Complexity of unweighted coalitional manipulation under some common voting rules Lirong Xia, Vincent Conitzer, Ariel D. Procaccia, and Jeffrey S. Rosenschein Abstract In this paper, we study the computational

More information

Possible Winners When New Alternatives Join: New Results Coming Up!

Possible Winners When New Alternatives Join: New Results Coming Up! Possible Winners When New Alternatives Join: New Results Coming Up! Lirong Xia Dept. of Computer Science Duke University Durham, NC 7708, USA lxia@cs.duke.edu Jérôme Lang Jérôme Monnot LAMSADE Université

More information

Possible Winners when New Candidates Are Added: The Case of Scoring Rules

Possible Winners when New Candidates Are Added: The Case of Scoring Rules Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence (AAAI-0) Possible Winners when New Candidates Are Added: The Case of Scoring Rules Yann Chevaleyre and Jérôme Lang and Nicolas

More information

Complexity of Unweighted Coalitional Manipulation Under Some Common Voting Rules

Complexity of Unweighted Coalitional Manipulation Under Some Common Voting Rules Complexity of Unweighted Coalitional Manipulation Under Some Common Voting Rules Lirong Xia Michael Zuckerman Ariel D. Procaccia Vincent Conitzer Jeffrey S. Rosenschein Department of Computer Science,

More information

Voting on Multiattribute Domains with Cyclic Preferential Dependencies

Voting on Multiattribute Domains with Cyclic Preferential Dependencies Voting on Multiattribute Domains with Cyclic Preferential Dependencies Lirong Xia Department of Computer Science Duke University Durham, NC 27708, USA lxia@cs.duke.edu Vincent Conitzer Department of Computer

More information

A Maximum Likelihood Approach towards Aggregating Partial Orders

A Maximum Likelihood Approach towards Aggregating Partial Orders A Maximum Likelihood Approach towards Aggregating Partial Orders Lirong Xia Department of Computer Science Duke University Durham, NC 27708, USA lxia@cs.duke.edu Vincent Conitzer Department of Computer

More information

An NTU Cooperative Game Theoretic View of Manipulating Elections

An NTU Cooperative Game Theoretic View of Manipulating Elections An NTU Cooperative Game Theoretic View of Manipulating Elections Michael Zuckerman 1, Piotr Faliszewski 2, Vincent Conitzer 3, and Jeffrey S. Rosenschein 1 1 School of Computer Science and Engineering,

More information

Possible and necessary winners in voting trees: majority graphs vs. profiles

Possible and necessary winners in voting trees: majority graphs vs. profiles Possible and necessary winners in voting trees: majority graphs vs. profiles Maria Silvia Pini University of Padova Padova, Italy mpini@math.unipd.it Francesca Rossi University of Padova Padova, Italy

More information

Probabilistic Possible Winner Determination

Probabilistic Possible Winner Determination Probabilistic Possible Winner Determination Yoram Bachrach Microsoft Research Ltd. Cambridge, UK Nadja Betzler Institut für Informatik Friedrich-Schiller-Universität Jena Jena, Germany Piotr Faliszewski

More information

Preference Functions That Score Rankings and Maximum Likelihood Estimation

Preference Functions That Score Rankings and Maximum Likelihood Estimation Preference Functions That Score Rankings and Maximum Likelihood Estimation Vincent Conitzer Department of Computer Science Duke University Durham, NC 27708, USA conitzer@cs.duke.edu Matthew Rognlie Duke

More information

Voting with Partial Information: What Questions to Ask?

Voting with Partial Information: What Questions to Ask? Voting with Partial Information: What Questions to Ask? Ning Ding and Fangzhen Lin Department of Computer Science and Engineering Hong Kong University of Science and Technology Clear Water Bay Road, Hong

More information

Complexity of Shift Bribery in Hare, Coombs, Baldwin, and Nanson Elections

Complexity of Shift Bribery in Hare, Coombs, Baldwin, and Nanson Elections Complexity of Shift Bribery in Hare, Coombs, Baldwin, and Nanson Elections Cynthia Maushagen, Marc Neveling, Jörg Rothe, and Ann-Kathrin Selker Institut für Informatik Heinrich-Heine-Universität Düsseldorf

More information

Approximation Algorithms and Mechanism Design for Minimax Approval Voting

Approximation Algorithms and Mechanism Design for Minimax Approval Voting Approximation Algorithms and Mechanism Design for Minimax Approval Voting Ioannis Caragiannis RACTI & Department of Computer Engineering and Informatics University of Patras, Greece caragian@ceid.upatras.gr

More information

Approximation Algorithms and Mechanism Design for Minimax Approval Voting 1

Approximation Algorithms and Mechanism Design for Minimax Approval Voting 1 Approximation Algorithms and Mechanism Design for Minimax Approval Voting 1 Ioannis Caragiannis, Dimitris Kalaitzis, and Evangelos Markakis Abstract We consider approval voting elections in which each

More information

Complexity of Shift Bribery in Iterative Elections

Complexity of Shift Bribery in Iterative Elections Complexity of Shift Bribery in Iterative Elections Cynthia Maushagen, Marc Neveling, Jörg Rothe, and Ann-Kathrin Selker Heinrich-Heine-Universität Düsseldorf Düsseldorf, Germany {maushagen,neveling,rothe,selker}@cs.uni-duesseldorf.de

More information

Social Dichotomy Functions (extended abstract)

Social Dichotomy Functions (extended abstract) Social Dichotomy Functions (extended abstract) Conal Duddy, Nicolas Houy, Jérôme Lang, Ashley Piggins, and William S. Zwicker February 22, 2014 1 What is a Social Dichotomy Function? A dichotomy A = (A

More information

Ties Matter: Complexity of Voting Manipulation Revisited

Ties Matter: Complexity of Voting Manipulation Revisited Proceedings of the Twenty-Second International Joint Conference on Artificial Intelligence Ties Matter: Complexity of Voting Manipulation Revisited Svetlana Obraztsova Edith Elkind School of Physical and

More information

Computational Aspects of Strategic Behaviour in Elections with Top-Truncated Ballots

Computational Aspects of Strategic Behaviour in Elections with Top-Truncated Ballots Computational Aspects of Strategic Behaviour in Elections with Top-Truncated Ballots by Vijay Menon A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree

More information

Survey of Voting Procedures and Paradoxes

Survey of Voting Procedures and Paradoxes Survey of Voting Procedures and Paradoxes Stanford University ai.stanford.edu/ epacuit/lmh Fall, 2008 :, 1 The Voting Problem Given a (finite) set X of candidates and a (finite) set A of voters each of

More information

Aggregating Conditionally Lexicographic Preferences on Multi-Issue Domains

Aggregating Conditionally Lexicographic Preferences on Multi-Issue Domains Aggregating Conditionally Lexicographic Preferences on Multi-Issue Domains Jérôme Lang, Jérôme Mengin, and Lirong Xia Abstract One approach to voting on several interrelated issues consists in using a

More information

APPLIED MECHANISM DESIGN FOR SOCIAL GOOD

APPLIED MECHANISM DESIGN FOR SOCIAL GOOD APPLIED MECHANISM DESIGN FOR SOCIAL GOOD JOHN P DICKERSON Lecture #21 11/8/2016 CMSC828M Tuesdays & Thursdays 12:30pm 1:45pm IMPOSSIBILITY RESULTS IN VOTING THEORY / SOCIAL CHOICE Thanks to: Tuomas Sandholm

More information

Ties Matter: Complexity of Manipulation when Tie-breaking with a Random Vote

Ties Matter: Complexity of Manipulation when Tie-breaking with a Random Vote Ties Matter: Complexity of Manipulation when Tie-breaking with a Random Vote Haris Aziz, Serge Gaspers, Nicholas Mattei, Nina Narodytska, and Toby Walsh NICTA and UNSW Sydney, Australia {haris.aziz, serge.gaspers,

More information

Mechanism Design for Bounded Agents

Mechanism Design for Bounded Agents Chapter 8 Mechanism Design for Bounded Agents Any fool can tell the truth, but it requires a man of some sense to know how to lie well. Samuel Butler Mechanism design has traditionally taken the conservative

More information

How Bad is Selfish Voting?

How Bad is Selfish Voting? How Bad is Selfish Voting? Simina Brânzei Aarhus University simina@cs.au.dk Ioannis Caragiannis University of Patras caragian@ceid.upatras.gr Jamie Morgenstern Carnegie Mellon University jamiemmt@cs.cmu.edu

More information

Social Choice. Jan-Michael van Linthoudt

Social Choice. Jan-Michael van Linthoudt Social Choice Jan-Michael van Linthoudt Summer term 2017 Version: March 15, 2018 CONTENTS Remarks 1 0 Introduction 2 1 The Case of 2 Alternatives 3 1.1 Examples for social choice rules............................

More information

Winner Determination in Sequential Majority Voting

Winner Determination in Sequential Majority Voting Winner Determination in Sequential Majority Voting J. Lang 1, M. S. Pini 2, F. Rossi 2, K.. Venable 2 and T. Walsh 3 1: IRIT, Toulouse, France lang@irit.fr 2: Department of Pure and pplied Mathematics,

More information

CMU Social choice 2: Manipulation. Teacher: Ariel Procaccia

CMU Social choice 2: Manipulation. Teacher: Ariel Procaccia CMU 15-896 Social choice 2: Manipulation Teacher: Ariel Procaccia Reminder: Voting Set of voters Set of alternatives Each voter has a ranking over the alternatives means that voter prefers to Preference

More information

Computing with voting trees

Computing with voting trees Computing with voting trees Jennifer Iglesias Nathaniel Ince Po-Shen Loh Abstract The classical paradox of social choice theory asserts that there is no fair way to deterministically select a winner in

More information

Single-peaked consistency and its complexity

Single-peaked consistency and its complexity Bruno Escoffier, Jérôme Lang, Meltem Öztürk Abstract A common way of dealing with the paradoxes of preference aggregation consists in restricting the domain of admissible preferences. The most well-known

More information

Aggregating Conditionally Lexicographic Preferences on Multi-Issue Domains

Aggregating Conditionally Lexicographic Preferences on Multi-Issue Domains Aggregating Conditionally Lexicographic Preferences on Multi-Issue Domains Jérôme Lang 1, Jérôme Mengin 2, and Lirong Xia 3 1 LAMSADE, Université Paris-Dauphine, France, lang@lamsade.dauphine.fr 2 IRIT,

More information

How Bad is Selfish Voting?

How Bad is Selfish Voting? How Bad is Selfish Voting? Simina Brânzei Aarhus University simina@cs.au.dk Ioannis Caragiannis University of Patras caragian@ceid.upatras.gr Jamie Morgenstern Carnegie Mellon University jamiemmt@cs.cmu.edu

More information

Arrow s Paradox. Prerna Nadathur. January 1, 2010

Arrow s Paradox. Prerna Nadathur. January 1, 2010 Arrow s Paradox Prerna Nadathur January 1, 2010 Abstract In this paper, we examine the problem of a ranked voting system and introduce Kenneth Arrow s impossibility theorem (1951). We provide a proof sketch

More information

Multivariate Complexity of Swap Bribery

Multivariate Complexity of Swap Bribery Multivariate Complexity of Swap Bribery Britta Dorn 1 joint work with Ildikó Schlotter 2 1 Eberhard-Karls-Universität Tübingen/Universität Ulm, Germany 2 Budapest University of Technology and Economics,

More information

Dr. Y. İlker TOPCU. Dr. Özgür KABAK web.itu.edu.tr/kabak/

Dr. Y. İlker TOPCU. Dr. Özgür KABAK web.itu.edu.tr/kabak/ Dr. Y. İlker TOPCU www.ilkertopcu.net www.ilkertopcu.org www.ilkertopcu.info facebook.com/yitopcu twitter.com/yitopcu instagram.com/yitopcu Dr. Özgür KABAK web.itu.edu.tr/kabak/ Decision Making? Decision

More information

Strategy-Proofness on the Condorcet Domain

Strategy-Proofness on the Condorcet Domain College of William and Mary W&M ScholarWorks Undergraduate Honors Theses Theses, Dissertations, & Master Projects 5-2008 Strategy-Proofness on the Condorcet Domain Lauren Nicole Merrill College of William

More information

Parliamentary Voting Procedures: Agenda Control, Manipulation, and Uncertainty

Parliamentary Voting Procedures: Agenda Control, Manipulation, and Uncertainty Journal of Artificial Intelligence Research 59 (2017) 133 173 Submitted 12/16; published 06/17 Parliamentary Voting Procedures: Agenda Control, Manipulation, and Uncertainty Robert Bredereck Institut für

More information

How Credible is the Prediction of a Party-Based Election?

How Credible is the Prediction of a Party-Based Election? How Credible is the Prediction of a Party-Based Election? Jiong Guo Shandong University School of Computer Science and Technology SunHua Road 1500, 250101 Jinan, China. jguo@mmci.unisaarland.de Yash Raj

More information

Voting Handout. Election from the text, p. 47 (for use during class)

Voting Handout. Election from the text, p. 47 (for use during class) Voting Handout Election from the text, p. 47 (for use during class) 3 2 1 1 2 1 1 1 1 2 A B B B D D E B B E C C A C A A C E E C D D C A B E D C C A E E E E E B B A D B B A D D C C A D A D 1. Use the following

More information

Tree sets. Reinhard Diestel

Tree sets. Reinhard Diestel 1 Tree sets Reinhard Diestel Abstract We study an abstract notion of tree structure which generalizes treedecompositions of graphs and matroids. Unlike tree-decompositions, which are too closely linked

More information

Proof Techniques (Review of Math 271)

Proof Techniques (Review of Math 271) Chapter 2 Proof Techniques (Review of Math 271) 2.1 Overview This chapter reviews proof techniques that were probably introduced in Math 271 and that may also have been used in a different way in Phil

More information

Coalitionally strategyproof functions depend only on the most-preferred alternatives.

Coalitionally strategyproof functions depend only on the most-preferred alternatives. Coalitionally strategyproof functions depend only on the most-preferred alternatives. H. Reiju Mihara reiju@ec.kagawa-u.ac.jp Economics, Kagawa University, Takamatsu, 760-8523, Japan April, 1999 [Social

More information

Assigning indivisible and categorized items

Assigning indivisible and categorized items Assigning indivisible and categorized items Lirong Xia Computer Science Department Rensselaer Polytechnic Institute 110 8th Street, Troy, NY 12180, USA xial@cs.rpi.edu Abstract In this paper, we study

More information

CONNECTING PAIRWISE AND POSITIONAL ELECTION OUTCOMES

CONNECTING PAIRWISE AND POSITIONAL ELECTION OUTCOMES CONNECTING PAIRWISE AND POSITIONAL ELECTION OUTCOMES DONALD G SAARI AND TOMAS J MCINTEE INSTITUTE FOR MATHEMATICAL BEHAVIORAL SCIENCE UNIVERSITY OF CALIFORNIA, IRVINE, CA 9697-5100 Abstract General conclusions

More information

Robust Draws in Balanced Knockout Tournaments

Robust Draws in Balanced Knockout Tournaments Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence (IJCAI-6) Robust Draws in Balanced Knockout Tournaments Krishnendu Chatterjee, Rasmus Ibsen-Jensen, Josef Tkadlec

More information

Modal Ranking: A Uniquely Robust Voting Rule

Modal Ranking: A Uniquely Robust Voting Rule Modal Ranking: A Uniquely Robust Voting Rule Ioannis Caragiannis University of Patras caragian@ceid.upatras.gr Ariel D. Procaccia Carnegie Mellon University arielpro@cs.cmu.edu Nisarg Shah Carnegie Mellon

More information

Volume 31, Issue 1. Manipulation of the Borda rule by introduction of a similar candidate. Jérôme Serais CREM UMR 6211 University of Caen

Volume 31, Issue 1. Manipulation of the Borda rule by introduction of a similar candidate. Jérôme Serais CREM UMR 6211 University of Caen Volume 31, Issue 1 Manipulation of the Borda rule by introduction of a similar candidate Jérôme Serais CREM UMR 6211 University of Caen Abstract In an election contest, a losing candidate a can manipulate

More information

Economics Bulletin, 2012, Vol. 32 No. 1 pp Introduction. 2. The preliminaries

Economics Bulletin, 2012, Vol. 32 No. 1 pp Introduction. 2. The preliminaries 1. Introduction In this paper we reconsider the problem of axiomatizing scoring rules. Early results on this problem are due to Smith (1973) and Young (1975). They characterized social welfare and social

More information

Efficient Algorithms for Hard Problems on Structured Electorates

Efficient Algorithms for Hard Problems on Structured Electorates Aspects of Computation 2017 Efficient Algorithms for Hard Problems on Structured Electorates Neeldhara Misra The standard Voting Setup and some problems that we will encounter. The standard Voting Setup

More information

A Borda Count for Collective Sentiment Analysis

A Borda Count for Collective Sentiment Analysis A Borda Count for Collective Sentiment Analysis Umberto Grandi Department of Mathematics University of Padova 10 February 2014 Joint work with Andrea Loreggia (Univ. Padova), Francesca Rossi (Univ. Padova)

More information

6.207/14.15: Networks Lecture 24: Decisions in Groups

6.207/14.15: Networks Lecture 24: Decisions in Groups 6.207/14.15: Networks Lecture 24: Decisions in Groups Daron Acemoglu and Asu Ozdaglar MIT December 9, 2009 1 Introduction Outline Group and collective choices Arrow s Impossibility Theorem Gibbard-Satterthwaite

More information

Approval Voting: Three Examples

Approval Voting: Three Examples Approval Voting: Three Examples Francesco De Sinopoli, Bhaskar Dutta and Jean-François Laslier August, 2005 Abstract In this paper we discuss three examples of approval voting games. The first one illustrates

More information

Artificial Intelligence

Artificial Intelligence Artificial Intelligence 173 (2009) 1133 1149 Contents lists available at ScienceDirect Artificial Intelligence www.elsevier.com/locate/artint The learnability of voting rules Ariel D. Procaccia a,,1,avivzohar

More information

arxiv: v1 [cs.gt] 8 Sep 2015

arxiv: v1 [cs.gt] 8 Sep 2015 Parliamentary Voting Procedures: Agenda Control, Manipulation, and Uncertainty Robert Bredereck 1, Jiehua Chen 1, Rolf Niedermeier 1, and Toby Walsh 2 arxiv:1509.02424v1 [cs.gt] 8 Sep 2015 1 Institut für

More information

Non-Manipulable Domains for the Borda Count

Non-Manipulable Domains for the Borda Count Non-Manipulable Domains for the Borda Count Martin Barbie, Clemens Puppe * Department of Economics, University of Karlsruhe D 76128 Karlsruhe, Germany and Attila Tasnádi ** Department of Mathematics, Budapest

More information

When Does Schwartz Conjecture Hold?

When Does Schwartz Conjecture Hold? Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence (IJCAI 015) When Does Schwartz Conjecture Hold? Matthias Mnich Universität Bonn Bonn, Germany Yash Raj Shrestha

More information

Multiple Equilibria in the Citizen-Candidate Model of Representative Democracy.

Multiple Equilibria in the Citizen-Candidate Model of Representative Democracy. Multiple Equilibria in the Citizen-Candidate Model of Representative Democracy. Amrita Dhillon and Ben Lockwood This version: March 2001 Abstract De Sinopoli and Turrini (1999) present an example to show

More information

Exact and Approximate Equilibria for Optimal Group Network Formation

Exact and Approximate Equilibria for Optimal Group Network Formation Exact and Approximate Equilibria for Optimal Group Network Formation Elliot Anshelevich and Bugra Caskurlu Computer Science Department, RPI, 110 8th Street, Troy, NY 12180 {eanshel,caskub}@cs.rpi.edu Abstract.

More information

Instituto de Engenharia de Sistemas e Computadores de Coimbra Institute of Systems Engineering and Computers INESC - Coimbra

Instituto de Engenharia de Sistemas e Computadores de Coimbra Institute of Systems Engineering and Computers INESC - Coimbra Instituto de Engenharia de Sistemas e Computadores de Coimbra Institute of Systems Engineering and Computers INESC - Coimbra Claude Lamboray Luis C. Dias Pairwise support maximization methods to exploit

More information

A Framework for Aggregating CP-nets

A Framework for Aggregating CP-nets A Framework for Aggregating CP-nets 9 In this chapter, we define a new family of voting rules for combinatorial voting that allows voters to use any CP-nets (even cyclic ones) to represent their preferences.

More information

Voting with CP-nets using a Probabilistic Preference Structure

Voting with CP-nets using a Probabilistic Preference Structure Voting with CP-nets using a Probabilistic Preference Structure Cristina Cornelio, Umberto Grandi, Judy Goldsmith, Nicholas Mattei, Francesca Rossi and K. Brent Venable Abstract Probabilistic conditional

More information

13 Social choice B = 2 X X. is the collection of all binary relations on X. R = { X X : is complete and transitive}

13 Social choice B = 2 X X. is the collection of all binary relations on X. R = { X X : is complete and transitive} 13 Social choice So far, all of our models involved a single decision maker. An important, perhaps the important, question for economics is whether the desires and wants of various agents can be rationally

More information

arxiv: v1 [cs.gt] 28 Feb 2017

arxiv: v1 [cs.gt] 28 Feb 2017 Proportional Representation in Vote Streams Palash Dey Tata Institute of Fundamental Research Mumbai, India palash.dey@tifr.res.in Nimrod Talmon Weizmann Institute of Science Rehovot, Israel nimrodtalmon77@gmail.com

More information

Power in the US Legislature

Power in the US Legislature Power in the US Legislature Victoria Powers May 16, 2017 Abstract Using a standard model of the US legislative system as a monotonic simple game, we look at rankings of the four types of players the president,

More information

Computing Optimal Outcomes under an Expressive Representation of Settings with Externalities

Computing Optimal Outcomes under an Expressive Representation of Settings with Externalities Computing Optimal Outcomes under an Expressive Representation of Settings with Externalities Vincent Conitzer Department of Computer Science Duke University Durham, NC 27708, USA conitzer@cs.duke.edu Tuomas

More information

Online Appendix to Strategy-proof tie-breaking in matching with priorities

Online Appendix to Strategy-proof tie-breaking in matching with priorities Online Appendix to Strategy-proof tie-breaking in matching with priorities Lars Ehlers Alexander Westkamp December 12, 2017 Section 1 contains the omitted proofs of Lemma 5, Lemma 6 and Lemma 7 Subsection

More information

Working Together: Committee Selection and the Supermodular Degree

Working Together: Committee Selection and the Supermodular Degree Working Together: Committee Selection and the Supermodular Degree Rani Izsak Department of Computer Science and Applied Mathematics Weizmann Institute of Science Rehovot, Israel ran.izsak@weizmann.ac.il

More information

Anyone But Them: The Complexity Challenge for A Resolute Election Controller

Anyone But Them: The Complexity Challenge for A Resolute Election Controller Anyone But Them: The Complexity Challenge for A Resolute Election Controller Yongjie Yang 1 School of Information Science and Engineering Central South University, Changsha, China 2 Chair of Economic Theory

More information

Parameterization of Strategy-Proof Mechanisms in the Obnoxious Facility Game

Parameterization of Strategy-Proof Mechanisms in the Obnoxious Facility Game Journal of Graph Algorithms and Applications http://jgaa.info/ vol. 2, no. 3, pp. 247 263 (207) DOI: 0.755/jgaa.0045 Parameterization of Strategy-Proof Mechanisms in the Obnoxious Facility Game Morito

More information

Computing the Margin of Victory for Various Voting Rules

Computing the Margin of Victory for Various Voting Rules Computing the Margin of Victory for Various Voting Rules Lirong Xia, School of Engineering and Applied Sciences, Harvard University, lxia@seas.harvard.edu The margin of victory of an election, defined

More information

Recap Social Choice Fun Game Voting Paradoxes Properties. Social Choice. Lecture 11. Social Choice Lecture 11, Slide 1

Recap Social Choice Fun Game Voting Paradoxes Properties. Social Choice. Lecture 11. Social Choice Lecture 11, Slide 1 Social Choice Lecture 11 Social Choice Lecture 11, Slide 1 Lecture Overview 1 Recap 2 Social Choice 3 Fun Game 4 Voting Paradoxes 5 Properties Social Choice Lecture 11, Slide 2 Formal Definition Definition

More information

CSCE 750 Final Exam Answer Key Wednesday December 7, 2005

CSCE 750 Final Exam Answer Key Wednesday December 7, 2005 CSCE 750 Final Exam Answer Key Wednesday December 7, 2005 Do all problems. Put your answers on blank paper or in a test booklet. There are 00 points total in the exam. You have 80 minutes. Please note

More information

Worst-Case Optimal Redistribution of VCG Payments in Multi-Unit Auctions

Worst-Case Optimal Redistribution of VCG Payments in Multi-Unit Auctions Worst-Case Optimal Redistribution of VCG Payments in Multi-Unit Auctions Mingyu Guo Duke University Dept. of Computer Science Durham, NC, USA mingyu@cs.duke.edu Vincent Conitzer Duke University Dept. of

More information

DIMACS Technical Report March Game Seki 1

DIMACS Technical Report March Game Seki 1 DIMACS Technical Report 2007-05 March 2007 Game Seki 1 by Diogo V. Andrade RUTCOR, Rutgers University 640 Bartholomew Road Piscataway, NJ 08854-8003 dandrade@rutcor.rutgers.edu Vladimir A. Gurvich RUTCOR,

More information

Exact and Approximate Equilibria for Optimal Group Network Formation

Exact and Approximate Equilibria for Optimal Group Network Formation Noname manuscript No. will be inserted by the editor) Exact and Approximate Equilibria for Optimal Group Network Formation Elliot Anshelevich Bugra Caskurlu Received: December 2009 / Accepted: Abstract

More information

Fair allocation of indivisible goods

Fair allocation of indivisible goods Fair allocation of indivisible goods Gabriel Sebastian von Conta Technische Universitt Mnchen mrgabral@gmail.com November 17, 2015 Gabriel Sebastian von Conta (TUM) Chapter 12 November 17, 2015 1 / 44

More information

Algorithmic Game Theory Introduction to Mechanism Design

Algorithmic Game Theory Introduction to Mechanism Design Algorithmic Game Theory Introduction to Mechanism Design Makis Arsenis National Technical University of Athens April 216 Makis Arsenis (NTUA) AGT April 216 1 / 41 Outline 1 Social Choice Social Choice

More information

The Axiomatic Method in Social Choice Theory:

The Axiomatic Method in Social Choice Theory: The Axiomatic Method in Social Choice Theory: Preference Aggregation, Judgment Aggregation, Graph Aggregation Ulle Endriss Institute for Logic, Language and Computation University of Amsterdam Ulle Endriss

More information

Two Case Studies for Trading Multiple Indivisible Goods with Indifferences

Two Case Studies for Trading Multiple Indivisible Goods with Indifferences Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence Two Case Studies for Trading Multiple Indivisible Goods with Indifferences Akihisa Sonoda, Etsushi Fujita, Taiki Todo, Makoto

More information

Binary Aggregation with Integrity Constraints

Binary Aggregation with Integrity Constraints Proceedings of the Twenty-Second International Joint Conference on Artificial Intelligence Binary Aggregation with Integrity Constraints Umberto Grandi and Ulle Endriss Institute for Logic, Language and

More information

FINITE ABELIAN GROUPS Amin Witno

FINITE ABELIAN GROUPS Amin Witno WON Series in Discrete Mathematics and Modern Algebra Volume 7 FINITE ABELIAN GROUPS Amin Witno Abstract We detail the proof of the fundamental theorem of finite abelian groups, which states that every

More information

An Equivalence result in School Choice

An Equivalence result in School Choice An Equivalence result in School Choice Jay Sethuraman May 2009 Abstract The main result of the paper is a proof of the equivalence of single and multiple lottery mechanisms for the problem of allocating

More information

Nontransitive Dice and Arrow s Theorem

Nontransitive Dice and Arrow s Theorem Nontransitive Dice and Arrow s Theorem Undergraduates: Arthur Vartanyan, Jueyi Liu, Satvik Agarwal, Dorothy Truong Graduate Mentor: Lucas Van Meter Project Mentor: Jonah Ostroff 3 Chapter 1 Dice proofs

More information

The Complexity of Computing Minimal Unidirectional Covering Sets

The Complexity of Computing Minimal Unidirectional Covering Sets The Complexity of Computing Minimal Unidirectional Covering Sets Dorothea Baumeister 1, Felix Brandt 2, Felix Fischer 3, Jan Hoffmann 2, and Jörg Rothe 1 1 Institut für Informatik, Heinrich-Heine-Universität

More information

From Sentiment Analysis to Preference Aggregation

From Sentiment Analysis to Preference Aggregation From Sentiment Analysis to Preference Aggregation Umberto Grandi Department of Mathematics University of Padova 22 November 2013 [Joint work with Andrea Loreggia, Francesca Rossi and Vijay Saraswat] What

More information

Basing Decisions on Sentences in Decision Diagrams

Basing Decisions on Sentences in Decision Diagrams Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence Basing Decisions on Sentences in Decision Diagrams Yexiang Xue Department of Computer Science Cornell University yexiang@cs.cornell.edu

More information

Probabilistic Aspects of Voting

Probabilistic Aspects of Voting Probabilistic Aspects of Voting UUGANBAATAR NINJBAT DEPARTMENT OF MATHEMATICS THE NATIONAL UNIVERSITY OF MONGOLIA SAAM 2015 Outline 1. Introduction to voting theory 2. Probability and voting 2.1. Aggregating

More information

Winning probabilities in a pairwise lottery system with three alternatives

Winning probabilities in a pairwise lottery system with three alternatives Economic Theory 26, 607 617 (2005) DOI: 10.1007/s00199-004-059-8 Winning probabilities in a pairwise lottery system with three alternatives Frederick H. Chen and Jac C. Heckelman Department of Economics,

More information

A lower bound for scheduling of unit jobs with immediate decision on parallel machines

A lower bound for scheduling of unit jobs with immediate decision on parallel machines A lower bound for scheduling of unit jobs with immediate decision on parallel machines Tomáš Ebenlendr Jiří Sgall Abstract Consider scheduling of unit jobs with release times and deadlines on m identical

More information

Pattern Popularity in 132-Avoiding Permutations

Pattern Popularity in 132-Avoiding Permutations Pattern Popularity in 132-Avoiding Permutations The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As Published Publisher Rudolph,

More information

SYSU Lectures on the Theory of Aggregation Lecture 2: Binary Aggregation with Integrity Constraints

SYSU Lectures on the Theory of Aggregation Lecture 2: Binary Aggregation with Integrity Constraints SYSU Lectures on the Theory of Aggregation Lecture 2: Binary Aggregation with Integrity Constraints Ulle Endriss Institute for Logic, Language and Computation University of Amsterdam [ http://www.illc.uva.nl/~ulle/sysu-2014/

More information

Positive Political Theory II David Austen-Smith & Je rey S. Banks

Positive Political Theory II David Austen-Smith & Je rey S. Banks Positive Political Theory II David Austen-Smith & Je rey S. Banks Egregious Errata Positive Political Theory II (University of Michigan Press, 2005) regrettably contains a variety of obscurities and errors,

More information

Economics 3012 Strategic Behavior Andy McLennan October 20, 2006

Economics 3012 Strategic Behavior Andy McLennan October 20, 2006 Economics 301 Strategic Behavior Andy McLennan October 0, 006 Lecture 11 Topics Problem Set 9 Extensive Games of Imperfect Information An Example General Description Strategies and Nash Equilibrium Beliefs

More information

Realization Plans for Extensive Form Games without Perfect Recall

Realization Plans for Extensive Form Games without Perfect Recall Realization Plans for Extensive Form Games without Perfect Recall Richard E. Stearns Department of Computer Science University at Albany - SUNY Albany, NY 12222 April 13, 2015 Abstract Given a game in

More information

Mechanism Design for Multiagent Systems

Mechanism Design for Multiagent Systems Mechanism Design for Multiagent Systems Vincent Conitzer Assistant Professor of Computer Science and Economics Duke University conitzer@cs.duke.edu Introduction Often, decisions must be taken based on

More information

A Compact Representation Scheme for Coalitional Games in Open Anonymous Environments

A Compact Representation Scheme for Coalitional Games in Open Anonymous Environments A Compact Representation Scheme for Coalitional Games in Open Anonymous Environments Naoki Ohta, Atsushi Iwasaki, Makoto Yokoo and Kohki Maruono ISEE, Kyushu University 6-10-1, Hakozaki, Higashi-ku, Fukuoka,

More information

Online Learning, Mistake Bounds, Perceptron Algorithm

Online Learning, Mistake Bounds, Perceptron Algorithm Online Learning, Mistake Bounds, Perceptron Algorithm 1 Online Learning So far the focus of the course has been on batch learning, where algorithms are presented with a sample of training data, from which

More information

arxiv: v1 [math.co] 13 Dec 2014

arxiv: v1 [math.co] 13 Dec 2014 SEARCHING FOR KNIGHTS AND SPIES: A MAJORITY/MINORITY GAME MARK WILDON arxiv:1412.4247v1 [math.co] 13 Dec 2014 Abstract. There are n people, each of whom is either a knight or a spy. It is known that at

More information