• Publications
  • Influence
Anyone but him: The complexity of precluding an alternative
TLDR
This paper studies in terms of complexity the vulnerability of preference aggregation to destructive control, and finds cases where systems immune or computationally resistant to a chair choosing the winner nonetheless are vulnerable to the chair blocking a victory. Expand
How Hard Is Bribery in Elections?
TLDR
This work obtains both polynomial-time bribery algorithms and proofs of the intractability of bribery, and results show that the complexity of bribery is extremely sensitive to the setting. Expand
Bypassing Combinatorial Protections: Polynomial-Time Algorithms for Single-Peaked Electorates
TLDR
This paper shows that for voters who follow the most central political-science model of electorates—single-peaked preferences—those protections vanish, and shows that NP-hard bribery problems—including those for Kemeny and Llull elections—fall to polynomial time. Expand
Exact analysis of Dodgson elections: Lewis Carroll's 1876 voting system is complete for parallel access to NP
TLDR
It follows that determining the winner in Carroll's elections is not NP-complete unless the polynomial hierarchy collapses, and the stronger lower bound and upper bound are provided that matches the lower bound. Expand
The satanic notations: counting classes beyond #P and other definitional adventures
TLDR
The potentially "off-by-one" nature of the definitions of counting (#P versus #NP), difference, and unambiguous (UP versus UNP; FewP versus FewNP) classes are explored, and suggestions as to logical approaches in each case are made. Expand
The Boolean Hierarchy I: Structural Properties
TLDR
The complexity of sets formed by boolean operations (union, intersection, and complement) on NP sets are studied, showing that in some relativized worlds the boolean hierarchy is infinite, and that for every k there is a relativization world in which the Boolean hierarchy extends exactly k levels. Expand
Llull and Copeland Voting Computationally Resist Bribery and Constructive Control
TLDR
Among systems with a polynomial-time winner problem, Copeland voting is the first natural election system proven to have full resistance to constructive control and vulnerability results for microbribery are proven via a novel technique involving min-cost network flow. Expand
Multimode Control Attacks on Elections
TLDR
This paper model and study the case in which the attacker launches a multipronged (i.e., multimode) attack, and proves that for various election systems even such concerted, flexible attacks can be perfectly planned in deterministic polynomial time. Expand
The complexity of manipulative attacks in nearly single-peaked electorates
TLDR
This paper studies the complexity of manipulative-action algorithms for elections over nearly single-peaked electorates, for various notions of nearness and various election systems. Expand
The shield that never was: Societies with single-peaked preferences are more open to manipulation and control
TLDR
It is argued that when electorates follow the canonical political science model of societal preferences the complexity shield never existed in the first place and it is shown that for electorates having single-peaked preferences, many existing NP-hardness results on manipulation and control evaporate. Expand
...
1
2
3
4
5
...