2009
DOI: 10.1002/malq.200810020
|View full text |Cite
|
Sign up to set email alerts
|

Sincere‐Strategy Preference‐Based Approval Voting Fully Resists Constructive Control and Broadly Resists Destructive Control

Abstract: We study sincere-strategy preference-based approval voting (SP-AV), a system proposed by Brams and Sanver [1] and here adjusted so as to coerce admissibility of the votes (rather than excluding inadmissible votes a priori), with respect to procedural control. In such control scenarios, an external agent seeks to change the outcome of an election via actions such as adding/deleting/partitioning either candidates or voters. SP-AV combines the voters' preference rankings with their approvals of candidates, where… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
62
0

Year Published

2009
2009
2017
2017

Publication Types

Select...
6
3

Relationship

4
5

Authors

Journals

citations
Cited by 54 publications
(63 citation statements)
references
References 31 publications
0
62
0
Order By: Relevance
“…When β = 1, Copeland β is known as Llull, a system defined by the mystic Ramon Llull in the thirteenth century (see Hägele & Pukelsheim, 2001). Llull's election system is known to be remarkably resistant, computationally, to bribery and control attacks (Faliszewski et al, 2009a, although see also Erdélyi, Nowak, & Rothe, 2009, Erdélyi & Rothe, 2010, Erdélyi, Piras, & Rothe, 2011, for different highly resistant systems, and see Hemaspaandra, Hemaspaandra, & Rothe, 2009, regarding how extremely resistant artificial systems can be constructed).…”
Section: Election Systems Preferences and Weakcondorcet Consistencymentioning
confidence: 99%
“…When β = 1, Copeland β is known as Llull, a system defined by the mystic Ramon Llull in the thirteenth century (see Hägele & Pukelsheim, 2001). Llull's election system is known to be remarkably resistant, computationally, to bribery and control attacks (Faliszewski et al, 2009a, although see also Erdélyi, Nowak, & Rothe, 2009, Erdélyi & Rothe, 2010, Erdélyi, Piras, & Rothe, 2011, for different highly resistant systems, and see Hemaspaandra, Hemaspaandra, & Rothe, 2009, regarding how extremely resistant artificial systems can be constructed).…”
Section: Election Systems Preferences and Weakcondorcet Consistencymentioning
confidence: 99%
“…The (parameterized) computational complexity of control problems is still open for many elections, e.g., Borda [25] and Sincerestrategy Preference-based Approval [10]. In the future, we will study them.…”
Section: Resultsmentioning
confidence: 99%
“…Many papers were devoted to the computational analysis of the hardness of how an external agent or a group of voters can skew the result of elections. The most studied scenarios are control [1,10,16,18,22], manipulation [2,6], bribery [13,15], and lobbying [5,9]. This paper focuses on control.…”
Section: Introductionmentioning
confidence: 98%
“…Such election modifications could be either introducing some new candidates or voters or removing some existing candidates or voters from the election or partitioning candidates or voters (Bartholdi III, Tovey, & Trick, 1992;Erdélyi, Nowak, & Rothe, 2009;Faliszewski, Hemaspaandra, Hemaspaandra, & Rothe, 2009;Hemaspaandra, Hemaspaandra, & Rothe, 2007;Menton, 2013;Menton & Singh, 2013;Faliszewski, Hemaspaandra, Hemaspaandra, & Rothe, 2011;Parkes & Xia, 2012). We focus on the computational complexity of election control by adding and deleting candidates (that is, candidate control), for the case where the election involves only a few voters.…”
Section: Introductionmentioning
confidence: 99%