Efficient, Private, and eps-Strategyproof Elicitation of Tournament Voting Rules
نویسنده
چکیده
Voting is commonly used as a method for aggregating information in crowdsourcing and human computation. In many settings, one would like to use voting rules which can be efficiently elicited, preserve voter privacy, and are robust to strategic manipulation. In this paper, we give algorithms which elicit approximate winners in a way which provably satisfies all three of these requirements simultaneously. Our results hold for tournament voting rules, which we define to be the voting rules which can be expressed solely as a function of the table of pairwise comparisons containing the number of voters preferring one candidate to another1. Tournament voting rules include many common voting rules such as the Borda, Copeland, Maximin, Nanson, Baldwin, Kemeny-Young, Ranked Pairs, Cup, and Schulze voting rules. Our results significantly expand the set of voting rules for which efficient elicitation was known to be possible and improve the known approximation factors for strategyproof voting in the regime where the number of candidates is large.
منابع مشابه
Can Approximation Circumvent Gibbard-Satterthwaite?
The Gibbard-Satterthwaite Theorem asserts that any reasonable voting rule cannot be strategyproof. A large body of research in AI deals with circumventing this theorem via computational considerations; the goal is to design voting rules that are computationally hard, in the worst-case, to manipulate. However, recent work indicates that the prominent voting rules are usually easy to manipulate. ...
متن کاملStrategyproof approximations of distance rationalizable voting rules
This paper considers randomized strategyproof approximations to distance rationalizable voting rules. It is shown that the Random Dictator voting rule (return the top choice of a random voter) nontrivially approximates a large class of distances with respect to unanimity. Any randomized voting rule that deviates too greatly from the Random Dictator voting rule is shown to obtain a trivial appro...
متن کاملComputational Aspects of Multi-Winner Approval Voting
We study computational aspects of three prominent voting rules that use approval ballots to elect multiple winners. These rules are satisfaction approval voting, proportional approval voting, and reweighted approval voting. We first show that computing the winner for proportional approval voting is NP-hard, closing a long standing open problem. As none of the rules are strategyproof, even for d...
متن کاملEfficient Vote Elicitation under Candidate Uncertainty
Top-k voting is an especially natural form of partial vote elicitation in which only length k prefixes of rankings are elicited. We analyze the ability of top-k vote elicitation to correctly determine true winners, with high probability, given probabilistic models of voter preferences and candidate availability. We provide bounds on the minimal value of k required to determine the correct winne...
متن کاملThe Computational Impact of Partial Votes on Strategic Voting
In many real world elections, agents are not required to rank all candidates. We study three of the most common methods used to modify voting rules to deal with such partial votes. These methods modify scoring rules (like the Borda count), elimination style rules (like single transferable vote) and rules based on the tournament graph (like Copeland) respectively. We argue that with an eliminati...
متن کامل