Communication complexity of approximating voting rules
نویسندگان
چکیده
This paper considers the communication complexity of approximating common voting rules. Both upper and lower bounds are presented. For n voters and m alternatives, it is shown that for all ∈ (0, 1), the communication complexity of obtaining a 1− approximation to Borda is O(log( 1 )nm). A lower bound of Ω(nm) is provided for fixed small values of . The communication complexity of computing the true Borda winner is Ω(nm log(m)) [5]. Thus, in the case of Borda, one can obtain arbitrarily good approximations with less communication overhead than is required to compute the true Borda winner. For other voting rules, no such 1± approximation scheme exists. In particular, it is shown that the communication complexity of computing any constant factor approximation, ρ, to Bucklin is Ω( ρ2 ). Conitzer and Sandholm [5] show that the communication complexity of computing the true Bucklin winner is O(nm). However, we show that for all δ ∈ (0, 1), the communication complexity of computing a m approximate winner in Bucklin elections is O(nm1−δ log(m)). For δ ∈ ( 1 2 , 1), a lower bound of Ω(nm1−2δ) is also provided. Similar lower bounds are presented on the communication complexity of computing approximate winners in Copeland elections.
منابع مشابه
The Random Pairs Voting Rule: Introduction and Evaluation With a Large Dataset
This paper introduces and evaluates the Random Pairs voting rule to show that it significantly improves upon the communication complexity of balloting methods requiring complete orderings of candidates while maintaining a high Condorcet efficiency. To this end, Random Pairs is compared to plurality, 2-approval, Borda, and range voting on elections constructed from Yahoo! users’ ratings of music...
متن کاملPattern matching encryption, strategic equivalence of range voting and approval voting, and statistical robustness of voting rules
We present new results in the areas of cryptography and voting systems. 1. Pattern matching encryption: We present new, general definitions for queryable encryption schemes – encryption schemes that allow evaluation of private queries on encrypted data without performing full decryption. We construct an efficient queryable encryption scheme supporting pattern matching queries, based on suffix t...
متن کاملThe Complexity of Safe Manipulation under Scoring Rules
[Slinko and White, 2008] have recently introduced a new model of coalitional manipulation of voting rules under limited communication, which they call safe strategic voting. The computational aspects of this model were first studied by [Hazon and Elkind, 2010], who provide polynomial-time algorithms for finding a safe strategic vote under kapproval and the Bucklin rule. In this paper, we answer...
متن کاملComputational Aspects of Multi-Winner Approval Voting
We study computational aspects of three prominent voting rules that use approval ballots to elect multiple winners. These rules are satisfaction approval voting, proportional approval voting, and reweighted approval voting. We first show that computing the winner for proportional approval voting is NP-hard, closing a long standing open problem. As none of the rules are strategyproof, even for d...
متن کاملComplexity of and algorithms for the manipulation of Borda, Nanson's and Baldwin's voting rules
We investigate manipulation of the Borda voting rule, as well as two elimination style voting rules, Nanson’s and Baldwin’s voting rules, which are based on Borda voting. We argue that these rules have a number of desirable computational properties. For unweighted Borda voting, we prove that it is NP-hard for a coalition of two manipulators to compute a manipulation. This resolves a long-standi...
متن کامل