This paper is devoted to complexity results re-garding specific measures of proximity to single-peakedness and single-crossingness, called “single-peaked width ” [Cornaz et al., 2012] and “single-crossing width”. Thanks to the use of the PQ-tree data structure [Booth and Lueker, 1976], we show that both problems are polynomial time solvable in the general case (while it was only known for single-peaked width and in the case of narcissistic preferences). Furthermore, we establish one of the first results (to our knowledge) concerning the ef-fect of nearly single-peaked electorates on the com-plexity of an NP-hard voting system, namely we show the fixed-parameter tractability of Kemeny elections with respect to the parameters “single-peaked w...
Incomplete preferences are likely to arise in real-world preference aggregation and voting systems. ...
This paper contains an extensive combinatorial analysis of the single-peaked domain restriction and ...
For many election systems, bribery (and related) attacks have been shown NP-hard using constructions...
Twenty-Third International Joint Conference on Artificial IntelligenceBeijing ChinaAugust 3, 2013 – ...
This paper is devoted to the proportional representation (PR) problem when the preferences are clust...
This paper is devoted to the proportional representation (PR) problem when the preferences are clust...
We study the complexity of winner determination in single-crossing elections under two classic fully...
© 2014 Elsevier B.V. We study the complexity of winner determination in single-crossing elections un...
Manipulation, bribery, and control are well-studied ways of changing the outcome of an election. Man...
Manipulation, bribery, and control are well-studied ways of changing the outcome of an election. Man...
A preference profile is single-peaked on a tree if the candidate set can be equipped with a tree str...
Manipulation, bribery, and control are well-studied ways of changing the outcome of an elec-tion. Ma...
For many election systems, bribery (and related) attacks have been shown NP-hard using constructions...
Incomplete preferences are likely to arise in real-world pref-erence aggregation and voting systems....
For many election systems, bribery (and related) attacks have been shown NP-hard using constructions...
Incomplete preferences are likely to arise in real-world preference aggregation and voting systems. ...
This paper contains an extensive combinatorial analysis of the single-peaked domain restriction and ...
For many election systems, bribery (and related) attacks have been shown NP-hard using constructions...
Twenty-Third International Joint Conference on Artificial IntelligenceBeijing ChinaAugust 3, 2013 – ...
This paper is devoted to the proportional representation (PR) problem when the preferences are clust...
This paper is devoted to the proportional representation (PR) problem when the preferences are clust...
We study the complexity of winner determination in single-crossing elections under two classic fully...
© 2014 Elsevier B.V. We study the complexity of winner determination in single-crossing elections un...
Manipulation, bribery, and control are well-studied ways of changing the outcome of an election. Man...
Manipulation, bribery, and control are well-studied ways of changing the outcome of an election. Man...
A preference profile is single-peaked on a tree if the candidate set can be equipped with a tree str...
Manipulation, bribery, and control are well-studied ways of changing the outcome of an elec-tion. Ma...
For many election systems, bribery (and related) attacks have been shown NP-hard using constructions...
Incomplete preferences are likely to arise in real-world pref-erence aggregation and voting systems....
For many election systems, bribery (and related) attacks have been shown NP-hard using constructions...
Incomplete preferences are likely to arise in real-world preference aggregation and voting systems. ...
This paper contains an extensive combinatorial analysis of the single-peaked domain restriction and ...
For many election systems, bribery (and related) attacks have been shown NP-hard using constructions...