Bypassing combinatorial protections: polynomial-time algorithms for single-peaked electorates
From MaRDI portal
Publication:2941740
Recommendations
- Computational aspects of nearly single-peaked electorates
- The complexity of manipulative attacks in nearly single-peaked electorates
- Manipulation of k-Approval in Nearly Single-Peaked Electorates
- The shield that never was: societies with single-peaked preferences are more open to manipulation and control
- How hard is bribery in elections?
Cited in
(25)- The complexity of manipulative attacks in nearly single-peaked electorates
- Parameterized complexity of voter control in multi-peaked elections
- Structured preferences: a literature survey
- The complexity of online bribery in sequential elections
- Computational aspects of nearly single-peaked electorates
- Campaign management under approval-driven voting rules
- The control complexity of \(r\)-Approval: from the single-peaked case to the general case
- The likelihood of single-peaked preferences under classic and new probability distribution assumptions
- Pareto rationalizability by two single-peaked preferences
- Are there any nicely structured preference profiles nearby?
- Resilient heuristic aggregation of judgments in the pairwise comparisons method
- Computing kemeny rankings from \(d\)-Euclidean preferences
- Exact algorithms for weighted and unweighted Borda manipulation problems
- Modeling single-peakedness for votes with ties
- Group control for consent rules with consecutive qualifications
- Structure of single-peaked preferences
- The complexity of priced control in elections
- Control complexity in Borda elections: solving all open cases of offline control and some cases of online control
- Challenges to complexity shields that are supposed to protect elections against manipulation and control: a survey
- A characterization of the single-peaked single-crossing domain
- Preferences single-peaked on a tree: multiwinner elections and structural results
- On the likelihood of single-peaked preferences
- Recognizing single-peaked preferences on an arbitrary graph: complexity and algorithms
- On the complexity of bribery with distance restrictions
- The shield that never was: societies with single-peaked preferences are more open to manipulation and control
This page was built for publication: Bypassing combinatorial protections: polynomial-time algorithms for single-peaked electorates
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2941740)