Constraint satisfaction problems. Lirong Xia

Size: px
Start display at page:

Download "Constraint satisfaction problems. Lirong Xia"

Transcription

1 Constraint satisfaction problems Lirong Xia Spring, 2017

2 Project 1 Ø You can use Windows Ø Read the instruction carefully, make sure you understand the goal search for YOUR CODE HERE Ø Ask and answer questions on Piazza we may give bonus score to insightful answers Please be careful about spoilers Ø State (in the search graph) vs. node (in the search tree) add node in the search tree to fringe add state to the visited sets 2

3 Today s schedule ØConstraint satisfaction problems ØAlgorithms backtracking search filtering forward checking constraint propagation 3

4 Constraint Satisfaction Problems Ø Standard search problems: State is a black box : arbitrary data structure Goal test: any function over states Successor function can be anything Ø Constraint satisfaction problems (CSPs): A special subset of search problems State is defined by variables X i with values from a domain D (sometimes D depends on i ) Goal test is a set of constraints specifying allowable combinations of values for subsets of variables Ø Allows useful general-purpose algorithms with more power than standard search algorithms 4

5 Ø Variables: WA, NT, Q, NSW, V, SA, T Ø Domains: Example: Map-Coloring D = { red, green, blue} Ø Constraints: adjacent regions must have different colors WA NT { } ( WA, NT ) ( red, green ), ( red, blue ), ( green, red ),... Ø Solutions are assignments satisfying all constraints, e.g.: WA = red, NT = green, Q = red, NSW = green, V = red, SA = blue, T = green 5

6 Example: N-Queens ØFormulation 1: Variables: Domains: X ij { 0,1} Constraints i, j,k ( X ij, X ) ik {( 0, 0), ( 0, 1), ( 1, 0) } i, j,k ( X ij, X ) kj {( 0, 0), ( 0, 1), ( 1, 0) } i, j,k ( X ij, X ) i+k, j+k ( 0, 0), ( 0, 1), 1, 0 i, j,k X ij, X i+k, j k ( ), ( 0, 1), 1, 0 i, j X ij = { ( )} ( ) { 0, 0 ( )} N 6

7 Example: N-Queens ØFormulation 2: Variables: Domains: Constraints Q k { 1, 2,3,...N } Q 1 Q 2 Q 3 Q 4 Implicit: -or- Explicit: ( ) i, j non-threatening Q, Q { } ( Q 1,Q ) 2 ( 1, 3), ( 1, 4),... i j 7

8 Constraint Graphs: Goal test Ø Binary CSP: each constraint relates (at most) two variables Ø Binary constraint graph: nodes are variables, arcs show constraints Ø General-purpose CSP algorithms use the graph structure to speed up search. E.g., Tasmania is an independent subproblem! 8

9 Example: Cryptarithmetic Ø Variables (circles): FTUWROX1 X2 X3 Ø Domains: T W O + T W O F O U R { 0, 1, 2, 3, 4, 5, 6, 7, 8, 9} Ø Constraints (boxes): alldiff ( F, T, U, W, R, O) O +O = R +10 X 1 9

10 Example: Sudoku Ø Variables: Each (open) square Ø Domains: { 1, 2,, 9} Ø Constraints: 9-way alldiff for each column 9-way alldiff for each row 9-way alldiff for each region 10

11 ØDiscrete Variables: Finite domains Varieties of CSPs Size d means O(d n ) complete assignments E.g., Boolean CSPs, including Boolean satisfiability (NPcomplete) Infinite domains (integers, strings, etc.) Linear constraints solvable ØContinuous variables: Linear constraints solvable in polynomial time by LP methods 11

12 Varieties of Constraints Ø Variables of Constraints Unary constraints involve a single variable (equiv. to shrinking domains): SA Binary constraints involve pairs of variables: SA WA green Higher-order constraints involve 3 or more variables: e.g., cryptarithmetic column constraints Ø Preferences (soft constraints): E.g., red is better than green Often representable by a cost for each variable assignment Gives constrained optimization problems 12

13 Standard Search Formulation ØStandard search formulation of CSPs (incremental) ØLet s start with the straightforward, dumb approach, then fix it ØStates are defined by the values assigned so far Initial state; the empty assignment, Successor function: assign a value to an unassigned variable Goal test: the current assignment is complete and satisfies all constraint 13

14 Search Methods Ø What would BFS do? Ø What would DFS do? Ø Is BFS better or DFS better? Ø Can we use A*? 14

15 Early detection of non-goal 15

16 Backtracking Search Ø Idea 1: only consider a single variable at each point Variable assignments are commutative, so fix ordering I.e., [WA = red then NT = green] same as [NT = green then WA = red] Only need to consider assignments to a single variable at each step Ø Idea 2: only allow legal assignments at each point Incremental goal test Ø DFS for CSPs with these two improvements is called backtracking search Ø Backtracking search is the basic uninformed algorithm for CSPs Ø Can solve n-queens for n 25 16

17 Backtracking Example 17

18 Improving Backtracking ØOrdering: Which variable should be assigned next? In what order should its values be tried? ØFiltering: Can we detect inevitable failure early? 18

19 Minimum Remaining Values ØMinimum remaining values (MRV): Choose the variable with the fewest legal values ØWhy min rather than max? ØAlso called most constrained variable Ø Fail-fast ordering 19

20 Example For every variable, keep track of which values are still possible Q X X X Q X X Q Q X X X Q X X Q Q X X X Q X X Q X X Q Q X X X Q X X Q X X X X Q Q X X Q Q X X X Q X X Q only one possibility for last column; might as well fill in now only one left for other two columns done! (no real branching needed!)

21 Choosing a value Ø Given a choice of variable: Choose the least constraining value The one that rules out the fewest values in the remaining variables May take some computation to determine this! Ø Why least rather than most? value 1 for SA value 0 for SA 21

22 Filtering: Forward Checking Ø Idea: keep track of remaining values for unassigned variables (using immediate constraints) Ø Idea: terminate when any variable has no legal values 22

23 Filtering: Constraint Propagating Ø Forward checking propagates information from assigned to unassigned variables, but doesn t provide early detection for all failures: step 1 step 2 step 1 step 2 Ø NT and SA cannot both be blue! Ø Why didn t we detect this yet? 23

24 Consistency of An Arc X Y Ø An arc is consistent iff for every x in the tail there is some y in the head which could be assigned without violating a constraint Delete from tail! Ø Forward checking = Enforcing consistency of each arc pointing to the new assignment 24

25 Arc Consistency of a CSP Ø A simple form of propagation makes sure all arcs are consistent: Delete from tail! X X X Ø If V loses a value, neighbors of V need to be rechecked! Ø Arc consistency detects failure earlier than forward checking Ø Can be run as a preprocessor or after each assignment Ø Might be time-consuming 25

Uninformed search. Lirong Xia

Uninformed search. Lirong Xia Uninformed search Lirong Xia Spring, 2017 Today s schedule ØRational agents ØSearch problems State space graph: modeling the problem Search trees: scratch paper for solution ØUninformed search Depth first

More information

Comparison Sorts. EECS 2011 Prof. J. Elder - 1 -

Comparison Sorts. EECS 2011 Prof. J. Elder - 1 - Comparison Sorts - 1 - Sorting Ø We have seen the advantage of sorted data representations for a number of applications q Sparse vectors q Maps q Dictionaries Ø Here we consider the problem of how to efficiently

More information

Support Vector Machines

Support Vector Machines Support Vector Machines Linearly Separable Data SVM: Simple Linear Separator hyperplane Which Simple Linear Separator? Classifier Margin Objective #1: Maximize Margin MARGIN MARGIN How s this look? MARGIN

More information

Coalitional Game Theory

Coalitional Game Theory Coalitional Game Theory Game Theory Algorithmic Game Theory 1 TOC Coalitional Games Fair Division and Shapley Value Stable Division and the Core Concept ε-core, Least core & Nucleolus Reading: Chapter

More information

Cloning in Elections

Cloning in Elections Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence (AAAI-10) Cloning in Elections Edith Elkind School of Physical and Mathematical Sciences Nanyang Technological University Singapore

More information

The Australian Society for Operations Research

The Australian Society for Operations Research The Australian Society for Operations Research www.asor.org.au ASOR Bulletin Volume 34, Issue, (06) Pages -4 A minimum spanning tree with node index Elias Munapo School of Economics and Decision Sciences,

More information

Analyzing and Representing Two-Mode Network Data Week 8: Reading Notes

Analyzing and Representing Two-Mode Network Data Week 8: Reading Notes Analyzing and Representing Two-Mode Network Data Week 8: Reading Notes Wasserman and Faust Chapter 8: Affiliations and Overlapping Subgroups Affiliation Network (Hypernetwork/Membership Network): Two mode

More information

Cloning in Elections 1

Cloning in Elections 1 Cloning in Elections 1 Edith Elkind, Piotr Faliszewski, and Arkadii Slinko Abstract We consider the problem of manipulating elections via cloning candidates. In our model, a manipulator can replace each

More information

Hoboken Public Schools. Algebra II Honors Curriculum

Hoboken Public Schools. Algebra II Honors Curriculum Hoboken Public Schools Algebra II Honors Curriculum Algebra Two Honors HOBOKEN PUBLIC SCHOOLS Course Description Algebra II Honors continues to build students understanding of the concepts that provide

More information

CS 4407 Algorithms Greedy Algorithms and Minimum Spanning Trees

CS 4407 Algorithms Greedy Algorithms and Minimum Spanning Trees CS 4407 Algorithms Greedy Algorithms and Minimum Spanning Trees Prof. Gregory Provan Department of Computer Science University College Cork 1 Sample MST 6 5 4 9 14 10 2 3 8 15 Greedy Algorithms When are

More information

Patterns in Congressional Earmarks

Patterns in Congressional Earmarks Patterns in Congressional Earmarks Chris Musialek University of Maryland, College Park 8 November, 2012 Introduction This dataset from Taxpayers for Common Sense captures Congressional appropriations earmarks

More information

Dimension Reduction. Why and How

Dimension Reduction. Why and How Dimension Reduction Why and How The Curse of Dimensionality As the dimensionality (i.e. number of variables) of a space grows, data points become so spread out that the ideas of distance and density become

More information

How hard is it to control sequential elections via the agenda?

How hard is it to control sequential elections via the agenda? How hard is it to control sequential elections via the agenda? Vincent Conitzer Department of Computer Science Duke University Durham, NC 27708, USA conitzer@cs.duke.edu Jérôme Lang LAMSADE Université

More information

FREEDOM ON THE NET 2011: GLOBAL GRAPHS

FREEDOM ON THE NET 2011: GLOBAL GRAPHS 1 FREEDOM ON THE NET 2011: GLOBAL GRAPHS 37-COUNTRY SCORE COMPARISON (0 Best, 100 Worst) * A green-colored bar represents a status of Free, a yellow-colored one, the status of Partly Free, and a purple-colored

More information

Title: Solving Problems by Searching AIMA: Chapter 3 (Sections 3.1, 3.2 and 3.3)

Title: Solving Problems by Searching AIMA: Chapter 3 (Sections 3.1, 3.2 and 3.3) B.Y. Choueiry 1 Instructor s notes #5 Title: Solving Problems by Searching AIMA: Chapter 3 (Sections 3.1, 3.2 and 3.3) Introduction to Artificial Intelligence CSCE 476-876, Fall 2017 URL: www.cse.unl.edu/~choueiry/f17-476-876

More information

ECE250: Algorithms and Data Structures Trees

ECE250: Algorithms and Data Structures Trees ECE250: Algorithms and Data Structures Trees Ladan Tahvildari, PEng, SMIEEE Professor Software Technologies Applied Research (STAR) Group Dept. of Elect. & Comp. Eng. University of Waterloo Materials from

More information

Explaining rational decision making by arguing

Explaining rational decision making by arguing Francesca Toni Workshop on Decision Making, Toulouse, 2017 Department of Computing, Imperial College London, UK CLArg (Computational Logic and Argumentation) Group 1/25 Argumentation in AI Non-Monotonic

More information

Political Districting for Elections to the German Bundestag: An Optimization-Based Multi-Stage Heuristic Respecting Administrative Boundaries

Political Districting for Elections to the German Bundestag: An Optimization-Based Multi-Stage Heuristic Respecting Administrative Boundaries Political Districting for Elections to the German Bundestag: An Optimization-Based Multi-Stage Heuristic Respecting Administrative Boundaries Sebastian Goderbauer 1 Electoral Districts in Elections to

More information

Maps, Hash Tables and Dictionaries

Maps, Hash Tables and Dictionaries Maps, Hash Tables and Dictionaries Chapter 9-1 - Outline Ø Maps Ø Hashing Ø Dictionaries Ø Ordered Maps & Dictionaries - 2 - Outline Ø Maps Ø Hashing Ø Dictionaries Ø Ordered Maps & Dictionaries - 3 -

More information

Analysis of the Reputation System and User Contributions on a Question Answering Website: StackOverflow

Analysis of the Reputation System and User Contributions on a Question Answering Website: StackOverflow Analysis of the Reputation System and User Contributions on a Question Answering Website: StackOverflow Dana Movshovitz-Attias Yair Movshovitz-Attias Peter Steenkiste Christos Faloutsos August 27, 2013

More information

Computational Social Choice: Spring 2017

Computational Social Choice: Spring 2017 Computational Social Choice: Spring 2017 Ulle Endriss Institute for Logic, Language and Computation University of Amsterdam Ulle Endriss 1 Plan for Today So far we saw three voting rules: plurality, plurality

More information

Midterm Review. EECS 2011 Prof. J. Elder - 1 -

Midterm Review. EECS 2011 Prof. J. Elder - 1 - Midterm Review - 1 - Topics on the Midterm Ø Data Structures & Object-Oriented Design Ø Run-Time Analysis Ø Linear Data Structures Ø The Java Collections Framework Ø Recursion Ø Trees Ø Priority Queues

More information

Overview. Ø Neural Networks are considered black-box models Ø They are complex and do not provide much insight into variable relationships

Overview. Ø Neural Networks are considered black-box models Ø They are complex and do not provide much insight into variable relationships Neural Networks Overview Ø s are considered black-box models Ø They are complex and do not provide much insight into variable relationships Ø They have the potential to model very complicated patterns

More information

Networked Games: Coloring, Consensus and Voting. Prof. Michael Kearns Networked Life NETS 112 Fall 2013

Networked Games: Coloring, Consensus and Voting. Prof. Michael Kearns Networked Life NETS 112 Fall 2013 Networked Games: Coloring, Consensus and Voting Prof. Michael Kearns Networked Life NETS 112 Fall 2013 Experimental Agenda Human-subject experiments at the intersection of CS, economics, sociology, network

More information

Event Based Sequential Program Development: Application to Constructing a Pointer Program

Event Based Sequential Program Development: Application to Constructing a Pointer Program Event Based Sequential Program Development: Application to Constructing a Pointer Program Jean-Raymond Abrial Consultant, Marseille, France jr@abrial.org Abstract. In this article, I present an event approach

More information

Approval Voting Theory with Multiple Levels of Approval

Approval Voting Theory with Multiple Levels of Approval Claremont Colleges Scholarship @ Claremont HMC Senior Theses HMC Student Scholarship 2012 Approval Voting Theory with Multiple Levels of Approval Craig Burkhart Harvey Mudd College Recommended Citation

More information

Case Study: Border Protection

Case Study: Border Protection Chapter 7 Case Study: Border Protection 7.1 Introduction A problem faced by many countries is that of securing their national borders. The United States Department of Homeland Security states as a primary

More information

Introduction to Computational Social Choice. Yann Chevaleyre. LAMSADE, Université Paris-Dauphine

Introduction to Computational Social Choice. Yann Chevaleyre. LAMSADE, Université Paris-Dauphine Introduction to Computational Social Choice Yann Chevaleyre Jérôme Lang LAMSADE, Université Paris-Dauphine Computational social choice: two research streams From social choice theory to computer science

More information

Influence in Social Networks

Influence in Social Networks CSCI 3210: Computational Game Theory Influence Games Ref: Irfan & Ortiz, AI (2014) Reading: Sections 1 3(up to pg. 86), Sections 4.5, 5 (no proof), 6 bowdoin.edu/~mirfan/papers/irfan_ortiz_influence_games_ai2014.pdf

More information

Studies in Computational Aspects of Voting

Studies in Computational Aspects of Voting Studies in Computational Aspects of Voting a Parameterized Complexity Perspective Dedicated to Michael R. Fellows on the occasion of his 60 th birthday Nadja Betzler, Robert Bredereck, Jiehua Chen, and

More information

Voting and Complexity

Voting and Complexity Voting and Complexity legrand@cse.wustl.edu Voting and Complexity: Introduction Outline Introduction Hardness of finding the winner(s) Polynomial systems NP-hard systems The minimax procedure [Brams et

More information

Multi-Winner Elections: Complexity of Manipulation, Control, and Winner-Determination

Multi-Winner Elections: Complexity of Manipulation, Control, and Winner-Determination Multi-Winner Elections: Complexity of Manipulation, Control, and Winner-Determination Ariel D. Procaccia and Jeffrey S. Rosenschein and Aviv Zohar School of Engineering and Computer Science The Hebrew

More information

Title: Local Search Required reading: AIMA, Chapter 4 LWH: Chapters 6, 10, 13 and 14.

Title: Local Search Required reading: AIMA, Chapter 4 LWH: Chapters 6, 10, 13 and 14. B.Y. Choueiry 1 Instructor s notes #8 Title: Local Search Required reading: AIMA, Chapter 4 LWH: Chapters 6, 10, 13 and 14. Introduction to Artificial Intelligence CSCE 476-876, Fall 2017 URL: www.cse.unl.edu/

More information

Decomposition and Complexity of Hereditary History Preserving Bisimulation on BPP

Decomposition and Complexity of Hereditary History Preserving Bisimulation on BPP Decomposition and Complexity of Hereditary History Preserving Bisimulation on BPP Sibylle Fröschle and Sławomir Lasota Institute of Informatics, Warsaw University 02 097 Warszawa, Banacha 2, Poland sib,sl

More information

Computational social choice Combinatorial voting. Lirong Xia

Computational social choice Combinatorial voting. Lirong Xia Computational social choice Combinatorial voting Lirong Xia Feb 23, 2016 Last class: the easy-tocompute axiom We hope that the outcome of a social choice mechanism can be computed in p-time P: positional

More information

Subreddit Recommendations within Reddit Communities

Subreddit Recommendations within Reddit Communities Subreddit Recommendations within Reddit Communities Vishnu Sundaresan, Irving Hsu, Daryl Chang Stanford University, Department of Computer Science ABSTRACT: We describe the creation of a recommendation

More information

Network Indicators: a new generation of measures? Exploratory review and illustration based on ESS data

Network Indicators: a new generation of measures? Exploratory review and illustration based on ESS data Network Indicators: a new generation of measures? Exploratory review and illustration based on ESS data Elsa Fontainha 1, Edviges Coelho 2 1 ISEG Technical University of Lisbon, e-mail: elmano@iseg.utl.pt

More information

Pathbreakers? Women's Electoral Success and Future Political Participation

Pathbreakers? Women's Electoral Success and Future Political Participation Pathbreakers? Women's Electoral Success and Future Political Participation Sonia Bhalotra, University of Essex Irma Clots-Figueras, Universidad Carlos III de Madrid Lakshmi Iyer, University of Notre Dame

More information

Maps and Hash Tables. EECS 2011 Prof. J. Elder - 1 -

Maps and Hash Tables. EECS 2011 Prof. J. Elder - 1 - Maps and Hash Tables - 1 - Outline Ø Maps Ø Hashing Ø Multimaps Ø Ordered Maps - 2 - Learning Outcomes Ø By understanding this lecture, you should be able to: Ø Outline the ADT for a map and a multimap

More information

Hyo-Shin Kwon & Yi-Yi Chen

Hyo-Shin Kwon & Yi-Yi Chen Hyo-Shin Kwon & Yi-Yi Chen Wasserman and Fraust (1994) Two important features of affiliation networks The focus on subsets (a subset of actors and of events) the duality of the relationship between actors

More information

Introduction to Game Theory. Lirong Xia

Introduction to Game Theory. Lirong Xia Introduction to Game Theory Lirong Xia Fall, 2016 Homework 1 2 Announcements ØWe will use LMS for submission and grading ØPlease just submit one copy ØPlease acknowledge your team mates 3 Ø Show the math

More information

Fine-Grained Opinion Extraction with Markov Logic Networks

Fine-Grained Opinion Extraction with Markov Logic Networks Fine-Grained Opinion Extraction with Markov Logic Networks Luis Gerardo Mojica and Vincent Ng Human Language Technology Research Institute University of Texas at Dallas 1 Fine-Grained Opinion Extraction

More information

Solutions of Implication Constraints yield Type Inference for More General Algebraic Data Types

Solutions of Implication Constraints yield Type Inference for More General Algebraic Data Types Solutions of Implication Constraints yield Type Inference for More General Algebraic Data Types Peter J. Stuckey NICTA Victoria Laboratory Department of Computer Science and Software Engineering The University

More information

oductivity Estimates for Alien and Domestic Strawberry Workers and the Number of Farm Workers Required to Harvest the 1988 Strawberry Crop

oductivity Estimates for Alien and Domestic Strawberry Workers and the Number of Farm Workers Required to Harvest the 1988 Strawberry Crop oductivity Estimates for Alien and Domestic Strawberry Workers and the Number of Farm Workers Required to Harvest the 1988 Strawberry Crop Special Report 828 April 1988 UPI! Agricultural Experiment Station

More information

VOTING DYNAMICS IN INNOVATION SYSTEMS

VOTING DYNAMICS IN INNOVATION SYSTEMS VOTING DYNAMICS IN INNOVATION SYSTEMS Voting in social and collaborative systems is a key way to elicit crowd reaction and preference. It enables the diverse perspectives of the crowd to be expressed and

More information

Priority Queues & Heaps

Priority Queues & Heaps Priority Queues & Heaps Chapter 8-1 - The Java Collections Framework (Ordered Data Types) Interface Abstract Class Class Iterable Collection Queue Abstract Collection List Abstract Queue Abstract List

More information

Simple methods for single winner elections

Simple methods for single winner elections Simple methods for single winner elections Christoph Börgers Mathematics Department Tufts University Medford, MA April 14, 2018 http://emerald.tufts.edu/~cborgers/ I have posted these slides there. 1 /

More information

Minimum Spanning Tree Union-Find Data Structure. Feb 28, 2018 CSCI211 - Sprenkle. Comcast wants to lay cable in a neighborhood. Neighborhood Layout

Minimum Spanning Tree Union-Find Data Structure. Feb 28, 2018 CSCI211 - Sprenkle. Comcast wants to lay cable in a neighborhood. Neighborhood Layout Objec&ves Minimum Spanning Tree Union-Find Data Structure Feb, 0 CSCI - Sprenkle Started teasing out some algorithms. Laying Cable Focus on commonality: what should our final solution look like? Comcast

More information

Priority Queues & Heaps

Priority Queues & Heaps Priority Queues & Heaps - 1 - Outline Ø The Priority Queue class of the Java Collections Framework Ø Total orderings, the Comparable Interface and the Comparator Class Ø Heaps Ø Adaptable Priority Queues

More information

Computational Social Processes. Lirong Xia

Computational Social Processes. Lirong Xia Computational Social Processes Lirong Xia Fall, 2016 This class ØEconomics: decision making by multiple actors, each with individual preferences, capabilities, and information, and motivated to act in

More information

DATA TO POLICY PROJECT. Using real data to solve real problems

DATA TO POLICY PROJECT. Using real data to solve real problems DATA TO POLICY PROJECT Using real data to solve real problems INSPIRATION Giving students a constructive voice to respond to police shootings AND Get your data USED You know questions that need to be answered

More information

Cluster Analysis. (see also: Segmentation)

Cluster Analysis. (see also: Segmentation) Cluster Analysis (see also: Segmentation) Cluster Analysis Ø Unsupervised: no target variable for training Ø Partition the data into groups (clusters) so that: Ø Observations within a cluster are similar

More information

Generalized Scoring Rules: A Framework That Reconciles Borda and Condorcet

Generalized Scoring Rules: A Framework That Reconciles Borda and Condorcet Generalized Scoring Rules: A Framework That Reconciles Borda and Condorcet Lirong Xia Harvard University Generalized scoring rules [Xia and Conitzer 08] are a relatively new class of social choice mechanisms.

More information

Voting on combinatorial domains. LAMSADE, CNRS Université Paris-Dauphine. FET-11, session on Computational Social Choice

Voting on combinatorial domains. LAMSADE, CNRS Université Paris-Dauphine. FET-11, session on Computational Social Choice Voting on combinatorial domains Jérôme Lang LAMSADE, CNRS Université Paris-Dauphine FET-11, session on Computational Social Choice A key question: structure of the setx of candidates? Example 1 choosing

More information

Parameterized Control Complexity in Bucklin Voting and in Fallback Voting 1

Parameterized Control Complexity in Bucklin Voting and in Fallback Voting 1 Parameterized Control Complexity in Bucklin Voting and in Fallback Voting 1 Gábor Erdélyi and Michael R. Fellows Abstract We study the parameterized control complexity of Bucklin voting and of fallback

More information

Doctoral Research Agenda

Doctoral Research Agenda Doctoral Research Agenda Peter A. Hook Information Visualization Laboratory March 22, 2006 Information Science Information Visualization, Knowledge Organization Systems, Bibliometrics Law Legal Informatics,

More information

Australian AI 2015 Tutorial Program Computational Social Choice

Australian AI 2015 Tutorial Program Computational Social Choice Australian AI 2015 Tutorial Program Computational Social Choice Haris Aziz and Nicholas Mattei www.csiro.au Social Choice Given a collection of agents with preferences over a set of things (houses, cakes,

More information

On the Complexity of Voting Manipulation under Randomized Tie-Breaking

On the Complexity of Voting Manipulation under Randomized Tie-Breaking Proceedings of the Twenty-Second International Joint Conference on Artificial Intelligence On the Complexity of Voting Manipulation under Randomized Tie-Breaking Svetlana Obraztsova Edith Elkind School

More information

Computational Inelasticity FHLN05. Assignment A non-linear elasto-plastic problem

Computational Inelasticity FHLN05. Assignment A non-linear elasto-plastic problem Computational Inelasticity FHLN05 Assignment 2016 A non-linear elasto-plastic problem General instructions A written report should be submitted to the Division of Solid Mechanics no later than 1 November

More information

CSCI211: Intro Objectives

CSCI211: Intro Objectives CSCI211: Intro Objectives Introduction to Algorithms, Analysis Course summary Reviewing proof techniques Jan 7, 2019 Sprenkle CSCI211 1 My Bio From Dallastown, PA B.S., Gettysburg College M.S., Duke University

More information

Complexity of Strategic Behavior in Multi-Winner Elections

Complexity of Strategic Behavior in Multi-Winner Elections Journal of Artificial Intelligence Research 33 (2008) 149 178 Submitted 03/08; published 09/08 Complexity of Strategic Behavior in Multi-Winner Elections Reshef Meir Ariel D. Procaccia Jeffrey S. Rosenschein

More information

HASHGRAPH CONSENSUS: DETAILED EXAMPLES

HASHGRAPH CONSENSUS: DETAILED EXAMPLES HASHGRAPH CONSENSUS: DETAILED EXAMPLES LEEMON BAIRD BAIRD@SWIRLDS.COM DECEMBER 11, 2016 SWIRLDS TECH REPORT SWIRLDS-TR-2016-02 ABSTRACT: The Swirlds hashgraph consensus algorithm is explained through a

More information

Aggregating Dependency Graphs into Voting Agendas in Multi-Issue Elections

Aggregating Dependency Graphs into Voting Agendas in Multi-Issue Elections Proceedings of the Twenty-Second International Joint Conference on Artificial Intelligence Aggregating Dependency Graphs into Voting Agendas in Multi-Issue Elections Stéphane Airiau, Ulle Endriss, Umberto

More information

Combating Friend Spam Using Social Rejections

Combating Friend Spam Using Social Rejections Combating Friend Spam Using Social Rejections Qiang Cao Duke University Michael Sirivianos Xiaowei Yang Kamesh Munagala Cyprus Univ. of Technology Duke University Duke University Friend Spam in online

More information

Chapter 11. Weighted Voting Systems. For All Practical Purposes: Effective Teaching

Chapter 11. Weighted Voting Systems. For All Practical Purposes: Effective Teaching Chapter Weighted Voting Systems For All Practical Purposes: Effective Teaching In observing other faculty or TA s, if you discover a teaching technique that you feel was particularly effective, don t hesitate

More information

How to identify experts in the community?

How to identify experts in the community? How to identify experts in the community? Balázs Sziklai XXXII. Magyar Operációkutatás Konferencia, Cegléd e-mail: sziklai.balazs@krtk.mta.hu 2017. 06. 15. Sziklai (CERS HAS) 1 / 34 1 Introduction Mechanism

More information

Probabilistic earthquake early warning in complex earth models using prior sampling

Probabilistic earthquake early warning in complex earth models using prior sampling Probabilistic earthquake early warning in complex earth models using prior sampling Andrew Valentine, Paul Käufl & Jeannot Trampert EGU 2016 21 st April www.geo.uu.nl/~andrew a.p.valentine@uu.nl A case

More information

Polydisciplinary Faculty of Larache Abdelmalek Essaadi University, MOROCCO 3 Department of Mathematics and Informatics

Polydisciplinary Faculty of Larache Abdelmalek Essaadi University, MOROCCO 3 Department of Mathematics and Informatics International Journal of Pure and Applied Mathematics Volume 115 No. 4 2017, 801-812 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu doi: 10.12732/ijpam.v115i4.13

More information

Genetic Algorithms with Elitism-Based Immigrants for Changing Optimization Problems

Genetic Algorithms with Elitism-Based Immigrants for Changing Optimization Problems Genetic Algorithms with Elitism-Based Immigrants for Changing Optimization Problems Shengxiang Yang Department of Computer Science, University of Leicester University Road, Leicester LE1 7RH, United Kingdom

More information

Hoboken Public Schools. College Algebra Curriculum

Hoboken Public Schools. College Algebra Curriculum Hoboken Public Schools College Algebra Curriculum College Algebra HOBOKEN PUBLIC SCHOOLS Course Description College Algebra reflects the New Jersey learning standards at the high school level and is designed

More information

An Empirical Study of the Manipulability of Single Transferable Voting

An Empirical Study of the Manipulability of Single Transferable Voting An Empirical Study of the Manipulability of Single Transferable Voting Toby Walsh arxiv:005.5268v [cs.ai] 28 May 200 Abstract. Voting is a simple mechanism to combine together the preferences of multiple

More information

Chapter 8: Recursion

Chapter 8: Recursion Chapter 8: Recursion Presentation slides for Java Software Solutions for AP* Computer Science 3rd Edition by John Lewis, William Loftus, and Cara Cocking Java Software Solutions is published by Addison-Wesley

More information

Randomized Pursuit-Evasion in Graphs

Randomized Pursuit-Evasion in Graphs Randomized Pursuit-Evasion in Graphs Micah Adler Harald Räcke Ý Naveen Sivadasan Þ Christian Sohler Ý Berthold Vöcking Þ Abstract We analyze a randomized pursuit-evasion game on graphs. This game is played

More information

Manipulating Two Stage Voting Rules

Manipulating Two Stage Voting Rules Manipulating Two Stage Voting Rules Nina Narodytska and Toby Walsh Abstract We study the computational complexity of computing a manipulation of a two stage voting rule. An example of a two stage voting

More information

arxiv: v5 [cs.gt] 21 Jun 2014

arxiv: v5 [cs.gt] 21 Jun 2014 Schulze and Ranked-Pairs Voting Are Fixed-Parameter Tractable to Bribe, Manipulate, and Control arxiv:1210.6963v5 [cs.gt] 21 Jun 2014 Lane A. Hemaspaandra, Rahman Lavaee Department of Computer Science

More information

Evaluation of election outcomes under uncertainty

Evaluation of election outcomes under uncertainty Evaluation of election outcomes under uncertainty Noam Hazon, Yonatan umann, Sarit Kraus, Michael Wooldridge Department of omputer Science Department of omputer Science ar-ilan University University of

More information

Wind power integration and consumer behavior: a complementarity approach

Wind power integration and consumer behavior: a complementarity approach 1 Wind power integration and consumer behavior: a complementarity approach 8 th Annual Trans-Atlantic INFRADAY Conference on Energy November 7 th, 2014 Ali Daraeepour, Duke University Dr. Jalal Kazempour,

More information

Title: Adverserial Search AIMA: Chapter 5 (Sections 5.1, 5.2 and 5.3)

Title: Adverserial Search AIMA: Chapter 5 (Sections 5.1, 5.2 and 5.3) B.Y. Choueiry 1 Instructor s notes #9 Title: dverserial Search IM: Chapter 5 (Sections 5.1, 5.2 and 5.3) Introduction to rtificial Intelligence CSCE 476-876, Fall 2017 URL: www.cse.unl.edu/ choueiry/f17-476-876

More information

Hat problem on a graph

Hat problem on a graph Hat problem on a graph Submitted by Marcin Piotr Krzywkowski to the University of Exeter as a thesis for the degree of Doctor of Philosophy by Publication in Mathematics In April 2012 This thesis is available

More information

Complexity of Manipulating Elections with Few Candidates

Complexity of Manipulating Elections with Few Candidates Complexity of Manipulating Elections with Few Candidates Vincent Conitzer and Tuomas Sandholm Computer Science Department Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213 {conitzer, sandholm}@cs.cmu.edu

More information

PASW & Hand Calculations for ANOVA

PASW & Hand Calculations for ANOVA PASW & Hand Calculations for ANOVA Gravetter & Wallnau Chapter 13, Problem 6 One possible reason that some birds migrate and others don t is intelligence. Birds with small brains relative to their body

More information

Computational Social Choice: Spring 2007

Computational Social Choice: Spring 2007 Computational Social Choice: Spring 2007 Ulle Endriss Institute for Logic, Language and Computation University of Amsterdam Ulle Endriss 1 Plan for Today This lecture will be an introduction to voting

More information

File Systems: Fundamentals

File Systems: Fundamentals File Systems: Fundamentals 1 Files What is a file? Ø A named collection of related information recorded on secondary storage (e.g., disks) File attributes Ø Name, type, location, size, protection, creator,

More information

Instructors: Tengyu Ma and Chris Re

Instructors: Tengyu Ma and Chris Re Instructors: Tengyu Ma and Chris Re cs229.stanford.edu Ø Probability (CS109 or STAT 116) Ø distribution, random variable, expectation, conditional probability, variance, density Ø Linear algebra (Math

More information

Designing police patrol districts on street network

Designing police patrol districts on street network Designing police patrol districts on street network Huanfa Chen* 1 and Tao Cheng 1 1 SpaceTimeLab for Big Data Analytics, Department of Civil, Environmental, and Geomatic Engineering, University College

More information

Estimating the Margin of Victory for Instant-Runoff Voting

Estimating the Margin of Victory for Instant-Runoff Voting Estimating the Margin of Victory for Instant-Runoff Voting David Cary Abstract A general definition is proposed for the margin of victory of an election contest. That definition is applied to Instant Runoff

More information

Rural Sprawl in Metropolitan Portland

Rural Sprawl in Metropolitan Portland Rural Sprawl in Metropolitan Portland A comparison of growth management in Oregon and Washington Clark Williams-Derry July 2012 As a single metropolis split between two states, greater Portland, Oregon,

More information

Midterm Review. EECS 2011 Prof. J. Elder - 1 -

Midterm Review. EECS 2011 Prof. J. Elder - 1 - Midterm Review - 1 - Topics on the Midterm Ø Data Structures & Object-Oriented Design Ø Run-Time Analysis Ø Linear Data Structures Ø The Java Collections Framework Ø Recursion Ø Trees Ø Priority Queues

More information

NP-Hard Manipulations of Voting Schemes

NP-Hard Manipulations of Voting Schemes NP-Hard Manipulations of Voting Schemes Elizabeth Cross December 9, 2005 1 Introduction Voting schemes are common social choice function that allow voters to aggregate their preferences in a socially desirable

More information

Universality of election statistics and a way to use it to detect election fraud.

Universality of election statistics and a way to use it to detect election fraud. Universality of election statistics and a way to use it to detect election fraud. Peter Klimek http://www.complex-systems.meduniwien.ac.at P. Klimek (COSY @ CeMSIIS) Election statistics 26. 2. 2013 1 /

More information

Relative Performance Evaluation and the Turnover of Provincial Leaders in China

Relative Performance Evaluation and the Turnover of Provincial Leaders in China Relative Performance Evaluation and the Turnover of Provincial Leaders in China Ye Chen Hongbin Li Li-An Zhou May 1, 2005 Abstract Using data from China, this paper examines the role of relative performance

More information

A comparative analysis of subreddit recommenders for Reddit

A comparative analysis of subreddit recommenders for Reddit A comparative analysis of subreddit recommenders for Reddit Jay Baxter Massachusetts Institute of Technology jbaxter@mit.edu Abstract Reddit has become a very popular social news website, but even though

More information

Planning versus Free Choice in Scientific Research

Planning versus Free Choice in Scientific Research Planning versus Free Choice in Scientific Research Martin J. Beckmann a a Brown University and T U München Abstract The potential benefits of centrally planning the topics of scientific research and who

More information

Coalitional Game Theory for Communication Networks: A Tutorial

Coalitional Game Theory for Communication Networks: A Tutorial Coalitional Game Theory for Communication Networks: A Tutorial Walid Saad 1, Zhu Han 2, Mérouane Debbah 3, Are Hjørungnes 1 and Tamer Başar 4 1 UNIK - University Graduate Center, University of Oslo, Kjeller,

More information

Bribery in voting with CP-nets

Bribery in voting with CP-nets Ann Math Artif Intell (2013) 68:135 160 DOI 10.1007/s10472-013-9330-5 Bribery in voting with CP-nets Nicholas Mattei Maria Silvia Pini Francesca Rossi K. Brent Venable Published online: 7 February 2013

More information

Priority Queues & Heaps

Priority Queues & Heaps Priority Queues & Heaps - 1 - Outline Ø The Priority Queue ADT Ø Total orderings, the Comparable Interface and the Comparator Class Ø Heaps Ø Adaptable Priority Queues - 2 - Outcomes Ø By understanding

More information

The Integer Arithmetic of Legislative Dynamics

The Integer Arithmetic of Legislative Dynamics The Integer Arithmetic of Legislative Dynamics Kenneth Benoit Trinity College Dublin Michael Laver New York University July 8, 2005 Abstract Every legislature may be defined by a finite integer partition

More information

Economics 470 Some Notes on Simple Alternatives to Majority Rule

Economics 470 Some Notes on Simple Alternatives to Majority Rule Economics 470 Some Notes on Simple Alternatives to Majority Rule Some of the voting procedures considered here are not considered as a means of revealing preferences on a public good issue, but as a means

More information

DYNAMIC RISK MANAGEMENT IN ELECTRICITY PORTFOLIO OPTIMIZATION VIA POLYHEDRAL RISK FUNCTIONALS

DYNAMIC RISK MANAGEMENT IN ELECTRICITY PORTFOLIO OPTIMIZATION VIA POLYHEDRAL RISK FUNCTIONALS DYNAMIC RISK MANAGEMENT IN ELECTRICITY PORTFOLIO OPTIMIZATION VIA POLYHEDRAL RISK FUNCTIONALS Andreas Eichhorn Department of Mathematics Humboldt University 199 Berlin, Germany Email eichhorn@math.hu-berlin.de

More information

Party Cue Inference Experiment. January 10, Research Question and Objective

Party Cue Inference Experiment. January 10, Research Question and Objective Party Cue Inference Experiment January 10, 2017 Research Question and Objective Our overarching goal for the project is to answer the question: when and how do political parties influence public opinion?

More information