Academia.eduAcademia.edu

The Complexity of Probabilistic Lobbying

2009, arXiv (Cornell University)

We propose models for lobbying in a probabilistic environment, in which an actor (called "The Lobby") seeks to influence voters' preferences of voting for or against multiple issues when the voters' preferences are represented in terms of probabilities. In particular, we provide two evaluation criteria and two bribery methods to formally describe these models, and we consider the resulting forms of lobbying with and without issue weighting. We provide a formal analysis for these problems of lobbying in a stochastic environment, and determine their classical and parameterized complexity depending on the given bribery/evaluation criteria and on various natural parameterizations. Specifically, we show that some of these problems can be solved in polynomial time, some are NP-complete but fixed-parameter tractable, and some are W[2]-complete. Finally, we provide approximability and inapproximability results for these problems and several variants.

arXiv:0906.4431v4 [cs.CC] 26 Feb 2011 The Complexity of Probabilistic Lobbying∗ Daniel Binkele-Raible,† Gábor Erdélyi,‡ Nicholas Mattei,k Henning Fernau,§ Judy Goldsmith,¶ Jörg Rothe∗∗ February 21, 2011 Abstract We propose models for lobbying in a probabilistic environment, in which an actor (called “The Lobby”) seeks to influence voters’ preferences of voting for or against multiple issues when the voters’ preferences are represented in terms of probabilities. In particular, we provide two evaluation criteria and two bribery methods to formally describe these models, and we consider the resulting forms of lobbying with and without issue weighting. We provide a formal analysis for these problems of lobbying in a stochastic environment, and determine their classical and parameterized complexity depending on the given bribery/evaluation criteria and on various natural parameterizations. Specifically, we show that some of these problems can be solved in polynomial time, some are NP-complete but fixed-parameter tractable, and some are W[2]-complete. Finally, we provide approximability and inapproximability results for these problems and several variants. Key words: Computational Complexity, Parameterized Complexity, Computational Social Choice ∗A preliminary version of this paper appears in the proceedings of the 1st International Conference on Algorithmic Decision Theory, October 2009 [EFG+ 09]. This work was supported in part by DFG grants RO 1202/11-1 and RO 1202/12-1, the European Science Foundation’s EUROCORES program LogICCC, the Alexander von Humboldt Foundation’s TransCoop program, and by NSF grants EAGER-CCF-1049360 and ITR-0325063. This work was done in part while the second author was affiliated to Heinrich-Heine-Universität Düsseldorf and visiting Universität Trier, while the first and the fourth author were visiting Heinrich-Heine-Universität Düsseldorf, and while the sixth author was visiting the University of Rochester. † URL: www.informatik.uni-trier.de/˜raible. Universität Trier, FB 4—Abteilung Informatik, 54286 Trier, Germany. ‡ URL: ccc.cs.uni-duesseldorf.de/˜erdelyi. Nanyang Technological University, Division of Mathematical Science, Singapore 639798. § URL: www.informatik.uni-trier.de/˜fernau. Universität Trier, FB 4—Abteilung Informatik, 54286 Trier, Germany. ¶ URL: www.cs.uky.edu/˜goldsmit. University of Kentucky, Dept. of Computer Science, Lexington, KY 40506, USA. k URL: www.cs.uky.edu/˜nsmatt2. University of Kentucky, Dept. of Computer Science, Lexington, KY 40506, USA. ∗∗ URL: ccc.cs.uni-duesseldorf.de/˜rothe. Heinrich-Heine-Universität Düsseldorf, Institut für Informatik, 40225 Düsseldorf, Germany. 1 1 Introduction 1.1 Motivation and Informal Description of Probabilistic Lobbying Models In most democratic political systems, laws are passed by elected officials who are supposed to represent their constituency. Individual entities such as citizens or corporations are not supposed to have undue influence in the wording or passage of a law. However, they are allowed to make contributions to representatives, and it is common to include an indication that the contribution carries an expectation that the representative will vote a certain way on a particular issue. Many factors can affect a representative’s vote on a particular issue. There are the representative’s personal beliefs about the issue, which presumably were part of the reason that the constituency elected them. There are also the campaign contributions, communications from constituents, communications from potential donors, and the representative’s own expectations of further contributions and political support. It is a complicated process to reason about. Earlier work considered the problem of meting out contributions to representatives in order to pass a set of laws or influence a set of votes. However, the earlier computational complexity work on this problem made the assumption that a politician who accepts a contribution will in fact—if the contribution meets a given threshold—vote according to the wishes of the donor. It is said that “An honest politician is one who stays bought,” but that does not take into account the ongoing pressures from personal convictions and opposing lobbyists and donors. We consider the problem of influencing a set of votes under the assumption that we can influence only the probability that the politician votes as we desire. There are several axes along which we complicate the picture. The first is the notion of sufficiency: What does it mean to say we have donated enough to influence the vote? Does it mean that the probability that a single vote will go our way is greater than some threshold? That the probability that all the votes go our way is greater than that threshold? We formally define and discuss these and other criteria in the section on evaluation criteria (Section 2.3). In particular, we consider two methods for evaluating the outcome of a vote: 1. strict majority, where a vote on an issue is won by a strict majority of voters having a probability of accepting this issue that exceeds a given threshold, and 2. average majority, where a vote on an issue is won exactly when the voters’ average probability of accepting this issue exceeds a given threshold. How does one donate money to a campaign? In the United States there are several laws that influence how, when, and how much a particular person or organization can donate to a particular candidate. We examine ways in which money can be channeled into the political process in the section on bribery methods (Section 2.2). In particular, we consider two methods that an actor (called “The Lobby”) can use to influence the voters’ preferences of voting for or against multiple issues: 1. microbribery, where The Lobby may choose which voter to bribe on which issue in order to influence the outcome of the vote according to the evaluation criterion used and 2 2. voter bribery, where The Lobby may choose which voters to bribe and for each voter bribed the funds are equally distributed over all the issues, again aiming at changing the outcome of the vote according to the evaluation criterion used. The voter bribery method is due to Christian et al. [CFRS07], who were the first to study lobbying in the context of direct democracy where voters vote on multiple referenda. Their “Optimal Lobbying” problem (denoted OL) is a deterministic and unweighted variant of the lobbying problems that we present in this paper. We state this problem in the standard format for parameterized complexity: Name: O PTIMAL L OBBYING. Given: An m×n 0/1 matrix E and a 0/1 vector ~Z of length n. Each row of E represents a voter and each column represents an issue. An entry of E is 1 if this voter votes “yes” for this issue, and is 0 otherwise. ~Z represents The Lobby’s target outcome. Parameter: A positive integer b (representing the number of voters to be influenced). Question: Is there a choice of b rows of the matrix (i.e., of b voters) that can be changed such that in each column of the resulting matrix (i.e., for each issue) a strict majority vote yields the outcome targeted by The Lobby? Christian et al. [CFRS07] proved that OL is W[2]-complete. Sandholm noted that the “Optimal Weighted Lobbying” (OWL) problem, which allows different voters to have different prices and so generalizes OL, can be expressed as and solved via the “binary multi-unit combinatorial reverse auction winner-determination problem” (see [SSGL02]). The microbribery method in the context of lobbying—though inspired by the different notion of microbribery that Faliszewski et al. [FHHR07, FHHR08, FHHR09a] introduced in the context of bribery in voting—is new to this paper. 1.2 Organization of This Paper and a Brief Overview of Results Christian et al. [CFRS07] show that OL is complete for the (parameterized) complexity class W[2]. We extend their model of lobbying as mentioned above (see Section 2 for a formal description), and provide algorithms and analysis for these extended models in terms of classical and parameterized complexity. All complexity-theoretic notions needed will be presented in Section 3. Our classical complexity results (presented in Section 4) are shown via either polynomial-time algorithms for or reductions showing NP-completeness of the problems studied. For the parameterized complexity results (presented in Section 5), we choose natural parameters such as The Lobby’s budget, the budget per referendum, and the “discretization level” used in formalizing our probabilistic lobbying problems (see Section 2.1). We also consider the concept of issue weighting, modeling that certain issues will be of more importance to The Lobby than others. Our classical and parameterized complexity results are summarized in Table 1 (see page 13) for problems without and in Table 2 (see page 17) for problems with issue weighting. 3 In Section 6, we provide approximability and inapproximability results for probabilistic lobbying problems. In this way we add breadth and depth to not only the models but also the understanding of lobbying behavior. We conclude by summarizing our main results and stating some open problems in Section 7. 1.3 Related Work Lobbying has been studied formally by economists, computer scientists, and special interest groups since at least 1983 [Rei83] and as an extension to formal game theory since 1944 [vNM44]. The different disciplines have considered mostly disjoint aspects of the process while seeking to accomplish distinct goals with their respective formal models. Economists study lobbying as “economic games,” as defined by von Neumann and Morgenstern [vNM44]. This analysis is focused on learning how these complex systems work and deducing optimal strategies for winning the competitions [Rei83, BKdV93, BKdV96]. This work has also focused on how to “rig” a vote and how to optimally dispense the funds among the various individuals [BKdV93]. Economists are interested in finding effective and efficient bribery schemes [BKdV93] as well as determining strategies for instances of two or more players [BKdV93, Rei83, BKdV96]. Generally, they reduce the problem of finding an effective lobbying strategy to one of finding a winning strategy for the specific type of game. Economists have also formalized this problem for bribery systems in both the United States [Rei83] and the European Union [Cro02]. The study of lobbying from a computational perspective that was initiated by Christian et al. [CFRS07] falls into the emerging field of computational social choice, which stimulates a bidirectional transfer between social choice theory (in particular, voting and preference aggregation) and computer science. For example, voting systems have been applied in various areas of artificial intelligence, most notably in the design of multiagent systems (see, e.g., [ER97]), for developing recommender systems [GMHS99], for designing a meta-search engine that aggregates the website rankings generated by several search engines [DKNS01], etc. Applications of voting systems in such automated settings (not restricted only to political elections in human societies) requires a better understanding of the computational properties of the problems related to voting. In particular, many papers have focused on the complexity of • winner determination (see, e.g., [BTT89b, HHR97, RSV03, HSV05]), • manipulation (see, e.g., [BTT89a, BO91, CS03, EL05, CSL07, HH07, PR07, BFH+08, MPRZ08, ZPR08, FHH09, FHHR09c]), • procedural control (see, e.g., [BTT92, HHR07, FHHR09a, HHR09, FHHR09c, ENR09, ER10, EPR11]), and • bribery in elections (see, e.g., [FHH09, FHHR09a]). For more details, the reader is referred to the surveys by Faliszewski et al. [FHHR09b] and Baumeister et al. [BEH+ 10] and the references cited therein. In comparison, much less work has been done on lobbying in voting on multiple referenda that we are concerned with here ([CFRS07], see also [SSGL02]). 4 2 Models for Probabilistic Lobbying 2.1 Initial Model We begin with a simplistic version of the P ROBABILISTIC L OBBYING P ROBLEM (PLP, for short), in which voters start with initial probabilities of voting for an issue and are assigned known costs for increasing their probabilities of voting according to “The Lobby’s” agenda by each of a finite set of increments. The question, for this class of problems, is: Given the above information, along with an agenda and a fixed budget B, can The Lobby target its bribes in order to achieve its agenda? The complexity of the problem seems to hinge on the evaluation criterion for what it means to “win a vote” or “achieve an agenda.” We discuss the possible interpretations of evaluation and bribery later in this section.1 First, however, we will formalize the problem by defining data objects needed to represent the problem instances. (A similar model was first discussed by Reinganum [Rei83] in the continuous case and we translate it here to the discrete case. This will allow us to present algorithms for, and a complexity analysis of, the problem.) Let Qm×n [0,1] denote the set of m×n matrices over Q[0,1] (the rational numbers in the interval [0, 1]). m×n We say P ∈ Q[0,1] is a probability matrix (of size m×n), where each entry pi, j of P gives the probability that voter vi will vote “yes” for referendum (synonymously, for issue) r j . The result of a vote is either a “yes” (represented by 1) or a “no” (represented by 0). Thus, we represent the result of any vote on all issues as a 0/1 vector ~X = (x1 , x2 , . . . , xn ), which is sometimes also denoted as a string in {0, 1}n . We now associate with each voter/issue pair (vi , r j ) a discrete price function ci, j for changing vi ’s probability of voting “yes” for issue r j . Intuitively, ci, j gives the cost for The Lobby of raising or lowering (in discrete steps) the ith voter’s probability of voting “yes” on the jth issue. A formal description is as follows. Given the entries pi, j = ai, j/bi, j of a probability matrix P ∈ Qm×n [0,1] , where ai, j ∈ N = {0, 1, . . .} and bi, j ∈ N>0 = {1, 2, . . .}, choose some k ∈ N such that k + 1 is a common multiple of all bi, j , where 1 ≤ i ≤ m and 1 ≤ j ≤ n, and partition the probability interval [0, 1] into k + 1 steps of size 1/(k+1) each.2 The integer k will be called the discretization level of the problem instance, and each integer κ , 0 ≤ κ ≤ k + 1 might be called a (confidence) step. For each i ∈ {1, 2, . . . , m} and j ∈ {1, 2, . . . , n}, ci, j : {0, 1/(k+1), 2/(k+1), . . . , k/(k+1), 1} → N is the (discrete) price function for pi, j , i.e., ci, j (ℓ/(k+1)) is the price for changing the probability of the ith voter voting “yes” on the jth issue from pi, j to ℓ/(k+1), where 0 ≤ ℓ ≤ k + 1. Note that the domain of ci, j consists of k + 2 elements of Q[0,1] including 0, pi, j , and 1. In particular, we require ci, j (pi, j ) = 0, i.e., a cost of zero is associated with leaving the initial probability of voter vi voting on issue r j unchanged. Note that k = 0 means pi, j ∈ {0, 1}, i.e., in this case each voter either accepts or rejects each issue with certainty and The Lobby can only flip these 1 We stress that when we use the term “bribery” in this paper, it is meant in the sense of lobbying [CFRS07], not in the sense Faliszewski et al. [FHH09] have in mind when defining bribery in elections (see also, e.g., [FHHR07, FHHR08, FHHR09a]). 2 There is some arbitrariness in this choice of k. One might think of more flexible ways of partitioning [0, 1]. We have chosen this way for the sake of simplifying the representation, but we mention that all that matters is that for each i and j, the discrete price function ci, j is defined on the value pi, j , and is set to zero for this value. 5 results.3 The image of ci, j consists of k + 2 nonnegative integers including 0 (the confidence steps), and we require that, for any two elements a, b in the domain of ci, j , if pi, j ≤ a ≤ b or pi, j ≥ a ≥ b, then ci, j (a) ≤ ci, j (b). This guarantees monotonicity on the prices in both directions. We represent the list of price functions associated with a probability matrix P as a table CP , called cost matrix in the following, whose m · n rows give the price functions ci, j and whose k + 2 columns give the costs ci, j (ℓ/(k+1)), where 0 ≤ ℓ ≤ k + 1. Occasionally, we use ci, j [ℓ] to denote ci, j (ℓ/(k+1)), for ℓ ∈ {0, 1, . . . , k + 1}. Note that we choose the same k for each ci, j , so we have the same number of columns in each row of CP . The entries of CP can be thought of as “price tags” indicating what The Lobby must pay in order to change the probabilities of voting. The Lobby also has an integer-valued budget B and an “agenda,” which we will denote as a vector ~Z ∈ {0, 1}n for n issues, containing the outcomes The Lobby would like to see on these issues. For The Lobby, the prices for a bribery that moves the outcomes of a referendum into the wrong direction do not matter. Hence, if ~Z is zero at position j, then we set ci, j (a) = −− (indicating an unimportant entry) for a > pi, j , and if ~Z is one at position j, then we set ci, j (a) = −− (indicating an unimportant entry) for a < pi, j . Without loss of generality, we may also assume that ci, j (a) = 0 if and only if a = pi, j . For simplicity, we may assume that The Lobby’s agenda is all “yes” votes, so the target vector is ~Z = 1n . This assumption can be made without loss of generality, since if there is a zero in ~Z at position j, we can flip this zero to one and also change the corresponding probabilities p1, j , p2, j , . . . , pm, j in the jth column of P to 1 − p1, j , 1 − p2, j , . . . , 1 − pm, j . (See the evaluation criteria in Section 2.3 for how to determine the result of voting on a referendum.) Moreover, the rows of the cost matrix CP that correspond to issue j have to be mirrored. Example 2.1 Consider the following problem instance with k = 9 (so there are k + 1 = 10 steps), m = 2 voters, and n = 3 issues. We will use this as a running example for the rest of this paper. In addition to the above definitions for k, m, and n, we also give the following probability matrix P and cost matrix CP for P. (Note that this example is normalized for an agenda of ~Z = 13 , which is why The Lobby has no incentive for lowering the acceptance probabilities, so those costs are omitted below.) Our example consists of a probability matrix P: v1 v2 r1 r2 r3 0.8 0.3 0.5 0.4 0.7 0.4 and the corresponding cost matrix CP : ci, j c1,1 c1,2 c1,3 c2,1 c2,2 c2,3 3 This 0.0 −− −− −− −− −− −− 0.1 −− −− −− −− −− −− 0.2 −− −− −− −− −− −− 0.3 −− 0 −− −− −− −− 0.4 0.5 0.6 0.7 0.8 0.9 −− −− −− −− 0 100 10 70 100 140 310 520 −− 0 15 25 70 90 0 30 40 70 120 200 −− −− −− 0 10 40 0 70 90 100 180 300 is the special case of OL [CFRS07]. 6 1.0 140 600 150 270 90 450 In Section 2.2, we describe two bribery methods, i.e., two specific ways in which The Lobby can influence the voters. These will be referred to as microbribery (MB) and voter bribery (VB). In Section 2.3, we define two ways in which The Lobby can win a set of votes. These evaluation criteria will be referred to as strict majority (SM) and average majority (AM). The four basic probabilistic lobbying problems we will study (each a combination of MB/VB bribery under SM/AM evaluation) are defined in Section 2.4, and a modification of these basic problems with additional issue weighting is introduced in Section 2.5. 2.2 Bribery Methods We begin by first formalizing the bribery methods by which The Lobby can influence votes on issues. We will define two methods for donating this money. 2.2.1 Microbribery (MB) The first method at the disposal of The Lobby is what we will call microbribery.4 We define microbribery to be the editing of individual elements of the P matrix according to the costs in the CP matrix. Thus The Lobby picks not only which voter to influence but also which issue to influence for that voter. This bribery method allows a very flexible version of bribery, and models private donations made to politicians or voters in support of specific issues. More formally, if voter i is bribed with d dollars on issue j, then all entries ci, j [ℓ], 0 ≤ ℓ ≤ k + 1, of CP are updated as follows:  −− if(ci, j [ℓ] = −−) ∨ ((ci, j [ℓ] − d) ≤ 0) ci, j [ℓ] := ci, j [ℓ] − d if(ci, j [ℓ] − d) > 0. Moreover, assuming The Lobby’s target vector is 1n , let T = argmax{ℓ | ci, j [ℓ] = −−}. Replace ci, j [T ] := 0 and update pi, j := T/(k+1). Example 2.2 (continuing Example 2.1) To make this concrete, reconsidering our Example 2.1: Suppose we give $100 to the second voter and ask her to change her opinion on the third issue. This would lead to the following update of CP : ci, j c1,1 c1,2 c1,3 c2,1 c2,2 c2,3 0.0 −− −− −− −− −− −− 0.1 −− −− −− −− −− −− 0.2 −− −− −− −− −− −− 0.3 −− 0 −− −− −− −− 0.4 −− 10 −− 0 −− −− 4 Although 0.5 −− 70 0 30 −− −− 0.6 0.7 0.8 0.9 1.0 −− −− 0 100 140 100 140 310 520 600 15 25 70 90 150 40 70 120 200 270 −− 0 10 40 90 −− 0 80 200 350 our notion was inspired by theirs, we stress that it should not be confused with the term “microbribery” used by Faliszewski et al. [FHHR07, FHHR08, FHHR09a] in the different context of bribing “irrational” voters in Llull/Copeland elections via flipping single entries in their preference tables. 7 Accordingly, the matrix P is updated as follows: v1 v2 2.2.2 r1 r2 r3 0.8 0.3 0.5 0.4 0.7 0.7 Voter Bribery (VB) The second method at the disposal of The Lobby is voter bribery. We can see from the P matrix that each row represents what an individual voter thinks about all the issues on the docket. In this method of bribery, The Lobby picks a voter and then pays to edit the entire row at once with the funds being equally distributed over all the issues. So, for d dollars a fraction of d/n is spent on each issue, and the probabilities change accordingly. The cost of moving the voter is given by the CP matrix as before. This method of bribery is analogous to “buying” or pushing a single politician or voter. The Lobby seeks to donate so much money to some individual voters that they have no choice but to move all of their votes toward The Lobby’s agenda. Let us be more precise. To avoid problems with fractions of dollars, we will assume that the bribery money is donated in multiples of n, the number of issues. Hence, whole dollars will be donated per referendum. So, if we bribe voter i by giving her x·n dollars, this results in microbribing every issue by giving x dollars to voter i to raise her confidence on issue j; in other words, all the entries of ci, j (in CP ), 1 ≤ j ≤ n, will be edited (and accordingly P). Example 2.3 (continuing Example 2.1) Let us reconsider our running example: What happens if we give $300 to the second voter? The update of CP would be as follows: ci, j c1,1 c1,2 c1,3 c2,1 c2,2 c2,3 0.0 −− −− −− −− −− −− 0.1 −− −− −− −− −− −− 0.2 −− −− −− −− −− −− 0.3 −− 0 −− −− −− −− 0.4 −− 10 −− −− −− −− 0.5 −− 70 0 −− −− −− 0.6 −− 100 15 −− −− −− 0.7 0.8 0.9 1.0 −− 0 100 140 140 310 520 600 25 70 90 150 0 20 100 170 −− −− −− 0 0 80 200 350 Accordingly, the matrix P is updated as follows: v1 v2 r1 r2 r3 0.8 0.3 0.5 0.7 1.0 0.7 Simple Observation Note that microbribery is equivalent to voter bribery if there is only one referendum. 8 2.3 Evaluation Criteria Defining criteria for how an issue is won is the next important step in formalizing our models. Here we define two methods that one could use to evaluate the eventual outcome of a vote. Since we are focusing on problems that are probabilistic in nature, it is important to note that no evaluation criterion will guarantee a win. The criteria below yield different outcomes depending on the model and problem instance. 2.3.1 Strict Majority (SM) For each issue, a strict majority of the individual voters have probability greater than some threshold, t, of voting according to the agenda. In our running example (see Example 2.1), with t = 50%, the result of the votes would be ~X = (0, 0, 0), because none of the issues has a strict majority of voters with above 50% likelihood of voting “yes.” The bribery action described in Example 2.2 results in the same vector, (0, 0, 0). However, the bribery action described in Example 2.3 results in the vector (1, 0, 0). 2.3.2 Average Majority (AM) For each issue r j of a given probability matrix P, we define the average probability p j = (∑mi=1 pi, j )/m of voting “yes” for r j . We now evaluate the vote to say that r j is accepted if and only if p j > t where t is some threshold. In our running example with t = 50%, this would give us a result vector of ~X = (1, 0, 0). However, the bribery action described in Example 2.2 results in the vector (1, 0, 1), while the bribery action described in Example 2.3 results in the vector (1, 1, 1). Simple Observation Note that the first two criteria coincide if there is only one voter or if the discretization level equals zero. 2.4 Basic Probabilistic Lobbying Problems We now introduce the four basic problems that we will study. Recalling that, without loss of generality, The Lobby’s target vector may assumed to be all ones, we define the following problem for X ∈ {MB, VB} and Y ∈ {SM, AM}. Name: X-Y P ROBABILISTIC L OBBYING P ROBLEM. m×n Given: A probability matrix P ∈ Q[0,1] with a cost matrix CP (with integer entries), a budget B, and some threshold t ∈ Q[0,1[ . Question: Is there a way for The Lobby to influence CP and hence P (using bribery method X and evaluation criterion Y, without exceeding budget B) such that the result of the votes on all issues equals 1n ? 9 We abbreviate this problem name as X-Y-PLP. Example 2.4 (continuing Example 2.1) Consider voter bribery and the average majority criterion with our running example and suppose The Lobby has a budget of $75, i.e., our instance of VB-AM-PLP is (P,CP , 75) with P and CP as given in Example 2.1. Giving $75 to the first voter would suffice to lift all issues above the threshold of 50% on average according to the wishes of The Lobby. The updated cost matrix CP′ would be: ci, j c1,1 c1,2 c1,3 c2,1 c2,2 c2,3 0.0 −− −− −− −− −− −− 0.1 −− −− −− −− −− −− 0.2 −− −− −− −− −− −− 0.3 −− −− −− −− −− −− 0.4 −− 0 −− 0 −− 0 0.5 −− 45 −− 30 −− 70 0.6 −− 75 −− 40 −− 90 0.7 −− 115 0 70 0 100 0.8 0 285 45 120 10 180 0.9 75 495 65 200 40 300 1.0 115 575 125 270 90 450 This leads to the following updated probability matrix P′ , enriched with the average probabilities: v1 v2 pj r1 r2 r3 0.8 0.4 0.7 0.4 0.7 0.4 0.6 0.55 0.55 Since each referendum passes the evaluation test, as desired by The Lobby, (P,CP , 75) ∈ VB-AM-PLP. Notice that the discretization level is an implicit (unary) parameter of the problem that is indirectly specified through the cost matrix CP . 2.5 Probabilistic Lobbying with Issue Weighting We now augment the model to include the concept of issue weighting. It is reasonable to surmise that certain issues will be of more importance to The Lobby than others. For this reason we will allow The Lobby to specify higher weights to the issues that they deem more important. These positive integer weights will be defined for each issue. ~ ∈ Nn with size n equal to the total number of We will specify these weights as a vector W >0 issues in our problem instance. The higher the weight, the more important that particular issue is to The Lobby. Along with the weights for each issue we are also given an objective value O ∈ N>0 , which is the minimum weight The Lobby wants to see passed. Since this is a partial ordering, it is possible for The Lobby to have an ordering such as w1 = w2 = · · · = wn . If this is the case, we see that we are left with an instance of X-Y-PLP, where X ∈ {MB, VB} and Y ∈ {SM, AM}. We now introduce the four probabilistic lobbying problems with issue weighting. For X ∈ {MB, VB} and Y ∈ {SM, AM}, we define the following problem. 10 Name: X-Y P ROBABILISTIC L OBBYING P ROBLEM WITH I SSUE W EIGHTING. n ~ Given: A probability matrix P ∈ Qm×n [0,1] with cost matrix CP , an issue weight vector W ∈ N>0 , an objective value O ∈ N>0 , a budget B, and some threshold t ∈ Q[0,1[ . Question: Is there a way for The Lobby to influence CP and hence P (using bribery method X and evaluation criterion Y, without exceeding budget B) such that the total weight of all issues for which the result coincides with The Lobby’s target vector 1n is at least O? We abbreviate this problem name as X-Y-PLP-WIW. 3 Complexity-Theoretic Notions We assume the reader is familiar with standard notions of (classical) complexity theory, such as P, NP, and NP-completeness. Since we analyze the problems stated in Section 2 not only in terms of their classical complexity, but also with regard to their parameterized complexity, we provide some basic notions here (see, e.g., the text books by Downey and Fellows [DF99], Flum and Grohe [FG06], and Niedermeier [Nie06] for more background). As we derive our results in a rather specific fashion, we will employ the “Turing way” as proposed by Cesati [Ces03]. A parameterized problem P is a subset of Σ∗ ×N, where Σ is a fixed alphabet and Σ∗ is the set of strings over Σ. Each instance of the parameterized problem P is a pair (I, p), where the second component p is called the parameter. The language L(P) is the set of all YES instances of P. The parameterized problem P is fixed-parameter tractable if there is an algorithm (realizable by a deterministic Turing machine) that decides whether an input (I, p) is a member of L(P) in time f (p)|I|c , where c is a fixed constant and f is a function of the parameter p, but is independent of the overall input length, |I|. The class of all fixed-parameter tractable problems is denoted by FPT. The O ∗ (·) notation has by now become standard in exact algorithms. It neglects not only constants (as the more familiar O(·) notation does) but also polynomial factors in the function estimates. Thus, a problem is in FPT if and only if an instance (with parameter p) can be solved in time O ∗ ( f (p)) for some function f . Sometimes, more than one parameter (e.g., two parameters (p1 , p2 )) are associated with a (classical) problem. This is formally captured in the definition above by coding those parameters into one number p via a so-called pairing function through diagonalization. As is standard, we assume our pairing function to be a polynomial-time computable bijection from N×N onto N that has polynomial-time computable inverses. For a given classical decision or optimization problem, there are various ways to define parameters. With minimization problems, the standard parameterization is a bound on the entity to be minimized. For instance, the problems studied in this paper have, as a natural minimization objective, the goal to minimize costs (i.e., to use a budget B as small as possible). If one can assume that the parameter p is small in practice, or in practical situations involving humans, we can argue that an algorithm offering a run time of O ∗ (2 p ) behaves reasonably well in practice. A related natural parameter choice would be the budget that can be spent per issue, i.e., the entity B/n. If the voters are actual human beings, one can also argue that the discretization level k would not be too large. 11 One of the current trends in parameterized complexity analysis is to study multiple parameterizations for each problem, including combining multiple parameters for a problem instance. This trend is highlighted by two recent invited talks given by Fellows [Fel09] and Niedermeier [Nie10]. Notice that the study of different and multiple parameterizations can also be seen from another angle: Apart from identifying the hard parts of the problem instance, such research represents a natural mathematical counterpart of the more practically oriented quest for good parameters that may lead to the most competitive algorithm frameworks for hard problems, as exemplified most notably by SATzilla and ParamILS in the areas of algorithms for Satisfiability and Integer Linear Programming, respectively, see [XHHLB08, HHLBS09]. There is also a theory of parameterized complexity, as exhibited in [DF99, FG06, Nie06], where parameterized complexity is expressed via hardness for or completeness in the levels W[t], t ≥ 1, of the W-hierarchy, which complement fixed-parameter tractability: FPT = W[0] ⊆ W[1] ⊆ W[2] ⊆ · · · . It is commonly believed that this hierarchy is strict. Since only the second level, W[2], will be of interest to us in this paper, we will define only this class below. Definition 3.1 Let P and P ′ be two parameterized problems. A parameterized reduction from P to P ′ is a function r that, for some polynomial q and some function g, is computable in time O(g(p)q(|I|)) and maps an instance (I, p) of P to an instance r(I, p) = (I ′ , p′ ) of P ′ such that 1. (I, p) is a YES instance of P if and only if (I ′ , p′ ) is a YES instance of P ′ , and 2. p′ ≤ g(p). We then say that P parameterized reduces to P ′ (via r). Parameterized hardness for and completeness in a parameterized complexity class is defined via parameterized reductions. We will show only W[2]-completeness results. A parameterized problem P ′ is said to be W[2]-hard if every parameterized problem P in W[2] parameterized reduces to P ′ . P ′ is said to be W[2]-complete if P ′ is in W[2] and is W[2]-hard. W[2] can be characterized by the following problem on Turing machines: Name: S HORT M ULTI - TAPE N ONDETERMINISTIC T URING M ACHINE C OMPUTATION. Given: A multi-tape nondeterministic Turing machine M (with two-way infinite tapes) and an input string x (both M and x are given in some standard encoding). Parameter: A positive integer k. Question: Is there an accepting computation of M on input x that reaches a final accepting state in at most k steps? 12 Problem Classical Complexity MB-SM-PLP MB-AM-PLP VB-SM-PLP VB-AM-PLP P P NP-complete NP-complete Parameterized Complexity, parameterized by Budget Budget Budget & per Issue Discretiz. Level (FPT) (FPT) (FPT) (FPT) (FPT) (FPT) FPT W[2]-complete FPT ? W[2]-hard FPT Stated in or implied by Thm./Cor. 4.1 4.4 4.5, 5.2, 5.3, 5.1 4.5, 5.4, 5.1 Table 1: Complexity results for X-Y-PLP, where X ∈ {MB, VB} and Y ∈ {SM, AM} We abbreviate this problem name as SMNTMC. More specifically, a parameterized problem P is in W[2] if and only if it can be reduced to SMNTMC via a parameterized reduction [Ces03]. This can be accomplished by giving an appropriate multi-tape nondeterministic Turing machine for solving P. Hardness for W[2] can be shown by giving a parameterized reduction in the opposite direction, from SMNTMC to P. For other applications of fixed-parameter tractability and parameterized complexity to problems from computational social choice, see, e.g., [LR08]. 4 Classical Complexity Results We now provide a formal complexity analysis of the probabilistic lobbying problems for all combinations of bribery methods X ∈ {MB, VB} and evaluation criteria Y ∈ {SM, AM}. Table 1 summarizes some of our (classical and parameterized) complexity results for the problems X-Y-PLP; note that Table 1 does not cover Theorem 5.5 (which considers a combination of two parameters, namely of budget per issue and discretization level). Some of these results are known from previous work by Christian et al. [CFRS07], as will be mentioned below. Our results generalize theirs by extending the model to probabilistic settings. The listed FPT results might look peculiar at first glance, since Christian et al. [CFRS07] derived W[2]hardness results, but this is due to the chosen parameterization, as will be discussed later in more detail. We put parentheses around some classes in Table 1 to indicate that these results are trivially inherited from others. For example, if some problem is solvable in polynomial time, then it is in FPT for any parameterization. The table mainly provides results on the containment of problems in certain complexity classes; if known, additional hardness results are also listed. In Section 4.1 we present our results on microbribery (i.e., we study the problems MB-Y-PLP for Y ∈ {SM, AM}), and in Section 4.2 we are concerned with voter bribery (i.e., we study the problems VB-Y-PLP for Y ∈ {SM, AM}). In addition, in Section 4.3 we study probabilistic lobbying with issue weighting. 4.1 Microbribery Theorem 4.1 MB-SM-PLP is in P. Proof. The aim is to win all referenda. For each voter vi and referendum r j , 1 ≤ i ≤ m and 1 ≤ j ≤ n, we compute in polynomial time the amount b(vi , r j ) The Lobby has to spend to turn the favor 13 of vi in the direction of The Lobby (beyond the given threshold t). In particular, set b(vi , r j ) = 0 if voter vi would already vote according to the agenda of The Lobby. For each issue r j , sort {b(vi , r j ) | 1 ≤ i ≤ m} nondecreasingly, yielding a sequence b1 (r j ), . . . , bm (r j ) such that bk (r j ) ≤ bℓ (r j ) for ⌈(m+1)/2⌉ bi (r j ) dollars. Hence, k < ℓ. To win referendum r j , The Lobby must spend at least B(r j ) = ∑i=1 n ❑ all referenda are won if and only if ∑ j=1 B(r j ) is at most the given bribery budget B. Note that the time needed to implement the algorithm given in the previous proof can be bounded by a polynomial of low order. More precisely, if the input consists of m voters, n referenda, and discretization level k, then O(n · m · k) time is needed to compute the b(vi , r j ). Having these values, O(n · m · log m) time is needed for the sorting phase. The sums can be computed in time O(n · m). Similarly, the other problems that we show to belong to P admit solution algorithms bounded by polynomials of low order. The complexity of microbribery with evaluation criterion AM is somewhat harder to determine. We use the following auxiliary problem. First we need a definition. Definition 4.2 • Given a directed graph G consisting of path components P1 , . . . , Pπ with vertex set V = {J1 , . . . , Jn } representing jobs, a schedule S of q ≤ n jobs (on a single machine) is a sequence Ji(1) , . . . , Ji(q) such that Ji(r) = Ji(s) implies r = s (i.e., no job appears twice). • Assigning cost c(Jk ) to job Jk for each k, 1 ≤ k ≤ n, the cost of schedule S is q c(S) = ∑ c(Ji(k) ). k=1 • The mapping φ we use in the following takes two arguments: the index of a path and the number of the job on that path, and it returns the correct index of the job. S is said to respect the precedence constraints of G if for every path-component Pi = (Jφ (i,1) , . . . , Jφ (i,p(i)) ) of G S (with V = πi=1 {Jφ (i,ℓ) | 1 ≤ ℓ ≤ p(i)}) and for each ℓ with 2 ≤ ℓ ≤ p(i), we have: If Jφ (i,ℓ) occurs in schedule S then Jφ (i,ℓ−1) occurs in S before Jφ (i,ℓ) . Name: PATH S CHEDULE Given: A set V = {J1 , . . . , Jn } of jobs, a directed graph G = (V, A) consisting of pairwise disjoint paths P1 , . . . , Pπ , two numbers C, q ∈ N, and a cost function c : V → N. Question: Does there exist a schedule Ji(1) , . . . , Ji(q) of q jobs of cost at most C respecting the precedence constraints of G? We first show, as Lemma 4.3, that the minimization version of PATH S CHEDULE is polynomialtime computable, so the decision problem PATH S CHEDULE is in P. Then we will show, as Theorem 4.4, how to reduce MB-AM-PLP to PATH S CHEDULE, which implies that MB-AM-PLP is in P as well. Lemma 4.3 PATH S CHEDULE is in P. 14 Proof. Given an instance of PATH S CHEDULE as in the problem description above, the following dynamic programming approach calculates T [{P1 , . . . , Pπ }, q], which gives the minimum cost to solve the problem. We build up a table T [{P1 , . . . , Pℓ }, j] storing the minimum cost of scheduling j jobs out of the jobs contained in the paths P1 , . . . , Pℓ . Let Pi = (Jφ (i,1) , . . . , Jφ (i,p(i)) ) be a path, 1 ≤ i ≤ π . For k ≤ p(1), set T [{P1 }, k] = ∑ks=1 c(Jφ (1,s) ). For k > p(1), set T [{P1 }, k] = ∞. If ℓ > 1, T [{P1 , . . . , Pℓ }, j] equals k min 0≤k≤min{ j,p(ℓ)} T [{P1 , . . . , Pℓ−1 }, j − k] + ∑ c(Jφ (ℓ,s) ). s=1 Consider each possible scheduling of the first k jobs of Pℓ . For the remaining j − k jobs, look up a solution in the table. Note that we can re-order each schedule S so that all jobs from one path contiguously appear in S, without violating the precedence constraints by this re-ordering nor changing the cost of the schedule. Hence, T [{P1 , . . . , Pπ }, q] gives the minimum schedule cost. The number of entries in the table is π · q, and computing each entry T [{P1 , . . . , Pℓ }, ·] is linear in p(ℓ) (for each ℓ, 1 ≤ ℓ ≤ π ), which leads to a run time of the dynamic programming algorithm that is polynomially bounded in the input size. ❑ Theorem 4.4 MB-AM-PLP is in P. m×n Proof. Let (P,CP , B,t) be a given MB-AM-PLP instance, where P ∈ Q[0,1] , CP is a cost matrix, B is The Lobby’s budget, and t is a given threshold. Let k be the discretization level of P, i.e., the interval is divided into k + 1 steps of size 1/(k+1) each. For j ∈ {1, 2, . . . , n}, let d j be the minimum cost for The Lobby to bring referendum r j into line with the jth entry of its target vector 1n . If ∑nj=1 d j ≤ B, then The Lobby can achieve its goal that the votes on all issues pass. For every r j , create an equivalent PATH S CHEDULING instance. First, compute for r j the minimum number b j of bribery steps needed to achieve The Lobby’s goal on r j . That is, choose the smallest b j ∈ N such that p j + b j/(k+1)m > t. Now, given r j , derive a path Pi from the price function ci, j for every voter vi , 1 ≤ i ≤ m, as follows. 1. Let s, 0 ≤ s ≤ k + 1, be minimum with the property ci, j (s/(k+1)) ∈ N>0 . 2. Create a path Pi = ((ps , i), . . . , (pk+1 , i)), where ph = h/(k+1). 3. Assign the cost ĉ((ph , i)) = ci, j (ph ) − ci, j (p(h−1) ) to (ph , i), where s + 1 ≤ h ≤ k + 1. Note that ĉ((ph , i)) represents the cost of raising the probability of voting “yes” from (h−1)/(k+1) to h/(k+1). In order to do so, we must have reached an acceptance probability of (h−1)/(k+1) first. Now, let the number of jobs to be scheduled be b j . Note that one can take b j bribery steps at the cost of d j dollars if and only if one can schedule b j jobs with a cost of d j . Hence, we can decide whether or not (P,CP , B) is in MB-AM-PLP by using the dynamic program given in the proof of Lemma 4.3. ❑ 15 4.2 Voter Bribery Recall the O PTIMAL L OBBYING problem (OL) defined in Section 1.1. Again, The Lobby’s target vector ~Z may assumed to be all ones, without loss of generality, so ~Z may be dropped from the input. Christian et al. [CFRS07] proved that this problem is W[2]-complete by reducing from the W[2]complete problem k-D OMINATING S ET to OL (showing the lower bound) and from OL to the W[2]complete problem I NDEPENDENT-k-D OMINATING S ET (showing the upper bound). In particular, this implies NP-hardness of OL. The following result focuses on the classical complexity of VB-SM-PLP and VB-AM-PLP; the parameterized complexity of these problems will be studied in Section 5 and will make use of the proof of Theorem 4.5 below. To employ the W[2]-hardness result of Christian et al. [CFRS07], we show that OL is a special case of VB-SM-PLP and thus (parameterized) polynomial-time reduces to VB-SM-PLP. Analogous arguments apply to VB-AM-PLP. Theorem 4.5 VB-SM-PLP and VB-AM-PLP are NP-complete. Proof. Membership in NP is obtained through a “guess-and-check” algorithm for VB-SM-PLP and VB-AM-PLP. We present the details for the sake of completeness. Let (P,CP , B,t) be a given m×n instance of VB-Y-PLP for evaluation criterion Y ∈ {SM, AM}, where P ∈ Q[0,1] is a probability matrix with cost matrix CP (with integer entries), B is a budget, and t is a threshold. Nondeterministically guess a subset V of rows in P (each corresponding to a voter to be influenced in this nondeterkV k ministic branch) and a corresponding list DV = (d1 , d2 , . . . , dkV k ) of integers such that ∑i=1 di ≤ B, where di is the amount of bribery money to be spent on vi ∈ V in this nondeterministic branch. For any (V, DV ) guessed, check deterministically whether spending di on vi , for each vi ∈ V , will change (according to the cost matrix CP ) the given matrix P into a new matrix PV such that each issue evaluates to “yes” in PV under evaluation criterion Y with respect to threshold t, and accept/reject accordingly on this nondeterministic branch. We now prove that VB-SM-PLP is NP-hard by reducing OL to VB-SM-PLP. We are given an instance (E, b) of OL, where E is a m×n 0/1 matrix and b is the number of votes to be edited. Recall that The Lobby’s target vector is 1n . We construct an instance of VB-SM-PLP consisting of the given matrix P = E (a “degenerate” probability matrix with only the probabilities 0 and 1), a corresponding cost matrix CP , and a budget B. CP has two columns (we have k = 0, since the problem instance is deterministic, see Section 2.1), one column for probability 0 and one for probability 1. All entries of CP corresponding to pi, j 6= 1 are set to unit cost: ci, j [1] = 1 if pi, j 6= 1. Set the threshold t to 1/2. The cost of increasing any value in P is n, since donations are distributed evenly across issues for a given voter. We want to know whether there is a set of bribes of cost at most b · n = B such that The Lobby’s agenda passes. This holds if and only if there are b voters that can be bribed so that they vote uniformly according to The Lobby’s agenda and that is sufficient to pass all the issues. Thus, the given instance (E, b) is in OL if and only if the constructed instance (P,CP , B,t) is in VB-SM-PLP, which shows that OL is a polynomial-time recognizable special case of VB-SM-PLP, and thus VB-SM-PLP is NP-hard. 16 Problem MB-SM-PLP-WIW MB-AM-PLP-WIW VB-SM-PLP-WIW VB-AM-PLP-WIW Classical Complexity NP-complete NP-complete NP-complete NP-complete Parameterized Complexity Budget Budget & per Issue Discr. Level FPT ? (FPT) FPT ? (FPT) FPT W[2]-complete∗ FPT ? W[2]-hard FPT Budget Stated in or implied by Thm./Cor. 4.6, 5.6 4.6, 5.6 4.7, 5.7, 5.8, 5.9 4.7, 5.8, 5.7 Table 2: Complexity results for X-Y-PLP-WIW, where X ∈ {MB, VB} and Y ∈ {SM, AM} Note that for the construction above it does not matter whether we use the strict-majority criterion (SM) or the average-majority criterion (AM). Since the entries of P are 0 or 1, we have p j > 0.5 if and only if we have a strict majority of ones in the jth column. Thus, VB-AM-PLP is NP-hard, too. ❑ 4.3 Probabilistic Lobbying with Issue Weighting Table 2 summarizes some of our results for X-Y-PLP-WIW, where X ∈ {MB, VB} and Y ∈ {SM, AM}; again, note that Table 2 does not cover all our results. The most interesting observation from the table is that introducing issue weights raises the complexity from P to NP-completeness for all cases of microbribery (though it remains the same for voter bribery). Nonetheless, we show (Theorem 5.6) that these NP-complete problems are fixed-parameter tractable. Another interesting observation concerns the question of membership in W[2]. In the case indicated by the ∗ annotation, we can show this membership only when we take the lower bound O quantifying the objective of the bribery (in terms of issue weights) as a further parameter. Question marks indicate open problems. Theorem 4.6 MB-SM-PLP-WIW and MB-AM-PLP-WIW are each NP-complete. Proof. Membership in NP can be shown with a “guess-and-check” algorithm for both problems.. The argument is analogous to that for NP membership of the problems VB-SM-PLP-WIW and VB-AM-PLP-WIW presented in the proof of Theorem 4.5, except that now we guess a subset E of entries in the given probability matrix P (rather than a subset V of rows of P) along with a corresponding list DE = (d1 , d2 , . . . , dkEk ) that collects the amounts of bribery money to be spent on each entry in E. To prove that MB-SM-PLP-WIW is NP-hard, we give a reduction from the well-known NPcomplete problem K NAPSACK (see, e.g., [GJ79]) to the problem MB-SM-PLP-WIW. In K NAP SACK , we are given a set of objects U = {o1 , . . . , on } with weights w : U → N and profits p : U → N, and W, P ∈ N. The question is whether there is a subset I ⊆ {1, . . . , n} such that ∑i∈I w(oi ) ≤ W and ∑i∈I p(oi ) ≥ P. Given a K NAPSACK instance (U, w, p,W, P), create an MB-SM-PLP-WIW instance with k = 0 and only one voter, v1 , where for each issue, v1 ’s acceptance probability is either zero or one. For each object o j ∈ U , create an issue r j such that the acceptance probability of v1 is zero. Let the cost of raising this probability on r j be c1, j (1) = w(o j ) and let the weight of issue r j be w j = p(o j ). Let The Lobby’s budget be W and its objective value be O = P. Set the threshold 17 t to 1/2. By construction, there is a subset I ⊆ {1, . . . , n} with ∑i∈I w(oi ) ≤ W and ∑i∈I p(oi ) ≥ P if and only if there is a subset I ⊆ {1, . . . , n} with ∑i∈I c1,i (1) ≤ W and ∑i∈I wi ≥ O. As the reduction introduces only one voter, there is no difference between the evaluation criteria SM and AM. Hence, the above reduction works for both problems. ❑ Turning now to voter bribery with issue weighting, note that an immediate consequence of Theorem 4.5 is that VB-SM-PLP-WIW and VB-AM-PLP-WIW are NP-hard, since they are generalizations of VB-SM-PLP and VB-AM-PLP, respectively. Again, membership in NP can be seen using appropriate “guess-and-check” algorithms for the more general problems. Corollary 4.7 VB-SM-PLP-WIW and VB-AM-PLP-WIW each are NP-complete. 5 Parameterized Complexity Results In this section, we study the parameterized complexity of our probabilistic lobbying problems. Parameterized hardness is usually shown by proving hardness for the levels of the W-hierarchy (with respect to parameterized reductions). Indeed, this hierarchy may be viewed as a “barometer of parametric intractability” [DF99, p. 14]. The lowest two levels of the W-hierarchy, W[0] = FPT and W[1], are the parameterized analogues of the classical complexity classes P and NP. We will show completeness results for the W[2] level of this hierarchy. In parameterized complexity, the standard parameterization for minimization problems is an upper bound on the entity to be minimized. In our case, this is the budget B. Since in the voter bribery model, the money is equally distributed over all referenda, it also makes sense to consider the upper bound B/n, i.e., the budget per referendum, as a natural, derived parameter. Another natural way of parameterization is derived from certain properties of the input, be they implicit or explicit. In our case, the discretization level can be considered as such a parameter, in particular, since the smallest discretization level has been already considered before within the OPTIMAL LOB BYING problem [CFRS07]. Therefore, we examine all three of these parameterizations in order to understand the effect the choice of parameterizations has on the complexity of the problems. 5.1 Voter Bribery Theorem 5.1 VB-SM-PLP and VB-AM-PLP (parameterized by the budget and by the discretization level) are in FPT. Proof. Consider an instance of VB-Y-PLP, Y ∈ {SM, AM}, i.e., we are given n referenda and m voters, as well as a cost matrix CP (with either −− or integer entries), a discretization level k, a budget B, and a threshold t. Recall that the target vector ~Z of The Lobby is assumed to be 1n . Hence, the rows of CP are monotonically nondecreasing (after possibly some −− entries). Observe that any successful bribe of any voter needs at least n dollars, since the money is evenly distributed among all referenda, and at least one dollar is needed to influence the chosen voter’s votes for all referenda. Hence, B ≥ n. We can assume that any entry in CP is limited by B + 1, after replacing 18 every entry bigger than B by B + 1. Notice that the entry B + 1 reflects that the intended bribery cannot be afforded. Although k could be bigger than B, the interesting area of each row in CP (containing integer entries) cannot have more than B strict increases in the sequence. We therefore encode each row in CP by a sequence (k1 , b1 , k2 , b2 , . . . , kℓ , bℓ ), ℓ ≤ B, which reads as follows: By investing b j dollars, we proceed to column number ∑i≤ j ki . Note that k is given in unary in the original instance (implicitly by giving the cost matrix CP ), and that each k j can be encoded with log k bits. Hence, we extract from CP for each voter v a submatrix SP (v) with n ≤ B rows (for the referenda) and at most 2B columns (encoding the “jumps” in the integer sequence as described above). This matrix with at most B rows and at most 2B columns can be alternatively viewed as a matrix with at most B rows and at most B columns, where each matrix entry consists of a pair of numbers, one between 1 and B + 1 2 and one of size at most log k. Therefore, we can associate with each voter at most (B + 1 + log k)B distinct submatrices SP (v) of this kind, called voter profiles. It makes no sense to store more than 2 B voters with the same profile. Hence, we can assume that m ≤ B · (B + 1 + log k)B . Therefore, all relevant parts of the input are bounded by a function in the parameters B and k,5 so that a brute-force algorithm can be used to solve the instance. This shows that the problem is in FPT. ❑ If we assume that the discretization level is a rather small number, the preceding theorem says that the problems VB-SM-PLP and VB-AM-PLP can be solved efficiently in practice. Although we were not able to establish an FPT result for VB-AM-PLP when the discretization level is not part of the parameter (but only the budget is), we can overcome this formal obstacle for VB-SM-PLP, as the following result shows. Theorem 5.2 VB-SM-PLP (parameterized by the budget) is in FPT. Proof. Let an instance of VB-SM-PLP be given. From the given cost matrix CP , we extract the information W (i, j) that gives the minimum amount of money The Lobby must spend on voter vi to turn his or her voting behavior on issue r j in favor of The Lobby’s agenda, eventually raising the corresponding voting probability beyond the given threshold t. Each entry in W (i, j) is between 0 and B. Moreover, as argued in the previous proof, there are no more than B issues and we again define a voter profile (this time the ith row of the table W (i, j) gives such a profile) for each voter, and we need to keep at most B voters with the same profile. Hence, no more than B(B + 1)B voters are present in the instance. Therefore, some brute-force approach can be used to show membership in FPT. ❑ The area of parameterized complexity leaves some freedom regarding the choice of parameterization. The main reason that the standard parameterization (referring to the entity to be minimized, in this case the budget) yields an FPT result is the fact that the parameter is already very big compared to the overall input (e.g., the number of issues n) by the very definition of the problem: Since the money given to one voter will be evenly distributed among the issues and since the cost matrix contains only integer entries, it makes no sense at all to spend less than n dollars on a voter. Hence, the budget should be at least n dollars (assuming that some of the voters must be influenced by The 5 In technical terms, this means that we have derived a so-called problem kernel for this problem. 19 Lobby to achieve their agenda). This obstacle can be sidestepped by changing the parameterization to B/n, i.e., to the “budget per issue” (see, e.g., Theorem 5.3). Note that another way would be allowing rational numbers as entries in the cost matrix but we will not consider this in this paper but rather focus on the previous one. Theorem 5.3 VB-SM-PLP (parameterized by the budget per issue) is W[2]-complete. Proof. W[2]-hardness can be derived from the proof of Theorem 4.5. Recall that in the proof of this theorem an instance (E, b) of OL was reduced to an instance of VB-SM-PLP, with budget B = n · b. Hence, the parameter “budget per issue” of that VB-SM-PLP instance equals b. Therefore, the reduction in the proof of Theorem 4.5 preserves the parameter and hence W[2]-hardness follows from the W[2]-hardness of OL, see [CFRS07]. Moreover, the instance of VB-SM-PLP produced by the reduction has discretization level zero. To show membership in W[2], we reduce VB-SM-PLP to SMNTMC, which was defined in Section 3. To this end, it suffices to describe how a nondeterministic multi-tape Turing machine can solve such a lobbying problem. Consider an instance of VB-AM-PLP: a probability matrix P ∈ Qm×n [0,1] with a cost matrix CP , a budget B, and a fixed threshold t. We may identify t with a certain step level for the price functions. The reducing machine works as follows. From P, CP , and t, the machine extracts the information Hi, j (d), 1 ≤ d ≤ B, where Hi, j (d) is true if pi, j ≥ t or if ci, j (t) ≤ d/n. Note that the bribery money is evenly distributed across all issues, also note that Hi, j (d) captures whether paying d dollars to voter vi helps to raise the acceptance probability of vi on referendum r j above the threshold t. Moreover, for each referendum r j , the reducing machine computes the minimum number of voters that need to switch their opinion so that majority is reached for that specific referendum; let s( j) denote this threshold for r j . Since the cost matrix contains integer entries, meaningfully bribing s voters costs at least s · n dollars; only then each referendum will receive at least one dollar per voter. Hence, a referendum with s( j) > B/n yields a NO instance. We can therefore replace any value s( j) > B/n by the value ⌊B/n⌋ + 1. From Hi, j (d), the reducing machine produces (basically by sorting) another winning table Wi (ℓ) that lists for voter vi those referenda where the acceptance probability of vi on referendum r j is raised above the threshold t by paying to vi the amount of ℓ · n dollars but not by paying (ℓ − 1) · n dollars. Note that we can assume that the bribery money is spent in multiples of n, the number of referenda, since spending n dollars on some voter means spending one dollar per issue for that voter. This table is initialized by Wi (0) listing those referenda already won at the very beginning, although this is not an important issue due to the information contained in s( j). The nondeterministic multi-tape Turing machine M we describe next has, in particular, access to Wi (ℓ) and to s( j). M has n + 1 working tapes T j , 0 ≤ j ≤ n, all except one of which correspond to issues r j , 1 ≤ j ≤ n. We will use the set of voters, V = {v1 , . . . , vm }, as part of the work alphabet. The (formal) input tape of M is ignored. M starts by writing s( j) symbols # onto tape j for each j, 1 ≤ j ≤ n. By using parallel writing steps, this needs at most ⌊B/n⌋ + 1 steps, since s( j) ≤ ⌊B/n⌋ + 1 as argued above. We also need an “information hiding” trick here: every time the machine writes a # symbol, it moves the writing head, so that in the next step the head will read a blank symbol. The trick is required in order to keep 20 the transition table small: basically, we cannot insert in the transition table 2n different instructions to take into account all different congurations of blank and # symbols on the n tapes. Second, for each i ∈ {1, . . . , m}, M writes ki symbols vi from the alphabet V on the zeroth tape, B T0 , such that ∑m i=1 ki ≤ /n. This is the nondeterministic guessing phase where the amount of bribery money spent on each voter, namely ki · n for voter vi , is determined. The finite control is used to ensure that a word from the language {v1 }∗ · {v2 }∗ · · · {vm }∗ is written on tape T0 . In the third phase, M reads tape T0 . In its finite control, M stores the “current voter” whose bribery money is read. For each voter vi , a counter ci is provided (within the finite memory of M). If a symbol vi is read, ci is incremented, and then M moves in parallel all the heads on the tapes T j , where j is contained in Wi (ci ). Hence, the string on tape T0 is being processed in at most B/n (parallel) steps. Finally, it is checked if the left border is reached (again) for all tapes T j , j > 0. This is the case if and only if the guessed bribery was successful. ❑ The W[2]-hardness proof for VB-AM-PLP is analogous. Recall that VB-SM-PLP is the same as VB-AM-PLP if the discretization level is zero. So, we conclude: Corollary 5.4 VB-AM-PLP (parameterized by the budget per issue) is W[2]-hard. Membership in W[2] is an open problem for VB-AM-PLP when parameterized by the budget per issue. In contrast, we show definitive parameterized complexity results for different parameterizations. Theorem 5.5 VB-SM-PLP and VB-AM-PLP (parameterized by the budget per issue and by the discretization level) are W[2]-complete. Proof. As mentioned above, we already have hardness for a discretization level of zero, i.e., when the second parameter is fixed to the lowest possible value. We implicitly show membership in W[2] for VB-SM-PLP in Theorem 5.3 when the second parameter only plays a role in the polynomial part of the run time estimate. Hence, the claim is a simple corollary of what we have already shown above. It remains to prove membership in W[2] for VB-AM-PLP. This can be seen by modifying the proof of Theorem 5.3. To show membership in W[2], we reduce VB-AM-PLP to SMNTMC. So, it suffices to describe how a nondeterministic multi-tape Turing machine can solve such a lobbying problem. m×n Consider an instance of VB-SM-PLP: a probability matrix P ∈ Q[0,1] with a cost matrix CP , a budget B, and a fixed threshold t. Again, we may identify t with a certain step level for the price functions. From this input, the reducing machine computes the following: • It does some preprocessing, so that it is guaranteed that the overall money that could be meaningfully invested on any voter is bounded by ⌈B/n⌉, which is the first parameter. No 21 larger amount of money is available, anyhow. Confidence steps that cannot be reached at all are modeled by requiring an investment of (all in all) ⌊B/n⌋ + 1 dollars on that voter for each issue. • It computes the entity s( j) that now denotes the number of confidence steps issue r j has to be raised in total to ensure a win of that referendum. Notice that s( j) can be assumed to be bounded by the product of the first parameter, more precisely, by ⌊B/n⌋ + 1 (as argued before), and the second parameter, more precisely, by k + 1: Each bribe (to whatever voter v) of n dollars (recall that we can again rely on bribery money being used in multiples of n, the number of issues) will raise v’s confidence in voting according to the agenda of The Lobby by at most k + 1 steps. • It finally computes Wi (ℓ) which now gives the list of issues whose confidence is raised when investing ℓ · n dollars on vi (compared to (ℓ − 1) · n dollars), plus the number of confidence steps by which the corresponding issue is raised. The nondeterministic multi-tape Turing machine M we describe next has, in particular, access to Wi (ℓ) and to s( j). M has n + 1 working tapes T j , 0 ≤ j ≤ n, all except one of which correspond to issues r j , 1 ≤ j ≤ n. We will use the set of voters, V = {v1 , . . . , vm }, as part of the work alphabet. The (formal) input tape of M is ignored. M starts by writing s( j) symbols # onto tape j for each j, 1 ≤ j ≤ n. By using parallel writing steps, this needs at most f (B/n, k) := (⌊B/n⌋ + 1) (k + 1) steps, since s( j) ≤ f (B/n, k) as argued above. The “information hiding” trick works as before. Second, for each i ∈ {1, . . . , m}, M writes ki symbols vi from the alphabet V on the zeroth tape, B T0 , such that ∑m i=1 ki ≤ /n. This is the nondeterministic guessing phase where the amount of bribery money spent on each voter, namely ki · n for voter vi , is determined. The finite control is used to ensure that a word from the language {v1 }∗ · {v2 }∗ · · · {vm }∗ is written on tape T0 . In the third phase, M reads tape T0 . In its finite control, M stores the “current voter” whose bribery money is read. For each voter vi , a counter ci is provided (within the finite memory of M). If a symbol vi is read, ci is incremented, and then M moves in parallel all the heads on the tapes T j , where j is contained in Wi (ci ); notice that the number of steps each head has to move is now also stored in Wi (ci ). Hence, the string on tape T0 is being processed in at most f (B/n, k) (parallel) steps. Finally, it is checked if the left border is reached (again) for all tapes T j , j > 0. This is the case if and only if the guessed bribery was successful. ❑ 5.2 Probabilistic Lobbying with Issue Weighting Recall from Theorem 4.6 that MB-SM-PLP-WIW and MB-AM-PLP-WIW are NP-complete. We now show that each of these problems is fixed-parameter tractable when parameterized by the budget. To this end, recall the K NAPSACK problem that was defined in the proof of Theorem 4.6: Given two finite lists of binary encoded integers, (ci )ni=1 (a list of costs) and (pi )ni=1 (a list of profits) associated to a list (oi )ni=1 of objects, as well as two further integers, C and P (both encoded in binary), the question is whether there is a subset J of {1, . . . , n} such that ∑i∈J ci ≤ C and ∑i∈J pi ≥ P. 22 Thus, putting all objects from {o j | j ∈ J} into your backpack does not violate your cost constraint C but does satisfy your profit demand P. K NAPSACK is an NP-hard problem that allows a pseudopolynomial time algorithm. More precisely, this means that if all cost and profit values are given in unary, a polynomial-time algorithm can be provided by using dynamic programming (see [KPP04] for details). This yields PTAS results both for the minimization version M IN -K NAPSACK (where the goal is to minimize the costs, subject to the profit lower bound) and for the maximization version M AX-K NAPSACK (where the goal is to maximize the profits, subject to the cost upper bound). Theorem 5.6 MB-SM-PLP-WIW and MB-AM-PLP-WIW (parameterized by the budget or by the objective) are in FPT. Proof. Since the unweighted variants of both problems are in P, we can compute the amount d j of dollars to be spent to win referendum r j in polynomial time in both cases. The interesting cases are the weighted ones. We re-interpret the given MB-Y-PLP-WIW instance, where Y ∈ {SM, AM}, as a K NAPSACK instance. In the MB-Y-PLP-WIW instance, every issue r j has an associated cost d j and weight w j . The aim is to find a set of issues, i.e., a set J ⊆ {1, . . . , n}, such that ∑ j∈J d j ≤ B and ∑ j∈J w j ≥ O. Consider r j as an object o j in a K NAPSACK instance with cost c j = d j and profit p j = w j , with the bounds C = B and P = O. Then the J ⊆ {1, . . . , n} that is a solution to the MB-Y-PLP-WIW instance is also a solution to the K NAPSACK instance, and vice-versa. Furthermore, the pseudopolynomial algorithm that solves K NAPSACK in time O(n2|B| ), where |B| denotes the length of the encoding of B, also solves MB-Y-PLP-WIW. Observe that the given reduction works for both SM and AM because we introduce only one referendum. We now use the pseudo-polynomial algorithm to solve K NAPSACK in time O(n2|O| ), where |O| denotes the length of the encoding of O. ❑ Voter bribery with issue weighting keeps its complexity status for both evaluation criteria. Since we can incorporate issue weights into brute-force computations, we have the following corollary to Theorems 5.1 and 5.2. Corollary 5.7 1. VB-SM-PLP-WIW and VB-AM-PLP-WIW (parameterized by the budget and by the discretization level) are in FPT. 2. VB-SM-PLP-WIW (parameterized by the budget) is in FPT. It is not hard to transfer the W[2]-hardness results from the unweighted to the weighted case. However, it is unclear to us if or how the membership proofs of the preceding section transfer. The difficulty appears to lie in the weights that the reducing machine or the produced Turing machine would have to handle. Since it is not known in advance which items will be bribed to meet the objective requirement O, the summation of item weights cannot be performed by the reducing machine, but must be done by the produced nondeterministic multi-tape Turing machine. However, this Turing machine may only use time that can be measured in the parameter, which has been budget per issue in the unweighted case. We do not see how to do this. Therefore, we can state only the following. 23 Corollary 5.8 VB-SM-PLP-WIW and VB-AM-PLP-WIW (parameterized by the budget per issue) are W[2]-hard. Theorem 5.9 VB-SM-PLP-WIW (parameterized by the budget per issue and by the objective) is in W[2]. Proof. Membership in W[2] is a bit more tricky than in the unweighted case from Theorem 5.3. To show membership in W[2], we reduce VB-SM-PLP-WIW to SMNTMC. We describe how a nondeterministic multi-tape Turing machine M can solve such a lobbying problem. m×n Consider an instance of VB-SM-PLP-WIW: a probability matrix P ∈ Q[0,1] with a cost matrix CP , a budget B, and a fixed threshold t, as well as an objective O. We may again identify t with a certain step level for the price functions. We describe the work of the reducing machine in the following. • The reducing machine calculates the difference O′ between the target weight and the sum of the weights of the referenda that are already won. • The reducing machine replaces issue weights bigger than O′ with O′ + 1. • The reducing machine eliminates all referenda that are already won. • For each referendum that is not already won, the reducing machine introduces a special letter ri to be used on tape T0 of the Turing machine to be constructed. For simplicity, we assume in the following that O′ = O, i.e., the reduction steps described above have not changed the instance. After these steps, all the weights are bounded by the second parameter. Moreover, recall that by the problem definition, the weight associated to each issue is at least one. Otherwise, the reducing machine works as described in the proof of Theorem 5.3. In particular, from P, CP , and t, the machine extracts the information Hi, j (d), 1 ≤ d ≤ B, and then s( j) (per r j ) and finally the winning table Wi (ℓ). We now describe how the Turing machine M works. • M begins by guessing ν ≤ O referenda that should also be won. (Recall that the weight associated to each issue is at least one, so guessing more than O referenda is not necessary.) Then, M spends O( f (O)) time calculating whether winning those guessed referenda rγ (1) , . . . , rγ (ν ) , ν ≤ O, would be sufficient to exceed the threshold O. If not, M halts and rejects, otherwise it continues working. • The mentioned threshold test can be implemented as follows: M guesses at most O referenda and writes the corresponding symbols on tape T0 . It first checks if all guessed referenda are pairwise different. If not, M stops and rejects. Otherwise, M writes a special symbol O − 1 times on the second tape, T1 , and moves its head on this tape to the right. Then, it moves its head w j steps to the left on tape T1 (replacing the special symbol by the blank symbol again) upon reading symbol r j on tape T0 . The threshold O is passed if and only if the blank symbol 24 is read on T1 after processing rγ (ν ) on tape T0 . Notice that tape T1 will be empty again after this phase, while tape T0 will still contain the guessed referenda. Observe that the time needed by the Turing machine M depends only on O. • M will then continue to work as described in the proof of Theorem 5.3. During this phase, the weights will be completely ignored. In particular, this part of M can be produced in polynomial time by the reducing machine. As can be seen in the proof of Theorem 5.3, the time needed by M in this phase depends only on B/n. • Finally, M will verify if all (at most O) referenda guessed initially have been won. In contrast to the proof of Theorem 5.3, this test can now be implemented in a sequential fashion (upon reading r j on tape T0 , the corresponding test is performed on tape T j ), needing time dependent on O. ❑ This concludes the proof sketch. It might be that W[2] is not the smallest class in the W-hierarchy where the problem discussed in the preceding theorem could be placed. However, we do not know how to find an FPT or W[1] algorithm for it, even in the case when all weights equal one. This is in contrast to the possibly related problem PARTIAL t-D OMINATION, which asks whether there is a set of at most k vertices in a graph that dominates at least t vertices. Our belief that these two problems are related is motivated by the fact that the classical dominating set problem was the starting point of the reduction showing hardness for O PTIMAL L OBBYING. Kneis, Mölle, and Rossmanith showed that the problem PARTIAL t-D OMINATION is in FPT even when parameterized by the threshold parameter t alone [KMR07]. 6 Approximability As seen in Tables 1 and 2, many problem variants of probabilistic lobbying are NP-complete. Hence, it is interesting to study them not only from the viewpoint of parameterized complexity, but also from the viewpoint of approximability. The budget constraint on the bribery problems studied so far gives rise to natural minimization problems: Try to minimize the amount spent on bribing. For clarity, let us denote these minimization problems by prefixing the problem name with M IN , leading to, e.g., M IN -OL. 6.1 Voter Bribery is Hard to Approximate The already-mentioned reduction of Christian et al. [CFRS07] (that proved that OL is W[2]-hard) is parameter-preserving (regarding the budget). The reduction also has the property that a possible solution found in the OL instance can be re-interpreted as a solution to the D OMINATING S ET instance that the reduction started with, and the OL solution and the D OMINATING S ET solution are of the same size. This in particular means that inapproximability results for D OMINATING S ET transfer to inapproximability results for OL. Similar observations are true for the interrelation of S ET C OVER and D OMINATING S ET, as well as for OL and VB-SM-PLP-WIW (or VB-AM-PLP-WIW). 25 The known inapproximability results [BGLR93, RS97] for S ET C OVER hence give the following result (see also Footnote 4 in [SSGL02]). Theorem 6.1 There is a constant c > 0 such that M IN -OL is not approximable within factor c·log n unless NP ⊂ DTIME(nlog log n ), where n denotes the number of issues. Since OL can be viewed as a special case of both problem VB-Y-PLP and problem VB-Y-PLP-WIW for Y ∈ {SM, AM}, we have the following corollary. Corollary 6.2 For Y ∈ {SM, AM}, there is a constant cY > 0 such that both M IN -VB-Y-PLP and M IN -VB-Y-PLP-WIW are not approximable within factor cY ·log n unless NP ⊂ DTIME(nlog log n ), where n denotes the number of issues. Proof. The proof of Theorem 4.5 explains in detail how to interpret an instance of OL as a VB-Y-PLP instance, Y ∈ {SM, AM}. The relation B = n · b between the budget B and the number of voters b holds for both optimum and approximate solutions. Hence, the n is canceled out when looking at the approximation ratio. ❑ Conversely, a logarithmic-factor approximation can be given for the minimum-budget versions of all our problems, as we will show now. We first discuss the relation to the well-known S ET C OVER problem, sketching a tempting, yet flawed reduction and pointing out its pitfalls. Avoiding these pitfalls, we then give an approximation algorithm for M IN -VB-AM-PLP. Moreover, we define the notion of cover number, which allows to state inapproximability results for M IN VB-AM-PLP. Similar results hold for M IN -VB-SM-PLP, the constructions are sketched at the end of the section. Voter bribery problems are closely related to set cover problems, in particular in the averagemajority scenario, so that we should be able to carry over approximability ideas from that area. The intuitive translation of a M IN -VB-AM-PLP instance into a S ET C OVER instance is as follows: The universe of the derived S ET C OVER instance should be the set of issues, and the sets (in the S ET C OVER instance) are formed by considering the sets of issues that could be influenced (by changing a voter’s opinion) through bribery of a specific voter. Namely, when we pay voter v a specific amount of money, say d dollars, he or she will credit d/n dollars to each issue and possibly change v’s opinion (or at least raise v’s acceptance probability to some “higher level”). The weights associated with the sets of issues correspond to the bribery costs that are (minimally) incurred to lift the issues in the set to some “higher level.” There are four differences to classical set covering problems: 1. Multiple voters may cover the same set of issues (with different bribing costs). 2. The sets associated with one voter are not independent. For each voter, the sets of issues that can be influenced by bribing that voter are linearly ordered by set inclusion. Moreover, when bribing a specific voter, we have to first influence the “smaller sets” (which might be expensive) before possibly influencing the “larger ones”; so, weights are attached to set differences, rather than to sets. 26 3. A cover number c(r j ) is associated with each issue r j , indicating by how many levels voters must raise their acceptance probabilities in order to arrive at average majority for r j . The cover numbers can be computed beforehand for a given instance. Then, we can also associate cover numbers with sets of issues (by summation), which finally leads to the cover number N = ∑nj=1 c(r j ) of the whole instance. 4. The money paid “per issue” might not have been sufficient for influencing a certain issue up to a certain level, but it is not “lost”; rather, it would make the next bribery step cheaper, hence (again) changing weights in the set cover interpretation. To understand these connections better, let us have another look at our running example (under voter bribery with average-majority evaluation, i.e., M IN -VB-AM-PLP), assuming an all-ones target vector. If we paid 30 dollars to voter v1 , he or she would credit 10 dollars to each issue, which would raise his or her acceptance probability for the second issue from 0.3 to 0.4; no other issue level is changed. Hence, this would correspond to a set containing only r2 with weight 30. Note that by this bribery, the costs for raising the acceptance probability of voter v1 to the next level would be lowered for the other two issues. For example, spending 15 more dollars on v1 would raise r3 from 0.5 to 0.6, since all in all 45 dollars have been spent on voter v1 , which means 15 dollars per issue. If the threshold is 60% in that example, then the first issue is already accepted (as desired by The Lobby), but the second issue has gone up from 0.5 to only 0.55 on average, which means that we have to raise either the acceptance probability of one voter by two levels (for example, by paying 210 dollars to voter v1 ), or we have to raise the acceptance probability of each voter by one level (by paying 30 dollars to voter v1 and another 30 dollars to voter v2 ). This can be expressed by saying that the first issue has a cover number of zero, and the second has a cover number of two. When we interpret an OL instance as a VB-AM-PLP instance, the cover number of the resulting instance equals the number of issues, assuming that the votes for all issues need amendment. Thus we have the following corollary: Corollary 6.3 There is a constant c > 0 such that M IN -VB-AM-PLP is not approximable within factor c · log N unless NP ⊂ DTIME(N log log N ), where N is the cover number of the given instance. A fortiori, the same statement holds for M IN -VB-AM-PLP-WIW. Let H denote the harmonic sum function, i.e., H(r) = ∑ri=1 1/i. It is well known that H(r) = O(log r). More precisely, it is known that ln r ≤ H(r) ≤ ln r + 1. We now show the following theorem. Theorem 6.4 M IN -VB-AM-PLP can be approximated within a factor of ln(N) + 1, where N is the cover number of the given instance. Proof. Consider the greedy algorithm shown in Figure 1, where t is the given threshold and we assume that The Lobby has the all-ones target vector. Note that the cover numbers (per referendum) 27 m×n Input: A probability matrix P ∈ Q[0,1] (implicitly specifying a set V of m voters and a set R of n referenda), a cost matrix CP , a treshold t, and n cover numbers c(r1 ), . . . , c(rn ) ∈ N. 1. Delete referenda that are already won (indicated by c(r j ) = 0), and modify R and CP accordingly. 2. If R = 0/ then output the amount spent on bribing so far and STOP. 3. For each voter v, compute the least amount of money, dv , that could raise any level in CP . Let nv be the number of referenda whose levels are raised when spending dv dollars on voter v. 4. Bribe voter v such that dv/nv is minimum. 5. Modify CP by subtracting dv/n from each amount listed for voter v. 6. Modify c by subtracting one from c(r) for those referenda r ∈ R influenced by this bribery action. 7. Recurse. Figure 1: Greedy approximation algorithm for M IN -VB-AM-PLP in Theorem 6.4 can be computed from the cost matrix CP and the threshold t before calling the algorithm the very first time. Observe that our greedy algorithm influences voters by raising their acceptance probabilities by only one level, so that the amount dv possibly spent on voter v in Step 3 of the algorithm actually corresponds to a set of referenda; we do not have to consider multiplicities of issues (raised over several levels) here. Let S1 , . . . , Sℓ be the sequence of sets of referenda picked by the greedy bribery algorithm, along with the sequence v1 , . . . , vℓ of voters and the sequence d1 , . . . , dℓ of bribery dollars spent this way. Let R1 = R, . . . , Rℓ , Rℓ+1 = 0/ be the corresponding sequence of sets of referenda, with the accordingly modified cover numbers ci . Let j(r, k) denote the index of the set in the sequence influencing referendum r the kth time with k ≤ c(r), i.e., r ∈ S j(r,k) and |{i < j(r, k) | r ∈ Si }| = k − 1. To cover r the kth time, we have to pay χ (r, k) = d j(r,k)/|S j(r,k) | dollars. The greedy algorithm will incur a cost c(r) of χgreedy = ∑r∈R ∑k=1 χ (r, k) in total. An alternative view of the greedy algorithm is from the perspective of the referenda: By running the algorithm, we implicitly define a sequence s1 , . . . , sN of referenda, where N = c(R) = ∑r∈R c(r) is the cover number of the original instance, such that S1 = {sλ (1) , . . . , sρ (1) }, S2 = {sλ (2) , . . . , sρ (2) }, . . . , Sℓ = {sλ (ℓ) , . . . , sρ (ℓ) }, where λ , ρ : {1, . . . , ℓ} → {1, . . . , N} are functions such that λ (i) gives the element of Si with the smallest subscript and ρ (i) gives the element of Si with the greatest 28 subscript for each i, 1 ≤ i ≤ ℓ: λ (i) = 1 + ∑ |S j | and j<i ρ (i) = ∑ |S j |. j≤i Ties (how to list elements within any Si ) are broken arbitrarily. Slightly abusing notation, we associate a cost χ ′ (si ) with Si for each i, (keeping in mind the multiplicities of covering implied by the sequence hSi ii ), so that χgreedy = ∑Ni=1 χ ′ (si ). Note that di = ∑λ (i)≤ j≤ρ (i) χ ′ (s j ). Consider s j with λ (i) ≤ j ≤ ρ (i). The current referendum set Ri has cover number N − λ (i) + 1, i.e., of at least N − j + 1. Let χopt be the cost of an optimum bribery strategy C ∗ of the original universe. C ∗ also yields a cover of the referendum set Ri with cost at most χopt . The average cost per element (taking into account multiplicities as given by the cover numbers) is χopt/c(Ri ). (So, whether or not some new levels are obtained through bribery does not really matter here.) C ∗ can be described by a sequence of sets of referenda C1 , . . . ,Cq , with corresponding voters z1 , . . . , zq and dollars d1∗ , . . . , dq∗ spent. Hence, χopt = ∑κq =1 dκ∗ . With each bribery step we associate the cost factor dκ∗/|Cκ |, for each issue r contained in Cκ . C ∗ could be also viewed as a bribery strategy for Ri . By the pigeon hole principle, there is a referendum r in Ri (to be influenced the kth time) with cost factor at most dκ∗/|Cκ ∩Ri | ≤ χopt/c(Ri ), where κ is the index such that Cκ contains r for the kth time in C ∗ (usually, the cost would be smaller, since part of the bribery has already been paid before). Since (Si , vi ) was picked so as to minimize di/|Si |, we find di/|Si | ≤ dκ∗/|Cκ ∩Ri | ≤ χopt/c(Ri ). We conclude that χopt χopt χopt = ≤ . χ ′ (s j ) ≤ c(Ri ) N − λ (i) + 1 N − j + 1 Hence, χgreedy = N N j=1 j=1 χopt ∑ χ ′(s j ) ≤ ∑ N − j + 1 = H(N)χopt ≤ (ln(N) + 1)χopt, ❑ which completes the proof. In the strict-majority scenario (SM), cover numbers would have a different meaning—we thus call them strict cover numbers: For each referendum, the corresponding strict cover number tells in advance how many voters have to change their opinions (bringing them individually over the given threshold t) to accept this referendum. Again, the strict cover number of a problem instance is the sum of the strict cover numbers of all given referenda. The corresponding greedy algorithm would therefore choose to influence voter vi (with di dollars) in the ith loop so that vi changes his or her opinion on some referendum r j such that di/|ρ j | is minimized.6 We can now read the approximation bound proof given for the average-majority scenario nearly literally as before, by re-interpreting the formulation “influencing referendum r” meaning now a complete change of opinion for a certain voter (not just gaining one level somehow). This establishes the following result. 6 Possibly, there is a whole set ρ j of referenda influenced this way. 29 Theorem 6.5 M IN -VB-SM-PLP can be approximated within a factor of ln(N) + 1, where N is the strict cover number of the given instance. Note that this result is in some sense stronger than Theorem 6.4 (which refers to the averagemajority scenario), since the cover number of an instance could be larger than the strict cover number. This approximation result is complemented by a corresponding hardness result. Theorem 6.6 There is a constant c > 0 such that M IN -VB-SM-PLP is not approximable within factor c · log N unless NP ⊂ DTIME(N log log N ), where N is the strict cover number of the given instance. A fortiori, the same statement holds for M IN -VB-SM-PLP-WIW. Unfortunately, those greedy algorithms do not (immediately) transfer to the case when issue weights are allowed. These weights might also influence the quality of approximation, but a simplistic greedy algorithm might result in covering the “wrong” issues. Also, the proof of the approximation factor given above will not carry over, since we need as one of the proof’s basic ingredients that an optimum solution can be interpreted as a partial one at some point. Those problems tend to have a different flavor. 6.2 Polynomial-Time Approximation Schemes Those problems for which we obtained FPT results in the case of issue weights actually enjoy a polynomial-time approximation scheme (PTAS) when viewed as minimization problems.7 The proof of Theorem 5.6 yields a PTAS. That result was obtained by transferring pseudo-polynomial time algorithms: For each fixed value of the parameter (the budget B or the objective O), we obtain a polynomial-time algorithm for the decision problem, which can be used to approximate the minimization problem. Theorem 6.7 Both M IN -MB-SM-PLP-WIW and M IN -MB-AM-PLP-WIW admit a PTAS. Proof. We provide some of the details for M IN -MB-SM-PLP-WIW only. As in the proof of Theorem 5.6, we first compute the amount, d j , to be spent to win referendum r j in polynomial time. We then re-interpret the given instance of M IN -MB-SM-PLP-WIW as a M IN -K NAPSACK instance. After this re-interpretation, every issue r j has an associated cost d j and weight w j . The aim is to find a set of issues, i.e., a set J ⊆ {1, . . . , n}, such that ∑ j∈J w j ≥ O and ∑ j∈J d j is minimum. Consider r j as an object o j in a M IN -K NAPSACK instance with cost c j = d j and profit p j = w j , with the bound P = O. Then the subset J ⊆ {1, . . . , n} that is a solution to the MB-SM-PLP-WIW instance is also a solution to the K NAPSACK instance, and vice-versa. Furthermore, the PTAS algorithm that approximates M IN -K NAPSACK also gives a PTAS for MB-SM-PLP-WIW. ❑ 7 A polynomial-time approximation scheme is an algorithm that for each pair (x, ε ), where x is an instance of an optimization problem and ε > 0 is a rational constant, runs in time polynomial in |x| (for each fixed value of ε ) and outputs an approximate solution for x within a factor of 1 + ε . 30 Let us mention here that the issue-weighted problem variants are actually bicriteria problems: We want to achieve as much as possible (expressed by the objective O) and pay as little as possible (expressed by the budget B). So, we could also consider this as a maximization problem (where now B becomes again part of the input). By the close relation to K NAPSACK mentioned above, the pseudo-polynomial time algorithms again result in PTAS results for this model: Theorem 6.8 Both M AX-MB-SM-PLP-WIW and M AX-MB-AM-PLP-WIW admit a PTAS. It would be interesting to study this optimization criterion in the light of other bribery scenarios. 7 Conclusions This paper lies at the intersection of three research streams: computational social choice, reasoning under uncertainty, and computational complexity. It lays the foundation for further study of vote influencing in stochastic settings. We have shown that uncertainty complicates the picture; the choice of model strongly affects computational complexity. We have studied four lobbying scenarios in a probabilistic setting, both with and without issue weights. Among these, we identified problems that can be solved in polynomial time, problems that are NP-complete yet fixed-parameter tractable, and problems that are hard (namely, W[2]-complete or W[2]-hard) in terms of their parameterized complexity with suitable parameters. We also investigated the approximability of hard probabilistic lobbying problems (without issue weights) and obtained both approximation and inapproximability results. An interesting direction for future work would be to study the parameterized complexity of such problems under different parameterizations. We would also like to investigate the open question of whether one can find logarithmic-factor approximations for voter bribery with issue weights. From the viewpoint of parameterized complexity, it would be interesting to solve the questions left open in this paper (see the question marks in Tables 1 and 2), in particular regarding voter bribery under average majority, with and without issue weighting, parameterized by the budget or by the budget per issue. The parameterized complexity of the problems involving microbribery with issue weighting, under either strict majority or average majority, parameterized by the budget per issue, is an open issue as well (again, see Table 2). In fact, we did not see how to put these problems in any level of the W-hierarchy. Problems that involve numbers seem to have a particular flavor that makes them hard to tackle with these techniques [FGR10], but we suggest this as the subject of further studies. Note that all probabilistic lobbying problems that have been connected with W[2] somehow in this paper are in fact strongly NP-hard, i.e., their hardness does not depend on whether the numbers in their inputs are encoded in unary or in binary. We suspect that this adds to the difficulty when dealing with these problems from a parameterized perspective. References [BEH+ 10] D. Baumeister, G. Erdélyi, E. Hemaspaandra, L. Hemaspaandra, and J. Rothe. Computational aspects of approval voting. In J. Laslier and R. Sanver, editors, Handbook on Approval Voting, chapter 10, pages 199–251. Springer, 2010. 31 [BFH+ 08] E. Brelsford, P. Faliszewski, E. Hemaspaandra, H. Schnoor, and I. Schnoor. Approximability of manipulating elections. In Proceedings of the 23rd AAAI Conference on Artificial Intelligence, pages 44–49. AAAI Press, July 2008. [BGLR93] M. Bellare, S. Goldwasser, C. Lund, and A. Russell. Efficient probabilistically checkable proofs and applications to approximations. In Proceedings of the 25th ACM Symposium on Theory of Computing, pages 294–304. ACM Press, May 1993. [BKdV93] M. Baye, D. Kovenock, and C. de Vries. Rigging the lobbying process: An application of the all-pay auction. The American Economic Review, 83(1):289–294, 1993. [BKdV96] M. Baye, D. Kovenock, and C. de Vries. The all-pay auction with complete information. Economic Theory, 8(2):291–305, 1996. [BO91] J. Bartholdi III and J. Orlin. Single transferable vote resists strategic voting. Social Choice and Welfare, 8(4):341–354, 1991. [BTT89a] J. Bartholdi III, C. Tovey, and M. Trick. The computational difficulty of manipulating an election. Social Choice and Welfare, 6(3):227–241, 1989. [BTT89b] J. Bartholdi III, C. Tovey, and M. Trick. Voting schemes for which it can be difficult to tell who won the election. Social Choice and Welfare, 6(2):157–165, 1989. [BTT92] J. Bartholdi III, C. Tovey, and M. Trick. How hard is it to control an election? Mathematical and Computer Modelling, 16(8/9):27–40, 1992. [Ces03] M. Cesati. The Turing way to parameterized complexity. Journal of Computer and System Sciences, 67:654–685, 2003. [CFRS07] R. Christian, M. Fellows, F. Rosamond, and A. Slinko. On complexity of lobbying in multiple referenda. Review of Economic Design, 11(3):217–224, 2007. [Cro02] C. Crombez. Information, lobbying and the legislative process in the European Union. European Union Politics, 3(1):7–32, 2002. [CS03] V. Conitzer and T. Sandholm. Universal voting protocol tweaks to make manipulation hard. In Proceedings of the 18th International Joint Conference on Artificial Intelligence, pages 781– 788. Morgan Kaufmann, August 2003. [CSL07] V. Conitzer, T. Sandholm, and J. Lang. When are elections with few candidates hard to manipulate? Journal of the ACM, 54(3):Article 14, 2007. [DF99] R. Downey and M. Fellows. Parameterized Complexity. Springer-Verlag, Berlin, Heidelberg, New York, 1999. [DKNS01] C. Dwork, R. Kumar, M. Naor, and D. Sivakumar. Rank aggregation methods for the web. In Proceedings of the 10th International World Wide Web Conference, pages 613–622. ACM Press, May 2001. [EFG+ 09] G. Erdélyi, H. Fernau, J. Goldsmith, N. Mattei, D. Raible, and J. Rothe. The complexity of probabilistic lobbying. In Proceedings of the 1st International Conference on Algorithmic Decision Theory, pages 86–97. Springer-Verlag Lecture Notes in Artificial Intelligence #5783, October 2009. [EL05] E. Elkind and H. Lipmaa. Small coalitions cannot manipulate voting. In Proceedings of the 9th International Conference on Financial Cryptography and Data Security, pages 285–297. Springer-Verlag Lecture Notes in Computer Science #3570, February/March 2005. 32 [ENR09] G. Erdélyi, M. Nowak, and J. Rothe. Sincere-strategy preference-based approval voting fully resists constructive control and broadly resists destructive control. Mathematical Logic Quarterly, 55(4):425–443, 2009. [EPR11] G. Erdélyi, L. Piras, and J. Rothe. The complexity of voter partition in Bucklin and fallback voting: Solving three open problems. In Proceedings of the 10th International Joint Conference on Autonomous Agents and Multiagent Systems. IFAAMAS, May 2011. To appear. [ER97] E. Ephrati and J. Rosenschein. A heuristic technique for multi-agent planning. Annals of Mathematics and Artificial Intelligence, 20(1–4):13–67, 1997. [ER10] G. Erdélyi and J. Rothe. Control complexity in fallback voting. In Proceedings of Computing: the 16th Australasian Theory Symposium, pages 39–48. Australian Computer Society Conferences in Research and Practice in Information Technology Series, January 2010. [Fel09] M. Fellows. Towards fully multivariate algorithmics: Some new results and directions in parameter ecology. In J. Fiala, J. Kratochvı́l, and M. Miller, editors, Proceedings of the 20th International Workshop on Combinatorial Algorithms, pages 2–10. Springer-Verlag Lecture Notes in Computer Science #5874, June 2009. [FG06] J. Flum and M. Grohe. Parameterized Complexity Theory. EATCS Texts in Theoretical Computer Science. Springer-Verlag, 2006. [FGR10] M. Fellows, S. Gaspers, and F. Rosamond. Parameterizing by the number of numbers. In V. Raman and S. Saurabh, editors, Proceedings of the 5th International Symposium on Parameterized and Exact Computation, pages 123–134. Springer-Verlag Lecture Notes in Computer Science #6478, December 2010. [FHH09] P. Faliszewski, E. Hemaspaandra, and L. Hemaspaandra. How hard is bribery in elections? Journal of Artificial Intelligence Research, 35:485–532, 2009. [FHHR07] P. Faliszewski, E. Hemaspaandra, L. Hemaspaandra, and J. Rothe. Llull and Copeland voting broadly resist bribery and control. In Proceedings of the 22nd AAAI Conference on Artificial Intelligence, pages 724–730. AAAI Press, July 2007. [FHHR08] P. Faliszewski, E. Hemaspaandra, L. Hemaspaandra, and J. Rothe. Copeland voting fully resists constructive control. In Proceedings of the 4th International Conference on Algorithmic Aspects in Information and Management, pages 165–176. Springer-Verlag Lecture Notes in Computer Science #5034, June 2008. [FHHR09a] P. Faliszewski, E. Hemaspaandra, L. Hemaspaandra, and J. Rothe. Llull and Copeland voting computationally resist bribery and constructive control. Journal of Artificial Intelligence Research, 35:275–341, 2009. [FHHR09b] P. Faliszewski, E. Hemaspaandra, L. Hemaspaandra, and J. Rothe. A richer understanding of the complexity of election systems. In S. Ravi and S. Shukla, editors, Fundamental Problems in Computing: Essays in Honor of Professor Daniel J. Rosenkrantz, chapter 14, pages 375–406. Springer, 2009. [FHHR09c] P. Faliszewski, E. Hemaspaandra, L. Hemaspaandra, and J. Rothe. The shield that never was: Societies with single-peaked preferences are more open to manipulation and control. In Proceedings of the 12th Conference on Theoretical Aspects of Rationality and Knowledge, pages 118–127. ACM Press, July 2009. 33 [GJ79] M. Garey and D. Johnson. Computers and Intractability: A Guide to the Theory of NPCompleteness. W. H. Freeman and Company, 1979. [GMHS99] S. Ghosh, M. Mundhe, K. Hernandez, and S. Sen. Voting for movies: The anatomy of recommender systems. In Proceedings of the 3rd Annual Conference on Autonomous Agents, pages 434–435. ACM Press, 1999. [HH07] E. Hemaspaandra and L. Hemaspaandra. Dichotomy for voting systems. Journal of Computer and System Sciences, 73(1):73–83, 2007. [HHLBS09] Frank Hutter, Holger Hoos, Kevin Leyton-Brown, and Thomas Stützle. ParamILS: An automatic algorithm configuration framework. Journal of Artificial Intelligence Research, 36:267– 306, 2009. [HHR97] E. Hemaspaandra, L. Hemaspaandra, and J. Rothe. Exact analysis of Dodgson elections: Lewis Carroll’s 1876 voting system is complete for parallel access to NP. Journal of the ACM, 44(6):806–825, 1997. [HHR07] E. Hemaspaandra, L. Hemaspaandra, and J. Rothe. Anyone but him: The complexity of precluding an alternative. Artificial Intelligence, 171(5–6):255–285, 2007. [HHR09] E. Hemaspaandra, L. Hemaspaandra, and J. Rothe. Hybrid elections broaden complexitytheoretic resistance to control. Mathematical Logic Quarterly, 55(4):397–424, 2009. [HSV05] E. Hemaspaandra, H. Spakowski, and J. Vogel. The complexity of Kemeny elections. Theoretical Computer Science, 349(3):382–391, 2005. [KMR07] J. Kneis, D. Mölle, and P. Rossmanith. Partial vs. complete domination: t-dominating set. In J. van Leeuwen, G. Italiano, W. van der Hoek, C. Meinel, H. Sack, and F. Plasil, editors, Proceedings of the 33nd Conference on Current Trends in Theory and Practice of Computer Science, pages 367–376. Springer-Verlag Lecture Notes in Computer Science #4362, February 2007. [KPP04] H. Kellerer, U. Pferschy, and D. Pisinger. Knapsack Problems. Springer-Verlag, Berlin, Heidelberg, New York, 2004. [LR08] C. Lindner and J. Rothe. Fixed-parameter tractability and parameterized complexity, applied to problems from computational social choice. In A. Holder, editor, Mathematical Programming Glossary. INFORMS Computing Society, October 2008. [MPRZ08] R. Meir, A. Procaccia, J. Rosenschein, and A. Zohar. Complexity of strategic behavior in multi-winner elections. Journal of Artificial Intelligence Research, 33:149–178, 2008. [Nie06] R. Niedermeier. Invitation to Fixed-Parameter Algorithms. Oxford University Press, 2006. [Nie10] R. Niedermeier. Reflections on multivariate algorithmics and problem parameterization. In J.-Y. Marion and T. Schwentick, editors, Proceedings of the 27th International Symposium on Theoretical Aspects of Computer Science, volume 5 of Leibniz International Proceedings in Informatics (LIPIcs), pages 17–32. Schloss Dagstuhl—Leibniz-Zentrum für Informatik, March 2010. [PR07] A. Procaccia and J. Rosenschein. Junta distributions and the average-case complexity of manipulating elections. Journal of Artificial Intelligence Research, 28:157–181, 2007. [Rei83] J. Reinganum. A formal theory of lobbying behaviour. Optimal Control Applications and Methods, 4(4):71–84, 1983. 34 [RS97] R. Raz and S. Safra. A sub-constant error-probability low-degree test, and a sub-constant errorprobability PCP characterization of NP. In Proceedings of the 29th ACM Symposium on Theory of Computing, pages 475–484. ACM Press, 1997. [RSV03] J. Rothe, H. Spakowski, and J. Vogel. Exact complexity of the winner problem for Young elections. Theory of Computing Systems, 36(4):375–386, 2003. [SSGL02] T. Sandholm, S. Suri, A. Gilpin, and D. Levine. Winner determination in combinatorial auction generalizations. In Proceedings of the 1st International Joint Conference on Autonomous Agents and Multiagent Systems, pages 69–76. ACM Press, July 2002. [vNM44] J. von Neumann and O. Morgenstern. Theory of Games and Economic Behavior. Princeton University Press, 1944. [XHHLB08] Lin Xu, Frank Hutter, Holger Hoos, and Kevin Leyton-Brown. SATzilla: Portfolio-based algorithm selection for SAT. Journal of Artificial Intelligence Research, 32:565–606, 2008. [ZPR08] M. Zuckerman, A. Procaccia, and J. Rosenschein. Algorithms for the coalitional manipulation problem. In Proceedings of the 19th ACM-SIAM Symposium on Discrete Algorithms, pages 277–286. Society for Industrial and Applied Mathematics, January 2008. Extended version to appear in Artificial Intelligence. 35