Skip to main content

Bribery in Path-Disruption Games

  • Conference paper
Algorithmic Decision Theory (ADT 2011)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 6992))

Included in the following conference series:

Abstract

Bachrach and Porat [1] introduced path-disruption games. In these coalitional games, agents are placed on the vertices of a graph, and one or more adversaries want to travel from a source vertex to a target vertex. In order to prevent them from doing so, the agents can form coalitions, and a coalition wins if it succeeds in blocking all paths for the adversaries. In this paper, we introduce the notion of bribery for path-disruption games. We analyze the question of how hard it is to decide whether the adversaries can bribe some of the agents such that no coalition can be formed that blocks all paths for the adversaries. We show that this problem is NP-complete, even for a single adversary. For the case of multiple adversaries, we provide an upper bound by showing that the corresponding problem is in \(\Sigma_2^p\), the second level of the polynomial hierarchy, and we suspect it is complete for this class.

This work was supported in part by DFG grant RO 1202/12-1 and the European Science Foundation’s EUROCORES program LogICCC.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bachrach, Y., Porat, E.: Path-disruption games. In: Proceedings of the 9th International Joint Conference on Autonomous Agents and Multiagent Systems, IFAAMAS, pp. 1123–1130 (May 2010)

    Google Scholar 

  2. Jain, M., Korzhyk, D., Vaněk, O., Conitzer, V., Pěchouček, M., Tambe, M.: A double oracle algorithm for zero-sum security games on graphs. In: Proceedings of the 10th International Joint Conference on Autonomous Agents and Multiagent Systems, IFAAMAS, pp. 327–334 (May 2011)

    Google Scholar 

  3. Endriss, U., Lang, J. (eds.): Proceedings of the 1st International Workshop on Computational Social Choice. Universiteit van Amsterdam, staff.science.uva.nl/~ulle/COMSOC-2006/proceedings.html (2006)

  4. Endriss, U., Goldberg, P. (eds.): Proceedings of the 2nd International Workshop on Computational Social Choice. University of Liverpool (2008), www.csc.liv.ac.uk/~pwg/COMSOC-2008/proceedings.html

  5. Conitzer, V., Rothe, J. (eds.): Proceedings of the 3rd International Workshop on Computational Social Choice. Universität Düsseldorf (2010), http://ccc.cs.uni-duesseldorf.de/COMSOC-2010/proceedings.shtml

  6. Elkind, E., Goldberg, L., Goldberg, P., Wooldridge, M.: Computational complexity of weighted threshold games. In: Proceedings of the 22nd AAAI Conference on Artificial Intelligence, pp. 718–723. AAAI Press, Menlo Park (July 2007)

    Google Scholar 

  7. Aziz, H., Paterson, M.: False name manipulations in weighted voting games: Splitting, merging and annexation. In: Proceedings of the 8th International Joint Conference on Autonomous Agents and Multiagent Systems, IFAAMAS, pp. 409–416 (May 2009)

    Google Scholar 

  8. Bachrach, Y., Rosenschein, J.: Computing the Banzhaf power index in network flow games. In: Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems, IFAAMAS, pp. 323–329 (2007)

    Google Scholar 

  9. Bachrach, Y., Rosenschein, J.: Power in threshold network flow games. Journal of Autonomous Agents and Multi-Agent Systems 18(1), 106–132 (2009)

    Article  Google Scholar 

  10. Rey, A., Rothe, J.: Merging and splitting for power indices in weighted voting games and network flow games on hypergraphs. In: Proceedings of the 5th European Starting AI Researcher Symposium, pp. 277–289. IOS Press, Amsterdam (2010)

    Google Scholar 

  11. Bachrach, Y., Elkind, E., Meir, R., Pasechnik, D., Zuckerman, M., Rothe, J., Rosenschein, J.: The cost of stability in coalitional games. In: Mavronicolas, M., Papadopoulou, V.G. (eds.) SAGT 2009. LNCS, vol. 5814, pp. 122–134. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  12. Faliszewski, P., Hemaspaandra, E., Hemaspaandra, L.: How hard is bribery in elections? Journal of Artificial Intelligence Research 35, 485–532 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  13. Meyer, A., Stockmeyer, L.: The equivalence problem for regular expressions with squaring requires exponential space. In: Proceedings of the 13th IEEE Symposium on Switching and Automata Theory, pp. 125–129 (1972)

    Google Scholar 

  14. Stockmeyer, L.: The polynomial-time hierarchy. Theoretical Computer Science 3(1), 1–22 (1977)

    Article  MathSciNet  MATH  Google Scholar 

  15. Osborne, M., Rubinstein, A.: A Course in Game Theory. MIT Press, Cambridge (1999)

    MATH  Google Scholar 

  16. Papadimitriou, C.: Computational Complexity. Addison-Wesley, Reading (1994)

    MATH  Google Scholar 

  17. Rothe, J.: Complexity Theory and Cryptology. An Introduction to Cryptocomplexity. EATCS Texts in Theoretical Computer Science. Springer, Heidelberg (2005)

    MATH  Google Scholar 

  18. Garey, M., Johnson, D.: Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman and Company, New York (1979)

    MATH  Google Scholar 

  19. Karp, R.: Reducibilities among combinatorial problems. In: Miller, R., Thatcher, J. (eds.) Complexity of Computer Computations, pp. 85–103. Plenum Press, New York (1972)

    Chapter  Google Scholar 

  20. Procaccia, A., Rosenschein, J.: Junta distributions and the average-case complexity of manipulating elections. Journal of Artificial Intelligence Research 28, 157–181 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  21. Erdélyi, G., Hemaspaandra, L., Rothe, J., Spakowski, H.: Generalized juntas and NP-hard sets. Theoretical Computer Science 410(38-40), 3995–4000 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  22. Homan, C., Hemaspaandra, L.: Guarantees for the success frequency of an algorithm for finding Dodgson-election winners. Journal of Heuristics 15(4), 403–423 (2009)

    Article  MATH  Google Scholar 

  23. Walsh, T.: Where are the really hard manipulation problems? The phase transition in manipulating the veto rule. In: Proceedings of the 21st International Joint Conference on Artificial Intelligence, IJCAI, pp. 324–329 (July 2009)

    Google Scholar 

  24. Walsh, T.: An empirical study of the manipulability of single transferable voting. In: Proceedings of the 19th European Conference on Artificial Intelligence, pp. 257–262. IOS Press, Amsterdam (2010)

    Google Scholar 

  25. Faliszewski, P., Hemaspaandra, E., Hemaspaandra, L., Rothe, J.: Llull and Copeland voting computationally resist bribery and constructive control. Journal of Artificial Intelligence Research 35, 275–341 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  26. Elkind, E., Faliszewski, P., Slinko, A.: Swap bribery. In: Mavronicolas, M., Papadopoulou, V.G. (eds.) SAGT 2009. LNCS, vol. 5814, pp. 299–310. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Rey, A., Rothe, J. (2011). Bribery in Path-Disruption Games. In: Brafman, R.I., Roberts, F.S., Tsoukiàs, A. (eds) Algorithmic Decision Theory. ADT 2011. Lecture Notes in Computer Science(), vol 6992. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24873-3_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-24873-3_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-24872-6

  • Online ISBN: 978-3-642-24873-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics