Abstract
Bachrach and Porat [1] introduced path-disruption games. In these coalitional games, agents are placed on the vertices of a graph, and one or more adversaries want to travel from a source vertex to a target vertex. In order to prevent them from doing so, the agents can form coalitions, and a coalition wins if it succeeds in blocking all paths for the adversaries. In this paper, we introduce the notion of bribery for path-disruption games. We analyze the question of how hard it is to decide whether the adversaries can bribe some of the agents such that no coalition can be formed that blocks all paths for the adversaries. We show that this problem is NP-complete, even for a single adversary. For the case of multiple adversaries, we provide an upper bound by showing that the corresponding problem is in \(\Sigma_2^p\), the second level of the polynomial hierarchy, and we suspect it is complete for this class.
This work was supported in part by DFG grant RO 1202/12-1 and the European Science Foundation’s EUROCORES program LogICCC.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bachrach, Y., Porat, E.: Path-disruption games. In: Proceedings of the 9th International Joint Conference on Autonomous Agents and Multiagent Systems, IFAAMAS, pp. 1123–1130 (May 2010)
Jain, M., Korzhyk, D., Vaněk, O., Conitzer, V., Pěchouček, M., Tambe, M.: A double oracle algorithm for zero-sum security games on graphs. In: Proceedings of the 10th International Joint Conference on Autonomous Agents and Multiagent Systems, IFAAMAS, pp. 327–334 (May 2011)
Endriss, U., Lang, J. (eds.): Proceedings of the 1st International Workshop on Computational Social Choice. Universiteit van Amsterdam, staff.science.uva.nl/~ulle/COMSOC-2006/proceedings.html (2006)
Endriss, U., Goldberg, P. (eds.): Proceedings of the 2nd International Workshop on Computational Social Choice. University of Liverpool (2008), www.csc.liv.ac.uk/~pwg/COMSOC-2008/proceedings.html
Conitzer, V., Rothe, J. (eds.): Proceedings of the 3rd International Workshop on Computational Social Choice. Universität Düsseldorf (2010), http://ccc.cs.uni-duesseldorf.de/COMSOC-2010/proceedings.shtml
Elkind, E., Goldberg, L., Goldberg, P., Wooldridge, M.: Computational complexity of weighted threshold games. In: Proceedings of the 22nd AAAI Conference on Artificial Intelligence, pp. 718–723. AAAI Press, Menlo Park (July 2007)
Aziz, H., Paterson, M.: False name manipulations in weighted voting games: Splitting, merging and annexation. In: Proceedings of the 8th International Joint Conference on Autonomous Agents and Multiagent Systems, IFAAMAS, pp. 409–416 (May 2009)
Bachrach, Y., Rosenschein, J.: Computing the Banzhaf power index in network flow games. In: Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems, IFAAMAS, pp. 323–329 (2007)
Bachrach, Y., Rosenschein, J.: Power in threshold network flow games. Journal of Autonomous Agents and Multi-Agent Systems 18(1), 106–132 (2009)
Rey, A., Rothe, J.: Merging and splitting for power indices in weighted voting games and network flow games on hypergraphs. In: Proceedings of the 5th European Starting AI Researcher Symposium, pp. 277–289. IOS Press, Amsterdam (2010)
Bachrach, Y., Elkind, E., Meir, R., Pasechnik, D., Zuckerman, M., Rothe, J., Rosenschein, J.: The cost of stability in coalitional games. In: Mavronicolas, M., Papadopoulou, V.G. (eds.) SAGT 2009. LNCS, vol. 5814, pp. 122–134. Springer, Heidelberg (2009)
Faliszewski, P., Hemaspaandra, E., Hemaspaandra, L.: How hard is bribery in elections? Journal of Artificial Intelligence Research 35, 485–532 (2009)
Meyer, A., Stockmeyer, L.: The equivalence problem for regular expressions with squaring requires exponential space. In: Proceedings of the 13th IEEE Symposium on Switching and Automata Theory, pp. 125–129 (1972)
Stockmeyer, L.: The polynomial-time hierarchy. Theoretical Computer Science 3(1), 1–22 (1977)
Osborne, M., Rubinstein, A.: A Course in Game Theory. MIT Press, Cambridge (1999)
Papadimitriou, C.: Computational Complexity. Addison-Wesley, Reading (1994)
Rothe, J.: Complexity Theory and Cryptology. An Introduction to Cryptocomplexity. EATCS Texts in Theoretical Computer Science. Springer, Heidelberg (2005)
Garey, M., Johnson, D.: Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman and Company, New York (1979)
Karp, R.: Reducibilities among combinatorial problems. In: Miller, R., Thatcher, J. (eds.) Complexity of Computer Computations, pp. 85–103. Plenum Press, New York (1972)
Procaccia, A., Rosenschein, J.: Junta distributions and the average-case complexity of manipulating elections. Journal of Artificial Intelligence Research 28, 157–181 (2007)
Erdélyi, G., Hemaspaandra, L., Rothe, J., Spakowski, H.: Generalized juntas and NP-hard sets. Theoretical Computer Science 410(38-40), 3995–4000 (2009)
Homan, C., Hemaspaandra, L.: Guarantees for the success frequency of an algorithm for finding Dodgson-election winners. Journal of Heuristics 15(4), 403–423 (2009)
Walsh, T.: Where are the really hard manipulation problems? The phase transition in manipulating the veto rule. In: Proceedings of the 21st International Joint Conference on Artificial Intelligence, IJCAI, pp. 324–329 (July 2009)
Walsh, T.: An empirical study of the manipulability of single transferable voting. In: Proceedings of the 19th European Conference on Artificial Intelligence, pp. 257–262. IOS Press, Amsterdam (2010)
Faliszewski, P., Hemaspaandra, E., Hemaspaandra, L., Rothe, J.: Llull and Copeland voting computationally resist bribery and constructive control. Journal of Artificial Intelligence Research 35, 275–341 (2009)
Elkind, E., Faliszewski, P., Slinko, A.: Swap bribery. In: Mavronicolas, M., Papadopoulou, V.G. (eds.) SAGT 2009. LNCS, vol. 5814, pp. 299–310. Springer, Heidelberg (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Rey, A., Rothe, J. (2011). Bribery in Path-Disruption Games. In: Brafman, R.I., Roberts, F.S., Tsoukiàs, A. (eds) Algorithmic Decision Theory. ADT 2011. Lecture Notes in Computer Science(), vol 6992. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24873-3_19
Download citation
DOI: https://doi.org/10.1007/978-3-642-24873-3_19
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-24872-6
Online ISBN: 978-3-642-24873-3
eBook Packages: Computer ScienceComputer Science (R0)