no code implementations • 7 Sep 2023 • Koustav De, Harshil Mittal, Palash Dey, Neeldhara Misra
We also present FPT approximation algorithms for Kemeny rank aggregation with respect to these parameters.
no code implementations • 24 Jan 2021 • Neeldhara Misra, Chinmay Sonar, P. R. Vaidyanathan, Rohit Vaish
We show that achieving EQ1 in conjunction with well-studied measures of economic efficiency (such as Pareto optimality, non-wastefulness, maximum egalitarian or utilitarian welfare) is computationally hard even for binary additive valuations.
Fairness Computer Science and Game Theory
no code implementations • 28 May 2019 • Palash Dey, Neeldhara Misra, Swaprava Nath, Garima Shakya
We study the parameterized complexity of the optimal defense and optimal attack problems in voting.
no code implementations • 15 Apr 2016 • Palash Dey, Neeldhara Misra, Y. Narahari
Opportunistic Manipulation (OM): the manipulators seek to vote in a way that makes their preferred candidate win in every viable extension of the partial votes of the non-manipulators.
no code implementations • 15 Apr 2016 • Palash Dey, Neeldhara Misra
The main contribution of our work is to provide polynomial time algorithms with low query complexity for preference elicitation in all the above six cases.
no code implementations • 15 Apr 2016 • Palash Dey, Neeldhara Misra
We then investigate the query complexity for finding a weak Condorcet winner for preferences single peaked on a tree and show that this task has much less query complexity than preference elicitation.
no code implementations • 13 Nov 2015 • Palash Dey, Neeldhara Misra, Y. Narahari
For net approval and minisum approval voting rules, we provide a dichotomous result, resolving the parameterized complexity of this problem for all subsets of five natural parameters considered (by showing either FPT or W[1]-hardness for all subsets of parameters).
no code implementations • 18 Sep 2015 • Serge Gaspers, Neeldhara Misra, Sebastian Ordyniak, Stefan Szeider, Stanislav Živný
In this paper we extend the classical notion of strong and weak backdoor sets for SAT and CSP by allowing that different instantiations of the backdoor variables result in instances that belong to different base classes; the union of the base classes forms a heterogeneous base class.
no code implementations • 30 Apr 2015 • Palash Dey, Neeldhara Misra, Y. Narahari
However, the Frugal-{dollar}bribery problem is intractable for all the voting rules studied here barring the plurality and the veto voting rules for unweighted elections.
no code implementations • 30 Apr 2015 • Palash Dey, Neeldhara Misra, Y. Narahari
The CM problem, however, has been studied only in the complete information setting, that is, when the manipulators know the votes of the non-manipulators.