Subject Terms: computational social choice, elections, algorithms, single-peaked preferences, bribery, control, manipulation, dichotomy theorems, computational complexity, voting
Relation: http://hdl.handle.net/1802/27838
Availability: http://hdl.handle.net/1802/27838
Authors: Hemaspaandra, Edith, Hemaspaandra, Lane A., Rothe, Jörg
Subject Terms: computational social choice, electoral control
Relation: http://hdl.handle.net/1802/19790
Availability: http://hdl.handle.net/1802/19790
Authors: Hemaspaandra, Edith, Hemaspaandra, Lane A., Rothe, Jörg
Subject Terms: computational social choice, electoral control
Relation: http://hdl.handle.net/1802/19311
Availability: http://hdl.handle.net/1802/19311
Authors: Hemaspaandra, Edith, Hemaspaandra, Lane A., Rothe, Jörg
Subject Terms: computational social choice, electoral control
Relation: http://hdl.handle.net/1802/19308
Availability: http://hdl.handle.net/1802/19308
Subject Terms: computational social choice, elections, voting, control, bribery, manipulation, computational complexity
Relation: http://hdl.handle.net/1802/19297
Availability: http://hdl.handle.net/1802/19297
Subject Terms: computational social choice, multiagent systems, elections, fixed-parameter tractability
Relation: http://hdl.handle.net/1802/25619
Availability: http://hdl.handle.net/1802/25619
Subject Terms: crowdsourcing, collective intelligence, human computation, mechanism design, game theory, hci, voting theory, computational social choice
Relation: http://hdl.handle.net/1802/23242
Availability: http://hdl.handle.net/1802/23242
Authors: Menton, Curtis (1986 - ), Singh, Preetjot
Subject Terms: computational social choice, Schulze voting, elections, manipulation, control
Relation: http://hdl.handle.net/1802/21773
Availability: http://hdl.handle.net/1802/21773
Subject Terms: computational social choice, elections, control, bribery, manipulation, nearly single-peaked preferences
Relation: http://hdl.handle.net/1802/14831
Availability: http://hdl.handle.net/1802/14831
Subject Terms: computational social choice, voting, elections, control, computational complexity
Relation: http://hdl.handle.net/1802/11559
Availability: http://hdl.handle.net/1802/11559
Subject Terms: computational social choice, elections, algorithms, single-peaked preferences, bribery, control, manipulation, dichotomy theorems, computational complexity, voting
Relation: http://hdl.handle.net/1802/11140
Availability: http://hdl.handle.net/1802/11140
Authors: Menton, Curtis (1986 - )
Subject Terms: computational social choice, range voting, elections, voting, control
Relation: http://hdl.handle.net/1802/11114
Availability: http://hdl.handle.net/1802/11114
Authors: Baumeister, Dorothea, Rothe, Jörg, Erdelyi, Gabor, Hemaspaandra, Lane A., Hemaspaandra, Edith
Subject Terms: elections, approval voting, computational social choice, computational complexity, voting, control
Relation: http://hdl.handle.net/1802/6722
Availability: http://hdl.handle.net/1802/6722
Subject Terms: voting, control, computational social choice, bribery, Copeland elections
Relation: http://hdl.handle.net/1802/5463
Availability: http://hdl.handle.net/1802/5463
Authors: Faliszewski, Piotr (1980 - )
Subject Terms: plurality voting, computational social choice, bribery, utility-based voting, approximation
Relation: http://hdl.handle.net/1802/4629
Availability: http://hdl.handle.net/1802/4629
Subject Terms: voting, Copeland elections, computational social choice, control, bribery
Relation: http://hdl.handle.net/1802/4630
Availability: http://hdl.handle.net/1802/4630
Subject Terms: Copeland elections, control, voting, Llull elections, bribery, computational social choice
Relation: http://hdl.handle.net/1802/4043
Availability: http://hdl.handle.net/1802/4043
Subject Terms: voting, manipulation, bribery, computational social choice, control
Relation: http://hdl.handle.net/1802/3462
Availability: http://hdl.handle.net/1802/3462
Authors: Hemaspaandra, Edith, Hemaspaandra, Lane A., Rothe, Jörg
Subject Terms: multiagent systems, preference aggregation, computational complexity, elections, control, vulnerability, resistance, susceptibility, immunity, computational social choice
Relation: http://hdl.handle.net/1802/3440
Availability: http://hdl.handle.net/1802/3440