Near-Tight Algorithms for
the Chamberlin-Courant and Thiele Voting Rules††thanks: A conference version of this work appears in IJCAI 2022 [48].
Abstract
We present an almost optimal algorithm for the classic Chamberlin-Courant multiwinner voting rule (CC) on single-peaked preference profiles. Given voters and candidates, it runs in almost linear time in the input size, improving the previous best time algorithm of Betzler et al. (2013). We also study multiwinner voting rules on nearly single-peaked preference profiles in terms of the candidate-deletion operation. We show a polynomial-time algorithm for CC where a given candidate-deletion set has logarithmic size. Actually, our algorithm runs in time and the base of the power cannot be improved under the Strong Exponential Time Hypothesis. We also adapt these results to all non-constant Thiele rules which generalize CC with approval ballots.
1 Introduction
We study computational aspects of the Chamberlin-Courant voting rule (CC) [13] with general misrepresentation function and the Thiele rules [49] in which we choose a committee of size such that the total utility of the voters is maximized. In the case of CC, the utility of a voter from a committee is determined by the most preferred committee member. In the case of a -Thiele rule, parameterized by a non-increasing sequence , the utility of a voter is equal to , where is the number of committee members approved by the voter.
CC and Thiele rules are basic multiwinner voting rules studied in social choice theory and, in particular, in the computational social choice community [26, 11]. They were discussed broadly for their applications, not only in parliamentary elections but also in many scenarios when a group of agents has to pick some number of items for joint use [47].
Unfortunately, computing an optimal committee under CC is already -hard for the case of approval ballots, i.e., when each voter gives a subset of approved candidates [43]. This special case is called Approval Chamberlin-Courant (Approval-CC) and it was considered by Procaccia et al. [43] as a minimization problem. Its maximization version is equivalent to the well-known Max -Coverage problem for which many hardness results have been shown [46]. In particular, Max -Coverage is -hard111-hardness of Max -Coverage directly implies -hardness of Approval-CC. This consequence was mentioned (without a proof) in the conference paper of Procaccia et al. [42]. to approximate within factor for any [27]. Moreover, this hardness of approximation holds even in FPT-time with respect to solution size assuming a gap version of the Exponential Time Hypothesis [36].
Notice that Approval-CC is equivalent to the -Thiele rule, so all these hardness results for Approval-CC hold for this basic Thiele rule as well. One may consider other -Thiele rules with specific , e.g., -Thiele rule with which is equivalent to the well-known Proportional Approval Voting [35] and which is related to Penrose apportionment method [11]. Notice that -Thiele is equivalent to Multiwinner Approval Voting [4], which is solvable in polynomial-time. All the other ones222 We assume without loss of generality. are -hard [47, Theorem 5].
Analogously to Max -Coverage, hardness of approximation results hold for the natural class of sequences such that partial sums of grows in a sublinear way, where a hardness constant depends strictly on [20, 5, 6]. It follows that for such Thiele rules one should not expect a PTAS nor even an FPT-approximation scheme.
Because of the hardness of CC and Thiele rules, both rules were studied in restricted domains, i.e., on preference profiles with certain structures, e.g., single-peaked (SP) and single-crossing (SC). For a survey on structured preferences, see [24]. Such restricted domains are motivated by real-world elections. For instance, SP preference profiles appear when, intuitively, the candidates can be placed on an one-dimensional axis, and the farther away a candidate is from a voter’s favorite candidate the more the voter dislikes the candidate. Examples of such SP-axis are different policies in an ideological spectrum: the Left vs the Right, more liberal vs more conservative etc.
Fortunately, CC and Thiele rules on SP domain (CC-SP and Thiele-SP respectively) are known to be polynomial-time solvable [7, 39]. However, the dynamic programming algorithm for CC-SP proposed by Betzler et al. [7] is not optimal in terms of running time. We fill this gap by showing an almost optimal algorithm and we study polynomial-time solvability for nearly single-peaked preference profiles for CC and Thiele rules.
1.1 Our Contribution
The previous best running time for CC-SP was [7]. We improve it by presenting an almost linear time algorithm (up to subpolynomial factors) in Theorem 8. To achieve this result we reduce our problem to the Minimum Weight -Link Path problem and prove that our weight function has the concave Monge property (see Lemma 5). First, we construct an edge-weight oracle in pre-processing time that gives a response in time. Then, for , using the algorithm of Schieber [45] we find a solution in time and oracle accesses. For the case we use the time algorithm of Aggarwal and Park [1] to achieve time and oracle accesses. Overall, the running time is , which is almost linear in the input size.
We believe our algorithm will be efficient in practice as the part comes from sorting (hence, it is very efficient in practice) and the part is a lower order term when (which is typical in many voting scenarios). All other components have running time and are efficient. Moreover, one can also replace the part with any other (asymptotically slower) implementation for Minimum Weight -Link Path (such as the ones in [2]) to potentially obtain better practical performance for specific applications.
We then investigate the computational complexity of CC when the preference profile is not SP but close to SP in terms of the candidate-deletion operation. We assume a subset of candidates is given, whose removal makes an instance SP. We call it the candidate-deletion set. We use this general problem formulation, as for some popular utility functions a smallest candidate-deletion set is easy to compute, but for some it is -hard. One of the standard motivations for considering nearly structured preferences is preference elicitation with small errors possible [24, Chapter 10.5]. Here, we present one more scenario when nearly SP preferences may appear: when a few new politicians come to the political scene and the voters are not sure how to place them on the left-right political spectrum. Clearly, the new politicians form a candidate-deletion set (assuming that the previously known politicians are placed on an SP-axis due to their longer public activity).
It is known that given the candidate-deletion set, CC can be solved in time [37], and thus is FPT with respect to . Importantly, we show that the base of the power is optimal assuming the Strong Exponential Time Hypothesis. Notice that for our algorithm runs in polynomial-time. On the other hand, we show in Theorem 13 that if is slightly larger (e.g., or ), then polynomial-time solvability of CC contradicts the Exponential Time Hypothesis (ETH). Overall, we derive polynomial-time algorithm for CC for almost all values of for which such a polynomial-time algorithm may exist under ETH.
We adapt the above algorithm to Thiele rules by extending the Integer Linear Programming approach of Peters [39] to generalized Thiele rules (allowing different weight sequences for each voter) on SP preference profiles. This allows us to pre-elect some winning candidates by guessing the winners from the candidate-deletion set. As a result we obtain an -time algorithm. Unlike the case for CC, we were not able to prove that the base of the power cannot be improved. However, we show that there is no -time algorithm under ETH for each non-constant -Thiele rule. Using this, we show that if is allowed to be slightly larger than then polynomial-time solvability of any non-constant -Thiele rule contradicts ETH.
1.2 Related Work
First, we present two papers that are the most relevant from a technical point of view.
The paper of Constantinescu and Elkind [15].
Recently, Constantinescu and Elkind [15] also used fast algorithms for Minimum Weight -Link Path to solve CC, but on SC preference profiles. In their reduction, they construct an instance of Minimum Weight -Link Path on an -node graph with the concave Monge property while the graph we construct has nodes. The best algorithm for solving Minimum Weight -Link Path on an -node graph with the concave Monge property runs in time [45], but Constantinescu and Elkind used an time algorithm to query the weight of each edge, so they end up getting an running time. In our algorithm, we first pre-process the preference profile in time, and then an algorithm is able to query the weight of each edge in time, so we get an overall running time. Even though both algorithms have near-linear running times, our algorithm is arguably faster since the factor of their algorithm (and the factor of our algorithm) could be super poly-logarithmic. Therefore, in the natural case where a preference profile is both SC and SP [21], it is potentially more efficient to use our algorithm. The difference enlarges if an SP-axis and an SC-axis are not given. Indeed, for ballots given as linear orders333 It is the case for, e.g., utility functions defined as committee scoring rules [22] such as Borda scores. the problem of finding an SC-axis is known to be computable in time [9] while finding an SP-axis can be done in time (even if only one vote is a linear order) [28].
The paper of Misra, Sonar, and Vaidyanathan [37].
Misra et al. [37] presented an time algorithm for CC-SP, whose main idea is to try all subsets of a given candidate-deletion set as winners and compute remaining winners.
This construction is well-suited for generalization to Thiele rules, so we provide a proof similar to theirs for the CC-SP case for completeness.
We note that Misra et al. also considered other research directions in their paper, e.g., voter-deletion distance to SP and egalitarian version of CC.
Next, we present related works that are less technically related to our paper but give a broader picture on the topic.
Other nearly SP measures.
Different notions of nearly single-peaked preference profiles have been proposed [24, 25]. Let us mention just a few of them. Voter-deletion distance is the minimum number of voters one has to delete from the instance to achieve the SP property. Swap distance is the minimum number of swaps one has to make within the votes (in a model with ordinal ballots) to obtain the SP property. Computing some of SP measures appears to be -hard, in particular, it is the case for both notions mentioned above [25]. Hence, some FPT and approximation algorithms have been proposed [23].
Generalizations of SP to other graphs.
There are generalizations of SP to more complex graphs, e.g., a circle or a tree. For example, all Thiele rules are polynomial-time solvable for SP preference profiles on a line, and also on a circle [40]. Peters et al. [41] generalized the algorithm of Betzler et al. [7] to SP on a tree, but their running time is , where is the number of leaves. Actually they showed that CC-SP is -hard on a tree, even for Borda scores, and they ask if the problem is FPT w.r.t. (as their algorithm is only XP w.r.t. ).
Clustering problems.
CC is equivalent to a maximization version of classic clustering problem called -Median (in discrete but not necessarily metric space) [12]. Therefore, CC may be seen as a clustering method in which we partition voters into clusters, where cluster centers are defined by the winning committee members and the voters from a common cluster have the same most preferred committee member. Procaccia et al. [43] showed -hardness for the Monroe rule [38] which, in addition to CC, requires to have a balanced representation assignment. The Monroe rule is related to the Capacitated -Median clustering problem (see e.g. the paper of Cohen-Addad and Li [14]) with all cluster center capacities equal to but in the case of the Monroe rule there are also lower-bounds on the capacities used: .
2 Preliminaries
First we introduce some notations and define the computational problems formally. The notation suppresses factors subpolynomial in the input size, i.e., factors . The notation suppresses factors polynomial in the input size, i.e., factors .
Elections, misrepresentation, approval ballots.
An election is a pair consisting of a set of voters and a set of candidates.
A misrepresentation function measures how much a voter is misrepresented by a particular candidate ( denotes a set of non-negative real numbers)444We consider the real-RAM model of computation in this paper. Our algorithms can run perfectly on a typical word-RAM machine if the misrepresentations are given as integers. . Its dual measure is the utility function that indicates how well a voter is represented by a particular candidate. A tuple or is called a preference profile or just a profile or preferences.
Balloting a misrepresentation function fully is costly for a voter (needs to provide exact numbers). A simpler and one of the most popular type of a misrepresentation function is based on approval ballots. In approval voting a voter gives an approval ballot as a vote, i.e., a subset of candidates that approves. In the case of approval voting we obtain an approval utility function, i.e., iff and iff . Furthermore, we define an approval misrepresentation function as .
Another popular misrepresentation function is based on Borda scores. We call a Borda misrepresentation function if for each voter we have that is a bijection from to . It represents a linear ordering of candidates and counts how many candidates beat a particular candidate within the vote.
For a voter , if has different values for distinct candidates, then a vote of can be seen as a linear order over candidates. If there exists two distinct candidates such that then we call a vote of a weak order.
Chamberlin-Courant voting rule.
Originally, Chamberlin and Courant [13] defined a voting rule on the Borda misrepresentation function (currently, it is often called Borda-CC). In this paper, analogously to Betzler et al. [7], we study a more general computational problem. In the Chamberlin-Courant problem (CC) we are given an election , a misrepresentation function , a misrepresentation bound and a positive integer . Our task is to find a size- subset (called a winning committee) such that or return NO if such subset does not exist. Additionally, for , we overload the notation by writing and we define total misrepresentation of by . In a minimization version of the CC problem we want to find a size- committee with the minimum total misrepresentation value .
-Thiele voting rules.
We define a computational problem -Thiele parameterized by an infinite non-increasing non-negative sequence555If not stated otherwise, we consider only such sequences throughout this paper and call them Thiele sequences. , with , as follows. We are given an election , approval ballots for each voter , an utility bound , and a positive integer . Our task is to find a size- subset such that or return NO if no such subset exists. Additionally, for , we overload the notation by writing and we define total utility of by . In a maximization version of -Thiele we want to find a size- committee with the maximum total utility value. We notice that, a dual minimization version of -Thiele is equivalent to the OWA -Median problem with connection costs [12].
Single-peaked preference profiles.
Following Proposition 3 in [7] we say that a preference profile is single-peaked (SP)666 Sometimes called possibly single-peaked [24] as in this paper we allow ties (weak orders). if there exists a linear order over (called the single-peaked-axis or SP-axis) such that for every triple of distinct candidates with or we have the following implication for each voter : . Note that an SP profile with approval ballots can be seen as intervals of candidates (when ordering the candidates w.r.t. an SP-axis).
Candidate-deletion set.
For a given preference profile , a subset of candidates is called a candidate-deletion set if its removal from the instance makes the profile SP, i.e., is an SP profile, where its misrepresentation function is defined as restricted to . Typically we use .
Approval-CC-SP.
As we mentioned earlier, Approval-CC is equivalent to -Thiele. If an SP-axis is given then the input of Approval-CC-SP can be given as two numbers per voter: both endpoints of the approval interval. Then the input size is . It means that the running time of our algorithm from Theorem 8, which is , can be much larger than the input size. We would like to observe that Approval-CC-SP, i.e. CC with a preference restriction called Voter Interval [24], can also be solved in almost optimal time because it is actually equivalent to finding the maximum -cliques of an interval graph.
Observation 1.
(Application III in [45]) Approval-CC-SP can be solved in time .
Parameterized complexity, ETH and SETH.
We assume basic knowledge of parameterized complexity as this is common in computational social choice research [8, 19]. For a textbook on the topic see, e.g., [17]. To provide lower bounds we will use two popular conjectures on solving the satisfiability of propositional formulas in conjunctive normal form (CNF-SAT): Exponential Time Hypothesis (ETH) and its stronger version—Strong Exponential Time Hypothesis (SETH). For formal statements see, e.g., Conjectures 14.1 and 14.2 in [17], but here we state simple consequences of both conjectures as follows. 1) ETH implies that there is no -time algorithm for -SAT with variables and clauses, 2) SETH implies that there is no -time algorithm for CNF-SAT, with variables and clauses.
3 Single-Peaked Preferences and Chamberlin-Courant Voting Rule
In this section we present our algorithm for CC-SP that is almost optimal under the assumption that an SP-axis is given in the input or at least one vote is a linear order. In the latter case we can find an SP-axis in time, otherwise, if all votes are weak orders we do this in time [28]. This is a bottle-neck for our algorithm. In such a case, we obtain the same running time as the original dynamic programming approach of Betzler et al. [7].
We first label the candidates so that with respect to the SP-axis. For simplicity of our analysis, we add an artificial candidate so that for any , where is the maximum value of misrepresentation. Similarly, we add another artificial candidate so that for any . After the additions, the profile is still single-peaked and the solution to the SP-CC instance does not change.
We first reduce CC-SP to the well-studied Minimum Weight -Link Path problem which is defined as follows.
Definition 2 (Minimum Weight -Link Path).
Given an edge-weighted directed acyclic graph (DAG), a source node and a target node, compute a min-weight path from the source to the target that uses exactly edges.
We create a graph on vertex set . For every where , we add an edge from to with weight . We let the source vertex be vertex and let the target vertex be vertex . We set . To show the correctness of this reduction, we use the following claim which is a key consequence of SP.
Claim 3.
For any , , and for any , it holds .
Proof.
Suppose has the minimum misrepresentation of among , then clearly and so the equality follows.
Otherwise, there exists such that . Since the profile is single-peaked and , we must have . Therefore, and , so the equality follows. ∎
The following lemma shows the correctness of our reduction from CC-SP to Minimum Weight -Linked Path.
Lemma 4.
Given the min-weight path from vertex to vertex that uses edges, we can compute a winning committee of size in linear time.
Proof.
Let be any path from vertex to vertex that uses edges, and let the vertices on be for some . The weight of path is thus
which is plus the total misrepresentation of the committee .
Conversely, for any subset of of size with total misrepresentation , we can find a path from vertex to vertex using edges with weight in the graph by following the equations reversely. ∎
By Lemma 4, it suffices to compute the minimum weight -link path of the auxiliary graph. To do so efficiently, we use the fact that the edge weights have a certain structure.
Lemma 5.
The edge weights of the Minimum Weight -Link Path instance satisfy the concave Monge property, i.e., for all , it holds that .
Proof.
By expanding the definition of and focusing on the terms involving some , it suffices to show
which simplifies to
(1) |
Since the profile is single-peaked, one of the following must happen.
-
1.
. In this case, Equation (1) further simplifies to
The right hand side is non-negative because , so the inequality holds.
-
2.
and . In this case, we consider a function . Since , it is not hard to verify that is non-decreasing. Since the left hand side of Inequality (1) is and the right hand side is , the inequality holds because and is non-decreasing.
- 3.
∎
By Lemma 5, we can use the time algorithm for the Minimum Weight -Link Path instance (we use the algorithm by Schieber [45] for the case where and use the algorithm by Aggarwal and Park [1] for the case where ). Note that by a brute-force algorithm, we can compute each edge weight in time, so the overall running time becomes . The subpolynomial factor in this running time is when , which can be quite large. The following lemma gives a way to compute the edge weights faster, and consequently improves the subpolynomial factor.
Lemma 6.
After an time pre-processing where is the time for sorting non-negative integers bounded by , we can create a data structure that supports edge weight queries in time per query.
Proof.
Recall that the edge weight of an edge from to is . We can easily compute for every in time and store the result, so it remains to consider , which was defined as
Fix , we let be any of the candidates where is minimized. Then we define as
We define as
to cover the remaining cases. Clearly, , so we can focus on from now on as we can handle similarly.
We need to have the following claim.
Claim 7.
For any fixed and , the set of that satisfies always has the form for some . Furthermore, we can compute the values of for all and in time in total.
Proof.
Let be the set of such that . We aim to show that if , then any integer , where , is also in .
Then there are two cases:
-
•
In the first case, . In this case, we must have because the profile is single-peaked. Therefore, , and thus .
-
•
In the second case, . In this case, clearly , so it suffices to show . For the sake of contradiction, suppose . Since , implies . Also, since is minimum, we must have , i.e., is also a minimum, and it contradicts to .
For each , if we iterate from to , the value of will first (weakly) increase and then (weakly) decrease, due to single-peakedness. More formally, we aim to show that for any , . Assume for the sake of contradiction that and are both true. In other words, there exists such that and while . Since , one of the following must happen:
-
•
. This is not possible since implies .
-
•
and . Since , the single-peakedness of the profile implies that . Therefore, , which contradicts to .
-
•
, and . In this case, if equals , must be less than or equal to , thus leading to a contradiction. Therefore, . Thus, . By single-peakedness, . Thus, . Since , it is not possible that . Therefore, and , leading to a contradiction.
Therefore, by increasing or decreasing the value of accordingly after we increment , we can efficiently compute for all . The total amount of changes to the values of over all values of for a fixed is . Thus, this takes time overall to compute all . ∎
Now we can use to reformulate : for any , . Conceptually, for every , we consider numbers , where has a weight . Then for each , we just need to report the total weights of numbers that are at least . To achieve this task, we first sort numbers for . We will be able to retrieve from each in the sorted array, and thus retrieve . Then we compute the suffix sums of in the sorted order. For every query , we can easily find the smallest that is greater than or equal to in time (for instance, we can first remove duplicated during pre-processing to guarantee that there are at most of them, then use binary search to find such a ), then use the suffix sum associated with it as the answer.
Therefore, the time complexity for the pre-processing is upper bounded by the cost of sorting non-negative integers bounded by , multiplied by a factor of , and the query time is . ∎
In the real-RAM model of computation we consider in this paper, we can use any standard sorting algorithm to sort integers in time, so the pre-processing time of Lemma 6 becomes . In the word-RAM model of computation, faster algorithms for sorting integers are known. For instance, it is known that [30]. Also, in a common case where , by radix sort. One may use such faster integer sorting algorithms to obtain faster running time for the overall algorithm in the word-RAM model of computation, when all misrepresentations are given as integers (e.g. when we use Borda misrepresentation function).
Combining Lemma 6 with previous ideas we obtain the following theorem.
Theorem 8.
We can solve Chamberlin-Courant on single-peaked preference profiles in time assuming that an SP-axis is given or at least one vote is a linear order.
4 Nearly Single-Peaked Preferences and Chamberlin-Courant Rule
Betzler et al. [7] showed that Approval-CC is -hard w.r.t. . Their reduction is from the Hitting Set problem (HS), in which we are given a family of sets over a universe and a positive integer , and the task is to decide whether there exists a size- subset such that for every .
Actually, the reduction presented by Betzler et al. [7] also works for the Monroe rule. This makes the reduction more complex than it is needed for Approval-CC. A simple reduction from HS to Approval-CC has a strict correspondence between a universe and candidates, and between a family of sets and voters. A voter approves a candidate if the corresponding set to the voter contains the corresponding element to the candidate. The misrepresentation bound is equal to as this will require to cover (hit) all the voters (sets). Because of this correspondence, Approval-CC with is equivalent to HS.
It was observed recently [29] that, assuming Set Cover Conjecture (SCC) there is no -time algorithm for Approval-CC or Borda-CC, for every . This observation follows directly from the reductions presented by Betzler et al. [7] and SCC-hardness of HS [17, Conjecture 14.36]. On the other hand, for general misrepresentation function, Betzler et al. [7] showed an -time algorithm. An interesting open question is to close this gap for general misrepresentation functions. Note that for the case of Borda-CC, Gupta et al. [29] showed an -time algorithm.
Below, we observe the SETH-hardness of CC, due to the SETH-hardness of HS [16] and the reduction of Betzler et al. [7].
Observation 9.
Assuming the Strong Exponential Time Hypothesis, for every , there is no -time algorithm for CC, even for approval ballots.
It means that the -time brute-force algorithm, which checks all size- subsets of candidates, is essentially optimal for CC in terms of parameter . On the other hand, for CC-SP we showed an almost optimal algorithm (Theorem 8). Hence, it is natural to study computational complexity of CC on preferences that are close to SP in terms of the candidate-deletion operation.
We assume that a candidate-deletion set is given as this makes the problem formulation as general as possible. Otherwise, finding the minimum size candidate-deletion set would be a bottleneck for our algorithm as, in general, the problem is -hard. The hardness follows from the observation that the problem with approval ballots is equivalent to the problem of deleting a minimum number of columns to transform a given binary matrix into a matrix with the consecutive ones property (Min-COS-C). For an overview on the computational complexity of Min-COS-C see, e.g., [18]. An interesting hardness result for Min-COS-C described therein is that an -approximation algorithm for Min-COS-C derives an -approximate solution to the Vertex Cover problem. As a consequence, it is -hard to approximate the smallest candidate-deletion set within a factor of [33] and it is Unique Games Conjecture-hard to approximate within a factor of , for every [34]. The hardness holds already for approval preferences, where each voter approves at most candidates. On the other hand, we can compute the minimum size candidate-deletion set in polynomial-time if all votes are linear orders [44, 25]. This holds, e.g., when the misrepresentation function is derived from a committee scoring rule [22] where a classic example is Borda scoring rule used in Borda-CC.
In the following theorem we show that CC is FPT w.r.t. the size of a given candidate-deletion set777This result was presented before by Misra et al. [37], however our construction is well-suited for generalization to Thiele rules presented in Section 5, so we provide a proof for completeness. (denoted by ) and the obtained algorithm is essentially optimal assuming SETH. The main idea of the algorithm is to: 1) guess pre-elected winners among ; 2) delete from the instance together with appropriate modification of the instance with respect to the pre-elected winners; 3) as the modified instance appears to be a CC-SP instance, we use our algorithm from Theorem 8.
Theorem 10.
We can solve Chamberlin-Courant with a given candidate-deletion set of size in time . Furthermore, assuming the Strong Exponential Time Hypothesis, for any there is no -time algorithm that solves the problem, even for approval ballots.
Proof.
Let be an instance of the optimization version of CC and be a candidate-deletion set of size . For the sake of analysis let us fix an optimal solution to the instance .
Algorithm. First, we would like to find which we call pre-elected winners. It is enough to consider all subsets of size at most . We have at most many such subsets and is one of them. For each subset , we will remove from the instance and find remaining winners that minimizes total misrepresentation of a committee consisted of the members of and the remaining candidates. We will store all committees constructed for each considered and we will return the committee with the smallest total misrepresentation. Notice that in the case where we will construct (or another optimal solution to the instance ) as one of the potential solutions. Below, we describe how to fill optimally a pre-elected committee .
If then we simply save as one of potential solutions of our algorithm. Otherwise, if , we need to choose additional winners to the committee among a subset . For this purpose, we define a new instance of CC, where is defined as follows:
The misrepresentation function is constructed in such a way that misrepresentation of from a candidate is not greater than misrepresentation of by any pre-elected candidate, i.e., a candidate from . Moreover, we have . It means that an optimal solution to has the same misrepresentation as an optimal extension of the pre-elected committee , as desired. Note that, when , an optimal solution to has the same total misrepresentation as an optimal solution . Below we show formally that the obtained preference profile is single-peaked.
Lemma 11.
The preference profile is single-peaked.
Proof.
By the definition of , we know that is SP. It means that there exists a linear order over such that has the single-peakedness conditions. We will show that the linear order is also an SP-axis for . For this purpose, let us consider a triple of distinct candidates such that and let be any voter. If then by the definition of we have . Due to the strictness of the inequality and the definition of we obtain . Single-peakedness of on the SP-axis implies . From the definition of we obtain and, by the definition of , this is equivalent to as desired in the condition for single-peakedness for . The condition when can be proven analogously. ∎
Therefore, the new instance is an CC-SP instance which can be solved in polynomial-time, e.g., using our algorithm from Theorem 8. In such a way, we find the remaining winners optimally.
Running time. The running time comes from a consideration of all subsets of of size at most (there are at most such subsets) and, for each such subset, run an algorithm that solves an CC-SP instance in polynomial-time.
Lower bound. Let be an instance of Approval-CC. Let be any size- subset of . Note that is a candidate-deletion set, as a profile with two candidates is always SP. Then, an -time algorithm for Approval-CC on an instance with a given candidate-deletion set , for some , would solve in time at most . This is a contradiction with SETH due to Observation 9. ∎
A simple corollary from Theorem 10 is that CC is polynomial-time solvable if is logarithmic in the input size.
Corollary 12.
Chamberlin-Courant with a given candidate-deletion set of size , where , is polynomial-time solvable.
One would ask whether we can have polynomial-time algorithm for larger values of . Unfortunately, in the following theorem we show that if is slightly larger than logarithm in the input size, say , then it is not possible under ETH.
Theorem 13.
Under the Exponential Time Hypothesis, there is no polynomial-time algorithm for Chamberlin-Courant with a given candidate-deletion set of size at most for any function or .
Proof.
By the known ETH hardness of HS [31] and the above-mentioned reduction from HS to Approval-CC, Approval-CC does not have time algorithm when there are candidates and voters under ETH. From such hard instances, we construct hard instances for every function or .
For the first case, given an Approval-CC instance with candidates and voters, we aim to create an instance where the size of the candidate-deletion set is for . We then add some dummy voters, one by one, until so that for each dummy voter , for every candidate ( is still an approval misrepresentation function). The minimum total misrepresentation will not change with the addition of these voters. The candidate-deletion set could be the set of all candidates. In the new instance and . Thus, as desired. Since the reduction clearly has running time , the new instance does not have time algorithm under ETH.
The other case is analogous. Given an Approval-CC instance with candidates and voters, we aim to create an instance where for . We then add some dummy candidates until so that for each dummy candidate , for every voter ( is still an approval misrepresentation function). The minimum total misrepresentation will not change with the addition of these candidates. Also, note that if we delete the original candidates, the profile will be single-peaked. Thus, as desired. Under ETH, the new instance does not have time algorithm. ∎
5 Nearly Single-Peaked Preferences and Thiele Voting Rules
In this section, we first provide an ETH-based lower bound on the running times of algorithms that solve any non-constant -Thiele.
The first proof of -hardness of all non-constant -Thiele follows from -hardness proof for the OWA-Winner problem for a specific family of OWA vectors [47, Theorem 5]. To show ETH-hardness straightforwardly, we will instead use a reduction from the Independent Set problem (IS). In IS we are given a graph, a positive integer and we are asked whether there exists a size- subset of vertices such that no two of them are adjacent. The idea to reduce from IS was used in [4] for the above-mentioned Proportional Approval Voting. Actually, their reduction works for any -Thiele with . The idea was extended by Jain et al. [32] to other non-constant -Thiele rules when by introducing a proper number of dummy candidates. They presented their result for a more general problem and, actually, they did not include a formal construction in their paper, so in the proof of Theorem 14 we include a simplified proof that works specifically for all non-constant -Thiele.
In our reduction, we have and , where is the set of vertices in an IS instance on a -regular graph. Therefore, since IS on -regular graphs does not have time algorithms under ETH [3, Theorem 5], we obtain the following theorem.
Theorem 14.
Assuming the Exponential Time Hypothesis, there is neither nor -time algorithm for any non-constant -Thiele.
Proof.
First, we provide a formal construction of the reduction from IS to -Thiele for any non-constant Thiele sequence . Its idea was described in [32] for an even more general problem (related to a participatory budgeting problem which allows interactions between items we choose). For completeness we include a simplified construction of the reduction tailored for our needs.
Reduction. Let be an instance of IS, where is a -regular graph with a vertex set and an edge set , and is a positive integer. For a fixed Thiele sequence we construct an instance of -Thiele as follows. For each vertex we define a vertex-candidate . As is a fixed non-constant Thiele sequence, there exists a minimum constant such that . We add dummy candidates to the instance. Hence, the total number of candidates equals . For each edge we define a voter which approves exactly two candidates that are not dummy corresponding to the endpoints and of and all dummy candidates, i.e., . The number of voters equals . We define the desired size of the committee as and the utility bound as . Clearly, it is a polynomial-time reduction.
Correctness. Let be a size- independent set of . We use to denote the set of candidates corresponding to vertices from . We define a solution to the constructed instance of -Thiele as candidates from and all dummy candidates, i.e., . We will show that this is a feasible solution. Clearly . The total utility achieved by the solution consists of: from dummy candidates and from as each vertex from the corresponding size- independent set covers exactly edges and none of the edges is covered twice (hence each voter is covered at most times). Formally, the total utility achieved by can be computed as follows:
where follows because is an independent set, so it is never true that , and follows from the fact that and the number of incident edges to is as is a -regular graph and . Hence, is a solution to the constructed instance.
In the other direction, let be a feasible solution to the constructed instance. First, we notice that . Otherwise, the total utility achieved by would be at most: . We define a size- subset of as vertices that correspond to and next, we argue that the constructed subset is an independent set. Indeed, if it is not the case, then there exists an edge such that , hence the voter is covered exactly times. Then, the total utility achieved by is at most: . It is a contradiction with the fact that is a feasible solution.
Lower bound. To achieve a lower bound, let us assume there is an -time algorithm for a fixed non-constant -Thiele. Using the reduction presented above we can solve IS on a -regular graph in time: , which contradicts ETH [3, Theorem 5].
Analogously we prove the other lower bound using the fact that . ∎
Theorem 14 means that the -time brute-force algorithm is essentially optimal for non-constant -Thiele rules in terms of parameter . In contrast to CC, the gap for parameter is much larger in the case of Thiele rules. Known algorithm that is FPT w.r.t. for Thiele rules has double exponential dependence, namely [10]. Narrowing the gap for the parameter is an interesting research direction.
It is known that -Thiele is polynomial-time solvable on SP profiles by, e.g., using an Integer Linear Programming formulation (ILP) which has totally unimodular matrix (TUM) [39]. Such ILP can be solved by a polynomial-time algorithm for Linear Programming.
Analogously to CC, we study the computational complexity of -Thiele where a candidate-deletion set of size is given.
In Theorem 16 we show that -Thiele is also FPT w.r.t. , with an running time by checking all subsets of a candidate-deletion set as pre-elected winners. However, the way we solve an instance with pre-elected winners is completely different from what we do for CC (Theorem 10). In order to derive the above result we first define generalized Thiele rules in which each voter has a private Thiele sequence. Formally, the input of Generalized Thiele is a superset of the input of regular -Thiele and additionally there is also a collection of Thiele sequences, one for each voter. (In contrast, the Thiele sequence is not an input to -Thiele. We emphasize that -Thiele is a collection of computational problems parameterized by a Thiele sequence , hence we can provide results for specific Thiele sequences, e.g., in Theorem 14). Precisely, a collection of Thiele sequences is represented by a function of two arguments: , where is a Thiele sequence for each voter . For brevity we define . Now, utility of a voter from a committee is defined as . As in -Thiele, in Generalized Thiele our task is to find a size- subset such that the total utility is at least .
It is easy to see that any -Thiele is a special case of Generalized Thiele. Indeed, a given instance of -Thiele is an instance of Generalized Thiele where is the Thiele sequence for each voter.
One immediate yet interesting result, is that Generalized Thiele on SP profiles is polynomial-time solvable. The proof follows from a proper modification of the objective function of ILP presented by Peters [39].
Theorem 15.
Generalized Thiele on single-peaked preferences profiles can be solved in polynomial-time.
Proof.
We use the approach presented by Peters [39] for -Thiele, i.e. the ILP formulation labeled PAV-IP therein, which has totally unimodular matrix. We modify the objective function as follows. Instead of
we use
A binary variable encodes information whether has at least approved candidates in a solution. Clearly, such ILP solves Generalized Thiele. Notice that the constraints are exactly the same as in PAV-IP, therefore the constraint matrix is totally unimodular for SP profiles, so we can solve Generalized Thiele on SP profiles using any polynomial-time algorithm for Linear Programming. ∎
Now we are ready to show our main result in this section, i.e., an algorithm which is FPT w.r.t. the size of a given candidate-deletion set that works not only for -Thiele but also for Generalized Thiele.
Theorem 16.
We can solve Generalized Thiele with a given candidate-deletion set of size in time . Furthermore, assuming the Exponential Time Hypothesis, there is no -time algorithm that solves the problem, even for any non-constant -Thiele.
Proof.
Let be a given candidate-deletion set of size . First, we guess pre-elected winners among , call them . Next we delete from the instance, but then the proper modification of the instance with respect to the pre-elected winners is different with that in Theorem 10. Instead of modifying utility function we modify Thiele sequences for each voter depending on the number of approved candidates among pre-elected winners .
For each voter we define a new Thiele sequence such that for every . Note that a given instance of Generalized Thiele with removed candidates from and modified Thiele sequences as defined above is a Generalized Thiele instance with an SP profile. Therefore, we can solve it in polynomial-time using Theorem 15.
In at least one case, when trying all subsets of , we consider the maximum subset of an optimal solution that is included in . In this case we find the remaining winners making a committee at least as good as an optimal one, so also optimal. Because of the guessing phase, the running time is clearly .
Lower bound. Analogously to the lower bound proof of Theorem 10, for a given instance of non-constant -Thiele we define as a set of all candidates except arbitrary candidates. After removing from the instance, we get a profile with candidates, hence an SP profile, so is a candidate-deletion set. Then, an -time algorithm for Generalized Thiele on our instance with a given candidate-deletion set would solve in time at most . This is a contradiction with ETH due to Theorem 14. ∎
Analogously to the results for CC, Generalized Thiele is polynomial-time solvable if is logarithmic in the input size and is not polynomial-time solvable under ETH if is slightly larger.
Corollary 17.
Generalized Thiele with a given candidate-deletion set of size , where , is polynomial-time solvable.
Theorem 18.
Under Exponential Time Hypothesis, there is no polynomial-time algorithm for Generalized Thiele with a given candidate-deletion set of size at most for any function or , even for any non-constant -Thiele.
Proof.
After we apply Theorem 14, the remaining proof is essentially the same as the proof of Theorem 13. The only difference is that in the case of adding dummy voters, which approve all the candidates, we have to increase the required utility bound properly. Indeed, each dummy voter will get exactly score from any solution of size . ∎
6 Conclusions
We showed an almost optimal algorithm for CC-SP (Theorem 8). The bottleneck of the algorithm is finding (if not given) an SP-axis in the case where all the votes are given as weak orders. Finding an SP-axis on weak orders takes time [28]—they reduce this problem to the Consecutive Ones problem and apply known algorithms for the latter problem. Can it be improved to -time?
We showed that CC on general instances is FPT w.r.t. the size of a given candidate-deletion set (Theorem 10). Moreover, the achieved -time algorithm is essentially optimal under SETH. We adapted this result to Thiele rules (Theorem 15), but we do not know how much the base of the power in our -time algorithm for Thiele rules can be improved. We know that, under ETH, we cannot hope for an -time algorithm. Can one provide a stronger lower bound (e.g., under SETH or SCC)?
OWA-based rules are generalization of both CC and Thiele rules. -OWA-Winner rule generalizes -Thiele by allowing any utility values (as in CC) instead of approval ballots [47]. It is tricky to define total utility that a voter gets from a committee as we have a sequence and different utilities for all the members of a committee. It is defined by sorting these utilities and taking a dot product with (the highest utility is multiplied by the highest weight etc.) A minimization version of the problem was studied under the name OWA -Median [12]. An open question is whether such -OWA-Winner is FPT w.r.t. the size of a given candidate-deletion set. Our approach from Theorem 16 does not seem to work because we need to know how to modify Thiele sequences for each voter when we pre-define winners.
Acknowledgements
We would like to thank the anonymous reviewers for their helpful comments.
Virginia Vassilevska Williams was supported by NSF Grants CCF-2129139 and CCF-1909429, a BSF Grant BSF:2020356, a Google Research Fellowship and a Sloan Research Fellowship. Yinzhan Xu was partially supported by NSF Grant CCF-2129139. Krzysztof Sornat was partially supported by the SNSF Grant 200021_200731/1, the National Science Centre, Poland (NCN; grant number 2018/28/T/ST6/00366) and the European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation programme (grant agreement No 101002854).
References
- [1] Alok Aggarwal and James K. Park. Notes on Searching in Multidimensional Monotone Arrays (Preliminary Version). In Proceedings of the 29th Annual Symposium on Foundations of Computer Science (FOCS 1988), pages 497–512, 1988.
- [2] Alok Aggarwal, Baruch Schieber, and Takeshi Tokuyama. Finding a Minimum-Weight k-Link Path in Graphs with the Concave Monge Property and Applications. Discret. Comput. Geom., 12:263–280, 1994.
- [3] Saeed Akhoondian Amiri. A Note on the Fine-Grained Complexity of MIS on Regular Graphs. Inf. Process. Lett., 170:106123, 2021.
- [4] Haris Aziz, Serge Gaspers, Joachim Gudmundsson, Simon Mackenzie, Nicholas Mattei, and Toby Walsh. Computational Aspects of Multi-Winner Approval Voting. In Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2015), pages 107–115, 2015.
- [5] Siddharth Barman, Omar Fawzi, and Paul Fermé. Tight Approximation Guarantees for Concave Coverage Problems. In Proceedings of the 38th International Symposium on Theoretical Aspects of Computer Science (STACS 2021), volume 187 of LIPIcs, pages 9:1–9:17, 2021.
- [6] Siddharth Barman, Omar Fawzi, Suprovat Ghoshal, and Emirhan Gürpinar. Tight Approximation Bounds for Maximum Multi-Coverage. Math. Program., 192(1):443–476, 2022.
- [7] Nadja Betzler, Arkadii Slinko, and Johannes Uhlmann. On the Computation of Fully Proportional Representation. J. Artif. Intell. Res., 47:475–519, 2013.
- [8] Robert Bredereck, Jiehua Chen, Piotr Faliszewski, Jiong Guo, Rolf Niedermeier, and Gerhard J. Woeginger. Parameterized Algorithmics for Computational Social Choice: Nine Research Challenges. Tsinghua Science and Technology, 19(4):358–373, Aug 2014.
- [9] Robert Bredereck, Jiehua Chen, and Gerhard J. Woeginger. A Characterization of the Single-Crossing Domain. Soc. Choice Welf., 41(4):989–998, 2013.
- [10] Robert Bredereck, Piotr Faliszewski, Andrzej Kaczmarczyk, Dusan Knop, and Rolf Niedermeier. Parameterized Algorithms for Finding a Collective Set of Items. In Proceedings of the 34th AAAI Conference on Artificial Intelligence (AAAI 2020), pages 1838–1845, 2020.
- [11] Markus Brill, Jean-François Laslier, and Piotr Skowron. Multiwinner Approval Rules as Apportionment Methods. J. Theor. Politics, 30(3):358–382, 2018.
- [12] Jarosław Byrka, Piotr Skowron, and Krzysztof Sornat. Proportional Approval Voting, Harmonic k-Median, and Negative Association. In Proceedings of the 45th International Colloquium on Automata, Languages, and Programming (ICALP 2018), volume 107 of LIPIcs, pages 26:1–26:14, 2018.
- [13] John R. Chamberlin and Paul N. Courant. Representative Deliberations and Representative Decisions: Proportional Representation and the Borda Rule. Am. Political Sci. Rev., 77:718–733, 9 1983.
- [14] Vincent Cohen-Addad and Jason Li. On the Fixed-Parameter Tractability of Capacitated Clustering. In Proceedings of the 46th International Colloquium on Automata, Languages, and Programming (ICALP 2019), volume 132 of LIPIcs, pages 41:1–41:14, 2019.
- [15] Andrei Costin Constantinescu and Edith Elkind. Proportional Representation under Single-Crossing Preferences Revisited. In Proceedings of the 35th AAAI Conference on Artificial Intelligence (AAAI 2021), pages 5286–5293, 2021.
- [16] Marek Cygan, Holger Dell, Daniel Lokshtanov, Dániel Marx, Jesper Nederlof, Yoshio Okamoto, Ramamohan Paturi, Saket Saurabh, and Magnus Wahlström. On Problems as Hard as CNF-SAT. ACM Trans. Algorithms, 12(3):41:1–41:24, 2016.
- [17] Marek Cygan, Fedor V. Fomin, Łukasz Kowalik, Daniel Lokshtanov, Dániel Marx, Marcin Pilipczuk, Michał Pilipczuk, and Saket Saurabh. Parameterized Algorithms. Springer, 2015.
- [18] Michael Dom, Jiong Guo, and Rolf Niedermeier. Approximation and Fixed-Parameter Algorithms for Consecutive Ones Submatrix Problems. J. Comput. Syst. Sci., 76(3-4):204–221, 2010.
- [19] Britta Dorn and Ildikó Schlotter. Having a Hard Time? Explore Parameterized Complexity! In Ulle Endriss, editor, Trends in Computational Social Choice, chapter 11, pages 209–230. AI Access, 2017.
- [20] Szymon Dudycz, Pasin Manurangsi, Jan Marcinkowski, and Krzysztof Sornat. Tight Approximation for Proportional Approval Voting. In Proceedings of the 29th International Joint Conference on Artificial Intelligence (IJCAI 2020), pages 276–282, 2020.
- [21] Edith Elkind, Piotr Faliszewski, and Piotr Skowron. A Characterization of the Single-Peaked Single-Crossing Domain. Soc. Choice Welf., 54(1):167–181, 2020.
- [22] Edith Elkind, Piotr Faliszewski, Piotr Skowron, and Arkadii Slinko. Properties of Multiwinner Voting Rules. Soc. Choice Welf., 48(3):599–632, 2017.
- [23] Edith Elkind and Martin Lackner. On Detecting Nearly Structured Preference Profiles. In Proceedings of the 28th AAAI Conference on Artificial Intelligence (AAAI 2014), pages 661–667, 2014.
- [24] Edith Elkind, Martin Lackner, and Dominik Peters. Structured Preferences. In Ulle Endriss, editor, Trends in Computational Social Choice, chapter 10, pages 187–207. AI Access, 2017.
- [25] Gábor Erdélyi, Martin Lackner, and Andreas Pfandler. Computational Aspects of Nearly Single-Peaked Electorates. J. Artif. Intell. Res., 58:297–337, 2017.
- [26] Piotr Faliszewski, Piotr Skowron, Arkadii Slinko, and Nimrod Talmon. Multiwinner Voting: A New Challenge for Social Choice Theory. In Ulle Endriss, editor, Trends in Computational Social Choice, chapter 2, pages 27–47. AI Access, 2017.
- [27] Uriel Feige. A Threshold of ln(n) for Approximating Set Cover. J. ACM, 45(4):634–652, 1998.
- [28] Zack Fitzsimmons and Martin Lackner. Incomplete Preferences in Single-Peaked Electorates. J. Artif. Intell. Res., 67:797–833, 2020.
- [29] Sushmita Gupta, Pallavi Jain, Saket Saurabh, and Nimrod Talmon. Even More Effort Towards Improved Bounds and Fixed-Parameter Tractability for Multiwinner Rules. In Proceedings of the 30th International Joint Conference on Artificial Intelligence (IJCAI 2021), pages 217–223, 2021.
- [30] Yijie Han and Mikkel Thorup. Integer Sorting in O(n sqrt(log log n)) Expected Time and Linear Space. In Proceedings of the 43rd Symposium on Foundations of Computer Science (FOCS 2002), pages 135–144, 2002.
- [31] Russell Impagliazzo, Ramamohan Paturi, and Francis Zane. Which Problems Have Strongly Exponential Complexity? J. Comput. Syst. Sci., 63(4):512–530, 2001.
- [32] Pallavi Jain, Krzysztof Sornat, and Nimrod Talmon. Participatory Budgeting with Project Interactions. In Proceedings of the 29th International Joint Conference on Artificial Intelligence (IJCAI 2020), pages 386–392, 2020.
- [33] Subhash Khot, Dor Minzer, and Muli Safra. On Independent Sets, 2-to-2 Games, and Grassmann Graphs. In Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing (STOC 2017), pages 576–589, 2017.
- [34] Subhash Khot and Oded Regev. Vertex Cover Might be Hard to Approximate to within 2-epsilon. J. Comput. Syst. Sci., 74(3):335–349, 2008.
- [35] D. Marc Kilgour. Approval Balloting for Multi-Winner Elections. In Jean-François Laslier and Remzi M. Sanver, editors, Handbook on Approval Voting, pages 105–124. Springer, 2010.
- [36] Pasin Manurangsi. Tight Running Time Lower Bounds for Strong Inapproximability of Maximum k-Coverage, Unique Set Cover and Related Problems (via t-Wise Agreement Testing Theorem). In Proceedings of the 2020 ACM-SIAM Symposium on Discrete Algorithms (SODA 2020), pages 62–81, 2020.
- [37] Neeldhara Misra, Chinmay Sonar, and P. R. Vaidyanathan. On the Complexity of Chamberlin-Courant on Almost Structured Profiles. In Proceedings of the 5th International Conference on Algorithmic Decision Theory (ADT 2017), volume 10576 of LNCS, pages 124–138, 2017.
- [38] Burt L. Monroe. Fully Proportional Representation. Am. Political Sci. Rev., 89(4):925–940, 1995.
- [39] Dominik Peters. Single-Peakedness and Total Unimodularity: New Polynomial-Time Algorithms for Multi-Winner Elections. In Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence (AAAI 2018), pages 1169–1176, 2018.
- [40] Dominik Peters and Martin Lackner. Preferences Single-Peaked on a Circle. J. Artif. Intell. Res., 68:463–502, 2020.
- [41] Dominik Peters, Lan Yu, Hau Chan, and Edith Elkind. Preferences Single-Peaked on a Tree: Multiwinner Elections and Structural Results. J. Artif. Intell. Res., 73:231–276, 2022.
- [42] Ariel D. Procaccia, Jeffrey S. Rosenschein, and Aviv Zohar. Multi-Winner Elections: Complexity of Manipulation, Control and Winner-Determination. In Proceedings of the 20th International Joint Conference on Artificial Intelligence (IJCAI 2007), pages 1476–1481, 2007.
- [43] Ariel D. Procaccia, Jeffrey S. Rosenschein, and Aviv Zohar. On the Complexity of Achieving Proportional Representation. Soc. Choice Welf., 30(3):353–362, 2008.
- [44] Tomasz Przedmojski. Algorithms and Experiments for (Nearly) Restricted Domains in Elections. Master’s thesis, TU Berlin, 2016.
- [45] Baruch Schieber. Computing a Minimum Weight k-Link Path in Graphs with the Concave Monge Property. J. Algorithms, 29(2):204–222, 1998.
- [46] Piotr Skowron and Piotr Faliszewski. Chamberlin-Courant Rule with Approval Ballots: Approximating the MaxCover Problem with Bounded Frequencies in FPT Time. J. Artif. Intell. Res., 60:687–716, 2017.
- [47] Piotr Skowron, Piotr Faliszewski, and Jérôme Lang. Finding a Collective Set of Items: From Proportional Multirepresentation to Group Recommendation. Artif. Intell., 241:191–216, 2016.
- [48] Krzysztof Sornat, Virginia Vassilevska Williams, and Yinzhan Xu. Near-Tight Algorithms for the Chamberlin-Courant and Thiele Voting Rules. In Proceedings of the 31st International Joint Conference on Artificial Intelligence (IJCAI 2022), pages 482–488, 2022.
- [49] T. N. Thiele. Om Flerfoldsvalg. In Oversigt over det Kongelige Danske Videnskabernes Selskabs Forhandlinger (in Danish), pages 415–441. København: A.F. Høst, 1895.