-
1
-
-
84976775257
-
Color-coding
-
Alon, N.; Yuster, R.; and Zwick, U. 1995. Color-coding. J. ACM 42(4):844-856.
-
(1995)
J. ACM
, vol.42
, Issue.4
, pp. 844-856
-
-
Alon, N.1
Yuster, R.2
Zwick, U.3
-
2
-
-
78651316788
-
Computational aspects of approval voting
-
Laslier, J., and Sanver, R., eds., Springer
-
Baumeister, D.; Erdélyi, G.; Hemaspaandra, E.; Hemaspaandra, L.; and Rothe, J. 2010. Computational aspects of approval voting. In Laslier, J., and Sanver, R., eds., Handbook of Approval Voting. Springer. 199-251.
-
(2010)
Handbook of Approval Voting
, pp. 199-251
-
-
Baumeister, D.1
Erdélyi, G.2
Hemaspaandra, E.3
Hemaspaandra, L.4
Rothe, J.5
-
3
-
-
33748941267
-
Critical strategies under approval voting: Who gets ruled in and ruled out
-
DOI 10.1016/j.electstud.2005.05.007, PII S0261379405000570
-
Brams, S., and Sanver, R. 2006. Critical strategies under approval voting: Who gets ruled in and ruled out. Electoral Studies 25(2):287-305. (Pubitemid 44430786)
-
(2006)
Electoral Studies
, vol.25
, Issue.2
, pp. 287-305
-
-
Brams, S.J.1
Sanver, M.R.2
-
4
-
-
64049098750
-
Voting systems that combine approval and preference
-
Springer
-
Brams, S., and Sanver, R. 2009. Voting systems that combine approval and preference. In The Mathematics of Preference, Choice, and Order: Essays in Honor of Peter C. Fishburn. Springer. 215-237.
-
(2009)
The Mathematics of Preference, Choice, and Order: Essays in Honor of Peter C. Fishburn
, pp. 215-237
-
-
Brams, S.1
Sanver, R.2
-
5
-
-
77958568339
-
Bypassing combinatorial protections: Polynomial-time algorithms for single-peaked electorates
-
Brandt, F.; Brill, M.; Hemaspaandra, E.; and Hemaspaandra, L. 2010. Bypassing combinatorial protections: Polynomial-time algorithms for single-peaked electorates. In Proceedings of AAAI-10, 715-722.
-
(2010)
Proceedings of AAAI-10
, pp. 715-722
-
-
Brandt, F.1
Brill, M.2
Hemaspaandra, E.3
Hemaspaandra, L.4
-
6
-
-
78650890362
-
Multivariate complexity analysis of swap bribery
-
Dorn, B., and Schlotter, I. 2010. Multivariate complexity analysis of swap bribery. In Proceedings of IPEC-10, 107-122.
-
(2010)
Proceedings of IPEC-10
, pp. 107-122
-
-
Dorn, B.1
Schlotter, I.2
-
8
-
-
78650855129
-
Approximation algorithms for campaign management
-
Elkind, E., and Faliszewski, P. 2010. Approximation algorithms for campaign management. In Proceedings of WINE-10, 473-482.
-
(2010)
Proceedings of WINE-10
, pp. 473-482
-
-
Elkind, E.1
Faliszewski, P.2
-
11
-
-
84861006419
-
Parameterized control complexity in Bucklin voting and in Fallback voting
-
Erdélyi, G., and Fellows, M. R. 2010. Parameterized control complexity in Bucklin voting and in Fallback voting. In Proceedings of COMSOC-10.
-
(2010)
Proceedings of COMSOC-10
-
-
Erdélyi, G.1
Fellows, M.R.2
-
12
-
-
80051565959
-
Control complexity in fall-back voting
-
Erdélyi, G., and Rothe, J. 2010. Control complexity in fall-back voting. In CATS'10, pp. 39-48.
-
(2010)
CATS'10
, pp. 39-48
-
-
Erdélyi, G.1
Rothe, J.2
-
13
-
-
84899444952
-
The complexity of voter partition in bucklin and fallback voting: Solving three open problems
-
To appear
-
Erdélyi, G.; Piras, L.; and Rothe, J. 2011. The complexity of voter partition in bucklin and fallback voting: Solving three open problems. In Proceedings of AAMAS-II. To appear.
-
(2011)
Proceedings of AAMAS-II
-
-
Erdélyi, G.1
Piras, L.2
Rothe, J.3
-
14
-
-
78649580555
-
The shield that never was: Societies with single-peaked preferences are more open to manipulation and control
-
Faliszewski, P.; Hemaspaandra, E.; Hemaspaandra, L.; and Rothe, J. 2011. The shield that never was: Societies with single-peaked preferences are more open to manipulation and control. Information and Computation 209(2):89-107.
-
(2011)
Information and Computation
, vol.209
, Issue.2
, pp. 89-107
-
-
Faliszewski, P.1
Hemaspaandra, E.2
Hemaspaandra, L.3
Rothe, J.4
-
16
-
-
58049126575
-
On the parameterized complexity of multiple-interval graph problems
-
Fellows, M. R.; Hermelin, D.; Rosamond, F. A.; and Vialette, S. 2009. On the parameterized complexity of multiple-interval graph problems. Theoretical Computer Science 410:53-61.
-
(2009)
Theoretical Computer Science
, vol.410
, pp. 53-61
-
-
Fellows, M.R.1
Hermelin, D.2
Rosamond, F.A.3
Vialette, S.4
-
17
-
-
34147140610
-
Anyone but him: The complexity of precluding an alternative
-
DOI 10.1016/j.artint.2007.01.005, PII S0004370207000379
-
Hemaspaandra, E.; Hemaspaandra, L.; and Rothe, J. 2007. Anyone but him: The complexity of precluding an alternative. Artificial Intelligence 171(5-6):255-285. (Pubitemid 46560476)
-
(2007)
Artificial Intelligence
, vol.171
, Issue.5-6
, pp. 255-285
-
-
Hemaspaandra, E.1
Hemaspaandra, L.A.2
Rothe, J.3
-
18
-
-
57749173631
-
Determining possible and necessary winners under common voting rules given partial orders
-
Xia, L., and Conitzer, V. 2008. Determining possible and necessary winners under common voting rules given partial orders. In Proceedings of AAAI-08, 196-201.
-
(2008)
Proceedings of AAAI-08
, pp. 196-201
-
-
Xia, L.1
Conitzer, V.2
-
19
-
-
78751683337
-
Complexity of unweighted manipulation under some common voting rules
-
Xia, L.; Zuckerman, M.; Procaccia, A.; Conitzer, V.; and Rosenschein, J. 2009. Complexity of unweighted manipulation under some common voting rules. In Proceedings of IJCAI-09, 348-353.
-
(2009)
Proceedings of IJCAI-09
, pp. 348-353
-
-
Xia, L.1
Zuckerman, M.2
Procaccia, A.3
Conitzer, V.4
Rosenschein, J.5
|