<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Closing the gap of control complexity in Borda elections: Solving ten open cases</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Marc Neveling</string-name>
          <email>neveling@cs.uni-duesseldorf.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Jörg Rothe</string-name>
          <email>rothe@cs.uni-duesseldorf.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Institut für Informatik Heinrich-Heine-Universität Düsseldorf 40225 Düesseldorf</institution>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>We consider the problem of control in elections where an election chair seeks to either make a designated candidate win, or prevent her from winning, via actions such as adding, deleting, or partitioning either candidates or voters. These scenarios have been studied for many voting systems and the related control problems have been classified in terms of their complexity. However, for one of the most prominent natural voting systems, the Borda Count, complexity results are known for only half of these cases. We settle the complexity for ten missing cases in the unique-winner model, leaving just one case open. We also show that Borda is vulnerable to control for this one open case in the nonunique-winner model. An interesting consequence is that Borda is vulnerable to another type of control in the nonunique-winner model, yet it is resistant to it in the unique-winner model. This is one of the few known cases where the complexity of control problems differs depending on the winner model chosen.</p>
      </abstract>
      <kwd-group>
        <kwd>Computational social choice</kwd>
        <kwd>voting</kwd>
        <kwd>control</kwd>
        <kwd>Borda election</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Much work has been done in computational social choice to show that complexity can
help to protect election outcomes from being tampered with by manipulation, control,
and bribery attacks. For a comprehensive overview of related results, we refer to the
book chapters by Conitzer and Walsh [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], Faliszewski and Rothe [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], and Baumeister
and Rothe [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Here, we focus on the standard control scenarios in elections—including
adding, deleting, or partitioning either candidates or voters—introduced by Bartholdi
et al. [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] and Hemaspaandra et al. [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].1 In particular, Bartholdi et al. [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] defined
constructive control scenarios where an election chair seeks to make a given candidate win
an election, while Hemaspaandra et al. [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] introduced the corresponding destructive
control scenarios where the chair seeks to ensure that a given candidate does not win.
      </p>
      <p>
        Each of these scenarios has been thoroughly discussed in the literature (for
example, in the book chapters mentioned above), and motivating real-world applications
1 To take certain restrictions (e.g., geographical constraints) into account, other models of
control have been proposed and studied by Puppe and Tasnádi [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ], Erdélyi et al. [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], Lewenberg
and Lev [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ], and Bachrach et al. [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
control
type
      </p>
      <p>C
U
A
C
C D</p>
      <p>C
A
C
C D</p>
      <p>C
D
C
C D</p>
      <p>E
T
C
P
C
C D</p>
      <p>P
T
C
P
C
C D</p>
      <p>
        E
T
C
P
R
C
C D
have been presented for each scenario. While they have been studied intensively for
many voting systems, such as for plurality, Condorcet, approval [
        <xref ref-type="bibr" rid="ref16 ref2">2, 16</xref>
        ], Copeland [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ],
Bucklin [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], Schulze [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ], certain variants of approval and range voting [
        <xref ref-type="bibr" rid="ref24 ref9">9, 24</xref>
        ], and
veto [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ], one of the most prominent natural voting systems, the Borda Count, is still
heavily underexplored. The purpose of this paper is to fill this gap.
      </p>
      <p>
        The eleven results previously known for control in Borda are due to Russel [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ],
Elkind et al. [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], Loreggia et al. [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ], Chen et al. [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], and Neveling and Rothe [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ].
Table 1 presents an overview of their results (marked in grey) and of our ten new results
(marked in boldface). In this table, an “R” stands for resistance (which in Section 2
is defined as NP-hardness of the corresponding control problem) and “V” stands for
vulnerability (which in Section 2 is defined as polynomial-time solvability of the
corresponding control problem). Further, we use the standard names of the control
problems that correspond to the standard control scenarios (see, e.g., [
        <xref ref-type="bibr" rid="ref11 ref3">3, 11</xref>
        ]). For example,
CCDC stands for “constructive control by deleting candidates” and DCDC denotes
the destructive variant of this problem. Each control problem for which we provide a
new result in Borda elections will be formally defined in Sections 3 and 4, and the
unique-winner versus the nonunique-winner model will be discussed in Section 2.
      </p>
      <p>
        As Table 1 shows, Borda is now known to be resistant to every standard type of
constructive control, whereas it is vulnerable to most of the destructive control types
(resistance is known only for destructive control by run-off partition of candidates and
by partition of voters, both in the so-called “ties-promote” (TP) model formally defined
in Section 3). One case of destructive candidate control remains open (namely,
DCPCTP, marked by “?” in Table 1) in the unique-winner model. Interestingly, we can show
Borda to be vulnerable to this control type in the nonunique-winner model (Theorem 7).
Even more interesting is a consequence of this result (Corollary 2): In the
nonuniquewinner model, Borda-DCRPC-TP (which is known to coincide with Borda-DCPC-TP
in the nonunique-winner model [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] but not to coincide with it in the unique-winner
model) is in P as well, yet it is NP-hard in the unique-winner model (Theorem 6).
      </p>
    </sec>
    <sec id="sec-2">
      <title>Preliminaries</title>
      <p>An election is a pair (C,V ) that contains a set C of candidates and a list V of votes
describing the voters’ preferences—as linear orders—over the candidates. We will
represent a vote over C as a string that ranks the candidates from left (most preferred) to
right (least preferred); for example, if C = {a, b, c, d}, a vote c d b a means that this
voter prefers c to d, d to b, and b to a. A voting rule determines a set of winners from
each given election. Positional scoring rules are an important class of such rules, and
among those we will only consider the perhaps most prominent one, the Borda Count,
which works as follows: Given m candidates, every candidate in position i of the voters’
rankings scores m − i points, and all candidates scoring the most points win.</p>
      <p>Let score(C,V )(x) denote the number of points candidate x obtains in a Borda election
(C,V ), and let dist(C,V )(x, y) = score(C,V )(x) − score(C,V )(y). For a subset X ⊆ C of
−→
candidates, X in a vote denotes a ranking of these candidates in an arbitrary but fixed
←−
order, and X denotes their ranking in reverse order.</p>
      <p>
        The control types considered here will be formally defined in Sections 3 and 4,
and we refer to the book chapters by Faliszewski and Rothe [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] and Baumeister and
Rothe [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] (and to the references therein) for all other standard control types and for
real-world scenarios that motivate them.
      </p>
      <p>A voting rule is said to be susceptible to a type of control (e.g., constructive control
by adding candidates) if there is some election for which the chair can reach her goal
(e.g., turning a nonwinning candidate into a winner) by exerting this type of control.
If a voting rule is not susceptible to a control type, it is said to be immune to it. Borda
is susceptible to each standard control type, in particular to those considered here. A
voting system that is susceptible to some type of control is said to be vulnerable to it
if the associated control problem can be solved in polynomial time, and it is said to be
resistant to it if the associated control problem is NP-hard.</p>
      <p>Our control problems will be defined in Sections 3 and 4 in the unique-winner model
(see also Table 1). That is, a constructive (destructive) control action is viewed as being
successful only if the designated candidate can be made a unique winner (not a unique
winner) by this action. We note, however, that using essentially the same constructions
and slightly modifying the arguments in our proofs, most of our results also work in
the nonunique-winner model, which means that for a constructive (destructive) control
action to be successful, it is enough to make the designated candidate only a winner (she
can be made not even a winner) by this action. The only exception is destructive control
by run-off partition of candidates in the ties-promote model (to be defined in Section 3)
to which Borda will be shown resistant in the unique-winner model (Theorem 6), yet
vulnerable in the nonunique-winner model (Corollary 2).2</p>
      <p>
        In our proofs, we will sometimes use the following result due to Hemaspaandra et
al. [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] (see their technical report [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] for the proof of Fact 1), which shows that some of
the destructive control cases (to be defined in the next section) can collapse depending
on the chosen winner model.
2 Our only other result explicitly shown in the nonunique-winner model is Theorem 7: Borda
is vulnerable to destructive control by partition of candidates in the ties-promote model. The
corresponding case in the unique-winner model is still open (again, see Table 1).
Fact 1 (Hemaspaandra et al. [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]) DCRPC-TE = DCPC-TE in the unique-winner
model and DCRPC-TE = DCPC-TE and DCRPC-TP = DCPC-TP in the
nonuniquewinner model.
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Candidate control for Borda</title>
      <p>
        We solve all open problems for candidate control in Borda elections except one, starting
with constructive control by adding an unlimited number of candidates.
Borda-CCAUC and Borda-DCAUC. Elkind et al. [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] showed that Borda is resistant
to constructive control by adding a limited number of candidates (i.e., a bound k on the
number of candidates that may be added is part of the problem instance), and Loreggia
et al. [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ] showed that Borda is vulnerable to the destructive variant of this control
type (see Table 1). Originally, however, Bartholdi et al. [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] defined control by adding
candidates in an unlimited variant where no such bound is given. The definition of the
limited variant is due to Faliszewski et al. [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], who also proved that the two variants of
the problem can have different complexity: Two special cases of Copelandα elections
(namely, Copeland0 and Copeland1, the latter a.k.a. Llull elections) are resistant to the
constructive, limited variant (the corresponding problem denoted by CCAC), whereas
they are vulnerable to the constructive, unlimited variant, which we define below.
      </p>
      <p>In the problem
Borda-CONSTRUCTIVE-CONTROL-BY-ADDING-AN-UNLIMITEDNUMBER-OF-CANDIDATES (Borda-CCAUC) we ask, given a set C of candidates, an
additional set A of candidates, C ∩ A = 0/, a set V of voters with preferences over C ∪ A,
and a distinguished candidate p ∈ C, whether there is a subset A′ ⊆ A such that p is the
unique Borda winner of (C ∪ A′,V ).3 The proof of Theorem 1 makes use of a reduction
from X3C to Borda-CCAUC. First, Lemma 1 below, which was proven by Elkind et
al. [6, Lemma B.3],4 allows us to construct votes conveniently.</p>
      <p>
        Lemma 1 (Elkind et al. [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]). Let C = {c1, . . . , c2t−1, d}, t ≥ 2, be a set of candidates
and let A = {a1, . . . , as} be a set of spoiler candidates. Let L = 2t − 1. Then there is a
polynomial-time computable preference profile R = (R1, . . . , R2L) over C ∪ A such that
for each A′ ⊆ A the Borda scores in the election (C ∪ A′, R ) are as follows: (a) For each
ci ∈ C, score(ci) = L(2|A′| + |C| − 1) + 1; (b) score(d) = L(2|A′| + |C| − 1) − L; and
(c) for each ai ∈ A′, score(ai) ≤ L(2|A′| + |C| − 1) − 2L.
      </p>
      <p>Theorem 1. Borda is resistant to constructive control by adding an unlimited number
of candidates.</p>
      <p>
        Proof. Membership of Borda-CCAUC in NP is obvious. To show NP-hardness, we
provide a reduction from X3C to Borda-CCAUC. Let (X , S ) be a given X3C instance
3 For convenience, whenever we have a list V of votes over a set C ∪ A and then consider an
election with fewer candidates, C ∪ A′ with A′ ⊂ A, we use (C ∪ A′,V ) to denote the election
with the votes in V tacitly assumed to be restricted to C ∪ A′.
4 The original lemma by Elkind et al. [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] is slightly more general in that they consider
nonnegative integers ℓ1, . . . , ℓ2t−1 with L = ∑i2=t−11 ℓi. For our purpose, it is enough to set ℓ1 = · · · =
ℓ2t−1 = 1, so L = 2t − 1.
with X = {x1, . . . , xm}, m = 3k, k &gt; 1, and S = {S1, . . . , Sn} with Si ⊆ X and |Si| = 3
for each i, 1 ≤ i ≤ n. Without loss of generality, we assume that k is even and k &gt; 2
(this can be achieved by duplicating the instance if necessary). Construct from (X , S ) a
Borda-CCAUC instance ((C,V ), p, k) as follows. Let C = X ∪ {u, p} with p being the
distinguished candidate and A = {a1, . . . , an} a set of spoiler candidates. Define V to
consist of the following votes:
−→ −−−→ ←−−− ←−
1. For each i, 1 ≤ i ≤ n, there are two votes: Si u p X \ Si A and X \ Si p←−u ai Si A \ {ai}.
→− −→ ←−
2. Three times, there are two votes of the form u A p X and X p u A .
3. All votes we obtain by applying Lemma 1 to the candidate set C with each xi taking
the role of a ci, p that of c3k+1, and u that of d. (Here, we need k to be even.)
Note that p ranks ahead of every a j ∈ A′ in all but three votes in the second group
of voters. The point deficit from those three votes is always offset by the other votes
in this group, so we can disregard the points of every a j ∈ A′ from now on, since p
always defeats them. For the point differences of p to the other candidates in the election
(C ∪ A′,V ) for any A′ ⊆ A, we have dist(p, u) = 3k + 2 − 3|A′| and dist(p, xi) = |{a j ∈
A′ | xi ∈ S j}|. If A′ = 0/, we have dist(p, xi) = 0, so p is not winning (C,V ) alone.
      </p>
      <p>We claim that (X , S ) is a yes-instance of X3C if and only if (C, A,V, p) is a
yesinstance of Borda-CCAUC.</p>
      <p>From left to right, suppose there is an exact cover S ′ ⊆ S . Let A′ = {a j ∈ A | S j ∈ S }.
Then we have dist(p, xi) = |{a j ∈ A′ | xi ∈ S j}| = 1 for every xi ∈ X , since every xi ∈ X
is contained in one element of the exact cover S ′ of X exactly once. Furthermore, we
have k = |S ′| = |A′|. Thus dist(p, u) = 3k + 2 − 3k = 2, so p defeats every candidate and
is the only Borda winner of (C ∪ A′,V ).</p>
      <p>From right to left, suppose that p can be made the only Borda winner by adding
the candidates of a subset A′ ∈ A. Therefore, p defeats every candidate in (C ∪ A′,V ),
so we have dist(p, u) &gt; 0 and dist(p, xi) &gt; 0 for every xi ∈ X (recall that p always
defeats every a j ∈ A′). Since dist(p, xi) = |{a j ∈ A′ | xi ∈ S j}| &gt; 0 for every xi ∈ X ,
the subfamily S ′ = {S j ∈ S | a j ∈ A } covers X . Thus we have |S ′| ≥ k, as there are
′
3k elements in X and every subset of S contains three elements. Furthermore, we have
dist(p, u) = 3k + 2 − 3|A′| &gt; 0, so |S ′| = |A′| ≤ k. Overall, we have that S ′ covers X and
|S ′| = k, which means that S ′ is an exact cover of X . ❑</p>
      <p>For the destructive variant, we provide a polynomial-time algorithm to show that
Borda-DCAUC is in P. The proof of Theorem 2 is omitted due to space limitations,
and so are the upcoming proofs of Theorems 4, 5, 6, 7, 8, and 10 and of Corollary 3.
Theorem 2. Borda is vulnerable to destructive control by adding an unlimited number
of candidates.</p>
      <p>
        Borda-CCRPC-TE and Borda-CCPC-TE. In the problem
Borda-CONSTRUCTIVECONTROL-BY-RUN-OFF-PARTITION-OF-CANDIDATES-TE (Borda-CCRPC-TE) we
ask, given an election (C,V ) and a distinguished candidate p ∈ C, whether the candidate
set C can be partitioned into two subsets C1 and C2 such that p is the unique Borda
winner of the final run-off among the Borda winners of subelections (C1,V ) and (C2,V ),
where only unique subelection winners move forward in the ties-eliminate (TE) model.
The proof of Theorem 3 below makes use of a reduction from the standard NP-complete
satisfiability problem (3SAT) [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]: Given a boolean formula ϕ in 3-CNF (i.e., with
exactly three literals per clause), does there exist a satisfying truth assignment to ϕ? For
a boolean formula ϕ, we denote by #i the number of literals occurring in the ith clause
that are negated variables.
      </p>
      <p>Theorem 3. Borda is resistant to constructive control by run-off partition of candidates
in the ties-eliminate model.</p>
      <p>Proof. Again, membership of Borda-CCRPC-TE in NP is obvious. To show
NPhardness, we now provide a reduction from 3SAT to Borda-CCRPC-TE. Given a
3SAT instance ϕ(x1, . . . , xn), construct a Borda-CCRPC-TE instance ((C,V ), p) as
follows. Let X = {x1, x2, . . . , xn} be the set of variables and let K = {K1, . . . , Km} be
the set of clauses of ϕ, where Ki = (ℓi(1) ∨ ℓi(2) ∨ ℓi(3)), 1 ≤ i ≤ m. Furthermore, let
D = {d1, . . . , d6} and Di = {d j | 1 ≤ j ≤ i} ⊆ D. Define the candidate set by C =
X ∪ K ∪ {p, r, r∗} ∪ D with p being the distinguished candidate the chair wants to make
a unique winner. Define V to consist of the following votes:
−−−−−−−−−−→
1. For each i, 1 ≤ i ≤ m, there are two votes: C \ ({p, Ki} ∪ D) p D2#i Ki D \ D2#i and
←−−−−−−−−−−</p>
      <p>Ki d6 p C \ ({p, Ki} ∪ D) D5.
2. For each i, 1 ≤ i ≤ −m−,−a−n−d−f−o−r−e−a−ch−−l→iteral ℓi(1), ℓi(2), ←an−d−−ℓi(−3−),−t−h−er−e−a−r−e−four votes:
either twice Ki x j p C \ ({Ki, x j, p} ∪ D) D and twice C \ ({Ki, x j, p} ∪ D) p Ki x j D
−−−−−−−−−−−−−→
if ℓik ←=−x−j−i−s−a−n−e−g−a−te−d−−variable, or twice C \ ({Ki, x j, p} ∪ D) p x j Ki D and twice
Ki p C \ ({Ki, x j, p} ∪ D) x j D if ℓik = x j is a positive variable.
3. There are m votes of the form r∗ r K D p X and m votes of the form r p ←D− ←K− r∗ X .</p>
      <p>−→ →−</p>
      <p>Since dist(C,V )(p, r) = m(−6 − m − 2) = −m(m + 8) &lt; 0, p does not win in (C,V ).
Note that p and r score the same number of points in the first two groups of votes. Later
on, we will also need the following argument. Consider a clause candidate Ki. In the
first group of votes, p scores 2#i − 1 points more than candidate Ki, with #i being the
number of negated variables in clause Ki. In the second group of votes, p gains two
more points with respect to candidate Ki for each positive variable in clause Ki, and
p loses two points with respect to candidate Ki for each negated variable in clause Ki.
Since p and Ki score the same number of points in the third group of votes, we have
dist(C,V )(p, Ki) = −2#i + 2(3 − #i) + (2#i − 1) = 5 − 2#i. Assuming that one variable
candidate x j is assigned to the other subelection than p and Ki, if x j is a negated variable
in clause Ki then p gains two points with respect to candidate Ki, and if x j is a positive
variable in clause Ki then p loses two points with respect to Ki. Further, if C′ is the set
of candidates obtained by removing from C all variable candidates corresponding to
positive variables in clause Ki, then dist(C′,V )(p, Ki) = 5 − 2#i − 2(3 − #i) = −1 because
p is losing as many points with respect to Ki as there are positive variables in clause Ki.
That is, p is defeated by Ki in their subelection if all variable candidates corresponding
to positive variables in clause Ki are removed from the subelection containing p and Ki
(and are assigned to the other subelection) and all variable candidates corresponding to
negated variables in clause Ki remain in the subelection with p and Ki. For p to defeat
Ki, either the subelection containing them also contains at least one variable candidate
corresponding to a positive variable in clause Ki, or the other subelection contains at
least one variable candidate corresponding to a negated variable in clause Ki, or both.</p>
      <p>We show that ϕ is a yes-instance of 3SAT if and only if ((C,V ), p) is a yes-instance
of Borda-CCRPC-TE.</p>
      <p>From left to right, suppose there is a satisfying truth assignment to the variables
of ϕ(x1, . . . , xn), say α. Let X+ ⊆ X denote the set of variables set to true under α,
and let X− ⊆ X denote the set of variables set to false under α. Partition C into C1 =
{p} ∪ D ∪ K ∪ X+ and C2 = {r, r∗} ∪ X−. The Borda winners of subelection (C2,V ) are
r and r∗, since they score more points than the candidates in X− due to the third voter
group and the same number of points in the other two voter groups. Due to TE, no
candidate proceeds to the final run-off from this subelection. In subelection (C1,V ), p
defeats all candidates from D, since p scores more points than these candidates in the
first voter group and the same number of points in the other two voter groups. p also
defeats all candidates from X+, since p scores at least m(m + 5) points more than any
candidate in X+ in the third voter group, at most m points fewer than any candidate from
X+ in the second voter group (which is the case if some positive variable occurs in all
clauses), and the same number of points in the first voter group. What about the clause
candidates? The truth assignment (giving rise to X+ and X−) satisfies ϕ, so each clause
Ki of ϕ is satisfied. Thus, for every i, 1 ≤ i ≤ m, at least one positive variable in Ki is
assigned to true or at least one negated variable in Ki is assigned to false. In the former
case, the corresponding variable candidate is in X+ and thus in the same subelection
as p; in the latter case, the corresponding variable candidate is in X− and thus not in the
same subelection as p. By the above argument, p scores more points than Ki. Summing
up, since p defeats all other candidates in her subelection and no one moves forward to
the final run-off from the other subelection, p alone is the overall Borda winner.</p>
      <p>From right to left, suppose that p is the unique overall Borda winner for some
partition of the candidates. This implies that p also is the unique Borda winner of one
subelection. Since r scores more points than p due to the third voter group, p and r
must be in different subelections (regardless of who else participates in them).
Without loss of generality, assume that p is in C1 and r is in C2. Consider C2 first. r cannot
be the unique Borda winner in subelection (C2,V ), since otherwise p would not win
the run-off. Therefore, there must be candidates that either tie or defeat r in (C2,V ).
Clause candidates, variable candidates, and candidates from D lose too many points in
the third voter group (that cannot be made up for in the first and second voter groups)
to tie-or-defeat r. Only candidate r∗ remains. However, r∗ cannot be the unique Borda
winner of subelection (C2,V ), since p and r∗ would score the same number of points in
the run-off, contradicting that p is the unique run-off winner. Thus there must be a tie
between r and r∗ in (C2,V ), which prevents them both from proceeding to the run-off
due to the TE model. Therefore, neither candidates from D nor from K can be in C2, for
otherwise the balance of points between r and r∗ would be perturbed due to the third
voter group. Variable candidates, however, may be in C2, since they get fewer points
than either r and r∗ and would not interfere with their point balance. Thus C1 contains p
and all candidates from D and K and some variable candidates. Let X+ denote the set of
variable candidates in C1. Note that p defeats the candidates in D by the first voter group
and the candidates in X+ by the third voter group. Since p also defeats each clause
candidate Ki, the variable candidates must be distributed among C1 and C2 according to the
argument given earlier. Now, if we assign the value true to all variables corresponding to
variable candidates in X+ and the value false to all variables corresponding to variable
candidates not in X+, we obtain a satisfying truth assignment to ϕ(x1, . . . , xn). ❑</p>
      <p>Borda-CONSTRUCTIVE-CONTROL-BY-PARTITION-OF-CANDIDATES-TE
(BordaCCPC-TE) is defined as follows. Given an election (C,V ) and a distinguished
candidate p ∈ C, we ask whether the candidate set C can be partitioned into two subsets C1
and C2 such that p is the unique Borda winner of the final election in which the Borda
winner of subelection (C1,V )—if there exists one (again, in model TE, only unique
subelection winners move forward)—faces all candidates from C2.</p>
      <p>For the (omitted) proof of Theorem 4 below, our reduction from 3SAT to
BordaCCRPC-TE from the proof of Theorem 3 works as well.</p>
      <p>Theorem 4. Borda is resistant to constructive control by partition of candidates in the
ties-eliminate model.</p>
      <p>Borda-DCPC-TE and Borda-DCRPC-TE. We now turn to the destructive variants of
the previous two problems. Unlike in the constructive case, we can give a
polynomialtime algorithm for Borda-DCPC-TE. By Fact 1, Borda-DCPC-TE is the same as
Borda-DCRPC-TE in the unique-winner model, which gives Corollary 1.
Theorem 5. Borda is vulnerable to destructive control by partition of candidates in the
ties-eliminate model.</p>
      <p>Corollary 1. Borda is vulnerable to destructive control by run-off partition of
candidates in the ties-eliminate model.</p>
      <p>Borda-DCPC-TP and Borda-DCRPC-TP. Next, we consider the same two problems
as above, but with the ties-promote (TP) instead of the ties-eliminate rule, which means
that all subelection winners move forward to the final round.</p>
      <p>Theorem 6. Borda is resistant to destructive control by run-off partition of candidates
in the ties-promote model.</p>
      <p>Borda-DCPC-TP is the only problem considered here (see Table 1) whose
complexity in the unique-winner model remains open. However, we can show the following
in the nonunique-winner model.</p>
      <p>Theorem 7. In the nonunique-winner model, Borda is vulnerable to destructive control
by partition of candidates in the ties-promote model.</p>
      <p>By Fact 1, Borda-DCPC-TP and Borda-DCRPC-TP are identical in the
nonuniquewinner model. Therefore, Theorem 7 implies Corollary 2. In light of Theorem 6, this
is somewhat surprising, as it shows that the complexity of Borda-DCRPC-TP starkly
differs depending on the winner model.</p>
      <p>Corollary 2. In the nonunique-winner model, Borda is vulnerable to destructive
control by run-off partition of candidates in the ties-promote model.</p>
      <p>Borda-CCPC-TP and Borda-CCRPC-TP. Finally, we turn to the constructive
variants of the above two problems. Note that a slight modification of the (omitted) proof
of Theorem 8 yields Corollary 3.</p>
      <p>Theorem 8. Borda is resistant to constructive control by partition of candidates in the
ties-promote model.</p>
      <p>Corollary 3. Borda is resistant to constructive control by run-off partition of
candidates in the ties-promote model.
4</p>
    </sec>
    <sec id="sec-4">
      <title>Control by partition of voters with ties-promote for Borda</title>
      <p>We now solve the only two problems that still were open for voter control in Borda
elections (recall Table 1): constructive and destructive control by partition of voters when
ties promote. In Borda-CCPV-TP, we are given an election (C,V ) and a distinguished
candidate p ∈ C, and we ask whether the votes V can be partitioned into two sublists V1
and V2 such that p is the unique Borda winner of the final election, where according to
the TP rule all Borda winners of the two subelections (C,V1) and (C,V2) move forward
to the final round. The destructive variant is denoted by Borda-DCPV-TP.
Theorem 9. Borda is resistant to constructive control by partition of voters in the
tiespromote model.</p>
      <p>
        Proof. Membership of Borda-CCPV-TP in NP is obvious. To show NP-hardness, we
provide a reduction from X3C to Borda-CCPV-TP. Let (X , S ) be a given X3C instance
with X = {x1, . . . , xm}, m = 3k, k &gt; 1, and S = {S1, . . . , Sn} with Si ⊆ X and |Si| = 3 for
each i, 1 ≤ i ≤ n. Note that we assume that every xi ∈ X appears in exactly three subsets
S j ∈ S . This restricted version of X3C was proven to be NP-complete by Gonzalez [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
From this restriction it follows that n = 3k. Construct from (X , S ) a Borda-CCPV-TP
instance ((C,V ), p) as follows. First we construct a large but polynomial number of buffer
candidates B = B1 ∪ B2 ∪ · · · ∪ B6k+3 with B2i, 1 ≤ i ≤ 3k, containing 6k(3k + 2) − 1
candidates; B2i−1, 1 ≤ i ≤ 3k, containing 9k(3k + 2) + 4 candidates; B6k+1
containing 6k(3k + 2)(2k − 1) candidates; B6k+2 containing 3k(9k(3k + 2) + 4 + 6k(3k + 2))
candidates; and B6k+3 containing 6k(3k + 2)(k + 1) − 1 candidates. Note that all Bi,
1 ≤ i ≤ 6k + 3 are pairwise disjunct. Let C = {p, r, r∗} ∪ X ∪ B with p being the
distinguished candidate. Define V to consist of the following groups votes V1, V2, V3, and V4:
←−
4. V4 contains 3k votes of the form r X p r∗ B.
−→
12.. VV12 ccoonnttaaiinnss aa ssiinnggllee vvoottee ooff tthhee ffoorrmm rr BB66kk++13 rr∗∗ B←X−6kp+2Bp\ BX6kB+3\.(B6k+1 ∪ B6k+2).
3. V3 contains a vote v j of the form X \ Si p B2 j−1 r∗ B2 j r x′ x′′ x′′′ B \ (B2 j−1 ∪ B2 j)
for every S j = {x′, x′′, x′′′} ∈ S .
      </p>
      <p>Note that in the way these votes are set up, every buffer candidate b j ∈ B is behind
some candidate from C \ B in every vote (as a matter of fact, b j is behind every candidate
from C \ B in all votes but one). This lets us conveniently disregard all buffer candidates,
since they are eliminated in all possible subelections and can never reach the final.</p>
      <p>Note that p is not winning in (C,V ), since dist(C,V )(p, r) ≤ −(3k(9k(3k + 2) + 4 +
6k(3k + 2)) + 1) + 3k(6k(3k + 2) + 9k(3k + 2) + 4) &lt; 0. We claim that (X , S ) is a
yesinstance of X3C if and only if (C, A,V, p) is a yes-instance of Borda-CCPV-TP.</p>
      <p>Suppose there exists an exact cover S ′ ⊆ S . Let Vb = {v j | S j ∈ S ′}. Partition V
into V ′ = V1 ∪ (V3 \ V ) ∪ V4 and V ′′ = V2 ∪ Vb. In the subelection (C,V ′), r∗ beats every
b
other candidate, since dist(C,V ′)(r∗, r) = 3k(3k + 2) − 1 − (3k + 2) &gt; 0, dist(C,V ′)(r∗, p) =
3k(9k(3k + 2) + 6k(3k + 2) + 5) − 2k(9k(3k + 2) + 5) − 3k &gt; 0, and dist(C,V ′)(r∗, xi) ≥
dist(C,V ′)(r∗, p) + 1 − (2k − 2)(3k − 3) − 9k2 &gt; 0 for every xi ∈ X . In the other
subelection (C,V ′′), p is the only Borda winner, since dist(C,V ′′)(p, r∗) = k(9k(3k + 2) + 5) −
(3k + 1) &gt; 0, dist(C,V ′′)(p, r) = −6k(k + 1)(3k + 2) − (3k + 1) + 5k(3k(3k + 2) + 1) &gt; 0
and dist(C,V ′′)(p, xi) ≥ −3k − (k − 1)(3k − 3) + 15k(3k + 2) + 6 &gt; 0. In the final election
({p, r∗},V ), p is the only Borda winner, since dist({p,r∗},V )(p, r∗) = 6k − 2 &gt; 0.</p>
      <p>For the converse, suppose there is no exact cover. We now show that p cannot
be made the only Borda winner by partitioning the votes. Since no buffer candidate
reaches the final, for a subset X ′ ⊆ X only the following final elections with p
participating are possible: ({p, r, r∗} ∪ X ′,V ), ({p, r} ∪ X ′,V ), ({p, r∗} ∪ X ′,V ) and ({p} ∪ X ′,V ).
It is easy to see that p wins alone only if r∗ participates and X ′ = 0/. Without loss
of generality, assume that V1 ⊆ V ′. Then p cannot win (C,V ′), since the deficit of
2k(6k(3k + 2)) + 3k(15k(3k + 2) + 5) to r cannot be made up for, not even with all
the votes from V3. Therefore, p can only win (C,V ′′). For p to beat every xi ∈ X
in (C,V ′′), there need to be votes Vb ⊆ V3 in V ′′ so that for every xi ∈ X there is a
v j ∈ Vb with xi ∈ S j. Otherwise, p would be behind xi in every vote of V ′′. Since there
is no exact cover, we need at least k + 1 to ensure that p is not beaten by a
candidate xi ∈ X in (C,V ′′). Now, for r∗ to reach the final, she needs to either tie with
p in (C,V ′′) or win (C,V ′). Since Vb ⊆ V3, r∗ cannot make up the deficit of at least
k(9k(3k + 2) + 4) points to p, as she is ahead of r∗ in all votes of V4 and the vote of
V2 would give r∗ only 3k + 1 points more than p. So r∗ needs to win (C,V ′). With
V1 ⊆ V ′, it follows that V2 ⊆ V ′′, or else the point deficit of r∗ to r in (C,V ′) from
votes of V1 and V2 cannot be made up for by at most 2k − 1 votes from V3, since
−(6k(3k + 2)(2k − 1) + 1) − (6k(3k + 2)(k + 1)) + 6k(3k + 2)(2k − 1) &lt; 0. But still,
with only 2k − 1 votes of V3 in V ′ and any number of votes from V4 in V ′, we have
dist(C,V ′)(r∗, r) &lt; 0, so r∗ is not winning in (C,V ′) and cannot reach the final.
Therefore, without an exact cover, either p or r∗ cannot reach the final. ❑
Theorem 10. Borda is resistant to destructive control by partition of voters in the
tiespromote model.
5</p>
    </sec>
    <sec id="sec-5">
      <title>Conclusions and future work</title>
      <p>We have solved ten open problems about the complexity of standard control scenarios
in Borda elections (recall Table 1), leaving just one case open: destructive control by
partition of candidates in the ties-promote model. In particular, complementing previous
results, we have now shown that Borda is resistant to every standard type of constructive
control, whereas it is vulnerable to most of the destructive control types. We have also
identified one of the rare cases where the complexity of a control problem in the
uniquewinner model parts company from that in the nonunique-winner model.</p>
      <p>
        As future work for control in Borda elections, we propose (a) to solve the one open
question mentioned above, (b) to provide a parameterized complexity analysis of the
cases where resistance is known, and (c) to study online control for sequential Borda
elections (see Hemaspaandra et al. [
        <xref ref-type="bibr" rid="ref17 ref18">17, 18</xref>
        ] for the model of online control in sequential
elections and Neveling and Rothe [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ] for the first such results for sequential Borda).
Another challenging task is to settle the complexity of control for all scoring rules,
ideally by establishing dichotomy results in the style of Hemaspaandra et al. [
        <xref ref-type="bibr" rid="ref19 ref20">19, 20</xref>
        ].
Acknowledgments: This work was supported in part by DFG grant RO-1202/15-1.
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>Y.</given-names>
            <surname>Bachrach</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Lev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Lewenberg</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zick</surname>
          </string-name>
          .
          <article-title>Misrepresentation in district voting</article-title>
          .
          <source>In Proceedings of the 25th International Joint Conference on Artificial Intelligence</source>
          , pages
          <fpage>81</fpage>
          -
          <lpage>87</lpage>
          . AAAI Press/IJCAI, July
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2. J.
          <string-name>
            <surname>Bartholdi</surname>
            <given-names>III</given-names>
          </string-name>
          ,
          <string-name>
            <surname>C. Tovey</surname>
            , and
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Trick</surname>
          </string-name>
          .
          <article-title>How hard is it to control an election? Mathematical</article-title>
          and Computer Modelling,
          <volume>16</volume>
          (
          <issue>8</issue>
          /9):
          <fpage>27</fpage>
          -
          <lpage>40</lpage>
          ,
          <year>1992</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>D.</given-names>
            <surname>Baumeister</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Rothe</surname>
          </string-name>
          .
          <article-title>Preference aggregation by voting</article-title>
          . In J. Rothe, editor,
          <source>Economics and Computation. An Introduction to Algorithmic Game Theory, Computational Social Choice, and Fair Division</source>
          , Springer Texts in Business and Economics, chapter
          <volume>4</volume>
          , pages
          <fpage>197</fpage>
          -
          <lpage>325</lpage>
          . Springer-Verlag,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>J.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Faliszewski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Niedermeier</surname>
          </string-name>
          , and
          <string-name>
            <given-names>N.</given-names>
            <surname>Talmon</surname>
          </string-name>
          .
          <article-title>Elections with few voters: Candidate control can be easy</article-title>
          .
          <source>In Proceedings of the 29th AAAI Conference on Artificial Intelligence</source>
          , pages
          <fpage>2045</fpage>
          -
          <lpage>2051</lpage>
          . AAAI Press, Jan.
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>V.</given-names>
            <surname>Conitzer</surname>
          </string-name>
          and
          <string-name>
            <given-names>T.</given-names>
            <surname>Walsh</surname>
          </string-name>
          .
          <article-title>Barriers to manipulation in voting</article-title>
          . In F. Brandt,
          <string-name>
            <given-names>V.</given-names>
            <surname>Conitzer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>U.</given-names>
            <surname>Endriss</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Lang</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <surname>A</surname>
          </string-name>
          . Procaccia, editors,
          <source>Handbook of Computational Social Choice, chapter 6</source>
          , pages
          <fpage>127</fpage>
          -
          <lpage>145</lpage>
          . Cambridge University Press,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>E.</given-names>
            <surname>Elkind</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Faliszewski</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Slinko</surname>
          </string-name>
          .
          <article-title>Cloning in elections: Finding the possible winners</article-title>
          .
          <source>Journal of Artificial Intelligence Research</source>
          ,
          <volume>42</volume>
          :
          <fpage>529</fpage>
          -
          <lpage>573</lpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>G.</given-names>
            <surname>Erdélyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Fellows</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Rothe</surname>
          </string-name>
          , and
          <string-name>
            <given-names>L.</given-names>
            <surname>Schend</surname>
          </string-name>
          .
          <article-title>Control complexity in Bucklin and fallback voting: A theoretical analysis</article-title>
          .
          <source>Journal of Computer and System Sciences</source>
          ,
          <volume>81</volume>
          (
          <issue>4</issue>
          ):
          <fpage>632</fpage>
          -
          <lpage>660</lpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>G.</given-names>
            <surname>Erdélyi</surname>
          </string-name>
          , E. Hemaspaandra, and
          <string-name>
            <given-names>L.</given-names>
            <surname>Hemaspaandra</surname>
          </string-name>
          .
          <article-title>More natural models of electoral control by partition</article-title>
          .
          <source>In Proceedings of the 4th International Conference on Algorithmic Decision Theory</source>
          , pages
          <fpage>396</fpage>
          -
          <lpage>413</lpage>
          .
          <source>Springer-Verlag Lecture Notes in Artificial Intelligence #9346</source>
          ,
          <year>September 2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>G.</given-names>
            <surname>Erdélyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Nowak</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Rothe</surname>
          </string-name>
          .
          <article-title>Sincere-strategy preference-based approval voting fully resists constructive control and broadly resists destructive control</article-title>
          .
          <source>Mathematical Logic Quarterly</source>
          ,
          <volume>55</volume>
          (
          <issue>4</issue>
          ):
          <fpage>425</fpage>
          -
          <lpage>443</lpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <given-names>P.</given-names>
            <surname>Faliszewski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Hemaspaandra</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Hemaspaandra</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Rothe</surname>
          </string-name>
          .
          <article-title>Llull and Copeland voting computationally resist bribery and constructive control</article-title>
          .
          <source>Journal of Artificial Intelligence Research</source>
          ,
          <volume>35</volume>
          :
          <fpage>275</fpage>
          -
          <lpage>341</lpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <given-names>P.</given-names>
            <surname>Faliszewski</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Rothe</surname>
          </string-name>
          .
          <article-title>Control and bribery in voting</article-title>
          . In F. Brandt,
          <string-name>
            <given-names>V.</given-names>
            <surname>Conitzer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>U.</given-names>
            <surname>Endriss</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Lang</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <surname>A</surname>
          </string-name>
          . Procaccia, editors,
          <source>Handbook of Computational Social Choice, chapter 7</source>
          , pages
          <fpage>146</fpage>
          -
          <lpage>168</lpage>
          . Cambridge University Press,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <given-names>M.</given-names>
            <surname>Garey</surname>
          </string-name>
          and
          <string-name>
            <given-names>D.</given-names>
            <surname>Johnson</surname>
          </string-name>
          . Computers and
          <article-title>Intractability: A Guide to the Theory of NPCompleteness</article-title>
          . W. H. Freeman and Company,
          <year>1979</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <given-names>T.</given-names>
            <surname>Gonzalez</surname>
          </string-name>
          .
          <article-title>Clustering to minimize the maximum intercluster distance</article-title>
          .
          <source>Theoretical Computer Science</source>
          ,
          <volume>38</volume>
          :
          <fpage>293</fpage>
          -
          <lpage>306</lpage>
          ,
          <year>1985</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14. E.
          <string-name>
            <surname>Hemaspaandra</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Hemaspaandra</surname>
            , and
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Menton</surname>
          </string-name>
          .
          <article-title>Search versus decision for election manipulation problems</article-title>
          .
          <source>Technical Report arXiv:1202</source>
          .6641 [cs.GT], Computing Research Repository, arXiv.org/corr/,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15. E.
          <string-name>
            <surname>Hemaspaandra</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Hemaspaandra</surname>
            , and
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Menton</surname>
          </string-name>
          .
          <article-title>Search versus decision for election manipulation problems</article-title>
          .
          <source>In Proceedings of the 30th Annual Symposium on Theoretical Aspects of Computer Science</source>
          , volume
          <volume>20</volume>
          <source>of LIPIcs</source>
          , pages
          <fpage>377</fpage>
          -
          <lpage>388</lpage>
          . Schloss Dagstuhl - LeibnizZentrum für Informatik, Feb.
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16. E.
          <string-name>
            <surname>Hemaspaandra</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Hemaspaandra</surname>
            , and
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Rothe</surname>
          </string-name>
          .
          <article-title>Anyone but him: The complexity of precluding an alternative</article-title>
          .
          <source>Artificial Intelligence</source>
          ,
          <volume>171</volume>
          (
          <issue>5-6</issue>
          ):
          <fpage>255</fpage>
          -
          <lpage>285</lpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17. E.
          <string-name>
            <surname>Hemaspaandra</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Hemaspaandra</surname>
            , and
            <given-names>J. Rothe.</given-names>
          </string-name>
          <article-title>The complexity of controlling candidatesequential elections</article-title>
          .
          <source>Theoretical Computer Science</source>
          ,
          <volume>678</volume>
          :
          <fpage>14</fpage>
          -
          <lpage>21</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18. E.
          <string-name>
            <surname>Hemaspaandra</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Hemaspaandra</surname>
            , and
            <given-names>J. Rothe.</given-names>
          </string-name>
          <article-title>The complexity of online voter control in sequential elections</article-title>
          .
          <source>Journal of Autonomous Agents and Multi-Agent Systems</source>
          ,
          <volume>31</volume>
          (
          <issue>5</issue>
          ):
          <fpage>1055</fpage>
          -
          <lpage>1076</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19. E.
          <string-name>
            <surname>Hemaspaandra</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Hemaspaandra</surname>
            , and
            <given-names>H.</given-names>
          </string-name>
          <string-name>
            <surname>Schnoor</surname>
          </string-name>
          .
          <article-title>A control dichotomy for pure scoring rules</article-title>
          .
          <source>In Proceedings of the 28th AAAI Conference on Artificial Intelligence</source>
          , pages
          <fpage>712</fpage>
          -
          <lpage>720</lpage>
          . AAAI Press,
          <year>July 2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20. E. Hemaspaandra and
          <string-name>
            <given-names>H.</given-names>
            <surname>Schnoor</surname>
          </string-name>
          .
          <article-title>Dichotomy for pure scoring rules under manipulative electoral actions</article-title>
          .
          <source>In Proceedings of the 22nd European Conference on Artificial Intelligence</source>
          , pages
          <fpage>1071</fpage>
          -
          <lpage>1079</lpage>
          . IOS Press, August/
          <year>September 2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <given-names>Y.</given-names>
            <surname>Lewenberg</surname>
          </string-name>
          and
          <string-name>
            <given-names>O.</given-names>
            <surname>Lev</surname>
          </string-name>
          .
          <article-title>Divide and conquer: Using geographic manipulation to win district-based elections</article-title>
          . In U. Grandi and J. Rosenschein, editors,
          <source>Proceedings of the 6th International Workshop on Computational Social Choice</source>
          , Toulouse, France,
          <year>June 2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <given-names>A.</given-names>
            <surname>Loreggia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Narodytska</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Rossi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Venable</surname>
          </string-name>
          , and
          <string-name>
            <given-names>T.</given-names>
            <surname>Walsh</surname>
          </string-name>
          .
          <article-title>Controlling elections by replacing candidates or votes (extended abstract)</article-title>
          .
          <source>In Proceedings of the 14th International Conference on Autonomous Agents and Multiagent Systems</source>
          , pages
          <fpage>1737</fpage>
          -
          <lpage>1738</lpage>
          . IFAAMAS, May
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <given-names>C.</given-names>
            <surname>Maushagen</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Rothe</surname>
          </string-name>
          .
          <article-title>Complexity of control by partitioning veto and maximin elections and of control by adding candidates to plurality elections</article-title>
          .
          <source>In Proceedings of the 22nd European Conference on Artificial Intelligence</source>
          , pages
          <fpage>277</fpage>
          -
          <lpage>285</lpage>
          . IOS Press, August/
          <year>September 2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <given-names>C.</given-names>
            <surname>Menton</surname>
          </string-name>
          .
          <article-title>Normalized range voting broadly resists control</article-title>
          .
          <source>Theory of Computing Systems</source>
          ,
          <volume>53</volume>
          (
          <issue>4</issue>
          ):
          <fpage>507</fpage>
          -
          <lpage>531</lpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <given-names>N.</given-names>
            <surname>Neveling</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Rothe</surname>
          </string-name>
          .
          <article-title>Solving seven open problems of offline and online control in Borda elections</article-title>
          .
          <source>In Proceedings of the 31st AAAI Conference on Artificial Intelligence</source>
          , pages
          <fpage>3029</fpage>
          -
          <lpage>3035</lpage>
          . AAAI Press, Feb.
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <given-names>D.</given-names>
            <surname>Parkes</surname>
          </string-name>
          and
          <string-name>
            <given-names>L.</given-names>
            <surname>Xia</surname>
          </string-name>
          .
          <article-title>A complexity-of-strategic-behavior comparison between Schulze's rule and ranked pairs</article-title>
          .
          <source>In Proceedings of the 26th AAAI Conference on Artificial Intelligence</source>
          , pages
          <fpage>1429</fpage>
          -
          <lpage>1435</lpage>
          . AAAI Press,
          <year>July 2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <given-names>C.</given-names>
            <surname>Puppe</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Tasnádi</surname>
          </string-name>
          .
          <article-title>Optimal redistricting under geographical constraints: Why “pack and crack” does not work</article-title>
          .
          <source>Economics Letters</source>
          ,
          <volume>105</volume>
          (
          <issue>1</issue>
          ):
          <fpage>93</fpage>
          -
          <lpage>96</lpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <given-names>N.</given-names>
            <surname>Russel</surname>
          </string-name>
          .
          <article-title>Complexity of control of Borda count elections</article-title>
          .
          <source>Master's thesis</source>
          , Rochester Institute of Technology,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>