Electoral control types are ways of trying to change the outcome of elec...
[HHM20] discovered, for 7 pairs (C,D) of seemingly distinct standard
ele...
Cai and Hemachandra used iterative constant-setting to prove that Few
⊆ ...
Prior work on the complexity of bribery assumes that the bribery happens...
Prior work on the complexity of bribery assumes that the bribery happens...
This chapter provides a hands-on tutorial on the important technique kno...
Ten years ago, Glaßer, Pavan, Selman, and Zhang [GPSZ08] proved that if ...
We show that the counting class LWPP [FFK94] remains unchanged even if o...
We believe that economic design and computational complexity---while alr...
We discuss the connection between computational social choice (comsoc) a...
Backdoors and backbones of Boolean formulas are hidden structural proper...
A backbone of a boolean formula F is a collection S of its variables for...
Heuristic approaches often do so well that they seem to pretty much alwa...
We discuss the use of projects in first-year graduate complexity theory
...
Each researcher should have a full shelf—physical or virtual—of books on...