Skip to main content
Springer logoLink to Springer
. 2021 Feb 10;57(1):117–144. doi: 10.1007/s00355-020-01301-y

Small one-dimensional Euclidean preference profiles

Jiehua Chen 1,, Sven Grottke 2
PMCID: PMC8550064  PMID: 34720285

Abstract

We characterize one-dimensional Euclidean preference profiles with a small number of alternatives and voters. We show that every single-peaked preference profile with two voters is one-dimensional Euclidean, and that every preference profile with up to five alternatives is one-dimensional Euclidean if and only if it is both single-peaked and single-crossing. By the work of Chen et al.  (Social Choice and Welfare 48(2):409–432, 2017), we thus obtain that the smallest single-peaked and single-crossing preference profiles that are not one-dimensional Euclidean consist of three voters and six alternatives.

Introduction

The one-dimensional Euclidean preference domain (also known as the unidimensional unfolding domain) is a spatial model of structured preferences which originates from economics (Hotelling 1929; Downs 1957), political sciences (Stokes 1963; Brams et al. 2002; Bogomolnaia and Laslier 2007), and psychology (Coombs 1964; Borg et al. 2018). In this domain, the alternatives and the voters are points in a one-dimensional Euclidean space, i.e., on the real line, such that the preference of each voter towards an alternative decreases as the Euclidean distance between them increases.

One-dimensional Euclidean preferences are necessarily single-peaked (Black 1948) and single-crossing (Roberts 1977) as proven by Coombs (1964), Doignon and Falmagne (1994), and Chen et al. (2017). The reverse, however, does not hold. In his work, Coombs (1964) provided a sample preference profile with 16 voters and 6 alternatives that is single-peaked and single-crossing, but not one-dimensional Euclidean. This counterexample seems quite large for real world scenarios. For instance, in rank aggregation or winner determination elections, one often either has few alternatives to begin with, or may consolidate by first making a shortlist of only a few alternatives out of many, which will be considered for the final decision. There are also settings where only a few voters are involved, as for instance in a hiring committee or when planning holidays for a family. Hence, a natural question arising in the context of one-dimensional Euclidean preferences is whether for profiles with less than 16 voters or less than 6 alternatives, being single-peaked and single-crossing is sufficient for being one-dimensional Euclidean. In other words, we are interested in the following question:

What are the tight upper bounds on the number of alternatives or voters such that profiles within these bounds are one-dimensional Euclidean as long as they are single-peaked and single-crossing?

We note that all three restricted preference domains (single-peakedness, single-crossingness, and one-dimensional Euclideanness) can be detected in polynomial time (Doignon and Falmagne 1994). While both, single-peakedness and single-crossingness, admit direct polynomial-time detection algorithms (Doignon and Falmagne 1994; Escoffier et al. 2008; Elkind et al. 2012; Bredereck et al. 2013), detecting one-dimensional Euclideanness is done via a non-trivial but polynomial-time reduction to linear programming (Doignon and Falmagne 1994; Knoblauch 2010; Elkind and Faliszewski 2014). Moreover, while both, single-peakedness and single-crossingness, can be characterized by a small finite set of forbidden subprofiles (Ballester and Haeringer 2011; Bredereck et al. 2013), one-dimensional Euclideanness does not have this finite characterization since Chen et al. (2017) showed that there are infinitely many single-peaked and single-crossing preference profiles which are minimally not one-dimensional Euclidean, i.e., excluding any single voter from each of these profiles makes it one-dimensional Euclidean.

We refer to the work of Bredereck et al. (2016) and Elkind et al. (2017) and the literature cited there for further discussion of the single-peaked, the single-crossing, and the one-dimensional Euclidean preference domains.

Our contribution. Recently, Chen et al. (2017) provided a single-peaked and single-crossing profile with three voters and six alternatives which is not one-dimensional Euclidean. In this paper, we show that their counterexample is indeed minimal in terms of the number of voters and the number of alternatives.

In terms of the number of voters, we show that any two single-peaked preference orders are always one-dimensional Euclidean. One way to achieve this would have been to analyze the linear inequalities induced by the linear programs (LP) for detecting one-dimensional Euclideanness (Doignon and Falmagne 1994; Knoblauch 2010; Elkind and Faliszewski 2014). We chose, however, to provide a direct algorithm that, given a single-peaked preference profile with two voters, constructs a concrete one-dimensional Euclidean embedding (see Algorithm 1). The reason for this choice is three-fold.

  • First, from a social-choice and mathematical point of view, through our approach we not only know that all two-voter single-peaked preference profiles are one-dimensional Euclidean but also know that there are one-dimensional Euclidean embeddings of all such profiles which display a certain uniform structure. Note that if we had chosen to analyze the corresponding linear program and tried to show that it is always feasible, we may not be able to have a visual understanding of what the embeddings look like unless we had used an LP solver to solve the induced linear inequalities. Moreover, the embeddings provided by an LP solver may have looked completely different between different profiles.

  • Second, from an algorithmic point of view, our approach is constructive and does not need any external LP solver. The algorithm is so simple that we can provide a publicly available software for individual checking.

  • Third, from a complexity point of view, our algorithm is faster than the LP-solver approach. For m alternatives, our algorithm runs in O(m·runtime-mult(m)) time, where runtime-mult(m) denotes the running time of the multiplication of two integer numbers of O(m) bits each, while the LP-solver approach would need to check the feasibility of the underlying LP formulation in time O(log3(m)·runtime-matrix(m)) (van den Brand 2020), where runtime-matrix(m) denotes the running time of multiplying an m×m dimensional matrix. The multiplication of two integers of O(m) bits can be done in time runtime-mult(m)=O(m·log(m)·log(log(m))) (Schönhage and Strassen 1971) while the fastest known algorithm for m×m-dimensional matrix multiplication runs in time runtime-matrix(m)=O(m2.38) (Gall 2014).

As for the number of alternatives, we use the constraint solver CPLEX1 to show that all single-peaked and single-crossing preferences with up to five alternatives are one-dimensional Euclidean (see Theorem 3). The proof for the second result is computer-aided and can be verified online (see Sect. 4). We note that we did not use the approach given by Doignon and Falmagne (1994), Knoblauch (2010), and Elkind and Faliszewski (2014) to first calculate a linear order of the alternatives and the voters that is consistent to a one-dimensional Euclidean embedding. Instead, our CPLEX program is simply a direct translation of the one-dimensional Euclidean constraints on the variables representing the alternatives and the voters (see Definition 3). The reason for this is that the CPLEX solver offers a function of returning the absolute value of the difference of any two variables, so a linear order of the alternatives and the voters is not necessary to formulate the one-dimensional Euclidean constraints in CPLEX. The verification that every computed embedding is indeed one-dimensional Euclidean is done in a straightforward way, namely by going through each voter’ preference order and comparing the distances between the voter’s and alternatives’ embedded positions.

Identifying the smallest single-peaked and single-crossing preference profile that is not one-dimensional Euclidean not only helps to better understand what precludes a preference profile from being one-dimensional Euclidean, but can also be seen as a necessary step on the way towards a compact characterization via forbidden, albeit not finitely many, subprofiles. We remark that compact characterization via infinitely many forbidden substructures has been done for mathematical concepts such as interval graphs (Lekkerkerker and Boland 1962) and the consecutive ones property in binary matrices (Tucker 1972).

Paper outline. In Sect. 2, we introduce necessary definitions, including single-peaked and single-crossing preferences, and one-dimensional Euclidean preferences. We also discuss some fundamental observations regarding these domain restrictions. In Sect. 3, we formulate our first main result in Theorems 1 and 2. We prove this result by providing a simple and direct algorithm (see Algorithm 1) that constructs a one-dimensional Euclidean embedding for any two preference orders which are single-peaked. We also provide an example to illustrate Algorithm 1 (see Example 3). In Sect. 4, we provide our second main result by describing the computer program that finds all possible preference profiles with up to five alternatives that are both single-peaked and single-crossing, and uses the CPLEX solver publicly available for researchers to provide a one-dimensional Euclidean embedding for each of these profiles (see Theorem 3). Both the source and the embeddings for all produced profiles (including the verification) are available online from https://owncloud.tuwien.ac.at/index.php/s/nysw13YkUajJpOn and https://owncloud.tuwien.ac.at/index.php/s/Pk8TZxva48LJt35, respectively. For the sake of readability, the proofs of lemmas marked with an asterisk () have been moved to the appendix.

Definitions and notations

Let A:={1,,m} be a set of alternatives. A preference order  of A is a linear order of A; a linear order is a binary relation which is total, irreflexive, asymmetric, and transitive. For two distinct alternatives a and b, the relation ab means that a is strictly preferred to (or in other words, ranked higher than) b in . An alternative c is the most-preferred alternative in if for each alternative bA\{c} it holds that cb.

Let be a preference order over A. We use to denote the binary relation which includes  and preserves the reflexivity, i.e., :={(a,a)aA}. For a subset B of alternatives and an alternative c not in B, we use Bc to refer that each bB is preferred to c in .

A preference profile P specifies the preference orders of some voters over some alternatives. Formally, P:=(A,V,R:=(1,,n)), where A denotes the set of m alternatives, V denotes the set of n voters, and R is a collection of n preference orders such that each voter viV ranks the alternatives according to the preference order i on A. We also assume that no two voters in a preference profile have the same preference order.

Single-peaked preferences

The single-peaked property was introduced by Black (1958) and has since been studied extensively.

Definition 1

(single-peakedness) A preference order  on a set A of alternatives is single-peaked with respect to a linear order  of A if for each two distinct alternatives b,cA\{a} it holds that

ifcbaorabc,thenbc,

where a is the most-preferred alternative in .

A preference profile P=(A,V,R) is single-peaked if there is a linear order  of the alternatives A such that the preference order of each voter from V is single-peaked with respect to .

Slightly abusing the terminology, we say that two preference orders are single-peaked if there is a linear order with respect to which each of these two preference orders is single-peaked.

The single-peaked property can be characterized by two forbidden subprofiles, worst-diverse configurations and α-configurations (Ballester and Haeringer 2011). The former is defined on three preference orders while the latter is defined on two preference orders. For two arbitrary preference orders, this means that no α-configurations are present, implying the following.

Proposition 1

(Ballester and Haeringer 2011) Two preference orders, denoted as 1 and 2, over the set A of alternatives are single-peaked if and only if for all four distinct alternatives u,v,w,zA such that u1v1w and w2v2u it holds that v1z or v2z.

Single-crossing preferences

The concept of single-crossing profiles dates back to the seventies, when Mirrlees (1971) and Roberts (1977) observed that voters voting on income taxation may form a linear order such that between each two tax rates, the voters that have the same opinion on the relative positions of both rates are either on the top or at the bottom of the linear order.

Definition 2

(single-crossingness) Given a preference profile P=(A,V,R), a linear order  of the voters V is single-crossing with respect to a pair {a,b}A of alternatives if the set {viVaib} is an interval in . It is a single-crossing order for P if it is single-crossing with respect to every pair of alternatives.

Preference profile P is single-crossing if it admits a single-crossing order of the voters.

The single-crossing property can be characterized by two forbidden subprofiles, γ-configurations and δ-configurations (Bredereck et al. 2013).

One-dimensional Euclidean preferences

Definition 3

(one-dimensional Euclideanness) Let P:=(A,V:={v1,,vn},R:=(1,,n)) be a preference profile. Let E:AVR be an embedding of the alternatives and the voters into the real line where each two distinct alternatives a,bA have different values, that is, E(a)E(b). A voter viV is one-dimensional Euclidean with respect to E if for each two distinct alternatives a,bA voter vi strictly prefers the one closer to him, that is,

aibif and only if|E(a)-E(vi)|<|E(b)-E(vi)|.

An embedding E of the alternatives and voters is a one-dimensional Euclidean embedding of profile P if each voter in V is one-dimensional Euclidean with respect to E.

A preference profile is one-dimensional Euclidean if it admits a one-dimensional Euclidean embedding.

Example 1 illustrates the concepts of single-peaked, single-crossing, and one-dimensional Euclidean preferences.

Example 1

Consider the following preference profile with five alternatives {1,2,3,4,5} and six voters v1,v2,,v6.

v1:112131415,v2:321222425,v3:231343533,v4:244414543,v5:452555153,v6:564626163.

It admits exactly two single-peaked orders, namely 54213 and the reverse of . The single-crossing order of the profile is v6 ▸ v5 ▸ v4 ▸ v3 ▸ v1 ▸ v2 and the reverse of ▸. Note that, in contrast to the single-peaked order, the single-crossing order is unique up to reversal.

The profile is also one-dimensional Euclidean, as shown by the following one-dimensional Euclidean embedding. graphic file with name 355_2020_1301_Figa_HTML.jpg

The following observation regarding the relation between single-peaked and single-crossing profiles and the one-dimensional Euclidean representation is also known from the literature (Coombs 1964; Doignon and Falmagne 1994; Chen et al. 2017).

Observation 1

If a profile is one-dimensional Euclidean, then it is also single-peaked and single-crossing.

Proof

It is straightforward to see that if there is a one-dimensional Euclidean representation E of a given profile, then this profile is single-peaked with respect to the order induced by ordering the alternatives increasingly (or decreasingly) according to their values in E. Moreover, it is single-crossing with respect to the order induced by ordering the voters increasingly (or decreasingly) according to their values in E.

Single-peaked preference profiles with two voters

In this section, we formulate and prove our first main result.

Theorem 1

A profile P with two voters is one-dimensional Euclidean if and only if it is single-peaked.

Proof

The “only if” part follows from Observation 1. The “if” part follows from Theorem 2.

To complete the proof of Theorem 1, we show the following.

Theorem 2

Given a single-peaked preference profile with two voters and m alternatives as input, Algorithm 1 returns a one-dimensional Euclidean embedding of the profile in O(m·runtime-mult(m)) time, where runtime-mult(m) denotes the running time of the multiplication of two integers of O(mbits each.2

In the following, in Sect. 3.1, we first present Algorithm 1 and observe some of its technical properties, and in Sect. 3.3 we prove Theorem 2.

Algorithm 1 and some technical results

Our algorithm for Theorem 2 (see 1D-Euclid-Embed(1,2) in Algorithm 1) is an “inside-out” approach and comprises two stages, an initialization stage (lines 2–9) and an iteration stage (lines 10–13).

In the initialization stage, we embed all inner alternatives (see Definition 4) that are ranked by both voters v1 and v2 between their respective most-preferred alternatives, denoted as a1 and b1 throughout the whole section; note that a1 can be equal to b1. After that we embed voter v1 to the right of, and voter v2 to the left of, the inner alternatives which we have just embedded.

In the iteration stage, we iterate over the remaining alternatives, in order of the preferences of each voter, and try to embed them to the right part of voter v1 or to the left part of voter v2. More specifically, we repeatedly call Refine() to find a range of alternatives and embed them either to the right of the right-most alternative or to the left of the left-most alternative in the embedding. The alternatives are those which are preferred (either by voter v1 or voter v2) to some already embedded alternatives. If no such alternatives exist, we call Fallback() to find a next alternative less preferred by voter v1 and embed it to the right of the right-most alternative. See Fig. 1 for an illustration. The single-peaked property, according to Proposition 1, guarantees that the newly embedded alternatives (through either Refine or Fallback) do not alter the one-dimensional Euclidean property. graphic file with name 355_2020_1301_Figb_HTML.jpg

Fig. 1.

Fig. 1

Illustration of the three possible procedures called in lines 11–13 of Algorithm 1. D denotes the set of embedded alternatives right before the call of each procedure. The two sets, {aj,aj+1,,ai-1} and {bj,bj+1,,bi-1}, denote the sets of alternatives that are to be embedded in a call to Refine(1,v1,E) and Refine(2,v2,E), respectively. In Fallback(1,E), only aj will be embedded

Initialization (lines 2–9 of Algorithm 1)

To describe the initialization stage in more detail, we introduce the notion of inner alternatives.

Definition 4

(Inner alternatives) Let 1 and 2 be two preference orders, and let a1 and b1 be the most-preferred alternatives of 1 and 2, respectively. The set of inner alternatives of 1 and 2, denoted as inner(1,2), is the set of all alternatives that are ranked between a1 and b1 by both 1 and 2:

inner(1,2):={c{1,2,,m}c1b1c2a1}.
Example 2

Consider two preference orders 1 and 2 with 1121314 and 3242221. The set of inner alternatives of 1 and 2 is inner(1,2)={1,2,3}.

We observe the following properties concerning the inner alternatives of two single-peaked preference orders.

Lemma 1

Consider two preference orders 1 and 2.

  1. For each r{1,2}, the most-preferred alternative of r belongs to inner(1,2).

  2. If 1 and 2 are single-peaked, then for each two distinct inner alternatives x,yinner(1,2) it holds that x1y if and only if y2x.

Proof

The first statement follows from the definition of inner(1,2).

It remains to show Statement (2). If a1=b1, then by the definition of inner it holds that inner(1,2)={a1}={b1}, and the second statement holds immediately since inner(1,2) has only one alternative. Thus, let us assume that a1b1 so that |inner(1,2)|2. Let 1 and 2 be single-peaked. Suppose, for the sake of contradiction, that there are two distinct alternatives x,yinner(1,2) with x1y and x2y—the case with y1x and y2x works analogously. Since a11b1 and b12a1, it follows that x,y{a1,b1}. By the definition of a1 and b1 and since x,yinner(1,2), this implies that a11x1y1b1 and b12x2y2a1—a contradiction to Proposition 1.

Now, we are ready to describe the initialization stage of Algorithm 1, where we first embed all inner alternatives (lines 2–7). By Proposition 1, voters v1 and v2 have exactly the opposite preferences with respect to these inner alternatives. Hence, by the single-peaked property, the order of the inner alternatives induced by any one-dimensional Euclidean embedding is fixed (up to reverse). In other words, the induced order corresponds to the preferences of either voter v1 or voter v2. Without loss of generality, we choose the induced order to correspond to the preferences of voter v2. More precisely, if the preference order of v2 restricted to the inner alternatives is c1c2cx, where x=|inner(1,2)|, then we let each two consecutive alternatives in have unit distance. Then, in lines 8–9 we embed voter v2 to the left of c1 and v1 to the right of cx, again at unit distance.

Summarizing, we observe the following about the initialization stage.

Proposition 2

Let E be the embedding constructed by the end of the initialization phase (lines 2–9) of Algorithm 1. Let c1,c2,,cx be the embedded alternatives with E(c1)<<E(cx). The following holds.

  1. inner(1,2)={c1,c2,,cx} with cx=a1 and c1=b1.

  2. The preferences of voter v2 restricted to inner(1,2) are c12c222cx.

  3. E(v1)-E(v2)=|inner(1,2)|+1.

  4. E(v2)<E(c1) and E(cx)<E(v1).

  5. If 1 and 2 are single-peaked, then the preferences of voter v1 restricted to inner(1,2) are cx1cx-111c1.

Proof

The first three statements follow directly from lines 3–7 and from the definition of inner(1,2). Moreover, it holds that E(c1)=1, E(cx)=|inner(1,2)|, E(v2)=0, and E(v1)=|inner(1,2)|+1. This implies Statement 4.

As to Statement 5, consider an arbitrary embedded alternative cj with j{1,,x-1}. Then, by the second statement, we have that cj2cj+1. By Lemma 1(2), we have that cj+11cj.

The iteration stage (lines 10–13 of Algorithm 1)

After having embedded all inner alternatives and the two voters, the main loop (lines 10–13) extends the embedding by alternatingly placing alternatives that should be embedded to the right of the right-most embedded alternative and alternatives that should be embedded to the left of the left-most embedded alternative. The corresponding procedure is called Refine() (lines 14–25) and is used for both voters v1 and v2. It searches through the alternatives along the preference order of v1 (resp. v2), and finds all not-yet-embedded alternative(s) C which v1 (resp. v2) ranks between two already embedded alternatives. To make sure the other not-yet-embedded alternatives can still be embedded at a later stage, we embed the found alternatives C to the right (resp. left) of the right-most (resp. left-most) embedded alternative. The Fallback(1,E) procedure in line 13 guarantees that at least one alternative is embedded during each iteration, thus ensuring that the algorithm terminates.

For an illustration, see the following example.

Example 3

(Illustration for Algorithm 1) Consider the following preference profile with two voters and eight alternatives:

v1:114121315161718,v2:322212526242827.

It is single-peaked with respect to the order with 86532147, and also with respect to the reverse of . Given the two preferences orders as input, our algorithm will return a one-dimensional Euclidean embedding which is depicted in the following line. graphic file with name 355_2020_1301_Figc_HTML.jpg

Table 1 summarizes how the algorithm proceeds with v1 and v2 as input.

Table 1.

A summary of how Algorithm 1 proceeds for an input of the two preference orders 1 and 2 given in Example 3. The first row refers to the ith iteration in the main loop, where i=0 refers to the initialization. The second row shows exactly which procedure is called with which arguments. The third and the last rows show which alternatives are embedded at which positions in that call

graphic file with name 355_2020_1301_Tab1_HTML.jpg

More precisely, in the initialization, the inner alternatives inner(1,2)={1,2,3} are embedded between voter v1 at 4 and voter v2 at 0.

In iteration 1 of the main loop (lines 10–13), alternative 4 is embedded to the right of voter v1 in the first call to Refine(1,v1,E), as it is the first not-yet-embedded alternative in the preferences of v1. Since c2=4, we set j:=2 in line 16. Since c3=2 is an embedded alternative with the smallest index which v1 ranks lower than 4, we set i:=3 in line 18. Next, we set dist(j-1):=|E(v1)-E(cj-1)|=|4-3|=1 and dist(i):=|E(v1)-E(ci)|=|4-2|=2 in lines 19–20. Finally, for k=j=2 we set

E(4)=E(c2)=E(ck):=E(v1)+dist(j-1)+(dist(i)-dist(j-1))·k-j+1i-j+1=4+1+(2-1)·12=5+12.

After alternative 4 has been embedded, alternatives 5 and 6 are embedded to the left of the left-most alternative, namely 3, in the first call to Refine(2,v2,E).

This is because alternatives 5 and 6 are the first not-yet-embedded alternatives in the preference order of v2, and there is an embedded alternative, namely 4, such that v2 prefers {5,6} to 4. So, j:=4 and i:=6, dist(j-1):=3, and dist(i)=5+12. Hence, for k=j=4,

E(5)=E(c4)=E(ck):=E(v2)-dist(j-1)-(dist(i)-dist(j-1))·k-j+1i-j+1=0-3-5+12-3·13=-3-56.

For k=j+1=5,

E(6)=E(c5)=E(ck):=E(v2)-dist(j-1)-(dist(i)-dist(j-1))·k-j+1i-j+1=0-3-5+12-3·23=-4-23.

Fallback(1,E) is not called since at least one of the calls to Refine() returned true.

In iteration 2, that is, after alternatives 5 and 6 have been embedded, neither Refine(1,v1,E) nor Refine(2,v2,E) return true. Alternative 7 is the first not-yet-embedded alternative in the preference order of v1. Thus, Fallback(1,E) embeds 7 to the right of v1 so that it becomes the right-most alternative with j:=7:

E(7)=E(aj)=E(a7):=E(v1)+|E(v1)-E(aj-1)|+1=13+23.

At last, in iteration 3, Refine(1,v1,E) returns false. Then, in Refine(2,v2,E), alternative 8 is embedded to the left of the left-most alternative, namely 6, as 8 is the first not-yet-embedded alternative in the preferences of v2 and there is an embedded alternative, namely 7, such that v2 prefers alternative 8 to 7. So, j:=7 and i:=8, dist(j-1):=5+12, and dist(i)=13+23. For k=j=7,

E(8)=E(ck)=E(c7):=E(v2)-dist(j-1)-(dist(i)-dist(j-1))·k-j+1i-j+1=0-5+12-13+23-5-12·12=-9-712.

Due to the way we embed the alternatives in Refine(,v,E), the newly embedded alternatives do not violate the one-dimensional Euclidean property for voter v, as stated in the following lemma.

Lemma 2

() Let j and i be as defined in a call to Refine(z,vz,E) with z{1,2}. If E satisfies |E(cj-1)-E(vz)|<|E(ci)-E(vz)|, then after the call to Refine(z,vz,E) it holds that |E(cj-1)-E(vz)|<|E(cj)-E(vz)|<<|E(ci-1)-E(vz)|<|E(ci)-E(vz)|.

Running time of Algorithm 1

We close this subsection by analyzing the running time of Algorithm 1. Clearly, the initialization in lines 2–9 can be done in O(m) time. Recall that the number of alternatives embedded during the initialization phase is p-1. Then, the main loop in lines 10–13 terminates after at most m-p+1 iterations since in each iteration at least one of the calls to Refine(z,vz,E) with z{1,2} or Fallback(1,E) will embed at least one more alternative.

Hence, it remains to analyze the running time of embedding the alternatives via a call to Refine or Fallback. Since each such alternative is embedded exactly once, which needs a constant number of multiplications, additions, and subtractions (see lines 19–23 and line 29), we only need to analyze the running time of the multiplication in the assignments in lines 22–23, as well as the running time of finding the two indices j and i in lines 16, 18, and 28.

Implementation for finding j and i. A straightforward implementation may require O(m2) time in total to find j and i in all calls to Refine(z,vz,E) and Fallback(1,E). However, with a few additional variables we can find them in O(m) time in total in all calls. For brevity’s sake, we have left this optimization out of the description of Algorithm 1. A modified version that includes it can be found in Appendix B.1.

Next, we analyze the running time for a possible multiplication in lines 22–23 of Algorithm 2. To this end, let us assume that we store the position of each embedded alternative ci in a integer triple (ei,fi,gi) such that E(ci)=ei+figi with ei,fi,giZ and fi<gi. Then, a multiplication in lines 22–23 can be done via integer multiplication, whose running time depends on the largest |ei|+1 and the largest denominator gi in the triple encoding.

Largest value computed. To estimate the largest value, we only need to estimate the largest distance from either voter to all alternatives. Observe that in Refine(z,vz,E), since the distance from vz to each of the newly embedded alternatives is smaller than the distance from vz to ci (which is already embedded), the largest distance from vz to any embedded alternative is not increased. The distance from v3-z to each of the newly embedded alternatives could be enlarged by p, which is the distance between the two voters. The same holds for Fallback(1,E). Hence, the largest distance from either voter to all alternatives is bounded by p·(m-p+1)O(m2).

Largest denominator computed. As for the largest computed denominator, we observe that it depends on the number of alternatives to be embedded. To this end, let x1,x2,,xn, nm-p+1 denote the number of alternatives embedded in a successful call of Refine (,v,E). Then, the largest computed denominator is bounded by the following:

z=1n(xi+1)(z=1nxz+1n)n(m-p+1+nn)nletn:=α·(m-p+1)(1+1α)α·(m-p+1)em-p+1em,

where the first inequality is due to inequality of arithmetic and geometric means, the second inequality is due to the fact that the total number of alternatives embedded during the iteration stage is bounded by m-p-1, the fourth inequality is due to the fact that nm-p-1, and e denotes the Euler number.

Since the multiplication of two integers of value O(em) can be done in O(m·log(m)·log(log(m))) time (Schönhage and Strassen 1971) and since for each embedded alternative our algorithm performs a constant number of integer multiplications, additions, and subtractions, our algorithm can be implemented to run in O(m2·log(m)·log(log(n))) time.

Proof of Theorem 2

In Sect. 3.2, we prove the running time stated in Theorem 2. To prove Theorem 2, it remains to prove that Algorithm 1 is correct, i.e., it returns a one-dimensional Euclidean embedding whenever the two input preference orders are single-peaked. To this end, let 1 and 2 be the input reference orders with 1:a11a211am and 2:b12b222bm. First of all, by Proposition 2, the initialization phase computes a one-dimensional Euclidean embedding of 1 and 2 when restricted to the inner alternatives inner(1,2). Thus, to prove the correctness, we only need to show that each iteration of the main loop (lines 10–13) extends the embedding in such a way that it is one-dimensional Euclidean for 1 and 2 when restricted to the embedded alternatives. To achieve this, we need to show that the procedures Refine(z,vz,E), z{1,2}, and Fallback(1,E), extend the existing one-dimensional Euclidean embedding to one that is one-dimensional Euclidean with respect to the alternatives that have already been embedded and those which are newly embedded. To this end, we introduce a few more technical notions regarding a subset of alternatives.

Definition 5

Let E:A{v1,v2}R{} be an embedding of a two-voter preference profile P=(A,V,R) with V={v1,v2} and R=(1,2). Let AA be a non-empty subset of alternatives. We say that E is one-dimensional Euclidean with respect to A if for each voter vzV and each two alternatives x,yA it holds that E(x), E(y) and

xzyif and only if|E(x)-E(vz)|<|E(y)-E(vz)|.

For each voter vzV, we use worst(A,vz) to denote the alternative from A which is least preferred by vz, i.e.,

worst(A,vz)Asuch thatxAit holds thatxzworst(A,vz).

Example 4

Consider the profile from Example 3 again.

v1:114121315161718,v2:322212526242827.

If A={1,2,3,4}, then worst(A,v1)=3 and worst(A,v2)=4.

For the ease of case distinctions, we introduce another notion called no later than and observe a useful property regarding “no later than”.

Definition 6

(No later than) For two distinct alternatives x and y, we say that x is embedded no later than y if one of the following conditions holds.

  • (i)

    Alternatives x and y are both embedded during initialization.

  • (ii)

    They are both embedded in the same call to Refine().

  • (iii)

    When y is to be embedded, x is already embedded, i.e., E(x).

We say that y is embedded later than x if (i) x is embedded no later than y while (ii) y is not embedded no later than x.

For instance, alternative 5 is embedded later than alternative 4 in Example 3 although they are embedded in the same iteration of the main loop.

The following lemma states that no alternative that is less preferred by both voters will be embedded too early, making sure that the inside-out approach in Refine() is correct.

Lemma 3

() Let x and y be two distinct alternatives with x1y and x2y. Then, Algorithm 1 embeds x no later than y.

Now, we continue with the correctness proof for the iteration stage. Let D be the alternatives that are embedded at the beginning of Refine or Fallback, and assume that E is one-dimensional Euclidean with respect to D.

In the remainder of the proof, we consider Refine() and Fallback() separately in Sects. 3.3.1 and 3.3.2.

Embedding alternatives in Refine(z,vz,E) with z{1,2}

Assume that Refine (z,vz,E)=true as otherwise nothing needs to be proved. Let C be the set of alternatives that are to be embedded in the call and let vz be the other voter with z{1,2}\{z}. By the procedure Refine(z,vz,E), the two embedded alternatives that Refine identifies are cj and ci in lines 16 and 18 such that C={cj,cj+1,,ci-1} and

cjzcj+1zzci-1zcizworst(D,vz). 1

By assumption, the embedding E is one-dimensional Euclidean with respect to D.

One-dimensional Euclideanness regarding voter vz. By Lemma 2, it follows that E is also a one-dimensional Euclidean embedding for voter vz regarding DC. In particular, it holds that,

k{1,2,,i-1}:|E(ck)-E(vz)|<|E(ck+1)-E(vz)|. 2

One-dimensional Euclideanness regarding voter vz. It remains to show that E is also one-dimensional Euclidean for voter vz regarding all alternatives from DC.

To achieve this, we prove the following two lemmas which ensure that the newly embedded alternatives are one-dimensional Euclidean with respect to voter vz.

Lemma 4

() Assume that the input preference orders 1 and 2 are single-peaked. For each not-yet-embedded alternative x, i.e., xD, it holds that worst(D,1)1x or worst(D,2)2x.

The next lemma states that for each two not-yet-embedded alternatives, the single-peaked property imposes that they are ordered in the same way by both voters.

Lemma 5

() Assume that the input preference orders 1 and 2 are single-peaked. For each two not-yet embedded alternatives x and y, i.e., x,yD with xy, the following holds:

For each r{1,2} it holds that if xryrworst(D,r), then worst(D,s)sxsy, where s{1,2}\{r}.

Now, if we apply Lemma 5 on the alternatives C in the preferences given in (1), we obtain that voter vz’s preferences must be worst(D,vz)zcjzcj+1zzci-1. By the embedding of the alternatives from C (lines 22–23), for each alternative ak with jki-1 it holds that

ifz=1, thenE(vz)<E(vz)<E(ck)<E(ck+1); 3
ifz=2, thenE(ck+1)<E(ck)<E(vz)<E(vz). 4

In both cases, we obtain that

|E(ck)-E(vz)|<|E(ck+1)-E(vz)|,jki-1. 5

Thus, to show that E remains one-dimensional Euclidean for voter vz regarding the alternatives from DC, we only need to show that |E(worst(D,z))-E(vz)|<|E(cj)-E(vz)|.

Now, if we can show that

worst(D,z)zcj-1, 6

then we can derive that

|E(worst(D,z))-E(vz)||E(worst(D,z))-E(vz)|+|E(vz)-E(vz)|(6)|E(cj-1)-E(vz)|+|E(vz)-E(vz)|<(2)|E(cj)-E(vz)|+|E(vz)-E(vz)|=(3),(4)|E(cj)-E(vz)|,

which is what we needed to show.

Thus, the only remaining task is to show that (6) holds. We distinguish between two cases; let best(z) and best(z) denote the most-preferred alternative in z and z, respectively.

If worst(D,z)inner(1,2), then by the definition of inner alternatives, it follows that worst(D,z)zbest(z). By the definition of worst(D,z), this also implies worst(D,z)=best(z), and thus worst(D,z)zcj-1 as best(z) is the first alternative in z.

If worst(D,z)inner(1,2), then worst(D,z) was embedded during an iteration stage in the main loop. Suppose, for the contradiction that cj-1zworst(D,z). By the definition of cj, it follows that

cjzcj+1zzci-1zworst(D,z). 7

Now, let us consider the iteration in the main loop where worst(D,z) was embedded. First of all, worst(D,z) cannot be embedded in Refine(z,vz,E) because by definition, there existed no other already-embedded alternative which is less preferred by voter vz. Second, neither can worst(D,z) be embedded in Refine(z,vz,E), since otherwise by (7) all alternatives from C must be embedded at least in the same call as worst(D,z), a contradiction. Finally, neither can worst(D,z) be embedded in Fallback(1,E) because there existed at least one other alternative, namely cj, which is more preferred by vz to worst(D,z). This means that there exists no iteration where worst(D,z) can be embedded, a contradiction.

Summarizing, we have shown that worst(D,z)zcj-1. This completes the proof for the case where alternatives are embedded in Refine(z,vz,E).

Embedding alternatives in Fallback(1,E)

For brevity’s sake, define a:=worst(D,1) and b:=worst(D,2). By our algorithm, it must hold that

D1CandD2C. 8

We also infer that C={aj} where j=|D|+1, and that

E(v1)<E(aj). 9

To show the one-dimensional Euclidean property, we only need to show that |E(a)-E(v1)|<|E(aj)-E(v1)| and |E(b)-E(v2)|<|E(aj)-E(v2)|. By lines 28–29, it holds that a=aj-1. Thus, we infer that

|E(a)-E(v1)|=|E(aj)-E(v1)|-1<|E(aj)-E(v1)|. 10

By the definition of a and b, voter v1 has preferences

b1a. 11

Since E is one-dimensional Euclidean with respect to voter v2 and the alternatives in D, this implies the following:

|E(b)-E(v2)||E(b)-E(v1)|+|E(v1)-E(v2)|(11)|E(a)-E(v1)|+|E(v1)-E(v2)|<(10)|E(aj)-E(v1)|+|E(v1)-E(v2)|=(9)|E(aj)-E(v2)|.

To conclude, we have shown that in each case the algorithm extends the embedding so that the resulting embedding is one-dimensional Euclidean for both voters and the alternatives already embedded as well as the newly embedded alternatives. Thus, our algorithm indeed computes a one-dimensional Euclidean embedding of two voters whose preferences are single-peaked.

Single-peaked and single-crossing profiles with up to five alternatives are one-dimensional Euclidean

In this section, we state and prove our second main result concerning preference profiles with up to five alternatives.

Theorem 3

Each preference profile with up to five alternatives is one-dimensional Euclidean if and only if it is single-peaked and single-crossing.

Proof

From Observation 1, we know that a one-dimensional Euclidean profile is necessarily single-peaked and single-crossing. Thus, to show the theorem, it suffices to show that every single-peaked and single-crossing preference profile with up to five alternatives is also one-dimensional Euclidean. We achieve this by using a computer program via the CPLEX solver that exhaustively searches for all possible single-peaked and single-crossing profiles with up to five alternatives and provide a one-dimensional Euclidean embedding for each of them. Since the CPLEX solver accepts constraints on the absolute value of the difference between any two variables, our computer program is a simple one-to-one translation of the one-dimensional Euclidean constraints given in Definition 3. Hence, we do not need to compute any single-peaked or single-crossing order necessary for the non-trivial approaches as given in the literature (Doignon and Falmagne 1994; Knoblauch 2010; Elkind and Faliszewski 2014).

We did some optimization to significantly shrink our search space on all possible single-peaked and single-crossing preference profiles.

  • First, we only consider profiles with at least two alternatives and at least two voters who have pairwise distinct preference orders as two voters with the same preference order can be embedded at the same position without losing the one-dimensional Euclidean property. Since the relevant profiles in consideration must be single-crossing, by Doignon and Falmagne (Doignon and Falmagne 1994, Lemma 1) and Bredereck et al. (Bredereck et al. 2013, Section 2.1), our program only searches for profiles with at most m2+1 distinct preference orders, where m is the number of alternatives, 3m5. The minimum number of voters we need to consider is three as by Theorem 1 all single-peaked and single-crossing preference profiles with two voters are one-dimensional Euclidean.

  • Second, we assume that one of the preference orders in the sought profile is 12m. We denote this order as the canonical preference order.

  • Third, using the monotonicity of the single-peaked property, we consider adding a preference order (there are m!-1 many) to form a potential relevant single-peaked and single-crossing profile only if it is single-peaked with the canonical one. By Lackner and Lackner (Lackner and Lackner 2017, Theorem 12(i)), among all m!-1 preference orders other than the canonical one, there are 2m-2m-1-1 preference orders that each form with the canonical one a single-peaked profile. Note that for m=5, the number of potentially single-peaked profiles with n=52+1=11 voters is reduced from m!-1n-1=11910 to 2m-2m-1-110=6910.

We summarize the number of single-peaked and single-crossing profiles with up to m=5 alternatives and up to n=m2+1 voters in Table 2. Note that we include profiles which have two voters although by Theorem 1 all single-peaked and single-crossing preference profile with two voters are one-dimensional Euclidean.

Table 2.

For each number m of alternatives stated in the first column and for each number n of voters stated in the first row, 3m5 and 2nm2+1, we summarize the number of single-peaked and single-crossing preference profiles we have produced that contain the canonical preference order 12m and no two voters that have the same preference orders. For instance, when m=3 and n=4, the number of sought preference profiles is 2, as indicated in row two and column four

m n
2 3 4 5 6 7 8 9 10 11
3 5 6 2
4 19 69 108 90 39 7
5 69 567 2124 4810 7185 7273 4964 2196 570 66

We implemented a program which, for each of these produced profiles, uses the IBM ILOG CPLEX optimization software package to check and find a one-dimensional Euclidean embedding. The verification is done by going through each voter’s preference order and checking the condition given in Definition 3. The source code and all generated profiles, together with their one-dimensional Euclidean embeddings and the distances used for the verification, are available online at https://owncloud.tuwien.ac.at/index.php/s/Pk8TZxva48LJt35 and can be verified using the software at https://owncloud.tuwien.ac.at/index.php/s/nysw13YkUajJpOn.

Conclusion and outlook

We have shown that for preference profiles with at most five alternatives or at most two voters, being single-peaked and single-crossing suffices for being one-dimensional Euclidean.

Our research leads to some interesting followup questions. First of all, using our computer program from Sect. 4 we can produce all single-peaked and single-crossing preference profiles and all one-dimensional Euclidean preference profiles. A natural question is to count the number of structured (e.g., single-peaked, single-crossing, one-dimensional Euclidean) preference profiles and provide a closed formula in terms of the number m of alternatives and the number n of voters, in a similar spirit as recent work by Lackner and Lackner (2017) and Chen and Finnendahl (2018).

Second, both the single-peaked and the single-crossing property can be characterized by a few small forbidden subprofiles (Ballester and Haeringer 2011; Bredereck et al. 2013). However, this is not the case for the one-dimensional Euclidean property (Chen et al. 2017). Thus we ask: is it possible to characterize small one-dimensional Euclidean preference profiles via a few forbidden subprofiles? We note that one-dimensional Euclidean preferences can be detected in polynomial time, using linear programming (Doignon and Falmagne 1994; Knoblauch 2010). Chen (2016, Chapter 4.11) provided a generic construction and showed that there are at least n! single-peaked and single-crossing preference profiles with n=m/2 voters and m alternatives that are not one-dimensional Euclidean. For m=6, this number would be 6. However, through our computer program we found that for m=6 and n=3, out of 4179 single-peaked and single-crossing preference profiles, there are 48 which are not one-dimensional Euclidean. This gap in numbers merits further investigation.

Last but not least, for d2, d-dimensional Euclidean preference profiles are not necessarily single-peaked nor single-crossing (Bogomolnaia and Laslier 2007). In other words, the forbidden subprofiles that are used to characterize single-peaked or single-crossing preference profiles are not of use to characterize d-dimensional Euclidean profiles. Peters (2017) showed that finitely many small forbidden subprofiles are not enough to characterize the d-dimensional Euclidean property for any d2. This leads to the question of searching for compact, sufficient and necessary conditions for preference profiles to be d-dimensional Euclidean. Bogomolnaia and Laslier (2007) answered this question for profiles that may contain ties. Moreover, they showed that for each d1, there exists a non-d-dimensional Euclidean preference profiles with d+2 voters and d+2 alternatives. Bulteau and Chen (2020) used a computer program to verify that all preference profiles with up to seven alternatives and up to three voters are 2-dimensional Euclidean, and provided a preference profile with 3 voters and 28 alternatives which cannot be embedded into the two-dimensional space.

Additional material for section 3.1

Proof of Lemma 2

Lemma 2. Let j and i be as defined in a call to Refine(z,vz,E) with z{1,2}. If E satisfies |E(cj-1)-E(vz)|<|E(ci)-E(vz)|, then after the call to Refine(z,vz,E) it holds that |E(cj-1)-E(vz)|<|E(cj)-E(vz)|<<|E(ci-1)-E(vz)|<|E(ci)-E(vz)|.

Proof

By the definitions of j and i, since E satisfies |E(cj-1)-E(vz)|<|E(ci)-E(vz)| it holds that

dist(j-1)=|E(cj-1)-E(vz)|<|E(ci)-E(vz)|=dist(i), 12

Note that dist(j-1) and dist(i) are defined in lines 19–20 of Algorithm 1. From lines 22–23 of Algorithm 1, it is straightforward to verify that for each alternative ck with j-1ki,

|E(ck)-E(vz)|=dist(j-1)+dist(i)-dist(j-1)i-j+1·(k-j+1) 13

Combining (13) with (12), we obtain the chain of inequalities in the lemma.

Additional material for section 3.2

Continued discussion on the implementation for j and i

Now, we discuss in depth how we achieve the claimed running time of O(m·runtime-mult(m)), using a few additional variables. An extended version of Algorithm 1 where we explicitly state how these variables are initialized and updated can be found in Algorithm 2. The differences are marked in red.

We use a counter s, which counts the number of currently embedded alternatives, to test the condition in lines 10, 15, 27 of Algorithm 1 in constant time. Counter s is initialized with p-1; recall that the number of inner alternatives embedded during the initialization phase in Algorithm 1 is p-1.

We introduce two integer arrays rk1 and rk2 to store for each alternative x the position of x in the preference order of 1 and 2, respectively (see line 33 of Algorithm 2).

For each voter vz, z{1,2}, we introduce two integer variables uz and wz which store the following information:

  • (i)

    uz stores the largest position (i.e., index) in z among all alternatives that were embedded in the previous call to Refine(z,vz,E).

  • (ii)

    wz stores the largest position (i.e., index) in z among all already embedded alternatives.

Both u1 and u2 are initialized to 1. w1 is initialized such that aw1=b1, while w2 is initialized such that bw2=a1 (see lines 31 and 40 of Algorithm 2). graphic file with name 355_2020_1301_Figd_HTML.jpg

Assume that we are in a call to Refine(z,vz,E) with z:c1zc2zzcm. To find j, we go through the preference order of vz, starting from cuz, and increment the value of uz until we find a not yet embedded alternative (see line 49 of Algorithm 2). Then, we set j:=uz in line 50. We test the condition in line 17 in Algorithm 1 in constant time by checking whether uz<wz since cwz is the alternative with the largest index among all embedded alternatives. If the condition is met, then we find i by going through the preference order of vz, starting from cuz and incrementing the value of uz until we find a first already-embedded alternative (see line 52 of Algorithm 2). We set i:=uz and uz:=i-1 in line 53. We only need to update the value of wz with z=3-z since the largest index among all embedded alternatives in the preference order of vz may have changed (see line 59 of Algorithm 2). We update the counter s in line 60 of Algorithm 2.

We also need to adjust Fallback(1,E). By the main loop, when we call Fallback(), both Refine(1,v1,E) and Refine(2,v2,E) must have returned false. This also means that s<m and u1 already points to a first not-yet-embedded alternative in the preference order of v1. Hence, we only need to set j:=u1 in line 65 of Algorithm 2. We need to update the values of both w1 and w2 in line 67 of Algorithm 2, and update the counter s in line 68.

It is straightforward to see that the value of variable uz (z{1,2}) is never decreased and will always be increased by at least the number of alternatives to be embedded in each iteration. Since our algorithm terminates after at most m-p+1 calls of Refine, the search for j and i in all calls from the main loop combined needs O(m) time.

Additional material for section 3.3

Proof of Lemma 3

Lemma 3. Let x and y be two distinct alternatives with x1y and x2y. Then, Algorithm 1 embeds x no later than y.

Proof

If yinner(1,2), then by the transitivity of preference orders, it follows that x1y1b1 and x2y2a1, This immediately implies that xinner(1,2), meaning that x and y are both embedded during the initialization, and that x is embedded no later than y.

Now, let us assume that yinner(1,2). Consider the call when y was embedded. There are two cases.

If y has been embedded in line 22 or line 23 in a call to Refine(z,vz,E), z{1,2}, then let j and i be the indices as defined in that call such that cjzyzci. If E(x), i.e., x has already been embedded, then by the definition of “no later than”, x is embedded no later than y. If E(x)=, since cj was defined as the first alternative that is not yet embedded, it follows that cjzx. Since xzy, it follows that cjzxzyzci, implying that x is embedded in the same call Refine(z,vz,E) as y. Thus, x is embedded no later than y.

If y has been embedded in Fallback(1,E) in line 13, meaning that it is also the only alternative that is embedded during that iteration, then line 28 guarantees that E(x), and thus, x is embedded no later than y.

Proof of Lemma 4

Lemma 4. Assume that the input preference orders 1 and 2 are single-peaked. For each not-yet-embedded alternative x, i.e., xD, it holds that worst(D,1)1x or worst(D,2)2x.

Proof

Let a=worst(D,1) and b=worst(D,2). Towards a contradiction, suppose that 1 and 2 are single-peaked but x is an alternative with xD such that

x1aandx2b. 14

This implies that

a1aandb1b, 15

as a11x and b12x; recall that a1 (resp. b1) is the alternative most preferred by voter v1 (resp. v2). Since x is not yet embedded while a and b are already embedded, applying Lemma 3 two times (letting y=a and y=b, respectively), we know that

(a1xora2x)and(b1xorb2x).

Together, with the assumption given in (14), we obtain that

v1:b1x1aandv2:a2x2b,and thus, 16
ab. 17

By the definitions of a1 and b1, we further infer that

v1:a11b1x1aandv2:b12a2x2b. 18

We distinguish between two cases, in each case aiming to obtain xinner(1,2) which is a contradiction to xD as inner(1,2)D.

Case 1: If a1=b, then the preferences given in (18) are equivalent to

v1:a11x1aandv2:b12a2x2a1. 19

Furthermore, b1a as otherwise xinner(1,2)—a contradiction. Consequently, the preferences given in (19) imply that

v1:a11x1aandv2:b12a2x2a1. 20

Since 1 and 2 are single-peaked, by Proposition 1 and by (20), we must have that x1b1. However, this implies that xinner(1,2) since x2a1—a contradiction.

Case 2: If a1b, then the preferences given in (18) imply that

v1:a11b1x1aandv2:b12a2x2b. 21

Since 1 and 2 are single-peaked, by Proposition 1 and by (21), we must have that x2a1 and x1b1, implying that xinner(1,2)—a contradiction.

Proof of Lemma 5

Lemma 5. Assume that the input preference orders 1 and 2 are single-peaked. For each two not-yet embedded alternatives x and y , i.e., x,yD with xy, the following holds:

For each r{1,2} it holds that

if xryrworst(D,r), then worst(D,s)sxsy, where s{1,2}\{r}.

Proof

Let 1 and 2 be single-peaked, and let xy be as defined in the lemma. Consider an arbitrary index r{1,2} such that xryrworst(D,r) holds. Let s{1,2}\{r}. Let best(z) be the most preferred alternative in the preference order z. Since x,yD and best(z)D, we have that

best(r)rxryrworst(D,r). 22

By Lemma 4, it follows that worst(D,s)s{x,y}. Thus, it remains to show that xsy. Towards a contradiction, suppose that ysx. By the definition of worst(D,s), voter vs must have preferences

{best(r),worst(D,r)}sworst(D,s)sysx. 23

Together with (22), we have

best(r)rxryrworst(D,r),and{best(r),worst(D,r)}sysx,

a contradiction to Proposition 1.

Acknowledgements

We thank the anonymous reviewers of the journal Social Choice and Welfare for their constructive feedback. We thank Laurent Bulteau (Laboratoire d’Informatique Gaspard Monge in Marne-la-Vallée, France) for his insight and helpful comments on this work while Jiehua Chen was visiting him in March 2016; the visit was funded by Laboratoire d’Informatique Gaspard Monge in Marne-la-Vallée, France. We also thank Marcin Dziubiński (University of Warsaw) for his helpful feedback and suggestion on improving the paper. Jiehua Chen was supported by European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation programme under Grant Agreement Numbers 677651, and by the WWTF research project (VRG18-012).

Appendix

Funding

Open access funding provided by TU Wien (TUW).

Footnotes

2

The multiplication of two integers of O(m) bits can be done in O(m·log(m)·log(log(m))) time, for instance via the Schönhage–Strassen algorithm (Schönhage and Strassen 1971).

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Contributor Information

Jiehua Chen, Email: jiehua.chen@tuwien.ac.at.

Sven Grottke, Email: sfs.42@mail.tu-berlin.de.

References

  1. Ballester MÁ, Haeringer G. A characterization of the single-peaked domain. Soc Choice Welfare. 2011;36(2):305–322. doi: 10.1007/s00355-010-0476-3. [DOI] [Google Scholar]
  2. Black D. On the rationale of group decision making. J Polit Econ. 1948;56(1):23–34. doi: 10.1086/256633. [DOI] [Google Scholar]
  3. Black D. The theory of committees and elections. Cambridge: Cambridge University Press; 1958. [Google Scholar]
  4. Bogomolnaia A, Laslier J-F. Euclidean preferences. J Math Econ. 2007;43(2):87–98. doi: 10.1016/j.jmateco.2006.09.004. [DOI] [Google Scholar]
  5. Borg I, Groenen PJ, Mair P. Applied multidimensional scaling and unfolding. Berlin: Springer; 2018. [Google Scholar]
  6. Brams SJ, Jones MA, Kilgour DM. Single-peakedness and disconnected coalitions. J Theor Polit. 2002;14(3):359–383. doi: 10.1177/095169280201400304. [DOI] [Google Scholar]
  7. Bredereck R, Chen J, Woeginger GJ. A characterization of the single-crossing domain. Soc Choice Welfare. 2013;41(4):989–998. doi: 10.1007/s00355-012-0717-8. [DOI] [Google Scholar]
  8. Bredereck R, Chen J, Woeginger GJ. Are there any nicely structured preference profiles nearby? Math Soc Sci. 2016;79:61–73. doi: 10.1016/j.mathsocsci.2015.11.002. [DOI] [Google Scholar]
  9. Bulteau L, Chen J (2020) On the border between Euclidian and non-Euclidean preference profiles in d-dimension. working paper
  10. Chen J (2016) Exploiting structure in computationally hard voting problems. PhD thesis, Technical University of Berlin, Germany
  11. Chen J, Finnendahl UP. On the number of single-peaked narcissistic or single-crossing narcissistic preferences. Discrete Math. 2018;341(5):1225–1236. doi: 10.1016/j.disc.2018.01.008. [DOI] [Google Scholar]
  12. Chen J, Pruhs K, Woeginger GJ. The one-dimensional Euclidean domain: finitely many obstructions are not enough. Soc Choice Welfare. 2017;48(2):409–432. doi: 10.1007/s00355-016-1011-y. [DOI] [Google Scholar]
  13. Coombs CH. A theory of data. Hoboken: Wiley; 1964. [Google Scholar]
  14. Doignon J, Falmagne J. A polynomial time algorithm for unidimensional unfolding representations. J Algorithms. 1994;16(2):218–233. doi: 10.1006/jagm.1994.1010. [DOI] [Google Scholar]
  15. Downs A. An economic theory of democracy. Manhattan: Harper and Row; 1957. [Google Scholar]
  16. Elkind E, Faliszewski P (2014) Recognizing 1-Euclidean preferences: an alternative approach. In Proceedings of the 7th International Symposium on Algorithmic Game Theory (SAGT ’14), volume 8768 of Lecture Notes in Computer Science, pp 146–157. Springer
  17. Elkind E, Faliszewski P, Slinko A (2012) Clone structures in voters’ preferences. In Proceedings of the 13th ACM Conference on Electronic Commerce (EC ’12), pp 496–513. ACM Press
  18. Elkind E, Lackner M, Peters D (2017) Structured preferences. In: Endriss U (ed) Trends in computational social choice. AI Access
  19. Escoffier B, Lang J, Öztürk M (2008) Single-peaked consistency and its complexity. In: Proceedings of the 18th European Conference on Artificial Intelligence (ECAI ’08), pp 366–370. IOS Press
  20. Gall FL (2014) Powers of tensors and fast matrix multiplication. In: Proceedings of the 39th International Symposium on Symbolic and Algebraic Computation (ISSAC ’14), pp 296–303. ACM
  21. Hotelling H. Stability in competition. Econ J. 1929;39(153):41–57. doi: 10.2307/2224214. [DOI] [Google Scholar]
  22. Knoblauch V. Recognizing one-dimensional Euclidean preference profiles. J Math Econ. 2010;46(1):1–5. doi: 10.1016/j.jmateco.2009.05.007. [DOI] [Google Scholar]
  23. Lackner M-L, Lackner M. On the likelihood of single-peaked preferences. Soc Choice Welfare. 2017;48(4):717–745. doi: 10.1007/s00355-017-1033-0. [DOI] [PMC free article] [PubMed] [Google Scholar]
  24. Lekkerkerker CG, Boland JC. Representation of finite graphs by a set of intervals on the real line. Fundamenta Mathematicae. 1962;51:45–64. doi: 10.4064/fm-51-1-45-64. [DOI] [Google Scholar]
  25. Mirrlees JA. An exploration in the theory of optimal income taxation. Rev Econ Stud. 1971;38:175–208. doi: 10.2307/2296779. [DOI] [Google Scholar]
  26. Peters D (2017) Recognising multidimensional euclidean preferences. In: Proceedings of the 31st AAAI Conference on Artificial Intelligence (AAAI ’17), pp 642–648
  27. Roberts KW. Voting over income tax schedules. J Public Econ. 1977;8(3):329–340. doi: 10.1016/0047-2727(77)90005-6. [DOI] [Google Scholar]
  28. Schönhage A, Strassen V. Schnelle multiplikation großer zahlen. Computing. 1971;7(3–4):281–292. doi: 10.1007/BF02242355. [DOI] [Google Scholar]
  29. Stokes DE. Spatial models of party competition. Am Polit Sci Rev. 1963;57:368–377. doi: 10.2307/1952828. [DOI] [Google Scholar]
  30. Tucker A. A structure theorem for the consecutive 1’s property. J Combin Theory Ser B. 1972;12:153–162. doi: 10.1016/0095-8956(72)90019-6. [DOI] [Google Scholar]
  31. van den Brand J (2020) A deterministic linear program solver in current matrix multiplication time. In: Proceedings of the 31st Annual ACM-SIAM Symposium on Discrete Algorithms (SODA ’20), pp 259–278

Articles from Social Choice and Welfare are provided here courtesy of Springer

RESOURCES