Skip to main content

Rename and False-Name Manipulations in Discrete Facility Location with Optional Preferences

  • Conference paper
  • First Online:
PRIMA 2017: Principles and Practice of Multi-Agent Systems (PRIMA 2017)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 10621))

Abstract

We consider the problem of locating facilities on a discrete acyclic graph, where agents’ locations are publicly known and the agents are requested to report their demands, i.e., which facilities they want to access. In this paper, we study the effect of manipulations by agents that utilize vacant vertices. Such manipulations are called rename or false-name manipulations in game theory and mechanism design literature. For locating one facility on a path, we carefully compare our model with traditional ones and clarify their differences by pointing out that some existing results in the traditional model do not carry over to our model. For locating two facilities, we analyze the existing and new mechanisms from a perspective of approximation ratio and provide non-trivial lower bounds. Finally, we introduce a new mechanism design model where richer information is available to the mechanism designer and show that under the new model false-name-proofness does not always imply population monotonicity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bu, N.: Unfolding the mystery of false-name-proofness. Econ. Lett. 120(3), 559–561 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  2. Conitzer, V.: Anonymity-proof voting rules. In: Papadimitriou, C., Zhang, S. (eds.) WINE 2008. LNCS, vol. 5385, pp. 295–306. Springer, Heidelberg (2008). doi:10.1007/978-3-540-92185-1_36

    Chapter  Google Scholar 

  3. Dokow, E., Feldman, M., Meir, R., Nehama, I.: Mechanism design on discrete lines and cycles. In: ACM Conference on Electronic Commerce, EC 2012, Valencia, Spain, 4–8 June 2012, pp. 423–440 (2012)

    Google Scholar 

  4. Feldman, M., Fiat, A., Golomb, I.: On voting and facility location. In: Proceedings of the 2016 ACM Conference on Economics and Computation, EC 2016, Maastricht, The Netherlands, 24–28 July 2016, pp. 269–286 (2016)

    Google Scholar 

  5. Lesca, J., Todo, T., Yokoo, M.: Coexistence of utilitarian efficiency and false-name-proofness in social choice. In: International Conference on Autonomous Agents and Multi-agent Systems, AAMAS 2014, Paris, France, 5–9 May 2014, pp. 1201–1208 (2014)

    Google Scholar 

  6. Moulin, H.: On strategy-proofness and single peakedness. Public Choice 35(4), 437–455 (1980)

    Article  Google Scholar 

  7. Penna, P., Schoppmann, F., Silvestri, R., Widmayer, P.: Pseudonyms in cost-sharing games. In: Leonardi, S. (ed.) WINE 2009. LNCS, vol. 5929, pp. 256–267. Springer, Heidelberg (2009). doi:10.1007/978-3-642-10841-9_24

    Chapter  Google Scholar 

  8. Procaccia, A.D., Tennenholtz, M.: Approximate mechanism design without money. ACM Trans. Econ. Comput. 1(4), 18 (2013)

    Article  Google Scholar 

  9. Serafino, P., Ventre, C.: Heterogeneous facility location without money on the line. In: 21st European Conference on Artificial Intelligence, ECAI 2014, 18–22 August 2014, Prague, Czech Republic - Including Prestigious Applications of Intelligent Systems PAIS 2014, pp. 807–812 (2014)

    Google Scholar 

  10. Serafino, P., Ventre, C.: Truthful mechanisms without money for non-utilitarian heterogeneous facility location. In: Proceedings of the 29th AAAI Conference on Artificial Intelligence, 25–30 January 2015, Austin, Texas, USA, pp. 1029–1035 (2015)

    Google Scholar 

  11. Sonoda, A., Todo, T., Yokoo, M.: False-name-proof locations of two facilities: economic and algorithmic approaches. In: Proceedings of the 30th AAAI Conference on Artificial Intelligence, Phoenix, Arizona, USA, 12–17 February 2016, pp. 615–621 (2016)

    Google Scholar 

  12. Todo, T., Conitzer, V.: False-name-proof matching. In: International Conference on Autonomous Agents and Multi-Agent Systems, AAMAS 2013, Saint Paul, MN, USA, 6–10 May 2013, pp. 311–318 (2013)

    Google Scholar 

  13. Todo, T., Iwasaki, A., Yokoo, M.: False-name-proof mechanism design without money. In: 10th International Conference on Autonomous Agents and Multiagent Systems AAMAS 2011, Taipei, Taiwan, 2–6 May 2011, vol. 1–3, pp. 651–658 (2011)

    Google Scholar 

  14. Wagman, L., Conitzer, V.: False-name-proof voting with costs over two alternatives. Int. J. Game Theor. 43(3), 599–618 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  15. Zou, S., Li, M.: Facility location games with dual preference. In: Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2015, Istanbul, Turkey, 4–8 May 2015, pp. 615–623 (2015)

    Google Scholar 

Download references

Acknowledgement

This work was partially supported by JSPS KAKENHI Grants Number 17H00761 and 17H04695.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tomohiro Ono .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Ono, T., Todo, T., Yokoo, M. (2017). Rename and False-Name Manipulations in Discrete Facility Location with Optional Preferences. In: An, B., Bazzan, A., Leite, J., Villata, S., van der Torre, L. (eds) PRIMA 2017: Principles and Practice of Multi-Agent Systems. PRIMA 2017. Lecture Notes in Computer Science(), vol 10621. Springer, Cham. https://doi.org/10.1007/978-3-319-69131-2_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-69131-2_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-69130-5

  • Online ISBN: 978-3-319-69131-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics