Skip to main content

Strategy-Proof Mechanism for Obnoxious Facility Location on a Line

  • Conference paper
  • First Online:
Computing and Combinatorics (COCOON 2015)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9198))

Included in the following conference series:

Abstract

In the problem of obnoxious facility location, an obnoxious facility is located in an area. To maximize the social welfare, e.g., the sum of distances from all the agents to the facility, we have to get the true locations of each agent. However, each agent may misreport his/her location to stay far away from the obnoxious facility. In this paper, we design strategy-proof mechanisms on locating an obnoxious facility on a real line. Two objective functions, i.e., maximizing the sum of squares of distances (maxSOS) and maximizing the sum of distances (maxSum), have been considered. For maxSOS, a randomized strategy-proof mechanism with approximation ratio 5 / 3 is given, meanwhile the lower bound is proved to be at least 1.042. The lower bound of any randomized strategy-proof mechanisms w.r.t. maxSum is proved to be 1.077. Moreover, an extended model that each agent controls multiple locations is considered. For this model, we investigate deterministic and randomized strategy-proof mechanisms w.r.t. maxSum and maxSOS objectives, respectively. The deterministic mechanisms are shown to be tight for both objectives.

This work is supported by NSFC (No. 61433012, U1435215, 11171086) Natural Science Foundation of Hebei A2013201218, Shenzhen basic research project (JCYJ20120615140531560), HKU small project funding 201309176064.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cheng, Y., Yu, W., Zhang, G.: Strategy-proof approximation mechanisms for an obnoxious facility game on networks. Theoretical Computer Science 35(3), 513–526 (2011)

    Google Scholar 

  2. Feldman, M., Wilf, Y.: Strategyproof facility location and the least squares objective. In: Proceedings of the 14th ACM Conference on Electronic Commerce (EC 2013), pp. 873–890 (2013)

    Google Scholar 

  3. Ibara, K., Nagamochi, H.: Characterizing mechanisms in obnoxious facility game. In: Lin, G. (ed.) COCOA 2012. LNCS, vol. 7402, pp. 301–311. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  4. Han, Q., Du, D.: Moneyless strategy-proof mechanism on single-sinked policy domain: characterization and applications, Issue 2012, Part 8. Working paper series (University of New Brunswick, Faculty of Business Administration)

    Google Scholar 

  5. Procaccia, A.D., Tennenholtz, M.: Approximate mechanism design without money. In: Proceedings of the 10th ACM conference on Electronic Commerce (EC 2009), pp. 177–186 (2009)

    Google Scholar 

  6. Lu, P., Sun, X., Wang, Y., Zhu, Z.A.: Asymptotically optimal strategy-proof mechanisms for two-facility games. In: Proceedings of the 11th ACM conference on Electronic Eommerce (EC 2010), pp. 315–324 (2010)

    Google Scholar 

  7. Lu, P., Wang, Y., Zhou, Y.: Tighter bounds for facility games. In: Leonardi, S. (ed.) WINE 2009. LNCS, vol. 5929, pp. 137–148. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  8. Alon, N., Feldman, M., Procaccia, A.D., Tennenholtz, M.: Strategyproof approximation of the minimax on networks. Mathematics of Operations Research 35(5), 513–526 (2010)

    Article  MATH  MathSciNet  Google Scholar 

  9. Nissim, K., Smorodinsky, R., Tennenholtz, M.: Approximately optimal mechanism design via differential privacy. In: Proceedings of the 3rd Innovations in Theoretical Computer Science Conference (ITCS 2012), pp. 203–213 (2012)

    Google Scholar 

  10. Dokow, E., Feldman, M., Meir, R., Nehama, I.: Mechanism design on discrete lines and cycles. In: Proceedings of the 13th ACM Conference on Electronic Commerce (EC 2012), pp. 423–440 (2012)

    Google Scholar 

  11. Fotakis, D., Tzamos, C.: On the power of deterministic mechanisms for facility location games. In: Fomin, F.V., Freivalds, R., Kwiatkowska, M., Peleg, D. (eds.) ICALP 2013, Part I. LNCS, vol. 7965, pp. 449–460. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  12. Thang, N.K.: On (group) strategy-proof mechanisms without payment for facility location games. In: Saberi, A. (ed.) WINE 2010. LNCS, vol. 6484, pp. 531–538. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  13. Gibbard, A.: Manipulation of voting schemes: a general result. Econometrica: Journal of the Econometric Society, 587–601 (1973)

    Google Scholar 

  14. Moulin, H.: On strategy-proofness and single peakedness. Public Choice 35(4), 437–455 (1980)

    Article  Google Scholar 

  15. Schummer, J., Vohra, R.V.: Strategy-proof location on a network. Journal of Economic Theory 104(2), 405–428 (2002)

    Article  MATH  MathSciNet  Google Scholar 

  16. Schummer, J., Vohra, R.V.: Mechanism design without money. In: Algorithmic Game Theory, chap. 10, pp. 243–299, Cambridge (2007)

    Google Scholar 

  17. Berman, O., Drezner, Z.: A note on the location of an obnoxious facility on a network. European Journal of Operational Research 120(1), 215–217 (2000)

    Article  MATH  MathSciNet  Google Scholar 

  18. Erkut, E., Neuman, S.: Analytical models for locating undesirable facilities. European Journal of Operational Research 40(3), 275–291 (1989)

    Article  MATH  MathSciNet  Google Scholar 

  19. ReVelle, C., Eiselt, H.: Location analysis: A synthesis and survey. European Journal of Operational Research 165(1), 1–19 (2005)

    Article  MATH  MathSciNet  Google Scholar 

  20. Tamir, A.: Obnoxious facility location on graphs. SIAM Journal on Discrete Mathematics 4(4), 550–567 (1991)

    Article  MATH  MathSciNet  Google Scholar 

  21. Fotakis, D., Tzamos, C.: Strategyproof facility location for concave cost functions. In: Proceedings of the 14th ACM Conference on Electronic Commerce (EC 2013), pp. 435–452 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yong Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Ye, D., Mei, L., Zhang, Y. (2015). Strategy-Proof Mechanism for Obnoxious Facility Location on a Line. In: Xu, D., Du, D., Du, D. (eds) Computing and Combinatorics. COCOON 2015. Lecture Notes in Computer Science(), vol 9198. Springer, Cham. https://doi.org/10.1007/978-3-319-21398-9_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-21398-9_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-21397-2

  • Online ISBN: 978-3-319-21398-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics