Skip to main content

Parameterization of Strategy-Proof Mechanisms in the Obnoxious Facility Game

  • Conference paper
WALCOM: Algorithms and Computation (WALCOM 2016)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9627))

Included in the following conference series:

  • 558 Accesses

Abstract

In the obnoxious facility game, a location for an undesirable facility is to be determined based on the voting of selfish agents. The design of group strategy proof mechanisms has been extensively studied, and it is known that there exists a gap between the social benefit (i.e., the sum of individual benefits) by a facility location determined by any group strategy proof mechanism and the maximum social benefit over all choices of facility locations; their ratio, called the benefit ratio can be 3 in the line metric space. In this paper, we investigate a trade-off between the benefit ratio and a possible relaxation of group strategy proofness, taking 2-candidate mechanisms for the obnoxious facility game in the line metric as an example. Given a real \(\lambda \ge 1\) as a parameter, we introduce a new strategy proofness, called “\(\lambda \)-group strategy-proofness,” so that each coalition of agents has no incentive to lie unless every agent in the group can increase her benefit by strictly more than \(\lambda \) times by doing so, where the 1-group strategy-proofness is the previously known group strategy-proofness. We next introduce “masking zone mechanisms,” a new notion on structure of mechanisms, and prove that every \(\lambda \)-group strategy-proof (\(\lambda \)-GSP) mechanism is a masking zone mechanism. We then show that, for any \(\lambda \ge 1\), there exists a \(\lambda \)-GSP mechanism whose benefit ratio is at most \(1+\frac{2}{\lambda }\), which converges to 1 as \(\lambda \) becomes infinitely large. Finally we prove that the bound is nearly tight: given \(n \ge 1\) selfish agents, the benefit ratio of \(\lambda \)-GSP mechanisms cannot be better than \(1+\frac{2}{\lambda }\) when n is even, and \(1 + \frac{2n-2}{\lambda n + 1}\) when n is odd.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alon, N., Feldman, M., Procaccia, A.D., Tennenholtz, M.: Strategyproof approximation mechanisms for location on networks. arXiv preprint (2009). arxiv:0907.2049

  2. Border, K.C., Jordan, J.S.: Straightforward elections, unanimity and phantom voters. The Rev. Econ. Stud. 50(1), 153–170 (1983)

    Article  MathSciNet  MATH  Google Scholar 

  3. Cheng, Y., Han, Q., Yu, W., Zhang, G.: Obnoxious facility game with a bounded service range. In: Chan, T.-H.H., Lau, L.C., Trevisan, L. (eds.) TAMC 2013. LNCS, vol. 7876, pp. 272–281. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  4. Cheng, Y., Yu, W., Zhang, G.: Mechanisms for obnoxious facility game on a path. In: Wang, W., Zhu, X., Du, D.-Z. (eds.) COCOA 2011. LNCS, vol. 6831, pp. 262–271. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  5. Ibara, K., Nagamochi, H.: Characterizing mechanisms in obnoxious facility game. In: Lin, G. (ed.) COCOA 2012. LNCS, vol. 7402, pp. 301–311. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  6. Ibara, K., Nagamochi, H.: Characterizing mechanisms in obnoxious facility game. Technical report 2015-006, Department of Applied Mathematics and Physics, Kyoto University (2015). http://www.amp.i.kyoto-u.ac.jp/tecrep/ps_file/2015/2015-005.pdf

  7. Lu, P., Sun, X., Wang, Y., Zhu, Z.A.: Asymptotically optimal strategy-proof mechanisms for two-facility games. In: Proceedings of the 11th ACM Conference on Electronic Commerce (ACM-EC 2010), pp. 315–324. ACM (2010)

    Google Scholar 

  8. Lu, P., Wang, Y., Zhou, Y.: Tighter bounds for facility games. In: Leonardi, S. (ed.) WINE 2009. LNCS, vol. 5929, pp. 137–148. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  9. Moulin, H.: On strategy-proofness and single peakedness. Public Choice 35(4), 437–455 (1980)

    Article  Google Scholar 

  10. Oomine, M., Shurbevski, A., Nagamochi, H.: Parameterization of strategy-proof mechanisms in the obnoxious facility game. Technical report 2015-006, Department of Applied Mathematics and Physics, Kyoto University (2015). http://www.amp.i.kyoto-u.ac.jp/tecrep/ps_file/2015/2015-006.pdf

  11. Procaccia, A.D., Tennenholtz, M.: Approximate mechanism design without money. In: Proceedings of the 10th ACM Conference on Electronic Commerce (ACM-EC 2009), pp. 177–186. ACM (2009)

    Google Scholar 

  12. Schummer, J., Vohra, R.V.: Strategy-proof location on a network. J. Econ. Theory 104(2), 405–428 (2002)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aleksandar Shurbevski .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Oomine, M., Shurbevski, A., Nagamochi, H. (2016). Parameterization of Strategy-Proof Mechanisms in the Obnoxious Facility Game. In: Kaykobad, M., Petreschi, R. (eds) WALCOM: Algorithms and Computation. WALCOM 2016. Lecture Notes in Computer Science(), vol 9627. Springer, Cham. https://doi.org/10.1007/978-3-319-30139-6_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-30139-6_23

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-30138-9

  • Online ISBN: 978-3-319-30139-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics