IDEAS home Printed from https://ideas.repec.org/a/spr/jcomop/v36y2018i2d10.1007_s10878-016-0105-x.html
   My bibliography  Save this article

Approximation strategy-proof mechanisms for obnoxious facility location on a line

Author

Listed:
  • Lili Mei

    (Zhejiang University)

  • Deshi Ye

    (Zhejiang University)

  • Yong Zhang

    (Chinese Academy of Sciences
    The University of Hong Kong)

Abstract

In the facility location game on a line, there are some agents who have fixed locations on the line where an obnoxious facility will be placed. The objective is to maximize the social welfare, e.g., the sum of distances from the facility to all agents. On collecting location information, agents may misreport the locations so as to stay far away from the obnoxious facility. In this paper, strategy-proof mechanisms are designed and the approximation ratio is used to measure the performances of the strategy-proof mechanisms. Two objective functions, maximizing the sum of squares of distances (maxSOS) and maximizing the sum of distances (maxSum), have been considered. For maxSOS, a randomized 5/3-approximated strategy-proof mechanism is proposed, and the lower bound of the approximation ratio is proved to be at least 1.042. For maxSum, the lower bound of the approximation ratio of the randomized strategy-proof mechanism is proved to be 1.077. Moreover, a general model is considered that each agent may have multiple locations on the line. For the objective functions maxSum and maxSOS, both deterministic and randomized strategy-proof mechanisms are investigated, and the deterministic mechanisms are shown to be best possible.

Suggested Citation

  • Lili Mei & Deshi Ye & Yong Zhang, 2018. "Approximation strategy-proof mechanisms for obnoxious facility location on a line," Journal of Combinatorial Optimization, Springer, vol. 36(2), pages 549-571, August.
  • Handle: RePEc:spr:jcomop:v:36:y:2018:i:2:d:10.1007_s10878-016-0105-x
    DOI: 10.1007/s10878-016-0105-x
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s10878-016-0105-x
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s10878-016-0105-x?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Erkut, Erhan & Neuman, Susan, 1989. "Analytical models for locating undesirable facilities," European Journal of Operational Research, Elsevier, vol. 40(3), pages 275-291, June.
    2. H. Moulin, 1980. "On strategy-proofness and single peakedness," Public Choice, Springer, vol. 35(4), pages 437-455, January.
    3. Berman, Oded & Drezner, Zvi, 2000. "A note on the location of an obnoxious facility on a network," European Journal of Operational Research, Elsevier, vol. 120(1), pages 215-217, January.
    4. ReVelle, C. S. & Eiselt, H. A., 2005. "Location analysis: A synthesis and survey," European Journal of Operational Research, Elsevier, vol. 165(1), pages 1-19, August.
    5. Noga Alon & Michal Feldman & Ariel D. Procaccia & Moshe Tennenholtz, 2010. "Strategyproof Approximation of the Minimax on Networks," Mathematics of Operations Research, INFORMS, vol. 35(3), pages 513-526, August.
    6. Schummer, James & Vohra, Rakesh V., 2002. "Strategy-proof Location on a Network," Journal of Economic Theory, Elsevier, vol. 104(2), pages 405-428, June.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Deligkas, Argyrios & Filos-Ratsikas, Aris & Voudouris, Alexandros A., 2023. "Heterogeneous facility location with limited resources," Games and Economic Behavior, Elsevier, vol. 139(C), pages 200-215.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Takashi Kurihara & Koichi Suga, 2020. "Decision–making on public facility location by using social choice rules with a deliberative suggestion," Working Papers 1924, Waseda University, Faculty of Political Science and Economics.
    2. Itai Feigenbaum & Jay Sethuraman & Chun Ye, 2017. "Approximately Optimal Mechanisms for Strategyproof Facility Location: Minimizing L p Norm of Costs," Mathematics of Operations Research, INFORMS, vol. 42(2), pages 434-447, May.
    3. Michel Breton & Vera Zaporozhets, 2009. "On the equivalence of coalitional and individual strategy-proofness properties," Social Choice and Welfare, Springer;The Society for Social Choice and Welfare, vol. 33(2), pages 287-309, August.
    4. Sidartha Gordon, 2015. "Unanimity in attribute-based preference domains," Social Choice and Welfare, Springer;The Society for Social Choice and Welfare, vol. 44(1), pages 13-29, January.
    5. Barberà, Salvador & Berga, Dolors & Moreno, Bernardo, 2010. "Individual versus group strategy-proofness: When do they coincide?," Journal of Economic Theory, Elsevier, vol. 145(5), pages 1648-1674, September.
    6. Chatterji, Shurojit & Zeng, Huaxia, 2023. "A taxonomy of non-dictatorial unidimensional domains," Games and Economic Behavior, Elsevier, vol. 137(C), pages 228-269.
    7. Bossert, Walter & Sprumont, Yves, 2014. "Strategy-proof preference aggregation: Possibilities and characterizations," Games and Economic Behavior, Elsevier, vol. 85(C), pages 109-126.
    8. Alcalde-Unzu, Jorge & Vorsatz, Marc, 2018. "Strategy-proof location of public facilities," Games and Economic Behavior, Elsevier, vol. 112(C), pages 21-48.
    9. Chatterji, Shurojit & Sanver, Remzi & Sen, Arunava, 2013. "On domains that admit well-behaved strategy-proof social choice functions," Journal of Economic Theory, Elsevier, vol. 148(3), pages 1050-1073.
    10. Sidartha Gordon, 2014. "Unanimity in Attribute-Based Preference Domains," SciencePo Working papers Main hal-01061994, HAL.
    11. Stergios Athanasoglou & Somouaoga Bonkoungou & Lars Ehlers, 2023. "Strategy-proof preference aggregation and the anonymity-neutrality tradeoff," Working Papers 519, University of Milano-Bicocca, Department of Economics.
    12. Ozgur Turetken, 2008. "Is your back-up IT infrastructure in a safe location?," Information Systems Frontiers, Springer, vol. 10(3), pages 375-383, July.
    13. Chatterji, Shurojit & Sen, Arunava & Zeng, Huaxia, 2016. "A characterization of single-peaked preferences via random social choice functions," Theoretical Economics, Econometric Society, vol. 11(2), May.
    14. Ehlers, Lars, 2001. "Independence axioms for the provision of multiple public goods as options," Mathematical Social Sciences, Elsevier, vol. 41(2), pages 239-250, March.
    15. Jordi Massó & Shurojit Chatterji, 2015. "On Strategy-proofness and the Salience of Single-peakedness," UFAE and IAE Working Papers 952.15, Unitat de Fonaments de l'Anàlisi Econòmica (UAB) and Institut d'Anàlisi Econòmica (CSIC).
    16. , & , & ,, 2007. "Secure implementation," Theoretical Economics, Econometric Society, vol. 2(3), September.
    17. Sumit Goel & Wade Hann-Caruthers, 2023. "Optimality of the coordinate-wise median mechanism for strategyproof facility location in two dimensions," Social Choice and Welfare, Springer;The Society for Social Choice and Welfare, vol. 61(1), pages 11-34, July.
    18. Buechel, Berno & Roehl, Nils, 2015. "Robust equilibria in location games," European Journal of Operational Research, Elsevier, vol. 240(2), pages 505-517.
    19. Sidartha Gordon, 2014. "Unanimity in Attribute-Based Preference Domains," SciencePo Working papers hal-01061994, HAL.
    20. Bettina Klaus, 2001. "Target Rules for Public Choice Economies on Tree Networks and in Euclidean Spaces," Theory and Decision, Springer, vol. 51(1), pages 13-29, August.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:jcomop:v:36:y:2018:i:2:d:10.1007_s10878-016-0105-x. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.