Rename and False-Name Manipulations in Discrete Facility Location with Optional Preferences

  • Tomohiro OnoEmail author
  • Taiki Todo
  • Makoto Yokoo
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10621)


We consider the problem of locating facilities on a discrete acyclic graph, where agents’ locations are publicly known and the agents are requested to report their demands, i.e., which facilities they want to access. In this paper, we study the effect of manipulations by agents that utilize vacant vertices. Such manipulations are called rename or false-name manipulations in game theory and mechanism design literature. For locating one facility on a path, we carefully compare our model with traditional ones and clarify their differences by pointing out that some existing results in the traditional model do not carry over to our model. For locating two facilities, we analyze the existing and new mechanisms from a perspective of approximation ratio and provide non-trivial lower bounds. Finally, we introduce a new mechanism design model where richer information is available to the mechanism designer and show that under the new model false-name-proofness does not always imply population monotonicity.



This work was partially supported by JSPS KAKENHI Grants Number 17H00761 and 17H04695.


  1. 1.
    Bu, N.: Unfolding the mystery of false-name-proofness. Econ. Lett. 120(3), 559–561 (2013)MathSciNetCrossRefzbMATHGoogle Scholar
  2. 2.
    Conitzer, V.: Anonymity-proof voting rules. In: Papadimitriou, C., Zhang, S. (eds.) WINE 2008. LNCS, vol. 5385, pp. 295–306. Springer, Heidelberg (2008). doi: 10.1007/978-3-540-92185-1_36 CrossRefGoogle Scholar
  3. 3.
    Dokow, E., Feldman, M., Meir, R., Nehama, I.: Mechanism design on discrete lines and cycles. In: ACM Conference on Electronic Commerce, EC 2012, Valencia, Spain, 4–8 June 2012, pp. 423–440 (2012)Google Scholar
  4. 4.
    Feldman, M., Fiat, A., Golomb, I.: On voting and facility location. In: Proceedings of the 2016 ACM Conference on Economics and Computation, EC 2016, Maastricht, The Netherlands, 24–28 July 2016, pp. 269–286 (2016)Google Scholar
  5. 5.
    Lesca, J., Todo, T., Yokoo, M.: Coexistence of utilitarian efficiency and false-name-proofness in social choice. In: International Conference on Autonomous Agents and Multi-agent Systems, AAMAS 2014, Paris, France, 5–9 May 2014, pp. 1201–1208 (2014)Google Scholar
  6. 6.
    Moulin, H.: On strategy-proofness and single peakedness. Public Choice 35(4), 437–455 (1980)CrossRefGoogle Scholar
  7. 7.
    Penna, P., Schoppmann, F., Silvestri, R., Widmayer, P.: Pseudonyms in cost-sharing games. In: Leonardi, S. (ed.) WINE 2009. LNCS, vol. 5929, pp. 256–267. Springer, Heidelberg (2009). doi: 10.1007/978-3-642-10841-9_24 CrossRefGoogle Scholar
  8. 8.
    Procaccia, A.D., Tennenholtz, M.: Approximate mechanism design without money. ACM Trans. Econ. Comput. 1(4), 18 (2013)CrossRefGoogle Scholar
  9. 9.
    Serafino, P., Ventre, C.: Heterogeneous facility location without money on the line. In: 21st European Conference on Artificial Intelligence, ECAI 2014, 18–22 August 2014, Prague, Czech Republic - Including Prestigious Applications of Intelligent Systems PAIS 2014, pp. 807–812 (2014)Google Scholar
  10. 10.
    Serafino, P., Ventre, C.: Truthful mechanisms without money for non-utilitarian heterogeneous facility location. In: Proceedings of the 29th AAAI Conference on Artificial Intelligence, 25–30 January 2015, Austin, Texas, USA, pp. 1029–1035 (2015)Google Scholar
  11. 11.
    Sonoda, A., Todo, T., Yokoo, M.: False-name-proof locations of two facilities: economic and algorithmic approaches. In: Proceedings of the 30th AAAI Conference on Artificial Intelligence, Phoenix, Arizona, USA, 12–17 February 2016, pp. 615–621 (2016)Google Scholar
  12. 12.
    Todo, T., Conitzer, V.: False-name-proof matching. In: International Conference on Autonomous Agents and Multi-Agent Systems, AAMAS 2013, Saint Paul, MN, USA, 6–10 May 2013, pp. 311–318 (2013)Google Scholar
  13. 13.
    Todo, T., Iwasaki, A., Yokoo, M.: False-name-proof mechanism design without money. In: 10th International Conference on Autonomous Agents and Multiagent Systems AAMAS 2011, Taipei, Taiwan, 2–6 May 2011, vol. 1–3, pp. 651–658 (2011)Google Scholar
  14. 14.
    Wagman, L., Conitzer, V.: False-name-proof voting with costs over two alternatives. Int. J. Game Theor. 43(3), 599–618 (2014)MathSciNetCrossRefzbMATHGoogle Scholar
  15. 15.
    Zou, S., Li, M.: Facility location games with dual preference. In: Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2015, Istanbul, Turkey, 4–8 May 2015, pp. 615–623 (2015)Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.Graduate School of Information Science and Electrical EngineeringKyushu UniversityFukuokaJapan

Personalised recommendations