Characterizing Mechanisms in Obnoxious Facility Game

  • Ken Ibara
  • Hiroshi Nagamochi
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7402)


In this paper, we study the (group) strategy-proofness of deterministic mechanisms in the obnoxious facility game. In this game, given a set of strategic agents in a metric, we design a mechanism that outputs the location of a facility in the metric based on the locations of the agents reported by themselves. The benefit of an agent is the distance between her location and the facility and the social benefit is the total benefits of all agents. An agent may try to manipulate outputs by the mechanism by misreporting strategically her location. We wish to design a mechanism that is strategy-proof (i.e., no agent can gain her benefit by misreporting) or group strategy-proof (i.e., there is no coalition of agents such that each member in the coalition can simultaneously gain benefit by misreporting), while the social benefit will be maximized. In this paper, we first prove that, in the line metric, there is no strategy-proof mechanism such that the number of candidates (locations output by the mechanism for some reported locations) is more than two. We next completely characterize (group) strategy-proof mechanisms with exactly two candidates in the general metric and show that there exists a 4-approximation group strategy-proof mechanism in any metric.


Social Choice Approximation Ratio Location Output Tree Network Deterministic Mechanism 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Alon, N., Feldman, M., Procaccia, A.D., Tennenholtz, M.: Strategyproof approximation mechanisms for location on networks. CoRR, abs/0907.2049 (2009)Google Scholar
  2. 2.
    Black, D.: On the rationale of group decision-making. Journal of Political Economy 56, 23–34 (1948)CrossRefGoogle Scholar
  3. 3.
    Border, K.C., Jordan, J.S.: Straightforward elections, unanimity and phantom voters. The Review of Economic Studies 50(1), 153–170 (1983)MathSciNetzbMATHCrossRefGoogle Scholar
  4. 4.
    Cheng, Y., Yu, W., Zhang, G.: Mechanisms for Obnoxious Facility Game on a Path. In: Wang, W., Zhu, X., Du, D.-Z. (eds.) COCOA 2011. LNCS, vol. 6831, pp. 262–271. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  5. 5.
    Church, R.L., Garfinkel, R.S.: Locating an obnoxious facility on a network. Transportation Science 12(2), 107–118 (1978)MathSciNetCrossRefGoogle Scholar
  6. 6.
    Jain, K., Mahdian, M.: Cost sharing. In: Nisan, N., Roughgarden, T., Tardos, E., Vazirani, V. (eds.) Algorithmic Game Theory, ch. 15. Cambridge University Press (2007)Google Scholar
  7. 7.
    Lu, P., Wang, Y., Zhou, Y.: Tighter Bounds for Facility Games. In: Leonardi, S. (ed.) WINE 2009. LNCS, vol. 5929, pp. 137–148. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  8. 8.
    Lu, P., Sun, X., Wang, Y., Zhu, Z.A.: Asymptotically optimal strategy-proof mechanisms for two-facility games. In: Proceedings of the 11th ACM Conference on Electronic Commerce, ACM-EC (June 2010)Google Scholar
  9. 9.
    Moulin, H.: On strategy proofness and single peakedness. Public Choice 35, 437–455 (1980)CrossRefGoogle Scholar
  10. 10.
    Procaccia, A.D., Tennenholtz, M.: Approximate mechanism design without money. In: Proceedings of the 10th ACM Conference on Electronic Commerce, ACM-EC (July 2009)Google Scholar
  11. 11.
    Schummer, J., Vohra, R.V.: Strategy-proof location on a network. Journal of Economic Theory 104(2), 405–428 (2004)MathSciNetCrossRefGoogle Scholar
  12. 12.
    Schummer, J., Vohra, R.V.: Mechanism design without money. In: Nisan, N., Roughgarden, T., Tardos, E., Vazirani, V. (eds.) Algorithmic Game Theory, ch. 10. Cambridge University Press (2007)Google Scholar
  13. 13.
    Zelinka, B.: Medians and peripherians of trees. Archivum Mathematicum 4, 87–95 (1968)MathSciNetzbMATHGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Ken Ibara
    • 1
  • Hiroshi Nagamochi
    • 1
  1. 1.Graduate School of InformaticsKyoto UniversityJapan

Personalised recommendations