False-name-proofness in facility location problem on the real line

Taiki Todo, Atsushi Iwasaki, Makoto Yokoo

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

Recently, mechanism design without monetary transfers is attracting much attention, since in many application domains on Internet, introducing monetary transfers is impossible or undesirable. Mechanism design studies how to design mechanisms that result in good outcomes even when agents strategically report their preferences. However, in highly anonymous settings such as the Internet, declaring preferences dishonestly is not the only way to manipulate the mechanism. Often, it is possible for an agent to pretend to be multiple agents, and submit multiple reports using different identifiers, e.g., different e-mail addresses. Such false-name manipulations are more likely to occur in a mechanism without monetary transfers, since submitting multiple reports would be less risky in such a mechanism. In this paper, we formalize false-name manipulations in facility location problems on the real line and discuss the effect of such manipulations.

Original languageEnglish
Title of host publicationInternet and Network Economics - 6th International Workshop, WINE 2010, Proceedings
Pages559-562
Number of pages4
DOIs
Publication statusPublished - Dec 1 2010
Event6th International Workshop on Internet and Network Economics, WINE 2010 - Stanford, CA, United States
Duration: Dec 13 2010Dec 17 2010

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6484 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other6th International Workshop on Internet and Network Economics, WINE 2010
CountryUnited States
CityStanford, CA
Period12/13/1012/17/10

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'False-name-proofness in facility location problem on the real line'. Together they form a unique fingerprint.

  • Cite this

    Todo, T., Iwasaki, A., & Yokoo, M. (2010). False-name-proofness in facility location problem on the real line. In Internet and Network Economics - 6th International Workshop, WINE 2010, Proceedings (pp. 559-562). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 6484 LNCS). https://doi.org/10.1007/978-3-642-17572-5_50