<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>The Obnoxious Facility Location Game with Dichotomous Preferences?</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Fu Li</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>C. Gregory Plaxton</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vaibhav B. Sinha</string-name>
          <email>vaibhavsinhag@utexas.edu</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Texas at Austin</institution>
          ,
          <country country="US">USA</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>We consider a facility location game in which n agents reside at known locations on a path, and k heterogeneous facilities are to be constructed on the path. Each agent is adversely a ected by some subset of the facilities, and is una ected by the others. We design two classes of mechanisms for choosing the facility locations given the reported agent preferences: utilitarian mechanisms that strive to maximize social welfare (i.e., to be e cient), and egalitarian mechanisms that strive to maximize the minimum welfare. For the utilitarian objective, we present a weakly group-strategyproof e cient mechanism for up to three facilities, we give a strongly group-strategyproof mechanism that guarantees at least half of the optimal social welfare for arbitrary k, and we prove that no strongly group-strategyproof mechanism achieves an approximation ratio of 5=4 for one facility. For the egalitarian objective, we present a strategyproof egalitarian mechanism for arbitrary k, and we prove that no weakly group-strategyproof mechanism achieves a o(pn) approximation ratio for two facilities. We extend our egalitarian results to the case where the agents are located on a cycle, and we extend our rst egalitarian result to the case where the agents are located in the unit square.</p>
      </abstract>
      <kwd-group>
        <kwd>Mechanism Design</kwd>
        <kwd>Facility Location</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        The facility location game (FLG) was introduced by Procaccia and Tannenholtz
[
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. In this setting, a central planner wants to build a facility that serves agents
located on a path. The agents report their locations, which are fed to a
mechanism that decides where the facility should be built. Procaccia and Tannenholtz
studied two di erent objectives that the planner seeks to minimize: the sum of
the distances from the facility to all agents and the maximum distance of any
agent to the facility.
      </p>
      <p>Every agent aims to maximize their welfare, which increases as their distance
to the facility decreases. An agent or a coalition of agents can misreport their
location(s) to try to increase their welfare. It is natural to seek strategyproof (SP)
or group-strategyproof (GSP) mechanisms, which incentivize truthful reporting.
? Copyright © 2021 for this paper by its authors. Use permitted under Creative</p>
      <p>Commons License Attribution 4.0 International (CC BY 4.0).</p>
      <p>Often such mechanisms cannot simultaneously optimize the planner's objective.
In these cases, it is desirable to approximately optimize the planner's objective.</p>
      <p>
        In real scenarios, an agent might dislike a certain facility, such as a power
plant, and want to stay away from it. This variant, called the obnoxious facility
location game (OFLG), was introduced by Cheng et al., who studied the problem
of building an obnoxious facility on a path [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. In the present paper, we consider
the problem of building multiple obnoxious facilities on a path. With multiple
facilities, there are di erent ways to de ne the welfare function. For example, in
the case of two facilities, the welfare of the agent can be the sum, minimum, or
maximum of the distances to the two facilities. In our work, as all the facilities are
obnoxious, a natural choice for welfare is the minimum distance to any obnoxious
facility: the closest facility to an agent causes them the most annoyance, and if
it is far away, then the agent is satis ed.
      </p>
      <p>A facility might not be universally obnoxious. Consider, for example, a school
or sports stadium. An agent with no children might consider a school to be
obnoxious due to the associated noise and tra c, while an agent with children
might not consider it to be obnoxious. Another agent who is not interested in
sports might similarly consider a stadium to be obnoxious. We assume that each
agent has dichotomous preferences; they dislike some subset of the facilities and
are indi erent to the others. Each agent reports a subset of facilities to the
planner. As the dislikes are private information, the reported subset might not
be the subset of facilities that the agent truly dislikes. On the other hand, we
assume that the agent locations are public and cannot be misreported.</p>
      <p>In this paper, we study a variant of FLG, which we call DOFLG (Dichotomous
Obnoxious Facility Location Game), that combines the three aspects mentioned
above: multiple (heterogeneous) obnoxious facilities, minimum distance as
welfare, and dichotomous preferences. We seek to design mechanisms that perform
well with respect to either a utilitarian or egalitarian objective. The utilitarian
objective is to maximize the social welfare, that is, the total welfare of all the
agents. A mechanism that maximizes social welfare is said to be e cient. The
egalitarian objective is to maximize the minimum welfare of any agent. For both
objectives, we seek mechanisms that are SP, or better yet, weakly or strongly
group-strategyproof (WGSP / SGSP).
1.1</p>
    </sec>
    <sec id="sec-2">
      <title>Our contributions</title>
      <p>We study DOFLG with n agents. In Section 3, we consider the utilitarian
objective. We present 2-approximate SGSP mechanisms for any number of facilities
when the agents are located on a path, cycle, or square. We obtain the following
two additional results for the path setting. In the rst main result of the paper,
we obtain a mechanism that is WGSP for any number of facilities and e cient
for up to three facilities. To show that this mechanism is WGSP, we relate it to
a weighted approval voting mechanism. To prove its e ciency, we identify two
crucial properties that the welfare function satis es, and we use an exchange
argument. For the path setting, we also show that no SGSP mechanism can
achieve an approximation ratio better than 5=4, even for one facility.</p>
      <p>
        In Section 4, we consider the egalitarian objective. We provide SP
mechanisms for any number of facilities when the agents are located on a path, cycle, or
square. In the second main result of the paper, we prove that the approximation
ratio achieved by any WGSP mechanism is (pn), even for two facilities. Also,
we present a straightforward O(n)-approximate WGSP mechanism. Both of the
results for WGSP mechanisms hold for DOFLG when the agents are located on
a path or cycle. Table 1 summarizes our results.
FLG was introduced by Procaccia and Tannenholtz [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. Many generalizations
and extensions of FLG have been studied [1, 8, 11{14, 19, 27]; here we highlight
some of the most relevant work. Cheng et al. introduced OFLG and presented a
WGSP mechanism to build a single facility on a path [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Later they extended
the model to cycles and trees [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. A complete characterization of single-facility
SP/WGSP mechanisms for paths has been developed [
        <xref ref-type="bibr" rid="ref16 ref17">16, 17</xref>
        ]. Duan et al. studied
the problem of locating two obnoxious facilities at least distance d apart [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
Other variants of OFLG have been considered [
        <xref ref-type="bibr" rid="ref15 ref20 ref25 ref5">5, 15, 20, 25</xref>
        ].
      </p>
      <p>
        Agent preferences over the facilities were introduced to FLG in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] and [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ].
Sera no and Ventre studied FLG for building two facilities where each agent likes
a subset of the facilities [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]. Anastasiadis and Deligkas extended this model to
allow the agents to like, dislike, or be indi erent to the facilities [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. The
aforementioned works address linear (sum) welfare function. Yuan et al. studied
nonlinear welfare functions (max and min) for building two non-obnoxious facilities
[
        <xref ref-type="bibr" rid="ref26">26</xref>
        ]; their results have subsequently been strengthened [
        <xref ref-type="bibr" rid="ref18 ref4">4, 18</xref>
        ]. In the present
paper, we initiate the study of a non-linear welfare function (min) for building
multiple obnoxious facilities.
2
      </p>
      <sec id="sec-2-1">
        <title>Preliminaries</title>
        <p>The problems considered in this paper involve a set of agents located on a path,
cycle, or square. In the path (resp., cycle, square) setting, we assume without loss
of generality that the path (resp., cycle, square) is the unit interval (resp.,
unitcircumference circle, unit square). We map the points on the unit-circumference
circle to [0; 1), in the natural manner. Thus, in the path (resp., cycle, square)
setting, each agent i is located in [0; 1] (resp., [0; 1), [0; 1]2). The distance between
any two points x and y is denoted d(x; y). In the path and square settings, d(x; y)
is de ned as the Euclidean distance between x and y. In the cycle setting, d(x; y),
is de ned as the length of the shorter arc between x and y. In all settings, we
index the agents from 1. Each agent has a speci c location in the path, cycle, or
square. A location pro le x is a vector (x1; : : : ; xn) of points, where n denotes
the number of agents and xi is the location of agent i. Sections 3 and 4.1 present
our results for the path setting. Section 4.2 presents our results for the square
setting. Results for the cycle setting and some other results are presented in our
full paper.</p>
        <p>Consider a set of agents 1 through n and a set of facilities F , where we assume
that each agent dislikes (equally) certain facilities in F and is indi erent to the
rest. In this context, we de ne an aversion pro le a as a vector (a1; : : : ; an)
where each component ai is a subset of F . We say that such an aversion pro le
is true if each component ai is equal to the subset of F disliked by agent i. In
this paper, we also consider reported aversion pro les where each component ai
is equal to the set of facilities that agent i claims to dislike. Since agents can
lie, a reported aversion pro le need not be true. For any aversion pro le a and
any subset C of agents [n], aC (resp., a C ) denotes the aversion pro le for the
agents in (resp., not in) C. For a singleton set of agents fig, we abbreviate a fig
as a i.</p>
        <p>An instance of the dichotomous obnoxious facility location (DOFL) problem
is given by a tuple (n; k; x; a) where n denotes the number of agents, there is a set
of k facilities F = fF1; : : : ; Fkg to be built, x = (x1; : : : ; xn) is a location pro le
for the agents, and a = (a1; : : : ; an) is an aversion pro le (true or reported) for
the agents with respect to F . A solution to such a DOFL instance is a vector
y = (y1; : : : ; yk) where component yj speci es the point at which to build Fj . We
say that a DOFL instance is true (resp., reported) if the associated aversion pro le
is true (resp., reported). For any DOFL instance I = (n; k; x; a) and any j in [k],
we de ne haters(I; j) as fi 2 [n] j Fj 2 aig, and indi (I) as fi 2 [n] j ai = ;g.</p>
        <p>For any DOFL instance I = (n; k; x; a) and any associated solution y, we
de ne the welfare of agent i, denoted w(I; i; y), as minj:Fj2ai d(xi; yj ), i.e., the
minimum distance from xi to any facility in ai. Remark: If ai is empty, we de ne
w(I; i; y) as 1=2 in the cycle setting, max(d(xi; 0); d(xi; 1)) in the path setting,
and the maximum distance from xi to a corner in the square setting.</p>
        <p>The foregoing de nition of agent welfare is suitable for true DOFL instances,
and is only meaningful for reported DOFL instances where the associated
aversion pro le is close to true. In this paper, reported aversion pro les arise in
the context of mechanisms that incentivize truthful reporting, so it is
reasonable to expect such aversion pro les to be close to true. We de ne the social
welfare (resp., minimum welfare) as the sum (resp., minimum) of the
individual agent welfares. When the facilities are built at y, the social welfare and
minimum welfare are denoted by SW(I; y) and MW(I; y), respectively. Thus
SW(I; y) = Pi2[n] w(I; i; y) and MW(I; y) = mini2[n] w(I; i; y).</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>De nition 2.1. For</title>
      <p>instance I,</p>
      <sec id="sec-3-1">
        <title>1, a DOFL algorithm A is -e cient if for any DOFL</title>
      </sec>
      <sec id="sec-3-2">
        <title>Similarly, A is -egalitarian if for any DOFL instance I,</title>
        <p>max SW(I; y)
y</p>
        <p>SW(I; A(I)):
max MW(I; y)
y</p>
        <p>MW(I; A(I)):
A 1-e cient (resp., 1-egalitarian) DOFL algorithm, is said to be e cient (resp.,
egalitarian).</p>
        <p>We are now ready to de ne a DOFL-related game, which we call DOFLG. It
is convenient to describe a DOFLG instance in terms of a pair (I; I0) of DOFL
instances where I = (n; k; x; a) is true and I0 = (n; k; x; a0) is reported. There
are n agents indexed from 1 to n, and a planner. There is a set of k facilities
F = fF1; : : : ; Fkg to be built. The numbers n and k are publicly known, as
is the location pro le x of the agents. Each component ai of the true aversion
pro le a is known only to agent i. Each agent i submits component a0i of the
reported aversion pro le a0 to the planner. The planner, who does not have
access to a, runs a DOFL algorithm, call it A, to map I0 to a solution. The
inputoutput behavior of A de nes a DOFLG mechanism, call it M ; in the special case
where k = 1, we say that M is a single-facility DOFLG mechanism. We would
like to choose A so that M enjoys strong game-theoretic properties. We say
that M is -e cient (resp., -egalitarian, e cient, egalitarian) if A is -e cient
(resp., -egalitarian, e cient, egalitarian). As indicated earlier, such properties
(which depend on the notion of agent welfare) are only meaningful if the reported
aversion pro le is close to true. To encourage truthful reporting, we require our
mechanisms to be SP, as de ned below; we also consider the stronger properties
WGSP and SGSP.</p>
        <p>The SP property says that no agent can increase their welfare by lying about
their dislikes.</p>
      </sec>
      <sec id="sec-3-3">
        <title>De nition 2.2. A DOFLG mechanism M is SP if for any DOFLG instance</title>
        <p>(I; I0) with I = (n; k; x; a), and I0 = (n; k; x; a0), and any agent i in [n] such
that a0 = (a i; a0i), we have
w(I; i; M (I))</p>
        <p>w(I; i; M (I0)):</p>
        <p>The WGSP property says that if a non-empty coalition C
lies, then at least one agent in C does not increase their welfare.
[n] of agents</p>
      </sec>
      <sec id="sec-3-4">
        <title>De nition 2.3. A DOFLG mechanism M is WGSP if for any DOFLG instance</title>
        <p>(I; I0) with I = (n; k; x; a), and I0 = (n; k; x; a0), and any non-empty coalition
C [n] such that a0 = (a C ; a0C ), there exists an agent i in C such that
w(I; i; M (I))
w(I; i; M (I0)):</p>
        <p>The SGSP property says that if a coalition C [n] of agents lies and some
agent in C increases their welfare then some agent in C decreases their welfare.</p>
      </sec>
      <sec id="sec-3-5">
        <title>De nition 2.4. A DOFLG mechanism M is SGSP if for any DOFLG instance</title>
        <p>(I; I0) with I = (n; k; x; a), and I0 = (n; k; x; a0), and any coalition C [n] such
that a0 = (a C ; a0C ), if there exists an agent i in C such that
then there exists an agent i0 in C such that
w(I; i; M (I)) &lt; w(I; i; M (I0));
w(I; i0; M (I)) &gt; w(I; i0; M (I0)):</p>
        <p>Every SGSP mechanism is WGSP and every WGSP mechanism is SP.
3</p>
        <p>E</p>
        <p>
          cient Mechanisms
Before studying e cient mechanisms for our problem, we review a variant of
the approval voting mechanism [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ]. An instance of Dichotomous Voting (DV)
is a tuple (m; n; C; w+; w ) where m voters 1; : : : ; m have to elect a candidate
among the set of candidates C = fc1; : : : ; cng. Each voter i has dichotomous
preferences, that is, voter i partitions all of the candidates into two equivalence
classes: a top (most preferred) tier Ci and a bottom tier Ci = C nCi. Each voter i
has associated (and publicly known) weights wi+ wi 0. The symbols C, w+,
and w denote length-m vectors with ith element Ci, wi+, and wi , respectively.
We now present our weighted approval voting mechanism.1
Mechanism 1 Given a DV instance (m; n; C; w+; w ), every voter i votes by
partitioning C into Ci0 and C0. Let the weight function w be such that for voter
i and candidate cj , w(i; j) = iwi+ if cj is in Ci0 and w(i; j) = wi otherwise. For
any j in [n], we de ne A(j) = Pi2[m] w(i; j) as the approval of candidate cj . The
candidate cj with highest approval A(j) is declared the winner. Ties are broken
according to a xed ordering of the candidates (e.g., in favor of lower indices).
        </p>
        <p>Like approval voting, weighted approval voting is WGSP.</p>
      </sec>
      <sec id="sec-3-6">
        <title>Theorem 3.1. Mechanism 1 is WGSP.</title>
        <p>We now present our e cient mechanism for DOFLG.</p>
        <p>Mechanism 2 For a given reported DOFL instance I = (n; k; x; a), output the
lexicographically least solution y in f0; 1gk that maximizes the social welfare
SW(I; y).</p>
      </sec>
      <sec id="sec-3-7">
        <title>Theorem 3.2. Mechanism 2 is WGSP.</title>
        <p>
          1 Our mechanism di ers from the homonymous mechanism of Masso et al., which has
weights for the candidates instead of the voters [
          <xref ref-type="bibr" rid="ref24">24</xref>
          ].
Proof. To establish this theorem, we show that Mechanism 2 can be equivalently
expressed in terms of the approval voting mechanism. Hence Theorem 3.1 implies
the theorem.
        </p>
        <p>Let (I; I0) denote a DOFLG instance where I = (n; k; x; a) and I0 = (n; k; x; a0).
We view each agent i 2 [n] as a voter, and each y in f0; 1gk as a candidate. We
obtain the top-tier candidates Ci of voter i, and their reported top-tier
candidates Ci0, from ai and a0i, respectively. Assume without loss of generality that
xi 1=2 (the other case can be handled similarly). Set Ci = fy = (y1; : : : ; yk) 2
f0; 1gk j yj = 1 for all Fj 2 aig and similarly Ci0 = fy = (y1; : : : ; yk) 2 f0; 1gk j
yj = 1 for all Fj 2 a0ig. Also set wi+ = 1 xi and wi = xi. With this notation, it
is easy to see that A(y) = SW(I0; y), and that choosing the y with the highest
social welfare in Mechanism 2 is the same as electing the candidate with the
highest approval in Mechanism 1. tu</p>
        <p>We show that Mechanism 2 is e cient for k = 3. First, we note a well-known
result about the 1-Maxian problem. In this problem, there are n points located
at z1; : : : ; zn in the interval [a; b], and the task is to choose a point in [a; b] such
that the sum of the distances from that point to all zis is maximized.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Lemma 3.1 (Optimality of the 1-Maxian Problem). Let [a; b] be a real</title>
      <p>interval, let z1; : : : ; zn belong to [a; b], and let f (z) denote Pi2[n] jz zij. Then
maxz2[a;b] f (z) belongs to ff (a); f (b)g.</p>
      <p>Before proving the main theorem, we establish Lemma 3.2, which follows
from Lemma 3.1.</p>
      <sec id="sec-4-1">
        <title>Lemma 3.2. Let (n; k; x; a) be a DOFL instance, let Y denote the set of all y</title>
        <p>in [0; 1] such that it is e cient to build all k facilities at y, and assume that Y
is non-empty. Then Y \ f0; 1g is non-empty.</p>
        <p>Theorem 3.3. Mechanism 2 is e cient for k = 3.</p>
        <p>Proof. Let I = (n; k; x; a) be a DOFL instance and let y = (y1 ; y2 ; y3 ) be an
e cient solution for I such that y1 y2 y3 .</p>
        <p>Consider xing variables y1 and y3 in the social welfare function SW(I; y).
That is, we have</p>
        <p>SW(I; y)jy1=y1 ;y3=y3 =</p>
        <p>w(I; i; y)jy1=y1 ;y3=y3 :
X
i2[n]
For convenience, let SW(y2) denote SW(I; y)jy1=y1 ;y3=y3 and let wi(y2) denote
w(I; i; y)jy1=y1 ;y3=y3 for each agent i.</p>
        <p>Claim 1: For each agent i, the welfare function wi(y2) with y2 2 [y1 ; y3 ]
satis es at least one of the following two properties:
1. wi(y2) = jy2 xij;
2. wi(y1 ) = wi(y3 ) = maxy2[y1 ;y3 ] wi(y).</p>
        <p>Proof: Consider an agent i. We consider ve cases.</p>
        <p>Case 1: F2 2= ai. Since the welfare of agent i is independent of the location
of F2, wi is a constant function. Hence property 2 is satis ed.</p>
        <p>Case 2: ai = fF2g. By de nition, we have wi(y2) = jy2 xij. Hence property 1
is satis ed.</p>
        <p>Case 3: ai = fF1; F2g. By de nition, we have wi(y2) = min(jy1 xij; jy2 xij).
Notice that wi(y1 ) = min(jy1 xij; jy1 xij) = jy1 xij = maxy2[y1 ;y3 ] wi(y).
Moreover, wi(y3 ) = min(jy1 xij; jy3 xij). We consider two cases.</p>
        <p>Case 3.1: jy1 xij &gt; jy3 xij. Then wi(y3 ) = jy3 xij and hence wi(y2) =
jy2 xij for all y2 in [y1 ; y3 ], that is, wi(y2) satis es property 1.</p>
        <p>Case 3.2: jy1 xij jy3 xij. Then wi(y3 ) = jy1 xij = maxy2[y1 ;y3 ] wi(y) =
wi(y1 ) and hence wi(y2) satis es property 2.</p>
        <p>Case 4: ai = fF2; F3g. This case is symmetric to Case 3 and can be handled
similarly.</p>
        <p>Case 5: ai = fF1; F2; F3g. By de nition, we have wi(y2) = min(jy1 xij; jy2
xij; jy3 xij). Notice that wi(y1 ) = wi(y3 ) = min(jy1 xij; jy3 xij). Also
notice that for any y2 in [y1 ; y3 ], wi(y2) = min(jy1 xij; jy2 xij; jy3 xij)
min(jy1 xij; jy3 xij) = wi(y1 ). Hence property 1 holds.</p>
        <p>This concludes our proof of Claim 1.</p>
        <p>Claim 2: There is a solution that optimizes maxy SW(I; y) and builds
facilities in at most two locations.</p>
        <p>Proof: We establish the claim by proving that either SW(I; (y1 ; y1 ; y3 ))
SW(I; y ) or SW(I; (y1 ; y3 ; y3 )) SW(I; y ).</p>
        <p>Claim 1 implies that the set of agents [n] can be partitioned into two sets
(S; S) such that wi(y2) satis es property 1 for all i in S, and wi(y2) satis es
property 2 for all i in S. Thus, we have SW(y2) = Pi2[n] wi(y2) = P
Pi2S wi(y2). By Lemma 3.1, there is a b in fy1 ; y3 g such that Pi2S wi(y2)+
P i2S wi(b)
i2S wi(y2) for all y2 in [y1 ; y3 ]. For any i in S, we deduce from property 2 that
wi(b) wi(y2) for all y2 in [y1 ; y3 ]. Therefore, SW(b) SW(y2) for all y2 in
[y1 ; y3 ]. This completes our proof of Claim 2.</p>
        <p>Having established Claim 2, we can assume without loss of generality that
y2 = y3 . A similar argument as above can be used to prove that either (0; y2 ; y2 )
or (y2 ; y2 ; y2 ) is an e cient solution. Now if (0; y2 ; y2 ) is e cient, then one can
use a similar argument to prove that either (0; 0; 0) or (0; 1; 1) is e cient. And if
(y2 ; y2 ; y2 ) is e cient, then by applying Lemma 3.2 with k = 3, we deduce that
either (0; 0; 0) or (1; 1; 1) is e cient. Thus, there is a 0-1 e cient solution. The
e ciency of Mechanism 2 follows. tu</p>
        <p>When k = 2 (resp., 1), we can add one (resp., two) dummy facilities and
use Theorem 3.3 to establish that Mechanism 2 is e cient for k = 2 (resp., 1).
Theorem 3.4 below provides a lower bound on the approximation ratio of any
SGSP e cient mechanism; this result implies that Mechanism 2 is not SGSP.</p>
      </sec>
      <sec id="sec-4-2">
        <title>Theorem 3.4. There is no SGSP -e cient DOFLG mechanism with</title>
        <p>&lt; 5=4.</p>
        <p>Proof. Let n be a large even integer. We construct two 32n + 1 -agent
singlefacility DOFLG instances (I; I) and (I; I0). In both (I; I) and (I; I0), agent 1 is
located at 0 and dislikes fF1g, n=2 agents are located at 1 and dislike fF1g, and
the remaining n agents, which we denote by the set U , are located at 0 and
dislike ;. In I, all agents report truthfully, while in I0, all agents in U report
fF1g and the remaining agents report truthfully.</p>
        <p>Let the maximum social welfare for instances I and I0 be OPT and OPT0,
respectively. It is easy to see that OPT = 3n=2 and OPT0 = n + 1 (obtained
by building F1 at 0 and 1, respectively). Let the social welfare achieved by some
SGSP DOFLG mechanism M on these instances be ALG and ALG0, respectively.</p>
        <p>Let M build F1 at y on I. It follows that ALG = y + 32n n2y . If the agents
in U and agent 1 form a coalition in I and the agents in U report fF1g, then the
instance becomes I0. Thus, as M is SGSP, M cannot build F1 to the right of y in
I0. Using this fact, it is easy to see that ALG0 (n + 1)y + n2 (1 y) = n2y + n2 + y.</p>
        <p>Using OPT = 32n and ALG = y + 32n n2y , we obtain
Let f (y) denote
max
From (1) and (2) we deduce that f (y). Let y denote a value of y in [0; 1]
minimizing f (y). It is easy to verify that y satis es f (y ) = 54nn2+(n4+n1)4 . Thus,
f (y ). As n approaches in nity, f (y ) approaches 5=4. Thus, for any SGSP
-e cient mechanism, we have 5=4.</p>
        <p>In view of Theorem 3.4, it is natural to try to determine the minimum value
of for which an SGSP -e cient DOFLG mechanism exists. Below we present
a 2-e cient SGSP mechanism. It remains an interesting open problem to
improve the approximation ratio of 2, or to establish a tighter lower bound for the
approximation ratio.</p>
        <p>Mechanism 3 Let I = (n; k; x; a) denote the reported DOFL instance. Build all
facilities at 0 if Pi2[n] xi Pi2[n](1 xi); otherwise, build all facilities at 1.</p>
      </sec>
      <sec id="sec-4-3">
        <title>Theorem 3.5. Mechanism 3 is SGSP.</title>
        <p>Proof. Reported dislikes do not a ect the locations at which the facilities are
built. Hence the theorem follows.</p>
      </sec>
      <sec id="sec-4-4">
        <title>Theorem 3.6. Mechanism 3 is 2-e cient.</title>
        <p>(1)
(2)
tu
tu</p>
        <p>Proof. Let I = (n; k; x; a) denote the reported DOFL instance. Let ALG denote
the social welfare obtained by Mechanism 3 on this instance, and let OPT denote
the maximum possible social welfare on this instance. We need to prove that
2 ALG OPT.</p>
        <p>Assume without loss of generality that Mechanism 3 builds all facilities at
0. (A symmetric argument handles the case where all facilities are built at 1).
Then the welfare of an agent i not in indi (I) is xi and the welfare of an agent i0
in indi (I) is max(xi0 ; 1 xi0 ) xi0 . Thus, ALG Pi2[n] xi. As Mechanism 3
builds the facilities at 0 and not 1, we have Pi2[n] xi Pi2[n](1 xi), which
implies that Pi2[n] xi n=2. Combining the above two inequalities, we have
ALG n=2. Since no agent has welfare greater than 1, we have n OPT.
Thus, 2 ALG n OPT, as required.
tu</p>
        <p>In our full paper, we show that the analysis of Theorem 3.6 is tight by
exhibiting a two-facility DOFL instance on which Mechanism 3 achieves only
half of the optimal social welfare. We also present variations of Mechanism 3
that are SGSP and 2-e cient when the agents are located on a cycle or square.
4</p>
        <sec id="sec-4-4-1">
          <title>Egalitarian Mechanisms</title>
          <p>We now design egalitarian mechanisms for DOFLG when the agents are located
on an interval, circle, or square.</p>
          <p>In De nition 4.1 below, we introduce a simple way to convert a single-facility
DOFLG mechanism into a DOFLG mechanism. Observe that for single-facility
DOFLG mechanisms, specifying the input DOFL instance I = (n; 1; x; a) is
equivalent to specifying (n; 1; x; haters(I; 1)).</p>
        </sec>
      </sec>
      <sec id="sec-4-5">
        <title>De nition 4.1. For any single-facility DOFLG mechanism M , Parallel(M ) de</title>
        <p>notes the DOFLG mechanism that takes as input a DOFL instance I = (n; k; x; a)
and outputs y = (y1; : : : ; yk), where yj is the location at which M builds the
facility on input (n; 1; x; haters(I; j)).</p>
        <p>Lemmas 4.1 and 4.2 below reduce the task of designing a SP egalitarian
DOFLG mechanism to the single-facility case.</p>
      </sec>
      <sec id="sec-4-6">
        <title>Lemma 4.1. Let M be a SP single-facility DOFLG mechanism. Then Parallel(M ) is a SP DOFLG mechanism.</title>
      </sec>
      <sec id="sec-4-7">
        <title>Lemma 4.2. Let M be an egalitarian single-facility DOFLG mechanism. Then</title>
      </sec>
      <sec id="sec-4-8">
        <title>Parallel(M ) is an egalitarian DOFLG mechanism.</title>
        <p>4.1</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Egalitarian mechanisms for the unit interval</title>
      <p>We begin by describing a SP egalitarian mechanism for single-facility DOFLG
when the agents are located in the unit interval.
Mechanism 4 Let I = (n; 1; x; a) denote the reported DOFL instance and let
H denote haters(I; 1). If H is empty, build F1 at 0. Otherwise, let H contain `
agents z1; : : : ; z` such that xz1 xz2 xz` . Let d1 = xz1 and d3 = 1 xz` .
If ` = 1, then build F1 at 0 if d1 d3, and at 1 otherwise. If ` &gt; 1, let m be
the midpoint of the leftmost largest interval between consecutive agents in H.
Formally, m = (xzo + xzo+1 )=2, where o is the smallest number in [` 1] such
that xzo+1 xzo = maxj2[` 1](xzj+1 xzj ). Let d2 = m xzo . Then build facility
F1 at 0 if d1 d2 and d1 d3, at m if d2 d3, and at 1 otherwise.</p>
      <p>The following lemma shows that Mechanism 4 is SP. It is established by
examining how the location of the facility changes when an agent lies.</p>
      <sec id="sec-5-1">
        <title>Lemma 4.3. Mechanism 4 is SP for single-facility DOFLG.</title>
      </sec>
      <sec id="sec-5-2">
        <title>Lemma 4.4. Mechanism 4 is egalitarian for single-facility DOFLG.</title>
        <p>Proof. Let I = (n; 1; x; a) denote the reported DOFL instance and let H denote
haters(I; 1). The welfare of any agent in [n] n H is independent of the location of
the facility. Thus, a mechanism is egalitarian if it maximizes the minimum welfare
of any agent in H. Mechanism 4 ignores the agents that are not in H. Thus it is
su cient to show that Mechanism 4 maximizes the minimum welfare on instances
where all agents belong to H. Hence for the remainder of the proof, we assume
that all agents belong to H. Let y denote an optimal location for the facility and
let OPT denote MW(I; y ). Let y0 denote the location where Mechanism 4 builds
the facility and let ALG denote MW(I; y0). Below we establish that ALG
OPT, which implies that Mechanism 4 is egalitarian.</p>
        <p>If H is empty then trivially Mechanism 4 is egalitarian. For the remainder
of the proof, assume that H is non-empty. We say that an agent in H is tight
if it is as close to y as any other agent in H. Thus for any tight agent i,
OPT = jy xij. Similarly , ALG is the distance between y0 and a closest agent
in H.</p>
        <p>If y = 0, consider any tight agent i. Then no agent in H is located in [0; xi).
It follows that d1 = xi = OPT. As ALG d1, we have ALG OPT. A
symmetric argument can be made for the case y = 1.</p>
        <p>It remains to consider the case where y does not belong to f0; 1g.
Assume that xi &lt; y where i is a tight agent (the other case can be handled
symmetrically). We have OPT = y xi. Thus no agent in H is located in
(xi = y OPT; y + OPT). We consider two cases.</p>
        <p>Case 1: There is no agent i0 to the right of y . Thus d3 OPT. Since
ALG d3, we have ALG OPT.</p>
        <p>Case 2: There is an agent in H to the right of y . Consider the leftmost such
agent i0. Since xi0 y + OPT, we have d2 OPT. Since ALG d2, we have
ALG OPT.</p>
        <p>We de ne Mechanism 5 as the DOFLG mechanism Parallel(M ), where M
denotes Mechanism 4. Using Lemmas 4.1 through 4.4, we immediately obtain
Theorem 4.1 below.</p>
      </sec>
      <sec id="sec-5-3">
        <title>Theorem 4.1. Mechanism 5 is SP and egalitarian.</title>
        <p>Below we provide a lower bound on the approximation ratio of any WGSP
egalitarian mechanism. Theorem 4.2 implies that Mechanism 5 is not WGSP.
is
(pn),</p>
      </sec>
      <sec id="sec-5-4">
        <title>Theorem 4.2. Let M be a WGSP -egalitarian mechanism. Then where n is the number of agents.</title>
        <p>Proof. Let q be a large even integer, let p denote q2 + 1, and let U (resp., V )
denote the set of all integers i such that 0 &lt; i &lt; q2=2 (resp., q2=2 &lt; i &lt; q2). We
construct two (p + 3)-agent two-facility DOFLG instances (I; I) and (I; I0). In
both (I; I) and (I; I0), there is an agent located at i=q2, called agent i, for each i
in U [ V , and there are two agents each at 0, 1=2, and 1. In I, each agent i such
that i is in U dislikes fF2g, each agent i such that i is in V dislikes fF1g, one
agent at 0 (resp., 1=2, 1) dislikes fF1g, and the other agent at 0 (resp., 1=2, 1)
dislikes fF2g. In I0, agents i such that i is in U n f1; : : : ; q 1g, have alternating
reports: agent q reports fF1g, agent q + 1 reports fF2g, agent q + 2 reports fF1g,
and so on. Symmetrically, the agents i such that i is in V nfq2 q +1; : : : ; q2 1g,
have alternating reports: agent q2 q reports fF2g, agent q2 q 1 reports fF1g,
agent q2 q 2 reports fF2g, and so on. All other agents in I0 report truthfully.</p>
        <p>Let the optimal minimum welfare for DOFL instance I (resp., I0) be OPT
(resp., OPT0). It is easy to see that OPT = 1=4 and OPT0 = 21q (obtained
by building the facilities at (1=4; 3=4) and ( 21q ; 1 21q ), respectively). Let ALG
(resp., ALG0) denote the minimum welfare achieved by M on instance I (resp.,
I0). Below we prove that either OPT=ALG 4q or OPT0=ALG0 q=2.</p>
        <p>Let M build facilities at (y1; y2) (resp., (y10; y20)) on instance I (resp., I0). We
consider two cases.</p>
        <p>Case 1: 0 y10 &lt; 1=q and 1 1=q &lt; y20 1. Let S denote the set of agents
who lie in I0. If y10 &lt; y1 and y20 &gt; y2, then all agents in S bene t by lying. Hence
for M to be WGSP, either y10 y1 or y20 y2. Let us assume that y10 y1;
the other case can be handled symmetrically. Since y10 &lt; 1=q, we have y1 &lt; 1=q.
Note that there is an agent at 0 who reported fF1g. Thus ALG y1 &lt; 1=q.
Hence OPT=ALG 4q .</p>
        <p>Case 2: y10 1=q or y20 1 1=q. If y10 1=q, then at least one agent within
distance 1=q2 of y10 reported fF1g in I0. A similar observation holds for the case
y20 1 1=q. Thus ALG0 1=q2. Hence OPT0=ALG0 q=2.</p>
        <p>The preceding case analysis shows that q=4. Since q = pp 1 = pn 4,
the theorem holds.
tu</p>
        <p>The following variant of Mechanism 5 is SGSP. In this variant, we rst replace
the reported dislikes of all agents with fF1g and use Mechanism 4 to determine
where to build F1. Then we build all of the remaining facilities at the same
location as F1. This mechanism is SGSP because it disregards the reported aversion
pro le. We claim that this mechanism is 2(n+1)-egalitarian, where n denotes the
number of agents. To prove this claim, we rst observe that when Mechanism 4 is
run as a subroutine within this mechanism, we have max(d1; 2d2; d3) 1=(n+1).
Thus the minimum welfare achieved by the mechanism is at least 1=(2(n + 1)).
Since the optimal minimum welfare is at most 1, the claim holds.</p>
        <p>In our full paper, we extend some of the previous results to the case where
the agents are located on a cycle: we show how to modify Mechanism 5 to obtain
a SP egalitarian mechanism for the cycle; we prove that the approximation ratio
lower bound for WGSP mechanisms given in Theorem 4.2 also holds for the
cycle; we show that the SGSP mechanism presented in the previous paragraph
can be adapted to obtain a n-egalitarian mechanism for the cycle.
4.2</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>An egalitarian mechanism for the unit square</title>
      <p>We extend Mechanism 4 to a SP egalitarian mechanism for single-facility DOFLG
when the agents are located in the unit square. Let S denote [0; 1]2, let B denote
the boundary of S, and let xi = (ai; bi) denote the location of agent i. For
convenience, we assume that all agents are located at distinct points; the results
below generalize easily to the case where this assumption does not hold.
Mechanism 6. Let I = (n; 1; x; a) denote the reported DOFL instance and let
H denote haters(I; 1). If H is empty, build F1 at (0; 0). Otherwise, construct the</p>
      <sec id="sec-6-1">
        <title>Voronoi diagram D associated with the locations of the agents in H. Let V be</title>
        <p>the union of the following three sets of vertices: the vertices of D in the interior
of S; the points of intersection between B and D; the four vertices of S. For each
v in V , let dv denote the minimum distance from v to any agent in H. Build
F1 at a vertex v maximizing dv, breaking ties rst by x-coordinate and then by
y-coordinate.</p>
        <p>
          Toussaint presents an e cient O(n log n) algorithm to nd the optimal v in
Mechanism 6 [
          <xref ref-type="bibr" rid="ref23">23</xref>
          ]. The following lemma establishes that Mechanism 6 is
egalitarian. The lemma is shown using Theorem 2 of [
          <xref ref-type="bibr" rid="ref23">23</xref>
          ] for the largest empty circle
with location constraints problem.
        </p>
      </sec>
      <sec id="sec-6-2">
        <title>Lemma 4.5. Mechanism 6 is egalitarian for single-facility DOFLG.</title>
        <p>In our full paper, we use a case analysis to establish Lemma 4.6 below. The
most interesting case deals with an agent i who dislikes F1 but does not report
it. In this case, the key insight is that when agent i misreports, facility F1 is
built either (1) at the same location as when agent i reports truthfully, or (2)
inside or on the boundary of the Voronoi region that contains xi when agent i
reports truthfully.</p>
      </sec>
      <sec id="sec-6-3">
        <title>Lemma 4.6. Mechanism 6 is SP for single-facility DOFLG.</title>
        <p>We de ne Mechanism 7 as the DOFLG mechanism Parallel(M ), where M
denotes Mechanism 6. Using Lemmas 4.1, 4.2, 4.5, and 4.6, we immediately
obtain Theorem 4.3 below.</p>
      </sec>
      <sec id="sec-6-4">
        <title>Theorem 4.3. Mechanism 7 is SP and egalitarian.</title>
        <p>In this paper, we studied the obnoxious facility location game with dichotomous
preferences. This game generalizes obnoxious facility location game to more
realistic scenarios. All of the mechanisms presented in this paper run in polynomial
time, except that the running time of Mechanism 2 has exponential dependence
on k (and polynomial dependence on n). We can extend the results of Section 4.2
to obtain an analogue of Theorem 4.3 that holds for arbitrary convex polygon.
We showed that Mechanism 2 is WGSP for all k and is e cient for k 3.
Properties 1 and 2 in the proof of our associated theorem, Theorem 3.3, do not hold
for k &gt; 3. Nevertheless, we conjecture that Mechanism 2 is e cient for all k. It
remains an interesting open problem to reduce the gap between the (pn) and
O(n) bounds on the approximation ratio of WGSP -egalitarian mechanisms.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Alon</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Feldman</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Procaccia</surname>
            ,
            <given-names>A.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tennenholtz</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Strategyproof approximation of the minimax on networks</article-title>
          .
          <source>Mathematics of Operations Research</source>
          <volume>35</volume>
          (
          <issue>3</issue>
          ),
          <volume>513</volume>
          {
          <fpage>526</fpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Anastasiadis</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Deligkas</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Heterogeneous facility location games</article-title>
          .
          <source>In: Proceedings of the 17th International Conference on Autonomous Agents and Multiagent Systems</source>
          . pp.
          <volume>623</volume>
          {
          <issue>631</issue>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Brams</surname>
            ,
            <given-names>S.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fishburn</surname>
            ,
            <given-names>P.C.</given-names>
          </string-name>
          :
          <article-title>Approval voting</article-title>
          .
          <source>The American Political Science Review</source>
          <volume>72</volume>
          (
          <issue>3</issue>
          ),
          <volume>831</volume>
          {
          <fpage>847</fpage>
          (
          <year>1978</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fong</surname>
            ,
            <given-names>K.C.K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yuan</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          , Zhang, Y.:
          <article-title>Facility location games with optional preference</article-title>
          .
          <source>Theoretical Computer Science</source>
          <volume>847</volume>
          ,
          <issue>185</issue>
          {
          <fpage>197</fpage>
          (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5. Cheng, Y.,
          <string-name>
            <surname>Han</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yu</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          , Zhang, G.:
          <article-title>Obnoxious facility game with a bounded service range</article-title>
          .
          <source>In: Proceedings of the 10th Annual Conference on Theory and Applications of Models of Computation</source>
          . pp.
          <volume>272</volume>
          {
          <issue>281</issue>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6. Cheng, Y.,
          <string-name>
            <surname>Yu</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          , Zhang, G.:
          <article-title>Mechanisms for obnoxious facility game on a path</article-title>
          .
          <source>In: Proceedings of the 5th International Conference on Combinatorial Optimization and Applications</source>
          . pp.
          <volume>262</volume>
          {
          <issue>271</issue>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7. Cheng, Y.,
          <string-name>
            <surname>Yu</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          , Zhang, G.:
          <article-title>Strategy-proof approximation mechanisms for an obnoxious facility game on networks</article-title>
          .
          <source>Theoretical Computer Science</source>
          <volume>497</volume>
          ,
          <issue>154</issue>
          {
          <fpage>163</fpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Dokow</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Feldman</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Meir</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nehama</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Mechanism design on discrete lines and cycles</article-title>
          .
          <source>In: Proceedings of the 13th ACM Conference on Electronic Commerce</source>
          . pp.
          <volume>423</volume>
          {
          <issue>440</issue>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Duan</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Xu</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          :
          <article-title>Heterogeneous two-facility location games with minimum distance requirement</article-title>
          .
          <source>In: Proceedings of the 18th International Conference on Autonomous Agents and Multiagent Systems</source>
          . pp.
          <volume>1461</volume>
          {
          <issue>1469</issue>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Feigenbaum</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sethuraman</surname>
          </string-name>
          , J.:
          <article-title>Strategyproof mechanisms for one-dimensional hybrid and obnoxious facility location models</article-title>
          .
          <source>In: Incentive and Trust in ECommunities (AAAI Workshop)</source>
          . vol. WS-
          <volume>15</volume>
          -
          <fpage>08</fpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Feldman</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wilf</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>Strategyproof facility location and the least squares objective</article-title>
          .
          <source>In: Proceedings of the 14th ACM Conference on Electronic Commerce</source>
          . pp.
          <volume>873</volume>
          {
          <issue>890</issue>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Filos-Ratsikas</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhang</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          , Zhang,
          <string-name>
            <surname>Q.</surname>
          </string-name>
          :
          <article-title>Facility location with doublepeaked preferences</article-title>
          .
          <source>Autonomous Agents and Multi-Agent Systems 31(6)</source>
          ,
          <volume>1209</volume>
          {
          <fpage>1235</fpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Fotakis</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tzamos</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Winner-imposing strategyproof mechanisms for multiple facility location games</article-title>
          .
          <source>In: Proceedings of the 6th International Workshop on Internet and Network Economics</source>
          . pp.
          <volume>234</volume>
          {
          <issue>245</issue>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Fotakis</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tzamos</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Strategyproof facility location with concave costs</article-title>
          .
          <source>SIGecom Exchanges</source>
          <volume>12</volume>
          (
          <issue>2</issue>
          ),
          <volume>46</volume>
          {
          <fpage>49</fpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Fukui</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shurbevski</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nagamochi</surname>
          </string-name>
          , H.:
          <article-title>-group strategy-proof mechanisms for the obnoxious facility game in star networks</article-title>
          .
          <source>IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E102.A</source>
          ,
          <volume>1179</volume>
          {
          <fpage>1186</fpage>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Han</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Du</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Moneyless strategy-proof mechanism on single-sinked policy domain: characterization and applications</article-title>
          .
          <source>Manuscript</source>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Ibara</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nagamochi</surname>
          </string-name>
          , H.:
          <article-title>Characterizing mechanisms in obnoxious facility game</article-title>
          .
          <source>In: Proceedings of the 6th International Conference Combinatorial Optimization and Applications</source>
          . pp.
          <volume>301</volume>
          {
          <issue>311</issue>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lu</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yao</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhang</surname>
          </string-name>
          , J.:
          <article-title>Strategyproof mechanism for two heterogeneous facilities with constant approximation ratio</article-title>
          .
          <source>In: Proceedings of the 29th International Joint Conference on Arti cial Intelligence</source>
          . pp.
          <volume>238</volume>
          {
          <issue>245</issue>
          (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Lu</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sun</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhu</surname>
            ,
            <given-names>Z.A.</given-names>
          </string-name>
          :
          <article-title>Asymptotically optimal strategy-proof mechanisms for two-facility games</article-title>
          .
          <source>In: Proceedings of the 11th ACM Conference on Electronic Commerce</source>
          . pp.
          <volume>315</volume>
          {
          <issue>324</issue>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Oomine</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shurbevski</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nagamochi</surname>
          </string-name>
          , H.:
          <article-title>Parameterization of strategy-proof mechanisms in the obnoxious facility game</article-title>
          .
          <source>In: Proceedings of the 10th International Workshop on Algorithms and Computation</source>
          . pp.
          <volume>286</volume>
          {
          <issue>297</issue>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Procaccia</surname>
            ,
            <given-names>A.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tennenholtz</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Approximate mechanism design without money</article-title>
          .
          <source>In: Proceedings of the 10th ACM Conference on Electronic Commerce</source>
          . pp.
          <volume>177</volume>
          {
          <issue>186</issue>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22. Sera no,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Ventre</surname>
          </string-name>
          ,
          <string-name>
            <surname>C.</surname>
          </string-name>
          :
          <article-title>Heterogeneous facility location without money</article-title>
          .
          <source>Theoretical Computer Science</source>
          <volume>636</volume>
          ,
          <issue>27</issue>
          {
          <fpage>46</fpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Toussaint</surname>
          </string-name>
          , G.T.:
          <article-title>Computing largest empty circles with location constraints</article-title>
          .
          <source>International Journal of Computer and Information Sciences</source>
          <volume>12</volume>
          (
          <issue>5</issue>
          ),
          <volume>347</volume>
          {
          <fpage>358</fpage>
          (
          <year>1983</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Vorsatz</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Masso</surname>
          </string-name>
          , J.:
          <article-title>Weighted approval voting</article-title>
          .
          <source>Economic Theory</source>
          <volume>36</volume>
          (
          <issue>1</issue>
          ),
          <volume>129</volume>
          {
          <fpage>146</fpage>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Ye</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mei</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhang</surname>
          </string-name>
          , Y.:
          <article-title>Strategy-proof mechanism for obnoxious facility location on a line</article-title>
          .
          <source>In: Proceedings of the 21st International Conference on Computing and Combinatorics</source>
          . pp.
          <volume>45</volume>
          {
          <issue>56</issue>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Yuan</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fong</surname>
            ,
            <given-names>K.C.K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhang</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Facility location games with optional preference</article-title>
          .
          <source>In: Proceedings of the 22nd European Conference on Arti cial Intelligence</source>
          . pp.
          <volume>1520</volume>
          {
          <issue>1527</issue>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Zhang</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Strategyproof mechanism design for facility location games with weighted agents on a line</article-title>
          .
          <source>Journal of Combinatorial Optimization</source>
          <volume>28</volume>
          ,
          <issue>756</issue>
          {
          <fpage>773</fpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Zou</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Facility location games with dual preference</article-title>
          .
          <source>In: Proceedings of the 14th International Conference on Autonomous Agents and Multiagent Systems</source>
          . pp.
          <volume>615</volume>
          {
          <issue>623</issue>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>