{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,22]],"date-time":"2023-09-22T10:38:57Z","timestamp":1695379137775},"reference-count":82,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,1,22]],"date-time":"2022-01-22T00:00:00Z","timestamp":1642809600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,1,22]],"date-time":"2022-01-22T00:00:00Z","timestamp":1642809600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100003977","name":"Israel Science Foundation","doi-asserted-by":"publisher","award":["1626\/18"],"id":[{"id":"10.13039\/501100003977","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001691","name":"Japan Society for the Promotion of Science","doi-asserted-by":"crossref","award":["JP17H00761","JP17H04695"],"id":[{"id":"10.13039\/501100001691","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100009036","name":"Strategic International Collaborative Research Program","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100009036","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Auton Agent Multi-Agent Syst"],"published-print":{"date-parts":[[2022,4]]},"abstract":"Abstract<\/jats:title>In many real-life scenarios, a group of agents needs to agree on a common action, e.g., on a location for a public facility, while there is some consistency between their preferences, e.g., all preferences are derived from a common metric space. The facility location<\/jats:italic> problem models such scenarios and it is a well-studied problem in social choice. We study mechanisms for facility location on unweighted undirected graphs that are resistant to manipulations (strategy-proof<\/jats:italic>, abstention-proof<\/jats:italic>, and false-name-proof<\/jats:italic>) by both individuals and coalitions on one hand and anonymous and efficient (Pareto-optimal<\/jats:italic>) on the other. We define a new family of graphs, $$ZV$$<\/jats:tex-math>\n \n ZV<\/mml:mi>\n <\/mml:mrow>\n <\/mml:math><\/jats:alternatives><\/jats:inline-formula>-line graphs<\/jats:italic>, and show a general facility location mechanism for these graphs that satisfies all these desired properties. This mechanism can also be computed in polynomial time and it can equivalently be defined as the first Pareto-optimal location according to some predefined order. Our main result, the $$ZV$$<\/jats:tex-math>\n \n ZV<\/mml:mi>\n <\/mml:mrow>\n <\/mml:math><\/jats:alternatives><\/jats:inline-formula>-line graphs family and the mechanism we present for it, unifies all works in the literature of false-name-proof facility location on discrete graphs including the preliminary (unpublished) works we are aware of. In particular, we show mechanisms for all graphs of at most five vertices<\/jats:italic>, discrete trees<\/jats:italic>, bicliques<\/jats:italic>, and clique tree graphs<\/jats:italic>. Finally, we discuss some generalizations and limitations of our result for facility location problems on other structures: Weighted graphs, large discrete cycles, infinite graphs; and for facility location problems concerning infinite societies.<\/jats:p>","DOI":"10.1007\/s10458-021-09535-5","type":"journal-article","created":{"date-parts":[[2022,1,22]],"date-time":"2022-01-22T07:02:46Z","timestamp":1642834966000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Manipulation-resistant false-name-proof facility location mechanisms for complex graphs"],"prefix":"10.1007","volume":"36","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-4152-4113","authenticated-orcid":false,"given":"Ilan","family":"Nehama","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3467-329X","authenticated-orcid":false,"given":"Taiki","family":"Todo","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-4929-396X","authenticated-orcid":false,"given":"Makoto","family":"Yokoo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,22]]},"reference":[{"key":"9535_CR1","doi-asserted-by":"crossref","unstructured":"Aleskerov, F. (2002). Categories of Arrovian voting schemes. In: K.\u00a0J. Arrow, A.\u00a0K. Sen, and K. Suzumura (eds.), Handbook of social choice and welfare, vol.\u00a01, chapter\u00a02 (pp. 95\u2013129). Elsevier.","DOI":"10.1016\/S1574-0110(02)80006-6"},{"key":"9535_CR2","unstructured":"Alon, N., Feldman, M., Procaccia, A.\u00a0D., & Tennenholtz, M. (2009). Strategyproof approximation mechanisms for location on networks. arXiv:0907.2049."},{"issue":"3","key":"9535_CR3","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1287\/moor.1100.0457","volume":"35","author":"N Alon","year":"2010","unstructured":"Alon, N., Feldman, M., Procaccia, A. D., & Tennenholtz, M. (2010). Strategyproof approximation of the minimax on networks. Mathematics of Operations Research, 35(3), 513\u2013526.","journal-title":"Mathematics of Operations Research"},{"key":"9535_CR4","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1613\/jair.3166","volume":"40","author":"H Aziz","year":"2011","unstructured":"Aziz, H., Bachrach, Y., Elkind, E., & Paterson, M. (2011). False-name manipulations in weighted voting games. Journal of Artificial Intelligence Research, 40, 57\u201393.","journal-title":"Journal of Artificial Intelligence Research"},{"issue":"1","key":"9535_CR5","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1086\/256633","volume":"56","author":"D Black","year":"1948","unstructured":"Black, D. (1948). On the rationale of group decision-making. Journal of Political Economy, 56(1), 23\u201334.","journal-title":"Journal of Political Economy"},{"issue":"1","key":"9535_CR6","doi-asserted-by":"publisher","first-page":"153","DOI":"10.2307\/2296962","volume":"50","author":"KC Border","year":"1983","unstructured":"Border, K. C., & Jordan, J. S. (1983). Straightforward elections, unanimity and phantom voters. The Review of Economic Studies, 50(1), 153\u2013170.","journal-title":"The Review of Economic Studies"},{"key":"9535_CR7","doi-asserted-by":"crossref","unstructured":"Chan, H., Filos-Ratsikas, A., Li, B., Li, M., & Wang, C. (2021). Mechanism design for facility location problems: A survey. In Z.-H. Zhou (eds.), Proceedings of the 13th international joint conference on artificial intelligence (IJCAI) (pp. 4356\u20134365).","DOI":"10.24963\/ijcai.2021\/596"},{"key":"9535_CR8","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1016\/j.tcs.2020.10.004","volume":"847","author":"Z Chen","year":"2020","unstructured":"Chen, Z., Fong, K. C. K., Li, M., Wang, K., Yuan, H., & Zhang, Y. (2020). Facility location games with optional preference. Theoretical Computer Science, 847, 185\u2013197.","journal-title":"Theoretical Computer Science"},{"key":"9535_CR9","doi-asserted-by":"crossref","unstructured":"Cheng, Y., & Zhou, S. (2015). A survey on approximation mechanism design without money for facility games. In: D. Gao, N. Ruan, W. Xing (eds.), Advances in global optimization (pp. 117\u2013128). Springer.","DOI":"10.1007\/978-3-319-08377-3_13"},{"key":"9535_CR10","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.tcs.2011.11.041","volume":"497","author":"Y Cheng","year":"2013","unstructured":"Cheng, Y., Wei, Yu., & Zhang, G. (2013). Strategy-proof approximation mechanisms for an obnoxious facility game on networks. Theoretical Computer Science, 497, 154\u2013163.","journal-title":"Theoretical Computer Science"},{"issue":"2","key":"9535_CR11","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1287\/trsc.12.2.107","volume":"12","author":"RL Church","year":"1978","unstructured":"Church, R. L., & Garfinkel, R. S. (1978). Locating an obnoxious facility on a network. Transportation Science, 12(2), 107\u2013118.","journal-title":"Transportation Science"},{"key":"9535_CR12","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/BF01726210","volume":"1","author":"EH Clarke","year":"1971","unstructured":"Clarke, E. H. (1971). Multipart pricing of public goods. Public Choice, 1, 17\u201333.","journal-title":"Public Choice"},{"key":"9535_CR13","doi-asserted-by":"crossref","unstructured":"Conitzer, V. (2007). Limited verification of identities to induce false-name-proofness. In: Proceedings of the 11th conference on theoretical aspects of rationality and knowledge (TARK) (pp. 102\u2013111).","DOI":"10.1145\/1324249.1324265"},{"key":"9535_CR14","doi-asserted-by":"crossref","unstructured":"Conitzer, V. (2008a). Using a memory test to limit a user to one account. In: Agent-mediated electronic commerce and trading agent design and analysis\u2014AAMAS workshop, AMEC 2008, and AAAI workshop, TADA 2008, revised selected papers (pp. 60\u201372). Springer.","DOI":"10.1007\/978-3-642-15237-5_5"},{"key":"9535_CR15","doi-asserted-by":"crossref","unstructured":"Conitzer, V. (2008b). Anonymity-proof voting rules. In: Proceedings of the 4th workshop on internet and network economics (WINE) (pp. 295\u2013306).","DOI":"10.1007\/978-3-540-92185-1_36"},{"issue":"4","key":"9535_CR16","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1609\/aimag.v31i4.2315","volume":"31","author":"V Conitzer","year":"2010","unstructured":"Conitzer, V., & Yokoo, M. (2010). Using mechanism design to prevent false-name manipulations. AI Magazine, 31(4), 65\u201378.","journal-title":"AI Magazine"},{"key":"9535_CR17","unstructured":"de\u00a0Ridder H.\u00a0N. et\u00a0al. Small graphs part of the information system on graph classes and their inclusions (ISGCI). https:\/\/www.graphclasses.org\/smallgraphs.html."},{"key":"9535_CR18","doi-asserted-by":"crossref","unstructured":"Dokow, E., Feldman, M., Meir, R., & Nehama, I. (2012). Mechanism design on discrete lines and cycles. In: Proceedings of the 13th ACM conference on economics and computation (EC) (pp. 423\u2013440).","DOI":"10.1145\/2229012.2229045"},{"key":"9535_CR19","doi-asserted-by":"crossref","unstructured":"Douceur, J.\u00a0R. (2002). The Sybil attack. In: Proceedings of the 1st international workshop peer-to-peer systems IPTPS (pp. 251\u2013260).","DOI":"10.1007\/3-540-45748-8_24"},{"key":"9535_CR20","doi-asserted-by":"crossref","unstructured":"Escoffier, B., Gourv\u00e8s, L., Thang, N.\u00a0K., Pascual, F., & Spanjaard, O. (2011). Strategy-proof mechanisms for facility location games with many facilities. In: Proceedings of the 2nd international conference on algorithmic decision theory (ADT) (pp.\u00a067\u201381).","DOI":"10.1007\/978-3-642-24873-3_6"},{"key":"9535_CR21","doi-asserted-by":"crossref","unstructured":"Farahani, R.\u00a0Z., & Hekmatfar, M. (eds) (2009). Facility location: Concepts, models, algorithms and case studies. Physica-Verlag Heidelberg, 1 edition.","DOI":"10.1007\/978-3-7908-2151-2"},{"key":"9535_CR22","unstructured":"Feigenbaum, I., & Sethuraman, J. (2015). Strategyproof mechanisms for one-dimensional hybrid and obnoxious facility location models. In AAAI workshop: Incentive and trust in E-communities."},{"issue":"2","key":"9535_CR23","doi-asserted-by":"crossref","first-page":"434","DOI":"10.1287\/moor.2016.0810","volume":"42","author":"I Feigenbaum","year":"2017","unstructured":"Feigenbaum, I., Sethuraman, J., & Ye, C. (2017). Approximately optimal mechanisms for strategy proof facility location: Minimizing $$L_p$$ norm of costs. Mathematics of Operations Research, 42(2), 434\u2013447.","journal-title":"Mathematics of Operations Research"},{"key":"9535_CR24","doi-asserted-by":"crossref","unstructured":"Feldman, M., & Wilf, Y. (2013). Strategyproof facility location and the least squares objective. In: Proceedings of the 14th ACM conference on economics and computation (EC) (pp. 873\u2013890).","DOI":"10.1145\/2482540.2482543"},{"key":"9535_CR25","doi-asserted-by":"crossref","unstructured":"Feldman, M., Fiat, A., & Golomb, I. (2016). On voting and facility location. In: Proceedings of the 16th ACM conference on economics and computation (EC) (pp. 269\u2013286).","DOI":"10.1145\/2940716.2940725"},{"issue":"4","key":"9535_CR26","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1080\/0025570X.1983.11977044","volume":"56","author":"PC Fishburn","year":"1983","unstructured":"Fishburn, P. C., & Brams, S. J. (1983). Paradoxes of preferential voting. Mathematics Magazine, 56(4), 207\u2013214.","journal-title":"Mathematics Magazine"},{"key":"9535_CR27","unstructured":"Fong, C.\u00a0K.\u00a0K., Li, M., Lu, P., Todo, T., & Yokoo, M. (2018). Facility location games with fractional preferences. In: Proceedings of the 32nd conference on artificial intelligence (AAAI) (pp. 1039\u20131046)."},{"issue":"4","key":"9535_CR28","first-page":"15:1","volume":"2","author":"D Fotakis","year":"2014","unstructured":"Fotakis, D., & Tzamos, C. (2014). On the power of deterministic mechanisms for facility location games. ACM Transactions on Economics and Computation (TEAC), 2(4), 15:1-15:37.","journal-title":"ACM Transactions on Economics and Computation (TEAC)"},{"issue":"1","key":"9535_CR29","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s00453-015-0026-6","volume":"76","author":"D Fotakis","year":"2016","unstructured":"Fotakis, D., & Tzamos, C. (2016). Strategyproof facility location for concave cost functions. Algorithmica, 76(1), 143\u2013167.","journal-title":"Algorithmica"},{"key":"9535_CR30","doi-asserted-by":"publisher","first-page":"587","DOI":"10.2307\/1914083","volume":"41","author":"A Gibbard","year":"1973","unstructured":"Gibbard, A. (1973). Manipulation of voting schemes: A general result. Econometrica, 41, 587\u2013601.","journal-title":"Econometrica"},{"issue":"3","key":"9535_CR31","doi-asserted-by":"publisher","first-page":"665","DOI":"10.2307\/1911681","volume":"45","author":"A Gibbard","year":"1977","unstructured":"Gibbard, A. (1977). Manipulation of schemes that mix voting with chance. Econometrica, 45(3), 665\u2013681.","journal-title":"Econometrica"},{"issue":"4","key":"9535_CR32","doi-asserted-by":"publisher","first-page":"617","DOI":"10.2307\/1914085","volume":"41","author":"T Groves","year":"1973","unstructured":"Groves, T. (1973). Incentives in teams. Econometrica, 41(4), 617\u2013631.","journal-title":"Econometrica"},{"key":"9535_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4153\/CMB-1963-001-x","volume":"6","author":"F Harary","year":"1963","unstructured":"Harary, F. (1963). A characterization of block-graphs. Canadian Mathematical Bulletin (CMB), 6, 1\u20136.","journal-title":"Canadian Mathematical Bulletin (CMB)"},{"key":"9535_CR34","doi-asserted-by":"crossref","unstructured":"Ibara, K., & Nagamochi, H. (2012). Characterizing mechanisms in obnoxious facility game. In Proceedings of the 6th conference on combinatorial optimization and applications (COCOA) (pp. 301\u2013311).","DOI":"10.1007\/978-3-642-31770-5_27"},{"issue":"1","key":"9535_CR35","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.dss.2004.08.005","volume":"39","author":"A Iwasaki","year":"2005","unstructured":"Iwasaki, A., Yokoo, M., & Terada, K. (2005). A robust open ascending-price multi-unit auction protocol against false-name bids. Decision Support Systems, 39(1), 23\u201339.","journal-title":"Decision Support Systems"},{"key":"9535_CR36","unstructured":"Iwasaki, A., Conitzer, V., Omori, Y., Sakurai, Y., Todo, T., Guo, M., Yokoo, M. (2010). Worst-case efficiency ratio in false-name-proof combinatorial auction mechanisms. In Proceedings of the 9th international conference on autonomous agents and multiagent systems (AAMAS) (pp. 633\u2013640)."},{"issue":"3","key":"9535_CR37","doi-asserted-by":"publisher","first-page":"478","DOI":"10.1111\/coin.12096","volume":"33","author":"RO Lasisi","year":"2017","unstructured":"Lasisi, R. O., & Allan, V. H. (2017). False-name manipulation in weighted voting games: Empirical and theoretical analysis. Computational Intelligence, 33(3), 478\u2013506.","journal-title":"Computational Intelligence"},{"issue":"2","key":"9535_CR38","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/j.geb.2005.02.006","volume":"55","author":"B Lehmann","year":"2006","unstructured":"Lehmann, B., Lehmann, D., & Nisan, N. (2006). Combinatorial auctions with decreasing marginal utilities. Games and Economic Behavior, 55(2), 270\u2013296 (Mini Special Issue: Electronic Market Design.).","journal-title":"Games and Economic Behavior"},{"key":"9535_CR39","doi-asserted-by":"crossref","unstructured":"Lu, P., Wang, Y., & Zhou, Y. (2009). Tighter bounds for facility games. In: Proceedings of the 5th workshop on internet and network economics (WINE) (pp. 137\u2013148).","DOI":"10.1007\/978-3-642-10841-9_14"},{"key":"9535_CR40","doi-asserted-by":"crossref","unstructured":"Lu, P., Sun, X., Wang, Y., Zhu, Z.\u00a0A. (2010). Asymptotically optimal strategy-proof mechanisms for two-facility games. In Proceedings of the 11th ACM conference on economics and computation (EC) (pp. 315 \u2013 324).","DOI":"10.1145\/1807342.1807393"},{"key":"9535_CR41","volume-title":"Microeconomic theory","author":"A Mas-Colell","year":"1995","unstructured":"Mas-Colell, A., Whinston, M., & Green, J. (1995). Microeconomic theory. Oxford: Oxford University Press."},{"issue":"4","key":"9535_CR42","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1007\/BF00128122","volume":"35","author":"H Moulin","year":"1980","unstructured":"Moulin, H. (1980). On strategy-proofness and single peakedness. Public Choice, 35(4), 437\u2013455.","journal-title":"Public Choice"},{"key":"9535_CR43","doi-asserted-by":"crossref","unstructured":"Moulin, Herv\u00e9. (1988). Condorcet\u2019s principle implies the no show paradox. Journal of Economic Theory,45(1), 53\u201364.","DOI":"10.1016\/0022-0531(88)90253-0"},{"key":"9535_CR44","doi-asserted-by":"publisher","DOI":"10.1515\/9781400864140","volume-title":"Cooperative Microeconomics: A Game-Theoretic Introduction","author":"H Moulin","year":"1995","unstructured":"Moulin, H. (1995). Cooperative Microeconomics: A Game-Theoretic Introduction. Princeton: Princeton University Press."},{"key":"9535_CR45","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1016\/j.geb.2013.06.002","volume":"86","author":"H Moulin","year":"2014","unstructured":"Moulin, H. (2014). Pricing traffic in a spanning network. Games and Economic Behavior, 86, 475\u2013490.","journal-title":"Games and Economic Behavior"},{"key":"9535_CR46","doi-asserted-by":"publisher","first-page":"61","DOI":"10.2307\/1912346","volume":"47","author":"RB Myerson","year":"1979","unstructured":"Myerson, R. B. (1979). Incentive compatibility and the bargaining problem. Econometrica, 47, 61\u201374.","journal-title":"Econometrica"},{"key":"9535_CR47","unstructured":"Nehama, I. Almost quasi-linear utilities in disguise: An extension of Roberts\u2019 theorem (work in progress)."},{"key":"9535_CR48","unstructured":"Nehama, I. (2019). Almost quasi-linear utilities in disguise: Positive-representation an extension of Roberts\u2019 theorem. In Proceedings of the 15th conference on web and internet economics (WINE) (pp. 344\u2013345)."},{"key":"9535_CR49","unstructured":"Nehama, I., Todo, T., & Yokoo, M. (2019). Manipulation-resistant facility location mechanisms for $$ZV$$-line graphs. In: Proceedings of the 18th international conference on autonomous agents and multiagent systems (AAMAS) (pp. 1452\u20131460)."},{"key":"9535_CR50","doi-asserted-by":"crossref","unstructured":"Okada, N., Todo, T., & Yokoo, M. (2019). SAT-based automated mechanism design for false-name-proof facility location. In: Proceedings of the 22nd principles and practice of multi-agent systems (PRIMA) (pp. 321\u2013337).","DOI":"10.1007\/978-3-030-33792-6_20"},{"key":"9535_CR51","doi-asserted-by":"crossref","unstructured":"Ono, T., Todo, T., & Yokoo, M. (2017). Rename and false-name manipulations in discrete facility location with optional preferences. In: Proceedings of the 20th principles and practice of multi-agent systems (PRIMA) (pp. 163\u2013179).","DOI":"10.1007\/978-3-319-69131-2_10"},{"key":"9535_CR52","doi-asserted-by":"crossref","unstructured":"Penna, P., Schoppmann, F., Silvestri, R., & Widmayer, P. (2009). Pseudonyms in cost-sharing games. In: Proceedings of the 5th workshop on internet and network economics (WINE) (pp. 256\u2013267).","DOI":"10.1007\/978-3-642-10841-9_24"},{"key":"9535_CR53","doi-asserted-by":"crossref","unstructured":"Procaccia, A.\u00a0D., & Tennenholtz, M. (2013). Approximate mechanism design without money. ACM Transactions on Economics and Computation (TEAC), 1(4).","DOI":"10.1145\/2542174.2542175"},{"issue":"2","key":"9535_CR54","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1016\/j.artint.2010.08.005","volume":"175","author":"B Rastegari","year":"2011","unstructured":"Rastegari, B., Condon, A., & Leyton-Brown, K. (2011). Revenue monotonicity in deterministic, dominant-strategy combinatorial auctions. Artificial Intelligence, 175(2), 441\u2013456.","journal-title":"Artificial Intelligence"},{"key":"9535_CR55","unstructured":"Roberts, K. (1979). The characterization of implementable choice rules. In: J.-J. Laffont (eds.), Aggregation and revelation of preferences (pp. 321\u2013349). North-Holland."},{"key":"9535_CR56","doi-asserted-by":"crossref","unstructured":"Sakurai, Y., Yokoo, M. (2002). An average-case budget-non-negative double auction protocol. In: Proceedings of the 1st international conference on autonomous agents and multiagent systems (AAMAS) (pp. 104\u2013111).","DOI":"10.1145\/544741.544769"},{"key":"9535_CR57","doi-asserted-by":"crossref","unstructured":"Sakurai, Y., Yokoo, M. (2003). A false-name-proof double auction protocol for arbitrary evaluation values. In: Proceedings of the 2nd international conference on autonomous agents and multiagent systems (AAMAS) (pp. 329\u2013336).","DOI":"10.1145\/860575.860629"},{"key":"9535_CR58","doi-asserted-by":"crossref","unstructured":"Sandholm, T. (2003). Automated mechanism design: A new application area for search algorithms. In: Proceedings of the principles and practice of constraint programming (CP) (pp. 19\u201336).","DOI":"10.1007\/978-3-540-45193-8_2"},{"key":"9535_CR59","doi-asserted-by":"crossref","unstructured":"Satterthwaite, M.\u00a0A. (1975). Strategy-proofness and Arrow\u2019s conditions: Existence and correspondence theorems for voting procedures and social welfare functions. Journal of Economic Theory, 10, 187\u2013217.","DOI":"10.1016\/0022-0531(75)90050-2"},{"issue":"2","key":"9535_CR60","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1006\/jeth.2001.2807","volume":"104","author":"J Schummer","year":"2002","unstructured":"Schummer, J., & Vohra, R. V. (2002). Strategy-proof location on a network. Journal of Economic Theory, 104(2), 405\u2013428.","journal-title":"Journal of Economic Theory"},{"key":"9535_CR61","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.tcs.2016.04.033","volume":"636","author":"P Serafino","year":"2016","unstructured":"Serafino, P., & Ventre, C. (2016). Heterogeneous facility location without money. Theoretical Computer Science, 636, 27\u201346.","journal-title":"Theoretical Computer Science"},{"key":"9535_CR62","unstructured":"Sonoda, A., Todo, T., & Yokoo, M. (2016). False-name-proof locations of two facilities: Economic and algorithmic approaches. In: Proceedings of the 30th conference on artificial intelligence (AAAI) (pp. 615\u2013621)."},{"issue":"1","key":"9535_CR63","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/s10458-005-0983-2","volume":"11","author":"T Suyama","year":"2005","unstructured":"Suyama, T., & Yokoo, M. (2005). Strategy\/false-name proof protocols for combinatorial multi-attribute procurement auction. Autonomous Agents and Multi-Agent Systems, 11(1), 7\u201321.","journal-title":"Autonomous Agents and Multi-Agent Systems"},{"issue":"13","key":"9535_CR64","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1002\/scj.10664","volume":"37","author":"K Terada","year":"2006","unstructured":"Terada, K., & Yokoo, M. (2006). False-name-proof multi-unit auction protocol utilizing greedy allocation based on approximate evaluation values. Systems and Computers in Japan, 37(13), 89\u201398.","journal-title":"Systems and Computers in Japan"},{"key":"9535_CR65","unstructured":"Todo, T., & Conitzer, V. (2013). False-name-proof matching. In Proceedings of the 12th international conference on autonomous agents and multiagent systems (AAMAS) (pp. 311\u2013318)."},{"key":"9535_CR66","unstructured":"Todo, T., Iwasaki, A., Yokoo, M., & Sakurai, Y. (2009). Characterizing false-name-proof allocation rules in combinatorial auctions. In: Proceedings of the 8th international conference on autonomous agents and multiagent systems (AAMAS) (pp. 265\u2013272)."},{"key":"9535_CR67","unstructured":"Todo, T., Iwasaki, A., & Yokoo, M. (2011). False-name-proof mechanism design without money. In: Proceedings of the 10th international conference on autonomous agents and multiagent systems (AAMAS) (pp. 651\u2013658)."},{"key":"9535_CR68","unstructured":"Todo, T., Mouri, T., Iwasaki, A., & Yokoo, M. (2012). False-name-proofness in online mechanisms. In: Proceedings of the 11th international conference on autonomous agents and multiagent systems (AAMAS) (pp. 753\u2013762)."},{"key":"9535_CR69","unstructured":"Todo, T., Okada, N., & Yokoo, M. (2020). False-name-proof facility location on discrete structures. In: Proceedings of the 24th European conference on artificial intelligence (ECAI) (pp. 227\u2013234)."},{"key":"9535_CR70","unstructured":"Tsuruta, S., Oka, M., Todo, T., Kawasaki, Y., Guo, M., Sakurai, Y., & Yokoo, M. (2014). Optimal false-name-proof single-item redistribution mechanisms. In Proceedings of the 13th international conference on autonomous agents and multiagent systems (AAMAS) (pp. 221\u2013228)."},{"key":"9535_CR71","unstructured":"Tsuruta, S., Oka, M., Todo, T., Sakurai, Y., & Yokoo, M. (2015). Fairness and false-name manipulations in randomized cake cutting. In Proceedings of the 14th international conference on autonomous agents and multiagent systems (AAMAS) (pp. 909\u2013917)."},{"issue":"1","key":"9535_CR72","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1111\/j.1540-6261.1961.tb02789.x","volume":"16","author":"W Vickrey","year":"1961","unstructured":"Vickrey, W. (1961). Counterspeculation, auctions, and competitive sealed tenders. The Journal of Finance, 16(1), 8\u201337.","journal-title":"The Journal of Finance"},{"key":"9535_CR73","unstructured":"Wada, Y., Ono, T., Todo, T., & Yokoo, M. (2018). Facility location with variable and dynamic populations. In Proceedings of the 17th international conference on autonomous agents and multiagent systems (AAMAS) (pp. 336\u2013344)."},{"key":"9535_CR74","unstructured":"Wagman, L., & Conitzer, V. (2008). Optimal false-name-proof voting rules with costly voting. In: Proceedings of the 23rd conference on artificial intelligence (AAAI) (pp. 190\u2013195)."},{"issue":"3","key":"9535_CR75","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1007\/s00182-013-0397-3","volume":"43","author":"L Wagman","year":"2014","unstructured":"Wagman, L., & Conitzer, V. (2014). False-name-proof voting with costs over two alternatives. International Journal of Game Theory, 43(3), 599\u2013618.","journal-title":"International Journal of Game Theory"},{"key":"9535_CR76","unstructured":"Yokoo, M. (2003). Characterization of strategy\/false-name proof combinatorial auction protocols: Price-oriented, rationing-free protocol. In: Proceedings of the 8th international joint conference on artificial intelligence (IJCAI) (pp. 733\u2013742)."},{"key":"9535_CR77","unstructured":"Yokoo, M., Sakurai, Y., & Matsubara, S. (2001a). Robust multi-unit auction protocol against false-name bids. In: Proceedings of the 7th international joint conference on artificial intelligence (IJCAI) (pp. 1089\u20131094)."},{"issue":"2","key":"9535_CR78","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/S0004-3702(01)00077-7","volume":"130","author":"M Yokoo","year":"2001","unstructured":"Yokoo, M., Sakurai, Y., & Matsubara, S. (2001). Robust combinatorial auction protocol against false-name bids. Artificial Intelligence, 130(2), 167\u2013181.","journal-title":"Artificial Intelligence"},{"issue":"1","key":"9535_CR79","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1016\/S0899-8256(03)00045-9","volume":"46","author":"M Yokoo","year":"2004","unstructured":"Yokoo, M., Sakurai, Y., & Matsubara, S. (2004). The effect of false-name bids in combinatorial auctions: New fraud in internet auctions. Games and Economic Behavior, 46(1), 174\u2013188.","journal-title":"Games and Economic Behavior"},{"issue":"2","key":"9535_CR80","first-page":"241","volume":"39","author":"M Yokoo","year":"2005","unstructured":"Yokoo, M., Sakurai, Y., & Matsubara, S. (2005). Robust double auction protocol against false-name bids. Decision Support Systems, 39(2), 241\u2013252.","journal-title":"Decision Support Systems"},{"key":"9535_CR81","unstructured":"Zhao, D., Luo, S., Todo, T., & Yokoo, M. (2014). False-name-proof combinatorial auction design via single-minded decomposition. In Proceedings of the 21st European conference on artificial intelligence (ECAI) (pp. 945\u2013950)."},{"key":"9535_CR82","unstructured":"Zou, S., & Li, M. (2015). Facility location games with dual preference. In Proceedings of the 14th international conference on autonomous agents and multiagent systems (AAMAS) (pp. 615\u2013623)."}],"container-title":["Autonomous Agents and Multi-Agent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10458-021-09535-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10458-021-09535-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10458-021-09535-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,29]],"date-time":"2022-04-29T05:07:32Z","timestamp":1651208852000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10458-021-09535-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,22]]},"references-count":82,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,4]]}},"alternative-id":["9535"],"URL":"https:\/\/doi.org\/10.1007\/s10458-021-09535-5","relation":{},"ISSN":["1387-2532","1573-7454"],"issn-type":[{"value":"1387-2532","type":"print"},{"value":"1573-7454","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,22]]},"assertion":[{"value":"1 September 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 January 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"12"}}