The Surprising Power of Hiding Information in Facility Location
Authors: Safwan Hossain, Evi Micha, Nisarg Shah2168-2175
AAAI 2020 | Conference PDF | Archive PDF | Plain Text | LLM Run Details
| Reproducibility Variable | Result | LLM Response |
|---|---|---|
| Research Type | Theoretical | Our results provide a complete picture of the power of strategyproof mechanisms eliciting different levels of information and with respect to each type of manipulation. Surprisingly, we show that in some cases hiding locations can be a strictly more powerful manipulation than misreporting locations. |
| Researcher Affiliation | Academia | Safwan Hossain Vector Institute, University of Toronto safwan.hossain@mail.utoronto.ca Evi Micha University of Toronto emicha@cs.toronto.edu Nisarg Shah University of Toronto nisarg@cs.toronto.edu |
| Pseudocode | Yes | Algorithm 1: Mechanism PROJECT-AND-FIT |
| Open Source Code | No | The paper does not contain any explicit statement or link indicating the release of source code for the methodology described. |
| Open Datasets | No | The paper conducts theoretical analysis and does not involve training models on datasets. Therefore, no information about publicly available or open training datasets is provided. |
| Dataset Splits | No | The paper presents theoretical research, not empirical studies involving dataset splits for training, validation, or testing. |
| Hardware Specification | No | The paper is theoretical and does not describe any computational experiments that would require specific hardware. No hardware specifications are mentioned. |
| Software Dependencies | No | The paper is theoretical and does not involve software implementation or dependencies with version numbers for reproducible experiments. |
| Experiment Setup | No | The paper presents theoretical analysis and does not include details on experimental setup, hyperparameters, or training configurations. |