manipulation of stable matchings
play

Manipulation of Stable Matchings the Depths Summary using Minimal - PowerPoint PPT Presentation

Background A Poll Results Overview A Peek Into Manipulation of Stable Matchings the Depths Summary using Minimal Blacklists Yannai A. Gonczarowski The Hebrew University of Jerusalem Microsoft Research July 29, 2014 Proc. of the 15 th ACM


  1. Background Full-Side Manipulation A Poll The coalition of all men can force any W -rational perfect Results matching as the M -optimal stable one. (Distinct top choices.) Overview A Peek Into the Depths Gale and Sotomayor (1985) Summary The coalition of all women can force the W -optimal stable matching as the M -optimal one by truncating preference lists. • Requires blacklists. • Possibly long blacklists. • Possibly each of size | M | − 1. • Conspiracy is painfully obvious. Gusfield and Irving (1989) No results are known regarding achieving this by any means other than such preference-list truncation, i.e. by also permuting preference lists. Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 4 / 18

  2. Background A Short Poll A Poll Results Overview A Peek Into the Depths Summary Define n � | W | = | M | . The women may force the W -optimal stable matching as the M -optimal one, using a profile of preference lists with average blacklist size no more than . . . Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 5 / 18

  3. Background A Short Poll A Poll Results Overview A Peek Into the Depths Summary Define n � | W | = | M | . The women may force the W -optimal stable matching as the M -optimal one, using a profile of preference lists with average blacklist size no more than . . . 1 / c ) 1 c 3 O ( n 2 O (log n ) n n 4 O ( log n ) 6 n − c 5 c ⇑ By truncation Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 5 / 18

  4. Background A Short Poll A Poll Results Overview A Peek Into the Depths Summary Dagstuhl Seminar (Nov ’13): Electronic Markets & Auctions Define n � | W | = | M | . The women may force the W -optimal stable matching as the M -optimal one, using a profile of preference lists with average blacklist size no more than . . . X X 1 / c ) 1 c 3 O ( n 2 O (log n ) n n 4 O ( log n ) 6 n − c 5 c ⇑ By truncation Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 5 / 18

  5. Background A Short Poll A Poll Results Overview A Peek Into the Depths Summary Dagstuhl Seminar (Nov ’13): Electronic Markets & Auctions Define n � | W | = | M | . The women may force the W -optimal stable matching as the M -optimal one, using a profile of preference lists with average blacklist size no more than . . . X X 1 / c ) 1 c ⇐ 3 O ( n 2 ✘✘✘✘ O (log n ) ✘ n n 4 O ( log n ) 6 n − c 5 c ⇑ By truncation Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 5 / 18

  6. Background Answering Gusfield and Irving’s Open Question A Poll Results Summary of Main Result (Weak Version) Overview A Peek Into the Depths • The women may force any M -rational perfect matching as Summary the unique stable matching, using a profile of preference lists in which at most half of the women have blacklists, and in which the average blacklist size is less than 1. Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 6 / 18

  7. Background Answering Gusfield and Irving’s Open Question A Poll Results Summary of Main Result (Weak Version) Overview A Peek Into the Depths • The women may force any M -rational perfect matching as Summary the unique stable matching, using a profile of preference lists in which at most half of the women have blacklists, and in which the average blacklist size is less than 1. (Compare to each woman having a blacklist size of | M | -1.) Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 6 / 18

  8. Background Answering Gusfield and Irving’s Open Question A Poll Results Summary of Main Result (Weak Version) Overview A Peek Into the Depths • The women may force any M -rational perfect matching as Summary the unique stable matching, using a profile of preference lists in which at most half of the women have blacklists, and in which the average blacklist size is less than 1. (Compare to each woman having a blacklist size of | M | -1.) • Each of these bounds is tight: it cannot be improved upon. Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 6 / 18

  9. Background Answering Gusfield and Irving’s Open Question A Poll Results Summary of Main Result (Weak Version) Overview A Peek Into the Depths • The women may force any M -rational perfect matching as Summary the unique stable matching, using a profile of preference lists in which at most half of the women have blacklists, and in which the average blacklist size is less than 1. (Compare to each woman having a blacklist size of | M | -1.) • Each of these bounds is tight: it cannot be improved upon. • This profile of preference lists may be computed efficiently. Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 6 / 18

  10. Background Answering Gusfield and Irving’s Open Question A Poll Results Summary of Main Result (Weak Version) Overview A Peek Into the Depths • The women may force any M -rational perfect matching as Summary the unique stable matching, using a profile of preference lists in which at most half of the women have blacklists, and in which the average blacklist size is less than 1. (Compare to each woman having a blacklist size of | M | -1.) • Each of these bounds is tight: it cannot be improved upon. • This profile of preference lists may be computed efficiently. • Generally, many such profiles of preference lists exist. Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 6 / 18

  11. Background Answering Gusfield and Irving’s Open Question A Poll Results Summary of Main Result (Weak Version) Overview A Peek Into the Depths • The women may force any M -rational perfect matching as Summary the unique stable matching, using a profile of preference lists in which at most half of the women have blacklists, and in which the average blacklist size is less than 1. (Compare to each woman having a blacklist size of | M | -1.) • Each of these bounds is tight: it cannot be improved upon. • This profile of preference lists may be computed efficiently. • Generally, many such profiles of preference lists exist. A far more “inconspicuous” manipulation. Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 6 / 18

  12. Background Answering Gusfield and Irving’s Open Question A Poll Results Summary of Main Result (Weak Version) Overview A Peek Into the Depths • The women may force any M -rational perfect matching as Summary the unique stable matching, using a profile of preference lists in which at most half of the women have blacklists, and in which the average blacklist size is less than 1. (Compare to each woman having a blacklist size of | M | -1.) • Each of these bounds is tight: it cannot be improved upon. • This profile of preference lists may be computed efficiently. • Generally, many such profiles of preference lists exist. A far more “inconspicuous” manipulation, esp. if preference-list lengths are bounded (e.g. New York High School Match). Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 6 / 18

  13. Background Answering Gusfield and Irving’s Open Question A Poll Results Summary of Main Result (Weak Version) Overview A Peek Into the Depths • The women may force any M -rational perfect matching as Summary the unique stable matching, using a profile of preference lists in which at most half of the women have blacklists, and in which the average blacklist size is less than 1. (Compare to each woman having a blacklist size of | M | -1.) • Each of these bounds is tight: it cannot be improved upon. • This profile of preference lists may be computed efficiently. • Generally, many such profiles of preference lists exist. A far more “inconspicuous” manipulation, esp. if preference-list lengths are bounded (e.g. New York High School Match). If women pay a price for every man they blacklist, then order-of-magnitude improvement. Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 6 / 18

  14. Background Unbalanced Markets and Partial Matchings A Poll Results Overview A Peek Into the Depths Summary Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 7 / 18

  15. Background Unbalanced Markets and Partial Matchings A Poll Results Overview A Phase Change A Peek Into the Depths Summary Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 7 / 18

  16. Background Unbalanced Markets and Partial Matchings A Poll Results Overview A Phase Change A Peek Into the Depths • When there are less women than men (and all women are Summary to be matched), no blacklists are required whatsoever. Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 7 / 18

  17. Background Unbalanced Markets and Partial Matchings A Poll Results Overview A Phase Change A Peek Into the Depths • When there are less women than men (and all women are Summary to be matched), no blacklists are required whatsoever. • When there are more women than men (or if not all women are to be matched), each to-be-unmatched woman may have to blacklist as many as all men. Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 7 / 18

  18. Background Unbalanced Markets and Partial Matchings A Poll Results Overview A Phase Change A Peek Into the Depths • When there are less women than men (and all women are Summary to be matched), no blacklists are required whatsoever. • When there are more women than men (or if not all women are to be matched), each to-be-unmatched woman may have to blacklist as many as all men. • Ashlagi et al. (2013) show a similar phase change w.r.t. the expected ranking of the stable partners of each participant on this participant’s preference list in a random market. (log n vs. n / log n ) Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 7 / 18

  19. Background Unbalanced Markets and Partial Matchings A Poll Results Overview A Phase Change A Peek Into the Depths • When there are less women than men (and all women are Summary to be matched), no blacklists are required whatsoever. • When there are more women than men (or if not all women are to be matched), each to-be-unmatched woman may have to blacklist as many as all men. • Ashlagi et al. (2013) show a similar phase change w.r.t. the expected ranking of the stable partners of each participant on this participant’s preference list in a random market. (log n vs. n / log n ) • ( cf. the shoe market.) Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 7 / 18

  20. Background Unbalanced Markets and Partial Matchings A Poll Results Overview A Phase Change A Peek Into the Depths • When there are less women than men (and all women are Summary to be matched), no blacklists are required whatsoever. • When there are more women than men (or if not all women are to be matched), each to-be-unmatched woman may have to blacklist as many as all men. • Ashlagi et al. (2013) show a similar phase change w.r.t. the expected ranking of the stable partners of each participant on this participant’s preference list in a random market. (log n vs. n / log n ) • ( cf. the shoe market.) • Completely different proofs. Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 7 / 18

  21. Background Improved Insight into Matching Markets A Poll Results Both phase-change results lead to a similar conclusion in Overview different senses: A Peek Into the Depths Summary The preferences of the smaller side of the market (even if only slightly smaller) play a far more significant role than may be expected in determining the stable matchings, and those of the larger side — a considerably insignificant one. Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 8 / 18

  22. Background Improved Insight into Matching Markets A Poll Results Both phase-change results lead to a similar conclusion in Overview different senses: A Peek Into the Depths Summary The preferences of the smaller side of the market (even if only slightly smaller) play a far more significant role than may be expected in determining the stable matchings, and those of the larger side — a considerably insignificant one. In a sense, our results extend this qualitative statement from a random matching market to any matching market. Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 8 / 18

  23. Background Improved Insight into Matching Markets A Poll Results Both phase-change results lead to a similar conclusion in Overview different senses: A Peek Into the Depths Summary The preferences of the smaller side of the market (even if only slightly smaller) play a far more significant role than may be expected in determining the stable matchings, and those of the larger side — a considerably insignificant one. In a sense, our results extend this qualitative statement from a random matching market to any matching market. More generally: our results shed light on the question of how much, if at all, do given preferences for one side a priori impose limitations on the set of stable matchings under various conditions. Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 8 / 18

  24. Background “Example Insight”: Goods Allocation Problems A Poll In goods allocation problems, only one of the sides (the buyers ) Results Overview has preferences. A Peek Into the Depths Summary Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 9 / 18

  25. Background “Example Insight”: Goods Allocation Problems A Poll In goods allocation problems, only one of the sides (the buyers ) Results Overview has preferences. A Peek Into • AS03 and A+09 consider using a version of the the Depths (student-optimal) Gale-Shapley algorithm for assigning Summary school seats to children. Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 9 / 18

  26. Background “Example Insight”: Goods Allocation Problems A Poll In goods allocation problems, only one of the sides (the buyers ) Results Overview has preferences. A Peek Into • AS03 and A+09 consider using a version of the the Depths (student-optimal) Gale-Shapley algorithm for assigning Summary school seats to children. • School priorities are very coarse (and sometimes nonexistent, e.g. NYC High School Match), so a tie-breaking rule is required. Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 9 / 18

  27. Background “Example Insight”: Goods Allocation Problems A Poll In goods allocation problems, only one of the sides (the buyers ) Results Overview has preferences. A Peek Into • AS03 and A+09 consider using a version of the the Depths (student-optimal) Gale-Shapley algorithm for assigning Summary school seats to children. • School priorities are very coarse (and sometimes nonexistent, e.g. NYC High School Match), so a tie-breaking rule is required. • Both papers: a single lottery for all schools (intuitively less “fair”) results in higher social welfare than a different lottery for each school. Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 9 / 18

  28. Background “Example Insight”: Goods Allocation Problems A Poll In goods allocation problems, only one of the sides (the buyers ) Results Overview has preferences. A Peek Into • AS03 and A+09 consider using a version of the the Depths (student-optimal) Gale-Shapley algorithm for assigning Summary school seats to children. • School priorities are very coarse (and sometimes nonexistent, e.g. NYC High School Match), so a tie-breaking rule is required. • Both papers: a single lottery for all schools (intuitively less “fair”) results in higher social welfare than a different lottery for each school. • A concrete supporting argument from our result: if goods have no preferences, then Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 9 / 18

  29. Background “Example Insight”: Goods Allocation Problems A Poll In goods allocation problems, only one of the sides (the buyers ) Results Overview has preferences. A Peek Into • AS03 and A+09 consider using a version of the the Depths (student-optimal) Gale-Shapley algorithm for assigning Summary school seats to children. • School priorities are very coarse (and sometimes nonexistent, e.g. NYC High School Match), so a tie-breaking rule is required. • Both papers: a single lottery for all schools (intuitively less “fair”) results in higher social welfare than a different lottery for each school. • A concrete supporting argument from our result: if goods have no preferences, then many lotteries = all buyer-rational matchings are possible ∗ ; Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 9 / 18

  30. Background “Example Insight”: Goods Allocation Problems A Poll In goods allocation problems, only one of the sides (the buyers ) Results Overview has preferences. A Peek Into • AS03 and A+09 consider using a version of the the Depths (student-optimal) Gale-Shapley algorithm for assigning Summary school seats to children. • School priorities are very coarse (and sometimes nonexistent, e.g. NYC High School Match), so a tie-breaking rule is required. • Both papers: a single lottery for all schools (intuitively less “fair”) results in higher social welfare than a different lottery for each school. • A concrete supporting argument from our result: if goods have no preferences, then many lotteries = all buyer-rational matchings are possible ∗ ; single lottery = random serial (buyer) dictatorship ⇒ Pareto-efficient outcome. Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 9 / 18

  31. Background Full Result for Balanced Markets A Poll Theorem (Manipulation with Minimal Blacklists) Results Overview A Peek Into the Depths Summary Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 10 / 18

  32. Background Full Result for Balanced Markets A Poll Theorem (Manipulation with Minimal Blacklists) Results Overview Define n � | W | = | M | . Let P M be a profile of preference lists A Peek Into the Depths for M. For every M-rational perfect matching µ , there exists a Summary profile P W of preference lists for W , s.t. all the following hold. 1 The unique stable matching, given P W and P M , is µ . 2 The blacklists in P W are pairwise disjoint, i.e. no man appears in more than one blacklist. 3 n b , the number of women who have nonempty blacklists in P W , is at most n 2 . 4 The combined size of all blacklists in P W is at most n − n b , i.e. at most the number of women who have empty blacklists. Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 10 / 18

  33. Background Full Result for Balanced Markets A Poll Theorem (Manipulation with Minimal Blacklists) Results Overview Define n � | W | = | M | . Let P M be a profile of preference lists A Peek Into the Depths for M. For every M-rational perfect matching µ , there exists a Summary profile P W of preference lists for W , s.t. all the following hold. 1 The unique stable matching, given P W and P M , is µ . 2 The blacklists in P W are pairwise disjoint, i.e. no man appears in more than one blacklist. 3 n b , the number of women who have nonempty blacklists in P W , is at most n 2 . 4 The combined size of all blacklists in P W is at most n − n b , i.e. at most the number of women who have empty blacklists. Furthermore, P W can be computed in worst-case O ( n 3 ) time, best-case O ( n 2 ) time and average-case (assuming µ is uniformly distributed given P M ) O ( n 2 log n ) time. Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 10 / 18

  34. Background Full Result for Balanced Markets A Poll Theorem (Manipulation with Minimal Blacklists) Results Overview Define n � | W | = | M | . Let P M be a profile of preference lists A Peek Into the Depths for M. For every M-rational perfect matching µ , there exists a Summary profile P W of preference lists for W , s.t. all the following hold. 1 The unique stable matching, given P W and P M , is µ . 2 The blacklists in P W are pairwise disjoint, i.e. no man appears in more than one blacklist. 3 n b , the number of women who have nonempty blacklists in P W , is at most n 2 . 4 The combined size of all blacklists in P W is at most n − n b , i.e. at most the number of women who have empty blacklists. Furthermore, P W can be computed in worst-case O ( n 3 ) time, best-case O ( n 2 ) time and average-case (assuming µ is uniformly distributed given P M ) O ( n 2 log n ) time. Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 10 / 18

  35. Background Full Result for Balanced Markets A Poll Theorem (Manipulation with Minimal Blacklists) Results Overview Define n � | W | = | M | . Let P M be a profile of preference lists A Peek Into the Depths for M. For every M-rational perfect matching µ , there exists a Summary profile P W of preference lists for W , s.t. all the following hold. 1 The unique stable matching, given P W and P M , is µ . 2 The blacklists in P W are pairwise disjoint, i.e. no man appears in more than one blacklist. 3 n b , the number of women who have nonempty blacklists in P W , is at most n 2 . 4 The combined size of all blacklists in P W is at most n − n b , i.e. at most the number of women who have empty blacklists. Furthermore, P W can be computed in worst-case O ( n 3 ) time, best-case O ( n 2 ) time and average-case (assuming µ is uniformly distributed given P M ) O ( n 2 log n ) time. Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 10 / 18

  36. Background Full Result for Balanced Markets A Poll Theorem (Manipulation with Minimal Blacklists) Results Overview Define n � | W | = | M | . Let P M be a profile of preference lists A Peek Into the Depths for M. For every M-rational perfect matching µ , there exists a Summary profile P W of preference lists for W , s.t. all the following hold. 1 The unique stable matching, given P W and P M , is µ . 2 The blacklists in P W are pairwise disjoint, i.e. no man appears in more than one blacklist. 3 n b , the number of women who have nonempty blacklists in P W , is at most n 2 . 4 The combined size of all blacklists in P W is at most n − n b , i.e. at most the number of women who have empty blacklists. Furthermore, P W can be computed in worst-case O ( n 3 ) time, best-case O ( n 2 ) time and average-case (assuming µ is uniformly distributed given P M ) O ( n 2 log n ) time. Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 10 / 18

  37. Background Full Result for Balanced Markets A Poll Theorem (Manipulation with Minimal Blacklists) Results Overview Define n � | W | = | M | . Let P M be a profile of preference lists A Peek Into the Depths for M. For every M-rational perfect matching µ , there exists a Summary profile P W of preference lists for W , s.t. all the following hold. 1 The unique stable matching, given P W and P M , is µ . 2 The blacklists in P W are pairwise disjoint, i.e. no man appears in more than one blacklist. 3 n b , the number of women who have nonempty blacklists in P W , is at most n 2 . 4 The combined size of all blacklists in P W is at most n − n b , i.e. at most the number of women who have empty blacklists. Furthermore, P W can be computed in worst-case O ( n 3 ) time, best-case O ( n 2 ) time and average-case (assuming µ is uniformly distributed given P M ) O ( n 2 log n ) time. Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 10 / 18

  38. Background Tradeoff: #Blacklists vs. Combined Blacklist Size A Poll Results Overview 3 n b , the number of women who have nonempty blacklists in P W , is at most n A Peek Into 2 . the Depths 4 The combined size of all blacklists in P W is at most n − n b . Summary Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 11 / 18

  39. Background Tradeoff: #Blacklists vs. Combined Blacklist Size A Poll Results Overview 3 n b , the number of women who have nonempty blacklists in P W , is at most n A Peek Into 2 . the Depths 4 The combined size of all blacklists in P W is at most n − n b . Summary Examples of blacklist sizes for n = 8: 7 0 0 0 0 0 0 0 ( n b = 1) Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 11 / 18

  40. Background Tradeoff: #Blacklists vs. Combined Blacklist Size A Poll Results Overview 3 n b , the number of women who have nonempty blacklists in P W , is at most n A Peek Into 2 . the Depths 4 The combined size of all blacklists in P W is at most n − n b . Summary Examples of blacklist sizes for n = 8: 7 0 0 0 0 0 0 0 ( n b = 1) 1 1 1 1 0 0 0 0 ( n b = 4) Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 11 / 18

  41. Background Tradeoff: #Blacklists vs. Combined Blacklist Size A Poll Results Overview 3 n b , the number of women who have nonempty blacklists in P W , is at most n A Peek Into 2 . the Depths 4 The combined size of all blacklists in P W is at most n − n b . Summary Examples of blacklist sizes for n = 8: 7 0 0 0 0 0 0 0 ( n b = 1) 1 1 1 1 0 0 0 0 ( n b = 4) 4 2 0 0 0 0 0 0 ( n b = 2) Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 11 / 18

  42. Background Tradeoff: #Blacklists vs. Combined Blacklist Size A Poll Results Overview 3 n b , the number of women who have nonempty blacklists in P W , is at most n A Peek Into 2 . the Depths 4 The combined size of all blacklists in P W is at most n − n b . Summary Examples of blacklist sizes for n = 8: 7 0 0 0 0 0 0 0 ( n b = 1) 1 1 1 1 0 0 0 0 ( n b = 4) 4 2 0 0 0 0 0 0 ( n b = 2) 4 1 0 0 0 0 0 0 ( n b = 2) Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 11 / 18

  43. Background Tradeoff: #Blacklists vs. Combined Blacklist Size A Poll Results Overview 3 n b , the number of women who have nonempty blacklists in P W , is at most n A Peek Into 2 . the Depths 4 The combined size of all blacklists in P W is at most n − n b . Summary Examples of blacklist sizes for n = 8: 7 0 0 0 0 0 0 0 ( n b = 1) 1 1 1 1 0 0 0 0 ( n b = 4) 4 2 0 0 0 0 0 0 ( n b = 2) 4 1 0 0 0 0 0 0 ( n b = 2) 3 1 1 0 0 0 0 0 ( n b = 3) . . . Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 11 / 18

  44. Background Tradeoff: #Blacklists vs. Combined Blacklist Size A Poll Results Overview 3 n b , the number of women who have nonempty blacklists in P W , is at most n A Peek Into 2 . the Depths 4 The combined size of all blacklists in P W is at most n − n b . Summary Examples of blacklist sizes for n = 8: 7 0 0 0 0 0 0 0 ( n b = 1) 1 1 1 1 0 0 0 0 ( n b = 4) 4 2 0 0 0 0 0 0 ( n b = 2) 4 1 0 0 0 0 0 0 ( n b = 2) 3 1 1 0 0 0 0 0 ( n b = 3) . . . Tightness Each of these is the optimal solution for some P M and µ . Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 11 / 18

  45. Background Tradeoff: #Blacklists vs. Combined Blacklist Size A Poll Results Overview 3 n b , the number of women who have nonempty blacklists in P W , is at most n A Peek Into 2 . the Depths 4 The combined size of all blacklists in P W is at most n − n b . Summary Examples of blacklist sizes for n = 8: 7 0 0 0 0 0 0 0 ( n b = 1) 1 1 1 1 0 0 0 0 ( n b = 4) 4 2 0 0 0 0 0 0 ( n b = 2) 4 1 0 0 0 0 0 0 ( n b = 2) 3 1 1 0 0 0 0 0 ( n b = 3) . . . Tightness Each of these is the optimal solution for some P M and µ . Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 11 / 18

  46. Background The Gale-Shapley Deferred-Acceptance Algorithm A Poll A version modelled after Dubins and Freedman’s (1981) Results Overview The following algorithm yields the M -optimal stable matching. A Peek Into the Depths Summary Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 12 / 18

  47. Background The Gale-Shapley Deferred-Acceptance Algorithm A Poll A version modelled after Dubins and Freedman’s (1981) Results Overview The following algorithm yields the M -optimal stable matching. A Peek Into the Depths 1 Setup: Every man serenades under the window of the Summary woman he prefers most. Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 12 / 18

  48. Background The Gale-Shapley Deferred-Acceptance Algorithm A Poll A version modelled after Dubins and Freedman’s (1981) Results Overview The following algorithm yields the M -optimal stable matching. A Peek Into the Depths 1 Setup: Every man serenades under the window of the Summary woman he prefers most. 2 A man is scheduled for rejection if he is blacklisted by the woman to whom he serenades, or if she prefers another man currently serenading under her window. Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 12 / 18

  49. Background The Gale-Shapley Deferred-Acceptance Algorithm A Poll A version modelled after Dubins and Freedman’s (1981) Results Overview The following algorithm yields the M -optimal stable matching. A Peek Into the Depths 1 Setup: Every man serenades under the window of the Summary woman he prefers most. 2 A man is scheduled for rejection if he is blacklisted by the woman to whom he serenades, or if she prefers another man currently serenading under her window. 3 On each night , choose an arbitrary man scheduled for rejection. He moves to serenade under the window of the woman next on his preference list, if such woman exists. The (unique) M -optimal matching is always reached, regardless of the arbitrary choices made during the run. Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 12 / 18

  50. Background The Gale-Shapley Deferred-Acceptance Algorithm A Poll A version modelled after Dubins and Freedman’s (1981) Results Overview The following algorithm yields the M -optimal stable matching. A Peek Into the Depths 1 Setup: Every man serenades under the window of the Summary woman he prefers most. 2 A man is scheduled for rejection if he is blacklisted by the woman to whom he serenades, or if she prefers another man currently serenading under her window. 3 On each night , choose an arbitrary man scheduled for rejection. He moves to serenade under the window of the woman next on his preference list, if such woman exists. 4 When no men are scheduled for rejection, the algorithm terminates. Each woman is matched with the man serenading under her window; everyone else is unmatched. The (unique) M -optimal matching is always reached, regardless of the arbitrary choices made during the run. Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 12 / 18

  51. Background Tightness Overview A Poll Results w 2 > w 3 > w 4 > w 1 m 1 Overview w 3 > w 4 > w 1 > w 2 m 2 A Peek Into w 4 > w 1 > w 2 > w 3 m 3 the Depths w 1 > w 2 > w 3 > w 4 m 4 Summary Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 13 / 18

  52. Background Tightness Overview A Poll Results w 2 > w 3 > w 4 > w 1 m 1 Overview w 3 > w 4 > w 1 > w 2 m 2 A Peek Into w 4 > w 1 > w 2 > w 3 m 3 the Depths w 1 > w 2 > w 3 > w 4 m 4 Summary Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 13 / 18

  53. Background Tightness Overview A Poll (Blacklist: m 4 , m 3 , m 2 ) Results w 2 > w 3 > w 4 > w 1 m 1 w 1 m 1 Overview w 3 > w 4 > w 1 > w 2 m 2 > m 1 > m 4 > m 3 m 2 w 2 A Peek Into w 4 > w 1 > w 2 > w 3 m 3 > m 2 > m 1 > m 4 m 3 w 3 the Depths w 1 > w 2 > w 3 > w 4 m 4 > m 3 > m 2 > m 1 m 4 w 4 Summary Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 13 / 18

  54. Background Tightness Overview A Poll (Blacklist: m 4 , m 3 , m 2 ) Results w 2 > w 3 > w 4 > w 1 m 1 w 1 m 1 Overview w 3 > w 4 > w 1 > w 2 m 2 > m 1 > m 4 > m 3 m 2 w 2 A Peek Into w 4 > w 1 > w 2 > w 3 m 3 > m 2 > m 1 > m 4 m 3 w 3 the Depths w 1 > w 2 > w 3 > w 4 m 4 > m 3 > m 2 > m 1 m 4 w 4 Summary w 1 w 2 w 3 w 4 1 m 4 m 1 m 2 m 3 Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 13 / 18

  55. Background Tightness Overview A Poll (Blacklist: m 4 , m 3 , m 2 ) Results w 2 > w 3 > w 4 > w 1 m 1 w 1 m 1 Overview w 3 > w 4 > w 1 > w 2 m 2 > m 1 > m 4 > m 3 m 2 w 2 A Peek Into w 4 > w 1 > w 2 > w 3 m 3 > m 2 > m 1 > m 4 m 3 w 3 the Depths w 1 > w 2 > w 3 > w 4 m 4 > m 3 > m 2 > m 1 m 4 w 4 Summary w 1 w 2 w 3 w 4 1 m 4 m 1 m 2 m 3 2 m 1 , m 4 m 2 m 3 Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 13 / 18

  56. Background Tightness Overview A Poll (Blacklist: m 4 , m 3 , m 2 ) Results w 2 > w 3 > w 4 > w 1 m 1 w 1 m 1 Overview w 3 > w 4 > w 1 > w 2 m 2 > m 1 > m 4 > m 3 m 2 w 2 A Peek Into w 4 > w 1 > w 2 > w 3 m 3 > m 2 > m 1 > m 4 m 3 w 3 the Depths w 1 > w 2 > w 3 > w 4 m 4 > m 3 > m 2 > m 1 m 4 w 4 Summary w 1 w 2 w 3 w 4 1 m 4 m 1 m 2 m 3 2 m 1 , m 4 m 2 m 3 3 m 1 m 2 , m 4 m 3 Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 13 / 18

  57. Background Tightness Overview A Poll (Blacklist: m 4 , m 3 , m 2 ) Results w 2 > w 3 > w 4 > w 1 m 1 w 1 m 1 Overview w 3 > w 4 > w 1 > w 2 m 2 > m 1 > m 4 > m 3 m 2 w 2 A Peek Into w 4 > w 1 > w 2 > w 3 m 3 > m 2 > m 1 > m 4 m 3 w 3 the Depths w 1 > w 2 > w 3 > w 4 m 4 > m 3 > m 2 > m 1 m 4 w 4 Summary w 1 w 2 w 3 w 4 1 m 4 m 1 m 2 m 3 2 m 1 , m 4 m 2 m 3 3 m 1 m 2 , m 4 m 3 4 m 1 m 2 m 3 , m 4 Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 13 / 18

  58. Background Tightness Overview A Poll (Blacklist: m 4 , m 3 , m 2 ) Results w 2 > w 3 > w 4 > w 1 m 1 w 1 m 1 Overview w 3 > w 4 > w 1 > w 2 m 2 > m 1 > m 4 > m 3 m 2 w 2 A Peek Into w 4 > w 1 > w 2 > w 3 m 3 > m 2 > m 1 > m 4 m 3 w 3 the Depths w 1 > w 2 > w 3 > w 4 m 4 > m 3 > m 2 > m 1 m 4 w 4 Summary w 1 w 2 w 3 w 4 1 m 4 m 1 m 2 m 3 2 m 1 , m 4 m 2 m 3 3 m 1 m 2 , m 4 m 3 4 m 1 m 2 m 3 , m 4 5 m 3 m 1 m 2 m 4 Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 13 / 18

  59. Background Tightness Overview A Poll (Blacklist: m 4 , m 3 , m 2 ) Results w 2 > w 3 > w 4 > w 1 m 1 w 1 m 1 Overview w 3 > w 4 > w 1 > w 2 m 2 > m 1 > m 4 > m 3 m 2 w 2 A Peek Into w 4 > w 1 > w 2 > w 3 m 3 > m 2 > m 1 > m 4 m 3 w 3 the Depths w 1 > w 2 > w 3 > w 4 m 4 > m 3 > m 2 > m 1 m 4 w 4 Summary w 1 w 2 w 3 w 4 1 m 4 m 1 m 2 m 3 2 m 1 , m 4 m 2 m 3 3 m 1 m 2 , m 4 m 3 4 m 1 m 2 m 3 , m 4 5 m 3 m 1 m 2 m 4 Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 13 / 18

  60. Background Tightness Overview A Poll (Blacklist: m 4 , m 3 , m 2 ) Results w 2 > w 3 > w 4 > w 1 m 1 w 1 m 1 Overview w 3 > w 4 > w 1 > w 2 m 2 > m 1 > m 4 > m 3 m 2 w 2 A Peek Into w 4 > w 1 > w 2 > w 3 m 3 > m 2 > m 1 > m 4 m 3 w 3 the Depths w 1 > w 2 > w 3 > w 4 m 4 > m 3 > m 2 > m 1 m 4 w 4 Summary w 1 w 2 w 3 w 4 1 m 4 m 1 m 2 m 3 2 m 1 , m 4 m 2 m 3 3 m 1 m 2 , m 4 m 3 4 m 1 m 2 m 3 , m 4 5 m 3 m 1 m 2 m 4 6 m 1 , m 3 m 2 m 4 Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 13 / 18

  61. Background Tightness Overview A Poll (Blacklist: m 4 , m 3 , m 2 ) Results w 2 > w 3 > w 4 > w 1 m 1 w 1 m 1 Overview w 3 > w 4 > w 1 > w 2 m 2 > m 1 > m 4 > m 3 m 2 w 2 A Peek Into w 4 > w 1 > w 2 > w 3 m 3 > m 2 > m 1 > m 4 m 3 w 3 the Depths w 1 > w 2 > w 3 > w 4 m 4 > m 3 > m 2 > m 1 m 4 w 4 Summary w 1 w 2 w 3 w 4 1 m 4 m 1 m 2 m 3 2 m 1 , m 4 m 2 m 3 3 m 1 m 2 , m 4 m 3 4 m 1 m 2 m 3 , m 4 5 m 3 m 1 m 2 m 4 6 m 1 , m 3 m 2 m 4 7 m 2 , m 3 m 1 m 4 Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 13 / 18

  62. Background Tightness Overview A Poll (Blacklist: m 4 , m 3 , m 2 ) Results w 2 > w 3 > w 4 > w 1 m 1 w 1 m 1 Overview w 3 > w 4 > w 1 > w 2 m 2 > m 1 > m 4 > m 3 m 2 w 2 A Peek Into w 4 > w 1 > w 2 > w 3 m 3 > m 2 > m 1 > m 4 m 3 w 3 the Depths w 1 > w 2 > w 3 > w 4 m 4 > m 3 > m 2 > m 1 m 4 w 4 Summary w 1 w 2 w 3 w 4 1 m 4 m 1 m 2 m 3 2 m 1 , m 4 m 2 m 3 3 m 1 m 2 , m 4 m 3 4 m 1 m 2 m 3 , m 4 5 m 3 m 1 m 2 m 4 6 m 1 , m 3 m 2 m 4 7 m 2 , m 3 m 1 m 4 8 m 4 , m 2 m 1 m 3 Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 13 / 18

  63. Background Tightness Overview A Poll (Blacklist: m 4 , m 3 , m 2 ) Results w 2 > w 3 > w 4 > w 1 m 1 w 1 m 1 Overview w 3 > w 4 > w 1 > w 2 m 2 > m 1 > m 4 > m 3 m 2 w 2 A Peek Into w 4 > w 1 > w 2 > w 3 m 3 > m 2 > m 1 > m 4 m 3 w 3 the Depths w 1 > w 2 > w 3 > w 4 m 4 > m 3 > m 2 > m 1 m 4 w 4 Summary w 1 w 2 w 3 w 4 1 m 4 m 1 m 2 m 3 2 m 1 , m 4 m 2 m 3 3 m 1 m 2 , m 4 m 3 4 m 1 m 2 m 3 , m 4 5 m 3 m 1 m 2 m 4 6 m 1 , m 3 m 2 m 4 7 m 2 , m 3 m 1 m 4 8 m 4 , m 2 m 1 m 3 9 m 2 m 1 m 3 m 4 Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 13 / 18

  64. Background Tightness Overview A Poll (Blacklist: m 4 , m 3 , m 2 ) Results w 2 > w 3 > w 4 > w 1 m 1 w 1 m 1 Overview w 3 > w 4 > w 1 > w 2 m 2 > m 1 > m 4 > m 3 m 2 w 2 A Peek Into w 4 > w 1 > w 2 > w 3 m 3 > m 2 > m 1 > m 4 m 3 w 3 the Depths w 1 > w 2 > w 3 > w 4 m 4 > m 3 > m 2 > m 1 m 4 w 4 Summary w 1 w 2 w 3 w 4 1 m 4 m 1 m 2 m 3 2 m 1 , m 4 m 2 m 3 3 m 1 m 2 , m 4 m 3 4 m 1 m 2 m 3 , m 4 5 m 3 m 1 m 2 m 4 6 m 1 , m 3 m 2 m 4 7 m 2 , m 3 m 1 m 4 8 m 4 , m 2 m 1 m 3 9 m 2 m 1 m 3 m 4 Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 13 / 18

  65. Background Tightness Overview A Poll (Blacklist: m 4 , m 3 , m 2 ) Results w 2 > w 3 > w 4 > w 1 m 1 w 1 m 1 Overview w 3 > w 4 > w 1 > w 2 m 2 > m 1 > m 4 > m 3 m 2 w 2 A Peek Into w 4 > w 1 > w 2 > w 3 m 3 > m 2 > m 1 > m 4 m 3 w 3 the Depths w 1 > w 2 > w 3 > w 4 m 4 > m 3 > m 2 > m 1 m 4 w 4 Summary w 1 w 2 w 3 w 4 1 m 4 m 1 m 2 m 3 2 m 1 , m 4 m 2 m 3 3 m 1 m 2 , m 4 m 3 4 m 1 m 2 m 3 , m 4 5 m 3 m 1 m 2 m 4 6 m 1 , m 3 m 2 m 4 7 m 2 , m 3 m 1 m 4 8 m 4 , m 2 m 1 m 3 9 m 2 m 1 m 3 m 4 10 m 1 , m 2 m 3 m 4 Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 13 / 18

  66. Background Tightness Overview A Poll (Blacklist: m 4 , m 3 , m 2 ) Results w 2 > w 3 > w 4 > w 1 m 1 w 1 m 1 Overview w 3 > w 4 > w 1 > w 2 m 2 > m 1 > m 4 > m 3 m 2 w 2 A Peek Into w 4 > w 1 > w 2 > w 3 m 3 > m 2 > m 1 > m 4 m 3 w 3 the Depths w 1 > w 2 > w 3 > w 4 m 4 > m 3 > m 2 > m 1 m 4 w 4 Summary w 1 w 2 w 3 w 4 1 m 4 m 1 m 2 m 3 2 m 1 , m 4 m 2 m 3 3 m 1 m 2 , m 4 m 3 4 m 1 m 2 m 3 , m 4 5 m 3 m 1 m 2 m 4 6 m 1 , m 3 m 2 m 4 7 m 2 , m 3 m 1 m 4 8 m 4 , m 2 m 1 m 3 9 m 2 m 1 m 3 m 4 10 m 1 , m 2 m 3 m 4 11 m 3 , m 1 m 2 m 4 Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 13 / 18

  67. Background Tightness Overview A Poll (Blacklist: m 4 , m 3 , m 2 ) Results w 2 > w 3 > w 4 > w 1 m 1 w 1 m 1 Overview w 3 > w 4 > w 1 > w 2 m 2 > m 1 > m 4 > m 3 m 2 w 2 A Peek Into w 4 > w 1 > w 2 > w 3 m 3 > m 2 > m 1 > m 4 m 3 w 3 the Depths w 1 > w 2 > w 3 > w 4 m 4 > m 3 > m 2 > m 1 m 4 w 4 Summary w 1 w 2 w 3 w 4 1 m 4 m 1 m 2 m 3 2 m 1 , m 4 m 2 m 3 3 m 1 m 2 , m 4 m 3 4 m 1 m 2 m 3 , m 4 5 m 3 m 1 m 2 m 4 6 m 1 , m 3 m 2 m 4 7 m 2 , m 3 m 1 m 4 8 m 4 , m 2 m 1 m 3 9 m 2 m 1 m 3 m 4 10 m 1 , m 2 m 3 m 4 11 m 3 , m 1 m 2 m 4 12 m 4 , m 1 m 2 m 3 Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 13 / 18

  68. Background Tightness Overview A Poll (Blacklist: m 4 , m 3 , m 2 ) Results w 2 > w 3 > w 4 > w 1 m 1 w 1 m 1 Overview w 3 > w 4 > w 1 > w 2 m 2 > m 1 > m 4 > m 3 m 2 w 2 A Peek Into w 4 > w 1 > w 2 > w 3 m 3 > m 2 > m 1 > m 4 m 3 w 3 the Depths w 1 > w 2 > w 3 > w 4 m 4 > m 3 > m 2 > m 1 m 4 w 4 Summary w 1 w 2 w 3 w 4 1 m 4 m 1 m 2 m 3 2 m 1 , m 4 m 2 m 3 3 m 1 m 2 , m 4 m 3 4 m 1 m 2 m 3 , m 4 5 m 3 m 1 m 2 m 4 6 m 1 , m 3 m 2 m 4 7 m 2 , m 3 m 1 m 4 8 m 4 , m 2 m 1 m 3 9 m 2 m 1 m 3 m 4 10 m 1 , m 2 m 3 m 4 11 m 3 , m 1 m 2 m 4 12 m 4 , m 1 m 2 m 3 13 m 1 m 2 m 3 m 4 Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 13 / 18

  69. Background Tightness Overview A Poll (Blacklist: m 4 , m 3 , m 2 ) Results w 2 > w 3 > w 4 > w 1 m 1 w 1 m 1 Overview w 3 > w 4 > w 1 > w 2 m 2 > m 1 > m 4 > m 3 m 2 w 2 A Peek Into w 4 > w 1 > w 2 > w 3 m 3 > m 2 > m 1 > m 4 m 3 w 3 the Depths w 1 > w 2 > w 3 > w 4 m 4 > m 3 > m 2 > m 1 m 4 w 4 Summary w 1 w 2 w 3 w 4 1 m 4 m 1 m 2 m 3 2 m 1 , m 4 m 2 m 3 3 m 1 m 2 , m 4 m 3 4 m 1 m 2 m 3 , m 4 5 m 3 m 1 m 2 m 4 6 m 1 , m 3 m 2 m 4 7 m 2 , m 3 m 1 m 4 8 m 4 , m 2 m 1 m 3 9 m 2 m 1 m 3 m 4 10 m 1 , m 2 m 3 m 4 11 m 3 , m 1 m 2 m 4 12 m 4 , m 1 m 2 m 3 13 m 1 m 2 m 3 m 4 Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 13 / 18

  70. Background Tightness Overview A Poll (Blacklist: m 4 , m 3 , m 2 ) Results w 2 > w 3 > w 4 > w 1 m 1 w 1 m 1 Overview w 3 > w 4 > w 1 > w 2 m 2 > m 1 > m 4 > m 3 m 2 w 2 A Peek Into w 4 > w 1 > w 2 > w 3 m 3 > m 2 > m 1 > m 4 m 3 w 3 the Depths w 1 > w 2 > w 3 > w 4 m 4 > m 3 > m 2 > m 1 m 4 w 4 Summary w 1 w 2 w 3 w 4 1 m 4 m 1 m 2 m 3 2 m ∗ , m ∗ m 2 m 3 3 m ∗ m ∗ , m ∗ m 3 4 m ∗ m ∗ m ∗ , m ∗ 5 m ∗ m ∗ m ∗ m ∗ 6 m ∗ , m ∗ m ∗ m ∗ 7 m ∗ , m ∗ m ∗ m ∗ 8 m ∗ , m ∗ m ∗ m ∗ 9 m ∗ m ∗ m ∗ m ∗ 10 m ∗ , m 2 m ∗ m ∗ 11 m 3 , m ∗ m 2 m ∗ 12 m 4 , m 1 m 2 m 3 13 m 1 m 2 m 3 m 4 Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 13 / 18

  71. Background Tightness Overview A Poll (Blacklist: m 4 , m 3 , m 2 ) Results w 2 > w 3 > w 4 > w 1 m 1 w 1 m 1 Overview w 3 > w 4 > w 1 > w 2 m 2 > m 1 > m 4 > m 3 m 2 w 2 A Peek Into w 4 > w 1 > w 2 > w 3 m 3 > m 2 > m 1 > m 4 m 3 w 3 the Depths w 1 > w 2 > w 3 > w 4 m 4 > m 3 > m 2 > m 1 m 4 w 4 Summary w 1 w 2 w 3 w 4 1 m 4 m 1 m 2 m 3 2 m ∗ , m ∗ m 2 m 3 3 m ∗ m ∗ , m ∗ m 3 4 m ∗ m ∗ m ∗ , m ∗ 5 m ∗ m ∗ m ∗ m ∗ 6 m ∗ , m ∗ m ∗ m ∗ 7 m ∗ , m ∗ m ∗ m ∗ 8 m ∗ , m ∗ m ∗ m ∗ 9 m ∗ m ∗ m ∗ m ∗ 10 m ∗ , m 2 m ∗ m ∗ 11 m 3 , m ∗ m 2 m ∗ 12 m 4 , m 1 m 2 m 3 13 m 1 m 2 m 3 m 4 Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 13 / 18

  72. Background Tightness Overview A Poll (Blacklist: m 4 , m 3 , m 2 ) Results w 2 > w 3 > w 4 > w 1 m 1 w 1 m 1 Overview w 3 > w 4 > w 1 > w 2 m 2 > m 1 > m 4 > m 3 m 2 w 2 A Peek Into w 4 > w 1 > w 2 > w 3 m 3 > m 2 > m 1 > m 4 m 3 w 3 the Depths w 1 > w 2 > w 3 > w 4 m 4 > m 3 > m 2 > m 1 m 4 w 4 Summary w 1 w 2 w 3 w 4 1 m 4 m 1 m 2 m 3 2 m ∗ , m ∗ m 2 m 3 3 m ∗ m ∗ , m ∗ m 3 4 m ∗ m ∗ m ∗ , m ∗ 5 m ∗ m ∗ m ∗ m ∗ 6 m ∗ , m ∗ m ∗ m ∗ 7 m ∗ , m ∗ m ∗ m ∗ 8 m ∗ , m ∗ m ∗ m ∗ 9 m ∗ m ∗ m ∗ m ∗ 10 m ∗ , m 2 m ∗ m ∗ 11 m 3 , m ∗ m 2 m ∗ 12 m 4 , m 1 m 2 m 3 13 m 1 m 2 m 3 m 4 Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 13 / 18

  73. Background Tightness Overview A Poll (Blacklist: m 4 , m 3 , m 2 ) Results w 2 > w 3 > w 4 > w 1 m 1 w 1 m 1 Overview w 3 > w 4 > w 1 > w 2 m 2 > m 1 > m 4 > m 3 m 2 w 2 A Peek Into w 4 > w 1 > w 2 > w 3 m 3 > m 2 > m 1 > m 4 m 3 w 3 the Depths w 1 > w 2 > w 3 > w 4 m 4 > m 3 > m 2 > m 1 m 4 w 4 Summary w 1 w 2 w 3 w 4 1 m 4 m 1 m 2 m 3 2 m ∗ , m ∗ m 2 m 3 3 m ∗ m ∗ , m ∗ m 3 4 m ∗ m ∗ m ∗ , m ∗ 5 m ∗ m ∗ m ∗ m ∗ 6 m ∗ , m ∗ m ∗ m ∗ 7 m ∗ , m ∗ m ∗ m ∗ 8 m ∗ , m ∗ m ∗ m ∗ 9 m ∗ m ∗ m ∗ m ∗ 10 m ∗ , m 2 m ∗ m ∗ 11 m 3 , m ∗ m 2 m ∗ 12 m 4 , m 1 m 2 m 3 13 m 1 m 2 m 3 m 4 Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 13 / 18

  74. Background Tightness Overview A Poll (Blacklist: m 4 , m 3 , m 2 ) Results w 2 > w 3 > w 4 > w 1 m 1 w 1 m 1 Overview w 3 > w 4 > w 1 > w 2 m 2 > m 1 > m 4 > m 3 m 2 w 2 A Peek Into w 4 > w 1 > w 2 > w 3 m 3 > m 2 > m 1 > m 4 m 3 w 3 the Depths w 1 > w 2 > w 3 > w 4 m 4 > m 3 > m 2 > m 1 m 4 w 4 Summary w 1 w 2 w 3 w 4 1 m 4 m 1 m 2 m 3 2 m ∗ , m ∗ m 2 m 3 3 m ∗ m ∗ , m ∗ m 3 4 m ∗ m ∗ m ∗ , m ∗ 5 m ∗ m ∗ m ∗ m ∗ 6 m ∗ , m ∗ m ∗ m ∗ 7 m ∗ , m ∗ m ∗ m ∗ 8 m ∗ , m ∗ m ∗ m ∗ 9 m ∗ m ∗ m ∗ m ∗ 10 m ∗ , m 2 m ∗ m ∗ 11 m 3 , m ∗ m 2 m ∗ 12 m 4 , m 1 m 2 m 3 13 m 1 m 2 m 3 m 4 Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 13 / 18

  75. Background Tightness Overview A Poll (Blacklist: m 4 , m 3 , m 2 ) Results w 2 > w 3 > w 4 > w 1 m 1 w 1 m 1 Overview w 3 > w 4 > w 1 > w 2 m 2 > m 1 > m 4 > m 3 m 2 w 2 A Peek Into w 4 > w 1 > w 2 > w 3 m 3 > m 2 > m 1 > m 4 m 3 w 3 the Depths w 1 > w 2 > w 3 > w 4 m 4 > m 3 > m 2 > m 1 m 4 w 4 Summary w 1 w 2 w 3 w 4 1 m 4 m 1 m 2 m 3 2 m ∗ , m ∗ m 2 m 3 3 m ∗ m ∗ , m ∗ m 3 4 m ∗ m ∗ m ∗ , m ∗ 5 m ∗ m ∗ m ∗ m ∗ 6 m ∗ , m ∗ m ∗ m ∗ 7 m ∗ , m ∗ m ∗ m ∗ 8 m ∗ , m ∗ m ∗ m ∗ 9 m ∗ m ∗ m ∗ m ∗ 10 m ∗ , m 2 m ∗ m ∗ 11 m 3 , m ∗ m 2 m ∗ 12 m 4 , m 1 m 2 m 3 13 m 1 m 2 m 3 m 4 Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 13 / 18

  76. Background Tightness Overview A Poll (Blacklist: m 4 , m 3 , m 2 ) Results w 2 > w 3 > w 4 > w 1 m 1 w 1 m 1 Overview w 3 > w 4 > w 1 > w 2 m 2 > m 1 > m 4 > m 3 m 2 w 2 A Peek Into w 4 > w 1 > w 2 > w 3 m 3 > m 2 > m 1 > m 4 m 3 w 3 the Depths w 1 > w 2 > w 3 > w 4 m 4 > m 3 > m 2 > m 1 m 4 w 4 Summary w 1 w 2 w 3 w 4 1 m 4 m 1 m 2 m 3 2 m ∗ , m ∗ m 2 m 3 3 m ∗ m ∗ , m ∗ m 3 4 m ∗ m ∗ m ∗ , m ∗ 5 m ∗ m ∗ m ∗ m ∗ 6 m ∗ , m ∗ m ∗ m ∗ 7 m ∗ , m ∗ m ∗ m ∗ 8 m ∗ , m ∗ m ∗ m ∗ 9 m ∗ m ∗ m ∗ m ∗ 10 m ∗ , m 2 m ∗ m ∗ 11 m 3 , m ∗ m 2 m ∗ 12 m 4 , m 1 m 2 m 3 13 m 1 m 2 m 3 m 4 Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 13 / 18

  77. Background Tightness Overview A Poll (Blacklist: m 4 , m 3 , m 2 ) Results w 2 > w 3 > w 4 > w 1 m 1 w 1 m 1 Overview w 3 > w 4 > w 1 > w 2 m 2 > m 1 > m 4 > m 3 m 2 w 2 A Peek Into w 4 > w 1 > w 2 > w 3 m 3 > m 2 > m 1 > m 4 m 3 w 3 the Depths w 1 > w 2 > w 3 > w 4 m 4 > m 3 > m 2 > m 1 m 4 w 4 Summary w 1 w 2 w 3 w 4 1 m 4 m 1 m 2 m 3 2 m ∗ , m ∗ m 2 m 3 3 m ∗ m ∗ , m ∗ m 3 4 m ∗ m ∗ m ∗ , m ∗ 5 m ∗ m ∗ m ∗ m ∗ 6 m ∗ , m ∗ m ∗ m ∗ 7 m ∗ , m ∗ m ∗ m ∗ 8 m ∗ , m ∗ m ∗ m ∗ 9 m ∗ m ∗ m ∗ m ∗ 10 m ∗ , m 2 m ∗ m ∗ 11 m 3 , m ∗ m 2 m ∗ 12 m 4 , m 1 m 2 m 3 13 m 1 m 2 m 3 m 4 Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 13 / 18

  78. Background Tightness Overview A Poll (Blacklist: m 4 , m 3 , m 2 ) Results w 2 > w 3 > w 4 > w 1 m 1 w 1 m 1 Overview w 3 > w 4 > w 1 > w 2 m 2 > m 1 > m 4 > m 3 m 2 w 2 A Peek Into w 4 > w 1 > w 2 > w 3 m 3 > m 2 > m 1 > m 4 m 3 w 3 the Depths w 1 > w 2 > w 3 > w 4 m 4 > m 3 > m 2 > m 1 m 4 w 4 Summary w 1 w 2 w 3 w 4 1 m 4 m 1 m 2 m 3 2 m ∗ , m ∗ m 2 m 3 3 m ∗ m ∗ , m ∗ m 3 4 m ∗ m ∗ m ∗ , m ∗ 5 m ∗ m ∗ m ∗ m ∗ 6 m ∗ , m ∗ m ∗ m ∗ 7 m ∗ , m ∗ m ∗ m ∗ 8 m ∗ , m ∗ m ∗ m ∗ 9 m ∗ m ∗ m ∗ m ∗ 10 m ∗ , m 2 m ∗ m ∗ 11 m 3 , m ∗ m 2 m ∗ 12 m 4 , m 1 m 2 m 3 13 m 1 m 2 m 3 m 4 Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 13 / 18

  79. Background Construction Overview for an Easier Special Case A Poll • Assume that the top choices of men are distinct, i.e. each Results man serenades under a unique window on the first night. Overview A Peek Into the Depths Summary Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 14 / 18

  80. Background Construction Overview for an Easier Special Case A Poll • Assume that the top choices of men are distinct, i.e. each Results man serenades under a unique window on the first night. Overview A Peek Into • We build a profile of preference lists for the women s.t. the Depths each woman prefers µ ( w ) most. ⇒ µ is W -optimal. Summary Yannai A. Gonczarowski (HUJI&MSR) Manipulation of Stable Matchings using Minimal Blacklists July 29, 2014 14 / 18

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend