Three-dimensional matching instances are rich in stable matchings

Loading...
Thumbnail Image
Files
Date
2018-06-09
Authors
Escamocher, Guillaume
O'Sullivan, Barry
Journal Title
Journal ISSN
Volume Title
Publisher
Springer Verlag
Research Projects
Organizational Units
Journal Issue
Abstract
Extensive studies have been carried out on the Stable Matching problem, but they mostly consider cases where the agents to match belong to either one or two sets. Little work has been done on the three-set extension, despite the many applications in which three-dimensional stable matching (3DSM) can be used. In this paper we study the Cyclic 3DSM problem, a variant of 3DSM where agents in each set only rank the agents from one other set, in a cyclical manner. The question of whether every Cyclic 3DSM instance admits a stable matching has remained open for many years. We give the exact number of stable matchings for the class of Cyclic 3DSM instances where all agents in the same set share the same master preference list. This number is exponential in the size of the instances. We also show through empirical experiments that this particular class contains the most constrained Cyclic 3DSM instances, the ones with the fewest stable matchings. This would suggest that not only do all Cyclic 3DSM instances have at least one stable matching, but they each have an exponential number of them.
Description
Keywords
Artificial intelligence , Empirical experiments , Exponential numbers , Preference lists , Set extension , Show through , Stable matching , Stable matching problem , Three dimensional matching , Computer programming , Constraint theory , Operations research
Citation
Escamocher G., O’Sullivan B. (2018) Three-Dimensional Matching Instances Are Rich in Stable Matchings. In: van Hoeve WJ. (eds) Integration of Constraint Programming, Artificial Intelligence, and Operations Research. CPAIOR 2018, Delft, Netherlands, 26-29 June, Lecture Notes in Computer Science, vol 10848. Springer, Cham, pp. 182-197. doi: 10.1007/978-3-319-93031-2_13
Copyright
© Springer International Publishing AG, part of Springer Nature 2018. This is a post-peer-review, pre-copyedit version of an article published in Lecture Notes in Computer Science. The final authenticated version is available online at: http://dx.doi.org/10.1007/978-3-319-93031-2_13