Approximation Algorithms for School Assignment: Group Fairness and Multi-criteria Optimization
Abstract
We consider the problem of assigning students to schools, when students have different utilities for schools and schools have capacity. There are additional group fairness considerations over students that can be captured either by concave objectives, or additional constraints on the groups. We present approximation algorithms for this problem via convex program rounding that achieve various trade-offs between utility violation, capacity violation, and running time. We also show that our techniques easily extend to the setting where there are arbitrary covering constraints on the feasible assignment, capturing multi-criteria and ranking optimization.
1 Introduction
In this paper, we consider a general model of assignment with a group fairness objective or constraints, motivated by school choice. In the school assignment problem, we are required to assign students to schools, subject to: (1) matching every student, (2) respecting the capacities of schools, and (3) being fair on the utilities to a pre-defined set of groups of students, which can potentially overlap. These groups could capture demographic features like income, race, etc. Each student has arbitrary cardinal utilities bounded in over schools, and the group fairness could either be captured in the objective defined over the utilities obtained by each group, or as a set of constraints capturing the same.
Our main contribution is a set of approximation algorithms for this problem. For arbitrary fairness objectives, we present two algorithms based on rounding a natural convex programming relaxation, which yield somewhat different guarantees:
-
•
A polynomial time algorithm where each group achieves at least as much utility as in the relaxation. However, school ’s capacity is violated by , where . This algorithm is a careful adaptation of the rounding algorithm in [7].
-
•
A time algorithm where each group receives at least its utility in the relaxation, while each school ’s capacity is violated by , where .
For practical school choice scenarios [1], the number of students significantly outweigh the number of available schools, while the number of groups is typically small, even constant. The above violations are therefore quite mild.
General Covering Constraints.
We subsequently present an extension of our framework to handle assignments with more general covering constraints. As one application, suppose the utility of a student for a school is multi-dimensional, capturing aspects like academic excellence, or location, or diversity of student body. The goal is to achieve at least a certain total utility value in each dimension. Such multi-objective optimization can be modeled using covering constraints.
As another application, we study the assignment with ranks problem first considered in [6]. Here, each student ordinally ranks the schools with possible ties. An input signature of length , the goal is to find an assignment where the number of students who are assigned their first choices (for all ) is at least . Using the same ideas as before, we give a polynomial time algorithm that finds such a matching, while violating the capacity of school by , where . We also give a time algorithm that finds such a matching, while violating the capacity of school by , where . In comparison to the algorithm in [6] that runs in time and uses multivariate polynomial interpolation, our algorithms present substantial improvements in both runtime and ease of implementation at the cost of a small capacity violation, when students are given a small choice of ranks.
1.1 Related Work and Techniques
GAP Rounding.
Our algorithm uses LP rounding, and borrows ideas from the semimal Generalized Assignment Problem (GAP) rounding technique of Lenstra, Shmoys, and Tardos [7, 11]. Their iterative rounding procedure involves the observation that the number of fractional variables in a vertex solution to a linear programming relaxation is bounded. We build on this idea and apply it to a linear program written on paths and cycles instead of assignments, enabling us to combine it with recent methods for finding proportional allocations mentioned below.
School Assignment and Matching.
The school assignment problem as formulated above was first considered recently in Procaccia, Robinson, and Tucker-Foltz [10]. This work only considers the objective of proportionality — in the assignment, each of the groups is required to achieve at least fraction of the utility it could have achieved had it been the only group in the system. They present an algorithm (not based on rounding) tailored to proportionality by applying a theorem of Stromquist and Woodall [14], which they call “cake frosting”. The theorem in [14] is a consequence of the celebrated ham-sandwich theorem [13], and is hence non-constructive. Using this technique, the algorithm for proportional school choice in [10] loses an additive on utilities (hence achieving approximate proportionality), in addition to violating the total capacity by . In contrast, we use convex programming relaxation to handle arbitrary fairness objectives, for instance, proportional fairness, Pareto-optimality, and leximin fairness, hence vastly generalizing the space of objectives. Our method only loses on the total capacity, while preserving utilities from the fractional relaxation. For instance, our method would achieve exact proportionality.
At a high level, our main technical contribution is to show how the cake frosting method can be applied to certain types of fractional solutions, in particular, a vertex solution constructed via GAP rounding of the convex programming relaxation. We hence showcase the full power of the technique in [14]. In addition, as discussed above, our techniques extend smoothly to handle arbitrary covering constraints on the allocations, which is motivated by multi-objective optimization and rank optimization.
We note that the idea of using cake frosting to round fractional solutions has appeared before for packing problems in Grandoni et al. [5], where the authors develop a PTAS for matchings in general graphs with budget constraints on the set of chosen edges. At a high level, all these approaches – the ones in [10, 5] and our work – apply cake frosting to decompose paths and cycles to approximately preserve constraints, but differ in the details of how the paths and cycles are constructed from the integer or fractional solutions. For instance, in contrast to [10] that defines the frosting function based on schools, we define it based on students, hence avoiding an additive violation on the utility. Further, since [5] consider packing problems, their reduction to cake frosting is entirely different in the technical details.
Matching with Violations.
Recently, several papers have considered assignment problems with small capacity violations. These papers mostly fall into two categories - those that try to directly optimize the capacity violations in some form while achieving a set goal like stability or perfectness [2, 3, 6] and those that optimize some other objective like fairness with provably small capacity violations [5, 9, 10]. Our model falls in the latter category – we want to find a matching that satisfies some notion of fairness, while violating capacities by as little as possible.
1.2 Roadmap
We present the group fairness problem in school choice, along with the statement of our main result (Theorem 1) in Section 2. We present the two approximation algorithms that prove Theorem 1 in Section 3. We generalize the model to covering constraints in Section 4, specializing it to the ranking problem mentioned above in Section 4.3.
2 Preliminaries and Main Result
We first present the school redistricting problem introduced in [10]. There is a set of students divided into possibly overlap** groups sets . There is a set of schools, and school has capacity .
An assignment of students to schools is a feasible solution , where is defined by:
Utility and Objective.
The utility of assigning student to school is . Given an assignment , we define the utility of each group as
Let . The goal is to find an assignment of each student to a school, in order to maximize some fairness function on the utilities perceived by the groups. Let be a non-decreasing concave function. Then the goal is to maximize
As an example, the celebrated proportional fairness objective sets , and the optimal solution has the following property: For any other feasible utility vector :
Such an allocation is not only proportional to the groups: , but also proportional to various subsets of groups.
2.1 Main Result
Our main result is the following:
Theorem 1.
Let be the optimal solution for any concave fairness function. Then, we can compute an assignment that satisfies relaxed school capacities and yields utilities with for all groups , with one of the following guarantees on capacity:
-
1.
A polynomial111Throughout the paper, we use this to mean polynomial in both . time algorithm that yields , where .
-
2.
A running time algorithm that yields with .
Note that the latter algorithm is slower, but yields better violation of capacities if .
2.2 Hardness Results
The hardness results below motivate the need to violate capacities in Theorem 1 if we want to preserve utilities exactly. We first show that the problem under the max-min fairness objective is strongly NP-Hard when the number of groups is part of the input.
Theorem 2.
Suppose the number of groups is part of the input, and the objective is to decide if the minimum utility received by any group is at least one. Then the school redistricting problem is NP-Complete even when there are only two schools.
Proof.
We reduce from Set Cover with a collection of sets, and a universe of elements. Suppose the goal is to decide if a set cover instance has sets that cover . Then each element becomes a group, and each set a student. A student belongs to a group if the corresponding set covers the corresponding element. There are two schools and . The former school has capacity and the latter has capacity . Each student has utility for and for . Then the goal of matching students to to give each group utility at least one is exactly the same as finding a set cover of size , completing the proof. ∎
We next show that the school redistricting problem under the max-min fairness (or proportionality) objective is weakly NP-Hard even when the number of groups .
Theorem 3.
Suppose the number of groups , and the objective is to decide if an exactly proportional allocation exists. Then the school redistricting problem is weakly NP-Complete.
Proof.
We reduce from Partition. Given a set of numbers , the goal is to decide if there is a subset of sum exactly where .
For every number , create two students and , and one school of capacity 1. There is also a dummy school of capacity . The students and have edges only to and , where and have utility for and 0 for .
All the students belong to group 1 and all the students belong to group 2. We want to find a matching that gives utility to both groups, which is the proportional share.
Suppose there is a subset of the numbers that sums to exactly . Then for every , we assign to and to . For every , we assign to and to . Both groups get utility each. The reverse direction is similar, completing the proof. ∎
3 Proof of Theorem 1
In this section, we prove Theorem 1. We begin with a convex programming relaxation to the problem, and then present two rounding schemes that yield the two guarantees in the theorem.
3.1 Convex Program Relaxation
The first step is to write the following convex programming relaxation:
This can clearly be solved in polynomial time. Let the optimal solution to the convex program yield utility vector . We now need to round the following set of constraints, so that the values are integer. Denote this formulation as (LP1).
We now present two rounding algorithms that yields the corresponding guarantees in Theorem 1.
3.2 Generalized Assignment Rounding
The first rounding algorithm is similar to rounding for generalized assignment (GAP) [7, 11], and is presented in Algorithm 1. We remark that the iterative procedure from Step 1-6 is not necessary; the same can be achieved with a single LP solution. We present it this way for ease of exposition. We show that it achieves the following guarantee, yielding the first part of Theorem 1.
Theorem 4.
Algorithm 1 runs in polynomial time and finds an integer solution that satisfies relaxed school capacities and yields utilities , where
-
1.
for all groups , and
-
2.
, where .
Proof of Theorem 4..
We denote the number of incident edges with as the “degree” of a vertex. First note that since each student is assigned to , the utility in the integer solution is at least that in (LP1).
We now argue the capacity violation. We note that Step 4 cannot violate any capacities, since was feasible for (LP1). Thus, it only remains to argue that Step 7 does not incur too many capacity violations. Let be the set of remaining edges with . Since was an extreme point solution to (LP1), constraints of (LP1) must be tight.
At the beginning of Step 7, let be the set of remaining schools and among these, let be those whose capacity constraints are tight. Let be the set of remaining students. Note that each student has a tight constraint associated with it. Suppose of the constraints corresponding to the groups are tight. Since we have a vertex solution,
(1) |
From the Handshaking lemma, we also have
Combining this with Eq. 1, we have | ||||
We know that each school in has degree at least 2, since the capacity is an integer, and all assignment variables are strict fractions. Similarly, each student in has degree at least . Therefore, every term in the above summation is non-negative. Let school and student have degree , while school have degree . We will refer to these terms as the excess degrees. Then the above implies
(2) |
To bound the capacity violation in 7, we just observe that
-
•
If a school in had degree 2, then it must have had capacity at least 1, and in the worst case, both students with edges to it will match to it. This leads to a violation of 1 in this school’s capacity.
-
•
For any other school , it again has capacity at least 1 and has students applying to it. In the worst case, this leads to a capacity violation of at most .
-
•
For schools , since the degree is , this leads to a violation of at most .
In total, this leads to a violation of 1 per school and the excess degrees lead to an additional violation overall. This completes the proof. ∎
3.3 Improved Capacity Violation via Cake Cutting
In this part, we show the following theorem, corresponding to the second part of Theorem 1. The main advantage is that we don’t need extra capacity at each school, albeit at the expense of a worse running time.
Theorem 5.
There is a time algorithm that computes an integer assignment that satisfies relaxed school capacities and yields utilities , such that:
-
1.
for all groups ; and
-
2.
with .
We prove the above theorem by replace Step 7 in Algorithm 1 with a more involved cake cutting process, building on the work of [10].
Paths and Cycles.
Let be the graph at the beginning of Step 7 in Algorithm 1. Recall that the maximum degree in was 2, save for some vertices with excess degrees in Eq. 2. We will process the graph into a graph of maximum degree 2, with some additional properties, in Algorithm 2.
At the end of the process, let be the resulting graph on fractional edges. Any vertex has degree at most two, and hence we get a graph with the following structure:
-
•
Every connected component is a path or a cycle.
-
•
Every student has degree exactly two, and is an internal node of a path or cycle.
-
•
Every school has capacity one and degree at most two.
-
•
School has degree one and capacity one, and is therefore a leaf of a path.
Lemma 6.
Algorithm 2 violates the total capacity by an additional .
Proof.
For , let , implying . We increase the capacity by . For , the new capacity is the same as the original capacity. For , suppose , then we increase the capacity by . By Eq. 2, the total increase is therefore at most . ∎
In the graph , suppose ; then we denote . This graph is a collection of paths and cycles. For non-leaf school or student , the above conditions imply if the two edges incident on are and . This follows because a degree-two school must belong to and corresponds to a tight constraint, and any student is associated with a tight constraint. This implies the following claim:
Claim 7.
For every component (path or cycle) of , there is some such that every even edge in the component has and every odd edge has .
Bounding the number of fractional components.
We view this fractional solution in the following way. For a component , set if for every even edge. Let be the utility that group gets in the assignment that selects all even edges (and none of the odd edges) of component . Let be the utility that group gets in the assignment that selects all odd edges of component . We modify (LP1) to the following, where is the modified utility after removing all the integral variables.
Let denote the number of variables. In any extreme point solution, at least of the constraints are tight, which means at most of the variables can be fractional, in . For all integral , we select the even matching if or the odd matching if . Remove these variables and rewrite the above LP just on the fractional variables.
Reduction to Cake Frosting.
For the components with fractional , we need to find an integral solution that approximately preserves the utilities. This would be achieved if we could ‘interpolate’ fraction of the way from the odd matching to the even matching. We can view this as a cake-frosting problem as in [10] where the groups are the players. First, we convert each cycle into a path as follows: Pick some student on this cycle, assign to , and delete this student. This step increases the capacity of at most schools by one, and reduces each cycle to a path that begins and ends at a school.
Before proceeding, we recall the “cake frosting” lemma first presented in [14] and generalized in [5, 10].
Lemma 8 (Cake Frosting Lemma).
Given piecewise constant functions with domain , and given any , there is a ‘perfect frosting’ written as a union of at most intervals such that for all :
We now show how to apply the above lemma in a fashion similar to [10, 5]. Fix a path . Let . Let there be students in , indexed from to . We divide the interval into parts where belongs to the student.222This is in contrast to the method in [10], which defines intervals based on schools. Define for every group ,
For , define as
Rounding Procedure.
For path , we now apply the cake frosting lemma to the function as defined above, with to find the perfect frosting that is a union of at most intervals. Given , we construct the assignment as in Algorithm 3.
The final algorithm applies this procedure separately to each of the fractional paths. Note that the value depends on the path.
Analysis.
We first bound the utility of each group in path . Define , i.e. the set of students in not in or . The utility of group in the integer solution is:
The first equality follows by adding and subtracting . The second line and the only inequality follows from the observation that and . The third line follows from the definition of , the fourth line follows from the the structure of and , and the fifth follows from the cake frosting lemma. The above chain of equalities shows that the integer solution for path has utility for each group at least the fractional solution.
To bound the total capacity violation, note that Algorithm 3 violates the capacity by one at every interval boundary. By the Cake Frosting lemma, this is an additional violation of per path, and hence overall. This completes the proof of Theorem 5, and hence Theorem 1.
4 Generalization to Covering Constraints
We now generalize the setting in Theorems 4 and 5. As before, we are given a set of schools, where school has capacity , a set of students, and a bipartite graph between the students and schools. The objective is to find an integral assignment of all the students that satisfies an additional set of covering constraints with non-negative coefficients.
In other words, we wish solve the following integer program:
(IP) |
(3) | |||||
(4) | |||||
(5) | |||||
(6) |
As motivation, each could capture a different type of utility student has for school , for instance, academic excellence, closeness, diversity of student body, etc, and we want a solution that achieves high average utility in all dimensions.
Define LP to be linear relaxation of IP obtained by relaxing Eq. 6 to . Unlike the previous section, a given variable can appear in the constraints in an arbitrary way. We show that Theorems 4 and 5 generalizes to arbitrary covering constraints at the cost of incurring an additive loss proportional to and , the number of rows in .
4.1 Generalizing Theorem 4
Our algorithm runs in the following steps, which build on Algorithm 1.
-
1.
Solve the linear programming relaxation, fix and remove the integral variables, and find a vertex solution. Let be the set of fractional variables, and be the remaining students.
- 2.
-
3.
Keep eliminating integer variables, stop** at a vertex solution where all variables are fractional. Let be the remaining variables and be the remaining students.
-
4.
Set an arbitrary to for each .
Theorem 9.
For arbitrary covering constraints, when the linear programming relaxation has a feasible solution, there is a polynomial time algorithm that outputs an integer matching and that achieves the following guarantee:
Proof.
First, the proof of Theorem 4 shows that regardless of how the students in are assigned, if each school is given one extra unit of capacity, then the total violation in capacity is at most .
We can therefore focus on assigning the students so that the constraints Eq. 5 are not violated significantly. In Step (2), since any student in has degree at least , we have . Further, any extreme point in Step (3) has exactly tight constraints. But since the number of potential tight constraints is at most , we obtain . Therefore Step (4) violates each constraint by an additive , completing the proof. ∎
4.2 Generalizing Theorem 5
We next generalize Theorem 5. We first apply Algorithm 1 to the linear programming relaxation. We then follow the procedure in Section 3.3 and sequentially apply Algorithms 2 and 3 to the fractional solution. To set up the cake frosting game to apply Algorithm 3, we view each of the Eq. 5 constraints as a player of the cake frosting instance, and the function where is the even matching edge adjacent to and is defined similarly. The only steps that are different are the assignment steps – Step 3 in Algorithm 2 and Step 7 in Algorithm 3. Here, we perform an arbitrary assignment of the students to the schools. We present the complete algorithm in Algorithm 4 for completeness.
Theorem 10.
When the linear programming relaxation has a feasible solution, if is the number of constraints Eq. 5, there is a time algorithm that outputs an integer matching and that achieves the following guarantee:
Proof.
We first argue about the violation in Eq. 5. The only steps that affect the constraints are the assignment steps – Steps 9 and 27 in Algorithm 4. In Step 9, the number of students assigned is from Eq. 2, while that in Step 27 is . If these students are arbitrarily assigned, each assignment loses an additive in the constraint. Therefore, the overall additive loss is . Note that the capacity bound violation follows from the proof of Theorem 5 and holds even when these students are arbitrarily assigned. ∎
Using Theorem 4.12 in [5], we can improve Theorem 10 to the following corollary. It follows by guessing chosen edges with highest utility for each group, and applying Algorithms 2 and 3 subsequently. This yields the following corollary, and we omit the standard details.
Corollary 11.
When the linear programming relaxation has a feasible solution, if is the number of constraints Eq. 5, then for any constant , there is a time algorithm that outputs an integer matching and that achieves the following guarantee:
4.3 Better Bounds for Monotonic Constraints
We next show that if the constraints have additional monotonicity structure, then we can generalize Theorem 4 without the additive loss in the constraints. We say that satisfies “monotonicity” if for each student , there is an ordering of the schools such that for all and , we have .
Theorem 12.
If the constraints are monotone, when the linear programming relaxation has a feasible solution, there is a polynomial time algorithm that outputs an integer matching and that achieves the following guarantee:
Theorem 13.
Proof of Theorems 12 and 13.
We proceed as in Theorems 4 and 5. At each point where the algorithm assigns a student to for some set , we simply assign it to . That is, assign it to the most preferred school (according to ). This also preserves the constraints because of monotonicity. ∎
Application: Weak Dominance of Ranks.
As a special case, we consider the setting in [6]. Here, every student ranks the schools it has an edge to, and this ranking may have ties. Let be the largest rank any student has, which can be much smaller than the number of schools. Given a matching, the rank of edge is the rank of school in student ’s ranking. A matching has signature if it has rank edges for every . We say that signature weakly dominates333The authors of [6] use ‘cumulatively better than’. signature , or if
(7) |
Given an input signature , the goal is to find a matching whose signature weakly dominates . We term this the matching with ranking problem. We have the following theorems, which directly follow from the observation that the constraints satisfy the monotonicity assumption. At each step where, for some set , we assign to , we instead assign it to its most preferred school from . This preserves the signature of any fractional assignment. Our approach yields faster time deterministic algorithms at the cost of small violations in capacities whereas the algorithm in [6] is randomized and takes time. Their approach essentially uses the algorithm for Exact Matchings [8]. It has been a longstanding open question whether it is possible to derandomize it.
Theorem 14.
If there is a feasible solution to matching with ranking with input signature , then there is an algorithm that runs in time and finds a matching with signature that satisfies relaxed capacities where , and .
Theorem 15.
If there is a feasible solution to matching with ranking with input signature , then there is an algorithm that runs in time and finds a matching with signature that satisfies relaxed capacities where , and .
References
- [1] Atila Abdulkadiroğlu and Tayfun Sönmez. School choice: A mechanism design approach. American economic review, 93(3):729–747, 2003.
- [2] Federico Bobbio, Margarida Carvalho, Andrea Lodi, and Alfredo Torrico. Capacity variation in the many-to-one stable matching, 2022.
- [3] Jiehua Chen and Gergely Csáji. Optimal capacity modification for many-to-one matching problems. In Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems, AAMAS ’23, page 2880–2882, Richland, SC, 2023. International Foundation for Autonomous Agents and Multiagent Systems.
- [4] Michel X Goemans. Minimum bounded degree spanning trees. In 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS’06), pages 273–282. IEEE, 2006.
- [5] Fabrizio Grandoni, R. Ravi, Mohit Singh, and Rico Zenklusen. New approaches to multi-objective optimization. Math. Program., 146(1-2):525–554, 2014.
- [6] Santhini K. A., Govind S. Sankar, and Meghana Nasre. Optimal matchings with one-sided preferences: Fixed and cost-based quotas. In Proceedings of the 21st International Conference on Autonomous Agents and Multiagent Systems, AAMAS ’22, page 696–704, Richland, SC, 2022. International Foundation for Autonomous Agents and Multiagent Systems.
- [7] Jan Karel Lenstra, David B. Shmoys, and Eva Tardos. Approximation algorithms for scheduling unrelated parallel machines. In 28th Annual Symposium on Foundations of Computer Science (sfcs 1987), pages 217–224, 1987.
- [8] Ketan Mulmuley, Umesh V Vazirani, and Vijay V Vazirani. Matching is as easy as matrix inversion. In Proceedings of the nineteenth annual ACM symposium on Theory of computing, pages 345–354, 1987.
- [9] Thanh Nguyen and Rakesh Vohra. Near-feasible stable matchings with couples. American Economic Review, 108(11):3154–3169, 2018.
- [10] Ariel D. Procaccia, Isaac Robinson, and Jamie Tucker-Foltz. School redistricting: Wi** unfairness off the map. In Proc. ACM-SIAM SODA, 2024.
- [11] David B. Shmoys and Éva Tardos. An approximation algorithm for the generalized assignment problem. Math. Program., 62:461–474, 1993.
- [12] Mohit Singh and Lap Chi Lau. Approximating minimum bounded degree spanning trees to within one of optimal. In Proceedings of the Thirty-Ninth Annual ACM Symposium on Theory of Computing, STOC ’07, page 661–670, New York, NY, USA, 2007. Association for Computing Machinery.
- [13] A. H. Stone and J. W. Tukey. Generalized “sandwich” theorems. Duke Mathematical Journal, 9(2):356 – 359, 1942.
- [14] Walter Stromquist and D.R Woodall. Sets on which several measures agree. Journal of Mathematical Analysis and Applications, 108(1):241–248, 1985.