Nanyang Technological University

Slides:



Advertisements
Similar presentations
Competition in VM – Completing the Circle. Previous work in Competitive VM Mainly follower’s perspective: given state (say of seed selection) of previous.
Advertisements

Learning Influence Probabilities in Social Networks 1 2 Amit Goyal 1 Francesco Bonchi 2 Laks V. S. Lakshmanan 1 U. of British Columbia Yahoo! Research.
LEARNING INFLUENCE PROBABILITIES IN SOCIAL NETWORKS Amit Goyal Francesco Bonchi Laks V. S. Lakshmanan University of British Columbia Yahoo! Research University.
Minimizing Seed Set for Viral Marketing Cheng Long & Raymond Chi-Wing Wong Presented by: Cheng Long 20-August-2011.
Spread of Influence through a Social Network Adapted from :
Maximizing the Spread of Influence through a Social Network
DAVA: Distributing Vaccines over Networks under Prior Information
Maximizing the Spread of Influence through a Social Network
In Search of Influential Event Organizers in Online Social Networks
Least Cost Rumor Blocking in Social networks Lidan Fan Computer Science Department the University of Texas at Dallas.
Competitive Viral Marketing Based on: S. Bharathi et al. Competitive Influence Maximization in Social Networks, WINE C. Budak et al. Limiting the.
Maximizing the Spread of Influence through a Social Network By David Kempe, Jon Kleinberg, Eva Tardos Report by Joe Abrams.
Based on “Cascading Behavior in Networks: Algorithmic and Economic Issues” in Algorithmic Game Theory (Jon Kleinberg, 2007) and Ch.16 and 19 of Networks,
O N F LOW A UTHORITY D ISCOVERY IN S OCIAL N ETWORKS Arijit Khan, Xifeng Yan Computer Science University of California, Santa Barbara {arijitkhan,
Clustering short time series gene expression data Jason Ernst, Gerard J. Nau and Ziv Bar-Joseph BIOINFORMATICS, vol
The community-search problem and how to plan a successful cocktail party Mauro SozioAris Gionis Max Planck Institute, Germany Yahoo! Research, Barcelona.
Influence Maximization
Simpath: An Efficient Algorithm for Influence Maximization under Linear Threshold Model Amit Goyal Wei Lu Laks V. S. Lakshmanan University of British Columbia.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
Maximizing Product Adoption in Social Networks
Models of Influence in Online Social Networks
Distributed Constraint Optimization Michal Jakob Agent Technology Center, Dept. of Computer Science and Engineering, FEE, Czech Technical University A4M33MAS.
Network Aware Resource Allocation in Distributed Clouds.
Mehdi Kargar Aijun An York University, Toronto, Canada Discovering Top-k Teams of Experts with/without a Leader in Social Networks.
1 1 Stanford University 2 MPI for Biological Cybernetics 3 California Institute of Technology Inferring Networks of Diffusion and Influence Manuel Gomez.
Influence Maximization in Dynamic Social Networks Honglei Zhuang, Yihan Sun, Jie Tang, Jialin Zhang, Xiaoming Sun.
Understanding Crowds’ Migration on the Web Yong Wang Komal Pal Aleksandar Kuzmanovic Northwestern University
December 7-10, 2013, Dallas, Texas
Maximizing the Spread of Influence through a Social Network David Kempe, Jon Kleinberg, Eva Tardos Cornell University KDD 2003.
Maximizing the Spread of Influence through a Social Network Authors: David Kempe, Jon Kleinberg, É va Tardos KDD 2003.
Online Social Networks and Media
Lecture 3-1 Independent Cascade Weili Wu Ding-Zhu Du University of Texas at Dallas.
On Bharathi-Kempe-Salek Conjecture about Influence Maximization Ding-Zhu Du University of Texas at Dallas.
Algorithms For Solving History Sensitive Cascade in Diffusion Networks Research Proposal Georgi Smilyanov, Maksim Tsikhanovich Advisor Dr Yu Zhang Trinity.
Speaker : Yu-Hui Chen Authors : Dinuka A. Soysa, Denis Guangyin Chen, Oscar C. Au, and Amine Bermak From : 2013 IEEE Symposium on Computational Intelligence.
1 1 MPI for Intelligent Systems 2 Stanford University Manuel Gomez Rodriguez 1,2 Bernhard Schölkopf 1 S UBMODULAR I NFERENCE OF D IFFUSION NETWORKS FROM.
Instructor: Shengyu Zhang 1. Location change for the final 2 classes Nov 17: YIA 404 (Yasumoto International Academic Park 康本國際學術園 ) Nov 24: No class.
Biao Wang 1, Ge Chen 1, Luoyi Fu 1, Li Song 1, Xinbing Wang 1, Xue Liu 2 1 Shanghai Jiao Tong University 2 McGill University
Yu Wang1, Gao Cong2, Guojie Song1, Kunqing Xie1
Impact of Interference on Multi-hop Wireless Network Performance
Inferring Networks of Diffusion and Influence
Cohesive Subgraph Computation over Large Graphs
Wenyu Zhang From Social Network Group
Finding Dense and Connected Subgraphs in Dual Networks
Independent Cascade Model and Linear Threshold Model
Greedy & Heuristic algorithms in Influence Maximization
A Study of Group-Tree Matching in Large Scale Group Communications
Influence Maximization
Center for Complexity in Business, R. Smith School of Business
Diffusion and Viral Marketing in Networks
Friend Recommendation with a Target User in Social Networking Services
Multi - Way Number Partitioning
Independent Cascade Model and Linear Threshold Model
Influence Maximization
Maximizing the Spread of Influence through a Social Network
The Power of Two in Consistent Network Updates: Hard Loop Freedom, Easy Flow Migration Klaus-Tycho Förster and Roger Wattenhofer.
Data Integration with Dependent Sources
The Importance of Communities for Learning to Influence
Discovering Functional Communities in Social Media
Coverage Approximation Algorithms
A History Sensitive Cascade Model in Diffusion Networks
Bharathi-Kempe-Salek Conjecture
GANG: Detecting Fraudulent Users in OSNs
Lecture 6: Counting triangles Dynamic graphs & sampling
Ch09 _2 Approximation algorithm
Influence Maximization
Viral Marketing over Social Networks
Discovering Influential Nodes From Social Trust Network
Independent Cascade Model and Linear Threshold Model
Towards Maximum Independent Sets on Massive Graphs
Presentation transcript:

Nanyang Technological University Revenue Maximization by Viral Marketing: A Social Network Host’s Perspective Arijit Khan Nanyang Technological University Singapore Benjamin Zehnder Donald Kossmann ETH Zurich Microsoft Research Switzerland Redmond, USA

Viral Marketing in Social Networks 1/20 A. Khan, B. Zehnder, D. Kossmann

Viral Marketing in Social Networks Find a small subset of influential individuals in a social network, such that they can influence the largest number of people in the network. [Domingos et. al. KDD 2001, Kempe et. al. KDD 2003] 1/20 A. Khan, B. Zehnder, D. Kossmann

Viral Marketing in Social Networks Find a small subset of influential individuals in a social network, such that they can influence the largest number of people in the network. [Domingos et. al. KDD 2001, Kempe et. al. KDD 2003] A. Khan, B. Zehnder, D. Kossmann

Viral Marketing as a Service Challenges for Campaigners Social network graph is hidden by the host of the social network (e.g., Facebook, Twitter, LinkedIn) A campaigner (e.g., AT&T, Sony, Microsoft, Samsung) is unable to identify the top-k seed sets for maximizing her campaign 2/20 A. Khan, B. Zehnder, D. Kossmann

Viral Marketing as a Service Challenges for Campaigners Social network graph is hidden by the host of the social network (e.g., Facebook, Twitter, LinkedIn) A campaigner (e.g., AT&T, Sony, Microsoft, Samsung) is unable to identify the top-k seed sets for maximizing her campaign Social network host sells viral marketing campaigns – selects seed nodes for its client campaigners. [Lu et. al., KDD 2013] 2/20

Viral Marketing as a Service Challenges for Social Network Host multiple companies compete and they launch comparable products around the same time e.g., Microsoft’s Surface vs. Apple’s iPad vs. Samsung Note 3 Host needs to run multiple competing viral marketing campaigns together. 3/20

Viral Marketing as a Service Constraints Each campaigner spends her budget in two parts: - (a) her budget on the seed- set size (i.e., the number of seed users, k), - (b) how much money she is willing to pay to the host for each of her target users if that user adopts her product. An average user will purchase only one of the competing products  seed sets are mutually exclusive. 4/20

Our Problem: Host’s Revenue Maximization 5/20 A. Khan, B. Zehnder, D. Kossmann

Our Problem: Host’s Revenue Maximization How the campaigner selects the seed set for each of her client campaigner so that the host’s expected revenue is maximized? 5/20

Why Classical Viral Marketing May Not Work? [10$, 1$] [1$, 10$] [10$, 1$] [1$, 10$] [10$, 1$] [1$, 10$] [10$, 1$] [1$, 10$] Two campaigners C1, C2: seed set size for each campaigner is 1 6/20 A. Khan, B. Zehnder, D. Kossmann

Why Classical Viral Marketing May Not Work? [10$, 1$] [1$, 10$] C1 C2 [1$, 10$] [10$, 1$] [1$, 10$] [10$, 1$] [10$, 1$] [1$, 10$] Best Solution: V3  C1, V6  C2 . Host’s total revenue = 60$ 6/20 A. Khan, B. Zehnder, D. Kossmann

Why Classical Viral Marketing May Not Work? [10$, 1$] [1$, 10$] C1 [10$, 1$] [1$, 10$] [10$, 1$] [1$, 10$] [10$, 1$] [1$, 10$] Best seed node for C1 (individually): V4 Host’s maximum possible revenue from C1 (individually): 43$ 6/20 A. Khan, B. Zehnder, D. Kossmann

Why Classical Viral Marketing May Not Work? [10$, 1$] [1$, 10$] [10$, 1$] [1$, 10$] [10$, 1$] [1$, 10$] C2 [10$, 1$] [1$, 10$] Best seed node for C2 (individually): V5 Host’s maximum possible revenue from C2 (individually): 43$ 6/20 A. Khan, B. Zehnder, D. Kossmann

Why Classical Viral Marketing May Not Work? [10$, 1$] [1$, 10$] C2 C1 [10$, 1$] [1$, 10$] [10$, 1$] [1$, 10$] [10$, 1$] [1$, 10$] V4  C1, V5  C2 . Host’s total revenue = 44$ Suboptimal Solution! 6/20

Roadmap Motivation Related Work Influence Diffusion Models Approximate Algorithms Greedy Heuristics Experimental Results Conclusion 7/20 A. Khan, B. Zehnder, D. Kossmann

Related Work Influence Maximization Competitive Viral Marketing Domingos et. al. KDD 2001 Kempe et. al. KDD 2003 Competitive Viral Marketing Preventing the spread of an existing negative campaign [Bharathi et. al., WINE 2007] [Borodin et. al., WINE 2007] Non-cooperative campaigns who select seeds alternatively [Fazeli et. al., CDC 2012] [Tzoumas et. al., WINE 2012] Competing campaigners promote their products at the same time [Li et. al., SIGMOD 2015] Viral Marketing by Social Network Host Lu et. al. KDD 2013 8/20

Related Work Influence Maximization Competitive Viral Marketing Domingos et. al. KDD 2001 Kempe et. al. KDD 2003 Competitive Viral Marketing Host’s revenue maximization by viral marketing is a novel problem. Preventing the spread of an existing negative campaign [Bharathi et. al., WINE 2007] [Borodin et. al., WINE 2007] Non-cooperative campaigns who select seeds alternatively [Fazeli et. al., CDC 2012] [Tzoumas et. al., WINE 2012] Competing campaigners promote their products at the same time [Li et. al., SIGMOD 2015] Viral Marketing by Social Network Host Lu et. al. KDD 2013 8/20 A. Khan, B. Zehnder, D. Kossmann

Influence Diffusion Models Multi-Campaigner Independent Cascade Model (MCIC) Budak et. al. [WWW 2011] Similar to Single-Campaigner IC model When node u first becomes active with campaign of Ci, it gets a single chance to activate each of its currently inactive out-neighbors v with campaign of Ci .It succeeds with probability p(u,v). An activated node v adopts one campaign uniform at random from all its in-neighbors which were successfully activated in the last round. Each node can be activated only once and by only one of the campaigns; also the node stays activated with that campaign until the end 9/20 A. Khan, B. Zehnder, D. Kossmann

Influence Diffusion Models Multi-Campaigner Independent Cascade Model (MCIC) Budak et. al. [WWW 2011] Similar to Single-Campaigner IC model All Possible Worlds Pr(v3, C1) = 0.4 + ½ (0.1) = 0.45 Pr(v3, C2) = 0.1 + ½ (0.1) = 0.15 9/20 A. Khan, B. Zehnder, D. Kossmann

Influence Diffusion Models Multi-Campaigner Independent Cascade Model (MCIC) Budak et. al. [WWW 2011] Similar to Single-Campaigner IC model All Possible Worlds People adopt a product when they come in direct contact with their friends who very recently adopted that product. Pr(v3, C1) = 0.4 + ½ (0.1) = 0.45 Pr(v3, C2) = 0.1 + ½ (0.1) = 0.15 9/20

Influence Diffusion Models Multi-Campaigner Linear Threshold Model (K-LT) Lu et. al. [KDD 2013] Similar to Single-Campaigner LT model If the sum of the probabilities of the incoming edges from all active nodes is greater than or equal to the activation threshold of an inactive node, then the node gets activated in the next round Let us consider all nodes u that were activated in the last round and contributed to the activation of a node v in the current round. Then, v will adopt the same campaign as that of u with probability p(u,v)/ ∑u p(u,v) Each node can be activated only once and by only one of the campaigns; also the node stays activated with that campaign until the end 10/20 A. Khan, B. Zehnder, D. Kossmann

Influence Diffusion Models Multi-Campaigner Linear Threshold Model (K-LT) Lu et. al. [KDD 2013] Similar to Single-Campaigner LT model Time step t1: v2 becomes active with C1 Time step t2: v3 becomes active also with C1 10/20 A. Khan, B. Zehnder, D. Kossmann

Influence Diffusion Models Multi-Campaigner Linear Threshold Model (K-LT) Lu et. al. [KDD 2013] Similar to Single-Campaigner LT model Time step t1: v2 becomes active with C1 Time step t2: v3 becomes active also with C1 A user adopts a technology only when more than a threshold number of her neighbors adopted a similar technology. However, once the user decides to adopt, she selects the specific product only based on her neighbors who most recently adopted it. 10/20

Our Contribution: Complexity Results Host’s revenue maximization problem is NP-hard under MCIC and K-LT models. Host’s revenue maximization problem is neither monotonic, nor sub-modular under MCIC and K-LT models. 11/20 A. Khan, B. Zehnder, D. Kossmann

Our Contribution: Complexity Results Host’s revenue maximization problem is NP-hard under MCIC and K-LT models. Host’s revenue maximization problem is neither monotonic, nor sub-modular under MCIC and K-LT models. 1.0 u v [3$, 5$] [8$, 9$] Counter-example of monotonicity C2  v, Host’s revenue = 14$ C2 v, C1 u, Host’s revenue = 12$ C1  u, Host’s revenue = 11$ C1 u, C2 v, Host’s revenue = 12$ A. Khan, B. Zehnder, D. Kossmann

Our Contribution: Theoretical Results Polynomial-time exact solution over tree dataset under both MCIC and K-LT models Polynomial-time approximate solution over graph dataset under K- LT model*, and theoretical performance guarantee: * with an additional constraint that each campaigner has the same number of seed nodes. Here, m is the number of campaigners. 12/20 A. Khan, B. Zehnder, D. Kossmann

Algorithm: MCIC Model [RevMax-C] Exact Algorithm over Tree Dataset Dynamic programming over binary tree 13/20 A. Khan, B. Zehnder, D. Kossmann

Algorithm: MCIC Model [RevMax-C] Exact Algorithm over Tree Dataset Dynamic programming over binary tree 13/20

Algorithm: MCIC Model [RevMax-C] Exact Algorithm over Tree Dataset Dynamic programming over binary tree

Algorithm: MCIC Model [RevMax-C] Exact Algorithm over Tree Dataset Dynamic programming over binary tree Time Complexity: O(ndm2k2m) n = no of nodes d = depth of tree m = no of campaigners k = seed nodes per campaigner 13/20

Algorithm: MCIC Model [RevMax-C] Heuristic Algorithm over Graph Dataset Find most influential tree from graph dataset Convert most influential tree to an equivalent binary tree Apply dynamic algorithm over binary tree 14/20 A. Khan, B. Zehnder, D. Kossmann

Algorithm: K-LT Model [RevMax-C] Approximate Algorithm over Graph Dataset Two-step method with overall performance guarantee: Find km best seed nodes optimistically assuming that there is only one campaigner Optimally partition the seed nodes among m campaigners Time Complexity: O(mkn(n+e)t + m2k + mkm) n = no of nodes, e = no of edges t = no of MC Samples m = no of campaigners k = seed nodes per campaigner 15/20

Efficient Heuristic Algorithm [RevMax-S] Sort the campaigners in descending order of the expected revenue from that campaigner. Apply classical viral marketing algorithms to find the seed set for each campaigner in order. Delete already selected seed nodes of previous campaigners before deciding seed nodes for the current campaigner. Time Complexity: O(mkn(n+e)t ) n = no of nodes, e = no of edges t = no of MC Samples m = no of campaigners k = seed nodes per campaigner 16/20

List of Experiments Datasets: Revenue Distribution Models: - Uniform (U) - Not Equal (NE) - Clustering with Low Competition (CLC) - Clustering with High Competition (CHC) - Clustering with Not Equal Competition (CNC) Algorithms (RevMax-C, RevMax-S): host’s expected revenue, running time, and scalability under MCIC and K-LT models Revenue Improvement Rate (RIR): ratio of the host’s expected revenue obtained from the seed sets identified by RevMax-C (or, RevMax-S) with respect to the host’s revenue obtained from a random seed sets.

List of Experiments Datasets: Revenue Distribution Models: - Uniform (U) - Not Equal (NE) - Clustering with Low Competition (CLC) - Clustering with High Competition (CHC) - Clustering with Not Equal Competition (CNC) We vary the number of campaigners and the number of seed nodes per campaigner Algorithms (RevMax-C, RevMax-S): host’s expected revenue, running time, and scalability under MCIC and K-LT models Revenue Improvement Rate (RIR): ratio of the host’s expected revenue obtained from the seed sets identified by RevMax-C (or, RevMax-S) with respect to the host’s revenue obtained from a random seed sets.

Experimental Results: MCIC Influence Cascade Efficiency of Seeds Finding Effectiveness in terms of Host’s Revenue 18/20

Experimental Results: Scalability of RevMax-S Varying Number of Seed Nodes Varying Number of Campaigners 19/20 A. Khan, B. Zehnder, D. Kossmann

Conclusions Host’s revenue maximization by viral marketing – novel problem NP-hard, neither monotonic, nor sub-modular Algorithms - RevMax-C [approximation guarantees under additional constraints] - RevMax-S [more efficient greedy heuristic] RevMax-C usually outperforms RevMax-S by 5~10% in terms of host’s revenue. RevMax-S scalable for more number of seeds and campaigners Future Work: more efficient algorithms, how the campaigner divides her budget optimally? 20/20 A. Khan, B. Zehnder, D. Kossmann

Questions? A. Khan, B. Zehnder, D. Kossmann