SlideShare une entreprise Scribd logo
1  sur  28
Revenue Maximization in
Incentivized Social Advertising
Cigdem Aslay1, Francesco Bonchi1, Laks VS Lakshmanan2, Wei Lu3
• Given
• a directed social network G = (V,E)
• a propagation model m
• a cardinality budget k
• Define
• S: initial set of k (seed) nodes to start the propagation
• σm(S): expected size of the influence propagation from S
• Find
S⇤
= argmax
S✓V,|S|=k
m(S)
Influence Maximization
* Kempe et al., “Maximizing the spread of influence through a social network”, KDD 2003 2
Discrete Optimization Problem*
Influence Propagation Models
Independent Cascade (IC) Model
• Each arc (u,v) is associated with an influence probability puv
• A node u activated at time t tries to influence each inactive neighbor v, with a
success probability puv
Topic-aware Independent Cascade (TIC) Model*
• An item i described as a distribution over K topics:
• Topic specific influence probabilities on arcs:
• Item specific success probabilities on arcs:
*N. Barbieri, F. Bonchi and G. Manco, “Topic-aware Social Influence Propagation Models”, ICDM 2012 3
Complexity and Approximation
• Influence Maximization is NP-Hard under IC model
• TIC boils down to IC on the probabilistic graph Gi = (V,A,pi)
• Reduction from the Set Cover problem
• Greedy algorithm
• (1 – 1/e)-approximation* using monotonicity1 and submodularity2
4
#P-hard
*Nemhauser et al., “An analysis of approximations for maximizing submodular set functions I”, Mathematical Programming 1978
5
A market that did not exist until Facebook launched its first advertising
service in May 2005, projected to generate $11 billion revenue by 2017*
Social Advertising
https://www.emarketer.com/Article/Social-Network-Ad-Spending-Hit-2368-Billion-Worldwide-2015/1012357
http://www.unified.com/historyofsocialadvertising/
nice ad! indeed!
6
Social Advertising
Promoted Posts
• Implemented by online social networking platforms
• Similar to organic posts from friends in the social network
• Contain an advertising message: text, image or video
• Can propagate to friends via social actions: “likes”, “shares”
Incentivized Social Advertising
seed user
incentive
(cost)
ad-engagement
revenue (cpe)
budget
Incentivized Social Advertising
Incentivized Social Advertising
CPE Model with Seed User Incentives
9
• Advertiser
• Pays a fixed CPE to host for each
engagement
• Pays monetary incentive to each seed user
promoting its ad
• Net payment subject to its budget
• Host
• Selects initial endorsers (seed users) for each ad participating in the campaign
• Seed users take a cut from the social advertising budget in exchange
• Sells the resulting ad-engagements to advertisers
 Bi.
Revenue Maximization
• Given
• a social graph G = (V,E)
• TIC propagation model
• h advertisers with budget Bi and CPE(i) for each ad i
• seed user incentives ci(u) for each user u∈V and for each ad i
• Find an allocation S = (S1, …, Sh) that maximizes the
overall revenue of the host from the allocation:
10
X
i
⇡i =
X
i
cpe(i) · i(Si).
Theoretical Analysis
• Revenue-Maximization problem is NP-hard
• Restricted special case with h = 1:
• NP-Hard Submodular-Cost Submodular-Knapsack (SCSK)
problem*
11*Iyer et al., “Submodular optimization with submodular cover and submodular knapsack constraints”, NIPS 2013.
Partition matroid
Submodular knapsack constraints
• Family 𝘊 of feasible solutions form an Independence System
Theoretical Analysis
• Cost-Agnostic Greedy Algorithm (CA-Greedy)
• Selects (node,ad) pair giving the max. marginal increase in revenue
12
Two greedy approximation algorithms w/ different sensitivity to seed user
incentives during the node selection
• Cost-Sensitive Greedy Algorithm (CS-Greedy)
• Selects the feasible (node,ad) pair giving the max. rate of marginal
gain in revenue per marginal gain in payment
#P-Hard!
Theoretical Analysis
• Cost-Agnostic Greedy Algorithm (CA-Greedy)
• Theorem: Approximation guarantee follows* from the fact that 𝘊
forms an independence system
where
• R and r are, respectively, upper and lower rank of 𝘊
• κπ is the curvature of total revenue function π(.)
13
* Conforti et al., "Submodular set functions, matroids and the greedy algorithm: tight worst-case bounds and some
generalizations of the Rado-Edmonds theorem.", Discrete Applied Mathematics 1984
Theoretical Analysis
• Cost-Agnostic Greedy Algorithm (CA-Greedy)
• Tightness of cost-agnostic bound.
14
Optimal solution
• T = {a,c} with 𝜋(T) = 6
CA-Greedy solution
• S = {b} with 𝜋(S) = 3
B = 7, cpe = 1
r = 1, R = 2
κ 𝜋 = 1
Theoretical Analysis
• Cost-Sensitive Greedy Algorithm (CS-Greedy)
• Theorem: Approximation guarantee obtained
where
• ρmax and ρmin are, respectively, max. and min. singleton payments
• κρi is the curvature of ad i’s payment function ρi(.)
15
Tightness of cost-sensitive approximation is open.
Scalable Algorithms
Two-Phase Iterative Revenue Maximization
• Built on TIM algorithm [Tang et al. SIGMOD 2014]; uses
Reverse-Reachable sets [Borgs et al. SODA 2014].
Random RR-Set:
• Sample a possible world X from G: remove every edge (u,v) with
probability 1 – puv
• Pick a target node v from G uniformly at random
• RR-set of v = {nodes that can reach v via out-links in X}
TIM Algorithm:
• Estimates influence spread for the most influential “s” nodes from a
random sample of (RR-Sets) of size
16
= L(s, ✏)
Scalable Algorithms
Two-Phase Iterative Revenue Maximization
* Tang et al., “Influence maximization: Near-optimal time complexity meets practical efficiency”, SIGMOD 2014
Two-Phase Influence Maximization (TIM) Algorithm*
• Accurately estimates the influence spread of any set S of at most “s”
nodes from a random sample R of “L(s,ε)” RR-Sets
• L(s,ε): Lower bound on the statistically sufficient sample size required
• Unbiased estimator:
TIM cannot be directly employed: requires
predefined seed set size s
Built on the Reverse Influence Sampling framework of TIM
17
Scalable Algorithms
Two-Phase Iterative Revenue Maximization
• Built on the Reverse Influence Sampling framework of TIM*
• Latent seed set size estimation
• Start with a safe initial seed set size si
• Sample L(si,ε) RR sets required for si
• Update si based on current payment
• Revise L(si,ε), sample additional RR sets, revise estimates
18
Two-Phase Iterative Cost-Agnostic
Revenue Maximization (TI-CARM)
* Tang et al., “Influence maximization: Near-optimal time complexity meets practical efficiency”, SIGMOD 2014
Scalable CA-Greedy
Two-Phase Iterative Cost-Sensitive
Revenue Maximization (TI-CSRM)
Scalable CS-Greedy
• Theorem: Deterioration in the approximation guarantees (see paper).
Datasets and Parameters
19
TIC EM
Learning
TIC WC
Model
WC
Model
WC
Model
Peer influence
probabilities:
Experiments
Algorithms Tested
20
Experiments
}• TI-CARM
• TI-CSRM
• PageRank-GR
• For each ad i, find the best candidate user wrt Pagerank ordering
• Among those, select the (user, ad) pair giving maximum marginal increase in the
revenue of the host
• PageRank-RR
• For each ad i, find the best candidate user wrt Pagerank ordering
• Use round-robin ordering of advertisers to select the (user, ad) pair
• ε set to 0.1 for quality experiments on FLIXSTER and EPINIONS
• ε set to 0.3 for scalability experiments on DBLP and LIVEJOURNAL
Seed Incentives Models
21
Experiments
• Linear incentives
• Proportional to the node’s ad-specific singleton influence spread
• Constant incentives
• Proportional to the average ad-specific singleton influence spread
• Sublinear incentives
• Proportional to the logarithm of node's ad-specific singleton influence spread
22
Total Revenue
23
Total Seeding Cost
24
Revenue vs Running Time Trade-off
25
Scalability Results - Running Time
26
Scalability Results - Memory (GB)
• TI-C*RM could be built on top of more recent
approximation algorithms — IMM and Stop & Stare.
• Further scalability?
• All these algorithms require significant memory usage,
which limits scalability.
• Hard competition?
• Adaptive revenue maximization?
• Tightness of cost-sensitive approximation?



Tang et al. SIGMOD 2015. 



Nguyen et al. arXiv 2016-2017; Keke et al. PVLDB 2017.
27
†
†
‡
‡
Open Problems
Thank you!

Contenu connexe

Tendances

Incremental collaborative filtering via evolutionary co clustering
Incremental collaborative filtering via evolutionary co clusteringIncremental collaborative filtering via evolutionary co clustering
Incremental collaborative filtering via evolutionary co clusteringAllen Wu
 
Matrix Factorization In Recommender Systems
Matrix Factorization In Recommender SystemsMatrix Factorization In Recommender Systems
Matrix Factorization In Recommender SystemsYONG ZHENG
 
(141205) Masters_Thesis_Defense_Sundong_Kim
(141205) Masters_Thesis_Defense_Sundong_Kim(141205) Masters_Thesis_Defense_Sundong_Kim
(141205) Masters_Thesis_Defense_Sundong_KimSundong Kim
 
A scalable collaborative filtering framework based on co clustering
A scalable collaborative filtering framework based on co clusteringA scalable collaborative filtering framework based on co clustering
A scalable collaborative filtering framework based on co clusteringAllenWu
 
Tutorial: Context In Recommender Systems
Tutorial: Context In Recommender SystemsTutorial: Context In Recommender Systems
Tutorial: Context In Recommender SystemsYONG ZHENG
 
Algorithmic Music Recommendations at Spotify
Algorithmic Music Recommendations at SpotifyAlgorithmic Music Recommendations at Spotify
Algorithmic Music Recommendations at SpotifyChris Johnson
 
Co-clustering of multi-view datasets: a parallelizable approach
Co-clustering of multi-view datasets: a parallelizable approachCo-clustering of multi-view datasets: a parallelizable approach
Co-clustering of multi-view datasets: a parallelizable approachAllen Wu
 
A Novel Target Marketing Approach based on Influence Maximization
A Novel Target Marketing Approach based on Influence MaximizationA Novel Target Marketing Approach based on Influence Maximization
A Novel Target Marketing Approach based on Influence MaximizationSurendra Gadwal
 
Combinatorial optimization and deep reinforcement learning
Combinatorial optimization and deep reinforcement learningCombinatorial optimization and deep reinforcement learning
Combinatorial optimization and deep reinforcement learning민재 정
 
Artem Baklanov - Votes Aggregation Techniques in Geo-Wiki Crowdsourcing Game:...
Artem Baklanov - Votes Aggregation Techniques in Geo-Wiki Crowdsourcing Game:...Artem Baklanov - Votes Aggregation Techniques in Geo-Wiki Crowdsourcing Game:...
Artem Baklanov - Votes Aggregation Techniques in Geo-Wiki Crowdsourcing Game:...AIST
 
Collaborative Filtering at Spotify
Collaborative Filtering at SpotifyCollaborative Filtering at Spotify
Collaborative Filtering at SpotifyErik Bernhardsson
 
[SOCRS2013]Differential Context Modeling in Collaborative Filtering
[SOCRS2013]Differential Context Modeling in Collaborative Filtering[SOCRS2013]Differential Context Modeling in Collaborative Filtering
[SOCRS2013]Differential Context Modeling in Collaborative FilteringYONG ZHENG
 
Tutorial on Theory and Application of Generative Adversarial Networks
Tutorial on Theory and Application of Generative Adversarial NetworksTutorial on Theory and Application of Generative Adversarial Networks
Tutorial on Theory and Application of Generative Adversarial NetworksMLReview
 
Merl multimodal event representation learning
Merl multimodal event representation learningMerl multimodal event representation learning
Merl multimodal event representation learningtaeseon ryu
 
RecSys Challenge 2014, SemWexMFF group
RecSys Challenge 2014, SemWexMFF groupRecSys Challenge 2014, SemWexMFF group
RecSys Challenge 2014, SemWexMFF groupLadislav Peska
 
Deep Multi-agent Reinforcement Learning
Deep Multi-agent Reinforcement LearningDeep Multi-agent Reinforcement Learning
Deep Multi-agent Reinforcement Learningdeawoo Kim
 
Garuda Robotics x DataScience SG Meetup (Sep 2015)
Garuda Robotics x DataScience SG Meetup (Sep 2015)Garuda Robotics x DataScience SG Meetup (Sep 2015)
Garuda Robotics x DataScience SG Meetup (Sep 2015)Eugene Yan Ziyou
 
[RIIT 2017] Identifying Grey Sheep Users By The Distribution of User Similari...
[RIIT 2017] Identifying Grey Sheep Users By The Distribution of User Similari...[RIIT 2017] Identifying Grey Sheep Users By The Distribution of User Similari...
[RIIT 2017] Identifying Grey Sheep Users By The Distribution of User Similari...YONG ZHENG
 

Tendances (19)

Incremental collaborative filtering via evolutionary co clustering
Incremental collaborative filtering via evolutionary co clusteringIncremental collaborative filtering via evolutionary co clustering
Incremental collaborative filtering via evolutionary co clustering
 
Matrix Factorization In Recommender Systems
Matrix Factorization In Recommender SystemsMatrix Factorization In Recommender Systems
Matrix Factorization In Recommender Systems
 
(141205) Masters_Thesis_Defense_Sundong_Kim
(141205) Masters_Thesis_Defense_Sundong_Kim(141205) Masters_Thesis_Defense_Sundong_Kim
(141205) Masters_Thesis_Defense_Sundong_Kim
 
A scalable collaborative filtering framework based on co clustering
A scalable collaborative filtering framework based on co clusteringA scalable collaborative filtering framework based on co clustering
A scalable collaborative filtering framework based on co clustering
 
Tutorial: Context In Recommender Systems
Tutorial: Context In Recommender SystemsTutorial: Context In Recommender Systems
Tutorial: Context In Recommender Systems
 
Algorithmic Music Recommendations at Spotify
Algorithmic Music Recommendations at SpotifyAlgorithmic Music Recommendations at Spotify
Algorithmic Music Recommendations at Spotify
 
Co-clustering of multi-view datasets: a parallelizable approach
Co-clustering of multi-view datasets: a parallelizable approachCo-clustering of multi-view datasets: a parallelizable approach
Co-clustering of multi-view datasets: a parallelizable approach
 
A Novel Target Marketing Approach based on Influence Maximization
A Novel Target Marketing Approach based on Influence MaximizationA Novel Target Marketing Approach based on Influence Maximization
A Novel Target Marketing Approach based on Influence Maximization
 
Combinatorial optimization and deep reinforcement learning
Combinatorial optimization and deep reinforcement learningCombinatorial optimization and deep reinforcement learning
Combinatorial optimization and deep reinforcement learning
 
Artem Baklanov - Votes Aggregation Techniques in Geo-Wiki Crowdsourcing Game:...
Artem Baklanov - Votes Aggregation Techniques in Geo-Wiki Crowdsourcing Game:...Artem Baklanov - Votes Aggregation Techniques in Geo-Wiki Crowdsourcing Game:...
Artem Baklanov - Votes Aggregation Techniques in Geo-Wiki Crowdsourcing Game:...
 
Collaborative Filtering at Spotify
Collaborative Filtering at SpotifyCollaborative Filtering at Spotify
Collaborative Filtering at Spotify
 
[SOCRS2013]Differential Context Modeling in Collaborative Filtering
[SOCRS2013]Differential Context Modeling in Collaborative Filtering[SOCRS2013]Differential Context Modeling in Collaborative Filtering
[SOCRS2013]Differential Context Modeling in Collaborative Filtering
 
Tutorial on Theory and Application of Generative Adversarial Networks
Tutorial on Theory and Application of Generative Adversarial NetworksTutorial on Theory and Application of Generative Adversarial Networks
Tutorial on Theory and Application of Generative Adversarial Networks
 
Merl multimodal event representation learning
Merl multimodal event representation learningMerl multimodal event representation learning
Merl multimodal event representation learning
 
RecSys Challenge 2014, SemWexMFF group
RecSys Challenge 2014, SemWexMFF groupRecSys Challenge 2014, SemWexMFF group
RecSys Challenge 2014, SemWexMFF group
 
Deep Multi-agent Reinforcement Learning
Deep Multi-agent Reinforcement LearningDeep Multi-agent Reinforcement Learning
Deep Multi-agent Reinforcement Learning
 
Deep Generative Models - Kevin McGuinness - UPC Barcelona 2018
Deep Generative Models - Kevin McGuinness - UPC Barcelona 2018Deep Generative Models - Kevin McGuinness - UPC Barcelona 2018
Deep Generative Models - Kevin McGuinness - UPC Barcelona 2018
 
Garuda Robotics x DataScience SG Meetup (Sep 2015)
Garuda Robotics x DataScience SG Meetup (Sep 2015)Garuda Robotics x DataScience SG Meetup (Sep 2015)
Garuda Robotics x DataScience SG Meetup (Sep 2015)
 
[RIIT 2017] Identifying Grey Sheep Users By The Distribution of User Similari...
[RIIT 2017] Identifying Grey Sheep Users By The Distribution of User Similari...[RIIT 2017] Identifying Grey Sheep Users By The Distribution of User Similari...
[RIIT 2017] Identifying Grey Sheep Users By The Distribution of User Similari...
 

Similaire à Revenue Maximization in Incentivized Social Advertising

Introduction to algorithmic aspect of auction theory
Introduction to algorithmic aspect of auction theoryIntroduction to algorithmic aspect of auction theory
Introduction to algorithmic aspect of auction theoryAbner Chih Yi Huang
 
Multi-Armed Bandit: an algorithmic perspective
Multi-Armed Bandit: an algorithmic perspectiveMulti-Armed Bandit: an algorithmic perspective
Multi-Armed Bandit: an algorithmic perspectiveGabriele Sottocornola
 
Scheduling advertisements on a web page to maximize revenue
Scheduling advertisements on a web page to maximize revenueScheduling advertisements on a web page to maximize revenue
Scheduling advertisements on a web page to maximize revenueShu-Jeng Hsieh
 
Applying Linear Optimization Using GLPK
Applying Linear Optimization Using GLPKApplying Linear Optimization Using GLPK
Applying Linear Optimization Using GLPKJeremy Chen
 
Unsupervised Learning: Clustering
Unsupervised Learning: Clustering Unsupervised Learning: Clustering
Unsupervised Learning: Clustering Experfy
 
Machine Learning driven Quantum Optimization for Marketing
Machine Learning driven Quantum Optimization for MarketingMachine Learning driven Quantum Optimization for Marketing
Machine Learning driven Quantum Optimization for MarketingDeep Learning Italia
 
Methodologies for the Development of Crowd and Social-based applications
Methodologies for the Development of Crowd and Social-based applicationsMethodologies for the Development of Crowd and Social-based applications
Methodologies for the Development of Crowd and Social-based applicationsAndrea Mauri
 
Reinforcement Learning (Reloaded) - Xavier Giró-i-Nieto - UPC Barcelona 2018
Reinforcement Learning (Reloaded) - Xavier Giró-i-Nieto - UPC Barcelona 2018Reinforcement Learning (Reloaded) - Xavier Giró-i-Nieto - UPC Barcelona 2018
Reinforcement Learning (Reloaded) - Xavier Giró-i-Nieto - UPC Barcelona 2018Universitat Politècnica de Catalunya
 
An explorative approach for Crowdsourcing tasks design
An explorative approach for Crowdsourcing tasks design �An explorative approach for Crowdsourcing tasks design �
An explorative approach for Crowdsourcing tasks design Andrea Mauri
 
Big-O(Q) VLDB 2015 Keynote: Social Network Analytics: Beyond the Obvious
Big-O(Q) VLDB 2015 Keynote: Social Network Analytics: Beyond the ObviousBig-O(Q) VLDB 2015 Keynote: Social Network Analytics: Beyond the Obvious
Big-O(Q) VLDB 2015 Keynote: Social Network Analytics: Beyond the ObviousLaks Lakshmanan
 
Big-O(Q) Social Network Analytics
Big-O(Q) Social Network AnalyticsBig-O(Q) Social Network Analytics
Big-O(Q) Social Network AnalyticsLaks Lakshmanan
 
Machine Learning Applications in Credit Risk
Machine Learning Applications in Credit RiskMachine Learning Applications in Credit Risk
Machine Learning Applications in Credit RiskQuantUniversity
 
XGBoost @ Fyber
XGBoost @ FyberXGBoost @ Fyber
XGBoost @ FyberDaniel Hen
 
Machine learning for profit: Computational advertising landscape
Machine learning for profit: Computational advertising landscapeMachine learning for profit: Computational advertising landscape
Machine learning for profit: Computational advertising landscapeSharat Chikkerur
 
Operations Research.pptx
Operations Research.pptxOperations Research.pptx
Operations Research.pptxbanhi.guha
 
Introduction to machine learning and model building using linear regression
Introduction to machine learning and model building using linear regressionIntroduction to machine learning and model building using linear regression
Introduction to machine learning and model building using linear regressionGirish Gore
 
Fast Parallel Similarity Calculations with FPGA Hardware
Fast Parallel Similarity Calculations with FPGA HardwareFast Parallel Similarity Calculations with FPGA Hardware
Fast Parallel Similarity Calculations with FPGA HardwareTigerGraph
 
[CIKM 2014] Deviation-Based Contextual SLIM Recommenders
[CIKM 2014] Deviation-Based Contextual SLIM Recommenders[CIKM 2014] Deviation-Based Contextual SLIM Recommenders
[CIKM 2014] Deviation-Based Contextual SLIM RecommendersYONG ZHENG
 

Similaire à Revenue Maximization in Incentivized Social Advertising (20)

Big Data Challenges and Solutions
Big Data Challenges and SolutionsBig Data Challenges and Solutions
Big Data Challenges and Solutions
 
Introduction to algorithmic aspect of auction theory
Introduction to algorithmic aspect of auction theoryIntroduction to algorithmic aspect of auction theory
Introduction to algorithmic aspect of auction theory
 
Multi-Armed Bandit: an algorithmic perspective
Multi-Armed Bandit: an algorithmic perspectiveMulti-Armed Bandit: an algorithmic perspective
Multi-Armed Bandit: an algorithmic perspective
 
Scheduling advertisements on a web page to maximize revenue
Scheduling advertisements on a web page to maximize revenueScheduling advertisements on a web page to maximize revenue
Scheduling advertisements on a web page to maximize revenue
 
Applying Linear Optimization Using GLPK
Applying Linear Optimization Using GLPKApplying Linear Optimization Using GLPK
Applying Linear Optimization Using GLPK
 
Introduction to Deep Reinforcement Learning
Introduction to Deep Reinforcement LearningIntroduction to Deep Reinforcement Learning
Introduction to Deep Reinforcement Learning
 
Unsupervised Learning: Clustering
Unsupervised Learning: Clustering Unsupervised Learning: Clustering
Unsupervised Learning: Clustering
 
Machine Learning driven Quantum Optimization for Marketing
Machine Learning driven Quantum Optimization for MarketingMachine Learning driven Quantum Optimization for Marketing
Machine Learning driven Quantum Optimization for Marketing
 
Methodologies for the Development of Crowd and Social-based applications
Methodologies for the Development of Crowd and Social-based applicationsMethodologies for the Development of Crowd and Social-based applications
Methodologies for the Development of Crowd and Social-based applications
 
Reinforcement Learning (Reloaded) - Xavier Giró-i-Nieto - UPC Barcelona 2018
Reinforcement Learning (Reloaded) - Xavier Giró-i-Nieto - UPC Barcelona 2018Reinforcement Learning (Reloaded) - Xavier Giró-i-Nieto - UPC Barcelona 2018
Reinforcement Learning (Reloaded) - Xavier Giró-i-Nieto - UPC Barcelona 2018
 
An explorative approach for Crowdsourcing tasks design
An explorative approach for Crowdsourcing tasks design �An explorative approach for Crowdsourcing tasks design �
An explorative approach for Crowdsourcing tasks design
 
Big-O(Q) VLDB 2015 Keynote: Social Network Analytics: Beyond the Obvious
Big-O(Q) VLDB 2015 Keynote: Social Network Analytics: Beyond the ObviousBig-O(Q) VLDB 2015 Keynote: Social Network Analytics: Beyond the Obvious
Big-O(Q) VLDB 2015 Keynote: Social Network Analytics: Beyond the Obvious
 
Big-O(Q) Social Network Analytics
Big-O(Q) Social Network AnalyticsBig-O(Q) Social Network Analytics
Big-O(Q) Social Network Analytics
 
Machine Learning Applications in Credit Risk
Machine Learning Applications in Credit RiskMachine Learning Applications in Credit Risk
Machine Learning Applications in Credit Risk
 
XGBoost @ Fyber
XGBoost @ FyberXGBoost @ Fyber
XGBoost @ Fyber
 
Machine learning for profit: Computational advertising landscape
Machine learning for profit: Computational advertising landscapeMachine learning for profit: Computational advertising landscape
Machine learning for profit: Computational advertising landscape
 
Operations Research.pptx
Operations Research.pptxOperations Research.pptx
Operations Research.pptx
 
Introduction to machine learning and model building using linear regression
Introduction to machine learning and model building using linear regressionIntroduction to machine learning and model building using linear regression
Introduction to machine learning and model building using linear regression
 
Fast Parallel Similarity Calculations with FPGA Hardware
Fast Parallel Similarity Calculations with FPGA HardwareFast Parallel Similarity Calculations with FPGA Hardware
Fast Parallel Similarity Calculations with FPGA Hardware
 
[CIKM 2014] Deviation-Based Contextual SLIM Recommenders
[CIKM 2014] Deviation-Based Contextual SLIM Recommenders[CIKM 2014] Deviation-Based Contextual SLIM Recommenders
[CIKM 2014] Deviation-Based Contextual SLIM Recommenders
 

Dernier

Defining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryDefining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryJeremy Anderson
 
What To Do For World Nature Conservation Day by Slidesgo.pptx
What To Do For World Nature Conservation Day by Slidesgo.pptxWhat To Do For World Nature Conservation Day by Slidesgo.pptx
What To Do For World Nature Conservation Day by Slidesgo.pptxSimranPal17
 
The Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptx
The Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptxThe Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptx
The Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptxTasha Penwell
 
wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...
wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...
wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...KarteekMane1
 
Networking Case Study prepared by teacher.pptx
Networking Case Study prepared by teacher.pptxNetworking Case Study prepared by teacher.pptx
Networking Case Study prepared by teacher.pptxHimangsuNath
 
Bank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis ProjectBank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis ProjectBoston Institute of Analytics
 
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...Boston Institute of Analytics
 
Cyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded dataCyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded dataTecnoIncentive
 
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...Milind Agarwal
 
INTRODUCTION TO Natural language processing
INTRODUCTION TO Natural language processingINTRODUCTION TO Natural language processing
INTRODUCTION TO Natural language processingsocarem879
 
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...Thomas Poetter
 
modul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptxmodul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptxaleedritatuxx
 
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdfEnglish-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdfblazblazml
 
Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Seán Kennedy
 
SMOTE and K-Fold Cross Validation-Presentation.pptx
SMOTE and K-Fold Cross Validation-Presentation.pptxSMOTE and K-Fold Cross Validation-Presentation.pptx
SMOTE and K-Fold Cross Validation-Presentation.pptxHaritikaChhatwal1
 
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...Dr Arash Najmaei ( Phd., MBA, BSc)
 
Principles and Practices of Data Visualization
Principles and Practices of Data VisualizationPrinciples and Practices of Data Visualization
Principles and Practices of Data VisualizationKianJazayeri1
 
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default  Presentation : Data Analysis Project PPTPredictive Analysis for Loan Default  Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPTBoston Institute of Analytics
 
Advanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsAdvanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsVICTOR MAESTRE RAMIREZ
 

Dernier (20)

Defining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryDefining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data Story
 
What To Do For World Nature Conservation Day by Slidesgo.pptx
What To Do For World Nature Conservation Day by Slidesgo.pptxWhat To Do For World Nature Conservation Day by Slidesgo.pptx
What To Do For World Nature Conservation Day by Slidesgo.pptx
 
The Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptx
The Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptxThe Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptx
The Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptx
 
wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...
wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...
wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...
 
Networking Case Study prepared by teacher.pptx
Networking Case Study prepared by teacher.pptxNetworking Case Study prepared by teacher.pptx
Networking Case Study prepared by teacher.pptx
 
Bank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis ProjectBank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis Project
 
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
 
Cyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded dataCyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded data
 
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
 
INTRODUCTION TO Natural language processing
INTRODUCTION TO Natural language processingINTRODUCTION TO Natural language processing
INTRODUCTION TO Natural language processing
 
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
 
modul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptxmodul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptx
 
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdfEnglish-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
 
Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...
 
SMOTE and K-Fold Cross Validation-Presentation.pptx
SMOTE and K-Fold Cross Validation-Presentation.pptxSMOTE and K-Fold Cross Validation-Presentation.pptx
SMOTE and K-Fold Cross Validation-Presentation.pptx
 
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
 
Principles and Practices of Data Visualization
Principles and Practices of Data VisualizationPrinciples and Practices of Data Visualization
Principles and Practices of Data Visualization
 
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default  Presentation : Data Analysis Project PPTPredictive Analysis for Loan Default  Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
 
Insurance Churn Prediction Data Analysis Project
Insurance Churn Prediction Data Analysis ProjectInsurance Churn Prediction Data Analysis Project
Insurance Churn Prediction Data Analysis Project
 
Advanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsAdvanced Machine Learning for Business Professionals
Advanced Machine Learning for Business Professionals
 

Revenue Maximization in Incentivized Social Advertising

  • 1. Revenue Maximization in Incentivized Social Advertising Cigdem Aslay1, Francesco Bonchi1, Laks VS Lakshmanan2, Wei Lu3
  • 2. • Given • a directed social network G = (V,E) • a propagation model m • a cardinality budget k • Define • S: initial set of k (seed) nodes to start the propagation • σm(S): expected size of the influence propagation from S • Find S⇤ = argmax S✓V,|S|=k m(S) Influence Maximization * Kempe et al., “Maximizing the spread of influence through a social network”, KDD 2003 2 Discrete Optimization Problem*
  • 3. Influence Propagation Models Independent Cascade (IC) Model • Each arc (u,v) is associated with an influence probability puv • A node u activated at time t tries to influence each inactive neighbor v, with a success probability puv Topic-aware Independent Cascade (TIC) Model* • An item i described as a distribution over K topics: • Topic specific influence probabilities on arcs: • Item specific success probabilities on arcs: *N. Barbieri, F. Bonchi and G. Manco, “Topic-aware Social Influence Propagation Models”, ICDM 2012 3
  • 4. Complexity and Approximation • Influence Maximization is NP-Hard under IC model • TIC boils down to IC on the probabilistic graph Gi = (V,A,pi) • Reduction from the Set Cover problem • Greedy algorithm • (1 – 1/e)-approximation* using monotonicity1 and submodularity2 4 #P-hard *Nemhauser et al., “An analysis of approximations for maximizing submodular set functions I”, Mathematical Programming 1978
  • 5. 5 A market that did not exist until Facebook launched its first advertising service in May 2005, projected to generate $11 billion revenue by 2017* Social Advertising https://www.emarketer.com/Article/Social-Network-Ad-Spending-Hit-2368-Billion-Worldwide-2015/1012357 http://www.unified.com/historyofsocialadvertising/
  • 6. nice ad! indeed! 6 Social Advertising Promoted Posts • Implemented by online social networking platforms • Similar to organic posts from friends in the social network • Contain an advertising message: text, image or video • Can propagate to friends via social actions: “likes”, “shares”
  • 9. Incentivized Social Advertising CPE Model with Seed User Incentives 9 • Advertiser • Pays a fixed CPE to host for each engagement • Pays monetary incentive to each seed user promoting its ad • Net payment subject to its budget • Host • Selects initial endorsers (seed users) for each ad participating in the campaign • Seed users take a cut from the social advertising budget in exchange • Sells the resulting ad-engagements to advertisers  Bi.
  • 10. Revenue Maximization • Given • a social graph G = (V,E) • TIC propagation model • h advertisers with budget Bi and CPE(i) for each ad i • seed user incentives ci(u) for each user u∈V and for each ad i • Find an allocation S = (S1, …, Sh) that maximizes the overall revenue of the host from the allocation: 10 X i ⇡i = X i cpe(i) · i(Si).
  • 11. Theoretical Analysis • Revenue-Maximization problem is NP-hard • Restricted special case with h = 1: • NP-Hard Submodular-Cost Submodular-Knapsack (SCSK) problem* 11*Iyer et al., “Submodular optimization with submodular cover and submodular knapsack constraints”, NIPS 2013. Partition matroid Submodular knapsack constraints • Family 𝘊 of feasible solutions form an Independence System
  • 12. Theoretical Analysis • Cost-Agnostic Greedy Algorithm (CA-Greedy) • Selects (node,ad) pair giving the max. marginal increase in revenue 12 Two greedy approximation algorithms w/ different sensitivity to seed user incentives during the node selection • Cost-Sensitive Greedy Algorithm (CS-Greedy) • Selects the feasible (node,ad) pair giving the max. rate of marginal gain in revenue per marginal gain in payment #P-Hard!
  • 13. Theoretical Analysis • Cost-Agnostic Greedy Algorithm (CA-Greedy) • Theorem: Approximation guarantee follows* from the fact that 𝘊 forms an independence system where • R and r are, respectively, upper and lower rank of 𝘊 • κπ is the curvature of total revenue function π(.) 13 * Conforti et al., "Submodular set functions, matroids and the greedy algorithm: tight worst-case bounds and some generalizations of the Rado-Edmonds theorem.", Discrete Applied Mathematics 1984
  • 14. Theoretical Analysis • Cost-Agnostic Greedy Algorithm (CA-Greedy) • Tightness of cost-agnostic bound. 14 Optimal solution • T = {a,c} with 𝜋(T) = 6 CA-Greedy solution • S = {b} with 𝜋(S) = 3 B = 7, cpe = 1 r = 1, R = 2 κ 𝜋 = 1
  • 15. Theoretical Analysis • Cost-Sensitive Greedy Algorithm (CS-Greedy) • Theorem: Approximation guarantee obtained where • ρmax and ρmin are, respectively, max. and min. singleton payments • κρi is the curvature of ad i’s payment function ρi(.) 15 Tightness of cost-sensitive approximation is open.
  • 16. Scalable Algorithms Two-Phase Iterative Revenue Maximization • Built on TIM algorithm [Tang et al. SIGMOD 2014]; uses Reverse-Reachable sets [Borgs et al. SODA 2014]. Random RR-Set: • Sample a possible world X from G: remove every edge (u,v) with probability 1 – puv • Pick a target node v from G uniformly at random • RR-set of v = {nodes that can reach v via out-links in X} TIM Algorithm: • Estimates influence spread for the most influential “s” nodes from a random sample of (RR-Sets) of size 16 = L(s, ✏)
  • 17. Scalable Algorithms Two-Phase Iterative Revenue Maximization * Tang et al., “Influence maximization: Near-optimal time complexity meets practical efficiency”, SIGMOD 2014 Two-Phase Influence Maximization (TIM) Algorithm* • Accurately estimates the influence spread of any set S of at most “s” nodes from a random sample R of “L(s,ε)” RR-Sets • L(s,ε): Lower bound on the statistically sufficient sample size required • Unbiased estimator: TIM cannot be directly employed: requires predefined seed set size s Built on the Reverse Influence Sampling framework of TIM 17
  • 18. Scalable Algorithms Two-Phase Iterative Revenue Maximization • Built on the Reverse Influence Sampling framework of TIM* • Latent seed set size estimation • Start with a safe initial seed set size si • Sample L(si,ε) RR sets required for si • Update si based on current payment • Revise L(si,ε), sample additional RR sets, revise estimates 18 Two-Phase Iterative Cost-Agnostic Revenue Maximization (TI-CARM) * Tang et al., “Influence maximization: Near-optimal time complexity meets practical efficiency”, SIGMOD 2014 Scalable CA-Greedy Two-Phase Iterative Cost-Sensitive Revenue Maximization (TI-CSRM) Scalable CS-Greedy • Theorem: Deterioration in the approximation guarantees (see paper).
  • 19. Datasets and Parameters 19 TIC EM Learning TIC WC Model WC Model WC Model Peer influence probabilities: Experiments
  • 20. Algorithms Tested 20 Experiments }• TI-CARM • TI-CSRM • PageRank-GR • For each ad i, find the best candidate user wrt Pagerank ordering • Among those, select the (user, ad) pair giving maximum marginal increase in the revenue of the host • PageRank-RR • For each ad i, find the best candidate user wrt Pagerank ordering • Use round-robin ordering of advertisers to select the (user, ad) pair • ε set to 0.1 for quality experiments on FLIXSTER and EPINIONS • ε set to 0.3 for scalability experiments on DBLP and LIVEJOURNAL
  • 21. Seed Incentives Models 21 Experiments • Linear incentives • Proportional to the node’s ad-specific singleton influence spread • Constant incentives • Proportional to the average ad-specific singleton influence spread • Sublinear incentives • Proportional to the logarithm of node's ad-specific singleton influence spread
  • 24. 24 Revenue vs Running Time Trade-off
  • 25. 25 Scalability Results - Running Time
  • 27. • TI-C*RM could be built on top of more recent approximation algorithms — IMM and Stop & Stare. • Further scalability? • All these algorithms require significant memory usage, which limits scalability. • Hard competition? • Adaptive revenue maximization? • Tightness of cost-sensitive approximation?
 
 Tang et al. SIGMOD 2015. 
 
 Nguyen et al. arXiv 2016-2017; Keke et al. PVLDB 2017. 27 † † ‡ ‡ Open Problems