Threshold Influence Model for Allocating Advertising Budgets
|
|
|
- Jack Harrington
- 10 years ago
- Views:
Transcription
1 Atsushi Miyauchi Graduate School of Decision Science and Technology, Tokyo Institute of Technology, Japan Yuni Iwamasa YUNI Graduate School of Information Science and Technology, University of Tokyo, Japan Takuro Fukunaga National Institute of Informatics, JST, ERATO, Kawarabayashi Large Graph Project, Japan Naonori Kakimura Graduate School of Arts and Sciences, University of Tokyo, Japan Abstract We propose a new influence model for allocating budgets to advertising channels. Our model captures customer s sensitivity to advertisements as a threshold behavior; a customer is expected to be influenced if the influence he receives exceeds his threshold. Over the threshold model, we discuss two optimization problems. The first one is the budget-constrained influence maximization. We propose two greedy algorithms based on different strategies, and analyze the performance when the influence is submodular. We then introduce a new characteristic to measure the cost-effectiveness of a marketing campaign, that is, the proportion of the resulting influence to the cost spent. We design an almost linear-time approximation algorithm to maximize the costeffectiveness. Furthermore, we design a betterapproximation algorithm based on linear programming for a special case. We conduct thorough experiments to confirm that our algorithms outperform baseline algorithms. 1. Introduction Recent development of online advertisement has opened up a lot of opportunities for companies to conduct a marketing campaign. They can promote their products through various online advertising channels such as search engine and social media, in addition to traditional media such as TV, Proceedings of the 32 nd International Conference on Machine Learning, Lille, France, 215. JMLR: W&CP volume 37. Copyright 215 by the author(s). newspapers, and radio. In marketing, one of the major decisions is how to allocate a given budget among such media channels in order to maximize the impact on a set of potential customers. We may model as a bipartite graph in which one side is the set of possible marketing channels, and the other is the population of target customers. An edge between a channel i and a customer j indicates that i may influence j. For the above marketing problem, we can simply consider choosing a set of advertising channels to maximize the number of customers covered by the chosen channels. This is the classical combinatorial optimization problem called the maximum coverage problem. The problem is known to be NPhard, but we can obtain an (e/(e 1))-approximate solution 1 using a greedy-type algorithm (Hochbaum, 1997). However, the maximum coverage problem only focuses on the number of covered customers, and cannot handle a probabilistic behavior of making influence in reality. Moreover, we do not consider allocating some amount of budgets to a channel. Alon et al. (212) proposed two fundamental marketing models, the source-side influence model and the target-side influence model, incorporating a probabilistic behavior of a market model as well as allowing us to allocate a budget to a source node. The two models focus on individual (and independent) interaction and influence between sources and targets. In their first model, each source determines a probability of their influence to targets, while each target does in the other model. The first model was extended to a more general setting (Soma et al., 214). 1 A feasible solution is α-approximate if its objective value is at least 1/α times the optimal value. An α-approximation algorithm is one that returns an α-approximate solution for any instance.
2 1.1. Our Contribution In this paper, we propose a threshold influence model over a bipartite graph. We capture customer s sensitivity to our campaign as a threshold behavior. In the proposed model, when we allocate some amount of budgets to a channel, the influence which a customer receives is defined by a (general) monotone function of the allocated budgets. Examples of a monotone function are those in both the Alon et al. s influence models (212). A customer is then influenced if the received influence exceeds his threshold. The detailed model definition will be presented in Section 2. A threshold represents the different latent tendencies of customers. Such a model with thresholds has been studied in the context of viral marketing on social networks, particularly when an influence function is linear or submodular (see e.g., (Granovetter, 1978; Kempe et al., 23; Mossel & Roch, 21)). Our model extends these models so that we are allowed to allocate a budget to a source. Furthermore, in previous studies on viral marketing, a threshold is usually supposed to be uniformly random, as we do not know the customers latent tendencies in advance. However, in a practical scenario over a bipartite market model, it is reasonable that we have observed their tendencies; some customers are easy to be influenced, while some are not. Thus we consider an influence model with specific thresholds to incorporate these aspects. Let us also remark that our model includes various influence maximization problems such as the Alon et al. s target-side model, as well as clustering problems such as the densest k-subgraph problem (Feige et al., 21). Our main contribution is to discuss two optimization problems over the threshold influence model, which can be summarized as follows. 1. We consider finding a budget allocation that maximizes the number of influenced targets subject to a total budget constraint, which we refer to as the maximum generalthresholds coverage problem. We develop two simple algorithms based on different greedy strategies. 2. We show that when an influence to each target is determined by a monotone submodular function, the problem with random thresholds can be solved approximately within a factor of e/(e 1). 3. We introduce a new characteristic to measure the performance of a marketing campaign, which we refer to as the cost-effectiveness. We propose an almost linear-time approximation algorithm to maximize the cost-effectiveness. Furthermore, we develop a linear-programming-based (LP-based) algorithm when a threshold function for each target is of a simple form. 4. The problem of maximizing the cost-effectiveness is closely related to clustering problems. Our proposed algorithms solve efficiently the weighted densest subhypergraph problem. Let us describe our first and second results in details. One of our proposed algorithms for the maximum generalthresholds coverage problem is a greedy algorithm, that repeatedly chooses the source with maximum marginal return. It is known that such an algorithm finds an (e/(e 1))-approximate solution for the maximum coverage problem, and moreover, this, together with some preprocessing, returns an (e/(e 1))-approximate solution for the sourceside influence model. This is because the objective function is monotone and submodular (see Section 1.3 for the definition). In our model, the objective function is not necessarily submodular or supermodular. In fact, if a threshold is large, there is a case where adding one source makes no target influenced. In this case, we can choose any source, which seems hopeless to have good approximation. However, we show that, if an influence to each target is determined by a monotone submodular function over integer lattice, the greedy strategy returns a well-approximate solution. In fact, when a threshold is given randomly, the expected value of the influence is monotone and submodular over integer lattice. Thus the expected influence can be maximized within a factor of e/(e 1) in pseudopolynomial-time, which was done by the greedy algorithm using the maximum expected marginal return (Soma et al., 214). We here propose a slightly different greedy algorithm for the problem. The key idea is to design a general framework to reduce a monotone submodular function over integer lattice to a set function that is monotone and submodular. The proof is simple, and furthermore, our reduction framework provides approximation algorithms for problems related to a monotone submodular function over integer lattice, e.g., a multi-set generalization of (Iyer & Bilmes, 213). The greedy algorithm mentioned above has inefficiency in the sense that the algorithm requires O(n 2 ) number of function evaluations even for the Boolean case, where n is the number of sources. It should be noted that, when an influence is submodular, we can reduce practical time complexity by the lazy-evaluation technique (Minoux, 1978), but it is impossible for a general case. We propose another greedy-type algorithm, which runs in almost linear time. In the algorithm, we start from the whole source set, and repeatedly remove the source node with the smallest contribution. The algorithm is a generalization of Asahiro et al. (2) and Charikar (2) for the densest subgraph problem. Note that the algorithm gives good approximation for the cost-effectiveness maximization as below. To evaluate the performance of the two proposed algorithms, we thoroughly conduct simulation on a real-world network
3 and artificially generated networks. Let us describe our third and fourth results in details. When we conduct a marketing campaign, it is often interesting to evaluate the performance of the campaign. The performance can be measured as the proportion of the resulting influence to the cost spent in the campaign, which we call the cost-effectiveness. Over our threshold model, we introduce the problem of maximizing the costeffectiveness. Remark that the problem is useful to analyze a total budget in a marketing campaign; it tells us how much performance we could achieve (without a total budget constraint), which would help in readjusting a total budget to improve the performance. For this problem, we first design an almost linear-time approximation algorithm. In fact, the second greedy algorithm in our first result achieves an approximation factor of the maximum degree of target nodes. In our context, customers usually communicate through a small number of media channels, and hence the factor is effective in practice. Furthermore, we develop an LP-based betterapproximation algorithm when a threshold function for each target is of a simple form. Our problem is closely related to clustering problems. In fact, the cost-effectiveness maximization includes the densest subgraph problem and the densest subhypergraph problem (see Section 2.2 for the definitions). These problems can be solved in polynomial time (Huang & Kahng, 1995), and approximately in linear time within a factor of the maximum size of hyperedges when hyperedges have the same size (Tsourakakis, 214). Our results extend these ones so that we are allowed to have hyperedge weights and different hyperedge sizes. Due to the space limitation, some proofs are omitted, which can be found in the Supplementary Material Related Work Motivated by applications to marketing, Domingos and Richardson (21) and Richardson and Domingos (22) introduced viral marketing. They considered the problem of choosing a few influential members in a social network to influence a large fraction of the network through word-of-mouth effects. Such problem is called the influence maximization. There are two standard models, i.e., the independent cascade (IC) model (Goldenberg et al., 21a;b) and the linear threshold (LT) model (Granovetter, 1978). Kempe et al. (23) showed that for both the IC and LT models, the expected number of influenced nodes is a monotone and submodular function with respect to a seed set. This implies that an optimal solution can be efficiently approximated within a factor of (e/(e 1) + ε) using a greedy-type algorithm (Nemhauser et al., 1978). Kempe et al. (23) also proposed a commonly generalized model, called the general threshold model, which is proven to have submodularity (Mossel & Roch, 21). Lu et al. (211; 212) introduced an LT model with deterministic thresholds. The source-side influence model, introduced by Alon et al. (212), focuses on independent influence between sources and targets, which can be viewed as a budgeted counterpart of the IC model over a bipartite graph. Our proposed model is a budgeted counterpart of the LT model, which also includes the target-side influence model (Alon et al., 212) as a special case. In addition to the budget allocation in marketing, our model has various applications in machine learning, which will be presented in Section 2 with detailed formulations Preliminaries We conclude this section with definitions and notation necessary in this paper. Let G = (S, T ; E) be a bipartite graph. For a subset Y T, we denote by Γ(Y ) the set of nodes in S that are neighbors of some node in Y, i.e., Γ(Y ) = {s S t Y, (s, t) E}. If Y has only one node t, we simply denote Γ(t) = Γ({t}). We define Γ(X) for X S similarly. Let S be a finite set. We say that a set function g : 2 S R is monotone if g(x) g(y ) for all X, Y with X Y. A set function g is submodular if it satisfies g(x) + g(y ) g(x Y )+g(x Y ) for all X, Y S. A set function g is supermodular if g is submodular. Intuitively, a submodular function demonstrates a diminishing marginal return, that is, as we add an element to a larger set, the increase is smaller. Submodularity captures fundamental properties in viral marketing on social networks (Kempe et al., 25; Mossel & Roch, 21), and has various applications in machine learning (Krause & Golovin, 214; Lin & Bilmes, 211; Singh et al., 212). Let Z S + be the set of non-negative integer vectors in which each component is indexed by an element in a set S. A function f : Z S + R is monotone if f(x) f(y) for all x, y with x y (i.e., x(s) y(s) for each s S). We say that f is a submodular function over integer lattice Z S + when it satisfies f(x) + f(y) f(x y) + f(x y) for all integer vectors x and y, where x y and x y, respectively, denote the coordinate-wise maxima and minima, i.e., (x y)(s) = max{x(s), y(s)} and (x y)(s) = min{x(s), y(s)} for each s S. This definition generalizes submodularity of set functions because if the domain is restricted to the unit hypercube, then the submodularity can be identified with that of set functions. A submodular function over integer lattice is used to analyze and extend the Alon et al. s model (Soma et al., 214).
4 2. Problem Definition In this section, we define our model formally, and present several examples included in the model Maximum General-Thresholds Coverage Let G = (S, T ; E) be a bipartite graph, where S is a set of media channels, T is a set of target customers, and an edge set E S T represents relationship between channels and customers. We are given a unit cost c s for each source s S, a weight w t for each target t T, and a total budget B being a positive integer. When we choose a set X of nodes in S, the set X makes influence on target nodes. Specifically, the influence by a subset X in S is determined as follows. Each target t T has a threshold θ t and a monotone set function f t : 2 Γ(t) R + where f t ( ) =. A target t is influenced by X if f t (X t ) θ t, where we denote X t = X Γ(t). The maximum general-thresholds coverage problem is to find X S that maximizes f G (X) = t T :f t(x t) θ t w t subject to a budget constraint c(x) := s X c s B. When the graph G is clear from the context, we simply denote f instead of f G. We also consider the multi-set version of the problem. In the setting, each source s S additionally has a capacity u s. We allocate to S a positive integer vector x = (x s ) s S that satisfies a budget constraint s S c sx s B. The vector x makes influence to targets t in T, which is defined by a monotone function f t over integer lattice Z Γ(t) + and a threshold θ t. We then aim to maximize the total weight of nodes influenced: f G (x) = w t, t T :f t (x t ) θ t where x t is the subvector of x whose indices are Γ(t). As described below, the problem includes various optimization problems. Example 1 (Maximum coverage problem). Suppose that the function f t is given by f t (X) = X (1) and the threshold θ t = 1 for every t T. Assume that c s = 1 for any s S and w t = 1 for any t T. Then the problem is the well-known maximum coverage problem. In this case, the objective function f G is monotone and submodular, and thus we can approximate the optimal value within a factor of e/(e 1) (Hochbaum, 1997). Example 2 (Maximum thresholds coverage problem). Suppose that f t is given by (1), and θ t is a positive integer between 1 and Γ(t). Then, when c s = 1 for any s S, the objective is to find a set X of B nodes in S that maximizes the total weight of nodes t in T covered at least θ t times by the edges from X. This problem is called the maximum thresholds coverage problem, which was introduced by Alon et al. (212) to investigate the target-side influence model in Example 3 below. They showed that this problem, i.e., our problem, too, is hard to approximate within a factor of Ω(B ϵ ) for some ϵ >, assuming a certain hypothesis about the average-case hardness of random 3SAT. On the positive side, they proposed an O(log B)-approximation algorithm for the multi-set case when u s is infinity. Example 3 (Target-side influence model). Alon et al. (212) introduced a target-side influence model. In the model, each target t T has a sequence of probabilities (p t 1,..., p t B ). A subset X of S makes X t independent trials to each t according to the probability sequence. Specifically, the probability f t of t being influenced is given by X t f t (X) = 1 (1 p t i). (2) i=1 The objective is to maximize the expected number of influenced nodes, i.e., t T f t(x). It should be noted that the function f t is monotone, but not necessarily submodular or supermodular. The problem can be polynomially reduced to the maximum thresholds coverage problem (Example 2). Furthermore, in our problem setting with thresholds, we can consider maximizing the total weight of targets t in T whose probability (2) is at least θ t. Example 4 (Source-side influence model with threshold). Suppose that we are given a probability p s for each source s S, and that f t is a probability by independent trials from sources. That is, f t is given by f t (X) = 1 s X t (1 p s ). (3) In our problem setting, we can consider maximizing the total weight of targets t in T whose probability (3) is at least θ t. Example 5 (Densest k-subgraph problem). The densest k- subgraph problem is the problem of finding a set of k vertices that maximizes the number of edges in the subgraph induced by the k vertices. The best known approximation algorithm achieves an approximation factor of O(n 1/3 δ ) for some small δ > (Feige et al., 21). Bhaskara et al. (21) proposed an O(n 1/4+ε )-approximation algorithm that runs in n O(1/ε) time for any ε >. Recently, Papailiopoulos et al. (214) designed a nearly linear-time al-
5 gorithm whose approximation factor depends on the eigenvalues of the adjacency matrix. This problem can be reduced to our problem, as described in Example 6 below. Example 6 (Densest k-subhypergraph problem). Let V be a finite set and E be a family of subsets of V. The pair H = (V, E) is called a hypergraph. Note that, when the size of each element in E is exactly two, H forms a graph. For a subset X V, we denote by E(X) the set of hyperedges in the subhypergraph induced by X. In the densest k- subhypergraph problem, given a hypergraph H = (V, E), we find a subset X V of size k that maximizes E(X). This problem can be reduced to our problem. Indeed, a hypergraph H can be naturally represented as a bipartite graph as follows. For H = (V, E), we construct a bipartite graph G = (V, E; E), where E = {(v, e) v e}. Each node e E in G has degree exactly e. We set θ e = e for every e E. Then, for a subset X V, the set E(X) is equivalent to {e E X e θ e }. Thus this is a special case of our problem where f e is given by (1). Applications in Machine Learning. Not only in online advertisement, our influence model over a bipartite graph is of significance in other machine learning applications such as sensor placement (Krause et al., 28), feature selection (Krause & Guestrin, 25; Liu et al., 213), and text summarization (Lin & Bilmes, 211). For example, in the standard sensor placement scenario, we aim to allocate sensors so that the number of targets monitored is maximized. To make the system reliable and robust, it is natural to maximize the number of targets monitored by a specified number of sensors, which can be formulated as our threshold model (Example 2). There is another situation in which each sensor may fail to observe a target, and we aim to maximize the number of targets whose probability of being monitored exceeds a specified threshold. This problem can also be formulated as our model (see Examples 3 and 4). In the context of feature selection, the objective is to find a small set that summarizes the feature of a given data as well as possible. For example, in the concept-based text summarization (Filatova & Hatzivassiloglou, 24), we aim to find a subset X of sentences that maximizes the total credit of concepts covered by X, which is in fact the weighted maximum coverage problem (Example 1). Using our framework, we can further consider finding a subset X of sentences that maximizes the total credit of concepts covered by X a specified number of times Cost-Effective General-Thresholds Coverage It is observed that, the larger a budget B is, the larger influence we can make to targets. It is then natural to ask how much the budget B is the most effective. That is, we aim to maximize d(x) = f G(X) c(x) over all X S. We call d(x) the cost-effectiveness of X. As seen below, the problem has been studied in the context of clustering problems (Examples 5 and 6). Example 7 (Densest subgraph problem). Maximizing the cost-effectiveness for the densest k-subgraph problem (Example 5) is known as the densest subgraph problem. Given a graph (V, F ), we are asked to find a subset X V that maximizes the density F (X) / X, where F (X) is the set of edges in the subgraph induced by X. In contrast to the densest k-subgraph problem, this problem can be solved in polynomial time using a flowbased algorithm (Goldberg, 1984) or an LP-based algorithm (Charikar, 2). Moreover, Charikar (2) proved that the greedy algorithm proposed by Asahiro et al. (2) finds a 2-approximate solution in linear time. Example 8 (Densest subhypergraph problem). The densest subhypergraph problem is to maximize the costeffectiveness for the densest k-subhypergraph (Example 6). That is, given a hypergraph H = (V, E), we are asked to find a subset X V that maximizes E(X) / X. Huang and Kahng (1995) proposed a flow-based algorithm that solves the problem in polynomial time. Recently, Tsourakakis (214) extensively studied the l-uniform case (i.e., e = l for every e E), and proposed efficient exact and approximation algorithms for the problem. In the above examples, the cost-effectiveness maximization can be solved efficiently. As another example, if f G is submodular, then it is easy to see that arg max s S d({s}) is an optimal solution. However, it turns out to be NP-hard for a general case. In fact, an instance of the maximum thresholds coverage problem (Example 2) can be reduced to one of the cost-effective general-thresholds coverage problem with polynomial size. Theorem 1. The cost-effective general-thresholds coverage problem is NP-hard. Finally, let us emphasize that, in a wide variety of machine learning applications described in Section 2.1, the costeffective maximization is also reasonable, as it is useful to measure how much budget is the most effective. 3. Budget-Constrained Maximization 3.1. Greedy Algorithms We present two greedy algorithms: the incremental greedy algorithm and the decremental greedy algorithm for the multi-set version of the maximum general-thresholds coverage problem.
6 Algorithm 1 INCREMENTALGREEDY 1: Initialize X and i 2: while c(x i ) < B and S do 3: Find v S \ X i that maximizes (X i, v) 4: if c(x i {v}) B then 5: X i+1 X i {v} and i i + 1 6: else S S \ {v} 7: return X i Algorithm 2 DECREMENTALGREEDY 1: Initialize X S S and i S 2: while c(x i ) > B do 3: Find v X i with smallest contribution (X i, v) 4: X i 1 X i \ {v} and i i 1 5: return X i We first show that we can reduce a multi-set instance to an instance with unit capacity. Let f : Z S + R be a function over integer lattice. Let S denote {(s, i) s S, i Z + }. For X S, we define the corresponding vector x Z S + as the vector such that x(s) = max{i Z + (s, i) X}, where we note that x(s) = if (s, i) X for any i. We define a set function f : 2 S R by f(x) = f(x) for each X S. We have the following lemma. Lemma 1. An instance of the multi-set version of the maximum general-thresholds coverage problem can be reduced to the one with u s = 1 for each s S with pseudopolynomial size. Thus we henceforth present algorithms only for the case where u s = 1 for every s S. For X S, we denote T (X) = {t T f t (X t ) θ t }. The incremental greedy algorithm is described in Algorithm 1. For s S \ X, we define t T (X {s})\t (X) (X, s) = w t. c s It is easy to see that Algorithm 1 runs in O(β S E + T ) time, where β denotes the time to compute the value of f t. On the other hand, the decremental greedy algorithm is presented in Algorithm 2. For s X, we define the contribution of s in X by t T (X) Γ(s) (X, s) = w t. c s Clearly, Algorithm 2 runs in O( S 2 + T + β E ) time. The following theorem states that the algorithm can be implemented to run in almost linear time. Theorem 2. Algorithm 2 runs in O( S + β E + W ) time when c s = 1 for each s S and w t is an integer for each t T, where W = t T w t. For the general case, Algorithm 2 runs in O( S log S + T + β E ) time Submodular Thresholds Coverage In this section, a threshold function f t is limited to a [, 1]- valued monotone submodular function over integer lattice. An example of a monotone submodular function can be found in Examples 1, 2, and 4. Moreover, for each target t T, a threshold θ t is supposed to be chosen uniformly at random from the interval [, 1]. The objective is to find an integer vector x = (x s ) s S that maximizes the expected number of targets t T satisfying f t (x t ) θ t, subject to a total budget constraint. Specifically, the objective function is represented as t T f t(x t ). Since the sum of monotone submodular functions is monotone and submodular, the problem is maximizing a monotone submodular function over integer lattice subject to a total budget constraint. Therefore, it follows from Soma et al. (214) that we can find an (e/(e 1))-approximate solution in pseudo-polynomial time. We here present a simpler different approach from Soma et al. (214). The main idea is to use the reduction in Lemma 1. The following theorem guarantees that the reduced instance preserves submodularity. Theorem 3. Let f : Z S + R be a function over integer lattice. Then f is monotone and submodular if and only if the set function f is monotone and submodular. Let S = {(s, i) s S, i Z + }, and let f be a monotone submodular set function defined in Theorem 3. We define c(s, i) = c s i for (s, i) S, and consider the problem of maximizing f(x) subject to (s,i) X c(s, i) B. Then an α-approximate solution for this problem yields an α-approximate one for the original problem. Since the well-known greedy algorithm (with partial enumeration) gives an (e/(e 1))-approximate solution for the reduced problem (Sviridenko, 24), we have an (e/(e 1))- approximation algorithm for the original problem. Remark 1. Theorem 3 provides a general framework for problems related to a monotone submodular function over integer lattice to reduce to the counterpart on a set function. In particular, this gives a simpler proof for the approximation result on maximizing a monotone submodular function over integer lattice (Soma et al., 214). Consider maximizing a monotone submodular function f(x) over integer lattice subject to a budget constraint i S c ix i B and a capacity x u. Then we can reduce to the one of maximizing a monotone submodular set function subject to a budget constraint, which yields an (e/(e 1))-approximation algorithm in pseudo-polynomial time (see the Supplemen-
7 tary Material for details). Note that our reduction implies a pseudo-polynomial-time algorithm slightly different from Soma et al. (214) in the sense that our algorithm uses different marginal return to choose the next one. The same reduction is applicable to the submodular set cover problem (Wolsey, 1984). Using our reduction framework, we obtain a logarithmic-approximation algorithm, running in pseudo-polynomial time, for the multi-set version of the submodular set cover problem. Furthermore, we can apply the same reduction for more general problems such as multi-set generalizations of the submodular cost submodular cover and submodular cost submodular knapsack problems (Iyer & Bilmes, 213). 4. Cost-Effectiveness Maximization 4.1. Fast Greedy Approximation In this section, we prove that Algorithm 2 essentially returns an approximate solution for the cost-effective general-thresholds coverage problem. Define γ to be the maximum degree of a node in T, i.e., γ = max t T Γ(t). Our algorithm repeatedly removes a source node with the minimum contribution in the remaining graph, and then returns the subset with maximum cost-effectiveness during the process. That is, we execute Algorithm 2 with B = to obtain a sequence of subsets X S,..., X, and return arg max i=,..., S d(x i ). This runs in O( S log S + T + β E ) time by Theorem 2. We have the following theorem. Theorem 4. The above algorithm is a γ-approximation algorithm for the cost-effective general-thresholds coverage problem. The key observation is that, in the sequence X S,..., X, if X i is the minimum subset containing an optimal solution for the problem, then the contribution (X i, s) is at least the optimal cost-effectiveness for any s X i. This implies that X i is γ-approximation Linear-Programming-based Approximation In this section, we propose an LP-based approximation algorithm for the case where c s = 1 for each source s S and f t (X) = X for each target t T. Define p t = Γ(t) θ t + 1 for each t T and p = max t T p t. We introduce a variable x s for each s S and a variable y t for each t T. Consider the following linear programming problem (LP): max. t T w t y t s. t. x s y t ( t T, J Γ(t) with J = p t ); s J x s 1; x s ( s S); y t ( t T ). s S Note that (LP) has an exponential number of constraints. However, we can check the feasibility in polynomial time, because the first constraints are satisfied if and only if the sum of the smallest p t variables corresponding to the sources in Γ(t) is at least y t for each t T. Therefore, (LP) can be solved in polynomial time using the ellipsoid method (Grötschel et al., 1981). We first observe that we can construct a feasible solution of (LP) with objective value at least d(x) from a subset X S. Lemma 2. For any X S, there exists a feasible solution of (LP) whose objective value is greater than or equal to d(x). Conversely, let (x, y) be a feasible solution of (LP). For a real parameter r, we define a sequence of subsets X(r) = {s S x s r/p}. Then, taking the integral of d(x(r)) with respect to r from to 1, we see that X(r) for some r [, 1] has large cost-effectiveness. Lemma 3. For any feasible solution (x, y) of (LP) with objective value λ, there exists s S that satisfies d(x(px s )) λ/p. Our LP-based algorithm is designed as follows. It solves (LP) to obtain an optimal solution (x, y), and then returns X(px s ) that maximizes the cost-effectiveness over s S. From the above lemmas, we have the following theorem. Theorem 5. The LP-based algorithm is a polynomial-time p-approximation algorithm for the cost-effective thresholds coverage problem. 5. Experiments To evaluate the performance of our algorithms, we have conducted simulation on a real-world network and largescale networks. All experiments were performed on a Windows PC with Intel Core i7 2.4 GHz CPU and 16 GB RAM. Our algorithms were implemented in C++. We compare algorithms Incremental (Algorithm 1) and Decremental (Algorithm 2) with two baseline algorithms Degree and Random. Degree selects nodes in decreasing degree order, and Random selects nodes randomly. Remark that the LP-based algorithm in Section 4.2 was not implemented because the ellipsoid method for (LP) is required, which is expected to be impractical. We use as f t the functions (2) of the target-side model and (3) of the source-side model. A sequence of probabilities in the functions is set randomly from the interval [,.1]. Note that the function (3) is submodular, while (2) is not. We define c s = 1 for each source s and w t = 1 for each target t. We set u s = 1 as we can reduce any instance into the case.
8 Cost 1 Threshold Influence Model for Allocating Advertising Budgets Decremental Degree Incremental -5 Random Decremental Degree dget: B Budget: 5B Influenced nodes: f(x) (a) random thresholds 5 Influenced nodes: f(x) (b) large thresholds Cost-effectiveness (a) source-side model Cost-effectiveness (b) target-side model Influenced nodes: f(x) (c) random thresholds Influenced nodes: f(x) (d) large thresholds Figure 1. Results for Yahoo! Bidding Data. (a) and (b) are on the source-side model, and (c) and (d) are on the target-side model. As a real-world network, we use the Yahoo! Search Marketing Advertiser Bidding Data (Yahoo!) as in (Soma et al., 214). It is a bipartite graph between 1, search keywords and 1,475 accounts, where each edge represents one bid to advertisement on the keyword. The graph has 52,567 edges (representing who bid at least once to what relation). We set threshold θ t for each target t in the following two ways: random thresholds means θ t is chosen randomly from the interval [, 1], and large thresholds means θ t is chosen randomly from the interval [.5, 1]. Figure 1 shows influence spreads with respect to a budget size for each algorithm. The results depend on the settings. For the source-side model with random thresholds, Incremental always returns the best values. This result matches the theoretical guarantee for the submodular case, as the expected value of the objective value is submodular. When thresholds are large, Decremental always returns the best values. The other algorithms are of poor quality particularly when B is small. For the targetside model, Decremental returns the best values in most cases, except for the random thresholds case when B is of medium size. For all settings, Decremental took within one second, similarly to Random and Degree, while Incremental took much time (a few hours). In summary, it is observed that Decremental is fast and of the best quality when thresholds are large. When the objective function is close to submodular, Incremental is better but slower. We also measured the maximum cost-effectiveness obtained by Decremental for each setting. Recall that when f G is submodular, there is an optimal solution of size one. For the source-side model with random thresholds, the output of size one achieves the maximum costeffectiveness, which implies that this setting has a nearly- Figure 2. Cost-effectiveness for large-scale networks submodular objective function. For the target-side model with random thresholds and the source-side and targetside models with large thresholds, the outputs with maximum cost-effectiveness have size 8, 13, and 95, respectively. To evaluate for larger-scale networks, we have also run our experiments on artificially generated graphs. We set S = 2, and T = 2, with around 2,, edges between them. The graphs are generated so that the degree distribution of the source nodes obeys the power law with exponent γ = 2.. After assigning the degree deg(s) to each source node s, it is connected to deg(s) nodes chosen uniformly from T. We set θ t =.8 for every target t. We executed only Decremental and Degree as they outperformed the other algorithms in the Yahoo! Search Marketing Advertiser Bidding Data with large thresholds. Figure 2 demonstrates the cost-effectiveness of the solutions obtained by each algorithm. Decremental returns a better solution than Degree, whose size with maximum cost-effectiveness is 28 for the source-side model and 37 for the target-side model. Also, Decremental returns better influence spreads than Degree. Decremental took only a few minutes for both models. 6. Conclusion In this paper, we have introduced a new influence model over a bipartite graph. The model captures the different sensitivities of customers to advertisements as thresholds. We have first discussed the maximum general-thresholds coverage problem, and proposed two greedy algorithms; the incremental greedy algorithm extends the one for the submodular case, while the decremental greedy algorithm runs in almost linear time. Numerical experiments suggest to use the incremental one only for the nearly-submodular case, and the decremental one for the other cases. We have then introduced another type of optimization problem, the cost-effective general-thresholds coverage problem, to analyze the performance of our campaign. For the problem, we have developed an almost linear-time approximation algorithm, and furthermore, an LP-based better-approximation algorithm for a special case.
9 Acknowledgments The authors thank the reviewers for useful comments and suggestions to improve the paper. Also, the authors thank Yusuke Kobayashi for fruitful discussion on this topic. AM is supported by a Grant-in-Aid for JSPS Fellows (No ), TF is supported by a Grant-in-Aid for Young Scientists (B) (No ), and NK is supported by a Grant-in-Aid for Young Scientists (B) (No ). This work was supported by JST, ERATO, Kawarabayashi Large Graph Project. References Alon, N., Gamzu, I., and Tennenholtz, M. Optimizing budget allocation among channels and influencers. In WWW 12: Proceedings of the 21st International Conference on World Wide Web, pp , 212. Asahiro, Y., Iwama, K., Tamaki, H., and Tokuyama, T. Greedily finding a dense subgraph. Journal of Algorithms, 34(2):23 221, 2. Bhaskara, A., Charikar, M., Chlamtac, E., Feige, U., and Vijayaraghavan, A. Detecting high log-densities: An O(n 1/4 ) approximation for densest k-subgraph. In STOC 1: Proceedings of the 42nd ACM Symposium on Theory of Computing, pp , 21. Charikar, M. Greedy approximation algorithms for finding dense components in a graph. In APPROX : Proceedings of the 3rd International Workshop on Approximation Algorithms for Combinatorial Optimization, pp , 2. Domingos, P. and Richardson, M. Mining the network value of customers. In KDD 1: Proceedings of the 7th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp , 21. Feige, U., Peleg, D., and Kortsarz, G. The dense k- subgraph problem. Algorithmica, 29(3):41 421, 21. Filatova, E. and Hatzivassiloglou, V. A formal model for information selection in multi-sentence text extraction. In COLING 4: Proceedings of the 2th International Conference on Computational Linguistics, pp , 24. Goldberg, A. V. Finding a maximum density subgraph. Technical report, University of California Berkeley, Goldenberg, J., Libai, B., and Muller, E. Talk of the network: A complex systems look at the underlying process of word-of-mouth. Marketing Letters, 12(3): , 21a. Goldenberg, J., Libai, B., and Muller, E. Using complex systems analysis to advance marketing theory development: Modeling heterogeneity effects on new product growth through stochastic cellular automata. Academy of Marketing Science Review, 9(3):1 18, 21b. Granovetter, M. Threshold models of collective behavior. American Journal of Sociology, 83(6): , Grötschel, M., Lovász, L., and Schrijver, A. The ellipsoid method and its consequences in combinatorial optimization. Combinatorica, 1(2): , Hochbaum, D. S. Approximating covering and packing problems: Set cover, vertex cover, independent set, and related problems. In Hochbaum, D. S. (ed.), Approximation Algorithms for NP-hard Problems, pp PWS Publishing Co., Huang, D. J. H. and Kahng, A. B. When clusters meet partitions: New density-based methods for circuit decomposition. In EDTC 95: Proceedings of the 1995 European Conference on Design and Test, pp. 6 64, Iyer, R. K. and Bilmes, J. A. Submodular optimization with submodular cover and submodular knapsack constraints. In NIPS 13: Proceedings of the 27th Annual Conference on Neural Information Processing Systems, pp , 213. Kempe, D., Kleinberg, J., and Tardos, É. Maximizing the spread of influence through a social network. In KDD 3: Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp , 23. Kempe, D., Kleinberg, J., and Tardos, É. Influential nodes in a diffusion model for social networks. In ICALP 5: Proceedings of the 32nd International Colloquium on Automata, Languages and Programming, pp , 25. Krause, A. and Golovin, D. Submodular function maximization. In Bordeaux, L., Hamadi, Y., and Kohli, P. (eds.), Tractability: Practical Approaches to Hard Problems, pp Cambridge University Press, 214. Krause, A. and Guestrin, C. Near-optimal nonmyopic value of information in graphical models. In UAI 5: Proceedings of the 21st Conference on Uncertainty in Artificial Intelligence, pp , 25. Krause, A., Singh, A., and Guestrin, C. Near-optimal sensor placements in gaussian processes: Theory, efficient algorithms and empirical studies. Journal of Machine Learning Research, 9: , 28.
10 Lin, H. and Bilmes, J. A. A class of submodular functions for document summarization. In HLT 11: Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies, pp , 211. Liu, Y., Wei, K., Kirchhoff, K., Song, Y., and Bilmes, J. A. Submodular feature selection for high-dimensional acoustic score spaces. In ICASSP 13: Proceedings of the 38th International Conference on Acoustics, Speech and Signal Processing, pp , 213. Lu, Z., Zhang, W., Wu, W., Fu, B., and Du, D. Approximation and inapproximation for the influence maximization problem in social networks under deterministic linear threshold model. In ICDCS 11: Proceedings of the 31st International Conference on Distributed Computing Systems, pp , 211. Lu, Z., Zhang, W., Wu, W., Kim, J., and Fu, B. The complexity of influence maximization problem in the deterministic linear threshold model. Journal of Combinatorial Optimization, 24(3): , st International Conference on Machine Learning, pp , 214. Sviridenko, M. A note on maximizing a submodular set function subject to a knapsack constraint. Operations Research Letters, 32(1):41 43, 24. Tsourakakis, C. E. A novel approach to finding near-cliques: The triangle-densest subgraph problem. arxiv: , 214. Wolsey, L. A. An analysis of the greedy algorithm for the submodular set covering problem. Combinatorica, 2(4): , Yahoo! Webscope dataset: A1 - Yahoo! Search Marketing Advertiser Bidding Data, version catalog.php?datatype=a. Minoux, M. Accelerated greedy algorithms for maximizing submodular set functions. In Proceedings of the 8th IFIP Conference on Optimization Techniques, pp , Mossel, E. and Roch, S. Submodularity of influence in social networks: From local to global. SIAM Journal on Computing, 39(6): , 21. Nemhauser, G. L., Wolsey, L. A., and Fisher, M. L. An analysis of approximations for maximizing submodular set functions. Mathematical Programming, 14(1): , Papailiopoulos, D. S., Mitliagkas, I., Dimakis, A. G., and Caramanis, C. Finding dense subgraphs via low-rank bilinear optimization. In ICML 14: Proceedings of the 31st International Conference on Machine Learning, pp , 214. Richardson, M. and Domingos, P. Mining knowledgesharing sites for viral marketing. In KDD 2: Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 61 7, 22. Singh, A. P., Guillory, A., and Bilmes, J. A. On bisubmodular maximization. In AISTATS 12: Proceedings of the 15th International Conference on Artificial Intelligence and Statistics, pp , 212. Soma, T., Kakimura, N., Inaba, K., and Kawarabayashi, K. Optimal budget allocation: Theoretical guarantee and efficient algorithm. In ICML 14: Proceedings of the
CSC2420 Fall 2012: Algorithm Design, Analysis and Theory
CSC2420 Fall 2012: Algorithm Design, Analysis and Theory Allan Borodin November 15, 2012; Lecture 10 1 / 27 Randomized online bipartite matching and the adwords problem. We briefly return to online algorithms
Maximizing the Spread of Influence through a Social Network
Maximizing the Spread of Influence through a Social Network David Kempe Dept. of Computer Science Cornell University, Ithaca NY [email protected] Jon Kleinberg Dept. of Computer Science Cornell University,
MapReduce and Distributed Data Analysis. Sergei Vassilvitskii Google Research
MapReduce and Distributed Data Analysis Google Research 1 Dealing With Massive Data 2 2 Dealing With Massive Data Polynomial Memory Sublinear RAM Sketches External Memory Property Testing 3 3 Dealing With
Nan Kong, Andrew J. Schaefer. Department of Industrial Engineering, Univeristy of Pittsburgh, PA 15261, USA
A Factor 1 2 Approximation Algorithm for Two-Stage Stochastic Matching Problems Nan Kong, Andrew J. Schaefer Department of Industrial Engineering, Univeristy of Pittsburgh, PA 15261, USA Abstract We introduce
Approximation Algorithms
Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms
Definition 11.1. Given a graph G on n vertices, we define the following quantities:
Lecture 11 The Lovász ϑ Function 11.1 Perfect graphs We begin with some background on perfect graphs. graphs. First, we define some quantities on Definition 11.1. Given a graph G on n vertices, we define
Analysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs
Analysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs Stavros Athanassopoulos, Ioannis Caragiannis, and Christos Kaklamanis Research Academic Computer Technology Institute
Optimizing Display Advertising in Online Social Networks
Optimizing Display Advertising in Online Social Networks Zeinab Abbassi Dept. of Computer Science Columbia University [email protected] Aditya Bhaskara Google Research New York [email protected]
Applied Algorithm Design Lecture 5
Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design
Discrete Applied Mathematics. The firefighter problem with more than one firefighter on trees
Discrete Applied Mathematics 161 (2013) 899 908 Contents lists available at SciVerse ScienceDirect Discrete Applied Mathematics journal homepage: www.elsevier.com/locate/dam The firefighter problem with
8.1 Min Degree Spanning Tree
CS880: Approximations Algorithms Scribe: Siddharth Barman Lecturer: Shuchi Chawla Topic: Min Degree Spanning Tree Date: 02/15/07 In this lecture we give a local search based algorithm for the Min Degree
In Search of Influential Event Organizers in Online Social Networks
In Search of Influential Event Organizers in Online Social Networks ABSTRACT Kaiyu Feng 1,2 Gao Cong 2 Sourav S. Bhowmick 2 Shuai Ma 3 1 LILY, Interdisciplinary Graduate School. Nanyang Technological University,
Bargaining Solutions in a Social Network
Bargaining Solutions in a Social Network Tanmoy Chakraborty and Michael Kearns Department of Computer and Information Science University of Pennsylvania Abstract. We study the concept of bargaining solutions,
An Approximation Algorithm for Bounded Degree Deletion
An Approximation Algorithm for Bounded Degree Deletion Tomáš Ebenlendr Petr Kolman Jiří Sgall Abstract Bounded Degree Deletion is the following generalization of Vertex Cover. Given an undirected graph
! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm.
Approximation Algorithms 11 Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of three
ARTICLE IN PRESS. European Journal of Operational Research xxx (2004) xxx xxx. Discrete Optimization. Nan Kong, Andrew J.
A factor 1 European Journal of Operational Research xxx (00) xxx xxx Discrete Optimization approximation algorithm for two-stage stochastic matching problems Nan Kong, Andrew J. Schaefer * Department of
Mechanisms for Fair Attribution
Mechanisms for Fair Attribution Eric Balkanski Yaron Singer Abstract We propose a new framework for optimization under fairness constraints. The problems we consider model procurement where the goal is
Fairness in Routing and Load Balancing
Fairness in Routing and Load Balancing Jon Kleinberg Yuval Rabani Éva Tardos Abstract We consider the issue of network routing subject to explicit fairness conditions. The optimization of fairness criteria
Competitive Influence Maximization in Social Networks
Competitive Influence Maximization in Social Networks Shishir Bharathi David Kempe Mahyar Salek Department of Computer Science, University of Southern California Abstract. Social networks often serve as
Ph.D. Thesis. Judit Nagy-György. Supervisor: Péter Hajnal Associate Professor
Online algorithms for combinatorial problems Ph.D. Thesis by Judit Nagy-György Supervisor: Péter Hajnal Associate Professor Doctoral School in Mathematics and Computer Science University of Szeged Bolyai
Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling
Approximation Algorithms Chapter Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should I do? A. Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one
2.1 Complexity Classes
15-859(M): Randomized Algorithms Lecturer: Shuchi Chawla Topic: Complexity classes, Identity checking Date: September 15, 2004 Scribe: Andrew Gilpin 2.1 Complexity Classes In this lecture we will look
Exponential time algorithms for graph coloring
Exponential time algorithms for graph coloring Uriel Feige Lecture notes, March 14, 2011 1 Introduction Let [n] denote the set {1,..., k}. A k-labeling of vertices of a graph G(V, E) is a function V [k].
Cost effective Outbreak Detection in Networks
Cost effective Outbreak Detection in Networks Jure Leskovec Joint work with Andreas Krause, Carlos Guestrin, Christos Faloutsos, Jeanne VanBriesen, and Natalie Glance Diffusion in Social Networks One of
Offline sorting buffers on Line
Offline sorting buffers on Line Rohit Khandekar 1 and Vinayaka Pandit 2 1 University of Waterloo, ON, Canada. email: [email protected] 2 IBM India Research Lab, New Delhi. email: [email protected]
Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs
Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs Yong Zhang 1.2, Francis Y.L. Chin 2, and Hing-Fung Ting 2 1 College of Mathematics and Computer Science, Hebei University,
Scheduling to Minimize Power Consumption using Submodular Functions
Scheduling to Minimize Power Consumption using Submodular Functions Erik D. Demaine MIT [email protected] Morteza Zadimoghaddam MIT [email protected] ABSTRACT We develop logarithmic approximation algorithms
High degree graphs contain large-star factors
High degree graphs contain large-star factors Dedicated to László Lovász, for his 60th birthday Noga Alon Nicholas Wormald Abstract We show that any finite simple graph with minimum degree d contains a
Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs
CSE599s: Extremal Combinatorics November 21, 2011 Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs Lecturer: Anup Rao 1 An Arithmetic Circuit Lower Bound An arithmetic circuit is just like
An Empirical Study of Two MIS Algorithms
An Empirical Study of Two MIS Algorithms Email: Tushar Bisht and Kishore Kothapalli International Institute of Information Technology, Hyderabad Hyderabad, Andhra Pradesh, India 32. [email protected],
! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm.
Approximation Algorithms Chapter Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of
CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma
CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma Please Note: The references at the end are given for extra reading if you are interested in exploring these ideas further. You are
Weighted Sum Coloring in Batch Scheduling of Conflicting Jobs
Weighted Sum Coloring in Batch Scheduling of Conflicting Jobs Leah Epstein Magnús M. Halldórsson Asaf Levin Hadas Shachnai Abstract Motivated by applications in batch scheduling of jobs in manufacturing
Part 2: Community Detection
Chapter 8: Graph Data Part 2: Community Detection Based on Leskovec, Rajaraman, Ullman 2014: Mining of Massive Datasets Big Data Management and Analytics Outline Community Detection - Social networks -
ON INDUCED SUBGRAPHS WITH ALL DEGREES ODD. 1. Introduction
ON INDUCED SUBGRAPHS WITH ALL DEGREES ODD A.D. SCOTT Abstract. Gallai proved that the vertex set of any graph can be partitioned into two sets, each inducing a subgraph with all degrees even. We prove
MATHEMATICAL ENGINEERING TECHNICAL REPORTS. The Best-fit Heuristic for the Rectangular Strip Packing Problem: An Efficient Implementation
MATHEMATICAL ENGINEERING TECHNICAL REPORTS The Best-fit Heuristic for the Rectangular Strip Packing Problem: An Efficient Implementation Shinji IMAHORI, Mutsunori YAGIURA METR 2007 53 September 2007 DEPARTMENT
Large induced subgraphs with all degrees odd
Large induced subgraphs with all degrees odd A.D. Scott Department of Pure Mathematics and Mathematical Statistics, University of Cambridge, England Abstract: We prove that every connected graph of order
CS 598CSC: Combinatorial Optimization Lecture date: 2/4/2010
CS 598CSC: Combinatorial Optimization Lecture date: /4/010 Instructor: Chandra Chekuri Scribe: David Morrison Gomory-Hu Trees (The work in this section closely follows [3]) Let G = (V, E) be an undirected
Adaptive Online Gradient Descent
Adaptive Online Gradient Descent Peter L Bartlett Division of Computer Science Department of Statistics UC Berkeley Berkeley, CA 94709 bartlett@csberkeleyedu Elad Hazan IBM Almaden Research Center 650
P versus NP, and More
1 P versus NP, and More Great Ideas in Theoretical Computer Science Saarland University, Summer 2014 If you have tried to solve a crossword puzzle, you know that it is much harder to solve it than to verify
Submodular Function Maximization
Submodular Function Maximization Andreas Krause (ETH Zurich) Daniel Golovin (Google) Submodularity 1 is a property of set functions with deep theoretical consequences and far reaching applications. At
Private Approximation of Clustering and Vertex Cover
Private Approximation of Clustering and Vertex Cover Amos Beimel, Renen Hallak, and Kobbi Nissim Department of Computer Science, Ben-Gurion University of the Negev Abstract. Private approximation of search
JUST-IN-TIME SCHEDULING WITH PERIODIC TIME SLOTS. Received December May 12, 2003; revised February 5, 2004
Scientiae Mathematicae Japonicae Online, Vol. 10, (2004), 431 437 431 JUST-IN-TIME SCHEDULING WITH PERIODIC TIME SLOTS Ondřej Čepeka and Shao Chin Sung b Received December May 12, 2003; revised February
Factoring & Primality
Factoring & Primality Lecturer: Dimitris Papadopoulos In this lecture we will discuss the problem of integer factorization and primality testing, two problems that have been the focus of a great amount
MATHEMATICAL ENGINEERING TECHNICAL REPORTS. Cyber Security Analysis of Power Networks by Hypergraph Cut Algorithms
MATHEMATICAL ENGINEERING TECHNICAL REPORTS Cyber Security Analysis of Power Networks by Hypergraph Cut Algorithms Yutaro YAMAGUCHI, Anna OGAWA, Akiko TAKEDA and Satoru IWATA METR 2014 12 May 2014 DEPARTMENT
Labeling outerplanar graphs with maximum degree three
Labeling outerplanar graphs with maximum degree three Xiangwen Li 1 and Sanming Zhou 2 1 Department of Mathematics Huazhong Normal University, Wuhan 430079, China 2 Department of Mathematics and Statistics
5.1 Bipartite Matching
CS787: Advanced Algorithms Lecture 5: Applications of Network Flow In the last lecture, we looked at the problem of finding the maximum flow in a graph, and how it can be efficiently solved using the Ford-Fulkerson
A Partition-Based Efficient Algorithm for Large Scale. Multiple-Strings Matching
A Partition-Based Efficient Algorithm for Large Scale Multiple-Strings Matching Ping Liu Jianlong Tan, Yanbing Liu Software Division, Institute of Computing Technology, Chinese Academy of Sciences, Beijing,
17.3.1 Follow the Perturbed Leader
CS787: Advanced Algorithms Topic: Online Learning Presenters: David He, Chris Hopman 17.3.1 Follow the Perturbed Leader 17.3.1.1 Prediction Problem Recall the prediction problem that we discussed in class.
1. Nondeterministically guess a solution (called a certificate) 2. Check whether the solution solves the problem (called verification)
Some N P problems Computer scientists have studied many N P problems, that is, problems that can be solved nondeterministically in polynomial time. Traditionally complexity question are studied as languages:
Graphical degree sequences and realizations
swap Graphical and realizations Péter L. Erdös Alfréd Rényi Institute of Mathematics Hungarian Academy of Sciences MAPCON 12 MPIPKS - Dresden, May 15, 2012 swap Graphical and realizations Péter L. Erdös
Graph Security Testing
JOURNAL OF APPLIED COMPUTER SCIENCE Vol. 23 No. 1 (2015), pp. 29-45 Graph Security Testing Tomasz Gieniusz 1, Robert Lewoń 1, Michał Małafiejski 1 1 Gdańsk University of Technology, Poland Department of
The degree, size and chromatic index of a uniform hypergraph
The degree, size and chromatic index of a uniform hypergraph Noga Alon Jeong Han Kim Abstract Let H be a k-uniform hypergraph in which no two edges share more than t common vertices, and let D denote the
Globally Optimal Crowdsourcing Quality Management
Globally Optimal Crowdsourcing Quality Management Akash Das Sarma Stanford University [email protected] Aditya G. Parameswaran University of Illinois (UIUC) [email protected] Jennifer Widom Stanford
Online and Offline Selling in Limit Order Markets
Online and Offline Selling in Limit Order Markets Kevin L. Chang 1 and Aaron Johnson 2 1 Yahoo Inc. [email protected] 2 Yale University [email protected] Abstract. Completely automated electronic
On three zero-sum Ramsey-type problems
On three zero-sum Ramsey-type problems Noga Alon Department of Mathematics Raymond and Beverly Sackler Faculty of Exact Sciences Tel Aviv University, Tel Aviv, Israel and Yair Caro Department of Mathematics
Optimal Monitoring in Multi-Channel Multi-Radio Wireless Mesh Networks
Optimal Monitoring in Multi-Channel Multi-Radio Wireless Mesh Networks Dong-Hoon Shin and Saurabh Bagchi Dependable Computing Systems Lab School of Electrical and Computer Engineering Purdue University
Even Faster Algorithm for Set Splitting!
Even Faster Algorithm for Set Splitting! Daniel Lokshtanov Saket Saurabh Abstract In the p-set Splitting problem we are given a universe U, a family F of subsets of U and a positive integer k and the objective
Decentralized Utility-based Sensor Network Design
Decentralized Utility-based Sensor Network Design Narayanan Sadagopan and Bhaskar Krishnamachari University of Southern California, Los Angeles, CA 90089-0781, USA [email protected], [email protected]
COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH. 1. Introduction
COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH ZACHARY ABEL 1. Introduction In this survey we discuss properties of the Higman-Sims graph, which has 100 vertices, 1100 edges, and is 22 regular. In fact
University of Washington, Seattle Ph. No: (248) 979-7687. melodi.ee.washington.edu/~rkiyer/ Seattle, WA 98195-2500
Rishabh Iyer Contact Information Research Interests Areas of Expertise Education Work Experience Achievements and Awards University of Washington, Seattle Ph. No: (248) 979-7687 Electrical Engineering
Online Scheduling with Bounded Migration
Online Scheduling with Bounded Migration Peter Sanders, Naveen Sivadasan, and Martin Skutella Max-Planck-Institut für Informatik, Saarbrücken, Germany, {sanders,ns,skutella}@mpi-sb.mpg.de Abstract. Consider
Random graphs with a given degree sequence
Sourav Chatterjee (NYU) Persi Diaconis (Stanford) Allan Sly (Microsoft) Let G be an undirected simple graph on n vertices. Let d 1,..., d n be the degrees of the vertices of G arranged in descending order.
Network Algorithms for Homeland Security
Network Algorithms for Homeland Security Mark Goldberg and Malik Magdon-Ismail Rensselaer Polytechnic Institute September 27, 2004. Collaborators J. Baumes, M. Krishmamoorthy, N. Preston, W. Wallace. Partially
On the independence number of graphs with maximum degree 3
On the independence number of graphs with maximum degree 3 Iyad A. Kanj Fenghui Zhang Abstract Let G be an undirected graph with maximum degree at most 3 such that G does not contain any of the three graphs
Notes from Week 1: Algorithms for sequential prediction
CS 683 Learning, Games, and Electronic Markets Spring 2007 Notes from Week 1: Algorithms for sequential prediction Instructor: Robert Kleinberg 22-26 Jan 2007 1 Introduction In this course we will be looking
On Integer Additive Set-Indexers of Graphs
On Integer Additive Set-Indexers of Graphs arxiv:1312.7672v4 [math.co] 2 Mar 2014 N K Sudev and K A Germina Abstract A set-indexer of a graph G is an injective set-valued function f : V (G) 2 X such that
FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM
International Journal of Innovative Computing, Information and Control ICIC International c 0 ISSN 34-48 Volume 8, Number 8, August 0 pp. 4 FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT
The Generalized Assignment Problem with Minimum Quantities
The Generalized Assignment Problem with Minimum Quantities Sven O. Krumke a, Clemens Thielen a, a University of Kaiserslautern, Department of Mathematics Paul-Ehrlich-Str. 14, D-67663 Kaiserslautern, Germany
Stiffie's On Line Scheduling Algorithm
A class of on-line scheduling algorithms to minimize total completion time X. Lu R.A. Sitters L. Stougie Abstract We consider the problem of scheduling jobs on-line on a single machine and on identical
Generating models of a matched formula with a polynomial delay
Generating models of a matched formula with a polynomial delay Petr Savicky Institute of Computer Science, Academy of Sciences of Czech Republic, Pod Vodárenskou Věží 2, 182 07 Praha 8, Czech Republic
The Goldberg Rao Algorithm for the Maximum Flow Problem
The Goldberg Rao Algorithm for the Maximum Flow Problem COS 528 class notes October 18, 2006 Scribe: Dávid Papp Main idea: use of the blocking flow paradigm to achieve essentially O(min{m 2/3, n 1/2 }
SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH
31 Kragujevac J. Math. 25 (2003) 31 49. SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH Kinkar Ch. Das Department of Mathematics, Indian Institute of Technology, Kharagpur 721302, W.B.,
Short Cycles make W-hard problems hard: FPT algorithms for W-hard Problems in Graphs with no short Cycles
Short Cycles make W-hard problems hard: FPT algorithms for W-hard Problems in Graphs with no short Cycles Venkatesh Raman and Saket Saurabh The Institute of Mathematical Sciences, Chennai 600 113. {vraman
DATA ANALYSIS II. Matrix Algorithms
DATA ANALYSIS II Matrix Algorithms Similarity Matrix Given a dataset D = {x i }, i=1,..,n consisting of n points in R d, let A denote the n n symmetric similarity matrix between the points, given as where
BIG DATA PROBLEMS AND LARGE-SCALE OPTIMIZATION: A DISTRIBUTED ALGORITHM FOR MATRIX FACTORIZATION
BIG DATA PROBLEMS AND LARGE-SCALE OPTIMIZATION: A DISTRIBUTED ALGORITHM FOR MATRIX FACTORIZATION Ş. İlker Birbil Sabancı University Ali Taylan Cemgil 1, Hazal Koptagel 1, Figen Öztoprak 2, Umut Şimşekli
Notes on Complexity Theory Last updated: August, 2011. Lecture 1
Notes on Complexity Theory Last updated: August, 2011 Jonathan Katz Lecture 1 1 Turing Machines I assume that most students have encountered Turing machines before. (Students who have not may want to look
SIMS 255 Foundations of Software Design. Complexity and NP-completeness
SIMS 255 Foundations of Software Design Complexity and NP-completeness Matt Welsh November 29, 2001 [email protected] 1 Outline Complexity of algorithms Space and time complexity ``Big O'' notation Complexity
Class constrained bin covering
Class constrained bin covering Leah Epstein Csanád Imreh Asaf Levin Abstract We study the following variant of the bin covering problem. We are given a set of unit sized items, where each item has a color
NP-complete? NP-hard? Some Foundations of Complexity. Prof. Sven Hartmann Clausthal University of Technology Department of Informatics
NP-complete? NP-hard? Some Foundations of Complexity Prof. Sven Hartmann Clausthal University of Technology Department of Informatics Tractability of Problems Some problems are undecidable: no computer
Types of Degrees in Bipolar Fuzzy Graphs
pplied Mathematical Sciences, Vol. 7, 2013, no. 98, 4857-4866 HIKRI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2013.37389 Types of Degrees in Bipolar Fuzzy Graphs Basheer hamed Mohideen Department
Algorithm Design and Analysis
Algorithm Design and Analysis LECTURE 27 Approximation Algorithms Load Balancing Weighted Vertex Cover Reminder: Fill out SRTEs online Don t forget to click submit Sofya Raskhodnikova 12/6/2011 S. Raskhodnikova;
Graph theoretic techniques in the analysis of uniquely localizable sensor networks
Graph theoretic techniques in the analysis of uniquely localizable sensor networks Bill Jackson 1 and Tibor Jordán 2 ABSTRACT In the network localization problem the goal is to determine the location of
