Competitive Influence Maximization in Social Networks
|
|
|
- Janice Greer
- 9 years ago
- Views:
Transcription
1 Competitive Influence Maximization in Social Networks Shishir Bharathi David Kempe Mahyar Salek Department of Computer Science, University of Southern California Abstract. Social networks often serve as a medium for the diffusion of ideas or innovations. An individual s decision whether to adopt a product or innovation will be highly dependent on the choices made by the individual s peers or neighbors in the social network. In this work, we study the game of innovation diffusion with multiple competing innovations such as when multiple companies market competing products using viral marketing. Our first contribution is a natural and mathematically tractable model for the diffusion of multiple innovations in a network. We give a (1 1/e) approximation algorithm for computing the best response to an opponent s strategy, and prove that the price of competition of this game is at most 2. We also discuss first mover strategies which try to maximize the expected diffusion against perfect competition. Finally, we give an FPTAS for the problem of maximizing the influence of a single player when the underlying graph is a tree. 1 Introduction Social networks are graphs of individuals and their relationships, such as friendships, collaborations, or advice seeking relationships. In deciding whether to adopt an innovation (such as a political idea or product), individuals will frequently be influenced, explicitly or implicitly, by their social contacts. In order to effectively employ viral marketing [1, 2], i.e., marketing via word-of-mouth recommendations, it is thus essential for companies to identify opinion leaders to target, in the hopes that influencing them will lead to a large cascade of further recommendations. More formally, the influence maximization problem is the following: Given a probabilistic model for influence, determine a set A of k individuals yielding the largest expected cascade. 1 The formalization of influence maximization as an optimization problem is due to Domingos and Richardson [1], who modeled influence by an arbitrary Markov random field, and gave heuristics for maximization. The first provable approximation guarantees are given in [3 5]. In this paper, we extend past work by focusing on the case when multiple innovations are competing within a social network. This scenario will frequently arise in the real world: multiple companies with comparable products will vie for 1 More realistic models considering different marketing actions which affect multiple individuals can usually be reduced to the problem as described here (see [3]).
2 sales with competing word-of-mouth cascades; similarly, many innovations face active opposition also spreading by word of mouth. We propose a natural generalization of the independent cascade model [2] to multiple competing influences (see Section 2 for details). Our model extends Hotelling s model of competition [6], and is related to competitive facility location and Voronoi games [7, 8]. We first study second-mover strategies and equilibria of the resulting activation game and show that: Theorem 1. The last agent i to commit to a set S i for initial activation can efficiently find a (1 1/e) approximation to the optimal S i. Theorem 2. The price of competition of the game (resulting from lack of coordination among the agents) is at most a factor of 2. We analyze good first-mover strategies for the two-player game in Section 4, and give exact algorithms for simple special cases. Finally, we give an FPTAS for maximizing the influence of a single player on bidirected trees, even when the edges in opposite directions have different probabilities. [3, 4] proved that the general version of influence maximization is NP-complete, and we conjecture it is so even for arborescences directed into a root. 2 Models and Preliminaries The social network is represented as a directed graph G = (V,E). Following the independent cascade model [2, 3], each edge e = (u,v) E has an activation probability p e. Each node can be either inactive or active; in the latter case, it is assigned a color denoting the influence for which it is active (intuitively, the product that the node has adopted). To avoid tie-breaking for simultaneous activation attempts by multiple neighbors, we augment the model by a notion of activation time for each activation attempt. When node u becomes active at time t, it attempts to activate each currently inactive neighbor v. If the activation attempt from u on v succeeds, v will become active, of the same color as u, at time t+t uv, where the T uv are independent and exponentially distributed continuous random variables. Subsequently, v will try to activate inactive neighbors, and so forth. Thus, a node always has the color of the first neighbor succeeding in activating it. In the influence maximization game, each of b players selects a set S i of at most k i nodes. A node selected by multiple players will take the color of one of the players uniformly at random. Then, with S i being active for influence i, the process unfolds as described above until no new activations occur. Letting T 1,...,T b be the active sets at that point, the goal of each player i is to maximize E[ T i ]. Player i is indifferent between strategies S i and S i if their expected gain is the same. In particular, the game is thus not a zero-sum game. Simple examples show that in general, this game has no pure strategy Nash Equilibria; however, it does have mixed-strategy Nash Equilibria.
3 3 Best Response Strategies In order to gain a better understanding of the influence maximization game, we first focus on best response strategies for players. Lemma 1. Suppose that the strategies S j,j i for other players are fixed. Then, player i s payoff E[ T i S 1,...,S b ] from the strategy S i is a monotone and submodular function of S i. Proof. We obtain a deterministic equivalent of the activation process by choosing independently if each edge e = (u, v) will constitute a successful activation attempt by u on v (a biased coin flip with probability p e ), as well as the activation time T e, beforehand. Then, we consider running the (now deterministic) activation process using these outcomes and delays. If node u has color j, and activates node v successfully, we color the edge (u,v) with color j. A path P is called a color-j path if all its edges have color j. Then, a node u ends up colored with color j iff there is a color-j path from some node in S j to u. Conditioned on any outcome of all random choices as well as all S j,j i, the set of nodes reachable along color-i paths from S i is the union of all nodes reachable from any one node of S i. Thus, if S i S i, the set of nodes reachable from S i + v, but not from S i, is a superset of those reachable from S i + v, but not from S i (by monotonicity). Thus, given fixed outcomes of all random choices and S j,j i, the number of nodes reachable from S i is a monotone and submodular function of S i. Being a non-negative linear combination of submodular functions (with coefficients equal to the probabilities of the outcomes of the random choices), the objective function of player i is thus also monotone and submodular. The above lemma implies that for the last player to commit to a strategy, the greedy algorithm of iteratively adding a node with largest marginal gain is within a factor (1 1/e) of the best response (see [3]), thus proving Theorem 1. Second, as the expected total number of active nodes at the end is also a monotone submodular function of S := j S j, the game meets the requirements of a valid utility system as defined by Vetta [10]. We can apply Theorem 3.4 of [10] to obtain that the expected total number of nodes activated in any Nash Equilibrium is at least half the number activated by the best solution with a single player controlling all of the i b i initial activations. This proves Theorem 2. 4 First Mover Strategies We now consider first mover strategies in a duopoly, with 2 players called red and blue. The following variant of the competitive influence maximization problem is motivated by its similarity both to the case of multiple disjoint directed lines (discussed briefly below) and to a fair division problem: Given n lines of lengths l 1,...,l n, the red player first gets to make any k cuts, creating
4 k + n pieces whose lengths sum up to the original lengths. The blue player picks the k largest segments ( blue pieces ) and the red player gets the next-largest min(n,k) segments ( red pieces ). Assume for now that we know a cutoff point c such that all blue pieces have size at least c, and all red pieces have size at most c. Let F(i,r,b,c) denote the maximum total size of r red pieces in the i th line and G(i,r,b,c) the maximum total size of r red pieces over the first i lines. Then, we obtain the following recurrence relation, which turns into a dynamic program in the standard way. G(i,r,b,c) = max r =0...r max b =0...b F(i,r,b (r ),c) + G(i 1,r r,b b (r ),c) The main issue is then to reduce the number of candidates for the cutoff point c to a strongly polynomial number. The following lemma shows that we only need to try out nk candidate values l i /j,i = 1,...,n,j = 1,...,k for c (retaining the best solution found by the dynamic program), making the algorithm strongly polynomial. Lemma 2. The optimal solution cuts each line segment into equal-sized pieces. Proof. First, we can remove unused line segments from the problem instance. Second, partially used line segments can be converted to completely used line segments by adding the unused part to an existing blue segment (if it exists) or to an existing red segment (if no blue piece exists). The latter may entice the blue player to take a red piece. But this frees up a formerly blue piece (of size at least c) to be picked up by the red player. W.l.o.g., all pieces of the same color on a line segment are of the same size. If the optimal solution contains an unevenly cut line with red and blue pieces, we increase the sizes of all red pieces and decrease the sizes of all blue pieces until the line is cut evenly. As before, the red player s gain cannot be reduced by the blue player switching to a different piece, because any new piece the red player may obtain after the blue player switches will have size at least c. The above algorithm can be extended to deal with directed lines and even outdirected arborescences. In the former case, the slight difference is that the leftmost piece of any line is not available to the red player. These extensions are deferred to the full version due to space constraints. 5 Influence Maximization on Bidirected Trees While the single-player influence maximization problem is APX-hard in general [3], special cases of graph structures are more amenable to approximation. Here, we will give an FPTAS for the influence maximization problem for bi-directed trees. (This FPTAS can be extended to bounded treewidth graphs with a significant increase in complexity.) Given a target ε, we will give a 1 ε approximation based on a combination of dynamic programming and rounding of probabilities.
5 For the subtree rooted at node v, let G(v,k,q +,q ) denote the expected number of nodes that will be activated by an optimum strategy, provided that (1) v is activated by its parent with probability at most q, and (2) v has to be activated by its subtree with probability at least q +. Let v be a node of degree d with children v 1,...v d. Then, for the respective subproblems, we can choose arbitrary k 1,...,k d, q 1 +,...,q+ d, q 1,...,q d, such that (1) i k i = k, q + 1 i (1 q+ i p v i,v) and q i p v,vi (1 (1 q ) j i (1 q + j p v j,v)) if v is selected, or (2) i k i = k 1, q + 1 and q i p v,vi if v is not selected. If (1) or (2) is satisfied, we call the values consistent. For consistent values, the optimum can be characterized as: G(v,k,q +,q ) = max (k i),(q + i ),(q i ) i=1 m G(v i,k i,q + i,q i ) + 1 (1 q+ )(1 q ). (1) As discussed above, the maximum is over both the case that v is selected, and that it is not. It can be computed via a nested dynamic program over the values of i. In this form, G(v,k,q +,q ) may have to be calculated for exponentially many values of q + and q. To deal with this problem, we define δ = ε/n 3, and compute (and store) the values G(v,k,q +,q ) only for q + and q which are multiples of δ between 0 and 1. The number of computed entries is then polynomial in n and 1/ε. Let G (v,k,q +,q ) denote the gain obtained by the best consistent solution to the rounding version of the dynamic program, and q δ the value of q rounded down to the nearest multiple of δ. Then, for the rounding version, we have Theorem 3. For all v,k,q +,q, there exists a value r + q + with q + r + δ T v, such that G(v,k,q +,q ) G (v,k,r +, q δ ) δ T v 3, where T v is the number of nodes in the subtree rooted at v. Applying the theorem at the root of the tree, we obtain that the rounding dynamic program will find a solution differing from the optimum by at most an additive δn 3 ε ε OPT, proving that the algorithm is an FPTAS. Proof. We will prove the theorem by induction on the tree structure. It clearly holds for all leaves, by choosing r + = q + δ. Let v be an internal node of degree d, with children v 1,...,v d. Let (k i ),(q + i ),(q i ) be the arguments for the optimum subproblems of G(v,k,q +,q ). By induction hypothesis, applied to each of the subtrees, there are values r + i q + i with q + i r + i δ T vi, such that G(v i,k i,q + i,q i ) G (v i,k i,r + i, q i δ) δ T vi 3. Define r + := 1 i (1 r+ i p v i,v) δ, (or r + = 1, if the optimum solution included node v). By definition, r + is consistent with the r + i. Using Lemma 4 below and the inductive guarantee on the r + i values, we obtain directly that q + r + δ T v (where we used the fact that i T v i + 1 = T v ). Next, we define r i = p v,vi (1 (1 q δ ) j i (1 r+ j p v j,v)) δ for all i. Again, the r i are consistent by definition, and by using the inductively guaranteed bounds on q + j r+ j as well as Lemma 4, we obtain that q i r i δ( T v + 1) for all i.
6 Now, applying Lemma 3, we obtain that G (v i,k i,r + i,q i ) G (v i,k i,r + i,r i ) δ T vi ( T v + 1), for all i. In other words, because the input values to the subproblems did not need to be perturbed significantly to make the r i consistent, the value of the rounding dynamic program cannot have changed too much. Combining these bounds with the inductive assumption for each subproblem, we have: G (v,k,r +, q δ ) i G (v i,k i,r + i,r i ) + 1 (1 r+ )(1 q δ ) i (G (v i,k i,r + i, q i δ) δ T vi ( T v + 1)) +1 (1 q + + δ T v )(1 q + δ) IH i (G(v i,k i,q + i,q i ) δ( T v i 3 + ( T v + 1) T vi )) +1 (1 q + )(1 q ) δ(1 + T v ) G(v,k,q +,q ) δ T v 3. The following two lemmas are proved by induction; their proofs are deferred to the full version due to space constraints. Lemma 3. If r q, then G (v,k,q +,q ) G (v,k,q +,r ) T v (q r ). Lemma 4. For any a 1,...,a n and b 1,...,b n, n i=1 a i n i=1 b i = n i=1 (a i b i ) i 1 j=1 a j n j=i+1 b j Acknowledgments We would like to thank Bobby Kleinberg and Ranjit Raveendran for useful discussions, and anonymous reviewers for helpful feedback on previous versions of this paper. References 1. Domingos, P., Richardson, M.: Mining the network value of customers. In: Proc. 7th KDD. (2001) Goldenberg, J., Libai, B., Muller, E.: Talk of the network: A complex systems look at the underlying process of word-of-mouth. Marketing Letters 12 (2001) Kempe, D., Kleinberg, J., Tardos, E.: Maximizing the spread of influence in a social network. In: Proc. 9th KDD. (2003) Kempe, D., Kleinberg, J., Tardos, E.: Influential nodes in a diffusion model for social networks. In: Proc. 32nd ICALP. (2005) 5. Mossel, E., Roch, S.: On the submodularity of influence in social networks. In: Proc. 38th ACM STOC. (2007) 6. Hotelling, H.: Stability in competition. The Economic Journal 39 (1929) Ahn, H., Cheng, S., Cheong, O., Golin, M., van Oostrom, R.: Competitive facility location along a highway. In: Computing and Combinatorics : 7th Annual International Conference, COCOON 2001, Guilin, China. (2001) Cheong, O., Har-Peled, S., Linial, N., Matoušek, J.: The one-round voronoi game. Discrete And Computational Geometry 31 (2004) Nemhauser, G., Wolsey, L., Fisher, M.: An analysis of the approximations for maximizing submodular set functions. Mathematical Programming 14 (1978) Vetta, A.: Nash equlibria in competitive societies with applications to facility location, traffic routing and auctions. In: Proc. 43rd IEEE FOCS. (2002)
Bargaining Solutions in a Social Network
Bargaining Solutions in a Social Network Tanmoy Chakraborty and Michael Kearns Department of Computer and Information Science University of Pennsylvania Abstract. We study the concept of bargaining solutions,
Maximizing the Spread of Influence through a Social Network
Maximizing the Spread of Influence through a Social Network David Kempe Dept. of Computer Science Cornell University, Ithaca NY [email protected] Jon Kleinberg Dept. of Computer Science Cornell University,
Fairness in Routing and Load Balancing
Fairness in Routing and Load Balancing Jon Kleinberg Yuval Rabani Éva Tardos Abstract We consider the issue of network routing subject to explicit fairness conditions. The optimization of fairness criteria
5.1 Bipartite Matching
CS787: Advanced Algorithms Lecture 5: Applications of Network Flow In the last lecture, we looked at the problem of finding the maximum flow in a graph, and how it can be efficiently solved using the Ford-Fulkerson
Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs
Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs Yong Zhang 1.2, Francis Y.L. Chin 2, and Hing-Fung Ting 2 1 College of Mathematics and Computer Science, Hebei University,
A simpler and better derandomization of an approximation algorithm for Single Source Rent-or-Buy
A simpler and better derandomization of an approximation algorithm for Single Source Rent-or-Buy David P. Williamson Anke van Zuylen School of Operations Research and Industrial Engineering, Cornell University,
Decentralized Utility-based Sensor Network Design
Decentralized Utility-based Sensor Network Design Narayanan Sadagopan and Bhaskar Krishnamachari University of Southern California, Los Angeles, CA 90089-0781, USA [email protected], [email protected]
Exponential time algorithms for graph coloring
Exponential time algorithms for graph coloring Uriel Feige Lecture notes, March 14, 2011 1 Introduction Let [n] denote the set {1,..., k}. A k-labeling of vertices of a graph G(V, E) is a function V [k].
Approximation Algorithms
Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms
Online Adwords Allocation
Online Adwords Allocation Shoshana Neuburger May 6, 2009 1 Overview Many search engines auction the advertising space alongside search results. When Google interviewed Amin Saberi in 2004, their advertisement
6.254 : Game Theory with Engineering Applications Lecture 2: Strategic Form Games
6.254 : Game Theory with Engineering Applications Lecture 2: Strategic Form Games Asu Ozdaglar MIT February 4, 2009 1 Introduction Outline Decisions, utility maximization Strategic form games Best responses
On the Unique Games Conjecture
On the Unique Games Conjecture Antonios Angelakis National Technical University of Athens June 16, 2015 Antonios Angelakis (NTUA) Theory of Computation June 16, 2015 1 / 20 Overview 1 Introduction 2 Preliminary
CS 598CSC: Combinatorial Optimization Lecture date: 2/4/2010
CS 598CSC: Combinatorial Optimization Lecture date: /4/010 Instructor: Chandra Chekuri Scribe: David Morrison Gomory-Hu Trees (The work in this section closely follows [3]) Let G = (V, E) be an undirected
! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm.
Approximation Algorithms 11 Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of three
Guessing Game: NP-Complete?
Guessing Game: NP-Complete? 1. LONGEST-PATH: Given a graph G = (V, E), does there exists a simple path of length at least k edges? YES 2. SHORTEST-PATH: Given a graph G = (V, E), does there exists a simple
Even Faster Algorithm for Set Splitting!
Even Faster Algorithm for Set Splitting! Daniel Lokshtanov Saket Saurabh Abstract In the p-set Splitting problem we are given a universe U, a family F of subsets of U and a positive integer k and the objective
A Note on Maximum Independent Sets in Rectangle Intersection Graphs
A Note on Maximum Independent Sets in Rectangle Intersection Graphs Timothy M. Chan School of Computer Science University of Waterloo Waterloo, Ontario N2L 3G1, Canada [email protected] September 12,
Lecture 1: Course overview, circuits, and formulas
Lecture 1: Course overview, circuits, and formulas Topics in Complexity Theory and Pseudorandomness (Spring 2013) Rutgers University Swastik Kopparty Scribes: John Kim, Ben Lund 1 Course Information Swastik
NETWORK DESIGN AND MANAGEMENT WITH STRATEGIC AGENTS
NETWORK DESIGN AND MANAGEMENT WITH STRATEGIC AGENTS A Dissertation Presented to the Faculty of the Graduate School of Cornell University in Partial Fulfillment of the Requirements for the Degree of Doctor
Definition 11.1. Given a graph G on n vertices, we define the following quantities:
Lecture 11 The Lovász ϑ Function 11.1 Perfect graphs We begin with some background on perfect graphs. graphs. First, we define some quantities on Definition 11.1. Given a graph G on n vertices, we define
Mechanisms for Fair Attribution
Mechanisms for Fair Attribution Eric Balkanski Yaron Singer Abstract We propose a new framework for optimization under fairness constraints. The problems we consider model procurement where the goal is
Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling
Approximation Algorithms Chapter Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should I do? A. Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one
8.1 Min Degree Spanning Tree
CS880: Approximations Algorithms Scribe: Siddharth Barman Lecturer: Shuchi Chawla Topic: Min Degree Spanning Tree Date: 02/15/07 In this lecture we give a local search based algorithm for the Min Degree
Lecture 22: November 10
CS271 Randomness & Computation Fall 2011 Lecture 22: November 10 Lecturer: Alistair Sinclair Based on scribe notes by Rafael Frongillo Disclaimer: These notes have not been subjected to the usual scrutiny
! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm.
Approximation Algorithms Chapter Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of
Generating models of a matched formula with a polynomial delay
Generating models of a matched formula with a polynomial delay Petr Savicky Institute of Computer Science, Academy of Sciences of Czech Republic, Pod Vodárenskou Věží 2, 182 07 Praha 8, Czech Republic
A Graph-Theoretic Network Security Game
A Graph-Theoretic Network Security Game Marios Mavronicolas 1, Vicky Papadopoulou 1, Anna Philippou 1, and Paul Spirakis 2 1 Department of Computer Science, University of Cyprus, Nicosia CY-1678, Cyprus.
Chapter 7. Sealed-bid Auctions
Chapter 7 Sealed-bid Auctions An auction is a procedure used for selling and buying items by offering them up for bid. Auctions are often used to sell objects that have a variable price (for example oil)
Near Optimal Solutions
Near Optimal Solutions Many important optimization problems are lacking efficient solutions. NP-Complete problems unlikely to have polynomial time solutions. Good heuristics important for such problems.
ECON 459 Game Theory. Lecture Notes Auctions. Luca Anderlini Spring 2015
ECON 459 Game Theory Lecture Notes Auctions Luca Anderlini Spring 2015 These notes have been used before. If you can still spot any errors or have any suggestions for improvement, please let me know. 1
Discrete Applied Mathematics. The firefighter problem with more than one firefighter on trees
Discrete Applied Mathematics 161 (2013) 899 908 Contents lists available at SciVerse ScienceDirect Discrete Applied Mathematics journal homepage: www.elsevier.com/locate/dam The firefighter problem with
Analysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs
Analysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs Stavros Athanassopoulos, Ioannis Caragiannis, and Christos Kaklamanis Research Academic Computer Technology Institute
6.207/14.15: Networks Lecture 15: Repeated Games and Cooperation
6.207/14.15: Networks Lecture 15: Repeated Games and Cooperation Daron Acemoglu and Asu Ozdaglar MIT November 2, 2009 1 Introduction Outline The problem of cooperation Finitely-repeated prisoner s dilemma
Polynomial Degree and Lower Bounds in Quantum Complexity: Collision and Element Distinctness with Small Range
THEORY OF COMPUTING, Volume 1 (2005), pp. 37 46 http://theoryofcomputing.org Polynomial Degree and Lower Bounds in Quantum Complexity: Collision and Element Distinctness with Small Range Andris Ambainis
Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs
CSE599s: Extremal Combinatorics November 21, 2011 Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs Lecturer: Anup Rao 1 An Arithmetic Circuit Lower Bound An arithmetic circuit is just like
A Practical Scheme for Wireless Network Operation
A Practical Scheme for Wireless Network Operation Radhika Gowaikar, Amir F. Dana, Babak Hassibi, Michelle Effros June 21, 2004 Abstract In many problems in wireline networks, it is known that achieving
Cost effective Outbreak Detection in Networks
Cost effective Outbreak Detection in Networks Jure Leskovec Joint work with Andreas Krause, Carlos Guestrin, Christos Faloutsos, Jeanne VanBriesen, and Natalie Glance Diffusion in Social Networks One of
Reliability Guarantees in Automata Based Scheduling for Embedded Control Software
1 Reliability Guarantees in Automata Based Scheduling for Embedded Control Software Santhosh Prabhu, Aritra Hazra, Pallab Dasgupta Department of CSE, IIT Kharagpur West Bengal, India - 721302. Email: {santhosh.prabhu,
A NOTE ON OFF-DIAGONAL SMALL ON-LINE RAMSEY NUMBERS FOR PATHS
A NOTE ON OFF-DIAGONAL SMALL ON-LINE RAMSEY NUMBERS FOR PATHS PAWE L PRA LAT Abstract. In this note we consider the on-line Ramsey numbers R(P n, P m ) for paths. Using a high performance computing clusters,
Some Polynomial Theorems. John Kennedy Mathematics Department Santa Monica College 1900 Pico Blvd. Santa Monica, CA 90405 [email protected].
Some Polynomial Theorems by John Kennedy Mathematics Department Santa Monica College 1900 Pico Blvd. Santa Monica, CA 90405 [email protected] This paper contains a collection of 31 theorems, lemmas,
Solutions for Practice problems on proofs
Solutions for Practice problems on proofs Definition: (even) An integer n Z is even if and only if n = 2m for some number m Z. Definition: (odd) An integer n Z is odd if and only if n = 2m + 1 for some
Game Theory and Algorithms Lecture 10: Extensive Games: Critiques and Extensions
Game Theory and Algorithms Lecture 0: Extensive Games: Critiques and Extensions March 3, 0 Summary: We discuss a game called the centipede game, a simple extensive game where the prediction made by backwards
Competitive Analysis of On line Randomized Call Control in Cellular Networks
Competitive Analysis of On line Randomized Call Control in Cellular Networks Ioannis Caragiannis Christos Kaklamanis Evi Papaioannou Abstract In this paper we address an important communication issue arising
Load Balancing and Switch Scheduling
EE384Y Project Final Report Load Balancing and Switch Scheduling Xiangheng Liu Department of Electrical Engineering Stanford University, Stanford CA 94305 Email: [email protected] Abstract Load
Christmas Gift Exchange Games
Christmas Gift Exchange Games Arpita Ghosh 1 and Mohammad Mahdian 1 Yahoo! Research Santa Clara, CA, USA. Email: [email protected], [email protected] Abstract. The Christmas gift exchange is a popular
In Search of Influential Event Organizers in Online Social Networks
In Search of Influential Event Organizers in Online Social Networks ABSTRACT Kaiyu Feng 1,2 Gao Cong 2 Sourav S. Bhowmick 2 Shuai Ma 3 1 LILY, Interdisciplinary Graduate School. Nanyang Technological University,
AN ANALYSIS OF A WAR-LIKE CARD GAME. Introduction
AN ANALYSIS OF A WAR-LIKE CARD GAME BORIS ALEXEEV AND JACOB TSIMERMAN Abstract. In his book Mathematical Mind-Benders, Peter Winkler poses the following open problem, originally due to the first author:
Outline. NP-completeness. When is a problem easy? When is a problem hard? Today. Euler Circuits
Outline NP-completeness Examples of Easy vs. Hard problems Euler circuit vs. Hamiltonian circuit Shortest Path vs. Longest Path 2-pairs sum vs. general Subset Sum Reducing one problem to another Clique
Markov random fields and Gibbs measures
Chapter Markov random fields and Gibbs measures 1. Conditional independence Suppose X i is a random element of (X i, B i ), for i = 1, 2, 3, with all X i defined on the same probability space (.F, P).
Sequential lmove Games. Using Backward Induction (Rollback) to Find Equilibrium
Sequential lmove Games Using Backward Induction (Rollback) to Find Equilibrium Sequential Move Class Game: Century Mark Played by fixed pairs of players taking turns. At each turn, each player chooses
10 Evolutionarily Stable Strategies
10 Evolutionarily Stable Strategies There is but a step between the sublime and the ridiculous. Leo Tolstoy In 1973 the biologist John Maynard Smith and the mathematician G. R. Price wrote an article in
Computational Game Theory and Clustering
Computational Game Theory and Clustering Martin Hoefer [email protected] 1 Computational Game Theory? 2 Complexity and Computation of Equilibrium 3 Bounding Inefficiencies 4 Conclusion Computational
Arrangements And Duality
Arrangements And Duality 3.1 Introduction 3 Point configurations are tbe most basic structure we study in computational geometry. But what about configurations of more complicated shapes? For example,
arxiv:1203.1525v1 [math.co] 7 Mar 2012
Constructing subset partition graphs with strong adjacency and end-point count properties Nicolai Hähnle [email protected] arxiv:1203.1525v1 [math.co] 7 Mar 2012 March 8, 2012 Abstract Kim defined
ON THE COMPLEXITY OF THE GAME OF SET. {kamalika,pbg,dratajcz,hoeteck}@cs.berkeley.edu
ON THE COMPLEXITY OF THE GAME OF SET KAMALIKA CHAUDHURI, BRIGHTEN GODFREY, DAVID RATAJCZAK, AND HOETECK WEE {kamalika,pbg,dratajcz,hoeteck}@cs.berkeley.edu ABSTRACT. Set R is a card game played with a
The Goldberg Rao Algorithm for the Maximum Flow Problem
The Goldberg Rao Algorithm for the Maximum Flow Problem COS 528 class notes October 18, 2006 Scribe: Dávid Papp Main idea: use of the blocking flow paradigm to achieve essentially O(min{m 2/3, n 1/2 }
The Trip Scheduling Problem
The Trip Scheduling Problem Claudia Archetti Department of Quantitative Methods, University of Brescia Contrada Santa Chiara 50, 25122 Brescia, Italy Martin Savelsbergh School of Industrial and Systems
How Asymmetry Helps Load Balancing
How Asymmetry Helps oad Balancing Berthold Vöcking nternational Computer Science nstitute Berkeley, CA 947041198 voecking@icsiberkeleyedu Abstract This paper deals with balls and bins processes related
Optimizing Display Advertising in Online Social Networks
Optimizing Display Advertising in Online Social Networks Zeinab Abbassi Dept. of Computer Science Columbia University [email protected] Aditya Bhaskara Google Research New York [email protected]
Lecture 11: Sponsored search
Computational Learning Theory Spring Semester, 2009/10 Lecture 11: Sponsored search Lecturer: Yishay Mansour Scribe: Ben Pere, Jonathan Heimann, Alon Levin 11.1 Sponsored Search 11.1.1 Introduction Search
Lecture 5 - CPA security, Pseudorandom functions
Lecture 5 - CPA security, Pseudorandom functions Boaz Barak October 2, 2007 Reading Pages 82 93 and 221 225 of KL (sections 3.5, 3.6.1, 3.6.2 and 6.5). See also Goldreich (Vol I) for proof of PRF construction.
6.3 Conditional Probability and Independence
222 CHAPTER 6. PROBABILITY 6.3 Conditional Probability and Independence Conditional Probability Two cubical dice each have a triangle painted on one side, a circle painted on two sides and a square painted
Equilibrium computation: Part 1
Equilibrium computation: Part 1 Nicola Gatti 1 Troels Bjerre Sorensen 2 1 Politecnico di Milano, Italy 2 Duke University, USA Nicola Gatti and Troels Bjerre Sørensen ( Politecnico di Milano, Italy, Equilibrium
The positive minimum degree game on sparse graphs
The positive minimum degree game on sparse graphs József Balogh Department of Mathematical Sciences University of Illinois, USA [email protected] András Pluhár Department of Computer Science University
Compact Representations and Approximations for Compuation in Games
Compact Representations and Approximations for Compuation in Games Kevin Swersky April 23, 2008 Abstract Compact representations have recently been developed as a way of both encoding the strategic interactions
1 Approximating Set Cover
CS 05: Algorithms (Grad) Feb 2-24, 2005 Approximating Set Cover. Definition An Instance (X, F ) of the set-covering problem consists of a finite set X and a family F of subset of X, such that every elemennt
Institut für Informatik Lehrstuhl Theoretische Informatik I / Komplexitätstheorie. An Iterative Compression Algorithm for Vertex Cover
Friedrich-Schiller-Universität Jena Institut für Informatik Lehrstuhl Theoretische Informatik I / Komplexitätstheorie Studienarbeit An Iterative Compression Algorithm for Vertex Cover von Thomas Peiselt
6.852: Distributed Algorithms Fall, 2009. Class 2
.8: Distributed Algorithms Fall, 009 Class Today s plan Leader election in a synchronous ring: Lower bound for comparison-based algorithms. Basic computation in general synchronous networks: Leader election
ECON 40050 Game Theory Exam 1 - Answer Key. 4) All exams must be turned in by 1:45 pm. No extensions will be granted.
1 ECON 40050 Game Theory Exam 1 - Answer Key Instructions: 1) You may use a pen or pencil, a hand-held nonprogrammable calculator, and a ruler. No other materials may be at or near your desk. Books, coats,
A Note on the Bertsimas & Sim Algorithm for Robust Combinatorial Optimization Problems
myjournal manuscript No. (will be inserted by the editor) A Note on the Bertsimas & Sim Algorithm for Robust Combinatorial Optimization Problems Eduardo Álvarez-Miranda Ivana Ljubić Paolo Toth Received:
1. Write the number of the left-hand item next to the item on the right that corresponds to it.
1. Write the number of the left-hand item next to the item on the right that corresponds to it. 1. Stanford prison experiment 2. Friendster 3. neuron 4. router 5. tipping 6. small worlds 7. job-hunting
SOLUTIONS TO EXERCISES FOR. MATHEMATICS 205A Part 3. Spaces with special properties
SOLUTIONS TO EXERCISES FOR MATHEMATICS 205A Part 3 Fall 2008 III. Spaces with special properties III.1 : Compact spaces I Problems from Munkres, 26, pp. 170 172 3. Show that a finite union of compact subspaces
1 Introduction. Linear Programming. Questions. A general optimization problem is of the form: choose x to. max f(x) subject to x S. where.
Introduction Linear Programming Neil Laws TT 00 A general optimization problem is of the form: choose x to maximise f(x) subject to x S where x = (x,..., x n ) T, f : R n R is the objective function, S
The Basics of Graphical Models
The Basics of Graphical Models David M. Blei Columbia University October 3, 2015 Introduction These notes follow Chapter 2 of An Introduction to Probabilistic Graphical Models by Michael Jordan. Many figures
Shortcut sets for plane Euclidean networks (Extended abstract) 1
Shortcut sets for plane Euclidean networks (Extended abstract) 1 J. Cáceres a D. Garijo b A. González b A. Márquez b M. L. Puertas a P. Ribeiro c a Departamento de Matemáticas, Universidad de Almería,
MapReduce and Distributed Data Analysis. Sergei Vassilvitskii Google Research
MapReduce and Distributed Data Analysis Google Research 1 Dealing With Massive Data 2 2 Dealing With Massive Data Polynomial Memory Sublinear RAM Sketches External Memory Property Testing 3 3 Dealing With
Influence Propagation in Social Networks: a Data Mining Perspective
Influence Propagation in Social Networks: a Data Mining Perspective Francesco Bonchi Yahoo! Research Barcelona - Spain [email protected] http://francescobonchi.com/ Acknowledgments Amit Goyal (University
Influences in low-degree polynomials
Influences in low-degree polynomials Artūrs Bačkurs December 12, 2012 1 Introduction In 3] it is conjectured that every bounded real polynomial has a highly influential variable The conjecture is known
Approximating Minimum Bounded Degree Spanning Trees to within One of Optimal
Approximating Minimum Bounded Degree Spanning Trees to within One of Optimal ABSTACT Mohit Singh Tepper School of Business Carnegie Mellon University Pittsburgh, PA USA [email protected] In the MINIMUM
Online and Offline Selling in Limit Order Markets
Online and Offline Selling in Limit Order Markets Kevin L. Chang 1 and Aaron Johnson 2 1 Yahoo Inc. [email protected] 2 Yale University [email protected] Abstract. Completely automated electronic
Midterm Practice Problems
6.042/8.062J Mathematics for Computer Science October 2, 200 Tom Leighton, Marten van Dijk, and Brooke Cowan Midterm Practice Problems Problem. [0 points] In problem set you showed that the nand operator
Analysis of Algorithms, I
Analysis of Algorithms, I CSOR W4231.002 Eleni Drinea Computer Science Department Columbia University Thursday, February 26, 2015 Outline 1 Recap 2 Representing graphs 3 Breadth-first search (BFS) 4 Applications
CSC2420 Fall 2012: Algorithm Design, Analysis and Theory
CSC2420 Fall 2012: Algorithm Design, Analysis and Theory Allan Borodin November 15, 2012; Lecture 10 1 / 27 Randomized online bipartite matching and the adwords problem. We briefly return to online algorithms
Online Bipartite Perfect Matching With Augmentations
Online Bipartite Perfect Matching With Augmentations Kamalika Chaudhuri, Constantinos Daskalakis, Robert D. Kleinberg, and Henry Lin Information Theory and Applications Center, U.C. San Diego Email: [email protected]
