Conflict-Aware Event-Participant Arrangement

Slides:



Advertisements
Similar presentations
On allocations that maximize fairness Uriel Feige Microsoft Research and Weizmann Institute.
Advertisements

A Dependent LP-Rounding Approach for the k-Median Problem Moses Charikar 1 Shi Li 1 1 Department of Computer Science Princeton University ICALP 2012, Warwick,
Davide Mottin, Senjuti Basu Roy, Alice Marascu, Yannis Velegrakis, Themis Palpanas, Gautam Das A Probabilistic Optimization Framework for the Empty-Answer.
Diversity Maximization Under Matroid Constraints Date : 2013/11/06 Source : KDD’13 Authors : Zeinab Abbassi, Vahab S. Mirrokni, Mayur Thakur Advisor :
Principal Component Analysis Based on L1-Norm Maximization Nojun Kwak IEEE Transactions on Pattern Analysis and Machine Intelligence, 2008.
Minimizing Seed Set for Viral Marketing Cheng Long & Raymond Chi-Wing Wong Presented by: Cheng Long 20-August-2011.
Coverage by Directional Sensors Jing Ai and Alhussein A. Abouzeid Dept. of Electrical, Computer and Systems Engineering Rensselaer Polytechnic Institute.
Online Social Networks and Media. Graph partitioning The general problem – Input: a graph G=(V,E) edge (u,v) denotes similarity between u and v weighted.
Da Yan, Zhou Zhao and Wilfred Ng The Hong Kong University of Science and Technology.
1 Efficient Subgraph Search over Large Uncertain Graphs Ye Yuan 1, Guoren Wang 1, Haixun Wang 2, Lei Chen 3 1. Northeastern University, China 2. Microsoft.
A Generic Framework for Handling Uncertain Data with Local Correlations Xiang Lian and Lei Chen Department of Computer Science and Engineering The Hong.
Integrating Bayesian Networks and Simpson’s Paradox in Data Mining Alex Freitas University of Kent Ken McGarry University of Sunderland.
Quantile-Based KNN over Multi- Valued Objects Wenjie Zhang Xuemin Lin, Muhammad Aamir Cheema, Ying Zhang, Wei Wang The University of New South Wales, Australia.
Placement of Integration Points in Multi-hop Community Networks Ranveer Chandra (Cornell University) Lili Qiu, Kamal Jain and Mohammad Mahdian (Microsoft.
Efficient Hop ID based Routing for Sparse Ad Hoc Networks Yao Zhao 1, Bo Li 2, Qian Zhang 2, Yan Chen 1, Wenwu Zhu 3 1 Lab for Internet & Security Technology,
Probabilistic Similarity Search for Uncertain Time Series Presented by CAO Chen 21 st Feb, 2011.
1 A Shifting Strategy for Dynamic Channel Assignment under Spatially Varying Demand Harish Rathi Advisors: Prof. Karen Daniels, Prof. Kavitha Chandra Center.
[1][1][1][1] Lecture 5-7: Cell Planning of Cellular Networks June 22 + July 6, Introduction to Algorithmic Wireless Communications David Amzallag.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
The community-search problem and how to plan a successful cocktail party Mauro SozioAris Gionis Max Planck Institute, Germany Yahoo! Research, Barcelona.
1 TDMA Scheduling in Competitive Wireless Networks Mario CagaljHai Zhan EPFL - I&C - LCA February 9, 2005.
Viral Marketing for Dedicated Customers Presented by: Cheng Long 25 August, 2012.
Distributed Constraint Optimization Michal Jakob Agent Technology Center, Dept. of Computer Science and Engineering, FEE, Czech Technical University A4M33MAS.
VLDB 2012 Mining Frequent Itemsets over Uncertain Databases Yongxin Tong 1, Lei Chen 1, Yurong Cheng 2, Philip S. Yu 3 1 The Hong Kong University of Science.
1 Core-PC: A Class of Correlative Power Control Algorithms for Single Channel Mobile Ad Hoc Networks Jun Zhang and Brahim Bensaou The Hong Kong University.
Ranking Queries on Uncertain Data: A Probabilistic Threshold Approach Wenjie Zhang, Xuemin Lin The University of New South Wales & NICTA Ming Hua,
Towards Robust Indexing for Ranked Queries Dong Xin, Chen Chen, Jiawei Han Department of Computer Science University of Illinois at Urbana-Champaign VLDB.
Optimal resource assignment to maximize multistate network reliability for a computer network Yi-Kuei Lin, Cheng-Ta Yeh Advisor : Professor Frank Y. S.
DISCERN: Cooperative Whitespace Scanning in Practical Environments Tarun Bansal, Bo Chen and Prasun Sinha Ohio State Univeristy.
Comp 538 Course Presentation Discrete Factor Analysis Learning Hidden Variables in Bayesian Network Calvin Hua & Lily Tian Computer Science Dep, HKUST.
Clustering Moving Objects in Spatial Networks Jidong Chen, Caifeng Lai, Xiaofeng Meng, Renmin University of China Jianliang Xu, and Haibo Hu Hong Kong.
Improving Web Search Results Using Affinity Graph Benyu Zhang, Hua Li, Yi Liu, Lei Ji, Wensi Xi, Weiguo Fan, Zheng Chen, Wei-Ying Ma Microsoft Research.
Graph Query Reformulation with Diversity – Davide Mottin, Francesco Bonchi, Francesco Gullo 1 Graph Query Reformulation with Diversity Davide Mottin, University.
On Concise Set of Relative Candidate Keys Shaoxu Song (Tsinghua), Lei Chen (HKUST), Hong Cheng (CUHK)
QoS Supported Clustered Query Processing in Large Collaboration of Heterogeneous Sensor Networks Debraj De and Lifeng Sang Ohio State University Workshop.
An Optimal Distributed Call Admission control for Adaptive Multimedia in Wireless/Mobile Networks Reporter: 電機所 鄭志川.
Tung-Wei Kuo, Kate Ching-Ju Lin, and Ming-Jer Tsai Academia Sinica, Taiwan National Tsing Hua University, Taiwan Maximizing Submodular Set Function with.
1 Planning Base Station and Relay Station Locations in IEEE j Multi-hop Relay Networks Yang Yu, Seán Murphy, Liam Murphy Department of Computer Science.
Deterministic Algorithms for Submodular Maximization Problems Moran Feldman The Open University of Israel Joint work with Niv Buchbinder.
CopyCatch: Stopping Group Attacks by Spotting Lockstep Behavior in Social Networks (WWW2013) BEUTEL, ALEX, WANHONG XU, VENKATESAN GURUSWAMI, CHRISTOPHER.
Polyhedral Optimization Lecture 5 – Part 3 M. Pawan Kumar Slides available online
Optimal Relay Placement for Indoor Sensor Networks Cuiyao Xue †, Yanmin Zhu †, Lei Ni †, Minglu Li †, Bo Li ‡ † Shanghai Jiao Tong University ‡ HK University.
Approximation Algorithms Duality My T. UF.
A Low Interference Channel Assignment Algorithm for Wireless Mesh Networks Can Que 1,2, Xinming Zhang 1, and Shifang Dai 1 1.Department of Computer Science.
Biao Wang 1, Ge Chen 1, Luoyi Fu 1, Li Song 1, Xinbing Wang 1, Xue Liu 2 1 Shanghai Jiao Tong University 2 McGill University
Distributed Control and Autonomous Systems Lab. Sang-Hyuk Yun and Hyo-Sung Ahn Distributed Control and Autonomous Systems Laboratory (DCASL ) Department.
The Chinese University of Hong Kong Learning Larger Margin Machine Locally and Globally Dept. of Computer Science and Engineering The Chinese University.
Impact of Interference on Multi-hop Wireless Network Performance
Outline Introduction State-of-the-art solutions
Semi-Supervised Clustering
Data Driven Resource Allocation for Distributed Learning
Abolfazl Asudeh Azade Nazi Nan Zhang Gautam DaS
Xiangtong Qi The Hong Kong University of Science and Technology
RE-Tree: An Efficient Index Structure for Regular Expressions
Online Mobile Micro-Task Allocation in Spatial Crowdsourcing
Feedback-Aware Social Event-Participant Arrangement
Friend Recommendation with a Target User in Social Networking Services
Differential Privacy in Practice
Mining Frequent Itemsets over Uncertain Databases
Sheqin Dong, Song Chen, Xianlong Hong EDA Lab., Tsinghua Univ. Beijing
Xinbing Wang*, Qian Zhang**
Coverage and Distinguishability in Traffic Flow Monitoring
Metaheuristic methods and their applications. Optimization Problems Strategies for Solving NP-hard Optimization Problems What is a Metaheuristic Method?
Multi-Objective Optimization
Efficient Subgraph Similarity All-Matching
On the Designing of Popular Packages
Maximizing Broadcast Tree Lifetime in Wireless Ad Hoc Networks
Efficient Task Allocation for Mobile Crowdsensing
Efficient Processing of Top-k Spatial Preference Queries
Approximate Graph Mining with Label Costs
Presentation transcript:

Conflict-Aware Event-Participant Arrangement Jieying She, Yongxin Tong, Lei Chen, Caleb Chen Cao The Hong Kong University of Science and Technology

Outline 1. Introduction 2. Problem Definition 3. Algorithms 4. Experiments 5. Conclusion

Introduction: Event-Based Social Network (EBSN) A snapshot of Meetup.com

Tabletop Game Word Game Sports Gathering Tabletop Game Gathering Tabletop Game Word Game Business Gathering Volleyball Word Game

Can we satisfy the following real-world constraints? Can we find an arrangement among the events and users to satisfy most parties’ interests? Can we satisfy the following real-world constraints? Capacity of events and users Conflicts of events

Problem Definition Global Event-participant Arrangement with Conflict and Capacity (GEACC) Given A set of events 𝑉 Each 𝑣∈𝑉 with maximum attendee capacity 𝑐 𝑣 and hidden attribute vector 𝒍 𝑣 A set of users 𝑈 Each 𝑢∈𝑈 with capacity 𝑐 𝑢 and hidden attribute vector 𝒍 𝑢 A set of conflicting event pairs 𝐶𝐹 𝑣 𝑖 , 𝑣 𝑗 ∈𝐶𝐹: a user can attend at most one of 𝑣 𝑖 and 𝑣 𝑗 A similarity function 𝑠𝑖𝑚( 𝒍 𝑣 , 𝒍 𝑢 ) Find an arrangement 𝑀={𝑚(𝑣,𝑢)} (𝑚 𝑣,𝑢 =0 or 1)among events and users Maximize 𝑀𝑎𝑥𝑆𝑢𝑚 𝑀 = 𝑣,𝑢 𝑚 𝑣,𝑢 𝑠𝑖𝑚( 𝒍 𝑣 , 𝒍 𝑢 ) Capacities of events and users are not exceeded ∀ assigned pair 𝑣,𝑢: 𝑠𝑖𝑚 𝒍 𝑣 , 𝒍 𝑢 >0 No conflicting events are assigned to the same user NP-hard

Algorithms: (1)MinCostFlow-GEACC Basic idea 1. Construct a flow network 2. Min-cost flow a temporary arrangement 3. Resolve conflicts

Algorithms: (1)MinCostFlow-GEACC Basic idea 1. Construct a flow network u 1 (3) u 2 (1) u 3 (1) u 4 (2) u 5 (3) Conflicts 𝑣 1 (5) 0.93 0.43 0.84 0.64 0.65 𝑣 3 𝑣 2 (3) 0.35 0.19 0.21 0.4 NA 𝑣 3 (2) 0.86 0.57 0.78 0.79 0.68 𝑣 1 cost=0.07 cap.=1 𝑢 1 cost=0 cap.=5 𝑣 1 𝑢 2 𝑠 𝑣 2 𝑢 3 𝑡 cost=0 cap.=2 𝑢 4 𝑣 3 cost=0 cap.=3 cost=0.32 cap.=1 𝑢 5

Algorithms: (1)MinCostFlow-GEACC Basic idea 2. Min-cost flow a temporary arrangement Send each flow Δ∈{ Δ 𝑚𝑖𝑛 , Δ 𝑚𝑖𝑛 +1,⋯, Δ 𝑚𝑎𝑥 } Δ 𝑚𝑖𝑛 = min { 𝑉 ,|𝑈|} , Δ 𝑚𝑎𝑥 = min { 𝑣 𝑐 𝑣 , 𝑢 𝑐 𝑢 } u 1 (3) u 2 (1) u 3 (1) u 4 (2) u 5 (3) Conflicts 𝑣 1 (5) 0.93 0.43 0.84 0.64 0.65 𝑣 3 𝑣 2 (3) 0.35 0.19 0.21 0.4 NA 𝑣 3 (2) 0.86 0.57 0.78 0.79 0.68 𝑣 1 Δ=10 𝑢 1 𝑢 1 flow=3 𝑣 1 flow=5 𝑣 1 𝑓𝑙𝑜𝑤 𝑣,𝑢 =1 𝑠𝑖𝑚 𝒍 𝑣 , 𝒍 𝑢 >0 𝑢 2 𝑢 2 flow=3 𝑣 2 𝑢 3 𝑠 𝑣 2 𝑢 3 𝑡 flow=2 𝑢 4 flow=2 𝑢 4 𝑣 3 𝑣 3 flow=3 𝑢 5 𝑢 5

Algorithms: (1)MinCostFlow-GEACC Approximation ratio: 𝟏 𝐦𝐚𝐱 𝒄 𝒖 Basic idea 3. Resolve conflicts u 1 (3) u 2 (1) u 3 (1) u 4 (2) u 5 (3) Conflicts 𝑣 1 (5) 0.93 0.43 0.84 0.64 0.65 𝑣 3 𝑣 2 (3) 0.35 0.19 0.21 0.4 NA 𝑣 3 (2) 0.86 0.57 0.78 0.79 0.68 𝑣 1 𝑢 1 𝑣 1 𝑢 2 𝑀𝑎𝑥𝑆𝑢𝑚=4.13 𝑣 2 𝑢 3 𝑢 4 𝑣 3 𝑢 5

Algorithms: (2)Greedy-GEACC Basic idea Greedily add the most similar unmatched pair u 1 (3) u 2 (1) u 3 (1) u 4 (2) u 5 (3) Conflicts 𝑣 1 (5) 0.93 0.43 0.84 0.64 0.65 𝑣 3 𝑣 2 (3) 0.35 0.19 0.21 0.4 NA 𝑣 3 (2) 0.86 0.57 0.78 0.79 0.68 𝑣 1 𝑢 1 𝑣 1 𝑢 2 H = {{ 𝑣 1 , 𝑢 1 }:0.93, { 𝑣 3 , 𝑢 1 }:0.86, { 𝑣 1 , 𝑢 3 }:0.84, { 𝑣 3 , 𝑢 4 }:0.79, { 𝑣 3 , 𝑢 5 }:0.68, { 𝑣 3 , 𝑢 2 }:0.57, { 𝑣 2 , 𝑢 5 }:0.4} 𝑣 2 𝑢 3 𝑢 4 𝑣 3 𝑢 5

Algorithms: (2)Greedy-GEACC Basic idea Greedily add the most similar unmatched pair u 1 (3) u 2 (1) u 3 (1) u 4 (2) u 5 (3) Conflicts 𝑣 1 (5) 0.93 0.43 0.84 0.64 0.65 𝑣 3 𝑣 2 (3) 0.35 0.19 0.21 0.4 NA 𝑣 3 (2) 0.86 0.57 0.78 0.79 0.68 𝑣 1 𝑢 1 𝑣 1 𝑢 2 H = {{ 𝑣 1 , 𝑢 1 }:0.93, { 𝑣 3 , 𝑢 1 }:0.86, { 𝑣 1 , 𝑢 3 }:0.84, { 𝑣 3 , 𝑢 4 }:0.79, { 𝑣 3 , 𝑢 5 }:0.68, { 𝑣 3 , 𝑢 2 }:0.57, { 𝑣 2 , 𝑢 5 }:0.4} 𝑣 2 𝑢 3 𝑢 4 𝑣 3 𝑢 5

Algorithms: (2)Greedy-GEACC Basic idea Greedily add the most similar unmatched pair u 1 (3) u 2 (1) u 3 (1) u 4 (2) u 5 (3) Conflicts 𝑣 1 (5) 0.93 0.43 0.84 0.64 0.65 𝑣 3 𝑣 2 (3) 0.35 0.19 0.21 0.4 NA 𝑣 3 (2) 0.86 0.57 0.78 0.79 0.68 𝑣 1 𝑢 1 𝑣 1 𝑢 2 H = {{ 𝑣 3 , 𝑢 1 }:0.86, { 𝑣 1 , 𝑢 3 }:0.84, { 𝑣 3 , 𝑢 4 }:0.79, { 𝑣 3 , 𝑢 5 }:0.68, { 𝑣 3 , 𝑢 2 }:0.57, { 𝑣 2 , 𝑢 5 }:0.4} 𝑣 2 𝑢 3 𝑢 4 𝑣 3 𝑢 5

Algorithms: (2)Greedy-GEACC Basic idea Greedily add the most similar unmatched pair u 1 (3) u 2 (1) u 3 (1) u 4 (2) u 5 (3) Conflicts 𝑣 1 (5) 0.93 0.43 0.84 0.64 0.65 𝑣 3 𝑣 2 (3) 0.35 0.19 0.21 0.4 NA 𝑣 3 (2) 0.86 0.57 0.78 0.79 0.68 𝑣 1 𝑢 1 𝑣 1 𝑢 2 H = {{ 𝑣 1 , 𝑢 3 }:0.84, { 𝑣 3 , 𝑢 4 }:0.79, { 𝑣 3 , 𝑢 5 }:0.68, { 𝑣 3 , 𝑢 2 }:0.57, { 𝑣 2 , 𝑢 5 }:0.4} H = {{ 𝑣 1 , 𝑢 3 }:0.84, { 𝑣 3 , 𝑢 4 }:0.79, { 𝑣 3 , 𝑢 5 }:0.68, { 𝒗 𝟏 , 𝒖 𝟓 }:0.65, { 𝑣 3 , 𝑢 2 }:0.57, { 𝑣 2 , 𝑢 5 }:0.4} 𝑣 2 𝑢 3 𝑢 4 𝑣 3 𝑢 5

Algorithms: (2)Greedy-GEACC Approximation ratio: 𝟏 𝟏+𝐦𝐚𝐱 𝒄 𝒖 Basic idea Greedily add the most similar unmatched pair u 1 (3) u 2 (1) u 3 (1) u 4 (2) u 5 (3) Conflicts 𝑣 1 (5) 0.93 0.43 0.84 0.64 0.65 𝑣 3 𝑣 2 (3) 0.35 0.19 0.21 0.4 NA 𝑣 3 (2) 0.86 0.57 0.78 0.79 0.68 𝑣 1 𝑢 1 𝑣 1 𝑢 2 H = ({ 𝑣 2 , 𝑢 3 }) 𝑣 2 𝑢 3 𝑀𝑎𝑥𝑆𝑢𝑚=4.28 𝑢 4 𝑣 3 𝑢 5

Algorithms: (3)Prune-GEACC An exact algorithm for small dataset Search the space in increasing order of 𝑠𝑖𝑚( 𝒍 𝑣 , 𝒍 𝑢 ) values and calculate an upper bound to do the pruning

Experiments Two baselines Random-V: iterate over each 𝑣∈𝑉, during which add each pair {𝑣,𝑢} with probability 𝑐 𝑣 |𝑈| if it satisfies all the constraints Random-U: iterate over each 𝑢∈𝑈, during which add each pair {𝑣,𝑢} with probability 𝑐 𝑢 |𝑉| if it satisfies all the constraints Test on both synthetic data and real Meetup data

Experiments: Vary |𝑉| Default: 𝑈 =1000, 25% events are conflicting

Experiments: Vary 𝐶𝐹 /(|𝑉|( 𝑉 −1)/2) Default: V =100, 𝑈 =1000

Experiments: Real Data Auckland: 𝑉 =37, 𝑈 =569

Experiments: Scalability

Experiments: Pruning 𝑉 =5, 𝑈 =15

Conclusion Identify a novel event-participant arrangement problem (GEACC), which is NP-hard Design two approximate solutions and an exact solution Extensive experiments on both real and synthetic datasets

Thank you