Competition in VM – Completing the Circle. Previous work in Competitive VM Mainly follower’s perspective: given state (say of seed selection) of previous.

Slides:



Advertisements
Similar presentations
QoS-based Management of Multiple Shared Resources in Dynamic Real-Time Systems Klaus Ecker, Frank Drews School of EECS, Ohio University, Athens, OH {ecker,
Advertisements

Risk Models and Controlled Mitigation of IT Security R. Ann Miura-Ko Stanford University February 27, 2009.
How to Schedule a Cascade in an Arbitrary Graph F. Chierchetti, J. Kleinberg, A. Panconesi February 2012 Presented by Emrah Cem 7301 – Advances in Social.
Viral Marketing – Learning Influence Probabilities.
Learning Influence Probabilities in Social Networks 1 2 Amit Goyal 1 Francesco Bonchi 2 Laks V. S. Lakshmanan 1 U. of British Columbia Yahoo! Research.
LEARNING INFLUENCE PROBABILITIES IN SOCIAL NETWORKS Amit Goyal Francesco Bonchi Laks V. S. Lakshmanan University of British Columbia Yahoo! Research University.
Minimizing Seed Set for Viral Marketing Cheng Long & Raymond Chi-Wing Wong Presented by: Cheng Long 20-August-2011.
Spread of Influence through a Social Network Adapted from :
Cost-effective Outbreak Detection in Networks Jure Leskovec, Andreas Krause, Carlos Guestrin, Christos Faloutsos, Jeanne VanBriesen, Natalie Glance.
Joint Strategy Fictitious Play Sherwin Doroudi. “Adapted” from J. R. Marden, G. Arslan, J. S. Shamma, “Joint strategy fictitious play with inertia for.
Regret Minimization and the Price of Total Anarchy Paper by A. Blum, M. Hajiaghayi, K. Ligett, A.Roth Presented by Michael Wunder.
Maximizing the Spread of Influence through a Social Network
Suqi Cheng Research Center of Web Data Sciences & Engineering
Competitive Viral Marketing Based on: S. Bharathi et al. Competitive Influence Maximization in Social Networks, WINE C. Budak et al. Limiting the.
A Game Theoretic Approach to Provide Incentive and Service Differentiation in P2P Networks John C.S. Lui The Chinese University of Hong Kong Joint work.
Adaptive Data Collection Strategies for Lifetime-Constrained Wireless Sensor Networks Xueyan Tang Jianliang Xu Sch. of Comput. Eng., Nanyang Technol. Univ.,
A Heuristic Bidding Strategy for Multiple Heterogeneous Auctions Patricia Anthony & Nicholas R. Jennings Dept. of Electronics and Computer Science University.
Dynamic Spectrum Management: Optimization, game and equilibrium Tom Luo (Yinyu Ye) December 18, WINE 2008.
International Financial Networks and Global Supply Chains Jose Cruz Presentation at MKIDS Mini-Workshop September 10, 2003 Virtual Center for Supernetworks.
Influence Maximization
A Multi-Agent Learning Approach to Online Distributed Resource Allocation Chongjie Zhang Victor Lesser Prashant Shenoy Computer Science Department University.
Simpath: An Efficient Algorithm for Influence Maximization under Linear Threshold Model Amit Goyal Wei Lu Laks V. S. Lakshmanan University of British Columbia.
Models of Influence in Online Social Networks
DEXA 2005 Quality-Aware Replication of Multimedia Data Yicheng Tu, Jingfeng Yan and Sunil Prabhakar Department of Computer Sciences, Purdue University.
Network Aware Resource Allocation in Distributed Clouds.
1 Efficiency and Nash Equilibria in a Scrip System for P2P Networks Eric J. Friedman Joseph Y. Halpern Ian Kash.
1 1 Stanford University 2 MPI for Biological Cybernetics 3 California Institute of Technology Inferring Networks of Diffusion and Influence Manuel Gomez.
Information Spread and Information Maximization in Social Networks Xie Yiran 5.28.
Some Analysis of Coloring Experiments and Intro to Competitive Contagion Assignment Prof. Michael Kearns Networked Life NETS 112 Fall 2014.
Influence Maximization in Dynamic Social Networks Honglei Zhuang, Yihan Sun, Jie Tang, Jialin Zhang, Xiaoming Sun.
December 7-10, 2013, Dallas, Texas
Robustness of complex networks with the local protection strategy against cascading failures Jianwei Wang Adviser: Frank,Yeong-Sung Lin Present by Wayne.
Mobile Agent Migration Problem Yingyue Xu. Energy efficiency requirement of sensor networks Mobile agent computing paradigm Data fusion, distributed processing.
Maximizing the Spread of Influence through a Social Network Authors: David Kempe, Jon Kleinberg, É va Tardos KDD 2003.
Genetic algorithms (GA) for clustering Pasi Fränti Clustering Methods: Part 2e Speech and Image Processing Unit School of Computing University of Eastern.
Online Social Networks and Media
Lecture 3-1 Independent Cascade Weili Wu Ding-Zhu Du University of Texas at Dallas.
CS 484 Load Balancing. Goal: All processors working all the time Efficiency of 1 Distribute the load (work) to meet the goal Two types of load balancing.
1 Latency-Bounded Minimum Influential Node Selection in Social Networks Incheol Shin
CS 3343: Analysis of Algorithms Lecture 19: Introduction to Greedy Algorithms.
1 CPSC 320: Intermediate Algorithm Design and Analysis July 30, 2014.
Speaker : Yu-Hui Chen Authors : Dinuka A. Soysa, Denis Guangyin Chen, Oscar C. Au, and Amine Bermak From : 2013 IEEE Symposium on Computational Intelligence.
Sporadic model building for efficiency enhancement of the hierarchical BOA Genetic Programming and Evolvable Machines (2008) 9: Martin Pelikan, Kumara.
1 1 MPI for Intelligent Systems 2 Stanford University Manuel Gomez Rodriguez 1,2 Bernhard Schölkopf 1 S UBMODULAR I NFERENCE OF D IFFUSION NETWORKS FROM.
1 Low Latency Multimedia Broadcast in Multi-Rate Wireless Meshes Chun Tung Chou, Archan Misra Proc. 1st IEEE Workshop on Wireless Mesh Networks (WIMESH),
Self-Organized Resource Allocation in LTE Systems with Weighted Proportional Fairness I-Hong Hou and Chung Shue Chen.
Introductory material Jonathan Godfrey.
1 1 Stanford University 2 MPI for Biological Cybernetics 3 California Institute of Technology Inferring Networks of Diffusion and Influence Manuel Gomez.
CSCI-256 Data Structures & Algorithm Analysis Lecture Note: Some slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved. 3.
Biao Wang 1, Ge Chen 1, Luoyi Fu 1, Li Song 1, Xinbing Wang 1, Xue Liu 2 1 Shanghai Jiao Tong University 2 McGill University
Genetic Algorithms for clustering problem Pasi Fränti
Dynamic Mobile Cloud Computing: Ad Hoc and Opportunistic Job Sharing.
Satisfaction Games in Graphical Multi-resource Allocation
Inferring Networks of Diffusion and Influence
Wenyu Zhang From Social Network Group
Nanyang Technological University
Independent Cascade Model and Linear Threshold Model
Complexity of Determining Nonemptiness of the Core
Near-Optimal Spectrum Allocation for Cognitive Radios: A Frequency-Time Auction Perspective Xinyu Wang Department of Electronic Engineering Shanghai.
Greedy & Heuristic algorithms in Influence Maximization
ElasticTree Michael Fruchtman.
Friend Recommendation with a Target User in Social Networking Services
Independent Cascade Model and Linear Threshold Model
Maximizing the Spread of Influence through a Social Network
The Importance of Communities for Learning to Influence
Cost-effective Outbreak Detection in Networks
Bharathi-Kempe-Salek Conjecture
Independent Cascade Model and Linear Threshold Model
Lecture 2-6 Complexity for Computing Influence Spread
Presentation transcript:

Competition in VM – Completing the Circle

Previous work in Competitive VM Mainly follower’s perspective: given state (say of seed selection) of previous companies (agents/players): – what’s the best strategy for the “follower” to maximize its spread in the face of the competition? – What’s the best strategy for the follower to maximize the blocked influence of the opponent? Most competitive VM algorithms not scalable or assume unfettered access to the n/w for all players. – How realistic is that?

But … Campaign runners don’t necessarily have unfettered access to the network! There is an owner of the network. Campaigns need owner’s permission. May need to pay the owner.

A New Business Model – Introducing … Network owner Provides VM service. How should the host select/allocate seeds? I need 100 seeds I need 250 seeds Competition starts after host selects/allocates seeds.

Business Model (contd.)

Why is fairness important? Imaginary scenario: SONY NEX-VG30H 50 seeds Spread 1000 JVC HD Everio GZ-VX seeds Spread 240 For comparable products, if the b4b is substantially different, dissatisfied company(ies) may take their VM business elsewhere!

Propagation Model Which model should we use? (C)LT – more natural for product adoption. Unfortunately, previous CLT proposals have some disadvantages. – The CLT discussed last class (abstracted from Chen et al. and Borodin et al.) – not submodular. – Spells computational difficulties. Let’s review Borodin et al.’s model next.

WPCLT Model inactive influenc ed active Should I buy a camcorder? Which CC should I buy? I’ve chosen my color! Seeds influence out-neighbors (followers). Active nodes influence followers. Once influenced, relative weights of different (campaign) influences induce a random decision making trial.

WPCLT Model Core – LT Model.

WPCLT Analysis u 0.5 v 0.5 w 1.0 x

WPCLT Analysis u 0.5 v 0.5 w 1.0 x Red seed happens to help blue’s cause!

Introducing the K-LT Model

Proof of both properties

Fine, what do we want to optimize?

Optimal Seed Selection

Fair Seed Allocation

Calculating Spread/Marginal gain Adjusted Marginal Gain u v w

How hard is FSA?

Illustrating the Reduction

FSA remains NP-complete but weakly so. It resembles PARTITION in this case. Can be solved in pseudo-poly time using dynamic programming. Efficient heuristic for general case: Needy Greedy!

Needy Greedy Algorithm

Experimental Evaluation & Conclusions EE: See paper. Role of host. Fair seed allocation. Complexity (strongly NP-complete) and efficient heuristic solution. Questions: What if the influence weights and node thresholds depend on the company? Other sort orders for seeds in Needy Greedy? What if the products significantly differ in popularity: e.g., fairness achievable b/w Nokia and Galaxy is limited. How do we handle this? Adaptive seed selection/allocation (game theory)? Sometimes propagation phenomenon may proceed like an “S-curve” – need “critical mass” of seeds to reach tipoff point. Blind pursuit of FSA here may be problematic.