Evaluating, Combining and Generalizing Recommendations with Prerequisites Aditya Parameswaran Stanford University (with Profs. Hector Garcia-Molina and.

Slides:



Advertisements
Similar presentations
Evaluating “find a path” reachability queries P. Bouros 1, T. Dalamagas 2, S.Skiadopoulos 3, T. Sellis 1,2 1 National Technical University of Athens 2.
Advertisements

Label Placement and graph drawing Imo Lieberwerth.
. The sample complexity of learning Bayesian Networks Or Zuk*^, Shiri Margel* and Eytan Domany* *Dept. of Physics of Complex Systems Weizmann Inst. of.
ICCV 2007 tutorial Part III Message-passing algorithms for energy minimization Vladimir Kolmogorov University College London.
Experiments We measured the times(s) and number of expanded nodes to previous heuristic using BFBnB. Dynamic Programming Intuition. All DAGs must have.
Comparing Twitter Summarization Algorithms for Multiple Post Summaries David Inouye and Jugal K. Kalita SocialCom May 10 Hyewon Lim.
S. J. Shyu Chap. 1 Introduction 1 The Design and Analysis of Algorithms Chapter 1 Introduction S. J. Shyu.
Graduate Center/City University of New York University of Helsinki FINDING OPTIMAL BAYESIAN NETWORK STRUCTURES WITH CONSTRAINTS LEARNED FROM DATA Xiannian.
Five Problems CSE 421 Richard Anderson Winter 2009, Lecture 3.
Precedence Constrained Scheduling Abhiram Ranade Dept. of CSE IIT Bombay.
Los Angeles September 27, 2006 MOBICOM Localization in Sparse Networks using Sweeps D. K. Goldenberg P. Bihler M. Cao J. Fang B. D. O. Anderson.
New Sampling-Based Summary Statistics for Improving Approximate Query Answers P. B. Gibbons and Y. Matias (ACM SIGMOD 1998) Rongfang Li Feb 2007.
The Cache Location Problem IEEE/ACM Transactions on Networking, Vol. 8, No. 5, October 2000 P. Krishnan, Danny Raz, Member, IEEE, and Yuval Shavitt, Member,
Integrating Bayesian Networks and Simpson’s Paradox in Data Mining Alex Freitas University of Kent Ken McGarry University of Sunderland.
Crowd Algorithms Hector Garcia-Molina, Stephen Guo, Aditya Parameswaran, Hyunjung Park, Alkis Polyzotis, Petros Venetis, Jennifer Widom Stanford and UC.
Clustering and greedy algorithms — Part 2 Prof. Noah Snavely CS1114
Clustering… in General In vector space, clusters are vectors found within  of a cluster vector, with different techniques for determining the cluster.
1 -1 Chapter 1 Introduction Why Do We Need to Study Algorithms? To learn strategies to design efficient algorithms. To understand the difficulty.
Matroids, Secretary Problems, and Online Mechanisms Nicole Immorlica, Microsoft Research Joint work with Robert Kleinberg and Moshe Babaioff.
Weizmann Institute Range Minimization O. Shtrichman The Weizmann Institute Joint work with A.Pnueli, Y.Rodeh, M.Siegel.
Query Biased Snippet Generation in XML Search Yi Chen Yu Huang, Ziyang Liu, Yi Chen Arizona State University.
The community-search problem and how to plan a successful cocktail party Mauro SozioAris Gionis Max Planck Institute, Germany Yahoo! Research, Barcelona.
An Adaptive Multi-Objective Scheduling Selection Framework For Continuous Query Processing Timothy M. Sutherland Bradford Pielech Yali Zhu Luping Ding.
CSE 550 Computer Network Design Dr. Mohammed H. Sqalli COE, KFUPM Spring 2007 (Term 062)
Network A/B Testing: From Sampling to Estimation
Simpath: An Efficient Algorithm for Influence Maximization under Linear Threshold Model Amit Goyal Wei Lu Laks V. S. Lakshmanan University of British Columbia.
Distributed Constraint Optimization * some slides courtesy of P. Modi
Ant Colony Optimization: an introduction
Improved results for a memory allocation problem Rob van Stee University of Karlsruhe Germany Leah Epstein University of Haifa Israel WADS 2007 WAOA 2007.
Greedy Algorithms Intuition: At each step, make the choice that is locally optimal. Does the sequence of locally optimal choices lead to a globally optimal.
Fast Spectrum Allocation in Coordinated Dynamic Spectrum Access Based Cellular Networks Anand Prabhu Subramanian*, Himanshu Gupta*,
Reverse Engineering State Machines by Interactive Grammar Inference Neil Walkinshaw, Kirill Bogdanov, Mike Holcombe, Sarah Salahuddin.
1 Introduction to Approximation Algorithms. 2 NP-completeness Do your best then.
Online Oblivious Routing Nikhil Bansal, Avrim Blum, Shuchi Chawla & Adam Meyerson Carnegie Mellon University 6/7/2003.
Optimizing Plurality for Human Intelligence Tasks Luyi Mo University of Hong Kong Joint work with Reynold Cheng, Ben Kao, Xuan Yang, Chenghui Ren, Siyu.
1 Introduction to Approximation Algorithms. 2 NP-completeness Do your best then.
A Polynomial Time Approximation Scheme For Timing Constrained Minimum Cost Layer Assignment Shiyan Hu*, Zhuo Li**, Charles J. Alpert** *Dept of Electrical.
Learning With Structured Sparsity
Mining the Web to Create Minority Language Corpora Rayid Ghani Accenture Technology Labs - Research Rosie Jones Carnegie Mellon University Dunja Mladenic.
Algorithms  Al-Khwarizmi, arab mathematician, 8 th century  Wrote a book: al-kitab… from which the word Algebra comes  Oldest algorithm: Euclidian algorithm.
Constructing evolutionary trees from rooted triples Bang Ye Wu Dept. of Computer Science and Information Engineering Shu-Te University.
tch?v=Y6ljFaKRTrI Fireflies.
Palette: Distributing Tables in Software-Defined Networks Yossi Kanizo (Technion, Israel) Joint work with Isaac Keslassy (Technion, Israel) and David Hay.
Combinatorial Optimization Problems in Computational Biology Ion Mandoiu CSE Department.
Personalized Social Recommendations – Accurate or Private? A. Machanavajjhala (Yahoo!), with A. Korolova (Stanford), A. Das Sarma (Google) 1.
Greedy algorithms David Kauchak cs161 Summer 2009.
CIKM Finding and Approximating Top-k Answers in Keyword Proximity Search Benny Kimelfeld Yehoshua Sagiv Benny Kimelfeld and Yehoshua Sagiv The Selim.
New Sampling-Based Summary Statistics for Improving Approximate Query Answers Yinghui Wang
CS270 Project Overview Maximum Planar Subgraph Danyel Fisher Jason Hong Greg Lawrence Jimmy Lin.
Manuel Gomez Rodriguez Bernhard Schölkopf I NFLUENCE M AXIMIZATION IN C ONTINUOUS T IME D IFFUSION N ETWORKS , ICML ‘12.
5. Maximum Likelihood –II Prof. Yuille. Stat 231. Fall 2004.
A Unified Continuous Greedy Algorithm for Submodular Maximization Moran Feldman Roy SchwartzJoseph (Seffi) Naor Technion – Israel Institute of Technology.
Optimal Superblock Scheduling Using Enumeration Ghassan Shobaki, CS Dept. Kent Wilken, ECE Dept. University of California, Davis
CS 3343: Analysis of Algorithms Lecture 19: Introduction to Greedy Algorithms.
Matroids, Secretary Problems, and Online Mechanisms Nicole Immorlica, Microsoft Research Joint work with Robert Kleinberg and Moshe Babaioff.
DEPARTMENT/SEMESTER ME VII Sem COURSE NAME Operation Research Manav Rachna College of Engg.
1 Structure Learning (The Good), The Bad, The Ugly Inference Graphical Models – Carlos Guestrin Carnegie Mellon University October 13 th, 2008 Readings:
1 1 Stanford University 2 MPI for Biological Cybernetics 3 California Institute of Technology Inferring Networks of Diffusion and Influence Manuel Gomez.
1 3/21/2016 MATH 224 – Discrete Mathematics First we determine if a graph is connected.
Nanyang Technological University
A Study of Group-Tree Matching in Large Scale Group Communications
Distributed Submodular Maximization in Massive Datasets
Data Integration with Dependent Sources
CS 3343: Analysis of Algorithms
Dynamic and Online Algorithms for Set Cover
Performance Comparison of Tarry and Awerbuch Algorithms
Maximum Lifetime of Sensor Networks with Adjustable Sensing Range
UNINFORMED SEARCH -BFS -DFS -DFIS - Bidirectional
Submodular Maximization with Cardinality Constraints
An Efficient Partition Based Method for Exact Set Similarity Joins
Presentation transcript:

Evaluating, Combining and Generalizing Recommendations with Prerequisites Aditya Parameswaran Stanford University (with Profs. Hector Garcia-Molina and Jeffrey D. Ullman) 1

2 Statistics (at Stanford): >10,000 registered users 37,000 listed courses 160,000 evaluations Overall 172 universities 100,000 users Statistics (at Stanford): >10,000 registered users 37,000 listed courses 160,000 evaluations Overall 172 universities 100,000 users

Course Recommendations Instead of a traditional ranked list … Recommend a good package satisfying – Prerequisites (e.g., algebra  calculus) – Requirements (e.g., > 3 math courses) – Planning constraints (e.g., no two in same slot) Recent work on recommending packages – Yahoo! Travel Plans [De Choudhury et. al. WWW 10] Yahoo! Composite items [Roy et. al. SIGMOD 10] – Minimizing Cost [Xie et. al. RecSys 10] 3 Prior Work

Intuitive Example Nodes represent all items not taken yet Edges imply prerequisites 4 E(2)B(6) I(2)K(9) C(3) J(8)H(8) A(5) G(7) D(7) Prerequisites: NO score: 32 Prerequisites: YES score: 29

Example: General Prerequisites 5 Algebra OptimizationAlgorithms Geometry Arithmetic Statistics Adv. Math Set Theory Probability Information Theory

Formal Problem Directed acyclic graph G(V, E) – with some nodes Labeled AND or OR Every node x has a score(x) Recommend k = |A| courses such that – score(a) is maximized {a ϵ A} – Prerequisites of all nodes are met 66 OR Graphs AND-OR Graphs AND Graphs Chain Graphs

Outline of Work 7 Complexity Chain Graphs: PTIME DP AND / OR / AND-OR: NP-Hard Adaptable Approx Algorithms 1)Breadth First 2)Greedy 3)Top Down Worst case per structure Complexity: DP > Greedy > Top Down > BF Merge Algorithm Experiments Extensions to Fuzzy Prerequisites OR Graphs AND-OR Graphs AND Graphs Chain Graphs For Chain Graphs Sample

Chain Graph Algorithm Chain 0Chain 1….Chain i -1Chain iChain n 8 0 j To pick j items from i chains: Pick x items from i-1 chains First j – x items from the ith chain Score of best feasible set of j items from first i chains B [j, i] = max over all x {B [x, i–1] + 1 … (j—x) of ith chain} Complexity: O(nk 2 ) k

Breadth First Algorithm Illustration K = 4 Add items until k = 4 Swap items 9 E(2)B(6) I(2)K(9) C(3) J(8)H(8) A(5) G(7) D(7)

Top Down & Greedy Algorithms Algorithms between extremes – Efficient: Breadth First – Inefficient but Exact: Dynamic Programming Top Down is the reverse of Breadth First – Add best items first, then try to add prerequisites Greedy reasons about entire chains at once – Tries to add prefixes of chains with high avg score 10

Outline of Work 11 Complexity Chain Graphs: PTIME DP AND / OR / AND-OR: NP-Hard Adaptable Approx Algorithms 1)Breadth First 2)Greedy 3)Top Down Worst case per structure Complexity: DP > Greedy > Top Down > BF Merge Algorithm Experiments Extensions to Fuzzy Prerequisites OR Graphs AND-OR Graphs AND Graphs Chain Graphs For Chain Graphs Sample

Breadth First: Worst Case Worst case in terms of: – d: maximum length of chain – m: max difference in score in a given chain 12 a+m-Є a - Є a+m-Є a - Є a+m-Є a - Є a+m-Є aaa lots of chains of depth dlots of singleton elements difference = k/d x (da + (d-1)m) - ka =k/d x (d-1)m

Experimental Setup Measure How we perform As fraction of DP (for chains) & no-prereqs (for AND graphs) Vary: – n: number of components – d: max depth of chain / component – p: probability of a long chain / large component – k: size of package Score: exponentially distributed 13 Chain GraphsAND Graphs Three Algorithms: greedy, td, bf Top-2 of td, bf Merge-2 of td, bfTop-3 of greedy, td, bf

Chain Graphs on Varying k 14 Size of the desired package Ratio of Dynamic Programming Solution

AND Graphs on Varying 15 Probability of Long Component Ratio of No-prerequisite Solution

Conclusions Dynamic Programming Algorithm – Only for Chain Graphs – Guaranteed best recommendations Greedy Value Algorithm – Adaptable to any structure – Almost as good recommendations as DP – With less complexity Top Down and Breadth First – Even better complexity – Not as good recommendations as Greedy – Can be improved using Merge algorithm 16

Chain Graphs on Varying p 17 Probability of a long chain (k small) Ratio of Dynamic Programming Solution