SlideShare a Scribd company logo
1 of 49
Download to read offline
Wei Lu
LaksV.S. Lakshmanan
ICDM’12, to appear
Profit Maximization over
Social Networks
Overview
ο‚— Background: Social Influence Propagation & Maximization
ο‚— Motivation for Profit Maximization
ο‚— Proposed Model & Its Properties
ο‚— Profit MaximizationAlgorithms
ο‚— Experimental Results
ο‚— Conclusions & Discussions
Background
Influence in Social Networks
ο‚— We live in communities and interact with friends, families,
and even strangers
ο‚— This forms social networks
ο‚— In social interactions, people may influence each other
Influence Diffusion & Viral Marketing
iPhone 5 is great
iPhone 5 is great
iPhone 5 is great
iPhone 5 is great
iPhone 5 is great
Source:Wei Chen’s KDD’10 slides
Word-of-mouth effect
Social Network as Directed Graph
ο‚— Nodes: Individuals in the network
ο‚— Edges: Links/relationships between individuals
ο‚— Edge weight on (𝑖, 𝑗): Influence weight 𝑀𝑖,𝑗
0.8
0.7
0.1
0.13
0.3
0.41
0.27
0.2
0.9
0.01
0.6
0.54
0.1
0.110
0.20.7
Linear Threshold Model – Definition
ο‚— Each node 𝑣 chooses an activation threshold πœƒπ‘£
uniformly at random from [0,1]
ο‚— Time unfolds in discrete steps 0,1,2…
ο‚— At step 0, a set 𝑆 of seeds are activated
ο‚— At any step 𝑑, activate node 𝑣 if
𝑀 𝑒,𝑣active in neighbor 𝑒 β‰₯ πœƒπ‘£
ο‚— The diffusion stops when no more nodes can be activated
ο‚— Influence spread of 𝑆:The expected number of active
nodes by the end of the diffusion, when targeting 𝑆 initially
Linear Threshold Model – Example
Inactive Node
Active Node
Threshold
Total Influence
Weights
Source: David Kempe’s slides
vw
0.5
0.3
0.2
0.5
0.1
0.4
0.3 0.2
0.6
0.2
Stop!
U
8
x
Influence spread of {v} is 4
Influence Maximization
Problem
Select k individuals such that by
activating them, influence spread is
maximized.
Input
Output
A directed graph representing a
social network, with influence
weights on edges
NP-hard  #P-hard to compute exact influence 
Motivation for Profit Maximization
Influence vs. Product Adoption
ο‚— Classical models do not fully capture monetary aspects of
product adoptions
ο‚— Being influenced != Being willing to purchase
ο‚— HPTouchPad significant price drop in 2011 ($499 οƒ  $99)
ο‚— Worldwide market share of cellphones (as of 2011.7):
1. Nokia 
2. Samsung (boo…)
3. LG (…)
4. Apple iPhone 
ο‚— iPhone: More expensive in hardware and monthly rate plans
(ask Rogers,Telus, or Bell…)
Product Adoption
ο‚— Product adoption is a two-stage process (Kalish 85)
ο‚— 1st stage: Awareness
ο‚— Get exposed to the product
ο‚— Become familiar with its features
ο‚— 2nd stage: Actual adoption
ο‚— Only if valuation outweighs price
ο‚— Awareness is modeled as being propagated through word-of-
mouth: captured by classical models
ο‚— OTOH, the 2nd stage is not captured
Valuations for Products
ο‚— One’s valuation for a product = the maximum amount of
money one is willing to pay
ο‚— People do not want to reveal valuations for trust and privacy
reasons (Kleinberg & Leighton, FOCS’03)
ο‚— IPV (Independent PrivateValue) assumption:The
valuation of each person’s is drawn independently at random
from a certain distribution (Shoham & Leyton-Brown 09)
ο‚— Price-taker assumption: Users respond myopically to
price, comparing it only with own valuation
Our Contribution
ο‚— Incorporate monetary aspects into the modeling of the
diffusion process of product adoption
ο‚— Price & user valuations
ο‚— Seeding costs
ο‚— LT οƒ  LT with user valuations (LT-V)
ο‚— Profit maximization (ProMax) under LT-V
ο‚— Price-Aware GrEedy algorithm (PAGE)
Proposed Model &
Problem Definition
Linear Threshold Model with Valuations
(LT-V)
ο‚— Three node states: Inactive, Influenced, and Adopting
ο‚— Inactive οƒ  Influenced: same as in LT
ο‚— Influenced οƒ  Adopting: Only if the valuation is at least the quoted
price
ο‚— Only adopting nodes will propagate influence to inactive neighbors
ο‚— Model is progressive (see figure)
More about LT-V
ο‚— Our LT-V model captures the two-stage product adoption
process in (Kalish 1985)
ο‚— Only adopting nodes propagate influence:Actual adopters can
access experienced-based features of the product
ο‚— Usability, e.g., Easy to shoot night scenes using Nikon D600?
ο‚— Durability, e.g., How long can iPhone 5’s battery last on LTE?
ο‚— Still quite abstract, with room for extensions and refinements
(more to come later)
ProMax: Notations
ο‚— 𝒑 = 𝑝1, 𝑝2, … , 𝑝 𝑉 : the vector of quoted prices, one per
each node
ο‚— 𝑆: the seed set
ο‚— πœ‹: 2 𝑉
Γ— [0,1] 𝑉
β†’ 𝑹: the profit function
ο‚— πœ‹(𝑆, 𝒑): the expected profit earned by targeting 𝑆 and setting
prices 𝒑
ProMax Problem Definition
Problem
Select a set 𝑆 of seeds & determine
a vector 𝑝 of quoted price, such
that the πœ‹(𝑆, 𝒑) is maximized
under the LT-V model
Input
Output
A directed graph representing a
social network, with influence
weights on edges
ProMax vs. InfMax
ο‚— Difference w/ InfMax under LT
ο‚— Propagation models are different & have distinct properties
ο‚— InfMax only requires β€œbinary decision” on nodes, while ProMax
requires to set prices
A Restricted Special Case
ο‚— Simplifying assumptions:
ο‚— Valuation distributions degenerate to a single point:
𝑣𝑖 = 𝑝, βˆ€π‘’π‘– ∈ 𝑉
ο‚— Seeds get the item for free (price = 0)
ο‚— Optimal price vector is out of question
ο‚— Restricted ProMax: Find an optimal seed set 𝑆 to
maximize πœ‹ 𝑆 = 𝑝 βˆ— β„Ž 𝐿 𝑆 βˆ’ 𝑆 βˆ’ 𝑐 π‘Ž βˆ— |𝑆|
ο‚— β„Ž 𝐿 𝑆 : expected #adopting nodes under LT-V
ο‚— 𝑐 π‘Ž: acquisition cost (seeding expenses)
A Restricted Special Case
ο‚— πœ‹ 𝑆 is non-monotone, but submodular in 𝑆
ο‚— No need to preset #seeds to pick (the number k in InfMax)
ο‚— Simple greedy cannot be applied to get approx. guarantees
ο‚— Theorem:The restricted ProMax problem is NP-hard.
ο‚— Reduction from the MinimumVertex Cover problem
ο‚— Aside on Maximizing non-monotone submodular functions:
Local search approximation algorithms (Feige, Mirrokni, &
Vondrak, FOCS’07)
ο‚— Nice, but time complexity too high
ο‚— They assumed an oracle for evaluating the function
Unbudgeted Greedy (U-Greedy)
ο‚— Simply grow the seed set 𝑆 by selecting the node with the
largest marginal increase in profit, and stop when no nodes
can provide positive marginal gain.
ο‚— Theorem (Quality guarantee of U-Greedy)
πœ‹ 𝑆 𝑔 β‰₯ 1 βˆ’
1
𝑒
πœ‹ π‘†βˆ— βˆ’ Θ(max π‘†βˆ— , |𝑆 𝑔| )
ο‚— 𝑆 𝑔: Seed set by U-Greedy
ο‚— π‘†βˆ—
: optimal seed set
ο‚— Proof: Some algebra… omitted…
Properties of LT-V (in general)
ο‚— For an arbitrary vector of valuation samples 𝒗 =
(𝑣1, 𝑣2, … , 𝑣|𝑉|), given an instance of the LT-V model, for
any fixed vector 𝒑 of prices, the profit function πœ‹ 𝑆, 𝒑 is
submodular in 𝑆.
ο‚— It is #P-hard to compute the exact value of πœ‹ 𝑆, 𝒑 , given
any 𝑆 and 𝒑.
Algorithms for Profit Maximization
ProMax Algorithm: All-OMP
ο‚— Given the distribution function (CDF) 𝐹𝑖 of 𝑣𝑖, the
Optimal Myopic Price (OMP) is
ο‚— First baseline –All OMP: Offer OMP to all nodes, and select
seeds using U-Greedy.
ο‚— Ensures max. profit earned solely from a single influenced
node
ο‚— Ignores network structures and β€œprofit potential” (from
influence) of seeds
ProMax Algorithm: Free-For-Seeds (FFS)
ο‚— Seeds receive the product for free
ο‚— Non-seeds are charged OMP
ο‚— Ensure all seeds will adopt & propagate influence
ο‚— Trade-off: immediate profit from seeds vs. profit potential
of seeds (through influence)
ο‚— All-OMP favors the former, good for low influence networks
ο‚— FFS favors the latter, good for high influence networks
ο‚— Can we achieve a more balanced heuristic?
Price-Aware GrEedy (PAGE) Algorithm
ο‚— The key question: Given a partial seed set, how to determine
the price 𝑝𝑖 for the next seed candidate 𝑒𝑖?
ο‚— Consider the marginal profit 𝑒𝑖 brings:
ο‚— This is a function of 𝑝𝑖
ο‚— So, let’s find 𝑝𝑖 that maximizes
PAGE details
ο‚— Offer 𝑝𝑖 to 𝑒𝑖 leads to 2 possible worlds:
ο‚— 𝑒𝑖 accepts, w.p. 1 βˆ’ 𝐹𝑖 𝑝𝑖 .
ο‚— 𝑒𝑖 does not accept, w.p. 𝐹𝑖 𝑝𝑖 .
ο‚— Re-write as follows
ο‚— π‘Œ1: expected profit earned from other nodes, if 𝑒𝑖 accepts
ο‚— π‘Œ0: -----------------------------------------------, o.w.
ο‚— Finding the optimal 𝑝𝑖 depends on the specific form of 𝐹𝑖
ο‚— We study two cases:
ο‚— Normal distribution
ο‚— Uniform distribution
Normal Distribution
ο‚— CDF:
where erf(π‘₯) is the error function
ο‚— No analytical solution can be found, since erf(π‘₯) has no
closed-form expression, and thus neither does 𝑔𝑖(𝑝𝑖)
ο‚— Numerical method: the golden section search algorithm
Aside: Golden Section Search
ο‚— Finds the extremum of a function by iteratively narrowing
the interval inside which the extremum is known to exist
ο‚— The function must be unimodal and continuous over the initial interval
ο‚— Terminates when the length of the interval is smaller than a pre-
defined number (say, 10βˆ’6)
ο‚— No need to take derivatives (which the Newton’s method will need)
ο‚— Performs only one new function evaluation in each step
ο‚— Has a constant reduction factor for the size of the interval
Uniform Distribution
ο‚— CDF:
ο‚— So,
ο‚— Easily, we solve for optimal 𝑝𝑖:
ο‚— If < 0 or >1, normalize it back to 0 or 1 (respectively)
ο‚— N.B.,This solution framework can be applied to any
valuation distributions.Actual solution may be analytical or
numerical, depending on the distribution itself.
Experiments: Datasets & Results
Network Datasets
ο‚— Epinions
ο‚— A who-trusts-whom network from the customer reviews site
Epinions.com
ο‚— Flixster
ο‚— A friendship network from social movie site Flixster.com
ο‚— NetHEPT
ο‚— A co-authorship network from arxiv.org High Energey Physics
Theory section.
Network Datasets
ο‚— Statistics of the datasets:
Influence Weights in Datasets
ο‚— Weighted Distribution (WD)
𝑀 𝑒,𝑣 =
𝐴 𝑒,𝑣
𝑁𝑣
ο‚— 𝐴 𝑒,𝑣: #actions 𝑒 and 𝑣 both have performed (if data is time-
stamped, then 𝑒 should perform earlier
ο‚— 𝑁𝑣: total #actions 𝑣 has performed
ο‚— Trivalency (TV): 𝑀 𝑒,𝑣 is chosen uniformly at random from
{0.001, 0.01, 0.1}.
ο‚— All weights shall be normalized to ensure βˆ€π‘£,
𝑀 𝑒,𝑣 ≀ 1
𝑒
Influence Weights in Datasets
Estimating Valuation Distributions
ο‚— Hard to obtain real ones
ο‚— Common practice: estimate from historical sales data
Estimating Valuation Distributions
ο‚— Besides ratings (1 to 5 stars), users may optionally provide
the price they paid
ο‚— At the end of the same review:
ο‚— We obtain all reviews for Canon EOS 300D, 350D, and 400D
DSLR cameras
ο‚— Sequential releases in 3 years οƒ  approximately the same
monetary values
ο‚— Remove reviews without price: 276 samples remain
ο‚— View rating as utility
utility = valuation – price paid
ο‚— Thus, our estimation is
Estimating Valuation Distributions
Estimating Valuation Distributions
ο‚— The fitted normal distribution: 𝑁(0.53, 0.142
)
ο‚— Figure 4(b): Kolmogorov-Smirnov (K-S) statistics
Experimental Results: Expected Profit
Achieved
Experimental Results: Price
Assignment for Seeds
Experimental Results: Running Time
ο‚— PAGE is more efficient
ο‚— Leveraging lazy-forwarding more effectively
ο‚— Extra overhead for computing price is small (golden search
algorithm converges in less than 40 iterations)
Conclusions, Discussions,
Related Work
Conclusions
ο‚— Extended LT model to incorporate price and valuations &
distinguish product adoption from social influence
ο‚— Studies the properties of the extended model
ο‚— Proposed profit maximization (ProMax) problem & effective
algorithm to solve it
Discussions & Future Work
ο‚— Make similar extensions to other influence propagation
models: IC, LT-C, or even the general threshold model
ο‚— Develop fast heuristics to give more efficient & scalable
algorithms
ο‚— Consider to incorporate other elements into the modeling of
product adoption
ο‚— Peoples’ spontaneous interests in product (natural early
adopters)
ο‚— Valuation may change over time for some people
ο‚— Valuations may observe externalities
Related Work
ο‚— Influence maximization (too many…)
ο‚— Revenue/profit maximization in social networks
ο‚— Hartline et al.,WWW’08: Influence-and-Exploit
ο‚— Arthur et al.,WINE’09
ο‚— Chen et al.,WINE’11
ο‚— Bloch & Qurou, working paper, 2011
ο‚— Influence vs. product adoption
ο‚— Bhagat, Goyal, & Lakshmanan,WSDM’12: LT model with
Colors
Thanks!
Acknowledgements:
Allan Borodin (UofT),Wei Chen (MSRAsia), Pei Lee, Kevin Leyton-
Brown, Min Xie, Ruben H. Zamar.

More Related Content

Similar to Pro max icdm2012-slides

Crafting Recommenders: the Shallow and the Deep of it!
Crafting Recommenders: the Shallow and the Deep of it! Crafting Recommenders: the Shallow and the Deep of it!
Crafting Recommenders: the Shallow and the Deep of it! Sudeep Das, Ph.D.
Β 
Jeffrey xu yu large graph processing
Jeffrey xu yu large graph processingJeffrey xu yu large graph processing
Jeffrey xu yu large graph processingjins0618
Β 
Evolution as a Tool for Understanding and Designing Collaborative Systems
Evolution as a Tool for Understanding and Designing Collaborative SystemsEvolution as a Tool for Understanding and Designing Collaborative Systems
Evolution as a Tool for Understanding and Designing Collaborative SystemsWilfried Elmenreich
Β 
Machine Learning AND Deep Learning for OpenPOWER
Machine Learning AND Deep Learning for OpenPOWERMachine Learning AND Deep Learning for OpenPOWER
Machine Learning AND Deep Learning for OpenPOWERGanesan Narayanasamy
Β 
Dssg talk CNN intro
Dssg talk CNN introDssg talk CNN intro
Dssg talk CNN introVincent Tatan
Β 
Yulia Honcharenko "Application of metric learning for logo recognition"
Yulia Honcharenko "Application of metric learning for logo recognition"Yulia Honcharenko "Application of metric learning for logo recognition"
Yulia Honcharenko "Application of metric learning for logo recognition"Fwdays
Β 
NON-STATIONARY BANDIT CHANGE DETECTION-BASED THOMPSON SAMPLING ALGORITHM: A R...
NON-STATIONARY BANDIT CHANGE DETECTION-BASED THOMPSON SAMPLING ALGORITHM: A R...NON-STATIONARY BANDIT CHANGE DETECTION-BASED THOMPSON SAMPLING ALGORITHM: A R...
NON-STATIONARY BANDIT CHANGE DETECTION-BASED THOMPSON SAMPLING ALGORITHM: A R...IRJET Journal
Β 
Methodological study of opinion mining and sentiment analysis techniques
Methodological study of opinion mining and sentiment analysis techniquesMethodological study of opinion mining and sentiment analysis techniques
Methodological study of opinion mining and sentiment analysis techniquesijsc
Β 
Weitao Duan - Creating economic opportunity for every linkedin member amid ne...
Weitao Duan - Creating economic opportunity for every linkedin member amid ne...Weitao Duan - Creating economic opportunity for every linkedin member amid ne...
Weitao Duan - Creating economic opportunity for every linkedin member amid ne...Weitao Duan
Β 
08 neural networks
08 neural networks08 neural networks
08 neural networksankit_ppt
Β 
Predictive Model and Record Description with Segmented Sensitivity Analysis (...
Predictive Model and Record Description with Segmented Sensitivity Analysis (...Predictive Model and Record Description with Segmented Sensitivity Analysis (...
Predictive Model and Record Description with Segmented Sensitivity Analysis (...Greg Makowski
Β 
Towards Reinforcement Learning-based Aggregate Computing
Towards Reinforcement Learning-based Aggregate ComputingTowards Reinforcement Learning-based Aggregate Computing
Towards Reinforcement Learning-based Aggregate ComputingGianluca Aguzzi
Β 
introduction to deeplearning
introduction to deeplearningintroduction to deeplearning
introduction to deeplearningEyad Alshami
Β 
Artificial intyelligence and machine learning introduction.pptx
Artificial intyelligence and machine learning introduction.pptxArtificial intyelligence and machine learning introduction.pptx
Artificial intyelligence and machine learning introduction.pptxChandrakalaV15
Β 
Support Vector Machines USING MACHINE LEARNING HOW IT WORKS
Support Vector Machines USING MACHINE LEARNING HOW IT WORKSSupport Vector Machines USING MACHINE LEARNING HOW IT WORKS
Support Vector Machines USING MACHINE LEARNING HOW IT WORKSrajalakshmi5921
Β 
Model-Based Testing: Theory and Practice. Keynote @ MoTiP (ISSRE) 2012.
Model-Based Testing: Theory and Practice. Keynote @ MoTiP (ISSRE) 2012.Model-Based Testing: Theory and Practice. Keynote @ MoTiP (ISSRE) 2012.
Model-Based Testing: Theory and Practice. Keynote @ MoTiP (ISSRE) 2012.Wolfgang Grieskamp
Β 
Regressioin mini case
Regressioin mini caseRegressioin mini case
Regressioin mini caseveesingh
Β 
VLDB 2015 poster: Revenue Maximization in Recommender Systems
VLDB 2015 poster: Revenue Maximization in Recommender SystemsVLDB 2015 poster: Revenue Maximization in Recommender Systems
VLDB 2015 poster: Revenue Maximization in Recommender SystemsWei Lu
Β 

Similar to Pro max icdm2012-slides (20)

Crafting Recommenders: the Shallow and the Deep of it!
Crafting Recommenders: the Shallow and the Deep of it! Crafting Recommenders: the Shallow and the Deep of it!
Crafting Recommenders: the Shallow and the Deep of it!
Β 
Decision theory
Decision theoryDecision theory
Decision theory
Β 
Jeffrey xu yu large graph processing
Jeffrey xu yu large graph processingJeffrey xu yu large graph processing
Jeffrey xu yu large graph processing
Β 
Evolution as a Tool for Understanding and Designing Collaborative Systems
Evolution as a Tool for Understanding and Designing Collaborative SystemsEvolution as a Tool for Understanding and Designing Collaborative Systems
Evolution as a Tool for Understanding and Designing Collaborative Systems
Β 
Machine Learning AND Deep Learning for OpenPOWER
Machine Learning AND Deep Learning for OpenPOWERMachine Learning AND Deep Learning for OpenPOWER
Machine Learning AND Deep Learning for OpenPOWER
Β 
Dssg talk CNN intro
Dssg talk CNN introDssg talk CNN intro
Dssg talk CNN intro
Β 
AI and Deep Learning
AI and Deep Learning AI and Deep Learning
AI and Deep Learning
Β 
Yulia Honcharenko "Application of metric learning for logo recognition"
Yulia Honcharenko "Application of metric learning for logo recognition"Yulia Honcharenko "Application of metric learning for logo recognition"
Yulia Honcharenko "Application of metric learning for logo recognition"
Β 
NON-STATIONARY BANDIT CHANGE DETECTION-BASED THOMPSON SAMPLING ALGORITHM: A R...
NON-STATIONARY BANDIT CHANGE DETECTION-BASED THOMPSON SAMPLING ALGORITHM: A R...NON-STATIONARY BANDIT CHANGE DETECTION-BASED THOMPSON SAMPLING ALGORITHM: A R...
NON-STATIONARY BANDIT CHANGE DETECTION-BASED THOMPSON SAMPLING ALGORITHM: A R...
Β 
Methodological study of opinion mining and sentiment analysis techniques
Methodological study of opinion mining and sentiment analysis techniquesMethodological study of opinion mining and sentiment analysis techniques
Methodological study of opinion mining and sentiment analysis techniques
Β 
Weitao Duan - Creating economic opportunity for every linkedin member amid ne...
Weitao Duan - Creating economic opportunity for every linkedin member amid ne...Weitao Duan - Creating economic opportunity for every linkedin member amid ne...
Weitao Duan - Creating economic opportunity for every linkedin member amid ne...
Β 
08 neural networks
08 neural networks08 neural networks
08 neural networks
Β 
Predictive Model and Record Description with Segmented Sensitivity Analysis (...
Predictive Model and Record Description with Segmented Sensitivity Analysis (...Predictive Model and Record Description with Segmented Sensitivity Analysis (...
Predictive Model and Record Description with Segmented Sensitivity Analysis (...
Β 
Towards Reinforcement Learning-based Aggregate Computing
Towards Reinforcement Learning-based Aggregate ComputingTowards Reinforcement Learning-based Aggregate Computing
Towards Reinforcement Learning-based Aggregate Computing
Β 
introduction to deeplearning
introduction to deeplearningintroduction to deeplearning
introduction to deeplearning
Β 
Artificial intyelligence and machine learning introduction.pptx
Artificial intyelligence and machine learning introduction.pptxArtificial intyelligence and machine learning introduction.pptx
Artificial intyelligence and machine learning introduction.pptx
Β 
Support Vector Machines USING MACHINE LEARNING HOW IT WORKS
Support Vector Machines USING MACHINE LEARNING HOW IT WORKSSupport Vector Machines USING MACHINE LEARNING HOW IT WORKS
Support Vector Machines USING MACHINE LEARNING HOW IT WORKS
Β 
Model-Based Testing: Theory and Practice. Keynote @ MoTiP (ISSRE) 2012.
Model-Based Testing: Theory and Practice. Keynote @ MoTiP (ISSRE) 2012.Model-Based Testing: Theory and Practice. Keynote @ MoTiP (ISSRE) 2012.
Model-Based Testing: Theory and Practice. Keynote @ MoTiP (ISSRE) 2012.
Β 
Regressioin mini case
Regressioin mini caseRegressioin mini case
Regressioin mini case
Β 
VLDB 2015 poster: Revenue Maximization in Recommender Systems
VLDB 2015 poster: Revenue Maximization in Recommender SystemsVLDB 2015 poster: Revenue Maximization in Recommender Systems
VLDB 2015 poster: Revenue Maximization in Recommender Systems
Β 

More from Laks Lakshmanan

cuhk-fb-mi-talk.pdf
cuhk-fb-mi-talk.pdfcuhk-fb-mi-talk.pdf
cuhk-fb-mi-talk.pdfLaks Lakshmanan
Β 
Combating Fake News: Combating Fake News: A Data Management and Mining Perspe...
Combating Fake News: Combating Fake News: A Data Management and Mining Perspe...Combating Fake News: Combating Fake News: A Data Management and Mining Perspe...
Combating Fake News: Combating Fake News: A Data Management and Mining Perspe...Laks Lakshmanan
Β 
Big-O(Q) VLDB 2015 Keynote: Social Network Analytics: Beyond the Obvious
Big-O(Q) VLDB 2015 Keynote: Social Network Analytics: Beyond the ObviousBig-O(Q) VLDB 2015 Keynote: Social Network Analytics: Beyond the Obvious
Big-O(Q) VLDB 2015 Keynote: Social Network Analytics: Beyond the ObviousLaks Lakshmanan
Β 
Big-O(Q) Social Network Analytics
Big-O(Q) Social Network AnalyticsBig-O(Q) Social Network Analytics
Big-O(Q) Social Network AnalyticsLaks Lakshmanan
Β 
Kdd12 tutorial-inf-part-ii
Kdd12 tutorial-inf-part-iiKdd12 tutorial-inf-part-ii
Kdd12 tutorial-inf-part-iiLaks Lakshmanan
Β 
Kdd12 tutorial-inf-part-i
Kdd12 tutorial-inf-part-iKdd12 tutorial-inf-part-i
Kdd12 tutorial-inf-part-iLaks Lakshmanan
Β 

More from Laks Lakshmanan (7)

cuhk-fb-mi-talk.pdf
cuhk-fb-mi-talk.pdfcuhk-fb-mi-talk.pdf
cuhk-fb-mi-talk.pdf
Β 
Combating Fake News: Combating Fake News: A Data Management and Mining Perspe...
Combating Fake News: Combating Fake News: A Data Management and Mining Perspe...Combating Fake News: Combating Fake News: A Data Management and Mining Perspe...
Combating Fake News: Combating Fake News: A Data Management and Mining Perspe...
Β 
SDM 2019 Keynote
SDM 2019 KeynoteSDM 2019 Keynote
SDM 2019 Keynote
Β 
Big-O(Q) VLDB 2015 Keynote: Social Network Analytics: Beyond the Obvious
Big-O(Q) VLDB 2015 Keynote: Social Network Analytics: Beyond the ObviousBig-O(Q) VLDB 2015 Keynote: Social Network Analytics: Beyond the Obvious
Big-O(Q) VLDB 2015 Keynote: Social Network Analytics: Beyond the Obvious
Β 
Big-O(Q) Social Network Analytics
Big-O(Q) Social Network AnalyticsBig-O(Q) Social Network Analytics
Big-O(Q) Social Network Analytics
Β 
Kdd12 tutorial-inf-part-ii
Kdd12 tutorial-inf-part-iiKdd12 tutorial-inf-part-ii
Kdd12 tutorial-inf-part-ii
Β 
Kdd12 tutorial-inf-part-i
Kdd12 tutorial-inf-part-iKdd12 tutorial-inf-part-i
Kdd12 tutorial-inf-part-i
Β 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
Β 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
Β 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
Β 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
Β 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
Β 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
Β 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
Β 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
Β 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
Β 
WhatsApp 9892124323 βœ“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 βœ“Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 βœ“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 βœ“Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
Β 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
Β 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
Β 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
Β 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
Β 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
Β 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
Β 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
Β 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
Β 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
Β 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
Β 

Recently uploaded (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Β 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
Β 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Β 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
Β 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
Β 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Β 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Β 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
Β 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
Β 
WhatsApp 9892124323 βœ“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 βœ“Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 βœ“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 βœ“Call Girls In Kalyan ( Mumbai ) secure service
Β 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Β 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Β 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Β 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Β 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Β 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
Β 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Β 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
Β 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Β 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Β 

Pro max icdm2012-slides

  • 1. Wei Lu LaksV.S. Lakshmanan ICDM’12, to appear Profit Maximization over Social Networks
  • 2. Overview ο‚— Background: Social Influence Propagation & Maximization ο‚— Motivation for Profit Maximization ο‚— Proposed Model & Its Properties ο‚— Profit MaximizationAlgorithms ο‚— Experimental Results ο‚— Conclusions & Discussions
  • 4. Influence in Social Networks ο‚— We live in communities and interact with friends, families, and even strangers ο‚— This forms social networks ο‚— In social interactions, people may influence each other
  • 5. Influence Diffusion & Viral Marketing iPhone 5 is great iPhone 5 is great iPhone 5 is great iPhone 5 is great iPhone 5 is great Source:Wei Chen’s KDD’10 slides Word-of-mouth effect
  • 6. Social Network as Directed Graph ο‚— Nodes: Individuals in the network ο‚— Edges: Links/relationships between individuals ο‚— Edge weight on (𝑖, 𝑗): Influence weight 𝑀𝑖,𝑗 0.8 0.7 0.1 0.13 0.3 0.41 0.27 0.2 0.9 0.01 0.6 0.54 0.1 0.110 0.20.7
  • 7. Linear Threshold Model – Definition ο‚— Each node 𝑣 chooses an activation threshold πœƒπ‘£ uniformly at random from [0,1] ο‚— Time unfolds in discrete steps 0,1,2… ο‚— At step 0, a set 𝑆 of seeds are activated ο‚— At any step 𝑑, activate node 𝑣 if 𝑀 𝑒,𝑣active in neighbor 𝑒 β‰₯ πœƒπ‘£ ο‚— The diffusion stops when no more nodes can be activated ο‚— Influence spread of 𝑆:The expected number of active nodes by the end of the diffusion, when targeting 𝑆 initially
  • 8. Linear Threshold Model – Example Inactive Node Active Node Threshold Total Influence Weights Source: David Kempe’s slides vw 0.5 0.3 0.2 0.5 0.1 0.4 0.3 0.2 0.6 0.2 Stop! U 8 x Influence spread of {v} is 4
  • 9. Influence Maximization Problem Select k individuals such that by activating them, influence spread is maximized. Input Output A directed graph representing a social network, with influence weights on edges NP-hard  #P-hard to compute exact influence 
  • 10. Motivation for Profit Maximization
  • 11. Influence vs. Product Adoption ο‚— Classical models do not fully capture monetary aspects of product adoptions ο‚— Being influenced != Being willing to purchase ο‚— HPTouchPad significant price drop in 2011 ($499 οƒ  $99) ο‚— Worldwide market share of cellphones (as of 2011.7): 1. Nokia  2. Samsung (boo…) 3. LG (…) 4. Apple iPhone  ο‚— iPhone: More expensive in hardware and monthly rate plans (ask Rogers,Telus, or Bell…)
  • 12. Product Adoption ο‚— Product adoption is a two-stage process (Kalish 85) ο‚— 1st stage: Awareness ο‚— Get exposed to the product ο‚— Become familiar with its features ο‚— 2nd stage: Actual adoption ο‚— Only if valuation outweighs price ο‚— Awareness is modeled as being propagated through word-of- mouth: captured by classical models ο‚— OTOH, the 2nd stage is not captured
  • 13. Valuations for Products ο‚— One’s valuation for a product = the maximum amount of money one is willing to pay ο‚— People do not want to reveal valuations for trust and privacy reasons (Kleinberg & Leighton, FOCS’03) ο‚— IPV (Independent PrivateValue) assumption:The valuation of each person’s is drawn independently at random from a certain distribution (Shoham & Leyton-Brown 09) ο‚— Price-taker assumption: Users respond myopically to price, comparing it only with own valuation
  • 14. Our Contribution ο‚— Incorporate monetary aspects into the modeling of the diffusion process of product adoption ο‚— Price & user valuations ο‚— Seeding costs ο‚— LT οƒ  LT with user valuations (LT-V) ο‚— Profit maximization (ProMax) under LT-V ο‚— Price-Aware GrEedy algorithm (PAGE)
  • 16. Linear Threshold Model with Valuations (LT-V) ο‚— Three node states: Inactive, Influenced, and Adopting ο‚— Inactive οƒ  Influenced: same as in LT ο‚— Influenced οƒ  Adopting: Only if the valuation is at least the quoted price ο‚— Only adopting nodes will propagate influence to inactive neighbors ο‚— Model is progressive (see figure)
  • 17. More about LT-V ο‚— Our LT-V model captures the two-stage product adoption process in (Kalish 1985) ο‚— Only adopting nodes propagate influence:Actual adopters can access experienced-based features of the product ο‚— Usability, e.g., Easy to shoot night scenes using Nikon D600? ο‚— Durability, e.g., How long can iPhone 5’s battery last on LTE? ο‚— Still quite abstract, with room for extensions and refinements (more to come later)
  • 18. ProMax: Notations ο‚— 𝒑 = 𝑝1, 𝑝2, … , 𝑝 𝑉 : the vector of quoted prices, one per each node ο‚— 𝑆: the seed set ο‚— πœ‹: 2 𝑉 Γ— [0,1] 𝑉 β†’ 𝑹: the profit function ο‚— πœ‹(𝑆, 𝒑): the expected profit earned by targeting 𝑆 and setting prices 𝒑
  • 19. ProMax Problem Definition Problem Select a set 𝑆 of seeds & determine a vector 𝑝 of quoted price, such that the πœ‹(𝑆, 𝒑) is maximized under the LT-V model Input Output A directed graph representing a social network, with influence weights on edges
  • 20. ProMax vs. InfMax ο‚— Difference w/ InfMax under LT ο‚— Propagation models are different & have distinct properties ο‚— InfMax only requires β€œbinary decision” on nodes, while ProMax requires to set prices
  • 21. A Restricted Special Case ο‚— Simplifying assumptions: ο‚— Valuation distributions degenerate to a single point: 𝑣𝑖 = 𝑝, βˆ€π‘’π‘– ∈ 𝑉 ο‚— Seeds get the item for free (price = 0) ο‚— Optimal price vector is out of question ο‚— Restricted ProMax: Find an optimal seed set 𝑆 to maximize πœ‹ 𝑆 = 𝑝 βˆ— β„Ž 𝐿 𝑆 βˆ’ 𝑆 βˆ’ 𝑐 π‘Ž βˆ— |𝑆| ο‚— β„Ž 𝐿 𝑆 : expected #adopting nodes under LT-V ο‚— 𝑐 π‘Ž: acquisition cost (seeding expenses)
  • 22. A Restricted Special Case ο‚— πœ‹ 𝑆 is non-monotone, but submodular in 𝑆 ο‚— No need to preset #seeds to pick (the number k in InfMax) ο‚— Simple greedy cannot be applied to get approx. guarantees ο‚— Theorem:The restricted ProMax problem is NP-hard. ο‚— Reduction from the MinimumVertex Cover problem ο‚— Aside on Maximizing non-monotone submodular functions: Local search approximation algorithms (Feige, Mirrokni, & Vondrak, FOCS’07) ο‚— Nice, but time complexity too high ο‚— They assumed an oracle for evaluating the function
  • 23. Unbudgeted Greedy (U-Greedy) ο‚— Simply grow the seed set 𝑆 by selecting the node with the largest marginal increase in profit, and stop when no nodes can provide positive marginal gain. ο‚— Theorem (Quality guarantee of U-Greedy) πœ‹ 𝑆 𝑔 β‰₯ 1 βˆ’ 1 𝑒 πœ‹ π‘†βˆ— βˆ’ Θ(max π‘†βˆ— , |𝑆 𝑔| ) ο‚— 𝑆 𝑔: Seed set by U-Greedy ο‚— π‘†βˆ— : optimal seed set ο‚— Proof: Some algebra… omitted…
  • 24. Properties of LT-V (in general) ο‚— For an arbitrary vector of valuation samples 𝒗 = (𝑣1, 𝑣2, … , 𝑣|𝑉|), given an instance of the LT-V model, for any fixed vector 𝒑 of prices, the profit function πœ‹ 𝑆, 𝒑 is submodular in 𝑆. ο‚— It is #P-hard to compute the exact value of πœ‹ 𝑆, 𝒑 , given any 𝑆 and 𝒑.
  • 25. Algorithms for Profit Maximization
  • 26. ProMax Algorithm: All-OMP ο‚— Given the distribution function (CDF) 𝐹𝑖 of 𝑣𝑖, the Optimal Myopic Price (OMP) is ο‚— First baseline –All OMP: Offer OMP to all nodes, and select seeds using U-Greedy. ο‚— Ensures max. profit earned solely from a single influenced node ο‚— Ignores network structures and β€œprofit potential” (from influence) of seeds
  • 27. ProMax Algorithm: Free-For-Seeds (FFS) ο‚— Seeds receive the product for free ο‚— Non-seeds are charged OMP ο‚— Ensure all seeds will adopt & propagate influence ο‚— Trade-off: immediate profit from seeds vs. profit potential of seeds (through influence) ο‚— All-OMP favors the former, good for low influence networks ο‚— FFS favors the latter, good for high influence networks ο‚— Can we achieve a more balanced heuristic?
  • 28. Price-Aware GrEedy (PAGE) Algorithm ο‚— The key question: Given a partial seed set, how to determine the price 𝑝𝑖 for the next seed candidate 𝑒𝑖? ο‚— Consider the marginal profit 𝑒𝑖 brings: ο‚— This is a function of 𝑝𝑖 ο‚— So, let’s find 𝑝𝑖 that maximizes
  • 29. PAGE details ο‚— Offer 𝑝𝑖 to 𝑒𝑖 leads to 2 possible worlds: ο‚— 𝑒𝑖 accepts, w.p. 1 βˆ’ 𝐹𝑖 𝑝𝑖 . ο‚— 𝑒𝑖 does not accept, w.p. 𝐹𝑖 𝑝𝑖 . ο‚— Re-write as follows ο‚— π‘Œ1: expected profit earned from other nodes, if 𝑒𝑖 accepts ο‚— π‘Œ0: -----------------------------------------------, o.w. ο‚— Finding the optimal 𝑝𝑖 depends on the specific form of 𝐹𝑖 ο‚— We study two cases: ο‚— Normal distribution ο‚— Uniform distribution
  • 30. Normal Distribution ο‚— CDF: where erf(π‘₯) is the error function ο‚— No analytical solution can be found, since erf(π‘₯) has no closed-form expression, and thus neither does 𝑔𝑖(𝑝𝑖) ο‚— Numerical method: the golden section search algorithm
  • 31. Aside: Golden Section Search ο‚— Finds the extremum of a function by iteratively narrowing the interval inside which the extremum is known to exist ο‚— The function must be unimodal and continuous over the initial interval ο‚— Terminates when the length of the interval is smaller than a pre- defined number (say, 10βˆ’6) ο‚— No need to take derivatives (which the Newton’s method will need) ο‚— Performs only one new function evaluation in each step ο‚— Has a constant reduction factor for the size of the interval
  • 32. Uniform Distribution ο‚— CDF: ο‚— So, ο‚— Easily, we solve for optimal 𝑝𝑖: ο‚— If < 0 or >1, normalize it back to 0 or 1 (respectively) ο‚— N.B.,This solution framework can be applied to any valuation distributions.Actual solution may be analytical or numerical, depending on the distribution itself.
  • 34. Network Datasets ο‚— Epinions ο‚— A who-trusts-whom network from the customer reviews site Epinions.com ο‚— Flixster ο‚— A friendship network from social movie site Flixster.com ο‚— NetHEPT ο‚— A co-authorship network from arxiv.org High Energey Physics Theory section.
  • 36. Influence Weights in Datasets ο‚— Weighted Distribution (WD) 𝑀 𝑒,𝑣 = 𝐴 𝑒,𝑣 𝑁𝑣 ο‚— 𝐴 𝑒,𝑣: #actions 𝑒 and 𝑣 both have performed (if data is time- stamped, then 𝑒 should perform earlier ο‚— 𝑁𝑣: total #actions 𝑣 has performed ο‚— Trivalency (TV): 𝑀 𝑒,𝑣 is chosen uniformly at random from {0.001, 0.01, 0.1}. ο‚— All weights shall be normalized to ensure βˆ€π‘£, 𝑀 𝑒,𝑣 ≀ 1 𝑒
  • 38. Estimating Valuation Distributions ο‚— Hard to obtain real ones ο‚— Common practice: estimate from historical sales data
  • 39. Estimating Valuation Distributions ο‚— Besides ratings (1 to 5 stars), users may optionally provide the price they paid ο‚— At the end of the same review:
  • 40. ο‚— We obtain all reviews for Canon EOS 300D, 350D, and 400D DSLR cameras ο‚— Sequential releases in 3 years οƒ  approximately the same monetary values ο‚— Remove reviews without price: 276 samples remain ο‚— View rating as utility utility = valuation – price paid ο‚— Thus, our estimation is Estimating Valuation Distributions
  • 41. Estimating Valuation Distributions ο‚— The fitted normal distribution: 𝑁(0.53, 0.142 ) ο‚— Figure 4(b): Kolmogorov-Smirnov (K-S) statistics
  • 44. Experimental Results: Running Time ο‚— PAGE is more efficient ο‚— Leveraging lazy-forwarding more effectively ο‚— Extra overhead for computing price is small (golden search algorithm converges in less than 40 iterations)
  • 46. Conclusions ο‚— Extended LT model to incorporate price and valuations & distinguish product adoption from social influence ο‚— Studies the properties of the extended model ο‚— Proposed profit maximization (ProMax) problem & effective algorithm to solve it
  • 47. Discussions & Future Work ο‚— Make similar extensions to other influence propagation models: IC, LT-C, or even the general threshold model ο‚— Develop fast heuristics to give more efficient & scalable algorithms ο‚— Consider to incorporate other elements into the modeling of product adoption ο‚— Peoples’ spontaneous interests in product (natural early adopters) ο‚— Valuation may change over time for some people ο‚— Valuations may observe externalities
  • 48. Related Work ο‚— Influence maximization (too many…) ο‚— Revenue/profit maximization in social networks ο‚— Hartline et al.,WWW’08: Influence-and-Exploit ο‚— Arthur et al.,WINE’09 ο‚— Chen et al.,WINE’11 ο‚— Bloch & Qurou, working paper, 2011 ο‚— Influence vs. product adoption ο‚— Bhagat, Goyal, & Lakshmanan,WSDM’12: LT model with Colors
  • 49. Thanks! Acknowledgements: Allan Borodin (UofT),Wei Chen (MSRAsia), Pei Lee, Kevin Leyton- Brown, Min Xie, Ruben H. Zamar.