This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Pricing Social Visibility Service in Online Social Networks: Modeling and Algorithms

Shiyuan Zheng1,      Hong Xie2,      John C.S. Lui1 1Department of Computer Science and Engineering, The Chinese University of Hong Kong
2College of Computer Science, Chongqing University
1{syzheng,cslui}@cse.cuhk.edu.hk, [email protected]
Abstract

Online social networks (OSNs) such as YoutTube, Instagram, Twitter, Facebook, etc., serve as important platforms for users to share their information or content to friends or followers. Often times, users want to enhance their social visibility, as it can make their contents, i.e., opinions, videos, pictures, etc., attract attention from more users, which in turn may bring higher commercial benefit to them. Motivated by this, we propose a mechanism, where the OSN operator provides a “social visibility boosting service” to incentivize “transactions” between requesters (users who seek to enhance their social visibility via adding new “neighbors”) and suppliers (users who are willing to be added as a new “neighbor” of any requester when certain “rewards” is provided). We design a posted pricing scheme for the OSN provider to charge the requesters who use such boosting service, and reward the suppliers who contribute to such boosting service. The OSN operator keeps a fraction of the payment from requesters and distribute the remaining part to participating suppliers “fairly” via the Shapley value. The objective of the OSN provider is to select the price and supplier set to maximize the total amount of revenue under the budget constraint of requesters. We first show that the revenue maximization problem is not simpler than an NP-hard problem. We then decomposed it into two sub-routines, where one focuses on selecting the optimal set of suppliers, and the other one focuses on selecting the optimal price. We prove the hardness of each sub-routine, and eventually design a computationally efficient approximation algorithm to solve the revenue maximization problem with provable theoretical guarantee on the revenue gap. We conduct extensive experiments on four public datasets to validate the superior performance of our proposed algorithms.

I Introduction

OSNs such as YouTube, Instagram, Twitter, Facebook, etc., serve as important platforms for users to share their information or content to friends or followers, e.g., users in Facebook can share their opinions or status to their friends via the friendship network. Users in YouTube can share their videos to their subscribers via the subscriber network. A user’s friends or followers can further share the information or content of this user to their friends or followers. Hence, the information or content of a user can be propagated to his direct friends or followers, or even multi-hop friends or followers. In other words, a user is “socially visible” to his direct friends or followers and some multi-hop friends or followers.

Often times, users want to enhance their social visibility, as it can make their contents, i.e., opinions, videos, pictures, etc., attract attention from more users, which in turn may bring higher commercial benefit to them. We call a user who wants to enhance social visibility as a requester. One way to enhance a requester’s social visibility is to attract some new friends or followers. It is well known that the OSN is under the “rich gets richer” phenomenon, which makes it difficult for requesters, especially those with low social visibility, to attract new friends or followers. But when finical incentive is provided, some users will be willing to be added as requesters’ new friends or followers. We call such users as suppliers. Hence, requesters can provide financial incentives to enhance their social visibility. This paper aims to answer the following fundamental question: How to set appropriate financial incentives to incentivize the “transaction” between requesters and suppliers?

We propose a mechanism, where the OSN operator provides a “social visibility boosting service” to incentivize the transaction between requesters and suppliers. The visibility boosting service is sold via a posted normalized pricing scheme (p,q)(p,q), where p[0,1]p\in[0,1] and q[0,1]q\in[0,1]. Here, pp is the price of per unit social visibility improvement that the OSN operator charges a participating requester, and qq is the price of per unit contribution in improving social visibility of participating requesters that the OSN operator pays to a participating supplier. We consider the case that each participating supplier adds links to all participating requesters and requesters has a budget to add b+b\in\mathbb{N}_{+} new friends or followers. Requesters and suppliers decide whether to participate or not by comparing their valuations to the posted prices (p,q)(p,q). We consider a proportional transaction fee scheme, i.e., the OSN operator keeps a fraction of the payment from requesters, and distribute the remaining part (we call it “reward”) to suppliers. The objectives of the OSN operator are: (1) select the price (p,q)(p,q) and supplier set so to maximize the total amount of transaction fees or revenue; (2) divide the reward “fairly” to all suppliers.

Each of the above two objectives is technically challenging to achieve. One can observe that selecting the price (p,q)(p,q) and supplier set involves a mixed optimization problem, i.e., with both continuous decision variables, i.e., pp and qq, and set decision variables, i.e., supplier set. This implies that gradient based optimization methods does not work for this problem. To illustrate the hardness of this optimization problem, consider the case where pp and qq are given and our objective is to select the supplier set. The number of suppliers may exceed the budget bb and the OSN operator needs to select at most bb suppliers from them. Due to network externality effect of social visibility, suppliers are not independent in enhancing the social visibility of a requester. In other words, the total improvement of social visibility by two suppliers does not equal to the total improvement of social visibility made by each individual supplier. As one will see in Section III, this dependency among suppliers makes this simplified problem NP-hard already. Also, this dependency among suppliers also makes it challenging to fairly divide the reward to suppliers. We address these challenges and our contributions are:

  • We formulate a mathematical model to quantify social visibility. To the best of our knowledge, we are the first to propose a posted pricing scheme and formulate a revenue maximization problem for visibility boosting service.

  • We prove that the revenue maximization problem is not simpler than an NP-hard problem. We decomposed it into two sub-routines, where one focuses on selecting the optimal set of suppliers, and the other focuses on selecting the optimal price. We prove the hardness of each sub-problem and propose approximation algorithms for each sub-problem with theoretical guarantees on the approximation ratio, i.e., a ratio of (11/e)(1-1/e) for the first sub-routine and a ratio which can be make arbitrarily small via increasing the computational complexity of searching for the second sub-routine. Finally, we prove that combining these approximation algorithms, we obtain an algorithm to solve the revenue maximization problem with provable theoretical guarantee on the revenue gap.

  • We show how to divide the reward to suppliers fairly via the Shapley value concept. We conduct experiments on real-world social network datasets, and the results validate the effectiveness and efficiency of our algorithms.

II Model & Problem Formulation

II-A The Social Visibility Model

Online Social Network. Consider an OSN which is characterized by an unweighted and directed graph 𝒢(𝒰,)\mathcal{G}\triangleq(\mathcal{U},\mathcal{E}), where 𝒰{1,,U}\mathcal{U}\triangleq\{1,\ldots,U\} denotes a set of U+U\in\mathbb{N}_{+} users and 𝒰×𝒰\mathcal{E}\subseteq\mathcal{U}\times\mathcal{U} denotes a set of edges between users. Note that a directed edge from user u𝒰u\in\mathcal{U} to user v𝒰v\in\mathcal{U} is denoted by (u,v)(u,v)\in\mathcal{E}. For example, this social network model captures the Twitter social network, the Facebook social network (each undirected edge between user uu and vv is represented by two directed edges (u,v)(u,v) and (v,u)(v,u)). We focus on the case that there is no self-loop edges, i.e., (u,u),u𝒰(u,u)\notin\mathcal{E},\forall u\in\mathcal{U}.

Social Visibility. Denote a directed path in graph 𝒢\mathcal{G} as

p(u0u1un),\vec{p}\triangleq(u_{0}\to u_{1}\to...\to u_{n}),

where (ui,ui+1),i{0,,n1}(u_{i},u_{i+1})\in\mathcal{E},\forall i\in\{0,\dots,n-1\}, and uiuj,i,ju_{i}\neq u_{j},\forall i,j. Note that uiuj,i,ju_{i}\neq u_{j},\forall i,j captures that there is no self-loop edges or circles in the path. Denote a set of all directed edges on path p\vec{p} as

(p){(u0,u1),(u1,u2),,(un1,un)}.\mathcal{F}(\vec{p})\triangleq\{(u_{0},u_{1}),(u_{1},u_{2}),...,(u_{n-1},u_{n})\}.

Let L(p)L(\vec{p}) denote the length (or number of hops) of path p\vec{p}, which can be expressed as L(p)=|(p)|L(\vec{p})=|\mathcal{F}(\vec{p})|. Let 𝒫(u,v;𝒢)\mathcal{P}(u,v;\mathcal{G}) denote the set of all directed paths (without circles) from user uu to user vv in 𝒢\mathcal{G}. Let D(u,v;𝒢)D(u,v;\mathcal{G}) denote the distance from user uu to user vv in graph 𝒢\mathcal{G}. We define D(u,v;𝒢)D(u,v;\mathcal{G}) as the length of the shortest path from uu to vv, i.e.,

D(u,v;𝒢){minp𝒫(u,v;𝒢)L(p), if 𝒫(u,v;𝒢) +, if 𝒫(u,v;𝒢)= .D(u,v;\mathcal{G})\triangleq\left\{\begin{aligned} &\min_{\vec{p}\in\mathcal{P}(u,v;\mathcal{G})}L(\vec{p}),&&\text{ if $\mathcal{P}(u,v;\mathcal{G})\neq\emptyset$ }\\ &+\infty,&&\text{ if $\mathcal{P}(u,v;\mathcal{G})=\emptyset$ }.\end{aligned}\right.

Namely, when there is no directed path from uu to vv, the distance from uu to vv is infinite. Based on distance between nodes, we define user uu being dd-visible to user vv if

D(v,u;𝒢)d.D(v,u;\mathcal{G})\leq d.

The dd-visible set of user uu is defined as the set of all users to whom user uu is dd-visible, formally

𝒱(u,d;𝒢){v|v𝒰,D(v,u;𝒢)d}.\mathcal{V}(u,d;\mathcal{G})\triangleq\left\{v\Big{|}v\in\mathcal{U},D(v,u;\mathcal{G})\leq d\right\}.

Let τ+\tau\in\mathbb{N}_{+} denote the social visibility threshold of an OSN. This notion of social visibility threshold captures that the information of a user can be propagated to its followers and its followers may further propagate their own follower and so on so forth. Namely, user uu is not visible to users whose distance to user uu is larger than τ\tau. For example, τ=1\tau=1 models that each user is only visible to its own followers, while τ=2\tau=2 models that each user is visible to its own one-hop and two-hop followers. Based on τ\tau, we define the notation of visibility.

Definition 1.

The visibility of user uu is the cardinality of his τ\tau-visible set.

For example, Fig. 1 shows that, user 44’s 22-visible set is {3,5,6}\{3,5,6\} and 33-visible set is {3,5,6,7}\{3,5,6,7\}. With a social visibility threshold of τ=2\tau=2, user 44’s visibility is 33.

Refer to caption
Figure 1: An example of online social network.

II-B Pricing The Social Visibility

The pricing scheme. A “requester” is a user in the set 𝒰\mathcal{U} who seeks to increase his visibility by requesting other users to be his new incoming neighbors. Let 𝒰\mathcal{R}\subseteq\mathcal{U} denote a set of all requesters. A “supplier” is a user in the set 𝒰\mathcal{U} who is willing to be a new incoming neighbor of any requester. Let 𝒮𝒰\mathcal{S}\subseteq\mathcal{U} denote a set of all suppliers. For the ease of presentation, we assume that 𝒮=\mathcal{R}\cap\mathcal{S}=\emptyset, this captures that a user can not be both requester and supplier. We consider the general case that there are some users who are neither requesters nor suppliers, i.e., 𝒮𝒰\mathcal{R}\cup\mathcal{S}\subseteq\mathcal{U}. The OSN operator provides a “social visibility boosting service” to incentivize the “transaction” between requesters and suppliers. The visibility improvement service is sold at via a posted pricing scheme (p,q)(p,q), where p[0,1]p\in[0,1] and q[0,1]q\in[0,1]. Here, pp is the price of per unit social visibility improvement that the OSN operator charges a participating requester (i.e., requesters who use this social visibility boosting service), and qq is the price of per unit contribution in improving social visibility of participating requesters that the OSN operator pays to a participating supplier (i.e., add links to requesters). We consider the case that each participating supplier will add links to all participating requesters.

Requesters’ decision model. Each requester uu\in\mathcal{R} has a per unit valuation (i.e., the per unit price that requester uu is willing to pay) of pu[0,1]p_{u}\in[0,1] on the improvement of his social visibility. A requester will use the social visibility boosting service if his per unit valuation is not below the per unit price, i.e., pupp_{u}\geq p. Let R~(p)\widetilde{R}(p) denote a set of all participating requesters under price pp, formally

R~(p){u|pup,u}.\widetilde{R}(p)\triangleq\{u|p_{u}\geq p,u\in\mathcal{R}\}.

Due to financial budget on boosting service, each requester can afford to add at most b+b\in\mathbb{N}_{+} incoming neighbors.

Supplier’s decision model. Each supplier u𝒮u\in\mathcal{S} has a per unit valuation (i.e., the per unit price that supplier uu is willing to participate) of qu[0,1]q_{u}\in[0,1] on the per unit contribution in improving social visibility of participating requesters. Let \mathcal{M} denote a set participating suppliers, where ||b|\mathcal{M}|\leq b. Let G~(p,)\widetilde{G}(p,\mathcal{M}) denote the new graph after adding edges from participating suppliers to participating requesters. G~(p,)\widetilde{G}(p,\mathcal{M}) can be expressed as:

G~(p,)=(𝒰,(R~(p)×)).\widetilde{G}(p,\mathcal{M})=(\mathcal{U},\mathcal{E}\cup(\widetilde{R}(p)\times\mathcal{M})).

Let Iu(p,)I_{u}(p,\mathcal{M}) denote the improvement of social visibility of requester uR~(p)u\in\widetilde{R}(p). It can be expressed as:

Iu(p,)|𝒱(u,τ;G~(p,))𝒱(u,τ;𝒢)|.I_{u}(p,\mathcal{M})\triangleq\left|\mathcal{V}(u,\tau;\widetilde{G}(p,\mathcal{M}))\setminus\mathcal{V}(u,\tau;\mathcal{G})\right|.

Then, the total improvement of social visibility of all participating requesters is

I(p,)uR~(p)Iu(p,).I(p,\mathcal{M})\triangleq\sum_{u\in\widetilde{R}(p)}I_{u}(p,\mathcal{M}).

In other words, all participating suppliers make a total contribution of I(p,)I(p,\mathcal{M}) in social visibility enhancement. Quantifying I(p,)I(p,\mathcal{M}) among participating suppliers is a non-trivial problem. There are two underlying challenges: (1) some participating suppliers may have a larger number of follower while others may have a small number of followers; (2) the network structure poses an externality effect, causing the contribution of participating suppliers being correlated. To incentivize suppliers to participate, one needs to divide I(p,)I(p,\mathcal{M}) fairly among suppliers. Let ϕ\phi denote a “fair” division mechanism, which prescribes a contribution denoted by ϕu(p,)\phi_{u}(p,\mathcal{M}) for each participating supplier. In order to avoid distracting readers, we defer the detail explanation of ϕ\phi to the next section. Given the fair division mechanism ϕ\phi, a supplier is willing to participant in the social visibility boosting service if his per unit valuation does not exceed the per unit price that the OSN operator pays, i.e., quqq_{u}\leq q. Let S~(p)\widetilde{S}(p) denote a set of all potential participating suppliers under price qq, formally

S~(q){u|quq,u𝒮}.\widetilde{S}(q)\triangleq\{u|q_{u}\leq q,u\in\mathcal{S}\}.

Optimal pricing to maximize revenue. Under the posted pricing scheme, the total payment made by all requesters to the OSN operator can be expressed as:

G(p,)pI(p,).G(p,\mathcal{M})\triangleq pI(p,\mathcal{M}).

The total payment made by the OSN operator to all participating suppliers can be expressed as:

C(q,)qI(p,).C(q,\mathcal{M})\triangleq qI(p,\mathcal{M}).

The revenue of the OSN operator is therefore:

R(p,q,)G(p,)C(q,).R(p,q,\mathcal{M})\triangleq G(p,\mathcal{M})-C(q,\mathcal{M}).

We consider a proportional transaction fee scheme, i.e., the OSN operator keeps a fraction (1α)(1-\alpha) of G(p,)G(p,\mathcal{M}), where α(0,1)\alpha\in(0,1). This is equivalent to imposing q=αpq=\alpha p. We next formulate a revenue maximization problem for the OSN operator to select p,qp,q and \mathcal{M}.

Problem 1 (Optimal pricing to maximize revenue).

Select p,qp,q and \mathcal{M} to maximize the revenue of the OSN operator:

maxp,q,\displaystyle\max_{p,q,\mathcal{M}} R(p,q,)\displaystyle\quad R(p,q,\mathcal{M})
s.t.\displaystyle s.t. S~(q),||b,\displaystyle\quad\mathcal{M}\subseteq\widetilde{S}(q),\left|\mathcal{M}\right|\leq b,
q=αp,p[0,1],q[0,1].\displaystyle\quad q=\alpha p,p\in[0,1],q\in[0,1].

One can observe that the Problem 1 is a mixed optimization problem, i.e., with both continuous and set decision variables.

III Algorithms For Optimal Pricing

We first show that Problem 1 is not simpler than a NP-hard problem. Then we decomposed Problem 1 into two sub-problems. We prove the hardness of each sub-problem and propose approximation algorithms for each sub-problem. Finally, we prove that combining these approximation algorithms, we obtain an algorithm to solve Problem 1 with provable theoretical guarantee on the revenue gap. Due to page limit, all technical proofs to lemmas and theorems are presented in our supplementary file [1].

III-A Hardness Analysis

Hardness analysis. Recall that Problem 1 is a mixed optimization problem, i.e., with both continuous decision variables, i.e., pp and qq, and set decision variables, i.e., \mathcal{M}. This implies that gradient based optimization methods does not work for Problem 1. To illustrate the hardness of Problem 1, we consider a sub-problem of Problem 1 with given pricing parameters (p,q)(p,q), which is stated as follows:

Problem 2 (Optimal supplier set \mathcal{M}).

Given pp and qq such that q=αpq=\alpha p with 0α10\leq\alpha\leq 1, select \mathcal{M} to maximize the revenue of the OSN operator:

max\displaystyle\max_{\mathcal{M}} R(p,q,)\displaystyle\quad R(p,q,\mathcal{M})
s.t.\displaystyle s.t. S~(q),||b.\displaystyle\quad\mathcal{M}\subseteq\widetilde{S}(q),\left|\mathcal{M}\right|\leq b.

Namely, Problem 2 only selects the optimal set of suppliers to maximize the revenue of the OSN operator. Note that the set of potential participating suppliers S~(q)\widetilde{S}(q) is determined as qq is given. In the following theorem, we analyze its hardness.

Theorem 1.

Problem 2 is NP-hard to solve.

Theorem 1 states that it is NP-hard to locate the optimal set of supplier for Problem 2. In other words, it is computationally expensive to locate the exact optimal set of supplier for Problem 2. Note that Problem 2 is a sub-problem of Problem 1. Namely, Problem 1 is harder than Problem 2. And therefore, locating the exact optimal solution for Problem 1 is computationally expensive. We resort to design approximation algorithms for Problem 1 with theoretical guarantee.

Our approach. To address Problem 1, we decompose it into two sub-problems, which each sub-problem serves as a subroutine. In particular, Problem 2 is the first sub-problem. As Theorem 1 shows that Problem 2 is NP-hard, we aim to design an approximation algorithm which we denote as OptSupplierSet(p,q)(p,q) (its detail is postpone to Section III-B). Algorithm OptSupplierSet(p,q)(p,q) takes the prices (p,q)(p,q) as an input, and returns an approximately optimal set of suppliers under (p,q)(p,q). We use OptSupplierSet(p,q)(p,q) as an oracle to search for the optimal pricing parameter (p,q)(p,q). Formally, we aim to solve the following sub-problem:

Problem 3 (Optimal price p,qp,q).

Given the algorithm OptSupplierSet(p,q)(p,q), select (p,q)(p,q) so to maximize the revenue of the OSN operator:

maxp,q\displaystyle\max_{p,q} R(p,q,OptSupplierSet(p,q))\displaystyle\quad R(p,q,\texttt{OptSupplierSet}(p,q))
s.t.\displaystyle s.t. q=αp,p[0,1],q[0,1].\displaystyle\quad q=\alpha p,\quad p\in[0,1],q\in[0,1].

Note that OptSupplierSet(p,q)(p,q) returns an approximately optimal set of suppliers for each given (p,q)(p,q), Problem 3 returns an approximately optimal price. We aim to design an approximation algorithm for Problem 3, which we denote as OptPrice(OptSupplierSet)(\texttt{OptSupplierSet}) (its detail is postpone to Section III-C). One needs to supply OptPrice(OptSupplierSet)(\texttt{OptSupplierSet}) with algorithm OptSupplierSet, and OptPrice(OptSupplierSet)(\texttt{OptSupplierSet}) returns an approximately optimal (p,q)(p,q). We next proceed to present the design and analysis of OptSupplierSet(p,q)(p,q) and OptPrice(OptSupplierSet)(\texttt{OptSupplierSet}).

III-B Design & Analysis of OptSupplierSet(p,q)(p,q)

Submodular analysis. First, note that once pp and qq are given, the set of participating requesters R~(p)\widetilde{R}(p) and the set of potential participating suppliers S~(p)\widetilde{S}(p) are given. Our objective is to select S~(p)\mathcal{M}\in\widetilde{S}(p) with the constraint b\mathcal{M}\leq b, so as to maximize the objective function of Problem 2, i.e., revenue R(p,q,)R(p,q,\mathcal{M}), where pp and qq are given and q=αpq=\alpha p. When q=αpq=\alpha p, the R(p,q,)R(p,q,\mathcal{M}) can be derived as:

R(p,q,)=(1α)puR~(p)I(u,)\displaystyle R(p,q,\mathcal{M})=(1-\alpha)p\sum_{u\in\widetilde{R}(p)}I(u,\mathcal{M})
=(1α)prR~(p)|l×R~(p)𝒱(ls,τ1D(le,r;𝒢);𝒢)\displaystyle=(1-\alpha)p\sum_{r\in\widetilde{R}(p)}\big{|}\mathbin{\scalebox{1.25}{$\cup$}}_{l\in\mathcal{M}\times\widetilde{R}(p)}\mathcal{V}(l^{s},\tau-1-D(l^{e},r;\mathcal{G});\mathcal{G})
𝒱(r,τ;𝒢)|,\displaystyle\hskip 13.00806pt\setminus\mathcal{V}(r,\tau;\mathcal{G})\big{|},

where lsl^{s} and lel^{e} are the start node and the end node of each link l×R~(p)l\in\mathcal{M}\times\widetilde{R}(p). Based on the above closed-form expression of R(p,q,)R(p,q,\mathcal{M}), the following theorem shows the sub-modularity and monotonicity of R(p,q,)R(p,q,\mathcal{M}) with respect to \mathcal{M}.

Theorem 2.

Given pp and qq, such that q=αpq=\alpha p, the revenue R(p,q,)R(p,q,\mathcal{M}) is monotonously increasing and submodular with respect to \mathcal{M}.

Theorem 2 states that R(p,q,)R(p,q,\mathcal{M}) is monotonously increasing and submodular with respect to \mathcal{M} for each given pp and qq with q=αpq=\alpha p.

The OptSupplierSet(p,q)(p,q) algorithm. Based on Theorem 2, Algorithm 1 specifies a greedy algorithm to implement OptSupplierSet(p,q)(p,q). The core idea of Algorithm 1 is that we select suppliers one by one. Each time we select the supplier that achieves the largest marginal improvement in the revenue.

1:  init =\mathcal{M}=\emptyset
2:  for t=1t=1 to bb do
3:     uargmaxuS~(p)R(p,q,{u})R(p,q,)u^{\ast}\leftarrow\arg\max_{u\in\widetilde{S}(p)}R(p,q,\mathcal{M}\cup\{u\})-R(p,q,\mathcal{M})
4:     {u}\mathcal{M}\leftarrow\mathcal{M}\cup\{u^{\ast}\}
5:  end for
6:  return  ^{\hat{\mathcal{M}}}^{\ast}\leftarrow\mathcal{M}
Algorithm 1 OptSupplierSet(p,q)(p,q)

The following theorem presents the theoretical guarantees for Algorithm 1.

Theorem 3.

Given pp and qq, such that q=αpq=\alpha p. The output ^\hat{\mathcal{M}^{\ast}} of Algorithm 1 satisfies: We have

R(p,q,^)(11e)R(p,q,),R(p,q,\hat{\mathcal{M}}^{\ast})\geq\left(1-\frac{1}{e}\right)R(p,q,\mathcal{M}^{\ast}),

where \mathcal{M}^{\ast} denotes the optimal set of suppliers via exhaustive search.

Theorem 3 states that Algorithm 1 searches a set of suppliers with approximation ratio of at least 11/e1-1/e.

III-C Design & Analysis of OptPrice(OptSupplierSet)(\texttt{OptSupplierSet})

Perfect search. Now we consider the case that given OptSupplierSet(p,q)(p,q) outlined in Algorithm 1, we can obtain exact optimal price (p,q)(p,q) for Problem 3. The objective is to understand the impact of the approximate optimal supplier set returned by OptSupplierSet(p,q)(p,q) on the optimal price (p,q)(p,q). We state this impact in the following theorem.

Theorem 4.

Let (p3,q3)(p^{\ast}_{3},q_{3}^{\ast}) denote the optimal price of Problem 3. Given OptSupplierSet(p,q)(p,q) outlined in Algorithm 1, we have:

R(p3,q3,^(p3,q3))(11e)R(p,q,),R(p^{\ast}_{3},q_{3}^{\ast},\hat{\mathcal{M}}^{\ast}(p^{\ast}_{3},q_{3}^{\ast}))\geq\left(1-\frac{1}{e}\right)R(p^{\ast},q^{\ast},\mathcal{M}^{\ast}),

where (p,q,)(p^{\ast},q^{\ast},\mathcal{M}^{\ast}) denotes one optimal solution for the Problem 1.

Theorem 4 states that with OptSupplierSet(p,q)(p,q) outlined in Algorithm 1, an optimal solution of Problem 3 attains an approximation ratio of (11/e)(1-1/e) of the optimal solution of Problem 1. However, the optimal solution of Problem 3 is not easy to obtain. One challenge is that the closed-form expression of the objective function of Problem 3, i.e., R(p,q,OptSupplierSet(p,q))R(p,q,\texttt{OptSupplierSet}(p,q)), is not available, and its gradient is not available as well. Thus, we resort to gradient-free algorithms to solve Problem 3, in particular, the discretized search method. We leave it as a future work to study other advanced methods such as Monte Carlo optimization to address this challenge.

Discretized search. Note that q=αpq=\alpha p. We therefore discretize the domain of pp, i.e., [0,1][0,1], uniformly:

𝒜(ϵ){0,ϵ,2ϵ,,1ϵϵ,1},\mathcal{A}(\epsilon)\triangleq\left\{0,\epsilon,2\epsilon,\ldots,\left\lfloor\frac{1}{\epsilon}\right\rfloor\epsilon,1\right\},

where ϵ(0,1]\epsilon\in(0,1] is price search step the The OSN operator can control ϵ\epsilon to adjust the number of points in 𝒜(ϵ)\mathcal{A}(\epsilon). The OSN operator can use exhaustive search method to select the optimal price 𝒜(ϵ)\mathcal{A}(\epsilon), denoted by pDSp_{\text{DS}}^{\ast}. Algorithm 2 outlines this discretized search algorithm. We denote qDS=αpDSq_{\text{DS}}^{\ast}=\alpha p_{\text{DS}}^{\ast}. The set of supplier is then ^(pDS,qDS).\hat{\mathcal{M}}^{\ast}(p_{\text{DS}}^{\ast},q_{\text{DS}}^{\ast}). The following theorem states the theoretical guarantee of this method.

1:  Rev0\text{Rev}\leftarrow 0
2:  for p𝒜(ϵ)p\in\mathcal{A}(\epsilon)  do
3:     qαpq\leftarrow\alpha p
4:     \mathcal{M}\leftarrowOptSupplierSet(p,q)(p,q)
5:     if  R(p,q,)RevR(p,q,\mathcal{M})\geq\text{Rev}  then
6:        pDSp,qDSq,^(pDS,qDS)p_{\text{DS}}^{\ast}\leftarrow p,q_{\text{DS}}^{\ast}\leftarrow q,\hat{\mathcal{M}}^{\ast}(p_{\text{DS}}^{\ast},q_{\text{DS}}^{\ast})\leftarrow\mathcal{M}
7:        RevR(p,q,)\text{Rev}\leftarrow R(p,q,\mathcal{M})
8:     end if
9:  end for
10:  return  pDS,qDS,^(pDS,qDS)p_{\text{DS}}^{\ast},q_{\text{DS}}^{\ast},\hat{\mathcal{M}}^{\ast}(p_{\text{DS}}^{\ast},q_{\text{DS}}^{\ast})
Algorithm 2 OptPrice(OptSupplierSet)(\texttt{OptSupplierSet})
Theorem 5.

Suppose R(p,αp,^(p,αp))R(p,\alpha p,\hat{\mathcal{M}}^{\ast}(p,\alpha p)) is β\beta-Lipschitz with respect to pp, then the output (pDS,qDS,^(pDS,qDS))(p_{\text{DS}}^{\ast},q_{\text{DS}}^{\ast},\hat{\mathcal{M}}^{\ast}(p_{\text{DS}}^{\ast},q_{\text{DS}}^{\ast})) of Algorithm 2 satisfies

R(pDS,qDS,^(pDS,qDS))R(p3,q3,^(p3,q3))βϵ.R(p_{\text{DS}}^{\ast},q_{\text{DS}}^{\ast},\hat{\mathcal{M}}^{\ast}(p_{\text{DS}}^{\ast},q_{\text{DS}}^{\ast}))\geq R(p^{\ast}_{3},q_{3}^{\ast},\hat{\mathcal{M}}^{\ast}(p^{\ast}_{3},q_{3}^{\ast}))-\beta\epsilon.

Theorem 5 states that when R(p,αp,^(p,αp))R(p,\alpha p,\hat{\mathcal{M}}^{\ast}(p,\alpha p)) is β\beta-Lipschitz with respect to pp, the revenue gap between the discretized search method and the perfect search method is bounded by βϵ\beta\epsilon. An attractive of this algorithm is that the OSN operator can make this gap arbitrarily small by selection small enough ϵ\epsilon. Selecting smaller ϵ\epsilon leads to a larger computational complexity. Thus, Theorem 5 serves as a building block for an OSN operator to make a tradeoff between computational complexity and revenue. Combining them all, we prove the revenue gap between the pricing searched by the discretized search method and the optimal pricing of Problem 1.

Corollary 1.

Given OptSupplierSet(p,q)(p,q) outlined in Algorithm 1. Suppose R(p,αp,^(p,αp))R(p,\alpha p,\hat{\mathcal{M}}^{\ast}(p,\alpha p)) is β\beta-Lipschitz with respect to pp. The output (pDS,qDS,^(pDS,qDS))(p_{\text{DS}}^{\ast},q_{\text{DS}}^{\ast},\hat{\mathcal{M}}^{\ast}(p_{\text{DS}}^{\ast},q_{\text{DS}}^{\ast})) of Algorithm 2 satisfies that

R(pDS,qDS,^(pDS,qDS))(11e)R(p,q,)βϵ.R(p_{\text{DS}}^{\ast},q_{\text{DS}}^{\ast},\hat{\mathcal{M}}^{\ast}(p_{\text{DS}}^{\ast},q_{\text{DS}}^{\ast}))\geq\left(1-\frac{1}{e}\right)R(p^{\ast},q^{\ast},\mathcal{M}^{\ast})-\beta\epsilon.

IV Algorithms for Fair Division of Contribution

Our results so far can locate the approximate optimal price and supplier set, i.e., (pDS,qDS,^(pDS,qDS))(p_{\text{DS}}^{\ast},q_{\text{DS}}^{\ast},\hat{\mathcal{M}}^{\ast}(p_{\text{DS}}^{\ast},q_{\text{DS}}^{\ast})). The remaining issue is how to divide the contribution among participating suppliers fairly. As we mentioned in Section II that a “fair” division mechanism is important to incentivize the participation of suppliers. Given the approximate optimal solution (pDS,qDS,^(pDS,qDS))(p_{\text{DS}}^{\ast},q_{\text{DS}}^{\ast},\hat{\mathcal{M}}^{\ast}(p_{\text{DS}}^{\ast},q_{\text{DS}}^{\ast})), the OSN operator needs to divide a total contribution of social visibility improvement I(pDS,^(pDS,qDS))I(p_{\text{DS}}^{\ast},\hat{\mathcal{M}}^{\ast}(p_{\text{DS}}^{\ast},q_{\text{DS}}^{\ast})) among all participating suppliers. Note that the naive equal division, i.e., participating suppliers equally share I(pDS,^(pDS,qDS))I(p_{\text{DS}}^{\ast},\hat{\mathcal{M}}^{\ast}(p_{\text{DS}}^{\ast},q_{\text{DS}}^{\ast})) is not a fair division. This is because: (1) some participating suppliers may have a larger number of follower while others may have a small number of followers; (2) the network structure poses an externality effect, causing the contribution of participating suppliers being correlated. To achieve fair division, we apply the Shapley value [2] to divide I(pDS,^(pDS,qDS))I(p_{\text{DS}}^{\ast},\hat{\mathcal{M}}^{\ast}(p_{\text{DS}}^{\ast},q_{\text{DS}}^{\ast})). Formally, each participating supplier u^(pDS,qDS)u\in\hat{\mathcal{M}}^{\ast}(p_{\text{DS}}^{\ast},q_{\text{DS}}^{\ast}) gets the following share of profit:

ϕu(pDS,^(pDS,qDS))\displaystyle\phi_{u}(p_{\text{DS}}^{\ast},\hat{\mathcal{M}}^{\ast}(p_{\text{DS}}^{\ast},q_{\text{DS}}^{\ast}))
=^(pDS,qDS){u}||!(|^(pDS,qDS)|||1)!|^(pDS,qDS))|!\displaystyle=\sum_{\mathcal{M}\subseteq{\hat{\mathcal{M}}^{\ast}(p_{\text{DS}}^{\ast},q_{\text{DS}}^{\ast})}\setminus\{u\}}\frac{|\mathcal{M}|!(|\hat{\mathcal{M}}^{\ast}(p_{\text{DS}}^{\ast},q_{\text{DS}}^{\ast})|-|\mathcal{M}|-1)!}{|\hat{\mathcal{M}}^{\ast}(p_{\text{DS}}^{\ast},q_{\text{DS}}^{\ast}))|!}
×(I(pDS,{u})I(pDS,)).\displaystyle\hskip 13.00806pt\times(I(p_{\text{DS}}^{\ast},\mathcal{M}\cup\{u\})-I(p_{\text{DS}}^{\ast},\mathcal{M})).

Readers can refer to [2] for why Shapley value achieves fair division.

One challenge is that the computational complexity of evaluating ϕu(pDS,^(pDS,qDS))\phi_{u}(p_{\text{DS}}^{\ast},\hat{\mathcal{M}}^{\ast}(p_{\text{DS}}^{\ast},q_{\text{DS}}^{\ast})) is exponential in the cardinality of ^(pDS,qDS)\hat{\mathcal{M}}^{\ast}(p_{\text{DS}}^{\ast},q_{\text{DS}}^{\ast}). To address this computational challenge, we propose to use the sampling algorithm [3] to approximate ϕu(pDS,^(pDS,qDS))\phi_{u}(p_{\text{DS}}^{\ast},\hat{\mathcal{M}}^{\ast}(p_{\text{DS}}^{\ast},q_{\text{DS}}^{\ast})). Let σ=(u1,,ub~)\sigma=(u_{1},\cdots,u_{\widetilde{b}}) denote an ordering of the participating suppliers, where b~=min{b,|^(pDS,qDS)|}\widetilde{b}=\min\{b,|\hat{\mathcal{M}}^{\ast}(p_{\text{DS}}^{\ast},q_{\text{DS}}^{\ast})|\} and ui^(pDS,qDS)u_{i}\in\hat{\mathcal{M}}^{\ast}(p_{\text{DS}}^{\ast},q_{\text{DS}}^{\ast}) denotes the participating supplier in the ii-th order. Denote the set of players ranked before player ii in the order σ\sigma as

𝒮iσ{all players ranked before ui in the order σ}.\mathcal{S}_{i}^{\sigma}\triangleq\{\text{all players ranked before }u_{i}\text{ in the order }\sigma\}.

Based on [3], the ϕu(pDS,^(pDS,qDS))\phi_{u}(p_{\text{DS}}^{\ast},\hat{\mathcal{M}}^{\ast}(p_{\text{DS}}^{\ast},q_{\text{DS}}^{\ast})) can be rewritten as

ϕu(pDS,^(pDS,qDS))\displaystyle\phi_{u}(p_{\text{DS}}^{\ast},\hat{\mathcal{M}}^{\ast}(p_{\text{DS}}^{\ast},q_{\text{DS}}^{\ast}))
=𝔼σUniform(Ω)[I(pDS,𝒮iσ{u})I(pDS,𝒮iσ)],\displaystyle=\mathbb{E}_{\sigma\sim\text{Uniform}(\Omega)}[I(p_{\text{DS}}^{\ast},\mathcal{S}_{i}^{\sigma}\cup\{u\})-I(p_{\text{DS}}^{\ast},\mathcal{S}_{i}^{\sigma})], (1)

where Ω\Omega denotes a set of all participating suppliers, and Uniform(Ω)\text{Uniform}(\Omega) denotes a uniform distribution over Ω\Omega. Based on Equation 1, Algorithm 3 outlines a sampling algorithm to approximate ϕu(pDS,^(pDS,qDS))\phi_{u}(p_{\text{DS}}^{\ast},\hat{\mathcal{M}}^{\ast}(p_{\text{DS}}^{\ast},q_{\text{DS}}^{\ast})).

1:  ϕ^u=0\hat{\phi}_{u}=0
2:  for k=1k=1 to KK do
3:     generate a ordering σ\sigma uniformly at random from Ω\Omega
4:     ϕ^u[(k1)ϕ^u+I(pDS,𝒮iσ{u})I(pDS,𝒮iσ)]/k\hat{\phi}_{u}\leftarrow[(k-1)\hat{\phi}_{u}+I(p_{\text{DS}}^{\ast},\mathcal{S}_{i}^{\sigma}\cup\{u\})-I(p_{\text{DS}}^{\ast},\mathcal{S}_{i}^{\sigma})]/k
5:  end for
6:  return  ϕ^u\hat{\phi}_{u}
Algorithm 3 Approximating ϕu(pDS,^(pDS,qDS))\phi_{u}(p_{\text{DS}}^{\ast},\hat{\mathcal{M}}^{\ast}(p_{\text{DS}}^{\ast},q_{\text{DS}}^{\ast}))

The following theorem states theoretical guarantee for the approximation accuracy of Algorithm 3.

Theorem 6.

The output ϕ^σn\hat{\phi}_{\sigma_{n}} of Algorithm 3 satisfies

|ϕ^uϕu(pDS,^(pDS,qDS))|\displaystyle|\hat{\phi}_{u}-\phi_{u}(p_{\text{DS}}^{\ast},\hat{\mathcal{M}}^{\ast}(p_{\text{DS}}^{\ast},q_{\text{DS}}^{\ast}))|
maxσΩ[I(pDS,𝒮iσ{u})I(pDS,𝒮iσ)]K12ln2δ,\displaystyle\leq\frac{\max_{\sigma\in\Omega}[I(p_{\text{DS}}^{\ast},\mathcal{S}_{i}^{\sigma}\cup\{u\})-I(p_{\text{DS}}^{\ast},\mathcal{S}_{i}^{\sigma})]}{\sqrt{K}}\sqrt{\frac{1}{2}\ln\frac{2}{\delta}},

with a probability of at least 1δ1-\delta, where δ(0,1]\delta\in(0,1].

Theorem 6 states that one can control the approximation error of Algorithm 3 arbitrarily small by selecting a sufficiently large simulation rounds KK.

V Performance Evaluation

In this section, we conduct experiments on real-world datasets to evaluate the performance of our algorithms, and results show the their superior performance.

V-A Experimental Settings

Datasets. We evaluate our algorithms on four public datasets, whose overall statistics is summarized in Table I.

\bullet Residence [4]. This dataset contains friendship connections between 217 residents, who live at a residence hall in the Australian National University campus.

\bullet Blogs [4]. This dataset contains hyperlinks between blogs in the context of 2004 US election. Blogs are mapped as nodes and hyperlinks are mapped as directed links.

\bullet Facebook [5]. It is a page-page network of verified Facebook sites where nodes correspond to official Facebook pages and edges to mutual likes between pages.

\bullet DBLP [6]. This dataset contains a sub-network of the co-author network of the DBLP network. Scholars who have published papers in major conferences (those considered in DBLP) are mapped as nodes. Each co-author relationship between two scholars is mapped as two directed edges between these two scholars with different directions.

From Table I, one may argue that the scales of the above four datasets are not large. We intentionally make this choice because: (1) We have already proved the quality gap; (2) To compare with baseline algorithms such as the brute force method, the OSN has to be small to make it computationally feasible.

TABLE I: Statistics of four datasets.
datasets #nodes #links type τ\tau
Residence 217 2,672 directed 2
Blogs 1,224 19,025 directed 2
Facebook 5,908 41,729 undirected 2
DBLP 10,000 55,734 undirected 2

Parameter setting. To reflect the real-world setting that only a small portion of users in an OSN is interested in the social visibility boosting service, we select γ\gamma fraction of users uniformly at random from the user population 𝒰\mathcal{U} as requesters \mathcal{R}, and another γ\gamma fraction of users uniformly at random from the user population 𝒰\mathcal{U} as suppliers 𝒮\mathcal{S}. We set γ\gamma as 0.05, 0.25, 0.5 and 0.1 for dataset Residence, Blogs, Facebook and DBLP respectively. Here we select different γ\gamma on different datasets, in order to reveal the impact of size of requesters and suppliers on our algorithm. For each requesters uu\in\mathcal{R}, valuation pup_{u} is sampled from Beta distribution B(3,6)B(3,6), and quq_{u} is sampled from Beta distribution B(6,3)B(6,3). Throughout the experiments, we fixed α=0.6\alpha=0.6 for the OSN operator, i.e., the OSN operator keeps 40% of the payment from the requesters as the transaction fee.

Metrics & baselines. We use R(p,q,)R(p,q,\mathcal{M}), the revenue of the OSN operator as the evaluation metric. To understand the accuracy and running time of our OptSupplierSet algorithm, i.e., Algorithm 1, we compare it with the following two baselines: (1) Brute, which selects the optimal set of participating suppliers under each given prices (p,q)(p,q) via exhaustive search; (2) TopVis, which selects suppliers with the top-bb social visibility from the potential supplier set under each given prices (p,q)(p,q). To evaluate our OptPrice algorithm, i.e., Algorithm 2, we vary the search step ϵ\epsilon from 0.2, 0.1, 0.05, 0.025 to 0.0125.

V-B Evaluating OptSupplierSet

We first compare our OptSupplierSet algorithm, i.e., Algorithm 1, with two baselines (1) Brute and (2) TopVis. Note that algorithm Brute is computationally expensive, we only experiment it on small datasets Residence and DBLP. Figure 2 shows the revenue achieved by different methods of finding optimal supplier set, where we fix search step as ϵ=0.025\epsilon=0.025. From Figure 2, one can observe that the revenue under our OptSupplierSet algorithm is nearly the same as that under the Brute algorithm on dataset Residence and Blogs. This implies a high accuracy of our OptSupplierSet in approximating the optimal supplier set. One can also observe that the revenue under the heuristic algorithm TopVis is slightly smaller than that under our OptSupplierSet on all 4 datasets. One reason for this result is that we random select a small set of suppliers from the user population, which may cause a weak network externality effect among suppliers. When this externality effect among suppliers is weak, the optimal supplier set becomes roughly the same as the set of suppliers with top-bb social visibility.

Refer to caption
(a) Residence
Refer to caption
(b) Blogs
Refer to caption
(c) Facebook
Refer to caption
(d) DBLP
Figure 2: Revenue under different methods to find optimal supplier set, where discrete search step ϵ=0.025\epsilon=0.025.

V-C Evaluating the Discretized Search Algorithm

Next, we study the impact of search step ϵ\epsilon on OptPrice, i.e., Algorithm 2. We vary the search step ϵ\epsilon from 0.2, 0.1, 0.05, 0.025 to 0.0125 on all 4 datasets. Besides, we experiment exhaustive search of price on small datasets Residence and Blogs. Note that if the operator iterates all values in {pu|u}{qu/α|u𝒮}\{p_{u}|u\in\mathcal{R}\}\cup\{q_{u}/\alpha|u\in\mathcal{S}\} as posted price, then he can iterate all possible combination of participating requesters and potential participating suppliers. Thus, exhaustive search of price can be achieved by searching all the values in {pu|u}{qu/α|u𝒮}\{p_{u}|u\in\mathcal{R}\}\cup\{q_{u}/\alpha|u\in\mathcal{S}\}. However, it is only practical when we only have a finite and small set of requesters. We did not experiment exhaustive price search on the dataset Facebook and DBLP, since it is computationally expensive.

Figure 3 shows the revenue and running time of OptPrice under different selection of search step ϵ\epsilon (including exhaustive search of price) and different budgets b=1,2,3,4b=1,2,3,4 on dataset Residence. From Figure 3 one can observe that on the dataset Residence, decreasing the search step ϵ\epsilon can increase the revenue of OptPrice, but it also increases the running time. Moreover, there is a diminishing increase of revenue. We can find that ϵ=0.1\epsilon=0.1 is a proper price search step for the dataset Residence, since it achieves a good balance between running time and performance. The bar labeled as Exh corresponds to exhaustive search of price. On can observe that with a search step ϵ=0.1\epsilon=0.1, OptPrice can achieve a revenue around 70% of that under exhaustive search of price, which takes at least more than ten times of the running time of OptPrice. Figure 4 shows the results on dataset Blogs. The result is similar to that of the dataset Residence. However, for the dataset Blogs, we can find that ϵ=0.025\epsilon=0.025 is a proper price search step. Figure 5 show the results on dataset Facebook. We can find when we vary search step, the revenues achieved do not change much. Figure 6 shows the results on dataset DBLP. One can observe that 0.05 is a proper search step.

Refer to caption
(a) budget b=1b=1
Refer to caption
(b) budget b=2b=2
Refer to caption
(c) budget b=3b=3
Refer to caption
(d) budget b=4b=4
Figure 3: Revenue and running time of OptPrice under different search step size ϵ\epsilon (Residence).
Refer to caption
(a) budget b=1b=1
Refer to caption
(b) budget b=2b=2
Refer to caption
(c) budget b=3b=3
Refer to caption
(d) budget b=4b=4
Figure 4: Revenue and running time of OptPrice under different search step size ϵ\epsilon (Blogs).
Refer to caption
(a) budget b=1b=1
Refer to caption
(b) budget b=2b=2
Refer to caption
(c) budget b=3b=3
Refer to caption
(d) budget b=4b=4
Figure 5: Revenue and running time of OptPrice under different search step size ϵ\epsilon (Facebook).
Refer to caption
(a) budget b=1b=1
Refer to caption
(b) budget b=2b=2
Refer to caption
(c) budget b=3b=3
Refer to caption
(d) budget b=4b=4
Figure 6: Revenue and running time of OptPrice under different search step size ϵ\epsilon (DBLP).

VI Related Work

The notion of social visibility defined in this paper is closely related to social influence [7, 8, 9, 10]. One key difference is that when a user is visible to a set of users, it does not mean this user can influence this set of users. The objective of influence maximization problem is to find a subset of nodes that could maximize the spread of information under certain influence diffusion models. But our problem focuses on the pricing of social visibility service. The idea of adding new links to enhance social visibility is closely related to link prediction [11, 12, 13], and friend recommendation [14, 15, 16, 17], The objectives of link prediction and friend recommendation are to predict future or missing links. Our work adds links that can improve social visibility. Note that such links may have nothing to do with predicting the future or missing links.

Technically, our work is closely related to revenue management [18]. Different with classical revenue management literatures [18], which focuses on understanding the structure of optimal pricing, our work formulates a new revenue maximization framework and we focus design approximation algorithms to solve this problem. Similar to influence maximization [7, 8, 10], the core technique in selecting the supplier set is submodular analysis. Our contribution is in proving that our problem has the submodular property and show that how the submodular property impacts the search optimal pricing.

VII Conclusions

This paper proposes a posted pricing scheme for the OSN operator to price its social visibility boosting service. We formulate a revenue maximization problem for the OSN provider to select the parameter of the posted pricing scheme. We show that the revenue maximization problem is not simpler than an NP-hard problem. We decomposed it into two sub-routines, where one focuses on selecting the optimal set of suppliers, and the other one focuses on selecting the optimal prices. We prove the hardness of each sub-routine, and eventually design a computationally efficient approximation algorithm to solve the revenue maximization problem with provable theoretical guarantee on the revenue gap. We conduct extensive experiments on four public datasets to validate the superior performance of our proposed algorithms.

References

  • [1] S. Zheng, H. Xie, and J. C. Lui, Supplementary file to the main paper., 2021. [Online]. Available: https://www.dropbox.com/s/yd0jjtplv97vh41/supplementary.pdf?dl=0
  • [2] L. S. Shapley, Notes on the N-person Game–II: The Value of an N-person Game.   Rand Corporation, 1951.
  • [3] Y. Bachrach, E. Markakis, E. Resnick, A. D. Procaccia, J. S. Rosenschein, and A. Saberi, “Approximating power indices: theoretical and empirical analysis,” Autonomous Agents and Multi-Agent Systems, vol. 20, no. 2, pp. 105–122, 2010.
  • [4] J. Kunegis, “KONECT – The Koblenz Network Collection,” in Proc. Int. Conf. on World Wide Web Companion, 2013, pp. 1343–1350.
  • [5] J. Leskovec and A. Krevl, “SNAP Datasets: Stanford large network dataset collection,” http://snap.stanford.edu/data, Jun. 2014.
  • [6] W. Nawaz, K.-U. Khan, Y.-K. Lee, and S. Lee, “Intra graph clustering using collaborative similarity measure,” Distributed and Parallel Databases, vol. 33, no. 4, pp. 583–603, 2015.
  • [7] D. Kempe, J. Kleinberg, and É. Tardos, “Maximizing the spread of influence through a social network,” in Proc. ACM KDD, 2003.
  • [8] P. Domingos and M. Richardson, “Mining the network value of customers,” in Proc. ACM KDD.   ACM, 2001.
  • [9] Y. Lin, W. Chen, and J. C. Lui, “Boosting information spread: An algorithmic approach,” in 2017 IEEE 33rd International Conference on Data Engineering (ICDE).   IEEE, 2017, pp. 883–894.
  • [10] M. Richardson and P. Domingos, “Mining knowledge-sharing sites for viral marketing,” in Proc. ACM KDD.   ACM, 2002.
  • [11] L. Lü and T. Zhou, “Link prediction in complex networks: A survey,” Physica A: Statistical Mechanics and its Applications, vol. 390, no. 6, p. 1150–1170, Mar 2011.
  • [12] V. Martínez, F. Berzal, and J.-C. Cubero, “A survey of link prediction in complex networks,” ACM CSUR, vol. 49, no. 4, p. 69, 2017.
  • [13] D. Liben-Nowell and J. Kleinberg, “The link-prediction problem for social networks,” Journal of the American society for information science and technology, vol. 58, no. 7, pp. 1019–1031, 2007.
  • [14] P. Resnick and H. R. Varian, “Recommender systems,” Communications of the ACM, vol. 40, no. 3, pp. 56–59, 1997.
  • [15] H. Ma, “On measuring social friend interest similarities in recommender systems,” in Proc. ACM SIGIR.   ACM, 2014.
  • [16] H. Ma, D. Zhou, C. Liu, M. R. Lyu, and I. King, “Recommender systems with social regularization,” in Proc. WSDM.   ACM, 2011.
  • [17] X. Xie, “Potential friend recommendation in online social network,” in Proc. IEEE/ACM CGCC.   IEEE Computer Society, 2010.
  • [18] K. T. Talluri, G. Van Ryzin, and G. Van Ryzin, The theory and practice of revenue management.   Springer, 2004, vol. 1.