Online Collaborative Filtering on Graphs

被引:13
作者
Banerjee, Siddhartha [1 ]
Sanghavi, Sujay [2 ]
Shakkottai, Sanjay [2 ]
机构
[1] Cornell Univ, Sch ORIE, Ithaca, NY 14853 USA
[2] Univ Texas Austin, Dept ECE, Austin, TX 78705 USA
基金
美国国家科学基金会;
关键词
online recommendation; social networks; competitive analysis;
D O I
10.1287/opre.2016.1508
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
Existing approaches to designing recommendation systems with user feedback focus on settings where the number of items is small and/or admit some underlying structure. It is unclear, however, if these approaches extend to applications like social network news feeds and content-curation platforms, which have large and unstructured content pools and constraints on user-item recommendations. To this end, we consider the design of recommendation systems in content-rich setting-where the number of items and the number of item-views by users are of a similar order and an access graph constrains which user is allowed to see which item. In this setting, we propose recommendation algorithms that effectively exploit the access graph, and characterize how their performance depends on the graph topology. Our results demonstrate the importance of serendipity in exploration and how recommendation improves when the access graph has higher expansion; they also suggest reasons behind the success of simple algorithms like Twitter's latest-first policy. From a technical perspective, our model presents a framework for studying explore-exploit trade-offs in large-scale settings, with potentially infinite number of items. We present algorithms with competitive-ratio guarantees under both finite-horizon and infinite-horizon settings; conversely, we demonstrate that naive policies can be highly suboptimal and also that in many settings, our results are orderwise optimal.
引用
收藏
页码:756 / 769
页数:14
相关论文
共 20 条
[1]  
[Anonymous], 2011, P ACM INT C WEB SEAR, DOI DOI 10.1145/1935826.1935863
[2]  
[Anonymous], 2011, JMLR Proceedings
[3]  
[Anonymous], 2008, ACM SIGECOM EXCHANGE, DOI DOI 10.1145/1399589.1399596
[4]   Finite-time analysis of the multiarmed bandit problem [J].
Auer, P ;
Cesa-Bianchi, N ;
Fischer, P .
MACHINE LEARNING, 2002, 47 (2-3) :235-256
[5]  
Bubeck S, 2008, FDN TRENDS MACHINE L, V5, P1
[6]   Competitive Weighted Matching in Transversal Matroids [J].
Dimitrov, Nedialko B. ;
Plaxton, C. Greg .
ALGORITHMICA, 2012, 62 (1-2) :333-348
[7]  
Dudik M., 2011, ARXIV11062369, P169
[8]   Faster Algorithms for Semi-Matching Problems [J].
Fakcharoenphol, Jittat ;
Laekhanukit, Bundit ;
Nanongkai, Danupon .
ACM TRANSACTIONS ON ALGORITHMS, 2014, 10 (03)
[9]  
GITTINS JC, 1979, J ROY STAT SOC B MET, V41, P148
[10]   BOUNDS FOR CERTAIN MULTIPROCESSING ANOMALIES [J].
GRAHAM, RL .
BELL SYSTEM TECHNICAL JOURNAL, 1966, 45 (09) :1563-+