Bandit Algorithms for Social Network Queries

被引:8
|
作者
Bnaya, Zahy [1 ,2 ]
Puzis, Rami [1 ,2 ]
Stern, Roni [3 ]
Felner, Ariel [1 ]
机构
[1] Ben Gurion Univ Negev, Informat Syst Engn Dept, IL-84105 Beer Sheva, Israel
[2] Ben Gurion Univ Negev, Telekom Innovat Labs, IL-84105 Beer Sheva, Israel
[3] Harvard Univ, SEAS, Cambridge, MA 02138 USA
关键词
D O I
10.1109/SocialCom.2013.29
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In many cases the best way to find a profile or a set of profiles matching some criteria in a social network is via targeted crawling. An important challenge in targeted crawling is to choose the next profile to explore. Existing heuristics for targeted crawling are usually tailored for specific search criterion and could lead to short-sighted crawling decisions. In this paper we propose and evaluate a generic approach for guiding a social network crawler that aims to provide a proper balance between exploration and exploitation based on the recently introduced variant of the Multi-Armed Bandit problem with volatile arms (VMAB). Our approach is general-purpose. In addition, it provides provable performance guarantees. Experimental results indicate that our approach compares favorably with the best existing heuristics on two different domains.
引用
收藏
页码:148 / 153
页数:6
相关论文
共 50 条
  • [41] Efficient Algorithms for Social Network Coverage and Reach
    Puthal, Deepak
    Nepal, Surya
    Paris, Cecile
    Ranjan, Rajiv
    Chen, Jinjun
    2015 IEEE INTERNATIONAL CONGRESS ON BIG DATA - BIGDATA CONGRESS 2015, 2015, : 467 - 474
  • [42] Multi-armed bandit algorithms and empirical evaluation
    Vermorel, J
    Mohri, M
    MACHINE LEARNING: ECML 2005, PROCEEDINGS, 2005, 3720 : 437 - 448
  • [44] Safety-Aware Algorithms for Adversarial Contextual Bandit
    Sun, Wen
    Dey, Debadeepta
    Kapoor, Ashish
    INTERNATIONAL CONFERENCE ON MACHINE LEARNING, VOL 70, 2017, 70
  • [45] Regret bounds for Narendra-Shapiro bandit algorithms
    Gadat, Sebastien
    Panloup, Fabien
    Saadane, Sofiane
    STOCHASTICS-AN INTERNATIONAL JOURNAL OF PROBABILITY AND STOCHASTIC PROCESSES, 2018, 90 (06) : 886 - 926
  • [46] Anytime Algorithms for Multi-Armed Bandit Problems
    Kleinberg, Robert
    PROCEEDINGS OF THE SEVENTHEENTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, 2006, : 928 - 936
  • [47] Bandit Heroes: Social, Mythical, or Rational?
    Curott, Nicholas A.
    Fink, Alexander
    AMERICAN JOURNAL OF ECONOMICS AND SOCIOLOGY, 2012, 71 (02) : 470 - 497
  • [48] Persistent Queries in the Behavioral Theory of Algorithms
    Blass, Andreas
    Gurevich, Yuri
    ACM TRANSACTIONS ON COMPUTATIONAL LOGIC, 2011, 12 (02)
  • [49] On the optimality of holistic algorithms for twig queries
    Choi, B
    Mahoui, M
    Wood, D
    DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2003, 2736 : 28 - 37
  • [50] Efficient Algorithms for Kernel Aggregation Queries
    Chan, Tsz Nam
    Hou, Leong U.
    Cheng, Reynold
    Yiu, Man Lung
    Mittal, Shivansh
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2022, 34 (06) : 2726 - 2739