Abstract
We study the Price of Anarchy (PoA) of the competitive cascade game following the framework proposed by Goyal and Kearns in [11]. Our main insight is that a reduction to a Linear Threshold Model in a time-expanded graph establishes the submodularity of the social utility function. From this observation, we deduce that the game is a valid utility game, which in turn implies an upper bound of 2 on the (coarse) PoA. This cleaner understanding of the model yields a simpler proof of a much more general result than that established by Goyal and Kearns: for the N-player competitive cascade game, the (coarse) PoA is upper-bounded by 2 under any graph structure. We also show that this bound is tight.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
References
Alon, N., Feldman, M., Procaccia, A.D., Tennenholtz, M.: A note on competitive diffusion through social networks. Information Processing Letters 110, 221–225 (2010)
Bharathi, S., Kempe, D., Salek, M.: Competitive influence maximization in social networks. In: Deng, X., Graham, F.C. (eds.) WINE 2007. LNCS, vol. 4858, pp. 306–311. Springer, Heidelberg (2007)
Blum, A., Hajiaghayi, M., Ligett, K., Roth, A.: Regret minimization and the price of total anarchy. In: Proc. 39th ACM Symp. on Theory of Computing, pp. 373–382 (2008)
Borodin, A., Filmus, Y., Oren, J.: Threshold models for competitive influence in social networks. In: Saberi, A. (ed.) WINE 2010. LNCS, vol. 6484, pp. 539–550. Springer, Heidelberg (2010)
Budak, C., Agrawal, D., Abbadi, A.E.: Limiting the spread of misinformation in social networks. In: 20th Intl. World Wide Web Conference, pp. 665–674 (2011)
Carnes, T., Nagarajan, C., Wild, S.M., van Zuylen, A.: Maximizing influence in a competitive social network: A follower’s perspective. In: Proc. Intl. Conf. on Electronic Commerce, ICEC (2007)
Chen, W., Collins, A., Cummings, R., Ke, T., Liu, Z., Rincon, D., Sun, X., Wang, Y., Wei, W., Yuan, Y.: Influence maximization in social networks when negative opinions emerge and propagate. In: Proc. 11th SIAM Intl. Conf. on Data Mining, pp. 379–390 (2011)
Chen, W., Wang, Y., Yang, S.: Efficient influence maximization in social networks. In: Proc. 15th Intl. Conf. on Knowledge Discovery and Data Mining, pp. 199–208 (2009)
Domingos, P., Richardson, M.: Mining the network value of customers. In: Proc. 7th Intl. Conf. on Knowledge Discovery and Data Mining, pp. 57–66 (2001)
Dubey, P., Garg, R., De Meyer, B.: Competing for customers in a social network: The quasi-linear case. In: Spirakis, P.G., Mavronicolas, M., Kontogiannis, S.C. (eds.) WINE 2006. LNCS, vol. 4286, pp. 162–173. Springer, Heidelberg (2006)
Goyal, S., Kearns, M.: Competitive contagion in networks. In: Proc. 43rd ACM Symp. on Theory of Computing, pp. 759–774 (2012)
He, X., Song, G., Chen, W., Jiang, Q.: Influence blocking maximization in social networks under the competitive linear threshold model. In: Proc. 12th SIAM Intl. Conf. on Data Mining (2012)
Immorlica, N., Kleinberg, J., Mahdian, M., Wexler, T.: The role of compatibility in the diffusion of technologies through social networks. In: Proc. 9th ACM Conf. on Electronic Commerce, pp. 75–83 (2007)
Kempe, D., Kleinberg, J., Tardos, E.: Maximizing the spread of influence in a social network. In: Proc. 9th Intl. Conf. on Knowledge Discovery and Data Mining, pp. 137–146 (2003)
Kempe, D., Kleinberg, J.M., Tardos, É.: Influential nodes in a diffusion model for social networks. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 1127–1138. Springer, Heidelberg (2005)
Kimura, M., Saito, K.: Tractable models for information diffusion in social networks. In: Fürnkranz, J., Scheffer, T., Spiliopoulou, M. (eds.) PKDD 2006. LNCS (LNAI), vol. 4213, pp. 259–271. Springer, Heidelberg (2006)
Mossel, E., Roch, S.: Submodularity of influence in social networks: From local to global. SIAM J. Comput. 39(6), 2176–2188 (2010)
Rogers, E.: Diffusion of innovations, 5th edn. Free Press (2003)
Roughgarden, T.: Intrinsic robustness of the price of anarchy. In: Proc. 40th ACM Symp. on Theory of Computing, pp. 513–522 (2009)
Tsai, J., Nguyen, T.H., Tambe, M.: Security games for controlling contagion. In: Proc. 27th AAAI Conf. on Artificial Intelligence (2012)
Tzoumas, V., Amanatidis, C., Markakis, E.: A game-theoretic analysis of a competitive diffusion process over social networks. In: Goldberg, P.W. (ed.) WINE 2012. LNCS, vol. 7695, pp. 1–14. Springer, Heidelberg (2012)
Vetta, A.: Nash equlibria in competitive societies with applications to facility location, traffic routing and auctions. In: Proc. 43rd IEEE Symp. on Foundations of Computer Science, pp. 416–425 (2002)
Wang, C., Chen, W., Wang, Y.: Scalable influence maximization for independent cascade model in large-scale social networks. Data Mining and Knowledge Discovery Journal 25(3), 545–576 (2012)
Wang, Y., Cong, G., Song, G., Xie, K.: Community-based greedy algorithm for mining top-k influential nodes in mobile social networks. In: Proc. 16th Intl. Conf. on Knowledge Discovery and Data Mining, pp. 1039–1048 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
He, X., Kempe, D. (2013). Price of Anarchy for the N-Player Competitive Cascade Game with Submodular Activation Functions. In: Chen, Y., Immorlica, N. (eds) Web and Internet Economics. WINE 2013. Lecture Notes in Computer Science, vol 8289. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-45046-4_20
Download citation
DOI: https://doi.org/10.1007/978-3-642-45046-4_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-45045-7
Online ISBN: 978-3-642-45046-4
eBook Packages: Computer ScienceComputer Science (R0)