Skip to main content

Price of Anarchy for the N-Player Competitive Cascade Game with Submodular Activation Functions

  • Conference paper
Web and Internet Economics (WINE 2013)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8289))

Included in the following conference series:

Abstract

We study the Price of Anarchy (PoA) of the competitive cascade game following the framework proposed by Goyal and Kearns in [11]. Our main insight is that a reduction to a Linear Threshold Model in a time-expanded graph establishes the submodularity of the social utility function. From this observation, we deduce that the game is a valid utility game, which in turn implies an upper bound of 2 on the (coarse) PoA. This cleaner understanding of the model yields a simpler proof of a much more general result than that established by Goyal and Kearns: for the N-player competitive cascade game, the (coarse) PoA is upper-bounded by 2 under any graph structure. We also show that this bound is tight.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Alon, N., Feldman, M., Procaccia, A.D., Tennenholtz, M.: A note on competitive diffusion through social networks. Information Processing Letters 110, 221–225 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  2. Bharathi, S., Kempe, D., Salek, M.: Competitive influence maximization in social networks. In: Deng, X., Graham, F.C. (eds.) WINE 2007. LNCS, vol. 4858, pp. 306–311. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  3. Blum, A., Hajiaghayi, M., Ligett, K., Roth, A.: Regret minimization and the price of total anarchy. In: Proc. 39th ACM Symp. on Theory of Computing, pp. 373–382 (2008)

    Google Scholar 

  4. Borodin, A., Filmus, Y., Oren, J.: Threshold models for competitive influence in social networks. In: Saberi, A. (ed.) WINE 2010. LNCS, vol. 6484, pp. 539–550. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  5. Budak, C., Agrawal, D., Abbadi, A.E.: Limiting the spread of misinformation in social networks. In: 20th Intl. World Wide Web Conference, pp. 665–674 (2011)

    Google Scholar 

  6. Carnes, T., Nagarajan, C., Wild, S.M., van Zuylen, A.: Maximizing influence in a competitive social network: A follower’s perspective. In: Proc. Intl. Conf. on Electronic Commerce, ICEC (2007)

    Google Scholar 

  7. Chen, W., Collins, A., Cummings, R., Ke, T., Liu, Z., Rincon, D., Sun, X., Wang, Y., Wei, W., Yuan, Y.: Influence maximization in social networks when negative opinions emerge and propagate. In: Proc. 11th SIAM Intl. Conf. on Data Mining, pp. 379–390 (2011)

    Google Scholar 

  8. Chen, W., Wang, Y., Yang, S.: Efficient influence maximization in social networks. In: Proc. 15th Intl. Conf. on Knowledge Discovery and Data Mining, pp. 199–208 (2009)

    Google Scholar 

  9. Domingos, P., Richardson, M.: Mining the network value of customers. In: Proc. 7th Intl. Conf. on Knowledge Discovery and Data Mining, pp. 57–66 (2001)

    Google Scholar 

  10. Dubey, P., Garg, R., De Meyer, B.: Competing for customers in a social network: The quasi-linear case. In: Spirakis, P.G., Mavronicolas, M., Kontogiannis, S.C. (eds.) WINE 2006. LNCS, vol. 4286, pp. 162–173. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  11. Goyal, S., Kearns, M.: Competitive contagion in networks. In: Proc. 43rd ACM Symp. on Theory of Computing, pp. 759–774 (2012)

    Google Scholar 

  12. He, X., Song, G., Chen, W., Jiang, Q.: Influence blocking maximization in social networks under the competitive linear threshold model. In: Proc. 12th SIAM Intl. Conf. on Data Mining (2012)

    Google Scholar 

  13. Immorlica, N., Kleinberg, J., Mahdian, M., Wexler, T.: The role of compatibility in the diffusion of technologies through social networks. In: Proc. 9th ACM Conf. on Electronic Commerce, pp. 75–83 (2007)

    Google Scholar 

  14. Kempe, D., Kleinberg, J., Tardos, E.: Maximizing the spread of influence in a social network. In: Proc. 9th Intl. Conf. on Knowledge Discovery and Data Mining, pp. 137–146 (2003)

    Google Scholar 

  15. Kempe, D., Kleinberg, J.M., Tardos, É.: Influential nodes in a diffusion model for social networks. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 1127–1138. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  16. Kimura, M., Saito, K.: Tractable models for information diffusion in social networks. In: Fürnkranz, J., Scheffer, T., Spiliopoulou, M. (eds.) PKDD 2006. LNCS (LNAI), vol. 4213, pp. 259–271. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  17. Mossel, E., Roch, S.: Submodularity of influence in social networks: From local to global. SIAM J. Comput. 39(6), 2176–2188 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  18. Rogers, E.: Diffusion of innovations, 5th edn. Free Press (2003)

    Google Scholar 

  19. Roughgarden, T.: Intrinsic robustness of the price of anarchy. In: Proc. 40th ACM Symp. on Theory of Computing, pp. 513–522 (2009)

    Google Scholar 

  20. Tsai, J., Nguyen, T.H., Tambe, M.: Security games for controlling contagion. In: Proc. 27th AAAI Conf. on Artificial Intelligence (2012)

    Google Scholar 

  21. Tzoumas, V., Amanatidis, C., Markakis, E.: A game-theoretic analysis of a competitive diffusion process over social networks. In: Goldberg, P.W. (ed.) WINE 2012. LNCS, vol. 7695, pp. 1–14. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  22. Vetta, A.: Nash equlibria in competitive societies with applications to facility location, traffic routing and auctions. In: Proc. 43rd IEEE Symp. on Foundations of Computer Science, pp. 416–425 (2002)

    Google Scholar 

  23. Wang, C., Chen, W., Wang, Y.: Scalable influence maximization for independent cascade model in large-scale social networks. Data Mining and Knowledge Discovery Journal 25(3), 545–576 (2012)

    Article  MATH  Google Scholar 

  24. Wang, Y., Cong, G., Song, G., Xie, K.: Community-based greedy algorithm for mining top-k influential nodes in mobile social networks. In: Proc. 16th Intl. Conf. on Knowledge Discovery and Data Mining, pp. 1039–1048 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

He, X., Kempe, D. (2013). Price of Anarchy for the N-Player Competitive Cascade Game with Submodular Activation Functions. In: Chen, Y., Immorlica, N. (eds) Web and Internet Economics. WINE 2013. Lecture Notes in Computer Science, vol 8289. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-45046-4_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-45046-4_20

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-45045-7

  • Online ISBN: 978-3-642-45046-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics