On the Efficiency of Influence-and-Exploit Strategies for Revenue Maximization under Positive Externalities

  • Dimitris Fotakis
  • Paris Siminelakis
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7695)


We consider the marketing model of (Hartline, Mirrokni, Sundararajan, WWW ’08) for selling a digital product in a social network under positive externalities. The seller seeks for a marketing strategy, namely an ordering in which he approaches the buyers and the prices offered to them, that maximizes her revenue. We restrict our attention to the Uniform Additive Model of externalities, and mostly focus on Influence-and-Exploit (IE) marketing strategies. We show that in undirected social networks, revenue maximization is NP-hard not only when we search for a general optimal marketing strategy, but also when we search for the best IE strategy. Rather surprisingly, we observe that allowing IE strategies to offer prices smaller than the myopic price in the exploit step leads to a significant improvement on their performance. Thus, we show that the best IE strategy approximates the maximum revenue within a factor of 0.911 for undirected and of roughly 0.553 for directed networks. Utilizing a connection between good IE strategies and large cuts in the underlying social network, we obtain polynomial-time algorithms that approximate the revenue of the best IE strategy within a factor of roughly 0.9. Hence, we significantly improve on the best known approximation ratio for the maximum revenue to 0.8229 for undirected and to 0.5011 for directed networks (from 2/3 and 1/3, respectively).


Approximation Ratio Marketing Strategy Positive Externality Directed Network Undirected Network 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Akhlaghpour, H., Ghodsi, M., Haghpanah, N., Mirrokni, V.S., Mahini, H., Nikzad, A.: Optimal Iterative Pricing over Social Networks (Extended Abstract). In: Saberi, A. (ed.) WINE 2010. LNCS, vol. 6484, pp. 415–423. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  2. 2.
    Alizadeh, F.: Interior point methods in Semidefinite Programming with applications to combinatorial optimization. SIAM J. on Optimization 5, 13–51 (1995)MathSciNetzbMATHCrossRefGoogle Scholar
  3. 3.
    Anari, N., Ehsani, S., Ghodsi, M., Haghpanah, N., Immorlica, N., Mahini, H., Mirrokni, V.S.: Equilibrium Pricing with Positive Externalities (Extended Abstract). In: Saberi, A. (ed.) WINE 2010. LNCS, vol. 6484, pp. 424–431. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  4. 4.
    Arthur, D., Motwani, R., Sharma, A., Xu, Y.: Pricing Strategies for Viral Marketing on Social Networks. In: Leonardi, S. (ed.) WINE 2009. LNCS, vol. 5929, pp. 101–112. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  5. 5.
    Candogan, O., Bimpikis, K., Ozdaglar, A.: Optimal Pricing in the Presence of Local Network Effects. In: Saberi, A. (ed.) WINE 2010. LNCS, vol. 6484, pp. 118–132. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  6. 6.
    Chen, W., Lu, P., Sun, X., Tang, B., Wang, Y., Zhu, Z.A.: Optimal Pricing in Social Networks with Incomplete Information. In: Chen, N., Elkind, E., Koutsoupias, E. (eds.) WINE 2011. LNCS, vol. 7090, pp. 49–60. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  7. 7.
    Domingos, P., Richardson, M.: Mining the network value of customers. In: Proc. of the 7th ACM-SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2001), pp. 57–66. ACM (2001)Google Scholar
  8. 8.
    Feige, U., Goemans, M.X.: Aproximating the value of two prover proof systems, with applications to MAX 2SAT and MAX DICUT. In: Proc. of the 3rd Israel Symposium on Theory of Computing and Systems, pp. 182–189 (1995)Google Scholar
  9. 9.
    Fotakis, D., Krysta, P., Telelis, O.: Externalities among Advertisers in Sponsored Search. In: Persiano, G. (ed.) SAGT 2011. LNCS, vol. 6982, pp. 105–116. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  10. 10.
    Garey, M.R., Johnson, D.S.: Computers and Intractability: A Guide to the Theory of NP-Completeness. W.H. Freeman (1979)Google Scholar
  11. 11.
    Goemans, M.X., Williamson, D.P.: Improved approximation algorithms for Maximum Cut and Satisfiability problems using Semidefinite Programming. J. Assoc. Comput. Mach. 42, 1115–1145 (1995)MathSciNetzbMATHCrossRefGoogle Scholar
  12. 12.
    Guruswami, V., Manokaran, R., Raghavendra, P.: Beating the random ordering is hard: Inapproximability of Maximum Acyclic Subgraph. In: Proc. of the 49th IEEE Symposium on Foundations of Computer Science (FOCS 2008), pp. 573–582 (2008)Google Scholar
  13. 13.
    Haghpanah, N., Immorlica, N., Mirrokni, V.S., Munagala, K.: Optimal auctions with positive network externalities. In: Proc. of the 12th ACM Conference on Electronic Commerce (EC 2011), pp. 11–20 (2011)Google Scholar
  14. 14.
    Hartline, J., Mirrokni, V.S., Sundararajan, M.: Optimal marketing strategies over social networks. In: Proc. of the 17th International Conference on World Wide Web (WWW 2008), pp. 189–198 (2008)Google Scholar
  15. 15.
    Kempe, D., Kleinberg, J., Tardos, É.: Maximizing the spread of influence through a social network. In: Proc. of the 9th ACM-SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2003), pp. 137–146 (2003)Google Scholar
  16. 16.
    Naor, J., Feldman, M., Schwartz, R.: A tight linear time 0.5-approximation for unconstrained submodular maximization. In: Proc. of the 53rd IEEE Symposium on Foundations of Computer Science (FOCS 2012) (to appear, 2012)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Dimitris Fotakis
    • 1
  • Paris Siminelakis
    • 1
  1. 1.School of Electrical and Computer EngineeringNational Technical University of AthensAthensGreece

Personalised recommendations