Online Collaborative-Filtering on Graphs

Existing approaches to designing recommendation systems with user feedback focus on settings where the number of items is small and/or admit some underlying structure. It is unclear, however, if these approaches extend to applications like social network news feeds and content-curation platforms, which have large and unstructured content pools and constraints on user-item recommendations. To this end, we consider the design of recommendation systems in content-rich setting—where the number of items and the number of item-views by users are of a similar order and an access graph constrains which user is allowed to see which item. In this setting, we propose recommendation algorithms that effectively exploit the access graph, and characterize how their performance depends on the graph topology. Our results demonstrate the importance of serendipity in exploration and how recommendation improves when the access graph has higher expansion; they also suggest reasons behind the success of simple algorithms like ...

[1]  László Lovász,et al.  Semi-matchings for bipartite graphs and load balancing , 2006, J. Algorithms.

[2]  Robert D. Kleinberg,et al.  Regret bounds for sleeping experts and bandits , 2010, Machine Learning.

[3]  Aranyak Mehta,et al.  AdWords and Generalized On-line Matching , 2005, FOCS.

[4]  Andrea Montanari,et al.  Matrix Completion from Noisy Entries , 2009, J. Mach. Learn. Res..

[5]  Devavrat Shah,et al.  Inferring rankings under constrained sensing , 2008, NIPS.

[6]  H. Robbins,et al.  Asymptotically efficient adaptive allocation rules , 1985 .

[7]  Gábor Lugosi,et al.  Minimax Policies for Combinatorial Prediction Games , 2011, COLT.

[8]  Jure Leskovec,et al.  Patterns of temporal variation in online media , 2011, WSDM '11.

[9]  Ronald L. Graham,et al.  Bounds for certain multiprocessing anomalies , 1966 .

[10]  Bernardo A. Huberman,et al.  Predicting the popularity of online content , 2008, Commun. ACM.

[11]  Peter Auer,et al.  Finite-time Analysis of the Multiarmed Bandit Problem , 2002, Machine Learning.

[12]  Devavrat Shah,et al.  Inferring Rankings Using Constrained Sensing , 2009, IEEE Transactions on Information Theory.

[13]  C. Greg Plaxton,et al.  Competitive Weighted Matching in Transversal Matroids , 2008, Algorithmica.

[14]  Sébastien Bubeck,et al.  Regret Analysis of Stochastic and Nonstochastic Multi-armed Bandit Problems , 2012, Found. Trends Mach. Learn..

[15]  J. Gittins Bandit processes and dynamic allocation indices , 1979 .

[16]  John N. Tsitsiklis,et al.  Linearly Parameterized Bandits , 2008, Math. Oper. Res..

[17]  Danupon Nanongkai,et al.  Faster Algorithms for Semi-Matching Problems , 2010, TALG.

[18]  Nicole Immorlica,et al.  Online auctions and generalized secretary problems , 2008, SECO.

[19]  Rajeev Motwani,et al.  Randomized Algorithms , 1995, SIGA.

[20]  John Langford,et al.  Efficient Optimal Learning for Contextual Bandits , 2011, UAI.