Matching Users’ Preference under Target Revenue Constraints in Data Recommendation Systems

This paper focuses on the problem of finding a particular data recommendation strategy based on the user preference and a system expected revenue. To this end, we formulate this problem as an optimization by designing the recommendation mechanism as close to the user behavior as possible with a certain revenue constraint. In fact, the optimal recommendation distribution is the one that is the closest to the utility distribution in the sense of relative entropy and satisfies expected revenue. We show that the optimal recommendation distribution follows the same form as the message importance measure (MIM) if the target revenue is reasonable, i.e., neither too small nor too large. Therefore, the optimal recommendation distribution can be regarded as the normalized MIM, where the parameter, called importance coefficient, presents the concern of the system and switches the attention of the system over data sets with different occurring probability. By adjusting the importance coefficient, our MIM based framework of data recommendation can then be applied to systems with various system requirements and data distributions. Therefore, the obtained results illustrate the physical meaning of MIM from the data recommendation perspective and validate the rationality of MIM in one aspect.

[1]  Pingyi Fan,et al.  Information Measure Similarity Theory: Message Importance Measure via Shannon Entropy , 2019, ArXiv.

[2]  Pingyi Fan,et al.  Recognizing Information Feature Variation: Message Importance Transfer Measure and Its Applications in Big Data , 2018, Entropy.

[3]  Pingyi Fan,et al.  A Switch to the Concern of User: Importance Coefficient in Utility Distribution and Message Importance Measure , 2018, 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC).

[4]  Haibin Shi,et al.  Joint Content Recommendation and Delivery in Mobile Wireless Networks with Outage Management , 2018, Entropy.

[5]  H. Yamashita,et al.  Information security in communication network of memory channel considering information importance , 2017, 2017 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM).

[6]  Qi Tian,et al.  Personalized Social Image Recommendation Method Based on User-Image-Tag Model , 2017, IEEE Transactions on Multimedia.

[7]  Pingyi Fan,et al.  Non-Parametric Message Importance Measure: Storage Code Design and Transmission Planning for Big Data , 2017, IEEE Transactions on Communications.

[8]  Gang Qu,et al.  Group Cooperation With Optimal Resource Allocation in Wireless Powered Communication Networks , 2017, IEEE Transactions on Wireless Communications.

[9]  Pingyi Fan,et al.  Focusing on a probability element: Parameter selection of message importance measure in big data , 2017, 2017 IEEE International Conference on Communications (ICC).

[10]  Pingyi Fan,et al.  Message Importance Measure and Its Application to Minority Subset Detection in Big Data , 2016, 2016 IEEE Globecom Workshops (GC Wkshps).

[11]  Jialie Shen,et al.  On Effective Location-Aware Music Recommendation , 2016, ACM Trans. Inf. Syst..

[12]  Alois Knoll,et al.  Information Maximizing Optimal Sensor Placement Robust Against Variations of Traffic Demand Based on Importance of Nodes , 2016, IEEE Transactions on Intelligent Transportation Systems.

[13]  Khaled Ben Letaief,et al.  Energy Efficiency With Proportional Rate Fairness in Multirelay OFDM Networks , 2015, IEEE Journal on Selected Areas in Communications.

[14]  Xin Geng,et al.  Leveraging Implicit Relative Labeling-Importance Information for Effective Multi-label Learning , 2015, 2015 IEEE International Conference on Data Mining.

[15]  Hai Jin,et al.  Differentially Private Online Learning for Cloud-Based Video Recommendation With Multimedia Big Data in Social Networks , 2015, IEEE Transactions on Multimedia.

[16]  Aleksandra Zięba,et al.  Counterterrorism Systems of Spain and Poland: Comparative Studies , 2015 .

[17]  Zhi Ding,et al.  Wireless communications in the era of big data , 2015, IEEE Communications Magazine.

[18]  Pingzhi Fan,et al.  Optimal Power Allocation With Delay Constraint for Signal Transmission From a Moving Train to Base Stations in High-Speed Railway Scenarios , 2015, IEEE Transactions on Vehicular Technology.

[19]  Tamer A. ElBatt,et al.  Proactive scheduling for content pre-fetching in mobile networks , 2014, 2014 IEEE International Conference on Communications (ICC).

[20]  Uwe Mönks,et al.  Machine conditioning by importance controlled information fusion , 2013, 2013 IEEE 18th Conference on Emerging Technologies & Factory Automation (ETFA).

[21]  Atilla Eryilmaz,et al.  Proactive Content Download and User Demand Shaping for Data Networks , 2013, IEEE/ACM Transactions on Networking.

[22]  Jordi Forné,et al.  Optimal Forgery and Suppression of Ratings for Privacy Enhancement in Recommendation Systems , 2013, Entropy.

[23]  Sunil Vadera,et al.  A survey of cost-sensitive decision tree induction algorithms , 2013, CSUR.

[24]  Erik Duval,et al.  Context-Aware Recommender Systems for Learning: A Survey and Future Challenges , 2012, IEEE Transactions on Learning Technologies.

[25]  Peter Harremoës,et al.  Rényi Divergence and Kullback-Leibler Divergence , 2012, IEEE Transactions on Information Theory.

[26]  Jun Du,et al.  Adapting cost-sensitive learning for reject option , 2010, CIKM.

[27]  Pingyi Fan,et al.  Delay-Constrained Optimal Link Scheduling in Wireless Sensor Networks , 2010, IEEE Transactions on Vehicular Technology.

[28]  Joon-Woo Lee,et al.  Mobile advertisement system using data push scheduling based on user preference , 2009, 2009 Wireless Telecommunications Symposium.

[29]  Einoshin Suzuki,et al.  An Information Theoretic Approach to Detection of Minority Subsets in Database , 2006, Sixth International Conference on Data Mining (ICDM'06).

[30]  V. Vapnik Estimation of Dependences Based on Empirical Data , 2006 .

[31]  Petros Nicopolitidis,et al.  An adaptive wireless push system for high-speed data broadcasting , 2005, 2005 14th IEEE Workshop on Local & Metropolitan Area Networks.

[32]  Mehdi Jazayeri,et al.  Mobile push: delivering content to mobile users , 2002, Proceedings 22nd International Conference on Distributed Computing Systems Workshops.

[33]  Charles Elkan,et al.  The Foundations of Cost-Sensitive Learning , 2001, IJCAI.

[34]  Prashant J. Shenoy,et al.  Adaptive push-pull: disseminating dynamic web data , 2001, WWW '01.

[35]  Sergio Verdú,et al.  Fifty Years of Shannon Theory , 1998, IEEE Trans. Inf. Theory.

[36]  Stanley B. Zdonik,et al.  “Data in your face”: push technology in perspective , 1998, SIGMOD '98.

[37]  J. Wolf,et al.  On Linear Unequal Error Protection Codes , 1998 .

[38]  G. Crooks On Measures of Entropy and Information , 2015 .

[39]  Gang Li,et al.  Big data related technologies, challenges and future prospects , 2015, J. Inf. Technol. Tour..

[40]  Thomas M. Cover,et al.  Elements of information theory (2. ed.) , 2006 .

[41]  Sang Joon Kim,et al.  A Mathematical Theory of Communication , 2006 .

[42]  Zhi-Hua Zhou,et al.  Ieee Transactions on Knowledge and Data Engineering 1 Training Cost-sensitive Neural Networks with Methods Addressing the Class Imbalance Problem , 2022 .

[43]  Manfred Hauswirth,et al.  Internet-scale push systems for information distribution|architecture , 1999 .

[44]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .