191
v1v2 (latest)

Safe Online Bid Optimization with Return on Investment and Budget Constraints

Knowledge Discovery and Data Mining (KDD), 2022
Main:24 Pages
10 Figures
Bibliography:2 Pages
6 Tables
Appendix:1 Pages
Abstract

In online marketing, the advertisers aim to balance achieving high volumes and high profitability. The companies' business units address this tradeoff by maximizing the volumes while guaranteeing a minimum Return On Investment (ROI) level. Such a task can be naturally modeled as a combinatorial optimization problem subject to ROI and budget constraints that can be solved online. In this picture, the learner's uncertainty over the constraints' parameters plays a crucial role since the algorithms' exploration choices might lead to their violation during the entire learning process. Such violations represent a major obstacle to adopting online techniques in real-world applications. Thus, controlling the algorithms' exploration during learning is paramount to making humans trust online learning tools. This paper studies the nature of both optimization and learning problems. In particular, we show that the learning problem is inapproximable within any factor (unless P = NP) and provide a pseudo-polynomial-time algorithm to solve its discretized version. Subsequently, we prove that no online learning algorithm can violate the (ROI or budget) constraints a sublinear number of times during the learning process while guaranteeing a sublinear regret. We provide the GCBGCB algorithm that guarantees sublinear regret at the cost of a linear number of constraint violations and GCBsafeGCB_{safe} that guarantees w.h.p. a constant upper bound on the number of constraint violations at the cost of a linear regret. Moreover, we designed GCBsafe(ψ,ϕ)GCB_{safe}(\psi,\phi), which guarantees both sublinear regret and safety w.h.p. at the cost of accepting tolerances ψ\psi and ϕ\phi in the satisfaction of the ROI and budget constraints, respectively. Finally, we provide experimental results to compare the regret and constraint violations of GCBGCB, GCBsafeGCB_{safe}, and GCBsafe(ψ,ϕ)GCB_{safe}(\psi,\phi).

View on arXiv
Comments on this paper