Efficient Delivery Policy to Minimize User Traffic Consumption in Guaranteed Advertising

11/23/2016 ∙ by Jia Zhang, et al. ∙ Institute of Computing Technology, Chinese Academy of Sciences 0

In this work, we study the guaranteed delivery model which is widely used in online display advertising. In the guaranteed delivery scenario, ad exposures (which are also called impressions in some works) to users are guaranteed by contracts signed in advance between advertisers and publishers. A crucial problem for the advertising platform is how to fully utilize the valuable user traffic to generate as much as possible revenue. Different from previous works which usually minimize the penalty of unsatisfied contracts and some other cost (e.g. representativeness), we propose the novel consumption minimization model, in which the primary objective is to minimize the user traffic consumed to satisfy all contracts. Under this model, we develop a near optimal method to deliver ads for users. The main advantage of our method lies in that it consumes nearly as least as possible user traffic to satisfy all contracts, therefore more contracts can be accepted to produce more revenue. It also enables the publishers to estimate how much user traffic is redundant or short so that they can sell or buy this part of traffic in bulk in the exchange market. Furthermore, it is robust with regard to priori knowledge of user type distribution. Finally, the simulation shows that our method outperforms the traditional state-of-the-art methods.



There are no comments yet.


page 1

page 2

page 3

page 4

This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.

1 Introduction

Online advertising is now an industry which is worth tens of billions of dollars. According to the latest report released by Interactive Advertising Bureau [IAB2016], the annual revenue of online advertising in the US reaches $59.6 billion in 2015, which is $10.1 billion (or 20.4%) higher than that in 2014. In online advertising, ad exposures (also called impressions) are sold in two major ways: either in spot through auction (real-time bidding, or RTB) or in advanced by guaranteed contracts (guarantee delivery, or GD) [Chen, Yuan, and Wang2014]. Although RTB is developing rapidly, only 13% of publishers’ revenue is generated by RTB by the year 2012 [eMarketer2012]. Large amounts of ad exposures are still sold through GD.

GD is usually adopted by top tier advertisers (Apple, P&G, Coca-Cola etc.) and publishers (Yahoo!, Amazon etc.). Generally, top tier publishers have frequently visited web pages and large amounts of first-hand user data. These resources are valuable, and undoubtedly, heavily attractive for advertisers, especially for those top tier advertisers. When promoting their products or brands, top tier advertisers usually prefer to sign a contract with publisher of high quality to ensure advertising effects. This contract contains targeted user types (what kinds of users the ads can only be displayed to) and the amount of exposures of corresponding ad to those targeted users. Publisher should comply with this contract and is paid when this contract is satisfied.

Previous works in GD domain usually focus on meeting the requirements of all contracts. Specifically, they perform study on designing delivery policy to minimize some loss functions, which are related to unsatisfied contracts and other particular requirements such as representativeness and smoothness of delivery

[Chen et al.2012, Lefebvre, Contournet, and Crivelli2012]. In this work we propose a novel optimization model, in which the primary target is to minimize the user traffic111The page views of users on the publish platform. within the constraint of satisfying all exposure requirements. Compared to previous model, this model has more practical value:

  • For most publishers, the redundant user traffic222The part of user traffic that is not targeted by any contract or corresponding contracts are already satisfied. will be sold in exchange market to avoid waste. However, compared with contract orders, selling user traffic in exchange market is usually less profitable. User traffic consumption for all contracts is minimized implies that more contracts can be accepted. Consequently, the proportion of user traffic sold to exchange market is decreased.

  • Under the consumption minimization model, the amount of required user traffic can be estimated when the delivery policy is properly designed. This estimation can be viewed as an important indicator for publishers to predict how much user traffic is redundant or short. Then, publishers can sell or purchase user traffic in bulk, which is more profitable than doing that in scattered.

  • The estimation for user traffic consumption is also useful for order management. When a particular contract comes, publisher can make decision on whether to accept it based on the change of user traffic consumption.

1.1 Contributions

In this work we propose a practical consumption minimization model for Guarantee Delivery. Under this model, we provide the theoretical analysis and design a near optimal delivery policy. Our contributions mainly consist of two parts which are listed as follows.

Theoretical analysis for optimal expected user traffic consumption.  By employing some fundamental results in stopping theory, we prove that the optimal offline expected user traffic consumption is lower bounded by an expected flow (Theorem 1). This is shown to be very useful for performance measurement of delivery policies. Besides, we construct an optimal online delivery policy based on a recursion. However, solving this recursion needs exponential time, which motivates us to design more efficient approximation delivery policy.

Efficient near optimal delivery policy.  Inspired by some insights derived from the proof of lower bound for optimal offline user traffic consumption, we design a flow based delivery policy (Algorithm 1) in the online setting. This delivery policy has several advantages:


It consumes nearly as least as possible user traffic to satisfy all exposure requirements. Let stand for the number of user types. If the total amount of all ads exposures is large enough, which is a realistic assumption in practice, the delivery policy achieves a near optimal competitive ratio (Theorem 2).


It is robust on the priori knowledge of user type distribution. As this distribution is learned from history data, it usually has a bias compared to the real one. It is a concern that whether this bias will influence the delivery efficiency significantly. For this issue, we provide a robustness result indicating that when the bias between the learned user type distribution and the ground truth is bounded, the loss on delivery efficiency is also bounded (Theorem 3).


Besides ad delivery, our policy can estimate user traffic consumption as well (Theorem 2). As aforementioned, this estimation is very useful for order and traffic management.


Our delivery policy is also flexible. It can be easily implemented to reach some other requirements, such as representativeness and smoothness of delivery (Remark 1.).

According to simulation experiments, our delivery policy works well under different settings and outperforms other delivery policies including the well known HWM policy [Chen et al.2012].

1.2 Related Works

Online advertising is a hot topic concerned by researchers in both economic and computer science communities. We discuss the line of works that are most related to our paper.

The GD problem has been well studied as a special version of online assignment in theoretical domain. The classical online assignment problem studies adversary (or worst case) setting, such as [Karp, Vazirani, and Vazirani1990, Mehta et al.2007]. Some generalizations take distribution information into account. In the work [Feldman et al.2009], the authors study the online matching problem when types of users are drawn independently from a known distribution, which is similar to our setting. However, their target is to maximize the matching size when there are users in total. They propose an algorithm with competitive ratio 0.6702. This result is improved by works such as [Bahmani and Kapralov2010, Jaillet and Lu2013]. Correspondingly, authors in the work [Karande, Mehta, and Tripathi2011] study the online matching problem when the distribution of user types is unknown. In the work [Vee, Vassilvitskii, and Shanmugasundaram2010], the authors propose the online allocation problem with forecast and suppose there is a sample set of vertices that will come online. They provide a general framework to optimize several object functions which satisfy some constraints. According to [Chen et al.2012], this framework is sensitive to the accuracy of the forecast and requires solving a non-linear convex problem. We refer to the survey [Mehta2012] for a systemic view.

Some more practical works have also been done in this field. In the work [Chen et al.2012], the authors propose a delivery policy which is called High Water Mark (or HWM). It is efficient, space saving and stateless so that can run in parallel on distributed machines. However, it is not designed to optimize the user traffic consumption. Numerical results in the experimental part of our work show that HWM is not good enough when considering user traffic consumption. In the work [Lefebvre, Contournet, and Crivelli2012]

, the authors design a policy called SHALE, which can be treated as an improvement of HWM. Actually, SHALE achieves a better performance on delivery with a loss on efficiency. However, SHALE is a heuristic algorithm, and usually needs specific number of iterations, which is sensitive to input, to get good enough results. A common problem for HWM and SHALE is that expected user traffic consumption is hard to estimated. Both HWM and SHALE take representativeness into consideration, which means ads in one campaign should be delivered somehow

fairly to users among all targeted user types, instead of only partial types. Besides, user reach (the number of different individuals who see the ad) and delivery frequency (the number of times a user should see the ad) are also concerned by some works [Turner et al.2014, Shen, Li, and Chen2014].

In this work, we assume the user type distribution is known in advance and the types of users are sampled from this distribution, while in other works, such as [Cetintas, Chen, and Si2013, Cetintas et al.2011], authors study how to estimate user traffic in a particular period. Another line of works concern the pricing mechanism and revenue maximization in GD [Bharadwaj et al.2010, Radovanovic and Heavlin2012]. In the work [Bharadwaj et al.2010], two algorithms are provided to calculate the price of each guaranteed contract based on the price of each targeted user.

As RTB is adopted by more and more publishers, some works study how to combine RTB and GD to make more profit. In the work [Ghosh et al.2009], publishers are considered to act as bidders for guaranteed contracts. In works [Araman and Popescu2010, Balseiro et al.2011, Chen, Yuan, and Wang2014], a similar framework is considered that publishers can dynamically select which ad campaign contract to accept. In the work [Chen, Yuan, and Wang2014], it is shown that RTB and GD can be seamlessly combined programmatically and the authors provide some results about what percentages of user traffic should be sold in GD and what the price is.

2 Consumption Minimization Model

In guaranteed delivery (GD) scenario, users are categorized into a set of atomic types according to their traits, e.g., geographic, gender, age etc. Atomic means each user visiting the publish platform can only belong to a unique type. Each advertiser has one or more ad campaigns and each campaign corresponds to a contract with publisher. The contract specifies how many times the corresponding ad should be exposed and the set of targeted user types. See Figure 1 as an example. The first ad campaign reserves 200 thousand exposures and all users at the age of 20 to 25 are targets of this campaign. Thus when a user who satisfies this requirement visits the platform, corresponding ad can be displayed to this user.

Figure 1: An example of ads campaigns in GD.

Formally speaking, the ad campaigns and user types relationship can be modeled as a demand-supply graph with and . The nodes in stand for ad campaigns, while nodes in stand for atomic user types. For each ad campaign and user type , the edge means that is targeted by . Conventionally, for any , we use to stand for the neighbors of in . stands for total amount of exposures that reserves in the contract. We denote for convenience, and let . Under the GD setting, we can safely assume .

We assume the users come one by one online. Once a user visits the publish platform, her type is revealed and the publisher should irrevocably deliver only one ad333Our model and policy can be easy extended to meet multiple delivery requirement. See supplemental material for detail.. Usually, there are large amounts of users’ visiting logs available on the publish platform, thus, we assume that each user type is drawn from a distribution which can be learned from those log data. That’s to say, for any unseen user, she belongs to type

with probability

, which satisfies . We define (resp. ) as the minimum (resp. maximum) arrival probability. is considered as a part of the input. Thus, the input instance is a triple .

Our objective is to design an ads delivery policy to minimize the expectation of user traffic consumed. Here the user traffic consumed

means the number of users’ visits when all contracts are fulfilled. It is a random variable due to the uncertainty of user traffic and the delivery policy. This is the

consumption minimization problem for user traffic (abbreviated as CMPUT). For a delivery policy , we employ the concept of competitive ratio to measure its performance. We say has a competitive ratio if and only if for any input instance, , where is the expected user traffic consumed by policy and is the expectation of optimal user traffic consumption when the publisher is allowed to modify previous delivery decisions. We also call optimal offline expected user traffic consumption.

We provide several important definitions for further analysis. Given an input instance and a non-negative number , we can construct an expected network by adding two nodes (source) and (sink) into and set the capacities as follows. For , we connect with and set the capacity of the edge as . For , we connect with and set the capacity of the edge as . For those edges in , we just set their capacities as . Let stand for the maximum flow that can pass through . is defined as the minimum value of that satisfies .

3 Theoretical Analysis

In this section we first prove a lower bound of the optimal offline expected user traffic consumption, and then construct an optimal online policy based on a recursion which needs exponential time to solve. To beat this hardness we develop an efficient and near optimal flow based policy.

3.1 Lower Bound for Optimal Offline User Traffic Consumption

The main tool we employ to develop our lower bound is Wald’s identity [Wald1944]. Wald’s identity is a foot stone in optimal stopping theory. Here we use a variant introduced in work [Blackwell1946], and it can be described as follow.

Wald’s Identity. Let be i.i.d. random variables with , and let be a stopping rule which is independent with and satisfies , then there has

To use Wald’s Identity, we need an upper bound of . Consider a simple delivery policy called Random, in which each ad campaign is expanded as ads. These ads target the same types of users and each of them needs to be exposed only once. When a user that belongs to comes, Random uniformly chooses one ad from all valid ones waiting for exposure. For each , denote , we have the following result.

Proposition 1.

In Random, each expanded ad will be delivered with probability when the first user comes. This probability will increase with more and more ads are delivered. If we fix the probability just as , the GD problem is reduced to the non-uniform coupon collection problem, and according to the work [Flajolet, Gardy, and Thimonier1992], the expected user traffic consumption can be calculated by an integral as shown in this proposition. Clearly, this integral will converge to a value, which is an upper bound of . ∎

According to above proposition, .

Denote as the number of users belong to type when all contracts are fulfilled and let stand for the set . We can use Wald’s Identity to show the following proposition.

Proposition 2.

for any .


This is a direct application of Wald’s Identity. Fix any , define

We can find that is a sequence of i.i.d. random variables and . In addition, the stopping time of the policy, i.e. is independent of and . Thus

Theorem 1.

For any input instance, .


According to the definition of and the property of maximum flow, there exists a subset such that where is the set of user types targeted by ad campaigns in . Otherwise, can be decreased to a smaller value which still satisfies It is a contradiction to the definition of .

On the other hand, the delivery procedure can stop only if the ad corresponding to campaign has been delivered times, thus is always no less than .

According to Proposition 2, we have for any , thus

which implies . ∎

3.2 Optimal Online Delivery Policy

Suppose the first user comes with type . If no ad campaign targets , nothing will be delivered to this user; otherwise, the delivery policy should decide which ad in will be delivered. It is easy to argue that if is not empty, delivering nothing can not be better than delivering any arbitrary ad to the user. Suppose is delivered, then the problem is reduced to a sub problem in which ad should be delivered times. For convenience, we construct an input , where Based on above analysis, in the optimal online delivery policy , must be chosen to satisfy that , where stands for expected user traffic consumed by on input instance . According to the properties of conditional expectation, we have . Thus, can be constructed from bottom to top by dynamic programming (DP). However, it is easy to check that there are sub problems in this DP. Thus, exponential time is needed to construct in this way. In fact, we believed that is hard to construct in any way. This motivates us to design some delivery policies with polynomial running time.

3.3 Delivery Policy Design for CMPUT

According to previous analysis, is highly related to . It somehow reminds us to use expected flow to guide ads delivery. Inspired by this insight, we design a flow based delivery policy.

3.3.1 Flow Based Delivery Policy

As shown in Algorithm 1, the flow based delivery policy can be divided into two parts: the offline part and the online part. In the offline part, we first construct an expected network with integer capacities on all edges, that’s used in Algorithm 1. The difference between and lies in that the capacity of edge is set to be for in the latter. Then we find the minimum value of while ensuring the max flow on is no less than . To find such a value of , we extend the idea of binary search, that’s to say, we enumerate a value , and calculate , then adjust the value of with a similar idea of binary search. According to the properties of maximum flow, the traffic on each edge in maximum flow is a non-negative integer when the capacities of all edges are integers. This is why we use instead of . In the online part, when a user comes, we deliver a proper ad according to the maximum flow of .

Note that we haven’t specified how to deliver an ad according to the maximum flow of in the line 1. Actually, Flow-Based-Delivery-Rule stands for a class of delivery rules which satisfy that when there are no less than users of type come to the publish platform, either all ads of are delivered or no less than ads of are delivered to users of type . We can implement a Flow-Based-Delivery-Rule according to particular requirements, such as representativeness and smoothness of delivery. Here we give a simple implementation in Algorithm 2.

Next, we will prove that the performance of Algorithm 1 is quite good by showing that it is close to the lower bound provided in Theorem 1 when for

. The main tool we employ is the Chernoff Bound, which is an important tool in probability theory. Besides the Chernoff Bound, the full proof of

Theorem 2 mainly depends on delicate analysis of expectation. We leave this proof in supplemental material due to space limitation.

1 Input: .
2 Offline part:
3 Set
4 repeat
5       Set
6       Construct an expected network .
7until ;
8Set , .
9 repeat
10       Set .
11       if  then
12             Set .
14      else
15             Set .
18until ;
19Set .
20 for each  do
21       Set as the traffic passing through in the maximum flow of .
22Online part:
23 for each user comes to the publish platform do
24       if then  exit.
25       Suppose is the type of this user.
26      REM Set Flow-Based-Delivery-Rule.
27      IF  if  then
28            Taking this user for other purpose.
29      Deliver an ad of to current user.
30       Set and .
Algorithm 1 Expected Flow Based Delivery Policy
1 Greedy-Delivery-Rule
2 Set .
3 if we can’t find such an  then
4       return .
5Set .
return .
Algorithm 2 Greedy-Delivery-Rule
Theorem 2.

Given , when , the expected user traffic consumption of Algorithm 1 is at most , which implies that it achieves a competitive ratio .

Remark 1. It should be pointed out that the flow based delivery policy can be generalized to solve the representativeness, smoothness and multiple delivery issues. The details can be found in the supplemental material.

Remark 2. The flow based delivery policy provides a threshold that how many users of each type are needed to satisfy all contracts, thus user traffic beyond this threshold can be safely utilized for other purpose, such as sell it in an exchange market. It is shown in Line 1 of Algorithm 1.

3.3.2 Robustness

In our model, we assume the user type distribution is accurate. However, there usually has a bias between estimated distribution and the real one. The following analysis provides a robustness guarantee for flow based delivery policy.

Given a delivery policy , denote as the expected user traffic consumption when the distribution input to is while the real distribution is . We also define as the estimated probability for in . Now we have the following theorem for the flow based delivery policy. The full proof is moved to supplemental material for space limitation.

Theorem 3.

Denote the flow based delivery policy as , for any , if for each user type , we have

4 Experiments

In this section, we perform some simulations of the flow based delivery policy and several other policies on different random graphs. All experiment arguments are selected to approximate the real world system. The results show the superiority of the flow based delivery policy.

4.1 Experimental Setup

Hardware  A desktop with an Intel i5-4570 CPU @ 3.2GHZ and a 4GB DDR3 memory.

Settings  Restricted by the business model of GD, the size of demand-supply graph in real system is usually not large. Thus we conduct experiments on a random demand and supply graph with ad campaigns and user types. Edges are generated uniformly and randomly while the average degree of user types are fixed. To generate the user types distribution , we choose a random value for each , and set . is chosen in two ways: is drawn uniformly from (we call this method Random-Normalization) or equals to , where (we call this method Gauss-Perturbation).

Delivery Policies  We compare the flow based delivery policy (FB) with other four delivery policies, including Random, HWM, and two intuitive greedy policies: Probability-Greedy (PG) and Degree-Greedy (DG).

Policies DG and PG are based on a straightforward idea that ad campaigns that are difficult to be fulfilled should have a higher priority. Specifically, when a user comes, the ad with minimum degree on demand-supply graph is chosen in DG, while in PG, it calculates a delivery value for each ad campaign , and delivers an ad with minimum delivery value. Recall that . For these policies, we compare their competitive ratios and the robustness on different random graphs and different user visiting sequences. On each generated random graph, we simultaneously run five policies with 100 sampled user sequences. The competitive ratio for each policy is estimated as dividing the average user traffic consumed on these sampled sequences by the average optimal user traffic needed.

4.2 Experiments under Different Average Degrees

The first experiment is conducted under different average degrees of user types. With a specific average degree, there are 100 input instances generated independently and randomly. Half of them use Random-Normalization to generate , the others use Normalization-Perturbation. is drawn uniformly from . In the second experiment we will show that the amount of exposures has little influence on performance, thus a small value for is enough.

Experiment results for average degrees and are shown in Figure 2. The height of the bar stands for the average competitive ratios on 50 input instances with corresponding setting while the vertical lines indicate the fluctuation ranges of those competitive ratios. According to this figure, the flow based delivery policy has a much better competitive ratio under all average degrees. These fluctuation ranges of competitive ratios also show that the flow based delivery policy is more robust on different graphs.

Surprisingly, DG is the second best policy. When the average degree is , its average competitive ratio is very close to that of the flow based delivery policy with a gap about for Random-Normalization and for Gauss-Perturbation. However, these gaps will be enlarged as the average degree increases to 10, 15 and 20. From Figure 2 we can also find the fact that the performances of all delivery policies will be improved continuously with average degree increasing. In fact, when the average degree is large enough, all polices are near optimal444Considering an extreme case that when the demand-supply graph is complete, any reasonable delivery policy will be optimal.. However, for the purpose of accurately targeting, the demand-supply graph is usually very sparse in real world.

In Figure 3, we show more detail experiment results of five delivery polices on 50 input instances with Random-Normalization and average degree 10. Figure 2(a) shows the results of competitive ratios. The horizontal axis stands for 50 input instances. As we can see, the flow based delivery policy achieves a much better competitive ratio on each input instance and it works more steadily. The worst case performance among all sampled user visiting sequences on 50 input instances is shown in Figure 2(b). Clearly, the flow based delivery policy is more robust on the worst sampled sequence too.

4.3 Experiments under Different Exposure

In this part, we compare five polices under different exposure settings. The number of exposures for each ad campaign is uniformly drawn from 100 to 2500, 5000, 10000 and 20000. We only consider average degrees of and . Similarly, 100 graphs are drawn independently, and for 50 of them, we construct distributions by Random-Normalization and for the rest, Gauss-Perturbation is used. Then input instances are constructed with different exposure settings.

(a) Random-Normalization
(b) Gauss-Perturbation
Figure 2: Comparison under different average degree with Random-Normalization and Gauss-Perturbation. The height of the bar is the average of competitive ratios on 50 input instances and the vertical lines indicate the fluctuation ranges.
(a) Competitive ratios
(b) Performance on the worst user visiting sequence
Figure 3: Results for 50 input instances with average degree 10 and Random-Normalization. The horizontal axis stands for those input instances.
(a) degree
(b) degree
Figure 4: Comparison under different exposures with Random-Perturbation.

Figure 4 shows the results for Random-Normalization. The flow based delivery policy outperforms other polices under all exposure settings. We point out that the amount of exposures seems to have little influence on the performance for each delivery policy. It is somehow means the user traffic consumption of each studied policy has a linear relationship with the total amount of exposures for a fixed demand-supply graph. Besides, comparing Figure 3(a) and 3(b) and combining previous experiments, we can find that the structure of demand-supply is much more crucial for the GD problem. Similar results are obtained for Gauss-Perturbation. These results can be found in supplemental material.

5 Conclusions and Future Works

In this work, we study the consumption minimization problem for user traffic (CMPUT), which lies in the heart of GD scenario. We provide a lower bound for the optimal offline user traffic consumption by using an expected flow, which is shown to be useful for performance evaluation. We then propose a flow based delivery policy. This delivery policy consumes nearly as least as possible user traffic to satisfy all contracts under a realistic constraint. What’s more important, it is robust with regard to estimation error of user type distribution and shown to be very useful for order and traffic management.

Our flow based delivery policy can be extended to solve other issues in GD, such as representativeness and smoothness of delivery. Nevertheless, there are some works remained to be done. For example, there may be a time window for each advertiser which indicates the ad campaign’s starting time and deadline. Another interesting problem is how to design delivery policy when advertisers also come online instead of being revealed in advance.


  • [Araman and Popescu2010] Araman, V. F., and Popescu, I. 2010. Media revenue management with audience uncertainty: Balancing upfront and spot market sales. Manufacturing & Service Operations Management 12(2):190–212.
  • [Bahmani and Kapralov2010] Bahmani, B., and Kapralov, M. 2010. Improved bounds for online stochastic matching. In 18th Annual European Symposium Algorithms, 170–181.
  • [Balseiro et al.2011] Balseiro, S.; Feldman, J.; Mirrokni, V.; and Muthukrishnan, S. 2011. Yield optimization of display advertising with ad exchange. In Proceedings of the 12th ACM conference on Electronic commerce, 27–28.
  • [Bharadwaj et al.2010] Bharadwaj, V.; Ma, W.; Schwarz, M.; Shanmugasundaram, J.; Vee, E.; Xie, J.; and Yang, J. 2010. Pricing guaranteed contracts in online display advertising. In Proceedings of the 19th ACM international conference on Information and knowledge management, 399–408.
  • [Blackwell1946] Blackwell, D. 1946. On an equation of wald. Annals of Mathematical Statistics 17(1):84–87.
  • [Cetintas et al.2011] Cetintas, S.; Chen, D.; Si, L.; Shen, B.; and Datbayev, Z. 2011. Forecasting counts of user visits for online display advertising with probabilistic latent class models. In Proceedings of the 34th International ACM Conference on Research and Development in Information Retrieval, 1217–1218.
  • [Cetintas, Chen, and Si2013] Cetintas, S.; Chen, D.; and Si, L. 2013. Forecasting user visits for online display advertising. Information Retrieval 16(3):369–390.
  • [Chen et al.2012] Chen, P.; Ma, W.; Mandalapu, S.; Nagarjan, C.; Shanmugasundaram, J.; Vassilvitskii, S.; Vee, E.; Yu, M.; and Zien, J. 2012. Ad serving using a compact allocation plan. In Proceedings of the 13th ACM Conference on Electronic Commerce, 319–336.
  • [Chen, Yuan, and Wang2014] Chen, B.; Yuan, S.; and Wang, J. 2014. A dynamic pricing model for unifying programmatic guarantee and real-time bidding in display advertising. In Proceedings of the 8th International Workshop on Data Mining for Online Advertising, 1:1–1:9.
  • [eMarketer2012] eMarketer. 2012. Real-time bidding poised to make up quarter of all display spending. http://goo.gl/04Ykx. Accessed: 2016-05-02.
  • [Feldman et al.2009] Feldman, J.; Mehta, A.; Mirrokni, V.; and Muthukrishnan, S. 2009. Online stochastic matching: Beating 1-1/e. In Proceedings of the 50th Annual IEEE Symposium on Foundations of Computer Science, 117–126.
  • [Flajolet, Gardy, and Thimonier1992] Flajolet, P.; Gardy, D.; and Thimonier, L. 1992. Birthday paradox, coupon collectors, caching algorithms and self-organizing search. Discrete Applied Mathematics 39(3):207–229.
  • [Ghosh et al.2009] Ghosh, A.; McAfee, P.; Papineni, K.; and Vassilvitskii, S. 2009. Bidding for representative allocations for display advertising. In Internet and Network Economics, volume 5929. 208–219.
  • [IAB2016] IAB. 2016. 2015 internet advertising revenue full-year report.
  • [Jaillet and Lu2013] Jaillet, P., and Lu, X. 2013. Online stochastic matching: New algorithms with better bounds. Mathematics of Operations Research.
  • [Karande, Mehta, and Tripathi2011] Karande, C.; Mehta, A.; and Tripathi, P. 2011. Online bipartite matching with unknown distributions. In

    Proceedings of the 43rd annual ACM symposium on Theory of computing

    , 587–596.
  • [Karp, Vazirani, and Vazirani1990] Karp, R. M.; Vazirani, U. V.; and Vazirani, V. V. 1990. An optimal algorithm for on-line bipartite matching. In Proceedings of the 22nd Annual ACM Symposium on Theory of Computing, 352–358.
  • [Lefebvre, Contournet, and Crivelli2012] Lefebvre, F.; Contournet, P.; and Crivelli, A. J. 2012. Shale: An efficient algorithm for allocation of guaranteed display advertising. In the 18th ACM international conference on Knowledge discovery and data mining, 1195–1203.
  • [Mehta et al.2007] Mehta, A.; Saberi, A.; Vazirani, U.; and Vazirani, V. 2007. Adwords and generalized online matching. Journal of the ACM 54(5):264–273.
  • [Mehta2012] Mehta, A. 2012. Online matching and ad allocation. Foundations & Trends® in Theoretical Computer Science 8(4).
  • [Radovanovic and Heavlin2012] Radovanovic, A., and Heavlin, W. D. 2012. Risk-aware revenue maximization in display advertising. In Proceedings of the 21st international conference on World Wide Web, 91–100.
  • [Shen, Li, and Chen2014] Shen, H.; Li, Y.; and Chen, Y. 2014. Robust ad delivery plan for guaranteed display advertising. In IEEE International Conference on Information and Automation, 1125–1130.
  • [Turner et al.2014] Turner, J.; Hojjat, A.; Cetintas, S.; and Yang, J. 2014. Delivering guaranteed display ads under reach and frequency requirements. In

    Proceedings of the 28th AAAI Conference on Artificial Intelligence

  • [Vee, Vassilvitskii, and Shanmugasundaram2010] Vee, E.; Vassilvitskii, S.; and Shanmugasundaram, J. 2010. Optimal online assignment with forecasts. In Proceedings of the 11th ACM conference on Electronic commerce, 109–118.
  • [Wald1944] Wald, A. 1944. On cumulative sums of random variables. The Annals of Mathematical Statistics 15(3):283–296.

Appendix A Omitted Proofs

Theorem 2. Given , when , the expected user traffic consumption of Algorithm 1 is at most , which implies that it achieves a competitive ratio .


According to Theorem 1, we have . By the definitions of and , it is clear that

Thus, , as takes the minimum value that satisfies after the execution of Online part.

Let stand for the user traffic consumption of Algorithm 1. Now we establish a relationship between and . We first bound the probability that is greater than for a positive number . The range of will be determined later. Suppose there are users come to the platform, and denote as the number of users belong to type among them. is a random variable in fact. According to the property of Flow-Based-Delivery-Rule, if , for any , either no less than ads of is delivered to users belong to or all ads are delivered. Thus, if is held for all , all ads are ensured to be delivered by our policy, as .

Now we bound the probability that for . As ,

as . Let . If , we have

according to Chernoff Bound. Define . Clearly, . We have


for a proper constant number .


be the cumulative distribution function of

. The Equation (1) implies


Next, we bound the expectation of based on the above estimation. Since

is a discrete random variable, in order to simplify our proof, we define a

continuous random variable which satisfies and

where is the cumulative distribution function of . It should be emphasized that can be taken as a function of because is a function of . This will be useful for further analysis. Let , we have


Note that for any integer that satisfies , we have according to their definitions, thus

The second line of above inequality is obtained by replacing with . Above inequality implies that . Applying this equation into Equation (3), we have

Using integration by parts and some tricks about inequality, we can show that when , . The procedure is regular and tedious, thus we omit it in this work.

So far, we have for any . Combine the fact that and , we have . Recall that to employ the Chernoff Bound, we need . As , is satisfied by setting to be any number greater than . Thus setting , we have

Theorem 3. Denote the flow based delivery policy as , for any , if for each user type , we have

Before the proof of this theorem, we first provide several useful definitions and an important fact.

Given a user visiting sequence with length , we construct a new user visiting sequence by inserting some users into arbitrarily. Here arbitrarily means the number, positions and types of those inserted users are decided at will. Suppose the length of is (), we say is a -expansion of . With these definitions, we have the following fact for the flow based delivery policy.

Fact 1.

Given a user visiting sequence with length and its -expansion , if all contracts are satisfied by the flow based delivery policy after the -th user visiting on , they will also be satisfied after the -th user visiting on .

This fact is clear, as the flow based delivery policy employs the edge capacities to guide the delivery.

Now we show the Theorem 3.


We first show that


To show this inequality, we construct a new user type distribution by adding a dummy user type and call those users belong to type as dummy users. In this distribution,

Note that for .

Consider a user visiting sequence sampled from distribution . Suppose all contracts are satisfied by policy when -th user comes. As we can see, there may be some dummy users among those first users. Intuitively, if we change those dummy users to other types randomly to make up the bias between and for , the number of users consumed will be no more than according to Fact 1. More formally, for any dummy user in , we change her type to with probability for . Clearly, the obtained user visiting sequence can be viewed as satisfying the distribution . Based on Fact 1, the user traffic consumed on the obtained sequence is no more than . Thus, we have .

On the other hand, we have

where is the number of users of type consumed. In next step, we aim to show


That’s the expected non-dummy user traffic used under and are same.

As is in proportion to for , the edge capacity calculated based on distribution is the same with calculated based on . Given a user visiting sequence sampled according to distribution . Suppose the length of is and all contracts are satisfied exactly when -th user in comes. We drop out all dummy users in , and obtain a user sequence which is a valid sequence with regard to distribution . We say is a dropped sequence of . As the online part of our flow based delivery policy only employs edge capacities to perform deliver, all ad contracts must be satisfied by exactly when the last one in comes.

Note that there are same numbers of non-dummy users in and . That’s to say, for any user sequence sampled based on distribution , there is a dropped sequence sampled from , and the non-dummy user traffic consumed are same. For , denote as the set of all the sequences sampled from and theirs dropped sequences are . It is clear that , as the latter can be viewed as inserting dummy users arbitrarily into the former. Thus the Equation (5) is held.

According to Wald’s Identity, we have

thus we can conclude that . Combining above analysis we get the inequality (4).

Denote as the expected flow with user type distribution . Similarly we can define . As , we can get based on the definition of expected flow. According to Theorem 2, given , we have

It is easy to get that


Combining Equation (4) and (6), we can finish this proof. ∎

Appendix B Extensions of the Flow Based Delivery Policy

Representativeness.  Representativeness requires that the exposures to users of an ads should be diverse. More specifically, when all contracts are satisfied, should be close to where is the total user used belonging to type , is the number of ad displayed to users with type and is the total number of users used with types in .

The flow based delivery policy can be easily modified to achieve representativeness approximately. In the Offline part, we can just set the edge capacity as and needn’t calculate the . We also modify the Algorithm 2 by changing the condition in line 1 to be

we can’t find such an or .

With this modified Greedy-Delivery-Rule, when all contracts are satisfied, we have


Suppose that when all contracts are satisfied, there are users visiting the publisher platform. Based on the Chernoff Bound, we can prove that for a constant and , with high probability. Consequently, for any , ,

with high probability. Combining with Equation (7), we can achieve an approximation for representativeness.

Smoothness of Delivery.  Smoothness of delivery requires that the unexposed amount of each ad decreases steadily with time. As mentioned in work [Chen et al.2012], the perfect smoothness is usually impossible to achieve due to the intersection of different advertisers. We try to make the delivery procedure smooth while keeping the user traffic consumption unchanged. To achieve this objective, we employ a new delivery rule, that is the Smooth-Delivery-Rule shown in Algorithm 3. As we can see, when a user visiting the publish platform, the Smooth-Delivery-Rule choose an unsatisfied ad to minimize the ratio . As the type of users are drawn from the distribution , the smoothness is ensured to some extent.

1 Init: , set
2 Smooth-Delivery-Rule
3 Set .
4 if we can’t find such an  then
5       return .
6Set .
return .
Algorithm 3 Smooth-Delivery-Rule

Multiple Delivery.  To generate more profit, the publishers usually display multiple ads in a single web page. Now we suppose ads can be displayed when a user comes. Our flow based delivery policy can be easy extended to cover this setting. In Algorithm 1, we construct an expected flow instead of . There are two changes in : capacity of edge is set to and that of edge is set to . The first change ensures that all contracts can be satisfied with constraint that one ad can’t be displayed more than once for single user visiting. Through the second change, we somehow copy the user times when she visits the platform. We also modify the Algorithm 2 and let it return ads whose residual capacity values are the top minimum when a user of type