text
stringlengths
2.85k
2.55M
label
class label
11 classes
arXiv:1705.03884v1 [math.GR] 10 May 2017 COPRODUCTS OF FINITE GROUPS CHRIS HALL Abstract. We show that for any pair of non-trivial finite groups, their coproduct in the category of finite groups is not representable. Given a category C and a pair of objects X1 , X2 ∈ C, the coproduct ` X1 X2 is representable in C iff ∃X ∈ C, ∃(ιX1 , ιX2 ) ∈ HomC (X1 , X) × HomC (X2 , X) such that ∀Y ∈ C, ∀(f1 , f2 ) ∈ HomC (X1 , Y ) × HomC (X2 , Y ), ∃!f ∈ HomC (X, Y ) making the diagram X1 ❆ ⑤⑤ ⑤⑤ ⑤ ~⑤ ⑤ ∃!f X `❇❴ ❴ ❴ ❴ ❇❇ ❇❇ ❇ ιX2 ❇❇ ιX 1 X2 ❆❆ f ❆❆ 1 ❆❆ ❆ ❴ ❴ ❴/ Y ⑥> ⑥⑥ ⑥ ⑥⑥ ⑥⑥ f2 commute. Let G, H be finite ` groups. If we regard them as members of the category of all groups, then G H is representable: it is the free product G ∗ H, and G → G ∗ H and H → G ∗ H are the canonical inclusions. The purpose of this note is to prove the following theorem: ` Theorem 1. If G, H are non-trivial groups, then the coproduct G H in the category of finite groups is not representable. The key will be the following proposition: Proposition 2. Let G, H be non-trivial groups, and let g ∈ G r {1} and h ∈ H r {1}. For every m ≥ 1, then there exist a finite group Tm and a homomorphism qm : G ∗ H → Tm such that |h qm (gh) i| > m. Before proving the proposition we show how it implies Theorem 1. Proof of Theorem 1. Let F be a finite group and ιG : G → F and ιH : H → F We gratefully acknowledge Bob Guralnick for helpful discussions on this topic. 1 2 CHRIS HALL be homomorphisms. Let g ∈ G r {1} and h ∈ H r {1}, let m be the order of ιG (g)ιH (h), and let qm : G ∗ H → Tm be a homomorphism such that |h qm (gh) i| > m as in Proposition 2. Let fG : G → Tm and fH : H → Tm be the respective compositions of G → G ∗ H and H → G ∗ H with qm so that G ⑥ ●●●● ⑥⑥ ●● ⑥ ●● ⑥⑥ fG ● ⑥  ~ ⑥ qm # o F ❆` Tm G; ∗ H O ✇ ❆❆ ✇✇ ❆❆ ✇ ✇ f ❆ ιH ❆❆H ✇✇ ✇✇ ιG H commutes. Observe that { f ∈ Hom(F, Tm ) : fG = ιG f and fH = ιH f } is empty since fG (g)fH (h) has order exceeding m while (f ιG (g))(f ιH (h)) = f (ιG (g)ιH (h)) has order m. Therefore one cannot ` find a morphism F → Tm to complete the above diagram, and hence G H is not representable in the category of finite groups.  The proof of the proposition will occupy the remainder of this note. Proof of Proposition 2. To start we recall a special case of a result of Marciniak: Theorem 3. If there exists a faithful representation G×H → GLn (Q), then there exists a faithful representation G ∗ H → GLn (K) where K = Q(t). Proof. See [1].  Recall that a group is residually finite iff every non-identity element is contained in the complement of a finite-index normal subgroup. Corollary 4. G ∗ H is residually finite. Proof. Let Q[G] and Q[H] be the respective group algebras of G and H, and let n = |G| + |H|. If V = Q[G] ⊕ Q[H], then V ≃ Qn and there exists a canonical faithful representation G × H → GLn (Q). Let ρ : G ∗ H → GLn (K) COPRODUCTS OF FINITE GROUPS 3 be the corresponding representation given by Theorem 3. It is faithful and the image is finitely generated, so the corollary is a consequence of the fact that any finitely generated subgroup of GLn (C) is residually finite. Rather than appeal to this general fact though, we prove directly that G ∗ H is residually finite. Let w ∈ G ∗ H be a non-identity element. We must show that there is a finite-index normal subgroup of G ∗ H whose complement contains w. The set ρ(G ∪ H) is finite and contained in GL(K), so the least common multiple of the denominators of all the entries of the matrices in ρ(G ∪ H) is a non-zero polynomial D ∈ Q[t]. Moreover, the greatest common divisor of the numerators of all the entries of ρ(w) − In is a non-zero polynomial N ∈ Q[t]. Let Z ⊂ Q be the finite set of zeros of D · N in Q and U := Q r Z. Let S be the polynomial ring Q[t][1/DN ] and (1) GLn (S) → GLn (K) be the homomorphism induced by the inclusion S → K. Observe that the elements of ρ(G ∪ H) all have finite order and generate ρ(G ∗ H). Therefore the elements of det(ρ(G ∪ H)) are roots of unity and generate det(ρ(G ∗ H)), so the latter is contained in S × . In particular, ρ factors through (1). For each s ∈ U , let Fs be the quotient field S/(t − s)S and ρs be the composition G ∗ H → GLn (S) → GLn (Fs ) where the last homomorphism is induced by the quotient S → Fs . Observe that Fs is (canonically) isomorphic to Q, so we can regard ρs as a homomorphism ρs : G ∗ H → GLn (Q). Observe also that the least common multiple of the denominators of the entries of all matrices in ρs (G ∪ H) is a positive integer Ds ∈ N, and that det(ρs (G ∗ H)) ⊆ Z[1/Ds ]× . Therefore the image of ρs is contained in the image of the natural homomorphism GLn (Z[1/Ds ]) → GLn (Q), and hence there is a homomorphism ρs,p : G ∗ H → GLn (Z/p) for each p ∤ Ds . By construction, ρs,p (w) 6= In and the kernel of ρs,p has finite index in G ∗ H. In particular, the complement of the latter is a finite-index subgroup containing w, so G ∗ H is residually finite as claimed.  Observe that gh has infinite order in G ∗ H. Therefore, for each m ≥ 1, the element wm := (gh)m! is not the identity, hence Corollary 4 implies that there exists a finite-index normal subgroup Km ⊆ G ∗ H whose complement contains wm . 4 CHRIS HALL To complete the proof of the proposition, we let Tm := (G ∗ H)/Km and qm : G ∗ H → Tm be the canonical quotient. By definition, qm (wm! ) = qm (wm ) 6= 1, hence qm (w) has order exceeding m as claimed.  References 1. Zbigniew S. Marciniak, A note on free products of linear groups, Proc. Amer. Math. Soc. 94 (1985), no. 1, 46–48. MR 781053
4math.GR
Preprint, Proceedings of the Second International Conference on Quantum, Nano, and Micro Technologies (ICQNM 2008), IEEE Computer Society, pp. 66-71, 2008. A Survey of Quantum Programming Languages: History, Methods, and Tools Donald A. Sofge, Member, IEEE Abstract— Quantum computer programming is emerging as a new subject domain from multidisciplinary research in quantum computing, computer science, mathematics (especially quantum logic, lambda calculi, and linear logic), and engineering attempts to build the first non-trivial quantum computer. This paper briefly surveys the history, methods, and proposed tools for programming quantum computers circa late 2007. It is intended to provide an extensive but non-exhaustive look at work leading up to the current state-of-the-art in quantum computer programming. Further, it is an attempt to analyze the needed programming tools for quantum programmers, to use this analysis to predict the direction in which the field is moving, and to make recommendations for further development of quantum programming language tools. Index Terms— quantum computing, functional programming, imperative programming, linear logic, lambda calculus I. INTRODUCTION T HE importance of quantum computing has increased significantly in recent years due to the realization that we are rapidly approaching fundamental limits in shrinking the size of silicon-based integrated circuits (a trend over the past several decades successfully described by Moore’s Law). This means that as we attempt to make integrated circuit components ever smaller (e.g. below 25nm in feature sizes), we will increasingly encounter quantum mechanical effects that interfere with the classical operation of the circuits. Quantum computing offers a path forward that specifically takes advantage of quantum mechanical properties, such as superposition and entanglement, to achieve computational solutions to certain problems in less time (fewer computational cycles) than is possible using classical computing paradigms. Certain problems have been shown to be solvable exponentially faster on a quantum computer than has been achieved on a classical computer [1]. Furthermore, quantum parallelism allows certain functions that have thus far proven to be computationally intractable using classical computation to be executed in reasonable time (e.g. factoring large numbers using Shor’s algorithm). Quantum algorithms may contain both classical and quantum components (as does Shor’s algorithm), and can thus leverage the benefits of each. Manuscript received September 12, 2007. This work was supported by the Naval Research Laboratory under NRL Work Order N0001406WX30002. Donald A. Sofge is with the Navy Center for Applied Research in Artificial Intelligence, Naval Research Laboratory, Washington D.C. (phone: 202-404-4944; fax: 202-767-2166; e-mail: [email protected]). However, existing classical (non-quantum) programming languages lack both the data structures and the operators necessary to easily represent and manipulate quantum data. Quantum computing possesses certain characteristics that distinguish it from classical computing such as the superposition of quantum bits, entanglement, destructive measurement, and the no-cloning theorem. These differences must be thoroughly understood and even exploited in the context of quantum programming if we are to truly realize the potential of quantum computing. We need native quantum computer programming languages that embrace the fundamental aspects of quantum computing, rather than forcing us to adapt and use classical programming languages and techniques as ill-fitting stand-ins to develop quantum computer algorithms and simulations. Ultimately, a successful quantum programming language will facilitate easier coding of new quantum algorithms to perform useful tasks, allow or provide a capability for simulation of quantum algorithms, and facilitate the execution of quantum program code on quantum computer hardware. II. ORIGINS AND HISTORY OF QUANTUM COMPUTING Prior surveys of quantum computing and quantum programming [2], [3] trace the origins of quantum computing and quantum programming to Feynman’s 1982 proposal for constructing a quantum computer as a means of simulating other quantum systems, noting that a quantum computer may efficiently simulate a quantum system, whereas a classical computer simulation of a quantum system would require exponential resources both in memory space and computational time [4]. Preskill credits Paul Benioff [5] with making this proposal concomitantly with Feynman. However, the roots of quantum programming go far deeper than this, through the field of quantum information theory, in the work of Birkhoff and von Neumann on quantum logic in 1936 [6]. This work also formed the basis for quantum mechanics as it is currently practiced today. Deutsch [7] investigated the computational power of quantum computers and proposed a quantum version of the Turing machine. He proposed one of the earliest quantum algorithms as a means of demonstrating the solution of a problem that would be difficult to solve using a classical computer yet would be quite easy to solve using a quantum algorithm. Preprint, Proceedings of the Second International Conference on Quantum, Nano, and Micro Technologies (ICQNM 2008), IEEE Computer Society, pp. 66-71, 2008. The difficulty of solving certain problems using computers is often characterized by analogy with hypothetical Turing machine based solutions [8]. Alan Turing showed that the capability of any general purpose computer could be simulated with a Turing machine. By studying the time (# computational cycles) and space (memory requirement) complexity of problems, we can classify problems according to their Turing complexity (e.g. deterministic polynomial (P), non-deterministic polynomial (NP), exponential (EXP)). The Deutsch-Jozsa algorithm [1] was designed in 1992 to maximally illustrate the computational advantage of quantum computing over classical computing. The algorithm determines a property of a binary input string (either constant or balanced) in a single step, whereas determining this property on a classical computer grows exponentially in computational complexity with the length of the bit string. Unfortunately, this result has not yet resulted in the creation of any particularly useful quantum algorithms for typical data processing needs. Since that time, substantial effort has been made to characterize the complexity of problems using quantum Turing machine models versus classical Turing machine models. While there is still some question regarding certain complexity equivalence classes (e.g. does BQP=NP?), there is widespread agreement amongst researchers in this area that quantum computing has not yet been proved to generally move problems from one complexity class under classical computing to a lower complexity class under quantum computing [9]. However, this does not mean that nontrivial quantum computers once built will not allow substantial computational gains for solving certain problems over currently known techniques using classical computers. An important thread in quantum computing research is to define problem classes and applications that result in significant speed-ups using quantum instead of classical computers. The invention of linear logic by Girard in 1987 [10] has also played a significant role in the formulation of recent quantum programming languages, specifically those based upon lambda calculus (described in section III.b). Linear logic differs from classical logic in that assumptions (states, or inputs) and hypotheses are considered resources that may be consumed. It provides a means for resource control. Linear logic differs from usual logics such as classical or intuitionistic logic where the governing judgement is of truth, which may be freely used as many times as necessary. For example, suppose A represents water, B represents cold (or a freezing process), and C represents ice. Then A  B  C. But after the process is applied, resource A is consumed and is no longer available. Research in using linear logic is still quite active, and linear logic is important element to many current quantum programming language development efforts. The first practical steps toward formulating a quantum programming language were made by Knill in 1996 in his proposal for conventions for a quantum pseudocode [11], and his description of the quantum random access machine (QRAM) model of a quantum computer. The QRAM model is built upon the (probably accurate) assumption that any practical quantum computer will in fact be a classical machine with access to quantum computing components, such as qubit registers. QRAM defines a set of specific operations to be performed on computer hardware including preparation of quantum states (from classical states), certain unitary operations, and measurement. Knill’s quantum pseudocode provides a syntax for describing qubits, qubit registers, and operations involving both classical and quantum information. While extremely useful, Knill’s proposal falls short of possessing all of the needed characteristics of a real quantum programming language due to its informal structure, lack of strong typing, and representation of only some of the quantum mechanical properties needed. A variety of tools have been created for simulating quantum circuits and modest quantum algorithms on classical computers using well-known languages such as C, C++, Java, and rapid prototyping languages such as Maple, Mathematica, and Matlab. A good on-line reference for these simulators is http://www.quantiki.org/wiki/index.php/List_of_QC_simulators While simulators may provide an excellent means for quickly learning some of the basics concepts of quantum computing, they are not substitutes for actual quantum programming languages since they are designed to run only on classical computer architectures, and will not realize any of the computational advantages of quantum computing. III. A TAXONOMY OF QUANTUM PROGRAMMING LANGUAGES Quantum programming languages may be taxonomically divided into (A) imperative quantum programming languages, (B) functional quantum programming languages, and (C) others (may include mathematical formalisms not intended for computer execution). In addition, Glendinning [12] maintains an online catalog of quantum programming languages, simulation systems, and other tools. Finally, a slightly more dated but at the time quite comprehensive and still useful survey of quantum computer simulators was provided by Julia Wallace in 1999 [13]. Early quantum programming language development efforts focused on exploring the Quantum Turing Machine (QTM) model as proposed by Deutsch [7]. While interesting and informative from the standpoint of understanding computational complexity of problem classes with respect to quantum computing, it did not result in practical tools for programming quantum computers. The quantum circuit model quickly became the driving force in quantum programming. The Deutsch-Jozsa algorithm, Quantum Fourier Transform, Shor’s factoring algorithm, and Grover’s algorithm were all described using the quantum circuit model [8]. In order to build this into a language (instead of just designing circuits), Knill [11] proposed a quantum programming pseudocode that, along with adapted imperative programming languages such as C and C++, resulted in the first imperative quantum programming languages (e.g., QCL). These languages built upon the QRAM model of quantum computation, assumed classical flow control with both classical and quantum data, and allowed interleaved measurements and quantum operations. Preprint, Proceedings of the Second International Conference on Quantum, Nano, and Micro Technologies (ICQNM 2008), IEEE Computer Society, pp. 66-71, 2008. The use of imperative quantum programming languages gave way to a multitude of functional quantum programming languages such as QFC, QPL, and QML (described below), mostly based upon the QRAM model, but also increasingly utilizing the work in mathematical logic to define better operational semantics for quantum computing, and also including the tool of linear logic discussed previously. communication. Mlnarik provides full formalized syntax for the language, operational semantics, proves type soundness (eliminating type errors) for the non-communicating part of the language, and can be used for proving correctness of implemented quantum algorithms. The author also provides a publicly accessible simulator for LanQ at http://lanq.sorceforge.net/ A. Imperative Programming Languages Imperative programming languages, also known as procedural languages, are fundamentally built upon the use of statements to change the global state of a program or system of variables. Common classical imperative languages include FORTRAN, Pascal, C, and Java. These may be contrasted with functional (or declarative) languages such as Lisp, APL, Haskell, J, and Scheme, in which computation is based upon the execution of mathematical functions. Imperative quantum programming languages today are largely descendents of Knill’s proposed quantum pseudocode and the QRAM model of quantum computing. Arguably the first “real” quantum programming language [2] was QCL, developed and refined from 1998-2003 by Bernhard Ömer [14]-[18]. QCL (Quantum Computation Language) utilizes a syntax derived from C, and also provides a full quantum simulator for code development and testing on a classical computing platform. In support of the classical+quantum model of computation as envisioned with the QRAM virtual hardware model, QCL also provides a full classical programming sublanguage. High-level quantum programming features include automatic memory management, user defined operators and functions, and computation of the inverse of a user defined operator. QCL may be downloaded from the web at http://tph.tuwien.ac.at/~oemer/qcl.html Betelli et al. [19] devised an imperative language based upon C++. The language was created in the form of a C++ library, and thus can be compiled. It is also maintained as a downloadable source code through http://sra.itc.it/people/ serafini/qlang/ Important features of this language include construction and optimization of quantum operators at run-time, classes for basic quantum operations like QHadamard, QFourier, QNot, QSwap, and Qop. The language also supports user definition and construction of new operators. Another important feature offered by this language is simulation of the noise parameters in the simulator. This language is occasionally called Q Language by the authors, but another perhaps more prominent functional language exists with the same name, (for which the Q stands for eQuation), thus use of this name should probably be avoided in at least one of the two contexts. Another imperative quantum programming language, called qGCL (quantum Guarded Command Language), was proposed by Sanders & Zuliani [20] as a derivative of Dijkstra’s guarded command language, intended more for algorithm derivation and verification rather than programming. Most recently (October 2007) Mlnarik [21] introduced the imperative quantum programming language LanQ which uses C-like syntax and supports both classical and quantum process operations, including process creation and interprocess B. Functional Quantum Programming Languages Functional (or declarative) programming languages do not rely upon the update of a global system state, but instead perform mathematical transformations by executing mappings from inputs to outputs. Most recent developments in quantum programming have focused on the use of functional rather than imperative languages. The languages in this category are based upon the concept of a lambda calculus. Lambda calculi are constructions from mathematical logic used to investigate the properties of functions, such as computability, recursion, and stopping. Lambda calculi may be considered the smallest universal programming languages. They consist of a single transformation rule (variable substitution) and a single function definition scheme. They are universal in the sense that any computable function can be expressed and evaluated using this formalism. It is thus equivalent to the Turing machine formalism. However, lambda calculi emphasize the use of transformation rules, and do not care about the actual machine implementing them. Lambda calculi were first proposed by Alonzo Church and Stephen Cole Kleene in the 1930s, and used by Church in 1936 [22], [23] to address the decision problem (entscheidungs-problem) challenge proposed by David Hilbert. Lambda calculi can be used to define what a computable function is. The question of whether two lambda calculus expressions are equivalent cannot be solved by a general algorithm. This was the first question, even before the halting problem, for which undecidability could be proved. Since their invention, lambda calculi have greatly influenced classical functional programming languages such as Lisp, ML and Haskell. In 1996 Maymin [24] proposed a quantum lambda calculus to investigate the Turing computability of quantum algorithms. While Maymin’s lambda calculus was found to efficiently solve NP-complete problems, it was unfortunately found to be more expressive than any physically realizable quantum computer [25]. In 2004 van Tonder [26] defined a quantum lambda calculus for pure quantum computation (no measurements take place), analyzed the non-duplicability of quantum states through use of linear logic, and argued that the language has the same equivalent computational capabilities as a quantum Turing machine. Quantum algorithms are implemented in a quantum simulator built upon the Scheme programming language. Also in 2004 Selinger [27] proposed a functional quantum programming language called QFC (Quantum Flow Charts) which represents programs via functional flow charts, and an equivalent form which utilizes textual syntax called QPL (Quantum Programming Language). These languages rely Preprint, Proceedings of the Second International Conference on Quantum, Nano, and Micro Technologies (ICQNM 2008), IEEE Computer Society, pp. 66-71, 2008. upon the notion of using classical control and quantum data, and build upon a lambda calculus model to handle both classical and quantum data within the same formalism. These languages may be compiled using the QRAM virtual quantum computer model. However, they still lack many desirable aspects including higher-order features and side-effects. In 2004 Danos [28] studied a one-way (non-reversible) model of quantum computation that included notation for entanglement, measurement, and local corrections. In 2005 Perdrix [29] defined a type system that reflects entanglement of quantum states. This too was based upon a lambda calculus. Altenkirch and Grattage [30], [31] developed a functional quantum programming language called QML in which control as well as data may be quantum. QML is based upon a linear logic [10] (described previously in Section II), but focuses on the elimination of weakening (discarding a quantum state) instead of contraction (duplication of quantum state). Several researchers have proposed domain-specific functional quantum programming languages implemented in Haskell, following in the style of Selinger’s QPL, using linear logic and lambda calculi, and building upon the 2001 work of Mu and Bird [32] in which quantum programming is modeled in Haskell through definition of a data type for quantum registers. Sabry [33] extended this model to include representation of entangled states. Other related efforts in this vein include the work of Vizzotta and da Rocha Costa [34], Karczmarczuk [35], and Skibinski [36]. C. Other Quantum Programming Language Paradigms A substantially different approach to quantum programming was offered by Freedman, Kitaev, and Wong [37] based upon the simulation of topological quantum field theories (TQFT’s) by quantum computers. TQFT’s provide a more robust model of quantum computation by representing quantum states as physical systems resistant to perturbations. Quantum operations are determined by global topological properties, such as paths that particles follow. This radically different approach to quantum computing may provide new insights and lead to the creation of new types of quantum algorithms. However, as currently formulated it only deals with evolution of state and does not include a measurement process. A number of efforts have been made in recent years to define languages to support quantum cryptographic protocols, and specifically focus on the inclusion of communication between quantum processes. Such processes may be local or nonlocal, thus giving rise to distributed quantum programming specifications. A prime example of this is Mauerer’s [38] specification of the cQPL language, based upon Selinger’s QPL, but with extensions added to support communication between distributed processes. Another thread of development has focused on the use of quantum process algebras, such as QPAlg (quantum process algebra) by Jorrand and Lalire [39] to describe interactions between classical and quantum processes. Gay and Nagarajan [40] define the language CQP (communicating quantum processes) for modeling systems combining classical and quantum communication, with particular emphasis on applications such as quantum cryptography. CQP is designed specifically to provide complete protocol analysis, prove type soundness, and lead to methods for formal verification of systems modeled in the language. Both QPAlg and CQP influenced the design of the imperative programming language LanQ described previously. Adão and Mateus [41] give a process calculus for security protocols built upon the QRAM computational model with an added cost model. Udrescu et al. [42] describe a hardware description language for designing quantum circuits similar to those used for VLSI design. The use of Girard’s linear logic and lambda calculus has spurred a considerable amount of recent work in the formulation of mathematical formalisms for quantum computing that include such semantic features as entanglement, communication, teleportation, partial and mixed quantum states, and destructive measurement. While exciting and worthwhile, these formalisms generally fall short of actually specifying specific programming languages with full syntax, well defined operators, and simulators and compilers needed to implement Shor’s or Grover’s algorithms or to create and test new quantum algorithms. These efforts do help to address shortcomings in quantum theory itself as discussed in the next section. IV. CHALLENGES IN QUANTUM PROGRAMMING LANGUAGE DEVELOPMENT The difficulties in formulating useful, effective, and in some sense universally capable quantum programming languages arise from several root causes. First, quantum mechanics itself (and by extension quantum information theory) is incomplete. Specifically missing is a theory of measurement. Quantum theory is quite successful in describing the evolution of quantum states, and even in predicting probabilistic outcomes after measurements have been made, but the process of state collapse is (with a few exceptional cases) not covered. So issues such as decoherence, diffusion, entanglement between particles (or entangled state, of whatever physical instantiation), and communication (including teleportation) are not well defined from a quantum information (and by extension quantum computation) perspective. Work with semantic formalisms and linear logic attempt to redress this by providing a firmer basis in a more complete logic consistent with quantum mechanics. These logic-based formalisms (once validated) may then be combined with language syntax and other programming language features to more accurately and completely reflect the potential capabilities of quantum computing. A second key source of difficulty is the lack of quantum computing hardware for running quantum algorithms. Given no specific set of quantum operations (e.g. specific quantum gates, ways that qubits are placed in superposition or entangled), then no guidance is available to computer scientists designing quantum programming languages as to what data structures should be implemented, what types of operations to allow, what features to disallow (such as abiding Preprint, Proceedings of the Second International Conference on Quantum, Nano, and Micro Technologies (ICQNM 2008), IEEE Computer Society, pp. 66-71, 2008. by the no-cloning theorem), and how to best design the language to do what quantum computing does best (e.g., is an imperative language like C or Java a better place to start, or a functional language like LISP or APL?). A third source of difficulty is the paucity of practical applications for quantum computing. Shor’s algorithm generated tremendous excitement over the potential of quantum computing in large part because most educated individuals could immediately recognize the value of the contribution, at least in the context of code breaking. Grover’s algorithm also provides a speedup over classical computation for a specific class of problems (searching unsorted lists), from O(N) to O(N1/2), which is still quite impressive, especially for large N. Shor’s algorithm is capable of achieving its impressive speedup by exploiting the structure of the problem in the quantum domain, recasting the factoring problem as a period-finding problem which may then be solved in parallel. Grover’s algorithm is arguably more general, and variants of Grover’s algorithm have been proposed for a variety of problems [43], [44]. Finally, there is much on-going research to understand the quantum physics behind quantum information, and by extension quantum computing. We have previously discussed several quantum computing conceptual models including QRAM, the quantum Turing machine, and the quantum circuit model. However, recent work by in the area of adiabatic quantum computing by Dorit Aharonov [45] and weak measurements by Jeff Tollaksen [46] and Yakir Aharonov [47] arguably falls under none of these categories, yet these methods represent potentially exciting new directions for realizing quantum computing. But this wealth of models also serves to further complicate the process of establishing a set of practical tools for writing quantum programs, namely quantum programming languages. However, the question of what sorts of quantum programs will be written and what applications they will address is still open, and the answer to this question will serve as a major driving factor in shaping the quantum programming languages to come. This is supported analogically by comparison with the numerous application domains for classical computing and the even larger number of classical programming languages created to develop products from them in the form of application programs. Perhaps the greatest potential for useful computational gains of quantum computing over classical computing may be found with the class of problems known hidden subgroup problems [48], [49]. The factoring problem that Shor’s algorithm addresses, as reformulated by Shor, falls within this class. One strategy, then, would be to try to understand which problems may be mapped into the hidden subgroup problem class, and then investigate those problems for development of quantum algorithms to address them. Finally, the realization of quantum computing hardware will significantly drive the design of quantum language operators and data structures for quantum programs to be run on that hardware. We can already make some guesses about early hardware (e.g. superposition of a small number of locally contiguous qubits, preparation of states using Hadamard gates, rapid decoherence of quantum states). But if qubits are represented by photons, such guesses may very well be wrong. When considering the need for quantum algorithms, and asking what kinds of quantum algorithms are needed, it is useful to think of a (classical) programmer as possessing a toolbox filled with a rich diversity of tools (algorithms) from which he/she can construct solutions (new programs) to client problems. From this basis we can proceed cautiously to design small but interesting quantum algorithms, gradually expanding the universe of basic quantum functions and capabilities to put into our quantum programming toolbox. V. A PATH FORWARD FOR QUANTUM PROGRAMMING LANGUAGE DEVELOPMENT Julia Wallace [13] in her quite thorough survey of quantum simulators notes that most of the simulators and even some of the languages developed could only really implement one algorithm, usually Shor’s (some could do Grover’s as well, and some could do more). Selinger [2] comments “each new algorithm seems to rely on a unique set of ‘tricks’ to achieve its goal”. The hope, of course, is that one can take a set of known quantum algorithms, such as Shor’s, Grover’s, Deutsch-Jozsa, and a few others, and from this set to grow a methodology for quantum programming, or at least generate a few new useful quantum algorithms. Unfortunately, this set of examples is too small and specialized to grow a methodology for quantum programming, and generating useful new quantum algorithms has proven quite difficult. The work in operational semantics, lambda calculi, and linear logic (described above) and the inclusion of a complete programming grammar and syntax will undoubtedly yield multiple powerful languages for developing quantum algorithms. These languages will probably be of the functional class, but they may take other forms as well. REFERENCES [1] D. Deutsch and R. Jozsa, “Rapid solutions of problems by quantum computation,” in Proceedings of the Royal Society of London, Series A, vol. 439, pp. 553-558, 1992. [2] P. Selinger, “A brief survey of quantum programming languages,” in Proceedings of the 7th International Symposium on Functional and Logic Programming, volume 2998 of Lecture Notes in Computer Science, Springer, 2004. [3] S. Gay, “Quantum Programming Languages: Survey and Bibliography,” in Mathematical Structures in Computer Science, 16(4), Cambridge University Press, 2006. [4] R. Feynman, “Simulating physics with computers,” in International Journal of Theoretical Physics 21(6–7), pp. 467–488, 1982. [5] J. Preskill, “Lecture notes for physics 219: Quantum information and computation,” 1998. Available from http://www.theory.caltech.edu /people/preskill/ph219 [6] G. Birkhoff and J. von Neumann, “The Logic of Quantum Mechanics,” Annals of Mathematics, Vol. 37, pp. 823-843, 1936. [7] D. Deutsch, “Quantum theory, the Church-Turing principle and the universal quantum computer,” in Proceedings of the Royal Society of London A 400, pp. 97–117, 1985. Preprint, Proceedings of the Second International Conference on Quantum, Nano, and Micro Technologies (ICQNM 2008), IEEE Computer Society, pp. 66-71, 2008. [8] M. Nielsen and I. Chuang, Quantum Computation and Quantum Information, Cambridge University Press, 2000. [9] A. Kitaev, A. Shen, and M. Vyalyi, Classical and Quantum Computation, Number 47 in Graduate Series in Mathematics, AMS, Providence, RI, 2002. [10] J. Girard, “Linear logic,” Theoretical Computer Science, 50:1-102, Elsevier Science Publishers Ltd., 1987. [11] E. Knill, “Conventions for quantum pseudocode,” Technical Report LAUR-96-2724, Los Alamos National Laboratory, 1996. [12] I. Glendinning, “Quantum programming languages and tools,” http:// www.vcpc.univie.ac.at/ian/hotlist/qc/programming.shtml [13] J. Wallace, “Quantum Computer Simulation - A Review; ver. 2.1,” University of Exeter Technical Report, 1999. See also the web site http://www.dcs.ex.ac.uk/~jwallace/simtable.html, 2002. [14] B. Ömer, “A Procedural Formalism for Quantum Computing,” Master’s Thesis, Department of Theoretical Physics, Tech. Univ. of Vienna, 1998. [15] B. Ömer, “Quantum Programming in QCL,” Master’s Thesis, Institute of Information Systems, Technical University of Vienna, 2000. [16] B. Ömer, “Procedural quantum programming,” in Proceedings of the AIP Conference on Computing Anticipatory Systems, American Institute of Physics, 2001. [17] B. Ömer, “Classical concepts in quantum programming,” arXiv:quantph/0211100, 2002. [30] T. Altenkirch and J. Grattage, “A functional quantum programming language,” in Proceedings of the 20th Annual IEEE Symposium on Logic in Computer Science, IEEE Computer Society, 2005. [31] T. Altenkirch and J. Grattage, “QML: Quantum data and control,” manuscript, 2005. [32] S. Mu and R. Bird, “Functional quantum programming,” in Proceedings of the 2nd Asian Workshop on Programming Languages and Systems, Korea Advanced Institute of Science and Technology, 2001. [33] A. Sabry, “Modelling quantum computing in Haskell,” in Proceedings of the ACM SIGPLAN Workshop on Haskell, ACM Press, 2003. [34] J. Vizzotto and A. da Rocha Costa, “Concurrent quantum programming in Haskell,” in VII Congresso Brasileiro de Redes Neurais, Sessão de Computação Quântica, 2005. [35] J. Karczmarczuk, “Structure and interpretation of quantum mechanics — a functional framework,” in Proceedings of the ACM SIGPLAN Workshop on Haskell, ACM Press, 2003. [36] J. Skibinski, “Haskell simulator of quantum computer,” 2001. Available from http://web.archive.org/web/20010520121707/ www.numeric-quest.com/haskell. [37] M. Freedman, A. Kitaev, and Z. Wong, “Simulation of topological field theories by quantum computers,” arXiv:quant-ph/0001071/v3, 2000. [38] W. Mauerer, “Semantics and Simulation of Communication in Quantum Computing,” Master’s Thesis, University Erlangen-Nuremberg, 2005. [18] B. Ömer, “Structured Quantum Programming,” Ph.D. thesis, Technical University of Vienna, 2003. [39] P. Jorrand and M. Lalire, "From Quantum Physics to Programming Languages: A Process Algebraic Approach," Unconventional Programming Paradigms, LNCS Series, Vol. 3566, Springer, 2005. [19] S. Bettelli, T. Calarco, and L. Serafini, “Toward an architecture for quantum programming,” in The European Physical Journal D 25, pp. 181–200, EDP Sciences/Springer, 2003. [40] S. Gay and R. Nagarajan, "Communicating quantum processes," in Proceedings of the 32nd ACM Annual Symposium on Principles of Programming Languages, pp. 145-157, ACM Press, 2005. [20] J. Sanders P. and Zuliani, “Quantum programming,” in Mathematics of Program Construction, volume 1837, LNCS, Springer, 2000. [41] P. Adão and P. Mateus, “A process algebra for reasoning about quantum security,” in Proceedings of the 3rd International Workshop on Quantum Programming Languages, Electronic Notes in Theoretical Computer Science, Elsevier Science, 2005. [21] H. Mlnarik, “Operational Semantics and Type Soundness of Quantum Programming Language LanQ,” arXiv:quant-ph/0708.0890v1, 2007. [22] A. Church, “An unsolvable problem of elementary number theory,” in American Journal of Mathematics, 58, pp. 345–363, 1936. [23] A. Church, “A note on the Entscheidungsproblem,” in Journal of Symbolic Logic, 1, pp. 40–41, 1936. [24] P. Maymin, “Extending the lambda calculus to express randomized and quantumized algorithms,” arXiv:quant-ph/9612052, 1996. [42] M. Udrescu, L. Prodan, and M. Vlâdutiu, “Using HDLs for describing quantum circuits: a framework for efficient quantum algorithm simulation,” in Proceedings of the 1st ACM Conference on Computing Frontiers, ACM Press, 2004. [43] M. Lanzagorta, R. Gomez, and J. Uhlmann, “Quantum Rendering,” in Proceedings of SPIE Vol. 5105, Quantum Information and Computation, E. Donkor, A. Pirich, H. Brandt (Eds.), SPIE Press, 2003. [25] P. Maymin, “The lambda-q calculus can efficiently simulate quantum computers,” arXiv:quant-ph/9702057, 1997. [44] M. Lanzagorta and J. Uhlmann, “Quantum Computational Geometry,” In Proceedings of SPIE Vol. 5436, Quantum Information and Computation II, E. Donkor, A. Pirich, H. Brandt (Eds.), SPIE, 2004. [26] A. van Tonder, “A lambda calculus for quantum computation, in SIAM Journal on Computing 33(5), pp. 1109–1135, 2004. Also arXiv:quantph/0307150. [45] D. Aharonov, W. van Dam, J. Kempe, Z. Landau, S. Lloyd, and O. Regev, "Adiabatic Quantum Computation is Equivalent to Standard Quantum Computation," arXiv:quant-ph/0405098, 2006. [27] P. Selinger, “Towards a quantum programming language,” in Mathematical Structures in Computer Science 14(4), pp. 527–586, Cambridge University Press, 2004. [46] J. Tollaksen and D. Ghoshal, “NP Problems, Post-selection and Weak Measurements,” in Proceedings SPIE, Defense and Security Conference, Florida, SPIE Press, 2006. [28] V. Danos, E. Kashefi, and P. Panangaden, “Parsimonious and robust realizations of unitary maps in the one-way model,” in Physical Review A 72(064301), The American Physical Society, 2005. Also arXiv:quantph/0411071. [47] Y. Aharonov and D. Rohrlich, Quantum paradoxes: quantum theory for the perplexed, Wiley-VCH, 2005. [29] S. Perdrix, “Quantum patterns and types for entanglement and separability,” in Proceedings of the 3rd International Workshop on Quantum Programming Languages, Electronic Notes in Theoretical Computer Science, Elsevier Science, 2005. [48] A. Kitaev, "Quantum measurements and the Abelian Stabilizer Problem," quant-ph/9511026, 1995. [49] S. Lomonaco (Jr.) and L. H. Kauffman, “Quantum Hidden Subgroup Algorithms: A Mathematical Perspective,” AMS CONM/305, pp. 139202, 2002. Also arXiv:quant-ph/0201095.
6cs.PL
Puzzle Imaging: Using Large-scale Dimensionality Reduction Algorithms for Localization Joshua I. Glaser1* , Bradley M. Zamft2 , George M. Church2 , and Konrad P. Kording1,3,4 arXiv:1502.07816v3 [q-bio.NC] 21 Jun 2015 1 Department of Physical Medicine and Rehabilitation, Northwestern University and Rehabilitation Institute of Chicago, Chicago, Illinois, USA 2 Department of Genetics, Harvard Medical School, Boston, Massachusetts, USA 3 Department of Physiology, Northwestern University, Chicago, Illinois, USA 4 Department of Applied Mathematics, Northwestern University, Chicago, Illinois, USA * Direct correspondence to [email protected] Abstract Current high-resolution imaging techniques require an intact sample that preserves spatial relationships. We here present a novel approach, “puzzle imaging,” that allows imaging a spatially scrambled sample. This technique takes many spatially disordered samples, and then pieces them back together using local properties embedded within the sample. We show that puzzle imaging can efficiently produce high-resolution images using dimensionality reduction algorithms. We demonstrate the theoretical capabilities of puzzle imaging in three biological scenarios, showing that (1) relatively precise 3-dimensional brain imaging is possible; (2) the physical structure of a neural network can often be recovered based only on the neural connectivity matrix; and (3) a chemical map could be reproduced using bacteria with chemosensitive DNA and conjugative transfer. The ability to reconstruct scrambled images promises to enable imaging based on DNA sequencing of homogenized tissue samples. Contents 1 Introduction 2 2 Results 2.1 Neural Voxel Puzzling . . . . . . 2.1.1 Overview . . . . . . . . . 2.1.2 Dimensionality Reduction 2.1.3 Performance . . . . . . . 2.2 Neural Connectomics Puzzling . 2.2.1 Overview . . . . . . . . . 2.2.2 Dimensionality Reduction 2.2.3 Performance . . . . . . . 2.3 Chemical Puzzling . . . . . . . . 2.3.1 Overview . . . . . . . . . 2.3.2 Dimensionality Reduction 2.3.3 Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 4 4 5 6 9 9 9 10 11 11 13 14 3 Discussion 3.1 Potential Uses of Puzzle Imaging 3.2 Simulation Limitations . . . . . . 3.3 Algorithms . . . . . . . . . . . . 3.4 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 17 17 17 18 1 4 Methods 4.1 Sparse Diffusion Maps Algorithm . . . . . . . . . . . . . . . . 4.2 Unweighted Landmark Isomap Algorithm . . . . . . . . . . . 4.3 Neural Voxel Puzzling . . . . . . . . . . . . . . . . . . . . . . 4.3.1 Similarity Matrix . . . . . . . . . . . . . . . . . . . . . 4.3.2 Simulations . . . . . . . . . . . . . . . . . . . . . . . . 4.4 Neural Connectomics Puzzling . . . . . . . . . . . . . . . . . 4.4.1 Similarity Matrix . . . . . . . . . . . . . . . . . . . . . 4.4.2 Simulations . . . . . . . . . . . . . . . . . . . . . . . . 4.5 Chemical Puzzling . . . . . . . . . . . . . . . . . . . . . . . . 4.5.1 Similarity Matrix . . . . . . . . . . . . . . . . . . . . . 4.5.2 Simulations . . . . . . . . . . . . . . . . . . . . . . . . 4.6 Computational Complexity . . . . . . . . . . . . . . . . . . . 4.6.1 Sparse Diffusion Maps . . . . . . . . . . . . . . . . . . 4.6.2 Unweighted Landmark Isomap . . . . . . . . . . . . . 4.6.3 Neural Voxel Puzzling . . . . . . . . . . . . . . . . . . 4.6.4 Neural Connectomics Puzzling . . . . . . . . . . . . . 4.6.5 Chemical Puzzling . . . . . . . . . . . . . . . . . . . . 4.7 Algorithm Comparison: ULI vs SDM . . . . . . . . . . . . . . 4.7.1 Domain . . . . . . . . . . . . . . . . . . . . . . . . . . 4.7.2 Reconstruction Accuracy . . . . . . . . . . . . . . . . 4.7.3 Speed . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.8 Algorithm Time Improvements . . . . . . . . . . . . . . . . . 4.8.1 Sparse Diffusion Maps vs. Diffusion Maps . . . . . . . 4.8.2 Unweighted Landmark Isomap vs. Landmark Isomap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Acknowledgements 6 Supplementary Information 6.1 Chemical Puzzling Conjugation Efficiency 6.2 Reconstruction of Non-cubes . . . . . . . 6.3 Simulation Limitations . . . . . . . . . . . 6.3.1 Neural Voxel Puzzling . . . . . . . 6.3.2 Neural Connectomics Puzzling . . 6.3.3 Chemical Puzzling . . . . . . . . . 25 . . . . . . . . . . . . 7 References 1 18 18 18 19 19 20 20 20 20 21 21 21 21 21 21 22 23 23 23 23 23 24 24 24 24 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 25 27 27 27 27 28 28 Introduction Many biological assays require the loss/destruction of spatial information of samples, making it difficult to create a high-resolution image of cellular properties. As a prime example, determining genetic properties of a biological sample usually requires breaking apart that sample for DNA sequencing (but see [1]). This limits the resolution of an image of genetic content to the precision of tissue sectioning prior to sequencing. Along with determining gene expression, researchers are attempting to use genetic information to determine neural connectivity [2], neural activity [3], other cellular properties [4], and chemical concentrations [5]. Being able to image these types of properties at high resolution and large scale could therefore lead to expanded measurement and recording applications. This would be possible if we could recover spatial information post hoc. In order to recover a sample’s spatial information, information about its relative spatial location could be embedded and utilized. For example, imagine that each piece of genetic information was attached to a puzzle piece (the embedded relative spatial information; Figure 1A). While the puzzle pieces by themselves don’t 2 provide spatial information, fitting the pieces together would lead to a spatially correct image of the genetic information. Thus, the use of relative spatial information (how the puzzle pieces’ locations relate to one another) could allow for higher-resolution imaging. Using relative spatial information to reconstruct an image can be thought of as a dimensionality reduction problem. If there are N puzzle pieces, one can construct an N × N similarity matrix S, where Sij determines how close puzzle piece i and j are (higher similarity means shorter distance; Figure 1B). The goal is to map this high dimensional similarity matrix to accurate 2- or 3-dimensional locations of each piece (Figure 1C). Importantly, there is a whole class of dimensionality reduction methods that aims to preserve high dimensional distances in the reduced dimension (e.g. [6–8]). These types of techniques would allow a “piecing of the puzzle back together.” Here, we propose “puzzle imaging,” and develop two dimensionality reduction algorithms that would allow large-scale puzzle imaging. We describe three concrete examples in which puzzle imaging would be beneficial: (1) “Neural Voxel Puzzling,” in which a relatively high-resolution 3-dimensional brain map is reproduced by giving DNA barcodes to neurons; (2) “Neural Connectomics Puzzling,” in which neural connections are used to recover neural locations; and (3) “Chemical Puzzling,” in which a chemical map could be reproduced using bacteria with chemosensitive DNA and conjugative transfer. Each of these examples leverage the faster-than-Moore’s law advances in both the cost and speed of genetic sequencing [9], and therefore are likely to become more relevant as this “genetic revolution” proceeds. In each example, we use our algorithms on simulated data, and provide a preliminary demonstration of the capabilities of puzzle imaging. 3 Figure 1: Puzzle Imaging. There are many properties, such as genetic information, that are easier to determine when the original spatial information about the sample is lost. However, it may be possible to still image these properties using relative spatial information. (A) As an example, let us say that each piece of genetic information is attached to a puzzle piece. While the puzzle pieces don’t provide absolute spatial information, they provide relative spatial information: we know that nearby pieces should have similar colors, so we can use color similarity to determine how close puzzle pieces should be to one another. (B) We can make a similarity matrix of the puzzle pieces, which states how similar the puzzle pieces’ colors are to each other, and thus how close the pieces should be to one another. (C) Through dimensionality reduction techniques, this similarity matrix can be used to map each puzzle piece to its correct relative location. 2 2.1 2.1.1 Results Neural Voxel Puzzling Overview The purpose of neural voxel puzzling is to create a 3-dimensional image of the brain at high resolution. This image could provide useful neuroanatomical information by itself, or could be used in conjunction with other technologies to determine the locations of genetically encoded neural properties in the brain [10]. The first step in voxel puzzling is to label each neuron in the brain with a unique DNA or RNA barcode 4 throughout its entire length (Figure 2A). Ongoing research aims to tackle this challenge [2, 11, 12]. Recently, researchers have succeeded in having bacteria generate a large diversity of barcodes in vivo [11]. Next, the brain is shattered into many voxels (Figure 2B; note that voxels are only squares for simplification), and the DNA in each voxel is sequenced, yielding a record of which neurons were in which voxels. This provides us with relative spatial information about voxel placement: voxels that share more neurons will likely be closer to each other. We can use this relative spatial information to puzzle the voxels into their correct locations. 2.1.2 Dimensionality Reduction More formally, puzzling together the brain is a dimensionality reduction problem, with each voxel represented by an N -dimensional object, where N is the number of neurons. Dimension k corresponds to neuron k being in that voxel (Figure 2C). These N -dimensional voxels must be mapped to their correct 3-dimensional coordinates (or 2 dimensions in Figure 2’s simplified example). This can be done because voxels that are closer in 3-dimensional space will have more neurons in common, and thus will be more similar in N -dimensional space. With the knowledge of the similarity between all pairs of voxels, we can create a similarity matrix (Figure 2D) and then puzzle the voxels back together (Figure 2E). Without any additional information, it is impossible to know exact locations; only the relative locations of voxels can be known. Thus, the output could be a flipped or rotated version of the input (Figure 2E). That being said, additional information could be used to correctly orient the reconstruction. For example, the overall shape could be matched for a sample that is asymmetric (like the brain), or a few samples with known locations could act as landmarks. In order to convert the knowledge of which neurons are in which voxels (Figure 2C) to a reconstructed puzzle (Figure 2E), a dimensionality reduction algorithm is needed. We demonstrate the performance of two algorithms that are promising for large-scale problems. The first is a variant of Diffusion Maps [8], which uses a sparse similarity (affinity) matrix instead of the standard calculation. We will refer to this method as Sparse Diffusion Maps, or SDM. The second is a variant of Landmark Isomap [13, 14], which is faster for unweighted graphs (binary similarity matrices). We will refer to this method as Unweighted Landmark Isomap, or ULI. In the below simulations, we use 10 landmark points. For the full algorithms, see Methods. 5 Figure 2: Neural Voxel Puzzling Overview. (A) An example of 6 “neurons” (lines) going through 4 voxels. Each neuron has a unique DNA barcode (here color). (B) These voxels are broken apart. (C) A coincidence matrix, X, is constructed describing which neurons are in which voxels. Gray signifies that a neuron is in a particular voxel. (D) A similarity matrix is constructed describing how many neurons a pair of voxels has in common. This matrix can be calculated as XXT . (E) The voxels are puzzled back together. The reconstruction may be rotated or flipped, as shown here. 2.1.3 Performance We tested the ability of both dimensionality reduction algorithms to determine the locations of 8000 simulated voxels of varying dimensions. Voxels were not confined to be cubes; they could be any shape. In our simplistic simulations, our “neurons” were long rods with cross-sectional areas of 1 µm2 (about the size of an axon [15]) and were assumed to fully go through each voxel they entered. We set the total number of neurons in our simulations so that they would fill voxels of the chosen size. Neurons were oriented within the volume at randomly determined angles. See Methods for simulation details. In our simulations, we used two metrics to determine the quality of the reconstruction. The first metric was the mean error in distance across all voxels. Because the final reconstruction will be a scaled, rotated, and reflected (flipped) version of the initial voxel locations, we first transformed (scaled, rotated, and reflected) the final reconstruction to match the original voxel locations. We used the transformation that minimized the mean error. Another metric we used is the correlation coefficient (R value) of the plot of reconstructed distances between all points against their true distances. This metric determines how well relative distances between points are preserved, and does not depend on any transformations following the reconstruction. A perfect reconstruction (ignoring differences in scaling, rotation, and reflection) would have a linear relationship between the true and reconstructed distances, and thus an R value of 1. We first tested both methods on simulations with voxels with average sides of 5 µm (Figure 3A). The SDM method led to a faithful reconstruction, with the exception that the reconstructed voxels tended to be overrepresented around the outside of the cube and underrepresented in the middle. The ULI method also leads to a faithful reconstruction (Figure 3B). 6 We next tested both methods of reconstruction while varying the voxel size (Figure 3C,D,E). While voxels could be any shape, for ease of understanding, we report voxel sizes as the edge length of the cube corresponding to the average voxel size. For most voxel sizes, ULI leads to a slightly more accurate reconstruction than SDM. In general, when looking at the error in terms of absolute distance, using smaller voxels increases possible resolution. As an example of the excellent resolution that can be achieved, both methods achieve mean errors below 6 µm using an average voxel size of 3 µm (Figure 3E). Finally, we tested the performance of puzzle imaging when removing a fraction of the voxels. We did this because in real neurons, there are cell bodies that would fill multiple voxels. These voxels would not add any information to puzzle reconstruction, so we exclude them to simulate the existence of cell bodies. Moreover, this generally simulates the robustness of neural voxel puzzling to missing data. In these simulations, we used a voxel size of 5 µm (Figure 3F,G). For both methods, when no voxels were removed, the average mean error rate was below 2 voxels. The average mean error rate was still below 2.5 voxels when 60% of the voxels were removed. This demonstrates that these methods are robust to missing voxels (cell bodies). 7 Figure 3: Neural Voxel Puzzling Performance. (A) On the left, an example reconstruction of voxel locations using the SDM method. Colors are based on initial locations: those with a larger initial x location are redder, while those with a larger initial y location are bluer. In the middle, a 2-dimensional slice through reconstructed volume. The distance errors are calculated following scaling and rotating the reconstructed volume to match the original volume. On the right, one metric for the accuracy of reconstruction is shown by plotting the reconstructed distances between all points against their true distances for the reconstruction in this panel. The mean plus/minus the standard deviation (shaded) is shown. A perfect reconstruction would be a straight line, corresponding to an R value of 1. (B) Same as panel A, except an example reconstruction using the ULI method. (C) R values for simulations using the SDM method (blue) and ULI method (red), as a function of the voxel size. While voxels were not confined to be cubes, for ease of understanding, we report voxel sizes as the edge length of the cube corresponding to the average voxel size. Error bars represent the standard deviation across simulations in each panel. (D) Mean distance errors in voxels for both methods as a function of the voxel size. (E) Mean distance errors in microns for both methods as a function of the voxel size. (F) Voxels are removed to represent voxels that do not contain location information (such as voxels 8 that contain a single cell body). R values for simulations using both methods are plotted as a function of the percentage of voxels removed. (G) Mean distance errors are plotted as a function of the percentage of voxels removed. 2.2 2.2.1 Neural Connectomics Puzzling Overview The purpose of neural connectomics puzzling is to estimate the locations of neurons based on their neural connections. There is ongoing work to provide a unique DNA barcode to every neuron and link those barcodes when neurons are synaptically connected [2]. This DNA could later be sequenced to determine all neural connections. For this proposed technology, it would be useful to know the locations of connected neurons, rather than simply knowing that two neurons are connected. The first steps in connectomics puzzling are to label each neuron in the brain with a unique DNA barcode and label neural connections via the pairing of barcodes (Figure 4A). One proposed method would be to have viruses shuttle the barcodes across synapses, where they can be integrated [2]. Other techniques for creating, pairing, and transporting barcodes have been proposed [10, 16]. Next, the brain is homogenized, and the DNA barcode pairs are sequenced, yielding a record of which neurons are connected (Figure 4B). 2.2.2 Dimensionality Reduction Each neuron can be treated as an N -dimensional object, where N is the number of neurons. Each dimension corresponds to a connection with a given neuron (Figure 4C). These N -dimensional neurons must be mapped to their correct 3-dimensional coordinates (or 2 dimensions in Figure 4’s simplified example). This can be done because neurons are more likely to be connected to nearby neurons (e.g. [17,18]), and thus we can treat the connectivity matrix as a similarity matrix. Using this similarity matrix, we can then puzzle the neurons back into place (Figure 4D). As with voxel puzzling, it is impossible to know exact locations without any additional information; only the relative locations of neurons can be known (Figure 4D). In order to convert the knowledge of which neurons are connected (Figure 4C) to a reconstructed puzzle (Figure 4D), we used SDM, which we previously used for Neural Voxel Puzzling. See Algorithm Comparison: ULI vs SDM for an explanation on why ULI will not work for Neural Connectomics Puzzling. 9 Figure 4: Neural Connectomics Puzzling Overview. (A) An example of 9 connected neurons (circles). Lines signify connections. (B) After the brain is homogenized, the only remaining information is a record of the connections. Connections are shown here as adjacent circles. (C) A connectivity matrix is constructed describing the connections between neurons. Gray signifies a connection. Since connections are correlated with how close neurons are to one another, this connectivity matrix can be treated as the similarity matrix. (D) The neurons are puzzled back together. The formation may be rotated or flipped, as shown here. 2.2.3 Performance We tested the ability of connectomics puzzling to determine the locations of a simulated network of neurons. Hellwig [17] described the probability of connections as a function of distance between pyramidal cells in layers 2 and 3 of the rat visual cortex. We simulated 8000 neurons in a 400 µm edge-length cube (so they were on average spaced ∼20 µm apart from each other in a given direction). Connections between neurons were randomly determined based on their distance using the previously mentioned probability function (Figure 5E). We first simulated only connections within layer 3. As our example simulation shows (Figure 5A), the locations of neurons were able to be estimated very accurately. As with voxel puzzling, we use mean error and R values to describe the quality of reconstruction, although now the distance is between neurons rather than between voxels. Next we simulated connections between layers 2 and 3; in our simulation, half of the 10 neurons were in layer 2 and half were in layer 3. In an example simulation (Figure 5B), it’s clear that the locations of neurons could still be estimated accurately. In fact, the reconstruction clearly separated the neurons from the two layers. Looking quantitatively at the differences between layer 3 reconstructions and layer 2/3 reconstructions, R values are slightly higher, and mean errors are slightly lower for layer 3 reconstructions. Median R values across simulations are 0.97 vs. 0.91 (layer 3 vs. 2/3), and median mean errors across simulations are 19 µm vs. 42 µm (Figure 5C,D). This disparity is largely due to the gap between layers in the reconstructions (Figure 5B); reconstructions within each layer are as accurate (in terms of R values) as the layer 3 reconstruction. Next, in order to test when connectomics puzzling would be useful, we tested how reconstruction is dependent on the parameters of the connection probability distribution. For these simulations, we assumed the layer 3 connection probability distribution, and then changed either the baseline connection probability (the connection probability at a distance of 0) or the standard deviation of the connection probability distribution. There was a great improvement in reconstruction accuracy when the baseline probability increased from 0.10 to 0.15, and accuracy continued to increase until a baseline probability of 0.35, where it plateaued (Figure 5F). In general, there are high accuracy reconstructions for a wide range of baseline probabilities, with the exception of low probabilities. When looking at the effect of the standard deviation of the probability distribution, there was a general trend that reconstruction accuracy decreased as the standard deviation increased (Figure 5G). This is because connections become less closely related to distances when the standard deviation increases. For example, if the standard deviation was infinite so that the probability of connection was the same for all distances, then knowing the connections would no longer allow us to infer the distances between neurons. One notable exception from the above trend is that there is a low reconstruction accuracy for the smallest standard deviations considered (50-100 µm). We have found that the algorithm does not work well in connectomics puzzling when the connection matrix is far too sparse. When we use a cube with 200 µm edges and 1000 neurons instead of 400 µm edges and 8000 neurons (the same neuronal density), simulations with a 50 µm standard deviation perform very well. Thus, it’s important to note that the quality of reconstruction will depend on the size of the cube being used. 2.3 2.3.1 Chemical Puzzling Overview Puzzle imaging has a number of potential applications besides neuroscience, including some that are potentially more tractable and therefore may have a higher probability of being implemented in the near future. One example we develop here is that of reconstructing spatial chemical environments from populations of recording cells that have been mixed, a process we call “chemical puzzling.” One example of a chemical puzzling assay would consist of the initial spreading of many “pioneer” cells across an environment containing a heterogeneous distribution of a particular chemical (Figure 6A,B). These pioneer cells would be endowed with the ability to detect the presence of that chemical and to record its concentration into a nucleotide sequence. This could be done through molecular ticker-tape methods using DNA polymerases [3, 19, 20], similar strategies using RNA polymerases, or other mechanisms [4, 5, 21, 22], for example involving chemically-induced methylation or recombination. Some pioneer cells would also be given the ability to share genetic information with other cells — in the case of prokaryotes, this could be by the introduction of barcoded F-like plasmids encoding the components essential to conjugative transfer of the plasmid [23]. The pioneer cells would be placed at random places within the chemical environment (Figure 6B), and would then begin to grow outwards (Figure 6C). When the colonies become large enough to contact neighboring colonies, those that contain the F-plasmid (or equivalent), denoted F+ , will copy it and transfer it to those without it (F- ) (Figure 6D). We can think about the F-plasmid transfer between the colonies descended from two pioneer cells as these two pioneer 11 Figure 5: Neural Connectomics Puzzling Performance. 12 Figure 5: (A) On the left, an example reconstruction of neural locations based on a simulation of connections of pyramidal cells in layer 3 of cortex. Colors are based on initial locations: those with a larger initial x location are more red, while those with a larger initial y location are more blue. The distance errors are calculated following scaling and rotating the reconstructed volume to match the original volume. In the middle, a 2-dimensional slice through reconstructed volume. On the right, one metric for the accuracy of reconstruction is shown by plotting the reconstructed distances between all points against their true distances for the reconstruction in this panel. The mean plus/minus the standard deviation (shaded) is shown. A perfect reconstruction would be a straight line, corresponding to an R value of 1. (B) Same as panel A, except based on an example simulation of pyramidal cells in both layers 2 and 3 of cortex. (C) Boxplots of R values for layer 3 simulations, and layer 2/3 simulations. The 5 lines (from bottom to top) correspond to 5%, 25%, 50%, 75%, and 95% quantiles of R values across simulations. (D) Boxplots (as in panel C) of mean errors across simulations. (E) The probability of connection as a function of distance between pyramidal cells, which is used in the simulations of the other panels [17]. (F) Using the parameters of the connectivity probability distribution of layer 3, the baseline connection probability (the probability of connection at a distance of 0) of the connectivity distribution is changed. R values and mean errors are shown as a function of this baseline probability. Error bars represent the standard deviation across simulations in this and the next panel. (G) Using the parameters of the connectivity probability distribution of layer 3, the standard deviation of the connectivity distribution is changed. R values and mean errors are shown as a function of the standard deviation. cells becoming “connected” (just like a neural connection in the previous section). This sharing of genetic information provides information about which pioneer cells are close to each other, which can then be used to reconstruct where each cell was spatially. Again, note that a benefit resulting from this strategy is that the spatial information can be destroyed and reconstructed post hoc. In terms of this example, this would be equivalent to wiping the surface that the bacteria are growing on and reconstructing its chemical spatial information after sequencing, in “one pot.” Preparation of the DNA for sequencing could also be done in one pot, i.e. all of the cells could be lysed and the DNA extracted at one time, if the genetic material carrying the connection information and the chemical information were physically linked (e.g. if a barcode on the F-plasmid were inserted into the chemical record region of the recipient cell’s genetic information). Otherwise, amplification of the connection information and the chemical record could be done on each cell using emulsion-based methods [24]. 2.3.2 Dimensionality Reduction Each pioneer cell can be thought of as an N -dimensional object, where N is the number of pioneer cells. Each dimension corresponds to a connection with another pioneer cell (whether the pioneer cell’s descendants are involved in a conjugative transfer with another pioneer cell’s descendants) (Figure 6E). These N -dimensional cells must be mapped to their correct 2-dimensional coordinates. This can be done because pioneer cells will be more likely to be connected to nearby pioneer cells. We construct a similarity matrix by determining all cells two connections away. This is because the matrix of connections doesn’t directly provide accurate information about how close the pioneer cells are to each other, as F- ’s can’t be connected to F- ’s (and same for F+ ’s). The matrix of mutual connections allows F- ’s to be connected to F- ’s. With the knowledge of the similarity between all pairs of pioneer cells, we can puzzle the pioneers back into place (Figure 6G). The chemical recording functionality of the cells then allows the chemical environment to be determined at the locations of the pioneer cells (Figure 6H), and extrapolated beyond (Figure 6I). In order to convert the knowledge of the similarity between cells (Figure 6F) to a reconstructed puzzle (Figure 6G), a dimensionality reduction algorithm is needed. Here we use Unweighted Landmark Isomap, as we used in Neural Voxel Puzzling, with only 5 landmark points. See Algorithm Comparison: ULI vs SDM for an explanation on why SDM will not work well for Chemical Puzzling. 13 Figure 6: Chemical Puzzling Overview. (A) An example area contains a chemical whose concentration is represented by a grayscale value. (B) Pioneer cells (X’s and O’s, each with a different color) are put on the plate. X’s represent F+ cells that can transfer an F-plasmid into an F- cell (O’s). (C) The pioneer cells replicate and spread. Descendants of a pioneer are shown in the same color. (D) When the cell colonies become large enough to contact neighboring colonies, the F+ cells (X’s) will copy the F-plasmid and transfer it to the F- cells (O’s). This is shown as the X’s color filling in the center of the O’s. In the inset (below), the F-plasmid transfer (conjugation) is shown. (E) The DNA is sequenced to determine which pioneer cells are “connected” (which had a conjugative transfer occur between their colonies). A connectivity matrix is made from this data. (F) The matrix of connections doesn’t directly provide accurate information about how close the original cells are to each other because O’s can’t be connected to O’s (and same for X’s). As our similarity matrix, we thus use the matrix of mutual connections, which allows O’s to be connected to O’s. (G) The location of the original cells is estimated from the matrix in panel F. (H) The chemical concentrations at each of the original cells locations is known as the cells’ DNA acts as a chemical sensor. (I) The chemical concentration everywhere is extrapolated based on the chemical concentrations at the known pioneer cells. 2.3.3 Performance To further demonstrate the potential for chemical puzzling, we performed a simulation of the chemical puzzling problem. We used a complex chemical concentration described by the letter “P” (for Puzzle Imaging), with the concentration also decreasing when moving outwards from the center, and a constant background concentration (Figure 7A). The image size is 1000 x 1000 pixels, and each pixel is 1 µm2 (about the size of a cell [25]). The corresponding size of the letter, then, is about 600 µm x 800 µm. Each pioneer cell is randomly placed on a single pixel. We simulated the placement and growth of thousands of pioneer cells in that environment (Figure 7B,C). 14 Each cell synthesized a DNA element in which the percentage GC composition of the synthesized DNA was proportional to the chemical concentration at that spot. We were able to successfully reconstruct the letter “P” in the image (Figure 7B,C), though this was dependent on the number of pioneer cells used and the length of the incorporated DNA element. Fewer pioneer cells resulted in a decrease in the spatial resolution, whereas the dynamic range greatly increased with longer DNA incorporations (Figure 7B,C). When only two base pairs are used, the background concentration and the concentration decrease away from the center were unable to be accurately detected. With 50 base pairs, the chemical concentrations were reconstructed very accurately. Lastly, the above simulations assumed that when a F+ and F- cell are in contact, transfer of genetic information occurs 100% of the time, which would likely not occur [26]. Still, relatively faithful chemical reconstruction was accomplished with conjugation efficiencies as low as 30% (see Figure S1 and Supplementary Information). Overall, this technique holds the potential to determine chemical concentrations at very high resolution. 15 Figure 7: Chemical Puzzling Performance. (A) The chemical concentration across the plate. It is described by the letter “P,” with the concentration decreasing moving outwards from the center, and a constant background concentration. (B) A simulation is done with an initial cell density of 1%. (C) A simulation is done with an initial cell density of 0.1%. For panels B and C, the top row shows the initial locations of the pioneer cells. They are color-coded by location. The second row shows example reconstructed locations of the pioneer cells. The third row shows the reconstructed chemical concentrations when 50 base pairs are used to detect the concentration. The bottom row shows the reconstructed chemical concentrations when 2 base pairs are used to detect the concentration. Note that the black border represents regions of unknown concentration. 16 3 Discussion Here we proposed the concept of puzzle imaging. We developed two possible large-scale nonlinear dimensionality reduction algorithms for use in puzzle imaging, and demonstrated some of puzzle imaging’s abilities and weaknesses in three possible applications. Using simplistic simulations, we showed that voxel puzzling may allow locating neural structures within about 10 µm. In regards to connectomics puzzling, knowing only the connections between neurons within a layer of cortex could be sufficient to localize neurons within about 20 µm. We also showed that chemical puzzling could be used to accurately determine chemical concentrations at a resolution well below 1 mm. Lastly, we describe how Sparse Diffusion Maps is faster than Diffusion Maps, and Unweighted Landmark Isomap is faster than Isomap (see Methods). 3.1 Potential Uses of Puzzle Imaging For neuroscience, puzzle imaging could be a scalable way to localize important molecular information within the brain. Neuronal RNA/DNA barcodes could be annotated with additional molecular information [10,16]. For example, molecular ticker tapes have been proposed that would record the activity of a neuron into DNA [3, 19, 20]. It would be very valuable to know the location of the neurons that are being recorded from. Additionally, RNA that is being expressed could be annotated to the barcodes. This could provide information about what genes are being expressed in different locations of the brain, or about the distribution of cell types throughout the brain. If engineered cells capable of recording and/or stimulating adjacent neurons can circulate in and out of the brain, the concepts outlined here might help achieve input/output to many/all neurons without surgery. The applications of chemical puzzling go beyond that of determining the chemical composition of bacterial cells growing on a surface. Indeed, biology often has the ability to survive and thrive in the harshest of environments, including spaces too small or desolate for even robotic access. Biological sensing and recording can open these areas to characterization and perhaps utilization. Applications could include those in the fields of geology (in which the composition of fractured geologic strata, which contain millions of microscopic cracks and pores, can be assayed) and medicine (in which the composition of the complex biological environments of, for example, the gastrointestinal tract, can be assayed). 3.2 Simulation Limitations In all our simulations, we made simplifications in order to provide a preliminary demonstration of the feasibility of puzzle imaging. In neural voxel puzzling, our simulations assumed that there were equal neuronal densities across the volume and that neurons were oriented at random angles. In neural connectomics puzzling, our simulations used a maximum of two neuronal layers, and assumed that connection probability distributions did not differ within a layer (although in reality there are different cell types [27]). For both of these neuroscience examples, reconstruction errors due to these simplifying assumptions could likely be remedied by using previously known neuroanatomical information (e.g. the orientation of axons in a brain region) or molecular annotations (e.g. about whether a barcode is in an axon or dendrite, or about cell type [28]). In chemical puzzling, our simulations assumed that cells were stationary, and we used a simple model of outward cellular growth. For locations with viscous flow or rapidly moving cells, complex cell growth and movement models would be necessary to achieve accurate reconstructions. For a more in-depth discussion of limitations for all simulations, see Supplementary Information. 3.3 Algorithms In this paper, we demonstrated two algorithms that could be used for puzzle imaging. Refinements of the presented algorithms would be beneficial for puzzle imaging (to overcome the limitations in Results). For instance, a different metric could be used to create the similarity matrix in both methods. In addition, the 17 number of landmark points in Unweighted Landmark Isomap can be optimally tuned for the specific use. Moreover, novel algorithms for large-scale nonlinear dimensionality reduction would be beneficial for more accurate puzzle imaging reconstruction. While the algorithms presented here were designed for puzzle imaging, they could be generally used as faster versions of Diffusion Maps and Landmark Isomap for large problems. Both methods can preserve relative locations when reconstructing a swiss roll or helix, classical tests of nonlinear dimensionality reduction techniques. Further research needs to be done to see how these methods compare to traditional methods for other applications. 3.4 Conclusion Here we have provided a preliminary demonstration that puzzle imaging may be possible. In order to make puzzle imaging a reality, significant biological work still needs to be done. For example, having location or neuron specific barcodes would be needed to make the neuroscience puzzle imaging approaches possible. We hope that this paper will inspire experimentalists and theoreticians to collaborate to help make puzzle imaging a reality. 4 4.1 Methods Sparse Diffusion Maps Algorithm Sparse Diffusion Maps is the same as the standard Diffusion maps algorithm [8] when using 1 timestep, except we here use a sparse similarity matrix. Thus, in the below algorithm, only step 1 differs from standard Diffusion maps. The algorithms take N high-dimensional points, and reduce each point to k dimensions (where k is 2 or 3 in our applications). The algorithm follows in Table 1. Step 1 Step 2 Sparse Diffusion Maps Algorithm Efficiently create a sparse, symmetric, nonnegative, similarity matrix, S that is a connected graph. Methods used to create S in our applications follow. −1 Create matrix M by normalizing P S so that each row sums to 1. That is, M = D S, where D is a diagonal matrix with Di,i = Si,j j Step 3 Step 4 Find the k+1 largest eigenvalues e1 , ..., ek+1 of M and their corresponding eigenvectors v1 , ..., vk+1 . Each eigenvector is N -dimensional. The final k-dimensional positions of the N points are the N rows in [e2 v2 , ..., ek+1 vk+1 ]. Table 1: Sparse Diffusion Maps Algorithm 4.2 Unweighted Landmark Isomap Algorithm Unweighted Landmark Isomap is based on Landmark Isomap [13, 14]. The most important change is that we compute geodesic distances more efficiently due to our graph being unweighted (Step 3). Additionally, we create the similarity matrices uniquely for each application (Step 1). All other steps are identical to Landmark Isomap. The algorithm follows in Table 2. Note that the method of constructing the similarity matrix (Step 1) and the number of landmark points (Step 2) are user options within this algorithm. We discuss our choices for these steps for our applications below. 18 Step 1 Steps 2&3 Step 2 Unweighted Landmark Isomap Algorithm Efficiently create a sparse, binary, symmetric, similarity matrix, S that is a connected graph. Methods used to create S in our applications follow. These steps select a landmark point (Step 2) and then calculate the distance from all points to that landmark point (Step 3). In total, we will select ` landmark points, so these steps will be repeated in alternation ` times. Select a landmark point. We do this in the following way (MaxMin algorithm from [13]): The first landmark point is selected randomly. Each additional landmark point is chosen in succession in order to maximize the minimum distance to the previously selected landmark points. In other words, for every point i, we calculate the minimum distance mi to all the previously selected landmark points (indexed by j): mi = min γi,j , where γi,j is the calculated geodesic distance j between the points in Step 3. We then choose the point that has the largest minimum distance: landmark = max mi . i Step 3 Step 4 Step 5 Calculate the geodesic distance from all N points to the previously selected landmark point. The geodesic distance γi,j from point i to landmark point j is the number of steps it would to get from point i to landmark point j in the graph of S. This can be calculated efficiently using a breadth first search (as opposed to using Dijkstra’s algorithm) because S is an unweighted graph. Use classical multidimensional scaling (MDS) [6] to place the landmark points. This means that the points are placed in order to minimize the sum squared error between the Euclidean distances of the placed landmark points and their known geodesic distances. This is done in the following way [13, 14]: Let ∆` be the matrix of squared geodesic distances between all the landmark points. Let µi be the mean of row i of ∆` and µ be the mean of all entries of ∆` . Create the matrix B with entries Bj,k = [∆` ]j,k − µj − µk + µ. Find the first (largest) k eigenvalues and eigenvectors of B. Let Vi,j be the ith component of the j th eigenvector. Let λj be the j th eigenvalue. The matrix L has the √ coordinates of the landmark points in its columns. L has the entries Li,j = Vj,i · λi . For each point, triangulate its location using the known geodesic distances to each of the landmark points. This is done in the following way [13, 14]: V Let L# i,j = √j,i , and let ∆ be the matrix of squared geodesic distances between the landmark λi  ¯ ` , where points and all points. The position of point a, xa , is calculated by xa = − 21 L# ∆a − ∆ ∆a is row a of the matrix ∆ (the squared geodesic distances from point a to all the landmark ¯ ` is the column mean of the matrix ∆` . points), and ∆ Table 2: Unweighted Landmark Isomap Algorithm 4.3 4.3.1 Neural Voxel Puzzling Similarity Matrix Let X be an n × p (voxels × neurons) coincidence matrix that states which neurons are in which voxel. To construct the similarity matrix, we first compute A = XXT , an n×n matrix that gives the similarity between voxels. We then threshold this matrix (an approximate nearest neighbors calculation). Thresholding makes the matrix more sparse (beneficial for SDM), and makes points not connected to far-away points (important for increasing resolution in ULI). We use different thresholding methods prior to ULI and SDM. The specific thresholding methods below are what we used for our simulations; the method of thresholding is a tunable parameter. For ULI, we threshold each row independently. The threshold for a row is the maximum of that row divided by 2. That is, for row i, Ti = 12 max Aij , where Aij is the element of A in row i and column j. After j thresholding, the entries of the non-symmetric  similarity matrix are Nij = Aij ≥ Ti . We create a symmetric unweighted similarity matrix: S = N + NT > 0. For SDM, the entire matrix is thresholded by the same value. We first create a vector w that contains the 19 maximum of each row of A. Its entries are wi = max Aij . The threshold is the minimum of w. That is, j T = min w. Thresholding all entries, we get S = A ≥ T . 4.3.2 Simulations For our simulations, we initially chose the average voxel size. If the average voxel had a volume of x3 µm3 , we reported the voxel size as x µm (the length of an edge of a cube of comparable size). We next created a cube with edges of length 20x µm (so it had a volume of 8000x3 µm3 ). We then randomly placed 8000 voxel centers in the cube. We next added in long rectangular prisms (neurons) so that the entire volume would be filled. We assumed the neurons fully went through each voxel they entered. As the cross-sectional area of a voxel was on average x2 µm2 , and we assumed neurons with cross-sectional areas of 1 µm2 (about the size of an axon), we added enough neurons so that each voxel would contain x2 neurons. Neurons were oriented within the volume at randomly determined angles. When doing simulations with removed voxels, we placed voxels and neurons in the regular way. Then, we discarded voxels and aimed to reconstruct the locations of the other voxels. The R values and mean errors listed are for the voxels that were reconstructed (removed voxels were not included in the analysis). Additionally, in our simulations, voxels that did not contain any neurons, or that did not share any neurons with another voxel, were excluded from analysis. When voxels were 2 µm, 3 µm, 4 µm, and 5 µm, 2.8%, 0.14%, 0.0046%, and 0.0003% of voxels were respectively excluded. Also, when removing voxels (Figure 2F,G), we excluded the remaining voxels that did not make up the main connected component of the similarity graph. When using ULI, when 80%, 85%, and 90% of voxels were removed, 0.36%, 1.7%, and 34.7% of remaining voxels were excluded from analysis. When using SDM, when 80%, 85%, and 90% of voxels were removed, 0.05%, 0.09%, and 0.37% of remaining voxels were excluded from analysis. In our simulations, when using ULI, we used 10 landmark points (see Unweighted Landmark Isomap Algorithm above). 4.4 4.4.1 Neural Connectomics Puzzling Similarity Matrix Let C be an n × n (neurons × neurons) connectivity matrix that states which neurons are connected to each other. As mentioned in Results, this connectivity matrix can be directly used as the similarity matrix. 4.4.2 Simulations We randomly placed 8000 points (neurons) in a 400 µm edge-length cube. Thus, the neurons were on average ∼20 µm apart from each other in a single direction. We initially assumed all neurons were pyramidal cells in layer 3 of rat visual cortex and simulated connections according to the known connection probability distribution as a function of distance (Figure 5E) [17]. Every pair of neurons was randomly assigned a connection (or not) based on this probability distribution. Next, we simulated neurons in layers 2 and 3. The top half of the cube was assumed to be layer 2, and the bottom half was assumed to be layer 3. Again, every pair of neurons was randomly assigned a connection (or not) based on the relevant probability distribution (either between layer 2 and 2, layer 2 and 3, or layer 3 and 3; Figure 5E) [17]. 20 4.5 4.5.1 Chemical Puzzling Similarity Matrix Let C be an n × n (pioneer cells × pioneer cells) connectivity matrix that states which pioneer cells are “connected” to each other. The similarity matrix is calculated as CT C. 4.5.2 Simulations We randomly placed pioneer cells on a pixel in the 1000 × 1000 pixel image. The number of pioneer cells was 1 million (the number of pixels) times the initial density, so 10000 in Figure 3B, and 1000 in Figure 3C. Each cell was randomly assigned to be F+ or F- . We assumed the cells grew out circularly over time with approximately the same rate of growth. For every pixel, we determined which colony (progeny from which pioneer cell) would reach the pixel first. This produced a final map of all pixels assigned to different pioneer cells. On the borders of colonies, cells could conjugate with one another if one colony was F+ and the other was F- . For each pixel on the border, a conjugation occurred according to the probability of conjugation (100% probability for Figure 7; varying for Figure S1). More specifically, any time different colonies occupied pixels horizontal or vertical of each other, a conjugation could occur for the cells in the bordering pixels. We reconstructed the pioneer cells’ locations using ULI with 5 landmark points (see Unweighted Landmark Isomap Algorithm above). We assumed that 3 cells were placed on the plate so that their locations were known. We scaled, rotated, and reflected the reconstructed locations of the pioneer cells so that the locations of the 3 known cells were matched (the average distance error was minimized). The chemical concentration on the plate was between 0 and 1. If a pioneer cell was at a location with a chemical concentration of ρ, each base pair has a probability of being a G or C with probability ρ. The reconstructed chemical concentration was the total number of G’s and C’s divided by the number of base pairs. Thus, if there were 2 base pairs, the reconstructed chemical concentration could be 0, 0.5, or 1. We used linear interpolation to determine the chemical concentration of areas on the plate that did not have a reconstructed concentration. We also note that along with our approximate simulation method of outward circular growth, we also ran a smaller, more realistic, simulation. In this stochastic growth simulation, during each round, cells randomly divided into any single adjacent unoccupied pixel. When an F+ colony grew next to an F- colony, or vice versa, cells could conjugate (according to the conjugation probability). F- cells turned F+ upon receipt of the F-plasmid from an F+ cell. This growth simulation continued until the plate was full. On smaller plates (when it was less time consuming to run the realistic simulation), both simulation types produced nearly equivalent results. 4.6 4.6.1 Computational Complexity Sparse Diffusion Maps We list the complexity of Step 1 for the individual methods below. The run-time of this algorithm is dominated by Step 3. For the below complexity explanation, S is an n × n sparse matrix with m non-zero elements. The complexity of this algorithm is listed in Table 3. 4.6.2 Unweighted Landmark Isomap We list the complexity of Step 1 for the individual methods below. The complexity of this algorithm is listed in Table 4. 21 Step Step 3 (and Total) Sparse Diffusion Maps Computational Complexity Worst-case com- Further Explanation plexity O (m) This is the complexity for the power iteration algorithm [29], which is very efficient for solving for a small number of eigenvalues/eigenvectors. In the power iteration method, the matrix is continually multiplied by a vector, which has complexity O (m), until convergence. The number of steps to calculate eigenvalue ei depends on |ei /ei+1 |: a larger ratio means quicker convergence. If this was not a sparse matrix, as is the case for standard Diffusion Maps, then this step would be O n2 . Table 3: Sparse Diffusion Maps Computational Complexity Step Step 2 Step 3 Step 4 Step 5 Total Unweighted Landmark Isomap Computational Complexity Worst-case Further Explanation complexity O (` · n) [13] O (` · m) A breadth first search has a complexity of O (m). This is done for each of ` landmark points. If the graph had been weighted (as assumed in standard Landmark Isomap), then we would need to use Dijkstra’s algorithm. The fastest general implementation is O (m + n · log n) [30] for each landmark point, yielding O (` · m + ` · n · log n).  O `3 [13] O (k · ` · n)  [13] O ` · m + k · ` · n + `3 Table 4: Unweighted Landmark Isomap Computational Complexity 4.6.3 Neural Voxel Puzzling To compute the similarity matrix, we can take a shortcut instead of performing the sparse matrix multiplication XXT (which will be O n2 in the best case scenario [31]). The entries of XXT tell us how many neurons are shared between particular voxels. This can also be calculated by drawing the bipartite graph that X describes, with voxels on one side and neurons on the other (and edges when a neuron goes through a voxel). For a given voxel, to determine which voxels it shares a neuron with, we only need to trace all the paths to its connected neurons, and then the paths from those neurons back to voxels. This has a complexity of O (αin · αout ), where αin is the largest number of neurons in a voxel, and αout is the largest number of voxels a neuron goes through. Thus, for all voxels, the complexity is O (n · αin · αout ). Determining the similarity matrix can take a comparable amount of time to the steps in ULI or SDM. Note that this  step is faster  than the standard method of computing a similarity matrix in Diffusion Maps: −kxi −xj k2 2 Si,j = exp , where xi and xj are columns within X. For our sparse matrices, this would 2σ 2 take O (q · n), where q is the number of nonzero entries in X, due to the pairwise vector subtraction. The Landmark Isomap algorithm does not give a method for computing the similarity matrix. 22 4.6.4 Neural Connectomics Puzzling As no computation is required to construct the similarity matrix, the overall complexity of Neural Connectomics Puzzling is the complexity of the SDM algorithm. 4.6.5 Chemical Puzzling As in neural voxel puzzling, we can take a shortcut to calculate the  similarity matrix instead of performing the sparse matrix multiplication CT C (which would take O n2 at best for very sparse matrices [32]). Again, we can construct a bipartite graph representing C, where the pioneer cells are now on both sides of the graph (and there’s an edge between connected cells). We can determine if a pioneer cell is connected within 2 steps of another pioneer cell by counting all the ways to get to the other side of the graph (via connections) and back to cells on the same side. For a given cell, this has the complexity O β 2 , where β is the largest number of connections a pioneer cell has (how many different cell colonies that pioneer cell’s  colony has conjugated with). Thus, the total complexity of determining the similarity matrix is O n · β 2 . Determining the similarity matrix can take a comparable amount of time to the steps in ULI. Additionally, chemical puzzling has the extra step of reconstructing the image of chemical concentrations. The chemical concentrations are known at the reconstructed locations of the pioneer cells, but interpolation needs to be used to estimate the concentrations at other locations. This interpolation step can dominate the total time, depending on the desired resolution and interpolation method. 4.7 Algorithm Comparison: ULI vs SDM There are pros and cons of both Sparse Diffusion Maps (SDM) and Unweighted Landmark Isomap (ULI), which make them suitable for different applications. 4.7.1 Domain To run ULI, the graph entered into the algorithm must contain only short-range connections. Practically, ULI will not work when there is high similarity (a large value in the similarity matrix) between points that are far away from one another. This is because having high similarity between far away points would make those far away points near each other in the reconstruction, a problem known as “short circuiting” [33]. This limitation means that neural connectomics puzzling, which contains long-range connections that are indistinguishable for short-range connections, is not compatible with ULI. SDM, on the other hand, is robust to high similarity values between far-away points, as long as similarity values are generally higher between nearby points. Thus, SDM does work for neural connectomics puzzling. 4.7.2 Reconstruction Accuracy Reconstructions using SDM are generally biased towards having points around the perimeter, and therefore don’t faithfully reconstruct the center of the volume. This perimeter bias makes the SDM method unsuitable for use in Chemical puzzling. When used with Chemical puzzling, SDM leads to faulty chemical reconstructions near the center of the image. For neural voxel puzzling, as seen in our simulations (Figure 3), ULI was slightly more accurate than SDM, except for when at least 85% of the voxels had been removed. Another important note is that the SDM method will only accurately reconstruct the volume when the volume is a cube (Figure S2). Thus, for the SDM method to be used in practice with neural voxel or connectomics puzzling, the brain would need to first be sectioned into cubes, and then the cubes would need to be pieced together. The ULI method, on the other hand has the benefit of accurately reconstructing volumes that are not cubes (Figure S2). 23 4.7.3 Speed Both SDM and ULI are designed to be fast dimensionality reduction methods for use with large datasets. In practice, when directly comparing their speed in the neural voxel puzzling simulations using 8000 5 µm voxels, SDM took about 1.5 seconds, while ULI (with 10 landmark points) took about 0.9 seconds on a 2.3 GHz processor running Matlab. The previous times did not include constructing the similarity matrix. See Computational Complexity above, and Algorithm Time Improvements below, for the computational complexity of larger problems. Pros/Cons Sparse Diffusion Maps Only accurately reconstructs cubes Biased towards exterior points Is robust to problems that have high similarity between some far-away points. Summary Unweighted Landmark Isomap Can accurately reconstruct non-cubes Not biased towards exterior points Is generally not robust to problems that have high similarity between some far-away points. Table 5: Algorithm Comparison Summary: ULI vs. SDM 4.8 Algorithm Time Improvements Our algorithms took previous algorithms and adapted them to be faster for large-scale puzzle imaging. 4.8.1 Sparse Diffusion Maps vs. Diffusion Maps The difference between Sparse Diffusion Maps and Diffusion Maps is that we construct a sparse similarity matrix. The most time consuming step in these algorithms (besides constructing the similarity matrix) is finding the largest k eigenvalues and eigenvectors, where k is the dimension size you’re projecting into (2 or 3 for puzzle imaging). This computation will be significantly faster when the similarity matrix is sparse. For instance, one fast algorithm, “power iteration,” [29] has a complexity of O (m), where m is the number of non-zero elements in the similarity matrix S (see Computational Complexity). Computing the similarity matrix is the other time consuming step in Diffusion Maps. Let’s say X is an n × p matrix, and we want to compute the n × n similarity  matrix 2S that gives the similarity between the −kxi −xj k2 columns of X. This is generally calculated as Si,j = exp , where xi and xj are columns within 2σ 2 X. Computing S would have a complexity of O (q · n), where q is the number of nonzero entries in X (see Computational Complexity). In our scenarios where we use SDM, we compute a sparse similarity matrix more efficiently. For neural connectomics puzzling, computing the similarity matrix takes no time, as it simply describes the connections. For neural voxel puzzling, XXT (the main step of computing the similarity matrix) can be calculated with a complexity of O (n · αin · αout ), where αin is the largest number of neurons in a voxel, and αout is the largest number of voxels a neuron goes through (see Computational Complexity). This approach is thus significantly faster than Diffusion Maps for our problem. 4.8.2 Unweighted Landmark Isomap vs. Landmark Isomap The main difference between ULI and Landmark Isomap is that ULI uses an unweighted similarity matrix. One of the time-consuming steps in Landmark Isomap is computing the geodesic distance between all points and each of the ` landmark points. For weighted graphs, this can be solved fastest with Dijkstra’s algorithm in O (` · m + ` · n · log n) [30]. For unweighted graphs, we can simply use a breadth first search for each landmark point, which has a complexity of O (` · m). When we include the other steps of the algorithm (other than constructing the similarity matrix), Landmark Isomap has a complexity of 24   O ` · m + ` · n · log n + k · ` · n + `3 , while ULI is faster, with a complexity of O ` · m + k · ` · n + `3 (see Computational Complexity). It is important to note that computing the similarity matrices in neural voxel puzzling and chemical puzzling may take a comparable amount of time as ULI or Landmark Isomap. As mentioned above, computing the similarity matrix for neural voxel puzzling has a complexity  of O (n · αin · αout ). For chemical puzzling, computing the similarity matrix has a complexity of O n · β 2 , where β is the largest number of connections a pioneer cell has (how many different cell colonies that pioneer cell’s colony has conjugated with). Additionally, for chemical puzzling, using interpolation to estimate the chemical concentration can be a very time-intensive step depending on the resolution desired. 5 Acknowledgements We would like to thank Ted Cybulski and Mohammad Gheshlaghi Azar for very helpful comments on previous versions of the manuscript. We would like to thank Josh Vogelstein for helpful initial discussions. Joshua Glaser was supported by NIH grant 5R01MH103910 and NIH grant T32 HD057845. Bradley Zamft was supported by NIH grant 5R01MH103910. George Church acknowledges support from the Office of Naval Research and the NIH Centers of Excellence in Genomic Science. Konrad Kording is funded in part by the Chicago Biomedical Consortium with support from the Searle Funds at The Chicago Community Trust, and is also supported by NIH grants 5R01NS063399, P01NS044393, and 1R01NS074044. 6 6.1 Supplementary Information Chemical Puzzling Conjugation Efficiency The simulations in the main text (Figure 7) assumed that when an F+ and F- cell are in contact, transfer of genetic information occurs 100% of the time. Evidence to the contrary exists, especially in the absence of selection, where the fitness penalty associated with F+ strains carrying a plasmid, and the competition between cell growth and conjugation, limit plasmid transfer [26]. Furthermore, recombination of the Fplasmid with the host genome can result in Hfr (high frequency of recombination) strains, which have the ability to transfer genetic information (e.g. barcodes), but generally do not confer conjugative ability to the recipient [34]. Our analysis, however, does not rely on every neighboring F+ /F- pair to mate. Rather, it only requires that the descendants of nearby pioneer cells mate at least one once (if they’re an F+ /F- pair). In simulations, relatively faithful chemical reconstruction was accomplished with a conjugation probability of only 30% (Figure S1). This probability is likely very feasible, as neighboring pairs will have many chances to mate. 25 Figure S1: Chemical Puzzling with Low Conjugation Efficiency. We do a simulation of chemical puzzling, as in Figure 7B, except now with varying conjugation efficiencies. (A) The original cell locations (left), and initial chemical concentration (right). (B-E) On the left, the reconstructed cells, and on the right, the reconstructed chemical concentration, using (B) 100% conjugation probability, (C) 40% conjugation probability, (D), 30% conjugation probability, and (E) 20% conjugation probability. The reconstructed chemical concentrations assumed the pioneer cells had 50 base pairs to encode the concentration. The black area on the outside is a border, not a chemical concentration. 26 6.2 Reconstruction of Non-cubes Figure S2: Reconstruction of Non-cubes. We do voxel puzzling as in Figure 3A,B, with 8000 5 µm voxels. However, now the overall shape is a rectangular prism (height is half of the length and width) rather than a cube. (A) The original voxel locations. (B) Reconstruction using SDM. (C) Reconstruction using ULI. 6.3 6.3.1 Simulation Limitations Neural Voxel Puzzling In our simulations, we aimed to demonstrate some of the problems that could arise when using real data. For instance, for voxel puzzling, we removed a large portion of the voxels to represent cell bodies taking up multiple voxels. It would likely be possible to place these voxels when using real data, by looking at the surrounding voxels that share a neuron tag. In our voxel puzzling simulations, there were equal densities of neurons in all portions of the volume, which is not the case in the brain. This should not be a large concern, however, due to our method of constructing the similarity matrix. When we do thresholding, we are essentially taking the approximate nearest neighbors. This step removes the effects of having more total connections between voxels in one region (due to a high density of neurons) compared to another. Our neurons were also all oriented at random angles, so that voxels that were horizontal of each other had the same probability of sharing a neuron as voxels that were vertical of each other (or on top of each other). If this is not the case (e.g. axons are oriented in a similar manner in many brain regions), the reconstruction will be skewed. For instance, if most neurons were oriented vertically, in the reconstruction, the vertical component will be compressed. Following reconstruction, if it’s seen that many neurons in a region are all oriented in the same manner, the dimensions of this region could be scaled proportionally. Moreover, having molecular annotations about whether axons or dendrites of a neuron are in a voxel could help with this process. 6.3.2 Neural Connectomics Puzzling In our simulations of neural connectomics puzzling, we demonstrated that accurate reconstructions were still possible when there were multiple connection probability distributions (as a function of distance). However, this simulation only had 2 layers, and the connection probability distributions were consistent in each layer. It is possible that reconstructions could be less accurate when using more layers. This could be dealt with by using a priori knowledge about neuroanatomy in order to ensure cubes were cut to contain a homogenous population. It also could be problematic if connection probability distributions differed within a layer across multiple cell types [27]. This could be dealt with by using annotated molecular information about cell types [28]. In this scenario, separate reconstructions could be done using neuronal populations with homogenous connectivity probability functions, and then these reconstructions could be combined. 27 Additionally, it may be possible to estimate cell types given connectivity information (by using clustering methods on the connectivity data) [35], and then use these cell type estimates (as mentioned above) to help localize the neurons. It is also important to note that connectomics puzzling is based on the idea that there is a higher probability of connection between neurons that are closer to each other. If this is not the case, then the connectomics puzzling reconstruction may be inaccurate. For certain cell types or portions of the brain (e.g. layer 5 pyramidal cells), there may be a higher probability of long-range connections than short connections. Using a priori knowledge about neuroanatomy or information about cell types based on molecular annotations, these neurons could be excluded (or specific connections these neurons have could be excluded). Alternatively, this information about long-range connections could be utilized in connectomics puzzling to help provide an accurate reconstruction. 6.3.3 Chemical Puzzling In our simulations of chemical puzzling, we used simplified models of bacterial growth and movement. In terms of cell growth, we assumed that cell colonies keep growing outward and stop once they contact another colony. In reality, cells will push on one another, causing the colonies to move. Additionally, in our two dimensional simulations, we ignored the possibility of cells growing in the vertical dimension, which could lead to additional conjugations. While we could incorporate a more sophisticated (and much more expensive in terms of CPU time) simulation of bacterial growth, it is important to note that these simplifications will have little effect on whether two colonies have a conjugation, which is the metric that influences our results. Our simulations also assumed that cells are stationary; that is, once a cell occupies a particular spot in two (or three) dimensional space, it stays there forever. In this case, the trajectory of a lineage is determined by a two (or three) dimensional random walk with uniform and unity step size, where two trajectories do not cross. This would certainly not be true in the case of motile cells or when there is sufficient mixing, as cells arising from different lineages could cross before dividing. Further, if the particular chemical being sensed induces a bias in cell motility (i.e. is a chemoattractant or chemorepellant), a bias will be further introduced into the colony growth model. These movement affects could potentially be problematic for two reasons: 1) it could allow far-away colonies to conjugate with one another; 2) pioneer cells could determine the chemical concentration of a location different from the location where they start to divide. Detailed analysis of these movement affects is beyond the scope of this paper, and we simply note that in the case that cell motility is also an unbiased random walk (a good assumption in the absence of chemotaxis and viscous flow [36]) and there is no mixing, our analysis stands in the limit that the average distance covered by the cells during one division time is much smaller than their size. Outside of this limit, our reconstructed images would be blurred. 7 References [1] Je Hyuk Lee, Evan R Daugharthy, Jonathan Scheiman, Reza Kalhor, Joyce L Yang, Thomas C Ferrante, Richard Terry, Sauveur SF Jeanty, Chao Li, Ryoji Amamoto, et al. Highly multiplexed subcellular rna sequencing in situ. Science, 343(6177):1360–1363, 2014. [2] Anthony M Zador, Joshua Dubnau, Hassana K Oyibo, Huiqing Zhan, Gang Cao, and Ian D Peikon. Sequencing the connectome. PLoS Biol, 10(10):e1001411, 2012. [3] K. P. Kording. Of toasters and molecular ticker tapes. PLoS Comput Biol, 7(12):e1002291, 2011. [4] Fahim Farzadfard and Timothy K Lu. Genomically encoded analog memory with precise in vivo dna writing in living cell populations. Science, 346(6211):1256272, 2014. [5] Felix Moser, Andrew Horwitz, Jacinto Chen, Wendell A Lim, and Christopher A Voigt. Genetic sensor for strong methylating compounds. ACS synthetic biology, 2(10):614–624, 2013. 28 [6] Joseph B Kruskal. Multidimensional scaling by optimizing goodness of fit to a nonmetric hypothesis. Psychometrika, 29(1):1–27, 1964. [7] Joshua B Tenenbaum, Vin De Silva, and John C Langford. A global geometric framework for nonlinear dimensionality reduction. Science, 290(5500):2319–2323, 2000. [8] Ronald R Coifman and Stphane Lafon. Diffusion maps. Applied and computational harmonic analysis, 21(1):5–30, 2006. [9] P.A. Carr and G.M. Church. Genome engineering. Nat Biotechnol, 27(12):1151–62, 2009. [10] Adam H Marblestone, Evan R Daugharthy, Reza Kalhor, Ian D Peikon, Justus M Kebschull, Seth L Shipman, Yuriy Mishchenko, Je Hyuk Lee, Konrad P Kording, Edward S Boyden, et al. Rosetta brains: A strategy for molecularly-annotated connectomics. arXiv preprint arXiv:1404.5103, 2014. [11] Ian D Peikon, Diana I Gizatullina, and Anthony M Zador. In vivo generation of dna sequence diversity for cellular barcoding. Nucleic acids research, 42(16):e127–e127, 2014. [12] Carmen Gerlach, Jan C Rohr, Lela Peri, Nienke van Rooij, Jeroen WJ van Heijst, Arno Velds, Jos Urbanus, Shalin H Naik, Heinz Jacobs, Joost B Beltman, et al. Heterogeneous differentiation patterns of individual cd8+ t cells. Science, 340(6132):635–639, 2013. [13] Vin De Silva and Joshua B Tenenbaum. Sparse multidimensional scaling using landmark points. Report, Technical report, Stanford University, 2004. [14] Vin D Silva and Joshua B Tenenbaum. Global versus local methods in nonlinear dimensionality reduction. In Advances in neural information processing systems, pages 705–712, 2002. [15] Jnos A Perge, Jeremy E Niven, Enrico Mugnaini, Vijay Balasubramanian, and Peter Sterling. Why do axons differ in caliber? The Journal of Neuroscience, 32(2):626–638, 2012. [16] Adam H Marblestone, Evan R Daugharthy, Reza Kalhor, Ian Peikon, Justus Kebschull, Seth L Shipman, Yuriy Mishchenko, David A Dalrymple, Bradley M Zamft, Konrad P Kording, et al. Conneconomics: The economics of large-scale neural connectomics. bioRxiv, 2013. [17] Bernhard Hellwig. A quantitative analysis of the local connectivity between pyramidal neurons in layers 2/3 of the rat visual cortex. Biological cybernetics, 82(2):111–121, 2000. [18] Beth L Chen, David H Hall, and Dmitri B Chklovskii. Wiring optimization can relate neuronal structure and function. Proceedings of the National Academy of Sciences of the United States of America, 103(12):4723–4728, 2006. [19] Bradley M. Zamft, Adam H. Marblestone, Konrad Kording, Daniel Schmidt, Daniel Martin-Alarcon, Keith Tyo, Edward S. Boyden, and George Church. Measuring cation dependent dna polymerase fidelity landscapes by deep sequencing. PLoS One, 7(8):e43876, 2012. [20] Joshua I Glaser, Bradley M Zamft, Adam H Marblestone, Jeffrey R Moffitt, Keith Tyo, Edward S Boyden, George Church, and Konrad P Kording. Statistical analysis of molecular signal recording. PLoS Comput Biol, 9(7):e1003145, 2013. [21] Ari E Friedland, Timothy K Lu, Xiao Wang, David Shi, George Church, and James J Collins. Synthetic gene networks that count. Science, 324(5931):1199–1202, 2009. [22] George M Church and Jay Shendure. Nucleic acid memory device, 2003. [23] Neil Willetts and Ron Skurray. The conjugation system of f-like plasmids. Annual review of genetics, 14(1):41–76, 1980. [24] Michihiko Nakano, Jun Komatsu, Shun-ichi Matsuura, Kazunori Takashima, Shinji Katsura, and Akira Mizuno. Single-molecule pcr using water-in-oil emulsion. Journal of biotechnology, 102(2):117–124, 2003. 29 [25] NEZCE Grossman, EZ Ron, and CL Woldringh. Changes in cell dimensions during amino acid starvation of escherichia coli. Journal of bacteriology, 152(1):35–41, 1982. [26] Jos M Ponciano, Leen De Gelder, Eva M Top, and Paul Joyce. The population biology of bacterial plasmids: a hidden markov model approach. Genetics, 176(2):957–968, 2007. [27] DTJ Liley and JJ Wright. Intracortical connectivity of pyramidal and stellate cells: estimates of synaptic densities and coupling symmetry. Network: Computation in Neural Systems, 5(2):175–189, 1994. [28] Dmitry Usoskin, Alessandro Furlan, Saiful Islam, Hind Abdo, Peter Lnnerberg, Daohua Lou, Jens Hjerling-Leffler, Jesper Haeggstrm, Olga Kharchenko, Peter V Kharchenko, et al. Unbiased classification of sensory neuron types by large-scale single-cell rna sequencing. Nature neuroscience, 2014. [29] Gene H Golub and Charles F Van Loan. Matrix computations, volume 3. JHU Press, 2012. [30] Michael L Fredman and Robert Endre Tarjan. Fibonacci heaps and their uses in improved network optimization algorithms. Journal of the ACM (JACM), 34(3):596–615, 1987. [31] Haim Kaplan, Micha Sharir, and Elad Verbin. Colored intersection searching via sparse rectangular matrix multiplication. In Proceedings of the twenty-second annual symposium on Computational geometry, pages 52–60. ACM, 2006. [32] Raphael Yuster and Uri Zwick. Fast sparse matrix multiplication. ACM Transactions on Algorithms (TALG), 1(1):2–13, 2005. [33] Laurens JP van der Maaten, Eric O Postma, and H Jaap van den Herik. Dimensionality reduction: A comparative review. Journal of Machine Learning Research, 10(1-41):66–71, 2009. [34] PK Gupta. Cell and Molecular biology. Rastogi Publications, 2009. [35] Eric Jonas and Konrad Kording. Automatic discovery of cell types and microcircuitry from neural connectomics. arXiv preprint arXiv:1407.4137, 2014. [36] Jonathan Saragosti, Pascal Silberzan, and Axel Buguin. Modeling e. coli tumbles by rotational diffusion. implications for chemotaxis. PloS one, 7(4):e35412, 2012. 30
5cs.CE
Socially Compliant Navigation through Raw Depth Inputs with Generative Adversarial Imitation Learning arXiv:1710.02543v2 [cs.RO] 26 Feb 2018 Lei Tai1 Jingwei Zhang2 Ming Liu1 Abstract— We present an approach for mobile robots to learn to navigate in dynamic environments with pedestrians via raw depth inputs, in a socially compliant manner. To achieve this, we adopt a generative adversarial imitation learning (GAIL) strategy, which improves upon a pre-trained behavior cloning policy. Our approach overcomes the disadvantages of previous methods, as they heavily depend on the full knowledge of the location and velocity information of nearby pedestrians, which not only requires specific sensors, but also the extraction of such state information from raw sensory input could consume much computation time. In this paper, our proposed GAIL-based model performs directly on raw depth inputs and plans in real-time. Experiments show that our GAIL-based approach greatly improves the safety and efficiency of the behavior of mobile robots from pure behavior cloning. The real-world deployment also shows that our method is capable of guiding autonomous vehicles to navigate in a socially compliant manner directly through raw depth inputs. In addition, we release a simulation plugin for modeling pedestrian behaviors based on the social force model. I. I NTRODUCTION 1) Socially compliant navigation: The ability to cope with dynamic pedestrian environments are crucial for autonomous ground vehicles. In static environments, mobile robots are required to reliably avoid collision with static objects and plan feasible paths to their target locations; while in dynamic environments with pedestrians, they are additionally required to behave in socially compliant manners, where they need to understand the dynamic human behaviors and react accordingly under specific socially acceptable rules. Traditional solutions can be classified into two categories: model-based and learning-based. Model-based methods aim to extend the multi-robot navigation solutions with socially compliant constraints [1]. However, force parameters need to be carefully tuned for each specific scenario. Learning-based methods, on the other hand, aim to directly recover the expert policy through direct supervised learning (e.g., behavior cloning), or through inverse reinforcement learning to recover the inner cost function. Yet, all previous approaches require the knowledge of the precise localization and velocity information of nearby ∗ This paper is supported by Shenzhen Science, Technology and Innovation Commission (SZSTI) JCYJ20160428154842603 and JCYJ20160401100022706; also supported by the Research Grant Council of Hong Kong SAR Government, China, under Project No. 11210017 and No. 16212815 and No. 21202816 awarded to Prof. Ming Liu. 1 Department of Electronic and Computer Engineering, The Hong Kong University of Science and Technology; {ltai, eelium}@ust.hk 2 Department of Computer Science, Albert Ludwig University of Freiburg; {zhang, burgard}@informatik.uni-freiburg.de Wolfram Burgard2 Depth input Fig. 1: A mobile robot navigating in a socially compliant manner in an indoor environment. Our approach tackles this scenario through raw depth images. pedestrians. This limitation restricts these methods to be only applicable for robots equipped with high precision sensors, like 3D Lidars [2], [3]. Moreover, the estimation of the state information of pedestrians is generally timeconsuming. Developing effective navigation strategies directly from raw sensor inputs is still of great importance. 2) Perception from visual input: Compared with 3D Lidars, vision sensors come at affordable prices, making them more suitable to equip mobile agents that are beginning to populate our social life. Thus, navigation solutions that can directly operate on raw visual inputs are more feasible than those depending on expensive Lidars. In coping with visual information, deep learning approaches have become imperative due to their ability to extract hierarchically more abstract feature representations. Also, with the improvement of the computation power of mobile platforms, such approaches have been utilized in various robotics tasks such as obstacle avoidance [4]. In this paper, we deploy neural networks for extracting useful features from raw depth visual inputs, captured by onboard depth cameras of the mobile robot. We use depth inputs over RGB images because the visual fidelity of the simulated color images are much worse than that of the depth images. This bigger deviation of color images from synthetic environments to real-world scenarios makes it more challenging to transfer the model trained on simulated images directly to the real world. The simulated depth images, on the other hand, are more consistent with the real domain and can greatly ease the transfer phase. 3) Learning-based navigation: Deep reinforcement learning have recently gained much attention, and have been successfully extended to learn autonomous navigation from raw sensory inputs [5], [6], [7], [8]. In terms of socially compliant navigation, behavior cloning methods are easy to deploy since they treat the policy learning as a pure supervised learning task. Yet, the learned model of behavior cloning completely ignores the temporal correlation between samples in subsequent frames, thus it cannot generalize well to scenarios that deviate too much from the training data. Agents are also able to learn from expert demonstrations via an intermediate step of learning the latent cost or the reward function [2], [9], [10] through inverse reinforcement learning [11], [12]. Chen et al. [3] defined a complex reward to train the socially aware planning policies (e.g. passing by the right/left side) through reinforcement learning. However, all of these methods depend on accurate pedestrian information and expensive sensors as mentioned before. Generative adversarial imitation learning (GAIL) is an effective alternative for learning from demonstrations [13]. InfoGAIL [14] successfully solved a simulated autonomous driving task with raw visual input. However, only simulated experiments are presented in those two papers. In this paper, we effectively deploy behavior cloning for learning an initial policy, Then, we apply GAIL on the basis of this initial policy, to benefit the policy model by taking the temporal correlations in the dataset into account. Particularly, this paper presents the following contributions: • We introduce an effective GAIL-based approach that is able to learn and improve socially compliant navigation policies through raw depth inputs. • We release a plugin for simulating pedestrians behaving in socially compliant manners, as well as a dataset, where 10,000 socially compliant navigation state-action pairs are recorded, based on the social force model [1], in various social scenarios. II. BACKGROUND We consider a Markov decision process (MDP), where an agent interacts with the environment through a sequence of observations, actions and reward signals. The agent executes an action at ∈ A at time step t from its current state st ∈ S, according to its policy π : S → A. It then receives a reward signal rt : S → R and transits to the next state st+1 according to the dynamics of the environment. We use πE to denote the expert policy. A. Imitation learning Imitation learning aims to learn policies directly from experts, whose demonstrations are only provided in the form of samples of trajectories. Main approaches for imitation learning can be categorized into behavior cloning (BC) and inverse reinforcement learning (IRL) Behavior cloning tackles this problem in a supervised manner, by directly learning the mapping from the states in the recorded trajectories to their corresponding labels: the expert policy. It is conceptually simple and is able to work well with large amounts of training data, but suffers from the compounding error caused by covariate shift, due to its ignorance of the temporal correlation in the recorded trajectories. Thus pure behavior cloning tends to over-fit and is difficult to generalize to unseen scenarios that deviate much from the recorded dataset. Inverse reinforcement learning aims to extract the latent reward or cost function under the optimal expert demonstrations. It imitates by taking the underlying MDP into account, learning from entire trajectories instead of single frames. However, the requirement of running reinforcement learning in an inner loop makes IRL extremely expensive to run [2], [9], [10]. B. Generitive adversarial imitation learning Inspired by Generative adversarial networks (GAN) [15], Ho and Ermon proposed generative adversarial imitation learning (GAIL) [13], which surpasses the intermediate step of learning a reward function, but is able to directly learn a policy from expert demonstrations. In the GAIL model, the generator πθ is forced to generate state-action (S×A) pairs matching that from the expert demonstrations, while the discriminator Dω learns to tell the generated policy πθ (θ denotes the parameters of the generator of the GAIL model) apart from the expert policy πE . The objective of GAIL is to optimize the function below (H(π) represents the causal entropy of the policy): Eπθ [log(D(s, a))] + EπE [log(1 − D(s, a))] − λH(πθ ) (1) Following this objective, the learning procedure of GAIL interleaves between updating the parameters ω of the discriminator Dω to maximize Eq. 1, and performing trust region policy optimization (TRPO) [16] to minimize Eq. 1 with respect to θ, which parameterizes the policy generator πθ . Here, the discrimination scores of the generated samples are regarded as costs (can be viewed as the negative counterpart of rewards) of the state-action pairs in the learning process of TRPO. As a state-of-the-art on policy reinforcement learning method, TRPO constraints the deviation of the updated policy from the original policy according to their KL divergence. We extend the GAIL framework with Wasserstein GAN (WGAN) [17]. In WGAN, the classification formulation of the discriminator network is substituted with a regression problem. By eliminating the usage of softmax in traditional GAN, WGAN directly maximizes the score of the real data and minimizes the score of the generated data. It is proved to improve the training stability of InfoGAIL [14] The objective function of WGAN is: Eπθ [D(s, a)] − EπE [D(s, a))] (2) C. Social force model Helbing and Molnar [1] proposed the social force model for pedestrian dynamics, which is broadly applied to socially compliant navigation scenarios. This model (Eq. 3) computes the acceleration of pedestrians according to the sum of various forces applied to them. Fig. 2: The simulated environment used in this paper. Each pedestrian is behaving under the social force model [1]. The Gazebo plugin is released1 . d~vt = F~desired + F~social + F~obs + F~fluct dt (3) In Eq. 3, F~desired represents the desired force, which drives the vehicle towards its navigation goal; F~social is the social force to measure the influence of nearby pedestrians; F~obs is the obstacle force to keep the agent from colliding with static obstacles in the environment; and F~fluct is the force caused by fluctuations, which comes from the random variations of the environment and the stochastic pedestrian behaviors. Among them, the desired force can be simply represented as λ(pdesired − pt ), where pt and pdesired represent the pose of the agent and the target respectively. It is similar to the concept of prefered velocity in other planning methods [18]. The calculation of the obstacle force F~obs is based on [1] and we will not present the details here. We note that both the estimation of F~obs and F~fluct are omitted in this paper to prioritize the social aspects. To successfully train our model in an interactive manner with all considered social scenarios, an efficient simulation environment that is capable of modeling pedestrians in socially acceptable behaviors is crucial. The existing robotics simulation environments for pedestrians typically do not come with embedded social force model, that the simulated pedestrians are not able to behave in social compliant manner. As an additional contribution of this paper, we release a plugin1 for simulating socially compliant pedestrians under the framework of Gazebo, as is shown in Fig. 2. III. M ETHODS In this paper, we formulate the problem of navigation in pedestrian environment as a Markov decision process (MDP). The state st is composed of the depth image xt and the force towards the desired target F~tdesired . Each action at corresponds to a moving command ut to be executed by the mobile robot. Two parameterised networks, the generator (policy) network πθ and the discriminator network Dω are updated in an interleaving manner in the training phase. a. Passing (easy) b. Overtaking (easy) c. Crossing (easy) d. Passing1 (hard) e. Passing2 (hard) f. Crossing (hard) Fig. 3: Six basic scenarios considered in this paper to compare the navigation performance of the behavior cloning policy and the GAIL policy. We test the algorithm on a mobile robot from the view of the red agent. A. Behavior cloning We initialize the policy generator network πθ with the weights pre-trained via behavior cloning. To collect the training dataset and test the trained model, we identify the following most commonly encountered and typical social scenarios [3], which are shown in Fig. 3. Specifically, we collect trajectories from three relatively easy scenarios: (a) passing, (b) overtaking, (c) crossing, as well as three difficult ones: (d) passing out of a group of pedestrians, (e) passing between a group of pedestrians, and (f) crossing with a group of pedestrians. The differences between scenarios (d) and (e) are intended to motivate socially aware navigation strategies [2] that pedestrians walking close to each other should be regarded as a group, and the agent is expected to decide whether there is enough space between them for it to make a crossing. In our socially compliant pedestrian simulator, we collect data by mounting a depth sensor onto one of the pedestrians, to the height matching that of real-world setups. Then, the social force model, as described by Eq. 3, is used to label each incoming depth image with their corresponding social force. We note that only the pedestrians within the field of view (FOV) of the depth sensor (with a sensing range of 3.5m, and a vertical sensing angles of ±35◦ ), are considered in the social force calculation. Desired force, represented by the normalized direction vector to the navigation target, are also collected as another input source for the model. We assign target locations for each episode, ensuring that the agent would have to encounter with pedestrians in the environment before reaching its targets. As an additional contribution of this paper, we release the collected dataset2 for further benchmarking for the literature. The first person view depth image, RGB image, social force, desired force and velocity of the agent are all recorded and included in the dataset. The final dataset contains 10,000 state-action pairs collected from social scenario shown in Fig. 3. The initial configuration (the 1 https://github.com/onlytailei/gym 2 https://ram-lab.com/file/tailei/tai ped sim 18icra dataset.html State ( ) | 400 x 250 Algorithm 1 Asynchronous GAIL Conv | 32 | 7x7 | 4 ResNet-50 (pre-trained) Conv | 32 | 5x5 | 4 Conv | 32 | 20x20 | 30 Conv | 32 | 3x3 | 2 Concatenate Conv | 32 | 3x3 | 1 Dense | 256 Dense | 128 State ( )|2 Merge ) | 2 Action ( Social Force ( Collect expert trajectories TE . Initialize πθ with the behavior cloning policy θ0 . Randomly initialize Dω with ω0 . for iteration i = 0, 1, . . . do for iteration k = 1, K do Randomly choose a social scenario simulation. Sample one trajectory: Tik ∼ πθi end for Ascending gradients of ωi on mini-batches (κi ∼ Ti , κE ∼ TE ): ∆ω = Eκi [∇ω Dω (s, a)] − EκE [∇ω Dω (s, a)] Update to ωi+1 after clipping the weights to (0.01, 0.01). Update θi to θi+1 with the cost function Dωı+1 (s, a) under the TRPO rule. end for )|2 the generalization ability of the model and prevent overfitting [20]. This setup also makes it possible to transfer our trained model naturally to different motion planners, as the social force prediction part can stay intact regardless of the mobile platforms in use. (a) Generator (policy) network. State ( ) | 400 x 250 action prediction social force prediction Conv | 32 | 3x3 | 4 Conv | 64 | 3x3 | 4 Action ( )|2 Conv | 128 | 3x3 | 4 State ( )|2 Merge Dense | 256 Dense | 128 Score ( evaluation loss 0.125 0.100 0.075 0.050 0.025 0.000 )|1 (b) Discriminator network. Fig. 4: Network structures for the generator and the discriminator network. Every convolutional layer is represented by its type, channel size, kernel size and stride size. Other layers are represented by their types and dimonsions. position and velocity information) of the pedestrians and the agent are perturbed by random noise for each episode. The model for behavior cloning is the same as the generator network of our GAIL model, which is depicted in Fig. 4a. The model takes the depth image and the desired force as input. The depth image is passed through three steams of feature extraction layers, to benefit the resulting representation from the residual learning of skip connection structures [19]. The extracted features are merged with the desired force and then used to predict the expert policies, as well as for performing a subtask: social force prediction. Learning on multiple tasks using the same set of features enforces the extracted features to be an effective and compact representation, which can greatly improve 0 50 100 150 training epochs 200 Fig. 5: Average loss ± one standard deviation for supervised behavior cloning of social force and action predition in 200 epochs. It is used as the initial policy. B. Algorithm The original GAIL [13] requires training one model for each specific task. The trajectories sampled from the environment are quite similar across episodes, which greatly limits the generalization of the trained model. Inspired by various asynchronous methods in the deep reinforcement learning literature (Async-DRL) [21], we propose to perform generative adversarial imitation learning in a modified training procedure. Specifically, during training, our model interacts with several different social scenario simulations in an interleaving manner. The resulting model thus converges to a generalized policy across all social scenarios and is able to perform well on all considered tasks. We note that our proposed method differs from the other Async-DRL methods in that, those previous approaches have multiple instances of the environment of a. Passing (easy) b. Overtaking (easy) c. Crossing (easy) d. Passing1 (hard) e. Passing2 (hard) f. Crossing (hard) 2m Start End Fig. 6: Navigation trajectories of test episodes. In every scenario, the upper part is the performance of the model purely trained from behavior cloning and the lower part is the performance of the model optimized by GAIL. The thickness of the path increases from the starting position of the agent to its ending point. Red paths are the trajectories executed by the mobile robot under the trained policy. The other agents are moving under the social force model [1]. the same task, while for our approach, each instance of the environment corresponds to a different social task. We describe our approach in detail in Algorithm 1. We initialize the generator (policy) network of our GAIL model by the pre-trained weights θ0 from behavior cloning. The discriminator network is initialized randomly with ω0 . In every training step, the trajectories τi are sampled from different social scenario simulations. The sampled trajectories τi and the sampled expert trajectories τE are then fed into the discriminator network. The weight of the discriminator network is clipped between (−0.01, 0.01) to update to ωi+1 , to fulfill the constraint of WGAN [17]. After that, θi is updated to θi+1 , by following the TRPO rule for updating the policy parameters. The discrimination score of the state action pair Dωi+1 (s, a) are used as the cost for policy gradient optimization. As [14], in the trajectories sampling procedure, an augmented cost punishing the collision with pedestrians is added, in case that demonstrations under social force model are not optimal enough. As mentioned before, the generator model has the same architecture as the model used for conducting behavior cloning, which is shown in Fig. 4a. The discriminator, on the other hand, contains only one stream for feature extraction, the resulting features are concatenated with the desired force of the corresponding step. Then, they are merged with the selected action, which is then fed to several fully-connected layers to estimate a score to tell apart generated policies from expert policies. The details of the discriminator architecture are shown in Fig. 4b. IV. E XPERIMENTS We begin our experiment by training the behavior cloning model. First, we collect training data from different social scenario simulations, as shown in Fig. 2. To add to the variations of the training dataset, we collect sample trajectories from the perspective of both the agent (shown in red in Fig. 3) and the pedestrians (shown in blue in Fig. 3). The social force model, as is described in Sec. II-C, is 8 Passing (easy) Overtaking (easy) Crossing (easy) Passing1 (hard) Passing2 (hard) Crossing (hard) 1.6 Passing (easy) Overtaking (easy) Crossing (easy) Passing1 (hard) Passing2 (hard) Crossing (hard) 5 7 9 11 7 1.4 5 average travel-time ratio average min-dist ratio 6 BC GAIL 4 3 1.2 1.0 2 0.8 1 0 1 2 3 4 5 6 7 8 9 10 11 12 (a) min-dist: average minimum distance ratio 0.6 1 2 3 4 6 8 10 12 (b) travel time: average travel time ratio Fig. 7: Average minimum distance to pedestrians and the average travel time of 10 episodes in all test scenarios. Green boxes represent results from the BC policy, and the blue ones show results from the GAIL policy. In every scenario, all the statistics are normalized by dividing the mean of the BC policy. utilized to generate the expert policy. In total, 10,000 stateaction pairs are collected, containing trajectories from all the considered social scenarios, with randomized starting configurations. 2000 samples are separated for evaluating the pre-trained model. To train the behavior cloning model, we use RMSprop with a learning rate of 1e−4, and decay it by a factor of 0.9 after every 20 epochs. We experiment with different weight ratios for the two supervised tasks (social force prediction, action prediction, as shown in Fig. 4a). We can observe from Fig. 5 that those tasks are effectively learned. Then we start the training of our model. As mentioned before, we initialize the generator network of the GAIL policy with the pre-trained behavior cloning model. In every training step, 3 trajectories are sampled from 6 randomly chosen scenarios as Algorithm 1, which add up to a total number of 1000 samples approximately. This training strategy is highly effective for learning a generalized policy over all considered tasks, and greatly improves the generalization capability of our trained model across the most commonly encountered social scenes. We train GAIL for 300 iterations, in a duration of 10 hours, on a Tesla P100 graphics processing unit. The discriminator is optimized through RMSprop with a learning rate of 5e−5. The generator (policy) network is optimized following the TRPO rule. In the following, we present both quantitative and qualitative results, which clearly show the effectiveness our approach. In particular, we can observe that the pre-trained policy via behavior cloning is only able to perform some reactive actions, since it completely ignores the temporal correlations in the sample trajectories, thus is only able to make frame-wise decisions; while the improved policy via GAIL is able to drive the agent to behave in a sociallycompliant manner, due to its underlying formulation that takes the underlying MDP of the trajectories into account, which enables it to make planning decisions on the horizon of a whole trajectory. A. Evaluation in simulated environments To ensure a fair comparison between test runs, we remove all the randomness that is included in the training setups. A simulated Turtlebot3 waffle is used to execute 10 test episodes in each scenario, under both BC policy and GAIL policy, taking the depth image and the desired force as input. The other pedestrian agents in the environment are navigating under the social force model, taking in also the social force from the mobile robot. 1) Qualitative evaluation: Both the trajectories of BC policy and GAIL policy are shown in Fig. 6. For each scenario, we show the BC policy performance in the upper part and the GAIL policy in the lower part. We increase the thickness of the trajectory from the starting point to the ending point. The trajectories of the robot are shown in red, the trajectories of pedestrians are shown blue. We can clearly observe that agent performing under the optimized policy by GAIL is able to navigate in a more sociallycompliant manner in all considered scenarios. In particular, in scenarios (a), (b), (c) and (f), the GAIL policy guides the robot further away from the pedestrians. Also, the GAIL policy successfully guides the mobile robot to pass in between (d) and travel out of (e) a group of pedestrians, which the BC policy fails to accomplish. We note that limited by the small FOV, the robot is only able to perceive the pedestrians when they are fairly nearby, especially in the crossing scenario (c). This leads to some sudden turnings shown in the trajectories. 2) Quantitative evaluation: We choose two metrics to perform quantitative evaluation: (1) min-dist: the minimal distance from the robot to other pedestrians in one episode and (2) travel-time: the time taken by the robot to travel from the starting location to the target. Those statistics are shown in Fig. 7. From Fig. 7, we can observe that our GAIL model performs much better than the behavior cloning baseline. Fig. 7a shows that it clearly converges to a much safer navigation strategy as its average min-dist to pedestrians is larger than that of the baseline in all six social scenarios; as for the travel-time, it plans more efficient paths in most scenarios as can be seen in Fig. 7b, but performs slightly slower than that of behavior cloning in two easy scenarios. Those two statistics show that the GAIL model learns to navigate in a much more socially acceptable way, and is able to plan paths that are both safe and efficient. B. Real world experiments We also conduct real-world experiments to test the performance of our approach in realistic scenarios. We use a Turtlebot waffle platform, which is shown in Fig. 8. It navigates autonomously in an indoor office environment as shown in Fig. 1, under the improved GAIL policy. A low-cost laser range sensor is used to localize the robot in the environment. Navigation targets are chosen randomly on the collision-free areas of the map. The depth image, captured by an obboard Intel Realsense R200, is cropped to 400 × 250 and fed into the trained model. A Nvidia Jetson TX2 is mounted for real-time neural network processing. The model control cycle runs in real-time at 15Hz. A video showing the real-world performance of our trained policy can be found in https://goo.gl/42yf6f. Learned policy desired force Desired force target Target desired force Output velocity Depth input Turtlebot waffle Fig. 8: Real world experiments in an indoor office environment, through a Turtlebot waffle platform by taking raw depth images and desired forces as inputs. V. C ONCLUSION We presented an approach for agents to learn to navigate in a socially compliant manner, from raw depth images. Our algorithm is able to guide the agent to perform socially compliant behaviors, as well as plan efficient paths to reach its goal location. We validated our approach in both simulated and real world experiments; moreover, we release a plugin for simulating pedestrians under social force model, as well as a dataset collected from our simulation environment. The performance of the GAIL policy in real-world environments is influenced by the limited maximum speed and the FOV of the Turtlebot waffle. We leave it as future work to evaluate the proposed algorithm on more compatible platforms. Recent work [22] of real-to-sim domain adaptation for visual control also makes it possible to tackle this problem through raw RGB images. R EFERENCES [1] D. Helbing and P. Molnar, “Social force model for pedestrian dynamics,” Physical review E, vol. 51, no. 5, p. 4282, 1995. [2] M. Pfeiffer, U. Schwesinger, H. Sommer, E. Galceran, and R. Siegwart, “Predicting actions to act predictably: Cooperative partial motion planning with maximum entropy models,” in 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), 2016, pp. 2096–2101. [3] Y. F. Chen, M. Everett, M. Liu, and J. P. How, “Socially aware motion planning with deep reinforcement learning,” in IROS, Sept 2017, pp. 1343–1350. [4] L. Tai, S. Li, and M. Liu, “A deep-network solution towards model-less obstacle avoidance,” in 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), Oct 2016, pp. 2759–2764. [5] P. Mirowski, R. Pascanu, F. Viola, H. Soyer, A. Ballard, A. Banino, M. Denil, R. Goroshin, L. Sifre, K. Kavukcuoglu, et al., “Learning to navigate in complex environments,” in ICLR, 2017. [6] L. Tai, G. Paolo, and M. Liu, “Virtual-to-real deep reinforcement learning: Continuous control of mobile robots for mapless navigation,” in 2017 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), Sep 2017, pp. 31–36. [7] J. Zhang, J. T. Springenberg, J. Boedecker, and W. Burgard, “Deep reinforcement learning with successor features for navigation across similar environments,” in 2017 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), Sep 2017, pp. 2371–2378. [8] J. Zhang, L. Tai, J. Boedecker, W. Burgard, and M. Liu, “Neural slam: Learning to explore with external memory,” arXiv preprint arXiv:1706.09520, 2017. [9] H. Kretzschmar, M. Spies, C. Sprunk, and W. Burgard, “Socially compliant mobile robot navigation via inverse reinforcement learning,” The International Journal of Robotics Research, vol. 35, no. 11, pp. 1289–1307, 2016. [10] B. Okal and K. O. Arras, “Learning socially normative robot navigation behaviors with bayesian inverse reinforcement learning,” in ICRA, May 2016, pp. 2889–2895. [11] A. Y. Ng, S. J. Russell, et al., “Algorithms for inverse reinforcement learning.” in ICML, 2000, pp. 663–670. [12] P. Abbeel and A. Y. Ng, “Apprenticeship learning via inverse reinforcement learning,” in ICML, 2004, p. 1. [13] J. Ho and S. Ermon, “Generative adversarial imitation learning,” in NIPS, 2016, pp. 4565–4573. [14] Y. Li, J. Song, and S. Ermon, “Infogail: Interpretable imitation learning from visual demonstrations,” in NIPS, 2017. [15] I. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley, S. Ozair, A. Courville, and Y. Bengio, “Generative adversarial nets,” in NIPS, 2014. [16] J. Schulman, S. Levine, P. Abbeel, M. Jordan, and P. Moritz, “Trust region policy optimization,” in ICML, 2015, pp. 1889–1897. [17] M. Arjovsky, S. Chintala, and L. Bottou, “Wasserstein gan,” arXiv preprint arXiv:1701.07875, 2017. [18] J. Van den Berg, M. Lin, and D. Manocha, “Reciprocal velocity obstacles for real-time multi-agent navigation,” in 2008 IEEE International Conference on Robotics and Automation, May 2008, pp. 1928–1935. [19] K. He, X. Zhang, S. Ren, and J. Sun, “Deep residual learning for image recognition,” in CVPR, June 2016. [20] I. Goodfellow, Y. Bengio, and A. Courville, Deep Learning. MIT Press, 2016, vol. 1. [21] V. Mnih, A. P. Badia, M. Mirza, A. Graves, T. Lillicrap, T. Harley, D. Silver, and K. Kavukcuoglu, “Asynchronous methods for deep reinforcement learning,” in ICML, 2016. [22] J. Zhang, L. Tai, Y. Xiong, M. Liu, J. Boedecker, and W. Burgard, “Vr goggles for robots: Real-to-sim domain adaptation for visual control,” arXiv preprint arXiv:1802.00265, 2018.
2cs.AI
arXiv:1705.07962v2 [cs.LG] 19 Sep 2017 pix2code: Generating Code from a Graphical User Interface Screenshot Tony Beltramelli UIzard Technologies Copenhagen, Denmark [email protected] Abstract Transforming a graphical user interface screenshot created by a designer into computer code is a typical task conducted by a developer in order to build customized software, websites, and mobile applications. In this paper, we show that deep learning methods can be leveraged to train a model end-to-end to automatically generate code from a single input image with over 77% of accuracy for three different platforms (i.e. iOS, Android and web-based technologies). 1 Introduction The process of implementing client-side software based on a Graphical User Interface (GUI) mockup created by a designer is the responsibility of developers. Implementing GUI code is, however, time-consuming and prevent developers from dedicating the majority of their time implementing the actual functionality and logic of the software they are building. Moreover, the computer languages used to implement such GUIs are specific to each target runtime system; thus resulting in tedious and repetitive work when the software being built is expected to run on multiple platforms using native technologies. In this paper, we describe a model trained end-to-end with stochastic gradient descent to simultaneously learns to model sequences and spatio-temporal visual features to generate variable-length strings of tokens from a single GUI image as input. Our first contribution is pix2code, a novel approach based on Convolutional and Recurrent Neural Networks allowing the generation of computer tokens from a single GUI screenshot as input. That is, no engineered feature extraction pipeline nor expert heuristics was designed to process the input data; our model learns from the pixel values of the input image alone. Our experiments demonstrate the effectiveness of our method for generating computer code for various platforms (i.e. iOS and Android native mobile interfaces, and multi-platform web-based HTML/CSS interfaces) without the need for any change or specific tuning to the model. In fact, pix2code can be used as such to support different target languages simply by being trained on a different dataset. A video demonstrating our system is available online1 . Our second contribution is the release of our synthesized datasets consisting of both GUI screenshots and associated source code for three different platforms. Our datasets and our pix2code implemention are publicly available2 to foster future research. 2 Related Work The automatic generation of programs using machine learning techniques is a relatively new field of research and program synthesis in a human-readable format have only been addressed very recently. 1 2 https://uizard.io/research#pix2code https://github.com/tonybeltramelli/pix2code A recent example is DeepCoder [2], a system able to generate computer programs by leveraging statistical predictions to augment traditional search techniques. In another work by Gaunt et al. [5], the generation of source code is enabled by learning the relationships between input-output examples via differentiable interpreters. Furthermore, Ling et al. [12] recently demonstrated program synthesis from a mixed natural language and structured program specification as input. It is important to note that most of these methods rely on Domain Specific Languages (DSLs); computer languages (e.g. markup languages, programming languages, modeling languages) that are designed for a specialized domain but are typically more restrictive than full-featured computer languages. Using DSLs thus limit the complexity of the programming language that needs to be modeled and reduce the size of the search space. Although the generation of computer programs is an active research field as suggested by these breakthroughs, program generation from visual inputs is still a nearly unexplored research area. The closest related work is a method developed by Nguyen et al. [14] to reverse-engineer Android user interfaces from screenshots. However, their method relies entirely on engineered heuristics requiring expert knowledge of the domain to be implemented successfully. Our paper is, to the best of our knowledge, the first work attempting to address the problem of user interface code generation from visual inputs by leveraging machine learning to learn latent variables instead of engineering complex heuristics. In order to exploit the graphical nature of our input, we can borrow methods from the computer vision literature. In fact, an important number of research [21, 4, 10, 22] have addressed the problem of image captioning with impressive results; showing that deep neural networks are able to learn latent variables describing objects in an image and their relationships with corresponding variable-length textual descriptions. All these methods rely on two main components. First, a Convolutional Neural Network (CNN) performing unsupervised feature learning mapping the raw input image to a learned representation. Second, a Recurrent Neural Network (RNN) performing language modeling on the textual description associated with the input picture. These approaches have the advantage of being differentiable end-to-end, thus allowing the use of gradient descent for optimization. (b) Sampling (a) Training Figure 1: Overview of the pix2code model architecture. During training, the GUI image is encoded by a CNN-based vision model; the context (i.e. a sequence of one-hot encoded tokens corresponding to DSL code) is encoded by a language model consisting of a stack of LSTM layers. The two resulting feature vectors are then concatenated and fed into a second stack of LSTM layers acting as a decoder. Finally, a softmax layer is used to sample one token at a time; the output size of the softmax layer corresponding to the DSL vocabulary size. Given an image and a sequence of tokens, the model (i.e. contained in the gray box) is differentiable and can thus be optimized end-to-end through gradient descent to predict the next token in the sequence. During sampling, the input context is updated for each prediction to contain the last predicted token. The resulting sequence of DSL tokens is compiled to the desired target language using traditional compiler design techniques. 3 pix2code The task of generating computer code written in a given programming language from a GUI screenshot can be compared to the task of generating English textual descriptions from a scene photography. In both scenarios, we want to produce a variable-length strings of tokens from pixel values. We can thus divide our problem into three sub-problems. First, a computer vision problem of understanding the given scene (i.e. in this case, the GUI image) and inferring the objects present, their identities, 2 positions, and poses (i.e. buttons, labels, element containers). Second, a language modeling problem of understanding text (i.e. in this case, computer code) and generating syntactically and semantically correct samples. Finally, the last challenge is to use the solutions to both previous sub-problems by exploiting the latent variables inferred from scene understanding to generate corresponding textual descriptions (i.e. computer code rather than English) of the objects represented by these variables. 3.1 Vision Model CNNs are currently the method of choice to solve a wide range of vision problems thanks to their topology allowing them to learn rich latent representations from the images they are trained on [16, 11]. We used a CNN to perform unsupervised feature learning by mapping an input image to a learned fixed-length vector; thus acting as an encoder as shown in Figure 1. The input images are initially re-sized to 256 × 256 pixels (the aspect ratio is not preserved) and the pixel values are normalized before to be fed in the CNN. No further pre-processing is performed. To encode each input image to a fixed-size output vector, we exclusively used small 3 × 3 receptive fields which are convolved with stride 1 as used by Simonyan and Zisserman for VGGNet [18]. These operations are applied twice before to down-sample with max-pooling. The width of the first convolutional layer is 32, followed by a layer of width 64, and finally width 128. Two fully connected layers of size 1024 applying the rectified linear unit activation complete the vision model. (b) Code describing the GUI written in our DSL (a) iOS GUI screenshot Figure 2: An example of a native iOS GUI written in our markup-like DSL. 3.2 Language Model We designed a simple lightweight DSL to describe GUIs as illustrated in Figure 2. In this work we are only interested in the GUI layout, the different graphical components, and their relationships; thus the actual textual value of the labels is ignored. Additionally to reducing the size of the search space, the DSL simplicity also reduces the size of the vocabulary (i.e. the total number of tokens supported by the DSL). As a result, our language model can perform token-level language modeling with a discrete input by using one-hot encoded vectors; eliminating the need for word embedding techniques such as word2vec [13] that can result in costly computations. In most programming languages and markup languages, an element is declared with an opening token; if children elements or instructions are contained within a block, a closing token is usually needed for the interpreter or the compiler. In such a scenario where the number of children elements contained in a parent element is variable, it is important to model long-term dependencies to be able to close a block that has been opened. Traditional RNN architectures suffer from vanishing and exploding gradients preventing them from being able to model such relationships between data points spread out in time series (i.e. in this case tokens spread out in a sequence). Hochreiter and Schmidhuber proposed the Long Short-Term Memory (LSTM) neural architecture in order to address this very problem [9]. The different LSTM gate outputs can be computed as follows: 3 it ft ot ct ht = φ(Wix xt + Wiy ht−1 + bi ) = φ(Wf x xt + Wf y ht−1 + bf ) = φ(Wox xt + Woy ht−1 + bo ) = ft • ct−1 + it • σ(Wcx xt + Wcy ht−1 + bc ) = ot • σ(ct ) (1) (2) (3) (4) (5) With W the matrices of weights, xt the new input vector at time t, ht−1 the previously produced output vector, ct−1 the previously produced cell state’s output, b the biases, and φ and σ the activation functions sigmoid and hyperbolic tangent, respectively. The cell state c learns to memorize information by using a recursive connection as done in traditional RNN cells. The input gate i is used to control the error flow on the inputs of cell state c to avoid input weight conflicts that occur in traditional RNN because the same weight has to be used for both storing certain inputs and ignoring others. The output gate o controls the error flow from the outputs of the cell state c to prevent output weight conflicts that happen in standard RNN because the same weight has to be used for both retrieving information and not retrieving others. The LSTM memory block can thus use i to decide when to write information in c and use o to decide when to read information from c. We used the LSTM variant proposed by Gers and Schmidhuber [6] with a forget gate f to reset memory and help the network model continuous sequences. 3.3 Decoder Our model is trained in a supervised learning manner by feeding an image I and a contextual sequence X of T tokens xt , t ∈ {0 . . . T − 1} as inputs; and the token xT as the target label. As shown on Figure 1, a CNN-based vision model encodes the input image I into a vectorial representation p. The input token xt is encoded by an LSTM-based language model into an intermediary representation qt allowing the model to focus more on certain tokens and less on others [8]. This first language model is implemented as a stack of two LSTM layers with 128 cells each. The vision-encoded vector p and the language-encoded vector qt are concatenated into a single feature vector rt which is then fed into a second LSTM-based model decoding the representations learned by both the vision model and the language model. The decoder thus learns to model the relationship between objects present in the input GUI image and the associated tokens present in the DSL code. Our decoder is implemented as a stack of two LSTM layers with 512 cells each. This architecture can be expressed mathematically as follows: p = CN N (I) qt = LST M (xt ) rt = (q, pt ) (6) (7) (8) yt = sof tmax(LST M 0 (rt )) xt+1 = yt (9) (10) This architecture allows the whole pix2code model to be optimized end-to-end with gradient descent to predict a token at a time after it has seen both the image as well as the preceding tokens in the sequence. The discrete nature of the output (i.e. fixed-sized vocabulary of tokens in the DSL) allows us to reduce the task to a classification problem. That is, the output layer of our model has the same number of cells as the vocabulary size; thus generating a probability distribution of the candidate tokens at each time step allowing the use of a softmax layer to perform multi-class classification. 3.4 Training The length T of the sequences used for training is important to model long-term dependencies; for example to be able to close a block of code that has been opened. After conducting empirical experiments, the DSL input files used for training were segmented with a sliding window of size 48; in other words, we unroll the recurrent neural network for 48 steps. This was found to be a satisfactory trade-off between long-term dependencies learning and computational cost. For every 4 token in the input DSL file, the model is therefore fed with both an input image and a contextual sequence of T = 48 tokens. While the context (i.e. sequence of tokens) used for training is updated at each time step (i.e. each token) by sliding the window, the very same input image I is reused for samples associated with the same GUI. The special tokens < ST ART > and < EN D > are used to respectively prefix and suffix the DSL files similarly to the method used by Karpathy and Fei-Fei [10]. Training is performed by computing the partial derivatives of the loss with respect to the network weights calculated with backpropagation to minimize the multiclass log loss: L(I, X) = − T X xt+1 log(yt ) (11) t=1 With xt+1 the expected token, and yt the predicted token. The model is optimized end-to-end hence the loss L is minimized with regard to all the parameters including all layers in the CNN-based vision model and all layers in both LSTM-based models. Training with the RMSProp algorithm [20] gave the best results with a learning rate set to 1e − 4 and by clipping the output gradient to the range [−1.0, 1.0] to cope with numerical instability [8]. To prevent overfitting, a dropout regularization [19] set to 25% is applied to the vision model after each max-pooling operation and at 30% after each fully-connected layer. In the LSTM-based models, dropout is set to 10% and only applied to the non-recurrent connections [24]. Our model was trained with mini-batches of 64 image-sequence pairs. Dataset type iOS UI (Storyboard) Android UI (XML) web-based UI (HTML/CSS) 3.5 Table 1: Dataset statistics. Training set Synthesizable Instances Samples 26 × 105 1500 93672 21 × 106 1500 85756 31 × 104 1500 143850 Test set Instances Samples 250 15984 250 14265 250 24108 Sampling To generate DSL code, we feed the GUI image I and a contextual sequence X of T = 48 tokens where tokens xt . . . xT −1 are initially set empty and the last token of the sequence xT is set to the special < ST ART > token. The predicted token yt is then used to update the next sequence of contextual tokens. That is, xt . . . xT −1 are set to xt+1 . . . xT (xt is thus discarded), with xT set to yt . The process is repeated until the token < EN D > is generated by the model. The generated DSL token sequence can then be compiled with traditional compilation methods to the desired target language. (b) Micro-average ROC curves (a) pix2code training loss Figure 3: Training loss on different datasets and ROC curves calculated during sampling with the model trained for 10 epochs. 5 4 Experiments Access to consequent datasets is a typical bottleneck when training deep neural networks. To the best of our knowledge, no dataset consisting of both GUI screenshots and source code was available at the time this paper was written. As a consequence, we synthesized our own data resulting in the three datasets described in Table 1. The column Synthesizable refers to the maximum number of unique GUI configuration that can be synthesized using our stochastic user interface generator. The columns Instances refers to the number of synthesized (GUI screenshot, GUI code) file pairs. The columns Samples refers to the number of distinct image-sequence pairs. In fact, training and sampling are done one token at a time by feeding the model with an image and a sequence of tokens obtained with a sliding window of fixed size T . The total number of training samples thus depends on the total number of tokens written in the DSL files and the size of the sliding window. Our stochastic user interface generator is designed to synthesize GUIs written in our DSL which is then compiled to the desired target language to be rendered. Using data synthesis also allows us to demonstrate the capability of our model to generate computer code for three different platforms. Table 2: Experiments results reported for the test sets described in Table 1. Error (%) Dataset type greedy search beam search 3 beam search 5 iOS UI (Storyboard) 22.73 25.22 23.94 Android UI (XML) 22.34 23.58 40.93 web-based UI (HTML/CSS) 12.14 11.01 22.35 Our model has around 109 × 106 parameters to optimize and all experiments are performed with the same model with no specific tuning; only the training datasets differ as shown on Figure 3. Code generation is performed with both greedy search and beam search to find the tokens that maximize the classification probability. To evaluate the quality of the generated output, the classification error is computed for each sampled DSL token and averaged over the whole test dataset. The length difference between the generated and the expected token sequences is also counted as error. The results can be seen on Table 2. Figures 4, 5, and 6 show samples consisting of input GUIs (i.e. ground truth), and output GUIs generated by a trained pix2code model. It is important to remember that the actual textual value of the labels is ignored and that both our data synthesis algorithm and our DSL compiler assign randomly generated text to the labels. Despite occasional problems to select the right color or the right style for specific GUI elements and some difficulties modelling GUIs consisting of long lists of graphical components, our model is generally able to learn the GUI layout in a satisfying manner and can preserve the hierarchical structure of the graphical elements. (a) Groundtruth GUI 1 (b) Generated GUI 1 (c) Groundtruth GUI 2 Figure 4: Experiment samples for the iOS GUI dataset. 6 (d) Generated GUI 2 5 Conclusion and Discussions In this paper, we presented pix2code, a novel method to generate computer code given a single GUI image as input. While our work demonstrates the potential of such a system to automate the process of implementing GUIs, we only scratched the surface of what is possible. Our model consists of relatively few parameters and was trained on a relatively small dataset. The quality of the generated code could be drastically improved by training a bigger model on significantly more data for an extended number of epochs. Implementing a now-standard attention mechanism [1, 22] could further improve the quality of the generated code. Using one-hot encoding does not provide any useful information about the relationships between the tokens since the method simply assigns an arbitrary vectorial representation to each token. Therefore, pre-training the language model to learn vectorial representations would allow the relationships between tokens in the DSL to be inferred (i.e. learning word embeddings such as word2vec [13]) and as a result alleviate semantical error in the generated code. Furthermore, one-hot encoding does not scale to very big vocabulary and thus restrict the number of symbols that the DSL can support. (a) Groundtruth GUI 5 (b) Generated GUI 5 (c) Groundtruth GUI 6 (d) Generated GUI 6 Figure 5: Experiment samples from the web-based GUI dataset. Generative Adversarial Networks GANs [7] have shown to be extremely powerful at generating images and sequences [23, 15, 25, 17, 3]. Applying such techniques to the problem of generating computer code from an input image is so far an unexplored research area. GANs could potentially be used as a standalone method to generate code or could be used in combination with our pix2code model to fine-tune results. A major drawback of deep neural networks is the need for a lot of training data for the resulting model to generalize well on new unseen examples. One of the significant advantages of the method we described in this paper is that there is no need for human-labelled data. In fact, the network can model the relationships between graphical components and associated tokens by simply being trained on image-sequence pairs. Although we used data synthesis in our paper partly to demonstrate the capability of our method to generate GUI code for various platforms; data synthesis might not be needed at all if one wants to focus only on web-based GUIs. In fact, one could imagine crawling the World Wide Web to collect a dataset of HTML/CSS code associated with screenshots of rendered websites. Considering the large number of web pages already available online and the fact that new websites are created every day, the web could theoretically supply a virtually unlimited amount of 7 training data; potentially allowing deep learning methods to fully automate the implementation of web-based GUIs. (a) Groundtruth GUI 3 (b) Generated GUI 3 (c) Groundtruth GUI 4 (d) Generated GUI 4 Figure 6: Experiment samples from the Android GUI dataset. References [1] D. Bahdanau, K. Cho, and Y. Bengio. Neural machine translation by jointly learning to align and translate. arXiv preprint arXiv:1409.0473, 2014. [2] M. Balog, A. L. Gaunt, M. Brockschmidt, S. Nowozin, and D. Tarlow. Deepcoder: Learning to write programs. arXiv preprint arXiv:1611.01989, 2016. [3] B. Dai, D. Lin, R. Urtasun, and S. Fidler. Towards diverse and natural image descriptions via a conditional gan. arXiv preprint arXiv:1703.06029, 2017. [4] J. Donahue, L. Anne Hendricks, S. Guadarrama, M. Rohrbach, S. Venugopalan, K. Saenko, and T. Darrell. Long-term recurrent convolutional networks for visual recognition and description. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 2625–2634, 2015. [5] A. L. Gaunt, M. Brockschmidt, R. Singh, N. Kushman, P. Kohli, J. Taylor, and D. Tarlow. Terpret: A probabilistic programming language for program induction. arXiv preprint arXiv:1608.04428, 2016. [6] F. A. Gers, J. Schmidhuber, and F. Cummins. Learning to forget: Continual prediction with lstm. Neural computation, 12(10):2451–2471, 2000. [7] I. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley, S. Ozair, A. Courville, and Y. Bengio. Generative adversarial nets. In Advances in neural information processing systems, pages 2672–2680, 2014. [8] A. Graves. Generating sequences with recurrent neural networks. arXiv:1308.0850, 2013. arXiv preprint [9] S. Hochreiter and J. Schmidhuber. Long short-term memory. Neural computation, 9(8):1735– 1780, 1997. [10] A. Karpathy and L. Fei-Fei. Deep visual-semantic alignments for generating image descriptions. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 3128–3137, 2015. [11] A. Krizhevsky, I. Sutskever, and G. E. Hinton. Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems, pages 1097–1105, 2012. [12] W. Ling, E. Grefenstette, K. M. Hermann, T. Kočiskỳ, A. Senior, F. Wang, and P. Blunsom. Latent predictor networks for code generation. arXiv preprint arXiv:1603.06744, 2016. 8 [13] T. Mikolov, I. Sutskever, K. Chen, G. S. Corrado, and J. Dean. Distributed representations of words and phrases and their compositionality. In Advances in neural information processing systems, pages 3111–3119, 2013. [14] T. A. Nguyen and C. Csallner. Reverse engineering mobile application user interfaces with remaui (t). In Automated Software Engineering (ASE), 2015 30th IEEE/ACM International Conference on, pages 248–259. IEEE, 2015. [15] S. Reed, Z. Akata, X. Yan, L. Logeswaran, B. Schiele, and H. Lee. Generative adversarial text to image synthesis. In Proceedings of The 33rd International Conference on Machine Learning, volume 3, 2016. [16] P. Sermanet, D. Eigen, X. Zhang, M. Mathieu, R. Fergus, and Y. LeCun. Overfeat: Integrated recognition, localization and detection using convolutional networks. arXiv preprint arXiv:1312.6229, 2013. [17] R. Shetty, M. Rohrbach, L. A. Hendricks, M. Fritz, and B. Schiele. Speaking the same language: Matching machine to human captions by adversarial training. arXiv preprint arXiv:1703.10476, 2017. [18] K. Simonyan and A. Zisserman. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556, 2014. [19] N. Srivastava, G. E. Hinton, A. Krizhevsky, I. Sutskever, and R. Salakhutdinov. Dropout: a simple way to prevent neural networks from overfitting. Journal of Machine Learning Research, 15(1):1929–1958, 2014. [20] T. Tieleman and G. Hinton. Lecture 6.5-rmsprop: Divide the gradient by a running average of its recent magnitude. COURSERA: Neural networks for machine learning, 4(2), 2012. [21] O. Vinyals, A. Toshev, S. Bengio, and D. Erhan. Show and tell: A neural image caption generator. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 3156–3164, 2015. [22] K. Xu, J. Ba, R. Kiros, K. Cho, A. C. Courville, R. Salakhutdinov, R. S. Zemel, and Y. Bengio. Show, attend and tell: Neural image caption generation with visual attention. In ICML, volume 14, pages 77–81, 2015. [23] L. Yu, W. Zhang, J. Wang, and Y. Yu. Seqgan: sequence generative adversarial nets with policy gradient. arXiv preprint arXiv:1609.05473, 2016. [24] W. Zaremba, I. Sutskever, and O. Vinyals. Recurrent neural network regularization. arXiv preprint arXiv:1409.2329, 2014. [25] H. Zhang, T. Xu, H. Li, S. Zhang, X. Huang, X. Wang, and D. Metaxas. Stackgan: Text to photo-realistic image synthesis with stacked generative adversarial networks. arXiv preprint arXiv:1612.03242, 2016. 9
2cs.AI
On the Quantitative Hardness of CVP Huck Bennett∗ [email protected] Alexander Golovnev†‡ [email protected] Noah Stephens-Davidowitz∗§ [email protected] arXiv:1704.03928v2 [cs.CC] 5 Oct 2017 Abstract For odd integers p ≥ 1 (and p = ∞), we show that the Closest Vector Problem in the `p norm (CVPp ) over rank n lattices cannot be solved in 2(1−ε)n time for any constant ε > 0 unless the Strong Exponential Time Hypothesis (SETH) fails. We then extend this result to “almost all” values of p ≥ 1, not including the even integers. This comes tantalizingly close to settling the quantitative time complexity of the important special case of CVP2 (i.e., CVP in the Euclidean norm), for which a 2n+o(n) -time algorithm is known. In particular, our result applies for any p = p(n) 6= 2 that approaches 2 as n → ∞. We also show a similar SETH-hardness result for SVP∞ ; hardness of approximating CVPp to within some constant factor under the so-called Gap-ETH assumption; and other quantitative hardness results for CVPp and CVPPp for any 1 ≤ p < ∞ under different assumptions. ∗ Courant Institute of Mathematical Sciences, New York University. Yahoo Research. ‡ Part of this work was done while the author was at Courant Institute of Mathematical Sciences, and was supported by the National Science Foundation under Grant No. CCF-1320188. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation. § Supported by the National Science Foundation (NSF) under Grant No. CCF-1320188, and the Defense Advanced Research Projects Agency (DARPA) and Army Research Office (ARO) under Contract No. W911NF-15-C-0236. † 1 Introduction A lattice L is the set of all integer combinations of linearly independent basis vectors b1 , . . . , bn ∈ Rd , L = L(b1 , . . . , bn ) := n nX o zi bi : zi ∈ Z . i=1 We call n the rank of the lattice L and d the dimension or the ambient dimension. The two most important computational problems on lattices are the Shortest Vector Problem (SVP) and the Closest Vector Problem (CVP). Given a basis for a lattice L ⊂ Rd , SVP asks us to compute the minimal length of a non-zero vector in L, and CVP asks us to compute the distance from some target point t ∈ Rd to the lattice. Typically, we define length and distance in terms of the `p norm for some 1 ≤ p ≤ ∞, given by kxkp := (|x1 |p + |x2 |p + · · · + |xd |p )1/p for finite p and kxk∞ := max |xi | . 1≤i≤d In particular, the `2 norm is the familiar Euclidean norm, and it is by far the best studied in this context. We write SVPp and CVPp for the respective problems in the `p norm. CVP is known to be at least as hard as SVP (in any norm, under an efficient reduction that preserves the rank and approximation factor) [GMSS99] and appears to be strictly harder. Starting with the breakthrough work of Lenstra, Lenstra, and Lovász in 1982 [LLL82], algorithms for solving these problems in both their exact and approximate forms have found innumerable applications, including factoring polynomials over the rationals [LLL82], integer programming [Len83, Kan87, DPV11], cryptanalysis [Sha84, Odl90, JS98, NS01], etc. More recently, many cryptographic primitives have been constructed whose security is based on the worst-case hardness of these or closely related lattice problems [Ajt04, Reg09, GPV08, Pei08, Pei16]. Given the obvious importance of these problems, their complexity is quite well studied. Below, we survey some of these results. We focus on algorithms for the exact and near-exact problems since these are most relevant to our work and because the best known algorithms for the approximate variants of these problems typically use algorithms for the exact problems as subroutines [Sch87, GN08, MW16]. (Many of the results described below are also summarized in Table 1.) 1.1 Algorithms for SVP and CVP The current fastest known algorithms for solving The AKS algorithm and its descendants. SVPp all use the celebrated randomized sieving technique due to Ajtai, Kumar, and Sivakumar [AKS01]. The original algorithm from [AKS01] was the first 2O(n) -time algorithm for SVP, and it worked for both p = 2 and p = ∞. In the p = 2 case, a sequence of works improved upon the constant in the exponent [NV08, PS09, MV10, LWXZ11], and the current fastest running time of an algorithm that provably solves SVP2 exactly is 2n+o(n) [ADRS15].1 While progress has slowed, this seems unlikely to be the end of the story. Indeed, there are heuristic sieving algorithms that run in time (3/2)n/2+o(n) [NV08, 1 The algorithm in [ADRS15] is quite a bit different than the other algorithms in this class, but it can still be thought of as a sieving algorithm. 1 WLTB11, Laa15, BDGL16], and there is some reason to believe that the provably correct [ADRS15] algorithm can be improved. In particular, there is a provably correct 2n/2+o(n) -time algorithm that approximates SVP2 up to a small constant approximation factor [ADRS15]. A different line of work extended the randomized sieving approach of [AKS01] to obtain 2O(n) time algorithms for SVP in additional norms. In particular, Blömer and Naewe extended it to all `p norms [BN09]. Subsequent work extended this further, first to arbitrary symmetric norms [AJ08] and then to the “near-symmetric norms” that arise in integer programming [Dad12]. Finally, a third line of work extended the [AKS01] approach to approximate CVP. Ajtai, Kumar, and Sivakumar themselves showed a 2O(n) -time algorithm for approximating CVP2 to within any constant approximation factor strictly greater than one [AKS02]. Blömer and Naewe obtained the same result for all `p norms [BN09], and Dadush extended it further to arbitrary symmetric norms and again to “near-symmetric norms” [Dad12]. We stress, however, that none of these results apply to exact CVP, and indeed, there are some barriers to extending these algorithms to exact CVP. (See, e.g., [ADS15].) Exact CVP appears to be a much more subtle problem than Exact algorithms for CVP. 2 exact SVP. Indeed, progress on exact CVP has been much slower than the progress on exact SVP. Over a decade after [AKS01], Micciancio and Voulgaris presented the first 2O(n) -time algorithm for exact CVP2 [MV13], using elegant new techniques built upon the approach of Sommer, Feder, and Shalvi [SFS09]. Specifically, they achieved a running time of 4n+o(n) , and subsequent work even showed a running time of 2n+o(n) for CVP2 with Preprocessing (in which the algorithm is allowed access to arbitrary advice that depends on the lattice but not the target vector; see Section 2.1) [BD15]. Later, [ADS15] showed a 2n+o(n) -time algorithm for CVP2 , so that the current best known asymptotic running time is actually the same for SVP2 and CVP2 . However, for p = 6 2, progress for exact CVPp has been minimal. Indeed, the fastest known algorithms for exact CVPp with p 6= 2 are still the nO(n) -time enumeration algorithms first developed by Kannan in 1987 [Kan87, DPV11, MW15]. Both algorithms for exact CVP2 mentioned in the previous paragraph use many special properties of the `2 norm, and it seems that substantial new ideas would be required to extend them to arbitrary `p norms. 1.2 Hardness of SVP and CVP Van Emde Boas showed the NP-hardness of CVPp for any p and SVP∞ in 1981 [vEB81]. Extending this to SVPp for finite p was a major open problem until it was proven (via a randomized reduction) for all 1 ≤ p ≤ ∞ by Ajtai in 1998 [Ajt98]. There has since been much follow-up work, showing the hardness of these problems for progressively larger approximation factors, culminating in NP-hardness of approximating CVPp up to a factor of nc/ log log n for some constant c > 0 [ABSS93, DKRS03] and hardness of SVPp with the same approximation factor under plausible complexity-theoretic assumptions [CN98, Mic01b, Kho05, HR12]. These results are nearly the best possible under √ plausible assumptions, since approximating either problem up to a factor of n is known to be in NP ∩ coNP [GG00, AR05, Pei08]. 2 In particular, there can be arbitrarily many lattice points that are approximate closest vectors, which makes sieving techniques seemingly useless for solving exact CVP. (See, e.g., [ADS15] for a discussion of this issue.) We note, however, that hardness results (including ours) tend to produce CVP instances with a bounded number of approximate closest vectors (e.g., 2O(n) ). 2 However, such results only rule out the possibility of polynomial-time algorithms (under reasonable complexity-theoretic assumptions). They say very little about the quantitative hardness of these problems for a fixed lattice rank n.3 This state of affairs is quite frustrating for two reasons. First, in the specific case of CVP2 , algorithmic progress has reached an apparent barrier. In particular, both known techniques for solving exact CVP2 in singly exponential time are fundamentally unable to produce algorithms whose running time is asymptotically better than the current best of 2n+o(n) [MV13, ADS15].4 Second, some lattice-based cryptographic constructions are close to deployment [ADPS16, BCD+ 16, NIS16]. In order to be practically secure, these constructions require the quantitative hardness of certain lattice problems, and so their designers rely on quantitative hardness assumptions [APS15]. If, for example, there existed a 2n/20 -time algorithm for SVPp or CVPp , then these cryptographic schemes would be insecure in practice. We therefore move in a different direction. Rather than trying to extend non-quantitative hardness results to larger approximation factors, we show quantitative hardness results for exact (or nearly exact) problems. To do this, we use the tools of fine-grained complexity. 1.3 Fine-grained complexity Impagliazzo and Paturi [IP99] introduced the Exponential Time Hypothesis (ETH) and the Strong Exponential Time Hypothesis (SETH) to help understand the precise hardness of k-SAT. Informally, ETH asserts that 3-SAT takes 2Ω(n) -time to solve in the worst case, and SETH asserts that k-SAT takes essentially 2n -time to solve for unbounded k. I.e., SETH asserts that brute-force search is essentially optimal for solving k-SAT for large k. Recently, the study of fine-grained complexity has leveraged ETH, SETH, and several other assumptions to prove quantitative hardness results about a wide range of problems. These include both problems in P (see, e.g., [CLR+ 14, BI15, ABW15] and the survey by Vassilevska Williams [Wil15]), and NP-hard problems (see, e.g., [PW10, CDL+ 12, CFK+ 15]). Although these results are all conditional, they help to explain why making further algorithmic progress on these problems is difficult—and suggest that it might be impossible. Namely, any non-trivial algorithmic improvement would disprove a very well-studied hypothesis. One proves quantitative hardness results using fine-grained reductions (see [Wil15] for a formal definition). For example, there is an efficient mapping from k-SAT formulas on n variables to Hitting Set instances with universes of n elements [CDL+ 12]. This reduction is fine-grained in the sense that for any constant ε > 0, a 2(1−ε)n -time algorithm for Hitting Set implies a 2(1−ε)n -time algorithm for k-SAT, breaking SETH. Despite extensive effort, no faster-than-2n -time algorithm for k-SAT with unbounded k has been found. Nevertheless, there is no consensus on whether SETH is true or not, and recently, Williams [Wil16] refuted a very strong variant of SETH. This makes it desirable to base quantitative hardness results on weaker assumptions when possible, and indeed our main result holds even 3 One can derive certain quantitative hardness results from known hardness proofs, but in most cases the resulting lower bounds are quite weak. The only true quantitative hardness results known prior to this work were a folklore ETH-hardness result for CVP and an unpublished result due to Samuel Yeom, showing that CVP cannot be solved in −4 time 210 n under plausible complexity-theoretic assumptions [Vai15]. (In Section 6.2, we present a similar proof of a stronger statement.) 4 Both techniques require short vectors in each of the 2n cosets of L mod 2L (though for apparently different reasons). 3 Problem Upper Bound CVPp CVP2 CVP∞ /SVP∞ CVPPp nO(n) (2O(n) ) 2n O(n) 2 O(n) n (2O(n) ) SETH 2n — 2n * — Lower Bounds Max-2-SAT ETH 2ωn/3 2Ω(n) 2ωn/3 2Ω(n) — 2Ω(n) √ √ 2Ω( n) 2Ω( n) Notes Gap-ETH 2Ω(n) * 2Ω(n) * 2Ω(n) * — “almost all” p ∈ / 2Z Table 1: Summary of known quantitative upper and lower bounds, with new results in blue. Upper bounds in parentheses hold for any constant approximation factor strictly greater than one, and lower bounds with a ∗ apply for some constant approximation factor strictly greater than one. ω is the matrix multiplication exponent, satisfying 2 ≤ ω < 2.373. We have suppressed smaller factors. assuming a weaker variant of SETH based on the hardness of Weighted Max-k-SAT (except for the case of p = ∞). 1.4 Our contribution We now enumerate our results. See also Table 1. SETH-hardness of CVPp . Our main result is the SETH-hardness of CVPp for any odd integer p ≥ 1 and p = ∞ (and SVP∞ ). Formally, we prove the following. (See Sections 3 and 4 for finite p and Section 6.3 for p = ∞.) Theorem 1.1. For any constant integer k ≥ 2 and any odd integer p ≥ 1 or p = ∞, there is an efficient reduction from k-SAT with n variables and m clauses to CVPp (or SVP∞ ) on a lattice of rank n (with ambient dimension n + O(m)). In particular, there is no 2(1−ε)n -time algorithm for CVPp for any odd integer p ≥ 1 or p = ∞ (or SVP∞ ) and any constant ε > 0 unless SETH is false. Unfortunately, we are unable to extend this result to even integers p, and in particular, to the important special case of p = 2. In fact, this is inherent, as we show that our approach necessarily fails for even integers p ≤ k − 1. In spite of this, we actually prove the following result that generalizes Theorem 1.1 to “almost all” p ≥ 1 (including non-integer p). Theorem 1.2. For any constant integer k ≥ 2, there is an efficient reduction from k-SAT with n variables and m clauses to CVPp on a lattice of rank n (with ambient dimension n + O(m)) for any p ≥ 1 such that 1. p is an odd integer or p = ∞; 2. p ∈ / Sk , where Sk is some finite set (containing all even integers p ≤ k − 1); or 3. p = p0 + δ(n) for any p0 ≥ 1 and any δ(n) 6= 0 that converges to zero as n → ∞. In particular, if SETH holds then for any constant ε > 0, there is no 2(1−ε)n -time algorithm for CVPp for any p ≥ 1 such that 1. p is an odd integer or p = ∞; 4 2. p ∈ / Sk for some sufficiently large k (depending on ε); or 3. p = p0 + δ(n). Notice that this lower bound (Theorem 1.2) comes tantalizingly close to resolving the quantitative complexity of CVP2 . In particular, we obtain a 2n -time lower bound on CVP2+δ for any 0 6= δ(n) = o(1), and the fastest algorithm for CVP2 run in time 2n+o(n) . But, formally, Theorems 1.1 and 1.2 say nothing about CVP2 . (Indeed, there is at least some reason to believe that CVP2 is easier than CVPp for p 6= 2 [RR06].) We note that our reductions actually work for Weighted Max-k-SAT for all finite p = 6 ∞, so that our hardness result holds under a weaker assumption than SETH, namely, the corresponding hypothesis for Weighted Max-k-SAT. Finally, we note that in the special case of p = ∞, our reduction works even for approximate CVP∞ , or even approximate SVP∞ , with an approximation factor of γ := 1 + 2/(k − 1). In particular, γ is constant for fixed k. This implies that for every constant ε > 0, there is a constant γε > 1 such that no 2(1−ε)n -time algorithm approximates SVP∞ or CVP∞ to within a factor of γε unless SETH fails. As we discussed above, many 2O(n) -time Quantitative hardness of approximate CVP. algorithms for CVPp only work for γ-approximate CVPp for constant approximation factors γ > 1. However, the reduction described above only works for exact CVPp (except when p = ∞).5 So, it would be preferable to show hardness for some constant approximation factor γ > 1. One way to show such a hardness result is via a fine-grained reduction from the problem of approximating Max-k-SAT to within a constant factor. Indeed, in the k = 2 case, we show that such a reduction exists, so that there is no 2o(n) -time algorithm for approximating CVPp to within some constant factor unless a 2o(n) -time algorithm exists for approximating Max-2-SAT. We also note that a 2o(n) -time algorithm for approximating Max-2-SAT to within a constant factor would imply one for Max-3-SAT as well. (See Proposition 2.12.) We present this result informally here (without worrying about specific parameters and the exact definition of approximate Max-2-SAT). See Section 5 for the formal statement. Theorem 1.3. There is an efficient reduction from approximating Max-2-SAT with n variables and m clauses to within a constant factor to approximating CVPp to within a constant factor on a lattice of rank n (with ambient dimension n + O(m)) for any finite p ≥ 1. Quantitative hardness of CVP with Preprocessing. CVP with Preprocessing (CVPP) is the variant of CVP in which we are allowed arbitrary advice that depends on the lattice, but not the target vector. CVPP and its variants have potential applications in both cryptography (e.g., [GPV08]) and cryptanalysis. And, an algorithm for CVPP2 is used as a subroutine in the celebrated Micciancio-Voulgaris algorithm for CVP2 [MV13, BD15]. The complexity of CVPPp is well studied, with both hardness of approximation results [Mic01a, FM04, Reg04, AKKV11, KPV14], and efficient approximation algorithms [AR05, DRS14]. We prove the following quantitative hardness result for CVPPp . (See Section 6.1.) 5 One can likely show that our “exact” reductions actually work for γ-approximate CVPp with some approximation factor γ = 1 + o(1). But, this is not very interesting because standard techniques for “boosting” the approximation factor are useless for us. (They increase the rank far too much.) 5 √ Theorem 1.4. For any 1 ≤ p < ∞, there is no 2o( n) -time algorithm for CVPP unless there is a (non-uniform) 2o(n) -time algorithm for Max-2-SAT. In particular, no such algorithm exists unless (non-uniform) ETH fails. Additional quantitative hardness results for CVPp . We also observe the following weaker hardness result for CVPp for any 1 ≤ p < ∞ based on different assumptions. The ETH-hardness of CVPp was already known in folklore, and even written down by Samuel Yeom in unpublished work [Vai15]. We present a slightly stronger theorem than what was previously known, showing a reduction from Max-2-SAT on n variables to CVPp on a lattice of rank n. (Prior to this work, we were only aware of reductions from 3-SAT on n variables to CVPp on a lattice of rank Cn for some very large constant C > 1000.) Theorem 1.5. For any 1 ≤ p < ∞, there is an efficient reduction from Max-2-SAT with n variables to CVPp on a lattice of rank n (and dimension n + m, where m is the number of clauses). In particular, for any constant c > 0, there is no (poly(n) · 2cn )-time algorithm for CVPp unless there is a 2cn -time algorithm for Max-2-SAT, and there is no 2o(n) -time algorithm for CVPp unless ETH fails. The fastest known algorithm for the Max-2-SAT problem is the poly(n) · 2ωn/3 -time algorithm due to Williams [Wil05], where 2 ≤ ω < 2.373 is the matrix multiplication exponent [Wil12, LG14]. This implies that a faster than 2ωn/3 -time algorithm for CVPp (and CVP2 in particular) would yield a faster algorithm for Max-2-SAT. (See, e.g., [Woe08] Open Problem 4.7 and the preceding discussion.) 1.5 Techniques Max-2-SAT. We first show a straightforward reduction from Max-2-SAT to CVPp for any 1 ≤ p < ∞. I.e., we prove Theorem 1.5. This simple reduction will introduce some of the high-level ideas needed for our more difficult reductions. Given a Max-2-SAT instance Φ with n variables and m clauses, we construct the lattice basis B := Φ̄ 2αIn ! , (1) where α > 0 is some very large number and Φ̄ ∈ Rm×n is given by Φ̄i,j :=    2 −2   0 if the ith clause contains xj , if the ith clause contains ¬xj , otherwise . (2) I.e., the rows of Φ̄ correspond to clauses and the columns correspond to variables. Each entry encodes whether the relevant variable is included in the relevant clause unnegated, negated, or not at all, using 2, −2, and 0 respectively. (We assume without loss of generality that no clause contains repeated literals or a literal and its negation simultaneously.) The target t ∈ Rm+n is given by t := (t1 , t2 , . . . , tm , α, α, . . . , α)T , (3) ti := 3 − 2ηi , (4) where 6 where ηi is the number of negated variables in the ith clause. Notice that the copy of 2αIn at the bottom of B together with the sequence of α’s in the last coordinates of t guarantee that any lattice vector Bz with z ∈ Zn is at distance at least αn1/p away from t. Furthermore, if z ∈ / {0, 1}n , then this distance increases to at least α(n − 1 + 3p )1/p . This is a standard gadget, which will allow us to ignore the case z ∈ / {0, 1}n (as long as α is large enough). I.e., we can view z as an assignment to the n variables of Φ. Now, suppose z does not satisfy the ith clause. Then, notice that the ith coordinate of Bz will be exactly −2ηi , so that (Bz − t)i = 0 − 3 = −3. If, on the other hand, exactly one literal in the ith clause is satisfied, then the ith coordinate of Bz will be 2−2ηi , so that (Bz−t)i = 2−3 = −1. Finally, if both literals are satisfied, then the ith coordinate will be 4 − 2ηi , so that (Bz − t)i = 4 − 3 = 1. In particular, if the ith clause is not satisfied, then |(Bz − t)i | = 3. Otherwise, |(Bz − t)i | = 1. It follows that the distance to the target is exactly distp (t, L)p = αp n + S + 3p (m − S) = p α n − (3p − 1)S + 3p m, where S is the maximal number of satisfied clauses of Φ. So, the distance distp (t, L) tells us exactly the maximum number of satisfiable clauses, which is what we needed. Difficulties extending this to k-SAT. The above reduction relied on one very important fact: that |4 − 3| = |2 − 3| < |0 − 3|. In particular, a 2-SAT clause can be satisfied in two different ways; either one variable is satisfied or two variables are satisfied. We designed our CVP instance above so that the ith coordinate of Bz − t is 4 − 3 if two literals in the ith clause are satisfied by z ∈ {0, 1}n , 2 − 3 if one literal is satisfied, and 0 − 3 if the clause is unsatisfied. Since |4 − 3| = |2 − 3|, the “contribution” of this ith coordinate to the distance kBz − tkpp is the same for any satisfied clause. Since |0 − 3| > |4 − 3|, the contribution to the ith coordinate is larger for unsatisfied clauses than satisfied clauses. Suppose we tried the same construction for a k-SAT instance. I.e., suppose we take Φ̄ ∈ Rm×n to encode the literals in each clause as in Eq. (2) and construct our lattice basis B as in Eq. (1) and target t as in Eq. (3), perhaps with the number 3 in the definition of t replaced by an arbitrary t∗ ∈ R. Then, the ith coordinate of Bz − t would be 2Si − t∗ , where Si is the number of literals satisfied in the ith clause. No matter how cleverly we choose t∗ ∈ R, some satisfied clauses will contribute more to the distance than others as long as k ≥ 3. I.e., there will always be some “imbalance” in this contribution. As a result, we will not be able to distinguish between, e.g., an assignment that satisfies all clauses but has Si far from t∗ /2 for all i and an assignment that satisfies fewer clauses but has Si ≈ t∗ /2 whenever i corresponds to a satisfying clause. In short, for k ≥ 3, we run into trouble because satisfying assignments to a clause may satisfy anywhere between 1 and k literals, but k distinct numbers obviously cannot all be equidistant from some number t∗ . (See Section 6.2 for a simple way to get around this issue by adding to the rank of the lattice. Below, we show a more technical way to do this without adding to the rank of the lattice, which allows us to prove SETH-hardness.) A solution via isolating parallelepipeds. To get around the issue described above for k ≥ 3, we first observe that, while many distinct numbers cannot all be equidistant from some number t∗ , ∗ ∗ it is trivial to find many distinct vectors in Rd that are equidistant from some vector t∗ ∈ Rd . We therefore consider modifying the reduction from above by replacing the scalar ±2 values in our ∗ ∗ matrix Φ̄ with vectors in Rd for some d∗ . In particular, for some vectors V = (v 1 , . . . , v k ) ∈ Rd ×k , 7 we define Φ̄ ∈ Rd ∗ m×n as Φ̄i,j    vs −v s :=   0 d if xj is the sth literal in the ith clause, if ¬xj is the sth literal in the ith clause, otherwise , (5) where we have abused notation and taken Φ̄i,j to be a column vector in d∗ dimensions. By defining ∗ t ∈ Rd m+n appropriately,6 we will get that the “contribution of the ith clause to the distance” ∗ kBz − tkpp is exactly kV y − t∗ kpp for some t∗ ∈ Rd , where y ∈ {0, 1}k such that ys = 1 if and only if z satisfies the sth literal of the relevant clause. (See Table 2 for a diagram showing the output of the reduction and Theorem 3.2 for the formal statement.) We stress that, while we have increased the ambient dimension by nearly a factor of d∗ , the rank of the lattice is still n. This motivates the introduction of our primary technical tool, which we call isolating paral∗ lelepipeds. For 1 ≤ p ≤ ∞, a (p, k)-isolating parallelepiped is represented by a matrix V ∈ Rd ×k and ∗ a shift vector t∗ ∈ Rd with the special property that one vertex of the parallelepiped V {0, 1}k − t∗ is “isolated.” (Here, V {0, 1}k − t∗ is an affine transformation of the hypercube, i.e., a parallelepiped.) In particular, every vertex of the parallelepiped, V y − t∗ for y ∈ {0, 1}k has unit length kV y − t∗ kp = 1 except for the vertex −t∗ , which is longer, i.e., kt∗ kp > 1. (See Figure 1.) In terms of the reduction above, an isolating parallelepiped is exactly what we need. In particular, if we plug V and t∗ into the above reduction, then all satisfied clauses (which correspond to non-zero y in the above description) will “contribute” 1 to the distance kBz − tkpp , while unsatisfied clauses (which correspond to y = 0) will contribute 1 + δ for some δ > 0. Therefore, the total distance will be exactly kBz − tkpp = αp n + m+ (z) + (m − m+ (z))(1 + δ) = αp n − δm+ (z) + (1 + δ)m, where m+ (z) is the number of clauses satisfied by z. So, the distance distp (t, L) exactly corresponds to the maximal number of satisfied clauses, as needed. Constructing isolating parallelepipeds. Of course, in order for the above to be useful, we must show how to construct these (p, k)-isolating parallelepipeds. Indeed, it is not hard to find constructions for all p ≥ 1 when k = 2, and even for all k in the special case when p = 1 (see Figure 1). Some other fairly nice examples can also be found for small k, as shown in Figure 2. For p > 1 and large k, these objects seem to be much harder to find. (In fact, in Section 4.2, we show that there is no (p, k)-isolating parallelepiped for any even integer p ≤ k − 1.) Our solution is therefore a bit technical. k k At a high level, in Section 4, we consider a natural class of parallelepipeds V ∈ R2 ×k , t∗ ∈ R2 parametrized by some weights α0 , α1 , . . . , αk ≥ 0 and a scalar shift t∗ ∈ R. These parallelepipeds are constructed so that the length of the vertex kV y − t∗ kpp for y ∈ {0, 1}k depends only on the Hamming weight of y and is linear in the αi for fixed t∗ . In other words, there is a matrix Mk (p, t∗ ) ∈ R(k+1)×(k+1) such that Mk (p, t∗ )(α0 , . . . , αk )T encodes the value of kV y − t∗ kpp for each possible Hamming weight of y ∈ {0, 1}k . (See Lemma 4.2.) We show that, in order to find weights α0 , . . . , αk ≥ 0 such that V and t∗ define a (p, k)-isolating parallelepiped, it suffices to find a t∗ such that Mk (p, t∗ ) is invertible. For each odd integer p ≥ 1 and each k ≥ 2, we show an algorithm that finds such a t∗ . (See Section 4.1.) 6 In particular, we replace the scalars ti in Eq. (4) with vectors ti := t∗ − X ∗ v s ∈ Rd , where the sum is over s such that the sth literal in the ith clause is negated. 8 (k, k) v2 v1 + v2 (2, 2) t∗ ·· · (1, 1) t∗ (0, 0) 0 v1 Figure 1: (p, k)-isolating parallelepipeds for p = 2, k = 2 (left) and p = 1, k ≥ 1 (right). On the left, the vectors v 1 , v 2 , and v 1 + v 2 are all at the same distance from t∗ , while 0 is strictly farther away. On the right is the degenerate parallelepiped generated by k copies of the vector (1, 1). The vectors (i, i) are all at the same `1 distance from t∗ for 1 ≤ i ≤ m, while (0, 0) is strictly farther away. The (scaled) unit balls centered at t∗ are shown in red, while the parallelepipeds are shown in black.       1 V := ·  1/3 2 · 12       121/3 121/3 121/3  1 1 −1   1 −1 1   1 −1 −1  , −1 1 1    −1 1 −1  −1 −1 1 t∗ := 1 2 · 121/3  2 · 121/3   2      2    · 2    .  2      2   2 Figure 2: A (3, 3)-isolating parallelepiped in seven dimensions. One can verify that kV y − t∗ k33 = 1 for all non-zero y ∈ {0, 1}3 , and kt∗ k33 = 3/2. 9 To extend this result to other p ≥ 1, we consider the determinant of Mk (p, t∗ ) for fixed k and t∗ , viewed as a function of p. We observe that this function has a rather nice form—it is a Dirichlet P polynomial. I.e., for fixed t∗ and k, the determinant can be written as exp(ai p) for some ai ∈ R. Such a function has finitely many roots unless it is identically zero. So, we take the value of t∗ from above such that, say, Mk (1, t∗ ) is invertible. Since Mk (1, t∗ ) does not have zero determinant, the Dirichlet polynomial corresponding to det(Mk (p, t∗ )) cannot be identically zero and therefore has finitely many roots. This is how we prove Theorem 1.2. (See Section 4.3.) Extension to constant-factor approximation. In order to extend our hardness results to approximate CVPp for finite p, we can try simply using the same reduction with k-SAT replaced by approximate Max-k-SAT. Unfortunately, this does not quite work. Indeed, it is easy to see that the “identity matrix gadget” that we use to restrict our attention to lattice vectors whose coordinates are in {0, 1} (Eq. (1)) cannot tolerate an approximation factor larger than 1 + O(1/n) (for finite p). However, we observe that when k = 2, this identity matrix gadget is actually unnecessary. In particular, even without this gadget, it “never helps” to consider a lattice vector whose coordinates are not all in {0, 1}. It then follows immediately from the analysis above that Gap-2-SAT reduces to approximate CVPp with a constant approximation factor strictly greater than one. We note that we do not know how to extend this result to larger k > 2 (except when p = 1, see Theorem 5.3). We show that the case k = 2 is sufficient for proving Gap-ETH-hardness (see Proposition 2.12), but we suspect that one can just “remove the identity matrix gadget” from all of our reductions for finite p. If this were true, it would show Gap-ETH-hardness of approximation for slightly larger constant approximation factors and imply even stronger hardness results under less common assumptions. 1.6 Open questions The most important question that we leave open is the extension of our SETH-hardness result to arbitrary p ≥ 1. In particular, while our result applies to p = p(n) 6= 2 that approaches 2 asymptotically, it does not apply to the specific case p = 2. An extension to p = 2 would settle the time complexity of CVP2 up to a factor of 2o(n) (assuming SETH). However, we know that our technique does not work in this case (in that (2, k)-parallelepipeds do not exist for k ≥ 3), so substantial new ideas might be needed to resolve this issue. Another direction would be to strengthen our hardness of approximation results in one of two possible directions. First, one could try to increase the approximation factor. (Prior techniques for amplifying the approximation factor increase the rank of the lattice quite a bit, so they do not yield very interesting quantitative hardness results.) Second, one could try to show a reduction from Gap-k-SAT to approximate CVPp for k ≥ 3. For p ∈ {1, ∞}, we already have such a reduction, and as we mentioned above, we suspect that we can simply “remove the identity matrix gadget” in our current reduction to achieve this for 1 < p < ∞. But, we do not know how to prove that this works. Finally, we note that our main reduction constructs lattices of rank n, but the ambient dimension d can be significantly larger. (Specifically, d = n + O(m), where m is the number of clauses in the relevant SAT instance, and where the hidden constant depends on k and can be very large.) Lattice problems are typically parameterized in terms of the rank of the lattice (and for the `2 norm, one can assume without loss of generality that d = n), but it is still interesting to ask whether we can reduce the ambient dimension d. 10 Organization In Section 2, we review some necessary background knowledge. In Section 3, we show how to use a (p, k)-isolating parallelepiped (for finite p) to reduce any n-variable instance of k-SAT to a CVPp instance with rank n, and we show that this immediately gives SETH-hardness for p = 1. In Section 4, we show how to construct (p, k)-isolating parallelepipeds, first for odd integers p ≥ 1 and then for “almost all” p. In Section 5, we show 2Ω(n) -hardness of approximating √ CVPp up to a Ω( n) ETH- and constant factor. In Section 6, we prove a number of additional hardness results: 2 Max-2-SAT-hardness of CVPPp (Section 6.1), ETH- and Max-2-SAT-hardness of CVPp (Section 6.2), and SETH-hardness of CVP∞ and SVP∞ (Section 6.3). 2 Preliminaries Throughout this paper, we work with lattice problems over Rd for convenience. Formally, we must pick a suitable representation of real numbers and consider both the size of the representation and the efficiency of arithmetic operations in the given representation. But, we omit such details throughout to ease readability. 2.1 Computational lattice problems Let distp (L, t) := minx∈L kx − tkp denote the `p distance of t to L. In addition to SVP and CVP, we also consider a variant of CVP called the Closest Vector Problem with Preprocessing (CVPP), which allows arbitrary preprocessing of a lattice. Definition 2.1. For any γ ≥ 1 and 1 ≤ p ≤ ∞, the γ-approximate Shortest Vector Problem with respect to the `p norm (γ-SVPp ) is the promise problem defined as follows. Given a lattice L (specified by a basis B ∈ Rd×n ) and a number r > 0, distinguish between a ‘YES’ instance where there exists a non-zero vector v ∈ L such that kvkp ≤ r, and a ‘NO’ instance where kvkp > γr for all non-zero v ∈ L. Definition 2.2. For any γ ≥ 1 and 1 ≤ p ≤ ∞, the γ-approximate Closest Vector Problem with respect to the `p norm (γ-CVPp ) is the promise problem defined as follows. Given a lattice L (specified by a basis B ∈ Rd×n ), a target vector t ∈ Rd , and a number r > 0, distinguish between a ‘YES’ instance where distp (L, t) ≤ r, and a ‘NO’ instance where distp (L, t) > γr. When γ = 1, we refer to the problems simply as SVPp and CVPp , respectively. Definition 2.3. The Closest Vector Problem with Preprocessing with respect to the `p norm (CVPPp ) is the problem of finding a preprocessing function P and an algorithm Q which work as follows. Given a lattice L (specified by a basis B ∈ Rd×n ), P outputs a new description of L. Given P (L), a target vector t ∈ Rd , and a number r > 0, Q decides whether distp (L, t) ≤ r. When we measure the running time of a CVPP algorithm, we only count the running time of Q, and not of the preprocessing algorithm P . 11 2.2 Satisfiability problems and the Max-Cut problem A k-SAT formula Φ on n Boolean variables x1 , . . . , xn and m clauses C1 , . . . , Cm is a conjunction k Φ = ∧m i=1 Ci of clauses Ci = ∨s=1 `i,s , where the literals `i,s denote a variable xj or its negation ¬xj . The goal is to decide whether there exists an assignment a ∈ {0, 1}n to the variables of Φ such that all clauses have at least one “true” literal, i.e., so that all clauses are satisfied. The value of a k-SAT formula Φ, denoted val(Φ), is the maximum fraction of clauses satisfied by an assignment to Φ. Definition 2.4. Given a k-SAT formula Φ and constants 0 ≤ δ < ε ≤ 1, the (δ, ε)-Gap-k-SAT problem is the promise problem defined as follows. The goal is to distinguish between a ‘YES’ instance in which val(Φ) ≥ ε, and a ‘NO’ instance in which val(Φ) < δ. Definition 2.5. Given a k-SAT formula Φ with clauses C = {C1 , . . . , Cm }, a clause weight function w : C → Z+ , and a weight threshold W , the Weighted Max-k-SAT problem is to decide whether there P exists an assignment a to the variables of Φ such that Ci is sat. by a w(Ci ) ≥ W . Definition 2.6. Given an undirected graph G = (V, E), an edge weight function w : E → Z+ , and a weight threshold W , the Weighted Max-CUT problem is defined as follows. The goal is to decide P whether V can be partitioned into sets V1 and V2 such that eij ∈E:vi ∈V1 ,vj ∈V2 w(eij ) ≥ W . There exists a folklore reduction from an instance of Weighted Max-Cut on a graph with n vertices to an instance of Weighted Max 2-SAT on a formula with n variables. See, e.g., [GHNR03]. 2.3 Exponential Time Hypotheses Impagliazzo and Paturi [IP99] introduced the following two hypotheses (ETH and SETH), which are now widely used to study the quantitative hardness of computational problems. Definition 2.7. The Exponential Time Hypothesis (ETH) is the hypothesis defined as follows. For every k ≥ 3 there exists a constant ε > 0 such that no algorithm solves k-SAT formulas with n variables in 2εn -time. In particular, there is no 2o(n) -time algorithm for 3-SAT. Definition 2.8. The Strong Exponential Time Hypothesis (SETH) is the hypothesis defined as follows. For every constant ε > 0 there exists k such that no algorithm solves k-SAT formulas with n variables in 2(1−ε)n -time. An important tool in the study of the exact complexity of k-SAT is the Sparisification Lemma of Impagliazzo, Paturi, and Zane [IPZ01] which roughly says that any k-SAT formula can be replaced with 2εn formulas each with O(n) clauses for some ε > 0. Proposition 2.9 (Sparsification Lemma, [IPZ01]). For every k ∈ Z+ and ε > 0 there exists a constant c = c(k, ε) such that any k-SAT formula Φ with n variables can be expressed as Φ = ∨ri=1 Ψi where r ≤ 2εn and each Ψi is a k-SAT formula with at most cn clauses. Moreover, this disjunction can be computed in 2εn -time. In this paper we also consider the W-Max-SAT-SETH hypothesis, which corresponds to SETH but with Weighted Max-k-SAT in place of k-SAT. Our main result only relies on this weaker variant of SETH, and is therefore more robust. Dinur [Din16] and Manurangsi and Raghavendra [MR17] recently introduced a “gap” version of ETH, which asserts that Gap-3-SAT takes 2Ω(n) -time. 12 Definition 2.10. The (randomized) Gap-Exponential Time Hypothesis ((randomized) Gap-ETH) is the hypothesis that there exist constants δ < 1 and ε > 0 such that no (randomized) algorithm solves (δ, 1)-Gap-3-SAT instances with n variables in 2εn -time. As Dinur [Din16] notes, one can sparsify a Gap-SAT instance simply by sampling clauses. Therefore, we can assume (almost) without loss of generality that Gap-ETH applies only to formulas with O(n) clauses. The caveat is that the sampling is randomized, so finding a 2o(n) -time algorithm for sparse Gap-3-SAT only implies a randomized 2o(n) -time algorithm for general Gap-3-SAT. We give a variant of Dinur’s sampling argument in Proposition 2.11. The idea is to show that both the total number of sampled clauses and the number of sampled clauses that are satisfied by any given assignment are highly concentrated around their expectation by using the Chernoff bound, and then to take a union bound over the bad events where these quantities deviate substantially from their expectation. We will use the following multiplicative Chernoff bounds (see, e.g., [HP]). Let X1 , . . . , Xn be independent identically distributed Bernoulli random variables with expectation p, so that the P expectation of ni=1 Xi is µ = pn. Then: Pr[ n X 2 /2 Xi < (1 − α)µ] < e−µα , (6) . (7) i=1 Pr[ n X 2 /4 Xi > (1 + α)µ] < e−µα i=1 Proposition 2.11 (Sparsification for Gap-SAT). For any 0 < δ < δ 0 < 1, there is a polynomial-time randomized reduction from a (δ, 1)-Gap-k-SAT instance Φ with n variables and m clauses to a (δ 0 , 1)-Gap-k-SAT instance Φ0 with n variables and O(n) clauses. Proof. Let Φ0 be the formula obtained by sampling each clause of Φ independently with probability p := min{1, 10/(δα2 ) · n/m}, where α is fixed so that −(1 − δ 0 /δ)/(1 + δ 0 /δ) < α < 1. Clearly, if val(Φ) = 1 then val(Φ0 ) = 1 as well. We analyze the case where val(Φ) < δ. In expectation Φ0 has pm clauses. Furthermore, because val(Φ0 ) < δ, in expectation any fixed assignment will satisfy fewer than δpm clauses of Φ0 . Therefore by Equation (6), Pr[Number of clauses in Φ0 ≤ (1 − α)pm] ≤ e−α 2 pm/2 ≤ e−2n . (8) Furthermore, by Equation (7), we have that for each fixed assignment a, Pr[Number of clauses in Φ0 sat. by a ≥ (1 + α)δpm] ≤ e−α 2 δpm/4 ≤ e−2n . (9) By applying Equations (8) and (9), and taking a union bound we get that the probability that has at least (1 − α)pm clauses and that no assignment to Φ0 satisfies more than (1 + α)δpm clauses is at least 1 − (e−2n + 2n e−2n ) ≥ 1 − 2e−n . Therefore, Φ0 val(Φ0 ) ≤ (1 + α)pm · δ < δ0 (1 − α)pm with high probability. 13 x1 x2 ··· xn−1 xn v1 v2 ··· 0d∗ −v 3 t∗ − v 3 .. . ··· .. .. . .. . .. . 0d∗ −v 1 ··· v2 v3 t∗ − v 1 x1 x2 .. . 2α1/p 0 .. . 0 2α1/p .. . ··· ··· .. . 0 0 .. . 0 0 .. . α1/p α1/p .. . xn−1 xn 0 0 0 0 ··· ··· 2α1/p 0 0 2α1/p α1/p α1/p ( C1 .. . . ( Cm B t Table 2: A basis B and target vector t output by the reduction from Theorem 3.2 with some ∗ ∗ (p, 3)-isolating parallelepiped given by V = (v 1 , v 2 , v 3 ) ∈ Rd ×3 and t∗ ∈ Rd . In this example, the first clause is C1 ≡ x1 ∨ x2 ∨ ¬xn and the mth clause is Cm ≡ ¬x2 ∨ xn−1 ∨ xn . By the definition of an isolating parallelepiped (Definition 3.1), the contribution of the first d coordinates to the distance kBz − tkpp will be 1 for any assignment z ∈ {0, 1}n satisfying C1 , while non-satisfying assignments contribute (1 + δ) for some δ > 0. For example, if z1 = 1, z2 = 0, zn = 1, the clause C1 is satisfied, and the first d coordinates will contribute kv 1 − v 3 − (t∗ − v 3 )kpp = kv 1 − t∗ kpp = 1. On the other hand, if z1 = 0, z2 = 0, zn = 1, then C1 is not satisfied, and k − v 3 − (t∗ − v 3 )kpp = kt∗ kpp = 1 + δ. Additionally, we will use a reduction of Garey et al. [GJS76] from 3-SAT to Max-2-SAT which also works as a reduction from Gap-3-SAT to Gap-2-SAT. The reduction works by outputting ten 1and 2-clauses for each 3-clause in the original formula. Any assignment which satisfies the original clause corresponds to an assignment which satisfies 7 of the output clauses, and any assignment which does not satisfy the original clause corresponds to an assignment which satisfies 6 of the output clauses. Proposition 2.12 ([GJS76, Theorem 1.1]). For every 0 ≤ δ < ε ≤ 1, there is a polynomial-time reduction from every instance of (δ, ε)-Gap-3-SAT with n variables and m clauses to an instance of ((6 + δ)/10, (6 + ε)/10)-Gap-2-SAT with n + m variables and 10m clauses. 3 SETH-hardness from isolating parallelepipeds We start by giving a reduction from instances of weighted Max-k-SAT on formulas with n variables to instances of CVPp with rank n for all p that uses a certain geometric object, which we define next. Let 1n and 0n denote the all 1s and all 0s vectors of length n respectively, and let In denote the n × n identity matrix. 14 ∗ ∗ Definition 3.1. For any 1 ≤ p ≤ ∞ and integer k ≥ 2, we say that V ∈ Rd ×k and t∗ ∈ Rd define a (p, k)-isolating parallelepiped if ktkp > 1 and kV x − t∗ kp = 1 for all x ∈ {0, 1}k \ {0k }. In order to give the reduction, we first introduce some notation related to SAT. Let Φ be a k-SAT formula on n variables x1 , . . . , xn and m clauses C1 , . . . , Cm . Let ind(`) denote the index of the variable underlying a literal `. I.e., ind(`) = j if ` = xj or ` = ¬xj . Call a literal ` positive if ` = xj and negative if ` = ¬xj for some variable xj . Given a clause Ci = ∨ks=1 `i,s , let Pi := {s ∈ [k] : `i,s is positive} and let Ni := {s ∈ [k] : `i,s is negative} denote the indices of positive and negative literals in Ci respectively. Given an assignment a ∈ {0, 1}n to the variables of Φ, let Si (a) denote the indices of literals in Ci satisfied by a. I.e., Si (a) := {s ∈ Pi : aind(`i,s ) = 1} ∪ {s ∈ Ni : aind(`i,s ) = 0}. Finally, let m+ (a) denote the number of clauses of Φ satisfied by the assignment a, i.e., the number of clauses i for which |Si (a)| ≥ 1. Theorem 3.2. If there exists a computable (p, k)-isolating parallelepiped for some p = p(n) ∈ [1, ∞) and integer k ≥ 2, then there exists a polynomial-time reduction from any (weighted-)Max-k-SAT instance with n variables to a CVPp instance of rank n. Proof. For simplicity, we give a reduction from unweighted Max-k-SAT, and afterwards sketch how to modify our reduction to handle the weighted case as well. Namely, we give a reduction from any Max-k-SAT instance (Φ, W ) to an instance (B, t∗ , r) of CVPp . Here, the formula Φ is on n variables x1 , . . . , xn and m clauses C1 , . . . , Cm . (Φ, W ) is a ‘YES’ instance if there exists an assignment a such that m+ (a) ≥ W . ∗ By assumption, there exist computable d∗ = d∗ (p, k) ∈ Z+ , V = [v 1 , . . . , v k ] ∈ Rd ×k , and ∗ t∗ ∈ Rd such that kt∗ kp = (1 + δ)1/p for some δ > 0 and kV z − t∗ kp = 1 for all z ∈ {0, 1}k \ {0k }. We define the output CVPp instance as follows. Let d := md∗ + n. The basis B ∈ Rd×n and target vector t ∈ Rd in the output instance have the form  B1 .. .   B=   ∗ Bm 2α1/p · In     ,     t=   t1 .. . tm α1/p · 1n    ,   ∗ with blocks Bi ∈ Rd ×n and ti ∈ Rd for 1 ≤ i ≤ m and α := m + (m − W )δ. Note that α is the maximum possible contribution of the clauses C1 , . . . , Cm to kBy − tkpp when (Φ, W ) is a ‘YES’ instance. For every 1 ≤ i ≤ m and 1 ≤ j ≤ n, set the jth column (Bi )j of block Bi (corresponding to the clause Ci = ∨ks=1 `i,s ) as (Bi )j :=    v s if xj is the sth literal of clause i, −v s if ¬xj is the sth literal of clause i,   0 ∗ otherwise, d and set ti := t∗ − s∈Ni v s . Set r := (α(n + 1))1/p . Clearly, the reduction runs in polynomial time. We next analyze for which y ∈ Zn it holds that kBy − tkp ≤ r. Given y ∈ / {0, 1}n , P kBy − tkpp ≥ k2α1/p In y − α1/p 1n kpp ≥ α(n + 2) > rp , 15 so we only need to analyze the case when y ∈ {0, 1}n . Consider an assignment y ∈ {0, 1}n to the variables of Φ. Then, kBi y − ti kp = X yind(`i,s ) · v s − s∈Pi = X  yind(`i,s ) · v s − t∗ − s∈Ni yind(`i,s ) · v s + s∈Pi = X X X s∈Si (a)  s∈Ni 1 − yind(`i,s ) · v s − t∗ p  p s∈Ni X vs v s − t∗ . p By assumption, the last quantity is equal to 1 if |Si (y)| ≥ 1, and is equal to (1 + δ)1/p otherwise. Because |Si (y)| ≥ 1 if and only if Ci is satisfied, it follows that kBy − tkpp = m X  kBi y − ti kpp + αn = m + (m − m+ (y))δ + αn . i=1 Therefore, kBy − tkp ≤ r if and only if m+ (y) ≥ W , and therefore there exists y such that kBy − tkp ≤ r if and only if (Φ, W ) is a ‘YES’ instance of Max-k-SAT, as needed. To extend this to a reduction from weighted Max-k-SAT to CVPp , simply multiply each block Bi and the corresponding target vector ti by w(Ci )1/p , where w(Ci ) denotes the weight of the clause Ci . Then, by adjusting α to depend on the weights w(Ci ) we obtain the desire reduction. Because the rank n of the output CVPp instance matches the number of variables in the input SAT formula, we immediately get the following corollary. Corollary 3.3. For any efficiently computable p = p(n) ∈ [1, ∞) if there exists a computable (p, k)-isolating parallelepiped for infinitely many k ∈ Z+ , then, for every constant ε > 0 there is no 2(1−ε)n -time algorithm for CVPp assuming W-Max-SAT-SETH. In particular there is no 2(1−ε)n -time algorithm for CVPp assuming SETH. It is easy to construct a (degenerate) family of isolating parallelepipeds for p = 1, and therefore we get hardness of CVP1 as a simple corollary. (See Figure 1.) Corollary 3.4. For every constant ε > 0 there is no 2(1−ε)n -time algorithm for CVP1 assuming W-Max-SAT-SETH, and in particular there is no 2(1−ε)n -time algorithm for CVP1 assuming SETH. 1 Proof. Let k ∈ Z+ , let V = [v 1 , . . . , v k ] with v 1 = · · · = v k := k−1 (1, 1)T ∈ R2 , and let t∗ := 1 T 2 ∗ k ∗ k−1 (k, 1) ∈ R . Then, kV x − t k1 = 1 for every x ∈ {0, 1} \ {0k }, and kt k1 = (k + 1)/(k − 1) > 1. The result follows by Corollary 3.3. 4 Finding isolating parallelepipeds ∗ ∗ We now show how to find a (p, k)-isolating parallelepiped given by V ∈ Rd ×k and t∗ ∈ Rd as in Definition 3.1. We will first show a general strategy for trying to find such an object for any p ≥ 1 and integer k ≥ 2. In Section 4.1, we will show how to successfully implement this strategy in the case when p is an odd integer. In Section 4.2, we show that (p, k)-isolating parallelepipeds do not 16 exist for even integers p ≤ k − 1. Finally, in Section 4.3 we show how to mostly get around this issue in order to find (p, k)-isolating parallelepipeds for “almost all” p ≥ 1. It will actually be convenient to find a slightly different object that “works with {±1}k instead of {0, 1}k .” We observe below that this suffices. ∗ Lemma 4.1. There is an efficient algorithm that takes as input a matrix V ∈ Rd ×k and vector ∗ t∗ ∈ Rd such that kV y − t∗ kp = 1 for any y ∈ {±1}k \ {−1k } and k − V 1k − t∗ kp > 1 , and outputs ∗ ∗ a matrix V 0 ∈ Rd ×k and vector (t∗ )0 ∈ Rd that form a (p, k)-isolating parallelepiped. Proof. Define V 0 := 2V and (t∗ )0 = V 1k + t∗ . Now consider the affine transformation f : Rk → Rk defined by f (x) := (2x − 1k ), which maps {0, 1}k to {±1}k and 0k to −1k . Then, for x ∈ {0, 1}k and y = f (x) = 2x − 1k ∈ {±1}k , we have kV 0 x − (t∗ )0 kp = V 0 y + 1k − (t∗ )0 2 p = V0 y 1k +V0 − (t∗ )0 2 2 p = kV y − t∗ kp , as needed. Intuitively, a “reasonable” matrix V should act symmetrically on bit strings. I.e., if y, y 0 ∈ {±1}k have the same number of positive entries, then V y should be a permutation of V y 0 . This implies that any row of V must be accompanied by all possible permutations of this row. If we further require that each row in V is α · v for some v ∈ {±1}k and α ∈ R, then we arrive at a very general construction that is still possible to analyze. k For weights α0 , . . . , αk ≥ 0, we define V := V (α0 , . . . , αk ) ∈ R2 ×k as follows. The rows of V 1/p are indexed by the strings {±1}k , and row v is αk−|v| v T , where |v| := {# of positive entries in v} k is the number of positive entries in v. For a shift t∗ ∈ R, we set t∗ := t∗ (α0 , . . . , αk , t∗ ) ∈ R2 1/p such that the coordinate of t∗ corresponding to v is αk−|v| t∗ . (Figure 2 is an example of this construction. In particular, it shows V (α0 , α1 , α2 , α3 ) with α0 = 12, α1 = α2 = 1 and α3 = 0 and t∗ (α0 , α1 , α2 , α3 , t∗ ) with t∗ = 2, where we have omitted the last row, whose weight is zero.) In what follows, we will use the binomial coefficient ji extensively, and we adopt the convention that i j = 0 if j > i or j < 0 or j ∈ / Z. Lemma 4.2. For any y ∈ {±1}k , weights α0 , . . . , αk ≥ 0, and shift t∗ ∈ R, kV y − t∗ kpp = k X j=0 αk−j k X |y| `=0 ` ! ! k − |y| · 2|y| + 2j − k − 4` − t∗ j−` k p , where V := V (α0 , . . . , αk ) ∈ R2 ×k and t∗ := t∗ (α0 , . . . , αk , t∗ ) as above. In other words, kV y − t∗ kpp depends only on |y|, and if w ∈ (R≥0 )k+1 is the vector such that wj = kV y 0 − t∗ kpp for all y 0 ∈ {±1} with |y 0 | = j, then    w = Mk (p, t )    ∗ 17 α0 α1 .. . αk     ,   where Mk (p, t∗ ) ∈ R(k+1)×(k+1) is given by Mk (p, t∗ )i,j := k X `=0 i ` ! ! k−i · 2i + 2j − k − 4` − t∗ j−` p . (10) Proof. We have kV y − t∗ kpp = k X X αj j=0 hv, yi − t∗ p . |v|=k−j Notice that hv, yi depends only on how many of the j negative entries of v align with the positive entries of y. In particular, ∗ p X hv, yi − t = |v|=k−j ! ! k X |y| k − |y| `=0 j−` ` k X |y| ! = `=0 ` · − ` + (|y| − `) + (j − `) − (k − |y| − j + `) − t∗ ! k − |y| · 2|y| + 2j − k − 4` − t∗ j−` p p , as needed. Lemma 4.3. For any t∗ ∈ R, the matrix Mk (p, t∗ ) defined in Eq. (10) is stochastic. Mk (p, t∗ )1k+1 = λ(t∗ )1k+1 for some λ(t∗ ) ∈ R. Furthermore, λ(t∗ ) > 0. I.e., Proof. We rearrange the sum corresponding to the ith entry of Mk (p, t∗ )1k+1 , setting r := (i+j)/2−` to obtain k X k X j=0 `=0 i ` ! ! k−i · 2i + 2j − k − 4` − t∗ j−` p = X |4r − k − t∗ |p r = X k X j=0 ∗ p |4r − k − t | r k X j=0 i (i + j)/2 − r ! k−i r + (j − i)/2 ! i r + (i − j)/2 ! k−i r + (j − i)/2 ! Finally, we recall Vandermonde’s identity, which says that k X j=0 i r + (i − j)/2 ! k−i r + (j − i)/2 ! = k r ! . Therefore, the summation does not depend on i (and is clearly positive), as needed. Lemma 4.3 tells us that for any t∗ ∈ R, Mk (p, t∗ )(1k+1 )/λ = 1k+1 for some λ > 0. We wish to show that, for some t∗ ∈ R, we can find α0 , . . . , αk ≥ 0 such that Mk (p, t∗ )(α0 , α1 , . . . , αk )T = 1k+1 + εe0 for some ε > 0, where e0 := (1, 0, . . . , 0)T . In order to do this, it suffices to show that Mk (p, t∗ ) is invertible. Then, we can take (α0 , α1 , . . . , αk )T := 1k+1 /λ + εMk (p, t∗ )−1 e0 . If ε := (λ · kMk (p, t∗ )−1 e0 k∞ )−1 > 0, then the αi must be non-negative. We make this formal in the next proposition. 18 . Proposition 4.4. There is an efficient algorithm that takes as input any p ≥ 1, an integer k ≥ 2, and t∗ ∈ R such that det(Mk (p, t∗ )) 6= 0, where Mk (p, t∗ ) is defined as in Eq. (10) and outputs k k V ∈ R2 ×k and t∗ ∈ R2 that define a (p, k)-isolating parallelepiped. Proof. By Lemma 4.1, it suffices to construct a matrix that works for y ∈ {±1}k . The algorithm behaves as follows on input k ≥ 2 and p ≥ 1 and t∗ ∈ R. By Lemma 4.3, Mk (p, t∗ )1k+1 = λ1k+1 for some λ > 0. Since we are promised that det(Mk (p, t∗ )) 6= 0, we see that Mk (p, t∗ ) is invertible. The algorithm therefore sets (α0 , . . . , αk )T := 1k+1 /λ + εMk (p, t∗ )−1 e0 , (11) where ε := (λ · kMk (p, t∗ )−1 e0 k∞ )−1 > 0 is chosen to be small enough such that the αi are all non-negative. Finally, it outputs V := V (α0 , . . . , αk ) and t∗ := t∗ (α0 , . . . , αk , t∗ ) as defined above. To prove correctness, we note that V and t∗ have the desired property. Indeed, it follows from the definition of Mk (p, t∗ ) in Lemma 4.2 that kV y − t∗ kpp is the jth coordinate of w := Mk (p, t∗ )(α0 , . . . , αk )T , where j := |y|. But, by Eq. (11), we see that the jth coordinate of w is 1 + ε if j = 0 and is 1 otherwise, as needed. 4.1 Finishing the proof for odd integer p We now handle the case when p ≥ 1 is an odd integer. Notice that, if p ≥ 1 is an integer, then det(Mk (p, t∗ )) is some piecewise combination of polynomials of degree at most (k + 1)p in t∗ . In particular, it is a polynomial in t∗ if we restrict our attention to the interval t∗ ∈ [−k, −k + 2]. We wish to argue that this is not the zero polynomial when p is odd. To prove this, it suffices to show that the coefficient of (t∗ )(k+1)p is non-zero, which we do below by studying a matrix whose determinant is this coefficient (when p is odd). We first show an easy claim concerning matrices that can be written as sums of the identity plus a certain kind of rank-one matrix. Claim 4.5. For any matrix A ∈ Rd×d with constant columns given by Ai,j = aj for some a0 , . . . , ad−1 ∈ R and any λ ∈ R, det(A − λId ) = (−λ)d−1 X  aj − λ . j P Proof. Notice that A is a rank-one stochastic matrix with one non-zero eigenvalue given by aj . P Therefore, the characteristic polynomial of A is det(A − λId ) = (−λ)d−1 ( aj − λ), as needed. Lemma 4.6. For an integer k ≥ 1 and an odd integer p ≥ 1, the function t∗ 7→ det(Mk (p, t∗ )), where Mk (p, t∗ ) is defined as in Eq. (10), is a polynomial of degree at most (k + 1)p when restricted to the interval t∗ ∈ [−k, −k + 2]. Furthermore, the coefficient of (t∗ )(k+1)p of this polynomial is exactly 2k (2 − 2k ). In particular, t∗ 7→ det(Mk (p, t∗ )) is a non-zero polynomial of degree (k + 1)p on the interval t∗ ∈ [−k, −k + 2] for k ≥ 2. Proof. For any t∗ ∈ [−k, −k + 2], the matrix Mk (p, t∗ ) is given by ∗ Mk (p, t )i,j = k X `=0 ! i ` ! k−i · 2i+2j−k−4`−t∗ j−` p 19 = k X `=0 ! δi+j−2` i ` ! k−i ·(2i+2j−k−4`−t∗ )p , j−` where δr = −1 if r = 0 and 1 otherwise. (Here, we have used the fact that `i k−i j−` is only non-zero ∗ when ` ≤ min(i, j). Therefore, 2i + 2j ≥ 4`, so that 2i + 2j − k − 4` − t ≥ 2i + 2j − 4` − 2 ≥ 0 unless 2i − 2j − 4` = 0.) The coefficient of (t∗ )(k+1)p in the polynomial t∗ 7→ det(Mk (p, t∗ )) is therefore given by det(M 0 ), where M 0 is defined as  0 (M )i,j := − k X ! δ2`−i−j `=0 ! k−i j−` ! k X k−i i − (j − i)/2 ` `=0 ! k−i k − (j − i)/2 j i =2 (i + j)/2 i =2 (i − j)/2 i `  ! ! ! ! k−i j−` ! , where we have again applied Vandermonde’s identity. Notice that the first term is non-zero if and  only if i = j, in which case it is equal to 2. In other words, M 0 = A + 2Ik+1 , where Ai,j := − kj . The result then follows from Claim 4.5. Corollary 4.7. There is an efficient algorithm that takes as input an integer k ≥ 2 and odd integer p ≥ 1 and outputs t∗ ∈ Q such that det(Mk (p, t∗ )) 6= 0, with Mk (p, t∗ ) defined as in Eq. (10). Proof. The algorithm works as follows. It chooses (k + 1)p + 1 distinct points t0 , . . . , t(k+1)p ∈ [−k, −k + 2] arbitrarily. (E.g., it chooses ti = −k + 2i/((k + 1)p).) For each ti , it computes det(Mk (p, ti )). It outputs the first ti such that the determinant is non-zero. We claim that det(Mk (p, ti )) 6= 0 for at least one index i. Indeed, by Lemma 4.6, t∗ 7→ det(Mk (p, t∗ )) is a non-zero polynomial of degree (k + 1)p. The result then follows from the fact that such a polynomial can have at most (k + 1)p roots. Theorem 1.1 for finite p now follows immediately from Theorems 3.2 together with Proposition 4.4, and Corollary 4.7. 4.2 Limitations of the approach In the previous section, we showed that for every odd p ≥ 1 and every integer k ≥ 2, there exists a (p, k)-isolating parallelepiped. This allowed us to conclude that CVPp is SETH-hard for odd values of p. Now, we show that this approach necessarily fails for even p ≥ 2. Namely, we show that for every even p, there is no (p, k)-isolating parallelepiped for any k > p.7 For simplicity, we show this for p = 2, but a straightforward generalization works for all even p. ∗ Lemma 4.8. For any integer k ≥ 3 and vectors v 1 , . . . , v k , t∗ ∈ Rd , we have X (−1)|S| t∗ − i∈S S⊆[k] 7 X 2 vi 2 =0. When k ≤ p, it is possible to construct (p, k)-isolating parallelepiped for even p. See, e.g., Figure 1. 20 Proof. We have X S⊆[k] |S| (−1) ∗ t − X i∈S 2 vi 2 = |S| X kt∗ k22 (−1) D ∗ −2 t , = kt∗ k22 · (−1)|S| − 2 X S⊆[k] X vi + kt∗ k22 X · X (−1) |S| t∗ , v i · ·0−2 2 vi X ! 2 (−1)|S| S3i +2 X hv i , v j i · i<j S3i X X i∈S i∈[k] kvi k22 i∈[k] = E i∈S S⊆[k] + X X (−1)|S| S3i,j ∗ ht , v i i · 0 i∈[k] + X kvi k22 · 0 + 2 X hv i , v j i · 0 i<j i∈[k] =0, where the penultimate equality uses the fact that X (−1)|S| = (1 − 1)n = 0 S⊆[n] for n ≥ 1. Corollary 4.9. There is no (2, k)-isolating parallelepiped for any integer k ≥ 3. ∗ Proof. Assume V = [v 1 , . . . , v k ] ∈ Rd ×k and t∗ ∈ Rd form a (2, k)-isolating parallelepiped. For P any S 6= ∅, kt∗ − i∈S v i k22 = 1 by the definition of an isolating parallelepiped. Thus, applying Lemma 4.8, we have kt∗ k22 = X (−1)|S|+1 t∗ − X i∈S ∅6=S⊆[k] 2 vi 2 =1, which contradicts the assumption that V and t∗ form an isolating parallelepiped. 4.3 Extending our result to almost all p We now wish to extend Theorem 1.1 to arbitrary p ≥ 1. Unfortunately, we know that we cannot do this for all p, since we showed in Section 4.2 that no such construction is possible when p is an even integer. However, we show a construction that works for “almost all values of p.” In particular, for any fixed k, the construction works for all but finitely many choices of p. We also observe that this implies that, for every fixed p0 , k, there is an ε > 0 such that the construction works for every p ∈ (p0 − ε) or p ∈ (p0 + ε). In particular, for any non-zero δ = δ(n) = o(1), the construction works for p = p0 + δ(n) for sufficiently large integers n. In Section 4.1, we observed that the function t∗ 7→ det(Mk (p, t∗ )) is a piecewise polynomial when p is an integer. This is what allowed us to analyze this case relatively easily (in both Section 4.1 and in Section 4.2). For non-integer p, the function t∗ 7→ det(Mk (p, t∗ )) is much less nice. So, instead of holding p fixed and varying t∗ , we will be interested in studying the function fk,t∗ (p) := det(Mk (p, t∗ )) for fixed t∗ and k. We first observe that this function has a fairly nice structure. 21 Lemma 4.10. For any t∗ ∈ R, integer k ≥ 1, and p ≥ 1, let fk,t∗ (p) := det(Mk (p, t∗ )) , (12) where Mk (p, t∗ ) is as defined in Eq. (10). Then, for fixed k, t∗ , fk,t∗ (p) is a Dirichlet polynomial. I.e., there are some real numbers b0 , . . . , br , c0 , . . . , cr ∈ R (depending on t∗ and k) such that fk,t∗ (p) = r X bi exp(ci p) (13) i=0 for some finite r. Proof. To see that fk,t∗ (p) is a Dirichlet polynomial for fixed t∗ , k, it suffices to note that (1) each entry of Mk (p, t∗ ) is a Dirichlet polynomial; (2) the determinant of a matrix can be written as a polynomial in the coordinates; and (3) a polynomial of Dirichlet polynomials is itself a Dirichlet polynomial. Corollary 4.11. There is an efficient algorithm that takes as input k ≥ 2 and any p ≥ 1 and either k k fails or outputs V ∈ R2 ×k and t∗ ∈ R2 that define a (p, k)-isolating parallelepiped. Furthermore, for any fixed k ≥ 2, the algorithm only fails for finitely many choices of p ≥ 1. Proof. By Corollary 4.7, for any k ≥ 2, we can find a t∗ ∈ Q such that, say, fk,t∗ (1) 6= 0, where fk,t∗ (p) is defined as in Eq. (12). Clearly, fk,t∗ (p) is non-zero as a function of p for these values of t∗ , k. Furthermore, by Lemma 4.10, fk,t∗ (p) is a Dirichlet polynomial. The result follows by the fact that any non-zero Dirichlet polynomial has finitely many roots (see, e.g., Theorem 3.1 in [Jam06]). Theorem 4.12. There is an efficient algorithm that takes as input an integer k ≥ 2 and any p ≥ 1 k k and either fails or outputs V ∈ R2 ×k and t∗ ∈ R2 that define a (p, k)-isolating parallelepiped. Furthermore, for any fixed k ≥ 2, the algorithm only fails on finitely many values of p ≥ 1.8 Proof. The result follows immediately from Proposition 4.4 and Corollary 4.11. Item 2 of Theorem 1.2 now follows immediately from Theorem 3.2 and Theorem 4.12. We now provide what amounts to a different interpretation of the above. Lemma 4.13. There is an efficient algorithm that takes as input any p0 ≥ 1 and an integer k ≥ 2 and outputs a value t∗ such that fk,t∗ (p0 + δ) and fk,t∗ (p0 − δ) are non-zero for sufficiently small δ > 0, where fk,t∗ (p) is as defined in Eq. (12). Proof. The algorithm simply calls the procedure from Corollary 4.7 with, say, p = 1 and outputs the result. I.e., it suffices to choose any t∗ such that fk,t∗ (1) 6= 0. As in the proof of Corollary 4.11, we observe that the function fk,t∗ (p) is zero on a finite set of values X. The result then follows by taking δ := minx∈X\{p0 } |x − p0 |/2 if X \ {p0 } is non-empty, and δ := c for any c > 0 otherwise. Finally, we derive the main theorem of this section. 8 As we observed in Section 4.2, the set of failure points necessarily includes all even integers p ≤ k − 1. 22 Theorem 4.14. For any efficiently computable δ(n) 6= 0 that converges to zero as n → ∞ and p0 ≥ 1, there is an efficient algorithm that takes as input an integer k ≥ 2 and sufficiently large positive k k integer n and outputs a matrix V ∈ R2 ×k and vector t∗ ∈ R2 that define a (p0 + δ(n), k)-isolating parallelepiped. Proof. The result follows immediately from Proposition 4.4 and Lemma 4.13. In particular, the algorithm runs the procedure from Lemma 4.13, receiving as output some t∗ ∈ R such that fk,t∗ (p0 ± ε) is non-zero for sufficiently small ε > 0. In particular, if n is sufficiently large, then fk,t∗ (p0 + δ(n)) will be non-zero. The result then follows from Proposition 4.4. Item 3 of Theorem 1.2 now follows from Theorem 3.2 and Theorem 4.14. 5 Gap-ETH-based Hardness of Approximation In this section we prove Gap-ETH-based hardness of approximation for CVPp for every p ∈ [1, ∞). We also show a stronger hardness of approximation result for CVP1 . (In Section 6.3, we additionally show a stronger result for p = ∞.) The main idea behind our proof is to use the reduction from Max-2-SAT to CVP described in Section 1.5 without the “identity matrix gadget” that we used to force any closest vector to be a 0-1 combination of basis vectors. We will show that this is permissible because the resulting CVP instance always has a 0-1 combination of basis vectors that is at least as close to the target as any other lattice vector. Theorem 5.1. For every 0 ≤ δ < ε ≤ 1 and every p ∈ [1, ∞), there is a polynomial-time reduction from any (δ, ε)-Gap-2-SAT instance with n variables to an instance of γ-CVPp of rank n, where  γ := δ + (1 − δ) · 3p ε + (1 − ε) · 3p 1/p >1. In particular, when ε = 1, the corresponding approximation factor is (δ + (1 − δ) · 3p )1/p . Proof. Given a (δ, ε)-Gap-2-SAT instance with n variables x1 , . . . , xn and m clauses C1 , . . . , Cm , we construct a CVPp instance (B, t, r) for some fixed p ∈ [1, ∞) as follows. Let B ∈ Zm×n be the basis defined by    2 if Ci contains xj , −2 if Ci contains ¬xj , bi,j :=   0 otherwise. Let t ∈ Rm be the target vector defined by ti := 3 − 2|Ni |, and let r := (εm + (1 − ε)m · 3p )1/p . We claim that there is always a 0-1 combination of basis vectors which is a closest vector to t. Assuming this claim, we analyze kBy − tkp only for y ∈ {0, 1}n without loss of generality, while deferring the proof of the claim until the end. Let y ∈ {0, 1}n be an assignment to the variables of Φ. For every 1 ≤ i ≤ m, |(By − t)i | = 2 X = 2 X yind(`i,s ) − s∈Pi X  yind(`i,s ) − (3 − 2|Ni |) s∈Ni yind(`i,s ) + s∈Pi X s∈Ni = 2 · |Si (y)| − 3 . 23  (1 − yind(`i,s ) ) − 3 (14) The last expression is equal to 1 if y satisfies Ci (i.e. if |Si (y)| ≥ 1) and 3 if not. We therefore have kBy − tkpp = m X |(By − t)i |p = m+ (y) + (m − m+ (y)) · 3p . i=1 Therefore, if val(Φ) ≥ ε then there exists y ∈ {0, 1}n such that kBy − tkpp ≤ εm + (1 − ε)m · 3p = rp , and if val(Φ) < δ, then for every y ∈ {0, 1}n , it holds that kBy − tkpp > δm + (1 − δ)m · 3p = γ p rp . It follows that the reduction achieves the claimed approximation factor of γ. It remains to prove the claim that there is always a 0-1 combination of basis vectors which is a closest vector to t. We show this by demonstrating that for every y ∈ Zn there exists χ(y) ∈ {0, 1}n such that kB · χ(y) − tkp ≤ kBy − tkp . Given y ∈ Zn , let χ(y) ∈ {0, 1}n denote the vector whose ith coordinate is set to 1 if yi ≥ 1 and is set to 0 otherwise. Fix y ∈ Zn and 1 ≤ i ≤ n, and refer to Equation (14). If χ(y) satisfies Ci then |(By − t)i | ≥ |(B·χ(y)−t)i | = 1. On the other hand, if χ(y) does not satisify Ci , then yind(`i,s ) ≤ 0 for all s ∈ Pi and 1 − yind(`i,s ) ≤ 0 for all s ∈ Ni so that |(By − t)i | ≥ 3 and therefore |(By − t)i | ≥ |(B · χ(y) − t)i | = 3. Combining these cases it follows that for all y ∈ Zn and 1 ≤ i ≤ n, |(B · χ(y) − t)i | ≤ |(By − t)i |, and therefore kB · χ(y) − tkp ≤ kBy − tkp , proving the claim. Corollary 5.2. For every p ∈ [1, ∞) and 0 < δ < δ 0 < 1, there is no 2o(n) -time algorithm for γ-CVPp with   6 + δ 0 + (4 − δ 0 ) · 3p 1/p γ := >1 7 + 3p+1 unless randomized Gap-ETH (with respect to (δ, 1)-Gap-3-SAT) fails. Proof. Concatenate the reductions described in Proposition 2.11, Proposition 2.12, and Theorem 5.1.9 5.1 A stronger result for `1 In Theorem 5.1 we showed that there was no need to use the identity matrix gadget in our reduction from Gap-2-SAT to CVP. An interesting question is whether the identity matrix gadget is also unnecessary in our reduction in Theorem 3.2 from Gap-k-SAT to CVPp using (p, k)-isolating parallelepipeds. If so, then we get stronger “Gap-SETH-hardness” for CVPp for all p for which there exist (p, k)-isolating parallelepipeds for infinitely many k ∈ Z+ . Although we do not know how to show this in general, we are able to get stronger hardness of approximation for CVP1 in this way by using the family of (1, k)-isolating parallelepipeds described in Corollary 3.4. The analysis is similar to the analysis in Theorem 5.1. In particular, a 0-1 combination of basis vectors will always be at least as close to the target vector as any other lattice vector will. Theorem 5.3. For every 0 ≤ δ < ε ≤ 1, there is a polynomial-time reduction from any (δ, ε)-Gapk-SAT instance with n variables to an instance of γ-CVP1 of rank n, where γ :=  δ · (k − 1) + (1 − δ) · (k + 1)  ε · (k − 1) + (1 − ε) · (k + 1) 9 > 1. Note that the Gap-2-SAT instance output by Proposition 2.12 contains 1-clauses as well as 2-clauses. We therefore stress that the reduction described in Theorem 5.1 works for this case as well. 24 Proof. Given a (δ, ε)-Gap-k-SAT instance with n variables x1 , . . . , xn and m clauses C1 , . . . , Cm , we construct a CVP1 instance (B, t, r) as follows. The basis B ∈ Z(2m)×n and target vector t ∈ Z2m in the output instance have the form B1  ..  B =  . , Bm  t1  ..  t =  . , tm    with blocks Bi ∈ Z2×n and ti ∈ Z2 for 1 ≤ i ≤ m. For every 1 ≤ i ≤ m and 1 ≤ j ≤ n, set the jth column (Bi )j of block Bi (corresponding to the clause Ci = ∨ks=1 `i,s ) as    (1, 1)T −(1, 1)T (Bi )j :=   (0, 0)T if Ci contains xj , if Ci contains ¬xj , otherwise, and set ti := (k, 1)T − |Ni | · (1, 1)T . Set r := εm(k − 1) + (1 − ε) · m(k + 1). We claim that there is always a 0-1 combination of basis vectors that is closest to t. Assuming the claim, we analyze kBy − tk only for y ∈ {0, 1}n without loss of generality, while deferring the proof of the claim until the end. Let y ∈ {0, 1}n be an assignment to the variables of Φ. For every 1 ≤ i ≤ m, kBi y − ti k1 = = X yind(`i,s ) · (1, 1)T − X s∈Pi s∈Ni X X yind(`i,s ) · (1, 1)T + s∈Pi  yind(`i,s ) · (1, 1)T − (k, 1)T − |Ni | · (1, 1)T 1 − yind(`i,s ) · (1, 1)T − (k, 1)T  s∈Ni = |Si (y)| · (1, 1)T − (k, 1)T 1 1  1 (15) . The last expression is equal to k − 1 if y satisfies Ci (i.e. if |Si (y)| ≥ 1) and k + 1 if not. We therefore have kBy − tk1 = m X kBi y − ti k1 = m+ (y) · (k − 1) + (m − m+ (y)) · (k + 1). i=1 Therefore, if val(Φ) ≥ ε then there exists y ∈ {0, 1}n such that kBy − tk1 ≤ εm(k − 1) + (1 − ε) · m(k + 1) = r, and if val(Φ) < δ then for every y ∈ {0, 1}n , it holds that kBy − tk1 > δm(k − 1) + (1 − δ)m(k + 1) = γr. It follows that the reduction achieves the claimed approximation factor of γ. It remains to prove the claim that there is always a 0-1 combination of basis vectors that is a closest vector to t. We show this by demonstrating that for every y ∈ Zn there exists χ(y) ∈ {0, 1}n such that kBχ(y) − tk1 ≤ kBy − tk1 . Given y ∈ Zn , let χ(y) ∈ {0, 1}n denote the vector whose coordinate is set to 1 if yi ≥ 1 and is set to 0 otherwise. Note that kc(1, 1)T − (k, 1)T k1 = k − 1 for all c ∈ [k], and kc(1, 1)T − (k, 1)T k1 ≥ k + 1 for all c ∈ Z \ [k]. Fix y ∈ Zn and 1 ≤ i ≤ n, and refer to Equation (15). If χ(y) satisfies Ci then kBi · y − ti k1 ≥ kBi · χ(y) − ti k1 = k − 1. On the other hand, if χ(y) does not satisfy Ci , then yind(`i,s ) ≤ 0 for all s ∈ Pi and 1 − yind(`i,s ) ≤ 0 for all s ∈ Ni so that kBi · y − ti k1 ≥ 25 kBi · χ(y) − ti k1 = k + 1. Combining these cases it follows that for all y ∈ Zn and 1 ≤ i ≤ n, kBi · χ(y) − ti k1 ≤ kBi · y − ti k1 , and therefore kB · χ(y) − tk1 ≤ kBy − tk1 , proving the claim. 6 Additional hardness results In this section we prove a number of additional results about the quantitative hardness of CVP and related problems. In Section 6.1, we give a reduction from Max-2-SAT to CVPPp for all p ∈ [1, ∞), proving Theorem 1.4. In Section 6.2, we give a reduction from Max-k-SAT (and in particular Max-2-SAT) to CVPp for all p ∈ [1, ∞), proving Theorem 1.5. Finally, in Section 6.3 we give a reduction from k-SAT to CVP∞ and SVP∞ , proving the special case of Theorem 1.1 for p = ∞. Our reductions all use the same high-level idea as the reduction given in Theorem 3.2, but each uses new ideas as well. Throughout this section we adopt the notation from Section 3. 6.1 Hardness of CVPPp In this section, we prove ETH-hardness of CVPP. To do this, for every n, we construct a single lattice Ln ⊂ Rd of rank O(n2 ), such that for every n-variable instance of Max-2-SAT, there exists an efficiently computable t ∈ Rd that is close to the lattice if and only if Φ is satisfiable. Clearly, any efficient algorithm for CVPP on this lattice would imply a similarly efficient algorithm for Max-2-SAT (and also 3-SAT, as described below). Our basis Bn for Ln will encode all possible O(n2 ) clauses of a Max-2-SAT instance on n variables, together with a gadget that will allow us to “switch on or off” each clause by only changing the coordinates of the target vector t. (This gadget costs us a quadratic blow-up in the lattice rank.) Then, given an instance (Φ, W ) of Max-2-SAT, we define the target vector t such that it “switches on” all clauses from Φ and “switches off” all the remaining clauses. Lemma 6.1. For every p ∈ [1, ∞), there is a pair of polynomial-time algorithms (P, Q) (in analogy to the definition of CVPP) that behave as follows. 1. On input an integer n ≥ 1, P outputs a basis Bn ∈ Rd×N of a rank N lattice Ln ⊂ Rd , where d = d(n) = O(n2 ) and N = N (n) = O(n2 ). 2. On input a Max-2-SAT instance with n variables, Q outputs a target vector t ∈ Rd and a distance bound r ≥ 0 such that distp (t, Ln ) ≤ r if and only if the input is a ‘YES’ instance. Proof. Let M = 4 n2 = O(n2 ) be the total possible number of 2-clauses on n variables, and let C1 , . . . , CM denote those clauses. The algorithm P constructs the basis Bn ∈ Rd×N , where d := n + 2M, N := n + M , as  (bT1 , cT1 )   ..   .   B :=   ,  (bTM , cTM ) 2α1/p IN with rows (bTi , cTi ) of B satisfying bi ∈ Rn and ci ∈ RM for 1 ≤ i ≤ M , and where α := 2p M . For every 1 ≤ i ≤ M and 1 ≤ j ≤ n, set the jth coordinate of bi (corresponding to the clause Ci = `i,1 ∨ `i,2 ) as 26 (bi )j :=    1 if xj appears in the ith clause, −1 if ¬xj appears in the ith clause,   0 otherwise. For every 1 ≤ i ≤ M , set cTi := (0T(i−1) , 1, 0T(M −i) ), i.e., set (c1 , . . . , cM ) = IM . Given an instance (Φ, W ) of Max-2-SAT with m clauses, the algorithm Q outputs r := (M − m + W ) · 1/2p + (m − W ) · (3/2)p + α(n + M − m) and t ∈ Rd defined as u1 .. .  1/p      uM   t :=  α1/p · 1n   v1   ..  .       ,      vM where for 1 ≤ i ≤ M , ui = 3/2 − |Ni |, and vi = 0 if the clause Ci appears in the formula Φ and vi = α1/p otherwise. Clearly both algorithms are efficient. We now analyze for which y ∈ ZN we have kBy − tkp ≤ r. Note that the vector v = (v1 , . . . , vM )T has exactly m coordinates equal to zero, and M − m coordinates equal to α1/p . Given y ∈ / {0, 1}N , we have kBy − tkpp ≥ k2α1/p IN y − (α1/p 1Tn , v T )T kpp ≥ α(n + M − m + 1) ≥ 2p M + α(M + n − m) > rp . Furthermore, if y ∈ {0, 1}N has a non-zero coordinate yn+M +i (for 1 ≤ i ≤ M ) at a position corresponding to a tn+M +i = 0 in t (i.e., Ci ∈ Φ), then again kBy − tkpp ≥ α(n + M − m + 1) > rp . So, we can restrict our attention to y ∈ {0, 1}N with yn+M +i = 0 whenever Ci ∈ Φ. 0 )T ∈ {0, 1}M , Consider an assignment a ∈ {0, 1}n to the n variables of Φ. Take (y 0 )T = (y10 , . . . yM T 0 T T and set y := (a , (y ) ) . Then, for 1 ≤ i ≤ M , h(bTi , cTi )T , yi − ti = X yind(`i,s ) − s∈Pi = X s∈Pi X yind(`i,s ) + hci , y 0 i − (3/2 − |Ni |) s∈Ni yind(`i,s ) − X (1 − yind(`i,s ) ) + yi0 − 3/2 s∈Ni = |Si (a)| + yi0 − 3/2 . If Ci ∈ / Φ, then there exists yi0 ∈ {0, 1}, such that |h(bTi , cTi )T , yi − ti | = 1/2. Moreover, the choice 0 of yi does not affect |h(bTi , cTi )T , yi − ti0 | for i0 6= i. If Ci ∈ Φ and |Si (a)| > 0 for yi0 = 0, then |h(bTi , cTi )T , yi − ti | = 1/2. On the other hand, if Ci ∈ Φ and |Si (a)| = 0, then yi0 = 0 implies |h(bTi , cTi )T , yi − ti | ≥ 3/2. Because |Si (a)| ≥ 1 if and only if Ci is satisfied, we see that the following holds if and only if the number of satisfied clauses m+ (a) is at least W : 27 There exists a y 0 such that, setting y := (a, y 0 ), we have kBy − tkpp = M X  |h(bTi , cTi )T , yi − ti |p + α(n + M − m) i=1 = (M − m + m+ (a)) · (1/2)p + (m − m+ (a)) · (3/2)p + α(n + M − m) ≤ (M − m + W ) · (1/2)p + (m − W ) · (3/2)p + α(n + M − m) = rp . Therefore, there exists y with kBy − tkp ≤ r if and only if (Φ, W ) is a ‘YES’ instance of Max-2-SAT. Proof of Theorem 1.4. The main statement follows from Lemma 6.1. The “in particular” part follows from Lemma 6.1 and the existence of a reduction from 3-SAT with n variables clauses to (many) Max-2-SAT instances with O(n) variables. Indeed, such a reduction follows by applying the Sparsification Lemma (Proposition 2.9), and then reducing each sparse 3-SAT instance to a Max-2-SAT instance with only a linear blow-up in the number of variables (see, e.g., the reduction in [GJS76, Theorem 1.1]). 6.2 ETH- and Max-2-SAT-hardness for all p ∈ [1, ∞) Theorem 6.2. For every p = p(n) ∈ [1, ∞) and k ≥ 2 there is a polynomial-time reduction from any (Weighted-)Max-k-SAT instance with n variables and m clauses to a CVPp instance of rank n + (k − 2)m. Proof. For simplicity we give a reduction from unweighted Max-k-SAT. The modification sketched for reducing from Weighted Max-k-SAT in Theorem 3.2 works here as well. Namely, we give a reduction from a Max-k-SAT instance (Φ, W ) to an instance (B, t, r) of CVPp . Here the formula Φ is on n variables x1 , . . . , xn and m clauses C1 , . . . , Cm . (Φ, W ) is a ‘YES’ instance if there exists an assignment a such that m+ ≥ W . We assume without loss of generality that each variable appears at most once per clause. We define the output CVPp instance as follows. Let d := n + (k − 1)m and let N := n + (k − 2)m. The basis B ∈ Rd×N in the output instance has the form (bT1 , cT1 )   ..   .     B=  T T ,  (bm , cm )  2α1/p · IN   t=   t1 .. . tm α1/p · 1N       with rows (bTi , cTi ) of B satisfying bi ∈ Rn and ci ∈ Rm(k−2) for 1 ≤ i ≤ m, and where α := W · ( 12 )p + (m − W ) · ( 32 )p . For every 1 ≤ i ≤ m and 1 ≤ j ≤ n, set the jth coordinate of bi (corresponding to the clause Ci = ∨ks=1 `i,s ) as    1 if xj is in the ith clause, −1 if ¬xj is in the ith clause, (bi )j :=   0 otherwise. For every 1 ≤ i ≤ m, set cTi := (0T(i−1)(k−2) , −1Tk−2 , 0T(m−i)(k−2) ). I.e., each ci has a block of −1s of length k−2, and ci , ci0 are coordinate-wise disjoint for i 6= i0 . For every 1 ≤ i ≤ m set ti := 3/2−|Ni |. Finally, set r := (α(N + 1))1/p . 28 We next analyze for which y ∈ ZN it holds that kBy − tkp ≤ r. Given y ∈ / {0, 1}N , kBy − tkpp ≥ k2α1/p IN y − α1/p 1N kpp ≥ α(N + 2) > rp , so we only need to analyze the case when y ∈ {0, 1}n . Consider an assignment a ∈ {0, 1}n to the variables of Φ, take (y 0 )T = ((y 01 )T , . . . , (y 0m )T ) ∈ {0, 1}(k−2)m with y 0i ∈ {0, 1}k−2 for 1 ≤ i ≤ m, and set y T := (aT , (y 0 )T ). Then, for 1 ≤ i ≤ m, h(bTi , cTi )T , yi − ti = X yind(`i,s ) − s∈Pi = X X yind(`i,s ) + hci , y 0i i − (3/2 − |Ni |) s∈Ni yind(`i,s ) + s∈Pi = |Si (a)| − X (1 − yind(`i,s ) ) − ky 0i k1 − 3/2 s∈Ni ky 0i k1 − 3/2 . It follows that if |Si (a)| = 0 then |h(bTi , cTi )T , yi − ti | ≥ 32 . On the other hand, if |Si (a)| ≥ 1, then there exists y 0i ∈ {0, 1}k−2 such that |h(bTi , cTi )T , yi − ti | = 12 . Indeed, picking any y 0i with Hamming weight |Si (a)| − 2 or |Si (a)| − 1 achieves this. Moreover, the choice of y 0i does not affect |h(bTi , cTi )T , yi − ti0 | for i0 6= i. Because |Si (a)| ≥ 1 if and only if Ci is satisfied, we see that the following holds if and only if the number of satisfied clauses m+ (a) is at least W : There exists a y 0 such that, setting y := (a, y 0 ), we have kBy − tkpp = m X  |h(bTi , cTi )T , yi − ti |p + αN i=1 + = m (a) · (1/2)p + (m − m+ (a)) · (3/2)p + αN ≤ W · (1/2)p + (m − W ) · (3/2)p + αN = rp . Therefore, there exists y such that kBy − tkp ≤ r if and only if (Φ, W ) is a ‘YES’ instance of Max-k-SAT. We remark that a straightforward modification of the preceding reduction gives a reduction from an instance of Max-k-SAT with k ≥ 3 on n variables and m clauses to a CVPp instance of rank n + (blog2 (k − 2)c + 1)m (as opposed to rank n + (k − 2)m). The idea is to encode the value k − 2 (corresponding to the row-specific blocks −1k−2 used in the reduction) in binary rather than unary. Corollary 6.3. For every p ∈ [1, ∞) there is no 2o(n) -time algorithm for CVPp assuming ETH. Proof. The claim follows by combining the Sparsification Lemma (Proposition 2.9) with the reduction in Theorem 6.2.10 When k = 2, the rank of the CVPp instance output by the reduction in Theorem 6.2 is n. Therefore, we get the following corollary. Corollary 6.4. If there exists a 2(ω/3−ε)n -time (resp. 2(1−ε)n -time and polynomial space) algorithm for CVPp for any p ∈ [1, ∞) and for any constant ε > 0, then there exists a 2(ω/3−ε)n -time (resp. 2(1−ε)n -time and polynomial space) algorithm for (Weighted-)Max-2-SAT and (Weighted-)Max-Cut. 10 As a technical point, we must reduce from k-SAT rather than Max-k-SAT to show hardness under ETH because the Sparsification Lemma works for k-SAT. 29 6.3 The hardness of SVP∞ and CVP∞ Theorem 6.5. There is a polynomial-time reduction from a k-SAT instance with n variables to a CVP∞ instance of rank n. Proof. We give a reduction from a k-SAT formula Φ with n variables x1 , . . . , xn and m clauses C1 , . . . , Cm to an instance (B, t, r) of CVP∞ . We assume without loss of generality that each variable appears at most once per clause. We define the output CVP∞ instance as follows. Let d := m + n. The basis B ∈ Rd×n in the output instance has the form bT1 .. .    B=    bTm (k + 1) · In  t1 .. .     ,   t=   tm (k + 1)/2 · 1n    ,   with rows bi of B satisfying bi ∈ Rn for 1 ≤ i ≤ m. For every 1 ≤ i ≤ m, set bi as in the proof of Theorem 6.2 and set ti := (k + 1)/2 − |Ni |. Set r := (k − 1)/2. We next analyze for which y ∈ Zn it holds that kBy − tk∞ ≤ r. Given y ∈ / {0, 1}n , kBy − tk∞ ≥ k(k − 1) · In y − (k − 1)/2 · 1n k∞ ≥ 3(k − 1)/2 > r, so we only need to analyze the case when y ∈ {0, 1}n . Consider an assignment y ∈ {0, 1}n to the variables of Φ. Then hbi , yi − ti = X yind(`i,s ) − s∈Pi = X X yind(`i,s ) − ((k + 1)/2 − |Ni |) s∈Ni yind(`i,s ) − s∈Pi X (1 − yind(`i,s ) ) − (k + 1)/2 s∈Ni = |Si (a)| − (k + 1)/2 . It follows that if |Si (a)| = 0 then |hbi , yi − ti | = (k + 1)/2, and otherwise |hbi , yi − ti | ≤ (k − 1)/2. Because |Si (a)| ≥ 1 if and only if Ci is satisfied, we then have that kBy − tk∞ = max{|hb1 , yi − t1 |, . . . , |hbm , yi − tm |, (k − 1)/2} = (k − 1)/2 = r if y satisfies Φ, and kBy − tk∞ = (k + 1)/2 > r otherwise. Therefore there exists y such that kBy − tk∞ ≤ r if and only if Φ is satisfiable. Lemma 6.6. There is a polynomial-time reduction from a k-SAT instance with n variables to an SVP∞ instance of rank n + 1. Proof. We give a reduction from a k-SAT formula Φ with n variables x1 , . . . , xn and m clauses C1 , . . . , Cm to an instance (B 0 , r) of SVP∞ . Define the basis B 0 ∈ R(m+n+1)×(n+1) as 0 B := B 0Tn ! −t , −(k − 1)/2 where B and t are as defined in the proof of Theorem 6.5, and set r := (k − 1)/2. We consider for which y ∈ Zn+1 \ {0n+1 } it holds that kByk∞ ≤ r. It is not hard to check that if |yi | ≥ 2 for some 1 ≤ i ≤ n + 1, or if the signs of yi and yn+1 differ for some 1 ≤ i ≤ n, then kByk∞ > r. Therefore we need only consider y of the form y = ±(aT , 1)T where a ∈ {0, 1}n . But for such a y we have that kB 0 yk∞ = kBa − tk∞ , and kBa − tk∞ ≤ (k − 1)/2 if and only if a is a satisfying assignment to Φ by the analysis in the proof of Theorem 6.5. 30 Corollary 6.7. For any constant ε > 0 there is no 2(1−ε)n -time algorithm for SVP∞ or CVP∞ assuming SETH, and there is no 2o(n) -time algorithm for SVP∞ or CVP∞ assuming ETH. Proof. Combine Theorem 6.5 and Lemma 6.6. Note that the preceding reduction in fact achieves an approximation factor of γ = γ(k) := 1 + 2/(k − 1). This implies that for every constant ε > 0, there is a γε > 1 such that no 2(1−ε)n -time algorithm that approximates SVP∞ or CVP∞ to within a factor of γε unless SETH fails. Finally, we remark that the reduction given in Theorem 6.2 is parsimonious when used as a reduction from 2-SAT. I.e., there is a one-to-one correspondence between satisfying assignments in the input instance and close vectors in the output instance. The reductions given in Theorem 6.5 and Lemma 6.6 are also parsimonious.11 Because #2-SAT is #P-hard, our reductions therefore show that the counting version of CVPp (called the Vector Counting Problem) is #P-hard for all 1 ≤ p ≤ ∞, and that the counting version of SVP∞ is #P-hard. This improves (and arguably simplifies the proof of) a result of Charles [Cha07], which showed that the counting version of CVP2 is #P-hard. Acknowledgments We would like to thank Oded Regev for many fruitful discussions and for helpful comments on an earlier draft of this work. We also thank Vinod Vaikuntanathan for recommending that we consider Gap-ETH. References [ABSS93] Sanjeev Arora, László Babai, Jacques Stern, and Z. Sweedyk. The hardness of approximate optima in lattices, codes, and systems of linear equations. In FOCS, 1993. [ABW15] Amir Abboud, Arturs Backurs, and Virginia Vassilevska Williams. Tight hardness results for LCS and other sequence similarity measures. In FOCS, 2015. [ADPS16] Erdem Alkim, Léo Ducas, Thomas Pöppelmann, and Peter Schwabe. Post-quantum key exchange — A new hope. In USENIX Security Symposium, 2016. [ADRS15] Divesh Aggarwal, Daniel Dadush, Oded Regev, and Noah Stephens-Davidowitz. Solving the Shortest Vector Problem in 2n time via discrete Gaussian sampling. In STOC, 2015. [ADS15] Divesh Aggarwal, Daniel Dadush, and Noah Stephens-Davidowitz. Solving the Closest Vector Problem in 2n time— The discrete Gaussian strikes again! In FOCS, 2015. [AJ08] V. Arvind and Pushkar S. Joglekar. Some sieving algorithms for lattice problems. In IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, 2008. [Ajt98] Miklós Ajtai. The Shortest Vector Problem in L2 is NP-hard for randomized reductions. In STOC, 1998. 11 Actually, in the case of SVP∞ , each satisfying assignment to the SAT formula corresponds to a pair ±v of shortest non-zero vectors, so that there are exactly twice as many such vectors as there are satisfying assignments. 31 [Ajt04] Miklós Ajtai. Generating hard instances of lattice problems. In Complexity of computations and proofs, volume 13 of Quad. Mat., pages 1–32. Dept. Math., Seconda Univ. Napoli, Caserta, 2004. Preliminary version in STOC’96. [AKKV11] Mikhail Alekhnovich, Subhash Khot, Guy Kindler, and Nisheeth K. Vishnoi. Hardness of approximating the Closest Vector Problem with Pre-processing. Computational Complexity, 20, 2011. [AKS01] Miklós Ajtai, Ravi Kumar, and D. Sivakumar. A sieve algorithm for the Shortest Lattice Vector Problem. In STOC, 2001. [AKS02] Miklós Ajtai, Ravi Kumar, and D. Sivakumar. Sampling short lattice vectors and the Closest Lattice Vector Problem. In CCC, 2002. [APS15] Martin R. Albrecht, Rachel Player, and Sam Scott. On the concrete hardness of Learning with Errors. J. Mathematical Cryptology, 9(3):169–203, 2015. [AR05] Dorit Aharonov and Oded Regev. Lattice problems in NP ∩ coNP. J. ACM, 52(5):749– 765, 2005. Preliminary version in FOCS 2004. [BCD+ 16] Joppe W. Bos, Craig Costello, Léo Ducas, Ilya Mironov, Michael Naehrig, Valeria Nikolaenko, Ananth Raghunathan, and Douglas Stebila. Frodo: Take off the ring! Practical, quantum-secure key exchange from LWE. In CCS, 2016. [BD15] Nicolas Bonifas and Daniel Dadush. Short paths on the Voronoi graph and the Closest Vector Problem with Preprocessing. In SODA, 2015. [BDGL16] Anja Becker, Léo Ducas, Nicolas Gama, and Thijs Laarhoven. New directions in nearest neighbor searching with applications to lattice sieving. In SODA, 2016. [BI15] Arturs Backurs and Piotr Indyk. Edit Distance cannot be computed in strongly subquadratic time (unless SETH is false). In STOC, 2015. [BN09] Johannes Blömer and Stefanie Naewe. Sampling methods for shortest vectors, closest vectors and successive minima. Theoret. Comput. Sci., 410(18):1648–1665, 2009. [CDL+ 12] Marek Cygan, Holger Dell, Daniel Lokshtanov, Dániel Marx, Jesper Nederlof, Yoshio Okamoto, Ramamohan Paturi, Saket Saurabh, and Magnus Wahlström. On problems as hard as CNF-SAT. In CCC, 2012. [CFK+ 15] Marek Cygan, Fedor V. Fomin, Lukasz Kowalik, Daniel Lokshtanov, Dániel Marx, Marcin Pilipczuk, Michal Pilipczuk, and Saket Saurabh. Parameterized Algorithms. Springer, 2015. [Cha07] Denis Xavier Charles. Counting lattice vectors. J. Comput. Syst. Sci., 73(6):962–972, 2007. [CLR+ 14] Shiri Chechik, Daniel H. Larkin, Liam Roditty, Grant Schoenebeck, Robert Endre Tarjan, and Virginia Vassilevska Williams. Better approximation algorithms for the graph diameter. In SODA, 2014. 32 [CN98] Jin-Yi Cai and Ajay Nerurkar. Approximating the SVP to within a factor (1 + 1/ dimε ) is NP-hard under randomized conditions. In CCC, 1998. [Dad12] Daniel Dadush. A O(1/ε2 )n -time sieving algorithm for approximate Integer Programming. In LATIN, 2012. [Din16] Irit Dinur. Mildly exponential reduction from gap 3SAT to polynomial-gap label-cover. Electronic Colloquium on Computational Complexity (ECCC), 23:128, 2016. [DKRS03] Irit Dinur, Guy Kindler, Ran Raz, and Shmuel Safra. Approximating CVP to within almost-polynomial factors is NP-hard. Combinatorica, 23(2):205–243, 2003. [DPV11] Daniel Dadush, Chris Peikert, and Santosh Vempala. Enumerative lattice algorithms in any norm via M-ellipsoid coverings. In FOCS, 2011. [DRS14] Daniel Dadush, Oded Regev, and Noah Stephens-Davidowitz. On the Closest Vector Problem with a distance guarantee. In CCC, pages 98–109, 2014. [FM04] Uriel Feige and Daniele Micciancio. The inapproximability of lattice and coding problems with preprocessing. Journal of Computer and System Sciences, 69(1):45–67, 2004. Preliminary version in CCC 2002. [GG00] Oded Goldreich and Shafi Goldwasser. On the limits of nonapproximability of lattice problems. J. Comput. Syst. Sci., 60(3):540–563, 2000. Preliminary version in STOC 1998. [GHNR03] Jens Gramm, Edward A. Hirsch, Rolf Niedermeier, and Peter Rossmanith. Worst-case upper bounds for MAX-2-SAT with an application to MAX-CUT. Discrete Applied Mathematics, 130(2):139–155, 2003. [GJS76] Michael R. Garey, David S. Johnson, and Larry Stockmeyer. Some simplified NPcomplete graph problems. Theoretical Computer Science, 1(3):237–267, 1976. [GMSS99] Oded Goldreich, Daniele Micciancio, Shmuel Safra, and Jean-Pierre Seifert. Approximating shortest lattice vectors is not harder than approximating closest lattice vectors. Information Processing Letters, 71(2):55 – 61, 1999. [GN08] Nicolas Gama and Phong Q. Nguyen. Finding short lattice vectors within Mordell’s inequality. In STOC, 2008. [GPV08] Craig Gentry, Chris Peikert, and Vinod Vaikuntanathan. Trapdoors for hard lattices and new cryptographic constructions. In STOC, pages 197–206, 2008. [HP] S. Har-Peled. Concentration of Random Variables – Chernoff’s Inequality. Available at http://sarielhp.org/teach/13/b_574_rand_alg/lec/07_chernoff.pdf. [HR12] Ishay Haviv and Oded Regev. Tensor-based hardness of the Shortest Vector Problem to within almost polynomial factors. Theory of Computing, 8(23):513–531, 2012. Preliminary version in STOC’07. 33 [IP99] Russell Impagliazzo and Ramamohan Paturi. On the complexity of k-SAT. In CCC, pages 237–240, 1999. [IPZ01] Russell Impagliazzo, Ramamohan Paturi, and Francis Zane. Which problems have strongly exponential complexity? J. Comput. Syst. Sci., 63(4):512–530, 2001. [Jam06] G. J. O. Jameson. Counting zeros of generalised polynomials: Descartes’ rule of signs and Laguerre’s extensions. The Mathematical Gazette, 90(518):223–234, 2006. [JS98] Antoine Joux and Jacques Stern. Lattice reduction: A toolbox for the cryptanalyst. Journal of Cryptology, 11(3):161–185, 1998. [Kan87] Ravi Kannan. Minkowski’s convex body theorem and Integer Programming. Math. Oper. Res., 12(3):415–440, 1987. [Kho05] Subhash Khot. Hardness of approximating the Shortest Vector Problem in lattices. Journal of the ACM, 52(5):789–808, September 2005. Preliminary version in FOCS’04. [KPV14] Subhash Khot, Preyas Popat, and Nisheeth K. Vishnoi. 2log n hardness for Closest Vector Problem with Preprocessing. SIAM Journal on Computing, 43(3):1184–1205, 2014. [Laa15] Thijs Laarhoven. Sieving for shortest vectors in lattices using angular locality-sensitive hashing. In CRYPTO, 2015. [Len83] Hendrik W. Lenstra, Jr. Integer Programming with a fixed number of variables. Math. Oper. Res., 8(4):538–548, 1983. [LG14] François Le Gall. Powers of tensors and fast matrix multiplication. In ISAAC, 2014. [LLL82] Arjen K. Lenstra, Hendrik W. Lenstra, Jr., and László Lovász. Factoring polynomials with rational coefficients. Math. Ann., 261(4):515–534, 1982. 1−ε [LWXZ11] Mingjie Liu, Xiaoyun Wang, Guangwu Xu, and Xuexin Zheng. Shortest lattice vectors in the presence of gaps. IACR Cryptology ePrint Archive, 2011:139, 2011. [Mic01a] Daniele Micciancio. The hardness of the Closest Vector Problem with Preprocessing. IEEE Transactions on Information Theory, 47(3):1212–1215, 2001. [Mic01b] Daniele Micciancio. The Shortest Vector Problem is NP-hard to approximate to within some constant. SIAM Journal on Computing, 30(6):2008–2035, March 2001. Preliminary version in FOCS 1998. [MR17] Pasin Manurangsi and Prasad Raghavendra. A birthday repetition theorem and complexity of approximating dense csps. In 44th International Colloquium on Automata, Languages, and Programming, ICALP 2017, July 10-14, 2017, Warsaw, Poland, pages 78:1–78:15, 2017. [MV10] Daniele Micciancio and Panagiotis Voulgaris. Faster exponential time algorithms for the Shortest Vector Problem. In SODA, pages 1468–1480, 2010. 34 [MV13] Daniele Micciancio and Panagiotis Voulgaris. A deterministic single exponential time algorithm for most lattice problems based on Voronoi cell computations. SIAM Journal on Computing, 42(3):1364–1391, 2013. [MW15] Daniele Micciancio and Michael Walter. Fast lattice point enumeration with minimal overhead. In SODA, 2015. [MW16] Daniele Micciancio and Michael Walter. Practical, predictable lattice basis reduction. In Eurocrypt, 2016. [NIS16] NIST post-quantum standardization call for proposals. http://csrc.nist.gov/ groups/ST/post-quantum-crypto/cfp-announce-dec2016.html, 2016. Accessed: 2017-04-02. [NS01] Phong Q. Nguyen and Jacques Stern. The two faces of lattices in cryptology. In Cryptography and Lattices, pages 146–180. Springer, 2001. [NV08] Phong Q. Nguyen and Thomas Vidick. Sieve algorithms for the shortest vector problem are practical. J. Math. Cryptol., 2(2):181–207, 2008. [Odl90] Andrew M. Odlyzko. The rise and fall of knapsack cryptosystems. Cryptology and Computational Number Theory, 42:75–88, 1990. [Pei08] Chris Peikert. Limits on the hardness of lattice problems in `p norms. Computational Complexity, 17(2):300–351, May 2008. Preliminary version in CCC 2007. [Pei16] Chris Peikert. A decade of lattice cryptography. Foundations and Trends in Theoretical Computer Science, 10(4):283–424, 2016. [PS09] Xavier Pujol and Damien Stehlé. Solving the Shortest Lattice Vector Problem in time 22.465n . IACR Cryptology ePrint Archive, 2009:605, 2009. [PW10] Mihai Pătraşcu and Ryan Williams. On the possibility of faster SAT algorithms. In SODA, 2010. [Reg04] Oded Regev. Improved inapproximability of lattice and coding problems with preprocessing. IEEE Transactions on Information Theory, 50(9):2031–2037, 2004. Preliminary version in CCC’03. [Reg09] Oded Regev. On lattices, learning with errors, random linear codes, and cryptography. Journal of the ACM, 56(6):Art. 34, 40, 2009. [RR06] Oded Regev and Ricky Rosen. Lattice problems and norm embeddings. In STOC, 2006. [Sch87] Claus P. Schnorr. A hierarchy of polynomial time lattice basis reduction algorithms. Theoretical Computer Science, 53:201 – 224, 1987. [SFS09] Naftali Sommer, Meir Feder, and Ofir Shalvi. Finding the closest lattice point by iterative slicing. SIAM J. Discrete Math., 23(2):715–731, 2009. [Sha84] Adi Shamir. A polynomial-time algorithm for breaking the basic Merkle-Hellman cryptosystem. IEEE Trans. Inform. Theory, 30(5):699–704, 1984. 35 [Vai15] Vinod Vaikuntanathan. Private communication, 2015. [vEB81] Peter van Emde Boas. Another NP-complete problem and the complexity of computing short vectors in a lattice. Technical report, University of Amsterdam, Department of Mathematics, Netherlands, 1981. Technical Report 8104. [Wil05] Ryan Williams. A new algorithm for optimal 2-Constraint Satisfaction and its implications. Theoretical Computer Science, 348(2-3):357–365, 2005. [Wil12] Virginia Vassilevska Williams. Multiplying matrices faster than Coppersmith-Winograd. In STOC, 2012. [Wil15] Virginia Vassilevska Williams. Hardness of easy problems: Basing hardness on popular conjectures such as the Strong Exponential Time Hypothesis (invited talk). In IPEC, pages 17–29, 2015. [Wil16] Ryan Williams. Strong ETH breaks with Merlin and Arthur: Short non-interactive proofs of batch evaluation. In CCC, 2016. [WLTB11] Xiaoyun Wang, Mingjie Liu, Chengliang Tian, and Jingguo Bi. Improved Nguyen-Vidick heuristic sieve algorithm for shortest vector problem. In ASIACCS, 2011. [Woe08] Gerhard J. Woeginger. Open problems around exact algorithms. Discrete Applied Mathematics, 156(3):397–405, 2008. 36
8cs.DS
HIERARCHICALLY COCOMPACT CLASSIFYING SPACES FOR MAPPING CLASS GROUPS OF SURFACES arXiv:1712.00496v1 [math.GR] 1 Dec 2017 BRITA NUCINKIS AND NANSEN PETROSYAN Dedicated to Peter Kropholler on the occasion of his 60th birthday. Abstract. We define the notion of a hierarchically cocompact classifying space for a family of subgroups of a group. Our main application is to show that the mapping class group ModpSq of any connected oriented compact surface S, possibly with punctures and boundary components and with negative Euler characteristic has a hierarchically cocompact model for the family of virtually cyclic subgroups of dimension at most vcd ModpSq` 1. When the surface is closed, we prove that this bound is optimal. In particular, this answers a question of Lück for mapping class groups of surfaces. 1. Introduction Let G be a group and denote by F a family of subgroups of G, that is a collection of subgroups of G closed under conjugation and finite intersection. We denote by EF G the classifying space for the family F. A G-CW-complex X is said to be a model for EF G if X H is contractible for all H P F, and X H is empty otherwise. The minimal dimension of a model for EF G, denoted by gdF G, is called the geometric dimension of G for the family F. Definition 1.1. We say a G-CW-complex X is a hierarchically cocompact (hierarchically finite type) model for EF G if there are families Fi Ť (i P I some indexing set) such that F “ iPI Fi , and that there are cocompact (finite type) models for EFi G for all i P I. By the universal property for classifying spaces for families, this is equivalent to saying that there is a model for EF G which is a mapping telescope of cocompact (finite type) models for EFi G. This follows from an argument analogous to [18, Theorem 6.11]. Date: December 5, 2017. 2010 Mathematics Subject Classification. 20J06, 55R35. The second author was supported by the EPSRC First Grant EP/N033787/1. 1 2 BRITA NUCINKIS AND NANSEN PETROSYAN Definition 1.1 was motivated by the following conjecture of Juan-Pineda and Leary. Conjecture 1.2 (Juan-Pineda–Leary, [12]). Denote by Vc the family of virtually cyclic subgroups of a group G, and let G be a group admitting a cocompact model for EVc G. Then G is virtually cyclic. This conjecture has been proved in many cases, such as, for example, hyperbolic groups [12], elementary amenable groups [9], one-relator groups, CAT(0)-groups, acylindrically hyperbolic groups, 3-manifold groups [22], and linear groups [23]. In all of these examples it was shown that these groups cannot admit a model for EVc G with a finite type 0-skeleton, a condition equivalent to G having a finite set of virtually cyclic subgroups tH1 , ..., Hn u such that every virtually cyclic subgroup is sub-conjugate to Hi for some 1 ď i ď n. T. von Puttkamer and X. Wu [23] actually conjecture that any finitely presented group satisfying this condition is already virtually cyclic. They also exhibit a finitely generated example of type F0 . Note, that non-finitely generated examples were already known, as for example [21, 6.4.6] the famous construction of Higman-Neumann-Neumann with one conjugacy class of elements. In line with convention, we write EG for a classifying space for proper actions and EG for EVc G. Denote the geometric dimension for proper action by gd G and gdVc G by gd G. We also say that a group admitting a hierarchically cocompact model for EG is of type hF. Finally, we use the notation hF8 for a group admitting a hierarchically finite type model for EG. In this paper we provide a method by which to construct hierarchically cocompact (hierarchically finite-type) models for EG out of cocompact (finite-type) models for EG, provided that commensurators of virtually cyclic subgroups satisfy some further finiteness conditions. This enables us to show that many classes of finitely presented groups that do not satisfy the hypothesis of Conjecture 1.2, in particular are not of type F0 , are still of type hF. Based on our observations of groups of type hF, we ask the following question. Question 1.3. Suppose a group G is of type hF. Are commensurators of virtually cyclic subgroups of type F8 ? CLASSIFYING SPACES FOR MAPPING CLASS GROUPS 3 The main result of the paper is the following. Theorem 1.4. Let S be a compact connected orientable surface of genus g, with a finite number of boundary components and punctures, and with negative Euler characteristic. Then the mapping class group ModpSq has a hierarchically cocompact model for EModpSq of dimension vcd ModpSq ` 1. Moreover, if S is closed and g ě 1, then gd ModpSq “ cd ModpSq “ vcd ModpSq ` 1. Since gd ModpSq “ vcd ModpSq (see [1]), we note that this answers a question by Wolfgang Lück which asks for which countable groups G the inequality gd G ´ 1 ď gd G ď gd G ` 1 holds, see for example [15, Problem 9.51]. By Theorem 1.4, the above inequality is always satisfied for the mapping class group of any compact connected orientable surface S with a finite number of boundary components and punctures, and and χpSq ă 0. Roughly stated, the hierarchically cocompact model for EModpSq can be obtained by attaching certain fibred spaces to the Teichmüller space of S. These are associated to the Weyl groups of the infinite cyclic subgroups H “ xf y ď ModpSq representing the set I of the complete sub-conjugacy classes of infinite virtually cyclic subgroups of ModpSq. These spaces fibre over products of a Euclidean space and a Teichmüller space corresponding to the pseudo-Anosov and the trivial components in the canonical reduction system of f P ModpSq respectively. Since the attaching maps are equivariant, Teichmüller spaces could be replaced by spines or the relevant minimal models for the local subgroups to obtain the desired hierarchically cocompact model of minimal dimension. It is worth pointing out, that if one applies the above attaching construction to only a finite subset J Ă I, then the resulting space will be a cocompact model for the classifying space of ModpSq for the family of all virtually cyclic subgroups that are sub-conjugate to a subgroup in J. Finite dimensional models for EModpSq have been exhibited by Degrijse and the second author in [5] for closed surfaces S (the obtained bound on dimension is 9g ´ 8) and later by Juan-Pineda and TrufiloNegrete in [13] for surfaces S that have negative Euler characteristic with possible punctures and boundary components (the obtained bound is rModpSq : ModpSqrmsspvcd ModpSq`1q, m ě 3 where ModpSqrms is the level m congruence subgroup). Apart from exhibiting models that 4 BRITA NUCINKIS AND NANSEN PETROSYAN are mapping telescopes of cocompact models, our bounds substantially improve on the bounds given there. In particular, for closed surfaces, our bounds are optimal. Furthermore, recently Bartels and Bestvina showed that mapping class groups of oriented surfaces G of finite type satisfy the Farrell-Jones conjecture [2]. For example, the assembly map, which is induced by the G-map EG Ñ tptu, – Ñ Kn pZGq, HnG pEG; KZ q Ý is an isomorphism, where HnG p´; KZq is the Bredon homology theory with the K-theory functor coefficients. In particular, since homology commutes with colimits and when χpSq ă 0, G “ ModpSq is of type hF, the left-hand side of the isomorphism is a colimit of, hopefully, more computable homological terms. For a detailed introduction into the Farrell-Jones conjecture the reader is referred to [15]. In the next section, we define what exactly is meant by a hierarchically cocompact model for a classifying space, and give a recipe for constructing these models. We also exhibit some examples in Section 3. Since we will need some results on Bredon cohomological dimensions later when giving lower bounds for the dimensions of our models, we give a brief introduction into Bredon cohomology in Section 4. Section 5 is devoted to proving our main result, Theorem 1.4. 2. Constructing hierarchically cocompact models The following construction, due to Lück and Weiermann [17], will play a crucial role in what is to come: Let F and G be families of subgroups of a given group G such that F Ď G. Definition 2.1. [17, (2.1)] A strong equivalence relation on G r F, denoted „, is an equivalence relation on G r F satisfying: ‚ For H, K P G r F with H ď K we have H „ K. ‚ Let H, K P G r F and g P G, then H „ K ðñ gHg ´1 „ gKg ´1. Denote by rG r Fs the equivalence classes of „ and define for all rHs P rG r Fs the following subgroup of G: NG rHs “ tg P G | rgHg ´1s “ rHsu. CLASSIFYING SPACES FOR MAPPING CLASS GROUPS 5 Now define a family of subgroups of NG rHs by FrHs “ tK ď NG rHs | K P G r F , rKs “ rHsu Y pF X NG rHsq, where F X NG rHs is the family of subgroups of NG rHs that are in F. Remark 2.2. A typical example of a pair of families that has a strong equivalence relation is the finite and the virtually cyclic subgroups of G. Here, the equivalence relation is the commensurability. We need the following theorem of Lück and Weiermann. Proposition 2.3. [17, Theorem 2.3] Let F Ď G be families with a strong equivalence relation on G r F. Denote by I a complete set of representatives of the conjugacy classes in rG r Fs. Then the G-CWcomplex given by the cellular G push-out Ů Ů rHsPI rHsPI Ů G ˆNG rHs EFXNG rHs NG rHs i / EF G idG ˆNG rH frHs  rHsPI G ˆNG rHs EFrHs NG rHs  / X where either i or the frHs are inclusions, is a model for EG G. The condition on the two maps being inclusions is not a big restriction as one can replace the spaces by the mapping cylinders, see [17, Remark 2.5]. We also need the following transitivity principle. Proposition 2.4. [17, Proposition 5.1] Let F Ď G be families of subgroups of a group G. Assume that G admits a cocompact (finite type) model XG for EG G and that every subgroup H P G admits a cocompact (finite type) model XFXH pHq for EFXH H. Then G admits a cocompact (finite type) model for EF G of dimension dim XG ` suptdim XFXH pHq | H P Gu. Theorem 2.5. Let F Ď G be families with a strong equivalence relation on GrF. Suppose that for every H P GrF, NG rHs admits a cocompact (finite type) model XFXH pNG rHsq for EFXH NG rHs. Further assume that G admits a cocompact (finite type) model XF for EF G and that for each H P G, there is a cocompact (finite type) model XFrHs pNG rHsq for EFrHs NG rHs, then G admits a hierarchically cocompact (hierarchically finite type) model for EG G of dimension suptdim XF , dim XFXH pNG rHsq ` 1, dim XFrHs pNG rHsq | H P G r Fu. 6 BRITA NUCINKIS AND NANSEN PETROSYAN Proof. Let S be a set of representatives of some finite number of conjugacy classes in rG r Fs and denote p FrSs :“ tK ď G | K P G r F , Dg P G, H P S, rK g s “ rHsu Y F. p Consider the G-push-out of Proposition 2.3 replacing G by FrSs: Ů Ů rHsPS rHsPS G ˆNG rHs XFXH pNG rHsq i XF / idG ˆNG rHs ιrHs Ů  rHsPS G ˆNG rHs cylpfrHs q  / X where ιrHs is the natural inclusion, and frHs : XFXH pNG rHsq Ñ XFrHs pNG rHsq is given by the universal property for classifying spaces for a family. X is now a cocompact (finite type) model for EFrSs G, as it is a G-push-out p of cocompact (finite type) complexes. The result now follows from the Ť p fact that G “ SĎI,|S|ă8 FrSs and the remark after Definition 1.1.  p We denote FrHs :“ tK ď G | K P G r F , Dg P G, rK g s “ rHsu Y F and p p note that FrHs “ FrSs exactly when S “ tHu. We end this section with a useful lemma. Lemma 2.6. Suppose F Ď G are families of subgroups of a group G, and that for each H P G r F, G admits cocompact (finite type) models for both EFrHs G and EFXH H. Then G admits a hierarchically p cocompact (finite type) model for EG G. Proof. For any two families F1 and F2 of subgroups of G, we have unique maps (up to G-homotopy) EF1 XF2 G Ñ EF1 G and EF1 XF2 G Ñ EF2 G. The double mapping cylinder X gives a model for EF1 YF2 G, and that if EF1 XF2 G, EF1 G and EF2 G are cocompact (finite type), then so is X. p 1 s, and F2 “ FrH p 2 s. Then, Now, let rH1s ‰ rH2 s P I and F1 “ FrH p 1 sqrH2s “: FrH p 1 , H2 s. By obviously F1 X F2 “ F and F1 Y F2 “ pFrH assumption there are cocompact (finite type) models for EF1 G and EF2 G, and the transitivity result in Proposition 2.4 yields that there is also a cocompact (finite type) model for EF1 XF2 G. The double mapping cylinder X gives a cocompact (finite type) model for EF1 YF2 G. p 1 , ..., Hi s :“ FrH p 1 , ..., Hi´1 srHi s. Proceed by For each i ą 2, let FrH induction, to construct a cocompact (finite type) model for EFrH p 1 ,...,His G from cocompact (finite type) models for EFrH p 1 ,...,Hi´1s G and EFrH p i s G as above.  CLASSIFYING SPACES FOR MAPPING CLASS GROUPS 7 3. Some examples In the next examples, let F and Vc be the families of finite and virtually cyclic subgroups of a given group G, respectively, equipped with the commensurability relation on Vc r F (see Remark 2.2). 3.1. Thompson groups. In [18] the authors introduced a similar condition for the family of finite subgroups, quasi-F8 , which asks for a group to have, for any k P Zą0 , finitely many conjugacy classes of finite subgroups of order k, and that normalisers of all finite subgroups are of type F8 . [19, Theorem 4.9] shows that generalised Thompson groups, which are automorphism groups of valid, bounded and complete Cantor-algebras are quasi-F8 and hence are hF8 . 3.2. Hyperbolic groups. Following [17], a group is said to satisfy pNMFfin ĎVc q, if every virtually cyclic subgroup is contained in a unique maximal virtually cyclic group V , such that NG pV q “ V. Then, by [17, Corollary 2.11], the push-out in Proposition 2.3 reduces to G ˆV EV EG /  G{V  / X, G, provided there is a cocomwhere X is a cocompact model for EFy fin rV s pact model for EG. Now, apply Lemma 2.6, to conclude that any group satisfying pNMFfin ĎVc q that has a cocompact model for EG is of type hF. In particular, hyperbolic groups satisfy pNMFfin ĎVc q [12, Remark 7], and hence are of type hF. 3.3. Polycyclic groups. Polycyclic groups are of type hF. This follows from [17, Lemma 5.15] - for every infinite virtually cyclic group V , there exists a cyclic subgroup C commensurate to V such that NG rCs “ NG pCq, and hence a model for EFrV s NG rV s is given by EpNG pCq{Cq by pulling back the action. Now, since G is polycyclic, we have a cocompact EG and a cocompact EpNG pCq{Cq for every C. Now apply Theorem 2.3. 3.4. Soluble Baumslag-Solitar groups. One can also show that the soluble Baumslag-Solitar groups G “ BSp1, nq are of type hF. The group G is torsion-free and admits a cocompact 2´dimensional model for EG “ EG. Next, we show that for all cyclic subgroups H ď G, we 8 BRITA NUCINKIS AND NANSEN PETROSYAN have a finite model XFrHs pNG rHsq for EFrHs NG rHs and apply Theorem 2.5. Recall, BSp1, nq – Zr n1 s ¸ Z. Any infinite cyclic subgroup H not contained in Zr n1 s, is equal to its commensurator, see [8, Lemma 5], and hence NG rHs has a point as a model for EFrHs NG rHs, and R is a cocompact model for EG. Infinite cyclic subgroups of Zr n1 s, on the other hand, are all commensurate to K “ x n1 y ď Zr n1 s. K has the entire G as its commensurator. Since G is an HNN-extension with the vertex group K, the associated BassSerre tree is a cocompact model for EFrKs G. Applying Theorem 2.5, we obtain that BSp1, nq is of type hF for all n ą 0. Note that when n ą 1, the normaliser NG px n1 yq “ Zr n1 s is not even finitely generated. However, in all examples in this note, the commensurators of virtually cyclic subgroups are of type F8 . It is not clear whether this is just an artefact of our construction, and hence we ask, see Question 1.3: Question. Suppose a group G is of type hF. Are commensurators of virtually cyclic subgroups of type F8 ? 4. Bredon cohomology In this section we introduce all necessary facts and results regarding Bredon cohomology needed later on to determine lower bounds for dimensions of our classifying spaces. All results in this section are well known; a good introduction to the subject can be found in [7]. Let F denote a family of subgroups of a given group G as before. We consider the category OF G, which has as objects the transitive G-sets with stabilisers in F. Morphisms in OF G are G-maps between those G-sets. Modules over the orbit category, called OF G-modules are contravariant functors from the orbit category to the category of abelian groups. Exactness is defined pointwise: a sequence AÑBÑC of OF G-modules is exact at B if and only if the sequence of abelian groups ApG{Kq Ñ BpG{Kq Ñ CpG{Kq is exact at BpG{Kq for every G{K P OF G . The trivial OF G-module, which is denoted Zp´q, is the constant functor Z from OF G to the category of abelian groups. CLASSIFYING SPACES FOR MAPPING CLASS GROUPS 9 The category OF G-Mod of OF G-modules has enough projectives. Hence we can consider a projective resolution P˚ p´q Ñ Zp´q Ñ 0 of the trivial module Zp´q. The Bredon cohomology functors H˚F pG, ´q are defined as derived functors of HomF pZp´q, ´q. In particular, for each N “ Np´q P OF G-Mod, H˚F pG, Nq “ H˚ pmorpP˚ , Nqq. We can now define cohomological dimensions in the Bredon-setting with analogous properties to ordinary cohomology. Let n ě 0. We say G has Bredon-cohomological dimension cdF G ď n if there is a projective resolution of Zp´q of length n. This is equivalent to HFn`1 pG, Nq “ 0 for all OF G-modules N. Let X be a model for EF G. Then the cellular chain complex C˚ pXq gives rise to a free resolution C˚ pXqp´q Ñ Zp´q Ñ 0 by putting C˚ pXqpG{Kq “ C˚ pX K q for all K P OF G . In particular, cdF G ď gdF G. Furthermore, [14, Theorem 13.19], if cdF G ě 3, then gdF G “ cdF G. As before, for F the family of finite groups, we write cd G and gd G, and for F the family of virtually cyclic subgroups we write cd G and gd G respectively. Note that for torsion-free groups, cd G “ cd G and gd G “ gd G and Bredon-cohomology for the family of finite subgroups becomes ordinary cohomology over the group ring ZG. We will quite often make use of this simple observation. When G is virtually torsion-free, then cd G ě vcd G. So, if G admits a model for EG of dimension vcd G, then it must necessary be of minimal dimension, i.e. realising gd G. 5. Mapping class groups In this section, we prove our main theorem and show that the mapping class group of any compact orientable surface S with possibly finitely many punctures and boundary components, and with negative Euler characteristic χpSq is of type hF with a hierarchically cocompact model of dimension vcd ModpSq ` 1. We recall some necessary background on mapping class groups of surfaces and refer the reader to [6] and [11] for further details. 10 BRITA NUCINKIS AND NANSEN PETROSYAN Let S be a connected compact oriented surface with finitely many punctures and χpSq ă 0. The mapping class group of S, denoted by ModpSq, is the group of isotopy classes of orientation preserving diffeomorphisms of S pointwise fixing the boundary BS ModpSq “ Diff` pS, BSq{Diff0 pS, BSq, where Diff0 pS, BSq is the subgroup of Diff` pS, BSq consisting of elements that are isotopic to the identity. Any diffeomorphism of S induces an automorphism of H1 pS, Z{mZq for m ě 2. This gives a well-defined homomorphism ModpSq Ñ AutpH1 pS, Z{mZqq where the kernel is denoted by ModpSqrms and it is called the level m congruence subgroup of ModpSq. Suppose now that S has no boundary. Let tα1 , . . . , αn u be a collection of pairwise disjoint, homotopically distinct essential simple closed curves in S. Denote by σ “ trα1 s, . . . , rαn su the corresponding isotopy classes. Inclusion homomorphism. ([6, Thm. 3.18]). Let Nσ be an open regular neighbourhood of Ynj“1αj in S. Denote Sσ “ S r Nσ and set Sσ “ Yki“1 Si where each Si is a connected subsurface. Let tβ1 , γ1 u, . . . , tβk , γk u denote the pairs of boundary components of Sσ that bound the annuli in Nσ . The inclusion Sσ ãÑ S induces a homomorphism ησ : ModpSσ q “ k ź ModpSi q Ñ ModpSq i“1 with kernel xTβ1 Tγ´1 , . . . , Tβk Tγ´1 y. The restriction ηi :“ ησ |ModpSi q is 1 k the map induced by the inclusion Si ãÑ S. Capping homomorphism. ([6, Prop. 3.19]) Let Spσ be the surface obtained from Sσ by capping the boundary components with once-punctured disks and write Spσ “ Yki“1 Spi . The inclusion Sσ ãÑ Spσ induces a homomorphism θσ : ModpSσ q ։ k ź i“1 ModpSpi , Ωi q Ď ModpSpσ q with kernel xTβ1 , Tγ1 , . . . , Tβk , Tγk y. Here Ωi denotes the set of punctures coming from the boundary components of Si . The image of the restriction θi :“ θσ |ModpSi q , denoted ModpSpi , Ωi q, is the subgroup of ModpSpi q consisting of all the elements that fix Ωi pointwise. ModpSpi , Ωi q contains the pure mapping class group and hence is finite index in ModpSpi q. CLASSIFYING SPACES FOR MAPPING CLASS GROUPS 11 Cutting homomorphism. ([6, Prop. 3.20]) Define ModpSqσ “ tg P ModpSq | gpσq “ σu. There is a well-defined homomorphism ρσ : ModpSqσ Ñ ModpS r Ynj“1αj q “ ModpSpσ q with free abelian kernel xTα1 , . . . , Tαn y generated by the Dehn twists about the curves α1 , . . . , αn . Let ModpSq0σ be the finite index subgroup of ModpSqσ consisting of all the elements that fix each curve αi with orientation. Denote the restriction ρσ,0 “ ρσ |ModpSq0σ . Then θσ “ ρσ,0 ˝ησ (see the diagram on page 91 of [6]). The canonical form. ([6, Cor. 13.3]) Let f P ModpSq and let σ “ σpf q be its canonical reduction system (see [6, §13.2.2]). Let Sk`1 , . . . , Sk`n be the pairwise disjoint annuli that are the closed neighbourhoods of the curves α1 , . . . , αn representing σ. Then there is a representative φ of f that permutes the Sl , so that some power of φ leaves invariant each Sl , 1 ď l ď n ` k. By applying Nielsen-Thurston Classification Theorem to each Sl , one obtains that there exists p ą 0 so that φp pSl q “ Sl for all 1 ď l ď n ` k and (5.1) p f “ k ź i“1 ηi pfi q n ź Tαnjj j“1 where each fi P ModpSi q is either pseudo-Anosov or the identity and nj P N for 1 ď i ď k, 1 ď j ď n. Remark 5.1. By a result of Ivanov [11, Corollary 1.8], if f P ModpSqrms, m ě 3, then the integer p in (5.1) can always be taken to be one. Remark 5.2 ([13, 3.10]). By Theorem 1.2 in [11], ModpSqrmsσ Ď ModpSq0σ . Since θσ “ ρσ,0 ˝ ησ , it follows that θi pfi q “ fˆi for 1 ď i ď k. For simplicity, we will often denote G “ ModpSq. Let F and Vc the families of finite and virtually cyclic subgroups of G, respectively, equipped with the commensurabilty relation on Vc r F (see Remark 2.2). The Teichmüller space T pSq is a CAT(0)-space on which G acts properly and cocompactly. So, it gives a cocompact model for EG. [1, Corollary 1.3] of Aramayona and Martı́nez-Pérez states that there is a cocompact model for EG of minimal dimension gd G “ vcd G. We need the following minor generalisation of this result. Proposition 5.3. Let S be a compact (possibly disconnected) surface with possible punctures and boundary components. Then there is a cocompact model for EModpSq of dimension gd ModpSq “ vcd ModpSq. 12 BRITA NUCINKIS AND NANSEN PETROSYAN Proof. In [1], this has been proven for connected S. Suppose S decomposes into the disjoint union of diffeomorphic copies of its connected components S “ \m1 S1 ¨ ¨ ¨ \mq Sq . ś Subsequently, this implies that ModpSq Ď qi“1 ModpSi q ≀ Σmi and is of finite index. Combining [10, Theorem 4.1] and the extension theorem for duality groups in [4, Thm. 3.5], gives us that vcd ModpSq “ q ÿ mi ¨ vcd ModpSi q. i“1 The next lemma shows that there exists a cocompact model for EModpSq of dimension vcd ModpSq. Since vcd ModpSq ď gd ModpSq, the result follows.  Lemma 5.4. Let K be a group. Suppose K has a cocompact model X for EK. Then the wreath product W “ K ≀ Σm has a cocompact model for EW of dimension m ¨ dim X. Proof. The wreath product W acts on Y “ X ˆ ¨ ¨ ¨ ˆ X which consists of m-copies of X with a diagonal action of K m and a permutation action of Σm . Note that W acts cocompactly on Y and it is a model for EW of dimension m ¨ dim X.  To establish Theorem 1.4, it remains to show, see Theorem 2.5, that for each infinite cyclic subgroup H Ď G, there are cocompact models for EFXNG rHs NG rHs and EFrHs NG rHs where NG rHs is the commensurator of H in G of the required dimensions. Proposition 5.5 ([13, Prop. 4.8]). Let S be an orientable closed surface with finitely many punctures and χpSq ă 0. Suppose f P G generates an infinite cyclic subgroup H. Then for any integer l ą 0 such that f l P ModpSqrms, m ě 3, NG rHs “ NG pf l q holds. We need the following slight generalisation of [13, Proposition 4.12] of Juan-Pineda and Trufilo-Negrete. Proposition 5.6. Suppose S is an orientable closed surface with finitely many punctures and χpSq ă 0. Let f P ModpSqrms, m ě 3, with the canonical reduction system σ with fˆa`1 , . . . , fˆk pseudo-Anosov and ´ k ¯ ź ˆ ˆ ρσ pf q :“ id1 , . . . , ida , fa`1 , . . . , fk P ModpSpi , Ωi q, i“1 CLASSIFYING SPACES FOR MAPPING CLASS GROUPS 13 then there is a central extension (5.2) ρσ 1 Ñ Zn Ñ CModpSq pf q0 ÝÑ a ź i“1 ModpSpi , Ωi q k ź Vj Ñ 1. j“a`1 where Vj “ CModpSpj ,Ωj q pfˆj q is virtually cyclic for each a ` 1 ď j ď k. Also, ρσ 1 Ñ Zn Ñ NModpSq pf qÝÑQ Ñ 1, (5.3) ˆ ˆ such that Q Ď Modp\ai“1 Spi qˆA, where A Ď NModp\k p ppfa`1 , . . . , fk qq j“a`1 Sk q śk is a finite extension of j“a`1 Vj . Proof. The extension (5.2) has already been established in [13, Proposition 4.12]. The kernel is generated by the Dehn twists about the curves α1 , . . . , αn which are fixed by CModpSq pf q0 , and hence is central. By Lemma 3.8 of [13], for every g P NModpSq pf q, we have gpσq “ σ. Therefore, NModpSq pf q Ď ModpSqσ . Let Q “ ρσ pNModpSq pf qq. Note ś ś that Q is a finite extension of ai“1 ModpSpi , Ωi q kj“a`1 Vj and it is contained in NModpSpσ q pρσ pf qq. So, to obtain (5.3), it suffices to show that any g P ModpSpσ q that normalises ρσ pf q is contained in the subgroup Modp\a Spi q ˆ Modp\k Spk q of ModpSpσ q. i“1 j“a`1 Suppose this is not the case, and say g maps Sp1 diffeomorphically onto Spk . Then for any x P Sp1 , we have ρσ pf qgpxq “ gρσ pf q˘1 pxq “ gpxq. This shows that fpk is the identity on Spk which is a contradiction.  Lemma 5.7. Let 1 Ñ Zn Ñ G Ñ Q Ñ 1 be an extension of groups where Q is finitely generated with vcd Q “ k ă 8. Then vcd G “ n ` k. Proof. We can assume Q is torsion-free. Now we apply a result of Fel’dman, see [3, Theorem 5.5]  We will quite often make use of the following corollary. Corollary 5.8. Let 1 Ñ Zn Ñ G Ñ Q Ñ 1 be an extension of groups where Q has a cocompact model for EQ of dimension vcd Q “ k ă 8. Then G has a cocompact model for EG of dimension gd G “ vcd G “ n ` k. Proof. Let F be the family of finite subgroup of G and G be the family of the preimages of all the finite subgroups of Q under the projection of G onto Q. Applying Proposition 2.4 together with the general fact that finitely generated virtually free abelian groups of rank m have the Euclidean space of dimension m as a cocompact model for proper 14 BRITA NUCINKIS AND NANSEN PETROSYAN actions, we obtain that G has a cocompact model for EG of dimension n ` k. Lemma 5.7 finishes the claim.  The next proposition concerns surfaces with boundary. Suppose S has b ‰ 0 boundary components β1 , . . . , βb . Note that the capping homop Ωq Ď ModpSq p where Ω is the set of morphism θS : ModpSq Ñ ModpS, punctures of Sp that come from capping the boundary components. Proposition 5.9. Let S be a compact orientable surface with nonempty boundary, finitely many punctures and χpSq ă 0. Suppose f P ModpSq generates an infinite cyclic subgroup H. Then there exists l P N such that f l P ModpSqrms, m ě 3, with NModpSq rHs “ NModpSq pf l q and (5.4) θ S 1 Ñ Zb Ñ NModpSq pf l q ÝÑ NModpS,Ωq pθS pf l qq Ñ 1, p where Zb “ xTβ1 , . . . , Tβb y and θS pf l q is either trivial or of infinite order. Proof. By replacing f with a sufficiently large power, we can assume that l “ 1 and f P ModpSqrms, m ě 3 with θS pf q either trivial or of infinite order. Restricting the capping homomorphism to NModpSq rHs we have θ S 1 Ñ Zb Ñ NModpSq rHs ÝÑ Q Ñ 1, p Ωq. Note that if θS pf q is trivial, then NModpSq rHs “ where Q Ď ModpS, p Ωq as desired. Otherwise, NModpSq pHq “ ModpSq and Q “ ModpS, xθS pf qy is infinite cyclic and Q Ď NModpS,Ωq rxθS pf qys “ NModpS,Ωq pθS pf qq p p by Proposition 5.5 applied to Sp (replacing f with a sufficiently large power if necessary). Since NModpS,Ωq pθS pf qq Ď Q (see for example p [13, eq. (25)]), we deduce Q “ NModpS,Ωq pθS pf qq. Hence, NModpSq rHs “ p NModpSq pf q.  Proposition 5.10. Let G “ ModpSq where S is a compact orientable surface S with χpSq ă 0 possibly with finitely many punctures and boundary components. Denote by F the family of finite subgroups of G. Let H be an infinite cyclic subgroup of G. Then the commensurator NG rHs has cocompact models for EFXNG rHs NG rHs and EFrHs NG rHs of dimensions vcd NG rHs and vcd NG rHs ´ 1, respectively. Proof. By Propositions 5.5 and 5.9, we can assume NG rHs “ NG pHq where H “ xf y and f P ModpSqrms, m ě 3. Suppose first that the boundary of S is empty. By the Nielsen-Thurston Classification Theorem, f is either pseudo-Anosov or reducible. CLASSIFYING SPACES FOR MAPPING CLASS GROUPS 15 If f is pseudo-Anosov, then by [20, Theorem 1], NG pf q is virtually cyclic. So, a Euclidean line and a point are (cocompact) models for EFXNG pf q NG pf q and EFrHs NG pf q, respectively. If f is reducible, say with the canonical reduction system σ, then NG pf q satisfies (5.3) of Proposition 5.6: ρσ 1 Ñ Zn Ñ NG pf qÝÑQ Ñ 1, such that Q is a finite index subgroup of P :“ Modp\a Spi q ˆ A i“1 ˆ ˆ where A Ď NModp\k p ppfa`1 , . . . , fk qq is virtually free abelian. Let j“a`1 Sk q L :“ Modp\ai“1 Spi q. To show that NG pf q has a cocompact model for EFXNG pf q NG pf q of dimension vcd NG pf q, by Corollary 5.8, it suffices to show that Q has a cocompact model for EQ of dimension vcd Q. Since Q is a finite index subgroup in P , it is enough to show that P has cocompact models for EP of dimension vcd P “ vcd Q. Since A is virtually free abelian, applying Lemma 5.7, we obtain that vcd P “ vcd L ` vcd A. By Proposition 5.3, there is a cocompact model XL for EL of dimension vcd L. Since A is finitely generated virtually free abelian, there is a cocompact model XA for EA of dimension vcd A. Then XL ˆ XA is a cocompact model for the classifying space EP of dimension vcd P as desired. To establish the second claim, observe that under the natural projection of NG pHq onto WG pHq “ NG pHq{H, a classifying space EWG pHq becomes a model for a classifying space of NG pHq for EFrHs NG pHq. Hence its suffices to show that there is a cocompact model for EWG pHq of dimension at most vcd NG pHq ´ 1. By Proposition 5.5, we only need to consider two case: ρσ pf q is the identity or it has infinite order. First, suppose ρσ pf q is the identity, that is H ď Zn . By Corollary 4.9 of [13], we can assume that Zn {H – Zn´1 . Then (5.5) ρ σ 1 Ñ Zn´1 Ñ WG pf qÝÑQ Ñ 1, Again, using Corollary 5.8, there is a cocompact model of dimension n ´ 1 ` vcd Q “ vcd NG pf q ´ 1. Now, suppose ρσ pf q has infinite order. Then ρ σ Ñ 1, 1 Ñ Zn Ñ WG pf qÝÑQ{Z where ρσ pf q generates Z ď Q. By Corollary 5.8, it suffices to show then that Q{Z has a cocompact model for EpQ{Zq of dimension at 16 BRITA NUCINKIS AND NANSEN PETROSYAN most vcd Q. Note that, from (5.3), it follows that Z is normal in P . Therefore, it remains to show that P {Z has a cocompact model for EpP {Zq of dimension vcd P . But P {Z – L ˆ pA{Zq and a similar argument as above gives a cocompact model XL ˆ XA{Z for EpP {Zq of dimension vcd P ´ 1. Suppose S has nonempty boundary. The proof easily reduces to the case of empty boundary. By (5.4) of Proposition 5.9, we have the central extension (5.6) θ S 1 Ñ Zb Ñ NModpSq pHq ÝÑ NModpS,Ωq pθS pf qq Ñ 1. p When θS pf q has infinite order, then the quotient of (5.6) by H, gives (5.7) 1 Ñ Zb Ñ WModpSq pHq Ñ WModpS,Ωq pθS pf qq Ñ 1. p In case θS pf q is trivial, note that NModpSq pHq “ ModpSq. Replacing H “ xf y with a commensurable subgroup if necessary, we can assume that f P Zb such that Zb {H – Zb´1 . Thus, we obtain (5.8) (5.9) θ S p Ωq Ñ 1, 1 Ñ Zb Ñ NModpSq pHq ÝÑ ModpS, p Ωq Ñ 1. 1 Ñ Zb´1 Ñ WModpSq pHq Ñ ModpS, From the empty boundary case of the proposition applied to Sp and Corollary 5.8 applied to (5.6), (5.7), (5.8), and (5.9), we obtain the desired result.  We need the following complete computation of the virtual cohomological dimension of ModpSq for surfaces with negative Euler characteristic by Harer. r Theorem 5.11 ([10, Thm. 4.1]). Let S “ Sg,b be an oriented surface of genus g, b boundary components and r punctures and recall χpSq “ 2 ´ 2g ´ b ´ r. If χpSq ă 0, then $ & 4g ` 2b ` r ´ 4 g ą 0, r ` b ą 0 vcd ModpSq “ 4g ´ 5 r`b“0 % 2b ` r ´ 3 g “ 0. We are now ready to prove our main theorem. Proof of Theorem 1.4. Set G “ ModpSq and let F and Vc be the families of finite and virtually cyclic subgroups of G, respectively, equipped with the commensurabilty relation on Vc r F. By [1, Cor. 1.3], there is a cocompact model for EG of minimal dimension gd G “ vcd G. By Proposition 5.10, for each infinite cyclic subgroup H ď G, there CLASSIFYING SPACES FOR MAPPING CLASS GROUPS 17 are cocompact models for both EFXNG rHs NG rHs and EFrHs NG rHs of dimension vcd G. Applying Theorem 2.5, we obtain a hierarchically cocompact model for EG of dimension vcd G ` 1. To prove the second part of the theorem, assume we have a closed surface S. If g “ 1, then ModpSq – SLp2, Zq. So, by [5, Lemma 5.2], cdpModpSqq ě 2. Combining this with [12, Proposition 9] shows that gd ModpSq “ cd ModpSq “ 2. Now, suppose that S is closed and g ě 2. Then vcd ModpSq “ 4g ´ 5. Let σ “ trαs, rβsu where α and β are essential curves that separate S into a pair of pants and a surface of genus g ´ 1 (see Figure 1). We will show that cd ModpSq0σ “ 4g´4. This will imply that cd ModpSq ě 4g´ 4 and by the first part of the theorem, we will obtain that gd ModpSq “ cd ModpSq “ 4g ´ 4. Using the cutting homomorphism, there is a short exact sequence ρσ 3 1 q ˆ ModpSg´1,0 q Ñ 1, 1 Ñ Z2 Ñ ModpSq0σ ÝÑModpS0,0 where Kerpρσ q “ xTα , Tβ y. By Lemma 5.7, 0 1 vcd ModpSσ q0 “ 2 ` vcd ModpS3,0 q ` vcd ModpSg´1,0 q “ 2 ` 0 ` 4pg ´ 1q ` 1 ´ 4 “ 4g ´ 5. By Proposition 5.3, it follows that there is a cocompact model of for EModpSσ q0 of dimension vcd ModpSσ q0 “ 4g ´ 5 which is therefore the same as gd ModpSσ q0 . Set C “ ModpSσ q0 XModpSqr3s, where ModpSqr3s is the level 3 congruence subgroup of ModpSq which is torsion-free [6, Theorem 6.9]. Hence C is a finite index torsion-free subgroup of ModpSσ q0 . Let F and Vc be the families of finite (in this case trivial) and virtually cyclic subgroups of C, respectively, equipped with the commensurabilty relation on Vc r F. Define M : OVc C Ñ Z - mod : C{H Ñ pZCqH . The long exact cohomology sequence associated to the push-out of Proposition 2.3 gives us ź p4g´5q ź i˚ Ñ H p4g´5q pNC rHs, ZCq HFrHs pNC rHs, Mq‘H p4g´5q pC, ZCq Ý rHsPI rHsPI p4g´4q Ñ HVc pC, Mq. 18 BRITA NUCINKIS AND NANSEN PETROSYAN By Proposition 5.10, this reduces to ź i˚ p4g´4q H p4g´5q pC, ZCq Ý Ñ H p4g´5q pNC rHs, ZCq Ñ HVc pC, Mq. rHsPI Since C is of type F , note that H p4g´5q pC, ZCq ‰ 0. Consider the infinite cyclic subgroups H1 “ xTα Tβ y and H2 “ xTα2 Tβ y. Since every element of C fixes the curves α and β, it must commute with both H1 and H2 . Thus, NC rH1 s “ NC rH2 s “ C and H1 , H2 represent distinct classes in I. The composition of i˚ with the projection of ś p4g´5q pNC rHs, ZCq onto the two factors corresponding to these rHsPI H subgroups is the diagonal map ∆ : H p4g´5q pC, ZCq Ñ H p4g´5q pC, ZCq ‘ H p4g´5q pC, ZCq which is not surjective. Therefore, i˚ cannot be surjective and we obtain p4g´4q that HVc pC, Mq ‰ 0.  β α Figure 1. The closed surface S of genus g ě 2 and the essential curves α, β separating it into a pair of pants and a surface of genus g ´ 1. References [1] J. Aramayona and C. Martı́nez-Pérez, The proper geometric dimension of the mapping class group, Algebr. Geom. Topol. 14 (2014), no. 1, 217–227, DOI 10.2140/agt.2014.14.217. [2] B. Bartels and B. Bestvina, The Farrell-Jones Conjecture for mapping class groups (2016). Preprint arXiv:1606.02844. [3] Robert Bieri, Homological dimension of discrete groups, Second, Queen Mary College Mathematical Notes, Queen Mary College, Department of Pure Mathematics, London, 1981. [4] R. Bieri and B. Eckmann, Groups with homological duality generalizing Poincaré duality, Invent. Math. 20 (1973), 103–124, DOI 10.1007/BF01404060. [5] D. Degrijse and N. Petrosyan, Bredon cohomological dimensions for groups acting on CATp0q-spaces, Groups Geom. Dyn. 9 (2015), no. 4, 1231–1265. CLASSIFYING SPACES FOR MAPPING CLASS GROUPS 19 [6] B. Farb and D. Margalit, A primer on mapping class groups, Princeton Mathematical Series, vol. 49, Princeton University Press, Princeton, NJ, 2012. [7] M. Fluch, On Bredon (Co-)Homological Dimensions of Groups (2010). Ph.D thesis,arXiv:1009.4633. [8] Martin Fluch, Classifying spaces with virtually cyclic stabilisers for certain infinite cyclic extensions, J. Pure Appl. Algebra 215 (2011), no. 10, 2423–2430. [9] J. R. J. Groves and John S. Wilson, Soluble groups with a finiteness condition arising from Bredon cohomology, Bull. Lond. Math. Soc. 45 (2013), no. 1, 89– 92. [10] J. L. Harer, The virtual cohomological dimension of the mapping class group of an orientable surface, Invent. Math. 84 (1986), no. 1, 157–176, DOI 10.1007/BF01388737. [11] N. V. Ivanov, Subgroups of Teichmüller modular groups, Translations of Mathematical Monographs, vol. 115, American Mathematical Society, Providence, RI, 1992. Translated from the Russian by E. J. F. Primrose and revised by the author. [12] D. Juan-Pineda and I. J. Leary, On classifying spaces for the family of virtually cyclic subgroups, Recent developments in algebraic topology, 2006, pp. 135–145. MR2248975 (2007d:19001) [13] D. Juan-Pineda and A. Trufilo-Negrete, On classifying spaces for the family of virtually cyclic subgroups in mapping class groups (2016). Preprint arXiv:1606.00306. [14] Wolfgang Lück, Transformation groups and algebraic K-theory, Lecture Notes in Mathematics, vol. 1408, Springer-Verlag, Berlin, 1989. Mathematica Gottingensis. [15] W. Lück, Isomorphism Conjectures in K- and L-Theory, 2015. book, in preparation, http://131.220.77.52/lueck/data/ic.pdf. [16] W. Lück and D. Meintrup, On the universal space for group actions with compact isotropy, Geometry and topology: Aarhus (1998), 2000, pp. 293–305. MR1778113 (2001e:55023) [17] W. Lück and M. Weiermann, On the classifying space of the family of virtually cyclic subgroups, Pure App. Math. Q. 8 (2012), no. 2, 479–555. [18] C. Martinez-Pérez and B.E.A. Nucinkis, Bredon cohomological finiteness conditions for generalisations of Thompson groups, Groups, Geometry, Dynamics 7 (2013), 931–959. [19] Conchita Martı́nez-Pérez, Francesco Matucci, and Brita E. A. Nucinkis, Cohomological finiteness conditions and centralisers in generalisations of Thompson’s group V , Forum Math. 28 (2016), no. 5, 909–921. [20] J. D. McCarthy, Subgroups of surface mapping class groups, ProQuest LLC, Ann Arbor, MI, 1983. Thesis (Ph.D.)–Columbia University. [21] Derek J. S. Robinson, A course in the theory of groups, Second, Graduate Texts in Mathematics, vol. 80, Springer-Verlag, New York, 1996. [22] T. von Puttkamer and X. Wu, On the finiteness of the classifying space for the family of virtually cyclic subgroups (2016). preprint,arXiv:1607.03790. , Linear Groups, Conjugacy Growth, and Classifying Spaces for Fam[23] ilies of Subgroups, International Mathematics Research Notices, to appear (2017). arXiv:1704.05304. 20 BRITA NUCINKIS AND NANSEN PETROSYAN Department of Mathematics, Royal holloway, University of London, Egham, TW20 0EX, UNITED KINGDOM E-mail address: [email protected] School of Mathematics, University of Southampton, Southampton, SO17 1BJ, UNITED KINGDOM E-mail address: [email protected]
4math.GR
Rate-Optimal Streaming Codes for Channels with Burst and Isolated Erasures M. Nikhil Krishnan, Student Member, IEEE, P. Vijay Kumar, Fellow, IEEE Electrical Communication Engineering, Indian Institute of Science, Bangalore - arXiv:1801.05919v1 [cs.IT] 18 Jan 2018 560012 email: {nikhilkrishnan.m, pvk1729}@gmail.com Abstract Recovery of data packets from packet erasures in a timely manner is critical for many streaming applications. An early paper by Martinian and Sundberg introduced a framework for streaming codes and designed rate-optimal codes that permit delay-constrained recovery from an erasure burst of length up to B. A recent work by Badr et al. extended this result and introduced a sliding-window channel model C(N, B, W ). Under this model, in a sliding-window of width W , one of the following erasure patterns are possible (i) a burst of length at most B or (ii) at most N (possibly non-contiguous) arbitrary erasures. Badr et al. obtained a rate upper bound for streaming codes that can recover with a time delay T , from any erasure patterns permissible under the C(N, B, W ) model. However, constructions matching the bound were absent, except for a few parameter sets. In this paper, we present an explicit family of codes that achieves the rate upper bound for all feasible parameters N , B, W and T . I. I NTRODUCTION In many multimedia streaming applications, where packet losses are a norm, fast recovery of lost packets is often desirable. Conventional coding schemes like linear block codes, while helpful in combating erasures, can have increased delays due to buffering of data. In [1], Martinian and P. Vijay Kumar is also a Visiting Professor at the University of Southern California. This research is supported in part by the National Science Foundation under Grant 1421848 and in part by an India-Israel UGC-ISF joint research program grant. M. Nikhil Krishnan would like to acknowledge the support of Visvesvaraya PhD Scheme for Electronics & IT awarded by Department of Electronics and Information Technology, Government of India. January 19, 2018 DRAFT Sundberg introduce a framework for convolutional codes with decoding delay as an explicit parameter. We refer to these codes as streaming codes. The setting considered is as follows: At each time instance t ∈ {0, 1, 2, . . .}, an encoder E receives a message packet s[t] from a source stream. Each message packet s[t] consists of k symbols drawn from a finite field Fq of size q. In other words, s[t] , (s0 [t] s1 [t] . . . sk−1 [t])| ∈ Fkq . E is a convolutional encoder and emits a coded packet x[t] at time t, where x[t] , (x0 [t] x1 [t] . . . xn−1 [t])| ∈ Fnq . E is also assumed to be causal, wherein each coded packet x[t] is a function of the message packets until time t, i.e., s[0], s[1], . . . , s[t]. Between the encoder-decoder pair, there exists a channel which introduces erasures at packet level. Let y[t] denote the packet received at the decoder end. We have: y[t] =   ∗ if x[t] is erased,  x[t] otherwise. Let ŝ[t] denote the decoded packet corresponding to s[t]. The decoder is delay-constrained with a delay parameter T . i.e., each decoded message packet ŝ[t] is obtained as a function of received coded packets {y[0], y[1], . . . , y[t + T ]}. Note that some of these packets can possibly be erased by the channel. The rate R of the code is naturally defined as nk . In [1], the authors consider a channel which introduces a burst of length at most B. Together with the delay-constraint T , the streaming codes designed for this channel can in fact tolerate multiple erasure bursts, each of length at most B, with a guard space of at least T between consecutive bursts. However, as the codes presented in [1] are tuned for burst erasures, they are sensitive to isolated erasures. In a recent work by Badr et al. [2], the authors introduce a slidingwindow based channel model which accounts for burst erasures and isolated erasures. Under the sliding-window channel model, in any sliding-window of width W , the channel will have one of the following erasure patterns; (a) a burst erasure of length at most B or (b) up to N erasures at arbitrary locations within the sliding-window. The channel is denoted by C(N, B, W ). Clearly, N ≤ B as burst erasures are a special case of arbitrary erasures. Also, T ≥ B as otherwise nonzero rates are not feasible for a streaming code. Taken together with the delay-constraint T , the C(N, B, W ) model specializes to the burst-erasure-only model in [1], if one chooses W = T + 1 and N = 1. Furthermore, a rate upper bound on codes for this channel has also been derived in [2]. There are several other follow-up works that study various low-delay communication schemes like [3], [4], [5], [6] and references therein. DRAFT January 19, 2018 In an independent, concurrent work [7], the authors prove the existence of rate-optimal streaming codes for all parameters. Our Results: In this work, we prove the tightness of the rate upper bound derived in [2] for codes that allow both burst erasures and isolated erasures, with a delay-constraint of T . We prove this by constructing explicit codes that meet the bound with equality. The family of codes that achieve the bound are based on linearized polynomials, and require a field-size exponential in T . For various range of parameters, we obtain rate-optimal codes that require lower fieldsize, which is of O(T 2 ). In some cases, even linear and binary field-sizes suffice. We obtain rate-optimal streaming codes by reducing the problem to the design of linear block codes with certain properties. For the corner case of B = N , these codes specialize to MDS codes. II. P RELIMINARIES A. Streaming Capacity [2] In the context of streaming codes with decoding delay-constraint T , a rate R is said to be achievable over C(N, B, W ), if there exists a streaming code with delay parameter T and rate R that tolerates all the erasure patterns permitted by C(N, B, W ). The supremum of all such rates is termed as the streaming capacity. In [2], the authors obtain the following upper bound for R: R≤ Teff − N + 1 , B + Teff − N + 1 (1) where Teff = min{T, W − 1}. We shall refer to Teff as the effective delay. Achievability of this rate bound is not known in general, except for a limited set of parameters. For the burst-alone case, i.e., N = 1, Maximally Short (MS) codes ([1], [8]) are known to meet the bound (1). For the other extreme case of N = B, Strongly-MDS convolutional codes [9] are shown to be optimal in [2]. [10] provides a family of codes with R = 0.5 that meets (1). [2] shows the existence of near-optimal codes for all feasible parameters B, N, Teff that have a guaranteed rate of at least Teff −N . B+Teff −N Let [u, v] , {u, u + 1, . . . , v}. We have the following lemma. Lemma II.1. If there is a streaming code Cstr which permits recovery of any packet x[t] from erasure with a delay of at most Teff , even in presence of either (i) a burst erasure (involving time t) of length at most B or (ii) at most N isolated erasures (again, including time t), then Cstr tolerates all the erasure patterns permitted by C(N, B, W ) with a delay-constraint T . January 19, 2018 DRAFT Proof. Consider any erasure pattern that arises from the C(N, B, W ) model. Let j ∈ {1, 2, . . .}, J ∈ {2, 3, . . .}. Denote by tj , the coordinate at which the j th erasure happened. Let the induction assumption be that, for all j ≤ (J − 1), x[tj ] is recovered by the ‘time’ (tj + Teff ), i.e., with a delay Teff ≤ T . Hence during the decoding of x[tJ ], we can assume that, strictly before time tJ , there are no erasures occurring among the coordinates [0, tJ + Teff ]. Consider the window of width W consisting of coordinates [tJ , tJ + W − 1]. The coded packet x[tJ ] is erased by assumption. By definition of the sliding window channel model, in the worst case, there will be either (i) (B − 1) erasures at coordinates [tJ + 1, tJ + B − 1] or (ii) (N − 1) erasures within [tJ + 1, tJ + W − 1]. As Teff ≤ (W − 1), when restricted to the set of coordinates [0, tJ + Teff ], Cstr will be observing either a burst of length ≤ B including coordinate tJ or ≤ N arbitrary erasures involving tJ (note that the induction assumption removes all erasures occurring before time tJ ). In either case, Cstr will be able to recover x[tJ ] by time (tJ + Teff ), with delay Teff ≤ T . The base case of the induction can be shown to be true by taking J = 1. Thus we have shown that for all j ≥ 1, x[tj ] can recover from any erasure pattern permitted by C(N, B, W ), with a delay of Teff ≤ T . Hence in order to construct streaming codes for C(N, B, W ) with a delay parameter of T , it is enough to focus on streaming codes that can handle an erasure burst of length B or N isolated erasures, with a delay of at most Teff . We drop the subscript from the notation Teff for brevity and refer to T as the (effective) delay parameter. B. Diagonal Interleaving Diagonal interleaving is a known technique that enables one to convert a block code into a convolutional code. It has been used in the context of streaming codes in works like [1], [8] to reduce the problem of designing rate-optimal streaming codes for burst-erasure-only case (N = 1) to that of designing block codes having appropriate features. Consider an [n, k] linear block code C , where n, k denote the code-length and dimension, respectively. We summarize the diagonal interleaving using Fig. 1. In the figure, we consider a systematic encoder for C and hence take xi [t] = si [t] for 0 ≤ i ≤ k − 1. In order to stress the point that the last (n − k) symbols of a coded packet are parity symbols at any time t, we use the notation pj [t] , xk+j [t], DRAFT January 19, 2018 _ 𝐷𝑘 2 _ ..... ..... 𝐷0 𝐷1 𝐷2 .... 𝐷𝑘 3 Parity symbols at time 𝑡 Systematic Encoder for _ 𝐷𝑘 1 _ 𝐷𝑛 𝑘 Fig. 1: A depiction of the diagonal interleaving technique. Here Dj denotes a delay of j time units. for 0 ≤ j ≤ n − k − 1. As an example, consider the following parameters for C ; n = 5, k = 3 . The diagonal interleaving technique will result in a convolutional code as shown in Fig. 2. ....... Fig. 2: An illustration of the diagonal interleaving technique for a [5, 3] code. Each diagonal of the form (s0 [t], s1 [t + 1], s2 [t + 2], p0 [t + 3], p1 [t + 4]) is a codeword in C , where t ≥ 0. For notational consistency, define si [t] = pi [t] , 0 for t < 0. Consider an [n, k] linear block code C over Fq . Let c , (c0 , c1 , c2 , . . . , cn−1 ) denote a codeword in C . Definition II.1. For i ∈ [0, n − 1] and I ⊆ [0, n − 1], the ith coordinate of C is said to be January 19, 2018 DRAFT recoverable from ( the set of coordinates ) I, if there exist λj ’s chosen from Fq such that: ci = X λj cj ∀c ∈ C . j∈I If i ∈ I, it is straightforward to see that ith coordinate is recoverable from I. For parameters N , B as in the channel model C(N, B, W ) and the delay parameter T , let ∆i , min{i+T, n−1}. Definition II.2. C is said to be conforming to C(N, B, W ) with delay-constraint T , if both the following statements hold for all i ∈ [0, n − 1]: • ith coordinate of C is recoverable from [0, ∆i ]\N , for all N ⊆ [0, n−1] such that |N | ≤ N . • ith coordinate of C is recoverable from [0, ∆i ]\B, where B = [u, v], for all 0 ≤ u ≤ v ≤ n−1 such that (v − u + 1) ≤ B. One can show without much difficulty that, if there is an [n, k] linear block code C which conforms to C(N, B, W ) with delay-constraint T , by applying diagonal interleaving, it will result in a streaming code Cstr that can tolerate an erasure burst of length B or N isolated erasures, with delay-constraint T . By Lemma II.1, Cstr yields an achievable rate k n over C(N, B, W ) with effective delay-constraint T . Hence from here onwards we restrict our attention to designing linear block codes that conform to C(N, B, W ) with (effective) delay-constraint T and have rate R = k/n that meets (1) with equality. We refer to these codes as rate-optimal linear block codes with delay-constraint T . Let T = aB + δ, where a ≥ 0 and 1 ≤ δ ≤ B. If a = 0, δ = B (as B ≤ T ). III. R ATE -O PTIMAL L INEAR B LOCK C ODES WITH D ELAY C ONSTRAINT T FOR THE C ASE δ ≥ (B − N ) A. Construction-A Given the channel C(N, B, W ) and effective delay constraint T , consider the parameters n = (B + T − N + 1) and k = (T − N + 1) for the linear block code C to be constructed over Fq2 . Let δ ≥ (B − N ) and m , [m0 m1 . . . mk−1 ] be the k-length message vector to be mapped to the codeword c , (c0 , c1 , . . . , cn−1 ) ∈ C . Consider an [nMDS = T + 1, kMDS = k, dmin = N + 1] MDS code CMDS over Fq ⊆ Fq2 , with a generator matrix GMDS having all the entries from Fq ⊆ F2q . Let c0 = [c00 c01 . . . c0T ] = mGMDS . Assign these (T + 1) code-symbols {c0j }Tj=0 to the coordinates {0, 1, . . . , T − 1} ∪ {n − 1} of c. i.e., ci = c0i for 0 ≤ i ≤ T − 1 and cn−1 = c0T . For DRAFT January 19, 2018 the (B − N ) coordinates {cT +j : 0 ≤ j ≤ (B − N − 1)}, take cT +j = αcj + cj+B + . . . + cj+aB . {z } | (a + 1) terms Note that, since j ≤ (B − N − 1) ≤ δ − 1, all the (a + 1) code-symbols taking part in the check-sum belong to the set of coordinates [0, T − 1]. Here α can be any field element from the set Fq2 \ Fq . Existence of GMDS is guaranteed when q ≥ (T + 1). Hence C can be constructed with a field-size of O(T 2 ). Let N = 2, B = 4, T = 10. Hence a = 2, δ = 2. The dimension of C , k = T − N + 1 = 9 and length, n = B + T − N + 1 = 13. This example code is illustrated in Fig. 3. Fig. 3: An illustration of construction-A for the parameters: N = 2, B = 4, T = 10. Here the set {c0i }10 i=0 corresponds to code-symbols coming from an [nMDS = 11, kMDS = 9] MDS code. Proposition III.1. Construction-A gives a rate-optimal family of linear block codes with delay constraint T . Proof. (Burst erasure recovery with delay constraint T ) Consider an erasure burst of length B. Let  indicate the number of erasures occurred among the coordinates in [T, T + B − N − 1], as a part of the erasure burst. Thus, the set of non-erased symbols among the coordinates [T, T +B−N −1] is given by {ci+T :  ≤ i ≤ (B−N −1)}, where ci+T , αci +ci+B +. . .+ci+aB . As ci+T is assumed to be a non-erased symbol, the burst of length B ends at some coordinate ≤ (T +i−1). Note that, at most one code-symbol in the sum given by each ci+T can be a part of the burst erasure, as the code-symbols in the sum are chosen to be B apart. Suppose that none of the code-symbols {ci , ci+B , . . . , ci+aB }, which constitute the sum given by ci+T , are part of the erasure burst. As the erasure burst is of length B, the burst can start only on or after the coordinate (i+aB +1). This means that the burst will end at a coordinate ≥ i+aB +B ≥ T +i (as δ ≤ B). This is a contradiction, and hence each non-erased coordinate in the range [T + , T + B − N − 1] will have lost precisely one code-symbol from the check-sum it contains. Each of these codesymbols can be recovered from the check-sums. Thus there will be (B − N − ) coordinates recovered from the (B − ) erasures occurred across coordinates [0, T − 1] ∪ {T − N + B}. The January 19, 2018 DRAFT remaining number of erasures is B −  − (B − N − ) = N . As C restricted to the coordinates [0, T − 1] ∪ {T − N + B} is an N erasure correcting MDS code, the remaining erasures can be corrected as well. Furthermore, we need to show that all the erased coordinates in the erasure burst can be recovered with a delay of at most T . Towards this, we need to consider only erasure bursts involving at least one of the coordinates in [0, B − N − 1]. For all the remaining coordinates, the delay constraint is trivially met as the last coordinate of C is (T + B − N ). Suppose ci : i ∈ [0, B − N − 1] is erased (as part of a burst erasure of length B). Clearly, none of the code-symbols {ci+B , ci+2B , . . . , ci+aB , cT +i } will be part of the erasure burst and hence ci can be recovered with a delay of T . (Recovery from N arbitrary erasures with delay constraint T ) C can recover from any N arbitrary erasures, as it is formed by adding (B − N ) dependent coordinates to an N erasure correcting MDS code. As in the case of recovery from burst erasures, in order to show that delay constraints are met during the recovery, one needs to consider only those N -erasure patterns involving at least one of the code-symbols from the set of coordinates [0, B − N − 1]. Suppose ci is erased for some i ∈ [0, B − N − 1]. Among the set of T coordinates given by [0, i − 1] ∪ [i, T − 1] ∪ {T + i}, there can possibly be (N − 1) more erasures. If the coordinate (T + i) is among the erased coordinates, there will be possibly (N − 1) erasures among the coordinates [0, T − 1], inclusive of the coordinate i. As these coordinates are part of an MDS code of dimension k = T − N + 1, the code-symbol ci can be recovered with a delay < T . Now consider the remaining case that (T + i) is not an erased coordinate. Let G1 be the systematic k × (T + 1)-generator matrix for the code obtained by puncturing C to the coordinates [0, T − 1] ∪ {T + i}. For 0 ≤ j ≤ T − N , the j th column of G1 is taken as ej , [ |0 .{z . . 0} 1| 0 {z. . . 0} ]| . We remark that all the elements of the sub-matrix obtained by j (k − j) restricting G1 to the coordinates corresponding to [0, T − 1], belong to Fq ⊆ Fq2 . Let G2 be the (T − N ) × (T − 1) sub-matrix obtained from G1 after removing columns corresponding to the coordinates {i, (T + i)} of C and the ith row. Note that G2 corresponds to the MDS generator matrix of a code of length (T − 1) and dimension (T − N ). The column of G1 corresponding to the coordinate (T + i) will have the form [∗| .{z . . ∗} β ∗ . . . ∗]| , where ∗ indicates elements | {z } i from Fq ⊆ DRAFT F2q and β ∈ F2q \ Fq . Let G01 (k − i) be an (T − N + 1) × (T − N + 1) sub-matrix of G1 with January 19, 2018 (T −N ) columns from [0, i−1]∪[i+1, T −1] and (T +i). After expanding the determinant of G01 based on the column corresponding to the coordinate (T +i), we have det(G01 ) = ∗+β ∗det(G02 ), where ∗ denotes field elements from Fq ⊆ F2q and G02 is some (T − N ) × (T − N ) sub-matrix of G2 . As G2 is an MDS generator matrix with all the entries from Fq , det(G02 ) 6= 0 ∈ Fq and hence det(G01 ) 6= 0. Thus, ci can be recovered with a delay of T . Corollary III.2. (Binary field-size) When N = 1 and δ ≥ (B − 1), C can be over F2 . Remark III.1. When B = N , C reduces to an [n = T + 1, k = T − B + 1] MDS code. Remark III.2. (Linear field-size for N = (B − 1)) For N = (B − 1), if the coordinates 0 and T are swapped in C , with α 6= 0 ∈ Fq , the resultant code will be rate-optimal with delay constraint T . In this case, field-size requirement will be ≥ (T + 1). IV. R ATE -O PTIMAL L INEAR B LOCK C ODES WITH D ELAY C ONSTRAINT T FOR ALL F EASIBLE PARAMETERS : δ, B, N, T A. Linearized Polynomials A linearized polynomial [11] of q-degree (k − 1) is a polynomial of the form f (x) = Pk−1 qi i=0 mi x , where mi ∈ Fq m and mk−1 6= 0. It satisfies the property that: f (a1 x1 + a2 x2 ) = a1 f (x1 ) + a2 f (x2 ), where ai ∈ Fq , xi ∈ Fqm . Furthermore, a linearized polynomial of qdegree (k − 1) can be uniquely determined from evaluations at k points {θi }k−1 i=0 ⊆ Fq m , which are linearly independent over Fq . Gabidulin codes [12] are constructed based on linearized polynomial evaluations. B. Construction-B Given the channel C(N, B, W ) and effective delay constraint T , consider the parameters n = (B + T − N + 1), k = (T − N + 1) for the linear block code C to be constructed over Fqm . The k message symbols {mi }k−1 i=0 will be taken as coefficients of a linearized polynomial with q-degree (k − 1) and evaluated at (T + 1) points {θi }Ti=0 . Here θi ∈ Fqm and {θi }Ti=0 is a collection of independent field elements over Fq ⊆ Fqm . Let c00 , c01 , . . . , c0T be the code-symbols (evaluations) thus obtained. Assign these code-symbols to the coordinates {0, 1, . . . , T − 1} ∪ {n − 1} of c. i.e., cj = c0j for 0 ≤ j ≤ T − 1 and cn−1 = c0T . Let δ 0 , min{δ, (B − N )}. For coordinates 0 ≤ j ≤ δ 0 − 1, take cT +j = cj + cj+B + . . . + cj+aB . For coordinates in the range δ 0 ≤ j ≤ January 19, 2018 DRAFT (B − N ) − 1, cT +j = cj + cB+j + . . . + c(a−1)B+j + γj,0 caB + γj,1 caB+1 + . . . + γj,δ−1 caB+δ−1 . Here {γi,j }’s are selected in such a way that the (B − N − δ 0 ) × δ matrix of the form:   γδ0 ,0 γδ0 ,1 ... γδ0 ,δ−1    γ0 γδ0 +1,1 . . . γδ0 +1,δ−1   δ +1,0  Γ, , . .   .. ..   γB−N −1,0 γB−N −1,1 . . . γB−N −1,δ−1 is Cauchy, with all the entries belonging to Fq ⊆ Fqm . Γ can be constructed explicitly (for example, see [13, Ch. 5]) for q ≥ (δ + B − N − δ) = (B − N ). The evaluation points {θi } can be chosen as follows. Let β̂ denote a primitive element of the extension field FqT +1 . A natural candidate for θi , for 0 ≤ i ≤ T will be θi = β̂ i−1 . Hence construction-B is possible with a field-size ≥ q (T +1) , where q ≥ (B − N ). Proposition IV.1. Construction-B gives a rate-optimal family of linear block codes, for all feasible parameters δ, B, N, T . Proof. (Recovery from N arbitrary erasures with delay constraint T ) Similar to the scenario in Proposition III.1, C is N -erasure correcting, as C is constructed by adding (B − N ) dependent coordinates to an N -erasure correcting MDS code (obtained from linearized polynomial evaluations). Hence we only need to show that delay requirements are met for arbitrary erasures involving at least one of the coordinates in [0, (B − N − 1)]. For i ∈ [0, (B − N − 1)], let i be an erased coordinate. Consider the set of coordinates Ri , [0, i − 1] ∪ [i + 1, T − 1] ∪ {T + i}. The corresponding code-symbols will be evaluations of a linearized polynomial at the evaluation P points (field elements): Ai ∪ {θi + θ∈Bi θ}, where Ai , {θ0 , θ1 , . . . , θi−1 , θi+1 , . . . , θT −1 }, Bi , {θi , θB+i , . . . , θ(a−1)B+i , θaB+i }, if 0 ≤ i ≤ δ 0 − 1 or Bi , {θi , θB+i , . . . , θ(a−1)B+i , γi,0 θaB , γi,1 θaB+1 , . . . , γi,δ−1 θaB+δ−1 }, if δ 0 ≤ i ≤ (B − N − 1). The set of (T − 1) evaluation points Ai is an independent set over Fq by construction. Adding P {θi + θ∈Bi θ} to Ai will not add any dependency, as θi ∈ / Ai . Thus, access to evaluations at P any k = (T − N + 1) out of the T points in Ai ∪ {θi + j∈Bi θj }, will be sufficient to recover all the k message symbols. This essentially implies that even if there are (N − 1) erasures among the coordinates in Ri , ci can still be corrected with a delay of at most T . (Burst erasure recovery with delay constraint T ) If δ ≥ (B − N ), proof exactly follows as in the case of Proposition III.1. For the remaining case of δ < (B − N ), proof is moved to Appendix A. DRAFT January 19, 2018 Example IV.1. Consider the parameters B = 7, N = 2, δ = 3, T = 10. Hence for C , we have the parameters n = (B + T − N + 1) = 16 and k = (T − N + 1) = 9. Also, δ = δ 0 = 3. Let α̂ be a primitive element of F5 and   1 α̂ α̂2 . Γ= 1 α̂2 α̂4 Consider the set of (T + 1) = 11 field elements {θi }10 i=0 , which forms an independent set over F5 . For example, let β̂ be a primitive element of F5m , where m ≥ (T + 1) = 11. Then, θi can be chosen as β̂ i . Let {mi }8i=0 be the set of k = 9 message symbols drawn from F5m . Consider the corresponding P i linearized polynomial f (x) = 8i=0 mi x5 . The code-symbols will be as follows: ci = f (θi ), for 0 ≤ i ≤ (T − 1) = 9, c10 = c0 + c7 = f (θ0 + θ7 ), c11 = c1 + c8 = f (θ1 + θ8 ), c12 = c2 + c9 = f (θ2 + θ9 ), c13 = c3 + c7 + α̂c8 + α̂2 c9 = f (θ3 + θ7 + α̂θ8 + α̂2 θ9 ), c14 = c4 + c7 + α̂2 c8 + α̂4 c9 = f (θ4 + θ7 + α̂2 θ8 + α̂4 θ9 ), c15 = f (θ10 ). Consider the recovery of C from N = 2 arbitrary erasures, with a delay at most 10. Clearly, C can tolerate 2 erasures. This is because, it is constructed by adding (B − N ) = 5 additional parity checks (at coordinates 10, 11, 12, 13 and 14) to a 2-erasure correcting [11, 9]-MDS code. As the last coordinate of C is 15, delay constraint of 10 will be trivially met during the recovery of any cj : j ≥ 5, which is a part of 2 arbitrary erasures. Hence we need to consider only those 2-erasure patterns which involve at least one coordinate from [0, 4]. Suppose c1 is erased. Consider the T = 10 coordinates, R1 = {0} ∪ [2, 9] ∪ {11}. The corresponding 10 evaluation points {θ0 , θ2 , θ3 , . . . , θ9 , (θ1 +θ8 )} form an independent set over F5 . Therefore, even if one more coordinate is lost (since N = 2, and coordinate 1 is already assumed to be lost) from R1 , there will still be k = 9 independent evaluation points available from the non-erased coordinates in R1 . As the last coordinate in R1 is (T + 1) = 11, c1 can be recovered with a delay at most 10. Similar arguments hold when c0 , c2 , c3 or c4 is part of a 2-erasure pattern. For the burst erasure case, consider consecutive erasures of length B = 7, which erases the set of coordinates [u, v], where 0 ≤ u ≤ v ≤ (n − 1) and v = u + B − 1. Let  denote the number of coordinates in [u, v] that intersect [T, T + B − N − 1] = [10, 14]. Clearly, 0 ≤  ≤ (B − N ) = 5. •  = 5: If the burst erasure is such that  = (B − N ) = 5, the [11, 9]-MDS code across coordinates [0, 9] ∪ {15} will have B − (B − N ) = N = 2 coordinates erased and hence all the erasures can be corrected. January 19, 2018 DRAFT •  = 0: Each symbol from [10, 14] will recover one unique erased code-symbol. Let [u, u + 6] ⊆ [0, 9] denote the B = 7 coordinates involved in the burst erasure. Clearly, there exists j0 , j1 , . . . , j4 ∈ [u, u+6] such that j` mod B = `, for 0 ≤ ` ≤ B −N −1 = 4. Code-symbol at coordinate 10 + ` will be recovering precisely the corresponding j` . •  = 1: The erased coordinates belong to [4, 10]. As c11 = c1 +c8 and c12 = c2 +c9 , these two code-symbols recover coordinates 8 and 9, respectively. From c13 (= c3 + c7 + α̂c8 + α̂2 c9 ) and c14 (= c4 +c7 + α̂2 c8 + α̂4 ), after removing the interference from the known code-symbols {c3 , c8 , c9 }, we obtain the sums ĉ13 = c7 and ĉ14 = c4 + c7 , respectively. These two sums essentially yield the symbols c4 and c7 . •  = 2: The erased coordinates are in [5, 11]. As c12 = c2 + c9 , it recovers coordinate 9. After removing the known code-symbols {c3 , c4 , c9 }, the check-sums provided by c13 and c14 result in ĉ13 = c7 + α̂c8 and ĉ14 = c7 + α̂2 c8 , respectively. These sums would recover the code-symbols c7 and c8 (uses the Cauchy property of Γ). •  = 3: Here the erased coordinates are from the set [6, 12]. After removing the interference from the known code-symbols {c3 , c4 }, ĉ13 = c7 + α̂c8 + α̂2 c9 = f (θ7 + α̂θ8 + α̂2 ), ĉ14 = c7 + α̂2 c8 + α̂4 c9 = f (θ7 + α̂2 θ8 + α̂4 θ9 ). From the Cauchy property of Γ, the evaluation points {θ7 + α̂θ8 + α̂2 θ9 , θ7 + α̂2 θ8 + α̂4 θ9 } are both independent. These evaluation points along with {θ0 , θ1 , . . . , θ5 , θ10 } form an independent set of cardinality, k = 9. •  = 4: The erased coordinates are in [7, 13]. After removing the interference from the known code-symbols {c4 }, ĉ14 = c7 + α̂2 c8 + α̂4 c9 = f (θ7 + α̂2 θ8 + α̂4 θ9 ). θ7 + α̂2 θ8 + α̂4 θ9 along with {θ0 , θ1 , . . . , θ6 , θ10 } result in an independent set of size k = 9. Thus, for every , the (5 − ) non-erased coordinates [10 + , 14] will provide one linearized polynomial evaluation each. These (5 − ) evaluations along with the 11 − (7 − ) evaluations corresponding to the non-erased coordinates in [0, 10] ∪ {15}, result in linearized polynomial evaluations over 9 independent evaluation points and hence all the erased symbols can be recovered. In order to show that the delay constraint of T = 10 is met during the recovery from burst erasures, we need to consider only the burst erasures involving at least one of the coordinates [0, B − N − 1] = [0, 4]. Suppose ci , where i ∈ [0, 2], is part of a burst-erasure. The coordinates {7 + i, 10 + i} will be non-erased, as they are at least B = 7 apart from coordinate i. Hence using the check-sum provided by c10+i , the code-symbol ci can be recovered, with a delay of 10 time units. DRAFT January 19, 2018 For ci , where i ∈ [3, 4], which is part of a burst erasure, the symbol c10+i will be non-erased. There are three possible cases for (i, ); (3, 0), (4, 0) and (4, 1). If  = 0, the code-symbols {c7 , c8 , c9 } will be known by the time (10 + i). After removing the interference from the known symbols at coordinates {7, 8, 9}, c10+i will yield the code-symbol ci . If  = 1, we have already seen that, c4 will be recovered at time 14. A PPENDIX A P ROOF OF P ROPOSITION IV.1: B URST E RASURES , C ASE : δ < (B − N ) Consider the set of erased coordinates, B , [u, v], where 0 ≤ u ≤ v ≤ n−1 and v−u+1 = B. Let |B ∩ [T, T + B − N − 1]| = . 1)  = (B − N ): The number of erasures across the coordinates {0, T − 1} ∪ {T − N + B} will be B − (B − N ) = N , which can be corrected. 2)  = 0: Each code-symbol from the set {cT , cT +1 , . . . , cT +δ−1 } will correct one erased symbol (argument similar to that in the proof of Proposition III.1). This essentially means that all the code-symbols which are part of the check-sums given by {cT , cT +1 , . . . , cT +δ−1 }, are known by time T + δ − 1. In particular, we have {caB , caB+1 , . . . , caB+δ−1 } known by time T + δ − 1, irrespective of whether some of them are erased or not. From each codesymbol cT +j , cj + cB+j + . . . + c(a−1)B+j + γj,0 caB + γj,1 caB+1 + . . . + γj,δ−1 caB+δ−1 , for δ ≤ j ≤ B −N −1, the interference from {caB , caB+1 , . . . , caB+δ−1 } can be canceled. Hence cT +j ’s can be thought of as simply, ĉT +j = cj +cB+j +. . .+c(a−1)B+j . For 0 ≤ i ≤ B−N −1, let `i be the unique coordinate ∈ [u, v] such that `i mod B = i. The check-sum provided by the code-symbol at coordinate (T + i) will be recovering precisely the erased symbol c`i . Thus in total, the set of symbols {cT , cT +1 , . . . , cT +B−N −1 } will correct (B − N ) erasures. 3) 0 <  < (B − N ): Let ζ indicate the number of non-erased coordinates lying in [T + , T + δ − 1]. Clearly, ζ > 0 iff  < δ. Assuming ζ > 0, each such non-erased ci+T that lies in  ≤ i ≤ δ − 1, helps in recovering one unique erased symbol from the erasure burst. The argument, again, is similar to the one in the proof of Proposition III.1. This also means that the symbols {caB+j :  ≤ j ≤ δ − 1} are known by time T + δ − 1. Now let us see how non-erased symbols in the range cT +i : max{δ, } ≤ i ≤ (B − N − 1) help in the recovery of erased symbols. Note that each cT +i in the range max{δ, } ≤ i ≤ (B − N − 1) takes the form: cT +i = ci + cB+i + . . . + c(a−1)B+i + γi,0 caB + γi,1 caB+1 + . . . + γi,δ−1 caB+δ−1 . As we assume  > 0, we can remove interference from the set of January 19, 2018 DRAFT non-erased symbols {ci , cB+i , . . . , c(a−2)B+i } (these can be easily verified to be non-erased symbols, when  > 0). For ζ > 0, we can remove the interference from the set of symbols {caB+j :  ≤ j ≤ δ − 1} (these are known by time T + δ − 1). Thus effectively, each non-erased symbol cT +i in the range max{δ, } ≤ i ≤ (B − N − 1) provides the sum ĉT +i = c(a−1)B+i + γi,0 caB + γi,1 caB+1 + . . . + γi,min{,δ}−1 caB+min{,δ}−1 . There are the following two possibilities. • (B − ) ≤ (N + δ): This condition essentially means that none of the c(a−1)B+i terms appearing in ĉT +i , for max{δ, } ≤ i ≤ (B − N − 1), are part of the burst erasure considered. In this scenario, we can further remove the interfering c(a−1)B+i ’s from ĉT +i ’s, where max{δ, } ≤ i ≤ (B − N − 1). Furthermore, if (B − ) < δ, not all of the symbols {caB , caB+1 , . . . , caB+δ−1 } will be erased. Hence we can rewrite the effective check-sum contributed by each ĉT +i as ĉT +i = γi,max{δ−B+,0} caB+max{δ−B+,0} + γi,1 caB+1 + . . . + γi,min{,δ}−1 caB+min{,δ}−1 . The number of remaining erased symbols caB+i in the range 0 ≤ i ≤ min{, δ} − 1, {caB+max{δ−B+,0} , caB+max{δ−B+,0}+1 , . . . , caB+min{,δ}−1 } and number of non-erased symbols in the coordinate range [T + max{, δ}, T + B − N − 1] is given in Table I, for all the cases with (B − ) ≤ (N + δ). From Table I, for all the cases, the number of remaining erased symbols ≥ number of code-symbols (evaluations) in the range [T + max{, δ}, T + B − N − 1]. As γx,y ’s are chosen carefully as part of a Cauchy matrix, all these equations (evaluations) will be independent. Thus the number of independent equations provided by coordinates in the range [T + , T + B − N − 1] is equal to (B − N − ). • (B − ) > (N + δ): Let α0 , (B −  − N − δ). The number of erased symbols recovered by the non-erased coordinates lying in [T + , T + δ − 1] is max{δ − , 0}. Note that α0 < (B − N − δ). For each c(a−1)B+i such that i ∈ [B − N − α0 , B − N − 1], there exists a non-erased cT +i which results in a ĉT +i = c(a−1)B+i + γi,0 caB + γi,1 caB+1 + . . . + γi,min{,δ}−1 caB+min{,δ}−1 , after removing the known interfering symbols. To the contrary, if cT +i is part of the erased symbols, this would mean that B ≥ (B − N − i) + N + δ + i =⇒ δ ≤ 0, which is a contradiction. Thus cT +i for i ∈ [B − N − α0 , B − N − 1] gives α0 independent equations as they all give one unique component c(a−1)B+i each. For j ∈ [max{, δ}, B − N − α0 − 1], cT +j ’s are non-erased and results in a ĉT +j = γj,0 caB + γj,1 caB+1 + . . . + γj,min{,δ}−1 caB+min{,δ}−1 , after removing the known DRAFT January 19, 2018 Condition No. of remaining erased (unknown) No. of equations symbols among the coordinates from the coordinates [aB, aB + δ − 1] [T + max{, δ}, T + B − N − 1] (B − ) ≥ δ,  ≥ δ δ (B − N − ) (B − ) ≥ δ,  < δ  (B − N − δ) (B − ) < δ,  ≥ δ (B − ) (B − N − ) (B − ) < δ,  < δ (B − δ) (B − N − δ) Table I: A summary of all the conditions, when (B − ) ≤ (N + δ). interfering symbols. These corresponds to (B−N −α0 −max{, δ}) = min{, δ} equations and min{, δ} unknowns and hence are all independent. Therefore, the total number of independent evaluations supplied by the non-erased coordinates in [T + , T + B − N − 1] is max{δ − , 0} + α0 + min{, δ} = δ + α0 = B − N − . Therefore for all the cases of 0 ≤  ≤ (B − N ), (B − N − ) non-erased code-symbols in the range [T +, T +B −N −1] provide that many evaluations, which are independent (over Fq ), with respect to the T + 1 − (B − ) evaluation points corresponding to the (T − B +  + 1) non-erased locations in [0, T − 1] ∪ {T − N + B}. This essentially adds up to T − N + 1 evaluations over independent evaluation points. As k = T − N + 1, all the erasures can be corrected. In order to prove that the delay constraint of T is met during the recovery from burst erasures, we need to consider only the burst erasures involving at least one of the coordinates [0, B − N − 1]. It is enough to show that for any erasure burst of length B that starts at coordinate i ∈ [0, B − N − 1], the code-symbol ci can be recovered with a delay of at most T . If ci , where i ∈ [0, δ − 1], is part of a burst-erasure, we fall back on the proof of the corresponding part in Proposition III.1 to see that delay conditions are met. In the following we consider the case of i ∈ [δ, B − N − 1]. Consider an erasure burst which starts at i, where i ∈ [δ, B −N −1]. The symbols {ci+B , ci+2B , . . . , ci+(a−1)B , cT +i } will be non-erased. Let  be as defined previously. If  = 0, all the codesymbols in {caB , caB+1 , . . . , caB+δ−1 } will be known by the time (T + i). This follows from the fact that all the symbols cT , cT +1 , . . . , cT +δ−1 are non-erased. After removing the interference January 19, 2018 DRAFT from known symbols at coordinates {i+B, i+2B, . . . , i+(a−1)B, aB, aB +1, . . . , aB +δ −1}, the code-symbol cT +i will yield ci . For  > 0, we first note that, for a burst starting at coordinate i ∈ [δ, B − N − 1], a is forced to be equal to 1. i.e., T = B + δ. From the max{δ − , 0} non-erased coordinates in [T + , T + δ − 1], we can obtain code-symbols in the coordinate range [aB + , aB + δ − 1 = T − 1]. Note that i = T − B +  = δ + . Number of non-erased coordinates in the range [T + max{δ, }, T + i] = i − max{δ, } + 1. For each j ∈ [max{δ, }, i − 1], cj is a nonerased symbol. This follows from our assumption that, the error burst is starting at time i. For j ∈ [max{δ, }, i], cT +j , cj + γj,0 cB + γj,1 cB+1 + . . . + γj,δ−1 cB+δ−1 (as a = 1). After removing the known symbols from the coordinate range [B + , B + δ − 1] and [max{δ, }, i − 1], we have the resultant sums: ĉT +j =   γj,0 cB + γj,1 cB+1 + . . . + γj,min{,δ}−1 cB+min{,δ}−1 if max{δ, } ≤ j ≤ i − 1,  cj + γj,0 cB + γj,1 cB+1 + . . . + γj,min{,δ}−1 cB+min{,δ}−1 j = i. For the i − max{δ, } = δ +  − max{δ, } = min{δ, } equations in the range max{δ, } ≤ j ≤ i − 1, there are that many unknowns. As γx,y ’s are carefully chosen to be part of a Cauchy matrix, these equations can be solved (at time (T + i − 1)) to obtain the code-symbols: {cB , cB+1 , . . . , cB+min{,δ} }. Thus at time (T + i), the contribution from these code-symbols can be removed from ĉT +i to obtain ci . This completes the proof. R EFERENCES [1] E. Martinian and C. W. Sundberg, “Burst erasure correction codes with low decoding delay,” IEEE Trans. Inf. Theory, vol. 50, no. 10, pp. 2494–2502, 2004. [2] A. Badr, P. Patil, A. Khisti, W. Tan, and J. G. Apostolopoulos, “Layered Constructions for Low-Delay Streaming Codes,” IEEE Trans. Inf. Theory, vol. 63, no. 1, pp. 111–141, 2017. [3] Z. Li, A. Khisti, and B. Girod, “Correcting erasure bursts with minimum decoding delay,” in Proc. Asilomar Conference on Signals, Systems and Computers, 2011, pp. 33–39. [4] Ö. F. Tekin, T. Ho, H. Yao, and S. Jaggi, “On erasure correction coding for streaming,” in Proc. Information Theory and Applications Workshop, 2012, pp. 221–226. [5] D. Leong, A. Qureshi, and T. Ho, “On coding for real-time streaming under packet erasures,” in Proc. Int. Symp. Inf. Theory, 2013, pp. 1012–1016. [6] N. Adler and Y. Cassuto, “Burst-Erasure Correcting Codes With Optimal Average Delay,” IEEE Trans. Inf. Theory, vol. 63, no. 5, pp. 2848–2865, 2017. [7] S. L. Fong, A. Khisti, B. Li, W. Tan, X. Zhu, and J. Apostolopoulos, “Optimal Streaming Codes for Channels with Burst and Arbitrary Erasures,” arXiv preprint arXiv:1801.04241, 2018. DRAFT January 19, 2018 [8] E. Martinian and M. Trott, “Delay-Optimal Burst Erasure Code Construction,” in Proc. Int. Symp. Inf. Theory. IEEE, 2007, pp. 1006–1010. [9] H. Gluesing-Luerssen, J. Rosenthal, and R. Smarandache, “Strongly-MDS convolutional codes,” IEEE Trans. Inf. Theory, vol. 52, no. 2, pp. 584–598, 2006. [10] A. Badr, A. Khisti, W. Tan, and J. G. Apostolopoulos, “Streaming codes for channels with burst and isolated erasures,” in Proc. INFOCOM. IEEE, 2013, pp. 2850–2858. [11] R. Lidl and H. Niederreiter, Introduction to Finite Fields and Their Applications. New York, NY, USA: Cambridge University Press, 1986. [12] E. Gabidulin, “Theory of Codes with maximum rank distance,” Problems of Information Transmission, vol. 21, no. 7, pp. 1–12, 1985. [13] R. M. Roth, Introduction to coding theory. January 19, 2018 Cambridge University Press, 2006. DRAFT
7cs.IT
1 Distributed Frequency Control with Operational Constraints, Part II: Network Power Balance arXiv:1703.00083v1 [cs.SY] 28 Feb 2017 Zhaojian Wang, Feng Liu, Steven H. Low, Fellow, IEEE, Changhong Zhao, and Shengwei Mei Fellow, IEEE Abstract—In Part I of this paper we propose a decentralized optimal frequency control of multi-area power system with operational constraints, where the tie-line powers remain unchanged in the steady state and the power mismatch is balanced within individual control areas. In Part II of the paper, we propose a distributed controller for optimal frequency control in the network power balance case, where the power mismatch is balanced over the whole system. With the proposed controller, the tieline powers remain within the acceptable range at equilibrium, while the regulation capacity constraints are satisfied both at equilibrium and during transient. It is revealed that the closedloop system with the proposed controller carries out primal-dual updates with saturation for solving an associated optimization problem. To cope with discontinuous dynamics of the closed-loop system, we deploy the invariance principle for nonpathological Lyapunov function to prove its asymptotic stability. Simulation results are provided to show the effectiveness of our controller. Index Terms—Power system dynamics, frequency control; network power balance; distributed control. I. I NTRODUCTION In Part I of the paper we have investigated the optimal frequency control of multi-area power system with operational constraints [1]. In that case, the tie-line powers are required to be unchanged in the steady state after load disturbances, which implies the power mismatch in each area has to be balanced individually. It is referred to as the per-node power balance case. In Part II of the paper, we consider the transmission congestion in the distributed optimal frequency design. The per-node balance case in Part I mainly considers the situation where the power delivered from one area to another is fixed, e.g. contract power, which should not be violated in normal operation. However, in some circumstances, control areas may cooperate for better frequency recovery or regulation cost reduction. In this case, power mismatch may be balanced by all generations and controllable loads among all control areas in cooperation. Similar situations also appear in one control area with multiple generators and controllable loads that cooperate to eliminate the power mismatch in the area. It is referred to as the network power balance case. Compared with the This work was supported by the National Natural Science Foundation of China ( No. 51377092, No. 51677100, No. 51621065), Foundation of Chinese Scholarship Council (CSC No. 201506215034), the US National Science Foundation through awards EPCN 1619352, CCF 1637598, CNS 1545096, ARPA-E award DE-AR0000699, and Skoltech through Collaboration Agreement 1075-MRA. Z. Wang, F. Liu and S. Mei are with the Department of Electrical Engineering, Tsinghua University, Beijing, China, 100084 e-mail: ([email protected]). S. H. Low and C. Zhao are with the Department of Electrical Engineering, California Institute of Technology, Pasadena, CA, USA, 91105 email:([email protected]) per-node balance case, the most challenging problem in this case is that the tie-line powers may change and congestions may occur. In addition, local information is not sufficient and neighboring information turns to be helpful. As for the constraints, the tie-line power constraints are not hard limits, which only need to be satisfied at equilibrium. The capacity limits on the generations and controllable loads also required to be satisfied both in steady state and during transient. In the recent literature of frequency control, tie-line power constraints are considered in [2]–[7]. In [2], tie-line power constraints are included in the load-side secondary frequency control. A virtual variable is used to estimate the tie-line power, whose value is identical to the tie-line power at equilibrium. In [3], [4], an optimal economic dispatch problem including tie-line power constraints is formulated, then the solution dynamics derived from a primal-dual algorithm is shaped as a port-Hamiltonian form. The power system dynamics also have a port-Hamiltonian form, which are interconnected with the solution dynamics to constitute a closedloop Hamiltonian system. Then, the optimality and stability are proved. In [6], a unified method is proposed for primary and secondary frequency control, where the congestion management is implemented in the secondary control. In [7], a realtime control framework is proposed for tree power networks, where transmission capacities are considered. Similar to the per-node balance case, hard limits, such as capacity constraints of power injections on buses, are enforced only in the steady-state in the literature, which may fail if such constraints are violated in transient. Here we construct a fully distributed control to recover nominal frequency while eliminating congestion. Differing from the literature, it enforces regulation capacity constraints not only at equilibrium, but also during transient. We show that the controllers together with the physical dynamics serve as primal-dual updates with saturation for solving the optimization problem. The optimal solution of the optimization problem and the equilibrium point of closed-loop system are identical. The enforcement of capacity constraints during transient and tie-line power limits simultaneously makes the stability proof difficult. Specifically, the Lyapunov function is not continuous anymore, as in the per-node case in Part I of the paper. In this situation, the conventional LaSalle’s invariance principle does not apply. To overcome the difficulty, we construct a nonpathological Lyapunov function to mitigate the impacts of nonsmooth dynamics. The salient features of the controller are: 1) Control goals: the controller restores the nominal frequency and balance the power mismatch in the whole 2 system after unknown load disturbance while minimizing the regulation costs; 2) Constraints: the regulation capacity constraints are always enforced even during transient and the congestions can be eliminated automatically; 3) Communication: only neighborhood communication is needed in the network balance case; 4) Measurement: the controller is adaptive to unknown load disturbances automatically with no need of load measurement. The rest of this paper is organized as follows. In Section II, we describe our model. Section III formulates the optimal frequency control problem in the network balance case, presents the distributed frequency controller and proves the optimality, uniqueness and stability of the closed-loop equilibrium. Simulation results are given in Section IV. Section V concludes the paper. nominal or scheduled values so that, e.g., ω j (t) = 0 means the frequency is at its nominal value. In this paper, all nodes cooperate to rebalance power over the entire network after a disturbance. The power flows Pi j on the tie lines may deviate from their scheduled values and we require that they satisfy line limits, i.e., ∀(i, j) ∈ E Pi j ≤ Pi j ≤ Pi j for some upper and lower bounds Pi j , Pi j . In DC approximation the power flow on line (i, j) is given by Pi j = Bi j (θi − θ j ). Hence line flow constraints in the pernode balance case is θi = θ j for all (i, j) ∈ E and in the network balance case is: ∀(i, j) ∈ E θ i j ≤ θi − θ j ≤ θ i j (3) II. N ETWORK MODEL We summarize the notation used in Part I [1]. The power network is model by a directed graph G := (N, E) where N = {0, 1, 2, ...n} is the set of nodes (control areas) and E ⊆ N × N is the set of edges (tie lines). If a pair of nodes i and j are connected by a tie line directly, we denote the tie line by (i, j) ∈ E. Let m := |E| denote the number of tie lines. Use (i, j) ∈ E or i → j interchangeably to denote a directed edge from i to j. Assume the graph is connected and node 0 is a reference node. For each node j ∈ N, θ j (t) denotes the rotor angle at node j at time t and ω j (t) is the frequency. Pjg (t) denotes the (aggregate) generation at node j at time t and ugj (t) is its generation control command. Pjl (t) denotes the (aggregate) controllable load and ulj (t) is its load control command. p j is the (aggregate) uncontrollable load. The power system dynamics for each node j ∈ N is θ̇ j = ω j (t) where θ i j = Pi j /Bi j , θ i j = Pi j /Bi j are lower and upper bounds on angle differences. As the generation Pjg and load Pjl in each area can increase or decrease, and a line flow Pi j can in either direction, we make the following assumption. A1: g l 1) Pgj < 0 < P j and Plj < 0 < P j for ∀ j ∈ N. 2) θ i j ≤ 0 ≤ θ i j for (i, j) ∈ E. 3) θ0 (t) := 0 and φ0 (t) := 0 for all t ≥ 0. Here φ is a vector variable that represents virtual phase angles in the network balance case in Section III. The assumption θ0 ≡ φ0 ≡ 0 amounts to using (θ0 (t), φ0 (t)) as reference angles. It is made merely for notational convenience: as we will see, the equilibrium point will be unique with this assumption (or unique up to reference angles without this assumption). (1a) M j ω̇ j = Pjg (t) − Pjl (t) − p j − D j ω j (t) Bi j (θi (t) − θ j (t)) − B jk (θ j (t) − θk (t)) i:i→ j k: j→k = −Pjg (t) + ugj (t) − ω j (t)/R j = −Pjl (t) + ulj (t) + T jg Ṗjg T jl Ṗjl ∑ ∑ (1b) (1c) (1d) where D j > 0 are damping constants, R j > 0 are droop parameters, and B jk > 0 are line parameters that depend on the reactance of the line ( j, k). Let x := (θ , ω, Pg , Pl ) denote the state of the network and u := (ug , ul ) denote the control. The capacity constraints are: Pgj Pjg (t) ≤ Plj ≤ Pjl (t) g ≤ Pj, l ≤ P j, III. C ONTROLLER D ESIGN FOR T HE N ETWORK P OWER BALANCE C ASE j∈N (2a) j∈N (2b) Here (2a) and (2b) are hard limits on the regulation capacities of generation and controllable load at each node, which should not be violated at any time even during transient. The system operates in a steady state initially, i.e., the generation and the load are balanced and the frequency is at its nominal value. All variables represent deviations from their In the per-node balance case, individual control areas rebalance power within their own areas after disturbances. However, in many circumstances, it may be more efficient for all control areas to eliminate power imbalance of the overall system in a coordinated manner. This can be modeled as the condition: ∑ j Pjg = ∑j   Pjl + p j (4) In this case the tie-line flows may not be restored to their predisturbance values. To ensure that they are within operational limits, the constraints (3) are imposed. Even though the philosophy of the controller design as well as the proofs are similar to the per-node case, the details are much more complicated. Our presentation will however be brief where there is no confusion. 3 A. Control goals In the network power balance case, the control goals are formalized as the following optimization problem. NBO: min z2j α j  2 β j  2 Dj ∑ 2 Pjg + ∑ 2 Pjl + ∑ 2 ω 2j + ∑ 2 j j j j (5a) g l g l over x := (θ , φ , ω, P , P ) and u := (u , u ) s. t. (2), Pjg = Pjl + p j +U j (θ , ω) Pjg = Pjl + p j + Û j (φ ) θ i j ≤ φi − φ j ≤ θ i j , Pjg Pjl = = ugj , ulj , j∈N Even though neither the network balance condition (4) nor the line limits (3) are explicitly enforced in (5), they are satisfied at optimality (Theorem 2 below). Indeed, the virtual phase angles φ and the conditions (5b)–(5d) are carefully designed to enforce these conditions as well as to restore the nominal frequency ω ∗ = 0 at optimality. This technique is previously used in [2]. (5b) j∈N (5c) (i, j) ∈ E (5d) j∈N (5e) j∈N (5f) where α j > 0, β j > 0 are constant weights; z j is a shorthand defined for convenience as zj 2) Even though any feasible point of (5) has z j = 0, the objective function is augmented with z2j to improve convergence (see [8]). := Pjg − Pjl − p j − Û j (φ ) U(θ , ω) := Dω +CBCT θ , and Û(φ ) := CBCT φ . While θ represents the phase angles in the physical power network, φ is a cyber quantity that can be interpreted as virtual phase angles (see remarks below). The matrices D, C and B are defined as in the previous section. As in the per-node case, we define the variables θ̃i j := θi − θ j , or in vector form, θ̃ := CT θ . As we fix θ0 := 0 to be a reference angle under assumption A1, θ̃ = CT θ defines a bijection between θ and θ̃ . Similarly we define φ̃i j := φi − φ j or φ̃ := CT φ , and φ0 := 0 so there is a bijection between φ and φ̃ . Note that both θ̃ and φ̃ are restricted to the column space of CT . We will use (θ , φ ) and (θ̃ , φ̃ ) interchangeably. For instance we will abuse notation and write Û(φ ) := CBCT φ or Û(φ̃ ) := CBφ̃ . We now summarize some of the interesting properties of NBO (5) that will be proved formally in the next two subsections. We first compare NBO (5) with PBO in [1] for the per-node balance case. Remark 1 (Comparison of NBO and PBO). 1) Intuitively the network balance condition (4) is a relaxation of the per-node balance condition (3) in [1], and hence we expect that the optimal cost of NBO lower bounds that of PBO. This is indeed the case, as we now argue. Constraint (5c) implies that any feasible point of (5) has z j = 0 and hence these two optimization problems have the same objective function. Their variables and constraints are different in that PBO directly enforces the per-node balance condition while NBO (5) has the additional variable φ and constraints ∗ (5c)(5d). Any optimal point (θ ∗ , ω ∗ , Pg∗ , Pl ) for PBO however defines a feasible point (θ ∗ , φ , ω ∗ , Pg∗ , Pl∗ ) for NBO (5) with the same cost where φ = θ ∗ . The point (θ ∗ , φ , ω ∗ , Pg∗ , Pl∗ ) satisfies (5c)(5d) because ∗ (θ ∗ , ω ∗ , Pg∗ , Pl ) satisfies (5b), ω ∗ = 0 and θi∗ = θ j∗ by Theorem 2 in [1], and θ i j ≤ 0 ≤ θ i j by assumption A1. Remark 2 (Virtual phase angles φ ). 1) Under mild conditions, ω ∗ = 0 at optimality for both PBO and NBO. For NBO, this is a consequence of the constraint (5c) on φ ; see Lemma A.1. Summing (5c) over all j ∈ N also implies the network balance condition (4) since 1T Û(φ ) = 1T CBCT φ = 0. 2) In PBO, θi∗ = θ j∗ at optimality (i.e., tie-line flows are restored Pi∗j = 0) and U(θ ∗ , ω ∗ ) = 0. This does not necessarily hold in NBO. However φ is regarded as virtual phase angles because, at optimality, φ ∗ differs from the real phase angles θ ∗ only by a constant, φ ∗ − θ ∗ = 1(φ0 − θ0 ) (Lemma A.1 in the appendix). Hence CT φ ∗ − CT θ ∗ = CT · 1(φ0 − θ0 ) = 0, implying φ̃i∗j = θ̃i∗j . Then the constraints (5d) are exactly the flow constraints (3). In other words, we impose the flow constraints on θ̃ indirectly by enforcing such constraints on the virtual angle φ̃ . . B. Distributed controller Our control laws are:   λ̇ j = γ λj Pjg (t) − Pjl (t) − p j − Û j (φ̃ (t)) , j ∈ N (6a) η̇i+j = γiηj [φ̃i j (t) − θ i j ]+ η+ ∀(i, j) ∈ E (6b) η̇i−j = γiηj [θ i j − φ̃i j (t)]+ η− ∀(i, j) ∈ E (6c) φ̃˙i j ij ij φ̃ = γi j (Bi j [λi (t) − λ j (t) + zi (t) − z j (t)]  + ηi−j (t) − ηi+j (t) ∀(i, j) ∈ E (6d) h  iPgj ugj (t) = Pjg (t) − γ gj α j Pjg (t) + ω j (t) + z j (t) + λ j (t) g Pj + ω j (t)/R j , j∈N (6e)  iPlj h ulj (t) = Pjl (t) − γ lj β j Pjl (t) − ω j (t) − z j (t) − λ j (t) l Pj j∈N (6f) where γ λj , γiηj , γi j , γ gj , γ lj are positive constants. For any xi , ai ∈ R, the operator [xi ]+ ai is defined by φ̃ [xi ]+ ai  := xi if ai > 0 or xi > 0; 0, otherwise. For a vector case, [x]+ a is defined accordingly componentwise [9]. 4 Here we assume that each node i updates a set of internal 1 states (λi (t), ηi+j (t), η − ji (t), φ̃i j (t)) according to (6a)–(6d). In contrast to the completely decentralized control derived in the per-node balance case, here the control is distributed where each node i updates (λi (t), ηi+j (t), ηi−j (t)) using only local measurements or computation but requires the information (λ j (t), z j (t)) from its neighbors j to update φ̃i j (t). Note that zi (t) is not a variable but a shorthand for (function) Pjg (t) − Pjl (t) − p j − Û j (φ̃ (t)). The control inputs (ugi (t), uli (t)) in (6e)(6f) are functions of the network state (Pig (t), Pil (t), ωi (t)) and the internal state (λi (t), ηi+j (t), ηi−j (t), φ̃i j (t)). We write ugj and ulj as functions of (Pjg , Pjl , ω j , λ j ): for j ∈ N   (7a) ugj (t) := ugj Pjg (t), ω j (t), λ j (t), z j (t)   ulj (t) := ulj Pjl (t), ω j (t), λ j (t), z j (t) (7b) where the functions are defined by the right-hand sides of (6e)(6f). Now we comment on the implementation of the control (6). Remark 3 (Implementation). 1) As discussed above, communication is needed only between neighboring nodes (areas) to update the variables φ̃i j (t). 2) Similar to the per-node power balance case, we can avoid measuring the load change p j by using (1b) and the definition of z j (t) to replace (6a) with z j (t) = M j ω̇ j + D j ω j (t) − ∑ Pi j (t) + ∑ i:i→ j Pjk (t) k: j→k − Û j (φ̃ (t)) = γ λj z j (t) λ̇ j C. Design rationale The controller design (6) is also motivated by a (partial) primal-dual algorithm for (5), as for the per-node power balance case. Primal-dual algorithms. The optimization problem in the network balance case differs from that in the per-node balance case in the inequalities (5d) on φ̃ . Consider a general constrained convex optimization with inequality constraints: min f (x) s.t. g(x) = 0, h(x) ≤ 0 where Γx , Γρ1 , Γρ2 are strictly positive diagonal gain matrices. Here, if a is a scalar then (a)+ := max{a, 0} and if a is a vector then (a)+ is defined accordingly componentwise. For a dual algorithm, (8a) is replaced by x(t) := min L(x; ρ(t)) x∈X (8d) As for the per-node balance case, all variables in x(t) are updated according to (8a) except ω(t) which is updated according to (8d), as we see below. The set X in (8a) is defined by the constraints (2): n o g l (9) X := (Pg , Pl ) : (Pg , Pl ) ≤ (Pg , Pl ) ≤ (P , P ) Controller (6) design. Let ρ1 := (λ , µ) be the Lagrange multipliers associated with constraints (5c) and (5b) respectively, ρ2 := (η + , η − ) the multipliers associated with constraints (5d), and ρ := (ρ1 , ρ2 ). Define the Lagrangian of (5) by (10). Note that it is only a function of (x, ρ) and independent of u := (ug , ul ) as we treat u as a function of (x, ρ) defined by the right-hand sides of (6e)(6f). The closed-loop dynamics (1)(6) carry out an approximate primal-dual algorithm (8) for solving (5) in real time over the coupled physical power network and cyber computation. Since the reasoning is similar to the per-node balance case, we only provide a summary. Rewrite the Lagrangian L2 in vector form  1 g T g g L2 (x; ρ) = (P ) A P + (Pl )T Al Pl + ω T Dω + zT z 2   + λ T Pg − Pl − p −CBφ̃   + µ T Pg − Pl − p − Dω −CBθ̃   + (η + )T φ̃ − θ + (η − )T θ − φ̃ (11) where Al := diag(β j , j ∈ N), B := diag(Bi j , (i, j) ∈ E). First, the control (6b)(6c) can be interpreted as a continuoustime version of the dual update (8c) on the dual variable ρ2 := (η + (t), η − (t)):  + η̇ + = Γη ∇η + L2 (x(t); ρ(t)) η + (t) + −  η̇ − = Γη ∇η − L2 (x(t); ρ(t)) η − x∈X Rn where f : → R, g : Rn → Rk1 , h : Rn → Rk2 , and X ⊆ Rn is closed and convex. Here an inequality constraint h(x) ≤ 0 is imposed explicitly. Let ρ1 ∈ Rk1 be the Lagrange multiplier associated with the equality constraint g(x) = 0, ρ2 ∈ Rk2 that associated with the inequality constraint h(x) ≤ 0, and ρ := (ρ1 , ρ2 ). Define the Lagrangian L(x; ρ) := f (x) + ρ1T g(x) + ρ2T h(x). A standard primal-dual algorithm takes the form: x(t + 1) := ProjX (x(t) − Γx ∇x L(x(t); ρ(t))) (8a) ρ1 (t + 1) := ρ1 (t) + Γρ1 ∇ρ1 L(x(t); ρ(t)) ρ2 (t + 1) := 1 For + ρ2 (t) + Γ ∇ρ2 L(x(t); ρ(t)) ρ2 (8b) where Γη := diag(γiηj , (i, j) ∈ E). Second, the control (6a) carries out the dual update (8b) on λ (t): λ̇ = Γλ ∇λ L2 (x(t), ρ(t)) (12a) where Γλ := diag(γ λj , j ∈ N). The swing dynamic (1b) carries out the dual update (8b) on µ(t) because, as in the per-node balance case, we can identify µ(t) ≡ ω(t) so that µ̇ = ω̇ = M −1 ∇µ L2 (x(t); ρ(t)) (12b) (8c) each (directed) link (i, j) ∈ E we assume that only node i maintains the variables (ηi+j (t), η − ji (t), φ̃i j (t)). In practice, node j will probably maintain symmetric variables to reduce communication burden or for other reasons outside our mathematical model here. where M := diag(M j , j ∈ N). Finally we show that (1a), (1c), (1d), and (6d) implement a mix of the primal updates (8a) and (8d) on the primal variables x := (θ̃ (t); φ̃ (t); ω(t); Pg (t); Pl (t)). Setting ω(t) ≡ µ(t) 5  2 ∑ α j Pjg + 1 L2 (x; ρ) = 2 j∈N  2 ∑ β j Pjl + j∈N ! ∑ D j ω 2j + ∑ z2j j∈N ! + j ∑ µj Pjg − Pjl − p j − D jω j + j∈N ∑ Bi j θi j − i:i→ j ∑ B jk θ jk k: j→k ! + ∑ λj Pjg − Pjl − pj + j∈N ∑ Bi j φi j − i:i→ j ∑ B jk φ jk k: j→k ∑  ηi−j θ i j − φi j (t) + g (12c) ηi+j φi j (t) − θ i j ∑  (10) (i, j)∈E (i, j)∈E is equivalent to the primal update (8d) on ω(t), as in the pernode balance case. Moreover the control laws (6e)(6f) are then equivalent to T g Ṗg = [Pg (t) − Γg ∇Pg L2 (x(t), ρ(t))]PPg − Pg (t) h iPl T l Ṗl = Pl (t) − Γl ∇Pl L2 (x(t), ρ(t)) l − Pl (t) + 2) The nominal frequency is restored, i.e., ω ∗j = 0 for all j ∈ N; moreover φ̃i∗j = θ̃i∗j for all (i, j) ∈ E. 3) The network balance condition (4) is satisfied by x∗ . 4) The line limits (3) are satisfied by x∗ , implying Pi j ≤ Pi j ≤ Pi j on every tie line (i, j) ∈ E. where Γφ̃ := diag(γi j , (i, j) ∈ E) . Theorem 2 shows that the equilibrium point has a simple yet intuitive structure. Moreover, Theorem 2 implies that the closed-loop system can autonomously eliminate congestions on tie lines. This feature has important implications. It means our distributed frequency control is capable of serving as a corrective re-dispatch without the coordination of dispatch centers if a congestion arises. This can enlarge the feasible region for economic dispatch, since corrective re-dispatch has been naturally taken into account. The proofs of Theorem 1 and 2 are given in Appendix A. D. Optimality of equilibrium point E. Asymptotic stability P (12d) i.e., the generator and controllable load at each node j carry out the primal update (8a). For (θ̃ , φ̃ ), (1a) and (6d) are equivalent to the primal update (8a): θ̃˙ φ̃˙ = −B−1 ∇θ̃ L2 (x(t), ρ(t)) φ̃ = −Γ ∇φ̃ L2 (x(t), ρ(t)) (12e) (12f) φ̃ In this subsection, we address the optimality of the equilibrium point of the closed-loop system (1)(6). Given an (x, ρ) := (θ̃ , φ̃ , ω, Pg , Pl ), (λ , µ), (η − , η + ) , recall that the control input u(x, ρ1 , ρ2 ) is given by (7). Definition 1. A point (x∗ , ρ ∗ ) := (θ̃ ∗ , φ̃ ∗ , ω ∗ , Pg∗ , Pl∗ , λ ∗ , η +∗ , η −∗ , µ ∗ ) is an equilibrium point or an equilibrium of the closed-loop system (1)(6) if 1) The right-hand side of (1) vanishes at x∗ and u(x∗ , ρ ∗ ). 2) The right-hand side of (6a)–(6d) vanishes at (x∗ , ρ ∗ ). Definition 2. A point (x∗ , ρ ∗ ) is primal-dual optimal if (x∗ , u(x∗ , ρ ∗ )) is optimal for (5) and ρ ∗ is optimal for its dual problem. We make the following assumption: A2: The problem (5) is feasible. The following theorem characterizes the correspondence between the equilibrium of the closed-loop system (1)(6) and the primal-dual optimal solution of (5). Theorem 1. Suppose A2 holds. A point (x∗ , ρ ∗ ) is primal-dual optimal if and only if (x∗ , ρ ∗ ) is an equilibrium of closed-loop system (1)(6) satisfying (2) and µ ∗ = 0. Next result says that, at equilibrium, the network balance condition (4) and line limits (3) are satisfied and the nominal frequency is restored. Moreover the equilibrium is unique. (x∗ , ρ ∗ ) Theorem 2. Suppose A1 and A2 hold. Let be primaldual optimal. Then 1) The equilibrium (x∗ , µ ∗ ) is unique, with (θ ∗ , φ ∗ ) being unique up to (equilibrium) reference angles (θ0 , φ0 ). In this subsection, we address the asymptotic stability of the closed-loop system (1)(6), under an additional assumption: A3: The initial state of the closed-loop system (1)(6) is finite, and pgj (0), plj (0) satisfy constraint (2). As in the per-node balance case the closed-loop system (1)(6) satisfies constraint (2) even during transient. Lemma 3. Suppose A1 and A3 hold. Then constraint (2) is satisfied for all t > 0, i.e. (Pg (t), Pl (t)) ∈ X for all t ≥ 0 where X is defined in (9). The proof is exactly the same as that for Lemma 3 in [1] and omitted. Similar to the per-node balance case, we first rewrite the closed-loop system using states θ̃ , φ̃ instead of θ , φ (they are equivalent under assumption A1). Setting µ ≡ ω, the closedloop system (1)(6) is equivalent to (in vector form): θ̃˙ (t) = CT ω(t) (13a)   −1 g l ω̇(t) = M P (t) − P (t) − p − Dω(t) −CBθ̃ (t) (13b) g g −1 l l −1 Ṗ (t) = (T ) Ṗ (t) = (T ) g g (−P (t) + û (t))   −Pl (t) + ûl (t) η̇ + (t) = Γη [φ̃ (t) − θ ]+ η+ − η − φ̃ (t)]+ η− η̇ (t) = Γ [θ   λ̇ (t) = Γλ Pg (t) − Pl (t) − p −CBφ̃ (t) φ̃˙ (t) = Γφ̃ (13c) (13d) (13e) (13f) (13g)  BCT λ (t) + BCT z(t) + η − (t) − η + (t) (13h) 6 where z(t) := Pg (t) − Pl (t) − p −CBφ̃ (t) and iPg h  ûg (t) = Pg (t) − Γg Ag Pjg (t) + ω(t) + z(t) + λ (t) g P h  iPl ûlj (t) = Pl (t) − Γl Al Pjl (t) − ω(t) − z(t) − λ (t) l P := (θ̃ , ω, Pg , Pl , λ , η + , η − , φ̃ ). Denote w Note that the right-hand sides of (13e)(13f) are discontinuous due to projection to the nonnegative quadrant for (η + (t), η − (t)). The system (13) is called a projected dynamical system and we adopt the concept of Caratheodory solutions for such a system where a trajectory (w(t),t ≥ 0) is called a Caratheodory solution, or just a solution, to (13) if it is absolutely continuous in t and satisfies (13) almost everywhere. The result in [10, Theorems 2 and 3] implies that, given any initial state, there exists a unique solution trajectory to the closed-loop system (13) as the unprojected system is Lipschitz and the nonnegative quadrant is closed and convex. See [11, Theorem 3.1] for extension of this result to the Hilbert space. With regard to system (13), we first define two sets, σ + and − σ , as follows [8]. σ+ := {(i, j) ∈ E | ηi+j = 0, φ̃i j − θ i j < 0} σ− := {(i, j) ∈ E | ηi−j = 0, θ i j − φ̃i j < 0} Then (6b) and (6c) are equivalent to  η γi j (φ̃i j − θ i j ), η̇i+j = 0,  η γi j (θ i j − φ̃i j ), η̇i−j = 0, if(i, j) ∈ / σ +; if(i, j) ∈ σ + . (14a) if(i, j) ∈ / σ −; if(i, j) ∈ σ − . (14b) In a fixed σ + , σ − , define F(w).  −B1/2CT ω   −M −1/2 Pg − Pl − p − Dω −CBθ̃   (T g )−1 (Ag Pg + ω + z + λ )    (T l )−1 Al Pl − ω − z − λ  F(w) =  −(Γη )1/2 [φ̃ − θ ]+  η+  + η 1/2  −(Γ ) [θ − φ̃ ]η −    −(Γλ )1/2 Pg − Pl − p −CBφ̃  −(Γφ̃ )1/2 BCT λ + BCT z + η − − η +        (15)      If σ + and σ − do not change, F(w) is continuously differentiable in w. Similarly, we define S := Rm+n+1 × X × R2m+n+1+m , where the closed convex set X is defined in (9). Then for any w we define the projection of w − F(w) onto S as H(w) := ProjS (w − F(w)) := arg min ky − (w − F(w))k2 y∈S Then the closed-loop system (13) is equivalent to ẇ(t) = Γ2 (H(w(t)) − w(t)) where the positive definite gain matrix is :  Γ2 = diag B−1/2 , M −1/2 , (T g )−1 , (T l )−1 ,  λ 1/2 η 1/2 η 1/2 φ̃ 1/2 (Γ ) , (Γ ) , (Γ ) , (Γ ) (16) Note that the projection operation H has an effect only on (Pg ; Pl ) and Lemma 3 indicates that w(t) ∈ S for all t > 0, justifying the equivalence of (13) and (16). A point w∗ ∈ S is an equilibrium of the closed-loop system (16) if and only if it is a fixed point of the projection H(w∗ ) = w∗ . Let E2 := { w ∈ S | H(w(t)) − w(t) = 0 } be the set of equilibrium points. Then we have the following theorem. Theorem 4. Suppose A1, A2 and A3 hold. Starting from any initial point w(0), w(t) remains in a bounded set for all t and w(t) → w∗ as t → ∞ for some equilibrium w∗ ∈ E2 that is optimal for problem (5). For any equilibrium point w∗ , we define the following function taking the same form as the per-node case. 1 Ṽ2 (w) = −(H(w) − w)T F(w) − ||H(w) − w||22 2 1 ∗ T −2 + k(w − w ) Γ2 (w − w∗ ) 2 (17) where k is small enough such that Γ2 − kΓ−1 2 > 0 is strictly positive definite. For any fixed σ + and σ − , Ṽ2 is continuously differentiable as F(w) is continuously differentiable in this situation. Similar to V1 (w) used in Part I of the paper, we know Ṽ2 (w) ≥ 0 on S and Ṽ2 (w) = 0 holds only at any equilibrium w∗ = H(w∗ ) [12]. Moreover, Ṽ2 is nonincreasing for fixed σ + and σ − , as we prove in Appendix B. It is worth to note that the index sets σ + and σ − may change sometimes, resulting in discontinuity of Ṽ2 (w). To circumvent such an issue, we slightly modify the definition of V2 (w) at the discontinuous points as: 1) V2 (w) := Ṽ2 (w), if Ṽ2 (w) is continuous at w; 2) V2 (w) := lim sup Ṽ2 (v), if Ṽ2 (w) is discontinuous at w. v→w Then V2 (w) is upper semi-continuous in w, and V2 (w) ≥ 0 on S and V2 (w) = 0 holds only at any equilibrium w∗ = H(w∗ ). As V2 (w) is not differentiable for w at discontinuous points, we use the Clarke gradient as the gradient at these points [13]. Note that Ṽ2 is continuous almost everywhere except the switching points. Hence both V2 (w) is nonpathological [14], [15]. With these definitions and notations above, we can prove Theorem 4. The detail of proof is provided in Appendix B. IV. C ASE STUDIES A. System configuration A four-area system based on Kundur’s four-machine, twoarea system [16] [17] is used to test our optimal frequency controller. There are one (aggregate) generator (Gen1∼Gen4), one controllable (aggregate) load (L1c∼L4c) and one uncontrollable (aggregate) load (L1∼L4) in each area, which is shown in Fig.1. The parameters of generators and controllable loads are given in Table I. The total uncontrollable load in each area are identically 480MW. At time t = 10s, we add step changes on the uncontrollable loads in four areas to test the performance of our controllers. All the simulations are implemented in PSCAD [18] with 8GB memory and 2.39 GHz CPU. We use the detailed electromagnetic transient model of three-phase synchronous Bus7 Bus5 Bus8 Bus9 Bus10 Bus11 Bus3 T3 machines to simulate generators with both governors and exciters. The uncontrollable load L1-L4 are modelled Gen1 Gen3 by the fixed load in Bus6 PSCAD, while controllable load L1c-L4c T2 T4 Load1 Load2 are formulated by the self-defined controlled current Bus2 Bus4 source. Gen4 We need The closed-loop Gen2 system diagram is shown in Fig.2. measure loacal frequency, generation, controllable load and tie-line power flows to compute control demands. Only φ̃i j are exchanged between neighbors. All variables are added by their initial steady state values to explicitly show the actual values. T1 Bus1 Bus5 Bus7 Bus6 Bus8 Bus9 Bus10 Bus11 Bus2 T1 T2 Gen1 1) Stability and optimality: The dynamics of local frequencies and tie-line power flows are illustrated in Fig.3. The frequencies are well restored in all four control areas while the tie line powers are remained within their acceptable ranges. The generations and controllable loads are different from that before disturbance, indicating that the system is stabilized at a new steady state. The resulting equilibrium point is given in Table IV, which is identical to the optimal solution of (5) computed by centralized optimization using CVX. These simulation results confirm that our controller can autonomously guarantee the frequency stability while achieving optimal operating point in the overall system. Gen2 L1c L2 L1 Area2 L2c Bus15 Bus16 Bus17 Bus4 Bus3 Bus14 Bus13 Bus12 T4 T3 Gen4 Gen3 Area3 L3c L3 Area4 L4c L4 60 50.2 Frequency (Hz) Area1 80 50.3 Area 1 Area 2 Area 3 Area 4 50.1 50 49.9 49.8 49.7 0 Fig. 1: Four-area power system Tie line power (MW) Bus1 7 40 20 0 Line 21 Line 31 Line 32 Line 42 -20 -40 -60 20 40 60 80 100 120 140 160 -80 0 20 40 Time (s) ij Controller Controller u lj u gj uig TABLE I: S YSTEMPARAMETERS , P g , Pl , P , P , P , P , Pij , Pjk u l j i Area j 1 2 3 4 Controller g j u lj Dj 0.04 0.045 0.05 0.055 Rj 0.04 0.06 0.05 0.045 i i ij 100 120 140 160 Pjg∗ (MW) Pjl∗ (MW) Area 1 620 23.6 Area 2 596 59.8 Area 3 660 23.6 Area 4 580 39.7 Tie line Pi∗j (MW) (2,1) -39.94 (3,1) 13.35 (3,2) 53.27 (4,2) -59.6 2) Dynamic performance: In this subsection,  j , Pjgwe , Pjlanalyze , Pij , Pjk the impacts of operational (capacity and line power) constraints on the dynamic property. Similarly, we compare the responses of frequency controllers with and without considerController ing input saturations. The trajectories of mechanical power of g l turbines and controllable loads are shown in uFig.4 and Fig.5, u j j respectively. In this case, the system frequency is restored, and the same optimal equilibrium point is achieved. ki T jg αj βj T jl 2 2.5 4 4 2.5 4 6 5 Controller 1.5 2.5 5 4 3 5.5 l 5 g 3 ui 80 Time (s) TABLE III: E QUILIBRIUM P OINTS uil Fig. 2: Closed-loop system diagram g j 60 Fig. 3: Dynamics of frequency (left) and tie-line flows (right) in network balance case i , Pi g , Pi l , Pij , Pki  j , Pjg , Pjl , Pij , Pjk ui B. Network Power Balance Case In this case, the generations in each area are initiated as (560.9, 548.7, 581.2, 540.6) MW and the controllable loads (70.8, 89.6, 71.3, 79.4) MW. The load changes are identical to those in Table II, which are also unknown to the controllers. We use method in Remark 4 to estimate the load changes. Operational constraints on generations, controllable loads and tie lines are shown in Table II. 900 Mechanical pwoer (MW) j DFIG Bus12 Tw 850 Area 1 Area 2 Area 3 Area 4 800 750 Area 1 Area 2 Area 3 Area 4 700 650 600 550 500 TABLE II: 450 0 C APACITY LIMITS IN NETWORK CASE Area 2 [530, 680] Area 3 [550, 700] Area 4 [530, 670] [Plj ,P j ] (MW) [20, 80] [60, 100] [20, 80] [35, 80] Tie line [Pi j ,Pi j ] (MW) (2,1) [-65, 65] (3,1) [-65, 65] (3,2) [-65, 65] (4,2) [-65, 65] l 40 60 80 Time (s) Area 1 [550, 710] g [Pgj ,P j ] (MW) 20 100 120 140 160 0 20 40 60 80 100 120 140 160 Time (s) Fig. 4: Mechanical outputs with(left)/without(right) capacity constraints 3) Congestion analysis: In this scenario, we reduce tieline power constraints to Pi j = −Pi j = 50MW, which causes congestions in tie-line (2,3) and (2,4). The steady states  8 120 Area 1 Area 2 Area 3 Area 4 Pl (MW) 100 Area 1 Area 2 Area 3 Area 4 80 60 40 20 0 0 20 40 60 80 100 120 140 160 0 20 40 Time (s) 60 80 100 120 140 160 Time (s) Fig. 5: Controllable loads with(left)/without(right) capacity constraints under the distributed control are listed in Table IV. Note that ∗ + Pjg∗ − p j + Pjl∗ − ∑ Pjk ∑ Pi∗j = 0 hold in each area. i:i→ j k: j→k The dynamics of tie-line powers in two different scenarios shown in Fig.6 indicate that (2,4) reaches the limit in steady state. However, by adopting the proposed fully distributed optimal frequency control, the congestion is eliminated and all the tie line powers remain within the limits. Thus, congestion control is achieved optimally in a distributed manner. TABLE IV: S IMULATION R ESULTS WITH C ONGESTION Pjg∗ (MW) Pjl∗ (MW) Area 1 618 25.1 Area 2 595 60.7 Area 3 658 25.1 Area 4 585 34.9 Tie line Pi∗j (MW) (2,1) -36.4 (3,1) 13.1 (3,2) 49.5 (4,2) -49.9 80 Tie line power (MW) 60 40 20 Line 21 Line 31 Line 32 Line 42 0 -20 Line 21 Line 31 Line 32 Line 42 -40 -60 -80 0 20 40 60 80 Time (s) 100 120 140 160 0 20 40 60 80 100 120 140 160 Time (s) Fig. 6: Tie line power with(left)/without(right) capacity constraints V. C ONCLUDING R EMARKS In this paper, we have devised a distributed optimal frequency control in the network balance case, which can autonomously restore the nominal frequencies after unknown load disturbances while minimizing the regulation costs. The capacity constraints on the generations and controllable loads can also be satisfied even during transient. In addition, congestions can be eliminated automatically, implying tie-line powers can be remained within given ranges. Only neighborhood communication is required in this case. Like the per-node case, here the closed-loop system again carries out a primaldual algorithm with saturation to solve the associated optimal problem. To cope with the discontinuity introduced due to enforcing different types of constraints, we have constructed a nonpathological Lyapunov function to prove the asymptotically stability of the closed-loop systems. Simulations on a modified Kundur’s power system validate the effectiveness of our controller. This approach is also applicable to other problem involving frequency regulation, e.g. standalone microgrid or demand side management. We highlight two crucial implications of our work: First, our distributed frequency control is capable of serving as an automatically corrective re-dispatch without the coordination of dispatch center when certain congestion happens; Second, the feasible region of economic decisions can be enlarged benefiting from the corrective re-dispatch. In this sense, our work may provide a systematic way to bridge the gap between the (secondary) frequency control in a fast timescale and the economic dispatch in a slow timescale, hence breaking the traditional hierarchy of the power system frequency control and economic dispatch. R EFERENCES [1] Z. Wang, F. Liu, S. H. Low, C. Zhao, and S. Mei, “Distributed frequency control with operational constraints, part i: Per-node power balance,” https://arxiv.org/abs/1702.07965, 2017. [2] E. Mallada, C. Zhao, and S. H. Low, “Optimal load-side control for frequency regulation in smart grids,” IEEE Trans. Autom. Control, to appear, 2017. [3] T. Stegink, C. D. Persis, and A. van der Schaft, “A unifying energybased approach to stability of power grids with market dynamics,” arXiv preprint arXiv:1604.05200, 2016. [4] T. Stegink, C. D. Persis, and A. van der Schaft, “A port-hamiltonian approach to optimal frequency regulation in power grids,” in Proc. 54th IEEE Conference on Decision and Control (CDC), Dec 2015, pp. 3224– 3229. [5] P. Yi, Y. Hong, and F. Liu, “Distributed gradient algorithm for constrained optimization with application to load sharing in power systems,” Syst. Control Lett., vol. 83, pp. 45–52, Sept 2015. [6] C. Zhao, E. Mallada, S. Low, and J. Bialek, “A unified framework for frequency control and congestion management,” in Power Systems Computation Conference (PSCC), 2016. IEEE, 2016, pp. 1–7. [7] X. Zhang and A. Papachristodoulou, “A real-time control framework for smart power networks: Design methodology and stability,” Automatica, vol. 58, pp. 43–50, 2015. [8] D. Feijer and F. Paganini., “Stability of primal-dual gradient dynamics and applications to network optimization,” Automatica, vol. 46, no. 12, pp. 1974–1981, Dec 2010. [9] A. Cherukuri, E. Mallada, and J. Corts, “Asymptotic convergence of constrained primaldual dynamics,” Syst. Control Lett., vol. 87, pp. 10 – 15, 2016. [10] P. Dupuis and A. Nagurney, “Dynamical systems and variational inequalities,” Annals of Operations Research, vol. 44, pp. 9–42, 1993. [11] M.-G. Cojocaru and L. B. Jonker, “Existence of solutions to projected differential equations in hilbert spaces,” Proc. Amer. Math. Soc., vol. 132, pp. 183–193, 2004. [12] M. Fukushima, “Equivalent differentiable optimization problems and descent methods for asymmetric variational inequality problems,” Math. programming, vol. 53, no. 1-3, pp. 99–110, Jan 1992. [13] F. H. Clarke, Optimization and nonsmooth analysis. Siam, 1990, vol. 5. [14] A. Bacciotti and F. Ceragioli, “Nonpathological lyapunov functions and discontinuous carathodory systems,” Automatica, vol. 42, no. 3, pp. 453 – 458, 2006. [15] A. Bacciotti and F. Ceragioli, “Stability and stabilization of discontinuous systems and nonsmooth lyapunov functions,” ESAIM: Control, Optimisation and Calculus of Variations, vol. 4, pp. 361–376, 1999. [16] J. Fang, W. Yao, Z. Chen, J. Wen, and S. Cheng, “Design of anti-windup compensator for energy storage-based damping controller to enhance power system stability,” IEEE Trans. Power Syst., vol. 29, no. 3, pp. 1175–1185, May 2014. [17] P. Kundur, Power System Stability and Control. McGraw-hill New York, 1994, vol. 7. [18] https://hvdc.ca/pscad/. 9 Since (x∗ , ρ ∗ ) is a saddle point, we must have ∇φ̃ L2 (x∗ , ρ ∗ ) = 0, implying φ̃˙ = 0. A PPENDIX A P ROOFS OF T HEOREM 1 AND T HEOREM 2 We start with a lemma. Lemma A.1. Suppose (x∗ , u∗ ) is optimal for (5). Then 1) ω ∗ = 0, i.e., the nominal frequency is restored; 2) the network balance condition (4) is satisfied by x∗ ; 3) φ ∗ − θ ∗ = (φ0∗ − θ0∗ ) 1; 4) θ i j ≤ θi∗j ≤ θ i j , i.e., the line limits (3) are satisfied. Proof. Suppose (x∗ , u∗ ) is optimal but ω ∗ 6= 0. Then (5c) implies Pg∗ − Pl∗ − p = CBCT φ ∗ (A.1) Consider x̂ := (θ̂ , φ ∗ , ω̂, Pg∗ , Pl∗ ) with θ̂ := φ ∗ and ω̂ := 0. Then x̂ satisfies (5b)(5c) due to (A.1). Hence (x̂, u∗ ) is feasible for (5) but has a strictly lower cost, contradicting the optimality of (x∗ , u∗ ). Hence ω ∗ = 0. Multiplier both sides of (A.1) by 1T yields the network balance condition (4), proving 2). To prove 3), setting ω ∗ = 0 in (5b) and combining with (5c) yield CBCT θ ∗ = Pg∗ − Pl∗ − p = CBCT φ ∗ Since CBCT is an (n + 1) × (n + 1) matrix with rank n, its null space has dimension 1 and is spanned by 1 because CT 1 = 0. Hence CBCT (φ ∗ − θ ∗ ) = 0 implies that φ ∗ − θ ∗ = (φ0∗ − θ0∗ ) 1. To prove 4), note that φ̃ = CT φ and θ̃ = CT θ and hence φ̃ ∗ − θ̃ ∗ We have the following result. Lemma A.2. Suppose (x∗ , ρ ∗ ) is primal-dual optimal. Then h  iPgj g∗ g∗ g g∗ ∗ ∗ ∗ ug∗ = P = P − γ α P + ω + z + λ j j j j j j j j j g Pj = ⇐: Suppose now (x∗ , ρ ∗ ) is an equilibrium of the closed-loop system (1)(6) that satisfies (2) and µ ∗ = 0. Since (5) is convex with linear constraints, (x∗ , ρ ∗ ) is a primal-dual optimal if and only if (x∗ , u(x∗ , ρ ∗ )) is primal feasible and satisfies x∗ = arg min{L2 (x; ρ ∗ )|(x, u(x, ρ ∗ )) satisfies(2), (5e), (5f)} x (A.2) This is because ∇ρ1 L2 (x∗ , ρ ∗ ) = 0 since µ̇ = λ̇ = 0, η +∗ ≥ 0, η −∗ ≥ 0, and the complementary slackness condition −∗ ∗ + ∗ ηi+∗ j (φ̃i j − θ i j ) = 0, ηi j (θ i j − φ̃i j ) = 0 is satisfied since η̇ = − η̇ = 0. To show that (x∗ , u(x∗ , ρ ∗ )) is primal feasible, note that since (x∗ , u(x∗ , ρ ∗ )) is an equilibrium of (1), it satisfies ω ∗ = 0 and hence (5e)(5f), in addition to (2). Moreover ω̇ = 0 means (x∗ , u(x∗ , ρ ∗ )) satisfies (5b), λ̇ = 0 implies (5c), η̇ + = η̇ − = 0 implies (5d). To show that (x∗ , ρ ∗ ) satisfies (A.2), note that (5e)(5f) and (6e)(6f) imply that Pjl∗ h  iPlj = Pjl∗ − γ lj β j Pjl∗ − ω ∗j − z∗j − λ j∗ l Pj for any γ gj > 0 and γ lj > 0. Lemma A.2 shows that the saturation of control input does not impact the optimal solution of optimization problem (5). With Lemma 3, Lemma A.1 and Lemma A.2, we now can prove Theorem 1 and Theorem 2. Proof of Theorem 1. ⇒: Suppose (x∗ , ρ ∗ ) is primal-dual optimal. Then x∗ satisfies the operational constraints (2). Moreover the right-hand side of (1) vanishes because: • θ̇ = 0 since ω ∗ = 0 from Lemma A.1. • ω̇ = 0 since constraint (5b) holds for x∗ . • Ṗg = Ṗl = 0 since ω ∗ = 0 and x∗ satisfies (5e) and (5f). • λ̇ = 0 since (5c) holds for x∗ . • η̇ + = η̇ − = 0 since (5d) holds for x∗ . • From (12f) we have φ̃˙ = −Γφ̃ ∇φ̃ L2 (x∗ , ρ ∗ ) h  iPgj Pjg∗ − γ gj α j Pjg∗ + ω ∗j + z∗j + λ j∗ g Pjg∗ = Pjl∗ h  iPlj = Pjl∗ − γ lj β j Pjl∗ − ω ∗j − z∗j − λ j∗ l = CT (φ ∗ − θ ∗ ) = (φ0∗ − θ0∗ )CT 1 = 0 i.e. φ̃ ∗ = θ̃ ∗ . We conclude from (5d) that θ i j ≤ θi∗j ≤ θ i j . This completes the proof. ul∗ j Hence (x∗ , ρ ∗ ) is an equilibrium of the closed-loop system (1)(6) that satisfies the operational constraints (2). Moreover µ ∗ = ω ∗ = 0 since ∂∂ ωL2j (x∗ , ρ ∗ ) = D j (ω ∗j − µ ∗j ) = 0 and D j > 0 for all j ∈ N. Pj Pj The rest of the proof follows the same line of argument as that in Theorem 1 in [1]. This proves that (x∗ , ρ ∗ ) is primal-dual optimal and completes the proof of Theorem 1. Next we prove Theorem 2. Proof of Theorem 2. Let (x∗ , ρ ∗ ) = (θ̃ ∗ , φ̃ ∗ , ω ∗ , Pg∗ , Pl∗ , λ ∗ ,η +∗ , η −∗ , µ ∗ ) be primal-dual optimal. For the uniqueness of x∗ , (ω ∗ , Pg∗ , Pl∗ ) are unique because the objective function in (5) is strictly convex in (ω, Pg , Pl ). Hence µ ∗ = ω ∗ is unique as well. Assumption A1 that φ0∗ := 0 and (A.1) imply that φ ∗ is uniquely determined by the equilibrium (ω ∗ , Pg∗ , Pl∗ ). Since θ ∗ −φ ∗ = (θ0∗ −φ0∗ )1, assumption A1 that θ0∗ := 0 then implies that θ ∗ is unique. This proves the uniqueness of (x∗ , µ ∗ ). The remaining three parts of the theorem follow from Lemma A.1. A PPENDIX B P ROOF T HEOREM 4 We start with a lemma. Lemma B.1. Suppose A1, A4 and A5 hold. Then 1) V̇2 (w(t)) ≤ 0 in a fixed σ + and σ − . 2) The trajectory w(t) is bounded, i.e., there exists w such that kw(t)k ≤ w for all t ≥ 0. 10       Q=       −BCT D I|N| −I|N| 0 0 0 0 0 CB 0 0 0 0 0 0 0 −I|N| Ag + I|N| −I|N| −I|N| 0 0 −BCT 0 I|N| −I|N| Al + I|N| I|N| 0 0 BCT 0 0 0 0 0 0 0 −BCT Proof of Lemma B.1 . Given fixed σ + , σ − , for all (i, j) ∈ / σ +, − (i, j) ∈ / σ , we have V̇2 (w) ≤ k(H(w) − w∗ )T · Γ−1 2 (H(w) − (w − F(w))) T − (H(w) − w) Γ2 · Q · Γ2 (H(w) − w) T − (H(w) − (w − F(w))) (B.1a) (B.1b) (Γ2 − kΓ−1 2 )(w − H(w)) (B.1c) − k(w − w∗ )T · Γ−1 2 F(w) (B.1d) where Q is a semi-definite positive matrix and Γ2 Q = ∇w F(w), which given in (B.2). Here, the subscript of I means its dimension, and |A| means the cardinality of set A. Given fixed σ + and σ − , F(w) is continuous differentiable. In this case, (B.1a) and (B.1c) are nonpositive due to as discussed in the proof of Theorem 4 in [1]. (B.1b) is also nonpositive as Q is semi-definite positive (see Eq. (B.2)). Next, we prove that (B.1d) is nonpositive. Similar to the per-node case, substituting µ(t) ≡ ω(t) into the Lagrangian L2 (x, ρ) in (11) we obtain a function L̂2 (w) defined as follows.   L̂2 (w) := L2 θ̃ , ω, Pg , Pl , λ , µ, η + , η − , φ̃ µ=ω  1 g T g g l T l l T = (P ) A P + (P ) A P − ω Dω + zT z 2     + λ T Pg − Pl − p −CBφ̃ + ω T Pg − Pl − p −CBθ̃   + (η − )T θ − φ̃ + (η + )T φ̃ − θ In addition, denote w1 = (θ̃ , Pg , Pl , φ̃ ), w2 = (λ , ω, η + , η − ). Then L̂2 is convex in w1 and concave in w2 . In F(w), [φ̃ −θ ]+ and [θ − φ̃ ]+ have unknown dimensions η+ η− + − (up to σ and σ ). Fortunately, we have + +∗ T (η + − η +∗ )T [φ̃ − θ ]+ η + ≤ (η − η ) (φ̃ − θ ) = (η + − η +∗ )T ∇η + L̂2 where the inequality holds since ηi+j = 0 ≤ ηi+∗ j and φ̃i j −θ i j < 0 for (i, j) ∈ σ + , i.e., (ηi+j − ηi+∗ θ ) · ( φ̃ − ij i j ) ≥ 0. Similarly, j − (η − η −∗ T ) [θ − φ̃ ]+ η− − ≤ (η − η −∗ T − −∗ T = (η − η ) (θ − φ̃ ) ) ∇η − L̂2 . Consequently, it can be verified that ∗ T (w − w∗ )T Γ−1 2 F(w) ≤ (w − w ) ∇w L̂2 (w)  ∇w1 L̂2 = (w − w∗ )T (w1 , w2 ) −∇w2 L̂2 0 0 0 0 0 0 0 I|E|−|σ + | 0 0 0 0 0 −CB 0 CB 0 CB 0 −I|E|−|σ + | 0 I|E|−|σ − | −I|E|−|σ − | BCT CB             (B.2)    ∇θ̃ L̂2 ∇λ L̂2  ∇ω L̂2  ∇Pg L̂2     where, ∇w1 L̂2 :=   ∇Pl L̂2  and ∇w2 L̂2 := ∇η + L̂2 . ∇φ̃ L̂2 ∇η − L̂2 Then we have  ∗ T −1 − k(w − w∗ )T Γ−1 2 F(w) ≤ −k(w − w ) · Γ2 F(w) = − k(w1 − w∗1 )T ∇w1 L̂2 (w1 , w2 ) + k(w2 − w∗2 )T ∇w2 L̂2 (w1 , w2 )  ≤ k L̂2 (w∗1 , w2 ) − L̂2 (w1 , w2 ) + L̂2 (w1 , w2 ) − L̂2 (w1 , w∗2 )   = k L̂2 (w∗1 , w2 ) − L̂2 (w∗1 , w∗2 ) + L̂2 (w∗1 , w∗2 ) − L̂2 (w1 , w∗2 ) | {z } | {z } ≤0 ≤0 ≤0 (B.3) where the first inequality holds because L̂2 is convex in w1 and concave in w2 and the second inequality follows because (w∗1 , w∗2 ) is a saddle point. Therefore (B.1d) is nonpositive, proving the first assertion. To prove the second assertion, we further investigate the situation that σ + or σ − changes. We only consider the set σ + since it is the same to σ − . We have the following observations: • The set σ + is reduced, which only happens when φ̃i j −θ i j goes through zero, from negative to positive. Hence an extra term will be added to V2 . As this term is initially zero, there is no discontinuity of V2 in this case. + • The set σ + is enlarged when ηi j goes to zero from positive while φ̃i j < θ i j . Here V2 will lose a positive term (γiηj )2 (φ̃i j − θ i j )2 /2, causing discontinuity. In the context, we conclude that V2 is always nonincreasing along the trajectory even when σ + or σ − changes and discontinuity occurs. To prove that the trajectory w(t) is bounded note that [12, Theorem 3.1] proves that V̂2 (w) := − (H(w) − w)T F(w) − 1 2 2 ||H(w) − w||2 satisfies V̂2 (w) ≥ 0 over S. Therefore, we have 1 ∗ k(w(t) − w∗ )T Γ−2 2 (w(t) − w ) ≤ V2 (w(t)) ≤ V2 (w(0)) 2 indicating the trajectory w(t) is bounded. Lemma B.2. Suppose A1, A4 and A5 hold. Then 1) The trajectory w(t) converges to the largest weakly invariant subset W2∗ contained in W2 := {w ∈ S|V̇2 (w) = 0}. 2) Every point w∗ ∈ W2∗ is an equilibrium point of (16). Proof of Lemma B.2 . Given an initial point w(0) there is a compact set Ω0 := Ω(w(0)) ⊂ S such that w(t) ∈ Ω0 for t ≥ 0 and V̇2 (w) ≤ 0 in Ω0 . 11 Invoking the proof of Lemma B.1, V2 is radially unbounded and positively definite except at equilibrium. As V2 and V̇2 are nonpathological, we conclude that any trajectory w(t) starting from Ω0 converges to the largest weakly invariant subset W2∗ contained in W2 = { w ∈ Ω0 | V̇2 (w) = 0 } [14, Proposition 3], proving the first assertion. For the second assertion, We fix w(0) ∈ W2∗ and then prove that w(0) must be an equilibrium point. From (B.1b), direct computing yields V̇2 (w(t)) ≤ −ω̇ T Dω̇ − (Ṗg )T Ag Ṗg − (Ṗl )T Al Ṗl − (CBφ̃˙ − Ṗg + Ṗl )T (CBφ̃˙ − Ṗg + Ṗl ) ≤0 (B.4) Since Ag , Al and D are positively definite diagonal matrices, V̇2 (w) = 0 holds only when Ṗg = Ṗl = ω̇ = 0. Therefore, for any w(0) ∈ W2∗ , the trajectory w(t) satisfies Ṗg (t) = Ṗl (t) = ω̇(t) = 0, Pg (t), t ≥0 (B.5) Pl (t) Hence and ω(t) are all constants due to the boundedness property guaranteed by Lemma B.1. On the other hand, for V̇2 (w) = 0, both terms in (B.3) have to be zero, implying that L̂2 (w1 (t), w∗2 ) = L̂2 (w∗1 , w∗2 ) must hold in W2 . Differentiating with respect to t gives  T ∂ ∗ L̂2 (w1 (t), w2 ) · ẇ1 (t) = 0 = −φ̃˙ T (Γφ̃ )−1 φ̃˙ (B.6) ∂ w1 The second equality holds due to Eq. (B.5) and (13h). Then we can conclude φ̃˙ = 0 immediately, implying φ̃ is also constant in W ∗ due to its boundedness. Invoking the close-loop dynamics (13), θ̃˙ (t), η̇ + (t), η̇ − (t) and λ̇ (t) must be constants in W2∗ as Pg (t), Pl (t), ω(t) and φ̃ (t) are all constants. Then we conclude that θ̃˙ (t) = η̇ + (t) = η̇ − (t) = λ̇ (t) = 0 holds for all t ≥ 0 due to the boundedness property of w(t) (Lemma B.1). This implies that any w(0) ∈ W2∗ must be an equilibrium point, completing the proof. Proof of Theorem 4 . Fix any initial state w(0) and consider the trajectory (w(t),t ≥ 0) of the closed-loop system closeloop dynamics (13). As mentioned in the proof of Lemma B.2, w(t) stays entirely in a compact set Ω0 . Hence there exists an infinite sequence of time instants tk such that w(tk ) → ŵ∗ as tk → ∞, for some ŵ∗ ∈ W2∗ . Lemma B.2 guarantees that ŵ∗ is an equilibrium point of the closed-loop system (13), and hence ŵ∗ = H(ŵ∗ ). Thus, using this specific equlibrium point ŵ∗ in the definition of V2 , we have V2∗ = lim V2 (w(t)) = lim V2 (w(tk )) t→∞ tk →∞ =  lim V2 w(tk ) = V2 (ŵ∗ ) = 0 w(tk )→ŵ∗ Here, the first equality uses the fact that V2 (t) is nonincreasing in t; the second equality uses the fact that tk is the infinite sequence of t; the third equality uses the fact that w(t) is absolutely continuous in t; the fourth equality is due to the upper semi-continuity of V2 (w), and the last equality holds as ŵ∗ is an equilibrium point of V2 . ∗ The quadratic term (w− ŵ∗ )T Γ−2 2 (w− ŵ ) in V2 then implies ∗ that w(t) → ŵ as t → ∞, which completes the proof.
3cs.SY
Cell Detection in Microscopy Images with Deep arXiv:1708.03307v3 [cs.CV] 21 Feb 2018 Convolutional Neural Network and Compressed Sensing Yao Xue and Nilanjan Ray Computing Science, University of Alberta, Canada Abstract The ability to automatically detect certain types of cells or cellular subunits in microscopy images is of significant interest to a wide range of biomedical research and clinical practices. Cell detection methods have evolved from employing hand-crafted features to deep learning-based techniques. The essential idea of these methods is that their cell classifiers or detectors are trained in the pixel space, where the locations of target cells are labeled. In this paper, we seek a different route and propose a convolutional neural network (CNN)-based cell detection method that uses encoding of the output pixel space. For the cell detection problem, the output space is the sparsely labeled pixel locations indicating cell centers. We employ random projections to encode the output space to a compressed vector of fixed dimension. Then, CNN regresses this compressed vector from the input pixels. Furthermore, it is possible to stably recover sparse cell locations on the output pixel space from the predicted compressed vector using L1 -norm optimization. In the past, output space encoding using compressed sensing (CS) has been used in conjunction with linear and non-linear predictors. To the best of our knowledge, this is the first successful use of CNN with CSbased output space encoding. We made substantial experiments on several benchmark datasets, where the proposed CNN + CS framework (referred to as CNNCS) achieved the highest or at least top-3 performance in terms of F1-score, compared with other state-of-the-art methods. Keywords: Cell Detection, Convolutional Neural Network, Compressed Sensing. 1 1 Introduction Automatic cell detection is to find whether there are certain types of cells present in an input image (e.g. microscopy images) and to localize them in the image. It is of significant interest to a wide range of medical imaging tasks and clinical applications. An example is breast cancer, where the tumor proliferation speed (tumor growth) is an important biomarker indicative of breast cancer patients’ prognosis. In practical scenario, the most common method is routinely performed by pathologists, who examine histological slides under a microscope based on their empirical assessments, which could be really accurate in several cases, but generally is slow and prone to fatigue induced errors. Cell detection and localization constitute several challenges that deserves our attention. First, target cells are surrounded by clutters represented by complex histological structures like capillaries, adipocytes, collagen etc. In many cases, the size of the target cell is small, and consequently, it can be difficult to distinguish from the aforementioned clutter. Second, the target cells can appear very sparsely (only in tens), moderately densely (in tens of hundreds) or highly densely (in thousands) in a typical 2000-by-2000 pixel high resolution microscopy image as shown in Fig. 1. Additionally, significant variations in the appearance among the targets can also be seen. These challenges render the cell detection/localization/counting problems far from being solved at the moment, in spite of significant recent progresses in computer vision research. In recent years, object detection has been significantly advanced following the big success by deep learning. However, cell detection or localization task is not simply a sub-task of a general object detection, which typically deals with extended objects, such as humans and vehicles that occupy a significant portion of the field of view in the image. Extended object detection and localization have witnessed much progress in the computer vision community. For example, Region-based Convolutional Neural Networks (R-CNN) [17] and its variants [16], [31], Fully Convolutional Networks (FCN) [34] with recent optimization [30] have become the state-of-the-art algorithms for the extended object detection problem. These solutions cannot be easily translated to cell detection, since assumptions and challenges are different for the latter. For example, for an extended object, localization is considered suc- 2 Figure 1: Left picture shows a microscopy image with two target cells annotated by yellow crosses on their centers. Right top pictures give details about the two target cells whose nuclei are in mitotic phase. Right bottom pictures provide more examples of mitotic figures. cessful if a detection bounding box is 50% overlapping with the actual bounding box. For cell detection, tolerance is typically on a much tighter side in order for the localization to be meaningful. Conventional cell detection approaches In the last few decades, different cell recognition methods had been proposed [15]. Traditional computer vision based cell detection systems adopt classical image processing techniques, such as intensity thresholding, feature detection, morphological filtering, region accumulation, and deformable model fitting. For example, Laplacian-of-Gaussian (LoG) [24] operator was a popular choice for blob detection; Gabor filter or LBP feature [29] offers many interesting texture properties and had been attempted for a cell detection task [3]. Conventional cell detection approaches follow a “hand-crafted feature representation”+“classifier” framework. First, detection system extracts one (or multiple) kind of features as the representation of input images. Image processing techniques offer a range of feature extraction algorithms for selection. After that, machine learning based classifiers work on the feature vectors to identify or recognize regions containing target cells. “Hand-crafted feature representation”+“classifier” approaches suffer from the following limitations: 3 (1) It is a non-trivial and difficult task for humans to select suitable features. In many cases, it requires significant prior knowledge about the target cells and background. (2) Most hand-crafted features contain many parameters that are crucial for the overall performance. Consequently, users need to perform a lot of trial-and-error experiments to tune these parameters. (3) Usually, one particular feature is not versatile enough. The feature may often be tightly coupled with a particular type of target cell and may not work well when presented with a different type of target cell. (4) The performance of a hand-crafted feature-based classifier soon reaches an accuracy plateau, even when trained with plenty of training data. Deep learning based cell detection approaches In comparison to the conventioal cell detection methods, deep neural networks recently has been applied to a variety of computer vision problems, and has achieved better performance on several benchmark vision datasets [25], [17], [34]. The most compelling advantage of deep learning is that it has evolved from fixed feature design strategies towards automated learning of problem-specific features directly from training data [26]. By providing massive amount of training images and problem-specific labels, users do not have to go into the elaborate procedure for the extraction of features. Instead, deep neural network (DNN) is subsequently optimized using a mini-batch gradient descent method over the training data, so that the DNN allows autonomic learning of implicit relationships within the data. For example, shallow layers of DNN focus on learning low-level features (such as edges, lines, dots), while deep layers of DNN form more abstract high-level semantic representations (such as probability maps, or object class labels). With the advent of deep learning in the computer vision community, it is no wonder that the state-of-the-art methods in cell detection are based on deep neural networks. The essential idea behind all these methods is that detectors are trained as a classifier in the image pixel space, either as a pixel lableing [4] or as a region proposal network [8]. Thus, these methods predict the {x, y}-coordinates of cells directly on a 2-D image. Because, target cell locations are sparse in an image, the classifiers in these methods face the class imbalance issue. Moreover, target cells are often only subtly different from other cells. Thus, these 4 methods tend produce significant amount of false positives. Compressed sensing-based output encoding In this work, deviating from past approaches, we introduce output space encoding in the cell detection and localization problem. Our observation is that the output space of cell detection is quite sparse: an automated system only needs to label a small fraction of the total pixels as cell centroid locations. To provide an example, if there are 5000 cells present in an image of size 2000-by-2000 pixels, this fraction is 5000/(2000 ∗ 2000) = 0.00125, signifying that even a dense cell image is still quite sparse in the pixel space. Based on the observation about sparse cell locations within a microscopy image, we are motivated to apply compressed sensing (CS) [12] techniques in the cell detection task. First, a fixed length, compressed vector is formed by randomly projecting the cell locations from the sparse pixel space. Next, a deep CNN is trained to predict the encoded, compressed vector directly from the input pixels (i.e., microscopy image). Then, L1 norm optimization is utilized to recover sparse cell locations. We refer to our proposed cell detection framework as CNNCS (convolutional neural network + compressed sensing). Output space encoding/representation/transformation sometimes yields more accurate predictions in machine learning [11], [36]. In the past, CS-based encoding was used in conjunction with linear and non-linear predictions [19], [23], [21]. We believe, the proposed CNNCS is the first such attempt to solve cell detection and localization that achieved competitive results on benchmark datasets. There are several advantages of using CS-based output encoding for cell detection and localization. First, the compressed output vector is much shorter in length than the original sparse pixel space. So, the memory requirement would be typically smaller and consequently, there would be less risk of overfitting. Next, there are plenty of opportunities to apply ensemble averages to improve generalization. Furthermore, CS-theory dictates that pairwise distances are approximately maintained in the compressed space [12], [13]. Thus, even after output space encoding, the machine learner still targets the original output space in an equivalent distance norm. From earlier research, we also point out a generalization error bound for such systems. Our contribution is summarized below: First, this is the first attempt to combine deep learning with CS-based output encoding 5 to solve cell detection and localization problem. Second, we try to overcome the aforementioned class imbalance issue by converting a classification problem into a regression problem, where sparse cell locations are distributed by a random projection into a fixed length vector as a target for the regression. Third, we introduce redundancies in the CS-based output encoding that are exploited by CNN to boost generalization accuracy in cell detection and localization. This redundancies also help to reduce false detections. Fourth, we demonstrate that the proposed CNNCS framework achieves competitive results compared to the state-of-the-art methods on several benchmark datasets and challenging cell detection contests. 2 Background and Related Work 2.1 General Object Detection Prior to deep learning, general object detection pipeline consisted of feature extraction followed by classifiers or detectors. Detection had traditionally been addressed using the handcrafted features such as SIFT [27], HOG [10], LBP [29], etc. At that time, progress in object detection greatly depended on the invention of more discriminative hand-crafted features. Following the big success of Convolutional Neural Network (CNN) in image classification task [25], deep learning model have been widely adopted in the computer vision community. For example, Region-based Convolutional Neural Networks (R-CNN) [17] and its variants [16], [31], Fully Convolutional Networks (FCN) [34] with recent optimization [30] have become the state-of-the-art algorithms for the extended object detection problems. Once again, cell detection or localization task is not simply a sub-task of a general object detection, those state-of-the-art solutions for general object detection are able to provide useful clues to right direction, but cannot be easily translated to cell detection. 6 2.2 Cell Detection and Localization The state-of-the-art methods in detection and localization today include deep learning techniques for cell detection and localization. Recently a deep Fully Convolutional Network (FCN) [34] was proposed for the image segmentation problem and had shown remarkable performance. Soon after the FCN is proposed, [38] presented a FCN-based framework for cell counting, where their FCN is responsible for predicting a spatial density map of target cells, and the number of cells can be estimated by an integration over the learned density map. Slightly similar to [38], a cascaded network [8] has been proposed for cell detection. [8] uses a FCN for candidate region selection, and then a CNN for further discrimination between target cells and background. In [9], a mitosis detection method has been proposed by CNN-based prediction followed by ad-hoc post processing. As the winner of ICPR 2012 mitosis detection competition, [9] used deep max-pooling convolutional neural networks to detect mitosis in breast histology images. The networks were trained to classify each pixel in the images, using a patch centered on the pixel as context. Then post processing was applied to the network output. In [33], expectation maximization has been utilized within deep learning framework in an end-to-end fashion for mitosis detection. This work presents a new concept for learning from crowds that handle data aggregation directly as part of the learning process of the convolutional neural network (CNN) via additional crowd-sourcing layer. It is the first piece of work where deep learning has been applied to generate a ground-truth labeling from non-expert crowd annotation in a biomedical context. 2.3 Compressed Sensing During the past decade, compressed sensing or compressive sensing (CS) [12] has emerged as a new framework for signal acquisition and reconstruction, and has received growing attention, mainly motivated by the rich theoretical and experimental results as shown in many reports [13], [14], [12], and so on. As we know, the Nyquist-Shannon sampling theorem states that a certain minimum sampling rate is required in order to reconstruct a band-limited signal. However, CS enables a potentially large reduction in the sampling and computation costs for 7 sensing/reconstructing signals that are sparse or have a sparse representation under some linear transformation (e.g. Fourier transform). Under the premise of CS, an unknown signal of interest is observed (sensed) through a limited number of linear observations. Many works [13], [14], [12] have proven that it is possible to obtain a stable reconstruction of the unknown signal from these observations, under the general assumptions that the signal is sparse (or can be represented sparsely with respect to a linear basis) and matrix discoherence. The signal recovery techniques typically rely on a convex optimization with a penalty expressed by L1 norm, for example orthogonal matching pursuit (OMP) [5] and dual augmented Lagrangian (DAL) method [35]. 3 Proposed Method 3.1 System Overview The proposed detection framework consists of three major components: (1) cell location encoding phase using random projection, (2) a CNN based regression model to capture the relationship between a cell microscopy image and the encoded signal y, and (3) decoding phase for recovery and detection. The flow chart of the whole framework is shown in Fig. 2. During training, the ground truth location of cells are indicated by a pixel-wise binary annotation map B. We propose two cell location encoding schemes, which convert cell location from the pixel space representation B to a compressed signal representation y. Then, training pairs, each consisting of a cell microscopy image and the compressed signal y, train a CNN to work as a multi-label regression model. We employ the Euclidean loss function during training, because it is often more suitable for a regression task. Image rotations may be performed on the training sets for the purpose of data augmentation as well as making the system more robust to rotations. During testing, the trained network is responsible for outputting an estimated signal ŷ for each test image. After that, a decoding scheme is designed to estimate the ground truth cell location by performing L1 minimization recovery on the estimated signal ŷ, with the known sensing matrix. 8 Figure 2: The system overview of the proposed CNNCS framework for cell detection and localization. 3.2 3.2.1 Cell Location Encoding and Decoding Scheme Encoding Schemes In the CNNCS framework, we employ two types of random projection-based encodings as described below. Scheme-1: Encoding by Reshaping For the cell detection problem, cells are often annotated by pixel-level labels. The most common way is to attach a dot or cross at the center of every cell, instead of a bounding box around the cell. So, let us suppose there is a pixel-wise binary annotation map B of size w-by-h, which indicates the location of cells by labeling 1 at the pixels of cell centroids, otherwise labeling 0 at background pixels. To vectorize the annotation map B, the most intuitive scheme is to concatenate every row of B into a binary vector f of length wh. Thus, 9 a positive element in B with {x, y} coordinates will be encoded to the [x + h(y − 1)]-th position in f . f is also a k-sparse signal, so, there are at most k non-zero entries in f . Here, we refer this intuitive encoding scheme as ”Scheme-1: Encoding by Reshaping”. After the vector f is generated, we apply a random projection. CS theory guarantees that f could be fully represented by linear observations y: y = Φf, (1) provided the sensing matrix Φ satisfies a restricted isometry property (RIP) condition [13], [14]. In many cases, Φ is typically a M × N (M  N = hw) random Gaussian matrix. Here, the number of observations M is much smaller than N , and obeys: M ≥ CM klog(N ), where CM is a small constant greater than one. Scheme-2: Encoding by Signed Distances For the encoding scheme-1, the space complexity of the interim result f is O(wh). For example, to encode the location of cells in a 260-by-260 pixel image, scheme-1 will produce f as a 67,600-length vector; so that in the subsequent CS process, a huge sensing matrix in size of M -by-67600 is required in order to match the dimension of f , which will make the system quite slow, even unacceptable for larger images. To further optimize the encoding scheme, we propose a second scheme, where the coordinates of every cell centroid are projected onto multiple observation axes. We refer the second encoding scheme as ”Scheme-2: Encoding by Projection.” To encode location of cells, we create a set of observation axes OA = {oal } , l = 1, 2, . . . , L, where L indicates the total number of observation axes used. The observation axes are uniformly-distributed around an image (See Fig. 3, left-most picture) For the l-th observation √ axis oal , the location of cells is encoded into a R-length (R = w2 + h2 ) sparse signal, referred as fl (See Fig. 3, third picture). We calculate the perpendicular signed distances (fl ) from cells to oal . Thus, fl contains signed distances, which not only measure the distance, but also describe on which side of oal cells are located. After that, the encoding of cell locations under oal is yl , which is obtained by the following random projection: yl = Φfl , 10 (2) We repeat the above process for all the L observation axes and obtain each yl . After concatenating all the yl , l = 1, 2, . . . , L, the final encoding result y is available, which is the joint representation of cells location. The whole encoding process is illustrated by Fig. 3. Figure 3: Cell location encoding by signed distances (Scheme-2). √ For encoding scheme-2, the size of the sensing matrix Φ is M -by- w2 + h2 . In comparison, encoding scheme-1 requires a much larger sensing matrix of size M -by-wh. The first advantage of encoding scheme-2 is that it dramatically reduces the size of the sensing matrix, which is quite helpful for the recovery process, especially when the size of images is large. Secondly, the encoding result y carries redundant information about cell locations. In the subsequent decoding phase, averaging over the redundant information makes the final detection more reliable. More details can be found in experiments section. A final point is that in case more than one cell locations are projected to the same bin in a particular observation axis, such a conflict will not occur for the same set of cells at other observation axes. 3.2.2 Decoding Scheme Accurate recovery of f can be obtained from the encoded signal y by solving the following L1 norm convex optimization problem: fˆ = arg min kf k1 f subject to y = Φf (3) After fˆ is recovered, every true cell is localized L times, i.e. with L candidate positions predicted. The redundancy information allows us to estimate more accurate detection of a true cell. 11 The first two images of Fig. 4 from left present examples of the true location signal f and decoded location signal fˆ, respectively. The noisy signed distances of fˆ are typically very close to each observation axis. That is why we create observation axes outside of the image space, so that these noisy distances can be easily distinguished from true candidate distances. This separation is done by mean shift clustering, which also groups true detections into localized groups of detections. Two such groups (clusters) are shown in Fig. 4, where the signed distances formed circular patterns of points (in green) around ground truth detections (in yellow). Averaging over these green points belonging to a cluster provides us a predicted location (in red) as shown in Fig. 4. Figure 4: Cell Location Decoding Scheme. From left to right: true location signal f , decoded location signal fˆ and detection results. Yellow crosses indicate the ground-truth location of cells, green crosses are the candidates points, red crosses represent the final detected points. 3.3 Signal Prediction by Convolutional Neural Network We utilize a CNN to build a regression model between a cell microscopy image and its cell location representation: compressed signal y. We employ two kinds of CNN architectures. One of them is AlexNet [25], which consists of 5 convolution layers + 3 fully connected layers; the other is the deep residual network (ResNet) [18] where we use its 152-layer model. In both the architectures, the loss function is defined as the Euclidean loss. The dimension of output layer of AlexNet and ResNet has been modified to the length of compressed signal y. We train the AlexNet model from scratch, in comparison, we perform fine-tuning on the weights in fully-connected layer of the ResNet. To prepare the training data, we generate a large number of square patches from training 12 Figure 5: An illustration of the process of signal prediction by convolutional neural network. The bottom row presents the feature maps learned from Convolutional (Conv) layers of the CNN with training process going on. The current CNN follows the AlexNet architecture. These feature maps come from the Conv1, Conv1, Conv2, Conv3, Conv3, Conv4 and Conv5 respectively. The top-right picture shows the ground-truth compressed signal (red) and compressed signal (blue) predicted from the Fullly-connected (Fc) layer of the CNN. From the picture, we can observe that the predicted signal approximate the pattern of ground truth signal well. 13 images. Along with each training patch, there is a signal (i.e. the encoding result: y), which indicates the location of target cells present in the patch. After that, patch rotation is performed on the collected training patches for data augmentation and making the system rotation invariant. The trained CNN not only predicts the signal from its output layer, the feature maps learned from its Conv layers also provide rich information for recognition. Fig. 5 visualizes the learned feature maps, which represents the probabilistic score or activation maps of target cell regions (indicated by green boxes in the left image) during training process. It can be observed that higher scores are fired on the target regions of score masks, while most of the non-target regions have been suppressed more and more with training process going on. To further optimize our CNN model, we apply Multi-Task Learning (MTL) [7]. During training a CNN, two kinds of labels are provided. The first kind is the encoded vector: y, which carries the pixel-level location information of cells. The other kind is a scalar: cell count (c), which indicates the total number of cells in a training image patch. We concatenate the two kinds of labels into the final training label by label = {y, λc}, where λ is a hyper parameter. Then, Euclidean loss is applied on the fusion label. Thus, supervision information for both cell detection and cell counting can be jointly used to optimize the parameters of our CNN model. 3.4 Theoretical Justification Equivalent Targets for Optimization We first show that from the optimization standpoint, compressed vector is a good proxy for the original, sparse output space. This result directly follows from the CS theory. As mentioned before, f indicates the cell location represented in pixel space, and y is the cell location represented in compressed signal space. They follow the relationship: y = Φf , where Φ is the sensing matrix. Let us assume that fp and fg are respectively the prediction and ground-truth vectors in the pixel space. Similarly, we have yp and yg as their compressed counterparts, respectively. Claim: kyg − yp k and kfg − fp k are approximately equivalent targets for optimization. 14 Proof: According to the CS theory, a sensing matrix Φ ∈ Rm×d should satisfy the (k, δ) − restricted isometry property ((k, δ) − RIP ), which states that for all k−sparse f ∈ Rd , δ ∈ (0, 1), the following holds [13], [14], [12]: (1 − δ) kf k ≤ kΦf k ≤ (1 + δ) kf k. (4) Note that if the sensing matrix Φ satisfies (2k, δ)-RIP, then (4) also holds good. Now replace f with (fg − fp ) and note that (fg − fp ) is 2k-sparse. Thus, (1 − δ) kfg − fp k ≤ kyg − yp k ≤ (1 + δ) kfg − fp k . (5) From the right hand side inequality, we note that if kfg − fp k is small, then kyg − yp k would be small too. In the same way, if kyg − yp k is large, then the inequality implies that kfg − fp k would be large too. Similarly, from the left hand side inequality, we note that if kfg − fp k is large then kyg − yp k will be large, and if kyg − yp k is small then kfg − fp k will small too. These relationships prove the claim that from the optimization perspective kyg − yp k and kfg − fp k are approximately equivalent. A Bound on Generalization Prediction Error In this section we mention a powerful result from [19]. Let h be the predicted compressed vector by the CNN, f be the ground truth sparse vector, fˆ be the reconstructed sparse vector from prediction, and Φ be the sensing matrix. Then the generalization error bound provided in [19] is as follows: kfˆ − f k22 ≤ C1 · kh − Φf k22 + C2 · sperr(fˆ, f ), (6) where C1 and C2 are two small constants and sperr measures how well the reconstruction algorithm has worked [19]. This result demonstrates that expected error in the original space is bound by the expected errors of the predictor and that of the reconstruction algorithm. Thus, it makes sense to apply a very good machine learner such as deep CNN that can minimize the first term in the right hand side of (6). On the other hand, DAL provides one of the best L1 recovery algorithms to minimize the second term in the right side of (6). 15 4 Experiments 4.1 Datasets and Evaluation Criteria We utilize seven cell datasets, on which CNNCS and other comparison methods are evaluated. The 1st dataset [22] involves 100 H&E stained histology images of colorectal adenocarcinomas. The 2nd dataset [6] consists of 200 highly realistic synthetic emulations of fluorescence microscopic images of bacterial cells. The 3rd dataset [39] comprises of 55 high resolution microscopic images of breast cancers double stained in red (cytokeratin epithelial marker) and brown (nuclear proliferative marker). The 4th dataset is the ICPR 2012 mitosis detection contest dataset [32] including 50 high-resolution (2084-by-2084) RGB microscope slides of Mitosis. The 5th dataset [1] is the ICPR 2014 grand contest of mitosis detection, which is a follow-up and an extension of the ICPR 2012 contest on detection of mitosis. Compared with the contest in 2012, the ICPR 2014 contest is much more challenging, which contains way more images for training and testing. The 6th dataset is the AMIDA-2013 mitosis detection dataset [37], which contains 676 breast cancer histology images belonging to 23 patients. The 7th dataset is the AMIDA-2016 mitosis detection dataset [2], which is an extension of the AMIDA 2013 contest on detection of mitosis. It contains 587 breast cancer histology images belonging to 73 patients for training, and 34 breast cancer histology images for testing with no ground truth available. For each dataset, the annotation that represents the location of cell centroids is shown in Fig.6, details of datasets are summarized in Table. 1. Figure 6: Dataset examples and their annotation. For evaluation, we adopt the criteria of the ICPR 2012 mitosis detection contest [32], which is also adopted in several other cell detection contests. A detection would be counted as true positive (T P ) if the distance between the predicted centroid and ground truth cell 16 Table 1: Size is the image size; Ntr/Nte is the number of images selected for training and testing; AC indicates the average number of cells per image. Cell Dataset Size Ntr/Nte AC Nuclei [22] 500×500 50/50 310.22 Bacterial [6] 256×256 100/100 171.47 Ki67 Cell [39] 1920×2560 45/10 2045.85 ICPR 2012 [32] 2084×2084 35/15 5.31 ICPR 2014 [1] 1539×1376 1136/496 4.41 AMIDA 2013 [37] 2000×2000 447/229 3.54 AMIDA 2016 [2] 2000×2000 587/34 2.13 centroid is less than ρ. Otherwise, a detection is considered as false positives (F P ). The missed ground truth cells are counted as false negatives (F N ). In our experiments, ρ is set to be the radius of the smallest cell in the dataset. Thus, only centroids that are detected to lie inside cells are considered correct. The results are reported in terms of Precision: P = T P/(T P + F P ) and Recall: R = T P/(T P + F N ) and F1 -score: F1 = 2P R/(P + R) in the following sections. 4.2 Experiments with Encoding Scheme-1 To evaluate, we carry out performance comparison experiment between CNNCS and three state-of-the-art cell detection methods (“FCN-based” [38], “Le.detect” [4], “CasNN” [8]). In this experiment, the scheme-1: encoding by reshaping is applied in CNNCS. For the four methods to provide different values of Precision-Recall as shown in Fig. 7, we tune hyper parameters of every method. With scheme-1, CNNCS has a threshold T to apply on the recovered sparse signal fˆ before re-shaping it to a binary image B. T is used to perform cell vs. non-cell binary classification and can be treated as a hyper parameter during training. In “FCN-based” [38], there is also a threshold applied to the local probability-maximum candidate points to make final decision about cell or non-cell. Similarly, in the first step of “Le.detect” [4], researchers use a MSER-detector (a stability threshold involved here) to produce a number of candidate regions, on which their learning 17 procedure determines which of these candidates regions correspond to cells. In the first experiment, we analyze the three methods using Precision-Recall curves by varying their own thresholds. Fig. 7 presents Precision-Recall curves on three cell datasets. All the four methods give reliable detection performances in the range of recall=[0.1-0.4]. After about recall=0.6, the precision of “FCN-based” [38] drops much faster. This can be attributed to the fact that “FCN-based” [38] works by finding local maximum points on a cell density map. However, the local maximum operation fails in several scenarios, for example when two cell density peaks are close to each other, or large peak may covers neighboring small peaks. Consequently, to obtain the same level of recall, “FCN-based” [38] provides many false detections. Figure 7: Precision and recall curves of four methods on three datasets. Furthermore, it also can be observed that CNNCS has an improvement over “Le.detect” 18 [4] (red line clearly outperforms black line under varying recall values). This can be largely explained by the fact that traditional methods (no matter if [4] or [38] is used) always try to predict the coordinates of cells directly on a 2-D image. The coordinates are sensitive to system prediction bias or error, considering the nature of cell detection that cells are small and quite dense in most cases. It is not surprising that “Le.detect” [4] will miss some cells and/or detect other cells in wrong locations. In comparison, CNNCS transfers the cell detection task from pixel space to compressed signal space, where the location information of cells is no longer represented by {x, y}-coordinates. Instead, CNNCS performs cell detection by regression and recovery on a fixed length compressed signal. Compared to {x, y}-coordinates representation, the compressed signal is more robust to system prediction errors. For example, as shown in the right top corner of Fig. 5, even though there are differences between the ground-truth compressed signal and predicted compressed signal, the whole system can still give reliable detection performance as shown in Fig. 7. To get a better idea of the CNNCS method, we visualize a set of cell images with their detected cells and ground-truth cells in Fig. 8. It can be observed that CNNCS is able to accurately detect most cells under a variety of conditions. 4.3 4.3.1 Experiments with Encoding Scheme-2 Experiment on ICPR 2012 mitosis detection dataset To evaluate the performance of encoding scheme 2, we carry out the second group of performance comparison experiments. In the first experiment, we apply the proposed method on the ICPR 2012 mitosis detection contest dataset, which consists of 35 training images and 15 testing images. For the training process, we extracted image sub-samples (260-by-260) with no overlap between each other from the 35 training images. After that every 90◦ image rotation is performed on each sub-sample for data augmentation, resulting in a total of 8,960 training dataset. In addition, we perform random search to tune the three hyper parameters in scheme-2: (1) the number of rows in sensing matrix: M , (2) the number of observation lines: L and (3) the importance (λ) of cell count during MTL. After that, the best performance is achieved when M = 112, L = 27, λ = 0.20. Furthermore, we trained five CNN 19 Figure 8: Detection results. Ground-truth: red, Prediction: blue. Left part shows the ground truth signal and the predicted sparse signal that carries the location information of cells; right part shows the ground-truth and detected cells. models to reduce the performance variance introduced by a single model and to improve the robustness of the whole system. Recently, deep residual network (ResNet) introduces residual connections into deep convolutional networks and has yielded state-of-the-art performance in the 2015 ILSVRC challenge [18]. This raises the question of whether there is any benefit in introducing and exploiting more recent CNN architectures into the cell detection task. Thus, in the experiment, we have explored the performance of CNNCS with different neural network architectures (AlexNet and ResNet). Finally, CNNCS gets the highest F1-score among all the comparison methods, details are summarized in Table 2. Compared to the state-of-the-art method: CasNN-average [8], CNNCS with ResNet and MTL achieved a better performance with F1 -score 0.837. It can be observed from Table 2 that the precision of our method outperforms the previous best precision by 0.06-0.07, and recall also has recorded about 0.02 improvement. This phenomenon can be attributed to the 20 Table 2: Results of ICPR 2012 grand challenge of mitosis detection. Method Precision Recall F1 -score UTRECHT 0.511 0.680 0.584 NEC [28] 0.747 0.590 0.659 IPAL [20] 0.698 0.740 0.718 DNN [9] 0.886 0.700 0.782 RCasNN [8] 0.720 0.713 0.716 CasNN-single [8] 0.738 0.753 0.745 CasNN-average [8] 0.804 0.772 0.788 CNNCS-AlexNet 0.860 0.788 0.823 CNNCS-ResNet 0.867 0.801 0.833 CNNCS-ResNet-MTL 0.872 0.805 0.837 detection principle of our method, where every ground-truth cell is localized with multiple candidate points guaranteed to be around the true location, then the average coordinates of these candidates is computed as the final detection. As a result, localization closer to the true cell becomes more reliable compared to other methods, thus leading to a higher precision. In addition, an improvement of F1 -score from 0.833 to 0.837 achieved by MTL demonstrates that the knowledge jointly learned from cell detection and cell counting provides further benefits at negligible additional computations. 4.3.2 Experiment on ICPR 2014 mitosis detection dataset In the second experiment, we evaluated CNNCS on the ICPR 2014 contest of mitosis detection dataset (also called MITOS-ATYPIA-14), which is a follow-up and an extension of the ICPR 2012 contest on detection of mitosis. Compared with the contest in 2012, the ICPR 2014 contest is much more challenging, which contains more images for training and testing. It provides 1632 breast cancer histology images, 1136 images for training, 496 images for testing. Each image is in the size of 1539×1376. We divide the training images into training set (910 images) and validation set (226 images). We perform random search on the validation set to optimize the hyper parameters. The best performance on MITOS-ATYPIA-14 dataset is achieved when M = 103, L = 30, λ = 0.24. On the test dataset, we have achieved 21 the highest F1-score among all the participated teams. The F1-score of all the participated teams are shown in Table 3. As we see, the CNNCS method shows significant improvement compared to the results of other teams in all the histology slice groups. On an average, CNNCS has almost doubled the F1-score of teams at the second place. Table 3: Results of ICPR 2014 contest of mitosis detection in breast cancer histological images. F1-scores of participated teams are shown. 4.3.3 Slice group CUHK MINES YILDIZ STRAS CNNCS A06 0.119 0.317 0.370 0.160 0.783 A08 0.333 0.171 0.172 0.024 0.463 A09 0.593 0.473 0.280 0.072 0.660 A19 0.368 0.137 0.107 0.011 0.615 Average 0.356 0.235 0.167 0.024 0.633 Experiment on AMIDA 2013 mitosis detection dataset The third experiment was performed on the AMIDA-2013 mitosis detection dataset, which contains 676 breast cancer histology images, belonging to 23 patients. Suspicious breast tissue is annotated by at least two expert pathologists, to label the center of each cancer cell. We train the proposed CNNCS method using 377 images, validate on 70 training images and test it on the testing set of AMIDA-2013 challenge that has 229 images from the last 8 patients. We employ ResNet as the network architecture with data balancing and MTL in the training set. Similar to previous experiments, we perform random search on the validation set to optimize the hyper parameters. The best performance on AMIDA-2013 dataset is achieved when M = 118, L = 25, λ = 0.32. Finally among all the 17 participated teams, we achieve the third highest F1-score=0.471, which is quite close to the second place, and has a significant improvement over the fourth place method [33]. For details, Table 4 summarizes the comparison between CNNCS and other methods. 22 Table 4: Results of AMIDA-2013 MICCAI grand challenge of mitosis detection. 4.3.4 Method Precision Recall F1 -score IDSIA [9] 0.610 0.612 0.611 DTU 0.427 0.555 0.483 AggNet [33] 0.441 0.424 0.433 CUHK 0.690 0.310 0.427 SURREY 0.357 0.332 0.344 ISIK 0.306 0.351 0.327 PANASONIC 0.336 0.310 0.322 CCIPD/MINDLAB 0.353 0.291 0.319 WARWICK 0.171 0.552 0.261 POLYTECH/UCLAN 0.186 0.263 0.218 MINES 0.139 0.490 0.217 SHEFFIELD/SURREY 0.119 0.107 0.113 SEOUL 0.032 0.630 0.061 UNI-JENA 0.007 0.077 0.013 NIH 0.002 0.049 0.003 CNNCS 0.3588 0.5529 0.4352 Experiment on AMIDA 2016 mitosis detection dataset In the fourth experiment, we participated in the AMIDA-2016 mitosis detection challenge (also called TUPAC16), which is a follow-up and an extension of the AMIDA-2013 contest on detection of mitosis. Its training dataset has 587 breast cancer histology images in size of 2000×2000, belonging to 73 patients. Its test dataset contains 34 breast cancer histology images in the same size without publicly available ground truth labels. We train the proposed CNNCS method using randomly chosen 470 training images and validate on the remaining 117 training images. Additionally, we apply the following ensemble averaging technique to further increase precision and recall values. Originally, we have partitioned every test image into about 100 non-overlapping patches. Instead of starting the partitioning from the top-left corner, now we set the starting point of the first patch from {offset, offset}. The offset values are set as 0, 20, 40,..., 160, and 180 (i.e. every 20 pixel) resulting in a total of 10 different settings. Under every offset setting, CNNCS 23 Table 5: Results of AMIDA-2016 MICCAI grand challenge of mitosis detection. Team F1 -score Lunit Inc. 0.652 IBM Research Zurich and Brazil 0.648 Contextvision (SLDESUTO-BOX) 0.616 The Chinese University of Hong Kong 0.601 Microsoft Research Asia 0.596 Radboud UMC 0.541 University of Heidelberg 0.481 University of South Florida 0.440 Pakistan Institute of Engineering and Applied Sciences 0.424 University of Warwick 0.396 Shiraz University of Technology 0.330 Inha University 0.251 CNNCS (on validation set) 0.634 method is run on all the generated patches and provides detection results. Then, we merge detection results from all the offset settings. The merging decision rule is that if there are 6 or more detections within a radius of 9 pixels, then we accept average of these locations as our final detected cell center. Other implementation settings are similar to the settings in the experiment of AMIDA-2013. Finally, we achieved F1-score=0.634 on the validation set (becuase of the lack of publicly available test set), which is the third highest in all the 15 participated teams. Table 5 provides more details of the contest results. Furthermore, Fig.9 provides twelve examples of our detection results in the AMIDA-2016 grand challenge of mitosis detection. 5 Conclusion This is the first attempt demonstrating that deep convolutional neural network can work in conjunction with compressed sensing-based output encoding schemes toward solving a significant medical image processing task: cell detection and localization from microscopy images. In this work, we made substantial experiments on several mainstream datasets and 24 Figure 9: Results on AMIDA-2016 dataset. Yellow cross indicates the ground-truth position of target cells. Green cross indicates cell position predicted by an observation axis. Red cross indicates the final detected cell position, which is the average of all green crosses. challenging cell detection contests, where the proposed CNN + CS framework (referred to as CNNCS) achieved very competitive (the highest or at least top-3 in terms of F1-score) results compared to the state-of-the-art methods in cell detection task. In addition, the CNNCS framework has the potential to be trained in End-to-End manner, which is our near future plan and could further boost performance. 25 References [1] https://mitos-atypia-14.grand-challenge.org/home/. [2] http://tupac.tue-image.nl/. [3] Yousef Al-Kofahi, Wiem Lassoued, William Lee, and Badrinath Roysam. Improved automatic detection and segmentation of cell nuclei in histopathology images. IEEE Transactions on Biomedical Engineering, 57:841–852, 2010. [4] Carlos Arteta, Victor Lempitsky, J. Alison Noble, and Andrew Zisserman. Learning to detect cells using non-overlapping extremal regions. International Conference on Medical Image Computing and Computer-Assisted Intervention (MICCAI), pages 348– 356, 2012. [5] T. Tony Cai and Lie Wang. Orthogonal matching pursuit for sparse signal recovery with noise. IEEE Transactions on Information Theory., 2011. [6] Alison Noble Carlos Arteta, Victor Lempitsky and Andrew Zisserman. Learning to count objects in images. Neural Information Processing Systems., 2010. [7] Rich Caruana. Multitask learning. Machine Learning, 28(1):41–75, Jul 1997. [8] Hao Chen, Qi Dou, Xi Wang, Jing Qin, and Pheng-Ann Heng. Mitosis detection in breast cancer histology images via deep cascaded networks. Proceedings of the Thirtieth Conference on Artificial Intelligence (AAAI), 2016. [9] Dan C. Cirean, Alessandro Giusti, Luca M. Gambardella, and Jrgen Schmidhuber. Mitosis Detection in Breast Cancer Histology Images with Deep Neural Networks. 2013. [10] Navneet Dalal and Bill Triggs. Histograms of oriented gradients for human detection. Computer Vision and Pattern Recognition, 2005. [11] T. G. Dietterich and G. Bakiri. Solving multiclass learning problems via error-correcting output codes. Journal of Artificial Intelligence Research, pages 263–286, 1995. 26 [12] David L. Donoho. Compressed sensing. IEEE Transactions on Information Theory, 2006. [13] Justin Romberg Emmanuel Candes. Practical signal recovery from random projections. IEEE Transactions on Signal Process, 2005. [14] Terence Tao Emmanuel Candesy, Justin Rombergy. Robust uncertainty principles: Exact signal reconstruction from highly incomplete frequency information. IEEE Transactions on Information Theory., 2006. [15] Meijering Erik. Cell segmentation: 50 years down the road [life sciences]. IEEE Signal Process. Mag., 2012. [16] Ross Girshick. Fast r-cnn. International Conference on Computer Vision, 2015. [17] Ross Girshick, Jeff Donahue, Trevor Darrell, and Jitendra Malik. Rich feature hierarchies for accurate object detection and semantic segmentation. Computer Vision and Pattern Recognition, 2014. [18] Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Deep residual learning for image recognition. Computer Vision and Pattern Recognition., 2015. [19] Daniel Hsu, Sham M. Kakade, John Langford, and Tong Zhang. Multi-label prediction via compressed sensing. arXiv:0902.1284v2 [cs.LG], 2009. [20] Humayun Irshad. Automated mitosis detection in histopathology using morphological and multi-channel statistics features. Journal of Pathology Informatics, 2013. [21] Arnaud Joly. Exploiting random projections and sparsity with random forests and gradient boosting methods. arXiv:1704.08067, 2016. [22] Y.W Tsang I.A. Cree D.R.J. Snead K. Sirinukunwattana, S.E.A. Raza and N.M. Rajpoot. Locality sensitive deep learning for detection and classification of nuclei in routine colon cancer histology images. IEEE Transactions on Medical Imaging., 2016. [23] Ashish Kapoor, Raajay Viswanathan, and Prateek Jain. Multilabel classification using bayesian compressed sensing. Advances in Neural Information Processing Systems, 2012. 27 [24] Hui Kong, Hatice Cinar Akakin, and Sanjay E. Sarma. A generalized laplacian of gaussian filter for blob detection and its applications. IEEE Transactions on Cybernetics, 43:1719–1733, 2013. [25] Alex Krizhevsky, Ilya Sutskever, and Geoffrey E. Hinton. Imagenet classication with deep convolutional neural networks. Neural Information Processing Systems, 2012. [26] Yann LeCun, Yoshua Bengio, and Geoffrey Hinton. Deep learning. Nature, 521:436–444, 2015. [27] David G. Lowe. Object recognition from local scale-invariant features. In Proceedings of the International Conference on Computer Vision-Volume 2 - Volume 2, ICCV ’99, pages 1150–, Washington, DC, USA, 1999. IEEE Computer Society. [28] Christopher D. Malon and Eric Cosatto. Classification of mitotic figures with convolutional neural networks and seeded blob features. Journal of Pathology Informatics, 2013. [29] T. Ojala, M. Pietikinen, and D. Harwood. A comparative study of texture measures with classification based on feature distributions. Pattern Recognition, 29:51–59, 1996. [30] Joseph Redmon and Ali Farhadi. Yolo9000: Better, faster, stronger. arXiv preprint arXiv:1612.08242, 2016. [31] Shaoqing Ren, Kaiming He, Ross Girshick, and Jian Sun. Faster R-CNN: Towards realtime object detection with region proposal networks. Advances in Neural Information Processing Systems, 2015. [32] Ludovic Roux, Daniel Racoceanu, N. Loménie, Maria S. Kulikova, Humayun Irshad, J. Klossa, Frédérique Capron, Catherine Genestie, Gilles Le Naour, and Metin N. Gurcan. Mitosis detection in breast cancer histological images, an icpr 2012 contest. Journal of Pathology Informatics, 4, 05/2013 2013. [33] Albarqouni Shadi, Baur Christoph, Achilles Felix, Belagiannis Vasileios, Demirci Stefanie, and Navab Nassir. Aggnet: Deep learning from crowds for mitosis detection in breast cancer histology images. IEEE Transactions on Medical Imaging., 2016. 28 [34] Evan Shelhamer, Jonathan Long, and Trevor Darrell. Fully convolutional models for semantic segmentation. The IEEE Transactions on Pattern Analysis and Machine Intelligence, 2016. [35] Ryota Tomioka, Taiji Suzuki, and Masashi Sugiyama. Super-linear convergence of dual augmented lagrangian algorithm for sparsity regularized estimation. The Journal of Machine Learning Research, 2011. [36] Grigorios Tsoumakas, Ioannis Katakis, and Ioannis Vlahavas. Random k-labelsets for multi-label classification. IEEE Transactions on Knowledge and Data Engineering, pages 1079–1089, 2011. [37] Mitko Veta, Paul J van Diest, Stefan M Willems, Haibo Wang, Anant Madabhushi, Angel Cruz-Roa, Fabio Gonzalez, Anders B L Larsen, Jacob S Vestergaard, Anders B Dahl, Dan C Cireşan, Jürgen Schmidhuber, Alessandro Giusti, Luca M Gambardella, F Boray Tek, Thomas Walter, Ching-Wei Wang, Satoshi Kondo, Bogdan J Matuszewski, Frederic Precioso, Violet Snell, Josef Kittler, Teofilo E de Campos, Adnan M Khan, Nasir M Rajpoot, Evdokia Arkoumani, Miangela M Lacle, Max A Viergever, and Josien P W Pluim. Assessment of algorithms for mitosis detection in breast cancer histopathology images. Medical image analysis, 20:237–48, 02/2015 2015. [38] Weidi Xie, J. Alison Noble, and Andrew Zisserman. Microscopy cell counting with fully convolutional regression networks. Deep Learning Workshop in MICCAI, 2015. [39] Yao Xue, Nilanjan Ray, Judith Hugh, and Gilbert Bigras. Cell counting by regression using convolutional neural network. ECCV 2016 workshop on BioImage Computing, 2016. 29
1cs.CV
A NONAMENABLE TYPE F∞ GROUP OF PIECEWISE PROJECTIVE HOMEOMORPHISMS. arXiv:1408.3127v4 [math.GR] 21 May 2017 YASH LODHA Abstract. We prove that the group of homeomorphisms of the circle introduced by the author in joint work with Justin Moore (Groups, Geometry and Dynamics 2015) is of type F∞ . This provides the first example of a type F∞ group which is nonamenable and does not contain non abelian free subgroups. To prove our result we provide a certain generalisation of cube complexes, which we refer to as cluster complexes. We also obtain a normal form, or a canonical unique choice of words for the elements of the group. Contents 1. Introduction 2 2. Proof Strategy 3 3. Preliminaries 4 3.1. Finiteness properties of groups. 4 3.2. Nonpositively curved cube complexes 5 3.3. Coset graphs 5 3.4. Hyperplane arrangements and the face complex 6 3.5. Binary sequences and the group F 6 3.6. The group G 7 4. Cluster complexes 11 5. Normal Forms 13 5.1. Step 1 of the procedure 14 5.2. Step 2 of the procedure 16 6. The 1-skeleton of X 18 6.1. The actions of F on Ω and X (1) 22 6.2. A detour on expansion moves and the expansion Lemmas 25 7. The complex X 28 7.1. Descriptions of graphs in H and the G-action. 29 7.2. H is closed under intersection 30 Date: January 30, 2018. 2010 Mathematics Subject Classification. Primary: 43A07; Secondary: 20F05. Key words and phrases. finiteness properties, amenable, finitely presented, free group, piecewise, projective, Thompson’s group, torsion free. This research was supported in part by NSF grant DMS–1262019 at Cornell University and an EPFL-Marie Curie postdoctoral fellowship. 1 2 YASH LODHA 7.3. Graphs in H as 1-skeletons of clusters 33 7.4. Higher dimensional cells in X 35 8. The action of G on X 36 8.1. Stabilisers of cells 36 8.2. The quotient X/G 39 9. X is simply connected. 39 10. X is aspherical 42 10.1. The parallel equivalence relation on the 1-cells of X 42 10.2. Orthogonal 1-clusters 45 10.3. Amplification of pre-clusters 46 10.4. Weakly balanced systems of pre-clusters 50 10.5. Balanced systems of clusters 54 10.6. Balanced systems and nonpositive curvature 58 10.7. Proof of asphericity 60 11. A question 60 References 61 1. Introduction The von Neumann-Day problem asks whether every nonamenable group contains nonabelian free subgroups (see [21] and [11]). In 1980, Ol’shanskii solved the von Neumann-Day problem by producing a counterexample [19]. Soon after, Adyan showed that certain Burnside groups are also counterexamples [2, 3]. Ol’shanskii and Sapir constructed the first finitely presented counterexample in 2003 [20]. In [18] Monod produced a remarkable family of counterexamples. In particular he showed that the group of piecewise PSL2 (R) homeomorphisms of RP1 that fix infinity is nonamenable and does not contain nonabelian free subgroups. However, Monod’s examples are not finitely presentable. In [16] we constructed a finitely presentable nonamenable subgroup of Monod’s group with 3 generators and 9 relations. This group denoted by G is generated by a(t) = t + 1 together with the following two homeomorphisms of R:  t if t ≤ 0   (   t 1 2t if 0 ≤ t ≤ if 0 ≤ t ≤ 1 2 b(t) = 1−t 1 c(t) = 1+t 1  3 − if ≤ t ≤ 1 t otherwise  t 2   t+1 if 1 ≤ t The finiteness properties type Fn are natural topological generalisations of the properties of finite generation and finite presentability. A group is said to be of type F∞ if it is of type Fn for all n, or equivalently if it is the fundamental group of a connected, aspherical CW complex with finitely many cells in every dimension. The study of counterexamples to the von Neumann-Day problem has an interesting historical connection with finiteness properties of groups. In the 1970s Thompson discovered a remarkable finitely presented group, which is now known as Thompson’s group F . The elements a, b from above generate a copy of F acting on the real line by piecewise projective homeomorphisms. In 1979 Geoghegan made the following conjectures about F (See [13].) A NONAMENABLE TYPE F∞ GROUP (1) (2) (3) (4) 3 F has type F∞ . F has no nonabelian free subgroups. F is nonamenable. All homotopy groups of F at infinity are trivial. Conjectures (1) and (4) were proved by Brown and Geoghegan [7]. Conjecture (2) was proved by Brin and Squier [8]. The status of (3) still remains open. There is considerable interest in Conjecture (3) especially because if F is nonamenable it would be an elegant counterexample to the von Neumann-Day problem. It is natural to inquire about the higher finiteness properties satisfied by the group G, especially in light of Geoghegan’s conjectures about Thompson’s group F . In this article we establish that G is of type F∞ . This makes the group G the first type F∞ group which is nonamenable, and does not contain nonabelian free subgroups. More particularly, we prove the following. Theorem 1.1. The group G acts on a connected cell complex X by cell permuting homeomorphisms such that the following holds. (1) X is contractible. (2) The quotient X/G has finitely many cells in each dimension. (3) The stabilizer of each cell is of type F∞ . It follows that the group G is of type F∞ . Our complex X is a special type of CW complex built out of CW subdivisions of Euclidean cubes. Although there is no natural metric on such a complex, notions of metric and curvature shall play an essential role in proving that the complex is contractible. Finally, we remark that it is observed in [23] that all homotopy groups of G at infinity are trivial. So G satisfies all four statements of Geoghegan’s conjecture for Thompson’s group F , and is the first such example. 2. Proof Strategy In this section we provide an outline of the proof. Our complex X is a special type of CW complex, which we call a complex of clusters. A cluster is a certain CW subdivision of a cube. An n-cluster is a CW subdivision of an n dimensional cube [0, 1]n , which is obtained by considering the intersection pattern with [0, 1]n ⊂ Rn of a family of hyperplanes of Rn . We give a precise definition of clusters in Section 4. For instance, a 2-cluster can be a square, or a square with a diagonal 1-cell, and two triangular 2-cells that fill it. The latter cluster is obtained from the intersection pattern of [0, 1]2 with the hyperplane x = y in R2 . A sub-cluster of the latter 2-cluster is either a 0-cell, or one of the five 1-cells (including the diagonal 1-cell). To describe a complex of clusters, we draw an analogy with cube complexes. A cube complex is a CW complex obtained by gluing cubes along their faces, i.e. gluing along facial “sub-cubes”. A complex of clusters is a CW complex obtained by gluing clusters along sub-clusters. The key difference is that in a cluster complex, sub-clusters could be placed diagonally in a cluster. For instance, we can take two 2-clusters described in the previous paragraph, and glue along the diagonal 1-cells. This way we obtain a complex with four triangular 2-cells, or four triangles all glued along one edge. To give the reader a more concrete idea of what our complex X looks like, we give a brief description of X. A detailed description will appear in Sections 6 and 7. The 0-skeleton X (0) is defined as the set of right cosets of F in G, on which G acts on the right. Two cosets F τ1 , F τ2 are connected by an edge in X (1) if the double coset F τ1 τ2−1 F is one of four distinguished double cosets. It is then immediate from the definition that G acts on X (1) in a way that preserves the edge relation, since F τ1 g(τ2 g)−1 F = F τ1 τ2−1 F . In order to describe the cluster complex structure on X, we identify an infinite family H of finite, connected subgraphs of X (1) , whose elements are in a natural way 1-skeletons of clusters. We demonstrate that H 4 YASH LODHA is closed under finite intersections, i.e. the intersection of a finite number of graphs in H is also a graph in H if it is non empty. Then we “fill” the 1-skeleton of each graph in H by adding higher cells to obtain a cluster. We demonstrate that these fillings are “compatible”, i.e. given two graphs Γ1 , Γ2 ∈ H and their respective fillings, the filling of the intersection Γ1 ∩ Γ2 agrees with the induced fillings obtained from the restrictions of Γ1 , Γ2 respectively. Moreover, we demonstrate that this filling is G-equivariant. The union of X (1) together with the fillings of graphs in H will define our complex of clusters X. The structure of the paper is as follows. In Section 4 we define the notion of a cluster, and a cluster complex. In Section 5 we construct a normal form for elements of G. This normal form will play a small but essential role in the rest of the paper, but is of independent interest since it can be a useful tool to study the group. In Section 6 we define X (1) and study the action of G on X (1) . In Section 6, we shall also prove the expansion lemmas, which shall be needed later in the paper, in particular during the proof of asphericity of X. However, we prove these Lemmas here since their proofs shall emerge naturally from the ideas in section 6. In Section 7, we define H and the higher cells of X In Section 8 we prove that X/G has finitely many cells in every dimension, and that StabG (e) for each cell e is a group of type F∞ . In fact, we demonstrate that the stabiliser of a cell is a product of HigmanThompson groups. In Section 9 we prove that X is simply connected, and in Section 10 we prove that X is aspherical. Then we conclude that X is contractible. At the end of the article we state a question, suggested to the author by Gromov, that could provide an interesting direction for further research. A complex of clusters in general does not admit a natural piecewise Euclidean metric. For instance, one cannot simply declare all the 1-cells to be isometric to [0, 1], since each 1-cell in our complex will occur as a diagonal 1-cell of clusters of any given dimension. However, our proof that the complex is aspherical shall involve notions of metric and curvature. More particularly, we demonstrate that every finite subcomplex Y of X is contained in a sub complex Y of X such that Y is homeomorphic to a non positively curved cube complex. 3. Preliminaries In this section we will review some terminology needed later in the paper. Readers may wish to skim or skip the material and refer back to it only as necessary. In this article, all actions shall be right actions. However, when we make use of function notation we shall differ from this convention, i.e. for instance we shall write x · f g = g(f (x)). 3.1. Finiteness properties of groups. The classical finiteness properties of groups are that of being finitely generated and finitely presented. These notions were generalized by C.T.C. Wall [22]. In this paper we are concerned with the properties type Fn . These properties are quasi-isometry invariants of groups [1]. In order to discuss these properties first we need to define Eilenberg-Maclane complexes. An Eilenberg-Maclane complex for a group G, or a K(G, 1), is a connected CW-complex X such that e is contractible. It is a fact that for any group G, there is an Eilenberg-Maclane π1 (X) = G and X complex X which is unique up to homotopy type. A group is said to be of type Fn if it admits an Eilenberg-Maclane complex with a finite n-skeleton. Clearly, a group is finitely generated if and only if it is of type F1 , and finitely presented if and only if it is of type F2 . (For more details see [12].) A group is said to be of type F∞ if it is of type Fn for all n ∈ N. Equivalently, a group is of type F∞ if it admits a K(G, 1) with finitely many cells in each dimension. The following is a special case of a well known result (See Proposition 1.1 in [6]. Note that the property discussed there is type FP∞ , but since for the class of finitely presentable groups type FP∞ and type F∞ are the same, we state this proposition in terms of type F∞ ). Proposition 3.1. Let Γ be a finitely presentable group that acts on a cell complex X by cell permuting homeomorphisms such that the following holds: A NONAMENABLE TYPE F∞ GROUP 5 (1) X is contractible. (2) The quotient X/Γ has finitely many cells in each dimension. (3) The stabilizers of each cell are of type F∞ . Then Γ is of type F∞ . 3.2. Nonpositively curved cube complexes. Although the complex we construct in this article is not a cube complex, cube complexes will play an important role in the proof of contractibility of our complex. By a regular n-cube n we mean a cube which is isometric to the cube [0, 1]n in Rn . A cube complex is a cell complex of regular Euclidean cubes glued along their faces by homeomorphisms. The metric on such cube complexes is the piecewise Euclidean metric. (see [9] for details). Given a vertex v of a regular cube n , the link Lk(v, n ) is the set of unit tangent vectors at v that point in n . This is a subset of the unit sphere S n−1 which is homeomorphic to a simplex of dimension n − 1. This admits a natural spherical metric, in which the dihedral angles are right angles. Now let v be a 0-cell in a cube complex X and let S S = {C | C is a cube in X that contains v as a vertex } The link Lk(v, X) = C∈S Lk(v, C). This is a complex of spherical “all right” simplices glued along their faces by isometries. This admits a natural piecewise spherical metric. (see [9] for details). A simplicial complex Z is called a “flag” complex if any set v1 , ..., vn of vertices of Z that are pairwise connected by an edge span a simplex. This is also known as the “no empty triangles” condition. Now we are ready to state the main definition. Definition 3.2. A cube complex X is said to be nonpositively curved if the link of each vertex is a flag complex. For basic results concerning these spaces, we refer the reader to [9]. We shall only use the fact that nonpositively curved cube complexes are aspherical, which is a corollary of the following theorem of Gromov. Theorem 3.3. (Gromov) A cube complex X is CAT(0) if and only if it is nonpositively curved and simply connected. This means that the universal cover of a nonpositively curved cube complex is CAT (0), and hence contractible. So we have the following. Corollary 3.4. Nonpositively curved cube complexes are aspherical. 3.3. Coset graphs. We shall use the notion of a coset graph. We remark that this notion may not be familiar to a group theorist, although it is more likely familiar to a graph theorist. This is a natural generalisation of Cayley graphs. Let G be a group and H be a subgroup of G. Let S be a finite set of elements of G such that: (1) S ⊆ G \ H. (2) For each s ∈ S we have s−1 ∈ S. (3) S ∪ H generates G. Then we can form the so called coset graph Cos(G, H, S) as follows. The vertices of Cos(G, H, S) are the right cosets of H in G, and two cosets Hg1 , Hg2 are connected by an edge if [ g1 g2−1 ∈ H(S)H = HsH s∈S Here HsH = {h1 sh2 | h1 , h2 ∈ H} 6 YASH LODHA is a double coset. The group G acts on the graph Cos(G, H, S) on the right, and this T action is vertex transitive. Moreover the action of G on this graph is faithful if and only if the core g∈G g −1 Hg is trivial. By the following theorem (see Theorem 3.8 in [17]), in fact every vertex transitive graph, i.e. a graph whose group of automorphisms is vertex transitive, can be described in this way. Theorem 3.5. [17] Let Ω be some vertex transitive graph. Then Ω is isomorphic to some coset graph Cos(G, H, S). The 1-skeleton of our complex X will emerge as a vertex transitive graph in this way. 3.4. Hyperplane arrangements and the face complex. Consider Rn endowed with the usual orthonormal basis, and with variables x1 , ..., xn representing coordinates in this basis. An affine hyperplane is an (n − 1)-dimensional subspace comprising of solutions of an equation of the form a1 x1 + ... + an xn = an+1 where ai ∈ R. The hyperplane itself is denoted as the set {a1 x1 + ... + an xn = an+1 } A finite hyperplane arrangement A is a finite set of affine hyperplanes in Rn . A region of A is a connected S n component of R \ H∈A H. Let R(A) denote the set of regions of A. It is an elementary exercise to prove that every region is open, convex and thus homeomorphic to the interior of an n-dimensional ball. The set of flats of the arrangement are the affine subspaces of Rn obtained by taking an intersection of hyperplanes in A. The trivial intersection is also a flat, which equals Rn . Given a flat T , we denote the hyperplane arrangement A ↾ T consisting of the set of hyperplanes {T ∩ H | H ∈ A, T 6⊆ H} in the subspace T . We define S the regions of T in a similar way as above, i.e. R(A) ↾ T equals the set of connected components of T \ H∈A↾T H. The union of the sets of regions [ R(A) ↾ T T is a flat of A is called the face complex of the arrangement A. The face complex provides a cellular structure on S Rn ∂Rn = Bn . 3.5. Binary sequences and the group F . We will take N to include 0. Let 2N denote the collection of all infinite binary sequences and let 2<N denote the collection of all finite binary sequences. For s ∈ 2<N , s(i) denotes the i’th digit of s. If i ∈ N and u is a binary sequence of length at least i, we will let u ↾ i denote the initial part of u of length i. We denote by |s| the length of s, which is the number of digits in s. If s and t are finite binary sequences, then we will write s ⊆ t if s is an initial segment of t and s ⊂ t if s is a proper initial segment of t. If neither s ⊆ t nor t ⊆ s, then we will say that s and t are independent. A list of finite binary sequences s1 , ..., sn is said to be independent, if they are pairwise independent. The set 2<N is equipped with an order defined by s < t if t ⊂ s or s and t are independent and s(i) < t(i) where i is the smallest number such that s(i) 6= t(i). If u, s1 , ..., sn ∈ 2<N , we say that u dominates s1 , ..., sn if for each 1 ≤ i ≤ n, either si , u are incompatible or si ⊂ u. The finite binary sequences s, t are said to be consecutive if there is a binary sequence u and numbers n1 , n2 ∈ N such that s = u01n1 and t = u10n2 . A list of finite binary sequences s1 , ..., sn is said to be consecutive if each pair si , si+1 is consecutive for 1 ≤ i ≤ n − 1. Note that if s1 , ..., sn are consecutive then they are automatically independent. A NONAMENABLE TYPE F∞ GROUP 7 If ξ and η are infinite binary sequences, then we will say that ξ and η are tail equivalent if there are s, t, and ζ such that ξ = sζ and η = tζ. We use 0∞ , 1∞ to denote the constant infinite sequences 000.... and 111... respectively. More generally, given a finite binary sequence s, s∞ denotes the sequence sss..... We denote by T the collection of all finite rooted binary trees. A tree T in T will be denoted by a set of finite binary sequences s1 , ..., sn which are the addresses of leaves in T . The indices are ordered so that if i < j then si < sj . We view elements T of T as prefix sets. So we view T as a set of finite binary sequences with the property that every infinite binary sequence has a unique initial segment in T . A tree diagram is a pair (L, R) of elements of T with the property that |L| = |R|. A tree diagram describes a map of infinite binary sequences as follows: si ξ 7→ ti ξ where si and ti are the ith elements of L and R, respectively, in the order as defined above and ξ is any binary sequence. The collection of all such functions from 2N to 2N defined in this way, under the operation of composition, is Thompson’s group F . The function associated to a tree diagram is also defined on any finite binary sequence u such that u has a prefix in L. So the group F admits a partial action on 2<N . Given f ∈ F and s ∈ 2<N , we say that f acts on s if f (s) is defined. Similarly, given s1 , ..., sn ∈ 2<N we say that f acts on s1 , ..., sn if f (s1 ), ..., f (sn ) are all defined. We direct the reader to the standard reference [4] for the definition and properties of Thompson’s group F ; additional information can be found in [10]. We shall mostly follow the notation and conventions of [16]. 3.6. The group G. To prove that the group G is of type F∞ , the action of the group on the real line by piecewise projective homeomorphisms does not appear to be useful. In [16] we describe a combinatorial model for G by means of a faithful action of G by homeomorphisms of the cantor set 2N . This model was used to prove that G is finitely presentable. This combinatorial model will be used throughout this paper, and we shall not refer to the functions a, b, c : R → R which were defined in the introduction. We recall the combinatorial description.   if ξ 0η x(ξ) = 10η if ξ   11η if ξ We start with the following two primitive functions:   = 00η if ξ = 00η 0y(η) y(ξ) = 10y −1 (η) if ξ = 01η = 01η   = 1η 11y(η) if ξ = 1η From these functions, we define families of functions xs (s ∈ 2<N ) and ys (s ∈ 2<N ) which act just as x and y, but localised to those binary sequences which extend s. ( ( sx(η) if ξ = sη sy(η) if ξ = sη xs (ξ) = ys (ξ) = ξ otherwise ξ otherwise If s is the empty-string, it will be omitted as a subscript. Let S = {xt , ys | s, t ∈ 2<N , s 6= 0k , s 6= 1k , s 6= ∅} Our group is generated by functions in the set S. In fact, G is generated by x, x1 , y10 which correspond respectively to the functions a, b, c that were defined in the introduction. The infinite generating set S is much more desirable for the purpose of our proofs and will be used throughout this article. We now list an infinite set of relations R satisfied by the generators in S. (1) (2) (3) (4) (5) If xs (t) is defined, then xt xs = xs xxs (t) x2s = xs0 xs xs1 . If xs (t) is defined, then yt xs = xs yxs (t) . if s and t are independent, then ys yt = yt ys . −1 ys = xs ys0 ys10 ys11 . Note that in the above there is no occurrence of the functions ys± where s = 1k , s = ∅ or s = 0k . We proved in [16] that: 8 YASH LODHA Theorem 3.6. The group G ∼ = hS | Ri is finitely presented, nonamenable, and does not contain nonabelian free subgroups. The generators {xs | s ∈ 2<N } together with the relations (1) If xs (t) is defined, then xt xs = xs xxs (t) . (2) x2s = xs0 xs xs1 describe an infinite presentation for Thompson’s group F . Recall that in [10] −1 −1 {x−1 , x−1 1 , x11 , x111 , ...} ⊆ X is used as the infinite generating set for F . We now recall the normal form for Thompson’s group F in this generating set (See Corollary-Definition 2.7 in [10]). We rephrase the normal form to suit our conventions, which differ from those used in [10]. We shall refer to this normal form as the F -normal form. Theorem 3.7. Every non-trivial element of F can be expressed in unique normal form: −bn an a1 a0 1 −b2 x−b0 x−b 1 x12 ...x1n x1n ...x1 x such that: (1) a0 , ..., an and b0 , ..., bn are nonnegative numbers. (2) Exactly one of an , bn is nonzero. (3) If for some 0 ≤ k ≤ n − 1 it is true that ak , bk > 0, then ak+1 > 0 or bk+1 > 0. Furthermore, every such normal form word is nontrivial in F . Now we recall from [16] the following definitions. Definition 3.8. An X-word is a word in the letters {xts | s ∈ 2<N , t ∈ Z} A Y -word is a word in the letters {yst | s ∈ 2<N , s 6= 0k , s 6= 1k , s 6= ∅, t ∈ Z} An S-word is a word in the generators {yst , xvu | s, u ∈ 2<N , s 6= 0k , s 6= 1k , s 6= ∅, and t, v ∈ Z} The elements of the set {yst | s ∈ 2<N , s 6= 0k , s 6= 1k , s 6= ∅, t ∈ Z} are called percolating elements. Definition 3.9. An S-word f yst11 ...ystnn is in standard form if it is the concatenation of an X-word f followed by a Y -word yst11 ...ystnn with the property that si < sj if i < j. We will write standard form to mean an S-word in standard form. It is convenient to denote a standard form as f λ, where f is an X-word and λ is a Y -word in standard form. We will mostly use the convention of denoting X-words by letters f, g, h, often with subscripts, and Y -words in standard form with either greek letters, or explicitly as yst11 ...ystnn . The depth of f yst11 ...ystnn equals inf {|si | | 1 ≤ i ≤ n}. We use the convention that standard forms that are X-words have infinite depth. The following Lemma was proved in [16]. Lemma 3.10. If Ω is any S-word and l ∈ N, then Ω can be converted into a standard form f λ using the relations, so that f λ has depth at least l. A NONAMENABLE TYPE F∞ GROUP 9 We also define a slightly weaker notion than a standard form, which will be useful in phrasing our arguments. Definition 3.11. An S-word f yst11 ...ystnn is in standard form upto commutation if it is the concatenation of an X-word f followed by a Y -word yst11 ...ystnn with the property that if sj ⊂ si then i < j. Note that this notion is slightly weaker than the standard form. For instance y100 y101 is in standard form but not y101 y100 , although the latter is in standard form upto commutation. The definition implies the following elementary fact. Lemma 3.12. A standard form upto commutation can be converted into a standard form by the application of a finite sequence of commuting relations, which are relations (4) of R. Definition 3.13. Associated with a standard form (or a standard form up to commutation) f yst11 ...ystnn and a sequence σ ∈ 2ω is the notion of a calculation. This is an infinite string in letters y, y −1 , 0, 1. The evaluation of f yst11 ...ystnn on σ comprises of a prefix replacement that is determined by the transformation f ∈ F followed by an infinite sequence of applications of the transformations described by the percolating elements. The latter is encoded as an infinite string with letters y, y −1 , 0, 1 and denoted as the calculation of yst11 ...ystnn on f (σ). The calculation is equipped with the following substitutions: y00 → 0y −1 −1 y01 → 10y −1 y1 → 11y −1 y 0 → 00y y 10 → 01y y −1 11 → 1y −1 −1 For example, for the word y100 y10 and the binary sequence 1001111... the calculation string is 10y0y −11111.... The output of the evaluation of the word on the binary string is the limit of the strings obtained from performing these substitutions. In this way, we define the calculation of a standard form (up to commutation) yst11 ...ystnn on an infinite binary sequence σ. The calculation of a standard form (up to commutation) f yst11 ...ystnn on an infinite binary sequence σ is defined to be the calculation of yst11 ...ystnn on f (σ). The set of all such strings will be denoted as {0, 1, y, y −1}N . A calculation is an element of this set with the property that there are only finitely many occurrences of y ± . A calculation has a potential cancellation if upon performing a finite set of substitutions we encounter a substring of the form yy −1 or y −1 y. When a calculation has no potential cancellations, we say that it has exponent n if n is the number of occurrences of the symbols y ± . Note that there is no potential cancellation in the example above, and the exponent is 2. The following was proved in [16]. (Lemma 5.9.) Lemma 3.14. Suppose that Λ is in {0, 1, y, y −1}N and contains no potential cancellations. Then advancing any occurrence of a y ± results in a word with no potential cancellations. It is also natural to consider finite strings in letters y, y −1 , 0, 1, equipped with the same substitutions as above. Of course, for such strings one may not be able to advance the rightmost occurrence of y ±1 . However, such strings will be useful to consider in the following context. Let f yst11 ...ystnn be a standard form and let u be a finite binary sequence such that f acts on u and f (u) dominates s1 , ..., sn . Given any infinite binary sequence ψ, we know that f (uψ) = f (u)ψ. Also, the calculation of f yst11 ...ystnn on uψ, which equals the calculation of yst11 ...ystnn on f (u)ψ, contains a tail ψ. Upon deleting this tail from this calculation, we obtain a calculation of f yst11 ...ystnn on u. Note that the choice of the sequence ψ does not affect the definition of this calculation. We denote the set of all such strings as {0, 1, y, y −1}<N . The following lemma was proved in [16] (Lemma 5.10.) Lemma 3.15. Suppose that Λ is in {0, 1, y, y −1}<N and contains no potential cancellations, and contains n occurrences of y ± . Then there is a finite binary sequence u such that the following holds. We can perform a sequence of substitutions on the calculation Λu to obtain a calculation of the form vy n , where v is a finite binary sequence. We now describe a family of basic operations involving standard forms. Notice that each of these substitutions corresponds either to a relation in R or to a group-theoretic identity. 10 YASH LODHA Definition 3.16. We will say that an S-word Ω1 is derived from an S-word Ω0 , written symbolically as Ω0 → Ω1 , if it is the result of applying moves of the following forms: ±1 i <N (1) (Rearranging) yti x±1 are such that t.xs is defined. s → xs yx±1 (t) where s, t ∈ 2 s (2) (3) (4) (5) (6) −1 −1 −1 <N (Expansion) ys → xs ys0 ys10 ys11 and ys−1 → x−1 . s ys00 ys01 ys1 where s ∈ 2 N (Commuting) yu yv ↔ yv yu where u, v ∈ 2 and u, v are independent. xi+j ↔ xi xj y i+j ↔ y i y j (Cancellation) Delete an occurrence of y i y −i −1 The percolating elements ys0 , ys10 , ys11 obtained upon performing the expansion move on ys are called −1 −1 offsprings of ys . Similarly, the elements ys00 , ys01 , ys1 obtained upon performing an expansion move −1 −1 on ys are offsprings of ys . If we perform a sequence of such moves, we will also refer to offsprings −1 of offsprings are offsprings themselves. For instance, consider the move ys → xs ys0 ys10 ys11 produces −1 −1 offsprings ys0 , ys10 , ys11 of ys . Now upon performing a subsequent expansion move on ys10 , we obtain −1 −1 −1 −1 −1 xs ys0 x−1 s10 ys1000 ys1001 ys101 ys11 = xs xs10 ys0 ys1000 ys1001 ys101 ys11 −1 −1 So we say that ys0, ys1000 , ys1001 , ys101 , ys11 are offsprings of ys . In our arguments is shall be useful to keep track of the offsprings of percolating elements under expansion. An important combination of moves that will be used frequently in our arguments is expansion followed by rearrangement. For example, let f (yst11 ....ystnn )yu be an S-word such that xu acts on each sequence in the set {s1 , ..., sn }. We can perform an expansion move on the word to obtain −1 yu11 ) f (yst11 ....ystnn )(xu yu0 yu10 followed by rearranging moves to obtain −1 f xu (yst1′ ....ystn′n )(yu0 yu10 yu11 ) 1 s′i where = xu (si ). It is easy to check that if our original word was a standard form, then the resulting word is also a standard form. This combination of moves shall be used frequently in the proofs in the paper. We now extend the notion of potential cancellation for a calculation to an analogous notion for standard forms. Definition 3.17. (Potential cancellation) A standard form f yst11 ...ystnn is said to have a potential cancellation if there is an infinite binary sequence τ such that the calculation of yst11 ...ystnn on τ contains a potential cancellation. Lemma 3.18. Let f λ1 be a standard form which does not have a potential cancellation. Let gλ2 be a standard form obtained by performing a sequence of expansion followed by rearranging moves on f λ1 . Then gλ2 does not have a potential cancellation. Proof. Let λ1 = yst11 ...ystnn , such that ti ∈ {1, −1}. Note that this is for notational convenience, i.e. for instance we write y 2 as yy. Since the existence of potential cancellations in f yst11 ...ystnn is not affected by f ∈ F , we assume that this is the empty word. Assume that xsi acts on each s1 , ..., si−1 , and that ti = 1. The case when ti = −1 is completely analogous. Applying expansion followed by rearrangement, we obtain ...ystnn ) y )(ysti+1 )(xsi ysi 0 ys−1 (yst11 ...ysti−1 i+1 i−1 i 10 si 11 t ...ystnn ) = (xsi )(yst1′ ...ysi−1 y )(ysti+1 )(ysi 0 ys−1 ′ i+1 i 10 si 11 i−1 1 where s′j = xsi (sj ) for 1 ≤ j ≤ i − 1. Now assume that we have introduced a potential cancellation after performing this move. Let τ be an infinite binary sequence for which the associated calculation of t ...ystnn ) (xsi )(yst1′ ...ysi−1 y )(ysti+1 )(ysi 0 ys−1 ′ i+1 i 10 si 11 1 i−1 A NONAMENABLE TYPE F∞ GROUP 11 denoted by Λ contains a potential cancellation. It must be the case that τ contains as a prefix a sequence which equals either si 0, si 10, or si 11. Now let Λ′ be the calculation produced by the evaluation of yst11 ...ystnn on x−1 si (τ ). The calculation Λ is in fact obtained from Λ′ by advancing a symbol y. By our hypothesis, there is no potential cancellation in Λ′ . So by Lemma 3.14 there cannot be a potential cancellation in Λ. Hence we obtain a contradiction. Therefore, upon performing a sequence of expansion followed by rearrangement moves, we obtain a standard form with no potential cancellations.  We end this subsection with a discussion about the action of standard forms and tail equivalence. The action of F on infinite binary sequences preserves tail equivalence, yet the elements ysn do not. This is a fundamental and important distinction between the groups F and G. The advantage of standard forms without potential cancellations is that we can identify precisely where the relation is not preserved. Recall that the support of a homeomorphism φ is the set of elements in the domain that are moved by the homeomorphism. We denote this as Supp(φ). Lemma 3.19. Let f yst11 ...ystnn be a standard form that does not contain potential cancellations. Let U ⊂ 2N be the support of yst11 ...ystnn . (1) f yst11 ...ystnn does not preserve tail equivalence on a dense subset of f −1 (U ). More particularly, given an open set U ′ in f −1 (U ), there is an infinite binary sequence τ ∈ U ′ such that f yst11 ...ystnn (τ ) and τ are not tail equivalent. (2) f yst11 ...ystnn preserves tail equivalence on 2N \ f −1 (U ). Proof. It suffices to prove the statement in the case when f is trivial, since f maps f −1 (U ) to the support of the Y -word yst11 ...ystnn , and outside f −1 (U ) the word f yst11 ...ystnn acts like an element of F , and hence preserves tail equivalence. Let U ′ be an open subset of U . Let τ be an finite binary sequence such that the following holds: (1) [τ 0∞ , τ 1∞ ] ⊂ U ′ (2) τ dominates s1 , ..., sn . The associated calculation Λ of yst11 ...ystnn on τ does not contain potential cancellations, by our hypothesis. By Lemma 3.15, there is a finite binary sequence u such that one can perform substitutions on Λu to obtain vy m where v is a finite binary sequence and m 6= 0. We assume that m > 0, the other case is m m analogous. It follows that the associated calculation of yst11 ...ystnn on τ u02 102 1... equals m m m m vy m 02 102 1... This calculation produces the output v012 012 ... which is not tail equivalent to the input.  4. Cluster complexes We consider Rn with variables x1 , ..., xn that represent coordinates in the usual orthonormal basis. In particular, we fix an order on the set of coordinates, described by the indices, i.e. xi < xj if i < j. In this section, we shall use the concepts concerning hyperplane arrangements described in Subsection 3.4 from the Preliminaries. We consider two types of affine hyperplanes in Rn . (1) An affine hyperplane of Rn is said to be of type 1 if it is of the form {xi = 0} or {xi = 1} for some 1 ≤ i ≤ n. (2) A hyperplane of Rn is said to be of type 2 if it is of the form {xi = xi+1 } for some 1 ≤ i ≤ n − 1. 12 YASH LODHA Let A be a hyperplane arrangement in Rn . We say that A is admissible if the following holds. (1) Each hyperplane in A is of type 1 or of type 2. (2) A contains all the hyperplanes of type 1. Now we define the notion of an n-cluster. Recall the notion of the face complex of a finite hyperplane arrangement from subsection 3.4. Definition 4.1. An n-cluster is a CW subdivision of [0, 1]n obtained by restricting the face complex of an admissible hyperplane arrangement to [0, 1]n . Let A be an admissible hyperplane arrangement in Rn . We denote by C(A) as the restriction of the face complex of A to [0, 1]n , which is a subcomplex. In particular, we say that C(A) is the n-cluster (or simply cluster) associated with A. Hence we have a correspondence: {admissible hyperplane arrangements in Rn } ↔ {n-clusters} In this correspondence, the admissible arrangement A given by the set of all type 1 hyperplanes corresponds to the standard CW structure of the regular Euclidean cube [0, 1]n . If A consists of all type 1 hyperplanes of R2 and the type 2 hyperplane {x1 = x2 }, then the resulting 2-cluster is a square with a diagonal connecting (0, 0) and (1, 1). This has four 0-cells, five 1-cells, and two triangular 2-cells. Our next step is to define the notion of a subcluster of a cluster. First we shall define a codimension 1 subcluster, and then subsequently define lower dimensional clusters. Definition 4.2. Let A be an admissible hyperplane arrangement, and let C(A) ⊂ Rn be the associated n-cluster. A codimension 1 subcluster of C(A) is obtained by taking the intersection of a hyperplane H in A with C(A). A codimension 1 subcluster automatically inherits a definition in terms of an admissible hyperplane arrangement in Rn−1 . To see this, let H ∈ A be a hyperplane. Now H is of one of the following forms {xk = xk+1 } {xk = 1} {xk = 0} In each respective case, we endow H with a set of coordinates y1 , ..., yn−1 where yj = xj if j < k and yj = xj+1 if k ≤ j ≤ n − 1. The restriction A ↾ H provides an admissible hyperplane arrangement for H∼ = Rn−1 . This generalises to the following notion of subclusters. Definition 4.3. A subcluster of C(A) is a subcomplex obtained by an intersection of C(A) with a flat T in A. We categorize subclusters of a given cluster as facial and diagonal. This is done T by separating the flats of A into two types. We say that a flat T of A is of type 1, if it is of the form H∈A H, where A ⊆ A is a collection of type 1 hyperplanes. T We say that a flat T of A is of type 2, if is of the form H∈A H, where A ⊆ A has the following property. A contains at least one hyperplane of the form {xk = xk+1 } so that T is not contained in any of the following hyperplanes: {xk = 0} {xk = 1} {xk+1 = 0} {xk+1 = 1} Definition 4.4. Consider a subcluster obtained by taking an intersection of the cluster with a flat T . If T is a type 1 flat, then the subcluster is said to be a facial subcluster. If T is a type 2 flat, then the subcluster is said to be a diagonal subcluster. The following Lemma is a corollary to a similar statement concerning the face complex. A NONAMENABLE TYPE F∞ GROUP 13 Lemma 4.5. Each cell e of a cluster is the interior of a convex polytope. The set of 0-cells incident to e is convex independent, i.e. no one element lies in the convex span of the others. Moreover, the closure of e equals the convex span of the 0-cells incident to e. The notion of a nonpositvely curved cube complex admits a natural generalisation in this setting, despite the absence of a natural metric. One may view this notion as a combinatorial criterion that guarantees asphericity. Definition 4.6. Let C be a complex of clusters. We say that C is nonpositively curved if for every finite subcomplex Y of C, there is a nonpositively curved cube complex Z, and continuous maps f : Y → Z, g : Z → C so that the following diagram commutes: Z f Y g C The following is an immediate consequence of the definition. Proposition 4.7. If C is a nonpositively curved cluster complex, then C is apsherical. We shall demonstrate that the complex X we construct in this article is nonpositively curved in this sense. 5. Normal Forms For our group presentation G = hS, Ri, we shall describe a unique, canonical choice of word for each group element. We shall describe a procedure that converts a given word into such a word. The normal form described in this section (or slightly weaker variants of it) will be used throughout the paper, in particular in the proof that the complex X is contractible. However, aside from the goals of this paper, this normal form is a useful tool to study the group and is therefore of independent interest. The reader is encouraged to develop a technical familiarity of the moves described in 3.16, before reading the proofs in this section. To help phrase the arguments, it is useful to imagine a Y -standard form yst11 ...ystnn as a set of decorations on the infinite rooted binary tree. This is done by means of adding integer labels ti on the nodes si . The two central notions in this section are potential cancellation and potential contraction. In particular, our normal form will be a standard form f yst11 ...ystnn such that f is in the usual normal form for Thompson’s group F , and yst11 ...ystnn does not contain any potential cancellations or potential contractions. We have already defined the notion of potential cancellations. We shall now provide a reformulation of the definition that will be useful in the proofs in this section. t Definition 5.1. For a standard form f yst11 ...ystnn , we say that the pair ysjj , ystii is adjacent if si ⊂ sj and for each sequence u satisfying si ⊂ u ⊂ sj , u does not equal sk for any 1 ≤ k ≤ n. This means that if we walk along the geodesic in the tree connecting si and sj , we do not encounter any labels besides those at the first and the last nodes. Such an adjacent pair is said to be a potential cancellation if the associated calculation of the subword t ysjj ystii on some (or any) infinite binary sequence that extends sj contains a potential cancellation. Lemma 5.2. A standard form contains a potential cancellation if and only if it contains an adjacent pair that is a potential cancellation. Proof. A standard form f yst11 ...ystnn contains a potential cancellation if there is an infinite binary sequence σ such that the associated calculation Ω of yst11 ...ystnn on σ contains a potential cancellation. This means that Ω contains a substring of the form y ti uy tj , where u ∈ 2<N and so that advancing an occurrence of 14 YASH LODHA y ±1 from y ti to y tj along u produces a cancellation. Conversely, the same cancellation is witnessed when t t processing the calculation of the subword ystii ysjj on σ, where ystii , ysjj is an adjacent pair in yst11 ...ystnn with a potential cancellation.  Definition 5.3. A standard form is said to contain a potential contraction if either of the following holds. −1 ± (1) It contains an occurrence of a subword of the form ys0 ys10 ys11 but no occurrences of ys1 . −1 −1 ± (2) It contains an occurrence of a subword of the form ys00 ys01 ys1 but no occurrences of ys0 . −1 If a standard form f yst11 ...ystnn contains a potential contraction of the form ys0 ys10 ys11 (in particular, no ± −1 v occurrences of ys1 ), we can replace the subword ys0 ys10 ys11 with the word x−1 y . s If yu is a percolating s element occurring to the left of x−1 in the resulting word, then either u, s are independent or s ⊂ u. Since s ± there are no occurrences of ys1 , the element x−1 must act on u. So we apply rearranging substitutions s to move the x−1 to the left of all percolating elements. The resulting word is a standard form. We call s −1 −1 this a contraction move. The contraction move for the other case, i.e. subwords of the form ys00 ys01 ys1 ± (but no occurrences of ys0 ), is defined in a similar way. The procedure for converting a standard form f yst11 ...ystnn into a normal form using moves involves three steps: that does (1) Step 1: Using a sequence of moves, convert f yst11 ...ystnn into a standard form f ′ yuv11 ...yuvm m not contain potential cancellations. (2) Step 2: Using a sequence of contraction moves, convert f ′ yuv11 ...yuvm into a standard form m f ′′ yrq11 ...yrqkk which does not contain potential contractions. Moreover, the moves performed do not introduce any potential cancellations. (3) Step 3 Convert f ′′ into a word g which is in F -normal form as described in Theorem 3.7. Output: A standard form gyrq11 ...yrqkk such that g is in F -normal form as in 3.7, and yrq11 ...yrqkk does not contain any potential cancellations or potential contractions. This word shall be the unique normal form as stated in the main theorem below. Theorem 5.4. For each element in G, there is a unique word f yst11 ...ystnn such that (1) f yst11 ...ystnn is a standard form with no potential contractions or potential cancellations. (2) f ∈ F is an X-word in F -normal form in the sense of 3.7. Moreover, given any word that represents this element in G, we can convert it into the word f yst11 ...ystnn using a sequence of moves from 3.16. The goal of the rest of this section is to describe Steps 1, 2 of the procedure and then prove the main theorem. For Step 3 we refer the reader to [10]. 5.1. Step 1 of the procedure. First we make a fundamental observation concerning potential cancellations in standard forms. This will provide a part of the reduction in Step 1. Lemma 5.5. Let (yst11 ...ystnn )yst be a standard form such that the following holds. (1) t1 , ..., tn , t ∈ {1, −1}. (2) The sequences s1 , ..., sn are independent. (3) Each pair ystii , yst is an adjacent pair that is a potential cancellation. Then we can perform a sequence of expansion, rearrangement and cancellation moves on this word to produce a standard form f yuv11 ...yuvm such that u1 , ..., um are independent and v1 , ..., vm ∈ {1, −1}. m Proof. We assume that t = 1, the other case is completely analogous. Performing an expansion move on −1 ys produces a word xs ys0 ys10 ys11 . We claim that xs acts on each sequence si for 1 ≤ i ≤ n, unless s = si −ti and ys = ysi . A NONAMENABLE TYPE F∞ GROUP 15 Let Λ be the associated calculation of the action of (yst11 ...ystnn )ys on the sequence si u for any choice of infinite binary sequence u. (The choice of such a sequence does not affect the argument.) There are only two occurrences of y ±1 in Λ. The first corresponds to ys and the other to ystii . Advancing the symbol y in Λ that corresponds to ys involves acting by x on the suffix of sys in Λ. Since there is a potential i . Therefore, xs acts on each cancellation in Λ, we can advance this symbol, unless s = si and ys = ys−t i i si , unless s = si and ys = ys−t . i Applying the rearrangement move, we obtain −1 xs (yst1′ ...ystn′n )(ys0 ys10 ys11 ) 1 where s′i = xs (si ). Now each sequence s′i contains as an initial segment exactly one of the three sequences s0, s10, s11, and is independent from the remaining two. Also, note that the distance in the tree between s′i and the prefix of s′i in {s0, s10, s11} is smaller than the distance between si and s. In this way, we can −1 continue to apply expansion followed by rearrangement moves on ys0 , ys10 , ys11 and their offsprings, until this distance is 0 for each such pair. Then we can perform the required cancellations. At this stage, any remaining percolating elements yuv11 , ..., yuvnn are offsprings of ys and hence have the property that u1 , ..., un are pairwise independent.  Now we describe the final part of the first step. Lemma 5.6. Any standard form can be converted to a standard form with no potential cancellations using the relations. Proof. We prove this by induction on the number of percolating elements in the standard form. The base case is trivial. Let this be true for n − 1. Let f yst11 ...ystnn be a standard form such that ti ∈ {1, −1}. We remark that the condition for ti ’s is a matter of convenient notation, i.e. for example we write ys2 as ys ys . t By the inductive hypothesis it follows that we can convert f yst11 ...ysn−1 n−1 into a standard form with no potential cancellations using the relations. Moreover, from applying Lemmas 3.10 and 3.18 it follows that with no potential cancellations and depth this can further be converted into a standard form hypq11 ...ypqm m tn is a standard form up to commutation, since none y strictly larger than |sn |. It follows that hypq11 ...ypqm m sn of the sequences pi are initial segments of sn . Let τ be an infinite binary sequence for which the associated calculation Λ is a potential cancellation. The potential cancellation in this calculation must occur between the first two occurrences of y ± in τ , since hypq11 ...ypqm does not have any potential cancellation. Such an occurrence of y ± corresponds to a m potential cancellation of an adjacent pair of the form ypqii , ystnn for some 1 ≤ i ≤ m. y tn into Now we make a record of all such adjacent pairs. Using commuting moves we convert hypq11 ...ypqm m sn k1 kl v1 vo tn a word h(yr1 ...yrl )(yu1 ...yuo )ysn such that (1) (2) (3) (4) The word h(yrk11 ...yrkll )(yuv11 ...yuvoo )ystnn is a standard form up to commutation. v1 , ..., vo ∈ {1, −1}. v Each pair yujj , ystnn is an adjacent pair that is a potential cancellation. v No adjacent pair of the form yrkii , ystnn or yrkii , yujj is a potential cancellation. Now we apply a sequence of expansion and rearranging moves to convert the standard form hyrk11 ...yrkll into a standard form h′ λ1 so that: (1) h′ ∈ F , λ1 is a Y -word. (2) h′ λ1 is a standard form of depth at least max{|u1 |, ..., |uo |} + 3. Upon substitution, we obtain the word h′ λ1 (yuv11 ...yuvoo )ystnn 16 YASH LODHA Conditions (1) − (4) still hold for this new word, with λ1 replacing (yrk11 ...yrkll ) in the respective parts. By Lemma 5.5, we can perform a sequence of expansion, rearranging and cancelling substitutions on the word (yuv11 ...yuvoo )ystnn to obtain a standard form gλ2 so that g ∈ F , λ2 is a Y -word and gλ2 has no potential cancellations. The proof of Lemma 5.5 guarantees the following: (1) Any percolating element yst that occurs in λ2 satisfies that |s| ≤ max{|u1 |, ..., |uo |} + 1. (2) For any percolating element yst that occurs in λ1 , g acts on the sequence s. Upon substitution, we obtain a word h′ λ1 gλ2 . Let λ3 be the standard form obtained by replacing each t percolating element yst of λ1 by yg(s) . We obtain h′ λ1 gλ2 = h′ gλ3 λ2 Thanks to the condition on the depths of λ1 and λ2 , the word (h′ g)λ3 λ2 is a standard form up to commutation. Thanks to condition (4) above and Lemma 3.14, this word does not contain an adjacent pair that is a potential cancellation. The conditions ensure that this is also a standard form up to commutation. After applying a sequence of commutation moves, we obtain a standard form with no potential cancellations.  5.2. Step 2 of the procedure. Lemma 5.7. Any standard form can be converted into a standard form with no potential contractions and no potential cancellations. Proof. By Lemma 5.6 we can convert our standard form into a standard form with no potential cancellations. On the resulting standard form, we perform contraction moves (defined in 5.3), one by one, until no contraction moves can be performed. This process terminates, since upon performing a contraction substitution we obtain a standard form which has fewer occurrences of y ± . Moreover, thanks to Lemma 3.14 we do not introduce any potential cancellations in this process.  Before we proceed to prove the main theorem, we shall make a fundamental observation concerning exponents of calculations. (Recall the Definition of exponents of calculations from 3.13.) This provides an invariant that distinguishes different standard forms. Lemma 5.8. Let f yst11 ...ystnn and gypq11 ...ypqm be standard forms that represent the same group element. Let m u be a finite binary sequence such that: (1) f (u), g(u) are defined and dominate s1 , ..., sn and p1 , ..., pm respectively. (2) Let Θ and Λ be calculations of yst11 ...ystnn on f (u) and ypq11 ...ypqm on g(u) respectively, such that Θ m and Λ do not admit potential cancellations. Then the exponents of Θ and Λ are the same. Proof. Assume without loss of generality that the exponent of Λ is greater than that of Θ. Assume that k > 0 is the exponent of Λ. (Recall that the exponent is always nonnegative.) By Lemma 3.15, there is a finite binary sequence v such that we can perform moves on Λv to obtain a calculation of the form wy k , where w is a finite binary sequence. k k k k k Now consider the sequence uv02 102 102 1.... We know that k k k k (uv02 102 102 1...) f yst11 ...ystnn (uv02 102 102 1...) = gypq11 ...ypqm m In particular, we know that the calculations k k k Θv02 102 102 1... and k k k k k k k k k Λv02 102 102 1... = wy k 02 102 102 1... = w012 012 012 ... produce the same output. A NONAMENABLE TYPE F∞ GROUP k k 17 k The calculation Θv02 102 102 1... has fewer than k occurrences of y ± . It is a pleasant visual exercise for the reader that this calculation cannot produce an output that is tail equivalent to a sequence of the form k k k w012 012 012 .... This means that our assumption that the exponents are different must be false.  Proof of Theorem 5.4 Proof. From Lemmas 5.6 and 5.7, it follows that for any given group element we can find a word satisfying the hypothesis of the theorem. It remains to show that this is unique. By way of contradiction assume that gypq11 ...ypqm f yst11 ...ystnn m are two distinct standard forms that satisfy conditions (1) and (2) of the Theorem, and represent the same element of G. Assume without loss of generality that pm ≤ sn and that qm > 0. There are three cases: (1) sn = pm and either tn , qm < 0 or tn , qm > 0. (2) sn = pm and either tn < 0 < qm or qm < 0 < tn . (3) sn > pm . Case (1): We can perform a cancellation on both sides of the equality, until we land in one of the remaining cases. Now we shall demonstrate that in both case (2) and (3), the following holds. Claim: There is a finite binary sequence u such that: a. pm ⊆ u and u dominates s1 , ..., sn . b. The associated calculation Λ of (yst11 ...ystnn )yp−1 on u does not contain a potential cancellation. m Note that if u is a sequence that satisfies the above, then any sequence that extends u also satisfies the above. does not Proof of the claim for case (2): In this case it is obvious that the standard form (yst11 ...ystnn )yp−1 m admit any potential cancellations. This means that any finite binary sequence u satisfying condition a in the claim also satisfies condition b in the claim. Proof of the claim for case (3): Let us assume that for each binary sequence u that satisfies condition a of the claim, condition b fails. Since yst11 ...ystnn does not contain any potential cancellations, the associated on u must contain a potential cancellation that corresponds to an adjacent calculation of (yst11 ...ystnn )yp−1 m −1 ti pair of the form ysi , ypm . This means that there is a set of indices k1 , ..., kl ∈ {1, ..., n} such that: (1) sk1 , ..., skl are leaves of a finite binary tree rooted at pm . tk (2) Each pair yskii , yp−1 that is a potential cancellation. is an adjacent pair in (yst11 ...ystnn )yp−1 m m t tk In this situation, one can perform a sequence of contraction moves on the subword yskk11 ...yskll of yst11 ...ystnn to obtain the subword ypm . This means that the standard form yst11 ...ystnn admits a potential contraction, contradicting our hypothesis. So the claim holds in case (3). Now extend the finite binary sequence u, if necessary, so that the following also holds. f −1 (u) and g(f −1 (u)) are defined, and g(f −1 (u)) dominates p1 , ..., pm . (This is merely a matter of choosing a sufficiently long sequence that extends u.) Let σ = f −1 (u). Recall from the above the following. on f (σ). (1) Λ is the calculation of (yst11 ...ystnn )yp−1 m We consider the following additional calculations: 18 YASH LODHA −1 on g(σ). (2) Θ is the calculation of ypq11 ...ypqm m ′ t1 tn (3) Λ is the calculation of ys1 ...ysn on f (σ). (4) Θ′ is the calculation of ypq11 ...ypqm on g(σ). m According to our assumptions, the calculations Λ, Λ′ , Θ, Θ′ do not contain any potential cancellations. First observe that: (1) The exponent of Λ is the same as that of Θ. (2) The exponent of Λ′ is the same as that of Θ′ . This follows from Lemma 5.8 since −1 (σ) (σ) = gypq11 ...ypqm f (yst11 ...ystnn )yp−1 m m and (σ) f yst11 ...ystnn (σ) = gypq11 ...ypqm m However, it also holds that: (1) The exponent of Λ is greater than that of Λ′ . (2) The exponent of Θ is less than or equal to that of Θ′ . This is a contradiction. Therefore, the words yst11 ...ystnn ypq11 ...ypqm m must be equal. Upon cancellation, we obtain that f = g, and since these words are in the normal form for F , they must also be equal. Therefore, the words f yst11 ...ystnn gypq11 ...ypqm m are equal.  The following is an immediate consequence, and provides a normal form representative for right cosets of F in G. We leave the proof as an elementary exercise for the reader. is also Y -word in normal form Corollary 5.9. Let yst11 ...ystnn be a Y -word in normal form. If yuv11 ...yuvm m such that ∈ F (yst11 ...ystnn ) yuv11 ...yuvm m tn t1 vm v1 then yu1 ...yum and ys1 ...ysn are the same words. 6. The 1-skeleton of X In this section, we describe and study the nodes and edges of X (1) . Definition 6.1. The 0-skeleton X (0) is defined to be the set of right cosets of F in G. The action of G on X (0) is the usual right action on right cosets. We observe that this action is faithful. Lemma 6.2. The action of G on the right cosets of F in G is faithful. T Proof. The kernel of the action is the normal core g∈G g −1 F g. Let f be a nontrivial element of the T normal core. This necessarily must be an element of F , since g∈G g −1 F g ⊂ F . Since f is a non trivial element of F , there is a non-constant finite binary sequence s such that s and f (s) are independent. Now from our assumption it follows that f ∈ ys−1 F ys . So there is an element h ∈ F such that ys f ys−1 = h. After applying a rearrangement move, we obtain h = f yf (s) ys−1 . Since s, f (s) are independent, the element f yf (s) ys−1 cannot be an element of F . In particular, because yf (s) ys−1 does not preserve the tail equivalence relation on the sequence s011011011..... This means that our assumption must be false, and hence the normal core is trivial.  A NONAMENABLE TYPE F∞ GROUP 19 To define the edge relation, it will be useful to consider certain types of standard forms, which we shall call special forms. Definition 6.3. A standard form yst11 ...ystnn is called a special form, if the following holds. (1) s1 , ..., sn are consecutive. (2) t1 , ..., tn ∈ {−1, 1} and ti+1 = −ti . The definition implies that each pair of percolating elements in the special form commute. Moreover, there is a finite rooted binary tree T such that s1 , ..., sn are consecutive leaves in T . −1 Given a percolating element ys , if we apply an expansion move, we obtain xs ys0 ys10 ys11 . The word −1 ys0 ys10 ys11 is a special form. Now we apply an expansion move −1 −1 −1 ys10 → x−1 s10 ys1000 ys1001 ys101 to obtain the word −1 −1 xs ys0 (x−1 s10 ys1000 ys1001 ys101 )ys11 Applying rearrangement moves, we obtain −1 −1 xs x−1 s10 (ys0 ys1000 ys1001 ys101 ys11 ) The Y -word −1 −1 ys0 ys1000 ys1001 ys101 ys11 is also a special form. This generalises to the following in a straightforward manner. Lemma 6.4. Let s ∈ 2<N such that s 6= 0k , 1k , ∅. If we apply a sequence of expansion and rearrangement moves on ys±1 , to obtain a standard form f yst11 ...ystnn , then the Y -word yst11 ...ystnn is a special form. Moreover, the support of f ∈ F lies in the interval [s0∞ , s1∞ ]. Another basic observation about special forms is the following. Lemma 6.5. Let yst11 ...ystnn be a special form, and let f ∈ F be an element such that f acts on each sequence in the set {s1 , ..., sn }. It follows that yft1(s1 ) ...yftn(sn ) is also a special form. Proof. The proof is elementary, and uses the fact that tree diagrams for elements of F map consecutive pairs of sequences, upon which they act, to consecutive pairs.  Now we are ready to define the edges in X (1) . Definition 6.6. The following equivalent conditions determine the edge relation in X (1) . (1) (E1) F τ1 , F τ2 ∈ X (0) are connected by an edge if the double coset F τ1 τ2−1 F equals one of the following double cosets. −1 F y10 F F y10 F −1 F y100 y101 F −1 F y100 y101 F (2) (E2) F τ1 , F τ2 ∈ X (0) are connected by an edge if the element τ1 τ2−1 admits a standard form f yst11 ...ystn1 such that yst11 ...ystn1 is a special form. The advantage of the formulation in (E1) is that it provides a succint definition of the 1-skeleton. However, in practise, (E2) will be more useful. Lemma 6.7. The two conditions (E1) and (E2) in Definition 6.6 are equivalent. Proof. First we will show that (E1) =⇒ (E2). Assume that F τ1 , F τ2 satisfy (E1). We show that (E2) holds in the following cases: (1) F τ1 τ2−1 F = F y10 F −1 (2) F τ1 τ2−1 F = F y100 y101 F . 20 YASH LODHA The proof for the remaining cases is symmetric. Case 1: It follows that τ1 τ2−1 = f1 y10 f2 for some f1 , f2 ∈ F . We apply a sequence of expansion and rearrangement substitutions on y10 to obtain a standard form f3 yst11 ...ystnn such that f2 acts on s1 , ..., sn . By Lemma 6.4, yst11 ...ystnn must be a special form. So τ1 τ2−1 = (f1 f3 )(yst11 ...ystnn )f2 Applying a rearrangement move, we obtain τ1 τ2−1 = (f1 f3 f2 )(yut11 ...yutnn ) where ui = f2 (si ). By Lemma 6.5 yut11 ...yutnn is also a special form, so we are done. −1 Case 2: There are elements f1 , f2 ∈ F such that τ1 τ2−1 = f1 (y100 y101 )f2 . We apply a sequence of −1 expansion and rearrangement substitutions on y100 and y101 to obtain standard forms f3 yst11 ...ystnn and f4 yuv11 ...yuvm respectively, so that f2 acts on each ui , sj . By Lemma 6.4, m Supp(f4 ) ⊂ [1010∞, 1011∞] So f4 commutes with each percolating element ystii since Supp(ystii ) ⊂ [1000∞, 1001∞ ] Now −1 ) y100 y101 = f3 (yst11 ...ystnn )f4 (yuv11 ...yuvm m ) = f3 f4 (yst11 ...ystnn )(yuv11 ...yuvm m so that yst11 ...ystnn yuv11 ...yuvm m is a special form. This way we obtain τ1 τ2−1 = (f1 f3 f4 f2 )(yst1′ ...ystn′n yuv1′ ...yuvm ′ ) m 1 1 where s′i = f2 (si ) and u′i = f2 (ui ). By Lemma 6.5, yst1′ ...ystn′n yuv1′ ...yuvm ′ m 1 1 is a special form, and we are done. Next we show that if a pair F τ1 , F τ2 ∈ X (0) satisfies (E2), then it also satisfies (E1). By our assumption, there is a special form yst11 ...ystnn and f ∈ F such that τ1 τ2−1 = f yst11 ...ystnn . By definition, the double coset F τ1 τ2−1 F satisfies (E1) if and only if the double coset F τ2 τ1−1 F also satisfies this property. So we can assume without loss of generality that t1 = 1. We consider two cases. Case (1): n is odd. Each time we apply an expansion move on a percolating element ys±1 , the percolating element is deleted and three new percolating elements appear. This means that the number of percolating elements in the new word increases by 2. So upon applying a sequence of n−1 2 expansion (followed by rearrangement) moves to y10 , we can obtain a standard form of the type hyuv11 ...yuvnn . By Lemma 6.4, yuv11 ...yuunn is a special form. Also, by our assumption on t1 , it follows that ti = vi for each 1 ≤ i ≤ n. Now we construct a pair of finite rooted binary trees T1 , T2 such that: (1) (2) (3) (4) T1 , T2 has the same number of leaves. s1 , ..., sn are consecutive leaves of T1 . u1 , ..., un are consecutive leaves of T2 . The tree diagram (T1 , T2 ) maps si to ui for each 1 ≤ i ≤ n. The construction of such a tree pair is an elementary exercise in the group F . The main idea is the following. Start with trees T3 , T4 such that s1 , ..., sn are leaves in T3 , and u1 , ..., un are leaves in T4 . Now add carets to leaves of T3 , T4 to obtain trees T1 , T2 so that: A NONAMENABLE TYPE F∞ GROUP 21 (1) s1 , ..., sn are leaves in T1 and u1 , ..., un are leaves in T2 . (2) The number of leaves to the left of s1 in T1 is the same as the number of leaves to the left of u1 in T2 . (3) The number of leaves to the right of sn in T1 is the same as the number of leaves to the right of un in T2 . Let g = (T1 , T2 ) ∈ F . It follows that τ1 τ2−1 g = hyst11 ...ystnn g = hgyut11 ...yutnn = hgyuv11 ...yuvnn Therefore, F τ1 τ2−1 F = F yuv11 ...yuvnn F = F y10 F Case 2: n is even. First we apply a sequence of expansion and rearranging moves to the percolating −1 elements of y100 y101 , and their offsprings, to obtain hyuv11 ...yuvnn where yuv11 ...yuvnn is a special form. Once again, at each step the expansion move increases the number of percolating elements by a factor of 2. So we need to apply expansion moves n−2 times. Now just as in case (1) we construct an element g ∈ F 2 such that g(si ) = ui . And we obtain τ1 τ2−1 g = hyst11 ...ystnn g = hgyuv11 ...yuvnn −1 It follows that F τ1 τ2−1 F = F yuv11 ...yuvnn F = F y100 y101 F.  1 n is not a special form. However ...ys−t Remark 6.8. If λ = yst11 ...ystnn is a special form, then λ−1 = ys−t 1 n −t j −1 i commute in G, the group element described by λ can be represented by the special , y since ys−t sj i −t1 −tn t1 tn form ys1 ...ysn . Throughout this article, given a special form λ = ys1 ...ysn , we shall refer to the special n 1 . ...ys−t form λ−1 as the special form ys−t n 1 are equivalent if they belong to Definition 6.9. We say that two special forms yst11 ....ystnn and yuv11 ...yuvm m the same right coset of F in G. Our analysis of X shall involve studying special forms upto equivalence. Hence it is natural to specialise basic manipulations of standard forms to special forms up to equivalence. Definition 6.10. Given a special form λ = yst11 ...ystnn , an expansion move at ystii entails one of the following: (1) Replacing ystii by ysi 0 ys−1 y if ti = 1. i 10 si 11 −1 (2) Replacing ystii by ys−1 y y if ti = −1. s 01 i si 1 i 00 A contraction move in λ entails one of the following: −1 (1) Replacing a subword ys0 ys10 ys11 by ys . −1 −1 (2) Replacing a subword ys00 ys01 ys1 by ys−1 When we use the phrase expansion move or contraction move, it will be clear from the context whether we mean this in the sense of Definition 3.16 or Definition 6.10. Lemma 6.11. The following conditions hold for special forms. (1) Performing contraction and expansion moves in the sense of 6.10 on a special form produces special forms that are equivalent. (2) Given any pair of equivalent special forms, one can be obtained from the other by performing a sequence of expansion and contraction moves in the sense of 6.10. Proof. Let yst11 ...ystnn be a special form. If a substitution −1 ys → xs ys0 ys10 ys11 or −1 −1 ys−1 = x−1 s ys00 ys01 ys1 22 YASH LODHA is performed, then xs (or x−1 s ) commutes with every percolating element that occurs on the left. This means that xs (or x−1 ) can be deleted from the word to obtain a special form that lies in the same coset. s Consider two special forms that lie in the same coset. Special forms cannot have potential cancellations, by definition. So we apply a sequence of potential contractions to both, until we obtain normal forms yst11 ...ystnn ypq11 ...ypqm m Since both these special, normal forms lie in the same coset, by Theorem 5.4 they must in fact be the same words.  Remark 6.12. Let yst11 ...ystnn be a special form. Then we can obtain a special normal form yuv11 ...yuvm m by applying a sequence of contraction moves in the sense of 6.10 to yst11 ...ystnn . Special normal forms are characterised by the property that they are special forms upon which no contraction move can be performed. Given a special normal form, any equivalent special form can be obtained by performing a sequence of expansion moves. Definition 6.13. We define Ω to be the set of right cosets of F in G which admit a coset representative which is a special form. Remark 6.14. Let yst11 ...ystnn be a special form and let f ∈ F . We can apply a sequence expansion moves with the property that f in the sense of 6.10 to yst11 ...ystnn to obtain an equivalent special form yuv11 ...yuvm m acts on u1 , ..., um . This means that ) · f = F yfv1(u1 ) ...yfvm (F yst11 ...ystnn ) · f = (F yuv11 ...yuvm (um ) m Clearly, F yfv1(u)1 ...yfvm (u)m ∈ Ω. Therefore, it makes sense to consider the right action of F on Ω. 6.1. The actions of F on Ω and X (1) . Our main goal for the remainder of the section is to understand the action of G on X (1) and demonstrate that this is cocompact and the stabilisers are of type F∞ . Any 1-cell contains in its G-orbit a 1-cell of the form F, F yst11 ...ystnn where yst11 ...ystnn is a special form. To understand the stabiliser of this cell, an important step is to understand the stabiliser of F yst11 ...ystnn under the action of F . Indeed it turns out that the two stabilisers are the same. For this reason, it is crucial to study the action of F on Ω in more detail. We do this below. Lemma 6.15. Consider elements ∈Ω F yst11 ...ystnn , F yuv11 ...yuvm m are special forms. These elements are in the same F -orbit if and only if where yst11 ...ystnn and yuv11 ...yuvm m both conditions below hold: (1) n, m have the same parity. (2) t1 = v1 . In particular, the right action of F on Ω has precisely four orbits. Proof. If yuv11 ...yuvm is a special form and f ∈ F , then by performing expansion moves in the sense of m 6.10 we obtain an equivalent special form yst11 ...ystnn on which f acts. Since f (s1 ), ..., f (sn ) are consecutive, yft1(s1 ) ...yftn(sn ) is also special form. Observe that both the parity of the number of percolating elements, as well as the sign of the exponent of the leftmost percolating element, are preserved under this action of F . Now let yst11 ...ystm m ypq11 ...ypqnn be two special forms such that n, m have the same parity and t1 = q1 . Upon performing expansion moves we can assume that n = m. We construct an f ∈ F such that f (si ) = pi for 1 ≤ i ≤ n, to obtain: F (yst11 ...ystnn ) · f = F (ypq11 ...ypqnn ) This is done in precisely the same manner as in the proof of Lemma 6.7.  A NONAMENABLE TYPE F∞ GROUP 23 Recall the Higman-Thompson groups F3 , and F3,r for r ∈ N>0 . For an introduction to these groups, we refer the reader to [6]. It has been shown in [6] that these are of type F∞ . We now state the main Proposition concerning the action of G on X (1) . In particular, we show that this is cocompact and the stabilizers of cells are of type F∞ . Proposition 6.16. The action of G on the set of 1-cells of X (1) satisfies the following: (1) There are precisely two orbits of 1-cells. (2) For each 1-cell e in X (1) , StabG (e) is isomorphic to F3 × F × F . Proof of part (1): Further, observe that the 1-cells F, F yst11 ...ystnn n 1 ...ys−t F, F ys−t n 1 are in the same G-orbit. So we conclude that any 1-cell contains in its G-orbit a 1-cell of the form F, F yst11 ...ystnn where t1 = 1. Consider two 1-cells e2 = F, F yuv11 ...yuvm e1 = F, F yst11 ...ystnn m such that t1 = v1 = 1. First we claim that any element of G that maps e1 to e2 must be an element of F . Indeed, this would follow if any element that maps e1 to e2 maps the trivial coset F to itself. Assume by way of contradiction that there is an element g ∈ G such that: F (yst11 ...ystnn ) · g = F F · g = F yuv11 ...yuvm m In standard form, such an element must be of the form g = f yuv11 ...yuvm for some f ∈ F . m It follows that =F F yst11 ...ystnn · f yuv11 ...yuvm m be a special form obtained from yst11 ...ystnn by expansion moves so that f acts on p1 , ..., pk Now let and each f (pi ) dominates u1 , ..., um . Note that for such a special form it must also hold that q1 = 1. ypq11 ...ypqkk It follows that = F yfq1(p1 ) ...yfqk(pk ) yuv11 ...yuvm F yst11 ...ystnn · f yuv11 ...yuvm m m =F In order for this to hold, it must be true that the adjacent pair yfq1(p1 ) , yuv11 is a potential cancellation, and that f (p1 ) = u1 0l for some l ∈ N. This is impossible, since v1 = q1 = 1 and since advancing a y along a sequence of 0’s does not change the sign of y in a calculation. . By Lemma 6.15, such an element exists if and It follows that g ∈ F and maps F yst11 ...ystnn to F yuv11 ...yuvm m only if the parity of n, m is the same. It follows that the action of G on the 1-cells has precisely two orbits. Proof of Part (2): Now we observe that the statement about the stabilisers reduces to Proposition 6.17, which is stated below. As in the proof of part (1), since G acts transitively on X (0) , it follows that each 1-cell contains in its G-orbit a 1-cell of the form F, F yst11 ...ystnn where yst11 ...ystnn is a special form. By the above, it suffices to understand the stabiliser of a 1-cell F, F yst11 ...ystnn where yst11 ...ystnn is a special form and t1 = 1. Moreover, also from the proof of part (1), any element g ∈ G that maps the 1-cell F, F yst11 ...ystnn onto itself must map F to F and F yst11 ...ystnn to F yst11 ...ystnn . It follows that StabG (F, F yst11 ...ystnn ) = StabF (F yst11 ...ystnn ) This reduces the proof of part (2) to Proposition 6.17. Proposition 6.17. Let yst11 ...ystnn be a special form. Then StabF (F yst11 ...ystnn ) ∼ = F3 × F × F 24 YASH LODHA Before we proceed to the proof of the above, we define some concepts that will be used in the proof. The key idea is to provide a precise connection between tree diagrams for the group F3 and the stabiliser above. Let s1 , ..., sn be consecutive finite binary sequences. We consider the set of finite sub-forests of the infinite rooted binary tree, with roots s1 , ..., sn . Such a forest is determined by its leaves, which is a set of finite binary sequences u1 , ..., um satisfying: (1) For each ui there is an sj such that sj ⊂ ui . (2) Let ν be an infinite binary sequence which contains an element of {s1 , ..., sn } as a prefix. Then there is a unique element of the set {u1 , ..., um } which is a prefix of ν. In other words, s1 , ..., sn are the roots and u1 , ..., um are the leaves of the forest. We also consider labels on the set of leaves of such a forest with elements of the set {−1, 1}, so that any pair of leaves that are consecutive binary sequences have distinct labels. The set of all such forests with labeled leaves and roots s1 , ..., sn will be denoted by F (s1 , ..., sn ). determines an element Consider a special normal form yst11 ...ystnn . Each equivalent special form yuv11 ...yuvm m of F (s1 , ..., sn ), which has leaves u1 , ..., um labeled respectively by t1 , ..., tm . We shall now characterise precisely which elements of F (s1 , ..., sn ) correspond to special forms equivalent to yst11 ...ystnn . Let C1 and C2 be finite binary trees rooted at the empty string, and with leaves {00, 01, 0} and {0, 10, 11} respectively. The forest T in F (s1 , ..., sn ) corresponding to the special form yst11 ...ystnn is simply the forest with n roots labelled by t1 , ..., tn , and no edges. If ti = 1, then performing an expansion move at ystii in yst11 ...ystnn produces )(ysi 0 ys−1 ...ystnn ) y )(ysti+1 (yst11 ...ysti−1 i−1 i+1 i 10 si 11 The forest corresponding to this special form is obtained by gluing the root of C2 at si in T , deleting the label on si , and labelling si 0, si 10, si 11 by 1, −1, 1 respectively. If ti = −1, then performing an expansion move at ystii in yst11 ...ystnn produces )(ys−1 y y −1 )(ysti+1 ...ystnn ) (yst11 ...ysti−1 i−1 i+1 i 00 si 01 si 1 The forest corresponding to this special form is obtained by gluing the root of C1 at si in T , deleting the label on si , and labelling si 00, si 01, si 1 by −1, 1, −1 respectively. So each expansion move corresponds to attaching exactly one of C1 or C2 to the leaf where the expansion move is performed, ans relabelling. This is determined by the exponent of the percolating element upon which it is performed. We make this precise below. In this context it makes sense to assume that the special form we begin with is a special normal form. (Recall the discussion in 6.12.) Lemma 6.18. Let yst11 ...ystnn be a special normal form. The elements of F (s1 , ..., sn ) that correspond to equivalent special forms are determined recursively by the following: (1) (The base case) The forest T with no edges, and n roots s1 , ..., sn labelled with t1 , ..., tn respectively. (2) (Expansion) Let T1 be an element of F (s1 , ..., sn ) that corresponds to a special form equivalent to yst11 ...ystnn . (a) Let s be a leaf of T1 labeled by 1. We obtain an element T2 ∈ F (s1 , ..., sn ) by gluing the root of C2 at s, deleting the label at s, and labelling s0, s10, s11 by 1, −1, 1 respectively. T2 corresponds to a special form equivalent to yst11 ...ystnn . (b) Let s be a leaf of T1 labeled by −1. We obtain an element T2 ∈ F (s1 , ..., sn ) by gluing the root of C1 at s, deleting the label at s, and labelling s00, s01, s1 by −1, 1, −1 respectively. T2 corresponds to a special form equivalent to yst11 ...ystnn . Every element of F (s1 , ..., sn ) that corresponds to a special form equivalent to yst11 ...ystnn can be obtained by applying a sequence of expansions described in (2) to the forest T described in the base case (1). A NONAMENABLE TYPE F∞ GROUP 25 We denote the set of 3-branching forests with n roots by F3,n . The set of forests obtained in Lemma 6.18 are in natural bijective correspondence with F3,n . We leave this a straightforward exercise for the reader. The main idea is that both trees C1 , C2 can be associated with a single ternary caret, i.e. a tree with a root connected with three leaves. Since each addition of C1 or C2 is determined by the label, this determines the correspondence. Now consider two elements T1 , T2 of F (s1 , ..., sn ) such that T1 , T2 have the same number of leaves. The forest pair (T1 , T2 ) determines a prefix replacement homeomorphism of the rational interval [s1 0∞ , sn 1∞ ]. The set of all such forest pairs is closed under composition and inverses, and hence forms a group of homeomorphisms of [s1 0∞ , sn 1∞ ]. In fact, the following holds. Lemma 6.19. Consider forest pairs (T1 , T2 ) ∈ Homeo+ ([s1 0∞ , sn 1∞ ]) such that: (1) T1 , T2 are forests in F (s1 , ..., sn ) corresponding to special forms equivalent to yst11 ...ystnn . (2) T1 , T2 have the same number of leaves. The set of all such pairs forms a group under composition. This group is isomorphic to F3,n . The isomorphism is described by the aforementioned bijection between forests pairs in F (s1 , ..., sn ) that correspond to equivalent special forms and forests diagrams for F3,n . Proof. The idea behind the proof is to mimic the tree diagrams for F3,n for this group while replacing the role of the ternary caret with C1 and C2 . The reader familiar with tree diagrams for F3,n will find this elementary.  Recall that the groups F3,n for n ∈ N>0 , are all isomorphic to the group F3,1 = F3 (see [6]). With this is mind, we proceed to the proof of our proposition. Proof of Proposition 6.17: Proof. Let yst11 ...ystnn be a special normal form. Consider f ∈ StabF (F yst11 ...ystnn ). If f does not act on s1 , ..., sn , we perform a sequence of expansion moves to obtain a special form yuv11 ...yuvm such that f acts m on u1 , ..., um . By our assumption, · f = F yfv1(u1 ) ...yfvm F yuv11 ...yuvm m (um ) = F yst11 ...ystnn tn t1 It follows that we can perform a sequence of contraction moves on yfv1(u1 ) ...yfvm (um ) to obtain ys1 ...ysn . We observe that the following holds for the element f : (1) f stabilises the intervals [0∞ , s1 0∞ ], [s1 0∞ , sn 1∞ ] and [sn 1∞ , 1∞ ]. (2) The restriction of f to [s1 0∞ , sn 1∞ ] admits a forest diagram (T1 , T2 ), where T1 , T2 are forests in F (s1 , ..., sn ) that correspond to special forms yuv11 ...yuvm and yfv1(u1 ) ...yfvm (um ) respectively. m This defines a monomorphism of StabF (F yst11 ...ystnn ) into F × F3,n × F . Thanks to Lemma 6.19 the projection to F3,n is surjective. Observe that we also have an epimorphism, since if we modify the restrictions to [0∞ , s1 0∞ ] and [sn 1∞ , 1∞ ] to any element of the copies of F supported on these respective  intervals, the new element is also in StabF (F yst11 ...ystnn ). Therefore, this is an isomorphism. 6.2. A detour on expansion moves and the expansion Lemmas. We now take a detour to prove two Lemmas concerning this notion of expansion moves which we shall make crucial use of in subsequent parts of the paper. We prove it here since this is the most natural place to prove it, even though we shall only make use of it later in the paper in Subsection 7.2 and also in the final Section. In particular, the reader will benefit from the intuition and some notation from the previous subsection while reading these proofs. 26 YASH LODHA In this section we use both notions of expansion coming from Definitions 6.10 and 3.16. The two notions are closely related, and we explore this relationship in some depth in this subsection. The notion of expansion moves as defined for special forms in 6.10 can be defined for any word yst11 ...ystnn with the property that s1 , ..., sn are independent and ti ∈ {−1, 1}. And the contents of the Lemma 6.11 also hold for such words with the same convention that equivalence for such words means that they lie in the same coset. Now expansion moves in the sense of 6.10 on percolating elements of yst11 ...ystnn correspond to a subset of elements of F (s1 , ..., sn ) as in the discussion above. Similar ideas as above apply in the situation where yst11 ...ystnn is not a special form, but satisfies that s1 , ..., sn are independent and ti ∈ {−1, 1}. In particular, the set of equivalent Y -words obtained by applying such expansion moves on yst11 ...ystnn is in natural bijective correspondence with finite 3-ary trees with n roots. Before we proceed, we state the elementary relationship between the two notions of expansion. Lemma 6.20. Consider a word yst11 ...ystnn with the property that s1 , ..., sn are independent and ti ∈ {−1, 1}. be obtained from performing expansion moves on yst11 ...ystnn in the sense of Definition 6.10. Let yuv11 ...yuvm m Then there is an f ∈ F such that f yuv11 ...yuvm can be obtained from performing expansion (followed by m rearrangement) moves on yst11 ...ystnn in the sense of Definition 3.16. Moreover, Supp(f ) ⊆ Supp(yst11 ...ystnn ) and f −1 acts on u1 , ..., un . Proof. This follows immediately from the definitions.  Now we state and prove the weak expansion Lemma. Lemma 6.21. (Weak expansion Lemma) Let yst11 ...ystnn and yuv11 ...yuvm be words satisfying that: m (1) s1 , ..., sn are independent and t1 , ..., tn ∈ {1, −1}. (2) u1 , ..., um are independent and v1 , ..., vm ∈ {1, −1}. (3) F yst11 ...ystnn = F yuv11 ...yuvm m Then we can perform expansion moves (in the sense of 6.10) on both words to obtain the same word ypq11 ...ypqll such that p1 , ..., pl are independent and q1 , ..., ql ∈ {1, −1}. Proof. Performing a sequence of contraction moves on both words produces the same Y -word yrj11 ...yrjkk in normal form, thanks to Corollary 5.9. The set of Y -words obtained by applying a sequence of expansion moves on yrj11 ...yrjkk corresponds to finite 3-ary forests with k roots. (Recall the discussion in the previous subsection.) Two such forests correspond to yst11 ...ystnn and yuv11 ...yuvm . By adding ternary carets to both these forests, we produce the same forest, m which corresponds to a Y -word ypq11 ...ypqll with the desired properties.  The Strong expansion Lemma will provide the core technical step in the proof of asphericity in the last section. Before we state and prove the Lemma, we consider additional elementary feature of expansions. The reader familiar with the arguments in [16] will already be aware of this, but for the sake of completeness we discuss first the following feature. As a motivating example, consider the expansion −1 −1 −1 −1 ys = xs ys0 ys10 ys11 . Now taking inverses, we obtain ys−1 = ys11 ys10 ys0 xs . Now x−1 s (s11) = s1 x−1 s (s10) = s01 x−1 s (s0) = s00 So upon applying a rearrangement move, followed by commutation moves we get −1 −1 −1 −1 −1 −1 −1 −1 ys11 ys10 ys0 xs = x−1 s ys1 ys01 ys00 = xs ys00 ys01 ys1 −1 −1 And xs−1 ys00 ys01 ys1 is precisely the result of applying an expansion move (in the sense of 3.16) to ys−1 . Using an elementary inductive argument this generalises to the following: A NONAMENABLE TYPE F∞ GROUP 27 Lemma 6.22. Let yst be such that t ∈ {1, −1}. Let f yst11 ...ystnn be a standard form obtained from applying expansion moves (in the sense of 3.16) to yst . Then f −1 acts on s1 , ..., sn and f −1 yft1−1 (s1 ) ...yftn−1 (sn ) can be obtained from applying expansion moves (in the sense of 3.16) to ys−t . Definition 6.23. Let yst and yuv be a pair of percolating elements such that t, v ∈ {1, −1}. Then the pair is said to contain no common offsprings if the following holds: For any pair yst11 ...ystnn and yuv11 ...yuvm m obtained from performing expansion moves (in the sense of 6.10) on yst and yuv respectively, each pair v ystii , yujj is distinct. For the negation of the above, we say that the pair yst and yuv contains common offsprings. That is, yst and yuv contain common offsprings if there are yst11 ...ystnn and yuv11 ...yuvm obtained from performing expansion m v moves on yst and yuv respectively (in the sense of 6.10) such that ystii = yujj for some 1 ≤ i ≤ n, 1 ≤ j ≤ m. Note that for a pair yst and yuv , if s, u are independent, then the pair contains no common offsprings. However, the case where u ⊆ s is more subtle. The following criterion is useful in detecting if such a pair does not have common offsprings. Lemma 6.24. Let yst and yuv be such that t, v ∈ {1, −1} and u ⊆ s. If yst and yuv have common offsprings then the standard form yst yu−v contains a potential cancellation. Proof. Assume that yst and yuv have common offsprings. Then we can apply expansion moves in the sense v of 6.10 to obtain words yst11 ...ystnn and yuv11 ...yuvm such that ystii = yujj for some pair i, j. Now there are m elements f, g ∈ F such that f yst11 ...ystnn and gyuv11 ...yuvm can be obtained from yst and yuv respectively using m expansions in the sense of 3.16. By Lemma 6.22 we know that g −1 acts on u1 , ..., um . Note that g −1 acts on si since si = uj . We also ensure that g −1 acts on elements of the set s1 , ..., sn by performing expansion moves (in the sense of 3.16) to percolating elements , ...ystnn , ysti+1 yst11 , ..., ysti−1 i+1 i−1 in the word f yst11 ...ystnn if necessary. Note that the resulting word also witnesses the common offspring since it contains the percolating element ystii . For notational convenience we also denote the resulting word by f yst11 ...ystnn . −vm −v 1 using expansions By Lemma 6.22, we know that the word g −1 yg−v −1 (u ) ...yg −1 (u ) can be obtained from yu 1 m in the sense of 3.16. So we get −vm 1 yst yu−v = (f yst11 ...ystnn )g −1 yg−v −1 (u ) ...yg −1 (u ) 1 m −vm 1 = f g −1 (ygt1−1 (s1 ) ...ygtn−1 (sn ) )yg−v −1 (u ) ...yg −1 (u ) 1 m v j t −v Now since ygti−1 (si ) = yg−1 (uj ) we can see that there is a potential cancellation in ys yu .  The Strong expansion Lemma, which we state and prove below, shall be play a role in of the proof of asphericity of X in the final section. Lemma 6.25. (Strong expansion Lemma) Let yst11 ...ystnn and yuv11 ...yuvm be words such that s1 , ..., sn and m u1 , ..., um are independent, and each ti , vj ∈ {1, −1}. Then there are words ypq11 ...ypqll and yrw11 ...yrwkk such that: (1) ypq11 ...ypqll is obtained from yst11 ...ystnn by applying expansion moves as in 6.10. (2) yrw11 ...yrwkk is obtained from yuv11 ...yuvm by applying expansion moves as in 6.10. m w w w (3) For each pair ypqii , yrjj it holds that either ypqii = yrjj or ypqii , yrjj contains no common offsprings. as the words Proof. We show this by induction on n. For the base case, we consider yst and yuv11 ...yuvm m such that u1 , ..., um are independent, and each t, vj ∈ {1, −1}. We apply expansion moves to yuv11 ...yuvm m 28 YASH LODHA to obtain a special form yrw11 ...yrwkk with depth greater than |s|. It follows that the word (yrw11 ...yrwkk )ys−t is a standard form up to commutation. Now using Step 1 in the proof of Theorem 5.4, we reduce the word (yrw11 ...yrwkk )ys−t to a word with no potential cancellations. In this process, we obtain 1 k ...yfw(r )(ypq11 ...ypqll ) (yrw11 ...yrwkk )f (ypq11 ...ypqll ) = f (yfw(r 1) k) such that: (1) f (ypq11 ...ypqll ) is obtained from performing a sequence of expansion moves (in the sense of 3.16) on ys−t . q q i i ypjj does , ypjj satisfies that either f (ri ) = pj , wi = −qj or the standard form yfw(r (2) Each pair yfw(r i) i) not contain a potential cancellation. We claim that the words yrw11 ...yrwkk −ql 1 yf−q −1 (p ) ...yf −1 (p ) 1 l witness the statement of the Lemma. First, thanks to Lemma 6.22 note that −ql 1 f −1 yf−q −1 (p ) ...yf −1 (p ) 1 l is obtained by yst using expansion moves (in the sense of 3.16). In particular, −ql 1 yf−q −1 (p ) ...yf −1 (p ) 1 l is obtained by yst using expansion moves (in the sense of 6.10). −q Next, if there is a pair yrwii , yf −1j (pj ) which is not equal and have a common offspring, then by Lemma q 6.24 the word yrwii yfj−1 (pj ) has a potential cancellation. Since f acts on both ri and f −1 (pj ), we get q i y qj yrwii yfj−1 (pj ) · f = f yfw(r i ) pj q i ypjj has a potential cancellation. This contraSince f is merely a prefix replacement map, the word yfw(r i) dicts conclusion (2) from the above. Now the inductive step is essentially the same as the base case. Given yst11 ...ystnn and yuv11 ...yuvm , we m t v1 vm tn and y ...y , and then for y perform the process for yst11 ...ysn−1 and the resulting Y -word obtained n−1 u1 um sn by expansions. In the latter step, only the part of the word whose support intersects from yuv11 ...yuvm m that of ystnn is expanded, and so the resulting offsprings from those expansions have disjoint support with t  yst11 ...ysn−1 n−1 . 7. The complex X The goal of this section is to define the complex X by adding higher dimensional cells to the 1-skeleton X (1) defined in the previous section. We define a class of finite subgraphs in X (1) that shall be the 1skeletons of clusters in X. The set of all such graphs will be denoted throughout the paper as H. Higher cells will be then added to graphs in H, and hence to X (1) in a well defined and G-equivariant manner. Before we state the main definition of H, we state a few preliminary definitions. This language will be useful in describing elements of H. are said to be independent if each pair si , pj is Definition 7.1. Special forms yst11 ...ystnn and ypq11 ...ypqm m independent. A list of special forms τ1 , ..., τn is said to be independent if the special forms are pairwise independent. A list τ1 , ..., τn is said to be sorted if it satisfies the following: (1) τ1 , ..., τn are independent. (2) For each i < j, the pair τi , τj satisfies that if yst and yuv are percolating elements that appear in τi and τj respectively, then s < u. A NONAMENABLE TYPE F∞ GROUP 29 Informally, the second condition here means that τ1 , ..., τn appear in the order left to right as visualised in the infinite rooted binary tree. The following is a basic observation that will be useful throughout the paper. The proof of this is an elementary exercise concerning expansion moves in the sense of 6.10, and the partial action of elements of F on the set of finite binary sequences. Lemma 7.2. Let τ1 , ..., τn be a sorted list of special forms. The following holds. (1) If τ1′ , ..., τn′ are special forms such that τi , τi′ are equivalent, then τ1′ , ..., τn′ is also a sorted list. (2) Let f ∈ F be such that for each percolating element yst in any τi , f acts on s. Let τi′ be the special form obtained from replacing each yst in τi with yft (s) . Then τ1′ , ..., τn′ is a sorted list. Throughout the paper, we fix the Q Q following convention for a sorted list τ1 , ..., τn . Given X ⊆ {1, ..., n}, we denote τX = i∈X τi . Here i∈X τi denotes a formal word obtained by concatenation of the τi for i ∈ X in the increasing order of indices. So for instance, if X = {1, 3, 4}, then τX = τ1 τ3 τ4 . Definition 7.3. An element C of H is a subgraph of X (1) which is determined by the following: (1) A sorted list of special forms τ1 , ..., τn . (2) A coset F τ . Then C is the induced subgraph of the vertex set {F τX τ | X ⊆ {1, ..., n}} (1) in X . The above information is said to be a description of C. We say that C is described by the base F τ and parameters τ1 , ..., τn . It will be often convenient to choose τ above as a Y -word, and later in the paper we shall make this a convention for certain definitions. Observe that each closed 1-cell in X (1) is an element of H. To see this, recall that each 1-cell F τ1 , F τ2 satisfies that F τ2 τ1−1 = F ν where ν is a special form. It follows that F τ2 = F ντ1 , and so the 1-cell admits a description with base F τ1 and parameter ν. 7.1. Descriptions of graphs in H and the G-action. A graph in H can be described in many different ways. For example, the closed 1-cell F y10 , F can be described with base F and parameter y10 , or with −1 base F y10 and parameter y10 . Since graphs in H shall emerge as 1-skeletons of clusters in X, we shall describe clusters in X by describing their 1-skeleton in H. Therefore, it shall be useful to understand different kinds of descriptions of graphs in H. Much of the technical difficulty in this article arises from dealing with non-uniqueness of the descriptions of clusters. Given a graph in H, we can find a description with any given node of the graph as base. This follows immediately from the definitions and is captured in the following Lemma. Lemma 7.4. Let C ∈ H be described with base F τ and parameters τ1 , ..., τn . Then for any X ⊆ {1, ..., n}, C admits a description with base F τX τ , and parameters τ1s1 , ..., τnsn , where si = −1 if i ∈ X and si = 1 otherwise. Next, we observe that replacing parameters by equivalent special forms describe the same graph. Lemma 7.5. Let C ∈ H be described with base coset F τ and parameters τ1 , ..., τn . Let τ1′ , ..., τn′ be special forms such that τi′ is equivalent to τi . Then C also admits the description with base coset F τ and parameters τ1′ , ..., τn′ . Proof. Since they are equivalent, it follows that τi′ can be obtained from τi by a sequence of expansion and contraction moves in the sense of 6.10. In particular, from Lemma 6.20 we know that there are fi ∈ F such that: 30 YASH LODHA (1) τi = fi τi′ for 1 ≤ i ≤ n. (2) The support of fi is contained in the support of τi , which equals the support of τi′ . This means that fi , τj′ commute if i 6= j. It follows that for each X ⊆ {1, ..., n}, we have F τX τ = ′ F τX τ.  A nice consequence of the above is that when describing the graph C, we can conveniently choose parameters with desired features. For instance, in some cases it may be useful to choose parameters with sufficiently large depth. We end this section with the following useful remark about the choice of base coset. Remark 7.6. Let C be a cluster described with base F τ and parameters τ1 , ..., τn . The word τ may not be a Y -word, but we can find a different description for C whose base coset representative is a Y -word. This is done as follows. First we convert the word τ into a standard form f ν1 , where f ∈ F and ν1 is a Y -word. Let τi′ be a special form obtained by applying expansion moves on τi such that for each yst that occurs in τi′ , f acts on s. Let τi′′ be the special form obtained by replacing each percolating element yst in τi′ by yft (s) . It follows from Lemma 7.2 that τ1′′ , ..., τn′′ is a sorted list. So for each X ⊆ {1, ..., n} ′′ F τX τ = F τX f ν1 = F τX ν1 We conclude that C admits a description with base at F ν1 and with parameters τ1′′ , ..., τn′′ . Lemma 7.7. Let C ∈ H. For an element ν ∈ G, C · ν is also an element of H. Proof. Let C be described with base F τ and parameters τ1 , ..., τn . Then C · ν is a cluster that admits a description with base F (τ ν) and parameters τ1 , ..., τn .  Lemma 7.7 is a simple observation, but has useful consequences. For instance, while formulating our arguments we shall often assume that a given cluster is based at the trivial coset, using transitivity of the G-action on X (0) . 7.2. H is closed under intersection. Our goal now is to show the following. Proposition 7.8. Let C1 , C2 ∈ H. If C1 ∩ C2 is nonempty, then it is an element of H. First we observe the following. If F τ is a node in C1 ∩ C2 , acting upon this by τ −1 , we obtain (C1 ∩ C2 ) · τ −1 = (C1 · τ −1 ) ∩ (C2 · τ −1 ) Thanks to Lemma 7.7, C1 ∩C2 ∈ H if and only if (C1 ·τ −1 )∩(C2 ·τ −1 ) ∈ H. The advantage of considering the latter is that the node given by the trivial coset F lies in (C1 · τ −1 ) ∩ (C2 · τ −1 ). Before we supply a full proof of Proposition 7.8, we need to achieve a preliminary understanding of the situation. In this subsection we describe conceptual ingredients that are needed in the proof. Definition 7.9. Let τ1 , ..., τn and λ1 , ..., λm be sorted lists. Such a pair of sorted lists is said to be compatible if the following holds. For each X ⊆ {1, ..., n}, Y ⊆ {1, ..., m} if τX , λY are equivalent, then τX and λY are equal as words. Lemma 7.10. Let τ1 , ..., τn and λ1 , ..., λm be sorted lists. Then there is a compatible pair of sorted lists τ1′ , ..., τn′ and λ′1 , ..., λ′m such that τi , τi′ and λi , λ′i are equivalent for each 1 ≤ i ≤ n. Proof. This follows from an application of Lemma 6.21 on the words τ{1,...,n} , λ{1,...,m} .  A NONAMENABLE TYPE F∞ GROUP 31 Definition 7.11. Let τ1 = yst11 ...ystnn and τ2 = yuv11 ...yuvm be special forms. τ1 , τ2 are said to be consecutive, m if sn , u1 are consecutive. τ1 , τ2 are said to be alternating if they are consecutive, and also satisfy that v1 = −tn . It follows from the definition that τ1 , τ2 are alternating if and only if the product word τ1 τ2 is a special form. A list τ1 , ..., τn of special forms is said to be alternating if each pair τi , τi+1 is alternating for 1 ≤ i ≤ n − 1. It follows that τ1 , ..., τn is alternating if and only if the word τ1 ...τn is a special form. Consider C ∈ H described at base F and with parameters τ1 , ..., τn . Observe that for a nonempty set X ⊆ {1, ..., n}, there is an edge connecting F and F τX if and only if X = {i, i + 1, i + 2, ..., j} so that τi , τi+1 , ..., τj are alternating. This motivates the following. Definition 7.12. Let τ1 , ..., τn be as above. A subset {τi , τi+1 , τi+2 , ..., τj } ⊆ {τ1 , ..., τn } is said to be an alternating block if τi , τi+1 , τi+2 , ..., τj are alternating. We abuse notation and also refer to the subset of indices {i, i + 1, ..., j} ⊆ {1, ..., n} as an alternating block. This special usage will be clear from the context. Given the sorted list above, a block decomposition is given by the sets {1, ..., l1 }, {l1 + 1, l1 + 2, ..., l2 }, ..., {lk + 1, ..., n} where each set is an alternating block and 1 ≤ l1 < ... < lk < n. Clearly, any sorted list admits a unique partition into maximal alternating blocks. This is called the maximal block decomposition of the sorted list. −1 −1 Example 7.13. Consider the sorted list y010 , y011 , y10 , y110 . The maximal block decomposition of this is −1 −1 {y010 , y011 }, {y10 , y110 } −1 −1 Note that y011 , y10 are consecutive (since 011, 10 are consecutive binary sequences), but they are not alternating. Lemma 7.14. Let τ1 , ..., τn and λ1 , ..., λm be sorted lists of special normal forms such that τ{1,...,n} and λ{1,...,m} are equal as words. Then for each maximal alternating block U ⊆ {1, ..., n} of the former, there is a maximal alternating block V ⊆ {1, ..., m} of the latter such that τU = λV . In other words, there is a natural bijection between the maximal block decompositions of τ1 , ..., τn and λ1 , ..., λm . Proof. We read both words from left to right and partition them as we go along.  By definition, the set of nodes of a graph in H naturally forms a boolean algebra in the sense of an algebra of subsets of a given finite set. We recall the analogous notion for a collection of subsets. Definition 7.15. Let X be a collection of subsets of the set {1, ..., n}. We say that X is boolean, if there are elements X1 , ..., Xk ∈ X such that: (1) X1 , ...,S Xk are pairwise disjoint. (2) X = { i∈Z Xi | Z ⊆ {1, ..., k}}. Under the partial ordering of inclusion, the sets X1 , ..., Xk are the minimal elements of X. The minimal elements of a boolean collection will be referred to as the atoms of the boolean collection. Any subcollection X ⊆ 2{1,...,n} that is closed under taking unions and set difference is a boolean subcollection. Lemma 7.16. Let τ1 , ..., τn and λ1 , ..., λm be a compatible pair of sorted lists. Let X = {X ⊆ {1, ..., n} | τX = λY for some Y ⊆ {1, ..., m}} Y = {Y ⊆ {1, ..., m} | τX = λY for some X ⊆ {1, ..., n}} Then both X, Y are boolean sub collections. 32 YASH LODHA Proof. We show this for X, the proof for Y is the same. In what follows below equality denotes equality as words. Let X1 , X2 ⊆ X. Then there are Y1 , Y2 ∈ Y such that τX1 = λY1 and τX2 = λY2 . It follows that τX1 ∪X2 = λX1 ∪X2 and τX1 \X2 = λX1 \X2 . Since X is closed under unions and set difference, we are done.  Next we demonstrate that subgraphs of C ∈ H that are elements of H correspond precisely to certain boolean subcollections. Lemma 7.17. Let C ∈ H and let C ′ ⊂ C be an element of H. Then C admits a description with bases at F τ and parameters τ1 , ..., τn such that the following holds. There is a boolean collection X ⊂ 2{1,...,n} such that C ′ admits the following description. (1) Base at F τ . (2) The elements of the set {τX | X is an atom of X} are all special forms that are the parameters. Proof. By the G-action, we can assume that the trivial coset F lies in C ∩ C ′ . We find a compatible pair of sorted lists τ1 , ..., τn and ν1 , ..., νm that are parameters for descriptions of C, C ′ respectively with both bases at F . Let X = {X ⊆ {1, ..., n} | F τX = F λY for some Y ⊆ {1, ..., m}} Since the sorted lists are compatible, X = {X ⊆ {1, ..., n} | τX = λY for some Y ⊆ {1, ..., m}} Thanks to Lemma 7.16, X is a boolean subcollection. In particular, {τX | X is an atom of X} are all special forms that are the parameters of C ′ with base F .  Remark 7.18. The following converse of the above Lemma follows immediately from the definitions. Let C be the cluster described with base F τ and parameters τ1 , ..., τn . Consider a boolean collection X ⊂ 2{1,...,n} which satisfies that the elements of {τX | X is an atom of X} are all special forms. Then there is a subgraph C ′ ⊂ C which lies in H, and is described with base F τ and parameters in the set above. Proof of Proposition 7.8 Proof. Let C1 , C2 be our clusters in H. Thanks to Lemmas 7.5 and 7.10, we can assume that C1 , C2 are both described with base at the trivial coset F and parametrised by a compatible pair of sorted lists τ1 , ..., τn and ν1 , ..., νm respectively. Let X = {X ⊆ {1, ..., n} | F τX ∈ C1 ∩ C2 } = {X ⊆ {1, ..., n} | F τX = F λY for some Y ⊆ {1, ..., m}} = {X ⊆ {1, ..., n} | τX = λY for some Y ⊆ {1, ..., m}} Thanks to Lemma 7.16, X is a boolean subcollection. We will show that each atom U of X satisfies that U is an alternating block, i.e. τU is a special form. Let V ⊆ {1, ..., m} be such that τU = νV . Let U = {u1 , ..., uk } and V = {v1 , ..., vl } be the elements listed in increasing order. Applying Lemma 7.14 to the sorted lists (of normal special forms) τu1 , τu2 ..., τuk νv1 , νv2 , ..., νvl we conclude that any maximal alternating block U1 ⊆ U corresponds to a maximal alternating block V1 ⊆ V satisfying equality of words τU1 = νV1 . But this means that F τU1 = F νV1 and so F τU1 ∈ C1 ∩ C2 . Therefore U1 ∈ X. By minimality of U it follows that U1 = U and so U is an alternating block. A NONAMENABLE TYPE F∞ GROUP 33 This means that C1 ∩ C2 is described with base F and parameters in the set {τU | U is an atom of X} and hence is an element of H as desired.  7.3. Graphs in H as 1-skeletons of clusters. We demonstrate that an element C ∈ H is the 1-skeleton of a cluster in the sense of Definition 4.1. This identification emerges in a natural way by considering descriptions of graphs in H that we call proper descriptions. A proper description for C involves a certain elementary condition on the parameters which we describe below. Definition 7.19. Let τ1 , ..., τn be a sorted list of special forms. We say that the sorted list is proper, if whenever a pair τi , τi+1 is consecutive, then it is also alternating. Observe that given any pair of consecutive special forms τ1 , τ2 , exactly one of τ1 , τ2−1 or τ1 , τ2 is alternating. (Recall the discussion in Remark 6.8 concerning the notation τ2−1 .) Indeed, given any sorted list of special forms τ1 , ..., τn , there are numbers s1 , ..., sn ∈ {1, −1} such that τ1s1 , ..., τnsn is proper. (To see this, perform an elementary induction on n.) Lemma 7.20. Any element C ∈ H admits a description where the parameters are proper. Moreover, we can also arrange it so that the parameters are all normal forms. Proof. Let C be described with base F τ where τ is a Y -word, and parameters τ1 , ..., τn . Let s1 , ..., sn ∈ {1, −1} be such that τ1s1 , ..., τnsn is proper. Then C admits the following description: (1) Base F τX τ , where X = {i ∈ {1, ..., n} | si = −1}. (2) Parameters τ1s1 , ..., τnsn . Finally, by applying a sequence of contraction moves to τ1s1 , ..., τnsn , we obtain a proper list of special normal forms. To see this, one simply checks the following. If ν1′ , ν2′ are obtained from ν1 , ν2 respectively by applying contraction and/or expansion moves, then ν1′ , ν2′ are alternating if and only if ν1 , ν2 are alternating.  Definition 7.21. We call a description of C ∈ H with proper parameters as a proper description. The advantage of a proper description for C is that the edge relation between nodes of C is easier to characterise. Lemma 7.22. Let C ∈ H be described with base F τ where τ is a Y -word, and proper parameters τ1 , ..., τn . Then the nodes F τX τ, F τY τ for X, Y ⊆ {1, ..., n} form an edge if and only if one of the following holds: (1) X ⊂ Y and τY \X is a special form. (2) Y ⊂ X and τX\Y is a special form. Proof. If F τX τ, F τY τ form an edge, this means that Y Y τj−1 τi τX τY−1 = i∈X\Y j∈Y \X is a special form. If both X \ Y and Y \ X are nonempty, then there must be an alternating pair of the −1 form τi , τi+1 or τi−1 , τi+1 . In either case, this contradicts the assumption that the parameters are proper. The converse follows immediately from the definition of the edge relation in X (1) .  Now we are ready to provide the identification between elements of H and 1-skeletons of clusters. Proposition 7.23. Let C ∈ H be described by base F τ where τ is a Y -word, and proper parameters τ1 , ..., τn . Then C is isomorphic to the 1-skeleton of an n-cluster in the sense of Definition 4.1. 34 YASH LODHA Proof. Without loss of generality (thanks to Lemma 7.7) we can assume that C is based at the trivial coset. Define Y = {i ∈ {1, ..., n − 1} | τi τi+1 is a special form} Now define the hyperplane arrangement A in Rn consisting of the following hyperplanes: (1) xi = 0, xi = 1, 1 ≤ i ≤ n. (2) xi = xi+1 for i ∈ Y. Clearly, A is admissible. We claim that the 1-skeleton of C(A) is isomorphic to C. The 0-cells of C(A) are naturally in bijection with subsets of {1, ..., n} as follows. A subset X ⊆ {1, ..., n} corresponds to the 0-cell given by the coordinates (y1 , ..., yn ) where yi = 0 if i ∈ / X and yi = 1 if i ∈ X. Observe that the 1-cells of C(A) are in a natural bijection with partitions of {1, ..., n} into three sets X1 , X2 , X3 such that: (1) X1 , X2 , X3 are pairwise disjoint and X1 ∪ X2 ∪ X3 = {1, ..., n}. (2) X3 = {j, j + 1, ..., k} ⊂ {1, ..., n} such that for each j ≤ i ≤ k − 1, i ∈ Y. The 1-cell corresponding to such a pair is the affine line segment connecting the 0-cells (y1 , ..., yn ) and (z1 , ..., zn ) given by the following coordinates: (y1 , ..., yn ) yi = 0 if i ∈ X1 ∪ X3 and yi = 1 if i ∈ X2 (z1 , ..., zn ) zi = 0 if i ∈ X1 and yi = 1 if i ∈ X2 ∪ X3 This is precisely the intersection of the following collection of hyperplanes with [0, 1]n : {{xi = 1} | i ∈ X1 } ∪ {{xi = 0} | i ∈ X2 } ∪ {{xi = xj } | i, j ∈ X3 } (1) We now define the graph isomorphism between C(A) and C. First, we identify the 0-cell given by X ⊆ {1, ..., n} in C(A) with the 0-cell F τX of C. Then we identify the 1-cell of C(A) given by a pair X1 , X2 (satisfying the above) with the 1-cell connecting the pair F τX1 , F τX1 ∪X2 . This identification (1) provides the isomorphism between C(A) and C.  We now show that the identification above is independent of the choice of proper description. Lemma 7.24. Let C ∈ H and let C(A) be the cluster identified with a proper description of C in Proposition 7.23. Then this identification is the same for any other choice of proper parameters describing C. Proof. By G-equivariance, we can assume the the base of the given description is the trivial coset, with proper parameters τ1 , ..., τn . Let A1 , ..., Ak ⊆ {1, ..., n} be the maximal block decomposition for {τ1 , ..., τn }. With Lemmas 7.4 and 7.5 in mind, observe that any proper description of C (upto replacing equivalent special forms as parameters) is determined by a set of numbers s1 , ..., sn ∈ {1, −1} such that: (1) si = sj whenever i, j ∈ Al for some 1 ≤ l ≤ k. (2) The base coset is F τX where X = {1 ≤ i ≤ n | si = −1}. (3) The parameters are τ1s1 , ..., τnsn . Let A1 be the hyperplane arrangement in Rn given by: (1) {xi = 0}, {xi = 1}, 1 ≤ i ≤ n. (2) {xi = xi+1 } for i ∈ {1 ≤ j ≤ n − 1 | τj τj+1 is a special form}. Let A2 be the hyperplane arrangement in Rn given by: (1) {xi = 0}, {xi = 1}, 1 ≤ i ≤ n. s sj+1 is a special form}. (2) {xi = xi+1 } for i ∈ {1 ≤ j ≤ n − 1 | τj j τj+1 A NONAMENABLE TYPE F∞ GROUP 35 It follows that both arrangements are the same and hence describe the same cluster. By symmetries of this n-cluster, we are done.  7.4. Higher dimensional cells in X. Proposition 7.23 provides an identification of an element C ∈ H with the 1-skeleton of an n-cluster C(A). Definition 7.25. Given C ∈ H, let C(A) be the n-cluster whose 1-skeleton is identified with C in Proposition 7.23. A filling C of C is obtained by adding the higher cells of C(A) to C in X (1) . The complex X is obtained from X (1) by “filling” each graph in H. In other words, [ X= C C∈H We show that the fillings are well defined and indeed produce a CW complex X upon which G acts. Lemma 7.26. The fillings of H are G-equivariant. In other words, for each C ∈ H, ν ∈ G, if C1 = C · ν then C · ν = C1 In particular, the G-action on X (1) naturally extends to the G-action on X. Proof. Let C be described with base F τ , where τ is Y -word, and proper parameters τ1 , ..., τn . Let ν ∈ G. Then C · ν admits a description with base F (τ ν) and proper parameters τ1 , ..., τn . The hyperplane arrangements A1 for C and A2 for C · ν as described in the proof of Proposition 7.23 are both: (1) {xi = 0}, {xi = 1}, 1 ≤ i ≤ n. (2) {xi = xi+1 } for i ∈ {1 ≤ j ≤ n − 1 | τj τj+1 is a special form}. Therefore, the group action preserves the identification.  We end the section by demonstrating that X is indeed a CW complex. This follows immediately once we combine Proposition 7.8 with the following. Proposition 7.27. Let C1 , C2 ∈ H such that C1 ⊂ C2 . Then C1 agrees with the subcomplex of C2 determined by C1 ⊂ C2 . Proof. By considering the G-action, we assume without loss of generality that C1 , C2 both contain the trivial coset as a node. Let C2 be described with base F and parameters τ1 , ..., τn . By Lemma 7.17, there is a boolean collection X ⊂ 2{1,...,n} such that C1 admits the following description. (1) Base at F . (2) The elements of the set {τX | X is an atom of X} are all special forms that are the parameters. Let X1 , ..., Xk ⊂ {1, ..., n} be the minimal elements of this boolean collection appearing in increasing order. If i, i + 1 ∈ Xj for some 1 ≤ j ≤ k, then τi , τi+1 are alternating. Using this fact, it is easy to find numbers s1 , ..., sn such that: (1) τ1s1 , ..., τnsn is proper. (2) si = si+1 if i, i + 1 ∈ Xj for some 1 ≤ j ≤ k. tk t1 In particular, the list τX , ..., τX is proper, where tj equals sl for any l ∈ Xj . This provides proper 1 k descriptions of C1 , C2 with base F τY where Y = {i ∈ {1, ..., n} | si = −1}, and proper parameters tk t1 τ1s1 , ..., τnsn and τX , ..., τX respectively. 1 k Let A1 be the arrangement of hyperplanes: (1) {xi = 0}, {xi = 1}, 1 ≤ i ≤ n. (2) {xi = xi+1 } whenever τi τi+1 is a special form. Now define a k-dimensional flat U of A1 as the intersection of the following hyperplanes. S (1) {xi = 0} for i ∈ / 1≤i≤k Xk . 36 YASH LODHA (2) {xi = xi+1 } with i for which there is a 1 ≤ j ≤ k such that i, i + 1 ∈ Xj . Let A2 be the arrangement of hyperplanes obtained from restricting the arrangement A1 to the flat U . It is an elementary exercise in hyperplane arrangements to show that A2 is naturally isomorphic to the arrangement in Rk given by: (1) {xi = 0}, {xi = 1}, 1 ≤ i ≤ k. (2) {xi = xi+1 } for i such that τXi τXi+1 is a special form. This proves that the restriction of C2 to C1 is indeed equal to C1 .  8. The action of G on X For the rest of the article, we shall identify elements of H with their fillings, and denote these as clusters. So given C ∈ H, we shall simply use C to denote the filled cluster. In this section we study the action of G on X. We prove the following: Proposition 8.1. The stabiliser StabG (e) of any cell e of X is a group of type F∞ . More particularly, it is a finite product of copies of the groups F3 and F . Proposition 8.2. The quotient X/G has finitely many cells in each dimension. 8.1. Stabilisers of cells. Given any n-cell e in X, by the construction of X there is an n-cluster C ∈ H that contains e. Let C be described with base F τ , where τ is a Y -word and proper parameters τ1 , ..., τn . Then the cluster C1 = C · τ −1 admits a description with base F and the same parameters τ1 , ..., τn as C. It follows that there is an n-cell e′ of C1 such that e′ = e · τ −1 , and hence StabG (e) ∼ = StabG (e′ ). So it suffices to understand the stabiliser of e′ . For the rest of this subsection we fix the description of C1 and e′ . First, we make an elementary observation. Lemma 8.3. The closure of e′ contains F and F τ{1,...,n} . Proof. The cluster C1 ∈ H is isomorphic to the cluster (in the sense of definition 4.1) described by the following hyperplanes in Rn . (1) {xi = 1}, {xi = 0}, 1 ≤ i ≤ n. (2) {xi = xi+1 } for i such that τi τi+1 is a special form. The closure of an n-cell is an intersection of certain half spaces of the form {xi ≥ 0} {xi ≤ 1} {xi ≤ xi+1 } {xi ≥ xi+1 } All these half-spaces contain the points (0, ..., 0) and (1, ..., 1), which correspond to the nodes F and F τ{1,...,n} of C1 .  An important step in understanding the stabiliser StabG (e′ ) is to demonstrate that StabF (e′ ) = StabG (e′ ). The stabiliser StabF (e′ ) is much easier to understand, since we already have developed a theory of the action of F on Ω. In order to show that StabF (e′ ) = StabG (e′ ), we first need to prove the following generalisation of Proposition 6.17. Lemma 8.4. Let τ1 , ..., τn be a proper list of special forms as above, and let X1 , ..., Xk ⊂ {1, ..., n} be pairwise disjoint sets. Then \ StabF (F τXi ) 1≤i≤k is a finite direct product of copies of F and F3 . Proof. For a given X ⊂ {1, ..., n}, let Y1 , ..., Yl be the maximal block decomposition of X. First we claim that \ StabF (F τXi ) = StabF (F τYj ) 1≤j≤l A NONAMENABLE TYPE F∞ GROUP 37 It is clear that the latter is a subset of the former. So we need to show that if f ∈ StabF (F τX ), then f ∈ StabF (F τYi ) for each 1 ≤ i ≤ l. We show this for the case l = 2. The general case follows from a straightforward induction that uses the same idea as in the base case. For notational simplicity, we denote τY1 = ψ1 and τY2 = ψ2 . Let ψ1′ , ψ2′ be special forms obtained by applying expansion moves on ψ1 , ψ2 such that for each percolating element yst of ψ1 or ψ2 , f acts on s. Let ψ1′′ , ψ2′′ be special forms obtained by replacing each percolating element yst by yft (s) . Since F ψ1 ψ2 · f = F ψ1′′ ψ2′′ = F ψ1 ψ2 we can apply a sequence of contraction and expansion moves on ψ1′′ ψ2′′ to obtain ψ1 ψ2 . Now since Y1 , Y2 were assumed to be maximal alternating blocks, we know that ψ1 , ψ2 are not alternating. Therefore, it must be the case that we can apply a sequence of contraction and expansion moves to ψ1′′ to obtain ψ1 and a sequence of contraction and expansion moves on ψ2′′ to obtain ψ2 . It follows that f ∈ StabF (F ψ1 ) ∩ StabF (F ψ2 ) So our claim holds. Now we apply the above claim to each Xi in the sets X1 , ..., Xk from the statement of the Lemma. Reasoning along the lines of Proposition 6.17, we obtain that the restriction of the element f on the support of each maximal alternating block of each Xi must be a tree diagram in natural correspondence with a tree diagram of an element of F3 . (We do not recall the notation and details of this here, as they have been spelled out in subsection 6.1.) In this way, we obtain the required direct product decomposition.  For our cell e′ , we define Y = {Y ⊆ {1, ..., m} | F τY lies in the closure of e′ } Let X be the boolean subcollection obtained by taking the closure of Y in 2{1,...,m} under unions and set difference. Further, let X1 , ..., Xk be the atoms of X. For the remainder of this subsection, we fix e′ , Y, X and X1 , ..., Xk as above. Lemma 8.5. \ StabF (F τY ) = Y ∈Y In particular, \ StabF (F τXi ) 1≤i≤k \ StabF (F τY ) Y ∈Y is a finite product of copies of F and F3 , and is of type F∞ . Proof. Let U, V ⊆ {1, ..., m}. We claim that StabF (F τU ) ∩ StabF (F τV ) = StabF (F τU\V ) ∩ StabF (F τV \U ) ∩ StabF (F τU∩V ) It is obvious that the latter is contained in the former. It suffices to show that if f ∈ StabF (F τU ) ∩ StabF (F τV ) then f ∈ StabF (F τU\V ) ∩ StabF (F τV \U ) ∩ StabF (F τU∩V ) Let τi′ be a special form obtained by performing expansion moves on τi such that for each percolating element yst of τi′ , f acts on s. Now let τi′′ denote special form obtained by replacing each percolating element yst of τi′ with yft (s) . It follows from Lemma 7.2 that τ1′′ , ..., τn′′ is a sorted list of special forms. It follows from our assumption that F τU · f = F τU′′ F τV · f = F τV′′ 38 YASH LODHA By our assumption the word τU′′ , τV′′ are both products of independent special forms, and are equivalent to τU , τV respectively. This means that we can perform a sequence of contraction and expansion moves on τU′′ , τV′′ to obtain τU , τV respectively. So indeed upon performing contraction and expansion moves on ′′ ′′ the subwords τU∩V , τU\V , τV′′ \U we must obtain τU∩V , τU\V , τV \U respectively. In particular, it follows that f fixes the cosets F τU∩V , F τU\V , F τV \U . This proves our assertion. Using this idea, we conclude the proof of the main assertion \ \ StabF (F τX ) = StabF (F τXi ) 1≤i≤k X∈X using a standard induction argument of the boolean algebra of sets X obtained from Y by taking the closure under unions and set difference.  Lemma 8.6. Given ν ∈ StabG (e′ ), for each X ∈ X it holds that ν(Supp(τX )) = Supp(τX ) Proof. Given ν ∈ StabG (e′ ), ν induces a permutation of the 0-cells {F τY | Y ∈ Y}. In particular, a power ν k fixes each 0-cell in this set. In particular, ν k ∈ F since it fixes the trivial coset. Since ν k lies in \ StabF (F τY ) \ StabF (F τX ) Y ∈Y by Lemma 8.5 it also lies in X∈X This implies that for each X ∈ X, ν k (Supp(τX )) = Supp(τX ) Since ν is a k-th root of ν in Homeo+ (2N ), it follows that ν(Supp(τX )) = Supp(τX )  ′ ′ Lemma 8.7. StabG (e ) = StabF (e ) = T 1≤i≤k StabF (F τXi ) Proof. Let ν ∈ StabG (e′ ). Since ν permutes the 0-cells incident to e′ , it follows that F · ν = F τX for some X ∈ Y. In particular, it holds that there is an f ∈ F such that ν = f τX . Now assume by way of contradiction that X is nonempty. By Lemma 8.6 ν(Supp(τX )) = Supp(τX ). It follows that f (Supp(τX )) = Supp(τX ). be a special form obtained by applying expansion moves on yst11 ...ystnn Now let τX = yst11 ...ystnn . Let yuv11 ...yuvm m such that: (1) f acts on each ui for 1 ≤ i ≤ m. (2) |f (ui )| > |sj | for each 1 ≤ i ≤ m, 1 ≤ j ≤ n. Since the interval Supp(τX ) is invariant under the action of f , it follows that f (u1 ) = s1 1l for some l ∈ N. Also, note that v1 = t1 . So we obtain that F τX · (f τX ) = F (yst11 ...ystnn )(f yst11 ...ystnn ) )(f yst11 ...ystnn ) = F (yuv11 ...yuvm m tn t1 = F (yfv1(u1 ) ...yfvm (um ) )(ys1 ...ysn ) Since f (Supp(τX )) = Supp(τX ), for the infinite binary sequence s1 1∞ the associated calculation Λ of the standard form tn t1 (yfv1(u1 ) ...yfvm (um ) )(ys1 ...ysn ) A NONAMENABLE TYPE F∞ GROUP 39 contains two occurrences of y t1 = y v1 . In particular, there is no potential cancellation and the exponent of this calculation equals 2. Since F τX · (f τX ) is equal to a coset of the form F τU for some U ∈ Y, this is a contradiction. Therefore, X must be the empty set, and so ν ∈ F . To finish the proof, we must show the second equality in the statement of our Lemma. We already know from Lemma 8.6 that ν(Supp(τX )) = Supp(τX ) for each X ∈ X. For any Y ∈ Y, F τY · ν = F τY ′ where Y ′ ∈ Y. Now Y is a union of minimal elements of X. Since ν fixes the support of each τX for such a minimal X, it must be the case that F τX · ν = F τX and hence F τY · ν = F τY . This means that ν fixes each 0-cell in the closure of e′ . We conclude by applying Lemma 8.5 to obtain \ \ StabF (F τY ) = StabF (F τXi ) Y ∈Y 1≤i≤k  Proof of Proposition 8.1 From the discussion at the beginning of this subsection, it suffices to consider a cell of the form e′ described there. We denote by Y, X and X1 , ..., Xk the same sets as above. By Lemma 8.7 we know that StabG (e′ ) = \ StabF (F τXi ) 1≤i≤k T Moreover, by Lemma 8.4 it follows that 1≤i≤k StabF (F τXi ) is a finite product of copies of F and F3 . These groups are of type F∞ , which is a property closed under taking finite products. 8.2. The quotient X/G. Now we show that the quotient X/G has finitely many cells in each dimension. Proof of Proposition 8.2 We show this for a given dimension n ∈ N. Any n-cell is a maximal dimensional cell of an n-cluster by construction. Given an n-cluster, it contains in its G-orbit an n-cluster described with base the trivial coset F and proper parameters. So it suffices to show that there are finitely many G-orbits of n-clusters described with base F and proper parameters. Let C1 , C2 be n-clusters described with base F and proper parameters τ1 , ..., τn and ν1 , ..., νn respectively. Assume the following holds for each 1 ≤ i ≤ n. (1) The parity of the number of percolating elements in νi and τi is the same. (2) τi , τi+1 are consecutive if and only if νi , νi+1 are consecutive. (For 1 ≤ i ≤ n − 1.) (3) If yst , yuv are the leftmost percolating elements occurring in λi , νi respectively, then t = u. Then we can apply expansion moves to the respective special forms to obtain proper parameters τ1′ , ..., τn′ and ν1′ , ..., νn′ such that in addition to the above, the following holds. (4) For each 1 ≤ i ≤ n, the word length of τi′ , λ′i is the same. Let ′ yst11 ...ystkk = τ{1,...,n} ′ yuv11 ...yuukk = ν{1,...,n} Given these conditions, it is an elementary exercise in the group F to construct an element f ∈ F such that f (si ) = ui for each 1 ≤ i ≤ k. It follows that C1 · f = C2 . Since the number of combinatorial conditions in (1) − (3) above is finite, we are done. 9. X is simply connected. In this section we will show that X is simply connected. This is shown by providing an explicit homotopy for a given loop to a trivial loop. Recall that in [16], we provide a procedure that takes as input a word that represents the identity, and using the moves described in the preliminaries in Definition 3.16, 40 YASH LODHA converts it into the empty word. A direct consequence of the result is that we can use the same procedure to do the following. If we input a word in the infinite generating set {yv , xu | u, v ∈ 2<N , v 6= 0k , 1k , ∅} of G that represents an element of the subgroup F , then using the moves we can convert it into a word in the generators {xu | u ∈ 2<N } In what follows the reader is not expected to have the knowledge of this procedure, but needs to assume that indeed it is possible to do the above using the combinatorial moves described in the preliminaries. We provide a visual interpretation of the combinatorial moves inside the complex. We will show that each move provides a homotopy between two paths, and combine this with the existence of the procedure to demonstrate that X is simply connected. Given a loop l in X, (up to homotopy) we can assume that l is a path along the 1-skeleton that is described as a path along a sequence of nodes F τ, F (νk τ ), F (νk−1 νk τ ), ..., F (ν1 ...νk τ ), F τ where (1) τ is a Y -word. (2) ν1 , ..., νk are special forms. (3) F (νk ...ν1 ) = F ψ for a special form ψ. Note that in general, the special forms ν1 , ..., νk are completely arbitrary. The product word ν1 ...νk (viewed as a word obtained by concatenating ν1 , ..., νk ) may not be a special form, and pairs νi , νj are not necessarily independent. However, since the last two nodes in the sequence are connected by an edge we deduce that F ν1 ...νk = F ψ where ψ is a special form. Let l1 be the loop l · τ −1 . By construction of X, l is homotopic to the trivial loop if and only if l1 has this property. l1 is described as a path along a sequence of nodes: F, F (νk ), F (νk−1 νk ), ..., F (ν1 ...νk ), F where as above: (1) ν1 , ..., νk are special forms. (2) F (νk ...ν1 ) = F ψ for a special form ψ. We describe a list of homotopies that correspond to moves in the analysis of standard forms. We list them below. In what follows, τ ∈ G is an arbitrary element. −1 (1) The expansion move yσ → xσ yσ0 yσ10 yσ11 corresponds to a homotopy between the paths F τ, F (yσ τ ) and −1 −1 F τ, F (yσ11 τ ), F (yσ10 yσ11 τ ), F (yσ0 yσ10 yσ11 τ ) −1 −1 Similarly the expansion move yσ−1 → x−1 σ yσ00 yσ01 yσ1 corresponds to a homotopy between paths −1 F τ, F (yσ τ ) and −1 −1 −1 −1 F τ, F (yσ1 τ ), F (yσ01 yσ1 τ ), F (yσ00 yσ01 yσ1 τ) These paths are homotopic in X because they are homotopic in a 3-cluster of X. For instance, −1 the first homotopy is performed in the cluster with base F τ and parameters yσ0 , yσ10 , yσ11 . t (2) Consider an edge of the form F τ, F (ys f τ ). This is an edge since it satisfies (E2) of Definition 6.6, which can be seen by performing an expansion followed by rearrangement move on yst f . Performing expansion moves on yst we obtain a special form yst11 ...ystnn equivalent to yst such that f acts on s1 , ..., sn . The single edge path F τ, F (yst f τ ) is homotopic to the path described by the sequence y tn f τ ), ..., F (yst11 ...ystnn f τ ) F τ, F (ystnn f τ ), F (ystn−1 n−1 sn A NONAMENABLE TYPE F∞ GROUP 41 in the n-cluster described with base F τ and parameters yst11 , ..., ystnn . Applying the rearranging move yst11 ...ystnn f = f yft1(s1 ) ...yftn(sn ) = yrt11 ...yrtnn produces a new description of this path as y tn τ ), ..., F (yrt11 ...yrtnn τ ) F, F (yrtnn τ ), F (yrtn−1 n−1 rn (3) A commuting move yst ypq = ypq yst for t, q ∈ {−1, 1} and s, p independent, corresponds to a homotopy between paths of the form F τ, F (yst τ ), F (ypq yst τ ) and F τ, F (ypq τ ), F (yst ypq τ ) This can be performed in the complex since these paths are homotopic in the 2-cluster described with base F τ and parameters yst , ypq . (4) A cancellation move ys±1 ys∓1 → ∅ corresponds to shrinking a path of the form F τ, F (ys±1 τ ), F (ys∓1 ys±1 τ ) to a trivial path. This is possible since the path is obtained by traversing the edge F τ, F (ys±1 τ ) forwards and then backwards. Now we observe the following. Lemma 9.1. Consider a loop l described by the path F, F (λn ), F (λn−1 λn ), ..., F (λ1 ...λn ), F where λ1 , ..., λn are special forms. It is homotopic to a loop described by a path of the form ), F y tm ), ..., F (yst11 ...ystm ), F (ystm−1 F, F (ystm m m−1 sm m Proof. We show this by induction on n. For n = 1, let λ1 = ypq11 ...ypqkk . Now the 1-cell {F τ, F (λ1 τ )} is the cross diagonal 1-cell of the k-cluster at τ parametrized by the special forms ypq11 , ..., ypqkk . It follows that this 1-cell is homotopic to the path F τ, F (ypqkk τ ), F (ypqk−1 y qk τ ), ..., F (ypq11 ...ypqkk τ ) k−1 pk The inductive step is essentially the same as the base case, since by the inductive hypothesis we replace the path F τ, F (λn τ ), F (λn−1 λn τ ), ..., F (λ2 ...λn τ ), F (λ1 ...λn τ ) by a path F τ, F (yuvll τ ), F (yuvl−1 y vl τ ), ..., F (λ1 yuv11 ...yuvll τ ) l−1 ul and then argue the last edge F (yuv11 ...yuvll τ ), F (λ1 yuv11 ...yuvll τ ) traversed in the path is homotopic to path of a suitable sequence of edges as in the base case.  Proposition 9.2. The complex X is simply connected. Proof. Let L be a loop described as a path in X (1) . By considering the group action we can assume that the loop L begins and ends at F . By the previous Lemma this loop is homotopic to a loop of the form y tn ), ..., F (yst11 ...ystnn ) = F F, F (ystnn ), F (ystn−1 n−1 sn Since the 0-cells F = F (yst11 ...ystnn ) it follows that the word yst11 ...ystnn represents an element of F . From [16] we know that this word can be reduced to an X-word by applying a sequence of expansion, commuting, cancellation and rearranging substitutions. Since an application of each substitution produces a loop homotopic to L, we observe that this process provides an explicit homotopy between L and the trivial loop.  42 YASH LODHA 10. X is aspherical In this section, we shall demonstrate that the complex X is a nonpositively curved cluster complex in the sense of Definition 4.6, and hence is aspherical. In particular, we will show the following. For each finite subcomplex Y of X which is a union of clusters, there is a subcomplex Y of X such that: (1) Y ⊂ Y. (2) Y is homeomorphic to a non positively curved cube complex. We describe a process that takes as an input Y as produces as an output Y. There are two main structural concepts defined and used in this section. These are the notions parallel 1-clusters and orthogonal 1clusters. A key algorithmic ingredient is what we refer to as amplification of clusters. An amplification takes as an input a cluster, and produces as an output a larger cluster that contains the input as a subcluster. In this section whenever we refer to a description of a 1-cluster with base F τ , it shall be assumed that τ is a Y -word (possibly empty) (unless specified otherwise). We shall write F τ, F ντ to denote a 1-cluster with base F τ and parameter ν. It is important that the reader keeps this in mind, since this will be crucial to formulate the definitions in this section. 10.1. The parallel equivalence relation on the 1-cells of X. Consider the regular Euclidean cube [0, 1]n ⊂ Rn . Two 1-dimensional faces, i.e. edges of the cube are parallel if they are segments of parallel lines in Rn . Now consider an n-cluster C, viewed as a CW subdivision of [0, 1]n . The facial 1-subclusters of C are in natural correspondence with the closed edges of [0, 1]n . So we may view a pair of facial 1-subclusters of C as parallel if the corresponding closed edges of [0, 1]n are parallel. More concretely, let C be described with base F τ and parameters τ1 , ..., τn . The set of facial 1-subclusters of C consists of: {F τX τ, F τi τX τ | X ∪ {i} ⊆ {1, ..., n}, i ∈ / X} We say that two facial 1-subclusters of C are parallel, if they are of the form: F τX τ, F τi (τX τ ) F τY τ, F τi (τY τ ) where X, Y ⊆ {1, ..., i − 1, i + 1, ..., n}. We would like to extend this notion of parallel 1-clusters to pairs that are not necessarily facial 1subclusters of the same cluster. As a motivating example, consider the situation below. Let C be as above, but for simplicity of notation, let us assume that τ is the empty word, and hence C is described with base as the trivial coset and parameters τ1 , ..., τn . Let e1 = F τX , F τi τX e2 = F τY , F τi τY be parallel, facial 1-subclusters of C. Now consider a cluster D described with base F τY and parameters ν1 , ..., νm such that νj = τi for some 1 ≤ j ≤ m. Consider a 1-cell e3 = F (νZ τY ), F νj (νZ τY ) of D such that Z ⊆ {1, ..., j − 1, j + 1, ..., m}. Note that in this description of D e2 = F τY , F νj τY It follows that e2 , e3 are parallel, facial 1-subclusters of the cluster D. It is natural to view e1 , e3 above as in a certain sense, parallel. Indeed, there is a natural notion of parallel 1-clusters in X. This is precisely the transitive closure of the relation obtained by declaring 1-clusters e1 , e2 as parallel if they are parallel, facial 1-subclusters of a cluster. We provide a more useful, concrete formulation of this definition below. In this formulation, it is not immediately apparent that the resulting relation is an equivalence relation. This will be shown in a subsequent Lemma. A NONAMENABLE TYPE F∞ GROUP 43 Definition 10.1. Two 1-clusters e1 , e2 in X are said to be parallel if they admit descriptions e1 = F τ1 , F ντ1 e2 = F τ2 , F ντ2 so that there is a sequence of special forms ν1 , ..., νn satisfying: (1) νi , ν are independent for each 1 ≤ i ≤ n. (2) ν1 ...νn = τ2 τ1−1 . Remark 10.2. In the above definition, it is not required that ν1 , ..., νn are independent, sorted etc. In fact in most cases they shall not be independent. Note that the definition is symmetric. The special forms ν1−1 , ..., νn−1 satisfy that νi−1 , ν are independent and νn−1 ...ν1−1 = τ1 τ2−1 . Also, note that the definition is G-invariant. That is, if e1 , e2 are parallel then it follows from the definition that e1 · g, e2 · g are parallel for any g ∈ G. Finally, note that if the descriptions e1 = F τ1 , F ντ1 e2 = F τ2 , F ντ2 satisfy Definition 10.1, then so do the descriptions e1 = F (ντ1 ), F ν −1 (ντ1 ) e2 = F (ντ2 ), F ν −1 (ντ2 ) In fact, the same ν1 , ..., νn as above witness the conditions of the Definition. Indeed it holds that νi , ν −1 are independent for each 1 ≤ i ≤ n. And also, ν1 ...νn = νν −1 (ν1 ...νn ) = ν(ν1 ...νn )ν −1 = ν(τ2 τ1−1 )ν −1 = (ντ2 )(ντ1 )−1 Before we show that the parallel relation is an equivalence relation, we show that the definition is independent of the choice of description. Lemma 10.3. Let e1 , e2 be parallel 1-clusters in X. Let e1 = F τ1 , F ντ1 be any choice of description. Then there is a description e2 = F τ2 , F ντ2 , so that these descriptions satisfy Definition 10.1. Proof. We shall find a Y -word τ2 such that e2 admits a description e2 = F τ2 , F ντ2 satisfying the required property. Since e1 , e2 are parallel, by definition there are descriptions e1 = F ψ1 , F ηψ1 e2 = F ψ2 , F ηψ2 and special forms η1 , ..., ηn satisfying that ηi , η are independent and η1 ...ηn ψ1 = ψ2 . Thanks to the last paragraph of Remark 10.2, we can also find the above descriptions keeping the same base coset, so that F ψ1 = F τ1 . There is an f ∈ F such that f ψ1 = τ1 . Let η ′ , η1′ , ..., ηn′ be special forms obtained by applying expansion moves on η, η1 , ..., ηn respectively such that for each percolating element yst that occurs, f −1 acts on s. Let η ′′ , η1′′ , ..., ηn′′ be special forms obtained by replacing each percolating element yst of η ′ , η1′ , ..., ηn′ by yft −1 (s) . It follows that F ηψ1 = F η ′ (f −1 f )ψ1 = F η ′′ τ1 and hence e1 = F τ1 , F η τ1 . Moreover, ′′ ψ2 = η1 ...ηn ψ1 = η1 ...ηn (f −1 f )ψ1 = f −1 η1′′ ...ηn′′ τ1 and hence η1′′ ...ηn′′ τ1 We define τ2 = f ψ2 . It follows that τ2 = So in particular τ2 is expressible as a Y -word, which we fix and refer to as τ2 for the remainder of the proof. f ψ2 = η1′′ ...ηn′′ τ1 . Now F η ′′ τ1 = F ντ1 and so F η ′′ = F ν. Since ν, η ′′ are special forms that lie in the same F -coset, ν can be obtained from η ′′ by a sequence of expansion and contraction moves and hence has the same support. In particular, it follows that the pairs ηi′′ , ν are independent. Therefore, the descriptions F τ1 , F ντ1 F τ2 , F ντ2 44 YASH LODHA satisfy the condition of Definition 10.1 with the special forms η1′′ , ..., ηn′′ witnessing the conditions.  Lemma 10.4. The parallel 1-cluster relation is an equivalence relation. The relation is precisely the transitive closure of the relation obtained by declaring 1-clusters e1 , e2 as parallel if they are parallel, facial 1-subclusters of a cluster. Proof. In remark 10.2 we discussed why Definition 10.1 is symmetric. Therefore, it suffices to show that this is transitive, i.e. given 1-cells e1 , e2 , e3 such that e1 , e2 and e2 , e3 are parallel, then e1 , e3 are parallel. Fix a description F τ1 , F ντ1 of e1 . By two applications of Lemma 10.3, first on e1 , e2 and then on e2 , e3 we find descriptions e1 = F τ1 , F ντ1 e2 = F τ2 , F ντ2 e3 = F τ3 , F ντ3 that satisfy the following conditions of Definition 10.1: (1) There are special forms η1 , ..., ηn such that each pair ν, ηi is independent and η1 ...ηn = τ1 τ2−1 . (2) There are special forms ψ1 , ..., ψm such that each pair ν, ψi is independent and ψ1 ...ψm = τ2 τ3−1 . It follows that e1 , e3 are parallel since each pair ν, ηi and ν, ψi is independent and η1 ...ηn ψ1 ...ψm = τ1 τ2−1 τ2 τ3−1 = τ1 τ3−1 This finishes the proof that our relation is an equivalence relation. We leave the claim concerning the transitive closure as a pleasant exercise for the reader. This requires translating the definition into a sequence of clusters witnessing the transitive closure. This statement will not be used in the rest of the article, and is stated to provide motivation for the concept.  Lemma 10.5. The set of facial 1-subclusters of an n-cluster comprise of exactly n parallel equivalence classes. A set of representatives for these equivalence classes is given by the set of facial 1-subclusters incident to any given 0-cell in the cluster. Proof. Consider an n-cluster C described with base at F τ and parameters ν1 , ..., νn . By G-invariance of Definition 10.1, we can assume that τ is the empty word. First note that each facial 1-subcluster in C is parallel to a facial 1-subcluster of the form F, F νi for some 1 ≤ i ≤ n. We will show that a pair e1 = F, F νi e2 = F, F νj is not parallel if i 6= j. Assume by way of contradiction that e1 , e2 are parallel. By Lemma 10.3 there is a description e2 = F ψ, F νi ψ, where ψ is a Y -word, such that the descriptions F, F νi F ψ, F νi ψ satisfy Definition 10.1. So there are special forms η1 , ..., ηm such that ηk , νi are independent for each 1 ≤ k ≤ m, and η1 ...ηm = ψ. Since we are considering two different descriptions of e2 : e2 = F, F νj e2 = F ψ, F νi ψ we have to consider two possibilities: (1) F = F ψ and F νj = F νi ψ. (2) F = F νi ψ and F νj = F ψ. Before we analyse each case separately, we observe the following. Since η1 ...ηm = ψ, and for each 1 ≤ j ≤ m, ηj , νi are independent, it follows that: F νi ψ = F νi (η1 ....ηn ) = F (η1 ...ηn )νi = F ψνi Case 1: Since F = F ψ, we conclude that ψ ∈ F (even though ψ is formally a Y -word, it is an element of F ). It follows that F νi ψ = F ψνi = F νi But this means that F νj = F νi . This leads to a contradiction since νi , νj are independent special forms and so the element νj νi−1 ∈ / F. A NONAMENABLE TYPE F∞ GROUP 45 Case 2: In this case, observe that: F = F νi ψ = F ψνi = F νj νi This means that F = F νj νi , which is a contradiction since νi , νj are independent special forms, so the element νj νi ∈ / F. This means that our assumption that e1 , e2 are parallel must be false, and hence we conclude that the set of facial 1-subclusters incident to the trivial coset F in C are pairwise non-parallel.  While working with finite sets of (parallel) 1-clusters, it will often be useful to consider descriptions that share the same parameter. Definition 10.6. (Common description) Consider the descriptions: e1 = F τ1 , F ντ1 e2 = F τ2 , F ντ2 ... en = F τn , F ντn This shall be denoted as a common description for the 1-cells e1 , ..., en , and ν is denoted as a common parameter. Remark 10.7. If a set of 1-clusters e1 , ..., en are pairwise parallel, then by repeated application of Lemma 10.3, as in the proof of Lemma 10.4, we can find a common description for these 1-clusters satisfying Definition 10.1. 10.2. Orthogonal 1-clusters. As discussed before, our proof of asphericity involves finding a subcomplex which is homeomorphic to a nonpositively curved cube complex. The idea behind proving nonpositive curvature is Gromov’s link condition, and we shall establish the link condition by means of the following notion of orthogonality of 1-clusters. Definition 10.8. (Orthogonal 1-clusters) Let e1 , e2 be 1-clusters that are both incident to a 0-cell u. They are said to be orthogonal if they admit descriptions: e1 = F τ, F ν1 τ e2 = F τ, F ν2 τ such that F τ = u and ν1 , ν2 are independent special forms. This is equivalent to requiring that there is a 2-cluster C which contains e1 , e2 as facial 1-subclusters incident to u. A list e1 , ..., en of 1-clusters that are all incident to a 0-cell u are said to be orthogonal if they are pairwise orthogonal. Remark 10.9. The notion of orthogonality is clearly G-invariant, i.e. e1 , e2 are orthogonal if and only if e1 · g, e2 · g are orthogonal for any g ∈ G. We leave it as an elementary exercise for the reader to check that the notion does not depend on the choice of descriptions, as long as the base is the same. In this case, the parameters shall automatically be independent. Lemma 10.10. Let e1 , ..., en be 1-clusters that are all incident to a 0-cell u. If they are orthogonal, then there is an n-cluster that contains e1 , ..., en as facial 1-cells. Proof. By G-invariance of the notion of orthogonality, we can assume without loss of generality that u is the trivial coset F . Now we find descriptions for our 1-clusters with base F : e1 = F, F τ1 .... en = F, F τn for special forms τ1 , ..., τn . Since e1 , ..., en are pairwise orthogonal, it follows that τ1 , ..., τn are pairwise independent. So the cluster C can be described with base F and parameters τ1 , ..., τn .  The above Lemma provides a bijective correspondence between the set of n-clusters incident to a given 0-cell u, and the set of n-tuples of pairwise orthogonal 1-clusters incident to u. { n-clusters incident to u} ↔ {n-tuples of orthogonal 1-clusters incident to u} This discussion motivates the following definition. 46 YASH LODHA Definition 10.11. A pre-cluster C consists of 1-clusters e1 , ..., en that are all incident to a 0-cell u, and are orthogonal. The 0-cell u is said to be the base of the pre-cluster C. Pre-clusters admit descriptions just like clusters. For instance, a pre-cluster C described with base F τ , and parameters τ1 , ..., τn consists of the 1-clusters: F τ, F τ1 τ ... F τ, F τn τ with base the 0-cell given by F τ . The list of parameters τ1 , ..., τn is always assumed to be a sorted list for convenience. The closure C̄ of the n-pre-cluster C is the cluster described with base F τ and parameters τ1 , ..., τn . Clearly, the 1-clusters in C are all facial 1-subclusters of C̄, and provide a set of representatives of the parallel equivalence classes of the facial 1-subclusters of C̄. Note that in the above definition we assume that a 1-cluster is also a 1-pre-cluster, whose closure is itself. 10.3. Amplification of pre-clusters. An amplifying move is an operation that takes as an input a pre-cluster C1 and produces as an output a “larger” pre-cluster C2 such that C̄1 is a subcluster of C̄2 . The idea behind the amplifying move is elementary, yet technical difficulties in explaining and implementing the move on a given pre-cluster arise from the fact that we need to choose a description. We will show that in a certain precise sense, the concept is independent of the choice of description. We first provide an elementary example to illustrate the motivation behind this concept. Example 10.12. Consider the 1-cluster F, F y10 . We can apply an expansion move on the special form −1 y10 to obtain the special form y100 y1010 y1011 . Consider the pre-cluster C1 consisting of the 1-clusters F, F y100 −1 F, F y1010 F, F y1011 −1 The closure is a 3-cluster C̄1 described with base F and parameters y100 , y1010 , y1011 . This cluster contains the 1-cluster F, F y10 as a cross diagonal. −1 Now consider the expansion move y100 → y1000 y10010 y10011 . Consider the 5-pre-cluster C2 comprising of −1 −1 {F, F τ | τ ∈ {y1000 , y10010 , y10011 , y1010 , y1011 }} Then C̄2 is described with base F and parameters −1 −1 y1000 , y10010 , y10011 , y1010 , y1011 and contains C̄1 as a diagonal subcluster, and also the 1-cluster F, F y10 as a cross diagonal. Continuing in this fashion, we can produce arbitrarily large (pre)-clusters, each new cluster (in the closure) containing the previous ones as subclusters. Definition 10.13. (Amplifying a 1-cluster) Consider a 1-cluster C1 = F τ, F ντ with base u = F τ . Each sorted list of special forms ν1 , ..., νn satisfying F ν = F ν1 ...νn , determines an amplification of C1 at u, which produces a pre-cluster C2 consisting of: F τ, F ν1 τ F τ, F ν2 τ ... F τ, F νn τ Such an amplification is informally denoted as C1 → C2 . The 1-clusters of C2 shall be referred to as the offsprings of the 1-cluster C1 . Remark 10.14. Note that the definition is G-invariant in the following sense. Let C1 , C2 be as above. For any g ∈ G, the pre-cluster C2 · g consisting of F (τ g), F ν1 (τ g) F (τ g), F ν2 (τ g) ... F (τ g), F νn (τ g) is produced by an amplification of C1 · g = F (τ g), F ν(τ g) given by F ν = F ν1 ...νn . Now we show that the same amplifying move can be obtained from any description of a given 1-cluster, with the same base coset. In this sense, the notion is independent of the choice of description. A NONAMENABLE TYPE F∞ GROUP 47 Lemma 10.15. Let C1 be a 1-cluster F τ, F ντ . Let C2 be the amplification consisting of e1 = F τ, F ν1 τ ... en = F τ, F νn τ where ν1 , ..., νn is a sorted list of special forms such that F ν = F ν1 ...νn . Consider a different description C1 = F ψ, F ηψ, so that F ψ = F τ and η is a special form. Then there is a sorted list of special forms η1 , ..., ηn such that: (1) F η = F η1 ...ηn . (2) ei = F ψ, F ηi ψ for each 1 ≤ i ≤ n. Proof. Since F ψ = F τ , there is an f ∈ F such that ψ = f τ . Let νi′ be a special form obtained by applying expansion moves on νi such that for each percolating element yst of νi′ , f −1 acts on s. Let νi′′ be the special form obtained by replacing each percolating element yst of νi′ with yft −1 (s) . It follows that F ν1 ...νn τ = F ν1′ ...νn′ τ = F ν1′ ...νn′ f −1 (f τ ) = F ν1′′ ...νn′′ (f τ ) = F ν1′′ ...νn′′ ψ In particular F ν1′′ ...νn′′ = F η. By Lemma 7.2 we know that ν1′′ , ..., νn′′ is a sorted list of special forms. Since ei = F τ, F νi τ = F ψ, F νi′′ ψ we conclude the statement of the Lemma with ηi = νi′′ .  We obtain the following corollary. Corollary 10.16. Given a 1-cluster, and a base 0-cell incident to it, the set of pre-clusters obtained by amplifying moves on a given description (with the given 0-cell as base) is the same as the set of pre-clusters obtained by amplifying moves on any other description (with the given 0-cell as base). To conclude our discussion, we show that the set of clusters obtained from taking closures of amplifications of a 1-cluster are the same regardless of the choice of base 0-cell and description. Lemma 10.17. Let C1 be a 1-cluster with incident 0-cells u, v. If C2 is a precluster obtained by performing an amplification of C1 at u, then there is a precluster C3 obtained by performing an amplification of C1 at v such that C¯3 = C¯2 . Proof. Let C1 be a 1-cluster F τ, F ντ . Let C2 be the amplification consisting of F τ, F ν1 τ ... F τ, F νn τ where ν1 , ..., νn is a sorted list of special forms such that F ν = F ν1 ...νn . The closure C¯2 is the cluster described with base F τ and parameters ν1 , ..., νn . Now consider the description C1 = F ν −1 (ντ ), F (ντ ) with base coset F (ντ ) and parameter ν −1 . Since ν is equivalent to ν1 ν2 ...νn , it follows from applying Lemma 6.22 that ν −1 is equivalent to ν1−1 ν2−1 ...νn−1 . Now consider the amplification C3 given by F (ντ ), F ν1−1 (ντ ) ... F (ντ ), F νn−1 (ντ ) The closure C¯3 is the cluster described with base F (ντ ) and parameters ν1−1 , ..., νn−1 . Clearly, C¯2 = C¯3 since the above descriptions are different descriptions for the same cluster.  Now we define the amplifying move for an n-pre-cluster for n > 1. An amplifying move, or an amplification of a pre-cluster produces another pre-cluster. 48 YASH LODHA Definition 10.18. (Amplifying an n-pre-cluster) Consider a pre-cluster C1 with base u. Let E ⊆ C1 be a set of 1-clusters E = {e1 , ..., ek }. An amplification C1 → C2 along E is given by replacing e1 , ..., ek in C1 by amplifications D1 , ..., Dk of e1 , ..., ek respectively, at u. More concretely C2 = (C1 \ {e1 , ..., ek }) [ D1 ∪ ... ∪ Dk We say that C2 is obtained from amplifying C1 along e1 , ..., ek . The output is also a pre-cluster with the same base. Let us consider a concrete example. Example 10.19. Let C1 be a pre-cluster described as e1 = F τ, F τ1 τ ... en = F τ, F τn τ Fix j, k ∈ {1, ..., n}, j 6= k. Let ν1 , ..., νl and ψ1 , ..., ψm be a sorted lists such that F τj = F ν1 ...νl F τk = F ψ1 ...ψm Given this data, we now describe a (n + l + m − 2)-pre-cluster C2 which is an amplification of C1 along {ej , ek }. This pre-cluster C2 is the following union: [ [ ({e1 , ..., en } \ {ej , ek }) {F τ, F νi τ | 1 ≤ i ≤ l} {F τ, F ψi τ | 1 ≤ i ≤ m} Note that Definition 10.18 is G-invariant in the same sense as Definition 10.13. Also, this is independent of the choice of description just as in 10.13. The above discussion combined with an analogue of Lemma 10.15 provides the following. Lemma 10.20. Let C be a pre-cluster endowed with two different descriptions. Then the set of preclusters obtained from performing amplifying moves using one description is the same as the set of clusters obtained from performing amplifying moves using the other description. Proof. This proof is almost verbatum the same as the proof of Lemma 10.15.  Remark 10.21. Let C2 be an amplification of a pre-cluster C1 , and let C3 be an amplification of C2 . Then C3 can be obtained from a single amplification of C1 . We now extend the notion of amplification of a 1-cluster to a set of pairwise parallel 1-clusters. Definition 10.22. (Common amplification for parallel 1-clusters) Let e1 , e2 be parallel 1-clusters. Let e1 = F τ1 , F ντ1 e2 = F τ2 , F ντ2 be two descriptions satisfying the conditions of Definition 10.1. Let ν1 , ..., νn be a sorted list of special forms such that F ν = F ν1 ...νn . Now consider the amplification of e1 , e2 to obtain preclusters C1 , C2 respectively, as: (1) C1 consists of F τ1 , F ν1 τ1 F τ1 , F ν2 τ1 ... F τ1 , F νn τ1 F τ2 , F ν1 τ2 F τ2 , F ν2 τ2 ... F τ2 , F νn τ2 (2) C2 consists of Such an amplification of parallel 1-clusters is said to be a common amplification. A second variant of this definition is considered for the description e2 = F ντ, F ν −1 (ντ ). First, note that since F ν = F ν1 ...νn , it follows from applying Lemma 6.22 that F ν −1 = F ν1−1 ...νn−1 . Now consider the amplification C1 of e1 with base F τ1 as before. The corresponding common amplification of e2 with base F (ντ2 ) is C2′ which consists of: F (ντ2 ), F ν1−1 (ντ2 ) Note that C¯2 = C¯2′ . F (ντ2 ), F ν2−1 (ντ2 ) ... F (ντ2 ), F νn−1 (ντ2 ) A NONAMENABLE TYPE F∞ GROUP 49 Remark 10.23. Note that in the above definition, for each 1 ≤ i ≤ n, the 1-clusters F τ1 , F νi τ1 F τ2 , F νi τ2 are parallel. In the second variant of the definition the 1-clusters F τ1 , F νi τ1 F (ντ2 ), F νi−1 (ντ2 ) are parallel The above definition can be extended to any finite number of 1-clusters that are pairwise equivalent. This is done by first finding common descriptions that satisfy the conditions of Definition 10.1, using Lemma 10.3. And then we perform common amplifications as above. Definition 10.22 has a natural extension to pre-clusters. Definition 10.24. (Common amplification of pre-clusters along parallel subsets) Let C1 , C2 be preclusters based at u, v respectively. Let E1 ⊆ C1 , E2 ⊆ C2 be sets of 1-clusters such that: (1) E1 = {e1 , ..., ek } and E2 = {e′1 , ..., e′k }. (2) ei , e′i are parallel for each 1 ≤ i ≤ k. Fix an amplification C1 → C1′ along E1 by e1 → D1 ... ek → Dk at v. We define a common amplification C2 → C2′ using the amplifications e′1 → D1′ ... e′k → Dk′ at u where e′i → Di′ and ei → Di are common amplifications for each 1 ≤ i ≤ k. We denote such a common amplification as: C1 → C1′ C2 → C2′ along E1 , E2 Now we define a notion that is in a certain strong sense the opposite of the notion of parallel. Definition 10.25. A pair of 1-clusters e1 , e2 is said to be disparate if the following holds: (1) e1 , e2 are not parallel. (2) Any pair of amplifications e1 → C1 e2 → C2 satisfy that for each pair e′1 ∈ C1 , e′2 ∈ C2 , e′1 , e′2 are not parallel. As a simple example of disparate 1-clusters, consider any pair of orthogonal 1-clusters incident to a common 0-cell. We now demonstrate that being disparate is a property of parallel equivalence classes of 1-clusters. Lemma 10.26. Given 1-clusters e1 , e2 , e3 such that e1 , e2 are parallel, and e1 , e3 are disparate, it also holds that e2 , e3 are disparate. Proof. To see this, observe that if e2 , e3 were not disparate, then we can perform amplifications to obtain pre-clusters C2 , C3 such that there is a pair e′2 ∈ C2 , e′3 ∈ C3 such that they are parallel. However, performing the common amplification for e1 , as for e2 , we obtain a pre-cluster C1 with e′1 ∈ C1 which is parallel to e′2 and hence e′3 . This means that e1 , e3 were not disparate to begin with.  Lemma 10.27. Let e1 , e2 be disparate, and let C be an amplification of e1 . Then for each e3 ∈ C, e2 , e3 are disparate. Proof. This follows immediately from the definitions. Lemma 10.28. Let C be a cluster. Any pair of facial 1-cells of C is either parallel or disparate.  50 YASH LODHA Proof. Let C be a cluster described with base at F τ , and parameters τ1 , ..., τn . Thanks to Lemma 10.5 and Remark 10.26 it suffices to show that any pair of 1-clusters e1 = F τ, F τi τ e2 = F τ, F τj τ is disparate if i 6= j. From Lemma 10.5 we know that they are not parallel. Now if C1 , C2 are preclusters obtained from amplifications of e1 , e2 respectively (performed at the base F τ ), then for each e ∈ C1 , e′ ∈ C2 the pair e, e′ is orthogonal. It follows again from Lemma 10.5 that e, e′ are not parallel.  10.4. Weakly balanced systems of pre-clusters. Definition 10.29. Consider a pair e, u comprising of a 1-cluster e and a 0-cell u. e, u are said to be disparate if for any e′ incident to u, the 1-clusters e, e′ are disparate. e, u are said to be compatible, if there is a 1-cluster e′ incident to u such that e, e′ are parallel. Note that this definition is G-invariant. So if e, u is compatible or disparate, then for each g ∈ G, e · g, u · g also satisfies the same. This follows from the fact that the definition of parallel and disparate 1-clusters is G-invariant. The following elementary observation follows immediately from the definitions and Lemma 10.27. Lemma 10.30. Let e be a 1-cluster and u be a 0-cell. Then the following holds: (1) Let e, u be disparate (or compatible) and let e, e′ be parallel 1-clusters. Then e′ , u are disparate (respectively, compatible). (2) Let e, u be disparate (or compatible) and let C be a pre-cluster obtained from performing an amplification of e. Then for each e′ ∈ C, e′ , u are disparate (respectively, compatible). Definition 10.31. Let C1 , ..., Cn be pre-clusters with bases u1 , ..., un respectively. We say that this is a weakly balanced system if for any pair [ e∈ Ci uj ∈ {u1 , ..., un } 1≤i≤n e, uj are either disparate or compatible. Lemma 10.32. Let C1 , ..., Cn be a weakly balanced system with bases u1 , ..., un . Let C1 , ..., Cn → C1′ , ..., Cn′ be any amplification. Then the system C1′ , ..., Cn′ is also weakly balanced Proof. Consider a pair e, uj where 1 ≤ j ≤ n and e ∈ Ci′ for some 1 ≤ i ≤ n. Then e is an offspring of a 1-cluster e′ ∈ Ci . Note that e′ , uj are compatible or disparate by our hypothesis. Since both properties are inherited for the offspring e, thanks to Lemma 10.30, we are done.  Our goal in this subsection is to prove the following Proposition. Proposition 10.33. (Weakly balancing procedure) Let C1 , ..., Cn be a system of clusters. There is an amplification C1 , ..., Cn → C1′ , ..., Cn′ ′ ′ such that C1 , ..., Cn is a weakly balanced system. The technical core of the proof of this Proposition is the following Proposition and the more general corollary. Proposition 10.34. Let e be a 1-cluster and let u be a 0-cell. Then there is an amplification of e that produces a pre-cluster C such that the following holds. For each e′ ∈ C, the pair e′ , u is either disparate or compatible. Corollary 10.35. Let e be a 1-cluster incident to a 0-cell u and let u1 , ..., un be 0-cells. Then there is an amplification of e that produces a pre-cluster C such that the following holds. For each e′ ∈ C and each 1 ≤ i ≤ n, the pair e′ , ui is disparate or compatible. A NONAMENABLE TYPE F∞ GROUP 51 Before we provide proofs of the above, we study the notions of disparate and compatible for a pair e, u in depth. Given suitable descriptions of e, we would like to detect whether e, u are disparate, or whether there is a 1-cluster e′ incident to u such that e, e′ are parallel. To describe such situations we require certain restrictions on descriptions of e. As a consequence of the G-invariance of Definition 10.29, we can assume that u is the trivial coset in our arguments below. Definition 10.36. Let F τ, F ντ be the description of a 1-cluster. We say that such a description is tame, if τ is a Y -word in standard form with no potential cancellations and ντ is in standard form. Remark 10.37. It is straightforward to produce tame descriptions for any given 1-cluster. For instance, choose a normal form representative for the base coset, and choose the parameter to have sufficiently large depth (by performing expansion moves). Consider such a tame description F τ, F ντ . We know that τ is a standard form with no potential cancellations, however ντ is a standard form that may admit potential cancellations. Any such potential cancellation must occur between a pair of occurrences of y ± , one of which lies in ν and the other in τ . Lemma 10.38. Let u be the trivial coset F . Suppose that a 1-cluster e admits a tame description F τ, F ντ that satisfies either one of the following: (1) ν, τ have disjoint supports. (2) The restriction of ντ on Supp(ν) equals the restriction of an element of F on Supp(ν). Then there is a 1-cluster e′ incident to u such that e, e′ are parallel. Proof. Assume that (1) holds. Let τ −1 = yst11 ...ystnn where equality denotes equality as words. We know that Supp(τ −1 ) ∩ Supp(ν) = ∅ Since the given description of e is tame, τ is a standard form with no potential cancellations. So Supp(ystii ) ⊂ Supp(τ ) for each 1 ≤ i ≤ n. In particular, Supp(ystii ) ∩ Supp(ν) = ∅ for each 1 ≤ i ≤ n. It follows that the 1-clusters F, F ν F τ, F ντ t1 are parallel with the sequence of special forms ys1 , ..., ystnn witnessing the conditions of Definition 10.1. Now we consider the case when (2) holds. We shall produce another tame description of e which will land us in case (1). We first convert ντ into a normal form f ψ where f ∈ F and ψ is a Y -word. Recall from Lemma 3.19 that f ψ does not preserve tail equivalence on f −1 (Supp(ψ)) and preserves tail equivalence on the complement of this set. Since ντ = f ψ and since ντ preserves tail equivalence on Supp(ν), it follows that Supp(ν) ∩ f −1 (Supp(ψ)) = ∅ This means that f (Supp(ν)) ∩ Supp(ψ) = ∅ Now consider the description of e F (ντ ), F ν −1 (ντ ) Now let η1 be a special form obtained by performing expansion moves on ν −1 such that for each percolating element yst of η1 , f acts on s. Let η2 be the special form obtained by replacing each yst in η1 by yft (s) . Moreover, by further expansions on η1 we may guarantee that η2 has sufficiently large depth so that η2 ψ is a standard form. 52 YASH LODHA It follows that F ν −1 (f ψ) = F η1 (f ψ) = F η2 ψ So we get a new tame description of our 1-cluster e F ψ, F η2 ψ Since Supp(η2 ) = f (Supp(η1 )) = f (Supp(ν −1 )) = f (Supp(ν)) from the above it follows that Supp(η2 ) ∩ Supp(ψ) = ∅ Using this new description we land in Case (1) above and therefore conclude that there is a 1-cluster e′ incident to u such that e, e′ are parallel.  Lemma 10.39. Let u be the trivial coset F . Suppose that a 1-cluster e admits a tame description F τ, F ντ satisfying that: (1) Supp(ν) ⊆ Supp(τ ). (2) ντ restricted to Supp(ν) does not preserve tail equivalence on a dense subset of Supp(ν). Then e, u are disparate. Proof. Thanks to Lemma 10.17 it suffices to consider amplifications of e with a preferred choice of base, which will be F τ . Now assume by way of contradiction that there is an amplification C of e with base F τ given by F τ, F ν1 τ ... F τ, F νn τ (with F ν = F ν1 ...νn ) so that for some 1 ≤ l ≤ n, the pair e′ = F τ, F νl τ u=F is compatible. We can also assume that νl τ is a standard form (by replacing νl with an equivalent special form, if necessary). In other words, there is a 1-cell e′′ incident to F such that e′ , e′′ are parallel. By Lemma 10.3, there is a description e′′ = F η, F νl η for a Y -word η, and a sequence of special forms ψ1 , ..., ψm such that: (1) ψi , νl have disjoint supports for each 1 ≤ i ≤ m. (2) (ψ1 ...ψm )τ = η. Now since the trivial coset F is incident to u, we have two possible cases: Case (1) F η = F . Case (2) F νl η = F . Proof for Case (1): Recall from the above that (ψ1 ...ψm )τ = η. In this case it follows that F (ψ1 ...ψm )τ = F η = F and so (ψ1 ...ψm )τ ∈ F . Since τ is a Y -word with no potential cancellations, by Lemma 3.19 it does not preserve tail equivalence on a dense subset of its support. Since Supp(ν) ⊆ Supp(τ ), this implies that the action of τ on Supp(ν) does not preserve tail equivalence on a dense subset. In particular, the action of τ on Supp(νl ) ⊂ Supp(ν) does not preserve tail equivalence on a dense subset. Since ψi , νl have disjoint supports, the action of (ψ1 ...ψm )τ restricted to Supp(νl ) equals that of τ , and hence does not preserve tail equivalence. So this cannot act as an element of F , and we get a contradiction. Proof for Case (2): Recall from the above that (ψ1 ...ψm )τ = η and hence νl η = νl (ψ1 ...ψm )τ = (ψ1 ...ψm )νl τ A NONAMENABLE TYPE F∞ GROUP 53 This means that F (ψ1 ...ψm )(νl τ ) = F νl η = F and so (ψ1 ...ψm )(νl τ ) ∈ F . Since ψi , νl have disjoint supports, the action of (ψ1 ...ψm )(νl τ ) restricted to Supp(νl ) equals the action of νl τ on Supp(νl ). If we show that the action of νl τ does not preserve tail equivalence on Supp(νl ) we shall obtain the desired contradiction. Recall from the above that ντ does not preserve tail equivalence on a dense subset of Supp(ν) and hence on a dense subset of Supp(νl ). Since (ν1 ...νn ) and ν are equivalent special forms, this means that (ν1 ...νn )τ does not preserve tail equivalence on a dense subset of Supp(νl ). Now note that the actions of (ν1 ...νn )τ and νl τ agree on Supp(νl ) since ν1 , ..., νn are independent and have disjoint supports. Hence νl τ does not preserve tail equivalence on Supp(νl ).  Proof of Proposition 10.34 Proof. Since the notion of parallel 1-clusters is invariant under the G action, we can assume that u is the trivial coset F for the sake of this proof. We fix a tame description e = F τ, F ντ . We perform a sequence of expansion moves on percolating elements of ν to obtain an equivalent special form yst11 ...ystnn such that for each 1 ≤ i ≤ n, either Supp(ystii ) ⊂ Supp(τ ) or Supp(ystii ) ∩ Supp(τ ) = ∅. We use this data for an amplification of e to obtain the pre-cluster: e1 = F τ, F yst11 τ ... en = F τ, F ystnn τ If Supp(ystii ) ∩ Supp(τ ) = ∅, then by Lemma 10.38 ei , u are compatible. We claim that for any given 1 ≤ i ≤ n, if Supp(ystii ) ⊂ Supp(τ ), then exactly one of the following holds: (1) ystii τ does not preserve tail equivalence on a dense subset of Supp(ystii ). (2) ystii τ acts like an element of F on Supp(ystii ). It is clear that the above are mutually exclusive. We show that if (2) do not hold then (1) holds. Since the description of e is tame, we know that τ is a standard form with no potential cancellations, and that ντ is a standard form. Furthermore, since ystii is an offspring of a percolating element of ν, ystii τ is a standard form. For any infinite binary sequence of the form si σ, the associated calculation of ystii τ (after performing cancellations in the calculation if necessary) has the same exponent. So if ystii τ does not act like F on Supp(ystii ), then it does not preserve tail equivalence some sequence in this set. It follows that all such calculations have exponent greater than 0. And hence it does not preserve tail equivalence on a dense subset of Supp(ystii ) = [si 0∞ , si 1∞ ]. By applications of Lemmas 10.38 and 10.39, we conclude that in case (1) the pair ei , u is disparate and in case (2) the pair is compatible.  Proof of Corollary 10.35 Proof. We proceed by induction on n. The base case is precisely Proposition 10.34. Now assume that we have a pre-cluster C from an amplification e → C such that the statement holds for C and u1 , ..., un−1 . Now apply Proposition 10.34 to each pair e ∈ C, un to obtain amplifications e → Ce such that for each e′ ∈ Ce the pair e′ , un is disparate or compatible. Note that it is possible that e → Ce is the trivial amplification and e = Ce . Now consider the amplification C → C ′ which is given by replacing each e ∈ C by Ce . In particular, S ′ C = e∈C Ce . The pre-cluster C ′ satisfies the desired property. Since iterated amplifications of a 1-cluster can be viewed as a single amplification of the 1-cluster, we are done.  54 YASH LODHA Proof of Proposition 10.33. S Proof. For each 1-cluster e ∈ 1≤i≤n Ci , using Corollary 10.35 we find an amplification e → Ce (at the same base) such that for each ui and each e′ ∈ Ce , the pair , ui is compatible or disparate. (Note that this could possibly be the trivial amplification, i.e. it could be that Ce = e.) Our amplification Ci → Ci′ is then the amplification obtained by replacing each e ∈ Ci with Ce , i.e. S  Ci′ = e∈Ci Ce . 10.5. Balanced systems of clusters. Definition 10.40. We say that a weakly balanced system C1 , ..., Cn is a balanced system if any pair of S 1-clusters in 1≤i≤n Ci is either parallel or disparate. In this subsection we will provide a procedure that takes input a weakly balanced system of pre-clusters C1 , ..., Cn and produces a balanced system of pre-clusters C1′ , ..., Cn′ such that each Ci′ is obtained by a sequence of amplifications of Ci . Hence automatically, it follows that C̄i is a subcluster of C̄i′ for each 1 ≤ i ≤ n. Our goal now is to prove the following. Proposition 10.41. (Balancing procedure) Let C1 , ..., Cn be a weakly balanced system of clusters in X. We can perform a sequence of amplifications on Ci to obtain pre-clusters Ci′ such that C1′ , ..., Cn′ is a balanced system. Balanced systems are not as well behaved as weakly balanced systems. Performing ad hoc amplifications of a balanced system will in general not produce a balanced system. In particular, the analog of Lemma 10.32 fails. However if we perform an amplification of a balanced system C1 , ..., Cn carefully enough, this produces another balanced system. Definition 10.42. (Common amplification for a balanced system) Let C1 , ..., Cn be a balanced system, and let Ej be a set of 1-clusters in Cj for some 1 ≤ j ≤ n. Fix an amplification Cj → Cj′ along Ej We define amplifications C1 → C1′ ... Cn → Cn′ as follows. For each 1 ≤ i ≤ n, i 6= j, define Ei = {e ∈ Ci | ∃e′ ∈ Ej such that e, e′ are parallel } Then Ci → Ci′ is defined as follows. Let Ei = {e1 , ..., ek } and for each 1 ≤ l ≤ k let e′l ∈ Ej be the 1-cluster such that el , e′l are parallel. Consider the amplification e′l → Dl′ which is the restriction of Cj → Cj′ to e′l . Let el → Dl be the corresponding common amplification. Then we define Ci′ = (Ci \ {e1 , ..., ek }) [ Dl 1≤l≤k The resulting amplification is denoted as C1 , ..., Cn → C1′ , ..., Cn′ along Ej and is said to be a common amplification for a balanced system. Lemma 10.43. Let C1′ , ..., Cn′ be a system obtained from a common amplification of a balanced system C1 , ..., Cn along Ej ⊆ Cj for some 1 ≤ j ≤ n. Then C1′ , ..., Cn′ is a balanced system. A NONAMENABLE TYPE F∞ GROUP 55 Proof. First observe that by Lemma 10.32, C1′ , ..., Cn′ is weakly balanced. Now we show that it it balanced. Consider 1-clusters e′i ∈ Ci′ , e′l ∈ Cl′ for some 1 ≤ i, l ≤ n. Let be 1-clusters such that e′i , e′l ei ∈ Ci , el ∈ Cl are offsprings of ei , el in the amplifications Ci → Ci′ , Cl → Cl′ respectively. (Note that it is possible that ei = e′i or el = e′l , in the case when these 1-clusters are unchanged in the amplification.) By our hypothesis, ei , el are either parallel or disparate. If they are disparate, then so are e′i , e′l thanks to Lemma 10.27. If ei , el are parallel, and e′i = ei and e′l = e′l , then e′l , e′i are parallel. If one of ei , el is amplified in the above amplification, then there is a parallel 1-cluster ej ∈ Ej such that ei , el , ej are pairwise parallel. Following Definition 10.42, in this case both ei , el are amplified as parallel 1-clusters in the sense of Definition 10.22. So the union of their sets of offsprings must satisfy that each pair is parallel or disparate. In particular, e′i , e′l are either parallel or disparate.  We now prove the balancing lemma which is an important technical step in the proof of Proposition 10.41. Lemma 10.44. (Balancing Lemma) Let C1 , C2 be pre-clusters with a common base u. The we can perform amplifications C1 → D1 and C2 → D2 such that D1 , D2 is a balanced system. Proof. Note that since both clusters share the same base u, the system is trivially weakly balanced. In this proof we shall use the word offspring for percolating elements obtained from expansion moves on special forms, as well as elements of pre-clusters obtained from amplifying a pre-cluster. The usage will be clear from the context. Let u = F τ . Let C1 comprise of 1-clusters F τ, F τ1 τ ... F τ, F τo1 τ F τ, F ψ1 τ ... F τ, F ψo2 τ and let C2 comprise of Further, let ψ{1,...,o2} = yuv11 ...yuvm τ{1,...,o1 } = yst11 ...ystnn m where equality denotes equality of words. Note that since τ1 , ..., τo2 are independent and ψ1 , ..., ψo2 are independent, it follows that s1 , ..., sn and u1 , ..., um are independent, and each ti , vj ∈ {1, −1}. By the Strong expansion Lemma 6.25, there are words ypq11 ...ypqll and yrw11 ...yrwkk such that: (1) ypq11 ...ypqll is obtained from yst11 ...ystnn by applying expansion moves as in 6.10. by applying expansion moves as in 6.10. (2) yrw11 ...yrwkk is obtained from yuv11 ...yuvm m w w w (3) For each pair ypqii , yrjj it holds that either ypqii = yrjj or ypqii , yrjj contains no common offsprings. Let D1 be given by the amplification of C1 consisting of the 1-clusters F τ, F ypq11 τ ... F τ, F ypqll τ and D2 be the amplification of C2 consisting of the 1-clusters F τ, F yrw11 τ ... F τ, F yrwkk τ It remains to check that the 1-clusters in each pair F τ, F yrwii τ F τ, F yrwjj τ 56 YASH LODHA are either equal (hence parallel) or disparate. w If 1-clusters in such a pair are not equal and also not disparate, we claim that yrwii , yrjj have a common offspring. (To see this, observe that there are amplifications of such a pair of 1-clusters using the descriptions above that have a common offspring in the sense of 10.13. Moreover, the parameters of the two descriptions of the common offspring are equal.) This contradicts condition (3) above.  For the rest of this subsection, we fix a weakly balanced system C1 , ..., Cn . Thanks to Lemma 10.32 since performing any amplifications on a weakly balanced system produces a weakly balanced system, we shall omit the usage of the phrase “weakly balanced” in the remainder of the proof. It shall be evident that all systems under consideration are weakly balanced. Our goal will now be to perform amplifications on this system to obtain a balanced system. The proof is an inductive argument, where the induction is performed on the number n of pre-clusters in the system C1 , ..., Cn . Note that the base case is trivial, since 1-clusters in a pre-cluster are pairwise disparate, and hence the system is balanced. Inductive hypothesis A system of weakly balanced pre-clusters C1 , ..., Cn such that C1 , ..., Cn−1 is balanced. Inductive Step The inductive step will be done in n stages. First, declare (0) C1 (0) = C1 C2 = C2 ... Cn(0) = Cn Stage i, for 1 ≤ i ≤ n involves performing the following: (i−1) (i) (1) An amplification of Cn to obtain Cn . (2) A common amplification of the balanced system (i−1) C1 (i) (i−1) (i) (i) , ..., Cn−1 → C1 , ..., Cn−1 (i) Output at stage i: A system C1 , ..., Cn such that: (i) (i) (1) C1 , ..., Cn−1 is a balanced system. (i) (i) (i) (2) C1 , ..., Ci , Cn is a balanced system. (n) (n) Output at stage n: A balanced system C1 , ..., Cn . Stage i (i−1) Let E = {e1 , ..., ek } be the set of 1-clusters in Cn such that for each 1 ≤ j ≤ k, the pair ej , ui is compatible. For each 1 ≤ j ≤ k, let e′j be a 1-cluster incident to ui such that ej , e′j are parallel. Let D1 (i−1) be the pre-cluster with base ui that consists of the 1-clusters e′1 , ..., e′k . Note that by definition Cn forms a balanced system. (i−1) Using the balancing Lemma 10.44, there are sets Ei ⊆ Ci (i−1) Ci → J1 , L ⊆ D1 and amplifications D1 → J2 along Ei , L such that J1 , J2 is a balanced system. Let En = {e ∈ Cn(i−1) | ∃e′ ∈ L such that e, e′ are parallel} We perform the common amplification Cn(i−1) → J3 to obtain a balanced system J3 , J2 . Lemma 10.45. J1 , J3 is a balanced system. D1 → J2 along En , L , D1 A NONAMENABLE TYPE F∞ GROUP (i−1) Proof. Since Cn (i−1) , Ci 57 is weakly balanced, it follows that J1 , J3 is weakly balanced. Now for any e ∈ J3 , either one of the following holds. (i−1) (1) e ∈ Cn \ En . (2) e is an offspring of a 1-cluster e′ ∈ En . Now given any e1 ∈ J2 we claim that e, e1 are parallel or disparate. (i−1) If e ∈ Cn \ En , then e, ui are disparate, and hence e, e1 are disparate. If e is an offspring of a 1-cluster e′ ∈ En , then there is an e′′ ∈ J2 such that e, e′′ are parallel. Now recall from the above that J2 , J3 is a balanced system. This means that either e′′ = e′ or e′′ , e′ are disparate. As a consequence e, e′ are parallel or disparate.  Let Ei be as above, and for 1 ≤ j ≤ n − 1, j 6= i let (i−1) Ej = {e ∈ Cj | ∃e′ ∈ Ei such that e, e′ are parallel } Finally, we perform the common amplification of the system (i−1) C1 (i−1) (i) (i) , ..., Cn−1 → C1 , ..., Cn−1 along Ei in the sense of Definition 10.42. Note that in particular, (i) Ci = J1 We set Cn(i) = J3 To finish the proof of Proposition 10.41, it suffices to show the following: Lemma 10.46. The system (i) (i) C1 , ..., Ci , Cn(i) is balanced. Proof. The system (i) (i) C1 , ..., Cn−1 is balanced, thanks to Lemma 10.43, since it was obtained from performing a common amplification of a (i) (i) balanced system. Moreover, Ci , Cn is a balanced system thanks to Lemma 10.45 since we have (i) Ci Cn(i) = J3 = J1 Consider a pair (i) e2 ∈ Cn(i) e1 ∈ Cj for some 1 ≤ j ≤ i − 1. We will show that e1 , e2 are parallel or disparate. This will finish the proof of the Lemma. There are two possibilities for e1 : (i−1) (a1) e1 ∈ Cj \ Ej . (i−1) (a2) e1 is an offspring of some e′1 ∈ Cj in the amplification (i−1) Cj (i) → Cj along Ej There are two possibilities for e2 : (i−1) (b1) e2 ∈ Cn \ En . (b2) e2 is an offspring of some e′2 ∈ En in the amplification (i−1) Ci (i) → Ci along En 58 YASH LODHA Case a1, b1 Our claim follows by the hypothesis at the end of Step i − 1 that the system (i−1) C1 (i−1) , ..., Ci−1 , Cn(i−1) is balanced. Cases a2, b1 and a2, b2 In both the cases, e′1 ∈ Ej and there is a e3 ∈ Ei such that e′1 , e3 are parallel. Recall that the amplification (i−1) Ci → J1 along Ei D1 → J2 along L is done using Lemma 10.44. So in particular, there is an e4 ∈ L such that e3 , e4 are neither parallel nor disparate. It follows that e4 , e′1 are neither parallel, nor disparate. (i−1) (i−1) (i−1) are , e′1 ∈ Cj such that e4 , e′4 are parallel. This means that e′4 ∈ Cn There is a e′4 ∈ En ⊆ Cn neither parallel nor disparate. This contradicts the hypothesis at the end of Step i − 1 that the system (i−1) C1 (i−1) , ..., Ci−1 , Cn(i−1) is balanced. Case a1, b2 By the hypothesis at the end of Step i − 1, e′2 , e1 are either parallel or disparate. If they are disparate, so are e1 , e2 . We assume that e′2 , e1 are parallel. Also in this case, it is true that there is a e3 ∈ L ⊆ D1 such that e′2 , e3 are parallel. In particular, e1 , e3 are parallel. Following the amplification (i−1) Ci → J1 along Ei D1 → J2 along L (i−1) such that e3 , e4 are neither parallel done using Lemma 10.44, we observe that there is an e4 ∈ Ei ⊂ Ci nor disparate. Since e1 , e3 are parallel, it follows that e1 , e4 are neither parallel nor disparate. This contradicts the hypothesis that the system (i−1) C1 (i−1) , ..., Cn−1 is balanced.  10.6. Balanced systems and nonpositive curvature. In this subsection we show that given a balanced system C1 , ..., Cn , there is a subcomplex C of X such that the following holds: S (1) 1≤i≤n C̄i is a subcomplex of C. (2) C is homeomorphic to a nonpositively curved cube complex. In this step, we provide an explicit such structure on C. The main idea behind this is the following. Definition 10.47. (Parallel closure) Let C1 , ..., Cn be a balanced system S of pre-clusters in X. Let E be the set of 1-clusters in X such that for each e ∈ E, there is an e′ ∈ 1≤i≤n Ci such that e and e′ are parallel. Denote by C as the union of the following set of clusters in X: {C is a cluster in X | Each facial 1-subcluster of C is an element of E} We call C the parallel closure of C1 , ..., Cn . Proposition 10.48. Let C be the parallel closure of a balanced system C1 , ..., Cn . Then the following holds: S (1) 1≤i≤n C̄i ⊂ C. (2) C is homeomorphic to a non positively curved cube complex. Proof. Each facial 1-subcluster of C̄i is parallel to a 1-cluster in Ci . So the first claim follows immediately from the definition of C. A NONAMENABLE TYPE F∞ GROUP 59 We shall prove the second claim in two parts. First we demonstrate that C is homeomorphic to a cube complex, which is locally finite and finite dimensional. Then we shall demonstrate that this is non positively curved in the sense of Gromov. In the first part, we show that the intersection of each pair of clusters in C is a facial subcluster of both. First observe that if e1 and e2 are facial 1-subclusters of clusters C1 and C2 , respectively, in C, then e1 , e2 are parallel or disparate. This follows immediately from the definition of C. Assume by way of contradiction that there are two clusters D1 , D2 in C such that D1 ∩ D2 is a diagonal subcluster of D1 . Now we find descriptions satisfying: (1) D1 is described with base F τ and parameters ψ1 , ..., ψn . (2) D2 is described with base F τ and parameters η1 , ..., ηm . (3) There is a facial 1-subcluster e of D1 ∩ D2 , incident to F τ , which is a diagonal subcluster of D1 . By (3) above there are sets X ⊆ {1, ..., n}, |X| > 1 Y ⊆ {1, ..., m} satisfying: e = F τ, F ψX τ = F τ, F ηY τ We claim that each pair of 1-clusters F τ, F ψi τ F τ, F ηj τ is distinct for any i ∈ X, j ∈ Y . By way of contradiction, assume that e′ = F τ, F ψi τ = F τ, F ηj τ for some i ∈ X, j ∈ Y . This implies that e′ is a facial 1-subcluster of D1 ∩D2 since it is a facial 1-subcluster of both D1 and D2 . This contradicts our hypothesis that e is a facial 1-subcluster of the intersection D1 ∩ D2 since e, e′ cannot be orthogonal. (In particular, they are not disparate.) Since F ψX = F ηY , and since both ψX , ηY are products of independent special forms, there is a Y -word yst11 ...ystnn which can be obtained from both ηY , ψX using expansion moves. This means that there are j ∈ X, k ∈ Y such that we can perform expansion moves on ψj , ηk respectively to obtain special forms ψj′ , ηk′ satisfying that some ystii occurs in both ψj′ , ηk′ . It follows that we can perform an amplification of the 1-clusters e1 = F τ, F ψj τ e2 = F τ, F ηk τ to obtain pre-clusters that both contain the 1-cluster F τ, F ystii τ . This means that e1 , e2 are not disparate. Since they are distinct 1-clusters incident to the same 0-cell, F τ, F ψj τ and F τ, F ηk τ cannot be parallel. But since they are both facial 1-clusters of clusters in C, they must then be disparate. This is a contradiction. Therefore, our original assumption must be false, and it must be the case that D1 ∩ D2 is a facial subcluster of both D1 and D2 . Note that C is naturally homeomorphic to a cube complex. We shall abuse notation and also refer to C as a cube complex itself. For the rest of the proof, each n-cluster in C is assumed to be replaced by a regular Euclidean n-cube, facial subclusters are declared as subcubes, and the facial intersections provide the gluing maps. We now observe that C is locally finite and finite dimensional. Consider a 0-cell u in C. Let E be the set of closed 1-cells incident to u in C. S Each closed 1-cell in E, by definition, corresponds to a 1-cluster in X which is parallel to a 1-cluster in 1≤i≤n Ci . We abuse notation and also denote this set of 1-clusters as E. 60 YASH LODHA Since S any two 1-clusters in E are incident to the same 0-cell in X, they cannot be parallel. Since the set 1≤i≤n Ci is finite, the number of 1-clusters incident to u in X that are parallel to a 1-cluster in S 1≤i≤n Cn is finite. It follows that E is finite. This observation implies that the cube P complex C is locally finite, and the largest dimension of a cube in C is bounded above by the quantity 1≤i≤n |Ci |. Next, we demonstrate that C is nonpositively curved. It is easy to see that the link of each 0-cell in C is a simplicial complex. We will show that the link of each 0-cell in C does not contain empty simplices, and hence is a flag simplicial complex. To see this, let e1 , ..., en be closed 1-cells in C incident to a 0-cell u with the property that each pair ei , ej are 1-faces of a square incident to u. The closed 1-cells e1 , ..., en correspond to 1-clusters e′1 , ..., e′n in X with the property that each pair e′i , e′j are facial 1-subclusters of a 2-cluster. In particular, e′1 , ..., e′n are pairwise orthogonal, and hence by Lemma 10.10 there is an n-cluster D in X which contains e′1 , ..., e′n as facial 1-subclusters. S Each 1-cluster e′1 , ..., e′n is parallel to some 1-cluster in 1≤i≤n Ci , And each facial 1-subcluster of D is parallel to some e′i . So it follows that D corresponds to a cube D′ in C, so that the 1-faces of D′ incident to u are precisely e1 , ..., en . Therefore, the link at the vertex u in C contains an n-simplex whose vertices correspond to e1 , ..., en .  Now we conclude the proof of asphericity. 10.7. Proof of asphericity. Any image of a sphere S n in X under a continuous map is contained in some finite subcomplex Y . Since X is defined as a union of clusters, Y itself is contained S in a finite union of clusters. In particular, we find a finite list of pre-clusters C1 , ..., Cn such that Y ⊂ 1≤i≤n C̄i . Using Propositions 10.33 and 10.41, we obtain a balanced system C1′ , ..., Cn′ such that [ [ C̄i ⊆ C̄i′ 1≤i≤n 1≤i≤n Using Proposition 10.48, we conclude that the parallel closure C of C1′ , ..., Cn′ satisfies that: S S (1) Y ⊆ 1≤i≤n C̄i ⊆ 1≤i≤n C̄i′ ⊆ C. (2) C is homeomorphic to a nonpositively curved cube complex, hence is aspherical. It follows that the image of the sphere is nullhomotopic in C and hence in X. Therefore, X is apsherical. 11. A question The following question, suggested to the author by Mikhael Gromov, could provide an interesting direction for future research. Question 11.1. Is there a group G satisfying the following? (1) G is of type F. (2) G is nonamenable. (3) G does not contain non abelian free subgroups. Recall that a group is of type F if it admits a finite Eilenberg-Mclane complex. Examples of such groups include finitely generated free abelian groups, torsion free hyperbolic groups (including finitely generated free groups), torsion free subgroups of finite index in finitely generated Coxeter groups, torsion free subgroups of finite index in arithmetic groups, and torsion free subgroups of finite index in the outer automorphism group of a finitely generated free group. (See [12] for further details.) None of the above examples can be sources of such a group. The group studied in this article is not of type F, since it contains subgroups isomorphic to Z∞ . Interesting subgroups of the group of piecewise projective homeomorphisms of the real line seem to always contain A NONAMENABLE TYPE F∞ GROUP 61 Z∞ subgroups, hence may not provide such an example. This includes the case of Thompson’s group F , for instance. Containing torsion elements is also an obstruction for type F. Hence nonamenable Burnside groups, torsion Tarski monsters, Golod-Shafarevich groups as well as the finitely presentable nonamenable group of Olshanskii-Sapir cannot provide a source of such a group. References [1] J. Alonso, “Finiteness conditions on Groups and Quasi-isometries.”, Journal of Pure and Applied Algebra 95 (1994) 121-129 [2] S.I. Adyan. The Burnside Problem and Identities in Groups. volume 95 of Ergebnisse der Mathematik und ihrer Grenzgebiete. Springer, Berlin, 1979. [3] S.I. Adyan. Random walks on free periodic groups. Izv. Akad. Nauk SSSR Ser. Mat. 46(6):1139–1149, 1982. [4] J. Belk. Thompson’s group F . Ph.D. Thesis, Cornell University, 2004. arXiv:0708.3609. [5] M. Bestvina and N. Brady, ‘ Morse theory and finiteness properties of groups Invent Math. 129 (1997) 445-40. [6] K. Brown. Finiteness properties of groups. J. Pure Appl. Algebra 44 (1987), no. 1-3, 4575. [7] K.S. Brown, and R. Geoghegan, An infinite-dimensional torsion-free F P∞ group. Invent Math. 77 (1984): 367-382. [8] M.G. Brin, C.C. Squier. Groups of piecewise linear homeomorphisms of the real line. Invent. Math., 79(3):485–498, 1985. [9] M.R. Bridson and A. Haefliger. Metric spaces of non-positive curvature Springer-Verlag, Berlin, 1999. [10] J.W. Cannon, W.J. Floyd, W.R. Parry. Introductory notes on Richard Thompson’s groups. Enseign. Math. (2), 42(34):215–256, 1996. [11] M.M. Day. Means for the bounded functions and ergodicity of the bounded representations of semi-groups. Trans. Amer. Math. Soc., 69:276–291, 1950. [12] R. Geoghegan Topological Methods in Group Theory Graduate Texts in Mathematics (Volume 243, Springer 2008) [13] Gersten, S. M. Selected problems. Combinatorial group theory and topology (Alta, Utah, 1984), 545–551, Ann. of Math. Stud., 111, Princeton Univ. Press, Princeton, NJ, 1987. [14] M. Gromov, Hyperbolic groups. Essays in group theory. Mathematical Sciences Research Institute Publications 8(ed) S.M. Gersten, Spriger, New York, 1987. [15] S.V. Ivanov. Embedding free Burnside groups in finitely presented groups. Geometriae dedicata, 111:87–105, 2005. [16] Y. Lodha, J.T. Moore, A nonamenable finitely presented group of piecewise projective homeomorphisms. Groups, Geometry and Dynamics. Volume 10, Issue 1, 2016, pp. 177-200 [17] J. Lauri, R Scapellato Topics in Graph Automorphisms and Reconstruction. London Mathematical Society Student texts 54. [18] N. Monod. Groups of piecewise projective homeomorphisms. Proc. Natl. Acad. Sci., 110(12):4524–4527, 2013 [19] A.Y. Ol’shanskii. On the question of the existence of an invariant mean on a group. Uspekhi Mat. Nauk, 35(4):199–200, 1980. [20] A.Y. Ol’shanskii, M.V. Sapir. Non-amenable finitely presented torsion-by-cyclic groups. Publ. Math. Inst. Hautes Études Sci., 96:43–169, 2003. [21] J. von Neumann. Zur allgemeinen Theorie des Maßes. Fund. Math., 13:73–116, 1929. [22] C.T.C. Wall, “Finiteness Conditions for C.W. Complexes”, The Annals of Mathematics, 2nd Ser., Vol 81, No. 1. (Jan., 1965), 56-69. [23] M. Zaremsky. HNN decompositions of the Lodha-Moore groups, and topological applications J. Topol. Anal, Vol. 8, No. 4, 627-653, 2016 Institute of Mathematics, EPFL, SB MATHGEOM EGG, Station 8, MA B3 514, Lausanne, CH-1015, Switzerland E-mail address: [email protected]
4math.GR
arXiv:1509.03354v3 [math.AC] 30 Mar 2017 VALUATION SEMIRINGS PEYMAN NASEHPOUR Abstract. The main scope of this paper is to introduce valuation semirings in general and discrete valuation semirings in particular. In order to do that, first we define valuation maps and investigate them. Then we define valuation semirings with the help of valuation maps and prove that a multiplicatively cancellative semiring is a valuation semiring if and only if its ideals are totally ordered by inclusion. We also prove that if the unique maximal ideal of a valuation semiring is subtractive, then it is integrally closed. We end this paper by introducing discrete valuation semirings and show that a semiring is a discrete valuation semiring if and only if it is a multiplicatively cancellative principal ideal semiring possessing a nonzero unique maximal ideal. We also prove that a discrete valuation semiring is a Gaussian semiring if and only if its unique maximal ideal is subtractive. In memory of Prof. Dr. Manfred Kudlek 0. Introduction Semirings not only have significant applications in different fields such as automata theory in theoretical computer science, (combinatorial) optimization theory, and generalized fuzzy computation, but are fairly interesting generalizations of two broadly studied algebraic structures, i.e., rings and bounded distributive lattices. Valuation theory for rings was introduced by Krull in [18] and has been proven to be a very useful tool in ring theory. Also valuation theory represents a nice interplay between ring theory and ordered Abelian groups. The main purpose of this paper is to generalize valuation theory for semirings. In this paper, all semirings are commutative with a zero and a nonzero identity. In the first section of the present paper, similar to the classical concept of valuations in Bourbaki ([2, VI, 3.1]), we define the concept of valuation maps for semirings with values in totally ordered commutative monoids (tomonoids for short). Note that our notion for valuation maps should not to be confused with the concept of valuation functions for semirings in [12, Definition 6.4]. By an M -valuation on S, we mean a map v : S → M∞ with the following properties: (1) S is a semiring and M∞ is a tomonoid with the greatest element +∞, which has been obtained from the tomonoid M with no greatest element, (2) v(xy) = v(x) + v(y), for all x, y ∈ S, (3) v(x + y) ≥ min{v(x), v(y)}, for all x, y ∈ S, 2010 Mathematics Subject Classification. 16Y60, 13B25, 13F25, 06D75. Key words and phrases. Semiring, Bounded distributive lattice, Semiring polynomials, Monoid semiring, Unique factorization semiring, Valuation semiring, Valuation map, Discrete valuation semiring, Gaussian semiring. 1 2 PEYMAN NASEHPOUR (4) v(1) = 0 and v(0) = +∞. When there is an M -valuation v on S, it is easy to see that the set Sv = {s ∈ S : v(s) ≥ 0} is a subsemiring of S and plays an important role in our paper. If the map v is surjective, we show that the semiring S is a semifield if and only if M is an Abelian group and the set of units U (Sv ) of Sv is equal to {s ∈ Sv : v(s) = 0} (See Theorem 1.8). Let us recall that a nonempty subset I of a semiring S is said to be an ideal of S, if a, b ∈ I implies a + b ∈ I and sa ∈ I for any s ∈ S. An ideal I of a semiring S is said to be subtractive (in some references k-ideal), if a + b ∈ I and a ∈ I implies b ∈ I for all a, b ∈ S. At last, an ideal I of a semiring S is said to be proper, if I 6= S. Let v be an M -valuation on S. We define v to have min-property, whenever v(x) 6= v(y), then v(x + y) = min{v(x), v(y)} for any x, y ∈ S. Though this property holds for valuation maps on rings, this is not the case for semirings (Check Remark 1.13). We say “T is a V -semiring with respect to the triple (S, v, M )”, if T is a semiring and there exists an M -valuation v on S such that the semiring S contains T as a subsemiring and T = Sv = {s ∈ S : v(s) ≥ 0} (Definition 1.6). Actually in Corollary 1.15, we show that if T is a V -semiring with respect to the triple (K, v, M ), where K is a semifield and v is a surjective map, then the following statements are equivalent: (1) The valuation map v has the min-property; (2) The maximal Kv -ideal Pv = {x ∈ Sv : v(x) > 0} is subtractive. Similar to ring theory, an ideal A of a semiring S is said to be principal if A is generated by one element, i.e., A = (a) = {sa : s ∈ S} for some a ∈ S. In Proposition 1.18, we prove that if Sv is a V -semiring with respect to the triple (K, v, M ), where K is a semifield and v is surjective, then the principal ideals of Sv are totally ordered by inclusion. This is the base for the definition of valuation semirings given in section 2. Let us recall a notation. If S is a multiplicatively cancellative semiring (for short MC semiring), we denote its semifield of fractions by F (S) (Refer to Remark 1.9). In section 2, we define a semiring S to be a valuation semiring, if there exists an M -valuation v on K, where K is a semifield containing S as a subsemiring, v is surjective, and S = Kv = {s ∈ K : v(s) ≥ 0}. One of the main theorems of the paper is the following (Theorem 2.4): An MC semiring S is a valuation semiring, if and only if one of the following equivalent conditions hold: (1) For any element x ∈ F (S), either x ∈ S or x−1 ∈ S, (2) For any ideals I, J of S, either I ⊆ J or J ⊆ I, (3) For any elements x, y ∈ S, either (x) ⊆ (y) or (y) ⊆ (x). Let S be an MC semiring and F (S) its semifield of fractions. The element u ∈ F (S) is said to be integral over S if there exist a1 , a2 , . . . , an and b1 , b2 , . . . , bn in S such that un + a1 un−1 + · · · + an = b1 un−1 + · · · + bn . The semiring S is said to be integrally closed if the set of elements of F (S) that are integral over S is the set S [5, p. 88]. In Theorem 2.7, we show that if S is a valuation semiring such that its unique maximal ideal J is subtractive, then S is integrally closed. VALUATION SEMIRINGS 3 Section 3 is devoted to discrete valuation semirings. We define a semiring S to be a discrete valuation semiring (DVS for short), if S is a V -semiring with respect to the triple (K, v, Z), where K is a semifield and v is surjective (Definition 3.1). Before explaining briefly what we do in section 3, we need to recall some concepts. A semiring is said to be quasi-local if it has only one maximal ideal. A semiring satisfies ACCP if any ascending chain of principal ideals of S is stationary. A semiring S is said to be a principal ideal semiring, if each ideal of S is principal. In this section, we characterize discrete valuation semirings as follows (See Theorem 3.6): A semiring S is a discrete valuation semiring if and only if one of the following equivalent conditions satisfies: (1) S is a principal ideal MC semiring possessing a unique maximal ideal J = 6 (0), (2) S is a quasi-local T∞ MC semiring whose unique maximal ideal J 6= (0) is principal and n=1 J n = (0), (3) S is a quasi-local MC semiring whose unique maximal ideal J 6= (0) is principal, which satisfies ACCP. Let us recall that if S is a semiring, for a polynomial f ∈ S[X], the content of f , denoted by c(f ), is defined to be the S-ideal generated by the coefficients of f . A semiring S is called Gaussian if c(f g) = c(f )c(g) for all polynomials f, g ∈ S[X] ([22, Definition 7]). Finally in Theorem 3.8, we prove the following: Let S be a discrete valuation semiring. Then the following statements are equivalent: (1) (2) (3) (4) The unique maximal ideal of S is subtractive, The valuation map v : F (S) → Z∞ satisfies the min-property, Each ideal of the semiring S is subtractive, The semiring S is Gaussian. A connoisseur of valuation theory in commutative algebra already have noticed that some of the definitions and results, mentioned above, are extensions of their ring version ones. Therefore, throughout the paper, some examples are given to show that some objects really satisfy the hypotheses of certain definitions and theorems, while the others are given to show that the hypotheses of certain theorems in the paper cannot be greatly weakened. Though we have tried our paper to be self-contained in definitions and terminology, but many of them can be found in the book [11]. One may refer to the books [12], [11] and [23] for more on semirings. 1. Valuation Maps on Semirings The main scope of this section is to generalize the concept of valuation maps on rings and investigate the properties of these maps. While according to the classical definition of valuation maps in Bourbaki ([2, VI, 3.1]), the values of the elements of a ring belong to a totally ordered Abelian group, we define valuation maps in such way that the values of the elements of a semiring belong to an arbitrary totally ordered commutative monoid. We recall that by a totally ordered commutative monoid (tomonoid for short) (M, +, 0, ≤), it is meant a commutative monoid (M, +, 0) such that (M, ≤) is a totally ordered set and x ≤ y implies x + z ≤ y + z for any z ∈ M . We also need to recall the following: 4 PEYMAN NASEHPOUR In monoid theory, there is a routine technique that one can obtain a monoid with the greatest element from a monoid with no greatest element: Let (M, +, 0, ≤) be a tomonoid with no greatest element. One can configure a set M∞ by adjoining a new element to the monoid M , denoted by +∞, in this way that the total order on M induces a total order on M∞ such that +∞ is the greatest element, i.e., for all m ∈ M , we have that m < +∞ and the monoid structure on M induces a monoid structure on M∞ with the following rule: m + (+∞) = (+∞) + m = +∞, ∀ m ∈ M∞ . It is immediate that M∞ is also a tomonoid with the greatest element +∞. Now similar to the classical concept of valuations in Bourbaki ([2, VI, 3.1]), we define the concept of valuation maps for semirings with values in tomonoids (not to be confused with the concept of valuation functions for semirings in [12, Definition 6.4]). Definition 1.1. By “an M -valuation on S”, we mean a map v : S → M∞ with the following properties: (1) S is a semiring and M∞ is a tomonoid with the greatest element +∞, which has been obtained from the tomonoid M with no greatest element, (2) v(xy) = v(x) + v(y), for all x, y ∈ S, (3) v(x + y) ≥ min{v(x), v(y)}, for all x, y ∈ S, (4) v(1) = 0 and v(0) = +∞. When there is an M -valuation v on S, we set Sv = {s ∈ S : v(s) ≥ 0} and Pv = {s ∈ Sv : v(s) > 0}. If M = Z, we say that v is a discrete valuation on S. Remark 1.2. Let (S, +, ·) be a semiring and (M, ·, ≤) a tomonoid. It is possible to give a dual definition of an M -valuation on S as follows: We annex an element O to the tomonoid M to configure the set Mmax = M ∪{O} and extend ordering and monoid multiplication by the rules: O ≤ x and O · x = x · O = O, for all x ∈ Mmax . Imagine we can define a function v : S → Mmax with following properties: • v(x · y) = v(x) · v(y), for all x, y ∈ S, • v(x + y) ≤ max{v(x), v(y)}, for all x, y ∈ S, • v(1) = 1 and v(0) = O. Then it is easy to see that v defines an M -valuation on S. On the other hand, if v is an M -valuation on S, by reversing the ordering, one can get a function v : S → M∞ such that the three above conditions of the current remark are satisfied. Remark 1.3. (1) If, in Definition 1.1, S is a ring and M is a totally ordered Abelian group, then our definition for valuation maps given in Definition 1.1 coincides with the definition of a Bourbaki valuation on S with values in M∞ given in [2]. In fact, our definition for valuation maps, which is from an arbitrary semiring into a tomonoid and is based on Bourbaki’s classical definition, is somehow equivalent to the definition of valuation maps defined in Definitions 2.1 and 2.3 in [13], that is from a semiring into a so-called commutative bipotent semiring. Also note that our definition is more general than the definition of valuation maps in [15], which is taken VALUATION SEMIRINGS 5 from [13], but it is only from an additively idempotent semiring into R ∪ {+∞}. (2) By considering what it has been explained in Remark 1.2, our definition for valuation maps is more general than what is defined in Definition 1.2 in [25], a paper on valuations over idempotent (i.e., characteristic one) semirings, since in the same paper, by a valuation on a semiring S, it is meant a surjective map v : S → Mmax , for some totally ordered abelian group M , having the three conditions given in Remark 1.2 plus the following extra condition: v(x) ≤ max{v(x + y), v(y)} for all x, y ∈ S. Before starting to investigate the properties of valuation maps on semirings, let us give a couple of examples. Note that a semiring S is called entire if ab = 0 implies either a = 0 or b = 0 for all a, b ∈ S. Example 1.4. (1) Let S be an entire semiring. One can construct a trivial M valuation v on S, by defining v(s) = 0 for any s ∈ S − {0} and v(0) = +∞, where M = {0}. (2) Let (S, +, 0, ≤) be a tomonoid with no greatest element. Adjoin the greatest element +∞ to S and call the new set S∞ . Define on S the two operations a ⊕ b = min{a, b} and a ⊙ b = a + b. One can easily check that (S∞ , ⊕, ⊙) is a semiring and v : S∞ → S∞ defined by v(s) = s, is an S-valuation on S∞ ! (3) Let N0 denote the set of non-negative integers and p ∈ N0 be a fixed prime number. Obviously one can uniquely write any natural number x in the form of x = pn · y, where n ≥ 0 and y is a natural number and has no factor of p. Now we define the map v : N0 → N0 ∪ {+∞} by v(x) = v(pn · y) = n, if x is nonzero, and v(0) = +∞. A simple calculation shows that v is an N0 -valuation on N0 . (4) Let K be a semifield. By a non-archimedean absolute value on K, we mean a function | · | : K −→ R, satisfying the following properties for all x, y ∈ K: • |x| ≥ 0, and |x| = 0 if and only if x = 0, • |xy| = |x||y|, • |x + y| ≤ max{|x|, |y|}. It is clear that the map v : K −→ R ∪ {+∞}, defined as v(x) = − ln |x|, gives us an R-valuation on K (Refer to [7] and [14]). Now let us bring the following straightforward proposition only for the sake of reference. Note that an ideal P of a semiring S is said to be a prime ideal of S, if P 6= S and ab ∈ P implies either a ∈ P or b ∈ P for all a, b ∈ S. Proposition 1.5. Let there exist an M -valuation v on S. The following statements hold: (1) If s is multiplicatively invertible element of S, then v(s−1 ) = −v(s). (2) If sn = 1, then v(s) = 0 for any s ∈ S and natural number n. (3) The set v −1 (+∞) is a prime ideal of S. (4) The semiring S is an entire semiring, if v(s) = +∞ implies s = 0 for all s ∈ S. (5) The set Sv = {s ∈ S : v(s) ≥ 0} is a subsemiring of S and Pv = {s ∈ Sv : v(s) > 0} is a prime ideal of Sv . (6) If s is a unit of the semiring Sv , then v(s) = 0. 6 PEYMAN NASEHPOUR The statement (5) in Proposition 1.5 suggests us to give the following definition: Definition 1.6. We say “T is a V -semiring with respect to the triple (S, v, M )”, if T is a semiring and there exists an M -valuation v on S such that the semiring S contains T as a subsemiring and T = Sv = {s ∈ S : v(s) ≥ 0}. When there is no fear of ambiguity, we may drop the expression “with respect to the triple (S, v, M )” and simply say that T is a V -semiring. If we denote the units of a semiring S by U (S), then U (Sv ) ⊆ {x ∈ Sv : v(x) = 0} (Proposition 1.5). One may ask if these two sets are equal in general. In the following, we give simple but useful examples to show that the mentioned two sets can be sometimes different: Example 1.7. (1) Let S = N0 be the set of all nonnegative integers and define v : N0 −→ {0, +∞} to be a map that sends all s > 0 to 0 and sends 0 to +∞. Then, it is easy to check that U (Sv ) = {1}, while {s ∈ Sv : v(s) = 0} = N. (2) Put T = N0 [X][X −1] to be the entire semiring of all Laurent polynomials on N0 . Define the map v from T to Z∞ by v(am X m + am+1 X m+1 + · · · + an X n ) = m, where m, n ∈ Z and m ≤ n and am 6= 0 and v(0) = +∞. It is easy to see that v is a discrete valuation on the entire semiring T , Sv = N0 [X] and U (Sv ) = {1}, while {f ∈ N0 [X] : v(f ) = 0} = N + X · N0 [X]! Now the question arises under what conditions the equality U (Sv ) = {x ∈ Sv : v(x) = 0} holds. This is what we are going to show in Theorem 1.8: Theorem 1.8. Let T be a V -semiring with respect to the triple (S, v, M ). The following statements hold: (1) The set Pv = {s ∈ Sv : v(s) > 0} is the only maximal ideal of the semiring Sv if and only if U (Sv ) = {x ∈ Sv : v(x) = 0}. (2) If v is a surjective map, then the semiring S is a semifield if and only if M is an Abelian group and U (Sv ) = {s ∈ Sv : v(s) = 0}. Proof. (1): It is straightforward to see that Pv = {s ∈ Sv : v(s) > 0} is a prime ideal of Sv (Proposition 1.5). Now assume that Pv is the only maximal ideal of the semiring Sv . We claim that any s ∈ Sv with v(s) = 0 is a unit. In contrary, if s is a nonunit element of Sv , then the principal ideal (s) 6= Sv is a subset of the only maximal ideal Pv of Sv and therefore v(s) > 0. On the other hand, if U (Sv ) = {s ∈ Sv : v(s) = 0} and I is a proper ideal of Sv , then I cannot contain a unit and this means that v(s) > 0 for any nonzero s ∈ I and therefore I ⊆ Pv . (2): Let M be an Abelian group and U (Sv ) = {s ∈ Sv : v(s) = 0}. Let x be a nonzero element of S such that v(x) = g for some g ∈ M . Since v is surjective, there exists a nonzero y ∈ S such that v(y) = −g. From this, we have v(xy) = 0 and this means that xy is unit of Sv and therefore x is multiplicatively invertible. On the other hand, let S be a semifield. Since v is surjective, M is a homomorphic image of S − {0}, and the monoid M is in fact a group. Also if x ∈ Sv is a unit, then v(x) = 0 (Proposition 1.5). Now let x ∈ S and v(x) = 0. So there exists a y ∈ S such that xy = 1. This implies that v(y) = 0 and the inverse of x is in fact in Sv and so x ∈ U (Sv ).  Remark 1.9. Let us recall two important points: (1.9.a) From commutative semigroup theory, we know that any cancellative monoid M can be embedded into an Abelian group gp(M ), known as the group of VALUATION SEMIRINGS 7 the differences of M , in this sense that there is a monoid monomorphism ι : M → gp(M ) defined by ι(m) = [(m, 0)]∼ such that any element g ∈ gp(M ) can be written in the form of g = ι(x) − ι(y) for some x, y ∈ M [3, p. 50]. Now let M be a cancellative tomonoid. For simplification, we denote every element of gp(M ) by (x − y), where x, y ∈ M . The total order on M induces a total order on gp(M ) as follows: We define the relation ≤gp on gp(M ) by (x1 − x2 ) ≤gp (y1 − y2 ), if x1 +y2 ≤ x2 +y1 . One can easily check that (gp(M ), ≤gp ) becomes a totally ordered Abelian group such that its order is preserved by the monomorphism ι and particularly 0 ≤ x if and only if 0 ≤gp ι(x) for each x ∈ M . (1.9.b) Let S be a multiplicatively cancellative semiring. The semiring S can be embedded into a semifield F (S), known as the semifield of fractions of S. Note that there is a semiring monomorphism ε : S → F (S) such that any element f ∈ F (S) can be considered in the form of f = ε(a) · ε(b)−1 with a, b ∈ S and b 6= 0 [10, p. 20]. For simplification, we denote every element of F (S) by a/b, where a ∈ S and b ∈ S − {0}. Now by considering Remark 1.9, we have the following: Theorem 1.10. Let T be a V -semiring with respect to the triple (S, v, M ), where S is an MC semiring and M is a cancellative tomonoid. Then the following statements hold: (1) The map v ′ : F (S) → gp(M )∞ defined by v ′ (x/y) = (v(x) − v(y)) for nonzero elements x, y ∈ S and v ′ (0/1) = +∞ is a gp(M )-valuation on F (S). (2) The V -semiring Sv can be considered as a subsemiring of the V -semiring Sv ′ . Proof. (1): A simple calculation shows that v ′ is a well-defined map from F (S) to gp(M )∞ such that v ′ ((a/b) · (c/d)) = v ′ (a/b) + v ′ (c/d) and v ′ (1/1) = 0. Now consider that v ′ ((a/b) + (c/d)) = v ′ ((ad + bc)/bd) = (v(ad + bc) − v(bd)) ≥ (min{v(a) + v(d), v(b) + v(c)} − (v(b) + v(d))) = min{(v(a) − v(b)), (v(c) − v(d))} = min{v ′ (a/b), v ′ (c/d)}. So we have already proved that v ′ is the gp(M )-valuation on the semifield F (S). (2): It is easy to see that the map ε|Sv : Sv → {z/1 ∈ F (S) : z ∈ Sv }, defined by ε|Sv (z) = z/1, is the semiring isomorphism that we need. On the other hand, {z/1 ∈ F (S) : z ∈ Sv } is a subsemiring of Sv′ , since v ′ (z/1) = v(z) ≥ 0 for any z ∈ Sv and this means that z/1 ∈ Sv′ . Therefore Sv can be considered as a  subsemiring of Sv′ and this finishes the proof. Remark 1.11. The reader, who is familiar with valuation ring theory, knows that if G is a totally ordered Abelian group and κ is a field and v : κ → G∞ is a valuation map, then v has this property that v(x) 6= v(y) implies v(x + y) = min{v(x), v(y)} for all x, y ∈ κ ([7, Statement 1.3.4, p. 20]). Though in Remark 1.13, by giving a suitable example, we will show that, in general, this property does not hold for valuation maps on semirings, but later in Corollary 1.15 and Theorem 3.8, we will see that this property holds for some important families of semirings. Therefore, it is justifiable to give a name to this property. 8 PEYMAN NASEHPOUR Definition 1.12. Let there exist an M -valuation v on S. We define v to have minproperty, whenever v(x) 6= v(y), then v(x + y) = min{v(x), v(y)} for any x, y ∈ S. In the following remark, we give some examples related to min-property for valuation maps on semirings. The first example shows that a valuation map, may not satisfy the min-property. The second and third examples are good examples of valuation maps on entire semirings satisfying min-property. Remark 1.13. (1) Let T be an entire semiring. Consider the entire semiring T [X][X −1] of Laurent polynomials and define the map deg : T [X][X −1] → Z∞ by deg(am X m + am+1 X m+1 + · · · + an X n ) = n, where m, n ∈ Z and m ≤ n and an 6= 0 and v(0) = +∞. It is easy to check that the map “ deg ” is surjective with this property that deg(f g) = deg(f ) + deg(g). Let us mention that a semiring S is called zerosumfree, if x + y = 0 implies x = y = 0 for all x, y ∈ S. Our claim is that deg(f + g) ≥ min{deg(f ), deg(g)} for f, g ∈ T [X][X −1] if and only if T is a zerosumfree entire semiring and the proof is as follows: If T is zerosumfree, then one can easily see that for all f, g ∈ T [X][X −1], we have deg(f + g) = max{deg(f ), deg(g)} ≥ min{deg(f ), deg(g)}. And if T is not a zerosumfree semiring, then there exists two nonzero elements a, b ∈ T such that a + b = 0 and if one sets f = 1 + aX and g = bX, then obviously deg(f ) = deg(g) = 1, while deg(f + g) = 0. From all we said we get that if T is a zerosumfree entire semiring, then “ deg ” is a Z-valuation on the entire semiring T [X][X −1], while the min-property does not hold for “ deg ”. Now we give two important examples of valuation maps on entire semirings satisfying the min-property: (2) Let us recall that if M is a commutative monoid and T is a semiring, one can define the monoid semiring T [M ] constructed from the monoid M and the semiring T similar to the standard definition of monoid rings. We write each element of f ∈ T [M ] as polynomials f = t1 X m1 + · · · + tn X mn , where t1 , . . . , tn ∈ T and m1 , . . . , mn are distinct elements of M . Note that this representation of f is called the canonical form of f [9, p. 68]. One can easily check that if M is a tomonoid and T is an entire semiring, then the map v : T [M ] → M defined by v(s1 X m1 + · · · + sn X mn ) = min{m1 , . . . , mn }, if s1 X m1 + · · · + sn X mn 6= 0 and v(0) = +∞ is an M -valuation on T [M ] satisfying the min-property. This example can be interesting in another perspective because v(f ) = v(g) implies v(f + g) = v(f ), for all f, g ∈ T [M ] if and only if T is a zerosumfree semiring. (3) For any given entire semiring T , define the entire semiring of Laurent P∞ power series T [[X]][X −1] to be the set of all elements of the form n≥m an X n , whereP m ∈ Z and ai ∈ T . It is, then, easy to check that the map v, defined n −1 ], is the by v( ∞ n≥m an X ) = m if am 6= 0 and v(0) = +∞ on T [[X]][X −1 Z-valuation on the entire semiring T [[X]][X ] satisfying the min-property. Note that v(f ) = v(g) implies v(f + g) = v(f ), for all f, g ∈ T [[X]][X −1] if and only if T is a zerosumfree semiring. Let S be a semiring and (M, +, 0) be a commutative additive monoid. The monoid M is said to be an S-semimodule if there is a function, called scalar product, VALUATION SEMIRINGS 9 λ : S × M −→ M , defined by λ(s, m) = sm such that the following conditions are satisfied: (1) s(m + n) = sm + sn for all s ∈ S and m, n ∈ M ; (2) (s + t)m = sm + tm and (st)m = s(tm) for all s, t ∈ S and m ∈ M ; (3) s · 0 = 0 for all s ∈ S and 0 · m = 0 and 1 · m = m for all m ∈ M . A nonempty subset N of an S-semimodule M is said to be an S-subsemimodule of M , if m + n ∈ N for all m, n ∈ N and sn ∈ N for all s ∈ S and n ∈ N . An S-subsemimodule K of an S-semimodule N is said to be subtractive if x + y ∈ K and x ∈ K imply that y ∈ K for any x, y ∈ N . For more on semimodules over semirings, one may refer to [11, Chap. 14]. The following theorem introduces some subtractive ideals of V -semirings. Also we will use this theorem to find some equivalent conditions for a valuation map to satisfy the min-property. Theorem 1.14. Let M be a tomonoid and v be an M -valuation on the semiring T . The following statements hold: (1) For any α ∈ M , the sets Kα = {x ∈ T : v(x) > α} and Lα = {x ∈ T : v(x) ≥ α} are both Sv -subsemimodules of T and if v is a surjective map and β > α is another element of M , then Kβ ⊂ Lβ ⊂ Kα ⊂ Lα . (2) If α ≥ 0 is an element of M , then Iα = {x ∈ Sv : v(x) > α} and Jα = {x ∈ Sv : v(x) ≥ α} are both Sv -ideals of Sv and if v is a surjective map and β > α is another element of M , then Iβ ⊂ Jβ ⊂ Iα ⊂ Jα . (3) For any x, y ∈ T (∈ Sv ), either Lv(x) ⊆ Lv(y) (Iv(x) ⊆ Iv(y) ) or Lv(y) ⊆ Lv(x) (Iv(y) ⊆ Iv(x) ). (4) If the valuation map v has the min-property, then Kα and Lα (Iα and Jα ) are both subtractive Sv -subsemimodules of T (ideals of Sv ) for any (nonnegative) α ∈ M . Proof. The assertions (1), (2) and (3) are straightforward. For (4), we only prove one of the claims, since the proof of the other ones is similar. Now let x, y ∈ T be such that x + y ∈ Kα and x ∈ Kα . If v(x) = v(y), then from the assumption x ∈ Kα , we get that y ∈ Kα . If v(x) 6= v(y), then from the assumptions x + y ∈ Kα and v(x + y) = min{v(x), v(y)} (min-property) and this point that v(y) ≥ min{v(x), v(y)}, we get that again y ∈ Kα and this proves that Kα is subtractive and the proof is complete.  Corollary 1.15. Let T be a V -semiring with respect to the triple (K, v, M ), where K is a semifield and v is a surjective map. The following statements are equivalent: (1) The valuation map v has the min-property; (2) For each nonnegative element α ∈ M , the Kv -ideal Iα is subtractive; (3) The maximal Kv -ideal Pv = {x ∈ Sv : v(x) > 0} is subtractive. Proof. By Theorem 1.14, (1) implies (2) and obviously (2) implies (3). For proving (3) ⇒ (1), we proceed as follows: Since K is a semifield, by Theorem 1.8, M is an Abelian group, U (Kv ) = {x ∈ Kv : v(x) = 0}, and Pv = {x ∈ Kv : v(x) > 0} is the only maximal ideal of Kv . Now let x, y ∈ K − {0} be such that v(x) < v(y) and g = v(y) − v(x). Obviously g is a positive element of M and since v is a surjective map, there exists a nonzero z ∈ Kv such that v(z) = g. This implies that v(yx−1 z −1 ) = 0 and so yx−1 z −1 ∈ U (Kv ). Therefore there is a u ∈ U (Kv ) such that y = xzu. Now we consider that x+y = x(1+zu). Obviously zu ∈ Pv and since Pv is subtractive, 1+zu 10 PEYMAN NASEHPOUR needs to be a unit and v(x + y) = v(x). This means that v has the min-property and the proof is complete.  Proposition 1.16. Let T be a V -semiring with respect to the triple (S, v, M ). Then the following statements hold: (a) For any x ∈ S, the cyclic Sv -subsemimodule (x) of Sv -semimodule S is a subset of Lv(x) . (b) For any x ∈ Sv , the principal Sv -ideal (x) of the semiring Sv is a subset of Jv(x) . Moreover if S is a semifield and the map v is surjective, then the following statements hold: (c) For any x ∈ S, the cyclic Sv -subsemimodule (x) of Sv -semimodule T is equal to Lv(x) . (d) For any x ∈ Sv , the principal Sv -ideal (x) of the semiring Sv is equal to Jv(x) . Proof. The proof of (a) and (b) is straightforward. For the proof of (c), let S be a semifield and v surjective. By Theorem 1.8, the monoid M is in fact an Abelian group and U (Sv ) = {x ∈ Sv : v(x) = 0}. If x = 0, then there is nothing to prove. So let x 6= 0 and y ∈ Lv(x) . So v(y) ≥ v(x). Since M is an Abelian group, we can choose m ∈ M such that m = v(y) − v(x) and since v is a surjective map, there is a nonzero z ∈ T such that m = v(z). From this, we get that v(y) − v(x) − v(z) = 0 and so v(yx−1 z −1 ) = 0. This means that yx−1 z −1 = u is a unit element of Sv and y = uzx. Since v(uz) ≥ 0, we have y ∈ (x) and this completes the proof. The proof of (d) is similar to the proof of (c) and therefore, it is omitted.  In the following example, we show that the condition of being a semifield for S in the statements (c) and (d) in Proposition 1.16 is necessary, in this sense that if S is not a semifield, the equality (x) = Jv (x) may not hold: Example 1.17. Let N0 be the set of nonnegative integers. Obviously any natural number x > 0 can be written uniquely in the form of x = 5n ·y, where n ≥ 0 and y ∈ N is relatively prime to 5. We define v5 : N0 → N0 ∪{+∞} by v5 (x) = v5 (5n ·y) = n, if x > 0 and v(0) = +∞. It is straightforward to check that v5 is an N0 -valuation on the semiring N0 . Obviously v(2) = 0 and Jv(2) = {y ∈ N : v(y) ≥ 0} = N0 , while (2) = 2N0 . Proposition 1.18. Let T be a V -semiring with respect to the triple (K, v, M ), where K is a semifield and v is surjective. Then for the cyclic Sv -subsemimodules L1 , L2 of the Sv -semimodule K, either L1 ⊆ L2 or L2 ⊆ L1 . In particular for the principal Sv -ideals J1 , J2 of the semiring Sv , either J1 ⊆ J2 or J2 ⊆ J1 . Proof. If one of the cyclic subsemimodules L1 and L2 is zero, then there is nothing to prove. If not, then there are two nonzero elements x1 , x2 ∈ K such that L1 = (x1 ) and L2 = (x2 ). Since K is a semifield and v is surjective, by Proposition 1.16, L1 = Lv(x1 ) and L2 = Lv(x2 ) and by Theorem 1.14, either L1 ⊆ L2 or L2 ⊆ L1 . The same proof works for ideals and this is what we wished to prove.  Let us recall that an integral domain D is said to be a valuation ring, if every element x of its field of fractions K satisfies this property: x ∈ / D implies x−1 ∈ D ([21, Chap. 4]). This is equivalent to this statement that all ideals of D are totally VALUATION SEMIRINGS 11 ordered by inclusion ([19, Proposition 5.2]). Theorem 1.18 states that if T is a V -semiring with respect to the triple (K, v, M ), where K is a semifield and v is surjective, then the principal ideals of Sv (= T ) are totally ordered by inclusion. The question arises if this causes all ideals of Sv to be totally ordered. As we will see in Theorem 2.4, the answer to this question is affirmative. Now we pass to the next section to define valuation semirings and investigate their properties. 2. Valuation Semirings The main task of this section is to define the concept of valuation semirings, which is an extension of the concept of valuation rings, and show that similar facts for valuation rings hold for valuation semirings. A classical result in valuation theory shows that D is a valuation ring if and only if D is a V -semiring with respect to the triple (F (D), v, G∞ ), where F (D) is the field of fractions of the domain D, G is the quotient group of F (D)∗ modulo U (D) and v : F (D) → G∞ is defined by v(x) = xU , if x 6= 0, and v(0) = +∞ ([19, Definition 5.12 and Proposition 5.13]). Before giving our definition for valuation semirings, we need to explain one more point: From ring theory, we know that a ring D is said to be an integral domain if one of the following equivalent conditions hold: (1) The multiplication of the ring D has cancelation property, i.e., if ab = ac and a 6= 0, then b = c for all a, b, c ∈ D, (2) The ring D is entire, i.e., if ab = 0, then either a = 0 or b = 0. In semiring theory, these two statements are not equivalent. In fact, if S is an MC semiring, then S is an entire semiring but the inverse is not true. For instance, the semiring (L = {0, 1, . . . , n}, max, min) for n ≥ 2 is not an MC semiring, since if u ∈ L − {0, 1}, then min{u, u} = min{u, 1}, but u 6= 1, while obviously it is an entire semiring. Now imagine T is a V -semiring with respect to the triple (S, v, M ). The question is: Does the assumption T is entire imply that the ideals of Sv are totally ordered by inclusion? The following interesting example shows that this is not the case: Example 2.1. Let B = {0, 1} be the Boolean semiring and B[X][X −1 ] the entire semiring of Laurent polynomials. Define the surjective map v : B[X][X −1 ] → Z∞ by v(am X m + · · · + an X n ) = m, when m ≤ n are integer numbers and am 6= 0 and v(0) = +∞. Obviously B[X] is a V -semiring with respect to the triple (B[X][X −1 ], v, Z), while even its principal ideals are not totally ordered under inclusion, since the ideals (X) and (X + 1) of B[X] are not comparable. According to this introductory note and all we have seen in Theorem 1.10, Corollary 1.15, and Proposition 1.16, it seems the assumptions “K is a semifield” and “v is a surjective map” are useful in defining valuation semirings. Therefore, we give the following definition: Definition 2.2. We define a semiring S to be a valuation semiring, if there exists an M -valuation v on K, where K is a semifield containing S as a subsemiring, v is surjective, and S = Kv = {s ∈ K : v(s) ≥ 0}. Remark 2.3. (1) In Definition 2.2, according to Theorem 1.8, M has to be an Abelian group and S needs to be an MC semiring, since it is a subsemiring of the semifield K. 12 PEYMAN NASEHPOUR (2) In Definition 2.2, K needs to be isomorph to the semifield of fractions of S. Define ϕ : F (S) → K by ϕ(a/b) = a · b−1 . An easy calculation shows that ϕ is a semifield monomorphism. We only prove that ϕ is surjective. Let x ∈ K. If v(x) ≥ 0, then x ∈ S and therefore ϕ(x/1) = x. If v(x) < 0, then v(x−1 ) = −v(x) > 0 and x−1 ∈ S and obviously ϕ(1/(x−1 )) = x. (3) Any valuation semiring is a quasi-local semiring (Theorem 1.8). Note that a semiring is called to be quasi-local if it has only one maximal ideal ([11, Example 6.1]). (4) Let T be a V -semiring with respect to the triple (S, v, M ), where S is an MC semiring and M is a cancellative tomonoid. Then Sv can be embedded into a valuation semiring (Theorem 1.10). While the proof of the following important theorem is somehow similar to its ring version, we bring its proof here only for the completeness of the paper: Theorem 2.4. For an MC semiring S, the following statements are equivalent: (1) (2) (3) (4) S is a valuation semiring, For any element x ∈ F (S), either x ∈ S or x−1 ∈ S, For any ideals I, J of S, either I ⊆ J or J ⊆ I, For any elements x, y ∈ S, either (x) ⊆ (y) or (y) ⊆ (x). Proof. (1) ⇒ (2): Let S be a valuation semiring. According to Definition 2.2, S = Kv = {s ∈ K : v(s) ≥ 0}. Now take x ∈ F (S). By considering the point (2) mentioned in Remark 2.3, if x ∈ / S, then v(x) < 0 and so v(x−1 > 0 and this means −1 that x ∈ S. (2) ⇒ (3): Imagine I * J and choose a ∈ I − J. Take b ∈ J − {0}. So a/b ∈ / S, because if a/b ∈ S, then (a/b) · b ∈ B, which is in contradiction with a ∈ / J. So by (2), b/a ∈ S and (b/a) · a ∈ I. Thus J ⊆ I. (3) ⇒ (4): Obvious. (4) ⇒ (1): Let U be the units of the semiring S. Definitely U is a subgroup of F (S)∗ , the multiplicative group of nonzero elements of fraction semifield of S. Define G = F (S)∗ /U to be the quotient group of F (S)∗ modulo U and write the operation on G additively, i.e., aU +bU = (ab)U . Define a relation on G by yU ≤ xU if for the cyclic S-subsemimodules (x), (y) of F (S), we have (x) ⊆ (y). It is obvious that this is an order on G. On the other hand the cyclic S-subsemimodules of F (S) are totally ordered, for the principal ideals of S are totally ordered and this causes ≤ to be a totally order on G. Now we prove that G with the order ≤ is in fact a totally ordered Abelian group. Let yU ≤ xU . So (x) ⊆ (y) and obviously (zx) ⊆ (zy) and this means that zU + yU ≤ zU + xU . Finally define v : F (S) → G∞ by v(x) = xU , for x 6= 0 and v(0) = +∞. From the definition of G and v, it is clear that v(xy) = (xy)U = xU + yU = v(x) + v(y) and so v(1) = U , the neutral element of the group G. Also let x ∈ K. So x ∈ S if and only if (x) = (1) and this implies that x ∈ S if and only if U ≤ xU , which means that x ∈ S if and only if U ≤ v(x). Now we use this to prove that v(x + y) ≥ min{v(x), v(y)}. If either x = 0 or y = 0, the inequality holds vividly. So let x, y are both nonzero element of F (S) and v(y) ≤ v(x). From this, we get that yU ≤ xU and according to the definition of order, (x) ⊆ (y). So there exists a nonzero s ∈ S such that x = sy and therefore x/y ∈ S. Obviously this implies that x/y + 1 ∈ S and v(x/y + 1) ≥ U . At last VALUATION SEMIRINGS 13 we get that v(x + y) = v(y(x/y + 1) = v(y) + v(x/y + 1) ≥ v(y) and the proof is finished.  After seeing this theorem, the reader may ask if there is a semiring, which is neither a ring nor an MC semiring, but still its ideals are totally ordered by inclusion. In the following, we show that the fuzzy semiring has this property: Example 2.5. Let (I = [0, 1], max, min) be the fuzzy semiring and A an ideal of I. It is easy to see that a ∈ A if and only if [0, a] ⊆ A for any a ∈ I. Therefore if sup(A) ∈ A, then A = [0, sup(A)]. Now let sup(A) ∈ / A. Obviously A ⊆ [0, sup(A)). Our claim is that [0, sup(A)) ⊆ A. In order to prove the claim, we assume that x ∈ / A. Then [x, 1] ∩ A = ∅, because if y ∈ [x, 1] ∩ A, then x ≤ y and x = min{x, y} ∈ A. On the other hand S we know that a ∈ A if andSonly if [0, a] ⊆ A for any a ∈ I. This S means that a∈A [0, a] ⊆ A and so [x, 1] ∩ ( a∈A [0, a]) = ∅. From this, we get that a∈A ([0, a] ∩ [x, 1]) = ∅, which implies that [0, a] ∩ [x, 1] = ∅ for any a ∈ A. Consequently a < x for any a ∈ A and this means that x ∈ / [0, sup(A)). Hence, we have already proved that if A is any ideal of I, then either A = [0, a] for some a ∈ A or A = [0, b) for some b ∈ A. Finally an easy case-by-case discussion shows that all ideals of I are totally ordered. Note that I is an entire semiring, while it is not an MC semiring. We finalize this section by generalizing another important classical result in valuation ring theory, which states that any valuation ring is integrally closed ([19, Proposition 5.5]). Actually, we prove that if the only maximal ideal of a valuation semiring S is subtractive, then S is integrally closed in the sense of the following definition borrowed from the paper [5, p. 88]. Note that if S is a ring, then the following definition is equivalent to the standard definition of integrally closed rings given in Definition 4.2 in the book [19] (For more on this, also check Remark 2.8). Definition 2.6. Let S be an MC semiring and F (S) its quotient semifield. The element u ∈ F (S) is said to be integral over S if there exist a1 , a2 , . . . , an and b1 , b2 , . . . , bn in S such that un + a1 un−1 + · · · + an = b1 un−1 + · · · + bn . The semiring S is said to be integrally closed, if the set of elements of F (S) that are integral over S is the set S [5, p. 88]. Proposition 2.7. Let S be a valuation semiring such that its unique maximal ideal J is subtractive. Then S is integrally closed. Proof. Clearly any element of S is integral over S. Now let u ∈ F (S) be integral over S. By Definition 2.6, there exist a1 , a2 , . . . , an and b1 , b2 , . . . , bn in S such that un + a1 un−1 + · · · + an = b1 un−1 + · · · + bn . (E1 ) Our claim is that u ∈ S. In contrary, suppose that u ∈ / S. By Theorem 2.4, u−1 ∈ S. On other hand, u−1 ∈ / U (S), since if u−1 ∈ U (S), then u ∈ U (S). This means that u−1 ∈ J. By multiplying the both sides of the equation E1 by u−n , we get 1 + a1 u−1 + · · · + an u−n = b1 u−1 + · · · + bn u−n . (E2 ) Obviously a1 u−1 +· · ·+an u−n , b1 u−1 +· · ·+bn u−n ∈ J and since J is subtractive, we have 1 ∈ J, a contradiction. Therefore, u ∈ S and this finishes the proof.  Remark 2.8. For more on the notions “integral elements”, “integral closure”, and “integrally closed rings or ideals” in commutative algebra, one can refer to 14 PEYMAN NASEHPOUR [26, Definition 5.1.1]), [26, Definition 5.1.24], [1, p. 63], [24, Definition 1.1.1], [4, Definition 10.2.1], and [6, Exercise 4.14]. Also in the paper [20], the concept of integral closure for elements and ideals in idempotent semirings is introduced, and how it corresponds to its namesake in commutative algebra is established. Finally the term “integrally closed ideals for semirings” in Definition 1.4 of the paper [20] is used, but the relationship of these notions in semirings to the notion of “integrally closed MC-semirings” given in page 88 of the paper [5] is unclear for the author. 3. Discrete Valuation Semirings Let us recall that in Definition 1.1, we defined an M -valuation v on S to be discrete, if M = Z. We start this section by defining discrete valuation semirings. Definition 3.1. We define a semiring S to be a discrete valuation semiring (DVS for short), if S is a V -semiring with respect to the triple (K, v, Z), where K is a semifield and v is surjective. Now we go further to give some examples for discrete valuation semirings that are not rings. For this, we need to bring some concepts and definitions. Recall that if S is a semiring, for a, b ∈ S, it is written a | b and said that “a divides b”, if b = sa for some s ∈ S. This is equivalent to say that (b) ⊆ (a). Also it is said that a and b are associates if a = ub for some unit u ∈ U (S) and if S is an MC semiring, then this is equivalent to say that (a) = (b). A nonzero, nonunit element s of a semiring S is said to be irreducible if s = s1 s2 for some s1 , s2 ∈ S, then either s1 or s2 is a unit. This is equivalent to say that (s) is maximal among proper principal ideals of S. An element p ∈ S − {1} is said to be a prime element, if the principal ideal (p) is a prime ideal of S, which is equivalent to say if p | ab, then either p | a or p | b. An MC semiring S is called a unique factorization (or sometimes factorial) semiring if the following conditions are satisfied: UF1 Each irreducible element of S is a prime element of S. UF2 Any nonzero, nonunit element of S is a product of irreducible elements of S. First we construct a nice and general example of a discrete valuation semiring as follows: Example 3.2. Let S be a factorial semiring and K = F (S) its semifield of fractions. Let p ∈ S be a fixed prime element of S. According to the definition of factorial semirings, any nonzero x ∈ S can be uniquely written in the form of x = pn · x1 , where n ≥ 0 and x1 is a nonzero element of S such that it has no factor of p. Therefore, any nonzero x/y ∈ K, can be uniquely written in the form of x/y = pm · x1 /y1 , where m ∈ Z and x1 and y1 are nonzero elements of S, which have no factor of p. Now we define a map vp : K → Z∞ with vp (x/y) = vp (pm · x1 /y1 ) = m, when x/y is a nonzero element of K, and vp (0) = +∞. Obviously vp (1) = 0 and vp (x/y · z/t) = vp (x/y) + vp (z/t). Now let x/y = pm · x1 /y1 and z/t = pn · z1 /t1 , where m, n ∈ Z and x1 , y1 , z1 and t1 all have no factor of p. Without loss of generality, we can suppose that m ≤ n. Now consider the following: vp (x/y + z/t) = vp (pm ((x1 t1 + pn−m y1 z1 )/y1 t1 ) = m + vp (x1 t1 + pn−m y1 z1 ) ≥ m = min{vp (x/y), vp (z/t)}. VALUATION SEMIRINGS 15 From all we said, we get that Sp = {x/y ∈ K : vp (x/y) ≥ 0} = {x/y ∈ K : p ∤ y} is a discrete valuation semiring. Now the question arises if there are factorial semirings, which are not rings. The first example that may come to one’s mind is N0 . In Proposition 3.10, we also prove that if D is a Dedekind domain, then (Id(D), +, ·) is a factorial semiring, where by Id(D), we mean the set of all ideals of D. Obviously (Id(D), +, ·) is not a ring. Lemma 3.3. If S is a discrete valuation semiring, then there exists a nonzero and nonunit element t ∈ S such that any nonzero ideal I of S is of the form I = (tn ) for some n ≥ 0. Proof. Let S be a discrete valuation semiring. By definition, S is a V -semiring with respect to a suitable triple (K, v, Z), where K is a semifield and v is surjective. Now let t ∈ S such that v(t) = 1. Our claim is that if I is a nonzero proper ideal of S, then there exists a natural number n such that I = (tn ). Put n = min{v(s) : s ∈ I}. Obviously n is a positive integer. Now let s ∈ I such that v(s) = n. It is clear that v(s · t−n ) = 0 and by Theorem 1.8, s · t−n is a unit and (tn ) ⊆ I. On the other hand, if s ∈ I − {0}, then v(s) ≥ n by choice of n and therefore s = utm , where u is a unit and m ≥ n. This causes s ∈ (tn ). So we have already proved that any nonzero proper ideal of S is of the form (tn ).  Before bringing the first important theorem of this section, which characterizes discrete valuation semirings, we prove the following useful lemma. Let us recall that, similar to ring theory, we say a semiring S satisfies ACCP if any ascending chain of principal ideals of S is stationary. Lemma 3.4. Let S beTan MC semiring, which satisfies ACCP. Then t ∈ S is a ∞ nonunit if and only if n=1 (tn ) = (0). T∞ Proof. If t is a unit element of S, then obviously n=1 (tn ) = S. Now let t be a T∞ nonunit element of S and s ∈ n=1 (tn ). So for each natural number n, there exists an sn ∈ S such that s = sn tn . This gives us the ascending chain (s1 ) ⊆ (s2 ) ⊆ · · · ⊆ (sn ) ⊆ · · · , which must stop somewhere, because S satisfies ACCP. Therefore there is a natural number m such that (sm ) = (sm+1 ). This means that there is an r ∈ S such that sm+1 = rsm and so we have s = sm+1 tm+1 = r(sm tm )t = rts. Obviously this implies that s = 0, since if s 6= 0, then t is a unit and the proof is finished.  Let us recall that a semiring is called to be quasi-local if it has only one maximal ideal ([11, Example 6.1]). Proposition 3.5. Let S be a semiring. Then the following statements hold: S (1) The set of all units U (S) of the semiring S is equal to S − m∈Max(S) m, where by Max(S), we mean the set of all maximal ideals of S. (2) The semiring S is quasi-local if and only if S − U (S) is an ideal of S. Proof. (1) : Let S be a semiring and take U (S) to be the set of all units of S. If s ∈ U (S), then s cannot be an element of a maximal ideal of S. On the other hand, if s is not invertible, then the principal ideal (s) of S is proper and by Proposition 6.59 in [11], (s) is contained in a maximal ideal m of S and therefore s ∈ m. (2) : If S is quasi-local and m is its unique maximal ideal, then by (1), S −U (S) = m. On the other hand, if S − U (S) is an ideal of S, then any proper ideal of S is 16 PEYMAN NASEHPOUR contained in S − U (S), since all elements of a proper ideal cannot be unit. This implies that S−U (S) is the unique maximal ideal of S and the proof is complete.  Theorem 3.6. The following statements for a semiring S are equivalent: (1) S is a discrete valuation semiring, (2) S is a principal ideal MC semiring possessing a unique maximal ideal J 6= (0), (3) S is a unique factorization semiring with a unique (up to associates) irreducible element t, (4) S is a quasi-local T∞ MC semiring whose unique maximal ideal J 6= (0) is principal and n=1 J n = (0), (5) S is a quasi-local MC semiring, which satisfies ACCP and its unique maximal ideal J 6= (0) is principal. (6) S is an MC semiring and there exists a nonzero and nonunit element t ∈ S such that any nonzero ideal I of S is of the form I = (tn ) for some n ≥ 0. Proof. First we prove (1) ⇒ (4) ⇒ (2) ⇒ (3) ⇒ (1). (1) ⇒ (4): Let S be a discrete valuation semiring. It is clear that S is an MC semiring. Also by Lemma 3.3, we know that S is quasi-local and its unique maximal ideal J is nonzero and principal generated by an element t ∈ S such that v(t) = 1. On the other hand, any ideal of S is principal. So by [11, Proposition 6.16], S is Noetherian and in particular T∞ it satisfies ACCP. Now since t is nonunit (because v(t) = 1), by Lemma 3.4, n=1 J n = (0). (4) T ⇒ (2): Let J = (t) be the maximal ideal of S and I its nonzero proper ideal. n n Since ∞ n=1 J = (0), there exists a nonnegative number n such that I ⊆ J , but n+1 n n+1 I *J . Our claim is that J ⊆ I. Let a ∈ I − J . So we can suppose that a = u · tn for some u ∈ S, where u ∈ / J. By Proposition 3.5, u is a unit of S. This means that (a) = (tn ) = J n for any a ∈ I − J n+1 . Now let x ∈ J n = (a). So x = s · a. But a ∈ I, so x ∈ I. This means that all nonzero proper ideals of S are in the form of J n = (tn ), where n ≥ 1. (2) ⇒ (3): Let S be a principal ideal MC semiring such that the nonzero ideal J = (t) is its unique maximal ideal. First we prove that t is an irreducible element of S. On contrary, let t be reducible, then t = s1 s2 , where both s1 and s2 are nonunit and this causes (t) ⊂ (s1 ) ⊂ S, which contradicts the maximality of J. Now let t′ be another irreducible element of S and I = (m) be an arbitrary ideal of S that contains (t′ ). So t′ = s · m for some s ∈ S and by definition either s or m is a unit and this means that either (t′ ) = (m) or (m) = S. From this, we get that (t′ ) is also a maximal ideal of S and by hypothesis, (t′ ) = (t), which means that S has a unique (up to associates) irreducible element t. Since S is a principal ideal semiring, it is Noetherian. So S satisfies ACCP. Now let s ∈ S be nonzero and nonunit. Therefore by Lemma 3.4, there is a natural number n such that s ∈ (tn ), while s ∈ / (tn+1 ). Obviously this implies that s = utn , where u is a unit element of S. So S is a unique factorization semiring. (3) ⇒ (1): Let S be a unique factorization semiring with a unique (up to associates) irreducible element t. So any element of S can be written uniquely in the form of utn for a unit u and a nonnegative integer n. This means that any element of the fraction semifield F (S) of S can be written uniquely in the form of utn , where u is a unit and n is an integer number. Now define a map v : F (S) → Z∞ by v(utn ) = n for any n ∈ Z and v(0) = +∞. It is a routine discussion that S is a VALUATION SEMIRINGS 17 V -semiring with respect to the triple (F (S), v, Z). Now we show (4) ⇔ (5) ⇔ (6). (4) ⇒ (5): It is clear that (2) implies (5) and since (4) is equivalent to (2), it means that (4) implies (5). (5) ⇒ (4): Let J = (t) of S. Since t is T∞be the nonzero unique maximalTideal ∞ nonunit, by Lemma 3.4, n=1 (tn ) = (0) and it means that n=1 J n = (0). (5) ⇒ (6): By Lemma 3.3, (1) implies (6) and since (5) is equivalent to (1), it is clear that (5) implies (6). (6) ⇒ (5): Straightforward.  Let us recall that a semiring S is called an Euclidean semiring if there is a function δ : S − {0} → N0 ∪ {+∞} satisfying the following condition: For a, b ∈ S with b 6= 0, there exist q, r ∈ S satisfying a = qb + r with r = 0 or δ(r) < δ(b) [11, Chap. 12, p. 136]. Proposition 3.7. Any discrete valuation semiring is an Euclidean semiring. Proof. Let S be a V -semiring with respect to the triple (K, v, Z), where K is a semifield and v is a surjective map. Define δ : S − {0} → N0 ∪ {+∞} by δ(s) = v(s) for any nonzero s ∈ S and suppose that a, b ∈ S and b 6= 0. If δ(a) < δ(b), then a = 0 · b + a. If δ(a) ≥ δ(b) then q = ab−1 ∈ S and therefore a = qb + 0 and this completes the proof.  Now we are ready to prove another important theorem of this section. Before that we need to recall the concept of Gaussian semirings, introduced in [22, Definition 7]: Let S be a semiring. For f ∈ S[X], the content of f , denoted by c(f ), is defined to be the S-ideal generated by the coefficients of f . A semiring S is called Gaussian if c(f g) = c(f )c(g) for all polynomials f, g ∈ S[X]. Also note that a semiring S is called a subtractive semiring if each ideal of the semiring S is subtractive. Theorem 3.8. Let S be a discrete valuation semiring. Then the following statements are equivalent: (1) The unique maximal ideal of S is subtractive, (2) The valuation map v : F (S) → Z∞ satisfies the min-property, (3) S is a subtractive semiring, (4) S is a Gaussian semiring. Proof. (1) ⇒ (2): This is obvious by Corollary 1.15. (2) ⇒ (3): Let the valuation map v : F (S) → Z∞ satisfy the min-property. Let I be a nonzero proper ideal of S. By Lemma 3.3, there exists a t ∈ S with v(t) = 1 and n ∈ N such that I = (tn ) = {x ∈ S : v(x) ≥ n} and by Theorem 1.14, I is subtractive. So we have already proved that each ideal of S is subtractive. (3) ⇒ (4): Let S be a subtractive semiring and f, g ∈ S[X] be two arbitrary polynomials. By Dedekind-Mertens lemma for semirings ([22, Theorem 3]), c(f )m+1 c(g) = c(f )m c(f g), where m = deg(g). If f = 0, then there is nothing to prove. So suppose f 6= 0. Our claim is that c(f ) is a nonzero principal ideal of S. In fact, since in valuation semirings principal ideals are totally ordered by inclusion (Theorem 2.4), each finitely generated ideal has to be principal. But S is an MC semiring, so c(f ) is a cancelation ideal of S and c(f )c(g) = c(f g) ([22, Proposition 15]). 18 PEYMAN NASEHPOUR (4) ⇒ (1): If S is a Gaussian semiring, then by [22, Theorem 3], S is a subtractive semiring. Therefore any ideal of S, in particular the unique maximal ideal of S is subtractive and this finishes the proof.  Example 3.9. Let Q≥0 be the semifield of all nonnegative rational numbers. Every nonzero element a/b ∈ Q≥0 can be written uniquely in the form of pn · a1 /b1 , where n ∈ Z and a1 , b1 are both natural numbers and relatively prime to the given prime number p. Now we define vp (a/b) = pn · a1 /b1 = n (Refer to Example 3.2). It is, then, easy to see that vp is a discrete valuation on Q≥0 satisfying the min-property. ≥0 Therefore the semiring Q≥0 : p ∤ b} is a simple but good example for p = {a/b ∈ Q a subtractive discrete valuation semiring. Now we bring the following proposition which gives us a general example for subtractive discrete valuation semirings. Proposition 3.10. Let D be a Dedekind domain and m an arbitrary maximal ideal of D. Then the following statements hold: (1) The semiring Id(D) is a Gaussian factorial semiring; (2) The subsemiring {I/J ∈ F (Id(D)) : m ∤ J} of the semifield of fractions F (Id(D)) is a subtractive discrete valuation semiring. Proof. (1): Let D be a Dedekind domain. Then by [19, Theorem 6.16], every nonzero proper ideal of D can be written as a product of prime ideals of D in one and only one way, expect for the order of the factors. Also by [19, Corollary 6.17], every nonzero prime ideal of S is a maximal ideal. On the other hand, by [19, Theorem 6.19], every nonzero ideal of D is invertible. From all we said we get that (Id(D), +, ·) is a factorial semiring. Now we prove that Id(D) is a Gaussian semiring. Let I, J ∈ Id(D). Since D is a Dedekind domain, any nonzero ideal of D is invertible. Also since I ⊆ I + J, by [19, Theorem 6.20 (8)], there exists an ideal K of D such that I = K(I + J). So I belongs to the principal ideal of the semiring Id(D), generated by I + J, i.e., I ∈ (I + J). Similarly it can be proved that J ∈ (I + J). So we have (I, J) = (I + J) and by [22, Theorem 8], Id(D) is a Gaussian semiring. (2): By considering the Example 3.2 and Theorem 3.8, the semiring Sm = {I/J ∈ F (Id(D)) : m ∤ J} is a discrete valuation semiring and so we only need to prove that the valuation map vm : F (Id(D)) → Z∞ has min-property. So let I/J = mp I1 /J1 and K/L = mq K1 /L1 be arbitrary elements of F (Id(D)) such that m ∤ I1 , J1 , K1 , L1 . Without loss of generality one may assume that p < q. Therefore we have: vm (mp ((I1 L1 + m(q−p) J1 K1 )/J1 L1 ) = p + vm (I1 L1 + m(q−p) J1 K1 ). Our claim is that m ∤ I1 L1 + m(q−p) J1 K1 . In contrary, if m | I1 L1 + m(q−p) J1 K1 , so I1 L1 + m(q−p) J1 K1 is an element of the principal ideal (m). But we have proved in above that Id(D) is a Gaussian semiring and by [22, Theorem 3], Id(D) is a subtractive semiring and in particular (m) is a subtractive ideal of Id(D) and this implies that I1 L1 ∈ (m), which contradicts our assumption that m ∤ I1 , L1 . So vm (I1 L1 + m(q−p) J1 K1 ) = 0 and vm (I/J + K/L) = min{vm (I/J), vm (K/L)} and the proof is complete.  Remark 3.11. Let Λ be a nonempty set. The set of all functions f : Λ → N0 L (Λ) (Λ) with finite support is denoted by N0 (= λ∈Λ N0 ). We put SΛ = N0 ∪ {+∞} (Λ) and define the operations “min” and “+” on N0 componentwise and extend these operations on SΛ as follows: VALUATION SEMIRINGS 19 • min{f, +∞} = min{+∞, f } = f , for all f ∈ SΛ , • f + (+∞) = (+∞) + f = +∞, for all f ∈ SΛ . It is easy to verify that (SΛ , min, +) is a semiring such that +∞ is its zero and the constant zero function, i.e., f (λ) = 0 for all λ ∈ Λ, its 1SΛ . Our claim is that if D is a Dedekind domain, then (Id(D), +, ·) and (SΛ , min, +) are isomorphic as semirings for Λ = Max(D) and the routine proof is based on an interesting result αn 1 mentioned in Proposition 6.8 in [17], which states that if I = mα 1 · · · mn and min{α1 ,β1 } min{αn ,βn } β1 βn J = m1 · · · mn , then I + J = m1 · · · mn , where αi , βi are nonnegative integers, {mi } are distinct maximal ideals of D, and m0i is taken to be the ideal D. The question may arise if Proposition 3.11 can be generalized for the semiring (Λ) (SΛ , min, +), where SΛ = N0 ∪{+∞} and Λ is an arbitrary nonempty set. In fact, a wonderful result by Luther Claborn, mentioned and proved in Theorem 15.18 in [8], states that if Λ is an arbitrary nonempty set, then there is a Dedekind domain D with a bijection σ : Max(D) → Λ. Acknowledgements The author was partly supported by Department of Engineering Science at University of Tehran and wishes to thank the anonymous referee for an extensive list of comments and suggestions, which greatly helped to improve the paper. This paper is dedicated to the memory of Prof. Dr. Manfred Kudlek, since he was the professor who introduced the algebraic structure of semiring to me during my stay in Tarragona, Spain. References [1] M. F. Atiyah and I. G. Macdonald, Introduction to Commutative Algebra, Addison-Wesley, Reading, Massachusetts, 1969. [2] N. Bourbaki, Commutative Algebra. Chapters 1–7, Elements of Mathematics, Springer, 1998. [3] W. Bruns and J. Gubeladze, Polytopes, Rings, and K-Theory, Springer, Dordrecht, 2009. [4] W. Bruns and J. Herzog, Cohen-Macaulay Rings, 2nd edn., Cambridge studies in advanced mathematics: Vol. 39, Cambridge Univ. Press, Cambridge, 1998. [5] D. J. Dulin and J. R. Mosher, The Dedekind property for semirings, J. of Aust. Math. Soc., 14 (1972), 82–90. [6] D. Eisenbud, Commutative Algebra with a View Toward Algebraic Geometry, SpringerVerlag, New York, 1995. [7] A. J. Engler and A. Prestel, Valued Fields, Springer, Berlin, 2005. [8] R. M. Fossum, The Divisor Class Group of a Krull Domain, Ergebnisse der Mathematik und ihrer Grenzgebiete, Band 74, Springer-Verlag, Berlin, 1973. [9] R. Gilmer, Commutative Semigroup Rings, The University of Chicago Press, 1984. [10] J. S. Golan, Power Algebras over Semirings, Springer, 1999. [11] J. S. Golan, Semirings and Their Applications, Kluwer Academic Publishers, Dordrecht, 1999. [12] U. Hebisch and H. J. Weinert, Semirings - Algebraic Theory and Applications in Computer Science, World Scientific, Singapore, 1998. [13] Z. Izhakian, M. Knebusch, and L. Rowen, Supertropical semirings and supervaluations, J. Pure Appl. Algebra 215, No. 10 (2011), 2431–2463. [14] N. Jacobson, Basic Algebra II, 2nd ed., W. H. Freeman and Company, New York, 1989. [15] J. Jun, Valuations of Semirings, arXiv preprint arXiv:1503.01392 (2015). [16] I. Kaplansky, Commutative Rings, Allyn and Bacon, Boston, 1970. [17] G. Karpilovsky, Topics in Field Theory, North-Holland Mathematics Studies Vol. 155, Amsterdam: North-Holland Publishing Company, 1989. 20 PEYMAN NASEHPOUR [18] W. Krull, Beiträge zur Arithmetik kommutativer Integrittsbereiche. VI. Der allgemeine Diskrimminantensatz. Unverzweigte Ringerweiterungen, Math. Z., Vol. 45 (1939), 1–19. [19] M. D. Larsen and P. J. McCarthy, Multiplicative Theory of Ideals, Academic Press, New York, 1971. [20] A. W. Macpherson, On the difference between tropical functions and real-valued functions, Preprint, arXiv:1507.00545, 2015. [21] H. Matsumura, Commutative Ring Theory, 2nd ed., Cambridge Studies in Advanced Mathematics, 8, Cambridge University Press, Cambridge, 1989. [22] P. Nasehpour, On the content of polynomials over semirings and its applications, J. Algebra Appl., 15, No. 5 (2016), 1650088 (32 pages). [23] G. Pilz, Near-Rings, The Theory and Its Aplications, Revised edition, North-Holland Publishing Company, Amsterdam-New York-Oxford, 1983. [24] I. Swanson and C. Huneke, Integral Closure of Ideals, Rings, and Modules, London Mathematical Society Lecture Note Series 336, Cambridge University Press, Cambridge, 2006. [25] J. Tolliver, Extension of valuations in characteristic one, Preprint, arXiv:1605.06425, 2016. [26] F. Wang and H. Kim, Foundations of Commutative Rings and Their Modules, Algebra and Applications: Vol. 22, Springer Nature, Singapore, 2016. Peyman Nasehpour, Department of Engineering Science, Faculty of Engineering, University of Tehran, Tehran, Iran E-mail address: [email protected]
0math.AC
A Note on Extending Taylor’s Power Law for Characterizing Human Microbial Communities: Inspiration from Comparative Studies on the Distribution Patterns of Insects and Galaxies, and as a Case Study for Medical Ecology and Personalized Medicine Zhanshan (Sam) Ma Computational Biology and Medical Ecology Laboratory State Key Laboratory of Genetic Resources and Evolution Kunming Institute of Zoology Chinese Academy of Sciences, P. R. China [email protected] very useful for analyzing the distribution patterns of human microbes within the human body. Finally, I suggest that the parameters of the power law model built at community level, especially when associated with community metadata (or environmental covariates) and when time series data from longitudinal studies are utilized, can reveal important dynamic properties of human microbiome such as community stability, which can be invaluable in investigating etiology of some diseases associated with human microbial communities. Overall, I hope that the approach to human microbial community with the power law offers an example that ecological theories can play an important role in the emerging medical ecology, which aims at studying the ecology of human microbiome and its implications to human diseases and health, as well as in personalized medicine. ABSTRACT—Many natural patterns, such as the distributions of blood particles in a blood sample, proteins on cell surfaces, biological populations in their habitat, galaxies in the universe, the sequence of human genes, and the fitness in evolutionary computing, have been found to follow power law (e.g., Kendal 2004, Illian et al. 2008, Venter 2001, Ma 2012). Taylor’s power law (Taylor 1961: Nature, vol. 189:732–735.) is well recognized as one of the fundamental models in population ecology, thanks to its wide applicability in describing the spatial distribution patterns of biological populations. A fundamental property of biological populations, which Taylor’s power law reveals, is the near universal heterogeneity (also known as aggregation or nonrandomness) of population abundance distribution in habitat. Obviously, the heterogeneity also exists at the community level, where not only the distributions of population abundances but also the proportions of the species composition in the community are often heterogeneous or non-random. Indeed, community heterogeneity is simply a reciprocal term of community evenness, the major dimension what community diversity tries to measure. Nevertheless, existing community diversity indexes such as Shannon index and Simpson index can only measure “local” or “static” diversity in the sense that they are computed for each habitat at a specific time point, but the indexes alone do not reflect the diversity changes across habitats or over time. This inadequacy is particularly problematic if the research objective is to study the dynamics of community diversity, which is critical for understanding the possible mechanisms that maintain the community diversity and stability. In this note, I propose to extend the application scope of Taylor’s power law to the studies of human microbial communities, specifically, the community heterogeneity at both population (single species) and community (multiple species) levels. I further suggested that population dispersion models such as Taylor (1980, Nature: 286, 5355), which is known to generate population distribution patterns consistent with the power law, should also be Keywords: Power Law, Human Microbiome, Human Microbial Communities, Medical Ecology, Personalized Medicine, Point Process Statistics, Metagenomics. BACKGROUND AND JUSTIFICATIONS Maurer (1999) pointed out two possibilities for the lack of generalizability in the study of community ecology. First, generalizations may be impossible due to the extreme complexity of ecological world. Second, patterns do not exist at the scale of the local community where the observation is made. Perhaps a third possibility can be added to this list: that the tool for detecting the patterns may be unsuitable at the research scale. While little may be done with respect to the first possibility, ecologists can strive to avoid the second and third possibilities by carefully choosing a right scale level and developing powerful approaches that are suitable for the chosen scale. In this note, I propose to extend the application scope of Taylor’s power law (Taylor 1961, 1977, 1984, 2007) from population scale (level) to community scale (level) in order to obtain an appropriate and powerful quantitative approach for characterizing the microbial communities. The inspiration comes from a phenomenon in population 1 Scott 1952, Neyman 1958). Even more inspiring is that the studies on the distribution patterns of insects and microbes in their habitat, as well as the studies on the distribution of galaxies in the universe, performed by Neyman and other scientists, evolved similarly in terms of the research approaches developed in astronomy and biology, respectively. In both astronomy and biology, three mathematical approaches with slightly different names were advanced; they are (i) frequency distribution—fitting the occurrence frequency data of subjects (galaxies or insects) per sampling unit to a probability distribution such as Neyman distribution (Neyman 1939) and negative binomial distribution (NBD); (ii) aggregation index (also known as dispersion index)—using some statistics to measure the aggregation (dispersion) degree of galaxies or insect populations; (iii) power law modeling. ecology where Taylor’s power law has been found to describe the spatial distribution patterns of biological populations in their habitat remarkably well. What Taylor’s power law captures at the population scale is essentially the heterogeneity of population abundance distribution in space and/or time, and heterogeneity is certainly a fundamental property at community level (scale). Therefore, an interesting question is: can Taylor’s power law play a similar role at the community level? Taylor (1961) discovered that the Power Law model [Equation (1)] fits population spatial distribution data almost ubiquitously well from bacteria, plants, to mammals, V = aM b , (1) where M and V are population mean (density or abundance) and variance, respectively, and a and b are parameters. According to Taylor (1961, 1984): b>1 corresponds to aggregated distribution (Fig. 1c) b=1 to random distribution and (Fig. 1b) b<1 to regular distribution (Fig. 1a). While Taylor’s power law [Equation (1)] describes the distribution patterns of biological populations, the form of power law for describing the distribution of galaxies takes a slightly different form: s ⎛r ⎞ 1 + g (r ) = ⎜ 0 ⎟ (2) ⎝r⎠ where g(r) is the so-termed pair correlation function, s and r0 are parameters. According to Illian et al. (2008), this power law model [Equation (2)] was proposed by Totsuji & Kihara (1969) to simplify Neyman et al’s (Neyman &Scott 1952, 1958, Neyman et al. 1953) computation and to relieve the statistical difficulties Neyman et al (1953) encountered. Neyman et al. (1953) statistical difficulty was that they obtained different model parameters for different galaxy catalogues (files of coordinates of galaxies); therefore, their model was a probability distribution model that is a superposition of groups of galaxies of varying size, including super clusters. In fact, in biology, the discovery and application of Taylor’s power law played a similar role in the study of the distribution of biological populations, especially in the study of insects (Taylor 1961, 1984). In entomology, from 1920’s to 1950’s, several probability distributions including negative binomial, Neyman, Thomas Double Poisson, Polya distributions, had been developed to fit the frequency data of insect population distribution. A practical problem with the probability distribution approach in entomology was that for each data set of population distribution, there is a set of parameters, even for the same probability distribution model, not to mention the parameters from different probability models. A then wellaccepted solution was to find the common-K of the negative binomial distribution fitted to different data sets, hoping that the common-K to synthesize the information from multiple samples and to represent the species-specific characteristic of the biological species under investigation. Later, it was found that common-K is a dubious index for characterizing population spatial patterns and could not assume the role hoped for by entomologists (Taylor et al. 1979, Perry et al. 1986). In a series of studies (Taylor 1961, Taylor & Taylor 1977, Taylor et al. 1978, 1979, 1984, 1986), Taylor and his colleagues confirmed the wide applicability of Taylor’s (1961) power law [Equation (1)] in describing the ‘fat tails’ of the distribution of abundance of Fig. 1. Three Distribution Patterns of Biological Populations: (a): Regular, (b) Random, and (c) Aggregated. Taylor's power-law accurately depicts the scaling relationship that describes the ‘fat tails’ of the distribution of abundance of nearly all organisms, and it has been found to hold at multiple scale levels of population ecology. Taylor’s power law is one form of the power law that is found to underlie many natural processes such as the distribution of galaxies in the universe, blood cells in a blood sample. In addition, the three patterns displayed in Figure 1 are considered as typical patterns of point process, which is studied in a branch of spatial statistics, i.e, point process statistics. The point process and power law have been studied in many fields of science; for example, in astronomy, both spatial random fields (e.g., the density fields, the velocity fields) and spatial point patterns (e.g., the position of galaxies) have been studied extensively (Illian et al. 2008). Astronomers had observed that matters in the universe is distributed in aggregation (clusters) on small scales, although, theoretically, the cosmological principle Einstein assumed in 1917 considered that the universe is isotropic and homogenous on large scale. It is inspiring to note that Jerzy Neyman (1894-1981), a distinguished mathematical statistician from the University of California at Berkeley, studied the spatial distribution patterns of insects, bacteria, and galaxies, apparently with similar statistical approaches. Perhaps his study on galaxies distribution was inspired by his experience in studying bacteria and insects since his work in biology (Neyman 1939) was earlier than his work in astronomy (Neyman & 2 nearly all organisms across multiple scales in both space and time; they also demonstrated the rarity of random distribution of biological populations. They further found that the parameter (exponent) b of Taylor’s power law ranges from 1 to 2 for most species (hundreds of aphids, moths, and birds in Great Britain) they investigated. reached. Ma (1988, 1991) studied the relationship between aggregation degree and population density and proposed the concept of population aggregation critical density (PACD). PACD can be computed with the following equation: ⎛ ln(a) ⎞ ⎟⎟ (5) m0 = exp⎜⎜ ⎝ (1 − b) ⎠ where a & b are parameters of Taylor’s power law [Equation (1)]. Based on PACD and the notion that population aggregation is density-dependent, Ma (1988, 1991) reinterpreted Taylor’s power law, which consists of a set of rules (which are based on the relationship among, population density, m0, a, b, rather than b along as in the original Taylor’s power law) for determining the spatial distribution patterns of biological populations. Back to astronomy, Totsuji & Kihara (1969) obtained r0=15.3x106 light years and s=1.8. According to Illian et al (2008), today the power law of the pair correlation function g(r) is generally accepted in astronomy (Martinez & Saar 2002), and modern estimates of the exponent (s) range from 1.7 to 1.8. The range of s [Equation (2)] is surprisingly similar to the range of b-value [Equation (10)] in biology (between 1 and 2) as Taylor et al discovered (Taylor 1986). The interpretation of the power law in astronomy is that there are no characteristic scales (Illian et al. 2008), which is a fundamental property of scale-free network. In a scalefree network, the degree distribution P(k) of network nodes (k) is found to manifestly departure from Poisson distribution predicted by random network theory and instead follows power law (Albert & Bararasi 1999, Newman & Barabasi et al. 2006, Barabasi 2009): P(k ) ∝ k −λ . (3) It is well-known that the study of scale-free networks initiated by Albert & Bararasi (1999) and others in the 1990s is part of the still explosively growing network analysis studies in various disciplines towards a new discipline of network science (Albert & Bararasi 1999, Barabasi 2009). Obviously, the power laws Taylor (1961) and Totsuji & Kihara (1969) discovered in the 1960s are simply a manifestation of power law in the distributions of organism and galaxies, respectively. Nevertheless, I believe that there is a need to investigate the earlier discovered power laws (Taylor 1961, Totsuji & Kihara 1969) in the context of current network science since recent advances have produced some powerful mathematical methods and computational tools to analyze the mechanisms underlying power law relationships. It is noted that there is a practical difficulty to build network topology, as adopted in the current studies on scale free networks, with existing ecological data at the population level. But this difficult is largely gone at the community level, which explains the existing extensive studies on food web network in community ecology. In astronomy, power law is built with inter-point distance, and in entomology, power law is built with population density. Nevertheless, in entomology, distance has indeed been utilized in modeling insect dispersion patterns. It is generally agreed upon that insect dispersions generate distribution patterns that follow power law. For example, Taylor (1979, 1980) proposed a series of insect dispersion models, which relate the distance (x) from dispersion center with population density (N). Taylor found that the most general form of insect dispersion model was N = exp[a + bx c + d ln( x)], (6) where a, b, c, & d are model parameters. I suggest that similar models to equation (6) should also be useful for studying human microbiome. From above brief comparative review on the studies in both astronomy and biology, two points seem clear: (i) The power laws in astronomy and biology are isomorphic and they capture essentially the same or similar mechanisms underlying the distributions of galaxies and insects, respectively; (ii) Although in biology Taylor’s power law has been applied only to the study of population distribution patterns, in the studies on the distribution of galaxies in the universe, there was not a similar limit, that is, power law has been applied to study the distribution of various galaxies, which are more similar to the community concept in biology. Therefore, it seems natural to investigate the applicability of Taylor’s power law at the community scale in biology. Furthermore, it is my opinion, there are at least three incentives to pursue the extending of power law for characterizing human microbial community: (i) The current surge of interests in studying human microbial communities initiated by US-NIH’s HMP (Human Microbiome Project), fueled by the low-cost and high throughput new generation of sequencing technology, has generated unprecedented amount of data on human microbial communities. Given that each individual subject carries a microbiome consisting of multiple microbial communities (gut, skin, vaginal, oral, nasal, etc), even for a project that only investigates one type of microbial habitat (e.g., gut), there are multiple communities to be analyzed as long as there are repetitions of subjects (which are a must to conduct any statistical analysis) in a study. Then, one must compare and hopefully There are also parallel studies in astronomy and biology regarding some kind of threshold values of aggregation changes. In astronomy, r0 is such a threshold value, which is equal to 15.3x106 light years and is a threshold value termed minimum inter-point or hardcore distance. In biology, Taylor (1981) proposed a Δ - model that tried to explain the mechanism of Taylor’s power law, among other objectives. The model is with the following form: ⎡⎛ R ⎞ s ⎛ R ⎞t ⎤ Δ = ε ⎢⎜ 0 ⎟ − ⎜ 0 ⎟ ⎥ (4) ⎢⎣⎝ R ⎠ ⎝ R ⎠ ⎥⎦ where Δ is a displacement (movement) of an animal, R is the separation between animal individuals, ε , s, t are parameters, R0 is a threshold across which an equilibrium is 3 synthesize the community diversity information from many communities. Existing diversity indexes borrowed from macro ecology are weak or even lack the capability for synthesizing the information from multiple communities, except for simple statistical comparisons of the values of a diversity index. In addition, it is difficult to study the dynamics of community diversities with the existing diversity indexes. Power law can overcome these limitations of existing diversity indexes, as it has been demonstrated at the population level in biology and in astronomy. (ii) Taylor’s power law essentially measures variability and heterogeneity, which exist at both population and community levels. Existing diversity indexes such as Shannon index, Simpson index, essentially measures the same properties (evenness and heterogeneity are simply reciprocal terms), but do not possess the capability to synthesize information from multiple communities. Therefore, even purely acting as a diversity index, power law should be superior to many of the existing diversity indexes. (iii) Power law parameters for the microbial community of a human individual have the potential to become a personalized (individualized) metric related to diseases and health, which can be invaluable for designing and implementing personalized medicine schemes for diseases associated with human microbial communities, since the values of power law parameters should be individual-dependent, perhaps more like finger printing. In other words, power-law approach to human microbial communities potentially offers a promising case study for medical-ecology-supported personalized medicine. Bioinformatics processing of the metagenomic sequence data, which generates species abundance table of gene reads (Table 1 & 2). PCR processing of the samples & Sequencing of the 16s-RNA Gene. Recruit volunteers & taking human microbiome samples for either crosssectional or longitudinal study of a cohort of individual subjects. Figure 2. Pipeline of the metagenomic study of human microbiome. Table 1. Assumed abundance table of 16sRNA gene reads of various bacterial species in human microbial communities generated from a typical cross-sectional study of 100 individual human subjects (numbered from #400 to #499). Species-N Subject Species-1 Species-2 … … N=500, Reads Number Reads Reads #400 100 1200 0 #401 200 800 1000 … … … … #499 1000 100 50 Table 2. Assumed abundance table of 16sRNA gene reads of various bacterial species in human microbial communities generated from a typical longitudinal study of 100 individual st st human subjects (#400—#499) from January 1 to December 1 . Species-N SpeciesSpeciesSubject Date … 1 Reads 2 Reads Number … N=500,Reads #400 Jan 1 100 1200 … 0 … … … … … 1000 … Dec 1 500 2000 … 10 #499 Jan 1 200 1000 … 10 … … … … … … … Dec 1 700 900 … 0 A PROPOSAL FOR THE EXTENSIONS OF TAYLOR’S POWER LAW Figure 2 shows a typical flow of metagenomic study of human microbiome. The product of the sequencingbioinformatics pipeline is usually a species abundance table of gene reads in the format of Table (1) or Table (2) for cross-sectional experiments or longitudinal study, respectively. Table (1) contains the assumed gene reads data of 100 individual subjects from a cross-sectional study, i.e., each individual subject is sampled only once. In Table (1), there would be abundance data of S=500 bacterial species from 100 samples, which represent 100 microbial communities. Table (2) contains the assumed gene reads data of 100 individuals from a longitudinal study, sampled from January 1st to December 1st, say every 10 days. Then 36 samples for each individual subject would have been taken, and totally 3600 samples (100x36) or 3600 microbial communities to be analyzed. Table 3. Assumed abundance data of abundance distribution at different locations of human vagina, with reference to a study conducted by Kim et al. (2009) Upper 1/3 Middle 1/3 Lower 1/3 Outer Species Abundance of Species 1 100 900 1500 2000 20 1600 100 70 … Abundance of Species n In the study of human microbiome, it is also possible to get the abundance data at different locations in an organ, e.g., population abundance of bacterial species at different locations of human vagina (e.g., Kim et al. 2009). It is then possible to apply the dispersion models such as [Equation (6)] to describe the location-dependent abundance distribution. Table (3) shows an assumed data set with human vaginal microbial community as an example. With the assumed data formats displayed in Table (1) and (2), for cross-sectional and longitudinal studies, respectively, I envision five ways in which Taylor’s power law models can be built to characterize the properties of human microbial communities such as community diversity and stability. From a pure statistic perspective, building Taylor’s power law model is a two-step process. The first step is to 4 compute the pairs of mean [Mi] and variance [Vi] from the abundance data (which is in matrix form), and the second step is to fit the model, which can be as simple as performing a simple linear regression in the following form: ln(V ) = ln(a ) + b ln( M ). (7) More complex algorithms to directly fit Taylor’s power law [Equation (1)] are available in the literature [e.g., Marquardt’s algorithm, see Ma (1990, 1992)], but the simple linear regression usually suffices. individual subjects, as well as “synthesized” information across N bacterial species. To some extent, these power law parameters are similar to a “common” aggregation index of N bacterial species, since the term aggregation largely means skewed variation in the study of the spatial distribution of population abundance, and the term “common” again refers to some kind of “synthesis” of information from many (N) bacterial species, similar to the usage of term “common” in the common-K of negative binomial distribution as mentioned previously. It is noted that, when referring to the parameters of Taylor’s power law, b is the most informative biologically and a is the least informative since a is mainly influenced by sampling schemes. Parameter m0, i.e., PACD (population aggregation critical density), offers insights on the dynamic relationship between aggregation degree and population density in population ecology, but its biological significance should be investigated further when the power law is extended to community scale. In summary, when Taylor’s power law is applied to crosssectional studies of human microbial communities, it may offer insights on “common” diversity measure of microbial communities for (across) multiple subjects, and “common” aggregation measure for (across) multiple bacterial species. The Applications to Longitudinal Studies Obviously, cross-sectional data format is a special case of longitudinal data format, i.e., a cross-sectional snapshot of the longitudinal data at a fixed time. Another way to examine the same data is to replace the time-series observations for each subject with their mean, and then the whole dataset of a longitudinal study is turned into a crosssectional dataset. The above discussed two applications of Taylor’s power law to cross-sectional data can be applied to the converted (taking the mean of time-series observations) longitudinal data in the same manner. However, as it will become clear from the following discussion, that the power law models built from longitudinal data, even after conversion, should reflect some dynamic properties of microbial communities. I classify this “mean-conversion” (i.e., using the means of time-series observations) based application of Taylor’s power law as the third approach to apply the power law for characterizing human microbial communities. The Applications to Cross-sectional Studies For a cross-sectional study, two ways for applying Taylor’s power [Equation (1)] law should be possible: one approach is to compute pairs of the mean (M) and variance (V) across columns (one pair for each row) and another one is to compute M & V across rows (one pair for each column). With the first way, the mean (Mi) and variance (Vi) reflect the average abundance and variability of all bacterial species detected in the communities, respectively. There is a pair of mean (Mi) and variance (Vi) for the community of each subject, and totally S pairs of M and V, that is, i=1,2,…S, where S is the number of subjects recruited in the study. The second step is simply to build a regression model with S pairs of means and variances based on Equation (7), and any statistical software would be able to perform the task. In the assumed case of Table (1), S would be 100 subjects, numbered from 400 to 499. The power law parameters obtained in this application manner would reflect the abundance variability of various bacterial species across S subjects. In other words, the parameters are determined by the variability of N bacterial species, and furthermore, the variability information among S subjects is also synthesized. To some extent, the parameters of Taylor’s power law obtained in this type of application are similar to a “common” diversity index that synthesizes the diversity information of many subjects, similar to the common-K of the negative binomial distribution in the literature of the spatial distribution pattern of insect population (Taylor et al. 1979, Perry et al. 1986), but without the deficiency of the common-K. A next immediate question is, whether the longitudinal datasets can be used to fit Taylor’s power law directly, without using the “mean-conversion” transformation. The answer should be a sound yes. First, the longitudinal data in the format of Table 2 can be used to fit Taylor’s power law without combing time-series observations into mean values, by simply treat time-series observations as repetitions (repeated observations) of the subjects. I expect that the results from this approach may be similar to the above discussed “mean-conversion”-based analysis, but further investigation with real world metagenomic data should be performed to find out the difference, if there is any. Nevertheless, I believe that the most interesting and also the valuable applications of Taylor’s power law to analyze longitudinal data should be performed on the individual-based as discussed below. In the following proposed application scheme, the dataset of each individual is used to build the power law model separately. This should be quite natural since all the time-series observations for each individual subject belong to the same microbial community. In other words, each individual carries a microbial community at a specific habitat (e.g., gut). Therefore, from community ecology perspective, individual-based power-law modeling is truly at the In contrast, the second approach of applying Taylor’s power law to cross-sectional study computes Mj & Vj across rows, where j=1, 2, … N species, i.e., a pair of Mj and Vj for each bacterial species, and totally N pairs of Mj and Vj. The follow step would be to obtain the parameters of Taylor’s power law model by a simple linear regression analysis with the N pairs of data [Equation (7)]. The power law parameters obtained in this application manner reflect the variability of bacterial species abundance among 5 community scale, and the previously discussed applications of the power law are more about meta-communities. In summary, when Taylor’s power law is applied to longitudinal studies of human microbial communities, it may offer insights on the stability of the community diversity over time series, and on the stability of “common” species aggregation. Characterizing the stability of community diversity over time with Taylor’s power law As stated previously, the dataset used for performing Taylor’s power law analysis is individual based, that is, we apply the power law to characterize a single dynamic community, or various snapshots of the same community. For example, for the subject #400 in Table 2, we get an abundance dataset consisting of 12x3=36 rows (3 observations per month for 12 months) of the observations of N=500 bacterial species. Obviously, we can perform the same power law analysis to each of the subjects (S=100 in Table 2). It is further noted that the power law modeling of human microbial communities when applied to longitudinal studies generates a set of power law parameters for each individual subject, which characterizes the dynamic properties of species aggregation and community diversity, or the stability of microbial community. This kind of insights can be invaluable for design and implementing medicalecology-supported personalized medicine, as being argued in the next section. When Taylor’s power law is applied to the dataset of an individual subject, there are also two ways that the application can be done, depending on how mean (M) and variance (V) are computed. In both kinds of applications, the computational procedures for building the power law model are actually the same as those used for the previously discussed modeling with cross-sectional data. Similar to the case of cross-sectional data, the computation of mean (M) and variance (V) can be cross-columns or cross-rows, corresponding to two ways Taylor’s power law are applied for analyzing individual-based datasets. The Application of Dispersion Models The dispersion models such as Equation (6) proposed by Taylor (1979, 1980) can be used to describe location dependent population abundance data of bacterial species such as assumed in Table (3). It may be necessary to develop new dispersion models for human microbiome, other than directly applying Taylor’s (1979, 1980) models, since unlike Taylor’s power law, the existing dispersion models in literature are empirical and lack the necessary generality. PERSPECTIVES: A CASE STUDY FOR MEDICAL ECOLOGY AND PERSONALIZED MEDICINE For example, with the assumed datasets displayed in Table 2, for subject #400, crossing 500 columns (corresponding to N=500 bacterial species), we can compute 36 pairs (12 months, each month with 3 samples) of mean (M) and variance (V). The 36 pairs of mean-variance data can be used to fit Taylor’s power law [Equation (7)]. Since each pair of the mean and variance reflects the heterogeneity (diversity) of the community at each time point, the parameters of the power law then should reflect the dynamic property of the community diversity over time series. In other words, the power law model built with cross time-series mean-variance pairs should reveal the stability of community diversity over time. I classify the Taylor’s power built in this manner the fourth type of power law modeling of microbial community with a mission to reveal the stability of community diversity over time. According to the website: www.medicalecology.org/, which is maintained by Dr. Dickson Despommier and Dr. Steven Chen of Columbia University, the term Medical Ecology was first coined by eminent microbiologist Rene Dubos, who believed that natural world could offer many of our needs if explored fully. Dubos was apparently inspired by events such as the discoveries of penicillin and gramicidin (his own discovery), in which soil microbes played a critical role, as well as the treatment of malaria with quinine. Recent redefinition of medical ecology has much broader meanings. For example, www.medicalecology.org/ stated that “Medical Ecology is an emerging science that defines those aspects of the environment that have a direct bearing on human health. The concept of ecosystem functions and services helps to describe global processes that contribute to our well-being, helping to cleanse the air we breathe, the water we drink, and the food we eat. Environmental degradation often leads to alterations in these aspects, leading to various states of ill health.” Characterizing the stability of “common” species aggregation with Taylor’s power law The mean/variance pairs can also be computed across rows for each subject. For example, for subject#400, we can compute one pair of mean and variance for each bacterial species across all of the 36 time-series observations; we can obtain as many as 500 pairs of the mean-variance values, i.e., each species with one pair. The 500 pairs of meanvariance data can then be fitted to the power law [Eq. (7)]. Since each pair of the mean and variance computed across time series reflect the dynamic aggregation of each species, the power law model built in this way should represent aggregation dynamics common to all 500 species in the community. The term “common” species aggregation stability (i.e., the stability of aggregation common to all species is obtained with this type of power law modeling. In the post-HGP (Human Genomic Project) and HMP (Human Microbiome Project) era, it is high time to expand the scope of medical ecology again. It is my opinion that the study of the relationship between human microbiome and human host as well as its implications to human health and diseases should be considered as a core component of newly expanded medical ecology. I further believe that the emerging medical ecology is at the stage when medical genetics was emerging in the 1960s, and it should ultimately assume a similar role in medicine as today’s 6 medical genetics assumes. In the following discussion, I temporarily ignore the existing aspects of medical ecology; instead, I focus exclusively on the human-microbiomecentered medical ecology. likely and important fields. It is widely recognized that ecology, evolution and behavior are three interwoven disciplines. Therefore, in Figure 4, I pick three research fields, each of which focuses on one of the three disciplines. These fields are: (i) applications and extensions of ecological theories from macro-ecology; (ii) evolution of symbiosis, cooperation and mutualism of “human microbiome/host” relationships, especially the role of human immune system; (iii) communication behavior of human microbiome and the communication between microbiome and host. Of course, this list of three is far from complete, and it is largely an impromptu attempt to present a glimpse of the research topics of emerging medical ecology. I will discuss the details of these topics in a separate paper. One may wonder if it is really necessary to redefine medical ecology rather than putting the related research topics in the context of some more familiar disciplines, such as microbial ecology, clinical microbiology, bioinformatics, and/or eco-informatics. In my opinion, no existing scientific disciplines can accommodate all of the interesting research themes that are waiting for medical ecology to embrace. Furthermore, to advance medical ecology, there will be some new theories and techniques to emerge, and these new theories and techniques need the umbrella of a redefined medical ecology. Figure 3 is a diagram showing the relationship between redefined medical ecology and its core parent fields, as well as its supporting and supported fields. In Figure 3, medical ecology is depicted as a crossdisciplinary and trans-disciplinary subject with “native parents” of medicine, ecology, and microbiology. Its advances are directly dependent on various -omics research (in particular metagenomics), computational biology, bioinformatics, system biology and system ecology, etc. It is my belief that medical ecology should become a foundation of personalized medicine, and that personalized medicine is likely to be the biggest beneficiary of research in medical ecology. Finally, I argue that the application of Taylor’s power law for characterizing human microbial communities can serve as a case study of medical ecology and personalized medicine for the following reasons: (i) According to Figure 4, the study falls into the first category of the research topics of medical ecology, i.e., the application of ecological theories, mostly from macro-ecology. Taylor’s power law is one of a countable few laws in population ecology of animals and plants. (ii) As explained previously, the power law parameters, when obtained from longitudinal studies of human microbial communities, capture individual-specific and dynamic properties (community diversity and species aggregation) of an individual’s microbial community. It should be possible to establish functional relationship between the individual-specific power law parameters and the metadata covariates that reflect the health/illness states of an individual. Understanding this kind of functional relationship can offer deep insights for practicing personalized medicine, especially for those diseases that are associated with human microbiome. Personalized Medicine & Public Health Key Supported Fields by Medical Ecology Medical Science Ecological Science (i) Ecology Focus: Applying and extending existing macroecological theories; create new ecological theories and discover new laws specific to human microbiome. (ii) Evolution Focus: Study the evolution of humanmicrobiome symbiosis (mutualism, cooperation), especially the role of human immune system, as well as the possible phase transitions between healthy, subhealthy and disease states of human body. (iii) Behavior focus: Study the communication behavior of human microbiome system, e.g., quorum sensing, communication with host, especially with immune system. Medical Ecology Medical Microbiology Bioinformatics and Computational Biology; Omics: Genomics, Metagenomics, Proteomics, Ecology Metabolomics, Transcriptomics, Personal Genomics, Pharmacogenomics, Pharmacomicrobiomics etc; Evolution Behavior Network Science … Human Microbiome / Host Ecosystem System Biology and System Ecology Key Supporting Fields of Medical Ecology Suggested Focal Fields of Medical Ecology Figure 3. Emerging Human-Microbiome-Centered Medical Ecology, its parents, supporting and supported fields. Figure 4. Suggested focal fields of Medical Ecology In fact, scholars have already explored the application of Taylor’s power law in epidemiology and evolutionary ecology of parasites (Morand & Krasnov 2008). For example, Morand & Krasnov (2008) suggested a possible Research in medical ecology should develop some unique fields and theories in the near future. Obviously, predicting them is not an easy task, but here I try to identify three 7 Morand, S. and B. Krasnov. 2008. Why apply ecological laws to epidemiology? Trends in Parasitology, 24(7):304-309 link between host defense against parasite and the value of the parameter b of Taylor’s power law (when applied to measure the aggregation of parasite populations). In personalized medicine, frailty analysis can be an effective statistical modeling approach (Ma et al. 2011), where the distribution of frailty (disease risk) can follow the PVF (power variance function) distributions. PVF is a family of probability distributions and is different from Taylor’s power law. But in this distribution family, the variance and mean do satisfy power law function (which is the mathematical essence of Taylor’s power law). It will be interesting to investigate the underlying biomedical process that may lead to the PVF frailty distribution. In a separate front, investigating the existence and maintenance of scalefree networks (of which power law is a fundamental property) in human microbiome should also be an important endeavor. Putting power law analysis in the context of network science (e.g., Bascompte 2007, Ings 2009, Barabasi 2009) should produce synergetic advances in applying power law to the study of human microbiome and medical ecology. Newman, M, Barabasi, AL, Watts, DJ. (eds). 2006. The Structure and Dynamics of Networks. Princeton University Press. 583pp. Neyman, J. 1939. On a new class of 'contagious' distributions, applicable in entomology and bacteriology. Annals of Math. Stat., vol. 10, pp. 35-57. Neyman, J., and Scott, E.L. (1952) A theory for the spatial distribution of galaxis. Astrophys. J. 116, 144–163. Neyman, J., Scott, E. L., and Shane, C. D. 1953. On the spatial distribution of galaxies: a specific model. Astrophys. J., 117-92-133. Neyman, J., and Scott, E.L. 1958. Statisical approach to problems of cosmology (with discussion). J. Roy. Statist. Soc. B 20, 1–43. Taylor, L. R. 1961. Aggregation, variance and the mean. Nature 189:732– 735. Taylor, L. R., and R. A. J. Taylor. 1977. Aggregation, migration and population mechanics. Nature 265:415–421. Taylor, L. R., I. P. Woiwod and J. N. Perry. 1978. The DensityDependence of Spatial Behaviour and the Rarity of Randomness. Journal of Animal Ecology, Vol. 47, No. 2, pp. 383-406 REFERENCE Barabasi, AL, Albert, A. 1999. Emergence of scaling in random networks. Science 286, 509-512 Taylor, L. R. I. P. Woiwod and J. N. Perry. 1979. The Negative Binomial as a Dynamic Ecological Model for Aggregation, and the Density Dependence of k. Journal of Animal Ecology, Vol. 48, No. 1:pp. 289-304 Barabasi, AL. 2009. Scale-free networks: a decade and beyond. Science, 325:412-413. Taylor, L. R. 1984. Assessing and interpreting the spatial distribution of insect populations. Annual Review of Entomology, 29, 321-357. Bascompte, J. 2007. Networks in ecology. Basic and Applied Ecology, 8:485-490. Taylor, L. R. 1986. Synoptic dynamics, migration and the Rothamsted Insect Survey. Journal of Animal Ecology 55:1–38. Illian, J. A. Penttinen, H. Stoyan, and D. Stoyan. 2008. Statistical Analysis and Modeling of Spatial Point Patterns. Wiley. Taylor, R. A. J. 1978. The relationship between density and distance of dispersing insects. Ecological Entomology, 3, 63-70. Ings, T. C. et al. 2009. Review: Ecological networks – beyond food webs. J. Animal Ecology, 78(1): 253–269, January 2009. Taylor, R. A. J. 1980. A family of regression equations describing the density distribution of dispersing organisms. Nature, London, 286,53-55. Kendal, W. S. 2004. Taylor’s ecological power law as a consequence of scale invariant exponential dispersion models. Ecological Complexity. 1:193–209 Taylor, R. A. J. 1981. The behavioural basis of redistribution. I. The Deltamodel concept. Journal of Animal Ecology, 50:573–586 Taylor, R. A. J. 2007. Obituary: Roy (L. R.) Taylor (1924–2007). Journal of Animal Ecology. 76, 630–631 Kim, T. K. et al. 2009. Heterogeneity of Vaginal Microbial Communities within Individuals. J. Clin. Microbiol. vol. 47 no. 4 1181-1189 Totsuji, H., and Kihara, T. (1969) The correlation function for the distribution of galaxies. Publ. Astron. Soc. Japan 21, 221–229. Ma, Z. S. 1988. Revised Taylor’s Power Law and population aggregation critical density, in: Proceedings of Annual National Conference of the Entomological Society China. 1988, Nanjing, China (in Chinese), 1988. Perry, J. N. & L. R. Taylor. 1986. Stability of Real Interacting Populations in Space and Time: Implications, Alternatives and the Negative Binomial kc quick view. Journal of Animal Ecology, Vol. 55, No. 3, pp. 1053-1068 Ma, Z. S. 1990. Fitting Taylor’s power law model with Marquardt’s algorithm, J. Beijing Forestry University. 12(1):49-54 Venter, J.C., Adams, M.D., Myers, E.W., Li, P.W., Mural, R.J., Sutton, G.G., Smith, H.O., Yandell, M., Evans, C.A., Holt, R.A., Gocayne, J.D., Amanatides, P., Ballew, R.M., Huson, D.H., Wortman, J.R., Zhang, Q., Kodira, C.D., Zheng, X.H., Chen, L., Skupski, M., Subramanian, G., Thomas, P.D., Zhang, J., Gabor Miklos, G.L., Nelson, C., Broder, S., Clark, A.G., Nadeau, J., McKusick, V.A., Zinder, N., Levine, A.J., Roberts, R.J., Simon, M., Slayman, C., Hunkapiller, M., Bolanos, R., Delcher, A., Dew, I., Fasulo, D., Flanigan, M., Florea, L., Halpern, A., Hannenhalli, S., Kravitz, S., Levy, S., Mobarry, C., Reinert, K., Remington, K., Abu-Threideh, J., Beasley, E., Biddick, K., Bonazzi, V., Brandon, R., Cargill, M., Chandramouliswaran, I., Charlab, R., Chaturvedi, K., Deng, Z., Francesco, V.D., Dunn, P., Eilbeck, K., Evangelista, C., Gabrielian, A.E., Gan, W., Ge, W., Gong, F., Gu, Z., Guan, P., Heiman, T.J., Higgins, M.E., Ji, R.-R., Ke, Z., Ketchum, K.A., Lai, Z., Lei, Y., Li, Z., Li, J., Liang, Y., Lin, X., Lu, F., Merkulov, G.V., Milshina, N., Moore, H.M., Naik, A.K., Narayan, V.A., Neelam, B., Nusskern, D., Rusch, D.B., Salzberg, S., Shao, W., Shue, B., Sun, J., Wang, Z.Y., Wang, A., Wang, X., Wang, J., Wei, M.-H., Wides, R., Xiao, C., Yan, C., Yao, A., Ye, J., Zhan, M., Zhang, W., Zhang, H., Zhao, Q., Zheng, L., Zhong, F., Zhong, W., Zhu, S.C., Zhao, S., Gilbert, D., Baumhueter, S., Spier, G., Carter, C., Cravchik, A., Woodage, T., Ali, F., An, H., Awe, A., Baldwin, D., Baden, H., Barnstead, M., Barrow, I., Beeson, K., Busam, D., Carver, A., Center, A., Cheng, M.L., Curry, L., Danaher, S., Davenport, L., Desilets, R., Dietz, S., Dodson, K., Doup, L., Ferriera, S., Garg, N., Gluecksmann, A., Hart, B., Haynes, J., Haynes, C., Heiner, C., Hladun, S., Hostin, D., Houck, J., Howland, T., Ibegwam, C., Johnson, J., Kalush, F., Kline, L., Koduru, S., Love, A., Mann, F., May, D., McCawley, S., McIntosh, T., McMullen, I., Moy, M., Moy, L., Murphy, B., Nelson, K., Pfannkoch, C., Pratts, E., Puri, V., Qureshi, H., Reardon, M., Rodriguez, R., Rogers, Y.-H., Romblad, D., Ruhfel, B., Scott, R., Sitter, C., Smallwood, M., Stewart, E., Strong, R., Suh, E., Thomas, R., Tint, N.N., Tse, S., Vech, C., Wang, G., Wetter, J., Williams, S., Williams, M., Windsor, S., Winn-Deen, E., Wolfe, K., Zaveri, J., Zaveri, K., Abril, J.F., Guigo, R., Campbell, M.J., Sjolander, K.V., Karlak, B., Kejariwal, A., Mi, H., Lazareva, B., Hatton, T., Narechania, A., 2001. The sequence of the human genome. Science 291, Ma, Z. S. 1991. Further interpreted Taylor’s Power Law and population aggregation critical density, Trans. Ecol. Soc. China (1991) 284–288. Ma, Z. S. 1992. Optimization of nonlinear ecological models with the accelerated simplex algorithm. J. of Biomathematics, 7(2):160-167. Ma, Z. S., A. Zaid, L. J. Forney. 2011. Caring about trees in the forest: incorporating frailty in risk analysis for personalized medicine. Personalized Medicine, 8(6):681-688. Ma, Z. S. 2012. Chaotic populations in genetic algorithms. J. Applied Soft Computing. doi:10.1016/j.asoc.2012.03.001 Martínez, V.J., and Saar, E. 2002. Statistics of the Galaxy Distribution. Chapman & Hall/CRC, Boca Raton, FL. 1304–1351. Maurer, B. A. 1999. Untangling Ecological Complexity. The University of Chicago Press. 8
5cs.CE
arXiv:1703.03963v1 [cs.DS] 11 Mar 2017 On Solving Travelling Salesman Problem with Vertex Requisitions∗ Anton V. EREMEEV Omsk Branch of Sobolev Institute of Mathematics SB RAS, Omsk State University n.a. F.M. Dostoevsky [email protected] Yulia V. KOVALENKO Sobolev Institute of Mathematics SB RAS, [email protected] Received: / Accepted: Abstract: We consider the Travelling Salesman Problem with Vertex Requisitions, where for each position of the tour at most two possible vertices are given. It is known that the problem is strongly NP-hard. The proposed algorithm for this problem has less time complexity compared to the previously known one. In particular, almost all feasible instances of the problem are solvable in O(n) time using the new algorithm, where n is the number of vertices. The developed approach also helps in fast enumeration of a neighborhood in the local search and yields an integer programming model with O(n) binary variables for the problem. Keywords: Combinatorial optimization, System of vertex requisitions, Local search, Integer programming. MSC: 90C59, 90C10. 1 INTRODUCTION The Travelling Salesman Problem (TSP) is one of the well-known NP-hard combinatorial optimization problems [1]: given a complete arc-weighted digraph with n vertices, find a shortest travelling salesman tour (Hamiltonian circuit) in it. The TSP with Vertex Requisitions (TSPVR) was formulated by A.I. Serdyukov in [2]: find a shortest travelling salesman tour, passing at i-th position This research of the authors is supported by the Russian Science Foundation Grant (project no. 15-1110009). ∗ 1 a vertex from a given subset X i , i = 1, . . . , n. A special case where |X i | = n, i = 1, . . . , n, is equivalent to the TSP. This problem can be interpreted in terms of scheduling theory. Consider a single machine that may perform a set of operations X = {x1 , . . . , xn }. Each of the identical jobs requires processing all n operations in such a sequence that the i-th operation belongs to a given subset X i ⊆ X for all i = 1, . . . , n. A setup time is needed to switch the machine from one operation of the sequence to another. Moreover, after execution of the last operation of the sequence the machine requires a changeover to the first operation of the sequence to start processing of the next job. The problem is to find a feasible sequence of operations, minimizing the cycle time. TSP with Vertex Requisitions where |X i | ≤ k, i = 1, . . . , n, was called k-TSP with Vertex Requisitions (k-TSPVR) in [2]. The complexity of k-TSPVR was studied in [2] for different values of k on graphs with small vertex degrees. In [3] A.I. Serdyukov proved the NP-hardness of 2-TSPVR in the case of complete graph and showed that almost all feasible instances of the problem are solvable in O(n2) time. In this paper, we propose an algorithm for 2-TSPVR with time complexity O(n) for almost all feasible problem instances. The developed approach also has some applications to local search and integer programming formulation of 2-TSPVR. The paper has the following structure. In Section 2, a formal definition of 2-TSPVR is given. In Section 3, an algorithm for this problem is presented. In Section 4, a modification of the algorithm is proposed with an improved time complexity and it is shown that almost all feasible instances of the problem are solvable in time O(n). In Section 5, the developed approach is used to formulate and enumerate efficiently a neighborhood for local search. In Section 6, this approach allows to formulate an integer programming model for 2-TSPVR using O(n) binary variables. The last section contains the concluding remarks. 2 PROBLEM FORMULATION AND ITS HARDNESS 2-TSP with Vertex Requisitions is formulated as follows. Let G = (X, U) be a complete arc-weighted digraph, where X = {x1 , . . . , xn } is the set of vertices, U = {(x, y) : x, y ∈ X, x 6= y} is the set of arcs with non-negative arc weights ρ(x, y), (x, y) ∈ U . Besides that, a system of vertex subsets (requisitions) X i ⊆ X, i = 1, . . . , n, is given, such that 1 ≤ |X i | ≤ 2 for all i = 1, . . . , n. Let F denote the set of bijections from Xn := {1, . . . , n} to X, such that f (i) ∈ X i , i = 1, . . . , n, for all f ∈ F . The problem consists in finding such a mapping f ∗ ∈ F that ρ(f ∗ ) = n−1 P min ρ(f ), where ρ(f ) = ρ(f (i), f (i + 1)) + ρ(f (n), f (1)) for all f ∈ F . Later on the f ∈F i=1 symbol I is used for the instances of this problem. Any feasible solution uses only the arcs that start in a subset X i and end in X i+1 for some i ∈ {1, . . . , n} (we assume n + 1 := 1). Other arcs are irrelevant to the problem and we assume that they are not given in a problem input I. 2-TSPVR is strongly NP-hard [3]. The proof of this fact in [3] is based on a reduction of Clique problem to a family of instances of 2-TSPVR with integer input data, bounded by a polynomial in problem length. Therefore, in view of sufficient condition for non-existence of Fully Polynomial-Time Approximation Scheme (FPTAS) for strongly NP-hard problems [4], the result from [3] implies that 2-TSPVR does not admit an FPTAS, provided that P6=NP. The k-TSPVR with k ≥ 3 cannot be approximated with any constant or polynomial factor of the optimum in polynomial time, unless P=NP, as follows from [5]. 3 SOLUTION METHOD Following the approach of A.I. Serdyukov [3], let us consider a bipartite graph Ḡ = (Xn , X, Ū) where the two subsets of vertices of bipartition Xn , X have equal sizes and the set of edges is Ū = {{i, x} : i ∈ Xn , x ∈ X i }. Now there is a one-to-one correspondence between the set of perfect matchings W in the graph Ḡ and the set F of feasible solutions to a problem instance I: Given a perfect matching W ∈ W of the form {{1, x1 }, {2, x2 }, . . . , {n, xn }}, this mapping produces the tour (x1 , x2 , . . . , xn ). An edge {i, x} ∈ Ū is called special if {i, x} belongs to all perfect matchings in the graph Ḡ. Let us also call the vertices of the graph Ḡ special, if they are incident with special edges. Supposing that Ḡ is given by the lists of adjacent vertices, the special edges and edges that do not belong to any perfect matching in the graph Ḡ may be efficiently computed by the Algorithm 1 described below. After that all edges, except for the special edges and those adjacent to them, are slit into cycles. Note that the method of finding all special edges and cycles in the graph Ḡ was not discussed in [3]. Algorithm 1. Finding special edges in the graph Ḡ Step 1 (Initialization). Assign Ḡ′ := Ḡ. Step 2. Repeat Steps 2.1-2.2 while it is possible: Step 2.1 (Solvability test). If the graph Ḡ′ contains a vertex of degree 0 then problem I is infeasible, terminate. Step 2.2 (Finding a special edge). If the graph Ḡ′ contains a vertex z of degree 1, then store the corresponding edge {z, y} as a special edge and remove its endpoints y and z from Ḡ′ . Each edge of the graph Ḡ is visited and deleted at most once (which takes O(1) time). The number of edges |Ū | ≤ 2n. So the time complexity of Algorithm 1 is O(n). Algorithm 1 identifies the case when problem I is infeasible. Further we consider only feasible instances of 2-TSPVR and bipartite graphs corresponding to them. After the described preprocessing the resulting graph Ḡ′ is 2-regular (the degree of each vertex equals 2) and its components are even cycles. The cycles of the graph Ḡ′ can be computed in O(n) time using the Depth-First Search algorithm (see e.g. [6]). Note that there are no other edges in the perfect matchings of the graph Ḡ, except for the special edges and edges of the cycles in Ḡ′ . In what follows, q(Ḡ) denotes the number of cycles in the graph Ḡ (and in the corresponding graph Ḡ′ ). Each cycle j, j = 1, . . . , q(Ḡ), contains exactly two maximal (edge disjoint) perfect matchings, so it does not contain any special edges. Every perfect matching in Ḡ is uniquely defined by a combination of maximal matchings chosen in each of the cycles and the graph G = ( X8, X, U ) 1 x1 2 x2 3 x3 4 x4 5 x5 6 x6 7 x7 8 x8 cycle 1 special edges cycle 2 Figure 1: An instance I with n = 8 and system of vertex requisitions: X 1 = {x1 , x2 }, X 2 = {x1 , x2 }, X 3 = {x3 }, X 4 = {x3 , x4 }, X 5 = {x5 , x6 }, X 6 = {x6 , x7 }, X 7 = {x7 , x8 }, X 8 = {x6 , x8 }. Here the edges drawn in bold define one maximal matching of a cycle, and the rest of the edges in the cycle define another one. The special edges are depicted by dotted lines. The edges depicted by dashed lines do not belong to any perfect matching. The feasible solutions of the instance are f 1 = (x1 , x2 , x3 , x4 , x5 , x6 , x7 , x8 ), f 2 = (x1 , x2 , x3 , x4 , x5 , x7 , x8 , x6 ), f 3 = (x2 , x1 , x3 , x4 , x5 , x6 , x7 , x8 ), f 4 = (x2 , x1 , x3 , x4 , x5 , x7 , x8 , x6 ). set of all special edges (see Fig. 1). Therefore, 2-TSPVR is solvable by the following algorithm. Algorithm 2. Solving 2-TSPVR Step 1. Build the bipartite graph Ḡ, identify the set of special edges and cycles and find all maximal matchings in cycles. Step 2. Enumerate all perfect matchings W ∈ W of Ḡ by combining the maximal matchings of cycles and joining them with special edges. Step 3. Assign the corresponding solution f ∈ F to each W ∈ W and compute ρ(f ). Step 4. Output the result f ∗ ∈ F , such that ρ(f ∗ ) = min ρ(f ). f ∈F To evaluate the Algorithm 2, first note that maximal matchings in cycles are found easily in O(n) time. Now |F | = |W| = 2q(Ḡ) so the time complexity of Algorithm 2 of solving 2-TSPVR is O(n2q(Ḡ) ), where q(Ḡ) ≤ ⌊ n2 ⌋ and the last inequality is tight. 4 IMPROVED ALGORITHM In [3], it was shown that almost all feasible instances of 2-TSPVR have not more than n feasible solutions and may be solved in quadratic time. To describe this result precisely, let us give the following Definition 1 [3] A graph Ḡ = (Xn , X, Ū) is called “good” if it satisfies the inequality q(Ḡ) ≤ 1.1 ln(n). Note that any problem instance I, which corresponds to a “good” graph Ḡ, has at most 2 < n0.77 feasible solutions. Let χ̄n denote the set of “good” bipartite graphs Ḡ = (Xn , X, Ū ) , and let χn be the set of all bipartite graphs Ḡ = (Xn , X, Ū ). The results of A.I. Serdyukov from [3] imply 1.1 ln n Theorem 1 |χ̄n |/|χn | −→ 1 as n → ∞. The proof of Theorem 1 from [3] is provided in the appendix for the sake of completeness. According to the frequently used terminology (see e.g. [7]), this theorem means that almost all feasible instances I have at most n0.77 feasible solutions and thus they are solvable in O(n1.77 ) time by Algorithm 2. Using the approach from [8] we will now modify Algorithm 2 for solving 2-TSPVR in  q(Ḡ) O q(Ḡ)2 + n time. Let us carry out some preliminary computations before enumerating all possible combinations of maximal matchings in cycles in order to speed up the evaluation of objective function. We will call a contact between cycle j and cycle j ′ 6= j (or between cycle j and a special edge) the pair of vertices (i, i + 1) (we assume n + 1 := 1) in the left-hand part of the graph Ḡ, such that one of the vertices belongs to the cycle j and the other one belongs to the cycle j ′ (or the special edge). A contact inside a cycle will mean a pair of vertices in the left-hand part of a cycle, if their indices differ exactly by one, or these vertices are (n, 1). Consider a cycle j. If a contact (i, i + 1) is present inside this cycle, then each of the two maximal matchings w 0,j and w 1,j in this cycle determines the i-th arc of a tour in the graph G. Also, if the cycle j has a contact (i, i + 1) to a special edge, each of the two maximal matchings w 0,j and w 1,j also determines the i-th arc of a tour in the graph G. For each of the matchings w k,j , k = 0, 1, let the sum of the weights of arcs determined by the contacts inside the cycle j and the contacts to special edges be denoted by Pjk . If cycle j contacts to cycle j ′ , j ′ 6= j, then each combination of the maximal matchings of these cycles determines the i-th arc of a tour in the graph G for any contact (i, i + 1) between the cycles. If a maximal matching is chosen in each of the cycles, one can sum up the weights of the arcs in G determined by all contacts between cycles j and j ′ . This yields (0,0) (0,1) (1,0) (1,1) four values which we denote by Pjj ′ , Pjj ′ , Pjj ′ and Pjj ′ , where the superscripts identify the matchings chosen in each of the cycles j and j ′ respectively. (0,0) (0,1) (1,0) (1,1) Parameters Pj0 , Pj1 , Pjj ′ , Pjj ′ , Pjj ′ and Pjj ′ can be found as follows. Suppose that intermediate values of Pj0 , Pj1 for j = 1, . . . , q(Ḡ) are stored in one-dimensional arrays of (0,0) (0,1) (1,0) (1,1) size q(Ḡ), and intermediate values of Pjj ′ , Pjj ′ , Pjj ′ and Pjj ′ for j, j ′ = 1, . . . , q(Ḡ) are stored in two-dimensional arrays of size q(Ḡ) × q(Ḡ). Initially, all of these values are assumed to be zero and they are computed in an iterative way by the consecutive enumeration of pairs of vertices (i, i + 1), i = 1, . . . , n − 1, and (n, 1) in the left-hand part of the graph Ḡ. When we consider a pair of vertices (i, i + 1) or (n, 1), at most four parameters (partial sums) are updated depending on whether the vertices belong to different cycles or to the same cycle, or one of the vertices is special. So the overall time complexity of the pre-processing procedure is O(q 2 (Ḡ) + n). Now all possible combinations of the maximal matchings in cycles may be enumerated using a Grey code (see e.g. [9]) so that the next combination differs from the previous one by altering a maximal matching only in one of the cycles. Let the binary vector δ = (δ1 , . . . , δq(Ḡ) ) define assignments of the maximal matchings in cycles. Namely, δj = 0, if the matching w 0,j is chosen in the cycle j; otherwise (if the matching w 1,j is chosen in the cycle j), we have δj = 1. This way every vector δ is bijectively mapped into a feasible solution fδ to 2-TSPVR. In the process of enumeration, a step from the current vector δ̄ to the next vector δ changes the maximal matching in one of the cycles j. The new value of objective function ρ(fδ ) may be computed via the current value ρ(fδ̄ ) by the formula ρ(fδ ) = P P (δj ,δ ′ ) (δ̄j ,δ̄ ′ ) δ̄ δ ρ(fδ̄ ) − Pj j + Pj j − Pjj ′ j , where A(j) is the set of cycles contacting to Pjj ′ j + j ′ ∈A(j) j ′ ∈A(j) the cycle j. Obviously, |A(j)| ≤ q(Ḡ), so updating the objective function value for the next solution requires O(q(Ḡ)) time, and the  overall time complexity of the modified algorithm for q(Ḡ) solving 2-TSPVR is O q(Ḡ)2 +n . In view of Theorem 1 we conclude that using this modification of Algorithm 2 almost all feasible instances of 2-TSPVR are solvable in O(n0.77 ln n + n) = O(n) time. 5 LOCAL SEARCH A local search algorithm starts from an initial feasible solution. It moves iteratively from one solution to a better neighboring solution and terminates at a local optimum. The number of steps of the algorithm, the time complexity of one step, and the value of the local optimum depend essentially on the neighborhood. Note that neighborhoods, often used for the classical TSP (e.g. k-Opt, city-swap, Lin-Kernighan [10]), will contain many infeasible neighboring solutions if applied to 2-TSPVR because of the vertex requisition constraints. A local search method with a specific neighborhood for 2-TSPVR may be constructed using the relationship between the perfect matchings in the graph Ḡ and the feasible solutions. The main idea of the algorithm consists in building a neighborhood of a feasible solution to 2-TSPVR on the basis of a Flip neighborhood of the perfect matching, represented by the maximal matchings in cycles and the special edges. Let the binary vector δ = (δ1 , . . . , δq(Ḡ) ) denote the assignment of the maximal matchings to cycles as above. The set of 2q(Ḡ) vectors δ corresponds to the set of feasible solutions by a one-to-one mapping fδ . We assume that a solution fδ′ belongs to the Exchange neighborhood of solution fδ iff the vector δ ′ is within Hamming distance 1 from δ, i.e. δ ′ belongs to the Flip neighborhood of vector δ. Enumeration of the Exchange neighborhood takes O(q 2 (Ḡ)) time if the preprocessing described in Section 4 is carried out before the start of the local search (without the preprocessing it takes O(nq(Ḡ)) operations). Therefore, for almost all feasible instances I, the Exchange neighborhood may be enumerated in O(ln2 (n)) time. 6 MIXED INTEGER LINEAR PROGRAMMING MODEL The one-to-one mapping between the maximal matchings in cycles of the graph Ḡ and feasible solutions to 2-TSPVR may be also exploited in formulation of a mixed integer linear programming model. Recall that Pj0 (Pj1 ) is the sum of weights of all arcs of the graph G determined by the contacts inside the cycle j and the contacts of the cycle j with special edges, when the maximal (k,l) matching w 0,j (w 1,j ) is chosen in the cycle j, j = 1, . . . , q(Ḡ). Furthermore, Pjj ′ is the sum of weights of arcs in the graph G determined by the contacts between cycles j and j ′ , if the ′ maximal matchings w k,j and w l,j are chosen in the cycles j and j ′ respectively, k, l = 0, 1, j = 1, . . . , q(Ḡ) − 1, j ′ = j + 1, . . . , q(Ḡ). These values are computable in O(n + q 2 (Ḡ)) time as shown in Section 4. Let us introduce the following Boolean variables:  0, if matching w 0,j is chosen in the cycle j, dj = 1, if matching w 1,j is chosen in the cycle j, j = 1, . . . , q(Ḡ). The objective function combines the pre-computed arc weights for all cycles, depending on the choice of matchings in d = (d1 , . . . , dq(Ḡ) ): q(Ḡ)−1 q(Ḡ)  X  (0,0) (0,1) Pjj ′ (1 − dj )(1 − dj ′ ) + Pjj ′ (1 − dj )dj ′ X j=1 j ′ =j+1 q(Ḡ)−1 q(Ḡ) + X  X (1,0) Pjj ′ dj (1 − dj ′ ) + (1,1) Pjj ′ dj dj ′ j ′ =j+1 j=1  (1) q(Ḡ) + X j=1  Pj0 (1 − dj ) + Pj1 dj → min, dj ∈ {0, 1}, j = 1, . . . , q(Ḡ). (2) Let us define supplementary real variables in order to remove non-linearity of the objective (k) function: for k ∈ {0, 1} we assume that pj ≥ 0 is an upper bound on the sum of weights of arcs in the graph Ḡ determined by the contacts of the cycle j, if matching w k,j is chosen in this cycle, i.e. dj = k, j = 1, . . . , q(Ḡ) − 1. Then the mixed integer linear programming model has the following form: q(Ḡ)−1  X q(Ḡ) (0) pj + (1) pj j=1  + X j=1  Pj0 (1 − dj ) + Pj1 dj → min, q(Ḡ) q(Ḡ) (0) pj ≥ X j ′ =j+1 (0,0) Pjj ′ (1 − dj − dj ′ ) + X j ′ =j+1 (0,1) Pjj ′ (dj ′ − dj ) , (3) j = 1, . . . , q(Ḡ) − 1, q(Ḡ) q(Ḡ) (1) pj ≥ X (4) (1,0) Pjj ′ j ′ =j+1 (dj − d ) + j′ X (1,1) Pjj ′ (dj + dj ′ − 1) , j ′ =j+1 j = 1, . . . , q(Ḡ) − 1, (5) pj ≥ 0, k = 0, 1, j = 1, . . . , q(Ḡ) − 1, (6) dj ∈ {0, 1}, j = 1, . . . , q(Ḡ). (7) (k) Note that if matching w 0,j is chosen for the cycle j in an optimal solution of problem (3)(0) (1) (7), then inequality (4) holds for pj as equality and pj = 0. Analogously, if matching w 1,j (1) (0) is chosen for the cycle j, then inequality (5) holds for pj as equality and pj = 0. Therefore, problems (1)-(2) and (3)-(7) are equivalent because a feasible solution of one problem corresponds to a feasible solution of another problem, and an optimal solution corresponds to an optimal solution. The number of real variables in model (3)-(7) is (2q(Ḡ) − 2), the number of Boolean variables is q(Ḡ). The number of constraints is O(q(Ḡ)), where q(Ḡ) ≤ ⌊ n2 ⌋. The proposed model may be used for computing lower bound of objective function or in branch-and-bound algorithms, even if the graph Ḡ is not “good”. Note that there are a number of integer linear programming models in the literature on the classical TSP, involving O(n2 ) Boolean variables. Model (3)–(7) for 2-TSPVR has at most ⌊ n2 ⌋ Boolean variables and for almost all feasible instances the number of Boolean variables is O(ln(n)). 7 CONCLUSION We presented an algorithm for solving 2-TSP with Vertex Requisitions, that reduces the time complexity bound formulated in [3]. It is easy to see that the same approach is applicable to the problem 2-Hamiltonian Path of Minimum Weight with Vertex Requisitions, that asks for a Hamiltonian Path of Minimum Weight in the graph G, assuming the same system of vertex requisitions as in 2-TSP with Vertex Requisitions. Using the connection to perfect matchings in a supplementary bipartite graph and some preprocessing we constructed a MIP model with O(n) binary variables and a new efficiently searchable Exchange neighborhood for problem under consideration. Further research might address the existence of approximation algorithms with constant approximation ratio for 2-TSP with Vertex Requisitions. References [1] Garey, M.R., Johnson, D.S.: Computers and intractability. A guide to the theory of NPcompleteness. W.H. Freeman and Company, San Francisco, CA (1979) [2] Serdyukov, A.I.: Complexity of solving the travelling salesman problem with requisitions on graphs with small degree of vertices. Upravlaemye systemi. 26, 73–82 (1985) (In Russian) [3] Serdyukov, A.I.: On travelling salesman problem with prohibitions. Upravlaemye systemi. 17, 80–86 (1978) (In Russian) [4] Garey, M.R., Johnson, D.S.: Strong NP-completeness results: Motivation, examples, and implications. Journal of the ACM. 25, 499–508 (1978) [5] Serdyukov A.I.: On finding Hamilton cycle (circuit) problem with prohibitions. Upravlaemye systemi. 19, 57–64 (1979) (In Russian) [6] Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms, 2nd edition. MIT Press (2001) [7] Chvatal, V.: Probabilistic methods in graph theory. Annals of Operations Research. 1, 171–182 (1984) [8] Eremeev, A., Kovalenko, J.: Optimal recombination in genetic algorithms for combinatorial optimization problems: Part II. Yugoslav Journal of Operations Research. 24 (2), 165-186 (2014) [9] Reingold, E.M., Nievergelt, J., Deo, N.: Combinatorial algorithms: Theory and Practice. Englewood Cliffs, Prentice-Hall (1977) [10] Kochetov, Yu. A.: Computational bounds for local search in combinatorial optimization. Computational Mathematics and Mathematical Physics. 48 (5), 747-763 (2008) [11] Feller, W.: An Introduction to Probability Theory and Its Applications. Vol. 1. John Wiley & Sons, New York, NY (1968) [12] Riordan, J.: An Introduction to Combinatorial Analysis. John Wiley & Sons, New York, NY (1958) APPENDIX Note that A.I. Serdyukov in [3] used the term block instead of term cycle, employed in Section 3 of the present paper. A block was defined in [3] as a maximal (by inclusion) 2-connected subgraph of graph Ḡ with at least two edges. However, in each block of the graph Ḡ, the degree of every vertex equals 2 (otherwise F = Ø because the vertices of degree 1 do not belong to blocks and the vertex degrees are at most 2 in the right-hand part of Ḡ). So, the notions block and cycle are equivalent in the case of considered bipartite graph Ḡ. We use the term block in the proof of Theorem 1 below, as in the original paper [3], in order to avoid a confusion of cycles in Ḡ with cycles in permutations of the set {1, . . . , n}. Theorem 1 [3] |χ̄n |/|χn | −→ 1 as n → ∞. Proof. Let Sn be the set of all permutations of the set {1, . . . , n}. Consider a random permutation s from Sn . By ξ(s) denote the number of cycles in permutation s. It is known n P 1 and the (see e.g. [11]) that the expectation E[ξ(s)] of random variable ξ(s) is equal to i i=1 variance V ar[ξ(s)] equals n P i=1 i−1 . i2 Let S̄n denote the set of permutations from Sn , where the number of cycles is at most 1.1 ln(l). Then, using Chebychev’s inequality [11], we get |S̄n |/|Sn | −→ 1 as n → ∞. (8) Now let Sn′ denote the set of permutations from Sn , which do not contain the cycles of (i) length 1, and let Sn be the set of permutations from Sn , which contain a cycle with element i, i = 1, . . . , n. Using the principle of inclusion and exclusion [12], we obtain |Sn \ Sn′ | = [ Sn(i) 1≤i≤n X Sn(i) 1≤i6=j6=k≤n \ Sn(j) \ = n X Sn(i) − i=1 X 1≤i6=j≤n Sn(i) \ Sn(j) + Sn(k) − . . . = n! − Cn2 (n − 2)! + Cn3 (n − 3)! − . . . ≤ n! n! 2 2 + = n! = |Sn |. 2 6 3 3 Therefore, 1 |Sn′ | ≥ |Sn |. 3 (9) Combining (8) and (9), we get |S̄n′ |/|Sn′ | 3|Sn′ \S̄n′ | 3|Sn \S¯n | |Sn′ \S̄n′ | ≥ 1 − ≥ 1 − −→ 1, =1− |Sn′ | |Sn | |Sn | n→+∞ (10) where S̄n′ = Sn′ ∩ S¯n . The values |χ̄n | and |χn \χ̄n | may be bounded, using the following approach. We assign any permutation s ∈ Sl′ , l ≤ n, a set of bipartite graphs χn (s) ⊂ χn as follows. First of all let us assign an arbitrary set of n − l edges to be special. Then the non-special vertices {i1 , i2 , . . . , il } ⊂ Xn of the left-hand part, where ij < ij+1 , j = 1, . . . , l − 1, are now partitioned into ξ(s) blocks, where ξ(s) is the number of cycles in permutation s. Every cycle (t1 , t2 , . . . , tr ) in permutation s corresponds to some sequence of vertices with indices {it1 , it2 , . . . , itr } belonging to the block associated with this cycle. Finally, it is ensured that for each pair of vertices {itj , itj+1 }, j = 1, . . . , r − 1, as well as for the pair {itr , it1 }, there exists a vertex in the right-hand part X which is adjacent to both vertices of the pair. Except for special edges and blocks additional edges are allowed in graphs from class χn (s). These edges are adjacent to the special vertices of the left-hand part such that the degree of any vertex of the left-hand part is not greater than two. Moreover, additional edges should not lead to creating new blocks. There are n! ways to associate vertices of the left-hand part to vertices of the righthand part, therefore the number of different graphs from class χn (s), s ∈ Sl′ , l ≤ n, is |χn (s)| = Cnl 2ξn! h(n, l), where function h(n, l) depends only on n and l, and ξ1 (s) is the 1 (s) number of cycles of length two in permutation s. Division by 2ξ1 (s) is here due to the fact that for each block that corresponds to a cycle of length two in s, there are two equivalent ways to number the vertices in its right-hand part. Let s = c1 c2 . . . cξ(s) be a permutation from set Sl′ , represented by cycles ci , i = 1, . . . , ξ(s), and let cj be an arbitrary cycle of permutation s of length at least three, j = 1, . . . , ξ(s). Permutation s may be transformed into permutation s1 , s1 = c1 c2 . . . cj−1 c−1 j cj+1 . . . cξ(s), (11) by reversing the cycle cj . Clearly, permutation s1 induces the same subset of bipartite graphs in class χn as the permutation s does. Thus any two permutations s1 and s2 from set Sl′ , l ≤ n, induce the same subset of graphs in χn , if one of these permutations may be obtained from the other one by several transformations of the form (11). Otherwise the two induced subsets of graphs do not intersect. Besides that χn (s1 ) ∩ χn (s2 ) = ∅ if s1 ∈ Sl′1 , s2 ∈ Sl′2 , l1 6= l2 . On one hand, if s ∈ S̄l′ , l ≤ n, then χn (s) ⊆ χ̄n . On the other hand, if s ∈ S̃l′ := Sl′ \S̄l′ , l < n, then either χn (s) ⊆ χ̄n or, alternatively, χn (s) ⊆ χn \χ̄n may hold. Therefore, |χ̄n | ≥ n X X l=2 s∈S̄l′ ≥ n X |S̄l′ | · l=2 |χn \χ̄n | ≤ n! Cnl ξ1 (s) ξ(s)−ξ1 (s) h(n, l) 2 2 n! Cnl 1.1ln(l) h(n, l) 2 n X l=⌊1.1ln(n)⌋ Now assuming ψ(n) = X s∈S̃l′ max l=⌊1.1ln(n)⌋,...,n n X ≥ n! Cnl ξ(s) 2 = n X X Cnl l=2 s∈S̄l′ |S̄l′ | · Cnl l=⌊1.1ln(n)⌋ ≤ n X n! h(n, l) ≥ 2ξ(s) n! 21.1ln(l) |S̃l′ | · Cnl l=⌊1.1ln(n)⌋ (12) h(n, l), n! 21.1ln(l) h(n, l). (13) |S̃l′ |/|S̄l′ | and taking into account (12), (13) and (10), we obtain |χn \χ̄n | ≤ ψ(n) → 0 as n → +∞. |χ̄n | Finally, the statement of the theorem follows from (14). Q.E.D. (14)
8cs.DS
IEEE TRANSACTIONS ON AUTOMATIC CONTROL 1 Distributed area coverage control with imprecise robot localization: Simulation and experimental studies arXiv:1612.04704v1 [cs.SY] 14 Dec 2016 Sotiris Papatheodorou, Anthony Tzes Senior Member, IEEE, Konstantinos Giannousakis and Yiannis Stergiopoulos Abstract—This article examines the area coverage problem for a network of mobile robots with imprecise agents localization. Each robot has uniform radial sensing ability, governed by first order kinodynamics. The convex-space is partitioned based on the Guaranteed Voronoi (GV) principle and each robot’s area of responsibility corresponds to its GV-cell, bounded by hyperbolic arcs. The proposed control law is distributed, demanding the positioning information about its GV-Delaunay neighbors. Simulation and experimental studies are offered to highlight the efficiency of the proposed control law. Index Terms—Multi-agent systems, Multi-robot systems, Mobile robots, Cooperative systems, Autonomous agents. I. I NTRODUCTION REA coverage of a planar region by a swarm of robotic agents is an active field of research with great interest and potential. The task involves the dispersal inside a region of interest of autonomous, sensor–equipped robotic agents in order to achieve sensor coverage of that region. Distributed control algorithms are a popular choice for the task because of their computational efficiency compared to centralized controllers, their ability to adapt in real–time to changes in the robot swarm and their reliance only on local information. Thus they can be implemented on robots with low computational power and low power radio transceivers, since each agent is required to communicate only with its neighbors. The downside of distributed control schemes is that they lead to local optima of their objective function because of their lack of information on the state of all agents. Area coverage can be either static [1]–[3] in which case the agents converge to some static final configuration or sweep [4]–[6] in which the agents constantly move in order to satisfy a constantly changing coverage objective. Other factors that need to be taken into account are the type of the region surveyed [7], [8], the sensing pattern and performance of the sensors [9]–[12], or the particular dynamics of the agents [13]. There have been varied approaches to area coverage such as distributed optimization [14], [15], model predictive control [16], [17], game theory [18] and optimal control [19]. A All localization systems have an inherent uncertainty in their measurements, thus there has been significant work on taking this uncertainty into account either by data fusion [20], safe trajectory planning [21] or spatial probability [22]. Our approach creates a suitable space partioning scheme in lieu of the agents’ positioning uncertainty and a distributed gradient– based control law. This article examines the problem of persistent area coverage of a convex planar region by a network of homogeneous agents equipped with isotropic sensors. In order to take into account the localization uncertainty, each agent is assumed to lie somewhere inside a circular positioning uncertainty region and Guaranteed Voronoi partitioning [23] of the region of interest is constructed from these uncertain regions. Subsequently, a distributed control law is derived based on the aforementioned partitioning so that a coverage objective increases monotonously. Because of the complexity of that law, a suboptimal one is proposed and both laws are compared through simulations. Additionally, the suboptimal control law is evaluated by two experiments using differential drive robots. This article is an extension of [24] which did not contain simulation results from the optimal control law and lacked the experimental evaluation of the suboptimal control law. The layout of the article is as follows. The required mathematical preliminaries are presented in Section II. The Voronoi and the Guaranteed Voronoi space partitions are examined in Section III. Section IV contains the definition of the coverage objective and the derivation of the gradient ascent based control law that maximizes it. Additionally it contains the proposed suboptimal control law. Simulation studies are presented in Section V in order to compare and evaluate both control laws. Section VI contains experimental results from the implementation of the suboptimal control law and is followed by concluding remarks. II. M ATHEMATICAL P RELIMINARIES Let us assume a compact convex region Ω ∈ R2 under surveillance and a network of n identical dimensionless mobile agents (nodes). Each agent’s dynamics are governed by q̇i = ui , ui ∈ R2 , qi ∈ Ω, i ∈ In This work has received funding from the European Union’s Horizon 2020 Research and Innovation Programme under the Grant Agreement No.644128, AEROWORKS. The authors are with the Electrical & Computer Engineering Department, University of Patras, Rio, Achaia 26500, Greece. Corresponding author’s email: [email protected] (1) where ui is the control input for each agent and In = {1, 2, . . . , n}. The agents’ positions are not known precisely and thus in the general case each agent has a positioning uncertainty of IEEE TRANSACTIONS ON AUTOMATIC CONTROL 2 different measure. We assume that an upper bound riu for the positioning uncertainty of each agent is known and thus its center lies within a disk Ciu (qi , riu ) = {q ∈ Ω : k q − qi k≤ riu } , i ∈ In (2) where k · k is the Euclidean metric and qi the agent’s position as reported by its localization equipment. All agents are equipped with identical omnidirectional sensors with circular sensing footprints and as such the sensed region of each agent can be defined as When constructing the Voronoi cell of a point qi , only its Delaunay neighbors need to be considered, thus simplifying the definition of its Voronoi cell into  Vi = q ∈ Ω : kq − qi k ≤ q − q j , ∀ j ∈ Ni , i ∈ In . Using this property, a Voronoi diagram can be constructed by first finding the Delaunay triangulation of the input points and then for each cell Vi by finding the intersection of the halfplanes defined by point qi and all points in Ni . Cis (qi , rs ) = {q ∈ Ω : k q − qi k≤ rs } , i ∈ In where rs is the common range of the sensors. We also define for each agent a ‘Guaranteed Sensed Region’ (GSR) as the region that is sensed by the agent for all of its possible positions inside Ciu . The GSRs are defined as ( ) Cigs (Ciu ,Cis ) = \ Cis (qi , rs ), ∀qi ∈ Ciu , i ∈ In qi Ciu Cis and since and are disks, the previous expression can be further simplified into Cigs (qi , rs − riu ) = {q ∈ Ω :k q − qi k≤ rs − riu } , i ∈ In , Fig. 1. Voronoi diagram (left) for 6 dimensionless nodes, with its equivalent Guaranteed Voronoi diagram (right) in the case of disks (centered on those points). (3) provided that rs ≥ riu . When an agent’s position is known precisely, i.e. riu = 0, its GSR is equivalent to its sensed region, whereas when an agent’s positioning uncertainty is too large compared to its / sensing capabilities, i.e. riu > rs , then Cigs = 0. III. S PACE PARTITIONING Most distributed area coverage schemes assign an area of responsibility to each agent based on information from its neighboring agents. Then each agent is responsible for maximizing the coverage solely on its own responsibility region. The most common partitioning scheme is the Voronoi partitioning, described in Section III-A. However in this article, because of the localization uncertainty of the agents, the guaranteed Voronoi diagram described in Section III-B is used for the assignment of areas of responsibility. A. Voronoi Diagram The Voronoi diagram for a set of points Q = {q1 , q2 . . . qn }, qi ∈ Ω is defined as follows  Vi = q ∈ Ω : kq − qi k ≤ q − q j , ∀ j ∈ In , j 6= i , i ∈ In . Each Vi ⊂ Ω is called the Voronoi cell of node i. A Voronoi diagram of 6 points constrained in a subset Ω of R2 is shown in Figure 1 (left), where the cell boundaries are shown in blue. It is important to note that the Voronoi diagram is a complete S tessellation of Ω, that is i∈In Vi = Ω. Another useful property of Voronoi diagrams is their duality to Delaunay triangulations. Let us define the Delaunay neighbors of a point qi as  Ni = j ∈ In , j 6= i : Vi ∩V j 6= 0/ , i ∈ In , (4) B. Guaranteed Voronoi Diagram The Guaranteed Voronoi (GV) diagram is defined for a set of uncertain regions D = {D1 , D2 , . . . , Dn }, Di ⊂ Ω. Each uncertain region Di contains all the possible positions of a point qi ∈ R2 whose localization cannot be measured precisely. Thus the GV diagram is defined as Vig = {q ∈ Ω : max kq − qi k ≤ min q − q j ∀ j ∈ In , j 6= i, qi ∈ Di , q j ∈ D j , i ∈ In . (5) An equivalent definition of the GV diagram is as follows Vig = \ Hi j i∈In where  Hi j = q ∈ Ω : max kq − qi k ≤ min q − q j , ∀qi ∈ Di , ∀q j ∈ D j . This definition is analogous to the construction of the classic Voronoi cell by the halfplane intersection method described previously, with the difference that the regions being intersected are no longer halfplanes. As such, each cell Vig contains the points on the plane that are closer to the corresponding point qi of region Di for all possible configurations of the uncertain points. A Guaranteed Voronoi diagram of 6 regions constrained in a subset Ω of R2 is shown in Figure 1 (right), where similarly the cell boundaries are shown in blue. Remark 1. In contrast to the classic Voronoi diagram, the GuaranteedSVoronoi diagram does not constitute a tessellation of Ω,Ssince i∈In Vig ⊂ Ω. We define a neutral region O so that O ∪ i∈In Vig = Ω. Similarly to the Voronoi diagram, we can define the Guaranteed Delaunay neighbors Nig of a region Di so that in order IEEE TRANSACTIONS ON AUTOMATIC CONTROL 3 to construct Vig , only the regions in Nig need be considered. Thus the Guaranteed Delaunay neighbors are defined as  (6) Nig = j ∈ In , j 6= i : ∂ Hi j ∩ ∂Vig 6= 0/ . Having defined the Guaranteed Delaunay neighbors, the definition of the GV diagram can be simplified into Vig = [ Hi j . (7) (a) (b) (c) (d) i∈Ni It is important to note that when two or more uncertain regions overlap, none of them are assigned GV cells. In addition, if the uncertain regions degenerate into points, the GV diagram converges to the classic Voronoi diagram. C. Guaranteed Voronoi Diagram of Disks The GV diagram is examined in the case when the uncertain regions Di are disks Ciu as defined in Equation (2). In that case it has been shown that Hi j are regions on the plane bounded by hyperbolic branches. For any two nodes i and j, ∂ Hi j and ∂ H ji are the two branches of a hyperbola with foci at qi and q j and semi-major axis equal to the sum of the radii of Ciu and Cuj . The parametric equation of these hyperbola branches can be found in the Appendix. The dependence of the GV cells of two disks on the distance of their centers di j = d(qi , q j ) is as follows. When the disks Ciu ,Cuj , overlap both of the cells Vig ,V jg are empty as shown in Fig. 2 (a). If the disks represent the possible positions of the agents, this is an undesirable configuration as it can lead to collisions. When the disks Ciu ,Cuj are outside tangent (i.e., d(qi , q j ) = riu + ruj ), the resulting cells are rays starting from the centers of the disks qi , q j and extending along the direction of qi q j as seen in Fig 2 (b). When the disks are disjoint, the GV cells are bounded by the two branches of a hyperbola. As di j increases further, the eccentricity of the hyperbola increases and the distance of the disk centers from the hyperbola vertices (the points of the hyperbola closest to its center) increases as seen in Fig 2 (c), (d). The distance between the hyperbola’s vertices remains constant at ri + r j as di j increases. The GV cells of two disks also depend on the sum of their radii ri + r j as seen in Figure 3. As ri + r j decreases, the eccentricity of the hyperbola increases and the result on the cells is the same as if the distance of the disks’ centers increased, as explained previously. When ri + r j = 0, the GV cells are the classic Voronoi cells. It has been also shown that the Guaranteed Delaunay neighbors Nig are a subset of the classic Delaunay neighbors of the uncertain disks’ centers. The two sets Ni and Nig are equal when the GV diagram is constructed for the whole plane, however when the GV diagram is constrained within a subset Ω of the plane, Nig can be a subset of Ni . Such a case is shown in Figure 1 where nodes 1 and 5 are Delaunay neighbors but not Guaranteed Delaunay neighbors. This way, the GV diagram of disks can be constructed in a manner similar to the classic Voronoi diagram. First the Delaunay triangulation of the disks’ centers is constructed and then each cell Vig is constructed by intersecting the regions bound by hyperbolic arcs Hi j ∀ j ∈ Nig . This process is shown in Figure 4. Fig. 2. Dependence of the GV cells on qi − q j . Fig. 3. Dependence of the GV cells on ri + r j . It is useful to define Guaranteed-Sensing Voronoi (GSV) cells as Vigs = Vig ∩Cigs , i ∈ In , (8) which are the parts of the GV cells that are guaranteed to be sensed by their respective nodes. It can be shown that since GV cells are disjoint, GSV cells are also disjoint regions. IV. P ROBLEM S TATEMENT - D ISTRIBUTED C ONTROL L AW By taking into account the GV partitioning of the space, the following area coverage criterion is constructed H = Z Z S φ (q) dq = gs i∈In Vi ∑ gs i∈In Vi φ (q) dq = ∑ Hi , (9) i∈In Fig. 4. The construction of a GV cell by the hyperbolic region intersection method. IEEE TRANSACTIONS ON AUTOMATIC CONTROL 4 where the function φ : R2 → R+ is related to the a priori knowledge of importance of a point q ∈ Ω indicating the probability of an event to take place at q in a coverage scenario. This criterion expresses the area that is guaranteed to be closest to and covered by the nodes. A distributed control law is designed in order to maximize the coverage criterion (9) while taking into account the nodes’ guaranteed sensing pattern (3) and the GV partitioning (7). It is shown that this control law leads to a monotonic increase of the coverage criterion. The boundary ∂ Ṽigs can be decomposed in disjoint sets as    ∂Vigs = ∂Vigs ∩ ∂ Ω ∪ ∂Vigs ∩ ∂Cigs ∪ ∂Vigs ∩ ∂ O . (14) These sets represent the parts of ∂Vigs that lie on the boundary of Ω, the boundary of the node’s guaranteed sensing region, and the boundary of the unassigned neutral region of Ω, respectively. This decomposition is shown in Figure 5 with ∂Vigs ∩ ∂ Ω in green, ∂Vigs ∩ ∂Cigs in solid red and ∂Vigs ∩ ∂ O in solid blue. Theorem 1. For a network of mobile nodes with uncertain localization as in (2), uniform range–limited radial sensing performance as in (3), governed by the individual agent’s kinodynamics described in (1), and the GV–partitioning of Ω defined in (7), the coordination scheme Z ui = αi "Z αi ∑g j∈Ni gs gs gs ∂Vi ∩∂Ci ∂Vi ∩∂ Hi j υii ni φ ni φ dq + # Z dq + gs ∂V j ∩∂ H ji υ ij n j φ dq (10) where ni is the outward unit normal on ∂Vigs and αi a positive constant, maximizes the performance criterion (9) along the nodes’ trajectories in a monotonic manner, leading in a locally area–optimal configuration of the network. Fig. 5. The decomposition of ∂Vigs into disjoint sets (solid red, green and blue). Proof. In order to guarantee monotonous increase of the coverage criterion (9), we evaluate its time derivative Hence ∂ Hi ∂ Hi ∂H =∑ q̇i = ∑ ui ∂t ∂ q i i∈In i∈In ∂ qi ∂H ∂ qi (11) Z gs Vi ∂ ∑g ∂ qi j∈Ni Z gs φ dq. Vj Considering the second summation term, infinitesimal motion of qi may only affect ∂V jgs at ∂V jgs ∩ ∂ O, where O is the neutral region defined in Remark 1, since both hyperbola branches are affected by alteration of one of the foci. In addition, only the Guaranteed Delaunay neighbors (6) of i are considered in the summation, as a major property of GV– partitioning. Therefore, the former expression can be written via the generalized Leibniz integral rule [25] (by converting surface integrals to line ones) as ∂H = ∂ qi Z υ i n φ dq + gs i i ∂Vi Z ∑g j∈Ni gs ∂Vi ∩∂ O (12) monotonous increase of H is achieved. We now evaluate the partial derivative of H with respect to qi as φ dq + gs gs ∂Vi ∩∂ Ω Z ∂ Hi ui = , i ∈ In , ∂ qi Z can be written as = By using the gradient–based control law ∂ ∂H = ∂ qi ∂ qi ∂H ∂ qi ∂V j ∩∂ O υ ij n j φ dq, where υii , υ ij stand for the transpose Jacobian matrices with respect to qi of the points q ∈ ∂Vigs , q ∈ ∂V jgs , respectively, i.e. T 4 ∂q , q ∈ ∂V jgs , i, j ∈ In . (13) υ ij (q) = ∂ qi υii ni φ dq + υii ni φ dq + Z gs gs ∂Vi ∩∂Ci Z ∑g j∈Ni gs ∂V j ∩∂ O υii ni φ dq + υ ij n j φ dq. (15) It is apparent that υii = 0 at q ∈ ∂Vigs ∩ Ω since all q ∈ ∂ Ω remain unaltered by infinitesimal motions of qi , assuming no alteration of the environment. Considering the second integral, for any point q ∈ ∂ Ṽigs ∩ ∂Cigs it holds that υii (q) = I2 , where I stands for the identity matrix, since they translate along the direction of motion of qi at the same rate. As far as the sets ∂Vigs ∩ ∂ O and ∂V jgs ∩ ∂ O, j ∈ Nig are concerned, they can be merged in pairs via utilization of the left and right hyperbolic branches, as introduced in GV–partitioning (7), as follows Z gs ∂Vi ∩∂ O υii ni φ "Z ∑g j∈Ni gs ∂Vi ∩∂ Hi j Z dq + ∑g gs ∂V j ∩∂ O j∈Ni υii ni φ # Z dq + υ ij n j φ dq = gs ∂V j ∩∂ H ji υ ij n j φ dq . (16) However, for any two Delaunay neighbors i, j it can be observed that • The hyperbolic branches ∂ Hi j and ∂ H ji are symmetric with respect to the perpendicular bisector of qi , q j , and are governed by the same set of parametric equations (left and right branch). • The vectors n j are mirrored images of the corresponding ni with respect to the perpendicular bisector of qi , q j . IEEE TRANSACTIONS ON AUTOMATIC CONTROL ∂H ∂ qi Taking into account the above, ∂H ∂ qi "Z ∑g j∈Ni 5 can be written as A. Constraining Nodes Inside Ω Z = gs gs gs ∂Vi ∩∂Ci ∂Vi ∩∂ Hi j υii ni φ ni φ dq + # Z dq + gs ∂V j ∩∂ H ji υ ij n j φ dq . (17) The unit normal vectors ni , n j and Jacobian matrices υii , υ ij in the second part of (17) can be evaluated via utilization of the parametric representations of the sets over which the integration takes place. These sets are parts of the left (∂ Hi j ) and right (∂ H ji ) branch of the hyperbola that assigns the space among two arbitrary nodes i, j. The second term of the sum S in (17) requires knowledge of all the nodes in j∈N g N gj ⊆ In i and so the control law is distributed. The decomposition of the set ∂Vigs ∩ ∂ O of node i into mutually disjoint hyperbolic arcs ∂Vigs ∩ ∂ Hi j and ∂Vigs ∩ ∂ Hik is shown in Figure 6. Figure 6 also shows the other domains of integration used in (17) ∂Vigs ∩ ∂Cigs , ∂V jgs ∩ ∂ H ji and ∂Vkgs ∩ ∂ Hki . When using this control law, it is possible that a portion of some node’s positioning uncertainty region lies outside the region Ω, i.e. that Ciu ∩ Ω 6= Ciu for some node i. As a result, it would be possible for that node to be outside the region Ω given that it may be anywhere within Ciu . In order to prevent this situation, instead of Ω, a subset Ωsi ⊆ Ω will be used, in the general case different for each node since their uncertainty radii are allowed to differ. This subset is calculated as the Minkowski difference of Ω with the disk C (riu ) = {q ∈ Ω : k q k≤ riu }. Ωsi = {q ∈ Ω | q +C(riu ) ⊆ Ω} , i ∈ In . Thus by constraining the center of each uncertainty disk qi inside Ωsi , it is guaranteed that no part of the uncertainty disk will ever be outside Ω. This is achieved by projecting the velocity control input ui on ∂ Ωsi . This is only needed if qi ∈ ∂ Ωsi and the contorl input ui points towards the outside of Ωsi . As a result, the control law becomes ( proj∂ Ωs ui ifqi ∈ ∂ Ωsi ∧ qi + ε ui ∈ / Ωsi i ũi = (18) ui otherwise where ε is an infinitesimally small positive constant. B. Suboptimal Control Law Because of the high complexity of the integrals over Hi j and H ji of the control law (10), the large amount of information required in order to implement it, as described in Remark 2, as well as the problems described in Section IV-A, a simplified version of the control law is proposed. Fig. 6. The domains of integration of the control law (10). The proposed law (10) leads to a gradient flow of H along the nodes trajectories, while H increases monotonically, since dH ∂H =∑ · q̇i = ∑ kui k2 ≥ 0. dt i∈In ∂ qi i∈In Conjecture 1. The computationally efficient suboptimal control law Z ui = αi n φ dq (19) gs gs i ∂Vi ∩∂Ci leads the nodes to suboptimal trajectories. The control law enhancement described in Section IV-A is used in conjunction with this simplified control law. V. S IMULATION S TUDIES Remark 2. It is not immediately clear from the control law (10) the information node i requires in order to implement it. The integrals over ∂Vigs ∩ ∂Cigs and ∂Vigs ∩ ∂ Hi j require knowledge of the Guaranteed Delaunay neighbors Nig in order to compute Vigs and Hi j . However the integral over ∂V jgs ∩ ∂ H ji requires knowledge of the whole cell V jgs of node i and as such requires informations form the Guaranteed Delaunay neighbors N gj of node j. Thus node i requires information from all nodes in [ g Ñig = Nj , Simulations have been conducted in order to evaluate the efficiency of the control law as well as compare the complete (10) with the simplified (19) law. All nodes have common positioning uncertainty regions Ci , ∀qi ∈ Ω as well as sensing performance Cigs . The a priori importance of points inside the region was φ (q) = 1, ∀q ∈ Ω. In this case, the maximum possible value for H is  H max = ∑ A Cigs , i∈In g j∈Ni which are the Guaranteed Delaunay neighbors of all the Guaranteed Delaunay neighbors of node i. where A (·) is the area function, given that n guaranteed sensing disks can be packed inside Ω. In all simulations, the control law extension as described in Section IV-A is used. IEEE TRANSACTIONS ON AUTOMATIC CONTROL 6 A. Case Study I In this case study the convergence speed between the optimal and suboptimal laws is examined. A network of three nodes in a large region is simulated. Figure 7 shows the initial and final states of the network, with the uncertainty disks shown in black, the guaranteed sensing disks in red and the GV cells in blue. In Figure 8 the trajectories of the nodes when using the optimal control law are shown in red and when using the suboptimal control law in blue, while the initial positions are represented by circles and the final by squares. It is observed that the final configurations in both cases are very similar since the average distance between nodes’ final states is 0.57% of the region’s diameter. This is due to the low number of nodes in the network and is a result that can not be generalized, as seen in the following case study. Figure 9 shows the evolution of the coverage objective H with time, again shown in red for the optimal control law and in blue for the suboptimal. As it is expected, the optimal law converges faster than the suboptimal. The final value of the objective function is the same for both control laws in this case since the network reaches a globally optimal state in both cases. Fig. 8. The trajectories of the nodes using the optimal (red) and suboptimal (blue) control laws. (a) Fig. 9. The coverage objective H using the optimal (red) and suboptimal (blue) control laws. (b) (c) Fig. 7. Case Study I: (a) Initial state, (b) Final state using the optimal control law, (c) Final state using the suboptimal control law. B. Case Study II In this case study network of ten nodes is examined. Figure 10 shows the initial and final states of the network, with the uncertainty disks shown in black, the guaranteed sensing disks in red and the GV cells in blue. In Figure 11 the trajectories of the nodes when using the optimal control law are shown in red and when using the suboptimal control law in blue, while the initial positions are represented by circles and the final by squares. It is observed that the final configurations in both cases seem very similar at first glance, however the average distance between nodes’ final states is 10.12% of the region’s diameter. Careful examination of the trajectories shows that not all nodes starting from the same initial position converge to the same final position, explaining the large average distance. . Figure 12 shows the evolution of the coverage objective H with time, again shown in red for the optimal control law and in blue for the suboptimal. As it is expected, the optimal law converges faster than the suboptimal. The final value of the objective function is the same for both control laws in this case because of the similarity of their final configurations. However, since both control laws converge to local maxima, there are no guarantees that one or the other will always achieve better performance. This case study highlights the need for the control enhancement in Section IV-A, especially in the case of the optimal control law. It can be seen in Figure 11 that a node moving under the optimal law (red trajectory) was stopped from moving outside the region on the lower left corner. VI. E XPERIMENTAL S TUDIES In order to evaluate the simplified control law (19), two experiments were planned and conducted. The experiments IEEE TRANSACTIONS ON AUTOMATIC CONTROL 7 (a) Fig. 12. The coverage objective H using the optimal (red) and suboptimal (blue) control laws. (b) (c) Fig. 10. Case Study I: (a) Initial state, (b) Final state using the optimal control law, (c) Final state using the suboptimal control law. pose estimation server. ArUco [26] is a minimal library for Augmented Reality applications and provides pose estimation of some predefined sets of fiducial markers. Hende, by attaching a fiducial marker on top of each robot, the ArUco library provides an estimation of each robot’s pose. In order to estimate the positioning uncertainty of the experimental setup, a fiducial marker was placed on the centroid and on each of the vertices of the region Ω. A 3D triangular mesh was created from these measurements as shown in Figure 13. The maximum uncertainty value from that mesh rumax = 0.032 m was used for the experiments. Fig. 11. The trajectories of the nodes using the optimal (red) and suboptimal (blue) control laws. consist of 3 robots, an external pose tracking system and a computer, communicating with the robots and the pose tracking system via a WiFi router. The robots used are the differential-drive AmigoBots by ActiveMedia Robotics, which provide a high level command set, such as setting their translational and rotational velocities directly. These robots are also equipped with encoders, used for self-estimating their pose, but due to the drifting error, an external tracking system was implemented. Although the external pose estimation system is used for the control law implementation, its performance is compared with that of the encoders. Since the robots are not equipped with actual sensors, circular sensing patters with a radius rs = 0.3 m were assumed in the control law implementation. The pose estimation system consists of a camera and an ODROID-XU4 octa core computer, running an ArUco based Fig. 13. Triangular mesh from positioning uncertainty measurements. The control law was implemented algorithmically as a loop with a period Ts = 0.1 sec. After the end of each iteration the computer sends velocity commands to the robots. At first, the robots’ current positions are used to create the Guaranteed Voronoi diagram of the uncertain disks and calculate the control inputs according to the simplified control law (19). Subsequently, a target point qti ∈ R2 is created for each robot based on its current position qi and its control input ũi . Once IEEE TRANSACTIONS ON AUTOMATIC CONTROL 8 the target point for each robot has been found, and given each robot’s position qi and orientation θi , the translational vi and rotational ωi velocity control inputs are sent to each robot.  t  kqi − qi k vi = min , vmax cos(dθi ) Ts   |dθi | ω = min , ωmax sin(dθi ) Ts where dθi = ∠(qti − qi ) − θi and vmax , ωmax are constraints on the maximum translational and rotational velocity respectively of the Amigobot robots. Once all robots are within a predefined distance dt = 0.02 m of their respective target points, the Guaranteed Voronoi diagram and the control law are calculated again and new target points are produced. The region shown in all figures regarding the experiments is Ωs ⊆ Ω i.e. the region inside which the centers of the uncertain disks are constrained, as explained in Section IV-A. Both experiments are evaluated against simulations with the same initial robot positions, positioning uncertainty and sensing performance. A. Experiment I The initial and final positions of the robots for both the experiment and the simulation are shown in Figures 14 and 15 respectively with the uncertainty disks shown in black, the guaranteed sensing disks in red and the GV cells in blue. Additionally, photos of the experiment initial and final configurations can be seen on Figure 16. It can be seen that in the final configuration all guaranteed sensing disks are contained within their respective GV cells in both the experiment and the simulation, thus leading the network to a globally optimal configuration. By comparing the final configurations, as well as the robot trajectories for the experiment and simulation shown in Figure 17, it can be seen that they differ significantly. The mean distance between the nodes final positions in the experiment and simulation is 8.68% of the diameter of Ωs . Because in this current case there are multiple globally optimal configurations the network can possibly reach and since the implemented control law differs from the theoretical one, it is natural that the final configurations between the experiment and the simulation differ. Nevertheless, a globally optimal configuration was reached in both cases. The coverage objective H did not increase monotonously due to the implemented control law. It did increase however from 83.7% to 99.9% of its maximum possible value. The positioning data from the ArUco library and the robot encoders are compared in Figure 19 [Left]. As it is expected, the further a robot moves and the more it rotates, the larger the positioning error of the encoders grows. The mean error between the ArUco and encoder final robot positions is 4.04% of the diameter of Ωs . Figure 19 [Right] shows the trajectories of the target points used in the control law implementation. Fig. 14. Experiment I: Initial configuration. Fig. 15. Experiment I: Experiment [Left] and simulation [Right] final configuration. Ciu . The guaranteed sensing disks however were calculated using only the actual uncertainty and not the one increased by the robot radius. This was done to guarantee that the robots would remain inside the region Ω. The initial and final positions of the robots for both the experiment and the simulation are shown in Figures 20 and 21 respectively with the uncertainty disks shown in black, the guaranteed sensing disks in red and the GV cells in blue. Additionally, photos of the experiment initial and final configurations can be seen on Figure 22. It can be seen that in the final configuration all guaranteed sensing disks are almost completely contained within their respective GV cells in both the experiment and the Fig. 16. Experiment I: Photos from the initial [Left] and final [Right] robot positions in the experiment. B. Experiment II In this experiment, half the diameter of the robots was added to their positioning uncertainty, so that each robot was completely contained within its positioning uncertainty disk Fig. 17. Experiment I: Comparison of experiment (red) and simulation (green) robot trajectories. Initial positions marked with circles and final positions with squares. IEEE TRANSACTIONS ON AUTOMATIC CONTROL 9 Fig. 20. Experiment II: Initial configuration. Fig. 18. Experiment I: Coverage objective H as a function of time. Fig. 21. Experiment II: Experiment [Left] and simulation [Right] final configuration. Fig. 19. Experiment I: [Left] ArUco (green) and encoder (red) reported trajectories. [Right] Target point trajectories. Initial positions marked with circles and final positions with squares. simulation. By comparing the final configurations, as well as the robot trajectories for the experiment and simulation shown in Figure 23, it can be seen that they do not differ significantly. The mean distance between the nodes final positions in the experiment and simulation is 1.54% of the diameter of Ωs . Because of the increased positioning uncertainty in this case, which results in smaller GV cells, the number of local maxima of the objective function is significantly smaller than in the previous experiment. Thus it is quite possible that, despite their differences, the theoretical and implemented control laws converge to the same final configuration. The coverage objective H did not increase monotonously due to the implemented control law. It did increase however from 38.8% to 98.3% of its maximum possible value. The positioning data from the ArUco library and the robot encoders are compared in Figure 25 [Left]. As it is expected, the further a robot moves and the more it rotates, the larger the positioning error of the encoders grows. The mean error between the ArUco and encoder final robot positions is 1.54% of the diameter of Ωs . Figure 25 [Right] shows the trajectories of the target points used in the control law implementation. A video of the simulations and the experiments can be found on http://anemos.ece.upatras.gr/images/stories/videos/ PTGS IEEETAC.mp4 VII. C ONCLUSION This article examines the area coverage problem by a homogeneous team of mobile agents with imprecise localization. A gradient ascent based control law was designed based on a Guaranteed Voronoi partition of the region. Because of the complexity of the resulting control law, a simpler suboptimal control law is proposed and the performance of both is compared in simulation studies. Additionally, two experiments were conducted to highlight the efficiency of the suboptimal control law. A PPENDIX We assume n disks Di , i ∈ In with centers qi = [xi , yi ]T ∈ R2 and radii riu , i ∈ In . Fig. 22. Experiment II: Photos from the initial [Left] and final [Right] robot positions in the experiment. Fig. 23. Experiment II: Comparison of experiment (red) and simulation (green) robot trajectories. Initial positions marked with circles and final positions with squares. IEEE TRANSACTIONS ON AUTOMATIC CONTROL 10 Fig. 24. Experiment II: Coverage objective H as a function of time. Fig. 26. A hyperbola with its parameters 2a and 2c shown. B. Hyperbola Parametric Equation Assuming the foci of the hyperbola are qi = [−c 0]T and q j = [c 0]T , its parametric equation is   ±a cosh(t) γ(t) = , t ∈R b sinh(t) Fig. 25. Experiment II: [Left] ArUco (green) and encoder (red) reported trajectories. [Right] Target point trajectories. Initial positions marked with circles and final positions with squares. A. Hyperbola Definition and Properties We will use the GV diagram definition given in (5) for two disks Di and D j and shown that the boundaries of their GV cells are hyperbola branches. Let us find the boundary of the cell of node i, Vig = Hi j , since we examine only two nodes. We have that  ∂ Hi j = q ∈ Ω : max kq − bi k = min q − b j , ∀bi ∈ Di , ∀b j ∈ D j , however since Di and D j are disks, the maximum and minimum distances can be calculated and thus  ∂ Hi j = q ∈ Ω : kq − qi k + riu = q − q j − riu , where qi and q j are the centers of Di and D j respectively. The equation  ∂ Hi j = q ∈ Ω : q − q j − kq − qi k = ri + r j , defines one branch of a hyperbola since it is the locus of points whose difference of distances from two foci qi and q j is equal to a positive constant ri +r j . The other branch of the hyperbola is  ∂ H ji = q ∈ Ω : kq − qi k − q − q j = ri + r j , and corresponds to the boundary of V jg . In a hyperbola, the positive constant is called the major axis and is usually denoted as 2a whereas the distance between its foci is denoted as 2c. A third parameter, the minor axis denoted as 2b is then defined by the equation a2 + b2 = c2 . As such in this case we have that 2a = ri + r j and 2c =k qi − q j k. Additionally, the closest points on the two branches are called the vertices of the hyperbola and their distance is 2a. where a, b and c are those defined in Appendix A and the +(−) sign corresponds to the West (East) branch of the hyperbola which is H ji (Hi j ). By rotating the hyperbola foci around the origin by an angle θ , the parametric equation becomes    cos(θ ) − sin(θ ) ±a cosh(t) γ(t) = , t ∈R sin(θ ) cos(θ ) b sinh(t) Finally, given two foci qi = [xi yi ]T and q j = [x j y j ]T anywhere on the plane, the general hyperbola parametric equation is    " xi +x j # cos(θ ) − sin(θ ) ±a cosh(t) 2 , t ∈R γ(t) = + yi +y j sin(θ ) cos(θ ) b sinh(t) 2 (20) y −y where θ = arctan( x jj −xii ). C. Outward Unit Normal Vectors For any curve γ(t) the normal vector is defined as   γ̇ γ̇ n̂(t) = γ̈ − γ̈ · . k γ̇ k k γ̇ k The magnitude of this vector is the curvature at that particular point on the curve and it points towards the center of curvature. Since the hyperbolic branches define convex regions on the plane, the outward unit normal vector is given by n(t) = − n̂ . k n̂ k (21) However, since the resulting expressions are too large to show here, an indicative plot of the outward unit normal vectors of one branch of a hyperbola is shown in Figure 27. IEEE TRANSACTIONS ON AUTOMATIC CONTROL 11 R EFERENCES Fig. 27. The outward unit normal vectors of one branch of the hyperbola are shown in black. D. Jacobian Matrix T i The Jacobian  matrix υ j shows the change in the curve γ jx (t) γ j (t) = caused by the movement of node i, thus its γ jy (t) transpose is " ∂γ # ∂γ υ ij = jx jx ∂ xi ∂ γ jy ∂ xi ∂ yi ∂ γ jy ∂ yi (22) The expressions for the Jacobian matrix elements are too large to show here and as such some indicative plots of them with respect to the parameter t are shown in Figure 28. (a) (b) (c) (d) Fig. 28. The Jacobian matrix t. (a) ∂ γ jx ∂ xi , (b) ∂ γ jx ∂ yi , (c) ∂ γ jy ∂ xi , υii (d) (blue) and ∂ γ jy ∂ yi . υ ij (red) elements as functions of [1] H. Mahboubi and A. G. Aghdam, “Distributed deployment algorithms for coverage improvement in a network of wireless mobile sensors: Relocation by virtual force,” IEEE Transactions on Control of Network Systems, vol. 61, no. 99, p. 1, 2016. [2] C. F. van Eeden, G. Lee, S. Katsuno, and H. Yonekura, “Minimised moving distance algorithm for geometric deployment of robot swarms,” in Proc. 55th Annual Conf. of the Society of Instrument and Control Engineers of Japan (SICE), Sep. 2016, pp. 1195–1200. [3] A. Simonetto, T. Keviczky, and D. V. Dimarogonas, “Distributed solution for a maximum variance unfolding problem with sensor and robotic network applications,” in Proc. and Computing (Allerton) 2012 50th Annual Allerton Conf. Communication, Control, Oct. 2012, pp. 63–70. [4] C. Song, L. Liu, G. Feng, Y. Wang, and Q. Gao, “Persistent awareness coverage control for mobile sensor networks,” Automatica, vol. 49, no. 6, pp. 1867–1873, 2013. [5] C. Franco, D. M. Stipanović, G. López-Nicolás, C. Sagüés, and S. Llorente, “Persistent coverage control for a team of agents with collision avoidance,” European Journal of Control, vol. 22, pp. 30–45, 2015. [6] C. Zhai and Y. Hong, “Decentralized sweep coverage algorithm for multi-agent systems with workload uncertainties,” Automatica, vol. 49, no. 7, pp. 2154–2159, 2013. [7] Y. Stergiopoulos, M. Thanou, and A. Tzes, “Distributed collaborative coverage-control schemes for non-convex domains,” IEEE Transactions on Automatic Control, vol. 60, no. 9, pp. 2422–2427, 2015. [8] R. J. Alitappeh, K. Jeddisaravi, and F. G. Guimarães, “Multi-objective multi-robot deployment in a dynamic environment,” Soft Computing, pp. 1–17, 2016. [9] Y. Stergiopoulos and A. Tzes, “Convex Voronoi-inspired space partitioning for heterogeneous networks: A coverage-oriented approach,” IET Control Theory and Applications, vol. 4, no. 12, pp. 2802–2812, 2010. [10] O. Arslan and D. E. Koditschek, “Voronoi-based coverage control of heterogeneous disk-shaped robots,” in 2016 IEEE International Conference on Robotics and Automation (ICRA). IEEE, 2016, pp. 4259–4266. [11] L. Pimenta, V. Kumar, R. Mesquita, and G. Pereira, “Sensing and coverage for a network of heterogeneous robots,” in Proc. of the 47th Conference on Decision and Control, Cancun, Mexico, 2008, pp. 3947– 3952. [12] Y. Stergiopoulos and A. Tzes, “Cooperative positioning/orientation control of mobile heterogeneous anisotropic sensor networks for area coverage,” in Proc. IEEE International Conference on Robotics & Automation, Hong Kong, China, 2014, pp. 1106–1111. [13] J. M. Luna, R. Fierro, C. Abdallah, and J. Wood, “An adaptive coverage control algorithm for deployment of nonholonomic mobile sensors,” in Proc. 49th IEEE Conf. Decision and Control (CDC), Dec. 2010, pp. 1250–1256. [14] J. Cortés and F. Bullo, “Coordination and geometric optimization via distributed dynamical systems,” SIAM Journal on Control and Optimization, vol. 44, no. 5, pp. 1543–1574, 2005. [15] J. Cortés, S. Martinez, and F. Bullo, “Spatially-distributed coverage optimization and control with limited-range interactions,” ESAIM: Control, Optimisation and Calculus of Variations, vol. 11, no. 4, pp. 691–719, 2005. [16] M. T. Nguyen and C. S. Maniu, “Voronoi based decentralized coverage problem: From optimal control to model predictive control,” in Proc. 24th Mediterranean Conf. Control and Automation (MED), Jun. 2016, pp. 1307–1312. [17] F. Mohseni, A. Doustmohammadi, and M. B. Menhaj, “Distributed receding horizon coverage control for multiple mobile robots,” IEEE Systems Journal, vol. 10, no. 1, pp. 198–207, Mar. 2016. [18] V. Ramaswamy and J. R. Marden, “A sensor coverage game with improved efficiency guarantees,” in Proc. American Control Conf. (ACC), Jul. 2016, pp. 6399–6404. [19] M. T. Nguyen, L. Rodrigues, C. S. Maniu, and S. Olaru, “Discretized optimal control approach for dynamic multi-agent decentralized coverage,” in Proc. IEEE Int. Symp. Intelligent Control (ISIC), Sep. 2016, pp. 1–6. [20] J. A. Hage, M. E. E. Najjar, and D. Pomorski, “Fault tolerant collaborative localization for multi-robot system,” in Proc. 24th Mediterranean Conf. Control and Automation (MED), Jun. 2016, pp. 907–913. [21] B. Davis, I. Karamouzas, and S. J. Guy, “C-opt: Coverage-aware trajectory optimization under uncertainty,” IEEE Robotics and Automation Letters, vol. 1, no. 2, pp. 1020–1027, Jul. 2016. IEEE TRANSACTIONS ON AUTOMATIC CONTROL [22] J. Habibi, H. Mahboubi, and A. G. Aghdam, “Distributed coverage control of mobile sensor networks subject to measurement error,” IEEE Transactions on Automatic Control, vol. 61, no. 11, pp. 3330–3343, Nov. 2016. [23] W. Evans and J. Sember, “Guaranteed Voronoi diagrams of uncertain sites,” in 20th Canadian Conference on Computational Geometry, 2008, pp. 207–210. [24] S. Papatheodorou, Y. Stergiopoulos, and A. Tzes, “Distributed area coverage control with imprecise robot localization,” in Proc. 24th Mediterranean Conf. Control and Automation (MED), Jun. 2016, pp. 214–219. [25] H. Flanders, “Differentiation under the integral sign,” American Mathematical Monthly, vol. 80, no. 6, pp. 615–627, 1973. [26] S. Garrido-Jurado, R. M. noz Salinas, F. Madrid-Cuevas, and M. Marı́nJiménez, “Automatic generation and detection of highly reliable fiducial markers under occlusion,” Pattern Recognition, vol. 47, no. 6, pp. 2280 – 2292, 2014. 12
3cs.SY
1 Subspace Identification of Large-Scale 1D Homogeneous Networks arXiv:1702.03539v1 [cs.SY] 12 Feb 2017 Chengpu Yu, Michel Verhaegen, and Anders Hansson Abstract—This paper considers the identification of large-scale 1D networks consisting of identical LTI dynamical systems. A new subspace identification method is developed that only uses local input-output information and does not rely on knowledge about the local state interaction. The identification of the local system matrices (up to a similarity transformation) is done via a low dimensional subspace retrieval step that enables the estimation of the Markov parameters of a locally lifted system. Using the estimated Markov parameters, the state-space realization of a single subsystem in the network is determined. The low dimensional subspace retrieval step exploits various key structural properties that are present in the data equation such as a low rank property and a two-layer Toeplitz structure in the data matrices constructed from products of the system matrices. For the estimation of the system matrices of a single subsystem, it is formulated as a structured low-rank matrix factorization problem. The effectiveness of the proposed identification method is demonstrated by a simulation example. Index Terms—Large-scale 1D distributed systems, nuclearnorm optimization, two-layer Toeplitz structure. I. I NTRODUCTION In recent years, the fundamental system theoretical research on large-scale interconnected systems has been intensified both on the topic of distributed control, see e.g. [1]–[4], as well as on the topic of distributed system identification, see e.g. [5]–[7]. These fundamental developments are inspired by the increasing interest from the application side, such as in fluid mechanics [8], flexible structures [9], large adaptive telescope mirrors [10], wind turbine farms [11], and so on. In this paper, we focus on the identification of large-scale 1D homogeneous networked systems. Such systems may characterize a platoon of cars or may result by discretizing dynamical systems described via partial differential equations [3], [12], [13]. When considering the subspace identification of local system dynamics using local data only, there is not only the missing information about the local system state, but also the missing state information from the neighboring systems. This makes the local identification problem more difficult. In [14] a subspace identification (SID) scheme for large-scale circulant systems was developed. The specific property of circularity C. Yu and M. Verhaegen are with the Delft Center for Systems and Control, Delft University, Delft 2628CD, Netherlands ([email protected], [email protected]) A. Hansson is with the Division of Automatic Control, Department of Electrical Engineering, Linkoping University, Sweden ([email protected]) Part of the research of M. Verhaegen was done while he was a visiting professor of the Division of Automatic Control, Department of Electrical Engineering, Linkoping University, Sweden. The research leading to these results has received funding from the European Research Council under the European Union’s Seventh Framework Programme (FP7/2007-2013) / ERC grant agreement no. 339681. was exploited to decompose the large model description into simple subsystems through a global transformation of the input and output data. In [15] a network of identical systems interacting in a known interconnection pattern, indicated as so-called decomposable systems, was considered. The identification of the dynamics of a single subsystem in the network using transformed input-output data sequences gives rise to a challenging Bilinear Matrix Inequality (BMI). In [12] the property that the inverse of the observability Grammian is offdiagonally decaying was used to approximate the neighboring states, influencing the local system dynamics to be identified, via an (unknown) linear combination of locally neighboring inputs and outputs. The selection of these neighboring input and output quantities requires however an exhaustive search, which is quite computationally demanding. As a complementary work to [12], a nuclear norm identification solution was provided in [16] to separate the local dynamics and global dynamics by exploiting their distinct rank and order properties; however, it did not consider identification of the interconnections between the subsystems. In this paper, we consider the subspace identification of a local cluster of identical LTI systems connected in a 1D network. Due to the unknown neighboring-state information, the considered local identification is a blind identification problem, where some input sequences are totally unknown. In this scenario, the existing SID approaches that aim at retrieving a matrix whose row or column space is of interest, the latter, e.g., being the extended observability matrix, cannot work. As a result, we aim to develop a new identification method for identifying the system matrices of a single subsystem (up to a similarity transformation) in the network that uses local inputoutput data only. The subspace identification method presented in this paper has two major features. First, a novel identification method is developed that uses similar data equations as many existing SID variants, but aims for a low dimensional subspace retrieval that allows the identification of the finite number of Markov parameters present in this data equation instead. This is a new alternative to classical SID methods [17] that would fail in retrieving subspace like the column space of the extended observability matrix of the system to be identified. This novel SID approach is applied to the identification of a locally lifted system with the missing neighboring-state information. By fully exploiting the two-layer structure of the block Toeplitz matrices in the data equation of a lifted state-space system, a low-rank optimization problem is formulated for which the optimal solution can yield (parts of) the true Markov parameters of the locally lifted system. Second is the retrieval of 2 ‫ݑ‬ଵ ሺ݇ሻ ȭଵ ‫ݕ‬ଵ ሺ݇ሻ ‫ݔ‬௜ିோିଵ ሺ݇ሻ ‫ݑ‬௜ିோ ሺ݇ሻ ‫ݑ‬௜ାோ ሺ݇ሻ ‫ݑ‬௜ ሺ݇ሻ ȭ௜ାோ ȭ௜ ȭ௜ିோ ‫ݕ‬௜ିோ ሺ݇ሻ ‫ݔ‬௜ାோାଵ ሺ݇ሻ ‫ݕ‬௜ାோ ሺ݇ሻ ‫ݕ‬௜ ሺ݇ሻ ‫ݑ‬ே ሺ݇ሻ ȭே ‫ݕ‬ே ሺ݇ሻ ‡‹‰Š„‘”Š‘‘†‘ˆȭ୧ ™‹–Š–Ї”ƒ†‹—•Ǥ Fig. 1. Illustration of a cluster of subsystems in a neighborhood of the subsystem Σi with radius R. The states xi−R−1 (k) and xi+R+1 (k) are explicitly indicated. They are like all other states unmeasurable. the system matrices, describing the local LTI dynamics, of an individual subsystem and its interaction with its neighboring systems (up to a similarity transformation) from the reliably estimated Markov parameters. The retrieval of the system matrices of an individual subsystem is inherently a challenging structured state-space realization problem [18] for which the optimal solution can yield the estimates of system matrices up to a similarity transformation. The second feature also includes the exploitation of the shifting structure of a timevarying generalized observability matrix. The rest of the paper is organized as follows. Section II describes the concerned identification problems and shows the challenge of dealing with the identification of a small cluster of subsystems in a large-scale networked system. Section III shows that the existing subspace identification methods break down in dealing with the concerned identification problem. Section IV presents a method for identifying the Markov parameters of the locally lifted state-space models. Section V provides a solution to the state-space realization of a single subsystem. Section VI provides a numerical example. The conclusions are provided in Section VII. The following notations are adopted throughout the paper. The lowercase (uppercase) x (X) is used to denote a vector (matrix). The superscripts T and −1 are transpose and inverse operators, respectively. vec (X) represents the vector stacked by columns of X. tr (X) stands for the trace of X. In denotes an n × n identity matrix and Om,n is an m × n zero matrix. ⊗ stands for the Kronecker product. kxk2 represents the norm of x. kXkF and kXk∗ denote the Frobenius norm and nuclear norm of the matrix X, respectively. II. P RELIMINARIES AND P ROBLEM D EFINITION {Σi }N i=1 We consider the LTI systems connected in a homogeneous 1D network as shown in Fig. 1. The lifted statespace model of the concerned network is written as: Σ1 : Σi : x1 (k + 1) y1 (k) xi (k + 1) = = = yi (k) = i = 2, · · · , N − 1, ΣN : xN (k + 1) = yN (k) = Ax1 (k) + Ar x2 (k) + Bu1 (k) Cx1 (k) + e1 (k) Axi (k) + Al xi−1 (k) + Ar xi+1 (k) +Bui (k) Cxi (k) + ei (k) AxN (k) + Al xN −1 (k) + BuN (k) CxN (k) + eN (k) (1) where xi (k) ∈ Rn×1 , ui (k) ∈ Rm×1 , yi (k) ∈ Rp×1 and ei (k) ∈ Rp×1 are the state, input, output and measurement noise of the i-th subsystem, xi−1 (k) and xi+1 (k) are the neighboring states of the i-th subsystem. For xi (k), the subscript i denotes the spatial index and k is referred to as the time index. For a large-scale distributed system, we always assume that N ≫ n and n > max{p, m}. By lifting all states xi (k) into the vector x(k) as x(k) =  T T x1 (k) · · · xTN (k) and doing the same for the inputs, outputs and noises defining resp. the vectors u(k), y(k) and e(k), the global system in Fig. 1 has the following state space model: x(k + 1) = Ax(k) + Bu(k) (2) y(k) = Cx(k) + e(k), where A, B, C are N × N following forms:  A   Al A=      B=  block matrices which have the A .. .  B B .. . B  Ar .. . .. . Al      , C =      ,  Ar  A  C C .. . C   .  To identify the system model in (2), the existing SID methods only estimate the triplet (A, B, C) up to a similarity transformation, thereby not preserving the special block-diagonal and block-tridiagonal structure of these system matrices. In addition, the computational complexity of SID methods, which is at least O(N 3 ) with N being the number of subsystems in the network, may easily disqualify their use for the identification of large-scale networks. To deal with the high computational complexity for identifying the global system model in (2), we consider the identification of a cluster of subsystems {Σj }i+R j=i−R in a neighborhood of Σi with radius R satisfying R < i < N − R and R ≪ N , as shown in Fig. 1. The lifted state-space model of this cluster is represented as xi (k + 1) = AR xi (k) + B R ui (k) + DR v i (k), y i (k) = C R xi (k) + ei (k), (3) with xi (k), ui (k), y i (k) the subparts of x(k), u(k), y(k) respectively from the block-rows (i−R) to (i+R); AR , B R , C R are (2R + 1) × (2R + 1) block matrices which have forms similar to A, B, C in (2), respectively; the (2R + 1) × 2 block matrix DR and the vector v i (k) are defined as:   Al 0  0 0      xi−R−1 (k)  ..  . ..  , v i (k) = DR =  . . xi+R+1 (k)    0  0 0 Ar For the identification of the cluster model in (3), the following two problems will be addressed. 3 Problem 1: The Markov parameters of the locally lifted state-space model in (3) will be identified using only the local input ui (k) and the local output yi (k). This problem will be addressed in Section IV. The difficulty of this problem w.r.t. classical subspace identification methods in [19], [20] or their more recent variants [21], [22] is that the adjacent state sequences xi−R−1 (k) and xi+R+1 (k) are missing or the input sequence v i (k) of the considered cluster model is unknown. Problem 2: The order the local subsystem Σi , denoted by n, as well as the local system matrices A, Ar , Al , B, C are to be identified based on the identified Markov parameters in Problem 1. More specifically, the system matrices are to be identified up to a similarity transformation, i.e., the estimates Â, Âr , Âl , B̂, Ĉ of A, Ar , Al , B, C satisfy  = Q−1 AQ, Âl = Q−1 Al Q, Âr = Q−1 Ar Q, B̂ = Q−1 B, Ĉ = CQ with Q ∈ Rn×n being a non-singular ambiguity matrix. The second problem will be addressed in Section V. It is noteworthy that, when the system order n is known, the second problem is inherently a structured state-space realization problem as studied in [18], which turns out to be a challenging non-convex optimization problem. The developed method in this paper can be applied to more general classes of large-scale identification problems than just a 1D chain of identical LTI systems, such as 1D heterogeneous networks consisting of clusters of identical LTI dynamical systems [23]. In addressing the locally lifted identification problem in (3), we stipulate the following assumption. Assumption A.1 The global system (A, B, C) and the locally lifted system (AR , B R , C R ) are assumed to be minimal. The persistent excitation of the input signal u(k), which will be used for the identifiability analysis in the sequel, is defined below. Definition 1. A time sequence u(k) ∈ RN m is persistently exciting of order s if there exists an integer h such that the (block-) Hankel matrix   u(k) u(k + 1) · · · u(k + h − 1)   u(k + 1) u(k + 2) · · · u(k + h)   ,  . .. .. . . .   . . . . u(k + s − 1) u(k + s) · · · u(k + s + h − 2) has full row rank for any positive integer k. III. B REAK DOWN OF EXISTING SUBSPACE IDENTIFICATION METHODS The data equation of the local state-space model (3) is given as follows: i i i i + Es,h , + TsDR Vs,h Ys,h = Os xih + TsBR Us,h i In this equation, the (block-) Hankel matrix Ys,h  y i (1) · · · yi (h)  .. .. i . Ys,h =  . .. . y i (s) · · · y i (h + s − 1) (4) is defined as    with the superscript i being the spatial index of the subsystem Σi , the subscripts s, h respectively being the number of block i , rows and the number of block columns. Analogous to Ys,h i i i we define the block-Hankel matrices Us,h , Vs,h , Es,h from the sequences ui (k), v i (k), ei (k), respectively. The matrix TsBR is a block Toeplitz matrix defined from the triplet (AR , B R , C R ) as   0   C RBR 0   TsBR =  , .. . . . .   . . . s−2 BR · · · C RBR 0 C R AR and TsDR is defined in a similar way from the triplet (AR , DR , C R ). The final matrix definitions in (4) are   CR  C R AR    Os =   ..   . s−1 C R AR and xih = [xi (k) · · · xi (k + h − 1)] . Existing subspace identification (SID) methods, see e.g. [17], break down when retrieving a matrix with a subspace i i like Os or xih from the available data matrices Ys,h and Us,h in (4). To explain this deficiency of existing SID methods, we consider the simple noise-free case e(k) ≡ 0. Let  −1 i,T i,T i i Π⊥ Us,h , U = I − Us,h Us,h Us,h i Then the subspace revealing matrix [17] is Ys,h Π⊥ U , or h iT i,T i,T if we consider the approach in [22]. Ys,h Us,h When the unknown system input v i (k) in (3) is absent, i ≡ 0), the column space of namely v i (k) ≡ 0 (or Vh,s i Os can be retrieved from that of Ys,h Π⊥ U , while the row i space of xh can be retrieved from that of compound matrix iT h i,T i,T . However, for the case v i (k) 6= 0, the Ys,h Us,h i presence of the bilinear term TsDR Vs,h destroys the important subspace revealing property in existing SID methods. Next, we shall show that the identification method in [21] cannot handle the concerned identification problem. One could consider the unknown input v i (k) in (3) as a ”missing input variable”. However, for the simple case e(k) ≡ 0 and using the notation Hv to denote the set block Hankel matrices of i the same structure as the matrix Vs,h , the rank minimization problem of [21] can be written as  i  Ys,h i  . min rank Us,h (5) V ∈Hv V By the following inequality  i   i  Ys,h i  ≥ rank Ys,h rank  Us,h , i Us,h V 4 we can see that V = 0 is an optimal solution to (5). It implies that the whole missing input sequence, not just a few missing entries, cannot be recovered using the low-rank optimization of [21]. To resolve this deficiency of SID methods, when considering the identification of local clusters in a large homogeneous network, a novel SID approach is developed in this paper. This method differs from the existing SID methods in two major ways. First, the low-rank subspace retrieval step that is characteristic for many SID methods is unable to find an accurate (or consistent) estimate of the key subspace of Os or xih . In this paper, the low-rank optimization will be used for the accurate estimation of (parts of) the Markov parameters in the block Toeplitz matrix TsBR . Second, contrary to existing SID methods that are unable to preserve the structures in the estimated system matrices, the proposed subspace identification method is capable of accurately estimating the non-zero block entries (up to a similarity transformation) of the structured system matrices in (3), as stated in Problem 2. IV. I DENTIFYING THE M ARKOV PARAMETERS OF THE LOCALLY LIFTED STATE SPACE MODEL (3) In this section, the Markov parameters of the state-space model in (3) will be estimated by exploiting the low-rank property of the unmeasurable-state related terms in (4) and the specific block Toeplitz structure of TsBR . Subsection IV-A formulates a low rank optimization problem without considering the specific structure of TsBR . It is shown in Lemma 2 that this low-rank optimization is unable to recover the true Markov parameters. Subsection IV-B reformulates another low-rank optimization problem by incorporating the specific Toeplitz structure of TsBR . It is shown in Theorem 1 that, under some mild conditions, the optimal solution to the proposed lowrank optimization problem can yield (parts of) the true Markov parameters. A. Formulation of a low-rank optimization problem Due to the unmeasurable state sequences in a network, the i in (4) is unknown. However, matrix sum Os xih + TsDR Vs,h this matrix sum has a low-rank property that will be exploited as a solution in the new subspace identification method. i Lemma 1. For the data equation (4), when h > ps or Ys,h is i DR i a fat matrix, the sum Os xh + Ts Vs,h satisfies the following rank property  i rank Os xih + TsDR Vs,h ≤ (2R + 1)n (6) + min{(s − 1)sp, 2(s − 1)n}, where (s − 1)sp and 2(s − 1)n denote the number of non-zero rows and columns of TsDR , respectively. Proof: From the structures of Os and TsDR , we can get that rank Os xih ≤ rank (Os ) ≤ (2R + 1)n and   i ≤ rank TsDR ≤ min{(s−1)sp, 2(s−1)n}. rank TsDR Vs,h Thus, the result in the lemma is straightforward. From Lemma 1, we can derive a condition to select the parameter s in the data equation (4) and the cluster radius R, i defined above equation (3), such that the sum Os xih +TsDR Vs,h is of low rank (or rank deficient). This condition reads: (2R + 1)sp > (2R + 1)n + min{(s − 1)sp, 2(s − 1)n}. (7) The above condition means that the number of the rows of the i is larger than an upper bound of its matrix Os xih + TsDR Vs,h rank. In practice, by fixing a value of s satisfying that s > np , we can always find a value of R such that the above inequality holds. Therefore, in the sequel, we assume that the matrix sum i Os xih + TsDR Vs,h is of low-rank (or rank deficient). Denote the noise-free output as ŷi (k) = y i (k)−ei (k) and its i related block Hankel matrix Ŷs,h . Based on the rank property discussed above, a low-rank regularized optimization problem is then proposed as follows: B min i ∈H Θs R ∈T ,Ŷs,h h+s−1 X kŷi (t) − y i (t)k2 t=1 (8) i h i i R + λ · rank Ŷs,h − ΘB s Us,h , where T and H denote respectively the set of block Toeplitz and block Hankel matrices with appropriate block sizes, and the regularization parameter λ allows to make a trade-off between the two terms in the cost function. It is remarked that the block Toeplitz structure of T corresponds to the first block-Toeplitz layer that is described in Subsection IV-B. In the absence of measurement noise, it will be shown in the following lemma that the optimal solution to (8) is nonunique. Lemma 2. Consider the optimization problem in (8). Suppose that the following assumptions are satisfied: 1) The global system input u(k) to (2) is persistently exciting of order N n+s with s being the SID dimension parameter in (4); 2) The measurement noise is absent, i.e., ŷi (k) = yi (k); 3) The matrix pairs (Al , B) and (Ar , B) have full row rank. Then, the optimal solution to the following rank optimization problem is non-unique:   i i R for R + s < i < N − R − s. min rank Ys,h − ΘB s Us,h B Θs R ∈T (9) The proof to the above lemma is provided in Appendix A. The above lemma indicates that the Markov parameters, as the block entries of TsBR , cannot be recovered even if the global optimal solution to the low-rank optimization problem in (9) can be found. In the next subsection, a solution will be provided by further constraining the structure of block entries of TsBR , due to the specific structures of the system matrices (AR , B R , C R ) in (3). B. Structure constrained low-rank optimization The block matrix TsBR in (4) has a two-layer block Toeplitz structure, which will be utilized in the proposed identification 5 method. The first layer is the block Toeplitz structure of TsBR with respect to its block entries C R AjR B R . The second layer is the partial block Toeplitz structure inside the block entries C R AjR B R , as highlighted in the following example and lemma. Example 1. If we take R = 3 and assume that each block in AR , B R , C R has size 2 × 2, then a visual illustration of the structures of the matrices {M j = C R AjR B R }3j=1 is given in Figure 2. Fig. 2. Illustration of the partial Toeplitz structure of the matrices {M j = C R AjR B R }3j=1 Top-left for j = 1 with block-bandwidth 1; top-right for j = 2 with block-bandwidth 2; bottom for j = 3 with block-bandwidth 3. The deep blue color represents zero entries. The parts surrounded by red curves have block Toeplitz structures. Lemma 3. Based on the matrices AR , B R , C R defined in (3), the following hold about the matrix product M j = C R AjR B R : 1) M j is a banded block matrix, with block-bandwidth j. 2) The submatrices of M j , for j < 2R + 1, at the l−th block row and q−th block column with l, q ∈ {1, · · · , 2R + 1}, are inside the partial block-Toeplitz region for the index-pair (l, q) satisfying: i + 1 ≤ l + q ≤ 4R + 3 − i. Proof: Since B R and C R are block diagonal matrices with constant diagonal blocks, M j has the same structure pattern as AjR . The matrix AR can be written as AR = I ⊗ A + J− ⊗ Al + J+ ⊗ Ar with J− and J+ block-column shifting matrices such that post-multiplication of a matrix with J− results in shifting the block-columns of that matrix to the left and adding a zero block column in the last column, while post-multiplication of a matrix with J+ results in the opposite shift and adding a zero block column in the first column. The proof is completed by induction. For j = 1 and j = 2 this can be easily checked. Let us assume that AjR has a block Toeplitz structure for the matrix blocks with the index-pair (l, q) satisfying that j + 1 ≤ l + q ≤ 4R + 3 − j, and using as the above expression for AR , we can express Aj+1 R Aj+1 = AjR AR = AjR (I ⊗ A + J− ⊗ Al + J+ ⊗ Ar ). (10) R By several trivial manipulations of the above matrix product, j+1 has a partial Toeplitz structure it can be derived that AR for the matrix blocks with the index-pair (l, q) satisfying that (j + 1) + 1 ≤ l + q ≤ 4R + 3 − (j + 1). This completes the proof. Let Tf denote the set of two-layer block Toeplitz matrices that was outlined above for the matrix TsBR . More clearly, the structure of TsBR is illustrated in the following example. Example 2. If we take R = 2 and s = 4, the Toeplitz matrix TsBR can be parameterized in terms of the parameter set p×m {ϕj }11 as follows: j=1 with ϕj ∈ R   0   M0 0 , (11) TsBR =    M1 M0 0 M2 M1 M0 0   ϕ1   ϕ1    , ϕ1 where M0 =     ϕ1 ϕ1   ϕ3 ϕ4   ϕ2 ϕ3 ϕ4   , M  ϕ2 ϕ3 ϕ4 = = M1 2    ϕ2 ϕ3 ϕ4  ϕ2 ϕ3   ϕ10 ϕ8 ϕ9  ϕ6 ϕ7 ϕ8 ϕ9     ϕ5 ϕ6 ϕ7 ϕ8 ϕ9 .    ϕ5 ϕ6 ϕ7 ϕ8  ϕ5 ϕ6 ϕ11 Then we specialize the rank-optimization problem in (8) as B min i ∈H Θs R ∈Tf ,Ŷs,h h+s−1 X kŷi (t) − y i (t)k2 t=1 (12) i h i i R + λ · rank Ŷs,h U − ΘB s s,h . The difference between (8) and (12) is in the definition of the constrained Toeplitz sets indicated by T and Tf , respectively. Though it is only a minor notational difference, the impact on the solution is huge. As will be outlined in Theorem 1, it enables uniqueness of part of the solution. For the uniqueness property, use will be made of the following time-varying observability matrix Oj,k , which is a sub-matrix of the extended observability matrix Oj defined in (4), consisting of the block rows corresponding to the secondlayer block Toeplitz part of TsBR . Definition 2. Let Gj be a j × (j + 2) block Toeplitz matrix of the form   Al A Ar   Al A Ar   (13) Gj =  . .. .. ..   . . . Al A Ar 6 Denote C j = Ij ⊗ C. A time-varying observability matrix Oj,k , for j > 2(k − 1), is defined in terms of the matrix pair (C j , Gj ) as [24, Chapter 3]:   Cj   C j−2 Gj−2     C j−4 Gj−4 Gj−2 Oj,k =  .   ..   . C j−2(k−1) Gj−2(k−1) · · · Gj−2 Theorem 1. Suppose that the following assumptions are satisfied: 1) Assumption A.1 holds and νo is the observability index of the pair (AR , C R ); 2) The cluster radius R of the lifted model in (3) and the dimension parameter s in (4) satisfy s > νo , R ≥ s − 1; 3) The conditions 1)-3) of Lemma 2 hold; 4) The time-varying observability matrix O2R+1,s−1 , defined in Definition 2, has full column rank. Then the submatrices of the Markov parameters M j = C R AjR B R , for j = 0, 1, · · · , s − 2, contained in the matrix TsBR in (4), for which Lemma 3 has shown that they preserve the second layer of block-Toeplitz structure, can be computed in a unique manner from the following low-rank optimization problem: min B Θs R ∈Tf h i i i R rank Ys,h − ΘB s Us,h for R + s < i < N − R − s. (14) The proof of the above theorem can be found in the Appendix B, where we can see that the (unique) global optimal solution can yield correct recovery of certain parts of the Markov parameters M j = C R AjR B R , for j = 0, 1, · · · , s − 2. In addition, based on the conditions 2) and 4) of the above theorem, it can be established that the inequality (7) holds, i namely the matrix sum Os xih + TsDR Vs,h is indeed of lowrank (or rank deficient). This in turn indicates that the low-rank cost function in (12) is a reasonable choice. Lemma 2 and Theorem 1 demonstrate that the second-layer Toeplitz structure, as pointed out in Lemma 3, is crucial for enforcing a (unique) solution to the identification problem 1 of this paper. The considered identification of the Markov parameters boils down to solving the low-rank regularized optimization problem in (12). Since the optimization problem in (12) is non-convex, it is difficult to obtain an optimal solution under a mild computational burden. In this paper, the reweighted nuclear norm optimization method [25] is adopted, which is regarded as an iterative heuristic for the rank minimization problem (12). V. S TATE - SPACE REALIZATION OF A SINGLE SUBSYSTEM In this section, we shall study the final realization of the system matrices {C, A, Al , Ar , B} from the estimated submatrices of the Markov parameters M j = C R AjR B R , for j = 0, 1, · · · , s − 2, contained in the matrix TsBR in (4), for which Lemma 3 has shown that they preserve the second-layer of block-Toeplitz structure. Remark 1. The realization problem considered in this section is a structured state-space realization problem, which turns out to be a challenging non-convex optimization problem [18], [20], [26]. This problem is usually solved by the gradientbased optimization methods, which are sensitive to the selection of the initial condition. Here, we transform the realization problem into a structured low-rank matrix factorization problem for which the optimal solution enables the estimation of system matrices (C, Al , A, Ar , B) up to a similarity transformation. This factorization problem is then reformulated into an equivalent low-rank optimization problem, which is then numerically solved using the optimization method developed in [27]. We start the solution by developing expressions of the submatrices in the second-layer Toeplitz regions in terms of the system matrices {C, A, Al , Ar , B}. This is done in the following Lemma. Lemma 4. Consider the block matrices AR , B R and C R defined in (3). Let the sequence of non-zero block entries from left to right of the (j +1)-th block row of the matrix C R AjR B R be denoted as {Fj,−j , Fj,1−j , · · · , Fj,j−1 , Fj,j }, then these matrix entries satisfy the following relationship: j X Fj,k z −k = C(Al z −1 + A + Ar z)j B, (15) k=−j where z ∈ C. Proof: The above result can be derived using the filter bank theory in [28]. As Fj,k are the Markov parameters inside the second-layer block Toeplitz part of TsBR , the values of Fj,k for j ∈ {0, 1, · · · , s−2}, k ∈ {−j, · · · , j} are assumed to be available in this section. Based on these values Fj,k , we address the problem of estimating the matrices {C, A, Al , Ar , B} up to a similarity transformation. Dual to Definition 2, we shall define a time-varying controllability matrix Cj,k , which is a sub-matrix of the extended controllability matrix determined by (AR , B R ). Definition 3. Let Γj be a (j + 2) × j block Toeplitz matrix of the form   Ar   A Ar     . ..   Al A   (16) Γj =  . ..   . A A r  l    ..  . A  Al Denote B j = Ij ⊗ B. A time-varying controllability matrix Cj,k , for j > 2(k − 1), is defined in terms of the matrix pair (Γj , B j ): Cj,k = [ B j Γj−2 B j−2 ··· Γj−2 · · · Γj−2(k−1) B j−2(k−1) ] . 7 In the sequel, we let s be an even integer such that s/2 is an integer as well. The solution to the realization of the system matrices {C, Al , A, Ar , B} is done in two phases. In the first phase, the structured time-varying observability matrix O2R+1,s/2 and the structured time-varying controllability matrix C2R+1,s/2 are to be estimated from the available matrix values Fi,j . In the second phase, the system matrices {C, A, Al , Ar , B} are derived from these time-varying observability and controllability matrices. It is remarked that the subscript s/2 in O2R+1,s/2 (or C2R+1,s/2 ) means that the maximum moment of the block entries in O2R+1,s/2 (or C2R+1,s/2 ) is s/2−1. The subscript s/2 is adopted because the sum of the maximum moments of O2R+1,s/2 and C2R+1,s/2 is equal to the maximum moment, s− 2, of the available Markov parameters M j . A. Determining the time-varying observability and controllability matrices In this subsection, the determination of O2R+1,s/2 and C2R+1,s/2 will be formulated as a structured low-rank matrixfactorization problem. More importantly, we show that the optimal solution to this matrix-factorization problem can yield the estimates of O2R+1,s/2 and C2R+1,s/2 up to a block-diagonal ambiguity matrix with identical block-diagonal entries. This is crucial to identify the system matrices {C, A, Al , Ar , B} up to a similarity transformation, as stated in Problem 2. First, by the definitions of O2R+1,s/2 and C2R+1,s/2 , we can find that the product of O2R+1,s/2 and C2R+1,s/2 is equal to a matrix constructed from {Fj,k }jk=−j for j = 0, 1, · · · , s− 2. This is demonstrated in the following example. Example 3. When R = 1 and s = 4, the product of O3,2 and C3,2 can be expressed as     C 0 0  B 0 0 Ar B  0 C 0   0 B 0 AB  O3,2 C3,2 =   0 0 C  0 0 B Al B CAl CA CAr   F0,0 0 0 F1,1  0 F1,0  F0,0 0 . =  0 0 F0,0 F1,−1  F1,−1 F1,0 F1,1 F2,0 The above equation provides a simple example, showing that the product of O3,2 and C3,2 can be expressed in terms of {Fj,k }jk=−j for j = 0, 1, 2. Here, the product of O2R+1,s/2 and C2R+1,s/2 is represented as: O2R+1,s/2 C2R+1,s/2 = H2R+1,2R+1 , (17) where H2R+1,2R+1 is a (2R + 1) × (2R + 1) block matrix that is assumed to be known. Given the matrix H2R+1,2R+1 , the problem of interest is to determine O2R+1,s/2 and C2R+1,s/2 from equation (17). According to Definitions 2 and 3, we can see that O2R+1,s/2 and C2R+1,s/2 are structured matrices. These structures are instrumental to analyzing the properties of the optimal solution to (17), as shown in Theorem 2. In order to show these structures, use will be made of the following matrix definition. For j = 0, 1, · · · , s/2 and z ∈ C, the matrix sequences {Wj,l }jl=−j and {Ej,l }jl=−j are defined as j X Wj,l z −l = C(Al z −1 + A + Ar z)j l=−j j X (18) Ej,l z −l = (Al z −1 j + A + Ar z) B. l=−j From the defined quantities Wj,l and Ej,l in (18), the matrices Wj and Ej are defined as   T  T E0,0 W0,0 T  E1,−1   W1,−1      T     E1,0 W1,0     T     E1,1 W1,1 (19) Wj =   Ej =   . T  E2,−2   W2,−2          .. ..     . . Wj−1,j−1 T Ej−1,j−1 It can be seen that Oj,k (or Cj,k ) is a block matrix constructed from the block components of Wk (or Ek ). This is illustrated in the next example. Example 4. The time-varying observability matrix O5,3 is represented in terms of W3 as follows   W0,0   W0,0     W 0,0     W 0,0   W O5,3 =  0,0  .    W1,−1 W1,0 W 1,1     W W W 1,−1 1,0 1,1    W1,−1 W1,0 W1,1  W2,−2 W2,−1 W2,0 W2,1 W2,2 Denote by O2R+1,s/2 the set of block matrices having the same structure as O2R+1,s/2 , as illustrated in Example 4 , and C2R+1,s/2 the set of block matrices having the same structure as C2R+1,s/2 . It is remarked that the definitions of both the sets O2R+1,s/2 and C2R+1,s/2 require knowledge of the system order n. We then propose the following structured low-rank matrix factorization problem: min kH2R+1,2R+1 − OCk2F O,C (20) s.t. O ∈ O2R+1,s/2 , C ∈ C2R+1,s/2 . It will be shown in the following theorem that the optimal solution to (20) can yield the estimates of O or C up to a block-diagonal ambiguity matrix with identical block-diagonal entries. Theorem 2. Consider the optimization problem in (20). Suppose that the following assumptions are satisfied: 1) The values of R and s satisfy R ≥ s − 2, and s is a positive even integer; 2) The system order of a subsystem, n, is known; 8 3) The matrices Oj,s/2 and Cj,s/2 , for any j ≥ min{2s − 3, 2R}, have full column and row rank, respectively; 4) The matrix H2R+1,2R+1 satisfying equation (17) is known exactly. Then, any optimal solution pair {Ô, Ĉ} to the optimization (20) satisfies Ô = O2R+1,s/2 Q Ĉ = Q −1 C2R+1,s/2 , (21) where Q = I2R+1 ⊗ Q with Q ∈ Rn×n being a nonsingular ambiguity matrix. The proof of this theorem is given in Appendix C. B. Rank-constrained form of the optimization problem (20) In this subsection, the structured low-rank matrix factorization problem in (20) is reformulated into a rank-constrained optimization problem. From the matrix quantities defined in (18) and (19), we can see that O2R+1,s/2 is affine in terms of Ws/2 , while C2R+1,s/2 is affine in terms of Es/2 . Then, it can be established that product O2R+1,s/2 C2R+1,s/2 is affine in terms of block entries of Ws/2 Es/2 [29]. This affine operator H(·) is defined by O2R+1,s/2 C2R+1,s/2 = H(Ws/2 Es/2 ). (22) In the sequel, the affine operator H(·) is assumed to be known. Instead of O2R+1,s/2 and C2R+1,s/2 , we regard the product X = Ws/2 Es/2 as the variable to be determined. Then, the affine function H(X) works on the block entries of X. By taking into account the low-rank property of the matrix product Ws/2 Es/2 , we propose the following rank-constrained optimization problem: min kH2R+1,2R+1 − H(X)k2F X s.t. rank(X) = n, (23) where n is the system order of a subsystem in (1) and X has the same size as Ws/2 Es/2 . Next, we will show that the rank-constrained optimization problem in (23) is an equivalent formulation of (20). To show this result, the following lemma is required. Lemma 5. Suppose that Oj,s/2 and Cj,s/2 , for j > s − 2, have full column and row rank, respectively. Then, Ws/2 and Es/2 have full column and row rank, respectively, and both ranks are n. Proof: Since Oj,s/2 has full column rank, the block iT h T T T , which is constructed vector W0,0 , W1,−1 , · · · , Ws/2,−s/2 by stacking the non-zero block entries in the first block column of Oj,s/2 , has full column rank as well. Since this block vector is a sub-part of Ws/2 , it can be derived that Ws/2 has full column rank. Similarly, it can be proven that the block vector Es/2 has full row rank as well. The next theorem shows the equivalence between the optimization problems in (20) and (23). Theorem 3. Consider the optimization problems in (20) and (23). Suppose that all the conditions of Theorem 2 hold. Then, the optimization problems (20) and (23) are equivalent in the can yield the estimate  sense that their optimal solutions  Ŵs/2 , Ês/2 of Ws/2 , Es/2 up to an ambiguity matrix, i.e., there exist a nonsingular matrix Q ∈ Rn×n such that Ŵs/2 = Ws/2 Q, Ês/2 = Q−1 Es/2 . Proof: First, we will show that the optimal  solution to (20) can yield the estimate of Ws/2 , Es/2 up to an ambiguity matrix. From the matrix quantities in (18) and (19), we can see that structured matrices O2R+1,s/2 and C2R+1,s/2 are linearly parameterized by the block components of Ws/2 and Es/2 , respectively. By the result of Theorem 2, it can be derived that the optimal  solution to (20) can yield the estimate of Ws/2 , Es/2 up to an ambiguity matrix. Second, we will show that the optimal solution to (23) can  yield the estimate of Ws/2 , Es/2 up to an ambiguity matrix. By equation (22), the optimization problem (20) can be reformulated as min W,E kH2R+1,2R+1 − H(WE)k2F , (24) where the variables W and E have the same sizes of Ws/2 and Es/2 , respectively. It is noted that equation (24) is a parameterized form of the structured low-rank matrix factorization problem in (20). By Theorem 2 and Lemma  5, the optimal solution (Ŵ, Ê) to (24) satisfies rank ŴÊ = n and H(ŴÊ) = H2R+1,2R+1 . It can be derived that X = ŴÊ is an optimal solution to (23) and the criterion of (23) becomes zero. Let X̂ be an optimal solution to (23). It should satisfy H(X̂) = H2R+1,2R+1 and rank X̂ = n. Let the SVD decomposition of X̂ be given by X̂ = Û ΣV̂ T , where Û and V̂ are constructed by n orthogonal columns, and Σ ∈ Rn×n is a diagonal matrix with positive diagonal entries. Then, (Ŵ, Ê) = (Û , ΣV̂ T ) is an optimal solution  to (24). Therefore, (Û , ΣV̂ T ) is an estimate of Ws/2 , Es/2 up to an ambiguity matrix. The proof is then completed. The rank-constrained optimization problem in (23) is nonconvex and NP-hard. Following our previous work [27], the rank-constrained optimization problem (23) is recast into a difference-of-convex optimization problem which is then solved using the sequential convex programming method. Let X̂ be an optimal solution to (23). The SVD decomposition of X̂ is given by  T    Σ1  V1 , (25) X̂ = U1 U2 Σ2 V2T where U1 and V1 consists of n orthogonal columns, and the diagonal matrix Σ1 ∈ Rn×n has larger diagonal entries than Σ2 . The estimates of Ws/2 and Es/2 can then be obtained as follows: Ŵs/2 = U1 , Ês/2 = Σ1 V1T . 9 Since O2R+1,s/2 and C2R+1,s/2 are respectively affine in terms of Ws/2 and Es/2 , the variables O and C in (20) can be estimated from Ŵs/2 and Ês/2 , respectively. C. Determining the system matrices {A, Al , Ar , B, C} In view of the theoretical result in Theorem 2, we assume that the obtained estimates Ô2R+1,s/2 and Ĉ2R+1,s/2 satisfy Ô2R+1,s/2 = O2R+1,s/2 Q, Ĉ2R+1,s/2 = Q−1 C2R+1,s/2 , (26) where Q = I2R+1 ⊗ Q with Q ∈ Rn×n being nonsingular. Based on these estimates, we will address the identification of the system matrices {A, Al , Ar , B, C} up to a similarity transformation. First, the shifting structure of the time-varying observability matrix O2R+1,s/2 will be explored. Denote   C j−2k1 Gj−2k1 · · · Gj−2  C j−2(k +1) Gj−2(k1 +1) · · · Gj−2  1   Oj,k1 :k2 =   ..   . C j−2k2 Gj−2k2 · · · Gj−2 where 0 ≤ k1 < k2 ≤ s/2 − 2 and 2k2 ≤ j ≤ 2R + 1. The matrix Oj,k1 :k2 above is constructed by the block rows of Oj,k with block-row indices from k1 to k2 . Then, the structureshifting property of O2R+1,s/2 can be represented as O2R−1,0:s/2−2 G2R−1 = O2R+1,1:s/2−1 , (27) where O2R−1,0:s/2−2 and O2R+1,1:s/2−1 are sub-matrices of O2R+1,s/2 , and G2R−1 is a block Toeplitz matrix defined in Definition 2. This is illustrated in the following example. Example 5. When R = 2 and s = 6, the structure-shifting property in (27) can be explicitly written as Lemma 6. Let Ô2R+1,s/2 satisfy equation (26). Assume that Ô2R−1,0:s/2−2 has full column rank. Then, the optimal solution Ĝ to the optimization problem in (28) satisfies  (29) Ĝ = I2R−1 ⊗ Q−1 G2R−1 (I2R+1 ⊗ Q) , where Q ∈ Rn×n is a nonsingular matrix. The above lemma can be derived straightforwardly based on equation (26) and the optimization formulation (28). The condition that the time-varying observability matrix Ô2R−1,0:s/2−2 has full column rank is similar to condition 3) of Theorem 2. Lemma 6 implies that the matrices Al , A, Ar can be determined up to a similarity transformation, i.e., Âl = Q−1 Al Q,  = Q−1 AQ, Âr = Q−1 Ar Q. In addition, according to equation (26), the estimates Ĉ and B̂ can be extracted respectively from Ô2R+1,s/2 and Ĉ2R+1,s/2 , satisfying that Ĉ = CQ, B̂ = Q−1 B. To ease the reference, the proposed local network identification algorithm is summarized in Algorithm 1. Algorithm 1: Local identification for 1D distributed systems Construct a spatially stacked state-space model (3) and its Step 1 temperally stacked equation (4) based on local observations; B Step 2 Estimate Ts R from the optimization problem (12); Step 4 Estimate O2R+1,s/2 and C2R+1,s/2 using the method described in Subsection V-B; Step 5 Extract the estimates of C and B from the estimates of O2R+1,s/2 and C2R+1,s/2 , respectively; Step 6 Estimate Al , A, Ar by solving (28). VI. N UMERICAL SIMULATION In this section, numerical simulations are provided to demonstrate the effectiveness of the proposed identification    C method – Algorithm 1. In the simulation, the distributed A A Ar C  l   system is constructed by connecting 40 identical subsystems Al A Ar  C  Al A Ar in a line, and the identification for the 20-th subsystem CAl CA CAr   is performed. The system matrices (A, Al , Ar , B, C) with CAl CA CAr 3×3 , B ∈ R3×2 and C ∈ R2×3 are randomly CAl CA CAr   A, Al , Ar ∈ R , =  generated such that Assumption A.1 is satisfied and the 1D CAl CA CAr CA2l C(AAl + Al A) ∗ C(AAr + Ar A) CA2r networked system is stable. To construct an augmented state-space model in (3), we set where ∗ is used to represent the term C(Al Ar + A2 + Ar Al ). R = 5 and s = 8. The system input and the measurement noise Based on equation (27), we formulate the following struc- are generated as white noise sequences and the data length is tured least-squares optimization problem to identify the ma- set to 800. To evaluate the identification performance against the noise trices Al , A, Ar based on the estimate Ô2R+1,s/2 : effect, the criterion signal-to-noise ratio (SNR) is adopted, which is defined as min kÔ2R−1,0:s/2−2 G − Ô2R+1,1:s/2−1 k2F G   (28) var(yi (k) − ei (k)) s.t. G ∈ G2R−1 , . SNR = 10 log var(ei (k)) where G2R−1 denotes a set of matrices having the same In the sequel, we shall carry out numerical simulations with structure as G2R−1 , as shown in Definition 2. The optimal solution to (28) has properties shown in the the SNR ranging from 0 dB to 95 dB. We use the criterion impulse-response fitting to evaluate following lemma. the performance of the proposed identification method. The 10 normalized fitting error of the impulse-response sequence CAi B is defined by T P10 1 X i=0 kCAi B − Ĉj Âij B̂j kF , P10 i T j=1 i=0 kCA BkF Normalized fitting error 10-1 10-2 10-3 0.02 Normalized fitting error where T is the number of randomly generated networked systems and {Ĉj , Âj , B̂j } are the estimates of {C, A, B} of the j-th generated networked system, respectively. Similarly, we can also define the normalized fitting error for the impulseresponse sequences CAil B and CAir B. Fig. 3 shows the identification performance of the proposed method against the SNR. The normalized fitting errors are calculated by averaging the results of 100 randomly generated networked systems, and the regularization parameter λ in (8) is set to λ = 10−3 . It can be observed from Fig. 3 that, using the proposed identification method, the normalized fitting error decreases along with the increase of the SNR. When the SNR is larger than 50 dB, the normalized fitting errors can be as small as 10−4 . 0.025 0.015 0.01 0.005 0 10-8 10 20 30 40 50 60 70 80 90 VII. C ONCLUSION The local identification of 1-D large-scale distributed systems has been studied. Compared with the classical system identification problems, the challenging point of the local system identification is that there are two unknown system inputs which are the states of its neighboring subsystems. By exploiting both the spatial and temporal structures of the distributed system, especially the two-layer Toeplitz structure of the Markov-parameter matrix, a low-rank optimization problem has been provided for identifying the Markov parameters of a local cluster of identical subsystems, where the associated optimal solution can yield (parts of) the true Markov parameters. Moreover, the system realization of a structured statespace model is formulated as a structured low-rank matrix 100 A PPENDIX A P ROOF OF L EMMA 2 100 Fig. 4 shows the impulse-response fidelity of individual subsystems against the regularization parameter λ, where SNR is set to SNR=40 dB. The normalized fitting errors are computed by averaging the results of 100 randomly generated networked systems. We can observe from Fig. 4 that good identification performance can be achieved by choosing the regularization parameter λ around 10−2 . 10-2 factorization problem, showing that the system matrices can be determined up to a similarity transformation by enforcing the structure of the generalized observability/controllability matrix. Although we only consider the identification of 1D homogeneous networked systems, it can be extended to 2D homogeneous networks using the same identification framework, namely exploiting both the spatial and temporal structures of the concerned distributed system. In our future work, the identification of large heterogeneous networks will be investigated. SNR (dB) Fig. 3. Normalized fitting errors under different noise levels with λ = 10−3 . 10-4 Fig. 4. Normalized fitting errors against the regularization parameter λ with SNR=40 dB. 10-4 0 10-6 The proof of the lemma is divided  into three steps. xih i  has full row rank under Step I: we shall show that  Vs,h i Us,h the given assumptions in the lemma. It can be derived from (2) that        I ···  A ···     = . · · ·   .. As−1 x(k + s − 1) · · ·  x(k) x(k + 1) .. .   ×  B .. . As−2 B x(k) u(k) .. .  .. . ··· ··· ··· B    . ···  u(k + s − 2) · · ·     (30) Let Ξ = [h O(2R+1)n,(i−R−1)n I(2R+1)n O(2R+1)n,(N−i−R)n ], i O In On,(2R+1)n On,n On,(N −i−R−1)n Ω = On,(i−R−2)n On,n On,(2R+1)n In On,(N −i−R−1)n n,(i−R−2)n and Π = [ O(2R+1)m,(i−R−1)m I(2R+1)m O(2R+1)m,(N−i−R)m ] 11 be selection matrices such that  Ξ  Ω   ΩA ΩB   i   .. .. ..  . xh . .  i s−1 s−2  Vs,h  =  ΩA ΩA B · · · ΩB  i  Us,h 0 Π   .. ..  . .   0 Π 0   x(k) ···  u(k) ···      . .. × . · · ·    u(k + s − 2) · · ·  u(k + s − 1) · · · and         0        (31)  Π By Lemma 10.4 in [20], under the assumption that u(k) is persistently exciting of order nN + s, it can be established that   x(k) ···  u(k) ···      ..  . ···  u(k + s − 1) · · · has full row rank. In addition, by explicitly unfolding the expressions of ΩAj B, it can be verified that, when (Al , B) and (Ar , B) have full row rank and R ≥ s − 1, the coefficient matrix on the right-hand side of (31) has full row rank. For the sake of brevity, we only show this for the case with s = 3. The associated coefficient matrix in (31) is shown in (32) with ∗ denoting unimportant entries for analyzing the concerned rank property. Under the condition that (Al , B) and (Ar , B) have full row rank, it is easy to see that the submatrix stacked by the first five and last two block rows of (32) has full row rank. It can be further verified that the whole coefficient matrix in (32) has full row rank. This  is a conse  2    Al B 0 quence of Al Al B B = Al B 0 0 I     Ar B 0  2 with and Ar Ar B B = Ar B 0 0 I     Al B and Ar B having full row rank. Now that the coefficient matrix in (31)has full row rank, xih i  has full row rank Sylvesters’ inequality shows that  Vs,h i Us,h as well. R R Step II: Let TB ∈ T be the true value of ΘB s s . Next, we BR shall show that Ts is an optimal solution (9). Let ∆s ∈ T .  i to  xh i , we can derive Under the full row rank property of  Vs,h i Us,h that   i i R rank Ys,h − TB s Us,h   i    xh Os TsDR =rank i Vs,h   =rank Os TsDR  i   i R − ∆s Us,h rank Ys,h − TB s  i   xh   i  =rank  Os TsDR ∆s  Vs,h i Us,h   DR ∆s . =rank Os Ts By the inequality    rank Os TsDR ≤ rank Os TsDR ∆s we can obtain that   i i R rank Ys,h − TB s Us,h  i   i R − ∆s Us,h − TB ≤ rank Ys,h s  (33) , (34) R is an optimal solution to (9). for any ∆s ∈ T . Thus, TB s Step III: In this step, we shall show that the optimal solution to (9) is non-unique. Let ∆s = TsDR Gs , (35) R where Gs = Is ⊗GR with GR ∈ R2n×(2R+1)n . Denote TB = s BR BR Ts − ∆s . It is easy to verify that Ts ∈ T . Since ∆s = TsDR Gs , it can be established that  i i R rank [Yk,s,h − TB s Uk,s,h   = rank Os TsDR ∆s      I 0 0 DR Os Ts (36) = rank 0 I Gs   = rank Os TsDR  i i R = rank [Ys,h − TB s Us,h . R It can then be observed from the above equation that both TB s BR and Ts are optimal solutions to (9); therefore, the optimal solution to (9) is non-unique. A PPENDIX B P ROOF OF T HEOREM 1 Following the proof of Lemma 2, the following matrix in (31) has full row rank:  i  xh i .  Vs,h i Us,h Let Tf denote the set of the two-layer block Toeplitz R matrices, defined in Subsection IV-B. Let TB ∈ Tf be the s R true value of the estimate of ΘB in (14). Since the matrix set s Tf belongs to the matrix set T , the minimal value of the cost function in (9) is smaller than or equal to that in (14), i.e.   i i R min rank Ys,h − ΘB s Us,h B Θs R ∈T ≤  i  i R min rank Ys,h − ΘB s Us,h . B Θs R ∈Tf R ∈ Tf is an As shown in Lemma 2, the true value TB s optimal solution to (9). Then, it can be observed from the R above inequality that TB ∈ Tf is also an optimal solution to s 12              0 0 0 0 0 A2l 0 0 0 0 Al 0 ∗ 0 0 In 0 A 0 ∗ 0 | In | 0 | 0 | Ar | 0 | ∗ | 0 | | ∗ ∗ ∗ ∗ ∗ ∗ ∗ In 0 0 0 Al 0 ∗ | 0 | 0 | In | 0 | A | 0 | ∗ | | 0 0 0 0 Ar 0 ∗ 0 0 0 0 0 0 A2r 0 0 Al B 0 B 0 AB 0 | | | 0 | ∗ 0 | ∗ Ar B | ∗ 0 | ∗ | I(2R+1)m | 0 | | | | 0 | 0 | 0 | Al B | | 0 B 0 AB 0 0 0 Ar B 0 0 | | | | | 0| ∗ 0| ∗ | 0 | I(2R+1)m B 0 | | | | | |0 |0 | |         0   0    0 B (32) (14). As a consequence, the corresponding minimal value of the cost function of (14) is rank  TsDR Os  . BR R R Let TB ∈ Tf be such that ∆s = TB is a perturbation s s −Ts we seek of the true value such that it retains the minimal value of the cost function in (14). Using the full row rank condition of the matrix in (31), we obtain that  i i R rank Ys,h − TB s Us,h   i i + ∆s Us,h = rank Os xih + TsDR Vs,h   = rank Os TsDR ∆s . (37) ∗  ..  .   ∗   0      0  0      0  . ∗   ..  .  (38) ∗ (b) Permutation of ∆s : Let Ls denote the matrix that permutes all zero block rows of TsDR to top such that Ls TsDR = 2  TsDR 0 T2  , Ls Os =  Os1 ∗  following special structures  0 ∆0,1 .. . ··· 0 .. . ∆1,s−3 ∗ .. . ∆0,s−2     ,   0  , (40) Now, we seek that part of ∆s ∈ Tf that retains the minimal value of the cost function in (14) only when it is zero. For that reason, we permute the block rows of ∆s compatible with the zero block-row pattern of the matrix TsDR . (a) Structure of TsDR : The structure of TsDR is determined by C R AjR DR for j = 0, 1, · · · , s − 2. By the definitions of AR , C R and DR in (3), we can find that C R AjR DR is a (2R+ 1) × 2 block matrix. When R ≥ (s − 1), the block rows of C R AjR D R indexed from (j + 2) to (2R − j) are zero. For instance, C R AjR D R has the block structure as shown below with ∗ representing non-zero block entries:  ∆s and Os , yielding the  1  ∆ Ls ∆s = ∗  0  ∆ 0,0   ∆ 1,0  = ..  .   ∆s−2,0 (39) where T is a sub-matrix of by removing the corresponding zero block rows, as illustrated in (38). It is noteworthy that the zero block rows of TsDR correspond to the second-layer block Toeplitz part of TsBR , as shown in Lemma 3. Then, the permutation matrix Ls is applied to the matrices such that Os1 = O2R+1,s and ∆j,l , for j = 0, 1, · · · , s − 2 and l = 0, · · · , s − 2 − j, is a [2(R − j − l) − 1] × [2R + 1] block Toeplitz matrix in the form   0 δj,−j δj,1−j · · · δj,j 0   .. .. .. .. .. .. ∆j,l =  , . . . . . . 0 δj,−j δj,1−j ··· δj,j 0 with {δj,k }jk=−j being block entries of appropriate sizes. Note that ∆j,l for l ≥ 1 is a sub-matrix of ∆j,0 , which is constructed by stacking the block rows indexed from (l+1) to (2R−1−l). Now, we are ready to show for what values of ∆j,l the following rank constraint holds     rank Os TsDR ∆s = rank Os TsDR . (41) It can be derived from the above equality that     Q1 DR = Ls ∆s , Ls Os Ts Q2 or   1    ∆ O2R+1,s 0 Q1 = , Q2 ∗ T2 ∗ (42) (43) where Q1 and Q2 are coefficient matrices of appropriate sizes, and ∗ denotes non-zero block entries caused by the block-row permutation. So we focus on the top part of (43) and rewrite it as   (44) ∆1 = O2R+1,s Q1,0 Q1,1 · · · Q1,s−1 , s−1 where {Q1,j }j=0 are sub-matrices of Q1 satisfying that Q1 = [Q1,0 Q1,1 · · · Q1,s−1 ]. By considering the last block column of equation (44), under the assumption that O2R+1,s−1 has full column rank, we can obtain that Q1,s−1 = 0. Similarly, by considering the second to the last block column, it can be derived that Q1,s−2 = 0 13 and ∆0,s−2 = 0, further ∆0,j = 0 for j = 0, 1, · · · , s − 3. Next, for the third to the last block column, since ∆0,s−3 = 0 and O2R+1,s−1 has full column rank, we can obtain that Q1,s−3 = 0 and ∆1,j = 0 for j = 0, · · · , s − 3. By repeating this procedure, it can be established that equation (44) holds only when ∆1 = 0 and Q1,j = 0 for j = 0, 1, · · · , s − 1. In other words, the matrix ∆s with a nontrivial sub-matrix ∆1  DR cannot be linearly represented by Os Ts . Since the block rows of ∆1 correspond to the secondlayer Toeplitz part of ∆s , we can see that the rank R Os TsD ∆s is strictly larger than that of of   DR Os Ts as long as the second-layer Toeplitz part of ∆s is non-zero. Thus, the proof is completed. To illustrate this, the first block-column equation of (47) can be equivalently written as follows:           Ĉ ˆl CA 0 0 0 0 0 0   C   CAl     0   0 =   0     0  0 0 0 CA C 0 0 0 CAl 0 0 CAr 0 C 0 0 CA CAl 0 0 0 0 C 0 CAr CA 0 0 0 0 0 C 0 CAr          Q1,1 Q2,1  Q3,1  . Q4,1 Q5,1  It is obvious that, since O4,2 (or O2R,s/2 ) has full column rank, it has A PPENDIX C P ROOF OF T HEOREM 2 Q2,1 = Q3,1 = Q4,1 = Q5,1 = 0, ˆ l = CAl Q1,1 . Ĉ = CQ1,1 , CA Assume that the matrix pair {Ô2R+1,s/2 , Ĉ2R+1,s/2 } is one of the optimal solution pairs to (20), it can be established that Ô2R+1,s/2 and O2R+1,s/2 has the same structure and the same column space, which can be algebraically represented as Ô2R+1,s/2 = O2R+1,s/2 Q, (45) where Q ∈ R(2R+1)n×(2R+1)n is a (2R + 1, 2R + 1) block matrix which is nonsingular. In the sequel, we denote Qi,j the (i, j)-th block entry of Q. In order to prove the theorem, it is sufficient to prove that the estimate Ŵs/2 of Ws/2 satisfies that Ŵs/2 = Ws/2 Q, (46) where Q ∈ Rn×n is a nonsingular matrix and Ws/2 is defined in (19). In the sequel, we denote by Ŵi,j , for j = −i, · · · , i, the estimate of Wi,j which is a block component of Ws/2 . To illustrate the structure of equation (45), it is expanded into equation (47) by setting R = 2 and s = 4. The following proof will be divided into three steps. Step 1. We will show that, under the assumption that O2R,s/2 has full column rank, the following relations can be derived from equation (45): i = 0 : Ŵi,−i = Wi,−i Q1,1 , Wi,−i Q1,j = 0 for j = 2, · · · , s − 1; i = 1 : Ŵi,−i = Wi,−i Q1,1 , Ŵi,2−i = Wi,−i Q1,3 + Wi,1−i Q1,2 + Wi,2−i Q1,1 , Wi,−i Q1,j+2 + Wi,1−i Q1,j+1 + Wi,2−i Q1,j = 0 for j = 2, · · · , s − 3; ··· Qi,2 = 0 for i = 3, · · · , 2R + 1; CQ1,2 = 0; Ŵi,1−i = Wi,−i Q1,2 + Wi,1−i Q1,1 for i = 1, · · · , s/2 − 1. (51) To illustrate this, by using the relations in (50), the second block-column equation of (47) can be equivalently written as            ˆ CA 0 CQ1,1 0 0 0 CAl Q1,1 0   CA l   C         =        CA CAr  C C C C CAl CA CAl CAr CA CAr          Q1,2 Q2,2 Q3,2 Q4,2 Q5,2 We can observe that the bottom subpart of the vector on the left-hand side equals the product of the first block column of O4,2 and Q1,1 . By the assumption that O4,2 (or O2R,s/2 ) has full column rank, we can derive that Q3,2 = Q4,2 = Q5,2 = 0; CQ1,2 = 0; ˆ = CAl Q1,2 + CAQ1,1 . CA i = s/2 − 1 : Ŵi,−i = Wi,−i Q1,1 , ··· Ŵi,s−2−i = Wi,−i Q1,s−1 + · · · + Wi,s−2−i Q1,1 . (48) Let’s consider the equation corresponding to the first blockcolumn of (45). Since O2R,s/2 has full column rank, it can be derived that Ŵi,−i = Wi,−i Q1,1 for i = 0, 1, · · · , s/2 − 1. Next, by substituting the relations in (49) into the equation corresponding to the second block-column equation of (45) and under the assumption that O2R,s/2 has full column rank, we can obtain that (52) Ŵi,1−i = Wi,−i Q1,2 + Wi,1−i Q1,1 , Qi,1 = 0 for i = 2, 3, · · · , 2R + 1; (50) (49) Q2,2 = Q1,1 ; (53) By iteratively considering from the first to the (s − 1)-th block-column equation of (45) using the same strategy, we can derive the relations in equation (48). Step 2. Under the assumption that O2R,s/2 has full column rank, the following relations can be derived from equation (45)    .  14   Ĉ          ˆ  CAl   Ĉ Ĉ Ĉ Ĉ ˆ CA ˆl CA ˆr CA ˆ CA ˆl CA ˆr CA ˆ CA ˆr CA  C            =     CA l      C C C C CA CAl CAr CA CAl as well: CAr CA CAr          Q1,1 Q2,1 Q3,1 Q4,1 Q5,1 Q1,2 Q2,2 Q3,2 Q4,2 Q5,2 Q1,3 Q2,3 Q3,3 Q4,3 Q5,3 Q1,4 Q2,4 Q3,4 Q4,4 Q5,4 Q1,5 Q2,5 Q3,5 Q4,5 Q5,5      (47) equations (55)-(56) can be explicitly written as i = 0 : Ŵi,i = Wi,i Q2R+1,2R+1 , Wi,i Q2R+1,j = 0 for j = 2R + 3 − s, · · · , 2R; i = 1 : Ŵi,i = Wi,i Q2R+1,2R+1 , Ŵi,i−1 = Wi,i Q2R+1,2R + Wi,i−1 Q2R+1,2R+1 , Ŵi,i−2 = Wi,i Q2R+1,2R−1 + Wi,i−1 Q2R+1,2R + Wi,i−2 Q2R+1,2R+1 , Wi,i Q2R+1,j + Wi,i−1 Q2R+1,j+1 + Wi,i−2 Q2R+1,j+2 = 0 for j = 2R + 3 − s, · · · , 2R − 2; ··· i = s/2 − 1 : Ŵi,i = Wi,i Q2R+1,2R+1 , ··· Ŵi,i−s+2 = Wi,i Q2R+1,2R+3−s + · · · + Wi,i−s+2 Q2R+1,2R+1 . (54) The relations in (54) are derived using the same strategy in Step 1 by iteratively considering from the (2R + 1)-th to the (2R + 3 − s)-th block-column equation of (45) in a reverse order. Step 3. We will show Ŵs/2 = Ws/2 Q1,1 using the relations in (48) and (54). Denote by Ô2s−3,s/2 (:, s−1) the (s−1)-th block column of the estimate Ô2s−3,s/2 , which is a sub-matrix of Ô2R+1,s/2 . The relations in (48) can be compactly written as:   Q1,s−1   ..   .    Q1,1  , Ô2s−3,s/2 (:, s − 1) = O2s−3,s/2  (55)   0     ..   . 0 while those in (54) can be compactly written as:  0  ..  .   0 Ô2s−3,s/2 (:, s − 1) = O2s−3,s/2   Q2R+1,2R+1   ..  . Q2R+1,2R+3−s       (56)     To illustrate this using the specific example shown in (47), the             0 0 Ĉ 0 0 ˆr CA ˆ CA ˆl CA      Q1,3    Q1,2   = O5,2   Q1,1   0    0     ,             0 0 Ĉ 0 0 ˆr CA ˆ CA ˆl CA     0    0   = O5,2   Q5,5   Q  5,4   Q5,3     .  (57) In view of equations (55) and (56), we can obtain that     Q1,s−1 0     .. ..     . .      Q1,2    0        O2s−3,s/2  Q1,1  = O2s−3,s/2  Q2R+1,2R+1       0 Q2R+1,2R         .. ..     . . 0 Q2R+1,2R+3−s By assumption 3) of the theorem, the matrix O2s−3,s/2 has full column rank. As a result, it can be established from the above equation that Q1,1 = Q2R+1,2R+1 ; Q1,2 = · · · = Q1,s−1 = 0; Q2R+1,2R+3−s = · · · = Q2R+1,2R = 0. (58) Since the block vector Ô2s−3,s/2 (:, s − 1) contains all the block components of Ŵs/2 , we can obtain that Ŵs/2 = Ws/2 Q1,1 . Therefore, the proof is completed. R EFERENCES [1] B. Bamieh, F. Paganini, and M. Dahleh, “Distributed control of spatially invariant systems,” Automatic Control, IEEE Transactions on, vol. 47, pp. 1091–1107, Jul 2002. [2] N. Motee and A. Jadbabaie, “Optimal control of spatially distributed systems,” Automatic Control, IEEE Transactions on, vol. 53, pp. 1616– 1629, Aug 2008. [3] J. Rice and M. Verhaegen, “Distributed control in multiple dimensions: A structure preserving computational technique,” Automatic Control, IEEE Transactions on, vol. 56, pp. 516–530, March 2011. [4] A. Mahajan, N. C. Martins, M. Rotkowitz, and S. Yüksel, “Information structures in optimal decentralized control.,” in CDC, pp. 1291–1306, 2012. [5] M. Wozny and W. Carpenter, “A characteristics approach to parameter identification in distributed systems,” Automatic Control, IEEE Transactions on, vol. 14, pp. 422–422, Aug 1969. [6] D. Gorinevsky and M. Heaven, “Performance-optimized applied identification of separable distributed-parameter processes,” Automatic Control, IEEE Transactions on, vol. 46, pp. 1584–1589, Oct 2001. 15 [7] J. Rice and M. Verhaegen, “Efficient system identification of heterogeneous distributed systems via a structure exploiting extended kalman filter,” Automatic Control, IEEE Transactions on, vol. 56, pp. 1713– 1718, July 2011. [8] T. Bewley and S. Liu, “Optimal and robust control and estimation of linear paths to transition,” Journal of Fluid Mechanics, vol. 365, pp. 305– 349, Jun 25 1998. [9] F. Wu and S. Yildizoglu, “Distributed parameter-dependent modeling and control of flexible structures,” Journal of Dynamic Systems Measurement and Control-Transactions of The ASME, vol. 127, pp. 230–239, Jun 2005. [10] D. G. MacMynowski, R. Heimsten, and T. Andersen, “Distributed Force Control of Deformable Mirrors,” European Journal of Control, vol. 17, pp. 249–260, May-Jun 2011. [11] R. R. Pena, R. D. Fernandez, and R. J. Mantz, “Passivity control via Power Shaping of a wind turbine in a dispersed network,” International Journal of Hydrogen Energy, vol. 39, pp. 8846–8851, May 2014. [12] A. Haber and M. Verhaegen, “Subspace identification of large-scale interconnected systems,” Automatic Control, IEEE Transactions on, vol. 59, pp. 2754–2759, Oct 2014. [13] J. Kulkarni, R. DAndrea, and B. Brandl, “Application of distributed control techniques to the adaptive secondary mirror of cornells large atacama telescope,” in SPIE Astronomical Telescopes and Instrumentation Conf., pp. 750–756, 2002. [14] P. Massioni and M. Verhaegen, “Subspace identification of circulant systems,” Automatica, vol. 44, no. 11, pp. 2825 – 2833, 2008. [15] P. Massioni and M. Verhaegen, “Subspace identification of distributed, decomposable systems,” in Decision and Control, 2009 held jointly with the 2009 28th Chinese Control Conference. CDC/CCC 2009. Proceedings of the 48th IEEE Conference on, pp. 3364–3369, Dec 2009. [16] N. Matni and A. Rantzer, “Low-rank and low-order decompositions for local system identification,” arXiv:1403.7175, 2014. [17] M. Verhaegen, “Subspace techniques in system identification,” Encyclopedia of Systems and Control, pp. 1386–1396, 2015. [18] G. Mercere, O. Prot, and J. Ramos, “Identification of parameterized gray-box state-space systems: From a black-box linear time-invariant representation to a structured one,” Automatic Control, IEEE Transactions on, vol. 59, pp. 2873–2885, Nov 2014. [19] L. Ljung, System Identification: Theory for the user (Second Edition). Prentice Hall PTR, 1999. [20] M. Verhaegen and V. Verdult, Filtering and System Identification: A Least Squares Approach. Cambridge University Press, 2007. [21] Z. Liu, A. Hansson, and L. Vandenberghe, “Nuclear norm system identification with missing inputs and outputs,” Systems and Control Letters, vol. 62, no. 8, pp. 605 – 612, 2013. [22] M. Verhaegen and A. Hansson, “Nuclear norm subspace identification (n2sid) for short data batches,” CoRR abs/1401.4273, 2014. [23] C. Yu and M. Verhaegen, “Subspace identification of distributed clusters of homogeneous systems,” IEEE Transactions on Automatic Control, vol. 62, no. 1, pp. 463–468, 2017. [24] P. Dewilde and A.-J. Van der Veen, Time-varying systems and computations. Springer Science & Business Media, 2013. [25] K. Mohan and M. Fazel, “Reweighted nuclear norm minimization with application to system identification,” in American Control Conference (ACC), 2010, pp. 2953–2959, IEEE, 2010. [26] L.-L. Xie and L. Ljung, “Estimate physical parameters by black box modeling,” in Proceedings of the 21st Chinese Control Conference, pp. 673–677, 2002. [27] C. Yu, M. Verhaegen, S. Kovalsky, and R. Basri, “Identification of structured lti mimo state-space models,” in Decision and Control (CDC), 2015 IEEE 54th Annual Conference on, pp. 2737–2742, IEEE, 2015. [28] G. Strang, “Fast transforms: Banded matrices with banded inverses,” Proceedings of the National Academy of Sciences of the United States of America, vol. 107, no. 28, pp. 12413 – 12416, 2009. [29] S. Choudhary and U. Mitra, “Identifiability scaling laws in bilinear inverse problems,” arXiv preprint arXiv:1402.2637, 2014.
3cs.SY
Symmetric Complete Sum-free Sets in Cyclic Groups Ishay Haviv∗ Dan Levy† arXiv:1703.04118v2 [math.CO] 1 May 2017 May 2, 2017 Abstract We present constructions of symmetric complete sum-free sets in general finite cyclic groups. It is shown that the relative sizes of the sets are dense in [0, 31 ], answering a question of Cameron, and that the number of those contained in the cyclic group of order n is exponential in n. For primes p, we provide a full characterization of the symmetric complete sum-free subsets of Z p of size at least ( 31 − c) · p, where c > 0 is a universal constant. 1 Introduction This paper studies symmetric complete sum-free subsets of finite cyclic groups. Let G be an abelian additive group. A set S ⊆ G is symmetric if x ∈ S implies − x ∈ S. It is complete if for every z ∈ G \ S there exist x, y ∈ S for which x + y = z, and it is sum-free if there are no x, y, z ∈ S satisfying x + y = z. Sum-free sets were first studied by Schur [29], who proved in 1916 that the set of positive integers cannot be partitioned into a finite number of sum-free sets. This result initiated a fruitful line of research, which now, over a century later, is central in the area of additive combinatorics, with applications to several areas of mathematics such as extremal graph theory, Ramsey theory, projective geometry, and model theory (see, e.g., [7, 9, 26, 6]). A fundamental question on sum-free sets is how large can a sum-free subset of a group G be. It is easy to see that the size of a largest sum-free subset of Z contained in [1, n] is dn/2e, attained, for example, by the set of all odd numbers in this range. For the cyclic group G = Z p where p is a prime, the well-known Cauchy-Davenport theorem [12, 14] yields that every sum-free set has size at most b( p + 1)/3c. The sets attaining this bound were explicitly characterized in the late sixties by Yap [31, 32], Diananda and Yap [17], and Rhemtulla and Street [27]. Theorem 1.1 ([31, 17, 32, 27]). Let p be a prime, and let S ⊆ Z p be a sum-free set of maximum size. 1. If p = 3k + 1 for an integer k then |S| = k and S is equal, up to an automorphism, to one of the following sets: [k + 1, 2k], ∗ School † School [k, 2k − 1], and for k ≥ 4, {k} ∪ [k + 2, 2k − 1] ∪ {2k + 1}. of Computer Science, The Academic College of Tel Aviv-Yaffo, Tel Aviv 61083, Israel. of Computer Science, The Academic College of Tel Aviv-Yaffo, Tel Aviv 61083, Israel. 1 (1) 2. If p = 3k + 2 for an integer k then |S| = k + 1 and S is equal, up to an automorphism, to the set [k + 1, 2k + 1]. Note that for p = 3k + 2 the sum-free subsets of Z p of maximum size are symmetric and complete, whereas for p = 3k + 1 only sets of the third type in (1) have these properties. For a general finite abelian group G, the largest size of a sum-free set was determined in 2005 by Green and Ruzsa [22]. Another question of interest is that of counting sum-free sets. Cameron and Erdős conjectured in [11] that the number of sum-free subsets of the integers [1, n] is O(2n/2 ). This conjecture was confirmed independently by Green [20] and by Sapozhenko [28] (see also [2]), improving on Alon [1], Calkin [4], and Erdős and Granville (see [11]). Counting sum-free sets was also considered for finite abelian groups. For the cyclic group Z p with p prime, an essentially tight upper bound of 2 p(1/3+o(1)) was proved by Green and Ruzsa [21], who later extended their result to general finite abelian groups [22]. The task of counting sum-free sets that are maximal with respect to inclusion was addressed in [3]. 1.1 Our Contribution In this paper we present families of complete sum-free subsets of various sizes of the cyclic group Zn of order n. Such sets have found several applications in the literature (see, e.g., [7, 23, 9, 8, 6] and Section 1.2). The first family, studied in Section 3, consists of subsets of Zn whose size is linear in n. These sets include a central symmetric interval and additional elements located symmetrically on its 3 n −1 left and right. Specifically, for s ∈ [ n+ 4 , 3 ] and a set of integers T ⊆ [0, 2t − 1], where t is an appropriately chosen parameter, we consider the set ST ⊆ Zn defined as ST = [n − 2s + 1, 2s − 1] ∪ ±(s + T ) (see Definition 3.1 and Figure 1). We prove sufficient and necessary conditions on the set T for which the set ST is sum-free and complete (see Lemmas 3.2 and 3.3) and refer to the sets T of size t satisfying these conditions as t-special (see Section 3.2). We use the analysis of the sets ST to establish a variety of results, described below. Firstly, we provide a full characterization of the ‘large’ symmetric complete sum-free subsets of Z p for primes p. Namely, we show that for every s ≥ ( 13 − c) · p where c > 0 is a universal constant and p is a sufficiently large prime, the sets ST ⊆ Z p of size s for t-special sets T are, up to automorphisms, all the symmetric complete sum-free subsets of Z p of size s (see Theorem 3.8). This significantly generalizes the characterization of the symmetric complete sum-free sets of maximum size derived from Theorem 1.1. Our proof makes use of a result due to Deshouillers and Lev [16] on the structure of large sum-free subsets of Z p (see Theorem 2.2; see also [25, 15]). Secondly, we consider counting aspects of our characterization result. It is shown that counting the symmetric complete sum-free subsets of Z p of a given size reduces to counting t-special sets for a certain value of t. In the following theorem, g(t) stands for the number of t-special sets (see Section 3.4). Theorem 1.2. There exists a constant c > 0 such that for every sufficiently large prime p and every 1 ≤ r ≤ c · p the following holds. 2 1. If p = 3k + 1 for an integer k then the number of symmetric complete sum-free subsets of Z p of size p −1 k − 2r is 2 · g(3r + 1). 2. If p = 3k + 2 for an integer k then the number of symmetric complete sum-free subsets of Z p of size p −1 k − 2r + 1 is 2 · g(3r ). Lastly, we observe that there is an abundance of t-special sets and derive the following. Theorem 1.3. There exists a constant c > 0 such that for every sufficiently large n there exist at least 2cn symmetric complete sum-free subsets of Zn . In Section 4, we present for a general n a family of symmetric complete sum-free subsets of Zn of various sizes. The construction combines sets ± A, ± B, C, where A is an interval, B is an arithmetic progression, and C is a symmetric interval (see Figure 2). A key property of these sets, used to prove completeness and sum-freeness, is that the sums of the elements from A with the elements from B precisely fill the gaps between the elements of − B. We use our construction to prove that the relative sizes of the symmetric complete sum-free subsets of finite cyclic groups are dense in [0, 13 ]. This answers an open question of Cameron [10] related to a natural probability measure on sum-free sets of positive integers (see [8, 9, 5, 6] and Section 1.2). Theorem 1.4. For every 0 ≤ α ≤ 31 and ε > 0, for every sufficiently large integer n there exists a symmetric complete sum-free set S ⊆ Zn whose size satisfies α−ε ≤ |S| ≤ α + ε. n We also obtain, for a general n, a symmetric complete sum-free subset of Zn of size propor√ tional to n. This matches, up to a multiplicative constant, the smallest possible size of such a set, and extends a result of Hanson and Seyffarth [23] that holds for cyclic groups Zn where n = m2 + 5m + 2 for an integer m. Theorem 1.5. There exists a constant c > 0 such that for every sufficiently large integer n there exists a √ symmetric complete sum-free subset of Zn of size at most c · n. 1.2 Applications We gather here several applications of our results. Random sum-free sets. Cameron introduced in [8] a probability measure on the sum-free subsets of the positive integers. This measure is defined via a process that constructs a random sumfree set R as follows: Go over the positive integers in turn, and join to R, independently with probability 1/2, every element that cannot be expressed as a sum of two elements that are already in R. The question of identifying sets M for which the probability that M contains a random sumfree set is a constant bounded away from 0 was addressed in [8, 9, 5, 6]. For example, it was shown in [8] that the probability of a random sum-free set to consist entirely of odd numbers is 3 about 0.218 (the exact constant is unknown). Conditioned on this event, the density1 of a random sum-free set is almost surely 1/4. The intuitive reason is that if all the elements of the set are odd, then every odd number is unconstrained in the process and is thus joined to the set independently with probability 1/2. For a subset S of Zn , let MS be the set of all positive integers that are equal modulo n to elements from S. Cameron proved in [8] that for every complete sum-free subset S of Zn the probability that a random sum-free set is contained in MS is nonzero (see also an extension by Calkin [5]). Conditioned on this event, it can be seen that the density of a random sum-free set is almost surely |S|/(2n). Cameron asked in [10] (see also [9]) whether the set n |S| 2n S is a complete sum-free subset of Zn , n ≥ 1 o is dense in the interval [0, 61 ]. Our Theorem 1.4 answers this question in the affirmative. Regular triangle-free graphs with diameter 2. A nice application of symmetric complete sumfree sets of ‘small’ size comes from the following graph theory question: For an integer n, what is the smallest d for which there exists an n vertex d-regular triangle-free graph of diameter 2? This question was studied by Hanson and Seyffarth [23], who were motivated by a problem of Erdős, Hajnal, and Moon [18] on k-saturated graphs. It was observed in [23] that if S is a symmetric complete sum-free subset of an abelian group G then the Cayley graph associated with G and S is an n vertex d-regular triangle-free graph of pdiameter 2 for n = | G | and d = |S|. The completeness of S easily yields a lower bound of |S| ≥ 2| G | − O(1). As already mentioned, our Theorem 1.5 extends a result of [23] and shows that this lower bound is attained, up to a multiplicative constant, for every cyclic group Zn (see [13] for a construction for a non-cyclic group). Dioid partitions of groups. The motivation for the current work has arrived from the concept of dioid partitions of groups introduced by the authors in [24]. For a group G, written here in multiplicative notation, a partition Π of G is a dioid partition if it satisfies the following properties: 1. For every π1 , π2 ∈ Π, π1 π2 is a union of parts of Π, where π1 π2 is a setwise product. 2. There exists e ∈ Π satisfying eπ = πe = π for every π ∈ Π. 3. For every π ∈ Π, π −1 ∈ Π, where π −1 = { g−1 | g ∈ π }. It is shown in [24] that dioid partitions of a group G naturally define algebraic structures known as dioids (see, e.g., [19]). Dioid partitions of G are provided, for example, by the set of all conjugacy classes of G and by the set of all double cosets of any subgroup of G. For a cyclic group of prime order these examples yield only the two ‘trivial’ partitions { G } and {{ g} | g ∈ G }. However, for a prime p ≥ 5, every symmetric complete sum-free subset S of Z p yields the non-trivial 3-part dioid partition {{0}, S, (S + S) \ {0}} (see [24]). Our results in the current paper illuminate some of the structural and counting aspects of these partitions. 1 The density of a set of positive integers is the limit of the proportion of the numbers in [1, n] that belong to the set, as n tends to infinity. We assume in this discussion that the density of a random sum-free set exists almost surely and refer the interested reader to [10] for more details. 4 2 Preliminaries Symmetry, completeness, and sum-freeness. For an additive group G and sets A, B ⊆ G we denote A + B = { x + y | x ∈ A, y ∈ B}, − A = {− x | x ∈ A}, and A − B = A + (− B). We also denote ± A = A ∪ (− A). The set A is said to be symmetric if A = − A. It is complete if G ⊆ A ∪ ( A + A), and it is sum-free if A ∩ ( A + A) = ∅. Note that each of these three properties is preserved by any automorphism of G. Notice that A is complete and sum-free if and only if A + A = G \ A. The following claim will be used to prove sum-freeness and completeness of sets. Claim 2.1. Let G be an additive group, let G1 ⊆ G be a set satisfying G = G1 ∪ (− G1 ), and let S ⊆ G be a symmetric set. Then, 1. If every x, y ∈ G1 ∩ S satisfy x + y ∈ / S then S is sum-free. 2. If G1 \ S ⊆ S + S then S is complete. Proof: For the first item, let x, y ∈ S and denote z = x + y. We prove that z ∈ / S. If x, y ∈ G1 then by assumption z ∈ / S. If − x, −y ∈ G1 then by assumption −z ∈ / S, which by symmetry of S implies z ∈ / S. Otherwise, without loss of generality, x, −y ∈ G1 . Assume by contradiction that z ∈ S. If z ∈ G1 then x, which equals the sum of −y and z is not in S, a contradiction. Otherwise, −z ∈ G1 and thus −y, which equals the sum of x and −z, is not in S, again a contradiction. For the second item, let z ∈ G \ S. We prove that z ∈ S + S. If z ∈ G1 then by assumption z ∈ S + S. Otherwise, z ∈ − G1 , thus (−z) ∈ G1 \ S, implying that −z ∈ S + S, which by symmetry of S implies that z ∈ S + S as well. Cyclic groups. For an arbitrary integer n ≥ 1, we consider the cyclic group Zn = {0, 1, . . . , n − 1}, with addition modulo n. Every element a ∈ Zn has infinitely many representatives in Z, those of the form a + m · n for m ∈ Z. For integers a ≤ b we denote [ a, b] = {z ∈ Z | a ≤ z ≤ b}. We use the same notation for intervals in Zn , viewing the elements of [ a, b] as representatives of elements of Zn . Note that we use the same addition symbol for both integer addition and addition modulo n. In case of possible ambiguity, we will explicitly mention what the notation means. For a prime p, the group automorphisms of Z p are realized as multiplication modulo p by an element of Z p \ {0}. For d ∈ Z p \ {0} and A ⊆ Z p the set d · A ⊆ Z p is said to be a dilation of A. Large sum-free sets of cyclic groups of prime order. We state below a theorem of Deshouillers and Lev [16] on the structure of large sum-free subsets of Z p for a prime p. Theorem 2.2 ([16]). For every sufficiently large prime p, every sum-free subset S of Z p of size |S| ≥ 0.318p is contained in a dilation of the interval [|S|, p − |S|]. Theorem 2.2 improves previous results of Lev [25] and Deshouillers and Freiman [15]. Dainiak and Sisask independently proved that the constant 0.318 in the theorem cannot get below 0.25 (see, e.g., [30]). Finding the smallest constant for which the statement holds is an interesting open question. 5 3 Large Symmetric Complete Sum-free Sets In this section we present and analyze a construction of ‘large’ symmetric complete sum-free subsets of the cyclic group Zn . 3.1 The Sets ST Consider the following definition. Definition 3.1. Let n and s be integers for which t = (n − 3s + 1)/2 is a positive integer and n ≤ 4s − 3. For a set T ⊆ [0, 2t − 1], let ST ⊆ Zn be the set defined as ST = [n − 2s + 1, 2s − 1] ∪ ±(s + T ). 1 s n − 2s + 1 n−s 2s − 1 s+T n−1 −(s + T ) Figure 1: An illustration of the elements of the set ST . A few remarks are in order. The set ST ⊆ Zn defined above depends on a parameter s and a set T. The definition requires the parameters n and s to satisfy n+3 n−1 ≤s≤ , 4 3 where the upper bound on s follows from t ≥ 1. Notice that the interval [n − 2s + 1, 2s − 1] included in ST is symmetric, thus the set ST is symmetric as well. The set s + T includes | T | elements, which all belong to the interval [s, s + 2t − 1]. By the definition of t we have s + 2t − 1 = n − 2s, hence the elements of s + T are located on the left of the interval [n − 2s + 1, 2s − 1] (see Figure 1). By symmetry, the elements of −(s + T ) are located on its right. This implies that ST ⊆ [s, n − s] and that the size of ST is |ST | = 4s − n − 1 + 2| T |. In the case of | T | = t, which will be of particular interest for us, we have |ST | = s. We consider now the question of what conditions on the set T make the set ST a complete sum-free subset of Zn . The following lemma gives a sufficient and necessary condition on T for sum-freeness of ST . Lemma 3.2 (Sum-freeness of ST ). Let n and s be integers for which t = (n − 3s + 1)/2 is a positive integer and n ≤ 4s − 3, and let T ⊆ [0, 2t − 1] be a set. Then, the set ST ⊆ Zn is sum-free if and only if 2t − 1 ∈ / T + T + T, where the addition in (2) is over the integers. 6 (2) Proof: Denote A = [n − 2s + 1, 2s − 1], and recall that ST = A ∪ ±(s + T ) ⊆ [s, n − s]. Let us consider the elements of ST + ST . Observe that A + A = [2n − 4s + 2, 4s − 2] = [0, 4s − n − 2] ∪ [2n − 4s + 2, n − 1], (3) where for the second equality we have used n ≤ 4s − 3. By t ≥ 1 we have 4s − n − 2 = s − (n − 3s + 1) − 1 = s − 2t − 1 < s, hence, using the symmetry of A and ST , it follows that A + A is disjoint from ST . Denote B = [s, s + 2t − 1], and notice that s + T ⊆ B. The set A + B = [n − s + 1, 3s + 2t − 2] = [n − s + 1, n − 1] = −[1, s − 1] is disjoint from ST , because ST is symmetric and has no intersection with [1, s − 1]. This implies that the sum of A and s + T is disjoint from ST as well. It remains to consider the sums of pairs of elements in ±(s + T ). The sum of s + T and −(s + T ) is contained in ±[0, 2t − 1], which is disjoint from ST because 2t − 1 < 2t = n − 3s + 1 < s. We turn to show that the condition 2t − 1 ∈ / T + T + T holds if and only if the sum of every two elements in s + T does not belong to ST . This would imply that this condition is equivalent to the sum-freeness of ST and thus would complete the proof of the lemma. First, assume that 2t − 1 ∈ / T + T + T, and let s + `1 and s + `2 be two elements of s + T where `1 , `2 ∈ T. Set `3 = 2t − 1 − (`1 + `2 ), and note that the assumption 2t − 1 ∈ / T + T + T implies that `3 ∈ / T. The sum of s + `1 and s + `2 is 2s + `1 + `2 = 2s + (2t − 1 − `3 ) = −(n − 2s − 2t + 1 + `3 ) = −(s + `3 ), (4) so by symmetry of ST it suffices to show that s + `3 ∈ / ST . If `3 ≥ 0 then `3 ∈ [0, 2t − 1], implying s + `3 ∈ B. However, B ∩ ST = s + T, so by `3 ∈ / T it follows that s + `3 is not in ST , as required. Otherwise, `3 < 0, and we claim that in this case s + `3 ∈ [0, s − 1]. Indeed, s + `3 < s, and by `3 ≥ −(2t − 1) we obtain that s + `3 ≥ s − (2t − 1) = 4s − n > 0. Since the interval [0, s − 1] is disjoint from ST , it follows that s + `3 is not in ST , and we are done. For the other direction, assume that 2t − 1 ∈ T + T + T, that is, there exist `1 , `2 , `3 ∈ T such that `3 = 2t − 1 − (`1 + `2 ). By the definition of ST , the elements s + `1 , s + `2 and s + `3 are in ST . As in (4), the sum of the first two is −(s + `3 ), which by symmetry of ST does belong to ST . Hence, the sum of two elements of s + T belongs to ST , as required. We now consider the completeness of ST , that is, the property that every element of Zn belongs to either ST or to ST + ST (or both). The following lemma provides a sufficient and necessary condition on the set T, assuming that s is sufficiently large compared to n. We use here the notation min( T ) for the smallest integer in T. 7 Lemma 3.3 (Completeness of ST ). Let n and s be integers for which t = (n − 3s + 1)/2 is a positive integer and n ≤ 7s/2 − 1, and let T ⊆ [0, 2t − 1] be a nonempty set. Then, the set ST ⊆ Zn is complete if and only if [0, 2t − 1 + min( T )] \ (2t − 1 − T ) ⊆ T + T, (5) where the addition in (5) is over the integers. Proof: Denote m = min( T ) and A = [n − 2s + 1, 2s − 1] as before. By (3), we have [0, 4s − n − 2] ⊆ A + A ⊆ ST + ST . (6) In addition, we have s + m ∈ s + T ⊆ ST and (s + m) + A = [n − s + m + 1, 3s + m − 1] = −[n − 3s − m + 1, s − m − 1]. By symmetry of ST this implies that [n − 3s − m + 1, s − m − 1] ⊆ ST + ST . (7) n − 3s − m + 1 ≤ n − 3s + 1 ≤ 4s − n − 1, (8) Observe that where the second inequality follows from the assumption n ≤ 7s/2 − 1. Combining (6), (7) and (8), we obtain that [0, s − m − 1] ⊆ ST + ST . Since the interval A starts at n − 2s + 1, using the symmetry of ST , it follows that Zn ⊆ ST ∪ (ST + ST ) if and only if [s − m, n − 2s] ⊆ ST ∪ (ST + ST ). The interval [s − m, n − 2s] does not intersect the following sets: • A, because n − 2s < n − 2s + 1; • −(s + T ), because −(s + T ) ⊆ [n − s − (2t − 1), n − s] and n − 2s < 2s = n − s − (2t − 1); • A + A, by (3) and the fact that 4s − n − 2 = s − 2t − 1 < s − (2t − 1) ≤ s − m; • (s + T ) + (s + T ), because this set is contained in [2s, 2s + 4t − 2], and n − 2s < 2s; • (s + T ) − (s + T ), because this set is contained in ±[0, 2t − m − 1], and 2t − m − 1 = n − 3s − m < s − m; • (s + T ) + A, because this set is contained in s + [m, 2t − 1] + A = [s + m, s + 2t − 1] + A = [n − s + m + 1, 3s + 2t − 2], and n − 2s < n − s + m + 1; 8 • −(s + T ) + A, because this set is contained in −(s + [m, 2t − 1] + A) = [n − 3s − 2t + 2, s − m − 1], and s − m − 1 < s − m. Therefore, the only way for the elements of [s − m, n − 2s] to be in ST ∪ (ST + ST ) is to belong to either s + T or to −(s + T ) − (s + T ) = −2s − ( T + T ) = n − 2s − ( T + T ). The condition [s − m, n − 2s] ⊆ (s + T ) ∪ (n − 2s − ( T + T )) is equivalent to [0, n − 3s + m] ⊆ ( T + m) ∪ (n − 3s + m − ( T + T )), which by the definition of t is equivalent to [0, 2t − 1 + m] ⊆ ( T + m) ∪ (2t − 1 + m − ( T + T )), and the latter, using the fact that [0, a] = a − [0, a], is equivalent to the condition in the lemma, so we are done. 3.2 Special Sets We now turn to identify the sets T for which ST is a complete sum-free subset of Zn of size s (see Definition 3.1). Lemmas 3.2 and 3.3 supply the required conditions on T for sum-freeness and completeness of ST . Recall that the size of ST is s whenever | T | = t. This leads us to the notion of t-special sets given below. Definition 3.4. For an integer t ≥ 1 we say that a set T ⊆ [0, 2t − 1] is t-special if it satisfies 1. | T | = t, 2. 2t − 1 ∈ / T + T + T, and 3. [0, 2t − 1 + min( T )] \ (2t − 1 − T ) ⊆ T + T. Note that the addition is over the integers. The following simple claim shows that in case that 0 ∈ T the first and second conditions in Definition 3.4 imply the third. Claim 3.5. For every integer t ≥ 1 and a set T ⊆ [0, 2t − 1] satisfying 0 ∈ T, if | T | = t and 2t − 1 ∈ / T + T + T then T is t-special. Proof: Assume that 0 ∈ T, | T | = t and 2t − 1 ∈ / T + T + T. We claim that for every ` ∈ [0, t − 1] exactly one of the elements ` and 2t − 1 − ` belongs to T. Indeed, the elements ` and 2t − 1 − ` cannot both belong to T as their sum, together with 0 ∈ T, is 2t − 1, which does not belong to T + T + T. In addition, if T does not contain one of ` and 2t − 1 − ` for some ` ∈ [0, t − 1] then its size cannot reach t. It follows that every ` ∈ [0, 2t − 1] for which 2t − 1 − ` ∈ / T satisfies ` = ` + 0 ∈ T + T. This implies that [0, 2t − 1] \ (2t − 1 − T ) ⊆ T + T, hence T is t-special. 9 Remark 3.6. It is easy to notice that for every t ≥ 1 there exist t-special sets. For example, the set {0} ∪ [t, 2t − 2] and the set of even elements in [0, 2t − 1] are t-special, as is easy to verify using Claim 3.5. Combining Lemmas 3.2 and 3.3 with the fact that |ST | = s if and only if | T | = t, we obtain the following result. Theorem 3.7. Let n and s be integers for which t = (n − 3s + 1)/2 is a positive integer and n ≤ 7s/2 − 1, and let T ⊆ [0, 2t − 1] be a set. Then, T is t-special if and only if ST is a complete sum-free subset of Zn of size s. 3.3 Characterizing the Large Symmetric Complete Sum-free Sets in Z p Consider the cyclic group Z p for a prime p. We provide a characterization, based on Definitions 3.1 and 3.4, of the symmetric complete sum-free subsets of Z p of a given size s for large values of s. By ‘large’ we mean that s ≥ ( 13 − c) · p for a universal constant c > 0 (the proof will give s ≥ 0.318p). Recall that the maximum possible size of such a set is b( p + 1)/3c, making the restriction on s quite natural. Theorem 3.8. There exists a constant c > 0 such that for every sufficiently large prime p and an integer s, for which t = ( p − 3s + 1)/2 is a positive integer satisfying t ≤ c · p, the following holds. The symmetric complete sum-free subsets of Z p of size s are precisely all the dilations of the sets ST for t-special sets T ⊆ [0, 2t − 1]. Note that Theorem 3.8 characterizes the symmetric complete sum-free subsets of Z p of size s for every possible size s of such a set satisfying p(1 − 2c) + 1 p−1 ≤s≤ , 3 3 (9) where c > 0 is the constant in Theorem 3.8. Indeed, the size of every symmetric sum-free subset of Z p , for a prime p > 2, is even. For an even s satisfying (9) the number t = ( p − 3s + 1)/2 is an integer with 1 ≤ t ≤ c · p. The fact that the sets ST for t-special sets T ⊆ [0, 2t − 1] are symmetric complete sum-free subsets of Z p already follows from Theorem 3.7. This immediately implies that their dilations have these properties as well. Hence, to complete the proof of Theorem 3.8 it suffices to show that these are the only sets with those properties. This is the goal of the following lemma. Lemma 3.9. There exists a constant c > 0 such that for every sufficiently large prime p and an integer s, for which t = ( p − 3s + 1)/2 is a positive integer satisfying t ≤ c · p, the following holds. Every symmetric complete sum-free subset of Z p of size s is a dilation of a set ST where T ⊆ [0, 2t − 1] is t-special. Proof: Let S ⊆ Z p be a symmetric complete sum-free set of size |S| = s. Define c = 0.023 (the constant satisfying 31 · (1 − 2c) = 0.318). By the definition of t, the assumption t ≤ c · p implies that p − 2t + 1 p(1 − 2c) + 1 s= ≥ ≥ 0.318p. 3 3 10 Theorem 2.2 implies that the sum-free set S is contained in a dilation of the interval C = [s, p − s]. As the statement of our lemma is invariant under dilations, we can assume that S ⊆ C. Observe that C + C = [2s, 2p − 2s] = [0, p − 2s] ∪ [2s, p − 1]. By S ⊆ C we have S + S ⊆ C + C, so the completeness of S implies that Z p \ (C + C ) ⊆ S, that is, [ p − 2s + 1, 2s − 1] ⊆ S. Thus we have identified 4s − p − 1 elements of S. The remaining s − (4s − p − 1) = 2t elements of S belong to [s, p − 2s] ∪ [2s, p − s], so by symmetry they are fully defined by the t elements of S in [s, p − 2s]. Denote the elements of S ∩ [s, p − 2s] by s + T where T ⊆ [0, 2t − 1]. This yields that S is equal to a set ST as given in Definition 3.1 where | T | = t. Applying Theorem 3.7 we obtain that T is t-special, as desired. 3.3.1 Symmetric Complete Sum-free Sets of Almost Maximum Size For a prime p, Theorem 3.8 essentially reduces the task of computing the symmetric complete sum-free subsets of Z p of a given size to that of computing the corresponding t-special sets. We demonstrate this reduction below and derive an explicit characterization of the symmetric complete sum-free subsets of Z p of ‘almost maximum size’, that is, size smaller by 2 than the maximum size of such a subset. For a prime p = 3k + 1 set s = k − 2, and notice that t = ( p − 3s + 1)/2 = 4. It is easy to verify that the 4-special sets T ⊆ [0, 7] are {0, 4, 5, 6}, {0, 2, 4, 6}, {0, 3, 5, 6}, {1, 2, 6, 7}. For every such T this gives us the following symmetric complete sum-free subset of Z p : ((k − 2) + T ) ∪ [k + 6, 2k − 5] ∪ ((2k + 3) − T ). Assuming that p is sufficiently large, the dilations of these sets are the only symmetric complete sum-free subsets of Z p of size k − 2. Similarly, for a prime p = 3k + 2 set s = k − 1, and notice that t = ( p − 3s + 1)/2 = 3. The 3-special sets T ⊆ [0, 5] are {0, 2, 4}, {0, 3, 4}. For every such T this gives us the following symmetric complete sum-free subset of Z p : ((k − 1) + T ) ∪ [k + 5, 2k − 3] ∪ ((2k + 3) − T ). Again, assuming that p is sufficiently large, the dilations of these sets are the only symmetric complete sum-free subsets of Z p of size k − 1. 11 3.4 Counting the Large Symmetric Complete Sum-free Sets We now consider the question of estimating the number of symmetric complete sum-free subsets of Z p of a given size s. For every t ≥ 1 denote the number of t-special sets by g(t). We prove below Theorem 1.2 that reduces counting the symmetric complete sum-free subsets of Z p of size s to computing g(t) for an appropriately chosen value of t. Proof of Theorem 1.2: Let p = 3k + 1 be a sufficiently large prime. For an integer r ≥ 1, denote s = k − 2r and t = ( p − 3s + 1)/2 = 3r + 1. Assuming that r ≤ c · p for a sufficiently small c, Theorem 3.8 implies that the symmetric complete sum-free subsets of Z p of size s are the dilations of the sets ST for the t-special sets T. We first prove that for every 2 ≤ d ≤ p − 2 and every t-special sets T and T 0 (including the case T = T 0 ) it holds that ST 6= d · ST 0 . By the symmetry of ST we may assume 2 ≤ d ≤ ( p − 1)/2. Consider the interval D = [−(s − 1), s − 1], and notice that | D | = 2s − 1 = 2(k − 2r ) − 1 ≥ 2(k − 2cp) − 1 ≥ 2 3  − 5c p ≥ d, where the last inequality holds for a sufficiently small c. Consider the set E = d · [ p − 2s + 1, 2s − 1] ⊆ d · ST 0 , whose elements form an arithmetic progression of difference d. As D is disjoint from ST , it suffices to show that D intersects E. Assume by contradiction that D does not include any element of E. By | D | ≥ d it follows that D does not include any element located between two consecutive elements of E as well. This implies that [d( p − 2s + 1), d(2s − 1)] is an interval disjoint from D. As its size is d(4s − p − 2) + 1, it follows that the total number of elements in the group is at least d(4s − p − 2) + 1 + | D | ≥ 2(4s − p − 2) + 1 + (2s − 1) = 10s − 2p − 4 = 10(k − 2r ) − 2(3k + 1) − 4 = 4k − 20r − 6 ≥ 4 3  − 21c p > p, where for the last two inequalities we again assume that c is sufficiently small. This clearly gives a contradiction. Now, for every t-special set T we have to count the ( p − 1)/2 dilations of ST , hence the total number of symmetric complete sum-free subsets of Z p of size s is ( p − 1)/2 times the number of (3r + 1)-special sets, as required. The proof of the second item is essentially identical. Here, for p = 3k + 2 and s = k − 2r + 1 we have t = ( p − 3s + 1)/2 = 3r. 3.4.1 Counting Special Sets Motivated by Theorem 1.2, we would like to understand the behavior of the number g(t) of tspecial sets as a function of t. While g(t) is trivially bounded from above by (2tt) < 22t , the following claim bounds g(t) from below and shows that it grows exponentially in t. Claim 3.10. For every integer t ≥ 1, g(t) ≥ 2bt/3c . 12 Proof: For every set I ⊆ [d2t/3e, t − 1] consider the set TI defined as TI = {0} ∪ I ∪ {2t − 1 − i | d2t/3e ≤ i ≤ t − 1, i ∈ / I } ∪ [2t − d2t/3e, 2t − 2]. Equivalently, the set TI consists of {0} ∪ I and every element 2t − 1 − i for i ∈ [0, t − 1] with i∈ / {0} ∪ I. As there are 2bt/3c possibilities for the set I, each of which gives a different TI , it suffices to verify that those sets TI are t-special. The set TI includes 0 and has size t. By Claim 3.5, it suffices to prove that no three elements of TI have sum 2t − 1. If the three elements are nonzero then their sum is at least 2t. If exactly one of them is zero, then the sum of the other two cannot equal to 2t − 1 because TI includes exactly one of i and 2t − 1 − i for every i ∈ [0, t − 1]. Finally, if at least two of the elements are zeros then their sum with the third is at most 2t − 2, and we are done. It is easy to derive now that the number of symmetric complete sum-free subsets of Zn is exponential in n, confirming Theorem 1.3. Proof of Theorem 1.3: For a sufficiently large n, let s be the smallest integer for which n ≤ 7s/2 − 1 and t = (n − 3s + 1)/2 is a positive integer. Notice that for this choice we have bt/3c ≥ c · n for some universal constant c (any c < 1/42 would suffice). By Theorem 3.7, for every t-special set T ⊆ [0, 2t − 1] the set ST is a symmetric complete sum-free subset of Zn . By Claim 3.10 there are at least 2bt/3c ≥ 2cn t-special sets T, and since each of them defines a different ST , we are done. 4 Symmetric Complete Sum-free Sets of Various Sizes In this section we present a construction of symmetric complete sum-free subsets of the cyclic group Zn that yields such sets with various sizes, confirming Theorems 1.4 and 1.5. Let t ≥ 1, d ≥ 2 and k ≥ 4 be integers, and let n be one of the following two integers 4dk + 6t − 11, 4dk + 6t − 14. (10) Note that every sufficiently large integer n can be expressed as one of these two numbers for certain choices of the parameters. Consider the following three subsets of Zn : • A = [ 21 (d n2 e + t + 1), 12 (d n2 e + t + 1) + d − 2], n o • B = 12 (d n2 e + t + 1) + 2d − 2 + i · d 0 ≤ i ≤ k − 4 , and • C = [b n2 c − t, d n2 e + t]. Define the set (n) St,d,k = (± A) ∪ (± B) ∪ C. Note that A is an interval of length d − 1 and that B is an arithmetic progression of difference d that includes k − 3 elements, all located on the right of the elements of A (see Figure 2). The set C is a symmetric interval in Zn , whose size |C | is 2t + 1 if n is even and 2t + 2 if n is odd. It follows (n) from the definition that the set St,d,k is also symmetric in Zn . 13 A 1 n 4 + d d d d n 2 t 2 C 2d 2d n 2 −t d d d d −A +t −B B 3n 4 − t 2 n−1 (n) Figure 2: An illustration of the elements of the set St,d,k . Some additive constants are omitted. A simple calculation shows, for the two possible values of n given in (10), that the last element of B, denoted bl , satisfies jnk − t − 2d + 2. (11) bl = 2 Indeed, for n = 4dk + 6t − 11 we have dn/2e = 2dk + 3t − 5 and bn/2c = 2dk + 3t − 6, hence  1 l n m bl = + t + 1 + 2d − 2 + (k − 4) · d 2 2 1 = (2dk + 4t − 4) + 2d − 2 + (k − 4) · d 2 jnk − t − 2d + 2. = 2dk + 2t − 2d − 4 = 2 For n = 4dk + 6t − 14 the equality is obtained similarly. It follows that bl < bn/2c − t, hence the elements of B are all located on the left of those of C (see Figure 2). In particular, we obtain that the sets ± A, ± B, C, considered modulo n, are pairwise disjoint, implying that (n) |St,d,k | = 2| A| + 2| B| + |C | = 2(d + k − 4) + |C |. (12) Observe that the sets − A and − B can be explicitly written as 1 3n • − A = [ 21 (b 3n 2 c − t − 1) − d + 2, 2 (b 2 c − t − 1)] and n o • − B = d n2 e + t + 2d − 2 + i · d 0 ≤ i ≤ k − 4 , where for − B we have used (11). The main result of this section is the following. Theorem 4.1. For all integers t ≥ 1, d ≥ 2, k ≥ 4 and n ∈ {4dk + 6t − 11, 4dk + 6t − 14} such that (n) |C | ≥ d (that is, d ≤ 2t + 1 if n is even and d ≤ 2t + 2 if n is odd), the set St,d,k is a symmetric complete sum-free subset of Zn . In order to prove the theorem one has to show that every element of Zn belongs to exactly (n) (n) (n) one of St,d,k and St,d,k + St,d,k . We start with the following claim that shows that the sum A + B precisely fills the gaps between the elements of the arithmetic progression − B. Claim 4.2. The sets − B and A + B are disjoint and their union is hl n m  i 1 j 3n k + t + 2d − 2, −t−1 −d+1 . 2 2 2 14 Proof: The set − B is an arithmetic progression of difference d and length k − 3 starting at d n2 e + t + 2d − 2. The set A is a d − 1 length interval, so adding it to the arithmetic progression B results in a pairwise disjoint union of k − 3 shifts of A. The first element of A + B is   1 l n m   lnm 1 l n m +t+1 + + t + 1 + 2d − 2 = + t + 2d − 1, 2 2 2 2 2 i.e., the consecutive to the first element of − B. Hence, A + B precisely consists of the intervals of length d − 1 that fill the gaps between the elements of − B and one more interval that follows the last element of − B. Hence, the sets − B and A + B are disjoint, and their union is an interval starting at the first element of − B. The last element of this interval is the last element of A + B which equals  1 l n m 2   j n k   1 j 3n k +t+1 +d−2 + − t − 2d + 2 = − t − 1 − d + 1, 2 2 2 2 where we have used (11) and the fact that 1 2 · d n2 e + b n2 c = 1 2 · b 3n 2 c. In the following claim we consider the set B + C. Claim 4.3. If |C | ≥ d then the set B + C is h 1 j 3n k 2  i − t + 1 + 2d − 2, n − 2d + 2 . 2 Proof: As | B| = k − 3 and C is an interval, B + C is a union of k − 3 intervals, each of which is a shift of C by an element of B. Since B is an arithmetic progression of difference d, each of these intervals is a shift by d of the previous interval, and since |C | ≥ d, these shifts overlap, so B + C is itself an interval. Its first element is  1 l n m   j n k   1 j 3n k + t + 1 + 2d − 2 + −t = − t + 1 + 2d − 2, 2 2 2 2 2 and the last one, using (11), is j n k  l n m  − t − 2d + 2 + + t = n − 2d + 2, 2 2 so we are done. We are now ready to prove Theorem 4.1. (n) Proof of Theorem 4.1. Denote S = St,d,k = (± A) ∪ (± B) ∪ C. Assume that |C | ≥ d. The proof is given in the following two lemmas. Lemma 4.4. The set S ⊆ Zn is complete. Proof: We shall prove that Zn ⊆ S ∪ (S + S). By Claim 2.1, using the symmetry of S and the fact that 0 ∈ / S, it suffices to prove that every element of [b n2 c, n − 1] is in either S or S + S. This is shown via the following steps: • [b n2 c, d n2 e + t]: This set is contained in C ⊆ S. 15 • [d n2 e + t + 1, d n2 e + t + 2d − 3]: Observe that this set is equal to A + A ⊆ S + S. • [d n2 e + t + 2d − 2, 21 (b 3n 2 c − t − 1) − d + 1]: By Claim 4.2, this set is the union of − B and A + B, and is thus contained in S ∪ (S + S). 1 3n • [ 12 (b 3n 2 c − t − 1) − d + 2, 2 (b 2 c − t − 1)]: This set is equal to − A ⊆ S. 1 3n • [ 12 (b 3n 2 c − t + 1), 2 (b 2 c − t + 1) + d + |C | − 3]: Observe that this set is equal to A + C ⊆ S + S. • [ 12 (b 3n 2 c − t + 1) + d + |C | − 2, n − 2d + 2]: By Claim 4.3, using |C | ≥ d, this interval is contained in B + C ⊆ S + S. • [n − 2d + 3, n − d] : For d = 2 this set is empty. For d ≥ 3 it is contained in the interval [n − 2d + 2, n − d], obtained by adding to A the negative of the first element of B, and is thus contained in S + S. • [n − d + 1, n − 1] : Observe that by |C | ≥ d we have jnk 2 − 2t ≤ n − d + 1, 2 hence this set is contained in [2b n2 c − 2t, n − 1] ⊆ C + C ⊆ S + S. This completes the proof of the lemma. Lemma 4.5. The set S ⊆ Zn is sum-free. Proof: By Claim 2.1, using the symmetry of S and C, it suffices to verify that each of the sets A + A, A + B, B + B, B + C, A + C, and C + C has an empty intersection with S. We verify this below: • The set A + A is equal to [d n2 e + t + 1, d n2 e + t + 2d − 3], hence its elements are located immediately after C and before the first element −bl of − B, so they do not belong to S. • By Claim 4.2, the set A + B is equal to [d n2 e + t + 2d − 2, 12 (b 3n 2 c − t − 1) − d + 1] \ (− B ), hence its elements are located after C, before − A, and do not include elements of − B, so they do not belong to S. • The set B + B is a sum of an arithmetic progression of difference d and length k − 3 with itself, hence it forms an arithmetic progression of difference d of length 2k − 7. The first element of B + B is d n2 e + t + 4d − 3, located on the right of C, and its last element, using (11), is 2b n2 c − 2t − 4d + 4 < n. Hence, it suffices to verify that B + B does not intersect − B and − A. The first element of − B is d n2 e + t + 2d − 2. Observe that it differs from the first element of B + B by 2d − 1, which is not divisible by d. Since − B is an arithmetic progression of difference d, it follows that B + B does not intersect it. Now, let a0 denote the first element of A. Using (11), the sum of the first and last elements of B is  1 l n m   j n k   1 j 3n k + t + 1 + 2d − 2 + − t − 2d + 2 = − t + 1 = − a0 + 1. 2 2 2 2 2 16 This implies that the element consecutive to the interval − A = [− a0 − d + 2, − a0 ] lies in B + B. Since the size of − A is d − 1 and the arithmetic progression B + B has difference d, we get that B + B does not intersect − A. • By Claim 4.3, the set B + C is equal to [ 12 (b 3n 2 c − t + 1) + 2d − 2, n − 2d + 2], hence its elements are located on the right of − A and do not belong to S. 1 n • The set A + C is equal to [ 21 (b 3n 2 c − t + 1), 2 (3d 2 e + 3t + 1) + d − 2]. It can be verified that the values of n in (10) satisfy that the right edge of the interval is smaller than n. Hence, its elements are located on the right of − A and do not belong to S. • The set C + C is equal to [0, |C | − 1] ∪ [n − |C | + 1, n − 1]. By (10), it is clear that n ≥ 6t + 18, hence the first element of A satisfies  1 l n m 1 a0 = + t + 1 ≥ (4t + 10) = 2t + 5 > |C |. 2 2 2 It follows that the elements of C + C are located on the left of A and on the right of − A, so they do not belong to S. This completes the proof of the lemma. We can now show that for every sufficiently large integer n there exist symmetric complete sum-free subsets of Zn of various sizes. Theorem 4.6. There exist constants c1 , c2 , c3 > 0 such that for every sufficiently large integer n there exists a collection of symmetric complete sum-free subsets of Zn whose sizes form an arithmetic progression √ √ √ with first element at most c1 · n, difference at most c2 · n, and last element at least n3 − c3 · n. √ Proof: Let n be a sufficiently large integer. Define d0 to be the unique integer in b nc − {0, 1, 2} √ √ that satisfies d0 = 1 (mod 3), and notice that n − 3 ≤ d0 ≤ n. Define a = 11 if n is odd and a = 14 if n is even. As n is sufficiently large, one can write n = 2m − a for a positive integer m. Let m0 be the integer satisfying m0 = m (mod 2d0 ) and 0 ≤ m0 < 2d0 . The choice of d0 guarantees that 3 divides one of m0 + 2d0 , m0 + 4d0 , m0 + 6d0 . Denote by 3t0 the one divided by 3, and notice that √ √ 2d0 ≤ 3t0 ≤ 8d0 , implying 2 n/3 − 2 ≤ t0 ≤ 8 n/3 and d0 ≤ 2t0 + 1. As m = 3t0 (mod 2d0 ), it follows that there exists an integer k0 for which m = 2d0 k0 + 3t0 , thus n = 4d0 k0 + 6t0 − a. (13) Using again the assumption that n is sufficiently large, we have t0 ≥ 1, d0 ≥ 2, k0 ≥ 4 and √ k0 ≤ n/(4d0 ) ≤ n/3. Applying Theorem 4.1 to the integers t0 , d0 , k0 , we get that there exists a symmetric complete sum-free subset of Zn , whose size s, using (12), satisfies s = 2(d0 + k0 + t0 ) − 7 √ if n is even and s = 2(d0 + k0 + t0 ) − 6 if n is odd. In both cases we have s ≤ c1 · n for a universal constant c1 > 0. j k Now, define b = k03−4 . For every integer 0 ≤ i ≤ b denote k i = k0 − 3 · i and ti = t0 + 2d0 · i. Observe, using (13), that for every such i we have n = 4d0 k i + 6ti − a, k i ≥ k0 − 3b ≥ 4, and d0 ≤ 2ti + 1. Applying Theorem 4.1 to the integers ti , d0 , k i , we get that there exists a symmetric 17 complete sum-free subset of Zn , whose size, as follows from (12), is s + i · 2(2d0 − 3). Denote √ r = 2(2d0 − 3), and notice that r ≤ c2 · n for a universal constant c2 > 0. The integers s + i · r, for 0 ≤ i ≤ b, form an arithmetic progression, each of its elements is a size of a symmetric complete sum-free subset of Zn . To complete the proof, observe that its last element satisfies s+b·r ≥ √ k0 − 6 1 n · 2(2d0 − 3) = (4d0 k0 − 24d0 − 6k0 + 36) ≥ − c3 · n 3 3 3 for a universal constant c3 > 0, and we are done. Theorem 1.5 is an immediate consequence of Theorem 4.6. We turn to derive Theorem 1.4. Proof of Theorem 1.4: Let 0 ≤ α ≤ 31 and ε > 0 be fixed constants. Let n be a sufficiently large integer. By Theorem 4.6, for universal constants c1 , c2 , c3 > 0, there exists a collection of symmetric complete sum-free subsets of Zn whose sizes form an arithmetic progression with first element at √ √ √ most c1 · n, difference at most c2 · n, and last element at least n3 − c3 · n. Let S be a set in this collection whose size is closest to α · n. Then, for c = max(c1 , c2 /2, c3 ), we have α·n−c· √ n ≤ |S| ≤ α · n + c · √ n. √ Assuming that n is sufficiently large, so that ε ≥ c/ n, it follows that α−ε ≤ |S| ≤ α + ε, n as required. Acknowledgements We thank Peter Cameron, Grahame Erskine, David Grynkiewicz, Sarah Hart, Karen Seyffarth and Olof Sisask for their kind help with the literature and for useful discussions. References [1] N. Alon. Independent sets in regular graphs and sum-free subsets of abelian groups. Israel Journal of Mathematics, 73(2):247–256, 1991. [2] N. Alon, J. Balogh, R. Morris, and W. Samotij. A refinement of the Cameron-Erdős conjecture. Proc. London Math. Soc., 108(1):44–72, 2014. [3] J. Balogh, H. Liu, M. Sharifzadeh, and A. Treglown. A sharp bound on the number of maximal sum-free sets. Electronic Notes in Discrete Mathematics, 49:57–64, 2015. Preliminary version in EuroComb 2015. [4] N. J. Calkin. On the number of sum-free sets. Bull. London Math. Soc., 22(2):141–144, 1990. [5] N. J. Calkin. On the structure of a random sum-free set of positive integers. Discrete Mathematics, 190(1-3):247–257, 1998. 18 [6] N. J. Calkin and P. J. Cameron. Almost odd random sum-free sets. Combinatorics, Probability and Computing, 7(1):27–32, 1998. [7] P. J. Cameron. Four lectures on projective geometry. In C. Baker and L. Batten, editors, Finite Geometries, volume 103, pages 27–63. New York: Marcel Dekker, 1984. [8] P. J. Cameron. On the structure of a random sum-free set. Probability Theory and Related Fields, 76(4):523–531, 1987. [9] P. J. Cameron. Portrait of a typical sum-free set. In C. Whitehead, editor, Surveys in Combinatorics 1987, volume 123, pages 13–42. Cambridge Univ. Press, 1987. [10] P. J. Cameron. Another sum-free set problem (Peter Cameron’s Blog), 2010. Available at https://cameroncounts.wordpress.com/2010/03/07/another-sum-free-set-problem/. [11] P. J. Cameron and P. Erdős. On the number of sets of integers with various properties. In R. A. Mollin, editor, Number Theory: Proceedings of the First Conference of the Canadian Number Theory Association, pages 61–79. 1990. [12] A. Cauchy. Recherches sur les nombres. J. École Polytech, 40:99–116, 1813. [13] W. E. Clark and J. Pedersen. Sum-free sets in vector spaces over GF (2). Journal of Combinatorial Theory, Series A, 61(2):222 – 229, 1992. [14] H. Davenport. On the addition of residue classes. J. London Math. Soc., 10:30–32, 1935. [15] J.-M. Deshouillers and G. A. Freiman. On sum-free sets modulo p. Funct. Approx. Comment. Math., 35(1):51–59, 2006. [16] J.-M. Deshouillers and V. F. Lev. A refined bound for sum-free sets in groups of prime order. Bull. Lond. Math. Soc., 40(5):863–875, 2008. [17] P. Diananda and H. Yap. Maximal sum-free sets of elements of finite groups. Proc. Japan Acad., 45:1–5, 1969. [18] P. Erdős, A. Hajnal, and J. W. Moon. A problem in graph theory. The American Mathematical Monthly, 71(10):1107–1110, 1964. [19] M. Gondran and M. Minoux. Graphs, Dioids and Semirings: New Models and Algorithms. Operations Research/Computer Science Interfaces Series, Springer, 2010. [20] B. Green. The Cameron-Erdős conjecture. Bull. London Math. Soc., 36(6):769–778, 2004. [21] B. Green and I. Z. Ruzsa. Counting sumsets and sum-free sets modulo a prime. Studia Scientiarum Mathematicarum Hungarica, 41(3):285–293, 2004. [22] B. Green and I. Z. Ruzsa. Sum-free sets in abelian groups. Israel Journal of Mathematics, 147(1):157–188, 2005. [23] D. Hanson and K. Seyffarth. k-saturated graphs of prescribed maximum degree. Congressus Numerantium, 44:127–138, 1984. 19 [24] I. Haviv and D. Levy. Dioid partitions of groups. 2017. In preparation. [25] V. F. Lev. Large sum-free sets in Z/pZ. Israel Journal of Mathematics, 154(1):221–233, 2006. [26] G. Payne. A solution to a problem of Cameron on sum-free complete sets. Journal of Combinatorial Theory, Series A, 70(2):305 – 312, 1995. [27] A. H. Rhemtulla and A. P. Street. Maximal sum-free sets in finite abelian groups. Bull. Austral. Math. Soc., 2:289–297, 1970. [28] A. Sapozhenko. The Cameron-Erdős conjecture. Dokl. Akad. Nauk, 393(6):749–752, 2003. [29] I. Schur. Über die kongruenz x m + ym ≡ zm (mod p). Jahresbericht der Deutschen MathematikerVereinigung, 25:114–117, 1916. [30] O. Sisask. Combinatorial properties of large subsets of abelian groups. PhD thesis, University of Bristol, 2009. [31] H. P. Yap. The number of maximal sum-free sets in C p . Nanta Math., 2(1):68–71, 1968. [32] H. P. Yap. Structure of maximal sum-free sets in C p . Acta Arithmetica, 17(1):29–35, 1970. 20
4math.GR
Local Search Methods for Fast Near Neighbor Search E.S. Telleza,b , G. Ruizc , E. Chavez∗,d , M. Graffa,b arXiv:1705.10351v2 [cs.DS] 31 May 2017 a CONACyT Consejo Nacional de Ciencia y Tecnologı́a, Dirección de Cátedras, Insurgentes Sur 1582, Crédito Constructor 03940, Ciudad de México, México. b INFOTEC Centro de Investigación e Innovación en Tecnologı́as de la Información y Comunicación, Circuito Tecnopolo Sur No 112, Fracc. Tecnopolo Pocitos II, Aguascalientes 20313, México. c Universidad Michoacana de San Nicolás de Hidalgo, México d Centro de Investigación Cientı́fica y de Educación Superior de Ensenada, Baja California, México. Abstract Near neighbor search (NNS) has been traditionally addressed from an algorithmic perspective, that is, given a dataset and a distance function, the goal is to build a data structure along with discarding rules that quickly find the near neighbor of a query under the given distance function. In this manuscript, we take another approach. We restate NNS as a combinatorial optimization problem, being the goal to minimize the distance from the query to the data set. This cost function is well defined, and the minimum is realized precisely with the nearest object to the query. Adopting this new view allows the use of a rich collection of optimization algorithms with a long tradition. We present three local search algorithms that solve the NNS problem from the combinatorial optimization point of view. Two of the algorithms can be described as the hyper-parameter optimization of two known indexing methods, simplifying their adoption for final users. The third method achieves excellent search tradeoffs among speed, memory, and quality of the approximation. For instance, for moderately large dimensions, our indexes can reach above 0.99 recall reviewing less than 1% of the database. We conducted extensive experimentation with five real-world standard benchmark and five synthetic datasets to prove our claims. Key words: Near neighbor search, Combinatorial optimization, Approximate algorithms. 1. Introduction Nearest neighbor search is a pervasive problem in computer science. The applications range from pattern recognition to textual and multimedia infor∗ Corresponding author: E. Chavez, email: [email protected]. Email addresses: [email protected] (E.S. Tellez), [email protected] (G. Ruiz), [email protected] (E. Chavez), [email protected] (M. Graff) Preprint submitted to Elsevier June 1, 2017 mation retrieval, machine learning, compression, biometric identification and authentication, and bioinformatics [37]. Given a query object q, the nearest neighbor search consists in retrieving the set k nn(q) of k closer items to the query from a finite set S ⊂ U from a possibly infinite set U , let n = |S|. The result set of k nn(q) is a ball of radius rk , B(q, rk ) ⊆ S, containing those items in S being close to q; ties are arbitrarily broken. Closeness between objects is measured with some criterion, say a distance function d : U × U → R+ which is usually required to obey the metric properties: d(u, v) = 0 ⇐⇒ u = v, d(u, v) = d(v, u), and the triangle inequality |d(u, v) − d(v, w)| ≤ d(u, w) ≤ d(u, v) + d(v, w). A search can be trivially solved just evaluating all distances from q to each object in S; however, this approach is not of use when S is large, or whenever the cost of evaluating the distance function makes this approach prohibitive. A vector space V of dimension δ is a set of tuples of δ numbers (a subset of Rδ ). There are many possible distances for vectors, being the Euclidean or Manhattan distances the most popular. Both are Minkowski distances (Lp ) defined in general as follows: Lp (u, v) = δ X !1/p |ui − vi | p (1) i=1 The Euclidean distance is obtained for p = 2, and the Manhattan distance for p = 1. In the limit where p → ∞, we have the Chebyshev distance L∞ (u, v) = max1≤i≤δ |ui − vi |. In other domains, for example in Information Retrieval and Natural Language Processing, TFIDF vectors are traditional representations of documents. TFIDF vectors use the cosine similarity, Pδ simC (u, v) = qP δ i=1 i=1 u2i · ui vi qP δ i=1 (2) vi2 Metric methods should use ∠(u, v) = cos−1 simC (u, v), that is, the angle between vectors. We use this distance in our Documents benchmark, see §4. Another distance of interest in this manuscript is the Levenshtein or edit distance, defined between strings of symbols. It computes the number of edit operations needed to convert one string into another. Edit operations are insertion, deletion, and substitution. For strings u, v of sizes i, j respectively it is defined as follows:   max(i, j) if min(i, j) = 0      ed(ui−1 , vj ) +1       ed(ui , vj−1 ) + 1( ed(ui , vj ) =  min    0 if last(ui ) = last(vj )      ed(ui−1 , vj−1 ) +  1 if last(ui ) 6= last(vj ) 2 where last(·) is a function that returns the last symbol of a string. The edit distance is used for the Wiktionary benchmark in §4. A related distance, the Longest Common Subsequence (LCS) distance can be defined in terms of ed just setting to 2 the cost when last(ui ) 6= last(vj ). The effect is to allow only insertions and deletions. Indexes for multidimensional data like quad-trees, oct-trees, or kd-trees, make use of the coordinates to partition either the data or the space in such a way that items are pruned by checking numeric values per dimension. This approach is convenient whenever δ remains low since it can achieve logarithmic times on n when δ is considered a constant value [34]. Partition by dimension does not work in high dimensions because the algorithms have an exponential dependency on δ, this is folklore and is often called the curse of dimensionality in the literature. On the other hand, metric access methods claim to be independent of the representation of the objects. They use the distance function to partition the data. The metric approach is useful, in principle, on datasets of high explicit dimension and small intrinsic dimension. In high dimensional metric spaces the distribution of the distance among items is concentrated around the mean, and hence, the partitions have a lot of overlap. Therefore, the curse of dimensionality appears again, in disguise. This effect has been studied both in theory and in practice and has been reported in the literature. The net effect of the curse of dimensionality, either in vector or metric spaces, is a slowdown in the performance at query time. Even for highly selective queries, it is necessary to check virtually the entire database. 1.1. Approximate and Probabilistic Indexes On intrinsically high dimensional datasets, when the curse of dimensionality prevents the use of exact algorithms, a more promising approach to have a fast search is the use of approximate and probabilistic algorithms. Trading accuracy for speed gives roominess in the design of algorithms. For example, instead requesting exactly the k nearest neighbors, we allow two types of error, i) Not reporting some relevant results, or ii) Reporting objects not on the query outcome. Since the results will contain errors, we need some way to measure the quality of the result set. For this purpose, we define the recall of an approximate result k nn∗ (q) as recall(k nn∗ (q)) = |k nn∗ (q) ∩ k nn(q)| |k nn(q)| It is not hard to modify the definition of recall to take into account distance accuracy (how far the result is from the actual answer). This alternate definition is of use when comparing results with a large number of ties, e.g. when the distance is discrete. There exist a number of generic methods to turn an exact metric index into an approximate and/or probabilistic index [12, 43, 8, 36]. However, indexes designed to be approximate scale better with both the intrinsic dimension and 3 the database size [15, 10, 20, 33, 39, 2, 16, 38, 40, 41, 42]. Below, we describe some relevant examples. Locality Sensitive Hashing (LSH) is a set of fast approximate searching techniques giving probabilistic guarantees on the quality of the result set, Gionis et al. [20]. The general idea of an LSH index is to find hashing functions such that close items share the same bucket with high probability, while distant objects share the same bucket with low probability. More formally, a family of hashing functions H = {g1 , g2 , . . . , gh }, gi : U → {0, 1} is called (p1 , p2 , r1 , r2 )-sensitive if, for any p, q ∈ U , — if d(p, q) < r1 then P r[hash(p) = hash(q)] > p1 , — if d(p, q) > r2 then P r[hash(p) = hash(q)] < p2 , where hash(u) is the concatenation of the output of individual hashing functions gi following a fixed order, that is, hash(u) = g1 (u)g2 (u) · · · gh (u). Notice that LSH gives probabilistic guarantees about the maximum distance between the actual answer and the answer provided by the algorithm, and it cannot guarantee the quality regarding the recall. A large number of empty buckets will appear to achieve the desired p1 and p2 values (for potential queries of U that are far from any element in S). This behavior stress the memory footprint of the algorithm, because to solve it several hashing functions (a so called hashing family) are needed. Still, high-quality indexes usually need high amounts of memory. LSH is well defined for general metric spaces, but the process of finding suitable hashing functions gi is not trivial and has to be engineered for each case. There exist simple LSH functions for the Euclidean (L2 ), Hamming, Jaccard, and Cosine distances [3, 20]. Also, there exist several approaches extending the concept of LSH to be data sensitive. In general, the problem consist in selecting hashing functions suitable for the data and the query set [19]. The Fast Library for Approximate Nearest Neighbors, FLANN [28], is a popular library that implements different indexing strategies and selects the more suitable one, based on parameters like the search time, the construction time, and the memory available. With those parameters, together with the parameters of the indexes, a cost function is defined. FLANN builds and tries different instances of the indexes using optimization techniques to find a local minimum to the cost function. The instance corresponding to the local minimum will be the one selected. The indexing methods used by the FLANN are: Randomized k-d forest, priority search k-means tree, and the sequential search. The randomized k-d forest consists of multiple k-d trees searched in parallel [35] where the number of visited leafs on each tree is limited to control the search cost. The k-means tree [28] is a data structure computing k-means clustering on the dataset producing k compact regions. At each region, the procedure is repeated recursively, producing a tree of arity k. The recursion is stopped when regions have less than k items. The search procedure has a best first strategy, and the algorithm uses a priority queue to order the paths. The performance is adjusted controlling the 4 expansion factor (number of visited regions). As commented, their parameters are optimized, and the user only needs to specify the desired recall. Recently, a set of small and fast indexes have appeared, among the remarkable ones we found CNAPP [42], PP-Index [17], MIF [1], and the quantized permutations [26, 27]. In these indexes, a similar structure arises: every node is associated with a set of k nearest references (KNR), where the set of references is a sample of the database. The similarity between items is hinted by a similarity function over the shared neighbors. In this approach, there is no navigation and proximity queries are solved using an inverted index. This structural similarity was systematically explored in [11], adding several new indexes to the list. In the same paper, the authors include experimental comparisons showing the performance of KNR indexes as compared against near neighbor techniques based on hashing, in particular, LSH [23, 4], and DSH [19]. The best indexes in the KNR framework are KNR-Cos and KNR-LCS. Those indexes use the cosine similarity and the longest common sub-sequence as similarity functions as proximity predictors, respectively. The experimental evidence suggests that KNR-Cos surpasses the majority of the state of the art KNR indexes, so we will use it as the canonical member of the KNR family in our experimental section. In [21] near neighbors are found using a random walk over a precomputed table of neighbors. The required preprocessing time and memory for the table are quadratic, preventing the scalability of the approach for large sets. In [7] the Cover Trees (CT) are introduced. A CT is composed of levels, where nodes at some level cover lower levels using a notion of proximity. The SASH data structure [7] is constructed by sampling the database, connecting the non-sampled elements to their approximate nearest neighbors and repeating in the next level. In [22], the authors introduced the Rank Cover Trees (RCT) incorporating ideas from the above algorithms. A tree is built using ordered rank for pruning, instead of rules derived from distances and the triangle inequality. Node descendants in the tree are obtained using a rank order. Since only rank information is used for navigation, the number of nodes visited is known a priori. The authors include proofs, or sketches, for complexity and accuracy bounds. Malkov et al. [24] introduced the Approximate Proximity Graph (APG), an index with excellent searching performance. The authors suggest that the speed and accuracy improvement in APG is the consequence of the incremental construction. They claim it produces a graph with small world properties. APG can trade speed and accuracy for memory usage. If memory is scarce, speed and accuracy will also suffer. Construction and searching are entangled in APG. The construction is incremental and consists of a simple rule: To insert the j-th element, simply find the (approximate) t-nearest neighbors among the j − 1 elements already indexed; then, the new item is linked (in both directions) to its t near neighbors. The authors encourage the preservation of links to distant items since they boost the search performance. Notice that these links naturally arise using the incremental construction. Search is also greedy. A starting point is selected and greedily follows the neighbor minimizing the distance to the query, and repeat until no further 5 Algorithm 1 The search algorithm for APG as described in [25]. We use our notation N (u) to describe the connected vertices of u, see Section 2 for more details. Name: Search algorithm APG Input: A transition function N , the database S, and the query q, the number of restarts m Output: The set res of near neighbors of q. 1: 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: 20: Let res be an empty min-queue of fixed size k Let candidates be an empty min-queue Let visited be an empty set of object identifiers for i = 1 to m do Randomly select c ∈ S \ visited Append c into visited and (d(q, c), c) into candidates and res loop Let (rb , best) be the nearest pair in candidates Remove best from candidates Let r be the biggest radius in res, empty res defines r = ∞ if rb > r then break loop end if for u ∈ N (best) do if u 6∈ visited then Add u to visited and (d(q, u), u) to candidates and res end if end for end loop end for improvement is possible. This simple procedure performs poorly. However, it is likely to boost the recall by performing m searches from random starting points. Many restarts slow down the overall searching time, yet the authors claim that using m = O(log n) restarts achieve recall close to one. The parameters governing accuracy and speed are the number of starting points m and t, the number of direct neighbors in the graph. Since it is necessary to restart many times to achieve high accuracy, then the speed is penalized. Increasing t could also boost the speed at the expense of more memory. In a follow-up paper, in [25], the searching procedure is updated as follows. As the previous algorithm, the search is repeated m times, but now the restarts are persistent. In other words, the closest open node is selected as the new restarting point. In other words, a set of visited items and a set of candidates are kept along the entire search process. At the beginning of each restart, the algorithm appends a random item to the list of candidates to add diversity to the search process. Algorithm 1 formally describes this algorithm. 6 2. Proximity Search as an Optimization Problem Combinatorial optimization can be stated as follows. Given a set of states Ω and a cost function f : Ω → R, find ω ∈ Ω such that for , f (ω) is optimal. An optimal state is one that reaches either the minimum [or the maximum]. In other words, the goal is to obtain ω such that f (ω) = min f (x) [or, max f (x) in the case of maximization]. x∈Ω x∈Ω For our indexing problem we set Ω = S, and for a fixed query q ∈ U we set f (ω) = d(w, q), and we will seek for the minimum of this function. It should be clear that f (nn(q)) is minimal, hence optimizing f (·) implies finding the nearest neihbor of q. For the optimization problem, we will preserve the following restrictions, derived from the metric space approach. • The distance function is the only way to compare any pair of items. • Since objects are seen as a black box, items (states) are given, and cannot be generated (for example from averaging). • The gradient is not defined, i.e., the notion of direction is not well-defined. • There are no assumptions about the distance function d. e.g. uniqueness nor convexity are assumed. • The size of the database can be large, and the intrinsic dimension is high. The above restrictions narrow the alternatives in the selection of optimization techniques. We cannot use gradient or steepest descent. There are, however, many options based on local search. Those techniques require some binding to navigate between states (which are objects of the database in our case). In other words, we need a graph with vertex the objects of the database and with a suitable definition for the edges. Edge definition is critical for the performance of the optimization algorithms. The three main components of our approach are the transition function N , the function to be minimized f , and the minimizing algorithm A. Definition 1 (State transitions N ). N : Ω → Ω+ is a function associating each state u with a set of possible transitions. Definition 2 (The function to be optimized dq ). Each query q defines a function to minimize, dq (u) = d(q, u) for u ∈ Ω. Definition 3 (The minimizing algorithm A). A is an algorithm to minimize dq . It explores Ω using the transitions N to find a state minimizing dq for a given q. 7 2.1. About A Combinatorial optimization is a well-established area of computer science. There are many alternatives to choose from. Many meta-heuristics are discussed for example in citeBurkeKendall2014. We selected local search due to the properties of our problem statement and restrictions. (u) d(u, q) q u d(u’, q) = min {d(v, q) | v ∈ (u)} u’ Figure 1: An object u and its neighborhood N (u), u0 is the item closer to q in the neighborhood. May we remind that in the problem (S, d) is a metric database, and N describes the edges of a graph with the vertices in S. With a proper graph, it is possible to minimize dq starting from any random vertex u ∈ S. The property of the edges is to connect a vertex with neighbors locally minimizing the target cost function at each step. There should be at least one v ∈ N (u) minimizing dq . Figure 1 illustrates a step of the minimization procedure. At each point u, we must explore its neighborhood N (u), and try to minimize dq . For example, let u0 ∈ N (u) be an object such that d(q, u0 ) = min{d(q, v) | v ∈ N (u)∪{u}}, we move to u0 and repeat the process, until we reach a local minimum where there is no object closer to q than the current node. While typical metric access methods will try to discard objects using the triangle inequality, see §1, the optimization approach will seek to minimize dq . In this process, we will find many local minima before we reach the global minimum or a good approximation. We review some prominent meta-heuristics that allow us to use them as part of our algorithms. 2.1.1. Greedy Search. Perhaps the simpler working algorithm for local search is the Greedy search algorithm, it works as follows to solve a nearest neighbor query (nn(q)): i) Start in random state from Ω. 8 ii) Let s be the current best answer to nn(q). Compute d(q, u) for each u ∈ N (s). iii) If there exists some u that decreases dq then u becomes the best answer and repeat step ii). Otherwise stop the search. iv) Our best guess of nn(q) is the item producing the minimum known value of dq . The greedy search will retrieve a local minimum for dq . The quality of the answer can be improved by using multiple restarts of greedy search; this is a standard amplification method. m 800 600 400 200 0 P P P P m 40 35 30 25 20 15 10 5 =0.99 =0.95 =0.90 =0.80 0.02 0.04 0.06 0.08 0.1 P P P P P 0.1 (a) P ranges from 0.005 to 0.1 0.2 0.3 =0.99 =0.95 =0.90 =0.80 0.4 0.5 P (b) P ranges from 0.1 to 0.5 Figure 2: The number of steps m for several desired recall (P ? ) as a function of the expected recall per step P . Observe how low P values need extremely large m values. This behavior is consequent with the curse of dimension. If each search has probability P of finding the exact nn(q), then we can achieve the desired probability P ? with m independent searches with m= log (1 − P ? ) ; log (1 − P ) (3) this expression supposes independence of N (·), which can be hard to achieve. Notice that this formula does not predict the closeness of the retrieved item at any given m; however, it is faster than an exact method solving nn(a). From the optimization perspective, a low P implies a high number of local minimums. This issue is probably yet another incarnation of the curse of dimension in the proximity search problem. Figure 2 illustrates the effect. Notice that our method is practical when cost = m × hops × |N (·)| + 1 < n, (4) where hops is the expected length of the path (number of transitions) from a random starting point to the local minimum found, and |N (·)| the expected number of transitions per item. We show in our experimental section that the number of transitions is low in practice. 9 2.1.2. Tabu Search. Tabu search is a meta-heuristic allowing to take non-greedy decisions at each step, i.e., not always decreasing dq at each transition. This strategy recognizes the existence of local minima and plateaus; the idea is to avoid loops and to follow the same path twice. Tabu search solves the problem adding memory to mark already visited states as tabu, and then ignoring them on later stages of the search process. We will store visited states in short-term, medium-term, or longterm memory. The desired behavior, along with the problem, and the available resources, determine the kind of memory used in a given implementation of tabu search. 2.1.3. Beam Search. Beam search is a strategy that optimizes dq using a beam of states B ⊂ Ω of size b. At each step, beam search computes B 0 = ∪s∈B N (s) and selects the best b from B and B 0 . The search stops whenever is impossible to improve B. Tabu search can be used along with beam search to avoid non-essential computations. At the beginning of the search process, B is populated randomly from Ω. Notice that the low memory requirement is the main advantage especially for large datasets or systems with limited memory. 2.2. About N A fundamental component of the local search meta-heuristic is the transition function N , if properly defined, it can ensure the convergence to the global minimum or at least to a suitable local minimum. To give an idea of the complexity of setting a good N , lets think in A be the Greedy Search algorithm. The function N defines a graph where the vertices are the objects of the database, and a vertex u is connected with the elements of N (u). Note that the greedy search starting at a point u will always stay in the path connected component of u. Therefore, a natural requirement for the graph is to be path connected. Since our approach is approximate, then our transition function does not need to ensure that A finds the global optimum dq . From the similarity search perspective, we allow to lose some results, and also, some retrieved items will not be part of the exact query. Nonetheless, in practice, the error rate will be low, and the performance gain is significant. Those claims are supported with experimentally. The proposal of Malkov et al. [24, 25] introduce a working N construction for its APG, already explained in §1. The underlying graph N can be used with improved versions of greedy search and best-first search. Our contribution is more about A. As the APG, we will use the undirected version of the graph. 3. Direct Improvements on APG As detailed on Section 1, search in APG is repeated m times to improve the expected recall. Authors suggest in [25], that m must be adjusted for each dataset. This requirement supposes an additional parameter selection, which 10 Algorithm 2 The search algorithm for APG*. The main difference is that m is not longer necessary, yet a small value σ is needed to guess a good number of restarts. The main idea is to apply the search procedure repeatedly while the covering radius of res improves. In practice, it produces a competitive local minimum. Name: Search algorithm APG* Input: A transition function N , the database Ω = S, the query k − nn(q), a minimum number of repeats σ (pretty small, e.g., 4) Output: The set res of near neighbor of q. 1: 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: 20: 21: 22: 23: Let res be an empty min-queue of fixed size k Let candidates be an empty min-queue Let visited be an empty set of object identifiers repeat Let cov∗ ← cov(res) for i = 1 to σ do {This for loop is identical to that of APG (Algorithm 1)} Randomly select c ∈ S \ visited Append c into visited and (d(q, c), c) into candidates and res loop Let (rb , best) be the nearest pair in candidates Remove best from candidates if rb > cov(res) then break loop end if for u ∈ N (best) do if u 6∈ visited then Add u to visited and (d(q, u), u) to candidates and res end if end for end loop end for until cov∗ = cov(res) {Stops when there is no improvement over dq , i.e., cov(res)} can be difficult because the best m ideally should be adapted as n grows. A significant overestimation of m impact the construction time because it is incremental, based on searches. Searching is also negatively affected because of the number of restarts. Before we introduce our new algorithms, we will define an important function. Let, result be a min priority queue (min-queue) of fixed size k. The cov(result) function is defined as follows: if result is under its full capacity then it evaluates to the maximum possible distance value; if it is full, then cov(result) is the radius of the furthest item. 11 Our first index contribution is Algorithm 2 (APG*). The objective is to remove parameter m, checking the changes over the global result set, via the covering radius cov(res). In some sense, we are minimizing dq , and stopping the algorithm when our guess of dq cannot be improved after σ tries. All our new algorithms will use the same technique. Notice that σ should be small (in the range of 2 to 4). The idea is to relax the stopping condition, avoiding the introduction of an extra parameter. Larger values of σ should be avoided in favor of other parameters. Algorithm 3 The search algorithm for APG*-R. As APG*, it tries to adjust the number of restarts automatically. Name: Search algorithm APG*-R Input: A transition function N , the database Ω = S, the query k − nn(q), a minimum number of repeats σ (pretty small, e.g., 4), Output: The set res of near neighbor of q. 1: 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: 20: 21: Let res be an empty min-queue of fixed size k Let visited ← ∅ repeat Let cov∗ ← cov(res) for i = 1 to σ do Let res∗ be an empty min-queue of fixed size k Randomly select sp ∈ S \ visited Append sp into visited and (d(q, sp), sp) into res∗ Let evaluated ← ∅ repeat for v ∈ N (sp) do if v 6∈ evaluated then Add (d(q, v), v) into res∗ end if end for Update sp to be the closer item in res∗ not in visited. If there is no item satisfying the condition, then sp is set as undefined. Add sp into visited until sp is undefined res ← res ∪ res∗ {The properties of the min-queue of fixed size should be preserved} end for until cov∗ = cov(res) {Stops when dq does not improve, i.e., cov(res) stays unchanged} Our second contributed index is named APG*-R (Algorithm 3). The idea is that APG and APG* can get stuck on a local minimum since they are limited to use always the best-known candidate. APG*-R share structural similarities with APG and APG*; however, there is a conceptual difference. On the one 12 hand, APG*-R uses random starting points, not the best known in APG, and also, res∗ is local to each step. We also added a local memory evaluated to avoid additional evaluations, this scheme is different to that found whenever the candidates set has a global scope, and so, the improvement policy is also global. Algorithm 4 Beam Search over Ω and N . Name: Beam Search Input: A transition function N , the database S, the query q, the size of the beam b Output: The set res of near neighbor of q. 1: 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: 20: 21: 22: Let res be an empty min-queue of fixed size k Let beam be an empty min-queue of fixed size b Set visited ← {} Set beam ← {} for i = 1 to b do Randomly select u from S Add u to visited and (d(u, q), u) to res and beam end for repeat Let cov∗ ← cov(res) for i = 1 to σ do Let beam∗ ← {} {Fixed sized priority min-queue of size b as beam} for c ∈ beam do for u ∈ N (c) do if u 6∈ visited then Add u to visited and (d(q, u), u) to res and beam∗ end if end for end for beam ← beam∗ end for until cov∗ = cov(res) {Stops when there is no improvement over dq , i.e., cov(res)} Our final index is BS (Algorithm 4), an index using beam search over S and N . As in our previous approaches, we ensure at least σ steps to take the decision to stop the search. So, if after some minimization steps, dq does not change, then we achieved a (good) local minimum. The critical parameter is the size of the beam b, which can be adjusted at any time. Notice that beam search does not need to restart; however, it needs to know b. As we will see in our experimental section, the use of beam search as an alternative to other schemes produce significant improvements in both recall and search speed. 13 dimension 3 × n5 106 3 × 106 16 32 64 0.035s 0.050s 0.076s 0.137s 0.202s 0.342s 0.320s 0.438s 0.708s Table 1: Time spent on a sequential scan. 4. Experimental Results In this section, we compare the experimental performance of our technique against APG, KNR, and the RCT. We fixed our attention in the recall and search speed. All experiments were performed on a 24-core Intel Xeon 2.60 GHz workstation with 256GB of RAM, running CentOS 7. We do not use the multiprocessing capabilities in the search process. Both, the index and the database were maintained in memory. Our benchmarks consist of both synthetic and real databases. In particular, we selected the following databases: — Nasa. This database is a collection of 40, 150 vectors of 20 coordinates obtained from the SISAP project (http://www.sisap.org). It uses L2 as distance function. A sequential search completes on 0.005 seconds on our testing machine. — Colors. The second benchmark is a set of 112, 682 color histograms (112dimensional vectors) from SISAP, under the L2 distance. A sequential search uses 0.053 seconds. — Wiktionary. A third benchmark is an English dictionary with 736, 639 entries with Levenshtein’s distance as metric.1 A sequential search completes in 0.700 seconds. — Documents. This database is a collection of 25,157 short news articles from the TREC-3 collection of the Wall Street Journal 1987-1989. We use their tf-idf vectors, taken from the SISAP project [18], www.sisap.org. We use the angle between the vectors as the distance measure [5]. We remove 100 random documents from the collection and use them as queries (thus these 100 documents are not indexed in the database). The objects are vectors of hundred thousands coordinates. This dataset has a very high intrinsic dimension in the sense of Chavez et al. [13]. Most exact metric indexes will need to evaluate the entire dataset to solve nearest neighbor queries. As a reference, a sequential scan needs 0.185 seconds. 1 Available at https://www.wiktionary.org/ 14 — BigANN-1M. A one million subset of the TEXMEX corpus.2 The original dataset contains a billion SIFT points (128 coordinates). We also extract 256 queries from the standard query set (not in the dataset). In average, a sequential search of the nn under L2 needs 0.441 seconds to be solved. — RVEC. On the one hand, for measuring the effect of varying dimension, we used datasets of 16, 32, 64, 128 and 256 dimensions, each one with 105 randomly generated items. A query is solved by exhaustive search in 0.015, 0.014, 0.024, 0.044, and 0.081 seconds, respectively. On the other hand, the performance as the size increases is measured using 16, 32 and 64-dimensional datasets of size 3×105 , 106 , and 3×106 items each. Table 4 shows the search time spent by an exhaustive evaluation of the dataset. All these datasets use the L2 distance. The importance of synthetic data with a uniform distribution is to study the the performance of the algorithms for a fixed size and dimensionality. To compare against LSH we used the E2 LSH tool3 by Alex Andoni. It automatically optimizes an LSH index for the available memory. We fix the index memory to be 1, 3, and 5GB, which is many times higher than the necessary by other indexes. To be fair, since LSH offers distance-based rather than recallbased guarantees, we used it to search by radius (i.e., return any element within distance r to the query), setting r as the average radius of the 30-th nearest neighbor. To avoid extreme or uninteresting cases, we removed queries yielding empty answers and those with more than 1000 answers. For the RCT [22] we used the C++ implementation, kindly shared by the authors. Notice that LSH, RCT, and FLANN do not offer an implementation for Levenshtein and the cosine similarity, so they only are compared on datasets with the L2 metric. Therefore, we include LSH and RCT only on experiments over vector datasets fulfilling this requirement. Also, LSH is not present in RVEC benchmarks since its performance is not preserved under this type of datasets [23, 4]. While our implementations are written in C# and run under the Mono virtual machine, E2 LSH, RCT, and FLANN are written in C++, and run in native form. For example, their sequential search has an advantage of around 2 to 3X in the case of E2 LSH and RCT, and 5X times in the case of FLANN due to their code’s optimizations. To give a full picture of the performance, we report both the absolute times and speedup. The latter is computed on the sequential scan in its implementation. We also give the actual times to give the full context to the reader. 4.1. Performance per Database In the first batch of experiments, we present the indexes APG*, APG*-R, BS, with different values for t (the number of neighbors in the construction) for the Colors, Nasa, Wikionary, Documents, and BigANN-1M databases. 2 Available at http://http://corpus-texmex.irisa.fr/ ~andoni/LSH/ 3 http://www.mit.edu/ 15 The APG, and BS are labeled with t = 8, 16, and 32, for each value of t, the parameter m for APG and b for BS varies from 8, 16, and 32. The APG* and APG*-R takes t = 8, 16, and 32. Each KNR uses k = 7, 12 near references among 2048 total references (larger values of k will produce better recalls but at the cost of higher memory consumption). For each k, the index is allowed to review at most 3% and 10% of the database (these will be the two points in each curve). For the RCT we used a covering factor of 32, 64, and 128 (larger values will produce better recalls but slower searches). On Figure 3(a) we show the recall and speedup of the methods for the Colors database. The APG’s for t = 8 are the fastest but with less recall, as we increase the number of neighbors in the construction, the recall gets better, but the speed is affected. When we compare this with the line of the APG*, the APG* is very close to the corresponding APG. Now, the APG*-R achieves a higher recall but at the cost of losing speed. Next, we have the BS, it has the best overall performance, that is, for a given recall, it has the best speed. Note how it gets the most recall. The RCT, KNR, and LSH are left behind. The results of the Nasa database are shown on Figure 3(b). This figure corresponds to the smallest database among our benchmarks, and all the indexes reach competitive recall. The results for the APG are similar to the Colors database, and the recall increases with the amount of memory; however, we can find faster alternatives. The APG* is still very close the corresponding APG. Note that APG*-R achieve a significant improvement as compared with APG and APG*. All the BS perform with high recall at a competitive search speed. The RCT has more appeal here than on Colors being the faster index. While KNR is quite fast, it gets stuck and has difficulties to improve its recall just adjusting the k parameter; this behavior is shared with LSH since their recall values are below others. The Wiktionary works with a costly distance function, in this type of datasets it is critical to lower the number of computed distances. On Figure 3(c) almost every index is hundreds of times faster than a sequential scan. The performance of the APG is again below the others and the APG* is again essentially the same. On the other hand, the APG*-R is above all others. For the correct amount of neighbors, the APG*-R is an absolute improvement of the APG*. The BS excels in performance, and it reaches the best recall. KNR achieve its maximum performance rapidly, and it is left behind for all local search methods. The Figure 3(d) shows the Documents database. Note how most of the indexes have the same curve of tendency. Remember that this database has high intrinsic dimension, so, we can have a high recall or a high search speed, but it is quite difficult to be good on both. The APG* is practically the same as the APG, however without hassle about the m parameter. KNR indexes exhibit a good trade between recall and search speed, but APG*-R reaches better recall values. As before, BS shows the best performances among the alternatives. The results for the BigANN-1M are shown on Figure 3(e). The results are striking similar to the Documents experiment. The principal difference is the higher values for the speedup because BigANN-1M is much larger than Documents. Apart from that, the APG are the same as the APG*; the APG*-R 16 have higher recalls values; the BS instances have higher recalls at the cost of the speedup; the KNR, RCT and the LSH have below the average speed. In summary, APG*-R is better in general than the APG* which is similar to APG but computing m online. Also, all the BS have good recall and speed, making it the rule of thumb for application needing high quality results. 4.2. The effect of the dimension on the Search Performance We compared indexes to see how dimensionality of datasets affects them. Here, we selected RVEC datasets with a wide range of dimensions, specifically, 16, 32, 64, 128, and 256. We measured recall, the search cost, and the speed up. Each line of points represents the results for each dimension. The Figure 4 shows the cost of the indexes. We compared the recall with the cost of the searches. Figure 4(a) shows the indexes using 1 to 10 integers per element of the database, that is, on the APG the number of neighbors is small. The APG and the APG* are similar and produce low recall. This performance contrasts with the APG*-R that shows a significant improvement on it. These results demonstrate the effectiveness of this variant. Moreover, the BS has a broad range of action, note how the recall is much better than the APG at the cost of computing more distances. Here, the KNR has a good performance with one of the configurations reaching the higher recall and showing an almost constant cost on the dimension. The RCT, like the BS, is all spread over but with more distances computed. Figure 5(a) shows the speedup. The APG and APG* are very fast because of the small number of distances they have to compute but the low recall makes them useless. The APG*-R appears in the middle of the other indexes. The different instances of the BS show how it gains recall but loses speed when we increase the beam. The KNR gets good recalls but is slower than the average. Finally, the RCT is fast and with good recall for these smaller indexes. Note how the recall for the APG’s and BS increases when adding more memory. For Figure 4(b) we let the methods take more neighbors for the elements; they compute more distances than smaller indexes, but they reach higher recall values. The APG and APG* cannot get a good recall but the improve of the APG*-R makes them comparable to the BS. Figure 5(b) contains the speeds of those indexes. The PG and APG* are very fast, although with a low recall. The APG*-R and BS with b = 8 are very similar, one a little faster and the other with better recall. As expected, the other configurations of BS have higher recalls. Figures 4(c) and 4(d) are very similar; they show how the APG and APG* become to get a good recall for the first dimensions but continue to have a low value for the higher ones. With the APG*-R and BS, we see that they can have very high recalls even for the big dimensions. Figures 5(c) and 5(d) are again very similar. APG and APG* are not very fast. APG*-R is faster for dimensions 16, 32, and 64 but the BS with b = 8 becomes faster for the larger dimensions. 17 90.0 60.0 50.0 40.0 30.0 16.0 14.0 12.0 10.0 8.0 6.0 20.0 4.0 10.0 0.0 APG t=8 APG t=16 APG t=32 APG* APG*-R BS t=8 BS t=16 BS t=32 KNR-Cos k=7 KNR-Cos k=12 RCT LSH FLANN 18.0 speedup 70.0 speedup 20.0 APG t=8 APG t=16 APG t=32 APG* APG*-R BS t=8 BS t=16 BS t=32 KNR-Cos k=7 KNR-Cos k=12 RCT LSH FLANN 80.0 2.0 0.60.7 0.8 0.9 0.95 0.0 0.96 0.60.7 0.8 0.9 0.95 0.96 0.97 recall (a) Colors 0.99 35.0 APG t=8 APG t=16 APG t=32 APG* APG*-R BS t=8 BS t=16 BS t=32 KNR-Cos k=7 KNR-Cos k=12 300.0 250.0 200.0 APG t=8 APG t=16 APG t=32 APG* APG*-R BS t=8 BS t=16 BS t=32 KNR-Cos k=7 KNR-Cos k=12 30.0 25.0 speedup 350.0 20.0 15.0 150.0 10.0 100.0 5.0 50.0 0.9 0.95 0.96 0.97 0.98 0.0 0.99 0.60.7 0.8 0.9 0.95 0.96 0.97 recall 0.98 recall (c) Wiktionary (d) Documents 250.0 APG t=8 APG t=16 APG t=32 APG* APG*-R BS t=8 BS t=16 BS t=32 KNR-Cos k=7 KNR-Cos k=12 RCT LSH FLANN 200.0 speedup 0.0 0.999 (b) Nasa 400.0 speedup 0.98 recall 150.0 100.0 50.0 0.0 0.60.7 0.8 0.9 0.95 0.96 0.97 0.98 0.99 0.999 recall (e) BigANN-1M Figure 3: Recall and speedup performance for our real world datasets. 18 0.99 0.18 0.12 0.10 0.08 0.06 APG m=8 APG m=16 APG m=32 APG* APG-R* BS b=8 BS b=16 BS b=32 0.25 0.20 # distances / n 0.14 # distances / n 0.30 APG m=8 APG m=16 APG m=32 APG* APG-R* BS b=8 BS b=16 BS b=32 KNR-Cos k=7 KNR-Cos k=12 RCT c=32 RCT c=64 RCT c=128 0.16 0.15 0.10 0.04 0.05 0.02 0.00 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 0.00 1 0.6 0.7 0.8 recall (a) 1 to 10 integers 0.95 0.97 0.99 (b) 10 to 30 integers 0.50 0.60 APG m=8 APG m=16 APG m=32 APG* APG-R* BS b=8 BS b=16 BS b=32 0.40 0.35 0.30 APG m=8 APG m=16 APG m=32 APG* APG-R* BS b=8 BS b=16 BS b=32 0.50 0.40 # distances / n 0.45 # distances / n 0.9 recall 0.25 0.20 0.30 0.20 0.15 0.10 0.10 0.05 0.00 0.6 0.7 0.8 0.9 0.95 0.97 0.00 0.990.999 recall 0.6 0.7 0.8 0.9 0.95 0.97 0.990.999 recall (c) 30 to 100 (d) 100 to 300 integers Figure 4: Performance comparison (recall vs search cost) among our indexes and several state of the art techniques for fixed n = 105 over several dimensions. Each curve corresponds contains points that characterize the performance in a dimension, e.g., 16, 32, 64, 128, and 256; as a hint to review figures, large dimensions correspond to smaller recalls and scale is exponential. 19 30 20 15 10 10 8 6 4 5 0 APG m=8 APG m=16 APG m=32 APG* APG-R* BS b=8 BS b=16 BS b=32 12 speedup 25 speedup 14 APG m=8 APG m=16 APG m=32 APG* APG-R* BS b=8 BS b=16 BS b=32 KNR-Cos k=7 KNR-Cos k=12 RCT c=32 RCT c=64 RCT c=128 2 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 0 1 0.6 0.7 0.8 recall (a) 1 to 10 integers 9 0.95 0.97 0.99 (b) 10 to 30 integers 7 APG m=8 APG m=16 APG m=32 APG* APG-R* BS b=8 BS b=16 BS b=32 7 6 APG m=8 APG m=16 APG m=32 APG* APG-R* BS b=8 BS b=16 BS b=32 6 5 speedup 8 speedup 0.9 recall 5 4 3 4 2 3 1 2 1 0.6 0.7 0.8 0.9 0.95 0.97 0 0.990.999 recall 0.6 0.7 0.8 0.9 0.95 0.97 0.99 0.999 recall (c) 30 to 100 integers (d) 100 to 300 integers Figure 5: Recall and speedup comparison in four different classes of memory among our indexes and several state of the art techniques for fixed n = 105 over several dimensions. Each point in curves corresponds to a different dimension 16, 32, 64, 128, and 256; as a hint to review figures, large dimensions correspond to smaller recalls and scale is exponential. 20 4.3. Scalability A central property of any search index is its capacity to scale with the size of the database. Even a static index can be dynamized using the Bentley and Saxe [6] approach, as it has been shown for metric indexes in [29]. This dynamization comes with a small penalization at search time, in addition to a constant factor introduced in the construction. This technique is beyond the scope of this document, and static indexes are a single large index without additional search overheads. Notice that the APG’s and our BS has an incremental construction. Hence they can handle a growing database naturally. In any case, most indexes will be affected by database growth, and we expect the performance to be different in this setup. We used the randomly generated database of dimensions 16, 32, and 64, each with sizes 3 × 105 , 106 , and 3 × 106 . Each point in a curve is produced by a different database size; speedups are larger as n increases. As the database grows, so does the size of the indexes and it could not fit in main memory. Because of that, we set the number of initial neighbors to 8 for the APG’s and BS. Figure 6(a) shows the recall and the search speed for the different sizes of the database for 16-dimension. The APG and APG* scored a recall below 0.7 on all the sizes, even when using 32 searches for the query. As shown in the previous experiments, the APG*-R gets a boost on the recall compared to the APG*. Note how the lines of the BS are practically vertical meaning that the index gains in speed much more than it loses in the recall. The RCT does not get a recall as good as the BS and is considerably slower. On this and the other dimensions, the sizes corresponding to the lines of each method are 3 × 105 , 106 , and 3 × 106 from right to left except for the KNR. For this method, the recall gets better as the size of the database increases. In Figure 6(b) we see the recall and the number of distances for the queries. This general behavior is the same in the next figures. Figure 6(c) shows the same tendency: the APG*-R has been an improvement over the APG’s, the BS having very competitive recalls and speeds, the KNR been slow, and the RCT behind the BS. The Figure 6(d) shows the same but with the distances computed. The same can be said to the figures 6(e) and 6(f), but the interesting part is to note how the change of dimension affects more the indexes than the size of the database for reaching high recalls. For 16 dimensions, high recall values can be achieved for all the sizes; for 32 and 64-dimension, the BS always gets better recalls. As a summary, we arrange the results for the methods with best recall values on Tables 2, 3, and 4 for 16, 32, and 64 dimensions respectively. 5. Tuning APG*, APG*-R, and BS The flexibility of the combinatorial optimization framework for proximity search is one of the sources of their great potential, but also may be problematic for an end-user. In this section, we provide a simple guide for finding a competitive tuning, although it should be noticed that the optimal selection of the parameters cannot be guaranteed. 21 Table 2: The achieved performance for several sizes of the random database of dimension 16. Index APG*-R BS b=8 BS b=16 BS b=32 KNR-Cos k=7 KNR-Cos k=12 RCT 105 Cost Recall 1868.84 0.95 2063.57 0.96 3137.97 0.98 4937.93 0.99 4553.08 0.85 4950.76 0.92 3 × 105 Cost Recall 3561.40 0.97 2297.48 0.95 3566.05 0.98 5621.50 0.99 9998.99 0.92 10948.57 0.96 15836.4 0.95 106 Cost 4002.21 2473.05 3925.69 6200.69 28686.36 31941.04 26863.9 Recall 0.96 0.95 0.98 0.99 0.95 0.98 0.94 3 × 106 Cost Recall 4208.77 0.96 2705.92 0.94 4217.09 0.97 6637.78 0.98 83004.65 0.97 91945.43 0.99 42947 0.94 Table 3: The achieved performance for several sizes of the random database of dimension 32. Index APG*-R BS b=8 BS b=16 BS b=32 KNR-Cos k=12 RCT 105 Cost Recall 4484.40 0.86 4405.64 0.87 6565.40 0.94 9450.75 0.97 5105.69 0.65 3 × 105 Cost Recall 9276.67 0.88 5529.78 0.83 8105.05 0.91 12122.14 0.95 11100.57 0.71 19229.8 0.71 106 Cost 12865.79 6480.63 10078.76 15067.28 32088.94 34085.0 Recall 0.82 0.78 0.88 0.94 0.78 0.67 3 × 106 Cost Recall 14168.41 0.82 7309.23 0.73 11446.03 0.84 17256.64 0.91 92088.18 0.83 52872.1 0.63 Table 4: The achieved performance for several sizes of the random database of dimension 64. Index APG*-R BS b=8 BS b=16 BS b=32 105 Cost 10357.14 8181.72 11692.90 16510.76 Recall 0.69 0.71 0.84 0.91 3 × 105 Cost Recall 21958.30 0.74 11582.28 0.62 16907.20 0.76 24060.58 0.86 22 106 Cost 35579.05 16384.80 24275.12 35590.51 Recall 0.61 0.50 0.66 0.79 3 × 106 Cost Recall 51994.29 0.57 22398.66 0.40 32656.85 0.56 49443.82 0.71 180 120 100 80 APG m=8 APG m=16 APG m=32 APG* APG* R BS b=8 BS b=16 BS b=32 KNR-Cos k=7 KNR-Cos k=12 RCT c=128 100000 # distances / n 140 speedup 1e+06 APG m=8 APG m=16 APG m=32 APG* APG* R BS b=8 BS b=16 BS b=32 KNR-Cos k=7 KNR-Cos k=12 RCT c=128 160 10000 60 1000 40 20 0 0.60.7 0.8 0.9 0.95 0.97 0.98 100 0.99 0.6 0.7 0.8 0.9 recall (a) Search speedup / 16 dimensions 120 0.97 0.98 0.99 (b) Search cost / 16 dimensions 1e+06 APG m=8 APG m=16 APG m=32 APG* APG* R BS b=8 BS b=16 BS b=32 KNR-Cos k=7 KNR-Cos k=12 RCT c=128 80 60 APG m=8 APG m=16 APG m=32 APG* APG* R BS b=8 BS b=16 BS b=32 KNR-Cos k=7 KNR-Cos k=12 RCT c=128 100000 # distances / n 100 speedup 0.95 recall 40 10000 20 0 0.60.7 0.8 0.9 1000 0.95 0.60.7 0.8 recall (c) Search speedup / 32 dimensions 70 1e+06 40 30 APG m=8 APG m=16 APG m=32 APG* APG* R BS b=8 BS b=16 BS b=32 KNR-Cos k=7 KNR-Cos k=12 RCT c=128 100000 # distances / n speedup 50 0.95 (d) Search cost / 32 dimensions APG m=8 APG m=16 APG m=32 APG* APG* R BS b=8 BS b=16 BS b=32 KNR-Cos k=7 KNR-Cos k=12 RCT c=128 60 0.9 recall 10000 20 10 0 0.6 0.7 1000 0.8 recall 0.6 0.7 0.8 recall (e) Search speedup / 64 dimensions (f) Search cost / 64 dimensions Figure 6: Speedup and search cost as a function of the expected recall of our indexes and state of the art. We use datasets with dimensions 16, 32, and 64. Each dataset has three instances with sizes of 3 × 105 , 106 , and 3 × 106 . We also limited memory to be under eight direct neighbors per item, i.e. 16 undirected neighbors in average. 23 First of all, a guide for index selection. We first notice that APG* performs as good as APG; however, APG*-R, and BS perform better. Both APG*-R and BS need to know the number of direct near-neighbors t. APG*-R has no additional parameters since it adjusts the number of repetitions based on a simple iterative optimization; then the robustness is entirely based on t. For this reason, t should be relatively large; our suggestion is to use values greater than 16 but smaller than 64. Since the underlying graph is undirected, the memory usage will be n(2t + 1) integers. Thus, the right selection of t should consider this amount of main memory for the adequate performance. For the case of BS, t can be smaller, i.e., 8 or 16; larger values of t should be used for very high dimensions, as described in our experimental section. After fixing t, the free parameter b (the size of the beam) should be adjusted to obtain the desired performance. A significant b will produce high-quality search results while increasing search time. In contrast, faster searches will be achieved for small b values, yet the quality of the results could decrease. As a rule of thumb, we recommend fixing b to the largest value producing a search time below the user threshold. Nonetheless, good recall values are achieved for most of our datasets for b values between 16 and 64. A more precise setup of b could be accomplished with the help of a query set Q. The idea is to adjust b to obtain a minimum recall on Q; this fitting should be applied after a fixed number of insertions. 6. Summary and Perspectives In this manuscript, we approach proximity search as a combinatorial optimization problem. To this end, we define the necessary framework to allow the use of combinatorial optimization algorithms studied in the literature. In particular, this contribution focuses on local search algorithms. Using our new perspective, we introduced three near-neighbor indexes, namely, APG*, APG*-R, and BS. Those indexes use an underlying graph and several variants of local search to navigate them. As part of our contribution, we compare our techniques against state of the art indexes. We found that our indexes significantly surpass the performance of the majority of the alternatives, in almost all of our benchmarks. In particular, we believe that our indexes are of practical use due to their excellent trade-off among speed, recall, and index size. In addition to our core contributions, this manuscript also gives an extensive comparison of state of the art on the nearest neighbor problem. We tested algorithms working in both general metrics, and those specialized on vector spaces, in particular for the Euclidean distance. We also include E2 LSH, a well known and used near neighbor index based on hashing. Our intention was to provide a better and wider picture of the alternatives for near neighbor search, disregarding the underlying theoretical basis with a comprehensive guide to real-world applications in mind. In the present work, we fixed the construction of N to be that defined by APG while we focus on finding better algorithms for navigating the graph, i.e., A. However, new N definitions with improved or additional properties should 24 be explored. The indexes introduced in this manuscript have some parameters to be determined experimentally. This situation is not uncommon; however, this complicates the usage of the new indexes in real world tasks. Even when we give guidelines for tuning our indexes, it is necessary to look forward to construction algorithms that determine their parameters automatically using, for example, the topology and geometry of the given dataset. To be effectively used in production systems, our indexes should support some degree of persistence. A secondary memory implementation could be a solution; however, the high number of random seeks arising on graph-based algorithms is a problem in disk-based storage. A possible solution is to use exclusively solid state storage as secondary memory; however, I/O operations are still far slower than main memory. An alternative scheme is a pure memory index having a secondary memory mirror, such that any modification is performed in both memory and disk storage. Therefore, the idea is that the data persist and the index become available as soon the process is launched in the system. This scheme is quite attractive as it is implemented in high-performance databases like Redis [9].4 Another important task is to support dynamic operations. This feature is useful for applications using metric databases to represent knowledge, like those using incremental learning. Since our indexes are incrementally constructed, the insertion operation is native. However, the deletion algorithm is not yet studied. The literature in metric indexes used to solve the deletion operation marking those items as unavailable for most operations [13]. While this is enough for workloads with just a few deletions, a high rate of removals could yield to a significant unnecessary extra memory. In other approaches, the metric indexes can afford real deletions. However, to maintain the invariants of the indexes, a partial or even a complete reconstruction of the index is needed ([31, 32, 14]). A recent approach uses the strategy of Bentley and Saxe ([6, 30]) to produce dynamic structures using a list of log n static structures. This approach gives the possibility of using any static indexes at the expense of a log n factor in the search cost. Also, since only amortized times are ensured, incremental constructions cannot be used (i.e. a single insertion or deletion operation can be lengthy). We believe that our combinatorial optimization approach is robust enough to support deletions, and the primary task becomes on determining optimal replacements of the removed items. This operation deserves attention in future research on the area. The current construction of APG and our indexes is a sequential process, i.e., the i-th item is connected with its neighbors among the previous i − 1 items. In the case of APG and APG*, each search is composed of several greedy searches. Each greedy search is not independent of others since they use the best-known candidate at each step. A possible point of parallelization is at each hop since 2t distances are computed. In the case of BS, at each hop 2tb distance 4 Redis is an in-memory data structure store, used as a database, cache and message broker, https://redis.io/ 25 computations are performed. In any case, the necessary distance calculations can be executed in parallel. However, the intrinsic cost of thread creation and management can be too high to take advantage of parallelism. APG*-R, on the other hand, can be improved with independent searches. Nonetheless, there exists space for clever and better parallel construction algorithms. Finally, we also should mention the lack of theoretical guarantees for both the search time and the expected recall. This task is quite relevant since theoretical assurances allow the usage of our indexes in those applications where a minimum guarantee is required. References [1] Amato, G., Gennaro, C., Savino, P., 2014. Mi-file: using inverted files for scalable approximate similarity search. Multimedia Tools and Applications 71 (3), 1333–1362. [2] Amato, G., Savino, P., 2008. Approximate similarity search in metric spaces using inverted files. In: InfoScale ’08: Proceedings of the 3rd international conference on Scalable information systems. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), ICST, Brussels, Belgium, Belgium, pp. 1–10. [3] Andoni, A., Indyk, P., January 2008. Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions. Communications ACM 51, 117–122. URL http://doi.acm.org/10.1145/1327452.1327494 [4] Andoni, A., Indyk, P., January 2008. Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions. Communications of the ACM 51, 117–122. [5] Baeza-Yates, R. A., Ribeiro-Neto, B. A., 1999. Modern Information Retrieval. ACM Press / Addison-Wesley. URL citeseer.ist.psu.edu/baeza-yates99modern.html [6] Bentley, J. L., Saxe, J. B., 1980. Decomposable searching problems i. staticto-dynamic transformation. Journal of Algorithms 1 (4), 301–358. [7] Beygelzimer, A., Kakade, S., Langford, J., 2006. Cover trees for nearest neighbor. In: Proceedings of the 23rd international conference on Machine learning. ACM, pp. 97–104. [8] Bustos, B., Navarro, G., 2004. Probabilistic proximity search algorithms based on compact partitions. Journal of Discrete Algorithms 2 (1), 115– 134. [9] Carlson, J. L., 2013. Redis in Action. Manning Publications Co., Greenwich, CT, USA. 26 [10] Chavez, E., Figueroa, K., Navarro, G., Sep. 2008. Effective proximity retrieval by ordering permutations. IEEE Transactions on Pattern Analysis and Machine Intelligence 30 (9), 1647–1658. [11] Chávez, E., Graff, M., Navarro, G., Téllez, E., 2015. Near neighbor searching with K nearest references . Information Systems 51 (0), 43–61. URL http://www.sciencedirect.com/science/article/pii/ S0306437915000241 [12] Chávez, E., Navarro, G., 2003. Probabilistic proximity search: Fighting the curse of dimensionality in metric spaces. Information Processing Letters 85, 39–46. [13] Chávez, E., Navarro, G., Baeza-Yates, R., Marroquı́n, J. L., 2001. Searching in metric spaces. ACM Comput. Surv. 33 (3), 273–321. [14] Ciaccia, P., Patella, M., Zezula, P., 1997. M-tree: An efficient access method for similarity search in metric spaces. In: Proceedings of the 23rd International Conference on Very Large Data Bases. VLDB ’97. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, pp. 426–435. URL http://dl.acm.org/citation.cfm?id=645923.671005 [15] Clarkson, K. L., 1999. Nearest neighbor queries in metric spaces. Discrete and Computational Geometry 22, 63–93. [16] Esuli, A., 2009. Pp-index: Using permutation prefixes for efficient and scalable approximate similarity search. In: Proceedings of the 7th Workshop on Large-Scale Distributed Systems for Information Retrieval (LSDS-IR’09). Boston, USA, pp. 17–24. [17] Esuli, A., 2012. Use of permutation prefixes for efficient and scalable approximate similarity search. Information Processing & Management 48 (5), 889–902. [18] Figueroa, K., Chavez, E., Navarro, G., 2009. Technical description of the metric spaces library. Technical Report. SISAP Project. [19] Gao, J., Jagadish, H. V., Lu, W., Ooi, B. C., 2014. DSH: Data sensitive hashing for high-dimensional k-nnsearch. In: Proc. ACM International Conference on Management of Data (SIGMOD). pp. 1127–1138. [20] Gionis, A., Indyk, P., Motwani, R., 1999. Similarity search in high dimensions via hashing. In: Proceedings of the 25th International Conference on Very Large Data Bases. VLDB ’99. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, pp. 518–529. URL http://portal.acm.org/citation.cfm?id=645925.671516 [21] Goyal, N., Lifshits, Y., Schütze, H., 2008. Disorder inequality: a combinatorial approach to nearest neighbor search. In: Proceedings of the 2008 International Conference on Web Search and Data Mining. ACM, pp. 25– 32. 27 [22] Houle, M. E., Nett, M., 2013. Rank cover trees for nearest neighbor search. In: Similarity Search and Applications. Springer, pp. 16–29. [23] Indyk, P., 2004. Handbook of Discrete and Computational Geometry., 2nd Edition. CRC press, chapter 39. [24] Malkov, Y., Ponomarenko, A., Logvinov, A., Krylov, V., 2012. Scalable distributed algorithm for approximate nearest neighbor search problem in high dimensional general metric spaces. In: Proc. 5th International Conference on Similarity Search and Applications (SISAP). pp. 132–147. [25] Malkov, Y., Ponomarenko, A., Logvinov, A., Krylov, V., 2014. Approximate nearest neighbor algorithm based on navigable small world graphs. Information Systems 45, 61–68. [26] Mohamed, H., 2014. Scalable approximate k-nn in multidimensional big data. phd thesis. Ph.D. thesis, University of Geneva. [27] Mohamed, H., Marchand-Maillet, S., 2013. Quantized ranking for permutation-based indexing. In: Brisaboa, N., Pedreira, O., Zezula, P. (Eds.), Similarity Search and Applications. Vol. 8199 of Lecture Notes in Computer Science. Springer Berlin Heidelberg, pp. 103–114. URL http://dx.doi.org/10.1007/978-3-642-41062-8_11 [28] Muja, M., Lowe, D., Nov 2014. Scalable nearest neighbor algorithms for high dimensional data. Pattern Analysis and Machine Intelligence, IEEE Transactions on 36 (11), 2227–2240. [29] Naidan, B., Hetland, M. L., 2012. Static-to-dynamic transformation for metric indexing structures. In: Navarro, G., Pestov, V. (Eds.), Similarity Search and Applications - 5th International Conference, SISAP 2012, Toronto, ON, Canada, August 9-10, 2012. Proceedings. Vol. 7404 of Lecture Notes in Computer Science. Springer, pp. 101–115. URL http://dx.doi.org/10.1007/978-3-642-32153-5_8 [30] Naidan, B., Hetland, M. L., 2013. Static-to-dynamic transformation for metric indexing structures (extended version). Information Systems. [31] Navarro, G., Reyes, N., 2008. Dynamic spatial approximation trees. ACM Journal of Experimental Algorithmics 12, 1.5:1–1.5:68. URL http://doi.acm.org/10.1145/1227161.1322337 [32] Navarro, G., Reyes, N., 2009. Dynamic spatial approximation trees for massive data. In: Second International Workshop on Similarity Search and Applications, SISAP 2009, 29-30 August 2009, Prague, Czech Republic. pp. 81–88. URL http://doi.ieeecomputersociety.org/10.1109/SISAP.2009.28 [33] Patella, M., Ciaccia, P., 2009. Approximate similarity search: A multifaceted problem. Journal of Discrete Algorithms 7 (1), 36–48. 28 [34] Samet, H., 2006. Foundations of Multidimensional and Metric Data Structures, 1st Edition. The morgan Kaufman Series in Computer Graphics and Geometic Modeling. Morgan Kaufmann Publishers, University of Maryland at College Park. [35] Silpa-Anan, C., Hartley, R., June 2008. Optimised kd-trees for fast image descriptor matching. In: Computer Vision and Pattern Recognition, 2008. CVPR 2008. IEEE Conference on. pp. 1–8. [36] Skopal, T., Nov. 2007. Unified framework for fast exact and approximate search in dissimilarity spaces. ACM Transactions on Database Systems 32 (4). URL http://doi.acm.org/10.1145/1292609.1292619 [37] Skopal, T., 2010. Where are you heading, metric access methods?: a provocative survey. In: Proceedings of the Third International Conference on SImilarity Search and APplications. SISAP ’10. ACM, New York, NY, USA, pp. 13–21. URL http://doi.acm.org/10.1145/1862344.1862347 [38] Tellez, E. S., Chavez, E., 2010. On locality sensitive hashing in metric spaces. In: Proceedings of the Third International Conference on SImilarity Search and APplications. SISAP 2010. ACM, New York, NY, USA, pp. 67– 74. URL http://doi.acm.org/10.1145/1862344.1862355 [39] Tellez, E. S., Chavez, E., Camarena-Ibarrola, A., November 2009. A brief index for proximity searching. In: Proceedings of 14th Iberoamerican Congress on Pattern Recognition CIARP 2009. Lecture Notes in Computer Science. Springer Verlag, Berlin, Heidelberg, pp. 529–536. [40] Tellez, E. S., Chavez, E., Graff, M., 2011. Scalable pattern search analysis. In: 3rd Mexican Congress on Pattern Recognition, MCPR 2011. Springer Verlag, Lecture Notes in Computer Science. [41] Tellez, E. S., Chávez, E., Navarro, G., 2011. Succinct nearest neighbor search. In: Proc. 4th International Conference on Similarity Search and Applications, SISAP 2011. ACM Press. [42] Tellez, E. S., Chávez, E., Navarro, G., 2012. Succinct nearest neighbor search. Information Systems. [43] Zezula, P., Amato, G., Dohnal, V., Batko, M., 2006. Similarity Search - The Metric Space Approach, 1st Edition. Vol. 32. Springer, Series: Advances in Database Systems. 29
8cs.DS
ESTIMATING PERIMETER USING GRAPH CUTS arXiv:1602.04102v2 [math.ST] 14 Aug 2016 NICOLÁS GARCÍA TRILLOS1 , DEJAN SLEPČEV2 AND JAMES VON BRECHT3 A BSTRACT. We investigate the estimation of the perimeter of a set by a graph cut of a random geometric graph. For Ω ⊂ D = (0, 1)d , with d ≥ 2, we are given n random i.i.d. points on D whose membership in Ω is known. We consider the sample as a random geometric graph with connection distance ε > 0. We estimate the perimeter of Ω (relative to D) by the, appropriately rescaled, graph cut between the vertices in Ω and the vertices in D\Ω. We obtain bias and variance estimates on the error, which are optimal in scaling with respect to n and ε. We consider two scaling regimes: the dense (when the average degree of the vertices goes to ∞) and the sparse one (when the degree goes to 0). In the dense regime there is a crossover in the nature of approximation at dimension d = 5: we show that in low dimensions d = 2, 3, 4 one can obtain confidence intervals for the approximation error, while in higher dimensions one can only obtain error estimates for testing the hypothesis that the perimeter is less than a given number. 1. I NTRODUCTION This paper investigates the use of random-graph cuts to obtain empirical estimates of the perimeter of a domain Ω ⊂ D := (0, 1)d for d ≥ 2. Let x1 , . . . , xn , . . . denote a sequence of independent random points uniformly distributed on the unit cube D and let Vn := {x1 , . . . , xn }. The problem of estimating the perimeter of Ω based on knowing which points of Vn belong to Ω is a classical question, see [4, 8, 9, 17, 23, 24] for recent contributions, and see Subsection 1.2 below which contains a discussion about related work. Here we consider an estimator of the perimeter that is based on a geometric graph constructed from the point cloud Vn . More precisely, we select εn > 0, and connect two points in the cloud if they are within distance εn of each other; then we consider an appropriately scaled ‘cut’ determined by the number of edges in the graph that connect points in Ω with points that belong to Ωc . This type of estimator is natural to consider, since graph cuts arise as a discretization of the perimeter in many applications such as clustering [3, 7, 14, 15, 18, 25, 26, 27, 28]. Our choice of the estimator is therefore based on its use in various statistical and machine learning applications. We focus on estimating the approximation error of the perimeter of an arbitrary (but fixed) set Ω; the error estimates that we obtain are uniform on a class of sets where certain geometric quantities are controlled (see Remark 1.7 below). One of the important features of our estimator is that it has a small bias. Indeed, the expectation of our estimator provides a second order approximation (in terms of the natural parameter εn ) of the true perimeter of Ω under some regularity conditions on the boundary of the set (see (8) below); this turns out to be a sharp estimate for the bias. We also obtain precise estimates for the variance of the estimator; for these estimates to hold, we do not need any regularity assumptions Date: August 16, 2016. Key words and phrases. perimeter, nonparametric estimation, graph cut, point cloud, random geometric graph, concentration inequality. 1 2 NICOLÁS GARCÍA TRILLOS1 , DEJAN SLEPČEV2 AND JAMES VON BRECHT3 on the boundary of the set Ω except that it has finite perimeter in the most general sense. Furthermore, we show that our estimator converges a.s. for remarkably sparse graphs (and indeed in settings which are sparser than for previously considered estimators). The a.s. convergence holds with no regularity assumptions on Ω (other than the fact that it has finite perimeter in the most general sense). Finally, assuming some smoothness on the boundary 1 of Ω, we are able to establish (in the dense graph regime n1/d  ε  1) the asymptotic distribution of the error. These estimates lead to asymptotic confidence intervals (which we refer to simply as confidence intervals) and bounds on the type I and type II errors for hypothesis tests associated to the perimeter of a set. 1.1. Set-up and main results. Let us now be more precise about the setting we consider in this paper. We consider random geometric graphs with vertex set Vn and radius εn > 0. That is, graphs where xi and xj are connected by an edge if ||xi − xj || ≤ εn . The graph cut between A ⊆ Vn and Ac is given by X X Cutεn (A, Ac ) := 1{kxi −xj k≤εn } . xi ∈A xj ∈V \A We define the graph perimeter as a rescaling of the graph cut: For any Ω ⊆ D 2 (1) GPern,εn (Ω) := Cut(Vn ∩ Ω, Vn ∩ Ωc ). n(n − 1)εd+1 n See Figure 1 for an illustration of this construction. The scaling is chosen so that GPern,εn (Ω) becomes a consistent estimator for the true (continuum) perimeter. Ω Ωc F IGURE 1. Edges of the cut between Ω and Ωc are represented by bold lines, while other edges are dashed lines. Total number of vertices is n = 200 and connectivity radius ε = 0.13. One of our interests lies in determining how well does GPern,εn (Ω) estimate the relative perimeter of Ω in D. We first investigate for which scaling of εn on n does the convergence ESTIMATING PERIMETER USING GRAPH CUTS 3 hold almost surely as n → ∞. In other words, we want to understand the relation between edge-sparsity of random geometric graphs and point-wise convergence of the graph perimeter to the continuum perimeter in the almost sure sense. We consider this question for a very broad family of sets Ω ⊂ D, which are only assumed to have finite relative perimeter in D in the general sense of [2]. That is, we define the relative perimeter of Ω with respect to D to be Z  ∞ d (2) Per(Ω) = sup div(v) dx : (∀x ∈ D) kv(x)k ≤ 1, v ∈ Cc (D, R ) . Ω If Ω has a smooth relative boundary then Per(Ω) is nothing but the surface area of ∂Ω ∩ D. We remark that the notion of the perimeter we use is more general than the notion of Hausdorff measure of the boundary, Hd−1 (∂Ω ∩ D), and than the Minkowski content, which are the ones more typically used in the statistics literature [4, 8, 9]. In particular, as we see below, we work with consistent nonparametric estimators in the most general setting available. As we recall below in (17 –19), it is known that when εn → 0 as n → ∞ then the bias of the estimator vanishes in the limit: (3) E(GPern,εn (Ω)) → σd Per(Ω) as n → ∞. The scaling factor σd satisfies Z (4) |z1 | dz = σd := ||z||≤1 2sd−2 , (d + 1)(d − 1) where z1 denotes the first component of the vector z ∈ Rd and sd−2 is the area of the (d − 2)-dimensional unit sphere (the boundary of the unit ball in Rd−1 ). We refer to the normalizing quantity σd as the surface tension. We obtain the following estimates on the deviation of the graph perimeter GPern,εn (Ω) from its mean. Let  1 1  √nε if n1/d ≤ εn n (5) f (n, εn ) := 1 1 1  (d+1)/2 if n2/(d+1) ≤ εn ≤ n1/d . nεn Theorem 1.1. Let p ≥ 1 and let Ω ⊆ D be a set with finite perimeter. Assume εn → 0 as n → ∞. Then, (6) E(| GPern,εn (Ω) − E(GPern,εn (Ω))|p ) ≤ Cp,d (max{1, Per(Ω)}f (n, εn ))p where Cp,d is a constant that depends only on p and dimension d. In particular, if 2 n− (d+1)  εn  1, then GPern,εn (Ω) → σd Per(Ω), almost surely as n → ∞. The last part of the previous theorem follows from (3), the moment estimates (6), Markov’s inequality, and Borel-Cantelli Lemma which imply that GPern,εn (Ω) − E (GPern,εn (Ω)) → 0 a.s. Remark 1.2. We note that the a.s. convergence holds for rather sparse graphs (see Figure 2). Namely the typical degree of a node is ωd nεd , where ωd is the volume of the unit ball in d 2 1 dimensions. When n− (d+1)  εn  n− d the a.s. convergence holds, while the average 4 NICOLÁS GARCÍA TRILLOS1 , DEJAN SLEPČEV2 AND JAMES VON BRECHT3 (a) n = 400 and ε = 0.045 (b) n = 1000 and ε = 0.027 F IGURE 2. Here we illustrate the “sparse” regime when 1/n1/d  ε  (1/n)2/d+1 when the average degree goes to zero. Nevertheless since the number of edges in the cut still increases as n does the convergence of the cut to the perimeter still holds. degree of a vertex converges to zero. The convergence is still possible because the expected number of edges crossing ∂Ω is still a quantity converging to infinity. Remark 1.3. Given that we show the almost-sure consistency of our estimators for any arbitrary (but fixed) set for which the perimeter is finite, our construction provides a universal strongly convergent estimator which was the desired property listed as an open problem in [8] (for the estimator they considered). We turn to estimating the bias of the empirical approximation: |E(GPern,εn (Ω)) − σd Per(Ω)|. We first characterize the mean of the graph perimeter, E(GPern,εn (Ω)), as the non-local perimeter Perεn (Ω) of Ω, defined as Z Z 2 (7) Perε (Ω) := d+1 1{kx−yk≤ε} dxdy. ε Ω D\Ω The non-local nature of the functional essentially has to do with the fact that it involves averages of finite differences as opposed to a local approach where one considers derivatives. We then proceed to estimate |Perεn (Ω) − σd Per(Ω)| explicitly. It proves straightforward to check that |Perεn (Ω) − σd Per(Ω)| = O (εn ) for general subsets Ω ⊆ D with smooth relative boundary. However, we show that the error is actually quadratic in εn (8) |E(GPern,εn (Ω)) − σd Per(Ω)| = |Perεn (Ω) − σd Per(Ω)| = O(ε2n ) under the extra condition that dist(Ω, ∂D) > 0. This is the content of the next lemma, whose proof may be found in Appendix A. Lemma 1.4. Let Ω be a set with smooth boundary, such that dist(Ω, ∂D) > 0. Let 0 < ε < dist(Ω, ∂D) and let Perε (Ω) be defined by (7). Then (9) Perε (Ω) = σd Per(Ω) + O(ε2 ). ESTIMATING PERIMETER USING GRAPH CUTS 5 Remark 1.5. The assumption dist(Ω, ∂D) > 0 in the above Lemma is needed in order to obtain bias of order ε2 . If Ω touches the boundary ∂D the error of order ε2 is not expected, as can be seen for example by considering the rectangle Ω := {x = (x1 , . . . , xd ) ∈ D : x1 ≤ 1/2}, for which the error is of order ε; in this situation the error is completely due to the region where ∂Ω meets ∂D transversally. Thus, in general, for Ω ⊆ D with smooth relative boundary, the bias is of order ε. On the other hand, the smoothness of the boundary of Ω is only needed in the previous lemma to guarantee that curvature and its derivatives are well defined. Finally, the constant involved in the term O(ε2 ) depends on the reach of the set Ω, and the intrinsic curvature of ∂Ω together with its derivatives; this can be seen from our computations in Appendix A. Combining the bias and variance of estimates allows us to obtain the rates of convergence for the error |GPern,εn (Ω) − σd Per(Ω)|. In particular we estimate the ‘standard deviation’ 1/2 std(n) := E (GPern,εn (Ω) − σd Per(Ω))2 , which we may quantify precisely by using the variance-bias decomposition 2 std2 (n) = Var(GPern,εn (Ω)) + (E(GPern,εn (Ω)) − σd Per(Ω)) . Using the special case p = 2 of Theorem 1.1 to estimate the variance and using Lemma 1.4 to estimate the bias we obtain the following. 2 Theorem 1.6. Let Ω ⊂ D be an open set with smooth boundary. Assume n− d+1  εn  1 and consider f (n, εn ) defined via (5). The error of approximating σd Per(Ω) by GPern,εn (Ω) satisfies std(n) = O(f (n, εn ) + εn ). If we furthermore assume that Ω does not touch the boundary of D, that is dist(Ω, ∂D) > 0, then a better estimate holds: std(n) = O(f (n, εn ) + ε2n ). A simple calculation using (5) allows one to choose a scaling of εn on n so that the error of the approximation is as small as possible. In particular, for a set Ω which touches the boundary (dist(Ω, ∂D) = 0) the optimal scaling of εn is ( ( n−1/3 if d ≤ 3 n−1/3 if d ≤ 3 εn ∼ giving std(n) = −2/(d+3) −2/(d+3) n if d ≥ 3 n if d ≥ 3. We note that for d < 3 the optimal εn is achieved in the regime n−1/d . εn  1, while if d > 3 it is in the sparse regime. If we consider sets Ω with smooth boundary but such that dist(Ω, ∂D) > 0, then the optimal scaling of εn on n is as follows ( ( n−2/5 if d ≤ 5 n−1/5 if d ≤ 5 εn ∼ giving std(n) = −4/(d+5) −2/(d+5) n if d ≥ 5 n if d ≥ 5. Again we note that the optimal εn is in the sparse regime if d > 5. This has implications to how well is the perimeter estimated by graph cuts in the graphs considered in most machine learning applications. Namely if d ≥ 5 and the graph has average degree bounded from below, that is when n−1/d . εn  1, then, since the bias bound is sharp, most of the error is due to the bias term. 6 NICOLÁS GARCÍA TRILLOS1 , DEJAN SLEPČEV2 AND JAMES VON BRECHT3 Remark 1.7. The constant appearing in the moment estimates of Theorem 1.1 depends exclusively on the power p, the dimension d, and the true perimeter of the set Ω; in particular, taking p = 2 we see that the estimates for the variance of GPern,εn (Ω) are uniform on the class of sets Ω whose perimeter is bounded above by some fixed constant. For general sets with large perimeter we obtain uniform estimates for moments of relative error | GPern,εn (Ω) − E(GPern,εn (Ω))|/ Per(Ω) instead of the absolute error. Thus, by combining Theorem 1.1 and the proof of Lemma 1.4 one can derive that the corresponding error estimates for |GPern,εn (Ω) − σd Per(Ω)| (either relative or absolute) are uniform on the class of sets Ω with smooth boundary satisfying the following conditions: The reach of Ω is bounded below by a fixed positive constant; The distance to the boundary ∂D is bounded below by a fixed positive constant; The curvature and first derivatives of curvature are bounded from above by a fixed constant. This last requirement comes from the O(ε2 ) terms following Taylor’s theorem in the proof of our bias estimates. We now consider obtaining confidence intervals for the value of the true perimeter Per(Ω) based on the estimator σ1d GPern,εn (Ω). We focus on the dense regime (See Figures 3 1 and 4), n1/d  εn  1, and first obtain the asymptotic distribution of GPern,εn (Ω) − E(GPern,εn (Ω)). (a) n = 100, ε = 0.17 (b) n = 300 and ε = 0.12 F IGURE 3. Here we illustrate the “very dense” regime, 1  ε  (ln(n)/n)1/d , when the graphs are connected with high probability. Since the term E (GPern,εn (Ω)) = Perεn (Ω) depends on the set Ω itself, which is unknown (we only assume we have an oracle access to it), we need the bias to be negligible compared to the standard deviation of our estimator. This allows us to construct confidence intervals for Per(Ω) without using any additional information about the bias (e.g. upper 1 bounds). From (6) the standard deviation of GPern,εn (Ω) scales as √nε while by (8) the n 2 bias scales as εn ; these estimates lead to restrictions on the dimensions for which the bias is negligible with respect to the standard deviation. Namely this is possible for d = 2, 3, and 4. ESTIMATING PERIMETER USING GRAPH CUTS (a) n = 100 and ε = 0.12 7 (b) n = 400 and ε = 0.07 F IGURE 4. Here we illustrate an intermediate, ”dense”, regime (ln(n)/n)1/d  ε  (1/n)1/d . The average degree still increases, but the graphs are disconnected with high probability. Theorem 1.8. Let Ω ⊆ D be an open set with smooth boundary such that dist(Ω, ∂D) > 0. Let εn be such that 1  εn  1 1/d n Then, r nεn w (GPern,εn (Ω) − Perεn (Ω)) −→ N (0, 1), 4Cd Per(Ω) where Cd is given by Z 1  2 (10) Cd := 2 Bd (0, 1) ∩ x = (x1 , . . . , xd ) ∈ Rd : xd ≥ t dt. 0 If in addition the dimension d is either 2, 3 or 4 and if 1 (11) n1/d  εn  1 n1/5 then, r (12) nεn w (GPern,εn (Ω) − σd Per(Ω)) −→ N (0, 1). 4Cd Per(Ω) Naturally, the previous theorem implies that one can obtain confidence intervals for the value of Per(Ω) when the dimension d is 2, 3 or 4. Let us fix α ∈ (0, 0.5) and let Zα be the 1 − α quantile of the standard normal distribution. That is, Zα is such that P (N (0, 1) ≤ Zα ) = 1 − α. Then provided that 1 n1/d  εn  1 n1/5 , 8 NICOLÁS GARCÍA TRILLOS1 , DEJAN SLEPČEV2 AND JAMES VON BRECHT3 + it follows that with probability converging to 1 − α, Per(Ω) ∈ (a− n , an ), where s 4Cd Per(Ω) 1 a± (GPern,εn (Ω) ± Zα/2 ). n := σd nεn For d ≥ 5, the confidence intervals can not be obtained unless one has some extra quantitative information on the smoothness of ∂Ω, such as curvature bounds or upper bounds on the bias. Nevertheless, since it is known that the nonlocal perimeter Perεn (Ω) = E(GPern,εn (Ω)) is less than σd Per(Ω) (see (30)), one can construct a test for the hypothesis that Per(Ω) is less than a certain number ρ without using any quantitative estimates on the smoothness of ∂Ω. In this case, we have automatic upper bounds for the bias and may consider the hypothesis testing of (13) H0 : Per(Ω) ≤ ρ, vs HA : Per(Ω) > ρ, based on our estimator GPern,εn (Ω). We consider the statistic: r nεn (14) ln := (GPern,εn (Ω) − σd ρ) . 4Cd ρ The test consists on (15) Accept H0 if ln ≤ Zα , Proposition 1.9. Assume d ≥ 2 and 1 n1/d reject otherwise.  εn  1. Then, the type I error satisfies lim sup PH0 (ln > Zα ) ≤ α, n→∞ i.e., the type I error is asymptotically below α. The type II error satisfies   1 PHA (ln ≤ Zα ) = O √ . nεn Remark 1.10 (Extensions). The estimates obtained in Theorem 1.1 and Theorem 1.6 are not exclusive to the case where the points are uniformly distributed in the unit cube and to geometric graphs. In fact, with slight modifications to the proofs of Theorem 1.1 and Theorem 1.6, we can extend these results to more general situations. For example, if the data points are distributed according to some smooth density p that is supported on a regular, bounded domain D ⊂ Rd with p bounded below and above by positive constants, then the results still hold. In this case, the limiting value of GPern,εn (Ω) is a weighted perimeter Per(Ω, p2 ) (see for example [10]). Convergence is guaranteed for the same scaling for εn as in the uniform case. The fact that the weight is p2 and not p (as may be a priori expected) ultimately comes from the fact that a graph cut is a double sum. Furthermore if instead of weights 1{kxi −xj k≤εn } in the definition of the graph cut, one considers edge weights η(kxi − xj k/εn ) where η is nonnegative, integrable and nonincreasing, the results still hold, provided we change the surface tension σd with a surface tension associated to η defined as in [10]. Remark 1.11. The previous results allow us to construct asymptotic confidence intervals for Per(Ω) for an arbitrary set Ω with smooth boundary and dist(Ω, ∂D) > 0, using the estimator GPern,εn (Ω). Nevertheless, since very small sets (in the sense of volume) may have very large perimeter the error estimates are not uniform in Ω and thus the asymptotic confidence intervals may not be of direct practical use. This issue is unavoidable without further assumptions on the set Ω or a change of framework for testing. One possible way ESTIMATING PERIMETER USING GRAPH CUTS 9 to restrict the class of Ω considered is pointed out in Remark 1.7. In the class of sets Ω to which Remark 1.7 applies, the error of approximation is uniformly controlled. Alternatively, one may consider the property testing framework used in [23, 21], where one could test the property “the set Ω is close to a set whose perimeter is less than ρ” reliably. In that framework we would not be using the estimator GPern,εn (Ω) to test whether Per(Ω) is below ρ or not, but rather whether Ω is close to a set whose perimeter is below ρ or not. We notice that in this paper we have taken the classical hypothesis testing approach. Outline. In Subsection 1.3 we establish (3) and give an outline of the argument behind our main results. We present the proof of Theorem 1.1 in Section 2, while in Subsection 2.1 we show that the scaling is sharp (up to logarithmic corrections) in the sense that if n2 εd+1 → 0 then GPern,εn (Ω) converges in probability to zero and hence does not n converge almost surely to the (rescaled) relative perimeter. In Section 3 we prove the results on the asymptotic distribution of the error stated in Theorem 1.8. In Subsection 3.1 we study the type I and type II errors of the hypothesis test of Proposition 1.9. Finally, Appendix A deals with the bias estimate from Lemma 1.4. 1.2. Discussion. Here we discuss the connections between our work and related works in the literature. First we relate it to other estimators of perimeter based on a random sample. Then we contrast the type of the convergence and the scaling regimes considered in this paper with the ones needed for the convergence of graph-cut based machine learning algorithms for clustering and related tasks. The problem of estimating the perimeter of a set, Ω, based on knowing which points of a random sample Vn belong to Ω, has been considered by a number of works. Cuevas, Fraiman, and Rodrı́guez-Casaet [9], considered estimators of the Minkowksi content, which agrees with perimeter for regular enough sets, but is a less general notion of the perimeter than the one we consider, (2). Their estimator is based on counting the vertices near the boundary (relative to a parameter εn ), while we “count” edges of a graph. The error bound obtained was of order O(n−1/2d ). Pateiro-López and Rodrı́guez-Casal [24] consider a similar estimator and improve the bounds to O((ln n/n)1/(d+1) ) under qualitative regularity conditions (rolling ball conditions). Cuevas, Fraiman, and Györfi [8], obtain the convergence of estimators similar to those of [9], when εn  1/n1/d and under weaker conditions on the regularity of Ω, although still not in the full generality we consider in this paper. Armendáriz, Cuevas, and Fraiman [4] consider a similar set-up to that in [9, 24] but with different sampling rates for Ω and Ωc : let n denote the number of sample points in Ω and k the number of sample points in Ωc . Under mild assumptions on the regularity of ∂Ω, and under some conditions on n and k which include 1  εn,k  (1/n1/3 ) and k  (n/εn,k )d/2 they obtain the asymptotic distribution of the error, under the same scaling in n and ε that we consider in Theorem 1.8. We notice that our estimator is different, and also that in [4] a very large number of points k in Ωc is needed for the consistency to hold. This allows the authors to obtain the asymptotic distribution of the total error in any dimension, while in our setting we only obtain it in low dimensions. A further difference between their work and ours, is that we allow for a wider range in ε, namely 1  εn  (1/n)2/(d+1) . Jiménez and Yukich [17] give a different use to the point cloud and instead of considering a parameter ε to count points close to the boundary of the set or to define a geometric graph, they consider a new estimator based on the Delaunay triangulation induced by the cloud. They obtain results not only on estimating the perimeter of the set, but also integrals of functions over ∂Ω. 10 NICOLÁS GARCÍA TRILLOS1 , DEJAN SLEPČEV2 AND JAMES VON BRECHT3 Kothari, Nayyeri, and O’Donnell [21] and Neeman [23] consider an estimator essentially based on the following procedure: pick n random points uniformly distributed on D and to each point associate a random direction for a ‘needle’ based at the point with length of order √ εn ; then count how many of the needles touch the boundary of Ω. Their main motivation is to consider the perimeter estimation from the viewpoint of property testing as introduced in [19]. In that setting, the idea is to produce an algorithm that requires a small number of samples (essentially independent of the dimension d) in order to determine if a given set has a small perimeter or is ‘far away’ from a set that has small perimeter. The authors show completeness and soundness of the test they design (the notion of completeness and soundness is as in [19, 21]). The notion of testing used in their work is one of the main differences with our work since we consider the perimeter testing in the more classical framework of hypothesis testing (Proposition 1.9). We note that the completeness of [21] is analogous to the type I error, but the soundness is fundamentally different from estimating the type II error. It is also worth mentioning the work of Belkin, Narayanan and Niyogi [5] where they consider an algorithm that requires as few samples as possible in order to estimate the perimeter of a convex body. Their results show that there is an algorithm that uses O(d4 γ −2 ) samples to obtain an estimator for the true perimeter of the convex set, with an error of approximation of γ; this statement holds with high probability. We notice the polynomial dependence on dimension in their estimates. Let us now contrast the type of the convergence and the scaling regimes that we consider in this paper with the ones needed for the convergence of graph-cut based machine learning algorithms for clustering and related tasks. Graph-cut based algorithms for tasks such as clustering have played an important role in machine learning [3, 7, 14, 15, 18, 25, 26, 27, 28]. Data clustering algorithms are called consistent if as the sample size n → ∞ their outputs converge to a desired partitioning of the underlying measure being sampled. It is of interest to understand under what scaling of εn on n does the consistency hold. Here we showed that for a fixed set Ω the value of graph perimeter (and indeed of the graph-cut-based objective functionals such as Cheeger, ratio, or normalized cuts) converges to the perimeter of Ω; this result holds even for rather sparse graphs (Theorem 1.6). In particular, partitioning such sparse graphs (as on Figure 2) does not provide almost any information about the clusters present in the data. We conclude that the convergence of the graph perimeter of a fixed set towards the continuum perimeter does not provide the needed information on the asymptotic properties of graphcut based clustering algorithms. To obtain consistency of such algorithms one needs a stronger notion of convergence of graph based functionals towards continuum functionals. Recently the authors [10], and together with Laurent and Bresson [11] have developed the appropriate notion of convergence (based on Γ-convergence from the calculus of variations), and have applied it to consistency of Cheeger, ratio, sparsest, and normalized cut based point cloud clustering. More specifically, in [11] it is shown that consistency holds if (log(n))1/d  ε  1 (for d ≥ 3), in that regime the graphs are connected with high n1/d probability as n → ∞. 1.3. Outline of the argument. In order to understand the asymptotic behavior of the graph perimeter, following [3] we first define a symmetric kernel φε : D × D → (0, ∞) by φεn (x, y) = 1{||x−y||≤εn } εd+1 n |1Ω (x) − 1Ω (y)|. ESTIMATING PERIMETER USING GRAPH CUTS 11 Using the kernel φεn , we can then write GPern,εn (Ω) as (16) n n X X 2 GPern,εn (Ω) = φε (xi , xj ), n(n − 1) i=1 j=i+1 n which is a U-statistic in the terminology of [16]. A simple computation shows that the mean of this U -statistic, is the non-local perimeter Perε (Ω) defined in (7), that is, Z Z (17) E(GPern,εn (Ω)) = Perεn (Ω) = φε (x, y) dxdy. D D Additionally, Remark 4.3 in [10] establishes that the non-local perimeter Perεn (Ω) approaches a constant multiple of the relative perimeter of Ω as the parameter εn goes to zero. More precisely, if εn → 0 as n → ∞ then (18) Perεn (Ω) → σd Per(Ω) as n → ∞ for σd the surface tension (4). This convergence also follows from the estimates in Appendix A in the special case that Ω has a smooth boundary. Combining (18) with (17) we conclude that if εn converges to zero as n → ∞ then (19) E(GPern,εn (Ω)) → σd Per(Ω) as n → ∞. Since the graph perimeter GPern,εn (Ω) is a U -statistic of order two we can use the general theory of U -statistics to obtain moment estimates for GPern,εn (Ω). Let us first note that Hoeffding’s decomposition theorem for U -statistics of order two (see [20]) implies that GPern,εn (Ω) can be written as: (20) GPern,εn (Ω) − Perεn (Ω) = 2Un,1 + Un,2 , where Un,1 is a U-statistic of order one ( just a sum of centered independent random variables) and Un,2 is a U-statistic of order two which is canonical or completely degenerate (see [20]). In order to define the variables Un,1 and Un,2 , let us introduce the functions Z φ̄εn (x) := φεn (x, z) dz, x ∈ D, D (21) gn,1 (x) := φ̄εn (x) − Perεn (Ω), x ∈ D, gn,2 (x, y) := φεn (x, y) − φ̄εn (x) − φ̄εn (y) + Perεn (Ω), x, y ∈ D. With the previous definitions, we can now define n Un,1 = (22) Un,2 = 1X gn,1 (xi ), n i=1 X 2 n(n − 1) gn,2 (xi , xj ). 1≤i<j≤n R R We remark that D gn,1 (z)dz = 0 and that D gn,2 (x, z)dz = 0 for all x ∈ D. Because of this, Un,1 and Un,2 are said to be canonical statistics of order one and two respectively (see [20]). Now, Bernstein’s inequality [6] implies that Cp p  , (23) E(|Un,1 |p ) ≤ p max Apn,1 , Bn,1 n where √ (24) An,1 := ||gn,1 ||∞ , Bn,1 := n||gn,1 ||2 . 12 NICOLÁS GARCÍA TRILLOS1 , DEJAN SLEPČEV2 AND JAMES VON BRECHT3 and Cp is a universal constant. See also [12] for a slight generalization of the previous result. On the other hand some of the moment estimates in [12] for canonical U -statistics of order two can be used to prove that (25) E (|Un,2 |p ) ≤ Cp p  p , Cn,2 , max Apn,2 , Bn,2 2p n where (26) An,2 := ||gn,2 ||∞ , Bn,2 := n||gn,2 ||2 , (Cn,2 )2 := n|| Z 2 gn,2 (·, y) dy||∞ . D and Cp is a universal constant. From the decomposition (20) it follows that for p ≥ 1 E (| GPern,εn (Ω) − Perεn (Ω)|p ) ≤ Cp (E (|Un,1 |p ) + E (|Un,2 |p )). Thus in order to obtain the moment estimates for GPern,εn (Ω) in Theorem 1.1, we focus on finding estimates for the quantities in (24) and (26). Remark 1.12. The estimates on Un,1 and Un,2 exhibit a crossover in the nature when the 1 1  εn  n1/d parameter εn transitions between the sparse ( n2/(d+1) ) and the dense regime 1 ( n1/d  εn  1). From the theory of U -statistics the crossover in the nature of the bounds, is connected to the different nature of the two components in the canonical decomposition for U -statistics. Under the dense regime the biggest source of error comes from the term Un,1 while in the sparse regime the biggest source of error comes from the term Un,2 . The two variables Un,1 and Un,2 exhibit a different nature. In fact, one can think that Un,1 is a global quantity as it is the sum of averages, while Un,2 is simply the sum of pure interactions concentrating on the boundary of the set Ω. We believe that there is a deeper geometric and analytic reason for the scaling of the error that appears in the sparse regime 1 1 ( n2/(d+1)  εn  n1/d ). Moreover, we believe that such understanding would allow us to complete the study of the asymptotic distribution in Theorem 1.8 for the sparse regime. We expect such distribution to be of the Gaussian chaos type. The bias estimates in Appendix A are obtained by a series of computations whose starting point is writing Perε (Ω) in terms of an iterated integral, the outer one taken over the manifold ∂Ω and the inner one taken along the normal line to ∂Ω at an arbitrary point x ∈ ∂Ω. Such computations show that the first order term of Perεn (Ω) on εn vanishes. Finally, Theorem 1.8 is obtained by using the canonical decomposition of U -statistics 1 and by noticing that in the dense regime n1/d  εn  1, the variable Un,2 is negligible in relation to Un,1 . We make use of the CLT for triangular arrays after computing the variances of the involved variables. 2. P ROOF OF T HEOREM 1.1 We first compute the moments of Un,1 and so we start computing the quantities An,1 and Bn,1 from (24). Denote by Tε the ε-tube around ∂Ω, that is, consider the set  (27) Tε := x ∈ Rd : dist(x, ∂Ω) ≤ ε . We also consider the half tubes Tε− and Tε+ , (28) Tε− := {x ∈ Ω : dist(x, ∂Ω) ≤ ε} , Tε+ := {x ∈ Ωc : dist(x, ∂Ω) ≤ ε} . ESTIMATING PERIMETER USING GRAPH CUTS With these definitions it is straightforward to check that  d+1   |Bd (x, εn ) ∩ Ω|/εn c (29) φ̄εn (x) = |Bd (x, εn ) ∩ Ω |/εd+1 n   0 13 if x ∈ Tε+n if x ∈ Tε−n if x 6∈ Tεn . Since |Bd (x, εn ) ∩ Ω| and |Bd (x, εn ) ∩ Ωc | are bounded by αd εdn , where αd is the volume of the d-dimensional unit ball, we deduce that   1 An,1 = O . εn In order to compute the quantity Bn,1 we use the following lemma, whose proof may be found in Appendix B. Lemma 2.1. Let p ≥ 1 and let Ω ⊆ D, be a set with finite perimeter. Then, for all ε > 0 we have Z αp−1 σd φ̄pεn (x)dx ≤ dp−1 Per(Ω). ε D In particular, taking p = 1 in the previous expression, we obtain Perε (Ω) ≤ σd Per(Ω). (30)   R Using the previous lemma with p = 2 we deduce that D φ̄2εn (x)dx = O ε1n , and since Z Z 2 2 gn,1 (x)dx = φ̄2εn (x)dx − (Perεn (Ω)) , D D we conclude that r Bn,1 = O n εn  . From the previous computations, we deduce that p  p E(|Un,1 | ) ≤ Cp,d max{1, Per(Ω)} max 1 1 p , p n εn , np/2 εp/2 n where Cp,d depends on p and d, but is independent of the set Ω. If in particular nε1n is o(1), then (31) E(|Un,1 |p ) ≤ Cp,d max{1, Per(Ω)}p p/2 np/2 εn  1 n2/(d+1) , ≤ εn , so that . R Remark 2.2. Later on, in Lemma 3.1, we provide an explicit computation of D φ̄2εn (x)dx up to order ε1n , which is useful when studying the asymptotic distribution of a rescaled version of Un,1 . Now we turn to the task of obtaining moment estimates for Un,2 . We estimate the quantities An,2 , Bn,2 and Cn,2 from (26). Let us start by estimating An,2 . Note that for any (x, y) ∈ D × D, φ̄εn (x) and φ̄εn (y) are of order ε1n and that Perεn (Ω) is of order one. Thus, it is clear from the definition of gn,2 in (21) that   1 An,2 = O . εd+1 n 14 NICOLÁS GARCÍA TRILLOS1 , DEJAN SLEPČEV2 AND JAMES VON BRECHT3 1 φεn (x, y), we obtain that for every x ∈ D, On the other hand, using φ2εn (x, y) = εd+1 n Z Z 2 gn,2 (x, y)dy = φ2εn (x, y)dy − φ̄2εn (x) + 2θn φεn (x) D D Z Z − 2 φεn (x, y)φ̄εn (y)dy + φ̄2εn (y)dy − θn2 D D (32) 1 = d+1 φ̄εn (x) − φ̄2εn (x) + 2θn φεn (x) εn Z Z −2 φεn (x, y)φ̄εn (y)dy + φ̄2εn (y)dy − θn2 , D D where we are using θn := Perεn (Ω). From this, it follows that  r n Cn,2 = O . εd+2 n Finally, upon integration of (32) and direct computations, we obtain Z θn 2 ||gn,2 ||2 = d+1 − 2 φ̄2εn (y)dy + θn2 , εn D which implies that   n Bn,2 = O . (d+1)/2 εn Thus, from (25) we deduce that   1 1 1 p E(|Un,2 | ) ≤ Kp,d max , , , p(d+1) p(d+1)/2 p(d+2)/2 n2p εn np εn n3p/2 εn where Kp,d = Cp,d (max{1, Per(Ω)})p for Cp,d some constant that does not depend on the 1 set Ω. Hence, if n2/(d+1) ≤ εn , we have E(|Un,2 |p ) ≤ (33) Kp,d p(d+1)/2 np εn . Combining (31) and (33) and using the canonical decomposition (20), we obtain (6). 2.1. Sharpness of the Rate in Theorem 1.1. A very simple argument shows that the rates for εn that guarantee the almost sure convergence of the graph perimeter to the actual perimeter in Theorem 1.1 are optimal in terms of scaling, up to logarithmic corrections. In fact, suppose n2 εd+1 = o(1) and let en denote the random variable that counts the n number of edges that cross in the interface between Ω and its complement. In other words, we define n n X X en := εd+1 φεn (xi , xj ). n i=1 j=i+1 As a consequence, if Ω has finite perimeter then we have (34) GPern,εn (Ω) = 2 en , n(n − 1)εd+1 n E(en ) = n(n − 1)εd+1 n Perεn (Ω). 2 Note that en takes integer values in the range {0, 1, . . . , N } for N = n(n − 1)/2, so that N X E(en ) = kpnk pnk := P(en = k). k=1 ESTIMATING PERIMETER USING GRAPH CUTS 15 The fact that pn0 + · · · + pnN = 1 implies E(en ) = N X kpnk ≥ k=1 N X pnk = (1 − pn0 ). k=1 In particular, from (34) and (18) we deduce that if n2 εd+1 → 0 and Ω has finite perimeter n then (1 − pn0 ) ≤ E(en ) = o(1). On the other hand, note that for any given γ > 0 it is true that GPern,εn (Ω) > γ implies that en 6= 0. In turn P (GPern,εn (Ω) > γ) ≤ P (en 6= 0) = 1 − pn0 = o(1). We conclude that if n2 εd+1 → 0 then GPern,εn (Ω) converges in probability to zero. n Therefore, if Ω has a non-zero, finite perimeter then GPern,εn (Ω) does not converge to σd Per(Ω) in probability (nor almost surely, either). 3. P ROOF OF T HEOREM 1.8 The proof of Theorem 1.8 relies on the following lemma, whose proof may be found in Appendix C. Lemma 3.1. Asssume that εn → 0 as n → ∞, and that Ω ⊂ D is an open set with smooth boundary so that dist(Ω, ∂D) > 0. Then (35) Var(gn,1 (X1 )) = Cd Per(Ω) + O(1), εn where Cd is given by (10). Now we turn our attention to the proof of Theorem 1.8. Proof of Theorem 1.8. Note that from (20), (21) and (22) we obtain r r n X nεn εn (GPern,εn (Ω) − Perεn (Ω)) = gn,1 (xi ) 4Cd Per(Ω) nCd Per(Ω) i=1 r nεn + Un,2 . 4Cd Per(Ω) From the moment estimates (33), we deduce that r nεn P (36) Un,2 → 0. 4Cd Per(Ω) On the other hand, we note that from (35) √ std(gn,1 (x1 )) εn p → 1, Cd Per(Ω) as n → ∞, where std(gn,1 (x1 )) is the standard deviation of gn,1 (x1 ). Lyapunov’s condition which is sufficient to allow us to use the central limit theorem for triangular arrays is easily checked from Lemma 2.1. We deduce that r n X εn w gn,1 (Xi ) −→ N (0, 1). nCd Per(Ω) i=1 16 NICOLÁS GARCÍA TRILLOS1 , DEJAN SLEPČEV2 AND JAMES VON BRECHT3 Combining with (36) and the Slutsky’s theorem, we obtain the desired result. Finally, to obtain the last statement in the theorem, we note that from the bias estimates in Lemma 1.4, √ nεn | Perεn (A) − σd Per(A)| = O(n1/2 ε5/2 n ) √ Under the condition (11), we conclude that nεn | Perεn (A) − ση Per(A)| → 0. This implies (12).  3.1. Application to Perimeter Testing. Here we prove Proposition 1.9. We assume that Ω ⊆ D is an open set with smooth boundary such that Ω ⊂ D. Note that under the null hypothesis, if ln > Zα , then, r nεn (37) Zα < ln ≤ (GPern,εn (Ω) − Perεn (Ω)) , 4Cd Per(Ω) where we used that Perεn (Ω) ≤ σd Per(Ω) by Lemma 2.1. Thus, using Theorem 1.8, we deduce that asymptotically, the type I error of our test is r  nεn PH0 (ln > Zα ) ≤ P (GPern,εn (Ω) − Perεn (Ω)) > Zα 4Cd Per(Ω) −→ P (N (0, 1) > Zα ) = α, which establishes the first part of Proposition 1.9. In order to compute the type II error of our test, suppose that Per(Ω) = ρ0 where ρ0 > ρ. In that case, (38) r  nεn (σd ρ − Pern,εn (Ω)) ≥ −Zα PHA (ln ≤ Zα ) = PHA 4Cd ρ  r r nεn nεn = PHA (Perεn (Ω) − Pern,εn (Ω)) ≥ −Zα + (Perεn (Ω) − σd ρ) , 4Cd ρ 4Cd ρ Now recall that limn→∞ Perεn (Ω) = σd Per(Ω) = σd ρ0 > σd ρ. In particular, we deduce that r nεn lim (Perεn (Ω) − σd ρ) = +∞. n→∞ 4Cd ρ Thus, for large enough n, r r nεn 1 nεn −Zα + (Perεn (Ω) − σd ρ) ≥ (σd ρ0 − σd ρ). 4Cd ρ 2 4Cd ρ Hence, for large enough n, r  r nεn 1 nεn PHA (ln ≤ Zα ) ≤ PHA (Perεn (Ω) − Pern,εn (Ω)) ≥ (σd ρ0 − σd ρ). 4Cd ρ 2 4Cd ρ Using the moment estimates from Theorem 1.1, and Markov’s inequality, we deduce that   1 . PHA (ln ≤ Zα ) = O √ nεn That is, the type II error is of order √1 . nεn ESTIMATING PERIMETER USING GRAPH CUTS 17 A PPENDIX A. P ROOF OF L EMMA 1.4 Since Ω ⊂⊂ D and Ω has smooth boundary the relative perimeter of Ω with respect to D in the generalized sense (2) simply corresponds to the usual perimeter of ∂Ω in the sense that Z dHd−1 = Hd−1 (∂Ω). Per(Ω) = ∂Ω Additionally, for all ε ≤ δ := dist(Ω, ∂D) we have that Z 2 Perε (Ω) = d+1 |Bd (x, ε) ∩ Ωc | dx, ε Ω where Bd (x, r) denotes the ball of radius r in Rd centered at x and Ωc denotes the complement of Ω in all of space. Moreover, since ∂Ω is a compact smooth manifold, we can assume without the loss of generality ( by taking ε small enough) that for every x ∈ Tε there is a unique point P (x) in ∂Ω closest to x. Furthermore, we can assume that the map P is smooth. We may further write Perε (Ω) = 2 εd+1 Z Tε− |Bd (x, ε) ∩ Ωc | dx, where Tε− is defined in (28). This reformulation makes it natural to write the previous integral as an iterated integral; the outer integral is taken over the manifold ∂Ω and the inner integral is taken along the normal line to ∂Ω at an arbitrary point x along the boundary. To make this idea precise, we first let N(x) denote the outer unit normal to ∂Ω at x ∈ ∂Ω and then consider the transformation (x, t) ∈ ∂Ω×(0, 1) 7→ x−tεN(x) for all ε sufficiently small. The Jacobian of this transformation equals ε det(I + tεSx ), where Sx denotes the shape operator (or second fundamental form) of ∂Ω at x, see [13] for instance. For all ε sufficiently small, we may therefore conclude that  Z Z Z 1 1 |Bd (x, ε)∩Ωc | dx = |Bd (x − tεN(x), ε) ∩ Ωc | det(I + tεSx )dt dHd−1 (x). ε Tε− ∂Ω 0 As a consequence, we also have that (39)  Z Z 1 2 |Bd (x − tεN(x), ε) ∩ Ωc | det(I + tεSx ) dt dHd−1 (x). Perε (Ω) = d ε ∂Ω 0 With the expression (39) in hand, we may now proceed to establish (9) by expanding Perε (Ω) in terms of ε and appealing to some elementary computations that show that the first order term in ε vanishes. For a fixed x ∈ ∂Ω, we first wish to understand the behavior of the function Z 1  1 gx (ε) := d |Bd (x − tεN(x), ε) ∩ Ωc | det(I + tεSx ) dt ε 0 for ε in a neighborhood of zero. Without loss of generality, we may assume that x = 0, that N(x) = ed and that around x the boundary ∂Ω coincides with the graph x̂ = (x1 , . . . , xd−1 ) 7→ (x̂, f (x̂)) ∈ Rd of a smooth function f (x̂) that satisfies both f (0) = 0 and ∇f (0) = 0 simultaneously. By symmetry of the shape operator Sx , there exists an orthonormal basis for Rd−1 (where we identify Rd−1 with the hyperplane {(x̂, xd ) : xd = 0}) consisting of eigenvectors of the shape operator. We let v1 , . . . , vd−1 denote the eigenvectors of Sx and κ1 , . . . , κd−1 the corresponding eigenvalues ( also known as principal 18 NICOLÁS GARCÍA TRILLOS1 , DEJAN SLEPČEV2 AND JAMES VON BRECHT3 curvatures). In particular, whenever kx̂k ≤ ε we have that d−1 f (x̂) = (40) 1X κi hx̂, vi i2 + O(ε3 ) 2 i=1 where curvatures κi = κi (x) and the O(ε3 ) error term canp be uniformly bounded. With these reductions in place, we first define u(ŷ) := ε2 − kŷk2 and then let   if f (ŷ) + εt < −u(ŷ) 2u(ŷ) h(ŷ, t; ε) := u(ŷ) − εt − f (ŷ) if − u(ŷ) ≤ f (ŷ) + εt ≤ u(ŷ)   0 otherwise. A direct calculation then shows that (41) c Z |Bd (x − tεN(x), ε) ∩ Ω | = h(ŷ, t; ε) dŷ, Bd−1 (0,ε) p and an application of (40) shows that h(ŷ, t; ε) = 2 ε2 − kŷk2 only if kŷk2 = ε2 − O(ε4 ) It therefore follows that Z h(ŷ, t; ε) dŷ ≤ O(ε2 ) Bd−1 (0,ε)∩{f (ŷ)+εt<−u(ŷ)} u(ŷ) = O(ε2 ). and Z √ Bd−1 (0,ε)∩{kŷk≥ dŷ = O(εd+3 ). ε2 −O(ε4 )} We then let Aεt denote the set Aεt := {ŷ ∈ Bd−1 (0, ε) : −u(ŷ) ≤ f (ŷ) + εt ≤ u(ŷ)} and use the previous estimate in (41) to uncover Z (42) |Bd (x − tεN(x), ε) ∩ Ωc | = (u(ŷ) − εt − f (ŷ)) dŷ + O(εd+3 ). Bd−1 (0,ε)∩Aεt We may then note that det(I + εtSx ) = (1 + tεκ1 ) . . . (1 + tεκd−1 ) = 1 + tεHx + O(ε2 ), Pd−1 where Hx := i=1 κi represents the mean curvature. Using this fact in (42) then yields ! Z 1 Z 1 gx (ε) = d u(ŷ) − εt − f (ŷ) dŷ (1 + tεHx ) dt + O(ε2 ). ε 0 Bd−1 (0,ε)∩Aεt Now let f ε (z) := 1ε f (εz) and define the corresponding subset Ctε of (0, 1) × Bd−1 (0, 1) as n o p p Ctε := (t, z) ∈ (0, 1) × Bd−1 (0, 1) : − 1 − kzk2 ≤ f ε (z) + t ≤ 1 − kzk2 , then make the change of variables ŷ = εz to see that Z p  gx (ε) = 1 − kzk2 − t − f ε (z) (1 + tεHx ) dzdt + O(ε2 ). Ctε Recalling (40) shows that d−1 (43) f ε (z) = εX κi hz, vi i2 + O(ε2 ), 2 i=1 ESTIMATING PERIMETER USING GRAPH CUTS 19 which then allows us to obtain an expansion of gx (ε) in terms of ε according to the relation Z p  gx (ε) = 1 − kzk2 − t dtdz Ctε d−1 p 1X tHx ( 1 − kzk2 − t) − κi hz, vi i2 2 i=1 Z (44) +ε Ctε ! dtdz + O(ε2 ). The bias estimate (9) then directly follows after computing each of these terms individually. We begin by considering the first term in the expansion, i.e. Z p  I := 1 − kzk2 − t dtdz. Ctε p Given ε > 0 p and z ∈ Bd−1 (0, 1) define c(z) := max{− 1 − kzk2 − f ε (z), 0} and C(z) := min{ 1 − kzk2 − f ε (z), 1}, so that we may easily write   Z p C(z) + c(z) I= (C(z) − c(z)) 1 − kzk2 − dz. 2 Bd−1 (0,1) As the set where c(z) 6= 0 has measure at most O(ε2 ), we easily conclude that   Z p C(z) I= C(z) 1 − kzk2 − dz + O(ε2 ). 2 Bd−1 (0,1) p If C(z) = 1 then 1 − kzk2 − C(z) = 12 (1 − kzk2 ) + O(ε2 ) as well. In any case, it 2 follows that Z 1 σd I= (45) (1 − kzk2 ) dz + O(ε2 ) = + O(ε2 ). 2 Bd−1 (0,1) 2 We now proceed to compute the second term in the expansion Z p  II :=Hx t 1 − kzk2 − t2 dtdz Ctε Z =Hx p 2 C (z) Bd−1 (0,1) 1 − kzk C(z) − 2 3 ! dz + O(ε2 ) and the third term in the expansion Z Z d−1 d−1 1X 1X III := κi hz, vi i2 dtdz = κi hz, vi i2 C(z) dz + O(ε2 ) 2 i=1 2 i=1 Ctε Bd−1 (0,1) p in a similar fashion. We always have C(z) = 1 − kzk2 + O(ε), so that Z Hx (46) II = (1 − kzk2 )3/2 dz + O(ε) 6 Bd−1 (0,1) Z Hx vol(S d−2 ) 1 (47) = (1 − r2 )3/2 rd−2 dr + O(ε) 6 0 The third term follows similarly by appealing to spherical coordinates, in that we have Z d−1 p 1X III = κi 1 − kzk2 hz, vi i2 dz + O(ε) 2 i=1 Bd−1 (0,1) Z Hx vol(S d−2 ) 1 p = 1 − r2 rd dr + O(ε) = II + O(ε) 2(d − 1) 0 20 NICOLÁS GARCÍA TRILLOS1 , DEJAN SLEPČEV2 AND JAMES VON BRECHT3 thanks to an integration by parts in the final term. We therefore have that I = σd /2 + O(ε2 ) and II − III = O(ε), so that gx (ε) = σd /2 + O(ε2 ) and Z Perε (Ω) = 2 gx (ε) dHd−1 = σd Per(Ω) + O(ε2 ) ∂Ω as desired. We may also show that when Ω is a fixed ball, say Ω = Bd (xc , 31 ) for xc ∈ Rd the center point of D, that the absolute value of the difference between Perε (Ω) and σd Per(Ω) remains bounded from below by cε2 for c > 0 some positive constant. The proof proceeds similarly to the proof of the bias estimate above. In particular, this shows that the bound in Lemma 1.4 is optimal in terms of scaling for general sets with smooth boundary. A PPENDIX B. P ROOF OF L EMMA 2.1 The proof follows the same argument used in the proof of Theorem 4.1 in [10] or Theorem 6.2 in [1]. We assume that dist(Ω, ∂D) > 0. Such assumption implies that the perimeter of Ω with respect to D, that is Per(Ω) defined in (2), is equal to the perimeter of Ω with respect to Rd . We remark that a slight modification of the argument we present below proves the result in the general case and hence we omit the details (see for example the proof of Theorem 4.1 in [10]). First we prove that for any function u : Rd → [0, 1] with u ∈ W 1,1 (Rd ) ∩ C ∞ (Rd ) and for all ε > 0 we have p Z Z Z 1kx−yk≤ε αdp−1 σd |u(y) − u(x)|dy dx ≤ p−1 k∇u(x)kdx, (48) εd+1 ε Rd Rd Rd Inequality (48) follows from p Z Z 1kx−yk≤ε |u(y) − u(x)|dy dx εd+1 Rd Rd !p Z Z 1 |u(x + εh) − u(x)|dh dx = p ε Rd Bd (0,1) Z Z αp−1 ≤ dp |u(x + εh) − u(x)|p dh dx ε Rd Bd (0,1) Z Z αp−1 ≤ dp |u(x + εh) − u(x)|dh dx ε Rd Bd (0,1) Z Z Z 1 αdp−1 = p−1 ∇u(x + tεh) · hdt dh dx ε Rd Bd (0,1) 0 Z Z Z 1 αdp−1 |∇u(x + tεh) · h|dt dh dx ≤ p−1 ε Rd Bd (0,1) 0 Z Z Z αdp−1 1 = p−1 |∇u(x) · h|dx dh dt ε 0 Bd (0,1) Rd Z Z Z αdp−1 1 ∇u(x) = p−1 k∇u(x)k · h dh dx dt ε 0 Rd Bd (0,1) k∇u(x)k Z αdp−1 σd = p−1 k∇u(x)kdx ε Rd ESTIMATING PERIMETER USING GRAPH CUTS 21 where in the first equation we used the change of variables h = x−y ε , in the first inequality we used Jensen’s inequality and in the second inequality the fact that u takes values in [0, 1]. Now, for any set Ω ⊆ D as in the statement, we can find a sequence of functions {uk }k∈N with uk : Rd → [0, 1] , uk ∈ W 1,1 (Rd ) ∩ C ∞ (Rd ) and such that Z L1 (Rd ) (49) uk −→ 1Ω , lim k∇uk (x)kdx = Per(Ω). k→∞ Rd Such sequence can be obtained for example with the aid of standard mollifiers (see Theorem 13.9 in [22]). It follows from (48) and from (49) that p Z Z 1kx−yk≤ε αdp−1 σd dx ≤ |1 (y) − 1 (x)|dy Per(Ω). Ω Ω εd+1 εp−1 Rd Rd Finally, notice that Z Z φ̄pεn (x)dx ≤ D Rd Z Rd 1kx−yk≤ε |1Ω (y) − 1Ω (x)|dy εd+1 p dx ≤ αdp−1 σd Per(Ω). εp−1 A PPENDIX C. P ROOF OF L EMMA 3.1 The proof is based on similar computations to the ones in Appendix A and thus we simply highlight the main ideas. First of all note that Z 2 Var (gn,1 (X1 )) = φ̄2εn (x)dx − (Perεn (Ω)) . D Since Perεn (Ω) = O(1), our task reduces to computing the integral in the above expression. It follows from (29) that for all εn small enough (so that Tεn ⊆ D), Z Z Z 1 1 |Bd (x, εn ) ∩ Ωc |2 dx + 2(d+1) |Bd (x, εn ) ∩ Ω|2 dx. φ̄2εn (x)dx = 2(d+1) Tε−n Tε+n D εn εn We compute the first of the integrals from the above expression. As in the proof of Lemma 1.4, we write Z 1 |Bd (x, εn ) ∩ Ωc |2 dx 2(d+1) Tε−n εn  Z  Z 1 1 1 c 2 = |B (x − tε N(x), ε ) ∩ Ω | det(I + tε S ) dt dHd−1 (x). d n n n x εn ∂Ω ε2d 0 n For x ∈ ∂Ω we study the expression Z 1 |Bd (x − tεn N(x), εn ) ∩ Ωc |2 det(I + tεn Sx )dt. hεn (x) := ε2d 0 n Note that det(I +tεn Sx ) = (1+tεn κ1 )···(1+tεn κd−1 ) = 1+O(εn ), where κ1 , . . . , κd−1 are the principal curvatures (eigenvalues of the shape operator Sx ). Hence, Z 1 |Bd (x − tεn N(x), εn ) ∩ Ωc |2 hεn (x) = dt + O(εn ). ε2d 0 n Without loss of generality, we may assume that x = 0, that N(x) = ed and that around x the boundary ∂Ω coincides with the graph x̂ = (x1 , . . . , xd−1 ) 7→ (x̂, f (x̂)) ∈ Rd of a smooth function f (x̂) that satisfies both f (0) = 0 and ∇f (0) = 0 simultaneously, and we denote by v1 , . . . , vd−1 the eigenvectors of Sx (just as in Appendix A). Then, f : Bd−1 (0, εn ) → R, Pd−1 2 satisfies f (x̂) = i=1 κi hx̂, vi i + O(ε3n ). NICOLÁS GARCÍA TRILLOS1 , DEJAN SLEPČEV2 AND JAMES VON BRECHT3 22 Now for fixed t ∈ [0, 1] we define H1−t to be the hyperplane H1−t := {x = (x̂, xd ) : xd ≥ 1 − t} , and we let At := |Bd (0, 1) ∩ H1−t |. With these definitions we can write (50) Z d−1 X |Bd (x − tεn N(x), εn ) ∩ Ωc | = εdn At + κi = εdn At + Bd−1 (0,εn i=1 Pd−1 Z i=1 κi d−1 2 √ hx̂, vi i dx̂ + O(εd+2 n ) 1−t) Bd−1 (0,εn √ kx̂k2 dx̂ + O(εd+2 n ) 1−t) = εdn At + O(εd+1 n ), where the second equality holds due to symmetry, and where the last equality follows after R computing Bd−1 (0,εn √1−t) kx̂k2 dx̂ using polar coordinates. From the above, it follows that |Bd (x − tεn N(x), εn ) ∩ Ωc |2 = A2t + O(εn ). ε2d n We conclude that Z 1 A2t dt + O(εn ). hεn (x) = 0 Therefore, 1 2(d+1) εn Z Tε−n |Bd (x, εn ) ∩ Ωc |2 dx = 1 εn Analogously, we can obtain a similar expression for from this we deduce (35). Z 1 A2t dt Per(Ω) + O(1). 0 1 2(d+1) εn R Tε+n |Bd (x, εn ) ∩ Ω|2 dx and Acknowledgements. DS and NGT are grateful to NSF for its support (grants DMS1211760 and DMS-1516677). JvB was supported by NSF grant DMS 1312344/DMS 1521138. The authors are grateful to ICERM (supported by NSF grant 0931908), where part of the research was done during the research cluster: Geometric analysis methods for graph algorithms. Furthermore they are grateful to Ki-Net (NSF Research Network Grant RNMS11-07444) for opportunities provided. The authors would like to thank the Center for Nonlinear Analysis of the Carnegie Mellon University for its support. R EFERENCES [1] G. A LBERTI AND G. B ELLETTINI, A non-local anisotropic model for phase transitions: asymptotic behaviour of rescaled energies, European J. Appl. Math., 9 (1998), pp. 261–284. [2] L. A MBROSIO , N. F USCO , AND D. PALLARA, Functions of bounded variation and free discontinuity problems, Oxford Mathematical Monographs, The Clarendon Press Oxford University Press, New York, 2000. [3] E. A RIAS -C ASTRO , B. P ELLETIER , AND P. P UDLO, The normalized graph cut and Cheeger constant: from discrete to continuous, Adv. in Appl. Probab., 44 (2012), pp. 907–937. [4] I. A RMEND ÁRIZ , A. C UEVAS , AND R. F RAIMAN, Nonparametric estimation of boundary measures and related functionals: asymptotic results, Adv. in Appl. Probab., 41 (2009), pp. 311–322. [5] M. B ELKIN , H. NARAYANAN , AND P. N IYOGI, Heat flow and a faster algorithm to compute the surface area of a convex body, in FOCS ’06: Proceedings of the 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS’06), Washington, DC, USA, 2006, IEEE Computer Society, pp. 47–56. ESTIMATING PERIMETER USING GRAPH CUTS 23 [6] S. B ERNSTEIN, On a modification of Chebyshev’s inequality and of the error formula of Laplace, Ann. Sci. Inst. Sav. Ukraine, Sect. Math, 1 (1924), pp. 38–49. [7] X. B RESSON , T. L AURENT, D. U MINSKY, AND J. H. VON B RECHT, Convergence and energy landscape for cheeger cut clustering, in Advances in Neural Information Processing Systems (NIPS), P. L. Bartlett, F. C. N. Pereira, C. J. C. Burges, L. Bottou, and K. Q. Weinberger, eds., 2012, pp. 1394–1402. [8] A. C UEVAS , R. F RAIMAN , AND L. G Y ÖRFI, Towards a universally consistent estimator of the Minkowski content, ESAIM Probab. Stat., 17 (2013), pp. 359–369. [9] A. C UEVAS , R. F RAIMAN , AND A. RODR ÍGUEZ -C ASAL, A nonparametric approach to the estimation of lengths and surface areas, Ann. Statist., 35 (2007), pp. 1031–1051. [10] N. G ARC ÍA T RILLOS AND D. S LEP ČEV, Continuum limit of total variation on point clouds, Archive for Rational Mechanics and Analysis, (2015), pp. 1–49. online first. [11] N. G ARC ÍA T RILLOS , D. S LEP ČEV, J. VON B RECHT , T. L AURENT, AND X. B RESSON, Consistency of Cheeger and ratio graph cuts. to appear in Journal of Machine Learning Research, 2015. [12] E. G IN É , R. L ATAŁA , AND J. Z INN, Exponential and moment inequalities for U -statistics, in High dimensional probability, II (Seattle, WA, 1999), vol. 47 of Progr. Probab., Birkhäuser Boston, Boston, MA, 2000, pp. 13–38. [13] A. G RAY, Tubes, Progress in Mathematics, Birkhäuser Basel, 2004. [14] L. H AGEN AND A. K AHNG, New spectral methods for ratio cut partitioning and clustering., IEEE Trans. Computer-Aided Design, 11 (1992), pp. 1074 –1085. [15] M. H EIN AND S. S ETZER, Beyond spectral clustering - tight relaxations of balanced graph cuts, in Advances in Neural Information Processing Systems (NIPS), J. Shawe-Taylor, R. Zemel, P. Bartlett, F. Pereira, and K. Weinberger, eds., 2011, pp. 2366–2374. [16] W. H OEFFDING, Probability inequalities for sums of bounded random variables, Journal of the American statistical association, 58 (1963), pp. 13–30. [17] R. J IM ÉNEZ AND J. E. Y UKICH, Nonparametric estimation of surface integrals, Ann. Statist., 39 (2011), pp. 232–260. [18] R. K ANNAN , S. V EMPALA , AND A. V ETTA, On clusterings: Good, bad and spectral, Journal of the ACM (JACM), 51 (2004), pp. 497–515. [19] M. K EARNS AND D. RON, Testing problems with sublearning sample complexity, Journal of Computer and System Sciences, 61 (2000), pp. 428 – 456. [20] V. S. KOROLJUK AND Y. V. B OROVSKICH, Theory of U -statistics, vol. 273 of Mathematics and its Applications, Kluwer Academic Publishers Group, Dordrecht, 1994. Translated from the 1989 Russian original by P. V. Malyshev and D. V. Malyshev and revised by the authors. [21] P. KOTHARI , A. NAYYERI , R. O’D ONNELL , AND C. W U, Testing surface area, in Proceedings of the Twenty-Fifth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA ’14, SIAM, 2014, pp. 1204– 1214. [22] G. L EONI, A first course in Sobolev spaces, vol. 105 of Graduate Studies in Mathematics, American Mathematical Society, Providence, RI, 2009. [23] J. N EEMAN, Testing surface area with arbitrary accuracy, in Proceedings of the 46th Annual ACM Symposium on Theory of Computing, STOC ’14, New York, NY, USA, 2014, ACM, pp. 393–397. [24] B. PATEIRO -L ÓPEZ AND A. RODR ÍGUEZ -C ASAL, Length and surface area estimation under smoothness restrictions, Adv. in Appl. Probab., 40 (2008), pp. 348–358. [25] J. S HI AND J. M ALIK, Normalized cuts and image segmentation, Pattern Analysis and Machine Intelligence, IEEE Transactions on, 22 (2000), pp. 888–905. [26] A. S ZLAM AND X. B RESSON, Total variation and cheeger cuts., in ICML, J. Faenkranz and T. Joachims, eds., Omnipress, 2010, pp. 1039–1046. [27] U. VON L UXBURG, A tutorial on spectral clustering, Statistics and computing, 17 (2007), pp. 395–416. [28] Y.-C. W EI AND C.-K. C HENG, Towards efficient hierarchical designs by ratio cut partitioning, in ComputerAided Design, 1989. ICCAD-89. Digest of Technical Papers., 1989 IEEE International Conference on, IEEE, 1989, pp. 298–301. 1 D IVISION OF A PPLIED M ATHEMATICS , P ROVIDENCE , RI, 02912, USA., EMAIL : NICOLAS GARCIA TRILLOS @ BROWN . EDU 2 D EPARTMENT OF M ATHEMATICAL S CIENCES , C ARNEGIE M ELLON U NIVERSITY, P ITTSBURGH , PA, 15213, USA., TEL . +412 268-2545, EMAIL : SLEPCEV @ MATH . CMU . EDU 3 D EPARTMENT OF M ATHEMATICS AND S TATISTICS , C ALIFORNIA S TATE U NIVERSITY, L ONG B EACH L ONG B EACH , CA 90840, USA., EMAIL : JAMES . VON B RECHT @ CSULB . EDU
10math.ST
MONOIDS OF MODULES AND ARITHMETIC OF DIRECT-SUM DECOMPOSITIONS arXiv:1401.6553v1 [math.AC] 25 Jan 2014 NICHOLAS R. BAETH AND ALFRED GEROLDINGER Abstract. Let R be a (possibly noncommutative) ring and let C be a class of finitely generated (right) R-modules which is closed under finite direct sums, direct summands, and isomorphisms. Then the set V(C) of isomorphism classes of modules is a commutative semigroup with operation induced by the direct sum. This semigroup encodes all possible information about direct sum decompositions of modules in C. If the endomorphism ring of each module in C is semilocal, then V(C) is a Krull monoid. Although this fact was observed nearly a decade ago, the focus of study thus far has been on ring- and module-theoretic conditions enforcing that V(C) is Krull. If V(C) is Krull, its arithmetic depends only on the class group of V(C) and the set of classes containing prime divisors. In this paper we provide the first systematic treatment to study the direct-sum decompositions of modules using methods from Factorization Theory of Krull monoids. We do this when C is the class of finitely generated torsion-free modules over certain one- and two-dimensional commutative Noetherian local rings. 1. Introduction The study of direct-sum decompositions of finitely generated modules is a classical topic in Module Theory dating back over a century. In the early 1900s, Wedderburn, Remak, Krull, and Schmidt proved unique direct-sum decomposition results for various classes of groups (see [66], [59], [53], and [65]). In the middle of the last century, Azumaya [2] proved uniqueness of (possibly infinite) direct-sum decomposition of modules provided that each indecomposable module has a local endomorphism ring. In the commutative setting, Evans [20] gave an example due to Swan illustrating a non-unique direct-sum decomposition of a finitely-generated module over a local ring. The past decade has seen a new semigroup-theoretical approach. This approach was first introduced by Facchini and Wiegand [29] and has been used by several authors (for example, see [3], [4], [7], [8], [19], [22], [25], [26], [27], [28], [29], [46], [49], and [57]). Let R be a ring and let C be a class of right R-modules which is closed under finite direct sums, direct summands, and isomorphisms. For a module M in C, let [M ] denote the isomorphism class of M . Let V(C) denote the set of isomorphism classes of modules in C. (We assume here that V(C) is indeed a set, and note that this hypothesis holds for all examples we study.) Then V(C) is a commutative semigroup with operation defined by [M ] + [N ] = [M ⊕ N ] and all information about direct-sum decomposition of modules in C can be studied in terms of factorization of elements in the semigroup V(C). In particular, the direct-sum decompositions in C are (essentially) unique (in other words, the Krull-Remak-Schmidt-Azumaya Theorem — briefly, KRSA — holds) if and only if V(C) is a free abelian monoid. This semigroup-theoretical point of view was justified by Facchini [22] who showed that V(C) is a reduced Krull monoid provided that the endomorphism ring EndR (M ) is semilocal for all modules M in C. This result allows one to describe the direct-sum decomposition of modules in terms of factorization of elements in Krull monoids, a well-studied class of commutative monoids. 2010 Mathematics Subject Classification. 13C14, 16D70, 20M13. Key words and phrases. Krull monoids, sets of lengths, direct-sum decompositions, indecomposable modules. The first author was a Fulbright-NAWI Graz Visiting Professor in the Natural Sciences and supported by the AustrianAmerican Education Commission. The second author was supported by the Austrian Science Fund FWF, Project Number P21576-N18. 1 2 NICHOLAS R. BAETH AND ALFRED GEROLDINGER However, thus far much of the focus in this direction has been on the study of module-theoretic conditions which guarantee that all endomorphism rings are semilocal, as well as on trying to describe the monoid V(C) in terms of various ring- and module-theoretic conditions. Although some factorizationtheoretic computations have been done in various settings (eg. the study of elasticity in [4], [7], and [8] and the study of the ω-invariant in [19]), the general emphasis has not been on the arithmetic of the monoid V(C). Our intent is to use known module-theoretic results along with factorization-theoretic techniques in order to give detailed descriptions of the arithmetic of direct-sum decompositions of finitely generated torsion-free modules over certain one- and two-dimensional local rings. We hope that this systematic approach will not only serve to inspire others to consider more detailed and abstract factorizationtheoretic approaches to the study of direct-sum decompositions, but to provide new and interesting examples for zero-sum theory over torsion-free groups. We refer to [23] and to the opening paragraph in the recent monograph [56] for broad information on the Krull-Remak-Schmidt-Azumaya Theorem, and to two recent surveys [26] and [9] promoting this semigroup-theoretical point of view. More details and references will be given in Section 3. Krull monoids, both their ideal theory and their arithmetic, are well-studied; see [37] for a thorough treatment. A reduced Krull monoid is uniquely determined (up to isomorphism) by its class group G, the set of classes GP ⊂ G containing prime divisors, and the number of prime divisors in each class. Let V(C) be a monoid of modules and suppose V(C) is Krull with class group G and with set of classes containing prime divisors GP . We are interested in determining what this information tells us about direct-sum decompositions of modules. Let M be a module in C and let M = M1 ⊕ · · · ⊕ Mℓ where M1 , . . . , Mℓ are indecomposable right R-modules. Then ℓ is called the length of this factorization (decomposition into indecomposables), and the set of lengths L(M ) ⊂ N is defined as the set of all possible factorization lengths. Then KRSA holds if and only if |G| = 1. Moreover, it is easy to check that |L(M )| = 1 for all M in C provided that |G| ≤ 2. Clearly, sets of lengths are a measure how badly KRSA fails. Assuming that V(C) is Krull, M has at least one direct-sum decomposition in terms of indecomposable right R-modules, and, up to isomorphism, only finitely many distinct decompositions. In particular, all sets of lengths are finite and nonempty. Without further information about the class group G and the subset GP ⊂ G, this is all that can be said. Indeed, there is a standing conjecture that for every infinite abelian group G there is a Krull monoid with class group G and set GP such that every set of lengths has cardinality one (see [35]). On the other hand, if the class group of a Krull monoid is infinite and every class contains a prime divisor, then every finite subset of N≥2 occurs as a set of lengths (see Proposition 6.2). Thus an indispensable prerequisite for the study of sets of lengths (and other arithmetical invariants) in Krull monoids is detailed information about not only the class group G, but also on the set GP ⊂ G of classes containing prime divisors. For the monoid V(C), this is of course a module-theoretic task which depends on both the ring R and the class C of R-modules. Early results gave only extremal sets GP and thus no further arithmetical investigations were needed. In Sections 4 and 5 we determine, based on deep module-theoretic results, the class group G of V(C). We then exhibit well-structured sets GP providing a plethora of arithmetically interesting direct-sum decompositions. In particular, we study the classes of finitely generated modules, finitely generated torsion-free modules, and maximal CohenMacaulay modules over one- and two-dimensional commutative Noetherian local rings. We restrict, if necessary, to specific families of rings in order to obtain explicit results for GP , since it is possible that even slightly different sets GP can induce completely different behavior in terms of the sets of lengths. Given this information, we use transfer homomorphisms, a key tool in Factorization theory and introduced in Section 3, which make it possible to study sets of lengths and other arithmetical invariants of general Krull monoids instead in an associated monoid of zero-sum sequences (see Lemma 3.4). These monoids can be studied using methods from Additive (Group and Number) Theory (see [34]). Factorization Theory describes the non-uniqueness of factorizations of elements in rings and semigroups into irreducible elements by arithmetical invariants such as sets of lengths, catenary, and tame degrees. We will define each of these invariants in Section 2. The goal is to relate the arithmetical invariants MONOIDS OF MODULES AND ARITHMETIC OF DIRECT-SUM DECOMPOSITIONS 3 with algebraic parameters (such as class groups) of the objects under consideration. The study of sets of lengths in Krull monoids is a central topic in Factorization Theory. However, since much of this theory was motivated by examples in number theory (such as holomorphy rings in global fields), most of the focus so far has been on Krull monoids with finite class group and with each class containing a prime divisor. This is in contrast to Krull monoids stemming from Module Theory which often have infinite class group (see Section 4). A key result in Section 6 shows that the arithmetic of these two types of Krull monoids can have drastically different arithmetic. In combination with the study of various arithmetical invariants of a given Krull monoid, the following dual question has been asked since the beginning of Factorization Theory: Are arithmetical phenomena characteristic for a given Krull monoid (inside a given class of Krull monoids)? Affirmative answers have been given for the class of Krull monoids with finitely generated class groups where every class contains a prime divisor. Since sets of lengths are the most investigated invariants in Factorization Theory, the emphasis in the last decade has been on the following question: Within the class of Krull monoids having finite class group and such that every class contains a prime divisor, does the system of sets of lengths of a monoid H characterize the class group of H? A survey of these problems can be found in [37, Sections 7.1 and 7.2]. For recent progress, see [63], [62], and [10]. In Corollary 6.8 we exhibit that for many Krull monoids stemming from the Module Theory of Sections 4 and 5, the system of sets of lengths and the behavior of absolutely irreducible elements characterizes the class group of these monoids. In Section 2 we introduce some of the main arithmetical invariants studied in Factorization Theory as well as their relevance to the study of direct-sum decompositions. Our focus is on sets of lengths and on parameters controlling their structure, but we will also need other invariants such as catenary and tame degrees. Section 3 gives a brief introduction to Krull monoids, monoids of modules, and transfer homomorphisms. Sections 4 and 5 provide explicit constructions stemming from Module Theory of class groups and distribution of prime divisors in the classes. Finally, in Section 6, we present our results on the arithmetic of direct-sum decomposition in the Krull monoids discussed in Sections 4 and 5. We use standard notation from Commutative Algebra and Module Theory (see [56]) and we follow the notation of [37] for Factorization Theory. All monoids of modules V(C) are written additively, while all abstract Krull monoids are written multiplicatively. This follows the tradition in Factorization Theory, and makes sense also here because our crucial tool, the monoid of zero-sum sequences, is written multiplicatively. In particular, our arithmetical results in Section 6 are written in a multiplicative setting but they are derived for the additive monoids of modules discussed in Sections 4 and 5. Since we hope that this article is readable both for those working in Ring and Module Theory as well as those working in Additive Theory and Factorization Theory, we often recall concepts of both areas which are well known to the specialists in the respective fields. 2. Arithmetical Preliminaries In this section we gather together the concepts central to describing the arithmetic of non-factorial monoids. In particular, we exhibit the arithmetical invariants which will be studied in Section 6 and which will give a measure of non-unique direct sum decompositions of classes of modules studied in Sections 4 and 5. When possible, we recall previous work in the area of direct-sum decompositions for which certain invariants have been studied. For more details on non-unique factorization, see [37]. First we record some preliminary terminology. Notation. We denote by N the set of positive integers and set N0 = N ∪ {0}. For every n ∈ N, Cn denotes a cyclic group of order n. For real numbers a, b ∈ R we set [a, b] = {x ∈ Z : a ≤ x ≤ b}. We use the convention that sup ∅ = max ∅ = min ∅ = 0. 4 NICHOLAS R. BAETH AND ALFRED GEROLDINGER Subsets of the integers. Let L, L′ ⊂ Z. We denote by L + L′ = {a + b : a ∈ L, b ∈ L′ } the sumset of L and L′ . If ∅ 6= L ⊂ N, we call o nm sup L : m, n ∈ L = ∈ Q≥1 ∪ {∞} ρ(L) = sup n min L the elasticity of L. In addition, we set ρ({0}) = 1. Distinct elements k, l ∈ L are called adjacent if L ∩ [min{k, l}, max{k, l}] = {k, l}. A positive integer d ∈ N is called a distance of L if there exist adjacent elements k, l ∈ L with d = |k − l|. We denote by ∆(L) the set of distances of L. Note that ∆(L) = ∅ if and only if |L| ≤ 1, and that L is an arithmetical progression with difference d ∈ N if and only if ∆(L) ⊂ {d}. Monoids and Rings. By a monoid H we always mean a commutative semigroup with identity 1 which satisfies the cancellation law; that is, if a, b, and c are elements of the H with ab = ac, then b = c. Let H be a monoid. We denote by A(H) the set of atoms (irreducible elements) of H, by q(H) a quotient group of H with H ⊂ q(H) = {a−1 b : a, b ∈ H}, and by H × the set of invertible elements of H. We say that H is reduced if H × = {1}, and we denote by Hred = H/H × = {aH × : a ∈ H} the associated reduced monoid. Let H ′ ⊂ H be a subset. We say that H ′ is divisor-closed if a ∈ H ′ and b ∈ H with b | a implies that b ∈ H ′ . Denote by [H ′ ] ⊂ H the submonoid generated by H ′ . A monoid F is called free abelian with basis P ⊂ F if every a ∈ F has a unique representation of the form Y a= pvp (a) with vp (a) ∈ N0 and vp (a) = 0 for almost all p ∈ P . p∈P If F is free abelian with basis P, we set F = F (P) and call X |a| = vp (a) the length of a and supp(a) = {p ∈ P : vp (a) > 0} the support of a . p∈P (P) The multiplicative monoid F (P) is, of course, isomorphic to the additive monoid (N0 , +). Throughout this manuscript, all rings have a unit element and, apart from a a few motivating remarks in Section 3, all rings are commutative. Let R be a ring. Then we let R• = R \ {0} denote the nonzero elements of R and let R× denote its group of units. Note that if R is a domain, then R• is a monoid as defined above. By the dimension of a ring we always mean its Krull dimension. Abelian groups. Let G be an additive abelian group and let G0 ⊂ G a subset. Then −G0 = {−g : g ∈ G0 }, G•0 = G0 \ {0}, and hG0 i ⊂ G denotes the subgroup generated by G0 . A family (ei )i∈I of elements of G is said to be independent if ei 6= 0 for all i ∈ I and, for every family (mi )i∈I ∈ Z(I) , X mi e i = 0 implies mi ei = 0 for all i ∈ I . i∈I L rank r∗ (G) is the supremum of The family (ei )i∈I is called a basis for G if G = i∈I hei i. The total P the cardinalities of independent subsets of G. Thus r∗ (G) = r0 (G) + p∈P rp (G), where r0 (G) is the torsion-free rank of G and rp (G) is the p-rank of G for every prime p ∈ P.  Factorizations. Let H be a monoid. The free abelian monoid Z(H) = F A(Hred ) is called the factorization monoid of H, and the unique homomorphism π : Z(H) → Hred satisfying π(u) = u for each u ∈ A(Hred ) is called the factorization homomorphism of H. For a ∈ H and k ∈ N, • • • • ZH (a) = Z(a) = π −1 (aH × ) ⊂ Z(H) is the set of factorizations of a, Zk (a) = {z ∈ Z(a)  : |z| = k} is the set of factorizations of a of length k, LH (a) = L(a) = |z| : z ∈ Z(a) ⊂ N0 is the set of lengths of a, and L(H) = {L(b) : b ∈ H} is the system of sets of lengths of H. MONOIDS OF MODULES AND ARITHMETIC OF DIRECT-SUM DECOMPOSITIONS 5 By definition, we have Z(a) = {1} and L(a) = {0} for all a ∈ H × . If H is assumed to be Krull, as is the case in the monoids of modules we study, and a ∈ H, then the set of factorizations Z(a) is finite and nonempty and hence L(a) is finite and nonempty. Suppose that there is a ∈ H with |L(a)| > 1 with  distinct k, l ∈ L(a). Then for all N ∈ N, L aN ⊃ {(N − i)k + il : i ∈ [0, N ]} and hence |L aN | > N . Thus, whenever there is an element a ∈ H that has at least two factorizations of distinct lengths, there exist elements of H having arbitrarily many factorizations of distinct lengths. This motivates the need for more refined measures of nonunique factorization. Several invariants such as elasticity and the ∆-set measure non-uniqueness in terms of sets of lengths. Other invariants such as the catenary degree provide an even more subtle measurement in terms of the distinct factorizations of elements. However, these two approaches cannot easily be separated and it is often the case that a factorization-theoretical invariant is closely related to an invariant of the set of lengths. Thus the exposition that follows will introduce invariants as they are needed and so that the relations between these invariants can be made as clear as possible. The monoid H is called • atomic if Z(a) 6= ∅ for all a ∈ H, • factorial if |Z(a)| = 1 for all a ∈ H (equivalently, Hred is free abelian), and • half-factorial if |L(a)| = 1 for all a ∈ H. Let z, z ′ ∈ Z(H). Then we can write z = u1 · . . . · ul v1 · . . . · vm and z ′ = u1 · . . . · ul w1 · . . . · wn , where l, m, n ∈ N0 and u1 , . . . , ul , v1 , . . . , vm , w1 , . . . , wn ∈ A(Hred ) are such that {v1 , . . . , vm } ∩ {w1 , . . . , wn } = ∅ . ′ Then gcd(z, z ) = u1 · . . . · ul , and we call d(z, z ′ ) = max{m, n} = max{|z gcd(z, z ′ )−1 |, |z ′ gcd(z, z ′ )−1 |} ∈ N0 the distance between z and z ′ . If π(z) = π(z ′ ) and z 6= z ′ , then clearly 2 + |z| − |z ′ | ≤ d(z, z ′ ) . For subsets X, Y ⊂ Z(H), we set d(X, Y ) = min{d(x, y) : x ∈ X, y ∈ Y } , and thus d(X, Y ) = 0 if and only if (X ∩ Y 6= ∅, X = ∅, or Y = ∅). From this point on, we will assume all monoids to be atomic. Since the the monoids described in Sections 4 and 5 are of the form V(C) for C a subclass of finitely generated modules over a commutative Noetherian ring, they are Krull and hence atomic. The set of distances and chains of factorizations. We now recall the ∆-set of a monoid H, an invariant which describes the sets of lengths of elements in H, and illustrate its relationship with distances between factorizations of elements in H. We denote by [ ∆(L) ⊂ N ∆(H) = L∈L(H) the set of distances of H. By definition, ∆(H) = ∅ if and only if H is half-factorial. For a more thorough investigation of factorizations in H, we will need a distinguished subset of the set of distances. Let ∆∗ (H) denote the set of all d = min ∆(S) for some divisor-closed submonoid S ⊂ H with ∆(S) 6= ∅. By definition, we have ∆∗ (H) ⊂ ∆(H). Suppose that H is not factorial. Then there exists an element a ∈ H with |Z(a)| > 1, and so there   exist distinct z, z ′ ∈ Z(a). Then for N ∈ N, Z aN ⊃ {z N −i (z ′ )i : i ∈ [0, N ]}. Although d z N , (z ′ )N = N d(z, z ′ ) > N suggests that the factorizations z N and (z ′ )N of aN are very different,  d z N −i (z ′ )i , z N −i+1 (z ′ )i−1 = d(z, z ′ ) 6 NICHOLAS R. BAETH AND ALFRED GEROLDINGER for each i ∈ [1, N ]. This illustrates that the distance alone is too coarse of an invariant, and motivates the study of the catenary degree as a way of measuring how distinct two factorizations are. As will be described below, there is a structure theorem for the set of lengths of a Krull monoid. However, except in very simple situations, there is no known structure theorem for the set of factorizations of an element in a Krull monoid. Thus we use the catenary degree, its many variations, the tame degree, and other invariants help to measure the subtle distinctions between factorizations. Let a ∈ H and N ∈ N0 ∪ {∞}. A finite sequence z0 , . . . , zk ∈ Z(a) is called a (monotone) N -chain of factorizations if d(zi−1 , zi ) ≤ N for all i ∈ [1, k] and (|z0 | ≤ · · · ≤ |zk | or |z0 | ≥ · · · ≥ |zk | resp.). We denote by c(a) (or by cmon (a) resp.) the smallest N ∈ N0 ∪ {∞} such that any two factorizations z, z ′ ∈ Z(a) can be concatenated by an N -chain (or by a monotone N -chain resp.). Then c(H) = sup{c(b) : b ∈ H} ∈ N0 ∪ {∞} and cmon (H) = sup{cmon(b) : b ∈ H} ∈ N0 ∪ {∞} denote the catenary degree and the monotone catenary degree of H. The monotone catenary degree is studied by using the two auxiliary notions of the equal and the adjacent catenary degrees. Let ceq (a) denote the smallest N ∈ N0 ∪ {∞} such that any two factorizations z, z ′ ∈ Z(a) with |z| = |z ′ | can be concatenated by a monotone N -chain. We call ceq (H) = sup{ceq (b) : b ∈ H} ∈ N0 ∪ {∞} the equal catenary degree of H. We set  cadj (a) = sup{d Zk (a), Zl (a) : k, l ∈ L(a) are adjacent} , and the adjacent catenary degree of H is defined as cadj (H) = sup{cadj (b) : b ∈ H} ∈ N0 ∪ {∞} . Obviously, we have c(a) ≤ cmon (a) = sup{ceq (a), cadj (a)} ≤ sup L(a) for all a ∈ H , and hence c(H) ≤ cmon (H) = sup{ceq (H), cadj (H)} . Note that cadj (H) = 0 if and only if H is half-factorial, and if H is not half-factorial, then 2 + sup ∆(H) ≤ c(H). Moreover, ceq (H) = 0 if and only if for all a ∈ H and all k ∈ L(a) we have |Zk (a)| = 1. A recent result of Coykendall and Smith implies that if D is a domain, we have that ceq (D• ) = 0 if and only if D• is factorial [18, Corollary 2.12]. We call  ∼H,eq = (x, y) ∈ Z(H) × Z(H) : π(x) = π(y) and |x| = |y| the monoid of equal-length relations of H. Let Z ⊂ Z(H) be a subset. We say that an element  x ∈ Z is minimal in Z if for all elements y ∈ Z with y | x it follows that x = y. We denote by Min Z the set of minimal elements  in Z. Let x ∈ Z. Since the number of elements y ∈ Z with y | x is finite, there exists an x∗ ∈ Min Z with x∗ | x. We will need the following lemma. Lemma 2.1. Let H be an atomic monoid.  (1) ceq (H) ≤ sup |x| : (x, y) ∈ A(∼H,eq ) for some y ∈ Z(H) \ {x} .   (2) For d ∈ ∆(H) let Ad = x ∈ Z(H) : |x| − d ∈ L(π(x) . Then cadj (H) ≤ sup{|x| : x ∈ Min(Ad ), d ∈ ∆(H)}. Proof. See [12, Proposition 4.4].  Unions of sets of lengths and the refined elasticities. We now return to studying sets of lengths. We note that the elasticity of certain monoids of modules were studied in [7] and [8], but that in Section MONOIDS OF MODULES AND ARITHMETIC OF DIRECT-SUM DECOMPOSITIONS 7 6 we will provide results which generalize these results to larger classes of Krull monoids. In addition, we will fine tune these results by also computing the refined elasticities. Let k, l ∈ N. If H 6= H × , then [ L Uk (H) = k∈L,L∈L(H) is the union of all sets of lengths containing k. In other words, Uk (H) is set of all m ∈ N for which there exist u1 , . . . , uk , v1 , . . . , vm ∈ A(H) with u1 · . . . · uk = v1 · . . . · vm . When H × = H, we set Uk (H) = {k}. In both cases, we define ρk (H) = sup Uk (H) ∈ N ∪ {∞} and λk (H) = min Uk (H) ∈ [1, k]. Clearly, we have U1 (H) = {1}, k ∈ Uk (H), and since Uk (H) + Ul (H) ⊂ Uk+l (H), it follows that λk+l (H) ≤ λk (H) + λl (H) ≤ k + l ≤ ρk (H) + ρl (H) ≤ ρk+l (H) . The elasticity ρ(H) of H is defined as ρ(H) = sup{ρ(L) : L ∈ L(H)} ∈ R≥1 ∪ {∞} , and it is not difficult to verify that n ρ (H) o ρk (H) k ρ(H) = sup : k ∈ N = lim . k→∞ k k The structure of sets of lengths. To describe the structure of sets of lengths and of their unions, we need the concept of arithmetical progressions as well as various generalizations. Let l, M ∈ N0 , d ∈ N, and {0, d} ⊂ D ⊂ [0, d]. We set Pl (d) = dZ ∩ [0, ld] = {0, d, 2d, . . . , ld} . Thus a subset L ⊂ Z is an arithmetical progression (with difference d ∈ N and length l ∈ N0 ) if L = min L + Pl (d). A subset L ⊂ Z is called an almost arithmetical multiprogression (AAMP for short) with difference d, period D, and bound M , if L = y + (L′ ∪ L∗ ∪ L′′ ) ⊂ y + D + dZ ∗ ∗ where ∗ • L is finite and nonempty with min L = 0 and L = (D + dZ) ∩ [0, max L∗ ], • L′ ⊂ [−M, −1] and L′′ ⊂ max L∗ + [1, M ], and • y ∈ Z. Note that an AAMP is finite and nonempty, and that an AAMP with period {0, d} and bound M = 0 is a (usual) arithmetical progression with difference d. The ω-invariant and the tame degrees. We now study the ω-invariant as well as local and global tame degrees. We note that these notions have been studied in specific noncommutative module-theoretic situations in terms of the so-called semi-exchange property (see [19]). Moreover, when describing the sets of lengths of elements within a Krull monoid H in terms of AAMPs (see Proposition 6.2), the bound M (described above) is a tame degree related to the monoid H. We begin with the definition. For an atom u ∈ H, let ω(H, u) denote the smallest N ∈ N ∪ {∞} having the following property : For any multiple a of u and any factorization a = v1 · . . . · vn of a, there exists a subset Ω ⊂ [1, n] such that |Ω| ≤ N and Y u vν . ν∈Ω Furthermore, we set ω(H) = sup{ω(H, u) : u ∈ A(H)} ∈ N ∪ {∞} . An atom u ∈ H is prime if and only if ω(H, u) = 1, and thus H is factorial if and only if ω(H) = 1. If H satisfies the ACC on divisorial ideals (in particular, H is a Krull monoid or a Noetherian domain), then ω(H, u) < ∞ for all u ∈ A(H) [38, Theorem 4.2].QRoughly speaking, the tame degree t(H, u) is the maximum of ω(H, u) and a factorization length of u−1 ν∈Ω vν in H. More precisely, for an atom u ∈ H, the local tame degree t(H, u) is the smallest N ∈ N0 ∪ {∞} having the following property: 8 NICHOLAS R. BAETH AND ALFRED GEROLDINGER For any multiple a of u and any factorization a = v1 · . . . · vn of a which does not contain u, there is a short subproduct which is a multiple of u, say v1 ·. . .·vm , and a refactorization of this subproduct which contains u, say v1 · . . . · vm = uu2 · . . . · uℓ , such that max{ℓ, m} ≤ N . Thus the local tame degree t(H, u) measures the distance between any factorization of a multiple a of u and a factorization of a which contains u. As before, we set t(H) = sup{t(H, u) : u ∈ A(H)} ∈ N0 ∪ {∞} . We conclude this section with the following lemma (see [37, Chapter 1] and [39]) which illustrates how the primary invariants measure the non-uniqueness of factorizations and show that all of these invariants are trivial if the monoid is factorial. Lemma 2.2. Let H be an atomic monoid. (1) H is half-factorial if and only if ρ(H) = 1 if and only if ρk (H) = k for every k ∈ N. (2) H is factorial if and only if c(H) = t(H) = 0 if and only if ω(H) = 1. (3) c(H) = 0 or c(H) ≥ 2, and if c(H) ≤ 2, then H is half-factorial. (4) c(H) ≤ ω(H) ≤ t(H) ≤ ω(H)2 , and if H is not factorial, then max{2, ρ(H)} ≤ ω(H). (5) If c(H) = 3, then every L ∈ L(H) is an arithmetical progression with difference 1. 3. Krull monoids, monoids of modules, and transfer homomorphisms The theory of Krull monoids is presented in detail in the monographs [44] and [37]. Here we gather the terminology required for our treatment. We then present an introduction to monoids of modules — the key objects of our study. Finally, we recall important terminology and results about monoids of zero-sum sequences and transfer homomorphisms — the key tools in our arithmetical investigations. Krull monoids. Let H and D be monoids. A monoid homomorphism ϕ : H → D is called • a divisor homomorphism if ϕ(a) | ϕ(b) implies that a | b for all a, b ∈ H. • cofinal if for every a ∈ D there exists some u ∈ H such that a | ϕ(u). • a divisor theory (for H) if D = F (P) for some set P, ϕ is a divisor homomorphism,  and for every a ∈ F (P), there exists a finite nonempty subset X ⊂ H satisfying a = gcd ϕ(X) . We call C(ϕ) = q(D)/q(ϕ(H)) the class group of ϕ, use additive notation for this group, and for a ∈ q(D), we denote by [a] = a q(ϕ(H)) ∈ q(D)/q(ϕ(H)) the class containing a. Clearly D/H = {[a] : a ∈ D} ⊂ C(ϕ) is a submonoid with quotient group C(ϕ). The homomorphism ϕ is cofinal if and only if C(ϕ) = D/H and, by definition, every divisor theory is cofinal. Let ϕ : H → D = F (P) be a divisor homomorphism. Then ϕ(H) = {a ∈ D : [a] = [1]} and GP = {[p] = pq(ϕ(H)) : p ∈ P} ⊂ C(ϕ) is called the set of classes containing prime divisors. Moreover, we have hGP i = C(ϕ) and [GP ] = {[a] : a ∈ D}. The monoid H is called a Krull monoid if it satisfies one of the following equivalent conditions : (a) H is completely integrally closed and satisfies the ACC on divisorial ideals. (b) H has a divisor theory. (c) H has a divisor homomorphism into a free abelian monoid. If H is a Krull monoid, then a divisor theory is unique up to unique isomorphism, and the class group associated to a divisor theory depends only on H. It is called the class group of H and will be denoted by C(H). Moreover, a reduced Krull monoid H with divisor theory H ֒→ F (P) is uniquely determined up to isomorphism by its characteristic (G, (mg )g∈G ) where G is an abelian group together with an isomorphism Φ : G → C(H) and with family (mg )g∈G of cardinal numbers mg = |P ∩ Φ(g)| (see [37, Theorem 2.5.4], and the forthcoming Lemma 3.4). It is well-known that a domain R is a Krull domain if and only if its multiplicative monoid R• is a Krull monoid, and we set the class group of R to be C(R) = C(R• ). Property (a) shows that a Noetherian MONOIDS OF MODULES AND ARITHMETIC OF DIRECT-SUM DECOMPOSITIONS 9 domain is Krull if and only if it is integrally closed. In addition, many well-studied classes of commutative monoids such as regular congruence monoids in Krull domains and Diophantine monoids are Krull. The focus of the present paper is on Krull monoids stemming from Module Theory. Monoids of modules. Let R be a (not necessarily commutative) ring and C a class of (right) Rmodules. We say that C is closed under finite direct sums, direct summands, and isomorphisms provided the following holds: Whenever M, M1 , and M2 are R-modules with M ∼ = M1 ⊕ M2 , we have M ∈ C if and only if M1 , M2 ∈ C. We say that C satisfies the Krull-Remak-Schmidt-Azumaya Theorem (KRSA for short) if the following holds: If k, l ∈ N and M1 , . . . , Mk , N1 , . . . , Nl are indecomposable modules in C with M1 ⊕ · · · ⊕ Mk ∼ = N1 ⊕ · · · ⊕ Nl , then l = k and, after a possible reordering of terms, Mi ∼ = Ni for all i ∈ [1, k]. Suppose that C is closed under finite direct sums, direct summands, and isomorphisms. For a module M ∈ C, we denote by [M ] its isomorphism class, and by V(C) the set of isomorphism classes. (For our purposes here, we tacitly assume that this is actually a set. For the classes of modules studied in Sections 4 and 5 this is indeed the case. For the involved set-theoretical problems in a more general context, see [26, Section 2].) Then V(C) is a commutative semigroup with operation [M ] + [N ] = [M ⊕ N ] and all information about direct-sum decompositions of modules in C can be studied in terms of factorizations in the semigroup V(C). By definition, C satisfies KRSA if and only if V(C) is a free abelian monoid, which holds if EndR (M ) is local for each indecomposable M in C (see [56, Theorem 1.3]). If the endomorphism ring EndR (M ) is semilocal for all modules M in C, then V(C) is a Krull monoid ([22, Theorem 3.4]). There is an abundance of recent work which provides examples of rings and classes of modules over these rings for which all endomorphism rings are semilocal (see [24], [25], and [26]. For monoids of modules, a characterization of when the class group is a torsion group is given in [27]). Suppose that V(C) is a Krull monoid. Then to understand the structure of direct-sum decompositions of modules in C is to understand the arithmetic of the reduced Krull monoid V(C). Since any reduced Krull monoid H is uniquely determined by its class group and by the distribution of prime divisors (that is, the characteristic of H), one must study these parameters. In the present paper we will focus on the following classes of modules over a commutative Noetherian local ring S, each closed under finite direct sums, direct summands, and isomorphisms. For a commutative Noetherian local ring S, we denote by • M(S) the semigroup of isomorphism classes of finitely generated S-modules, by • T (S) the semigroup of isomorphism classes of finitely generated torsion-free S-modules, and by • C(S) the semigroup of isomorphism classes of maximal Cohen-Macaulay (MCM) S-modules. Note that in order to make C(S) a semigroup, we insist that [0S ] ∈ C(S), even though the zero module is not MCM. We say that a commutative Noetherian local ring S has finite representation type if there are, up to isomorphism, only finitely many indecomposable MCM S-modules. Otherwise we say that S has infinite representation type. b m) b Throughout, let (R, m) be a commutative Noetherian local ring with maximal ideal m, and let (R, b denote its m-adic completion. Let V(R) and V(R) be any of the above three semigroups. If M is an b is an R-module b c] ∈ V(R), b and every c ∼ with [M R-module such that [M ] ∈ V(R), then M = M ⊗R R b b has finite such R-module is called extended. Note that R has finite representation type if and only if R b representation type (see [56, Chapter 10]), and that the dimension of R is equal to the dimension of R. The following crucial result shows that the monoid V(R) is Krull. b m) b Lemma 3.1. Let (R, m) be a commutative Noetherian local ring with maximal ideal m, and let (R, denote its m-adic completion. b b (1) For each indecomposable finitely generated R-module M , EndRb (M ) is local, and therefore M(R), b b T (R), and C(R) are free abelian monoids. 10 NICHOLAS R. BAETH AND ALFRED GEROLDINGER b is a divisor homomorphism. It is cofinal if and only if every finitely (2) The embedding M(R) ֒→ M(R) b generated R-module is a direct summand of an extended module. b and C(R) ֒→ C(R) b are divisor homomorphisms. (3) The embeddings T (R) ֒→ T (R) In particular, M(R), T (R), and C(R) are reduced Krull monoids. Moreover, the embeddings in (2) and b (3) are injective and map R-modules onto the submonoid of extended R-modules. Proof. Property (1) holds by the Theorem of Krull-Remak-Schmidt-Azumaya (see [56, Chapter 1]). In [67], Wiegand proved that the given embedding is a divisor homomorphism (see also [9, Theorem 3.6]). The characterization of cofinality follows from the definition and thus (2) holds. Let M, N be R-modules such that either [M ], [N ] ∈ V(R) where V(R) denotes either T (R) or C(R) c] divides [N b ] in V(R). b Then we have divisibility in M(R), b and hence in M(R) by and suppose that [M (2). Since V(R) ⊂ M(R) is divisor-closed, it follows that [M ] divides [N ] in V(R), proving (3). Together, (2) and (3) show that M(R), T (R), and C(R) satisfy Property (c) in the definition of Krull c] are injective. monoids. Since each of these monoids is reduced, the maps induced by [M ] 7→ [M  b is not necessarily cofinal, as is shown in [47] and [30]. In Note that the embedding M(R) ֒→ M(R) Sections 4 and 5 we will study in detail the class group and the distribution of prime divisors of these Krull monoids, in the case of one-dimensional and two-dimensional commutative Noetherian local rings. Monoids of zero-sum sequences. We now introduce Krull monoids having a combinatorial flavor which are used to model arbitrary Krull monoids. Let G be an additive abelian group and let G0 ⊂ G be a subset. Following the tradition in Additive Group and Number Theory, we call the elements of F (G0 ) sequences over G0 . Thus a sequence S ∈ F (G0 ) will be written in the form Y S = g1 · . . . · gl = g vg (S) . g∈G0 We will use all notions (such as the length) as in general free abelian monoids. We set −S = (−g1 ) · . . . · (−gl ), and call σ(S) = g1 + · · · + gl ∈ G the sum of S. The monoid B(G0 ) = {S ∈ F (G0 ) : σ(S) = 0} is called the monoid of zero-sum sequences over G0 , and its elements are called zero-sum sequences over G0 . Obviously, the inclusion B(G0 ) ֒→ F (G0 ) is a divisor homomorphism, and hence B(G0 ) is a reduced Krull monoid by Property (c) in the definition of Krull monoids. By definition, the inclusion B(G0 ) ֒→ F (G0 ) is cofinal if and only if for every g ∈ G0 there is an S ∈ B(G0 ) with g | S; equivalently, there is no proper subset G′0 ( G0 such that B(G′0 ) = B(G0 ). If |G| 6= 2, then C(B(G)) ∼ = G, and every class contains precisely one prime divisor. For every arithmetical invariant ∗(H), as defined for a monoid H in Section 2, it is usual to write ∗(G0 ) instead of ∗(B(G0 )) (whenever the meaning is clear from the context). In particular, we set A(G0 ) = A(B(G0 )), L(G0 ) = L(B(G0 )), cmon (G0 ) = cmon (B(G0 )), etc. The study of sequences, subsequence sums, and zero-sums is a flourishing subfield of Additive Group and Number Theory (see, for example, [31], [40], and [43]). The Davenport constant D(G0 ), defined as D(G0 ) = sup{|U | : U ∈ A(G0 )} ∈ N0 ∪ {∞} , is among the most studied invariants in Additive Theory and will play a crucial role in the computations of arithmetical invariants (see the discussion after Lemma 3.4). We will need the following two simple lemmas which we present here so as to not clutter the exposition of Section 6. Lemma 3.2. Suppose that the inclusion B(G0 ) ֒→ F (G0 ) is cofinal. The following are equivalent. (a) There exist nontrivial submonoids H1 , H2 ⊂ B(G0 ) such that B(G0 ) = H1 × H2 . (b) There exist nonempty subsets G1 , G2 ⊂ G0 such that G0 = G1 ⊎ G2 and B(G0 ) = B(G1 ) × B(G2 ). (c) There exist nonempty subsets G1 , G2 ⊂ G0 such that G0 = G1 ⊎ G2 and A(G0 ) = A(G1 ) ⊎ A(G2 ). MONOIDS OF MODULES AND ARITHMETIC OF DIRECT-SUM DECOMPOSITIONS 11 Proof. Clearly (b) implies (a). The converse follows from [37, Proposition 2.5.6]. The implication (b) implies (c) is obvious. We now show that (c) implies (b). Let B ∈ B(G0 ). Since B(G0 ) is a Krull monoid, it is atomic and hence B = U1 · . . . · Ul with U1 , . . . , Ul ∈ A(G0 ). After renumbering (if necessary), we can find k ∈ [0, l] such that U1 , . . . , Uk ∈ A(G1 ) and Uk+1 , . . . , Ul ∈ A(G2 ). Thus B(G0 ) = B(G1 )B(G2 ). If B ∈ B(G1 ) ∩ B(G2 ), then B is a product of atoms from A(G1 ) and a product of atoms from A(G2 ). Since their intersection is empty, both products are empty. Therefore B = 1 and hence B(G0 ) = B(G1 ) × B(G2 ).  Lemma 3.2.(c) shows that B(G• ) is not a direct product of submonoids. Suppose that 0 ∈ G0 . Then 0 ∈ B(G0 ) is a prime element and B(G0 ) = B({0}) × B(G•0 ). But B({0}) = F ({0}) ∼ = (N0 , +), and thus all the arithmetical invariants measuring the non-uniqueness of factorizations of B(G0 ) and of B(G•0 ) coincide. Therefore we can assume that 0 ∈ / G0 whenever it is convenient. Lemma 3.3. Let G be an abelian group and let G0 ⊂ G be a subset such that 1 < D(G0 ) < ∞. (1) We have ρ(G0 ) ≤ D(G0 )/2, k ≤ ρk (G0 ) ≤ kρ(G0 ), and ρ(G0 )−1 k ≤ λk (G0 ) ≤ k for all k ∈ N. (2) Suppose that ρ2 (G0 ) = D(G0 ). Then ρ(G0 ) = D(G0 )/2, and for all k ∈ N, we have ρ2k (G0 ) = kD(G0 ) and kD(G0 ) + 1 ≤ ρ2k+1 (G0 ) ≤ kD(G0 ) + D(G0 ) . 2 Moreover, if j, l ∈ N0 such that lD(G0 ) + j ≥ 1, then 2j ≤ λlD(G0 )+j (G0 ) ≤ 2l + j . 2l + D(G0 ) Proof. By definition, λk (G0 ) ≤ k ≤ ρk (G0 ). Since ρ(G0 ) = sup{ρk (G0 )/k : k ∈ N}, it follows that ρk (G0 ) ≤ kρ(G0 ) and k ≤ ρ(G0 )λk (G0 ). Furthermore, 2ρk (G0 ) ≤ kD(G0 ) for all k ∈ N implies that ρ(G0 ) ≤ D(G0 )/2. This gives (1). We now prove (2). Since ρk (G0 ) + ρl (G0 ) ≤ ρk+l (G0 ) for every k, l ∈ N, (1) implies that kD(G0 ) = kρ2 (G0 ) ≤ ρ2k (G0 ) ≤ (2k) D(G0 ) = kD(G0 ) , 2 and hence D(G0 ) . 2 Let j, l ∈ N0 such that lD(G0 ) + j ≥ 1. For convenience, set ρ0 (G0 ) = λ0 (G0 ) = 0. Since 2 2l = lD(G0 ) ≤ λlD(G0 ) (G0 ) and ρ2l (G0 ) = lD(G0 ) , D(G0 ) kD(G0 ) + 1 = ρ2k (G0 ) + ρ1 (G0 ) ≤ ρ2k+1 (G0 ) ≤ (2k + 1)ρ(G0 ) ≤ kD(G0 ) + it follows that λlD(G0 ) (G0 ) = 2l, and hence 2l +   2 2j = lD(G0 ) + j = ρ(G0 )−1 lD(G0 ) + j D(G0 ) D(G0 ) ≤ λlD(G0 )+j (G0 ) ≤ λlD(G0 ) (G0 ) + λj (G0 ) ≤ 2l + j .  Transfer homomorphisms. Transfer homomorphisms are a central tool in Factorization Theory. In order to study a given monoid H, one constructs a transfer homomorphism θ : H → B to a simpler monoid B, studies factorizations in B, and then lifts arithmetical results from B to H. In the case of Krull monoids, transfer homomorphisms allow one to study nearly all of the arithmetical invariants introduced in Section 2 in an associated monoid of zero-sum sequences. We now gather the basic tools necessary for this approach. 12 NICHOLAS R. BAETH AND ALFRED GEROLDINGER A monoid homomorphism θ : H → B is called a transfer homomorphism if it has the following properties: (T 1) B = θ(H)B × and θ−1 (B × ) = H × . (T 2) If u ∈ H, b, c ∈ B and θ(u) = bc, then there exist v, w ∈ H such that u = vw, θ(v) ≃ b and θ(w) ≃ c. The next result provides the link between the arithmetic of Krull monoids and Additive Group and Number Theory. This interplay is highlighted in the survey [34]. Lemma 3.4. Let H be a Krull monoid, ϕ : H → D = F (P) a cofinal divisor homomorphism, G = C(ϕ) e : D → F (GP ) denote the its class group, and GP ⊂ G the set of classes containing prime divisors. Let β e unique homomorphism defined by β(p) = [p] for all p ∈ P. e ◦ ϕ : H → B(GP ) is a (1) The inclusion B(GP ) ֒→ F (GP ) is cofinal, and the homomorphism β = β transfer homomorphism. (2) For all a ∈ H, LH (a) = LB(GP ) (β(a)). In particular, L(H) = L(GP ), ∆(H) = ∆(GP ), Uk (H) = Uk (GP ), ρk (H) = ρk (GP ), and λk (H) = λk (GP ) for each k ∈ N. (3) Suppose that H is not factorial. Then c(H) = c(GP ), cadj (H) = cadj (GP ), cmon (H) = cmon (GP ), ∆∗ (H) = ∆∗ (GP ), and ω(H) ≤ D(GP ). Proof. See [37, Section 3.4] for details pertaining to most of the invariants. For the statements on the monotone catenary degree see [36]. Roughly speaking, all of the statements in (2) are straightforward, but the statements in (3) are more subtle. Note that a statement corresponding to (3) does not hold true for the tame degree (see [33]).  In summary, if the monoid of modules V(R) is Krull with class group G and set GP of classes containing prime divisors, then the arithmetic of direct-sum decompositions can be studied in the monoid B(GP ) b as in Lemma 3.1 and all of zero-sum sequences over GP . In particular, if H = M(R) and D = M(R) notation is as in Lemma 3.4, then c∼ D(GP ) = sup{l : M = N1 ⊕ · · · ⊕ Nl such that [M ] ∈ A(H) and [Ni ] ∈ A(D) for each i ∈ [1, l]} . 4. Monoids of modules: Class groups and distribution of prime divisors I Throughout this section we use the following setup: (S) (R, m) denotes a one-dimensional analytically unramified commutative Noetherian local ring with b its m-adic completion, and spl(R) = unique maximal ideal m, k = R/m its residue field, R b | spec(R)| − | spec(R)| the splitting number of R. In this section we investigate the characteristic of the Krull monoids M(R) and T (R) for certain one-dimensional local rings. This study is based on deep module-theoretic work achieved over the past several decades. We gather together module-theoretic information and proceed using a recent construction (see 4.4) to obtain results on the class group and on the set GP of classes containing prime divisors. The literature does not yet contain a systematic treatment along these lines. Indeed, early results (see Theorem 4.2 below) indicated only the existence of extremal sets GP which imply either trivial direct-sum decompositions or that all arithmetical invariants describing the direct-sum decompositions are infinite. In either case there was no need for further arithmetical study. Here we reveal that finite and wellstructured sets GP occur in abundance. Thus, as we will see in Section 6, the arithmetical behavior of direct-sum decompositions is well-structured. b and R are both reduced We first gather basic ring and module-theoretic properties. By definition, R and the integral closure of R is a finitely generated R-module. Moreover, we have C(R) = T (R). Let M be a finitely generated R-module. If p is a minimal prime ideal of R, then Rp is a field, Mp is a finite-dimensional Rp -vector space, and we set rankp (M ) = dimRp (Mp ). If p1 , . . . , ps are the minimal MONOIDS OF MODULES AND ARITHMETIC OF DIRECT-SUM DECOMPOSITIONS 13 prime ideals of R, then rank(M ) = (r1 , . . . , rs ) where ri = rankpi (M ) for all i ∈ [1, s]. The module M is said to have constant rank if r1 = · · · = rs . We start with a beautiful result of Levy and Odenthall, which gives us a tool to determine which b finitely generated R-modules are extended from R-modules. b Proposition 4.1. [57, Theorem 6.2] Let M be a finitely generated torsion-free R-module. Then M is b with extended if and only if rankp (M ) = rankq (M ) whenever p and q are minimal prime ideals of R p ∩ R = q ∩ R. In particular, if R is a domain, then M is extended if and only if its rank is constant. We start our discussion with a result which completely determines the characteristic of the Krull monoid M(R). The arithmetic of this monoid is studied in Proposition 6.2.2. Theorem 4.2. [46, Theorem 6.3] Let G denote the class group of M(R) and let GP ⊂ G denote the set of classes containing prime divisors. (1) If R is not Dedekind-like, then G is free abelian of rank spl(R) and each class contains |k|ℵ0 prime divisors. (2) If R is a DVR, then G = 0. (3) If R is Dedekind-like but not a DVR, then either (a) spl(R) = 0 and G = 0, or (b) spl(R) = 1, G is infinite cyclic with G = hei and GP = {−e, 0, e}. Each of the classes e and −e contain ℵ0 prime divisors and the class 0 contains |k|ℵ0 prime divisors. Thus, for the rest of this section, we focus our attention on T (R). To determine if the divisor homob is a divisor theory, we will require additional information. For now, we easily morphism T (R) ֒→ T (R) show that it is always cofinal. b is a cofinal divisor homomorphism. Proposition 4.3. The embedding T (R) ֒→ T (R) Proof. By Lemma 3.1 the embedding is a divisor homomorphism. If M is a finitely generated torsion-free b R-module, we can consider its rank, rank(M ) = (r1 , . . . , rt ), where t is the number of minimal primes b If r1 = · · · = rt , then by Proposition 4.1 M is extended, say M = N b for some finitely generated of R. torsion-free R-module N and the result is trivial. If the rank of M is not constant, set r = max{r1 , . . . , rt } r−r1 r−rt   b b 1 b t and consider the R-module L = R/q ⊕ · · · ⊕ R/q , where q1 , . . . , qt denote the minimal b Then rank(N ⊕ L) = (r, . . . , r) is constant and hence N ⊕ L is extended, say N ⊕ L ∼ primes of R. = Pb for some finitely generated torsion-free R-module P . Clearly M is isomorphic to a direct summand of Pb and the result follows.  (P) b is free abelian, we can identify it with the free abelian monoid N Since T (R) where P is an index 0 b set for the isomorphism classes of indecomposable finitely generated torsion-free R-modules. We then use Proposition 4.1 to give a detailed description of T (R). The following construction has been used numerous times (see, for example, [7], [8], and [28]). Construction 4.4. • Let p1 , . . . , ps be the distinct minimal prime ideals of R. For each i ∈ [1, s], let qi,1 , . . . , qi,ti be the b lying over pi . Note that spl(R) = Ps (ti − 1). minimal primes of R i=1 b • Let P be the set of isomorphism classes of indecomposable finitely generated torsion-free R-modules. • Let A(R) be the spl(R) × |P| matrix whose column indexed by the isomorphism class [M ] ∈ P is  T r1,1 − r1,2 · · · r1,1 − r1,t1 · · · rs,1 − rs,2 · · · rs,1 − rs,ts where ri,j = rankqi,j (M ). (P) Then T (R) ∼ = ker(A(R)) ∩ N(P) ⊂ N0 is a Diophantine monoid. 14 NICHOLAS R. BAETH AND ALFRED GEROLDINGER b lie over the minimal prime If one has a complete description of how the minimal prime ideals of R b ideals of R together with the ranks of all indecomposable finitely generated torsion-free R-modules, then Construction 4.4 completely describes the monoid T (R). In certain cases (eg. Section 4.1) we are able to obtain all of this information. Other times we know only some of the ranks that occur for indecomposable b R-modules and thus have only a partial description for T (R). However, as was shown in [8], the ranks b of indecomposable cyclic R-modules gives enough information about the columns of A(R) to prove that b is nearly always a divisor theory. First we recall that if q1 , . . . , qt are the minimal primes T (R) ֒→ T (R) b and E ⊂ [1, t]. Then of R, ! ( b 1, i ∈ E R rank T = (r1 , . . . , rt ), where ri = 0, i 6∈ E. i∈E qi Thus every nontrivial t-tuple of zeros and ones can be realized as the rank of a nonzero (necessarily b indecomposable) cyclic R-module. Thus we have the following: Construction 4.5. Let all notation be as in Construction 4.4. After renumbering if necessary, P there is p ∈ [0, s] such that t1 , . . . , tp ≥ 2 and such that ti = 1 for each i ∈ [p + 1, s]. Then spl(R) = pj=1 tj − p. For each i ∈ [1, p], let Ai be the set of (ti − 1) × 1 column vectors all of whose entries are either 0 or 1, and let Bi be the set of (ti − 1) × 1 column Q vectors all of whose entries are either 0 or −1. We now define T to be the spl(R) × pi=1 (2ti − 1) matrix, each of whose columns has the form   T1  ..  where Ti ∈ Ai ∪ Bi for each i ∈ [1, p].  . , Tp With the notation as in Constructions 4.4 and 4.5, we give a realization result which shows that the matrix T occurs as a submatrix of A(R). Proposition 4.6. [8, Proposition 3.7] For each column α of T , there exist nonnegative integers ri,j and b an indecomposable torsion-free R-module Mα of rank (r1,1 , . . . , r1,t1 , . . . , rp,1 , . . . , rp,tp , rp+1,1 , . . . , rs,1 ) such that  α = r1,1 − r1,2 ··· ··· r1,1 − r1,t1 rp,1 − rp,2 ··· rp,1 − rp,tp T . In particular, the matrix A(R) nearly always satisfies the hypotheses of the following lemma. Lemma 4.7. [8, Lemma 4.1] Fix an integer q ≥ 1, and let Iq denote the q ×q identity matrix. Let   P be an index set, and let D be a q × |P| integer matrix whose columns are indexed by P. Assume D = D1 | D2 , where D1 is the q × (2q + 2) integer matrix   1 −1  .. ..  ,  I −I . .  q q 1 −1 and D2 is an arbitrary integer matrix with q rows (and possibly infinitely many columns). Let H = (P) ker(D) ∩ N0 . (1) (2) (3) (4) The map D : Z(P) → Z(q) is surjective. (P) The natural inclusion H ֒→ N0 is a divisor theory. ker(D) = q(H). C(H) ∼ = Z(q) , and this isomorphism maps the set of classes containing prime divisors onto the set of distinct columns of D. MONOIDS OF MODULES AND ARITHMETIC OF DIRECT-SUM DECOMPOSITIONS 15 In particular, we observe the following: Given a fixed column α of D, the cardinality of {β : β is a column of D and β = α} is equal to the cardinality of prime divisors in the class corresponding to α. Therefore, the characteristic of the Krull monoid H is completely given by the matrix D. Based on the previous results, one easily obtains the following theorem which provides the framework for our study of the characteristic of T (R). Theorem 4.8. b is free abelian. (1) If spl(R) = 0, then T (R) ∼ = T (R) b is a divisor theory. Moreover, (2) If spl(R) ≥ 2 then the embedding T (R) ֒→ T (R) (P) ∼ (a) T (R) = ker(A(R)) ∩ N0 , (b) C(T (R)) ∼ = Z(spl(R)) , and this isomorphism maps the set of classes containing prime divisors onto the set of distinct columns of A(R). b is a divisor theory if and only if the defining Suppose that spl(R) = 1. The embedding T (R) ֒→ T (R) matrix A(R) contains at least two positive and at least two negative entries (see Proposition 6.1.2). b In many cases, computing the ranks of indecomposable R-modules and hence the columns of the defining matrix A(R) is difficult. However, an additional hypotheses on R implies that the set of classes containing prime divisors satisfies GP = −GP , a crucial property for all arithmetical investigations (see Proposition 6.2 and the subsequent remarks). ∼ S/(f ) where (S, n) is a hypersurface i.e., a regular Noeb= Corollary 4.9. Suppose in addition that R b and therian local ring of dimension two and where 0 6= f ∈ n. If G is the class group of T (R) ֒→ T (R) GP is the set of classes containing prime divisors, then GP = −GP . Proof. With the hypotheses given, we can apply [8, Proposition 6.2] to see that if M is any indecomposable b b R-module with rank (r1 , . . . , rt ), then there is an indecomposable R-module N with rank  (m − r1 , m − r2 , . . . , m − rt ) for some m ≥ max{r1 , . . . , rt }. Using Construction 4.4 we see that if α = a1 · · · aq is the column of A(R) indexed by M , then −α is the column indexed by N . Therefore, since GP corresponds to the distinct columns of A(R), GP = −GP .  Remark 4.10. Although the system of equations developed in Construction 4.4 is somehow natural, it is not the only system of equations which can be used to define T (R). Indeed, the matrix A(R) can be adjusted by performing any set of elementary row operations. If J is an elementary matrix corresponding (P) (P) to such a set of row operations, then T (R) ∼ = ker(JA(R)) ∩ N0 . Moreover, this = ker(A(R)) ∩ N0 ∼ isomorphism gives rise to an automorphism of C(T (R)) mapping the set of classes containing prime divisors to another set of classes containing prime divisors. Example 4.20 illustrates the usefulness of considering an alternate defining matrix for T (R). 4.1. Finite Representation Type. Throughout this subsection, let R be as in Setup (S), and suppose in addition that R has finite representation type. Decades with of work going back to a paper of Green and Reiner [42] and including papers by R. and S. Wiegand, Çimen, Arnuvut, Luckas, and Baeth (see [68], [16], [1], and [3]) culminated in a paper by Baeth and Luckas [6] which classified precisely the tuples that can occur as the ranks of indecomposable b have at most torsion-free R-modules. We note that since R has finite representation type, both R and R three minimal primes (see [17, Theorem 0.5]). Proposition 4.11. [6, Main Theorem 1.2] b is a domain, then every indecomposable finitely generated torsion-free R-module b (1) If R has rank 1, 2 or 3. b has exactly two minimal prime ideals, then every indecomposable finitely generated torsion-free (2) If R b R-module has rank (0, 1), (1, 0), (1, 1), (1, 2), (2, 1) or (2, 2). 16 NICHOLAS R. BAETH AND ALFRED GEROLDINGER b has exactly two minimal prime ideals, then every indecomposable finitely generated torsion-free (3) If R b R-module has rank (0, 0, 1), (0, 1, 0), (1, 0, 0), (0, 1, 1), (1, 0, 1), (1, 1, 0), (1, 1, 1) or (2, 1, 1). b Note the lack of symmetry in case (3): With a predetermined order on the minimal prime ideals of R, there is an indecomposable module of rank (2, 1, 1), but not of rank (1, 2, 1) or (1, 1, 2). As is stated in [6, Remark 5.2], even for a fixed number of minimal primes, not each of these tuples will occur as the rank of an indecomposable module for each ring. However, since when applying Construction 4.4 we cannot distinguish between an indecomposable of rank (2, 1) and one of rank (1, 0), and since all nontrivial tuples of zeros and ones occur as ranks of indecomposable cyclic modules, we have [7, Proposition 3.3]:  (1) If spl(R) = 1, then A(R) = 1 · · · 1 −1 · · · 0 −1 1 −1 1 (2) If spl(R) = 2, then A(R) = −1 0 1 −1 0  −1 0 · · · 0 .  0 0 1 ··· . 1 0 1 ··· When spl(R) = 1, we are guaranteed at least one entry for each of 1, −1, and 0, coming from the b ranks of indecomposable cyclic R-modules. If we have at most one 1 or at most one −1 in the defining b has exactly two minimal primes p and q, matrix A(R), then it must be the case that R is a domain, R b is the only indecomposable torsion-free R-module b and up to isomorphism either R/p of rank (r, s) with b is the only indecomposable torsion-free R-module b r − s = 1 or the R/q of rank (r, s) with r − s = −1. If this is the situation, we say that R satisfies condition (†). In case spl(R) = 2, we are guaranteed that each column listed appears at least once as a column of A(R). We then have the following refinement of Theorem 4.8 when R has finite representation type. The arithmetic of this monoid is studied in Proposition 6.2.2, Theorem 6.4, and Corollary 6.10. Theorem 4.12. [7, Proposition 3.3] b is not a divisor theory but T (R) is (1) If spl(R) = 1 and R satisfies condition (†) then T (R) ֒→ T (R) free abelian. b is a divisor theory with (2) If spl(R) = 1 and R does not satisfy condition (†), then T (R) ֒→ T (R) infinite cyclic class group G = hei, and GP = {−e, 0, e}. (2) b is a divisor theory and C(T (R)) ∼ (3) If spl(R) = 2, then T (R) ֒→ T (R)   = Z . Moreover,    this  isomor 1 −1 1 −1 0 0 phism maps the set of classes containing prime divisors onto , , , , , . 1 −1 0 0 1 −1 4.2. Infinite Representation Type. Throughout this subsection, let R be as in Setup (S), and suppose in addition that R has infinite representation type. Unfortunately, in this case, there is no known complete list of the tuples that can occur as ranks of indecomposable finitely generated torsion-free R-modules. Thus we cannot give a full description of T (R) b has infinite representation using Construction 4.4. However, with the additional assumption that R/q b we can produce a wide variety of interesting ranks and can type for some minimal prime ideal q of R, provide a partial description of T (R). This information is enough to show that, very much unlike the finite representation type case of Section 4.1, all of the arithmetical invariants we study are infinite. Proposition 4.13. [61, Theorem 3.4.1] Let S be a one-dimensional analytically unramified commutative Noetherian local ring with residue field K, and with t minimal prime ideals q1 , . . . , qt such that S/q1 has infinite representation type. Let (r1 , . . . , rt ) be a nonzero t-tuple of nonnegative integers with ri ≤ 2r1 for all i ∈ [2, t]. (1) There exists an indecomposable torsion-free S-module of rank (r1 , . . . , rt ). (2) If the residue field K is infinite, then the set of isomorphism classes of indecomposable torsion-free S-modules of rank (r1 , . . . , rt ) has cardinality |K|. MONOIDS OF MODULES AND ARITHMETIC OF DIRECT-SUM DECOMPOSITIONS 17 b By Proposition 4.13 the conditions of Lemma 4.7 are satisfied. Therefore the map T (R) ֒→ T (R) is a divisor theory and the class group C(T (R)) is free abelian of rank spl(R). Our main result of this subsection is a refinement of Theorem 4.8. Its arithmetical consequences are given in Proposition 6.2.1, strongly improving the arithmetical characterizations given in [8]. b such Theorem 4.14. Suppose that spl(R) ≥ 1 and that there is at least one minimal prime ideal q of R b has infinite representation type. Then C(T (R)) is free abelian of rank spl(R) and the set of that R/q classes containing prime divisors contains an infinite cyclic subgroup. Proof. Let p1 , . . . , ps denote the minimal primes of R and, for each i ∈ [1, s], let qi,1 , . . . , qi,ti denote the b lying over pi . Without loss of generality, assume that R/q b 1,1 has infinite set of minimal primes of R representation type. If t1 = 1, then without loss of generality, t2 > 1. From Proposition 4.13 there b is, for each pair (r, s) of nonnegative integers (not both zero), an indecomposable R-module M with rankq2,1 (M ) = r, rankq2,2 (M ) = s, and rankqi,j (M ) = 0 for all (i, j) 6∈ {(1, 1), (2, 1), (2, 2)}. Now suppose that t1 > 1. Then we have, from Proposition 4.13, for each pair (r, s) of nonnegative integers (not both b zero) satisfying r − s ≥ −s, an indecomposable R-module M with rankq1,1 (M ) = r, rankq1,2 (M ) = s, andnrankqi,j (M ) = 0 for all (i,oj) 6∈ {(1, 1), (1, 2)}. In either case, using Construction 4.4 we see that the  T set x 0 · · · 0 : x ∈ Z occurs as a set of columns for A(R) and hence occurs as a subset of the set of classes containing prime divisors.  4.3. Divisor-closed submonoids of T (R). Suppose that R has infinite representation type but, in b has finite representation type for each minimal prime q of contrast to Theorem 4.14, suppose that R/q b R. Then there is no known classification of all ranks of indecomposable finitely generated torsion-free R-modules. Specific rings have been studied in the literature, but even in these settings, a complete solution has been unattainable. We now give such an example which we will return to in Section 4.4. Example 4.15. Let K be an algebraically closed field of characteristic zero. Consider the ring S = K[[x, y]]/(x4 − xy 7 ) which has exactly two minimal primes xS and (x3 − y 7 )S. Detailed constructions in [51] and [61] show that S has indecomposable modules of ranks (m, m), (m + 1, m), and (m + 2, m) for each positive integer m. Moreover, [8, Proposition 6.2] guarantees indecomposable modules of ranks (s − (m + 1), s − m) and (t − (m + 2), t − m) where s ≥ m + 1 and t ≥ m + 2 are positive integers. Determining what other tuples occur as ranks of indecomposable torsion-free S-modules appears to be quite difficult. Thus, since studying T (R) as a whole is out of reach at the present state of knowledge, we pick finitely many R-modules M1 , . . . , Mn , and study the direct-sum relations among them. In more technical terms, instead of studying the full Krull monoid T (R), we focus on divisor-closed submonoids. Suppose that H is a Krull monoid and H ֒→ F (P) a cofinal divisor homomorphism. If H ′ ⊂ H is a divisor-closed submonoid, then H ′ ֒→ H ֒→ F (P) is a divisor homomorphism. For each of the arithmetical invariants ∗(·) introduced in Section 2, we have ∗(H ′ ) ≤ ∗(H ′ ) resp. ∗(H ′ ) ⊂ ∗(H); for example we have c(H ′ ) ≤ c(H), L(H ′ ) ⊂ L(H), and so on. Moreover, if H ′ is the smallest divisor-closed submonoid containing finitely many elements a1 , . . . , ak ∈ H, it is also the smallest divisor-closed submonoid containing a1 · . . . · ak . For the rest of Section 4, we study divisor-closed submonoids of T (R) generated by a single R-module M , regardless of whether R has finite or infinite representation type. We denote this monoid by add(M ). Before discussing specific examples in Section 4.4, we carefully recall the consequences of our main Construction 4.4 for such submonoids. b be as in Construction 4.4. Let M be a finitely generated torsion-free Construction 4.16. Let R and R R-module. Then add(M ) consists of all isomorphism classes [N ] ∈ T (R) such that N is isomorphic to a direct summand of M (n) for some finite positive integer n. c = L(n1 ) ⊕ · · · ⊕ L(nk ) where the Li are pairwise nonisomorphic indecomposable finitely genWrite M 1 k b b ] ∈ add(M c) and erated torsion-free R-modules and the ni are positive integers. If [N ] ∈ add(M ), then [N 18 NICHOLAS R. BAETH AND ALFRED GEROLDINGER (a ) (a ) b N b ∼ thus, since direct-sum decomposition is essentially unique over R, = L1 1 ⊕ · · · ⊕ Lk k with each ai (k) a nonnegative integer at most ni . Thus there is a divisor homomorphism Ψ : add(M ) → N0 given by (k) [N ] 7→ (a1 , . . . , ak ). We identify add(M ) with the saturated submonoid Γ(M ) = Ψ(add(M )) of N0 . Moreover, is the transpose of the  if A(M ) is the spl(R)×k integer-valued matrix for which the lth column  row-vector r1,1 − r1,2 · · · r1,1 − r1,t1 · · · rs,1 − rs,2 · · · rs,1 − rs,ts where ri,j = rankqi,j (Vl ), ∼ Γ(M ) = ker(A(M )) ∩ N(k) . then add(M ) = 0 We now state a corollary of Theorem 4.8 for add(M ). Corollary 4.17. Let M be a finitely generated torsion-free R-module as in Construction 4.16. c) is free abelian. (1) If spl(R) = 0, then add(M ) ∼ = add(M (k) (2) If spl(R) ≥ 1 and A(M ) satisfies the conditions of Lemma 4.7, then the inclusion Γ(M ) ⊂ N0 is a divisor theory. Moreover, (k) (a) add(M ) ∼ = ker(A(M )) ∩ N0 , (b) C(add(M )) ∼ = Z(spl(R)) , and this isomorphism maps the set of classes containing prime divisors onto the set of distinct columns of A(M ). Before considering explicit examples, we give a realization result (see also [56, Chapter 1]). Proposition 4.18. Let H be a reduced Krull monoid with free abelian class group G of rank q and let GP ⊂ G denote the set of classes containing prime divisors. Suppose that GP is finite and that G has a basis (e1 , . . . , eq ) such that G0 = {e0 = e1 + · · · + eq , e1 , . . . , eq , −e0 , . . . , −eq } ⊂ GP . Then there exists an analytically unramified commutative Noetherian local domain S and a finitely generated torsion-free S-module M such that add(M ) ∼ = H. Proof. Let Φ : G → Z(q) denote the isomorphism which maps (e1 , . . . , eq ) onto the standard basis of Z(q) . b Let S be an analytically unramified Noetherian local domain with completion  S having q + 1 minimal b 0 has infinite representation type. For s = s1 · · · sq ∈ Φ(GP ), set primes Q0 , . . . , Qq such thatPS/Q r0 = s1 + · · · + sq and ri = j6=i sj for each i ∈ [1, q]. By Theorem 4.13 there exists an indecomposable L b finitely generated torsion-free S-module Ns such that rank(Ns ) = (r0 , . . . , rq ). Set N = s∈Φ(GP ) Ns (a−ai ) Lq  b and write rank(N ) = (a0 , . . . , aq ). Set a = max{a0 , . . . , aq } and L = i=0 S/Qi . Then N ⊕ L b is a finitely generated torsion-free S-module with constant rank and is thus extended from a finitely generated torsion-free S-module M . By Construction 4.16 and Corollary 4.17 we see that add(M ) has class group isomorphic to Z(q) and this isomorphism maps the set of prime divisors onto the elements of the set Φ(GP ).  4.4. Examples. In this section we provide the constructions of naturally occurring monoids add(M ) where M is a finitely generated torsion-free R-module. In particular, we construct specific modules M , c is often a direct sum of indecomposable cyclic R-modules b whose completion M and we determine the class group G of add(M ) and the set of classes GP ⊂ G containing prime divisors. Note that the Krull monoids M(R) of all finitely generated R-modules and T (R) of all finitely generated torsion-free R-modules have class groups G′ ⊃ G and a set G′P of classes containing prime divisors such that G′P ⊃ GP . Since add(M ) is a divisor-closed submonoid of both M(R) and of T (R), a study of the arithmetic of add(M ) provides a partial description of M(R) and T (R). Moreover, the values of arithmetical invariants of add(M ) give lower bounds on the same arithmetical invariants of M(R) and T (R). b In each of the following examples we construct an R-module L = Ln1 1 ⊕ · · · ⊕ Lnk k of constant rank, b where L1 , . . . , Lk are pairwise non-isomorphic indecomposable R-modules. Then, by Corollary 4.17 with MONOIDS OF MODULES AND ARITHMETIC OF DIRECT-SUM DECOMPOSITIONS 19 c∼ M = L for some R-module M ,  (k) (k) add(M ) ∼ = ker A(M ) ∩ N0 ⊂ N0 ∼ = add(L) . In particular, we do so in such a way that the natural map add(M ) ֒→ add(L) is a divisor theory with class group isomorphic to Z(spl(R)) and where the set of classes containing prime divisors maps onto the distinct columns of A(M ). Example 4.19. We now construct a monoid of modules whose arithmetic will be studied in Proposition 6.12. Let S be as in Example 4.15. Then there are indecomposable torsion-free S-modules M1 , M−1 , M2 , M−2 , N1 , N−1 , N2 , and N−2 with ranks (respectively) (2, 1), (1, 2), (3, 1), (1, 3), (3, 2), (3, 2), (2, 3), (4, 2), and (2, 4). Set L to be the direct sum of these eight indecomposable S-modules. By Lech’s Theorem [54], b∼ there exists a Noetherian local domain (R, m) with m-adic completion R = S. Since L has constant rank, (8) ∼ L is extended from some R-module M , and add(M ) ֒→ add(L) = N0 is a divisor theory with infinite cyclic class group G and with GP = {−2e, −e, e, 2e} where G = hei. Example 4.20. We now provide an example that illustrates the convenience of choosing an alternate defining matrix for add(M ), as is described in Remark 4.10. Its arithmetic is given in Theorem 6.4. b has five minimal prime ideals q(1,1) , Suppose that R has two minimal prime ideals p1 , p2 and that R q(1,2) , q(1,3) , q(2,1) , and q(2,2) , with q(i,j) lying over pi for each i ∈ [1, 2] and for each j. Set L = b R b R ⊕ ⊕ b R ⊕ q(1,2) ∩ q(2,1) q(1,1) ∩ q(1,3) ∩ q(2,2) q(1,1) ∩ q(1,2) ∩ q(2,1) b b b R R R ⊕ ⊕ . q(1,1) q(1,3) ∩ q(2,2) q(1,2) ∩ q(1,3) ∩ q(2,1) ∩ q(2,2) (6) c∼ Since L has constant rank 3, there is an R-module M such that M = L. Then add(M ) ∼ = ker(A(M ))∩N0 where       1 0 −1 1 0 −1 1 0 −1 1 0 −1 1 0 −1 1 0 −1 A(M ) =  0 1 0 1 −1 −1 ∼ −1 1 1 0 −1 0  ∼ 0 1 0 1 −1 −1 = JA(M ). −1 1 1 0 −1 0 0 0 0 0 0 0 0 0 0 0 0 0   1 0 −1 1 0 −1 (6) (6) Thus add(M ) ∼ ∩ N0 . Since the matrix A(M ) has = ker = ker(JA(M )) ∩ N0 ∼ 0 1 0 1 −1 −1 rank two, the representation of add(M ) as a Diophantine matrix defined by two equations more clearly describes this monoid. Moreover, since the map from Z(6) to Z(2) is surjective (the map A(M ) : Z(6) → Z(3) is not surjective), we immediately see that C(add(M )) ∼ = Z(2) , and this isomorphism maps the set of classes containing prime divisors onto             1 0 −1 0 1 −1 , , , , , . 0 1 0 −1 1 −1 Example 4.21. We now consider a monoid add(M ) which generalizes the monoid T (R) when R has finite representation type, and its arithmetic is studied in Theorem 6.7 and Corollary 6.10. Suppose that b has q + 1 minimal primes q1 , . . . , qq+1 , and set R L= M ∅6=I⊂[1,q+1] b R ∩i∈I qi . b R b From the symmetry of the set of ranks of the indecomposable cyclic R-modules ∩i∈I qi we immediately see that L has constant rank (2q , . . . , 2q ) and is therefore extended from some R-module M . Then add(M ) ∼ = 20 NICHOLAS R. BAETH AND ALFRED GEROLDINGER T  (q) ker(A(M ))∩N0 where A(M ) is an q × 2q+1 − 1 integer-valued matrix with columns ǫ1 · · · ǫq where either ǫi ∈ {0, 1} for all i ∈ [1, q] or ǫi ∈ {0, −1} for all i ∈ [1, q]. (q) Since the columns of A(M ) contain a basis for Z(q) , add(M ) ֒→ add(L) ∼ = N0 is a divisor theory with (q) ∼ class group C(add(M )) = Z , and this isomorphism maps the set of classes containing prime divisors onto o  o n n T  T ǫ1 · · · ǫq : ǫi ∈ {0, −1} \ 0 · · · 0 . : ǫi ∈ {0, 1} ∪ ǫ1 · · · ǫq Example 4.22. In this example we construct a monoid add(M ) which generalizes the monoid of Example 4.21 by including all vectors having entries in {−1, 0, 1} in the set GP . This larger set of classes containing prime divisors adds much complexity to the arithmetic. Suppose that R has q minimal primes and that b has 2q minimal primes R q(1,1) , q(1,2) , q(2,1) , . . . , q(q,2) where q(i,j) ∩ R = q(i′ ,j ′ ) ∩ R if and only if i = i′ . As in the previous example, let M L= ∅6=I⊂{(1,1),...,(q,2)} b R ∩(i,j)∈I q(i,j) . b From the symmetry of the set of ranks of the indecomposable cyclic R-modules 2q−1 b R ∩{i,j}∈I qi,j we immediately 2q−1 see that L has constant rank (2 ,...,2 ) and is therefore extended from some R-module M . Then (q) add(M ) ∼ = ker(A(M )) ∩ N0 where A(M ) is an q × 22q − 1 integer-valued matrix with columns of the  T form r(1,1) − r(1,2) r(2,1) − r(2,2) · · · r(q,1) − r(q,2) where (r(1,1) , r(1,2) , . . . , r(q,2) ) is the rank of one b of the 22q − 1 indecomposable cyclic R-modules — that is, any one of the q-tuples of 1s and 0s (not all T  0). In other words, the columns of A(M ) are exactly the 3q columns ǫ1 · · · ǫq where ǫi ∈ {−1, 0, 1} for all i ∈ [1, q], repeated with some multiplicity. For example, the column of all zeros occurs for each of b R b the indecomposable cyclic R-modules ∩(i,j)∈I q(i,j) where (i, 1) ∈ I if and only if (i, 2) ∈ I. (22q −1) is a divisor theory Since the columns of A(M ) contain a basis for Z(q) , add(M ) ֒→ add(L) ∼ = N0 (q) Z , and this isomorphism maps the set of classes containing prime divisors onto whose class group G ∼ = n o T ǫ1 · · · ǫq : ǫi ∈ {−1, 0, 1} . Example 4.23. In this example we consider add(M ) when the completion of M is isomorphic to a b direct sum of some (but not all) of the indecomposable cyclic R-modules. In this case, the example is constructed in such a way that B(GP ) is a direct product of non-trivial submonoids (see Lemma 3.2). b has 3q minimal primes Suppose that R has q minimal primes and that R  q(i,j) : i ∈ [1, q], j ∈ [1, 3] b where q(i,j) ∩ R = q(i′ ,j ′ ) ∩ R if and only if i = i′ . Let L be the R-module q  M    b (i,1) ⊕ R/q b (i,2) ⊕ R/q b (i,3) ⊕ R/ b q(i,1) ∩ q(i,2) ⊕ R/ b q(i,1) ∩ q(i,3) ⊕ R/ b q(i,2) ∩ q(i,3) . R/q i=1 We see immediately that L has constant rank (3, . . . , 3) and thus L is extended from some R-module M . (2q) Then add(M ) ∼ = ker(A(M )) ∩ N0 where A(M ) is an 2q × 6q integer-valued matrix with columns {e2k−1 , e2k , e2k−1 + e2k , −e2k−1 , −e2k , −e2k−1 − e2k : k ∈ [1, q]} where (e1 , . . . , e2q ) denotes the canonical basis of Z(2q) . For k ∈ [1, q], we set Gk = {e2k−1 , e2k , e2k−1 +e2k , −e2k−1 , −e2k , −e2k−1 −e2k }. Then GP = ⊎k∈[1,q] Gk is the set of classes containing prime divisors and B(GP ) = B(G1 ) × · · · × B(Gq ). From Proposition 6.1 MONOIDS OF MODULES AND ARITHMETIC OF DIRECT-SUM DECOMPOSITIONS 21 we will see that B(Gk ) ֒→ F (Gk ) is a divisor theory, whence B(GP ) ֒→ F (GP ) and add(M ) ֒→ add(L) are divisor theories. The arithmetic of this monoid is studied in Proposition 6.12 and Corollary 6.15. Example 4.24. As in Example 4.23, suppose that R has q minimal primes and suppose that the comb of R has 3q minimal primes pletion R  q(i,j) : i ∈ [1, q], j ∈ [1, 3] b = S/(f ) where (S, n) is where q(i,j) ∩ R = q(i′ ,j ′ ) ∩ R if and only if i = i′ . Further suppose that R b (i,j) has infinite a regular Noetherian local ring of dimension two and where 0 6= f ∈ n and that R/q representation type for all pairs (i, j). By Proposition 4.13, for each k ∈ [1, q] there are indecomposable b finitely generated torsion-free R-modules Mk and Nk of ranks (r1,1 , . . . , rq,3 ) and (s1,1 , . . . , sq,3 ) where   0, i 6= k     0, i 6= k 3, i = k, j = 1 ri,j = 2, i = k, j ∈ [1, 2] and si,j = .   2, i = k, j = 2    0, i = k, j = 3  0, i = k, j = 3 Moreover, by Corollary 4.9, for each k ∈ [1, q] there are constant tk ≥ 2 and t′k ≥ 3 and indecomposable ′ ′ b finitely generated torsion-free R-modules Mk′ and Nk′ having ranks (r1,1 , . . . , rq,3 ) and (s′1,1 , . . . , s′q,3 ) where ′  tk , i 6= k     t′ − 3, i = k, j = 1 tk , i 6= k ′ k and s′i,j = ri,j = tk − 2, i = k, j ∈ [1, 2] . ′   t i = k, j = 2   k − 2,  tk , i = k, j = 3 ′ tk , i = k, j = 3 Let ! q M ′ ′ b b b b b L=R⊕ (Mk ⊕ Nk ⊕ Mk ⊕ Nk ) ⊕ R/(q(i,1) ∩ q(i,3) ) ⊕ R/(q(i,1) ∩ q(i,2) ) ⊕ R/q(i,2) ⊕ R/q(i,3) . k=1 (2q) Since L has constant rank, L is extended from an R-module M . Then add(M ) ∼ = ker(A(M )) ∩ N0 where A(M ) is an 2q × (8q + 1) integer-valued matrix with columns 0 and {e2k−1 , e2k , 2e2k , e2k−1 + 2e2k , −e2k−1 , −e2k , −2e2k , −e2k−1 − 2e2k : k ∈ [1, q]} where (e1 , . . . , e2q ) denotes the canonical basis of Z(2q) . For k ∈ [1, q], we set Gk = {e2k−1 , e2k , 2e2k , e2k−1 + 2e2k , −e2k−1 , −e2k , −2e2k , −e2k−1 − 2e2k }. Then GP = ⊎k∈[1,q] Gk is the set of classes containing prime divisors and B(GP ) = B(G1 ) × · · · × B(Gq ). From Proposition 6.1 we will see that B(Gk ) ֒→ F (Gk ) is a divisor theory, whence B(GP ) ֒→ F (GP ) and add(M ) ֒→ add(N ) are divisor theories. The arithmetic of this monoid is studied in Proposition 6.13 and Corollary 6.15. Example 4.25. In our final example we construct a tuple (G, GP ) which generalizes the monoid T (R) when R has finite representation type (see Theorem 4.12). The arithmetic of such Krull monoids is b has q + 1 minimal primes q1 , . . . , qq+1 , and studied in Theorem 6.4 and Corollary 6.10. Suppose that R set q+1     M b j b ∩i6=j qi ⊕ R/q . R/ L= j=1 Note that L has constant rank (q, . . . , q) and is hence extended from some R-module M . Then add(M ) ∼ = (q) ker(A(M )) ∩ N0 where A(M ) is an q × 2q integer-valued matrix with columns e1 , . . . , eq , e0 = e1 + e2 + · · · + eq , −e1 , . . . , −eq , −e0 . 22 NICHOLAS R. BAETH AND ALFRED GEROLDINGER (2q) By Proposition 6.1, add(M ) ֒→ add(L) ∼ = Z(q) , = N0 is a divisor theory with class group C(add(M )) ∼ and this isomorphism maps the set of classes containing prime divisors onto {e0 = e1 + · · · + eq , e1 , . . . , eq , −e0 , . . . , −eq }. 5. Monoids of modules: Class groups and distribution of prime divisors II In this section we investigate the characteristic of the Krull monoids T (R) and C(R) for two-dimensional Noetherian local Krull domains (see Theorem 5.4). We will show that, apart from a well-described exb ceptional case, their class groups are both isomorphic to the factor group C(R)/ι(C(R)), where ι : C(R) → b b C(R) is the natural homomorphism between the class groups of R and R. In a well-studied special case b is a hypersurface with finite representation type, this factor group is a finite where R is factorial and R cyclic group (see Theorem 5.5). This is in strong contrast to the results on one-dimensional rings in the previous section where all class groups are torsion-free. Let S be a Krull domain and let Iv∗ (S) denote the monoid of nonzero divisorial ideals. Then ϕ : S → ∗ Iv (S), defined by a 7→ aS, is a divisor theory. In this section we view C(S) as the class group of this specific divisor theory. First we give a classical result (see [13, Chapter VII, Section 4.7]). Lemma 5.1. Let S be a Noetherian Krull domain. One can associate to each finitely generated S-module M a class c(M ) ∈ C(S) in such a way that (1) If 0 → M ′ → M → M ′′ → 0 is an exact sequence of finitely generated S-modules, then c(M ) = c(M ′ ) + c(M ′′ ). (2) If I is a fractional ideal of S and Iv the divisorial ideal generated by I, then c(I) = c(Iv ). Note that if S is any Noetherian domain, every ideal of S is obviously an indecomposable finitely generated torsion-free S-module. If, in addition, the ring has dimension two, then we have the following stronger result. Lemma 5.2. Let S be a Noetherian local Krull domain of dimension two. (1) [21, Lemma 1.1 and Theorem 3.6] Every divisorial ideal of S is an indecomposable MCM S-module. (2) [60, Proposition 3] In addition, assume that the m-adic completion Sb of S is a Krull domain. Then b a finitely generated torsion-free S-module N is extended from an S-module if and only if c(N ) is in b the image of the natural homomorphism ι : C(S) → C(S). We now give a result on abstract Krull monoids which encapsulates the structure of the monoids of modules described in Theorem 5.4. Lemma 5.3. Let D = F (P) be a free abelian monoid, G an additive abelian group, ψ : D → G a homomorphism, and H = ψ −1 (0) ⊂ D. (1) If H ⊂ D is cofinal, then the inclusion H ֒→ D is a divisor homomorphism and ψ : D/H → ψ(D) ⊂ G given by ψ ([a]) = ψ(a) is an isomorphism. (2) The inclusion H ֒→ D is a divisor theory if and only if hψ(P)i = [ψ(P\{q})] for every q ∈ P. If this is the case, then ψ : D/H → ψ(D) is an isomorphism and, for every g ∈ ψ(D), the set P ∩ ψ −1 (g) −1 is the set of prime divisors in the class ψ (g). (3) If the restriction ψ |P : P → G of ψ to P is an epimorphism, then H ֒→ D is cofinal. Moreover, it is a divisor theory apart from the following exception: G = {0, g} and |P ∩ ψ −1 (g)| = 1 . If H ֒→ D is not a divisor theory, then H is factorial. MONOIDS OF MODULES AND ARITHMETIC OF DIRECT-SUM DECOMPOSITIONS 23 Proof. For the proofs of (1) and (2), see [37, Proposition 2.5.1]. We now consider the proof of (3). Let a ∈ D. Since ψ |P : P → G is an epimorphism, there exists p ∈ P ⊂ D such that ψ(p) = −ψ(a). Therefore ap ∈ H and the inclusion H ֒→ D is cofinal. In order to show that H ֒→ D is a divisor theory we distinguish three cases. First suppose that |G| = 1. Then |D/H| = 1, and hence H = D. Next suppose that |G| > 2. By (2) we must verify that ψ(q) ∈ [ψ(P\{q})] for every q ∈ P . Let q ∈ P. Since |G| > 2, there exist g1 , g2 ∈ G \ {0, ψ(q)} with ψ(q) = g1 + g2 . Since the restriction ψ |P : P → G is an epimorphism, there exist p1 , p2 ∈ P \ {q} with ψ(pi ) = gi for i ∈ [1, 2]. Therefore ψ(q) = g = g1 + g2 = ψ(p1 ) + ψ(p2 ) ∈ [ψ(P\{q})] . Finally, suppose that |G| = 2. Then H ֒→ D is a divisor theory if and only if hψ(P)i = [ψ(P\{q})] for every q ∈ P if and only if there exist distinct q1 , q2 ∈ P such that ψ(qi ) 6= 0 for i ∈ [1, 2]. Clearly, if q ∈ P is the unique element of P with ψ(q) 6= 0, then H is free abelian with basis P \ {q} ∪ {q 2 }.  We are now able to determine both the class group and the set of classes containing prime divisors for the monoids T (R) and C(R). This generalizes and refines the results of [4]. Since each divisorial ideal over a two-dimensional local ring is MCM and thus finitely generated and torsion-free, Theorem 5.4 can be stated in parallel both for T (R) and C(R). Theorem 5.4. Let (R, m) be a Noetherian local Krull domain of dimension two whose m-adic completion b is also a Krull domain. Let V(R) (respectively V(R)) b denote either T (R) (resp. T (R)) b or C(R) (resp. R b b C(R)), and let ι : C(R) → C(R) be the natural map. b is a cofinal divisor homomorphism. The class group of this divisor ho(1) The embedding V(R) ֒→ V(R) b momorphism is isomorphic to G = C(R)/ι(C(R)) and every class contains a prime divisor. Moreover b satisfies the following condition: the embedding is a divisor theory except if R b (E) |G| = 2 and, up to isomorphism, there is precisely one non-extended indecomposable R-module b M with [M ] ∈ V(R). b satisfies (E). In particular, V(R) satisfies KRSA if and only if either |G| = 1 or R b b (2) Suppose that the embeddings T (R) ֒→ T (R) and C(R) ֒→ C(R) are both divisor theories. Then their class groups are isomorphic. If (G, (mg )g∈G ) is the characteristic P of T (R) and (G, (ng )g∈G ) is the characteristic of C(R), then mg ≥ ng for all g ∈ G. Moreover, g∈G mg infinite. b By (1) of Lemma 5.1 there is a homomorphism Proof. We set D = F (P) = V(R). b → C(R)/ι(C(R)) b ψ : V(R) =G given by [M ] 7→ c(M ) + ι(C(R)) . b is an indecomposable MCM R-module. b By (1) of Lemma 5.2, every divisorial ideal of R That is, the class b b b of each divisorial ideal of R in C(R) is the image of some [M ] ∈ V(R), where M is an indecomposable MCM b b R-module. In other words, ψ restricted to P = A(D) is an epimorphism and ψ(A(D)) = C(R)/ι(C(R)). −1 By Lemma 5.3, the inclusion H = ψ (0) ⊂ D is a cofinal divisor homomorphism. By (2) of Lemma b and thus the embedding V(R) ֒→ V(R) b is a divisor 5.2, H is the image of the embedding V(R) ֒→ V(R), theory if and only if the inclusion H ֒→ D is a divisor theory. By Lemma 5.3 this always holds apart from the described Exception (E). A Krull monoid is factorial if and only if its class group is trivial. Thus, if b is a divisor theory then KRSA holds for V(R) if and only if |G| = 0. If V(R) ֒→ V(R) b is V(R) ֒→ V(R) not a divisor theory, then the inclusion H ֒→ D is not a divisor theory. By Lemma 5.3, H is factorial, whence V(R) is factorial. Since each MCM R-module is finitely generated and torsion-free, it is clear that mg ≥ ng for each g ∈ G. From [11] we know that there infinitely many nonisomorphic indecomposable finitely generated P b  torsion-free R-modules, and therefore g∈G mg infinite. 24 NICHOLAS R. BAETH AND ALFRED GEROLDINGER Let • • R be as in the above theorem and assume in addition that R contains a field and k = R/m is algebraically closed with characteristic zero. b is a hypersurface i.e., R b is isomorphic to a three-dimensional regular Noetherian local ring R modulo a regular element. • R has finite representation type. Such rings were classified in [15] and [52] and are given, up to isomorphism, in Table 1. Note that since b has finite representation type and each divisorial ideal of R b is and indecomposable MCM R-module, b R b C(R) and hence C(R) is finite. Table 1: Two-dimensional Rings with Finite Representation Type (An ) (Dn ) (E6 ) (E7 ) (E8 ) k[[x, y, z]]/(x2 + y 2 + z n+1 ) n≥1 k[[x, y, z]]/(x2 z + y 2 + z n−1 ) n ≥ 4 k[[x, y, z]]/(x3 + y 2 + z 4 ) k[[x, y, z]]/(x3 + xz 3 + y 2 ) k[[x, y, z]]/(x2 + y 3 + z 5 ) An amazing theorem of Heitmann [48] gives the existence of a local factorial domain whose completion is a ring as in Table 1. In this situation we can determine the characteristic of C(R). b isomorphic Theorem 5.5. Let (R, m) be a Noetherian local factorial domain with m-adic completion R to a ring in Table 1. b is a ring of type (An ), then C(C(R)) is cyclic of order n + 1 and each class contains exactly one (1) If R prime divisor. b is a ring of type (Dn ). (2) Suppose R (a) If n is even, then C(C(R)) ∼ = C2 ⊕ C2 . The trivial class contains n2 prime divisors. Two nontrivial classes each contain a single prime divisor and their sum contains n−2 2 prime divisors. (b) If n is odd, then C(C(R)) is cyclic of order four. The classes of order four each contain a single prime. The remaining classes each contain n−1 2 prime divisors. b is a ring of type (E6 ), then C(C(R)) is cyclic of order three. The trivial class contains three (3) If R prime divisors, while each remaining class contains two prime divisors. b is a ring of type (E7 ), then C(C(R)) is cyclic of order two. The trivial class contains five prime (4) If R divisors and the non-trivial class contains three prime divisors. b is a ring of type (E8 ), then C(C(R)) is trivial, with the trivial class containing all nine prime (5) If R divisors. b for R b a ring listed in Table 1 were given in [14]. Since R is factorial, Proof. The class groups C(R) b Following the proof of [4, Theorem 4.3] one can C(R) = 0 and by Theorem 5.4, C(C(R)) ∼ = C(R). b b by using the Auslander-Reiten sequence for compute the class of each indecomposable R-module in C(R) b The result follows by considering the map ψ defined in the proof of Theorem 5.4. R.  The above theorem completely determines the characteristic of the monoid C(R). With this information, in addition to being able to completely describe the arithmetic of C(R) as we do in Theorem 6.8, we can easily enumerate the atoms of C(R) (the nonisomorphic indecomposable MCM modules). We now illustrate this ability with an example. If β : C(R) → B(GP ) is the transfer homomorphism of Lemma b is a ring of type (Dn ) with n even. Then R b has 3.4, then A(C(R)) = β −1 (A(B(GP )). Suppose that R exactly n + 1 nonisomorphic indecomposable MCM modules. If C2 ⊕ C2 = {0, e1 , e2 , e1 + e2 }, then A(C2 ⊕ C2 ) = {0, e21 , e22 , (e1 + e2 )2 , e1 e2 (e1 + e2 )} , MONOIDS OF MODULES AND ARITHMETIC OF DIRECT-SUM DECOMPOSITIONS 25 and hence R has exactly n n−2 n−2 n−2 n2 + 8 +1·1+1·1+ · +1·1· = 2 2 2 2 4 nonisomorphic indecomposable MCM modules. |A(C(R))| = We conclude this section by noting that a two-dimensional local Krull domain (R, m) having completion isomorphic to a ring in Table 1 may not be factorial. However, Theorem 5.4 implies that C(C(R)) is a factor group of a group given in Theorem 5.5. In particular, C(C(R)) is a finite cyclic group such that every class contains a prime divisor, and thus the arithmetic of C(R) is described in Theorem 6.8. 6. The arithmetic of monoids of modules In this section we study the arithmetic of the Krull monoids that have been discussed in Sections 4 and 5. Thus, using the transfer properties presented in Section 2, we describe the arithmetic of directsum decompositions of modules. Suppose that H is a Krull monoid having a divisor homomorphism ϕ : H → F (P) and let GP ⊂ C(ϕ) be the set of classes containing prime divisors. The first subsection deals with quite general sets GP and provides results on the finiteness or non-finiteness of various arithmetical parameters. The second subsection studies three specific sets GP , provides explicit results on arithmetical parameters, and establishes a characterization result (Theorems 6.4, 6.7, 6.8, and Corollary 6.10) . The third subsection completely determines the system of sets of lengths in case of small subsets GP . It shows that small subsets in torsion groups and in torsion-free groups can have the same systems of sets of lengths, and it reveals natural limits for arithmetical characterization results (Corollary 6.15). 6.1. General sets GP of classes containing prime divisors. In this subsection we consider the algebraic and arithmetic structure of Krull monoids with respect to GP . We will often assume that GP = −GP , a property which has a strong influence on the arithmetic of H. Recall that GP = −GP holds in many of the (finite and infinite representation type) module-theoretic contexts described in Sections 4 and 5. More generally, all configurations (G, GP ) occur for certain monoids of modules (see Proposition 4.18, [49], and [56, Chapter 1]) and, by Claborn’s Realization Theorem, all configurations (G, GP ) occur for Dedekind domains (see [37, Theorem 3.7.8]). In addition, every abelian group can be realized as the class group of a Dedekind domain which is a quadratic extension of a principal ideal domain, and in this case we have GP = −GP (see [55]). Proposition 6.1. Let H be a Krull monoid, ϕ : H → F (P) a divisor homomorphism with class group G = C(ϕ), and let GP ⊂ G denote the set of classes containing prime divisors. (1) If GP is finite, then A(GP ) is finite and hence D(GP ) < ∞. If G has finite total rank, then GP is finite if and only if A(GP ) is finite if and only if D(GP ) < ∞. (2) If GP = −GP , then [GP ] = G. Moreover, the map ϕ : H → D and the inclusion B(GP ) ֒→ F (GP ) are both cofinal. (3) Suppose that G is infinite cyclic, say G = hei, and that {−e, e} ⊂ GP . Then B(GP ) ֒→ F (GP ) is a divisor theory if and only if there exist k, l ∈ N≥2 such that −ke, le ∈ GP . (4) Let r, α ∈ N with r + α > 2. Let (e1 , . . . , er ) ∈ GrP be independent and let e0 ∈ GP such that αe0 = e1 + · · · + er , {−e0 , . . . , −er } ⊂ GP , and he0 , . . . , er i = G. (a) The map ϕ : H → F (P) and the inclusion B(GP ) ֒→ F (GP ) are divisor theories with class group isomorphic to G. (b) If 0 ∈ / GP , then B(GP ) is not a direct product of nontrivial submonoids. 26 NICHOLAS R. BAETH AND ALFRED GEROLDINGER Proof. (1) follows from [37, Theorem 3.4.2]. If GP = −GP , then [GP ] = hGP i = G. By Lemma 3.4, (2) follows once we verify that ϕ is cofinal. If p ∈ P, then there is a q ∈ P with q ∈ −[p], whence there is an a ∈ H with ϕ(a) = pq, and so ϕ is cofinal. If {−ke : k ∈ N} ∩ GP = {−e} or {ke : k ∈ N} ∩ GP = {e}, then B(GP ) is factorial. Since F (GP ) 6= B(GP ), the inclusion B(GP ) ֒→ F (GP ) is not a divisor theory. Conversely, suppose that there exist  m k m k, l ∈ N≥2 such that −ke, le ∈ GP . Let m ∈ N. If me ∈ GP , then me = gcd (me)(−e) , (me) (−ke) ,  m l m and if −me ∈ GP , then −me = gcd (−me)e , (−me) (le) . Thus every element of GP is a greatest common divisor of a finite set of elements from B(GP ) and hence B(GP ) ֒→ F (GP ) is a divisor theory. We now suppose that G and GP are as in (4). To prove (a) it is sufficient to show that B(GP ) ֒→ F (GP ) is a divisor theory. By [37, Proposition 2.5.6] we need only verify that hGP i = [GP \ {g}] for every g ∈ GP . Let g ∈ G. We will show that [GP \ {g}] = [GP ] = [e0 , . . . , er , −e0 , . . . , −er ]. If g∈ / {e0 , . . . , er , −e0 , . . . , −er }, the assertion is clear. By symmetry it suffices to consider the case where g ∈ {e0 , . . . , er }. If g = ei for some i ∈ [1, r], then ei = αe0 +(−e1 )+· · ·+(−ei−1 )+(−ei+1 )+· · ·+(−er ) ∈ [{±eν : ν ∈ [0, r] \ {i}], and hence [GP \ {g}] ⊃ [{±eν : ν ∈ [0, r] \ {i}}] = [±e0 , . . . , ±er ] = G. If g = e0 , then e0 = e1 + · · · + er + (α − 1)(−e0 ) ∈ [GP \ {e0 }], and hence [GP \ {g}] = [GP ] = G. To prove (b) we use Lemma 3.2 and suppose that 0 ∈ / GP with GP = G1 ⊎ G2 such that A(GP ) = A(G1 ) ⊎ A(G2 ). We must show that either G1 or G2 is empty. Suppose that V = e1 · . . . · er (−e0 )α ∈ A(G1 ). Since (−e0 )e0 , . . . , (−er )er ∈ A(GP ), it follows that {±e0 , . . . , ±er } ⊂ G1 . Let g ∈ GP . Since GP ⊂ G = [±e0 , . . . , ±er ], there exists U ∈ A(GP ) such that g ∈ supp(U ) ⊂ {g, ±e0 , . . . , ±er }, and hence g ∈ G1 . Thus G1 = GP and G2 = ∅.  For our characterization results, we need to recall the concept of an absolutely irreducible element, a classical notion in algebraic number theory. An element u in an atomic monoid H is called absolutely irreducible if u ∈ A(H) and |Z(un )| = 1 for all n ∈ N; equivalently, the divisor-closed submonoid of H generated by u is factorial. Suppose that H ֒→ F (P) is a divisor theory with class group G and that u = pk11 · . . . · pkmm where m, k1 , . . . , km ∈ N and where p1 , . . . , pm ∈ P are pairwise distinct. Then u is absolutely irreducible. if and only if (k1 , . . . , km ) is a minimal element of the set Γ = {(s1 , . . . , sm ) ∈ Nl0 : ps11 · . . . · psmm ∈ H} \ {0} with respect to the usual product ordering, and the torsion-free rank of h[p1 ], . . . , [pm ]i in G is m − 1 (see ord([p1 ]) is absolutely irreducible, [37, Proposition 7.1.4]). In particular, if [p1 ] ∈ G has finite order, then p1 and if [p1 ] ∈ G has infinite order, then p1 q1 is absolutely irreducible for all q1 ∈ P ∩ (−[p1 ]). Proposition 6.2. Let H be a Krull monoid, ϕ : H → F (P) a cofinal divisor homomorphism with class group G, and let GP ⊂ G denote the set of classes containing prime divisors. (1) Suppose that GP is infinite. (a) If GP has an infinite subset G0 such that G0 ∪ (−G0 ) ⊂ GP and hG0 i has finite total rank, then Uk (H) is infinite for each k ≥ 2. Moreover, D(GP ) = ρk (H) = ω(H) = t(H) = ∞. (b) If there exists e ∈ G such that both GP ∩ {ke : k ∈ N} and GP ∩ {−ke : k ∈ N} are infinite, then ∆(H) is infinite and c(H) = cmon (H) = ∞. (c) If GP contains an infinite group, then every finite subset L ⊂ N≥2 occurs as a set of lengths. (2) Suppose that GP is finite and that H is not factorial. (a) The set ∆(H) is finite and there is a constant M1 ∈ N such that every set of lengths is an AAMP with difference d ∈ ∆∗ (H) and bound M1 . (b) There is a constant M2 ∈ N such that, for every k ≥ 2, the set Uk (H) is an AAMP with period {0, min ∆(H)} and bound M2 . (c) c(H) ≤ ω(H) ≤ t(H) ≤ 1 + cmon (H) < |G•P | 2 D(GP )(D(GP )−1) 2 +2 and |G• |+1 (2|G•P | + 2)(|G•P | + 2)(D(GP ) + 1) P . MONOIDS OF MODULES AND ARITHMETIC OF DIRECT-SUM DECOMPOSITIONS 27 (d) Suppose that GP = −GP . Then ω(H) = D(GP ), ρ(H) = D(GP )/2, ρ2k (H) = kD(GP ) < ∞, and λkD(GP )+j (H) = 2k + j for all k ∈ N and j ∈ [0, 1]. If G is torsion-free, then D(GP ) is the maximal number s of absolutely irreducible atoms u1 , . . . , us such that 2 ∈ L(u1 · . . . · us ). (e) If, in particular, GP = −GP and D(GP ) = 2, then Uk (H) = {k} for all k ∈ N and cmon (H) = c(H) = ω(H) = t(H) = 2. Proof. Throughout the proof we implicitly assume the results of Lemma 2.2 and of Lemma 3.4. In particular, we have ρ(H) ≤ ω(H) and c(H) ≤ ω(H) ≤ D(GP ). For (1), suppose that GP is infinite. We first prove (a). Theorem 3.4.2 in [37] implies that A(G0 ) and  D(G0 ) are infinite. Thus, for every k ∈ N, there is Uk ∈ A(G0 ) with |Uk | ≥ k and hence L Uk (−Uk ) ⊃ {2, |Uk |}. This implies that U2 (G0 ) is infinite and thus Uk (G0 ) is infinite for all k ≥ 2. Therefore ρk (H) = ρk (GP ) = ∞ for all k ≥ 2 and, since ρ(H) ≤ ω(H) ≤ t(H), each of these invariants is infinite. (b) follows from [36, Theorem 4.2]. (c) is a realization result is due to Kainrath. See [50] or [37, Theorem 7.4.1]. Now, in order to prove (2), we suppose that GP is finite and that H is not factorial. Then D(GP ) > 1 and 2 ≤ c(H) ≤ ω(H) ≤ t(H). By Proposition 6.1, B(GP ) is finitely generated and D(GP ) < ∞. The respective upper bounds given in (c) for cmon (H) and t(H) can be found in [41, Theorem 3.4] and [37, Theorem 3.4.10]. We now consider (a). Since 2 + sup ∆(H) ≤ c(H) < ∞, (c) implies that ∆(H) is finite. Since B(GP ) is finitely generated, the assertion on the structure of sets of lengths follows from [37, Theorem 4.4.11]. Since t(H) < ∞ and ∆(H) is finite, [32, Theorems 3.5 and 4.2] imply the assertion in (b) on the structure of the unions of sets of lengths. In order to prove (d), we suppose that GP = −GP . The statements about ρ2k (H), ρ(H), and λkD(GP )+j (H) follow from Lemma 3.3, and it remains to show that ω(H) = D(GP ). We have ω(H) ≤ D(GP ) < ∞. If D(GP ) = 2, then ω(H) = D(GP ). Suppose that D(GP ) ≥ 3. If V = g1 · . . . · gl ∈ A(GP ) with |V | = l = D(GP ) and Ui = (−gi )gi for all i ∈ [1, l], then V | U1 · . . . · Ul but yet V divides no proper subproduct of U1 · . . . · Ul . Thus D(GP ) ≤ ω(GP ) ≤ ω(H). Let t denote the maximal number of absolutely irreducible atoms with the required property. Since ρ(H) = D(GP )/2, it follows that t ≤ D(GP ). Let V = g1 · . . . · gl ∈ A(GP ) with |V | = l = D(GP ). For i ∈ [1, l] choose an element pi ∈ P ∩ gi and an element qi ∈ P ∩ (−gi ). Since G is torsion-free, the element ui = pi qi ∈ H is absolutely irreducible for each i ∈ [1, l] and, by construction, we have 2 ∈ L(u1 · . . . · ul ). The statement in (e) follows immediately from (c) and (d).  Let all notation be as in Proposition 6.2. We note that if GP is infinite but without a subset G0 as in (1a), then none of the conclusions of (1a) need hold. A careful analysis of the case where G is an infinite cyclic groups is handled in [36]. We also note that the description of the structure of sets of lengths given in (2a) is best possible (see [64]). By Lemma 3.4, many arithmetical phenomena of a Krull monoid H are determined by the tuple (G, GP ). We now provide a first result indicating that conversely arithmetical phenomena give us back information on the class group. Indeed, our next corollary characterizes arithmetically whether the class group of a Krull monoid is torsion-free or not. To do so we must study the arithmetical behavior of elements similar to absolutely irreducible elements. Note that such a result cannot be accomplished via sets of lengths alone (see Propositions 6.12 and 6.13 and (1c) of Proposition 6.2; in fact, there is an open conjecture that every abelian group is the class group of a half-factorial Krull monoid [35]). Proposition 6.3. Let H be a Krull monoid with class group G. Then G has an element of infinite order if and only if there exists an irreducible element u ∈ H having the following two arithmetical properties. (a) Whenever there are v ∈ H \ H × and m ∈ N with v | um , then u | v n for some n ∈ N. N for each (b) There exist l ≥ 2 and a1 , . . . , al ∈ H such that u | a1 · . . . · al but yet u ∤ a−1 ν (a1 · . . . · al ) ν ∈ [1, l] and for every N ∈ N. 28 NICHOLAS R. BAETH AND ALFRED GEROLDINGER Proof. We may assume that H is reduced. Consider a divisor theory H ֒→ F (P) and denote by GP ⊂ G the set of classes containing prime divisors. First suppose that G is a torsion group and let u ∈ A(H) have Property (a). Then u = pk11 · . . . · pkmm for some m, k1 , . . . , km ∈ N and pairwise distinct elements p1 , . . . , pm ∈ P. Then (a) implies that k = 1 and hence u is absolutely irreducible. Thus Property (b) cannot hold for any l ≥ 2. Conversely, suppose that G is not a torsion group. Since [GP ] = G there exists a p ∈ P such that [p] ∈ G has infinite order, and there is an element u′ ∈ A(H) with p | u′ . Suppose that u′ = p1 · . . . · pn · q1 · . . . · qr , where p = p1 , p2 , . . . , pn , q1 , . . . , qr ∈ P, [p1 ], . . . , [pn ] have infinite order, and [q1 ], . . . , [qr ] have finite order each of which divides some integer N . Then (q1 · . . . · qr )N ∈ H, whence (p1 · . . . · pn )N ∈ H. After a possible reordering there is an atom u = pk11 · . . . · pkmm ∈ A(H) dividing a power of (p1 · . . . · pn )N such that there is no atom v ∈ A(H) with suppP (v) ( {p1 , . . . , pm }. Thus u satisfies Property (a). Since km−1 H ֒→ F (P) is a divisor theory, there exist b1 , . . . , bs ∈ H such that pk11 · . . . · pm−1 = gcd(b1 , . . . , bs ). Hence there is an i ∈ [1, s], say i = 1, such that pm ∤ b1 . Similarly, there are c1 , . . . , ct ∈ H such that pkmm = gcd(c1 , . . . , ct ). Without loss of generality, there exists i ∈ [1, m − 1] such that pi ∤ c1 . Therefore N u | b1 c1 , but yet u ∤ bN  1 and u ∤ c1 for any N ∈ N, and so Property (b) is satisfied. Propositions 6.1, 6.2, and 6.3 provide abstract finiteness and non-finiteness results. To obtain more precise information on the arithmetical invariants, we require specific information on GP . In the next subsection we will use such specific information to give more concrete results. 6.2. Specific sets GP of classes containing prime divisors and arithmetical characterizations. We now provide an in-depth study of the arithmetic of three classes of Krull monoids studied in Sections 4 and 5. Theorem 6.4 describes the arithmetic of the monoids discussed in Examples 4.12, 4.20, 4.25 and in Theorem 4.12. Its arithmetic is simple enough that we can more or less give a complete description. Theorem 6.4. Let H be a Krull monoid with class group G and suppose that GP = {e0 , . . . , er , −e0 , . . . , −er } ⊂ G is the set of classes containing prime divisors, where r, α ∈ N with r + α > 2 and (e1 , . . . , er ) is an independent family of elements each having infinite order such that e1 + · · · + er = αe0 . Then: (1) A(GP ) = {V, −V, Uν : ν ∈ [0, r]}, where V = (−e0 )α e1 · . . . · er and Uν = (−eν )eν for all ν ∈ [0, r]. In particular, D(GP ) = r + α. (2) Suppose that r Y eki i (−ei )li ∈ F (GP ) , S= i=0 where k0 , l0 , . . . , kr , lr ∈ N0 . Then S ∈ B(GP ) if and only if li = α−1 (k0 − l0 ) + ki for all i ∈ [1, r]. If S ∈ B(GP ) with k0 ≥ l0 and k ∗ = min{k1 , . . . , kr }, then r o n Y −1 Uiki −ν : ν ∈ [0, min{α−1 l0 , k ∗ }] Z(S) = V ν (−V )α (k0 −l0 )+ν U0l0 −αν i=1 and L(S) = {α−1 (k0 − l0 ) + l0 + k1 + · · · + kr − (r + α − 2)ν : ν ∈ [0, min{α−1 l0 , k ∗ }] } . (3) The system of sets of lengths of H can be described as follows. (a) ∆(H) = {r + α − 2}. (b) ρ(H) = D(GP )/2. (c) For each k ∈ N, the set Uk (H) is an arithmetical progression with difference r + α − 2. MONOIDS OF MODULES AND ARITHMETIC OF DIRECT-SUM DECOMPOSITIONS 29 (d) For each k ∈ N and each j ∈ [0, 1], ρ2k+j (H) = kD(GP ) + j. (e) For each l ∈ N0 , λlD(GP )+j (H) = 2l + j whenever j ∈ [0, D(GP ) − 1] and lD(GP ) + j ≥ 1. (f ) Finally, o n L(H) = m + {2k ∗ + (r + α − 2)λ : λ ∈ [0, k ∗ ]} : m, k ∗ ∈ N0 . (4) c(H) = cmon (H) = ω(H) = t(H) = D(GP ) = r + α. Proof. By Lemma 3.4, all assertions on lengths of factorizations and on catenary degrees can be proved working in B(GP ) instead of H. Obviously, {Uν : ν ∈ [0, r]} ⊂ A(GP ) and to prove (1) it remains to verify that if W ∈ A(GP ) with W 6= Uν , then W = V . Note that e0 ∈ he1 , . . . , er i but that he0 i ∩ hei : i ∈ Ii = {0} for any proper subset I ( [1, r]. Thus, if Y W = eki i (−e0 )k0 ∈ A(GP ) \ {Uν : ν ∈ [0, r]} , i∈I P where ∅ 6= I ⊂ [1, r] and k0 , ki ∈ N for all i ∈ I, then k0 e0 = i∈I ki ei ∈ hei : i ∈ Ii and hence I = [1, r]. Assume to the contrary that there is i ∈ [1, r] such that ki > 1. Since V ∈ B(GP ) and W ∈ A(GP ), it follows that k0 ∈ [1, α − 1]. Then 0 6= (k1 − 1)e1 + · · · + (kr − 1)er = (k0 − α)e0 ∈ [e1 , . . . , er ] ∩ [−e1 , . . . , −er ] = {0} , a contradiction. Thus k1 = · · · = kr = 1 and we obtain that k0 = α, whence W = V ∈ A(GP ). To prove (2), suppose that S ∈ B(GP ) and that l0 ≥ k0 . Then S ′ = (−e0 )l0 −k0 r Y eki i (−ei )li ∈ B(GP ) , i=1 whence l0 − k0 = αm0 ∈ αN0 , S ′′ = Qr ki −m0 (−ei )li i=1 ei ∈ B(GP ), and l0 − k0 k0 − l0 = + ki for each i ∈ [1, r] . α α The same holds true if l0 ≤ k0 . Conversely, if l1 , . . . , lr satisfy the asserted equations, then obviously σ(S) = 0. Suppose that S ∈ B(GP ) and that k0 ≥ l0 . Then li = ki − m0 = ki − S = ek00 (−e0 )l0 r Y −1 eki i (−ei )ki +α (k0 −l0 ) i=1 = (−e0 )e0 = (−e0 )e0 l0 r ki α−1 (k0 −l0 ) Y (−ei )ei e0 α (−e1 ) · . . . · (−er ) i=1 l0 −αν −1 = U0l0 −αν (−V )α α e0 α (−e1 ) · . . . · (−er ) −1 (k0 −l0 )+ν Vν r Y (k0 −l0 )+ν (−e0 )α e1 · . . . · er r ν Y (−ei )ei i=1 ki −ν Uiki −ν i=1 −1 for each ν ∈ [0, min{α ∗ l0 , k }]. Therefore Z(S) and hence L(S) have the given forms. We now consider the statements of (3). The assertion on ∆(GP ) follows immediately from (2). Since ∆(GP ) = {r + α − 2}, all sets Uk (GP ) are arithmetical progressions with difference r + α − 2. The assertion on each ρ2k (GP ) and each ρ(GP ) follow from Proposition 6.2. 30 NICHOLAS R. BAETH AND ALFRED GEROLDINGER In order to determine L(GP ), let S ∈ B(GP ) be given with all parameters as in (2). First suppose that l0 ≥ αk ∗ . Then L(S) = (α−1 (k0 − l0 ) + l0 + k1 + · · · + kr ) − (r + α)k ∗ + {(r + α)k ∗ − (r + α − 2)ν : ν ∈ [0, k ∗ ]} = (α−1 (k0 − l0 ) + l0 + k1 + · · · + kr ) − (r + α)k ∗ + {2k ∗ + (r + α − 2)λ : λ ∈ [0, k ∗ ]} . Thus L(S) has the form L(S) = m + {2k ∗ + (r + α − 2)λ : λ ∈ [0, k ∗ ]} for some m, k ∗ ∈ N0 . Conversely, for every choice of m, k ∗ ∈ N0 , there is an S ∈ B(GP ) such that L(S) has the given form. Now suppose that l0 ≤ αk ∗ − 1 and set m0 = ⌊ lα0 ⌋. Then L(S) = (α−1 (k0 − l0 ) + l0 + k1 + · · · + kr ) − (r + α)m0 + {(r + α)m0 − (r + α − 2)ν : ν ∈ [0, m0 ]} = (α−1 (k0 − l0 ) + l0 + k1 + · · · + kr ) − (r + α)m0 + {2m0 + (r + α − 2)λ : λ ∈ [0, m0 ]} , and hence L(S) has the form L(S) = m + {2m0 + (r + α − 2)λ : λ ∈ [0, m0 ]} for some m ∈ N and m0 ∈ N0 . Next we verify that, for every k ∈ N, ρ2k+1 (GP ) ≤ kD(GP ) + 1. By [37, Proposition 1.4.2], for all k ∈ N, ρk (GP ) = sup{sup L : L ∈ L(GP ), k = min L}. Thus we may choose k ∈ N and L ∈ L(GP ) with min L = 2k + 1. Then, there exist l, m, k ∗ ∈ N0 such that L = m + {2k ∗ + (r + α − 2)λ : λ ∈ [0, k ∗ ]} with m = 2l + 1 and 2k + 1 = min L = 2(k ∗ + l) + 1. Now max L = m + (r + α)k ∗ = 2l + 1 + (r + α)(k − l) = (r + α)k + 1 − (r + α − 2)l ≤ kD(GP ) + 1 , and thus ρ2k+1 (GP ) ≤ kD(GP ) + 1. It remains to verify the assertions on the λlD(GP )+j (GP ). Let l ∈ N0 and j ∈ [0, D(GP ) − 1]. Then Lemma 3.3 implies λlD(Gp )+j (GP ) ≤ 2l + j, and that equality holds if j ∈ [0, 1]. It remains to verify that λlD(Gp )+j (GP ) ≥ 2l + j when j ∈ [2, D(GP ) − 1]. Let L ∈ L(GP ) with lD(GP ) + j ∈ L. Then there exist m, k ∗ ∈ N0 such that L = m + {2k ∗ + (r + α − 2)λ : λ ∈ [0, k ∗ ]} = m + k ∗ D(GP ) − {(D(GP ) − 2)ν : ν ∈ [0, k ∗ ]} . Suppose lD(GP ) + j = max L − ν(D(GP ) − 2) = m + k ∗ D(GP ) − ν(D(GP ) − 2) for some ν ∈ [0, k ∗ ]. Then j ≡ m + 2ν mod D(GP ) and hence m + 2ν ≥ j. This implies (k ∗ − ν)D(GP ) + j ≤ m + k ∗ D(GP ) − ν(D(GP ) − 2) = lD(GP ) + j , and hence l ≥ k ∗ − ν. Therefore we obtain min L = lD(GP ) + j − (k ∗ − ν)(D(GP ) − 2) = (l − k ∗ + ν)D(GP ) + j + 2(k ∗ − ν) ≥ 2l + j , and thus λlD(Gp )+j (GP ) ≥ 2l + j. Finally we consider the catenary degrees of H and prove the statements given in (4). Using Proposition 6.2 we infer D(GP ) = r + α = 2 + max ∆(GP ) ≤ c(GP ) = c(H) ≤ ω(H) ≤ t(H) . Since c(GP ) ≤ cmon (GP ), it remains to show that cmon (GP ) ≤ D(GP ) and that t(H) ≤ D(GP ). We proceed in two steps. First we verify that cmon (GP ) = max{ceq (GP ), cadj (GP )} ≤ r + α. Since A(∼B(GP ),eq ) = {(−V, −V ), (V, V ), (Uν , Uν ), (−Uν , −Uν ) : ν ∈ [0, r]} , it follows that ceq (GP ) = 0. If Ar+α−2 = {x ∈ Z(GP ) : |x| − (r + α − 2) ∈ L(π(x))}, then Min(Ar+α−2 ) = {U0α U1 · . . . · Ur }, and hence cadj (GP ) ≤ r + α by Lemma 2.1. In order to show that t(H) ≤ D(GP ), we must verify the following assertion (see [38, Theorem 3.6]). MONOIDS OF MODULES AND ARITHMETIC OF DIRECT-SUM DECOMPOSITIONS 31 (A) Let j ∈ N and w, w1 , . . . , wj ∈ A(H) such that w divides the product w1 · . . . · wj but yet w divides no proper subproduct of w1 · . . . · wj . Then min L(w−1 w1 · . . . · wj ) ≤ D(GP ) − 1. Proof of (A). We use the transfer homomorphism β : H → B(GP ) as defined in Lemma 3.4. Set W = β(w) and Wi = β(wi ) for each i ∈ [1, j]. Then j ≤ |W | and W, W1 , . . . , Wj ∈ A(GP ). Clearly min L(w−1 w1 · . . . · wj ) ≤ max L(W −1 W1 · . . . · Wj ) ≤ |W1 · . . . · Wj | − |W | . 2 Thus, if |W | = 2, then |W1 | + |W2 | − |W | ≤ D(GP ) − 1 . 2 It remains to consider the case W ∈ {−V, V }, and by symmetry we may suppose that W = V . If |W1 | = · · · = |Wj | = 2, then j = |V | and w−1 w1 · . . . · wj ∈ A(H). Suppose there is ν ∈ [1, j], say ν = 1, such that β(w1 ) ∈ {−V, V }. Since w does not divide a subproduct of w1 · . . . · wj and gcd(V, −V ) = 1, it follows that β(w1 ) = V . Then L(w−1 w1 · . . . · wj ) = L(W −1 W1 · . . . · Wj ) = L(W2 · . . . · Wj ) and hence min L(w−1 w1 · . . . · wj ) ≤ min L(w−1 w1 · . . . · wj ) ≤ j − 1 ≤ |V | − 1 = D(GP ) − 1 .  The next corollary again reveals that certain arithmetical phenomena characterize certain algebraic properties of the class group. Corollary 6.5. Let H be a Krull monoid as in Theorem 6.4 with class group G and set GP of classes containing prime divisors. Then r + 1 is the minimum of all s ∈ N having the following property : (P) There are absolutely irreducible elements w1 , . . . , ws ∈ A(H) such that 2, D(GP ) ∈ L(w1k1 · . . . · wsks ) for some (k1 , . . . , ks ) ∈ Ns0 . Proof. First we verify that r + 1 satisfies property (P). For i ∈ [0, s], let pi ∈ P ∩ ei and qi ∈ P ∩ (−ei ) and set wi = pi qi . Then w0 , . . . , ws are absolutely irreducible elements and, by Theorem 6.4, it follows that 2, D(GP ) ∈ L(w0α w1 · . . . · wr ). Conversely, let s ∈ N, and let w1 , . . . , ws and k1 , . . . , ks be as above. For i ∈ [1, s], we set Wi = β(wi ). Ps Since ρ(GP ) = D(GP )/2 and 2, D(GP ) ∈ L(W1k1 · . . . · Wsks ), it follows that i=1 ki |Wi | = D(GP ), k1 |W1 | = · · · = |Ws | = 2, Wi = (−gi )gi for i ∈ [1, s], and that S = g1 · . . . · gsks ∈ A(GP ). Now Theorem 6.4 implies S = (−e0 )α e1 · . . . · er , whence {W1 , . . . , Ws } = {(−e0 )e0 , . . . , (−er )er }. Thus |{w1 , . . . , ws }| ≥ |{W1 , . . . , Ws }| = r + 1 and so r + 1 is minimal with property (P).  We now begin collecting information in order to study the arithmetic of the Krull monoid presented in Example 4.21. In spite of the simple geometric structure of GP (the set consists of the vertices of the unit cube and their negatives), the arithmetic of this Krull monoid is highly complex. We get only very limited information. Nevertheless, this will be sufficient to give an arithmetical characterization. Lemma 6.6. Let G be an abelian group and let (en )n≥1 be a family of independent elements each having infinite order. For r ∈ N, set − + G+ r = {a1 e1 + · · · + ar er : a1 , . . . , ar ∈ [0, 1]}, Gr = −Gr , and − Gr = G+ r ∪ Gr . (1) Let s ∈ [2, r], f0 = e1 + · · · + es , and fi = f0 − ei for all i ∈ [1, s]. Then (f1 , . . . , fs ) is independent, f1 + · · · + fs = (s − 1)f0 , and ∆({f0 , . . . , fs , −f0 , . . . , −fs }) = {2s − 3}. (2) Let s ∈ [3, r], f0 = e1 + · · · + es , fi = f0 − ei for each i ∈ [1, s − 1], and set fs′ = −es . Then (f1 , . . . , fs−1 , fs′ ) is independent, f1 + · · · + fs−1 + fs′ = (s − 2)f0 , and ∆({f0 , . . . , fs−1 , fs′ , −f0 , . . . , −fs−1 , −fs′ }) = {2s − 4}. (3) If s ≤ [1, r − 1], then D(Gr ) ≥ D(Gs ) + D(Gr−s ) − 1. In particular, D(G1 ) = 2 and D(Gr ) > D(Gr−1 ) for r ≥ 2. 32 NICHOLAS R. BAETH AND ALFRED GEROLDINGER Proof. Since (e1 , . . . , es ) is a basis, there is a matrix As with (f1 , . . . , fs ) = (e1 , . . . , es )As . Since det(As ) 6= 0, it follows that (f1 , . . . , fs ) is independent. By definition, we have f1 +· · ·+fs = (s−1)f0 . The assertion on the set of distances then follows from Theorem 6.4 and we have proved (1). We now consider (2). Note that fs′ = fs − f0 . Using (1) we infer that 0 = (f1 + · · · + fs ) − (s − 1)f0 = (f1 + · · · + fs−1 ) + (fs − f0 ) − (s − 2)f0 and hence f1 + · · · + fs−1 + fs′ = (s − 2)f0 . Since (f1 , . . . , fs−1 , −es ) = (e1 , . . . , es )Bs for some matrix Bs with det(Bs ) = (−1)2s det(As−1 ) 6= 0, it follows that (f1 , . . . , fs−1 , fs′ ) is independent. The assertion on the set of distances follows from Theorem 6.4. It is clear that D(G1 ) = 2 and that D(Gr ) > D(Gr−1 ) whenever r ≥ 2. To prove the remaining statements of (3), suppose that s ∈ [1, r − 1]. After a change of notation, we may suppose that Gr−s ⊂ hes+1 , . . . , er i such that hGr i = hGs i ⊕ hGr−s i. If U = a1 · . . . · ak ∈ A(Gs ) with k = D(Gs ) and V = b1 · . . . · bl ∈ A(Gr−s ) with l = D(Gr−s ), then W = (a1 + b1 ) · a2 · . . . · ak b2 · . . . · bl ∈ A(Gr ), and hence D(Gr ) ≥ |W | = k + l − 1 = D(Gs ) + D(Gr−s ) − 1.  In Theorem 6.7 we restrict to class groups of rank r ≥ 3 because when r ≤ 2 we are in the setting of Theorem 6.4 where we have precise information about arithmetical invariants. For r ∈ N0 , we denote by Fr the rth Fibonacci number. That is, F0 = 0, F1 = 1, and Fr = Fr−1 + Fr−2 for all r ≥ 2. Theorem 6.7. Let H be a Krull monoid with free abelian class group G of rank r ≥ 3 and let GP ⊂ G denote the set of classes containing prime divisors. Suppose that there is a basis (e1 , . . . , er ) of G such − + − + that G•P = G+ P ∪ GP , where GP = {ǫ1 e1 + · · · + ǫr er : ǫ1 , . . . , ǫr ∈ [0, 1]} and GP = −GP . (1) Fr+2 ≤ D(GP ). (2) c(H) ≤ ω(H) = D(GP ), ρ(H) = D(GP )/2, and ρ2k (H) = kD(GP ) for each k ∈ N. (3) [1, 2r − 3] ⊂ ∆∗ (H) ⊂ ∆(H) ⊂ [1, c(H) − 2]. Proof. See [5] for the proof of (1). (2) follows from Proposition 6.2. Note that for every s ∈ [2, r] we have 2s − 3 ∈ ∆∗ (H) and, by Lemma 6.6, for all s ∈ [3, r] we have 2s − 4 ∈ ∆∗ (H). This implies that the interval [1, 2r − 3] is contained in ∆∗ (H), giving (3).  The third class of Krull monoids studied in this subsection are Krull monoids with finite cyclic class group having prime divisors in each class. Thus Theorem 6.8 describes the arithmetic of the monoids constructed in Theorem 5.5. Holomorphy rings in global fields are Krull monoids with finite class group and prime divisors in all classes. For this reason this class of Krull monoids has received a great deal of attention. Theorem 6.8. Let H be a Krull monoid with finite cyclic class group G of order |G| = n ≥ 3, and suppose that every class contains a prime divisor. Then: (1) c(H) = ω(H) = D(G) = n and ∆(H) = [1, n − 2]. (2) For every k ∈ N the set Uk (H) is a finite interval, whence Uk (H) = [λk (H), ρk (H)]. Moreover, for all l ∈ N0 with ln + j ≥ 1, ( 2l + j for j ∈ [0, 1] ρ2k+j (H) = kn + j for j ∈ [0, 1] and λln+j (H) = 2l + 2 for j ∈ [2, n − 1]. (3) max ∆∗ (H) = n − 2 and  jnk max ∆∗ (H) \ {n − 2} = − 1. 2 Proof. The proof of (1) can be found in [37, Theorem 6.7.1] and the proof of (3) can be found in [37, Theorem 6.8.12]. For (2) see [34, Corollary 5.3.2].  MONOIDS OF MODULES AND ARITHMETIC OF DIRECT-SUM DECOMPOSITIONS 33 Much recent research is devoted to the arithmetic of Krull monoids discussed in Theorem 6.8. We briefly address some open questions. Let H be as above and suppose that n ≥ 5. The precise values of t(H) and of cmon (H) are unknown. It is easy to check that D(G) = n < t(H) (in contrast to what we have in Theorem 6.4). For recent results on lower and upper bounds of the tame degree, see [33]. We remark that there is a standing conjecture that the monotone catenary degree is that n = c(H) = cmon (H) (this coincides what we have in Theorem 6.4; see [41]). For recent progress on ∆∗ (H) we refer to [58]. Having at least a partial description of the arithmetic of the three monoids described in Theorems 6.4, 6.7, and 6.8, we now work to show that except for in a small number of exceptions, these monoids have vastly different arithmetic. After some preliminary work this distinction is made clear in Corollary 6.10. Lemma 6.9. Let G be an abelian group with finite total rank and let G0 ⊂ G be a subset with G0 = −G0 . Suppose that L(G0 ) = L(Cn ) for some n ≥ 5. Then there exists an absolutely irreducible element U ∈ A(G0 ) with |U | = D(G0 ). Proof. First observe that D(G0 ) = ρ2 (G0 ) = ρ2 (Cn ) = D(Cn ) = n and, by [37, Theorem 3.4.2], A(G0 ) is finite, say A(G0 ) = {U1 , −U1 , . . . , Uq , −Uq }. If g ∈ Cn with ord(g) = n, then for all k ∈ N we have  Lk = {2k + ν(n − 2) : ν ∈ [0, k]} = L g nk (−g)nk ∈ L(Cn ) = L(G0 ) . (q) Since ρ(Lk ) = ρ(G0 ) = D(G0 )/2, there exists, for every k ∈ N, a tuple (k1 , . . . , kq ) ∈ N0 such that k1 + · · · + kq = k and  Lk = L (−U1 )k1 U1k1 · . . . · (−Uq )kq Uqkq .  Therefore there exists λ ∈ [1, q] such that L (−Uλ )k Uλk = Lk for every k ∈ N. Set U = Uλ and note that for every V ∈ A(G0 ) with V | (−U )k U k for some k ∈ N, it follows that |V | ∈ {2, n}. After changing notation if necessary, we may suppose that there is no V ∈ A(G0 ) such that |V | = n, supp(V ) ( supp(U ), and V | U k (−U )k for some k ∈ N. In order to show that U is absolutely irreducible, it remains to verify that the torsion-free rank of hsupp(U )i is | supp(U )| − 1. Assume to the contrary that there exist t ∈ [2, | supp(U )| − 1] and g1 , . . . , gt ∈ supp(U ) which are linearly dependent. Then there are s ∈ [1, t], m1 , . . . , ms ∈ N, and ms+1 , . . . , mt ∈ −N such that m1 g1 + · · · + ms gs + (−ms+1 )(−gs+1 ) + · · · + (−mt )(−gt ) = 0 . Then V = g1m1 · . . . · gsms (−gs+1 )−ms+1 · . . . · (−gt )−mt ∈ B(G0 ) . Without restriction we may suppose that the above equation is minimal and that V ∈ A(G0 ). Since V | U k (−U )k for some k ∈ N and |V | > 2, we obtain a contradiction to the minimality of supp(U ).  The following corollary highlights that the observed arithmetical phenomena in our case studies — Theorems 6.4, 6.7, and 6.8 — are characteristic for the respective Krull monoids. In particular, this illustrates that the structure of direct-sum decompositions over the one-dimensional Noetherian local rings with finite representation type studied in Section 4 can be quite different from the structure of direct-sum decompositions over the two-dimensional Noetherian local Krull domains with finite representation type studied in Section 5. As characterizing tools we use the system of sets of lengths along with the behavior of absolutely irreducible elements. Corollary 6.10. For i ∈ [1, 3], let Hi and Hi′ be Krull monoids with class groups Gi and G′i . Further suppose that • G1 and G′1 are finitely generated and torsion-free of rank r1 and r1′ with sets of classes containing prime divisors as in Theorem 6.4 (with parameters α, α′ ∈ N such that α + r1 ≥ α′ + r1′ > 2). • G2 and G′2 are finitely generated and torsion-free of rank r2 ≥ r2′ ≥ 3 with sets of classes containing prime divisors as in Theorem 6.7. 34 NICHOLAS R. BAETH AND ALFRED GEROLDINGER • G3 and G′3 are finite cyclic of order |G3 | ≥ |G′3 | ≥ 5 such that every class contains a prime divisor. Then: (1) L(H1 ) = L(H1′ ) if and only if r1 + α = r1′ + α′ . If this holds, then the arithmetic behavior of the absolutely irreducible elements of H1 and H1′ coincide in the sense of Corollary 6.5 if and only if r1 = r1′ . (2) L(H2 ) = L(H2′ ) if and only if r2 = r2′ . (3) L(H3 ) = L(H3′ ) if and only if |G3 | = |G′3 |. (4) L(H1 ) 6= L(H2 ) and L(H1 ) 6= L(H3 ). (5) For i ∈ [2, 3], let si denote the maximal number of absolutely irreducible elements u1 , . . . , usi ∈ Hi such that 2 ∈ L(u1 · . . . · usi ). Then either L(H2 ) 6= L(H3 ) or s2 6= s3 . Proof. The if and only if statement in (1) follows immediately from Theorem 6.4. Suppose that L(H1 ) = L(H1′ ). Then the assertion in (1) on the arithmetic behavior of absolutely irreducible elements follows from Corollary 6.5. To prove (2), first note that one implication is clear, both for H2 and H3 . Suppose that L(H2 ) = L(H2′ ), and let GP ⊂ G2 and G′P ⊂ G′2 denote the set of classes containing prime divisors. Theorem 6.7 implies that D(GP ) = ρ2 (H) = ρ2 (H ′ ) = D(G′P ) , and thus Lemma 6.6 implies r2 = r2′ . Now consider (3). If L(H3 ) = L(H3′ ), then Theorem 6.8 implies that |G3 | − 2 = max ∆(H3 ) = max ∆(H3′ ) = |G′3 | − 2 . For (4), note that L(H1 ) is distinct from both L(H2 ) and L(H3 ) since |∆(H1 )| = 1, |∆(H2 )| > 1, and |∆(H3 )| > 1. For (5) we assume that L(H2 ) = L(H3 ) and let GP ⊂ G2 denote the set of classes containing prime divisors. Theorems 6.7 and 6.8 imply that D(GP ) = ρ2 (H2 ) = ρ2 (H3 ) = |G3 | . By Proposition 6.3 we obtain that D(GP ) = s2 . Now assume to the contrary that s2 = s3 . If |G3 | = n, then there are absolutely irreducible elements u1 , . . . , un and atoms v1 , v2 ∈ A(H3 ) such that v1 v2 = u1 · . . . · un . Without restriction, we suppose H3 is reduced and we consider a divisor theory H ֒→ F (P). Since a minimal zero-sum sequence of length n over G3 consists of one element of order n repeated n times, the factorization of the atoms v1 , v2 , u1 , . . . , un in F (P) must have the following form: v1 = p1 · . . . · pn , v2 = q1 · . . . · qn , and ui = pi qi for all i ∈ [1, n], where p1 , . . . , pn , q1 , . . . , qn ∈ P, [p1 ] = · · · = [pn ] ∈ G3 , and [q1 ] = · · · = [qn ] = [−p1 ]. But [37, Proposition 7.1.5] implies that the elements u1 , . . . , un are not absolutely irreducible, a contradiction.  Remark 6.11. Let H2 and H3 be as in Corollary 6.10. We set n = |G3 |, r = r2 , and let GP,r ⊂ G2 denote the set of classes containing prime divisors. Assume that L(H2 ) = L(H3 ). Then Fr+2 ≤ D(GP,r ) = ρ2 (H2 ) = ρ2 (H3 ) = n . That is, the orders of the cyclic groups for which L(H2 ) = L(H3 ) grow faster than the sequence of Fibonacci numbers. We conjecture that L(H2 ) and L(H3 ) are always distinct but have not further investigated this (rather delicate combinatorial) problem which would require a more detailed investigation of D(GP,r ). Now suppose that H is a Krull monoid with class group G such that every class contains a prime divisor. If L(H) = L(H3 ), then following Theorem 6.8, one can show that G is isomorphic to the finite cyclic group G3 (see [34, Corollary 5.3.3]). Therefore sets of lengths characterize Krull monoids with finite cyclic class group having the property that every class contains a prime divisor. MONOIDS OF MODULES AND ARITHMETIC OF DIRECT-SUM DECOMPOSITIONS 35 6.3. Small sets GP of classes containing prime divisors and limits of arithmetical characterizations. In this final subsection we study the arithmetic of Krull monoids having small sets of classes containing prime divisors. This study pertains to the monoids of Theorem 4.12, Example 4.19, Example 4.20, and Theorem 5.5. The most striking phenomenon here is that these systems of sets of lengths are additively closed (see Proposition 6.14). As a consequence, if L(H) is such a system and H ′ is a monoid with L(H ′ ) ⊂ L(H), then L(H × H ′ ) = L(H) (see Example 4.23, Example 4.24, and Corollary 6.15). These phenomena are in strong contrast to the results in the previous subsection, and they show up natural limits for obtaining arithmetical characterization results. Recall that, for l ∈ N0 and d ∈ N, Pl (d) = {0, d, . . . , ld}. Proposition 6.12. Let H be a Krull monoid with infinite cyclic class group G and suppose that GP = {−2e, −e, 0, e, 2e} ⊂ G = hei is the set of classes containing prime divisors. Then there is a transfer homomorphism θ : H → B(C3 ), and hence  L(H) = L(C3 ) = L(C2 ⊕ C2 ) = y + 2k + Pk (1) : y, k ∈ N0 . Moreover, L(H) coincides with the system of sets of lengths of the Krull monoid studied in Theorem 6.4 with parameters r = 2 and α = 1. Proof. By Lemma 3.4 there is a transfer homomorphism β : H → B(GP ). Since the composition of two transfer homomorphisms is a transfer homomorphism, it is sufficient to show that there is a transfer homomorphism θ′ : B(GP ) → B(C3 ). Write C3 = {0, g, −g}. Since B(GP ) = F ({0}) × B(G•P ) and B(C3 ) = F ({0}) × B({−g, g}), it suffices to show that there is a transfer homomorphism θ : B(G•P ) → B({−g, g}). In this case, L(H) = L(GP ) = L(C3 ). Moreover, L(C3 ) = L(C2 ⊕ C2 ) has the form given in [37, Theorem 7.3.2] and this coincides with the system of sets of lengths in Theorem 6.4, provided (r, α) = (2, 1). Note that A(G•P ) = {V, −V, U1 , U2 }, where V = e2 (−2e), U1 = (−e)e, and U2 = (−2e)(2e), and A({−g, g}) = {V , −V , U }, where V = g 3 and U = (−g)g. Then there is a monoid epimorphism e = θ(−2e) e e e θe: F (G•P ) → F ({−g, g}) satisfying θ(e) = g and θ(−e) = θ(2e) = −g. If ′ ′ A = ek1 (−e)k1 (2e)k2 (−2e)k2 ∈ F (G•P ) with k1 , k1′ , k2 , k2′ ∈ N0 , then A ∈ B(G•P ) if and only if k1 − k1′ + 2(k2 − k2′ ) = 0. If this holds, then k1 + k2′ − (k1′ + k2 ) ≡ 0 mod 3 and hence ′ ′ e θ(A) = g k1 +k2 (−g)k1 +k2 ∈ B({−g, g}) . Thus θ = θe |B(G•P ) : B(G•P ) → B({−g, g}) is a monoid epimorphism satisfying θ(V ) = V , θ(−V ) = −V , θ(U1 ) = θ(U2 ) = U , and θ−1 (1) = {1} = B(G•P )× . Thus in order to show that θ is a transfer homomorphism, it remains to verify Property (T2). Let A ∈ B(G•P ) be as above and suppose that eC e θ(A) = B ′ e C e ∈ B({−g, g}) and B e = g m (−g)m such that m ∈ [0, k1 + k ′ ], m′ ∈ [0, k ′ + k2 ] and m ≡ m′ with B, 2 1 e and θ(C) = C. e Clearly it is mod 3. Our goal is to find B, C ∈ B(G•P ) such that A = BC, θ(B) = B, • e that is, to find parameters sufficient to find B ∈ B(G ) with B | A and θ(B) = B, P m1 ∈ [0, k1 ], m′1 ∈ [0, k1′ ], m2 ∈ [0, k2 ], and m′2 ∈ [0, k2′ ] such that (C1) m1 + m′2 = m, m′1 + m2 = m′ , and m1 − m′1 + 2(m2 − m′2 ) = 0 . e If |B| e = |A|, then k1 + k ′ + k2 + k ′ = |A| = |B| e = m + m′ and To do so we proceed by induction on |B|. 1 2 ′ ′ ′ hence m = k1 + k1 and m = k1 + k2 . Thus we set m1 = k1 , m′1 = k1′ , m2 = k2 , and m′2 = k2′ , 36 NICHOLAS R. BAETH AND ALFRED GEROLDINGER and the assertion is satisfied with B = A. Suppose now that the quadruple (m1 , m′1 , m2 , m′2 ) satisfies e by an atom of B({−g, g}) (if possible) shows that we (C1) with respect to the pair (m, m′ ). Dividing B must verify that there are solutions to (C1) with respect to each of the pairs (m − 1, m′ − 1), (m − 3, m′ ), and (m, m′ − 3) (2) in N0 . One checks respectively that at least one of the following quadruples satisfy (C1). • (m1 − 1, m′1 − 1, m2 , m′2 ) or (m1 , m′1 , m2 − 1, m′2 − 1) • (m1 − 2, m′1 , m2 , m′2 − 1) or (m1 − 3, m′1 − 1, m2 + 1, m′2 ) • (m1 , m′1 − 2, m2 − 1, m′2 ) or (m1 − 1, m′1 − 3, m2 , m′2 + 1) Now the assertion follows by the induction hypothesis.  Proposition 6.13. Let H be a Krull monoid with free abelian class group G of rank 2. Let (e1 , e2 ) be a basis of G and suppose that GP = {0, e1 , e2 , 2e2 , e1 + 2e2 , −e1 , −e2 , −2e2, −e1 − 2e2 } is the set of classes containing prime divisors. Then there is a transfer homomorphism θ : H → B(C4 ) and hence   L(H) = L(C4 ) = y + k + 1 + Pk (1) : y, k ∈ N0 ∪ y + 2k + Pk (2) : y, k ∈ N0 ⊃ L(C3 ) . Proof. As in Proposition 6.12, it suffices to show that there is a transfer homomorphism θ : B(G•P ) → B(C4• ). Then L(H) = L(GP ) = L(C4 ) and L(C4 ) has the form given in [37, Theorem 7.3.2]. Proposition 6.12 shows that L(C3 ) ⊂ L(C4 ). We note that A(G•P ) = {W, −W, V1 , −V1 , V2 , −V2 , U1 , U2 , U3 , U4 }, where W = e1 e2 e2 (−e1 − 2e2 ), V1 = e1 (2e2 )(−e1 − 2e2 ), V2 = e2 e2 (−2e2 ), U1 = (−e1 )e1 , U2 = (−e2 )e2 ), U3 = (−e1 − 2e2 )(e1 + 2e2 ), and U4 = (−2e2 )(2e2 ) . We set C4 = {0, g, 2g, −g} and observe that A(C4• ) = {W , −W , V , −V , U1 , U2 }, where W = g 4 , V = g 2 (2g), U1 = (−g)g, and U2 = (2g)(2g) . There is a monoid epimorphism θe: F (G•P ) → F (C4• ) satisfying e 1 ) = θ(e e 2 ) = θ(−e e e e e e e θ(e 1 − 2e2 ) = g, θ(−e1 ) = θ(−e2 ) = θ(e1 + 2e2 ) = −g, and θ(2e2 ) = θ(−2e2 ) = 2g . If ′ ′ ′ ′ A = ek11 (−e1 )k1 ek22 (−e2 )k2 (2e2 )k3 (−2e2 )k3 (e1 + 2e2 )k4 (−e1 − 2e2 )k4 ∈ F (G•P ) , with k1 , k1′ , . . . , k4 , k4′ ∈ N0 , then A ∈ B(G•P ) if and only if k1 − k1′ + k4 − k4′ = 0 and k2 − k2′ + 2k3 − 2k3′ + 2k4 − 2k4′ = 0 . If this holds, then k1 − k1′ + k2 − k2′ − (k4 − k4′ ) + 2k3 + 2k3′ ≡ 0 mod 4 and hence ′ ′ ′ ′ e θ(A) = g k1 +k2 +k4 (−g)k1 +k2 +k4 (2g)k3 +k3 ∈ B(C4• ) . Thus θ = θe |B(G•P ) : B(G•P ) → B(C4• ) is a monoid epimorphism satisfying θ(W ) = W , θ(−W ) = −W , θ(V1 ) = θ(V2 ) = V , θ(−V1 ) = θ(−V2 ) = −V , θ(U1 ) = θ(U2 ) = θ(U3 ) = U1 , θ(U4 ) = U2 , and θ−1 (1) = {1} = B(G•P )× . Thus in order to show that θ is a transfer homomorphism, it remains to verify Property (T2). Let A ∈ B(G•P ) be as above and suppose that eC e θ(A) = B ′ ′′ e C e ∈ B(C • ) and B e = g m (−g)m (2g)m such that with B, 4 m ∈ [0, k1 + k2 + k4′ ], m′ ∈ [0, k1′ + k2′ + k4 ], m′′ ∈ [0, k3 + k3′ ], and m − m′ + 2m′′ ≡ 0 mod 4 . MONOIDS OF MODULES AND ARITHMETIC OF DIRECT-SUM DECOMPOSITIONS 37 e and θ(C) = C. e It will suffice to find Our goal is to find B, C ∈ B(G•P ) such that A = BC, θ(B) = B, • e B ∈ B(GP ) with B | A and θ(B) = B. Thus we must find parameters mν ∈ [0, kν ] and m′ν ∈ [0, kν′ ] for ν ∈ [1, 4] such that m1 + m2 + m′4 = m, m′1 + m′2 + m4 = m′ , m3 + m′3 = m′′ , m1 − m′1 + m4 − m′4 = 0 and m2 − m′2 + 2m3 − 2m′3 + 2m4 − 2m′4 = 0 . (C2) e = m + m′ + m′′ . If |B| e = |A|, then we set mν = kν and m′ = k ′ for all We proceed by induction on |B| ν ν ν ∈ [1, 4], and the assertion is satisfied with B = A. Suppose now that the octuplet (m1 , m′1 , . . . , m4 , m′4 ) e by an element of A(C • ) (if possible) satisfies (C2) with respect to the triple (m, m′ , m′′ ). Dividing B 4 shows that we must verify that there are solutions to (C2) with respect to each of the triples (m−1, m′ −1, m′′ ), (m−2, m′ , m′′ −1), (m, m′ −2, m′′ −1), (m, m′ , m′′ −2), (m−4, m′ , m′′ ), and (m, m′ −4, m′′ ) (8) provided that they lie in N0 . As in proof of the previous proposition, one finds the required solutions and hence the assertion follows by the induction hypothesis.  Let L be a family of subsets of Z. We say that L is additively closed if the sumset L + L′ ∈ L for all L, L′ ∈ L. Proposition 6.14. Let G be a finite cyclic group. Then L(G) is additively closed if and only if |G| ≤ 4. Proof. We suppose that |G| = n and distinguish four cases. First assume that n ≤ 2. Since B(G) is factorial, it follows that L(G) = {{m} : m ∈ N0 } which is obviously additively closed.  Next assume that n = 3. By Proposition 6.12 we have L(C3 ) = y + 2k + Pk (1) : y, k ∈ N0 . If y1 , y2 , k1 , k2 ∈ N0 . Then   y1 + 2k1 + Pk1 (1) + y2 + 2k2 + Pk2 (1) = (y1 + y2 ) + 2(k1 + k2 ) + Pk1 +k2 (1) ∈ L(C3 ) , and hence L(C3 ) is additively closed. Now assume that n = 4. By Proposition 6.13 we have   L(C4 ) = y + k + 1 + Pk (1) : y, k ∈ N0 ∪ y + 2k + Pk (2) : y, k ∈ N0 . Clearly, the sumset of two sets of the first form is of the first form again, and the sumset of two sets of the second form again the second form. Thus it remains to consider the sumset L1 + L2 where L1 has the first form, L2 has the second form, and both L1 and L2 have more than one element. If y1 , y2 ∈ N0 and k1 , k2 ∈ N, then   y1 + k1 + 1 + Pk1 (1) + y2 + 2k2 + Pk2 (2) = (y1 + y2 ) + (k1 + 2k2 ) + 1 + Pk1 +2k2 (1) ∈ L(C4 ) . Finally, assume that n ≥ 5 and assume to the contrary that L(G) is additively closed. Let d ∈ [1, n−2]. Then {2, d + 2} ∈ L(G) by [37, Theorem 6.6.2], and hence the k-fold sumset {2, d + 2} + · · · + {2, d + 2} = 2k + Pk (d) lies in L(G) for all k ∈ N. Then [37, Corollary 4.3.16] implies that n − 3 divides some d ∈ ∆∗ (G). By Theorem 6.8 we have  jnk max ∆∗ (G) = n − 2 and max ∆∗ (G) \ {n − 2} = −1, 2 a contradiction to n ≥ 5.  Corollary 6.15. (1) Let H be an atomic monoid such that L(H) is additively closed, and let H ′ be an atomic monoid with L(H ′ ) ⊂ L(H). Then L(H × H ′ ) = L(H). 38 NICHOLAS R. BAETH AND ALFRED GEROLDINGER (2) Let H be an atomic monoid with L(H) = L(Cn ) for n ∈ [3, 4]. For k ∈ N and i ∈ [1, k], let Hi be an atomic monoid with L(Hi ) ⊂ L(Cn ). Then L(H × H1 × · · · × Hk ) = L(Cn ). Proof. Since L(H × H ′ ) = {L + L′ : L ∈ L(H), L′ ∈ L(H ′ )}, (1) follows. For (2), we set H ′ = H1 × · · ·× Hk . Since L(Cn ) is additively closed by Proposition 6.14, it follows that L(H ′ ) = {L1 + · · · + Lk : Li ∈ L(Hi ), i ∈ [1, k]} ⊂ L(Cn ). Finally 1. implies that L(H × H ′ ) = L(H).  We conclude this manuscript by suggesting a rich program for further study. Any progress in these directions will lead to a better understanding of direct-sum decompositions of classes of modules where each module has a semilocal endomorphism ring. Moreover, this program could stimulate new studies in combinatorial Factorization Theory where much of the focus has been on Krull monoids having finite class group. Program for Further Study. A. Module-Theoretic Aspect. Let R be a ring and let C be a class of right R-modules which is closed under finite direct sums, direct summands, and isomorphisms, and such that the endomorphism ring EndR (M ) is semilocal for each module M in C (such classes of modules are presented in a systematical way in [24]). Then V(C), the monoid of isomorphism classes of modules in C is a reduced Krull monoid with class group G and set GP ⊂ G of classes containing prime divisors. Since the long-term goal — to determine the characteristic of V(C) — is out of reach in most cases, the focus of study should be on those properties of GP which have most crucial influence on the arithmetic of direct-sum decompositions. In particular, • Is GP finite or infinite ? • Is GP well-structured in the sense of Proposition 6.2 ? B. Arithmetical Aspect of Direct-Sum Decompositions. Let H be a Krull monoid with finitely generated class group G and let GP ⊂ G denote the set of classes containing prime divisors. 1. Finiteness conditions. (a) Characterize the finiteness of arithmetical invariants (as introduced in Section 2) and the validity of structural finiteness results (as given in Proposition 6.2, 2.(a) and 2.(b)). For infinite cyclic groups much work in this direction can be found done in [36]. (b) If GP contains an infinite group, then every finite subset L ⊂ N≥2 occurs as a set of lengths in H (see Proposition 6.2) and hence ∆(H) = N, and Uk (H) = N≥2 for all k ≥ 2. Weaken the assumption on GP to obtain similar results. A weak condition on GP enforcing that ∆(H) = N can be found in [45]. 2. Upper bounds and precise formulas. Suppose that G is torsion-free, say GP ⊂ G = Z(q) ⊂ (R(q) , | · |), where | · | : R(q) → R≥0 is a Euclidean norm. (a) If GP ⊂ {x ∈ R : |x| ≤ M } for some M ∈ N, then derive upper bounds for the arithmetical invariants in terms of M . (b) If GP has a simple geometric structure (e.g., the set of vertices in a cube; see Examples 4.21 and 4.22), derive precise formulas for the arithmetical invariants, starting with the Davenport constant. A first result in this direction can be found in [5]. (c) Determine the extent to which the arithmetic of a Krull monoid with GP as in (b) is characteristic for GP . In particular, determine how this compares with the arithmetic of a Krull monoid H ′ where G′P has the same geometric structure as GP with different parameters and how this compares with the arithmetic of a Krull monoid having finite class group and prime divisors in all classes. MONOIDS OF MODULES AND ARITHMETIC OF DIRECT-SUM DECOMPOSITIONS 39 References [1] M. Arnavut, M. Luckas, and S. Wiegand, Indecomposable modules over one-dimensional Noetherian rings, J. Pure Appl. Algebra 208 (2007), 739 – 760. [2] G. Azumaya, Corrections and supplementaries to my paper concerning Krull-Remak-Schmidt’s theorem, Nagoya Math. J. 1 (1950), 117 – 124. [3] N.R. Baeth, A Krull-Schmidt theorem for one-dimensional rings with finite Cohen-Macaulay type, J. Pure Appl. Algebra 208 (2007), 923 – 940. [4] , Direct sum decompositions over two-dimensional local domains, Commun. Algebra 37 (2009), 1469 – 1480. [5] N.R. Baeth, A. Geroldinger, D.J. Grynkiewicz, and D. Smertnig, A semigroup-theoretical view of direct-sum decompositions and associated combinatorial problems, manuscript. [6] N.R. Baeth and M. Luckas, Bounds for indecomposable torsion-free modules, J. Pure Appl. Algebra 213 (2009), 1254 – 1263. , Monoids of torsion-free modules over rings with finite representation type, J. Commut. Algebra 3 (2011), 439 [7] – 458. [8] N.R. Baeth and S. Saccon, Monoids of modules over rings of infinite Cohen-Macaulay type, J. Commut. Algebra 4 (2012), 297 – 326. [9] N.R. Baeth and R. Wiegand, Factorization theory and decomposition of modules, Am. Math. Mon. 120 (2013), 3 – 34. [10] P. Baginski, A. Geroldinger, D.J. Grynkiewicz, and A. Philipp, Products of two atoms in Krull monoids and arithmetical characterizations of class groups, Eur. J. Comb. 34 (2013), 1244 – 1268. [11] H. Bass, Torsion free and projective modules, Trans. Am. Math. Soc. 102 (1962), 319 – 327. [12] V. Blanco, P. A. Garcı́a-Sánchez, and A. Geroldinger, Semigroup-theoretical characterizations of arithmetical invariants with applications to numerical monoids and Krull monoids, Illinois J. Math. 55 (2011), 1385 – 1414. [13] N. Bourbaki, Commutative Algebra, Springer, 1988. [14] E. Brieskorn, Rationale Singularitäten komplexer Flächen, Invent. Math. 4 (1968), 336 – 358. [15] R.-O. Buchweitz, G. M. Greuel, and F.-O. Schreyer, Cohen-Macaulay modules on hypersurface singularities II, Invent. Math. 88 (1987), 165 – 182. [16] N. Çimen, One-dimensional rings of finite Cohen-Macaulay type, J. Pure Appl. Algebra 132 (1998), 275 – 308. [17] N. Çimen, R. Wiegand, and S. Wiegand, One-dimensional rings of finite representation type, Abelian Groups and Modules (A. Facchini and C. Menini, eds.), vol. 343, Kluwer Academic, 1995, pp. 95 – 121. [18] J. Coykendall and W.W. Smith, On unique factorization domains, J. Algebra 332 (2011), 62 – 70. [19] L. Diracca, On a generalization of the exchange property to modules with semilocal endomorphism rings, J. Algebra 313 (2007), 972 – 987. [20] E.G. Evans, Krull-Schmidt and cancellation over local rings, Pacific J. Math. 46 (1973), 115 – 121. [21] E.G. Evans and P. Griffith, Syzygies, London Math. Soc. Lecture Note Ser., vol. 106, Cambridge University Press, 1985. [22] A. Facchini, Direct sum decomposition of modules, semilocal endomorphism rings, and Krull monoids, J. Algebra 256 (2002), 280 – 307. , The Krull-Schmidt Theorem, Handbook of Algebra, vol. 3, North-Holland, Amsterdam, 2003, pp. 357 – 397. [23] , Geometric regularity of direct-sum decompositions in some classes of modules, Fundam. Prikl. Mat. 10 (2004), [24] 231 – 244. [25] , Krull monoids and their application in module theory, Algebras, Rings and their Representations (A. Facchini, K. Fuller, C. M. Ringel, and C. Santa-Clara, eds.), World Scientific, 2006, pp. 53 – 71. [26] , Direct-sum decompositions of modules with semilocal endomorphism rings, Bull. Math. Sci. 2 (2012), 225 – 279. [27] A. Facchini and F. Halter-Koch, Projective modules and divisor homomorphisms, J. Algebra Appl. 2 (2003), 435 – 449. [28] A. Facchini, W. Hassler, L. Klingler, and R. Wiegand, Direct-sum decompositions over one-dimensional CohenMacaulay local rings, Multiplicative Ideal Theory in Commutative Algebra (J.W. Brewer, S. Glaz, W. Heinzer, and B. Olberding, eds.), Springer, 2006, pp. 153 – 168. [29] A. Facchini and R. Wiegand, Direct-sum decomposition of modules with semilocal endomorphism rings, J. Algebra 274 (2004), 689 – 707. [30] A. Frankhild, S. Sather-Wagstaff, and R. Wiegand, Ascent of module structures, vanishing of Ext, and extended modules, Michigan Math. J. 57 (2008), 321 – 337. [31] W. Gao and A. Geroldinger, Zero-sum problems in finite abelian groups : a survey, Expo. Math. 24 (2006), 337 – 369. [32] , On products of k atoms, Monatsh. Math. 156 (2009), 141 – 157. [33] W. Gao, A. Geroldinger, and W. A. Schmid, Local and global tameness in Krull monoids, Commun. Algebra, to appear. [34] A. Geroldinger, Additive group theory and non-unique factorizations, Combinatorial Number Theory and Additive Group Theory (A. Geroldinger and I. Ruzsa, eds.), Advanced Courses in Mathematics CRM Barcelona, Birkhäuser, 2009, pp. 1 – 86. 40 NICHOLAS R. BAETH AND ALFRED GEROLDINGER [35] A. Geroldinger and R. Göbel, Half-factorial subsets in infinite abelian groups, Houston J. Math. 29 (2003), 841 – 858. [36] A. Geroldinger, D.J. Grynkiewicz, G.J. Schaeffer, and W.A. Schmid, On the arithmetic of Krull monoids with infinite cyclic class group, J. Pure Appl. Algebra 214 (2010), 2219 – 2250. [37] A. Geroldinger and F. Halter-Koch, Non-Unique Factorizations. Algebraic, Combinatorial and Analytic Theory, Pure and Applied Mathematics, vol. 278, Chapman & Hall/CRC, 2006. [38] A. Geroldinger and W. Hassler, Local tameness of v-noetherian monoids, J. Pure Appl. Algebra 212 (2008), 1509 – 1524. [39] A. Geroldinger and F. Kainrath, On the arithmetic of tame monoids with applications to Krull monoids and Mori domains, J. Pure Appl. Algebra 214 (2010), 2199 – 2218. [40] A. Geroldinger and I. Ruzsa, Combinatorial Number Theory and Additive Group Theory, Advanced Courses in Mathematics - CRM Barcelona, Birkhäuser, 2009. [41] A. Geroldinger and P. Yuan, The monotone catenary degree of Krull monoids, Result. Math. 63 (2013), 999 – 1031. [42] E. Green and I. Reiner, Integral representations and diagrams, Michigan Math. J. 25 (1978), 53 – 84. [43] D.J. Grynkiewicz, Structural Additive Theory, Developments in Mathematics, Springer, 2013. [44] F. Halter-Koch, Ideal Systems. An Introduction to Multiplicative Ideal Theory, Marcel Dekker, 1998. [45] W. Hassler, Factorization properties of Krull monoids with infinite class group, Colloq. Math. 92 (2002), 229 – 242. [46] W. Hassler, R. Karr, L. Klingler, and R. Wiegand, Big indecomposable modules and direct-sum relations, Ill. J. Math. 51 (2007), 99 – 122. [47] W. Hassler and R. Wiegand, Extended modules, J. Commut. Algebra 1 (2009), 481 – 506. [48] R. Heitmann, Characterization of completions of unique factorization domains, Trans. Am. Math. Soc. 337 (1993), 379 – 387. [49] D. Herbera and P. Přı́hoda, Big projective modules over noetherian semilocal rings, J. Reine Angew. Math. 648 (2010), 111 – 148. [50] F. Kainrath, Factorization in Krull monoids with infinite class group, Colloq. Math. 80 (1999), 23 – 30. [51] R. Karr and R. Wiegand, Direct-sum behavior of modules over one-dimensional rings, Commutative Algebra: Noetherian and Non-Noetherian Perspectives (M. Fontana, S.-E. Kabbaj, B. Olberding, and I. Swanson, eds.), Springer, 2011, pp. 251 – 275. [52] H. Knörrer, Cohen-Macaulay modules on hypersurface singularities I, Invent. Math. 88 (1987), 153 – 164. [53] W. Krull, Über verallgemeinerte endliche Abelsche Gruppen, Math. Z. 23 (1925), 161 – 196. [54] C. Lech, A method for constructing bad Noetherian local rings, Algebra, Algebraic Topology and their Interactions, Lecture Notes in Mathematics, vol. 1183, Springer, 1986, pp. 241 – 247. [55] C.R. Leedham-Green, The class group of Dedekind domains, Trans. Am. Math. Soc. 163 (1972), 493 – 500. [56] G.J. Leuschke and R. Wiegand, Cohen-Macaulay representations, Mathematical Surveys and Monographs, vol. 181, American Mathematical Society, Providence, RI, 2012. [57] L. Levy and C. Odenthal, Krull-Schmidt theorems in dimension 1, Trans. Am. Math. Soc. 348 (1996), 3391 – 3455. [58] A. Plagne and W.A. Schmid, On congruence half-factorial Krull monoids with cyclic class group, submitted. [59] R. Remak, Über die Zerlegung der endlichen Gruppen in direkte unzerlegbare Faktoren, J. Reine Angew. Math. 139 (1911), 293 – 308. [60] C. Rotthaus, D. Weston, and R. Wiegand, Indecomposable Gorenstein modules of odd rank, J. Algebra 214 (1999), 122 – 127. [61] S. Saccon, One-dimensional local rings of infinite Cohen-Macaulay type, Ph.D. thesis, University of Nebraska–Lincoln, Department of Mathematics (2010). [62] W.A. Schmid, Arithmetical characterization of class groups of the form Z/nZ ⊕ Z/nZ via the system of sets of lengths, Abh. Math. Semin. Univ. Hamb. 79 (2009), 25 – 35. , Characterization of class groups of Krull monoids via their systems of sets of lengths : a status report, Number [63] Theory and Applications : Proceedings of the International Conferences on Number Theory and Cryptography (S.D. Adhikari and B. Ramakrishnan, eds.), Hindustan Book Agency, 2009, pp. 189 – 212. [64] , A realization theorem for sets of lengths, J. Number Theory 129 (2009), 990 – 999. [65] O. Schmidt, Über unendliche Gruppen mit endlicher Kette, Math. Z. 29 (1929), 34 – 41. [66] J. Wedderburn, On the direct product in the theory of finite groups, Ann. Math. 10 (1909), 173 – 176. [67] R. Wiegand, Direct-sum decompositions over local rings, J. Algebra 240 (2001), 83 – 97. [68] R. Wiegand and S. Wiegand, Bounds for one-dimensional rings of finite Cohen-Macaulay type, J. Pure Appl. Algebra 93 (1994), 311 – 342. Department of Mathematics and Computer Science, University of Central Missouri, Warrensburg, MO 64093, USA; [email protected] Institut für Mathematik und Wissenschaftliches Rechnen, Karl-Franzens-Universität Graz, Heinrichstraße 36, 8010 Graz, Austria; [email protected]
0math.AC
arXiv:1802.09158v1 [cs.GT] 26 Feb 2018 Surrogate Scoring Rules and a Dominant Truth Serum for Information Elicitation YANG LIU, Harvard University YILING CHEN, Harvard University We study information elicitation without verification (IEWV) and ask the following question: Can we achieve truthfulness in dominant strategy in IEWV? This paper considers two elicitation settings. The first setting is when the mechanism designer has access to a random variable that is a noisy or proxy version of the ground truth, with known biases. The second setting is the standard peer prediction setting where agents’ reports are the only source of information that the mechanism designer has. We introduce surrogate scoring rules (SSR) for the first setting, which use the noisy ground truth to evaluate quality of elicited information, and show that SSR achieve truthful elicitation in dominant strategy. Built upon SSR, we develop a multi-task mechanism, dominant truth serum (DTS), to achieve truthful elicitation in dominant strategy when the mechanism designer only has access to agents’ reports (the second setting). The method relies on an estimation procedure to accurately estimate the average bias in the reports of other agents. With the accurate estimation, a random peer agent’s report serves as a noisy ground truth and SSR can then be applied to achieve truthfulness in dominant strategy. A salient feature of SSR and DTS is that they both quantify the quality or value of information despite lack of ground truth, just as proper scoring rules do for the with verification setting. Our work complements both the strictly proper scoring rule literature by solving the case where the mechanism designer only has access to a noisy or proxy version of the ground truth, and the peer prediction literature by achieving truthful elicitation in dominant strategy. 1 INTRODUCTION Eliciting private information about events and tasks from human agents is an almost universal problem in our society when there is uncertainty and asymmetric information. For example, financial experts are asked to make predictions on whether the S & P 500 index will go up next week, seismologists attempt to predict future earthquake activities, students doing peer grading are asked to assess the correctness of others’ solutions. From the perspective of incentive alignment, an important goal of a mechanism designer is to incentivize agents to truthfully reveal their private information so that high-quality information is obtained.1 Incentive design for information elicitation has been extensively studied. However, proposed solutions have achieved different notions of truthfulness depending on which one of the following two categories an elicitation problem falls into: information elicitation with verification and information elicitation without verification. Information elicitation with verification refers to settings where the mechanism designer will have access to the ground truth at some point (e.g. whether S & P 500 index actually went up and whether a predicted earthquake actually happened) and can use the ground truth to evaluate the quality of elicited information. Strictly proper scoring rules [Brier, 1950, Gneiting and Raftery, 2007, Matheson and Winkler, 1976a, Murphy and Winkler, 1970] have been proposed and studied to incentivize truthful reporting of private predictions (probability assessment of event outcome). Facing a strictly proper scoring rule, an agent strictly maximizes his expected score by truthfully revealing his prediction. Hence, truthfulness in dominant strategy is achieved here. Moreover, the score of an agent measures the quality of his prediction. 1 Many also consider incentivizing both effort exertion to improve the quality of private information and truthful information revelation. 2 1 INTRODUCTION Information elicitation without verification refers to settings where the mechanism designer does not have access to the ground truth (e.g. whether a student’s homework solution is correct is unavailable as otherwise peer grading is not needed). An elegant family of incentive mechanisms [Dasgupta and Ghosh, 2013, Jurca and Faltings, 2006, Miller et al., 2005, Prelec, 2004, Radanovic and Faltings, 2013, Witkowski and Parkes, 2012], collectively called peer prediction, has been developed for this category to elicit private signals (e.g. a peer grader’s judgement on the correctness of a homework solution). Peer prediction leverages the correlation of agents’ private signals and scores an agent’s report based on how it compares with the reports from other agents. Agents play a Bayesian game in peer prediction and there exists a Bayesian Nash Equilibrium (BNE) where every agent reports truthfully. Truthfulness at BNE is clearly a weaker incentive guarantee than truthfulness in dominant strategy as the former is sensitive to errors and mistakes of other agents. Peer prediction also suffers from multiplicity of equilibria as there are other nontruthful BNE.2 In experiments, the truthful equilibrium was often not reached [Gao et al., 2014]. In addition, the peer prediction score of an agent measures the correlation of his report with those of others, but it doesn’t reflect the quality of the agent’s report. We focus on information elicitation without verification in this paper and ask: Can we achieve truthfulness in dominant strategy in information elicitation without verification? We provide a positive answer to this question for binary information elicitation. Moreover, in our proposed mechanisms, the score of an agent measures the quality of his report as in information elicitation with verification. Two specific information elicitation without verification settings are considered in this paper. The first setting is when the mechanism designer has access to a random variable that is a noisy or proxy version of the ground truth, with known biases. The second setting is the standard peer prediction setting where agents’ reports are the only source of information that the mechanism designer has. For the first setting, we introduce surrogate scoring rules (SSR), which use the noisy ground truth to evaluate quality of elicited information, and show that SSR achieve truthful elicitation in dominant strategy without access to the ground truth. These surrogate scoring rules are inspired by the use of surrogate loss functions in machine learning [Angluin and Laird, 1988, Bylander, 1994, Natarajan et al., 2013, Scott, 2015, Scott et al., 2013] and they remove bias from the noisy random variable such that in expectation a report is as if evaluated against the ground truth. Built upon SSR, in the second setting where the mechanism designer only has access to agents’ reports, we develop a multi-task mechanism, dominant truth serum (DTS), to achieve truthful elicitation in dominant strategy. The method relies on an estimation procedure to accurately estimate the average bias in the reports of other agents. With the accurate estimation, a random peer agent’s report serves as a noisy ground truth and SSR can then be applied to achieve truthfulness in dominant strategy. We further show that DTS can be extended to achieve truthful elicitation in dominant strategy in settings where agents’ signals are correlated conditioned on the ground truth. This allows us to overcome the failure of classic peer prediction in the presence of weak, correlated signals, observed by [Gao et al., 2016]. A salient feature of SSR and DTS is that they both quantify the quality or value of information despite lack of ground truth, just as proper scoring rules do for the with verification setting. In this sense, SSR and DTS unify the with and without verification settings by always rewarding agents 2 Several recent peer prediction mechanisms [Dasgupta and Ghosh, 2013, Kong and Schoenebeck, 2016a, Shnayder et al., 2016] have made truthful equilibrium focal in the sense that it leads to the highest expected payoff to agents among all equilibria. But there is at least one other equilibrium that gives the same expected payoff to agents. 1.1 Related work 3 based on their quality of information (and hence achieving truthfulness in dominant strategy). In addition, SSR and DTS apply to both signal and prediction elicitation. The rest of the paper is organized as follows. In Section 2, we describe our model and the two elicitation settings. Section 3 introduces SSR for the first elicitation setting. Section 4 details DTS for the second elicitation setting. Then, in Section 5, we extend DTS to correlated signals. Section 6 concludes with discussions on some additional directions. 1.1 Related work The most relevant literature to our paper is strictly proper scoring rule and peer prediction. Scoring rules were developed for eliciting truthful prediction (probability) [Brier, 1950, Gneiting and Raftery, 2007, Jose et al., 2006, Matheson and Winkler, 1976b, Savage, 1971, Winkler, 1969]. For example, the pioneer works [Brier, 1950] proposed Brier scoring to verify the qualities of forecasts. A full characterization result is given for strictly proper scoring rules in [Gneiting and Raftery, 2007]. Our work complements the literature of scoring rule by proposing surrogate scoring rules to cope with the case when there is only access to a noisy or proxy version of the ground truth. Our surrogate scoring rules can be viewed as a class of proxy scoring rules defined in [Witkowski et al., 2017]. [Witkowski et al., 2017] proposed to design proper proxy scoring rules by using an unbiased proxy random variable as the ground truth in a strictly proper scoring rule. Our proxy random variable is biased. We focus on designing a surrogate scoring function that removes bias in any noisy ground truth, and thus can deal with a more general setting. Motivated by the complexity of reporting the probability for events with large outcome space, property elicitation, such as for mean, variance etc of probability distributions, has been studied more recently [Frongillo and Kash, 2015, Lambert et al., 2008]. In this paper we do not cover the property elicitation setting. The core idea of peer prediction is to score each agent based on another reference report elicited from the rest of agents, and to leverage on the stochastic correlation between different agents’ information. This line of research started with the celebrated Bayesian Truth Serum work [Prelec, 2004], where a surprisingly popular answer methodology is shown to be able to incentivize agents to truthfully report even they believe they hold the minority answer (but more likely to be true in their own opinion). The seminal work [Miller et al., 2005] established that strictly proper scoring rule [Gneiting and Raftery, 2007] can be adopted in the peer prediction setting for eliciting truthful reports (but the mechanism designer need to know details of agents’ model); a sequence of followed up works have been done to relax the assumptions that have been imposed therein [Radanovic and Faltings, 2013, Witkowski and Parkes, 2012]. More recently, [Dasgupta and Ghosh, 2013, Witkowski et al., 2013] formally introduced and studied an effort sensitive model for binary signal data elicitation. Particularly [Dasgupta and Ghosh, 2013] proposed a multi-task peer prediction mechanism that can help remove undesirable equilibria that lead to low quality reports. These results are further strengthened and extended to a non-binary signal setting in [Kong and Schoenebeck, 2016a, Shnayder et al., 2016]. An information theoretical framework for studying this type of elicitation problems has been proposed in [Kong and Schoenebeck, 2016a,b]. [Kong and Schoenebeck, 2016b] also proposed a conceptual mechanism to achieve truthfulness in dominant strategy but it requires infinite number of tasks. Our work is the first one to establish truthfulness in dominant strategy with a finite number of tasks for a peer prediction setting. It is worth to mention that our work borrows ideas from the machine learning literature on learning with noisy data [Bylander, 1994, Menon et al., 2015, Natarajan et al., 2013, Scott, 2015, van Rooyen and Williamson, 2015]. From a high level’s perspective, our goal in this paper aligns with the goal in learning from noisy labels - both aim to evaluate a prediction when the ground 4 2 INTRODUCTION truth is missing, but instead a noisy signal of the ground truth is available. Our work addresses additional challenge that the error rate of the noisy signal remains unknown a priori. 2 OUR MODEL Prior work on information elicitation typically considers one of two types of information: private signals and private beliefs (i.e. probabilistic predictions). In this paper, we develop mechanisms that apply to both cases. Hence, in Section 2.1, we first introduce our model of information and notations to unify these two types of information. Then, Section 2.2 and 2.3 will introduce our model and design goals for two elicitation settings without accessing the ground truth. In the first setting (Section 2.2), the mechanism designer has access to a random variable that is a noisy version of the ground truth with known bias. The second setting (Section 2.3) is the typical setting in the peer prediction literature where the mechanism designer only has access to reports from agents. For both settings, our design goal is to achieve truthful elicitation in dominant strategy. 2.1 Model of information Suppose we are interested in eliciting information about a binary event y ∈ {0, 1} from a set of human agents, indexed by [N ] := {1, 2, ..., N }. The realization of the event y has prior distribution P0 := Pr[y = 0], P1 = Pr[y = 1]. We assume a non-trivial prior distribution that 0 < P0 , P1 < 1. Each of the N agents holds a noisy observation of y, denoting as si . Agents’ observations are conditionally independent: Pr[si , s j |y] = Pr[si |y] · Pr[s j |y]. We short-hand the following error rates: e 1,i := Pr[si = 0|y = 1], e 0,i := Pr[si = 1|y = 0], i.e., e 1,i , e 0,i are the “error probabilities” or the subjective “human bias” of agent i’s observation for y. We do not assume homogeneous agents, that is we allow agents to have different e 1,i , e 0,i . The error rates can also model subjectivity in agents’ private belief and observation. Based on signal si , each agent can form a posterior belief about y, denoting as pi := Pr[y = 1|si ]. When there are multiple tasks, we assume the prior, P0 and P1 , and each agent’s error rates, e 1,i and e 0,i , are homogeneous across tasks. We consider eliciting either si or pi from agents,3 but we are not able to access the ground truth y to verify the reported information from agents. We call the elicitation of these two types of information as signal elicitation and prediction elicitation respectively. The literature on proper scoring rules has been primarily considering prediction elicitation, while the literature on peer prediction has focused on signal elicitation. To unify both types of information, we denote the information space as I, and each agent’s information as Ii . For signal elicitation, Ii = si and I = {0, 1}. For prediction elicitation, Ii = pi and I = [0, 1]. Denote agent i’s report to a mechanism as ai ∈ I . Then, for for signal elicitation and prediction elicitation, we have ai : si → {0, 1} and ai : pi → [0, 1] respectively. 2.2 Model of elicitation with noisy ground truth The first elicitation setting is when the mechanism designer has access to the realization of a binary random variable z ∈ {0, 1}, which is a noisy or proxy version of the ground truth with known bias. The bias of z is again captured by the error rates: e 1,z := Pr[z = 0|y = 1], e 0,z := Pr[z = 1|y = 0]. 3 For clarity of presentation, we assume that we elicit the same type of information from all agents. But our work can be extended to a mixed elicitation setting. 2.3 Model of elicitation with peer reports 5 We cannot expect to do much if z is independent of y and hence assume that z and y are stochastically relevant, an assumption commonly adopted in the information elicitation literature [Miller et al., 2005]. Definition 2.1. z and y are stochastically relevant if there exists an s ∈ {0, 1} such that Pr[y = s |z = 0] , Pr[y = s |z = 1]. The following lemma shows that the stochastic relevance requirement directly translates to a constraint on the error rates, that is, e 1,z + e 0,z , 1. Lemma 2.2. y and z are stochastically relevant if and only if e 1,z + e 0,z , 1. And y and z are stochastically irrelevant (independent) if and only if e 1,z + e 0,z = 1. We consider both signal elicitation and prediction elicitation. Our goal is to design a scoring function φ(ai , z) : I × {0, 1} → R+ such that when agent i’s report ai is evaluated against the realization of the noisy ground truth z, agent i strictly maximizes his expected score by reporting his true information ai = Ii . Formally, we want to achieve Strict properness with noisy ground truth: E[φ(Ii , z)] > E[φ(ai , z)], ∀ai , Ii , (1) where the expectation is taken with respect to the agent’s subjective belief Pr[z|si ]. It’s worth noting that prediction elicitation in this model, as in the literature, doesn’t need agents to form their prediction pi according to the signal model described in Section 2.1, and instead only requires that agents each have a subjective belief pi . For simplicity of presentation, we use the signal model in Section 2.1 throughout the paper. 2.3 Model of elicitation with peer reports The second elicitation setting is close to the standard setting considered in the peer prediction literature. Here the only source of information that the mechanism designer has access to is the agents’ reports. In this setting, we assume ”differentiable” prior such that P0 , P1 . This is a technical condition that we need. In practice, with multiple tasks, we can perturb the priors by adding some known tasks to (or deleting task from) one of the two classes. 2.3.1 Informativeness of signals. We adopt the standard assumption requiring that each agent’s signal si and the ground truth y are stochastically relevant, i.e. e 1,i +e 0,i , 1. Moreover, we assume that signals are Bayesian informative of y, that is, Pr[y = s |si = s] > Pr[y = s], ∀i, s. In other words, the posterior probability for y = s is greater than the prior probability of y = s if an agent receives a signal s. This assumption has been adopted by [Dasgupta and Ghosh, 2013, Miller et al., 2005], and has been shown by [Liu and Chen, 2017] to be equivalent to a constraint on the error rates of agent signals. Lemma 2.3. (Lemma 2.1 in [Liu and Chen, 2017]) si is Bayesian informative of y if and only if e 1,i + e 0,i < 1. The case e 1,i + e 0,i > 1 can be viewed as negative Bayesian informative as always flipping one’s observation will return a Bayesian informative signal. In this paper we focus only on settings where every agent’s signal is Bayesian informative of y. But this assumption is to simplify presentation as our results hold for negative Bayesian informative agents, as well as for a mixed population. 6 3 OUR MODEL 2.3.2 Knowledge of agents and the mechanism designer. For signal elicitation, agents do not need to be aware of their own values of e 1,i and e 0,i , but they need to know that their own signals are Bayesian informative and the error rates satisfy e 1,i + e 0,i < 1. For prediction elicitation, agents need to know their own values of e 1,i and e 0,i to form their predictions. The above knowledge does not need to be common knowledge among agents. This is because we seek to achieve dominant strategy truthfulness and hence agents are as if not playing a Bayesian game. The mechanism designer knows the priors of ground truth P0 , P1 , but not the realized y, nor the private information si ’s or pi ’s. Further the designer does not know any of the biases of agents’ information, e 1,i and e 0,i , a-priori. This can capture scenarios when we know the prior distribution of answers for a certain type of questions, but not specifically the answer for a particular question, nor how human agents make wrong prediction of such events. In our proposed mechanism, we will show how to infer the true error rates of agents’ reports. 2.3.3 Design goal. We again aim to achieve truthful elicitation in dominant strategy for both signal elicitation and prediction elicitation. Denote by D−i the set of information collected from agents j , i, possibly for multiple tasks, i.e. D−i := {a j }j,i For this part, our goal is to find a reference signal z D−i ∈ {0, 1}, as a function of D−i , and a scoring function φ D−i (ai , z) : I × {0, 1} → R+ , also as a function of D−i , such that it is a dominant strategy for agent i to truthfully report his private information: Truthfulness in dominant strategy with peer reports: Ii = argmaxai E[φ D−i (ai , z D−i )], (2) where the expectation is taken with respect to the agent’s subjective belief Pr[z D−i |si ]. When it’s clear in context, we’ll use z as shorthand for z D−i and φ for φ D−i . 3 SURROGATE SCORING RULES In this section we propose surrogates scoring rules (SSR) to address the question of achieving strict properness when only having access to a noisy ground truth. SSR is built upon strictly proper scoring rules. Thus, we first briefly discuss strictly proper scoring rules. Then, we formally define SSR, prove its strict properness and give an implementation of it. 3.1 Strictly proper scoring rules As mentioned earlier, when ground truth is available, strictly proper scoring rules were designed to elicit predictions, i.e. the pi ’s. A scoring function S : [0, 1] × {0, 1} → R+ is strictly proper if and only if E[S(pi , y)] > E[S(p̃i , y)], ∀p̃i , pi , where the expectation is taken with respect to the agent’s belief Pr[y|si ]. There is a rich family of strictly proper scoring rules, including Brier (S(pi , y) = 1 − (pi − y)2 ), logarithmic and spherical scoring rules [Gneiting and Raftery, 2007]. Though not enjoying much attention in the literature, the above idea of defining strictly proper scoring rules also applies to signal elicitation, that is to design a function S : {0, 1}2 → R+ such that E[S(si , y)] > E[S(s̃i , y)], ∀s̃i , yi , where the expectation is taken with respect to the agent’s belief Pr[y|si ]. For instance, with knowledge of the prior of y (Pr[y = s], s ∈ {0, 1}), the following prior dependent output agreement 3.3 An implementation of SSR 7 scoring function is strictly proper (1/Prior): S(s̃i , y) = 1 · 1(s̃i = y). Pr[y = s̃i ] Lemma 3.1. 1/Prior scoring function is strictly proper. To unify prediction and signal elicitation, we will denote a strictly proper scoring rule for eliciting agent i’s information Ii as S(ai , y) : I × {0, 1} → R+ . 3.2 Surrogate scoring rules We define surrogate scoring rules (SSR), when we only have access to z, a noisy and proxy signal of the ground truth y, and e 1,z + e 0,z , 1. Definition 3.2 (Surrogate Scoring Rules). φ : I × {0, 1} → R+ is a surrogate scoring rule if there exists a strictly proper scoring rule S : I × {0, 1} → R+ and a strictly increasing function f : R+ → R+ such that ∀ai , Ey,z [φ(ai , z)] = f (Ey [S(ai , y)]). (3) If Eqn .(3) is true, the strict properness of φ(·) holds immediately because of the strict properness of S and monotonicity of f (·). For instance, a simple such f to aim for can be an affine function that there exist two constants c 1 > 0, c 2 such that Ey,z [φ(ai , z)] = c 1 · Ey [S(ai , y)] + c 2 . (4) Theorem 3.3. SSR is strictly proper for eliciting Ii . The above approach seeks a surrogate scoring function φ(·) that helps us remove the bias in z to return us a strictly proper score in expectation. SSR can be viewed as a particular class of proxy scoring rules [Witkowski et al., 2017]. But the approach of [Witkowski et al., 2017] to achieve properness is to plug in an unbiased proxy ground truth to a strictly proper scoring rule. SSR on the other hand directly works with biased proxy and the scoring function is designed to de-bias the noise. 3.3 An implementation of SSR Consider any strictly proper scoring function S for eliciting Ii using y, the ground truth. We define the following SSR, which we name as SSR alpha: (SSR alpha) : φ(ai , z = s) = (1 − e 1−s,z ) · S(ai , s) − es,z · S(ai , 1 − s) . 1 − e 1,z − e 0,z (5) From above we note that the knowledge of the error rates e 1,z , e 0,z is crucial for defining a SSR. The above scoring function is inspired by the work ”learning with noisy label” [Natarajan et al., 2013]. Intuitively speaking, the linear transform will ensure that in expectation, ai is scored against y: Lemma 3.4. When e 1,z + e 0,z < 1, we have for (SSR alpha): Ez |y [φ(ai , z)] = S(ai , y), ∀y ∈ {0, 1}. This can be proved fairly straightforwardly via spelling out the expectation. Interested readers are also referred to Lemma 1, [Natarajan et al., 2013]. In above, the scoring function φ(·) takes the form of linear combination of the scoring function evaluated at the noisy outcome z and the one evaluated at the opposite signal 1 − z. The second term is to account for the fact that the reference signal is merely a noisy proxy for the ground truth signal. The linear weights, carefully defined over the bias level of the reference, balance the bias in the noisy signal with respect to 8 4 SURROGATE SCORING RULES the ground truth. Also note the above unbiasedness is achieved w.r.t. each possible realization of y, being independent of its prior distribution. This helps us remove the requirement of common knowledge over the priors among agents, and thus our solution works for the subjective prior setting. Now we establish the strict properness of SSR: Theorem 3.5. (SSR alpha) is strictly proper. Proof. Consider agent i. Consider the case that e 1,z + e 0,z < 1. The proof is straightforward following the “unbiasedness” property established for φ(·) in Lemma 3.4:   E[φ(ai , z)] = E E[φ(ai , z)|y] = E[S(ai , y)]. The theorem follows immediately from the strictly properness of S. Now consider the case with e 1,z + e 0,z > 1. We cannot directly apply Lemma 3.4. Now let’s define the “flip signal” ẑ of z: ẑ = 1 − z. Easy to see that e 1, ẑ := Pr[ẑ = 0|z = 1] = Pr[z = 1|z = 1] = 1−e 1,z , e 0, ẑ := Pr[ẑ = 1|z = 0] = Pr[z = 0|z = 0] = 1−e 0,z , and e 1, ẑ + e 0, ẑ < 1. The scoring function for agent i then becomes: (1 − e 1−s,z ) · S(ai , s) − es,z · S(ai , 1 − s) . 1 − e 1,z − e 0,z [1 − (1 − es,z )]S(ai , 1 − s) − (1 − e 1−s,z )S(ai , s) = 1 − (1 − e 1,z ) − (1 − e 0,z ) (1 − e 1−(1−s), ẑ )S(ai , 1 − s) − e 1−s, ẑ S(ai , s) = 1 − e 1, ẑ − e 0, ẑ = φ(ai , ẑ = 1 − s). φ(ai , z = s) = (6) Then we have   E[φ(ai , z)] = E[φ(ai , ẑ)] = E E[φ(ai , ẑ)|y] = E[S(ai , y)], where the last equality is due to the unbiasedness of φ(·) with respect to ẑ (instead of z), and the fact that e 1, ẑ + e 0, ẑ < 1, so Lemma 3.4 can be applied. Again it is easy to see it would be agent i’s best interest to tell the truth, due to the strict properness or truthfulness of S(·), finishing the proof.  Remark 1. We provide a simple yet effective scoring function to unify the two elicitation scenarios. Intuitively, the reason we can achieve above is that the core step of surrogate function φ(·) only operates with the reference answer z, and it is independent of the format of the information being elicited. 4 DOMINANT TRUTH SERUM The results in previous section are built upon the fact that there exists a reference signal for the ground truth and we know its error rates. In this section, we apply the idea of SSR to the peer prediction setting. A reasonable way to do so is to take agents’ reports as the source for this noisy copy of the ground truth. Yet the mechanism designer cannot assume the knowledge of the noise in agents’ reports. In this section we discuss how to select the reference answer z and how to learn e 1,z , e 0,z accurately so that φ(·) will be well defined. Then applying Theorem 3.5, we will be able to establish a dominant strategy argument in the peer prediction setting. 4.2 Bias learning with matching 4.1 9 Reference report An intuitive way of selecting a reference report z is to uniformly randomly select a report from agents j , i, i.e., from D−i . Denote by ẽ 1,i , ẽ 0,i the error rate of agent i’s reported information ai . For the signal elicitation setting, when agents truthfully report, i.e. ai = si , we have ẽ 1,i = e 1,i , ẽ 0,i = e 0,i , and when they revert their signals we have ẽ 1,i = 1 − e 1,i , ẽ 0,i = 1 − e 0,i . For the case with prediction elicitation, we can similarly define a signal from agent i, via drawing a random sample: asi ∼ Bernoulli(p̃i ). In this case, we will still call such a asi as agent i’s “signal” but we should keep in mind this signal is randomly drawn from his reported prediction, instead of being deterministic. We similarly define ẽ 1,i , ẽ 0,i , and assume conditional independence among asi s. e 1,z and e 0,z can then be characterized fairly easily as follows: Í Í j,i ẽ 1, j j,i ẽ 0, j e 1,z := , e 0,z := . (7) N −1 N −1 This can be obtained by the following argument: Denote the following even Wj := {agent j selected as the reference agent}. Then we have Pr[z = 0|y = 1] = Õ j,i = Õ j,i   Pr z = 0, Wj |y = 1     Pr z = 0|y = 1, Wj · Pr Wj = Õ 1 · ẽ 1, j . N − 1 j,i We have similar interpretation for e 0,z . The next subsection will detail the steps towards estimating e 0,z , e 1,z . Note if we know the average error rates when agents truthfully report, the SSR already gives us an equilibrium implementation of truthful elicitation - as in the equilibrium argument, every other agent will truthfully report. 4.2 Bias learning with matching Our learning algorithm for inferring e 0,z , e 1,z relies on establishing three equations towards characterizing e 1,z , e 0,z . We will first show that the three equations, with knowing their true parameters, together will uniquely define e 1,z , e 0,z . Then we argue that with estimated and imperfect parameters from agents’ report, the solution from the perturbed set of equations will approximate the true values of e 1,z , e 0,z , with guaranteed accuracy. (1) Posterior distribution: The first equation is based on on the posterior distribution of 0/1 label information collected from D−i , denoting as P0, −i := Pr[z = 0], P1, −i := Pr[z = 1]. For P0, −i we have P0, −i = P1e 1,z + P0 (1 − e 0,z ). (8) Note the above equation is also equivalent with P1, −i = P1 (1 − e 1,z ) + P0e 0,z . (2) Matching between two signals: The second equation is derived from a second order statistics, namely the matching probability. Consider the following experiments: draw two independent signals (for the same task) from the reference agents 4 , denote them as 4 Note in practice, we won’t obtain independent copies of answers for the same question from the same agents for inferring the matching probability. However when the number of agent is large enough, we will show that drawing two or three agents randomly from the population (without replacement) can approximate these independent matching probabilities with small and diminishing errors (as a function of number of agents N ). 10 4 DOMINANT TRUTH SERUM z 1 , z 2 . Denote the matching-on-1 probability of the two signals as Pr[z 1 = z 2 = 1] = q 2, −i . Further the matching probability can be written as a function of e 0,z , e 1,z :5 2 q 2, −i = P1 (1 − e 1,z )2 + P0e 0,z . (9) (3) Matching among three signals: The third equation is obtained by going one order higher that, we check the matching-on-1 probability over three independent signals drawn from reference agents. Similarly as defined for (2) matching between two signals, draw three independent signals (for the same task) from the reference agents, denote them as z 1 , z 2 , z 3 . Denote the matching-on-1 probability of the three signals as Pr[z 1 = z 2 = z 3 = 1] = q 3, −i . Then we also have that 2 q 3, −i = P1 (1 − e 1,z )3 + P0e 0,z . (10) The reasons we selected the above three equations are two-fold. The first reason is that, as we will show below, the above three equations uniquely define e 0,z , e 1,z . The second reason is that in practice we only need to know P1, −i , q 2, −i , q 3, −i in order to establish the three equations, since we have assumed the knowledge of priors P0 , P1 . All three parameters P1, −i , q 2, −i , q 3, −i can be estimated from agents’ reports, without the need of knowing any ground truth labels. As promised, we first establish the following theorem: Theorem 4.1. (e 0,z , e 1,z ) is the unique pair of solution to Eqn.(8, 9, 10), when P0 , P1 . Proof. First of all, there are at most two solutions from Eqn. (8) and (9), since the equations are at most order two. Further we prove the following properties of its solutions: Lemma 4.2. For the solutions to Eqn.(8) and (9), we have (1) When the reports are uninformative such that e 0,z + e 1,z = 1, the above equation return exactly one solution satisfying that e 0,z + e 1,z = 1. (2) When the reports are informative such that e 0,z + e 1,z , 1, Eqn.(8) and (10) jointly return two pair of solutions [e 0,z (1), e 1,z (1)], [e 0,z (2), e 1,z (2)] and exactly one of them satisfies e 0,z (1)+e 1,z (1) < 1 and the other one that e 0,z (2)+e 1,z (2) > 1. Further their summations of the two pairs have the same distance to the 1 (uninformative): 1 − (e 0,z (1) + e 1,z (1)) = (e 0,z (2) + e 1,z (2)) − 1. We shall shorthand the following: x 1 := e 0,z , x 2 := 1 − e 1,z . Proof. Eqn.(8) and (9) become equivalent with the following (I) : P0x 1 + P1x 2 = P1, −i , (II) : P0x 12 + P1x 22 = q 2, −i . From the first equation (I) we know that x 1 = x1 − x2 = P 1, −i −P1 ·x 2 . P0 Then P1, −i − P1 · x 2 P1, −i − x 2 − x2 = P0 P0 5 Note here we implicitly assumed that agents’ reported signals are also conditional independent of the ground truth signal. In practice, without knowing the ground truth, it is hard for agents to coordinate based on the ground truth. In fact if the reporting strategies are functions of each agent’s observation, we will have the conditional independence established immediately, according to the conditional independence of agents’ observations. 4.3 Statistical consistency results 11 Further plug x 1 into the second equation (II) we have P1x 22 − 2P1 P1, −i x 2 + P1,2 −i − P0q 2, −i = 1 ⇒ x 2 = P1, −i ± ∆, q (2P1P1, −i )2 − 4P1 (P1,2 −i − P0q 2, −i ) . where ∆ := 2P1 From above we have derived the following e 0,z + e 1,z − 1 = x 1 − x 2 = ± P∆0 . When e 0,z + e 1,z = 1, we know we must have ∆ = 0 so we land at an unique solution. When e 0,z + e 1,z , 1, we know that ∆ > 0 and we have two solutions – but both solutions satisfy that |e 0,z + e 1,z − 1| = ∆ , P0 finishing the proof. We now show the following fact:  Eqn.(10) − Eqn.(8) · Eqn.(9) ⇔P0x 13 + P1x 23 − (P0x 1 + P1x 2 )(P0x 12 + P1x 22 ) = q 3,i − q 2,i P1 ⇔P0 P1 (x 13 + x 23 − x 12x 2 − x 1x 22 ) = q 3, −i − q 2, −i P1, −i ⇔P0 P1 (x 1 − x 2 )2 (x 1 + x 2 ) = q 3, −i − q 2, −i P1, −i (q 3, −i − q 2, −i P1, −i )P0 ∆2 P1 The above equation, together with equation (I), will uniquely identify the solution for x 1 , x 2 when P0 , P1 :   q 3, −i − q 2, −i P1, −i 1 P1 − P1, −i , x1 = P1 − P0 q 2, −i − P1,2 −i   q 3, −i − q 2, −i P1, −i 1 x2 = P P1, −i − 0 . P1 − P0 q 2, −i − P1,2 −i ⇔x 1 + x 2 = This completes the proof.  This result implies that when there is no ground truth data, knowing how frequently human agents reach consensus with each other will help us characterize their (average) subjective biases. We conjecture that the above estimation method can be extended to the case with unknown priors of the ground truth. The idea is very straightforward following our approach: We can relax the knowledge of the priors to have two additional unknown variables. Then we will go two orders up to have additional two equations characterizing the matchings among four and five reference signals, to cop with the two more unknown variables. This merits future studies. 4.3 Statistical consistency results Now we detail the learning procedure. Our method relies on multiple tasks (thus our mechanism is naturally a multi-task one). We will collect information on multiple independently drawn events from priors y(1), y(2), · · · ∼ P0 , P1 by randomly assigning them to agents. Each task will be randomly assigned to three agents. Suppose there are K tasks that have been assigned to agents j , i - this is not hard to guarantee ∀i when we assign more than K tasks to the entire set of agents randomly, and when N is large. The algorithm first estimates the following three quantities for each agent i: q̃ 2, −i , q̃ 3, −i and P̃1,i −i based on above information. Denote the three agents that are assigned task k = 1, ..., K as 12 4 DOMINANT TRUTH SERUM r 1 (k), r 2 (k), r 3 (k) , i, and their reports for task k as ỹr idx (k) (k), idx = 1, 2, 3. Then we estimate the three parameters as follows: ÍK 1(ỹr 1 (k) (k) = 1) , P̃1, −i = k=1 K ÍK 1(ỹr 1 (k) (k) = ỹr 2 (k) (k) = 1) , q̃ 2, −i = k=1 K ÍK 1(ỹr 1 (k) (k) = ỹr 2 (k) (k) = ỹr 3 (k) (k) = 1) . q̃ 3, −i = k=1 K Mechanism 1 Learning of e 1,z , e 0,z 1. Estimate q̃ 2, −i , q̃ 3, −i and P̃1, −i using {ỹr idx (k) (k), k = 1, 2, ..., K, idx = 1, 2, 3}. 2. Compute the following:   q̃ 3, −i − q̃ 2, −i P̃1, −i 1 ẽ 0,z : = · P1 − P̃1, −i , P1 − P0 q̃ 2, −i − (P̃1, −i )2   q̃ 3, −i − q̃ 2, −i P̃1, −i 1 · P0 , ẽ 1,z : = 1 − P̃1, −i − P1 − P0 q̃ 2, −i − (P̃1, −i )2 (11) (12) Remark 2. We notice that the sensitivity in computing e 0,z , e 1,z is inversely proportional to P1 −P0 . This implies that the difficulty in selecting the right pair of root increases when the priors are less differentiable. We would like to show that the estimation error in estimating reports’ error rate can be bounded as a function of K and N . The first source of errors is the imperfect estimations of q 2, −i , q 3, −i , P1, −i . The second is due to estimation errors for matching probability with heterogeneous agents. Formally we have the following theorem: 0.12 1.8 1.7 0.08 Reward gap Estimation error 0.1 0.06 0.04 1.5 1.4 0.02 0 500 1.6 1000 1500 Number of tasks 2000 1.3 500 1000 1500 Number of tasks 2000 Fig. 1. Convergence of the estimation. Left: convergence with different number of tasks. e 0,z = 0.85, e 1,z = 0.83. Right: gap in reward functions (1/Prior scores) between truth-telling and mis-reporting. Theorem 4.3. The mechanism designer can learn noisy copies of e 1,z , e 0,z , φ(·) for each agent i using data collected from agents j , i, satisfying that 4.4 Truth-telling is a dominant strategy 13 (1) |ẽ 1,z − e 1,z | ≤ ϵ, |e˜0,z − e 0,z | ≤ ϵ with probability at least 1 − δ . (2) For the scoring function φ(·) defined using ẽ 1,z , ẽ 0,z , we have with probability at least 1 − δ 1 that |φ̃(t, y) − φ(t, y)| ≤ ϵ1 , ∀t, y. q q log K  log K  1 1 ), ϵ = O + , δ = O( , δ 1 = O( K1 ) can be made arbitrarily All terms ϵ = O N1 + 1 K K N K small with increasing number of samples K and N . Proof can be found in Appendix. The main steps of the proof are based on Theorem 4.1 and sensitivity analysis of the solutions Eqn. (11,12). A set of simple simulation results are shown in Figure 1. We simulated a scenario with e 0,z = 0.85, e 1,z = 0.83, i.e., majority people are wrong from the reference set of agents. Nevertheless the Left side figure shows a nice decay in the errors of estimating e 0,z , e 1,z . The Right side figure shows the gap in expected score between truthful reporting and misreporting (denoted as ”Reward gap”) with the estimated e 0,z , e 1,z (for the same simulation setting). Indeed we show truthful reporting is better (positive gap, increasing with more accurate estimations of e 0,z , e 1,z ) even when majority of people are wrong (as e 0,z = 0.85, e 1,z = 0.83). 4.4 Truth-telling is a dominant strategy The above results readily imply that our strategy is asymptotically (in K, N ) dominant. To see this, suppose both ẽ 1,z , ẽ 0,z have converged to their true values. We define dominant truth serum as follows: Mechanism 2 Dominant Truth Serum (DTS) 1. For each task agent i received and reported information, randomly select one of the rest two reference reports (recall each task is randomly assigned to three agents) as the reference z. 2. When z is uninformative that ẽ 1,z + ẽ 0,z = 1: • Score agent i zero regardless of his report. 3. When z is informative that ẽ 1,z + ẽ 0,z , 1: • Score agents via (SSR alpha) defined using z, ẽ 1,z , ẽ 0,z . (with possible scalings) Note again in above, if the collected reports are in the format of prediction, we will draw a signal according to the reported prediction - this is the z that we will use. Theorem 4.4. Asymptotically it is a dominant strategy for agent i to report truthfully under DTS. Proof. First for the case that ẽ 1,z + ẽ 0,z = 1, it is indifferent for agent i to truthfully report, or to misreport, or to randomize between the two strategies. Thus truth-telling is a weakly dominant strategy. When ẽ 1,z +ẽ 0,z , 1, the dominant strategy argument follows from the strictly properness  of (SSR alpha). Remark 3. Several remarks follow. • We would like to emphasize again that both z and φ come from D−i : z will be decided by agents j , i’s reports D−i . φ not only has z as input, but its definition also depends on e 1,z and e 0,z , which will be learned from D−i . • When making decisions on reporting, we show under our mechanisms agents can choose to be oblivious of how much error presents in others’ reports. This removes the practical concern of implementing a particular Nash Equilibrium. • Another salient feature of our mechanism is that we have migrated the cognitive load for having prior knowledge from agents to the mechanism designer. Yet we do not assume the 14 4 DOMINANT TRUTH SERUM designer has direct knowledge neither; instead we will leverage the power of estimation from reported data to achieve our goal. Now we argue the dominant strategy in finite sample regime, under noisy estimations. We first define the informative region. When e 0,z + e 1,z is arbitrarily close to 1, we have the difficulty in determining the number of samples needed for the learning process. With this in mind, we will modify our mechanism to the following: • Pre-select a small constant 0 < κ < 1 (but close to 0). • When |ẽ 1,z + ẽ 0,z − 1| ≤ κ (instead of setting it to be exactly 0; this characterizes our informative region), pay agent i nothing; • Else follow our original mechanism and pay according to (SSR alpha). κ can then help us quantify the number of K, N needed. With this we prove the following theorem: Theorem 4.5. When set κ small enough, and K, N large enough, we have that with finite number of tasks: (1) For signal elicitation, it is a dominant strategy for each agent i to report si truthfully under DTS; (2) For prediction elicitation, it is a dominant strategy to report pi truthfully when S(·) is strictly concave in report ai and Lipschitz. (3) For prediction elicitation, it is an ϵ(K, Nq)-dominant strategy to report pi truthfully for any  log K 1 Lipschitz S(·), where ϵ(K, N ) = O N1 + K + K is a diminishing term in both K and N . Above we adopt the classical approximate-dominant strategy definition that truth-telling is ϵdominant strategy if E[φ(Ii , z)] > E[φ(ai , z)] − ϵ, ∀ai , Ii . The proof for the signal elicitation case is rather straightforward. We need to show that when the estimation errors of the error rates e 0,z , e 1,z are small enough, the scores under each basic reporting strategy (truthful, always reverting the observation, always reporting 1 and always reporting 0) will be close to the true score. Then the truthfulness follows from the strict properness of S. It is slightly more challenging for the prediction elicitation setting (reporting pi s), due to the continuous reporting space. The main idea is that when the estimation error drops below the regularization term that corresponds to S’s strict concavity, any possible gain from deviating from truthful reporting due to the error terms is less than the loss due to the drop in the regularization term. Note it is not hard to find strictly concave scoring function S - both Brier and logarithmic scores are strictly concave. 4.5 Weak dominance v.s. strong dominance We have shown when we cannot learn an informative enough reference report from the rest of the agents, there is very little we can do regarding that. With this note, our deterministic payment strategy is only weakly dominant. We argue that if agents’ reports can be modeled as being from certain distributions, the weak dominance case happens rarely. Í Denote by X i = ẽ 1,i +ẽ 0,i , the weakly dominant case happens only when j,i X j = 1. Potentially there are infinitely many strategies that lead to this state. However, suppose agents’ reporting strategies are drawn from a distribution defined over a continuous space (mixed strategy space), Í Í then we can easily argue that {ω : j,i X j (ω) = 1} (via taking j,i X j as a random variable) is a zero measure event. Also we would like to point out that, as long as each agent believes that this uninformative state happens with probability < 1, DTS induces strong dominant strategy in truthful reporting, as a non-trivial mix between weak and strong dominance returns strong dominance. 5.1 Learning the error rate 15 Í Also, as a matter of fact, j,i X j = 1 corresponds to the case that the reference signal is stochastically irrelevant to the ground truth. Theoretically speaking, there is little one can do for eliciting private signals using such a reference signal, via a peer prediction method. In practice, one can use screening tasks to remove some workers to move away from this uninformative state. 5 CORRELATED SIGNALS Earlier on, we have assumed that agents’ private signals are conditional independent (on ground truth). In this section, we discuss the generalization of our method to the case when agents’ observations are correlating with each other. The intuition for why we can hope for this extension is that we do not explore the correlation structure among signals explicitly. Technically this is due to our scoring system’s dependence on the reference answer z through e 1,z , e 0,z , which is independent of whether z is drawn from a set of independent signals or a set of correlated ones. Being correlated or not, as long as we can learn the average error rate from the rest of agents, we will have an unbiased score for each agent w.r.t. the ground truth signal. To extend our results, the only challenge we need to address is to accurately estimate Pr[z = 1|y = 0], Pr[z = 0|y = 1]. 5.1 Learning the error rate However, learning Pr[z = 1|y = 0], Pr[z = 0|y = 1] with correlated signals is not as straightforward as before. The reason is in Eqn. (9, 10) of our proposed method in Section 4.2, the second and thirdorder terms for characterizing the matching probability will not hold. Correlation among signals will violate the product structure of the matching equations we had earlier. Nonetheless we would like to stick with our idea of using the matching probabilities among agents to obtain additional information. We show this is not entirely hopeless: Lemma 5.1. The second order matching probabilities are the same for the cases with correlated and independent signals: Pr[z 1 = 1, z 2 = 1|y = 0] + Pr[z 1 = 0, z 2 = 0|y = 0] = Pr[z 1 = 1|y = 0] Pr[z 2 = 1|y = 0] + Pr[z 1 = 0|y = 0] Pr[z 2 = 0|y = 0] Pr[z 1 = 1, z 2 = 1|y = 1] + Pr[z 1 = 0, z 2 = 0|y = 1] = Pr[z 1 = 1|y = 1] Pr[z 2 = 1|y = 1] + Pr[z 1 = 0|y = 1] Pr[z 2 = 0|y = 1] With above lemma, we know the correlation structure does not affect estimating the second order matching probability. Similar to what we have detailed earlier that, the first order and second order equation together will help us reduce the possible solutions to at most two pairs. Particularly we can do the following: 1. Estimate q̃i using {ỹr idx (k) (k), k = 1, 2, ..., K, idx = 1, 2, 3}: ÍK 1(ỹr 1 (k) (k) = ỹr 2 (k) (k)) . q̃ −i = k=1 K i.e., q̃ −i is the empirical matching probability (on both 0 & 1). 2. Solve the following set of equations. 2 2 (I): P0 [e 0,z + (1 − e 0,z )2 ] + P1 [e 1,z + (1 − e 1,z )2 ] = q̃ −i , (II): P0e 0,z + P1 (1 − e 1,z ) = P̃1, −i . First notice that Eqn. (I) doesn’t contain additional information than 2 P0e 0,z + P1 (1 − e 1,z )2 = q 2, −i (please refer to Eqn. (9) in previous estimation) 16 5 CORRELATED SIGNALS , in light of P0e 0,z + P1 (1 − e 1,z ) as: 2 2 2 P0 [p0,z + (1 − p0,z )2 ] + P1 [p1,z + (1 − p1,z )2 ] = 2[P0p0,z + P1 (1 − p1,z )2 ] − 2[P0p0,z + P1 (1 − p1,z )] + 1 So they necessarily lead to the same set of solutions, and thus Lemma 4.2 will hold too. We need a third equation for picking the exact solution. The idea is to similarly check one order higher matching, but we will use Pr[z 1 = z 2 , z 3 = 1] instead of Pr[z 1 = z 2 = z 3 = 1]. To let our presentation stay focused, we make the following assumption: Assumption 1. With three drawn reference signals z 1 , z 2 , z 3 from j , i, we have Pr[z 1 , z 2 , z 3 |y] = Pr[z 1 , z 2 |y] · Pr[z 3 |y]. That is the conditional dependency is up to order two. This is not entirely unreasonable to assume: when signals’ correlations are due to a common set of observed attributes (e.g., essay length to essay quality), we can assume that one another signal z 2 already encodes sufficient correlational information with z 1 , and thus the conditional independence between (z 1 , z 2 ) and z 3 . We then note the following fact: adopting the short-hand notation x 1 := e 0,z , x 2 := 1 − e 1,z we show Pr[z 1 = z 2 , z 3 = 1] = P0 Pr[z 1 = z 2 , z 3 = 1|y = 0] + P1 Pr[z 1 = z 2 , z 3 = 1|y = 1] = P0 Pr[z 1 = z 2 |y = 0] Pr[z 3 = 1|y = 0] + P1 Pr[z 1 = z 2 |y = 1] Pr[z 3 = 1|y = 1] = P0 (x 12 + (1 − x 1 )2 )x 1 + P1 (x 22 + (1 − x 2 )2 )x 2 . The first equation is based on the Bayesian structure of ground truth signal. The second is due to Assumption 1. The third equation is due to Lemma 5.1. The following Lemma can then be established: Lemma 5.2. x1 + x2 = 1 Pr[z 1 = z 2 , z 3 = 1] − Pr[z 1 = z 2 ] Pr[z 1 = 1] + . 2P0 P1 (x 1 − x 2 )2 P0 P1 (x 1 − x 2 )2 Similarly with knowing |x 1 − x 2 | (jointly determined by the first order and second order equations, as detailed in Lemma 4.2), we are able to formulate another equation regarding x 1 , x 2 . All three parameters Pr[z 1 = z 2 , z 3 = 1], Pr[z 1 = z 2 ], Pr[z 1 = 1] are estimable from agents’ reports. Together with P0x 1 + P1x 2 = P1, −i , we are able to solve for x 1 , x 2 . The rest of arguments follow the proof of Theorem 4.1. 5.2 Application: removing curse of weak signals Extending our results to the correlated signal case not only removes one technical assumption, but also helps remove a curse for peer prediction introduced by the existence of weak but strongly correlated signals. Consider the case where besides the quality signal (i.e., the true signal we really want to elicit) si , each agent i also observes a cheap signal, denoting as sil . Such cheap signals often exist in practice. For example in peer grading, the length of an assignment is one of such signals. Cheap signals are often less accurate than the quality signals in that Pr[sil = 1|y = 0] > Pr[si = 1|y = 0], Pr[sil = 0|y = 1] > Pr[si = 0|y = 1], and further such weak signals do not always satisfy conditional independence in that Pr[sil , s lj |y] , Pr[sil |y] Pr[s lj |y]. Nonetheless it is also often true that weak signals correlate with each other more than the quality signals: Pr[sil , s lj |y] > Pr[si , s j |y]. The existence of weak signals has been observed to be harmful in that reporting such weak yet more correlated signals may lead to higher utilities for agents [Gao et al., 2016], as peer prediction 17 essentially checks the correlation among signals. Suppose si and sil are conditionally independent given y, formally we prove the following results. Theorem 5.3. When S is taken as the 1/Prior scoring rule, reporting si (instead of the weak signal sil ) is a dominant strategy with DTS. 6 DISCUSSIONS AND CONCLUDING REMARKS Recovering the ground truth. Though being a fundamental step, truthful elicitation is also often not the ultimate goal, as the mechanism designer may want to infer the ground truth answer in the end. As a by-product, our framework for inferring the error rates from agents would allow us to do so. The reasoning is as follows: first ask each agent j , i to report a label. If the ground truth label is 0, the posterior distribution of agents’ reports being 1 will converge to e 0,z with high probability; while on the other hand, if the ground truth is 1, this posterior distribution converges to 1 − e 1,z . When e 0,z , 1 − e 1,z (reference answer being informative), we will know the ground truth label with high probability via posterior distribution testing. Unbiased estimator of the true score. Our paper proposes a novel and robust way for quantifying the quality of information when there is no ground truth verification, using peer evaluation, as well as an estimation procedure for learning the bias in peer evaluation. This may find applications in a sequential elicitation setting, where such scores can provide informative feedbacks to contributed information before the outcome reveals. Effort exertion. So far our discussion focuses on eliciting truthful reports, our results extend to the scenario for eliciting high quality data. For instance, when workers can choose to exert costly effort (consider a binary effort level case, and denote the cost as c for exerting efforts) to improve the quality of their answers, and once the reference signal is informative (either positively or negatively), we can scale up the scoring functions to cover the cost c, as similarly done in [Miller et al., 2005], to establish the dominance of reporting a high-effort signal. Heterogeneous error rates. In order to estimate error rates correctly, we needed to make the assumption that agents have homogeneous error rates over multiple tasks. We now discuss the applicability of our method in light of the heterogeneity issue. First we would like to emphasize that in practice, for each set of experiments we can choose to group tasks according to their types (e.g., image labeling, solving puzzles, objects recognition), and run our mechanism over each group separately. For this setting, we can assume the homogeneity more comfortably. When it is not quite possible to group tasks together, suppose that each human agent’s error rates are also task contingent in that for each possible task, we show our solution can be viewed as a linear approximation for this task contingent case. We have more details on this matter in the Appendix. A Machine Learning method. To echo recent works on using machine learning techniques [Liu and Chen, 2017] to learn a machine learning model to generate a reference answer, instead soliciting from other agents, we show this idea is also ready to be plugged into our SSR solution framework. Consider the current task that needs to be elicited and denote its feature vector as x ∈ Rd . Suppose we have learned (following the results in [Liu and Chen, 2017], such a classifier is learnable purely from agent’s reported noisy data) a good classifier f˜ ∗ (x) for predicting its true outcome. Replace the reference answer z with f˜ ∗ (x) and plug in its error rates. The rest of job is to reason about e 1,z , e 0,z (for f˜ ∗ (x)). There are possibly many different ways to do so. We sketch its possibility when there is again no ground truth label being available in Appendix. 18 6 DISCUSSIONS AND CONCLUDING REMARKS Conclusion. In this paper we propose surrogate scoring rules (SSR), which complement the literature of strictly proper scoring rules by considering the setting when there is only access to a noisy copy of the ground truth. We further extend SSR to the peer prediction setting where the noisy ground truth can only be inferred via collecting reports from other reference agents. This returns us a dominant truth serum (DTS), which achieves truthful elicitation in dominant strategy. REFERENCES Dana Angluin and Philip Laird. 1988. Learning from noisy examples. Machine Learning 2, 4 (1988), 343–370. Glenn W Brier. 1950. Verification of forecasts expressed in terms of probability. Monthey Weather Review 78, 1 (1950), 1–3. Tom Bylander. 1994. Learning linear threshold functions in the presence of classification noise. In Proceedings of the seventh annual conference on Computational learning theory. ACM, 340–347. Anirban Dasgupta and Arpita Ghosh. 2013. Crowdsourced judgement elicitation with endogenous proficiency. In Proceedings of the 22nd international conference on World Wide Web. International World Wide Web Conferences Steering Committee, 319–330. Rafael Frongillo and Ian A Kash. 2015. Vector-valued property elicitation. In Conference on Learning Theory. 710–727. Alice Gao, James R Wright, and Kevin Leyton-Brown. 2016. Incentivizing evaluation via limited access to ground truth: Peer-prediction makes things worse. arXiv preprint arXiv:1606.07042 (2016). Xi Alice Gao, Andrew Mao, Yiling Chen, and Ryan Prescott Adams. 2014. Trick or treat: putting peer prediction to the test. In Proceedings of the fifteenth ACM conference on Economics and computation. ACM, 507–524. Tilmann Gneiting and Adrian E. Raftery. 2007. Strictly Proper Scoring Rules, Prediction, and Estimation. J. Amer. Statist. Assoc. 102, 477 (2007), 359–378. Victor Richmond Jose, Robert F. Nau, and Robert L. Winkler. 2006. Scoring Rules, Generalized Entropy and utility maximization. (2006). Working Paper, Fuqua School of Business, Duke University. R. Jurca and B. Faltings. 2006. Minimum payments that reward honest reputation feedback. In Proceedings of the 7th ACM conference on Electronic commerce (EC ’06). ACM, 190–199. Yuqing Kong and Grant Schoenebeck. 2016a. Equilibrium selection in information elicitation without verification via information monotonicity. arXiv preprint arXiv:1603.07751 (2016). Yuqing Kong and Grant Schoenebeck. 2016b. A Framework For Designing Information Elicitation Mechanisms That Reward Truth-telling. arXiv preprint arXiv:1605.01021 (2016). N.S. Lambert, D.M. Pennock, and Y. Shoham. 2008. Eliciting properties of probability distributions. In Proceedings of the 9th ACM Conference on Electronic Commerce (EC ’08). ACM, 129–138. Yang Liu and Yiling Chen. 2017. Machine Learning aided Peer Prediction. ACM EC (June 2017). Yang Liu and Mingyan Liu. 2015. An Online Learning Approach to Improving the Quality of Crowd-Sourcing. In Proceedings of the 2015 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS ’15). ACM, New York, NY, USA, 217–230. DOI:http://dx.doi.org/10.1145/2745844.2745874 James E Matheson and Robert L Winkler. 1976a. Scoring rules for continuous probability distributions. Management science 22, 10 (1976), 1087–1096. James E. Matheson and Robert L. Winkler. 1976b. Scoring Rules for Continuous Probability Distributions. Management Science 22, 10 (1976), 1087–1096. Aditya Menon, Brendan Van Rooyen, Cheng Soon Ong, and Bob Williamson. 2015. Learning from corrupted binary labels via class-probability estimation. In International Conference on Machine Learning. 125–134. Nolan Miller, Paul Resnick, and Richard Zeckhauser. 2005. Eliciting Informative Feedback: The Peer-Prediction Method. Management Science 51, 9 (2005), 1359 –1373. Allan H Murphy and Robert L Winkler. 1970. Scoring rules in probability assessment and evaluation. Acta psychologica 34 (1970), 273–286. Nagarajan Natarajan, Inderjit S Dhillon, Pradeep K Ravikumar, and Ambuj Tewari. 2013. Learning with noisy labels. In Advances in neural information processing systems. 1196–1204. Dražen Prelec. 2004. A Bayesian Truth Serum for Subjective Data. Science 306, 5695 (2004), 462–466. G. Radanovic and B. Faltings. 2013. A Robust Bayesian Truth Serum for Non-Binary Signals. In Proceedings of the 27th AAAI Conference on Artificial Intelligence (AAAI ’13). Leonard J Savage. 1971. Elicitation of personal probabilities and expectations. J. Amer. Statist. Assoc. 66, 336 (1971), 783–801. Clayton Scott. 2015. A Rate of Convergence for Mixture Proportion Estimation, with Application to Learning from Noisy Labels.. In AISTATS. Clayton Scott, Gilles Blanchard, Gregory Handy, Sara Pozzi, and Marek Flaska. 2013. Classification with Asymmetric Label Noise: Consistency and Maximal Denoising.. In COLT. 489–511. 19 V. Shnayder, A. Agarwal, R. Frongillo, and D. C. Parkes. 2016. Informed Truthfulness in Multi-Task Peer Prediction. ACM EC (March 2016). arXiv:cs.GT/1603.03151 Brendan van Rooyen and Robert C Williamson. 2015. Learning in the Presence of Corruption. arXiv preprint arXiv:1504.00091 (2015). Robert L. Winkler. 1969. Scoring rules and the evaluation of probability assessors. J. Amer. Statist. Assoc. 64, 327 (1969), 1073–1078. Jens Witkowski, Pavel Atanasov, Lyle H Ungar, and Andreas Krause. 2017. Proper proxy scoring rules. Jens Witkowski, Yoram Bachrach, Peter Key, and David C. Parkes. 2013. Dwelling on the Negative: Incentivizing Effort in Peer Prediction. In Proceedings of the 1st AAAI Conference on Human Computation and Crowdsourcing (HCOMP’13). J. Witkowski and D. Parkes. 2012. A Robust Bayesian Truth Serum for Small Populations. In Proceedings of the 26th AAAI Conference on Artificial Intelligence (AAAI ’12). 20 6 DISCUSSIONS AND CONCLUDING REMARKS APPENDIX PROOF OF LEMMA 2.2 Proof. Suppose not we will have Pr[y = 0|si = 0] = Pr[y = 0|si = 1], (13) Pr[y = 1|si = 0] = Pr[y = 1|si = 1]. (14) From Eqn. (13) we know that Pr[y = 0, si = 1] Pr[y = 0, si = 0] = Pr[si = 1] Pr[si = 0] Pr[y = 0](1 − e 0,i ) Pr[y = 0]p0,i = , ⇔ Pr[si = 1] Pr[si = 0] when Pr[y = 0] , 0 we know that e 0,i Pr[si = 1] . = Pr[si = 0] 1 − e 0,i (15) Pr[si = 1] 1 − e 1,i . = Pr[si = 0] e 1,i (16) Similarly from Eqn. (14) we know Therefore we know e 0, i 1−e 0, i = 1−e 1, i e 1, i from which we know e 0,i + e 1,i = 1. Contradiction.  PROOF OF LEMMA 3.1 Proof. This can be fairly easily established by noting the following: by truthful reporting agent i’s expected score is Pr[y = si |si ] Pr[y = si ] > = 1. E[S(si , y)|si ] = Pr[y = si ] Pr[y = si ] On the other hand, by reverting the observation, the agent has E[S(1 − si , y)|si ] = Pr[y = 1 − si |si ] Pr[y = 1 − si ] < = 1. Pr[y = 1 − si ] Pr[y = 1 − si ] Both of above inequalities are due to Bayesian informativeness (and correspondingly negative Bayesian informativeness).  PROOF OF THEOREM 4.3 Proof. Estimation error due to heterogeneous agents: The first challenge lies in the fact that the higher order equations doesn’t capture the true matching probability with heterogeneous workers. If we assign one task (to be labeled) to two different workers, due to the asymmetric error rate, the LHS of Eqn. (I) is not precise– drawing a worker without replacement leads to a different labeling accuracy, and will complicate the solution for the system of equations. We show that our estimation, though being ignoring above bias, will not affect our results by too much: denoting by e 1 the accuracy of first drawn sample (for checking the matching) when y = 1 (we can similarly argue for y = 0). Then we have E[e 1 ] = e 1,z . And the average accuracy of the second drawn 21 sample e 2 (conditional on e 1 ) is given by following: e 1, z (N −1)−e 1 . N −2 Further the matching probability satisfies the   E[e 1 · e 2 ] = E E[e 1 · e 2 |e 1 ]   e 1,z (N − 1) − e 1 =E e 1 · N −2 e 1,z (N − 1) E[e 12 ] =E[e 1 ] · − N −2 N −2 E[e 12 ] N −1 2 e − = N − 2 1,z N − 2 Note both e 1,z and E[e 12 ] are no more than 1. Then | 2 | |e 1,z E[e 12 ] E[e 12 ] N −1 2 2 e 1,z − − e 1,z |≤ + ≤ . N −2 N −2 N −2 N −2 N −2 That the estimated quantity is bounded away from the true parameter by at most Θ(1/N ). Similarly for the third order equation we have 3 |E[e 1 · e 2 · e 3 ] − e 1,z |≤ 3 . N −3 Estimation errors due to finite estimation samples: The second sources of errors come from the estimation errors of q̃ 2, −i , q̃ 3, −i and P̃1, −i . We have the following lemma: Lemma 6.1. When there are K samples for estimating q̃ 2, −i , q̃ 3, −i and P̃1, −i respectively (total budgetlog 6/δ ing 3K) and K ≥ 2ϵ 2 for any ϵ, δ > 0, we have with probability at least 1 − δ |q̃ 2, −i − q 2, −i | ≤ ϵ + 3 2 , |q̃ 3, −i − q 3, −i | ≤ ϵ + , |P̃1, −i − P1, −i | ≤ ϵ. N −2 N −3 The above lemma can be easily established using Chernoff bound, and our arguments in estimating with heterogeneous agents above. We now bound the error in estimating p0,z , p1,z , under the (ϵ, δ )-event proved in Lemma 6.1. First of all |e˜0,z     q̃ 3, −i − q̃ 2, −i P̃1, −i q 3, −i − q 2, −i P1 1 1 P1 − P̃1, −i − − e 0,z | = | P1 − P1, −i P1 − P0 q̃ 2, −i − (P̃1, −i )2 P1 − P0 q 2, −i − P12   q̃ 3, −i − q̃ 2, −i P̃1, −i q 3, −i − q 2, −i P1 1 | |P + | P̃ − P | ≤ − 1 1, −i 1, −i . P1 − P0 q̃ 2, −i − (P̃1, −i )2 q 2, −i − P12 According to Lemma 7 of [Liu and Liu, 2015], which we reproduce as follows: Lemma 6.2. For k ≥ 1 and two sequences {li }im=1 and {qi }im=1 and 0 ≤ li , qi ≤ 1, ∀i = 1, ..., k., we have | m Ö i =1 li − m Ö j=1 qj | ≤ m Õ i =1 |li − qi | . (17) 22 6 DISCUSSIONS AND CONCLUDING REMARKS We know the following facts 2 N −2 − q 2, −i P1, −i | |q̃ 2, −i − (P̃1, −i )2 ) − (q 2, −i − P1,2 −i )| ≤ |(P̃1, −i )2 − P1,2 −i | + |q̃ 2, −i − q 2, −i | ≤ 3ϵ + |(q̃ 3, −i − q̃ 2, −i P̃1, −i ) − (q 3, −i − q 2, −i P1, −i )| ≤ |q̃ 3, −i − q 3, −i | + |q̃ 2, −i P̃1, −i 2 3 ≤ 3ϵ + + . N −2 N −3 First we prove that q 2, −i − P1,2 −i =P0x 12 + P1x 22 − (P0x 1 + P1x 2 )2 = P0 P1 (x 1 − x 2 )2 ≥ P0 P1κ 2 . Let 3ϵ + 2 N −2 | ≤ P0 P1κ 2 /2, we know that (using mean-value theorem/inequality) q̃ 3, −i − q̃ 2, −i P̃1, −i q̃ 2, −i − (P̃1, −i )2 − q 3, −i − q 2, −i P1, −i q̃ 3, −i − q̃ 2, −i P̃1, −i q 3, −i − q 2, −i P1, −i − | |≤| 2 q 2, −i − P1 q̃ 2, −i − (P̃1, −i )2 q̃ 2, −i − (P̃1, −i )2 q 3, −i − q 2, −i P1, −i q 3, −i − q 2, −i P1, −i | +| − q 2, −i − P1,2 −i q̃ 2, −i − (P̃1, −i )2 ≤2 ϵ+ 2 3 N −2 + N −3 κ 2 P02 P12 +2 2 N −2 . (κ 2 P02 P12 )2 ϵ+ Together we proved that |e˜0,z   ϵ + N2−2 + N3−3 ϵ + N2−2 1 2P1 + 2P1 2 2 2 2 + ϵ . − e 0,z | ≤ P1 − P0 κ 2 P02 P12 (κ P0 P1 ) Similarly we are able to work out sensitivity analysis for e 1,z that   ϵ + N2−2 ϵ + N2−2 + N3−3 1 |e˜1,z − e 1,z | ≤ + 2P0 2 2 2 2 + ϵ . 2P0 P1 − P0 κ 2 P02 P12 (κ P0 P1 ) q log K  . With the error rates bounds for Summarizing and set δ = O( K1 ) we have ϵ = O N1 + K e 0,z , e 1,z , from Lemma 5.4 [Liu and Chen, 2017], which we reproduce in our contexts as follows: Lemma 6.3. When K, N are large enough s.t. ϵ ≤ (1 −e 0,z −e 1,z )/4 := ∆e , with probability at least e 1 − 2δ , |φ̃(t, y) − φ(t, y)| ≤ 1+∆ · ϵ. 2∆2 e We then obtain a bound on estimating φ(·).  PROOF OF THEOREM 4.5 Proof. Suppose |e 0,z + e 1,z − 1| ≥ 2κ. Then when the estimation errors are small enough such that |ẽ 0,z − e 0,z | + |ẽ 1,z − e 1,z | ≤ κ, we know that |ẽ 0,z + ẽ 1,z − 1| ≥ κ. Denote by ∆φ = E[S(si , y)] − max E[S(ai , y)], ai ,si the minimum gap between the scores for truthfully reporting and mis-reporting. We can easily show that ∆φ > 0 for signal elicitation case, as we can take ai to be the three basis of mis-reporting: always reverting the observation, always reporting 1 and always reporting 0. Then with a noisy estimation of φ(·), we have (using Theorem 4.3) |E[φ̃(ai , z)] − E[φ(ai , z)]| ≤ ϵ1 + δ 1 · max φ̃, ∀ai . 23 Above, we implicitly assumed the boundedness of φ̃(·): notice with bounded scoring function S . Since E[φ(si , z)] = E[S(si , y)], choose ϵ1 , δ 1 such that S, indeed we know that max φ̃ ≤ 2 max κ ϵ1 + δ 1 · max φ̃ < ∆φ /2 we will have (for ai , si ) E[φ̃(si , z)] > E[S(si , y)] − ∆φ /2 > E[S(ai , y)] + ∆φ /2 > E[φ̃(ai , z)]. i.e., the strict properness will preserve, under the noisy estimations. From above results we also observe that a larger ∆φ will allow more noisy estimations. We thus can trade more payment with sample complexity, via designing the strictly proper scoring functions to increase ∆φ . Now consider the prediction elicitation case. Suppose that S(p, y) is strictly concave w.r.t. p ∀y with parameter λ. ˜ i , y) = S(ai , y) + ϵ(ai , y) , S(a where ϵ(ai , y) indicates the error term. First notice that E[S(ai , y)] − E[S(ai′ , y)] ≥ λ|ai − ai′ |. Further we notice that ˜ i , y) − S(ai , y) ϵ(ai , y) = S(a 1 − ẽ 1−y,z 1 − e 1−y,z − )S(ai , y) 1 − ẽ 1,z − ẽ 0,z 1 − e 1,z − e 0,z ey,z ey,z − )S(ai , −y). −( 1 − e 1,z − e 0,z 1 − e 1,z − e 0,z Due to the sample complexity results we know that with probability at least 1 − δ that 1 − ẽ 1−y,z 1 − e 1−y,z | − | ≤ ϵ1 , 1 − ẽ 1,z − ẽ 0,z 1 − e 1,z − e 0,z ey,z ey,z − | ≤ ϵ1 . | 1 − e 1,z − e 0,z 1 − e 1,z − e 0,z =( Suppose S(p, y) is also Lipschitz w.r.t. p ∀y with parameter L. By Lipschitz conditions we know that δ |E[ϵ(ai , y)] − E[ϵ(ai , y)]| ≤ ϵ1 L · |ai − ai′ | + 2 L · |ai − ai′ |. κ Therefore when ϵ1 , δ are small enough such that δ ϵ1 L + 2 L < λ, κ no deviation is profitable. q  log K 1 The ϵ(K, N ) = ϵ1 L + κδ2 L = O N1 + K + K -dominant strategy argument follows naturally from above error term analysis. We will not repeat the details.  HETEROGENEOUS ERROR RATES ACROSS TASKS In order to estimate error rates correctly, we needed to make the assumption that human workers have homogeneous error rates across multiple tasks. We now discuss the applicability of our method in light of the heterogeneity issue. Before starting, we would like to emphasize that in practice, for each set of experiments we can choose to group tasks according to their types (e.g., image labeling, solving puzzles, objects recognition), and run our mechanism over each group separately. For this setting, we can assume the homogeneity more comfortably. 24 6 DISCUSSIONS AND CONCLUDING REMARKS Nonetheless when it is not quite possible to group tasks together, suppose that each human agent’s error rates are also task contingent in that for each possible task x with y ∼ P := {P0 , P1 } we have e 0,i (y), e 1,i (y). Redefine the error rate of the reference answer as follows: Í Í j,i Ex,y |y=0 [ẽ 0, j (x)] j,i Ex,y |y=1 [ẽ 1, j (x)] , e 0,z = . e 1,z = N −1 N −1 Again e 1,z , e 0,z captures the error rate of the reference answer. With knowing e 1,z , e 0,z , the dominant strategy argument in Theorem 3.4 holds. So far so good. However it becomes less clear in how to estimate e 1,z , e 0,z . If we follow the idea in Section 4.2, the first order equation holds as before Í Í j,i Ex,y |y=0 [ẽ 0, j (x)] j,i Ex,y |y=1 [ẽ 1, j (x)] P0 + P1 (1 − ) = P1, −i , N −1 N −1 i.e., P0e 0,z + P1 (1 − e 1,z ) = P1, −i . However the higher order matching statistics appear to be very different. For example, the second order matching probability between two agents on label 1 becomes Í Í 2 2 j,i Ex,y |y=0 [ẽ 0, j (x)] j,i Ex,y |y=1 [1 − ẽ 1, j (x)] P0 + P1 = P1, −i , N −1 N −1 Instead we would like a equation as a function of Í 2  Í 2 j,i Ex,y |y=0 [ẽ 0, j (x)] j,i Ex,y |y=1 [1 − ẽ 1, j (x)] , N −1 N −1 in order to identify the true error rates on average. To get around of this issue, we can adopt the following approximation for ẽ 0,2 j (x) using Taylor expansion: 2 2 ẽ 0,2 j (x) ≈ e 0,z + 2e 0,z (ẽ 0, j (x) − e 0,z ) = 2e 0,z · ẽ 0, j (x) − e 0,z . Then we claim that Í j,i Ex,y |y=0 [ẽ 0,2 j (x)] N −1 ≈ Í j,i 2 ] Ex,y |y=0 [2e 0,z · ẽ 0, j (x) − e 0,z N −1 2 2 = 2e 0,z · e 0,z − e 0,z = e 0,z Similarly we have Í j,i Ex,y |y=1 [1 − ẽ 1,2 j (x)] ≈ (1 − e 1,z )2 . N −1 From above, we see we are able to recover the matching equations defined in our earlier solution for task homogeneous cases; and it can be viewed as a linear approximation for this task contingent case. PROOF OF LEMMA 5.1 Proof. W.l.o.g., consider y = 0. We first derive the following difference term Pr[z 1 = 1, z 2 = 1|y = 0] − Pr[z 1 = 1|y = 0] Pr[z 2 = 1|y = 0] = (Pr[z 1 = 1|z 2 = 1, y = 0] − Pr[z 1 = 1|y = 0]) Pr[z 2 = 1|y = 0] = (Pr[z 1 = 1|z 2 = 1, y = 0] − Pr[z 1 = 1|z 2 = 1, y = 0] Pr[z 2 = 1|y = 0] − Pr[z 1 = 1|z 2 = 0, y = 0] Pr[z 2 = 0|y = 0]) Pr[z 2 = 1|y = 0] = Pr[z 2 = 0|y = 0] Pr[z 2 = 1|y = 0](Pr[z 1 = 1|z 2 = 1, y = 0] − Pr[z 1 = 1|z 2 = 0, y = 0]). 25 On the other hand, Pr[z 1 = 0, z 2 = 0|y = 0] − Pr[z 1 = 0|y = 0] Pr[z 2 = 0|y = 0] = (Pr[z 1 = 0|z 2 = 0, y = 0] − Pr[z 1 = 0|y = 0]) Pr[z 2 = 0|y = 0] = (Pr[z 1 = 0|z 2 = 0, y = 0] − Pr[z 1 = 0|z 2 = 0, y = 0] Pr[z 2 = 0|y = 0] − Pr[z 1 = 0|z 2 = 1, y = 0] Pr[z 2 = 1|y = 0]) Pr[z 2 = 0|y = 0] = Pr[z 2 = 0|y = 0] Pr[z 2 = 1|y = 0](Pr[z 1 = 0|z 2 = 1, y = 0] − Pr[z 1 = 0|z 2 = 0, y = 0]). The above two terms add up to 0. The proof for y = 1 is symmetric. Proved.  PROOF OF LEMMA 5.2 Proof. Pr[z 1 = z 2 , z 3 = 1] − Pr[z 1 = z 2 ] Pr[z 1 = 1] = P0 (x 12 + (1 − x 1 )2 )x 1 + P1 (x 22 + (1 − x 2 )2 )x 2   − P0 (x 12 + (1 − x 1 )2 ) + P1 (x 22 + (1 − x 2 )2 ) (P0x 1 + P1x 2 ) = P0 P1 (x 1 − x 2 )2 (2(x 1 + x 2 ) − 1). (18) Similarly with knowing |x 1 −x 2 | (jointly determined by the first order and second order equations, as detailed in Lemma 4.2), we are able to formulate another equation regarding x 1 , x 2 that x1 + x2 = 1 Pr[z 1 = z 2 , z 3 = 1] − Pr[z 1 = z 2 ] Pr[z 1 = 1] + . 2P0 P1 (x 1 − x 2 )2 P0 P1 (x 1 − x 2 )2  PROOF OF THEOREM 5.3 Proof. We only need to prove for the case when si , sil , there is no incentive for agents to report sil . With accurately learning e 0,z , e 1,z , we know E[φ(ai , z)|si , sil ] = E[S(ai , y)|si , sil ] = Pr[y = ai |si , sil ] Pr[y = ai ] Suppose si = 1 − ŝ, sil = ŝ. Next we prove that Pr[y = 1 − ŝ|si = 1 − ŝ, sil = ŝ] > P1−ŝ Pr[y = ŝ |si = 1 − ŝ, sil = ŝ] < Pŝ following which, our claim is clearly true. First ˆ sil = ŝ] = Pr[y = ŝ |si = 1 − s, = ˆ si = 1 − ŝ, sil = s] ˆ Pr[y = s, Pr[si = 1 − ŝ, sil = ŝ |y = ŝ]Py=ŝ Pr[si = 1 − ŝ, sil = ŝ] ˆ Pr[si = 1 − ŝ, sil = s] . 26 6 DISCUSSIONS AND CONCLUDING REMARKS Then ˆ < Pŝ Pr[y = ŝ |si = 1 − ŝ, sil = s] ˆ < Pr[si = 1 − s, ˆ sil = ŝ] ⇔ Pr[si = 1 − ŝ, sil = ŝ |y = s] Õ Pŷ · Pr[si = 1 − ŝ|y = ŷ] Pr[sil = ŝ |y = ŷ] ⇔ Pr[si = 1 − ŝ |y = ŝ] Pr[sil = ŝ|y = ŝ] < ŷ ⇔ Pr[si = 1 − ŝ |y = ⇔ Pr[si = 1 − ŝ |y = ŝ](1 − Pr[sil = 1 − ŝ |y = ŝ]) ŝ] < Pr[sil = 1 − ŝ|y = ŝ], < (1 − Pr[si = 1 − ŝ |y = ŝ]) Pr[sil = 1 − ŝ|y = ŝ] which holds by the definition of weak signal (a higher error rate).  A MACHINE LEARNING METHOD Suppose that each task is associated with a corresponding feature vector. Consider the current task that needs to be elicited and denote its feature vector as x ∈ Rd . Suppose we have learned (following the results in [Liu and Chen, 2017], such a classifier is learnable purely from agent’s reported noisy data) a good classifier f˜ ∗ (x) for predicting its true outcome. Our ML-aided SSR simply works in the following ways: replacing the reference answer z with f˜ ∗ (x) and plug in its error rates. The rest of job is to reason about e 1,z , e 0,z (for f˜ ∗ (x)). There are possibly many different ways of doing so. We demonstrate its possibility when there is again no ground truth label being available with the following simple estimation procedure: • Assign K tasks x1 , x2 , ..., xK to three randomly drawn peers, denote them as ziref (xk ), i = 1, 2, 3, k = 1, 2, ..., K. • Estimate Pr[ f˜ ∗ (xi ) = z 1ref (xi ) = 1] and Pr[ f˜ ∗ (xi ) = 1]. • Estimate Pr[z 1ref (xi ) = 1|y = 0] (follow Mechanism 1) using the three reference answers ziref (xk ), i = 1, 2, 3, k = 1, 2, ..., K. Then note the following fact: Pr[ f˜ ∗ (xi ) = z ref (xi ) = 1] = P0 Pr[ f˜ ∗ (xi ) = 1|y = 0] Pr[z ref (xi ) = 1|y = 0] 1 1 + P1 Pr[ f˜ ∗ (xi ) = 1|y = 1] Pr[z 1ref (xi ) = 1|y = 1] Together with Pr[ f˜ ∗ (xi ) = 1] = P0 Pr[ f˜ ∗ (xi ) = 1|y = 0] + P1 Pr[ f˜ ∗ (xi ) = 1|y = 1], we will be able to solve for e 1,z , e 0,z when we have a good estimates of Pr[ f˜ ∗ (xi ) = z 1ref (xi ) = 1] and Pr[ f˜ ∗ (xi ) = 1], and that Pr[z 1ref (xi ) = 1|y = 0] , Pr[z 1ref (xi ) = 1|y = 1]. With above argument, we see that we will be able to achieve dominant strategy scorings without even the need of reassigning all tasks.
2cs.AI
Learning from Survey Training Samples: Rate Bounds for Horvitz-Thompson Risk Minimizers arXiv:1610.03316v1 [math.ST] 11 Oct 2016 Stéphan Clémençon∗, Patrice bertail†, Guillaume Papa∗ October 12, 2016 Abstract The generalization ability of minimizers of the empirical risk in the context of binary classification has been investigated under a wide variety of complexity assumptions for the collection of classifiers over which optimization is performed. In contrast, the vast majority of the works dedicated to this issue stipulate that the training dataset used to compute the empirical risk functional is composed of i.i.d. observations and involve sharp control of uniform deviation of i.i.d. averages from their expectation. Beyond the cases where training data are drawn uniformly without replacement among a large i.i.d. sample or modelled as a realization of a weakly dependent sequence of r.v.’s, statistical guarantees when the data used to train a classifier are drawn by means of a more general sampling/survey scheme and exhibit a complex dependence structure have not been documented in the literature yet. It is the main purpose of this paper to show that the theory of empirical risk minimization can be extended to situations where statistical learning is based on survey samples and knowledge of the related (first order) inclusion probabilities. Precisely, we prove that minimizing a (possibly biased) weighted version of the empirical risk, refered to as the (approximate) Horvitz-Thompson risk (HT risk), over a class of controlled complexity lead to a rate for the excess risk of the order OP ((κN (log N)/n)1/2 ) with κN = (n/N)/ mini≤N πi , when data are sampled by means of a rejective scheme of (deterministic) size n within a statistical population of cardinality N ≥ n, a generalization of basic sampling without replacement with unequal probability weights πi > 0. Extension to other sampling schemes are then established by a coupling argument. Beyond theoretical results, numerical experiments are displayed in order to show the relevance of HT risk minimization and that ignoring the sampling scheme used to generate the training dataset may completely jeopardize the learning procedure. 1 Introduction Whereas statistical learning techniques crucially exploit data that can serve as examples to train a decision rule, they may also make use of weights individually assigned to the observations, resulting from survey sampling stratification. Such weights could correspond either to true inclusion probabilities or else to calibrated or post-stratification weights, minimizing some discrepancy under certain margin constraints for the inclusion probabilities. In the context of statistical inference based on survey data, the asymptotic properties of specific statistics such as Horvitz-Thompson ∗ LTCI, Télécom ParisTech, Université Paris-Saclay, 75013, Paris, France. {stephan.clemencon,guillaume.papa}@telecom-paristech.fr † Université Paris Ouest-Nanterre-La Défense, MODALX, Nanterre, France. [email protected] 1 estimators (cf [14]), whose computation involves not only the observations but also the weights, have been widely investigated: in particular, mean estimation and regression have been the subject of much attention, refer to [13], [20], [3] for instance, and a comprehensive functional limit theory for distribution function estimation is progressively documented in the statistical literature, see [8], [7], [21]. At the same time, the last decades have witnessed a rapid development of the field of machine-learning. Revitalized by different breakout algorithms (e.g. SVM, boosting methods), its practice is now supported by a sound probabilistic theory based on recent non asymptotic results in the study of empirical processes, see [17], [5]. However, most papers dedicated to theoretical results grounding the Empirical Risk Minimization approach (ERM in short), the main paradigm of statistical learning, assume that the training of a decision rule is based on a dataset formed of independent replications of a generic random vector Z, a collection of N ≥ 1 i.i.d. observations Z1 , . . . , ZN namely. In contrast, few results are available in situations where the training dataset is generated by a more complex sampling scheme. One may refer to [1] for concentration inequalities permitting to study the generalization ability of empirical risk minimizers when the training data are obtained by standard sampling without replacement (SWOR in abbreviated form) or to [24] in the case where the decision rule is learnt from a path of a weakly dependent stochastic process. It is the goal of this paper to extend the ERM theory to situations where the training dataset is generated by means of a more general sampling scheme, with possibly unequal probability weights. We first consider the case of rejective sampling (sometimes refered to as conditional Poisson sampling), an important generalization of basic SWOR. The rate bound results obtained by means of properties of so-termed negatively associated random variables in this case are next shown to extend to a class of more general sampling schemes by a coupling argument. In addition, numerical experiments have been carried out in order to provide empirical evidence of the approach developed. They show in particular that statistical accuracy of the ERM approach may go down the drain if the sampling scheme underlying the training dataset is ignored. The paper is organized as follows. In section 2, the probabilistic framework of the present study is described at length and basic results of the probabilistic theory of classification are briefly recalled, together with some important notions of survey theory. The main theoretical results are stated in section 3, while illustrative numerical experiments are presented in section 4. Certain proofs are sketched in the Appendix section, whereas additional technical details are deferred to the Supplementary Material. 2 Background and Preliminaries As a first go, we start with recalling key concepts pertaining to the theory of empirical risk minimization in binary classification, the flagship problem in statistical learning. A few notions related to survey theory are next described, which will be involved in the subsequent analysis. Throughout the article, the indicator function of any event E is denoted by I{E}, the Dirac mass at any point a by δa , the power set of any set E by P(E), the cardinality of any finite set A by #A. 2.1 Binary Classification - Empirical Risk Minimization Theory The binary classification problem is considered as a running example all along the paper. Because it can be easily formulated, it is undeniably the most documented statistical learning problem in the literature and certain results extend to more general frameworks (e.g. multiclass classification, 2 regression, ranking). Let (Ω, A, P) be a probability space and (X, Y) a random pair defined on (Ω, A, P), taking its values in some measurable product space X × {−1, +1}, with common distribution P(dx, dy): the r.v. X models some observation, hopefully useful for predicting the binary label Y. The distribution P can also be described by the pair (F, η) where F(dx) denotes the marginal distribution of the input variable X and η(x) = P{Y = +1 | X = x}, x ∈ X , is the posterior distribution. The objective is to build, based on the training dataset at disposal, a measurable mapping g : X 7→ {−1, +1}, called a classifier, with minimum risk: def L(g) = P{g(X) 6= Y}. (1) It is well-known folklore in the probabilistic theory of pattern recognition that the Bayes classifier g∗ (x) = 2I{η(x) ≥ 1/2} − 1 is a solution of the risk minimization problem inf g L(g), where the infimum is taken over the collection of all classifiers defined on the input space X . The minimum risk is denoted by L∗ = L(g∗ ). Since the distribution P of the data is unknown, one substitutes the true risk with its empirical estimate X bn (g) = 1 L I{g(Xi ) 6= Yi }, n n (2) i=1 based on a sample (X1 , Y1 ), . . . , (Xn , Yn ) of independent copies of the generic random pair (X, Y). The true risk minimization is then replaced by the empirical risk minimization bn (g), min L (3) g∈G where the minimum is taken over a class G of classifier candidates, supposed rich enough to include bn the naive Bayes classifier (or a reasonable approximation of the latter). Considering a solution g of (3), a major problem in statistical learning theory is to establish upper confidence bounds on the excess of risk L(b gn ) − L∗ in absence of any distributional assumptions and taking into account the complexity of the class G (e.g. described by geometric or combinatorial features such as the VC dimension) P and some measure of accuracy of approximation of P by its empirical counterpart Pn = (1/n) ni=1 δ(Xi ,Yi ) over the class G. Indeed, one typically bounds the excess of risk of the empirical risk minimizers as follows   ∗ ∗ b L(b gn ) − L ≤ 2 sup |Ln (g) − L(g)| + inf L(g) − L . g∈G g∈G The second term on the right hand side is referred to as the bias and depends on the richness of the class G, while the first term, called the stochastic error, is controlled by means of results in empirical process theory, see [5]. Remark 1. (On risk surrogates) Although its study is of major interest from a theoretical perspective, the problem (3) is generally NP-hard. For this reason, the cost function I{−Yg(X) > 0} is replaced in practice by a nonnegative convex cost function φ(Yg(X)), turning empirical risk minimization to a tractable convex optimization problem. Typical choices include the exponential cost φ(u) = exp(u) used in boosting algorithms, the hinge loss φ(u) = (1 + u)+ in the case of support vector machines and the logit cost φ(u) = log(1 + exp(u)) for Neural Networks, see [2] and the references therein. Extension of the results established in the present paper to such risk surrogates are straightforward and left to the reader. In this paper, we consider the situation where the training data used to compute of the empirical risk (2) is not an i.i.d. sample but the product of a more general sampling plan of fixed size n ≥ 1. 3 2.2 Sampling Schemes and Horvitz-Thompson Estimation Let N ≥ 1. In the standard superpopulation framework we consider, (X1 , Y1 ), . . . , (XN , YN ) is a sample of independent copies of (X, Y) observed on a finite population IN := {1, . . . , N}. We call a survey sample of (possibly random) size n ≤ N of the population IN , any subset s := {i1 , . . . , in(s) } ∈ P(IN ) with cardinality n =: n(s) less that N. A sampling design without replacement is determined by a conditional probability distribution RN on the set of all possible samples s ∈ P(IN ) given the original data DN = {(Xi , Yi ) : i ∈ IN }. For any i ∈ {1, . . . , N}, the first order inclusion probability, πi = PRN {i ∈ S} is the probability that the unit i belongs to a random sample S drawn from the conditional distribution RN . We set π = (π1 , . . . , πN ). The second order inclusion probabilities are denoted by πi,j = PRN {(i, j) ∈ S2 }, for any i 6= j in {1, . . . , N}2 . The information related to the observed sample S ⊂ {1, . . . , N} is fully enclosed in the r.v. N = (1 , . . . , N ), where i = I{i ∈ S} for 1 ≤ i ≤ N. The 1-d marginal conditional distributions of the sampling scheme N given DN are the Bernoulli distributions B(πi ) = πi δ1 + (1 − πi )δ0 , 1 ≤ i ≤ N, and the covariance matrix ΓN of the r.v. N has entries given by ΓN (i, j) = πi,j − πi πj ,P with πi,i = πi by convention, for 1 ≤ i, j ≤ N. Observe that, equipped with the notations above, 1≤i≤N i = n(S). One may refer to [10] for accounts of survey sampling techniques. Notice also that, in many applications, the inclusion probabilities are built using some extra information, typically by means of auxiliary random variables W1 , . . . , WN defined onP(Ω, A, P) and taking their values in some measurable space W: ∀i ∈ {1, . . . , N}, πi = nh(Wi )/ 1≤j≤N h(Wj ), where n max1≤i≤n h(Wi ) ≤ P h(W i ) almost-surely and h : W →]0, +∞[ is a measurable link function. The (Xi , Yi , Wi )’s 1≤i≤N are generally supposed to be i.i.d. copies of a generic r.v. (X, Y, W). See [22] for more details. For simplicity, the πi ’s are supposed to be deterministic in the subsequent analysis, which boils down to carrying out the study conditionally upon the Wi ’s in the example aforementioned. Horvitz-Thompson risk. As defined in [14], the Horvitz-Thompson version of the (not bN (g) = N−1 P available) empirical risk L 1≤i≤N I{Yi 6= g(Xi )} of any classifier candidate g based on the sampled data {(Xi , Yi ) : i ∈ S} with S ∼ RN is given by: 1 X i 1 X 1 I{g(Xi ) 6= Yi } = I {g(Xi ) 6= Yi } N πi N πi N LN (g) = i∈S (4) i=1 with the convention that 0/0 = 0 and where the subscript N = (1 , . . . , N ) denotes the vector in correspondence with the sample S. Observe that, conditionally upon the (Xi , Yi )’s, the quantity (4), that shall be referred to as the empirical Horvitz-Thompson risk (empirical HT risk in short) bN (g). Its (pointwise) consisthroughout the paper, is an unbiased estimate of the empirical risk L tency and asymptotic normality are established in [20] and [3] for a variety of sampling schemes. This article is devoted to investigating the statistical performance of minimizers ḡN of the HT risk (4) over the class G under adequate assumptions for the sampling scheme RN used to generate the training dataset. We point out that such an analysis is far from straightforward due to the possible depence structure of the terms involved in the summation (4): except in the Poisson case (recalled below), concentration results for empirical processes cannot be directly applied to control maximal deviations of the type sup |LN (g) − L(g)|. g∈G Conditional Poisson sampling. One of the simplest sampling plan is undeniably the Poisson survey scheme (without replacement), a generalization of Bernoulli sampling originally proposed 4 in [12] for the case of unequal weights: the i ’s are independent and the sampling distribution is thus entirely determined by the first order inclusion probabilities pN = (p1 , . . . , pN ) ∈]0, 1[N : Y Y ∀s ∈ P(IN ), PN (s) = pi (1 − pi ). (5) i∈S i∈S / Observe in addition that the behavior of the quantity (4) can be then investigated by means of results established for sums of independent random variables. However, the major drawback of this sampling plan lies in the random nature of the corresponding sample size, impacting P significantly the variability of (4). The variance of the Poisson P sample size is given by dN = N i=1 pi (1 − pi ), n while the conditional variance of (4) is in this case: i=1 ((1 − pi )/pi )I{g(Xi ) 6= Yi }. For this reason, rejective sampling, a sampling design RN of fixed size n ≤ N, is often preferred in practice. It generalizes the simple random sampling without replacement (where all samples with cardinality n are equally likely to be chosen, with probability (N − n)!/n!, all the corresponding first and second order probabilities being thus equal to n/N and n(n − 1)/(N(N − 1)) respectively). Denoting by πN = (π1 , . . . , πN ) its first order inclusion probabilities and by Sn = {s ∈ P(IN ) : #s = n} the subset of all possible samples of size n, it is defined by: Y Y ∀s ∈ Sn , RN (s) = C pi (1 − pi ), (6) i∈s P Q i∈s / Q N where C = 1/ s∈Sn i∈s pi i∈s / (1 − pi ) and the vector pN = (p P1 , . . . , pN ) ∈]0, 1[ yields first order inclusion probabilities equal to the πi ’s and is such that i≤N pi = n. Under this latter additional condition, such a vector pN exists and is unique (see [11]) and the related representation (6) is then said to be canonical 1 . Comparing (6) and (5) reveals that rejective RN sampling of fixed size n can be viewed as Poisson sampling given that the sample size is equal to n. It is for this reason that rejective sampling is usually referred to as conditional Poisson sampling. One must pay attention not to get the πi ’s and the pi ’s mixed up: the latter are the first order inclusion probabilities of PN , whereas the former are those of its conditional version RN . However they can be related by means of the results stated in [13] (see Theorem 5.1 therein): ∀i ∈ {1, . . . , N}, πi (1 − pi ) = pi (1 − πi ) × (1 − (π̃ − πi )/d∗N + o(1/d∗N ), (7) pi (1 − πi ) = πi (1 − pi ) × (1 − (p̃ − pi )/dN + o(1/dN ), (8) PN PN 2 P 2 ∗ where d∗N = N i=1 πi (1 − πi ) and p̃ = (1/dN ) i=1 (pi ) (1 − pi ). i=1 πi (1 − πi ), π̃ = (1/dN ) More examples of sampling schemes with fixed size are given in the Supplementary Material. of survey theory. 3 Main Results We first consider the case where statistical learning is based on the observation of a sample drawn by means of a rejective scheme. As shall be seen below, the main argument underlying the results obtained relies on the fact that the related scheme form a collection of negatively associated (binary) random variables, a rather tractable type of dependence structure. This property being shared by 1 0 Notice that any vector pN ∈]0, 1[N such that pi /(1 − pi ) = cpi0 /(1 − pi0 ) for all i ∈ {1, . . . , n} for some constant c > 0 can be used to write a representation of RN of the same type as (6) 5 many other sampling schemes of deterministic size, the same argument can be thus naturally applied to carry out a similar rate analysis for training data produced by such plans. Extensions of these results to more general sampling schemes are also considered by means of a coupling technique. 3.1 Horvitz-Thompson Empirical Risk Minimization in the Rejective Case For clarity, we first recall the definition of negatively associated random variables, see [16]. Definition 1. Let Z1 , . . . , Zn be random variables defined on the same probability space, valued in a measurable space (E, E). They are said to be negatively associated iff for any pair of disjoint subsets A1 and A2 of the index set {1, . . . , n} Cov (f((Zi )i∈A1 ), g((Zj )j∈A2 )) ≤ 0, (9) for any real valued measurable functions f : E#A1 → R and g : E#A2 → R that are both increasing in each variable. The theorem stated below reveals that any rejective scheme N forms a collection of negatively associated r.v.’s. The proof is given in the Appendix section. Theorem 1. Let N ≥ 1 and N = (1 , . . . , N ) be the vector of indicator variables related to a rejective plan on IN . Then, the binary random variables 1 , . . . , N are negatively associated. The result above permits to handle the dependence of the terms involved in the summation (4). It is the key argument for proving the following proposition, which extends results for training datasets generated by basic sampling without replacement (i.e. in the case of all equal weights: πi = n/N for i = 1, . . . , N), refer to [1] (see also [23]). Proposition 1. Suppose that the sampling scheme N is rejective with first order inclusion probabilities πN and that the class G is of finite VC dimension V < +∞. Set κN = (n/N)/ mini≤N πi . Then, the following assertions hold true. (i) For any δ ∈ (0, 1), with probability larger than 1 − δ, we have: ∀n ≤ N, s 2 2 bN (g)| ≤ 2κN log( δ ) + V log(N + 1) + 2κN log( δ ) + V log(N + 1) . sup |L̄N (g) − L 3n n g∈G (10) (ii) For any solution ḡN of the minimization problem inf g∈G LN (g) is such that, for any δ ∈ (0, 1), with probability at least 1 − δ, we have: ∀N ≥ 1, s log( δ4 ) + V log(N + 1) log( δ4 ) + V log(N + 1) L(ḡN ) − L∗ ≤ 2 2κN + 4κN n 3n s r 2 log( δ2 ) V +C +2 + inf L(g) − L∗ . g∈G N N 6 The factor κN involved in the bounds P above reflects the influence of the sampling scheme (notice incidentally that κN ≥ 1 since i≤N πi = n). In the SWOR case, i.e. when πi = n/N for all i ∈ {1, . . . , N}, it is then minimum, equal to 1. More generally, when n = o(N) as N → +∞, as soon as the weights cannot p vanish faster than n/N, the rate achieved by minimizers of the HT risk is of the order OP ( (log N)/n). Many sampling schemes (e.g. Rao-Sampford sampling, Pareto sampling, Srinivasan sampling) of fixed size are actually described by random vectors N with negatively associated components, see [6] or [18]. Hence, a rapid examination of Proposition 1’s proof shows that the bounds stated above immediately extend to these cases. See the Supplementary Material for more details and references. Before showing how the rate bounds established can be extended to even more general sampling schemes, a few remarks are in order. Remark 2. (Complexity assumptions) We point out that the results stated can be established, essentially by means of the same argument as that developed in the Appendix, under complexity assumptions of different nature, involving metric entropy conditions for instance (see e.g. [26]). Such straightforward extensions are left to the reader. Remark 3. (Model Selection) A slight modification of the argument involved in Proposition 1 straightforwardly leads to bounds on the expected excess risk E[L(ḡN )] − inf g∈G L(g). Following the Structural Risk Minimization principle (see [27]), such VC bounds can be next used as complexity regularization terms to penalize additively the HT risk (4) and, for a sequence of model classes Gk with k ≥ 1 of finite VC dimension, select the classifier among the minimizers {arg ming∈Gk L̄N (g), k ≥ 1}, which has approximately minimal risk. Due to space limitations, details are left to the reader. Remark 4. (Biased HT risk) As recalled in the Supplementary Material, the canonical parameters pN are practically used to build a rejective sampling scheme N rather than its vector of first order inclusion probabilities (π1 , . . . , πN ), whose explicit computation based on the pi ’s is a difficult task, refer to [9] for dedicated algorithms. For thisPreason, one could be naturally tempted to e (g) = (1/N) minimize the alternative risk estimate L N i≤N (i /pi )I{Yi 6= g(Xi )}. As proved in the Supplementary Material, refinements of Eq. (7)-(8) show that X 1 1 e (g) − L̄ (g)| ≤ 1 sup |L ≤ 6NκN /(ndN ), − N N N pi πi g∈G N (11) i=1 e (g) from bound (ii) in Proposition1. one may directly derive a rate bound for solutions of inf g∈G L N √ In particular, the learning rate achieved by ḡN is preserved when 1/ n = O(mini≤N πi ) as N, n → +∞. 3.2 Extensions to More General Sampling Schemes We now extend the rate bound analysis carried out in the previous subsection to more complex sampling schemes (described by a random vector ∗N possibly exhibiting a very complex dependence structure). In order to give an insight into the arguments which the extension is based on, additional notations are required. In this section, we consider a general sampling design R∗N with first order inclusion probabilities π∗N = (π∗1 , . . . , π∗N ) described by the vector ∗N = (∗1 , . . . , ∗N ) and investigate the performance of minimizers ḡ∗N of the HT empirical risk P ∗ ∗ L̄∗N (g) = (1/N) N i=1 (i /πi )I{Yi 6= g(Xi )} over a class G. We also consider a rejective sampling 7 scheme RN described by the r.v. N , with first order inclusion probabilities πN = (π1 , . . . , πN ) defined on the same probability space, as well as the following quantity: 1 X i I{Yi 6= g(Xi )} N π∗i N ĽN (g) = (12) i=1 for any classifier g. Observe that (12) differs from the HT empirical risk L̄N (g) related to the rejective sampling scheme N in the weights it involves, the π∗i ’s instead of the πi ’s namely. Equipped with this notation, the excess of risk of the HT empirical risk minimizer can be bounded as follows: bN (g) − L̄ (g) bN (g) + 2 sup L L(ḡ∗N ) − inf L(g) ≤ 2 sup L(g) − L N g∈G g∈G g∈G + 2 sup L̄N (g) − ĽN (g) + 2 sup ĽN (g) − L̄∗N (g) . (13) g∈G g∈G Whereas the first term on the right hand side of (13) can be classically controlled using VapnikChervonenkis and McDiarmid inequalities (see e.g. [27]), assertion (i) of Proposition 1 provides a control of the second term. Following in the footsteps of [13], the third term shall be bounded by means of a coupling argument, i.e. a specific choice of the joint distribution of (∗N , N ) satisfying the distributional margin constraints, while the second term is controlled by assumptions related to the closeness between the first order inclusion probabilities π∗N and πN . More precisely, the assumptions required in the subsequent analysis involve the total variation distance between the sampling plans RN and R∗N : def dTV (RN , R∗N ) = 1 2 X |RN (s) − R∗N (s)|. s∈P(IN ) Theorem 2. Suppose that Proposition 1’s assumptions are fulfilled. Set κ∗N = (n/N) mini≤N π∗i and κN = (n/N)/ mini≤N πi . Then, there exists a universal constant C < +∞ such that we have, ∀N ≥ 1, r   V log(N + 1) V log(N + 1) ∗ E L(ḡN ) − inf L(g) ≤ 2 2κN + 4κN g∈G n 3n r V +C + 2(κ∗N + κN )(N/n)dTV (RN , R∗N ), (14) N where the infimum is taken over the set of rejective schemes RN with first order inclusion probabilities πN = (π1 , . . . , πN ). The proof is given in the Supplementary Material. The rate bound obtained depends on the minimum error made when approximating the sampling plan by a rejective sampling plan in terms of total variation distance. In practice, following in the footsteps of [13] or [3], it can be controlled by exhibiting a specific coupling (∗N , N ). One may refer to [3] for many coupling results of this nature, in particular when the approximating scheme N is of rejective type. 8 4 Illustrative Numerical Experiments In this section we display numerical experiments to illustrate the relevance of HT risk minimization. We first consider the case where g(X) = sign(k(X)T θ + b), where k is some mapping function, T denotes the transposition operator, θ, b are some parameters. As mentionned in 1, we consider the hinge loss as a convex surrogate of the 0 − 1 loss and add some l2 regularization term. This leads to the ”Weighted SVM” formulation below: min θ,b 1 X 1 max(0, 1 − Yi (k(Xi )T θ − b)) + λkθk2 . N πi i∈S We use the gaussian r.b.f kernel and perform cross validation to appropriately choose the value of λ. We then consider the task of learning classification trees using the CART algorithm. These classifiers are trained using the scikit-learn library [19] and, we account for the randomness of our experiments by shuffling our datasets and repeating the experiments 50 times. We first generate a two class dataset D in R10 of size 20000 by sampling independent observations from two multivariate normal distribution. A similar dataset Dtest of size 2000 is generated to test our classifiers. Denoting by Id the identity matrix in Rd , the positive class has mean (0, . . . , 0) and covariance matrix equal to I10 , the negative class has mean (1, . . . , 1) and covariance matrix equal e of size 1100 via a rejective sampling scheme applied to D. to 10 × I10 . We then build a dataset D Observations from the negative class being more noisy we assign them first order probability equal to 0.1, and assign first order probability equal to 0.01 to observation from the positive class. To b of size 1100 by sampling without replacement allow for a fair comparison, we also build a dataset D e and D, b and display the results in Table??. within D. We then learn the different classifiers on D e Weighted SVM on D e Unweighted SVM on D b SVM on D e Weighted CART on D e Unweighted CART on D b CART on D Mean Std Deviation 0.02 0.18 0.04 0.06 0.11 0.08 0.005 0.02 0.005 0.01 0.03 0.01 Table 1: Average over 50 runs of the prediction error on Dtest and its standard deviation. Overall, taking into accounts the inclusion probability allows to consider a training set of reduced size and therefore reduce the computationnal complexity of the learning procedure without damaging the quality of the prediction . Similar experiments on real datasets are displayed in the Supplementary Material for which similar conclusions hold. 5 Conclusion Most theoretical studies providing a statistical explanation for the success of learning algorithms based on the ERM paradigm fully ignore the possible impact of the sampling scheme producing 9 the training data and stipulate that observations are independent replications of a generic r.v. or are uniformly sampled without replacement in a larger dataset. Through the generalizable example of rejective sampling, this paper shows that such studies can be extended to situations where training data are obtained by more general sampling schemes and possibly exhibit a complex dependence structure, provided that related probablity weights are appropriately incorporated in the risk functional. Appendix Proof of Theorem 1 Considering the usual representation of the distribution of (1 , . . . , N ) as the conditional distribution of a sample of independent Bernoulli variables (∗1 , . . . , ∗N ) conditioned upon the event PN ∗ i=1 i = n (see subsection 2.2), the result is a consequence of Theorem 2.8 in [16]. Bernstein inequality for sums of negatively associated random variables For simplicity, we first establish the following tail bound for negatively associated random variables, which extends the usual Bernstein inequality in the i.i.d. setting, see [4]. Proofs of Proposition 1 and Theorem 2 are then deduced from Theorem 1 and Theorem 3 (see Supplementary Material) . Theorem 3. Let Z1 , . . . , ZN be negatively associated real valued random variables such that |Zi | ≤ c < +∞ a.s. E[Zi ] = 0 and E[Z2i ] 6 σ2i for 1 ≤ i ≤ N. Then, for all t > 0, we have: ∀N ≥ 1,  N  ! X t2 P Zi ≥ t ≤ exp − 2 PN 2 . ct + 2 i=1 σi 3 i=1 Before detailing observe that a similar bound holds true for the tail probability P  the proof, P N N P i=1 Zi | ≥ t as well, up to a multiplicative factor 2). Refer also i=1 Zi ≤ −t (and for P | to Theorem 4 in [15] for a similar result in a more restrictive setting (i.e. for tail bounds related to sums of negatively associated r.v.’s). Proof. The proof starts off with the usual Chernoff method: for all λ > 0,  N   h PN i X P Zi ≥ t ≤ exp −tλ + log E et i=1 Zi . (15) i=1 Next, observe that, for all t > 0, we have h Pn i h Pn−1 i E et i=1 Zi = E etZn et i=1 Zi h i h Pn−1 i ≤ E etZn E et i=1 Zi ≤ n Y h tZi E e i , i=1 using the property (9) combined with a descending recurrence on i. The proof is finished by plugging (16) into (15), using an adequate control of the log-Laplace transform of the Zi ’s and 10 optimizing finally the resulting bound w.r.t. λ > 0, just like in the proof of the classic Bernstein inequality, see [4]. Supplementary - Proof of Proposition 1   i 1 PN bN (g) as sup − 1 I {g(Xi ) 6= Yi } | We start off by writing S := supg∈G L̄N (g) − L | g∈G N i=1 πi   and apply Theorem 1 conditionnaly upon DN to the r.v Zi := N1 πii − 1 I {g(Xi ) 6= Yi } . Indeed, N the (πi )N i=1 and (I {g(Xi ) 6= Yi })i=1 being positive real numbers, Theorem 1 altogether with [16] κN 1 1 1 implies that (Zi )N i=1 are negatively associated. Since |Zi | 6 N max(1, πi − 1) 6 Nπi 6 n and E[Z2i ] 6 1−pii N2 πi 6 κN nN we have :  N X P  Zi ≥ t|DN i=1 nt2 ≤ exp − 2 3 κN t + 2κN ! . Applying the same method to the r.v (−Zi )N i=1 and taking the union bound yields : !  N  X nt2 . P | Zi | ≥ t|DN ≤ 2 exp − 2 κ t + 2κ N N 3 i=1 By virtue of Sauer’s lemma, since the class G has finite VC-dimension V, we have by taking expectation w.r.t DN : ! nt2 V P {S ≥ t} ≤ 2(N + 1) exp − 2 . 3 κN t + 2κN   nt2 V so The high probability bound is then easily deduced by choosing δ = 2(N + 1) exp − 2 κ t+2κ 3 N N that : log( δ2 ) + V log(N + 1) t− κN 3n ! !2 log( δ2 ) + V log(N + 1) = κN 3n  2 log( δ2 ) + V log(N + 1) + κN n leading to the following upperbound :  s 2κN log( δ2 ) + V log(N + 1) log( δ2 ) + V log(N + 1) t6 + 2 κN . 3n n The second claim of Proposition 1 is established using L(ḡN ) − L∗ ≤ bN (g) inf L(g) − L∗ + 2 sup L(g) − L g∈G g∈G bN (g) − L̄ (g) , (16) + 2 sup L N g∈G bN (g) and a union altogether with classical results on ERM applied to the term supg∈G L(g) − L bound. 11 Supplementary - Proof of Theorem2 Starting from (13), we only have to derive bounds for the quantities S1 := supg∈G L̄N (g) − ĽN (g) and S2 := supg∈G ĽN (g) − L̄∗N (g) . Starting with the first one, we have : 1 X S1 = sup | i g∈G N N  i=1 1 1 − π∗i πi  I {g(Xi ) 6= Yi } | 1 X 1 1 i | ∗ − | N πi πi N 6 i=1 so that taking expectation w.r.t N conditionned upon DN yields : 1 X π∗i − πi | | N πi N E[S1 |DN ] 6 i=1 N1 X |πi − π∗i | nN N 6 κN i=1 N 6 κN dTV (RN , R∗N ), n taking expectation w.r.t DN gives an upperbound on S1 . We now turn to the analysis of S2 which is very similar : 1 X ∗i − i I {g(Xi ) 6= Yi } | N π∗i N S2 = sup | g∈G 6 1 N N X i=1 i=1 |∗i − i | . π∗i We then take expectation conditionned upon DN and easily obtain E[S2 |DN ] 6 κ∗N N dTV (RN , R∗N ) n which conclude the proof. Supplementary - On biased HT risk minimization Eq. (11) directly results from the following lemma. Lemma 1. We have, for p0i s such Suppose that dN ≥ 1. We have, for all i ∈ {1, . . . , N}, |1/πi − 1/pi | ≤ 6 × (1 − πi )/πi . dN 12 Proof. The proof follows from the representation (5.14) on p1509 in [13]. Denote by PN a Poisson sampling distribution on IN with inclusion probabilities p1 , . . . , pN , the canonical parameters of RN . For all i ∈ {1, . . . , N}, we have: −1  X πi 1 − pi  P(s) = pi 1 − πi s∈P(IN ): i∈IN \{s} X × P(s) s∈P(IN ): i∈IN \{s}  = X X 1 − ph j∈s (1 − pj ) + (ph − pi ) P h∈s −1 PN (s) s: i∈IN \{s} × X PN (s) s: i∈IN \{s} X P h∈s 1 − ph  (1 − p ) 1+ j j∈s P(ph −pi ) j∈s (1−pj )  Now recall that for any x ∈] − 1, 1[, we have: 1−x≤ 1 ≤ 1 − x + x2 . 1+x It follows that  πi 1 − pi ≤1− pi 1 − πi X −1 P(s) s: i∈IN \{s} X X (1 − ph )(ph − pi ) × P(s) P 2 h∈s s: i∈IN \{s} j∈s (1 − pj )  −1 X X X (1 − ph )(ph − pi )2 + P(s) P(s) P 3 h∈s (1 − p ) s: i∈IN \{s} s: i∈IN \{s} j j∈s P Following now line by line the proof on p. 1510 in [13] and noticing that j∈s (1 − pj ) ≥ 1/2dN (see Lemma 2.2 in [13]), we have X (1 − ph )(ph − pi ) 1 2 ≤ P 2 ≤ P d N h∈s j∈s (1 − pj ) j∈s (1 − pj ) and similarly X (1 − ph )(ph − pi )2 1 4 P 3 ≤ P 2 ≤ 2 . dN h∈s j∈s (1 − pj ) j∈s (1 − pj ) This yieds: ∀i ∈ {1, . . . , N}, 1− 2 πi 1 − pi 2 4 ≤ ≤1+ + dN pi 1 − πi dN d2N 13 and pi (1 − πi )(1 − 2 2 4 ) ≤ πi (1 − pi ) ≤ pi (1 − πi )(1 + + 2 ), dN dN dN leading then to − 2 2 4 (1 − πi )pi ≤ πi − pi ≤ pi (1 − πi )( + ) dN dN d2N and finally to − (1 − πi ) 2 1 1 (1 − πi ) 2 4 ≤ − ≤ ( + 2 ). πi dN pi πi πi dN dN Since 1/d2N ≤ 1/dN as soon as dN ≥ 1, the lemma is proved. Supplementary - Further details on the rejective scheme Let n ≤ N and consider a vector π = (π1 , . . . , πN ) of first order inclusion probabilities. Further define Sn := {s ∈ P(IN ) : #s = n}, the set of all samples in population IN with cardinality n. The rejective sampling [13, 3], sometimes called conditional Poisson sampling, exponential design without replacement or maximum entropy design, is the sampling design RP N that selects samples of fixed size n(s) = n so as to maximize the entropy measure H(RN ) = − s∈Sn RN (s) log RN (s), subject to the constraint that its vector of first order inclusion probabilities coincides with π. It is easily implemented in two steps: 1. Draw a sample S according to a Poisson plan PN , with properly chosen firstPorder inclusion probabilities pN = (p1 , . . . , pN ). The representation is called canonical if N i=1 pi = n. In that case, relationships between each pi and πi , 1 ≤ i ≤ N, are established in [13]. 2. If n(S) 6= n, then reject sample S and go back to step one, otherwise stop. Vector p must be chosen in a way that the resulting first order inclusion probabilities coincide with π, by means of a dedicated optimization algorithm [25]. The corresponding probability distribution Q Q PN (s) I{#s=n} is given for all s ∈ P(IN ) by RN (s) = P pi i∈s 0) ∝ i∈s / (1 − pi ) × I{#s = n}, where ∝ P (s 0 N s ∈Sn denotes the proportionality. Supplementary - Stratified sampling A stratified sampling design permits to draw a sample S of fixed size n(S) = n ≤ N within a population IN that can be partitioned into K ≥ 1 distinct strata IN1 , . . . , INK (known a priori) of respective sizes N1 , . . . , NK adding up to N. Let n1 , . . . , nK be non-negative integers such that n1 + · · · + nK = n, then the drawing procedure is implemented in K steps: within each stratum INk , k ∈ {1, . . . , K}, perform a SWOR of size nk ≤ Nk yielding a sample Sk . The final sample S is obtained by assembling these sub-samples: S = Kk=1 Sk . The probability of drawing a specific  −1 PK Nk str sample s by means of this survey design is RN (s) = k=1 . Naturally, first and second nk order inclusion depend on the stratum which each unit belong: for all i 6= j in UN , PK to PK probabilities nk (nk −1) nk str 2 }. str πi (RN ) = k=1 Nk I{i ∈ UNk } and πi,j (RN ) = k=1 Nk (Nk −1) I{(i, j) ∈ UN k 14 Supplementary - Rao-Sampford sampling The Rao-Sampford sampling design generates samples s ∈ P(IN ) of fixed size n(s) = n with RS respect to some given first order inclusion probabilities πRS := (πRS 1 , . . . , πN ), fulfilling the condition PN RS i=1 πi = n, with probability RRS N (s) = η X πRS i i∈s Y πRS j j∈s / 1 − πRS j . P Here, η > 0 is chosen such that s∈P(IN ) RRS N (s) = 1. In practice, the following algorithm is often used to implement such a design [3]: 1. select the first unit i with probability πRS i /n, RS 2. select the remaining n − 1 units j with drawing probabilities proportional to πRS j /(1 − πj ), j = 1, . . . , N, 3. accept the sample if the units drawn are all distinct, otherwise reject it and go back to step one. Additional experiments We consider the following datasets which were obtained via a stratified sampling design. We point out that this sampling scheme involves negatively associated (binary) random variables so that the theoretical results obtained in the rejective case extend to this scheme. incaIndiv GJB privacy3 privacy4 N Number of features 4079 2001 316 301 326 130 95 124 The dataset incaIndiv 2 contain informations on the food consumption of the french population. The dataset GJB 3 contains questions about job seeking and the internet, workforce automation, online dating and smartphone use among Americans. The datasets privacy3 4 and privacy4 5 contain questions about privacy and information sharing. On the datasets incaIndiv and incaCompl we try to predict whether or not someone is an adult, on the dataset GJB we will try to learn to predict the gender, and on the datasets privacy3 and privacy4 we will predict an answer to some questions among 5 possibilities. We perform our experiments by randomly splitting the datasets incaIndiv, incaCompl,GJB into a training set (roughly 70 percent of the initial dataset) and a test set. The size of privacy3 and privacy4 being much smaller we perform 10-fold cross-validation. 2 https://https://www.data.gouv.fr/fr/datasets/ http://www.pewinternet.org/datasets/june-10-july-12-2015-gaming-jobs-and-broadband/ 4 http://www.pewinternet.org/datasets/nov-26-2014-jan-3-2015-privacy-panel-3/ 5 http://www.pewinternet.org/datasets/jan-27-feb-16-2015-privacy-panel-4/ 3 15 Weighted SVM Unweighted SVM Weighted CART Unweighted CART incaIndiv GJB privacy3 privacy4 0.16 0.19 0.04 0.05 0.36 0.43 0.41 0.43 0.46 0.50 0.49 0.52 0.48 0.52 0.54 0.57 Table 2: Average over 50 runs of the prediction error References [1] R Bardenet and O.A. Maillard. Concentration inequalities for sampling without replacement. Bernoulli, 21(3):1361–1385, 2015. [2] P. Bartlett, M. Jordan, and J. McAuliffe. Convexity, classification and risk bounds. J. of the A.M.S, 101(473):138–156, 2006. [3] Y.G. Berger. Rate of convergence to normal distribution for the Horvitz-Thompson estimator. J. Stat. Plan. Inf, 67(2):209–226, 1998. [4] S. N. Bernstein. On a modification of chebyshev’s inequality and on the error in laplace formula. Collected Works, Izd-vo ’Nauka’, Moscow (in Russian), 4:71–80, 1964. [5] S. Boucheron, O. Bousquet, and G. Lugosi. Theory of Classification: A Survey of Some Recent Advances. ESAIM: Probability and Statistics, 9:323–375, 2005. [6] P. Brändén and J. Jonasson. Negative dependence in sampling. Scandinavian Journal of Statistics, 39(4):830–838, 2012. [7] N.E. Breslow, T. Lumley, C. Ballantyne, L. Chambless, and M. Kulich. Improved HorvitzThompson estimation of model parameters from two-phase stratified samples: applications in epidemiology. Stat. Biosc., 1:32–49, 2009. [8] N.E. Breslow and J.A. Wellner. Weighted likelihood for semiparametric models and two-phase stratified samples, with application to Cox regression. Scandinavian Journal of Statistics, 35:186–192, 2007. [9] X.H. Chen, Dempster A.P., and J.S. Liu. Weighted finite population sampling to maximize entropy. Biometrika, 81(3):457–469, 1994. [10] J.C. Deville. Réplications d’échantillons, demi-échantillons, Jackknife, bootstrap dans les sondages. Economica, Ed. Droesbeke, Tassi, Fichet, 1987. [11] J. Dupacova. A note on rejective sampling. Contribution to Statistics (J. Hajek memorial volume) Academia Prague, pages 71–78, 1979. [12] L.A. Goodman. On the estimation of the number of classes in a population. Annals of Mathematical Statistics, 20:572–579, 1949. 16 [13] J. Hajek. Asymptotic theory of rejective sampling with varying probabilities from a finite population. The Annals of Mathematical Statistics, 35(4):1491–1523, 1964. [14] D.G. Horvitz and D.J. Thompson. A generalization of sampling without replacement from a finite universe. JASA, 47:663–685, 1951. [15] S. Janson. Large deviation inequalities for sums of indicator variables. 1994. [16] K. Joag-Dev and F. Proschan. Negative Association of Random Variables with Applications. The Annals of Statistics, 11(1):286–295, 1983. [17] V. Koltchinskii. Local Rademacher complexities and oracle inequalities in risk minimization (with discussion). The Annals of Statistics, 34:2593–2706, 2006. [18] J.B. Kramer, J. Cutler, and A.J. Radcliffe. Negative dependence and srinivasan’s sampling process. Combinatorics, Probability and Computing, 20(3):347–361, 2011. [19] F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer, R. Weiss, V. Dubourg, J. Vanderplas, A. Passos, D. Cournapeau, M. Brucher, M. Perrot, and E. Duchesnay. Scikit-learn: Machine learning in Python. Journal of Machine Learning Research, 12:2825–2830, 2011. [20] P.M. Robinson. On the convergence of the Horvitz-Thompson estimator. Australian Journal of Statistics, 24(2):234–238, 1982. [21] T. Saegusa and J.A. Wellner. Weighted likelihood estimation under two-phase sampling. 2011. [22] C.E. Särndall and J. Wretman B. Swensson. Model assisted survey sampling. Springer-Verlag, NY, 2003. [23] R.J. Serfling. Probability inequalities for the sum in sampling without replacement. The Annals of Statistics, 2:39–48, 1974. [24] I. Steinwart, D. Hush, and C. Scovel. Learning from dependent observations. Journal of Multivariate Analysis, 100(1):175–194, 2009. [25] Y. Tillé. Sampling algorithms. Springer Series in Statistics, 2006. [26] A.W. van der Vaart and J.A. Wellner. Weak convergence and empirical processes. Springer, 1996. [27] V. Vapnik. The Nature of Statistical Learning Theory. Springer-Verlag, New-York, 2001. 17
10math.ST
Approximate Counting of Matchings in (3, 3)-Hypergraphs? arXiv:1402.6190v3 [math.CO] 25 Oct 2017 Andrzej Dudek1?? , Marek Karpinski2? ? ? , Andrzej Ruciński3† , and Edyta Szymańska3‡ 1 Western Michigan University, Kalamazoo, MI, USA, [email protected] 2 Department of Computer Science, University of Bonn, Germany, [email protected] 3 Faculty of Mathematics and Computer Science, Adam Mickiewicz University, Poznań, Poland, (rucinski,edka)@amu.edu.pl Abstract. We design a fully polynomial time approximation scheme (FPTAS) for counting the number of matchings (packings) in arbitrary 3-uniform hypergraphs of maximum degree three, referred to as (3, 3)hypergraphs. It is the first polynomial time approximation scheme for that problem, which includes also, as a special case, the 3D Matching counting problem for 3-partite (3, 3)-hypergraphs. The proof technique of this paper uses the general correlation decay technique and a new combinatorial analysis of the underlying structures of the intersection graphs. The proof method could be also of independent interest. 1 Introduction The computational status of approximate counting of matchings in hypergraphs has been open for some time now, contrary to the existence of polynomial time approximation schemes for graphs. The matching (packing) counting problems in hypergraphs occur naturally in the higher dimensional free energy problems, like in the monomer-trimer systems discussed, e.g, by Heilmann [10]. The corresponding optimization versions of hypergraph matching problem relate also to various allocations problems. This paper aims at shedding some light on the approximation complexity of that problem in 3-uniform hypergraphs of maximum vertex degree three (called (3, 3)-hypergraphs or (3, 3)-graphs for short). This class of hypergraphs includes ? ?? ??? † ‡ Part of research of the 3rd and 4th authors done at Emory University, Atlanta and another part during their visits to the Institut Mittag-Leffler (Djursholm, Sweden). Research supported by Simons Foundation Grant #244712 and by a grant from the Faculty Research and Creative Activities Award (FRACAA), Western Michigan University. Research supported by DFG grants and the Hausdorff grant EXC59-1. Research supported by the Polish NSC grant N201 604 940 and the NSF grant DMS-1102086. Research supported by the Polish NSC grant N206 565 740. 2 also so-called 3D hypergraphs, that is, (3,3)-graphs that are 3-partite. In [12], based on a generalization of the canonical path method of Jerrum and Sinclair [11], we established a fully polynomial time randomized approximation scheme (FPRAS) for counting matchings in the classes of k-uniform hypergraphs without structures called 3-combs. However, the status of the problem in arbitrary (3, 3)graphs was left wide open among with other general problems for 3-, 4- and 5uniform hypergraphs (for k ≥ 6 it is known to be hard, see Sec. 2). In particular, the existence of an FPRAS for counting matchings in (3, 3)-graphs was unknown. In this paper we design the first fully polynomial time approximation scheme (FPTAS) for arbitrary (3, 3)-graphs. The method of solution depends on the general correlation decay technique and some new structural analysis of underlying intersections graphs based on an extension of the classical claw-freeness notion. The proof method used in the analysis of our algorithm could be also of independent interest. The paper is organized as follows. Section 2 contains some basic notions and preparatory discussions. In Sec. 3 we formulate our main results and provide the proofs. Finally, Sec. 4 is devoted to the summary and an outlook for future research. 2 Preliminaries A hypergraph H = (V, E) is a finite set of vertices V together with a family E of distinct, nonempty subsets of vertices called edges. In this paper we consider k-uniform hypergraphs (called further k-graphs) in which, for a fixed k ≥ 2, each edge is of size k. A matching in a hypergraph is a set (possibly empty) of disjoint edges. Counting matchings is a #P-complete problem already for graphs (k = 2) as proved by Valiant [17]. In view of this hardness barrier, researchers turned to approximate counting, which initially has been accomplished via probabilistic techniques. Given a function C and a random variable Y (defined on some probability space), and given two real numbers , δ > 0, we say that Y is an (, δ)approximation of C if the probability P (|Y (x) − C(x)| ≥ C(x)) ≤ δ. A fully polynomial randomized approximation scheme (FPRAS) for a function f on {0, 1}∗ is a randomized algorithm which, for every triple (, δ, x), with  > 0, δ > 0, and x ∈ {0, 1}∗ , returns an (, δ)-approximation Y of f (x) and runs in time polynomial in 1/, log(1/δ), and |x|. In this paper we investigate the problem of counting the number of matchings in hypergraphs and try to determine the status of this problem for k-graphs with bounded degrees. Let degH (v) be the degree of vertex v in a hypergraph H, that is, the number of edges of H containing v. We denote by ∆(H) the maximum of degH (v) over all v in H. We call a k-graph H a (k, r)-graph if ∆(H) ≤ r. Let #M (k, r) be the problem of counting the number of matchings in (k, r)-graphs. 3 Our inspiration comes from new results (both positive and negative) that emerged for approximate counting of the number of independent sets in graphs with bounded degree and shed some light on the problem #M (k, r). Let #IS(d) [#IS(≤ d)] be the problem of counting the number of all independent sets in d-regular graphs [graphs of maximum degree bounded by d, that is, (2, d)-graphs]. Luby and Vigoda [14] established an FPRAS for #IS(≤ 4). This was complemented later by the approximation hardness results for the higher degree instances by Dyer, Frieze and Jerrum [7]. The subsequent progress has coincided with the revival of a deterministic technique – the spatial correlation decay method – based on early papers of Dobrushin [5] and Kelly [13]. It resulted in constructing deterministic approximation schemes for counting independent sets in several classes of graphs with degree (and other) restrictions, as well as for counting matchings in graphs of bounded degree. Definition 1. A fully polynomial time approximation scheme (FPTAS) for a function f on {0, 1}∗ is a deterministic algorithm which for every pair (, x) with  > 0, and x ∈ {0, 1}∗ , returns a number y(x) such that |y(x) − f (x)| ≤ f (x), and runs in time polynomial in 1/, and |x|. In 2007 Weitz [18] found an FPTAS for #IS(≤ 5), while, more recently, Sly [15] and Sly and Sun [16] complemented Weitz’s result by proving the approximation hardness for #IS(6), that is, proving that unless NP=RP, there exists no FPRAS (and thus, no FPTAS) for #IS(6). By applying two reductions: from #IS(6) to #M (6, 2) (taking the dual hypergraph of a 6-regular graph), and from #M (k, 2) to #IS(k) (taking the intersection graph of a (k, 2)-graph) for k = 3, 4, 5, we conclude that (i) (unless NP=RP) there exists no FPRAS for #M (6, 2); (ii) there is an FPTAS for #M (k, 2) with k ∈ {3, 4, 5}. Note that the first reduction results, in fact, in a linear (6, 2)-graph, so the class of hypergraphs in question is even narrower. (A hypergraph is called linear when no two edges share more than one vertex.) On the other hand, by the same kind of reduction it follows from a result of Greenhill [9] that exact counting of matchings is #P-complete already in the class of linear (3, 2)-graphs. Facts (i) and (ii) above imply that the only interesting cases for the positive results are those for (k, r)-graphs with k = 3, 4, 5 and r ≥ 3, and thus, the smallest one among them is that of (3, 3)-graphs. Our main result establishes an FPTAS for counting the number of matchings in this class of hypergraphs. 3 Main Result and the Proof The following theorem is the main result of this paper. 4 Theorem 2. The algorithm CountMatchings given in Section  3.2 provides an FPTAS for #M (3, 3) and runs in time O n2 (n/)log50/49 144 . The intersection graph of a hypergraph H is the graph G = L(H) with vertex set V (G) = E(H) and edge set E(G) consisting of all intersecting pairs of edges of H. When H is a graph, the intersection graph L(H) is called the line graph of H. Graphs which are line graphs of some graphs are characterized by 9 forbidden induced subgraphs [3], one of which is the claw, an induced copy of K1,3 . There is no similar characterization for intersection graphs of k-graphs. Still, it is easy to observe that for any k-graph H, its intersection graph L(H) does not contain an induced copy of K1,k+1 . We shall call such graphs (k + 1)claw-free. Our proof of Thm. 2 begins with an obvious observation that counting the number of matchings in a hypergraph H is equivalent to counting the number of independent sets in the intersection graph G = L(H). More precisely, let ZM (H) be the number of matchings in a hypergraph H and, for a graph G, let ZI (G) be the number of independent sets in G. (Note that both quantities count the empty set.) Then ZM (H) = ZI (L(H)). To approximately count the number of independent sets in a graph G = L(H) for a (3, 3)-graph H, we apply some of the ideas from [2] (the preliminary version of this paper appeared in [1]) and [8]. In [2] two new instances of FPTAS were constructed, both based on the spatial correlation decay method. First, for #M (2, r) with any given r. Then, still in [2], the authors refined their approach to yield an FPTAS for counting independent sets in claw-free graphs of bounded clique number which contain so called simplicial cliques. The last restriction has been removed by an ingenious observation in [8]. Papers [2,8] inspired us to seek adequate methods for (3, 3)-graphs. Indeed, for every (3, 3)-graph H its intersection graph G = L(H) is 4-claw-free and has ∆(G) ≤ 6. This turned out to be the right approach, as we deduced our Thm. 2 from a technical lemma (Lem. 3 below) which constructs an FPTAS for the number of independent sets in K1,4 -free graphs G with ∆(G) ≤ 6 and an additional property stemming from their being intersection graphs of (3, 3)graphs. 3.1 Proof of Theorem 2 – Sketch and Preliminaries We deduce Thm. 2 from a technical lemma. The assumptions of this lemma reflect some properties of the intersection graphs of (3, 3)-graphs. Lemma 3. There exists an FPTAS for the problem of counting independent sets in every 4-claw-free graph with maximum degree at most 6 and such that the neighborhood of every vertex of degree d ≥ 5 induces a subgraph that spans a matching of size bd/2c. Proof (of Thm. 2). Given a (3, 3)-graph H, consider its intersection graph G. Then G is 4-claw-free, has maximum degree at most 6 and every vertex neighborhood of size d ≥ 5 must span in G a matching of size bd/2c. This means that 5 Lem. 3 applies to G and there is an FPTAS for counting independent sets of G which is the same as counting matchings in H. t u It remains to prove Lem. 3. We begin with underlining some properties of 4-claw-free graphs which are relevant for our method. First, we introduce the notion of a simplicial 2-clique which is a generalization of a simplicial clique introduced in [4] and utilized in [2]. Throughout we assume notation A \ B for set differences and, for A ⊂ V (G), we write G − A for the graph operation of deleting from G all vertices belonging to A. In other words, G−A = G[V (G)\A]. Also, for any graph G, we use δ(G) to denote its minimum vertex degree and α(G) for the size of the largest independent set in G. Definition 4. A set K ⊆ V (G) is a 2-clique if α(G[K]) ≤ 2. A 2-clique is simplicial if for every v ∈ K, NG (v) \ K is a 2-clique in G − K. For us a crucial property of simplicial 2-cliques is that if G is a connected graph containing a nonempty simplicial 2-clique K then it is easy to find another simplicial 2-clique in the induced subgraph G − K, and consequently, the whole vertex set of G can be partitioned into blocks which are simplicial 2-cliques in suitable nested sequence of induced subgraphs of G (see Claim 8). However, in the proof of Lem. 3 we shall use a special class of 2-cliques. Definition 5. A 2-clique K in a graph G is called a block if |K| ≤ 4 and δ(G[K]) ≥ 1 whenever |K| = 4. A block K is simplicial if for every v ∈ K the set NG (v) \ K is a block in G − K. Next, we state a trivial but useful observation which follows straight from the above definition. (We consider the empty set as a block too.) Fact 6. If K is a (simplicial) block in G then for every V 0 ⊆ V (G) the set K ∩ V 0 is a (simplicial) block in the induced subgraph G[V 0 ] of G. Let a graph G satisfy the assumptions of Lem. 3. The next claim provides a vital, “self-reproducing” property of blocks in G. Claim 7. If K is a simplicial block in G, then for every v ∈ K the set NG (v)\K is a simplicial block in G − K. Proof. Set Kv := NG (v) \ K for convenience. By definition of K, Kv is a block. It remains to show that Kv is simplicial. Let u ∈ Kv and let Ku = NG (u) \ (K ∪ NG (v)). Suppose there is an independent set I in G[Ku ] of size |I| = 3. Then u, v and the vertices of I would form an induced K1,4 in G with u in the center. As this is a contradiction, we conclude that Ku is a 2-clique. To show that Ku is indeed a block, note first that, by the assumptions that ∆(G) ≤ 6, we have |Ku | ≤ 5. However, if |Ku | = 5 then v would be an isolated vertex in G[NG (u)]. But G[NG (u)] spans a matching of size 3 since δ(u) = 6 – a contradiction. For the same reason, if |Ku | = 4 then regardless of the degree of u in G (which might be 5 or 6) there can be no isolated vertex in G[Ku ], since G[Ku ] must span a matching of size 2. t u 6 Our next claim asserts that once there is a nonempty block in G, one can find a suitable partition of V (G) into sets which are blocks in a nested sequence of induced subgraphs of G defined by deleting these sets one after another. Claim 8. Let K be a nonempty simplicial block in G. If, in addition, G is connected then there exists a partition V (G) = K1 ∪ · · · ∪ Km such that K1 = K and Si−1for every i = 2, . . . , m, Ki is a nonempty, simplicial block in Gi := G − j=1 Kj . Proof. Suppose we have already constructed disjoint sets K1 ∪ · · · ∪ Ks , for some s ≥ 1, such that K1S= K, for every i = 2, . . . , s, Ki isSa nonempty, simplicial i−1 s block in Gi := G − j=1 Kj , and that Rs := V (G) \ i=1 Ki 6= ∅. Since G is connected, there is an edge between a vertex in Rs and a vertex v ∈ Ki for some 1 ≤ i ≤ s. Since Ki is a simplicial block in Gi , by Fact 6, it is also simplicial in its subgraph Gi [V 0 ], where V 0 = Ki ∪ Rs , that is the subgraph of Gi obtained 0 by deleting all vertices of Ki+1 ∪ · · · ∪ Ks . Now apply Claim 7 to Gi [V Ss ], Ki , and v, to conclude that NG (v) ∩ Rs is a simplicial block in Gs+1 := G − i=1 Ki . t u Let K1 , K2 , . . . , Km be as in Claim 8. Then, ZI (G) = ZI (Gi ) ZI (Gm ) ZI (G1 ) ZI (G2 ) · · ... · · ... · , ZI (G2 ) ZI (G3 ) ZI (Gi+1 ) ZI (Gm+1 ) (1) where Gm+1 = ∅ and ZI (Gm+1 ) = 1. Observe that for each i, Gi+1 = Gi − Ki and the reciprocal of each quotient in (1) is precisely the probability PGi (Ki ∩ I = ∅) = ZI (Gi − Ki ) , ZI (Gi ) (2) where I is an independent set of Gi chosen uniformly at random. In view of this, the main step in building an FPTAS for ZI (G) will be to approximate the probability PG (Ki ∩ I = ∅) within 1 ± n (see Sec. 3.2 and Algorithm 2 therein). But what if G isSdisconnected or does not contain a simplicial block to start c with? First, if G = i=1 Gi consists of c connected components G1 , . . . , Gc , then, clearly c Y ZI (G) = ZI (Gi ) (3) i=1 and the problem reduces to that for connected graphs. As for the second obstacle, Fadnavis [8] proposed a very clever observation to cope with it. Let G be a connected graph satisfying the assumptions of Lem. 3 and let v ∈ V (G) be such that G − v is connected. By considering the fate of vertex v, we obtain the recurrence ZI (G) = ZI (G − v) + ZI (Gv ), (4) Sc where Gv = G − NG [v] and NG [v] = NG (v) ∪ {v}. Let Gv = i=1 Gvi be the partition of Gv into its connected components. For each i let ui ∈ NG (v) be such that NG (ui ) ∩ V (Gvi ) 6= ∅. Owing to the connectedness of G − v, a vertex ui must exist. Set Ki = NG (ui ) ∩ V (Gvi ). 7 Claim 9. The set Ki is a simplicial block in Gvi . Proof. The proof is quite similar to that of Claim 7. We first prove that Ki is a block. Suppose there is an independent set I in G[Ki ] of size |I| = 3. Then ui , v and the vertices of I would form an induced K1,4 in G with ui in the center. As this is a contradiction, we conclude that Ki is a 2-clique. To prove that Ki is, in fact, a block, notice that there is no edge between v and Ki . Thus, we cannot have |Ki | = 5 because then v would be an isolated vertex in G[N (ui )] – a contradiction with the assumption on G. If, however, |Ki | = 4 then v is the (only) isolated vertex in G[N (ui )] and, consequently, δ(G[Ki ]) ≥ 1. It remains to show that the block Ki is simplicial, that is, for every w ∈ Ki , the set NGvi (w) \ Ki is a block in Gvi − Ki . This, however, can be proved mutatis mutandis as in the proof of Claim 7. t u For the first term of recurrence (4) we apply (4) recursively. In view of Claim 9, to the second term of recurrence (4) one can apply formula (3) and then each term ZI (Gvi ) can be approximated based on (1) and (2). 3.2 The Remainder of the Proof of Lemma 3 within 1 ± n , where Hence, it remains to approximate PG (K ∩ I = ∅) = ZIZ(G−K) I (G) K is a simplicial block in G. We set Nv := NG (v) and formulate the following recurrence relation by considering how an independent set may intersect K: ZI (G) = ZI (G − K) + X ZI (G − (Nv ∪ K)) + v∈K 1 2 X ZI (G − (Nu ∪ Nv ∪ K)) uv ∈G[K] / or equivalently, after dividing sidewise by ZI (G − K), X ZI (G − (Nv ∪ K)) 1 ZI (G) = 1+ + ZI (G − K) ZI (G − K) 2 v∈K X uv ∈G[K] / ZI (G − (Nu ∪ Nv ∪ K)) . ZI (G − K) Here and throughout the inner summation ranges over all ordered pairs of distinct vertices of K such that {u, v} ∈ / G[K]. At this point, in view of symmetry, it seems redundant to consider ordered pairs (and consequently have the factor of 12 in front of the sum), but we break the symmetry right now as we further observe that ZI (G − (Nu ∪ Nv ∪ K)) ZI (G − (Nv ∪ K)) ZI (G − (Nu ∪ Nv ∪ K)) = · . ZI (G − K) ZI (G − (Nv ∪ K)) ZI (G − K) By Claim 7, Nv \ K is a simplicial block in G − K. We need to show that, similarly, Nu \ (Nv ∪ K) is a simplicial block in G − (Nv ∪ K). Claim 10. Let K be a simplicial block in G and let u, v ∈ K be such that u 6= v and uv ∈ / G[K]. Further, let H := G − (NG (v) ∪ K). Then NH (u) is a simplicial block in H. 8 Proof. By Claim 7, the set NG (u) \ K is a simplicial block in G − K. Apply Fact 6 to NG (u) \ K and G − K with V 0 = V (H). t u Let ΠG (K) := P(K ∩ I = ∅) = ZI (G − K) , ZI (G) where I is a random independent set of G. Finally, setting Kv := Nv \ K and Kuv := Nu \ (Nv ∪ K), and rewriting G − (Nv ∪ K) = G − K − Kv , we get the recurrence for the probabilities:   X X 1 −1 ΠG−K−Kv (Kuv ) . ΠG (K) = 1 + ΠG−K (Kv ) 1 + 2 v∈K uv ∈G[K] / This recurrence, in principle, allows one to compute ΠG (K) exactly, but only in an exponential number of steps. Instead, we will approximate it by a function ΦG (K, t), also defined recursively, which “mimics” ΠG (K) but has a built-in time counter t. Definition 11. For every graph G, every simplicial block K in G and an integer t ∈ Z+ , the function ΦG (K, t) is defined recursively as follows: ΦG (K, 0) = ΦG (K, 1) = 1 as well as ΦG (∅, t) = 1, while for t ≥ 2 and K 6= ∅   X X 1 Φ−1 ΦG−K (Kv , t − 1) 1 + ΦG−K−Kv (Kuv , t − 2) . G (K, t) = 1 + 2 v∈K uv ∈G[K] / Now we are ready to state the algorithm CountMatchings for computing ZM (H) for any connected (3, 3)-graph H and its subroutine CountIS for computing ZI (G) in a subgraph of G = L(H) containing a simplicial block K. Algorithm 1 CountMatchings(H, t) 1: 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: G := L(H). ZM := 1, F := G. while F 6= ∅ do Pick v ∈ V (F ) s.t. F − v is connected. F v := F − NF [v] If F v = S ∅ then ZM = ZM + 1 and go to Line 3. F v = ci=1 Fiv , where Fiv are connected components of F v . for i := 1 to c do Find Ki as in Claim 9 end for Q ZM := ZM + ci=1 CountIS(Fiv , Ki , t) F := F − v end while Return ZM 9 Algorithm 2 CountIS(G, K, t) 1: 2: 3: 4: 5: 6: 7: S Let V (G) = m i=1 Ki be a partition of V (G) as in Claim 8 with K1 = K. ZI := 1, F := G for i = 1 to m do ZI ZI := ΦF (K i ,t) F := F − Ki end for Return ZI We will show that already for t = Θ(log n), when Φ can be easily computed in polynomial time, the two functions become close to each other. Note that both quantities, ΠG (K) and ΦG (K, t), fall into the interval [ 91 , 1]. The lower bound is due to the fact that a block has at most 4 vertices and each of them has degree at most 2 in Gc , so that the total number of terms in the denominator is at most nine, five of them do not exceed 1, while eight of them do not exceed 12 . Our goal is to approximate ΠG (K) by ΦG (K, t), for a suitably chosen t, within the multiplicative factor of 1 ± /n. In view of the above lower  bound, it suffices to show that |ΠG (K) − ΦG (K, t)| ≤ 9n . To achieve this goal, we will use the correlation decay technique which boils down to establishing a recursive bound on the above difference (cf. [2]). The success of this method depends on the right choice of a pair of functions g and h, with g : [0, 1] → <, such that they are inverses of each other, that is, g ◦ h ≡ 1. Then we define a function fK of |K| + 2e(Gc [K]) variables, one for each vertex and each (ordered) non-edge of G[K], as follows. Let z = (z1 , . . . , z|K| , zuv : uv ∈ / G[K]) be a vector of variables of that function. For ease of notation, we denote the set of all indices of the coordinates of function fK by J, that is, we set J := K ∪ {(u, v) : {u, v} ∈ / G[K]}. Then  −1     X X 1   h(zuv ) fK (z) := f (z) = g  1 + h(zv ) 1 + (5) .   2 v∈K uv ∈G[K] / To understand the reason for this set-up, put x := g(ΠG (K)), xv := g(ΠG−K (Kv )), xuv := g(ΠG−K−Kv (Kuv )), and, correspondingly, y := g(ΦG (K, t)) yv := g(ΦG−K (Kv , t − 1)) yuv := g(ΦG−K−Kv (Kuv , t − 2)). Then, f (x) = x and f (y) = y, and so the difference we are after can be expressed as |x − y| = |f (x) − f (y)|. Thus, we are in position to apply the Mean Value Theorem to f and conclude that there exists α ∈ [0, 1] such that, setting zα = αx + (1 − α)y, |f (x) − f (y)| = |∇f (zα )(x − y)| ≤ |∇f (zα )| × max |xκ − yκ |. κ∈J It remains to bound maxz |∇f (z)| from above, uniformly by a constant γ < 1. Then, after iterating at most t but at least t/2 times, we will arrive at a triple 10 (G0 , K 0 , t0 ), where G0 is an induced subgraph of G, K 0 is a block in G0 , and t0 ∈ {0, 1}. At this point, setting µg := |g(1)| + | maxs g(s))|, we will obtain the ultimate bound  |x − y| ≤ γ t/2 × |g(ΠG0 (K 0 )) − g(1)| ≤ γ t/2 × µg ≤ , 9n for t ≥ 2 log((9µg n)/)/ log(1/γ). (6) In [2], to estimate |∇f (z)| for a similar function f , the authors chose g(s) = log s and h(s) = es . This choice, however, does not work for us. Instead, we set g(s) = s1/4 and h(s) = s4 . Then, µg = 2 and ( ) P P 4 3 zv3 + 12 (zv3 zuv + zv4 zuv ) X ∂f (z) v∈K uv ∈G[K] / =( |∇f (z)| ≤ !)5/4 . ∂zκ P 4 P κ∈J 1 4 1+ zuv zv 1 + 2 v∈K uv ∈G[K] / Observe that fK depends only on the isomorphism type of G[K], a graph on up to 4 vertices, with no independent set of size 3, and with no isolated vertex when |K| = 4. Let us call all these graphs block graphs. One block graph is given in Figure 1 below. z1 z2 z13 z14 z23 z24 z4 z3 Fig. 1. The essential block graph. In a sense we just need to consider this one block graph. Indeed, the complement of every block graph is contained in the complement of the block graph in Figure 1. Hence, it suffices to maximize |∇f (z)| just for this graph. Our computational task is, therefore, to bound from above  1 1 + z14 + z24 + z34 + z44 + 4      −5/4 1 4 4 4 4 4 z14 z1 + z44 + z13 z14 + z34 + z23 z24 + z34 + z24 z24 + z44 × 2  4 4  4 4  4 4  4 4  2z13 2 + z14 + z13 + 2z23 2 + z23 + z24 + 2z33 2 + z13 + z23 + 2z43 2 + z14 + z24 +      3 3 3 3 2z14 z14 + z44 + 2z13 z14 + z34 + 2z23 z24 + z34 + 2z24 z24 + z44 . F (z) = k∇(z)k1 = 11 One can show (using, e.g., Mathematica) that F (z) < 0.971 for 0 ≤ zi ≤ 1 and 0 ≤ zij ≤ 1. Thus, we have (6) with µg = 2 and, say, γ = 0.98 = 49 50 . Summarizing, the running time of computing ΦG (K, t) in Step 4 of Algorithm 2 is 12t since there at most 12 expressions to compute in each step of the recurrence relation (see Def. 11). Also, CountIS takes at most |V (Fiv )|12t steps and hence, Line 11 of CountMatchings takes n12t steps and is invoked at most n times. Consequently, with t = 2dlog((18n)/)/ log(50/49)e we get the running time of  our algorithm of order O n2 (n/)log50/49 144 . Remark 12. With basically the same proof wePcan construct an FPTAS for calculating the partition function ZM (H, λ) = M λ|M | , where the sum runs over all matchings in H, for any constant λ ∈ (0, 1.077]. The λ factor will appear 4 in front of each summation in (5), which one can neutralize by setting h(s) = sλ and g(s) = (λs)1/4 . 4 Summary, Discussion, and Further Research The main result of this paper (Thm. 2) establishes an FPTAS for the problem #M (3, 3) of counting the number of matchings in a (3, 3)-graph. A reformulation of Thm. 2 in terms of graphs yields an FPTAS for the problem of counting independent sets in every graph which is the intersection graph of a (3, 3)-graph. As mentioned earlier, every intersection graph of a (3, 3)-graph is 4-claw-free. Moreover, its maximum degree is at most six. We wonder if there exists an FPTAS for the problem of counting independent sets in every 4-claw-free graph with maximum degree at most 6. Lemma 3 falls short of proving that. The missing part is due to our inability to repeat the above estimates for 2-cliques of size five. In an earlier paper [12] three of the authors have found an FPRAS for the number of matchings in k-graphs without 3-combs. As their intersection graphs are claw-free, it follows from the above mentioned result on independent sets in [2,8] that there is also an FPTAS for the number of matchings in (k, r)-graphs without 3-combs, for any fixed r. In view of this conclusion and Thm. 2, we raise the question if for all k ≤ 5 and r there is an FPTAS (or at least FPRAS) for the problem #M (k, r). The first open instance is that of (3, 4)-graphs. For k = 4, 5, to avoid recurrences of depth k − 1 ≥ 3, as an intermediate step, one could first consider the restriction of the class of (k, r)-graphs to those without a 4-comb, that is, to those whose intersection graphs are 4-claw-free. Here, the first open instance is that of (4, 3)-graphs without 4-combs. In general, it would be also very interesting to elucidate the status of the problem for arbitrary k-graphs for k = 3, 4 and 5, or for some generic subclasses of them. Acknowledgements We thank Martin Dyer and Mark Jerrum for stimulating discussions on the subject of this paper and the referees for their valuable comments. We are also 12 very grateful to Michael Simkin who pointed out and fixed an error (cf. Lemma 3 and the proof of Claim 7) in an earlier version of this paper [6]. References 1. Bayati, M., Gamarnik, D., Katz, D., Nair, C., Tetali, P.: Simple deterministic approximation algorithms for counting matchings. In: STOC’07—Proceedings of the 39th Annual ACM Symposium on Theory of Computing, pp. 122–127. ACM (2007) 2. Bayati, M., Gamarnik, D., Katz, D., Nair, C., Tetali, P.: Simple deterministic approximation algorithms for counting matchings (2008), http://people.math. gatech.edu/~tetali/PUBLIS/BGKNT_final.pdf 3. Beineke, L.W.: Characterizations of derived graphs. J. Combin. Theory 9, 129–135 (1970) 4. Chudnovsky, M., Seymour, P.: The roots of the independence polynomial of a clawfree graph. J. Combin. Theory Ser. B 97(3), 350–357 (2007) 5. Dobrushin, R.: Prescribing a system of random variables by conditional distributions. Theor. Probab. Appl. 15, 458–486 (1970) 6. Dudek, A., Karpinski, M., Ruciński, A., Szymańska, E.: Approximate counting of matchings in (3, 3)-hypergraphs. In: Algorithm theory—SWAT 2014, Lecture Notes in Comput. Sci., vol. 8503, pp. 380–391. Springer, Cham (2014) 7. Dyer, M., Frieze, A., Jerrum, M.: On counting independent sets in sparse graphs. SIAM J. Comput. 31(5), 1527–1541 (2002) 8. Fadnavis, S.: Approximating independence polynomials of claw-free graphs (2012), http://www.math.harvard.edu/~sukhada/IndependencePolynomial.pdf 9. Greenhill, C.: The complexity of counting colourings and independent sets in sparse graphs and hypergraphs. Comput. Complexity 9(1), 52–72 (2000) 10. Heilmann, O.: Existence of phase transitions in certain lattice gases with repulsive potential. Lett. Al Nuovo Cimento Series 2 3(3), 95–98 (1972) 11. Jerrum, M., Sinclair, A.: Approximating the permanent. SIAM J. Comput. 18(6), 1149–1178 (1989) 12. Karpiński, M., Ruciński, A., Szymańska, E.: Approximate counting of matchings in sparse uniform hypergraphs. In: 2013 Proceedings of the Workshop on Analytic Algorithmics and Combinatorics (ANALCO), pp. 72–79. SIAM (2013) 13. Kelly, F.P.: Stochastic models of computer communication systems. J. Roy. Statist. Soc. Ser. B 47(3), 379–395, 415–428 (1985) 14. Luby, M., Vigoda, E.: Fast convergence of the Glauber dynamics for sampling independent sets. Random Structures Algorithms 15(3-4), 229–241 (1999) 15. Sly, A.: Computational transition at the uniqueness threshold. In: 2010 IEEE 51st Annual Symposium on Foundations of Computer Science FOCS 2010, pp. 287–296 (2010) 16. Sly, A., Sun, N.: The computational hardness of counting in two-spin models on dregular graphs. In: FOCS, pp. 361–369 (2012), http://arxiv.org/abs/1203.2602 17. Valiant, L.G.: The complexity of enumeration and reliability problems. SIAM J. Comput. 8(3), 410–421 (1979) 18. Weitz, D.: Counting independent sets up to the tree threshold. In: STOC’06: Proceedings of the 38th Annual ACM Symposium on Theory of Computing, pp. 140– 149. ACM (2006) 13 Appendix: Mathematica expressions First we define F (z) function: F[z1_, z2_, z3_, z4_, z14_, z13_, z23_, z24_]:=\ 1/4(1+z1^4+z2^4+z3^4+z4^4+\ 1/2(z14^4(z1^4+z4^4)+z13^4(z1^4+z3^4)+\ z23^4(z2^4+z3^4)+z24^4(z2^4+z4^4)))^(-5/4)\ (2z1^3(2+z14^4+z13^4)+2z2^3(2+z23^4+z24^4)+\ 2z3^3(2+z13^4+z23^4)+2z4^3(2+z14^4+z24^4)+\ 2z14^3(z1^4+z4^4)+2z13^3(z1^4+z3^4)+\ 2z23^3(z2^4+z3^4)+2z24^3(z2^4+z4^4)) Next we find the absolute maximum: NMaximize[{F[z1, z2, z3, z4, z14, z13, z23, z24],\ 0<=z1<=1 && 0<=z2<=1 && 0<=z3<=1 && 0<=z4<=1 && 0<=z14<=1 && 0<=z13<=1 && 0<=z23<=1 && 0<=z24<=1},\ {z1, z2, z3, z4, z14, z13, z23, z24}] obtaining that F (z) ≤ F (ζ, ζ, ζ, ζ, 1, 1, 1, 1) ∼ 0.970247, where ζ ∼ 0.695347.
8cs.DS
arXiv:1709.01606v1 [math.AC] 5 Sep 2017 Factoring in the Chicken McNugget monoid1 Scott T. Chapman Sam Houston State University Department of Mathematics and Statistics Box 2206 Huntsville, TX 77341-2206 [email protected] Chris O’Neill University of California at Davis Department of Mathematics One Shield Ave. Davis, CA 95616 [email protected] People just want more of it. - Ray Kroc 2 1 Introduction Every day, 34 million Chicken McNuggets are sold worldwide.3 At most McDonalds locations in the United States today, Chicken McNuggets are sold in packs of 4, 6, 10, 20, 40, and 50 pieces. However, shortly after their introduction in 1979 they were sold in packs of 6, 9, and 20. The following problem spawned from the use of these latter three numbers. The Chicken McNugget Problem. What numbers of Chicken McNuggets can be ordered using only packs with 6, 9, or 20 pieces? 1 This article is based on a 2013 PURE Mathematics REU Project by Emelie Curl, Staci Gleen, and Katrina Quinata which was directed by the authors and Roberto Pelayo. 2 https://www.brainyquote.com/quotes/authors/r/ray_kroc.html 3 http://www.answers.com/Q/How_many_nuggets_does_mcdonalds_sell_a_day? 1 Early references to this problem can be found in [26, 30]. Positive integers satisfying the Chicken McNugget Problem are now known as McNugget numbers [22]. In particular, if n is a McNugget number, then there is an ordered triple (a, b, c) of nonnegative integers such that 6a + 9b + 20c = n. (1) We will call (a, b, c) a McNugget expansion Figure 1: The 6 piece box of n (again see [22]). Since both (3, 0, 0) and (0, 2, 0) are McNugget expansions of 18, it is clear that McNugget expansions are not unique. This phenomenon will be the central focus of the remainder of this article. If max{a, b, c} ≥ 8 in (1), then n ≥ 48 and hence determining the numbers x with 0 ≤ x ≤ 48 which are McNugget numbers can be checked either by hand or your favorite computer algebra system. The only such x’s which are not McNugget numbers are: 1, 2, 3, 4, 5, 7, 8, 10, 11, 13, 14, 16, 17, 19, 22, 23, 25, 28, 31, 34, 37, and 43. (The non-McNugget numbers are sequence A065003 in the On-Line Encyclopedia of Integer Sequences4 .) We demonstrate this in Table 1 with a chart that offers the McNugget expansions (when they exist) of all numbers ≤ 50. What happens with larger values? Table 1 has already verified that 44, 45, 46, 47, 48, and 49 are McNugget numbers. Hence, we have a sequence of 6 consecutive McNugget numbers, and by repeatedly adding 6 to these values, we obtain the following. Proposition 1.1. Any x > 43 is a McNugget number. Thus, 43 is the largest number of McNuggets that cannot be ordered with packs of 6, 9, and 20. Our aim in this paper is to consider issues related to the multiple occurances of McNugget expansions as seen in Table 1. Such investigations fall 4 http://oeis.org/A065003. 2 # 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 (a, b, c) (0, 0, 0) NONE NONE NONE NONE NONE (1, 0, 0) NONE NONE (0, 1, 0) NONE NONE (2, 0, 0) NONE NONE (1, 1, 0) NONE # 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 (a, b, c) NONE (3, 0, 0) (0, 2, 0) NONE (0, 0, 1) (2, 1, 0) NONE NONE (4, 0, 0) (1, 2, 0) NONE (1, 0, 1) (0, 3, 0) (3, 1, 0) NONE (0, 1, 1) (5, 0, 0) (2, 2, 0) NONE (2, 0, 1) (1, 3, 0) (4, 1, 0) # 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 (a, b, c) NONE (1, 1, 1) (0, 4, 0) (3, 2, 0) (6, 0, 0) NONE (0, 2, 1) (3, 0, 1) (2, 3, 0) (5, 1, 0) (0, 0, 2) (2, 1, 1) (1, 4, 0) (4, 2, 0) (7, 0, 0) NONE (1, 2, 1) (4, 0, 1) (0, 5, 0) (3, 3, 0) (6, 1, 0) (1, 0, 2) (0, 3, 1) (3, 1, 1) (2, 4, 0) (5, 2, 0) (8, 0, 0) (0, 1, 2) (2, 2, 1) (5, 0, 1) Table 1: The McNugget numbers and their expansions from 0 to 50 under the more general purview of the theory of non-unique factorizations in integral domains and monoids (a good technical reference on this subject is [20]). Using a general context, we show in Section 2 that the McNugget numbers form an additive monoid and discuss some properites shared by the class of additive submonoids of the nonnegative integers. In Section 3, we define the particular combinatorial characteristics of McNugget expansions which we will consider. Computations of these characteristics for the McNugget Monoid will appear in Section 4. By emphasizing results concerning McNugget numbers, we offer the reader a glimpse into vast literature surrounding non-unque factorizations. While we stick to the calculation of basic factorization invariants, our results indicate that such computations involve a fair amount of complexity. Many of the results we touch on have appeared in papers authored or co-authored 3 by undergraduates in National Science Foundation Sponsored REU Programs. This is an area which remains rich in open problems, and we hope our discussion here spurs our readers (both young and old) to explore this rewarding subject more deeply. 2 A brief diversion into generality As illustrated above, Chicken McNugget numbers fit into a long studied mathematical concept. Whether called the Postage Stamp Problem [25], the Coin Problem [15], or the Knapsack Problem [21], the idea is as follows. Given a set of k objects with predetermined values n1 , n2 , . . . , nk , what possible values of n can be had from combinations of these objects? Thus, if a value of n can be obtained, then there is an ordered k-tuple of nonnegative integers (x1 , . . . , xk ) which satisfy the linear diophatine equation n = x1 n1 + x2 n2 + · · · + xk nk . (2) We view this in a more algebraic manner. Given integers n1 , . . . , nk > 0, set hn1 , . . . , nk i = {x1 n1 + · · · + xk nk | x1 , . . . , xk ∈ N0 }. Notice that if s1 and s2 are in hn1 , . . . , nk i, then s1 +s2 is also in hn1 , . . . , nk i (where + represents regular addition). Since 0 ∈ hn1 , . . . , nk i and + is an associative operation, the set hn1 , . . . , nk i under + forms a monoid. Monoids of nonnegative integers under addition, like the one above, are known as numerical monoids, and n1 , . . . , nk are called generators. We will call the numerical monoid h6, 9, 20i the Chicken McNugget monoid, and denote it by . Since consists of the same elements as h6, 9, 20, 27i, it is clear that generating sets are not unique. Using elementary number theory, it is easy to argue that any numerical monoid hn1 , . . . , nk i does have a unique generating set with minimal cardinality, obtained by eliminating those generators ni that lie in the numerical monoid generated by {n1 , . . . , nk } − {ni }. In this way, it is clear that 6, 9, 20 is indeed the minimal generating set of . 4 When dealing with a general numerical monoid hn1 , . . . , nk i, we will assume without loss of generality that given generating set n1 , . . . , nk is minimal. In view of this broader setting, the Chicken McNugget Problem can be generalized as follows. The Numerical Monoid Problem. If n1 , . . . , nk are positive integers, then which nonnegative integers lie in hn1 , . . . , nk i? Example 2.1. We have already determined above exactly which nonnegative integers are McNugget numbers. Suppose the Post Office issues stamps in denominations of 4 cents, 7 cents, and 10 cents. What values of postage can be placed on a letter (assuming that as many stamps as necessary can be placed on the envelope)? In particular, we are looking for the elements of h4, 7, 10i. We can again use brute force to find all the solutions to 4a + 7b + 10c = n and conclude that 1, 2, 3, 5, 6, 9, and 13 cannot be obtained. Since 14, 15, 16, and 17 can, all postage values larger than 13 are possible. 2 Figure 2: The 9 piece box Let’s return to the largest number of McNuggets that can’t be ordered (namely, 43) and the companion number 13 obtained in Example 2.1. The existence of these numbers is no accident. To see this in general, let n1 , . . . , nk be a set of positive integers which are relatively prime. By elementary number theory, there is a set y1 , . . . , yk of (possibly negative) integers such that 1 = y1 n 1 + · · · + yk n k . By choosing an element V = x1 n1 +· · ·+xk nk ∈ hn1 , . . . , nk i with sufficiently large coefficients (for instance, if each xi ≥ n1 |yi |), we see V + 1, . . . , V + n1 all lie in hn1 , . . . , nk i as well. As such, any integers greater than V can be obtained in hn1 , . . . , nk i by adding copies of n1 . This motivates the following definition. 5 Definition 2.2. If n1 , . . . , nk are relatively prime positive integers, then the Frobenius number of hn1 , . . . , nk i, denoted F (hn1 , . . . , nk i), is the largest positive integer n such that n ∈ / hn1 , . . . , nk i. We have already shown that F ( ) = 43 and F (h4, 7, 10i) = 13. A famous result of Sylvester from 1884 [29] states that if a and b are relatively prime, then F (ha, bi) = ab − a − b (a nice proof of this can be found in [6]). This is where the fun begins, as strictly speaking no formula exists to compute the Frobenius number of numerical monoids that require 3 or more generators. While there are fast algorithms Figure 3: The 20 piece box which can compute F (hn1 , n2 , n3 i) (see for instance [17]), at best formulas for F (hn1 , . . . , nk i) exist only in special cases (you can find one such special case where F ( ) = 43 pops out in [1, p. 14]). Our purpose is not to compile or expand upon the vast literature behind the Frobenius number; in fact, we direct the reader to the excellent monograph of Ramı́rez Alfonsı́n [27] for more background reading on the Diophatine Frobenius Problem. 3 The McNugget factorization toolkit We focus now on the multiple McNugget expansions we saw in Table 1. In particular, notice that there are McNugget numbers which have unique triples associated to them (6, 9, 12, 15, 20, 21, 26, 29, 32, 35, 40, 41, 46, and 49), some of which have two (18, 24, 27, 30, 33, 35, 39, 44, 47, and 50), and even some which have three (36, 42, 45, and 48). While the “normal” notion of factoring occurs in systems where multiplication prevails, notice that the ordered triples representing McNugget numbers are actually factorizations of these numbers into “additive” factors of 6, 9, and 20. Let’s borrow some terminology from abstract algebra ([18] is a good beginning reference on the topic). Let x and y ∈ hn1 , . . . , nk i. We say 6 that x divides y in hn1 , . . . , nk i if there exists a z ∈ hn1 , . . . , nk i such that y = x+z. We call a nonzero element x ∈ hn1 , . . . , nk i irreducible if whenever x = y + z, either y = 0 or z = 0. (Hence, x is irreducible if its only proper divisors are 0 and itself). Both of these definitions are obtained from the usual “multiplicative” definition by replacing “·” with “+” and 1 with 0. We leave the proof of the following to the reader. Proposition 3.1. If hn1 , . . . , nk i is a numerical monoid, then its irreducible elements are precisely n1 , . . . , nk . Related to irreducibility is the notion of prime elements. A nonzero element x ∈ hn1 , . . . , nk i is prime if whenever x divides a sum y + z, then either x divides y or x divides z (this definition is again borrowed from the multiplicative setting). It is easy to check from the definitions that prime elements are always irreducible, but it turns out that in general irreducible elements need not be prime. In fact, the irreducible elements n1 , . . . , nk of a numerical monoid are never prime. To see this, let ni be an irreducible element and let T be the numerical monoid generated by {n1 , . . . , nk }−{ni }. Although ni ∈ / T , some multiple of ni must lie in T (take, for instance, n2 ni ). P Let kn = j6=i xj nj (for some k > 1) be the smallest multiple of ni in T . P Then n divides j6=i xj nj over hn1 , . . . , nk i, but by the minimality of k, n does not divide any proper subsum. Thus ni is not prime. For our purposes, we restate Proposition 3.1 in terms of . Corollary 3.2. The irreducible elements of the McNugget monoid are 6, 9, and 20. There are no prime elements. 3.1 The set of factorizations of an element We refer once again to the elements in Table 1 with multiple irreducible factorizations. For each x ∈ , let Z(x) = {(a, b, c) | 6a + 9b + 20c = x}. We will refer to Z(x) as the complete set of factorizations x in , and as such, we could relabel columns 2, 4, and 6 of Table 1 as “Z(x).” While we 7 will not dwell on general structure problems involving Z(x), we do briefly address one in the next example. Example 3.3. What elements x in the McNugget monoid are uniquely factorable (i.e., |Z(x)| = 1)? A quick glance at Table 1 yields 14 such nonzero elements (namely, 6, 9, 12, 15, 20, 21, 26, 29, 32, 35, 40, 41, 46, 49). Are there others? We begin by noting in Table 1 that (3, 0, 0), (0, 2, 0) ∈ Z(18) and (10, 0, 0), (0, 0, 3) ∈ Z(60). This implies that in any factorization in , 3 copies of 6 can be freely replaced with 2 copies of 9 (this is called a trade). Similarly, 2 copies of 9 can be traded for 3 copies of 6, and 3 copies of 20 can be traded for 10 copies of 6. In particular, for n = 6a + 9b + 20c ∈ , if either a ≥ 3, b ≥ 2 or c ≥ 3, then n has more than one factorization in . As such, if n is to have unique factorization, then 0 ≤ a ≤ 2, 0 ≤ b ≤ 1, and 0 ≤ c ≤ 2. This leaves 18 possibilities, and a quick check yields that the 3 missing elements are 52 = (2, 0, 2), 55 = (1, 1, 2) and 61 = (2, 1, 2). 2. The argument in Example 3.3 easily generalizes – every numerical monoid which requires more than one generator has finitely many elements that factor uniquely – but note that minimal trades need not be as simple as replacing a multiple of one generator with a multiple of another. Indeed, in the numerical monoid h5, 7, 9, 11i, there is a trade (1, 0, 0, 1), (0, 1, 1, 0) ∈ Z(16), though 16 is not a multiple of any generator. Determining the “minimal” trades of a numerical monoid, even computationally, is known to be a very hard problem in general [28]. 3.2 The length set of an element and related invariants Extracting information from the factorizations of numerical monoid elements (or even simply writing them all down) can be a tall order. To this end, combinatorially-flavored factorization invariants are often used, assigning to each element (or to the monoid as a whole) a value measuring its failure to admit unique factorization. We devote the remainder of this paper to examining several factorization invariants, and what they tell us about the McNugget monoid as compared to more general numerical monoids. 8 We begin by considering a set, derived from the set of factorizations, that has been the focus of many papers in the mathematical literature over the past 30 years. If x ∈ and (a, b, c) ∈ Z(x), then the length of the factorization (a, b, c) is denoted by |(a, b, c)| = a + b + c. We have shown earlier that factorizations in may not be unique, and a quick look at Table 1 shows that their lengths can also differ. For instance, 42 has three different factorizations, with lengths 5, 6 and 7, respectively. Thus, we denote the set of lengths of x in by L(x) = {|(a, b, c)| : (a, b, c) ∈ Z(x)}. In particular, L(42) = {5, 6, 7}. Moreover, set `(x) = min L(x) and L(x) = max L(x). (In our setting, it is easy to argue that L(x) must be finite, so the maximum and minimum above are both well-defined.) To give the reader a feel for these invariants, in Table 2 we list all the McNugget numbers from 1 to 50 and their associated values L(x), `(x), and L(x). The following recent result describes the functions L(x) and `(x) for elements x ∈ hn1 , . . . , nk i that are sufficiently large with respect to the generators. Intuitively, Theorem 3.4 says that for “most” elements x, any factorization with maximal length is almost entirely comprised of n1 , so L(x + n1 ) is obtained by taking a maximum length factorization for x and adding one additional copy of n1 . In general, the “sufficiently large” hypothesis is needed, since, for example, both 41 = 2 · 9 + 1 · 23 and 50 = 5 · 10 are maximum length factorizations in the numerical monoid h9, 10, 23i. Theorem 3.4 ([4, Theorems 4.2 and 4.3]). Suppose hn1 , . . . , nk i is a numerical monoid. If x > n1 nk , then L(x + n1 ) = L(x) + 1, and if x > nk−1 nk , then `(x + nk ) = `(x) + 1. 9 x 0 6 9 12 15 18 20 21 24 26 L(x) `(x) L(x) {0} 0 0 {1} 1 1 {1} 1 1 {2} 2 2 {2} 2 2 {2, 3} 2 3 {1} 1 1 {3} 3 3 {3, 4} 3 4 {2} 2 2 x 27 29 30 32 33 35 36 38 39 40 L(x) {3, 4} {2} {4, 5} {3} {4, 5} {3} {4, 5, 6} {3, 4} {5, 6} {2} `(x) L(x) 3 4 2 2 4 5 3 3 4 5 3 3 4 6 3 4 5 6 2 2 x L(x) 41 {4} 42 {5, 6, 7} 44 {4, 5} 45 {5, 6, 7} 46 {3} 47 {4, 5} 48 {6, 7, 8} 49 {3} 50 {5, 6} `(x) L(x) 4 4 5 7 4 5 5 7 3 3 4 5 6 8 3 3 5 6 Table 2: The McNugget numbers from 0 to 50 with L(x), `(x), and L(x) We will return to this result in Section 4.1, where we give a closed formula for L(x) and `(x) that holds for all x ∈ . Given our definitions to this point, we can now mention perhaps the most heavily studied invariant in the theory of non-unique factorizations. For x ∈ hn1 , . . . , nk i, the ratio ρ(x) = L(x) , `(x) is called the elasticity of x, and ρ(hn1 , . . . , nk i) = sup{ρ(x) | x ∈ hn1 , . . . , nk i} is the elasticity of hn1 , . . . , nk i. The elasticity of an element n ∈ hn1 , . . . , nk i measures how “spread out” its factorization lengths are; the larger ρ(n) is, the more spread out L(n) is. To this end, the elasticity ρ(hn1 , . . . , nk i) encodes the highest such “spread” throughout the entire monoid. For example, if ρ(hn1 , . . . , nk i) = 2, then the maximum factorization length of any element n ∈ hn1 , . . . , nk i is at most twice its minimum factorization length. A formula for the elasticity of a general numerical monoid, given below, was given in [10], and was the result of an undergraduate research project. 10 3 2.5 2 1.5 1 0.5 100 200 300 400 Figure 4: A plot depicting the elasticity function ρ(n) for n ∈ . Theorem 3.5 ([10], Theorem 2.1 and Corollary 2.3). The elasticity of the numerical monoid hn1 , . . . , nk i is ρ(hn1 , . . . , nk i) = nk . n1 Moreover, ρ(n) = nnk1 precisely when n is an integer multiple of the least common multiple of n1 and nk , and for any rational r < nnk1 , there are only finitely many elements x ∈ hn1 , . . . , nk i with ρ(x) ≤ r. The significance of the final statement in Theorem 3.5 is that there are rationals 1 ≤ q ≤ nnk1 which do not lie in the set {ρ(x) | x ∈ hn1 , . . . , nk i} and hence {ρ(x) | x ∈ hn1 , . . . , nk i} ( Q ∩ [1, nnk1 ] (to use terminology from the literature, numerical monoids are not fully elastic). Figure 4 depicts the elasticities of elements of up to n = 400; indeed, as n increases, the elasticity ρ(n) appears to converge to 10 3 = ρ( ). In general, the complete image {ρ(x) | x ∈ hn1 , . . . , nk i} has been determined by Barron, O’Neill, and Pelayo in another student co-authored paper [4, Corollary 4.5]; we direct the reader there for a thorough mathematical description of Figure 4. We close our discussion of elasticity with the following. 11 Corollary 3.6. The elasticity of the McNugget monoid is ρ( ) = 10 . 3 While a popular invariant to study, the elasticity only tells us about the largest and smallest elements of L(x). Looking at Table 2, it appears that the length sets of the first few McNugget numbers are uniformly constructed (each is of the form [a, b] ∩ N for positive integers a and b). One need not look too much further to break this pattern; the element 60 ∈ has Z(60) = {(0, 0, 3), (1, 6, 0), (4, 4, 0), (7, 2, 0), (10, 0, 0)} and thus L(60) = {3, 7, 8, 9, 10}. This behavior motivates the following “finer” factorization invariant. Fix x ∈ hn1 , . . . , nk i, and let L(x) = {m1 , . . . , mt } with m1 < m2 < · · · < mt . Define the delta set of x as ∆(x) = {mi − mi−1 | 2 ≤ i ≤ t}, and the delta set of hn1 , . . . , nk i as ∆(hn1 , . . . , nk i) = [ ∆(x). x∈hn1 ,...,nk i The study of the Delta sets of numerical monoids (and more generally, of cancellative commutative monoids) has been an extremely popular topic; many such papers feature results from REU programs (see, for instance, [7, 8, 9, 11, 12, 14]). From Table 1 we see that the McNugget numbers from 1 to 50 all have Delta set ∅ or {1}, and we have further showed that ∆(60) = {1, 4}. What is the Delta set of and moreover, what possible subsets of this set occur as ∆(x) for some x ∈ ? We will address those questions is Section 4.2, with the help of a result from [11], stated below as Theorem 3.7. One of the primary difficulties in determining the set ∆(hn1 , . . . , nk i) is that even though each element’s delta set ∆(x) is finite, the definition of 12 ∆(hn1 , . . . , nk i) involves the union of infinitely many such sets. The key turns out to be a description of the sequence {∆(x)}x∈hn1 ,...,nk i for large x (note that this is a sequence of sets, not integers). Baginski conjectured during the writing of [7] that this sequence is eventually periodic, and three years later this was settled in the affirmative, again in an REU project. Theorem 3.7 ([11, Theorem 1 and Corollary 3]). For x ∈ hn1 , . . . , nk i, ∆(x) = ∆(x + n1 nk ) whenever x > 2kn2 n2k . In particular, ∆(hn1 , . . . , nk i) = [ ∆(x) x∈D where D = {x ∈ hn1 , . . . , nk i | x ≤ 2kn2 n2k + n1 nk } is a finite set. Thus ∆(hn1 , . . . , nk i) can be computed in finite time. The bound given in Theorem 3.7 is far from optimal; it is drastically improved in [19], albeit with a much less concise formula. For convenience, we will use the bound given above in our computation of ∆( ) in Section 4.2. 3.3 Beyond the length set We remarked earlier that no element of a numerical monoid is prime. Let’s consider this more closely in . For instance, since 6 is not prime, there is a sum x + y in such that 6 divides x + y, but 6 does not divide x nor does 6 divide y (take, for instance, x = y = 9). But note that 6 satisfies the following slightly weaker property. Suppose that 6 divides a sum x1 +· · ·+xt where t > 3. Then there is a subsum of at most 3 of the xi ’s that 6 does divide. To see this, notice that if 6 divides any of the xi ’s, then we are done. So suppose it does not. If 9 divides both xi and xj , then 6 divides xi + xj since 6 divides 9 + 9. If no two xi ’s are divisible by 9, then at least 3 xi ’s are divisible by 20, and nearly identical reasoning to the previous case completes the argument. This value of 3 offers some measure as to how far 6 is from being prime, and motivates the following definition. 13 Definition 3.8. Let hn1 , . . . , nk i be a numerical monoid. For any nonzero x ∈ hn1 , . . . , nk i, define ω(x) = m if m is the smallest positive integer such that whenever x divides x1 + · · · + xt , with xi ∈ hn1 , . . . , nk i, then there is P a set T ⊂ {1, 2, . . . , t} of indices with |T | ≤ m such that x divides i∈T xi . Using Definition 3.8, a prime element would have ω-value 1, so ω(x) can be interpreted as a measure of how far x is from being prime. In , we argued that ω(6) = 3; a similar argument yields ω(9) = 3 and ω(20) = 10. Notice that the computation of ω(x) is dependent more on Z(x) than L(x), and hence encodes much different information than either ρ(x) or ∆(x). Let us more closely examine the argument that ω(6) = 3. The key is that 6 divides 9 + 9 and 20 + 20 + 20, but does not divide any subsum of either. Indeed, the latter of these expressions yields a lower bound of ω(6) ≥ 3, and the given argument implies that equality holds. With this in mind, we give the following equivalent form of Definition 3.8, which often simplifies computation of ω(x). Theorem 3.9 ([24, Proposition 2.10]). Suppose hn1 , . . . , nk i is a numerical monoid and x ∈ hn1 , . . . , nk i. The following conditions are equivalent. (a) ω(x) = m. (b) m is the maximum length of a sum x1 + · · · + xt of irreducible elements in hn1 , . . . , nk i with the property that (i) x divides x1 + · · · + xt , and (ii) x does not divide x1 + · · · + xj−1 + xj+1 + · · · + xt for 1 ≤ j ≤ t. The sum x1 + · · · + xt alluded to in part (b) above is called a bullet for x. Hence, 20 + 20 + 20 is a bullet for 6 in , and moreover has maximal length. The benefit of Theorem 3.9 is twofold: (i) each x ∈ hn1 , . . . , nk i has only finitely many bullets, and (ii) the list of bullets can be computed in a similar fashion to the set Z(x) of factorizations. We refer the reader to [3, 5], both of which give explicit algorithms (again resulting from undergraduate research projects) for computing ω-values. Our goal is to completely describe the behavior of the ω-function of the McNugget Monoid. We do so in Section 4.3, using the following result, which is clearly similar in spirit to Theorems 3.4 and 3.7. 14 Theorem 3.10 ([23, Theorem 3.6]). For x ∈ hn1 , . . . , nk i sufficiently large, ω(x + n1 ) = ω(x) + 1. In particular, this holds for x> F + n2 n2 /n1 − 1 where F = F (hn1 , . . . , nk i) is the Frobenius number. The similarity between Theorems 3.4 and 3.10 is not a coincidence. While L(x) and ω(x) are indeed different functions (for instance, L(6) = 1 while ω(6) = 3), they are closely related; the ω-function can be expressed in terms of max factorization length that is computed when some collections of generators are omitted. We direct the interested reader to [5, Section 6], where an explicit formula of this form for ω(n) is given. 3.4 Computer software for numerical monoids Many of the computations referenced in this paper can be performed using the numericalsgps package [16] for the computer algebra system GAP. The brief snippet of sample code below demonstrates how the package is used to compute various quantities discussed in this paper. gap> LoadPackage("num"); true gap> McN:=NumericalSemigroup(6,9,20); <Numerical semigroup with 3 generators> gap> FrobeniusNumberOfNumericalSemigroup(McN); 43 gap> 43 in McN; false gap> 44 in McN; true gap> FactorizationsElementWRTNumericalSemigroup(18,McN); [ [ 3, 0, 0 ], [ 0, 2, 0 ] ] 15 gap> OmegaPrimalityOfElementInNumericalSemigroup(6,McN); 3 This only scratches the surface of the extensive functionality offered by the numericalsgps package. We encourage the interested reader to install and experiment with the package; instructions can be found on the official webpage, whose URL is included below. https://www.gap-system.org/Packages/numericalsgps.html 4 Calculations for the Chicken McNugget monoid In the final section of this paper, we give explicit expressions for L(x), `(x), ∆(x) and ω(x) for every x ∈ . The derivation of each such expression makes use of a theoretical result in Section 3. We note that each of the formulas provided in this section could also be derived in a purely computational manner, using Theorems 3.4, 3.7, and 3.10 and the inductive algorithms introduced in [5] (indeed, these computations finish in a reasonably short amount of time using the implementation in the numericalsgps package discussed in Section 3.4). However, several of the following results identify an interesting phenomenon that distinguish from more general numerical monoids (see the discussion preceeding Question 4.5), and the arguments that follow give the reader an idea of how theorems involving factorization in numerical monoids can be proven. 4.1 Calculating factorization lengths Theorem 3.4 states that L(x + n1 ) = L(x) + 1 and `(x + nk ) = `(x) + 1 for sufficiently large x ∈ hn1 , . . . , nk i. but, it was observed during the writing of [4] that for many numerical monoids, the “sufficiently large” requirement is unecessary. As it turns out, one such example is the McNugget monoid , which we detail below. 16 Theorem 4.1. For each x ∈ , L(x + 6) = L(x) + 1. In particular, if we write x = 6q + r for q, r ∈ N and r < 6, then   q if r = 0 or 3     q−5 if r = 1 L(x) =  q−2 if r = 2 or 5     q−4 if r = 4 for each x ∈ . and a factorization (a, b, c) of x. If b > 1, then x has Proof. Fix x ∈ another factorization (a + 3, b − 2, c) with length a + b + c + 1. Similarly, if c ≥ 3, then (a + 10, b, c − 3) is also a factorization of x and has length a + b + c + 7. This implies that if (a, b, c) has maximum length among factorizations of x, then b ≤ 1 and c ≤ 2. Upon inspecting Table 1, we see that unless x ∈ {0, 9, 20, 29, 40, 49}, we must have a > 0. Now, assume (a, b, c) has maximum length among factorizations of x. We claim (a + 1, b, c) is a factorization of x + 6 with maximum length. From / {0, 9, 20, 29, 40, 49}, Table 1, we see that since x ∈ , we must have x + 6 ∈ meaning any maximum length factorization of x + 6 must have the form (a0 + 1, b0 , c0 ). This yields a factorization (a0 , b0 , c0 ) of x, and since (a, b, c) has maximum length, we have a + b + c ≥ a0 + b0 + c0 . As such, (a + 1, b, c) is at least as long as (a0 + 1, b0 , c0 ), and the claim is proved. Thus, L(x + 6) = a + 1 + b + c = L(x) + 1. From here, the given formula for L(x) now follows from the first claim and the values L(0), L(9), L(20), L(29), L(40), and L(49) in Table 3.2. A similar expression can be obtained for `(x), ableit with 20 cases instead of 6, this time based on the value of x modulo 20. We encourage the reader to adapt the argument above for Theorem 4.2. Theorem 4.2. For each x ∈ , `(x + 20) = `(x) + 1. In particular, if we 17 write x = 20q + r for q, r ∈ N and   q       q+1    q+2 `(x) =  q+3      q+4     q+5 r < 20, then if if if if if if r r r r r r =0 = 6, 9 = 1, 4, 7, 12, 15, 18 = 2, 5, 10, 13, 16 = 8, 11, 14, 19 = 3, 17 for each x ∈ . Theorems 4.1 and 4.2 together yield a closed form for ρ(x) that holds for all x ∈ . Since lcm(6, 20) = 60 cases are required, we leave the construction of this closed form to the interested reader. 4.2 Calculating delta sets Unlike maximum and minimum factorization length, ∆(x) is only periodic for sufficiently large x ∈ . For example, a computer algebra system can be used to check that ∆(91) = {1} while ∆(211) = {1, 2}. Theorem 3.7 only guarantees ∆(x + 120) = ∆(x) for x > 21600, but some considerable reductions can be made. In particular, we will reduce the period from 120 down to 20, and will show that equality holds for all x ≥ 92 (that is to say, 91 is the largest value of x for which ∆(x + 20) 6= ∆(x)). Theorem 4.3. Each x ∈ with x ≥ 92 has ∆(x + 20) = ∆(x). Moreover,   if r = 3, 8, 14, 17  {1}    {1, 2} if r = 2, 5, 10, 11, 16, 19 ∆(x) =  {1, 3} if r = 1, 4, 7, 12, 13, 18     {1, 4} if r = 0, 6, 9, 15 where x = 20q + r for q, r ∈ N and r < 20. Hence ∆( ) = {1, 2, 3, 4}. Proof. We will show that ∆(x+20) = ∆(x) for each x > 103. The remaining claims can be verified by extending Table 2 using computer software. 18 Suppose x > 103, fix a factorization (a, b, c) for x, and let l = a + b + c. If c ≥ 3, then x also has factorizations (a + 10, b, c − 3), (a + 7, b + 2, c − 3), (a + 4, b + 4, c − 3), and (a + 1, b + 6, c − 3), meaning {l, l + 4, l + 5, l + 6, l + 7} ⊂ L(x). Alternatively, since x > 103, if c ≤ 2, then 6a + 9b ≥ 63, and thus l ≥ a + b + 2 ≥ 9 ≥ `(x) + 4. The above arguments imply (i) any gap in successive lengths in L(x) occurs between `(x) and `(x) + 4, and (ii) every factorization with length in that interval has at least one copy of 20. As such, x + 20 has the same gaps between `(x + 20) and `(x + 20) + 4 as x does between `(x) and `(x) + 4, which proves ∆(x + 20) = ∆(x) for all x > 103. With a slightly more refined argument than the one given above, one can prove without the use of software that ∆(x + 20) = ∆(x) for all x ≥ 92. We encourage the interested reader to work out such an argument. 4.3 Calculating ω-primality We conclude our study of with an expression for the ω-primality of x ∈ and show (in some sense) how far a McNugget number is from being prime. We proceed in a similar fashion to Theorems 4.1 and 4.2, showing that with only two exceptions, ω(x + n1 ) = ω(x) + 1 for all x ∈ . Theorem 4.4. With the exception of x = 6 and x = 12, every nonzero x ∈ satisfies ω(x + 6) = ω(x) + 1. In particular, we have   q if r = 0      q+5 if r = 1     q+7 if r = 2 ω(x) =  q+2 if r = 3      q+4 if r = 4     q+9 if r = 5 for each x 6= 6, 12, where x = 6q + r for q, r ∈ N and r < 6. 19 Proof. Fix x ∈ . Following the spirit of the proof of Theorem 4.1, we begin by proving each x > 12 has a maximum length bullet (a, b, c) with a > 0. Indeed, suppose (0, b, c) is a bullet for x for some b, c ≥ 0. The element x ∈ also has some bullet of the form (a0 , 0, 0), where a0 the smallest integer such that 6a0 − x ∈ . Notice a0 ≥ 3 since x > 12. We consider several cases. / . If b ≤ 3, then a0 ≥ b. • If c = 0, then 9b − x ∈ but 9b − x − 9 ∈ Otherwise, either 9(b − 1) or 9(b − 2) is a multiple of 6, and since 9(b − 2) − x ∈ / as well, we see a0 ≥ 23 (b − 2) + 1 ≥ b. • If b = 0, then there are two possibilities. If c ≤ 3, then a0 ≥ c. Otherwise, either 20(c − 1), 20(c − 2) or 20(c − 3) is a multiple of 6, so we conclude a0 ≥ 10 3 (c − 3) + 1 ≥ c. • If b, c > 0, then 9b + 20c − x − 9, 9b + 20c − x − 20 ∈ / , so 9b + 20c − x is either 0, 6, or 12. This means either (3, b − 1, c), (2, b − 1, c), or (1, b − 1, c) is also a bullet for x, respectively. In each case, we have constructed a bullet for x at least as long as (0, b, c), but with positive first coordinate, so we conclude x has a maximal bullet with nonzero first coordinate. Now, using a similar argument to that given in the proof of Theorem 4.1, if (a+1, b, c) is a maximum length bullet for x+6, then (a, b, c) is a maximum length bullet for x. This implies ω(x + 6) = ω(x) + 1 whenever x + 6 has a maximum length bullet with positive first coordinate, which by the above argument holds whenever x > 12. This proves the first claim. The formula for ω(x) now follows from the first claim, the computations ω(9) = 3 and ω(20) = 10 from Section 3.3, and analogous computations for ω(15) = 4, ω(18) = 3, ω(29) = 13, ω(40) = 10, and ω(49) = 13. Figure 5 plots ω-values of elements of the McNugget monoid . Since ω(x + 6) = ω(x) + 1 for large x ∈ , most of the plotted points occur on one of 6 lines with slope 16 . It is also evident in the plot that x = 6 and x = 12 are the only exceptions. Although ω(x + 6) = ω(x) + 1 does not hold for every x ∈ , there are some numerical monoids for which the “sufficiently large” hypothesis in 20 20 15 10 5 0 20 40 60 80 100 Figure 5: A plot depicting the ω-primality function ω(n) for n ∈ . Theorem 3.10 can be dropped (for instance, any numerical monoids with 2 minimal generators has this property). Hence, we conclude with a problem suitable for attack by undergraduates. Question 4.5. Determine which numerical monoids hn1 , . . . , nk i satisfy each of the following conditions for all x (i.e. not just sufficiently large x): 1. L(x + n1 ) = L(x) + 1, 2. `(x + nk ) = `(x) + 1, or 3. ω(x + n1 ) = ω(x) + 1. References [1] G. Alon, P. Clark, On the number of representations of an integer by a linear form, J. Integer Sequences 8(2005) 05.5.2. [2] D. F. Anderson, S. T. Chapman, On bounding measures of primeness in integral domains, Inter. J. Algebra Comp. 22(2012) 1250040. 21 [3] D. F. Anderson, S. T. Chapman, N. Kaplan, D. Torkornoo, An algorithm to compute ω-primality in a numerical monoid, Semigroup Forum 82(2011) 96–108. [4] T. Barron, C. O’Neill, R. Pelayo, On the set of elasticities in numerical monoids, Semigroup Forum 94 no. 1 (2017) 37–50. [5] T. Barron, C. O’Neill, R. Pelayo, On dymamic algorithms for factorization invariants in numerical monoids, Mathematics of Computation 86(2017) 2429–2447. [6] M Beck, How to change coins, M&M’s, or Chicken McNuggets: the linear Diophatine problem of Frobenius, http://math.sfsu.edu/beck/ papers/frobprojects.pdf. [7] C. Bowles, S. T. Chapman, N. Kaplan, D. Reiser. On delta sets of numerical monoids. Journal of Algebra and its Applications 5(2006) 695–718. [8] S. T. Chapman, J. Daigle, R. Hoyer, N. Kaplan, Delta sets of numerical monoids using nonminimal sets of generators, Comm. Algebra 38(2010) 2622–2634. [9] S. T. Chapman, P. A. Garcı́a-Sánchez, D. Llena, A. Malyshev, D. Steinberg, On the delta set and the Betti elements of a BF-monoid, Arabian J. of Mathematics 1(2012) 53–61. [10] S. T. Chapman, M. T. Holden, T. A. Moore. Full elasticity in atomic monoids and integral domains, Rocky Mountain J. Math 37(2006) 1437–1455. [11] S. T. Chapman, R. Hoyer, N. Kaplan, Delta sets of numerical monoids are eventually periodic, Aequationes Mathematicae 77(2009) 273–279. [12] S. T. Chapman, N. Kaplan, T. Lemburg, A. Niles, C. Zlogar, Shifts of generators and delta sets of numerical monoids, Inter. J. Algebra and Computation 24(2014) 655–669. 22 [13] S. T. Chapman, W. Puckett, K. Shour, On the omega values of generators of embedding dimension-three numerical monoids generated by an interval, Involve 7(2014) 657–667. [14] S. Colton, N. Kaplan, The realization problem for delta sets of numerical semigroups, J. Comm. Algebra, to appear. [15] https://en.wikipedia.org/wiki/Coin_problem. [16] M. Delgado, P. Garcı́a-Sánchez, J. Morais, NumericalSgps, A package for numerical semigroups, Version 0.980 dev (2013), (GAP package), http://www.fc.up.pt/cmup/mdelgado/numericalsgps/. [17] D. Einstein, D. Lichtblau, A. Strzebonski, S. Wagon, Frobenius numbers by lattice point enumeration, Integers 7(2007) #A15. [18] J. Gallian, Contemporary Abstract Algebra. Ninth Ed., Cengage Learning, Boston, MA, 2016. [19] J. I. Garca-Garca, M. A. Moreno-Fras, A. Vigneron-Tenorio, Computation of Delta sets of numerical monoids, Monatshefte für Mathematik 178(2015) 457–472. [20] A. Geroldinge, F. Halter-Koch, Nonunique Factorizations: Algebraic, Combinatorial and Analytic Theory, Pure and Applied Mathematics, vol. 278, Chapman & Hall/CRC, 2006. [21] https://en.wikipedia.org/wiki/Knapsack_problem. [22] http://mathworld.wolfram.com/McNuggetNumber.html. [23] C. O’Neill, R. Pelayo, On the linearity of ω-primality in numerical monoids, J. Pure Appl. Algebra 218(2014) 1620–1627. [24] C. O’Neill, R. Pelayo, How do you measure primality?, Amer. Math. Monthly 122(2015) 121–137. [25] https://en.wikipedia.org/wiki/Postage_stamp-problem. 23 [26] H. Picciotto, A. Wah, Algebra: Themes, Tools, Concepts, Creative Publications, Mountain View, CA, 1994, p. 186. [27] J. L. Ramı́rez Alfonsı́n, The Diophantine Frobenius Problem, Oxford Lecture Series in Mathematics and Its Applications 30, Oxford University Press, 2005, 256 pp. [28] B. Sturmfels, Gröbner bases and convex polytopes, University Lecture Series, 8. American Mathematical Society, Providence, RI, 1996. xii+162 pp. ISBN: 0-8218-0487-1. [29] J. J. Sylvester, Mathematical questions with their solutions, Educational Times 41(1884) 171–178. [30] I. Vardi, Computational Recreations in Mathematics, Addison-Wesley, Reading, MA, 1992, pp. 19–20 and 233–234. 24
0math.AC
Please cite published version: https://doi.org/10.1109/JOE.2016.2571158 1 Control of an Unmanned Surface Vehicle with Uncertain Displacement and Drag Wilhelm B. Klinger, Ivan R. Bertaska, Karl D. von Ellenrieder and M. R. Dhanak  Abstract— Experimental testing of an unmanned surface vehicle (USV) has been performed to evaluate the performance of two lowlevel controllers when displacement and drag properties are time-varying and uncertain. The USV is a 4.3 meter long, 150 kilogram wave adaptive modular vessel (WAM-V) with an inflatable twin hull configuration and waterjet propulsion. Open loop maneuvering tests were conducted to characterize the dynamics of the vehicle. The hydrodynamic coefficients of the vehicle were determined through system identification of the maneuvering data and were used for simulations during control system development. The resulting controllers were experimentally field tested on-water. Variable mass and drag tests show that the vehicle is best controlled by a model reference adaptive backstepping speed and heading controller. The backstepping controller developed by Liao et. al (2010) is modified to account for an overprediction of necessary control action and motor saturation. It is shown that when an adaptive algorithm is implemented for the surge control subsystem of the modified backstepping controller, the effects of variable mass and drag are mitigated. Index Terms—Adaptive Control, Unmanned Vehicles, Parameter Uncertainty I. INTRODUCTION A N understanding of a vehicle’s maneuverability and dynamic performance characteristics is important for the development of an automatic control system that will command its motion and can also serve as a guide for the future design of similar vehicles. A potential application of unmanned surface vehicles (USV’s) is the automatic launch and recovery (ALR) of an autonomous underwater vehicle (AUV) [27], [29], [33], [34]. A good closed loop controller for a USV used in such operations needs to allow for the changes in displacement and vehicle resistance associated with launch/recovery of the AUV payload. While gain-scheduling or other methods may be used when an AUV is either completely onboard the USV, or after it has been launched, the transition time during launch/recovery requires special considerations in developing automatic controllers because the magnitude and direction of the drag force due to the AUV and any associated docking/recovery system may be unpredictable. Several alternatives for speed and heading control of a small twin-hulled unmanned surface vehicle with time-varying and uncertain displacement and drag are presented. Experimental on-water test results are presented for a USV under the variable and Manuscript received Month day, 2015. This work was supported by the U.S. Office of Naval Research under Grant N000141110926, managed by K. Cooper. I. R. Bertaska gratefully acknowledges the support of the Link Foundation Ocean Engineering and Instrumentation Ph.D. Fellowship Program. W. Klinger, I. Bertaska, K. D. von Ellenrieder and M. R. Dhanak are with the Department of Ocean & Mechanical Engineering, Florida Atlantic University, Dania Beach, FL 33004-3023 USA (phone:+1-954-924-7232; fax:+1-954-924-7270; e-mail: [email protected]). Please cite published version: https://doi.org/10.1109/JOE.2016.2571158 2 uncertain displacement and drag conditions expected during an ALR. The main scholarly outcomes of this work are the development and experimental validation of low level automatic control systems for a USV during an ALR as it transitions from carrying to towing an AUV, and also after deploying the AUV and operating independently. The paper is organized as follows. Background for ALR and adaptive control for USVs is presented in Section II. The particulars of the vehicle, including its design and instrumentation, are described in Section III. In Section IV, we characterize the maneuvering performance of the vehicle. We develop controls oriented state space models of the vehicle through the system identification of experimental data in Section V. Three control alternatives for speed and heading control are explored in Section VI. In Section VII, we compare the controller’s performance for time-varying and uncertain displacement and drag conditions. Finally, in Section VIII, some concluding remarks are given regarding the implications of our results. II. RELATED WORK There have been a substantial number of studies on the nonlinear control of ships, boats, and unmanned surface vehicles, including [5],[39] ,[15],[10],[21],[17],[24]. However, as pointed out in [5] and [8], there is a lack of comprehensive and practical control laws that are robust to the uncertainties in vessel dynamics and large disturbances associated with actual on-water conditions. Additionally, as elaborated upon in [5], few studies attempt experimental implementation on real USV platforms. Recent work in controls for unmanned surface vehicles incorporate nonlinearities within the equations of motion to produce nonlinear control algorithms that are able to achieve a wider performance envelope than their linear counterparts [4]. These include tracking and setpoint control utilizing sliding mode methods, as in [6] and [25], as well as integrator backstepping as proposed in [19]. Although various algorithms have been put forward, few have had the opportunity to be validated on full-size USVs in the presence of environmental disturbances and equipped with traditional navigation sensors, rather than lab-based analogs (e.g. overhead cameras in lieu of compass/GPS/IMU sensor suite) [9]. Some exceptions include [39],[8],[7],[9],[35],[31], [32], and [3]. In [39], the authors used the backstepping method using feedback linearization and Lyapunov’s direct method to create a speedscheduled algorithm that was field-tested on a USV in riverine operations. In [3], a sliding mode controller was developed for an amphibious surface vehicle navigating the transitional area between the shore and open ocean, where breaking waves cause large nonlinearities that may not be adequately modeled in situ. Automatically generated behaviors for USVs were presented in [8], [7], and [40] where three setpoint controllers were proposed and validated in the field. A controller from this paper is incorporated here in Section VI. Adaptive control is also an active area of research for unmanned marine vehicles. Skjetne et al. used adaptive control to determine the added mass hydrodynamic coefficients while performing free-running maneuvering experiments in [36] to create a nonlinear maneuvering model suited to either tracking or dynamic positioning control. The methods behind backstepping and adaptive control were combined in [23], using a Nomoto-like steering model that neglected the coupling of yaw rate with sway Please cite published version: https://doi.org/10.1109/JOE.2016.2571158 3 velocity commonly found in USVs. A recent method of handling uncertain displacement and drag terms is presented in [4], where model predictive control is used to stabilize the vehicle’s course under large mass variations upwards of 50%. It should be noted that the authors used a linearized model for plant dynamics, which may not fully capture the dynamics of the vehicle at high speeds. Aguiar and Hespanha proposed an approach utilizing supervisory switching control to handle parametric uncertainties in an underactuated marine vehicle [1]. Although favorable simulation results were presented for both an underactuated hovercraft and an AUV, the use of finite number of system models could potentially lead to large errors if parameters’ range is infinite. Aguiar and Pascoal extended this work in parametric uncertainty in [2], where an adaptive backstepping controller was derived to estimate poorly modeled hydrodynamic parameters in an AUV with an unconventional hull form. Kragelund et al [22] proposed three different adaptive controllers – a gain scheduled PID controller, a model reference adaptive controller and an 𝐿1 adaptive controller – tested on a SeaFox USV to mitigate the effects of the transitional region between displacement and planing modes of operations. The work presented here extends the results of previous studies to include the effects of the adaptive control on course-keeping relating to vehicle bearing, as well as using a nonlinear controller derived from a nonlinear maneuvering model. III. THE WAM-V USV14 A. Overview The WAM-V USV14 (Fig. 1) is a twin hull pontoon style vessel designed and built by Marine Advanced Research, Inc. of Berkeley, CA USA. The vessel structure consists of two inflatable pontoons, two motor pods, a payload tray, and two supporting arches. The WAM-V class of vehicles is designed to provide a stable platform that can mitigate the effects of waves [11], [16],[30]. The vehicle’s physical characteristics are shown in TABLE I. The WAM-V demonstrates appreciable motion in surge, sway, and yaw during operation, but can only apply control force and torque in surge and yaw. Because the steering scheme can only actuate in two of the three appreciable degrees of freedom, the USV is underactuated. Fig. 1: The WAM-V USV14 Unmanned Surface Vehicle underway in the Intracoastal Waterway (ICW). Please cite published version: https://doi.org/10.1109/JOE.2016.2571158 4 TABLE I PRINCIPLE CHARACTERISTICS OF THE WAM-V14 USV. THE LOCATION OF THE “KEEL” IS TAKEN AS THE BOTTOM OF THE PONTOONS. W.R.T. IS AN ACRONYM FOR THE PHRASE “WITH RESPECT TO”. Parameter Length Overall (L) Length on the Waterline (LWL) Draft (aft and mid-length)(lightship) Beam Overall (BOA) Beam on the Waterline (BWL) Depth (keel to pontoon skid top) Area of the Waterplane (AWP) Centerline-to-centerline Side Hull Separation (B) Length to Beam Ratio (L/B) Volumetric Displacement (∇) (lightship) Mass (𝑚) Longitudinal Center of Gravity (LCG) w.r.t. aft plane of engine pods Value 4.29 [m] 3.21 [m] 0.127 and 0.105 [m] 2.20 [m] 2.19 [m] 0.39 [m] 1.1 [m2] 1.83 [m] 2.34 0.34 [m3] 150 [kg] 1.27 [m] B. Waterjet Propulsion System The waterjet configuration is similar to that found on the stock version of the WAM-V USV12 [41], except that each of the USV14 motor pods contains an electric-powered motor, rather than a gasoline-powered engine. The motor pods attach aft of the inflatable pontoons with a hinged connection at the bottom and a flexible O-ring connection at the top, which allows rotation about the bottom connection. The design is meant to ensure the motor pods’ continuous alignment with the water, despite vehicle pitching motion, which maintains flow through the waterjets. Each motor is powered by eight lithium polymer batteries, wired in parallel, that provide a nominal voltage of 22.2 V. The motors are NeuMotors 2230, and are rated for a maximum of 22,000 RPM. The nozzles of the waterjet have been fixed so that they point directly aft, and the vehicle is steered using differential thrust. The waterjet reversing buckets are not used, such that thrust is only developed in the forward direction. C. Guidance, Navigation, and Control Electronics In order to conduct development and testing of autonomous control for the WAM-V USV14, a guidance, navigation and control (GNC) system is implemented. The GNC system is housed in a plastic, water-resistant box and contains a motherboard, singleboard computer, inertial measurement unit (IMU) with global positioning system (GPS) capability, tilt-compensated digital compass, radio frequency (RF) transceiver, and pulse width modulation (PWM) signal generator. A detailed summary of the GNC system can be found in [7] and [26]. For the purpose of this project, the key components of the GNC system are the sensor suite (IMU/GPS and digital compass), single-board computer, and RF transceiver. The IMU/GPS is an XSENS MTi-G sensor , which is used to measure the position and orientation of the USV during operations. This information is relayed to the single board computer, where the low level control code is implemented, and maneuvering data are logged. The GPS is specified to provide up to 2.0 meter accuracy, depending on weather and satellite availability. The digital compass is used to record vehicle heading and Please cite published version: https://doi.org/10.1109/JOE.2016.2571158 5 has a resolution of 0.1 degrees. The RC receiver allows the user the option of maneuvering the USV under remote manual control or by autonomous navigation. A hand-held remote control is used both for operating the thrusters and reversing buckets and also for switching between RC and autonomous modes. IV. MANEUVERING CHARACTERISTICS Maneuvering tests were performed in sheltered, calm water sections of the US Intracoastal Waterway (ICW) in Dania Beach and Hollywood, FL USA. The vehicle experienced only minor wind-generated waves. Wind speed and direction were collected during all testing. Wind-generated forces and moments do not appear to have had any effect on the test results. The total weight (displacement) of the system will affect both the inertial properties and, through changes in hull submergence (draft), the hydrodynamic resistance of the vehicle. Thus, the maneuvering characteristics are dependent on how heavily laden the vehicle is. Here, three different loading conditions (total vehicle displacements), which have been termed “slick”, “lightship” and “full displacement”, were tested:  Slick: The vehicle displacement with only GNC hardware onboard – the minimum loading to run autonomously. This configuration includes neither the simulated ALR retrieval mechanism, nor the AUV mock-up (see Section VII.A). The total displacement is approximately 150 kg.  Lightship: The vehicle displacement with both the GNC hardware and the simulated ALR retrieval mechanism aboard, but not the AUV mock-up. This arrangement would correspond to the loading condition of the USV after a launch and before a recovery of the AUV. The ALR system has a mass of approximately 70 kg, so that the total displacement of the vehicle is about 220 kg.  Full Displacement: The loading condition with the GNC hardware, simulated ALR retrieval mechanism, and AUV mock-up aboard. This corresponds to the weight of the USV before and after the ALR procedure. To simulate the weight of the AUV, an additional mass of 26 kg is added to the lightship system, such that its total displacement is about 246 kg. A. Acceleration Tests Acceleration tests were conducted to obtain the steady state speeds associated with the available range of motor commands. The vehicle started in a stationary position, with the surge and sway velocities, and the yaw rate as close to zero (as possible on the water), and was accelerated to a specified throttle command on both motors for 60 seconds. The test was conducted for a throttle range of 60-100%. Preliminary experimental results for the slick acceleration test are presented in [20]. Fig. 2 shows the results of two full throttle acceleration tests for the lightship (no AUV in payload) and full displacement (AUV in payload) vehicle conditions. It can be seen from the data in Fig. 2 that the maximum surge velocity of the vessel decreases as the payload is increased. The average maximum surge speed for the lightship and full displacement cases is 2.8 m/s and 2.5 m/s, respectively. Please cite published version: https://doi.org/10.1109/JOE.2016.2571158 6 a) b) Fig. 2: Vehicle surge velocity for two full throttle acceleration tests using the automatic control box with preprogrammed motor commands. Vehicle conditions were: a) Lightship and b) Full Displacement. The results of the acceleration tests provided a means to approximate a forward drag model for each displacement condition of the vessel. In order to relate motor commands to drag, a bollard-pull test was conducted. The test consisted of tethering the WAMV USV14 to a fixed object (a pier) with a scale in line with the tether. The speed of the motors was slowly increased to full throttle; the maximum force measured is 𝑇wj_max = 204 Newtons. Repetitions of this test at multiple throttle commands indicated that thrust scales linearly with motor command when the forward speed of the vessel is zero. The results of the bollard-pull test were then incorporated into a linear model for thrust output as a function of input motor command. As the vehicle was tethered during these tests, the effect of surge speed on thrust production is ignored in this model: 𝑇wj = 𝑛 𝑇 . 𝑛max wj_max (1) Here 𝑛 is the commanded motor speed in Hz; 𝑛⁄𝑛max can be interpreted as a commanded percentage of the maximum thrust. Using this linear model, experiments were conducted at steady state forward speeds 𝑢, where it was assumed that the USV was operating at the “thrust equals drag” condition. With a drag model composed of both quadratic and linear terms, the thrust equals drag 𝐷 condition would give: Please cite published version: https://doi.org/10.1109/JOE.2016.2571158 𝑇wj_max 𝑛 = 𝑋𝑢|𝑢| 𝑢|𝑢| + 𝑋𝑢 𝑢. 𝑛max 7 (2) 𝑋𝑢|𝑢| and 𝑋𝑢 were then determined from curvefits to the experimental data in Fig. 3. Fig. 3: Surge direction drag model for the WAM-V USV14 in three displacement conditions: a) slick, b) lightship, and c) fulldisplacement. The points represent steady state values of thrust equals drag (𝐷) for a given speed (𝑢). Because (1) neglects the effect of surge speed on thrust developed, the drag model does not capture the characteristic variation of drag with surge speed that might be expected, e.g. 𝐷~𝑢2 . However, use of the 𝑋𝑢|𝑢| and 𝑋𝑢 terms found from these experiments should intrinsically reproduce the surge speed effects when the desired thrust is determined using (1). 1) Alternative Thruster Models A second possible thruster model, which has been developed as an analog to conventional propeller models, was also explored. In conventional propellers, the curves of thrust coefficient 𝐾𝑇 ≡ 𝑇𝑝 , 𝜌𝑛2 𝑑 4 versus advance ratio 𝐽≡ 𝑢 , 𝑛𝑑 are approximately linear such that 𝐾𝑇 (𝐽) = −𝛼1 𝐽 + 𝛼2 . Here, 𝑇𝑝 is propeller thrust, 𝑑 is propeller diameter, 𝜌 is water density and 𝛼1 , 𝛼2 > 0 are constants. Using this model the thrust can be rewritten as 𝑇𝑝 = −𝛼1 or 𝑢 𝜌𝑛2 𝑑 4 + 𝛼2 𝜌𝑛2 𝑑 4 , 𝑛𝑑 Please cite published version: https://doi.org/10.1109/JOE.2016.2571158 8 𝑇𝑝 = 𝑎1 (𝜌𝑑 3 )𝑢𝑛 + 𝑎2 (𝜌𝑑 4 )𝑛2 . Here the thrust developed varies quadratically with the rotational rate of the propeller and linearly with the surge speed of the vessel. The authors have not come across similar waterjet models in the literature, but it seems that such a model might be appropriate. Examining a representative plot of waterjet pump head coefficient 𝐶𝐻 vs. capacity coefficient 𝐶𝑄 (Fig. 4), one can see that an almost linear, relation exists between the pressure head coefficient 𝐶𝐻 ≡ 𝑔𝐻 , (𝑛𝑑)2 (where 𝑔 is gravitational acceleration, 𝐻 is the pressure head across the waterjet, and 𝑑 is the diameter of the waterjet impeller) and the capacity coefficient 𝐶𝑄 ≡ 𝑄𝑓 , 𝑛𝑑 3 (where 𝑄𝑓 is the volumetric flow rate through the waterjet). Note that 𝐶𝐻 and 𝐶𝑄 are often combined with measured waterjet pump data to estimate the steady state waterjet impeller shaft speed (see [12], for example). Fig. 4: Example pump diagram showing pump efficiency 𝜂𝑃 and head coefficient 𝐶𝐻 ≡ 𝑔𝐻/(𝑛𝑑)2 as a function of the capacity coefficient 𝐶𝑄 ≡ 𝑄𝑓 /𝑛𝑑 3 . 𝑛=shaft revolutions per second, 𝑑 = impeller diameter (reproduced from [13]). Following a similar development as used above for a conventional propeller, we have 𝐶𝐻 (𝐶𝑄 ) = −𝛼1 𝐶𝑄 + 𝛼2 , which can be rewritten as 𝜌𝑔𝐻 = −𝛼1 𝜌𝑄𝑓 (𝑛𝑑)2 + 𝛼2 𝜌(𝑛𝑑)2 . 𝑛𝑑 3 Scaling the volumetric flow rate through the waterjet as 𝑢𝑑 2 , and assuming that the thrust generated is proportional to the pressure head across the waterjet multiplied by the square of the characteristic diameter of the waterjet we get Please cite published version: https://doi.org/10.1109/JOE.2016.2571158 𝑇wj ~𝜌𝑑 2 [−𝛼1 9 𝑢𝑑 2 (𝑛𝑑)2 + 𝛼2 (𝑛𝑑)2 ], 𝑛𝑑 3 which has the same form as the thrust developed on a propeller 𝑇wj ~𝑎1 (𝜌𝑑 3 )𝑢𝑛 + 𝑎2 (𝜌𝑑 4 )𝑛2 . Curvefits of this relation to the data collected during our field tests indicate that the model works well for the lightship condition, but does not match as well for the slick or full displacement conditions. This waterjet thrust model may be appropriate in certain circumstances and appears to be worthy of additional investigation. B. Maneuvering Tests A modified on-water zig-zag test was conducted to obtain motion data. The traditional zig-zag test specifies rudder commands for a certain heading range [18], but for a vehicle steered using differential thrust, the test must be conducted by varying the motor speeds. Motor commands were alternated between 0 and 100% power, with the motors 180o out of phase. Each motor setting was held for 7 seconds. Trajectory and yaw rate (𝑟) results for three tests in the lightship condition are shown in Fig. 5. Yaw rate is of interest when conducting the zig-zag test because it is later used in model development, specifically in determining the maneuvering coefficients pertaining to how fast the vessel changes heading. This concept is explored further in Section V. Several runs of each maneuvering test were carried out to show a convergence of the results and to inspire confidence in the results before using them to develop the dynamic model of the vehicle. a) b) Fig. 5. a) Trajectory and b) yaw rate time histories for three zig-zag tests conducted in the lightship displacement condition. The maximum yaw rate was 13 deg/s. In a) the starting position is marked by the circle at the origin. V. SYSTEM IDENTIFICATION A. Equations of Motion Data collected from the acceleration and zig-zag tests in Sections IV.A and IV.B, respectively, were used to develop three degree of freedom state space maneuvering models for the vehicle in full displacement and lightship displacement conditions. Following the notation developed in [13] and [14], a three degree of freedom (surge, sway, and yaw) vehicle model is used, as presented in Please cite published version: https://doi.org/10.1109/JOE.2016.2571158 10 [20] and [21], where 𝑴𝒗̇ + 𝑪(𝒗)𝒗 + 𝑫(𝒗)𝒗 = 𝝉 (3) 𝑇 𝜼̇ = [𝑥̇ 𝑦̇ 𝜓̇] , (4) and 𝒗 = [𝑢 𝑣 𝑟]𝑇 . (5) Here, the 𝜼̇ describes the vehicle’s North (𝑥̇ ) East (𝑦̇ ) linear velocities and the Z-axis angular velocity (𝜓̇) in an inertial reference frame (𝑥, 𝑦, 𝜓). 𝒗 contains the vehicle surge velocity (𝑢), sway velocity (𝑣) and yaw rate (𝑟) in the body fixed frame. Fig. 6 illustrates the two coordinate systems and the motor forces acting on the vehicle. Fig. 6. Top view of WAM-V USV14 with body-fixed coordinate system overlaid. 𝑥𝑏 and 𝒚𝒃 denote vessel surge and sway axes, respectively. 𝑇𝑝𝑜𝑟𝑡 and 𝑇𝑠𝑡𝑏𝑑 denote the port and starboard waterjet thrust. The transformation matrix for converting from body-fixed to earth-fixed frames is given by: cos 𝜓 𝑱(𝜼) = [ sin 𝜓 0 − sin 𝜓 cos 𝜓 0 0 0]. 1 (6) 𝑴 is an inertia tensor that is the sum of a rigid body mass matrix, 𝑴𝑹𝑩 , and an added mass matrix, 𝑴𝐴 : 𝑚 − 𝑋𝑢̇ 𝑴 = 𝑴𝑹𝑩 + 𝑴𝐴 = [ 0 −𝑚𝑦𝐺 0 𝑚 − 𝑌𝑣̇ 𝑚𝑥𝐺 − 𝑁𝑣̇ −𝑚𝑦𝐺 𝑚𝑥𝐺 − 𝑌𝑟̇ ], 𝐼𝑧 − 𝑁𝑟̇ (7) where, 𝑚 denotes the mass of the USV-AUV system, 𝑥𝐺 and 𝑦𝐺 represent the coordinates of the vessel center of mass in the bodyfixed frame, and 𝐼𝑧 denotes moment of inertia about the 𝑧𝑏 -axis. Several of the terms in the mass matrix utilize SNAME (1950) [38] nomenclature for representing a force or moment created by motion in a specific degree of freedom, where 𝑋 and 𝑌 correspond Please cite published version: https://doi.org/10.1109/JOE.2016.2571158 11 to force in the 𝑥𝑏 and 𝑦𝑏 directions, respectively, and 𝑁 denotes a moment about the 𝑧𝑏 -axis (vertical axis). The subscript on each coefficient denotes the cause of the force/moment. It is pertinent to note that the added mass in the surge direction is modeled as 16% of the total mass of the vehicle, whereas theoretically the value should be less than 5%. This change is made so that the simulation outputs a forward acceleration curve that matches the experimental data. 𝑪(𝒗) is a Coriolis matrix, which includes the sum of a rigid body (𝑪𝑅𝐵 ) and added mass (𝑪𝐴 ) matrix: 𝑪(𝒗) = 𝑪𝑅𝐵 + 𝑪𝐴 = + 0 0 −𝑚(𝑥𝐺 𝑟 + 𝑣) 0 0 −𝑚(𝑦𝐺 𝑟 − 𝑢)] [ 𝑚(𝑥𝐺 𝑟 + 𝑣) 𝑚(𝑦𝐺 𝑟 − 𝑢) 0 𝑌𝑣̇ 𝑣 + ( 𝑌𝑟̇ +𝑁𝑣̇ 2 0 0 0 0 200 −𝑋𝑢̇ 𝑢 𝑋𝑢̇ 𝑢 0 𝑌𝑟̇ +𝑁𝑣̇ −𝑌𝑣̇ 𝑣 − ( [ 200 2 )𝑟 )𝑟 (8) ] The model designates the body-fixed origin at the center of gravity and assumes horizontal symmetry, making 𝑥𝐺 = 0 and 𝑦𝐺 = 0. The factor of 1/200 in the upper-rightmost and lower-leftmost matrix positions of 𝑪𝐴 was applied during model development to better fit the experimental data and does not appear in [13] and [14]. This scale factor was necessary to fix an issue with the simulation where the USV could not pull out of a turn after one had been initiated, even with maximum torque applied. The original scale factor was 2 to represent each demihull, and was manually incremented until the turning behavior of the simulation model was deemed acceptable. 𝑫(𝒗) is the summation of linear and nonlinear drag matrices: 𝑫(𝒗) = 𝑫𝒍 + 𝑫𝑛 (9) where, 𝑋𝑢 𝑫𝒍 = − [ 0 0 0 𝑌𝑣 𝑁𝑣 0 𝑌𝑟 ] 𝑁𝑟 (10) and, 𝑋𝑢|𝑢| |𝑢| 0 0 𝑌𝑣|𝑣| |𝑣| + 𝑌𝑣|𝑟| |𝑟| 𝑌𝑟|𝑣| |𝑣| + 𝑌𝑟|𝑟| |𝑟| ]. 𝑫𝒏 = − [ 0 0 𝑁𝑣|𝑣| |𝑣| + 𝑁𝑣|𝑟| |𝑟| 𝑁𝑟|𝑣| |𝑣| + 𝑁𝑟|𝑟| |𝑟| (11) The surge direction drag terms 𝐷𝑝𝑜𝑟𝑡 and 𝐷𝑠𝑡𝑏𝑑 are modeled using a polynomial curve fit derived from experimental testing. A coordinate transformation is carried out to obtain the velocities of each individual pontoon hull because they are offset from the CG. These transformed velocities are used in the drag model below as 𝑢𝑝𝑜𝑟𝑡 and 𝑢𝑠𝑡𝑏𝑑 : 𝐷𝑝𝑜𝑟𝑡 = ( 𝑋𝑢|𝑢| ⁄ ) |𝑢𝑝𝑜𝑟𝑡 |𝑢𝑝𝑜𝑟𝑡 + (𝑋𝑢⁄ ) 𝑢𝑝𝑜𝑟𝑡 2 2 (12) Please cite published version: https://doi.org/10.1109/JOE.2016.2571158 𝐷𝑠𝑡𝑏𝑑 = ( 12 𝑋𝑢|𝑢| ⁄ ) |𝑢𝑠𝑡𝑏𝑑 |𝑢𝑠𝑡𝑏𝑑 + (𝑋𝑢⁄ ) 𝑢𝑠𝑡𝑏𝑑 2 2 (13) The values of 𝑋𝑢|𝑢| and 𝑋𝑢 vary based on the displacement condition of the vehicle and are shown in TABLE II. Incorporating the moment created by the two drag forces 𝐷𝑝𝑜𝑟𝑡 and 𝐷𝑠𝑡𝑏𝑑 , the term (14) (𝐷𝑠𝑡𝑏𝑑 − 𝐷𝑝𝑜𝑟𝑡 )𝐵/2 is added to the yaw moment (not modeled in 𝑫). Finally, 𝝉 is a vector of the forces and moments generated by the port and starboard waterjets: 𝜏𝑥 (𝑇𝑝𝑜𝑟𝑡 + 𝑇𝑠𝑡𝑏𝑑 ) 𝜏 𝝉 = ( 𝑦) = [ ]. 0 𝜏𝑧 (𝑇𝑝𝑜𝑟𝑡 − 𝑇𝑠𝑡𝑏𝑑 )𝐵/2 (15) As shown in Fig. 6, 𝑇𝑝𝑜𝑟𝑡 and 𝑇𝑠𝑡𝑏𝑑 denote the thrust from the port and starboard waterjets, respectively, and 𝐵/2 is the transverse distance from the centerline of the vessel to the centerline of each hull. The forces caused by wind and waves are neglected. TABLE II SURGE DRAG COEFFICIENTS FOR THE WAM-V USV14. Displacement Condition Slick Lightship Full Displacement 𝑋𝑢|𝑢| -5.8722 -6.9627 -2.6693 𝑋𝑢 50.897 55.771 47.341 The amount of thrust that must allocated to each waterjet can be determined by solving (15) to find 𝑇𝑝𝑜𝑟𝑡 = 𝜏𝑥 /2 + 𝜏𝑧 /𝐵 and 𝑇𝑠𝑡𝑏𝑑 = 𝜏𝑥 /2 − 𝜏𝑧 /𝐵. (16) The thrust developed on each waterjet is modeled using the linear relation between commanded waterjet motor speed and thrust output from equation (1). B. Simulation Results In order to determine the accuracy of the mathematical model presented above and to determine the hydrodynamic coefficients in the added mass matrix (7), Coriolis matrix (8), and drag matrices (10), (11), the experimental zig-zag and acceleration data are overlaid with simulation results for matching motor input. The values of the hydrodynamic coefficients were manually adjusted until the simulation results qualitatively matched the experimental data. For the lightship condition, the straight-line acceleration data were compared against simulation results for three separate waterjet operating speeds: 𝑅𝑃𝑀 = {0.8𝑅𝑃𝑀𝑚𝑎𝑥 , 0.9𝑅𝑃𝑀𝑚𝑎𝑥 , 𝑅𝑃𝑀𝑚𝑎𝑥 }. Fig. 7-Fig. 10 display final results of the surge drag model in the vehicle’s equations of motion. Specifically, the parameters that were identified to fit the experimental data were: 𝑋𝑢̇ , 𝑋𝑢 , and 𝑋𝑢|𝑢| . 𝑋𝑢 and 𝑋𝑢|𝑢| characterize the steady state surge velocity of the vehicle during the acceleration test (the flat area of the curves between 20 and 60 seconds on the figures below). Each steady state surge speed for the three test cases was tabulated and the results Please cite published version: https://doi.org/10.1109/JOE.2016.2571158 13 were fitted to a quadratic polynomial, as explained in Section IV.A. The equations displayed in Fig. 3 are of the form: 𝑋𝑑𝑟𝑎𝑔 = 𝐷𝑝𝑜𝑟𝑡 + 𝐷𝑠𝑡𝑏𝑑 = 𝑋𝑢|𝑢| 𝑢|𝑢| + 𝑋𝑢 𝑢, (17) where 𝑋𝑑𝑟𝑎𝑔 denotes drag in the vessel’s surge direction. As the submerged hull form and wetted surface area varies with displacement, 𝑋𝑢 and 𝑋𝑢|𝑢| also vary with displacement. The term 𝑋𝑢̇ affects the transient behavior during acceleration/deceleration, i.e. between 0-10 seconds/past 60 seconds. 𝑋𝑢̇ affects the slope of the simulation surge velocity curve during those beginning and end time periods. Fig. 7. Lightship surge histories for full throttle acceleration tests. Three experimental tests are shown, each at different initial conditions: 𝑢 = 0, 0.3, 0.9 m/s. Three simulation results are overlaid with initial conditions corresponding to field tests. Fig. 8. Lightship surge histories for 90% throttle acceleration tests. Three experimental tests are shown, each at different initial conditions: 𝑢 = 0.13, 0.54, 0.75 m/s. Three simulation results are overlaid with initial conditions corresponding to field tests. Please cite published version: https://doi.org/10.1109/JOE.2016.2571158 14 Fig. 9. Lightship surge histories for 80% throttle acceleration tests. Three experimental tests are shown, each at different initial conditions: 𝑢 = 0.44, 0.8, 0.8 m/s. Two simulation results are overlaid with initial conditions corresponding to the field tests. Results for the full displacement acceleration tests are displayed in Fig. 10-Fig. 14. When comparing the results, which cover the upper 40% of the vessel’s motor operating limits and the two displacement conditions of interest in the ALR mission, one can conclude that the surge model of the WAM-V USV14 is adequately identified in the case of straight line forward motion. Fig. 10. Full displacement surge histories for full throttle acceleration tests. Two experimental tests are shown, each at different initial conditions: 𝑢=0.5, 0.67 m/s. Two simulation results are overlaid with corresponding initial conditions. Please cite published version: https://doi.org/10.1109/JOE.2016.2571158 15 Fig. 11. Full displacement surge histories for 80% throttle acceleration tests. Two experimental tests are shown, each at the initial condition: 𝑢=0.5 m/s. One simulation result is overlaid with the same initial condition. Fig. 12. Full displacement surge histories for 60% throttle acceleration tests. Two experimental tests are shown, each at the initial condition: 𝑢=0.13 m/s. One simulation result is overlaid with the same initial condition. It can be noted that in Figs. 7-12 the experimental data show the boat accelerating faster when thrust is applied than it decelerates when thrust is removed. However, the simulations show the boat decelerating about as quickly as it accelerates. The reason for this is because, when moving, the real vehicle creates a wake of fluid traveling in the same direction as the vehicle. When thrust is removed and the vehicle starts to decelerate, the inertia of the fluid in the wake causes the fluid to pile up against the stern, pushing against the vehicle in the forward direction and slowing its deceleration. Please cite published version: https://doi.org/10.1109/JOE.2016.2571158 16 Unfortunately, a simple quadratic drag model cannot capture this wake effect. Instead the relative rates of acceleration and deceleration are governed by the relative magnitude of the thrust and surge speed prior to acceleration/deceleration. One can see this from the equation of motion in the surge direction, which can be simplified as: 1 𝑚𝑢̇ = 𝑇 − 𝜌𝑢2 𝐶𝐷 𝐴𝑓 , 2 where 𝑇 is the constant thrust applied, 𝐶𝐷 is a drag coefficient and 𝐴𝑓 is the frontal area of the hulls. This can be rewritten as 𝑢̇ = 𝑇 𝑏 2 − 𝑢 . 𝑚 𝑚 When the vehicle reaches a steady state speed 𝑢𝑠𝑠 , the acceleration is zero it can be seen that 𝑇 𝑢𝑠𝑠 = √ . 𝑏 When thrust is initially applied, the acceleration is 𝑢̇ = 𝑇 𝑏 2 − 𝑢 , 𝑚 𝑚 0 where 𝑢0 is the initial velocity. As the surge speed increases the acceleration decreases to zero. After the vehicle has reached a steady state speed, at the instant that thrust is removed, the deceleration is 𝑢̇ = − 𝑏 2 𝑇 𝑢𝑠𝑠 = − . 𝑚 𝑚 Thus, one can see that, for the model, the magnitude of the initial acceleration is smaller than that of the initial deceleration when the model has some initial velocity. It may be possible circumvent this issue by including a switching added mass term in the surge equation of motion to produce the desired result. Since the bow is finer than the transom, one would expect the added mass associated with acceleration 𝑚𝑎1 to be smaller than that of deceleration 𝑚𝑎2 . One could implement an equation, such as: 𝑚𝑎 = 1 + sgn(𝑢̇ ) 1 − sgn(𝑢̇ ) 𝑚𝑎1 + 𝑚𝑎2 , 2 2 so that 𝑚 , 𝑢̇ > 0 𝑚𝑎 = { 𝑎1 𝑚𝑎2 , 𝑢̇ < 0 A plot of acceleration and deceleration shows that this could produce a result similar to what would be expected (Fig. 13). However, it is conventional to use a single added mass coefficient for both acceleration and deceleration. From a practical standpoint, it does not appear to be critical for the purposes of controller design, which is the main focus of the current study. Please cite published version: https://doi.org/10.1109/JOE.2016.2571158 17 Fig. 13. Acceleration and deceleration with switching added mass term. The added mass for deceleration was made significantly larger than that of acceleration. Now that verification of the model’s straight line dynamics have been presented, the turning dynamics are addressed by examining the results of simulated zig-zag maneuvers. Fig. 14 shows an example comparison between the measured and simulated yaw rate for the zig-zag maneuver at 100% throttle. Based on the results of this and other yaw rate experiment/simulation comparisons, it was concluded that the dynamic model captures the turning dynamics of the vessel sufficiently well to be used for the design of a speed and heading controller for the ALR mission. Fig. 14. Yaw rate data for the lightship 100% throttle zig-zag maneuver. Maximum experimental and simulated yaw rate is observed to be 13.2 deg/s. Several assumptions are carried forward into the control system design process. First, it is assumed that the speed of the vessel is accurately predicted during straight line transits (i.e. when heading error has stabilized around zero) and that the surge velocity will be underestimated when heading error is large and hence the vehicle will turn aggressively to minimize the heading error. The Please cite published version: https://doi.org/10.1109/JOE.2016.2571158 18 second assumption about the model is that heading is accurately determined. Considering that the intent of this project is the development and implementation of an appropriate controller for the ALR mission, knowing that the speed and heading of the dynamic model can be trusted, or its errors anticipated, allows the search for a more accurate model to stop. The final values for the hydrodynamic coefficients used in the model are given in TABLE III. The middle column of this table contains the nondimensional factors that are applied to the dimensional terms derived using strip theory and principles of drag for cylinders (𝑁𝑟 , 𝑌𝑟, 𝑌𝑣 ). They are the correction factors for the disparity between theoretical vehicle dynamics and experimental data. In TABLE III: 𝜌 is water density, 𝑇 is the draft, 𝐶𝑑 is the drag coefficient for a lateral cylinder (𝐶𝑑 = 1.1), and 𝐵ℎ𝑢𝑙𝑙 is the beam of the individual pontoon hulls. TABLE III HYDRODYNAMIC COEFFICIENTS FOR THE WAM-V USV14 Coefficient Name Non-Dimensional Factor Dimensional Term 𝑁𝑣̇ 2.5 𝑁𝑟̇ 1.2 [(𝐿 − 𝐿𝐶𝐺)3 + 𝐿𝐶𝐺 3 ] 4.75 𝐵ℎ𝑢𝑙𝑙 4 −{ 𝜋𝜌 𝑇 + 𝜋𝜌𝑇 2 } 2 2 3 𝑋𝑢̇ 0.075 −𝑚 𝑌𝑟̇ 0.2 𝑌𝑣̇ 0.9 −𝜋𝜌𝑇 2 −𝜋𝜌𝑇 2 [(𝐿 − 𝐿𝐶𝐺)2 + 𝐿𝐶𝐺 2 ] 2 [(𝐿 − 𝐿𝐶𝐺)2 + 𝐿𝐶𝐺 2 ] 2 −𝜋𝜌𝑇 2 𝐿 𝑋𝑢 See Fig. 3. 𝐿 𝐵ℎ𝑢𝑙𝑙 𝐵ℎ𝑢𝑙𝑙 2 𝜋𝑇𝐿 − 0.1 + 0.016 ( ) ]( ) 𝑇 𝑇 𝑇 2 𝑌𝑣 0.5 𝑁𝑟 0.02 −𝜋𝜌√(𝑢2 + 𝑣 2 )𝑇 2 𝐿2 𝑁𝑣 0.06 −𝜋𝜌√(𝑢2 + 𝑣 2 )𝑇 2 𝐿 𝑌𝑟 6 −𝜋𝜌√(𝑢2 + 𝑣 2 )𝑇 2 𝐿 −40𝜌|𝑣| [1.1 + 0.0045 𝑋𝑢|𝑢| See Fig. 3. 𝑌𝑣|𝑣| 1 𝑌𝑣|𝑟| 1 𝑌𝑟|𝑣| 1 𝑌𝑟|𝑟| 1 −𝜌𝑇𝐶𝑑 𝐿 −𝜌𝑇 1.1 [(𝐿 − 𝐿𝐶𝐺)2 − 𝐿𝐶𝐺 2 ] 2 Same as 𝑌𝑣|𝑟| −𝜌𝑇 𝐶𝑑 [(𝐿 − 𝐿𝐶𝐺)3 + 𝐿𝐶𝐺 3 ] 3 Please cite published version: https://doi.org/10.1109/JOE.2016.2571158 19 𝑁𝑣|𝑣| 1 Same as 𝑌𝑣|𝑟| 𝑁𝑣|𝑟| 1 Same as 𝑌𝑟|𝑟| 𝑁𝑟|𝑣| 1 Same as 𝑌𝑟|𝑟| 𝑁𝑟|𝑟| 1 −𝜌𝑇 𝐶𝑑 [(𝐿 − 𝐿𝐶𝐺)4 + 𝐿𝐶𝐺 4 ] 4 VI. SPEED AND HEADING CONTROL Due to the underactuation of the USV14, the lowest level of motion control is in surge speed and heading angle. This approach has worked well with this type of vehicle [3], [7],[8]. Several controllers regulating those motion primitives have been developed and implemented on the USV14. A. Backstepping Control A surge speed and heading controller has been developed using feedback linearization [37]. The controller is the same as that presented by Liao et al. [24], apart from changes in formulating the controller for tracking control, rather than set point control, and in the use of a nonlinear drag model. Note that the approach is very similar to that developed by Ghommam et al. [17] for position and heading control of an underactuated surface vessel. As in both [17] and [24], the procedures developed by Panteley and Loria [28] can be used to show that the cascaded system is globally uniformly asymptotically stable. To develop a surge speed controller, the surge equations of motion given by (3), (7)-(11), and (17) were reduced to: (𝑚 − 𝑋𝑢̇ )𝑢̇ − (𝑚 − 𝑌𝑣̇ )𝑣𝑟 − 𝑋𝑑𝑟𝑎𝑔 = 𝜏𝑥 , (18) where 𝜏𝑥 is the surge component of the forces/moments (15) generated by the waterjet. Input state linearization [37] can be used to find a nonlinear feedback control law for the surge subsystem. Let 𝜉𝑢 be a linearizing control, related to the commanded value of 𝜏𝑥 from the controller by 𝜏𝑥 = (𝑚 − 𝑋𝑢̇ )𝜉𝑢 − (𝑚 − 𝑌𝑣̇ )𝑣𝑟 − 𝑋𝑑𝑟𝑎𝑔 . (19) With this value of 𝜏𝑥 , (19) reduces to 𝑢̇ = 𝜉𝑢 . If the surge tracking error is defined as 𝑒𝑢 = (𝑢 − 𝑢𝑑 ), where 𝑢𝑑 is the desired surge speed, and a linearizing control of the form 𝜉𝑢 = 𝑢̇ 𝑑 − 𝑘𝑢 𝑒𝑢 is selected, the surge tracking error dynamics will be: 𝑒̇𝑢 + 𝑘𝑢 𝑒𝑢 = 0. (20) For positive values of the surge velocity gain 𝑘𝑢 , the error dynamics for 𝑒𝑢 are stable. As in [24], a hyperbolic tangent form can be selected for the desired surge acceleration as 𝑢̇ 𝑑 = 𝑢̇ 𝑎,𝑚𝑎𝑥 tanh[𝑘𝑎,𝑚𝑎𝑥 (𝑢𝑑,𝑟𝑒𝑓 − 𝑢)/𝑢̇ 𝑎,𝑚𝑎𝑥 ], (21) where 𝑢̇ 𝑎,𝑚𝑎𝑥 is the maximum allowed surge acceleration, 𝑘𝑎,𝑚𝑎𝑥 is a positive surge acceleration gain that shapes the approach to the desired speed, and 𝑢𝑑,𝑟𝑒𝑓 is defined as Please cite published version: https://doi.org/10.1109/JOE.2016.2571158 𝑢𝑑,𝑟𝑒𝑓 ≡ min{[𝑢𝑑,𝑦𝑎𝑤 + (𝑢𝑑 − 𝑢𝑑,𝑦𝑎𝑤 )exp(−5.73|𝑒𝜓 |)], 𝑢𝑑 }, 20 (22) where 𝑒𝜓 = 𝜓 − 𝜓𝑑 is the vehicle heading error, and 𝑢𝑑,𝑦𝑎𝑤 is the desired surge velocity for periods of yaw motion. The function min{ } denotes taking the minimum of the two values in the function’s argument. The intent of including the 𝑢𝑑,𝑟𝑒𝑓 term is to keep the surge speed low during turning maneuvers in order to minimize the vehicle’s turning radius. To develop a heading controller, the yaw rate equations of motion given by (3), and (7)-(11) were simplified as: (𝐼𝑧 − 𝑁𝑟̇ )𝑟̇ − (−𝑋𝑢̇ + 𝑌𝑣̇ )𝑢𝑣 − 𝑁𝑟 𝑟 = 𝜏𝑧 . (23) As above, input state linearization was used to identify a nonlinear feedback control law for the yaw subsystem. Let 𝜉𝜓 be a linearizing control related to the commanded torque from the controller 𝜏𝑧 by the relation 𝜏𝑧 = (𝐼𝑧 − 𝑁𝑟̇ )ξ𝜓 − (−𝑋𝑢̇ + 𝑌𝑣̇ )𝑢𝑣 − 𝑁𝑟 𝑟. (24) Using this in (23) gives 𝑟̇ = 𝜓̈ = 𝜉𝜓 . If the heading tracking error is defined as 𝑒𝜓 = (𝜓 − 𝜓𝑑 ), where 𝜓𝑑 is the desired heading angle, and an input of the form 𝜉𝜓 = 𝜓̈ = 𝜓̈𝑑 − 𝑘1 𝑒𝜓 − 𝑘2 𝑒̇𝜓 is selected, the error dynamics will be: 𝑒̈𝜓 + 𝑘2 𝑒̇𝜓 + 𝑘1 𝑒𝜓 = 0, (25) which are exponentially stable when the control gains are positive: 𝑘1 > 0 and 𝑘2 > 0. As only the desired yaw 𝜓𝑑 , and not also 𝜓̇𝑑 and 𝜓̈𝑑 , is provided by the ALR system, the control law reduces to: 𝜏𝑧 = (𝐼𝑧 − 𝑁𝑟̇ )(−𝑘1 𝑒𝜓 − 𝑘2 𝑟) − (−𝑋𝑢̇ + 𝑌𝑣̇ )𝑢𝑣 − 𝑁𝑟 𝑟. (26) As shown in [24], the combined surge speed and heading control laws make the system state (𝑢, 𝑟, 𝜓)𝑇 bounded and globally uniformly asymptotically convergent to (𝑢𝑑 , 0, 𝜓𝑑 )𝑇 when 𝑡 → ∞. They are also well-defined and bounded for all 𝑡 > 0 when {𝑘𝑢 , 𝑘1 , 𝑘2 } > 0. Examining the sway velocity 𝑣 subsystem, (𝑚 − 𝑌𝑣̇ )𝑣̇ + (𝑚 − 𝑋𝑢̇ )𝑢𝑟 − 𝑌𝑣 𝑣 = 0, (27) And using the error dynamics produced in (20) and (25), one can readily see that the sway subsystem in (27) reduces to, (𝑚 − 𝑌𝑣̇ )𝑣̇ = −(𝑚 − 𝑋𝑢̇ )𝑢𝑑 𝜓̇𝑑 + 𝑌𝑣 𝑣, (28) when 𝑡 → ∞, which is exponentially stable for the setpoint case of 𝜓̇𝑑 = 0. A block diagram of the controller is shown in Fig. 15. Please cite published version: https://doi.org/10.1109/JOE.2016.2571158 21 Fig. 15: Structure of the nonlinear backstepping controller. During initial on-water controller testing it was found that the waterjet motors were exhibiting a chatter-like behavior. An examination of the thrust model Section IV.A shows that the commanded speed of each waterjet is sensitive to small changes in desired thrust. To reduce the chattering effect, the commanded surge force (19) is scaled by 0.5 and the commanded yaw moment (26) is scaled by 0.05. Coupled with the fact that the waterjet pump motor driver has a maximum speed that it can output, the scale factors basically act like a saturation function for the commanded motor speed to alleviate the chattering issue. Despite the fact that a reduced set of the equations of motion in equations (3)-(11) were used to develop the backstepping surge speed and heading controllers, the backstepping controller was found to be robust to unmodeled dynamics throughout the range of the USV operating conditions tested. B. Backstepping Yaw Controller with Adaptive Speed Control Based on the results of simulation and initial on-water testing of the non-adaptive backstepping controller, the need for adaptive speed control was established. Although the change in turning dynamics between displacement conditions does not appear to drastically affect heading control performance, the change in drag significantly affects the performance of surge speed control. To remedy the issue of steady state speed errors fluctuating with mass and drag parameters throughout the ALR mission, an adaptive surge speed control law was developed and implemented in combination with the backstepping heading controller developed in Section VI.A above. By combining (17) and (18), one can write the surge equation of motion as: ℎ𝑢̇ − (𝑚 − 𝑌𝑣̇ )𝑣𝑟 − 𝑋𝑢 𝑢 − 𝑋𝑢|𝑢| 𝑢|𝑢| = 𝜏𝑥 , (29) where ℎ ≡ (𝑚 − 𝑋𝑢̇ ). A control law for the thrust commanded by the controller of the form 𝜏𝑥 = − (𝑚 − 𝑌𝑣̇ )𝑣𝑟 − 𝑋̂𝑢 𝑢 − 𝑋̂𝑢|𝑢| 𝑢|𝑢| + 𝑎̂𝑑 𝑢𝑑 , (30) where 𝑋̂𝑢 , 𝑋̂𝑢|𝑢| and 𝑎̂𝑑 are estimated parameters, is chosen to decouple the surge dynamics from those of sway and yaw. With this control law, (29) becomes ℎ𝑢̇ = (𝑋𝑢 − 𝑋̂𝑢 )𝑢 + (𝑋𝑢|𝑢| − 𝑋̂𝑢|𝑢| )𝑢|𝑢| + 𝑎̂𝑑 𝑢𝑑 . (31) Please cite published version: https://doi.org/10.1109/JOE.2016.2571158 22 A linear reference model of the form 𝑢̇ 𝑚 = −𝑎𝑚 𝑢𝑚 + 𝑏𝑚 𝑢𝑑 , (32) is chosen and the model error is defined as 𝑒𝑚 ≡ (𝑢 − 𝑢𝑚 ). With this reference model (31) can be reduced to an equation describing the surge speed error dynamics: ℎ𝑒̇𝑚 + ℎ𝑎𝑚 𝑒𝑚 = (ℎ𝑎𝑚 + 𝑎̃1 )𝑢 + 𝑎̃2 𝑢|𝑢| − (ℎ𝑏𝑚 − 𝑎̂𝑑 )𝑢𝑑 , (33) where 𝑎̃1 ≡ (𝑋𝑢 − 𝑋̂𝑢 ) and 𝑎̃2 ≡ (𝑋𝑢|𝑢| − 𝑋̂𝑢|𝑢| ) are parameter estimation errors. An adaptation law of the form 𝑑𝑎̃1 𝑑𝑡 𝑑𝑎̃2 𝑑𝑡 𝑑𝑎̂𝑑 𝑑𝑡 =− =− 𝑑𝑋̂𝑢 = 𝑑𝑡 𝑑𝑋̂𝑢|𝑢| 𝑑𝑡 −𝛾𝑒𝑚 𝑢 sgn(ℎ) = −𝛾𝑒𝑚 𝑢|𝑢| sgn(ℎ) , = (34) −𝛾𝑒𝑚 𝑢𝑑 sgn(ℎ) } is chosen for stability, where sgn(ℎ) is the sign (signum) function and 𝛾 is a positive adaptation gain. The stability of the surge speed controller can be shown for the Lyapunov function candidate: 1 2 𝑉 = |ℎ|𝑒𝑚 + [(ℎ𝑎𝑚 + 𝑎̃1 )2 + 𝑎̃22 + (ℎ𝑏𝑚 − 𝑎̂𝑑 )2 ]. 𝛾 (35) Using |ℎ| = ℎ sgn(ℎ) together with (33) and (34), the derivative of the Lyapunov function reduces to 2 |ℎ|, 𝑉̇ = −2𝑎𝑚 𝑒𝑚 (36) which is negative definite for 𝑎𝑚 > 0. The coefficients 𝑎𝑚 and 𝑏𝑚 of the reference model (32) can be determined by linearizing the hyperbolic tangent based model acceleration for the nonlinear backstepping controller (21) with 𝑢𝑑,𝑟𝑒𝑓 = 𝑢𝑑 . When the surge speed 𝑢 achieved by the USV approaches that of the reference model 𝑢𝑚 , the argument of the hyperbolic tangent function becomes small and the model acceleration can be approximated as: 𝑢̇ 𝑚 ≈ 𝑢̇ 𝑎,𝑚𝑎𝑥 𝑘𝑎,𝑚𝑎𝑥 𝑢̇ 𝑎,𝑚𝑎𝑥 (𝑢𝑑 − 𝑢𝑚 ), such that 𝑎𝑚 = 𝑏𝑚 = 𝑢̇ 𝑎,𝑚𝑎𝑥 𝑘𝑎,𝑚𝑎𝑥 ⁄𝑢̇ 𝑎,𝑚𝑎𝑥 . A block diagram of the backstepping adaptive controller is shown in Fig. 16. (37) Please cite published version: https://doi.org/10.1109/JOE.2016.2571158 23 Fig. 16: Structure of the adaptive backstepping controller. As in Section VI.A, the commanded surge force 𝜏𝑥 is multiplied by a factor of 0.5 to prevent chattering. During field trials the adaptive backstepping controller was found to work well with large, sudden changes in payload mass (see Section VII). In practice, it was also found that when the parameter estimates 𝑋̂𝑢|𝑢| and 𝑎̂𝑑 were held constant, the adaptive controller still performed well, because the linear drag term in the control law (30) dominates the other two terms at low speeds (𝑢 ≤ 1.5 m/s). C. Comparative Set Point Tests In order to establish a reasonable comparison between the two controllers, a set point test is conducted on each controller. The test first consists of placing the USV in a predetermined position at rest with a predetermined initial heading. The test is started by delivering a constant speed command and an initial desired heading command that is the same as the initial heading of the USV. The USV accelerates towards the desired speed and also attempts to maintain heading. At a specified time (15 seconds), the heading command is changed to a value 90 degrees from the initial heading and the USV executes a turn towards the new desired heading. The metrics for evaluating controller performance during this test are steady state speed and heading error before and after the jump in heading command. The test is conducted a total of three times for each controller and the performance metrics are averaged over all three tests. To quantify the difference in performance between two controllers, the difference between the errors is divided by the larger error, resulting in the percentage amount that the lower error is ‘better’ when compared to the larger. This metric is relative to the least desirable result, which is the baseline for comparison. For example, consider results 𝐴 and 𝐵 where 𝐴 is more desirable than 𝐵. The difference between 𝐴 and 𝐵 is divided by 𝐵 and the result 𝜆 = (𝐵 − 𝐴)/max(𝐴, 𝐵) × 100% is said to show that “𝐴 performs (𝐵 − 𝐴)/max(𝐴, 𝐵) × 100% better than 𝐵.” Since the metric we are comparing is steady state error, a positive value for 𝜆 denotes an improvement in A with respect to B. Naturally, a negative value would denote a performance decrease. This convention applies for all subsequent sections where two control results are compared. For the results presented in this section, the inputs used for the test are 𝜓𝑑 = 𝜓(𝑡 = 0) for 0 ≤ 𝑡 ≤ 15 seconds, 𝜓𝑑 = 𝜓(𝑡 = 0) + Please cite published version: https://doi.org/10.1109/JOE.2016.2571158 24 90 degrees for 𝑡 > 15 seconds, and 𝑢𝑑 = 1.5 m/s. For the non-adaptive backstepping controller the control gains are set to 𝑘1 = 0.1, 𝑘2 = 1.0, 𝑘𝑢 = 8.0, and 𝑘𝑎,𝑚𝑎𝑥 = 1.2. The adaptive backstepping controller has control gains 𝑘1 = 0.1, 𝑘2 = 1.0, 𝑘𝑎,𝑚𝑎𝑥 = 1.2, and 𝛾 = 0.05. The backstepping controller gains were found (through previous testing) to work well on the USV. The WAMV USV14 was in the lightship condition for the tests, a 10-15 knot sustained wind blew from the southeast (approximately 1600), and a slight tidal current of <0.2 knots flowed Northerly (approximately 3450). The small wind driven waves were taken to be negligible in affecting the performance of the vehicle. The results of one set point test when the USV is controlled by the non-adaptive backstepping controller are shown in Fig. 17. The average speed error at steady state before the jump in heading is 0.25 m/s, and decreases to 0.24 m/s after the jump. The average heading error at steady state before the jump is 0.74 degrees and decreases to 0.41 degrees afterwards. Fig. 17. Results for the set point test using the backstepping (BS) and adaptive backstepping (ABS) controllers. Results for the same set point test using the adaptive backstepping controller are overlaid on those of the backstepping controller in Fig. 16 above. The average speed error at steady state before the jump in heading is 0.065 m/s, and 0.070 m/s after the jump. The average heading error at steady state before and after the jump is 1.9 degrees. The overall results averaged over three runs for each controller are shown in Table IV. The controllers have been annotated as ABS and BS adaptive backstepping and backstepping, respectively. For brevity, the charts only show the comparisons of the controllers after the jump in heading command. The results show that the non-adaptive backstepping controller shows 62% better heading performance over the adaptive controller before the heading change. After the heading change, the non-adaptive backstepping controller shows a 78% better heading performance than the adaptive controller. Please cite published version: https://doi.org/10.1109/JOE.2016.2571158 25 TABLE IV COMPARISON OF CONTROLLERS FOR THE SET POINT TEST. USING THE METRIC IDENTIFIED IN SECTION VI.C, THE STEADY STATE SPEED ERROR OF THE ABS CONTROLLER IS 71% BETTER THAN THE BS CONTROLLER AFTER THE JUMP. HOWEVER, THE STEADY STATE HEADING ERROR OF THE BS CONTROLLER IS 78% BETTER THAN THE ABS CONTROLLER AFTER THE JUMP. Controller: ABS BS Steady State Speed Error Before Jump (m/s): 0.065 0.25 Percent Error: 4% 17% Steady State Speed Error After Jump (m/s): 0.070 0.24 Percent Error: 5% 16% Steady State Heading Error Before Jump (deg): Steady State Heading Error After Jump (deg): 1.9 0.74 1.9 0.41 VII. VARIABLE MASS AND DRAG EXPERIMENTS Mock ALR tests were performed in Dania Beach and Hollywood, Florida USA. In order for the vehicle to operate effectively, it cannot be used in sea state greater than 1 or winds higher than 15 knots. The maximum sea state and wind conditions for operations were determined by trial and error. During the experiments the vehicle was driven under closed loop speed and heading control in the ICW. Vehicle heading, acceleration, position, speed over ground, and motor command data were recorded, as were the wind and current speed/direction, and wave characteristics. The WAM-V USV14 was tested over a range of surge speeds that are expected for the ALR mission. A. Variable Mass One of the possible scenarios for the launch phase is the AUV being dropped into the water from the USV’s undercarriage by the ALR system. In order to simulate this scenario, a test case where the USV’s mass properties vary during operation is conducted. Specifically, the mass change test involves the USV beginning in the full displacement condition and coming to a set desired speed and heading. The mass and drag properties of the lightship condition are incorporated into the adaptive and non-adaptive backstepping control laws (creating the uncertain mass and drag situation). Once the USV reaches steady state in both speed and heading, an AUV-like mass is dropped from the payload and the USV continues along its course. No real-time feedback is provided to the low-level controller about the actual displacement condition during the test, either before or after the drop. The performance of each controller across the two displacement conditions is then compared against the other controllers. For the experimental setup, the AUV-like mass is a Polyvinyl Chloride (PVC) pipe measuring 130 cm in length, 12 cm in diameter, weighted with lead shot and capped at both ends (Fig. 18a). The overall weight in air of the PVC apparatus is 39 kg (approximately the same as a REMUS 100 AUV), with the weight evenly distributed along the length. Four buoys (each rated at 13.6 kg buoyancy) are lashed to the PVC apparatus, two at each end. The device is secured to the undercarriage of the USV using both fore and aft lines. The aft line runs through a loop directly above the aft section of the PVC device and forward to a quick- Please cite published version: https://doi.org/10.1109/JOE.2016.2571158 26 release mechanism, where both lines are clipped in, thus suspending the PVC device under the payload tray of the USV and along the USV centerline. The quick release mechanism holds the two lines together until a pin is pulled, which releases the connection and the device falls into the water. A line is tied to the pin, which allows a user to pull the pin from a distance (from a chase boat in front of the USV during the test). A view of the USV in the full displacement condition from below as it is lifted with a crane is shown in Fig. 18b. Notice that the AUV-like object is located along the centerline of the USV, and the two additional PVC pipes provide the weight of the intended ALR mechanical system (68 kg). a) b) Fig. 18. a) PVC device used to mimic a REMUS 100 AUV. b) Bottom view of the WAM-V USV14 in the full displacement condition. The results of the mass change test when the USV is controlled by the backstepping controller tuned to the lightship condition are shown in Fig. 18. For the time up to the drop of the PVC device, the USV is in the full displacement condition traveling along a desired heading of 150o at a desired speed of 1 m/s. The quick release mechanism can only be pulled from the front of the USV. Accordingly, the drop is marked by a spike in surge velocity (and sometimes a perturbation to the heading) which is partly due to the impulsive force applied to the quick release line. Because the impulsive force is unmeasured, the data corresponding to the time when the force is applied are not included in the steady state averages. A picture, taken just before the mass drop occurs, is shown in Fig. 19. The average speed error for the backstepping controller at steady state before the drop is 0.14 m/s, and decreases to 0.13 m/s after the drop. The data are shifted in time so that the results are synchronized with those of the adaptive backstepping controller presented below where the drop occurs at t = 78 seconds. The average heading error at steady state before the drop is 1.4 degrees and increases to 2.6 degrees afterwards. Please cite published version: https://doi.org/10.1109/JOE.2016.2571158 27 Fig. 19. Example results of the variable mass test using the backstepping controller and the adaptive backstepping controller. Data from the different tests are synched according to the time of the mass drop for the ABS controller. The large perturbations in surge speed and heading in the adaptive backstepping controller test at the time of the mass drop are attributed to a large impulse delivered through the quick release line. Fig. 20. Snapshot just before the PVC device is released from the USV undercarriage during the variable mass test. Results for the variable mass test using the adaptive backstepping controller tuned to the lightship condition are also shown in Fig. 18 above. The average speed error at steady state before the drop is 0.046 m/s, and decreases to 0.042 m/s after the drop, which is synched to the backstepping controller such that it occurs at t = 78 seconds. The average heading error at steady state before the drop is 3.3 degrees and increases to 4.7 degrees afterwards. A comparison of the speed and heading errors for the three controllers is shown in Table V. For brevity, the full displacement condition results are excluded from the comparison table. The results show that for each backstepping controller the speed error decreased when the USV transitioned from the full displacement to the lightship condition. The magnitude of the speed errors, however, show that the adaptive controller performs 67% better than the backstepping controller when in the full displacement condition and performs 68% better than the backstepping controller when in the lightship condition. Note that the short period of Please cite published version: https://doi.org/10.1109/JOE.2016.2571158 28 time during which the USV is reacting to the impulse of the quick-release mechanism are excluded from the analysis of the steady state characteristics of the controlled USV. TABLE V COMPARISON OF THE ADAPTIVE BACKSTEPPING AND BACKSTEPPING CONTROLLERS FOR THE VARIABLE MASS TEST. USING THE METRIC IDENTIFIED IN SECTION VI.C, THE STEADY STATE SPEED ERROR OF THE ABS CONTROLLER IS 68% BETTER THAN THE BS CONTROLLER AFTER THE DROP. HOWEVER, THE STEADY STATE HEADING ERROR OF THE BS CONTROLLER IS 43% BETTER THAN THE ABS CONTROLLER AFTER THE DROP. Controller: ABS BS Steady State Speed Error Before Drop (m/s): 0.05 0.14 Percent Error: 4.6% 14% Steady State Speed Error After Drop (m/s): 0.04 0.13 Percent Error: Steady State Heading Error Before Drop (deg): Steady State Heading Error After Drop (deg): 4% 3.3 13% 1.3 3.8 1.4 The results for heading do not show the same trend in performance. The non-adaptive backstepping controller shows 61% better heading performance over the adaptive controller in the full displacement condition. For the lightship condition, the non-adaptive backstepping controller shows 43% better heading performance over the adaptive controller. B. Variable Drag A second scenario expected for the ALR mission is when the USV is navigating a straight trajectory in the lightship condition and the AUV (approaching from behind) impulsively docks with a recovery device suspended below the surface. This towing situation would create an abrupt change in drag experienced by the USV, and also alter the turning dynamics, i.e. a change in both the heading and surge subsystems of the USV would occur. As in the change of mass testing, it is assumed that no real-time feedback about the presence of the AUV is provided to the USV low-level controller, which is tuned for the lightship condition. To create this scenario, the AUV-like PVC device was secured at two tow points on the aft section of the USV payload tray using a tow line. Each line is 7.3 m long, and attached to the front section of the PVC device. The PVC device is initially carried aboard a chase boat behind the USV so that the towing lines are slack. Once the USV comes to a steady heading and speed, the PVC device is dropped into the water from the chase boat and begins to be towed by the USV (Fig. 21). For this set of tests, since the mass of the USV is not intended to be altered, the PVC device was weighted to 28 kg, which eased the lifting of the device to and from the chase boat. The shape of the device was unaltered from the other tests; however the buoys sat higher in the water which decreased the overall drag of the device. In order to determine the amount of drag experienced by the USV during the variable drag tests, the PVC device is towed behind the chase boat. The tow line is attached to a scale, which is then attached to the tow point on the chase boat. The control box is used to record the boat’s velocity and values are read from the scale for different speeds ranging from 0.5 to 1.6 m/s. Fig. 22 shows the drag model developed for the PVC device. Each point on the plot represents Please cite published version: https://doi.org/10.1109/JOE.2016.2571158 29 the average value of force recorded for that speed and the solid line is the curve fit to the points, valid for the range from 0.5 to 1.6 m/s. The data are averaged over a total of 76 force readings from the scale. For the data presented in this section, with a desired speed of 1.0 m/s, the drag of the PVC device is estimated at 84 N. The same drag test conducted for the REMUS 100 AUV resulted in a drag value of no more than 23 N at 1.0 m/s. The variable drag tests, therefore, allow for a towed recovery device drag of at least 61 N. Fig. 21. Picture of the WAM-V USV14 towing the AUV-like object through the water during the variable drag testing. Fig. 22. Drag model for the 28 kg PVC device used in the variable drag tests. Results of the variable drag test using the non-adaptive backstepping controller tuned to the lightship condition are shown in Fig. 23. The average speed error at steady state before the drop is 0.13 m/s, and increases to 0.17 m/s after the drop. The results are shifted in time so that the drop occurs at t = 42 seconds and are synchronized with those of the adaptive backstepping controller. The average heading error at steady state before the drop is 0.65 degrees and increases to 0.94 degrees afterwards. The same test was conducted for a desired speed of 1.2 m/s, however the drag of the AUV-like PVC device was too high and the propulsion system could not achieve the desired speed; the heading control also degraded significantly. Only the tests where desired speed Please cite published version: https://doi.org/10.1109/JOE.2016.2571158 30 was 1.0 m/s are shown. The quantitative results are averages of the data shown in the figures only, and are similar to the results from other tests. Fig. 23. Results for the variable drag test using the backstepping and the adaptive backstepping controller. The two tests are synched according to the time of the drop. Results using the adaptive backstepping controller tuned initially to the lightship condition are also shown in Fig. 22. The average speed error at steady state before the drop is 0.091 m/s and after the drop it is 0.090 m/s. The drop occurs at t = 42 seconds. The average heading error at steady state before the drop is 1.81 degrees and decreases to 0.35 degrees afterwards. A comparison of the speed and heading errors for the three controllers is shown in Table VI. For brevity, the results for the comparison chart before the drop are excluded. The results show that for each controller the speed error increased when the USV transitioned from the lightship to towing condition; however, the adaptive controller showed a 58% improvement on the backstepping controller while in the lightship displacement condition. The adaptive controller performs 64% better than the backstepping controller while in the towing condition. TABLE VI COMPARISON OF THE ADAPTIVE BACKSTEPPING AND BACKSTEPPING CONTROLLERS FOR THE VARIABLE DRAG TEST. USING THE METRIC IDENTIFIED IN SECTION VI.C, THE STEADY STATE SPEED ERROR OF THE ABS CONTROLLER IS 64% BETTER THAN THE BS CONTROLLER AFTER THE DROP. HOWEVER, THE STEADY STATE HEADING ERROR OF THE BS CONTROLLER IS 66% BETTER THAN THE ABS CONTROLLER AFTER THE DROP. Controller: ABS BS Steady State Speed Error Before Drop (m/s): 0.06 0.13 Percent Error: 5.5% 13% Steady State Speed Error After Drop (m/s): 0.06 0.18 Percent Error: Steady State Heading Error Before Drop (deg): Steady State Heading Error After Drop (deg): 6% 0.1 18% 0.5 2.6 0.9 Please cite published version: https://doi.org/10.1109/JOE.2016.2571158 31 The results for heading are as follows. The adaptive backstepping controller shows 83% better heading performance over the non-adaptive backstepping controller in the lightship condition. For the towing condition, the non-adaptive backstepping controller shows 66% better heading performance over the adaptive controller. The maximum speed at which the WAM-V can maintain heading control while towing a device with 84 N of drag is 1.0 m/s. This number will decrease if the drag of the recovery device decreases because the initial estimate of the REMUS 100 drag at 1.0 m/s is 23 N – far less than the AUV-like object used for testing (see Fig. 22). C. Variable Mass and Drag A third scenario expected for the ALR mission is where the USV is navigating a straight trajectory in the full displacement condition when the AUV is lowered/dropped into the water and is still attached to the ALR device for some time before being completely launched from the USV. This carriage to towing transition would create a change in the drag and mass of the USV. The turning dynamics would also be altered as in the case of the variable drag testing presented in Section VII.B. As in the other testing, it is assumed that no real-time feedback about the presence of the AUV is provided to the USV low-level controller. To conduct the variable mass and drag experiment, the setups for the variable mass (Section VII.A) and variable drag test (Section VII.B) are combined. The PVC device is loaded in the undercarriage of the USV and the tow lines are coiled on the payload tray and attached at the ends to the rear tow points on the USV. The USV comes to a steady heading and speed in the full displacement condition, the quick release is pulled, and the device falls into the water. As the USV continues forward the tow lines are brought into tension and the AUV is towed behind the USV. Results of the variable mass and drag test using the non-adaptive backstepping controller tuned to the lightship condition are shown in Fig. 24. In this case, the PVC device separated cleanly from the suspension points when the quick-release was pulled so the device immediately transitioned to towing at distance. The average speed error at steady state before the drop is 0.14 m/s, and increases to 0.19 m/s after the drop. As above, the results of the backstepping controller test are synchronized with those of the adaptive backstepping controller, such that the drop occurs at t = 87 seconds. The average heading error at steady state before the drop is 0.36 degrees and increases to 2.9 degrees afterwards. Results using the adaptive backstepping controller tuned initially to the lightship condition are also shown in Fig. 23. The average speed error at steady state before the drop is 0.071 m/s and after the drop it is 0.066 m/s. The average heading error at steady state before the drop is 3.1 degrees and increases to 3.4 degrees afterwards. Please cite published version: https://doi.org/10.1109/JOE.2016.2571158 32 Fig. 24. Results of the variable mass and drag test using the backstepping and the adaptive backstepping controllers. The data from the different tests are synched according to the time of the mass drop. A comparison of the speed and heading errors for the controllers is shown in Table VII. For brevity, the comparison chart excluded the results before the drop. The results show that for the non-adaptive controllers the speed error increased when the USV transitioned from the full displacement to towing condition. The magnitude of the speed errors show that the adaptive controller retains an advantage of 48% on the backstepping controller while in the full displacement condition. The adaptive controller performs 65% better than the backstepping controller while in the towing condition. Overall, the adaptive controller out-performed both non-adaptive controllers in in transitioning from full displacement to lightship condition. The results for heading are as follows. The non-adaptive backstepping controller shows 89% better heading performance over the adaptive backstepping controller. For the towing condition, the non-adaptive backstepping controller shows 15% better heading performance over the adaptive controller. The main findings of the set point, variable mass, variable drag, and variable mass and drag tests are that the surge speed performance of the adaptive controller is superior to the non-adaptive backstepping controller in the transitioning region. Finally, the adaptive controller shows less effects to changing mass and drag parameters than the backstepping controller, which is the ultimate goal of the low-level control for the ALR mission. VIII. CONCLUDING REMARKS In this paper, we present the results of experimental testing of an unmanned surface vehicle under closed loop speed and heading control through lightship, transitional, and full displacement conditions. The tests were performed to evaluate the tracking performance of backstepping and model reference adaptive controllers under the variable mass and drag conditions expected during the automatic launch and recovery of an AUV from the USV. System identification of the data recorded from the water-borne maneuvering trials was used to find approximate values of hydrodynamic coefficients for the vehicle that adequately reproduce its Please cite published version: https://doi.org/10.1109/JOE.2016.2571158 33 motion in zig-zag and acceleration tests. TABLE VII COMPARISON OF THE ADAPTIVE BACKSTEPPING AND BACKSTEPPING CONTROLLERS FOR THE VARIABLE MASS AND DRAG TEST. USING THE METRIC IDENTIFIED IN SECTION VI.C, THE STEADY STATE SPEED ERROR OF THE ABS CONTROLLER IS 65% BETTER THAN THE BS CONTROLLER AFTER THE DROP. HOWEVER, THE STEADY STATE HEADING ERROR OF THE BS CONTROLLER IS 15% BETTER THAN THE ABS CONTROLLER AFTER THE DROP. Controller: ABS BS Steady State Speed Error Before Drop (m/s): 0.071 0.14 Percent Error: 7% 14% Steady State Speed Error After Drop (m/s): 0.066 0.19 Percent Error: Steady State Heading Error Before Drop (deg): Steady State Heading Error After Drop (deg): 6% 3.1 19% 0.36 3.4 2.9 We modified the backstepping controller for mono-hull vessels developed by Liao et al. (2010) [24] to account for the twin hull dynamics and actuator saturation limits of a wave-adaptive modular vessel. The modified controller was then used as the basis for a direct method model reference adaptive controller [17]. The reference model was derived using a physics-based model of the vessel that was tuned using system identification test data. We performed a comparative analysis of the steady state tracking performance between the two controllers (TABLE VII). Results show that the adaptive controller is superior in surge speed tracking performance – the improvement comes with a slight penalty in the effectiveness of heading control. The variable displacement and drag experiments show that the vehicle exhibits steady state surge tracking errors when an adaptive control approach is not used. The variable mass and drag experiment is the most representative of an ALR mission, and clearly demonstrates that the adaptive backstepping controller outperformed the non-adaptive backstepping controller in terms of speed and exhibited a similar response as the non-adaptive backstepping case in heading. These same results are illustrative of the separate variable mass and variable drag test, where the adaptive backstepping controller clearly outperformed in speed, while displaying a common performance in heading. REFERENCES [1] Aguiar, A. P. and Hespanha, J. P. “Logic-based switching control for trajectory-tracking and path-following of underactuated autonomous vehicles with parametric modeling uncertainty.” In Proc. of the 2004American Control Conference. Vol. 4, pp. 3004-3010, Boston, MA, USA, 2004. [2] Aguiar, A. P. and Pascoal, A. M. Dynamic positioning and way-point tracking of underactuated AUVs in the presence of ocean currents. International Journal of Control vol. 80, no. 7, pp.1092-1108, 2007. [3] Alvarez, J., Bertaska, I., and von Ellenrieder, K. “Nonlinear Control of an Amphibious Vehicle.” Proc. ASME Dynamic Systems Control Conference, Stanford, CA USA, 2013. [4] Annamalai, A. S. K., Sutton, R., Yang, C., Culverhouse, P. and Sharma, S. Robust Adaptive Control of an Uninhabited Surface Vehicle. J. Intelligent & Robotic Systems, May 2014. DOI 10.1007/s10846-014-0057-2. [5] Ashrafiuon, H. Muske, K. R. and McNinch, L.C., “Review of Nonlinear Tracking and Setpoint Control Approaches for Autonmous Underactuated Marine Vehicles,” in American Control Conference, Baltimore, MD. USA, 2010. [6] Ashrafiuoun H. Muske, K. R. McNinch, L. C. and Soltan, R. A. Sliding-mode Tracking Control of Surface Vessels. IEEE Transactions of Industrial Electronics, vol. 55, no. 11, pp. 4004-4011, 2008. Please cite published version: https://doi.org/10.1109/JOE.2016.2571158 34 [7] Bertaska, I., Alvarez, J., et al., “Experimental Evaluation of Approach Behavior for Autonomous Surface Vehicles.” Proc. ASME Dynamic Systems Control Conference, Stanford, CA USA, 2013. [8] Bertaska, I.R. and von Ellenrieder, K.D., " Supervisory Switching Control of an Unmanned Surface Vehicle," Proc. MTS/IEEE OCEANS’15 Washington DC, USA pp.1-10, 2015. [9] Bertaska, I.R, et al. “Experimental Evaluation of Automatically Generated Behaviors for USV Operations,” J. Ocean Engineering¸ vol. 106, pp. 496-514, 2015. [10] Caccia, M. Bibuli, M. Bono, R. and Bruzzone, G. Basic navigation, guidance and control of an unmanned surface vehicle. Autonomous Robots, vol. 25, no. 4, pp. 349-365, 2008. [11] Dhanak, M. R., Ananthakrishnan, P., Frankenfield, J., & von Ellenrieder, K. "Seakeeping Characteristics of a Wave-Adaptive Modular Unmanned Surface Vehicle." ASME 2013 32nd Intl Conf on Ocean, Offshore and Arctic Engineering. American Society of Mechanical Engineers, 2013. [12] Duerr, P. and von Ellenrieder, K.D., Scaling and Numerical Analysis of Nonuniform Waterjet Pump Inflows, IEEE J. Oceanic Engineering, vol.40, no.3, pp.701-709, 2015. [13] Faltinsen, O. M. Hydrodynamics of high-speed marine vehicles. Cambridge University Press, 2005. [14] Fossen, T. I. Guidance and Control of Ocean Vehicles. Chichester: John Wiley and Sons Ltd, 1994. [15] Fossen, T. I. and Strand, J. P. Tutorial on nonlinear backstepping: applications to ship control. Modeling, Identification and Control, vol. 20, no. 2, pp. 83-134, 1999. [16] Fratello, J. and Ahmadian, M. "Multi-body Dynamic Simulation and Analysis of Wave-adaptive Modular Vessels." Proc. 11th Intl Conf on Fast Sea Transportation FAST 2011, Honolulu, Hawaii, USA, 2011. [17] Ghommam, J. Mnif, F. Benali, A. and Derbel, N. Asymptotic backstepping stabilization of an underactuated surface vessel. Control Systems Technology, IEEE Transactions on, vol. 14, no. 3, pp. 1150-1157, 2006. [18] International Maritime Organization. “Explanatory Notes to the Standards for Ship Manoeuvrability.” December 2002. London. [19] Khalil, H.K. Nonlinear Systems, Upper Saddle River, NJ: Prentice Hall, 2002. [20] Klinger, W. Bertaska, I. Alvarez, J. and von Ellenrieder, Karl, “Controller Design Challenges for Waterjet Propelled Unmanned Surface Vehicles with Uncertain Drag and Mass Properties.” Proc. MTS/IEEE Oceans’13 San Diego, CA. pp. 23-26. 2013. [21] Klinger, W. Bertaska and von Ellenrieder, K. D. “Experimental Testing of an Adaptive Controller for USVs with Uncertain Displacement and Drag.” Proc. MTS/IEEE Oceans’14 St. John’s, NS Canada. 2014. [22] Kragelund, S, et al. “Adaptive Speed Control for Autonomous Surface Vessels,” in IEEE/MTS Oceans Conference 2013 (Oceans ’13), San Diego, CA, USA. 2013. [23] Li. J, et al. “Robust Adaptive Backstepping Design for Course-keeping Control of Ship with Parameter Uncertainty and Input Saturation,” in 2011 International Conference on Soft Computing and Pattern Recognition (SoCPaR), Dalian, Chiana, 2011. [24] Liao, Y. Pang, Y. and Wan, L. "Combined speed and yaw control of underactuated unmanned surface vehicles," 2010 2nd International Asia Conference on Informatics in Control, Automation and Robotics (CAR), vol.1, pp. 157-161, March 2010. [25] Mahini, F. and Ashrafiuon H, “Autonomous Surface Vessel Target Tracking Experiments in Simulated Rough Sea Conditions,” in ASME Dynamci Systems and Control Conference, Ft. Lauderdale, FL, USA 2012. [26] Marquardt, J. G. Alvarez, J. and von Ellenrieder, K. D. (2014) Characterization and System Identification of an Unmanned Amphibious Tracked Vehicle. IEEE J Oceanic Engineering, 39(4):641-661. [27] Miranda, M., Beaujean, P. P., An, E., & Dhanak, M. "Homing an Unmanned Underwater Vehicle Equipped with a DUSBL to an Unmanned Surface Platform: A Feasibility Study." Proc. MTS/IEEE Oceans’13 San Diego, CA. pp. 23-26. 2013. [28] Panteley, E. and Loria, A. Growth rate conditions for uniform asymptotic stability of cascaded time-varying systems. Automatica, vol. 37, no. 3, 453-460, 2001. [29] Pearson, D. An, P.-C., Dhanak, M. R. von Ellenrieder, K. D. and Beaujean, P.-P. “High-level fuzzy logic guidance system for an unmanned surface vehicle (USV) tasked to perform autonomous launch and recovery (ALR) of an autonomous underwater vehicle (AUV).” Proc. 2014 IEEE/OES Autonomous Underwater Vehicles (AUV) Oxford, MS pp.1-15, 2014. [30] Peterson, A. Ahmadian, M. Craft, M. and Shen, A. "Simulation and scale-testing to improve the next generation of waveadaptive modular vessels." Proc. 2013 Grand Challenges on Modeling and Simulation Conference, p. 19. Society for Modeling & Simulation International, 2013. [31] Qu, H. Sarda, E.I. Bertaska, I.R. and von Ellenrieder, K.D., "Wind feed-forward control of a USV," Proc. MTS/IEEE OCEANS’15 Genova, Italy pp.1-10, 2015. [32] Qu, H. Sarda, E.I. Bertaska, I.R. and von Ellenrieder, K.D., "Adaptive Wind Feedforward Control of an Unmanned Surface Vehicle for Station Keeping," Proc. MTS/IEEE OCEANS’15 Washington DC, USA pp.1-10, 2015. [33] Sarda, E. and Dhanak, M. R. "Unmanned recovery of an AUV from a surface platform." Proc. MTS/IEEE Oceans’13 San Diego, CA. pp. 23-26. 2013. [34] Sarda, E.I. Dhanak, M. R. and von Ellenrieder, K. D. “Concept for a USV–based autonomous launch and recovery system,” Proc. ASNE Launch & Recovery Symp. 2014, Linthicum, MD USA, November 2014. [35] Sarda, E.I. Bertaska, I.R. Qu, A. and von Ellenrieder, K.D., "Development of a USV station-keeping controller," Proc. MTS/IEEE OCEANS’15 Genova, Italy pp.1-10, 2015. Please cite published version: https://doi.org/10.1109/JOE.2016.2571158 35 [36] Skjetne, R., Smogeli, O.N., and Fossen T.I. “A Nonlinear Ship Manoeuvering Model: Identification and Adaptive Control With Experiments for a Model Ship,” Modeling, Identification, and Control, vol 25, no. 1, pp 3-27, 2004. [37] Slotine, J.-J. E. and Li, W.-P. Applied Nonlinear Control. New Jersey: Prentice Hall, 1991. [38] SNAME “Nomenclature for Treating the Motion of a Submerged Body through a Fluid”. The Society of Naval Architects and Marine Engineers, Technical and Research Bulletin No. 1-5, pp. 1-15. April 1950. [39] Sonnenburg, C.R., and Woolsey, A.C. “Modeling, Identification, and Control of an Unmanned Surface Vehicle,” J. Field Robotics, vol 30, no. 3, pp1-28, 2013. [40] Svec, Peter, Brual C. Shah, Ivan R. Bertaska, Jose Alvarez, Armando J. Sinisterra, Karl von Ellenrieder, Manhar Dhanak, and S. K. Gupta. "Dynamics-aware target following for an autonomous surface vehicle operating under COLREGs in civilian traffic." In Intelligent Robots and Systems (IROS), 2013 IEEE/RSJ International Conference on, pp. 3871-3878. IEEE, 2013. [41] von Ellenrieder, K. D. Free Running Tests of a Waterjet Propelled Unmanned Surface Vehicle. J. Mar. Engng & Tech 12(1):19, 2013. Wilhelm Klinger received the B.S. degree in ocean engineering from the U.S. Naval Academy, Annapolis, MD USA in 2012 and M.S. degree in ocean engineering from Florida Atlantic University, Boca Raton, FL USA in 2014. He worked as a Research Assistant at Florida Atlantic University’s Seatech Institute for Ocean and Systems Engineering, Dania Beach, FL USA while completing his M.S. degree and is currently in flight training for the US Navy. Mr. Klinger is a member of the Marine Technology Society and Tau Beta Pi Engineering Honor Society. Ivan Bertaska (M’13) received the B.S. and M.S. degree in ocean engineering from Florida Atlantic University, Boca Raton, FL USA in 2012 and 2013, respectively. He is currently a Ph.D. candidate at Florida Atlantic University’s Seatech Institute for Ocean and Systems Engineering, Dania Beach, FL USA. Mr. Bertaska is a member of the Tau Beta Pi Engineering Honor Society and the IEEE Oceanic Engineering Society. His areas of interest include unmanned vehicle systems control, software architecture and navigation. Karl von Ellenrieder (M’08) received the B.S. degree in aeronautics and astronautics from the Massachusetts Institute of Technology (MIT), Cambridge, MA USA in 1990 and the M.S. and Ph.D. degrees in aeronautics and astronautics from Stanford University, Stanford, CA USA in 1992 and 1998, respectively. He is currently Associate Director of The Institute for Ocean and Systems Engineering (SeaTech),and a Professor in the Department of Ocean & Mechanical Engineering at Florida Atlantic University in Dania Beach, FL. His research interests include unmanned surface vehicles, marine hydrodynamics and ship design. Prof. von Ellenrieder is a Member of the Society of Naval Architects and Marine Engineers, the Marine Technology Society and the IEEE Oceanic Engineering Society. Manhar Dhanak is the Director of The Institute for Ocean and Systems Engineering (SeaTech), Director of Research for Southeast National Marine Renewable Energy Center and Professor of Ocean Engineering at Florida Atlantic University. He is the past chair (2003-2009) of the Department of Ocean Engineering at FAU. He is a graduate of Imperial College, University of London and served as a Research Scientist at Topexpress Ltd., Cambridge, UK and as a Senior Research Associate at University of Cambridge before joining FAU. Dr. Dhanak has research interests in hydrodynamics, physical oceanography, autonomous underwater vehicles (AUV) and ocean energy.
3cs.SY
arXiv:cs/0111043v1 [cs.PL] 16 Nov 2001 Prototyping clp(fd) Tracers: a Trace Model and an Experimental Validation Environment ∗† Ludovic Langevine, Pierre Deransart, Mireille Ducassé and Erwan Jahier INRIA/INSA, INRIA, IRISA/INSA, IRISA/IFSIC {Ludovic.Langevine Pierre.Deransart}@inria.fr, {Mireille.Ducasse Erwan.Jahier}@irisa.fr Abstract Developing and maintaining CLP programs requires visualization and explanation tools. However, existing tools are built in an ad hoc way. Therefore porting tools from one platform to another is very difficult. We have shown in previous work that, from a fine-grained execution trace, a number of interesting views about logic program executions could be generated by trace analysis. In this article, we propose a trace model for constraint solving by narrowing. This trace model is the first one proposed for clp(fd) and does not pretend to be the ultimate one. We also propose an instrumented meta-interpreter in order to experiment with the model. Furthermore, we show that the proposed trace model contains the necessary information to build known and useful execution views. This work sets the basis for generic execution analysis of clp(fd) programs. [23] is a comprehensive version of this paper. 1 Introduction Developing and maintaining CLP programs benefits from visualization and explanation tools such as the ones designed by the DiSCiPl European project [10]. For example, the CHIP search-tree tool [28] helps users understand the effect of a search procedure on the search space; and the S-Box model [17] allows users to inspect the store with graphical and hierarchical representations. However, existing tools are built in an ad hoc way. Therefore porting tools from one platform to another is very difficult. One has to duplicate the whole design and implementation effort every time. We have shown in previous work that, from a fine-grained execution trace, a number of interesting views about logic program executions could be generated by trace analysis [11, 19]. Here we want to generate a generic trace that can be used by several debugging tools. Each tool gives a useful view of the clp(fd) execution (e.g. the labelling tree or the domain state evolution during a propagation stage). Each tool selects the relevant data in the generic ∗ This work is partly supported by OADymPPaC, a French RNTL project [26]. In A. Kusalik (ed), Proceedings of the Eleventh Workshop on Logic Programming Environments (WLPE’01), December 1, 2001, Paphos, Cyprus. Computer Research Repository (http://www.acm.org/corr/), cs.PL/0111043; whole proceedings: cs.PL/0111042. † 1 2 WLPE’01 trace in order to build its execution view. Therefore, the trace is supposed to contain all potentially useful information. The tools can be developed simultaneously and reused on different platforms 1 . This approach assumes that there is a generic trace model. In order to reach this objective, we start with a general model of finite domain constraint solving which allows to define generic trace events. So far, no fine-grained tracers exist for constraint solvers. Implementing a formally defined tracer is a delicate task, if even at all possible. This is especially true in the context of constraint solving where the solvers are highly optimized. Therefore, before going for a “real” implementation, it is essential to elaborate trace models and experiment them. In order to rigorously define the constraint solving trace model, and as we did for Prolog [20], we use an operational semantics based on [2] and [15]. We define execution events of interest with respect to this semantics. On one hand, this formal approach prevents the finedgrained trace model to be platform dependent. On the other hand, the consistence between the model and concrete clp(fd) platforms has to be validated. In order to develop a first experimentation, the formal model is implemented as an instrumented meta-interpreter 2 which exactly reflects it. The proposed instrumented meta-interpreter is useful to experimentally validate the model. It is based on well known Prolog meta-interpretation techniques for the Prolog part and on the described operational semantic for the constraint part. The ultimate goal of the meta-interpreter (as in [20]) is to provide an executable specification of traces. The traces generated by the meta-interpreter could then be used to validate a real (and efficient) tracer. At this stage, efficiency of the meta-interpreter is not a key issue; it is used as a prototype rather than as an effective implementation. Such a tracer may generate a large volume of data. The generic trace must be analyzed and filtered in order to condense this data down to provide the sufficient information to the debugging tools. To push further the validation we have mimicked a trace analyzer à la Opium [12] which allow to obtain different kinds of views of the execution. This is a way to show that the proposed trace model contains the necessary information to reproduce several existing clp(fd) debugging tools. In this article, due to lack of space we concentrate on the constraint solving part, a trace of the logic programming part “à la Byrd” [3] could be integrated in the meta-interpreter (see for example [13]). The contribution of this article is first to rigorously define a trace model for constraint solving and to provide an environment to experimentally validate it. This sets the basis for generic execution analysis of clp(fd) programs. In the following, Section 2 formally defines an execution model of clp(fd) narrowing. In particular, it defines a 8 steps operational semantics of constraint solving. These steps are the basis for the trace format defined in Section 3. Section 4 explains how to build an instrumented meta-interpreter in order to build an experimental environment. Section 5 briefly describes experiments with the proposed trace and our trace analyzer. Finally, Section 6 discusses the content of the trace with respect to existing debugging tools. 1 Our OADymPPaC partners will use our trace model to build tools in the CHIP [7], CLAIRE [6] and GNU Prolog [16] platforms. 2 The meta-interpreter approach to trace clp(fd) program executions has already been used in the APT tool by Carro and Hermenegildo [4]. However, APT does not access the propagation details. We propose a more informative trace. Prototyping clp(fd) Tracers 2 3 Operational Semantics of Constraint Programming In this section, we propose an execution model of (finite domain) constraint programming which is language independent. The operational semantics of constraint programming results from the combination of two paradigms: control and propagation. The control part depends on the programming language in which the solver is embedded, and the propagation corresponds to narrowing. Although the notions introduced here are essentially language independent, we will illustrate them in the context of clp(fd). 2.1 Basic Notations In the rest of the paper, P(A) denotes the power set of A; r|w denotes the restriction of the relation r ⊆ A × B to w ⊆ A: r|w = {(x, y) | x ∈ w ∧ (x, y) ∈ r}. The following notations are attached to variables and constraints: V is the set of all the finite domain variables of the problem; D is a finite set containing all possible values for variables in V; D is a function D : V → P(D), which associates to each variable x its current domain, denoted by Dx ; minx and maxx are respectively the lower and upper bounds of Dx ; C is the set of the problem constraints; var is a function C → P(V), which associates to each constraint C ∈ C the set of variables of the constraint. 2.2 Reduction Operators Many explanation tools focus on domain reduction (see for example [15, 21]). When constraints are propagated, the evolution of variable domains is a sequence of withdrawals of inconsistent values. At each step, for a given constraint, a set of inconsistent values is withdrawn from one (and only one) domain. These values can be determined by algorithms such as “node consistency”, “arc consistency”, “hyper-arc consistency” or “bounds consistency” described for example by Marriott and Stuckey [24]. Following Ferrand et al [15], we define reduction operators. The application of all the reduction operators of a constraint gives the narrowing operator introduced by Benhamou [2]. Definition 2.1 (Reduction operator). A reduction operator redxC is a function attached to a constraint C and a variable x. Given the domains of all the variables used in C, it returns the domain Dx without the values of x which are inconsistent with the domains of the other variables. The set of withdrawn values is denoted Wx . redxC (D|var(C) ) = Dx − Wx . There are as many reduction operators attached to C as variables in var(C). In general, for efficiency reasons, a reduction operator does not withdraw all inconsistent values. A simple example of reduction operator for C ≡ x > n, where n is a given integer, is redxC (D|{x} ) = Dx − {v | v ∈ Dx ∧ v ≤ n}. The evolution of the domains can be viewed as a sequence of applications of reduction operators attached to the constraints of the store. Each operator can be applied several times until the computation reaches a fix-point [15]. This fix-point is the set of final domain states. An example of computation with reduction operators is shown in Figure 1. There are three variables x, y and z and two constraints, x > y and y > z. At the beginning, Dx = Dy = Dz = {1, 2, 3}, represented by three columns of white squares. Considering the first constraint, it appears that x cannot take the value “1”, because otherwise there would be 4 WLPE’01 x 3 2 1 y z x red x x>y y z y red x > y x y z y red y > z x y z z red y > z x y z x red x > y x y z Figure 1: Application of reductions to the system {x > y; y > z}. no value for y such that x > y; redxx>y withdraws this inconsistent value from Dx . This withdrawal is marked with a black square. In the same way, redyx>y withdraws the value 3 from the domain of y. Then, considering the constraint y > z, the operators redyy>z and redzy>z withdraw respectively the sets {1} and {2, 3} from Dy and Dz . Finally, a second application of redxx>y reduces Dx to the singleton {3}. The fix-point is reached. The final solution is: {x = 3, y = 2, z = 1}. 2.3 Awakening and Solved Conditions An essential notion of constraint propagation is the propagation queue. This queue contains all the constraints whose reduction operators have to be applied. At each step of the propagation, a constraint is selected in the propagation queue, according to a given strategy depending on implementation (for example a constraint with more variables first). The reduction operators of the selected constraint are applied. These applications can make new domain reductions. When a variable domain is updated, the system puts in the queue all the constraints where this variable appears. When the queue becomes empty, a fix-point is reached and the propagation ends. Thus, there are three fundamental operations: selection from the queue, reduction of variable domains and awakening of constraints. It is actually not necessary to wake a constraint on each update of its variable domains. For example, it is irrelevant to wake the constraint x > y at each modification of Dx or Dy . The reduction operators of this constraint are unable to withdraw a value in any domain if neither the upper bound of Dx nor the lower bound of Dy is updated. Hence, it is sufficient to wake the constraint only when one of those particular modifications occurs. Definition 2.2 (Awakening condition). The awakening condition of a constraint C is a predicate depending upon the modifications of D|var(C) . This condition holds when a new value withdrawal can be made by the constraint reduction operators. The condition is optimal when it holds only when a new value withdrawal can be made. The awakening condition of C is denoted by awake cond(C). The actual awakening conditions are often a compromise between the cost of their computation and how many awakenings they prevent. Another condition type permits irrelevant awakenings to be prevented. Let us consider a constraint C; if the domains of its variables are such that no future value withdrawals can invalidate the constraint satisfaction, the constraint is said to be solved. In that case, the reduction operators of this constraint cannot make any new value withdrawal anymore, unless the system backtracks to a former point. For example, if the two domains Dx and Dy are such that Dx ∩ Dy = ∅, it is useless to apply the reduction operators of x 6= y. Thus, it is useless to wake a solved constraint. Prototyping clp(fd) Tracers 5 Definition 2.3 (Solved condition). The solved condition of a constraint C is a predicate depending upon the state of D|var(C) . This condition holds only when the domains are such that C is solved. The solved condition of C is denoted by solved cond(C). We can note that a sufficient condition is that all variables in var(C) are ground to some values satisfying the constraint. In the rest of the paper, a primitive constraint is defined by those three characteristics: its reduction operators, awakening condition and solved condition. 2.4 Structure of the Constraint Store The constraint store S is the set of all constraints taken into account by the computation at a given moment. When the computation begins, the store is empty. Then, constraints are individually added or withdrawn according to the control part. In the store, constraints may have different status and the store can be partitioned into five subsets denoted A, S, Q, T, R. • A is the set of active constraints. It is either a singleton3 (only one constraint is active) or empty (no constraint is active). The reduction operators associated to the active constraint will perform the reductions of variable domains. • S is the set constraints which are said suspended, namely they are waiting to be “woken” and put into Q in the case of domain modifications of some of their variable (none has empty domain). • Q is the set of constraints in the propagation queue 4 , it contains the constraints waiting to be activated. In order to reach the fix-point all reduction operators associated to these constraints must be considered. • T is the set of solved constraints (true), namely the constraints which hold whatever future withdrawals will be made. • R is the set of rejected constraints, i.e. the constraints for which the domain of at least one variable is empty. In practice it is empty or a singleton, since as soon as there is one constraint in R the store is considered as “unsatisfiable” and the computations will continue according to the control. 2.5 Propagation The evolution of the store can now be described as state transition functions or “events” acting in the store, in the style of Guerevitch’s evolving algebras [18]. This is illustrated in Figure 2. When propagation begins, there is an active constraint. The active constraint applies its reduction operators as far as possible. Each application of a reduction operator is a reduce event. It narrows the domain of one and only one variable. If a domain becomes empty, the constraint is rejected (reject event). A rejected constraint is a sign of failure. If no failure occurs and no other reduction can be made, the constraint is either solved (true) or suspended (suspend). A solved constraint will not be woken anymore. A suspended constraint will be woken as soon as its awakening condition holds. On awakening, the constraint is put in the propagation queue (wake-up event). When there is no active constraint, one is selected in the queue (select) and becomes active. If the queue is empty, the propagation ends. 3 This restriction could be alleviated to handle multiple active constraints, for example to handle unification viewed as equality constraints on Herbrand’s domains. 4 The term queue comes from standard usage. It is in fact a set. 6 WLPE’01 SELECT Q Queue WAKE−UP SUSPEND S A TELL Suspended constraints TOLD Active Constraint Solved TRUE T REJECT R constraints REDUCE Rejected constraints Store Figure 2: Events related to the structured store select ∃C ∈ Q ∧ A = ∅ ∧ R = ∅ Q ← Q − {C}, A ← {C} reject ∃C ∈ A, ∃x ∈ var(C) · (Dx = ∅) A ← A − {C}, R ← {C} wake-up reduce true suspend ∃C ∈ S · awake cond(C) ∧ R = ∅ S ← S − {C}, Q ← Q ∪ {C} ∃C ∈ A, ∃x ∈ var(C) · (Wx 6= ∅) ∧ R = ∅ Dx ← Dx − Wx ∃C ∈ A · solved cond(C) ∧ R = ∅ A ← A − {C}, T ← T ∪ {C} ∃C ∈ A ∧ R = ∅ A ← A − {C}, S ← S ∪ {C} Figure 3: Propagation events. tell(C) told Wx = Dx − redxC (D|var(C) ) Rule format : Name A=∅ push h{C}, S, Q, T, R, Di pop Figure 4: Control events Conditions Def initions Actions Prototyping clp(fd) Tracers 7 The propagation is completely defined by the rules given in Figure 3. The rules are applied in the order in which they are given (from top to bottom). Each rule specifies an event type. An event modifies the system state: hA, S, Q, T, R, Di. An event occurs when its pre-conditions hold and no higher-priority event is possible. The rule priority prevents redundant conditions. For example, a suspend event is made only when no true event is possible. In the same way, if a reduce event wakes some constraints, all wake-up events are performed before any other reduce. The rule system still contains some indeterminism: the choice of C in the rules select and wake-up, and the choice of x in the rule reduce depends on the solver strategy. The rules are applied until all the constraints are in T , R and S. No further application is possible. If R is non empty, the store is “rejected”. Otherwise, it may be considered that a (set of) solution(s) has been obtained. All constraints in T are already solved. Therefore, any tuple of values of V which satisfies the constraints in S is a solution. The way the computation will continue depends of the control. 2.6 Control The evolution of the store described so far assumes that the set of constraints in the store is invariant, i.e., only their status is modified. The host constraint programming language provides the way to build the store and to manage it, with possible interleaving of constraint management and propagation steps. In order to remain as independent as possible from the host language, we restrict the control part to two events: the first one adds a constraint C into the store (tell(C) event) and the second one restores the store and the domains in some previous state (told event). These events act on the store as illustrated in Figure 2. The tell event puts a new constraint in the store as the active one. In clp(fd) the control part is particularly simple and can be described by a (control) stack of states of the system 5 . The state contains the current store and the domains. The propagation phase is always performed in the state on top of the control stack. Each tell event includes a constraint into the store, push the new state on the stack and is followed by a complete propagation phase. When the fix-point is reached either a new tell(C ′ ) is performed, or a told. In the later case the stack is popped, thus the former state is restored. As long as the control stack is not empty, new tell events can be performed on choice points and correspond to alternative computations. This semantics is formalized by the two rules of Figure 4. The push and pop operations work on the control stack. With a different host language, the same told event could be used but with a possibly different meaning. 3 Trace Definition An execution is represented by a trace which is a sequence of events. An event corresponds to an elementary step of the execution. It is a tuple of attributes. Following the notation of Prolog traces, the types of events are called ports. Most attributes are common to all events. For some ports, specific attributes are added. For example, reduce events have two additional attributes: the withdrawn values Wx , for the 5 This corresponds to the description of the visit of a standard search-tree of Prolog [9]. 8 WLPE’01 variable x whose domain is reduced, and the types of updates made, such a modification of the domain upper bound. The attributes are as follows. Attributes for all events • chrono: the event number (starting with 1); • depth: the depth of the execution, starting with 0, it is incremented at each tell and decremented at each told; • port: the event type as presented in Sections 2.5 and 2.6: one of reduce, wake-up, suspend, true, reject, select, tell and told; • constraint: the concerned constraint, represented by a quadruple: • a unique identifier generated at its tell; • an abstract representation, identical to the source formulation of the program; • an concrete representation (e.g. diffN(X, Y, N) for X ## Y + N or X - N ## Y) ; • the invocation context, namely the Prolog goal from which the tell is performed. • domains: the value of the variable domains before the event occurs; • store: the content of the constraint store represented by the 5 components described in section 2.4. Each set of constraints is represented by a list of pairs (constraint identifier, external representation): • store A the set of active constraints; • store S the set of suspended constraints; • store Q the propagation queue; • store T the set of solved constraints; • store R the set of rejected constraints. Specific attributes for reduce events • withdrawn: The withdrawn domain • update: The list of updates, an update is of the form (variable -> type), where type can be one of ground, any, min, max, see Section 4 for further explanation; Specific attribute for wake-up events • cause: The verified part of the awakening condition The attributes are numerous and contain large chunks of information. Indeed, they aim at providing useful information to automatic trace analysis programs. The more contents the better. In a default display for users, only some attributes would be chosen. Furthermore, and as in Opium [12] the trace analysis will be mainly done on the fly, only the attributes relevant to a given analysis will be retrieved, and no trace will be stored. Therefore there is no a priori restriction on the number and size of attributes. Figure 5 shows the source code of program sorted(L). The program sorts three numbers between 1 and 3 in a very naive way. Following the convention of many systems, constraints operators are prefixed by a “#”. The figure also shows a trace of the execution. All events are listed but only with a few event attributes: the event number and port, the constraint concerned by the event and its variable domains. At reduce events, the variable whose domain is being reduced as well as the withdrawn values are added. The first two constraints are entered (tell) and suspended without any reduction (events #1 to #4). The tell of the third one, Y #> Z gives two value withdrawals, ‘1’ from Dy (#6) Prototyping clp(fd) Tracers 9 sorted([X, Y, Z]):[X, Y, Z] :: 1..3, % At the beginning, Dx = Dy = Dz = [1..3] X ## Y, X #>= Y, Y #> Z, % 3 constraints : x 6= y, x ≥ y and y > z labelling([X, Y, Z]). % labelling phase, with a “first fail” strategy 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 [1] [1] [2] [2] [3] [3] [3] [3] [3] [3] [3] [3] [4] [4] [4] [4] [4] [4] [4] [4] Tell Suspend Tell Suspend Tell Reduce Wake-up Reduce Suspend Select Reduce Suspend Tell Reduce Wake-up Wake-up True Select Reduce Wake-up X##Y X##Y X#>=Y X#>=Y Y#>Z Y#>Z X#>=Y Y#>Z Y#>Z X#>=Y X#>=Y X#>=Y X#=2 X#=2 X#>=Y X##Y X#=2 X#>=Y X#>=Y Y#>Z X:[1,2,3] X:[1,2,3] X:[1,2,3] X:[1,2,3] Y:[1,2,3] Y:[1,2,3] X:[1,2,3] Y:[2,3] Y:[2,3] X:[1,2,3] X:[1,2,3] X:[2,3] X:[2,3] X:[2,3] X:[2] X:[2] X:[2] X:[2] X:[2] Y:[2] Y:[1,2,3] Y:[1,2,3] Y:[1,2,3] Y:[1,2,3] Z:[1,2,3] Z:[1,2,3] Y[1] Y:[2,3] Z:[1,2,3] Z[3] Z:[1,2] Y:[2,3] Y:[2,3] X[1] Y:[2,3] X[3] Y:[2,3] Y:[2,3] Y:[2,3] Y:[2,3] Z:[1,2] Y[3] 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 [4] [4] [4] [4] [4] [4] [4] [4] [4] [4] [4] [4] [4] [4] [4] [4] [4] [3] [2] [1] True Select Reduce Reject Told Tell Reduce Wake-up True Select Reduce Wake-up True Select Reduce True Told Told Told Told X#>=Y X##Y X##Y X##Y X#=2 X#=3 X#=3 X##Y X#=3 X##Y X##Y Y#>Z X##Y Y#>Z Y#>Z Y#>Z X#=3 Y#>Z X#>=Y X##Y X:[2] X:[2] X:[2] X:[] X:[] X:[2,3] X:[2,3] X:[3] X:[3] X:[3] X:[3] Y:[2] X:[3] Y:[2] Y:[2] Y:[2] X:[3] Y:[2,3] X:[1,2,3] X:[1,2,3] Y:[2] Y:[2] Y:[2] Y:[2] X[2] X[2] Y:[2,3] Y:[2,3] Y:[2,3] Y[3] Z:[1,2] Y:[2] Z:[1,2] Z:[1,2] Z[2] Z:[1] Z:[1,2] Y:[1,2,3] Y:[1,2,3] chrono depth port constraint domains withdrawn update store_A store_Q = = = = = = = = = 14 4 REDUCE (4, X#=2, assign(var(1, X), 2), labelling([X, Y, Z])) [X::[2..3], Y::[2..3], Z::[1..2]] X::[3] [X->any, X->ground, X->max] [(4, X#=2)] store_S = [(2, X#>=Y), (3, Y#>Z), (1, X##Y)] [] store_T = [] store_R = [] chrono depth port constraint domains cause store_A store_Q = = = = = = = = 16 4 WAKE-UP (1, X##Y, diff(var(1, X), var(2, Y)), sorted([X, Y, Z])) [X::[2], Y::[2..3], Z::[1..2]] [X->ground] [(4, X#=2)] store_S = [(3, Y#>Z), (1, X##Y)] [(2, X#>=Y)] store_T = [] store_R = [] Figure 5: A trace of the execution of program sorted([X, Y, Z]), all events are present with attributes (event number, [depth], constraint C, D|var(C) ). Events #14 and #16 are displayed with all their attributes. 10 WLPE’01 and ‘3’ from Dz (#8). The first reduction modifies the lower bound of Dy and so wakes the suspended constraint X #>= Y (#7). After those two reductions the constraint is suspended and the waiting one is selected (#10). At event #12, the domains are Dx = {2, 3}, Dy = {2, 3} and Dz = {1, 2}. Then the labelling phase begins. With our simple “first fail” strategy, the first added constraint is X #= 2. X is ground and equal to 2 and this constraint is solved (#17). Two other constraints are solved during the propagation, but it leads to Dy = {3}, Dz = {1, 2} and an empty domain for X (#25). Another labelling constraint is tried (#26), X #= 3 and leads to the unique solution {X:3, Y:2, Z:1}. 4 Deriving a Tracer from the Operational Semantics In order to experimentally validate the trace defined in Section 3, we derive, from the operational semantics of Section 2, a clp(fd) interpreter in Prolog that we instrument with trace hooks. The resulting interpreter, which produces traces, is not meant to be an efficient clp(fd) system, but to be faithful to the semantics of Section 2. The faithfulness comes from the fact that the translation of the semantic rules into executable Prolog code is syntactical. In Section 2, we left the primitive constraints undefined. We therefore first propose a definition for 8 primitive constraints by specifying, for each, its reduction operators, its solved condition, and its awakening condition. Note that the definitions we propose in Table 1 define reduction operators that perform a full-arc consistency. Then, we show how to translate the primitive constraints and the semantic rules into Prolog. We also show how to interface this Prolog code with the Prolog underlying system. 4.1 Primitive Constraint Definitions In order to define a primitive constraint, we need to define its reduction operators, its solved condition, and its awakening condition (see Section 2). We define in Table 1 the 8 primitive constraints x = y, x 6= y, x = y + n, x 6= y + n, x > y, x ≥ y, x = n, and x 6= n, where x and y represent two finite domain variables, and n represents an integer constant. The reduction operator redxC is defined by the set of values Wx it withdraws from the domain of variable x. The equality constraint between two variables x and y (x = y) withdraws from the domains of Dx and Dy the values which are not contained in both domains. The constraint is solved only when the two variables are ground and have the same value v. At each modification of Dx or Dy , the reduction operators may withdraw new values. The constraints must therefore be woken at each of their modification. The difference constraint between two variables x and y (x 6= y) can only reduce the domains when one of them is ground. However, it is solved as soon as the two domains are disjoint. 4.2 Data Structures A constraint variable is represented by a term containing a unique integer, and a string (its name in the source). A constraint instance is represented by a quadruple containing a unique constraint number, a string (the constraint as displayed in the source, i.e., its abstract representation), an internal (concrete) form, a list of constraint variables, and an invocation context. The invocation context of a constraint is the Prolog goal from which it was invoked. Prototyping clp(fd) Tracers Constraint C x=y Wx Wy Wx x 6= y Wy x=y+n x 6= y + n x>y x≥y x=n x 6= n Reduction operators (redxC (D|var(c) ) = Dx − Wx ) = Dx − (Dx ∩ Dy ) =D  y − (Dx ∩ Dy ) {v} ∩ Dx if Dy = {v} = otherwise  ∅ {v} ∩ Dy si Dx = {v} = ∅ otherwise Wx = Dx − (Dx ∩ {v + n, v ∈ Dy }) Wy = Dy − (Dx ∩ {v + n, v ∈ Dy })  {v + n} ∩ Dx if Dy = {v} Wx = otherwise  ∅ {v − n} ∩ Dy if Dx = {v} Wy = ∅ otherwise Wx = {v ∈ Dx , v ≤ miny } Wy = {v ∈ Dy , v ≥ maxx } Wx = {v ∈ Dx , v < miny } Wy = {v ∈ Dy , v > maxx } Wx = D  x − {n} {n} if n ∈ Dx Wx = ∅ otherwise 11 Solved condition solved cond(C) Awakening cond. awake cond(C) Dx = Dy = {v} xany ∨ yany Dx ∩ Dy = ∅ xground ∨ yground Dx = {vx } ∧ Dy = {vy } ∧ vx = vy + n xany ∨ yany ∀v ∈ Dy , v+n 6∈ Dx xground ∨ yground minx > maxy xmax ∨ ymin minx ≥ maxy xmax ∨ ymin Dx = {n} n∈ / Dx Table 1: Characteristics of the primitive constraints implemented in the interpreter The solver state is represented by a sextuplet: (A, S, Q, T, R, D), where A, S, Q, T and R define the store as described in Section 2; they are lists of constraints. D is a list of domains. In order to represent awakening conditions and domain narrowing, we define five types of domain modifications (following what is done in Eclipse [14]). Each type refers to a particular constraint variable x. • xmin refers to a modification of the Dx lower bound, e.g., {1, 2, 4} → {2, 4}; • xmax refers to a modification of the Dx upper bound, e.g., {1, 2, 4} → {1, 2}; • xany refers to any modification of Dx , e.g., {1, 2, 4} → {1, 4}; • xground refers to a grounding of x (Dx becomes a singleton), e.g., {1, 2, 4} → {1}; • xempty refers to an emptying of Dx , e.g., {1, 2, 4} → ∅ Those five modification types respectively appear in the code as X->min, X->max, X->any, X->ground, and X->empty. Awakening conditions are disjunctions of such modification types; such disjunctions are encoded by lists. 4.3 Translation of the Primitive Constraints The reduction operators, the solved condition, and the awakening condition defining a primitive constraint are encoded by the following predicates: • cd reduction(+C, +D, +X, -Wx)6 : takes as input a constraint C, a domain state D, and a constraint variable x; it succeeds iff the application of redxC (D|var(C) ) withdraws a non-empty set (bound to Wx). There is one clause per reduction operator of C; 6 As specified in the standard Prolog [9], + denotes input arguments and - denotes outputs arguments. 12 1 2 3 4 5 6 7 8 WLPE’01 cd_reduction(diff(X,Y),D,Y,[Vx]) :is_ground(X,D,Vx), get_domain(Y,D,Dy), member(Vx, Dy). cd_reduction(diff(X,Y),D,X,[Vy]) :is_ground(Y,D,Vy), get_domain(X,D,Dx), member(Vy,Dx). 9 10 11 12 13 14 15 cd_awake(diff(X,Y),Cond) :Cond = [X->ground,Y->ground]). cd_solved(diff(X,Y),D) :get_domain(X,D,Dx), get_domain(Y,D,Dy), d_intersection(Dx,Dy,[]). Figure 6: Definition of the primitive constraint x 6= y: its two reduction operators, its solved condition, and its awakening condition, as specified in Table 1. • cd solved(+C, +D): takes as input a constraint C and a domain state D; it succeeds iff the constraint C is solved in the domain state D; • cd awake(+C, -Cond): takes as input a constraint C and outputs (in Cond) the list of awakening conditions of C. Figure 6 shows the implementation of the primitive constraint x 6= y which is simply a Prolog encoding of the first entry of Table 1. The functor diff/2 is the internal encoding of 6=. Predicate is ground(+X, +D, -Vx) takes a constraint variable x and a domain D, and succeeds iff Dx is a singleton (bound to Vx); get domain(+X, +D, -Dx) takes a constraint variable x and a domain state D, and outputs the domain of x (Dx ); d intersection(+D1, +D2, -D) computes the intersection of two domains. 4.4 Translation of the Semantic Rules Figure 7 contains the translation of the semantic rules of Figures 3 and 4. Each rule is encoded by a predicate with the same name as the rule. The translation is merely syntactical, except for the tell and told rules, for which it is unnecessary to save and restore the solver states (push and pop) since this work is done by the Prolog backtracking mechanism. Before paraphrasing the code for one rule, we give the meaning of all the (simple) predicates that are not defined elsewhere in the paper: choose in queue(+Q0, -C) takes as input a queue Q and outputs one of the queue constraints ; it succeeds iff Q is not empty. The choice of the constraint depends of the solver strategy; subtract(+L1, +L2, -L) computes the difference between two lists; get varC(+C, -V) takes as input a constraint C and outputs a list of the constraint variables that appear in C; trace(+Port, +C, +St0, +O1, +O2, +O3) takes as input the different event attributes as described in Section 3; it calls the trace analysis system which can, for example, print a trace line; put end of queue(+C, +Q0, -Q) puts a constraint at the end of a queue; update domain(+X, +Wx, +D0, -D, -Mod) takes as input a constraint variable x, a value set Wx (to withdraw), and a domain state D 0 ; it outputs the state domain D such that Dx = Dx0 − Wx , and the list of modification types xmod1 , ..., xmodn (where modi ∈ {min, max, ground, any, empty}) that characterizes the Wx value removals; internal(+C, -Ci) takes as input a constraint and outputs its internal representation. All the predicates translating rules take as input a solver state St0 and output a new solver state St. St0 and St respectively denote the state of the solver before and after the application of a rule. The only exceptions are predicates wake up(+St0, -St, +ModIn) and reduce(+St0, -St, -ModOut) that respectively inputs and outputs an additional argument: Prototyping clp(fd) Tracers 13 a list of modification types (xmod1 , ..., xmodn ). This list is computed in reduce/3 and used in wake up/3 to check the awakening condition. Predicate select(+St0, -St) translates the select rule. That rule needs to fulfill 3 conditions to be allowed to be applied: ∃C ∈ Q, that is checked line 17 by choose in queue/2 (which fails iff the queue is empty); A = ∅ and R = ∅ that are checked line 15. The 2 actions to perform when the conditions of the rule hold are Q ← Q − {C}, which is done line 18 by subtract/3, and A = {C} which is done line 16. The other rules are translated in the same way. 4.5 Integration with the Underlying Prolog System The integration of our instrumented constraint solver with the underlying Prolog system is done by the predicate call constraint/3 which is given in Figure 8. After propagation and success, it returns the new state of the constraint part (St). If the propagation leads to a failure, the goal fails. Predicate prop step/4 performs a propagation step, i.e., it applies one of the 6 propagation rules of Figure 3; it fails if no rule can be applied. The choice of the rule to apply is done according to the strategy discussed in Section 2.5. Predicate propagation/3 calls prop step/4 in loop until either a propagation step fails (the fix-point is reached) or the solver rejects a constraint (the constraint goal is unsatisfiable). 5 Experimentation We have made some preliminary experiments of trace analysis with our tracer. A first experiment consists in displaying the labelling (or search-) tree. The analyzed program solves the well known n-queens problem. Figure 9 shows a search-tree obtained for the 4-queens problem by trace analysis of a trace generated by our meta-interpreter, and displayed with dot [22]. Each variable corresponds to a row of the chess-board. The top node of the displayed tree contains the initial domains, the other nodes contain the reduced domains if any. The tree shows four failures in square boxes, two solutions and three choice points. The uppest arc sums up the tell operations for all permanent constraints of the programs. Each other arc represents a labelling constraint addition. The trace analysis uses only the tell, told, reduce events. Few attributes were needed: the port, the concerned constraint and the domains of constraint variables. For reduce events, the updated variable and the withdrawn set were also needed. The sequence of tell and told events in the trace corresponds to a depth-first left-toright visit of the search-tree where tell and told events respectively correspond to downward and upward moves in the search-tree. Reconstructing a tree from its visit (for a fixed visit strategy) is easy. In Figure 9, we took advantage of reduce events to label the nodes with the propagation results. A second experiment is the generation of a 3D variable update view [29]. The evolution of the domains of the variables during the computation is displayed in three dimensions. It gives a tool à la TRIFID [5] (here however colors are introduced to display specific events as in the variable update view of [28]). The trace analyzer makes a VRML file by computing domain size on each tell and reject event, and when a solution is found. The details of reduce 14 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 WLPE’01 tell(C, St0, St) St0 = ( [], S, St = ([C], S, trace(tell, C, :Q, T, R, D), Q, T, R, D), St0, -, -, -). told(C, St0) :trace(told, C, St0, -, -, -). select(St0, St) :St0 = ( [], S, Q0, T, [], D), St = ([C], S, Q, T, [], D), choose_in_queue(Q0, C), subtract(Q0, [C], Q), trace(select, C, St0, -, -, -). reject(St0, St) :St0 = ([C], S, Q, T, [], D), St = ( [], S, Q, T, [C], D), get_varC(C, VarC), member(X, VarC), get_domain(X, D, []), trace(reject, C, St0, -, -, -). wake_up(St0, St, ModIn) :St0 = (A, S0, Q0, T, [], D), St = (A, S, Q, T, [], D), member(C, S0), awake_cond(C, ModIn, True), subtract(S0, [C], S), put_end_of_queue(C, Q0, Q), trace(wake_up, C, St0, True, -, -). 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 reduce(St0, St, ModOut) :St0 = ([C], S, Q, T, [], St = ([C], S, Q, T, [], get_varC(C, VarC), member(X, VarC), reduction(C, D0, X, Wx), update_domain(X, Wx, D0, trace(reduce, C, St0, X, true(St0, St) :St0 = ([C], S, St = ( [], S, solved_cond(C, T = [C|T0], trace(true, C, D0), D), D, ModOut), Wx, ModOut). Q, T0, [], D), Q, T, [], D), D), St0, -, -, -). suspend(St0, St) :St0 = ([C], S0, Q, T, [], D), St = ( [], S, Q, T, [], D), S = [C|S0], trace(suspend, C, St0, -, -, -). reduction(C, D, X, Wx) :internal(C, Ci), cd_reduction(Ci, D, X, Wx). awake_cond(C, ModIn, True) :internal(C, Ci), cd_awake(Ci, Cond), intersection(Cond, ModIn, True), not True = []. solved_cond(C, D) :internal(C, Ci), cd_solved(Ci, D). Figure 7: Prolog translation of the semantic rules of Figures 3 and 4 Prototyping clp(fd) Tracers 1 2 3 4 5 6 7 8 9 10 11 12 15 13 14 15 16 17 18 19 20 21 call_constraint(C, St0, St) :tell(C, St0, St1), propagation(none, St1, St), ( true ; told(C, St), fail ), St = (_, _, _, _, [], _). propagation(Mod0, St0, St) :prop_step(St0, St1, Mod0, Mod) -> ( St1 = (_, _, _, _, [], _) -> propagation(Mod, St1, St) ; St = St1 ) ; St = St0. prop_step(St0, St, Mod0, Mod) select(St0, St) -> Mod = ; reject(St0, St) -> Mod = ; wake_up(St0, St, Mod0) -> Mod = ; reduce(St0, St, Mod) -> true ; true(St0, St) -> Mod = ; suspend(St0, St) -> Mod = :none none Mod0 none none. Figure 8: Integrating the constraint solver with the underlying Prolog system A::[1..4] B::[1..4] C::[1..4] D::[1..4] A##B A##C A##D B##C B##D C##D A+1##B A-1##B A+2##C A-2##C A+3##D A-3##D B+1##C B-1##C B+2##D B-2##D C+1##D C-1##D A#=1 A -> 1 B -> [3..4] C -> [2, 4] D -> [2..3] B#=3 B#=4 D -> 2 B -> 4 C -> 4 D -> 3 B -> [] C -> [] A -> 2 B -> 4 C -> 1 D -> 3 A#=2 A#=3 A -> 3 B -> 1 C -> 4 D -> 2 A#=4 A -> 4 B -> [1..2] C -> [1, 3] D -> [2..3] B#=1 B#=2 B -> 1 B -> 2 C -> 3 D -> 3 D -> [] C -> [] Figure 9: A search-tree of a 4-queens constraint program execution, obtained by trace analysis, and displayed by dot. 16 WLPE’01 Figure 10: Comparing two search procedures for the 40-queens problem with VRML views computed by trace analysis. events allow us to assign color to each kind of domain update (for example minimum or maximum value removed or domain emptied) as made by Simonis and Aggoun in the Cosytec Search-Tree Visualizer [28]. The trace analysis is implemented in about 125 lines of Prolog and generates an intermediate file. A program implemented in 240 lines of C converts this file into VRML format. Figure 10 shows the resolution of the 40-queens problem with two different labelling strategies. We have three axes: variables (horizontal axis of the vertical “wall”), domain size (vertical axis) and time. The first strategy is a first-fail selection of the labelled variable and the first value tried is the minimum of its domain. The second strategy is also a first-fail strategy but variable list is sorted with the middle variable first and the middle of domain is preferred to its minimum. This strategy derives from one described by Simonis and Aggoun [28]. This approach allows to compare the efficiency of these two strategies by manipulating the 3Dmodel. With the first strategy, we get a quick decreasing of the domain size on one side of the chess-board and a long oscillation of the domain size on the other side. With the second strategy, the decreasing of domain size is more regular and more symmetrical, the solution is found faster. In fact, the second strategy, which consists in putting the queens from the center of the chess-board, benefits more from the symmetrical nature of the problem. The possibility of moving manually the figure facilitates observation of such property. 6 Discussion and Conclusion This article is a first attempt to define new ports for tracing finite domain solvers. We do not claim that the trace model presented here is the ultimate one. On the contrary we propose a methodology to experiment and to improve it. This methodology is based on the following steps: definition of an executable formal model of trace, extraction of relevant informations by a trace analyzer, utilization of the extracted informations in several debugging tools. Each debugging tool extracts from the same generic trace the information it needs. The formal approach of trace modeling used here allows to clearly define the ports. Then the implementation of the model by a meta-interpreter almost written in ISO-Prolog, a logic programming language with a clear semantics, allows to preserve its correctness wrt the formal model. This methodology is efficient enough on small examples and therefore is of practical interest. However to handle large realistic examples will require hard-coded implementation Prototyping clp(fd) Tracers 17 of the trace model. Different aspects must be examined to estimate the results. First the formal model itself. Two ports are directly related to logic programming (tell and told) and correspond to the well-known ports call and exit of [3], the others correspond to a small number of different steps of computation of the reduction operator fix-point. On the other side we defined a great number of (possibly large sized) attributes to ensure that each event carries enough potentially useful informations. This immediately shows the limits of our model: it is probably general enough to take into account several finite domain solvers, but tracing the complete behavior of different solvers will require new or different ports to take into account different kinds of control, specific steps of computation (e.g. constraint posting, labelling phase, . . . ), or different algorithms. The proposed methodology shows the way to progress: defining the trace with a formal model makes easier to compare different trace models. It is thus easier to see which are the missing ports or attributes. Some solvers use a propagation queue with events instead of constraints (in this case new ports or same ports but with different attributes are necessary), or do not use backtracking (then told is never used). The question is also to find the right balance between the number of events and the attributes, in such a way that a hard-coded efficient implementation of (a part of) the trace model is still possible. For example the attribute withdrawn of the port reduce concerns one variable only. Therefore if several variables are involved by a single reduction step, there will be several reduce events. Another possibility would be to have a unique event with a port whose withdrawn attribute includes several variables at once. Gathering too many informations in one event may slow down the tracer considerably. The trace production must be as fast as possible in order to keep the best performances of the solver. The ports and attributes presented here seem to be a good basis to start the study of a generic trace for clp(fd). In [8] a sample of additional ports are suggested to cope with different finite domain solvers. The second aspect concerns the extraction of tool specific relevant informations. The generic trace, by definition, contains too many informations if used by a unique debugging tool only. It is also not intended to be stored in a huge file, but it should be filtered on the fly and re-formatted for use by some given tool. The methodology we proposed here, à la opium, is well-known and has been shown to be efficient and general enough to be used in practice also in hard-coded implementations. It allows to specify the trace analysis in a high level language (here Prolog) in a way which is independent from the trace production. For each experimented tool we have presented here there is a specific analyzer which needs only few lines of code. With this approach, building different views of the same execution requires only to modify the trace analyzer. Notice that the implementation presented here assumes that there is only one trace analyzer running in parallel with the solver. The question of how different analyzers, working simultaneously, could be combined is not considered here. Finally the third aspect concerns the experimentation. The main challenge in constraint debugging is performance debugging. Our objective is to facilitate the development of constraint resolution analysis tools in a manner which is as independent as possible from the solvers platforms. The three steps method (generic tracer/trace analyzer/debugging tool) is a way to approach such a goal. We experimented it by building several analyzers and (limited) tools very easily, without having to change the trace format. Of course much more experiences are still needed. Another way to estimate the results of this article is to consider some of the existing 18 WLPE’01 debugging tools and to observe that most of the informations relevant for each of these tools are already present in the ports and their attributes. Here are briefly reviewed some platform independent tools7 , namely debugging tools using graphical interfaces where labelling, constraints and propagation can be visualized. The Search-Tree Visualization tool for CHIP, described by Simonis and Aggoun [28] displays search-trees, variables and domain evolution. The whole of this information is present in the proposed ports. Our experimentation shows that search-tree and constraints can easily be displayed. The relevant information is also present for the Oz Explorer, a visual programming tool described by Schulte [27], also centered on the search-tree visualization with user-defined displays for nodes. It is also the case in the search-tree abstractor described by Aillaud and Deransart [1] where search-tree are displayed with constraints at the nodes. In Grace, a constraint program debugger designed by Meier [25], users can get information on domain updates and constraint awakenings. This is available in our trace via our 8 ports. Grace also provides the ability to evaluate expressions using the current domain of the variables. As the domain of the variables is an attribute of all events, it can be obtained by any analyzer of our trace. The CHIP tool also provide update views in which, for example, useless awakenings are visible. In our environment useless awakenings could be detected by a select not followed by a reduce. The visualization tool by Carro and Hermenegildo [5] traces the constraint propagation in 3 dimensions according to time, variable, and cardinal of the domain. The required information is present in our trace. The S-boxes of Goualard and Benhamou [17] structure the propagation in and the display of the constraint store. Structuring the propagation requires to modify the control in the solver. Displaying the store according to the clausal structure would however cause no problem. An important aspect, not presented in this paper, concerns the possibility of interactive tools. This means that some debugging tools may request to re-execute some already traced execution. Special mechanisms must be involved in order to re-execute efficiently and with the same semantics some part of the execution. How such capability may influences the form of the generic trace is still an open question and will be further investigated. References [1] C. Aillaud and P. Deransart. Towards a language for clp choice-tree visualisation. In Deransart et al. [10], chapter 8. [2] F. Benhamou. Interval constraint logic programming. In A. Podelski, editor, Constraint Programming: Basics and Trends, pages 1–21. Springer-Verlag, Lecture Notes in Computer Science 910, 1994. [3] L. Byrd. Understanding the control flow of Prolog programs. In S.-A. Tärnlund, editor, Logic Programming Workshop, Debrecen, Hungary, 1980. [4] M. Carro and M. Hermenegildo. Tools for search-tree visualisation: The apt tool. In Deransart et al. [10], chapter 9. [5] M. Carro and M. Hermenegildo. The vifid/trifid tool. In Deransart et al. [10], chapter 10. 7 They are considered as (clp(fd)) platform independent tools in the sense that they are focused on general properties of finite domain solving: choice-tree, labelling, variables domain evolution. Prototyping clp(fd) Tracers 19 [6] Y. Caseau, F.-X. Josset, and F. Laburthe. Claire: combining sets, search and rules to better express algorithms. In D. De Schreye, editor, Proc. of the 15th Int. Conference on Logic Programming, pages 245–259. MIT Press, 1999. [7] Cosytec. CHIP++ Version 5.2. documentation volume 6. http://www.cosytec.com, 1998. [8] Romuald Debruyune, Jean-Daniel Fekete, Narendra Jussien, Mohammad Ghoniem, Pierre Deransart, Ludovic Langevine, and e al. A proposal of concrete format for fracing constraint programming (based on a dtd xml), October 2001. Deliverable D2.2.2.1 (in French). [9] P. Deransart, A. Ed-Dbali, and L. Cervoni. Prolog, The Standard; Reference Manual. Springer Verlag, April 1996. [10] P. Deransart, M. Hermenegildo, and J. Maluszyński, editors. Analysis and Visualisation Tools for Constraint Programming. Number 1870 in LNCS. Springer Verlag, 2000. [11] M. Ducassé. Abstract views of Prolog executions with Opium. In P. Brna, B. du Boulay, and H. Pain, editors, Learning to Build and Comprehend Complex Information Structures: Prolog as a Case Study, Cognitive Science and Technology, chapter 10, pages 223–243. Ablex, 1999. [12] M. Ducassé. Opium: An extendable trace analyser for Prolog. The Journal of Logic programming, 39:177–223, 1999. Special issue on Synthesis, Transformation and Analysis of Logic Programs, A. Bossi and Y. Deville (eds). [13] M. Ducassé and J. Noyé. Logic programming environments: Dynamic program analysis and debugging. The Journal of Logic Programming, 19/20:351–384, May/July 1994. [14] ECLiPSe. Constraint icparc.doc.ic.ac.uk/eclipse/. logic programming system. http://www- [15] G. Ferrand, W. Lesaint, and A. Tessier. Value withdrawal explanation in CSP. In M. Ducassé, editor, AADEBUG’00 (Fourth International Workshop on Automated Debugging), pages 188–201, 2000. The COmputer Research Repository (CORR) cs.SE/0012005. [16] GNU-Prolog. A clp(fd) system based on Standard Prolog (ISO) developed by D. Diaz. http://gprolog.sourceforge.net/ Distributed under the GNU license. [17] F. Goualard and F. Benhamou. Debugging Constraint Programs by Store Inspection. In Deransart et al. [10], chapter 11. [18] Y. Gurevitch. Evolving algebras, a tutorial introduction. Bulletin of the European Association for Theoretical Computer Science, 43:264–284, 1991. [19] E. Jahier. Collecting graphical abstract views of Mercury program executions. In M. Ducassé, editor, Proceedings of the International Workshop on Automated Debugging (AADEBUG2000), Munich, August 2000. The COmputer Research Repository (CORR) cs.SE/0010038. 20 WLPE’01 [20] E. Jahier, M. Ducassé, and O. Ridoux. Specifying Prolog trace models with a continuation semantics. In K.-K. Lau, editor, Proc. of LOgic-based Program Synthesis and TRansformation, London, July 2000. Springer-Verlag, Lecture Notes in Computer Science 2042. [21] N. Jussien and V. Barichard. The PaLM system: explanation-based constraint programming. In Proceedings of TRICS: Techniques foR Implementing Constraint programming Systems, a post-conference workshop of CP 2000, pages 118–133, Singapore, September 2000. [22] E. Koutsofios and S. North. Drawing graphs with dot. TR 910904-59113-08TM, AT&T Bell Laboratories, 1991. [23] Ludovic Langevine, Pierre Deransart, Mireille Ducasse, and Ewan Jahier. Tracing and analyzing execution of clp(fd) programs: a trace model and an experimental validation environment. Rr, INRIA, Novembre 2001. Full version of this paper, Public Deliverable D1.2.1, to appear as INRIA/IRISA Research report. http://contraintes.inria.fr/OADymPPaC/. [24] K. Marriott and P.J. Stuckey. Programming with Constraints: An Introduction. The MIT Press, Cambridge, Massachussets, 1998. [25] M. Meier. Debugging constraint programs. In U. Montanari and F. Rossi, editors, Proceedings of the First International Conference on Principles and Practice of Constraint Programming, number 976 in LNCS, pages 204–221. Springer Verlag, 1995. [26] INRIA-Rocquencourt, EMN-Nantes, INSA-Rennes, University of Orléans, Cosytec, and ILOG. Tools for dynamic analysis and development of constraint programs (OADymPPaC), November 2000. An RNTL French Project. http://contraintes.inria.fr/OADymPPaC. [27] C. Schulte. Oz Explorer: A Visual Constraint Programming Tool. In Proceedings of the Fourteenth International Conference on Logic Programming (Iclp’97), pages 286–300, Leuven, Belgium, June 1997. The MIT Press. [28] H. Simonis and A. Aggoun. Search-Tree Visualisation. In Deransart et al. [10], chapter 7. [29] R. Zoumman. Analyse du comportement du solveur de contraintes basée sur la visualisation de traces (in French). Rapport de stage, INRIA, 2001.
6cs.PL
EasyTime++: A case study of incremental domain-specific language development Iztok Fister Jr.,∗ Tomaž Kosar,† Iztok Fister,‡ and Marjan Mernik§ Abstract EasyTime is a domain-specific language (DSL) for measuring time during sports competitions. arXiv:1303.0722v1 [cs.PL] 4 Mar 2013 A distinguishing feature of DSLs is that they are much more amenable to change, and EasyTime is no exception in this regard. This paper introduces two new EasyTime features: classifications of competitors into categories, and the inclusion of competitions where the number of laps must be dynamically determined. It shows how such extensions can be incrementally added into the base-language reusing most of the language specifications. Two case studies are presented showing the suitability of this approach. To cite paper as follows: I. Jr. Fister, T. Kosar, I. Fister, M. Mernik, EasyTime++: A case study of incremental domain-specific language development. Information technology and control, 42(1), 77–85, 2013. ∗ University of Maribor, Faculty of electrical engineering and computer science Smetanova 17, 2000 Maribor; Electronic address: [email protected] † University of Maribor, Faculty of electrical engineering and computer science Smetanova 17, 2000 Maribor; Electronic address: [email protected] ‡ University of Maribor, Faculty of electrical engineering and computer science Smetanova 17, 2000 Maribor; Electronic address: [email protected] § University of Maribor, Faculty of electrical engineering and computer science Smetanova 17, 2000 Maribor; Electronic address: [email protected] 1 I. INTRODUCTION Domain-specific languages (DSLs) are languages tailored to specific application domain [1–4]. They offer substantial gains regarding expressiveness and ease of use compared with general-purpose languages (GPLs) within their domain of application [5–7]. However, DSLs are more amenable to changes [1, 8] since stakeholders’ requirements frequently change. In order to design and implement DSLs more easily, we need to develop fully modular, extensible, and reusable language descriptions, whilst some of the descriptions could even be inferred from DSL programs [9, 10]. The language designer wants to include new language features incrementally as the programming language evolves. Ideally, a language designer would like to build a language simply by reusing different language definition modules (language components), such as modules for expressions, declarations, etc., as well as to extend previous language specifications. In the case of general software development the use of object-oriented techniques and concepts like encapsulation and inheritance, greatly improves incremental software development, whilst reusability is even further enhanced using aspectoriented techniques [11]. The object-oriented, as well as the aspect-oriented techniques and concepts, have also been integrated into programming language specifications [12, 13] making new features more easily implemented. One of such tools, where object-oriented and aspect-oriented concepts have been incorporated, is the LISA tool [8, 14]. This paper shows how LISA is used within the incremental development of EasyTime DSL, which has been developed recently for measuring time at different sports competitions (e.g., triathlon, cycling) [15, 16]. EasyTime DSL has already proved to be successful when used at real sport events (e.g., World Championship in the double ultra triathlon in 2009, National (Slovenian) Championship in the time-trials for cycles in 2010), so the requirements are changing quickly. Recent extensions to EasyTime have included the possibility of classifying competitors into different categories, where the number of laps is different for each category, and the inclusion of competitions where the number of laps can be dynamically determined during a competition (e.g., biathlon, where the number of extra laps depends on missed shots). The objective of this paper is to introduce EasyTime++ DSL, which supports these new extensions, as well as to show how such an extension can be incrementally developed using the introduced LISA tool. The structure of this paper is as follows: in Section II an overview of the language 2 composition is presented. Section III briefly introduces EasyTime DSL, whilst the core of this paper is Section IV, which describes how the extensions in EasyTime++ have been specified and implemented. Some examples are presented in Section V. The paper is concluded with Section VI, where a brief overview and word about future work is described. II. RELATED WORK Several kinds of language composition have been identified in the literature [8, 17–24]. In their recent paper [17], Erdweg et al., point out that language composition has obtained little attention, that it is still insufficiently understood, and that the terminology is confusing thus indicating that the research is inadequate, as yet. Erdweg et al. identified the language composeability not as a property of languages themselves, but as a property of language definition (e.g., how language specifications can be composed together). The following types of language composition have been distinguished in [17]: language extension (which subsumes also language restriction), language unification, self-extension, and extension composition. In language extension the specifications of base language B are extended with a new language specification fragment E, which typically makes little sense when regarded independently from the base language B. Hence, language B is a dominant language, which can be a DSL or a GPL, and serves as a base for other languages. Language extension, as a kind of language composition, is denoted as B / E indicating that the base language B has been extended with the language E. The LISA tool supports language extensions when single attribute grammar inheritance [8] is employed. As is shown in Section IV, EasyTime++ is a language extension over the base language EasyTime (EasyTime / EasyTime++). In language unification the composition of language specifications is not based on the dominance of one language, but is based on equal terms. The dominance of one language over another does not exist and both language specifications are complete and standalone (note that in the case of language extension the language specifications for the extended part makes little sense alone). Language unification, as a kind of language composition, is denoted as L1 ]g L2 , describing the language composition of languages L1 and L2 using a glue code g. Since LISA supports multiple attribute grammar inheritance [8], language unification is easily achieved by inheriting both language specifications (from L1 and L2 ), where the glue code is specified as a new language specification fragment. In self-extension the language specifications do 3 not change. The language itself is powerful enough for new extensions to be implemented using macros, function composition, and libraries that provide domain-specific constructs. This form of language composition is called ’pure language embedding’ [3]. Functional languages are these languages particularly suitable for self-extension. Self-extension, as a kind of language composition, is denoted as H ← E indicating that the host language H has been self-extended with the embedded language E. The last form of language composition is extension composition, which describes how language specifications also support the combination of various language compositions. That is showing how different compositions can work together. This kind of language composition can also be described as high-order language composition. Language unification allows for such higher-order composition per se (e.g., L1 ]g (L2 ]h L3 )). Whilst some other useful examples of higher-order language composition like (B / E1 ) / E2 , and B / (L1 ]g L2 ) can not always be easily achieved. Extension compositions involving language extension and language unification can also be easily achieved in the LISA tool. TA 1 CP 0 RUN BIKE SWIM TA 2 3.8 km 180 km 42 km 4x 0.95 4x 45 8x 5.25 CP 1 CP 2 MP 1 CP 3 CP 4 CP 5 CP 6 MP 3 MP 2 CP 7 CP 8 MP 4 FIG. 1: Measuring time in Ironman triathlon. In addition to LISA, which has been in existence since 1999, there are also other similar tools (e.g., Phobos [18], JastAdd [19], Silver [20], XMF [21], Tatoo [22], MontiCore [23], JAYCO [25], UUAG [26]) that enable various language compositions. Note, that the most well-known tools for syntax and the semantic specification of programming languages, Lex and Yacc [27], don’t support language composition per se. For example, language extension is possible by manually changing base language specifications B by invasively adding the specification for extended language E. Hence, change is done in a non-disciplined manner, thus prohibiting further reuse of specifications. On the other hand, language composition 4 can be done on top of Lex and Yacc (e.g., [28]). Here, it is desirable to briefly mention JastAdd [19] and Silver [20], since both are based on Attribute Grammars, as in the LISA case. JastAdd [19] is centered around object-oriented representation of the abstract syntax tree (AST). Non-terminals act as abstract super classes and productions act as specialized concrete subclasses that specify the syntactic structure, attributes, and semantic rules. All these elements can be inherited, specialized, and overridden within subclasses. The idea of aspect-orientation in JastAdd is to define each aspect of the language in a separate class and then weave them together at appropriate places. The JastAdd system is a class weaver: it reads all the JastAdd modules and weaves the fields and methods into the appropriate classes during the generation of the AST classes. Developers have the possibility of combining various language specifications following the separation of different language aspects amongst different classes. Silver [20] uses a concept called ’forwarding’ to achieve modular language extensions, where the extension construct is translated into semantically equivalent constructs within the host language. Hence, forwarding only allows those new constructs that can be expressed as a combination of existing language constructs. Additional Silver features like: with-clause, auto-copying of inherited attributes, collection attributes, pattern matching, and type-safe polymorphic lists, allow for the host language to be extended in a more flexible manner, although still restrictive. III. EASYTIME EasyTime was developed for measuring time during Double ultra triathlon in 2009. At that time, the organizers of this competition were confronted with the problem of how to measure the times of competitors within three disciplines using a limited number of measuring devices. Besides this limitation, measures needed to be reliable and accurate, especially, because of its long duration. Although the measuring time for the triathlon was our first specific task, the goal was to develop a DSL for measuring time for any competition. A domain analysis was performed [15] using feature diagrams [29] with the aim of identifying common and variable concepts, their relations, and structure of particular concepts. In the case of EasyTime, the concept race consists of sub-concepts: events (e.g., swimming, cycling, and running), control points (starting and finishing lines, the number of laps), the measuring time (updating time and decrementing laps), optional transition area (difference between the 5 finish and start times), and agents (automatic or manual). In the next step, these concepts were mapped to the context-free grammar non-terminals of EasyTime. Finally, its whole syntax and semantics were developed [15]. In order to illustrate the power of EasyTime, lets describe the Ironman triathlon, as presented in Figure 1. This triathlon consists of: 3.8 km swim, 180 km cycling, and a 42 km run. These disciplines run one after another with two interruptions: In the first, those competitors who have finished with swimming prepare themselves for the cycling, whilst in the second, those competitors who have finished the cycling prepare themselves for running. Both interruptions occur within so-called transition areas. Their times spent within these areas are added to their swimming, cycling, and running times, in order to obtain the total times of specific competitors. Typically, the organizers divide those courses on which they run particular disciplines into laps because of easier management. As can be seen in Figure 1, competitors need to accomplish 4 laps of swimming, 4 laps of cycling, and 8 laps of running. These laps represent another demand for the measuring time in such competitions because, besides the intermediate times of each lap, decrementing also needs to be performed. In order to reduce the number of measuring devices, a measuring point (MP in Figure 1) at which the intermediate time is measured and the number of laps is decremented, can be incorporated. In other words, when the number of laps is zero the last intermediate time becomes the final time of a specific discipline. This characteristic of the triathlon is put to profitable use by EasyTime. In fact, EasyTime is a DSL that enables the organizers of sporting competitions to adapt measuring systems for various kinds of competitions, reduce the number of measuring devices, and achieve accuracy and reliability. The EasyTime program runs on a measuring system and employs a set of agents that control the measuring devices. For measuring time during Inronman, as illustrated in Figure 1, the EasyTime program presented in Program 1 is used. At the start of Program 1, two agents are defined: The former describes a measuring device on which manual measuring time is performed on a portable computer by an operator, whilst the latter denotes a measuring device that automatically tracks an event caused when a competitor crossing the measuring place, based on RFID technology [30]. Typically, the automatic measuring place is implemented as a mat that acts as an antenna having two functions: Firstly, the antenna induces a passive tag that is born by competitor. Secondly, 6 Program 1 EasyTime program for measuring time in Ironman 1: 1 manual ”man.dat”; // definition of manual agent 2: 2 auto 192.168.225.100; // definition of automatic agent 3: // definition of variables 4: var ROUND1 := 4; 5: var INTER1 := 0; 6: var SWIM := 0; 7: var TRANS1 :=0; 8: var ROUND2 := 4; 9: var INTER2 :=0; 10: var BIKE := 0; 11: var TRANS2 :=0; 12: var ROUND3 := 8; 13: var INTER3 := 0; 14: var RUN := 0; 15: // definition of measuring place 1 16: mp[1] → agnt[1] { 17: (true) → upd INTER1; 18: (true) → dec ROUND1; 19: (ROUND1 == 0) → upd SWIM; 20: } 21: // definition of measuring place 2 22: mp[2] → agnt[1] { 23: (true) → upd TRANS1; 24: } 25: // definition of measuring place 3 26: mp[3] → agnt[2] { 27: (true) → upd INTER2; 28: (true) → dec ROUND2; 29: (ROUND2 == 0) → upd BIKE; 30: } 31: // definition of measuring place 4 32: mp[4] → agnt[2] { 33: (true) → upd INTER3; 34: (ROUND3 == 8) → upd TRANS2; 35: (true) → dec ROUND3; 36: (ROUND3 == 0) → upd RUN; 37: } this induced tag acts as a transmitter that transmits its identification code to a measuring device. The transmitted code is detected by the measuring device as an event. This event is transmitted to the measuring system and recorded into a database by an agent. After the agents definition in Program 1, a declaration of variables follows. For each measuring place, two variables are defined in general: an intermediate time INTERx and a laps counter ROUNDx. The final achievements of a competitor for specific disciplines are saved within variables SWIM, BIKE, and RUN. The EasyTime program is completed by definitions of measuring places mp[i], where i represents its identification number that must be defined uniquely. The measuring place represents a physical device that is connected to a measuring device. The measuring device can support more measuring places simultaneously. Conversely to a measuring place, a control point (CP in Figure 1) represents an event from a logical point of view and denotes the specific location on the course, where the referees need to track the time information 7 about competitors. As a matter of fact, the control points in EasyTime are directly mapped into variables. The identification numbers of each agent responsible for transmitting the events is assigned to each measuring place. For example, manual agent agnt[1] in line 16 of Program 1 controls the first measuring place. Before recording the event into a database, a sequence of statements in curly brackets are interpreted on an abstract machine (AM). These statements are in forms of (predicate) → operation, where operation denotes a sequence of instructions that are executed when the value of predicate returns value true. Typically, two instructions are employed in EasyTime++: upd and dec. The former update the value of variable in the database, whilst the latter decrements its value. Although, DSLs can be implemented in vastly possible ways [1], an appropriate implementation when the end-users are not also the programmers is, a compiler/interpreter approach [31]. Hence, EasyTime was implemented using a compiler generator tool called LISA [8, 14]. The LISA specifications include lexical, syntax and semantic specifications. Whilst classical regular expressions and BNF are used for the first two specifications, the third specifications are based on Attribute Grammars [32]. One of the distinguishing features of a LISA compiler generator is that specifications (lexical, syntax, and semantics) can be easily reused and extended. An overall view of LISA specifications is given in Listing I. IV. EASYTIME++ EasyTime’s formal description was introduced in [15], whilst the mapping of EasyTime’s denotational semantics into attribute grammars, as well as its implementation, are presented in [16]. Due to requested extensions of EasyTime the language has evolved into EasyTime++. This section describes the formal specifications that were necessary for the change. Due to the space constraints, we are unable to include complete specifications. Interested readers are further referred to [15, 16]. The first small change was done within the semantic domain Runners, which represents a database of competitors (Listing II). The additional components are now Gender and Category. Along with Id, RF ID, LastN ame, and F irstN ame, the Gender and Category regarding competitors have added to the semantic domain Runners. The second, and the most important change within the semantic domains is how the State, which is the mapping 8 Listing I: Overall view of LISA specifications language L1 [ extends L2 , ..., LN ] { lexicon { [[P] overrides | [P] extends] R regular expr. .. . } attributes type A 1, ..., A M .. . rule [[Y] extends | [Y] overrides] Z { X ::= X11 X12 ... X1p compute { semantic functions } .. . | Xr1 Xr2 ... Xrt compute { semantic functions } ; } .. . method [[N] overrides | [N] extends] M { operations on semantic domains } .. . } Listing II: Semantic domains in EasyTime++ Category={0, 1, 2, 3 . . .} Gender={f emale, male} Runners=(Id × RF ID × LastN ame × F irstN ame × Gender × Category)∗ State=Var → ((Category → Integer) × Truth-Value) from variables to values, has been modelled (Listing II). Within EasyTime, the State was a simple mapping: State=Var→Integer, however in EasyTime++ an initial value of an attribute depends on categories, and a variable, called ’dynamicvar’, can also be initialized during a run-time. Hence, the State is now modelled as: State = Var → ((Category → Integer) × Truth-Value) Let us describe the State using a simple excerpt from EasyTime++ declarations. Three 9 Listing III: Meaning of declarations in EasyTime++ D : Dec → State D[[var x := a]]s D[[var x := {cat1 → a1 , cat2 → a2 }]]s D[[dynamicvar x]]s D[[D1 ; D2 ]]s → = = = = State s[x → ((λcategory.a) × f alse)] s[x → ({cat1 → a1 , cat2 → a2 } × f alse)] s[x → ((λcategory. ⊥) × true)] D[[D2 ]](D[[D1 ]]s) variables were declared within an EasyTime++ program (Program 2). The first variable, ROU N D1 specifies that all competitors need to complete 50 laps, hence in a database of competitors the attribute ROU N D1 is set at 50 for all competitors. The second variable, ROU N D2, specifies that, in a case where a competitor belongs to category = 1, he/she needs to complete 20 laps, whilst a competitor within category = 2 only needs 10 laps. In the database of competitors, the attribute ROU N D2 is initialized according to the category. For all competitors in the first category this attribute will be initialized to 20, and for all competitors in the second category to 10. The third variable, P EN ALT Y , is a dynamic variable and its initial value for each competitor will be set during the run-time. Program 2 Excerpt from EasyTime++ declarations 1: var ROUND1 := 50; 2: var ROUND2 := { (category==1) → 20, 3: (category==2) → 10 }; 4: dynamicvar PENALTY; // definition of dynamic var. The State in EasyTime++ is mapping which maps variable names (e.g., ROU N D1, ROU N D2, P EN ALT Y ) into two components. The first component is itself a mapping from Category to Integer (e.g., 1→20, 2→10), whilst the second component indicates whether a variable is dynamic or not. To cope with this new model for variables in EasyTime++, the following LISA methods are needed (note that the mapping from Category to Integer can be implemented using a hashtable [16], see Program 3). Since all changes in EasyTime++ are done in a declaration part the semantic function D (for full description of EasyTime semantic functions please see [15, 16]), which describes the meanings of the declarations needs to be changed accordingly (Listing III). 10 Program 3 Implementation of EasyTime++ State in LISA 1: method M Var { class Var { 2: 3: String name; 4: Hashtable values; 5: boolean isDynamic; 6: Var (String name, Hashtable values, 7: boolean isDynamic) { 8: this.name = name; 9: this.values = values; this.isDynamic = isDynamic; 10: 11: } 12: // Java methods are omitted 13: ... } 14: 15: } 16: 17: method VarEnvironment { 18: import java.util.*; 19: public Hashtable put (Hashtable env, Var aVar) { 20: env = (Hashtable)env.clone(); 21: env.put(aVar.getName(), aVar); 22: return env; 23: } // java method 24: } // Lisa method Semantic function D maps the syntactic construct Dec, representing the declarations, into its meaning State → State, which is a mapping from State to State. Note, how the first component of State is defined in a case where the categories are unspecified (first equation in Listing III), and in a case of dynamic variables (third equation in Listing III). In the first equation, it is stated that variable x is mapped to value a regardless of cat- 11 egory. The mapping function λcategory.a is a constant function. The second equation states that variable x is mapped to different values (e.g., a1 , a2 ) according to different categories (e.g., cat1 , cat2 ), whilst in the third equation, the variable x is mapped to undefined value ⊥ regardless of category. In the case of dynamic variables the second component of (Category → Integer) × Truth-Value is true, otherwise it is false. The aforementioned changes in formal specifications of EasyTime++ also require changes in the implementation part. Note that changes are required in the lexical part (new keywords category and dynamicvar, new separator), syntax part (new syntax rules for declarations), as well as in the semantic part (new semantics for declarations). All the other parts of EasyTime (e.g., agents, measuring places, statements) [16] are intact and hence can be completely reused. Since EasyTime is implemented in LISA, which supports attribute grammar inheritance [8], and where lexical, syntax and semantic specifications can be inherited, it was natural to extend EasyTime specifications written in LISA for implementing EasyTime++, thus achieving incremental language development. Program 4 shows the LISA specification of EasyTime++. Note, how all EasyTime specifications have been reused (’language EasyTime++ extends EasyTime’). In the inherited specifications it was necessary to override rule Dec, which contained syntactic and semantic specifications for declarations, add some new grammar productions and their semantics (rule Categories), as well as add new attribute varvalues of type Hashtable, which were attached to the non-terminal CT GRS, and extend regular definitions for Separator and Keyword. Overall less than 70 lines of LISA specifications have been newly written to obtain the complete compiler for EasyTime++. Note that this is an example of language extension where language specifications’ fragment (Program 4) alone does not make any sense and can not exist without base-language specifications (for complete EasyTime specifications in LISA see [16]). Hence, this kind of language composition can be denoted as EasyTime / EasyTime++. V. EXAMPLES In order to test EasyTime++ DSL two case-studies were performed: • cyclo-cross Grand-prix, and • biathlon. 12 Program 4 LISA specification of EasyTime++ 1: 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: 20: 21: 22: 23: 24: 25: 26: 27: 28: 29: 30: 31: 32: 33: 34: 35: 36: 37: 38: 39: 40: 41: 42: 43: 44: language EasyTime++ extends EasyTime { lexicon { extends Separator , extends Keyword category — dynamicvar } attributes Hashtable *.varvalues; rule extends Start { compute { } } rule overrides Dec { DEC ::= var #Id := #Int ; compute { // category is not specified; isDynamic=false DEC.outState = put(DEC.inState, new Var(#Id.value(), put(new Hashtable(), ”0”, Integer.valueOf(#Int.value()).intValue()), false)); }; DEC ::= dynamicvar #Id ; compute { // category can not be specified; isDynamic=true DEC.outState = put(DEC.inState, new Var(#Id.value(), null, true)); }; DEC ::= var #Id := { CTGRS } ; compute { // categories are specified and can’t be dynamic DEC.outState = put(DEC.inState, new Var(#Id.value(), CTGRS.varvalues, false)); }; } rule Categories { CTGRS ::= ( category == #Int ) → #Int , CTGRS compute { CTGRS[0].varvalues = put(CTGRS[1].varvalues, #Int[0].value(), Integer.valueOf(#Int[1].value()).intValue()); }; CTGRS ::= ( category == #Int ) → #Int compute { CTGRS.varvalues = put(new Hashtable(), #Int[0].value(), Integer.valueOf(#Int[1].value()).intValue()); }; } ... // LISA methods } 13 The former was experienced in practice, whilst the latter could be taken as proof of concept. In the rest of this section, both case-studies are discussed in detail. A. Case-study 1: Cyclo-cross Grand-Prix This case-study tested the introduction of categories in EasyTime++. Cyclo-cross is a relatively new sport that typically takes place in winter and is dedicated to cycle road-riders who are preparing for the new season. Races usually consist of several laps of a short course featuring pavements, wooded trails, grass, steep hills, and obstacles. In this case-study, one lap of 2.5 km was used (Figure 2). According to the number of laps, the competitors were divided into three categories, as follows: • 4 laps: junior men and women up to 15 years old (U-15), • 6 laps: junior men and women up to 19 years old (U-19), and • 9 laps: absolute categories (U-23, Elite, Masters). In order to make the competition more interesting, the organizers allowed all the competitors onto the course simultaneously. Only one measuring device with two measuring places was needed for measuring this competition because the course passed at one location. Here, the intermediate times of laps were measured and, thereby, decremented the laps’ counters of specific competitors. When the laps counter reached zero the finish time of the competitor was reported. However, how many laps to go depended on the category to which the specific competitor belonged. The EasyTime++ program for measuring time in this competition can be seen by Program 5. Note that here both measuring places, i.e., mats, were laid so that the whole length of the finish line was captured. In line with this, a competitor can cross either of both mats. As a result, the programs for both measuring devices are the same, and work in parallel. 14 FIG. 2: Track layout of the cyclo-cross competition. Program 5 EasyTime++ program for measuring time in cyclo-cross competition 1: 2 auto 192.168.225.100; // definition of agent 2: var BIKE := 0; 3: var ROUND1 := { (category==1) → 4, (category==2) → 6, (category==3) → 9 }; 4: 5: // definition of measuring place 1 6: mp[1] → agnt[2] { 7: (true) → dec ROUND1; 8: (ROUND1 == 0) → upd BIKE; 9: } 10: // definition of measuring place 2 11: mp[2] → agnt[2] { 12: (true) → dec ROUND1; 13: (ROUND1 == 0) → upd BIKE; 14: } In summary, measuring time in cyclo-cross performed well with EasyTime++. Although the organizers prepared three different lengths of courses, six different lists of results were 15 obtained according to gender. Fortunately, in our case the gender could be handled by a database system, whilst the EasyTime++ program was unaware of it. B. Case-study 2: Biathlon A biathlon was the second case-study for EasyTime++. Biathlon refers specifically to the winter sport that combines cross-country skiing and rifle shooting. As can be seen from Figure 3, competitors start with skiing. Skiing is interrupted by rifle shooting. Typically, biathlon consists of 4 laps of skiing. The shooting appears close to the end of a lap. Two positions for competitors are allowed when shooting, i.e., prone and standing. Interestingly, the number of missed shoots is penalized by the additional number of penalty laps. Note that the time spent within the penalty laps are added to the total time of the competitor. The time of the penalty lap is typically taken to be between 20-30 seconds. The EasyTime++ program for measuring time in biathlon can be seen by Program 6. Three measuring devices are needed to cover this competition. Each measuring device realizes one measuring place. Moreover, each measuring place also represents a control point. In contrast to Ironman, in a biathlon time spent in penalty loops is of no interest in the preferred race. Here, only the total time of competitor is important. CP 0 CP 1 CP 2 CP 3 PENALTY MP 1 MP 2 MP 3 4x FIG. 3: Measuring time in biathlon competitions. In summary, the first device represents the special measuring device for counting hits. The agent assigned to this device puts the number of missed hits into the database variable PENALTY, dynamically. Note that this device is treated in EasyTime like an ordinary measuring device. The second measuring device is dealt with by counting the penalty laps, whilst the third device measures the final time. 16 Program 6 EasyTime++ program for measuring time in biathlon competition 1 auto 192.168.225.110; // definition of agent 1 2 auto 192.168.225.100; // definition of agent 2 var ROUND := 4; var RUN := 0; dynamicvar PENALTY; // definition of dynam.variable // definition of measuring place 1 mp[1] → agnt[1] { (true) → upd PENALTY; } // definition of measuring place 2 mp[2] → agnt[2] { (true) → dec PENALTY; } // definition of measuring place 3 mp[3] → agnt[2] { (true) → dec ROUND; (ROUND == 0) → upd RUN; } 1: 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: 18: VI. CONCLUSIONS Easy language composition is still an open-issue within programming language research. In particular, a new young field of software language engineering is of interest regarding engineering principles when constructing new languages, whether general-purpose or domainspecific. A language designer would like to build a new language simply by composing different components and/or extending previous components. This paper has presented EasyTime++ DSL as a language extension of EasyTime, where the base language specifications written in the LISA compiler generator have been extended with new features, thus enabling the introduction of categories into competitions, and those new competitions where the number of laps is dynamically determined. The implemented multiple attribute grammar inheritance in LISA enables easy language composition since lexical, syntax, and semantic specifications can be reused and extended. In such a manner, an incremental language development using LISA has been demonstrated. The suitability of EasyTime++ was shown in two case studies: cyclo-cross Grand-prix and a biathlon. More extensive experimental work, which would include other types of language compositions and more DSLs, is 17 also planned in the future. [1] M. Mernik, J. Heering, A. M. Sloane. When and how to develop domain-specific languages. ACM Computing Surveys, 2005, 37(4), 316–344. [2] A. van Deursen, P. Klint, J. Visser. Domain-specific languages: an annotated bibliography. ACM SIGPLAN Notices, 2000, 35(6), 26–36. [3] P. Hudak. Building domain-specific embedded languages. ACM Computing Surveys, 1996, 28(4es). [4] M. Fowler. Domain Specific Languages. Addison-Wesley Professional, 2010. [5] M. J. Varanda Pereira, M. Mernik, D. da Cruz, P. R. Henriques. Program comprehension for domain-specific languages. Computer Science and Information Systems, 2008, 5(2), 1–17. [6] T. Kosar, N. Oliveira, M. Mernik, M. J. Varanda Pereira, M. Črepinšek, D. da Cruz, P. R. Henriques. Comparing General-Purpose and Domain-Specific Languages: An Empirical Study. Computer Science and Information Systems, 2010, 7(2), 247–264. [7] T. Kosar, M. Mernik, J. C. Carver. Program comprehension of domain-specific and general-purpose languages: comparison using a family of experiments. Empirical software engineering, 2012, 17(3), 276–304. [8] M. Mernik, V. Žumer. Incremental programming language development. Computer Languages, Systems and Structures, 2005, 31(1), 1–16. [9] D. Hrnčič, M. Mernik, B. R. Bryant. Embedding DSLs into GPLs: A Grammatical Inference Approach. Information Technology and Control, 2011, 40(4), 307–315. [10] D. Hrnčič, M. Mernik, B. R. Bryant, F. Javed. A memetic grammar inference algorithm for language learning. Applied Soft Computing, 2012, 12(3), 1006–1020. [11] G. Kiczales. Aspect-oriented programming. ACM Computing Surveys, 1996, 28(4), Article No. 154. [12] P. Klint, T. van der Storm, J. J. Vinju. Term rewriting meets aspect-oriented programming. Processes, Terms and Cycles: Steps on the Road to Infinity. Springer-Verlag, 2005, 88–105. [13] M. Mernik, D. Rebernak. Aspect-Oriented Attribute Grammars. Electronics and Electrical 18 Engineering, 2011, 10(116), 99–104. [14] P. R. Henriques, M. J. Varanda Pereira, M. Mernik, M. Lenič, J. Gray, H. Wu. Automatic generation of language-based tools using LISA. IEE Proceedings - Software Engineering, 2005, 152(2), 54–69. [15] I. Jr. Fister, I. Fister, M. Mernik, J. Brest. Design and implementation of domainspecific language Easytime. Computer Languages, Systems and Structures, 2011, 37(4), 276– 304. [16] I. Jr. Fister, M. Mernik, I. Fister, D. Hrnčič. Implementation of EasyTime Formal Semantics using a LISA Compiler Generator. Computer Science and Information Systems, 2012, 9(3): 1019–1044. [17] S. Erdweg, P. G. Giarrusso, T. Rendel. Language Composition Untangled. In: Proceedings of Workshop on Language Descriptions, Tools and Applications (LDTA’12). Published online at http://www.informatik.uni-marburg.de/∼seba/publications/languagecomposition. pdf, 2012. [18] A. Granicz, J. Hickey. Phobos: A front-end approach to extensible compilers. In: Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS36), 2003. [19] G. Hedin, E. Magnusson. JastAdd: an aspect-oriented compiler construction system. Science of Computer Programming, 2003, 47(1), 37–58. [20] E. Van Wyk, D. Bodin, J. Gao, L. Krishnan. Silver: An extensible attribute grammar system. Science of Computer Programming, 2010, 75(1), 39–54. [21] T. Clark, P. Sammut, J. Willans. Superlanguages: Developing languages and applications with XMF. Published online at hhtp://bit.ly/HiTOKp, 2008. [22] J. Cervelle, R. Forax, G. Roussel. A simple implementation of grammar libraries. Computer Science and Information Systems, 2007, 4(2), 65–77. [23] H. Krahn, B. Rumpe, S. Voelkel. MontiCore: Modular development of textual domain specific languages. In: Proceedings of the 30th International Conference on Software Engineering (SLE 2008), 2008, 925–926. [24] A. Stonis, D. Rubliauskas, J. Blonskis. Mapping Syntax Extensions. Information Technology and Control, 2002, 24(3), 35–48. [25] J. Porubän, M. Forgáč, M. Sabo, M. Bı̀hálek. Annotation Based Parser Generator. 19 Computer Science and Information Systems, 2010, 7(2), 291–307. [26] M. Viera, S. D. Swierstra, A. Middelkoop. How to make Attribute Grammars First-Class. In: Language Descriptions, Tools and Applications UUAG Meets AspectAG: Proceedings of Workshop on (LDTA’12). Published online at http://www.cs.uu.nl/research/techreps/repo/CS-2011/2011-029.pdf, 2012. [27] D. Brown, J. Levine, T. Mason. lex & yacc. O’Reilly Media, 2nd Edition, 1992. [28] X. Wu, B.R. Bryant, J. Gray, M. Mernik. Component-based LR parsing. Computer Languages, Systems and Structures, 2010, 36(1), 16–33. [29] V. Štuikys, R. Damaševicius. Measuring Complexity of Domain Models Represented by Feature Diagrams. Information Technology and Control, 2009, 38(3), 179–187. [30] K. Finkenzeller. RFID Handbook. John Wiley & Sons, 2010. [31] T. Kosar, P. E. Martı́nez López, P. A. Barrientos, M. Mernik. A Preliminary Study on Various Implementation Approaches of Domain-Specific Language. Information and Software Technology, 2008, 50(5), 390–405. [32] J. Paakki. Attribute Grammar Paradigms - A High-Level Methodology in Language Implementation. ACM Computing Surveys, 1995, 27(2), 196–255. Updated 3 March 2013. 20
6cs.PL
Concave Flow on Small Depth Directed Networks arXiv:1704.07791v1 [cs.DS] 25 Apr 2017 Tung Mai Georgia Tech [email protected] Richard Peng Georgia Tech [email protected] Anup B. Rao Georgia Tech [email protected] Vijay V. Vazirani Georgia Tech [email protected] April 26, 2017 Abstract Small depth networks arise in a variety of network related applications, often in the form of maximum flow and maximum weighted matching. Recent works have generalized such methods to include costs arising from concave functions. In this paper we give an algorithm that takes a depth D network and strictly increasing concave weight functions of flows on the edges and computes a (1−ǫ)-approximation to the maximum weight flow in time mDǫ−1 times an overhead that is logarithmic in the various numerical parameters related to the magnitudes of gradients and capacities. Our approach is based on extending the scaling algorithm for approximate maximum weighted matchings by [Duan-Pettie JACM‘14] to the setting of small depth networks, and then generalizing it to concave functions. In this more restricted setting of linear weights in the range [w min , w max ], it produces a (1 − ǫ)-approximation in time O(mDǫ−1 log(w max /w min )). The algorithm combines a variety of tools and provides a unified approach towards several problems involving small depth networks. 1 Introduction Combinatorial problems have traditionally been solved using combinatorial methods, e.g., see [Sch03]. Aside from providing many state-of-the-art results, these methods also have the advantages of simplicity and interpretability of intermediate solutions. Recently, algorithms that utilize continuous methods have led to performances similar or better than these combinatorial methods [CKM+ 11, Mad13, ZO15]. A significant advantage of continuous approaches is that they extend naturally to general objective functions, whereas in combinatorial algorithms there is much difference, for example, between even finding a maximum flow and a minimum cost flow. This paper is motivated by recent works that used accelerated gradient descent to obtain O(mǫ−1 log n) time routines for computing approximate solutions of positive linear programs [ZO15, WRM15]. Such linear programs include in particular (integral) maximum weighted matchings on bipartite graphs, and fractional weighted matchings on general graphs. These algorithms, as well as earlier works using continuous methods for the maximum weighted matching problems [AG14], represent a very different approach that obtained bounds similar to the result by Duan and Pettie [DP14]; the latter computed similar approximations using combinatorial methods. We study this connection in the reverse direction to show that the augmenting path based approaches can be extend to 1) small depth, acyclic networks, and 2) more general cost objectives. Formally, given a DAG with source s and sink t, along with capacities c e and differentiable concave functions fe on each P edge, we want to find a flow from s to t that obeys capacity c e and maximizes the function e fe (x e ). Our main result to this direction is: Theorem 1.1. Given a depth D acyclic network with positive capacities and concave cost functions whose derivatives are between w min and w max and queryable in O(1) time, ConvexFlow returns a (1 − ǫ)-approximation to the maximum weighted flow in O Dmǫ−1 log(w max /w min ) log n time. We note that the logarithmic dependency on w max /w min is common in scaling algorithms for flows: the case of linear costs corresponds to fe (x e ) = w e x e for scalars w e , and in turn w min = mine w e and w max = maxe w e . We will discuss the relation between this formulation and other flow problems, as well this dependency on weights in Section 1.2. 1. Initialize flow x , potentials p, step size δ 2. Repeat until δ is sufficiently small: (a) Repeat O(1/ǫ) steps: i. Compute eligible capacities on the edges, forming the eligible graph. ii. Send a maximal flow in the eligible graph. iii. Recompute eligible graph, adjust potentials of vertices unreachable from s. (b) Reduce δ, and adjust the potentials. Figure 1: Algorithmic Template for Our Routines The main components of our algorithm are in Figure 1. It involves the construction and flow routing on an eligiblility graph, which consists of all positive capacitiated edges calculated from a set of eligibility rules. Note that aside from the blocking-flow computation on this graph in Step 2(a)ii, 1 all other steps are local steps based on values on an edge, potentials of its two end points, and an overall step size. This algorithm in its fullest generalization is in Figure 8 in Section 4. The paper is organized as follows. In Section 2 we describe the simplest variant: max weight flow on unit-capacity, small depth networks where the cost functions on edges are linear. The main reason for presenting this simple setting is to show how we trade running time with accuracy by appropriately relaxing eligibility conditions for edges. In Section 3, we extend our algorithm to situations with widely varying edge weights via a scaling scheme. We then extend the result to concave functions in Section 4, leading to our main result as stated in Theorem 1.1. 1.1 Our Techniques Our main technical contribution is a method for combining augmenting paths algorithms with primal-dual schemes for flows with costs. We combine blocking flows, which are essentially maximal sets of augmenting paths, with the weight functions on edges via eligibility rules that dictate which edge in the residual graph can admit flow based on the current primal / dual solution. Invariants that follow from these eligibility rules then allow us to maintain approximate complementary slackness between the primal and dual solutions. In turn, these yield approximation guarantees. Our eligibility rules are directly motivated by the scaling algorithms for approximate maximum matching [DP14], which is in turn based on scaling algorithms for maximum weighted matchings [GT89, GT91, Gab17]. However, the fact that augmenting paths can contain edges from different depth levels pose several challenges. Foremost is the issue that a very heavily weighted edge may cause flow to go through a lightly weighted edge. As a result, we need to find a way to work around the key idea from [DP14] of relating the weight of an edge to the first time a flow passes through it. We do so by using paths as the basic unit by which we analyze our flows, and analyzing the entire history of paths going through an edge (see Section 3.3 for details). We will develop our algorithms first in the case where all weights on edges are linear, and then extend them to concave functions. These extensions are obtained by viewing each edge with nonlinear cost functions as a collection of edges with differing weights and infinitesimal capacities, and then simulating a continuous version of our linear algorithm through blocking flows. 1.2 Related Works As our results combine techniques applicable to a wide range of combinatorial problems, our results have similarities, but also differ, from many previous works. An incomplete list of them is in Figure 2. In order to save space, we use Õ(f (n)) to hide terms that are polylog(f (n)): this is a widely used convention for the more numerical variants of these objectives, and here mostly hides factors of log n. While the guarnatees of many of the algorithms listed here are stated for inputs with integer capacities / costs [GT89, GR98, LS14], their running times are equivalent to producing 1 ± ǫapproximates with poly(log(ǫ−1 )) overhead in running time. Our guarantees, which contain poly(ǫ−1 ) in the running time terms, closest resemble the approximation algorithms for weighted matchings [DP14, ZO15, AG14] and flows on small depth networks [Coh95]. These running times only outperform the routines with poly(log(ǫ−1 )) depdencies for mild ranges of ǫ. In such cases, the solution can differ significantly point-wise from the optimum: for example, deleting ǫ-fraction of a maximum cardinality matching still gives a solution that’s within 1 ± ǫ of the optimum. As a result, the barriers towards producing exact solutions in 2 reference [GR98] [Orl13] [Coh95] [Pen16] our work [LS14] [Orl93] [GT87] our work [GT89] [DP14] [ZO15] [AG14] our work [Hoc07] [Vég12] our work objective flow amount flow amount flow amount flow amount flow amount min linear cost min linear cost min linear cost max linear weight matching weight matching weight matching weight b-matching weight b-matching weight concave/convex min separable convex cost max concave weight graph any any small depth undirected small depth any any any small depth any any bipartite 2 any bipartite any any small depth approximation 1 ± ǫ in value exact 1 ± ǫ in value 1 ± ǫ in value 1 ± ǫ in value 1 ± ǫ in value exact exact 1 ± ǫ in value 1 ± ǫ in value 1 ± ǫ in value 1 ± ǫ in value 1 ± ǫ in value 1 ± ǫ in value 1 ± ǫ pointwise exact 1 ± ǫ in value runtime 1 Õ(m3/2 log(ǫ−1 )) Õ(mn) Õ(mD 2 ǫ−3 ) Õ(mǫ−3 ) Õ(mDǫ−1 ) Õ(m3/2 log(ǫ−1 )) Õ(m2 ) Õ(mn) Õ(mDǫ−1 ) Õ(mn1/2 log(ǫ−1 )) O(mǫ−1 log(ǫ−1 )) Õ(mǫ−1 ) Õ(mpoly(ǫ−1 )) Õ(mǫ−1 ) Õ(m2 log(ǫ−1 )) ≥ O(n4 ) Õ(mDǫ−1 ) 3 Figure 2: Results Related to Our Algorithm strongly polynomial time [Hoc07] are circumvented by these assumptions, especially the bounds on the minimum and maximum gradients. These bounds are natural generalizations of the bounds on costs in scaling algorithms for flows with costs [GT89]. In some cases, they can also be removed via preprocessing steps that find poly(n) crude approximations to the optimum, and trim edge weights via those values [CKM+ 11, DP14, Pen16]. In particular, if all the capacities are integers, we can increase the minimum weight, or gradient, in a way analogous to the matching algorithm from [DP14]. Lemma 1.2. If all capacities are integers and the functions fe are non-negative and increasing, then we can assume ǫw max P , w min ≥ O (m2 · e c e ) P 2 or w max /w min ≤ O( mǫ · e c e ) without perturbing the objective by a factor of more than 1 ± ǫ. Proof. First, note that the assumption about integral capacities means that there exists a feasible flow that routes at least 1/m2 per edge, and such a flow, x ′ , can be produced using a single depth-first search in O(m) time. We will fix the gradients to create functions f whose gradients are all within poly(m, ǫ−1 ) of  ǫ  def w b = max f . e m2 1 Many of the approximate algorithms assume integer capacities/weights, and have factors log C and/or log N in their running times, where C and N are the largest capacity and weight respectively. We omit those factors due to space constraints: they are discussed as dependencies on the accuracy ǫ in the text before Lemma 1.2. 2 This algorithm also can produce fractional matching solutions on general graphs. 3 There is a hidden factor of logarithm of the ratio between max and min gradients. 3 First, note that OP T ≥ w b since the functions are non-negative. So we can add Pǫwbc e to the gradient e of all the functions without changing the optimum by more than ǫw b ≤ ǫOP T additively. Formally the functions: ǫw b def . f e (x) = fe (x) + x · P e′ c e′ with associated maximum OP T satisfies OP T ≤ OP T ≤ (1 + ǫ)OP T . To fix the maximum gradient, consider the truncated functions ( f e (x) if x ≥ mǫ2 , and def  . fbe (x) = xm 2 ǫ if x ≤ mǫ2 ǫ · f e m2 It can be checked that fbe (x) ≤ f e (x) at all points, and that the maximum gradient of fbe (x) is bounded by  ǫ   xm2 2 −1 · fe ≤ O m ǫ w b . ǫ m2 [ [ So it remains to show that OP T , the maximum with the functions fb satisfies OP T ≥ (1 − ǫ)OP T . For this, consider the optimum solution to OP T , x , the solution (1 − ǫ) x + ǫx ′ is feasible because it’s a linear combination of two feasible solutions, has objective at least 1 − ǫ times the objective of x due to the concavity and monotonicity of f , and has flow at least ǫ/m2 per edge. The result then follows from observing that fbe (x) = f e (x) for all x ≥ ǫ/m2 . Remark By Lemma 1.2, if all capacities are integer, the running time of our result can be written as Õ(Dmǫ−1 log C), where C is the largest capacity. Our assumption on the topology of the graph follows the study of small depth networks from [Coh95], which used the depth of the network to bound the number of (parallel) steps required by augmenting path finding routines. From an optimization perspective, small depth is also natural because it represents the number of gradient steps required to pass information from s to t. Gradient steps, in the absence of preconditioners, only pass information from a node to its neighbor, so diameter is kind of required for any purely gradient based methods The acyclicity requirement is a consequence of our adaptation of tools from approximating weighted matchings [DP14], and represent a major shortcoming of our result compared to exact algorithms for minimum cost flow [Orl93] and convex flows [Hoc07, Vég12]. However, as we will discuss in Appendix A, there are many applications of flows where the formulations naturally lead to small depth networks. 2 Simple Algorithm for Unit Capacities and Linear Weights In this section, we propose a simple (1 − ǫ) approximation algorithm for the case of fe (·) being linear functions, and all capacities are unit. This assumption means we can write the cost functions as: fe (x e ) = w e x e for some w e ≥ 0. Under these simplifications, the linear program (LP) that we are solving and its dual become: 4 max X e ∀u, ∀e, X vu x vu = X min w ex e X ye e ∀e, x uv uv 0 ≤ xe ≤ 1 pv − pu + y e ≥ w e ps = pt ∀e, y e ≥ 0. We add a dummy directed edge from t to s with infinite capacity to ensure flow conservation at each vertex. For every edge e we mention in the paper, we implicitly assume that e = uv is an edge in the original network and e 6= ts, unless otherwise stated. The dual inequality involving y e is equivalent to: y e ≥ w e + pu − pv, The RHS is critical for our algorithm and its analysis. We will define it as the reduced weight of the edge, w pe : w pe = w e + p u − p v .  Note that the choice of w pe uniquely determines the optimum choice of y e through y e ← max 0, w pe . To find an optimum flow on these networks it is sufficient to obtain feasible pairs x and p, y that satisfy the following complementary slackness conditions: 1. For all e, if x e = 0, then y e = 0, which is equivalent to w pe ≤ 0. 2. For all e, if x e = 1 then y e = w pe , which is equivalent to w pe ≥ 0. The role of these values of w pe can be further illustrated by the following Lemma, which is widely used in scaling algorithms. Lemma 2.1. For any flow x for which the flow conservation is satisfied, and any potential p such that p t = p s , we have: X X w ex e = w pe x e . e e Proof. Expanding the summation gives X X X X w ex e + x ep u − x ep v . w pe x e = e e=uv e=uv e Rearranging the last terms gives X u pu X uv x uv − X vu x vu ! , which we know is 0 for every u 6= s, t. We also have that the amount of flow leaving s is same as the amount of flow entering t, and p s = p t so the total contribution of these terms is 0. 5 Note that if p s = 0 and w pe is close to 0 for each e in a path from s to some u, the total reduced cost of the path is close to p u . This is the view taken by most primal-dual algorithms for approximate flows: conditions are imposed on valid paths in order to make p u s emulate max weight residual paths to the source. These routines then start with p t set to very large, and maintaining a complementary primal/dual pair while gradually reducing p t . Shortest path algorithms such as the network simplex method and the Hungarian algorithm fall within this framework [AMO93, Chapter 12]. Such algorithms produce exact answers, but may take Ω(n) steps to converge even in the unit weighted case due to very long augmenting paths. The central idea in our algorithms is to regularize these complementary slackness conditions. Specifically, we relax the x e = 0 case from w pe ≤ 0 to w pe ≤ δ, for some δ which we eventually set to ǫw min . We may assume that all the weights are integer multiples of δ since the additive rounding error of each weight w e is at most ǫw e . We use a set of eligibility rules to define when we can send flows along edges, or whether an arc is eligible. The modified eligibility conditions are shown in Figure 3. 1. Forward edge: if x e = 0, can send flow along u → v if w pe = δ. 2. Backward edge: if x e = 1, can send flow back from v → u if w pe = 0. Figure 3: Eligiblity Rules for Simple Algorithm on Unit Capacity Networks with Linear Weights. (A1) If x e = 1, then w pe ≥ 0. (A2) If x e = 0, then w pe ≤ δ. Figure 4: Relaxed Invariant for Simple Algorithm on Unit Capacity Networks with Linear Weights. These rules leads our key construct, the eligible graph: Definition 2.2. Given a graph G and a set of eligibility rules, the eligible graph consists of all eligible residual arcs with positive capacities, equaling to the amount of flow that can be routed on them. A vertex v is an eligible vertex if there exists a path from s to v in the eligible graph. The main idea behind working on this graph is that this approximate invariant can be maintained analogously to exact complementary slackness. This leads to an instantiation of the algorithmic template from Figure 1. Its pseudocode is given in Figure 5. The key property given by the introduction of δ is after sending 1 unit of flow along a maximal collection of paths, t is no longer reachable from s in the eligible graph. We can show this from the observation that all edges in a path that we augment along become ineligible. For an eligible forward edge uv, x uv = 0 and w puv = δ. Therefore, after augmentation, x uv = 1 and vu is ineligible. A similar argument can be applied for an eligible backward edge vu to show that after augmentation the residual forward edge uv is also ineligible. 6 x = SimpleFlow (G, s, t, {w e } , w min , w max , ǫ) Input: Unit capacity directed acyclic graph G from s to t, Weights w e for each edge e, along with bounds w min = mine w e and w max = maxe w e . Error tolerance ǫ. Output: (1 − ǫ) approximate maximum weight flow x . 1. Compute levels lu of the vertices u (length of a longest path from s to u). Initialize x e = 0, p u = w max · lu , δ = ǫw min . 2. Repeat until p t = 0: (a) Eligibility labeling: Compute the eligible graph. (b) Augmentation: Send 1 unit of flow along a maximal collection of edge-disjoint paths in the eligible graph. (c) Dual Adjustment: Recompute the eligible graph, for each vertex u unreachable from s, set p u ← p u − δ. Figure 5: Simple Algorithm Based on the Eligibility Conditions From Figure 3 This fact plays an important role in our faster convergence rate: Lemma 2.3. The running time of the algorithm given in Figure 5 is O(Dw max m/ǫw min ) where D is the depth of the network. Proof. The algorithm starts with p t = Dw max and in each iteration, p t is decreased by δ. Therefore, the number of iterations is Dw max /δ. Since in each iteration it takes O(m) to find a maximal set of disjoint augmenting paths using depth-first search, the total running time is O(Dw max m/ǫw min ). We also need to check that our eligibility rules and augmentation steps indeed maintain the invariants throughout this algorithm. Lemma 2.4. Throughout the algorithm, the invariants from Figure 4 are maintained. Proof. It is easy to check that at the beginning of the algorithm, the invariants are satisfied. We will show by induction that dual adjustments and augmentations do not break them. Assume the two conditions hold before a dual adjustment step. Notice that a dual adjustment can only change reduced weights of edges that have exactly one eligible endpoint. For an edge e = uv, we consider 2 cases: • u is eligible, and v is ineligible: a dual adjustment step decreases p v , and thus increases w pe . Condition (A1) still holds because the reduced weight increases. Condition (A2) still holds because reduced weight can only increase until it is equal to δ and both u and v are eligible. • v is eligible, and u is ineligible: a dual adjustment step decreases p u , and thus decreases w pe . Condition (A1) still holds because the reduced weight can only decrease until it is equal 7 to 0 and both u and v are eligible. Condition (A2) still holds because the reduced weight decreases. Now assume that the two conditions hold before an augmentation step, and notice that we only send flow along eligible edges. For an edge e with x e = 0 before augmentation, the eligibility condition is w pe = δ, thus after augmentation x e = 1 and condition (A1) is satisfied. For an edge e with x e = 1 before augmentation, the eligibility condition is w pe = 0, thus after augmentation x e = 0 and condition (A2) is satisfied. It remains to bound the quality of the solution produced. Once again, the invariants from Figure 4 play crucial roles here. Lemma 2.5. If all the invariants and feasibility conditions hold when the algorithm terminates with p s = p t , then the solution produced, x , is feasible and (1 − ǫ)-optimal. Proof. The flow x is feasible because in each augmentation step we only send one unit of flow along a path in the residual graph. Let x ∗ be any other st flow obeying the capacities. Our goal is to show that X X w e x e ≥ (1 − ǫ) w e x ∗e . e e To do so, we first invoke Lemma 2.1, which allows us consider the weights w pe instead. We invoke the invariants based on the two cases: 1. If x e = 1, then x ∗e ≤ x e since the edges are unit capacitated. The invariant also gives w pe ≥ 0, which implies x e w pe ≥ x ∗e w pe . 2. If x e = 0, then w pe x e = 0. The invariant gives w pe ≤ δ, which combined with x ∗e ≥ 0 gives: x e w pe = 0 ≥ x ∗e (w pe − δ) . Furthermore, since δ ≤ ǫw e , this also implies x e w pe ≥ x ∗e w pe − ǫw e x ∗e . Summing the implications of these invariants across all edges gives X X X X X x ∗e w e . x e w pe ≥ x ∗e w pe − ǫ x ∗e w e = (1 − ǫ) x ew e = e e e e 8 e 3 Scaling Algorithm for Linear Weights In this section, we show how to improve the running time of the algorithm in the previous section through scaling. The scaling algorithm makes more aggressive changes to vertex potentials p u at the beginning, and moves to progressively smaller changes. To be more precise, the algorithm starts with δ0 = ǫw max and ends with δT = ǫw min , and the value of δ is halved each scale. Assume ǫ and w max /w min are powers of 2, this immediately implies T = log (w max /w min ) . The vertex potentials are also initialized in a similar way, i.e p u = w max · lu for all u. Scale i > 0 starts with p t = Dw max /2i + 2Dδi and ends when p t = Dw max /2i+1 . The change in step sizes leads to more delicate invariants. Instead of having a sharp cut-off at δ as in the single-scale routine, we further utilize δi to create a small separation between edges eligible in the forward and backward directions. Between scales, we make adjustments to all potentials to maintain the invariants. Pseudocode of this routine is given in Figure 6. The rest of this section is a more sophisticated analysis built upon Section 2 and the scaling algorithms from [DP14], leading to the following main claim: Theorem 3.1. For any ǫ < 1/10,  ScalingFlow returns x that is an (1 − 8ǫ)-approximation in −1 O Dmǫ log(w max /w min ) log n time. A main issue in setting up the invariants, as well as the overall proof, is that errors from the iterations accumulate. Here we need an additional definition about the last time forward flow as pushed on an edge. Definition 3.2. During the course of the algorithm, for each edge e = uv, define scale(e) to be the the largest scale j such that j is at most i, the current scale, and there is a forward flow from u to v at scale j. Define scalef (e) to be the final value of scale(e) when the algorithm terminates. Note that scale(e) resets to i if uv is used in the blocking flow generated on Line 2(a)ii at scale i. For simplicity, we use δe to denote δscale(e) , δef to denote δscalef (e) , and le to denote lv − lu . The key eligibility rules and invariants are in Figure 7. The intricacies in Condition (B1) is closely related to the changes in the dual rescaling step from Line 2(b)i. In particular, Condition (B2), w pe < 2δi , may be violated if δi is halved. The dual rescaling on Line 2(b)i is in place precisely to fix this issue by lowering w pe . It on the other hand causes further problems for lower bounds on w pe , leading to modifications to Condition (B1) as well. We first verify that these modified invariants are preserved by the dual rescaling steps. 3.1 Dual Rescaling Steps Lemma 3.3. The dual rescaling step on Line 2(b)i of Figure 7 maintain invariants (B1) and (B2). 9 ScalingFlow (G, s, t, {w e , c e } , w min , w max , ǫ) Input: Directed acyclic graph G from s to t, weights w e for each edge e, along with bounds w min = mine w e and w max = maxe w e , capacities c e for each edge e, error tolerance ǫ. Output: (1 − ǫ) approximate maximum weight flow x . 1. Compute levels lu of the vertices u (length of a longest path from s to u). Initialize x = 0, p u = w max · lu , δ0 = ǫw max . max 2. For i from 1 to T = log w w min : (a) Repeat until p t = Dw max 2i+1 if i < T or until p t = 0 if i = T : i. Eligibility labeling: Compute the eligible graph based on the eligibility rules: A. uv is eligible in the forward direction if δi ≤ w puv , B. a backward edge vu is eligible if w puv ≤ 0. ii. Augmentation: Send a blocking flow in the eligible graph. iii. Dual Adjustment: Recompute the eligible graph, for each vertex u unreachable from s, set p u ← p u − δi . (b) If i < T : i. Dual Rescale: p u ← p u + δi lu , ii. δi+1 ← δ2i . Figure 6: Scaling Algorithm Based on the Eligibility Condition From Figure 7. ′ Proof. We start with Condition (B2). If w pe ≤ 2δi , then if we pick p ′ such that w pe ≤ w pe − δi , we get: ′ w pe ≤ δi = 2δi+1 . This is done by updating vertex potential p u ← p u + δi lu for each vertex u at the end of scale i. It remains to check that the condition w pe ≥ −3le (δe − δi ) − δi does not break by decreasing p u − p v by le δi : − 3le (δe − δi ) − δi − le δi = −3le δe + 2le δi − δi = −3le δe + 4le δi+1 − 2δi+1 ≥ −3le (δe − δi+1 ) − δi+1 . where the last line follows because le ≥ 1. 10 1. Forward edge: if x e < c e , u → v is eligible if w pe ≥ δi . 2. Backward edge: if x e > 0, v → u is eligible if w pe ≤ 0. (B1) If x e > 0, then w pe ≥ −3le (δe − δi ) − δi . (B2) If x e < c e , then w pe ≤ 2δi . Figure 7: Relaxed Invariant and Corresponding Eligibility Rules for Scaling Algorithm on Non-unit Capacity Networks with Linear Weights. 3.2 Blocking Flows Our algorithm also incorporates more general capacities c e . The changes caused by this in the linear programming formulations are: 1. In the primal, the capacity constraints become 0 ≤ x e ≤ c e , P 2. the dual objective becomes e c e y e . This extension can be incorporated naturally: instead of finding a maximal set of edge-disjoint augmenting paths, we find a blocking flow from s to t. Blocking flows can also be viewed as maximal sets of paths when the edges are broken down into multi-edges of infinitesimal capacities. They can be found in O(m log n) time using dynamic trees [ST83], and therefore offer similar levels of theoretical algorithmic efficiency. In the unit capacity case, an augmentation along any path in the residual graph destroys all eligible edges in the path, and the asymmetry of the eligibility condition means the new reverse edges are also ineligible. However, when we move to general capacities, an augmentation may destroy just a single edge on the path. As a result, it’s simpler to work with the following equivalent definition of blocking flows. Definition 3.4. A blocking flow on a graph G is a flow such that every path from s to t goes through a fully saturated edge. We first verify that this definition also maintains all the invariants both after augmentation and dual adjustments. These proofs closely mirror those of Lemma 2.4. Lemma 3.5. An augmentation by a blocking flow in the eligible graph, as on Line 2(a)ii, maintains the invariant. Proof. The algorithm only sends flow through eligible edges. Consider an edge uv on a blocking flow 1. If the augmentation sends flow from u to v, then uv is an eligible forward edge, and w puv ≥ δi . After augmentation, condition (B1) must hold. 11 2. If the augmentation sends flow from v to u, then vu is an eligible backward edge, and 0 ≥ w puv . After augmentation, condition (B2) must hold. Therefore, all edges on a blocking flow satisfy the set of reduced weight conditions after augmentation. Lemma 3.6. A dual adjustment step, as specified on Line 2(b)i, maintains the invariant. Proof. Notice that a dual adjustment can only change the effective reduce weights of edges that have exactly one eligible endpoint. For an edge e = uv in the graph, we consider 2 cases: • u is eligible, and v is ineligible: a dual adjustment step decreases p v , and thus increases w pe . – if x e = c e then condition (B1) still holds because w pe increases. – if x e < c e then we know that uv is in the residual graph and ineligible. Since uv is ineligible, w pe must be less than δi . Condition (B2) still holds because w pe can only increase until it is at least δi and e becomes eligible. • v is eligible, and u is ineligible: a dual adjustment step decreases p u , and thus decreases w pe . – if x e > 0 then we know that vu is in the residual graph and ineligible. Since vu is ineligible, w pe must be greater than 0. Condition (B1) still holds because w pe can only decrease until it is at most 0 and vu becomes eligible. – if x e = 0 then condition (B2) still holds because w pe decreases. Note that at the beginning of the algorithm, x e = 0 and w pe = w e − le w max ≤ 0 for each edge e. Therefore, the invariants (B2) holds. Induction then gives that these invariants hold throughout the course of the algorithm. 3.3 Bounding Weights of Paths We can now turn our attention to the approximation factor. The main difficulty in this proof is due to cancellations of flows pushed at previous scales. Our proof relies on performing a path decomposition on each blocking flow in the history of the final solution x . We will view the final flow, x , as a sum of flows from the collection P. X x = xP. P ∈P Note here that x P is a quantity that specifies the amount of flow on that path. We also define FP to be the set of edges going forward on P , and BP to be the set of edges going backward on P . We use this decomposition to map backward flow to forward flow in an earlier scale. We will also use scale(P ) to denote the scale at which P was pushed, and δP to denote δscale(P ) . Note that we will likely push flows on an edge in forward and backward directions many times throughout the course of the algorithm. Each of these instances belong to a different path, and is taken care of separately in the summation. We first establish a lower bound on the weight of each path using the eligibility criteria: we show that the weight of the path routed at phase i can be lower bounded by terms involving δi , the step size at that phase. 12 Lemma 3.7. X e∈FP we − X e∈BP we ≥ DδP 2ǫ Proof. Let p be the vertex potentials from when flow was pushed along P . Note that p may not be the final potentials. By the definition of w pe , we have X X X X we − we = w pe − w pe + (p t − p s ) . e∈FP e∈BP e∈FP e∈BP For the edges on the path, the eligibility rules give • w pe ≥ δP ≥ 0 if e ∈ FP , and • −w pe ≥ 0 if e ∈ BP . Furthermore, our outer loop condition on Line 2a ensures that at scale i, p t is at least Dw max /2i+1 = Dδi /2ǫ, while p s is always 0. Therefore the total is at least Dδi /2ǫ. This allows us to map the final inaccuracies of weights caused by the Condition (B2) of the invariants to ǫ of the total weights. The following proof hinges on path decompositions Lemma 3.8. Let x be the final answer. Then we have X X w ex e. 3le δef x e ≤ 6ǫ e e Proof. Let x P be the amount of flow sent through P. The definition of x and summation of flows gives X X xe = xP − xP. P :e∈FP P :e∈BP reversing the ordering of summation, and aggregating per edge gives:   X X X X 3le δef x e = 3le δef  xP − xP. e e P :e∈FP P :e∈BP For each edge e,  δef  X P :e∈FP xP − X P :e∈BP  xP = X P :e∈FP δef x P − X δef x P (1) P :e∈BP Consider the set of paths P1 , . . . Pk sending flow on edge e (in both directions) in the order of index i for i = 1 . . . k. Whenever a flow is sent from v to u (a backward direction), there must be some existing flow from u to v. By breaking a path into multiple paths carrying smaller amounts of flow, we may assume that for each Pi such that e ∈ BPi , there exists Pj such that j < i, e ∈ FPj and x Pi = x Pj . We define a function that maps i to j. Since j < i, we must have δPj ≥ δPi . It follows that δef x Pj − δef x Pi = 0 ≤ δPj x Pj − δPi x Pi 13 We apply the following modifications to the RHS of equation (1). For each pair (i, j) such that i is mapped to j, we increase the multiplication factor of x Pi from δef to δPi and the multiplication factor of x Pj from δef to δPj . Finally, for the remaining forward flows that are not canceled, we increase δef to the value δP of the path containing them. Such modifications can only increase the value of the RHS of (1). Therefore, for each edge e, X P :e∈FP δef x P − X P :e∈BP δef x P ≤ X P :e∈FP δP x P − X δP x P . P :e∈BP Plugging back to the summation, we have   X X X X 3le δef x e ≤ 3le  δP x P − δP x P  . e e P :e∈FP P :e∈BP Changing the order of summation and notice that for each path P X X le δP − le δP = DδP , e∈FP which by Lemma 3.7 is bounded by 2ǫ then gives the result. 3.4 e∈BP P e∈FP we − P e∈BP  w e . Summing over all paths P ∈ P Putting Things Together It remains to put these together through the use of reduced costs in a way analogous to Lemma 2.5. Proof. (of Theorem 3.1) The number of iterations in each scale is D/2ǫ + 2D = O(D/ǫ). The number of scales is log(w max /w min ). Each iteration takes O(m log n) to find a blocking flow. Therefore, the total running time is O ((Dm log n/ǫ) log(w max /w min )). ∗ For the approximation guarantees, any pP denote the final potenP consider P optimal flow Px . pLet p tials. Once again, Lemma 2.1 gives e w e x e = e w e x e and e w e x ∗e = e w e x ∗e . We will incorporate the invariants from Figure 7 through two cases: 1. If x e < x ∗e , then x e < c e , and the invariant gives w pe ≤ 2δT , which implies w pe x e ≥ (w pe − 2δT ) x e ≥ (w pe − 2δT ) x ∗e . Since δT = ǫw min ≤ w e , this implies x e w pe ≥ x ∗e w pe − 2ǫw e x ∗e . 2. If x e > x ∗e , then x e > 0, and the invariant gives w pe ≥ −3le δef which combined with x ∗e ≤ x e gives:     x e w pe + 3le δef ≥ x ∗e w pe + 3le δef ≥ x ∗e w pe 14 Combining these gives X e   X   x e w pe + 3le δef x e w e + 3le δef = e ≥ X e x ∗e w pe − 2ǫ = (1 − 2ǫ) X X w e x ∗e e w e x ∗e e and the result then follows from Lemma 3.8. 4 Non-Linear Networks We now move to the non-linear setting with arbitrary capacities. The primal objective becomes: X max fe (x e ) e Here we will let w e (x e ) denote the weight of e when x e units are on it, i.e., w e (x e ) = d fe (x e ). dx e Since fe (·) is concave, we know that w e (x e ) is monotonically decreasing. Pseudocode of our algorithm is in Figure 8, and its eligibility rules are in Figure 9. Note that the eligibility rules in the pseudocode is a shorter version of the one in Figure 9. We remark that the cost of finding Le and Ue , the maximum amount the flow can increase/decrease before the gradient of fe (x e ) changes by ∆, depends on the structures of fe (·). In case of simple functions such as quadratics, they can be calculated in closed form. For more complex functions, finding these points can be viewed as analogs of line searches [BV04]. Conceptually, we divide each edge uv into multiple imaginary parallel edges between u and v, each with a linear weight function. This can be viewed as approximating w e (x e ) by a decreasing step function. To be precise, for each edge e, we break it into k parallel edges e1 , . . . , ek such that: 1. w e1 = ⌊w e (0)/δT ⌋δT , w ek = ⌊w e (c e )/δT ⌋δT and w ei = w ei−1 − δT for all 1 < i < k. 2. c ei = x i − x i−1 where x i s are such that x 0 = 0, x k = c e and w e (x i ) = w ei for all 0 < i < k. Let G = (V, E) be the original network, and G = (V, E) be the network with multiedges. We say that a flow x in G is well-ordered if the following condition holds for every e: x ei > 0 ⇒ x ej = c ej ∀j < i. A flow x in G is equivalent with a flow x in G if: X x ej = x e . j Notice that the well-ordered property ensures that there is a unique reverse mapping from x e to x e1 . . . x ek as well. 15 x = ConcaveFlow (G, s, t, {c e , fe } , w min , w max , ǫ) Input: DAG G from s to t, capacities c e and concave weight functions fe along each edge e, bounds w min and w max s.t. w min ≤ dxd e fe (x e ) ≤ w max ∀ 0 ≤ x e ≤ c e , error tolerance ǫ. Output: (1 − ǫ) approximate maximum weight flow x . 1. Compute levels lu of the vertices u (length of a longest path from s to u). Initialize δ(0) = ǫw max , p u = w max · lu , x e = 0. max 2. For i from 1 to T = log w w min : (a) Repeat until p t = Dw max 2i+1 if i < T or until p t = 0 if i = T : i. Form eligibility graph from all arcs with positive capacities given by: A. Forward (u → v): max ∆ s.t. x e + ∆ ≤ c e and p u − p v + dxd e fe (x e + ∆) ≥ δi . B. Backward (v → u): max ∆ s.t. ∆ ≤ x e and p u − p v + dxd e fe (x e − ∆) ≤ 0. ii. Augmentation: Send a blocking flow in the eligible graph. iii. Dual Adjustment: Recompute the eligible graph, for each vertex u unreachable from s, set p u ← p u − δi . (b) If i < T : i. Dual Rescale: p u ← p u + δi lu , ii. δi+1 ← δ2i . Figure 8: Algorithm for Concave Networks Lemma 4.1. Let (x , p) be a flow-potential pair at some point in the course of ConcaveFlow on input G. ScalingFlow on input G can maintain a flow-potential pair (x , p) such that: 1. x is well-ordered. 2. x and x are equivalent. Proof. It suffices to prove that the above claim holds in an Eligibility Labeling and an Augmentation step. Consider an edge uv that is eligible in forward direction in ConcaveFlow algorithm. Since x is well-ordered and equivalent to x , there are some eligible multiedges between u and v in ScalingFlow. Moreover, the first condition in Figure 9 guarantees that the amount of flow allowed on uv is equal to sum of capacities of all eligible parallel edges from u to v in the multiedges setting. This follows because 1. The value of w e (x e + ∆) such that w pe (x e + ∆) = δi is a multiple of δi , since p u and p v are also multiples of δi assuming ǫ is a power of 2. 2. A weight of each edge in G is a multiple of δT by construction. 16 1. Forward edge: if x e < c e , uv is eligible if δi < w pe (x e ), and can has forward capacity Ue (x e , i) := min {c e − x e , ∆ such that w pe (x e + ∆) = δi } . 2. Backward edge: if x e > 0, vu is eligible if 0 > w pe (x e ), with capacity Le (x e , i) := min {x e , ∆ such that w pe (x e − ∆) = 0} . Figure 9: Eligiblity Rules for Scaling Algorithm for Concave Weight Functions. A similar argument can be applied to the backward eligibility case. Specifically, the amount of flow that can be pushed back on uv in ConcaveFlow is equal to sum of capacities of all eligible multiedges from v to u in ScalingFlow. It follows that a blocking flow in the eligible graph in ConcaveFlow is also a blocking flow in the eligible graph in ScalingFlow. Given a blocking flow z in the single-edge setting, we can distribute z uv among eligible multiedges between u and v such that the resulting flow x in ScalingFlow is still well-order, and still equivalent to the resulting flow x in ConcaveFlow. This mapping then allows us to bound the result of the continuous process, leading to our main result. Proof. (Of Theorem 1.1) Let x ∗ be the optimal solution in the concave flow problem in G, and x be the final solution returned by ConcaveFlow. Let x ∗ be a solution in G such that x ∗ is well-ordered and equivalent to x ∗ . By Lemma 4.1, ScalingFlow on input G can produce a solution x in such that x is well-ordered and equivalent to x . At the end of the algorithm, the invariant in Section 3 must hold for the solution x . By Theorem 3.1, X X w e x e ≥ (1 − 8ǫ) w e x ∗e . e∈G e∈G Since x is equivalent to x and the step function defined by {w ei , c ei } is always below the function w e, Z xe X w e (t)dt ≥ fe (x e ) = w ex e. 0 e∈G Notice that the step function defined by {w ei + δT , c ei }, however, is always above the function w e . Since x ∗ is equivalent to x ∗ , Z x ∗e X ∗ (w e + δT ) x e ≥ w e (t)dt = fe (x ∗e ). 0 e∈G Since δT = ǫw min ≤ ǫw e for all e ∈ G, we have w e + δT ≤ w e (1 + ǫ). It follows that X w e x ∗e ≥ fe (x ∗e ). (1 + ǫ) e∈G 17 Putting everything together, fe (x e ) ≥ ≥ X e∈G w e x e ≥ (1 − 8ǫ) X w e x ∗e e∈G 1 − 8ǫ fe (x ∗e ) ≥ (1 − 9ǫ)fe (x ∗e ). 1+ǫ Finally, by applying a similar argument as in Theorem3.1, it is easy to see that the running time of ConcaveFlow is O Dmǫ−1 log(w max /w min ) log n . 5 Discussion We extended the Duan-Pettie framework for approximating weighted matchings [DP14] to flows on small depth networks [Coh95]. Our approach can be viewed as viewing the length of augmenting paths as a regularizing parameter on the weights of augmenting paths. For general concave weight functions, the routine can also be viewed as a dynamical system that adjusts flows based on the gradient of the current weight functions [BMV12, BBD+ 13, SV16]. Also, we believe our approach can be parallelized, and extends to non-bipartite graphs: here the challenge is mostly with finding an approximate extension of blocking flow routines. Another related application with small depth networks is finding high density subgraphs in networks [GT15, MPP+ 15, BHNT15]. These problems can be solved using parameteric maximum flows or binary searching over maximum flows [Gol84]. In both of these cases, the networks have constant depth, but the reductions also change the notions of approximation. Weights represents an additional tool in such routines, and we plan to further investigate its applications. References [AG14] Kook Jin Ahn and Sudipto Guha. Near linear time approximation schemes for uncapacitated and capacitated b-matching problems in nonbipartite graphs. In Proceedings of the Twenty-fifth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA ’14, pages 239–258, 2014. Available at: https://arxiv.org/abs/1307.4355. [AMO93] Ravindra K. Ahuja, Thomas L. Magnanti, and James B. Orlin. Network Flows: Theory, Algorithms, and Applications. Prentice Hall, Englewood Cliffs, NJ, 1993. [AMOR95] Ravindra K Ahuja, Thomas L Magnanti, James B Orlin, and MR Reddy. Applications of network optimization. Handbooks in Operations Research and Management Science, 7:1–83, 1995. Available at: http://jorlin.scripts.mit.edu/docs/publications/52applications%20of%20network.pdf. [BBD+ 13] Luca Becchetti, Vincenzo Bonifaci, Michael Dirnberger, Andreas Karrenbauer, and Kurt Mehlhorn. Physarum can compute shortest paths: Convergence proofs and complexity bounds. In Automata, Languages, and Programming - 40th International Colloquium, ICALP 2013, Riga, Latvia, July 8-12, 2013, Proceedings, Part II, pages 472–483, 2013. Available at https://people.mpiinf.mpg.de/˜mtd/files/physarum shortest path.pdf. 18 [BHNT15] Sayan Bhattacharya, Monika Henzinger, Danupon Nanongkai, and Charalampos Tsourakakis. Space-and time-efficient algorithm for maintaining dense subgraphs on one-pass dynamic streams. In Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, pages 173–182. ACM, 2015. [BMV12] Vincenzo Bonifaci, Kurt Mehlhorn, and Girish Varma. Physarum can compute shortest paths. In Proceedings of the Twenty-Third Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2012, Kyoto, Japan, January 17-19, 2012, pages 233–240, 2012. Available at http://arxiv.org/abs/1106.0423. [BV04] S. Boyd and L. Vandenberghe. Convex Optimization. Camebridge University Press, 2004. Available at https://web.stanford.edu/˜boyd/cvxbook/bv cvxbook.pdf. [CKM+ 11] Paul Christiano, Jonathan A. Kelner, Aleksander Madry, Daniel A. Spielman, and Shang-Hua Teng. Electrical flows, Laplacian systems, and faster approximation of maximum flow in undirected graphs. In Proceedings of the 43rd ACM Symposium on Theory of Computing, STOC 2011, San Jose, CA, USA, 6-8 June 2011, pages 273–282, 2011. Available at http://arxiv.org/abs/1010.2921. [Coh95] Edith Cohen. Approximate max-flow on small depth networks. SIAM J. Comput., 24(3):579–597, June 1995. [DJ12] N. Devanur and K. Jain. Online matching with concave returns. In Proceedings of the 44th ACM Symposium on Theory of Computing, STOC, 2012. [DP14] Ran Duan and Seth Pettie. Linear-time approximation for maximum weight matching. Journal of the ACM (JACM), 61(1):1, 2014. [Gab17] Harold N. Gabow. The weighted matching approach to maximum cardinality matching. CoRR, abs/1703.03998, 2017. Available at: http://arxiv.org/abs/1703.03998. [Gol84] A. V. Goldberg. Finding a maximum density subgraph. Technical report, Berkeley, CA, USA, 1984. [GR98] Andrew V. Goldberg and Satish Rao. Beyond the flow decomposition barrier. J. ACM, 45:783–797, September 1998. [GT87] Andrew V. Goldberg and Robert Endre Tarjan. Solving minimum-cost flow problems by successive approximation. In Proceedings of the nineteenth annual ACM symposium on Theory of computing, 1987. [GT89] Harold N. Gabow and Robert Endre Tarjan. Faster scaling algorithms for network problems. SIAM J. Comput., 18(5):1013–1036, 1989. [GT91] Harold N. Gabow and Robert Endre Tarjan. Faster scaling algorithms for general graph-matching problems. J. ACM, 38(4):815–853, 1991. [GT15] Aristides Gionis and Charalampos E. Tsourakakis. Dense subgraph discovery: Kdd 2015 tutorial. In Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD ’15, pages 2313–2314, New York, NY, USA, 2015. ACM. 19 [Hoc07] Dorit S Hochbaum. Complexity and algorithms for nonlinear optimization problems. Annals of Operations Research, 153(1):257–296, 2007. [Kar72] Richard M. Karp. Reducibility among combinatorial problems. In R. E. Miller and J. W. Thatcher, editors, Complexity of Computer Computations, pages 85–103. Plenum Press, 1972. [KMVV15] Ravi Kumar, Benjamin Moseley, Sergei Vassilvitskii, and Andrea Vattani. Fast greedy algorithms in mapreduce and streaming. ACM Transactions on Parallel Computing, 2(3):14, 2015. [LMSV11] Silvio Lattanzi, Benjamin Moseley, Siddharth Suri, and Sergei Vassilvitskii. Filtering: a method for solving graph problems in mapreduce. In Proceedings of the twenty-third annual ACM symposium on Parallelism in algorithms and architectures, pages 85–94. ACM, 2011. [LS14] Yin Tat Lee and Aaron Sidford. Path finding methods for linear programming: Solv√ ing linear programs in Õ( rank) iterations and faster algorithms for maximum flow. In Foundations of Computer Science (FOCS), 2014 IEEE 55th Annual Symposium on, pages 424–433. IEEE, 2014. Available at http://arxiv.org/abs/1312.6677 and http://arxiv.org/abs/1312.6713. [Mad13] Aleksander Madry. Navigating central path with electrical flows: From flows to matchings, and back. In Foundations of Computer Science (FOCS), 2013 IEEE 54th Annual Symposium on, pages 253–262. IEEE, 2013. [MAG+ 13] Faraz Makari Manshadi, Baruch Awerbuch, Rainer Gemulla, Rohit Khandekar, Julián Mestre, and Mauro Sozio. A distributed algorithm for large-scale generalized matching. Proceedings of the VLDB Endowment, 6(9):613–624, 2013. [MPP+ 15] Michael Mitzenmacher, Jakub Pachocki, Richard Peng, Charalampos Tsourakakis, and Shen Chen Xu. Scalable large near-clique detection in large-scale networks via sampling. In Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 815–824. ACM, 2015. [Orl93] James B Orlin. A faster strongly polynomial minimum cost flow algorithm. Operations research, 41(2):338–350, 1993. [Orl13] James B Orlin. Max flows in o(nm) time, or better. In Proceedings of the forty-fifth annual ACM symposium on Theory of computing, pages 765–774. ACM, 2013. [Pen16] Richard Peng. Approximate undirected maximum flows in o (m polylog (n)) time. In Proceedings of the Twenty-Seventh Annual ACM-SIAM Symposium on Discrete Algorithms, pages 1862–1867. SIAM, 2016. Available at http://arxiv.org/abs/1411.7631. [Sch03] A. Schrijver. Combinatorial Optimization. Springer-Verlag, 2003. [ST83] Daniel D. Sleator and Robert Endre Tarjan. A data structure for dynamic trees. J. Comput. Syst. Sci., 26(3):362–391, June 1983. 20 [SV16] Damian Straszak and Nisheeth K. Vishnoi. Natural algorithms for flow problems. In Proceedings of the Twenty-Seventh Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2016, Arlington, VA, USA, January 10-12, 2016, pages 1868–1883, 2016. [TTL+ 12] Wenbin Tang, Jie Tang, Tao Lei, Chenhao Tan, Bo Gao, and Tian Li. On optimization of expertise matching with various constraints. Neurocomputing, 76(1):71–83, 2012. [Vég12] László A Végh. Strongly polynomial algorithm for a class of minimum-cost flow problems with separable convex objectives. In Proceedings of the forty-fourth annual ACM symposium on Theory of computing, pages 27–40. ACM, 2012. [VVS10] Erik Vee, Sergei Vassilvitskii, and Jayavel Shanmugasundaram. Optimal online assignment with forecasts. In Proceedings of the 11th ACM conference on Electronic commerce, pages 109–118. ACM, 2010. [WRM15] Di Wang, Satish Rao, and Michael W. Mahoney. Unified acceleration method for packing and covering problems via diameter reduction. CoRR, abs/1508.02439, 2015. [ZO15] A Zeyuan Allen Zhu and Lorenzo Orecchia. Nearly-linear time positive LP solver with faster convergence rate. In Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, STOC 2015, Portland, OR, USA, June 14-17, 2015, pages 229–236, 2015. Applications We now outline some concrete applications of our formulation on small depth networks: many of them are discussed in more details in the survey by Ahuja et al. [AMOR95]. A.1 Assignment Problems Our techniques are directly motivated by those developed for approximate max weight matchings [DP14]. This problem, when phrased as the assignment problem, has applications in matching objects across snapshots as well as direct uses in assignment indicated by its name. Names of some of these applications, as enumerated in Application 16-18 of [AMOR95], include locating objects in space, matching moving objects, and rewiring typewriters. The problem of finding matchings in large scale graphs has received much attention in experimental algorithm design [LMSV11, MAG+ 13, KMVV15]. These instances often involve capacities on both sides, as well as edges in between. They are related to b-matchings, and have been studied as generalized matchings. Previous works that incorporated concave costs include: • [VVS10] studied Adwords matching using concave objective functions, and showed several stability and robustness properties of these formulations. • [TTL+ 12] utilized concave networks to perform assignments of experts to queries with additional constraints on groups of experts as well as queries. This leads to a depth 4 network with 3 layers corresponding to node groups respectively. 21 • [DJ12] considered a generalization of the well-known Adwords problem, which asks for maximizing the sum of budgeted linear functions of agents. In the generalization, the utility of each agents is a concave function (of her choice) of her total allocation. The objective is to maximize the sum of budgeted utilities, and an optimal online algorithm is given for this generalization. Another instance of concave cost matching is matrix balancing (Application 28 in [AMOR95]): given a fractional matrix, we would like to find a matrix with a specified row /column sum while minimizing distance under some norm. Here a bipartite network can be constructed by turning the rows into left vertices, columns into right vertices. The concave functions can then go onto the edges as costs. Our algorithm is able to handle such generalizations, and lead to bounds similar to those from recent improvements to positive packing linear programs [ZO15]. Generalizations of matching and assignment lead naturally to small depth networks. One such generalization is 3-Dimensional matching which is NP-hard [Kar72]. Here the generalization of edges is 3-tuples of the form (x, y, z), with one element each from sets X, Y , and Z, and 3dimensional matching asks for the maximum weighted set of tuples that uses each element in X, Y , and Z at most once. A restriction of this problem on the other hand is in P : the set of acceptable tuples are given by pairs of edges between XY and Y Z. Specifically, a tuple (x, y, z) can be used iff xy ∈ EXY and yz ∈ EY Z , and its cost is given by the sum of the two edges. This version can be solved by maximum cost flow on a depth 5 network: • For each element x, y or z, create an in and out vertex, connected by an edge with unit capacity. • Connect Xout to Yin and Yout to Zin with edges corresponding to EXY and EY Z . • Connect s to Xin and Zout to t. A.2 Mincost Flow Minimum cost flow asks to minimize the cost instead of maximizing it. This is perhaps the most well-known formulation of our problem. However, it doesn’t tolerate approximations very well: if we stay with non-negative costs, we need to specify the amount of flow. If this is done exactly, it becomes flow feasiblity on a small depth network. There are known reductions of directed maximum flows to this instance (e.g. [Mad13], Section 3). One way to limit the total amount of flow is to associate a reward with each unit sent from s to t. Specifically, let q e > 0 be the cost of one unit of flow on e, and Q > 0 be the reward of one unit sent from s to t, the objective function is X min q e x e − Qf e where f is the total amount of flow from s to t. In this case, negating the cost brings us back to the maximum weight flow problem. The approximation factor on the other hand becomes additive: 22 Lemma A.1. Let (x ∗ , f ∗ ) be the optimal solution to the above mincost flow problem, The algorithm ScalingFlow in Section 3 gives a solution (x , f ) such that: ! X X q e x ∗e − Qf ∗ + 2ǫQf ∗ q e x e − Qf ≤ (1 + ǫ) e e A proof of Lemma A.1 can be found in Appendix B. Applications of minimum cost flows that lead to small depth networks include: • Job scheduling, or optimal loading of a hopping airplane (application 13 from [AMOR95]): When phrased as scheduling, this can be viewed as completing a maximum set of jobs each taking place between days [si , ti ] and giving gain ci so that at no point more than ui jobs are being done simultaneously on day i. This can be solved with a maximum cost flow whose depth is the number of days: – The days become a path, with capacity ui , – For each job, create a node (connected to source with capacity 1) with two edges, one with cost 0 to ti , and one with cost ci to si . – Each node on the path has an edge to sink, t, with capacity equalling the number of jobs ending that day. This leads to a network whose depth is the number of days, or number of stops. Both of these quantities are small in real instances. • Balancing of schools (Application 15 from [AMOR95]): the goal is to assign students from varying backgrounds to schools, belong to several districts, so that each school as well as each district has students with balanced backgrounds. Furthermore, the cost corresponds to the distance the student needs to travel to the schools. This leads to a depth 3 network where the layers are the students, schools, and districts respectively. Finally, we believe several applications can benefit from the incorporation of non-linear weight functions. As an instance, we can solve the following problem using our framework: Let G be a network with k sources, {si , 1 ≤ P i ≤ k}, and a sink, t, and let fi be a concave function for each 1 ≤ i ≤ k. We wish to maximize i fi (Fi ), where Fi is the amount of flow sent from si to t. B Negative Weight Functions We consider the case where our network can have negative weights. For simplicity, we only study linear weight functions. The analysis, however, can be extended to the case of concave function as in Section 4. Here, we assume that the absolute values of the weights are bounded: w max ≥ |w e | ≥ w min ∀e. Lemma B.1. Let x be a solution returned by ScalingFlow, and let x ∗ be the optimal solution X X X w e x e ≥ (1 − 8ǫ) w e x ∗e + (1 + 8ǫ) w e x ∗e . e w e >0 w e <0 23 Proof. A key observation is that the Lemmas 3.7 and 3.8 are robust under negative weights. Using an argument similar to as in Theorem 3.1, we have: 1. If x e < x ∗e , then x e < c e , and the invariant gives w pe ≤ 2δT , which implies w pe x e ≥ (w pe − 2δT ) x e ≥ (w pe − 2δT ) x ∗e . Since δ(T ) ≤ ǫw min ≤ ǫ|w e | for all e, we consider 2 cases: ( w pe x ∗e − 2ǫw e x ∗e w pe x e ≥ (w pe − 2δT ) x ∗e ≥ w pe x ∗e + 2ǫw e x ∗e if w e > 0, if w e < 0. 2. If x e > x ∗e , then x e > 0, and the invariant gives w pe ≥ −3le δef , which combined with x ∗e ≤ x e gives:     x e w pe + 3le δef ≥ x ∗e w pe + 3le δef ≥ x ∗e w pe Combining these then gives   X  X  x e w pe + 3le δef x e w e + 3le δef = e e ≥ ≥ X e w pe x ∗e − X e:w e >0 X 2ǫw e x ∗e + e:w e <0 = (1 − 2ǫ) w e x ∗e e:w e >0 2ǫw e x ∗e e:w e <0 (w e x ∗e − 2ǫw e x ∗e ) + X X X (w e x ∗e + 2ǫw e x ∗e ) e:w e <0 + (1 + 2ǫ) X w e x ∗e e:w e <0 and the result then follows from Lemma 3.8. Proof. (Of Lemma A.1) Let w e = −q e for every e, and add a directed edge from t to a dummy vertex t′ with w tt′ = Q. By Lemma B.1, a solution returned by ScalingFlow on that instance has the following guarantee: X X Qf − q e x e ≥ (1 − ǫ)Qf ∗ − (1 + ǫ) q e x ∗e . e Negating both sides gives X e q e x e − Qf ≤ (1 + ǫ) = (1 + ǫ) X q e x ∗e − (1 − ǫ)Qf ∗ X 24  q e x ∗e − Qf ∗ + 2ǫQf ∗ .
8cs.DS
Comparing global input-output behavior of frozen-equivalent LPV state-space models Ziad Alkhoury ∗,∗∗ Mihály Petreczky ∗∗∗ Guillaume Mercère ∗ ∗ arXiv:1703.03679v1 [cs.SY] 10 Mar 2017 University of Poitiers, Laboratoire d’Informatique et d’Automatique pour les Systèmes, Bâtiment B25, 2 rue Pierre Brousse, TSA 41105, 86073 Poitiers Cedex 9. (e-mails: [email protected], [email protected]) ∗∗ Ecole des Mines de Douai, F-59500 Douai, France. ∗∗∗ CNRS, Centrale Lille, UMR 9189 - CRIStAL-Centre de Recherche en Informatique, Signal et Automatique de Lille, F-59000 Lille, France. (e-mail: [email protected]) Abstract: It is known that in general, frozen equivalent (Linear Parameter-Varying) LPV models, i.e., LPV models which have the same input-output behavior for each constant scheduling signal, might exhibit different input-output behavior for non-constant scheduling signals. In this paper, we provide an analytic error bound on the difference between the inputoutput behaviors of two LPV models which are frozen equivalent. This error bound turns out to be a function of both the speed of the change of the scheduling signal and the discrepancy between the coherent bases of the two LPV models. In particular, the difference between the outputs of the two models can be made arbitrarily small by choosing a scheduling signal which changes slowly enough. An illustrative example is presented to show that the choice of the scheduling signal can reduce the difference between the input-output behaviors of frozenequivalent LPV models. Keywords: LPV system identification, local approach, interpolation, modeling error. 1. INTRODUCTION As shown, e.g., in Tóth (2010); Lopes dos Santos et al. (2011), existing techniques dedicated to the identification of Linear Parameter-Varying (LPV) systems can be split up into two main families: the local and the global approach. On the one hand, the global approach focuses on a global procedure for which it is assumed that one global experiment can be performed in which the control inputs as well as the scheduling variables can be both excited (see, e.g., Bamieh and Giarré (2002); Felici et al. (2007)). By construction, these techniques are restricted to specific systems where the components of the scheduling variables are totally controllable and excitable (and not only measurable). On the other hand, the local approach is based on a multi-step procedure (see, e.g.,Vizer and Mercère (2014), Vizer et al. (2013b), Lovera and Mercère (2007)) where first, frozen linear time-invariant models are estimated for constant values of the the scheduling variables, then the global LPV model is built from the interpolation of the local LTI models. A substantial amount of local techniques are available in the literature (see De Caigny et al. (2011), Luspay et al. (2011)). This is probably due to the fact that the identification techniques for LTI systems are more mature than the LPV ones, in addition to the development of algorithms to optimize the number of local operating points involved in the procedure Vizer and Mercère (2014), as well as their strong link 1 This work was partially supported by ESTIREZ project of Region Nord-Pas de Calais, France. with the gain scheduling procedure Rugh and Shamma (2000). However, it is clear that none of these techniques is consistent when black-box state-space LPV models are estimated. As pointed out first in Tóth et al. (2007), the main reasons why the current solutions fail to mimic the global behavior of the LPV system are due to (i) the lack of information about the dynamical behavior of the scheduling variables p in the frozen models when LPV models depending on p dynamically are handled, (ii) the difficulty to express the local LTI models w.r.t. a coherent basis Tóth (2010) before the interpolation. While solutions have been suggested to bypass these difficulties when graybox state-space LPV models are considered Vizer et al. (2013b,a, 2015), restricting slow variations of p (w.r.t. the dynamics of the system) is the only assumption to make in order to guarantee a reliable global model behavior when black-box models are handled, i.e., when the only source of information is restricted to measured data, see Khalate et al. (2009). In this paper, we present an analytical error bound on the difference between the global input-output behavior of two frozen equivalent LPV models. By global inputoutput behavior we mean the input-output behavior along all scheduling signals, while by frozen equivalence of two LPV models we mean that their input-output behavior is the same along all constant scheduling signals. As it was discussed above, even if the data were generated by an LPV model, local methods for system identification in general result in LPV models which are only frozen equivalent to the ‘true’ one. Hence, the error bound of this paper allow us (1) to evaluate the difference between the input-output behavior LPV model obtained by local identification methods, and the ‘true’ LPV model which generated the data, (2) to evaluate the difference between the input-output behavior of LPV models obtained by different local identification methods. The error bound includes the speed of the change of the scheduling signal, the minimal time the scheduling signal remains constant (can be 1 time step in general) and a measure of inconsistency of the bases of the frozen LTI models. Note that this bound is valid only for (quadratically) stable LPV models. It turns out that even if the frozen LTI models are not in a coherent basis, the error between the input-output behaviors of the corresponding LPV models can be kept arbitrary small by using sufficiently slow scheduling signals, or by keeping the scheduling signal constant for long enough. This allows us to conclude that the problem of choosing the ‘correct’ state transformation required for the interpolation step becomes less critical for slowly varying scheduling signals. While the results of the paper seem to be intuitive, they have never been presented formally, to the best of our knowledge. A precise error bound could be of great interest for system identification and control design for LPV models, because it allows the user to quantify the effect of the modeling error due to local identification on the system performance. In turn, this could be incorporated as an additional constraint in control synthesis, or used as a minimization criteria in parametric system identification. Outline of the paper. In Section 2, we present the basic notions to set up the framework of the paper. Next, in Section 3, we present the main results. Section 4 presents an illustrative example. Finally, Section 5 concludes the paper. The proofs of the results are presented in Appendix. 2. PROBLEM FORMULATION To set up the framework of the paper, we give some basic definitions for LTI and LPV models. Definition 1. (LTI models). A discrete-time Linear TimeInvariant (LTI) model is defined as follows  x(t + 1) = Ax(t) + Bu(t), L (1) y(t) = Cx(t). x(t) ∈ X = Rnx is the state at time t, y(t) ∈ Y = Rny is the output at time t, u(t) ∈ U = Rnu is the input at time t, and A ∈ Rnx ×nx , B ∈ Rnx ×nu and C ∈ Rny ×nx In the sequel, we will use the notation L = (A, B, C) (2) for an LTI model of the form (1). Definition 2. (LPV models). A discrete-time Linear Parameter Varying (LPV) model (Σ) is defined as follows  x(t + 1) = A(p(t))x(t) + B(p(t))u(t), Σ (3) y(t) = C(p(t))x(t). x(t) ∈ X = Rnx is the state at time t, y(t) ∈ Y = Rny is the output at time t, u(t) ∈ U = Rnu is the input at t and p(t) ∈ P is the value of the scheduling signal at time t. The matrix functions A : P 7→ Rnx ×nx , B : P 7→ Rnx ×nu and C : P 7→ Rny ×nx are assumed to be continuous. We assume that P is compact, i.e., closed and bounded set. In the sequel, we will use the short notation Σ = (A(.), B(.), C(.)) (4) to denote a model of the form (3). Notice that we use the notation A(.), B(.) and C(.) to emphasize that these matrices are maps, not constant matrices. Remark 1. In order to avoid notational ambiguity, we denote that matrices of the LTI models by bold symbols, i.e., (A, B, C), while we denote that matrices of the LPV model by (A(.), B(.), C(.)). From now on, we will use the following notation: for a set A, we denote by AN the set of all functions of the form φ : N → A. An element of AN can be thought of as a signal in discrete-time. By a solution of L (respectively Σ), we mean a tuple of trajectories (x, y, u) ∈ (X , Y, U) satisfying (1), (respectively (x, y, u, p) ∈ (X , Y, U, P) satisfying (3)), for all k ∈ N, where X = XN , Y = YN , U = UN , P = PN . Note that P denotes the set of scheduling signals, while P denotes the set of all possible values of the scheduling parameters. That is, an element of P is a sequence, while an element of P is a vector. The same remark holds for X , Y, U and X, Y, U respectively. Note that in the sequel, unless stated otherwise, we will use p to denote a scheduling signal, and we use p to denote a potential value of the scheduling variable, i.e., p ∈ P is a sequence, but p ∈ P is a vector of constant values. Definition 3. (Input-output map of LPV models). Define the functions YΣ : U × P 7→ Y, (5) for an LPV model Σ, such that for any (x, y, u, p) ∈ (X × Y × U × P), y = YΣ (u, p) hold if and only if (x, y, u, p) satisfy (3), and x(0) = 0. The function YΣ is called the input-output map of Σ. Definition 4. (Frozen model of Σ at p). A frozen model of an LPV Σ = (A(.), B(.), C(.)) at p, denoted by LΣ (p), is the LTI model defined by LΣ (p) = (A(p), B(p), C(p)). (6) Definition 5. (Frozen-minimal LPV models). An LPV model Σ = (A(.), B(.), C(.)) is frozen-minimal, if ∀p ∈ P, the LTI LΣ (p) = (A(p), B(p), C(p)) is minimal 2 . In this paper, all models have the same state, input, output and scheduling signal dimensions. Therefore, the matrices and vectors dimensions nx , np , ny and nu will be omitted when clear from the context. Definition 6. (Frozen-equivalent LPV models at p). We say that two LPV models Σ = (A(.), B(.), C(.)) and Σ̂ = (Â(.), B̂(.), Ĉ(.)) are frozen equivalent, if ∀p ∈ P the LTI models LΣ (p) and LΣ̂ (p) have the same transfer function, i.e., for all s ∈ C which is not an eigenvalue of A(p) or Â(p), C(p)(sInx − A(p))−1 B(p) = Ĉ(p)(sInx − Â(p))−1 B̂(p). That is, if Σ and Σ̂ are frozen input-output equivalent LPV models, then, for any p ∈ P such that p is constant 2 According to the classical definition, i.e., (A(p), B(p)) is controllable and (A(p), C(p)) is observable, (see Rugh (1996)). (i.e., p(0) = p(k), ∀k ∈ N), and for any u ∈ U, YΣ (u, p) = YΣ̂ (u, p). sup kB(p)k = KB , (9) p∈P sup kC(p)k = KC , (10) p∈P 3. MAIN RESULTS sup kTΣ̂,Σ (p)k = KT . In this section, the difference between the outputs of two frozen-minimal and frozen-equivalent LPV models is characterized. It is important to note that KB , KC and KT are finite. This follows directly from the fact that each of the maps B, C and TΣ̂,Σ are continuous, and P is a compact set. 3.1 Preliminaries Now, for every scheduling signal p ∈ P, define KM (p) = sup kInx − Mp(k),p(k+1) k. (11) p∈P (12) k∈N Then, In order to compare the global behavior of the LPV models Σ and Σ̂, we need to introduce some concepts. We start from the fact that there is a unique isomorphism between any two input-output equivalent minimal LTI models (i.e., they have the same transfer function) L and L̂ (see Rugh (1996)). This means that there is a unique nonsingular nx × nx matrix T that fulfills T AT −1 = Â, T B = B̂, CT −1 = Ĉ. (7) where {A, B, C} and {Â, B̂, Ĉ} are the state-space matrices of L and L̂ respectively. We say that T is an isomorphism from L to L̂. Now, let us assume that LΣ (p) = (A(p), B(p), C(p)) and LΣ̂ (p) = (Â(p), B̂(p), Ĉ(p)) are two frozen LTI models of Σ and Σ̂, respectively, at p ∈ P. We assume that Σ and Σ̂ are both frozen-equivalent and frozen-minimal LPV models, then LΣ (p) and LΣ̂ (p) are input-output equivalent and both are minimal for all p ∈ P. Hence, there exists a (unique) isomorphism T (p) from LΣ̂ (p) to LΣ (p) for all p ∈ P. Let us call the map TΣ̂,Σ : p → T (p), the frozen isomorphism map from Σ̂ to Σ. Lemma 1. Let Σ, Σ̂ be two frozen-minimal and frozenequivalent LPV models .If A, B, C, Â, B̂ and Ĉ are continuous maps, then TΣ̂,Σ is a continuous map as well. The proof of Lemma 1 can be found in Appendix A.1 Remark 2. It is important to note that TΣ̂,Σ is not an LPV isomorphism between the two LPV models. In order for TΣ̂,Σ to be an LPV isomorphism, A(p(t)) = TΣ̂,Σ (p(t + −1 1))Â(p(t))TΣ̂,Σ (p(t)), should hold for any scheduling signal p ∈ P, see Kulcsár and Tóth (2011); Tóth (2010) for more details. In the rest of the paper, we will need the following notations. Notation 1. In the sequel, kAk will denote the induced 2Norm of any matrix A, while for a vector p, kpk will denote the Euclidean vector norm of p, (see Meyer (2000)). We denote by Inx the nx × nx identity matrix. To proceed with the characterization of the global behavior equivalence, let us define ∀p1 , p2 ∈ P : Mp1 ,p2 = TΣ̂,Σ (p1 )TΣ̂,Σ (p2 )−1 . (8) Notice that, if T (p1 ) = T (p2 ), then, Mp1 ,p2 = Inx . Define the coefficients KB , KC and KT as follows, KM (p) ≤ sup kInx − Mp1 ,p2 k < +∞. (13) p1 ,p2 ∈P Notice that sup kInx − Mp1 ,p2 k exists because TΣ̂,Σ is p1 ,p2 ∈P continuous, and hence P × P 3 (p1 , p2 ) 7→ Mp1 ,p2 is continuous and defined on a compact set. This means that, ∃KM > 0, such that ∀p ∈ P : KM (p) ≤ KM . (14) Let us also assume that Σ and Σ̂, are quadratically stable, i.e., there exists a positive definite matrix P > 0, such that for all p ∈ P, A(p)T P A(p) − P < 0 and for Â(p) similarly. Lemma 2. If Σ is quadratically stable, then there exists a nonsingular S ∈ Rnx ×nx , such that the LPV Σ̄ = (SA(.)S −1 , SB(.), C(.)S −1 ) satisfies sup kSA(p)S −1 k < α < 1, p∈P for some α ∈ (0, 1). In the sequel, we will assume that sup kA(p)k ≤ α < 1, (15) p∈P sup kÂ(p)k ≤ α̂ < 1. (16) p∈P If it is not the case, then we can replace Σ by Σ̄. Note that α in (15) is an upper bound on the Lyapunov exponent of dynamical system x(t + 1) = A(p(t))x(t); the smaller α is, the faster the solutions of x(t + 1) = A(p(t))x(t) converge to zero. If Σ̂ satisfies (15), then it follows from (Rugh, 1996, Proof of Lemma 27.4 and Theorem 27.2) and (9) – (10) that there exists µ1 > 0 such that for any solution (x̂, ŷ, u, p) of Σ̂ such that x(0) = 0 and supt∈N ku(t)k < +∞, sup kx̂(t)k ≤ µ1 sup ku(t)k. (17) t t∈N From now on, when comparing the outputs of two LPV models, we will assume that they are subject to the same bounded input from the set l∞ (U) = {u ∈ U : kukl∞ = sup ku(t)k < +∞}. t∈N Moreover, we will consider piecewise-constant scheduling signals from the following set. S∆={p ∈ P : ∀k ∈ N,∀i ∈ {0, 1, · · · , ∆ − 1} : p(k∆ + i)=p(k∆)}, (18) 3.2 General error bound We are now ready to present our main result on the global input-output equivalence of frozen-equivalent LPV models. Theorem 1. (Difference characterization). Let Σ and Σ̂ be two frozen-minimal, frozen-equivalent and quadratically stable LPV models. Then, for all p ∈ S∆ , ∆ > 0 and u ∈ l∞ (U), t ∈ N, kYΣ (u, p)(t) − YΣ̂ (u, p)(t)k ≤ g(∆, KM (p), t mod ∆) · kukl∞ ≤ g(∆, KM , t mod ∆).kukl∞ . (19) where t mod ∆ denotes the remainder of dividing t by ∆, and for all i = 0, . . . , ∆ − 1, αi g(∆, K, i) = K(αKT µ1 + KB )KC , (20) 1 − α∆ and KB , KC , KT , KM (p), α and µ1 are defined in equations (9), (10), (11), (12), (15) and (17) respectively. The proof of Theorem 1 can be found in Appendix A.3. Eq. (19) gives a conservative bound on the output error of two LPV systems whose frozen transfer functions are the same. It clearly shows that the error is affected by each of the following: • The length of the interval ∆, on which the scheduling signal p is constant. • The Lyapunov exponent α of the system, which expresses the degree of stability. • The distance KM (p) which expresses the degree of inconsistency of the basis of the frozen models: if all the frozen models are in a consistent basis, then KM (p) is zero. • The amplitude of the input kukl∞ . Note that (19) remains true if instead of kukl∞ we take kukl2 = P 1 ( k=0 ku(k)k22 ) 2 . 3.3 Special cases In this subsection, we formally derive and present important results based on Theorem 1, i.e., which aim at showing the effects of different variables on the difference of the input-output map presented in Equations (19) and (20) from Subsection 3.2. Theorem 2. (Switching interval). Let Σ and Σ̂ be two frozen-minimal, frozen-equivalent and quadratically stable LPV models. Then, for all ε > 0 there exists ∆m > 0 such that for all p ∈ S∆ , ∆ > ∆m , u ∈ l∞ (U), and for all t ∈ N with t mod ∆ > ∆m , kYΣ (u, p)(t) − YΣ̂ (u, p)(t)k < ε.kukl∞ . (21) The proof of Theorem 2 can be found in Appendix A.4. Theorem 2 tells us that if we have a piecewise constant scheduling signal, and the duration of each constant piece is large enough, then on each constant piece the outputs can get arbitrarily close, no matter how bad we choose the coordinates of the frozen models. In case of switching sequences we call the length of the interval on which p is constant the dwell time. For switched systems, the theorem says that for large enough dwell times, the outputs of the system can get arbitrary close towards the end of the active period of each discrete mode. Theorem 3. (Speed of change of scheduling parameter). Let Σ and Σ̂ be two frozen-minimal, frozen-equivalent and quadratically stable LPV models. Then, for every ε > 0, there exists δm > 0 such that, for all p ∈ P satisfying ∀t ≥ 0 :|p(t + 1) − p(t)| < δm , (22) and for all u ∈ l∞ (U), t ∈ N, kYΣ (u, p)(t) − YΣ̂ (u, p)(t)k < ε.kukl∞ . The proof of Theorem 3 can be found in Appendix A.5. This result is particularly interesting, because the scheduling signal is no longer restricted to be a piece-wise constant signal. This implies that we can still guarantee the inputoutput ‘approximate’ equivalence using a slowly changing scheduling signal, and the result holds for any t. However, if no conditions can be imposed on the scheduling signal, it is of great interest to evaluate the effect of the stability of the system on the difference between inputoutput maps of the two frozen-equivalent models. In the next theorem, we study the mentioned effect. Theorem 4. (Stability). Let Σ and Σ̂ be two frozenminimal, frozen-equivalent and quadratically stable LPV models. Then, for all ε > 0, there exists αm > 0 such that, if Σ satisfies sup kA(p)k ≤ αm , (23) p∈P then, for all u ∈ l∞ (U), p ∈ P, t ∈ N, kYΣ (u, p)(t) − YΣ̂ (u, p)(t)k < ε.kukl∞ . (24) The proof of Theorem 4 can be found in Appendix A.6. 3.4 Discussion: basic trade-offs Notice that, from Eq. (19), we have three factors that play important role in the error characterization. (1) The switching interval of the scheduling signal. By choosing a relatively long switching interval ∆, we guarantee that the difference between the outputs of the LPV models becomes small enough towards the end of each constant interval. (2) The rapidity of change of the scheduling signal, i.e., the difference between two consecutive values of the scheduling variable, which is |p(t + 1) − p(t)|. This case is of great interest when ∆ = 1, because the scheduling variable will not be restricted to a piecewise constant signal any longer, and it will be allowed to change at each time instant. By slowly changing the scheduling signal, we can get relatively very small difference between the input-output behaviors of frozen-equivalent LPV models. (3) The stability of the system. The more the system is stable, the less it responds to the applied input, i.e., the less the difference between two LPV models is. The results above actually show the following. On the one hand, even if the identified LTI models are in a noncoherent state-space basis, the obtained state-space LPV Model and Real system output signals y(t); y^(t) y(t) y^(t) 2 0 jjy(t) ! y^(t)jj 0 10 20 30 40 50 60 70 4 2 1 y(t) y^(t) 2 0 80 t Output di,erence 0 jjy(t) ! y^(t)jj y(t); y^(t) Model and Real system output signals 4 10 20 30 40 50 60 70 80 60 70 80 60 70 80 t Output di,erence 0.1 0.05 0 0 10 20 30 40 50 60 70 80 0 0 10 20 t Scheduling signal 30 40 50 t Scheduling signal p(t) 0.4 p(t) 0.5 0 0.3 0.2 0 10 20 30 40 50 60 70 80 0 10 20 30 t Fig. 2. Output difference for p(t) = 0.3 + 0.1sin(t/5). Model and Real system output signals y(t); y^(t) model can be still an accurate approximation of the real system provided that the scheduling signal is slow enough. More precisely, using slow changing scheduling signal, or using a piece-wise constant scheduling signal with long switching intervals is enough to obtain satisfying results. On the other hand, if the basis of the frozen state-space representation is close to a consistent one, then, even for ‘faster’ scheduling signal the approximation error will be small. 50 t 4 y(t) y^(t) 2 0 0 jjy(t) ! y^(t)jj Fig. 1. Output difference for p a piece-wise constant signal. 40 10 20 30 40 50 60 70 80 60 70 80 60 70 80 t Output di,erence 0.2 0.1 0 0 10 20 30 40 50 t Scheduling signal Let us consider the LPV model Σ of the form (3), such that nx = 2, np = 1, nu = ny = 1, and such that, for any p ∈ P := [0.1, 0.4],      > 0 0.2p 1 1 A(p)= , B(p)= , C(p)= . 0.2 p 1 1 In order to obtain an LPV model Σ̂, which is frozenequivalent to Σ, we perform an LPV identification process which includes the following steps: (1) Input-output data generation at each possible constant value of the scheduling signal. (2) Black-box LTI system identification using a subspace method. This step results in multiple LTI models, all are obtained in the same canonical form. (3) Linear interpolation of the matrices of the frozen models with respect to the values of the scheduling signal. This step gives us the matrices of the LPV model Σ̂, which is frozen equivalent to the original one. For comparing the outputs of the original LPV model and the identified one, we excite both LPV models Σ and Σ̂ using the same input u(t) = 1 and the same scheduling signal p, which is different for each of the following figures. In Fig 1, the scheduling signal is chosen to be a piecewise constant one as is clearly shown in the figure. Notice that the difference between the outputs is non-zero at the switching instances of p, i.e., at t = 11, 21, ..., 71. Notice also that the difference decreases approaching zero as we go away from the switching instances. This result is expected based on Theorem 2. We can also see that the difference between the outputs depends on the jumps in the switching signal. p(t) 0.4 4. ILLUSTRATIVE EXAMPLE 0.3 0.2 0 10 20 30 40 50 t Fig. 3. Output difference for p(t) = 0.3 + 0.1sin(t/2). In Fig. 2 and 3, the scheduling signal is chosen to be a sinusoidal one. This allows us to illustrate the results of Theorem 3. It is clear that the output difference of Σ and Σ̂ becomes bigger as we increase the frequency of the scheduling signal in Fig 3, in comparison to Fig 2. It is important to mention that the interpolation step is a crucial one, because the resulting LPV model is assumed to be frozen-equivalent to the original model (or the real system) at frozen values of p; otherwise the difference between the output of Σ and Σ̂ does not approach zero even if the interval on which the scheduling signal is constant was very long. Instead, the difference cannot become smaller than a certain value, which is affected by the distance between the frozen models of Σ and Σ̂. Studying the effect of having an upper bound on the distance between the frozen models is left for future work. In this example, a linear interpolation is performed, as it is sufficient to give us the required model. For different systems, higher complexity models and interpolation methods might be required in order to avoid getting frozen-non-equivalent LPV models. 5. CONCLUSIONS In this paper, an analytical expression for the difference between any two frozen-equivalent LPV models is presented. This difference could be seen as a modeling error of LPV systems, and the introduced expression allows us to evaluate the modeling error of LPV systems numerically, and gives the controller designer a bound on the global difference between frozen-equivalent LPV models. Future work will be aimed at using this expression in an optimization criteria during the identification process, more precisely, during the search for a coherent basis for the identified frozen models, which helps in minimizing the modeling error of LPV systems. REFERENCES Bamieh, B. and Giarré, L. (2002). Identification of linear parameter varying models. International Journal of Robust and Nonlinear Control, 12(9), 841–853. De Caigny, J., Camino, J., and Swevers, J. (2011). Interpolation-based modeling of MIMO LPV systems. IEEE Transactions on Control Systems Technology, 19(1), 46–63. Felici, F., van Wingerden, J.W., and Verhaegen, M. (2007). Subspace identification of MIMO LPV systems using a periodic scheduling sequence. Automatica, 43(10), 1684– 1697. Khalate, A., Bombois, X., Tóth, R., and Babuska, R. (2009). Optimal experimental design for LPV identification using a local approach. In Proceedings of the IFAC Symposium on System Identification. Saint-malo, France. Kulcsár, B. and Tóth, R. (2011). On the similarity state transformation for linear parameter-varying systems. In Proceedings of the IFAC World Congress. Milano, Italy. Lopes dos Santos, P., Azevedo Perdicolis, T., Novara, C., Ramos, J., and Rivera, D. (2011). Linear ParameterVarying System Identification: new developments and trends. Advanced Series in Electrical and Computer Engineering, World Scientific. Lovera, M. and Mercère, G. (2007). Identification for gain scheduling: a balanced subspace approach. In Proceedings of the American Control Conference. New York, USA. Luspay, T., Kulcsár, B., van Wingerden, J.and Verhaegen, M., and Bokor, J. (2011). Linear Parameter Varying Identification of Freeway Traffic Models. IEEE Transactions on Control Systems Technology, 19(1), 31–45. Meyer, C. (2000). Matrix analysis and applied linear algebra. SIAM, Cambridge University Press. Rugh, W. and Shamma, J. (2000). Research on gain scheduling. Automatica, 36(10), 1401–1425. Rugh, W.J. (1996). Linear System Theory (2Nd Ed.). Prentice-Hall, Inc., Upper Saddle River, NJ, USA. Tóth, R. (2010). Modeling and identification of linear parameter-varying systems. Springer-Verlag, Berlin Heidelberg. Tóth, R., Felici, F., Heuberger, P., and den Hof, P.V. (2007). Discrete-time LPV I/O and state-space representations. differences of behavior and pitfalls of interpolation. In Proceedings of the European Control Conference. Kos, Greece. Vizer, D., Mercère, G., and Laroche, E. (2015). Gray-box LPV model identification of a 2-DoF surgical robotic manipulator by using an H∞ -norm-based local approach. In Proceedings of the IFAC Workshop on Linear Parameter Varying Systems. Grenoble, France. Vizer, D., Mercère, G., Prot, O., Laroche, E., and Lovera, M. (2013a). Linear fractional LPV model identification from local experiments: an H∞ -based optimization technique. In Proceedings of the Conference on Decision and Control. Florence, Italy. Vizer, D., Mercère, G., Prot, O., and Ramos, J. (2013b). A local approach framework for black-box and graybox LPV system identification. In Proceedings of the European Control Conference. Zurich, Switzerland. Vizer, D. and Mercère, G. (2014). An H∞ -norm-based approach for operating point selection and LPV model identification from local experiments. Periodica Polytechnica Electrical Engineering and Computer Science, 58(3), 121–131. Appendix A. PROOFS A.1 Proof of Lemma 1 Note that for all p ∈ P, TΣ̂,Σ (p) isomorphism satisfies TΣ̂,Σ (p) =R(LΣ (p))R> (LΣ̂ (p))× (A.1) [R(LΣ̂ (p))R> (LΣ̂ (p))]−1 , where for all p ∈ P,   R(LΣ (p))= B(p) A(p)B(p) . . . A(p)nx −1 B(p) , (A.2)   R(LΣ̂ (p))= B̂(p) Â(p)B̂(p) . . . Â(p)nx −1 B̂(p) (A.3) are the reachability matrices of LΣ (p) and LΣ̂ (p) respectively. Since A, B, C and Â, B̂, Ĉ are continuous maps, then from Eq. (A.2) and Eq. (A.3), we can conclude that the maps P 3 p 7→ R(LΣ (p)) and P 3 p 7→ R(LΣ̂ (p)) are continuous. Hence, from Eq. (A.1), TΣ̂,Σ is also a continuous map. A.2 Proof of Lemma 2 Proof. From the definition of quadratic stability of Σ, ∃P positive definite matrix, such that the LMI A(p)> P A(p) − P < 0 (A.4) holds for p ∈ P. Then, let us choose S such that, P = S > S and define Â(p) := SA(p)S −1 . Then, if follows directly that, ∀p ∈ P Â(p)> Â(p) − Inx < 0, (A.5) i.e., kÂ(p)k < 1. Since P is compact, then, sup kÂ(p)k = kÂ(pm )k (A.6) (A.7) p∈P for some pm ∈ P and the statement of the Lemma follows directly. A.3 Proof of Theorem 1 In order to simplify the equations, we define the following quantities, for each ∆ > 0, k ≥ 0 and i ∈ {0, 1, . . . , ∆ − 1}: tks = k∆, tke = k∆ + ∆ − 1, tki = k∆ + i. The intuition behind this notation is as follows. Consider any p ∈ S∆ . Then p is a piece-wise constant scheduling signal. Then tks , tke and tki denote the starting time instance, the ending time instance and the ith time instance (k − 1)th interval tk−1 s ... From the first equation in Eq. (A.9) and the fact that −1 (p(tki )), B(p(tki )) = A(p(tki )) = TΣ̂,Σ (p(tki ))Â(p(tki ))TΣ̂,Σ k th interval tk−1 tks . . . e tki . . . TΣ̂,Σ (p(tki ))B̂(p(tki )), it follows that, ∀i ∈ {0, 1, . . . ∆ − 1}, tke Fig. A.1. Scheduling signal time instances tks , tke and tki . of the k th interval of the scheduling signal p respectively. We illustrate these time instances in Figure A.1. Note that on each set {tks , tks + 1, · · · , tke }, the signal p is constant, and tks = tk−1 +1, i.e., the sets {tks , tks +1, · · · , tke } e are adjacent and cover the whole time axis. To derive the equations in the statement of the theorem, which characterize the differences between Σ and Σ̂, let (x, y, p, u) be a solution of  x(t + 1) = A(p(t))x(t) + B(p(t))u(t), Σ (A.8) y(t) = C(p(t))x(t), such that x(0) = 0 and let (x̂, ŷ, p, u), x̂(0) = 0 be a solution of  x̂(t + 1) = Â(p(t))x̂(t) + B̂(p(t))u(t), Σ̂ (A.9) ŷ(t) = Ĉ(p(t))x̂(t). In order to be able to compare the states of the two models Σ and Σ̂, we need to apply a coordinates transformation to transform the Σ̂ to the same state basis of Σ. Define, ∀i ∈ {0, 1, · · · , ∆ − 1}, x̄(tki ) = TΣ̂,Σ (p(tki ))x̂(tki ), (A.10) where TΣ̂,Σ (p(tki )) is the isomorphism from the frozen model LΣ̂ (p(tki )) to LΣ (p(tki )). Remember that p(tki ) is constant on the set {tks , tks + 1, · · · , tke }, i.e., p(tki ) = p(tks ), then x̄(tki ) = TΣ̂,Σ (p(tks ))x̂(tki ) for all tki . In order to characterize the difference between y(tki ) = YΣ (u, p)(tki ) and ŷ(tki ) = YΣ̂ (u, p)(tki ) by means of the model-related coefficients and the input, we break down the process to three steps for the sake of readability. In the first step, we relate the difference between x and x̄ inside the set {tks , tks + 1, . . . , tke }, to the difference between x and x̄ at the beginning of this interval. In the second step we relate the difference between x and x̄ at the beginning (tks ) of each interval, to the difference between x and x̄ at the end (tk−1 ) of the preceding interval. e Finally, in the third step, we use the results of the preceding two steps in a recursive manner to relate the difference between x and x̄ at any time instant t to the difference between x and x̄ at time instant ∆ − 1. Next, we implement these three steps mathematically. x̄(tki + 1) = A(p(tki ))x̄(tki ) + B(p(tki ))u(tki ). (A.11) By subtracting above equation from the first equation in Eq. (A.8) we get, x(tki + 1) − x̄(tki + 1) = A(p(tki ))(x(tki ) − x̄(tki )). (A.12) Then, recursively, on the same time interval, we get x(tki ) − x̄(tki ) = A(p(tks ))i (x(tks ) − x̄(tks )). (A.13) Next, by replacing Eq. (15) in Eq. (A.13), we find that, kx(tki ) − x̄(tki )k ≤ αi kx(tks ) − x̄(tks )k. (A.14) 2) Step two: relating to the precedent interval. Now, in order to get a step backward on the time axis, we need to relate the initial values of the time interval with the last value of the previous time interval. For this purpose, define β =A(p(tk−1 ))x̄(tk−1 ) + B(p(tk−1 ))u(tk−1 ). e e e e Notice that β is a constant value, and one should not confuse it with a state trajectory. By taking the norm of β, we get kβk ≤ αKT µ1 kukl∞ + KB ku(tk−1 )k. e Notice, from the definition of the l∞ norm, ∀k ∈ N : kukl∞ ≥ ku(k)k. (A.15) Then, kβk ≤ (αKT µ1 + KB ).kukl∞ . (A.16) Now, using the triangle inequality, we can write kx(tks ) − x̄(tks )k ≤ kx(tks ) − βk + kβ − x̄(tks )k. (A.17) Notice that, kx(tks ) − βk = kA(p(tk−1 ))(x(tk−1 ) − x̄(tk−1 ))k e e e ≤ kA(p(tk−1 ))k.kx(tk−1 ) − x̄(tk−1 )k. e e e Then, kx(tks ) − βk ≤ αkx(tk−1 ) − x̄(tk−1 )k. e e Remember that x̄(tks ) =TΣ̂,Σ (p(tks ))x̂(tks ) (A.18) =TΣ̂,Σ (p(tks ))[Â(p(tk−1 ))x̂(tk−1 ) + B̂(p(tk−1 ))u(tk−1 )] e e e e ))−1 [A(p(tk−1 ))x̄(tk−1 ) =TΣ̂,Σ (p(tks ))TΣ̂,Σ (p(tk−1 e e e + B(p(tk−1 ))u(tk−1 )], e e (A.19) i.e., x̄(tks ) =Mp(tk ),p(tk−1 ) β. e s Along with Eq. (A.10), we can directly find that   β − x̄(tks ) = I − Mp(tk ),p(tk−1 β. ) e s (A.20) (A.21) Then, kβ − x̄(tks )k ≤ kI − Mp(tk ),p(tk−1 ) k.kβk. e s (A.22) Then, by replacing (A.16) and (12) in Eq. (A.22),we get 1) Step one: relating to first value of the interval. Now, we will characterize the difference between the states of the two LPV models over one interval of the scheduling signal, i.e., when the scheduling signal is constant. In this characterization, we expect to see the effect of the initial states, i.e., the difference at start time instant of the current interval of the scheduling signal, in addition to the length of the time interval ∆. kβ − x̄(tks )k ≤ KM (p)(αKT µ1 + KB )kukl∞ . (A.23) Then, combining (A.18) and (A.23), we find that kx(tks ) − x̄(tks )k ≤αkx(tk−1 ) − x̄(tk−1 )k (A.24) e e + KM (p)(αKT µ1 + KB )kukl∞ . In the last step, we recursively find the relation of the output difference with the initial state of the systems. 3) Step three: recursivity. From Eq. (A.14) and Eq. (A.24), As ϕ is a continuous function defined on a compact set, then it is uniformly continuous. we can recursively find that k k i (k−1)∆ kx(ti ) − x̄(ti )k ≤ α α kx(∆ − 1) − x̄(∆ − 1)k In particular, since ϕ(p1 , p1 ) = 0 for all p1 ∈ P, k−1 ∀ε 1 > 0 : ∃δ(ε1 ) > 0, such that, if kp1 − p2 k = X + αi α∆j Ku (p)kukl∞ , (A.25) k(p1 − p2 ) − (p1 − p1 )k < δ(ε1 ), then, j=0 kϕ(p1 , p2 ) − ϕ(p1 , p1 )k = kϕ(p1 , p2 )k < ε1 . (A.34) where Ku (p) = KM (p)(αKT µ1 + KB ). Notice that Hence, if p ∈ P is such that kp(t + 1) − p(t)k < δ(ε1 ), then TΣ̂,Σ (p(0)) is an isomorphism from LΣ̂ (p(0)) to LΣ (p(0)), KM (p) < ε1 . i.e., the local models of Σ̂ and Σ during the first ∆ time Then, we can take instances. This yields directly that,  α −1 ε1 = ε (αK µ + K )K . (A.35) T 1 B C kx(∆ − 1) − x̄(∆ − 1)k = 0. 1 − α∆ Then, This means that, k−1 α X KM (p)(αKT µ1 + KB )KC g(∆, KM (p), 1) = kx(tki ) − x̄(tki )k ≤ αi Ku (p)kukl∞ α∆j . (A.26) 1 − α∆ α j=0 ≤ ε1 (αKT µ1 + KB )KC 1 − α∆ Notice that, for α ∈ [0, 1], we have = ε. k−1 ∞ X X 1 ∆j ∆j . (A.27) Then, from Eq (19), with ∆ = 1, ∀ε > 0, ∃δ > 0 such that α ≤ α = 1 − α∆ i=0 j=0 if kp(t + 1) − p(t)k < δ, then, Then, replacing in the equation (A.26), we get kYΣ (u, p)(t) − YΣ̂ (u, p)(t)k ≤ g(∆, KM (p), 1).kukl∞ i ≤ ε.kukl∞ . α kx(tki ) − x̄(tki )k ≤ Ku (p)kukl∞ . (A.28) ∆ 1−α A.6 Proof of Theorem 4 Then, notice that, using Eq (A.10), we can write C(p(tki ))x̄(tki ) = C(p(tki ))TΣ̂,Σ (p(tki ))x̂(tki ) = Ĉ(tki )x̂(tki ) = (A.29) ŷ(tki ). C(p(tki )), Then, from Eq. (A.28), after multiplication by we get that, αi Ku (p) sup kC(p)k.kukl∞ . ky(tki )− ŷ(tki )k≤ 1 − α∆ p i.e., kYΣ (u, p)(tki ) − YΣ̂ (u, p)(tki )k ≤ g(∆, KM (p), i).kukl∞ . Remember that for all p ∈ P, KM (p) ≤ KM , then, kYΣ (u, p)(tki ) − YΣ̂ (u, p)(tki )k ≤ g(∆, KM , i).kukl∞ . A.4 Proof of Theorem 2 Remember that 0 < α < 1, then, αi = 0. lim i→∞ 1 − α∆ Then, from Eq. (20), we can find that lim g(∆, KM (p), i) = 0. i→∞ (A.30) (A.31) This means, ∀ε > 0, ∃∆m > 0, such that, ∀i ≥ ∆m : g(∆, KM (p), i) < ε, (A.32) Then, from Eq (19), ∀i > ∆m : kYΣ (u, p)(k∆ + i) − YΣ̂ (u, p)(k∆ + i)k ≤ g(∆m , KM (p), i).kukl∞ ≤ ε.kukl∞ . A.5 Proof of Theorem 3 Consider the map ϕ : P × P 7→ Rnx ×nx : (p1 , p2 ) → I − Mp1 ,p2 . −1 TΣ̂,Σ (A.33) Since TΣ̂,Σ is continuous, so is and hence ϕ is continuous. Remember that P is compact, then so is P × P. Notice that, from Eq. (20), we can find that, lim g(∆, KM (p), i) = 0. α→0 (A.36) This means that ∀ε > 0, ∃αm > 0, such that, ∀α < αm , g(∆, KM (p), i) < ε. (A.37) Then, from Eq. (19), in additions to our assumption that kAk < α, we directly get that, if α < αm , then, ∀t > 0, kYΣ (u, p)(t) − YΣ̂ (u, p)(t)k ≤ g(∆, KM (p), i).kukl∞ ≤ ε.kukl∞ .
3cs.SY
REGULARITY OF EDGE IDEALS AND THEIR POWERS arXiv:1712.00887v2 [math.AC] 11 Mar 2018 ARINDAM BANERJEE, SELVI BEYARSLAN, AND HUY TÀI HÀ Abstract. We survey recent studies on the Castelnuovo-Mumford regularity of edge ideals of graphs and their powers. Our focus is on bounds and exact values of reg I(G) and the asymptotic linear function reg I(G)q , for q ≥ 1, in terms of combinatorial data of the given graph G. 1. Introduction Monomial ideals are classical objects that live at the crossroad of three areas in mathematics: algebra, combinatorics and topology. Investigating monomial ideals has led to many important results in these areas. The new construction of edge ideals of (hyper)graphs has again resurrected much interest in and regenerated a large amount of work on this class of ideals (cf. [28, 51, 61] and references therein). In this paper, we survey recent works on the Castelnuovo-Mumford regularity of edge ideals of graphs and their powers. Castelnuovo-Mumford regularity is an important algebraic invariant which, roughly speaking, measures the complexity of ideals and modules. Restricting to the class of edge ideals of graphs, our focus is on studies that relate this algebraic invariant to the combinatorial data of given graphs. Our interest in powers of edge ideals is driven by the well-celebrated result of Cutkosky, Herzog and Trung [15], and independently, Kodiyalam [42], that for any homogeneous ideal I in a standard graded k-algebra R, the regularity of I q is asymptotically a linear function in q; that is, there exist constants a and b such that for all q  0, reg I q = aq + b. Generally, the problem of finding the exact linear form aq + b and the smallest value q0 such that reg I q = aq + b for all q ≥ q0 has proved to be very difficult. We, thus, focus our attention also on the problem of understanding the linear form aq + b and the value q0 for edge ideals via combinatorial data of given graphs. The on-going research program in which algebraic invariants and properties of edge ideals and their powers are investigated through combinatorial structures of corresponding graphs has produced many exciting results and, at the same time, opened many further interesting questions and conjectures. It is our hope to collect these works together in a systematic way to give a better overall picture of the problems and the current state of the art of this research area. For this purpose, we shall state theorems and present sketches of the proofs; instead of giving full detailed arguments, our aim is to exhibit general ideas behind these results, the similarities and differences when developing from one theorem to the next. This paper can be viewed as a complement to the survey done in [27]. While in [27] the focus was on the regularity of squarefree monomial ideals in general, our attention in this paper is restricted mostly to edge ideals of graphs, but we enlarge our scope by discussing 1 also the regularity of powers of edge ideals. The later is an important area of study itself, with a deep motivation from geometry, and has seen a surge of interest in the last few years. The paper is outlined as follows. In Section 2, we collect notations and terminology used in the paper. In Section 3, we present necessary tools which were used in works in this area. Particularly, we shall give Hochster’s and Takayama’s formulas, which relate the graded Betti numbers of a monomial ideal to the reduced homology groups of certain simplicial complexes. We shall also describe inductive techniques that have been the backbones of most of the studies being surveyed. In Section 4, we survey results on the regularity of edge ideals of graphs. This section is divided into two subsections; the first one focusses on bounds on the regularity in terms of combinatorial data of the graph, and the second one exhausts cases where the regularity of an edge ideal can be computed explicitly. Section 5 discusses the regularity of powers of edge ideals. This section again is divided into two subsections, which in turn examine bounds for the asymptotic linear function of the regularity of powers of edge ideals and cases when this asymptotic linear function can be explicitly described. In Section 6, we recall a number of results extending the study of edge ideals of graphs to hypergraphs. Since, our focus in this paper is on mostly edge ideals of graphs, our results in Section 6 will be representative rather than exhaustive. We end the paper with Section 7, in which we state a number of open problems and questions which we would like to see answered. We hope that these problems and questions would stimulate further studies in this research area. Acknowledgement. The authors would like to thank the organizers of SARC (Southern Regional Algebra Conference) 2017 for their encouragement, which led us to writing this survey. The last named author is partially supported by the Simons Foundation (grant #279786) and Louisiana Board of Regent (grant #LEQSF(2017-19)-ENH-TR-25). 2. Preliminaries In this section we recall preliminary notations and terminology of combinatorics and algebra that will be used throughout this survey. In Subsection 2.1 we give various definitions on graphs, hypergraphs, and simplicial complexes. In Subsection 2.2 we recall basic homological algebra terminology. Finally, in the last subsection we define various algebraic objects associated to (hyper)graphs and simplicial complexes. 2.1. Combinatorial preliminaries. For any finite simple graph G, with set of vertices V (G) and set of edges E(G), we define some graph-theoretic notions as follows. For any A ⊆ V (G), the induced subgraph on A is the graph whose set of vertices is A and whose edges are exactly the edges of G that join two elements of A. In the following example (Figure 1) H 0 is an induced subgraph of H, while H 00 is not an induced subgraph of H as it misses the edge yw of H. For any vertex x in a graph G the degree of x, denoted by d(x) is the number of vertices connected to x. For any vertex x in a graph G the neighborhood of x, denoted by NG [x] is the set consisting of x and all its neighbors. For the graph H 00 above, d(x) = 2 and 2 y z H: x w t y s z H 0: x y z H 00 : x w w s s Figure 1. Induced subgraphs NG [x] = {x, y, w}. For any graph G and any vertex x, by G \ x we denote the induced subgraph on V (G) \ {x}. For any graph G, the complement graph, denoted by Gc , is the graph whose vertices are the vertices of G and whose edges are the non-edges of G, i.e., for a, b ∈ V (G), ab is an edge in Gc if and only if ab is not an edge in G. For the graph H in Figure 1, the following is H c . y z H c: x w t s Figure 2. Complement graph A cycle of length n in a graph G is a closed walk along its edges, x1 x2 , x2 x3 , . . . , xn−1 xn , xn x1 , such that xi 6= xj for i 6= j. We denote the cycle on n vertices by Cn . A chord in the cycle Cn is an edge xi xj where xj 6= xi−1 , xi+1 . A graph is said to be chordal if for any cycle of length greater than or equal to 4 there is a chord. A graph is said to be co-chordal if the complement of G is chordal. The graph H in Figure 2 is chordal and H c is co-chordal. A forest is a graph without any cycles. A tree is a connected forest. A complete graph (or clique) on n vertices is a graph where for any two vertices there is an edge joining them. It is denoted by Kn . 3 A bipartite graph is a graph whose vertices can be split into two groups such that there is no edge between vertices of same group; only edges are between vertices coming from different groups. It is easy to see that a graph is bipartite if and only if it is without any cycle of odd length. We use Km,n to denote the complete bipartite graph with m vertices on one side, and n on the other. We observe that H 00 in Figure 1 has no cycle, so it is a tree. As a consequence it is also a bipartite graph with bipartition {x, z, s} and {y, w}. Let G be a graph. We say two disjoint edges uv and xy form a gap in G if G does not have an edge with one endpoint in {u, v} and the other in {x, y}. A graph without an induced gap is called gap-free. Equivalently, G is gap-free if and only if Gc contains no induced C4 . The graph H in Figure 1 is gap-free. In the following graph {x, y} and {z, w} form a gap. y z G: x w s Figure 3. A graph which is not gap-free A matching in a graph is a set of pairwise disjoint edges. A matching is called an induced matching if the induced subgraph on the vertices of the edges forming the matching has no other edge. We observe that {x, y} and {z, w} forms an induced matching for graph G in Figure 3. Any graph isomorphic to K1,3 is called a claw. Any graph isomorphic to K1,n is called an n-claw. If n > 1, the vertex with degree n is called the root in K1,n . A graph without an induced claw is called claw-free. A graph without an induced n-claw is called n-claw-free. y x w t Figure 4. A 3-claw (or simply, a claw) A graph is called a diamond if it is isomorphic to the graph with vertex set {a, b, c, d} and edge set {ab, bc, ac, ad, cd}. A graph without an induced diamond is called diamond-free. 4 A graph is said to be planar if as a 1-dimensional topological space it can be embedded in the complex plane, i.e., if it can be drawn in the plane in such a way that no pair of edges cross. The following graph in Figure 5 is a diamond. We observe that it is also planar. y z x t Figure 5. A diamond Any graph isomorphic to the graph with set of vertices {w1 , w2 , w3 , w4 , w5 } and set of edges {w1 w3 , w2 w3 , w3 w4 , w3 w5 , w4 w5 } is called a cricket. A graph without an induced cricket is called cricket-free. It is easy to see that a claw-free graph is also cricket-free. y w x t z Figure 6. A cricket An edge in a graph is called a whisker if one of its vertices has degree one. A graph is called an anticycle if its complement is a cycle. x1 x4 x7 x5 x2 x3 x8 x9 x6 Figure 7. A hypergraph A hypergraph is the natural higher degree analogue of graphs, in the sense that we allow an edge to be a collection of any number of vertices. Formally speaking, a hypergraph 5 H = (V (H), E(H)) consists of the vertices V (H) = {x1 , . . . , xn } and the edges E(H), where E(H) is a collection of nonempty subsets of the vertices. With this notation, a graph G is a hypergraph whose edges are subsets of cardinality 2. By abusing notation, we often identify an edge {xi1 , . . . , xir } ∈ E(H) with the monomial xi1 . . . xir . Figure 7 depicts a hypergraph with edges {x1 x2 x3 x4 , x3 x4 x5 , x5 x6 x7 , x7 x8 , x9 }. In this example, the vertex x9 can also be viewed as an isolated vertex. A clutter is a hypergraph none of whose edges contains any other edge as a subset. The hypergraph in Figure 7 is a clutter. A simplicial complex with vertices {x1 , . . . , xn } is subset of the power set of {x1 , . . . , xn } which is closed under the subset operation. The sets that constitute a simplicial complex are called its faces. Maximal faces under inclusion are called facets. Figure 8 gives a simpicial complex with facets {a, b, f }, {c, d, e}, {f, e},{b, c}. e f a d b c Figure 8. A simplicial complex An independent set in a graph G is a set of vertices no two of which forms an edge. The independence complex of a graph G, denoted by ∆(G), is the simplicial complex whose faces are independent sets in G. a e c d b f Figure 9. A simple graph whose independence complex is in Figure 8 Let ∆ be a simplicial complex, and let σ ∈ ∆. The deletion of σ in ∆, denoted by del∆ (σ), is the simplicial complex obtained by removing σ and all faces containing σ from ∆. The link of σ in ∆, denoted by link∆ (σ), is the simplicial complex whose faces are {F ∈ ∆ | F ∩ σ = ∅, σ ∪ F ∈ ∆}. A simplicial complex ∆ is recursively defined to be vertex decomposable if either: 6 (i) ∆ is a simplex; or (ii) there is a vertex v in ∆ such that both link∆ (v) and del∆ (v) are vertex decomposable, and all facets of del∆ (v) are facets of ∆. A vertex satisfying condition (2) is called a shedding vertex, and the recursive choice of shedding vertices is called a shedding order of ∆. Recall that a simplicial complex ∆ is said to be shellable if there exists a linear order of Sk−1  T its facets F1 , F2 , . . . , Ft such that for all k = 2, . . . , t, the subcomplex Fk is pure i=1 Fi and of dimension (dim Fk − 1). Here F represents the simplex over the vertices of F . It is a celebrated fact that pure shellable complexes give rise to Cohen-Macaulay Stanley-Reisner rings. Recall also that a ring or module is sequentially Cohen-Macaulay if it has a filtration in which the factors are Cohen-Macaulay and their dimensions are increasing. This property corresponds to (nonpure) shellability in general. Vertex decomposability can be thought of as a combinatorial criterion for shellability and sequentially Cohen-Macaulayness. In particular, for a simplicial complex ∆, ∆ vertex decomposable ⇒ ∆ shellable ⇒ ∆ sequentially Cohen-Macaulay. 2.2. Algebraic preliminaries. Let S = K[x1 , . . . , xn ] be a polynomial ring over a field K. Let M be a finitely generated Zn -graded S-module. It is known that M can be successively approximated by free modules. Formally speaking, there exists an exact sequence of minimal possible length, called a minimal free resolution of M : dp d d d 2 1 0 0 −→ Fp −→ Fp−1 · · · −→ F1 −→ F0 −→ M −→ 0 L (∗) βi,σ Here, Fi = σ∈Zn S(−σ) , where S(−σ) denotes the free module obtained by shifting the degrees in S by σ. The numbers βi,σ ’s are positive integers and are called the multigraded Betti numbers of M . We often identify σ with the monomial whose exponent vector is σ. For example, over K[x, y], we may write βi,x2 y (M ) instead of βi,(2,1) (M ). P For every j ∈ Z, βi,j = {σ | |σ|=j} βi,σ is called the (i, j)-th standard graded Betti number of M . Three very important homological invariants that are related to these numbers are the Castelnuovo-Mumford regularity, or simply regularity, the depth and the projective dimension, denoted by reg(M ), depth(M ) and pd(M ) respectively: reg M = max{|σ| − i | βi,σ 6= 0} depth M = inf{i | Exti (K, M ) 6= 0} pd M = max{i | there is a σ, βi,σ 6= 0}. If S is viewed as a standard graded K-algebra and M is a graded S-module, then the graded Betti numbers of M are also given by βi,j (M ) = dimk Tori (M, K)j , and so we have reg M = max{j − i | Tori (M, K)j 6= 0} pd M = max{i | Tori (M, K) 6= 0} depth M = n − pd M. In practice, we often work with short exact sequences, so it is worthwhile to mention that the regularity can also be defined via the vanishings of local cohomology modules with 7 respect to the “irrelevant maximal ideal” m = (x1 . . . , xn ). Particularly, for i ≥ 0, define ( i i max{j | Hm (M )j 6= 0} if Hm (M ) 6= 0 ai (M ) := −∞ otherwise. Then, the regularity of M is also given by reg M = max{ai (M ) + i}. i Example 2.1. Let M = Q[x1 , . . . , x5 ]/(x1 x2 , x2 x3 , x3 x4 , x4 x5 , x5 x1 ). Then the minimal free resolution of M is: d3 d2 d1 d0 0 −→ F3 −→ F2 −→ F1 −→ F0 −→ M −→ 0 Here: β0,σ = 1 if σ = 1, and β0,σ = 0 otherwise β1,σ = 1 if σ = x1 x2 , x2 x3 , x3 x4 , x4 x5 , x5 x1 , and β1,σ = 0 otherwise β2,σ = 1 if σ = x1 x2 x3 , x2 x3 x4 , x1 x2 x5 , x1 x4 x5 , x3 x4 x5 , and β2,σ = 0 otherwise β3,σ = 1 if σ = x1 x2 x3 x4 x5 , and β3,σ = 0 otherwise An ideal I in S is said to be unmixed if all its associated primes are minimal of same height. We say I (or equivalently S/I) is Cohen-Macaulay if the Krull dimension and depth are equal. Cohen-Macaulay ideals are always unmixed and known to have many nice geometric properties. It can be checked that the module M in Example 2.1 is Cohen-Macaulay. 2.3. Algebraic objects with underlying combinatorial structures. For any (hyper)graph H over the vertex set V (H) = {x1 , . . . , xn }, its edge ideal is defined as follows: Y I(H) = ( x e ∈ E(H)) ⊆ S = K[x1 , . . . , xn ]. x∈e Example 2.2. The edge ideal of the hypergraph, say H, in Figure 7, is I(H) = (x1 x2 x3 x4 , x3 x4 x5 , x5 x6 x7 , x7 x8 , x9 ). For any simplicial complex ∆ over the vertex set V = {x1 , . . . , xn }, its Stanley-Reisner ideal is defined as follows: Y I∆ = ( x e is a minimal non-face of ∆) ⊆ S. x∈e Example 2.3. The Stanley-Reisner ideal of the simplicial complex in Figure 8 is I∆ = (ac, ad, ae, bd, be, cf, df ). As we have seen before, (hyper)graphs are related to simplicial complexes via the notion of independence complex. The algebraic view of this relation exposes the following equality. Lemma 2.4. Let G be a simple (hyper)graph and let ∆(G) be its independence complex. Then I(G) = I∆(G) . 8 Example 2.5. The edge ideal of the graph G in Figure 9 is the same as the the StanleyReisner ideal of the simplicial complex ∆ in Figure 8. Note that ∆ = ∆(G). I(G) = (ae, ad, bd, be, bf, ec, ef ) For any simple graph G with V (G) = {x1 , . . . , xn }, we define the t-path ideal as: It (G) = (xi1 · · · xit | ik 6= il for k 6= l, xik xik+1 an edge of G). Example 2.6. The 3-path ideal of the five cycle C5 : x1 x2 x3 x4 x5 is I3 (C5 ) = (x1 x2 x3 , x2 x3 x4 , x3 x4 x5 , x4 x5 x1 , x5 x1 x2 ). Finally, as a matter of convention, for any (hyper)graph G, by reg G we mean reg I(G). 3. Formulas and inductive approaches Computing non-vanishings of local cohomology modules or Betti numbers of an ideal can be quite complicated. As a result, inductive techniques that relate regularity of edge ideals with simplicial complexes and smaller ideals are employed as a common tool in the literature. In this context, induced structures such as induced subcomplexes and induced subgraphs have proven to be significant objects to investigate regularity of an edge ideal and its powers. In this section, we focus on the methods that enable us to bound and compute regularity of an edge ideal and its powers. We start the section by recalling two important formulas. Then we address a few inductive bounds that are widely used in the literature. 3.1. Hochster’s and Takayama’s Formulas. Hochster’s formula has been a significant tool in the study of squarefree monomial ideals due to its power to relate the multigraded Betti numbers of a simplicial complex ∆ to the non-vanishings of the reduced simplicial homology groups of ∆ and its induced subcomplexes. Theorem 3.1 (Hochster’s Formula [35]). Let ∆ be a simplicial complex on the vertex set V and let I(∆) be its Stanley-Reisner ideal. Then βi,j (I(∆)) = X  e j−i−2 (∆W ; K) dimk H W ⊆V, |W |=j where ∆W is the restriction of ∆ to the vertex set W. For an arbitrary monomial ideal, Hochster’s formula can not be employed. Takayama’s formula given in [58] can perform a similar task as Hochster’s formula for this class of ideals. Let I ⊆ S = K[x1 , . . . , xn ] be a monomial ideal. Takayama’s formula provides a combinatorial description for the non-vanishings of Zn -graded component Hmi (S/I)a for a ∈ Zn , and this description is given in terms of certain simplicial complexes ∆a (I) related to I. Note that S/I is an Nn -graded algebra, and so Hmi (S/I) is a Zn -graded module over S/I. The simplicial complex ∆a (I) is called the degree complex of I. The construction of ∆a (I) was first given in [58] and then simplified in [48]. We recall the construction from [48]. 9 For a = (a1 , . . . , an ) ∈ Zn , set xa = xa11 · · · xann and Ga := {j ∈ {1, . . . , n} | aj < 0}. For every subset F ⊆ {1, . . . , n}, let SF = S[x−1 j | j ∈ F ]. Define ∆a (I) = {F \ Ga | Ga ⊆ F, xa ∈ / ISF }. Theorem 3.2 (Takayama’s Formula [58]). Let√I ⊆ S be a monomial ideal, and let ∆(I) denote the simplicial complex corresponding to I. Then (  e i−|Ga |−1 (∆a (I), K dimk H i dimk Hm (S/I)a = 0 if Ga ∈ ∆(I), otherwise. The formula stated in [48] and here is different than the original formula introduced in [58]. The original formula has additional conditions on a for Hmi (S/I)a = 0. It follows from the proof in [58] that those conditions can be omitted. Due to the equality between edge ideals of graphs and Stanley-Reisner ideals of their independence complexes, we can employ Hochster’s and Takayama’s formulas in the study of regularity of edge ideals. In order to deal with arbitrary monomial ideals, polarization is proved to be a powerful process to obtain a squarefree monomial ideal from a given monomial ideal. For details of polarization we refer the reader to [32]. Definition 3.3. Let M = xa11 . . . xann be a monomial in S = K[x1 , . . . , xn ]. Then we define the squarefree monomial P (M ) (polarization of M ) as P (M ) = x11 . . . x1a1 x21 . . . x2a2 . . . xn1 . . . xnan in the polynomial ring R = K[xij | 1 ≤ i ≤ n, 1 ≤ j ≤ ai ]. If I = (M1 , . . . , Mq ) is an ideal in S, then the polarization of I, denoted by I pol , is defined as I pol = (P (M1 ), . . . , P (Mq )). The regularity is preserved under polarization. Corollary 3.4. [32, Corollary 1.6.3.d] Let I ⊂ S be a monomial ideal and I pol ⊂ R be its polarization. Then reg(S/I) = reg(R/I pol ). 3.2. Inductive techniques. We start the section with an easy yet essential consequence of Hochster’s formula that links the regularity of a graph with regularity of its induced subgraphs. Lemma 3.5. Let G be a simple graph. Then reg H ≤ reg G for any induced subgraph H of G. For any homogeneous ideal I ⊆ S and any homogeneous element m of degree d, the following short exact sequences are used as standard tools in commutative algebra and also proved to be very useful in computing regularity of edge ideals and their powers. 0 −→ R R ·m R (−d) −→ −→ −→ 0 I:m I I + (m) 10 (3.1) Let I and J be ideals in S. Another useful exact sequence is: 0 −→ R R R R → ⊕ −→ −→ 0 I ∩J I J I +J (3.2) We can see how regularity changes in a short exact sequence by taking the associated long exact sequence of local cohomology modules. Particularly, we have the following inductive bound (the second statement is the content of [17, Lemma 2.10 ]). Lemma 3.6. Let I ⊆ S be a monomial ideal, and let m be a monomial of degree d. Then reg I ≤ max{reg(I : m) + d, reg(I, m)}. Furthermore, if x is a variable appearing in I, then reg I ∈ {reg(I : x) + 1, reg(I, x)}. In the statement of Lemma 3.6, the expression x is a variable appearing in I means some of the minimal generators of I is divisible by x. Note that if x is a variable not appearing in I, then reg(I, x) = reg I. In case of edge ideals, if x is an isolated vertex in G, we can drop the vertex x when computing regularity. Thus reg(I(G) : x) = reg I(G \ NG [x]) and reg(I(G), x) = reg(I(G \ x)) for any vertex x in G. Then Lemma 3.6 can be restated in terms of edge ideals. Lemma 3.7. Let x be a vertex in G. Then reg G ∈ {reg(G \ NG [x]) + 1, reg(G \ x)}. Kalai and Meshulam [39] proved the following result for squarefree monomial ideals and Herzog [31] generalized it to any monomial ideal. Theorem 3.8. Let I1 , . . . , Is be squarefree monomial ideals in S. Then s s  X  X reg S/Ii reg S Ii ≤ i=1 i=1 In the case of edge ideals, we have the following bound. Corollary 3.9. Let G be a simple graph. If G1 , . . . , Gs are subgraphs of G such that E(G) = Ss i=1 E(Gi ) then s   X reg S/I(G) ≤ reg S/I(Gi ) i=1 If G is the disjoint union of graphs G1 , . . . , Gs then the above equality is achieved by using Künneth formula in algebraic topology. Corollary 3.10. Let G be a simple graph. If G can be written as a disjoint union of graphs G1 , . . . , Gs then s   X reg S/I(G) = reg S/I(Gi ) i=1 11 In the study of powers of edge ideals, Banerjee developed the notion of even-connection and gave an important inductive inequality in [5]. Theorem 3.11. For any simple graph G and any s ≥ 1, let the set of minimal monomial generators of I(G)s be {m1 , . . . , mk }. Then reg I(G)s+1 ≤ max{reg(I(G)s+1 : ml ) + 2s, 1 ≤ l ≤ k, reg I(G)s }. In particular, if for all s ≥ 1 and for all minimal monomial generators m of I(G)s , reg (I(G)s+1 : m) ≤ 2 and reg I(G) ≤ 4, then reg I(G)s+1 = 2s + 2 for all s ≥ 1; as a consequence I(G)s+1 has a linear minimal free resolution. Working with the above inequality requires a good understanding of the ideal (I(G)s+1 : m) and its generators when m is a minimal monomial generator of I(G)s . The even-connection definition is key to attain this goal. We recall the definition of even-connectedness and its important properties from [5]. Definition 3.12. Let G = (V, E) be a graph. Two vertices u and v (u may be the same as v) are said to be even-connected with respect to an s-fold product e1 · · · es where ei ’s are edges of G, not necessarily distinct, if there is a path p0 p1 · · · p2k+1 , k ≥ 1 in G such that: (1) (2) (3) (4) p0 = u, p2k+1 = v. For all 0 ≤ l ≤ k − 1, p2l+1 p2l+2 = ei for some i. For all i, | {l ≥ 0 | p2l+1 p2l+2 = ei } | ≤ | {j | ej = ei } |. For all 0 ≤ r ≤ 2k, pr pr+1 is an edge in G. Fortunately, it turns out that (I(G)s+1 : m) is generated by monomials in degree 2. Theorem 3.13. [5, Theorem 6.1 and Theorem 6.7] Let G be a graph with edge ideal I = I(G), and let s ≥ 1 be an integer. Let m be a minimal generator of I s . Then (I s+1 : m) is minimally generated by monomials of degree 2, and uv (u and v may be the same) is a minimal generator of (I s+1 : m) if and only if either {u, v} ∈ E(G) or u and v are even-connected with respect to m. After polarization, the ideal (I(G)s+1 : m) can be viewed as the edge ideal of a graph that is obtained from G by adding even-connected edges with respect to m. Some of the combinatorial properties of this ideal in relation to G are studied in [37]. 4. Regularity of edge ideals Computing and/or bounding the regularity of edge ideals is the foundation in the study of regularity of powers of edge ideals. In this section, we identify the combinatorial structures that are related to regularity of edge ideals. First, we collect the general upper and lower bounds given for the regularity of edge ideals, then we present the list of known classes of graphs where the regularity is computed explicitly. Note that regularity of an edge ideal is bounded below by 2, which is the generating degree of an edge ideal. Thus, identifying combinatorial structures of a graph with regularity 2 12 can be considered as the base case of results in this section. The following combinatorial characterization of such graphs is nowadays often referred to as Fröberg’s characterization. It was, in fact, given first in topological language by Wegner [63] and later, independently, by Lyubeznik [45] and Fröberg [25] in monomial ideals language. Theorem 4.1 ([25, Theorem 1]). Let G be a simple graph. Then reg I(G) = 2 if and only if G is a co-chordal graph. 4.1. Lower and upper bounds. One of the graph-theoretical invariants that can be related to the regularity is the induced matching number. The first result revealing this relation is due to Katzman and it provides a general lower bound on the regularity of edge ideals. Theorem 4.2 ([41, Lemma 2.2]). Let G be a simple graph and ν(G) be the maximum size of an induced matching in G. Then reg I(G) ≥ ν(G) + 1. Sketch of proof. Let {e1 , . . . , er } be an induced matching of maximal size in G. Suppose H is the induced subgraph of G with E(H) = {e1 , . . . , er }. Note that all the edges in H are disjoint. Thus reg(H) = r + 1. By Lemma 3.5, reg(G) ≥ ν(G) + 1.  Another graph-theoretical invariant of interest is the matching number and this invariant actually emerges as a general upper bound for any graph. Theorem 4.3 ([29, Theorem 6.7], [64, Theorem 11]). Let G be a simple graph. Let β(G) be the minimum size of a maximal matching in G. Then reg I(G) ≤ β(G) + 1. Example 4.4. Let G be the graph given in Figure 10. It is clear that ν(G) = β(G) = 3. Then reg G = 4 by Theorem 4.2 and Theorem 4.3. In general, if G is a simple graph with disjoint edges, then the above bounds coincide and become an equality. Figure 10. A graph with disjoint edges Comparing the existing lower and upper bounds yields to interesting classifications, particularly when these bounds coincide. For example, Cameron and Walker [16, Theorem 1] gave the first classification of graphs G with ν(G) = β(G). Then Hibi et al [34] modified their result slightly and gave a full generalization with some corrections. Example 4.5. Let G be the graph given in Figure 11. One can easily verify that β(G) = 2. However reg G = 2 by Fröberg’s characterization. In general, we can find examples of graphs where β(G) + 1 can be arbitrarily large compared to reg G. 13 Figure 11. A co-chordal graph The above upper bound is strengthened by making use of co-chordal subgraph covers of a graph and this bound is proved by Woodroofe. Recall that a graph is co-chordal if its complement is chordal and co-chord(G), the co-chordal number of G, denotes the least number of co-chordal subgraphs of G whose union is G. The graph in Figure 11 is an example of a co-chordal graph. Let {e1 , . . . , er } be a maximal matching of minimal size in G. For each i, let Gi be the subgraph of G with edges ei ∪ { edges in G adjacent to ei }. Note that G1 , . . . , Gr forms a co-chordal subgraph cover of G, thus co-chord(G) ≤ β(G) and the bound in Theorem 4.6 improves the bound in Theorem 4.3. Theorem 4.6 ([64, Lemma 1]). Let G be a simple graph. Then reg I(G) ≤ co-chord(G) + 1. Sketch of proof. Let co-chord(G) = r and let G1 , . . . , Gr be a co-chordal cover of G. It follows from Fröberg’s characterization of regularity 2 graphs, Theorem 4.1, that reg(Gi ) = 2 for each i ∈ {1, . . . , r}. Then the result follows immediately from Corollary 3.9.  Gap-free graphs have also been of interest in the investigation of regularity. These graphs arise naturally since their induced matching number is 1 which is the smallest possible number it could be. However, computing or bounding the regularity of this class of graphs is not so easy. Furthermore, there are very few examples on how large the regularity of such edge ideals can be, see [53] by Nevo and Peeva for an example of a gap-free graph G in 12 variables with reg G = 4. Putting an additional condition on the gap-freeness of G may result with an upper bound and it is indeed achieved in [52] . Theorem 4.7 ([52, Theorem 1.2], [17, Proposition 19]). If G is gap-free and claw-free, then reg I(G) ≤ 3. Sketch of proof. Let x be a vertex in G with the maximum possible degree. By Lemma 3.7, we have reg(G) ≤ max{reg(G \ NG [x]) + 1, reg(G \ x)}. Note that induced subgraphs G \ NG [x] and G \ x of G are both gap-free and claw-free. It follows from the induction on the number of vertices that reg(G \ x) ≤ 3. Thus it suffices to show that reg(G \ NG [x]) ≤ 2. By Fröberg’s characterization, it is enough to prove that (G \ NG [x])c is chordal and it is proved by contradiction: (1) Suppose (G \ NG [x])c has an induced cycle on w1 , w2 , . . . , wn (in order) of length at least 4. (2) Any vertex of G is distance 2 from x in G by [17, Proposition 3.3], then {x, y} and {y, w1 } are edges in G for some vertex y. 14 (3) Note that either {y, w2 } or {y, wn } must be an edge in G. Otherwise edges {w2 , wn } and {x, y} form a gap in G. (4) Without loss of generality, suppose {y, w2 } is an edge. Then the induced subgraph on {x, y, w1 , w2 } is a claw in G, a contradiction.  Example 4.8. There are examples of gap-free and claw-free graphs where both values in Theorem 4.7 can be attained for regularity. For example, if Gc is a tree then reg G = 2 and if Gc is Cn for n ≥ 5 then reg G = 3. This result is generalized to n-claw free and gap-free graphs by Banerjee in [5]. The proof of the general case follows similarly and uses induction on n. Theorem 4.9 ([5, Theorem 3.5]). If G is gap-free and n-claw-free, then reg I(G) ≤ n. Another special class of graphs are planar graphs. This class of graphs emerges frequently in applications since they can be drawn in the plane without edges crossing. It is given in [64] that even though regularity of a planar graph may be arbitrarily large, regularity of its complement can be bounded above by 4. Theorem 4.10 ([64, Theorem 3.4]). If G is a planar graph, then reg I(Gc ) ≤ 4. 4.2. Exact values. Computing the regularity for special classes of graphs has been an attractive research topic in the recent years. To that extend characterizing edge ideals with certain regularity has been of interest as well. However, very little is known in the latter case. A combinatorial characterization of edge ideals with regularity 3 is still not known. However, a partial result for bipartite graphs is achieved by Fernández-Ramos and Gimenez in [23]. Recall that a graph G is bipartite if the vertices V can be partitioned into disjoint subsets V = X ∪ Y such that {x, y} is an edge in G only if x ∈ X and y ∈ Y or vice versa. The bipartite complement of a bipartite graph G, denoted by Gbc , is the bipartite graph over the same partition of vertices and {x, y} ∈ Gbc if and only if {x, y} ∈ / G for x ∈ X, y ∈ Y. Theorem 4.11 ([23, Theorem 3.1]). Let G be a connected bipartite graph. Then reg I(G) = 3 if and only if Gc has no induced cycles of length ≥ 4 and Gbc has no induced cycles of length ≥ 6. In most of the known cases, it turns out that regularity can be expressed in terms of the induced matching number. We first recall the results when the regularity is one more than the induced matching number. Theorem 4.12. Let G be a simple graph and ν(G) be the induced matching number of G. Then reg I(G) = ν(G) + 1 in the following cases: 15 (a) (b) (c) (d) (e) (f ) (g) (h) G is a chordal graph (see [29]); G is a weakly chordal graph (see [64]); G is sequentially Cohen-Macaulay bipartite graph (see [62]); G is unmixed bipartite graph (see [43]); G is very well-covered graph (see [46]); G is vertex decomposable graph and has no closed circuit of length 5 (see [40]); G is a (C4 , C5 )-free vertex decomposable graph (see [7]); G is a unicyclic graph with cycle Cn when (i) n ≡ 0, 1 (mod 3) (see [2, 10, 36]) or (ii) ν(G \ Γ(G)) < ν(G) where Γ(G) is the collection of all neighbors of the roots in the rooted trees attached to Cn (see [2]). x w y t z Figure 12. A vertex decomposable and a (weakly) chordal graph Remark 4.13. Chordal graphs are vertex decomposable and vertex decomposable graphs are sequentially Cohen-Macaulay (see [26, 65]). Sequentially Cohen-Macaulay bipartite graphs are vertex decomposable (see [62]). Also if G is a very well-covered graph then G is unmixed and if G is chordal, then it is weakly chordal. Thus, (b) implies (a), and (e) implies (d). Note that bipartite graphs have no odd cycles. Hence, (f ) implies (c). Example 4.14. Let G be the graph given in Figure 13. Then Γ(G) = {x6 , x7 , x8 } and ν(G \ Γ(G)) = 2 < ν(G) = 3. Furthermore, this graph does not belong to any of the classes described in (a)—(g). x5 x6 x7 x4 x1 x2 x8 x9 x10 x3 Figure 13. A graph satisfying (h) (ii) in Theorem 4.12 16 It is of interest to find different expressions for the regularity of edge ideals. The next result collects all known cases in which the regularity has a different expression than the above classes and it is still in terms of induced matching. Theorem 4.15. Let G be a simple graph and ν(G) be the induced matching number of G. Then reg I(G) = ν(G) + 2 in the following cases: (a) G is an n-cycle Cn when n ≡ 2 (mod 3) (see [10, 36]); (b) G is a unicyclic graph with cycle Cn when n ≡ 2 (mod 3) and ν(G \ Γ(G)) = ν(G) where Γ(G) is the collection of all neighbors of the roots in the rooted trees attached to Cn (see [2]). 5. Regularity of powers of edge ideals The regularity of powers of an edge ideal is considerably harder to compute than that of the edge ideal itself. However, in many cases, known bounds and exact formulas for the regularity of I(G) inspire new bounds and exact formulas for the regularity of I(G)q , for q ≥ 1. This section is divided into two parts, where in the first subsection we list a number of lower and upper bounds, and in the second subsection we give the exact values of reg I(G)q , for q ≥ 1, for special classes of graphs. 5.1. Lower and upper bounds. Just like with studies on the regularity of edge ideals, the induced matching number of a graph is ultimately connected to the regularity of powers of its edge ideal. The following general lower bound generalizes that of Theorem 4.2 for an edge ideal to its powers. Theorem 5.1 ([10, Theorem 4.5]). Let G be any graph and let I = I(G) be its edge ideal. Then for all q ≥ 1, we have reg I q ≥ 2q + ν(G) − 1. Sketch of proof. The proof is based on the following observations: (1) If H is an induced subgraph of G then for any i, j ∈ Z, we have βi,j (I(H)q ) ≤ βi,j (I(G)q ). (5.1) In particular, this gives reg I(H)q ≤ reg I(G)q . (2) If H is the induced subgraph of G consisting of a maximal induced matching of ν(G) edges then for any q ≥ 1, we have reg I(H)q = 2q + ν(G) − 1. (5.2) To establish the first observation, recall that the upper-Koszul simplicial complex K α (I) associated to a monomial ideal I ⊆ S = K[x1 , . . . , xn ] at degree α ∈ Zn consists of faces n o xα W ⊆ {1, . . . , n} Q ∈I , w∈W w 17 and a variation of Hochster’s formula (Theorem 3.1) gives e i−1 (K α (I); K) for all i ≥ 0. βi,α (I) = dimk H The inequality (5.1) then follows by noting that for α ∈ Zn with supp(α) ⊆ VH , K α (I(H)q ) = K α (I(G)q ). The second observation is proved by induction, noting that in this case I(H) is a complete intersection.  Figure 14. A uniyclic graph Example 5.2. Though there are many classes of graphs for which the lower bound given in Theorem 5.1 is attained, there are also classes of graphs where the asymptotic linear function reg I(G)q is strictly bigger than 2q + ν(G) − 1 for all q  0. Let G be the graph depicted in Figure 14. Then it is easy to see that ν(G) = 2, whereas reg I(G)q = 2q + 2 for q ≥ 1. A similar general upper bound generalizing that of Theorem 4.6 is, unfortunately, not available. It is established, by Jayanthan, Narayanan and Selvaraja [37], only for a special class of graphs — bipartite graphs. Theorem 5.3 ([37, Theorem 1.1]). Let G be a bipartite graph and let I = I(G) be its edge ideal. Then for all q ≥ 1, we have reg I q ≤ 2q + co-chord(G) − 1. Sketch of proof. The statement is proved by induction utilizing Theorem 3.11. The crucial step in the proof is to show that for any q ≥ 1 and any collection of edges e1 , . . . , eq of G (not necessarily distinct), we have reg(I q+1 : e1 . . . eq ) ≤ co-chord(G) + 1. (5.3) Observe that when G is a bipartite graph, by [1, Lemma 3.7], I q+1 : e1 . . . eq = (((I 2 : e1 )2 : . . . )2 : eq ), and so (5.3) itself can be obtained by induction. To this end, let G0 be the graph associated to the polarization of I 2 : e for an edge e in G (which is generated in degree 2 by Theorem 3.13). The proof is completed by establishing the following facts: (1) reg I(G0 ) ≤ co-chord(G0 ) + 1. This inequality was proved to hold for any graph in [64]. (2) co-chord(G0 ) ≤ co-chord(G). This is combinatorial statement, which can be shown by analyzing how G0 is constructed from G. 18  Remark 5.4. Let G be a 4-cycle. We can easily verify that ν(G) = 1 and co-chord(G) = 1. Since the lower bound in Theorem 5.1 coincides with the upper bound in Theorem 5.3, we have reg I(G)q = 2q = 2q + ν(G) − 1 = 2q + co-chord(G) − 1 for all q ≥ 1. Classes of graphs for which the two upper and lower bounds agree were discussed in [37, Corollary 5.1]. On the other hand, the upper bound given in Theorem 5.3 can be strict. For example, if G is C8 , then ν(G) = 2 and co-chord(G) = 3. By [10, Theorem 5.2], it is known that reg I(G)q = 2q + 1 < 2q + co-chord(G) − 1 for all q ≥ 1. For a special class of graphs — gap-free graphs — there is another upper bound that was proved by Banerjee [5]. Theorem 5.5 ([5, Theorem 6.19]). Let G be a gap-free graph and let I = I(G) be its edge ideal. Then for all q ≥ 2, we have reg I q ≤ 2q + reg I − 1. Remark 5.6. The bound in Theorem 5.5 is slightly weaker than the conjectural bound of Conjecture 7.11. 5.2. Exact values. In most of the known cases where the asymptotic linear function reg I(G)q can be computed explicitly, the lower bound in Theorem 5.1 turns out to give the exact formula. In this subsection, we describe those instances. In [33, Theorem 3.2], the authors showed that I(G) has a linear resolution if and only if I(G)q has a linear resolution for all q ≥ 1. Combination of their result with Fröberg’s characterization yields to the exact value of regularity of powers of co-chordal graphs. Theorem 5.7. Let G be a co-chordal graph and I = I(G) be its edge ideal. Then for all q ≥ 1, we have reg I q = 2q. As often the case when dealing with graphs, one of the first classes to consider is that of trees and forests. Theorem 5.8 ([10, Theorem 4.7]). Let G be a forest and let I = I(G) be its edge ideal. Then for all q ≥ 1, we have reg I q = 2q + ν(G) − 1. Sketch of proof. Thanks to the general lower bound in Theorem 5.1, it remains to establish the upper bound reg I q ≤ 2q + ν(G) − 1. In fact, a more general inequality can be proved for induced subgraphs of G. Let H and K be induced subgraphs of K such that EH ∪ EK = EG and EH ∩ EK = ∅. Then the required upper bound follows from the following inequality (by setting H to be the empty graph): reg(I(H) + I(K)q ) ≤ 2q + ν(G) − 1. 19 (5.4) The inequality (5.4) is proved by induction on q + |VK |, making use of the short exact sequence arising by taking quotient and colon with respect to a leaf xy in K. Note that, by [50, Lemma 2.10], we have (I(H) + I(K)q ) : xy = (I(H) : xy) + (I(K)q : xy) = (I(H) : xy) + I(K)q−1 .  The next natural class of graphs to consider is that of cycles and graphs containing exactly one cycle (i.e., unicyclic graphs). Theorem 5.9 ([10, Theorem 5.2]). Let Cn denote the n-cycle and let I = I(Cn ) be its edge ideal. Let ν = b n3 c be the induced matching number of Cn . Then  ν + 1 if n ≡ 0, 1 (mod 3) reg I = ν + 2 if n ≡ 2 (mod 3) and for any q ≥ 2, we have reg I q = 2q + ν − 1. Sketch of proof. The first statement was already proved in [36]. To prove the second statement, again thanks to the general lower bound of Theorem 5.1, it remains to establish the upper bound reg I q ≤ 2q + ν − 1. (5.5) The inductive method of Theorem 3.11 once again is invoked, and it reduces the problem to showing that for any collection of edges e1 , . . . , eq of G (not necessarily distinct), we have reg(I q+1 : e1 . . . eq ) ≤ ν + 1. To this end, let J be the polarization of I q+1 : e1 . . . eq . It can be seen that J = I(H) + (xi1 yi1 , . . . , xit yit ), where H is a graph over the vertices {x1 , . . . , xn } and x2i1 , . . . , x2it are the non-squarefree generators of I q+1 : e1 . . . eq . By using standard short exact sequences, it can be shown that reg(J) = reg I(H). Observe further that H contains Cn as a subgraph, so H has a Hamiltonian cycle. Thus, the required upper bound now follows from a more general upper bound for the regularity of a graph admitting either a Hamiltonian path or a Hamiltonian cycle (which is the content of [10, Theorems 3.1 and 3.2]).  The following theorem was proved in the special case of whiskered cycles by Moghimian, Seyed Fakhari, and Yassemi [49], and then in more generality for unicyclic graphs by Alilooee, Beyarslan and Selvaraja [2]. Theorem 5.10 ([2, Theorem 1.2], [49, Proposition 1.1]). Let G be a unicyclic graph and let I = I(G) be its edge ideal. Then for all q ≥ 1, we have reg I q = 2q + reg I − 2. 20 Sketch of proof. The proof is based on establishing the conjectural bound of Conjecture 7.11.(2) reg(I q ) ≤ 2q + reg I − 2. (5.6) The inequality (5.6) is proved by using induction on q. It also requires a good understanding of reg(I(Cn )q , f1 , . . . , fk ) where Cn is the cycle in G and f1 , . . . , fk are the edges of G that are not in Cn . By making use of the general lower bound of Theorem 5.1 and the first main result of [2], namely,  ν(G) + 2 if n ≡ 2(mod 3) and ν(G \ Γ(G)) = ν(G) reg I = ν(G) + 1 otherwise, equality is achieved for the latter case. (Here, Γ(G) is a well described subset of the vertices in G.) The proof is completed by showing reg(I(G\Γ(G))q ) = 2q +ν(G) and using inequality (5.1).  Example 5.11. Let G be the graph depicted in Figure 15. Macaulay 2 computations show that reg I(G) = 5, reg I(G)2 = 6, reg I(G)3 = 8, reg I(G)4 = 10, reg I(G)5 = 12. Thus, the formula given in Theorem 5.10 does not necessarily hold for a graph containing more than 1 cycle. Figure 15. A bicyclic graph A particular interesting class of graph is those for which ν(G) = 1. It is expected that for such a graph G, powers of its edge ideal should asymptotically have linear resolutions. This is examined in the next two theorems under various additional conditions. Theorem 5.12 ([5, Theorem 1.2]). Let G be a gap-free and cricket-free graph, and let I = I(G) be its edge ideal. Then for all q ≥ 2, we have reg I q = 2q; i.e., I q has a linear resolution. Sketch of proof. Since I q is generated in degree 2q, it remains to show that for q ≥ 2, reg I q ≤ 2q. By induction, making use of the inductive techniques of Theorem 3.11 (and [5, Theorem 3.4] which proves that reg I ≤ 3), it suffices to show that for any collection of edges e1 , . . . , eq in G, reg(I q+1 : e1 . . . eq ) ≤ 2. Let J be the polarization of I q+1 : e1 . . . eq and let H be the simple graph associated to J. The statement is reduced to showing that reg J = 2, or equivalently (by Theorem 4.1), that H c is a chordal graph. That is, H does not have any induced anticycle of length at least 4. 21 By contradiction, suppose that H has an anticycle w1 , . . . , ws of length at least 4. Since an induced anticycle of length 4 gives a gap, we may assume further that s ≥ 5. Suppose also that e1 = xy. The proof follows from the following observations: (1) There must be an edge between {x, y} and {w1 , w3 }; otherwise xy and w1 w3 form a gap in G. (2) Suppose that xw1 ∈ EG . Then neither of w2 nor wn can coincide with x. (3) Neither of w2 nor wn can coincide with y; otherwise the other vertex (among {w2 , wn }) and w1 would be even-connected implying that w1 w2 or w1 wn is an edge in H. (4) Either w2 or wn must be connected to x; otherwise, xy and w2 wn form a gap in G. (5) Suppose that xw2 ∈ EG . Now, by the same line of arguments applying to {w3 , wn }, we deduce that either w3 or wn must be a neighbor of x. (6) Suppose that xw3 ∈ EG . We arrive at a contradiction that {w1 , w3 , x, y, w2 } forms a cricket in G.  Theorem 5.13 ([21, Theorem 4.9]). Let G be a gap-free and diamond-free graph, and let I = I(G) be its edge ideal. Then for all q ≥ 2, we have reg I q = 2q; i.e., I q has a linear resolution. Sketch of proof. The proof of this theorem is based on a good understanding of the combinatorial structures of gap-free and diamond-free graphs. Let ω(G) denote the largest size of a complete subgraph in G (the clique number of G). If ω(G) < 3 then G is cricketfree, and the assertion follows from Theorem 5.12. If ω(G) ≥ 4, then it is shown that the complement of G is chordal, and the conclusion follows from Theorem 4.1. Consider the case where ω(G) = 3. It is shown that if, in addition, G is also C5 -free then the complement of G is either chordal or C6 , and the assertion again follows from known results. The essential part of the proof is then to examine the structures of G when G is gap-free, diamond-free and contains a C5 . This is where novel and interesting combinatorics happen. It is shown that, in this case, G can be obtained from a list of ten specific graphs via a so-called process of multiplying vertices. The proof is completed with a careful analysis of each of these ten graphs to show that reg(I(G)q+1 : e1 . . . eq ) ≤ 2 and to employ Banerjee’s result, Theorem 3.11.  Another large class of graphs for which the regularity of powers of their edge ideals can be computed explicitly is that of very well-covered graphs. The following theorem was proved by Norouzi, Seyed Fakhari, and Yassemi [54] for very well-covered graphs with an additional condition, and then by Jayanthan and Selvaraja [38] in full generality for any very wellcovered graph. Theorem 5.14 ([38, Theorem 5.3], [54, Theorem 3.6]). Let G be a very well-covered graph and let I = I(G) be its edge ideal. Then for all q ≥ 1, we have reg I q = 2q + ν(G) − 1. 22 Sketch of proof. The proof also uses inductive techniques given by Theorem 3.11 and goes along the same line as that of previous theorems in this section. The heart of the arguments is to verify that for any collection of edges e1 , . . . , eq in G, we have reg(I q+1 : e1 . . . eq ) ≤ ν(G) + 1. If J = (I q+1 : e1 . . . eq ) is squarefree then this is achieved by letting H be the graph associated to J and establishing the following facts: (1) H is also very well-covered; (2) ν(H) ≤ ν(G); (3) reg I(H) = ν(H) + 1 and reg I(G) = ν(G) + 1 (this is the content of [46, Theorem 4.12]). The arguments are much more involved for the case where J is not squarefree. Let H be the graph corresponding to the polarization of J. The proof is completed by an ingenious induction on the number of vertices added to G in order to obtain H.  6. Higher Dimension In this section we discuss the regularity of squarefree monomial ideals generated in degree more than two. The goal, as in the case of the edge ideals, is to find bounds and/or formulas for regularity of the ideal in terms of “its combinatorics”. As mentioned in the preliminaries, one can view these ideals both as Stanley-Reisner ideals or edge ideals of hypergraphs. If interpreted as Stanley-Reisner ideals, via Hochster’s formula one can potentially get all Betti numbers of a given ideal in terms of the combinatorics of the underlying complex. The hypergraph case, however, is far less understood compared to either the edge ideal case or the Stanley-Reisner ideal interpretation. However, in the last decade, some results have been proven in that direction. In some cases, general squarefree monomial ideals can be viewed as path ideals of simple graphs, and there has been some progress for those cases in the last few years. Since the main topic of this survey is the edge ideals, we are not trying to be comprehensive in this section. Our aim is to give the reader an idea of possible approaches to generalize the results on edge ideals to higher dimensions. We split the section into three subsections; devoted to Stanley-Reisner ideals, edge ideals of hypergraphs and path ideals respectively. 6.1. Stanley-Reisner Ideals. As mentioned earlier, any squarefree monomial ideal can be viewed as the Stanley-Reisner ideal of some simplicial complex. This combinatorial interpretation is by far the most studied one among monomial ideals generated in higher degrees. The first result we mention is a famous theorem by Eagon and Reiner which establishes the relation between minimal regularity and maximal depth as well as relation between regularity of a Stanley-Reisner ideal and the structure of a special kind of dual complex, namely, the Alexander dual. In a sense it is similar to Fröberg’s result; this gives a classification of linear resolution. The Alexander dual of a simplicial complex ∆ is the simplicial complex whose faces are the complements of the nonfaces of ∆. If I is a Stanley-Reisner ideal then by I ∨ we denote the Stanley-Reisner ideal of the Alexander dual of the simplicial complex of I. 23 Theorem 6.1 ([18, Theorem 3]). Let I be a Stanley-Reisner ideal in S = K[x1 , . . . , xn ]. Then I has q-linear resolution if and only if depth of S/I ∨ has depth n − q. In particular, I has linear resolution if and only if the Alexander dual of ∆(I) is Cohen-Macaulay. The next result bounds regularity with another important algebraic invariant, the arithmetic degree. For a squarefree monomial ideal I, its arithmetic degree, denoted by adeg(I), is given by number of facets in the corresponding simplicial complex. Theorem 6.2 ([24, Theorem 3.8]). Suppose I is a Stanley-Reisner ideal with codimension ≥ 2. Then, reg I ≤ adeg(I). 6.2. Hypergraphs. Any squarefree monomial ideal is the edge ideal of a hypergraph. The corresponding simplicial complex is the independence complex of this hypergraph and computing that is an NP-hard problem in general. The problem of finding bounds for the regularity of graphs can be extended to hypergraphs. In [13] the authors provided a sufficient condition for a hypergraph to have regularity ≤ 3. For every vertex x of a hypergraph H, let H : x denote the simple hypergraph of all minimal subsets A ⊂ V \ {x} such that A or A ∪ {x} is an edge of H. Theorem 6.3 ([13, Theorem 6.4]). Let H be a simple hypergraph such that H : x is a graph whose complement is chordal for all vertices of H. Then, reg H ≤ 3. Any hypergraph whose all edges have same cardinality is called uniform. A d-uniform hypergraph (i.e., a uniform hypergraph whose all edges are represented by monomials of degree d) is called properly-connected if for any two edges E, E 0 sharing at least one vertex, the length of the shortest path between E and E 0 is d − |E ∩ E 0 |. If the length of the shortest path between two edges is ≥ t then they are called t-disjoint (for relevant definitions see [29]). Example 6.4. Consider the 4-uniform hypergraph H with edge set: {x1 x2 x3 x4 , x1 x2 x3 x7 , x1 x2 x6 x7 , x1 x5 x6 x7 , x1 x5 x6 x8 } There is a proper irredundant chain of length 4 from the edge E = x1 x2 x3 x4 to E0 = x1 x5 x6 x8 . Furthermore, there is no shorter such chain. But these edges have a nonempty intersection. So H is not properly-connected since the distance between them is 4 which is not same as 4 − |E ∩ E0 | = 3. This hypergraph is not properly-connected. On the other hand every finite simple graph is properly connected. A d-uniform properly connected hypergraph H is called triangulated if for any subset A of vertices the induced subgraph H 0 on A has a vertex x such that the induced subgraph on its neighborhood N (x) ∪ {x} is complete. For a more formal definition and relevant notions see [29]. Example 6.5. Simple graphs that are triangulated are precisely the chordal graphs due to Theorem 5.2 of [29]. The following result by Hà and Van-Tuyl gives a lower bound for regularity of properly connected hypergraphs and the bound becomes an equality if the hypergraph is triangulated. 24 Theorem 6.6 ([29, Theorem 6.5 and 6.8]). Let H be a properly-connected hypergraph. Suppose d is the common cardinality of the edges in H. Let c be the maximal number of pairwise d + 1 disjoint edges in H. Then, reg H ≥ (d − 1)c + 1, and the equality occurs if H is triangulated. A 2-collage for a hypergraph is a subset C of the edges with the property that for every edge E of the hypergraph, we can delete a vertex v of E so that E \ {v} is contained in some edge of C. For uniform hypergraphs, the condition for a collection C of the edges to be a 2-collage is equivalent to requiring that for any edge E not in C, there exists F ∈ C such that the symmetric difference of E and F consists of exactly two vertices. When H is a graph, it is straightforward to see that for any minimal 2-collage, there is a maximal matching of the same or lesser cardinality. The following theorem gives a formula for regularity of uniform hypergraphs in terms of its collages. Theorem 6.7 ([30, Theorem 1.1]). Let H be a simple d-uniform hypergraph and let c be the minimum size of a 2 collage in H. Then, reg I(H) ≤ (d − 1)c + 1. The next theorem is a generalization of the previous that work for all simple hypergraph. Theorem 6.8 ([30, TheoremP1.2]). Let H be a simple hypergraph and let {m1 , ...., mc } be a 2-collage. Then, reg I(H) ≤ ci=1 |mi | − c + 1. The next theorem gives a formula for regularity of edge ideals of clutters, which are hypergraphs where no edge contains any other edge as a subset. A monomial ideal I has linear quotients if the monomials that generate I can be ordered g1 , . . . , gq such that for all 1 ≤ i ≤ q − 1, ((g1 , . . . , gi ) : gi+1 ) is generated by linear forms. For further details see [51]. Theorem 6.9 ([51, Corollary 3.35]). Let H be a clutter such that I(H) has linear quotients. Then, reg I(H) = max{|E| : E ∈ E(H)}. Taylor resolutions, introduced in [59], are free resolutions of monomial ideals constructed in a natural way that makes computations easy to deal with. These are in general not minimal. The following theorem gives a formula for regularity when Taylor resolutions are minimal. A hypergraph H is called saturated when the Taylor resolution of I(H) is minimal. For further details see [44]. Theorem 6.10 ([44, Proposition 4.1]). For a saturated hypergraph H, we have reg I(H = |X| − |L| + 1. Here L is the minimal monomial generating set of I(H) and X is the number of variables that divide some minimal monomial generator. 6.3. Path Ideal. Path ideals of finite simple graphs are interesting generalizations of edge ideals, see Section 2.2 to recall the definition of path ideals. For gap-free graphs their regularity too tend to behave nicely. Theorem 6.11 ([11, Theorem 1.1]). Let G be a gap-free and claw-free graph. Then for all t ≤ 6, It has linear resolution. If further G is induced whiskered-K4 free then for all t, It has linear resolution. 25 Let Ln denote a line of length n. The regularity of path ideals of lines have been computed by Alilooee and Faridi in the next theorem. Theorem 6.12 ([3, Theorem 3.2]). Let n, t, p and d be integers such that n ≥ 2, 2 ≤ t ≤ n, n = (t + 1)p + d, where p ≥ 0, 0 ≤ d ≤ t. Then, reg It (Ln ) is p(t − 1) + 1 for d < t and (p + 1)(t − 1) + 1 for d = t. We end this section by a result regarding a somewhat different kind of path ideals. A tree is a graph in which there exists a unique path between every pair of distinct vertices; a rooted tree is a tree together with a fixed vertex called the root. In particular, in a rooted tree there exists a unique path from the root to any given vertices. We can also view a rooted tree as a directed graph by assigning to each edge the direction that goes “away” from the root. Let Γ be a rooted tree and It (Γ) be the squarefree monomial ideal generated by all “directed paths” of length t − 1 in the above sense. The following theorem gives regularity of such ideals. In this theorem, we define lt (Γ) to be the number of leaves in Γ whose level is at least t − 1 and pt (Γ) to be the maximal number of pairwise disjoint paths of length t in Γ (i.e., pt (Γ) = max{|D| | D is a set of disjoint paths of length t in Γ}). Theorem 6.13 ([9, Theorem 3.4]). Let Γ be a rooted tree on n vertices. Then, reg It (Γ) ≤ (t − 1)[lt (Γ) + pt (Γ)] + 1. 7. Open problems and questions We end the paper by listing a number of open problems and questions in the research area which we hope to be solved. Our first problem is inspired by Theorems 4.1 and 4.11. Since graphs with regularity 2 are classified. The next class of graph to examine is that of regularity 3. Problem 7.1. Characterize graphs G for which reg I(G) = 3. In various results, for example Theorems 4.7 and 6.3, “local” condition on the regularity of G : x for all vertices x lead to a “global” statement on the regularity of G. We ask if similar local conditions on G : x, for all vertices x, would also lead to a statement on the asymptotic linear function reg I(G)q . Question 7.2. Let G be a simple graph and let I = I(G) be its edge ideal. Suppose that for any vertex x in G, we have reg(I : x) ≤ r. Does this imply that for any q ≥ 1, reg I q ≤ 2q + r − 1? As noted in Lemma 3.7, for any vertex x, the regularity of I(G) is always equal to either the regularity of I(G) : x or the regularity of (I(G), x). It would be interesting to know for which vertex x the equality happens one way or another. Problem 7.3. Let G be a graph and let I = I(G) be its edge ideal. Find conditions on a vertex x of G such that (1) reg I = reg(I, x). 26 (2) reg I = reg(I : x). The regularity of I(G) has been computed for several special classes of graphs (see Theorem 4.12). A particular class of graphs which is of interest is that of vertex decomposable graphs. For a vertex decomposable graph G, the statement of Lemma 3.7 can be made slightly more precise (see [30]), namely, there exists a vertex x such that reg G = max{reg(G \ NG [x]) + 1, reg(G \ x)}. For such a graph G, it is also known that the independent complex ∆(G) is shellable and the quotient ring S/I(G) is sequentially Cohen-Macaulay. Problem 7.4. Let G be a vertex decomposable graph. Compute reg I(G) via combinatorial invariant of G. As noted throughout Sections 4 and 5, the induced matching number of a graph G is closely related to the regularity of I(G). In fact, ν(G) + 1 gives a lower bound for reg I(G) and, more generally, 2q +ν(G)−1 gives a lower bound for reg I(G)q for any q ≥ 1. Moreover, for many special classes of graphs the equality has been shown to hold. Thus, it is desirable to characterize all graphs for which the equality is attained. Problem 7.5. Characterize graphs G for which the edge ideals I = I(G) satisfy (1) reg I = ν(G) + 1. (2) reg I q = 2q + ν(G) − 1 ∀ q  0. When ν(G) = 1, the answer to Problem 7.5.(2) is predicted in the following open problem. Problem 7.6 (Francisco-Hà-Van Tuyl and Nevo-Peeva). Suppose that ν(G) = 1, i.e., Gc has no induced 4-cycle and let I = I(G). (1) Prove (or disprove) that reg I q = 2q for all q  0. (2) Prove (or disprove) that reg I q+1 = reg I q + 2 for all q ≥ reg(I) − 1. Note that examples exist in which ν(G) = 1 and reg I q 6= 2q for small values of q (cf. [53]), so in Problem 7.6 it is necessary to consider q  0. A satisfactory solution to Problem 7.1 would be a good starting point to tackle Problem 7.6, since regularity 3 is the first open case of the problem. In fact, in this case, reg I(G)q is expected to be linear starting at q = 2. Problem 7.7 (Nevo-Peeva). Suppose that ν(G) = 1 and reg I(G) = 3. Then is it true that for all q ≥ 2, reg I(G)q = 2q? In many known cases where the asymptotic linear function reg I(G)q can be computed, it happens to be reg I(G)q = 2q + ν(G) − 1. We would like to see if this is the case when the equality is already known to hold for small values of q. If this is indeed the case then how far one must go before concluding that the equality holds for all q ≥ 1? Problem 7.8. Let G be a graph. Find a number N such that if reg I(G)q = 2q + ν(G) − 1 for all 1 ≤ q ≤ N then, for all q ≥ 1, we have reg I(G)q = 2q + ν(G) − 1. 27 (Computational experiments seem to suggest that N can be taken to be 2.) A particularly related question is whether for special classes of graphs satisfying reg I(G) = ν(G) + 1 one would have reg I(G)q = 2q + ν(G) − 1 for all q ≥ 1 (or for all q  0). Inspired by Theorem 4.12, we raise the following question. Question 7.9. Let G be a graph and let I = I(G) be its edge ideal. Suppose that G is of one of the following types: (1) (2) (3) (4) (5) G G G G G is is is is is chordal; weakly chordal; sequentially Cohen-Macaulay bipartite; vertex decomposable and contains no closed circuit of length 5; (C4 , C5 )-free vertex decomposable. Is it true that for all q  0, reg I q = 2q + ν(G) − 1? Note that chordal graphs and sequentially Cohen-Macaulay bipartite graphs are vertex decomposable. Also bipartite graphs contain no closed circuit of length 5. Thus, in Question 7.9, an affirmative answer to part (4) would imply that for part (3). It is well-known that the resolution of a monomial ideal is dependent on the characteristic of the ground field. And yet, in all known cases where the regularity of powers of an edge ideal can be computed, it is characteristic-independent. We would like to see examples where this is not the case, or a confirmation that this is always the case if the regularity of the edge ideal itself is characteristic-independent. Problem 7.10. (1) Find examples of graphs G for which the asymptotic linear function reg I(G)q , for q  0, is characteristic-dependent. (2) Suppose that reg I(G) is independent of the characteristic of the ground field. Is the asymptotic linear function reg I(G)q , for q  0, necessarily also characteristicindependent? When an exact formula may not be available, it is of interest to find a lower and an upper bound. Since the lower bound in Theorem 5.1 holds for any graph, it is desirable to find an upper bound to couple with this general lower bound. In this direction, one may either try to prove the bound in Theorem 5.3 for any graph or to relate the regularity of powers of I(G) to the regularity of I(G) itself. Conjecture 7.11 (Alilooee, Banerjee, Beyarslan and Hà). Let G be any graph and let I = I(G) be its edge ideal. Then for all q ≥ 1, we have (1) reg I q ≤ 2q + co-chord(G) − 1. (2) reg I q ≤ 2q + reg I − 2. (3) reg I q+1 ≤ reg I q + 2. Note that by Theorem 4.6, Conjecture 7.11.(3) ⇒ Conjecture 7.11.(2) ⇒ Conjecture 7.11.(1). 28 Even though, in general, reg I q is asymptotically a linear function, for small values of q, there are examples for which reg I q > reg I q+1 . We ask if this would not be the case for edge ideals of graphs. Question 7.12. Let G be a graph and let I = I(G) be its edge ideal. Is the function reg I q increasing for all q ≥ 1? In investigating the asymptotic linear function reg I q , it is also of interest to know the smallest value q0 starting from which reg I q attains its linear form. In known cases where the regularity of I(G)q can be computed explicitly for all q ≥ 1, we have q0 ≤ 2. Computational experiments seem to suggest that this is indeed always the case. Question 7.13. Let G be a graph and let q0 be the least integer such that reg I(G)q is a linear function for all q ≥ q0 . Is it true that q0 ≤ 2? A much weaker question, yet still very interesting, would be whether q0 ≤ reg I(G)? — This question is still wide open! A significant step toward answering Question 7.13 is to give a uniform bound for q0 (i.e., a bound that does not depend on G). Problem 7.14. Find a number N (which may depend on n and m) such that for any graph G over n vertices and m edges, we have q0 ≤ N . References [1] A. Alilooee and A. Banerjee, Powers of edge ideals of regularity three bipartite graphs. J. Commut. Algebra 9 (2017), no. 4, 441-454. [2] A. Alilooee, S. Beyarslan and S. Selvaraja, Regularity of powers of unicyclic graphs. Preprint (2017), arXiv:1702.00916. [3] A. Alilooee and S. Faridi, On the resolutions of path ideals of cycles, Communications in Algebra 43 (2015), no. 12, 5413-5433. [4] A. Bagheri, M. Chardin and H.T. Hà, The eventual shape of Betti tables of powers of ideals. Math. Res. Lett. 20 (2013), no. 6, 1033-1046. [5] A. Banerjee, The regularity of powers of edge ideals. J. Algebraic Combin. 41 (2015), no. 2, 303-321. [6] C. Berge, Hypergraphs: combinatorics of finite sets. North-Holland, New York, 1989. [7] T. Biyikoglu and Y. Civan, Vertex decomposable graphs, codismantlability, Cohen-Macaulayness and Castelnuovo-Mumford regularity. Electron. J. Combin. 21 (2014), no. 1, Paper 1.1, 17 pp. [8] Anders Björner, Topological methods, Handbook of combinatorics, Vol. 1, 2, Elsevier, Amsterdam, 1995, pp. 1819-1872 [9] R. Bouchat, H. T. Hà and A. O’Keefe, Path ideals of rooted trees and their graded Betti numbers. J. Combin. Theory Ser. A 118 (2011), 2411-2425. [10] S. Beyarslan, H.T. Hà and T.N. Trung, Regularity of powers of forests and cycles. J. Algebraic Combin. 42 (2015), no. 4, 1077-1095. [11] A. Banerjee, Regularity of path ideals of gap free graphs, J. Pure and Applied Alg. 221 (2017), no. 10, 2409-2419. [12] W. Bruns and J. Herzog, Cohen-Macaulay rings. Cambridge Studies in Advanced Mathematics, 39. Cambridge University Press, Cambridge, 1993. [13] G. Caviglia, H. T. Hà, J. Herzog, M. Kummini, N.Terai, N. V. Trung, Depth and regularity modulo a principal ideal. Preprint (2017), arXiv:1706.09675. [14] M. Chardin, Some results and questions on Castelnuovo-Mumford regularity. Syzygiez and Hilbert functions. Lect. Notes Pure Appl. Math., 254, 1-40. Chapman & Hall/CRC, 2007. [15] S.D. Cutkosky, J. Herzog, and N.V. Trung, Asymptotic behaviour of the Castelnuovo-Mumford regularity. Composito Mathematica 118 (1999), 243-261. 29 [16] K. Cameron and T. Walker, The graphs with maximum induced matching and maximum matching the same size. Discrete Math. 299 (2005), 49-55. [17] H. Dao, C. Huneke and J. Schweig, Bounds on the regularity and projective dimension of ideals associated to graphs. J. Algebraic Combin. 38 (2013), no. 1, 37-55. [18] J.A. Eagon and V. Reiner, Resolutions of Stanley-Reisner rings and Alexander duality, J. Pure and Appl. Algebra 130 (1998), no. 3, 265-267. [19] D. Eisenbud, Commutative Algebra: with a View Toward Algebraic Geometry. Springer-Verlag, New York, 1995. [20] D. Eisenbud and S. Goto, Linear free resolutions and minimal multiplicity. J. Algebra 88 (1984), no. 1, 89-133. [21] N. Erey, Powers of edge ideals with linear resolutions. Preprint (2017), arXiv:1703.01561. [22] S. Faridi, The facet ideal of a simplicial complex. Manuscripta Math. 109 (2002), no. 2, 159-174. [23] O. Fernàndez-Ramos and P. Gimenez, Regularity 3 in edge ideals associated to bipartite graphs. J. Algebraic Combin. 39 (2014), no. 4, 919-937. [24] A. Frühbis-Krüger and N. Terai, Bounds for the regularity of monomial ideals. LE MATEMATICHE LIII, Supplemento, pp. 83-97, 2007. [25] R. Fröberg, On Stanley-Reisner rings. Topics in algebra, Part 2 (Warsaw, 1988), 57-70, Banach Center Publ., 26, Part 2, PWN, Warsaw, 1990. [26] C. A. Francisco and A. V. Tuyl, Sequentially Cohen-Macaulay edge ideals, Proc. Amer. Math. Soc. 135 (2007), no. 8, 23-37 (electronic). [27] H.T. Hà, Regularity of squarefree monomial ideals. Connections between algebra, combinatorics, and geometry, 251-276, Springer Proc. Math. Stat., 76, Springer, New York, 2014. [28] H.T. Hà and A. Van Tuyl, Resolutions of square-free monomial ideals via facet ideals: a survey. Algebra, geometry and their interactions, 91-117, Contemp. Math., 448, Amer. Math. Soc., Providence, RI, 2007. [29] H. T. Hà and A. Van Tuyl, Monomial ideals, edge ideals of hypergraphs, and their minimal graded free resolutions. J. Algebraic Combin. 27 (2008), no. 2, 215-245. [30] H.T. Hà and R. Woodroofe, Results on the regularity of square-free monomial ideals. Adv. in Appl. Math. 58 (2014), 21-36. [31] J. Herzog, A generalization of the Taylor complex construction. Comm. Algebra 35 (2007), no. 5, 1747-1756. [32] J. Herzog and T. Hibi, Monomial ideals. GTM 260, Springer-Verlag, 2011. [33] J. Herzog, T. Hibi, X. Zheng, Monomial ideals whose powers have a linear resolution. Math. Scand. 95 (2004), no. 1, 23-32. [34] T. Hibi, A. Higashitani, K. Kimura and A. B. O’Keefe, Algebraic study on Cameron-Walker graphs, J. Algebra 422 (2015), 257-269. [35] M. Hochster, Cohen-Macaulay rings, combinatorics, and simplicial complexes. Proc. of the 2nd Oklahoma Conf., Lecture Notes in Pure Appl. Math. 26 (1977) Marcel Dekker, 171-224. [36] S. Jacques, Betti numbers of graph ideals. Ph.D. Thesis, University of Sheffield, 2004. arXiv:math.AC/0410107. [37] A.V. Jayanthan, N. Narayanan and S. Selvaraja, Regularity of powers of bipartite graphs. J. Algebraic Combin. 47 (2018), no.1, 17-38 [38] A.V. Jayanthan, S. Selvaraja, Asymptotic behavior of Castelnuovo-Mumford regularity of edge ideals of very well-covered graphs. Preprint (2017), arXiv:1708.06883. [39] G. Kalai and R. Meshulam, Intersections of Leray complexes and regularity of monomial ideals. J. Combin. Theory Ser. A 113 (2006), no. 7, 1586-1592. [40] F. Khosh-Ahang and S. Moradi, Regularity and projective dimension of edge ideal of C5 -free vertex decomposable graphs. Proc. Amer. Math. Soc. 142 (2014), no. 5, 1567-1576. [41] M. Katzman, Characteristic-independence of Betti numbers of graph ideals. J. Combin. Theory Ser. A 113 (2006), no. 3, 435-454. [42] V. Kodiyalam, Asymptotic behaviour of Castelnuovo-Mumford regularity. Proceedings of the American Mathematical Society, 128 (1999), no. 2, 407-411. 30 [43] M. Kummini, Regularity, depth and arithmetic rank of bipartite edge ideals. J. Algebraic Combin. 30 (2009), no. 4, 429-445. [44] K-N. Lin and J. McCullough, Hypergraphs and Regularity of Square-free Monomial Ideals, Int. J. Algebra Comput. 23 (2013), 1573-1590. [45] G. Lyubeznik, The minimal non-Cohen-Macaulay monomial ideals, J. Pure Appl. Algebra 51 (1988), 261-266. [46] M. Mahmoudi, A. Mousivand, M. Crupi, G. Rinaldo, N. Terai, and S. Yassemi, Vertex decomposability and regularity of very well-covered graphs. J. Pure Appl. Algebra 215 (2011), no. 10, 2473-2480. [47] E. Miller and B. Sturmfels, Combinatorial Commutative Algebra. GTM 227, Springer-Verlag, 2004. [48] N.C. Minh and N.V. Trung, Cohen-Macaulayness of monomial ideals and symbolic powers of StanleyReisner ideals. Adv. Math. 226 (2011), 1285-1306. [49] M. Moghimian, S.A. Seyed Fakhari, S. Yassemi, Regularity of powers of edge ideal of whiskered cycles. Comm. Algebra 45 (2017), no. 3, 1246-1259. [50] S. Morey, Depths of powers of the edge ideal of a tree. Comm. Algebra 38 (2010), no. 11, 4042-4055. [51] S. Morey, R.H. Villarreal, Edge ideals: algebraic and combinatorial properties. Progress in commutative algebra 1, 85-126, de Gruyter, Berlin, 2012. [52] E. Nevo, Regularity of edge ideals of C4 -free graphs via the topology of the lcm-lattice. J. Combin. Theory Ser. A 118 (2011), 491-501. [53] E. Nevo and I. Peeva, C4 -free edge ideals. J. Algebraic Combin. 37 (2013), no. 2, 243-248. [54] P. Norouzi, S.A. Seyed Fakhari, S. Yassemi, Regularity of powers of edge ideals of very well-covered graphs. Preprint (2017), arXiv:1707.04874. [55] I. Peeva, Graded syzygies. Algebra and Applications, 14. Springer-Verlag London, Ltd., London, 2011. [56] R. Stanley, Combinatorics and Commutative Algebra. Progress in Mathematics, 41. Birkhäuser Boston, Inc., Boston, MA, 1983. [57] S. Sullivant, Combinatorial symbolic powers. J. Algebra 319 (2008), no. 1, 115-142. [58] Y. Takayama, Combinatorial characterizations of generalized Cohen-Macaulay monomial ideals, Bull. Math. Soc. Sci. Math. Roumanie (N.S.) 48 (2005), 327-344. [59] D. K. Taylor, Ideals generated by monomials in an R-sequence, ProQuest LLC, Ann Arbor, MI, Thesis (Ph.D)-The University of Chicago, 1996 [60] N.V. Trung and H. Wang, On the asymptotic behavior of Castelnuovo-Mumford regularity. J. Pure Appl. Algebra 201 (2005), no. 1-3, 42-48. [61] R. H. Villarreal, Monomial algebras. Monographs and Textbooks in Pure and Applied Mathematics, 238. Marcel Dekker, Inc., New York, 2001. [62] A. Van Tuyl, Sequentially Cohen-Macaulay bipartite graphs: vertex decomposability and regularity. Arch. Math. (Basel) 93 (2009), no. 5, 451-459. [63] G. Wegner, d-collapsing and nerves of families of convex sets. Arch. Math. (Basel) 26 (1975), 317-321. [64] R. Woodroofe, Matchings, coverings, and Castelnuovo-Mumford regularity. J. Commut. Algebra 6 (2014), no. 2, 287-304. [65] Russ Woodroofe, Vertex decomposable graphs and obstructions to shellability. Proc. Amer. Math. Soc., 137 (2009), no. 10, 3235-3246. [66] X. Zheng, Resolutions of facet ideals, Comm. Algebra 32 (2004) 2301-2324. 31 Ramakrishna Mission Vivekenanda University, Belur, West Bengal, India E-mail address: [email protected] URL: https://http://maths.rkmvu.ac.in/∼arindamb/ University of South Alabama, Department of Mathematics and Statistics, 411 University Boulevard North, Mobile, AL 36688-0002, USA E-mail address: [email protected] URL: https://selvikara.wordpress.com/selvi/ Tulane University, Department of Mathematics, 6823 St. Charles Ave., New Orleans, LA 70118, USA E-mail address: [email protected] URL: http://www.math.tulane.edu/∼tai/ 32
0math.AC
Minimum length RNA folding trajectories P. Clote∗ A.H. Bayegan arXiv:1802.06328v1 [cs.DS] 18 Feb 2018 Biology Department, Boston College, Chestnut Hill, MA Abstract Background: Existent programs for RNA folding kinetics, such as Kinefold, Kinfold and KFOLD, implement the Gillespie algorithm to generate stochastic folding trajectories from an initial structure s to a target structure t, in which each intermediate secondary structure is obtained from its predecessor by the application of a move from a given move set. The Kinfold move set M S1 [resp. M S2 ] allows the addition or removal [resp. addition, removal or shift] of a single base pair. Define the M S1 [resp. M S2 ] distance between secondary structures s and t to be the minimum path length to refold s to t, where a move from M S1 [resp. M S2 ] is applied in each step. The M S1 distance between s and t is trivially equal to the cardinality of the symmetric difference of s and t, i.e the number of base pairs belonging to one structure but not the other; in contrast, the computation of M S2 distance is highly non-trivial. Results: We describe algorithms to compute the shortest M S2 folding trajectory between any two given RNA secondary structures. These algorithms include an optimal integer programming (IP) algorithm, an accurate and efficient near-optimal algorithm, a greedy algorithm, a branch-and-bound algorithm, and an optimal algorithm if one allows intermediate structures to contain pseudoknots. A 10-fold slower version of our IP algorithm appeared in WABI 2017; the current version exploits special treatment of closed 2-cycles. Our optimal IP [resp. near-optimal IP] algorithm maximizes [resp. approximately maximizes] the number of shifts and minimizes [resp. approximately minimizes] the number of base pair additions and removals by applying integer programming to (essentially) solve the minimum feedback vertex set (FVS) problem for the RNA conflict digraph, then applies topological sort to tether subtrajectories into the final optimal folding trajectory. We prove NP-hardness of the problem to determine the minimum barrier energy over all possible M S2 folding pathways, and conjecture that computing the M S2 distance between arbitrary secondary structures is NP-hard. Since our optimal IP algorithm relies on the FVS, known to be NP-complete for arbitrary digraphs, we compare the family of RNA conflict digraphs with the following classes of digraphs – planar, reducible flow graph, Eulerian, and tournament – for which FVS is known to be either polynomial time computable or NP-hard. Conclusion: This paper describes a number of optimal and near-optimal algorithms to compute the shortest M S2 folding trajectory between any two secondary structures. Source code for our algorithms is available at http://bioinformatics.bc.edu/clotelab/MS2distance/. 1 Background RNA secondary structure is known to form a scaffold for tertiary structure formation [5]. Moreover, secondary structure can be efficiently predicted with reasonable accuracy by using either machine learning with stochastic context-free grammars [23, 35, 39], provided that the training set is sufficiently large and representative, or by using ab initio physics-based models with thermodynamics-based algorithms [27, 25]. Since the latter approach does not depend on any form of homology modeling, it has been successfully used for synthetic RNA molecular design [47, 9, 16], to predict microRNA binding sites [32], to discover noncoding RNA genes [44], in simulations to study molecular evolution [3, 42, 36, 15] and in folding kinetics [13, 45, 37, 11]. Software to simulate RNA secondary structure folding kinetics, such as Kinfold and KFOLD, implement the Gillespie algorithm to simulate the moves from one structure to another, for a particular move set. At the ∗ Correspondence [email protected]. Research supported in part by National Science Foundation grant DBI-1262439. 1 elementary-step resolution, two move sets have extensively been studied – the move set M S1 which allows the addition or removal of a single base pair, and the move set M S2 , which allows the addition, removal or shift of a single base pair, where a shift move modifies only one of the two positions in a base pair, as shown in Figure 1. In simulation studies related to RNA secondary structure evolution, the structural distance between two secondary structures s, t is often measured by the base pair distance, denoted dBP (s, t), defined to be the cardinality of the symmetric difference, |s 4 t| = |s − t| + |t − s|, i.e. the number of base pairs belonging to s but not t, plus the number of base pairs belonging to t but not s. In studies concerning RNA folding kinetics, the fast, near-optimal algorithm RNAtabupath [10] and the much slower, but exact (optimal) Barriers algorithm [25] can be used to determine M S1 folding trajectories that minimize the barrier energy, defined as the maximum of the (Turner) free energy difference between an intermediate structure and the initial structure. Thermodynamics-based software such as Kinfold, RNAtabupath, and KFOLD use the nearest neighbor free energy model [41] whose energy parameters are inferred from optical melting experiments. In contrast, the two theorems below concern the Nussinov energy model [29], which assigns −1 per base pair and ignores entropy. Folding trajectories s = s0 , s1 , . . . , sm = t from s to t may either be direct, whereby each intermediate structure si is required to contain only base pairs from s ∪ t, or indirect, without this restriction. Note that indirect pathways may be energetically more favorable, though longer, than direct pathways, and that the problem of constructing an energetically optimal direct folding pathway is NP-hard. Indeed, the following theorem is proven in [40]. Theorem 1 (Maňuch et al. [40]). With respect to the Nussinov energy model, it is NP-hard to determine, for given secondary structures s, t and integer k, whether there exists a direct M S1 folding trajectory from s to t with energy barrier at most k. By an easy construction, we can show an analogous result for M S2 folding pathways. First, we define a direct M S2 folding pathway from secondary structure s to secondary structure t to be a folding pathway s = s0 , s1 , . . . , sn = t where each intermediate structure si is obtained from si−1 by removing a base pair that belongs to s, adding a base pair that belongs to t, or shifting a base pair belonging to s into a base pair belonging to t. Theorem 2. With respect to the Nussinov energy model, it is NP-hard to determine, for given secondary structures s, t and integer k, whether there exists a direct M S2 folding trajectory from s to t with energy barrier at most k. Proof. Given secondary structures s, t for an RNA sequence a = a1 , . . . , an , without loss of generality we can assume that s, t share no common base pair (otherwise, a minimum energy folding trajectory for s − (s ∩ t) and t − (s ∩ t) yields a minimum energy folding trajectory for s, t.) Define the corresponding secondary structures s0 = {(2i, 2j) : (i, j) ∈ s} t0 = {(2i − 1, 2j − 1) : (i, j) ∈ t} a02i = ai = a02i−1 for each 1 ≤ i ≤ n a0 = a01 , a02 , . . . , a02n In other words, the sequence a0 = a1 , a1 , a2 , a2 , . . . , an , an is obtained by duplicating each nucleotide of a, and placing each copy beside the original nucleotide; s0 [resp. t0 ] is obtained by replacing each base pair (i, j) ∈ s by the base pair (2i, 2j) ∈ s0 [resp. (2i − 1, 2j − 1) ∈ t0 . Since there are no base-paired positions that are shared between s0 and t0 , no shift moves are possible, thus any direct M S2 folding pathway from s0 to t0 immediately yields a corresponding direct M S1 folding pathway from s to t. Since the Nussinov energy of any secondary structure equals −1 times the number of base pairs, it follows that barrier energy of the direct M S2 pathway from s0 to t0 is identical to that of the corresponding direct M S1 pathway from s to t. Since M S1 direct barrier energy is an NP-hard problem by Theorem 1, it now follows that the M S2 barrier energy problem is NP-hard. Shift moves, depicted in Figure 1, naturally model both helix zippering and defect diffusion, depicted in Figure 2 and described in [31]. However, shift moves have rarely been considered in the literature, except in 2 the context of folding kinetics [13]. For instance, presumably due to the absence of any method to compute M S2 distance, Hamming distance is used as a proxy for M S2 distance in the work on molecular evolution of secondary structures appearing in [36] – see also [43], where Hamming distance is used to quantify structural diversity in defining phenotypic plasticity. In this paper, we introduce the first algorithms to compute the M S2 distance between two secondary structures. Although M S1 distance, also known as base pair distance, is trivial to compute, we conjecture that M S2 distance is NP-hard, where this problem can be formalized as the problem to determine, for any given secondary structures s, t and integer m, whether there is an M S2 trajectory s = s0 , s1 , . . . , sm = t of length ≤ m. We describe an optimal (exact, but possibly exponential time) integer programming (IP) algorithm, a fast, near-optimal algorithm, an exact branch-and-bound algorithm, and a greedy algorithm. Since our algorithms involve the feedback vertex set problem for RNA conflict digraphs, we now provide a bit of background on this problem. Throughout, we are exclusively interested in directed graphs, or digraphs, so unless otherwise indicated, all graphs are assumed to be directed. Any undefined graph-theoretic concepts can be found in the monograph by Bang-Jensen and Gutin [1]. Given a directed graph G = (V, E), a feedback vertex set (FVS) is a subset V 0 ⊆ V which contains at least one vertex from every directed cycle in G, thus rendering G acyclic. Similarly, a feedback arc set (FAS) is a subset E 0 ⊆ E which contains at least one directed edge (arc) from every directed cycle in G. The FVS [resp. FAS] problem is the problem to determine a minimum size feedback vertex set [resp. feedback arc set] which renders G acyclic. The FVS [resp. FAS] problem can be formulated as a decision problem as follows. Given an integer k and a digraph G = (V, E), determine whether there exists a subset V 0 ⊆ V of size ≤ k [resp. E 0 ⊆ E of size ≤ k], such that every directed cycle contains a vertex in V 0 [resp. an edge in E 0 ]. In Proposition 10.3.1 of [1], it is proved that FAS and FVS have the same computational complexity, within a polynomial factor. In Theorem 10.3.2 of [1], it is proved that the FAS problem is NP-complete – indeed, this problem appears in the original list of 21 problems shown by R.M. Karp to be NP-complete [22]. Note that Proposition 10.3.1 and Theorem 10.3.2 imply immediately that the FVS problem is NPcomplete. In Theorem 10.3.3 of [1], it is proved that the FAS problem is NP-complete for tournaments, where a tournament is a digraph G = (V, E), such that there is a directed edge from x to y, or from y to x, for every pair of distinct vertices x, y ∈ V . In [30], it is proved that the FAS for Eulerian digraphs is NP-complete, where an Eulerian digraph is characterized by the property that the in-degree of every vertex equals its out-degree. In Theorem 10.3.15 of [1], it is proved that FAS can be solved in polynomial time for planar digraphs, a result originally due to [26]. In [33], a polynomial time algorithm is given for the FAS for reducible flow graphs, a type of digraph that models programs without any GO TO statements (see [19] for a characterization of reducible flow graphs). There is a long history of work on the feedback vertex set and feedback arc set problems, both for directed and undirected graphs, including results on computational complexity as well as exact and approximation algorithms for several classes of graphs – see the survey [12] for an overview of such results. The plan of the paper is now as follows. In Section 2, we present the graph-theoretic framework for our overall approach and describe a simple, fast algorithm to compute the pseudoknotted M S2 distance, or pk-M S2 distance, between structures s, t. By this we mean the minimum length of an M S2 folding trajectory between s and t, if intermediate pseudoknotted structures are allowed. We show that the pk-M S2 distance between s and t, denoted by dpk−M S2 (s, t), is approximately equal to one-half the Hamming distance dH (s, t) between s and t. This result can be seen as justification, ex post facto, for the use of Hamming distance in the investigation of RNA molecular evolution [36]. In Section 3, we describe an exact integer programming (IP) algorithm which enumerates all directed cycles, then solves the feedback vertex problem for the collection of RNA conflict digraphs, as described in Section 3.1. Our IP algorithm is not a simple reduction to the feedback vertex set (FVS) problem; however, since the complexity of FVS/FAS is known for certain classes of digraphs, we take initial steps towards the characterization of RNA conflict digraphs. Our optimal IP algorithm is much faster than a branch-and-bound algorithm, but it can be too slow to be practical to determine M S2 distance between the minimum free energy (MFE) secondary structure and a (Zuker) suboptimal secondary structure for some sequences from the Rfam database [28]. For this reason, in Section 4 we present a fast, near-optimal algorithm, and in Section 5, we present benchmarking results to compare various algorithms of the paper. Since we believe that further study of RNA conflict digraphs may lead to a solution of the question 3 whether M S2 distance is NP-hard, in Appendix A, all types of directed edge that are possible in an RNA conflict digraph are depicted. Appendix B presents details on minimum length pseudoknotted M S2 folding pathways, used to provide a lower bound in the branch-and-bound algorithm of Appendix C. Appendix D presents pseudocode for a greedy algorithm. All algorithms described in this paper have been implemented in Python, and are publicly available at bioinformatics.bc.edu/clotelab/MS2distance. Our software uses the function simple cycles(G) from the software NetworkX https://networkx.github.io/documentation/networkx-1.9/reference/ generated/networkx.algorithms.cycles.simple_cycles.html, and the integer programming (IP) solver Gurobi Optimizer version 6.0 http://www.gurobi.com,2014. 2 M S2 distance between possibly pseudoknotted structures In this section, we describe a straightforward algorithm to determine the M S2 -distance dpk−M S2 (s, t) between any two structures s, t of a given RNA sequence a1 , . . . , an , where dpk−M S2 (s, t) is defined to be length of a minimal length trajectory s = s0 , s1 , . . . , sm = t, where intermediate structures si may contain pseudoknots, but do not contain any base triples. This variant is called pk-M S2 distance. Clearly, the pk-M S2 distance is less than or equal to the M S2 distance. The purpose of this section is primarily to introduce some of the main concepts used in the remainder of the paper. Although the notion of secondary structure is well-known, we give three distinct but equivalent definitions, that will allow us to overload secondary structure notation to simplify presentation of our algorithms. Definition 3 (Secondary structure as set of ordered base pairs). Let [1, n] denote the set {1, 2, . . . , n}. A secondary structure for a given RNA sequence a1 , . . . , an of length n is defined to be a set s of ordered pairs (i, j), with 1 ≤ i < j ≤ n, such that the following conditions are satisfied. 1. Watson-Crick and wobble pairs: If (i, j) ∈ s, then ai aj ∈ {GC, CG, AU, U A, GU, U G}. 2. No base triples: If (i, j) and (i, k) belong to s, then j = k; if (i, j) and (k, j) belong to s, then i = k. 3. Nonexistence of pseudoknots: If (i, j) and (k, `) belong to s, then it is not the case that i < k < j < `. 4. Threshold requirement for hairpins: If (i, j) belongs to s, then j − i > θ, for a fixed value θ ≥ 0; i.e. there must be at least θ unpaired bases in a hairpin loop. Following standard convention, we set θ = 3 for steric constraints. Without risk of confusion, it will be convenient to overload the concept of secondary structure s with two alternative, equivalent notations, for which context will determine the intended meaning. Definition 4 (Secondary structure as set of unordered base pairs). A secondary structure s for the RNA sequence a1 , . . . , an is a set of unordered pairs {i, j}, with 1 ≤ i, j ≤ n, such that the corresponding set of ordered pairs def {i, j}< = (min(i, j), max(i, j)) (1) satisfies Definition 3. Definition 5 (Secondary structure as an integer-valued function). A secondary n o structure s for a1 , . . . , an is a function s : [1, . . . , n] → [0, . . . , n], such that {i, s[i]}< : 1 ≤ i ≤ n, s[i] 6= 0 satisfies Definition 3; i.e.  s[i] = 0 j if i is unpaired in s if (i, j) ∈ s or (j, i) ∈ s (2) Definition 6 (Secondary structure distance measures). Let s, t be secondary structures of length n. Base pair distance is defined by equation (3) below, and Hamming distance is defined by equation (4) below. dBP (s, t) = |{(x, y) : ((x, y) ∈ s ∧ (x, y) 6∈ t) ∨ ((x, y) ∈ t ∧ (x, y) 6∈ s)}| dH (s, t) = |{i ∈ [1, n] : s[i] 6= t[i]}| 4 (3) (4) Throughout this section, the term pseudoknotted structure is taken to mean a set of ordered pairs [resp. unordered pairs resp. function], which satisfies conditions 1,2,4 (but not necessarily 3) of Definition 3. Given structure s on RNA sequence {a1 , . . . , an }, we say that a position x ∈ [1, n] is touched by s if x belongs to a base pair of s, or equivalently s[x] 6= 0. For possibly pseudoknotted structures s, t on {a1 , . . . , an }, we partition the set [1, n] into disjoint sets A,B,C,D as follows. Let A be the set of positions that are touched by both s and t, yet do not belong to the same base pair in s and t, so A = {i ∈ [1, n] : s[i] 6= 0, t(i) 6= 0, s[i] 6= t[i]} (5) Let B be the set of positions that are touched by either s or t, but not by both, so B = {i ∈ [1, n] : (s[i] 6= 0, t[i] = 0) ∨ (s[i] = 0, t[i] 6= 0)} (6) Let C be the set of positions touched by neither s nor t, so C = {i ∈ [1, n] : s[i] = 0 = t[i]} (7) Let D be the set of positions that belong to the same base pair in both s and t, so D = {i ∈ [1, n] : s[i] 6= 0, t[i] 6= 0, s[i] = t[i]} (8) We further partition A ∪ B into a set of maximal paths and cycles, in the following manner. Define an undirected, vertex-colored and edge-colored graph G = (V, E), whose vertex set V is equal to the set A ∪ B of positions that are touched by either s or t, but not by a common base pair in (s ∩ t), and whose edge set E = (s − t) ∪ (t − s) = (s ∪ t) − (s ∩ t) consists of undirected edges between positions that are base-paired together. Color edge {x, y} green if the base pair (x, y) ∈ s − t and red if (x, y) ∈ t − s. Color vertex x yellow if x is incident to both a red and green edge, green if x is incident to a green edge, but not to any red edge, red if x is incident to a red edge, but not to any green edge. The connected components of G can be classified into 4 types of (maximal) paths and one type of cycle (also called path of type 5): type 1 paths have two green end nodes, type 2 paths have a green end node x and a red end node y, where x < y, type 3 paths have a red end node x and a green end node y, where x < y, type 4 paths have two red end nodes, and type 5 paths (cycles) have no end nodes. These are illustrated in Figure 3. Note that all nodes of a cycle and interior nodes of paths of type 1-4 are yellow, while end nodes (incident to only one edge) are either green or red. If X is a connected component of G, then define the restriction of s [resp. t] to X, denoted by s  X [resp. t  X], to be the set of base pairs (i, j) in s [resp. t] such that i, j ∈ X. With this description, most readers will be able to determine a minimum length pseudoknotted folding pathway from s  X to t  X, where X is a connected component of G. For instance, if X is a path of type 2 or 3, then a sequence of shift moves transforms s  X into t  X, beginning with a shift involving the terminal green node. Further details can be found in Appendix B. The formal definitions given below are necessary to provide a careful proof of the relation between Hamming distance and pseudoknotted M S2 distance, also found in Appendix B. Definition 7. Let s, t be (possibly pseudoknotted) structures on the RNA sequence a1 , . . . , an . For i, j ∈ [1, n], define i ∼ j if s[i] = j or t[i] = j, and let ≡ be the reflexive, transitive closure of ∼. Thus i ≡ j if i = j, or i = i1 ∼ i2 ∼ · · · ∼ im = j for any m ≥ 1. For i ∈ [1, n], let [i] denote the equivalence class of i, i.e. [i] = {j ∈ [1, n] : i ≡ j}. It follows that i ≡ j if and only if i is connected to j by an alternating red/green path or cycle. The equivalence classes X with respect to ≡ are maximal length paths and cycles, as depicted in Figure 3. Moreover, it is easy to see that elements of A either belong to cycles or are found at interior nodes of paths, while elements of B are found exclusively at the left or right terminal nodes of paths. Note that odd-length cycles cannot exist, due to the fact that a structure cannot contain base triples – see condition 2 of Definition 3. Moreover, even-length cycles can indeed exist – consider, for instance, the structure s, whose only base pairs are (1, 15) and (5, 10), and the structure t, whose only base pairs are (1, 5) and (10, 15). Then we have the red/green cycle 1 → 5 → 10 → 15 → 1, consisting of red edge 1 → 5, since (1, 5) ∈ t, green edge 5 → 10, since (5, 10) ∈ s, red edge 10 → 15, since (10, 15) ∈ t, and green edge 15 → 1, since (1, 15) ∈ s. 5 From the discussion before Definition 7, it follows that A in equation (5) consists of the nodes of every cycle together with all interior (yellow) nodes of paths of type 1-4. Moreover, we can think of B in equation (6) as consisting of all path end nodes, i.e. those that have only one incident edge. Let B1 ⊆ B [resp. B2 ⊆ B] denote the set of elements of B that belong to type 1 paths [resp. type 4 paths] of length 1, i.e. positions incident to isolated green [resp. red] edges that correspond to base pairs (i, j) ∈ s where i, j are not touched by t [resp. (i, j) ∈ t where i, j are not touched by s]. Let B0 = B − B1 − B2 be the set of end nodes of a path of length 2 or more. Letting BP1 [resp. BP2 ] denote the set of base pairs (i, j) that belong to s and are not touched by t [resp. belong to t and are not touched by s], we can formalize the previous definitions as follows. B1 = {i ∈ [1, n] : ∃j [{i, j} ∈ s, t(i) = 0 = t(j)] (9) B2 = {i ∈ [1, n] : ∃j [{i, j} ∈ t, s(i) = 0 = s(j)] (10) B0 = B − (B1 ∪ B2 ) (11) BP1 = {(i, j) ∈ s : t[i] = 0 = t[j]} (12) BP2 = {(i, j) ∈ t : s[i] = 0 = s[j]} (13) In Appendix B, it is proved that pk-M S2 distance between s  X and t  X for any maximal path X is c; in contrast, pk-M S2 distance between s  X and t  X for any equal to Hamming distance b dH (sX,tX) 2 cycle X is equal to b dH (sX,tX) c + 1. It follows that 2 dpk−M S2 (s, t) = b dH (s, t) c 2 (14) if and only if there are no type 5 paths (i.e. cycles). This result justifies ex post facto the use of Hamming distance in the investigation of RNA molecular evolution [36, 43]. We also have the following. Lemma 8. Let s, t be two arbitrary (possibly pseudoknotted) structures for the RNA sequence a1 , . . . , an , and let X1 , . . . , Xm be the equivalence classes with respect to equivalence relation ≡ on A ∪ B. Then the pk-M S2 distance between s and t is equal to dpk−M S2 (s, t) = m X   max |s  Xi |, |t  Xi | i=1 This lemma is useful, since the pk-M S2 distance provides a lower bound for the M S2 distance between any two secondary structures, and hence allows a straightforward, but slow (exponential time) branch-andbound algorithm to be implemented for the exact M S2 distance – pseudocode for the branch-and-bound algorithm is given in Section C of the Appendix. To compute pk-M S2 distance, we remove those base pairs in s − t that are not touched by t, compute the equivalence classes (connected components) X on the set of positions belonging to the remaining base pairs (provided that the position does not belong to a common base pair of both s and t), then determine for each X a minimum length pk-M S2 folding pathway from s  X to t  X. The formal pseudocode follows. Algorithm 9 (pk-M S2 distance). M S2 -path length between two possibly pseudoknotted structures s, t. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. remove from s all base pairs of BP1 numM oves = |BP1 | Q = A ∪ B0 while Q 6= ∅ { x0 = min(Q); X = [x0 ] //X is equivalence class of x0 determine path type of X compute minimum length folding pathway from s  X to t  X numM oves = numM oves + max(|s  X|, |t  X|) add to s all base pairs in BP2 numM oves = numM oves + |BP2 | 6 return numM oves 11. Straightforward details of how to implement line 7 are given in the Appendix. The principle underlying the reason that Algorithm 9 produces a minimum length (pseudoknotted) M S2 folding trajectory from s to t is that we maximize the number of shift moves, since a single shift move from {x, y} ∈ s to {y, z} ∈ t corresponds to the simultaneous removal of {x, y} and addition of {y, z}. We apply this principle in the next section to determine the minimum length (non-pseudoknotted) M S2 folding trajectory from s to t. 3 M S2 distance between secondary structures In this section, we present an integer programming (IP) algorithm to compute the M S2 distance between any two secondary structures s, t, i.e. the minimum length of an M S2 trajectory from s to t. Our algorithm has been cross-checked with the exhaustive branch-and-bound algorithm mentioned at the end of the last section. As in the previous section, our goal is to maximize the number of shift operations in the M S2 trajectory, formalized in the following simple theorem, whose proof is clear. Theorem 10. Suppose that the M S2 distance between secondary structures s, t is k, i.e. base pair distance dBP (s, t) = |s − t| + |t − s| = k. Suppose that ` is the number of shift moves occurring in a minimum length M S2 refolding trajectory s = s0 , s1 , . . . , sm = t from s to t. Then the M S2 distance between s and t equals dM S2 (s, t) = ` + (k − 2`) = k − ` (15) Our strategy will now be to use a graph-theoretic approach to maximize the number of shift moves. 3.1 RNA conflict digraph Throughout this section, we take s, t to be two arbitrary, distinct, but fixed secondary structures of the RNA sequence a1 , . . . , an . Recall the definitions of A, B, C, D in equations (5–8), so that A is the set of positions x ∈ [1, n] that are base-paired in both s and t, but the base pairs in s and t are not identical; B is the set of positions x ∈ [1, n] that are base-paired in one of s or t, but not both; C is the set of positions x ∈ [1, n] that are base-paired in neither s nor t, and D is the set of positions x ∈ [1, n] that are base-paired to the same partner in both s and t. To determine a minimum length M S2 folding trajectory from secondary structure s to secondary structure t is to maximize the number of shift moves and minimize the number of base pair additions and removals. To that end, note that the base pairs in s that do not touch any base pair of t must be removed in any M S2 path from s to t, since there is no shift of such base pairs to a base pair of t – such base pairs are exactly those in BP1 , defined in equation (12). Similarly, note that the base pairs in t that do not touch any base pair of s must occur must be added, in the transformation of s to t, since there is no shift of any base pair from s to obtain such base pairs of t – such base pairs are exactly those in BP2 , defined in equation (13). We now focus on the remaining base pairs of s, all of which touch a base pair of t, and hence could theoretically allow a shift move in transforming s to t, provided that there is no base triple or pseudoknot introduced by performing such a shift move. Examples of all six possible types of shift move are illustrated in Figure 4. To handle such cases, we define the notion of RNA conflict digraph, solve the feedback vertex set (FVS) problem [22] by integer programming (IP), apply topological sorting [7] to the acyclic digraph obtained by removing a minimum set of vertices occurring in feedback loops, then apply shift moves in topologically sorted order. We now formalize this argument. Define the digraph G = (V, E), whose vertices (or nodes) n ∈ V are defined in the following Definition 11 and whose directed edges are defined in Definition 12. Definition 11 (Vertex in an RNA conflict digraph). If s, t are distinct secondary structures for the RNA sequence a1 , . . . , an , then a vertex in the RNA conflict digraph G = G(s, t) is a triplet node, or more simply, node v = (x, y, z) consisting of integers x, y, z, such that the base pair {x, y}< = (min(x, y), max(x, y)) belongs to t, and the base pair {y, z}< = (min(y, z), max(y, z)) belongs to s. Let v.t [resp. v.s] denote the base pair {x, y}< [resp. {y, z}< ] belonging to t [resp. s]. The 7 middle integer y of node v = (x, y, z) is called the pivot position, since it is common to both s and t. Nodes are ordered by the integer ordering of their pivot positions: (x, y, z)  (x0 , y 0 , z 0 ) if and only if y ≤ y 0 (or y = y 0 and x < x0 , or y = y 0 , x = x0 , and z < z 0 ). If v = (x, y, z) is a node, then f latten(v) is defined to be the set {x, y, z} of its coordinates. Nodes are representations of a potential shift move, and can be categorized into six types, as shown in Figure 4. Definition 12 (Directed edge in an RNA conflict digraph). Base pairs {a, b}< and {c, d}< are said to touch if |{a, b} ∩ {c, d}| = 1; in other words, base pairs touch if they form a base triple. Base pairs {a, b}< and {c, d}< are said to cross if either min(a, b) < min(c, d) < max(a, b) < max(c, d) or min(c, d) < min(a, b) < max(c, d) < max(a, b); in other words, base pairs cross if they form a pseudoknot. There is a directed edge from node n1 = (x1 , y1 , z1 ) to node n2 = (x2 , y2 , z2 ), denoted by (n1 , n2 ) ∈ E or equivalently by n1 → n2 , if (1) |f latten(n1 ) ∩ f latten(n2 )| ≤ 1, or in other words if n1 and n2 overlap in at most one position, and (2) the base pair {y1 , z1 }< ∈ s from n1 either touches or crosses the base pair {x2 , y2 }< ∈ t from n2 . Note that if the base pair {y1 , z1 }< ∈ s from n1 touches the base pair {x2 , y2 }< ∈ t from n2 , then it must be that z1 = x2 ; indeed, since each pivot node y1 [resp. y2 ] belongs to a base pair of both s and t, it cannot be that z1 = y2 (because then {y1 , z1 }< ∈ s and {y2 , z2 }< ∈ s would form a base triple in s at z1 = y2 ), nor can it be that y1 = x2 (because then {x1 , y1 }< ∈ t and {x2 , y2 }< ∈ t would form a base triple in t at y1 = x2 ). Note as well that if n1 = (x1 , y1 , z1 ) and n2 = (x2 , y2 , z2 ) are triplet nodes, then |f latten(n1 ) ∩ f latten(n2 )| = 1 implies that either n1 → n2 or n2 → n1 . Indeed, if there is a common element shared by n1 and n2 , then it cannot be a pivot element, since s and t cannot have a base triple. For the same reason, the common element cannot belong to the base pairs {x1 , y1 } ∈ t of n1 and {x2 , y2 } ∈ t of n2 (otherwise t would contain a base triple), nor can the common element belong to the base pairs {y1 , z1 } ∈ s of n1 and {y2 , z2 } ∈ s of n2 (otherwise s would contain a base triple). It follows that either {x1 , y1 } ∩ {y2 , z2 } = 6 ∅, or {x2 , y2 } ∩ {y1 , z1 } = 6 ∅. From the assumption that |f latten(n1 ) ∩ f latten(n2 )| = 1, this implies that either n2 → n1 or that n1 → n2 , but not both. Finally, note that if n1 = (x1 , y1 , z1 ), n2 = (x2 , y2 , z2 ) and |f latten(n1 ) ∩ f latten(n2 )| = 2, then there are exactly three possibilities, all of which can be realized: 1. n1 .t = n2 .t, so that {x1 , y1 } = {x2 , y2 }, as in the example (1, 5) ∈ s, (10, 15) ∈ s, (5, 10) ∈ t, n1 = (10, 5, 1), n2 = (5, 10, 15); 2. n1 .s = n2 .s, so that {y1 , z1 } = {y2 , z2 }, as in the example (1, 5) ∈ t, (10, 15) ∈ t, (5, 10) ∈ s, n1 = (1, 5, 10), n2 = (15, 10, 5); 3. {x1 , z1 } = {x2 , z2 }, as shown in Figure 5. This latter example will be called a closed 2-cycle. These considerations produce the equivalent but sharper following definition. Definition 13 (Conflict digraph G = (V, E)). Let s, t be distinct secondary structures for the RNA sequence a1 , . . . , an . The RNA confict digraph G(s, t) = (V (s, t), E(s, t)), or G = (V, E) when s, t are clear from context, is defined by V = {(x, y, z) : x, y, z ∈ [1, n] ∧ {x, y} ∈ t ∧ {y, z} ∈ s} (16) n E = (n1 , n2 ) : n1 = (x1 , y1 , z1 ) ∈ V ∧ n2 = (x2 , y2 , z2 ) ∈ V ∧  |f latten(n1 ) ∩ f latten(n2 )| ≤ 1 ∧ z1 = x2 ∨  [min(y1 , z1 ) < min(x2 , y2 ) < max(y1 , z1 ) < max(x2 , y2 )] ∨ o [min(x2 , y2 ) < min(y1 , z1 ) < max(x2 , y2 ) < max(y1 , z1 )] (17) 8 The set of directed edges of conflict digraph G = (V, E), as defined in Definition 13, establishes a partial ordering on vertices of V with the property that n1 → n2 holds for vertices n1 = (x, y, z), n2 = (u, v, w) if and only if (1) n1 and n2 overlap in at most one position, and (2) when shift move n2 is applied, shifting {v, w} ∈ s to {u, v} ∈ t, the base pair {u, v} either touches or crosses the base pair {y, z} ∈ s in n1 . It follows that if n1 → n2 , then the shift move in which {y, z} ∈ s shifts to {x, y} ∈ t must be performed before the shift move where {v, w} ∈ s shifts to {u, v} ∈ t – indeed, if shifts are performed in the opposite order, then after shifting {v, w} ∈ s to {u, v} ∈ t and before shifting {y, z} ∈ s to {x, y} ∈ t, we would create either a base triple or a pseudoknot. Strictly speaking, the overlap condition (1) is not a necessary requirement, and in our first IP algorithm to compute M S2 distance [2], we considered a somewhat more general edge relation without condition (1). If distinct vertices n1 , n2 violate condition (1), then |f latten(n1 ) ∩ f latten(n2 )| = 2, and the constraint (‡) in line 7 of Algorithm 14 would ensure that at most one of n1 , n2 are selected by the IP solver for the set V , in the resulting acyclic digraph G = (V , E). Nevertheless, the run time of our algorithm depends heavily on the number of simple directed cycles in the initial conflict digraph G = (V, E). Without condition (1), nodes n1 , n2 in a closed 2-cycle (see Figure 5) satisfy n1 → n2 and n2 → n1 . Since it is possible that n1 belong to other cycles that do not contain n2 , this can (and does) lead to a greatly increased number of directed cycles, hence much longer run time – indeed, our algorithm in [2] runs 10 times slower than the current algorithm. Before proceeding with the description of the algorithm, we must explain how to treat closed 2-cycles, as shown in Figure 5, for which there exist four integers a1 < a2 < a3 < a4 , such that either Case A or Case B holds. Case A: Base pairs (a1 , a2 ) and (a3 , a4 ) belong to t, while base pairs (a1 , a4 ) and (a2 , a3 ) belong to s, as shown in Figure 5a. In this case, the conflict digraph G = (V, E) contains the following 4 vertices v1 = (a1 , a2 , a3 ) of type 1, v2 = (a3 , a4 , a1 ) of type 5, v3 = (a2 , a1 , a4 ) of type 4, and v4 = (a4 , a3 , a2 ) of type 2. The overlap of any two distinct vertices has size 2, so by Definition 13, there can be no directed edge between any vertices. There are four optimal trajectories of size 3; for specificity we select the following optimal trajectory: remove (a1 , a4 ) from s (18) Case B: Base pairs (a1 , a2 ) and (a3 , a4 ) belong to s, while base pairs (a1 , a4 ) and (a2 , a3 ) belong to t, as shown in Figure 5b. In this case, the conflict digraph G = (V, E) contains the following 4 vertices v1 = (a1 , a4 , a3 ) of type 6, v2 = (a4 , a1 , a2 ) of type 3, v3 = (a2 , a3 , a4 ) of type 1, and v4 = (a3 , a2 , a1 ) of type 2. The overlap of any two distinct vertices has size 2, so by Definition 13, there can be no directed edge between any vertices. There are four optimal trajectories of size 3; for specificity we select the following optimal trajectory: remove (a1 , a2 ) from s (19) In Algorithm 14 below, it is necessary to list all closed 2-cycles, as depicted in Figure 5. This can be done in linear time O(n), for RNA sequence a = a1 , . . . , an and secondary structures s, t by computing equivalence classes as defined in Definition 7, then inspecting all size 4 equivalence classes X = {a1 , a2 , a3 , a4 } to determine whether Case A or Case B applies. For each such closed 2-cycle, Algorithm 14 computes the partial trajectory (18) or (19) appropriately, then the vertices v1 , v2 , v3 , v4 are deleted. No edges need to be deleted, since there are no edges between vi and vj for 1 ≤ i, j ≤ 4. In creating the partial trajectories, the variable numMoves must be updated. By special treatment of closed 2-cycles, we obtain a 10-fold speed-up in the exact IP Algorithm 14 over that of the precursor Algorithm 10 in our WABI 2017 proceedings paper [2] – compare run times of Figure 14 with those from Figure 5 of [2]. Except for the special case of closed 2-cycles that must be handled before general treatment, note that Definition 13 establishes a partial ordering on vertices of the conflict digraph G = (V, E), in that edges determine the order in which shift moves should be performed. Indeed, if n1 = {x, y, z}, n2 = {u, v, z} and (n1 , n2 ) ∈ E, which we denote from now on by n1 → n2 , then the shift move in which {y, z} ∈ s shifts to {x, y} ∈ t must be performed before the shift move where {v, w} ∈ s shifts to {u, v} ∈ t – indeed, if shifts are performed in the opposite order, then after shifting {v, w} ∈ s to {u, v} ∈ t and before shifting {y, z} ∈ s to {x, y} ∈ t, we would create either a base triple or a pseudoknot. 9 Our strategy to efficiently compute the M S2 distance between secondary structures s and t will be to (1) enumerate all simple cycles in the conflict digraph G = (V, E) and to (2) apply an integer programming (IP) solver to solve the minimum feedback arc set problem V 0 ⊂ V . Noticing that the induced digraph G = (V , E), where V = V − V 0 and E = E ∩ (V × V ), is acyclic, we then (3) topologically sort G, and (4) perform shift moves from V in topologically sorted order. Algorithm 14 (M S2 distance from s to t). Input: Secondary structures s, t for RNA sequence a1 , . . . , an Output: Folding trajectory s = s0 , s1 , . . . , sm = t, where s0 , . . . , sm are secondary structures, m is the minimum possible value for which si is obtained from si−1 by a single base pair addition, removal or shift for each i = 1, . . . , m. First, initialize the variable numMoves to 0, and the list moveSequence to the empty list [ ]. Recall that BP2 = {(x, y) : (x, y) ∈ t, (s − t)[x] = 0, (s − t)[y] = 0}. Bear in mind that s is constantly being updated, so actions performed on s depend on its current value. //remove base pairs from s that are untouched by t 1. BP1 = {(x, y) : (x, y) ∈ s, (t − s)[x] = 0, (t − s)[y] = 0} 2. for (x, y) ∈ BP1 3. remove (x, y) from s; numMoves = numMoves+1 //define conflict digraph G = (V, E) on updated s and unchanged t 4. define V by equation (16) 5. define E by equation (17) 6. define conflict digraph G = (V, E) //IP solution Pof minimum feedback arc set problem 7. maximize v∈V xv where xv ∈ {0, 1}, subject to constraints (†) and (‡) //constraint to remove vertex from each simple cycle of G P xv < |C| for each simple directed cycle C of G (†) v∈C //constraint to ensure shift moves cannot be applied if they share same base pair from s or t (‡) xv + xv0 ≤ 1, for all pairs of vertices v = (x, y, z) and v 0 = (x0 , y 0 , z 0 ) with |{x, y, z} ∩ {x0 , y 0 , z 0 }| = 2 //define IP solution acyclic digraph G = (V , E) 8. V = {v ∈ V : xv = 1}; V 0 = {v ∈ V : xv = 0} 9. E = {(v, v 0 ) : v, v 0 ∈ V ∧ (v, v 0 ) ∈ E} 10. G = (V , E) //handle special, closed 2-cycles 11. for each closed 2-cycle [x] = {a1 , a2 , a3 , a4 } as depicted in Figure 5 12. if [x] is of type A as depicted in Figure 5a 13. remove base pair from s by equation (18) 14. if [x] is of type B as depicted in Figure 5b 15. remove base pair from s by equation (19) //remove base pairs from s that are not involved in a shift move 16. V .s = {(x, y) : ∃v ∈ V (v.s = (x, y))} 17. for (x, y) ∈ s − t 18. if (x, y) 6∈ V .s 19. remove (x, y) from s; numMoves = numMoves+1 //topological sort for IP solution G = (V , E) 20. topological sort of G using DFS [7] to obtain total ordering ≺ on V 21. for v = (x, y, z) ∈ V in topologically sorted order ≺ 22. shift {y, z} to {x, y} in s; numMoves = numMoves+1 //add remaining base pairs from t − s, e.g. from BP2 and type 4,5 paths in Figure 3 23. for (x, y) ∈ t − s 24. add (x, y) to s; numMoves = numMoves+1 25. return folding trajectory, numMoves We now illustrate the definitions and the execution of the algorithm for a tiny example where s = {(1, 5), (10, 15), (20, 25)} and t = {(5, 10), (15, 20)}. From Definition 7, there is only one equivalence class X = {1, 5, 10, 15, 20, 25} and it is a path of type 1, as illustrated in Figure 3, where b1 = 1, a1 = 5, b2 = 10, 10 a2 = 15, b3 = 20, a3 = 25. From Definition 11, there are 4 vertices in the conflict digraph G = (V, E), where v1 = (10, 5, 1), v2 = (5, 10, 15), v3 = (20, 15, 10), v4 = (15, 20, 25) – recall the convention from that definition that vertex v = (x, y, z) means that base pair {y, z} ∈ s and base pair {x, y} ∈ t, so that the pivot position y is shared by base pairs from both s and t. From Definition 12, there are only two directed edges, v1 → v3 since v1 .s touches v2 .t, and v2 → v4 since v2 .s touches v4 .t. Note there is no edge from v1 to v2 , or from v2 to v3 , or from v3 to v4 , since their overlap has size 2 – for instance f latten(v1 ) = {1, 5, 10}, f latten(v2 ) = {5, 10, 15}, and f latten(v1 )∩f latten(v2 ) = {5, 10} of size 2. There is no cycle, so the constraint (†) in line 7 of Algorithm 14 is not applied; however the constraint (‡) does apply, so that xv1 + xv2 ≤ 1, xv2 + xv3 ≤ 1, xv3 + xv4 ≤ 1. It follows that there are three possible IP solutions for the vertex set V . Case 1: V = {v1 , v3 } Then v1 .s = (1, 5), v3 .s = (10, 15) so V .s = {(1, 5), (10, 15)} and by lines 11-14 we remove base pair (20, 25) from s. Now G = (V , E), where E = {v1 → v3 }, so topological sort is trivial and we complete the trajectory by applying shift v1 and then shift v3 . Trajectory length is 5. Case 2: V = {v1 , v4 } Then v1 .s = (1, 5), v4 .s = (20, 25) so V .s = {(1, 5), (20, 25)} and by lines 11-14 we remove base pair (10, 15) from s. Now G = (V , E), where E = ∅, so topological sort is trivial and we complete the trajectory by applying shift v1 and then shift v4 , or by applying shift v4 and then shift v1 . Trajectory length is 5. Case 3: V = {v2 , v4 } Then v2 .s = (10, 15), v4 .s = (20, 25) so V .s = {(10, 15), (20, 25)} and by lines 11-14 we remove base pair (1, 5) from s. Now G = (V , E), where E = {v2 → v4 }, so topological sort is trivial and we complete the trajectory by applying shift v2 and then shift v4 . Trajectory length is 5. 3.2 Examples to illustrate Algorithm 14 We illustrate concepts defined so far with three examples: a toy 20 nt RNA sequence, a 25 nt bistable switch, and the 56 nt spliced leader RNA from L. collosoma. 3.2.1 Toy 20 nt sequence For the toy 20 nt sequence GGGAAAUUUC CCCAAAGGGG with initial structure s shown in Figure 6a, and target structure t shown in Figure 6b, the corresponding conflict digraph is shown in Figure 6c. This is a toy example, since the empty structure is energetically more favorable than either structure: free energy of s is +0.70 kcal/mol, while that for t is +3.30 kcal/mol. The conflict digraph contains 6 vertices, 10 directed edges, and 3 simple cycles: a first cycle {(8, 20, 10), (9, 19, 11), (18, 10, 20), (19, 9, 1)} of size 4, a second cycle {[(8, 20, 10), (19, 9, 1)} of size 2, and a third cycle {(18, 10, 20), (9, 19, 11)} of size 2. 3.2.2 Bistable switch Figure 7 depicts the secondary structure for the metastable and the MFE structures, as well as the corresponding conflict digraphs for the 25 nt bistable switch, with sequence UGUACCGGAA GGUGCGAAUC UUCCG, taken from Figure 1(b).1 of [20], in which the authors report structural probing by comparative imino proton NMR spectroscopy. The minimum free energy (MFE) structure has -10.20 kcal/mol, while the next metastable structure has -7.40 kcal/mol. Two lower energy structures exist, having -9.00 kcal/mol resp. -7.60 kcal/mol; however, each is a minor variant of the MFE structure. Figures 7a and 7b depict respectively the metastable and the MFE secondary structures for this 25 nt RNA, while Figures 7c and 7d depict respectively the MFE conflict digraph and the metastable conflict digraph. For this 25 nt bistable switch, let s denote the metastable structure and t denote the MFE structure. We 11 determine the following. , then we have the following. s = [(1, 16), (2, 15), (3, 14), (4, 13), (5, 12), (6, 11)] with 6 base pairs t = [(6, 25), (7, 24), (8, 23), (9, 22), (10, 21), (11, 20), (12, 19), (13, 18)] with 8 base pairs A = {6, 11, 12, 13} B = {1, 2, 3, 4, 5, 7, 8, 9, 10, 14, 15, 16, 18, 19, 20, 21, 22, 23, 24, 25} C = {17} D=∅ BP1 = {(1, 16), (2, 15), (3, 14)} with 3 base pairs BP2 = {(7, 24), (8, 23), (9, 22), (10, 21)} with 4 base pairs B0 = {4, 5, 18, 19, 20, 25} B1 = {1, 2, 3, 14, 15, 16} B2 = {7, 8, 9, 10, 21, 22, 23, 24} and there are three equivalence classes: X1 = {4, 13, 18} of type 2, X2 = {5, 12, 19} of type 2, and X3 = {6, 11, 20, 25} of type 4. Figure 7c depicts the MFE conflict digraph, where s denotes the metastable structure and t denotes the MFE structure. In the MFE conflict digraph G = (V, E), vertices are triplet nodes (x, y, z), where (unordered) base pair {y, z} ∈ s belongs to the metastable [resp. MFE] structure, and (unordered) base pair {x, y} ∈ t belongs to the MFE [resp. metastable] structure. A direct edge (x, y, z) → (u, v, w) occurs if {y, z} ∈ s touches or crosses {u, v} ∈ t. Both the MFE and the metastable conflict digraphs are acyclic. Although there are no cycles, the IP solver is nevertheless invoked in line 7 with constraint (‡), resulting in either a first solution V = {(18, 13, 4), (19, 12, 5), (20, 11, 6)} or a second solution V = {(18, 13, 4), (19, 12, 5), (25, 6, 11)}. Indeed, the overlap of vertices (20, 11, 6) and (25, 6, 11) has size 2, so one of these vertices must be excluded from V in 8 of Algorithm 14. Assume that the first solution is returned by the IP solver. Then we obtain the following minimum length M S2 folding trajectory from metastable s to MFE t. Vertex and edge set of G = (V, E) are given by the following. V = {(18, 13, 4), (19, 12, 5), (20, 11, 6), (25, 6, 11)} E = {(18, 13, 4) → (19, 12, 5), (18, 13, 4) → (20, 11, 6), (18, 13, 4) → (25, 6, 11), (19, 12, 5) → (20, 11, 6), (19, 12, 5) → (25, 6, 11)} One of two minimum length M S2 folding trajectories is given by the following. 1. 2. UGUACCGGAAGGUGCGAAUCUUCCG 1234567890123456789012345 0. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. ((((((....))))))......... .(((((....))))).......... ..((((....))))........... ...(((....)))............ ....((....))(....)....... .....(....)((....))...... ..........(((....)))..... ......(...(((....)))...). ......((..(((....)))..)). ......(((.(((....))).))). ......(((((((....))))))). .....((((((((....)))))))) metastable s remove (1,16) remove (2,15) remove (3,14) shift (4,13) to (13,18) shift (5,12) to (12,19) shift (6,11) to (11,20) add (7,24) add (8,23) add (9,22) add (10,21) add (6,25) Algorithm 14 executes the following steps: (1) Remove base pairs in BP1 from s. (2) Compute conflict digraph G = (V, E). (3) Apply IP solver to determine maximum size V ⊆ V , subject to removing a vertex 12 from each cycle (†) and not allowing any two vertices in V to have overlap of size 2. (4) Topologically sorting the induced digraph G = (V , E). (5) Execute shifts according to total ordering ≺ given by topological sort. (6) Add remaining base pairs from t − s. Note that in trajectory steps 7-10, the base pair added comes from BP2 , while that in step 11 is a base pair from t that is “leftover”, due to the fact that triplet node (shift move) (25, 6, 11) does not belong to IP solution V . 3.2.3 Spliced leader from L. collosoma For the 56 nt L. collosoma spliced leader RNA, whose switching properties were investigated in [18] by stopped-flow rapid-mixing and temperature-jump measurements, the MFE and metastable structures are shown in Figure 8, along with the conflict digraph for M S2 folding from the metastable structure to the MFE structure. This RNA has sequence AACUAAAACA AUUUUUGAAG AACAGUUUCU GUACUUCAUU GGUAUGUAGA GACUUC, an MFE structure having -9.40 kcal/mol, and an alternate metastable structure having -9.20 kcal/mol. Figure 8 displays the MFE and metastable structures for L. collosoma spliced leader RNA, along with the conflict digraph for M S2 folding from the metastable to the MFE structure. For L. collosoma spliced leader RNA, if we let s denote the metastable structure and t denote the MFE structure, then there are seven equivalence classes: X1 = {10, 45, 31, 23} of type 4; X2 = {11, 43, 33} of type 3; X3 = {12, 42, 34, 20} of type 4, X4 = {13, 41, 35, 19} of type 4, X5 = {22, 32, 44} of type 3, X6 = {24, 54, 30, 48} of type 1, and X7 = {25, 53, 29, 49} of type 1. As in the case with the 25 nt bistable switch, the equivalence classes for the situation where s and t are interchanged are identical, although type 1 paths become type 4 paths (and vice versa), and type 2 paths become type 3 paths (and vice versa). Output from our (optimal) IP algorithm is as follows. AACUAAAACAAUUUUUGAAGAACAGUUUCUGUACUUCAUUGGUAUGUAGAGACUUC 12345678901234567890123456789012345678901234567890123456 Number of Nodes: 12 Number of edges: 71 Number of cycles: 5 s: .......................((((((((((((.....)))))..))))))).. t: .......((((((..(((((.((((...)))).)))))..))).)))......... -9.20 kcal/mol -9.40 kcal/mol 0. .......................((((((((((((.....)))))..))))))).. metastable s 1. .......................((.(((((((((.....)))))..)))).)).. remove (26,52) 2. .......................((..((((((((.....)))))..)))..)).. remove (27,51) 3. .......................((...(((((((.....)))))..))...)).. remove (28,50) 4. .......................((....((((((.....)))))..)....)).. remove (29,49) 5. .......................((.....(((((.....))))).......)).. remove (30,48) 6. .......................((...).(((((.....)))))........).. (25,53) -> (25,29) 7. .......................((...))(((((.....)))))........... (24,54) -> (24,30) 8. .........(.............((...)).((((.....)))))........... (31,45) -> (10,45) 9. .........(...........(.((...)).)(((.....))).)........... (32,44) -> (22,32) 10. .........((..........(.((...)).).((.....))).)........... (33,43) -> (11,43) 11. .........(((.........(.((...)).)..(.....))).)........... (34,42) -> (12,42) 12. .........(((......(..(.((...)).)..)......)).)........... (35,41) -> (19,35) 13. .......(.(((......(..(.((...)).)..)......)).).)......... add (8,47) 14. .......(((((......(..(.((...)).)..)......)).)))......... add (9,46) 15. .......(((((...(..(..(.((...)).)..)..)...)).)))......... add (16,38) 16. .......(((((...((.(..(.((...)).)..).))...)).)))......... add (17,37) 17. .......(((((...((((..(.((...)).)..))))...)).)))......... add (18,36) 18. .......(((((...(((((.(.((...)).).)))))...)).)))......... add (20,34) 19 .......(((((...(((((.((((...)))).)))))...)).)))......... add (23,31) 20. .......((((((..(((((.((((...)))).)))))..))).)))......... add (13,41) Number of base pair removals: 5 Number of base pair additions: 8 Number of base pair shifts: 7 13 MS2 Distance: 20 Figure 8a depicts the initial structure s, and Figure 8b depicts the target minimum free energy structure t for spliced leader RNA from L. collosoma. The conflict digraph for the refolding from s to t is shown in Figure 8c. Figure 9a displays the rainbow diagram for spliced leader RNA from L. collosoma, in which the base pairs for the initial structure s (Figure 8a) are shown below the line in red, while those for the target structure t (Figure 8b) are shown above the line in blue. Figure 9c displays the Arrhenius tree, where leaf index 2 represents the initial metastable structure s with free energy -9.20 kcal/mol as shown in Figure 8a, while leaf index 1 represents the target MFE structure t with free energy -9.40 kcal/mol as shown in Figure 8b. In Figure 9b, the dotted blue line depicts the free energies of structures in the shortest M S2 folding trajectory for spliced leader, as computed by Algorithm 14, while the solid red line depicts the free energies of the energy-optimal folding trajectory as computed by the programs RNAsubopt [46] and barriers [14]. 3.2.4 xpt riboswitch from B. subtilis In this section, we describe the shortest M S2 folding trajectory from the initial gene ON structure s to the target gene OFF structure t for the 156 nt xanthine phosphoribosyltransferase (xpt) riboswitch from B. subtilis, where the sequence and secondary structures are taken from Figure 1A of [38]. The gene ON [resp. OFF] structures for the 156 nt xpt RNA sequence AGGAACACUC AUAUAAUCGC GUGGAUAUGG CACGCAAGUU UCUACCGGGC ACCGUAAAUG UCCGACUAUG GGUGAGCAAU GGAACCGCAC GUGUACGGUU UUUUGUGAUA UCAGCAUUGC UUGCUCUUUA UUUGAGCGGG CAAUGCUUUU UUUAUU are displayed in Figure 10a [resp. 10b], while Figure 10c shows the rainbow diagram, where lower red arcs [resp. upper blue arcs] indicate the base pairs of the initial gene ON [resp. target gene OFF] structure. The default structure for the xpt riboswitch in B. subtilis is the gene ON structure; however, the binding of a guanine nucleoside ligand to cytidine in position 66 triggers a conformational change to the gene OFF structure. Figure 10d depicts the conflict digraph G = (V, E) containing 18 vertices, 113 directed edges, and 1806 directed cycles, which is used to compute the shortest M S2 folding trajectory from the gene ON to the gene OFF structure. Figures 11a and 11b show an enlargement of the initial gene ON structure s and target gene OFF structure t, which allows us to follow the moves in a shortest M S2 trajectory that is displayed in Figure 11c. 4 An algorithm for near-optimal M S2 distance Since the exact IP Algorithm 14 could not compute the shortest M S2 folding trajectories between the minimum free energy (MFE) structure and Zuker suboptimal structures for some Rfam sequences of even modest size (≈ 100 nt), we designed a near-optimal IP algorithm (presented in this section), and a greedy algorithm (presented in Section D of the Appendix). The exact branch-and-bound algorithm from Appendix C was used to debug and cross-check all algorithms. The run time complexity of both the exact IP Algorithm 14 and the greedy algorithm is due to the possibly exponentially large set of directed simple cycles in the RNA conflict digraph. By designing a 2-step process, in which the feedback arc set (FAS) problem is first solved for a coarse-grained digraph defined below, and subsequently the feedback vertex set (FVS) problem is solved for each equivalence class, we obtain a much faster algorithm to compute a near-optimal M S2 folding trajectory between secondary structures s and t for the RNA sequence {a1 , . . . , an }. In the first step, we use IP to solve the feedback arc set (FAS) problem for a particular coarse-grained digraph defined below, whose vertices are the equivalence classes as defined in Definition 7. The number of cycles for this coarse-grained digraph is quite manageable, even for large RNAs, hence the FAS can be efficiently solved. After removal of an arc from each directed cycle, topological sorting is applied to determine a total ordering according to which each individual equivalence class is processed. In the second step, Algorithm 14 is applied to each equivalence class in topologically sorted order, whereby the feedback vertex set (FVS) problem is solved for the equivalence class under consideration. In the remainder of this section, we fill in the details for this overview, and then present pseudocode for the near-optimal Algorithm 15. 14 Given secondary structures s and t for the RNA sequence {a1 , . . . , an }, we partition the set [1, n] into disjoint sets A, B, C, D as in Section 2 by following equations (5), (6), (7), (8). The union A∪B is subsequently partitioned into the equivalence classes X1 , . . . , Xm , defined in Definition 7. Define the coarse-grain, conflict digraph G = (V, E), whose vertices are the indices of equivalence classes X1 , . . . , Xm , and whose directed edges i → j are defined if there exists a base pair (x, y) ∈ s, x, y ∈ Xi which crosses a base pair (u, v) ∈ t, u, v ∈ Xj . Although there may be many such base pairs (x, y) ∈ s and (u, v) ∈ t, there is only one edge between i and j; i.e. G is a directed graph, not a directed multi-graph. If i → j is an edge, then we define Ni,j to be the set of all base pairs (u, v) ∈ s, u, v ∈ Xi that cross some base pair (u, v) ∈ t, u, v ∈ Xj , and let ni,j the number of base pairs in Ni,j . Formally, given equivalence classes X1 , . . . , Xm , the coarse-grain, conflict digraph G = (V, E) is defined by V = {1, . . . , m} n  o E = i → j : ∃(x, y) ∈ s∃(u, v) ∈ t x, y ∈ Xi ∧ u, v ∈ Xj (20) (21) A directed edge from i to j may be denoted either by i → j ∈ E or by (i, j) ∈ E. For each edge i → j, we formally define Ni,j and ni,j by the following. n  o Ni,j = (x, y) ∈ s : x, y ∈ Xi ∧ ∃(u, v) ∈ t u, v ∈ Xj ∧ (x, y) crosses (u, v) (22) ni,j = Ni,j (23) We now solve the feedback arc set (FAS) problem, rather than the feedback vertex set (FVS) problem, for digraph G, by applying an IP solver to solve the following optimization problem: 1. P maximize (i,j)∈E ni,j · xi,j subject to constraint (]): P (]) xi,j < |C| (i,j)∈E i,j∈C for every directed cycle C = (i1 , i2 , i3 , . . . , ik−1 , ik ) This IP problem can be quickly solved, since there is usually only a modest number of directed cycles for the coarse-grained digraph. For each directed edge or arc i → j that is to be removed from a directed cycle, we remove all base pair (x, y) ∈ from structure s that cross some base pair (u, v) ∈ t for which u, v ∈ Xj . Removal of certain base pairs from s can disconnect some previous equivalence classes into two 0 or more connected components, hence equivalence classes X10 , . . . , Xm 0 must be recomputed for the updated 0 structure s and (unchanged) structure t. The conflict, digraph G = (V 0 , E 0 ) is then defined by equations (20) and (21) for (updated) s and (unchanged) t. Since G0 is now acyclic, it can be topologically sorted, 0 which determines an ordering σ(1), . . . , σ(m0 ) for processing equivalence classes X10 , . . . , Xm 0 . To process 0 an equivalence class X , we restrict the exact Algorithm 14 to each equivalence class. Indeed, to process equivalence class X 0 , we define a (local) conflict digraph G(X 0 ) = (V (X 0 ), E(X 0 )) defined as follows. V (X 0 ) = {(x, y, z) : x, y, z ∈ X 0 ∧ {x, y} ∈ t ∧ {y, z} ∈ s 0 0 (24) 0 E(X ) = {(x, y, z) → (u, v, w) : (x, y, z) ∈ V (X ) ∧ (u, v, w) ∈ V (X )∧ (25) {x, y} touches or crosses {v, w} } Algorithm 15 (Near-optimal M S2 distance from s to t). Input: Secondary structures s, t for RNA sequence a1 , . . . , an Output: s = s0 , s1 , . . . , sm = t, where s0 , . . . , sm are secondary structures, m is a near-optimal value for which si is obtained from si−1 by a single base pair addition, removal or shift for each i = 1, . . . , m. First, initialize the variable numMoves to 0, and the list moveSequence to the empty list [ ]. Define BP1 = {(x, y) : (x, y) ∈ t, (t − s)[x] = 0, (t − s)[y] = 0}; i.e. BP1 consists of those base pairs in s which are 15 not touched by any base pair in t. Define BP2 = {(x, y) : (x, y) ∈ t, (s − t)[x] = 0, (s − t)[y] = 0}; i.e. BP2 consists of those base pairs in t which are not touched by any base pair in s. //remove base pairs from s that are untouched by t 1. for (x, y) ∈ BP1 2. s = s − {(x, y)} 3. numMoves = numMoves + 1 //define equivalence classes on updated s, t 4. [1, n] = A ∪ B ∪ C ∪ D 5. determine equivalence classes X1 , . . . , Xm with union A ∪ B //define conflict digraph G = (V, E) on collection of equivalence classes 6. define V = {1, . . . , m} 7. define E = {(i, j) : 1 ≤ i, j ≤ m} by equation (21) 8. define coarse-grain, conflict digraph G = (V, E) //IP solution Pof feedback arc set problem (not feedback vertex set problem) 9. maximize (i,j)∈E ni,j · xi,j subject to constraint (]): //removeParc from each simple cycle whereni,j defined in equation (23) xi,j < |C| (]) (i,j)∈E i→j∈C for every directed cycle C = (i1 , i2 , . . . , ik−1 , ik ) e = {(i, j) : xi,j = 0} //E e is set of edges that must be removed 10. E e //process the IP solution E e 11. for (i, j) ∈ E 12. for (x, y) ∈ Ni,j //Ni,j defined in Definition 22 13. s = s − {(x, y)} //remove base pair from s belonging to feedback arc 14. numMoves = numMoves + 1 //determine equivalence classes X 0 1 , . . . , X 0 m0 for updated s and (unchanged) t 15. [1, n] = A0 ∪ B 0 ∪ C 0 ∪ D0 16. define X 0 1 , . . . , X 0 m0 whose union is (A0 ∪ B 0 ) 17. define V 0 = {1, . . . , m0 } 18. define E 0 = {(i, j) : 1 ≤ i, j ≤ m0 } by equation (21) 19. define G0 = (V 0 , E 0 ) //note that G0 is an acyclic multigraph 20. let σ ∈ Sm0 be a topological sort of V 0 //Sm0 denotes set of all permutations on [1, m0 ] //process shifts in Xσ(i) in topological order by adapting part of Algorithm 14 21. for i = 1 to m0 22. define V (Xσ(i) ) by equation (24) 23. define E(Xσ(i) ) by equation (25) 24. define G(Xσ(i) ) = (V (Xσ(i) ), E(Xσ(i) )) //IP solution Pof minimum feedback vertex set problem 25. maximize v∈V (Xσ(i) ) xv where xv ∈ {0, 1}, subject to constraints (†i ) and (‡i ) //first P constraint removes vertex from each simple cycle of G(Xσ(i) ) (†i ) xv < |C| for each simple directed cycle C of G(Xσ(i) ) v∈C //ensure shift moves cannot be applied if they share same base pair from s or t (‡i ) xv + xv0 ≤ 1, for distinct vertices v = (x, y, z), v 0 = (x0 , y 0 , z 0 ) with |{x, y, z} ∩ {x0 , y 0 , z 0 }| = 2 //define the induced, acyclic digraph G(Xσ(i) ) 26. V (Xσ(i) ) = {v ∈ V (Xσ(i) ) : xv = 1} 27. E(Xσ(i) ) = {(v, v 0 ) : v, v 0 ∈ V ∧ (v, v 0 ) ∈ E(Xσ(i) )} 28. let G(Xσ(i) ) = (V (Xσ(i) ), E(Xσ(i) )) //handle special, closed 2-cycles 29. for each closed 2-cycle [x] = {a1 , a2 , a3 , a4 } as depicted in Figure 5 30. if [x] is of type A as depicted in Figure 5a 31. remove base pair from s by equation (18) 32. if [x] is of type B as depicted in Figure 5b 33. remove base pair from s by equation (19) //remove base pairs from s that are not involved in a shift move 34. V (Xσ(i) ).s = {(x, y) : ∃v ∈ V (Xσ(i) )(v.s = (x, y))} 35. for (x, y) ∈ s − t 36. if (x, y) 6∈ V (Xσ(i) ).s 16 remove (x, y) from s; numMoves = numMoves+1 //topological sort of IP solution V (Xσ(i) ) 38. topological sort of G(Xσ(i) ) using DFS to obtain total ordering ≺ on V (Xσ(i) ) 38. for v = (x, y, z) ∈ V in topologically sorted order ≺ //check if shift would create a base triple, as in type 1,5 paths from Figure 3 40. if s[x] = 1 //i.e. {u, x} ∈ s for some u ∈ [1, n] 41. remove {u, x} from s; numMoves = numMoves+1 42. shift {y, z} to {x, y} in s; numMoves = numMoves+1 //remove any remaining base pairs from s that have not been shifted 43. for (y, z) ∈ s − t which satisfy y, z ∈ Xσ(i) 44. if (x, y, z) ∈ V (Xσ(i) ) where x = t[y] 45. shift base pair {y, z} ∈ s to {x, y} ∈ t; numMoves = numMoves+1 46. else //{y, z} is a remaining base pair of s but cannot be applied in a shift 47. remove (x, y) from s; numMoves = numMoves+1 //add remaining base pairs from t to s 48. for (x, y) ∈ t − s 49. s = s ∪ {(x, y)} 50. numMoves = numMoves + 1 51. return moveSequence, numMoves 37. 5 5.1 Benchmarking results Random sequences Given a random RNA sequence a = a1 , . . . an of length n, we generate a list L of all possible base pairs, then choose with uniform probability a base pairs (x, y) from L, add (x, y) to the secondary structure s being constructed, then remove all base pairs (x0 , y 0 ) from L that either touch or cross (x, y), and repeat these last three steps until we have constructed a secondary structure having the desired number (n/5) of base pairs. If the list L is empty before completion of the construction of secondary structure s, then reject s and start over. The following pseudocode describes how we generated the benchmarking data set, where for each sequence length n = 10, 15, 20, · · · , 150 nt, twenty-five random RNA sequences were generated of length n, with probability of 1/4 for each nucleotide, in which twenty secondary structures s, t were uniformly randomly generated for each sequence so that 40% of the nucleotides are base-paired. 1. 2. 3. 4. 5. 6. for n = 10 to 150 with step size 10 for numSeq = 1 to 25 generate random RNA sequence a = a1 , . . . , an of length n generate 20 random secondary structures of a  for all 20 = 190 pairs of structures s, t of a 2 compute optimal and near-optimal M S2 folding trajectories from s to t The number of computations per sequence length is thus 25 · 190 = 4750, so the size of the benchmarking set is 15 · 4750 = 71, 250. This benchmarking set is used in Figures 12 – 16. Figure 12 compares various distance measures discussed in this paper: M S2 distance computed by the optimal IP Algorithm 14, approximate M S2 distance computed by the near-optimal Algorithm 15, pk − M S2 distance that allows pseudoknotted intermediate structures, M S1 distance, and Hamming distance divided by 2. Additionally, this figure distinguishes the number of base pair additions/removals and shifts in the M S2 distance. Figure 13a shows the scatter plots and Pearson correlation coefficients all pairs of the distance measures: M S2 distance, near-optimal M S2 distance, pk − M S2 distance, Hamming distance divided by 2, M S1 distance. In contrast to Figure 13, the second panel Figure 13b shows the length-normalized values. It is unclear why M S2 distance has a slightly higher length-normalized correlation with both Hamming distance divided by 2 and M S1 distance, than that with approximate M S2 distance, as computed by Algorithm 15 – despite the fact that the latter algorithm approximates M S2 distance much better than either Hamming distance divided by 2 or M S1 distance. Figure 14 shows that run-time of Algorithms 14 and 15, where the 17 former is broken down into time to generate the set of directed cycles and the time for the IP solver. Note that there is a 10-fold speed-up in Algorithm 14 from this paper, compared with a precursor of this algorithm that appeared in the proceedings of the Workshop in Bioinformatics (WABI 2017). Since Algorithm 15 applies Algorithm 14 to each equivalence class, there is a corresponding, but less striking speed-up in the nearoptimal algorithm. Since run-time depends heavily on the number of directed cycles in the conflict digraphs, Figure 15a shows the size of vertex and edge sets of the conflict digraphs for the benchmarking data, and Figure 15b depicts the cycle length distribution for benchmarking data of length 150; for different lengths, there are similar distributions (data not shown). Finally, Figure 15c showns the (presumably) exponential increase in the number of directed cycles, as a function of sequence length. Since Algorithm 15 does not compute the collection of all directed cycles (but only those for each equivalence class), the run time of Algorithm 15 appears to be linear in sequence length, compared to the (presumably) exponential run time of Algorithm 14. 5.2 Rfam sequences In this section, we use data from the Rfam 12.0 database [28] for analogous computations as those from the previous benchmarking section. For each Rfam family having average sequence length less than 100 nt, one sequence is randomly selected, provided that the base pair distance between its MFE structure and its Rfam consensus structure is a minimum. For each such sequence a, the target structure t was taken to be the secondary structure having minimum free energy among all structures of a that are compatible with the Rfam consensus structure, as computed by RNAfold -C [25] constrained with the consensus structure of a. The corresponding initial structure s for sequence a was selected from a Zuker-suboptimal structure, obtained by RNAsubopt -z [25], with the property that |dBP (s, t) − dH (s, t)| < 0.2 · dBP (s, t). Since we know from Figure 14 that run time of the optimal IP Algorithm 14 depends on the number of cycles in the corresponding RNA conflict digraph, the last criterion is likely to result in a less than astronomical number of cycles. The resulting dataset consisted of 1333 sequences, some of whose lengths exceed 100 nt. Nevertheless, the number of cycles in the RNA constraint digraph of 22 of the 1333 sequences exceeded 50 million (an upper bound set for our program), so all figures described in this section are based on 1311 sequences from Rfam. Figure 17 depicts the moving averages in centered windows [x−2, x+2] of the following distance measures for the 1311 sequences extracted from Rfam 12.0 as described. Distance measures include (1) optimal M S2 distance computed by the exact IP (optimal) Algorithm 14 (where the number of base pair additions (+) or removals (−) is indicated, along with the number of shifts), (2) near-optimal M S2 -distance computed by near-optimal Algorithm 15, (3) Hamming distance divided by 2, (4) M S1 distance aka base pair distance, (5) pseudoknotted M S2 distance (pk-M S2 ) computed from Algorithm 9, (6) optimal local M S2 with parameter d = 10, and (7) optimal local M S2 with parameter d = 20. The latter values were computed by a variant of the exact IP Algorithm 14 with locality parameter d, defined to allow base pair shifts of the form (x, y) → (x, z) or (y, x) → (z, x) only when |y −z| ≤ d. This data suggests that Hamming distance over 2 (dH (s, t)/2) closely approximates the distance computed by near-optimal Algorithm 15, while pk-M S2 distance (dpk-M S2 (s, t)) is a better approximation to M S2 distance than is Hamming distance over 2. Figure 18 presents scatter plots and Pearson correlation values when comparing various distance measures using the Rfam data. Figure 18a [resp. Figure 18b] presents Pearson correlation [resp. normalized Pearson correlation] values computed, where by normalized, we mean that for each of the 1311 extracted Rfam sequences a with corresponding initial structure s and target structure t, the length-normalized distance measures d(s, t)/|a| are correlated. Figure 19 depicts the moving average run times as a function of sequence length, where for given value x the run times are averaged for sequences having length in [x − 2, x + 2]. Finally, Figure 20 depicts the number of sequences of various lengths used in the Rfam benchmarking set of 1311 sequences. 6 Conclusion In this paper, we have introduced the first optimal and near-optimal algorithms to compute the shortest RNA secondary structure folding trajectories in which each intermediate structure is obtained from its predecessor by the addition, removal or shift of a base pair; i.e. the shortest M S2 trajectories. Since helix zippering and defect diffusion employ shift moves, one might argue that it is better to include shift moves 18 when physical modeling RNA folding, and indeed the RNA folding kinetics simulation program Kinfold [13] uses the M S2 move set by default. Using the novel notion of RNA conflict directed graph, we describe an optimal and near-optimal algorithm to compute the shortest M S2 folding trajectory. Such trajectories pass through substantially higher energy barriers than trajectories produced by Kinfold, which uses Gillespie’s algorithm [17] (a version of event-driven Monte Carlo simulation) to generate physically realistic M S2 folding trajectories. We have shown in Theorem 2 that it is NP-hard to compute the M S2 folding trajectory having minimum energy barrier, and have presented anecdotal evidence that suggests that it may also NP-hard to compute the shortest M S2 folding trajectory. For this reason, and because of the exponentially increasing number of cycles (see Figure 16) and subsequent time requirements of our optimal IP Algorithm 14, it is unlikely that (exact) M S2 distance prove to be of much use in molecular evolution studies such as [3, 42, 15]. Nevertheless, Figures 12 and 17 suggest that either pk-M S2 distance and/or near-optimal M S2 distance may be a better approximation to (exact) M S2 distance than using Hamming distance, as done in [36, 43]. However, given the high correlations between these measures, it is unlikely to make much difference in molecular evolution studies. Our graph-theoretic formulation involving RNA conflict digraphs raises some interesting mathematical questions partially addressed in this paper; in particular, it would be very interesting to characterize the class of digraphs that can be represented by RNA conflict digraphs, and to determine whether computing the shortest M S2 folding trajectory is N P -hard. We hope that the results presented in this paper may lead to resolution of these questions. References [1] J. Bang-Jensen and G. Gutin. Digraphs : theory, algorithms, and applications. Springer monographs in mathematics. Springer, London, New York, 2001. Deuxième impression avec corrections. [2] A.H. Bayegan and P. Clote. An IP algorithm for RNA folding trajectories. In K. Reiner and R. Schwartz, editors, Algorithms in Bioinformatics: 17th International Workshop, WABI 2017, Boston MA, USA, August 21-23, 2017. Springer, 2017. [3] E. Borenstein and E. Ruppin. Direct evolution of genetic robustness in microRNA. Proc. Natl. Acad. Sci. U.S.A., 103(17):6593–6598, April 2006. [4] Pierre Charbit, Stéphan Thomassé, and Anders Yeo. The minimum feedback arc set problem is np-hard for tournaments. Combinatorics, Probability & Computing, 16(1):1–4, 2007. [5] S. S. Cho, D. L. Pincus, and D. Thirumalai. Assembly mechanisms of RNA pseudoknots are determined by the stabilities of constituent secondary structures. Proc. Natl. Acad. Sci. U.S.A., 106(41):17349– 17354, October 2009. [6] P. Clote and A. Bayegan. Network Properties of the Ensemble of RNA Structures. PLoS. One., 10(10):e0139476, 2015. [7] T.H. Cormen, C.E. Leiserson, and R.L. Rivest. Algorithms. McGraw-Hill, 1990. 1028 pages. [8] K. Darty, A. Denise, and Y. Ponty. VARNA: Interactive drawing and editing of the RNA secondary structure. Bioinformatics, 25(15):1974–1975, August 2009. [9] I. Dotu, J. A. Garcia-Martin, B. L. Slinger, V. Mechery, M. M. Meyer, and P. Clote. Complete RNA inverse folding: computational design of functional hammerhead ribozymes. Nucleic. Acids. Res., 42(18):11752–11762, February 2015. [10] I. Dotu, W. A. Lorenz, P. VAN Hentenryck, and P. Clote. Computing folding pathways between RNA secondary structures. Nucleic. Acids. Res., 38(5):1711–1722, 2010. [11] E. C. Dykeman. An implementation of the Gillespie algorithm for RNA kinetics with logarithmic time update. Nucleic. Acids. Res., 43(12):5708–5715, July 2015. 19 [12] P. Festa, P. Pardalos, and M.G.C. Resende. Feedback set problems. In C. Floudas and P. Pardalos, editors, Encyclopedia of Optimization, pages 1005–1016. Springer US, Boston, MA, 2009. Second edition. [13] C. Flamm, W. Fontana, I.L. Hofacker, and P. Schuster. RNA folding at elementary step resolution. RNA, 6:325–338, 2000. [14] C. Flamm, I.L. Hofacker, P.F. Stadler, and M. Wolfinger. Barrier trees of degenerate landscapes. Z. Phys. Chem., 216:155–173, 2002. [15] J. A. Garcia-Martin, A. H. Bayegan, I. Dotu, and P. Clote. RNAdualPF: software to compute the dual partition function with sample applications in molecular evolution theory. BMC. Bioinformatics, 17(1):424, October 2016. [16] J. A. Garcia-Martin, I. Dotu, and P. Clote. RNAiFold 2.0: a web server and software to design custom and Rfam-based RNA molecules. Nucleic. Acids. Res., 43(W1):W513–W521, July 2015. [17] D.T. Gillespie. A general method for numerically simulating the stochastic time evolution of coupled chemical reactions. J Comp Phys, 22(403):403–434, 1976. [18] K.A. Harris and D.M. Crothers. The Leptomonas collosoma spliced leader RNA can switch between two alternate structural forms. Biochemistry, 32(20):5301–5311, 1993. [19] Matthew S. Hecht and Jeffrey D. Ullman. Flow graph reducibility. SIAM J. Comput., 1(2):188–202, 1972. [20] C. Hobartner and R. Micura. Bistable secondary structures of small RNAs and their structural probing by comparative imino proton NMR spectroscopy. J. Mol. Biol., 325(3):421–431, January 2003. [21] D.B. Johnson. Finding all the elementary circuits of a directed graph. SIAM J. Comput., 4:77–84, 1975. [22] Richard M. Karp. Reducibility among combinatorial problems. In Proceedings of a symposium on the Complexity of Computer Computations, held March 20-22, 1972, at the IBM Thomas J. Watson Research Center, Yorktown Heights, New York., pages 85–103, 1972. [23] B. Knudsen and J. Hein. Pfold: RNA secondary structure prediction using stochastic context-free grammars. Nucleic. Acids. Res., 31(13):3423–3428, July 2003. [24] Kazimierz Kuratowski. Sur le problème des gauches en topologie. Fundamenta Mathematicae, 15:271– 283, 1930. [25] R. Lorenz, S. H. Bernhart, C. Höner zu Siederdissen, H. Tafer, C. Flamm, P. F. Stadler, and I. L. Hofacker. Viennarna Package 2.0. Algorithms. Mol. Biol., 6:26, 2011. [26] C.L. Lucchesi and D.H. Younger. A minimax arc theorem for directed graphs. J. London Math. Soc, 17:369–374, 1978. [27] D.H. Mathews, J. Sabina, M. Zuker, and H. Turner. Expanded sequence dependence of thermodynamic parameters provides robust prediction of RNA secondary structure. J. Mol. Biol., 288:911–940, 1999. [28] E. P. Nawrocki, S. W. Burge, A. Bateman, J. Daub, R. Y. Eberhardt, S. R. Eddy, E. W. Floden, P. P. Gardner, T. A. Jones, J. Tate, and R. D. Finn. Rfam 12.0: updates to the RNA families database. Nucleic. Acids. Res., 43(Database):D130–D137, January 2015. [29] R. Nussinov and A. B. Jacobson. Fast algorithm for predicting the secondary structure of single stranded RNA. Proceedings of the National Academy of Sciences, USA, 77(11):6309–6313, 1980. [30] K. Perrot and T.V. Pham. Np-hardness of minimum feedback arc set problem on Eulerian digraphs and minimum recurrent configuration problem of chip-firing game. CoRR - Computing Research Repository - arXiv, abs/1303.3708, 2013. 20 [31] D. Pörschke. Model calculations on the kinetics of oligonucleotide double-helix coil transitions: Evidence for a fast chain sliding reaction. Biophys Chem, 2(2):83–96, August 1974. [32] N. Rajewsky. microrna target predictions in animals. Nat. Genet., 38:S8–S13, June 2006. [33] Vijaya Ramachandran. A minimax arc theorem for reducible flow graphs. SIAM J. Discrete Math., 3(4):554–560, 1990. [34] Vijaya Ramachandran. A minimax arc theorem for reducible flow graphs. SIAM J Disc. Math., 3(4):554– 560, 1990. [35] P. Schattner, A. N. Brooks, and T. M. Lowe. The tRNAscan-SE, snoscan and snoGPS web servers for the detection of tRNAs and snoRNAs. Nucleic. Acids. Res., 33(Web):W686–W689, July 2005. [36] P. Schuster and P.F. Stadler. Modeling conformational flexibility and evolution of structure: RNA as an example. In U. Bastille, M. Roman, and M. Vendruscolo, editors, Structural Approaches to SequenceEvolution, page 3–36. Springer, Heidelberg, 2007. [37] E. Senter, I. Dotu, and P. Clote. RNA folding pathways and kinetics using 2D energy landscapes. J Math Biol, 2014. [38] A. Serganov, Y.R. Yuan, O. Pikovskaya, A. Polonskaia, L. Malinina, A.T. Phan, C. Hobartner, R. Micura, R.R. Breaker, and D.J. Patel. Structural basis for discriminative regulation of gene expression by adenine- and guanine-sensing mRNAs. Chem. Biol., 11(12):1729–1741, 2004. [39] Z. Sukosd, B. Knudsen, M. Vaerum, J. Kjems, and E. S. Andersen. Multithreaded comparative RNA secondary structure prediction using stochastic context-free grammars. BMC. Bioinformatics, 12:103, 2011. [40] C. Thachuk, J. Maňuch, L. Stacho, and A. Condon. NP-completeness of the direct energy barrier height problem. Natural Computing, 10(1):391–405, 2011. [41] D. H. Turner and D. H. Mathews. NNDB: the nearest neighbor parameter database for predicting stability of nucleic acid secondary structure. Nucleic. Acids. Res., 38(Database):D280–D282, January 2010. [42] A. Wagner. Robustness and evolvability: a paradox resolved. Proc. Biol Sci., 275(1630):91–100, January 2008. [43] A. Wagner. Mutational robustness accelerates the origin of novel RNA phenotypes through phenotypic plasticity. Biophys. J., 106(4):955–965, February 2014. [44] S. Washietl and I. L. Hofacker. Identifying structural noncoding RNAs using RNAz. Curr Protoc Bioinformatics, 0(O):O, September 2007. [45] Michael T. Wolfinger, W. Andreas Svrcek-Seiler, Christoph Flamm, Ivo L. Hofacker, and Peter F. Stadler. Efficient folding dynamics of RNA secondary structures. J. Phys. A: Math. Gen., 37:4731– 4741, 2004. [46] S. Wuchty, W. Fontana, I.L. Hofacker, and P. Schuster. Complete suboptimal folding of RNA and the stability of secondary structures. Biopolymers, 49:145–164, 1999. [47] J. N. Zadeh, B. R. Wolfe, and N. A. Pierce. Nucleic acid sequence design via efficient ensemble defect optimization. J. Comput. Chem., 32(3):439–452, February 2011. 21 Figure 1: Illustration of shift moves, taken from [6]. Figure 2: Defect diffusion [31], where a bulge migrates stepwise to become absorbed in an hairpin loop. The move from structure (a) to structure (b) is possible by the shift (1, 12) → (1, 13), the move from (b) to (c) by shift (2, 11) → (2, 12), etc. Our algorithm properly accounts for such moves with respect to energy models A,B,C. Image taken from [6]. 7 Figures 22 Figure 3: All possible maximal length red-green paths and cycles. Each equivalence class X, as defined in Definition 7, can be depicted as a maximal length path or cycle, consisting of those positions x ∈ [1, n] that are connected by alternating base pairs drawn from secondary structures s (green) and t (red). Each path or cycle X is depicted in a fashion that the leftmost [resp. rightmost position] satisfies the following properties, where End(s, X) [resp. End(t, X)] denotes the set of elements of X that are untouched by t [resp. s]: for paths of type 1, |X| is even, |End(s, X)] = 2, b1 = min(End(s, X)), t[am ] = 0; for paths of type 2, |X| is odd, |End(s, X)] = 1 = |End(t, X)|, b0 = min(End(s, X)), s[bm ] = 0; for paths of type 3, |X| is odd, |End(s, X)] = 1 = |End(t, X)|, a0 = min(End(t, X)), t[am ] = 0; for paths of type 4, |X| is even, |End(t, X)] = 2, a1 = min(End(t, X)), s[bm ] = 0; for paths of type 5, or cycles, |X| must be even, and a1 = min(X). Note that the appearance of positions in left-to-right order does not necessarily respect integer ordering, so the leftmost position is not necessarily the minimum min(X), nor is the rightmost position necessarily the maximum max(X). 23 Figure 4: All six possible shift moves, in which a base pairs of s (teal) that touches a base pairs of t (red) is shifted, thus reducing the base pair distance dBP (s, t) by 2. Each such shift move can uniquely be designated by the triple (x, y, z), where y is the pivot position (common position to a base pair in both s and t), x is the remaining position in the base pair in t, and z is the remaining position in the base pair in s. Figure 5: Two special types of closed 2-cycles. (a) RNA conflict digraph G = (V, E) for secondary structures t and s, where a1 < a2 < a3 < a4 and t = {(a1 , a2 ), (a3 , a4 )}, and s = {(a1 , a4 ), (a2 , a3 )}. Nodes of V = {v1 , v2 , v3 , v4 } are the following: v1 = (a1 , a2 , a3 ) of type 1, v2 = (a3 , a4 , a1 ) of type 5, v3 = (a2 , a1 , a4 ) of type 4, and v4 = (a4 , a3 , a2 ) of type 2. (b) RNA conflict digraph G = (V, E) for secondary structures t and s, where a1 < a2 < a3 < a4 and t = {(a1 , a4 ), (a2 , a3 )} and s = {(a1 , a2 ), (a3 , a4 )}. Nodes of V = {v1 , v2 , v3 , v4 } are the following: v1 = (a1 , a4 , a3 ) of type 6, v2 = (a4 , a1 , a2 ) of type 3, v3 = (a2 , a3 , a4 ) of type 1, v4 = (a3 , a2 , a1 ) of type 2. Since the overlap between any two distinct vertices in (a) and (b) is 2, there are no edges in E for the conflict digraphs of (a) and (b). An optimal trajectory from s to t is constructed by removing a base pair from s, performing a shift, and adding the remaining base pair from t. In each case there are 2 choices for the base pair to remove and two choices for the shift, so 4 optimal trajectories for each of (a) and (b). 24 Figure 6: Conflict digraph for a 20 nt toy example with sequence GGGAAAUUUC CCCAAAGGGG, with initial structure s whose free energy is +0.70 kcal/mol, and target structure t whose free energy is + 3.30 kcal/mol. The conflict digraph contains 3 simple cycles: a first cycle {(8, 20, 10), (9, 19, 11), (18, 10, 20), (19, 9, 1)} of size 4, a second cycle {[(8, 20, 10), (19, 9, 1)} of size 2, and a third cycle {(18, 10, 20), (9, 19, 11)} of size 2. Figure 7: Conflict digraphs for the 25 nt bistable switch with sequence UGUACCGGAA GGUGCGAAUC UUCCG taken from Figure 1(b).1 of [20], in which the authors performed structural probing by comparative imino proton NMR spectroscopy. (a) Minimum free energy (MFE) structure having -10.20 kcal/mol. (b) Alternate metastable structure having next lowest free free energy of -7.40 kcal/mol. Two lower energy structures exist, having -9.00 kcal/mol resp. -7.60 kcal/mol; however, each is a minor variant of the MFE structure. (c) RNA conflict digraph G = (V, E), having directed edges (x, y, z) → (u, v, w) if the (unordered) base pair {y, z} ∈ s touches or crosses the (unordered) base pair {u, v} ∈ t. Here, s is in the metastable structure shown in (b) having -7.40 kcal/mol, while t is the MFE structure shown in (a) having -10.20 kcal/mol. The conflict digraph represents a necessary order of application of shift moves, in order to avoid the creation of base triples or pseudoknots. Note that the digraph G is acyclic, but the IP solver must nevertheless be invoked with constraint (‡) that precludes both vertices (20, 11, 6) and (25, 6, 11) from belonging to the solution V . (d) RNA conflict digraph G0 = (V 0 , E 0 ), having similar definition in which roles of s and t are reversed – i.e. M S2 folding pathways from the MFE structure to the (higher energy) metastable structure. 25 Figure 8: Conflict digraph for the 56 nt spliced leader RNA from L. collosoma with sequence AACUAAAACA AUUUUUGAAG AACAGUUUCU GUACUUCAUU GGUAUGUAGA GACUUC. (a) Metastable structure having free energy of -9.20 kcal/mol. (b) Minimum free energy (MFE) structure having free energy of -9.40 kcal/mol. (c) The RNA conflict digraph for refolding from metastable s to MFE t contains 12 vertices, 61 directed edges and no directed cycles. Minimum free energy (MFE) and metastable structures in (a) and (b) computed by Vienna RNA Package [25]. Secondary structure images generated using VARNA [8]. 26 Figure 9: (a) Rainbow diagram for spliced leader RNA from L. collosoma, in which the base pairs for the initial structure s (Figure 8a) are shown below the line in red, while those for the target structure t (Figure 8b) are shown above the line in blue. (b) Free energies of structures in the shortest M S2 folding trajectory for spliced leader are shown by the dotted blue line, while those for the energy-optimal M S2 folding trajectory are shown in the solid red line. Algorithm 14 was used to compute the shortest M S2 trajectory, while the programs RNAsubopt [46] and barriers [14] were used to compute the energy-optimal folding trajectory. 27 Figure 10: Gene ON and gene OFF structures and the RNA conflict digraph for the 156 nt xanthine phosphoribosyltransferase (xpt) riboswitch from B. subtilis – structures consistent with in-line probing data taken from Figure 1A of [38]. (a) Gene ON structure (default) in absence of free guanine, having (computed) free energy of -33.11 kcal/mol. (b) Gene OFF structure when guanine binds cytidine in position 66, having (computed) free energy of -56.20 kcal/mol (guanine not shown). (c) Rainbow diagram with red gene ON structure below line and blue gene OFF structure above line. Rainbow diagrams allow one to determine by visual inspection when base pairs touch or cross. (d) Conflict digraph G = (V, E), containing 18 vertices, 113 directed edges, and 1806 directed cycles. Minimum free energy (MFE) and metastable structures in (a) and (b) computed by Vienna RNA Package [25]. Free energy computations using Turner energy model [41] computed with Vienna RNA Package [25]. Secondary structure images generated using VARNA [8]. 28 Figure 11: (a) Initial gene ON structure (default) in absence of free guanine (enlarged image). (b) Target gene OFF structure when guanine binds cytidine in position 66 (enlarged image). (c) Shortest M S2 folding trajectory from the gene ON structure s to the gene OFF structure t for the 156 nt xpt riboswitch from B. subtilis, described in the caption to Figure 10. Note the initial elongation of the P1 helix by the first shift, followed by the stepwise removal of the anti-terminator and construction of the terminator loops by shift 2-10, followed by base pair additions to lengthen the terminator loop. Although (a,b) are duplicated from the previous figure, this is necessary to follow the sequence of moves in the M S2 trajectory. Secondary structure images generated using VARNA [8]. (d) Free energies of structures in the shortest M S2 folding trajectory for xpt are shown by the dotted blue line, while those for the an energy near-optimal M S1 folding trajectory are shown in the solid red line. Algorithm 14 was used to compute the shortest M S2 trajectory, while the program RNAtabuPath [10] was used to compute the energy near-optimal M S1 folding trajectory. The size of the 156 nt xpt riboswitch and the fact that the program RNAsubopt would need to generate all secndary structures within 30 kcal/mol of the minimum free energy -54.1 kcal/mol preclude any possibility that the optimal M S2 trajectory can be computed by application of the program barriers [14]. 29 Figure 12: Benchmarking statistics for optimal and near-optimal algorithm to compute minimum length M S2 folding trajectories between random secondary structures s, t of random RNA sequences of variable lengths. For each sequence length n = 10, 15, 20, · · · , 150 nt, twenty-five random RNA sequences were generated of length n, with probability of 1/4 for each nucleotide. For each RNA sequence, twenty secondary structures s, t were uniformly randomly generated so that 40% of the nucleotides are base-paired. Thus the number of computations per sequence length is thus 25 · 190 = 4750, so the size of the benchmarking set is 15 · 4750 = 71, 250. Using this dataset, the average M S2 distance was computed for both the exact IP Algorithm 14 and the near-optimal Algorithm 15. In addition to M S2 distance computed by the exact IP and the nearoptimal algorithm, the figure displays pk − M S2 distance (allowing pseudoknots in intermediate structures) as computed by Algorithm 9, the M S1 distance (also known as base pair distance), Hamming distance over 2, and provides a breakdown of the M S1 distance in terms of the number of base pair addition/removal moves “num base pair +/- (optimal)” and the shift moves “num shift moves (optimal)”. 30 Figure 13: Pairwise correlations for optimal M S2 distance, pk − M S2 distance, near-optimal M S2 distance, Hamming distance divided by 2, and M S1 distance (also called base pair distance). For each two measures, scatter plots were created for the 71, 250 many data points from the benchmarking set described in Figure 12. Pearson correlation and normalized Pearson correlation values computed, where by normalized, we mean that for each of the 71, 250 data points, we consider the length-normalized distance (distance divided by sequence length). These correlations are statistically significant – each Pearson correlation values has a p-value less than 10−8 . 31 Figure 14: Run time for the exact IP (optimal) algorithm 14 and the near-optimal algorithm 15 to compute minimum length M S2 folding trajectories for the same data set from previous Figure 12. Each data point represents the average µ ± σ where error bars indicate one standard deviation, taken over 71, 250 many sequence/structure pairs. Run time of the optimal algorithm depends on time to perform topological sort, time to enumerate all directed cycles using our Python implementation of Johnson’s algorithm [21], and time for the Gurobi IP solver (ordered here by increasing time demands). 32 Figure 15: (Left) Average size of vertex sets V and of directed edge sets E for RNA conflict digraphs G = (V, E) for the data set of described in Figure 12. Error bars represent ±1 standard deviation. Clearly the size of a conflict digraph grows linearly in the length n of random RNAs a = a1 , . . . , an , given random secondary structures s, t having n/5 base pairs. (Right) Cycle length distribution for random RNAs a = a1 , . . . , an of length n = 150, with randomly chosen secondary structures s, t having n/5 base pairs, using data extracted from the data set described in Figure 12. For values of n = 50, . . . , 150, the cycle length distribution appears approximately normal, although this is not the case for n ≤ 40 (data not shown). Figure 16: Average number of directed cycles as a function of sequence length for the data set described in Figure 12. For each random RNA sequence a = a1 , . . . , an of length n, and for each pair of random secondary structures s, t of a having n/5 base pairs, we computed the total number of directed cycles in the conflict digraph G(a, s, t). The figure suggests that starting at a threshold sequence length n, there is an exponential growth in the number of directed cycles in the conflict digraph of random sequences of length n. 33 Figure 17: Moving averages of distance measures graphed as a function of sequence length for the 1311 many sequences extracted from Rfam 12.0 (see text). Distance measures included optimal M S2 -distance computed by the exact IP (optimal) algorithm 14 (where the number of base pair additions (+) or removals (−) is indicated, along with the number of shifts),, near-optimal M S2 -distance computed by near-optimal algorithm 15, Hamming distance divided by 2, M S1 distance aka base pair distance, pseudoknotted M S2 distance (pk-M S2 ) computed from Lemma 8, optimal local M S2 with parameter d = 10, and optimal local M S2 with parameter d = 20. The latter values were computed by a variant of the exact IP algorithm 14 where shift moves were restricted to be local with parameter d, whereby base pair shifts of the form (x, y) → (x, z) or (y, x) → (z, x) were allowed only when |y − z| ≤ d. All moving averages were computed over symmetric windows of size 9, i.e. [i − 4, i + 4]. From smallest to largest value, the measures are: number of shifts in optimal M S2 trajectory < number of base pair additions or deletions (+/−) in optimal M S2 trajectory < pk-M S2 < M S2 distance < Hamming distance over 2 ≈ near-optimal M S2 < M S2 with locality parameter d = 20 < M S2 with locality parameter d = 10 < M S1 . 34 Figure 18: Pairwise correlations using Rfam benchmarking data (see text) for optimal M S2 distance, pk − M S2 distance, near-optimal M S2 distance, Hamming distance divided by 2, and M S1 distance (also called base pair distance). For each two measures, scatter plots were created for the 1311 many data points. Pearson correlation and normalized Pearson correlation values computed, where by normalized, we mean that for each of the 1311 data points, we consider the length-normalized distance (distance divided by sequence length). These correlations are statistically significant – each Pearson correlation values has a p-value less than 2.2 · 10−16 . Figure 19: Moving averages of run time as a function of sequence length for the 1311 sequences extracted from Rfam 12.0 (see text). Distance measures considered are the exact M S2 distance computed by the optimal IP Algorithm 14, an approximation to the M S2 distance computed by the near-optimal IP Algorithm 15, the pk − M S2 distance (allowing pseudoknots in intermediate structures) as computed by Algorithm 9, and two variants of exact M S2 distance, where shifts are restricted by locality parameter d = 10, 20. These latter values were computed by the exact IP Algorithm 14 modified to allow base pair shifts of the form (x, y) → (x, z) or (y, x) → (z, x) only when |y − z| ≤ d. 35 Figure 20: Number of sequences as a function of sequence length for the 1311 sequences extracted from Rfam 12.0 and used in benchmarking tests (see text). Figure 21: RNA conflict digraph G = (V, E) for secondary structures t and s, where t = {(a2 , a1 ), (b1 , b2 ), (c1 , c2 ), (d1 , d2 )}, and s = {(a2 , a3 ), (b2 , b3 ), (c2 , c3 ), (d2 , d3 )}. The triplet nodes of V = {va , vb , vc , vd } are the following: va = (a1 , a2 , a3 ) of type 3, shift vb = (b1 , b2 , b3 ) of type 1, shift vc = (c1 , c2 , c3 ) of type 1, and shift vd = (d1 , d2 , d3 ) of type 1. The edges in E are the following: va → vb , vb → vc , vc → vd , vd → va . The conflict digraph G = (V, E) is order-isomorphic to the digraph G0 = (V 0 , E 0 ), where V 0 = {1, 2, 3, 4} and edges are as follows: 1 → 2 → 3 → 4 → 1. 36 Figure 22: (a) Complete bipartite graph K3,3 . A finite graph is planar if and only if it does not contain the forbidden graph K3,3 or the complete graph K5 [24]. (b) Directed graph realized by the RNA conflict digraph in Figure 23. It follows that RNA conflict digraphs are not necessarily planar. (c) Directed graph realized by the RNA conflict digraph in Figure 24. A flow graph is reducible if and only if it does not contain such a forbidden flow graph, where edges between nodes may be replaced by arc-disjoint directed paths [19]. It follows that RNA conflict digraphs are not necessarily reducible flow graphs. Figure 23: RNA conflict digraph that realizes the digraph K3,3 depicted in Figure 22b, whose undirected red edges represent the undirected graph K3,3 depicted in Figure 22b. The nonplanar complete, bipartite digraph K3,3 , with shift moves c, b, a, d, e, f , all of type 1, in order from left to right – i.e. order of positions along the x-axis is given by: c1 , b1 , a1 , a2 , b2 , c2 , d1 , e1 , f1 , c3 , b3 , a3 , f2 , e2 , d2 , d3 , e3 , f3 . Notice that as crosses bt , ct , dt , et and ft so c ← a, b ← a and a → d, a → e, a → f ; bs crosses ct , dt , et and ft so c ← b and b → d, b → e, b → f ; cs crosses dt , et and ft so c → d, c → e, c → f . Figure 24: Forbidden flow graph with nodes i = (i1 , i2 , i3 ), a = (a1 , a2 , a3 ), b = (b1 , b2 , b3 ), c = (c1 , c2 , c3 ), where nodes i, a, c are of type 1 and node b is of type 3. Notice that is crosses at so i → a; as crosses bt so a → b; as crosses ct so a → c; bs crosses ct so b → c; cs crosses bt so c ← b. 37 Figure 25: (a) Digraph of an ordered 4-cycle, which is representable by an RNA conflict digraph, as shown in Figure 21. (b) Digraph of an ordered 4-cycle, which is not representable by an RNA conflict digraph. Note that digraph (b) is Eulerian, with the property that the in-degree of each vertex equals its out-degree. (c) Digraph of a tournament on 4 vertices, which is not representable by an RNA conflict digraph. Digraph (a) is isomorphic with digraph (b), thus showing that representability is not preserved under isomorphism. 3 Since it is not difficult to show that all 2(2) = 8 tournaments on 3 nodes are representable by RNA conflict digraphs (data not shown), it follows that digraph (c) is a minimum sized non-representable tournament, n which we verified by constraint programming. In general there are 2( 2 ) many tournaments on n. Figure 26: Example of a 4-node digraph in (a) that is not representable by an RNA conflict digraph. However, by adding an edge to digraph (a), we obtain a representable digraph in (b). Note that digraph (a) is neither order-isomorphic to digraph (b), nor is there an order-preserving embedding of digraph (a) into digraph (b). 38 A Classification of edges in RNA constraint digraphs In this section, we describe the collection of all possible directed edges v → v 0 in which v.s crosses v 0 .t, that can appear in an RNA conflict digraph, classified as forward, backward or 2-cycles and according to each type of vertex (see Figure 4 for the six types of vertices). It is straightforward for the reader to imaging additional directed edges v → v 0 in which v.s touches v 0 .t, so these are not shown. In addition, we provide the pseudocode for a slow branch-and-bound algorithm to determine a shortest M S2 trajectory. Given two secondary structures s, t for the RNA sequence a1 , . . . , an , recall that notation for a shift move from the (unordered) base pair {x, y} ∈ s to the (unordered) base pair {y, z} ∈ t is given by the triple (z, y, x), where the middle coordinate y is the pivot position, common to both base pairs {x, y} ∈ s and {y, z} ∈ t, while the first [resp. last] coordinate z [resp. x] is the remaining position from the base pair {y, z} ∈ t [resp. {x, y} ∈ s]. A directed edge is given from shift move (x, y, z) to shift move (u, v, w) if the base pair {y, z} ∈ s from the first shift move crosses with the base pair {u, v} ∈ t from the second shift move; i.e. min(u, v) < min(y, z) < max(u, v) < max(y, z) or min(y, z) < min(u, v) < max(y, z) < max(u, v). The reason for the directed edge is that if the second shift (u, v, w) is applied before the first shift (x, y, z), then a pseudoknot (crossing) would be created; it follows that the first shift must be applied before the second shift. Edges may be forward (left-to-right) or backward (right-to-left), depending on whether the pivot position of the first shift is (strictly) less than or (strictly) greater than the pivot position of the second shift. This section does not list similar examples, where the (unordered) base pair {y, z} ∈ s from the first shift move touches the (unordered) base pair {u, v} ∈ t from the second shift move, as such examples are clear from Figure 3 of the main text. A.1 1 Forward Edges 2 3 4 5 6 1 2 3 4 5 6 1 2 3 4 5 6 1 2 3 4 5 6 forward edge of type 5 → 5 forward edge of type 5 → 1 forward edge of type 2 → 5 forward edge of type 5 → 6 (4,5,2) → (3,6,1) (3,4,1) → (2,5,6) (5,4,2) → (3,6,1) (3,4,1) → (2,6,5) 1 2 3 4 5 6 1 2 3 4 5 6 1 2 3 4 5 6 1 2 3 4 5 6 forward edge of type 1 → 1 forward edge of type 1 → 6 forward edge of type 2 → 1 forward edge of type 1 → 5 (2,3,6) → (1,4,5) (2,3,6) → (1,5,4) (4,3,1) → (2,5,6) (2,3,5) → (4,6,1) 1 2 3 4 5 6 1 2 3 4 5 6 1 2 3 4 5 6 1 2 3 4 5 6 forward edge of type 2 → 6 forward edge of type 1 → 3 forward edge of type 4 → 1 forward edge of type 1 → 2 (4,3,1) → (2,6,5) (1,2,5) → (6,3,4) (3,2,6) → (1,4,5) (1,2,5) → (6,4,3) 39 1 2 3 4 5 6 1 2 3 4 5 6 1 2 3 4 5 6 1 2 3 4 5 6 forward edge of type 1 → 1 forward edge of type 4 → 6 forward edge of type 4 → 5 forward edge of type 1 → 6 (1,2,4) → (3,5,6) (3,2,6) → (1,5,4) (3,2,5) → (4,6,1) (1,2,4) → (3,6,5) 1 2 3 4 5 6 1 2 3 4 5 6 1 2 3 4 5 6 1 2 3 4 5 6 forward edge of type 3 → 3 forward edge of type 4 → 3 forward edge of type 3 → 2 forward edge of type 3 → 1 (6,1,4) → (5,2,3) (2,1,5) → (6,3,4) (6,1,4) → (5,3,2) (6,1,3) → (2,4,5) 1 2 3 4 5 6 1 2 3 4 5 6 1 2 3 4 5 6 1 2 3 4 5 6 forward edge of type 4 → 2 forward edge of type 4 → 1 forward edge of type 3 → 6 forward edge of type 4 → 6 (2,1,5) → (6,4,3) (2,1,4) → (3,5,6) (6,1,3) → (2,5,4) (2,1,4) → (3,6,5) A.2 1 Backward Edges 2 3 4 5 6 1 2 3 4 5 6 1 2 3 4 5 6 1 2 3 4 5 6 backward edge of type 6 ← 6 backward edge of type 6 ← 2 backward edge of type 1 ← 6 backward edge of type 6 ← 5 (2,5,4) ← (1,6,3) (1,4,3) ← (6,5,2) (2,4,5) ← (1,6,3) (1,4,3) ← (5,6,2) 1 2 3 4 5 6 1 2 3 4 5 6 1 2 3 4 5 6 1 2 3 4 5 6 backward edge of type 2 ← 2 backward edge of type 1 ← 2 backward edge of type 2 ← 5 backward edge of type 1 ← 5 (6,3,2) ← (5,4,1) (1,3,4) ← (6,5,2) (6,3,2) ← (4,5,1) (1,3,4) ← (5,6,2) 1 2 3 4 5 6 1 2 3 4 5 6 1 2 3 4 5 6 1 2 3 4 5 6 backward edge of type 2 ← 6 backward edge of type 2 ← 4 backward edge of type 3 ← 2 backward edge of type 2 ← 1 (5,3,2) ← (1,6,4) (5,2,1) ← (4,3,6) (6,2,3) ← (5,4,1) (5,2,1) ← (3,4,6) 40 1 2 3 4 5 6 1 2 3 4 5 6 1 2 3 4 5 6 1 2 3 4 5 6 backward edge of type 3 ← 5 backward edge of type 2 ← 2 backward edge of type 3 ← 6 backward edge of type 2 ← 5 (6,2,3) ← (4,5,1) (4,2,1) ← (6,5,3) (5,2,3) ← (1,6,4) (4,2,1) ← (5,6,3) 1 2 3 4 5 6 1 2 3 4 5 6 1 2 3 4 5 6 1 2 3 4 5 6 backward edge of type 4 ← 4 backward edge of type 3 ← 4 backward edge of type 4 ← 1 backward edge of type 3 ← 1 (4,1,6) ← (3,2,5) (5,1,2) ← (4,3,6) (4,1,6) ← (2,3,5) (5,1,2) ← (3,4,6) 1 2 3 4 5 6 1 2 3 4 5 6 1 2 3 4 5 6 1 2 3 4 5 6 backward edge of type 4 ← 2 backward edge of type 3 ← 2 backward edge of type 4 ← 5 backward edge of type 3 ← 5 (3,1,6) ← (5,4,2) (4,1,2) ← (6,5,3) (3,1,6) ← (4,5,2) (4,1,2) ← (5,6,3) A.3 1 2-Cycles 2 3 4 5 6 1 2 3 4 5 6 1 2 3 4 5 6 1 2 3 4 5 2-cycle of type 1 ↔ 5 2-cycle of type 2 ↔ 6 2-cycle of type 3 ↔ 5 2-cycle of type 4 ↔ 6 (1,3,5) ↔ (4,6,2) (5,3,1) ↔ (2,6,4) (6,2,4) ↔ (3,5,1) (4,2,6) ↔ (1,5,3) 1 2 3 4 5 6 1 2 3 4 5 2-cycle of type 3 ↔ 1 2-cycle of type 4 ↔ 2 (5,1,3) ↔ (2,4,6) (3,1,5) ↔ (6,4,2) A.4 6 Summary tables of shift moves edges Table 1 presents a count of all 12 possible bidirectional edges, while Table 2 [resp. Table 3] presents a count of all 34 possible forward [resp. back] directed edges. Here, by bidirectional edge between nodes x and y, we mean the existence of directed edges x → y and y → x. Figures in Sections A.3, A.1 and A.2 depict all of these these directed edges. 41 6 1↔5 2↔6 3↔5 4↔6 3↔1 4↔2 Table 1: All 6 possible bidirectional edges, or 2-cycles. Note that 1 ↔ 5 is distinct from 5 ↔ 1, since the pivot point from the left node must be less than that from the right node in our notation. Here, by bidirectional edge between nodes x and y, we mean the existence of directed edges x → y and y → x. edge 1→1 1→2 1→3 1→4 1→5 1→6 1 ⇒∗ num 2 1 1 0 1 2 7 edge 2→1 2→2 2→3 2→4 2→5 2→6 2 ⇒∗ num 1 0 0 0 1 1 3 edge 3→1 3→2 3→3 3→4 3→5 3→6 3 ⇒∗ num 1 1 1 0 0 1 4 edge 4→1 4→2 4→3 4→4 4→5 4→6 4 ⇒∗ num 2 1 1 0 1 2 7 edge 5→1 5→2 5→3 5→4 5→5 5→6 5 ⇒∗ num 1 0 0 0 1 1 3 edge 6→1 6→2 6→3 6→4 6→5 6→6 6 ⇒∗ num 0 0 0 0 0 0 0 Table 2: All 24 possible forward edges and their number. Here only shift moves of the form (x, y, z) → (u, v, w) are considered, where the (unordered) base pair {y, z} ∈ s crosses the (unordered) base pair {u, v} ∈ t, where y < v. edge 1←1 1←2 1←3 1←4 1←5 1←6 1 ⇐∗ num 0 1 0 0 1 1 3 edge 2←1 2←2 2←3 2←4 2←5 2←6 2 ⇐∗ num 1 2 0 1 2 1 7 edge 3←1 3←2 3←3 3←4 3←5 3←6 3 ⇐∗ num 1 2 0 1 2 1 7 edge 4←1 4←2 4←3 4←4 4←5 4←6 4 ⇐∗ num 1 1 0 1 1 0 4 edge 5←1 5←2 5←3 5←4 5←5 5←6 5 ⇐∗ num 0 0 0 0 0 0 0 edge 6←1 6←2 6←3 6←4 6←5 6←6 6 ⇐∗ num 0 1 0 0 1 1 3 Table 3: All 24 possible backward edges and their number. Here only shift moves of the form (x, y, z) ← (u, v, w) are considered, where the (unordered) base pair {v, w} ∈ s crosses the (unordered) base pair {x, y} ∈ t, where y < v. 42 B Minimal length pk-M S2 folding pathways This section provides details on the simple algorithms for pk-M S2 minimum length folding pathways for each of the five types of paths depicted in Figure 3. If s and t are (possibly pseudoknotted) structures on [1, n], and X ⊆ [1, n] is an equivalence class, then define the restriction of s [resp. t] to X, denoted by s  X [resp. t  X], to be the set of base pairs (i, j) in s [resp. t] such that i, j ∈ X. Each path or cycle in A ∪ B can be subdivided into the following five cases. Each equivalence class can be classified as one of five types of paths, depicted in Figure 3 described below. For this classification, we need to define End(s, X) = {x ∈ X : t[x] = 0} and End(t, X) = {x ∈ X : s[x] = 0} – i.e. End(s, X) [resp. End(t, X)] is the set of elements x of X that belong to a base pair in s [resp. t], but the path cannot be extended because x is not touched by a base pair from t [resp. s]. For each type of path X, we present a (trivial) algorithm that returns the shortest M S2 folding trajectory from s  X to t  X. Additionally, we determine the relation between the pseudoknotted M S2 distance between s  X and t  X, denoted dX pk−M S2 (s, t), as X well as the Hamming distance, denoted dH (s, t). An equivalence class X of size m is defined to be a path of type 1, if m is even, so path length is odd, and |End(s, X)| = 2. Let b0 = min(End(s, X)) and for 1 ≤ i < m/2, define ai+1 = s[bi ] and bi = t[ai ], as shown in Figure 3a. A minimum length sequence of M S2 moves to transform s  X into t  X is given by the following: Path 1 subroutine 1. remove {bm/2 , am/2 } from s 2. for (m/2) − 1 down to 1 3. shift base pair (bi , ai ) to (ai , bi+1 ) An alternate procedure would be to remove the first base pair {b1 , a1 } and perform shifts from left to right. Notice that if m = |X| = 2, then a path of type 1 is simply a base pair with the property that neither i dX H (s,t) . The Hamming distance dX H (s, t) = 2 X Moreover, dpk−M S2 (s, t) = max(|s  X|, |t  X|). nor j is touched by t. For arbitrary m, dX pk−M S2 (s, t) = dX pk−M S2 (s, t) dX pk−M S2 (s, t) dX (s,t) b H 2 c. m, and = m/2, so = An equivalence class X of size m is defined to be a path of type 2, if m is odd, so path length is even, and |End(s, X)| = 1 = |End(t, X)|, and min(End(s, X)) < min(End(t, X)). Let b0 = min(End(s, X)) and for 1 ≤ i ≤ bm/2c, define ai+1 = s[bi ] and bi = t[ai ], as shown in Figure 3b. A minimum length sequence of M S2 moves to transform s  X into t  X is given by the following: Path 2 subroutine 1. for i = bm/2c down to 1 2. shift base pair {bi−1 , ai } to {ai , bi } dX (s,t) X X H The Hamming distance dX c. Moreover, H (s, t) = m, and dpk−M S2 (s, t) = bm/2c, so dpk−M S2 (s, t) = b 2 X dpk−M S2 (s, t) = max(|s  X|, |t  X|). An equivalence class X of size m is defined to be a path of type 3, if m is odd, so path length is even, and |End(s, X)| = 1 = |End(t, X)|, and min(End(t, X)) < min(End(s, X)). Let a0 = min(End(t, X)) and for 1 ≤ i ≤ bm/2c, define bi = t[ai−1 ] and ai = s[bi ], as shown in Figure 3c. A minimum length sequence of M S2 moves to transform s  X into t  X is given by the following: Path 3 subroutine 1. for i = 1 to bm/2c 2. shift base pair {bi , ai } to {ai−1 , bi } X X The Hamming distance dX H (s, t) = m, and pk-M S2 distance dpk−M S2 (s, t) = bm/2c, so dpk−M S2 (s, t) = dX H (s,t) c. 2 Moreover, dX pk−M S2 (s, t) = max(|s  X|, |t  X|). An equivalence class X of size m is defined to be a path of type 4, if m is even, so path length is odd, and |End(t, X)| = 2. Let a1 = min(End(t, X)) and for 2 ≤ i < m/2, define ai+1 = s[bi ] and for 1 ≤ i ≤ m/2, define bi = t[ai ], as shown in Figure 3d. A minimum length sequence of M S2 moves to transform s  X into t  X is given by the following: b Path 4 subroutine 1. for i = 1 to m/2 − 1 43 2. shift base pair {bi , ai+1 } to {ai , bi } 3. add base pair {am/2 , bm/2 } Notice that if m = 2, then a path of type 4 is simply a base pair (i, j) ∈ t, with the property that neither i nor dX (s,t) X X H j is touched by s. The Hamming distance dX . H (s, t) = m, and dpk−M S2 (s, t) = m/2, so dpk−M S2 (s, t) = 2 X Moreover, dpk−M S2 (s, t) = max(|s  X|, |t  X|). An equivalence class X of size m is defined to be a path of type 5, if it is a cycle, i.e. each element x ∈ X is touched by both s and t. Since base triples are not allowed due to condition 2 of Definition 3, cycles have only even length, and so |X| is also even. Let a1 = min(X), and for 1 ≤ i ≤ m/2, define bi = t[ai ], and for 2 ≤ i ≤ m/2, define ai = s[bi−1 ], as shown in Figure 3e. A minimum length sequence of M S2 moves to transform s  X into t  X is given by the following: Path 5 subroutine 1. remove base pair {bm/2 , a1 } 2. for i = 1 to m/2 − 1 3. shift base pair {bi , ai+1 } to {ai , bi } 4. add base pair {am/2 , bm/2 } dX (s,t) X X H c + 1. The Hamming distance dX H (s, t) = m, and dpk−M S2 (s, t) = m/2 + 1, so dpk−M S2 (s, t) = b 2 X Moreover, dpk−M S2 (s, t) = max(|s  X|, |t  X|). Note that any base pair could have initially been removed from s, and by relabeling the remaining positions, the same algorithm would apply. In summary, pk-M S2 distance between s  X and t  X for any maximal path (equivalence class) X is equal to Hamming distance b dH (sX,tX) c; in contrast, pk-M S2 distance between s  X and t  X for any 2 dH (sX,tX) cycle X is equal to b c + 1. It follows that dpk−M S2 (s, t) = b dH (s,t) c if and only if there are no 2 2 type 5 paths, thus establishing equation (14. Now let B1 [resp. B2 ] denote the set of positions of all type 1 paths [resp. type 4 paths] of length 1 – i.e. positions incident to isolated green [resp. red] edges that correspond to base pairs (i, j) ∈ s where i, j are not touched by t [resp. (i, j) ∈ t where i, j are not touched by s]. As well, let B0 designate the set of positions in B not in either B1 or B2 . Note that B1 ⊆ B and B2 ⊆ B, and that formally B0 = B − (B1 ∪ B2 ) (26) B1 = {i ∈ [1, n] : ∃j [{i, j} ∈ s, t(i) = 0 = t(j)] (27) B2 = {i ∈ [1, n] : ∃j [{i, j} ∈ t, s(i) = 0 = s(j)] (28) Note that B1 and B2 have an even number of elements, and that all elements of B − B1 − B2 are incident to a terminal edge of a path of length 2 or more. Correspondingly, define BP1 and BP2 as follows: BP1 = {(i, j) ∈ s : t[i] = 0 = t[j]} (29) BP2 = {(i, j) ∈ t : s[i] = 0 = s[j]} (30) Note that |BP1 | = |B1 |/2 and |BP2 | = |B2 |/2. The following is a restatement of Lemma 8. Lemma 16. Let s, t be two arbitrary pseudoknotted structures for the RNA sequence a1 , . . . , an , and let X1 , . . . , Xm be the equivalence classes with respect to equivalence relation ≡ on A ∪ B0 = [1, n] − B1 − B2 − C − D. Then the pk-M S2 distance between s and t is equal to |BP1 | + |BP2 | + m X   max |s  Xi |, |t  Xi | i=1 Alternatively, if X1 , . . . , Xm are the equivalence classes on A ∪ B = [1, n] − C − D, then dpk−M S2 (s, t) = m X   max |s  Xi |, |t  Xi | i=1 44 C Branch-and-bound algorithm In this section, we present pseudocode for an exact and exhaustive branch-and-bound search strategy [7] to determine a shortest M S2 folding trajectory between two given secondary structures of a given RNA sequence. First base pairs in BP1 and BP3 are removed from s to obtain the root structure. Starting from the root we perform removal and shift of base pairs until the target or an empty structure is achieved. For each state Si , we have the distance dist from the root to Si . Furthermore, we compute a lower bound lb for the M S2 distance from Si to the target structure by calculating the M S2 distance allowing pseudoknots. The optimistic M S2 distance from the source to target is estimated as dist + lb. If the optimistic distance is higher than the incumbent M S2 distance computed so far, the search is stopped and a different state is considered. In order to prune the search tree more effectively, base pairs that cause more conflicts are considered first. Finally, if an empty structure is achieved we compute the list of remaining moves for s. In algorithm 1 we describe a branch and bound algorithm for computing the M S2 distance between two RNA secondary stuctures s and t. First base pairs in BP1 and BP3 are removed from s to obtain the root structure. Starting from the root we perform removal and shift of base pairs until the target or an empty structure is achieved. For each state Si , we have the distance dist from the root to Si . Furthermore, we compute a lower bound lb for the M S2 distance from Si to the target structure by calculating the M S2 distance allowing pseudoknots. The optimistic M S2 distance from the source to target is estimated as dist + lb. If the optimistic distance is higher than the incumbent M S2 distance computed so far, the search is stopped and a different state is considered. In order to prune the search tree more effectively, base pairs that cause more conflicts are considered first. Finally, if an empty structure is achieved we compute the list of remaining moves for s. D Greedy algorithm For a digraph G = (V, E), in this section, we present the pseudocode for a staightforward greedy algorithm to determine a (possibly non-maximal) vertex subset V ⊂ V such that the induced subgraph H = (V , E) contains no directed cycles, where E = E ∩ (V × V ). Nevertheless, in the following greedy algorithm, it is necessary to first generate a list of all (possibly exponentially many) directed cycles. This computational overhead is sidestepped by the near-optimal algorithm in the next section. Algorithm 17 (Greedy approximation of M S2 distance from s to t). Input: Secondary structures s, t for RNA sequence a1 , . . . , an Output: Greedy M S2 folding trajectory s = s0 , s1 , . . . , sm = t, where s0 , . . . , sm are secondary structures, m is the minimum possible value for which si is obtained from si−1 by a single base pair addition, removal or shift for each i = 1, . . . , m. First, initialize the variable numMoves to 0, and the list moveSequence to the empty list [ ]. Define BP1 = {(x, y) : (x, y) ∈ t, (t − s)[x] = 0, (t − s)[y] = 0}; i.e. BP1 consists of those base pairs in s which are not touched by any base pair in t. Define BP2 = {(x, y) : (x, y) ∈ t, (s − t)[x] = 0, (s − t)[y] = 0}; i.e. BP2 consists of those base pairs in t which are not touched by any base pair in s. Bear in mind that s is constantly being updated, so actions performed on s depend on its current value. //remove base pairs from s that are untouched by t 1. for (x, y) ∈ BP1 2. remove (x, y) from s; numMoves = numMoves+1 //define conflict digraph G = (V, E) on updated s and unchanged t 3. define V by equation (16) 4. define E by equation (17) 5. define conflict digraph G = (V, E) 6. C = {C1 , . . . , Cm } //list of all simple directed cycles in G //determine set V0 of vertices to remove so that restriction of G to V − V0 is acyclic 7. V0 = ∅ //V0 is set of vertices to be removed from V 8. for v ∈ V 9. Cv = {C ∈ C : v ∈ C} 45 Algorithm 1 Branch and bound algorithm for M S2 distance Input: Two RNA secondary structures s and t with length n Output: Minimum number of M S2 moves in the path from s to t 1: BP1 is the set of base pairs (i, j) ∈ s such that neither i nor j is touched by any base pair of t 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: 20: 21: 22: 23: 24: 25: 26: 27: 28: 29: 30: 31: 32: 33: 34: 35: 36: 37: 38: 39: 40: 41: 42: 43: BP2 is the set of base pairs (i, j) ∈ t such that neither i nor j is touched by any base pair of s BP3 is the set of base pairs (i, j) ∈ t, s V = {(x, y, z) : 1 ≤ x, y, z ≤ n; t[b] = a; s[b] = c} remove base pairs in BP1 ∪ BP3 from s remove base pairs in BP2 ∪ BP3 from t for v ∈ V compute nv the the number of crossings between v.s and all base pairs in t sort V in decreasing order by nv best = base pair distance between s and t . in worst case only M S1 moves are used curdist = 0 . distance between s and current state cs define a data structure state = {s, t, dist, lb, rm, ad, sh} representing a node in the search tree. s and t represent the structures in the current state; dist is the M S2 distance from the root;lb is the lower bound for the M S2 distance from s to t for all paths passing through the current state cs; rm, ad and sh are respectively the lists of removals, additions and shifts performed from the root to obtain the current state. root = state(s, s, best, 0, [ ], [ ], [ ]) define priority queue Q containing states S1 , ..., Sm , ordered by Si .lb Q = {root} while (Q is not empty) do cs = Q.pop() . state with smallest lower bound cs.lb will be poped if (cs.lb < best) then if (s has no base pairs) then . current state is a leaf R = set of base pairs in t cs.ad = cs.ad ∪ R cs.dist = cs.dist + |R| if (cs.dist < best) then Sol = cs best = cs.dist else if (t has no base pairs) then . current state is a leaf R = set of base pairs in s cs.rm = cs.rm ∪ R cs.dist = cs.dist + |R| if (cs.dist < best) then Sol = cs best = cs.dist else . current state is an internal node let M be the list of possible shift moves and removals that can be applied to current state cs for m ∈ M do apply move m to s l = optimal number of moves to go from s to t passing through cs + m and allowing pseudoknots if (l < best) then if (m is a shift) then nt = t − m.t . remove the resolved base pair from t ns = s − m.s . remove the resolved base pair from s newState = state(ns, nt, cs.dist + 1, l, cs.rm, cs.ad, cs.sh + m) else if (m is a removal) then ns = s − m . remove the resolved base pair from s newState = state(ns, cs.t, cs.dist + 1, l, cs.rm + m, cs.ad, cs.sh) Q = Q ∪ newState f inalP ath = BP1 + Sol.rm + Sol.sh + Sol.add + BP2 46 10. while C = 6 ∅ 11. v0 = argmaxv |Cv | //v0 belongs to largest number of cycles 12. V0 = V0 ∪ {v0 } 13. V = V − {v0 } 14. E = E − {(x, y) : x = v0 ∨ y = v0 } 15. G = (V, E) //induced subgraph obtained by removing v0 16. C = C − Cv0 // remove all cycles containing v0 17. v0 = (x, y, z) //unpack v0 to obtain base pairs {x, y}< ∈ t, {y, z}< ∈ s 18. s = s − {(min(y, z), max(y, z))} //topological sort of the now acyclic digraph G = (V, E) for updated V, E 19. topological sort of G using DFS [7] to obtain total ordering ≺ on V 20. for v = (x, y, z) ∈ V in topologically sorted order ≺ //check if shift would create a base triple, as in type 1,5 paths from Figure 3 of main text 21. if s[x] = 1 //i.e. {u, x} ∈ s for some u ∈ [1, n] 22. remove {u, x} from s; numMoves = numMoves+1 23. shift {y, z} to {x, y} in s; numMoves = numMoves+1 //remove any remaining base pairs from s that have not been shifted 24. for (x, y) ∈ s − t 25. remove (x, y) from s; numMoves = numMoves+1 //add remaining base pairs from t−s, e.g. from BP2 and type 4,5 paths in Figure 3 of main text 26. for (x, y) ∈ t − s 27. add (x, y) to s; numMoves = numMoves+1 28. return folding trajectory, numMoves We now analyze the time and space complexity of the greedy algorithm. In line 6, Johnson’s algorithm [21] is used to enumerate all simple directed cycles, resulting in run time O((|V | + |E|) · (|C| + 1)), where |V | [resp. |E|] denotes the number of vertices [resp. edges] of the initial conflict digraph G, and |C| denotes the number of directed cycles of G. Let M = |C| denote the number of directed cycles in C, and let N = O(|V | · M ) denote the total number of vertices (counting duplicates) in the set of all simple directed cycles C = {C1 , . . . , CM }. Lines 7 through 28 require O(N ) time and space, provided that one introduces the data structures A1 , A2 , A3 , A4 , defined by as follows: A1 [v] = |{C ∈ C : v ∈ C}| A2 [v] = {k ∈ {1, . . . , |C|} : Ck ∈ C ∧ v ∈ Ck } A3 [k] = {v ∈ V : v ∈ Ck }  1 if Ck ∈ C A4 [k] = 0 else In other words, A1 is a linked list of size |V |, where A1 [v] equals the (current) number of cycles to which v belongs (in line 13, the node A1 [v] is deleted from the linked list); A2 is an array of size |V |, where A2 [v] is a linked list of indices k of cycles Ck that contain vertex v (note that the size of linked list A2 [i] is A1 [i]); A3 is an array of size the number |C| of cycles, where A3 [k] is a linked list of vertices v that belong to Ck ; A4 is an array of size the number |C| of cycles, where A4 [k] is a a boolean value (true/false), depending on whether the cycle Ck currently belongs to C (used to implement line 16). Details are left to the reader, or can be gleaned from reading our publicly available source code. It follows that the run time complexity of Algorithm 17 is O((|V | + |E|) · (|C| + 1)) with space complexity of O(|V | · (|C| + 1) + |E|). E E.1 Graph theoretical properties Representable digraphs Recall that digraph G = (V, E) is isomorphic to digraph G0 = (V 0 , E 0 ) if there is a bijective function (i.e. one-one and onto) Φ : V → V 0 , such that for all u, v ∈ V , (u, v) ∈ E if and only if (Φ(u), Φ(v)) ∈ E 0 . Since RNA conflict digraphs have a natural ordering of vertices defined in Definition 11, we now define digraph order-isomorphism. 47 Definition 18 (Order-isomorphism). Let G = (V, E, ) [resp. G0 = (V 0 , E 0 , 0 )] be a digraph, whose vertex set V [resp. V 0 ] is totally ordered by  [resp. 0 ]. We say that G is order-isomorphic to G0 if there exists an order-preserving bijective function Φ : V → V 0 (i.e. one-one and onto) such that (1) for u, v ∈ V , x  y if and only if Φ(u) 0 Φ(v), (2) for u, v ∈ V , (u, v) ∈ E) if and only if (Φ(u), Φ(v)) ∈ E 0 . If Φ is an injective function (one-one, but not necessarily onto), then G is said to have an order-preserving embedding in G0 . We say that a digraph G = (V, E) is representable if it is order-isomorphic to an RNA conflict digraph, formally defined as follows. Definition 19 (Representable digraph). Let V = {1, . . . , n} be a set of vertices and E a set of directed edges on V . The digraph G = (V, E) is said to be representable if there exist secondary structures s, t of some RNA sequence a1 , . . . , am , an integer N , and an order-preserving function Φ : [1, n] → [1, N ]3 such that (1) for v, v 0 ∈ [1, n], x < y if and only if Φ(v) < Φ(v 0 ), (2) for each v ∈ [1, n], Φ(v) = (x, y, z) where x, y, z are distinct, {x, y}< ∈ t, {y, z}< ∈ s, (3) there is an edge u → v in E if and only if Φ(u).s = {y, z}< ∈ s touches or crosses Φ(v).t = {x, y}< ∈ t. As just defined, the notion of representability depends on the nucleotide sequence a1 , . . . , an . In a mathematical investigation to determine which digraphs are representable, it is more natural to reinterpret the notion of secondary structure to satisfy requirements 2-4 of Definition 3, but not necessarily requirement 1. The requirement that mapping Φ be order-preserving is important. Consider the RNA conflict digraph G in Figure 21, equivalent to the ordered digraph in Figure 25a, having edges 1 → 2 → 3 → 4 → 1. Clearly G is isomorphic to the digraph G0 in Figure 25b, although there is no order-isomorphism between G and G0 . Indeed, by writing a program to exhaustively enumerate all representable digraphs having a vertex set of size 4, we know that G0 is not order-isomorphic to any RNA conflict digraph. It is a 3 straightforward exercise to show that each of the 2(2) = 8 many tounaments on 3 nodes is representable 4 (data not shown); however, not all 2(2) = 64 many tournaments on 4 nodes are representable, as shown in Figure 25c. Although representability is not invariant under isomorphism, it clearly is invariant under order-isomorphism. Moreover, we have the following. Theorem 20. Suppose that Φ is an order-preserving embedding of digraph G = (V, E) into digraph G0 = (V 0 , E 0 ). If G is not representable, then G0 is not realizable. The theorem is immediate, since if G0 were order-isomorphic to an RNA conflict digraph, then the induced subgraph Φ(G) of G0 must be representable, and hence G must be representable. Figure 26a depicts a nonrepresentable digraph having 4 vertices and 4 edges. By adding an edge to that figure, we obtain the digraph in Figure 26b, which is not representable. Recall that an automorphism of a directed graph G = (V, E) is the set of permutations σ on n letters, for V = {1, . . . , n}, such that G and σ(G) are isomorphic. Using a small program that we wrote to compute the automorphism group Aut(G) for any connected, directed graph G = (V, E), we found that the digraphs in Figures 25c and 26b both have the trivial automorphism group consisting only of the identity permutation on 4 letters. Since the former is not representable and the latter is representable, it follows that the automorphism group of a digraph implies nothing about whether the digraph is representable. E.1.1 Example of RNA conflict digraphs Computation time for the IP algorithm 14 is dominated by the time to generate a list of all simple cycles and the time to obtain an IP solution satisfying the FVS problem (†) as well the constraints (‡) that ensure that shift moves cannot be applied if they share same base pair from s or t. This raises the question whether the FVS problem is polynomial time solvable for RNA conflict digraphs. We cannot settle this open question, but provide examples of RNA conflict digraphs that indicate the there is no reduction to known cases for which the FVS problem has been resolved to be NP-complete or polynomial time computable. Figure 21 depicts a 4-cycle digraph that is order-isomorphic to the digraph with edges 1 → 2 → 3 → 4 → 1. Figure 22a shows the complete bipartite graph K3,3 . Recall that in [24], Kuratowski proved that a graph is planar if and only if it does not contain a subgraph that is a subdivision of K3,3 or the complete graph K5 ; i.e. does not contain an embedded copy of one of the forbidden graphs K3,3 or K5 . Figure 22b depicts a copy of 48 K3,3 with directed edges, which is realized in the RNA conflict digraph shown in Figure 23. It follows from Kuratowski’s theorem that RNA conflict digraphs are not planar in general. Figure 22c depicts a forbidden digraph, with the property that a flow graph (graphical representation of code in a programming language with possible goto-statements) is reducible if and only if the flow graph does not contain a copy of this forbidden digraph (or related digraph where the edges of Figure 22c may be replaced by arc-disjoint paths) [19]. Figure 24 shows an RNA conflict digraph which represents the forbidden digraph of Figure 22c. It follows that RNA conflict digraphs are not reducible flow graphs in general. Two classes of digraphs for which FVS is known to be polynomial time computable are: (1) planar digraphs [26], and (2) reducible flow graphs [34]. On the other hand, FVS is NP-complete for general digraphs [22], for tournaments [4, 1], 3 and for Eulerian digraphs [30]. It is a simple exercise, left to the reader, to show that each of the 2(2) = 8 tournaments on 3 vertices can be represented by an RNA conflict digraph. Proposition 21. All tournaments on a graph having 3 vertices can be represented as RNA conflict digraphs. n There are 2( 2 ) many tournaments on n vertices. By applying constraint programming to each of the 6 2 = 64 tournaments on 4 vertices, we found a number of tournaments that are not representable as conflict digraphs. Figure 25a depicts a 4-cycle which is representable by the RNA conflict digraph represented in Figure 21. Figure 25b depicts a simple, connected digraph on 4 nodes (a cycle) which is not representable as a conflict digraph, and Figure 25c shows a tournament on 4 nodes which is not representable. The FVS problem is known to be NP-complete for all tournaments, all Eulerian digraphs and for general digraphs, and there are polynomial time algorithms for FVS for planar digraphs and for flow graphs. Examples we have provided suggest that there is no straightforward application of known results to settle the question whether the FVS problem is NP-complete for the class of RNA conflict digraphs. Question 22. Is the FVS problem polynomial time computable or NP-complete for the collection of RNA conflict digraphs? Using constraint programming, we determined which connected digraphs on 4 nodes could be represented as RNA conflict digraphs. This was done by considering all partition of [1, 12] into four classes, each class corresponding to a triplet node (x, y, z) and determining the resulting edge relations defined by whether a base pair from s belonging to node v crosses a base pair from t belonging to node v 0 . Is there a better approach? Question 23 (Representation of arbitrary G = (V, E) as conflict digraph). Is there an efficient algorithm to determine whether the labeled digraph G = (V, E) can be realized as an RNA conflict digraph, where G = (V, E) is given as input. The following is perhaps tractable. Question 24. Is there an efficient algorithm to determine whether a given labeled digraph G = (V, E) can be realized as an RNA conflict digraph, the vertices of G are totally ordered by v1 < · · · < vn , and each vertex is labeled by one of the node types 1,. . . ,6. Even if the preceding problem has a polynomial time solution, it is not clear whether the same is true for the following slight generalizations. Question 25. Is there an efficient algorithm to determine whether the labeled digraph G = (V, E) can be realized as an RNA conflict digraph, where vertices of D are totally ordered by v1 < · · · < vn . Question 26. Is the feedback arc set (FAS) problem complete for RNA conflict digraphs? Is the problem of computing M S2 distance between arbitrary secondary structures s, t NP-complete? Since a digraph G is planar if and only if it contains neither the complete graph K5 on 5 vertices nor the complete bipartite graph K3,3 , so Theorem 20 suggests the following question. Question 27. Is there a finite set of prohibited digraphs H1 , . . . , Hr such that a digraph G is representable by an RNA conflict digraph if and only if there is no order-preserving embedding of Hi into G for any i = 1, . . . , r. 49
8cs.DS
Myopic Policy Bounds for Information Acquisition POMDPs 0.4 0.6 0.2 0.4 0.6 p(s1 ) 0.8 0 3) p( s 0.6 0.4 0.4 0.4 0.6 p(s1 ) 0.8 0.8 0.6 0.4 0.4 0.6 0.2 0.2 0.2 a3 0.8 0 0 a2 0.8 0.6 0.2 0.8 0 3) 0.6 0.4 p( s 3) 0.2 2) p( s 0.8 a1 p( s M. Lauri and R. Ritala are with Department of Automation Science and Engineering, Tampere University of Technology, P.O. Box 692, FI-33101, Tampere, Finland, {mikko.lauri, risto.ritala}@tut.fi. N. Atanasov and G. Pappas are with GRASP Lab, University of Pennsylvania, Philadelphia, PA 19104, USA, {atanasov, pappasg}@seas.upenn.edu. This work was supported by TerraSwarm, one of six centers of STARnet, a Semiconductor Research Corporation program sponsored by MARCO and DARPA. 0.2 Optimal policy 0 2) The current proliferation of sensors and robots has potential to transform fields as diverse as environmental monitoring, security and surveillance, localization and mapping, and structure inspection. One of the technical challenges in these scenarios is to control the sensors and robots to extract accurate information about various physical phenomena autonomously. Robotic information acquisition may be thought of as an optimization problem: given constraints on robot motion and the available sensing resources, find an optimal control policy for the robot resulting in the greatest amout of collected information. Assuming Markovian system dynamics and observations conditionally independent given the system state, the optimization problem is formalized as a partially observable Markov decision process (POMDP) [1]. A POMDP consists of the state, action and observation spaces, stochastic system dynamics and observation models and a real-valued reward function. As the true state of the robot and environment are unknown, a probability density function (pdf) known as a belief state is maintained to represent information regarding the state. The optimal control policy is a mapping from belief states to actions such that the expected total reward accumulated over a given optimization horizon is maximized. While POMDPs offer a principled framework handling probabilistic uncertainty in both control actions and sensing Upper bound policy 0 p( s I. I NTRODUCTION Lower bound policy 2) Abstract—This paper addresses the problem of optimal control of robotic sensing systems aimed at autonomous information gathering in scenarios such as environmental monitoring, search and rescue, and surveillance and reconnaissance. The information gathering problem is formulated as a partially observable Markov decision process (POMDP) with a reward function that captures uncertainty reduction. Unlike the classical POMDP formulation, the resulting reward structure is nonlinear in the belief state and the traditional approaches do not apply directly. Instead of developing a new approximation algorithm, we show that if attention is restricted to a class of problems with certain structural properties, one can derive (often tight) upper and lower bounds on the optimal policy via an efficient myopic computation. These policy bounds can be applied in conjunction with an online branch-and-bound algorithm to accelerate the computation of the optimal policy. We obtain informative lower and upper policy bounds with low computational effort in a target tracking domain. The performance of branch-and-bounding is demonstrated and compared with exact value iteration. p( s arXiv:1601.07279v1 [cs.SY] 27 Jan 2016 Mikko Lauri, Nikolay Atanasov, George J. Pappas, and Risto Ritala 0.2 0.8 0 0 0.2 0.4 0.6 p(s1 ) 0.8 0 Fig. 1. The optimal policy µ∗ in a POMDP (shown on the right) can be lower and upper bounded by myopic lower and upper bound policies µ∗1 and µ∗1 (shown on the left and middle, respectively). The ternary plots cover the belief simplex B in the three-state case with state space S = {s1 , s2 , s3 }, while the dots indicate the action selected by the policy for a particular belief point. The inequalities µ∗1 (b) ≤ µ∗ (b) ≤ µ∗1 hold for all b ∈ B. The optimal policy is fully determined if µ∗1 (b) = µ∗1 (b). Even if the bounds do not agree they may provide information regarding the optimal action. outcomes, obtaining optimal policies for them is computationally hard [2]. A wide range of algorithms for computing approximately optimal policies for POMDPs have been proposed in the literature, see e.g. [3], [4], [5] for reviews. Most research, however, focuses on a standard formulation in which the reward is a function of the hidden system state, and hence necessarily linear in the belief state. When it comes to information gathering applications in robotics (see e.g. [6], [7], [8], [9]), reward functions that capture uncertainty reduction (e.g. negative Shannon entropy [10]) or information gain (e.g., mutual information [10]) are often more interesting. These reward function are nonlinear in the belief state, and hence, many of the existing approximation techniques for the standard POMDP formulation do not apply. Approximation methods applicable for such information acquisition POMDPs include some online algorithms [11] and specialized value iteration techniques, see e.g. [12]. Sampling-based online planning algorithms, such as those based on variants of Monte Carlo tree search (see e.g. [13], [14]), are also applicable. Besides approximation algorithms, an alternative route to handling the inherent complexity of POMDPs with nonlinear belief-dependent rewards is to make structural statements about the optimal value function. In the case of state-dependent rewards, earlier work [15], [16], [17] shows that, if we restrict attention to a class of POMDPs that satisfy certain assumptions on the state and observation processes, we can bound the optimal policy from both below and above by an easily computable myopic (greedy) policy (see Fig. 1 for details). The specific case of POMDP multi-armed bandits was studied in [18]. The goal of this work is to extend these structural results to POMDPs with belief-dependent rewards. Krishnamurthy and Djonin [19] determined conditions under which the optimal policy has a threshold structure with respect to the monotone likelihood ratio (MLR) order, a partial order on the belief states. Such partial orders on the belief states have been used in the related active hypothesis testing field [20] to determine when a given sensing action dominates all other actions. For example, Naghshvar and Javidi [21] used Blackwell ordering of the observation models to reduce an active hypothesis test with K actions to a passive test with a single action. Compared to active hypothesis testing, information acquisition in POMDPs is even more challenging because the true underlying state evolves during the sensing process. Our first contribution is to extend the structural results of [17] for POMDPs with state-dependent rewards to POMDPs with nonlinear belief-dependent rewards. This allows us to generate upper and lower bounds on the optimal policy (which agree in large portions of the belief state space and hence determine the optimal action) via a very efficient myopic policy computation. Our second contribution is to apply the myopic policy bounds in conjunction with an online branchand-bound pruning algorithm to accelerate computation of the optimal policy. Our approach allows anytime computation with a bounded error from the optimal solution, unlike for instance sampling-based planning which is only asymptotically optimal. The remainder of the paper is organized as follows. Section II formulates the information acquisition problem as a POMDP, and discusses suitable choices of reward functions. Section III briefly reviews existing structural results. Section IV introduces our extension to belief-dependent rewards and defines the myopic lower and upper bound policies. In Section V, we show how to apply the myopic policy bounds in a branch-and-bound pruning algorithm. Section VI presents empirical evaluation in target tracking domains, and Section VII concludes the paper. the set of all possible pdfs over the system state. Finally, ρ : B × A → R is the expected reward, which is a (nonlinear) function of the belief state b. Our definition subsumes the traditional POMDP definition with a state-and-action-dependent reward P function r : S×A → R. This is seen defining ρ(b, a) := s∈S r(s, a)b(s). The evolution of the belief state b in a POMDP is conditional on the actions and observations. When action a ∈ A is executed, the belief state evolves according to the state transition model T. The evolution can be tracked by Bayesian filtering, which consists of iterating prediction and update steps. The prediction step revises the current belief state b ∈ B to the predicted belief ba ∈ B according to X ba (s0 ) = T(s0 , s, a)b(s). (1) II. I NFORMATION ACQUISITION IN POMDP S Definition 1 (Uncertainty function and information gain [22]). An uncertainty function is a non-negative, concave function f : B → R+ . The information gain If (b, a) of an action a ∈ A in belief state b ∈ B is the expected reduction in the uncertainty function f : To model information acquisition problems in robotic applications we define a POMDP with a belief-dependent reward function. In detail, a POMDP is a tuple hT , S, A, Z, T, O, ρi, where T is a set of decision epochs and S = {1, 2, . . . , S}, A = {1, 2, . . . , A}, and Z = {1, 2, . . . , Z} are the finite state, action, and observation spaces, respectively. The function T : S × S × A → [0, 1] is a stochastic state transition model such that T(s0 , s, a) is the probability of reaching state s0 ∈ S from state s ∈ S after executing action a ∈ A and O : Z × S × A → [0, 1] is a stochastic observation model such that O(z 0 , s0 , a) is the conditional probability of observing z 0 ∈ Z when state s0 ∈ S was reached after executing action a ∈ A. To simplify notation, let Ta := [T(j, i, a)]Si,j=1 be the matrix of state transition probabilities for a given action a ∈ A, i.e. previous states are column-wise and next states row-wise. Similarly, let Oa := [O(z, j, a)] for z ∈ Z, j ∈ S, and a ∈ A. As information about the system state is incomplete, it is modeled by a probability density function (pdf) b(s), s ∈ S over the system state. The set B, called the belief space, is s∈S After the state transition, an observation z 0 ∈ Z is perceived and the information it provides is incorporated via the update step: b0 (s0 ) = τ (b, a, z 0 ) := 1 · O(z 0 , s0 , a)ba (s0 ), η(z 0 | b, a) (2) P where η(z 0 | b, a) := s∈S O(z 0 , s, a)ba (s) is a normalization factor equal to the conditional probability of observing z 0 . A. Reward functions for information acquisition The goal in information acquisition is to reduce the uncertainty in the unobservable state of interest s ∈ S. It is therefore desirable to reach “peaked” belief states that have the majority of their probability mass on a single underlying state. In other words, actions that lead the belief state towards the vertices of the probability simplex B should be rewarded. Suitable measures of uncertainty are concave functions of the belief state, called uncertainty functions [22, Sec. 14.16]. If (b, a) := f (ba ) − EZ [f (τ (b, a, Z))]. (3) Examples of uncertainty functions include Shannon entropy, the more-general Rényi quadratic entropy, and variants of the value of information, such as the probability of error in hypothesis testing [10]. For example, the information gain associated with Shannon entropy is known as mutual information. For information acquisition tasks, either information gain or a negative uncertainty function may be used as the reward function in the POMDP formulation. However, as the following example shows, using an uncertainty function might be more appropriate when the magnitude of the predicted uncertainty f (ba ) is significantly affected by the action choice. Example 1. Consider an active localization problem [23] in which a mobile robot needs to choose an appropriate action a to reduce the uncertainty in the distribution b of its current position s. Suppose that the entropy f (b) of its current position distribution is n bits. The robot may choose between a risky high-velocity motion ar leading to a predicted entropy of f (bar ) = n + m bits or a safe low-velocity motion as leading to f (bas ) = n + h bits, where h < m. Suppose that in both cases, after moving, the robot receives the same amount of information, k bits, from its sensor measurement z 0 . In this example, the negative uncertainty function correctly predicts that action ar is risky: −f (τ (b, ar , z 0 )) = −(n + m − k) < −(n + h − k) = −f (τ (b, as , z)) but, perhaps surprisingly, the information gain prefers the risky action: If (b, ar ) = m − k > h − k = If (b, as ). In the rest of the paper, we restrict attention to beliefdependent reward functions, specific to the task of information gathering, which have the following form: X ρ(b, a) := r(s, a)b(s) − wa f (b), (4) s∈S where f is an uncertainty function (preferred to information gain due to the observations in Example 1), r(s, a) is any standard state-dependent reward function, and wa are userspecified weights that trade-off measurement rewards and state uncertainty. B. Value functions and optimal policies the value iteration must be solved is uncountable, the basic scheme above rarely results in practical methods for computing optimal policies. III. M YOPIC POLICY BOUNDS FOR POMDP S In this section, we review existing results on myopic policy bounds for POMDPs with state-depend rewards. The idea of a myopic policy bound is that the optimal policy µ∗k for any k can be either lower or upper bounded by the myopic policy µ∗1 (Eq. 8). The results exploit concepts of stochastic partial orders, summarized in the following definition. Definition 2 (Stochastic partial orders [25]). Let b1 , b2 ∈ B. 1) b1 first-order stochastically domainates b2 , denoted b1 ≥s S S P P b2 , if b1 (i) ≥ b2 (i) ∀j ∈ S. i=j i=j 2) Equivalently, b1 ≥s b2 iff S P i=1 b1 (i)g(i) ≥ S P b2 (i)g(i) i=1 for all increasing functions g : S → R. 3) b1 is greater than b2 in the monotone likelihood ratio (MLR) order, denoted b1 ≥r b2 , if b1 (i)b2 (j) ≤ b2 (i)b1 (j), for all i < j, j ∈ S. 4) A function g : B → R is MLR increasing (decreasing) if b1 ≥r b2 ⇒ g(b1 ) ≥ g(b2 ) (g(b1 ) ≤ g(b2 )). 5) MLR dominance implies first-order stochastic dominance, b1 ≥r b2 ⇒ b1 ≥s b2 . Given conditions on the state transition and observation models, it was shown in [15], [16] that the optimal value function is MLR increasing and that the optimal policy may be lower bounded by µ∗1 . The required conditions, however, were thought to be too restrictive to be of practical significance until a recent extension [17] proposed the following revised assumptions. Let H ∈ N ∪ {∞} denote a planning horizon so that T := {1, 2, . . . , H}, and let 0 ≤ γ ≤ 11 denote a discount factor determining the relative value of immediate and future rewards. The goal in information acquisition is to choose a policy µ∗k : B → A for each k ∈ T such that the expected Assumption 1 (Sufficient conditions for existence of myopic sum of rewards over the decisions epochs is maximized. The policy bounds [17]). sequence of optimal policies µ∗k for k ∈ T remaining decisions (A1) Ta and Oa are totally positive or order 2 (TP2) ∀a ∈ A, (A2) For all j ∈ {1, 2, . . . , S − 1}, a ∈ {1, 2, . . . , A − 1}, and can be computed via value iteration [24] according to: j,a,z S×S z ∈ Z, the matrices Dj,a,z := [dj,a,z m,n + dn,m ] ∈ R a+1 a+1 Q∗1 (b, a) = ρ(b, a) (5) j,a,z a a are copositive, where dm,n := Oz,j Oz,j+1 Tm,j Tn,j+1 − a+1 a Vk∗ (b) = max Q∗k (b, a), (6) Oaz,j+1 Oa+1 z,j Tm,j+1 Tn,j , and  a∈A P P a+1 X (A3) Tai,j Oaz,j − Ta+1 ≥ 0, ∀i ∈ S, ∀z̄ ∈ Z, ∗ i,j Oz,j Q∗k (b, a) = ρ(b, a) + γ η(z 0 | b, a)Vk−1 (τ (b, a, z 0 )), (7) z≤z̄ j∈S z 0 ∈Z ∀a ∈ {1, 2, . . . , A − 1}. µ∗k (b) = argmax Q∗k (b, a), (8) The TP2 property for a matrix requires that all its seconda∈A order minors are nonnegative [26]. Examples of TP2 obser∗ where Vk : B → R is the optimal value function. For infinitevation models include exponential family distributions such horizon problems with H → ∞ and bounded rewards, value as Gaussian, exponential, gamma, and binomial pdfs [26]; ∗ iteration converges to a unique fixed point V that satisfies more examples may be found e.g. in [27]. While (A2) may the Bellman equation: be checked directly [28], it is much more efficient (but also X V ∗ (b) = ρ(b, a) + γ η(z 0 | b, a)V ∗ (τ (b, a, z 0 )), (9) more restrictive) to check the following: j,a,z (A2’) dj,a,z z 0 ∈Z m,n + dn,m ≥ 0 for all m, n ∈ S, j ∈ {1, . . . , S − 1}, a ∈ {1, 2, . . . , A − 1}, and z ∈ Z. and the corresponding optimal infinite-horizon policy µ∗ is Assumption (A3) is a revised version of the original assumpstationary [24]. As the set B of belief states over which tion in [15], [16]. It states that for every state i ∈ S, the prior 1 Note that γ = 1 is only valid for finite H. pdf of perceiving z ∈ Z after ending in state j ∈ S after executing action a + 1 first order stochastically dominates that of action a. The assumptions lead to the following lemma. Lemma 1 ([17]). Consider a POMDP hT , S, A, Z, T, O, ρi. Then for all b ∈ B, and a0 , a ∈ A, a0 ≥ a, (L1) if (A3) holds, η(z 0 | b, a0 ) ≥s η(z 0 | b, a), and (L2) if (A2) holds, τ (b, a0 , z 0 ) ≥r τ (b, a, z 0 ) for all z 0 ∈ Z. The following theorem for POMDPs with rewards linear in the belief state is due to [15, Prop. 2] and [17, Theorem 1]: Theorem 1. Consider a POMDP hT , S, A, Z, T, O, ρi satisfying Assumptions (A1)-(A3), with ρ(b, a) := P r(s, a)b(s). If r(s, a) is increasing (decreasing) s∈S in S for all a ∈ A, then the optimal value function Vk∗ is MLR increasing (decreasing) and the optimal policy µ∗k (b) for any k ∈ T satisfies µ∗1 (b) ≤ µ∗k (b) (µ∗1 (b) ≥ µ∗k (b)) ∀b ∈ B. IV. T RANSFORMED MLR MONOTONE REWARDS FOR INFORMATION ACQUISITION POMDP S In this section, we extend Theorem 1 to apply to reward functions of the form in (4), which are of interest for information acquisition tasks. To proceed, we need the following minor extension of Theorem 1. Corollary 1. Consider a POMDP hT , S, A, Z, T, O, ρi satisfying Assumptions (A1)-(A3) and suppose that ρ is MLR increasing (decreasing) in B for all a ∈ A. Then, the optimal policy µ∗k (b) for any k ∈ T satisfies µ∗1 (b) ≤ µ∗k (b) (µ∗1 (b) ≥ µ∗k (b)) ∀b ∈ B. Proof. By [15, Prop. 2], it suffices to show Vk∗ is MLR increasing. We proceed by induction. For the base case k = 1, V1∗ (b) = max ρ(b, a) is clearly MLR increasing. For the a∈A ∗ induction step, suppose the claim holds for Vk−1 . Consider the sum part of the value iteration in Eq. (7). Let b1 , b2 ∈ B s.t. b1 ≥r b2 . Now Z X ≥ z 0 =1 Z X ∗ η(z 0 | b1 , a)Vk−1 (τ (b1 , a, z 0 )) ∗ η(z 0 | b2 , a)Vk−1 (τ (b1 , a, z 0 )) (10) z 0 =1 ≥ Z X ∗ η(z 0 | b2 , a)Vk−1 (τ (b2 , a, z 0 )). z 0 =1 The first inequality follows by Lemma (L1), [15, Lemma 1.2(2),1.3(1)] which state τ (b, a, z 0 ) is MLR increasing in z 0 , and the the induction hypothesis. The second inequality follows by Lemma (L2) and the induction hypothesis. The proof for the MLR decreasing part is similar and omitted. Following the observation in Corollary 1, the main idea is to transform the reward function ρ(b, a) (4) to one that is MLR monotone but leaves the optimal policy unchanged. Accordingly, we define two transformed reward functions: ρ(b, a) = ρ(b, a) + [(I − γ(Ta )T )g]T b ρ(b, a) = ρ(b, a) + [(I − γ(Ta )T )h]T b, (11) where g, h ∈ RS are parameter vectors chosen so that ρ(b, a) is MLR increasing and ρ(b, a) is MLR decreasing in B. Note that, by construction the transformed rewards in (11) leave the optimal policy unaffected. This can be verified by plugging either one into the Bellman equation (9). The corresponding infinite horizon value functions are V ∗ (b) = ∗ V ∗ (b) + g T b, V (b) = V ∗ (b) + hT b, and µ∗ ≡ µ∗ ≡ µ∗ [17]. The following theorem gives necessary conditions for the existence of vectors g and h at a single belief state. Theorem 2. Let b0 ∈ B. If there exists a g ∈ RS such that the set of linear constraints given by ∂ρ(b, a) ∂b K + [(I − γ(Ta )T )g]T K ≥ 0 ∀a ∈ A (12) b=b0 where K is an S-by-S matrix with entries ( 1 if i = j , kij = −1 if j = i + 1 (13) are satisfied, then ρ(b, a) as defined in Eq. (11) is MLR increasing at b0 . Proof. As in the supplementary material of [17], let ∆ = {δ ∈ RS : 1 = δ(1) ≥ δ(2) ≥ . . . ≥ δ(S)}. Any belief state b ∈ B may be represented as δ = Kb ∈ ∆. Let b1 = Kδ1 , b2 = Kδ2 such that b1 ≥r b2 . By Definition 2, b1 ≥s b2 , and the equivalent partial order on ∆ ⊂ RS is the component-wise partial order between δ1 and δ2 . Then, the function ρ(Kδ, a) is increasing on ∆ if its partial derivatives are non-negative: ∂ρ(Kδ, a) ∂ρ(Kδ, a) ∂[(I − γ(Ta )T )g]T Kδ = + ∂δ ∂δ ∂δ (14) ∂ρ(b, a) a T = K + [(I − γ(T ) )g]T K ≥ 0 ∂b and the claim follows by evaluating the derivative at b0 . The proof for ρ(b, a) being MLR decreasing is obtained similarly, by swapping the required sign for the partial derivatives. Practically, the condition of the theorem may be checked by solving a feasibility linear program (LP) with (S − 1) · A constraints. If a single g and h may be chosen such that the transformed rewards are MLR monotone for all b ∈ B, then the myopic policies µ∗1 (b) = argmax ρ(b, a) a∈A µ∗1 (b) = argmax ρ(b, a) (15) a∈A satisfy µ∗1 (b) ≤ µ∗ (b) ≤ µ∗1 (b) for all b ∈ B. This follows from Corollary 1, and the fact that the optimal stationary policy is unaffected by applying the transformed rewards. It is imporant to note that the preceding inequalities do not hold anymore for finite horizon optimal policies. Consider the following two examples of nonlinear beliefdependent reward functions obtained by applying different uncertainty functions in Eq. (4). In both examples, we denote by ra the column vector formed from the elements of r(s, a) for all s ∈ S. Original reward Example 2 (Shannon Entropy). Let the uncertainty function in (4) be the Shannon entropy: f (b) := − S X Transformed reward ρ(b, a1 ) ρ(b, a2 ) b(i) log b(i). i=1 The derivative of ρ(b, a) for the constraints in Thm. 2 is:   ∂ρ(b, a) = raT + wa 1 + log(b(1)), . . . 1 + log(b(S)) . ∂b As log(0) is not well defined, we consider the inner belief simplex B := {b ∈ B | ∀i : b(i) ≥ } for  ∈ (0, 1). Note that log() ≤ log(b(i + 1)) − log(b(i)) ≤ − log(). For i = 1, . . . , S −1 and ∀a ∈ A, the ith constraint in Eq. (12) can then be bounded by a belief-independent quantity: φai − φai+1 ≥ wa (log(b(i + 1) − log(b(i))) ≥ −wa log(), where φa := ra + (I − γ(Ta )T )g. Example 3 (Rényi Quadratic Entropy). Let the uncertainty function in (4) be the Rényi quadratic entropy: f (b) := − log S X b2 (i). i=1 The derivative of ρ(b, a) for the constraints in Thm. 2 is: 2wa ∂ρ(b, a) = raT + PS bT . 2 (i) ∂b b i=1 S and 0.2 0.4 0.6 0.8 1 0 p(s = 1) 0.2 0.4 0.6 0.8 1 p(s = 1) Fig. 2. Expected original (left axes) and transformed (right axes) rewards as function of the belief state according to Example 3. Rewards for action a1 are shown by a solid line and for action a2 by a dashed line. The increasing blue curves in the right axes depict the MLR increasing rewards ρ(b, a), and the decreasing red curves depict the MLR decreasing rewards ρ(b, a). The two regions on the right axes indicated by lines starting and ending with circle markers are the parts of the belief space where the optimal policy is fully determined by the myopic policy bounds. The dashed region corresponds to µ∗1 (b) = µ∗1 (b) = a2 and the solid region to µ∗1 (b) = µ∗1 (b) = a1 . is equivalent to the familiar notion of monotonicity on R. On the bottom of the right axes, two regions in B are indicated by a dashed and a solid line. These are regions where the myopic policy bounds agree and the optimal policy is thus fully determined. V. M YOPIC BOUNDS FOR BRANCH - AND - BOUND PRUNING Note that: −1 ≤ b(i + 1) − b(i) ≤ 1 0 X 1 b2 (i) ≤ 1, ≤ S i=1 which can be used to obtain belief-independent bounds in (12). In particular, the ith constraint in (12) may be bounded by a belief-independent quantity: 2wa φai − φai+1 ≥ PS (b(i + 1) − b(i)) ≥ −2wa , 2 j=1 b (j) where φa := ra + (I − γ(Ta )T )g and i = 1, . . . , S − 1. In both examples, belief independent bounds for finding h are obtained with straightforward changes. For Shannon entropy, one ideally wants to choose  as small as possible to cover the greatest possible subset of the belief space. On the other hand, the smaller  is, the more restrictive the constraints become, making it more unlikely to find feasible solutions. The issue is resolved by considering a different quantification of uncertainty, such as the Rényi quadratic entropy. Figure 2 shows an example of the transformation of Rényi quadratic entropy rewards and the associated monotonicity properties as discussed in Example 3. The left axes show the original expected reward as function of the belief state, and the right axes show the transformed MLR increasing and decreasing rewards, respectively. For S = 2, the belief space B can be represented by [0, 1] ⊂ R and MLR monotonicity The significance of Theorems 1 and 2 is that they give a prescription for constructing policy bounds µ∗1 (b) ≤ µ∗ (b) ≤ µ∗1 (b) for all b ∈ B. In this section, we show that the bounds can be used in an online branch-and-bound scheme to accelerate the computation of the optimal policy for POMDPs that satisfy Assumption 1. Branch-and-bound pruning for POMDPs is based on a tree search over the set of belief states reachable by finite-length action and observation sequences, see e.g. [11]. The search is started from the current belief state b0 at the root of the search tree. The tree branches due to action choices and observation possibilities, so that each node corresponds to a belief state b reachable from b0 via the prediction and update iteration in (1), (2). The standard branch-and-bound algorithm works with lower and upper bounds on the optimal action values, i.e., Qk (b, a) ≤ Q∗k (b, a) ≤ Qk (b, a). Starting from node b, the subtree corresponding to action a may be pruned if it is known to be suboptimal (i.e, the upper bound Qk (b, a) is lower than the lower bound Qk (b, â) for some other action â), thus saving computational resources. Following the intuition of the branch-and-bound scheme above, we design a new algorithm (Alg. 1), which employs our policy bounds, instead of bounds on the optimal action values. Given a belief state b and a search depth d > 0, the algorithm constructs a search tree over reachable belief states, storing the estimate of the value Q̂(b, a) for each visited belief state. Only actions within the myopic lower and upper bound policies are considered. Algorithm 1 Branch-and-bound with myopic policy bounds. Input: Belief state b, search depth d Output: Estimate of the value of the best action at b 1: function S EARCH (b, d) 2: if d = 1 then return max ρ(b, a) a 3: end if do 4: for all a ∈ A ∩ [µ∗1 (b), µ∗1 (b)]  P 5: Q̂(b, a) ← ρ(b, a) + γ η(z 0 | b, a) z 0 ∈Z  6: ×S EARCH(τ (b, a, z 0 ), d − 1) end for return max Q̂(b, a) a 9: end function 7: 8: for each action a ∈ A  q    (1 − q)/2 Oaz,j =  (1 − q)    0 has elements if z = j if j 6= 1, i 6= S and |z − j| = 1 , (16) if j = 1, i = S and |z − j| = 1 otherwise i.e. with probability q < 1 the observation identifies the true state, with symmetric error probability in either direction. This model corresponds to a situation where e.g. entering a dangerous state is perceived e.g. by the robot being damaged by hazardous environmental conditions. This class of target tracking domains can be checked to satisfy Assumptions 1. A. Minimizing the uncertainty of the target state The next proposition follows from [11, Theorem 3.1]. Proposition 1. After Alg. 1 terminates, its action recommendation â is guaranteed to coincide with the optimal action a∗ := µ∗ (b) if the myopic lower and upper bounds agree at b, i.e., if µ∗1 (b) = µ∗1 (b). Otherwise, the suboptimality of â is of order γ d , i.e., |Q∗ (b, â) − Q∗ (b, a∗ )| ∼ o(γ d ). VI. A PPLICATION TO TARGET T RACKING We evaluate the performance of Algorithm 1 in a target tracking application. Let s ∈ S model the state of a physical process of interest such as the position of an adversarial aircraft or certain environment conditions (e.g., temperature, chemical concentration, air pollution, etc.). Let s = 1 correspond to an innocuous target state (e.g., the aircraft poses no danger or the environment levels are normal) and, at the other extreme, let s = S correspond to a red-alert state in which there is imminent danger. We aim to design a control policy for an autonomous robotic platform to track the target state s. Let the available robot actions A = {1, 2, . . . , A} model the priority invested into tracking the target, with 1 corresponding to greatest priority (e.g, all available resources being dedicated to tracking the target) and A corresponding to lowest effort, i.e. the target is not being tracked. The state transition model is such that the lower the priority invested into tracking, the more likely it is to transition to a state that is considered dangerous. Conversely, the higher the priority given to tracking, the less likely it is to accidentally enter a dangerous state. In other words, supposing the current state is i, the likelihood of transitioning to state j > i should increase as function of a. State transition matrices Ta modeling this can be defined e.g. as follows. Let {xi }Si=1 and {yj }SA j=1 be two increasing sequences of real numbers, and define a matrix Aij = exp(xi yj ), normalizing it such that each column sums to one, and define Ta as the submatrix of A containing all rows and columns j for which 1 + (a − 1) · S ≤ j ≤ a · S. Each Ta also satisfies the required TP2 condition [26]. The robot has access to Z = S observations providing information about the target state. The observation matrix Oa We first consider target tracking with a penalty for uncertain tracker state information. We set S = A = Z = 3 and defined the sequences {xi } = {1, 2, 3}, {yj } = {−9, −8, . . . , −1}. The observation model was as defined in Eq. (16). The reward was as in Eq. (4), with   2 2.5 1 r(s, a) = 1.1 1.2 0.5 , (17) 0.3 2 0.2   wa = 1.1 1.6 1 , and f equal to Rényi quadratic entropy. The discount factor was γ = 0.99, and the observation accuracy parameter was q = 0.7. We computed the lower and upper myopic policy bounds for the problem. The bounds are visualized on the belief simplex B in Figure 1. The figure shows on the left and middle the lower and upper myopic policies, and on the right the optimal policy determined when the two bounds agree. We defined a larger problem with S = Z = 8 and A = 3, and in it compared Algorithm 1 against an exhaustive tree search. There are Nd = (AZ)d reachable belief states after d decisions, Pdand the number of belief states in a complete search tree is i=0 Ni . TABLE I AVERAGE PERCENTAGE OF BELIEF STATES PRUNED AS FUNCTION OF THE SEARCH DEPTH d APPLYING THE MYOPIC POLICY BOUNDS . Belief states pruned d=2 d=3 d=4 d=5 d=6 26.3% 36.3% 44.9% 52.3% 58.8% Table I shows the average percentage of belief state pruned from the search tree for 100 randomly sampled initial belief states. Computing the myopic policy bound requires solving a feasibility LP with (S − 1) · A constraints offline, and then during the search computing for each belief encountered the action maximizing the immediate expected transformed reward. Empirically, we found that for d ≥ 3 branch-andbounding was faster than the exhaustive search measured by computation time. B. Comparison with existing approaches 1 s 1 S−s+1 if s ∈ Sp if s ∈ Sd otherwise (18) where Sp and Sd are the regions of the state space corresponding to poor and dangerous tracking, respectively, and cp and cd are the respective penalty costs. If the state is not in Sl or Sh , a tracking reward proportional to kr is received. 1 In our experiments, we set ca = 2A , cp = 1, cd = 0.1, and 2 kr = S . Furthermore, we set Sl = {s ∈ S | s ≤ S/5} and Sh = {s ∈ S | s ≥ 9S/10}, and γ = 0.99. The observation accuracy parameter was q = 0.8. Table II shows the minimum, average and maximum percentage of actions that could be pruned by applying the myopic policy bounds as function of the domain size. A value of 0% would indicate that the bounds were completely noninformative, and a value of 100% that the optimal policy is fully determined by the bounds. The results were obtained by evaluating the bounds with 500 randomly sampled reachable belief states in each problem. We note that pruning efficiency tends to decrease both as function of the state space and action space size, but in all cases at least one third pruning rate was achieved even in the worst case. For S = 256 and A = 64, a vector satisfying the constraints of Thm. 2 could not be found. As we computed the optimal solution, we could examine how close the bounds are to the optimal policy. Figure 3 shows an example of the looseness of the upper bound measured by the average of µ∗1 (b) − µ∗ (b) over the 500 belief states. The greater the difference is, the further away the myopic upper bound policy is from the optimal policy, and the less informative it is. We note that even as the number of states and actions increases, the upper bound remains at a distance of less than 10 actions from the optimal. 2 We applied the implementation from the pomdp-solve package of A. Cassandra, see http://pomdp.org µ∗1 (b) − µ∗ (b) Next, we compare the performance of our approach to an optimal incremental pruning algorithm2 in a target tracking scenario with a state space size S between 4 and 256, and action space size A between 4 and 64. Since the incremental pruning algorithm (as well as other existing approaches) can handle only state-dependent rewards, we do not add an uncertainty function to the reward, i.e., f ≡ 0 in (4). The state-dependent reward r(s, a) is designed to 1) incur a lower reward for investing higher priority in target tracking and to 2) penalize for both tracking the target poorly or too dangerously. The penalty on dangerous tracking models a situation where attempting to track the state too aggressively may make the robot vulnerable to environmental hazards. The reward is set as r(s, a) = −ca · (A − a + 1) + t(s, a), where ca is the cost of expending one unit of effort in tracking, and t(s, a) is a tracking performance reward, defined   −cp · t(s, a) = −cd ·   kr · s Upper bound looseness 15 A = 16 A = 32 A = 64 10 5 0 2 4 8 16 32 64 128 256 S (log scale) Fig. 3. The average distance between the upper bound and optimal policy as function of state space size S for various action space sizes A. VII. C ONCLUSION We examined information acquisition in POMDPs with a reward function nonlinear in the belief state. We showed that if the POMDP fulfills certain structural properties, the optimal infinite horizon stationary policy may be lower and upper bounded by myopic (greedy) lower and upper bound policies. Based on the bounds, we designed a branch-andbound pruning algorithm for online planning in POMDPs, and demonstrated its effectiveness in a target tracking application. The main advantage of our approach is that, if the structural properties are satisified in the POMDP model, the resulting branch-and-bound algorithm saves orders of magnitude in computation compared to the existing approaches. The main drawback is that the requred structural properties can be quite restrictive in some applications. For example, a natural order in the state and action spaces is required. Future work will focus on relaxing the structural requirements while keeping track of the effect on the policy bounds. This has potential to widen the scope of the possible applications of our apporach significantly. R EFERENCES [1] L. Kaelbling, M. Littman, and A. Cassandra, “Planning and acting in partially observable stochastic domains,” Artificial Intelligence, vol. 101, no. 1-2, pp. 99–134, 1998. [Online]. Available: http: //linkinghub.elsevier.com/retrieve/pii/S000437029800023X [2] O. Madani, S. Hanks, and A. Condon, “On the Undecidability of Probabilistic Planning and Related Stochastic Optimization Problems,” Artificial Intelligence, vol. 147, no. 1–2, pp. 5–34, 2003. [Online]. Available: http://www.sciencedirect.com/science/article/ pii/S0004370202003788 [3] W. Lovejoy, “A Survey of Algorithmic Methods for Partially Observed Markov Decision Processes,” Annals of Operations Research, vol. 28, no. 1, pp. 47–65, 1991. [4] M. Hauskrecht, “Value-function Approximations for Partially Observable Markov Decision Processes,” Journal of Artificial Intelligence Research, vol. 13, no. 1, pp. 33–94, 2000. [5] G. Shani, J. Pineau, and R. Kaplow, “A Survey of Point-based POMDP Solvers,” Autonomous Agents and Multi-Agent Systems, vol. 27, no. 1, pp. 1–51, 2013. [6] C. Stachniss, G. Grisetti, and W. Burgard, “Information Gain-based Exploration using Rao-Blackwellized Particle Filters,” in Proc. Robotics: Science and Systems (RSS), Cambridge, MA, USA, Jun. 2005. [7] B. Charrow, V. Kumar, and N. Michael, “Approximate Representations for Multi-robot Control Policies that Maximize Mutual Information,” Autonomous Robots, vol. 37, no. 4, pp. 383–400, Aug. 2014. TABLE II T HE ( MINIMUM , AVERAGE , MAXIMUM ) PERCENTAGE OF ACTIONS PRUNED IN TARGET TRACKING DOMAINS AS FUNCTION OF STATE SPACE SIZE S AND ACTION SPACE SIZE A. S A=4 A=8 A = 16 A = 32 A = 64 4 8 (75.0, 94.9, 100) (50.0, 75.0, 75) (75.0, 83.3, 87.5) (37.5, 59.5, 62.5) (75.0, 78.7, 87.5) (50.0, 58.0, 75.0) (71.9, 74.7, 75.0) (59.4, 64.9, 71.9) (64.1, 72.0, 75.0) (48.4, 57.6, 67.2) 16 32 (50.0, 72.7, 75) (50.0, 73.9, 75) (50, 65.2, 75.0) (37.5, 58.5, 62.5) (43.8, 61.3, 68.8) (37.8, 54.9, 62.5) (46.9, 55.0, 62.5) (37.5, 49.9, 59.4) (46.9, 55.5, 62.5) (43.8, 52.6, 59.4) 64 128 (50.0, 71.9, 75) (50.0, 73.2, 75) (37.5, 60.4, 62.5) (50, 61.1, 62.5) (43.8, 54.0, 62.5) (43.8, 54.7, 56.3) (37.5, 49.6, 59.4) (40.6, 49.3, 53.1) (40.6, 47.9, 53.1) (42.2, 48.3, 53.1) 256 (50.0, 72.8, 75) (50, 60.4, 62.5) (43.8, 50.9, 56.3) (43.8, 49.1, 53.1) (n/a) [8] N. Atanasov, J. Le Ny, K. Daniilidis, and G. J. Pappas, “Information Acquisition with Sensing Robots: Algorithms and Error Bounds,” in Proc. IEEE International Conference on Robotics and Automation (ICRA), Hong Kong, China, Jun. 2014, pp. 6447–6454. [9] M. Lauri and R. Ritala, “Optimal Sensing via Multi-armed Bandit Relaxations in Mixed Observability Domains,” in Proc. IEEE International Conference on Robotics and Automation (ICRA), Seattle, WA, May 2015, pp. 4807–4812. [10] T. Cover and J. Thomas, Elements of Information Theory. John Wiley & Sons, 2012. [11] S. Ross, J. Pineau, S. Paquet, and B. Chaib-draa, “Online planning algorithms for POMDPs,” Journal of Artificial Intelligence Research, vol. 32, no. 1, pp. 663–704, 2008. [Online]. Available: http: //www.aaai.org/Papers/JAIR/Vol32/JAIR-3217.pdf [12] M. Araya-López, O. Buffet, V. Thomas, and F. Charpillet, “A POMDP Extension with Belief-dependent Rewards,” in Advances in Neural Information Processing Systems 23, J. Lafferty, C. Williams, J. ShaweTaylor, R. Zemel, and A. Culotta, Eds., Vancouver, Canada, Dec. 2010, pp. 64–72. [13] D. Silver and J. Veness, “Monte-Carlo Planning in Large POMDPs,” in Advances in Neural Information Processing Systems 23, J. Lafferty, C. Williams, J. Shawe-Taylor, R. Zemel, and A. Culotta, Eds., Vancouver, Canada, Dec. 2010, pp. 2164–2172. [14] A. Somani, N. Ye, D. Hsu, and W. S. Lee, “DESPOT: Online POMDP Planning with Regularization,” in Advances in Neural Information Processing Systems 26, C. J. C. Burges, L. Bottou, M. Welling, Z. Ghahramani, and K. Q. Weinberger, Eds. Curran Associates, Inc., 2013, pp. 1772–1780. [Online]. Available: http://papers.nips.cc/paper/ 5189-despot-online-pomdp-planning-with-regularization.pdf [15] W. S. Lovejoy, “Some Monotonicity Results for Partially Observed Markov Decision Processes,” pp. 736–743, 1987. [16] U. Rieder, “Structural results for partially observed control models,” ZOR Zeitschrift für Operations Research Methods and Models of Operations Research, vol. 35, no. 6, pp. 473–490, Nov. 1991. [Online]. Available: http://link.springer.com/10.1007/BF01415990 [17] V. Krishnamurthy and U. Pareek, “Myopic Bounds for Optimal Policy of POMDPs: An Extension of Lovejoys Structural Results,” Operations Research, vol. 63, no. 2, pp. 428–434, Apr. 2015. [Online]. Available: http://pubsonline.informs.org/doi/10.1287/opre.2014.1332 [18] V. Krishnamurthy and B. Wahlberg, “Partially Observed Markov Decision Process Multiarmed Bandits–Structural Results,” Mathematics of Operations Research, vol. 34, no. 2, pp. 287–302, 2009. [19] V. Krishnamurthy and D. V. Djonin, “Structured threshold policies for dynamic sensor scheduling - A partially observed Markov decision process approach,” IEEE Transactions on Signal Processing, vol. 55, no. 10, pp. 4938–4957, Oct. 2007. [Online]. Available: http: //ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4305446 [20] M. Naghshvar and T. Javidi, “Active sequential hypothesis testing,” The Annals of Statistics, vol. 41, no. 6, pp. 2703–2738, Dec. 2013. [Online]. Available: http://projecteuclid.org/euclid.aos/1387313387 [21] ——, “Active M-ary sequential hypothesis testing,” in 2010 IEEE International Symposium on Information Theory, vol. 1, no. 1. IEEE, Jun. 2010, pp. 1623–1627. [Online]. Available: http://ieeexplore.ieee. org/lpdocs/epic03/wrapper.htm?arnumber=5513381 [22] M. H. DeGroot, Optimal Statistical Decisions. Hoboken, New Jersey: John Wiley & Sons, Inc., 2004, Wiley Classics Library edition. [23] S. Thrun, W. Burgard, and D. Fox, Probabilistic Robotics. Cambrdige, MA: The MIT Press, 2006. [24] D. Bertsekas and S. Shreve, Stochastic Optimal Control: The DiscreteTime Case. Athena Scientific, 1996. [25] M. Shaked and J. G. Shanthikumar, Stochastic Orders. New York, NY: Springer New York, 2007. [Online]. Available: http: //link.springer.com/10.1007/978-0-387-34675-5 [26] S. M. Fallat and C. R. Johnson, Totally Nonnegative Matrices. Princeton, NJ: Princeton University Press, 2011. [27] S. Karlin, Total Positivity. Stanford University Press, 1968. [28] W. Kaplan, “A Test for Copositive Matrices,” Linear Algebra and its Applications, vol. 313, no. 1-3, pp. 203–206, 2000.
3cs.SY
arXiv:1511.04203v2 [physics.plasm-ph] 25 May 2016 GPEC, A REAL-TIME CAPABLE TOKAMAK EQUILIBRIUM CODE M. Rampp1 , R. Preuss2 , R. Fischer2 and the ASDEX Upgrade Team2 1 Max Planck Computing and Data Facility Gießenbachstraße 2, 85748 Garching, Germany 2 Max-Planck-Institut für Plasmaphysik, Boltzmannstraße 2, 85748 Garching, Germany May 26, 2016 Abstract A new parallel equilibrium reconstruction code for tokamak plasmas is presented. GPEC allows to compute equilibrium flux distributions sufficiently accurate to derive parameters for plasma control within 1 ms of runtime which enables real-time applications at the ASDEX Upgrade experiment (AUG) and other machines with a control cycle of at least this size. The underlying algorithms are based on the wellestablished offline-analysis code CLISTE, following the classical concept of iteratively solving the Grad-Shafranov equation and feeding in diagnostic signals from the experiment. The new code adopts a hybrid parallelization scheme for computing the equilibrium flux distribution and extends the fast, shared-memory-parallel Poisson solver which we have described previously by a distributed computation of the individual Poisson problems corresponding to different basis functions. The code is based entirely on open-source software components and runs on standard server hardware and software environments. The real-time capability of GPEC is demonstrated by performing an offline-computation of a sequence of 1000 flux distributions which are taken from one second of operation of a typical AUG discharge and deriving the relevant control parameters with a time resolution of a millisecond. On current server hardware the new code allows employing a grid size of 32 × 64 zones for the spatial discretization and up to 15 basis functions. It takes into account about 90 diagnostic signals while using up to 4 equilibrium iterations and computing more than 20 plasma-control parameters, including the computationally expensive safety-factor q on at least 4 different levels of the normalized flux. 1 I INTRODUCTION or other simplifying assumptions like function parametrization 11 are adopted e.g. 12 . Lately, three codes based on fast Grad-Shafranov solvers have been able to demonstrate real-time capability: P-EFIT 13 , a GPU-based variant of the EFIT equilibrium-reconstruction code 9,7 , is able to compute one iteration within 0.22 ms on a 65 × 65 grid with 3 basis functions. With a similar resolution the JANET software 14,4 has reached runtimes of about 0.5 ms per iteration on a few CPU cores within the LabVIEW-based system at AUG. Using a single CPU core overclocked at 5 GHz, the LIUQE code 15 which is deployed at the Swiss TCV experiment, achieves a cycle time of about 0.2 ms with a spatial resolution of 28 × 65 points. In all these cases, however, only a single iteration is performed and only a very small number of basis functions can be afforded for the parametrization of the source term of the Grad-Shafranov equation. While such restrictions may well be justifiable under specific circumstances 16 the motivation for our work is to substantially push the limits of numerical accuracy in terms of spatial resolution, number of basis functions, and number of iterations and thus the quality of the equilibrium solution. This is expected to aid the generality and robustness of the application, in particular with respect to variations in the plasma conditions. In addition to the reliability and accuracy of real-time equilibrium reconstructions, the sustainability and maintainability of the codes is considered an important aspect. Typical implementations of analysis tools in fusion science have a rather long life time which often exceeds life times of commercial hardware and software product cycles. The long usability required for analysis tools poses special requirements on the software chosen and the maintenance capabilities Reconstruction of the plasma equilibrium shape is a key requirement for the operation of current and forthcoming tokamak experiments e.g. 1,2,3,4 . The most commonly employed method numerically reconstructs the plasma equilibrium by iteratively solving the two-dimensional GradShafranov equation 5,6 for the poloidal flux function (ψ), and using diagnostic signals from the experiment as constraints 7,8 . In short, the source term of the Grad-Shafranov equation is expanded into a linear combination of basis functions which allows formulating a linear regression problem for the expansion coefficients, using the actual diagnostic signals and their forwardmodelling based on the numerical solution for ψ. The problem can be tackled numerically by solving a number of independent Grad-Shafranovtype equations — one for each basis function of the expansion — and employing a Picarditeration procedure that allows evaluating the source term using the solution from the previous iteration step. A variety of equilibrium-reconstruction codes based on this strategy 8 or similar approaches 9,7,10 exist and have been routinely used for diagnostics and data analysis at the various tokamak experiments. The codes EFIT 9,7 and CLISTE 8 , for example, have been employed at DIII-D, EAST and ASDEX Upgrade (AUG), respectively, a class of medium-sized tokamaks which are characterized by a control cycle on the order of a millisecond. Until recently, however, computing times in the millisecond range were inaccessible to such ”first-principles” codes, and hence their applicability for real-time diagnostic analysis and plasma-control is very limited, unless the numerical resolution or the number of iteration steps is drastically reduced 2 The new code enables computing the equilibrium flux distribution and the derived diagnostics and control parameters within 1 ms of runtime, given a grid size of 32 × 64 zones with up to 15 spline basis functions for the discretization, and about 90 diagnostic signals. With a runtime of less than 0.2 ms for a single equilibrium iteration and about 0.2 ms required for computing a variety of more than 20 relevant control parameters, one can afford 4 iterations for converging the equilibrium solution. The latter was checked to be sufficient for reaching accuracies of better than a percent for the relevant quantities. As a proof of principle we shall demonstrate the real time capability of the new code by performing an offline analysis using data from an AUG discharge. To our knowledge the new GPEC code to date is one of the fastest (at a given numerical accuracy) and most accurate (at a given runtime constraint) of its kind. necessary to adapt to changing environments. Open-source software together with off-the-shelf computer hardware is thought of being perfectly suited for these demands 17 . This in particular applies to all non-standardized components like, e.g., the implementation of complex, tailored, and evolving numerical algorithms for equilibrium reconstruction. Commercial, closedsource software (like, e.g., compilers or numerical libraries) and hardware components may well comply with such demands, provided that they can be modularly interchanged using standardized interfaces. To this end we have implemented a new, parallel equilibrium-reconstruction code, GPEC (Garching Parallel Equilibrium Code), which builds on the fast, shared-memory-parallel GradShafranov solver we have developed previously 18 and a two-level hybrid parallelization scheme which was pointed out in the same paper. The basic numerical model and functionality of the new code originate from the well-established and validated algorithms implemented by the equilibrium codes CLISTE 8 and specifically its descendant IDE 19 , both of which are being used for comprehensive offline diagnostics and data analysis at the ASDEX Upgrade experiment. GPEC is based entirely on open-source software components, runs on standard server hardware and uses the same code base and computer architecture as employed for performing offline analyses with the IDE code. Such a strategy is considered a major advantage, in particular concerning verification and validation of the code 7 and also its evolution: On the one hand, algorithmic and functional innovations in the offline physics modeling can gradually be taken over by the realtime version. On the other hand, high-resolution offline analysis can directly take advantage of optimizations achieved for the real-time variant. The paper is organized as follows: in Section II we recall the basic equations and describe our new, hybrid-parallel implementation of the equilibrium solver and its verification and validation. Its computational performance and in particular real-time capability is demonstrated in Section III on an example application using real AUG data. Section IV provides a summary and conclusions. II II.A ALGORITHMS AND IMPLEMENTATION Equilibrium Reconstruction Basic equations The Grad-Shafranov equation 5,6 describing ideal magneto-hydrodynamic equilibrium in two-dimensional tokamak geome3 try reads ∆∗ ψ(r, z) = −2πµ0 r jφ , the right-hand side. The updated flux distribution is then given by (1) with cylindrical coordinates (r, z), the elliptic differential operator ∂ 1 ∂ ∂2 + 2 ∂r r ∂r ∂z ψ= N X ck ψk , (7) k=1 (2) which follows from Eqs. (1,4) and the linearity of the operator ∆∗ . The unknown coeffiand the poloidal flux function (in units of Vs), cients ck are determined by experimental data: Using the N distributions ψk obtained from ψ(r, z). The toroidal current density profile, Eqs. (5,6) the so-called response matrix B :=   ∂p(r, ψ) F (ψ) dF (ψ) + , (3) {bl (ψk )}l=1,...,M,k=1,...N , consisting of predictions jφ := 2π r ∂ψ µ0 r dψ for a set of M diagnostic signals {ml }l=1...,M is consists of two terms, where p(r, ψ) ≡ p(ψ) is calculated. The prediction bl (ψ) is some (linear) the plasma pressure (isotropic case) and F (ψ) = function employing the flux distribution ψ to produce the forward-modelled signal. All mearBφ = (µ0 /2π)Ipol is proportional to the total surements are located within the poloidal flux poloidal current, Ipol . grid such that the poloidal flux outside the grid is not needed. Linear regression of the response Numerical solution The classical stratmatrix with the measured diagnostic signals fiegy 8,20,16 for numerically solving Eq. (1) is based nally yields the coefficients ck for Eq. (7). This on an expansion of the current density profile jφ procedure is iterated until certain convergence on the right-hand-side into a linear combination criteria are fulfilled. of a number N = Np + NF of basis functions, The private flux region close to the divertor is treated differently, although the same poloidal jφ (r, z) =   flux as inside the plasma occurs. Since there Np NF X X 1 are no measurements of the current distribution cNp +k ϕk (ψ) . ck πk (ψ) + 2π r µ0 r in the private flux region and the chosen funck=1 k=1 tional form for the current decay was proven to (4) be of minor importance for the equilibrium reIn each cycle of a Picard-iteration scheme, a construction, the current is chosen to decay approximately exponentially with a decay length number of N Poisson-type equations, of about 5 mm, starting at the last closed flux ∆∗ ψk = −4π 2 µ0 r 2 πk (ψ) (k = 1 . . . Np ), (5) surface. ∆∗ := r , and The algorithm can be summarized as follows: ∗ 2 ∆ ψNp +k = −4π ϕk (ψ) (k = 1 . . . NF ), (6) 1. evaluate right-hand sides gk (r, z) := 4π 2 µ0 r 2 πk (ψ i−1 ) and gNp +k (r, z) := 2 i−1 4π ϕk (ψ ) of Eqs. (5,6), using the solu- are solved individually, where the solution ψ from the last iteration step is used for evaluating 4 tion, ψ i−1 , from the previous iteration step measurements are used in the IDE code in the (or initialization). off-line mode, but are not subject of the present work due to the lack of reliable on-line availabil2. solve the Poisson-type equations ∆∗ ψk = ity. The relatively large number of basis func−gk (r, z) individually for each k = 1, . . . , N . tions (and hence fit parameters), which is moAn additional Poisson problem arises from tivated by the need to allow for equilibria sufa convergence-stabilization procedure which ficiently flexible to address all occurring plasma introduces the vertical plasma position as an scenarios, requires application of regularization auxiliary free parameter 8,15 . constraints. While in the IDE code additional 3. evaluate {bl (ψk )}l=1,...,M,k=1,...,N to con- smoothness (curvature and amplitude) requireare applied to the source profiles p′ and struct the response matrix B. Ad- ments ′ ditional columns {bl,N +1 }l=1,...,M and F F (which effectively adds additional columns {bl,N +1...N +1+Next }l=1,...,M arise from the to the response matrix), GPEC currently adopts 21 abovementioned convergence-stabilization a simpler ridge-regression procedure . procedure and from deviations in the currents measured at a number of Next Implementation and parallelization The external field coils to account for wall implementation of GPEC starts out from the seshielding and plasma-induced wall currents, rial offline-analysis code IDE 19 , thus closely folrespectively. lowing the concepts of the well-known CLISTE 4. perform linear regression on B · c = m to code 8 . Specifically, for each of the two sets of basis functions, {πk }k=1...NP and {ϕk }k=1...NF , obtain the set of coefficients {ck }k=1,...,N . GPEC employs a basis of cubic spline polyPN 5. evaluate new solution ψ i = k=1 ck ψk + nomials which are defined by a number of Np ψ ext , adding contributions from the mea- and NF knots at positions xi , respectively, with sured and fitted deviating currents in ex- πk (xi ) = δki , ϕk (xi ) = δki and natural boundary ternal coils, ψ ext . conditions. Bicubic Hermite interpolation is employed for evaluating the flux distribution ψk and 6. go back to step 1. until convergence its gradients (which are required for computing is reached, e.g. in terms of the maxithe magnetic field) at the positions of the magmum norm evaluated over all grid points, netic probes and the flux loops in order to calcukψ i − ψ i−1 k∞ . late the corresponding forward-modelled signals The response matrix B is already prepared for for the response matrix. Thus, besides achieving additional measurements of the motional Stark higher-order interpolation accuracy, smoothness effect (MSE), the Faraday rotation, the pressure of the magnetic field is guaranteed by construc22 profile (electron, ion and fast particle pressure), tion . GPEC utilizes the fast, thread-parallel Poisthe q-profile (e.g. from MHD modes), the divertor tile currents constraining F (ψ) on open son solver we have developed previously 18 . It flux surfaces, the measurements of loop voltage is based on the two-step scheme for solving and of iso-flux constraints 19 . These additional the Poisson equation with Dirichlet boundary 5 conditions 23 and replaces the cyclic-reduction scheme which is traditionally employed in the codes GEC and CLISTE 24,8 by a parallelizable Fourier-analysis method for decoupling the linear system into tridiagonal blocks 22 . For details on the implementation and computational performance we refer to refs. 25,18 . As briefly sketched in ref. 18 the main idea of the new code is to exploit an additional level of parallelism by distributing the individual Poisson problems for determining each of the ψk to different MPIa -processes. The algorithm, together with notes on the parallelization (relevant MPI communication routines are noted in brackets) is summarized as follows. 5. performs linear regression on m = B · c thread-parallelization of linear algebra routines 6. gathers all ck′ ψk′ computed by the other processes Pk′6=k and computes ψ = PN k′=1 ck′ ψk′ collective communication (MPI Allreduce) The distribution of the Poisson problems to different processes comes at the price of collective communication (steps 4 and 6), in which all processes combine their data with all others, using MPI routines MPI Allgather and MPI Allreduce, respectively. Each process Pk=1,...,N is assigned to a single II.B Computation of Plasma-Control basis functionb , and process PN +1 is dedicated to Parameters the additional Poisson problem that arises from the introduction of the vertical shift parameter 8 . Given the solution for the poloidal flux function Accordingly, each process Pk : ψ(r, z), GPEC computes more than 20 derived 1. computes gk (r, z) using the solution ψ(r, z) quantities which are relevant for plasma confrom the previous iteration step (or initial- trol. Two of them, the (r, z)-coordinates of the magnetic axis, Rmag and Zmag can be obtained ization) thread-parallelization over (r, z)-grid immediately by searching the maximum of the equilibrium flux. For the rest of the quantities 2. employs fast Poisson solver 18 to solve four major computational tasks (labelled A–D ∆∗ ψk = −gk (r, z) in the following compilation) have to be carried thread-parallelization 18 out. Their results allow evaluating the individ3. computes column b(ψk ) of the response ma- ual control parameters (summarized under the bullet points) in a numerically straightforward trix thread-parallelization over (r, z)-grid and inexpensive way. For details on the physical definition and derivation of these quantities, 4. gathers columns b(ψk′ ) computed by the see, e.g. Ref. 27 . Implementation details are given other processes Pk′6=k and assembles re- further below. sponse matrix B collective communication (MPI Allgather) (A) determination of grid points which are ena closed by the separatrix The ”Message Passing Interface” standard 26 . b In general the implementation supports an even distribution of the N + 1 Poisson problems to a number of N ′ processes, provided N ′ divides N + 1. • coordinates (Rgeo , Zgeo ) of the geometric axis, defined as the area6 weighted integral within the separatrix (D) computation of the pressure distribution R (r, z)dS/S. p(r, z) and the poloidal magnetic field • the horizontal and vertical minor plasma qradius is given by R 2 ahor = 2 r 2 dS/S − Rgeo and qR 2 , respecbver = 2 z 2 dS/S − Zgeo tively, which determines the elongation k = bver /ahor . • the total energy content of R the plasma is given by WMHD = 3/2 pdV . • the same integration can be used for computing theR poloidal beta parameter, βpol = pdV /Zβ , employing the normalization constant Zβ = 2 /(2 · l2 ) (as used in µ0 · Vplasma · Itor pol CLISTE) with lpol and Itor as specified under (B) and (C), respectively. • the plasma R 2self-inductivity li = −1 (2µ0 Zβ ) Bpol dV is given by an integral over the squared poloidal mag2 = (2πr)−2 · ((∂ ψ)2 + netic field Bpol r (∂z ψ)2 ). • dRXP , the difference of the poloidal flux at the two x-points divided by (2πRaus ) and by the poloidal magnetic field at (Raus , Zmag ): (ψXP1 − ψXP2 )/|∇ψ|(Raus ,Zmag ) . (B) identification of contour lines (r(t), z(t)) with ψ(r(t), z(t)) = ψc for a number of particular values of the normalized flux ψc • from the separatrix curve (with ψc taken as the value at the innermost x-point which defines also the lastclosed flux surface LCFS) a number of geometric properties can be derived straightforwardly such as the (r, z)coordinates of the uppermost and lowermost point (in z-direction) on the plasma surface, or Rin (Raus ) as the R-coordinate of the innermost (outerImplementation and parallelization The most) point on the plasma surface. • the length of the poloidal perimeter lpol algorithms for computing the plasma-control paof the plasma is computed by integra- rameters and their basic implementation are taken directly from the IDE code. We emphasize tion over the LCFS. that unlike other real-time codes 15 GPEC makes • the safety factor q is computed by inte- no algorithmic simplifications compared with the gration over contours defined by levels offline variant of the code. In particular, GPEC ψc ∈ [0.25, 0.50, 0.75, 0.95]. uses the same spatial grid resolution as adopted (C) computation of the toroidal plasma current for equilibrium reconstruction and employs the R high-order interpolation schemes (cubic splines, Itor = jφ dS (Eq. 3) bicubic Hermite interpolation) of IDE. In the fol• the indicators for the current-center lowing we briefly summarize the main concepts are given by the following current- adopted for the computationally most expensive weighted integrals of qR the current routines: R r 2 jφ dS/Itor , density Rsquad = (A) for performing the integrations . . . dS/S, R Zsquad = zjφ dS/Itor . grid points located outside the separatrix 7 are masked out according to a comparison with the value of ψ at the x-point. lation polynomials for intra-grid interpolation, cf. Sect. II.A). (B) a custom contour-finding algorithm is used which employs quadratic interpolation to obtain the values at the intersections of the spatial grid with the contour curve. Quantities on the LCFS, like lpol , are determined by quadratic extrapolation from three equidistant contour levels close to the plasma surface. As shall be shown in Sect. III.B the computing time is dominated by finding and integrating along contours as well as by evaluating the pressure distribution. Accordingly, the computations are grouped into the following mutually independent tasks which can be assigned to different MPI tasks, with only a few scalar quantities to be communicated for evaluating the final results: (C) for the evaluation R of the toroidal plasma current Itor = jφ dS the current density • computation of the pressure distribution jφ (r, z) is computed according to Eq. (4). p(r, z) and the poloidal magnetic field The summands ck πk (ψ) and cNp +k ϕk (ψ) in principle would be available from the last • handling of 3 contour levels for extrapolaequilibrium iteration but are distributed tion to the last closed flux surface among processors (cf. Sect. II.A). It turns • handling of 4 contour levels corresponding out that locally recomputing πk (ψ) and to the set of safety factors q25 , q50 , q75 , q95 ϕk (ψ) by using the converged equilibrium solution ψ (a copy of which is available on • determination of the x-point and handling each processor) is faster than collecting the of 1 contour level corresponding to the sepindividual summands by MPI communicaaratrix curve tion. Within each MPI task, OpenMP threads are (D) the computation of the pressure distriused, e.g. for parallelizing the computation of bution p(r, z) is based on the identity the pressure over the individual points of the P Np ∂ψ p(ψ(r, z)) = k=1 ck πk (ψ) (cf. Eq. 4). (r, z)-grid or for parallelizing over different conFor fast evaluation of p(r, z) on the poloidal tour levels. mesh, an equidistant grid of ψl , l = 1, . . . , 12 points is constructed. For each ψl the corII.C Verification and Validation responding pressure contribution πk (ψl ) is computed by numerical integration starting The codes CLISTE and IDE have been extenat the plasma boundary. A cubic spline in- sively validated and verified by application to terpolation is used to evaluate πk (ψ(r, z)) on ASDEX Upgrade data and by means of code this grid. The gradients for computing the comparisons. Thus, only those parts of the new poloidal magnetic field are obtained using GPEC code need to be verified which are treated centered finite differences of the neighboring differently from the IDE code. The procedure is grid points (consistent with the derivatives greatly facilitated by the fact that both codes used to define the bicubic Hermite interpo- implement the same algorithms and share the 8 same code base. The only differences in the III APPLICATION PERFORGPEC implementation with respect to IDE are MANCE 1) the prescription of a fixed number of equilibrium iterations and 2) the use of only 12 instead III.A Demonstration of Real-Time of 30 integration points for computing the presCapability sure distribution p(r, z) from its gradient ∂ψ p(ψ) In order to demonstrate the real-time capabil(see item D above) on every grid point (r, z). ity of the new code a post-processing run is perFigure 1 shows the sensitivity of a number of formed using data from a typical AUG discharge. selected parameters to the number of equilibrium We chose AUG shot number #23221, and focus iterations for an arbitrarily chosen time point on a time window between t1 = 3.014 s and (t = 3.015 ms) of AUG discharge #23221. By t1000 = 4.013 s with 1000 time points, correusing the solution ψ from the last time point sponding to a time resolution of exactly 1 ms. as an initial value, the plasma geometry (pa- As shall be shown below this simulation of 1000 rameters Rin , Raus , and the total volume of the time points can be performed on standard server plasma, Vplasma ) is already very well determined. hardware within less than a second of computing Within only a few iteration steps accuracies of time. The GPEC code computes a fixed number of better than a percent compared with the converged solution (obtained with 200 iterations) four equilibrium iteration steps for every time are obtained also for the quantities which de- point and uses the equilibrium solution ψ(tn ) at pend on the pressure distribution (βpol , WMHD ), time point tn as the initial value for the next or on the toroidal current (Itor ). For the real- time point tn+1 . A standard spatial resolution time demonstration presented in the subsequent of (Nr , Nz ) = (32, 64) grid points is employed, section we shall fix the number of iterations to and N = 7 basis functions are used. The refour and show that the accuracy level of 1 % is sponse matrix B contains signals from 61 magmaintained over a time sequence of 1 s with 1000 netic probes and 18 flux loops and in addition time points. takes into account 10 external coils. Figure 3 provides an overview of the time evolution of a Figure 2 shows that a number of 12 integration number of characteristic parameters, such as sepoints for the numerical integration of ∂ψ p(ψ) lected plasma-shape parameters, energy content is more than sufficient in order to reach sub- and safety factor q95 (black, solid lines). For refpercent accuracies for the control parameters erence, the figure shows an extended time winβpolR and WMHD , both of which are proportional dow between t = 0.4 s and t = 4.4 s, which to pdV (see item D above). The time for com- includes the dynamic start-up phase of the disputing p(r, z) is proportional to the number of charge with significant variations in the plasma integration points and scales almost ideally with parameters, and also shows results from a run the number of threads which motivates our spe- which converges the solution ψ until the maxcific choice of 12 points as a multiple of 6 threads imum changes on the grid, kψ i − ψ i−1 k∞ , are that shall be employed for the majority of com- below 10−4 (blue, dashed lines). Compared with putations (cf. Sect. III.B). the converged reference run one notices good 9 Fig. 1. Sensitivity of selected parameters to the number of equilibrium iterations for computing ψ(r, z). For each quantity the relative deviation from its converged value is shown as a function of the number of iterations. Note that the deviations for the geometric quantities, Rin , Raus , and the total volume of the plasma, Vplasma are multiplied by a factor of 10. Data was taken from AUG shot #23221 at time t = 3.015 ms. overall agreement of the ”real-time” simulation with a fixed number of 4 equilibrium iterations throughout the extended time interval, even during the initial start-up phase which lasts until approx. 1.5 s. It is hence justified to confine the analysis on the — arbitrarily chosen — time interval, [3.014 s, 4.013 s] in the ”plateau” phase of the discharge. Focusing on this time window, Figure 4 shows that the relative errors for most quantities are at smaller than one percent. The comparably large variations of Zmag are due to its small absolute value. The absolute scatter of Zmag is in the order of mm. Note that the cycle time of ∆t = 1 ms is much shorter than the 10 Fig. 2. Sensitivity of βpol and of the total energy content WMHD to the number of integration points, Npsi , spent for computing the pressure from its gradient on every grid point (r, z). The relative deviation from the converged value is shown as a function of the number of integration points, Npsi . Data was taken from AUG shot #23221 at time t = 3.015 ms. timescale of the changes of plasma conditions (cf. the increase of WMHD , βpol at t ≈ 3.5 s). Thus the equilibrium solution, even if not fully converged, can easily follow such secular trends, which is reflected by the fact that there is no visible change in the magnitudes of the relative error at t ≈ 3.5 s. The employed spatial resolution of (Nr , Nz ) = (32, 64) grid points is a common choice for real-time analysis in medium-sized tokamaks 9,7,14,4,15 . For the chosen AUG discharge a comparison with a run using a twofold finer spatial grid spacing, (Nr , Nz ) = (64, 128), shows good agreement for the majority of quantities, with q95 and Router exhibiting the largest sensitivity to the resolution. We conclude that by performing four iterations per time point and using (Nr , Nz ) = (32, 64) spatial grid points, sufficiently accurate equilibrium solutions for deriving real-time control parameters are obtained, at least in the sense of a proof-of-principle using the chosen example data from AUG shot #23221. A systematic analysis of the accuracy and a comprehensive validation of the code under various tokamak operational scenarios is beyond the scope of this paper. III.B Computational Performance Overview The computational performance of GPEC is assessed on a standard compute cluster with x86 64 CPUs and InfiniBand (FDR 14) interconnect. The individual compute nodes are equipped with two Intel Xeon E5-2680v3 ”Haswell” CPUs (2.5 GHz, 2x12 cores). We use a 11 resolution (Nr , Nz , N+1) (32, 64, 6) (32, 64, 8) (32, 64, 8) (32, 64, 12) (32, 64, 16) (32, 64, 16) (32, 64, 16) (64, 128, 6) (64, 128, 8) (64, 128, 12) (64, 128, 16) Ttot [ms] 0.85 1.08 0.88 0.97 1.55 1.26 0.99 2.07 1.88 2.02 2.04 Teq [ms] 0.62 0.87 0.67 0.74 1.32 1.02 0.73 1.55 1.28 1.39 1.40 Tctl [ms] 0.18 0.17 0.17 0.19 0.18 0.18 0.21 0.39 0.48 0.49 0.51 cores (nodes) 24 (1) 24 (1) 48 (2) 72 (3) 24 (1) 48 (2) 96 (4) 48 (2) 48 (2) 72 (3) 96 (4) MPI tasks 6 4 8 12 4 8 16 6 8 12 16 threads per task 4 6 6 6 6 6 6 8 6 6 6 TABLE I. Overview of the total runtime Ttot per time point (2nd column) for different combinations of the numerical resolution (1st column) and compute resources. The latter are given in terms of the total number of cores (nodes) (5th column), of MPI tasks (6th column) and of OpenMP threads per MPI task (7th column). Ttot is the sum of the runtime Teq (3rd column) for computing the equilibrium distribution ψ with 4 iteration steps (cf. Sect. II.A), and Tctl (4th column) for deriving plasma-control parameters (cf. Sect. II.B). The benchmarks were performed on Xeon E5-2680v3 ”Haswell” CPUs (2.5 GHz, 24 cores per node) and used data from AUG shot #23221. standard Intel software stack (FORTRAN compiler v14.0, MPI v5.0) on top of the Linux operating system (SLES11 SP3). For the required linear algebra functionality the OpenBLAS 28 library (version 0.2.13) is employed using the defacto-standard interfaces from BLAS 29,30 and LAPACK 31,30 , and the FFTW 32 library (version 3.3.4) is used for the discrete sine transforms in the Poisson solver. Both libraries are open-source software released under the BSD or the GPL license, respectively. If desired, opensource alternatives to the Intel compilers (e.g. GCC 33 ) and MPI libraries (e.g. OpenMPI 34 , MVAPICH 35 ) could be readily utilized, albeit possibly with a certain performance impact. Table I shows an overview of the total runtime per time point and of the individual contributions from computing the equilibrium solution and from deriving the set of plasma-control parameters. We chose combinations of different nu- merical resolutions (in terms of the spatial grid resolution Nr × Nz and number of basis functions N ) and computing resources (in terms of the number of CPU cores). With two compute nodes (each with 24 CPU cores) and using a resolution of (Nr , Nz , N+1) = (32, 64, 8) a runtime well below 1 ms and hence real-time capability is reached. When doubling the number of basis functions (N +1 = 16) realtime calculation is still possible on four compute nodes, indicating overall good weak scalability of the code. Roughly three quarters of the runtime is required for computing the equilibrium solution and the rest goes into evaluating the set of plasma control parameters. Hence, with a reduction of the number of equilibrium iterations to only one or two 13,14,4,15 runtimes of 0.5 ms are reached on just a single compute server. With a higher spatial resolution of (Nr , Nz ) = 12 Fig. 3. Time evolution of selected parameters for AUG shot #23221 as computed with the new real-time code during an extended time window between t = 0.4 s and t = 4.4 s. The time interval [3.014 s, 4.014 s] which is chosen for performance analysis is indicated by vertical lines. The individual plots show the coordinates (Rmag , Zmag ) and (RX , ZX ) of the magnetic axis, and of the x-point, respectively, the horizontal and vertical minor plasma radius, ahor and bver , the plasma self-inductivity, li , the poloidal beta parameter, 13 the safety factor q95 (see Sect. II.B for the definition βpol , the total energy content of the plasma, WMHD , and of the quantities). The solid, black lines correspond to a ”real-time” application which is restricted to 4 equilibrium iterations. For comparison, values derived from converged equilibrium solutions (convergence criterion kψ i − ψ i−1 k∞ < 10−4 ) are shown as dashed, blue lines. A standard spatial resolution of (32, 64) grid points and 7 basis functions were employed. Fig. 4. Evolution of the relative deviation (denoted by square brackets) of the quantities which were computed after 4 equilibrium iterations, from the values computed with converged equilibrium solutions (convergence criterion kψ i − ψ i−1 k∞ < 10−4 ) during the time interval chosen for performance analysis (as indicated by vertical lines in Fig. 3). A standard spatial resolution of (32, 64) grid points and 7 basis functions were employed. 14 (64, 128) a cycle time of 2 ms is possible with 4 iterations, although from the linear algorithmic complexity of the algorithm 18 , and the amount of data which is communicated between the processes one would expect the runtime to increase by a factor of four compared to (Nr , Nz ) = (32, 64). The reason is a higher parallel efficiency of the Poisson solver which is limited by OpenMP overhead at lower resolutions 18 as well as lower communication overhead due to larger message sizes in the expensive MPI Allreduce operation which collects the distributed P fields ψk (r, z) and computes the sum ψ = N k=1 ck ψk (see the rows labelled ”Poisson solver” and ”ψ sum” in Table II). tions would be somewhat faster in this case the resultant doubling of the effective runtime for the Poisson solver cannot be compensated for. Plasma-control parameters For the example of (Nr , Nz , N + 1) = (32, 64, 8) computed with 48 CPU cores, Figure 5 shows how the runtime of Tctl = 0.17 ms (cf. Table I) is composed and illustrates the benefits of exploiting task parallelism. Due to the final MPI Allreduce operation in the equilibrium construction algorithm, which comes at little extra effective runtime cost as compared to a single MPI Reduce, all MPI tasks hold a copy of the equilibrium flux distribution ψ(r, z). Hence, independent parts of the time-consuming computations for the plasma-control parameters like, e.g. evaluating the pressure distribution or determining the contours for the safety factor q, can be handled in parallel by different MPI tasks and only scalar quantities need to be communicated (within a few microseconds) between the MPI tasks at the end. If necessary, the remaining load-imbalance indicated by Figure 5, namely task 0 and task 3 becoming idle after about 0.1 ms, and tasks 4, . . . , 7 not computing anything at all at this stage, could be exploited for computing additional quantities and/or for further reducing the effective runtime. Without task-parallelization, on the contrary, the runtimes would add up to more than 0.4 ms despite the thorough OpenMP parallelization (e.g. across different contour levels) within the task. Equilibrium reconstruction Table II further shows that the runtime for the equilibrium iterations is dominated P by computing the distributed sum, ψ = N k=1 ck ψk , which is also an implicit synchronization point for all processes, and by the Poisson solver. Due to the use of high-order interpolation schemes (cf. Sect.II.A) a significant fraction of about 25% is spent on the evaluation of the right-hand sides of Eqs. (5,6) (”RHS update”) and of the response matrix B (”RM evaluation”). In general, the chosen products of number of MPI tasks times OpenMP threads per task turned out as the most efficient ones for this hardware platform with 24 cores per node: using more than 6 threads (or 8 threads in the case of (Nr , Nz ) = (64, 128)) results only in a modest speedup of the Poisson solver 18 but doubles the required number of cores and network resources. IV CONCLUSIONS Keeping those constant and reducing the number of MPI tasks instead by a factor of two would With the motivation of achieving subrequire each MPI task to handle two basis func- millisecond runtimes a new, parallel equilibriumtions. Although the collective MPI communica- reconstruction code, GPEC, was presented 15 resolution (Nr , Nz , N+1) cores (MPI tasks · threads/task) RHS update Poisson solver RM evaluation RM gather∗ lin. regression ψ sum∗∗ other total (32, 64, 8) (32, 64, 16) (64, 128, 8) (64, 128, 16) 48(8 · 6) 96(16 · 6) 48(8 · 6) 96(16 · 6) T [ms] 0.022 0.036 0.024 0.015 0.013 0.048 0.008 0.167 % 13.2 21.6 14.5 8.9 7.9 28.9 5.0 100.0 T [ms] 0.021 0.036 0.024 0.021 0.017 0.056 0.008 0.182 % 11.7 19.5 13.3 11.4 9.5 30.5 4.2 100.0 T [ms] 0.050 0.085 0.025 0.019 0.014 0.110 0.011 0.319 % 15.7 26.6 7.8 5.9 4.4 36.2 3.4 100.0 T [ms] 0.053 0.086 0.025 0.029 0.018 0.128 0.014 0.353 % 15.0 24.5 7.1 8.1 5.2 36.2 3.9 100.0 TABLE II. Runtime breakdown of a single Picard equilibrium-iteration step (average over 4 iteration steps times 1000 time points) for different combinations (subset of Table I) of numerical resolution and computational resources. The individual algorithmic steps from top to bottom correspond to the sequence in Sect. II.A. Routines labelled with asterisks are dominated by MPI communication (∗ MPI Allgather, ∗∗ MPI Allreduce). which is suitable for real-time applications in medium-sized tokamaks like ASDEX Upgrade (AUG). GPEC implements the classical concept of iteratively solving the Grad-Shafranov equation and feeding in diagnostic signals from the experiment 7,8 . Specifically, GPEC is implemented as a variant of the IDE code 19 , which is a descendant of CLISTE 8 . Compared with these well-established and validated offlineanalysis codes no algorithmic simplifications are necessary for achieving the desired cycle times of less than a millisecond, besides limiting the number of equilibrium iterations to four. In addition to real-time applications the new code enables fast and highly accurate offline analyses soon after the tokamak discharge: Here, tolerable runtimes are in the range of 0.1–1 s per cycle which allows computing fully converged equilibria employing highly resolved spatial and basis functions grids. a fast shared-memory-parallel Grad-Shafranov solver 18 together with the MPI-distributed solution of the individual Poisson-type problems and a thorough parallelization of the post-processing algorithms for computing the relevant plasmacontrol parameters from the equilibrium flux distribution. Using data from a typical AUG discharge the real-time capability of the new code was demonstrated by the offline computation of a sequence of 1000 time points within less than a second of runtime. The relative accuracy was ascertained by comparing the relevant plasma parameters with a converged run. By allowing four iterations for computing the equilibrium solution the majority of control parameters can be computed with an accuracy of a percent or better. The adopted two-level, hybrid parallelization scheme allow efficient utilization available compute resources (in terms of the numbers of The parallelization of the new code builds on nodes, of CPU sockets per node and of cores 16 Fig. 5. Runtime of the major groups (A-D) of computations for the plasma-control parameters (cf. Sect. II.B) and their assignment to four MPI tasks which execute in parallel. Within each task the individual parts of the algorithm (indicated by different colours) execute in the order from bottom to top. Accordingly, the dashed horizontal line marks the effective runtime in the application. The data corresponds to AUG shot #23221 computed with a resolution of (Nr , Nz , N +1) = (32, 64, 8) using in total 8 MPI tasks, each with 6 OpenMP threads (cf. Table I). per socket) for a given numerical resolution (in terms of the spatial grid and number of basis functions). Moreover, foreseeable advances in computer technology, in particular the increasing number of CPU cores per compute node, are expected to push the limits of real-time applications with GPEC towards even higher numerical accuracies (in terms of affordable resolution and number of equilibrium iterations). We note that the benchmarks figures reported in this work can be considered rather conservative as the computations were performed on a standard com- pute cluster which comprises hundreds of nodes. For energy-budget reasons such clusters are typically configured not with CPUs of the highest clock-frequency. In our case, for example, CPUs with 2.5 GHz and only 24 cores per node were available. For deployment in the control system of a tokamak experiment such as AUG, by contrast, we envision dedicated server hardware with higher clock frequencies and at least four CPU sockets, both of which is expected to further boost the computational performance of the real-time application. Thus it should be rather 17 straightforward to save enough time for the communication of the code with the control system, which, depending of the specifics of the system, requires another few hundred microseconds per cycle. Finally, it is worth mentioning that GPEC is based entirely on open-source software components, relies on established industry (FORTRAN, MPI, OpenMP) or de-facto software standards (BLAS, LAPACK, FFTW), runs on standard server hardware and software environments and hence can be released to the community and utilized without legal or commercial restrictions. ACKNOWLEDGEMENT We acknowledge stimulating discussions with K. Lackner and W. Treutterer. Thanks to P. Martin who has provided a subversion of the CLISTE code with which this study started and to S. Gori who has developed an initial FORTRAN 90version. This work has been carried out within the framework of the EUROfusion Consortium and has received funding from the Euratom research and training programme 2014-2018 under grant agreement No 633053. The views and opinions expressed herein do not necessarily reflect those of the European Commission. 18 REFERENCES [1] C. GORMEZANO, A. SIPS, T. LUCE, S. IDE, A. BECOULET, X. LITAUDON, A. ISAYAMA, J. HOBIRK, M. WADE, T. OIKAWA, R. PRATER, A. ZVONKOV, B. LLOYD, T. SUZUKI, E. BARBATO, P. BONOLI, C. PHILLIPS, V. VDOVIN, E. JOFFRIN, T. CASPER, J. FERRON, D. MAZON, D. MOREAU, R. BUNDY, C. KESSEL, A. FUKUYAMA, N. HAYASHI, F. IMBEAUX, M. MURAKAMI, A. POLEVOI, & H. S. JOHN. Chapter 6: Steady state operation. Nuclear Fusion, 47(6), S285 (2007). [2] Y. GRIBOV, D. HUMPHREYS, K. KAJIWARA, E. LAZARUS, J. LISTER, T. OZEKI, A. PORTONE, M. SHIMADA, A. SIPS, & J. WESLEY. Chapter 8: Plasma operation and control. Nuclear Fusion, 47(6), S385 (2007). [3] M. MARASCHEK, G. GANTENBEIN, T. P. GOODMAN, S. GÜNTER, D. F. HOWELL, F. LEUTERER, A. MÜCK, O. SAUTER, & H. ZOHM. Active control of MHD instabilities by ECCD in ASDEX upgrade. Nuclear Fusion, 45, 1369 (2005). [4] L. GIANNONE, M. REICH, M. MARASCHEK, C. RAPSON, W. TREUTTERER, L. BARRERA, E. POLI, A. BOCK, G. CONWAY, F. FISCHER, J. FUCHS, K. LACKNER, P. MCCARTHY, A. MLYNEK, 19 R. PREUSS, K.-H. SCHUHBECK, J. STOBER, M. RAMPP, R. MCDERMOTT, Q. RUAN, L. WENZEL, & ASDEX UPGRADE TEAM. A data acquisition system for real-time magnetic equilibrium reconstruction on ASDEX Upgrade and its application to NTM stabilization experiments. Fusion Engineering and Design, 88, 3299 (2013). [5] V. D. SHAFRANOV. About MHD equilibrium configurations. Zh. Eksp. Teor. Fiz., 33, 710 (1957). [6] R. LÜST & A. SCHLÜTER. Axisymmetrische magnetohydrodynamische Gleichgewichtskonfigurationen. Z. Naturforsch., 129, 850 (1957). [7] L. L. LAO, J. R. FERRON, R. J. GROEBNER, W. HOWL, H. ST. JOHN, E. J. STRAIT, & T. S. TAYLOR. Equilibrium analysis of current profiles in tokamaks. Nuclear Fusion, 30, 1035 (1990). [8] P. J. MCCARTHY, P. MARTIN, & W. SCHNEIDER. The CLISTE interpretive equilibrium code. Tech. Rep. IPP 5/85, Max-Planck-Institut für Plasmaphysik (1999). [9] L. LAO, H. S. JOHN, R. STAMBAUGH, A. KELLMAN, & W. PFEIFFER. Reconstruction of current profile parameters and plasma shapes in tokamaks. Nuclear Fusion, [14] A. BARP, M. CERNA, S. CONCEZZI, 25(11), 1611 (1985). L. GIANNONE, G. MORROW, Q. RUAN, A. VEERAMANI, & L. WENZEL. A [10] J. BLUM, C. BOULBE, & B. FAUGERAS. real-time Grad-Shafranov PDE solver and Reconstruction of the equilibrium of the MIMO controller. Fusion Engineering and plasma in a tokamak and identification of Design, 87(12), 2112 (2012). Proceedings the current density profile in real time. of the 8th IAEA Technical Meeting on ConJournal of Computational Physics, 231(3), trol, Data Acquisition, and Remote Partic960 (2012). ipation for Fusion Research. [11] B. BRAAMS, W. JILGE, & K. LACKNER. [15] J.-M. MORET, B. DUVAL, H. LE, Fast determination of plasma parameters S. CODA, F. FELICI, & H. REIMERDES. through function parametrization. Nuclear Tokamak equilibrium reconstruction code Fusion, 26(6), 699 (1986). LIUQE and its real time implementation. Fusion Engineering and Design, 91, 1 [12] L. GIANNONE, M. CERNA, R. COLE, (2015). M. FITZEK, A. KALLENBACH, K. LDDECKE, P. MCCARTHY, A. SCARA- [16] J. FERRON, M. WALKER, L. LAO, H. S. BOSIO, W. SCHNEIDER, A. SIPS, JOHN, D. HUMPHREYS, & J. LEUER. W. TREUTTERER, A. VRANCIC, Real time equilibrium reconstruction for L. WENZEL, H. YI, K. BEHLER, tokamak discharge control. Nuclear Fusion, T. EICH, H. EIXENBERGER, J. FUCHS, 38, 1055 (1998). G. HAAS, G. LEXA, M. MARQUARDT, A. MLYNEK, G. NEU, G. RAUPP, M. RE- [17] I. YONEKAWA, A. V. FERNANDEZ, J.ICH, J. SACHTLEBEN, K. SCHUHBECK, M. FOURNERON, J.-Y. JOURNEAUX, T. ZEHETBAUER, S. CONCEZZI, T. DEW.-D. KLOTZ, A. WALLANDER, & COBELLE, B. MARKER, M. MUNROE, DAC TEAM. ITER instrumentation and N. PETERSEN, & D. SCHMIDT. Data control system towards long pulse operaacquisition and real-time signal processing tion. Plasma Fusion Research, 7, 2505047 of plasma diagnostics on ASDEX upgrade (2012). using labview RT. Fusion Engineering and Design, 85(34), 303 (2010). Proceedings [18] M. RAMPP, R. PREUSS, R. FISCHER, K. HALLATSCHEK, & L. GIANNONE. A of the 7th IAEA Technical Meeting on parallel Grad-Shafranov solver for real-time Control, Data Acquisition, and Remote control of tokamak plasmas. Fusion Science Participation for Fusion Research. and Technology, 62(3), 409 (2012). [13] X. N. YUE, B. J. XIAO, Z. P. LUO, & Y. GUO. Fast equilibrium reconstruction [19] R. FISCHER, J. HOBIRK, L. B. ORTE, A. BOCK, A. BURCKHART, I. CLASSEN, for tokamak discharge control based on M. DUNNE, J. FUCHS, L. GIANGPU. Plasma Physics and Controlled FuNONE, K. LACKNER, P. MCCARTHY, sion, 55(8), 085016 (2013). 20 R. PREUSS, M. RAMPP, S. RATHGEBER, M. REICH, B. SIEGLIN, W. SUTTROP, E. WOLFRUM, & ASDEX UPGRADE TEAM. Magnetic equilibrium reconstruction using geometric information from temperature measurements at asdex upgrade. In V. NAULIN, C. ANGIONI, M. BORGHESI, S. RATYNSKAIA, S. POEDTS, & T. DONN (eds.), 40th EPS Conference on Plasma Physics, vol. 37D of Europhysics conference abstracts, page P2.139. European Physical Society, Geneva (2013). [25] R. PREUSS, R. FISCHER, M. RAMPP, K. HALLATSCHEK, U. VON TOUSSAINT, L. GIANNONE, & P. MCCARTHY. Parallel equilibrium algorithm for real-time control of tokamak plasmas. Tech. Rep. IPP R/47, Max-Planck-Institut für Plasmaphysik (2012). [26] http://www.mpi-forum.org/. [27] W. M. STACEY. Fusion Plasma Physics. Wiley, 2 edn. (2012). [28] http://www.openblas.net. [20] P. J. MCCARTHY & ASDEX UPGRADE [29] BLAST FORUM. Basic linear algebra subprograms technical forum standard. InTEAM. Identification of edge-localized moternational Journal of High Performance ments of the current density profile in a Applications and Supercomputing, 16(1) tokamak equilibrium from external mag(2002). netic measurements. Plasma Physics and Controlled Fusion, 54(1), 015010 (2012). [30] http://www.netlib.org. [21] A. E. HOERL & R. W. KENNARD. [31] E. ANDERSON, Z. BAI, C. BISCHOF, Ridge regression: Biased estimation for S. BLACKFORD, J. DEMMEL, J. DONnonorthogonal problems. Technometrics, GARRA, J. DU CROZ, A. GREENBAUM, 12(1), 55 (1970). S. HAMMARLING, A. MCKENNEY, & D. SORENSEN. LAPACK Users’ Guide. [22] W. H. PRESS, S. A. TEUKOLSKY, W. T. Society for Industrial and Applied MatheVETTERLING, & B. P. FLANNERY. Numatics, Philadelphia, PA, third edn. (1999). merical Recipes: The Art of Scientific ComISBN 0-89871-447-8 (paperback). puting. Cambridge University Press, 3rd edn. (2007). [32] M. FRIGO & S. G. JOHNSON. The design [23] K. V. HAGENOW & K. LACKNER. Computation of axisymmetric MHD equilibria. In Proc. 7th Conf. on the Numerical Simulation of Plasmas, page 140. New York, US (1975). [33] and implementation of FFTW3. Proceedings of the IEEE, 93(2), 216 (2005). Special issue on “Program Generation, Optimization, and Platform Adaptation”. https://gcc.gnu.org/. [24] K. LACKNER. Computation of ideal MHD [34] http://www.open-mpi.de/. equilibria. Comp. Phys. Comm., 12, 33 [35] http://mvapich.cse.ohio-state.edu/. (1976). 21
5cs.CE
arXiv:1612.06749v1 [cs.DC] 20 Dec 2016 GuStL – An Experimental Guarded States Language Oskar Schirmer Göttingen, 2016-12-20 Abstract Programming a parallel computing system that consists of several thousands or even up to a million message passing processing units may ask for a language that supports waiting for and sending messages over hardware channels. As programs are looked upon as state machines, the language provides syntax to implement a main event driven loop. The language presented herewith surely will not serve as a generic programming language for any arbitrary task. Its main purpose is to allow for a prototypical implementation of a dynamic software system as a proof of concept. 1 Contents 1 Introduction 3 2 Syntax 3 3 Semantics 5 4 Process Creation 8 5 Segmented Program Development 9 6 Compiler 10 7 Discussion 10 2 1 Introduction The Guarded States Language essentially does combine well known concepts of existing languages, while any concept not needed for its main purpose is avoided. Its basic concept is imperative sequential operations. Syntactically it is inspired by Algol ([1963nb]) and Pascal ([1975jw]). Main program execution is organized as a state machine as with SDL ([2007ir]). States are subject to guards, similar to those introduced in [1975ed]. For channel operations, input and output, the notation follows [1978ch]. A software system may consist of various processes running in parallel, each of which is a program executed sequentially, one instruction at a time. Channels may be set up dynamically to allow transmission of data, i.e. messages, from one process to the other. Depending on the current process state, different guards may be evaluated, causing some statement sequence to be executed as soon as the condition of the corresponding guard is met. Statements serve to implement traditional imperative operations, such as assigments, loops, conditional execution and subroutine invocation. The language does only provide features restricted to the processing unit the program is executed on. As a consequence, and as dynamic process creation does imply activity of various system processes – especially in the case of creating a remote process –, the language does not provide syntactic means to describe instantiation of a new process. 2 Syntax A program is made up of a sequence of symbols. A symbol may be one of: special symbol, reserved word, identifier, number, or string. Symbols may be separated by white space, i.e. blank, tabulator, or newline characters. Any character sequence starting with a left brace up to and including the next right brace is considered white space, too, as long as it does not start within a string. The latter allows insertion of comments. Note, that nested comments are not valid. For the special symbols and reserved words, see the formal syntax definition below. Reserved words are to be written in lower case. An identifier is composed of a sequence of upper and lower case letters, digits, and the underline character. It must not start with a digit. Identifiers are case sensitive. Numbers are given in either decimal, hexadecimal, or character notation. For decimal notation a number is written as a sequence of digits, for hexadec3 imal notation, it is preceded by 0x. A number given in character notation is the characters implicit textual representation1 enclosed by single quotes. Scientific notation is not supported. A string is a series of characters – i.e. their implicit textual representations – enclosed by double quotes. To include a double quote in a string, it is duplicated. A string is encoded as an array at one word per character. A valid sentence for a program must match the following partially formalised syntax description.2 process ::= { constdef | wordsdecl | proceduredecl | f unctiondecl } “process” ident!process “(” ident!port [ “,” ident!const ] “)” [ statesdecl ] [ portsdecl ] { constdef | wordsdecl | proceduredecl | f unctiondecl } “start” { statement } { guardedstate } “stop” statesdecl ::= “state” ident!state { “,” ident!state } portsdecl ::= “port” ident!port { “,” ident!port } constdef ::= “const” ( ident!const “=” expression | ident!constarray “[” [ expression ] “]” “=” constarray { “,” constarray } ) constarray ::= expression | “"” chars “"” wordsdecl ::= “word” worddecl { “,” worddecl } worddecl ::= ident!word | ident!array “[” expression “]” proceduredecl ::= “procedure” ident!procedure “(” f ormalparameters “)” { wordsdecl } “do” { statement } “return” f unctiondecl ::= “function” ident!f unction “(” f ormalparameters “)” { wordsdecl } “do” { statement } “return” expression f ormalparameters ::= [ f ormalparameter { “,” f ormalparameter } ] f ormalparameter ::= “const” ident!constarray “[” [ expression ] “]” | ident!array “[” [ expression ] “]” | ident!word | “port” ident!port guardedstate ::= “on” statelist [ “\” guard ] “:” { statement } statelist ::= ident?state { “,” ident?state } guard ::= ident?port “!” | reception | expiration statement ::= conditional | repetition | transition | assignment | transmission | procedurecall | inlineasm 1 It is assumed that the usual implicit textual representation for characters is its Unicode code point as defined in [2009uc] 2 For reasons of simplicity, it is given in a somewhat modified version of the notation inspired by Pān.ini ([1840ob]) and initially used by Backus ([1959jb]). To achieve a fully formalised definition, including semantics, one would need to describe the language by using, e.g., an extended affix grammar ([1997dw]). The scope of identifiers is hinted with a subscript !scope , where identifiers are declared, and with a subscript ?scope , where they are assumed to be already declared in the scope given 4 conditional ::= “if” expression “then” { statement } { “elseif” expression “then” { statement } } [ “else” { statement } ] “done” repetition ::= [ “while” expression ] “repeat” expression “times” { statement } ( “done” | “until” expression ) transition ::= “next” ident?state assignment ::= variable “:=” ( expression | inlineasm ) transmission ::= ident?port “!” ( expression | “end” | “pause” ) reception ::= ident?port “?” ( variable | “end” ) variable ::= ident?word | ident?array “[” expression “]” | ident?port expression ::= simpleexpr [ ( “=” | “<>” | ( “<” | “>” | “<=” | “>=” ) [ “$” ] ) simpleexpr ] simpleexpr ::= term { ( “+” | “-” | “|” | “^” | “or” ) term } term ::= f actor { ( “*” | “&” | “and” | “<<” | ( “/” | “%” | “>>” ) [ “$” ] ) f actor } f actor ::= [ unaryop ] ( variable | constant | f unctioncall | “now” | reception | “(” expression “)” ) unaryop ::= “-” | “~” | “not” constant ::= number | “’” char “’” | “#” ( ident?array | ident?constarray ) | ident?const | ident?constarray “[” expression “]” procedurecall ::= ident?procedure “(” actualparameters “)” f unctioncall ::= ident?f unction “(” actualparameters “)” actualparameters ::= [ actualparameter { “,” actualparameter } ] actualparameter ::= expression | ( ident?array | ident?constarray ) [ “[” expression “]” ] expiration ::= “after” expression inlineasm ::= “asm” singleasm { “,” singleasm } singleasm ::= [ unaryop ] constant | “(” expression “)” 3 Semantics The process is a state machine, based upon an arbitrary number of states. As a special case, the number of states may be zero. In any other case, all state identifiers must be declared next to the process header. To allow external communication, a process may want to transmit or receive data over channels. To set up a channel at runtime, it must be dynamically assigned to a port, which in turn is static. Any port is referred to by an identifier declared before being used. Constant identifiers may be declared to stand for constant words or con5 stant arrays. The value of a constant array is given as a list of numbers, where all or parts of the list may be replaced by a string. The basic unit of data to operate on is a word. It represents a natural or integer number, which depends on which operation is performed on it. Different basic types to restrict specific operations or to determine details of an operation – like signedness – do not exist.3 A variables identifier may either be declared to refer to a single word, or, when declared as an array, to refer to a sequence of words. Variables must be declared prior to being used. Subroutines – both functions and procedures – may be declared to implement sequences of statements for multiple use in the program. Upon termination, functions provide a word return value to be used in the invocating expression, while procedures do not return any value. Subroutines may be declared to take a list of parameters, which may be words or arrays or ports. Furthermore, subroutines allow declaring local single word variables, which are instantiated at subroutine invocation and cease at the end of the subroutines execution. Subroutines must be declared prior to being used. Statements in the program or in a subroutine are executed sequentially, one by one. For a conditional statement, a series of expressions is evaluated, until one is met – i.e. the expression evaluates to non-zero – and the corresponding list of statements is executed. If no condition is met and an alternative branch is given with else, that alternative branches statements are executed. A repetition statement is executed for a maximum number of iterations. Furthermore, it is not iterated or not executed at all, when the initial condition is not met, and it is no longer iterated when the terminating condition is met. The right side of an assignment is evaluated and the result is assigned to the word or port on the left side. A value assigned to a port takes it for a destination port number and prepares a channel to be set up from the local to the destination port. For channel data transmission, the port to communicate over is given on the left side of the statement. The data to transmit is given on the right side, this may either be an arbitrary value, or a special token to end or pause a message. Channel data reception is not a statement, but a factor in an expression. As with transmission, the port to receive data from is given on the left side, while on the right side is either a variable to store data into or the end symbol. Both variants consume an incoming end token when it is available, 3 Various programming languages define signedness as a property of each single data unit. This way, wherever data units of different type are subject to an operation, implicit conversion rules need to be applied, an everlasting source of confusion. To avoid this mess, GuStL makes signedness be a property of the operation itself. 6 but if data is pending, it is only consumed in the first case and stored into the variable. Same as with the assignment, storing the newly received word to a port sets the ports destination. The factor evaluates to non-zero whenever the expected token is received, which is data for the first variant and an end token for the second. Otherwise, it evaluates to zero. Calling a subroutine implies evaluation of the list of actual parameters, which must match the list of formal parameters given in the subroutines declaration. For formal word parameters, the corresponding expression is evaluated and its result used in the subroutine (call by value). For formal array parameters, the reference to the corresponding variable is determined and used in the subroutine (call by reference). For formal port parameters, the given port identification is used in the subroutine (call by reference). For a subroutine with more than one parameter the order of parameter evaluation is not defined. The transition statement is used to change the machines state. It must not be used in a subroutine. Additionally, every execution path in the main program must end in a transition statement. The main program starts with a list of statements for initialisation purposes, and ends with a list of statements to handle proper process termination. In between, an arbitrary number of guarded statements is provided. Whenever the initialising list of statements or another guarded statement of the program has finished executing the next guarded statement may be selected for execution. Only those guarded statements, that match the current state, are considered. From these, one random guarded statement is selected, for which the condition of its guard is met. When no condition of any guard is met at all, the process is stalled until at least one condition is met. A guard does either check a port for transmission readiness, for availability of data to receive, for an end token received on a port, or for a given time being expired. When data is available and the corresponding guarded statement is selected for execution, the data received is actually stored into the variable given. If for a state a guard is declared to check for availability of input data, another guard to check for an end token on the same port is obligatory for the same state. For one state several different guards may be declared, provided they do not check for the same condition on the same port, and that no two guards check for expiration. By default, when evaluating an expression, all operations are performed as unsigned. For various operators, however, appending a $ sign to the operator itself may be used to ask for signed operation. Signed division is defined to be Euclidean (see e.g. [2001dl]). Any expression is composed from one or two simple expressions, simple expressions are composed from terms, terms are composed from factors. A factor may be a single word or a word from 7 an array, a constant number or an element from a constant array, the size of an array, the call of a function – using its return value, the current time (now), the result of checking an input port for having received an end token, or another expression. Any factor may be prepended by a unary operator. The order in which parts of an expression are evaluated is not defined. To allow machine specific operations, inline assembly is allowed both as a statement and as the right side of an assignment. Inline assembly is given as a list of opcodes, but may include also ordinary expressions to be evaluated. Opcodes depend on the implementation, see section 6. An expression included in inline assembly will leave the corresponding result on the data stack. 4 Process Creation For traditional single node computers according to the von-Neumann architecture ([1945jn]), the basic resource to be allocated by processes at runtime is memory, taken from a uniform pool of contiguous memory words. For machines made up of large amounts of parallel processing units, each with its own local memory, the allocatable quantity is a single processing unit. Thus, allocating resource does no longer mean to reserve a portion of memory, but to start a process on a previously idle processing unit: process creation. The program to run on the allocated processing unit has to be identified, e.g. by name, which in turn may be variable, and does not refer to data held inside the current program, so for the language to natively support process creation a hypothetical rule could look like the following – where the identifier would refer to a string denoting the new processes name: creation ::= “new” ident?array “(” expression “)” However, depending on the hardware, starting a process may highly depend on supportive software, i.e. the operating system. The compiler would need to produce operating system dependent code for process creation. To avoid complexity and increase flexibility, means for process creation shall instead be provided by the operating system as an ordinary subroutine. An outline on how it could be declared is given hereafter. Once the new process is being executed, the process that started it may need to communicate with it. To do so, it needs to know at least one port of the new process to attach to, the control port. The subroutine for process creation will return its global identification, so it must be a function. For the new process, the port is declared as the first parameter to the process 8 declaration header. As the processing unit and its local memory are – once allocated – an indivisible unit, the amount of memory available during lifetime of the process cannot be changed. Only at the time of creation of the process, the amount of memory given to it may be chosen. For this purpose, the subroutine to create the new process not only needs to know its name, but also a number, which will be available inside the new process as a constant, the dimension. To make it usable in a running program, it is declared to be a constant as the second parameter to the process header. It is optional and defaults to zero. Hardware driver processes may need to access specific hardware locations, so it is crucial to start such a process on a given processing unit. For other reasons, it may be desirable to choose the processing unit from a restricted subset of all units available, so some flags might possibly be helpful. An additional parameter to the function starting the process is used to commit the information needed. The function may be declared as follows: function new(name[], dimension, extra) 5 Segmented Program Development When writing a new program, parts of it may be similar or even identical to portions of a previously implemented program. The wish to reuse these portions and avoid repeated work should represent one of the basic desires of every programmer. The most simple solution would be to simply copy and paste the portion in question to the new program. While in earlier days this was frowned upon for the reason of wasting storage, today the untraceable propagation of programming mistakes is a major concern. Separate compilation units had the advantage to circumvent the need to recompile all of the code used in a program by keeping the program divided into portions even in its compiled state. This was useful in times of slow compiling machines, but bears the risk of binary incompatibilities when interfaces are changed in source files. Further, an additional linker program or a linking loader is needed to enable program execution. Assembly of the program at compile time may be achieved using include files, a method to splice a set of source files.4 But it may also lead to confusion of which include file is used where, especially when using nested inclusions. 4 Using C ([1978kr]) usually involves a combination of both linkable program portions, called libraries, and include files for interface declaration 9 To avoid the latter problem, source file composition shall be restricted to simple concatenation. In fact, neither the language nor the compiler need to take any provisions for it, as the concatenation may well be performed by the invoking entity before feeding the complete source program into the compiler itself. The fact that insertion of one source file into another is impossible makes it necessary to allow declarations before the process declaration of a program, as generic declarations need to be prepended to the main program. 6 Compiler A first compiler for GuStL has been implemented to produce code for the experimental machine NOP ([2016os]). The compiler itself is implemented in C, running in a Unix environment. Its single pass design follows the basic concept of [1977nw]. It compiles source from standard input to binary code on standard output. Matching the target machine, words are implemented as 32 bit wide, least significant byte first, and signed numbers are represented in two’s complement. The implicit textual representation for characters is its Unicode code point as defined in [2009uc], encoded using UTF-8 in the source file (see also [2003fy]). The binary code itself is preceded by a six word header to allow direct use in an operating system environment: magic flags d1 d0 code entry 7 0x85cf80cf 0 data memory size: ld1 -ld0 = d1 · dimension + d0 , for dimension see page 9, see also [2016os] code and constants memory size: lc1 -lc0 , see [2016os] word offset to initial instruction, relative to lc0 , see [2016os] Discussion The main purpose of the programming language GuStL is to allow for a prototypical implementation of a dynamic software system, and its design is restricted to features that are needed to serve this purpose. There is only very limited support for string handling, namely definition of constant arrays. It might be useful to provide more support for string handling, e.g. transmission and reception of sequences instead of a single word. However, the latter might reduce program flow determinism, because time behavior for the processing of a sequence potentially is more complex 10 than for a single word, scattering non-determinism from controlling guards into imperative program flow. Direct recursion in a subroutine is supported, but recursion involving several subroutines is not, as there is no forward declaration. With local memory being quite limited, it is arguable whether system abstraction is adequate to justify support of massive recursion. Likewise, there is no specific support for floating point calculations, list processing, bit field computation or set arithmetics5 , data pointers or complex data structures. Where this is perceived as a deficiency, it might be worth considering the choice or design of a different language that better fits the particular project context. Execution of code in parallel may be handled on different levels of a system. GuStL is designed to implement a dynamic software system, and thus it provides parallel execution on process level, where every process start requires to dynamically determine a free resource, the loading of code, and setup of control communication. For static software systems, e.g. embedded control, things are different in that all parts of the software needed at runtime are known prior to system start, i.e. at compile time. Consequently, dynamically loading code is not necessary and even communication layout between processes may be arranged at compile time. There are examples that allow much more efficient instantiation of parallelity in a static software system (e.g. [2010hh]), but the question of how to apply these techniques to a dynamic software system remains open. Directly addressing memory is not needed even in the context of an operating system, as the intended target architecture provides peripheral access through dedicated operations instead of memory mapped control registers, see [2016os]. Literature [1840ob] Otto Böhtlingk (Ed.): “Pān.ini’s Grammatik”, Bonn 1840, Delhi 2001, ISBN 81-208-1025-2 [1945jn] John von Neumann: “First Draft of a Report on the EDVAC”, Moore School of Electrical Engineering, University of Pennsylvania, June 30, 1945 [1959jb] J. W. Backus: “The syntax and semantics of the proposed international algebraic language of the Zürich ACM-GAMM conference”, Proc. Internat. Conf. Inf. Proc., UNESCO, Paris, June 1959 5 as defined for Pascal 11 [1963nb] J. W. Backus, F. L. Bauer, J. Green, C. Katz, J. McCarthy, A. J. Perlis, H. Rutishauser, K. Samelson, B. Vauquois, J. H. Wegstein, A. van Wijngaarden, M. Woodger, P. Naur (Ed.): “Revised Report on the algorithmic language ALGOL 60”, Numerische Mathematik 4, p. 420-453 (1963) [1975ed] Edsger W. Dijkstra: “Guarded commands, nondeterminacy, and formal derivation of programs”, Comm. ACM 18, 8 (Aug. 1975), p. 453457, EWD472 [1975jw] Kathleen Jensen, Niklaus Wirth: “Pascal: user manual and report”, Springer-Verlag, 1975 [1977nw] Niklaus Wirth: “Compilerbau”, Teubner, Stuttgart, ISBN 3-51902338-5, 1977 [1978ch] C. A. R. Hoare: “Communicating sequential processes”, The Queen’s University, Belfast, Northern Ireland Commun. ACM 21, 8 (Aug. 1978), p. 666-677 [1978kr] Brian W. Kernighan, Dennis M. Ritchie: “The C Programming Language (1st ed.)”, February 1978, Englewood Cliffs, NJ: Prentice Hall, ISBN 0-13-110163-3 [1997dw] Jochen Demuth, Stephan Weber, Sönke Kannapinn, Mario Kröplin: “Echte Compilergenerierung – Effiziente Implementierung einer abgeschlossenen Theorie”, Forschungsbericht des Fachbereichs Informatik 1997/6, Technische Universität Berlin [2001dl] Daan Leijen: “Division and Modulus for Computer Scientists”, University of Utrecht, Dept. of Computer Science, December 3, 2001 [2003fy] F. Yergeau: “Request for Comments: 3629”, Network Working Group, Alis Technologies, November 2003 [2007ir] ITU-T Recommendation Z.100: “Specification and Description Language (SDL)”, International Telecommunication Union, 11/2007 [2009uc] The Unicode Consortium: “The Unicode Standard, Version 5.2.0”, Mountain View, CA, 2009, ISBN 978-1-936213-00-9 [2010hh] James Hanlon, Simon J. Hollis: “Dynamic generation of parallel computations”, Department of Computer Science, University of Bristol, UK, in proc. UK Electronics Forum 2010, (pp. 7-17), 2010 [2016os] Oskar Schirmer: “NOP – A Simple Experimental Processor for Parallel Deployment”, Göttingen, 2016 12
6cs.PL
Mining a Sub-Matrix of Maximal Sum Vincent Branders, Pierre Schaus, and Pierre Dupont arXiv:1709.08461v1 [stat.ML] 25 Sep 2017 Université catholique de Louvain - ICTEAM/INGI - Machine Learning Group Place Sainte Barbe 2, 1348 Louvain-la-Neuve - Belgium [email protected] Abstract. Biclustering techniques have been widely used to identify homogeneous subgroups within large data matrices, such as subsets of genes similarly expressed across subsets of patients. Mining a max-sum sub-matrix is a related but distinct problem for which one looks for a (non-necessarily contiguous) rectangular sub-matrix with a maximal sum of its entries. Le Van et al. [6] already illustrated its applicability to gene expression analysis and addressed it with a constraint programming (CP) approach combined with large neighborhood search (CP-LNS). In this work, we exhibit some key properties of this N P-hard problem and define a bounding function such that larger problems can be solved in reasonable time. Two different algorithms are proposed in order to exploit the highlighted characteristics of the problem: a CP approach with a global constraint (CPGC) and mixed integer linear programming (MILP). Practical experiments conducted both on synthetic and real gene expression data exhibit the characteristics of these approaches and their relative benefits over the original CP-LNS method. Overall, the CPGC approach tends to be the fastest to produce a good solution. Yet, the MILP formulation is arguably the easiest to formulate and can also be competitive. 1 Introduction Gene expression data is typically represented as a large matrix of gene expression levels across various samples. The study of such data is a valuable tool to improve the understanding of the underlying biological processes. For example, biomarker discovery aims at finding indicators of a disease or the physiological state of patients. This problem can be addressed with clustering techniques which perform a grouping of one dimension, either the rows or the columns of the original matrix. Yet it is known that breast cancer, for example, exhibits distinct subtypes [11,12]. In other words, specific genes exhibit activation patterns only in a specific group of patients. Biclustering techniques, or co-clustering, identify specific subsets of rows and of columns which jointly form homogeneous entries [8]. In the present work, we focus on a related but different mining task. One looks in particular for subsets of rows and of columns with globally high values. In the context of gene expression analysis, the objective is to find a subset of genes which are relatively highly expressed among a subset of patients, even though some entries might depart from this pattern. Formally, one looks for a Presented at NFMCP 2017, The 6th International Workshop on New Frontiers in Mining Complex Patterns, Skopje, Macedonia, Sep 22, 2017. rectangular, and non necessarily contiguous, sub-matrix of a large matrix with a maximal sum of the selected entries. This max-sum sub-matrix problem is closely related to the maximal ranked tile mining problem studied by Le Van et al. [6]. In the later case, prior to the search of a sub-matrix, each matrix entry is replaced by its rank across its particular row. In other words, the maximal ranked tile mining is equivalent to the max-sum sub-matrix for which the matrix entries are discrete ranks along the rows. Since the combinatorial optimization algorithms to solve such problems are actually not specific to discrete entries we address here the slightly more general setting of continuous entries. Our main contributions are 1) the study of the max-sum sub-matrix problem while exhibiting some of its key properties and the definition of an upper bound easy to compute in order to speed up the search for a solution; 2) the implementation of two additional algorithms making use of these properties : a CP approach with a global constraint (CPGC) and mixed integer linear programming (MILP); 3) practical experiments conducted both on synthetic and real gene expression data showing that the original CP-LNS method can be largely outperformed; 4) the study of the relative benefits of the proposed methods across various problem instances. 2 Problem 2.1 Statement Definition 1 (The Max-Sum Sub-Matrix Problem). Given a matrix M ∈ IRm×n consisting of m rows and n columns, let R = {1, . . . , m} and C = {1, . . . , n} be index sets for rows and for columns respectively, find the max-sum sub-matrix (I ∗ , J ∗ ) , with I ∗ ⊆ R and J ∗ ⊆ C, such that: (I ∗ , J ∗ ) = argmax f (I, J) = argmax I⊆R,J⊆C I⊆R,J⊆C X i∈I,j∈J Mi,j . (1) The objective function f (I, J) is the sum of the entries of a sub-matrix (I, J). The maximization term rewards, respectively penalizes, matrix entries with positive, respectively negative, values. The problem is interesting only for matrices with positive and negative entries. Otherwise the optimal solution is trivially identified. The max-sum sub-matrix problem is N P-hard from a simple reduction1 of the Maximum edge Weight Biclique Problem (MWBP) [3]. 1 Essentially by considering the rows and columns of the matrix as the two sets of nodes of a bipartite graph. 2.2 Properties For a defined P subset of columns J, the objective function can be formulated as f (I, J) = i∈I ri with ri being the contribution of the row i: X ri = Mi,j . (2) j∈J This is important as the search can be limited to one dimension through independent computation of the contributions along the other dimension. Indeed, for any of the two dimensions being fixed, optimization along the other dimension is trivial since it amounts to select only the subset of entries whose contribution is positive. For a fixed subset of columns J ⊆ C, the subset of rows IJ∗ ⊆ R that maximizes the objective value is greedily identified as: X IJ∗ = argmax Mi,j = {i ∈ R | ri ≥ 0} . (3) I⊆R i∈I,j∈J In the gene expression analysis context with order(s) of magnitude more rows (the genes) than columns (the samples), one typically search for a subset of columns and greedily select the associated optimal subset of rows. The search space of the max-sum sub-matrix problem contains 2|R| × 2|C| feasible solutions that are rectangular sub-matrices (I, J) of the original matrix, (I ⊆ R, J ⊆ C). Thanks to the independent contribution along one dimension, the number of feasible solutions to be explicitly evaluated is thus reduced to 2|C| × |R|. 2.3 Related Work Biclustering techniques address the problem of finding sub-matrices that satisfy some definition of homogeneity since entries grouped together into biclusters typically have similar values. A comprehensive review can be found in [8]. There is no assumption of homogeneity in the max-sum sub-matrix problem but rather one looks for a rectangular sub-matrix with an overall maximal sum. The maximum (contiguous) subarray problem introduced in [2] identifies a subarray of maximal sum from an array. For a one-dimensional array, this problem can be solved in linear time by Kadane’s algorithm [2]. Cubic and sub-cubic time complexity algorithms have been proposed in the two-dimensional case [2,14,15]. This problem is however simpler than the max-sum sub-matrix since the selected sub-matrix is constrained to be formed of contiguous rows and contiguous columns from the original matrix. The maximum ranked tile mining problem has been introduced in [6]. As discussed in Sect. 1, this is a special case of the max-sum sub-matrix problem for which the matrix entries are discrete ranks, corresponding to a permutation of column indices on each row. Both problems are examples of subgroup discovery which aims at finding subsets of a dataset that show an interesting behavior with respect to a certain property of interest [1]. 3 3.1 Optimization Approaches Boolean Decision Vectors The max-sum sub-matrix problem can be modeled with two vectors of boolean decision variables: T = (T1 , . . . , Tm ) for the rows and U = (U1 , . . . , Un ) for the columns with Ti ∈ {0, 1} and Uj ∈ {0, 1}. A sub-matrix (I, J) is defined by I = {i ∈ R | Ti = 1} and J = {j ∈ C | Uj = 1}. The problem consists in assigning a value to each variable of T and U . Let us denote by U 1 = {j ∈ C | Uj = 1} the selected columns, U 0 = {j ∈ C | Uj = 0} the unselected ones and by U ? = {j ∈ C | Uj = {0, 1}} the undecided ones. 3.2 Constraint Programming Constraint Programming (CP) is a flexible programing paradigm that is capable of solving optimization problems. As a declarative approach, it only requires to model the problem and, by using existing solvers, let it search and find solutions. A model is defined as a constraint satisfaction problem CSP = (V, D, C) where V is the set of variables, D is their respective domains, and C is a set of constraints defined over the variables. A feasible solution is an assignment of the variables to values of their domains such that all constraints are satisfied. Constraints are exploited to iteratively reduce the domains of variables. Such constraint propagation reduces the number of variable assignments to consider. Once all unfeasible values are removed from the domains of variables, the fixpoint of the propagation is reached. Then the solver selects a variable X ∈ V that is unbound and recursively calls the solver while assigning a value to this variable. Through exploration of a depth-first-search tree (DFS), the solver either reaches a solution or backtrack when the domain of variables becomes empty. Efficient backtracking is achieved through trailing, which is a state management strategy that facilitates the restoration of the computation state to an earlier version, effectively undoing changes that were imposed since then. Knuth [5] attributes to Floyd [4] the first formulation of this mechanism and its usage in a backtracking algorithm. The trail exposes two methods: pushState and popState to respectively time-stamp the current state and restore it. Its implementation is captured in terms of two simple stacks. The first stack holds entries to undo, the second one holds the frame sizes stacked between two consecutive call to pushState. Trailing enables the design of reversible objects defined on the trail. CP-LNS. The max-sum sub-matrix problem can be modeled as: X maximize Ti × ri , ∀i ∈ R : Ti = 1 ⇔ ri ≥ 0 . (4) i∈R The objectiveP is to maximize the sum of rows contributions which are formalized as ri = j∈C Uj × Mi,j . Each row with positive (respectively negative) contribution is constrained to be selected (respectively unselected). This provide strong filtering during the search. A speed up of the search, in the form of a large neighborhood search (LNS), has also been proposed by Le Van et al. [6]. Through modification of the assignment of a large number of variables, LNS avoids being stuck in a region of the search tree by restarting the exploration in other regions. This comes at the cost of losing the possibility to prove optimality. In the present problem, half of the column variables are uniformly selected for the search while leaving the others unchanged. CP Global Constraint. We propose to improve the model by Le Van et al. [6] by designing an efficient algorithm encapsulated inside a global constraint that captures the whole problem. The pseudo-code is given in Algorithm 1. The call to the bounding and filtering procedure has been made explicit. In practice, the lines 11 to 14 would be encapsulated in the global constraint triggered by the fix-point algorithm. The key ingredients of our approach are: – A feasible solution at each node of the search tree (evaluate()). – An efficient bounding procedure (upperBound()). – An efficient procedure to filter the domains (filter()). Feasible solution at each node of the search tree. CP usually updates its feasible solution and best so far lower bound in the leaf-node of the search tree, that is when every variable of the problem is bound. One can observe that for the max-sum sub-matrix problem, any partial assignment of the variables can be extended implicitly as a complete solution for which the unbound variables would be set to 0 (i.e. U ? variables are considered unselected). There is thus no need to wait that every variable is bound to evaluate the solution and possibly update the best so far lower bound. The value of the objective function of the feasible solution is computed in the evaluate() method as the sum of the positive rows contributions of the partial solution (see eq. (2) and (3) where P U 1 = J): f (IU∗ 1 , U 1 ) = i∈R max(0, ri ). An efficient bounding procedure. CP uses a branch and bound depth-first-search to avoid the exploration of proven sub-optimal solution. The branch and bound performances depend on the strength and efficiency of the procedure to compute the upper bound. We design simple yet efficient bounding procedure for the maxsum sub-matrix problem. Intuitively one computes an upper bound on the row contribution of each row and sum up all the positive bounds on the rows. The upper bound on the contribution of a row is the sum of the matrix entries in the selected columns plus the sum of the positive entries in the unbound columns. One simply computes the upper bound as: X X g(P ) = g(U 1 , U 0 , U ? ) = max(0, ri + max(0, Mi,j )) . (5) i∈R j∈U ? The bound is admissible but not tight as it may optimistically evaluate the objective (g(P ) ≥ f (P )). Indeed, it relies on a per-line relaxation of the problem, each selecting a possibly different set of columns. The upperBound() method is an implementation of the proposed upper bound using reversible double to store the incremental modifications of the partial contribution of the rows. Using a reversible sparse-set T for the row variables allows an efficient exclusion or inclusion of the rows through descent or backtrack [13]. Indeed, as soon as the bound of the row contribution becomes negative it should not be considered in the subsequent nodes of the search tree. The number of rows to consider goes from θ(|R|) to O(|R|). An efficient filtering procedure. The filter() method evaluates the upper bound result for two one-step look-ahead scenarios: if column j would be selected, this look-ahead upper bound is denoted ub∈ j , or if j would not be selected, ∈ / ∈ denoted ubj . Then, any column j with ubj ≤ best is discarded as inclusion of the column can only lead to worst solution than the incumbent. Similarly, any / column j with ub∈ j ≤ best is included. The time complexity for computing all the look-ahead upper bounds is in O(|T | × |U ? |) by taking advantage of the fact that the look-ahead bound of each line for each column can be obtained in O(1) from riub . 3.3 Mixed Integer Linear Programming Mixed Integer Linear Programming (MILP) [9] involves the optimization of a linear objective function, subject to linear constraints. Some or all of the variables are required to be integer. A MILP solver explores a branch and bound tree using linear-programming (LP) bounds at each node of the search tree. As for CP, there are advantages to using MILP. It represent a natural alternative to constraint programming as the problem is modeled with integer decision variables. Model. The max-sum sub-matrix problem can be formulated as a linear model using “big M ” constants. Equations (7) and (8) linearize ri+ = max(0, ri ) with ri being the sum of the selected entries of row i. X maximize ri+ , (6) i∈R s.t. ri+ ≤ Ti × M, ri+ ∀i ∈ R , ≤ ri + (1 − Ti ) × M, ∀i ∈ R , X ri = Mi,j × Uj , ∀i ∈ R . (7) (8) (9) j∈C In order to avoid roundingPerrors and ill conditioned Pmatrices, the big M constants can be replaced by j∈C max(0, Mi,j ) and − j∈C min(0, Mi,j ), respectively in equations (7) and (8). Algorithm 1: CP Global Constraint best ← −∞ // best so far objective trail r: array[m] rev-double // rows partial sums T : rev-set ← {1, . . . , n} // candidate rows 24 28 15 Method dfs() if U ? 6= φ then j ← select j ∈ U ? foreach v ∈ {0, 1} do trail.pushState() D(Uj ) ← v best ← max(best, evaluate()) ub ← upperBound() if ub > best then filter() dfs() 16 trail.popState() 36 1 2 3 4 5 6 7 8 9 10 11 12 13 14 25 26 27 29 30 31 32 33 34 35 37 17 18 19 20 21 22 23 Method evaluate(): double // evaluate objective for j ∈ U ? do if D(Uj ) 6= {0, 1} then U? ← U? \ j if D(Uj ) = 1 then ri ← ri + Mi,j , ∀i ∈ T return P i∈T max(0, ri ) 38 i else T ← T \ i return ub 40 41 42 43 45 46 i // ri always ≤ 0 Method filter(): double // remove impossible values ? ub∈ j ← 0 ∀j ∈ U / ? ub∈ j ← 0 ∀j ∈ U for i ∈ T do for j ∈ U ? do if Mi,j > 0 then if riub − Mi,j > 0 then / ∈ / ub − M ub∈ i,j j ← ubj + ri ∈ ub ub∈ j ← ubj + ri 39 44 4 Method upperBound(): double ub ← 0 for i ∈ T do P riub ← ri + j∈U ? max(0, Mi,j ) ub if r > 0 then ub ← ub + r ub else / ∈ / ub ub∈ j ← ubj + ri if riub + Mi,j > 0 then ∈ ub + M ub∈ i,j j ← ubj + ri for j ∈ U ? do if ub∈ j ≤ best then D(Uj ) ← 0 / if ub∈ j ≤ best then D(Uj ) ← 1 Experiments This section describes experiments conducted to assess the relative performances of three algorithms to solve the max-sum sub-matrix problem. CP-LNS denotes the method proposed by Le Van [6]. The other algorithms are specific methods proposed in the present work: a constraint programming with a global constraint (CPGC) and a mixed integer programming (MILP) solution. These algorithms are first compared on data matrices which are generated in a controlled setting. Experiments on the breast cancer gene expression data used in [6] are reported next. The main criterion to assess the performance of the various methods is the computing time to solve a particular problem instance. This is technically assessed through an any-time profile defined below. All algorithms have been implemented in the Scala programming language (2.11.4). Each run is executed with a single thread on a MacBook Pro (OS version 10.10.5) laptop (Intel i7-2720 CPU @ 2.20-3.30GHz, 4GB RAM per run). Constraint programming implementations are based on the latest version of OscaR [10] and MILP is based on the latest version of Gurobi (7.0.2). The code and datasets are available at https://bitbucket.org/vbranders/ maxsumsubmatriximplementation. 4.1 Synthetic Data We follow a similar protocol as in [6]. Synthetic data are generated by implanting a sub-matrix (I, J) of interest in a larger matrix M = (R, C) made of m rows and n columns. The implanted sub-matrix (I, J) forms a specific selection of rows and columns chosen at random. For each row index (from 1 to m) and each column index (from 1 to n) of M, a binary variable is sampled from a Bernoulli distribution B(p) and the associated row or column is included in the sub-matrix (I, J) if B(p) = 1. Hence, I = {i ∈ R | B(p) = 1} and J = {j ∈ C | B(p) = 1}. Next, the full matrix M is generated according to two normal distributions, N (1, 1) whenever the particular entry belongs to the implanted sub-matrix, and N (−3, 1) otherwise. ( ∼ N (1, 1) if i ∈ I and j ∈ J , ∀i ∈ R, ∀j ∈ C : Mi,j = (10) ∼ N (−3, 1) otherwise . Such a generation protocol favors the occurrence of higher values in the implanted sub-matrix and lower values elsewhere. Yet, given the standard deviations chosen equal to 1, both ranges of values may overlap. We note that, as in [6], the implanted sub-matrix is not guaranteed to be an optimal solution to the max-sum sub-matrix problem. This generation protocol looks however realistic to define a rectangular (and not necessarily contiguous) sub-matrix of interest in a larger matrix. Problem instances are generated for various matrix sizes (m, n) and a varying parameter p. As p increases, the size of the implanted sub-matrix is expected to increase as well. In the gene expression analysis context, m can easily be two orders of magnitude larger than n and the sub-matrix of interest is typically small as compared to the full matrix. Such cases are included in the controlled experiments reported below but a larger spectrum of problem instances is also considered. 4.2 Gene Expression Data The proposed case study concerns biomarker discovery for breast cancer subtypes using heterogeneous molecular data types. For a biological analysis and interpretation of the results, the interested reader is redirected to the work of [6]. The pre-processed data provided by [6] consists of a matrix of m = 2, 211 rows and n = 94 columns. In a first step, the matrix entries are transformed to discrete ranks along each row. A given threshold θ × n is then subtracted from each matrix entry. As θ increases, the proportion of positive entries decreases and, consequently, a smaller sub-matrix of interest is expected to be found. Hence, the control parameter θ plays a similar role as the parameter p (from Sect. 4.1) but in an opposite way. 4.3 Evaluation One could assess algorithms performances through runtime or number of feasible solutions. While the former may depend on implementation details, the latter strongly depends on the time spent in each node. We preferred the runtime comparisons as it is a more common approach and we made sure to implement the algorithms in the most comparable fashion. Any-Time Profile. In practice, an important criterion for the user is the time required to solve an instance and the ability to find the best solution within a given budget of time. Using any-time profiles, one can summarize these characteristics. The idea behind any-time profiles is that an algorithm should produce as high quality solution as possible at any moment of its running time [7]. In the max-sum sub-matrix problem, a high solution quality corresponds to a sub-matrix of large sum. Performances of each algorithm are aggregated on multiple instances. The solution quality for each algorithm is scaled on a [0, 1] interval and the reported result is the average per-instance solution quality as a function of the time. For each instance, runs not completed in a maximum budget of time tmax are interrupted. Definition 2 (Max-Sum Sub-Matrix Any-Time Profile). Let f (algo, inst, t) be the objective value of the best solution found so far by an algorithm algo for an instance inst at time t. Let tmax be the maximum running time before interrupting an algorithm. The any-time profile of an algorithm is the solution quality Qalgo (t) computed on all instances as a function of the time: f (algo, inst, t) 1 X , Qalgo (t) = |inst| f (algo∗inst , inst, tmax ) inst (11) with algo∗inst = argmax f (algo, inst, tmax ). algo 4.4 Results Figure 1 presents the any-time profile on 50 synthetic data with 10, 000 rows and p = {0.05, 0.3, 0.7} for 100 columns (column 1) or 1, 000 columns (column 2) and the any-time profile on breast cancer gene expression data with 2, 211 rows, 94 columns and variable choices of θ (columns 3 and 4). Synthetic Data. The existing CP-LNS method from [6] is clearly outperformed by other methods. It can barely produce any solution in the allocated time budget. The best approach is CPGC followed by MILP. The reported curves are stopped whenever the proof of optimality is obtained or else the maximal running time is reached. Hence, CPGC also exhibits best results whenever proving optimality is possible in the allocated running time. 8 12 16 20 0 40 80 120 200 1 0.6 0 0.2 0.4 Solution quality 0.8 1 0.6 0 0.2 0.4 Solution quality 0.8 1 0.8 0.6 0.2 0 4 θ = 0.9 0 200 600 1000 0 200 600 10 000 x 100, p = 0.3 10 000 x 1 000, p = 0.3 θ = 0.7 θ = 0.5 4 8 12 16 20 0 40 80 120 200 0.8 0.6 0 0.2 0.4 Solution quality 0.8 0.6 0 0.2 0.4 Solution quality 0.8 0.6 0 0.2 0.4 Solution quality 0.8 0.6 0.4 0 0 0 200 600 1000 0 200 600 10 000 x 100, p = 0.7 10 000 x 1 000, p = 0.7 θ = 0.3 θ = 0.1 8 12 16 20 0 40 80 120 200 0.8 0.6 0.2 0 0 Time (seconds) CPGC 0.4 Solution quality 0.8 0.6 0 0.2 0.4 Solution quality 0.8 0.6 0 0.2 0.4 Solution quality 0.8 0.6 0.4 0.2 0 4 Time (seconds) 1000 1 Time (seconds) 1 Time (seconds) 1 Time (seconds) 1 Time (seconds) 0 1000 1 Time (seconds) 1 Time (seconds) 1 Time (seconds) 1 Time (seconds) 0.2 Solution quality 0.4 Solution quality 0.8 0.6 0.4 Solution quality 0.2 0 0 Solution quality θ = 0.95 10 000 x 1 000, p = 0.05 1 10 000 x 100, p = 0.05 200 600 1000 Time (seconds) CP−LNS 0 200 600 1000 Time (seconds) MILP Fig. 1. Any-time profiles of constraint programming with a global constraint (CPGC), the method proposed by Le Van et al. [6] (CP-LNS) and mixed integer linear programming (MILP). Columns 1 and 2: Curves corresponds to the average solution quality over all instances as a function of time (in seconds). Results are computed on 50 instances with 10, 000 rows, 100 (column 1) or 1, 000 (column 2) columns, a variable p and a maximum running time of 20 (column 1) or 200 (column 2) seconds. Columns 3 and 4: Curves corresponds to the solution quality over each problem instance obtained for a specific θ as a function of the time (in seconds). Results computed on breast cancer gene expression data with 2, 211 rows, 94 columns and various θ values for a maximum waiting time of 1, 000 seconds. Gene Expression Data. Each curve corresponds here to the performance of an algorithm on a single instance, the one obtained for a specific choice of θ. On the whole spectrum of instances considered, the clear winner is CPGC. The most interesting instances are those for which θ ≥ 0.9 since such settings correspond to small sub-matrices which are more likely to illustrate an interesting biological pattern. In such cases, the best approaches are CPGC and CP-LNS. 5 Conclusions and Perspectives We introduce the max-sum sub-matrix problem which consists in finding a (non necessarily contiguous) rectangular sub-matrix in a large matrix whose sum is maximal. This problem is originally motivated, in the context of gene expression analysis, by the search of a subset of highly expressed genes in a specific subset, to be found, of relevant samples exhibiting such a pattern. A close variant of this problem, known as maximal ranked tile mining problem, has already been studied and tackled with constrained programming (CP) combined with large neighborhood search (CP-LNS) [6]. We present here key properties of the max-sum sub-matrix problem to speed up the search for a solution and we propose two additional algorithms to solve it. Experiments reported both on synthetic data and the original gene expression data used in [6] illustrate the benefits of our proposed methods. In particular, a CP approach with a global constraint (CPGC) is the most effective one in a large spectrum of problem instances. Overall, the CPGC method is also best at proving optimality when such proof can be obtained within the allocated budget of computing time. The second approach proposed here relies on mixed integer linear programming (MILP). It is arguably the simplest to formulate and to address with a standard solver for such problems. It is competitive with the other methods and largely outperforms CP-LNS as well in our controlled experiments. It exhibits however some performance degradation on some instances from gene expression data, most likely as a consequence of the specific relaxation it is based on. Related biclustering techniques identify multiple sub-matrices. The max-sum sub-matrix problem could be extended to such a setting by iteratively selecting max-sum sub-matrices penalizing the previous discovered rows and columns to avoid the selection of already identified sub-matrices. The max-sum sub-matrix mining problem could be extended to a supervised classification setting. For example, in gene expression analysis, one typically wants to find genes (rows) that allows to discriminate between two conditions. In other words, the columns could be a priori labeled according to two conditions. The objective can then be to identify a subset of rows that are maximally relevant to discriminate between subsets of samples from different conditions. This could be encoded in a larger matrix for which columns represent pairs of columns in either conditions from the original matrix and the value stored is interpreted as a distance value for a particular gene across both conditions. The max-sum sub-matrix problem could also be applied to outlier detection and/or biclustering. For example, using an appropriate data transformation, entries that are close to the mean or to the median could be mapped to relatively large positive entries. Similarly, entries far away from the mean would be mapped to low values. Consequently a sub-matrix of maximal sum would correspond to subsets of rows and of columns exhibiting similar entries. Explicit comparisons to existing biclustering algorithms could be considered in such a setting. References 1. Atzmueller, M.: Subgroup discovery. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 5(1), 35–49 (2015) 2. Bentley, J.: Programming pearls: algorithm design techniques. Communications of the ACM 27(9), 865–873 (1984) 3. Dawande, M., Keskinocak, P., Tayur, S.: On the biclique problem in bipartite graphs (1996) 4. Floyd, R.W.: Nondeterministic algorithms. Journal of the ACM (JACM) 14(4), 636–644 (1967) 5. Knuth, D.E.: The art of computer programming: Volume 4B, Combinatorial Algorithms: Part 2, Backtrack Programming, vol. 4B. Adison-Wesley (2016) 6. Le Van, T., Van Leeuwen, M., Nijssen, S., Fierro, A.C., Marchal, K., De Raedt, L.: Ranked tiling. In: Joint European Conference on Machine Learning and Knowledge Discovery in Databases. pp. 98–113. Springer (2014) 7. López-Ibánez, M., Stützle, T.: Automatically improving the anytime behaviour of optimisation algorithms. European Journal of Operational Research 235(3), 569– 582 (2014) 8. Madeira, S.C., Oliveira, A.L.: Biclustering algorithms for biological data analysis: a survey. IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB) 1(1), 24–45 (2004) 9. Nemhauser, G.L., Wolsey, L.A.: Integer programming and combinatorial optimization. Wiley, Chichester. GL Nemhauser, MWP Savelsbergh, GS Sigismondi (1992). Constraint Classification for Mixed Integer Programming Formulations. COAL Bulletin 20, 8–12 (1988) 10. OscaR Team: OscaR: Scala in OR (2012), available from https://bitbucket.org/oscarlib/oscar 11. Parker, J.S., Mullins, M., Cheang, M.C., Leung, S., Voduc, D., Vickery, T., Davies, S., Fauron, C., He, X., Hu, Z., et al.: Supervised risk predictor of breast cancer based on intrinsic subtypes. Journal of clinical oncology 27(8), 1160–1167 (2009) 12. Perou, C.M., Sørlie, T., Eisen, M.B., van de Rijn, M., Jeffrey, S.S., Rees, C.A., Pollack, J.R., Ross, D.T., Johnsen, H., Akslen, L.A., et al.: Molecular portraits of human breast tumours. Nature 406(6797), 747–752 (2000) 13. de Saint-Marcq, V.l.C., Schaus, P., Solnon, C., Lecoutre, C.: Sparse-sets for domain implementation. In: CP workshop on Techniques foR Implementing Constraint programming Systems (TRICS). pp. 1–10 (2013) 14. Takaoka, T.: Efficient algorithms for the maximum subarray problem by distance matrix multiplication. Electronic Notes in Theoretical Computer Science 61, 191– 200 (2002) 15. Tamaki, H., Tokuyama, T.: Algorithms for the maximum subarray problem based on matrix multiplication. In: SODA. vol. 1998, pp. 446–452 (1998)
2cs.AI
The Capacity of Private Information Retrieval with Partially Known Private Side Information∗ arXiv:1710.00809v2 [cs.IT] 27 Nov 2017 Yi-Peng Wei Karim Banawan Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 20742 [email protected] [email protected] [email protected] November 28, 2017 Abstract We consider the problem of private information retrieval (PIR) of a single message out of K messages from N replicated and non-colluding databases where a cacheenabled user (retriever) of cache-size M possesses side information in the form of full messages that are partially known to the databases. In this model, the user and the databases engage in a two-phase scheme, namely, the prefetching phase where the user acquires side information and the retrieval phase where the user downloads desired information. In the prefetching phase, the user receives mn full messages from the nth P database, under the cache memory size constraint N n=1 mn ≤ M . In the retrieval phase, the user wishes to retrieve a message such that no individual database learns anything about the identity of the desired message. In addition, the identities of the side information messages that the user did not prefetch from a database must remain private against that database. Since the side information provided by each database in the prefetching phase is known by the providing database and the side information must be kept private against the remaining databases, we coin this model as partially known private side information. We characterize the capacity of the PIR with partially −1 1− 1 1 = 1−( 1 )NK−M . known private side information to be C = 1 + N1 + · · · + N K−M −1 N Interestingly, this result is the same if none of the databases knows any of the prefetched side information, i.e., when the side information is obtained externally, a problem posed by Kadhe et al. and settled by Chen-Wang-Jafar recently. Thus, our result implies that there is no loss in using the same databases for both prefetching and retrieval phases. This work was supported by NSF Grants CNS 13-14733, CCF 14-22111, CNS 15-26608 and CCF 1713977. ∗ 1 1 Introduction The private information retrieval (PIR) problem is a canonical problem to study privacy issues that arise when information is downloaded (retrieved) from public databases. Since its first formulation by Chor et al. in [1], the PIR problem has become a central research topic in the computer science literature, see e.g., [2–5]. In the classical setting of PIR in [1], a user wishes to retrieve a single message (or a file) out of K messages replicated across N non-communicating databases without leaking any information about the identity of the retrieved message. To that end, the user submits a query to each database. Each database responds truthfully with an answer string. The user reconstructs the desired message from the collected answer strings. Trivially, the user can download the entire database and incur a linear (in number of messages) download cost, but this retrieval strategy is highly inefficient. The efficiency of a PIR scheme is measured by the normalized download cost, which is the cost of privately downloading one bit of the desired message. The goal of the PIR problem is to devise the most efficient retrieval strategy under the privacy and decodability constraints. The PIR problem has received attention in recent years in the information and coding theory literatures, see e.g., [6–11]. In the leading work of Sun-Jafar [12], the classical PIR problem is re-formulated to conform with the conventional information-theoretic arguments, and the notion of PIR capacity is introduced, which is defined as the supremum of retrieval rates over all achievable retrieval schemes. Reference [12] characterizes the capacity of the −1 1 using a greedy achievable scheme classical PIR model to be C = 1 + N1 + · · · + N K−1 that is closely related to blind interference alignment [13] and an induction-based converse argument. Following the work of Sun-Jafar [12], the capacity of many interesting variants of the classical PIR model have been investigated, such as, PIR from colluding databases, robust PIR, symmetric PIR, PIR from MDS-coded databases, PIR for arbitrary message lengths, multi-round PIR, multi-message PIR, PIR from Byzantine databases, secure symmetric PIR with adversaries, and their several combinations [14–28]. In this paper, we consider the problem of PIR with partially known private side information. Our work is most closely related to [29–32]1 . These works investigate the PIR problem when the user (retriever) possesses some form of side information about the contents of the databases. However, the models of [29–32] differ in three important aspects, namely, 1) the structure of the side information, 2) the presence or absence of privacy constraints on the side information, and 3) the databases’ awareness of the side information at its initial acquisition. Here, structure of the side information refers to whether the side information is in the form of full messages or parts of messages or whether messages are mixed through functions (coded/uncoded); privacy of the side information refers to whether the user further aims to keep the side information private from the databases; and databases’ awareness of the side information refers to whether the databases knew the initially prefetched side information. 1 A parallel line of work that studies privacy issues of requests and side information in index coding based broadcast systems can be found in [33, 34]. 2 Specifically, reference [29] studies the capacity of the cache-aided PIR where the user caches rLK bits in the form of any arbitrary function of the K messages, where L is the message size, and 0 ≤ r ≤ 1 is the caching ratio. Reference [29] assumes that the cache content is perfectly known by all the databases, and hence there is no need to protect the privacy of the cached content. Reference [29] determines the optimal download cost for this  1 1 = (1 −r) 1 + N1 + · · · + N K−1 using a memory-sharing achievable model to be D ∗ (r) = C(r) scheme and a converse that utilizes Han’s inequality. This conclusion is somewhat pessimistic in that the user cannot exploit the cached content as useful side information during PIR to reduce the download cost, since the databases are fully aware of it; the optimum D ∗ (r) formula indicates that the user should download the uncached part of the content, i.e., (1 − r), via the optimum PIR scheme in [12]. This result motivates [30, 31] to study the other extreme when the databases are completely unaware of the side information at its initial acquisition. References [30] and [31] differ in terms of the structure of the cached content: [30] considers the case where rK full messages are cached, and [31] considers the case where a random r fraction of the symbols of each of K messages is cached. In this case, [31] shows a significant reduction in the download cost over [29], as the user can now leverage the cached bits as side information, since they are unknown to the databases. In [31], there is no privacy constraint on the cached content. Reference [30] further introduces another model where the cached content (in the form of full messages) which is unknown to the databases at the time of initial prefetching, must remain unknown throughout the PIR, i.e., the queries of the user should not leak any information about the cached content to the databases. The exact capacity for this problem −1 1 . The optimal achievable scheme in is settled in [32] to be C = 1 + N1 + · · · + N K−M −1 this case starts from the traditional achievable scheme without side information in [12] and reduces the download cost by utilizing the reconstruction property of MDS codes. In this paper, we take a deeper look at the issue of awareness or otherwise unawareness of the databases about the cached content at its initial acquisition. We first note that it is practically challenging to make the side information completely unknown to the databases at its initial acquisition as assumed in [30–32]. One way to do this could be to employ one of the databases for prefetching the side information and exclude it from the retrieval process. Therefore, for the remaining N − 1 databases, the side information is completely unknown. This solution is strictly sub-optimal as the capacity expression in [32] (shown as C in the previous paragraph) is monotonically decreasing in N. An alternative solution could be to devise a refreshing mechanism that ensures that the cached content is essentially random from the perspective of each database [29], which may be challenging to implement. We also note that the other extreme of the problem, where the databases are fully aware of the cached content [29], is discouraging as the user cannot benefit from the cached side information. Therefore, a natural model is to use the databases for both prefetching and retrieval phases, such that the databases gain partial knowledge about the side information 3 available to the user, which makes it possible for the user to exploit the remaining side information that is unknown to each individual database to reduce the download cost during the retrieval process. This poses the following questions: Can we propose efficient joint prefetching-retrieval strategies that exploit the limited knowledge of each database to drive down the download cost? How much is the loss from the fully unknown case in [30, 32]? In this paper, we investigate the PIR problem when the user and the databases engage in a two-phase scheme, namely, prefetching phase and retrieval phase. In the prefetching phase, the user caches mn full messages out of the K messages from the nth database under a total P cache memory size constraint N n=1 mn ≤ M. Hence, each database has a partial knowledge about the side information possessed by the user, namely, the part of the side information that this database has provided during the prefetching phase. In the retrieval phase, the user wants to retrieve a message (which is not present in its memory) without leaking any information to any individual database about the desired message or the remaining side information messages that are unknown to each database. The goal of this work is to design a joint prefetching-retrieval scheme that minimizes the download cost in the retrieval phase. To that end, we first derive a general lower bound for the normalized download cost that is independent of the prefetching strategy. Then, we prove that this bound is attainable using two achievable schemes. The first achievable scheme, which is proposed in [32] for completely unknown side information, is a valid achievable scheme for our problem with partially known side information for any prefetching strategy.2 We provide a second achievable scheme for ∈ N, which requires smaller sub-packetization the case of uniform prefetching, i.e., mn = M N and smaller field size for realizing MDS codes. While the first achievable scheme [32] requires a message size of L = N K , the second achievable scheme proposed here requires a message M M size of L = N K− N , which scales down the message size by an exponential factor N N , which in turn simplifies the achievable scheme and minimizes the total number of downloaded bits without sacrificing from the capacity. We prove that the exact capacity of this problem is −1 1 C = 1 + N1 + · · · + N K−M . Surprisingly, this is the same capacity expression for the −1 PIR problem when the databases are completely unaware of the side information possessed by the user as found in [32] recently. Therefore, our result implies that there is no loss in the capacity if the same databases are employed in both prefetching and retrieval phases. 2 System Model We consider a classic PIR problem with K independent messages W1 , . . . , WK , where each message consists of L symbols, H(W1 ) = · · · = H(WK ) = L, 2 H(W1 , . . . , WK ) = H(W1 ) + · · · + H(WK ). We thank Dr. Hua Sun for pointing this out. 4 (1) There are N non-communicating databases, and each database stores all the K messages. The user (retriever) has a local cache memory which can store up to M messages. There are two phases: a prefetching phase and a retrieval phase. In the prefetching phase, ∀n ∈ [N], where [N] = {1, 2, . . . , N}, the user caches mn out of total K messages from the nth database. We denote the indices of the cached messages from the nth database as Hn . Therefore, |Hn | = mn . We denote the indices of all cached messages as H, H= N [ (2) Hn , n=1 where Hn1 ∩ Hn2 = ∅, if n1 6= n2 . Due to the cache memory size constraint, we require |H| = N X mn ≤ M. (3) n=1 Since the user caches mn messages from the nth database, Hn is known to the nth database. Since the databases do not communicate with each other, Hn is unknown to the other databases. We use m = (m1 , . . . , mN ) to represent the prefetching phase. After the prefetching phase, the user learns |H| messages, denoted as WH = {Wi1 , . . . , Wi|H| }. We refer to WH as partially known private side information. In the retrieval phase, the user privately generates a desired message index θ ∈ [K] \ H, and wishes to retrieve message Wθ such that no database knows which message is retrieved. Since the desired message index θ and cached message indices H are independent of the message contents, for random variables θ, H, and W1 , . . . , WK , we have H (θ, H, W1 , . . . , WK ) = H (θ, H) + H(W1 ) + · · · + H(WK ). [θ,H] (4) [θ,H] In order to retrieve Wθ , the user sends N queries Q1 , . . . , QN to the N databases, [θ,H] where Qn is the query sent to the nth database for message Wθ given the user has partially known private side information WH . The queries are generated according to H, which is independent of the realizations of the K messages. Therefore, we have [θ,H] I(W1 , . . . , WK ; Q1 [θ,H] , . . . , QN ) = 0. (5) To ensure that individual databases do not know which message is retrieved and also do not know the cached messages from other databases, i.e., to guarantee the privacy of (θ, H \ Hn ), we need to satisfy the following privacy constraint, ∀n ∈ [N], ∀H, H′ such that |H| = |H′ | ≤ M, Hn ⊂ H, Hn ⊂ H′ , and ∀θ ∈ [K] \ H, ∀θ′ ∈ [K] \ H′ , ′ ′ ′ ′ ,H ] , An[θ ,H ] , W1 , . . . , WK , Hn ), , W1 , . . . , WK , Hn ) ∼ (Q[θ , A[θ,H] (Q[θ,H] n n n 5 (6) where A ∼ B means that A and B are identically distributed. [θ,H] [θ,H] Upon receiving the query Qn , the nth database replies with an answering string An , [θ,H] which is a function of Qn and all the K messages. Therefore, ∀θ ∈ [K] \ H, ∀n ∈ [N], H(A[θ,H] |Q[θ,H] , W1 , . . . , WK ) = 0. n n [θ,H] (7) [θ,H] After receiving the answering strings A1 , . . . , AN from all the N databases, the user needs to decode the desired message Wθ reliably. By using Fano’s inequality, we have the following reliability constraint   [θ,H] [θ,H] [θ,H] [θ,H] = o(L), H Wθ |WH , H, Q1 , . . . , QN , A1 , . . . , AN (8) → 0 as L → ∞. where o(L) denotes a function such that o(L) L For fixed N, K, and pretching scheme m = (m1 , . . . , mN ), a pair (D(m), L(m)) is achievable if there exists a PIR scheme for messages of size L(m) symbols long with partially known private side information satisfying the privacy constraint (6) and the reliability constraint (8), where D(m) represents the expected number of downloaded symbols (over all the queries) [θ,H] [θ,H] [θ,H] [θ,H] from the N databases via the answering strings A1:N , where A1:N = (A1 , . . . , AN ), i.e., D(m) = N X n=1  . H A[θ,H] n (9) In this work, for fixed N, K, and M, we aim to characterize the optimal normalized download cost D ∗ , where ∗ D = inf m:(3) 3   D(m) : (D(m), L(m)) is achievable . L(m) (10) Main Results We characterize the exact normalized download cost for the PIR problem with partially known private side information as shown in the following theorem. Theorem 1 In the PIR problem with partially known private side information under the cache memory size constraint |H| ≤ M, the optimal normalized download cost is 1 1 + · · · + K−M −1 N N 1 K−M 1 − (N ) . = 1 − N1 D∗ = 1 + (11) (12) The converse proof for Theorem 1 is given in Section 4, and the achievability proof for Theorem 1 is given in Section 5. Theorem 1 does not assume any particular property for 6 the prefetching strategy, i.e., m is arbitrary except for satisfying the memory size constraint. We have a few remarks. 1− 1 Remark 1 Theorem 1 implies that C = D1∗ = 1−( 1 )NK−M . Surprisingly, this capacity expresN sion is exactly the same as the capacity for the PIR problem with completely unknown private side information in [32]. This implies that there is no loss in capacity due to employing the same databases for both prefetching and retrieval phases. The reason for this phenomenon is that although each database has a partial knowledge about some of the cached messages at the user, the privacy constraint on this known side information is relaxed. Remark 2 The normalized download cost in Theorem 1 is the same as the normalized download cost for the classical PIR problem [12] if the number of messages is K − M. That is, a cache of size M messages effectively reduces the total number of messages by M. Noting that the download cost in [12] monotonically increases in the number of messages, the effective reduction in the number of messages by the cache size results in a significant reduction in the download cost due to the presence of side information at the user even though it is partially known by the databases and it needs to be kept private against other databases. Remark 3 The optimal prefetching strategy exploits the entire cache memory of the user as the capacity expression is monotonically increasing in M. Remark 4 In Section 5, we present the capacity achieving schemes for the partially known private side information. We note that, in general the PIR scheme in [32] is a valid achievable scheme for our problem as well. Nevertheless, in the special case of uniform prefetching, = m ∈ N, we provide a different achievable scheme that exploits the prefetchi.e., mn = M N M ing uniformity to work with message size L = N K−m = N K− N in contrast to L = N K needed for the scheme in [32], i.e., the message size is decreased by an exponential factor M N N . Furthermore, we note that although both schemes need an MDS code to reduce the number of downloaded equations, we note that the field size needed to realize this MDS code ∈ N) compared with the field size needed in is significantly smaller with our scheme (if M N the scheme in [32]. This implies that although uniform prefetching does not affect the PIR capacity, it significantly simplifies the achievable scheme. 4 Converse Proof In this section, we derive a general lower bound for the normalized download cost D ∗ given in (10). We extend the techniques presented in [12, 32] to the PIR problem with partially known private side information. For the prefetching vector m = (m1 , . . . , mN ) satisfying (3), we note that satisfying the memory size constraint with equality leads to a valid lower bound on (10). Consequently, we P first consider the case N n=1 mn = M̃ ≤ M, i.e., we study the case when the user learns M̃ 7 messages after the prefetching phase. Since we do not specify the prefetching strategy m in P advance, the following lower bound is valid for all m such that N n=1 mn = M̃ . Without loss of generality, we relabel the M̃ cached messages as W1 , W2 , . . . , WM̃ , i.e., H = {1, 2, . . . , M̃} and WH = W1:M̃ . We first need the following lemma, which characterizes a lower bound on the length of the undesired portion of the answering strings as a consequence of the privacy constraint on the retrieved message. Lemma 1 (Interference lower bound) For the PIR with partially known private side information, the interference from undesired messages within the answering strings, D − L, is lower bounded by,   [M̃+1,H] [M̃+1,H] D − L + o(L) ≥ I WM̃ +2:K ; H, Q1:N , A1:N |WH , WM̃ +1 . (13) If the privacy constraint is absent, the user downloads only L symbols for the desired message, however, when the privacy constraint is present, it should download D symbols. The difference between D and L, i.e., D − L, corresponds to the undesired portion of the answering strings. Note that Lemma 1 is an extension of [12, Lemma 5] if M̃ = 0, i.e., the user has no partially known private side information. Lemma 1 differs from its counterpart in [31, Lemma 1] in two aspects, namely, the left hand side is D(r) − L(1 − r) in [31] as the user requests to download the uncached bits only, and the bound in [31, Lemma 1] constructs K − 1 distinct lower bounds by changing k in contrast to one bound here as it always starts from WM̃ +2 . Finally, we note that a similar argument to Lemma 1 can be implied from [32]. Proof: We start with the right hand side of (13),   [M̃+1,H] [M̃+1,H] I WM̃ +2:K ; H, Q1:N , A1:N |WH , WM̃ +1    [M̃ +1,H] [M̃+1,H] = I WM̃ +2:K ; H, Q1:N , A1:N , WM̃ +1 |WH − I WM̃ +2:K ; WM̃+1 |WH . (14) For the first term on the right hand side of (14), we have   [M̃ +1,H] [M̃+1,H] I WM̃ +2:K ; H, Q1:N , A1:N , WM̃ +1 |WH     [M̃+1,H] [M̃+1,H] [M̃+1,H] [M̃ +1,H] = I WM̃ +2:K ; H, Q1:N , A1:N |WH + I WM̃+2:K ; WM̃+1 |H, Q1:N , A1:N , WH (15)   (8) [M̃ +1,H] [M̃+1,H] = I WM̃ +2:K ; H, Q1:N , A1:N |WH + o(L) (16)   (4),(5) [M̃ +1,H] [M̃+1,H] + o(L) (17) = I WM̃ +2:K ; A1:N |WH , H, Q1:N     [M̃ +1,H] [M̃ +1,H] [M̃+1,H] [M̃ +1,H] = H A1:N |WH , H, Q1:N − H A1:N |WH , H, Q1:N , WM̃ +2:K + o(L) (18)     (8) [M̃ +1,H] [M̃+1,H] [M̃+1,H] [M̃ +1,H] − H A1:N , WM̃+1 |WH , H, Q1:N , WM̃ +2:K + o(L) = H A1:N |WH , H, Q1:N (19) 8   [M̃ +1,H] − H WM̃ +1 |WH , H, Q1:N , WM̃ +2:K + o(L) ≤H    (4),(5) [M̃ +1,H] [M̃+1,H] = H A1:N |WH , H, Q1:N − H WM̃ +1 |WH , WM̃+2:K + o(L)   [M̃ +1,H] [M̃ +1,H] − L + o(L) = H A1:N |WH , H, Q1:N   [M̃ +1,H] ≤ H A1:N − L + o(L)  [M̃ +1,H] [M̃+1,H] A1:N |WH , H, Q1:N  ≤ D − L + o(L),  (20) (21) (22) (23) (24) [M̃ +1,H] [M̃+1,H] H, Q1:N , A1:N , WH  where (16), (19) follow from the decodability of WM̃ +1 given ,   [M̃ +1,H] , (21) follows from the (17) follows from the independence of WM̃ +2:K and H, Q1:N   [M̃ +1,H] independence of WM̃ +1 and H, Q1:N , and (24) follows from the independence bound. For the second term on the right hand side of (14), we have    I WM̃ +2:K ; WM̃ +1 |WH = H WM̃ +1 |WH − H WM̃ +1 |WH , WM̃ +2:K = L − L = 0. (25) (26) Combining (14), (24), and (26) yields (13).  In the following lemma, we prove an inductive relation for the mutual information term on the right hand side of (13). Lemma 2 (Induction lemma) For all k ∈ {M̃ + 2, . . . , K}, the mutual information term in Lemma 1 can be inductively lower bounded as,   [k−1,H] [k−1,H] I Wk:K ; H, Q1:N , A1:N |WH , WM̃ +1:k−1  L − o(L) 1  [k,H] [k,H] . ≥ I Wk+1:K ; H, Q1:N , A1:N |WH , WM̃+1:k + N N (27) Lemma 2 is a generalization of [12, Lemma 6] to our setting. The main difference between Lemma 2 and [32] is that in order to apply the partial privacy constraint, the random variable H should be used in its local form Hn as it corresponds to the partial knowledge of the nth database. Proof: We start with the left hand side of (27), I  [k−1,H] [k−1,H] Wk:K ; H, Q1:N , A1:N |WH , WM̃+1:k−1    1 [k−1,H] [k−1,H] × N × I Wk:K ; H, Q1:N , A1:N |WH , WM̃+1:k−1 N N  1 X I Wk:K ; Hn , Q[k−1,H] , A[k−1,H] |WH , WM̃ +1:k−1 ≥ n n N n=1 = N  1 X ≥ I Wk:K ; Q[k−1,H] , A[k−1,H] |WH , WM̃ +1:k−1 , Hn n n N n=1 9 (28) (29) (30) N  1 X = I Wk:K ; Q[k,H] , A[k,H] |WH , WM̃+1:k−1 , Hn n n N n=1 (6) N  1 X [k,H] I Wk:K ; A[k,H] |W , W , H , Q = H n n n M̃ +1:k−1 N n=1 (4),(5) N  1 X = H A[k,H] |WH , WM̃ +1:k−1, Hn , Q[k,H] n n N n=1 (7) N  1 X  [k,H] [k,H] [k,H] H An |WH , WM̃ +1:k−1, H, Q1:N , A1:n−1 ≥ N n=1 (31) (32) (33) (34) N  1 X  [k,H] [k,H] = (35) I Wk:K ; A[k,H] |W , W , H, Q , A H n 1:n−1 M̃ +1:k−1 1:N N n=1  1  [k,H] [k,H] (36) = I Wk:K ; A1:N |WH , WM̃ +1:k−1, H, Q1:N N   (4),(5) 1 [k,H] [k,H] = (37) I Wk:K ; H, Q1:N , A1:N |WH , WM̃ +1:k−1 N  o(L)  (8) 1 [k,H] [k,H] (38) = I Wk:K ; Wk , H, Q1:N , A1:N |WH , WM̃ +1:k−1 − N N  o(L)  1  1 [k,H] [k,H] = I Wk:K ; Wk |WH , WM̃+1:k−1 + I Wk:K ; H, Q1:N , A1:N |WH , WM̃+1:k − N N N (39)   L − o(L) 1 [k,H] [k,H] = I Wk+1:K ; H, Q1:N , A1:N |WH , WM̃ +1:k + , (40) N N (7) where (29) follows from the non-negativity of mutual information, (31) follows from the privacy constraint, (32) follows from the independence of the messages and the queries, (33), (35) follow from the fact that answer strings are deterministic functions of the messages and the queries, (34) follows from  the fact that  conditioning reduces entropy, (37) follows from [k,H] the independence of Wk:K and H, Q1:N , (38) follows from the reliability constraint on Wk , and (40) follows from the independence of Wk and (WH , WM̃+1:k−1 ).  Now, we are ready to derive the lower bound for arbitrary K, N, and M̃ . This can be obtained by applying Lemma 1 and Lemma 2 successively. Lemma 3 For fixed N, K, and M̃ ≤ M, we have   1 1 − o(L). D ≥L 1+ +···+ N N K−M̃ −1 (41) Proof: We have   (13) [M̃ +1,H] [M̃+1,H] D ≥ L + I WM̃ +2:K ; H, Q1:N , A1:N |WH , WM̃ +1 − o(L)  (27) L 1  [M̃ +2,H] [M̃+2,H] ≥ L+ + I WM̃ +3:K ; H, Q1:N , A1:N |WH , WM̃ +1:M̃ +2 − o(L) N N 10 (42) (43) (27) ≥ L+ (27)  L 1  L [M̃ +3,H] [M̃+3,H] + 2 + I WM̃ +4:K ; H, Q1:N , A1:N |WH , WM̃ +1:M̃ +3 − o(L) N N N ≥ ...   (27) 1 1 ≥ L 1+ +···+ − o(L), N N K−M̃−1 (44) (45) (46) where (42) follows from Lemma 1, (43)-(46) follow from applying Lemma 2 starting from k = M̃ + 2 to k = K, which differs from [12] in terms of the starting point of the induction.  We conclude the converse proof by dividing by L and taking L → ∞ in (41), to have D∗ ≥ 1 + 1 1 +···+ . K− N N M̃−1 (47) Finally, we note that the right hand side of (47) is monotonically decreasing in M̃. Since M̃ ≤ M, the lowest lower bound is obtained by taking M̃ = M, which yields the final converse bound, D∗ ≥ 1 + 1 1 + · · · + K−M −1 . N N (48) P Remark 5 We note that if (48) is tight, any prefetching strategy m such that N n=1 mn < M is strictly suboptimal. Furthermore, the lower bound in (48) is the same for all prefetching P strategies m satisfying N n=1 mn = M. In Section 5, we show that this lower bound is tight. 5 Achievability Proof We first note that the achievability scheme proposed in [32] for the PIR problem with completely unknown private side information also works for the PIR problem with partially known private side information here. The PIR scheme in [32] is based on MDS codes and consists of two stages. The first stage determines the systematic part of the MDS code according to the queries generated in [12], which protects the privacy of the desired message, i.e., in the first stage, the user designs the queries such that no information is leaked about which message out of the K messages is the desired one. In the second stage, the user reduces the number of the downloaded equations by downloading the parity part of the MDS code only. For the case of partially known private side information here, two privacy constraints should be satisfied: the desired message privacy constraint and the side information privacy constraint. For the desired message, we note that the user should guarantee that the queries designed to retrieve any of the K − mn messages should be indistinguishable at the nth database (i.e., with the exception of the mn messages that the nth database has provided). Due to the first stage, the privacy of the desired message holds as it was designed to protect 11 the privacy of all K messages, which is more restricted. Furthermore, the PIR scheme in [32] also protects the privacy of the side information. The scheme in [32] ensures that the queries do not reveal the identity of the M messages that are possessed by the user as side information. In our model, we note that we need to protect the privacy of M − mn messages from the nth database, as the remaining mn messages are known to the nth database. Since the privacy constraint imposed on the side information in our model is less restricted than [32], using the scheme in [32] satisfies the privacy constraint of the side information in our case as well. That is, the nth database cannot infer which other M − mn messages the user holds. The PIR scheme in [32] achieves the normalized download cost in Theorem 1. The PIR scheme in [32] requires a message size of N K symbols. In the following, we propose another M ∈ N. Thus, this achievability scheme which requires a message size of N K− N , if mn = M N scheme requires smaller sub-packetization and smaller field size for the MDS code. Our PIR scheme for partially known private side information is based on the PIR schemes in [12, 32]. To protect the privacy of the partially known private side information and the privacy of the desired message, similar to [12], we apply the following three principles recursively: 1) database symmetry, 2) message symmetry within each database, and 3) exploiting undesired messages as side information. We reduce the download cost by utilizing the reconstruction property of MDS codes by exploiting partially known private side information as in [32]. The side information enables the user to request reduced number of equations as a consequence of the user’s knowledge of M messages from the prefetching phase. Nevertheless, to protect the privacy of the side information, the user actually queries MDS coded symbols which is mixture of K −mn messages. The main difference between our achievability scheme and that in [12,32] is that since the nth database knows that the user has prefetched mn messages, the user does not need to protect the privacy for these mn messages from the nth database. This effectively reduces the number of messages that the scheme in [32] needs to operate on to K −mn messages in contrast to K in [32]. When M ∈ N, we show that if the N , for all n, then user caches the same number of messages from each database, i.e., mn = M N the lower bound in (11) is achievable by this scheme. This scheme reduces the message size M requirement from L = N K in [32] to L = N K− N here, simplifying the achievable scheme. 5.1 5.1.1 Motivating Examples N = 2 Databases, K = 4 Messages, and M = 2 Cached Messages Assume that each message is of size 8 symbols. We use ai , bi , ci and di , for i = 1, . . . , 8, to denote the symbols of messages W1 , W2 , W3 and W4 , respectively. In this example, in the prefetching phase, the user caches message W3 from database 1, and message W4 from database 2; and in the retrieval phase, the user wishes to retrieve message W1 privately. The user first generates the query table in Table 1. In Table 1, the user queries 7 symbols. Since the user knows d1 from the cached message W4 , in order to use the partially known 12 private side information, the user can in fact reduce the number of queries to 6 equations per database by ignoring d1 . However, if the user simply does not download d1 , it compromises the privacy of W4 at database 1. Alternatively, the user queries the MDS coded version of the 7 symbols. By using these 7 symbols as the systematic part, we can use a (13, 7) MDS code. By downloading the 6 parity symbols, the user can reconstruct the whole 7 symbols utilizing the knowledge of d1 . Therefore, the normalized download cost for our achievability = 23 , which matches the lower bound in (11) for this case. scheme is 6+6 8 For database 1, the query table in Table 1 induces the same distribution on the messages W1 , W2 and W4 . Therefore, we guarantee the privacy of the desired message. The reliability constraint can also be verified. Note that b2 is downloaded from database 2, and d2 is downloaded in the prefetching phase. Therefore, a3 and a4 are decodable. By getting b4 + c3 from database 2, the user can get b4 due to the private side information W3 . Therefore, the user can decode a7 from a7 + b4 + d4 . Similar arguments follow for database 2. Table 1: Query table for K = 4, N = 2, M = 2. DB1 DB2 a1 a2 b1 b2 d1 c1 a3 + b2 a5 + b1 a4 + d2 a6 + c2 b3 + d3 b4 + c3 a7 + b4 + d4 a8 + b3 + c4 WH1 ={W3 } 5.1.2 WH2 ={W4 } N = 2 Databases, K = 5 Messages, and M = 2 Cached Messages Assume that each message is of size 16 symbols. We use ai , bi , ci , di and ei , for i = 1, . . . , 16, to denote the symbols of messages W1 , W2 , W3 , W4 , and W5 , respectively. In this example, in the prefetching phase, the user caches message W4 from database 1, and message W5 from database 2; and in the retrieval phase, the user wishes to retrieve message W1 privately. The user first generates the query table in Table 2. In Table 2, the user queries 15 symbols. Since the user knows e1 from the cached message W5 , in order to use the partially known private side information, the user in fact queries the MDS coded version of the 15 symbols. By using these 15 symbols as the systematic part, we can use a (29, 15) MDS code. By downloading the 14 parity symbols, the user can reconstruct the whole 15 symbols. Therefore, the normalized download cost for our achievability scheme is 14+14 = 47 , which matches the lower bound in 16 (11) for this case. For database 1, the query table in Table 2 induces the same distribution on the messages W1 , W2 , W3 and W5 . Therefore, we guarantee the privacy of the desired message. The 13 reliability constraint can also be verified. Note that b2 , c2 are downloaded from database 2, and e2 is downloaded in the prefetching phase. Therefore, a3 , a4 and a5 are decodable. By getting b6 + d3 from database 2, the user can get b6 due to the private side information W4 . Similarly, c6 is also decodable. Therefore, the user can decode a10 from a10 + b6 + e5 and a11 from a11 + c6 + e6 . By getting b8 + c8 + d7 from database 2, the user can get b8 + c8 due to the private side information W4 . Therefore, the user can decode a15 from a15 + b8 + c8 + e8 . Similar arguments follow for database 2. Table 2: Query table for K = 5, N = 2, M = 2. DB1 DB2 a1 a2 b1 b2 c1 c2 e1 d1 a3 + b2 a6 + b1 a4 + c2 a7 + c1 a5 + e2 a8 + d2 b3 + c3 b5 + c5 b4 + e3 b6 + d3 c4 + e4 c6 + d 4 a9 + b5 + c5 a12 + b3 + c3 a10 + b6 + e5 a13 + b4 + d5 a11 + c6 + e6 a14 + c4 + d6 b7 + c7 + e7 b8 + c8 + d7 a15 + b8 + c8 + e8 a16 + b7 + c7 + d8 WH1 ={W4 } 5.2 WH2 ={W5 } General Achievable Scheme for M N ∈N Let M = m. In the prefetching phase, the user caches m messages from each database. To N achieve the lower bound shown in (11), in the retrieval phase, we choose the message size as L = N K−m symbols. The details of the achievable scheme are as follows: 1. Initialization: The user permutes each message randomly and independently. After the random permutation, we use Ui (j) to denote the jth symbol of the permuted message Wi . Suppose the user wishes to retrieve Wθ privately. We then prepare the query table by first querying Uθ (1) from database 1. Set the round index to r = 1. 2. Symmetry across databases: The user queries the same number of equations with the same structure as database 1 from the remaining databases. 3. Message symmetry: For each database, to satisfy the privacy constraint, the user should query equal amount of symbols from all other K − m messages. Since the user 14 has cached m messages from each database in the prefetching phase, the user does not need to protect the privacy for these m messages. For the rth round, the user queries sums of every r combinations of the K − m messages. 4. Exploiting side information: For database 1, the user exploits the side information equations obtained from the other (N −1) databases to query sum of r+1 combinations of the K − m messages, where sum of r combinations is the side information. If the r combinations contain the cached message from database 1, we replace the overlapping symbols through the symbols cached from other databases. 5. Repeat steps 2, 3, 4 after setting r = r + 1 until r = K − m + 1. 6. Shuffling the order of queries: By shuffling the order of queries uniformly, all possible queries can be made equally likely regardless of the message index. This guarantees the privacy of the desired message. 7. Downloading MDS parity parts: Now, the query table is finished. For each database, let p be the number of queried symbols in the query table, and let q be the number of queried symbols which are determined by the side information the user cached in the prefetching phase. Apply a (2p − q, p) MDS code to the queried symbols by letting the p symbols to be the systematic part. Finally, the user downloads the parity parts of the MDS-coded answering strings which are p − q symbols for each database. 5.3 Normalized Download Cost We now calculate the total number of downloaded symbols. We first calculate p, which is the number of queried symbols in the query table for each database,       K−m K −m K−m (N − 1)K−m−1 (49) (N − 1) + · · · + + p= K−m 2 1        K−m K −m K −m 1 K−m 2 (50) (N − 1) (N − 1) + · · · + (N − 1) + = K−m 2 1 N −1  1 = N K−m − 1 , (51) N −1  where K−m in (49) corresponds to the queries of sums of every r combinations of the K −m r messages, and (N − 1)r−1 corresponds to the number of sets of the available side information from other (N − 1) databases. We then calculate q, which is the number of queried symbols which are determined by the side information the user cached in the prefetching phase, q=       (N − 1)m (N − 1)m (N − 1)m (N − 1)(N −1)m−1 (N − 1) + · · · + + (N − 1)m 2 1 15 (52)      (N − 1)m (N − 1)m 1 (N −1)m (N − 1) (N − 1) + · · · + = (N − 1)m 1 N −1  1 = N (N −1)m − 1 , N −1 (53) (54)  where (N −1)m in (52) corresponds to the queries which can be determined by the partially r known private side information, and (N − 1)r−1 corresponds to the number of sets of queries consisting of r combinations. Next, we calculate the number of symbols for the desired message, L=N        K −m−1 K −m−1 K −m−1 K−m−1 (N − 1) (N − 1) + · · · + + K −m−1 1 0 (55) = N × N K−m−1 = N K−m , (56)  where K−m−1 in (55) corresponds to the queries containing the desired message and (N − r−1 1)r−1 corresponds to the number of sets of queries consisting of r combinations. Therefore, the normalized download cost becomes, D N(p − q) = L L   N N K−m (N −1)m N − 1 − N − 1 N −1 = N −1 N K−m N K−m − N (N −1)m N × = N −1 " N K−m  K−M # 1 1 , = 1 × 1− N 1− N (57) (58) (59) (60) which matches the lower bound in (11). Remark 6 Note that although our achievable scheme and the scheme in [32] are both using MDS coding to exploit the available side information, the field size requirements for realizing the MDS codes are different. For the scheme of [32], a (2p̃ − q̃, p̃) MDS code is used, where p̃ = N 1−1 (N K − 1) and q̃ = N 1−1 (N M − 1). This requires larger field size than the (2p − q, p) ∈ N), since 2p̃ − q̃ > (2p − q). MDS code used in our scheme (if M N 6 Conclusion In this paper, we have introduced a new PIR model, namely, PIR with partially known private side information as a natural model for studying practical PIR problems with cached side information. In this model, the user and the databases engage in a caching/PIR scenario which consists of two phases, namely, prefetching phase and retrieval phase. The nth 16 database provides the user with mn side information messages in the prefetching phase such P that N n=1 mn ≤ M, hence, each database has partial knowledge about the side information in contrast to full knowledge in [29] and no knowledge in [30–32]. Based on this side information, the user designs a retrieval scheme that does not reveal the identity of the desired message or the identities of the remaining M − mn messages to the nth database. For this 1− 1 model, we determined the exact capacity to be C = 1−( 1 )NK−M . The capacity is attained N for any prefetching strategy that satisfies the cache memory size constraint with equality. The achievable scheme in [32] can also be used for this model. We further proposed another PIR scheme which requires smaller sub-packetization and field size for the case of uniform prefetching. Uniform prefetching, when feasible, is optimal. Interestingly, the capacity expression we derive for this problem is exactly the same as the capacity expression for the PIR problem with completely unknown side information [32]. Therefore, our result implies that there is no loss in employing the same databases for prefetching and retrieval purposes. References [1] B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan. Private information retrieval. Journal of the ACM, 45(6):965–981, 1998. [2] W. Gasarch. A survey on private information retrieval. In Bulletin of the EATCS, 2004. [3] C. Cachin, S. Micali, and M. Stadler. Computationally private information retrieval with polylogarithmic communication. In International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 1999. [4] R. Ostrovsky and W. Skeith III. A survey of single-database private information retrieval: Techniques and applications. In International Workshop on Public Key Cryptography, pages 393–411. Springer, 2007. [5] S. Yekhanin. Private information retrieval. Communications of the ACM, 53(4):68–73, 2010. [6] N. B. Shah, K. V. Rashmi, and K. Ramchandran. One extra bit of download ensures perfectly private information retrieval. In IEEE ISIT, June 2014. [7] G. Fanti and K. Ramchandran. Efficient private information retrieval over unsynchronized databases. IEEE Journal of Selected Topics in Signal Processing, 9(7):1229–1239, October 2015. [8] T. Chan, S. Ho, and H. Yamamoto. Private information retrieval for coded storage. In IEEE ISIT, June 2015. 17 [9] A. Fazeli, A. Vardy, and E. Yaakobi. Codes for distributed pir with low storage overhead. In IEEE ISIT, June 2015. [10] R. Tajeddine and S. El Rouayheb. Private information retrieval from MDS coded data in distributed storage systems. In IEEE ISIT, July 2016. [11] H. Sun and S. A. Jafar. The capacity of private information retrieval. In IEEE Globecom, December 2016. [12] H. Sun and S. A. Jafar. The capacity of private information retrieval. IEEE Trans. on Info. Theory, 63(7):4075–4088, July 2017. [13] H. Sun and S. Jafar. Blind interference alignment for private information retrieval. 2016. Available at arXiv:1601.07885. [14] H. Sun and S. Jafar. The capacity of robust private information retrieval with colluding databases. 2016. Available at arXiv:1605.00635. [15] R. Tajeddine, O. W. Gnilke, D. Karpuk, R. Freij-Hollanti, C. Hollanti, and S. El Rouayheb. Private information retrieval schemes for coded data with arbitrary collusion patterns. 2017. Available at arXiv:1701.07636. [16] H. Sun and S. Jafar. The capacity of symmetric private information retrieval. 2016. Available at arXiv:1606.08828. [17] K. Banawan and S. Ulukus. The capacity of private information retrieval from coded databases. IEEE Trans. on Info. Theory. Submitted September 2016. Also available at arXiv:1609.08138. [18] H. Sun and S. Jafar. Optimal download cost of private information retrieval for arbitrary message length. 2016. Available at arXiv:1610.03048. [19] H. Sun and S. Jafar. Multiround private information retrieval: Capacity and storage overhead. 2016. Available at arXiv:1611.02257. [20] K. Banawan and S. Ulukus. Multi-message private information retrieval: Capacity results and near-optimal schemes. IEEE Trans. on Info. Theory. Submitted February 2017. Also available at arXiv:1702.01739. [21] K. Banawan and S. Ulukus. The capacity of private information retrieval from Byzantine and colluding databases. IEEE Trans. on Info. Theory. Submitted June 2017. Also available at arXiv:1706.01442. [22] Q. Wang and M. Skoglund. Symmetric private information retrieval for MDS coded distributed storage. 2016. Available at arXiv:1610.04530. 18 [23] R. Freij-Hollanti, O. Gnilke, C. Hollanti, and D. Karpuk. Private information retrieval from coded databases with colluding servers. 2016. Available at arXiv:1611.02062. [24] H. Sun and S. Jafar. Private information retrieval from MDS coded data with colluding servers: Settling a conjecture by Freij-Hollanti et al. 2017. Available at arXiv: 1701.07807. [25] Y. Zhang and G. Ge. A general private information retrieval scheme for MDS coded databases with colluding servers. 2017. Available at arXiv: 1704.06785. [26] Y. Zhang and G. Ge. Multi-file private information retrieval from MDS coded databases with colluding servers. 2017. Available at arXiv: 1705.03186. [27] Q. Wang and M. Skoglund. Linear symmetric private information retrieval for MDS coded distributed storage with colluding servers. 2017. Available at arXiv:1708.05673. [28] Q. Wang and M. Skoglund. Secure symmetric private information retrieval from colluding databases with adversaries. 2017. Available at arXiv:1707.02152. [29] R. Tandon. The capacity of cache aided private information retrieval. 2017. Available at arXiv: 1706.07035. [30] S. Kadhe, B. Garcia, A. Heidarzadeh, S. El Rouayheb, and A. Sprintson. Private information retrieval with side information. 2017. Available at arXiv:1709.00112. [31] Y.-P. Wei, K. Banawan, and S. Ulukus. Fundamental limits of cache-aided private information retrieval with unknown and uncoded prefetching. 2017. Available at arXiv:1709.01056. [32] Z. Chen, Z. Wang, and S. Jafar. The capacity of private information retrieval with private side information. 2017. Available at arXiv:1709.03022. [33] M. Karmoose, L. Song, M. Cardone, and C. Fragouli. Private broadcasting: an index coding approach. 2017. Available at arXiv: 1701.04958. [34] M. Karmoose, L. Song, M. Cardone, and C. Fragouli. Preserving privacy while broadcasting: k-limited-access schemes. 2017. Available at arXiv:1705.08437. 19
7cs.IT
M ONOMIAL IDEALS VIA SQUARE - FREE MONOMIAL IDEALS arXiv:math/0507238v2 [math.AC] 10 Mar 2017 Sara Faridi∗ 2005 1 Introduction In this paper we study monomial ideals using the operation “polarization” to first turn them into square-free monomial ideals. Various forms of polarization appear throughout the literature and have been used for different purposes in algebra and algebraic combinatorics (for example, Weyman [17], Fröberg [8], Schwartau [13], or Rota and Stein [11]). One of the most useful features of polarization is that the chain of substitutions that turn a given monomial ideal into a square-free one can be described in terms of a regular sequence (Fröberg [8]). This fact allows many properties of a monomial ideal to transfer to its polarization. Conversely, to study a given monomial ideal, one could examine its polarization. The advantage of this latter approach is that there are many combinatorial tools dealing with square-free monomial ideals. One of these tools is StanleyReisner theory: Schwartau’s thesis [13] and the book by Stückrad and Vogel [15] discuss how the Stanley-Reisner theory of square-free monomial ideals produces results about general monomial ideals using polarization. Another tool for studying square-free monomial ideals, which will be our focus here, is facet ideal theory, developed by the author in [5], [6] and [7]. This paper is organized as follows. In Section 2 we define polarization and introduce some of its basic properties. In Section 3 we introduce facet ideals and its features that are relevant to this paper. In particular, we introduce simplicial trees, which correspond to square-free monomial ideals with exceptionally strong algebraic properties. Section 4 extends the results of facet ideal theory to general monomial ideals. Here we study a monomial ideal I whose polarization is a tree, and show that many of the properties of simplicial trees hold for such ideals. This includes Cohen-Macaulayness of the Rees ring of I (Corollary 4.8), I being sequentially Cohen-Macaulay (Corollary 4.12), and several inductive tools for studying such ideals, such as localization (see Section 4.1). Appendix A is an independent study of primary decomposition in a sequentially Cohen-Macaulay module. We demonstrate how in a sequentially Cohen-Macaulay module M , every submodule appearing in the filtration of M can be described in terms of the primary decomposition of the 0-submodule of M . This is used to prove Proposition 4.11. ∗ This research was supported by NSERC, and by Laboratoire de combinatoire et d’informatique mathématique at UQÀM, Montreal. 1 2 Polarization Definition 2.1. Let R = k[x1 , . . . , xn ] be a polynomial ring over a field k. Suppose M = x1 a1 . . . xn an is a monomial in R. Then we define the polarization of M to be the square-free monomial P(M ) = x1,1 x1,2 . . . x1,a1 x2,1 . . . x2,a2 . . . xn,1 . . . xn,an in the polynomial ring S = k[xi,j | 1 ≤ i ≤ n, 1 ≤ j ≤ ai ]. If I is an ideal of R generated by monomials M1 , . . . , Mq , then the polarization of I is defined as:  P(I) = P(M1 ), . . . , P(Mq ) which is a square-free monomial ideal in a polynomial ring S. Here is an example of how polarization works. Example 2.2. Let J = (x1 2 , x1 x2 , x2 3 ) ⊆ R = k[x1 , x2 ]. Then P(J) = (x1,1 x1,2 , x1,1 x2,1 , x2,1 x2,2 x2,3 ) is the polarization of J in the polynomial ring S = k[x1,1 , x1,2 , x2,1 , x2,2 , x2,3 ] Note that by identifying each xi with xi,1 , one can consider S as a polynomial extension of R. Exactly how many variables S has will always depend on what we polarize. Therefore, as long as we are interested in the polarizations of finitely many monomials and ideals, S remains a finitely generated algebra. Below we describe some basic properties of polarization, some of which appear (without proof) in [15]. Here we record the proofs where appropriate. Proposition 2.3 (basic properties of polarization). Suppose that R = k[x1 , . . . , xn ] is a polynomial ring over a field k, and I and J are two monomial ideals of R. 1. P(I + J) = P(I) + P(J); 2. For two monomials M and N in R, M | N if and only if P(M ) | P(N ); 3. P(I ∩ J) = P(I) ∩ P(J); 4. If p = (xi1 , . . . , xir ) is a (minimal) prime containing I, then P(p) is a (minimal) prime containing P(I); 5. If p′ = (xi1 ,e1 , . . . , xir ,er ) is a prime over P(I), then p = (xi1 , . . . , xir ) is a prime over I. Moreover, if p′ has minimal height (among all primes containing P(I)), then p must have minimal height as well (among all primes containing I); 2 6. height I = height P(I); 1. Follows directly from Definition 2.1. Proof. 2. Suppose that M = x1 b1 . . . xn bn and N = x1 c1 . . . xn cn , and suppose that P(M ) = x1,1 . . . x1,b1 . . . xn,1 . . . xn,bn and P(N ) = x1,1 . . . x1,c1 . . . xn,1 . . . xn,cn . If M | N , then bi ≤ ci for all i, which implies that P(M ) | P(N ). The converse is also clear using the same argument. 3. Suppose that I = (M1 , . . . , Mq ) and J = (N1 , . . . , Ns ) where the generators are all monomials. If U = x1 b1 . . . xn bn is a monomial in I ∩ J, then for some generator Mi of I and Nj and J, we have Mi | U and Nj | U , hence by part 2, P(Mi ) | P(U ) and P(Nj ) | P(U ), which implies that P(U ) ∈ P(I) ∩ P(J). Conversely, if U ′ is a monomial in P(I) ∩ P(J), then for some generator Mi = x1 b1 . . . xn bn of I and Nj = x1 c1 . . . xn cn and J we have P(Mi ) | U ′ and P(Nj ) | U ′ . This means that lcm(P(Mi ), P(Nj )) | U ′ . It is easy to see (by an argument similar to the one in part 2) that lcm(P(Mi ), P(Nj )) = P(lcm(Mi , Nj )). Since lcm(Mi , Nj ) is one of the generators of I ∩ J, it follows that P(lcm(Mi , Nj )) is a generator of P(I ∩ J) and hence U ′ ∈ P(I ∩ J). 4. If p = (xi1 , . . . , xir ) is a minimal prime over I = (M1 , . . . , Mq ), then for each of the xij there is a Mt such that xij | Mt , and no other generator of p divides Mt . The same holds for the polarization of the two ideals: P(p) = (xi1 ,1 , . . . , xir ,1 ) and P(I) = (P(M1 ), . . . , P(Mt )), and so P(p) is minimal over P(I). 5. Suppose that p′ = (xi1 ,e1 , . . . , xir ,er ) is a prime lying over P(I). Then for every generator Mt of I, there is a xij ,ej in p′ such that xij ,ej | P(Mt ). But this implies that xij | Mt , and therefore I ⊆ p = (xi1 , . . . , xir ). Now suppose that p′ has minimal height r over P(I), and there is a prime ideal q over I with height q < r. This implies (from part 4) that P(q), which is a prime of height less than r, contains P(I), which is a contradiction. 6. This follows from parts 4 and 5. Example 2.4. It is not true that every minimal prime of P(I) comes from a minimal prime of I. For example, let I = (x21 , x1 x22 ). Then P(I) = (x1,1 x1,2 , x1,1 x2,1 x2,2 ). The ideal (x1,2 , x2,1 ) is a minimal prime over P(I), but the corresponding prime (x1 , x2 ) is not a minimal prime of I (however, if we had taken any minimal prime of minimal height of P(I), e.g. (x1,1 ), then the corresponding prime over I would have been minimal; this is part 5 above). 3 For a monomial ideal I in a polynomial ring R = k[x1 , . . . , xn ] as above, there is a unique irredundant irreducible decomposition of the form I = q1 ∩ . . . ∩ qm where each qi is a primary ideal generated by powers of the variables x1 , . . . , xn (see [16, Theorem 5.1.17]). Proposition 2.5 (polarization and primary decomposition). Let I be a monomial ideal in a polynomial ring R = k[x1 , . . . , xn ], and let P(I) be the polarization of I in S = k[xi,j ] as described in Definition 2.1. 1. If I = (xi1 a1 , . . . , xir ar ) where the aj are positive integers, then \ P(I) = (xi1 ,c1 , . . . , xir ,cr ) 1≤cj ≤aj 1≤j≤r 2. If I = (xi1 , . . . , xir )m , where 1 ≤ i1 , . . . , ir ≤ n and m is a positive integer, then P(I) has the following irredundant irreducible primary decomposition: \ P(I) = (xi1 ,c1 , . . . , xir ,cr ) 1≤cj ≤m Σcj ≤m+r−1 3. Suppose that I = q1 ∩ . . . ∩ qm is the unique irredundant irreducible primary decomposition of I, such that for each i = 1, . . . , m, i i qi = (x1 a1 , . . . , xn an ), i where the aij are nonnegative integers, and if aij = 0 we assume that xj aj = 0. Then P(I) has the following irreducible primary decomposition (some primes might be repeated). \ \ (x1,c1 , . . . , xn,cn ) P(I) = 1≤i≤m 1≤cj ≤ai j 1≤j≤n where when aij = 0, we assume that cj = xj,0 = 0. Proof. 1. We know that P(I) = (xi1 ,1 . . . xi1 ,a1 , . . . , xi1 ,1 . . . xi1 ,ar ). Clearly the minimal primes of P(I) are (xi1 ,c1 , . . . , xir ,cr ) for all cj ≤ aj . This settles the claim. 4 2. Assume, without loss of generality, that I = (x1 , . . . , xr )m . So we can write  I = x1 b1 . . . xr br | 0 ≤ bi ≤ m, b1 + · · · + br = m so that  P(I) = x1,1 . . . x1,b1 . . . xr,1 . . . xr,br | 0 ≤ bi ≤ m, b1 + · · · + br = m . We first show that P(I) is contained in the intersection of the ideals of the form (x1,c1 , . . . , xr,cr ) described above. It is enough to show this for each generator of P(I). So we show that U = x1,1 . . . x1,b1 . . . xr,1 . . . xr,br ∈ I = (x1,c1 , . . . , xr,cr ) where 0 ≤ bi ≤ m, b1 + · · · + br = m, 1 ≤ cj ≤ m and c1 + · · · + cr ≤ m + r − 1. If for any i, bi ≥ ci , then it would be clear that U ∈ I. Assume bi ≤ ci − 1 for i = 1, . . . , r − 1. It follows that m − br = b1 + · · · + br−1 ≤ c1 + · · · + cr−1 − (r − 1) ≤ m + r − 1 − cr − (r − 1) = m − cr which implies that br ≥ cr , hence U ∈ I. So far we have shown one direction of the inclusion. To show the opposite direction, take any monomial \ U ∈ (x1,c1 , . . . , xr,cr ) where 1 ≤ cj ≤ m and c1 + · · · + cr ≤ m + r − 1. Notice that for some i ≤ r, xi,1 | U ; this is because U ∈ (x1,1 , . . . , xr,1 ). We write U as U = x1,1 . . . x1,b1 . . . xr,1 . . . xr,br U ′ where U ′ is a monomial, and the bi are nonnegative integers such that for each j < bi , xi,j | U (if xi,1 6 | U then set bi = 0). We need to show that it is possible to find such bi so that b1 + · · · + br = m. Suppose b1 + · · · + br ≤ m − 1, and xi,bi +1 6 | U for 1 ≤ i ≤ r. Then b1 + · · · + br + r ≤ m + r − 1, hence U ∈ (x1,b1 +1 , . . . , xr,br +1 ) implying that xi,bi +1 | U for some i, which is a contradiction. Therefore b1 , . . . , br can be picked so that they add up to m, and hence U ∈ P(I); this settles the opposite inclusion. 5 3. This follows from part 1 and Proposition 2.3 part 3. Corollary 2.6 (polarization and associated primes). Let I be a monomial ideal in a polynomial ring R = k[x1 , . . . , xn ], and let P(I) be its polarization in S = k[xi,j ] as described in Definition 2.1. Then (xi1 , . . . , xir ) ∈ AssR (R/I) if and only if (xi1 ,c1 , . . . , xir ,cr ) ∈ AssS (S/P(I)) for some positive integers c1 , . . . , cr . Example 2.7. Consider the primary decomposition of J = (x1 2 , x2 3 , x1 x2 ): J = (x1 , x2 3 ) ∩ (x1 2 , x2 ). By Proposition 2.5, P(J) = (x1,1 x1,2 , x2,1 x2,2 x2,3 , x1,1 x2,1 ) will have primary decomposition P(J) = (x1,1 , x2,1 ) ∩ (x1,1 , x2,2 ) ∩ (x1,1 , x2,3 ) ∩ (x1,2 , x2,1 ). A very useful property of polarization is that the final polarized ideal is related to the original ideal via a regular sequence. The proposition below, which looks slightly different here than the original statement in [8], states this fact. Proposition 2.8 (Fröberg [8]). Let k be a field and R = k[x1 , . . . , xn ]/(M1 , . . . , Mq ), where M1 , . . . , Mq are monomials in the variables x1 , . . . , xn , and let N1 = P(M1 ), . . . , Nq = P(Mq ) be a set of square-free monomials in the polynomial ring S = k[xi,j | 1 ≤ i ≤ n, 1 ≤ j ≤ ai ] such that for each i, the variable xi,ai appears in at least one of the monomials N1 , . . . , Nq . Then the sequence of elements xi,1 − xi,j where 1 ≤ i ≤ n and 1 < j ≤ ai forms a regular sequence in the quotient ring R′ = S/(N1 , . . . , Nq ) and if J is the ideal of R′ generated by the elements in (1), then R = R′ /J. Moreover, R is Cohen-Macaulay (Gorenstein) if and only if R′ is. Example 2.9. Let J and R be as in Example 2.2. According to Proposition 2.8, the sequence x1,1 − x1,2 , x2,1 − x2,2 , x2,1 − x2,3 is a regular sequence in S/P(J), and  R/J = S/ P(J) + (x1,1 − x1,2 , x2,1 − x2,2 , x2,1 − x2,3 ) . 6 (1) 3 Square-free monomial ideals as facet ideals Now that we have introduced polarization as a method of transforming a monomial ideal into a square-free one, we can focus on square-free monomial ideals. In particular, here we are interested in properties of square-free monomial ideals that come as a result of them being considered as facet ideals of simplicial complexes. Below we review the basic definitions and notations in facet ideal theory, as well as some of the basic concepts of Stanley-Reisner theory. We refer the reader to [2], [5], [6], [7], and [14] for more details and proofs in each of these topics. Definition 3.1 (simplicial complex, facet, subcollection and more). A simplicial complex ∆ over a set of vertices V = {v1 , . . . , vn } is a collection of subsets of V , with the property that {vi } ∈ ∆ for all i, and if F ∈ ∆ then all subsets of F are also in ∆ (including the empty set). An element of ∆ is called a face of ∆, and the dimension of a face F of ∆ is defined as |F |− 1, where |F | is the number of vertices of F . The faces of dimensions 0 and 1 are called vertices and edges, respectively, and dim ∅ = −1. The maximal faces of ∆ under inclusion are called facets of ∆. The dimension of the simplicial complex ∆ is the maximal dimension of its facets. We denote the simplicial complex ∆ with facets F1 , . . . , Fq by ∆ = hF1 , . . . , Fq i and we call {F1 , . . . , Fq } the facet set of ∆. A simplicial complex with only one facet is called a simplex. By a subcollection of ∆ we mean a simplicial complex whose facet set is a subset of the facet set of ∆. Definition 3.2 (connected simplicial complex). A simplicial complex ∆ = hF1 , . . . , Fq i is connected if for every pair i, j, 1 ≤ i < j ≤ q, there exists a sequence of facets Ft1 , . . . , Ftr of ∆ such that Ft1 = Fi , Ftr = Fj and Fts ∩ Fts+1 6= ∅ for s = 1, . . . , r − 1. Definition 3.3 (facet/non-face ideals and complexes). Consider a polynomial ring R = k[x1 , . . . , xn ] over a field k and a set of indeterminates x1 , . . . , xn . Let I = (M1 , . . . , Mq ) be an ideal in R, where M1 , . . . , Mq are square-free monomials that form a minimal set of generators for I. • The facet complex of I, denoted by δF (I), is the simplicial complex over a set of vertices v1 , . . . , vn with facets F1 , . . . , Fq , where for each i, Fi = {vj | xj |Mi , 1 ≤ j ≤ n}. The non-face complex or the Stanley-Reisner complex of I, denoted by δN (I) is be the simplicial complex over a set of vertices v1 , . . . , vn , where {vi1 , . . . , vis } is a face of δN (I) if and only if xi1 . . . xis ∈ / I. • Conversely, if ∆ is a simplicial complex over n vertices labeled v1 , . . . , vn , we define the facet ideal of ∆, denoted by F(∆), to be the ideal of R generated by square-free monomials xi1 . . . xis , where {vi1 , . . . , vis } is a facet of ∆. The non-face ideal or the StanleyReisner ideal of ∆, denoted by N (∆), is the ideal of R generated by square-free monomials xi1 . . . xis , where {vi1 , . . . , vis } is not a face of ∆. 7 Throughout this paper we often use a letter x to denote both a vertex of ∆ and the corresponding variable appearing in F(∆), and xi1 . . . xir to denote a facet of ∆ as well as a monomial generator of F(∆). Example 3.4. If ∆ is the simplicial complex hxyz, yu, uvwi drawn below, y x u z w v then F(∆) = (xyz, yu, uvw) and N (∆) = (xu, xv, xw, yv, yw, zu, zv, zw) are its facet ideal and nonface (Stanley-Reisner) ideal, respectively. Facet ideals give a one-to-one correspondence between simplicial complexes and square-free monomial ideals. Next we define the notion of a vertex cover. The combinatorial idea here comes from graph theory. In algebra, it corresponds to prime ideals lying over the facet ideal of a given simplicial complex. Definition 3.5 (vertex covering, independence, unmixed). Let ∆ be a simplicial complex with vertex set V . A vertex cover for ∆ is a subset A of V that intersects every facet of ∆. If A is a minimal element (under inclusion) of the set of vertex covers of ∆, it is called a minimal vertex cover. The smallest of the cardinalities of the vertex covers of ∆ is called the vertex covering number of ∆ and is denoted by α(∆). A simplicial complex ∆ is unmixed if all of its minimal vertex covers have the same cardinality. A set {F1 , . . . , Fu } of facets of ∆ is called an independent set if Fi ∩ Fj = ∅ whenever i 6= j. The maximum possible cardinality of an independent set of facets in ∆, denoted by β(∆), is called the independence number of ∆. An independent set of facets which is not a proper subset of any other independent set is called a maximal independent set of facets. Example 3.6. If ∆ is the simplicial complex in Example 3.4, then the vertex covers of ∆ are: {x, u}, {y, u}, {y, v}, {y, w}, {z, u}, {x, y, u}, {x, z, u}, {x, y, v}, . . . . The first five vertex covers above (highlighted in bold), are the minimal vertex covers of ∆. It follows that α(∆) = 2, and ∆ is unmixed. On the other hand, {xyz, uvw} is the largest maximal independent set of facets that ∆ contains, and so β(∆) = 2. Definition 3.7 (Alexander dual). Let I be a square-free monomial ideal in the polynomial ring k[V ] with V = {x1 , . . . , xn }, and let ∆N be the non-face complex of I (i.e. ∆N = δN (I)). Then the Alexander dual of ∆N is the simplicial complex ∆N ∨ = {F ⊂ V | F c ∈ / ∆N } where F c is the complement of the face F in V . We call the nonface ideal of ∆N ∨ the Alexander dual of I and denote it by I ∨ . 8 3.1 Simplicial Trees Considering simplicial complexes as higher dimensional graphs, one can define the notion of a tree by extending the same concept from graph theory. Before we define a tree, we determine what “removing a facet” from a simplicial complex means. We define this idea so that it corresponds to dropping a generator from the facet ideal of the complex. Definition 3.8 (facet removal). Suppose ∆ is a simplicial complex with facets F1 , . . . , Fq and F(∆) = (M1 , . . . , Mq ) its facet ideal in R = k[x1 , . . . , xn ]. The simplicial complex obtained by removing the facet Fi from ∆ is the simplicial complex ∆ \ hFi i = hF1 , . . . , F̂i , . . . , Fq i and F(∆ \ hFi i) = (M1 , . . . , M̂i , . . . , Mq ). The definition that we give below for a simplicial tree is one generalized from graph theory. See [5] and [6] for more on this concept. Definition 3.9 (leaf, joint). A facet F of a simplicial complex is called a leaf if either F is the only facet of ∆, or for some facet G ∈ ∆ \ hF i we have F ∩ (∆ \ hF i) ⊆ G. If F ∩ G 6= ∅, the facet G above is called a joint of the leaf F . Equivalently, a facet F is a leaf of ∆ if F ∩ (∆ \ hF i) is a face of ∆ \ hF i. Example 3.10. Let I = (xyz, yzu, zuv). Then F = xyz is a leaf, but H = yzu is not, as one can see in the picture below. x y F ∩ (∆ \ hF i) = y ∩ z y H ∩ (∆ \ hHi) = z z ∩ y = u x u z v y v z y u = z u Definition 3.11 (tree, forest). A connected simplicial complex ∆ is a tree if every nonempty subcollection of ∆ has a leaf. If ∆ is not necessarily connected, but every subcollection has a leaf, then ∆ is called a forest. Example 3.12. The simplicial complexes in examples 3.4 and 3.10 are both trees, but the one below is not because it has no leaves. It is an easy exercise to see that a leaf must contain a free vertex, where a vertex is free if it belongs to only one facet. 9 One of the most powerful properties of simplicial trees from the point of view of algebra is that they behave well under localization. This property makes it easy to use induction on the number of vertices of a tree for proving its various properties. Lemma 3.13 (Localization of a tree is a forest). Let I ⊆ k[x1 , . . . , xn ] be the facet ideal of a simplicial tree, where k is a field. Then for any prime ideal p of k[x1 , . . . , xn ], δF (Ip ) is a forest. Proof. See [6, Lemma 4.5]. 4 properties of monomial ideals via polarization For the purpose of all discussions in this section, unless otherwise stated, let I be a monomial ideal in the polynomial ring R = k[x1 , . . . , xn ] over a field k, whose polarization is the square-free monomial ideal P(I) in the polynomial ring S = k[xi,j | 1 ≤ i ≤ n, 1 ≤ j ≤ ai ]. We assume that the polarizing sequence (as described in (1) in Proposition 2.8) is ν = ν1 , . . . , νv which is a regular sequence in S/P(I) and  R/I = S/ P(I) + (ν) . 4.1 Monomial ideals whose polarization is a simplicial tree A natural question, and one that this paper is mainly concerned with, is what properties of facet ideals of simplicial trees can be extended to general (non-square-free) monomial ideals using polarization? In other words, if for a monomial ideal I in a polynomial ring P(I) is the facet ideal of a tree (Definition 3.11), then what properties of P(I) are inherited by I? The strongest tool when dealing with square-free monomial ideals is induction– either on the number of generators, or the number of variables in the ambient polynomial ring. This is particularly the case when the facet complex of the ideal is a tree, or in some cases when it just has a leaf. In this section we show that via polarization, one can extend these tools to monomial ideals in general. For a given monomial ideal I, we show that if P(I) is the facet ideal of a tree, and p is a prime ideal containing I, then P(Ip ) is the facet ideal of a forest (Theorem 4.1); this allows induction on number of variables. Similarly, Theorem 4.3 provides us with a way to use induction on number of generators of I. Theorem 4.1 (localization and polarization). If P(I) is the facet ideal of a tree, and p is a prime ideal of R containing I, then P(Ip ) is the facet ideal of a forest. 10 Proof. The first step is to show that it is enough to prove this for prime ideals of R generated by a subset of {x1 , . . . , xn }. To see this, assume that p is a prime ideal of R containing I, and that p′ is another prime of R generated by all xi ∈ {x1 , . . . , xn } such that xi ∈ p (recall that the minimal primes of I are generated by subsets of {x1 , . . . , xn }; see [16, Corollary 5.1.5]). So p′ ⊆ p. If I = (M1 , . . . , Mq ), then Ip′ = (M1 ′ , . . . , Mq ′ ) where for each i, Mi ′ is the image of Mi in Ip′ . In other words, Mi ′ is obtained by dividing Mi = x1 a1 . . . xn an by the product of all the xj aj such that xj ∈ / p′ . But xj ∈ / p′ implies that ′ xj ∈ / p, and so it follows that Mi ∈ Ip . Therefore Ip′ ⊆ Ip . On the other hand since p′ ⊆ p, Ip ⊆ Ip′ , which implies that Ip′ = Ip (the equality and inclusions of the ideals here mean equality and inclusion of their generating sets). Now suppose I = (M1 , . . . , Mq ), and p = (x1 , . . . , xr ) is a prime containing I. Suppose that for each i, we write Mi = Mi′ .Mi′′ , where Mi′ ∈ k[x1 , . . . , xr ] and Mi′′ ∈ k[xr+1 , . . . , xn ] so that Ip = (M1′ , . . . , Mt′ ), where without loss of generality M1′ , . . . , Mt′ is a minimal generating set for Ip . We would like to show that the facet complex ∆ of P(Ip ) is a forest. Suppose that, again without loss of generality, I ′ = (P(M1′ ), . . . , P(Ms′ )) is the facet ideal of a subcollection ∆′ of ∆. We need to show that ∆′ has a leaf. If s = 1, then there is nothing to prove. Otherwise, suppose that P(M1 ) represents a leaf of the tree δF (P(I)), and P(M2 ) is a joint of P(M1 ). Then we have P(M1 ) ∩ P(Mi ) ⊆ P(M2 ) f or all i ∈ {2, . . . , s}. Now let xe,f be in P(M1′ ) ∩ P(Mi′ ) for some i ∈ {2, . . . , s}. This implies that (i) xe,f ∈ P(M1 ) ∩ P(Mi ) ⊆ P(M2 ), and (ii) e ∈ {1 . . . , r} From (i) and (ii) we can conclude that xe,f ∈ P(M2′ ), which proves that P(M1′ ) is a leaf for ∆′ . Remark 4.2. It is not true in general that if p is a (minimal) prime of I, then P(Ip ) = P(I)P(p) . For example, if I = (x1 3 , x1 2 x2 ) and p = (x1 ), then Ip = (x1 2 ) so P(Ip ) = (x1,1 x1,2 ), but P(I)P(p) = (x1,1 ). Another feature of simplicial trees is that they satisfy a generalization of König’s theorem ([6, Theorem 5.3]). Below we explain how this property, and another property of trees that is very useful for induction, behave under polarization. 11 Recall that for a simplicial complex ∆, α(∆) and β(∆) are the vertex covering number and the independence number of ∆, respectively (Definition 3.5). For simplicity of notation, if I = (M1 , . . . , Mq ) is a monomial ideal, we let β(I) denote the maximum cardinality of a subset of {M1 , . . . , Mq } consisting of pairwise coprime elements (so β(∆) = β(F(∆)) for any simplicial complex ∆). Theorem 4.3 (joint removal and polarization). Suppose M1 , . . . , Mq are monomials that form a minimal generating set for I, and P(I) is the facet ideal of a simplicial complex ∆. Assume that ∆ has a leaf, whose joint corresponds to P(M1 ). Then, if we let I ′ = (M2 , . . . , Mq ), we have height I = height I ′ . Proof. If G is the joint of ∆ corresponding to P(M1 ), then P(I ′ ) = F(∆ \ hGi). From [6, Lemma 5.1] it follows that α(∆) = α(∆ \ hGi), so that height P(I) = height P(I ′ ), and therefore height I = height I ′ . Theorem 4.4. Suppose M1 , . . . , Mq are monomials that form a minimal generating set for I, and P(I) is the facet ideal of a simplicial tree ∆. Then height I = β(I). Proof. We already know that height I = height P(I) = α(∆). It is also clear that β(I) = β(P(I)), since the monomials in a subset {Mi1 , . . . , Mir } of the generating set of I are pairwise coprime if and only if the monomials in {P(Mi1 ), . . . , P(Mir )} are pairwise coprime. On the other hand, from [6, Theorem 5.3] we know that α(∆) = β(∆). Our claim follows immediately. We demonstrate how to apply these theorems via an example. Example 4.5. Suppose I = (x1 3 , x1 2 x2 x3 , x3 2 , x2 3 x3 ). Then P(I) = (x1,1 x1,2 x1,3 , x1,1 x1,2 x2,1 x3,1 , x3,1 x3,2 , x2,1 x2,2 x2,3 x3,1 ) is the facet ideal of the following simplicial complex (tree) ∆. x 3,1 x 3,2 x 1,3 x 2,3 x 1,1 x 1,2 x 2,1 x 2,2 Now α(∆) = height I = 2 because the prime of minimal height over I is (x1 , x3 ). From Theorem 4.4 it follows that β(I) = 2. This means that you can find a set of two monomials in the generating set of I that have no common variables: for example {x1 3 , x3 2 } is such a set. Since the monomials x1 2 x2 x3 and x2 3 x3 polarize into joints of ∆, by Theorem 4.3 the ideals I, (x1 3 , x3 2 , x2 3 x3 ), (x1 3 , x1 2 x2 x3 , x3 2 ), and (x1 3 , x3 2 ) all have the same height. 12 We now focus on the Cohen-Macaulay property. In [6] we showed that for a simplicial tree ∆, F(∆) is a Cohen-Macaulay ideal if and only if ∆ is an unmixed simplicial complex. The condition unmixed for ∆ is equivalent to all minimal primes of the ideal F(∆) (which in this case are all the associated primes of F(∆)) having the same height. In general, an ideal all whose associated primes have the same height (equal to the height of the ideal) is called an unmixed ideal. It now follows that Theorem 4.6 (Cohen-Macaulay criterion for trees). Let P(I) be the facet ideal of a simplicial tree ∆. Then R/I is Cohen-Macaulay if and only if I is unmixed. Proof. From Proposition 2.8, R/I is Cohen-Macaulay if and only if S/P(I) is Cohen-Macaulay. By [6, Corollary 8.3], this is happens if and only if P(I) is unmixed. Corollary 2.6 now proves the claim. If R is a ring and J is an ideal of R, then the Rees ring of R along J is defined as R[Jt] = ⊕n∈N J n tn . Rees rings come up in the algebraic process of “blowing up” ideals. One reason that trees were defined as they are, is that their facet ideals produce normal and Cohen-Macaulay Rees rings ([5]). Proposition 4.7. If S[P(I)t] is Cohen-Macaulay, then so is R[It]. Conversely, if we assume that R and S are localized at their irrelevant maximal ideals, then R[It] being Cohen-Macaulay implies that S[P(I)t] is Cohen-Macaulay. Proof. Suppose that ν1 , . . . , νv is the polarizing sequence as described before. For i = 1, . . . , v − 1 let Ri = S/(ν1 , . . . , νi ), Ii = P(I)/(ν1 , . . . , νi ), Rv = R and Iv = I. Notice that S[P(I)t] and R[It] are both domains. Also note that for each i, S[P(I)t]/(ν1 , . . . , νi ) = Ri [Ii t] is the Rees ring of the monomial ideal Ii in the polynomial ring Ri , and is therefore also a domain. Therefore νi+1 is a regular element in the ring S[P(I)t]/(ν1 , . . . , νi ), which means that ν1 , . . . , νv is a regular sequence in S[P(I)t]. Similarly, we see that R[It] = S[P(I)t]/(ν1 , . . . , νv ). [2, Theorem 2.1.3] now implies that if S[P(I)t] is Cohen-Macaulay, then so is R[It]. The converse follows from [2, Exercise 2.1.28]. Corollary 4.8 (Rees ring of a tree is Cohen-Macaulay). Suppose that P(I) is the facet ideal of a simplicial tree. Then the Rees ring R[It] of I is Cohen-Macaulay. Proof. This follows from the Proposition 4.7, and from [5, Corollary 4], which states that the Rees ring of the facet ideal of a simplicial tree is Cohen-Macaulay. 13 4.2 Polarization of sequentially Cohen-Macaulay ideals The main result of this section is that if the polarization of a monomial ideal I is the facet ideal of a tree, then I is a sequentially Cohen-Macaulay ideal. The theorem that implies this fact (Proposition 4.11) is interesting in its own right. For a square-free monomial ideal J, Eagon and Reiner [4] proved that J is Cohen-Macaulay if and only if its Alexander dual J ∨ has a linear resolution. Herzog and Hibi [9] then defined componentwise linear ideals and generalized their result, so that a square-free monomial ideal J is sequentially Cohen-Macaulay if and only if J ∨ is componentwise linear (see [9] or [7]). But even though Alexander duality has been generalized to all monomial ideals from square-free ones, the criterion for sequential Cohen-Macaulayness does not generalize: it is not true that if I is any monomial ideal, then I is sequentially Cohen-Macaulay if and only of I ∨ is a componentwise linear ideal; see Miller [10]. We show that the statement is true if I ∨ is replaced by P(I)∨ . Definition 4.9 ([14, Chapter III, Definition 2.9]). Let M be a finitely generated Z-graded module over a finitely generated N-graded k-algebra, with R0 = k. We say that M is sequentially CohenMacaulay if there exists a finite filtration 0 = M0 ⊂ M1 ⊂ . . . ⊂ Mr = M of M by graded submodules Mi satisfying the following two conditions. (a) Each quotient Mi /Mi−1 is Cohen-Macaulay. (b) dim (M1 /M0 ) < dim (M2 /M1 ) < . . . < dim (Mr /Mr−1 ), where dim denotes Krull dimension. We define a componentwise linear ideal in the square-free case using [9, Proposition 1.5]. Definition 4.10 (componentwise linear). Let I be a square-free monomial ideal in a polynomial ring R. For a positive integer k, the k-th square-free homogeneous component of I, denoted by I[k] is the ideal generated by all square-free monomials in I of degree k. The ideal I above is said to be componentwise linear if for all k, the square-free homogeneous component I[k] has a linear resolution. For our monomial ideal I, let Q(I) denote the set of primary ideals appearing in a reduced primary decomposition of I. Suppose that h = height I and s = max{height q | q ∈ Q(I)}, and set \ Ii = q. q∈Q(I) height q≤s−i So we have the following filtration for R/I (we assume that all inclusions in the filtration are proper; if there is an equality anywhere, we just drop all but one of the equal ideals). 0 = I = I0 ⊂ I1 ⊂ . . . ⊂ Is−h ⊂ R/I. 14 (2) If R/I is sequentially Cohen-Macaulay, then by Theorem A.4, (2) is the appropriate filtration that satisfies Conditions (a) and (b) in Definition 4.9. For the square-free monomial ideal J = P(I), we similarly define \ Q(J) = {minimal primes over J} and Ji = p p∈Q(J) height p≤s−i where the numbers h and s are the same as for I because of Proposition 2.5. It follows from Proposition 2.5 and Corollary 2.6 that for each i, P(Ii ) = Ji and the polarization sequence that transforms Ii into Ji is a subsequence of ν = ν1 , . . . , νv . What we have done so far is to translate, via polarization, the filtration (2) of the quotient ring R/I into one of S/J: 0 = J = J0 ⊂ J1 ⊂ . . . ⊂ Js−h ⊂ S/J. (3) Now note that for a given i, the sequence ν is a Ji+1 /Ji -regular sequence in S, as ν is a regular sequence in S/Ji , which contains Ji+1 /Ji . Also note that R/Ii ≃ S/(Ji + ν). It follows that Ji+1 /Ji is Cohen-Macaulay if and only if Ii+1 /Ii is (see [2, Exercise 2.1.27(c), Exercise 2.1.28, and Theorem 2.1.3]). Proposition 4.11. The monomial ideal I is sequentially Cohen-Macaulay if and only if P(I) is sequentially Cohen-Macaulay, or equivalently, P(I)∨ is a componentwise linear ideal. Proof. By [7, Proposition 4.5], P(I)∨ is componentwise linear if and only if P(I) is sequentially Cohen-Macaulay, which by the discussion above is equivalent to I being sequentially CohenMacaulay. Corollary 4.12 (Trees are sequentially Cohen-Macaulay). Let P(I) be the facet ideal of a simplicial tree. Then I is sequentially Cohen-Macaulay. Proof. This follows from Proposition 4.11 and by [7, Corollary 5.5], which states that P(I)∨ is a componentwise linear ideal. 5 Further examples and remarks To use the main results of this paper for computations on a given monomial ideal, there are two steps. One is to compute the polarization of the ideal, which as can be seen from the definition, is a quick and simple procedure. This has already been implemented in Macaulay2. The second step is to determine whether the polarization is the facet ideal of a tree, or has a leaf. Algorithms that serve this purpose are under construction [3]. 15 Remark 5.1. Let I = (M1 , . . . , Mq ) be a monomial ideal in a polynomial ring R. If P(I) is the facet ideal of a tree, then by Corollary 4.8, R[It] is Cohen-Macaulay. But more is true: if you drop any generator of I, for example if you consider I ′ = (M1 , . . . , M̂i , . . . , Mq ), then R[I ′ t] is still Cohen-Macaulay. This is because P(I ′ ) corresponds to the facet ideal of a forest, so one can apply the same result. A natural question is whether one can say the same with the property “Cohen-Macaulay” replaced by “normal”. If I is square-free, this is indeed the case. But in general, polarization does not preserve normality of ideals. Example 5.2 (normality and polarization). A valid question is whether Proposition 4.7 holds if the word “Cohen-Macaulay” is replaced with “normal”, given that simplicial trees have normal facet ideals ([5])? The answer is negative. Here is an example. Let I = (x1 3 , x1 2 x2 , x2 3 ) be an ideal of k[x1 , x2 ]. Then I is not normal; this is because I is not even integrally closed: x1 x2 2 ∈ I as (x1 x2 2 )3 − x1 3 x2 6 = 0, but x1 x2 2 6∈ I. Now P(I) = (x1,1 x1,2 x1,3 , x1,1 x1,2 x2,1 , x2,1 x2,2 x2,3 ) is the facet ideal of the tree x 1,3 x 1,2 x 1,1 x 2,2 x 2,1 x 2,3 which is normal by [5]. The reason that normality (or integral closure in general) does not pass through polarization is much more basic: polarization does not respect multiplication of ideals, or monomials. Take, for example, two monomials M and N and two monomial ideals I and J, such that M N ∈ IJ. It is not necessarily true that P(M )P(N ) ∈ P(I)P(J). Indeed, let I = J = (x1 x2 ) and M = x1 2 and N = x2 2 . Then M N = x1 2 x2 2 ∈ IJ. But P(M ) = x1,1 x1,2 , P(N ) = x2,1 x2,2 , and P(I) = P(J) = (x1,1 x2,1 ) and clearly P(M )P(N ) ∈ / P(I)P(J) = (x1,1 2 x2,1 2 ). Remark 5.3. It is useful to think of polarization as a chain of substitutions. This way, as a monomial ideal I gets polarized, the ambient ring extends one variable at a time. All the in-between ideals before we hit the final square-free ideal P(I) have the same polarization. For example let J = (x2 , xy, y 3 ) ⊆ k[x, y]. We use a diagram to demonstrate the process described in the previous paragraph. Each linear form a − b stands for “replacing the variable b with a”, or vice versa, depending on which direction we are going. v−y u−x J = (x2 , xy, y 3 ) −→ J1 = (xu, uy, y 3 ) −→ J2 = (xu, uv, y 2 v) 16 w−y −→ J3 = (xu, uv, yvw) . This final square-free monomial ideal J3 is the polarization of J, and is isomorphic to P(J) as we defined it in Definition 2.1. Note that all ideals J, J1 , J2 and J3 have the same (isomorphic) polarization. We can classify monomial ideals according to their polarizations. An interesting question is to see what properties do ideals in the same polarization class have. A more difficult question is how far can one “depolarize” a square-free monomial ideal I, where by depolarizing I we mean finding monomial ideals whose polarization is equal to I, or equivalently, traveling the opposite direction on the above diagram. A Appendix: Primary decomposition in a sequentially Cohen-Macaulay module The purpose of this appendix is to study, using basic facts about primary decomposition of modules, the structure of the submodules appearing in the (unique) filtration of a sequentially CohenMacaulay module M . The main result (Theorem A.4) states that each submodule appearing in the filtration of M is the intersection of all primary submodules whose associated primes have a certain height and appear in an irredundant primary decomposition of the 0-submodule of M . Similar results, stated in a different language, appear in [12]; the author thanks Jürgen Herzog for pointing this out. We first record two basic lemmas that we shall use later (the second one is an exercise in Bourbaki [1]). Throughout the discussions below, we assume that R is a finitely generated algebra over a field, and M is a finite module over R. Lemma A.1. Let Q 1 , . . . , Q t , P all be primary submodules of an R-module M , such that Ass(M/Q i ) = {qi } and Ass(M/P) = {p}. If Q 1 ∩ . . . ∩ Q t ⊆ P and Q i 6⊆ P for some i, then there is a j 6= i such that qj ⊆ p. m Proof. Let x ∈ Q i \P. For each j not equal to i, pick the positive integer mj such that qj j x ⊆ Q j . So we have that m m m m m1 mt mt i+1 i−1 i+1 i−1 1 qm 1 . . . qi−1 qi+1 . . . qt x ⊆ Q 1 ∩ . . . ∩ Q t ⊆ P =⇒ q1 . . . qi−1 qi+1 . . . qt ⊆ p where the second inclusion is because x ∈ / P. Hence for some j 6= i, qj ⊆ p. Lemma A.2. Let M be an R-module and N be a submodule of M . Then for every p ∈ Ass(M/N ), if p 6⊇ Ann(N ), then p ∈ Ass(M ). Proof. Since p ∈ Ass(M/N ), there exists x ∈ M \ N such that p = Ann(x); in other words px ⊆ N. Suppose Ann(N ) 6⊆ p, and let y ∈ Ann(N ) \ p. Now ypx = 0, and so p ⊆ Ann(yx) in M . On the other hand, if z ∈ Ann(yx), then zyx = 0 ⊆ N and so zy ∈ p. But y ∈ / p, so z ∈ p. Therefore p ∈ Ass(M ). 17 Suppose M is a sequentially Cohen-Macaulay module with filtration as in Definition 4.9. We adopt the following notation. For a given integer j, we let Ass(M )j = {p ∈ Ass(M ) | height p = j}. Suppose that all the j where Ass(M )j 6= ∅ form the sequence of integers 0 ≤ h1 < . . . < hc ≤ dim R so that Ass(M ) = S 1≤j≤c Ass(M )hj . Proposition A.3. For all i = 0, . . . , r − 1, we have 1. Ass(Mi+1 /Mi ) ∩ Ass(M ) 6= ∅; 2. Ass(M )hr−i ⊆ Ass(Mi+1 /Mi ) and c = r; 3. If p ∈ Ass(Mi+1 ), then height p ≥ hr−i ; 4. If p ∈ Ass(Mi+1 /Mi ), then Ann(Mi ) 6⊆ p; 5. Ass(Mi+1 /Mi ) ⊆ Ass(M ); 6. Ass(Mi+1 /Mi ) = Ass(M )hr−i ; 7. Ass(M/Mi ) = Ass(M )≤hr−i ; 8. Ass(Mi+1 ) = Ass(M )≥hr−i . Proof. 1. We use induction on the length r of the filtration of M . The case r = 1 is clear, as we have a filtration 0 ⊂ M , and the assertion follows. Now suppose the statement holds for sequentially Cohen-Macaulay modules with filtrations of length less than r. Notice that Mr−1 that appears in the filtration of M in Definition 4.9 is also sequentially Cohen-Macaulay, and so by the induction hypothesis, we have Ass(Mi+1 /Mi ) ∩ Ass(Mr−1 ) 6= ∅ for i = 0, . . . , r − 2 and since Ass(Mr−1 ) ⊆ Ass(M ) it follows that Ass(Mi+1 /Mi ) ∩ Ass(M ) 6= ∅ for i = 0, . . . , r − 2. It remains to show that Ass(M/Mr−1 ) ∩ Ass(M ) 6= ∅. For each i, Mi−1 ⊂ Mi , so we have ([1] Chapter IV) Ass(M1 ) ⊆ Ass(M2 ) ⊆ Ass(M1 ) ∪ Ass(M2 /M1 ) The inclusion M2 ⊆ M3 along with the inclusions in (4) imply that Ass(M2 ) ⊆ Ass(M3 ) ⊆ Ass(M2 ) ∪ Ass(M3 /M2 ) ⊆ Ass(M1 ) ∪ Ass(M2 /M1 ) ∪ Ass(M3 /M2 ). 18 (4) If we continue this process inductively, at the i-th stage we have Ass(Mi ) ⊆ Ass(Mi−1 ) ∪ Ass(Mi /Mi−1 ) ⊆ Ass(M1 ) ∪ Ass(M2 /M1 ) ∪ Ass(M3 /M2 ) ∪ . . . ∪ Ass(Mi /Mi−1 ) and finally, when i = r it gives Ass(M ) ⊆ Ass(M1 ) ∪ Ass(M2 /M1 ) ∪ . . . ∪ Ass(M/Mr−1 ). (5) Because of Condition (b) in Definition 4.9, and the fact that each Mi+1 /Mi is Cohen-Macaulay (and hence all its associated primes have the same height; see [2] Chapter 2), if for every i we pick pi ∈ Ass(Mi+1 /Mi ), then hc ≥ height p0 > height p1 > . . . > height pr−1 . where the left-hand-side inequality comes from the fact that Ass(M1 ) ⊆ Ass(M ). By our induction hypothesis, Ass(M ) intersects Ass(Mi+1 /Mi ) for all i ≤ r − 2, and so because of (5) we conclude that height pi = hc−i , and Ass(M )hc−i ⊆ Ass(Mi+1 /Mi ) for 0 ≤ i ≤ r − 2. And now Ass(M )h0 has no choice but to be included in Ass(M/Mr−1 ), which settles our claim. It also follows that c = r. 2. See the proof for part 1. 3. We use induction. The case i = 0 is clear, since for every p ∈ Ass(M1 ) = Ass(M1 /M0 ) we know from part 2 that height p = hr . Suppose the statement holds for all indices up to i − 1. Consider the inclusion Ass(Mi ) ⊆ Ass(Mi+1 ) ⊆ Ass(Mi ) ∪ Ass(Mi+1 /Mi ). From part 2 and the induction hypothesis it follows that if p ∈ Ass(Mi+1 ) then height p ≥ hr−i . p T T 4. Suppose Ann(Mi ) ⊆ p. Since Ann(Mi ) = p′ ∈Ass(Mi ) p′ , it follows that p′ ∈Ass(Mi ) p′ ⊆ p, so there is a p′ ∈ Ass(Mi ) such that p′ ⊆ p. But from parts 2 and 3 above it follows that height p′ ≥ hr−i+1 and height p = hr−i , which is a contradiction. 5. From part 4 and Lemma A.2, it follows that Ass(Mi+1 /Mi ) ⊆ Ass(Mi+1 ) ⊆ Ass(M ). 6. This follows from parts 2 and 5, and the fact that Mi+1 /Mi is Cohen-Macaulay, and hence all associated primes have the same height. 19 7. We show this by induction on e = r − i. The case e = 1 (or i = r − 1) is clear, because by part 6 we have Ass(M/Mr−1 ) = Ass(M )h1 = Ass(M )≤h1 . Now suppose the equation holds for all integers up to e − 1 (namely i = r − e + 1), and we would like to prove the statement for e (or i = r − e). Since Mi+1 /Mi ⊆ M/Mi , we have Ass(Mi+1 /Mi ) ⊆ Ass(M/Mi ) ⊆ Ass(Mi+1 /Mi ) ∪ Ass(M/Mi+1 ) (6) By the induction hypothesis and part 6 we know that Ass(M/Mi+1 ) = Ass(M )≤hr−i−1 and Ass(Mi+1 /Mi ) = Ass(M )hr−i , which put together with (6) implies that Ass(M )hr−i ⊆ Ass(M/Mi ) ⊆ Ass(M )≤hr−i We still have to show that Ass(M/Mi ) ⊇ Ass(M )≤hr−i−1 . Let p ∈ Ass(M )≤hr−i−1 = Ass(M/Mi+1 ) = Ass((M/Mi )/(Mi+1 /Mi )). If p ⊇ Ann(Mi+1 /Mi ), then (by part 6) \ p⊇ q =⇒ p ⊇ q for some q ∈ Ass(M )hr−i q∈Ass(M )hr−i which is a contradiction, as height p ≤ hr−i−1 < height q. It follows from Lemma A.2 that p ∈ Ass(M/Mi ). 8. The argument is based on induction, and exactly the same as the one in part 4, using more information; from the inclusions Ass(Mi ) ⊆ Ass(Mi+1 ) ⊆ Ass(Mi ) ∪ Ass(Mi+1 /Mi ), the induction hypothesis, and part 6 we deduce that Ass(M )≥hr−i+1 ⊆ Ass(Mi+1 ) ⊆ Ass(M )≥hr−i+1 ∪ Ass(M )hr−i , which put together with part 4, along with Lemma A.2 produces the equality. Now suppose that as a submodule of M , M0 = 0 has an irredundant primary decomposition of the form: \ h h M0 = 0 = Q 1j ∩ . . . ∩ Q sjj (7) 1≤j≤r h h h where for a fixed j ≤ r and e ≤ sj , Q ej is a primary submodule of M with Ass(M/Q ej ) = {pe j } h h and Ass(M )hj = {p1 j , . . . , psjj }. 20 Theorem A.4. Let M be a sequentially Cohen-Macaulay module with filtration as in Definition 4.9, and suppose that M0 = 0 has a primary decomposition as in (7). Then for each i = 0, . . . , r − 1, Mi has the following primary decomposition \ h h Mi = Q 1j ∩ . . . ∩ Q sjj . (8) 1≤j≤r−i Proof. We prove this by induction on r (length of the filtration). The case r = 1 is clear, as the filtration is of the form 0 = M0 ⊂ M . Now consider M with filtration 0 = M0 ⊂ M1 ⊂ . . . ⊂ Mr = M. Since Mr−1 is a sequentially Cohen-Macaulay module of length r − 1, it satisfies the statement of the theorem. We first show that Mr−1 has a primary decomposition as described in (8). From part 7 of Proposition A.3 it follows that Ass(M/Mr−1 ) = Ass(M )h1 and so for some phe 1 -primary submodules Peh1 of M (1 ≤ e ≤ sj ), we have Mr−1 = P1h1 ∩ . . . ∩ Psh11 . (9) We would like to show that Qhe1 = Peh1 for e = 1, . . . , s1 . Fix e = 1 and assume Qh11 6⊂ P1h1 . From the inclusion M0 ⊂ P1h1 and Lemma A.1 it follows h that for some e and j (with e 6= 1 if j = 1), we have pe j ⊆ ph1 1 . Because of the difference in heights h of these ideals the only conclusion is pe j = ph1 1 , which is not possible. With a similar argument we deduce that Qhe1 ⊂ Peh1 , for e = 1, . . . , s1 . h Now fix j ∈ {1, . . . , r} and e ∈ {1, . . . , sj }. If Mr−1 = Q ej we are done. Otherwise, note that h h for every j and pe j -primary submodule Q ej of M , h Q ej ∩ Mr−1 h h is a pe j -primary submodule of Mr−1 (as ∅ = 6 Ass(Mr−1 /(Q ej ∩ Mr−1 )) = Ass((Mr−1 + h h h h Q ej )/Q ej ) ⊆ Ass(M/Q ej ) = {pe j }). So M0 = 0 as a submodule of Mr−1 has a primary decomposition \ h h M0 ∩ Mr−1 = 0 = (Q 1j ∩ Mr−1 ) ∩ . . . ∩ (Q sjj ∩ Mr−1 ). 1≤j≤r From Proposition A.3 part 8 it follows that Ass(Mr−1 ) = Ass(M )≥h2 so the components Qht1 ∩ Mr−1 are redundant for t = 1, . . . , s1 , so for each such t we have \ h (Q 1j ∩ Mr−1 ) ⊆ Qht1 ∩ Mr−1 . Q hj h1 e 6=Q t 21 h h If Q ej ∩ Mr−1 6⊆ Qht1 ∩ Mr−1 for some e and j (with Q ej 6= Qht1 ), then by Lemma A.1 for some h such e and j we have pe j ⊆ pht 1 , which is a contradiction (because of the difference of heights). h Therefore, for each t (1 ≤ t ≤ s1 ), there exists indices e and j (with Q ej 6= Qht1 ) such that h Q ej ∩ Mr−1 ⊆ Qht1 ∩ Mr−1 . It follows now, from the primary decomposition of Mr−1 in (9) that for a fixed t h P1h1 ∩ . . . ∩ Psh11 ∩ Q ej ⊆ Qht1 . Assume Pth1 6⊆ Qht1 . Applying Lemma A.1 again, we deduce that h pe j ⊆ pht 1 , or there is t′ 6= t such that pht′1 ⊆ pht 1 . Neither of these is possible, so Pth1 ⊆ Qht1 for all t. We have therefore proved that Mr−1 = Qh11 ∩ . . . ∩ Qhs11 . By the induction hypothesis, for each i ≤ r − 2, Mi has the following primary decomposition \ \ h h h h Mi = (Q 1j ∩ Mr−1 ) ∩ . . . ∩ (Q sjj ∩ Mr−1 ) = Q 1j ∩ . . . ∩ Q sjj 2≤j≤r−i 1≤j≤r−i which proves the theorem. References [1] N. Bourbaki, Commutative algebra, Chapters 1–7, Elements of Mathematics (Berlin), Springer-Verlag, Berlin, 1989. [2] W. Bruns and J. Herzog, Cohen-Macaulay rings, Cambridge Studies in Advanced Mathematics 39, revised edition, 1998. [3] M. Caboara, S. Faridi and P. Selinger, Simplicial tree computations, in preparation. [4] J.A. Eagon and V. Reiner, Resolution of Stanley-Reisner rings and Alexander duality, J. Pure Appl. Algebra 130 (1998), 265–275. [5] S. Faridi, The facet ideal of a simplicial complex, manuscripta math. 109 (2002), 159–174. [6] S. Faridi, Cohen-Macaulay properties of square-free monomial ideals, preprint. [7] S. Faridi, Simplicial trees are sequentially Cohen-Macaulay, J. Pure Appl. Algebra 190 (2004), 121–136. 22 [8] R. Fröberg, A study of graded extremal rings and of monomial rings, Math. Scand. 51 (1982), 22–34. [9] J. Herzog and T. Hibi, Componentwise linear ideals, Nagoya Math. J. 153 (1999), 141–153. [10] E. Miller, Alexander duality for monomial ideals and their resolutions, math.AG/9812095. [11] G. Rota and J. Stein, Standard basis in supersymplectic algebras, Proc. Nat. Acad. Sci. U.S.A. 86 (1989), no. 8, 2521–2524. [12] P. Schenzel, On the dimension filtration and Cohen-Macaulay filtered modules, Commutative algebra and algebraic geometry (Ferrara), 245–264, Lecture Notes in Pure and Appl. Math., 206, Dekker, New York, 1999. [13] P. Schwartau, Liaison addition and monomial ideals, Ph.D. Thesis, Brandeis University, 1982. [14] R.P. Stanley, Combinatorics and commutative algebra, second edition, Progress in Mathematics 41, Birkhäuser Boston, Inc., Boston, MA, 1996. [15] J. Stückrad and W. Vogel, Buchsbaum rings and applications, Springer-Verlag, Berlin, 1986. [16] R. Villarreal, Monomial algebras, Monographs and Textbooks in Pure and Applied Mathematics 238, Marcel Dekker, Inc., New York, 2001. [17] J. Weyman, Ideals generated by monomials, Masters Thesis, N. Copernicus University, Torun, Poland in 1977. 23
0math.AC
arXiv:1512.01351v1 [math.RA] 4 Dec 2015 CLASSICAL INVARIANT THEORY FOR FREE METABELIAN LIE ALGEBRAS VESSELIN DRENSKY, ŞEHMUS FINDIK Abstract. Let KXd be a vector space with basis Xd = {x1 , . . . , xd } over a field K of characteristic 0. One of the main topics of classical invariant theory is the study of the algebra of invariants K[Xd ]SL2 (K) , where KXd is a module of the special linear group SL2 (K) isomorphic to a direct sum Vk1 ⊕ · · · ⊕ Vkr and Vk is the SL2 (K)-module of binary forms of degree k. Noncommutative invariant theory deals with the algebra of invariants Fd (V)G of the group G < GLd (K) acting on the relatively free algebra Fd (V) of a variety of K-algebras V. In this paper we consider the free metabelian Lie algebra Fd (A2 ) which is the relatively free algebra in the variety A2 of metabelian (solvable of class 2) Lie algebras. We study the algebra Fd (A2 )SL2 (K) of SL2 (K)-invariants of Fd (A2 ). We describe the cases when this algebra is finitely generated. This happens if and only if KXd ∼ = V2 as an SL2 (K)= V1 ⊕ V0 ⊕ · · · ⊕ V0 or KXd ∼ module (and in the trivial case KXd ∼ = V0 ⊕· · ·⊕V0 ). For small d we give a list of generators even when Fd (A2 )SL2 (K) is not finitely generated. The methods for establishing that the algebra Fd (A2 )SL2 (K) is not finitely generated work also for other relatively free algebras Fd (V) and for other groups G. 1. Introduction One of the most intensively studied objects in classical invariant theory is the algebra of invariants of the special linear group SL2 (C) acting on binary forms. One of the possible noncommutative generalizations is the following. We fix a field K of characteristic 0 and a vector space KXd with basis Xd = {x1 , . . . , xd }, d ≥ 2. We assume that KXd is a module of the special linear group SL2 (K) isomorphic to a direct sum Vk1 ⊕ · · · ⊕ Vkr , where Vk is the SL2 (K)-module of binary forms of degree k (and the action of SL2 (K) on KXd is not trivial, i.e., at least one ki is positive). Then we extend diagonally the action of SL2 (K) on the relatively free algebra Fd (V) freely generated by Xd in a variety of (associative, Lie, Jordan, etc.) K-algebras V. The algebra Fd (V)SL2 (K) is a noncommutative analogue of the “classical” object K[Xd ]SL2 (K) of polynomial SL2 (K)-invariants. In the general case when G is an arbitrary subgroup of GLd (K) and V is an arbitrary variety of algebras not too much is known about the algebra of G-invariants 2010 Mathematics Subject Classification. 17B01, 17B30, 13A50, 15A72, 17B63. Key words and phrases. free metabelian Lie algebras, classical invariant theory, noncommutative invariant theory. The research of the first named author was partially supported by Grant Ukraine 01/0007 of the Bulgarian Science Fund for Bilateral Scientific Cooperation between Bulgaria and Ukraine. The research of the second named author was partially supported by the Council of Higher Education (YÖK) in Turkey. The research of both authors was partially supported by Grant I02/18 of the Bulgarian Science Fund. 1 2 VESSELIN DRENSKY, ŞEHMUS FINDIK Fd (V)G in Fd (V). The picture is more or less clear for varieties of associative algebras. For finite groups G see the surveys [13, 9, 17] and for G reductive – the papers [26, 7]. In particular, Fd (V)G is finitely generated for all reductive groups G acting rationally on KXd if and only if V satisfies the Engel identity [[[x2 , x1 ], . . .], x1 ] = 0. It is well known that for varieties of Lie algebras there is a dichotomy: The variety V either contains the metabelian variety A2 or satisfies the Engel identity. Recall that the variety A2 of metabelian (solvable of class 2) Lie algebras is defined by the polynomial identity [[x1 , x2 ], [x3 , x4 ]] = 0 and the free metabelian Lie algebra Fd (A2 ) is isomorphic to the factor algebra Ld /L′′d of the free d-generated Lie algebra Ld modulo the second term L′′d = [[Ld , Ld ], [Ld , Ld ]] of its derived series. If V satisfies the Engel identity, then the celebrated result of Zel’manov [28] gives that V is nilpotent. (The fact that the Engel identity implies that Fd (V) is nilpotent with the class of nilpotency depending on d follows from the famous paper by Kostrikin [18] on the Burnside problem.) When V is nilpotent, the algebra Fd (V) is finite dimensional. Hence Fd (V)G is also finite dimensional and therefore finitely generated as a Lie algebra for all groups G. If V contains A2 , then the canonical homomorphism Fd (V) → Fd (A2 ) maps Fd (V)G onto Fd (A2 )G . Hence, concerning the finite generation of Fd (V)G , the free metabelian algebra is the key object. If the group G is finite and V contains A2 , then Fd (V)G is never finitely generated by [4, 8]. To the best of our knowledge, not too much information is available for Fd (V)G when the group G is not finite. The algebra of invariants Fd (V)G of the group G = U T2 (K) of unipotent 2 × 2 matrices acting unipotently on KXd was studied in [10, 5]. In particular, when V = A2 , the algebra Fd (A2 )UT2 (K) is finitely generated if and only if KXd = K 2 ⊕ K d−2 and U T2 (K) acts canonically on K 2 and trivially on K d−2 . In the present paper we study the algebra Fd (A2 )SL2 (K) of SL2 (K)-invariants of Fd (A2 ). We show that Fd (A2 )SL2 (K) is finitely generated if and only if KXd ∼ = V1 ⊕ V0 ⊕ · · · ⊕ V0 or KXd ∼ = V2 as an SL2 (K)-module (and in the trivial case KXd ∼ = V0 ⊕ · · · ⊕ V0 ). One of the main tools in our considerations is the Shmel’kin embedding theorem [23] which allows to consider Fd (A2 ) as a subalgebra of the abelian wreath product KAd wrKYd of two d-dimensional abelian Lie algebras KAd and KYd with bases Ad = {a1 , . . . , ad } and Yd = {y1 , . . . , yd }, respectively. To see whether Fd (A2 )SL2 (K) is finitely generated, the most difficult part of the proof is to find whether the commutator ideal Fd (A2 )′ contains nonzero invariants. For small d it can be established calculating the Hilbert (or Poincaré) series of Fd (A2 )SL2 (K) . But it has turned out that in the general case we have to embed KAd wrKYd into a Poisson algebra and then to use classical results for the existence of sufficiently many invariants of SL2 (K). The commutator ideal Fd (A2 )′ has a natural structure of a K[Xd ]-module. Well known results give that (Fd (A2 )′ )SL2 (K) is a finitely generated K[Xd ]SL2 (K) module. For small d we give a list of generators of the K[Xd ]SL2 (K) -module (Fd (A2 )′ )SL2 (K) . This allows to find explicit sets of generators of the Lie algebra Fd (A2 )SL2 (K) even if is not finitely generated. In this part our paper may be considered as a continuation of [5] where similar problems were solved for Fd (A2 )UT2 (K) . CLASSICAL INVARIANT THEORY FOR FREE METABELIAN LIE ALGEBRAS 3 Finally, we want to mention that the methods for establishing that the algebra Fd (A2 )SL2 (K) is not finitely generated work also for other relatively free algebras Fd (V) and for other groups G. 2. Preliminaries In the sequel we fix the base field K of characteristic 0. All vector spaces, algebras, tensor products, etc., will be over K. If R is any algebra generated by the elements r1 , . . . , rk and I is an ideal of R, we shall denote the generators of the factor algebra R/I with the same symbols r1 , . . . , rk . 2.1. Free metabelian Lie algebras and abelian wreath products. For a background on varieties of Lie algebras we refer to [2]. We denote by Fd the free metabelian Lie algebra Fd (A2 ) freely generated by Xd = {x1 , . . . , xd }. We assume that all Lie commutators are left normed, e.g., [x1 , x2 , x3 ] = [[x1 , x2 ], x3 ] = [x1 , x2 ]adx3 . The commutator ideal Fd′ has a basis consisting of all [xj1 , xj2 , xj3 , . . . , xjk ], 1 ≤ ji ≤ d, j1 > j2 ≤ j3 ≤ · · · ≤ jk . The algebra Fd has a grading Fd = (Fd )1 ⊕ (Fd )2 ⊕ (Fd )3 ⊕ · · · where (Fd )n is the vector subspace of all homogeneous elements of degree n. Similarly, Fd is Zd -graded (or multigraded), with grading which counts the degree of each variable xi , i = 1, . . . , d. The Hilbert series of Fd is the formal power series defined by X H(Fd , Zd ) = H(Fd , z1 , . . . , zd ) = dim(Fd )n Zdn , ni ≥0 where (Fd )n is the homogeneous component of degree n = (n1 , . . . , nd ) and Zdn = z1n1 · · · zdnd . It is well known, see e.g., [8], that H(Fd , Zd ) = 1 + (z1 + · · · + zd ) + (z1 + · · · + zd − 1) d Y 1 . 1 − zj j=1 The consequence of the metabelian identity [xj1 , xj2 , xjσ(3) , . . . , xjσ(k) ] = [xj1 , xj2 , xj3 , . . . , xjk ], where σ is an arbitrary permutation of 3, . . . , k, allows to define an action of the polynomial algebra K[Xd ] on Fd′ by the rule uf (x1 , . . . , xd ) = uf (adx1 , . . . , adxd ), u ∈ Fd′ , f (Xd ) ∈ K[Xd ]. One of the main tools in our considerations is the Shmel’kin embedding theorem [23] which allows to consider Fd (A2 ) as a subalgebra of the abelian wreath product KAd wrKYd of two d-dimensional abelian Lie algebras KAd and KYd . Recall the construction of abelian wreath products due to Shmel’kin [23]. Let KAd and KYd be the abelian Lie algebras with bases Ad = {a1 , . . . , ad } and Yd = {y1 , . . . , yd }, respectively. Let Cd be the free right K[Yd ]-module with free 4 VESSELIN DRENSKY, ŞEHMUS FINDIK generators a1 , . . . , ad . We give it the structure of a Lie algebra with trivial multiplication. Then KAd wrKYd is equal to the semidirect sum Cd ⋋ KYd . The elements of KAd wrKYd are of the form d X aj fj (Yd ) + d X βj y j , fj ∈ K[Yd ], βj ∈ K, j = 1, . . . , d. j=1 j=1 The multiplication in KAd wrKYd is defined by [Cd , Cd ] = [Yd , Yd ] = 0, [aj fj (Yd ), yi ] = aj fj (Yd )yi , i, j = 1, . . . , d. The embedding theorem of Shmel’kin [23] gives that the free metabelian Lie algebra Fd is isomorphic to the subalgebra of KAd wrKYd generated by aj +yj , j = 1, . . . , d. In the sequel we identify Fd with its copy in KAd wrKYd and assume that xj = aj + yj , j = 1, . . . , d. If u belongs to Fd′ , X X [xi , xj ]fij (adx1 , . . . , adxd ), [xi , xj ]fij (Xd ) = u= fij (Xd ) ∈ K[Xd ], i>j i>j then in KAd wrKYd u= The element d X X (ai yj − aj yi )fij (Yd ). ai fi (Xd ) ∈ KAd wrKYd i=1 belongs to Fd′ if and only if d X yi fi (Yd ) = 0. i=1 2.2. Poisson algebras. Given two algebraically independent SL2 (K)-invariants f1 (Xd ), f2 (Xd ) ∈ K[Xd ] we shall construct a nonzero SL2 (K)-invariant π(f1 , f2 ) in Fd′ . For this purpose we need to embed KAd wrKYd into a Poisson algebra. Recall that the commutative-associative algebra P with multiplication · is a (commutative) Poisson algebra if it has a Poisson bracket [·, ·] such that (P, [·, ·]) is a Lie algebra and [·, ·] satisfies the Leibniz rule [f1 · f2 , f3 ] = [f1 , f3 ] · f2 + f1 · [f2 , f3 ], f1 , f2 , f3 ∈ P. The free Poisson algebra P (Xd ) freely generated by Xd can be obtained in the following way. Fix a basis Bd = {b1 , b2 , . . .} of the free Lie algebra Ld . Then, as a commutative algebra, P (Xd ) is isomorphic to the symmetric algebra S(Ld ), i.e., to the polynomial algebra K[Bd ]. The Poisson bracket in P (Xd ) is defined extending the Lie bracket in Ld using the Leibniz rule. In the sequel we shall omit the · in the multiplication in Poisson algebras. Lemma 2.1. Let P (Ad , Yd ) be the free Poisson algebra freely generated by Ad ∪ Yd and let Rd = P (Ad , Yd )/(A2d , [Ad , Ad ], [Yd , Yd ], [ai , yj ] − ai yj | i, j = 1, . . . , d) CLASSICAL INVARIANT THEORY FOR FREE METABELIAN LIE ALGEBRAS 5 be the factor algebra of P (Ad , Yd ) modulo the ideal generated by all elements ai aj , [ai , aj ], [yi , yj ], [ai , yj ] − ai yj , i, j = 1, . . . , d. (i) As a vector space Rd has a basis {Ydq = y1q1 · · · ydqd , ai Ydq = ai y1q1 · · · ydqd | qj ≥ 0, i = 1, . . . , d}. (ii) As a commutative algebra Rd is isomorphic to the factor algebra K[Ad , Yd ]/(A2d ) modulo the ideal generated by all products ai aj , i, j = 1, . . . , d. (iii) The Poisson bracket in Rd satisfies [ai y1p1 · · · ydpd , y1q1 · · · ydqd ] = (q1 + · · · + qd )ai y1p1 +q1 · · · ydpd +qd , [y1p1 · · · ydpd , y1q1 · · · ydqd ] = [ai y1p1 · · · ydpd , aj y1q1 · · · ydqd ] = 0. (iv) The Lie algebra KAd wrKYd is isomorphic to the Lie subalgebra of Rd generated by Ad and Yd . Proof. The defining relations [ai , aj ] = [yi , yj ] = 0, [ai , yj ] = ai yj and the Leibniz rule imply that the commutators of the generators Ad and Yd can be expressed as monomials of the polynomial algebra K[Ad , Yd ]. The defining relations ai aj = 0 give that as a vector space Rd is spanned by the elements from the statement (i) of the lemma. Hence we shall prove (i), (ii), and (iii), if we show that the commutative algebra K[Ad , Yd ]/(A2d ) which has the desired basis, is a Poisson algebra with respect to the anticommutative bracket defined in (iii). In order to verify the Jacobi identity it is sufficient to check the case u1 = ai Ydp , p = (p1 , . . . , pd ), u2 = Ydq , q = (q1 , . . . , qd ), u3 = Ydr , r = (r1 , . . . , rd ). Direct verification gives that [u1 , u2 , u3 ] + [u2 , u3 , u1 ] + [u3 , u1 , u2 ] = (q1 + · · · + qd )[ai Ydp+q , Ydr ] − (r1 + · · · + rd )[ai Ydp+r , Ydq ] = ((q1 +· · ·+qd )+(r1 +· · ·+rd ))ai Ydp+q+r −((r1 +· · ·+rd )+(q1 +· · ·+qd ))ai Ydp+q+r = 0. Similarly, for the Leibniz rule it is sufficient to check the case [u1 , u2 u3 ] for the same elements u1 , u2 , u3 : [u1 , u2 u3 ] = ((q1 + r1 ) + · · · + (qd + rd ))ai Ydp+q+r = (q1 + · · · + qd )ai Ydp+q Ydr + (r1 + · · · + rd )Ydq ai Ydp+r = [u1 , u2 ]u3 + u2 [u1 , u3 ]. This proves (i), (ii), and (iii). Finally, for the proof of (iv) we see that the commutator ideal of the Lie subalgebra of Rd generated by Ad and Yd has a basis consisting of all ai Ydp = ai (adp1 y1 ) · · · (adpd yq ), p = (p1 , . . . , pd ) 6= (0, . . . , 0), the same as the commutator ideal of KAd wrKYd . The multiplication table is also the same. Hence both Lie algebras are isomorphic.  6 VESSELIN DRENSKY, ŞEHMUS FINDIK 2.3. Algebraically independent elements in Poisson algebras. The well known Jacobian criterion [16] from 1841 gives that the polynomials f1 , . . . , fk ∈ K[Xd ], k ≤ d, are algebraically dependent if and only if ∂f1 /∂xj1 ∂f1 /∂xj2 .. . ∂f2 /∂xj1 ∂f2 /∂xj2 .. . ··· ··· .. . ∂fk /∂xj1 ∂fk /∂xj2 =0 .. . ∂f1 /∂xjk ∂f2 /∂xjk ··· ∂fk /∂xjk for all determinants with 1 ≤ j1 < j2 < · · · < jk ≤ d. A simple proof for k = d can be found e.g., in [11] or [22]. We shall use the Jacobian criterion for k = 2 only (and for any d ≥ 2). For self-completeness we present an elementary proof of the part we need. Lemma 2.2. Let f1 (Xd ), f2 (Xd ) ∈ K[Xd ] and let Jij (f1 , f2 ) = ∂f1 /∂xi ∂f1 /∂xj ∂f2 /∂xi =0 ∂f2 /∂xj for all 1 ≤ i < j ≤ d. Then f1 (Xd ) and f2 (Xd ) are algebraically dependent. Proof. Let f1 (Xd ) and f2 (Xd ) be algebraically independent. We may assume that they depend essentially on all variables xi , i.e., (∂f1 /∂xi , ∂f2 /∂xi ) 6= (0, 0) for all i = 1, . . . , d. Since all determinants Jij (f1 , f2 ) are equal to 0, this means that there exist nonzero polynomials aij , bij ∈ K[Xd ] such that     aij ∂f1 ∂f2 ∂f1 ∂f2 = , 1 ≤ i < j ≤ d. , , ∂xi ∂xi bij ∂xj ∂xj Since every d + 1 polynomials in K[Xd ] are algebraically dependent, there exists a nonzero polynomial p(t1 , t2 , u1 , . . . , uk ) such that k ≤ d − 1 and p(f1 , f2 , x1 , . . . , xk ) = p(f1 , f2 , Xk ) = 0. We choose k minimal with this property, and among all such p we choose this of minimal degree with respect to uk . Since f1 , f2 are algebraically independent, we have that k > 0. We take the partial derivatives of p(f1 , f2 , x1 , . . . , xk ) with respect to xk and xk+1 : 0= ∂p(f1 , f2 , Xk ) ∂p ∂f1 ∂p ∂f2 ∂p = (f1 , f2 , Xk ) + (f1 , f2 , Xk ) + (f1 , f2 , Xk ), ∂xk ∂t1 ∂xk ∂t2 ∂xk ∂uk ∂p(f1 , f2 , Xk ) ∂p ∂f1 ∂p ∂f2 = (f1 , f2 , Xk ) + (f1 , f2 , Xk ) . ∂xk+1 ∂t1 ∂xk+1 ∂t2 ∂xk+1 Since ∂f1 /∂xk and ∂f2 /∂xk are equal, respectively, to (ak,k+1 /bk,k+1 )∂f1 /∂xk+1 and (ak,k+1 /bk,k+1 )∂f2 /∂xk+1 , the above equations give that (∂p/∂uk )(f1 , f2 , Xk ) = 0. Hence f1 , f2 , Xk annulate the polynomial (∂p/∂uk )(t1 , t2 , u1 , . . . , uk ) which is of lower degree in xk than p(t1 , t2 , u1 , . . . , uk ) and this is a contradiction. Hence k = 0, i.e., f1 and f2 are algebraically dependent.  0= If f1 (Xd ), f2 (Xd ) are polynomials in K[Xd ] considered as elements of the free Poisson algebra P (Xd ), then, see e.g., [22],   X ∂f1 ∂f2 ∂f1 ∂f2 . − [xi , xj ] [f1 , f2 ] = ∂xi ∂xj ∂xj ∂xi i<j CLASSICAL INVARIANT THEORY FOR FREE METABELIAN LIE ALGEBRAS 7 Hence f1 (Xd ), f2 (Xd ) ∈ K[Xd ] ⊂ P (Xd ) are algebraically independent in K[Xd ] if and only if [f1 , f2 ] 6= 0 in P (Xd ). An analogue for any f1 , f2 ∈ P (Xd ) was established in [21]. We cannot apply directly this result for the algebra Rd defined in the previous subsection because it is a homomorphic image of the free Poisson algebra. We believe that the following proposition is of independent interest because it allows, starting from two polynomials in commuting variables, to construct elements with prescribed properties in the free metabelian Lie algebra. Proposition 2.3. Let the homogeneous polynomials f1 (Xd ) and f2 (Xd ) be algebraically independent in K[Xd ]. Then in the Poisson algebra Rd the commutator π(f1 , f2 ) = [f1 (Ad + Yd ), f2 (Ad + Yd )] = [f1 (a1 + y1 , . . . , ad + yd ), f2 (a1 + y1 , . . . , ad + yd )]   X ∂f1 (Yd ) ∂f2 (Yd ) ∂f1 (Yd ) ∂f2 (Yd ) = (ai yj − aj yi ) − ∂yi ∂yj ∂yj ∂yi i<j is different from zero and belongs to the commutator ideal Fd′ of the free metabelian Lie algebra Fd embedded in Rd . Proof. If P is any Poisson algebra, Wd = {w1 , . . . , wd } ⊂ P , and Wdq = w1q1 · · · wdqd , Wdr = w1r1 · · · wdrd , then the Leibniz rule implies that [Wdq , Wdr ] = d X q +rj −1 [wi , wj ]qi rj w1q1 +r1 · · · wiqi +ri −1 · · · wj j · · · wdqd +rd i,j=1 = X [wi , wj ] i<j  ∂Wdq ∂Wdr ∂Wdq ∂Wdr − ∂wi ∂wj ∂wj ∂wi  . Hence, as in the case of the free Poisson algebra, for any polynomials f1 (Xd ), f2 (Xd ) ∈ K[Xd ],   X ∂f1 (Wd ) ∂f2 (Wd ) ∂f1 (Wd ) ∂f2 (Wd ) − [wi , wj ] [f1 (Wd ), f2 (Wd )] = ∂wi ∂wj ∂wj ∂wi i<j = X [wi , wj ] i<j ∂f1 (Wd )/∂wi ∂f1 (Wd )/∂wj X ∂f2 (Wd )/∂wi [wi , wj ]Jij (f1 (Wd ), f2 (Wd )). = ∂f2 (Wd )/∂wj i<j We apply this equality for Wd = Ad + Yd = {a1 + y1 , . . . , ad + yd } ⊂ Rd . Since [ai + yi , aj + yj ] = ai yj − aj yi and ak al = 0, we obtain X ∂f1 (Yd )/∂yi (ai yj − aj yi ) [f1 (Ad + Yd ), f2 (Ad + Yd )] = ∂f1 (Yd )/∂yj i<j = X (ai yj − aj yi ) i<j  ∂f2 (Yd )/∂yi ∂f2 (Yd )/∂yj ∂f1 (Yd ) ∂f2 (Yd ) ∂f1 (Yd ) ∂f2 (Yd ) − ∂yi ∂yj ∂yj ∂yi   d d X X ∂f (Y ) ∂f (Y ) ∂f (Y ) ∂f (Y ) 2 d 1 d 2 d  1 d yj − yj . ai  = ∂y ∂y ∂y ∂y i j j i j=1 j=1 i=1 d X  8 VESSELIN DRENSKY, ŞEHMUS FINDIK Since f2 (Yd ) is homogeneous, it is easy to see that d X j=1 yj ∂f2 (Yd ) = deg(f2 )f2 (Yd ). ∂yj If [f1 (Ad + Yd ), f2 (Ad + Yd )] = 0, then the coordinates of ai are equal to 0 and we obtain a homogeneous linear system d X ∂f1 (Yd ) ∂f2 (Yd ) ∂f1 (Yd ) deg(f2 )f2 (Yd ) − yj =0 ∂yi ∂yj ∂yi j=1 of d equations, for i = 1, . . . , d, with unknowns ∂f1 (Yd )/∂yj , j = 1, . . . , d. The matrix of this system is   deg(f2 )f2 − y1 ∂f2 /∂y1 −y2 ∂f2 /∂y1 ··· −yd ∂f2 /∂y1   −y1 ∂f2 /∂y2 deg(f2 )f2 − y2 ∂f2 /∂y2 · · · −yd ∂f2 /∂y2    . .. .. . .. ..   . . . −y1 ∂f2 /∂yd −y2 ∂f2 /∂yd · · · deg(f2 )f2 − yd ∂f2 /∂yd Since f2 (Yd ) 6= 0, at least one partial derivative if nonzero. Let, for example, ∂f2 /∂yd 6= 0. Subtracting the last row of the system multiplied by (∂f2 /∂yi )/(∂f2 /∂yd ) from the i-th row, we obtain an equivalent system with a matrix   deg(f2 )f2 −0 ··· 0 ∗   0 deg(f2 )f2 ··· 0 ∗     .. .. .. .. .. .  . . . . .     0 0 ··· deg(f2 )f2 ∗ −y1 ∂f2 /∂yd −y2 ∂f2 /∂yd · · · −yd−1 ∂f2 /∂yd deg(f2 )f2 − yd ∂f2 /∂yd Since f2 (Yd ) 6= 0, the rank of the matrix is ≥ d − 1. Since the system has a nonzero solution ∂f2 /∂yj = ∂f1 /∂yj , j = 1, . . . , d, the rank is d − 1. Hence all solutions of the system are ∂f2 p(Yd ) ∂f1 = , j = 1, . . . , d, ∂yj q(Yd ) ∂yj for some polynomials p(Yd ), q(Yd ) ∈ K[Yd ]. Therefore, Jij (f1 (Yd ), f2 (Yd )) = 0, i, j = 1, . . . , d, which contradicts with the algebraic independence of f1 (Y ) and f2 (Y ). Clearly, the form of the element X (ai yj − aj yi )fij (Yd ), fij (Yd ) ∈ K[Yd ], [f1 (Ad + Yd ), f2 (Ad + Yd )] = i<j shows that [f1 (Ad + Yd ), f2 (Ad + Yd )] is a Lie element and belongs to Fd′ .  2.4. Invariant theory of the special linear group. All necessary information on representation theory of the special linear group SL2 (K) and the general linear group GL2 (K) and on invariant theory of SL2 (K) can be found in many books, see e.g., [24, 27]. For a background on symmetric functions see, e.g., [19]. In our considerations we combine ideas of De Concini, Eisenbud, Procesi [6] and for the noncommutative generalizations – of Almkvist, Dicks, Formanek [1], see [3] for details. Every rational representation ρ : SL2 (K) → GLd (K) of SL2 (K) is a direct CLASSICAL INVARIANT THEORY FOR FREE METABELIAN LIE ALGEBRAS 9 sum of irreducible representations. For each nonnegative integer k there exists a unique irreducible rational (k + 1)-dimensional SL2 (K)-representation ρk : SL2 (K) → GLk+1 (K) = GL(Vk ), where Vk is the vector space of the Ξk = {ξ0 , ξ1 , . . . , ξk } of Vk and define  g g = 11 g21 bilinear forms of degree k. We fix a basis the action of GL2 (K) as follows. Let  g12 ∈ GL2 (K). g22 If K 2 is the vector space with basis {e1 , e2 } and the canonical action of GL2 (K) g(e1 ) = g11 e1 + g21 e2 , g(e2 ) = g12 e1 + g22 e2 , then the action of g on the polynomial functions f : K 2 → K is g(f )(v) = f (g −1 (v)), v = u 1 e1 + u2 e2 ∈ K 2 . In particular, the action on the coordinate functions is 1 1 u′1 = g(u1 ) = (g22 u1 − g12 u2 ), u′2 = g(u2 ) = (−g21 u1 + g11 u2 ). det(g) det(g) Hence u1 = g11 u′1 + g12 u′2 , If the binary form of degree k is u2 = g21 u′1 + g22 u′2 . k   X k ξj u1k−j uj2 j j=0       k k k = ξ0 uk1 + ξ1 u1k−1 u2 + ξ2 u1k−2 u22 + · · · + ξk−1 u1 u2k−1 + ξk uk2 , 1 2 k−1 then g acts on f (u1 , u2 ) by the rule f (u1 , u2 ) = g : f (u1 , u2 ) → f (g(u1 ), g(u2 )) = f (g11 u′1 + g12 u′2 , g21 u′1 + g22 u′2 ) k   X k ′ ′ k−j ′ j ξ (u ) (u2 ) = f ′ (u′1 , u′2 ) = j j 1 j=0 and we define g(ξj ) = ξj′ , j = 0, 1, . . . , k. Example 2.4. We shall describe the action of the matrix   1 1 g1 = ∈ SL2 (K) 0 1 on Vk . Since g1 (u1 ) = u′1 + u′2 , g1 (u2 ) = u′2 , we have k   k   X X k k k−j j ξj (u′1 + u′2 )k−j (u′2 )j ξj u1 u2 = f (u1 , u2 ) = j j j=0 j=0 =  k−j   k X X k k−j ξj (u′1 )k−j−i (u′2 )i+j j i j=0 i=0 10 VESSELIN DRENSKY, ŞEHMUS FINDIK =   k−j  k X X k i+j ξj (u′1 )k−(j+i) (u′2 )i+j . i + j j j=0 i=0 In the above expression the summation is the same as for l = i + j = 0, 1, . . . , k, j = 0, 1, . . . , i + j = l, and we obtain   k   X l   k   X X k  l k ′ ′ k−l ′ l f (u1 , u2 ) = ξj  (u′1 )k−l (u′2 )l = ξ (u ) (u2 ) . l j l l 1 j=0 l=0 l=0 Hence the action of g1 on ξl is defined by l   X l ξj , g1 (ξl ) = ξl′ = j j=0 l = 0, 1, . . . , k. Similarly, the action of g2 =   1 0 1 1 on Vk is g2 (ξk−l ) = l   X l j=0 j ξk−j , l = 0, 1, . . . , k. If KXd is isomorphic to a direct sum Vk1 ⊕ · · · ⊕ Vkr , we may change linearly the variables and assume that the bases of the SL2 (K)-submodules Vki of KXd are subsets of Xd . If KXk+1 = Vk we shall identify x1 , x2 , . . . , xk+1 with ξ0 , ξ1 , . . . , ξk , respectively. The following statement is a part of classical invariant theory, see [15, p. 318 in the 1893 original]. A modern proof can be found, e.g., in [24, p. 65]. Proposition 2.5. Let KXk+1 = Vk be the SL2 (K)-module of the binary forms of degree k. Then the transcendence degree on the algebra of invariants K[Xk+1 ]SL2 (K) is   0, if k = 1; SL2 (K) transc.deg(K[Xk+1 ] ) = 1, if k = 2;   k − 2, if k > 2. Example 2.6. The following cases are well known for more than 100 years, see [14]. They can be seen directly computing the Hilbert series of the algebra of invariants and checking that the given elements are SL2 (K)-invariants (see the comments below). (i) If KX2 = V1 , then K[X2 ]SL2 (K) = K. (ii) Let KX3 = V2 , then K[X3 ]SL2 (K) = K[f ], where f = x22 − x1 x3 is the discriminant. (iii) Let KX4 = V1 ⊕ V1 , where the two copies of V1 are generated by x1 , x2 and x3 , x4 , respectively. Then K[X4 ]SL2 (K) = K[f ], where f = x1 x4 − x2 x3 . We use the same notation ρk and Vk , respectively, for the polynomial representation of GL2 (K) and the corresponding GL2 (K)-module of the binary forms of degree k. As in the case of rational representations of SL2 (K), every polynomial representation of GL2 (K) is a direct sum of irreducible representations. Every irreducible representation is of the form detl ⊗ ρk , where det : GL2 (K) → K is defined by det : g → det(g), g ∈ GL2 (K). Clearly, the representation detl ⊗ ρk is the CLASSICAL INVARIANT THEORY FOR FREE METABELIAN LIE ALGEBRAS 11 same as the representation indexed by the partition (k + l, l). If the representation ρ : SL2 (K) → GLd (K) = GL(KXd ) is of the form ρk1 ⊕ · · · ⊕ ρkr , i.e., KXd = Vk1 ⊕ · · · ⊕ Vkr , we extend the action of SL2 (K) to the action of GL2 (K). Then we extend this action diagonally on the polynomial algebra K[Xd ]: g(f (Xd )) = g(f (x1 , . . . , xd )) = f (g(x1 ), . . . , g(xd )), g ∈ SL2 (K), f (Xd ) ∈ K[Xd ]. The homogeneous component K[Xd ]n of degree n is a direct sum of GL2 (K)modules X K[Xd ]n = mn (k, l)(detl ⊗ Vk ), l,k≥0 where the nonnegative integer mn (k, l) is the multiplicity of detl ⊗Vk in K[Xd ]n . The following well known lemma, see e.g., [6] describes the SL2 (K)- and U T2 (K)invariants of polynomial GL2 (K)-modules. Lemma 2.7. Let the (finite dimensional) polynomial GL2 (K)-module V decompose as X V = m(k, l)(detl ⊗ Vk ). l,k≥0 SL2 (K) (i) The subspace V of the SL2 (K)-invariants in V is spanned by the onedimensional GL2 (K)-submodules detl ⊗ V0 . (ii) Each summand m(k, l)(detl ⊗ Vk ) of V has m(k, l) linearly independent elei ments wkl , i = 1, 2, . . . , m(k, l), (one in each irreducible component detl ⊗ Vk ) such that the vector space V UT2 (K) has a basis i {wkl | i = 1, 2, . . . , m(k, l), k, l ≥ 0}. SL2 (K) The above lemma implies that the homogeneous component K[Xd ]n degree n of the algebra of SL2 (K)-invariants K[Xd ]SL2 (K) is X K[Xd ]nSL2 (K) = mn (0, l)(detl ⊗ V0 ) of l≥0 and the Hilbert series of K[Xd ]SL2 (K) is H(K[Xd ]SL2 (K) , z) = XX mn (0, l)z n . n≥0 l≥0 Let D2 (K) be the diagonal subgroup of GL2 (K). Then detl ⊗ Vk has a basis {v0 , v1 , . . . , vk } of eigenvectors of D2 (K) and   α1 0 : vj → αk+l−j αl+j 0 6= α1 , α2 ∈ K. 1 2 vj , 0 α2 The element v0 is equal up to a multiplicative constant to the element wkl ∈ detl ⊗Vk from Lemma 2.7. The corresponding character of D2 (K) is   α1 0 → S(k+l,l) (α1 , α2 ), χ(detl ⊗ Vk ) : 0 α2 where S(k+l,l) (t1 , t2 ) = (t1 t2 )l (tk1 + t1k−1 t2 + · · · + t1 t2k−1 + tk2 ) 12 VESSELIN DRENSKY, ŞEHMUS FINDIK is the Schur function. This defines a Z2 -grading (or bigrading) on detl ⊗ Vk and hence on K[Xd ]. The Hilbert series of K[Xd ] which counts both this bigrading and the usual grading is X HGL2 (K) (K[Xd ], t1 , t2 , z) = mn (k, l)S(k+l,l) (t1 , t2 )z n . l,k,n≥0 The Hilbert series H(K[Xd ], Zd ) = H(K[Xd ], z1 , . . . , zd ) = d Y i=1 1 1 − zi of the Zd -graded algebra K[Xd ] and HGL2 (K) (K[Xd ], t1 , t2 , z) are related in the following way. If {xj , xj+1 , . . . , xj+ki } is the basis of Vki , we replace the variables zj , zj+1 , . . . , zj+ki , respectively, with tk1i z, t1ki −1 t2 z, . . . , tk2i z. Then HGL2 (K) (K[Xd ], t1 , t2 , z) = H(K[Xd ], tk11 z, t1k1 −1 t2 z, . . . , tk2r z). There are many methods to compute the Hilbert series of K[Xd ]SL2 (K) . We have chosen the following. We define the multiplicity series of HGL2 (K) (K[Xd ], t1 , t2 , z) X MGL2 (K) (K[Xd ], t1 , t2 , z) = mn (k, l)tk1 (t1 t2 )l z n , l,k,n≥0 which is the generating function of the multiplicities mn (k, l) of the irreducible GL2 (K)-components in K[Xd ]n . We introduce new variables t = t1 , u = t1 t2 and rewrite MGL2 (K) (K[Xd ], t1 , t2 , z) in the form X ′ (K[X ], t, u, z) = MGL mn (k, l)tk ul z n . d (K) 2 l,k,n≥0 ′ MGL (K[Xd ], 0, u, z) 2 (K) Then does not depend on t and ′ is the component of MGL (K[Xd ], t, u, z) which 2 (K) ′ H(K[Xd ]SL2 (K) , z) = MGL (K[Xd ], 0, 1, z). 2 (K) ′ For the computing of MGL2 (K) (K[Xd ], t1 , t2 , z) and MGL (K[Xd ], t, u, z) we have 2 (K) used the methods in [3] which origin from classical work of Elliott [12] and MacMahon [20]. But it is much easier to verify that the formal power series f (t1 , t2 , z) is equal to MGL2 (K) (K[Xd ], t1 , t2 , z). It is sufficient to see whether 1 (t1 f (t1 , t2 , z) − t2 f (t2 , t1 , z)). t1 − t2 In the sequel we shall also need partial cases of the Young rule and rules for symmetric and skew-symmetric tensor squares. The proofs can be found, respectively, in [19] and [25]. HGL2 (K) (K[Xd ], t1 , t2 , z) = Lemma 2.8. (i) The tensor product of the GL2 (K)-modules Vk and Vm , k ≥ m, decomposes as m M Vk ⊗ Vm = detn ⊗ Vk+m−2n . n=0 (ii) The symmetric tensor square of the GL2 (K)-module Vk which identifies v ′ ⊗ ′′ v and v ′′ ⊗ v ′ decomposes as m M V2m ⊗sym V2m = det2n ⊗ V4(m−n) , n=0 CLASSICAL INVARIANT THEORY FOR FREE METABELIAN LIE ALGEBRAS 13 if k = 2m is even and V2m+1 ⊗sym V2m+1 = m M det2n ⊗ V4(m−n)+2 , n=0 if k = 2m + 1 is odd. (iii) The skew-symmetric tensor square of the GL2 (K)-module Vk which identifies v ′ ⊗ v ′′ and −v ′′ ⊗ v ′ decomposes as m M V2m ⊗skew V2m = det2n−1 ⊗ V4(m−n)+2 , n=1 if k = 2m is even and V2m+1 ⊗skew V2m+1 = m M det2n+1 ⊗ V4(m−n) , n=0 if k = 2m + 1 is odd. Remark 2.9. Let v be an element of the polynomial GL2 (K)-module V . In order to check that v is SL2 (K)-invariant it is not necessary to check that g(v) = v for all g ∈ SL2 (K). It is well known that it is enough to see this only for the matrices g1 and g2 from Example 2.4. The matrices g1 and g2 are unitriangular. Hence the matrices gi − 1, i = 1, 2, act as nilpotent operators on V and the logarithm X (gi − 1)n , i = 1, 2, δi = log(gi ) = (−1)n−1 n n≥1 is well defined. In the polynomial case, one may extend the action of δi on V to a derivation of K[V ] by the rule δ(uv) = δ(u)v + uδ(v), u, v ∈ K[V ], and then by linearity on the whole K[V ]. Then f ∈ K[V ] is an SL2 (K)-invariant if and only if δi (f ) = 0, i = 1, 2. This verification is much simpler than the checking that gi (f ) = f , i = 1, 2. Similar arguments work for the tensor algebra on V (which is isomorphic to the free associative algebra KhV i), for the free Lie algebra on V , etc. Example 2.10. Consider the element k   X k (−1)i ξi ⊗ ξk−i ∈ Vk ⊗ Vk . w= i i=0 This element is bihomogeneous of degree (k, k). Direct verification shows that g1 (w) = g2 (w) = w (or, equivalently, w belongs to the kernel of the derivations log(g1 ) and log(g2 ) of the tensor algebra on Vk ). Hence w belongs to (Vk ⊗Vk )SL2 (K) and, in the notation of Lemma 2.8 (i), generates the irreducible GL2 (K)-component detk ⊗V0 . By Lemma 2.8 (ii) and (iii), when k = 2m is even, w 6= 0 in the symmetric square V2m ⊗sym V2m . When k = 2m + 1 is odd, w 6= 0 in V2m+1 ⊗skew V2m+1 . We identify Vk and KXk+1 . Then the symmetric tensor square V2m ⊗sym V2m may be identifies with the GL2 (K)-module of the homogeneous quadratic polynomials in K[X2m+1 ]. Similarly, we may consider the elements of the skew-symmetric tensor square V2m+1 ⊗skew V2m+1 as homogeneous elements of second degree in the metabelian Lie algebra F2m+2 . In this way we obtain the SL2 (K)-invariants 2m+1 X  2m  w2m+1 = (−1)i−1 xi x2m+2−i i − 1 i=1 14 VESSELIN DRENSKY, ŞEHMUS FINDIK    m  X 2m 2m i−1 (−1) xi x2m+2−i + (−1)m x2m+1 ∈ K[X2m+1 ]SL2 (K) , =2 i − 1 m i=1 2m+2 X 2m + 1 (−1)i−1 [xi , x2m+3−i ] w2m+2 = i − 1 i=1 m+1 X 2m + 1 ′ (−1)i−1 [xi , x2m+3−i ] ∈ (F2m+2 )SL2 (K) . =2 i − 1 i=1 2.5. Noncommutative invariant theory for arbitrary groups. Let V be a variety of K-algebras. We shall assume that V is a variety of Lie algebras. Since the base field K is of characteristic 0, and hence infinite, the relatively free algebra Fd (V) is Zd -graded. The action of the group GLd (K) = GL(KXd ) on KXd is extended diagonally on Fd (V): g(f (Xd )) = g(f (x1 , . . . , xd )) = f (g(x1 ), . . . , g(xd )), g ∈ GLd (K), f (Xd ) ∈ Fd (V). Let G be a subgroup of GLd (K) = GL(KXd ). Then the algebra of G-invariants is Fd (V)G = {f (Xd ) ∈ Fd (V) | g(f (Xd )) = f (Xd ) for all g ∈ G}. The following lemma is well known, see e.g., [10, Proposition 4.2] for the case of varieties of associative algebras. Lemma 2.11. Let V and W be two varieties of algebras and V ⊂ W. Let G be a subgroup of GLd (K) = GL(KXd ). Then the natural homomorphism Fd (W) → Fd (V) maps Fd (W)G onto Fd (V)G . Hence, if the algebra Fd (V)G is not finitely generated, then the same is Fd (W)G . As a result of the dichotomy of the varieties of Lie algebras (either V contains A2 or V satisfies the Engel identity and is nilpotent), the G-invariants of the free metabelian Lie algebra are the key object in the study of the finite generation of Fd (V)G . We give a couple of cases when the algebra Fd (A2 )G is not finitely generated. We shall assume that GLd (K) acts in the same way on the vector spaces KXd , KAd , and KYd . If g ∈ GLd (K), then g(xj ) = d X i=1 αij xi , g(aj ) = d X αij ai , i=1 g(yj ) = d X αij yi , j = 1, . . . , d, i=1 with the same αij for Xd , Ad , and Yd . Lemma 2.12. Let the subgroup G of GLd (K) = GL(KXd ) be such that the vector space KXd has no G-fixed elements (i.e., (KXd )G = 0) and the algebras K[Xd ]G and Fd (A2 )G are nontrivial (i.e., K[Xd ]G 6= K and Fd (A2 )G 6= 0). Then the Lie algebra Fd (A2 )G is not finitely generated. Proof. Since the algebra FdG = Fd (A2 )G is graded, the condition (KXd )G = 0 gives that FdG ⊂ Fd′ . Hence the algebra FdG is abelian and it is sufficient to show that it is infinite dimensional. Working in the Poisson algebra Rd from Subsection 2.2, if u ∈ Rd′ = [Rd , Rd ] and f ∈ K[Yd ] ⊂ Rd are homogeneous nonzero elements, then the element uf is also nonzero. Starting with a nonzero homogeneous u ∈ (Fd′ )G and with a homogeneous polynomial of positive degree f ∈ K[Xd ]G , we obtain an infinite sequence of elements uf n ∈ Fd′ , n = 0, 1, 2, . . . which are linearly independent in Rd because are of different degrees. Since g(uf n ) = g(u)g(f )n = uf n for all g ∈ G, we conclude that uf n ∈ (Fd′ )G and complete the proof.  CLASSICAL INVARIANT THEORY FOR FREE METABELIAN LIE ALGEBRAS 15 Proposition 2.13. Let (KXd )G = 0 for the subgroup G of GLd (K) = GL(KXd ) and let the transcendence degree of K[Xd ]G be greater than 1. Then the Lie algebra Fd (A2 )G is not finitely generated. Proof. Since transc.deg(K[Xd ]G ) > 1, the algebra contains two algebraically independent homogeneous invariants f1 and f2 . Then the element π(f1 , f2 ) = [f1 (Ad + Yd ), f2 (Ad + Yd )] ∈ Rd Fd′ . belongs to Also, if g ∈ G, then g(f1 (Ad + Yd )) = f1 (Ad + Yd ), g(f2 (Ad + Yd )) = f2 (Ad + Yd ). Hence g(π(f1 , f2 )) = [g(f1 (Ad + Yd )), g(f2 (Ad + Yd ))] = [f1 (Ad + Yd ), f2 (Ad + Yd )] and π(f1 , f2 ) ∈ (Fd′ )G . Now the proof follows from Lemma 2.12.  Finally, computing the Hilbert series of the SL2 (K)-invariants of the free metabelian Lie algebra Fd , we may apply exactly the same methods as for the SL2 (K)invariants of K[Xd ]. Starting with the decomposition of the SL2 (K)-module KXd and the Hilbert series H(Fd , Zd ) of Fd we obtain the Hilbert series X HGL2 (K) (Fd , t1 , t2 , z) = mn,k,l (Fd )S(k+l,l) (t1 , t2 )z n , k,l,n≥0 the multiplicity series MGL2 (K) (Fd , t1 , t2 , z) = X mn,k,l (Fd )tk1 (t1 t2 )l z n , k,l,n≥0 ′ MGL (Fd , t, u, z) = 2 (K) X mn,k,l (Fd )tk ul z n , k,l,n≥0 and the Hilbert series SL2 (K) H(Fd ′ , z) = MGL (Fd , 0, 1, z) 2 (K) SL (K) of Fd 2 . See [5] where such computations were performed for the multiplicity series of Fd . 3. Infinite generation of the metabelian invariants of the special linear group In this section we assume that SL2 (K) acts rationally on the vector space KXd and KXd ∼ = Vk1 ⊕ · · · ⊕ Vkr , where Vk is the SL2 (K)-module of binary forms of degree k. When necessary we extend the SL2 (K)-action to GL2 (K). If V ′ is an SL2 (K)-submodule of KXd we assume that it is spanned by a subset of Xd . We denote by Fd the free metabelian Lie algebra generated by Xd . Following our agreement, if KXd has an SL2 (K)-invariant subspace we may assume that it has a basis {xk+1 , . . . , xd } and its complement has a basis {x1 , . . . , xk }. Then the subalgebra of SL2 (K)-invariants in K[Xd ] has the form K[Xd ]SL2 (K) = (K[Xk ]SL2 (K) )[xk+1 , . . . , xd ]. 16 VESSELIN DRENSKY, ŞEHMUS FINDIK SL (K) We shall derive an analogue of this fact for the algebra Fd 2 which shows how SL2 (K) SL (K) to obtain the generators of Fd if we know the generators of Fd−12 . The proof is based on a similar statement for the algebra of U T2 (K)-invariants from [5]. We shall work in the Poisson algebra Rd = P (Ad , Yd )/(A2d , [Ad , Ad ], [Yd , Yd ], [ai , yj ] − ai yj | i, j = 1, . . . , d) from Lemma 2.1. The lemma gives that the Lie algebra KAd wrKYd is isomorphic to the Lie subalgebra of Rd generated by Ad and Yd . Hence the free metabelian Lie algebra Fd is embedded in Rd as the Lie subalgebra generated by Xd = Ad + Yd = {xi = ai + yi | i = 1, . . . , d}. Clearly, the unitary associative subalgebra of Rd generated by Xd is isomorphic to the polynomial algebra K[Xd ]. By Proposition 2.3, if f1 (Xd ) and f2 (Xd ) are two polynomials in K[Xd ] ⊂ Rd , then the commutator π(f1 (Xd ), f2 (Xd )) = [f1 (Ad + Yd ), f2 (Ad + Yd )]   X ∂f1 (Yd ) ∂f2 (Yd ) ∂f1 (Yd ) ∂f2 (Yd ) − (ai yj − aj yi ) = ∂yi ∂yj ∂yj ∂yi i<j   X ∂f1 (Xd ) ∂f2 (Xd ) ∂f1 (Xd ) ∂f2 (Xd ) [xi , xj ] = − ∂xi ∂xj ∂xj ∂xi i<j belongs to the commutator ideal Fd′ of Fd ⊂ Rd . Proposition 3.1. Let xd ∈ KXd be SL2 (K)-invariant and let KXd = KXd−1 ⊕ Kxd as SL2 (K)-modules. Let {vi | i ∈ I} and {uj | j ∈ J} be, respectively, homo′ geneous bases of (Fd−1 )SL2 (K) and ω(K[Xd−1 ])SL2 (K) with respect to the usual Zgrading, where ω(K[Xd−1 ]) is the augmentation ideal of K[Xd−1 ]. Then (Fd′ )SL2 (K) ⊂ Rd has a basis consisting of vi ydn = vi adn xd , π(xd , uj )ydn = d−1 X [xd , xk ] k=1 i ∈ I, n ≥ 0, ∂uj (adXd−1 )adn xd , ∂xk j ∈ J, n ≥ 0. Proof. We consider the group U T2 (K) as a subgroup of SL2 (K), both groups acting on KXd . Hence U T2 (K) acts unitriangularly on the irreducible SL2 (K)components of KXd . Then the algebras of U T2 (K)-invariants K[Xd ]UT2 (K) and UT (K) Fd 2 coincide, respectively, with the algebras of constants (i.e., the kernels) δ1 K[Xd ] and Fdδ1 of the Weitzenböck (i.e., locally nilpotent linear) derivation δ1 = log(g1 ). A basis of the vector space (Fd′ )UT2 (K) is given in [5, Theorem 4.3]. We translate it in the language of our paper. Let {vi | i ∈ I} and {uj | j ∈ J} be, re′ spectively, homogeneous bases of (Fd−1 )UT2 (K) and ω(K[Xd−1 ])UT2 (K) with respect 2 ′ UT2 (K) to both Z- and Z -gradings. Then (Fd ) as a subspace of KAd wrKYd ⊂ Rd has a basis {vi ydn , π(xd , uj )ydn | i ∈ I, j ∈ J, n ≥ 0}. UT (K) A bihomogeneous element in K[Xd ]UT2 (K) or in Fd 2 of bidegree (p, q) is SL2 (K)invariant if and only if p = q. Since the elements xd , ad , yd are of bidegree (0, 0), the vector space (Fd′ )SL2 (K) has a basis consisting of the basis elements vi ydn and π(xd , uj )ydn of (Fd′ )UT2 (K) with the property that the bidegrees of vi and uj are CLASSICAL INVARIANT THEORY FOR FREE METABELIAN LIE ALGEBRAS 17 equal to (pi , pi ) and (qj , qj ), respectively. But this condition simply means that ′ vi ∈ (Fd−1 )SL2 (K) and uj ∈ ω(K[Xd−1 ])SL2 (K) . To complete the proof it is sufficient to see that vi ydn = vi adn xd , i ∈ I, n ≥ 0, π(xd , uj )xnd = d−1 X k=1 [xd , xk ] ∂uj (adXd−1 )adn xd ∂xk j ∈ J, n ≥ 0.  Lemma 3.2. Let KXd = V ′ ⊕ V ′′ , where V ′ = KXe = K{x1 , . . . , xe } and V ′′ are SL2 (K)-submodules of KXd and let Fe be the Lie subalgebra of Fd generated by Xe . Then the natural projection ν : Fd → Fe which send xe+1 , . . . , xd to 0 maps SL (K) SL (K) Fd 2 onto Fe 2 . Proof. As a vector space Fd = Fe ⊕ ker(ν). Since both Fe and ker(ν) are SL2 (K)modules, it is clear that every SL2 (K)-invariant f ∈ Fd is a sum of an SL2 (K)invariant f ′ ∈ Fe (which depends on the variables Xe only) and an SL2 (K)invariant f ′′ ∈ ker(ν) (and f ′′ is a linear combination of commutators which depend SL (K) SL (K) essentially on the other variables xe+1 , . . . , xd ). Hence ν(Fd 2 ) = Fe 2 .  SL (K) Our strategy to determine whether the algebra Fd 2 is finitely generated SL (K) will be the following. We shall describe the cases when Fk+12 is not finitely V is an irreducible SL (K)-module. We shall show that generated and KXk+1 ∼ = k 2 this holds if and only if k > 2. In view of the above Lemma 3.2, this will imply SL (K) that Fd 2 is never finitely generated if KXd contains a submodule Vk , k > 2. By similar arguments we shall eliminate the cases when KXd contains a submodule isomorphic to V2 ⊕ Vk , k = 0, 1, 2, and V1 ⊕ V1 . In all other cases, namely when SL (K) d = 3 and KXd = V2 or KXd = V1 ⊕ V0 ⊕ · · · ⊕ V0 , we shall show that Fd 2 is finitely generated. SL (K) is Lemma 3.3. Let d = k + 1 and KXk+1 ∼ = Vk , k ≥ 3. Then the algebra Fk+12 not finitely generated. Proof. The group SL2 (K) does not fix any nonzero element of Vk because k ≥ 3, If k ≥ 4 we use Proposition 2.5 which gives that the transcendence degree of SL (K) K[Xk+1 ]SL2 (K) is equal to k − 2 ≥ 2 and by Proposition 2.13 the algebra Fk+12 is not finitely generated. If k = 3 we shall apply Lemma 2.12. Since the transcendence degree of K[X4 ]SL2 (K) 6= K is equal to 1 and K[X4 ]SL2 (K) 6= K, it is sufficient SL (K) SL (K) to show that F4 2 6= 0. A nonzero element in F4 2 is given in Example 2.10.  Remark 3.4. We may give a constructive proof of Lemma 3.3. Example 2.10 SL (K) provides a nonzero element in Fk+12 for k ≥ 3 odd. In order to apply Lemma 2.12 we need an SL2 (K)-invariant polynomial of positive degree. For this purpose we may take the discriminant. Recall that if θ1 , . . . , θk are the zeros of the polynomial f (t) = ξ0 tk + ξ1 tk−1 + · · · + ξk−1 t + ξk , then the discriminant Y ξ02k−2 (θi − θj )2 1≤i<j≤k 18 VESSELIN DRENSKY, ŞEHMUS FINDIK of f (t) is an SL2 (K)-invariant polynomial of degree 2(k − 1) in K[Vk ] = K[Xk+1 ]. For k > 3 even we may choose one more explicit SL2 (K)-invariant of second degree in K[Xk+1 ], namely the element Example 2.10. Then we may produce a nonzero SL (K) element in Fk+12 applying Proposition 2.3. Lemma 3.5. Let ∼ V1 ⊕ V0 ⊕ · · · ⊕ V0 , KXd = where V1 and V0 ⊕ · · · ⊕ V0 have bases X2 and {x3 , . . . , xd }, respectively. Then the SL (K) algebra Fd 2 is generated by [x2 , x1 ] and {x3 , . . . , xd }. Proof. We proceed by induction on d applying Proposition 3.1 in each step. For d = 2 we have that K[X2 ]SL2 (K) = K[V1 ]SL2 (K) = K. Since as a GL2 (K)-module F2′ decomposes as a direct sum of det ⊗Vn , n ≥ 0, we obtain that F2SL2 is the one-dimensional vector space spanned by the commutator [x2 , x1 ]. By induction, SL (K) we assume that the Lie algebra Fd−12 is generated by [x2 , x1 ], x3 , . . . , xd−1 and has a basis consisting of all commutators [x2 , x1 ]adn3 x3 · · · adnd−1 xd−1 , ni ≥ 0, i = 3, . . . , d − 1, containing [x2 , x1 ] and all commutators [xi1 , xi2 , . . . , xin ], i1 > i2 ≤ · · · ≤ in , ij = 3, . . . , d − 1, n = 1, 2, . . . . The vector space of the SL2 (K)-invariants in the augmentation ideal of K[Xd−1 ] has a basis consisting of all monomials in x3 , . . . , xd−1 . Now Proposition 3.1 implies that the SL2 (K)-invariants in Fd′ are spanned by the elements [x2 , x1 ]adn3 x3 · · · adnd xd and the commutators of length ≥ 2 in x3 , . . . , xd . Since x3 , . . . , xd belong to SL (K) SL (K) Fd 2 , this implies that Fd 2 is generated by [x2 , x1 ] and {x3 , . . . , xd }.  SL (K) = 0. Lemma 3.6. Let d = 3 and KX3 ∼ = V2 , Then F3 2 Proof. In [5, Example 3.2] we have computed the Hilbert series of the algebra UT (K) F3 2 : t31 t2 z 2 UT (K) HGL2 (F3 2 , t1 , t2 , z) = t21 z + (1 − t21 z)(1 − t1 t2 z) = t21 z + tu2 z 2 t1 (t1 t2 )2 z 2 = t2 z + , 2 2 (1 − t1 z)(1 − t1 t2 z) (1 − t z)(1 − uz) SL (K) where t = t1 , u = t1 t2 . Since the Hilbert series of F3 2 is obtained from UT2 (K) the Hilbert series of F3 substituting t = 0 and u = 1, we obtain that SL (K) SL (K) H(F3 2 , z) = 0, and hence F3 2 = 0.  SL (K) is Lemma 3.7. Let KXd ∼ = V1 ⊕ V1 , V2 ⊕ V0 , V2 ⊕ V1 or V2 ⊕ V2 . Then Fd 2 not finitely generated. Proof. If KXd ∼ = Vi ⊕ Vj , we assume that Vi and Vj have bases {x1 , . . . , xi+1 } and {xi+2 , . . . , xi+j+2 }, respectively. First, we shall construct nonzero elements in (Fd′ )SL2 (K) . (i) Let d = 4 and KX4 ∼ = V1 ⊕ V1 . Consider the element v11 = [x1 , x4 ] − [x2 , x3 ] ∈ F4 . SL2 (K) Applying Remark 2.9 we see that g1 (v11 ) = g2 (v11 ) = v11 . Hence v11 ∈ F4 . CLASSICAL INVARIANT THEORY FOR FREE METABELIAN LIE ALGEBRAS 19 (ii) Let d = 4 and KX4 ∼ = V2 ⊕ V0 . By Example 2.6 the element f = x22 − x1 x3 SL2 (K) belongs to K[X3 ] = K[V2 ]SL2 (K) . Since x4 is an SL2 (K)-invariant, applying Proposition 3.1 we obtain the nonzero element v20 = π(x4 , f ) = 3 X [x4 , xk ] k=1 ∂f (adX3 ) ∂xk = 2[x4 , x2 , x2 ] − [x4 , x1 , x3 ] − [x4 , x3 , x1 ] ∈ (F4′ )SL2 (K) . (iii) Let d = 5 and KX5 ∼ = V2 ⊕ V1 . Then the simplest nonzero SL2 (K)-invariant is SL (K) v21 = [x4 , x5 ] ∈ F5 2 . (iv) Let d = 6 and KX6 ∼ = V2 ⊕ V2 . Using the element   2 X 2 (−1)i ξi ⊗ ξ2−i = ξ0 ⊗ ξ2 − 2ξ1 ⊗ ξ1 + ξ2 ⊗ ξ0 ∈ V2 ⊗ V2 w= i i=0 from Example 2.10 we can obtain the nonzero SL2 (K)-invariant SL2 (K) v22 = [x1 , x6 ] − 2[x2 , x5 ] + [x3 , x4 ] ∈ F6 . By Example 2.6 in all four cases we have SL2 (K)-invariants of positive degree in K[Xd ]. In (i) this is f = x1 x4 − x2 x3 and in (ii)–(iv) – f = x22 − x1 x3 . Since SL (K) KXd 2 = 0 in the cases (i), (iii) and (iv), by Lemma 2.12 we conclude that the SL2 (K) algebra Fd is not finitely generated. SL (K) Let us assume that in the case (ii) the algebra F4 2 is finitely generated. SL2 (K) SL2 (K) Since KX4 = Kx4 , this implies that F4 is generated by x4 and a finite number of elements u1 , . . . , uk ∈ (F4′ )SL2 (K) . Hence (F4′ )SL2 (K) is spanned by ui adn x4 , But (F4′ )SL2 (K) i = 1, . . . , k, n ≥ 0. contains the infinite sequence of elements v22 (ad2 x2 − adx1 adx3 )m , m = 0, 1, 2, . . . , and for sufficiently large m these elements cannot be expressed as linear combinaSL (K) tions of ui adn x4 . Again, F4 2 is not finitely generated.  The following theorem is one of the main results of the paper. Theorem 3.8. Let KXd be isomorphic as an SL2 (K)-module to the direct sum Vk1 ⊕· · ·⊕Vkr , where (k1 , . . . , kr ) 6= (0, . . . , 0) and let Fd = Fd (A2 ) be the d-generated SL (K) free metabelian Lie algebra. Then the algebra Fd 2 of SL2 (K)-invariants is finitely generated if and only if KXd ∼ = V2 . = V1 ⊕ V0 ⊕ · · · ⊕ V0 or KXd ∼ Proof. Let KXd ∼ = Vk1 ⊕ · · · ⊕ Vkr . We may assume that k1 ≥ · · · ≥ kr . By SL (K) Lemmas 3.5 and 3.6 the algebra Fd 2 is finitely generated in the cases KXd ∼ = ∼ V1 ⊕ V0 ⊕ · · · ⊕ V0 and KXd = V2 . Hence we have to show that in the cases (i) SL (K) k1 ≥ 3; (ii) k1 = 2, r ≥ 2; (iii) k1 = k2 = 1 the algebra Fd 2 is not finitely generated. Applying Lemma 3.2 we reduce the considerations to the following three cases: SL (K) (i′ ) KXd ∼ is not finitely = Vk , k ≥ 3. By Lemma 3.3 the algebra Fd 2 generated. (ii′ ) KXd ∼ = V2 ⊕ Vi , i = 0, 1, 2. Now we apply Lemma 3.7. 20 VESSELIN DRENSKY, ŞEHMUS FINDIK (iii′ ) KXd ∼ = V1 ⊕ V1 . We apply Lemma 3.7 again and complete the proof of the theorem.  4. Explicit invariants in small dimensions In this section we compute the explicit generators of the finitely generated K[Xd ]SL2 (K) -module (Fd′ )SL2 (K) for d ≤ 5 and for d = 6 when KX6 ∼ = V2 ⊕ V2 and KX6 ∼ = V1 ⊕ V1 ⊕ V1 . We omit the cases containing V0 as a component of KXd by Proposition 3.1. In what follows, the Hilbert series are obtained from [5, Example 3.2] and the generators and the relations between them from [5, Section 5], taking into account the homogeneous components of bidegree (n, n) only. Example 4.1. (i) Let d = 3 and KX3 ∼ = V2 . In this case we have from Lemma 3.6 that H((F3′ )SL2 (K) , z) = 0, and the algebra (F3′ )SL2 (K) does not have nonzero elements. On the other hand the only SL2 (K)-invariant of polynomial algebra is f = x1 x3 − x22 , and 1 . H(K[X3 ]SL2 (K) , z) = 1 − z2 (ii) Let d = 4 and KX4 ∼ = V3 . Then 1 z2 and H(K[X4 ]SL2 (K) , z) = . 1 − z4 1 − z4 The K[X4 ]SL2 (K) -module (F4′ )SL2 (K) has one generator of degree 2. It is H((F4′ )SL2 (K) , z) = v = [x4 , x1 ] − 3[x3 , x2 ], and the single generator of K[X4 ]SL2 (K) is f = x21 x24 − 6x1 x2 x3 x4 + 4x1 x33 + 4x32 x4 − 3x22 x23 . ∼ V1 ⊕ V1 . We have a nonzero SL2 (K)-invariant in (iii) Let d = 4 and KX4 = (F4′ )SL2 (K) by Lemma 3.7. Now let us find all of the generators of finitely generated K[X4 ]SL2 (K) -module (F4′ )SL2 (K) . By computations using the suggested method we have 3z 2 1 H((F4′ )SL2 (K) , z) = and H(K[X4 ]SL2 (K) , z) = . 1 − z2 1 − z2 The free generators of the K[X4 ]SL2 (K) -module (F4′ )SL2 (K) are as follows: v1 = [x4 , x1 ] − [x3 , x2 ], v2 = [x2 , x1 ] and v3 = [x4 , x3 ]. The single generator of K[X4 ]SL2 (K) is f = x1 x4 − x2 x3 . (iv) Let d = 5 and KX5 ∼ = V4 . Then H((F5′ )SL2 (K) , z) = z5 , (1 − z 2 )(1 − z 3 ) and H(K[X5 ]SL2 (K) , z) = 1 . (1 − − z3) The only generator of the K[X5 ]SL2 (K) -module (F5′ )SL2 (K) is z 2 )(1 v = [x2 , x1 ]·(12x34 +4x2 x25 −16x3 x4 x5 )+[x3 , x1 ]·(−2x1 x25 +18x23 x5 −18x3 x24 +4x2 x4 x5 ) +[x3 , x2 ] · (16x2 x24 − 18x2 x3 x5 ) + [x4 , x1 ] · (−4x2 x24 + 12x23 x4 + 4x1 x4 x5 − 16x2 x3 x5 ) +[x4 , x2 ] · (−8x2 x3 x4 + 12x22 x5 ) + [x5 , x1 ] · (x1 x3 x5 − 9x33 − 3x1 x24 − x22 x5 + 14x2 x3 x4 ) CLASSICAL INVARIANT THEORY FOR FREE METABELIAN LIE ALGEBRAS 21 +[x5 , x2 ] · (−8x22 x4 + 6x2 x23 ), where w · p(Xn ) = wp(adXn ) for w ∈ F5′ and p(Xn ) ∈ K[Xn ]. The generators of K[X5 ]SL2 (K) are f1 = x1 x5 − 4x2 x4 + 3x23 , and f2 = −x1 x3 x5 − 2x2 x3 x4 + x33 + x1 x24 + x22 x5 . (v) Let d = 5 and KX5 ∼ = V2 ⊕ V1 . Then H((F5′ )SL2 (K) , z) = z2 + z3 + z4 + z5 , (1 − z 2 )(1 − z 3 ) and H(K[X5 ]SL2 (K) , z) = 1 . (1 − z 2 )(1 − z 3 ) The four generators of the K[X5 ]SL2 (K) -module (F5′ )SL2 (K) are v1 = [x5 , x4 ], v2 = [x4 , x2 ] · x5 − [x4 , x3 ] · x4 − [x5 , x1 ] · x5 + [x5 , x2 ] · x4 , v3 = [x4 , x1 ]·x3 x5 −[x4 , x2 ]·x3 x4 +[x4 , x3 ]·(x2 x4 −x1 x5 )−[x5 , x1 ]·x2 x5 +[x5 , x2 ]·x1 x5 , v4 = −[x4 , x1 ]·x23 x4 +2[x4 , x2 ]·x2 x3 x4 −[x4 , x3 ]·x1 x3 x4 +[x5 , x1 ]·(2x2 x3 x4 −x1 x3 x5 ) +[x5 , x2 ] · (2x1 x2 x5 − 4x22 x4 ) + [x5 , x3 ] · (2x1 x2 x4 − x21 x5 ) + [x5 , x4 ] · (2x32 − 2x1 x2 x3 ). Note that the first generator was suggested in Lemma 3.7. The generators of K[X5 ]SL2 (K) are f1 = x22 − x1 x3 and f2 = x1 x25 − 2x2 x4 x5 + x3 x24 . (vi) Let d = 6 and KX6 ∼ = V1 ⊕ V1 ⊕ V1 . Then H((F6′ )SL2 (K) , z) = 6z 2 − z 6 , (1 − z 2 )3 and H(K[X5 ]SL2 (K) , z) = 1 . (1 − z 2 )3 The generators of the K[X6 ]SL2 (K) -module (F6′ )SL2 (K) are v1 = [x2 , x1 ], v2 = [x4 , x3 ], v5 = [x6 , x1 ] − [x5 , x2 ], The generators of K[X6 ] SL2 (K) f1 = x1 x4 − x2 x3 , v3 = [x6 , x5 ], v4 = [x4 , x1 ] − [x3 , x2 ], and v6 = [x6 , x3 ] − [x5 , x4 ]. are f2 = x1 x6 − x2 x5 , and f3 = x3 x6 − x4 x5 . There is a relation of degree 6 between the generators: v1 · f32 + v2 · f22 + v3 · f12 − v4 · f2 f3 + v5 · f1 f3 − v6 · f1 f2 = 0. (vii) Let d = 6 and KX6 ∼ = V2 ⊕ V2 . Then H((F6′ )SL2 (K) , z) = z 2 + 2z 3 + 3z 4 − z 6 , (1 − z 2 )3 and H(K[X5 ]SL2 (K) , z) = 1 . (1 − z 2 )3 22 VESSELIN DRENSKY, ŞEHMUS FINDIK The generators of the K[X6 ]SL2 (K) -module (F6′ )SL2 (K) , the first one was obtained in Lemma 3.7, are v1 = [x6 , x1 ] − 2[x5 , x2 ] + [x4 , x3 ], v2 = [x2 , x1 ] · x6 − [x3 , x1 ] · x5 + [x3 , x2 ] · x4 , v3 = [x6 , x1 ] · x5 − [x5 , x1 ] · x6 + [x4 , x2 ] · x6 − [x4 , x3 ] · x5 − [x6 , x2 ] · x4 + [x5 , x3 ] · x4 , v4 = [x3 , x1 ] · x25 + [x6 , x1 ] · (2x2 x5 − x1 x6 ) − [x4 , x3 ] · x3 x4 − 2[x2 , x1 ] · x5 x6 +[x5 , x1 ] · (2x2 x6 − 2x3 x5 ) + [x4 , x2 ] · (2x3 x5 − x2 x6 ) +[x5 , x2 ] · (2x3 x4 − 2x2 x5 ) − 2[x3 , x2 ] · x4 x5 − [x6 , x2 ] · x2 x4 , v5 = [x3 , x1 ] · (x1 x6 − 2x2 x5 ) + [x6 , x1 ] · (x22 − x1 x3 ) + [x2 , x1 ] · (2x3 x5 − 2x2 x6 ) +2[x5 , x1 ] · x2 x3 + [x4 , x2 ] · x2 x3 − 2[x5 , x2 ] · x22 + [x3 , x2 ] · x2 x4 − [x4 , x1 ] · x23 , and v6 = [x6 , x1 ] · x4 x6 + [x4 , x3 ] · x4 x6 − 2[x5 , x1 ] · x5 x6 − 2[x4 , x2 ] · x5 x6 + 4[x5 , x2 ] · x25 −2[x6 , x2 ] · x4 x5 − 2[x5 , x3 ] · x4 x5 + [x4 , x1 ] · x26 + [x6 , x3 ] · x24 , while the generators of K[X6 ]SL2 (K) are f1 = x1 x3 − x22 , f2 = x1 x6 − 2x2 x5 + x3 x4 , and f3 = x4 x6 − x25 , with a relation between the generators: v4 · f2 + v5 · f3 − v6 · f1 + v1 · (f22 + f1 f3 ) = 0. Now we explain one of the cases in detail. Example 4.2. Let d = 4 and KX4 ∼ = V3 . Then we have the Hilbert series of the algebras (F4′ )UT2 (K) and K[X4 ]UT2 (K) from [5, Example 5.2] as follows: HGL2 ((F4′ )UT2 (K) , t1 , t2 , z) = = t31 t2 z 2 (t21 + t22 + t41 t42 z 2 + t51 t62 z 3 − t81 t62 z 4 ) (1 − t31 z)(1 − t21 t2 z)(1 − t61 t62 z 4 ) t4 uz 2 + u3 z 2 + t2 u5 z 4 + tu7 z 5 − t4 u7 z 6 (1 − t3 z)(1 − tuz)(1 − u6 z 4 ) and HGL2 (K[X4 ]UT2 (K) , t1 , t2 , z) = (1 − t31 z)(1 3 3 3 1 + t61 t32 z 3 − t41 t22 z 2 )(1 − t61 t62 z 4 ) 1+t u z (1 − − t2 u2 z 2 )(1 − u6 z 4 ) where t = t1 , u = t1 t2 . We know that Hilbert series of (F4′ )SL2 (K) and of K[X4 ]SL2 (K) are obtained from the Hilbert series above, respectively, substituting t = 0 and u = 1. Note that the degree of u gives the information of symmetric bidegrees of the homogeneous generators. Thus we have = t3 z)(1 1 z2 and H(K[X4 ]SL2 (K) , z) = . 4 1−z 1 − z4 The Hilbert series suggest that the K[X4 ]SL2 (K) -module (F4′ )SL2 (K) has one generator of bidegree (3, 3) and degree 2, and K[X4 ]SL2 (K) is generated by a generator of bidegree (6, 6) and degree 4. A candidate for a generator of K[X4 ]SL2 (K) is of the form f = c1 x21 x24 + c2 x1 x2 x3 x4 + c3 x1 x33 + c4 x32 x4 + c5 x22 x23 . Since it is SL2 (K)-invariant, then it is preserved under the actions of g1 and g2 . Easy computations give that (c1 , c2 , c3 , c4 , c5 ) = (1, −6, 4, 4, −3). We follow the H((F4′ )SL2 (K) , z) = CLASSICAL INVARIANT THEORY FOR FREE METABELIAN LIE ALGEBRAS 23 similar argument as in the previous case to obtain the generator of the K[X4 ]SL2 (K) module (F4′ )SL2 (K) of the form v = d1 [x4 , x1 ] + d2 [x3 , x2 ], and find that (d1 , d2 ) = (1, −3). On the other hand, the Hilbert series of K[X4 ]SL2 (K) -submodule of (F4′ )SL2 (K) generated by v = [x4 , x1 ] − 3[x3 , x2 ] is equal to the Hilbert series of whole algebra. Thus (F4′ )SL2 (K) is a free cyclic K[X4 ]SL2 (K) -module generated by v. As a vector space (F4′ )SL2 (K) is spanned by the elements v · f n , n ≥ 0, forming an infinite set of generators of (F4′ )SL2 (K) as an algebra. Acknowledgements The second named author is very thankful to the Institute of Mathematics and Informatics of the Bulgarian Academy of Sciences for the creative atmosphere and the warm hospitality during his visit as a post-doctoral fellow when part of this project was carried out. The first named author is grateful to Leonid Bedratyuk for the useful discussions on classical invariant theory. References [1] G. Almkvist, W. Dicks, E. Formanek, Hilbert series of fixed free algebras and noncommutative classical invariant theory, J. Algebra 93 (1985), 189-214. [2] Yu. A. Bahturin, Identical Relations in Lie Algebras (Russian), Nauka, Moscow, 1985. Translation: VNU Science Press, Utrecht, 1987. [3] F. Benanti, S. Boumova, V. Drensky, G. K. Genov, P. Koev, Computing with rational symmetric functions and applications to invariant theory and PI-algebras, Serdica Math. J. 38 (2012), 137-188. http://www.math.bas.bg/serdica/2012/2012-137-188.pdf. [4] R. M. Bryant, On the fixed points of a finite group acting on a free Lie algebra, J. London Math. Soc. (2) 43 (1991), 215-224. [5] R. Dangovski, V. Drensky, Ş. Fındık, Weitzenböck derivations of free metabelian Lie algebras, Linear Algebra Appl. 439 (2013), No. 10, 3279-3296. [6] C. De Concini, D. Eisenbud, C. Procesi, Young diagrams and determinantal varieties, Invent. Math. 56 (1980), 129-165. [7] M. Domokos, V. Drensky, A Hilbert-Nagata theorem in noncommutative invariant theory, Trans. Amer. Math. Soc. 350 (1998), 2797-2811. [8] V. Drensky, Fixed algebras of residually nilpotent Lie algebras, Proc. Amer. Math. Soc. 120 (1994), 1021-1028. [9] V. Drensky, Commutative and noncommutative invariant theory, Math. and Education in Math., Proc. of the 24-th Spring Conf. of the Union of Bulgar. Mathematicians, Svishtov, April 4-7, 1995, Sofia, 1995, 14-50. [10] V. Drensky, C. K. Gupta, Constants of Weitzenböck derivations and invariants of unipotent transformations acting on relatively free algebras, J. Algebra 292 (2005), 393-428. [11] R. Ehrenborg, G.-C. Rota, Apolarity and canonical forms for homogeneous polynomials, Eur. J. Comb. 14 (1993), 157-181. [12] E. B. Elliott, On linear homogeneous diophantine equations, Quart. J. Pure Appl. Math. 34 (1903), 348-377. [13] E. Formanek, Noncommutative invariant theory, Contemp. Math. 43 (1985), 87-119. [14] P. Gordan, Vorlesungen über Invariantentheorie, Herausgegeben von G. Kerschensteiner, Zweiter Band: Binare Formen, Teubner, Leipzig, 1887. Reprinted by Chelsea Publishing Company, New York, 1987. [15] D. Hilbert, Über die vollen Invariantensysteme, Math. Ann. 42 (1893), 313-373. Reprinted in Gesammelte Abhandlungen, Band II: Algebra. Invariantentheorie. Geometrie, 282-344, Springer-Verlag, Berlin-Heidelberg-New York, 1970. 24 VESSELIN DRENSKY, ŞEHMUS FINDIK [16] C. G. J. Jacobi, De determinantibus functionalibus, J. Reine Angew. Math. 22 (1841), 319359. Translation: Ueber die Functionaldeterminanten, Ostwald’s Klassiker d. exacten Wissensch. 78, Leipzig, W. Engelmann, 1896. [17] O. G. Kharlampovich, M. V. Sapir, Algorithmic problems in varieties, Intern. J. Algebra and Computation 5 (1995), 379-602. [18] A. I. Kostrikin, The Burnside problem (Russian), Izv. Akad. Nauk SSSR, Ser. Mat. 23 (1959), 3-34. Translation: Amer. Math. Soc. Transl. (2) 36 (1964), 63-99. [19] I. G. Macdonald, Symmetric Functions and Hall Polynomials, Oxford Univ. Press (Clarendon), Oxford, 1979, Second Edition, 1995. [20] P. A. MacMahon, Combinatory Analysis, vols. 1 and 2, Cambridge Univ. Press. 1915, 1916. Reprinted in one volume: Chelsea, New York, 1960. [21] L. Makar-Limanov, U. Umirbaev, The Freiheitssatz for Poisson algebras, J. Algebra 328 (2011), 495-503. [22] I. P. Shestakov, U. U. Umirbaev, Poisson brackets and two-generated subalgebras of rings of polynomials, J. Amer. Math. Soc. 17 (2004), 181-196. [23] A. L. Shmel’kin, Wreath products of Lie algebras and their application in the theory of groups (Russian), Trudy Moskov. Mat. Obshch. 29 (1973), 247-260. Translation: Trans. Moscow Math. Soc. 29 (1973), 239-252. [24] T. A. Springer, Invariant Theory, Lecture Notes in Mathematics 585, Springer-Verlag, BerlinHeidelberg-New York, 1977. [25] R. M. Thrall, On symmetrized Kronecker powers and the structure of the free Lie ring, Amer. J. Math. 64 (1942), 371-388. [26] N. Vonessen, Actions of Linearly Reductive Groups on Affine PI-Algebras, Mem. Amer. Math. Soc. 414, 1989. [27] H. Weyl, The Classical Groups, Their Invariants and Representations, Princeton Mathematical Series 1, Princeton University Press, Princeton, NJ, 1946. Reprint in Princeton Landmarks in Mathematics, 1997. [28] E. I. Zel’manov, On Engel Lie algebras (Russian), Sibirsk. Mat. Zh. 29 (1988), No. 5, 112-117. Translation: Siberian Math. J. 29 (1988), 777-781. Institute of Mathematics and Informatics, Bulgarian Academy of Sciences, 1113 Sofia, Bulgaria E-mail address: [email protected] Department of Mathematics, Çukurova University, 01330 Balcalı, Adana, Turkey E-mail address: [email protected]
0math.AC
THE ARTIN-SPRINGER THEOREM FOR QUADRATIC FORMS OVER SEMI-LOCAL RINGS WITH FINITE RESIDUE FIELDS arXiv:1602.07739v2 [math.AC] 29 Feb 2016 STEPHEN SCULLY Abstract. Let R be a commutative and unital semi-local ring in which 2 is invertible. In this note, we show that anisotropic quadratic spaces over R remain anisotropic after base change to any odd-degree finite étale extension of R. This generalization of the classical Artin-Springer theorem (concerning the situation where R is a field) was previously established in the case where all residue fields of R are infinite by I. Panin and U. Rehmann. The more general result presented here permits to extend a fundamental isotropy criterion of I. Panin and K. Pimenov for quadratic spaces over regular semi-local domains containing a field of characteristic 6= 2 to the case where the ring has at least one residue field which is finite. 1. Introduction Let R be a commutative and unital ring in which 2 is invertible. By a (free) quadratic space over R, we mean a pair (V, q) consisting of a free R-module V of finite rank and a non-degenerate quadratic form q on V (where, by non-degenerate, we mean that the polar bilinear form bq of q (see §2.A) has trivial radical, i.e., that the R-linear map V → V ∗ given by v 7→ bq (v, −) is bijective). Given an extension of (commutative, unital) rings R ֒→ S, there is an induced base-change procedure transforming quadratic spaces over R to quadratic spaces over S; namely, to any quadratic space (V, q) over R, one associates the quadratic space (VS , qS ) over S obtained by setting VS = V ⊗R S and taking qS to be the unique (non-degenerate) quadratic form on VS which restricts to q on V (via the canonical inclusion V ֒→ VS ). A quadratic space (V, q) over R is said to be (strictly) isotropic if there exists a unimodular vector v ∈ V for which q(v) = 0. If no such unimodular vector exists, then we say that (V, q) is (strictly) anisotropic. In other words, (V, q) is anisotropic if the projective quadric {q = 0} ⊆ P(V ) over R admits no R-valued points. A basic, yet fundamental problem for the theory of quadratic spaces over rings is that of understanding the isotropy behaviour of quadratic spaces after base change to another ring of interest. In [P09], I. Panin proved the following important result in this direction: If (V, q) is an anisotropic quadratic space over a regular semi-local domain R containing a field of characteristic 0, then it remains anisotropic after base change to the fraction field of R. Later, I. Panin and K. Pimenov ([PP10]) showed that the statement also holds if R is a regular semi-local domain of finite characteristic (different from 2), provided that all residue fields of R are infinite. Date: February 5, 2018. 2010 Mathematics Subject Classification. Primary: 11E81; Secondary: 11E08. Key words and phrases. Quadratic forms, semi-local rings, Artin-Springer theorem. The author was supported by a PIMS postdoctoral fellowship held at the University of Alberta. 1 2 STEPHEN SCULLY The significance of these results is that they permit to reduce a variety of problems concerning quadratic spaces over sufficiently nice semi-local domains to the case of fields, where a rich and extensive theory is already available. Recent applications to the study of Witt groups and Milnor-Witt K-groups of regular equicharacteristic semi-local domains may be found in [G15] and [GSZ16]. One of the main ingredients used in the aforementioned work of Panin and Panin-Pimenov is the following generalization of the classical Artin-Springer theorem ([Sp52]) concerning the existence of odd-degree points on quadrics: If (V, q) is an anisotropic quadratic space over a semi-local ring R with infinite residue fields (of characteristic 6= 2), then (V, q) remains anisotropic after base change to any odd-degree finite étale extension of R (the Artin-Springer theorem being the special case where R is a field ). This statement, which was established by Panin and U. Rehmann in [PR07], was used by Panin and Pimenov to prove the following more precise version of their result (cf. [PP10, Proof of Thm. 1.1]): If R is a regular semi-local domain containing a field of characteristic 6= 2, and the Artin-Springer theorem holds for quadratic spaces over R, then anisotropic quadratic spaces over R remain anisotropic after base change to the fraction field of R. The purpose of this note is to show that the Artin-Springer theorem holds for quadratic spaces over any semi-local ring in which 2 is invertible (see Theorem 4.1 below). In light of the above discussion, this makes the Panin-Pimenov isotropy criterion available for quadratic spaces over any regular semi-local domain of finite characteristic 6= 2, which was our original objective. The stated extension of the Artin-Springer theorem is achieved by means of an elementary reduction to the case already treated in [PR07]. The key tool used to carry out this reduction is Proposition 3.1 below, which is perhaps of some interest in its own right. Some additional consequences of our extension results are also briefly discussed in §5. Terminology. In this note, all rings are assumed to be commutative and unital. By a variety, we mean an integral scheme of finite type over a field. Acknowledgements. I would like to thank Stefan Gille for bringing the problem discussed in this text to my attention. I would also like to thank Olivier Haution and Ivan Panin for helpful discussions. 2. Preliminaries In this section we recall some facts and fix some notation concerning quadratic forms over rings (in which 2 is invertible). The main reference here is [Ba78], but we do not assume much more than a basic knowledge of the theory of quadratic forms over fields. Note that we only consider quadratic forms defined on free modules of finite rank, as opposed to quadratic forms defined on arbitrary projective modules. In particular, the Witt rings considered below are Witt rings of free quadratic spaces. 2.A. Quadratic spaces over rings. Let R be a ring in which 2 is invertible and let V be an R-module. By a quadratic form on V , we mean a map q : V → R such that (i) q(λv) = λ2 q(v) for all (λ, v) ∈ R × V , and (ii) the symmetric form bq : V × V → R given by bq (v, w) = q(v + w) − q(v) − q(w) is R-bilinear. If W is THE ARTIN-SPINGER THEOREM FOR QUADRATIC FORMS OVER SEMI-LOCAL RINGS 3 an R-submodule of V , then the orthogonal complement of W in V (with respect to q) is defined as the R-submodule W ⊥ consisting of all vectors v ∈ V such that bq (v, w) = 0 for all w ∈ W . If the R-linear map W → W ∗ given by w 7→ bq (w, −) is bijective, then we say that W is non-degenerate (with respect to q). In this case, V decomposes as the internal direct sum of W and W ⊥ . If V itself is non-degenerate, then we say that the quadratic form q is non-degenerate. In this note, we will be exclusively concerned with non-degenerate quadratic forms on free modules of finite rank. To this end, it is worth noting the following: Lemma 2.1. Let (V, q) be a pair consisting of an R-module V and a quadratic form q on V , let W be an R-submodule of V , and let n be a positive integer. Then W is free and non-degenerate of rank n if and only if there exist n R-module generators w1 , . . . , wn of W such that the matrix bq (wi , wj ) is invertible over R. Proof. Theonly point worthy of remark is that the invertibility of the matrix M := bq (wi , wj ) implies the freeness of Rw1 + · · · + Rwn ⊆ V . Observe, however, that if r1 w1 + · · · + rn wn = 0 for some r1 , . . . , rn ∈ R, then the vector (r1 , . . . , rn ) lies in the kernel of M, whence the claim.  By a (free) quadratic space over R, we mean a pair (V, q) consisting of a free R-module V of finite rank and a non-degenerate quadratic form q on V . The rank of (V, q) is defined as the rank of the free R-module V . By a subspace of (V, q) we mean a quadratic space (W, p) such that W is a free non-degenerate submodule of V and p = q|W (i.e., p is the restriction of q to W ). Given an R-algebra S, we can define a quadratic space (VS , qS ) over S by setting VS = V ⊗R S and taking qS to be the unique (non-degenerate) quadratic form on VS which restricts to q on V (we suppress from the notation the dependency of this construction on the fixed R-algebra structure on S). In the other direction, if S is a free R-algebra of finite rank and we are given an R-linear map s : S → R such that the quadratic form S → R, x 7→ s(x2 ) is non-degenerate, then, given any quadratic space (W, p) over S, the pair (R W, s ◦ p) is a quadratic space over R (where by R W we mean W regarded as an R-module via the given R-algebra structure on S). If (U, p) is another quadratic space over R, then an isometry from (U, p) to (V, q)  is an R-linear isomorphism φ : U → V such that q φ(u) = p(u) for all u ∈ U. If such an isometry exists, then we say that (U, p) and (V, q) are isometric. The set O(V, q) of all isometries from a fixed quadratic space (V, q) to itself is equipped with a natural group structure, and is called the orthogonal group of (V, q). If w  ∈ V is −1 such that q(w) is invertible in R, then the map v 7→ v − q(w) bq (v, w) w is an element of O(V, q). Self-isometries of this kind are called reflections. The orthogonal sum (U ⊕V, p ⊥ q) and tensor product (U ⊗R V, p ⊗q) of quadratic spaces (U, p) and (V, q) over R are defined in the obvious way. These operations descend to the level of isometry classes, thus equipping the set of all isometry classes of quadratic spaces over R with the structure  of a commutative unital semi-ring 2 with unit given by the class of (R, x 7→ x ) . The Grothendieck completion of this semi-ring is called the Grothendieck-Witt ring of (free) quadratic spaces over R, and is denoted GW(R) (see [Ba78, §I.2] for more details). 4 STEPHEN SCULLY Given an invertible element a in R, we write hai for the rank-1 quadratic space (R, x 7→ ax2 ) over R. Given n invertible elements a1 , . . . , an in R, we then write ha1 , . . . , an i for the n-fold orthgonal sum ha1 i ⊥ · · · ⊥ han i. A quadratic space isometric to one of this kind is said to be diagonalizable. Note that every rank-1 quadratic space is diagonalizable. If a quadratic space (V, q) over R admits a free non-degenerate rank-1 R-submodule L, then we have the orthogonal decomposition (V, q) = (L, q|L ) ⊥ (L⊥ , q|L⊥ ). In light of the preceding remarks, this implies: Lemma 2.2. If every quadratic space over R admits a free non-degenerate rank-1 R-submodule, then every quadratic space over R is diagonalizable. If (V, q) is a quadratic space over R, then a vector v ∈ V is said to be (strictly) isotropic if v is unimodular (i.e., v generates a free rank-1 R-submodule of V ) and q(v) = 0. A quadratic space which admits an isotropic vector is said to be (strictly) isotropic, and (strictly) anisotropic otherwise. The most important example of an isotropic quadratic space over R is the hyperbolic plane H = (R ⊕ R, (x, y) 7→ xy). A quadratic space is said to be hyperbolic if it is isometric to an orthogonal sum of hyperbolic planes. The set of isometry classes of hyperbolic spaces over R forms an ideal in the Grothendieck-Witt ring GW(R). The quotient of GW(R) by this ideal is called the Witt ring of (free) quadratic spaces over R, and is denoted by W(R). If f : R → S is a homomorphism of rings, then the assignment (V, q) 7→ (VS , qS ) descends to a ring homomorphism f ∗ : W(R) → W(S) called restriction along f . If f equips S with the structure of a free R-module of finite rank, and s : S → R is an Rlinear map such that the quadratic form S → R, x 7→ s(x2 ) is non-degenerate, then the assignment (W, p) 7→ (R W, s ◦ p) gives rise to a ring homomorphism s∗ : W(S) → W(R), called (Scharlau) transfer along s. The pair (f ∗ , s∗ ) then satisfies the obvious projection formula; in particular, the composition f∗ s ∗ W(R) −→ W(S) − → W(R) coincides with multiplication by the element s∗ (h1i) (see [Ba78, I.2.12]). 2.B. Quadratic spaces over finite direct products of rings. Let R1 , . . . , Rs be rings in which 2 is invertible, and let R = R1 × · · · × Rs be their direct product. Given a quadratic space (V, q) over R, we obtain, for each 1 ≤ i ≤ s, an induced quadratic space (Vi , qi ) := (VRi , qRi ) over Ri by restriction along the natural projection R → Ri . Note that the s quadratic spaces (V1 , q1 ), . . . , (Vs , qs ) completely determine (V, q). Indeed, for each i, the map Ri ֒→ R given by x 7→ x · 1 gives rise to an inclusion Vi ⊆ V under which q|Vi = qi . Via these inclusions, an arbitrary vector v ∈ V decomposes uniquely as a sum v = v1 + · · · + vs with vi ∈ Vi for each i. The quadratic form q then acts on v by the formula q(v) = q1 (v1 ) + · · · + qs (vs ). Note, furthermore, that the subsets Vi ⊆ V are pairwise mutually orthogonal with respect to the quadratic form q. This readily implies the following statements: Lemma 2.3. Let R and (V, q) be as above. (1) If v ∈ V , then q(v) = 0 if and only if qi (vi ) = 0 for all 1 ≤ i ≤ s. (2) Vectors v1 , . . . , vn ∈ V generate a free non-degenerate rank-n R-submodule of V if and only if, for each 1 ≤ i ≤ s, (v1 )i , . . . , (vn )i generate a free non-degenerate rank-n Ri -submodule of Vi . THE ARTIN-SPINGER THEOREM FOR QUADRATIC FORMS OVER SEMI-LOCAL RINGS 5 2.C. Quadratic spaces over semi-local rings. The basic strategy for studying quadratic forms over general rings is that of reduction to the case of fields, where a rich and extensive theory has been developing since its initiation by E. Witt in [Wi37]. As expounded in the book [Ba78], this strategy can be applied successfully to the study of quadratic forms over semi-local rings using reduction modulo the Jacobson radical and the remarks of the previous subsection. For later reference, we now point out some basic results which emerge from this philosophy. For the remainder of this subsection, we let R be a semi-local ring in which 2 is invertible and set R = R/Jac(R), where Jac(R) denotes the Jacobson radical of R. Then R decomposes (essentially uniquely) as a finite direct product of fields, say R ≃ k1 × · · · × ks . If V is an R-module, then we write V for the R-module obtained by restricting V along the quotient map R 7→ R. Similarly, for each 1 ≤ i ≤ s, we write V i for the ki -vector space obtained from V by restriction along R → ki . The image of a vector v ∈ V under the canonical projection V → V will be denoted by v. In the same way, for each 1 ≤ i ≤ s, we write v i for the image of v under the projection V → V i . Note that we have v = v 1 + · · · + vs . Furthermore, v is unimodular if and only if v i 6= 0 for all 1 ≤ i ≤ s. If q is a quadratic form on V , then the induced quadratic form on V will be denoted by q. Similarly, for each 1 ≤ i ≤ s, the induced quadratic form on the ki -vector space V i will be denoted by q i . In particular, given a quadratic space (V, q) over R, we obtain in this way a quadratic space (V , q) over R and, for each 1 ≤ i ≤ s, a quadratic space (V i , qi ) over ki . Lemma 2.4. Let (V, q) be a quadratic space over R. Then v1 , . . . , vn ∈ V generate a free non-degenerate rank-n R-submodule of V if and only if, for each 1 ≤ i ≤ s, (v1 )i , . . . , (vn )i generate a non-degenerate rank-n ki -linear subspace of V i . Proof. In view of Lemma 2.3 (2), it suffices to show that v1 , . . . , vn generate a free non-degenerate rank-n R-submodule of V if and only if v1 , . . . , vn generate a free non-degenerate rank-n R-submodule of V . This follows from Lemma  2.1, since an element of R (in this case the determinant of the matrix bq (vi , vj ) ) is invertible in R if and only if its image under the projection R → R is invertible in R.  Any quadratic space over a field of characteristic 6= 2 admits a non-degenerate subspace of rank-1 (see [EKM08, Prop. 7.29]). By the preceding lemma, it follows that every quadratic space over the semi-local ring R admits a free non-degenerate submodule of rank 1. Lemma 2.2 therefore implies: Lemma 2.5. Every quadratic space over R is diagonalizable. A slightly more subtle observation is the following important lemma: Lemma 2.6. Let (V, q) be a quadratic space over R, and let v, w ∈ V be unimodular vectors such that qi (wi ) = q i (v i ) for all 1 ≤ i ≤ s. Then there exists u ∈ V such that q(u) = q(v) and ui = wi for all 1 ≤ i ≤ s. Remark 2.7. The condition that q i (wi ) = q i (vi ) for all 1 ≤ i ≤ s just means that q(w) = q(v). Similarly, the assertion that ui = w i for all 1 ≤ i ≤ s simply means that u = w. We choose to state the lemma this way for later reference. 6 STEPHEN SCULLY Proof. The rank-1 case is trivial, so we can assume that (V, q) has rank at least 2. Since v and w are unimodular, we have vi 6= 0 6= wi for all 1 ≤ i ≤ s. Thus, by an observation of E. Witt (see [EKM08, §II.8]), there exists, for each 1 ≤ i ≤ s, an isometry τi ∈ O(V i , q i ) which is a product of (at most 2) reflections and which satisfies τi (vi ) = w i . Since rank(V ) ≥ 2, every reflection in O(V i , q i ) extends to a reflection in O(V , q) which fixes vj for all j 6= i. It follows that there exists τ ∈ O(V , q) which is a product of reflections and which sends v to w. Since an element of R is invertible if and only if its image in R is invertible, every reflection in O(V , q) lifts to a reflection in O(V, q). As a result, τ lifts to an isometry φ ∈ O(V, q). The vector u := φ(v) then has the desired properties.  Remark 2.8. Using the Cartan-Dieudonné theorem on the generation of the orthogonal group of a quadratic space over a field by reflections (see [Sc85, Theorem I.5.4]), one can show by similar means that the natural projection SO(V, q) → SO(V , q) on special orthogonal groups is surjective. This observation is due to M. Knebusch (see [Kn69]). If R is a local ring, then even O(V, q) → O(V , q) is surjective. It is worth stating explicitly the following special case of Lemma 2.6 which will be needed later: Lemma 2.9. Let (V, q) be an isotropic quadratic space over R. Suppose that, for each 1 ≤ i ≤ s, we are given a non-zero vector vi ∈ V i such that q i (vi ) = 0. Then there exists a (strictly) isotropic vector v ∈ V such that vi = vi for all 1 ≤ i ≤ s. Now, using Lemma 2.6 (see also Remark 2.8), one can readily show that Witt’s cancellation and decomposition theorems hold for (free) quadratic spaces over R (see [Ba78, Ch. III]). As a result, the standard characterizations of isotropy for quadratic spaces over fields are all valid over the semi-local ring R: Lemma 2.10. Let (V, q) be a quadratic space over R and let Q ⊆ P(V ) be the projective R-quadric defined by the vanishing of q. Then the following are equivalent: (1) (V, q) is isotropic. (2) (V, q) ≃ H ⊥ (W, p) for some quadratic space (W, p) over R. (3) There exists a quadratic space (W, p) over R with rank(W ) < rank(V ) such that (V, q) = (W, p) in W(R). (4) Q has an R-valued point. (5) Q is rational over R. (6) The affine quadric {q = 0} ⊆ A(V ) is rational over R. Proof. If (2) holds, then we can choose coordinates (x : y : z1 : · · · : zn ) on V ∗ so that q(x, y, z1 , . . . , zn ) = xy + p(z1 , . . . , zn ). The open complement in Q of the principal divisor {x = 0} is then isomorphic to AnR , and so (5) holds. The remaining implications are either trivial or straightforward consequences of Lemma 2.6 and standard facts concerning quadratic forms over fields; for the sake of brevity we omit the details and refer the reader instead to [Ba78, Ch. III].  THE ARTIN-SPINGER THEOREM FOR QUADRATIC FORMS OVER SEMI-LOCAL RINGS 7 3. Key proposition The key ingredient needed to extend the Artin-Springer theorem to quadratic spaces over arbitrary semi-local rings in which 2 is invertible is the (n = 3 case of the) following proposition, which is of some interest in its own right: Proposition 3.1. Let R be a semi-local ring in which 2 is invertible, and let S be a degree-n finite étale extension of R for some (not necessarily odd) integer n ≥ 2. If (V, q) is a quadratic space of rank > n over R such that (VS , qS ) is isotropic, then (V, q) contains a rank-n subspace which becomes isotropic over S. The case where n = 2 is well known and can be made rather more precise (see [Ba78, Thm. V.4.2]). The general case of Proposition 3.1 follows immediately from the more specific Lemma 3.2 below. Before proceeding, let us pause to fix some notation and terminology which will also be used in the next section: Notation and Terminology. Let R and S be as in the statement of Proposition 3.1. By [EGAIV, 18.4.5], we can write S = R[t]/ f (t) , where f is a monic separable polynomial of degree n over R. By monic, we mean that the leading coefficient of f is invertible in R; by separable, we mean that the discriminant of f is invertible in R. Both conditions are local in the following sense: a polynomial over R is monic (resp. separable) if and only if it is monic (resp. separable) when restricted to every residue field of R. The image of the variable t in S will be denoted by θ. Note that S is a free rank-n R-module with basis 1, θ, . . . , θn−1 . Our refinement of Proposition 3.1 may now be stated as follows: Lemma 3.2. In the situation of Proposition 3.1, there exist vectors v0 , v1 , . . . , vn−1 ∈ V such that (1) v0 + θv1 + · · · + θn−1 vn−1 ∈ VS is a (strictly) isotropic vector for qS . (2) v0 , v1 , . . . , vn−1 generate a free non-degenerate rank-n submodule of V . Proof. Let us first remark that the unimodularity of the vector in (1) is guaranteed by condition (2), and so we will suppress this point in the discussion that follows. We begin the proof with some reductions. Firstly, since S is a finite étale extension of R, its Jacobson radical is generated (as an ideal of S) by the Jacobson radical of R. Thus, by Lemmas 2.4 and 2.9, the problem reduces immediately to the case where R is a field, which we will now choose to denote by k. Before proceeding, we make one further reduction to the case where the u-invariant of k is ≤ 2 (that is, every quadratic space of rank ≥ 3 over k is isotropic). If k is finite, then it has u-invariant 2, and so no reduction is necessary (see [EKM08, Ex. 36.2 (3)]). To treat the case where k is infinite, consider the affine quadric XqS = {qS = 0} ⊆ A(VS ). Since qS admits a (strictly) isotropic vector, XqS is a rational S-scheme (Lemma 2.10). The Weil restriction Y := RS/k (XqS ) is therefore a rational k-variety. Note that Y is a closed subvariety of A(V ⊕n ): if A is a k-algebra, then an n-tuple of vectors Pn−1 ⊕n (v0 , v1 , . . . , vn−1 ) ∈ (VA ) lies in Y (A) if and only if qS⊗k A ( i=0 θi vi ) = 0. Consider  now the k-morphism g : A(V ⊕n ) → A1k given by (v0 , v1 , . . . , vn−1 ) 7→ det bq (vi , vj ) . By Lemma 1.1, n-vectors v0 , v1 , . . . , vn−1 in V generate a non-degenerate rank-n 8 STEPHEN SCULLY subspace of V if and only if g(v0, v1 , . . . , vn−1 ) 6= 0. Thus, in light of the above remarks, the lemma holds if and only if U(k) 6= ∅, where U is the open subvariety of Y given by U = Y ∩ g −1(A1k \ {0}). Now Y is a rational k-variety, and so if k is infinite, then U(k) 6= ∅ if and only if U is non-empty as a scheme. In particular, in order to prove the lemma in this case, we may assume that k is algebraically closed. Since any quadratic space of rank 2 or more over an algebraically closed field is evidently isotropic, we have made the necessary reduction. Working under the assumption that the u-invariant of k is ≤ 2, we will now show that there exist vectors v0 , v1 , . . . , vn−1 ∈ V satisfying conditions (1) and (2) in the statement of the lemma. Let s = [ n2 ]. Note that (V, q) has rank strictly greater than 2s by assumption. Since every rank-3 quadratic space over k is isotropic, it follows that V admits a non-degenerate subspace W of dimension 2s + 1 such that (W, q|W ) ≃ H · · ⊥ H} ⊥ hai | ⊥ ·{z s times ∗ for some a ∈ k (see Lemma 2.10). More explicitly, this means that we can find vectors e1 , f1 , e2 , f2 , . . . , es , fs and w in V such that • q(ei ) = q(fi ) = 0 for all i, • q(w) = a, • bq (ei , ej ) = bq (fi , fj ) = 0 for all i 6= j, • bq (ei , fj ) = δij for all i, j (where δ is the Kronecker delta), and • bq (ei , w) = bq (fi , w) = 0 for all i. (the (ei , fi ) are hyperbolic pairs in the sense of [EKM08, p. 40]) To finish the proof, let us now separate the case where n is even from that where n is odd: Case 1. n = 2s. Suppose first that s = 1, and let α, β ∈ k be such that θ2 = α + βθ in S. A direct calculation shows that if we set β2 β v0 = (−α − )ae1 + f1 − w and v1 = w, 4 2 then qS (v0 + θv1 ) = 0, i.e., condition (1) of the statement holds for this choice of v0  and v1 . At the same time, the determinant of the Gram matrix bq (vi , vj ) is in this case equal to −a2 (β 2 + 4α), which is non-zero because S/k is étale. Thus, condition (2) also holds for this choice of v0 and v1 . P Suppose now that s > 1. Let λ1 , . . . , λs ∈ k ∗ be such that si=1 λi = 0, and set ( λi+1 ei+1 if 0 ≤ i ≤ s − 1 vi = fn−i if s ≤ i ≤ n − 1 Then, by construction, we have X  X n−1 n−1 s X X i qS θ vi = q(vi )θ2i + bq (vi , vj )θi+j = λi θn−1 = 0, i=0 i=0 i<j i=1 and so the vi satisfy the first condition of the statement. Condition (2) is also satisfied, since the restriction of q to the subspace spanned by the vi is a hyperbolic form. THE ARTIN-SPINGER THEOREM FOR QUADRATIC FORMS OVER SEMI-LOCAL RINGS 9 Case 2. n = 2s + 1. Let λ1 , . . . , λs ∈ k ∗   λi+1 ei+1 vi = w  f n−i be such that Ps i=1 λi = −a, and set if 0 ≤ i ≤ s − 1 if i = s if s + 1 ≤ i ≤ n − 1 Then, by construction, we have X  X s n−1 n−1 X X i qS θ vi = q(vi )θ2i + bq (vi , vj )θi+j = q(w)θn−1+ λi θn−1 = (a−a)θn−1 = 0, i=0 i=0 i<j i=1 and so the vi satisfy condition (1) of the statement. Again, condition (2) is also satisfied, since the subspace of V spanned by the vi is nothing else but W .  4. The Artin-Springer theorem We are now ready to prove our main result: Theorem 4.1. Let R be a semi-local ring in which 2 is invertible. If (V, q) is an anisotropic quadratic space over R, then (VS , qS ) is anisotropic for any odd-degree finite étale extension S of R. As discussed in §1, the particular case where R is a field is due (independently) to E. Artin (unpublished) and T.A. Springer ([Sp52]), while the case where all residue fields of R are infinite was proved in [PR07] by I. Panin and U. Rehmann. Our purpose is to treat the case where at least one residue field of R is finite. We will argue by reduction to the case where all residue fields are “large enough”. The key ingredient here is (the n = 3 case of) Proposition 3.1 above. We continue with the notation of §3, but, as per the statement of Theorem 4.1, we now assume that n is odd. We present the proof of Theorem 4.1 in a series of short steps: 4.A. The hyperbolicity analogue of Theorem 4.1. Let i denote the natural inclusion of R into S. Below, we will make use of the following hyperbolicity analogue of Theorem 4.1, which is well known and straightforward to prove (see [OP99, §3]): Proposition 4.2. The natural restriction homomorphism i∗ : W(R) → W(S) is injective. In other words, if (V, q) is a quadratic space over R such that (VS , qS ) is hyperbolic, then (V, q) is hyperbolic. Proof. Let s : S → R be the R-linear map defined by setting s(θn−1 ) = 1 and s(θi ) = 0 for all 0 ≤ i ≤ n − 2. A straightforward calculation shows that the quadratic form S → R, x 7→ s(x2 ) is isometric to h1i ⊥ n−1 · H (here n−1 · H denotes 2 2 copies of H). In particular, it is non-degenerate, and so the orthogonal sum of n−1 2 we can consider the Scharlau transfer s∗ : W(S) → W(R). Recall from §2.1 above i∗ s∗ that the composition W(R) − → W(S) − → W(R) coincides with multiplication by the element s∗ (h1i). However, by the above remarks, we have s∗ (h1i) = h1i in W(R), and so we see that s∗ is a section of i∗ . Hence i∗ is injective, as claimed.  10 STEPHEN SCULLY 4.B. Proof of Theorem 4.1 for quadratic spaces of rank ≤ 3. Using Proposition 4.2, we now show that Theorem 4.1 holds for quadratic spaces of rank ≤ 3. Proposition 4.3. Theorem 4.1 holds when (V, q) has rank ≤ 3. Proof. For quadratic spaces of rank 1, the statement is trivial. Next, an isotropic space of rank 2 over a semi-local ring is hyperbolic (see Lemma 2.10), and so the rank-2 case of the statement follows from Proposition 4.2. Assume now that (V, q) has rank 3. For ease of notation, we simply denote the pair (V, q) by q. Now, by Lemma 2.5, we can write q ≃ ha, b, ci for some a, b, c ∈ R∗ . Then the form π = q ⊥ habci = ha, b, c, abci is similar to (i.e., isometric to a unit multiple of) the 2-fold Pfister form h1, abi⊗h1, aci. By the main property of Pfister forms (see [Ba78, Cor. IV.3.2]), πS is either anisotropic or hyperbolic. Suppose that πS is hyperbolic. Then, by Proposition 4.2, π is already hyperbolic, and so q = −habci in the Witt ring W(R). But, by Lemma 2.10, this implies that q is isotropic, thus contradicting our initial hypothesis. We can therefore conclude that πS is anisotropic. Since qS is a restriction of πS , it must be anisotropic as well.  4.C. Proof of Theorem 4.1 for extensions of degree 3. Next, we use Proposition 4.3 to show that Theorem 4.1 holds in the case where S has degree 3 (with no restriction on the rank of (V, q)): Proposition 4.4. Theorem 4.1 holds when S is a degree-3 extension of R. Proof. The case where (V, q) has rank ≤ 3 was treated in Proposition 4.3 above. If (V, q) has rank strictly greater than 3, then Proposition 4.3 at least implies that every rank-3 subspace of (V, q) remains anisotropic over S. In view of the n = 3 case of Proposition 3.1, however, this is all that is needed to make the desired conclusion.  4.D. Proof of Theorem 3.1 in the general case. We now conclude the proof of Theorem 3.1. The main ingredient, together with Proposition 4.4, is the following statement due (essentially) to I. Panin and U. Rehmann: Lemma 4.5 (Panin-Rehmann). There exists a natural number Mn for which the following holds: Assume that all residue fields of R contain at least Mn elements. Then, for any quadratic space (V, q) over R such that (VS , qS ) is isotropic, there exist v0 , v1 , . . . , vn−1 ∈ V with the following properties: (1) v0 + θv1 + · · · + θn−1 vn−1 ∈ VS is a (strictly) isotropic vector for qS . (2) qR[t] (v0 + tv1 + · · · + tn−1 vn−1 ) ∈ R[t] is monic and separable of degree 2n − 2 (here R[t] denotes the polynomial ring in a single variable t over R). Proof. This is a mild extension of [PR07, Prop. 1.1]. In fact, the statement is proved in [PR07] under the stronger hypothesis that R is local with infinite residue field. Note, however, that since S is a finite étale extension of R, its Jacobson radical is generated (as an ideal of S) by that of R. Thus, in view of Lemma 2.9 and the fact that condition (2) can be checked locally (see the remarks at the beginning of this section), everything reduces immediately to the case where R is a field (regardless of whether R is local or not). Moreover, under the assumption that R is a field, it was shown in [PR07, §3] that there exists a non-empty rational R-variety U with THE ARTIN-SPINGER THEOREM FOR QUADRATIC FORMS OVER SEMI-LOCAL RINGS 11 property that U(R) 6= ∅ if and only if the conclusion of the lemma holds. This conclusion is therefore valid provide that R contains ”enough” elements; the term “enough” is made formal here by the integer Mn in the statement of the lemma (in particular, it is not necessary for R to be infinite).  We now give the proof of Theorem 4.1: Proof of Theorem 4.1. Suppose first that at least one residue field of R is finite. Let h(x) ∈ R[x] be a monic separable polynomial of degree 3 in a single variable x over R which is irreducible when restricted to any finite residue field of R. Then e := R[x]/ h(x) is a degree-3 étale extension of R such that the minimal cardinality R e is strictly greater than that of the finite residue fields of the finite residue fields of R of R. Now, in order to show that (VS , qS ) is anisotropic, it is sufficient to show that e By Proposition 4.4, however, (V e , q e ) (VSe, qSe) is anisotropic, where Se = S ⊗R R. R R e and, by repeating this process is anisotropic. We can therefore replace R by R, sufficiently many times, we ultimately reduce to the case where all residue fields of R contain at least Mn elements (where Mn is the natural number in the statement of Lemma 4.5). Having made this reduction, the proof proceeds as in [PR07]. For the reader’s convenience, we give the details. Thus, suppose for the sake of contradiction that (VS , qS ) is isotropic, and let v0 , v1 , . . . , vn be as in Lemma 4.5 so that (1) v0 + θv1 + · · · + θn−1 vn−1 ∈ VS is a (strictly) isotropic vector for qS . (2) qR[t] (v0 + tv1 + . . . tn−1 vn−1 ) ∈ R[t] is monic and separable of degree 2n − 2.  Let v(t) = v0 + tv1 + . . . tn−1 vn−1 ∈ V ⊗R R[t]. By (1), the polynomial qR[t] v(t) ∈ R[t] is divisible by f (t), say  qR[t] v(t) = f (t)g(t) with g(t) ∈ R[t].  By (2), g(t) is monic and separable of degree n − 2 over R. Let S ′ = S[t]/ g(t) . Then S ′ is a degree-(n − 2) étale extension of R. We claim that (VS ′ , qS ′ ) is isotropic. Note first that if θ′ denotes the image of t in S ′ , then we have  qS ′ v(θ′ ) = f (θ′ )g(θ′ ) = 0 in S ′ . To prove the claim, it therefore suffices to check that v(θ′ ) ∈ VS ′ is unimodular. We claim that this follows from the separability part of (2). Since unimodularity of vectors and separability of polynomials can be checked locally (see §2.3 and the remarks at the beginning of §3), we are, to this end, free to assume that R is a field. Then g(t) decomposes into a product of pairwise coprime irreducible polynomials over R, say g(t) = g1 (t) · · · gk (t). If v(θ′ ) were not unimodular, then v(t) would be divisible by some gi (t), whence qR[t] would be divisible by gi (t)2 in R[t]. As this would contradict the separability part of (2), the claim follows. Thus, (VS ′ , qS ′ ) is isotropic. Now S ′ is an odd-degree étale extension of R which has strictly smaller degree than S. By repeating the above argument sufficiently many times, we come to the conclusion that (V, q) is isotropic, thus contradicting our original hypothesis. This completes the argument.  12 STEPHEN SCULLY 5. The Panin-Pimenov isotropy criterion and applications 5.A. The Panin-Pimenov isotropy criterion. As an immediate application of our extension of the Artin-Springer theorem (Theorem 4.1 above), we obtain the following extension of an important result due to I. Panin and K. Pimenov: Theorem 5.1. Let R be a regular semi-local domain containing a field of characteristic 6= 2. If (V, q) is an anisotropic quadratic space over R, then (VK , qK ) is anisotropic, where K denotes the fraction field of R. This theorem was originally proved by I. Panin in [P09] under the stronger assumption that R contains a field of characteristic 0. In [PP10], I. Panin and K. Pimenov treated the case where R has finite characteristic different from 2, but under the assumption that all residue fields of R are infinite. In order to extend the statement to the case where some residue field of R is finite (which was our original goal), the arguments presented in [PP10] showed that it would suffice to prove that the Artin-Springer theorem holds for quadratic spaces over R. This extension therefore follows from our Theorem 4.1 above. In more detail: Proof of Theorem 4.1. Let (V, q) be a quadratic space over R. If (VK , qK ) is isotropic, then it is shown in [PP10, Proof of Thm. 1.1] that (V, q) becomes isotropic over an odd-degree finite étale extension of R (in fact, over R ⊗k k ′ , where k denotes the prime subfield of R and k ′ is some finite extension of k of degree prime to 2 and the characteristic of k). By Theorem 4.1, this implies that (V, q) is isotropic.  5.B. Applications. The Panin-Pimenov isotropy criterion is of fundamental importance for the study of quadratic forms over (nice) semi-local rings, since it permits to reduce many problems to the case of fields, where an extensive literature is already available (see, e.g., [EKM08]). Let R be a regular semi-local domain containing a field of characteristic 6= 2. To conclude this note, we now mention (without proof) some consequences of our extension of the Panin-Pimenov criterion to the case where at least one residue field of R is finite (Theorem 5.1). These statements were known previously in the case where the residue fields of R are all infinite. • All results proved in [G15, §3] are valid for quadratic spaces over R; these include the linkage theorem (analogous to the original result of R. Elman and T. Y. Lam concerning quadratic spaces over fields) as well as certain other purity-type statements for Pfister forms. • If, moreover, R local, then the purity theorem of [PP10, Cor. 1] holds for quadratic spaces over R, i.e., unramified quadratic spaces over K := Frac(R) are defined over R (on the level of quadratic spaces themselves, and not only Witt groups). • If R is local, then the main results of [CP07] and [CP13] (concerning purity statements for G2 -torsors and certain F4 -torsors, respectively) are valid over R. References [Ba78] R. Baeza. Quadratic forms over semilocal rings. Lecture Notes in Mathematics, Vol. 655, Springer-Verlag, Berlin-New York, 1978, vi+199 pp. [CP07] V. Chernousov and I. Panin. Purity of G2 -torsors. C. R. Math. Acad. Sci. Paris 345 (2007), no.6, 307–312. THE ARTIN-SPINGER THEOREM FOR QUADRATIC FORMS OVER SEMI-LOCAL RINGS 13 [CP13] V. Chernousov and I. Panin. Purity for Pfister forms and F4 -torsors with trivial g3 invariant. J. Reine Angew. Math. 685 (2013), 99–104. [EGAIV] A. Grothendieck. Eléments de géometrie algébrique. IV.. Inst. Hautes Études Sci. Publ. Math. [EKM08] R. Elman, N. Karpenko, and A. Merkurjev. The algebraic and geometric theory of quadratic forms. AMS Colloquium Publications, 56, American Mathematical Society, 2008. [G15] S. Gille. On quadratic forms over semilocal rings. Preprint, 2015. [GSZ16] S. Gille, S. Scully and C. Zhong. Milnor-Witt K-groups of local rings. Adv. Math. 286 (2016), 729–753. [Kn69] M. Knebusch. Isometrien über semilokalen Ringen. (German). Math. Z. 108, 1969, 255–268. [OP99] M. Ojanguren and I. Panin. A purity theorem for the Witt group. Ann. Sci. École Norm. Sup. (4) 32 (1999), no. 1, 71–86. [P09] I. Panin. Rationally isotropic quadratic spaces are locally isotropic. Invent. Math. 176 (2009), no. 2, 397–403. [PP10] I. Panin and K. Pimenov. Rationally isotropic quadratic spaces are locally isotropic: II. Doc. Math. 2010, Extra volume: Andrei A. Suslin sixtieth birthday, 515–523. [PR07] I. Panin and U. Rehmann. A variant of a theorem by Springer. Algebra i Analiz 19 (2007), no. 6, 117–125; translation in St. Petersburg Math. J. 19 (2008), no. 6, 953–959. [Sc85] W. Scharlau. Quadratic and hermitian forms. Springer-Verlag, Berlin, 1985. [Sp52] T.A. Springer. Sur les formes quadratiques d’indice zéro. C. R. Acad. Sci. Paris 234, (1952). 1517-1519. [Wi37] E. Witt. Theorie der quadratischen Formen in beliebigen Körpern. J. Reine Angew. Math. 176 (1937), 31–44. Department of Mathematical and Statistical Sciences, University of Alberta, Edmonton AB T6G 2G1, Canada E-mail address: [email protected]
0math.AC
Non-Parametric Transformation Networks Dipan K. Pal 1 Marios Savvides 1 arXiv:1801.04520v3 [cs.CV] 14 Feb 2018 Abstract ConvNets, through their architecture, only enforce invariance to translation. In this paper, we introduce a new class of deep convolutional architectures called Non-Parametric Transformation Networks (NPTNs) which can learn general invariances and symmetries directly from data. NPTNs are a natural generalization of ConvNets and can be optimized directly using gradient descent. Unlike almost all previous works in deep architectures, they make no assumption regarding the structure of the invariances present in the data and in that aspect are flexible and powerful. We also model ConvNets and NPTNs under a unified framework called Transformation Networks (TN), which yields a better understanding of the connection between the two. We demonstrate the efficacy of NPTNs on data such as MNIST and CIFAR10 where they outperform ConvNet baselines with the same number of parameters. We show it is more effective than ConvNets in modelling symmetries from data, without the explicit knowledge of the added arbitrary nuisance transformations. Finally, we replace ConvNets with NPTNs within Capsule Networks and show that this enables Capsule Nets to perform even better. 1. Introduction The Fundamental Problem. One of the central problems of deep learning, and machine learning in general, has been supervised classification. An instantiation of which, in vision, is object classification. A core challenge towards these problems is the encoding or learning of invariances and symmetries that exist in the training data. Any general classification problem would require invariance to the withinclass transformations and symmetries (nuisance transformations) while being selective to between-class transformations. There also has been evidence that the sample complexity of a model is inversely proportional to the amount of invariance it can invoke towards nuisance transformations (Anselmi et al., 2013). Indeed, methods which incorporate some known invariances or promote learning of more powerful invariances for a learning problem perform better in Figure 1. Operation performed by a single Non-Parametric Transformation Network (NPTN) node (single channel input and single channel output). NPTNs are a generalization of ConvNets towards learning general invariances and symmetries. The node has two main components (a) Convolution and (b) Transformation Pooling. The dot-product between the input patch (x) and a set of |G| number of filters gw (green) is computed (this results in convolution when implemented with spatially replicated nodes). Here |G| = 6 (different shades of green indicate transformed templates). g indicates the transformation applied to the template or filter w . The resultant six output scalars (red) are then max-pooled over to produce the final output s (black). The pooling operation here is not spatially (as in vanilla ConvNets) but rather across the |G| channels which encode non-parametric transformations. The output s is now invariant to the transformation encoded by the set of filters G. Each plane indicates a single feature map/filter. the target task given a certain amount of data. A number of ways exist to achieve this. One can present transformed versions of the training data (Burges & Schölkopf, 1997; Niyogi et al., 1998), minimize auxiliary objectives promoting invariance during training (Schroff et al., 2015; Hadsell et al., 2006) or pool over transformed versions of the representation itself (Liao et al., 2013; Pal et al., 2016; 2017). Convolutional Networks and Beyond. Towards this goal, ideas proposed in (LeCun et al., 1998) with the introduction of convolutional neural networks have proved to be very useful. Weight sharing implemented as convolutions, helped to regularize the network and vastly reduce the number of parameters learned. Additionally, it resulted in the hard encoding of translation invariances (and symmetries) in the network, making it one of the first applications of modelling invariance through a network’s architecture itself. Such a mechanism resulted in greater sample efficiency and in regularization in the form of a structural or inductive bias in the network. With this motivation in mind, it is almost natural to ask whether networks which model more complicated invariances and symmetries perform better? Non-Parametric Transformation Networks Investigating architectures which invoke invariances not implicitly through the model’s functional map but explicitly through an architectural property seems important. New Dimensions in Network Architecture. Over the years, deep convolutional networks (ConvNets) have enjoyed a wide array of improvements in architecture. It was observed early on that a larger number of filters (width) in ConvNets led to improved performance, though with diminishing returns. Another significant milestone was the development and maturity of residual connections and dense skip connections (He et al., 2016; Huang et al., 2016). Though there have been more advances in network architecture, many of the improvements have been derivatives of these two ideas (Zagoruyko & Komodakis, 2016; Chen et al., 2017; Hu et al., 2017). Recently however, Capsule Nets were introduced (Sabour et al., 2017) which presented another potentially fundamental idea of encoding properties of an entity or an object in an activity vector rather than a scalar. With the goal of designing more powerful networks, ideas for modelling general invariances in the same framework as ConvNets, open up a new and potentially key dimension for architecture development. Primary Contribution. In this work, we explore one such architecture class, called Transformation Networks (TN). We introduce a new layer which can form a class of networks called Non-Parametric Transformation Networks (NPTNs). These networks have the ability to learn invariances to general transformations present in the data which are (potentially) non-parametric in nature. NPTNs are named so for their explicit handling of transformation invariances and symmetries in the data. They can be easily implemented using standard off-the-shelf deep learning frameworks and libraries. Further, they can be optimized using vanilla gradient descent methods such as SGD. Unlike other methods that enforce additional invariances in convolutional architectures, NPTNs do not need to transform the input or the filters at any stage of the learning/testing process. They enjoy benefits of a standard convolutional architecture such as speed and memory efficiency while being more powerful in modelling invariances and being elegant in their operation. When forced to ignore any learnable transformation invariances in data, they gracefully reduce to vanilla ConvNets in theory and practice. However, when allowed to do so, they outperform ConvNets by capture more general invariances. Some properties of NPTNs. The architecture itself of an NPTN allows it to be able to learn powerful invariances from data (a single node is illustrated in Fig. 1). This offer better sample complexity and shortens the generalization gap1 . Learning invariances from data is different and more pow1 Indeed, empirically we find that three or more layered NPTNs have a smaller generalization gap, i.e. have higher training losses than vanilla ConvNets, but lower testing losses. erful than enforcing known and specific invariances such as rotation symmetry in networks. Such networks which enforce predefined symmetries (including vanilla ConvNets) force the same invariances at all layers which is a strong prior. More complex invariances are left for the network to learn using the implicit functional map as opposed to the explicit architecture. The proposed NPTNs have the ability to learn different and independent invariances for different layers and in fact for different channels themselves. Standard convolution architectures enforce translation invariance through the convolution operation followed by a aggregation operation (either pooling or a second convolution layer). In this aspect, each node has a predefined invariance (translation) and only needs to learn the filter instantiation. However, an NPTN node needs to learn two independent entities. First, the instantiation of the filter and second, the transformation that the particular node is invariant towards. Each node learns these entities independently of each other which allows for a more flexible invariance model as opposed to architectures which replicate invariances across the network. 2. Prior Art There has been considerable interest in the past, in developing methods which incorporate prior knowledge of invariances or symmetries in data. Although the applications previously tackled were specific and relatively narrow, development of such methods offers a better understanding of the importance of modelling symmetries in data. In these cases, the architectures explicitly enforce such structure through different approaches. Though in this work we focus on deep architectures, it is interesting to note a number of works on modifications of Markov Random Fields and Restricted Boltzman Machines to achieve rotational invariance (Schmidt & Roth, 2012; Kivinen & Williams, 2011; Sohn & Lee, 2012). Incorporating known invariances using deep networks. Convolutional architectures have also seen efforts to produce rotation invariant representations. (Fasel & Gatica-Perez, 2006) and (Dieleman et al., 2015) rotate the input itself before feeding it into stacks of CNNs and generating rotation invariant representations through gradual pooling or parameter sharing across orientations. (Teney & Hebert, 2016; Wu et al., 2015; Li et al., 2017) rotate the convolution filters instead of the input. This is followed by a pooling operation to invoke invariance. Having the filters transform instead alleviates the need to transform the inputs, which is more expensive. Nonetheless, this requirement also remains considerably expensive during training. A similar approach was explored for scale by (Xu et al., 2014). (Clark & Storkey, 2015) propose a network to play Go incorporating reflective symmetry within the filters through weight tying. An inter- Non-Parametric Transformation Networks esting direction of research was explored by (Sifre & Mallat, 2013) where the filters were fixed and non-trainable. The properties of the filter structure allowed them to be rotation, scale and translation invariant. All these methods however make an critical assumptions about the invariances present in each of the applications. Although this is useful, it is very restrictive when dealing with general applications or cases where the transformations present are unknown and complex in nature such as general vision. (Cohen & Welling, 2016a) presented a method to incorporate invariances towards parametric groups. Recently, (Henriques & Vedaldi, 2017) proposed an interesting warped convolution based layer which can implement more general (but parameterized) equivariance. The transformations are known apriori and the sample grids are generated offline. Also, (Cohen & Welling, 2016b) introduced steerable filters into the convolutional framework. They require generating the filters offline and apriori, and hence have limited capability in learning arbitrary and adaptive transformations. NPTNs need no such apriori knowledge, can learn arbitrary non-parametric transformations and finally are simpler and more elegant in theory and in implementation. variance through complex weight sharing. Optimization was carried out through Topographic ICA and only carried out layer wise for deep networks. A separate approach towards modelling invariances was also developed where a normalizing transformation is applied to every input independently. This approach was applied to transforming auto encoders (Hinton et al., 2011) and Spatial Transformer Networks (Jaderberg et al., 2015). Learning unknown invariances from data. To address the previous shortcoming, a few studies with deep networks have been conducted towards learning more general transformations. Indeed, in most real world problems, nuisance transformations present in data are unknown or too complicated to be parameterized by some function. (Anselmi et al., 2013) proposed a theory of group invariances called I-theory and explored its connection to general classification problems and deep networks. Based off the core idea of measuring moments of a group invariant distribution, multiple works had demonstrated efficacy of the ideas in more challenging real-world problems such as face recognition, though not in a neural network setting (Liao et al., 2013; Pal et al., 2016; 2017). Each TN node (single input channel and single output channel) internally consists of two operations 1) (convolution) the convolution operation with a bank of filters and 2) (transformation pooling) a max pooling operation across the set of the resultant convolution feature maps from the single input channel. The pooling here is across only transformed versions of the single input channel. This is in contrast to the single convolution operation of the vanilla convolution node. Note that the pooling operation is not the same superficially to the standard pooling in a ConvNet, where the pooling is spatial in nature. Here the pooling is not spatial but rather across channels originating from the same input channel. Fig. 1 illustrates the operation of single TN node with a single input channel for a single patch. The single channel illustrated in the figure takes in a single input feature map and convolves it with a bank of |G| filters. Here |G| is the cardinality (or size) of the set of transformations that the TN node is invariant towards, with G being the actual set itself. Next, the transformation max pooling operation simply max pools across the |G| feature values to obtain a single TN activation value. When this node is replicated spatially, standard convolution layers can be utilized. A TN layer with M input channels and N output channels will simply have M N of these TN nodes with each of the N output channel having a TN node connected to each of the M input channels. Fig. 2 illustrates a multi-channel TN. Learning unknown invariances from data using deep networks. (Gens & Domingos, 2014) introduced Symnets which was one of the first to model general invariances in deep networks with back propagation. They utilize kernel based interpolation to tie weights model general symmetries. Consistent with the connection between sample complexity and invariance modelling, they find that Symnets perform better with fewer samples compared to vanilla ConvNets. Nonetheless, the approach is complicated and difficult to scale. To the best of our knowledge, this was the only approach which learned invariances from data in a neural network setting, albeit with a more complicated approach. (Anselmi et al., 2017) provide sufficient conditions to enforce the learned representation to have symmetries learned from data. (Kavukcuoglu et al., 2009) modelled local invariances using pooling over sparse coefficients of a dictionary of basis functions. (Ngiam et al., 2010) achieved local in- 3. Transformation Networks The Transformation Network (TN) is a feed forward network with its architecture designed to enforce invariance to some class of transformations. At the core of the framework is the TN node, whose structure itself enforces desirable invariance properties. A TN network consists of multiple such nodes stacked in layers. A TN node is analogous to a single channel output with a single channel input in a ConvNet. More specifically, if a vanilla ConvNet layer has M input channels and N output channels, the TN version of the layer would have M N TN nodes arranged in the same fashion. Formally, a TN node denoted by Υ acting on a 2D image patch vectorized as x ∈ Rd can be defined as follows. Υ(x) = max(hx, gwi) g∈G (1) Here, G is formally defined as a unitary group, i.e. a finite Non-Parametric Transformation Networks (a) Convolution layer (b) NPTN layer Figure 2. Comparison between (a) a standard Convolution layer and (b) a TN layer with |G| = 3. Each layer depicted has 2 input (shades of grey) and 2 output channels (shades of blue). The convolution layer has therefore, 2 × 2 = 4 filters, whereas the TN layer has 2 × 2 × 3 = 12 filters. NPTN (later introduced) has the same structure as the TN layer. The different shades of filters in the TN layer denote transformed versions of the same filter which are max pooled over (support denoted by inverted curly bracket). The + operation denotes channel addition. In our experiments, we adjust the input/output channels of the NPTN layer to have the same number of filters as the ConvNet baselines. set obeying group axioms with each element being unitary. w ∈ Rd is the weight or template instantiation of the set of transformed weights {gw | g ∈ G}2 . Therefore, the convolution kernel weights of a TN node are simply the transformed versions of w as transformed by the unitary group G. In a TN node, both the entities (w, G) are learned, i.e. a TN node is tasked with learning both the template instantiation w, and the set of transformations G to which the node is to be invariant towards. This is in sharp contrast with the vanilla convolutional node in which only the template instantiation w is learned, where G is hard coded to be the translation group. Theoretically, the TN node has to transform weight template w according to G to generate the rest of the filters to be pooled over during the trasformation pooling stage. In practice however, these are simply stored as a set of templates or filters which only implicitly encodes G. Gradient descent updates each filter differently over time facilitating this encoding. Thus, during any forward pass, no generation of transformed filters is necessary which significantly reduces computational complexity comapred to some previous works (Teney & Hebert, 2016; Wu et al., 2015). Invariances in a TN node. Invariance in the TN node arises in theory due to the symmetry of the unitary group structure of the filters. The max operation simply measures the infinite moment of an invariant distribution which leads to invariance. We demonstrate this in the form of the following result. Theorem 3.1. (Invariance Property) Given vectors x, w ∈ Rd , a unitary group G and Υ(x) = maxg∈G (hx, gwi), for any fixed g 0 ∈ G, the following is true Υ(x) = Υ(g 0 x) 2 We denote the action of a group element g on w with the notation gw to reduce clutter. Proof. Consider the distribution of elements of the set Sg0 = {hg 0 x, gwi} over all g ∈ G and for any particular g 0 ∈ G. This 1-D distribution characterizes the vector g 0 x through the projections onto gw. Due to unitarity of G, and that g 0 ∈ G, we have hg 0 x, gwi = hx, g 0−1 gwi. Now, since G is a group, we have for any g 0 ∈ G, g 0−1 g ∈ G due to the closure property. The set of elements in Sg0 contains all elements of G and hence must also contain g 0−1 g. This implies that the action of g 0−1 on the group G results in just a reordering of the group, leaving the distribution unchanged. Thus, the set Sg0 is unchanged. More specifically, Sg0 = {hg 0 x, gwi} = {hx, gwi} = Se , where e is the identity element of G. Thus, the two sets invoke the exact same distribution, which results in their moments being the same. This includes the infinite moment, which implies Υ(g 0 x) = maxg∈G Sg0 = maxg∈G Se = Υ(x). Theorem 3 shows that for any input x, the node output is invariant to the transformation group G. This is interesting, since one does not need to observe any transformed version of x during training which reduces sample complexity. Invariance is invoked for any arbitrary input x during test thereby demonstrating good generalization properties. It is worthwhile to note that vanilla Convnets with their pooling layers pool over perfect unitary groups since translation is a unitary operation and pooling structure is enforced over a finite group. General Non-group Structure in a TN node. In practice, a TN node does not explicitly enforce any group structure to the set of templates or convolution filters. Although such a structure is required for theoretically generating invariance, sufficient approximate invariance has been observed in empirical studies on real-world data utilizing non-group structures as found in (Pal et al., 2016; Liao et al., 2013). In our experiments, we observe that the TN architecture networks are able to perform better by learning invariance towards both group structured transformations such as translation and rotation, and also towards general non-parametric transformations. ConvNets are a kind of Parametric Transformation Networks (PTNs). The vanilla convolution layer simply performs the convolution operation of the filters onto the image. This by itself does not produce any invariance to any transformation. However, when followed by a spatial pooling operation (or even a second convolution layer), the resultant feature is explicitly invariant to only translation. This convolution and pooling operation can be modelled by the TN node when the group G is defined to be a finite translation group. Following the TN node operation, the translation group G acts on the filter template w and transformed versions of it are computed on-the-fly for a ConvNet, which (for a single patch) are then dot-producted with the input patch to generates features. These features are then max-pooled Non-Parametric Transformation Networks 0.5 0.8 0.78 0.45 0.76 Conv (48) NPTN (9 5) NPTN (12 4) NPTN ch (16 3) NPTN (24 2) NPTN (48 1) 0.74 0.4 0.35 Loss 0.72 Loss over by the second operation of the TN node resulting in translation invariance. It is straight-forward to observe that a generalization of the vanilla convolution node would be where the group G is parameterized to model more complicated transformations. Networks with this more general type of parametric TN node are called Parametric Transformation Networks (PTN). Thereby, a vanilla convolution network (ConvNet) with its pooling operation is a kind of PTN. 0.7 0.68 0.25 0.66 0.2 0.64 0.15 0.62 4. Non-Parametric Transformation Networks We now introduce our main practical contribution, which are Transformation Networks that can learn general nonparametric symmetries from data. A Non-Parametric Transformation Network (NPTN) is a network of TN nodes that lack any parametric model for the transformation which describes the set of templates/filters in the nodes. They are able to explicitly learn arbitrary invariances and symmetries from data itself better than a vanilla CNN. Compared to other approaches to model general invariances, their architecture is a natural generalization of CNNs and is elegantly simple. Setting |G| = 1 reduces a NPTN to a standard CNN in theory and in practice. NPTN layer structure. NPTNs can be implemented using standard deep learning libraries and convolutional routines. They can be optimized using standard gradient descent methods such as SGD. They can replace any convolution layer in any architecture making them versatile. We describe one way to implement a NPTN layer with M input channels, N output channels and that models a set of transformations with cardinality |G| (as illustrated in Fig. 2). Note that each of the M × N channels (analogous to the input × output number of channels in ConvNets) models |G| filters independently. For every input channel, |G| filters must be learned which would encode the pre-transformed filter set. This continuously maintained set of filters bypasses the need to transform the filters on-the-fly during a forward pass or whenever the weights change due to an update. The gradients itself encode the invariance updates. Once the input is convolved with these M × |G| filters, the M sets each with |G| feature maps each are max pooled across. More specifically, each |G| number of feature maps from a single input channel results in one intermediate feature map after max pooling (across the |G| channels). After this operation there are M intermediate feature maps which are transformation invariant. Now, the sum (alternatively the mean) of these M feature maps results in one output feature map or channel. Each of the N output channels performs the same operation with independent of the other channels. The total number of filters learned for a NPTN layer with M input channels, N output channels and that models |G| number of transformations is M N |G|. Importantly, every 0.3 0.6 150 200 250 300 Epoch 0.1 150 Conv (48) Conv (72) Conv (89) Conv (104) Conv (118) Conv (130) Conv (141) NPTN (48 1) NPTN (48 2) NPTN (48 3) NPTN (48 4) NPTN (48 5) NPTN (48 6) NPTN (48 7) 200 250 300 Epoch (a) Training loss for a 2 layer net-(b) Training loss for a 3 layer network work Figure 3. Training loss on CIFAR10. (a) 2 layered network. Each network has the same number of parameters in the second layer and lower number of parameters for the first layer for the NPTN variants. (b) 3 layered network. Networks with the same color have the same number of parameters. All non-trivial NPTN variants (|G| > 1) have higher training error but lower test error, thereby shortening the generalization gap. connection from input to output of a layer independently models invariance using separate |G| number of filters. Non-unitary structure in a NPTN node. NPTNs do not explicitly enforce a unitary structure. Preserving a unitary structure would restrict the complexity of transformations that can be modelled. Nonetheless, such a restriction might also bring about regularization benefits which is a question that is left for future exploration. NPTNs in this aspect are an approximation whereas ConvNets exactly maintain the unitary and group structure explicitly through hard coded operations. Despite this fact, we find in our experiments that NPTNs perform better, leading to the hypothesis that modelling more complex transformations is more important than exactly preserving the unitary group structure. Relation to Maxout Networks. NPTNs deviate significantly in motivation and architecture from Maxout Networks (Goodfellow et al., 2013). Maxout Networks were introduced as a more general activation function which also applied max pooling across channels. However, each of the set of channels pooled over has a support over all input channels. There is no relation to invariance modelling of a single input feature map. NPTNs on the other hand only max pool across channels which take in only a single channel as input. The filters of the pooled over channels get applied to a single input. Pooling across these responses results in an invariant description of the input. 5. Empirical Evaluation 5.1. Implementation. We implement NPTNs using PyTorch with its standard convolution routines. Our NPTN implementation consisted of Non-Parametric Transformation Networks 5.2. Benchmarking against ConvNets In our first set of experiments, we benchmark and characterize the behavior of NPTNs against the standard ConvNets augmented with Batch Normalization (Ioffe & Szegedy, 2015). The goal of this set of experiments is to observe whether learning non-parametric transformation invariance from complex visual data itself helps with object classification. For this experiment, we utilize the CIFAR10 dataset3 . The networks we experiment with are not designed to compete on this data but rather throw light into the behavior of NPTNs. We therefore utilize shallow networks, namely a two and three layered network for these experiments. Each layer block of the baseline ConvNets consist of the convolution layer, followed by batch normalization and the non-linearity (PReLU) and finally by a 2 by 2 spatial max pooling layer. Each corresponding NPTN network replaces only the convolution layer with the NPTN layer. Thus, NPTN is allowed to model non-parametric invariance in addition to the typically enforced translation invariance due to spatial max pooling. Two layered NPTN. Our first pilot experiment works with a two layered network with the baseline ConvNet having channels [48, 16] with a total of 3 × 48 + 48 × 16 = 912 filters. The NPTN variants in this experiment keep the number of filters in the second layer constant with 48 channels with |G| = 1 denoted by (48 1), 24 channels with |G| = 2 denoted by (24 2), and so on up until 9 channels with |G| = 5 3 With standard data augmentation of random cropping after a 4 pixel pad, and random horizontal flipping. Training was for 300 epochs with the learning rate being 0.1 and decreased at epoch 150, and 225 by a factor of 10. ConvNet NPTN 0.64 Test loss four operations performed in sequence, namely convolution, volumettric max pooling, channel reordering and finally volumetric mean pooling. For M inputs, N outputs and |G| transformations, the first function is the standard convolution function with M inputs and M N |G| outputs with the groups option set to M . Hence a total of M N |G| filters are learned. The second function is the volumetric max pooling to pool only across channels with a kernel size (|G|, 1, 1) (where the kernel size is (channels, pool h, pool w)). The kernel size along height and width can be increased from 1 if spatial max pooling is desired as well. Note that the output of the convolution function will have N channels in sequence from the same input channel replicated M times. However, we want the alternate configuration before the volumetric mean pooling layer. We instead require one feature map from every input channel to be together in order (i.e. from each of the M input channels) replicated N times. This is solved by a channel reordering operation which is the third operation. The final operation is the volumetric mean pooling with a kernel of size (M, 1, 1) resulting N output channels as required. 0.62 0.6 (48, 1) (24, 2) (16, 3) (12, 4) (9, 5) (Channel, |G|) Figure 4. Test losses on CIFAR10 for the two layered network. Each network listed has the same number of filters. ConvNet denoted had 48 channels. Method ConvNet (48) NPTN (48, 1) ConvNet (72) NPTN (48, 2) ConvNet (89) NPTN (48, 3) ConvNet (104) NPTN (48, 4) ConvNet (118) NPTN (48, 5) ConvNet (130) NPTN (48, 6) ConvNet (141) NPTN (48, 7) (k = 3) 0.555 0.548 0.506 0.498 0.485 0.476 0.474 0.479 0.464 0.478 0.453 0.483 0.456 0.477 (k = 5) 0.467 0.472 0.440 0.431 0.440 0.407 0.441 0.418 0.431 0.412 0.438 0.422 0.435 0.421 (k = 7) 0.465 0.456 0.481 0.427 0.467 0.438 0.485 0.448 0.482 0.461 0.478 0.457 0.473 0.455 Table 1. Test loss on CIFAR10 for the three layered network. Each NPTN is paired with its corresponding ConvNet baseline which has approximately the same number of parameters. (9 5). Fig. 3(a) and Fig. 4 show the training and testing losses. Each network experimented with has the same number of parameters. For the two layered network we find that the (48 1) performs slightly worse than the ConvNet baseline in training. However, all NPTN variants which learn a non-trivial set of transformations (|G| > 1) have lower training loss except (9 5). NPTNs (24 2), (16 3), (12 4) perform significantly better. Fig. 3(a) shows that all NPTN variants have much lower test losses with (16 3) performing the best. Three layered NPTN. For the second comparison experiment, we explore the behavior of a three layered network with different kernel sizes. To maintain a fair comparison, we have an approximately equal number of filters between the corresponding baseline ConvNet (by slightly increasing the number of channels) and the NPTN variant while keeping the number of channels constant for the NPTNs at 48 but instead increasing cardinality of the transformation set (|G|). Thus, the transformation modelling capacity of the Non-Parametric Transformation Networks Rotations ConvNet (36) NPTN (36, 1) NPTN (18, 2) NPTN (12, 3) NPTN (9, 4) Translations ConvNet (36) NPTN (36, 1) NPTN (18, 2) NPTN (12, 3) NPTN (9, 4) 0◦ 0.022 0.021 0.020 0.019 0.018 0 pixels 0.019 0.018 0.019 0.019 0.019 30◦ 0.037 0.041 0.034 0.033 0.036 4 pixels 0.030 0.029 0.023 0.022 0.023 60◦ 0.066 0.064 0.053 0.055 0.057 8 pixels 0.063 0.061 0.054 0.051 0.051 90◦ 0.106 0.108 0.092 0.087 0.095 12 pixels 0.218 0.224 0.190 0.189 0.195 Table 2. Test loss on progressively transformed MNIST with (a) random rotations and (b) random pixel shifts. NPTNs can learn invariances to arbitrary transformations from the data itself without any apriori knowledge. network is slowly increased. We train/test all networks on CIFAR10 and report results in Fig. 3(b) and Table 1. We find that a three layered NPTN has higher training loss as compared to its ConvNet baseline but demonstrates lower test loss. This indicates that NPTN have a structural bias which further shortens the generalization gap. This behavior in training is in contrast to the two layered network but in line with the behavior during test time with decreased loss. We find that NPTNs with roughly the same computational complexity and parameters generalize better than ConvNets. Note that however, we do not observe such benefits for a kernel size of 3, in fact in many cases NPTNs perform worse. We hypothesize that, this is because a 3 × 3 filter size is too small an area of an activation map to exhibit meaningful structured spatial transformations that can be learned. Better generalization is consistently observed for the larger kernel sizes of 5 and 7 which do contain more structured transformations due to larger receptive field sizes. Effect of training with larger |G|. We find that performance peaks at |G| being around 3 and going higher offers less performance gains. We believe that this is because the forward pass of the NPTN selects a single transformation channel (per input channel) to update due to the max operation. Every back-propagation therefore updates only a single filter out of the |G| filters (per input channel) leading to each filter being updated on an average by the total num1 ber of iterations times a factor of |G| . This results in the filters being less optimized than standard ConvNet filters resulting in a trade off against modelling invariance. The effect seems more pronounced for higher |G|. A standard ConvNet does not face this problem as every filter is updated for any given backprop iteration (|G| = 1). 5.3. Learning Transformation Invariances Efficient learning of unknown invariances from data. We demonstrate the ability of NPTN networks to learn invariances directly from data without any apriori knowledge. For this experiment, we augment MNIST with a) random rotations b) random translations, both in training and testing data thereby increasing the complexity of the learning problem itself. For each sample, a random instantiation of the transformation was applied. For rotation, the angular range was increased, whereas for translations it was the pixel shift range. Table 2 presents these results. All networks in the table are two layered and have the exact same number of parameters. As expected, NPTNs match the performance of vanilla ConvNets when there were no additional transformations added (0◦ and 0 pixels)4 . However, as the transformation intensity (range) is increased, NPTNs perform significantly better than ConvNets. Trends consistent with previous experiments were observed with the highest performance observed with NPTN (|G| = 3). This highlights the main feature of NPTNs, i.e. their ability to model arbitrary transformations observed in data without any apriori information and without changes in architecture whatsoever. They exhibit better performance in settings where both rotation invariance and stronger translation invariance is required (even though ConvNets are designed specifically to handle translations). This ability is something that previous deep architectures did not posses nor demonstrate. Efficacy with depth. As an exploratory study, we examine how the relative depth of the NPTN layer assists in learning transformation invariance on MNIST. For this, we train three networks with number of layers being 5, 6 and 8 with 48 channels per layer expect the last layer with 16 channels. We replace layers at different depth with a single NPTN layer (|G| = 3) starting at depth 2 through to the last but one layer and observe the impact on performance. We do this while keeping the number of parameters and the computation complexity exactly the same for all networks of a particular depth. To enforce this, the number of channels in the ConvNet baselines were slightly increased to maintain the same number of parameters as the NPTN versions. Fig. 5 shows the performance of these networks on CIFAR10. The term layer ratio signifies the relative depth of the NPTN layer replacement (layer ratio is the layer of replacement divided by the total number of layers). We find that, as a general trend, NPTNs offer most performance gains towards the lower layers where it can learn more complicated low level transformations than translations. Performance gains decrease towards a layer ratio of 0.7. It is not clear at this NPTNs perform slightly better than ConvNets for 0◦ rotations because for all rotation experiments, small translations up to 2 pixels were applied only in training. 4 Non-Parametric Transformation Networks 2 Conv 5 Layers Conv 6 Layers Conv 8 Layers NPTN 5 layers NPTN 6 layers NPTN 8 layers 0.7 0.6 0.5 Test Error % Test Loss 0.8 1.5 1 (128) (64, 2) (42, 3) (32, 4) (Channel, |G|) 0.2 0.4 0.6 0.8 1 1.2 Layer Ratio Figure 5. Performance of NPTN layer replacement (|G| = 3) w.r.t the relative depth of the replacement on MNIST. Layer ratio signifies how close to the top layer is the NPTN replacement. point why this effect takes place. Nonetheless, the trend of better performance at lower layer replacements is clear. 5.4. NPTNs with Capsule Networks Capsule Networks with dynamic routing were recently introduced as an extension of standard neural networks (Sabour et al., 2017). The main motivation behind the use of capsules (group of neurons) to represent entities is to allow capsules to encode different properties of the object. However, since the architecture is implemented using vanilla convolution layers, invariance properties of the networks are limited. Our goal for this final experiment is to augment Capsule Nets with NPTNs. We do this by replacing the convolution layers in the Primary Capsule layer of the published architecture with NPTN layers while maintaining the same number of parameters (by reducing number of channels and increasing |G|). In effect, the convolutional capsules were replaced by NPTN capsules. Our baseline is the proposed CapsuleNet with 3 layers using a third party implementation PyTorch5 . The number of output channels in the first convolution layer was kept at 48. The baseline convolution capsule layer had 128 output channels. The NPTN variants progressively decreased the number of channels as |G| was increased. All other hyperparameters were preserved. The networks were trained on the 2-pixel shifted MNIST for 50 epochs with a learning rate of 10−3 . They were tested on the test set with no shift. The performance statistics of 5 runs are reported in Fig. 6. We find that for roughly the same number of kernel filters (and parameters), Capsule Nets have much to gain from the use of NPTN layers (a significant loss decrease from 1.90 to 0.78 for 13 of the baseline number of channels and |G| = 3). The learning of invariances within each capsule significantly increases efficacy and performance of the overall architecture. 5 https://github.com/dragen1860/CapsNet-Pytorch.git Figure 6. Test errors on MNIST for Capsule Nets augmented with NPTNs. (128) denotes a Capsule Network with a vanilla ConvNet. Other labels are NPTNs with (channels, |G|). The number of filters from left to right is {4224, 4160, 4074, 4128}. NPTNs significantly outperform ConvNets in Capsule Nets with fewer filters. 6. Discussion It is clear that the success of ConvNets is not the whole story towards solving perception. Studies into different aspects of network design will prove to be paramount in addressing the complex problem of not just visual but general perception. The development of NPTNs offer one such design aspect, i.e. modelling non-parametric invariances and symmetries simultaneously from data. Through our experiments, we found that NPTNs can indeed effectively learn general invariances without any apriori information. Further, they are effective and improve upon vanilla ConvNets even when applied to general vision data as presented in CIFAR10 with complex unknown symmetries. This seems to be a critical requirement for any system that is aimed at taking a step towards general perception. Assuming knowledge of symmetries in real-world data (not just visual) is impractical and succesful models would need to adapt accordingly. In all of our experiments, NPTNs were compared to vanilla ConvNet baselines with the same number of filters (and thereby more channels). Interestingly, the superior performance of NPTNs with fewer channels than ConvNet baselines indicates that better modelling of invariances is a useful goal to pursue during design. Explicit and efficient modelling of invariances has the potential to improve many existing architectures. In our experiments, we also find that Capsule Networks which utilized NPTNs instead of vanilla ConvNets performed much better. This motivates and will justify more attention towards architectures and other solutions that efficiently model general invariances in deep networks. Such an endeavour might not only produce networks performing better in practice, it promises to deepen our understanding of deep networks and perception in general. Non-Parametric Transformation Networks References Anselmi, Fabio, Leibo, Joel Z, Rosasco, Lorenzo, Mutch, Jim, Tacchetti, Andrea, and Poggio, Tomaso. Unsupervised learning of invariant representations in hierarchical architectures. arXiv preprint arXiv:1311.4158, 2013. Anselmi, Fabio, Evangelopoulos, Georgios, Rosasco, Lorenzo, and Poggio, Tomaso. Symmetry regularization. Technical report, Center for Brains, Minds and Machines (CBMM), 2017. Burges, Christopher JC and Schölkopf, Bernhard. Improving the accuracy and speed of support vector machines. In Advances in neural information processing systems, pp. 375–381, 1997. Chen, Yunpeng, Li, Jianan, Xiao, Huaxin, Jin, Xiaojie, Yan, Shuicheng, and Feng, Jiashi. Dual path networks. In Advances in Neural Information Processing Systems, pp. 4470–4478, 2017. Clark, Christopher and Storkey, Amos. Training deep convolutional neural networks to play go. In International Conference on Machine Learning, pp. 1766–1774, 2015. Cohen, Taco and Welling, Max. Group equivariant convolutional networks. In International Conference on Machine Learning, pp. 2990–2999, 2016a. Cohen, Taco S and Welling, Max. Steerable cnns. arXiv preprint arXiv:1612.08498, 2016b. Dieleman, Sander, Willett, Kyle W, and Dambre, Joni. Rotation-invariant convolutional neural networks for galaxy morphology prediction. Monthly notices of the royal astronomical society, 450(2):1441–1459, 2015. Fasel, Beat and Gatica-Perez, Daniel. Rotation-invariant neoperceptron. In Pattern Recognition, ICPR. 18th International Conference on, volume 3, pp. 336–339. IEEE, 2006. Gens, Robert and Domingos, Pedro M. Deep symmetry networks. In Advances in neural information processing systems, pp. 2537–2545, 2014. Goodfellow, Ian, Warde-Farley, David, Mirza, Mehdi, Courville, Aaron, and Bengio, Yoshua. Maxout networks. In International Conference on Machine Learning, pp. 1319–1327, 2013. Hadsell, Raia, Chopra, Sumit, and LeCun, Yann. Dimensionality reduction by learning an invariant mapping. In Computer vision and pattern recognition, 2006 IEEE computer society conference on, volume 2, pp. 1735–1742. IEEE, 2006. He, Kaiming, Zhang, Xiangyu, Ren, Shaoqing, and Sun, Jian. Deep residual learning for image recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 770–778, 2016. Henriques, João F and Vedaldi, Andrea. Warped convolutions: Efficient invariance to spatial transformations. In International Conference on Machine Learning, 2017. Hinton, Geoffrey E, Krizhevsky, Alex, and Wang, Sida D. Transforming auto-encoders. In International Conference on Artificial Neural Networks, pp. 44–51. Springer, 2011. Hu, Jie, Shen, Li, and Sun, Gang. Squeeze-and-excitation networks. arXiv preprint arXiv:1709.01507, 2017. Huang, Gao, Liu, Zhuang, Weinberger, Kilian Q, and van der Maaten, Laurens. Densely connected convolutional networks. arXiv preprint arXiv:1608.06993, 2016. Ioffe, Sergey and Szegedy, Christian. Batch normalization: Accelerating deep network training by reducing internal covariate shift. In International conference on machine learning, pp. 448–456, 2015. Jaderberg, Max, Simonyan, Karen, Zisserman, Andrew, et al. Spatial transformer networks. In Advances in Neural Information Processing Systems, pp. 2017–2025, 2015. Kavukcuoglu, Koray, Fergus, Rob, LeCun, Yann, et al. Learning invariant features through topographic filter maps. In Computer Vision and Pattern Recognition, 2009. CVPR 2009. IEEE Conference on, pp. 1605–1612. IEEE, 2009. Kivinen, Jyri J and Williams, Christopher KI. Transformation equivariant boltzmann machines. In International Conference on Artificial Neural Networks, pp. 1–9. Springer, 2011. LeCun, Yann, Bottou, Léon, Bengio, Yoshua, and Haffner, Patrick. Gradient-based learning applied to document recognition. Proceedings of the IEEE, 86(11):2278–2324, 1998. Li, Junying, Yang, Zichen, Liu, Haifeng, and Cai, Deng. Deep rotation equivariant network. arXiv preprint arXiv:1705.08623, 2017. Liao, Qianli, Leibo, Joel Z, and Poggio, Tomaso. Learning invariant representations and applications to face verification. In Advances in Neural Information Processing Systems, pp. 3057–3065, 2013. Ngiam, Jiquan, Chen, Zhenghao, Chia, Daniel, Koh, Pang W, Le, Quoc V, and Ng, Andrew Y. Tiled convolutional neural networks. In Advances in neural information processing systems, pp. 1279–1287, 2010. Non-Parametric Transformation Networks Niyogi, Partha, Girosi, Federico, and Poggio, Tomaso. Incorporating prior information in machine learning by creating virtual examples. Proceedings of the IEEE, 86(11): 2196–2209, 1998. Pal, Dipan, Kannan, Ashwin, Arakalgud, Gautam, and Savvides, Marios. Max-margin invariant features from transformed unlabelled data. In Advances in Neural Information Processing Systems 30, pp. 1438–1446, 2017. Pal, Dipan K, Juefei-Xu, Felix, and Savvides, Marios. Discriminative invariant kernel features: a bells-and-whistlesfree approach to unsupervised face recognition and pose estimation. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 5590– 5599, 2016. Sabour, Sara, Frosst, Nicholas, and Hinton, Geoffrey E. Dynamic routing between capsules. In Advances in Neural Information Processing Systems, pp. 3859–3869, 2017. Schmidt, Uwe and Roth, Stefan. Learning rotation-aware features: From invariant priors to equivariant descriptors. In Computer Vision and Pattern Recognition (CVPR), 2012 IEEE Conference on, pp. 2050–2057. IEEE, 2012. Schroff, Florian, Kalenichenko, Dmitry, and Philbin, James. Facenet: A unified embedding for face recognition and clustering. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 815–823, 2015. Sifre, Laurent and Mallat, Stéphane. Rotation, scaling and deformation invariant scattering for texture discrimination. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 1233–1240, 2013. Sohn, Kihyuk and Lee, Honglak. Learning invariant representations with local transformations. arXiv preprint arXiv:1206.6418, 2012. Teney, Damien and Hebert, Martial. Learning to extract motion from videos in convolutional neural networks. In Asian Conference on Computer Vision, pp. 412–428. Springer, 2016. Wu, Fa, Hu, Peijun, and Kong, Dexing. Flip-rotatepooling convolution and split dropout on convolution neural networks for image classification. arXiv preprint arXiv:1507.08754, 2015. Xu, Yichong, Xiao, Tianjun, Zhang, Jiaxing, Yang, Kuiyuan, and Zhang, Zheng. Scale-invariant convolutional neural networks. arXiv preprint arXiv:1411.6369, 2014. Zagoruyko, Sergey and Komodakis, Nikos. Wide residual networks. arXiv preprint arXiv:1605.07146, 2016.
2cs.AI
A distributed primal-dual algorithm for computation of generalized Nash equilibria with shared affine coupling constraints via operator splitting methods Peng Yi, Lacra Pavela, a Department of Electrical and Computer Engineering, University of Toronto arXiv:1703.05388v1 [math.OC] 15 Mar 2017 Abstract In this paper, we propose a distributed primal-dual algorithm for computation of a generalized Nash equilibrium (GNE) in noncooperative games over network systems. In the considered game, not only each player’s local objective function depends on other players’ decisions, but also the feasible decision sets of all the players are coupled together with a globally shared affine inequality constraint. Adopting the variational GNE, that is the solution of a variational inequality, as a refinement of GNE, we introduce a primal-dual algorithm that players can use to seek it in a distributed manner. Each player only needs to know its local objective function, local feasible set, and a local block of the affine constraint. Meanwhile, each player only needs to observe the decisions on which its local objective function explicitly depends through the interference graph and share information related to multipliers with its neighbors through a multiplier graph. Through a primal-dual analysis and an augmentation of variables, we reformulate the problem as finding the zeros of a sum of monotone operators. Our distributed primal-dual algorithm is based on forward-backward operator splitting methods. We prove its convergence to the variational GNE for fixed step-sizes under some mild assumptions. Then a distributed algorithm with inertia is also introduced and analyzed for variational GNE seeking. Finally, numerical simulations for network Cournot competition are given to illustrate the algorithm efficiency and performance. Keywords: Network system; generalized Nash equilibrium; multi-agent systems; distributed algorithm; operator splitting; 1. Introduction Engineering network systems, like power grids, communication networks, transportation networks and sensor networks, play a foundation role in modern society. The efficient and secure operation of various network systems relies on efficiently solving decision and control problems arising in those large scale network systems. In many decision problems, the nodes can be regarded as agents that need to make local decisions possibly limited by the shared network resources within local feasible sets. Meanwhile, each agent has a local cost/utility function to be optimized, which depends on the decisions of other agents. The traditional manner for solving such decision problems over networks is the centralized optimization approach, which relies on a control center to gather the data of the problem and to optimize the social welfare (usually taking the form of the sum of local objective functions) within the local and global constraints. The centralized optimization approach may not be suitable for decision problems over large scale networks, since it needs bidirectional communication between all the network nodes and the control center, it is not robust to the failure of the center node, and the computational burden for the center is unbearable. It is also not preferable because the privacy of each agent might be compromised when the data is transferred I This work was supported by NSERC Discovery Grant (261764). Email address: [email protected], [email protected] (Peng Yi, Lacra Pavel) Preprint submitted to Elsevier to the center. Recently, a distributed optimization approach is proposed as an alternative methodology for solving decision problems in network systems (Yi, Hong & Liu (2016), Shi, Ling, Wu and Yin (2015) and Zeng, Yi, Hong & Xie (2016)). In the distributed optimization approach, the data is distributed throughout the network nodes and there is no control center, and each agent in the network can just utilize its local data and share information with its neighbour agents to compute its local decision that corresponds to the optimal solution of the social welfare optimization problem. Therefore, the distributed optimization approach overcomes the drawbacks of the centralized optimization approach by decomposing the data, computation and communication to each agent. Moreover, each agent has the authority and autonomy to formulate its own objective function without worrying about privacy leaking out. However, both approaches adopt the same solution concept, that is the optimal social welfare solution with local and global constraints, as the solution criterion of decision problems in network systems. However, optimal solutions of social welfare may not be proper solution concepts in many applications. In fact, with the deregulation and liberalization of markets, there is no guarantee that the agents will not deliberately deviate from their local optimal solutions to increase (decrease) own local utility (cost), possibly by deceiving to utilize more network resources. In this paper, we consider the game theoretic approach where each agent in the network has its own local autonomy and rationality. In such a setup of multiple interacting rational March 17, 2017 players making decisions in a noncooperative environment, Nash Equilibrium (NE) is a more reasonable solution. In an NE, no player can increase (decrease) its local utility (cost) by unilaterally changing its local decision, therefore, no agent has the incentive to deviate from it. In other words, NE is a self-enforceable solution in the sense that once NE is computed all the agents will execute that NE. Recently, there has been increasing interest in adopting game theory and NE as the modeling framework and solution concept for various network decision problems, like wireless communication systems (Scutari,Palomar, Facchinei, and Pang, (2010) and Menache & Ozdaglar (2011)), network flow control (Alpcan & Basar (2005)), optical networks (Pan & Pavel (2009)) and smart grids (Ye & Hu (2016)). Moreover, in engineering network systems, not only the local objective function of each agent depends on other players’ decisions, but also the feasible set of each local decision could depend on other agents’ decisions, because the agents may compete for the utilization of some shared or common network resources like bandwidth, spectrum or power. This type of network decision problems can be modeled as noncooperative games with coupling constraints, and generalized Nash equilibrium (GNE) can be adopted as its solution. The study of GNE dates back to the social equilibrium concept proposed by Debreu (1952), and flourished in the last two decades with applications in practical problems like environment pollution games (Krawczyk & Uryasev (2000)), power market design (Contreras, Klusch, Krawczyk (2004)), optical networks (Pavel (2007)), wireless communication (Facchinei & Pang (2010)). Interested readers can refer to Facchinei & Kanzow (2010) for a historical review of GNE, and refer to Fischer, Herrich & Schonefeld (2014) for recent developments, and to Facchinei & Pang (2010) for a technical treatment. Even though NE or GNE is a reasonable and expectable solution as a result of multiple rational agents making decisions in a noncooperative manner, how to arrive at an NE (GNE) is by no way a self-evident task. Each player needs to know the complete game information, including objective functions and feasible decision sets of all the other agents, in order to compute NE in an introspective manner. It gets much more complicated for computing GNE, because the agents also have to consider the coupling in the feasible decision sets. In fact, as of yet there is no universal manner to efficiently compute GNE in games with coupling constraints (Harker (1991) and Fischer, Herrich & Schonefeld (2014)), except for games with shared coupling constraints (Facchinei, Fischer & Piccialli (2007)). Moreover, for games in large scale network systems, it is quite unrealistic and undesirable to assume that each agent could have the complete information of the whole network, because this implies prohibitive communication and computation burden and no privacy protection. Therefore, each player (agent) should compute its local decision corresponding with an NE or GNE in a distributed manner, somehow resembling the distributed optimization approach. In other words, each agent should only utilize its local objective function, local feasible set and possible local data related to coupling constraints, and should only share information with its neighbouring agents to compute its local decision in the NE (GNE). This turns out to be an emerging research topic and gets studied in Salehisadaghiani & Pavel (2016a), Koshal,Nedić & Shanbhag (2016), Parise, Gentile, Grammatico & Lygeros (2015), Ye & Hu (2016) and Swenson, Kar & Xavier (2015), etc. Motivated by the above, in this work we consider a distributed algorithm for iterative computation of GNE in noncooperative games with shared affine coupling constraints over network systems. The considered noncooperative game has each agent’s local objective function depending on other agents’ decisions as specified by an interference graph, and has also an affine constraint shared by all agents, coupling all players’ feasible decision sets. The considered game model covers many practical problems, like the power market model in Contreras, Klusch, Krawczyk (2004), environment pollution game in Krawczyk & Uryasev (2000), power allocation game in communication systems in Yin, Shanbhag & Mehta (2011). A (centralized) numerical algorithm was recently studied in Schiro, Pang & Shanbhag (2013) for quadratic objective functions and in Dreves & Sudermann (2016) for linear objective functions. Generally speaking, the GNE of the considered game may not be unique. In this work, we adopt the variational GNE, that corresponds with the solution of a variational inequality proposed in Facchinei, Fischer & Piccialli (2007), to be a refinement GNE solution. The variational GNE is a particular type of the normalized equilibrium proposed in Rosen (1965), and enjoys a nice economical interpretation that all the agents have the same shadow price for shared network resources without any discrimination as pointed in Kulkarni & Shanbhag (2012). Furthermore, the variational GNE enjoys a sensitivity and stability property (Facchinei & Pang (2010) and Facchinei & Kanzow (2010)), hence we adopt it as the desirable solution. We propose a new type of distributed algorithm that agents can use to compute the variational GNE by only manipulating their local data and communicating with neighbouring agents. Observing that the KKT condition of the corresponding variational inequality requires all agents to reach consensus on the multiplier of the shared affine constraint, we introduce a local copy of the multiplier and an auxiliary variable for each player. To enforce the consensus of local multipliers, we use a reformulation that incorporates the Laplacian matrix of a connected graph. Motivated by the forward-backward operator splitting method for finding zeros of a sum of monotone operators (refer to Bauschke & Combettes (2011)) and the recent primal-dual algorithm proposed in Condat (2013) for optimization problems with linear composition terms, we propose a novel distributed algorithm for iterative computation of GNE. The main idea is to introduce a suitable metric matrix and to split the equivalent reformulation into two monotone operators. An operator splitting method has been adopted for NE computation in a centralized manner in Briceno-Arias & Combettes (2013). A different splitting idea is adopted here appropriate for distributed GNE computation. Moreover, a distributed algorithm with inertia is also proposed and investigated, motivated by the acceleration algorithms in 2 Alvarez & Attouch (2001), Attouch, Chbani, Peypouquet, and Redont (2016), Iutzeler & Hendrickx (2016) and Lorenz & Pock (2015), most of which only focused on optimization problems. The convergence of the proposed algorithms is verified under suitable fixed step-size choice and some mild assumptions on the objective functions and communication graphs. The recent works of Zhu & Frazzoli (2016), Yu, van der Schaar & Sayed (2016), Liang, Yi and Hong (2016) and Paccagnan, Gentile, Parise, Kamgarpour & Lygeros (2016) are closely related with this work since all of them are concerned with the distributed algorithm for seeking GNE of noncooperative games with coupling constraints. Zhu & Frazzoli (2016) address the GNE seeking for the case where each player has non-shared local coupling constraints. Assuming that each player can observe other players’ decisions on which its local objective function and local constraint functions depend through the interference graph, Zhu & Frazzoli (2016) propose a distributed primal-dual GNE seeking algorithm based on variational inequality methods, and show algorithm convergence under diminishing step-sizes. Yu, van der Schaar & Sayed (2016) investigate the distributed GNE seeking under stochastic data observations. The authors assume that the coupling constraints have a locally shared property that if one player has its one of local constraints dependent on the decision of another player, then this constraint must be shared between those two players. Their algorithm design is based on a penalty-type gradient method. Under the assumption that each player can observe the decisions on which its local objective function and constraint functions depend, Yu, van der Schaar & Sayed (2016) utilize a gradient type algorithm to seek the pure NE of the game derived by penalizing the coupling and local constraints. They show that their algorithm can reach a region near the pure penalized NE with a constant step-size, which will approach a GNE if the penalizing parameter goes to infinity. Both Liang, Yi and Hong (2016) and Paccagnan, Gentile, Parise, Kamgarpour & Lygeros (2016) consider the distributed algorithm for seeking a variational GNE of the aggregative game with globally shared affine coupling constraints. This represents a particular type of game where the players’ local objective functions depend on some aggregative variables of all agents’ decisions. Liang, Yi and Hong (2016) assume that each player has local copies of both the aggregative variables and the multipliers, and combine a finite-time convergent continuous-time consensus dynamics and a projected gradient flow to derive their distributed GNE seeking dynamics. Meanwhile, Paccagnan, Gentile, Parise, Kamgarpour & Lygeros (2016) adopt the asymmetric projection algorithm for variational inequalities to design their variational GNE seeking algorithm. However Paccagnan, Gentile, Parise, Kamgarpour & Lygeros (2016) assume that there is an additional central node for the update of the common multiplier, and only address quadratic objective functions. Compared with these works, our paper has following contributions, (i): The considered noncooperative game model is completely general, thus a generalization of the aggregative game in Liang, Yi and Hong (2016) and Paccagnan, Gentile, Parise, Kamgarpour & Lygeros (2016). We further assume that the shared affine coupling constraint is also decomposed such that each player only knows its local contribution to the global constraint, that is only a sub-block matrix of the whole constraint matrix. In this sense, no player knows exactly the shared constraints, hence, our problem model is also different from the ones in Yu, van der Schaar & Sayed (2016) and Zhu & Frazzoli (2016). The decomposition of the coupling constraints, together with the localization of player’s local objective function and local feasibility set, is quite appealing for iterative computation of GNE in large-scale network systems because this reduces the data transmission and computation burden, and protects the players’ privacies. (ii):The proposed distributed algorithms can compute the variational GNE iteratively under a more localized data structure and information observing structure compared to previous ones. Firstly, each player only utilizes the local objective function and local feasible set, and its local sub-block matrix of the affine constraints. Secondly, we assume the players have two (different) information observing graphs, i.e., interference graph and multiplier graph. Each player only needs to observe the decisions that its local objective function directly depends on through the interference graph. This type of information observation assumption has also been adopted in Yu, van der Schaar & Sayed (2016) and Zhu & Frazzoli (2016). Meanwhile, each player only needs to share information related to multipliers with its neighbouring agents through another multiplier graph. Here it is not required that each player should know the decisions that coupling constraints depend on, as assumed in Yu, van der Schaar & Sayed (2016) and Zhu & Frazzoli (2016). Therefore, our information sharing (observing) structure is more localized and sparse. (iii): The algorithm development and convergence analysis is motivated by the operator splitting method (Bauschke & Combettes (2011)), different from the penalized method adopted in Yu, van der Schaar & Sayed (2016) and the variational inequality approach in Liang, Yi and Hong (2016), Zhu & Frazzoli (2016) and Paccagnan, Gentile, Parise, Kamgarpour & Lygeros (2016). Based on this operator splitting approach, we prove the algorithm converges to the variational GNE under fixed step-sizes. Note that neither convergence nor non-bias estimation is achieved in Yu, van der Schaar & Sayed (2016) under fixed step-sizes, while Zhu & Frazzoli (2016) achieve convergence with diminishing step-sizes. On the other hand, compared with Briceno-Arias & Combettes (2013), this paper addresses the GNE seeking under coupling constraints, adopts a different splitting technique, and achieves fully distributed computations. The operator splitting method is powerful and provides additional insights. Moreover, a distributed algorithm with inertia is proposed and analyzed, resembling the acceleration algorithms in optimization (Nesterov (2013) and Iutzeler & Hendrickx (2016)). The algorithm performance is illustrated via numerical experiments of network Cournot competitions with bounded market capacities. The paper is organized as follows. Section 2 gives the 3 domRA = Rm if A is maximally monotone 1 . For a proper lower semi-continuous convex (l.s.c.) function f , its sub-differential m is a set-valued operator ∂ f : dom f → 2R and notations and preliminary background. Section 3 formulates the noncooperative game and gives the distributed algorithm for iterative computation of a GNE. Section 4 shows how the operator splitting method motivates the algorithm development, and Section 5 presents the algorithm convergence analysis. Then a distributed GNE seeking algorithm with inertia is proposed and analyzed in Section 6. Finally, a network Cournot competition with bounded market capacities is formulated with numerical studies in Section 7, while concluding remarks are given in Section 8. ∂ f : x 7→ {g ∈ Rm | f (y) ≥ f (x) + hg, y − xi, ∀y ∈ dom f }. (1) ∂ f is a maximally monotone operator 2 . Then Prox f = R∂ f : Rm → dom f is called the proximal operator of f 3 , i.e. 1 Prox f : x 7→ arg min f (u) + ||u − x||22 . (2) u∈dom f 2    0, x ∈ Ω; Define the indicator function of set Ω as ιΩ (x) =   ∞, x < Ω. For a closed convex set Ω, ιΩ is a proper l.s.c. function. ∂ιΩ is just the normal cone operator of set Ω, that is ∂ιΩ (x) = NΩ (x) 4 and    ∅ x<Ω     (3) NΩ (x) =  {v|hv, y − xi ≤ 0, ∀y ∈ Ω} x ∈ bd(Ω)     0 x ∈ int(Ω) 2. Notations and preliminary background In this section, we review the notations and some preliminary notions in monotone operators and graph theory. Notations: In the following, Rm (Rm + ) denotes the m−dimesional (nonnegative) Euclidean space. For a column vector x ∈ Rm (matrix A ∈ Rm×n ), xT (AT ) denotes its transpose. √ xT y = hx, yi denotes the inner product of x, y, and ||x||2 = xT x denotes the norm induced by inner product h·, ·i. Given a symmetric positive definite matrix G, denote the G-induced inner product hx, yiG = hGx, √ yi. The G-matrix induced norm, || · ||G , is defined as ||x||G = hGx, xi. Denote by || · || any matrix induced norm in the Euclidean space. Denote 1m = (1, ..., 1)T ∈ Rm and 0m = (0, ..., 0)T ∈ Rm . For column vectors x, y, x ≥ (>)y is understood componentwise. diag{A1 , ..., AN } represents the block diagonal matrix with matrices A1 , ..., AN on its main diagonal. Null(A) and Range(A) denote the null space and range space of matrix A, respectively. Denote col(x1 , ...., xN ) as the column vector stacked with column vectors x1 , ..., xN . In denotes the identity matrix in Rn×n . For a matrix A = [ai j ], ai j or [A]i j stands for the matrix entry in the ith row and jth column of A. We also use [x]k to denote the k−th element in column Q vector x. Denote ×i=1,...,n Ωi or ni=1 Ωi as the Cartesian product of the sets Ωi , i = 1, ..., n. Denote int(Ω) as the interior of Ω, and bd(Ω) as the boundary set of Ω. Define the projection of x onto a set Ω by PΩ (x) = arg miny∈Ω ||x − y||2 . A set Ω is a convex set if λx + (1 − λ)y ∈ Ω, ∀λ ∈ [0, 1], ∀x, y ∈ Ω. An extended value proper function f : Rm → R is a convex function if f (λx+(1−λ)y) ≤ λ f (x)+(1−λ) f (y), ∀λ ∈ [0, 1], ∀x, y ∈ dom f . In this case, we also have 5 ProxιΩ (x) = RNΩ (x) = PΩ (x). (4) For a single-valued operator T : Rm → Rm , a point x ∈ Rm is a fixed point of T if T x = x, and the set of fixed points of T is denoted as FixT . The composition of operators A and B, denoted by A ◦ B, is defined via its graph graA ◦ B = {(x, z)|∃y ∈ ranB, (x, y) ∈ graB, (y, z) ∈ graA}. We also use AB to denote the composition A ◦ B when they are single-valued. Similarly, their sum A + B is defined as gra(A + B) = {(x, y + z)|(x, y) ∈ graA, (x, z) ∈ graB}. Suppose operators A and B are maximally monotone and 0 ∈ int(domA − domB), then A + B is also maximally monotone6 . Further suppose that A is single-valued, then zer(A + B) = FixRB ◦ (Id − A)7 , which helps to formulate the basic forward-backward operator splitting algorithm for finding zeros of a sum of monotone operators. 2.2. Graph theory The following concepts are reviewed from Mesbahi & Egerstedt (2010). The information sharing or exchanging among the agents is described by graph G = (N, E). N = {1, · · · , N} is the set of agents, and the edge set E ⊂ N × N contains all the information interactions. If agent i can get information from agent j, then ( j, i) ∈ E and agent j belongs to agent i’s neighbor set Ni = { j|( j, i) ∈ E}, and i < Ni . G is said to be undirected when (i, j) ∈ E if and only if ( j, i) ∈ E. A 2.1. Monotone operators The following concepts are reviewed from Bauschke & m Combettes (2011). Let A : Rm → 2R be a set-valued operator. Denote Id as the identity operator, i.e, Id(x) = x. The domain of A is domA = {x ∈ Rm |Ax , ∅} where ∅ stands for the empty set, and the range of A is ranA = {y ∈ Rm |∃x ∈ Rm , y ∈ Ax}. The graph of A is graA = {(x, u) ∈ Rm × Rm |u ∈ Ax}, then the inverse of A is defined through its graph as graA−1 = {(u, x) ∈ Rm × Rm |(x, u) ∈ graA}. The zero set of operator A is zerA = {x ∈ Rm |0 ∈ Ax}. Define the resolvent of operator A as RA = (Id + A)−1 . An operator A is called monotone if ∀(x, u), ∀(y, v) ∈ graA, we have hx − y, u − vi ≥ 0. Moreover, it is maximally monotone if graA is not strictly contained in the graph of any other monotone operator. RA is single-valued and 1 Proposition 23.7 in Bauschke & Combettes (2011) Theorem 20.40 in Bauschke & Combettes (2011) 3 Proposition 16.34 in Bauschke & Combettes (2011) 4 Example 16.12 of Bauschke & Combettes (2011) 5 Example 23.4 of Bauschke & Combettes (2011) 6 Corollary 24.4 in Bauschke & Combettes (2011) 7 Proposition 25.1 in Bauschke & Combettes (2011) 2 4 path of graph G is a sequence of distinct agents in N such that any consecutive agents in the sequence correspond to an edge of graph G. Agent j is said to be connected to agent i if there is a path from j to i. G is said to be connected if any two agents are connected. Define the weighted adjacency matrix W = [wi j ] ∈ RN×N of G with wi j > 0 if j ∈ Ni and wi j = 0 otherwise. Assume W = W T for undirected graphs. Define the weighted degree matrix P P Deg = diag{d1 , · · · , dN } = diag{ Nj=1 w1 j , ..., Nj=1 wN j }. Then the weighted Laplacian of graph G is L = Deg−W. When graph G is a connected and undirected graph, 0 is a simple eigenvalue of Laplacian L with the eigenspace {α1N |α ∈ R}, and L1N = 0N , 1TN L = 0TN , while all other eigenvalues are positive. Denote the eigenvalues of L in an ascending order as 0 < s2 ≤ · · · ≤ sN , then by Courant-Fischer Theorem, min xT Lx = s2 ||x||22 , x,0, 1T x=0 max xT Lx = sN ||x||22 . x,0 by globally shared affine constraints. Denote X ⊂ Rm := where Ωi ⊂ R is a private feasible decision set of player i, and A = [A1 , · · · , AN ] ∈ Rm×n with Ai ∈ Rm×ni , and b ∈ Rm . Denote QN Ω = i=1 Ωi . Given the globally shared set X (which may not be known by any agents), the following set-valued map gives the feasible decision set map of agent i: Xi (x−i ) := {xi ∈ Rni : (xi , x−i ) ∈ X}, or in other words: X A j x j }. Xi (x−i ) := {xi ∈ Ωi |Ai xi ≥ b − j,i, j∈N Hence, each agent has a local feasible constraint xi ∈ Ωi , and there exists a coupling constraint shared by all agents with sub-matrix Ai characterizing how agent i is involved in the coupling constraint (shares the global resource). Notice that agent i may only know its local Ai , in which case the globally shared affine constraint couples the agents’ feasible decision sets, but is not known by any agents. (5) Remark 3.1. We consider affine coupling constraints for various reasons. Even though not as general as the nonlinear constraints considered in Pavel (2007) and Zhu & Frazzoli (2016), this setup does enjoy quite strong modeling flexibility. As pointed out in page 191 of Facchinei & Kanzow (2010), “ However, it should be noted that the jointly convex assumption on the constraints · · · practically is likely to be satisfied only when the joint constraints gµ = g, µ = 1, ..., N are linear, i.e. of the form Ax ≤ b for some suitable matrix A and vector b.” In fact, many existing generalized Nash game models adopt affine coupling constraints, as well documented in Schiro, Pang & Shanbhag (2013) and Dreves & Sudermann (2016). (6) 3.1. Game formulation Consider a group of agents (players) N = {1, · · · , N} that seek the generalized Nash equilibrium (GNE) of a noncooperative game with coupling constraints defined as follows. Each player i ∈ N controls its local decision (strategy or action) xi ∈ Rni . Denote x = col(x1 , · · · , xN ) ∈ Rn as the decision profile, i.e., the stacked vector of all PN ni = n. Denote x−i = the agents’ decisions where i=1 col(x1 , · · · , xi−1 , xi+1 , · · · , xN ) as the decision profile stacked vector of the agents’ decisions except player i. Agent i aims to optimize its local objective function within its feasible decision set. The local objective function for agent i is fi (xi , x−i ) : Rn → R. Notice that the local objective function of agent i is coupled with other players’ decisions (however, may not be explicitly coupled with all other players’ decisions). Moreover, the feasible decision set of player i also depends on the decisions n of the other players with Xi (x−i ) : Rn−ni → 2R i denoting a set-valued map that maps x−i to the feasible decision set of agent i. The aim of agent i is to find the best-response strategy set given the other players’ decision x−i , xi ∈R i s.t., xi ∈ Xi (x−i ). Assumption 1. For player i, fi (xi , x−i ) is a differentiable convex function with respect to xi given any fixed x−i , and Ωi is a closed convex set. X has nonempty interior point (Slater’s condition). Suppose x∗ is a GNE of game (7), then for agent i, xi∗ is the optimal solution to the following convex optimization problem: X min fi (xi , x∗−i ), s.t. xi ∈ Ωi , Ai xi ≥ b − A j x∗j . (9) xi ∀i ∈ N. j,i, j∈N Define a local Lagrangian function for agent i with multiplier λi ∈ Rm + as Li (xi , λi ; x−i ) = fi (xi , x−i ) + λTi (b − Ax). (7) λ∗i xi∗ (10) Rm + When is an optimal solution to (9), there exists ∈ such that the following optimality conditions (KKT) are satisfied: The GNE x∗ = col(x1∗ , · · · , x∗N ) of the game in (7) is obtained at the intersection of all the players’ best-response sets, and is defined as: xi∗ ∈ arg min fi (xi , x∗−i ), s.t. xi ∈ Xi (x∗−i ), \ {x ∈ Rn |Ax ≥ b}, i=1 3. Problem formulation and distributed algorithm minn fi (xi , x−i ) Ωi ni Denote d∗ = max{d1 , · · · , dN } as the maximal weighted degree of graph G, then we have the following estimation, d∗ ≤ sN ≤ 2d∗ . N Y 0 ∈ ∇ xi Li (xi∗ , λ∗i ; x∗−i ) + NΩi (xi∗ ), xi∗ ∈ Ωi hλ∗i , b − Ax∗ i = 0, b − Ax∗ ≤ 0, λ∗i ≥ 0, (11) These can be equivalently written in the following form by using (10) and the definition of the normal cone operator in (3) (8) 0 ∈ ∇ xi fi (xi∗ , x∗−i ) − ATi λ∗i + NΩi (xi∗ ) 0 ∈ (Ax∗ − b) + NRm+ (λ∗i ) Here we consider the GNE seeking in noncooperative games where the couplings between players’ feasible sets are specified 5 (12) In fact, since NΩ (x) = ∅ when x < Ω, it must hold that xi∗ ∈ Ωi and λ∗i ∈ Rm = + when (12) is satisfied. Furthermore, NRm + Qm ∗ ∗ N . If [λ ] = 0, then N ([λ ] ) = −R , and hence R+ + j=1 R+ i k i k [b − Ax∗ ]k ≤ 0; and if [λ∗i ]k > 0, we have NR+ ([λ∗i ]k ) = 0, hence [b − Ax∗ ]k = 0. Therefore, b − Ax∗ ≤ 0 and hλ∗i , b − Ax∗ i = 0. Denote λ̄ = col(λ1 , · · · , λN ). Therefore, by Theorem 4.6 in Facchinei & Kanzow (2010) when (x∗ , λ̄∗ ) satisfies KKT (12) for i = 1, ..., N, x∗ is a GNE of the game in (7) According to the above discussions, given x∗ as a GNE of game in (7), its corresponding Lagrangian multipliers for the globally shared affine coupling constraint may be different for the agents, i.e., λ∗1 , λ∗2 ,, · · · , , λ∗N . In this work, we aim to seek a GNE with the same Lagrangian multiplier for all the agents, which has a nice interpretation from the viewpoint of variational inequality. Define F(x) = col(∇ x1 f1 (x1 , x−1 ), · · · , ∇ xN fN (xN , x−N )), the coupling constraint is met and a variational GNE of the game is found. n m Define two operators A and B, both from Ω × Rm + to R × R as follows, ! ! x F(x) A: 7→ λ ! −b ! ! ! (17) 0 −AT x x NΩ (x) + B: 7→ A 0 λ λ NRm+ (λ)) By the definition of F(x) in (13), the KKT conditions (16) can be equivalently written as 0 ∈ (A + B)col(x∗ , λ∗ ). Notice that B is a maximally monotone operator (similar arguments for this can be found in Lemma 5.4). Hence, if F(x) has some additional properties, then solving V I(F, X) can be converted to the problem of finding zeros of a sum of monotone operators. Assumption 2. F(x) defined in (13) is strongly monotone with parameter η over Ω: hF(x) − F(y), x − yi ≥ η||x − y||22 , ∀x, y ∈ Ω, and θ− Lipschitz continuous over Ω: ||F(x) − F(y)||2 ≤ θ||x − y||2 , ∀x, y ∈ Ω. (13) which is usually called the pseudo-gradient. The variational inequality (VI) approach to find a GNE of game (7) is to find the solution of the following V I(F, X): Find x∗ ∈ X, hF(x∗ ), x − x∗ i ≥ 0, ∀x ∈ X. Remark 3.3. Assumption 2 has also been adopted in Yu, van der Schaar & Sayed (2016), Paccagnan, Gentile, Parise, Kamgarpour & Lygeros (2016) and Zhu & Frazzoli (2016). Assumption 2 guarantees that there exists a unique solution to V I(F, X) in (14) 9 , thus guarantees the existence of a GNE for game in (7). However, the GNE of (7) may not be unique. The algorithm for computing all the GNE of noncooperative games with coupling constraints is still an opening research topic, and interested readers can refer to Nabetani, Tseng, and Fukushima (2011). This work aims to provide a distributed algorithm for iterative computation of a variational GNE of the considered game, which enjoys nice economical interpretations and stability properties. (14) Let us check the KKT condition for V I(F, X) in (14). In fact, x∗ is a solution to V I(F, X) in (14) if and only if x∗ is the optimal solution to the following optimization problem: minn hF(x∗ ), xi, x∈R s.t., x ∈ Ω, Ax ≥ b (15) According to the optimization formulation of V I(F, X) in (15), if x∗ solves V I(F, X), there exists λ∗ ∈ Rm such that the following optimality conditions (KKT) are satisfied: 0 ∈ ∇ xi fi (xi∗ , x∗−i ) − ATi λ∗ + NΩi (xi∗ ), i = 1, · · · , N 0 ∈ (Ax∗ − b) + NRm+ (λ∗ ) (16) 3.2. Distributed algorithm By comparing the two sets of KKT conditions in (12) and (16) we obtain, In practice, each player only knows its private information in game (7), especially when the players interact over large scale networks. It is quite natural that each player can only know its local objective function fi (xi , x−i ) and local feasible set Ωi , which cannot be shared with other players, because those data contain its local private information, such as cost function, preference and action ability. Moreover, matrix Ai specifies how player i participates in the resource allocation or market behavior, hence also contains private information, and b can be PN decomposed as b = i=1 bi . Thus matrix Ai can be regarded as a map from decision space Rni to resource space Rm , while vector bi can be regarded as a local contribution or observation for the global resource. For example, if there are total m markets, and each player i produces a kind of product with amount of T xi ∈ R+ , then Ai ∈ Rm + satisfying 1m Ai = 1 and 0 ≤ Ai ≤ 1 just specifies how each player allocates its production to each market. In this case, if b̃i ∈ Rm + is a local observation of market Theorem 3.2. 8 Suppose Assumption 1 holds. Every solution x∗ of V I(F, X) in (14) is a GNE of game in (7). Furthermore, if x∗ together with λ∗ satisfies the KKT conditions for the V I(F, X), i.e., (16), then x∗ together with λ∗1 =, · · · , = λ∗N = λ∗ satisfies the KKT conditions for the GNE, i.e., (12). The solution x∗ of V I(F, X) in (14) is termed as a variational GNE or normalized equilibrium of the game with coupling constraints in (7). A variational GNE enjoys an economical interpretations of no price discrimination and has better stability and sensitivity properties, therefore, can be regarded as a refinement of GNE (refer to Kulkarni & Shanbhag (2012) for more discussions). This paper will propose a novel distributed algorithm for the agents to find a solution of V I(F, X) in (14), thus provides a distributed coordination mechanism such that 8 Theorem 9 Theorem 2.1 of Facchinei, Fischer & Piccialli (2007) 6 2.3.3 of Facchinei and Pang (2007) coupling constraint: Ax ≥ b. To ensure that the globally shared coupling constraint is satisfied and all the agents have the same local multipliers, all players must coordinate which necessarily requires that multiplier graph Gλ must be connected. Therefore, G f and Gλ could be two different information observation or information sharing graphs because they serve for different purposes. capacity vector, then the true market capacities can be taken as PN PN 1 b = i=1 bi = i=1 N b̃i . Therefore, we assume that player i only knows its local fi (xi , x−i ), Ωi , and matrix Ai and bi with A = [A1 , · · · , AN ] and PN b = i=1 bi . In other words, player i has a local first-order oracle of fi (xi , x−i ) which returns ∇ xi fi (xi , x−i ) given (xi , x−i ), meanwhile player i can manipulate Ωi , Ai and bi for its local computation. We are ready to present the main distributed algorithm after the introduction of algorithm notations. Agent (player) i controls its local decision variable xi ∈ Rni and local Lagragian multiplier λi ∈ Rm . Meanwhile, we also assume that player i has a local auxiliary variable zi ∈ Rm for the coordinations needed to satisfy the affine coupling constraint and to reach consensus of the local multipliers λi . As indicated before, player i can compute ∇ xi fi (xi , x−i ) by observing the adversary players’ decisions that its local objective function fi (xi , x−i ) directly depends on, that is the decisions of its interference neighbors in Nif . On the other hand, player i can also share information related to the local multiplier λi and local auxiliary variable zi with its multiplier neighbours in Niλ through multiplier network Gλ . Next we show the distributed algorithm for agent i. The players need to find the solution to V I(F, X) in (14) in a distributed manner by local information observation and sharing, hence find a variational GNE of the game in (7) without any coordinator. To facilitate the local coordination between agents, here we specify two graphs, G f and Gλ , related to the local information observations or exchanging between players. Graph G f , termed as interference graph, is defined according to the dependence relationships between the agents’ objective functions and the other players’ decisions, which is also called graphical model for games in computer science (refer to Kearns, Littman, & Singh (2001)). For graph G f = (N, E f ), ( j, i) ∈ E f if the objective function of agent i, fi (xi , x−i ) explicitly depends on the decision of player j. We define Nif = { j|( j, i) ∈ E f } as the set of interference neighbors whose decisions directly influence the objective function of player i. Therefore, the objective function of player i can also be written as fi (xi , {x j } j∈N f ), and the local oracle of player i i returns ∇ xi fi (xi , {x j } j∈N f ), i.e., ∇ xi fi (xi , x−i ), given {x j } j∈N f . The i i local oracle might compute ∇ xi fi (xi , {x j } j∈N f ) by approximating i ∇ xi fi (xi , x−i ) with local objective function value observations (taking the simultaneous perturbation stochastic approximation in Spall (1992) as an example), or by utilizing the estimation techniques developed in Salehisadaghiani & Pavel (2016b). On the other hand, for the coordination of the feasibility of action sets and the consensus of local multipliers λ∗1 =, · · · , = λ∗N = λ∗ in Theorem 3.2, we also assume that the agents can exchange certain local information through a multiplier graph Gλ = (N, Eλ ). ( j, i) ∈ Eλ if player i can receive certain information from player j, while the information to be shared through Gλ will be specified later. Thereby, player i has its multiplier neighbors Niλ = { j|( j, i) ∈ Eλ }. W = [wi j ] is the weighted adjacency matrix associated with multiplier graph Gλ , and L is the corresponding weighted Laplacian matrix. Algorithm 3.5.   xi,k+1 = PΩi xi,k − τi (∇ xi fi (xi,k , {x j,k } j∈N f ) − ATi λi,k ) i X zi,k+1 = zi,k + νi wi j (λi,k − λ j,k ) (18) (19) j∈Niλ X n  λi,k+1 = PRm+ λi,k − σi 2Ai xi,k+1 − Ai xi,k − bi + wi j (λi,k − λ j,k ) j∈Niλ +2 X j∈Niλ wi j (zi,k+1 − z j,k+1 ) − X wi j (zi,k − z j,k ) o (20) j∈Niλ τi , νi , σi > 0 are fixed constant step-sizes of player i, and W = [wi j ] is the weighted adjacency matrix of Gλ . Algorithm 3.5 runs sequentially as follows. At the iteration time k, player i gets ∇ xi fi (xi,k , x−i,k ) by observing x j,k , j ∈ Nif through interference graph G f , and updates xi,k with (18); meanwhile, player i gets λ j,k , j ∈ Niλ through multiplier graph Gλ , and updates zi,k by (19). Then player i gets z j,k+1 , j ∈ Niλ through multiplier graph Gλ and updates λi,k with (20) that also employs the most recent local information xi,k+1 . Intuitively speaking, (18) employs the projected gradient descent of the local Lagrangian function in (10). (19) can be regarded as the discrete-time intergration for the consensual errors of local copies of multipliers, which will ensure the consensus of λi eventually. In fact, a similar dynamics has been employed in distributed optimization in Lei, Chen & Fang (2016). Finally, (20) updates local multiplier by a combination of the projected gradient ascent of local Lagrangian function (10) and a proportional-integral dynamics for consensual errors of multipliers. Section 4 will give a detailed algorithm development from the viewpoint of operator splitting methods. Assumption 3. Gλ = {N, Eλ } is undirected and connected. W = WT . Remark 3.4. We assume that each agent can observe the decisions which its local objective function directly depends on through interference graph G f . Therefore, player i can get its local gradient ∇ xi fi (xi , {x j } j∈N f ). This type of local i information observation model has also been adopted in Yu, van der Schaar & Sayed (2016) and Zhu & Frazzoli (2016). On the other hand, player i’s feasible decision set may depend on any other player k’s decision even if fi (xi , x−i ) does not explicitly depend on the decision of player k, i.e. k < Nif . In fact, player i’s feasible decision set implicitly depends on all other players’ decisions through the globally shared affine 7 Algorithm 4.1. Algorithm 3.5 is a totally distributed algorithm and has following key features: i). The full data decomposition and privacy protection is achieved since each player only needs to know its local objective function fi (xi , x−i ) and local feasible set Ωi . ii). The matrix A is decomposed and each block Ai is kept by player i, hence the privacy of each player is protected because Ai describes how player i is involved in the market or competition. iii). Each player only needs to observe the decisions which its local objective function directly depends on, and only needs to share information with its multiplier neighbours, through G f and Gλ , respectively. Both graphs usually have sparse edge connections, therefore, the observation or communication burden is relieved. Furthermore, the information observation related with decisions and the information sharing related with multipliers is decoupled and accomplished with different graphs G f and Gλ , respectively. Therefore, those two information sharing processes can work in a parallel manner, and can be designed independently. iv). The algorithm converges with fixed step-sizes under some mild conditions, and works in a Gauss-Seidel manner that utilizes the most recent information when updating λi . Moreover, (18) and (19) can even be computed in parallel for player i.   xk+1 = PΩ xk − τ̄(F(xk ) − ΛT λ̄k ) z̄k+1 = z̄k + ν̄L̄λ̄k (22) n  o λ̄k+1 = PRmN λ̄k − σ̄ Λ(2xk+1 − xk ) − b̄ + L̄λ̄k + L̄(2z̄k+1 − z̄k ) + (23) Using the fact that PΩ (x) = ProxιΩ (x) = RNΩ (x) in (4) and the definition of resolvent operator as RNΩ (x) = (Id + NΩ )−1 , equation (21) be be written as xk+1 = (Id + NΩ )−1 [xk − τ̄(F(xk ) − ΛT λ̄k )], or equivalently, xk − τ̄(F(xk ) − ΛT λ̄k ) ∈ xk+1 + NΩ (xk+1 ). (24) diag{ τ11 In1 , · · · −1 , τ1N InN }, ν̄−1 = 1 1 diag{ σ1 Im , · · · , σN Im }. QN = i=1 NΩi (xi ), hence Notice that τ̄ = 1 1 diag{ ν1 Im , · · · , νN Im } and σ̄ = Furthermore, NΩ is a cone and NΩ (x) τ̄−1 NΩ (x) = NΩ (x). Therefore, (24) can be written as −1 − F(xk ) ∈ NΩ (xk+1 ) − ΛT λ̄k+1 + τ̄−1 (xk+1 − xk ) + ΛT (λ̄k+1 − λ̄k ). (25) QN m (λ ), and mN (λ̄) = Moreover, NRmN is a cone, N N R i R+ i=1 + + σ̄−1 NRmN = NRmN . Then with similar arguments, equation (23) + + can be written as: h i λ̄k − σ̄ Λ(2xk+1 −xk )− b̄+ L̄λ̄k + L̄(2z̄k+1 − z̄k ) ∈ λ̄k+1 +NRmN (λ̄k+1 ) + (26) or equivalently, 4. Algorithm development In this section, we first show how Algorithm 3.5 is developed and provide the motivations behind the algorithm’s convergence analysis. Then we verify that the limiting point of Algorithm 3.5 solves the V I(F, X) in (14), and thus finds a variational GNE of the game in (7). Algorithm 3.5 is inspired by the forward-backward splitting methods for finding zeros of the sum of monotone operators (Bauschke & Combettes (2011)) and the primal-dual algorithm for optimization with linear composition terms by Condat (2013). The key difference are the specific operator splitting form and the augmentation of variables to achieve distributed computations. Next, we systematically show how to write Algorithm 3.5 in the form of a forward-backward operator splitting algorithm. Let us define some notations to write Algorithm 3.5 in a compact form. Denote xk = col(x1,k , · · · , xN,k ) ∈ Rn , λ̄k = col(λ1,k , · · · , λN,k ) ∈ RmN , z̄k = col(z1,k , · · · , zN,k ) ∈ RmN , b̄ = col(b1 , · · · , bN ) ∈ RmN , τ̄ = diag{τ1 In1 , · · · , τN InN } ∈ Rn×n , ν̄ = diag{ν1 Im , · · · , νN Im } ∈ RmN×mN , σ̄ = diag{σ1 Im , · · · , σN Im } ∈ RmN×mN , Λ = diag{A1 , · · · , AN } ∈ RmN×n and ΛT = diag{AT1 , · · · , ATN } ∈ Rn×mN . L̄ = L ⊗ Im where L ∈ RN×N is the weighted Laplacian matrix of multiplier graph Gλ . Using these notations, the definition of pseudo-gradient N F(x) in (13) and PQi=1 = Ωi (col(x1 , · · · , xN )) 10 col(PΩ1 (x1 ), · · · , PΩN (xN )) , Algorithm 3.5 can be written in a compact form as: 10 Proposition (21) −[L̄λ̄k − b̄] ∈ + NRmN (λ̄k+1 ) + Λxk+1 + L̄z̄k+1 + Λ(xk+1 − xk ) + L̄(z̄k+1 − z̄k ) + σ̄−1 (λ̄k+1 − λ̄k ) (27) Therefore, equation(22) together with (25) and (27) can be written in a compact form as:     NΩ (xk+1 ) − ΛT λ̄k+1  F(xk )        − L̄ λ̄ 0 −  ∈ k+1       ¯ NRmN ( λ̄ ) + Λx + L̄z̄ L̄λk − b̄ k+1 k+1 k+1 +  −1    τ̄ 0 ΛT   xk+1 − xk      L̄   z̄k+1 − z̄k  +  0 ν̄−1 (28)     Λ L̄ σ̄−1 λ̄k+1 − λ̄k Denote  −1  τ̄  Φ =  0  Λ 0 ν̄−1 L̄ ΛT L̄ σ̄−1     (29) Notice that matrix Φ ∈ R(n+2mN)×(n+2mN) is symmetric due to L = LT and L̄ = L ⊗ Im . Denote Ω̄ = Ω × RmN × RmN + . Define the operators Ā : Ω̄ → n+2mN and B̄ : Ω̄ → 2R as follows, R      x   F(x)      , 0 A :=  z̄  7→      λ̄ L̄λ̄ − b̄         x   NΩ (x)   0 0 −ΛT   x      +  0 0 −L̄   z̄  (30) 0 B :=  z̄  7→          NRmN (λ̄) λ̄ Λ L̄ 0 λ̄ + n+2mN 23.16 of Bauschke & Combettes (2011) 8 Remark 4.2. Operators Ā and B̄ in (30) can be regarded as an extension of operators A and B in (17) by augmenting λ ∈ Rm to λ̄ ∈ RmN and introducing auxiliary variables z̄ ∈ RmN . Moreover, operators in (30) utilize L1N = 0N of Laplacian matrix L to ensure the consensus of λi , and utilize 1TN L = 0TN to ensure the feasibility of affine coupling constraints. The next result shows that any limiting point of Algorithm 3.5, that is, any zero point of operator Ā + B̄, is a variational GNE of game (7). Theorem 4.5. Suppose that Assumptions 1-3 hold. Consider operators Ā and B̄ defined in (30), and operators A and B defined in (17). Then the following statements hold: (i): Given any col(x∗ , z̄∗ , λ̄∗ ) ∈ zer(Ā + B̄), then x∗ solves the V I(F, X) in (14), hence x∗ is a variational GNE of game in (7). Moreover λ̄∗ = 1N ⊗ λ∗ , and the multiplier λ∗ together with x∗ satisfy the KKT condition in (16), i.e., col(x∗ , λ∗ ) ∈ zer(A + B). (ii): zer(A + B) , ∅ and zer(Ā + B̄) , ∅. The next result shows that Algorithm 3.5, or equivalently Algorithm 4.1, can be regarded as a forward-backward operator splitting method for finding zeros of a sum of operators, or an iterative computation of fixed points of a composition of operators. Lemma 4.3. Suppose Φ in (29) is positive definite, and operators Ā and B̄ in (30) are maximally monotone. Denote T 1 := Id − Φ−1 Ā and T 2 := (Id + Φ−1 B̄)−1 . Then any limiting point of Algorithm 3.5, i.e., col(x∗ , z̄∗ , λ̄∗ ), is a zero of Ā + B̄ and is a fixed point of T 2 ◦ T 1 . Proof: (i): By the definition of operators Ā, B̄ in (30), we have, Ā + B̄ : col(x, z̄, λ̄) 7→        0 0 −ΛT   x   0   F(x) + NΩ (x)        0  0 0 −L̄   z̄  +  0  +  NRmN (λ̄) −b̄ λ̄ Λ L̄ L̄ + Proof: Denote $ = col(x, z̄, λ̄), then using (28), (29) and (30), Algorithm 3.5 can written in a compact form as follows: − Ā($k ) ∈ B̄($k+1 ) + Φ($k+1 − $k ). (34) Suppose that col(x∗ , z̄∗ , λ̄∗ ) ∈ zer(Ā + B̄). From the second line of (34), −L̄λ̄∗ = −L ⊗ Im λ̄∗ = 0mN . (31) Since Φ is symmetric and positive definite, we can write equation (31) as $k − Φ−1 Ā($k ) ∈ $k+1 + Φ−1 B̄($k+1 ), or equivalently, (Id − Φ−1 Ā)($k ) ∈ (Id + Φ−1 B̄)($k+1 ). It follows that λ̄∗ = 1N ⊗ λ∗ , λ∗ ∈ Rm since L is the weighted Laplacian of multiplier graph Gλ and Gλ is connected due to Assumption 3. Then by the first line of (34), combined with ΛT = diag{AT1 , · · · , ATN } and λ∗1 = λ∗2 =, · · · , = λ∗N = λ∗ , we have (32) Since Φ−1 B̄ is maximally monotone (refer to Lemma 5.6), (Id+ Φ−1 B̄)−1 is single-valued. Then by the definition of the inverse of a set-valued operator, Algorithm 3.5 is written as $k+1 = (Id + Φ B̄) (Id − Φ Ā)$k := T 2 ◦ T 1 $k . −1 −1 −1     0n ∈ −ΛT 1N ⊗ λ∗ + F(x∗ ) + NΩ (x∗ ), (33) (35) or equivalently, Suppose that Algorithm 3.5, or equivalently (33), converges to a limiting point $∗ . Then by the continuity of the right hand of Algorithm 3.5 (In fact, the right hand of Algorithm 3.5 is Lipschitz continuous due to Assumption 2 and the nonexpansive property of projection operator), $∗ = T 2 T 1 $∗ . Therefore, any limiting point of Algorithm 3.5 is a fixed point of the composition T 2 ◦ T 1 , and Algorithm 3.5 can be regarded as an iterative computation of fixed points of T 2 ◦ T 1 . By Theorem 25.8 of Bauschke & Combettes (2011), (33) is also the forward-backward splitting algorithm for finding zeros of a sum of monotone operators, hence $∗ ∈ zer(Φ−1 Ā+Φ−1 B̄) for any limiting point $∗ . Since Φ is positive definite, any limiting point $∗ = col(x∗ , z̄∗ , λ̄∗ ), i.e., $∗ = T 2 T 1 $∗ , also belongs to zer(Ā + B̄). In fact, 0ni ∈ −ATi λ∗ + ∇ xi fi (xi∗ , x∗−i ) + NΩi (xi∗ ), i = 1, · · · , N. (36) By the third line of (34) and using L̄λ̄∗ = 0, it follows that 0mN ∈ Λx∗ − b̄ + L̄z̄∗ + NRmN (λ̄∗ ). + This implies that there exist v1 , v2 , · · · , vN ∈ NRm+ (λ∗ ), such that 0mN = Λx∗ − b̄ + L ⊗ Im z̄∗ + col(v1 , · · · , vN ). Multiplying both sides of above equation with 1TN ⊗ Im and combining with 1T L = 0T , we have 0m = (1TN ⊗ Im )(Λx∗ − b̄ + L ⊗ Im z̄∗ + col(v1 , · · · , vN )) = $∗ = (Id + Φ−1 B̄)−1 (Id − Φ−1 Ā)$∗ ⇔ (Id − Φ−1 Ā)$∗ ∈ (Id + Φ−1 B̄)$∗ ⇔ 0 ∈ Φ−1 (Ā + B̄)($∗ ) ⇔ 0 ∈ (Ā + B̄)($∗ ). N X i=1 Ai xi∗ − N X i=1 bi + N X vi i=1 PN TN 11 N Due to the fact that NTi=1 , Ωi = i=1 NΩi if i=1 int(Ωi ) , ∅ we have PN PN PN 0m ∈ Ai xi∗ − i=1 bi + i=1 NRm+ (λ∗ ) Pi=1 P N N ∗ T N ∈ Ai xi − i=1 bi + N i=1 Rm+ (λ∗ ) (37) Pi=1 PN N ∗ ∗ m (λ ). ∈ A x − b + N i i R i=1 i=1 + i 2 Remark 4.4. The iteration $k+1 = T 2 T 1 $k is also known as Picard iteration for iteratively approximating fixed points of T 2 T 1 (refer to Berinde (2007)). Lemma 5.5 will give a sufficient condition for Φ to be positive definite. Lemma 5.4 will give the condition that ensures Ā and B̄ to be maximally monotone. 11 Corollary 9 16.39 of Bauschke & Combettes (2011) By (36) and (37), for any col(x∗ , λ̄∗ , z̄∗ ) ∈ zer(Ā + B̄), the KKT condition for V I(F, X) in (14), i.e. (16), is satisfied for x∗ , λ∗ . We conclude that x∗ solves V I(F, X) in (14), and is a variational GNE of game (7) by Theorem 3.2. It also follows that λ∗ together with x∗ satisfy the KKT condition in (16). This also implies col(x∗ , λ∗ ) ∈ zer(A + B). analysis on the contractive property of underlying operators. However, the contractivity assumption on operators is usually quite restrictive. Herein we resort to the theory of averaged operators and firmly nonexpansive operators for convergence analysis. Firstly we give some basic definitions and properties of averaged operators and firmly nonexpansive operators13 . All the following results are valid in Hilbert spaces, thus they hold in Euclidean spaces with any G−matrix induced norm || · ||G , given G as a symmetric positive definite matrix. Denote by || · || an arbitrary matrix induced norm in a finite dimensional Euclidean space. An operator T : Ω ⊂ Rm → Rm is nonexpansive if it is 1−Lipschitzian, i.e., ||T (x) − T (y)|| ≤ ||x − y||, ∀x, y ∈ Ω. An operator T is α−averaged if there exists a nonexpansive 0 0 operator T such that T = (1 − α)Id + αT . Denote the class of α−averaged operators as A(α). If T ∈ A( 12 ), then T is also called firmly nonexpansive operator. (ii) Under Assumptions 1 and 2, the considered game in (7) has a unique variational GNE x∗ , and there exists λ∗ ∈ Rm such that the KKT condition (16) is satisfied, i.e. col(x∗ , λ∗ ) ∈ zer(A + B). Therefore zer(A + B) , ∅. Then we need to show that there exists col(x∗ , λ̄∗ , z̄∗ ) such that col(x∗ , λ̄∗ , z̄∗ ) ∈ zer(Ā + B̄). Take λ̄∗ = 1N ⊗ λ∗ . Because L1N = 0, the second line of (34) is satisfied. Since col(x∗ , λ∗ ) ∈ zer(A + B), 0 ∈ F(x∗ ) − AT λ∗ + NΩ (x∗ ). Using λ∗1 = λ∗2 =, · · · , = λ∗N = λ∗ , ΛT λ̄∗ = col(AT1 λ∗ , · · · , ATN λ∗ ) = AT λ∗ . Therefore, the first line of (34) is satisfied with x∗ , 1N ⊗ λ∗ . Moreover, with col(x∗ , λ∗ ) ∈ zer(A + B), 0m ∈ Ax∗ − b + NRm+ (λ∗ ). Then we need to show that there exists z̄∗ = col(z∗1 , · · · , z∗N ) ∈ RmN , such that the third line of (34) is satisfied. Take v∗ ∈ NRm+ (λ∗ ) such that 0 = Ax∗ − b + v∗ . Since QN λ̄∗ = 1N ⊗ λ∗ and NRmN NRm+ (λ∗ ), take v∗1 = v∗2 = (λ̄∗ ) = i=1 + , · · · , = v∗N = N1 v∗ ∈ NRm+ (λ∗ ). Then (1TN ⊗ Im )(Λx∗ − b̄ + L̄λ̄∗ + PN PN bi + v∗ = Ax∗ − b + v∗ = 0m . Ai xi∗ − i=1 col(v∗1 , · · · , v∗N )) = i=1 ∗ ∗ ∗ That is Λx − b̄ + L̄λ̄ + col(v1 , · · · , v∗N ) ∈ Null(1TN ⊗ Im ). By the fundamental theorem of linear algebra12 , Null(1TN ⊗ Im ) = Range(1N ⊗ Im )⊥ and Range(L̄) = Null(L̄)⊥ since L̄ is also symmetric. Notice that Null(L̄) = Range(1N ⊗ Im ), hence Λx∗ − b̄ + L̄λ̄∗ + col(v∗1 , · · · , v∗N ) ∈ Range(L̄). Noticing that col(v∗1 , · · · , v∗N ) ∈ NRmN (λ̄∗ ), there exists z̄∗ ∈ RmN such that the + third line of (34) is satisfied with x∗ , z̄∗ , 1N ⊗ λ∗ . Therefore, zer(Ā + B̄) , ∅. 2 Lemma 5.1. 14 Given an operator T : Ω ⊂ Rm → Rm and α ∈ (0, 1), the following three statements are equivalent: (i): T ∈ A(α); 2 (ii): ||T x−T y||2 ≤ ||x−y||2 − 1−α α ||(x−y)−(T x−T y)|| , ∀x, y ∈ Ω 2 2 (iii): ||T x − T y|| + (1 − 2α)||x − y|| ≤ 2(1 − α)hx − y, T x − T yi, ∀x, y ∈ Ω. By (iii) of Lemma (5.1), T ∈ A( 12 ) if and only if ||T (x) − T (y)||2 ≤ hx − y, T (x) − T (y)i, ∀x, y ∈ Ω. The operator T is called β−cocoercive (or β−inverse strongly monotone) if βT is firmly nonexpansive, i.e., β||T (x) − T (y)||2 ≤ hx − y, T (x) − T (y)i, ∀x, y ∈ Ω. (39) Lemma 5.2. 15 For a convex differentiable function f with ϑ− Lipschitzian gradient, we have ∇ f to be ϑ1 −cocoercive, i.e., 1 ||∇ f (x) − ∇ f (y)||22 ≤ hx − y, ∇ f (x) − ∇ f (y)i. (40) ϑ Lemma 5.2 is known as Baillon-Haddad theorem, and one elementary proof can be found in Theorem 2.1.5 of Nesterov (2013). 5. Convergence Analysis In this section, we prove the convergence of Algorithm 3.5 by giving a sufficient step-size choice condition. The analysis is based on the compact reformulation (33). We will first show that all the prerequisites in Lemma 4.3 can be satisfied under suitable step-sizes. Then (33), i.e., Algorithm 3.5, can be regarded as a forward-backward splitting algorithm for finding zeros of a sum of monotone operators, or equivalently, an iterative computation of fixed points of a composition of operators. In fact, some existing NE (GNE) algorithms can also be regarded as a type of iterative computation of fixed points of operators, such as the best-response learning dynamics (Parise, Gentile, Grammatico & Lygeros (2015)), relaxation algorithms based on Nikaido-Isoda function (Krawczyk & Uryasev (2000) and Contreras, Klusch, Krawczyk (2004)) and the proximal-best response algorithm in Facchinei & Pang (2010). Most of above works built their algorithm convergence 12 Page (38) Lemma 5.3. 16 If operator ∆ is maximally monotone, then T = R∆ = (Id + ∆)−1 is firmly nonexpasive and 2R∆ − Id is nonexpansive. Hence, the projection operator onto a closed convex set is firmly nonexpansive since PΩ = ProxιΩ = R∂ιΩ = RNΩ and NΩ is maximally monotone17 . In the following, we analyze the maximal monotonicity of operators Ā, B̄ in (30), the positive definite property of matrix Φ, and the properties of operators T 1 and T 2 defined in Lemma 4.3 by giving sufficient step-sizes choice conditions, which are shown in Lemma 5.4, 5.5 and 5.6, respectively. 13 Chapter 4 and Chapter 20 of Bauschke & Combettes (2011) 4.25 of Bauschke & Combettes (2011) 15 Theorem 18.15 of Bauschke & Combettes (2011) 16 Proposition 23.7 of Bauschke & Combettes (2011) 17 Example 20.41 and Proposition 4.8 of Bauschke & Combettes (2011) 14 Proposition 405 of Meyer (2000) 10 Obviously, domB1 = Rn+2mN , hence B̄ = B1 + B2 is also maximally monotone21 . 2 Lemma 5.4. Suppose Assumptions 1-3 hold. Given an Euclidean space with norm || · ||2 , then (i): Operator Ā in (30) is β−cocoercive with 0 < β ≤ min{ 2d1 ∗ , θη2 } where d∗ is the maximal weighted degree of P P multiplier graph Gλ , i.e., d∗ = max{ Nj=1 w1 j , · · · , Nj=1 wN j }, and η, θ are parameters in Assumption 2; (ii): Operator B̄ in (30) is maximally monotone. Lemma 5.5. Given any δ > 0, if each player i takes τi > 0, νi > 0 and σi > 0 as its local fixed step-sizes in Algorithm 3.5 that satisfy: Proof: (i): According to the definition of Ā in (30) and the definition of β−cocercive in (39), we need to prove that          F(x1 )   F(x2 )   x1   x2          0 0 h  −   ,  z̄1  −  z̄2 i ≥   λ̄2 L̄λ̄1 − b̄  L̄λ̄2 − b̄  λ̄1   x1   x2   F(x1 )   F(x2 )      2     0 0 β||   ||2 , ∀  z̄1  ,  z̄2  ∈ Ω̄  −   λ̄2 λ̄1 L̄λ̄2 − b̄ L̄λ̄1 − b̄ (41) Notice that L̄λ̄− b̄ is the gradient of function f˜(λ̄) := 21 λ̄T L̄λ̄− b̄T λ̄. Moveover, f˜(λ̄) is a convex function since ∇2 f˜(λ̄) = L̄ is positive semi-definite due to Assumption 3 18 . It can easily be verified that L̄λ̄− b̄ is ||L||2 −Lipschitz continuous (notice that the eigenvalues of L̄ are just the elements in col(0, s2 · · · , sN ) ⊗ 1m ), therefore, by Lemma 5.2 hL̄λ̄1 − b̄ − (L̄λ̄2 − b̄), λ̄1 − λ̄2 i ≥ 1 ||L̄λ̄1 − L̄λ̄2 ||22 . ||L||2 τi ≤ νi σi ≤ ≤ P1 , T max j=1,...ni { m k=1 |[Ai ] jk |}+δ 1 2di +δ 1 Pn i max j=1,...m { k=1 |[Ai ] jk |}+2di +δ (44) then matrix Φ defined in (29) is positive definite, and Φ−δIn+2mN is positive semi-definite. Proof: It is sufficient to show that Φ − δIn+2mN is positive semi-definite.   −1   τ̄ − δIn 0 ΛT   −1 0 ν̄ − δImN L̄ Φ − δIn+2mN =   ,  −1 Λ L̄ σ̄ − δImN (45) where τ̄−1 − δIn = diag{( τ11 − δ)In1 , · · · , ( τ1N − δ)InN }, ν̄−1 − δImN = diag{( ν11 − δ)Im , · · · , ( ν1N − δ)Im }, and σ̄−1 − δImN = diag{( σ11 − δ)Im , · · · , ( σ1N − δ)Im }. One sufficient condition for matrix Φ − δIn+2mN to be positive semi-definite is that it is diagonally dominant with nonnegative diagonally elements, that is for every row of the matrix the diagonal entry is larger than or equal to the sum of the magnitudes of all the other (non-diagonal) entries in that row. This is equivalent to require that, P 1 T ≥ max j=1,...ni { m k=1 |[Ai ] jk |} τi − δ P m 1 ≥ 2di j=1 |Li j | =P νi − δ P (46) ni 1 − δ ≥ max { |[Ai ] jk |} + mj=1 |Li j | j=1,...m σi Pk=1 i = max j=1,...m { nk=1 |[Ai ] jk |} + 2di (42) Since ||L||2 ≤ sN and d∗ ≤ sN ≤ 2d∗ by (6) where d∗ = max{d1 , · · · , dN } is the maximal weighted degree of multiplier 1 graph Gλ , we have ||L|| ≥ 2d1 ∗ . 2 Meanwhile by Assumption 2, F(x) is η−strongly monotone and θ− Lipschitz continuous over Ω. By ||F(x1 ) − F(x2 )||22 ≤ θ2 ||x1 − x2 ||22 , ∀ x1 , x2 ∈ Ω we have η ||F(x1 ) − F(x2 )||22 . θ2 (43) Taking 0 < β ≤ min{ 2d1 ∗ , θη2 } and adding (42) and (43) yields (41). Thus operator Ā is β−cocoercive. By the definition of β−cocoercive in (39), operator Ā is also monotone. Since operator Ā is also single-valued, it is also maximally monotone. (ii): The operator B̄ in (30) can be written as:       0 0 −ΛT   x   NΩ (x)   0 0 −L̄   z̄  +  0  := B1 + B2 .       NRmN Λ L̄ 0 λ̄ + hF(x1 ) − F(x2 ), x1 − x2 i ≥ η||x1 − x2 ||22 ≥ It can easily be verified that if each agent chooses its local step-sizes satisfying (44), then (46) is satisfied. 2 Given a globally known parameter δ, each agent can independently choose its local step sizes τi ,νi , and σi with the rule given in (44). Suppose that the step-sizes τi , µi , σi in Algorithm 3.5 are chosen such that Φ in (29) is positive definite. Thus we can define a norm √ induced by√matrix Φ for a finite Euclidean space as ||x||Φ = hx, xiΦ = hΦx, xi. The next result investigates the properties of operators Φ−1 Ā, Φ−1 B̄ and T 1 , T 2 defined in Lemma 4.3 under Φ−induced norm || · ||Φ . Since L̄ is symmetric, B1 is a skew-symmetric matrix, i.e., BT1 = −B1 . Hence, B1 is maximally monotone19 . B2 can be written as the direct sum of NΩ × 0mN × NRmN . + Both NΩ and NRmN are maximally monotone as normal cones + of closed convex sets. Obviously, 0mN is also maximally monotone as a single-valued operator. Furthermore, the direct sum of maximally monotone operators is also maximally monotone20 , hence B2 is also maximally monotone. Lemma 5.6. Suppose Assumptions 1-3 hold. Take 0 < β ≤ min{ 2d1 ∗ , θη2 } where d∗ is the maximal weighted degree of multiplier graph Gλ , and η, θ are parameters in Assumption 1 2. Take δ > 2β . Suppose that the step-sizes τi , νi , σi in Algorithm 3.5 are chosen to satisfy (44). Then the operators Φ−1 Ā and Φ−1 B̄ with Φ in (29) and Ā, B̄ in (30), and operators 18 Proposition 17.10 of Bauschke & Combettes (2011) 20.30 of Bauschke & Combettes (2011) 20 Proposition 20.23 of Bauschke & Combettes (2011) 19 Example 21 11 Corollary 24.4 of Bauschke & Combettes (2011) T 1 = Id − Φ−1 Ā, T 2 = RΦ−1 B̄ = (Id + Φ−1 B̄)−1 defined as Lemma 4.3 satisfy the following properties under the Φ−induced norm || · ||Φ : 1 (i). Φ−1 Ā is βδ−cocoercive, and T 1 ∈ A( 2δβ ). −1 (ii). Φ B̄ is maximally monotone, and T 2 ∈ A( 12 ). 1 A( 2δβ ), and T 2 := (Id + Φ−1 B̄)−1 ∈ A( 12 ) in the Euclidean space with Φ−matrix induced norm || · ||Φ . The next result shows the convergence of Algorithm 3.5 based on its compact reformulation (33) and the properties of T 1 and T 2 . Proof: (i): By the definition of cocoercivity in (39), we need to prove hΦ−1 Ā(x) − Φ−1 Ā(y), x − yiΦ ≥ βδ||Φ−1 Ā(x) − Φ−1 Ā(y)||2Φ , ∀x, y ∈ Ω̄. Noticing that by the choice of parameters τi , νi , σi , we have that matrix Φ − δIn+2mN is positive semi-definite from Lemma 5.5. Denote smax (Φ) and smin (Φ) as the maximal and minimal eigenvalues of matrix Φ. It must hold that smax (Φ) ≥ smin (Φ) ≥ δ. Furthermore, ||Φ||2 = smax (Φ) ≥ smin (Φ) = 1 ≥ δ 22 , therefore, we also have ||Φ−1 ||2 ≤ 1δ . Notice that ||Φ−1 ||2 the operator Ā is single-valued and Φ−1 is also nonsingular, so that for any x, y ∈ Ω̄, Theorem 5.7. Suppose Assumptions 1-3 hold. Take 0 < β ≤ min{ 2d1 ∗ , θη2 } where d∗ is the maximal weighted degree of multiplier graph Gλ , and η, θ are parameters in Assumption 1 . The step-sizes τi , νi , σi in Algorithm 3.5 2. Take δ > 2β are chosen to satisfy (44). Then with Algorithm 3.5, each player has its local strategy xi,k converging to its corresponding component in the variational GNE of game (7), and the local Lagrangian multipliers λi,k of all the agents converge to the same Lagrangian multiplier corresponding with KKT condition (16), i.e., ||Φ−1 Ā(x) − Φ−1 Ā(y)||2Φ = hΦΦ−1 (Ā(x) − Ā(y)), Φ−1 (Ā(x) − Ā(y))i = ||Ā(x) − Ā(y)||2Φ−1 ≤ 1δ ||Ā(x) − Ā(y)||22 lim xi,k → xi∗ , k→∞ By the β−cocoercive property of Ā in Lemma 5.4 and the above inequality, Firstly, by (i) and (ii) of Lemma 5.1 and the fact that T 1 , T 2 are averaged operators due to Lemma 5.6, T 1 , T 2 are also nonexpansive operators under the Φ−matrix induced norm ||·||Φ . Take any $∗ ∈ zer(Ā + B̄), or equivalently any fixed point of T 2 ◦ T 1 , i.e., $∗ = T 2 T 1 $∗ , and then by Lemma 4.3 and (33), 1 1 1 )Id + (−T̆ ) ∈ A( ) 2βδ 2βδ 2βδ ||$k+1 − $∗ ||Φ = ||T 2 (T 1 $k ) − T 2 (T 1 $∗ )||Φ ≤ ||T 1 $k − T 1 $∗ || ≤ ||$k − $∗ ||Φ 1 since 1 < 2βδ by the assumption that δ > 2β and −T̆ is also nonexpansive. (ii). Φ is symmetric positive definite and nonsingular. For any (x, u) ∈ graΦ−1 B̄ and (y, v) ∈ graΦ−1 B̄, Φu ∈ ΦΦ−1 B̄(x) ∈ B̄(x) and Φv ∈ ΦΦ−1 B̄(y) ∈ B̄(y). Then hx − y, u − viΦ = hx − y, Φ(u − v)i ≥ 0, ∀x, y since B̄ is monotone by Lemma 5.4. Therefore, Φ−1 B̄ is monotone under the Φ−matrix induced product h·, ·iΦ . Furthermore, take (y, v) ∈ Ω̄ × Rn+2mN , and hx − y, u − viΦ ≥ 0, for any other (x, u) ∈ gra(Φ−1 B̄). For any (x, ũ) ∈ graB̄, we have (x, Φ−1 ũ) ∈ gra(Φ−1 B̄). hx − y, Φ(Φ−1 ũ − v)i ≥ 0, or equivalently, hx − y, ũ − Φv)i ≥ 0. Since B̄ is maximally monotone, then (y, Φv) ∈ graB̄. We conclude that v ∈ Φ−1 B̄(y) which implies that Φ−1 B̄ is maximally monotone. Therefore, by Lemma 5.3 T 2 = (Id + Φ−1 B̄)−1 is firmly nonexpansive under the Φ−matrix induced norm || · ||Φ . 2 (49) Hence the sequence {||$k − $∗ ||Φ } is non-increasing and bounded from below. By the monotonic convergence theorem, {||$k − $∗ ||} is bounded and converges for every $∗ ∈ zer(A + B). 1 ) and T 2 ∈ A( 12 ). Denote ξ = By Lemma 5.6, T 1 ∈ A( 2δβ 1 2δβ ∈ (0, 1). Then with (ii) of Lemma 5.1 and (33) we have, ||$k+1 − $∗ ||2Φ = ||T 2 (T 1 $k ) − T 2 (T 1 $∗ )||2Φ ≤ ||T 1 $k − T 1 $∗ ||2Φ −||(T 1 $k − T 1 $∗ ) − (T 2 T 1 $k − T 2 T 1 $∗ )||2Φ ≤ ||$k − $∗ ||2Φ − ||(T 1 $k − T 1 $∗ ) − (T 2 T 1 $k − T 2 T 1 $∗ )||2Φ ∗ ∗ 2 − 1−ξ ξ ||$k − $ − (T 1 $k − T 1 $ )||Φ (50) where the first inequality follows by T 2 ∈ A( 21 ) and the second 1 inequality follows by T 1 ∈ A( 2δβ ), both utilizing (ii) of Lemma 5.1. Notice that Summarizing the above results, take 0 < β ≤ min{ 2d1 ∗ , θη2 }, 1 δ > 2β , and τi , νi , σi satisfying (44), then T 1 := Id − Φ−1 Ā ∈ 22 Proposition (48) Proof: With Lemma 5.4 and 5.5, Algorithm 3.5 can be written in a compact form (33) according to Lemma 4.3, i.e., $k+1 = T 2 T 1 $k . The convergence analysis will be conducted via the analysis of this iterative computation of fixed points of T 2 ◦ T 1 . hΦ−1 Ā(x) − Φ−1 Ā(y), x − yiΦ = hĀ(x) − Ā(y), x − yi ≥ β||Ā(x) − Ā(y)||22 ≥ βδ||Φ−1 Ā(x) − Φ−1 Ā(y)||2Φ . (47) Therefore, the operator Φ−1 Ā is βδ−cocoercive under the Φ−induced norm || · ||Φ . Moreover, βδΦ−1 Ā is firmly nonexpansive by the definition of cocoercive operator. This implies that there exists a nonexpansive operator T̆ such that βδΦ−1 Ā = 12 T̆ + 21 Id. Then T 1 = Id − Φ−1 Ā = (1 − lim λi,k → λ∗ , ∀i = 1, · · · , N. k→∞ α||x||2 + (1 − α)||y||2 = ||αx + (1 − α)y||2 + α(1 − α)||x − y||2 . (51) 5.2.7 and 5.2.8 in Meyer (2000) 12 For the second and third terms on the right hand side of (50), the current operator output with previous iterate, leads to the well-known Krasnosel’skiĭ-Mann type of fixed point iteration23 , and has been utilized in (generalized) Nash equilibrium computation in Contreras, Klusch, Krawczyk (2004) and Krawczyk & Uryasev (2000). Meanwhile, inertial algorithms in operator splitting methods have received attention in recent years, such as Alvarez & Attouch (2001), Attouch, Chbani, Peypouquet, and Redont (2016), Lorenz & Pock (2015) and Rosasco, Villa & Vũ (2016). These efforts are partially motivated by the heavy ball method in Polyak (1987) and Nesterov’s acceleration algorithm in Nesterov (2013)) for optimization problems and their recent success in machine learning applications (refer to Wibisono, Wilson, and Jordan, (2016)). In particular, Nesterov’s acceleration algorithm is proved to enjoy an optimal convergence speed with a specific step-size choice. Thereby, in this work we consider a distributed algorithm with inertia for variational GNE seeking given as below: ||(T 1 $k − T 1 $∗ ) − (T 2 T 1 $k − T 2 T 1 $∗ )||2Φ ∗ ∗ 2 + 1−ξ ξ ||$k − $ − (T 1 $k − T 1 $ )||Φ 1 ∗ = ξ [ξ||(T 1 $k − T 1 $ ) − (T 2 T 1 $k − T 2 T 1 $∗ )||2Φ +(1 − ξ)||(T 1 $k − T 1 $∗ ) − ($k − $∗ )||2Φ ] 1 = ξ ||(T 1 $k − T 1 $∗ ) − ξ(T 2 T 1 $k − T 2 T 1 $∗ ) −(1 − ξ)($k − $∗ )||2Φ 1 + ξ ξ(1 − ξ)||(T 1 $k − T 1 $∗ ) − (T 2 T 1 $k − T 2 T 1 $∗ ) −(T 1 $k − T 1 $∗ ) + ($k − $∗ )||2Φ ≥ (1 − ξ)||($k − $∗ ) − (T 2 T 1 $k − T 2 T 1 $∗ )||2Φ = (1 − ξ)||$k − T 2 T 1 $k ||2Φ = (1 − ξ)||$k − $k+1 ||2Φ (52) where the second equality follows from (51) by setting α = ξ, x = (T 1 $k − T 1 $∗ ) − (T 2 T 1 $k − T 2 T 1 $∗ ) and y = (T 1 $k − T 1 $∗ ) − ($k − $∗ ). Combining (50) and (52) yields ∀k ≥ 0, ||$k+1 − $∗ ||2Φ ≤ ||$k − $∗ ||2Φ − (1 − ξ)||$k − $k+1 ||2Φ . Algorithm 6.1. (53) Using (53) from 0 to k and adding all k + 1 inequalities yields ||$k+1 − $∗ ||2Φ ≤ ||$0 − $∗ ||2Φ − (1 − ξ) k X Acceleration phase ||$l − $l+1 ||2Φ . l=0 P Taking limit as k → ∞ we have, (1 − ξ) ∞ ||$ − $k+1 ||2Φ ≤ k=1 P∞ k ∗ 2 ||$0 − $ ||Φ . Since 1 − ξ > 0, it follows that k=1 ||$k − $k+1 ||2Φ converges and limk→∞ $k − $k+1 = 0. Since {||$k − $∗ ||} is bounded and converges, {$k } is a bounded sequence. There exists a subsequence{$nk } that converges to $̃∗ . Notice that the composition T 2 ◦ T 1 is (Lipschitz) continuous and single-valued, because (33) is just an equivalent expression of Algorithm 3.5, and obviously the right hand side of Algorithm 3.5 is continuous. $nk +1 = T 2 T 1 $nk . Since T 2 T 1 is continuous, and limnk →∞ $nk − $nk +1 = 0, passing to limiting point, we have $̃∗ = T 2 T 1 $̃∗ . Therefore, the limiting point $̃∗ is a fixed point of T 2 T 1 , or equivalently, $̃∗ ∈ zer(Ā + B̄). Setting $∗ = $̃∗ in (49), we have {||$k − $̃∗ ||} is bounded and converges. Since there exists a subsequence {$nk } that converges to $̃∗ , it follows that {||$k − $̃∗ ||} converges to zero. Therefore, limk→∞ $k → $̃∗ . By Theorem 4.5, this just implies (48). 2 x̃i,k = xi,k + α(xi,k − xi,k−1 ) (54) z̃i,k = zi,k + α(zi,k − zi,k−1 ) (55) λ̃i,k = λi,k + α(λi,k − λi,k−1 ) (56) U pdate phase   xi,k+1 = PΩi x̃i,k − τi (∇ xi fi ( x̃i,k , { x̃ j,k } j∈N f ) − ATi λ̃i,k ) i X zi,k+1 = z̃i,k + νi wi j (λ̃i,k − λ̃ j,k ) (57) (58) j∈Niλ X n  λi,k+1 = PRm+ λ̃i,k − σi 2Ai xi,k+1 − Ai x̃i,k − bi + wi j (λ̃i,k − λ̃ j,k ) j∈Niλ +2 X j∈Niλ wi j (zi,k+1 − z j,k+1 ) − X wi j (z̃i,k − z̃ j,k ) o (59) j∈Niλ α > 0 is a fixed step-size in the acceleration phase, and τi > 0, νi > 0, σi > 0 are fixed step-sizes of player i, and W = [wi j ] is the weighted adjacency matrix of multiplier graph Gλ . Compared with Algorithm 3.5, Algorithm 6.1 has two phases. In the acceleration phase, each player uses the local state information of the last two steps to get predictive variables by a simple linear extrapolation. In the update phase, the players just feed the predictive variables to Algorithm 3.5 to get the next iterates. Hence compared with Algorithm 3.5, Algorithm 6.1 has only an additional simple local computation burden. Obviously, Algorithm 6.1 is also totally distributed, and shares all the features of Algorithm 3.5. However, there is an additional need to choose a proper step-size α. In the following two subsections, we will first give some intuitive interpretation of Algorithm 6.1 from the viewpoint of a 6. Distributed algorithm with inertia In this section, we propose a distributed algorithm with inertia for variational GNE seeking, which possibly accelerates the convergence under some mild additional computation burden. There are various modifications of Picard fixed point iteration to achieve the possible acceleration of convergence speed, and most of them fall into the domains of relaxation algorithm and inertial algorithm (Refer to Iutzeler & Hendrickx (2016) for reviews and numerical comparisons for optimization problems). The relaxation algorithm that simply combines 23 Chapter 13 5 of Bauschke & Combettes (2011) where $̃(kh) is an interpolation point to be determined later. Denote $k = $(kh) and take h = 1, then (66) can be written as discretization of continuous-time dynamical systems, and then prove its convergence. $k +(1−α̃)($k −$k−1 )−Φ−1 Ā($̃k ) ∈ $k+1 +Φ−1 B̄($k+1 ). (67) 6.1. Interpretations from viewpoints of dynamical systems Denote α = 1 − α̃ and take $̃k = $k + α($k − $k−1 ), then (67) can be written as The interpretation of inertial (acceleration) algorithms from a continuous-time dynamical system viewpoint can be found in Polyak (1987) and most recently in Wibisono, Wilson, and Jordan, (2016) for optimization problems and in Attouch, Chbani, Peypouquet, and Redont (2016) for proximal point algorithms. Here we give a comparative development of Algorithm 3.5 and Algorithm 6.1 just for illustrations of the differences behind the algorithms. Firstly, let us show that Algorithm 3.5, or equivalently its compact reformulation (33) in Lemma 4.3, can be interpreted as the discretization of the following dynamical system: $̇ ∈ −Φ−1 Ā($) − Φ−1 B̄($). $̃k = $k + α($k − $k−1 ), $̃k − Φ−1 Ā($̃k ) ∈ $k+1 + Φ−1 B̄($k+1 ). (68) leads to equations (63)-(64), or equivalently Algorithm 6.1. Remark 6.2. Compared with (60), (65) is a second order dynamical system with an additional inertial term α$̇, hence (65) enjoys better convergence properties than (60). Therefore, it is expected that Algorithm 6.1, as a discretization of (65), would have better convergence properties than Algorithm 3.5. (60) 6.2. Convergence analysis The following result proves the convergence of Algorithm 6.1 by providing sufficient step-size choices for α as well as τi , νi , σi . The sufficient choice condition for α can be ensured by solving a simple algebra inequality. The proof idea of the following result is motivated by inertial algorithms works for optimization and operator splitting such as Alvarez & Attouch (2001), Attouch, Chbani, Peypouquet, and Redont (2016), Rosasco, Villa & Vũ (2016), Iutzeler & Hendrickx (2016), and especially Lorenz & Pock (2015). However, since this work considers a noncooperative game setup and adopts a fixed step-size in the distributed algorithm, Theorem 6.3’s proof is also provided for completeness. In fact, for differential inclusion (60), we have the following implicit/explicit discretization with step-size of h, $(kh + h) − $(kh) ∈ −Φ−1 Ā($(kh))−Φ−1 B̄($(kh+h)). (61) h Denote $k = $(kh) and take h = 1, then (61) can be written as $k − Φ−1 Ā($k ) ∈ $k+1 + Φ−1 B̄($k+1 ). (62) Therefore, the implicit/explicit discretization of (60) is exactly (32) that leads to (33), or equivalently Algorithm 3.5. Moreover, the explicit discretization corresponds with the forward step, and the implicit discretization corresponds with the backward step. That’s the reason why Algorithm 3.5 is called a forward-backward splitting algorithm. Adopt similar compact notations as in Section 4, and denote x̃ = col( x̃1 , · · · , x̃N ), λ̃¯ = col(λ̃1 , · · · , λ̃N ), and z̃¯ = col(z̃1 , · · · , z̃N ). And further denote $̃ = col(x̃, λ̃¯ , z̃¯). Then by similar arguments as in Section 4 and using operators Ā and B̄ defined in (30) and Φ defined in (29), Algorithm 6.1 can be written in a compact form (assume B̄ is maximally monotone), $̃k = $k + α($k − $k−1 ) −1 Theorem 6.3. Suppose Assumptions 1-3 hold. Take 0 < β ≤ min{ 2d1 ∗ , θη2 } where d∗ is the maximal weighted degree of multiplier graph Gλ , and η, θ are parameters in Assumption 2. 1 and 0 < α < 1 Given a sufficient small 0 <  < 1, take δ > 2β in Algorithm 6.1 such that 2βδ(1 − 3α − ) ≥ (1 − α)2 . Suppose that player i chooses its step-sizes τi , νi , σi in Algorithm 6.1 satisfying (44). Then with Algorithm 6.1, players’ local strategies converge to the variational GNE of game in (7), and the local multipliers λi,k of all the agents converge to the same multiplier corresponding with KKT condition (16), i.e., (63) $k+1 = (Id + Φ B̄) (Id − Φ Ā)$̃k −1 −1 (64) lim xi,k → xi∗ , k→∞ where $k is defined as in Section 4. We can show that Algorithm 6.1, or equivalently (63)-(64), can be interpreted as the discretization of the following second-order continuous-time dynamical system, $̈ + α̃$̇ ∈ −Φ−1 Ā($) − Φ−1 B̄($). (68) lim λi,k → λ∗ , ∀i = 1, · · · , N. k→∞ (69) Proof: By the choice of β, operator Ā is β−cocoercive and operator B̄ is maximally monotone due to Lemma 5.4. By the choice of δ, τi , νi and σi , Φ − δIn+2mN is positive semi-definite due to Lemma 5.5, and Φ−1 Ā and Φ−1 B̄ satisfy the properties in Lemma 5.6. Therefore, Algorithm 6.1 can be exactly written in the compact form of (63)-(64) with similar arguments as in Lemma 4.3. Resorting to Theorem 4.5, we only need to show that Algorithm 6.1 converges and its limiting point belongs to zer(Ā + B̄). In fact, any limiting point of Algorithm 6.1 satisfies $∗ ∈ zer(Ā + B̄) as shown next. Suppose limk→∞ $k → $∗ , then $̃k → $∗ and $∗ = (Id+Φ−1 B̄)−1 (Id−Φ−1 Ā)$∗ using the (65) In fact, for differential inclusion (65) consider the following type of implicit/explicit discretization, $(kh) − $(kh − h) $(kh + h) − 2$(kh) + $(kh − h) + α̃ ∈ 2 h h − Φ−1 Ā($̃(kh)) − Φ−1 B̄($(kh + h)), (66) 14 continuity of the right hand of (64). Therefore, $∗ ∈ zer(Ā+ B̄) because Φ is a positive definite matrix. The following relationship (similar with the cosine rule) will be heavily utilized in the convergence analysis. ||a − c||2Q − ||b − c||2Q = 2ha − b, a − ciQ − ||a − b||2Q , Using (76) for the second term on the right hand of (72) yields ||$k − $∗ ||2Φ − ||$k+1 − $∗ ||2Φ ≥ ||$k − $k+1 ||2Φ + 2hĀ($̃k ) − Ā($∗ ), $k+1 − $∗ i −2αh$k − $k−1 , $k+1 − $∗ iΦ (70) By Lemma 5.4, Ā is β−cocoercive. For the second term on the right hand of (77), we have which can be verified by directly expanding with ||a + b||2Q = ||a||2Q + 2ha, biQ + ||b||2Q . The proof is divided into three parts: • Part 1: Given any $∗ ∈ zer(Ā + B̄), ||$k+1 − $∗ ||2Φ − ||$k − $∗ ||2Φ follows a recursive inequality as follows, ||$k+1 − $∗ ||2Φ − ||$k − $∗ ||2Φ ≤ α(||$k − $∗ ||2Φ − ||$k−1 − $∗ ||2Φ ) + (α + α2 )||$k − $k−1 ||2Φ (71) P 2 • Part 2: Given any $∗ ∈ zer(Ā+ B̄), ∞ k ||$k+1 −$k ||Φ < ∞ and limk→∞ $k+1 − $k = 0. or equivalently we have ||$k+1 − $∗ ||2Φ − ||$k − $∗ ||2Φ ≤ −||$k − $k+1 ||2Φ 1 ||$k+1 − $̃k ||22 + 2αh$k − $k−1 , $k+1 − $∗ iΦ . + 2β Part 1: Given any point $∗ ∈ zer(Ā + B̄), we first prove a recursive inequality (71) for ||$k+1 − $∗ ||2Φ − ||$k − $∗ ||2Φ . Using (70) to expand the left hand of (71) yields, α(||$k − $∗ ||2Φ − ||$k−1 − $∗ ||2Φ ) = α(2h$k − $k−1 , $k − $∗ iΦ − ||$k − $k−1 ||2Φ ) (80) Combining (79) and (80), we have, ||$k+1 − $∗ ||2Φ − ||$k − $∗ ||2Φ −α(||$k − $∗ ||2Φ − ||$k−1 − $∗ ||2Φ ) 1 ≤ −||$k − $k+1 ||2Φ + 2β ||$k+1 − $̃k ||22 +2αh$k − $k−1 , $k+1 − $∗ iΦ −α(2h$k − $k−1 , $k − $∗ iΦ − ||$k − $k−1 ||2Φ ) 1 ≤ −||$k − $k+1 ||2Φ + 2β ||$k+1 − $̃k ||22 +2αh$k − $k−1 , $k+1 − $k iΦ + α||$k − $k−1 ||2Φ (81) Next using (63) and (70) for the first and third terms on the right hand of (81) yields (73) Because $∗ ∈ zer(Ā + B̄), we also have 2αh$k − $k−1 , $k+1 − $k iΦ − ||$k − $k+1 ||2Φ = 2αh α1 ($̃k − $k ), $k+1 − $k iΦ − ||$k − $k+1 ||2Φ = 2h$̃k − $k , $k+1 − $k iΦ − ||$k − $k+1 ||2Φ = ||$k − $̃k ||2Φ − ||$k+1 − $̃k ||Φ = α2 ||$k − $k−1 ||2Φ − ||$k+1 − $̃k ||2Φ (74) Due to the maximal monotonicity of B̄ proved in Lemma 5.4, hu − v, $k+1 − $∗ i ≥ 0, ∀ u ∈ B̄($k+1 ), v ∈ B̄($∗ ) (79) Utilizing the equality (70) we also have, ||$k − $∗ ||2Φ − ||$k+1 − $∗ ||2Φ = 2h$k − $k+1 , $k − $∗ iΦ − ||$k − $k+1 ||2Φ = 2h$k − $k+1 , $k − $k+1 + $k+1 − $∗ iΦ − ||$k − $k+1 ||2Φ = ||$k − $k+1 ||2Φ + 2h$k − $k+1 , $k+1 − $∗ iΦ = ||$k − $k+1 ||2Φ + 2h$̃k − $k+1 , $k+1 − $∗ iΦ −2αh$k − $k−1 , $k+1 − $∗ iΦ (72) where the last step is derived by incorporating (63). To tackle the second term on the right hand of (72), we proceed as follows. By (64) we have, $̃k − Φ−1 Ā($̃k ) ∈ $k+1 + Φ−1 B̄($k+1 ), or equivalently, − Ā($∗ ) ∈ B̄($∗ ). hĀ($̃k ) − Ā($∗ ), $k+1 − $∗ i = hĀ($̃k ) − Ā($∗ ), $k+1 − √ $̃k + $̃k − $∗ i ≥ β||Ā($̃k ) − Ā($∗ )||22 + 2h β(Ā($̃k ) − Ā($∗ )), 2 √1 β ($k+1 − $̃k )i 1 ≥ β||Ā($̃k ) − Ā($∗ )||22 − β||Ā($̃k ) − Ā($∗ )||22 − 4β ||$k+1 − $̃k ||22 1 2 = − 4β ||$k+1 − $̃k ||2 (78) where the first inequality is obtained by the cocoercive property (39) and the second inequality is obtained by 2ha, bi ≥ −||a||22 − ||b||22 . Combining (77) with (78) we have ||$k − $∗ ||2Φ − ||$k+1 − $∗ ||2Φ ≥ ||$k − $k+1 ||2Φ 1 ||$k+1 − $̃k ||22 − 2αh$k − $k−1 , $k+1 − $∗ iΦ , − 2β • Part 3: We first show the convergence of {||$k − $∗ ||2Φ } given any $∗ ∈ zer(Ā+ B̄), and then show the convergence of Algorithm 6.1. Φ($̃k − $k+1 ) − Ā($̃k ) ∈ B̄($k+1 ). (77) (75) (82) 1 For the second term on the right hand of (81), 2β ||$k+1 − 1 2 2 $̃k ||2 ≤ 2βδ ||$k+1 − $̃k ||Φ , since Φ > δIn+2mN . Incorporating this and (82) into (81) By incorporating (73) and (74) into (75), we have hΦ($̃k − $k+1 ) − Ā($̃k ) + Ā($∗ ), $k+1 − $∗ i ≥ 0 ||$k+1 − $∗ ||2Φ − ||$k − $∗ ||2Φ −α(||$k − $∗ ||2Φ − ||$k−1 − $∗ ||2Φ ) 1 ≤ −||$k+1 − $̃k ||2Φ + 2β ||$k+1 − $̃k ||22 + (α + α2 )||$k − $k−1 ||Φ 1 ≤ −(1 − 2δβ )||$k+1 − $̃k ||2Φ + (α + α2 )||$k − $k−1 ||2Φ (83) or equivalently, h$̃k − $k+1 , $k+1 − $∗ iΦ − hĀ($̃k ) − Ā($∗ ), $k+1 − $∗ i ≥ 0. (76) 15 Since δ > 1 2β , we derive (71). P 2 Part 2: In this step, we will prove ∞ k ||$k+1 − $k ||Φ < ∞ and limk→∞ $k+1 − $k = 0. 1 Denote S = Φ − 2β In+2mN . Then S is symmetric and positive 1 definite since Φ ≥ δIn+2mN and δ > 2β . The first inequality of (83) can also be written as: ||$k+1 − $∗ ||2Φ − ||$k − $∗ ||2Φ − α(||$k − $∗ ||2Φ − ||$k−1 − $∗ ||2Φ ) ≤ −||$k+1 − $̃k ||2S + (α + α2 )||$k − $k−1 ||2Φ . (84) For the first term on the right hand of (84), −||$k+1 − $̃k ||2S = 2h$k − $k+1 , $k − $̃k iS − ||$k − $k+1 ||2S − ||$k − $̃k ||2S = −2h$k − $k+1 , α($k − $k−1 )iS −||$k − $k+1 ||2S − α2 ||$k − $k−1 ||2S ≤ α||$k − $k+1 ||2S + α||$k − $k−1 ||2S −||$k − $k+1 ||2S − α2 ||$k − $k−1 ||2S = (α − 1)||$k − $k+1 ||2S + (α − α2 )||$k − $k−1 ||2S . (85) where the first equality follows from (70), the second equality follows from (63), and the third inequality follows from −2hx, yi ≤ ||x||2 + ||y||2 . Denote Q = 2Φ − 1−α 2β In+2mN . Then Q is also symmetric and positive definite, since α < 1 and Φ ≥ δIn+2mN . Combining (84) with (85), k Therefore, limk→∞ $k+1 − $k = 0, and $k−1 ||2Φ < ∞. P∞ k=1 (α + α2 )||$k − Part 3: In this part, we first show the convergence of {||$k − $∗ ||2Φ } given any $∗ ∈ zer(Ā + B̄), and then show the convergence of Algorithm 6.1. Denote φk = max{0, ||$k − $∗ ||2Φ − ||$k−1 − $∗ ||2Φ } and ψk = (α + α2 )||$k − $k−1 ||2Φ , and recall (71), we have φk+1 ≤ αφk + ψk . Apply this relationship recursively, φk+1 ≤ αk φ1 + k−1 X αi ψk−i . (89) i=0 Summing (89) from k = 1 to k = J, P J Pk−1 i PJ 1−α J k=1 φk+1 ≤ φ1 1−α + k=1 i=0 α ψk−i P J−1 i P J J ≤ φ1 1−α k=i+1 ψk−i 1−α + i=0 α ||$k+1 − $∗ ||2Φ − ||$k − $∗ ||2Φ −α(||$k − $∗ ||2Φ − ||$k−1 − $∗ ||2Φ ) ≤ (α − 1)||$k − $k+1 ||2S + (α − α2 )||$k − $k−1 ||2S +(α + α2 )||$k − $k−1 ||2Φ = (α − 1)||$k − $k+1 ||2S 1 +αh[(1 − α)(Φ − 2β I) + (1 + α)Φ]$k − $k−1 , $k − $k−1 i = (α − 1)||$k − $k+1 ||2S + α||$k − $k−1 ||2Q . (86) Denote µk = ||$k − $∗ ||2Φ − α||$k−1 − $∗ ||2Φ + α||$k − $k−1 ||2Q , then µk+1 − µk = ||$k+1 − $∗ ||2Φ − α||$k − $∗ ||2Φ + α||$k+1 − $k ||2Q −||$k − $∗ ||2Φ + α||$k−1 − $∗ ||2Φ − α||$k − $k−1 ||2Q = ||$k+1 − $∗ ||2Φ − ||$k − $∗ ||2Φ − α(||$k − $∗ ||2Φ −||$k−1 − $∗ ||2Φ ) + α||$k+1 − $k ||2Q − α||$k − $k−1 ||2Q ≤ (α − 1)||$k − $k+1 ||2S + α||$k − $k−1 ||2Q +α||$k+1 − $k ||2Q − α||$k − $k−1 ||2Q = (α − 1)||$k − $k+1 ||2S + α||$k+1 − $k ||2Q 1 = h[(α − 1)(Φ − 2β I) + α(2Φ − 1−α 2β I)]$k+1 − $k , $k+1 − $k i (87) where the third inequality follows by (86). Given a sufficient small 0 <  < 1, choose 0 < α < 1 and 1 δ > 2β such that 2βδ(1 − 3α − ) ≥ (1 − α)2 , then 1 1−α 2β In+2mN ) − α(2Φ − 2β In+2mN ) 2 − (1−α) 2β In+2mN ≥ Φ −(α − 1)(Φ − = (1 − 3α)Φ α||$k−1 −$∗ ||2Φ ≤ ||$k −$∗ ||2Φ −α||$k−1 −$∗ ||2Φ +α||$k −$k−1 ||2Q ≤ µ1 . Therefore, ||$k − $∗ ||2Φ ≤ α||$k−1 − $∗ ||2Φ + µ1 . By Lemma 1 at Page 44 of Polyak (1987), ||$k − $∗ ||2Φ ≤ αk (||$1 − $∗ ||2Φ − µ1 µ1 1−a ) + 1−α , and {$k } is bounded sequence. P We also have µk+1 − µ1 ≤ − ki=1 ||$i+1 − $i ||2Φ . Then P  ki=1 ||$i+1 − $i ||2Φ ≤ µ1 − µk+1 ≤ µ1 + α||$k − $∗ ||2Φ ≤ αµ1 µ1 ) + 1−α . Let k goes to infinity, µ1 + αk+1 (||$1 − $∗ ||2Φ − 1−a we have, ∞ X ||$k+1 − $k ||2Φ < ∞ (88) Therefore, (87) yields µk+1 − µk ≤ −||$k+1 − $k ||2Φ . Therefore, µk+1 ≤ µk ≤ µ1 . By the definition of µk , ||$k −$∗ ||2Φ − (90) Let J → ∞, then since 0 < α < 1, P∞ P φ1 i P∞ + ∞ ≤ 1−α i=0 α Pk=i+1 ψk−i k=1 φk P φ1 i ∞ (91) + ∞ ≤ 1−α t=1 ψt i=0 α φ1 1 P∞ ≤ 1−α + 1−α t=1 ψt P P∞ 2 2 Noticing that ∞ t=1 ψt = k=1 (α + α )||$k − $k−1 ||Φ < ∞, P∞ Pk k=1 φk < ∞, and hence the sequence { i=1 φi }, being a nonnegative and non-decreasing sequence, converges and is bounded. P Consider another sequence {||$k − $∗ ||2Φ − ki=1 φi }. Since P ||$k − $∗ ||2Φ is nonnegative and { ki=1 φi } is bounded, {||$k − P $∗ ||2Φ − ki=1 φi } is bounded from below. Furthermore, {||$k − P $∗ ||2Φ − ki=1 φi } is a non-increasing sequence. In fact, P ||$k+1 − $∗ ||2Φ − k+1 i=1 φiP = ||$k+1 − $∗ ||2Φ − φk+1 − ki=1 φi P ≤ ||$k+1 − $∗ ||2Φ − ||$k+1 − $∗ ||2Φ + ||$k − $∗ ||2Φ − ki=1 φi P = ||$k − $∗ ||2Φ − ki=1 φi where the second inequality follows from the definition of φk , P φk+1 ≥ ||$k+1 − $∗ ||2Φ − ||$k − $∗ ||2Φ . As {||$k − $∗ ||2Φ − ki=1 φi } is a non-increasing sequence and bounded from below, {||$k − P $∗ ||2Φ − ki=1 φi } converges. Therefore, {||$k − $∗ ||2Φ }, being the sum of two convergent P P sequences {||$k − $∗ ||2Φ − ki=1 φi } and { ki=1 φi }, also converges. We are ready to show the convergence of Algorithm 6.1 using the results in Part 1 and Part 2. Since {$k } is a bounded 16 sequence, it has a convergent subsequence {$nk } that converges to $̃∗ . Because limk→∞ $k+1 − $k = 0 by Part 2, we have limk→∞ $nk −1 − $nk = 0 and limk→∞ $nk +1 − $nk = 0. Pass to limiting point of {$nk }, then we have $̃∗ = T 1 T 2 $̃∗ because the righthand side of (63)-(64) is continuous. Hence, $̃∗ ∈ zer(Ā + B̄). Taking $∗ = $̃∗ in (71) of Part 1, we also have {||$k − $̃∗ ||2Φ } converges by Part 3. Because a subsequence {||$nk − $̃∗ ||2Φ } converges to zero, the whole sequence {||$k − $̃∗ ||2Φ } converges to zero. Therefore, the whole sequence of {$k } converges to $̃∗ ∈ zer(Ā + B̄). Resorting to Theorem 4.5 gives the desired result. 2 total product supply to all the markets given the action profile x of all the companies. Market M j has a maximal capacity of r j > 0, therefore, it should be satisfied that Ax ≤ r where r = col(r1 , · · · , rm ) ∈ Rm . Suppose that P : Rm → Rm is a price vector function that maps the total supply of each market to the corresponding market’s price. Each company has also a local production cost function ci (xi ) : Ωi → R. Then the local objective function of company (player) Fi is fi (xi , x−i ) : ci (xi ) − PT (Ax)Ai xi . Overall, in this network Cournot game, each company needs to solve the following optimization problem given the other companies’ profile x−i , Remark 6.4. A sufficient and simple choice of parameters to ensure the conditions in Theorem (6.3) is δ = β1 ,  = α and √ 1 0 < α < 10 − 3. In fact, δ > 2β implies that 2βδ could be be any real number % > 1. If we take  = ςα, ς > 0, then the quadratic inequality becomes α2 − (2 − 3% − ς%)α + 1 − % < 0. Since 1 − % < 0, α2 − (2 − 3% − ς%)α + 1 − % takes value strictly less than zero when α takes 0. By the continuity of quadratic equation, there always exists 0 < α < 1 that ensures the above quadratic inequality given any % > 1 and ς > 0. min xi ∈Ωi s.t. ci (xi ) − PT (Ax)Ai xi P Ai xi ≤ r − Nj=1, j,i A j x j (92) Obviously, the above network Cournot game in (92) is a particular problem of game in (7). Some practical decision problems in engineering networks can be well described by the network Cournot game in (92), such as the rate control game in communication network (Yin, Shanbhag & Mehta (2011)) and the demand response game in smart grids (Ye & Hu (2016)). Example 7.1 (Rate control game). Consider a group of source-destination pairs (nodes) in a communication network, that is {S 1 , ..., S N }, to decide their data rates in a non-cooperative setting. The data is transferred through a group of communication links (channels), that is {L1 , ..., Lm }, and each link L j has a maximal data rate capacity of c j > 0. Assume that an additional layer has decided the routine table for each source-destination pair S i , which is encoded by Ai ∈ Rm×ni . Each column of Ai has only one element being 1 and all the other elements being zero, and the k-th element of column j is 1 if S i utilizes the link Lk and transfers data rate [xi ] j on link Lk . The local decision variable of S i is the data rate on each link that it utilizes, denoted by xi ∈ Rni . xi also PN has a local feasibility constraint xi ∈ Ωi . Denote n = i=1 ni , x = col(x1 , · · · , xN ) ∈ Rn , A = [A1 , · · · , AN ] ∈ Rm×n and c = col(c1 , · · · , cm ) ∈ Rm . The total data rate on each link should be less than the capacity of that link: Ax ≤ c. Given the data rate profile of all the nodes x, the payoff function of S i , Ji (xi , x−i ) : Rn → R, takes the form as Ji (xi , x−i ) = −ui (xi ) + DT (Ax)Ai xi , where ui (xi ) : Ωi → R is the utility of source S i , and D : Rm → Rm is a delay function that maps the total data rate on each link to the unit delay of that link. Thereby, the data rate control game can be well described by the network Cournot game in (92). 7. Network Cournot game and simulation studies There are various practical problems that can be well modeled by the game in (7), such as the river basin pollution game in Krawczyk & Uryasev (2000), the power market competition in Contreras, Klusch, Krawczyk (2004), plug-in electric vehicles charging management in Paccagnan, Gentile, Parise, Kamgarpour & Lygeros (2016), and communication network congestion game in Yin, Shanbhag & Mehta (2011). All above examples can be regarded as the type of the network Cournot game described below, which is a generalization of the network Cournot competition in Bimpikis, Ehsani, & Ilkilic (2014) by introducing additional market capacity constraints or equivalently globally shared coupling affine constraints. This type of network Cournot game with affine coupling constraints also appeared in the numerical studies of Yu, van der Schaar & Sayed (2016). 7.1. Network Cournot game Suppose that there are N companies (players) with labels F1 , · · · , F N and m markets with labels M1 , · · · , Mm . Company Fi decides its strategy to participate in the competition in ni markets by producing and delivering xi ∈ Rni amounts of products to the markets it connects with. The production limitation of company Fi is xi ∈ Ωi ⊂ Rni . Company Fi has a local matrix Ai ∈ Rm×ni that specifies which market it will participate in. The j-th column of Ai , that is [Ai ]: j , has only one element being 1 and all other elements being 0, and [Ai ]: j has its k-th element being 1 if and only if player Fi delivers [xi ] j amount of production to the market Mk . Therefore, matrices A1 , · · · , AN can be used to specify a bipartite graph that represents the connections between the companies and the PN markets. Denote n = i=1 ni , x = col(x1 , · · · , xN ) ∈ Rn , and PN m×n A = [A1 , · · · , AN ] ∈ R . Then Ax ∈ Rm = i=1 Ai xi is just the Example 7.2 (Demand response game). Given a distribution network in power grids, suppose that there are T time periods, and each period has a desirable minimal total load shedding di > 0. Suppose that there are N load managers (energy management units or players) in the network, and each load manager i can decide a local vector xi ∈ Rti as its local load shedding vector in some specific time periods. Each load manager i also has a local matrix Ai ∈ RT ×ti that specifies which time period player i will participate. For j−th column of Ai , it has one element being 1 while all other elements 17 F5 being zero. The k−th element of the j−th column of Ai is 1 if load manager i decides to decrease its load by [xi ] j at time k. PN Denote x = col(x1 , · · · , xN ), and A = [A1 , · · · , AN ] ∈ RT × i=1 ti , d = col(d1 , · · · , dT ). Naturally, it is required that the total load shedding of all the load managers should meet the minimal value, Ax ≥ d. Each player has a local feasible constraint xi ∈ Ωi ⊂ Rti , and a cost function ci (xi ) : Ωi → R due to local load shedding. P : RT → RT is the payment price vector function that maps total load shedding of each period to the payment price vector, therefore, PT (Ax)Ai xi is the payment awards of player i for its load shedding. The disutility function of player i is Ji (xi , x−i ) = ci (xi ) − PT (Ax)Ai xi given all the players’ action profile x. All in all, the demand response management game is well described by the network Cournot game model in (92). ci (xi ) − (P̄ − DAx)T Ai xi P ci (xi ) − P̄T Ai xi + ( Nj=1 DA j x j )T Ai xi ci (xi ) + xiT ATi DAi xi − ATi P̄T xi P + Nj=1, j,i xTj ATj DAi xi AT1 DA2 2AT2 DA2 ··· ATN DA2 ··· ··· ··· ··· AT1 DAN AT2 DAN ··· 2ATN DAN F20 M5 F12 F8 M3 F13 F16 F9 F4 Figure 1: Network cournot game: An edge from Fi to M j on this graph implies that Fi participates in the competition in M j . F5 F14 F10 F1 F17 F18 F2 F15 F7 F6 F3 F4 F19 F12 F8 F9 F11 F20 F16 F13 Figure 2: Interference graph G f : An undirected edge from Fi to F j on this graph means that the objective function of Fi depends on x j , and vice versa. Company Fi is assumed to be able to observe the decisions of its neighbors on this graph . (93) F(x) is strongly monotone24 and Lipschitz continuous, and Assumptions 1 and 2 are satisfied. Remark 7.3. Notice that in the network Cournot game of (92), each player i’s local objective function ci (xi ) − PT (Ax)Ai xi only depends on the decisions of the players that participate the same markets as player i. Denote Z[a, b] as the set of integers from a to b. Mathematically, j ∈ Nif if and only if ∃k ∈ Z[1, m], p ∈ Z[1, ni ] and q ∈ Z[1, n j ] such that [Ai ]kp = 1 and [A j ]kq = 1. Since A = [A1 , · · · , AN ] is usually a sparse matrix, the interference graph G f of network Cournot game also has sparse edge connections.     ,  (94) 7.2. Simulation studies In the studies, we adopt a similar simulation setting as Yu, van der Schaar & Sayed (2016) without considering the stochastic factors. Consider 20 companies and 7 markets, and the connection relationship between the companies and the markets is depicted in Figure 1. If there is an edge from Fi to M j in Figure 1, then company Fi participates the competition in Notice that Q can be written as Q = diag{AT1 DA1 , · · · , ATN DAN } + S T S F19 M7 M4 F3 F18 M6 F15 F7 F6 then F(x) = ∇c(x) + Qx − AT P̄. F11 M2 Denote F(x) = col(∇ x1 J1 (x1 , x−1 ), · · · , ∇ xN JN (xN , x−N )), ∇c(x) = col(∇c1 (x1 ), ∇c2 (x2 ), · · · , ∇cN (xN )) and Q ∈ Rn×n , and   2AT1 DA1  AT DA 1 Q =  2 ···  ATN DA1 F14 F 17 M1 F2 Moreover, the Assumptions 1 and 2 for Algorithm 3.5 and 6.1 can easily be satisfied for many practical cost functions and price functions. For example, take company Fi ’s production cost function to be a strongly convex function with Lipschitz continuous gradients (A quadratic function ci (xi ) = xiT Qi xi + bTi xi with Qi ∈ Rni ×ni being a symmetric and positive definite matrix and bi ∈ Rni is one possible choice). The price of market M j is taken as the linear function of the total supplying p j (x) = P̄ j − d j [Ax] j (known as a linear inverse demand function in economics) with P̄ j > 0, d j > 0. Denote P = col(p1 , · · · , pm ) : Rn → Rm , P̄ = col(P̄1 , · · · , P̄m ) ∈ Rm , D = diag{d1 , · · · , dm } ∈ Rm×m . Then P = P̄ − DAx is the vector price function. The payments of company Fi by selling product xi to the markets that it connects with is just PT Ai xi . Therefore, the objective function of company Fi is, Ji (xi , x−i ) = = = F10 F1 (95) where S is √ a block matrix √ defined√ as S √ = √ [ DA1 , · · · , DAN ] ∈ Rm×n and D = diag{ d1 , · · · , dm }. Therefore, Q is positive semi-definite matrix. Hence, the Jacobian matric of F(x), JF(x) = diag{∇2 c1 (x1 ), ∇2 c2 (x2 ), · · · , ∇2 cN (xN )} + Q is postive definite since the cost functions ci (xi ) are strongly convex. Therefore, 24 Proposition 18 2.3.2 of Facchinei and Pang (2007) F1 F2 F3 F4 F5 F6 F7 F20 F8 F19 F9 F18 F10 F17 F16 F15 F14 F13 F12 F11 Figure 3: Multiplier graph Gλ : Company Fi and F j are able to exchange their local {λi , zi } and {λ j , z j } if there exists an edge between them on this graph. ||x −x∗ || ||$ −$∗ || 2 2 k k × 100% and ||$ × 100% Figure 5: The trajectories of ||x ∗ || ∗ || 2 2 generated with Algorithm 3.5 and 6.1: This also shows the convergence of both algorithms, and the superior convergence speed of Algorithm 6.1. Figure 4: The trajectories of ||xk+1 − xk ||2 and ||$k+1 − $k ||2 generated with Algorithm 3.5 and 6.1: This shows the convergence of both algorithms, and the superior convergence speed of the algorithm with inertia 6.1. market M j by producing and delivering products to market M j . Each company Fi has a local constraint as 0 < xi < Θi where each component of Θi is randomly drawn from (10, 25). Each market M j has a maximal capacity of r j > 0, j = 1, · · · , 7 and r j is randomly drawn from (20, 80). The local objective function is taken as (93). The local cost function of company i is ci (xi ) = Pi πi ( nj=1 [xi ] j )2 + bTi xi which is a strongly convex function with Lipschitz continuous gradient. Here πi is randomly drawn from (1, 8), and each component of bi is randomly drawn from (1, 4). The price function is taken as the linear function P = P̄ − DAx, and P̄ j and d j are randomly drawn from (250, 500) and (1, 5), respectively. With Figure 1 and the definition of objective function in (93), the interference graph G f can be easily obtained and is depicted in Figure 2. Meanwhile, we adopte the multiplier graph Gλ shown in Figure 3. The weighted adjacency matrix W = [wi j ] of multiplier graph Gλ has all its nonzero elements to be 1. With Figure 1 and the definition of objective function in (93), the interference graph G f can be easily obtained and is depicted in Figure 2. Meanwhile, we adopte the multiplier graph Gλ shown in Figure 3. The weighted adjacency matrix W = [wi j ] of multiplier graph Gλ has all its nonzero elements to be 1. Set the step-sizes in Algorithm 3.5 as τi = 0.03, νi = 0.2, σ = 0.02 for all companies, and for Algorithm 6.1 set α = 0.12 while other step-sizes are the same as Algorithm 3.5. The initial starting points xi,0 , λi,0 and zi,0 of both algorithms are set to be zeros. Figure 6: The trajectory of ||(L ⊗ I7 )λ̄k ||2 and [(1T20 ⊗ I7 )λ̄k ]T (Axk − r): The left sub-figure shows that λ̄k converges to the null space of L ⊗ I7 , hence the local multipliers of all companies reach consensus asymptotically. (1T20 ⊗ I7 )λ̄k P is the averaged vector 20 i=1 λi,k , therefore, the right sub-figure shows that the complementary condition hλ∗ , Ax∗ − ri = 0 is asymptotically satisfied. Figure 7: The trajectories of local decisions xi,k of F1 , F6 , F10 and F16 . The solid red lines are generated with Algorithm 3.5 and dashed lines are generated with Algorithm 6.1 19 extended for stochastic GNE seeking with noisy gradient observations and noisy information sharing by resorting to the stochastic forward-backward splitting algorithm in Rosasco, Villa & Vũ (2016). The strong monotonicity assumption on the pseudo-gradient might be relaxed to monotonicity assumption by utilizing the forward-backward-forward splitting method in Briceno-Arias & Combettes (2013). Reference References Figure 8: The trajectories of some components of local multiplier [λi,k ] j where solid red lines are generated with Algorithm 3.5 and dashed lines are generated with Algorithm 6.1. [λi,k ] j is the j−th component of local multiplier λi at iteration time k. Here we select local multipliers of F1 , F6 , F10 and F16 Alpcan, T. and Basar, T., 2005. Distributed algorithms for Nash equilibria of flow control games. In Advances in dynamic games (pp. 473-498). Birkhauser Boston. Alvarez, F. and Attouch, H., 2001. An inertial proximal method for maximal monotone operators via discretization of a nonlinear oscillator with damping. Set-Valued Analysis, 9(1-2), pp.3-11. Attouch, H., Chbani, Z., Peypouquet, J. and Redont, P., 2016. Fast convergence of inertial dynamics and algorithms with asymptotic vanishing viscosity. Mathematical Programming, pp.1-53. Bauschke, H.H. and Combettes, P.L., 2011. Convex analysis and monotone operator theory in Hilbert spaces. Springer Science & Business Media. Berinde, V., 2007. Iterative approximation of fixed points. Berlin, Germany: Springer. Bimpikis, K., Ehsani, S. and Ilkilic, R., 2014. Cournot competition in networked markets. In EC (p. 733). Briceno-Arias, L.M. and Combettes, P.L., 2013. Monotone operator methods for Nash equilibria in non-potential games. In Computational and Analytical Mathematics (pp. 143-159). Springer New York. Combettes, P.L. and Vũ, B.C., 2014. Variable metric forward-backward splitting with applications to monotone inclusions in duality. Optimization, 63(9), pp.1289-1318. Contreras, J., Klusch, M. and Krawczyk, J.B., 2004. Numerical solutions to Nash-Cournot equilibria in coupled constraint electricity markets. IEEE Transactions on Power Systems, 19(1), pp.195-206. Condat, L., 2013. A primal-dual splitting method for convex optimization involving Lipschitzian, proximable and linear composite terms. Journal of Optimization Theory and Applications, 158(2), pp.460-479. Debreu, G., 1952. A social equilibrium existence theorem. Proceedings of the National Academy of Sciences, 38(10), pp.886-893. Dreves, A. and Sudermann-Merx, N., 2016. Solving linear generalized Nash equilibrium problems numerically. Optimization Methods and Software, pp.1-28. Facchinei, F. and Pang, J.S., 2007. Finite-dimensional variational inequalities and complementarity problems. Springer Science & Business Media. Facchinei, F. and Pang, J.S., 2010. Nash equilibria: the variational approach. Convex optimization in signal processing and communications, p.443. Facchinei, F. and Kanzow, C., 2010. Generalized Nash equilibrium problems. Annals of Operations Research, 175(1), pp.177-211. Facchinei, F., Fischer, A. and Piccialli, V., 2007. On generalized Nash games and variational inequalities. Operations Research Letters, 35(2), pp.159-164. Fischer, A., Herrich, M. and Schonefeld, K., 2014. Generalized Nash equilibrium problems-recent advances and challenges. Pesquisa Operacional, 34(3), pp.521-558. Harker, P.T., 1991. Generalized Nash games and quasi-variational inequalities. European journal of Operational research, 54(1), pp.81-94. Iutzeler, F. and Hendrickx, J.M., 2016. A Generic Linear Rate Acceleration of Optimization algorithms via Relaxation and Inertia. arXiv preprint arXiv:1603.05398. Kearns, M., Littman, M.L. and Singh, S., 2001. Graphical models for game theory. In Proceedings of the Seventeenth conference on Uncertainty in artificial intelligence (pp. 253-260). Morgan Kaufmann Publishers Inc.. Koshal, J., Nedić, A. and Shanbhag, U.V., 2016. Distributed Algorithms for Aggregative Games on Graphs. Operations Research, 64(3), pp.680-704. Krawczyk, J.B. and Uryasev, S., 2000. Relaxation algorithms to find Nash equilibria with economic applications. Environmental Modeling & Assessment, 5(1), pp.63-73. The trajectories of selected algorithm performance indexes, ∗ ∗ k −$ || k −x || × 100%, ||$||$ × including ||xk+1 − xk ||2 , ||$k+1 − $k ||2 , ||x||x ∗ || ∗ || 100%, ||L ⊗ I7 λ̄k ||2 and [(1T20 ⊗ I7 )λ̄k ]T (Axk − r), are shown in Figures 4, 5 and 6. The trajectories of the local decisions xi,k of some companies are shown in Figure 7, and the trajectories of [λi,k ] j , which stands for the j-th component of local Lagrangian multiplier λi,k , are shown in Figure 8. 8. Conclusions In this paper, we proposed a primal-dual distributed algorithm based on operator splitting methods for iterative computation of a variational GNE in noncooperative games with globally shared affine coupling constraints. The algorithm is motivated by the forward-backward operator splitting method for finding zeros of a sum of monotone operators. Each player only needs to knows its local information, especially a block of the affine coupling constraints. The proposed algorithm is proved to converge with fixed step-sizes under some mild assumptions by exploiting properties of composition of averaged operators. Furthermore, a distributed algorithm with inertia is also proposed and analyzed for possible acceleration of convergence speed. Numerical simulation studies for a network Cournot game demonstrate the efficiency of the proposed algorithms and the superior convergence speed of the inertial algorithm. Many challenging and exciting topics are still open for distributed NE/GNE seeking. Here we only list some problems with probable solution hints. Finding all the generalized Nash equilibria has its only interests, and this could be partially solved by combining the design in this paper with the parameterized variational inequality method in Nabetani, Tseng, and Fukushima (2011). The algorithm requires that each player is able to observe all its neighbors’ decisions through the interference graph G f . This assumption could be relaxed by adopting the local consensus dynamics in Salehisadaghiani & Pavel (2016b), and then it could only be required that the players were able to observe parts of its neighbors’ decisions through a maximal triangle-free spanning subgraph of G f . The methodology of this paper could be 20 Kulkarni, A.A. and Shanbhag, U.V., 2012. On the variational equilibrium as a refinement of the generalized Nash equilibrium. Automatica, 48(1), pp.45-55. Lei, J., Chen, H.F. and Fang, H.T., 2016. Primal-Dual Algorithm for Distributed Constrained Optimization. Systems & Control Letters, 96, 110-117. Liang, S., Yi, P. and Hong, Y., 2016. Distributed Nash equilibrium seeking for aggregative games with coupled constraints. arXiv preprint arXiv:1609.02253. Lorenz, D.A. and Pock, T., 2015. An inertial forward-backward algorithm for monotone inclusions. Journal of Mathematical Imaging and Vision, 51(2), pp.311-325. Menache, I. and Ozdaglar, A., 2011. Network games: Theory, models, and dynamics. Synthesis Lectures on Communication Networks, 4(1), pp.1-159. Mesbahi, M. and Egerstedt, M. (2010). Graph Theoretic Methods for Multiagent Networks, Princeton: Princeton University Press. Meyer, C.D., 2000. Matrix analysis and applied linear algebra (Vol. 2). SIAM. Nabetani, K., Tseng, P. and Fukushima, M., 2011. Parametrized variational inequality approaches to generalized Nash equilibrium problems with shared constraints. Computational Optimization and Applications, 48(3), pp.423-452. Nesterov, Y., 2013. Introductory lectures on convex optimization: A basic course (Vol. 87). Springer Science & Business Media. Paccagnan D., Gentile B., Parise F.,Kamgarpour M. and Lygeros J. 2016. Distributed computation of generalized Nash equilibria in quadratic aggregative games with affine coupling constraints. In 2016 55th IEEE Conference on Decision and Control (CDC), (pp.6123-6128), IEEE. Pan, Y. and Pavel, L., 2009. Games with coupled propagated constraints in optical networks with multi-link topologies. Automatica, 45(4), pp.871-880. Parise, F., Gentile, B., Grammatico, S. and Lygeros, J., 2015, December. Network aggregative games: Distributed convergence to Nash equilibria. In 2015 54th IEEE Conference on Decision and Control (CDC) (pp. 2295-2300). IEEE. Pavel, L., 2007. An extension of duality to a game-theoretic framework. Automatica, 43(2), pp.226-237. Poljak B. T., 1987. Introduction to optimization. Optimization Software. Rosasco, L., Villa, S. and Vũ, B.C., 2016. A stochastic inertial forward-backward splitting algorithm for multivariate monotone inclusions. Optimization, 65(6), pp.1293-1314. Rosen, J.B., 1965. Existence and uniqueness of equilibrium points for concave n-person games. Econometrica: Journal of the Econometric Society, pp.520-534. Salehisadaghiani, F. and Pavel, L., 2016a. Distributed Nash equilibrium seeking: A gossip-based algorithm. Automatica, 72, pp.209-216. Salehisadaghiani, F. and Pavel, L., 2016b. Distributed Nash Equilibrium Seeking By Gossip in Games on Graphs. arXiv preprint arXiv:1610.01896. Schiro, D.A., Pang, J.S. and Shanbhag, U.V., 2013. On the solution of affine generalized Nash equilibrium problems with shared constraints by Lemkes method. Mathematical Programming, 142(1-2), pp.1-46. Scutari, G., Palomar, D.P., Facchinei, F. and Pang, J.S., 2010. Convex optimization, game theory, and variational inequality theory. IEEE Signal Processing Magazine, 27(3), pp.35-49. Shi, W., Ling, Q., Wu, G. and Yin, W., 2015. A proximal gradient algorithm for decentralized composite optimization. IEEE Transactions on Signal Processing, 63(22), pp.6013-6023. Spall, J.C., 1992. Multivariate stochastic approximation using a simultaneous perturbation gradient approximation. IEEE transactions on Automatic Control, 37(3), pp.332-341. Swenson, B., Kar, S. and Xavier, J., 2015. Empirical centroid fictitious play: An approach for distributed learning in multi-agent games. IEEE Transactions on Signal Processing, 63(15), pp.3888-3901. Wibisono, A., Wilson, A.C. and Jordan, M.I., 2016. A Variational Perspective on Accelerated Methods in Optimization. Proceedings of the National Academy of Sciences, 133, doi:10.1073/pnas.1614734113 Ye, M. and Hu, G., 2016. Game design and analysis for price-based demand response: An aggregate game approach. IEEE Transactions on Cybernetics, to appear. Yi P, Hong Y, Liu F. 2016. Initialization-free Distributed Algorithms for Optimal Resource Allocation with Feasibility Constraints and its Application to Economic Dispatch of Power Systems. Automatica 74, 259-269. Yin, H., Shanbhag, U.V. and Mehta, P.G., 2011. Nash equilibrium problems with scaled congestion costs and shared constraints. IEEE Transactions on Automatic Control, 56(7), pp.1702-1708. Yu, C. K., van der Schaar, M. and Sayed, A. H., 2016. Distributed Learning for Stochastic Generalized Nash Equilibrium Problems. arXiv preprint arXiv:1608.00039. Zeng X, Yi P, Hong Y, Xie L. 2016. Continuous-Time Distributed Algorithms for Extended Monotropic Optimization Problems, arXiv preprint arXiv:1608.01167, 2016 Zhu, M. and Frazzoli, E., 2016. Distributed robust adaptive equilibrium computation for generalized convex games. Automatica, 63, pp.82-91. 21
3cs.SY
1 MIMO UWB Radar System with Compressive Sensing arXiv:1604.04291v1 [cs.IT] 14 Apr 2016 Xia Li, Student Member, IEEE, Zhen Hu, Robert C. Qiu, Fellow, IEEE, Abstract—A multiple input multiple output ultra-wideband cognitive radar based on compressive sensing is presented in this letter. For traditional UWB radar, high sampling rate analog to digital converter at the receiver is required to meet Shannon theorem, which increases hardware complexity. In order to bypass the bottleneck of ADC or further increase the radar bandwidth using the latest wideband ADC, we propose to exploit CS for signal reconstruction at the receiver of UWB radar for the sparse targets in the surveillance area. Besides, the function of narrowband interference cancellation is integrated into the proposed MIMO UWB radar. The field demonstration proves the feasibility and reliability of the proposed algorithm. Target 2 Target 1 AWG RX antenna RX antenna TX antenna TX antenna Index Terms—MIMO, UWB, radar, CS, NBI, testbed. Transmitter based on FPGA Trigger signal Receiver I. I NTRODUCTION USB 2.0 In the radar system, the unprecedented radio bandwidth provides advantages such as the high precision of range estimation. However, the extremely high sampling rate of analog to digital converter (ADC) becomes a major challenge in the ultra-wideband (UWB) radar systems. According to Nyquist sampling theorem, the sampling rate should be at least twice the bandwidth of the signal. For better system performance, oversampling is often required and results even higher sampling rate. Compressed sensing (CS) gives an opportunity to overcome this challenge. CS [1] theory specifies a new signal acquisition approach, in a high probability, allowing the acquisition of signals at a much lower data rate than the Nyquist sampling rate. Some previous work of our group [2] applied CS to the communication application. In the communication system, the received waveforms are synchronized by some mechanism like preamble. However, in the MIMO radar application, the received signal cannot be considered as synchronized since the arrival time of signal depends on the over the air delay, which is determined by the target distance to the radar. The unknown delay leads to the randomness of the measurement matrix construction. A cyclic prefix (CP) is used in waveform design to make sure the measurement matrix is constant and unrelated to the time delay. Therefore, each receiver antenna can construct the basis matrix locally. Based on the analysis of the system, the architecture of the testbed is proposed. This testbed is based on our previous results of the UWB time reversal experiment [3] and cognitive UWB radar experiment [4]– [6]. Both of them are on the full sampling rate. However, the new system satisfies the specialty of the compressed sensing X. Li, Z. Hu, and R. C. Qiu are with the Department of Electrical and Computer Engineering, Center for Manufacturing Research, Tennessee Technological University, Cookeville, TN, 38505, e-mail: [email protected]; [email protected]; [email protected]. Gigabyte Ethernet MATLAB computing engine Fig. 1. Block diagram of the system architecture structure. The sampling rate at receiver can be much lower than the Nyquist rate used in the two previous systems. The experiment results based on measured data are provided to demonstrate the effectiveness of the algorithm. The performance curves of the algorithm under different NBI and SNR conditions are provided in simulation. II. BACKGROUND AND P ROBLEM F ORMULATION Since the transmitter and receiver of the our system are synchronized by a trigger signal as shown in Fig. 1, ToAs between transmitter antennas and receiver antennas can be estimated from the recovered channel information, which are used to estimate the target positions [4]. In traditional channel estimation theory, the channel vector h ∈ Cn can be estimated from the observations of the linear convolution, Xh = y ∈ Cn ., where the observation matrix X ∈ Cn×n is a partial Toeplitz matrix. By using CS theory, a sparse, high-dimensional vector h ∈ Cn can be accurately recovered from a small number of linear observations, RΩ Xh = ȳ ∈ Cm . Consider an arbitrary index set Ω ⊂ {0, 1, . . . , n − 1} whose cardinality |Ω| = m. We define the operator RΩ ∈ Cm×n that restricts a vector to the entries listed in Ω. In our testbed, the ȳ can be viewed as the sub-sampling of y. A delay in ȳ means the change of RΩ , which means the measurement matrix RΩ X is different. Since the delay is unknown to the receiver, channel information cannot be recovered at receiver locally. 2 A cyclic extension of time length TG is used to change the linear convolution to circulant convolution. If the channel delay is within TG , the system can be described in matrix as y = Xh + n, where X is a circulant matrix as   xn−1 xn−2 · · · x1 x0  x0 xn−1 . . . x2 x1    (1) X= . . . . ..  . .. .. ..  .. .  xn−2 xn−3 · · · x0 xn−1 The delay in dictionary nd can be represented by the channel latency. This is proved by (2). It holds when the delay nd is smaller than the length of CP. yc [n − nd ] = = = = N −1 X m=0 N −1 X of the received waveform with full sampling rate.       h11 h21      h12 h22 ȳ1 ȳ2 = X1 X2  | {z } | {z } h1 h2   + n̄1 n̄2 (5) The corresponding partial circulant matrix is defined as X̄ = RΩ X. The partial random circulant matrix is generated by a Rademacher sequence. It is proved in [8], the sth restricted isometry constant δs has ( 3 ) r 3 s s2 E [δs ] 6 C1 max log 2 n, log s log n , (6) m m h [m] x [hn − (nd + m)iN ] where C1 > 0 is a universal constant. (6) means that for a given δ ∈ (0, 1), we have E [δs ] 6 δ provided by o n 3 3 (7) m > C2 max δ −1 s 2 log 2 n, δ −2 slog2 nlog2 s , h [m0 − nd ] x [hn − m0 iN ] where C2 > 0 is another universal constant. For 0 6 λ 6 1 and C3 > 0, we can have h [m] x [hn − nd − miN ] m=0 N −1 X m0 =0 N −1 X h [m − nd ] x [hn − miN ] P (δs > E [δs ] + λ) 6 e (2) m=0 The vector h is the sampled signal of the channel impulse response h (t). h (t) P can be treated as a time limited pulse train of the form h (t) = αm δ (t − τm Ts ), where the amplitudes 2 m If the delay τm is an integer, then all the energy from αm is mapped to tap hτm . However, if τm is not an integer, its energy will leak to all taps of hk . However, most of the energy is kept in the neighborhood of the original pulse locations. When the target number is small, the number of wireless paths is also small. In this case, h can be considered as a sparse signal. For a 2 × 2 MIMO system shown in Fig. 1, the system equation can be described as       h11 h21      h12 h22 y1 y2 = X1 X2  | {z } | {z } h1 h2   + n1 n2 , (4) where y1 and y2 are the received waveforms from receiver antennas 1 and 2. For the transmitted waveforms x1 and x2 , X1 and X2 are the respective Toeplitz matrices. n1 and n2 are the i.i.d. complex Gaussian variables for the two receiver antennas. hji is the impulse response of the channel between transmitter antenna i to receiver antenna j. For the CS-based radar system, the sub-sampled received waveform can be considered as the result of down-sampling , (8) s C3 m log2 slog2 n. where σ = In radar systems, the number of multipath is equivalent to the number of targets. The channel information is sparse to the most cases. The channel information can be recovered by using the following convex optimization program min (kh1 k1 + kh2 k1 )  Xh1 − ȳ1 subject to Xh2 − ȳ2 αm of channel taps are complex valued. The samples of h are modeled as [7] π sin (πτm ) 1 X  . (3) hk = √ αm e−j N (k+(N −1)τm ) π n m sin N (τm − k) −λ2 σ2 2 2 6 ε1 , 6 ε2 (9) where k·k1 is the `1 norm and k·k2 is the `2 norm. εj is chosen such that it bounds the amount of noise in the measurement from jth receiver antenna. The convex optimization problem (9) is a second-order cone problem and can be solved efficiently by utilizing the Basis Pursuit Denoising (BPDN) algorithm [9]. III. NBI CANCELLATION USING CS THEORY The system is modified to achieve the robustness under NBI. In (4), NBI signal is not taken into account in algorithm, NBI is treated as noise. However, the sparsity of the NBI can be used to recover its information from sub-sampled received waveform.  ȳ1 ȳ2  =X  h1 h2  +  n̄1 n̄2  =X  h1 h2  +  n̄1 n̄2  +  j̄1 +  FH jf 1 j̄2  FH j f 2  (10) where FH is a randomly chosen rows of the discrete Fourier matrix and can be written as FH = RΩ FH . jj is a vector of the NBI signal received at antenna j. jf j is a vector of the NBI in frequency domain. A recent research [10] has proved 3 that this measurement matrix has small restricted isometry constants with very high probability. For the receiver antenna j, we can have    hj1  ȳj = X1 X2 + F−1 jf j + n̄j hj2   i hj1 h (11) = FH  hj2  +n̄j . X1 X2 | {z } jf j | {z } Ā sj Because both the channel information and the NBI interference information are sparse, the interference signal and channel information can be recovered simultaneously by using the following convex optimization program min (ks1 k1 + ks2 k1 )  As1 − ȳ1 subject to As2 − ȳ2 =   | X1 X2 X1 X2 {z X̄   hj1 hj2  2 2 6 6 , (12) + FH jf j + n̄j − FH j̃fj Local Oscillator 4.0 GHz I D/A Conveter Dual- core 1Gsps/14- bit Xilinx Virtex-5 FPGA Q Power Amplifier Quadrature Modulator Block diagram of the system architecture Quadrature Demodulator 400~6000 MHz I A/D Converter DDR2 Memory Low Noise RF Bandpass Amplifier filter A/D Converter Q FPGA Array Local Oscillator 4.0 GHz Host Computer Xilinx Chipscope Pro Analyzer I DDR2 Memory A/D Converter Low Noise RF Bandpass Amplifier filter Q Quadrature Demodulator 400~6000 MHz Fig. 3. A/D Converter 4 Channels 3Gsps Digitizer with FPGA Array In NI PXIe Chassis Block diagram of the system architecture traditional system. Due to the CS algorithm, the sampling rate of the received signal can be reduced to much lower than the Nyquist rate. As an example, we set the receiver ADC sampling rate 13 of the full signal bandwidth, which is 166.66 Msps, as shown in Fig. 3. The reduced sampling rate in the receiver can greatly reduce the cost and power consumption of the receiver. The analog RF down-converter is the same as the traditional system. A bandpass filter is used to remove noise outside of signal bandwidth. V. E XPERIMENT R ESULTS AND P ERFORMANCE A NALYSIS  (13) hj min (kh1 k1 + kh2 k1 )  Xh1 − ȳ10 subject to Xh2 − ȳ20 where Power Splitter 1:2 Reference Clock 20 MHz For Local Oscillator Baseband Processing Fig. 2. Power Amplifier Q JTAG The channel information can be recovered by using the following convex optimization program ε00j 1Gsps/8-bit 2 Cores both with I&Q Host computer Quadrature Modulator  hj1 +w̄j + n̄j } hj2 | {z }  Digital Arbitrary Waveform Generators Power Splitter 1:2 ε01 ε02 where s1 contains both the channel information and interference position in frequency domain. ε0j bounds the energy of n̄j . NBI signal is always sparse in frequency domain due to its narrow band feature. The number of taps in channel information equals the number of targets in the surveillance area and suffers the influence of the environment like clutters. It is more likely NBI has better sparsity structure than the channel information. The precision of the recovery algorithm relies on the signal sparsity. The NBI signal recovery should be more accurate. Thus, the estimated interference signal j̃f can be used to cancel the interference in the received waveform. By subtracting the interference signal jf using the estimated interference signal j̃f , the remaining signal w̄ is obtained. ȳj0 = I D/A Conveter Dual- core 1Gsps/14- bit 2 2 6 ε001 , 6 ε002 (14) bounds the energy of noise signal w̄j + n̄j . IV. CS- BASED MIMO RADAR SYSTEM Based on the analysis on the previous section, a CS-based cognitive MIMO radar system is proposed. The transmitter architecture is the same as our previous work [3], as shown in Fig. 2. In the experiment, the carrier frequency is set to 4 GHz. The bandwidth of the radar waveform is 500 MHz, making the system an ultra-wideband system. To recover the original signal, the sampling rate of the radar received waveform must be higher than 500 MHz in With one target in surveillance area, the experiment result is shown in Fig. 4. The starting time of recording received signal is the starting time of waveform transmitting. The position of radar waveform in the received signal can be detected by using the correlation relationship of CP. The channel information should have only one path in this situation. However, in real system, the channel delay is not an integer in model (3). Fig. 4 (b) is the result by solving (14). Most energy is mapped to tap 3 while the neighborhood of the tap holds the residue. Since sparsity is considered, the values of all other taps are close to zero. Fig. 4 (c) Interference information is obtained by solving (11). All of the energy is mapped to tap 45. In order to analyze the performance of the proposed algorithms, several simulations are conducted. For each point, 1 × 104 simulations are performed. Fig. 5 shows the effect of single tone NBI to compressed sensing system when SNR = 20 dB. Rhombused curve is obtained by (9) while stared curve is obtained by recovering channel information using (12). The vertical axis is the probability of detection, which means the probability when correct channel tap location is obtained. The result shows when SIR goes below 15 dB, system performance would be severely influenced by NBI. 4 20 100 0 50 0 1 0 0.9 -10 0.8 -20 0.7 -30 -40 0.6 Pd Amplitude (dB) Amplitude (dB) Amplitude -20 10 -40 0.5 -50 0.4 -60 With second step, single tone NBI With only one step, single tone NBI With second step, dual tone NBI With only first step, dual tone NBI 0.3 -60 -50 -70 0.2 -80 0.1 -20 -80 -90 -100 0 4 2 4 x 10 Time index -100 -10 SNR (dB) -5 0 -100 0 20 40 Channel tap index 0 20 40 60 Frequency bin Fig. 4. Experiment data: (a) Received sub-sampled baseband signal; (b) Recovered channel information; (c) Recovered interference information 1 0.9 Fig. 6. Performance curve of simulation algorithm in real-world situation. Simulation results show that the proposed algorithms are able to estimate the locations of the jamming interference and provide a performance gain compared to the system without NBI cancellation. 0.8 ACKNOWLEDGMENT 0.7 This work is funded by National Science Foundation through two grants (ECCS-0901420 and ECCS-0821658), and Office of Naval Research through two grants (N00010-10-10810 and N00014-11-1-0006). This work is partly funded by an AFOSR subcontract though the prime contractor (RNET Technologies, Inc.) on the CIRE (Center for Innovative Radar Engineering) contract FA8650- 10-D-1750 with AFRL/RY. Pd 0.6 0.5 0.4 0.3 Without NBI cancellation With NBI cancellation 0.2 0.1 12 Fig. 5. -15 12.5 13 13.5 14 SIR (dB) 14.5 15 15.5 16 The effect of NBI cancellation With a strong interference (SIR = 0 dB), Fig. 6 gives system performance under difference additive white Gaussian noise (AWGN) levels. Three targets situation is considered. Both single tone and dual tone NBIs results are shown. Two stared curves are for (14). Two rhombused curves are for (12). With the second step of channel estimation, the accuracy becomes much higher. In the case of dual-tone, the NBI signal becomes less sparse than the single tone case. Because the CS algorithm highly relies on the sparsity of the signal, the performance is worse than the single tone case. VI. C ONCLUSION In this letter, we have proposed a CS-based MIMO UWB cognitive radar. An algorithm is designed to get the ToA information from the sub-sampled echoed radar waveform. The algorithm is based on circulant convolution. It can estimate the channel information. Based on the equations of the whole system, a hardware architecture has been proposed to fit into the special structure of the CS system. NBI signal in the surveillance area is also considered. An algorithm to estimate and cancel the NBI interference is proposed. The hardware testbed is used to verify the effectiveness of the proposed R EFERENCES [1] E. Candès, J. Romberg, and T. Tao, “Robust uncertainty principles: Exact signal reconstruction from highly incomplete frequency information,” Information Theory, IEEE Transactions on, vol. 52, no. 2, pp. 489–509, 2006. [2] P. Zhang, Z. Hu, R. Qiu, and B. Sadler, “A compressed sensing based ultra-wideband communication system,” in Communications, 2009. ICC’09. IEEE International Conference on. IEEE, 2009, pp. 1–5. [3] Z. Chen, C. Zhang, F. Lin, J. Yu, X. Li, Y. Song, R. Ranganathan, N. Guo, and R. C. Qiu, “Towards a large-scale cognitive radio network: Testbed, intensive computing, frequency agility and security,” in Computing, Networking and Communications (ICNC), 2012 International Conference on. IEEE, 2012, pp. 556–562. [4] X. Li, Z. Hu, R. Qiu, N. Guo, G. Scalzi, and M. Wicks, “Waveform diversity for closed-loop wide-band cognitive sensing system,” in IEEE Waveform Diversity and Design Conference, vol. 2012, 2012. [5] X. Li, Z. Hu, R. Qiu, Z. Wu, J. Browning, and M. Wicks, “Demonstration of cognitive radar for target localization under interference,” Aerospace and Electronic Systems, IEEE Transactions on, vol. 50, no. 4, pp. 2440– 2455, 2014. [6] X. Li, Z. Hu, R. C. Qiu, and M. Wicks, “Experimental demonstration of cognitive radar for target localization under strong interference,” in MILITARY COMMUNICATIONS CONFERENCE, 2012-MILCOM 2012. IEEE, 2012, pp. 1–6. [7] J. Van de Beek, O. Edfors, M. Sandell, S. Wilson, and P. Borjesson, “On channel estimation in ofdm systems,” in Vehicular Technology Conference, 1995 IEEE 45th, vol. 2. IEEE, 1995, pp. 815–819. [8] H. Rauhut, J. Romberg, and J. A. Tropp, “Restricted isometries for partial random circulant matrices,” Applied and Computational Harmonic Analysis, vol. 32, no. 2, pp. 242–254, 2012. [9] S. S. Chen, D. L. Donoho, and M. A. Saunders, “Atomic decomposition by basis pursuit,” SIAM review, vol. 43, no. 1, pp. 129–159, 2001. [10] E. J. Candes, Y. C. Eldar, D. Needell, and P. Randall, “Compressed sensing with coherent and redundant dictionaries,” Applied and Computational Harmonic Analysis, vol. 31, no. 1, pp. 59–73, 2011.
3cs.SY
Capacity Planning for Cluster Tools in the Semiconductor Industry Martin Romaucha,∗, Richard F. Hartla a Department of Business Administration University of Vienna, Oskar-Morgenstern-Platz 1, 1090 Wien Abstract This paper proposes a new model for Cluster-tools with two load locks. Clustertools are widely used to automate single wafer processing in semiconductor industry. The load locks are the entry points into the vacuum of the Clustertool’s mainframe. Usually there are two of them available. Each lot being processed, is dedicated to a single load-lock. Therefore at most two different lots (with possibly different processing times and qualification) can be processed simultaneously. This restriction is one of the major potential bottlenecks. Capacity planning is one of the possible applications for the proposed model and the paper demonstrates the integration into a more general framework that considers different tool types and different operational modes. The paper also generalizes an earlier model that is limited to three processing chambers. The proposed modeling approach is based on makespan reductions by parallel processing. It turns out that the performance of the new approach is similar, when compared to the generalized model for three chambers, but the new approach outperforms the generalized model for four and more chambers. Keywords: Cluster-Tool , Capacity Planning, Semiconductor Industry, Linear Programming , Duality 1. Introduction This paper considers Cluster-Tools, a tool type that can be found in semiconductor fabrication front-end sites, also called wafer fabrication facilities. The wafer is the substrate used for the fabrication of integrated circuits for semicon∗ Corresponding author Email addresses: [email protected] (Martin Romauch), [email protected] (Richard F. Hartl) Preprint submitted to —————– 3rd May 2016 2 Design, Maskmaking reticles Wafermaking wafer starts Epitaxy Front-End Process: ------Oxidation, Deposition, Diffusion Photolitography Photoresist Exposure Planarization Etch semiconductor device Test & back-end wafer finishes Cleaning Inspection & Measurement raw silicon Implantation FRONT-END (WAFER FABRICATION) Figure 1: front end fabrication as a re-entrant flow shop (based on Sorenson [24] and Mönch et al. [19]) ductor devices. A wafer is a disc, usually a slice of mono-crystalline silicon with a width between 150 and 300 mm, and a thickness between 0.5 and 1 mm. The input of front-end facilities are containers of wafers (also called lots or FOUPs, Front Opening Unified Pods). A lot usually consists of 20 or more wafers that require the same processing. The fabrication is characterized by a large number loops or layers (compare Hutcheson [15]). Each loop consists of one or more processing steps; one of them is a lithographic process that allows to cover parts of the wafer (photo resist) from the process that follows. Figure 1 gives a schematic view on wafer fabrication. The flow diagram in Figure 1, is a representation of the fabrication process as a re-entrant flow shop. According to Thiesse and Fleisch [25] the traversed path of a single lot can be several kilometers long. In semiconductor industry most of the equipment is automated and characterized by load/unload operations, robot handling, testing, alignment, cooling and much more. Cluster Tools (compare Franssila [6]) for instance, have one or more load locks and multiple processing chambers. Cluster-tools are used to automate several process types. The internal software defines the behavior of the system. Cluster tools allow an automatic transfer of wafers between load ports and process chambers with possibly different processes inside a vacuum. The system can also be used for parallel processing to increase throughput and productivity. The wafers are transferred between chambers under a vacuum using a robotic arm to prevent exposure to air to prevent oxidation and contamination. Since a Cluster-tool may operate on different lots at the same time, the combination of lots is important and the Cluster-tool may show different operation cycle times for the same type of lot. According to Mönch et al. [19] several researchers studied the optimization of internal scheduling, but the corresponding models are not suitable to consider several Cluster-tools at the same time. One 3 L1 3 LL1 2 1 A 3 B A LL1 2 L1 B 1 L2 3 2 L2 1 3 2 LL2 LL2 C (i) t = 0 3 LL1 A 1 C (ii) t = 5 A 2 A B 1 LL1 2 L1 B L1 1 1 LL2 2 C (iii) t = 6 L2 3 3 B 2 1 C 1 2 3 3 L2 3 LL1 1 LL2 2 C (iv) t = 10 LL2 t = 1 2 3 4 5 6 7 8 9 10 11 12 Figure 2: A Cluster-tool with two load locks that is processing wafers in parallel. On left hand side: four snapshots of the Cluster-tool for t = 0, 5, 6, 10 can be found. The thickness of the outline of the wafers, indicates the processing progress. The corresponding Gantt-chart can be found on the right hand side of the Figure. of the major bottlenecks of a Cluster-tool are the load locks (see Christopher [3]). The load locks are the entry point into the vacuum of the Cluster tool. In order to describe a Cluster-Tool with respect to load locks and chambers, a simplified schedule for a Cluster-tool that is working in parallel mode is discussed in Example 1. The example is based on Figure 2. Example 1. On the left hand side of Figure 2, a Cluster-tool that is working in parallel mode with two load locks LL1 and LL2 is illustrated. In this example the chambers are supposed to be identical. Later in the example, one of the chambers will be less flexible than the others. In the beginning (t = 0), each load lock is occupied by one lot (LL1 with lot L1 and LL2 with lot L2 ), and each lot consists of three wafers. Each wafer needs to be processed in one of the chambers. The load lock LL1 is occupied with the lot L1 that needs the longer processing time. More precisely, each wafers from L1 need a processing time of six time units. For L2 the processing time is five time units per wafer. In this example the wafer handling time is neglected, therefore it is possible to start all processes in each chamber at the same time. In the first step (i) with t = 0, two wafers from lot L1 are assigned to chambers A and B; and one wafer from L2 is assigned to chamber C. At t = 5 the wafer in chamber C is finished and it is passed back to L2 . Then, the second wafer from L2 is assigned to chamber C. At t = 6 the wafers in A and B are handed back to L1 and chamber A will be occupied by the last wafer of L1 ; chamber B will be occupied by the last wafer of L2 . The corresponding Gant-chart can be found on the right hand side of Figure 1 2. The make-span is 12 with an idle time percentage of 12 on average. If wafers from L1 are excluded from chamber C then at least two wafers from L1 need to be assigned to the same chamber (A or B), hence the schedule is optimal with 4 respect to the make-span. Now, additionally suppose that the problem is scaled by thirty, and each lot counts 90 wafers. Then the wafers can be distributed in such a way that the idle time percentage vanishes. If this is possible, then the total processing time is 90 · (6 + 5) = 990. Therefore it is sufficient to find a distribution where each chamber finishes after 330 time units. Note that 330 is divisible by five and six: A B C }| { z }| { z }| { z 330 = 55 · 6 = 35 · 6 + 24 · 5 = 66 · 5 Therefore 55 wafers from L1 can be assigned to chamber A and 66 wafers of L2 can be assigned to chamber C. The remaining wafers can be assigned to chamber B. This example shows that on a larger scale where larger quantities are considered, a continuous approximation - where it is allowed to computationally “split” wafers - leads to reasonable results. LP based Cluster-tool models can be directly integrated in capacity models or in master planning like proposed in Ponsignon and Mönch [22] and Romauch and Klemmt [23]. The combination of simulation and optimization (LP) as discussed in Almeder et al. [1] Gansterer et al. [8] and Juan et al. [16] is also suitable for the integration of LP based Cluster-Tools models. Finally, real-time dispatching that integrates LP approaches can be found in Doleschal et al. [4] and Ham et al. [11] which can be extended to LP based Cluster-tool models. According to Duemmler and Wohlleben [5] there are also various alignments necessary to achieve an effective WIP Flow Management that assures that the planned capacity consumption (utilization) is coherent with the dispatching reality. Therefore, improvements of LP based Cluster-tool models are important to several areas. The focus of this paper is on static capacity planning, but it is important to note that the LP models introduced in this paper may also be useful to other applications, like master planning, simulation and dispatching. In the context of capacity planning for front-end facilities, a concise prediction of the equipment utilization is one of the major tasks. For given demands - that is wafer starts for given product routes - a calculation needs to confirm that the capacity restrictions are met. Furthermore it is necessary to identify hard/soft bottlenecks that are limiting the throughput. Depending on the purpose and time frame, there are several methods to tackle this capacity planning problem - sometimes elementary MRP calculations are sufficient, but the large majority is covered by simulation and linear programming. This paper is dedicated to linear programming formulations and proposes a Cluster Tools model for multiple chambers and two load locks that is performant, flexible and easy to analyze. The contribution of this paper is threefold. First, we present a new model that considers more than three chambers. Second we derive the model presented in Ortner [21] in a more general way that also allows to handle than three chambers. Third, computational experiments are used to compare the performance of the proposed methods. 5 2. Capacity Planning in Semiconductor Industry In order to show the applicability of the proposed Cluster-Tool model, the integration into a basic capacity planning model will be presented. The discussed model is static, the processing sequence is not considered and the quantities of wafers are continuous. Aspects like multiple time-frames can be understood as an elementary extension (cf. Romauch and Klemmt [23]), therefore the discussion (and the computational experiments) is restricted to a basic model to prove the concept and to avoid a cumbersome notation. The discussion of input and output of the basic capacity planning model starts with an example that is depicted in Figure 3. The input for the capacity planning model is the weekly going rate dp for each product p ∈ P on the basis of lots for a given fixed lot size. That means, dp wafers of product product p need to be produced in the following week. Each product corresponds to a product route that consists of processing steps. Some of the processing steps can be considered equivalent for different product routes and these equivalent processing steps constitute the so called job classes (j ∈ J). The capacity consumption (e.g. service times) and flexibility for members of the same job class is the same. Analogous to Figure 3 the primary demand dp on basis products infers a secondary demand λj on basis job classes. For instance job class 1 has a demand λ1 = 30 because this job class occurs once in the product routes for product one and product two (λ1 = d1 + d2 ). The wafers λj are distributed among the available machines, i.e. yji wafers from job class j are assigned to machine i. In total, for each job class j the P demand λj needs to be satisfied, i.e. i∈{a,b,c,d} yij = λj . The distribution that corresponds to yji infers a load on the corresponding machines that depends on P6 the service time tji , i.e. ui = j=1 yji tji . For the static capacity model the arrival rate λj on basis job class is distributed over the machines and results in a utilization profile, that corresponds to the capacity usage. A proper distribution or resource allocation is therefore a center piece of capacity planning, it will be used to judge if the demand can be satisfied and to identify the bottlenecks. The capacity model selected for the investigations is based on the idea of minimizing the maximum utilization - that means, to minimize utilization on the bottleneck. This approach can be extended to a lexicographic mini-max objective like in Ogryczak [20] to identify all levels of equally utilized equipment (cf. resource pool concept in Gold [9, 10]). A solution that is optimal with respect to the lexicographic mini-max objective has the property that only machines of the same level may share the load of a common job class. The LP defined in (1-4) is called the basic model, where the maximum load is minimized. According to (3) ρ is an upper limit to the utilization ui for all tools i ∈ I and the decision variable xji corresponds to the time invested in processing lots from job class j on machine i. The service rate µji = t1ji corresponds to number of lots that can be processed in one time unit. Therefore the number of processed units of job class j on machine j is yji = xji µji . In order to satisfy the demand, constraint (2) has to be satisfied. 6 product mix (pP) dp d1=20 40 ua utilization job classes j J 1 lj l1=30 a wafer starts per week (pP) d2=10 product routes expected utilization for each machine demand for each job class (given) demand for each product (given) 10 demand for each product 2 3 l2=80 l3=20 d3=40 4 5 l4=60 l5=10 ub uc b c 6 l6=40 ud d (iI) machines Figure 3: A simplified capacity planning process - the Figure is adapted from Romauch and Klemmt [23]. A given demand on the basis of products is decomposed into a demand for each job class. Finally a distribution of the workload results in a forecast for the expected utilization. min ρ s.t. P i∈I xji µji = λj P ui = j∈J xji ≤ ρ xji ≥ 0. (1) (∀j ∈ J), (2) (∀i ∈ I), (3) (4) 3. Capacity Planning for Cluster Tools The LP defined in (1-4) is a valid model for parallel single servers in heavy traffic (see e.g. Harrison and Lopez [12]), where each machine is represented by a queue with a given service rate. The models presented in this paper are based on these assumptions and extend the model to Cluster-Tools. According to Lopez and Wood [18] the main operating modes are the serial and the parallel mode. A Cluster-Tool is operated in serial mode if each wafer visits all chambers in a sequence and it is working in parallel mode if each wafer visits only one chamber. The serial mode can be approximated (lower bound) by separating the chambers of the Cluster-Tool from the mainframe. For instance, a Cluster-tool i with three chambers {A, B, C} is represented by the mainframe i, and the chambers (i, A), (i, B) and (i, C). An activity j calls chambers and mainframe at the same time. The corresponding service rates for the chambers are µj,(i,A) , µj,(i,B) and 7 µj,(i,C) . Since the slowest process defines the throughput of the tool, hence the service rate for the mainframe is defined by µj,i = minu∈A,B,C {µj,(i,v) }. Therefore it is sufficient to add the following constraint to (1-4): P ui,v = xji µji j∈J µj,(i,v) ≤ ρ (∀i ∈ I, v ∈ {A, B, C}) (5) The objective of this paper is to propose a similar approximation for ClusterTools in parallel mode. The corresponding models need a bit more explanation. For Cluster-Tools in parallel mode the service rate depends on the selected subset of chambers r∈ R ={A, B, C, AB, ...} that are selected to process a given type of lot. The subset of chambers is also called a recipe. The service time µj,i,r depends on the job class j, the Cluster tool i and the recipe r. The demand is represented by the arrival rate λj . The distribution of lots is determined by xj,i,r , which is the time invested in activity (j, i) with recipe r. In Ortner [21] a parallel Cluster-Tool model for two Load locks and three processing chambers is discussed. The basic idea is the identification of categories for optimal schedules (see Figure 4) where the makespan can be represented by a simple formula. Each formula is the Pweighted sums of the times invested in a given recipes amd can be written as r wi,r xi,r P where xi,r = j xj,i,r . For instance, if all possible processes are running in parallel which means that x +x +x +xi,A +xi,B +xi,C the load locks are the limiting resource, then xi,ABC + i,AB i,AC i,BC 2 is the corresponding make-span. If this is not the case, then a single chamber recipe exists that is too short or too long to run in parallel, which means that the make-span must be larger than that. It was shown, that the make-span can be represented by the maximum value of five formulas. The corresponding proof in Ortner [21] is constructive and generates feasible schedules for each case identified. The LP (6-9) is an abstraction of the LP found in Ortner [21], where the matrix B is defined in Table 1. In (6-9) we present an extension of (1-4) that can be used to represent the approach presented in Ortner [21]. For the three chamber case, the matrix B represents the formulas given in Figure 4 and the corresponding values can be found in Table 1. One of the contributions of the paper is to derive matrices for more than three chambers. min ρ P (6) xj,i,r µj,i,r = λj (∀j ∈ J) (7) Bk,r xj,i,r ≤ ρ (∀i ∈ I, k ∈ K) (8) (j, i, r) ∈ C (9) i ∈ I, r ∈ R : (j, i, r) ∈ C P j∈J,r∈R xj,i,r ≥ 0 8 xi,ABC + xi,AB + xi,AC + xi,A A xi,ABC xi,AB xi,AC B xi,ABC xi,AB xi,B C xi,ABC xi,C xi,ABC + xi,A xi,BC xi,B xi,AC xi,BC A xi,ABC xi,AB B xi,ABC xi,AB C xi,ABC xi,C xi,ABC + xi,AB + xi,BC + xi,B A xi,ABC xi,AB B xi,ABC xi,AB xi,BC C xi,ABC xi,C xi,BC xi,AB +xi,AC +xi,BC +xi,A +xi,B +xi,C 2 xi,A xi,B xi,B xi,C xi,ABC + xi,AC + xi,BC + xi,C xi,A xi,B A xi,ABC xi,AC xi,A B xi,ABC xi,B xi,BC xi,B C xi,ABC xi,AC xi,BC xi,C xi,ABC + xi,AB + xi,BC + xi,AC A xi,ABC xi,AB B xi,ABC xi,AB C xi,ABC xi,C xi,AC xi,A xi,B xi,BC xi,AC xi,BC Figure 4: Illuistration of different categories of optimal schedules. Five examples are given, one for each representative schedule. Each Figure ia a Gantt-chart (x-axis: time) on basis chambers. The formula in the header contains the formula to calculate the makespan, it represents this category. Two-chamber-recipes are colored to highlight the joint usage of two chambers. Table 1: Matrix B = (Bk,r ) for the dual based model (6-9) when considering three chambers. k=1 2 3 4 5 r=A 0.5 1 B 0.5 C 0.5 AC 0.5 1 1 1 1 1 BC 0.5 1 1 1 AB 0.5 1 1 1 ABC 1 1 1 1 1 3.1 An alternative modeling approach that exploits parallel processing BC AC xi,BC 9 xi,AC ξi,AC,B A B ξi,A,BC xi,A ξi,A,B xi,ABC ABC ξi,A,C C xi,B ξi,B,C xi,C ξi,AB,C AB xi,AB Figure 5: Parallel processing for three chambers, graph representation G(R, E). The vertices R represent the recipes and the edges E represent possible parallelizations. The Figure on the right hand side represents the parallelization opportunities for a given Cluster-tool i. For instance, the variable ξi,AB,C defines the time invested in parallel processing of recipe AB and recipe C. Before tackling this problem, an alternative modeling approach that considers more than three chambers is presented. 3.1. An alternative modeling approach that exploits parallel processing For a single equipment i, where the time invested in certain recipes xj,i,r is given and P no parallel processing is allowed (one load lock) the resulting makespan is j,r xj,i,r . In case two load locks are available it is possible to exploit parallel processing. Since xj,i,r cannot be changed, the time spent in parallel processing is the only way to reduce the makespan. This parallelization problem can be seed as a sub problem and will be explained in this chapter. A similar idea was used in Tian et al. [26] for parallel processor scheduling. In Figure 5 the graph representation G(R, E) of the parallelization problem for three chambers can be found. The vertices R represent the recipes and the edges E represent possible parallelizations. On the right hand side the parallelization opportunities for a given Cluster-tool i are illustrated. For instance, when considering the parallelizations with recipe C, then there are three possible candidates {A, B, AB}. Each of these options is reflected by a variable that defines the time used for this recipe combination, i.e. ξi,A,C , ξi,B,C and ξi,AB,C . Also note that the time invested in parallel processing is limited by the given values xj,i,r . For instance when considering ξi,AB,C two restrictions can be found: ξi,AB,C ≤ xi,AB and ξi,AB,CP+ ξi,A,C + ξi,B,C ≤ xi,C . According to that, a parallelization that maximizes (r1 ,r2 )∈E ξi,r1 ,r2 solves the sub-problem. The prallelization graph that considers four chambers is depicted in Figure 6 and the number of vertices is already twice as large. The graph is also not planar anymore, since it contains a K3,3 given by {A, B, AB} × {C, D, CD}. The general formulation of the corresponding sub problem for optimal parallelization is represented by the following LP: 3.1 An alternative modeling approach that exploits parallel processing xi,BC 10 xi,AD xi,ABCD xi,AC xi,ACD xi,ABC xi,B xi,D xi,CD xi,AB xi,A xi,C xi,BCD xi,ABD xi,BD Figure 6: Parallel processing for four chambers, graph representation G(R, E). max P r2 :(r,r2 )∈E P (r1 ,r2 )∈E ξi,r,r2 + ξi,r1 ,r2 P r1 :(r1 ,r)∈E ξi,r1 ,r ≤ xi,r ξi,r1 ,r2 ≥ 0 (10) (∀r ∈ R) (11) (∀(r1 , r2 ) ∈ E) (12) The sub-problem (10-12) be integrated in the master LP as follows: min ρ P (13) j∈J (14) i ∈ I, r ∈ R (15) i ∈ I, r ∈ R (16) i∈I (17) xj,i,r ≥ 0 (j, i, r) ∈ C (18) xi,r ≥ 0 i ∈ I, r ∈ R (19) i ∈ I, (r1 , r2 ) ∈ E (20) xj,i,r µj,i,r = λj i ∈ I, r ∈ R : (j, i, r) ∈ C P xi,r = j xj,i,r P P r2 :(r,r2 )∈E ξi,r,r2 + r :(r ,r)∈E ξi,r1 ,r ≤ xi,r P P 1 1 r∈R xi,r − (r1 ,r2 )∈E ξi,r1 ,r2 ≤ ρ ξi,r1 ,r2 ≥ 0 In order to count the number of variables xj,i,r , xi,r and ξi,r1 ,r2 it is sufficient to count the vertices and edges in the parallelization graph. Suppose that n chambers are available, then |R| = 2n − 1 recipes are available. There are  n k possibilities to choose a set of k chambers and each partition defines nonk conflicting recipe pair, that makes 2 2−2 (= 2k−1 − 1) edges. Therefore, the Pn n number of edges is |E| = k=0 (2k−1 − 1) = 3 2−1 − (2n − 1) in total. According n to that the coefficient matrix of (13-20) has 1+|C| + |I| 3 2−1 columns, |J| + |I|(1 + 2|R|) rows and 2|C| + |I|(1 + 3|R| + 2|E|) nonzeros. 3.2 Analysis of the parallelization problem 11 3.2. Analysis of the parallelization problem The second approach is based on investigating the dual of the sub-problem (10-12). The problem (10-12) can be represented by a max-flow problem which gives some insights about the structure of basic feasible solutions. The corresponding max-flow problem is defined as follows, the set of vertices e ∪ {s, t}, where R e and edges and the capacity limits are defined by: V = R ∪ R e is a copy of R. The arcs between R and R are a bipartite representation of E, together with the links to the source, and the links to the sink, the set of arcs e i.e Ee ={(r, re) ∈ R × R e : (r, re) ∈ E} ∪ {(s, r) : r∈ R} ∪ {(e is defined by E, r, t) : e The arc capacities are infinite for all arcs except the links to source re ∈ R}. and the links to the sink. In Figure 7 the max-flow version for three chambers e ∪ {s, t}, E) e is illustrated. The meaning is depicted where the graph G(R ∪ R of the flows ηi,r1 ,r˜2 and ηi,r2 ,r˜1 is directly linked to ξi,r1 ,r2 since the maximum flow formulation can be understood as a duplication of the original problem. The details will be elaborated in a transformation of the problem. Before that, the LP of the corresponding max-flow problem will be defined in (21-26). The objective (22) is to maximize the flow into the sink t. The constraints (22) and (23) represent the flow balance equations. The capacities on the arcs are formulated in (24) and (25). P e ηi,re,t (e r ,t)∈E P = ηi,s,r e ηi,r,e r e r : (r,e r )∈E P = ηi,e e ηi,r,e r r ,t r: (r,e r )∈E xi,r ηi,s,r ≤ 2 max ηi,e ≤ r ,t xi,r 2 ηi,e ≥ 0 (21) (∀r ∈ R) (22) e (∀e r ∈ R) (23) (∀r ∈ R) (24) (∀r ∈ R) (25) e (∀e ∈ E) (26) To see that the max-flow version is a suitable representation of the sub problem, a transformation of solutions will be established. If η is a feasible solution for (21-26), then ξ defined by ξi,r1 ,r2 ← ηi,r1 ,re2 + ηi,r2 ,re1 is a feasible solution for (10-12) and the objective value is the same. In order to prove this statement it is necessary to provePthat (11) is satisfied. The left hand side of (11) has the following form: r2 :(r,r2 )∈E (ηi,r,re2 + | {z } (i.1) (ii.1) (ii.2) P z }| { z }| { ηi,r2 ,e ) + r1 :(r1 ,r)∈E (ηi,r1 ,e + ηi,r,re1 ). Note that (r, r2 ) ∈ E is represented by r r | {z } (i.2) e Therefore the components (i.1) and (i.2) two arcs (r, r˜2 ) ∈ Ee and (r2 , r̃) ∈ E, can by P be combined andPbecause of (22,24) the P corresponding part is bounded xi,r η + η = η = η ≤ . Bei,s,r r2 :(r,r2 )∈E i,r,re2 r1 :(r1 ,r)∈E i,r,re1 2 e i,r,e r e r :(r,e r )∈E cause of (23,25) the part that corresponds to (ii.1) and (ii.2) is bounded by 3.2 Analysis of the parallelization problem ≤ s 12 ABC ] ABC AB g AB xi,AB 2 ≤ ηAB,Ce ηC,AB f AC g AC BC g BC C f C B f B A xi,AB 2 f A R t R̃ e ∪ {s, t}, Ee) of the maximum flow formulation of the Figure 7: Graph representation G(R ∪ R sub problem for three chambers. The flow can be interpreted as the time used for parallel processing: ξAB,C ← η +η . AB,C C,AB e f P P P ηi,r2 ,e + r1 :(r1 ,r)∈E ηi,r1 ,e = r:(r,e = ηi,e ≤ r r e ηi,r,e r r ,t r )∈E ξ is feasible for (10-12). r2 :(r,r2 )∈E xi,r 2 . Hence, The dual is therefore a min-cut problem and for the solution space it is sufficient to consider selecting arcs that are connected to the sink or to the source - these cuts are called basic cuts. In other words, for every cut it is possible to construct a basic cut that has a cut value that is smaller or equal. The formulation of the dual of the maximum flow formulation (21-26) can be found in (27-30). The dual variables are called πi,r and π ei,r . The constraint (28) reveals the vertex covering aspect of the problem. min P r∈R xi,r πi,r +e πi,r 2 πi,r1 + π ei,r2 ≥ 1 (27) ∀(r1 , re2 ) ∈ Ee (28) πi,r ≥ 0 ∀r ∈ R (29) π ei,r ≥ 0 ∀r ∈ R (30) This problem is totally uni-modular, because the columns can be partitioned according to the criterion proposed in Heller and Tompkins [13]. For the search space, it is sufficient to consider basic cuts. A basic cut B can e and be represented by the corresponding nodes that are selected, B ⊂ R ∪ R e each arc (r1 , re2 ) between R and R is covered by B to satisfy (28). Furthermore, 3.2 Analysis of the parallelization problem 13 it is sufficient to consider basic cut that cannot be reduced by eliminating a node, that means that by definition, removing one node of a minimal basic cut leads to an infeasible solution. e \ B) of a minimal basic cut is a maxTherefore the complement (B c = R ∪ R imum independent set. Efficient algorithm for listing all maximum independent sets are known (see Kashiwabara et al. [17]) and can be used to find all minimal basic cuts. k k Suppose that a listing {(πi,r ,π ei,r )}k∈K that represents all minimal basic cuts is given, then the optimal value for (27-30) corresponds to the cut value with the smallest value in the listing of all minimal basic cuts. k k )}k∈K are given, then the ,π ei,r Suppose that all minimal basic cuts {(πi,r   k k P πi,r +e πi,r smallest value r∈R xi,r defines the optimum. 2 In order to remove  symmetric solutions,  the solutions will be identified by k k πi,r +e πi,r , hence the optimum is defined by vectors (Πi,r,k ) where Πi,r,k ← 2 P mink r∈R xi,r Πi,r,k . The minimum of a set of numbers is defined as the largest lower bound of these numbers, therefore the optimum can be represented by the LP formulated in (31-32), where constraint (32) ensures that χ is a lower bound of the cut values and the objective (31) defines that χ is the largest lower bound: max χ χ≤ P r∈R xi,r Πi,r,k (31) ∀k ∈ K (32) Therefore the shortest possible makespan for given xi,r can be obtained by P changing the the objective (32) to min x r∈R i,r − χ. A substitution of χ with P ρ ← r∈R xi,r − χ in (33-32) leads to the following equivalent LP: ρ min P r∈R (33) (1 − Πi,r,k ) xi,r ≤ ρ ∀k ∈ K (34) The new formulation of the sub problem will be integrated in the master problem (13-20) by replacing the constraints (17,16) with (34). The resulting master LP is formulated in (3540): min ρ P (35) j∈J (36) i ∈ I, r ∈ R (37) − Πi,r,k )xi,r ≤ ρ i ∈ I, k ∈ K (38) xj,i ≥ 0 i ∈ I, r ∈ R (39) xj,i,r ≥ 0 (j, i, r) ∈ C (40) xj,i,r µj,i,r = λj i ∈ I, r ∈ R : (j, i, r) ∈ C xi,r = P r∈R (1 P j xj,i,r 14 The problem (27-30) can be interpreted as a relaxation of the vertex cover problem, therefore the basic solutions are half integral (compare Hochbaum [14], type 2var). If the number of chambers is fixed, the coefficients (1 − Πi,r,k ) only depend on the number of chambers, therefore a representation by a R × K matrix 1−Π = (1−Πr,k ) can be used. In order to reduce the size of the matrix, all rows of 1 − Π that are redundant will be removed. The details to the corresponding Algorithm can be found in AppendixA. For three chambers the model (3540) coincides with the model presented in Ortner [21] (compare (6-9)) and the matrix (1 − Π) is equivalent to the matrix presented in Table 1. Therefore, the presented methodology replaces (6-9) and provides an alternative to the elementary proof given in Ortner [21]. More importantly, the approach reveals a generalization of the model in Ortner [21] to more than three chambers. For instance, the matrix for four chambers is given in Table 2. Note that line 1 corresponds to complete parallelization, while line 8 corresponds to the sum of all recipes that contain A and line 12 corresponds to chamber B, line 18 represents the utilization for chamber C and line 23 represents the utilization for chamber D. Note that the coeffin cient matrix of (3540) has 1+|C| + |I| 3 2−1 columns, |J| + |I|(|R| + |K|) rows and 2|C| + |I|(|R| + 1 + |K| + |1 − Π|) nonzeros, where |1 − Π| denotes the number of nonzeros in (1 − Πi,r,k ). Known values for |K| and |1 − Π| can be found in Table 4. According to that, the generalized model for five chamber is already getting fairly large. In the next section a computational experiment will be used to compare the new approach and the generalized model. 4. Computational Experiments In this Section the computational results for the generalized formulation (35-40) and the alternative model (13-20) for the a large set of benchmark instances (http://www.univie.ac.at/prolog/research/Clustertool/) is presented. The instances were solved with Gurobi 6.0 on a desktop computer with a [email protected] GHz processor. The structure of the generalized formulation (13-20) seems to be much simpler than the alternative model (35-40), but especially for more than three chambers the coefficient matrix of the generalized formulation tends to grow faster and therefore it is interesting to examine which model performs better. The size of the problems is indicated in Table 5 and Table 7, where the number of nonzero entries in the coefficient matrix of the alternative model and the scaling factor for the generalized model are documented (all chamber released). The number of nonzeros of the coefficient matrix for the generalized model is nonzerogen = 2|C|+|I|(|R|+1+|K|+|Π|) and the for the alternative formulation it is nonzeroalt = 2|C| + |I|(1 + 3|R| + 2|E|) . Therefore the difference of the δ =nonzerogen − nonzeroalt can be calculated as follows: δ = |I|(|K| + |Π| − 2(|R| + |E|)) = |I|(1 + |K| + |Π| − 3n ) 15 Table 2: Matrix B for the dual based model (6-9) when considering four chambers. A AB ABC ABCD ABD AC ACD AD B BC BCD BD C CD D 1 0.5 0.5 0.5 1 0.5 0.5 0.5 0.5 0.5 0.5 0.5 0.5 0.5 0.5 0.5 2 0.5 0.5 1 1 0.5 0.5 0.5 0.5 0.5 0.5 0.5 0.5 0.5 0.5 3 0.5 0.5 0.5 1 1 0.5 0.5 0.5 0.5 0.5 0.5 0.5 0.5 4 0.5 0.5 1 1 1 0.5 0.5 0.5 0.5 0.5 0.5 0.5 0.5 5 0.5 0.5 0.5 1 0.5 0.5 1 0.5 0.5 0.5 0.5 0.5 0.5 6 0.5 0.5 1 1 0.5 0.5 1 0.5 0.5 0.5 0.5 0.5 0.5 7 0.5 0.5 0.5 1 1 0.5 1 0.5 0.5 0.5 0.5 8 1 1 1 1 1 1 1 1 9 0.5 0.5 1 0.5 0.5 0.5 0.5 0.5 0.5 1 0.5 10 0.5 1 1 0.5 0.5 0.5 0.5 0.5 0.5 1 0.5 11 0.5 0.5 1 1 0.5 0.5 0.5 0.5 0.5 1 0.5 12 1 1 1 1 1 1 1 1 13 0.5 0.5 1 0.5 0.5 1 0.5 1 0.5 14 1 1 1 1 1 1 1 1 15 1 1 1 1 1 1 16 1 1 1 1 1 17 1 1 1 1 1 18 1 1 19 1 1 20 1 21 22 23 0.5 1 0.5 0.5 0.5 0.5 0.5 0.5 0.5 0.5 0.5 0.5 0.5 0.5 0.5 0.5 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 Table 4: Known values for |K| and |1 − Π| |K| |1 − Π| n=1 1 1 2 2 4 3 5 22 4 23 245 5 590 13740 Table 5: Number of nonzero entries in the coefficient matrix of the alternative model; unit: thousands. three chambers four chambers five chambers density shape sizecat=0 1 2 3 0 1 2 3 0 1 2 3 1:1 3.4 11.3 40.9 156.8 8.0 25.7 90.6 341.7 18.9 57.7 196.3 724.4 1:4 2.2 8.7 32.9 123.7 5.1 19.4 71.8 267.9 11.6 42.4 153.0 562.8 1 16:1 6.2 17.2 54.1 188.2 16.1 42.5 127.3 425.8 42.5 106.0 299.5 953.0 4:1 4.4 13.8 46.7 171.7 10.8 32.3 105.8 379.2 26.8 75.9 236.9 820.2 1:1 4.3 15.3 59.2 232.5 9.9 34.2 129.8 504.0 22.7 75.3 277.3 1059.7 1:4 3.0 10.7 42.2 165.5 6.9 23.6 91.9 357.5 15.3 51.1 194.5 747.9 2 16:1 7.0 21.0 74.0 271.4 17.9 50.6 169.9 604.1 46.0 122.8 387.6 1321.4 4:1 5.3 18.4 66.6 256.1 12.7 42.2 148.3 560.0 30.7 96.3 324.8 1193.8 1:1 4.5 17.4 68.7 271.7 10.4 38.7 149.9 587.8 23.8 84.6 319.0 1233.0 1:4 3.2 11.5 46.0 181.4 7.2 25.4 99.9 391.4 16.1 54.8 211.0 818.1 3 16:1 7.1 23.9 85.4 318.7 18.0 56.8 194.4 705.4 46.4 135.6 438.2 1530.8 4:1 5.8 20.3 78.4 302.7 13.8 46.3 173.6 659.9 33.0 104.8 376.9 1400.2 16 Table 7: Scaling factor for nonzero entries in the coefficient matrix of the generalized model relative to alternative model. An entry of 2 means that the number of nonzero elements is twice as large. three chambers four chambers five chambers density shape sizecat=0 1 2 3 0 1 2 3 0 1 2 3 1:1 1.01 1.00 1.00 1.00 1.47 1.29 1.17 1.09 15.93 10.76 6.74 4.11 1:4 1.00 1.00 1.00 1.00 1.38 1.22 1.12 1.06 13.44 8.49 5.06 3.13 1 16:1 1.00 1.00 1.00 1.00 1.36 1.19 1.10 1.05 12.85 7.66 4.53 2.83 4:1 1.00 1.00 1.00 1.00 1.37 1.19 1.10 1.06 13.17 7.64 4.68 3.00 1:1 1.00 1.00 1.00 1.00 1.27 1.16 1.08 1.04 10.21 6.52 3.90 2.51 1:4 1.00 1.00 1.00 1.00 1.26 1.15 1.08 1.04 9.75 6.14 3.67 2.38 2 16:1 1.01 1.01 1.01 1.00 1.93 1.71 1.47 1.28 27.55 22.26 16.05 10.46 4:1 1.01 1.01 1.00 1.00 1.84 1.59 1.35 1.20 25.48 19.35 12.63 7.82 1:1 1.01 1.01 1.00 1.00 1.83 1.53 1.31 1.17 25.31 17.63 11.29 6.89 1:4 1.01 1.01 1.00 1.00 1.70 1.47 1.28 1.16 22.00 15.86 10.51 6.50 3 16:1 1.01 1.00 1.00 1.00 1.59 1.36 1.20 1.11 19.33 12.70 7.94 4.78 4:1 1.01 1.00 1.00 1.00 1.55 1.32 1.17 1.09 18.09 11.76 6.98 4.22 Table 9: Auxiliary parameters δn and γn for calculating δ = nonzerosgen − nonzerosalt = |I|δn and nonzeroalt = 2|C| + |I|γn . n=1 2 3 4 5 γn = δn 3n+1 −2n+1 +1 2 0 -2 1 188 14088 3 10 33 106 333 17 In Table 9 some values for δ |I| can be found. The instances that were used in the computational experiment vary in size and structure and the following four factors were controlling the construction: • sizecat {0, 1, 2, 3} where, |I| · |J| = 100 · 4sizecat = 400,1600, 6400, 25600 • shape {1 : 4, 1 : 1, 4 : 1, 8 : 1} where |I| : |J| = shape, the proportion of tools and jobs • locked {0, 3, 6, 9} is the probability that a chamber is not available. locked chambers: locked 10 • density {1,2,3} 1=sparse, 2=medium, 3=dense For the three chamber model, the corresponding instances have up to 300.000 nonzeros and for four chamber up to 700.000 nonzeros for the case where all chambers are available. According to Table 10 the alternative model is significantly faster for four chambers, but in average slower for three chambers. 18 Table 10: Speedup factor for alternative model versus generalized model (detailed results). The bold entries represent cases were the generalized model is faster. three chambers four chambers sizecat shape density locked=0 3 6 9 avg locked=0 3 6 9 avg 1 0.84 0.82 0.88 0.8 0.84 1.25 1.12 0.83 1.11 1.08 1:4 2 1.07 0.81 0.61 0.93 0.86 1.2 1.15 1.33 1.18 1.22 3 0.83 0.85 0.91 0.93 0.88 1.2 1.21 1.27 1.22 1.23 1 0.97 0.83 0.8 0.86 0.87 0.92 0.82 0.71 1.22 0.92 1:1 2 0.79 0.97 0.88 0.9 0.89 1.11 1.12 1.23 1.14 1.15 3 0.86 0.9 0.92 0.82 0.88 0.93 1.1 1.09 1.16 1.07 0 1 0.67 0.65 0.81 0.68 0.7 0.66 0.79 0.82 0.8 0.77 4:1 2 0.96 0.73 0.77 0.76 0.81 0.77 0.82 0.82 0.93 0.84 3 0.83 0.74 0.77 0.71 0.76 0.82 0.8 0.83 0.9 0.84 1 0.72 0.6 0.63 0.51 0.62 0.74 0.6 0.58 0.59 0.63 16:1 2 0.63 0.58 0.65 0.68 0.64 0.78 0.72 0.6 0.67 0.69 3 0.6 0.58 0.59 0.52 0.57 0.81 0.71 0.66 0.69 0.72 1 0.98 0.84 0.83 0.78 0.86 1.63 1.33 1.37 1.48 1.45 1:4 2 0.89 0.91 0.96 0.96 0.93 2.29 1.73 1.62 1.61 1.81 3 0.76 0.75 0.94 0.97 0.86 1.89 1.78 1.52 1.6 1.7 1 1.08 0.92 1.02 0.85 0.97 1.43 1.43 1.42 1.34 1.41 1:1 2 1.11 0.82 1.09 1.01 1.01 1.53 1.48 1.44 1.43 1.47 3 1.11 1.07 1.1 1.73 1.25 1.83 1.43 1.46 1.42 1.54 1 1 0.8 0.7 0.84 0.62 0.74 1.22 1.07 0.98 1.11 1.1 4:1 2 1.21 0.54 1.15 0.86 0.94 1.52 1.41 1.21 1.22 1.34 3 1.18 0.8 0.86 0.79 0.91 1.49 1.49 1.24 1.38 1.4 1 0.66 0.57 0.71 0.68 0.66 0.99 1.04 0.83 0.84 0.96 16:1 2 0.68 0.6 0.48 0.72 0.62 1.29 1.27 1.12 0.94 1.16 3 0.74 0.51 0.7 0.76 0.68 1.26 1.27 1.14 1.07 1.19 1 0.91 0.97 0.74 1.02 0.91 2.05 2.32 1.92 1.82 2.03 1:4 2 1.08 1.06 0.98 0.96 1.02 2.22 2.02 2.03 2.05 2.08 3 1.06 1.09 1.06 1.09 1.08 2.04 2.02 1.87 1.98 1.98 1 1.3 1.13 0.95 1.29 1.17 2.35 1.68 1.81 1.62 1.87 1:1 2 1.19 1.09 1.22 1.05 1.14 2.08 2.35 1.94 1.8 2.04 3 1.26 1.4 1.11 1.05 1.21 1.87 1.9 1.84 1.94 1.89 2 1 0.95 0.89 0.88 0.92 0.91 1.69 1.78 1.66 1.53 1.67 4:1 2 1 0.91 0.89 0.93 0.93 1.68 1.7 1.83 1.7 1.73 3 2.43 0.99 0.94 1 1.34 1.82 1.76 1.78 1.69 1.76 1 0.74 0.78 0.75 0.98 0.81 1.44 1.72 1.41 1.27 1.46 16:1 2 0.84 0.82 0.83 0.85 0.84 1.5 1.71 1.63 1.51 1.59 3 0.85 0.8 0.89 0.96 0.88 1.48 1.67 1.68 1.53 1.59 1 1.41 1.02 1.19 1.19 1.34 2.5 2.44 2.17 2 2.28 1:4 2 1.24 1.16 1.1 0.94 1.11 2.41 2.42 2.74 2.23 2.45 3 1.22 1.1 0.99 1.2 1.13 2.33 2.2 2.93 2.1 2.39 1 1.77 1.32 1.05 1.07 1.3 1.82 2.26 2.04 1.94 2.02 1:1 2 1.28 1.48 1.33 1.05 1.29 2.94 2.24 2.13 2.11 2.36 3 1.33 1.31 1.32 1.09 1.26 3.09 3.52 2.21 2.11 2.73 3 1 1.08 0.92 0.95 1.01 0.99 1.7 1.81 1.87 1.82 1.8 4:1 2 1.04 0.92 1 1.03 1 1.85 2 1.91 1.87 1.91 3 2.7 1.11 1 1.1 1.48 2.03 1.91 1.82 1.96 1.93 1 1.03 0.83 0.89 0.92 0.92 1.63 1.91 1.88 1.62 1.76 16:1 2 1.02 0.94 0.92 1.01 0.97 1.7 1.7 1.94 1.74 1.77 3 1.16 0.91 0.95 0.99 1 1.63 1.64 1.88 1.79 1.74 avg 1.11 0.9 0.91 0.93 0.97 1.55 1.59 1.52 1.47 1.54 19 Table 12: CPU time in milliseconds. three sizecat shape density locked=0 3 1 25 28 1:4 2 30 36 3 29 33 1 36 36 1:1 2 39 36 3 37 42 0 1 48 49 4:1 2 47 49 3 58 53 1 64 84 16:1 2 63 71 3 70 73 1 60 68 1:4 2 76 79 3 96 101 1 73 95 1:1 2 84 132 3 98 118 1 1 106 124 4:1 2 122 219 3 129 147 1 144 184 16:1 2 155 199 3 170 284 1 230 234 1:4 2 237 269 3 268 316 1 237 271 1:1 2 349 380 3 366 454 2 1 306 325 4:1 2 414 462 3 482 504 1 423 417 16:1 2 516 532 3 600 636 1 844.5 920 1:4 2 893 1171 3 1000 1270 1 783 1106 1:1 2 1498 1533 3 1749 2017 3 1 1097 1339 4:1 2 1751 2012 3 1823 2184 1 1216 1450 16:1 2 1820 2002 3 1998 2465 chambers 6 9 25 25 41 27 32 30 35 35 42 39 38 40 47 47 48 50 53 56 65 83 68 65 70 77 70 86 74 72 89 79 88 88 99 100 114 135 111 130 127 130 139 158 158 155 244 164 194 176 301 219 284 286 297 282 275 263 366 353 438 418 346 343 490 437 519 487 435 377 527 502 579 568 799 798 1048 1194 1318 1110 1010 932 1567 1470 1888 1705 1170 1077 1744 1632 2162 1816 1348 1229 1976 1715 2271 2057 four chambers avg locked=0 3 6 9 25.75 48 41 48 35 33.50 60 60 55 55 31.00 70 66 59 58 35.50 72 85 95 67 39.00 97 82 80 80 39.25 109 94 90 83 47.75 129 138 107 98 48.50 149 144 131 115 55.00 164 158 145 127 74.00 219 233 203 169 66.75 230 249 238 192 72.50 241 263 245 190 71.00 166 175 153 128 75.25 175 200 181 159 91.25 190 213 202 174 86.00 221 225 206 185 103.75 267 285 262 243 116.25 273 319 313 275 117.75 301 329 333 282 149.50 372 376 378 343 143.25 395 381 418 407 160.25 615 513 507 459 190.50 538 549 552 533 206.00 583 606 586 542 246.00 498 491 518 468 269.00 643 717 663 585 290.75 727 778 734 620 261.50 581 801 693 627 362.00 1015 1010 940 849 419.00 1213 1226 1098 969 330.00 904 907 888 802 450.75 1428 1408 1189 1063 498.00 1460 1639 1398 1214 413.00 1467 1347 1242 1111 519.25 2049 1731 1540 1342 595.75 2373 2030 1731 1556 843.23 2574 2330 1912 1655 1076.50 3771 3387 2693 2244 1174.50 4066 3881 2970 2481 957.75 4401 3155 2750 2228 1517.00 6157 5217 3992 3243 1839.75 6818 5885 4755 3793 1170.75 5851 4490 3302 2538 1784.75 8029 6460 4972 3733 1996.25 8498 7921 6246 4475 1310.75 6815 4901 3794 3274 1878.25 10745 8655 5332 4430 2197.75 12061 10248 6514 5102 avg 43.00 57.50 63.25 79.75 84.75 94.00 118.00 134.75 148.50 206.00 227.25 234.75 155.50 178.75 194.75 209.25 264.25 295.00 311.25 367.25 400.25 574.33 543.00 579.25 493.75 652.00 714.75 675.50 953.50 1126.50 875.25 1272.00 1427.75 1291.75 1665.50 1922.50 2117.75 3023.75 3349.50 3133.50 4652.25 5312.75 4045.25 5798.50 6785.00 4696.00 7290.50 8481.25 20 5. Summary The paper proposes a new model for representing Cluster-Tools with two load locks and provides generalization of an existing Cluster-Tool model Ortner [21] that was restricted to three chambers. A computational study indicates that on average the generalized model for three chambers is a little faster than the new model proposed in this paper, but for several instances the proposed alternative model seems to have small but significant benefits. For four chambers, the new model performs significantly better than the generalized model. Except for very small instances, the new model out-performs the generalized one. Our future research will consider Cluster-tools with more than two load locks and we will investigate the impact of conflicting recipes. We will also work on sensitivity analysis and robustness with respect to recipe combinations and availability. References [1] Almeder, C., Preusser, M., Hartl, R. F., 2009. Simulation and optimization of supply chains: alternative or complementary approaches? OR spectrum 31 (1), 95–119. [2] Chazelle, B., 1993. An optimal convex hull algorithm in any fixed dimension. Discrete & Computational Geometry 10 (4), 377–409. [3] Christopher, J., 2008. Study of optimal load lock dedication for cluster tools. In: Proceedings of the 40th Conference on Winter Simulation. Winter Simulation Conference, pp. 2136–2140. [4] Doleschal, D., Weigert, G., Klemmt, A., Lehmann, F., 2013. Advanced secondary resource control in semiconductor lithography areas: from theory to practice. In: Proceedings of the 2013 Winter Simulation Conference: Simulation: Making Decisions in a Complex World. IEEE Press, pp. 3879– 3890. [5] Duemmler, M., Wohlleben, J., 2012. A framework for effective wip flow management in semiconductor frontend fabs. In: Simulation Conference (WSC), Proceedings of the 2012 Winter. IEEE, pp. 1–6. [6] Franssila, S., 2010. Introduction to microfabrication. John Wiley & Sons. [7] Gale, D., 1989. The theory of linear economic models. University of Chicago press. [8] Gansterer, M., Almeder, C., Hartl, R. F., 2014. Simulation-based optimization methods for setting production planning parameters. International Journal of Production Economics 151, 206–213. 21 [9] Gold, H., 2004. Dynamic optimization of routing in a semiconductor manufacturing plant. In: Hein Fleuren, Dick den Hertog, P. K. (Ed.), Operations research proceedings 2004: selected papers of the annual international conference of the German Operations Research Society (GOR); jointly organized with the Netherlands Society for Operations Research (NGB). German Operations Research Society (GOR) and the Netherlands Society for Operations Research (NGB), Tilburg, The Netherlands, pp. 76–83. [10] Gold, H., 2008. Lastverbund, european patent ep1567921. [11] Ham, M., Lee, Y. H., Fowler, J. W., 2009. Integer programming-based real-time scheduler in semiconductor manufacturing. In: Winter Simulation Conference. Winter Simulation Conference, pp. 1657–1666. [12] Harrison, J. M., Lopez, M. J., 1999. Heavy traffic resource pooling in parallel-server systems. Queueing Systems 33, 339–368. [13] Heller, I., Tompkins, C., 1956. An extension of a theorem of Dantzig’s. Linear inequalities and related systems 38, 247–254. [14] Hochbaum, D. S., 1996. Approximating covering and packing problems: set cover, vertex cover, independent set, and related problems. In: Approximation algorithms for NP-hard problems. PWS Publishing Co., pp. 94–143. [15] Hutcheson, J. D., 2000. Introduction to semiconductor equipment. Handbook of Semiconductor Manufacturing Technology, 23–33. [16] Juan, A. A., Faulin, J., Grasman, S. E., Rabe, M., Figueira, G., 2015. A review of simheuristics: Extending metaheuristics to deal with stochastic combinatorial optimization problems. Operations Research Perspectives 2, 62–72. [17] Kashiwabara, T., Masuda, S., Nakajima, K., Fujisawa, T., 1992. Generation of maximum independent sets of a bipartite graph and maximum cliques of a circular-arc graph. Journal of Algorithms 13 (1), 161–174. [18] Lopez, M. J., Wood, S. C., 2003. Systems of multiple cluster tools: Configuration, reliability, and performance: Single-wafer manufacturing in the nanochip era. IEEE transactions on semiconductor manufacturing 16 (2), 170–178. [19] Mönch, L., Fowler, J. W., Dauzère-Pérès, S., Mason, S. J., Rose, O., 2011. A survey of problems, solution techniques, and future challenges in scheduling semiconductor manufacturing operations. Journal of Scheduling 14 (6), 583–599. [20] Ogryczak, W., 1997. On the lexicographic minimax approach to location problems. European Journal of Operational Research 100 (3), 566–585. 22 [21] Ortner, A. M., 2008. capacity planning for cluster tools - a mathematical model that reflects scheduling for parallel processing with two loadlocks. Master thesis, Alpen-Adria-Universität Klagenfurt, Klangenfurt, Austria. [22] Ponsignon, T., Mönch, L., 2012. Heuristic approaches for master planning in semiconductor manufacturing. Computers & Operations Research 39 (3), 479–491. [23] Romauch, M., Klemmt, A., 2015. Product mix optimization for a semiconductor fab: Modeling approaches and decomposition techniques. Computers & Operations Research 53, 338 – 352. URL http://www.sciencedirect.com/science/article/pii/ S0305054814001087 [24] Sorenson, C. T., 1999. Basic principles of semiconductor manufacturing. Microelectronics Manufacturing and the Environment Course Materials, http://www.erc.arizona.edu/education/mme%20course% 20materials/MME%20Modules/Manufacturing%20Module/ Manufac%20Overview.ppt, accessed: 2016-04-07. [25] Thiesse, F., Fleisch, E., 2008. On the value of location information to lot scheduling in complex manufacturing processes. International Journal of Production Economics 112 (2), 532–547. [26] Tian, K., Jiang, Y., Shen, X., 2009. A study on optimally co-scheduling jobs of different lengths on chip multiprocessors. In: Proceedings of the 6th ACM Conference on Computing Frontiers. CF ’09. ACM, New York, NY, USA, pp. 41–50. URL http://doi.acm.org/10.1145/1531743.1531752 AppendixA. Algorithm to find a minimal representation for the dual based model With respect to (6-9) it is important to keep the set K as small as possible. Therefore, the concept of redundant vectors (redundant minimal basic cuts) will be introduced and different criteria for redundancy will be stated and proven. According to (38), vectors Πk := (Πr,k ) ∈ RR are used as a lower bound on ρ, i.e. h1 − Πk , xi ≤ ρ. Suppose for two vectors Πk , Πk0 the following condition true: h1 − Πk , xi ≤ h1 − Πk0 , xi ≤ ρ. Then Πk0 dominates Πk and Πk can be removed. The condition can be reformulated to hΠ, xi ≥ hΠk0 , xi and leads to the following more general definition of redundancy: Definition 2. Assuming that a set A of m vectors, A = {a1 , a2 . . . , am } with ai ∈ Rn and ai ≥ 0 is given. Then a vector b is called redundant if the following is true: ∀x ≥ 0 : hb, xi ≥ mini hai , xi 23 Or, in other words b is called redundant if ∀x ≥ 0∃i : hb, xi ≥ hai , xi. Note, that it is sufficient to consider vectors x of unit length, therefore b is called redundant if: ∀x ≥ 0, kxk = 1∃i : hb, xi ≥ hai , xi ⇔ ∀x ≥ 0, kxk = 1∃i : h1 − b, xi ≤ h1 − ai , xi ⇔ ∀x ≥ 0, kxk = 1∃i : kh1 − b, xi xk ≤ kh1 − ai , xi xk Geometrically, h1 − b, xi x can be interpreted as the projection of 1 − b on x. Also note that i i h1 − b, xi x − 1−b = 1−b and h1 − ai , xi x − 1−a = 1−a for kxk = 2 2 2 2 1, therefore the statement is equivalent to: S i U +1−b ( 1−b ) ⊂ i U +1−ai ( 1−a ) 2 k 2 k k 2 k 2 where U+ (b) = {x ∈ Rn : x ≥ 0, kx − bk ≤ }. Figure A.8 depicts an example in three dimensions. If the sphere U +1−b ( 1−b ) k 2 k 2 S + i is contained in i U 1−ai ( 1−a ) then b is redundant. The geometric interprek 2 k 2 tation can be used to compute if a vector b is redundant or not: ) defines If b is not redundant, then some part of the boundary of U +1−b ( 1−b k 2 k 2 S + i the boundary of the union of spheres i U 1−ai ( 1−a ). The boundary of the k 2 k 2 S + 1−ai union of spheres i U 1−ai ( 2 ) can be described by transformed facets like k 2 k in Figure A.8 where the white region is touching three neighboring regions. If it is possible to find two facets that belong to two spheres (i, j) that are neighboring to the sphere U +1−b ( 1−b ), then a hyperplane Hij exists that contains k 2 k 2 the intersection of the boundaries of the spheres (in 3d it contains a circle). Furthermore, if b is not redundant this hyperplane has a nonempty intersection with the facet that corresponds to b. Therefore, a vector can be found that is on the hyperplane and outside the union. If no such two spheres can be found then the dominating part of the region intersects with at least one of the hyperplanes that are defined by xi = 0. Therefore, b is not redundant if: S i U +1−b ( 1−b )|Hij 6⊂ i U +1−ai ( 1−a )| or 2 k 2 k k 2 k 2 Hij S i U +1−b ( 1−b )| 6⊂ i U +1−ai ( 1−a )| k 2 k 2 xi =0 k 2 k 2 xi =0 The dimension of the corresponding sub problems is n − 1, the method can be reapplied until the dimension of all subproblems is one. Note that if b i is not redundant then it is possible to identify one or more spheres U +1−ai ( 1−a ) k 2 k 2 that contain b, the set of the corresponding indices is called M , and M 6= ∅, otherwise it is trivial that b is not redundant. Also suppose that U +1−b ( 1−b ) is k 2 k 2 i not fully contained in one of the U +1−ai ( 1−a ) (i ∈ M ), otherwise b is clearly k 2 k 2 dominated. For the procedure it is not necessary to consider all possible Hij , it is sufficient to assume that i ∈ M . The corresponding procedure is not very effective and the worst case time complexity is larger than O(mn ). 24 In the following, an alternative method, that is based on convex hulls is presented: Proposition 3. criterion for redundancy: A vector b is redundant with respect to a set of vectors {ai }, if and only if it is contained in the convex hull h{ai }i. Proof. the negation redundancy is the following: ∃x ≥ 0 ∀i : hb, xi > hai , xi ∃x ≥ 0 ∀i : hb − ai , xi > 0 (A.1) According to Gale [7] (Theorem 2.10, p. 49, which is a corollary of Farkas’ Lemma) the corresponding elimination criterion has the form: ∃λ ≥ 0(λ 6= 0) It is also possible to assume that ∃λi > 0 P i6=j P i6=j b≤ λi (b − ai ) ≤ 0 λi = 1 and therefore: P i6=j λi ai This condition states that b is contained in the convex hull of {ai }i6=j . Therefore the problem is solvable by calculating the convex hull; and according to n Chazelle [2], the convex hull is computable in O(m log(m) + m 2 ) time. A further alternative that avoids the calculation of the convex hull ( see Chazelle [2]) is presented in the following proposition. Among the presented methods it is the most efficient one. Proposition 4. criterion for redundancy: A vector b is redundant if and only if the following LP is infeasible. min 1t x (b − ai )t x ≥ 1 ∀i (A.2) x≥0 Proof. ⇒: A feasible solution x of the LP also satisfies (A.1) and therefore the vector b is redundant - the objective is irrelevant. ⇒: On the other hand, b is redundant and satisfies (A.1), therefore a vector x0 and a positive number  > 0 exist such that (b − ai )t x > . Hence, x is a feasible solution of the LP and the proof is complete. The complexity is defined by the complexity of linear programming algorithms. Algorithms with O(n3 L) are known, where L is the bit length of the input data. 25 Figure A.8: A three dimensional example with four vectors, where the corresponding set of vectors that is non-dominating is represented by the union of spheres. cut A e B, e AB} g Π1 : {A, B, AB, A, 1 e B, e C} e Π2 : {A, B, C, A, 1 e e Π3 : {A, B, C, AB, A, B} 1 1 (Π + Π ) : 1 1 2 2 B 1 1 1 1 C AB 1 AC BC 1 1 2 1 2 1 2 1 2 Table A.14: minimal basic cuts and redundancy Definition 5. Note, that a set of vectors A = {ai ∈ [0, ∞)n } is called minimal if none of its members is redundant with respect to A \ {ai }, more precisely: ∀j∃x ≥ 0 ∀i 6= j : aj t x < ati x. Finally, to show that not all minimal basic cuts are needed in the LP formulation, a simple example that considers three chambers is presented: Example 6. For three chamber, Table A.14 lists three of the minimal basic cuts, named Π1 , Π2 , Π3 . Obviously, Π3 = 21 Π1 + 12 Π2 , therefore the criterion formulated in Proposition 3 shows that Π3 is redundant with respect to {Π1 , Π2 }.
8cs.DS
Hierarchical Actor-Critic Andrew Levy 1 Robert Platt 2 Kate Saenko 1 arXiv:1712.00948v3 [cs.AI] 28 Feb 2018 Abstract The ability to learn at different resolutions in time may help overcome one of the main challenges in deep reinforcement learning — sample efficiency. Hierarchical agents that operate at different levels of temporal abstraction can learn tasks more quickly because they can divide the work of learning behaviors among multiple policies and can also explore the environment at a higher level. In this paper, we present a novel approach to hierarchical reinforcement learning called Hierarchical Actor-Critic (HAC) that enables agents to learn to break down problems involving continuous action spaces into simpler subproblems belonging to different time scales. HAC has two key advantages over most existing hierarchical learning methods: (i) the potential for faster learning as agents learn short policies at each level of the hierarchy and (ii) an end-to-end approach. We demonstrate that HAC significantly accelerates learning in a series of tasks that require behavior over a relatively long time horizon and involve sparse rewards. 1. Introduction Despite major successes in both simulated and real-world tasks, a key problem with many deep reinforcement learning (RL) algorithms is that they are slow. Learning is particularly slow when the rewards granted to agents are sparse. One major reason for reinforcement learning’s poor sample efficiency is that many existing algorithms force agents to learn at the lowest level of temporal abstraction. For instance, if a simulated robot agent is given a task involving locomotion, the agent will need to learn the entire sequence of joint torques to accomplish the task (Lillicrap et al., 2015) instead of trying to break the problem down at a higher level. Learning exclusively at low levels of abstraction slows down learning for two key reasons. First, agents must learn longer sequences of actions in order to achieve the desired behavior. This is problematic because policies involving longer 1 Department of Computer Science, Boston University, Boston, MA, USA 2 College of Information and Computer Science, Northeastern University, Boston, MA, USA. sequences of actions are more difficult to learn, particularly when rewards are sparse. The process of propagating back Q-values from the actions that produce the sparse reward to the preceding actions takes longer. The issue of long-term credit assignment also becomes more severe as the actionvalue function needs to learn Q-values for a larger portion of the state-action space. Second, learning at the lowest level restrains exploration. Agents that can propose higher level subgoals can more quickly determine the distant states that are helpful in achieving certain behavior goals. A faster exploration of the state space of the environment may speed up the process of learning a robust policy. Yet most existing hierarchical RL methods do not provide an approach for breaking down tasks involving continuous action spaces that guarantees shorter policies at each level of abstraction and is end-to-end. Most current hierarchical approaches only enable agents to learn at higher levels if the action space is discrete (Dayan & Hinton, 1993) (Vezhnevets et al., 2017). Further, many existing hierarchical learning approaches do not implement hierarchical agents that equitably divide up the work of learning a behavior among the agent’s multiple policies. For instance, many approaches choose to decompose problems into smaller state spaces rather than into smaller time scales (Dayan & Hinton, 1993). This can be problematic in continuous action space environments as a policy that acts within a small region of the state space may need a lengthy sequence of actions to escape that region. Most existing hierarchical approaches also require non-trivial manual work including designing non-sparse reward functions, preselecting the set of possible higher level subgoals rather than learning them from experience, and staggering the training of different policies (Sutton et al., 1999) (Kulkarni et al., 2016). In this paper, we introduce a novel approach to hierarchical reinforcement learning called Hierarchical Actor-Critic (HAC). The algorithm enables agents to learn to divide tasks involving continuous state and action spaces into simpler problems belonging to different time scales. HAC achieves this objective by implementing agents that learn multiple policies in parallel. Each successive policy in the hierarchy is responsible for learning how to break down problems into subproblems with increasingly fine time resolutions. Figure 1 should provide some intuition on how HAC agents learn at different time scales. The figure shows an agent Hierarchical Actor-Critic Start Goal High-Level Policy Goal Mid-Level Policy action. Each goal-based actor network learns limited length policies that operate at different time resolutions due to a critical feature of the algorithm — time limits. Each actor network has only a certain number of actions to achieve its higher level input goal. Section 3 explains how time limits enable each actor network to specialize in a different time scale. Another key advantage of HAC is that it provides an end-toend hierarchical learning approach. HAC learns to separate goals into subgoals using just the agent’s experience and the algorithm only requires sparse reward functions. The hierarchical policies are also learned in parallel and do not need to be learned in different phases. Goal Low-Level Policy Time Figure 1. Example HAC Hierarchy. Agent in figure uses three policies to learn a behavior. Each policy specializes in breaking down problems into subproblems with finer time resolutions. that uses three policies to accomplish some behavior. The solid vertical lines represent the time resolutions of subgoals output by each policy. The more distance there is between consecutive vertical lines, the more time the agent has to achieve each subgoal. The low-level policy outputs actual agent actions so the vertical lines for the low-level policy can be interpreted as subgoals requiring one action. In the figure, the high-level policy breaks down the end goal into three subgoals with relatively large time resolutions. The mid-level policy specializes in dividing each subgoal from the high-level policy into three subgoals belonging to shorter time scales. Finally, the low-level policy specializes in decomposing each subgoal from the mid-level policy into three agent actions, which represent the smallest time resolution. A crucial benefit of having each policy specialize in breaking down goals of particular time scale into subgoals of a certain smaller time scale is that the policies that are learned are limited in length. This is beneficial because shorter policies can be learned more quickly than longer ones. Further, having multiple policies that operate at different levels of temporal abstraction is helpful because it enables high-level exploration, which can also accelerate learning. Hierarchical Actor-Critic helps agents learn a hierarchy of policies similar to Figure 1 using a set of actor-critic networks. Each actor-critic network is responsible for learning one of the policies within the hierarchy. The policies or actor networks that are learned are goal-based, meaning that they take as input the current state and a goal and output an For this paper, we ran a series of experiments comparing the performance of agents that did and did not use the Hierarchical Actor-Critic algorithm. The tasks examined include pendulum, reacher, cartpole, and pick-andplace environments. In each task, agents that used Hierarchical Actor-Critic significantly outperformed those that did not. In some tasks, the use of Hierarchical ActorCritic appears to be the difference between consistently solving a task and rarely solving a task. A video showing the results of our experiments is available at https: //www.youtube.com/watch?v=m3EYeBpGepo. 2. Background Hierarchical Actor-Critic builds off three techniques from the reinforcement learning literature: (i) the Deep Deterministic Policy Gradient (DDPG) learning algorithm (Lillicrap et al., 2015), (ii) Universal Value Function Approximators (UVFA) (Schaul et al., 2015), and (iii) Hindsight Experience Replay (HER) (Andrychowicz et al., 2017). DDPG serves as the key learning infrastructure within Hierarchical Actor-Critic. DDPG is an actor-critic algorithm and thus uses two neural networks to enable agents to learn from experience. The actor network learns a deterministic policy that maps from states to actions π : S → A. The critic network approximates the Q-function or the action-value function of the current policy Qπ (st , at ) = E[Rt |st , at ], in which Rt is the discounted sum of future rewards P∞ i−t ri . Thus, the critic network maps from (state, i=t γ action) pairs to expected long-term reward Q : S × A → R. In order to learn a near-optimal policy that results in large expected long-term reward, DDPG follows a cyclical process composed of two steps: (i) policy evaluation and (ii) policy improvement. In the policy evaluation phase, the agent first interacts with the environment for a period of time using a noisy policy π(s) + N (0, 1), in which N (·) is some normal distribution. The transitions experienced are stored as (st , at , rt , st+1 ) tuples in a replay buffer. The agent then updates its approximation of the Q-function of Hierarchical Actor-Critic the current policy by performing mini-batch gradient descent on the loss function L = (Q(st , at ) − yt )2 , in which the target yt is the Bellman estimate of the Q-function yt = rt + γQ(st+1 , π(st+1 )). In the policy improvement phase, the agent modifies its policy based on the updated approximation of the action-value function. The actor function is trained by moving its parameters in the direction of the gradient of Q w.r.t. the actors parameters. Universal Value Function Approximators is a second idea that is critical to HAC. UVFA extends the action-value function to incorporate goals. The Q-function now represents the expected long-term reward of taking an action given the current state and goal Qπ (st , at , gt ) = E[Rt |st , at , gt ]. Each goal has its own reward function rg (st , at , st+1 ) and discount function γg (s). γg (s) = 0 when the agent is in a state that achieves the prescribed goal as the current state can be viewed as a terminating one. Goals are critical to HAC because goals are often hierarchical and can be broken down into subgoals. Goals are also useful because they can be used easily with sparse and binary reward functions. Hindsight Experience Replay is another component from the reinforcement learning literature that is integral to Hierarchical Actor-Critic. HER helps agents learn goal-based policies more quickly when sparse reward functions are used. The idea behind HER is that even though an agent may have failed to achieve its given goal in an episode, the agent did learn a sequence of actions to achieve a different objective in hindsight — the state in which the agent finished. Learning how to achieve different goals in the goal space should help the agent better determine how to achieve the original goal. Hindsight Experience Replay is implemented by creating a separate copy of the transitions (st , at , rt , st+1 , g) that occurred in an episode and replacing (i) the original goal with the goal achieved in hindsight and (ii) the original reward with the appropriate value given the new goal. 3. Hierarchical Actor-Critic We introduce a new hierarchical RL approach called Hierarchical Actor-Critic. The algorithm helps agents learn long time horizon tasks involving continuous action spaces and sparse rewards more quickly by enabling agents to learn to break down those tasks into easier subtasks belonging to different time scales. HAC directly addresses the issue of lengthy policies that hinder many existing non-hierarchical and hierarchical approaches as HAC agents learn limited policies at each level of temporal abstraction. The approach is also end-to-end as it learns subgoal policies at different levels of temporal abstraction on its own and in parallel and only requires sparse reward functions. Action Neural Network State Low-Level Actor Subgoal Neural Network State High-Level Actor Goal Figure 2. Hierarchical policy with 1 subgoal layer 3.1. Architecture The objective of the algorithm is to learn a hierarchical policy like the one shown in Figure 2. The hierarchical policy is composed of multiple goal-based policies or actor networks. Each actor network takes as input the current state and higher level goal and outputs an action belonging to a particular time scale. For the subgoal actor networks, such as the bottom network in Figure 2, this action is a proposed subgoal. The proposed subgoal is a desired future state or set of future states for the agent. For the actor network operating at the lowest level of abstraction, such as the top network in Figure 2, the action is the agent’s actual output. In our experiments, we trained agents that used hierarchical policies composed of two and three actor networks. Additional layers can be easily added. Each actor network has its own critic network and replay buffer to learn a near-optimal policy. The actor networks from Figure 2 are shown connected to their respective critic networks in Figure 3. Each critic network approximates the Q-function for its associated policy Qπi (st , at , gt ) = E[Rt |st , at , gt ] using the Bellman equation as a target yt = rg + γg Qπi (st+1 , πi (st+1 ), gt ). rg is sparse and binary and is granted when the agent has reached a state within a certain distance of the goal. As described in (Schaul et al., 2015), γg = 0 when the prescribed goal has been achieved as a terminating state has been reached. 3.2. Temporal Abstraction via Limited Policies Each actor network within the hierarchical policy learns a limited length policy as a result of time limits. Actor net- Hierarchical Actor-Critic Q-Value Neural Network State Subgoal Low-Level Actor-Critic Action Neural Network State Subgoal Q-Value Neural Network State Goal High-Level Actor-Critic Subgoal Neural Network State Goal Figure 3. Actor-Critic networks for hierarchical policy with 1 subgoal layer. works can only take a certain number of actions to achieve their higher level goal. For the lowest level actor network, this means it can only execute a certain number of actual agent actions to achieve a subgoal. For higher level subgoal actor networks, the policy limit means the network must achieve its higher level goal within a maximum number of subgoals. The policy length limit for actor network i is controlled by a hyper parameter Ti . In our experiments, we generally used the same value for Ti for each actor network within the hierarchical policy. This limit thus restricts each actor network to only learning how to achieve goals that can be accomplished within a certain number of actions, which shortens the goal-based policy that is learned. The combination of time limits and Hindsight Experience Replay enables each actor network to specialize in different time resolutions. Actor networks learn to operate at different time scales largely as a result of hindsight learning, in which the agent learns how to achieve the goal states the agent actually reached during an episode with the help of HER. The following example should provide some clarity. Consider an agent using a two layer hierarchical policy with T0 = T1 = 10, meaning that the agent must achieve each subgoal in no more than 10 agent actions and achieve the end goal in no more than 10 subgoals. Even in the worst case scenario in which the agent fails after 100 agent actions to achieve any of the 10 subgoals and the end goal, the agent will still be able to learn how it could have divided up the task of achieving the final state into problems belonging to different time scales. In order to achieve the last state reached on the 100th action, the agent could have chosen every 10th state to be a subgoal state. This is a valid breakdown because the end goal is reached in no more than 10 subgoals and each subgoal is achieved in no more than 10 actions by the agent. From this breakdown, the higher level network’s replay buffer receives a sequence of 10 transitions showing how it can use subgoals belonging to larger time resolutions to achieve the hindsight end goal. Similarly, the low-level network’s replay buffer receives 10 sequences of 10 transitions each showing how it can use actions belonging to the smallest time scale to achieve each of the 10 subgoals. Over the course of many episodes, each actor network learns to achieve goals with actions belonging to its respective time scale. Thus, time limits are critical for helping each actor network specialize in a different time resolution because they provide a simple way to divide up a sequence of actions that achieved some goal into multiple sequences belonging to different time scales. Learning limited policies at different time resolutions presents significant benefits as well as new challenges for the agent. The key benefit is that it should be easier to learn multiple shorter policies in parallel than one long policy. Credit assignment is less of a problem as the critic function for each policy only needs to learn Q-values for a more limited region of the state-action-goal space. Learning is faster because reinforcement learning agents essentially learn from end to beginning when sparse rewards are used. This backwards learning process occurs more quickly if the policy requires fewer actions. However, the use of limited policies also results in a significant new dilemma — subgoal actor networks now have conflicting missions. Subgoal actor networks need to learn a policy that can simultaneously (i) achieve its higher level goal in as few actions (i.e., subgoals) as possible but also (ii) output subgoals that can be achieved by the lower-level actor network in a limited number of steps. Producing subgoals that are too ambitious may not be achievable by lower level layers as they specialize in limited policies. Overly ambitious subgoals could thus result in the failure of the higher level actor network to achieve its own goal. To simultaneously solve both of its conflicting objectives, the upper and lower level layers need to coordinate as the upper level needs to understand the types of subgoals the lower level can accomplish. We take two steps to incentivize subgoal actor network i to output subgoals that can be achieved by actor network i − 1 in no more than Ti−1 actions. First, as in the example discussed above, all experience transitions passed to the replay buffers of subgoal actor networks contain actions (i.e. subgoals) that were actually achieved by the succeeding, lower level actor network within the maximum number of actions. Second, HAC penalizes proposed subgoals that were not achieved. A certain percentage of the time defined by a hy- Hierarchical Actor-Critic Algorithm 1 Hierarchical Actor-Critic Initialize Actor-Critic networks [(π0 , Q0 ), . . . , (πn , Qn )] Initialize Replay Buffers (R0 , . . . , Rn ) for episode = 1 to M do Sample actual goal, G, and initial state, s0 for tn = 1 to Tn do Testing Boolean B ← {0, 1} Sample layer n subgoal from πn gtn ← πn (s(tn ), G) + B · N (0, 1) ... for t0 = 1 to T0 do Sample action from π0 at0 ← π0 (s(t0 ), g1 ) + B · N (0, 1) ProcessTrans(st0 ,at0 ,rt0 +1 ,st0 +1 ,gt1 ) if gt1 , ..., G achieved or t0 = T0 then Perform HER on layer 0 transitions break end if end for ... ProcessTrans(stn ,gtn ,rtn +1 ,stn +1 ,G) if G achieved or tn = Tn then Perform HER on layer n transitions break end if end for Update Actor-Critic Networks end for per parameter, agents will test subgoals by not adding noise to the subgoals and actions prescribed by its hierarchical policy. Noise needs to be removed when testing subgoals because an agent may miss a subgoal due to noise added to lower level actions. Subgoals that cannot be achieved with the agent’s current, noise-free policy will be penalized. In our experiments, if layer i proposed a subgoal that was not achieved, layer i received a reward of −Ti . In addition, we set γ g = 0 when a subgoal is missed during testing as the Q-value of a missed proposed subgoal should not depend on the Q-value of a different state. If γ g = 0, then the reward for proposing the subgoal must be −Ti or less. Otherwise, proposing the missed subgoal may have a larger Q-value than some subgoals that do efficiently guide the agent to the goal, and the subgoal actor network may not update its policy as a result. We observed that the extra penalty for proposing a missed subgoal works as intended as the subgoal layer would adjust to proposing more conservative subgoals that the lower-level layer can achieve. 3.3. Algorithm The main part of the HAC algorithm, shown in Algorithm 1, is concerned with ensuring the correct experience transitions Algorithm 2 Transition Processing Function ProcessTrans(sti ,ati ,rti +1 ,sti +1 ,gti+1 ) if subgoal layer and ati not achieved then Ri ← (sti , gt0 i , rti +1 , sti +1 , gti+1 ) if Testing then Ri ← (sti , ati , −Ti , sti +1 , gti+1 ) end if else Ri ← (sti , ati , rti +1 , sti +1 , gti+1 ) if subgoal layer then Store HER trans (sti , gt0 i , T BD, sti +1 , T BD) else Store HER trans (sti , ati , T BD, sti +1 , T BD) end if end function are passed to each actor network’s replay buffer. In order to learn policies of a certain length, actor networks need to be passed sequences of transitions of the same length. Also, as discussed above, in order for each subgoal actor network to learn to output effective subgoals that belong to its respective time resolution, certain transitions need to be passed to each actor network. HAC proceeds as follows. The initial state and end goal are passed to the actor network n, which then triggers the passing of a series of subgoals from higher level actor networks to lower level actor networks. If the agent is in a subgoal testing phase, noise will not be added to these subgoals. The cascade of subgoals terminates when the last subgoal is passed to the lowest level actor function, which is located in the innermost for loop. The lowest level actor then has T0 attempts to try to achieve the provided subgoal. After each action by the lowest level actor network, two copies of transitions are created as a result of the call to the ProcessTrans function shown in Algorithm 2. The first transition (st0 , at0 , rt0 +1 , st0 +1 , gt1 ) is placed in replay buffer R0 . This transition indicates whether the action at0 taken in state st0 was able to achieve goal gt1 . The second transition (st0 , at0 , T BD, st0 +1 , T BD) awaits further processing during Hindsight Experience Replay. Once the lowest level actor has run out of T0 attempts or achieves any of the higher-level goals gt1 ,...,G, Hindsight Experience Replay is executed. During HER, a few random transitions are selected to serve as hindsight goals. As a result, for the selected transition and all preceding transitions, the TBD goal component is replaced with gt0 1 = f (st1 +1 ), in which f (·) is a function that transforms an array from the state space to the the goal space. gt0 1 can thus be interpreted as the subgoal achieved in hindsight. The TBD reward component is then replaced with its appropriate value given the updated goal. The purpose of these HER transitions is thus to help the agents learn the sequences of actions that were Hierarchical Actor-Critic used to achieve hindsight goals, even though these hindsight goals may be different than the original target goals. After HER is executed for the lowest level actor network, control is then passed to the preceding higher level actor network. were thereby only using DDPG and HER. A video showing the results of our experiments is available at https:// www.youtube.com/watch?v=m3EYeBpGepo. The completion of the innermost for loop consists of 1 subgoal action for actor network 1. Different transitions will be created depending on (i) whether its original proposed subgoal gt1 was achieved by actor network 0 and (ii) whether the agent is currently in a testing phase. If the proposed subgoal was not achieved, the transition (st1 , gt0 1 , rt1 +1 , st1 +1 , gt2 ) is passed to replay buffer R1 . This transition indicates whether the subgoal achieved in hindsight, gt0 1 , was able to achieve the higher level goal gt2 . If the proposed subgoal was missed and the agent is currently testing subgoals, the actor network 1 is penalized with the transition (st1 , gt1 , −T1 , st1 +1 , gt2 ). On the other hand, if subgoal gt1 was achieved by actor network 0, the transition (st1 , gt1 , rt1 +1 , st1 +1 , gt2 ) is passed to R1 . Finally, an additional transition (st1 , gt0 1 , T BD, sti +1 , T BD) is created for Hindsight Experience Replay. Actor network 1 then proposes a second subgoal for actor network 0 and the process begins again. The key insight here is that the second component or the ”action” component in every transition passed to the subgoal actor networks identifies a subgoal that has been achieved by the lower level actor network in no more than Ti−1 steps, except for the transitions that penalize bad subgoals. As a result, each subgoal actor network learns to output actions that both belong to a a particular time resolution and are helpful towards achieving the actor network’s higher level goal. 4.1. Environments After interacting with the environment for one or more episodes and filling its replay buffers with transitions, the agent now learns from the experience by updating its actorcritic functions. Mini-batch gradient descent is performed on the critic network to push the Q-function closer to the Bellman estimates. Next, the parameters of the actor function θi are moved in the direction of the gradient of the Q-function w.r.t θi . For the lowest level actor network, updating its actor-critic network should enable the actor to find more efficient routes to achieving its shorter term goals. For each subgoal actor-critic layer, updating its actor-critic network means finding a better way to balance its conflicting objectives of finding the sequence of subgoals that can (i) most quickly solve the higher level goal and (ii) be achieved in no more than Ti−1 steps by the succeeding actor layer. 4. Experiments We evaluated the Hierarchical Actor-Critic approach on a total of 5 tasks: Pendulum-Climb, Pendulum-Balance, UR5 Reacher, Cartpole, and 1-Object Pick-and-Place. In each environment, we compared the performance of agents using 0, 1, and 2 subgoal layers. Agents using 0 subgoal layers We assessed HAC on the following 5 tasks. Each of these simulations was built using the Mujoco physics engine (Todorov et al., 2012). 1. Pendulum - Climb The goal of this task is for the agent to swing the pendulum to its maximum height, marked by a yellow cube. The agent only needs to touch the yellow sphere located at the peak and does not need to try to balance the pole. We found that an efficient policy could solve this task in around 100 low-level actions. 2. Pendulum - Balance The goal for this environment is to balance the pendulum at its peak near the yellow sphere. Thus, to achieve the goal the pole must be located near the peak and have angular velocity near 0. Figure 4 shows a few frames from a successful episode. We found that an efficient policy could solve this task in around 150 low-level actions. 3. UR5 Reacher The goal of this task is for the agent to learn to move to a randomly designated point, marked by a yellow cube. The agent in this task is a simulated UR5, a 6 DOF robotic arm. To make the task require a longer time horizon, the goal location is always in the quadrant in front and opposite the starting location of the gripper. We found that an efficient policy could solve this task in around 60 individual actions. 4. Cartpole Swingup The goal for this task is to swing the pole up to the yellow cube. In order to achieve the goal, the angular velocity of the pole must also be near 0 and the position of the cart must be below the yellow cube. We found that an efficient policy could solve this task in around 170 low-level actions. 5. 1-Object Pick-and-Place The idea for this task was to assess how Hierarchical Actor-Critic would perform in a task with natural hierarchy. The objective in this task is to pick up the blue rod and move it to the yellow rod. The agent is a 2 joint robot worm. Our more efficient agents can solve this task in around 110 steps. States, Actions, Rewards The state space in all environments include joints positions and joint velocities. The actions are joint torques. Further, Hierarchical Actor-Critic Figure 4. Three frames from a successful episode of the Pendulum - Balance task. The agent learns to reach the goal (touch the yellow sphere) by breaking down the task into subgoals (touch the purple spheres). Table 1. Environment subgoal and goal descriptions TASK P ENDULUM -C LIMB P ENDULUM -BALANCE UR5 R EACHER C ARTPOLE P ICK - AND -P LACE S UBGOAL G OAL θxy θxy , θ̇ θxy θxy , θ̇ θef f ectorxyz θxy , θ̇ θxy θef f ectorxyz θxy , θ̇ θxy each network within the stack has its own sparse reward function. In our experiment, a reward of -1 was granted if an actor network took an action that did not complete its goal and a reward of 0 if the action was successful. Also, a larger negative reward was issued for subgoal networks that proposed a subgoal that the lower level layers could not achieve. Rewards are granted by a layer if the agent has moved within a certain distance of the layer’s goal. Further, the rewards granted by each network are independent of each other. For instance, an agent may miss the low-level subgoal but achieve a high-level subgoal. In this case, the transition passed to the low-level replay buffer will still list the negative reward for taking that action given the current state and subgoal because the action was unsuccessful. Goals and Subgoals Table 1 shows the subgoals and end goals for each task. θxy and θ̇ represent Cartesian joint positions and joint velocities, respectively. The subgoals in our experiments were essentially desired future states that the agent learns to achieve along the way to reaching the end goal. For some of our experiments, we used a lower dimensional version of the state as the subgoal. The end goal shown in the last column of Table 1 depends on the behavior the user would like the agent to learn. The more specific the desired behavior, the more similar the end goal should be to the state. For instance, in our Pendulum - Climb task, the agent just needed to learn to swing up to the peak in as few actions as possible. The agent did not need to try to balance the pole. Thus, for this task the end goal was 2-dimensional and includes the (x,y) coordinates of maximum height of the pendulum. On the other hand, in the Pendulum - Balance task, the agent needed to both swing the pole to its peak and maintain a near 0 angular velocity when the pole was upright. Thus, the goal for this task was 3-dimensional and included the (x,y) coordinates of maximum height of the pendulum and the desired angular velocity of 0. 4.2. Results The accompanying video and Figure 4.1 show the results of our experiments. In Figure 4.1, each chart plots the percentage of goals achieved by agents using 0, 1, and 2 subgoal layers in each testing period. Testing periods are separated by about 300 episodes and each testing period consists of 64 episodes. Each plot represents the average performance over 7-10 runs of each task. Agents learn each task from scratch and thus begin with no pre-training. In episode 0, agents are thereby using random policies. The key result from our work is that the use of Hierarchical Actor-Critic resulted in a substantial improvement in performance. In all 5 environments, agents that used HAC learned a robust policy significantly faster. Indeed, for many tasks, agents that used no subgoal layers were not able to consistently solve the task. The video and the frames in Figure 4 also demonstrate that the algorithm is working as intended – the agents are learning how to break problems down into easier subproblems. In the Pendulum - Balance environment, the subgoals represented by purple spheres show that the agent has learned that if it wants to balance the pole upright it first needs to swing back and forth. In the UR5 Reacher environment, if the goal location marked by the yellow cube is far away from an agent using 2 subgoal layers, the agent will often put the high-level subgoal marker, the green cube, about halfway to the end goal. The low-level subgoals, marked by the purple cubes, then appear to guide agent toward the high-level subgoal. This indicates the agent has learned how to effectively separate high-level goals into easier low-level goals. Similar hierarchical behavior is evident in the pickand-place environments. In the 1-Object Pick-and-Place, the high-level subgoal, represented by the green sphere and Hierarchical Actor-Critic Figure 5. The above plots compare the performance of agents that use the baseline DDPG+HER method with 0 subgoal layers (blue), and our HAC method with 1 (red) and 2 (yellow) subgoal layers, for each of the five tasks. Performance is measured by the percentage of end goals achieved in each testing period, which consists of 64 episodes. rod, will often appear in the vicinity of the blue rod when the blue rod has not yet been picked up. Once the blue rod has been attached, the high-level subgoal moves to the yellow rod. The low-level subgoal, represented by the purple sphere and rod, again guide the agent to the green high-level subgoal. We also observed that for most trials in each task except for the pick-and-place task, agents using 2 subgoal layers learned significantly faster than agents using 1 subgoal layer. Agent using 2 subgoal layers learn an extra policy but each of the three policies specialize in learning shorter policies than the 2 policies learned by agents using 1 subgoal layer. This result further supports the main premise of the algorithm — hierarchical agents that learn more shorter policies in parallel can outperform agents learning fewer longer policies. 5. Related Work Hierarchical RL is a topic of ongoing research (Sutton et al., 1999), (Dayan & Hinton, 1993), (Vezhnevets et al., 2017), (Dietterich, 1998). One popular hierarchical reinforcement learning approach is feudal reinforcement learning (Dayan & Hinton, 1993). In feudal reinforcement learning, the state space is divided into increasingly small regions at each level of abstraction. Dayan and Hinton (Dayan & Hinton, 1993) present a grid world example, in which a maze is continually divided into quarters at each level. Each level has a set of managers that are in charge of providing goals and rewards to the 4 sub-managers below. Sub-managers need to learn to complete their goals by learning how to give tasks to their own sub-managers. Dayan and Hinton (Dayan & Hinton, 1993) show that a feudal structure outperforms a non-hierarchical Q-learning approach. A key difference between HAC and feudal reinforcement learning is that the latter breaks down problems along the spatial dimension instead of the temporal dimension. This is problematic for two reasons. First, it is unclear how the state space would be divided for high-dimensional and continuous state spaces. Second, even if there was a way to divide a highdimensional continuous state space, the feudal approach does not guarantee the hierarchical policies learned will each be short. There may be some small region of the continuous state space that is difficult to maneuver and may require many actions from a manager. HAC, on the other hand, motivates its actor networks to learn shorter policies, which can accelerate learning. Another popular framework in hierarchical reinforcement learning is the options framework (Sutton et al., 1999). This approach generally uses a hierarchy of two layers to enable agents to break problems down. The low-level layer consists of multiple options, each of which is a policy that can solve a specific task. The high-level layer is responsible for learning the sequence of these specific policies that can achieve a task. HAC uses a different approach to breaking problems down. Instead of having the high-level policy select one of many specific low-level policies, the high-level network provides a subgoal to a single low-level network, which is trained to achieve a variety of subgoals as it learns a goal-based policy. Using one low-level goal-based policy Hierarchical Actor-Critic network instead of several non-goal-based policies should provide some efficiency advantages because learning how to achieve one subgoal will often help in learning how to achieve different subgoals. For instance, in a pick-and-place task, learning how pick up and drop off an object in a certain location should help the agent learn to pick up and drop off the object in a different target location. Kulkarni et al.(Kulkarni et al., 2016) proposed an approach with some similarities to both the options framework and HAC. The algorithm, named hierarchical-DQN (h-DQN), aims to help agents solve tasks in environments with discrete action spaces. Agents implemented with h-DQN break down tasks using two value functions. The high-level layer attempts to learn a sequence of subgoals that can accomplish a task. The low-level layer attempts to learn a sequence of individual actions that can achieve the provided subgoal. The low-level layer thus learns a goal-based policy and value functions similar to HAC. However, unlike the Hierarchical Actor-Critic method, h-DQN does not enable agents to learn the sequence of high-level subgoals from scratch while using only sparse reward functions. In the papers Montezumas Revenge example, the agent was provided with the set of the possible subgoals, which included objects in the game such as doors, ladders, and keys. The agent was then responsible for learning the order these items needed to be reached. An external reward function was also used to help the agent more quickly find the order of these subgoals. One key reason Hierarchical Actor-Critic does not need aids like sets of subgoals or manually-engineered reward functions is the use of Hindsight Experience Replay. With HER, as long as the agent can occasionally achieve goals that are nearby the intended goal, the agent should have a chance to learn the desired behavior. 6. Conclusion We introduced a new technique called Hierarchical ActorCritic that uses temporal abstraction to break down complex problems into easier subproblems. Our results indicate that only using one policy to learn a challenging behavior in an environment with sparse rewards can be problematic. A better approach may be to learn a set of policies operating at different time resolutions that work together to learn some behavior. Acknowledgements This research was supported by NSF award IIS-1724237 and by DARPA. References Andrychowicz, Marcin, Crow, Dwight, Ray, Alex, Schneider, Jonas, Fong, Rachel, Welinder, Peter, McGrew, Bob, Tobin, Josh, Pieter Abbeel, OpenAI, and Zaremba, Wojciech. Hindsight experience replay. In Guyon, I., Luxburg, U. V., Bengio, S., Wallach, H., Fergus, R., Vishwanathan, S., and Garnett, R. (eds.), Advances in Neural Information Processing Systems 30, pp. 5055–5065. Curran Associates, Inc., 2017. URL http://papers.nips.cc/paper/ 7090-hindsight-experience-replay.pdf. Dayan, Peter and Hinton, Geoffrey E. Feudal reinforcement learning. In Hanson, S. J., Cowan, J. D., and Giles, C. L. (eds.), Advances in Neural Information Processing Systems 5, pp. 271–278. Morgan-Kaufmann, 1993. URL http://papers.nips.cc/paper/ 714-feudal-reinforcement-learning. pdf. Dietterich, Thomas G. The maxq method for hierarchical reinforcement learning. In In Proceedings of the Fifteenth International Conference on Machine Learning, pp. 118– 126. Morgan Kaufmann, 1998. Kulkarni, Tejas D, Narasimhan, Karthik, Saeedi, Ardavan, and Tenenbaum, Josh. Hierarchical deep reinforcement learning: Integrating temporal abstraction and intrinsic motivation. In Lee, D. D., Sugiyama, M., Luxburg, U. V., Guyon, I., and Garnett, R. (eds.), Advances in Neural Information Processing Systems 29, pp. 3675–3683. Curran Associates, Inc., 2016. Lillicrap, Timothy P., Hunt, Jonathan J., Pritzel, Alexander, Heess, Nicolas, Erez, Tom, Tassa, Yuval, Silver, David, and Wierstra, Daan. Continuous control with deep reinforcement learning. CoRR, abs/1509.02971, 2015. URL http://arxiv.org/abs/1509.02971. Schaul, Tom, Horgan, Daniel, Gregor, Karol, and Silver, David. Universal value function approximators. In Bach, Francis and Blei, David (eds.), Proceedings of the 32nd International Conference on Machine Learning, volume 37 of Proceedings of Machine Learning Research, pp. 1312–1320, Lille, France, 07–09 Jul 2015. PMLR. URL http://proceedings.mlr. press/v37/schaul15.html. Sutton, R. S., Precup, D., and Singh, S. Between MDPs and semi-MDPs: a framework for temporal abstraction in reinforcement learning. Artificial Intelligence Journal, 112:181–211, 1999. Todorov, Emanuel, Erez, Tom, and Tassa, Yuval. Mujoco: A physics engine for model-based control. 2012 IEEE/RSJ International Conference on Intelligent Robots and Systems, pp. 5026–5033, 2012. Hierarchical Actor-Critic Vezhnevets, Alexander Sasha, Osindero, Simon, Schaul, Tom, Heess, Nicolas, Jaderberg, Max, Silver, David, and Kavukcuoglu, Koray. Feudal networks for hierarchical reinforcement learning. CoRR, abs/1703.01161, 2017. URL http://arxiv.org/abs/1703.01161.
9cs.NE
1 On the Restricted Isometry of the Columnwise Khatri-Rao Product Saurabh Khanna, Student Member, IEEE and Chandra R. Murthy, Senior Member, IEEE arXiv:1709.05789v2 [cs.IT] 10 Oct 2017 Dept. of ECE, Indian Institute of Science, Bangalore, India {saurabh, cmurthy}@iisc.ac.in Abstract—The columnwise Khatri-Rao product of two matrices is an important matrix type, reprising its role as a structured sensing matrix in many fundamental linear inverse problems. Robust signal recovery in such inverse problems is often contingent on proving the restricted isometry property (RIP) of a certain system matrix expressible as a Khatri-Rao product of two matrices. In this work, we analyze the RIP of a generic columnwise Khatri-Rao product by deriving two upper bounds for its kth order Restricted Isometry Constant (k-RIC) for different values of k. The first RIC bound is computed in terms of the individual RICs of the input matrices participating in the Khatri-Rao product. The second RIC bound is probabilistic in nature, and is specified in terms of the input matrix dimensions. We show that the Khatri-Rao product of a pair of m × n sized random matrices comprising independent and identically distributed subgaussian entries satisfies k-RIP with arbitrarily √ high probability, provided m exceeds O( k log3/2 n). This is a substantially milder condition compared to O(k log n) rows needed to guarantee k-RIP of the input subgaussian random matrices participating in the Khatri-Rao product. Our results confirm that the Khatri-Rao product exhibits stronger restricted isometry compared to its constituent matrices for the same RIP order. The proposed RIC bounds are potentially useful in obtaining improved performance guarantees in several sparse signal recovery and tensor decomposition problems. examples include compressive sensing [4], [5], covariance matrix estimation [6], [7], direction of arrival estimation [8] and tensor decomposition [9]. In each of these examples, the KR product A B, for certain m × n sized system matrices A and B, plays the role of the sensing matrix used to generate linear measurements y of an unknown signal vector x according to y = (A B) x + w, (2) Index Terms—Khatri-Rao product, Kronecker product, compressive sensing, Restricted isometry property, covariance matrix estimation, multiple measurement vectors, PARAFAC, CANDECOMP, tensor decomposition, direction of arrival estimation. The smallest constant δk (Φ) for which (3) holds for all ksparse z is called the k th order restricted isometry constant or the k-RIC of Φ. Matrices with small k-RICs are good encoders for storing/sketching high dimensional vectors with k or fewer nonzero entries [14]. For example, δk (A B) < 0.307 is a sufficient condition for a unique k-sparse solution to (2) in the noiseless case, and its perfect recovery via the `1 minimization technique [15]. As pointed out earlier, in many structured signal recovery problems, the main sensing matrix can be expressed as a columnwise Khatri-Rao product between two matrices. Thus, from a practitioner’s viewpoint, it is pertinent to study the restricted isometry property of a columnwise Khatri-Rao product matrix, which is the focus of this work. I. I NTRODUCTION The Khatri-Rao product, denoted by the symbol , is a columnwise Kronecker product, which was originally introduced by Khatri and Rao in [1]. For any two matrices A = [a1 , a2 . . . , ap ] and B = [b1 , b2 . . . , bp ] of sizes m × p and n × p, respectively, the columnwise Khatri-Rao product A B is a matrix of dimension mn × p defined as A B = [a1 ⊗ b1 a2 ⊗ b2 ... ap ⊗ bp ] , (1) where a ⊗ b denotes the Kronecker product [2] between vectors a and b. That is, each column of A B is the Kronecker product between the respective columns of the two input matrices A and B. In this article, we shall refer to the columnwise Khatri-Rao product as simply the KhatriRao product or the KR product. Since the Kronecker product A⊗B comprises all pairwise Kronecker product combinations of the columns of the input matrices, it can be shown that A B = (A ⊗ B)J, where J is a p2 × p selection matrix 2 with columns as a subset of the standard basis in Rp [3]. Khatri-Rao product matrices are encountered in several linear inverse problems of fundamental importance. Recent where w represents the additive measurement noise. It is now well established in the sparse signal recovery literature [10]– [12] that, if the signal of interest, x, is a k-sparse1 vector in Rn , it can be stably recovered from its noisy underdetermined 2 linear observations y ∈ Rm (m2 < n) in a computationally efficient manner provided that the sensing matrix (here, A B) satisfies the restricted isometry property defined next. A matrix Φ ∈ Rm×n is said to satisfy the Restricted Isometry Property (RIP) [13] of order k, if there exists a constant δk (Φ) ∈ (0, 1), such that for all k-sparse vectors z ∈ Rn , (1 − δk (Φ))||z||22 ≤ ||Φz||22 ≤ (1 + δk (Φ))||z||22 . (3) A. Applications involving Khatri-Rao matrices We briefly describe some examples where it is required to show the restricted isometry property of a KR product matrix. 1) Support recovery of joint sparse vectors from underdetermined linear measurements: Suppose x1 , x2 , . . . , xL are unknown joint sparse signals in Rn with a common k-sized support denoted by an index set S. A canonical problem in multi-sensor signal processing is concerned with the recovery of the common support S of the unknown signals from their 1A vector is said to be k-sparse if at most k of its entries are nonzero. 2 noisy underdetermined linear measurements y1 , y2 , . . . , yL ∈ Rm generated according to yj = Axj + wj , 1 ≤ j ≤ L, (4) m×n where A ∈ R (m < n) is a known measurement matrix, and wj ∈ Rn models the noise in the measurements. This problem arises in many practical applications such as MIMO channel estimation, cooperative wideband spectrum sensing in cognitive radio networks, target localization, and direction of arrival estimation. In [16], the support set S is recovered as the support of γ̂, the solution to the Co-LASSO problem: Co-LASSO: min vec(R̂yy ) − (A γ0 2 A)γ 2 +λ ||γ||1 , (5) PL where R̂yy , L1 j=1 yj yjT . From compressive sensing theory [11], the RIP of A A (also called the self Khatri-Rao product of A) determines the stability of the sparse solution in the Co-LASSO problem. In M-SBL [17], a different support recovery algorithm, A A satisfying 2k-RIP can guarantee exact recovery of S from multiple measurements [18]. 2) Vandermonde decomposition of Toeplitz matrices: According to a classical result by Carathéodory and Fejér [19], any n×n positive semidefinite Toeplitz matrix T of rank r < n admits the following decomposition T = APAT , (6) where P is an n × n positive semidefinite diagonal matrix with an r-sparse diagonal, and A is an n × n Vandermonde matrix with uniformly sampled complex sinusoids of different frequencies as its columns. This Toeplitz decomposition underpins subspace based spectrum estimation methods such as MUltiple SIgnal Classification (MuSiC) and EStimation of Parameters by Rotationally Invariant Techniques (ESPRIT) [20], [21]. By replacing T with a data covariance matrix, the r-sparse support of diag(P) in (6) corresponds to the r-dimensional signal subspace of the data. Estimation of p , diag(P) is tantamount to finding an r-sparse solution to the vectorized form of (6), i.e., vec(T) = (A A)p. Here again, the recovery of a unique r-sparse solution for p can be guaranteed if A A satisfies the RIP of order 2r. 3) PARAFAC model for low-rank three-way arrays: Consider an I × J × K tensor X of rank r. We can express PrX as the sum of r rank-one three way arrays as X = i=1 ai ◦ bi ◦ ci , where ai , bi , ci are loading vectors of dimension I, J, K, respectively, and ◦ denotes the vector outer product. The tensor X itself can be arranged into a matrix as X = [vec(X1 ), vec(X2 ), . . . , vec(XK )]. In the parallel factor analysis (PARAFAC) model [22], the matrix X can be approximated as X ≈ (A B)CT , (7) where A, B and C are the loading matrices with columns as the loading vectors ai , bi and ci , respectively. In many problems such as direction of arrival estimation using a 2Dantenna array, the loading matrix C turns out to be rowsparse matrix [23]. In such cases, the uniqueness of the PARAFAC model shown in (7) depends on the restricted isometry property of the Khatri-Rao product A B. Finding the exact kth order RIC of any matrix entails searching for the smallest and largest eigenvalues among all possible k-column submatrices of the matrix, which is, in general, an NP hard task [24]. In this work, we follow an alternative approach to analyzing the RIP of a KR product matrix. We seek to derive tight upper bounds for its RICs. B. Related Work Perhaps the most straightforward way to analyze the RICs of the KR product matrix is to use the eigenvalue interlacing theorem [25], which relates the singular values of any kcolumn submatrix of the KR product to the singular values of the Kronecker product. This is possible because any k columns of the KR product can together be interpreted as a submatrix of the Kronecker product. However, barring the maximum and minimum singular values of the Kronecker product, there is no explicit characterization of its non-extremal singular values available, that can be used to obtain tight bounds the k-RIC of the KR product. Bounding the RIC using the extreme singular values of the Kronecker product matrix turns out to be too loose to be useful. In this context, we note that an upper bound for the k-RIC of the Kronecker product matrix is derived in terms of the k-RICs of the input matrices in [4], [26]. However, the k-RIC of the KR product matrix is yet to be analyzed. Recently, [27], [28] gave probabilistic lower bounds for the minimum singular value of the columnwise KR product between two or more matrices. These bounds are limited to randomly constructed input matrices, and are polynomial in the matrix size. In [29], it is shown that for any two matrices A and B, the Kruskal-rank2 of A B has a lower bound in terms of K-rank(A) and K-rank(B). In fact, Krank(A B) is at least as high as max (K-rank(A), K-rank(B)), thereby suggesting that A B satisfies a stronger restricted isometry property than both A and B. The RIC bounds presented in this work ratify this fact. A closely related yet weaker notion of restricted isometry constant is the τ -robust K-rank, denoted by K-rankτ . For a given matrix Φ, the K-rankτ (Φ) is defined as the largest k for which every n × k submatrix of Φ has its smallest singular value larger than 1/τ . In [27], it is shown that the τ -robust Krank is super-additive, implying that the K-rankτ of the KhatriRao product is strictly larger than individual K-rankτ s of the input matrices. We show a similar result for the restricted isometry constants of the KR product matrix. Our work is perhaps closest to [7], which provides a polynomially tight probabilistic upper bound for the k-RIC (defined using `1 -norm in (3)) of the Khatri-Rao product A B, when the input matrices A and B are the adjacency matrices of two independent uniformly random δ-left regular bipartite graphs. This work instead assumes A and B to be random matrices with independent subgaussian elements. C. Our Contributions We derive two upper bounds on the k-RIC of the columnwise KR product of two m × n sized matrices A and B. The 2 The Kruskal rank of any matrix A is the largest integer r such that any r columns of A are linearly independent. 3 bounds are listed below. 1) A deterministic upper bound for the k-RIC of A B in terms of the k-RICs of the input matrices A and B. The bound is valid for k ≤ m, and for input matrices with unit `2 -norm columns. 2a) A probabilistic upper bound for the k-RIC of A B in terms of k and the input matrix dimensions (m, n), for A, B as random matrices with i.i.d. subgaussian elements. The probabilistic bound is polynomially tight with respect to the input matrix dimension n. The bound is valid for k ≤ n. 2b) A probabilistic upper bound for the k-RIC of the self KR product A A in terms of m, n, and k, for A as a random matrix with i.i.d. subgaussian elements. Although the RIC bounds for the self KR product and the general KR product with distinct input matrices are of similar form, the derivation of former RIC bound is slightly more intricate as it involves showing sharp concentration for functions of dependent random variables. A key idea in the RIC analysis is to use the fact (stated formally as Proposition 12) that for any two matrices A and B, the Gram matrix of their KR product (A B)T (A B) can be interpreted as the Hadamard product (element wise multiplication) between AT A and BT B. The Hadamard product form is more analytically tractable than columnwise Kronecker product form of the KR matrix. Lately, in several machine learning problems, the necessary and sufficient conditions for successful signal recovery have been reported in terms of the RICs of a certain Khatri-Rao product matrix serving as a pseudo sensing matrix [8], [16]. In light of this, our proposed RIC bounds are quite timely, and pave the way towards obtaining order-wise tight sample complexity bounds in several fundamental learning problems. The rest of this article is organized as follows. In Secs. II and III, we present our main results: deterministic and probabilistic RIC bounds, respectively, for a generic columnwise KR product matrix. Sec. III also discusses about the RIP of the self Khatri-Rao product of a matrix with itself, an important matrix type encountered in the sparse diagonal covariance matrix estimation problem. In Secs. IV and VI, we provide some background concepts needed in proving the proposed RIC bounds. Secs. V and VII provide the detailed proofs of the deterministic and probabilistic RIC bounds, respectively. Final conclusions are presented in Sec. VIII. Notation: In this work, bold lowercase letters are used for representing both scalar random variables as well as vectors. Bold uppercase letters are reserved for matrices. The `2 -norm of vector x is denoted by ||x||2 . For an m × n matrix A, ||Ax|| ||A|| denotes its operator norm, ||A|| = supx∈Rn ,x6=0 ||x|| 2 . 2 The Hilbert-Schmidt (or Frobenius) norm of A is defined Pm P n 2 as ||A||HS = i=1 j=1 |Ai,j | . The symbol [n] denotes the index set {1, 2, . . . , n}. For any index set S ⊆ [n], AS denotes the submatrix compromising the columns of A indexed by S. The matrices A ⊗ B, A ◦ B and A B denote the Kronecker product, Hadamard product and columnwise Khatri-Rao product of A and B, respectively. A ≤ B implies that B − A is a positive semidefinite matrix. AT , AH , A−1 , and A† denote the transpose, conjugate-transpose, inverse and generalized matrix inverse operations, respectively. II. D ETERMINISTIC k-RIC B OUND In this section, we present our first upper bound on the kRIC of a generic columnwise KR product A B, for any two similar sized matrices A and B with normalized columns. The bound is given in terms of the k-RICs of A and B. Theorem 1. Let A and B be m × n sized real-valued matrices with unit `2 -norm columns and satisfying the k th order restricted isometry property with constants δkA and δkB , respectively. Then, their columnwise Khatri-Rao product A B satisfies the restricted isometry property with k-RIC at  most δ 2 , where δ , max δkA , δkB , i.e., (1 − δ 2 )||z||22 ≤ ||(A B)z||22 ≤ (1 + δ 2 )||z||22 (8) n holds for all k-sparse vectors z ∈ R . Proof. The proof is provided in Section V. Remark 1: The RIC bound for A B in Theorem 1 is relevant only when δk (A) and δk (B) lie in (0, 1), which is true only for k ≤ m. In other words, the above k-RIC characterization for A B requires the input matrices A and B to be k-RIP compliant. Remark 2: Since the input matrices A and B satisfy kRIP with δk (A), δk (B) ∈ (0, 1), it follows from Theorem 1 that δk (A B) is strictly smaller than max (δk (A), δk (B)). If B = A, the special case of self Khatri-Rao product A A arises, for which δk (A A) < δk2 (A). (9) Above implies that the self Khatri-Rao product A A is a better restricted isometry compared to A itself. This observation is in alignment with the expanding Kruskal rank and shrinking mutual coherence of the self Khatri-Rao product reported in [16]. In fact, for k = 2, the 2-RIC bound (9) exactly matches the mutual coherence bound shown in [16]. For k ∈ (m, m2 ], using ( [30], Theorem 1), one can √ show that δk (A B) ≤ k + 1 δ√k , where δ√k =  max δ√k (A), δ√k (B) . This bound, however, loses its tightness and quickly becomes unattractive for larger values of k. Finding a tighter k-RIC upper bound for the k > m case remains an open problem. To gauge the tightness of the proposed k-RIC bound for A B, we present its simulation-based quantification for the case when the input matrices A and B are random Gaussian matrices with i.i.d. N (0, 1/m) entries. Fig. 1 plots δk (A), δk (B), δk (A B) and the upper bound δk (A B) = 2 (max (δk (A), δk (B))) for a range of input matrix dimension m. The aspect ratio m/n of the input matrices is fixed to 0.5.3 For computational tractability, we restrict our analysis to the cases k = 2 and 3. The RICs: δk (A), δk (B) and 3 While the m×n matrices A and B may represent highly underdetermined linear systems (when m  n), their m2 ×n sized Khatri-Rao product A B can become an overdetermined system. In fact, many covariance matching based sparse support recovery algorithms [16], [17], [31] exploit this fact to offer significantly better support reconstruction performance. 4 The minimum such K1 is called the subgaussian or ψ2 norm of the random variable x, i.e., 1 δ2A δ2B δ2A⊙B 0.8 p Bound for δ2A⊙Bin Theorem-1 (11) p≥1 Given a pair of random input matrices with i.i.d. subgaussian entries, Theorem 2 presents a new upper bound on the k-RIC of their columnwise KR product. δ2 0.6 0.4 0.2 0 100 1 ||x||ψ2 = sup p−1/2 (E |x| ) p . 300 500 700 900 n 1.2 1 Theorem 2. Suppose A and B are m × n random matrices with real i.i.d. subgaussian entries, such that EAij = 0 and EA2ij = 1, and ||Aij ||ψ2 ≤ K, and similarly for B. Let Ko , max (K, 1). Then, the k th order restricted isometry constant of √Am √Bm , denoted by δk , satisfies δk ≤ δ with probability at least 1 − 8en−2(c2 γ−1) for all γ > 1/c2 , and c2 a universal positive constant, provided that ! √ 16 2πγ 3/2 Ko2 √ 3/2 k (log n) . m≥ δ δ3 0.8 0.6 0.4 0.2 0 50 100 150 200 250 300 n Fig. 1: Variation of k-RICs of A, B, A B and the proposed upper bound with increasing input matrix dimensions. The top and the bottom plots are for k = 2 and 3, respectively. Each data point is averaged over 10 trials. δk (A B) are computed by exhaustively searching for the worst conditioned submatrix comprising k columns of A, B and A B, respectively. From Fig. 1, we observe that the proposed k-RIC upper bound becomes tighter as the input matrices grow in size. III. P ROBABILISTIC k-RIC B OUND The deterministic RIC bound for the columnwise KR product discussed in the previous section is only applicable when k ≤ m. It also fails to explain the empirical observation that the KR product A B often satisfies k-RIP in spite of the input matrices A and B failing to do so. These concerns are addressed by our second RIC bound for the columnwise KR product. This second RIC bound is probabilistic in nature and is applicable to the KR product of random input matrices with i.i.d. subgaussian entries. Below, we define a subgaussian random variable and state some of its properties. Definition 1. (Subgaussian Random Variable): A random variable x is called subgaussian, if its tail probability is dominated by that of a Gaussian random variable. In other words, there 2 2 exists a constant K > 0 such that P(|x| ≥ t) ≤ e−t /K . Gaussian, Bernoulli and all bounded random variables are subgaussian random variables. For a subgaussian random variable, its pth order moment grows only as fast as O(pp/2 ) [32]. In other words, there exists K1 > 0 such that √ p 1 (E |x| ) p ≤ K1 p, p ≥ 1. (10) Proof. The proof is provided in Section VII. √ The normalization constant m used while computing √B the KR product √Am ensures that the columns of m A B √ √ the input matrices m , m have unit average energy, i.e. √ √ E ||ai / m||2 = E ||bi / m||2 = 1 for 1 ≤ i ≤ n. Column normalization is a key assumption towards correct modelling of the isotropic, norm-preserving nature of the effective sens1 ing matrix m (A B), an attribute found in most sensing matrices employed in practice. Theorem 2 implies that ! √   3/2 √ A B k (log n) 3/2 2 √ δk √ ≤ 16 2πγ Ko m m m (12) with probability exceeding 1 − 8en−2(c2 γ−1) . Thus, the above k-RIC bound decreases as m increases, which is intuitively appealing. Interestingly, for fixed k and n, the above k√B decays as O( 1 ). This is RIC upper bound for √Am m m a significant improvement over the O( √1m ) decay rate [11] already known for the individual k-RICs of the input subgaussian matrices √Am and √Bm . Thus, for any m, the Khatri√B exhibits stronger restricted isometry Rao product √Am m property, with significantly smaller k-RICs in comparison to the k-RICs for the input matrices. In some applications, the effective sensing matrix can be 1 (A A) of a expressed as the self-Khatri Rao product m A certain column normalized system matrix √m with itself [16]. In Theorem 3 below, we present the k-RIC bound for the special case of self-Khatri-Rao product matrices. Theorem 3. Let A be an m × n random matrix with real i.i.d. subgaussian entries, such that EAij = 0 and EA2ij = 1, and ||Aij ||ψ2 ≤ K. Then, the k th order restricted isometry constant of the column normalized self Khatri-Rao product 1 A) satisfies δk ≤ δ with probability at least 1 − m (A 4en−2(c2 γ−1) for any γ ≥ 1/c2 , provided ! √ 16 2πγ 3/2 Ko2 √ 3/2 m≥ k (log n) . δ 5 Here, Ko , max (K, 1) and c2 > 0 is a universal constant. Proof. A proof sketch is provided in Appendix F. Theorem 3 implies that   √ A A √ ≤ 16 2πγ 3/2 Ko2 δk √ m m √ 3/2 k (log n) m ! (13) with probability exceeding 1−4en . The above k-RIC bound for the self Khatri-Rao product scales with m, n, and k in a similar fashion as the asymmetric Khatri-Rao product. Remark 3: From [11], for an mq× n matrix A with i.i.d. 2Ck log(eN/k) with high subgaussian entries, δk ( √Am ) ≤ m probability. Now, even though the columns of A do not exactly have unit norm, directly using this in Theorem 1 for the sake of 2Ck log(eN/k) √A ) ≤ , when comparison results in δk ( √Am m m k ≤ m. Our probabilistic bound in (13) is therefore tighter than the deterministic bound in Theorem 1 by a multiplicative √ factor of O( k). Note that, the deterministic bound is valid for any pair of input matrices with normalized columns, while the probabilistic bound holds when the input matrices have i.i.d. subgaussian entries. Remark 4: In covariance matching based signal support recovery algorithms like Co-LASSO [16] and M-SBL [17], given a system matrix √Am , δ2k ( √Am √Am ) ≤ 1 is one of the sufficient conditions for exact recovery of the true k-sparse support of the unknown signal of interest [18]. This sufficiency condition is met with arbitrarily high probability according to Theorem √ 3, when the  subgaussian matrix A has at least m = O k log3/2 n rows. This is a significantly milder condition when compared with O(k log n) rows required for exact k-sparse support recovery by conventional compressive sensing algorithms such as SOMP [33]. In fact, to the best of our knowledge, our k-RIC bound for the self Khatri-Rao product provides the first ever theoretical confirmation for the empirically observed performance of covariance matching based sparse support recovery algorithms, i.e., √ the number of measurements m need to scale as only O( k) rather than O(k) in the case of conventional support recovery algorithms. −2(c2 γ−1) IV. P RELIMINARIES FOR D ETERMINISTIC k-RIC B OUND In this section, we present some preliminary concepts and results which are necessary for the derivation of the deterministic k-RIC bound in Theorem 1. For the sake of brevity, we provide proofs only for claims that have not been explicitly shown in their cited sources. A. Properties of the Kronecker and Hadamard product For any two matrices A and B of dimensions m × n and p × q, the kronecker product A ⊗ B is the mp × nq matrix   a11 B a12 B · · · a1n B  a21 B a22 B · · · a2n B    A⊗B= . (14) .. ..  . . . .  . . . .  am1 B am2 B · · · amn B The following Proposition relates the spectral properties of the Kronecker product and its constituent matrices. Proposition 4 (7.1.10 in [2]). Let A ∈ Rn×n and B ∈ Rp×p admit eigenvalue decompositions UA ΛA UTA and UB ΛB UTB , respectively. Then, (UA ⊗ UB )(ΛA ⊗ ΛB )(UA ⊗ UB )T yields the eigenvalue decomposition for A ⊗ B. For any two matrices of matching dimensions, say m × n, their Hadamard product A ◦ B is obtained by elementwise multiplication of the entries of the input matrices, i.e., [A ◦ B]i,j = aij bij for i ∈ [m], j ∈ [n]. (15) The Hadamard product A ◦ B is a principal submatrix of the Kronecker product A ⊗ B [3], [34]. For n × n sized square matrices A and B, one can write, A ◦ B = JT (A ⊗ B)J, (16) where J is an n2 ×n sized selection matrix constructed entirely from 0’s and 1’s which satisfies JT J = In . In Proposition 5, we present an upper bound on the spectral radius of a generic Hadamard product. Proposition 5. For every A, B ∈ Rm×n , we have σmax (A ◦ B) ≤ rmax (A)cmax (B) (17) where σmax (·), rmax (·) and cmax (·) are the largest singular value, the largest row norm and the largest column norm of the input matrix, respectively. Proof. See Theorem 5.5.3 in [35]. We now state an important result about the Hadamard product of two positive semidefinite matrices. Proposition 6 (Mond and Pec̆arić [36]). Let A and B be positive semidefinite n × n Hermitian matrices and let r and s be two nonzero integers such that s > r. Then, 1/s (As ◦ Bs ) 1/r ≥ (Ar ◦ Br ) . (18) In Propositions 7 and 8, we state some spectral properties of correlation matrices and their Hadamard products. Correlation matrices are symmetric positive semidefinite matrices with diagonal entries equal to one. Later on, we will exploit the fact that the singular values of the columnwise KR product are related to the singular values of the Hadamard product of certain correlation matrices. Proposition 7. If A is an n×n correlation matrix, then A1/2 ◦ A1/2 is a doubly stochastic matrix. Proof. See Appendix A. Proposition 8 (Werner [37]). For any correlation matrices A and B of the same size, we have A1/2 ◦ B1/2 ≤ I, where A1/2 and B1/2 are the positive square roots of A and B, respectively. Proof. Since A is a correlation matrix, from Proposition 7, it follows that A1/2 ◦ A1/2 is doubly stochastic. Since the rows and columns of A1/2 ◦ A1/2 sum to unity, we have rmax (A1/2 ) = cmax (A1/2 ) = 1. Similarly, rmax (B1/2 ) = cmax (B1/2 ) = 1. Then, from Proposition 5, it follows that the largest eigenvalue of A1/2 ◦ B1/2 is at most unity. 6 B. Matrix Kantorovich Inequalities Matrix Kantorovich inequalities relate positive definite matrices by inequalities in the sense of the Löwner partial order.4 These inequalities can be used to extend the Löwner partial order to the Hadamard product of positive definite matrices. Our proposed RIC bound relies on the tightness of these Kantorovich inequalities and their extensions. A matrix version of the Kantorovich inequality was first proposed by Marshall and Olkin in [38]. It is stated below as Proposition 9. Proposition 9 (Marshall and Olkin [38]). Let A be an n × n positive definite matrix. Let A admit the Schur decomposition A = UΛUT with unitary U and Λ = diag(λ1 , λ2 , . . . , λn ) such that λi ∈ [m, M ]. Then, we have A2 ≤ (M + m)A − mM In . (19) The above inequality (19) is the starting point for obtaining a variety of forward and reverse Kantorovich-type matrix inequalities for positive definite matrices. In Propositions 10 and 11, we state specific forward and reverse inequalities, respectively, which are relevant to us. Proposition 10 (Liu and Neudecker [39]). Let A be an n × n positive definite Hermitian matrix, with eigenvalues in [m, M ]. Let V be an n × n matrix such that VT V = I. Then, 2 1 (20) VT A2 V − VT A2 V ≤ (M − m)2 I. 4 Proposition 11 (Liu and Neudecker [40]). Let A and B be n×n positive definite matrices. Let m and M be the minimum and maximum eigenvalues of B1/2 A−1 B1/2 . Let X be an n × p matrix with rank q (n > p ≥ q). Then, we have 4mM (XT BX)(XT AX)† (XT BX) ≥ XT BA−1 BX. (M + m)2 (21) Proposition 10 can be proved using (19) by pre- and post-multiplying by VT and V, respectively, followed by completion of squares for the right hand side terms. The proof of Proposition 11 is given in [40]. C. Kantorovich Matrix Inequalities for the Hadamard Products of Positive Definite Matrices Lemmas 1 and 2 stated below extend the Kantorovich inequalities from the previous subsection to Hadamard products. Lemma 1 (Liu and Neudecker [39]). Let A and B be n × n positive definite matrices, with m and M denoting the minimum and maximum eigenvalues of A ⊗ B. Then, we have 1 A2 ◦ B2 ≤ (A ◦ B)2 + (M − m)2 In . (22) 4 Proof. Let J be the selection matrix such that JT J = I and A ◦ B = JT (A ⊗ B)J. Then, by applying Proposition 10 with A replaced with A ⊗ B, and V replaced with J, we obtain 1 JT (A ⊗ B)2 J − (JT (A ⊗ B)J)2 ≤ (M − m)2 I. 4 4 The Löwner partial order here refers to the relation “≤”. For positive definite matrices A and B, A ≤ B if and only if B − A is a positive semi-definite matrix. Using Fact 8.21.29 in [2], i.e., (A ⊗ B)2 = A2 ⊗ B2 , we get JT (A2 ⊗ B2 )J − (A ◦ B)2 ≤ 1 (M − m)2 I, 4 Finally, by observing that JT (A2 ⊗ B2 )J = A2 ◦ B2 , we obtain the desired result. Lemma 2 (Liu [41]). Let A, B be n × n positive definite correlation matrices. Then, A1/2 ◦ B1/2 ≥ 2cd In + d2 c2 (23) where the eigenvalues of A1/2 and B1/2 lie inside [c, d]. Lemma 2 follows from Proposition 11, by replacing A with In ⊗ B, B with A1/2 ⊗ B1/2 , and X with J, where J is the n2 × n binary selection matrix such that JT J = I and A ◦ B = JT (A ⊗ B)J. V. P ROOF OF THE D ETERMINISTIC k-RIC B OUND (T HEOREM 1) The key idea used in bounding the k-RIC of the columnwise KR product A B is the observation that the Gram matrix of A B can be interpreted as a Hadamard product between the two correlation matrices AT A and BT B, as mentioned in the following Proposition. Proposition 12 (Rao and Rao [42]). For A, B ∈ Rm×n , (A B)T (A B) = (AT A) ◦ (BT B) (24) Proof. See Proposition 6.4.2 in [42]. Then, by using the forward and reverse Kantorovich matrix inequalities, we obtain the proposed upper bound for k-RIC of A B as explained in the following arguments. Without loss of generality, let S ⊂ [n] be an arbitrary index set representing the nonzero support of z in (8), with |S| ≤ k. Let AS denote the m × |S| submatrix of A, constituting |S| columns of A indexed by the set S. Let BS be constructed similarly. Since δk (A), δk (B) < 1, both AS , BS have full rank, and consequently the associated Gram matrices ATS AS , BTS BS are positive definite. Further, since A and B have unit norm columns, both ATS AS and BTS BS are correlation matrices with unit diagonal entries. Using Proposition 12, we can write (AS BS )T (AS BS ) = ATS AS ◦ BTS BS . (25) Next, for k ≤ m, by applying Lemma 1 to the positive definite matrices (ATS AS )1/2 and (BTS BS )1/2 , we get,   1 1 1 2 ATS AS ◦ BTS BS ≤ (ATS AS ) 2 ◦(BTS BS ) 2 + (M −m)2 Ik 4 1 2 ≤ Ik + (M − m) Ik , (26) 4 where the second inequality is a consequence of the unity bound on the spectral radius of the Hadamard product between correlation matrices, shown in Proposition 8. In (26), M and m are upper and lower bounds for the maximum and minimum eigenvalues of (ATS AS )1/2 ⊗ (BTS BS )1/2 , respectively. From the restricted isometry of A and B, and by application of 7 Proposition 4, the minimum and maximum eigenvalues of T 1/2 (A ⊗ (BTS BS )1/2qare lower and upper bounded by q S AS ) almost surely. Then, for all t > 0, By introducing δ , max(δkA , δkB ), it is easy to check that the eigenvalues of (ATS AS )1/2 ⊗ (BTS BS )1/2 also lie inside the interval [1 − δ, 1 + δ]. Plugging m = 1 − δ and M = 1 + δ in (26), and by using (25), we get  (AS BS )T (AS BS ) ≤ 1 + δ 2 Ik . (27) Proof. See Theorem 6.7 in [45]. (1 − δkA )(1 − δkB ) (1 + and δkA )(1 + δkB ), respectively. Similarly, by applying√Lemma 2 to ATS AS and BTS BS with √ c = 1 − δ and d = 1 + δ, we obtain  p 1 − δ 2 Ik . (ATS AS )1/2 ◦ (BTS BS )1/2 ≥ ATS AS BTS BS From Proposition 6, we have ◦ 2 (ATS AS )1/2 ◦ (BTS BS )1/2 . Therefore, we can write  ATS AS ◦ BTS BS ≥ 1 − δ 2 Ik . ≥ (AS BS ) (AS BS ) ≥ 1 − δ 2  Ik . 2 /2ν . Theorem 14 can be used to show a subgaussian tail for the maximal linear combination of bounded nonnegative random variables, stated below. Lemma 3. Let x1 , x2 , . . . , xn be i.i.d. nonnegative, bounded random variables Pn satisfying xi ≤ b. Then, y , supz∈Rn ,||z||2 ≤1 i=1 zi xi is a nonnegative random variable which satisfies the following tail inequality: P (y − Ey ≥ t) ≤ e−t 2 /2b2 . Proof. See Appendix B. The following proposition bounds the expectation of a nonnegative subgaussian random variable. Further, using (25), we get T P (z − Ez ≥ t) ≤ e−t (28) Finally, Theorem 1’s statement follows from (27) and (28). VI. P RELIMINARIES FOR P ROBABILISTIC k-RIC B OUND Proposition 15. Let x be a nonnegative random variable with a subgaussian tail, i.e., for t ≥ 0, P(z − Ez ≥ t) ≤ e−t √ for some ν > 0. Then, Ez ≤ 2πν. 2 /2ν In this section, we briefly discuss some concentration results on certain functions of subgaussian random variables which will appear in the proofs of Theorems 2 and 3. Proof. See Appendix C. A. A Tail Probability for Subgaussian Vectors The proof of Theorem 2 starts  with a variational definition  of the k-RIC, δk √Am √Bm given below. The Theorem below presents the Hanson-Wright inequality [43], [44], a tail probability for a quadratic form constructed using independent subgaussian random variables. Theorem 13 (Rudelson and Vershynin [44]). Let x = (x1 , x2 , . . . , xn ) ∈ Rn be a random vector with independent components xi satisfying Exi = 0 and ||xi ||ψ2 ≤ K. Let A be an n × n matrix. Then, for every t ≥ 0,  P xT Ax − ExT Ax > t " !# t2 t ≤ 2 exp −c min 2 , K 4 ||A||HS K 2 ||A|| where c is a universal positive constant. B. Concentration of Supremum of Linear Combination of Bounded, Nonnegative Independent Random Variables The following theorem bounds the subgaussian tail of a function of several independent random variables satisfying a relaxed bounded difference property. Theorem 14. Consider a general real-valued function of n independent random variables z = f (x1 , x2 , . . . , xn ) and zi denotes an xi -measurable random variable defined by zi = inf x0i f (x1 , x2 , . . . , x0i , . . . , xn ). Assume that the random variable z is such that there exists a constant ν > 0, for which, n X i=1 2 (z − zi ) ≤ ν VII. P ROOF OF THE P ROBABILISTIC k-RIC B OUND (T HEOREM 2)  δk A √ m B √ m   = sup z∈Rn , ||z||2 =1,||z||0 ≤k A √ m B √ m 2  −1 . z 2 (29) In order to find a probabilistic upper bound for δk , we intend to find a constant δ ∈ (0, 1) such that P(δk √Am √Bm ≥ δ) is arbitrarily close to zero. We therefore consider the tail event       2   B A √ √ E, sup z −1 ≥δ ,   m m z∈Rn ,   2 ||z||2 =1,||z||0 ≤k (30) and show that for m sufficiently large, P(E) can be driven arbitrarily close to zero. In other words,  δ serves  the constant B A √ √ . as a probabilistic upper bound for δk m m Let Uk be the set of all k or less sparse unit norm vectors in Rn . Then, using Proposition 12, the tail event in (30) can be rewritten as   T P(E) = P sup zT (A B) (A B) z − m2 ≥ δm2 z∈U  k   = P sup zT AT A ◦ BT B z − m2 ≥ δm2 z∈U  k  n X n X   = P sup zi zj aTi aj bTi bj − m2 ≥ δm2 z∈Uk i=1 j=1 8 where ai and bi denote the ith column of A and B, respectively. Further, by applying the triangle inequality and the union bound, we get ! n X 2 2 2 2 2 P(E) ≤ P sup zi ||ai ||2 ||bi ||2 − m ≥ αδm + z∈Uk i=1   n n X X zi zj aTi aj bTi bj z∈Uk i=1 j=1,j6=i P  sup ≥ (1 − α)δm2  . (31) In the above, α ∈ (0, 1) is a variational union bound parameter which can be optimized at a later stage. We now proceed to find separate upper bounds for each of the two probability terms in (31). The first probability term in (31) admits the following sequence of relaxations. ! n X 2 2 2 2 2 P sup zi ||ai ||2 ||bi ||2 − m ≥ αδm In step (d), β ∈ (0, 1) is a variational union bound parameter. Step (g) is once again the union bound and exploits the i.i.d. nature of the columns of A and B. Step (h) is obtained by setting β = αδ/4. Lastly, step (i) is the Hanson-Wright inequality (Theorem 13) applied to the subgaussian vector a1 . Next, we turn our attention to the second probability term in (31). It can be upper bounded as follows: sup n n X X z∈Uk i=1 j=1,j6=i ≤ sup ≤ n X z∈Uk i=1  (b) ≤ sup P ≤ P 2 2 (c) = P (d) n X [ n 2 2 ||ai ||2 ||bi ||2 − m2  P  2 2  i=1 (e) = (f ) ≤ (g) ≤ (h) ≤ (i) ≤ nP    2 2 ||a1 ||2 ||b1 ||2 − m2 ≥ αδm2 . 2 2 ||a1 ||2 − m ||b1 ||2 − m ≥ αβδm2   α(1 − β)δm 2 +2nP ||a1 ||2 − m ≥ 2   p 2 2nP ||a1 ||2 − m ≥ αβδm   α(1 − β)δm 2 +2nP ||a1 ||2 − m ≥ . 2    αδm αδ 2 4nP ||a1 ||2 − m ≥ 1− 2 4 nP 4ne 2 2 −cm α4Kδ4 o  . |zj | |uij vij | ! |zi | ||ai ||2 ||bi ||2 n X  |zj0 | |uij vij | , (33) j=1,j6=i z∈Uk i=1 j=1,j6=i  ≤ P  max sup 1≤i≤n z∈Uk n X  √ zj uij vij ≥ 4 2πKo2 (γ log n)3/2  j=1,j6=i n X (1 − α)δm2 |zi | ||ai ||2 ||bi ||2 ≥ √ + P sup 4 2πKo2 (γ log n)3/2 z∈Uk i=1 ! (.34) The following Lemmas provide upper bounds for the two tail probability terms in (34). 2 (1−αδ/4)  where uij , h ||aaii|| , aj i and vij , h ||bbii|| , bj i. From 2 2 the approximate rotational invariance of subgaussian random variables [32], it can be shown that the inner products uij and vij are also subgaussian with ||uij ||ψ2 = ||vij ||ψ2 ≤ c3 K, with c3 > 0 being a universal numerical constant. Using (33), and by applying the union bound, the second probability term in (31) can be written as the sum of following two tail probabilities.   n n X X zi zj aTi aj bTi bj ≥ (1 − α)δm2  P  sup  o ≥ αδm2  ||ai ||2 ||bi ||2 − m2 ≥ αδm2 n X sup n X j=1,j6=i 1≤i≤n z0 ∈Uk 1≤i≤n ≤ |zi | ||ai ||2 ||bi ||2   max sup 1≤i≤n    2 zi2 ||ai ||2 ||bi ||2 − m2 ≥ αδm2 max ||ai ||2 ||bi ||2 − m2 ≥ αδm2 n X z∈Uk i=1 ! 2 zi zj aTi aj bTi bj z∈Uk i=1 z∈Uk i=1 (a) 2 2 +m ||a||2 − m + m ||b||2 − m . (32) In the above, step (a) follows from the triangle inequality combined with the fact that zi2 ’s sum to one. The inequality in step (b) is a consequence of the fact that any nonnegative convex combination of n arbitrary numbers is at most the maximum among the n numbers. Step (c) is obtained by simply rewriting the tail event for the maximum of n random variables as the union of tail events for the individual random variables. Step (d) is obtained by using the union bound over values of index i ∈ [n]. Step (e) follows because the columns of A and B are i.i.d.. Step (f ) is the union bound combined with the fact that for any two vectors a, b ∈ Rm , the following triangle inequality holds:    2 2 2 2 ||a||2 ||b||2 − m2 ≤ ||a||2 − m ||b||2 − m Lemma 4. Let A and B be m × n random matrices as specified in Theorem 2. Let uij , h ||aaii|| , aj i and vij , 2 h ||bbii|| , bj i, where ai and bi denote the ith column of A and 2 B, respectively. Then,   n X √ P  max sup |zj ||uij vij | ≥ 4 2πKo2 (γ log n)3/2  1≤i≤n z∈Uk j=1,j6=i ≤ 2e n2(c2 γ−1) , (35) where Ko , max(K, 1) and c2 > 0 is a universal constant. Proof. See Appendix D. 9 Lemma 5. Let A and B be m × n random matrices with independent zero mean, unit variance, i.i.d. subgaussian entries satisfying ||Aij ||ψ2 = ||Bij ||ψ2 ≤ K. Then, ! n X (1 − α)δm2 P sup |zi | ||ai ||2 ||bi ||2 ≥ √ 4 2πKo2 (γ log n)3/2 z∈Uk i=1 ≤ 2ne cm −K 4 o , (36) √ 8 2πKo2 γ 3/2 √ k log3/2 (1−α)δ n. Here, Ko = max (K, 1) provided m ≥ and c > 0 is a universal constant. Proof. See Appendix E. By using Lemmas 4 and 5 together in (34), we get   n n X X P  sup zi zj aTi aj bTi bj ≥ (1 − α)δm2  z∈Uk i=1 j=1,j6=i ≤ 2e cm −K 4 to the dimensions of the input matrices, we had to resort to the randomness in their entries. Removing this randomness aspect of our results could be an interesting direction for future work. A PPENDIX A. Proof of Proposition 7 Proof. Since A is a correlation matrix, it admits the Schur decomposition, A = UΛUT , with unitary U and eigenvalue matrix Λ = diag(λ1 , λ2 , . . . , λn ). Since A is positive semidefinite, its nonnegative square-root exists and is given by A1/2 = UΛ1/2 UT . Consider n n X X 1/2 1/2 A1/2 ◦ A1/2 = λi ui uTi ◦ λj uj uTj i=1 = 4e + 2ne o ≤ 2(c γ−1) , (37) n2(c2 γ−1) n 2  √  3 8 2πKo2 γ 3/2 √ (2c2 γ−1)Ko4 log n 2 n, provided m ≥ max k log . (1−α)δ c Using (32) and (37) together in (31), we get = n X n X i=1 j=1 n X n X j=1 1/2 1/2 λi λj 1/2 1/2 λi λj   ui uTi ◦ uj uTj T (ui ◦ uj ) (ui ◦ uj ) .(39) i=1 j=1 Above, the second equality follows from the distributive property of the Hadamard product and the last step follows 4e 8e 4 [2]. Using (39), we can show that the rows  + ≤ 2(c γ−1) , (38) from Fact 7.6.2 in 1/2 P(E) ≤  2 2 2(c2 γ−1) 2 cα δ (1−αδ/4)2 m n n and columns of A ◦ A1/2 sum to one, as follows: −1 4 4Ko log n n n X n X  √  1/2 1/2 T 1/2 1/2 3 8 2πKo2 γ 3/2 √ (2c2 γ−1)ξKo4 log n (A ◦ A )1 = λi λj (ui ◦ uj ) (ui ◦ uj ) 1 2 provided m ≥ max k log n, , (1−α)δ c   i=1 j=1 4 n X n where ξ = max 1, α2 δ2 (1−αδ/4) . 2 X 1/2 1/2 T = λi λj (ui ◦ uj ) (ui ◦ 1) uj Lastly, by choosing α = 1/2, we get P(δk ≥ δ) = P(E) ≤ i=1 j=1 8en−2(c2 γ−1) , provided that n n X ! X √ 1/2 1/2 2 3/2√ 4 3 λi λj (ui ◦ uj ) uTi uj = (2c2 γ −1)ξKo 16 2πKo γ k log 2 n, m ≥ max log n , i=1 j=1 δ c n X   λi (ui ◦ ui ) = d (say). = 16 where ξ = max 1, γδ2 (1−δ/8)2 . Note that, in terms of k and i=1 √ n, the first term in the inequality for m scales as k log3/2 n; The above arguments follow from the orthonormality of it dominates the second term, which scales as log n. This ends the columns of U, and repeated application in Pn of Fact 7.6.1 our proof. 2 [2]. Note that for k ∈ [n], d(k) = λ(i) (u (k)) = i i=1 [UΛUT ]kk = Akk = 1. Thus, we have shown that (A1/2 ◦ VIII. C ONCLUSIONS A1/2 )1 = 1. Likewise, it can be shown that 1T (A1/2 ◦ In this work, we have analyzed the restricted isometry A1/2 ) = 1T . Thus, A1/2 ◦ A1/2 is doubly stochastic. property of the columnwise Khatri-Rao product matrix in terms of its restricted isometry constants. We gave two upper B. Proof of Lemma 3 bounds for the k-RIC of a generic columnwise Khatri-Rao Define y(i) , inf0 sup (z1 x1 + · · · + zi x0i + · · · + zn xn ). product matrix. The first k-RIC bound, a deterministic bound, xi z∈Rn ||z||≤1 is valid for the Khatri-Rao product of an arbitrary pair of Pn ∗ sup input matrices of the same size with normalized columns. Further, let z , arg j=1 zj xj . Since xi are nonn z∈R ,||z||2 ≤1 It is conveniently computed in terms of the k-RICs of the negative, clearly z∗ is a nonnegative, unit norm vector. Then, input matrices. We also gave a probabilistic RIC bound for for i ∈ [n], the columnwise KR product of a pair of random matrices with   i.i.d. subgaussian entries. The probabilistic RIC bound is one n n X X 0  of the key components needed for computing tight sample y − y(i) = sup zj xj − inf0 sup  zj xj + zi0 x0i    xi z0 ∈Rn , complexity bounds for several machine learning algorithms. z∈Rn , j=1 j=1, 0 ||z||2 ≤1 ||z ||2 ≤1 j6=i The analysis of the RIP of Khatri-Rao product matrices in   this article can be extended in multiple ways. The current RIC n n X X bounds can be extended to the Khatri-Rao product of three or ≤ zj∗ xj − inf0  zj∗ xj + zi∗ x0i  xi more matrices. More importantly, in order to relate the RICs j=1 j=1,j6=i 10   = zi∗ xi − inf0 x0i = zi∗ xi . a,b m×n × Rm×n : x1 = a, y1 = b} (40) Let E2 , E2 ∩{(X, Y) ∈ R denote the set of matrix tuples (X, Y) with their first columns  Pn fixed as a and b ∈ Rm , respectively. Then, conditioned ∗ (i) 2 Since ≤ i ≤ b and ||z ||2 ≤ 1, we have i=1 y − y Pn x∗2 on E2a,b , the random variables |u1j v1j |, 2 ≤ j ≤ n are 2 2 z b ≤ b . Finally, by invoking Theorem 14 with ν = i=1 i i.i.d., bounded and nonnegative random variables. By applying b2 , we obtain the desired tail bound for y. Lemma 3, it follows that   n n X X C. Proof of Proposition 15 P  sup |zj ||uij vij | − E sup |zj ||u1j v1j | ≥ t E2a,b  z∈Uk j=2 z∈Uk j=2 The said upper bound for Ez can be derived as shown below. Z ∞ Z ∞ 2 4 2 2 ≤ e−t /8K γ log n . (43) P(z ≥ r + Ez)dr P(z ≥ t)dt = Ez = Z −Ez Z0 ∞ It is to be noted here that the above tail bound in the RHS ∞ 2 √ 2 − r2ν −r /2ν does not depend on a and b. This leads to an interesting e e dr ≤ ≤ dr ≤ 2πν. −∞ −Ez consequence explained in the following discourse. a,b Let T be an event such that P(T ≤ η, where η is S |E2 ) a,b independent of a, b. Since E2 = a,b∈Rn E2 , we have   D. Proof of Lemma 4 a,b n (T ∩ E P ∪ a,b∈R 2 P(T ∩ E2 ) = P(T |E2 ) = Let Q ⊆ (Rm×n × Rm×n ) be the collection of matrix P(E ) P(E ) 2 2 tuples (X, Y) satisfying |uij vij | < 2K 2 γ log n for all 1 ≤ R R a,b a,b a,b xT P(T ∩ E P(T |E ) i xj 2 2 )P(E2 ) a,b a,b i, j ≤ n, j 6= i, where uij and vij are evaluated as h ||xi || i and = = 2 P(E2 ) P(E2 ) yT y h ||yi i ||j i, respectively. Then, for subgaussian random matrices R a,b 2 P(E2 ) P(E2 ) A, B as defined in Lemma 4, a,b =η = η. (44) ≤η   P(E2 ) P(E2 )   [  Coming back to our proof, using similar arguments as |uij vij | ≥ 2K 2 γ log n  P ((A, B) ∈ / Q) = P   above5 and on account of the tail bound in the RHS in (43)  1≤i,j≤n being independent of a and b, it follows that j6=i   X (a)  n n X X ≤ P |uij vij | ≥ 2K 2 γ log n |zj ||u1j v1j | ≥ t E2  |zj ||uij vij | − E sup P  sup xi (b) ≤ 1≤i,j≤n j6=i 2  n P |u12 v12 | ≥ 2K 2 γ log n 2   √ p n2 P |u12 | ≥ 2K γ log n z∈Uk j=2 z∈Uk j=2 2 ≤ e−t /8K 4 γ 2 log2 n . (45) Further, using Proposition 15, the probability term in the LHS of the inequality in (45) can be replaced by a smaller ≤ probability term as shown below. (d) e   2 −2c1 γ log n ≤ en e = 2(c γ−1) . (41) n X √ n 1 |zj ||u1j v1j | ≥ t + 2 2πK 2 γ log n E2  P  sup In the above, steps (a), (b), and (c) are obtain by applying z∈Uk j=2 the union bound over n2 combinations of distinct (i, j) pairs 2 2 2 2 ≤ e−t /8K γ log n . and exploiting the identical subgaussian tails of the random variables uij and vij , i 6= j. Step (d) is simply the standard Setting t = 4K(γ log n)3/2 , we get subgaussian tail bound, with c1 > 0 a universal constant. Thus,   n for γ > 1/c1 , the random variable |uij vij |, i 6= j, is uniformly X √ 3 1 Psup |zj ||u1j v1j | ≥ 4 2πKo2 (γ log n) 2 E2  ≤ 2γ . bounded by 2K 2 γ log n with arbitrarily high probability, for n z∈Uk j=2 sufficiently large n. (46) Let E2 denote the event that the matrix tuple (A, B) ∈ Q. Finally, by combining (41), (42) and (46), we obtain the Then, by the law of total probability, we have desired tail bound:     n X n X √ P  max sup |zj ||uij vij | ≥ t P  max sup |zj ||uij vij | ≥ 4 2πKo2 (γ log n)3/2  1≤i≤n z∈Uk j=1,j6=i 1≤i≤n z∈Uk j=1,j6=i   n X 1 e 2e ≤ 2γ−1 + 2(c γ−1) ≤ 2(c γ−1) , (47) ≤ P  max sup |zj ||uij vij | ≥ t E2  + P(E2c ) 1 n n n 2 1≤i≤n z∈Uk j=1,j6=i   where c2 = min (c1 , 1) is a universal positive constant. n X 5 The tail bound in (45) can also be obtained by using the law of total ≤ nP  sup |zj ||u1j v1j | ≥ t E2  + P(E2c ). (42) (c) z∈Uk j=2 probability extended to conditional probabilities. 11 E. Proof of Lemma 5 Consider the tail event ) ( n X (1 − α)δm2 . E3 = sup |zi | ||ai ||2 ||bi ||2 ≥ √ 4 2πKo2 (γ log n)3/2 z∈Uk i=1 (48) While bounding the tail probability P(E3 ), the supremum with respect to z can be circumvented as shown below. ! n X (1 − α)δm2 |zi | √ ||ai ||2 ||bi ||2 ≥ √ P(E3 ) = P sup 3 4 2πkKo2 (γ log n) 2 z∈Uk i=1 k   (1 − α)δm2 . (49) ≤ P max ||ai ||2 ||bi ||2 ≥ √ 1≤i≤n 4 2πkKo2 (γ log n)3/2 The above inequality is obtained by observing that since z has unit P`2 -norm, by Cauchy-Schwarz inequaln ity, we have √1k i=1 |zi | ≤ 1. Consequently, the linPn zi √ ||ai ||2 ||bi ||2 can be at most ear combination i=1 k max1≤i≤n ||ai ||2 ||bi ||2 , a quantity independent of z. Since ai and bi , the column vectors of A and B, respectively, are i.i.d., the following series of union bounds apply.   (1 − α)δm2 √ P(E3 ) ≤ nP ||a1 ||2 ||b1 ||2 ≥ 4 2πkKo2 (γ log n)3/2 s ! (1 − α)δm2 √ ≤ 2nP ||a1 ||2 ≥ 4 2πkKo2 (γ log n)3/2    (1 − α)δm 2 ≤ 2nP ||a1 ||2 −m ≥ m √ −1 .(50) 4 2πkKo2 (γ log n)3/2 ≤ P  (1−α)δm √ √ 2 γ 3/2 k(log n)3/2 4 2πKo  −1 +P  sup o and show that for sufficiently large m, P(E1 ) can be driven arbitrarily close to zero, thereby√implying√that δ is a probabilistic upper bound for δk ((A/ m A/ m)). Now, P(E1 ) admits the following union bound:   T P(E1 ) = P sup zT (A A) (A A) z − m2 ≥ δm2 z∈U  k   = P sup zT AT A ◦ AT A z − m2 ≥ δm2 z∈U  k  n X n X  2 = P  sup zi zj aTi aj − m2 ≥ δm2  z∈Uk i=1 j=1 2 ||ai ||4 2 2 ≥ αδm −m  n n X X aTi aj 2 ≥ (1 − α)δm2  .(53) In the above, the second identity follows from Proposition 12. The last inequality uses the triangle inequality followed by the union bound, with α ∈ (0, 1) being a variational parameter to be optimized later. Similar to the proof of Theorem 2, we now derive separate upper bounds for each of the two probability terms in (53). The first term in (53) admits the following series of relaxations. ! n X 4 2 2 2 P sup zi ||ai ||2 − m ≥ αδm z∈Uk i=1 (a) ≤ sup P n X z∈Uk i=1 ! 4 zi2 ||ai ||2 − m2 ≥ αδm2  (b) 4 max ||ai ||2 1≤i≤n 2  P (c)  4 ||a1 ||2 − m2 ≥ αδm2 .   2 2 2 nP ||a1 ||2 − m ≥ αβδm   α(1 − β)δm 2 +2nP ||a1 ||2 − m ≥ 2   p 2 nP ||a1 ||2 − m ≥ αβδm   α(1 − β)δm 2 +2nP ||a1 ||2 − m ≥ . 2    αδm αδ 2 3nP ||a1 ||2 − m ≥ 1− 2 4 (d) ≤ (e) ≤ (f ) ≤ (g) ≤ nP −m 2 ≤ ≤ 4 F. Proof Sketch for Theorem 3 The proof of Theorem 3 is along similar lines as that of Theorem 2; the sketch here focuses on the differences in the steps. We consider the tail event ( )  2  A A √ √ E1 , sup z −1 ≥δ , (52) m m z∈Uk 2 ! zi2 zi zj z∈Uk i=1 j=1,j6=i ≤ 2ne−cm/Ko . (51)   √ 8 2πKo2 γ 3/2 √ 3/2 k(log n) , and with c > 0 provided m ≥ (1−α)δ being a universal constant. P(E3 ) ≤ 2ne z∈Uk i=1  Since a1 is a subgaussian vector with independent entries, by the Hanson-Wright concentration inequality in Theorem 13, the desired tail probability can be obtained as follows: cm −K 4 sup n X ≥ αδm  2 2 −cm α4Kδ4 (1−αδ/4)2 3ne o . (54) In the above, step (a) is the triangle inequality. The inequality in step (b) follows from the fact that nonnegative convex combination of n arbitrary numbers is at most the maximum among the n numbers. Step (c) is a union bound. Step (d) is also a union bounding argument with β ∈ (0, 1) as a variational parameter, combined with the fact that for any vec4 2 tor a, the triangle inequality ||a||2 − m2 ≤ ||a||2 − m 2 ||a||2 2 + 2m − m is always true. Step (f ) is obtained by choosing the union bound parameter β = αδ/4. Finally, step (g) is the Hanson-Wright inequality (Theorem 13) applied to the subgaussian vector a1 . We now derive an upper bound for the second probability term in (53). Note that sup n n X X z∈Uk i=1 j=1,j6=i ≤ sup n X z∈Uk i=1 zi zj aTi aj  2 |zi | ||ai ||2  2 n X j=1,j6=i  |zj |u2ij  12 ≤ n X sup z∈Uk i=1 ! n X 2 |zi | ||ai ||2  max sup 1≤i≤n z0 ∈U k  |zj0 |u2ij ,(55) j=1, j6=i where uij , h ||aaii|| , aj i. The inner product uij is a subgaus2 sian random variable satisfying ||uij ||ψ2 ≤ c4 K, where c4 is a universal numerical constant. Using (55) in (53) yields the following union bound.   n n X X  2 ≥ (1 − α)δm2  P  sup zi zj aTi aj z∈Uk i=1 j=1,j6=i  ≤   P  max sup 1≤i≤n z0 ∈Uk +P sup n X z∈Uk i=1 n X j=1 j6=i √  |zj0 |u2ij ≥ 4 2πKo2 (γ log n)3/2   2 |zi | ||ai ||2 (1 − α)δm2 ≥ √ 4 2πKo2 (γ log n)3/2 ! . (56) The following Lemmas 6 and 7 provide upper bounds for the two tail probability terms occurring in the RHS of (56). provided m ≥ max where ξ = max 1, Proof. See Appendix G. Lemma 7. Let A be an m×n random matrix with zero mean, unit variance, i.i.d. subgaussian entries satisfying ||Aij ||ψ2 ≤ K. Then, ! n X (1 − α)δm2 − cm 2 |zi | ||ai ||2 ≥ √ P sup ≤ ne Ko4 , 2 3/2 4 2πKo (γ log n) z∈Uk i=1 (57) √ 8 2πKo2 γ 3/2 √ 3/2 provided m ≥ k log n. Here, c > 0 is a (1−α)δ universal constant. Proof. The proof is similar to that of Lemma 5, which is given in Appendix E. By using the tail probability bounds in Lemmas 6 and 7 together in (56), we obtain the following upper bound.   n n X X  2 P  sup zi zj aTi aj ≥ (1 − α)δm2  z∈Uk i=1 j=1,j6=i e ≤ e −cm/Ko4 1 + ne = 2(c γ−1) + ( cm −1) n2(c2 γ−1) n 2 n Ko4 log n 2e ≤ . (58) n2(c2 γ−1) The  √ above inequality is true for m ≥  3 8 2πKo2 γ 3/2 √ (2c2 γ−1)Ko4 log n 2 max k log n, . By combining (1−α)δ c (54), (56) and (58), we obtain the following tail bound. P(E) ≤ 3  n  cα2 δ 2 (1−αδ/4)2 m −1 4 log n 4Ko + 4 α2 δ 2 (1−αδ/4)2 (2c2 γ−1)ξKo4 log n c  n, , . Finally, by choosing −2(c2 γ−1) α = 1/2, we have P(E) ≤ 4en , provided that  √ 16 2πKo2 γ 3/2 √ (2c2 γ−1)ξKo4 3/2 m ≥ max k log n, log n , δ c   16 with ξ = max 1, δ2 (1−δ/8)2 . Note that, in terms of k and √ n, the first term in the inequality for m scales as k log3/2 n; it dominates the second term, which scales as log n. G. Proof of Lemma 6 Let W ⊆ Rm×n be the collection of all m × n sized matrices X with columns xi , i ∈ [n], and satisfying |uij | , √ |xT i xj | ||xi ||2 < K 2γ log n for all 1 ≤ i, j ≤ n, j 6= i. Then, for a subgaussian random matrix A,   n o [ p P (A ∈ / W) = P  |uij | ≥ K 2γ log n  1≤i,j≤n, j6=i   p P |uij | ≥ K 2γ log n X ≤ Lemma 6. Let A be an m × n random matrix as specified in Theorem 3. Let uij , h ||aaii|| , aj i. Then, 2   n X √ 3 e Pmax sup |zj |u2ij ≥ 4 2πKo2 (γ log n) 2≤ 2(c γ−1) , 1≤i≤n z∈Uk n 2 j=1,j6=i where Ko , max (K, 1) and c2 > 0 is a universal constant. √ 3 8 2πKo2 γ 3/2√ k log 2  (1−α)δ   1≤i,j≤n, j6=i 2   p n P |u12 | ≥ K 2γ log n 2 en2 −2c1 γ log n e e = 2(c γ−1) , 2 2n 1 ≤ ≤ (60) where c1 > 0 is a universal constant. In the above, the first and second inequalities are due to the union bound and the identically distributed nature of uij , j 6= i. The last inequality is simply the subgaussian tail √ bound. Thus, for γ ≥ 1/c1 , and for sufficiently large n, K 2γ log n acts as a uniform upper bound for the random variables |uij |, j 6= i with arbitrarily high probability. Let E3 denote the event that the matrix A ∈ W. Then, by law of total probability,   n X P  max sup |zj ||uij |2 ≥ t 1≤i≤n z∈Uk j=1,j6=i  ≤ P  max sup 1≤i≤n z∈Uk  ≤ nP  sup n X z∈Uk j=2 n X  |zj ||uij |2 ≥ t E3  + P(E3c ) j=1,j6=i  |zj ||u1j |2 ≥ t E3  + P(E3c ). (61) Conditioned on event E3 and the column a1 assuming some fixed value, the random variables |u1j |2 are bounded, nonnegative and i.i.d. random variables. By Lemma 3, it follows that   n n X X P  sup |zj ||u1j |2 − E sup |zj ||u1j |2 ≥ t E3 , a1  z∈Uk j=2 z∈Uk j=2 2 ≤ e−t /8K 4 γ 2 log2 n . (62) 2e 4e ≤ 2(c γ−1) , (59) Since the above tail probability bound is independent of n2(c2 γ−1) n 2 a1 , it remains unchanged after marginalizing the conditional 13 probability in the LHS over all values of a1 , i.e.,   n n X X P  sup |zj ||u1j |2 − E sup |zj ||u1j |2 ≥ t E3  z∈Uk j=2 z∈Uk j=2 ≤ e−t 2 /8K 4 γ 2 log2 n . (63) Further, using Proposition 15, the probability term in the LHS of the inequality in (63) can be replaced by a smaller tail probability as shown below.   n X √ P  sup |zj ||uij |2 ≥ t + 2 2πK 2 γ log n E3  z∈Uk j=2 2 ≤ e−t /8K 2 γ 2 log2 n . 3/2 Setting t = 4K(γ log n) , we get   n X √ 1 P sup |zj ||u1j |2 ≥ 4 2πKo2 (γ log n)3/2 E3 ≤ 2γ . n z∈Uk j=2 (64) Finally, by combining (60), (61) and (64), we obtain the desired tail bound.   n X √ P  max sup |zj ||uij |2 ≥ 4 2πKo2 (γ log n)3/2  1≤i≤n z∈Uk j=1,j6=i 1 e e + 2(c γ−1) ≤ 2(c γ−1) , n2γ−1 2n 1 n 2 where c2 = min (1, c1 ) is a universal positive constant. ≤ R EFERENCES [1] C. G. Khatri and C. R. Rao, “Solutions to some functional equations and their applications to characterization of probability distributions,” Sankhya: The Indian Journal of Statistics, Series A (1961-2002), vol. 30, no. 2, pp. 167–180, 1968. [2] D. S. Bernstein, Matrix Mathematics: Theory, Facts, and Formulas (Second Edition). Princeton University Press, 2009. [3] S. Liu and G. Trenkler, “Hadamard, Khatri-Rao, Kronecker and other matrix products,” International Journal of Information and System Sciences, vol. 4, no. 1, pp. 160–177, 2007. [4] M. F. Duarte and R. G. Baraniuk, “Kronecker compressive sensing,” IEEE Trans. Image Process., vol. 21, no. 2, pp. 494–504, Feb. 2012. [5] A. Koochakzadeh and P. Pal, “Sparse source localization in presence of co-array perturbations,” in International Conference on Sampling Theory and Applications (SampTA), May 2015, pp. 563–567. [6] D. Romero, D. D. Ariananda, Z. Tian, and G. Leus, “Compressive covariance sensing: Structure-based compressive sensing beyond sparsity,” IEEE Signal Process. Mag., vol. 33, no. 1, pp. 78–93, Jan. 2016. [7] G. Dasarathy, P. Shah, B. N. Bhaskar, and R. D. Nowak, “Sketching sparse matrices, covariances, and graphs via tensor products,” IEEE Trans. Inf. Theory, vol. 61, no. 3, pp. 1373–1388, Mar. 2015. [8] W. K. Ma, T. H. Hsieh, and C. Y. Chi, “DOA estimation of quasistationary signals with less sensors than sources and unknown spatial noise covariance: A Khatri-Rao subspace approach,” IEEE Trans. Signal Process., vol. 58, no. 4, pp. 2168–2180, Apr. 2010. [9] N. D. Sidiropoulos and A. Kyrillidis, “Multi-way compressed sensing for sparse low-rank tensors,” IEEE Signal Process. Lett., vol. 19, no. 11, pp. 757–760, Nov. 2012. [10] D. L. Donoho, M. Elad, and V. N. Temlyakov, “Stable recovery of sparse overcomplete representations in the presence of noise,” IEEE Trans. Inf. Theory, vol. 52, no. 1, pp. 6–18, Jan. 2006. [11] S. Foucart and H. Rauhut, A Mathematical Introduction to Compressive Sensing. Birkhäuser Basel, 2013. [12] E. J. Candès, J. K. Romberg, and T. Tao, “Stable signal recovery from incomplete and inaccurate measurements,” Communications on Pure and Applied Mathematics, vol. 59, no. 8, pp. 1207–1223, 2006. [13] E. J. Candes and T. Tao, “Decoding by linear programming,” IEEE Trans. Inf. Theory, vol. 51, no. 12, pp. 4203–4215, Dec 2005. [14] R. Baraniuk, M. Davenport, R. DeVore, and M. Wakin, “A simple proof of the restricted isometry property for random matrices,” Constructive Approximation, vol. 28, no. 3, pp. 253–263, 2008. [15] T. T. Cai, L. Wang, and G. Xu, “New bounds for restricted isometry constants,” IEEE Trans. Inf. Theory, vol. 56, no. 9, pp. 4388–4394, Sept 2010. [16] P. Pal and P. P. Vaidyanathan, “Pushing the limits of sparse support recovery using correlation information,” IEEE Trans. Signal Process., vol. 63, no. 3, pp. 711–726, Feb. 2015. [17] D. P. Wipf and B. D. Rao, “An empirical Bayesian strategy for solving the simultaneous sparse approximation problem,” IEEE Transactions on Signal Processing, vol. 55, no. 7, pp. 3704–3716, Jul. 2007. [18] S. Khanna and C. R. Murthy, “On the support recovery of jointly sparse Gaussian sources using sparse Bayesian learning,” CoRR, vol. abs/1703.04930. [Online]. Available: http://arxiv.org/abs/1703.04930 [19] C. Carathéodory and L. Fejér, “Uber den zusammenhang der extremen von harmonischen funktionen mit ihren koeffizienten un uber den picardlandauschen satz,” Rendiconti del Circolo Matematico di Palermo, vol. 32, no. 1, pp. 218–239, 1911. [20] P. Stoica and R. Moses, Spectral Analysis of Signals. Pearson Prentice Hall, 2005. [21] Z. Yang, L. Xie, and P. Stoica, “Vandermonde decomposition of multilevel Toeplitz matrices with application to multidimensional superresolution,” IEEE Trans. Inf. Theory, vol. 62, no. 6, pp. 3685–3701, Jun. 2016. [22] N. D. Sidiropoulos and A. Kyrillidis, “Multi-way compressed sensing for sparse low-rank tensors,” IEEE Signal Processing Letters, vol. 19, no. 11, pp. 757–760, Nov. 2012. [23] D. Nion and N. D. Sidiropoulos, “A PARAFAC-based technique for detection and localization of multiple targets in a MIMO radar system,” in Proc. ICASSP, 2009, pp. 2077–2080. [24] A. M. Tillmann and M. E. Pfetsch, “The computational complexity of the restricted isometry property, the nullspace property, and related concepts in compressed sensing,” IEEE Trans. Inf. Theory, vol. 60, no. 2, pp. 1248–1259, Feb. 2014. [25] R. A. Horn and C. R. Johnson, Eds., Matrix Analysis. Cambridge University Press, 1986. [26] S. Jokar, “Sparse recovery and Kronecker products,” in 44th Annual Conference on Information Sciences and Systems, Mar. 2010, pp. 1–4. [27] A. Bhaskara, M. Charikar, A. Moitra, and A. Vijayaraghavan, “Smoothed analysis of tensor decompositions,” in Proceedings of the 46th Annual ACM Symposium on Theory of Computing, 2014, pp. 594–603. [28] J. Anderson, M. Belkin, N. Goyal, L. Rademacher, and J. R. Voss, “The more, the merrier: the blessing of dimensionality for learning large Gaussian mixtures,” in 27th Annual Conference on Learning Theory, Jun. 2014, pp. 1135–1164. [29] N. D. Sidiropoulos and R. Bro, “On the uniqueness of multilinear decomposition of N-way arrays,” Journal of Chemometrics, vol. 14, no. 3, pp. 229–239, 2000. [30] P. Koiran and A. Zouzias, “Hidden cliques and the certification of the restricted isometry property,” IEEE Trans. Inf. Theory, vol. 60, no. 8, pp. 4999–5006, Aug. 2014. [31] S. Khanna and C. R. Murthy, “Rényi divergence based covariance matching pursuit of joint sparse support,” in Sig. Process. Advances in Wireless Commun. (SPAWC), Jul. 2017, pp. 1 – 5. [32] R. Vershynin, “Introduction to the non-asymptotic analysis of random matrices,” 2010. [33] J. A. Tropp, “Greed is good: algorithmic results for sparse approximation,” IEEE Trans. Inf. Theory, vol. 50, no. 10, pp. 2231–2242, Oct. 2004. [34] G. Visick, “A quantitative version of the observation that the Hadamard product is a principal submatrix of the Kronecker product,” Linear Algebra and its Applications, vol. 304, no. 13, pp. 45 – 68, 2000. [35] R. A. Horn and C. R. Johnson, Topics in Matrix Analysis. Cambridge; New York: Cambridge University Press, 1994. [36] B. Mond and J. E. Pec̆arić, “Inequalities for the Hadamard product of matrices,” SIAM J. Matrix Anal. Appl., vol. 19, no. 1, pp. 66–70, Jan. 1998. [37] H. J. Werner, “Hadamard product of square roots of correlation matrices,” Image, vol. 26, pp. 1–32, Apr. 2001. [38] A. W. Marshall and I. Olkin, “Reversal of the Lyapunov, Hölder, and Minkowski inequalities and other extensions of the Kantorovich inequality,” Journal of Mathematical Analysis and Applications, vol. 8, no. 3, pp. 503 – 514, 1964. 14 [39] S. Liu and H. Neudecker, “Several matrix Kantorovich-type inequalities,” Journal of Mathematical Analysis and Applications, vol. 197, no. 1, pp. 23 – 26, 1996. [40] ——, “Kantorovich inequalities and efficiency comparisons for several classes of estimators in linear models,” Statistica Neerlandica, vol. 51, no. 3, pp. 345–355, 1997. [41] S. Liu, “On the Hadamard product of square roots of correlation matrices,” Econometric Theory, vol. 18, no. 4, p. 1007, Aug. 2002. [42] C. R. Rao and M. B. Rao, Matrix Algebra and Its Applications to Statistics and Econometrics. Singapore: World Scientific, 1998. [43] R. Adamczak, “A note on the Hanson-Wright inequality for random vectors with dependencies,” Electron. Commun. Probab., vol. 20, pp. 72–84, 2015. [44] M. Rudelson and R. Vershynin, “Hanson-Wright inequality and subgaussian concentration,” Electron. Commun. Probab., vol. 18, pp. 82–91, 2013. [45] S. Boucheron, G. Lugosi, and P. Massart, Concentration Inequalities: A Nonasymptotic Theory of Independence. Oxford University Press, 2013.
7cs.IT
Approximating Min-Cost Chain-Constrained Spanning Trees: A Reduction from Weighted to Unweighted Problems∗ arXiv:1605.03203v1 [cs.DS] 10 May 2016 André Linhares† Chaitanya Swamy† Abstract We study the min-cost chain-constrained spanning-tree (abbreviated MCCST) problem: find a mincost spanning tree in a graph subject to degree constraints on a nested family of node sets. We devise the first polytime algorithm that finds a spanning tree that (i) violates the degree constraints by at most a constant factor and (ii) whose cost is within a constant factor of the optimum. Previously, only an algorithm for unweighted CCST was known [14], which satisfied (i) but did not yield any cost bounds. This also yields the first result that obtains an O(1)-factor for both the cost approximation and violation of degree constraints for any spanning-tree problem with general degree bounds on node sets, where an edge participates in a super-constant number of degree constraints. A notable feature of our algorithm is that we reduce MCCST to unweighted CCST (and then utilize [14]) via a novel application of Lagrangian duality to simplify the cost structure of the underlying problem and obtain a decomposition into certain uniform-cost subproblems. We show that this Lagrangian-relaxation based idea is in fact applicable more generally and, for any cost-minimization problem with packing side-constraints, yields a reduction from the weighted to the unweighted problem. We believe that this reduction is of independent interest. As another application of our technique, we consider the k-budgeted matroid basis problem, where we build upon a recent 1.5 rounding algorithm of [4] to obtain an improved nO(k /ǫ) -time algorithm that returns a solution that satisfies (any) one of the budget constraints exactly and incurs a (1 + ǫ)-violation of the other budget constraints. 1 Introduction Constrained spanning-tree problems, where one seeks a minimum-cost spanning tree satisfying additional ({0, 1}-coefficient) packing constraints, constitute an important and widely-studied class of problems. In particular, when the packing constraints correspond to node-degree bounds, we obtain the classical mincost bounded-degree spanning tree (MBDST) problem, which has a rich history of study [7, 11, 12, 5, 8, 16] culminating in the work of [16] that yielded an optimal result for MBDST. Such degree-constrained networkdesign problems arise in diverse areas including VLSI design, vehicle routing and communication networks (see, e.g., the references in [15]), and their study has led to the development of powerful techniques in approximation algorithms. Whereas the iterative rounding and relaxation technique introduced in [16] (which extends the iterativerounding framework of [10]) yields a versatile technique for handling node-degree constraints (even for more-general network-design problems), we have a rather limited understanding of spanning-tree problems with more-general degree constraints, such as constraints |T ∩ δ(S)| ≤ bS for sets S in some (structured) ∗ A preliminary version [13] will appear in the Proceedings of the 18th IPCO, 2016. {alinhare,cswamy}@uwaterloo.ca. Dept. of Combinatorics and Optimization, University of Waterloo, Waterloo, ON N2L 3G1. Research supported partially by the second author’s NSERC grant 327620-09, NSERC Discovery Accelerator Supplement Award, and Ontario Early Researcher Award. † 1 family S of node sets.1 A fundamental impediment here is our inability to leverage the techniques in [8, 16]. The few known results yield: (a) (sub-) optimal cost, but a super-constant additive- or multiplicative- factor violation of the degree bounds [3, 1, 6, 2]; or (b) a multiplicative O(1)-factor violation of the degree bounds (when S is a nested family), but no cost guarantee [14]. In particular, in stark contrast to the results known for node-degree-bounded network-design problems, there is no known algorithm that yields an O(1)-factor cost approximation and an (additive or multiplicative) O(1)-factor violation of the degree bounds. (Such guarantees are only known when each edge participates in O(1) degree constraints [2]; see however [17] for an exception.) We consider the min-cost chain-constrained spanning-tree (MCCST) problem introduced by [14], which is perhaps the most-basic setting involving general degree bounds where there is a significant gap in our understanding vis-a-vis node-degree bounded problems. In MCCST, we are given an undirected connected graph G = (V, E), nonnegative edge costs {ce }, a nested family S (or chain) of node sets S1 ( S2 ( · · · ( Sℓ ( V , and integer degree bounds {bS }S∈S . The goal is to find a minimum-cost spanning tree T such that |δT (S)| ≤ bS for all S ∈ S, where δT (S) := T ∩ δ(S). Olver and Zenklusen [14] give an algorithm for unweighted CCST that returns a tree T such that |δT (S)| = O(bS ) (i.e., there is no bound on c(T )), and show that, for some ρ > 0, it is NP-complete to obtain an additive ρ · logloglog|V|V| | violation of the degree bounds. We therefore focus on bicriteria (α, β)-guarantees for MCCST, where the tree T returned satisfies c(T ) ≤ α · OPT and |δT (S)| ≤ β · bS for all S ∈ S.  Our contributions. Our main result is the first O(1), O(1) -approximation algorithm for MCCST. Given λ ·OPT and |δT (S)| ≤ 9λ·bS for all S ∈ S, using any λ > 1, our algorithm returns a tree T with c(T ) ≤ λ−1 the algorithm of [14] for unweighted CCST, denoted AOZ , as a black box (Theorem 3.3). As noted above, this is also the first algorithm that achieves an O(1), O(1) -approximation for any spanning-tree problem with general degree constraints where an edge belongs to a super-constant number of degree constraints. We show in Section 4 that our techniques are applicable more generally. We give a reduction showing that for any cost-minimization problem with packing side-constraints, if we have an algorithm for the unweighted problem that returns a solution with an O(1)-factor violation of the packing constraints and satisfies a certain property, then one can utilize it to obtain an O(1), O(1) -approximation for the costminimization problem. Furthermore, we show that if the algorithm for the unweighted counterpart satisfies  a stronger property, then we can utilize it to obtain a 1, O(1) -approximation (Theorem 5.1). We believe that our reductions are of independent interest and will be useful in other settings as well. Demonstrating this, we show an application to the k-budgeted matroid basis problem, wherein we seek to 2 find a basis satisfying k budget constraints. Grandoni et al. [9] devised an nO(k /ǫ) -time algorithm that returned a (1, 1 + ǫ, . . . , 1 + ǫ)-solution: i.e., the solution satisfies (any) one budget constraint exactly and violates the other budget constraints by a (1+ǫ)-factor (if the problem is feasible). Very recently, Bansal and 1.5 Nagarajan [4] improved the running time to nO(k /ǫ) but return only a (1+ǫ, . . . , 1+ǫ)-solution. Applying our reduction (to the algorithm in [4]), we obtain the best of both worlds: we return a (1, 1 + ǫ, . . . , 1 + ǫ)1.5 solution in nO(k /ǫ) -time (Theorem 5.7). The chief novelty in our algorithm and analysis, and the key underlying idea, is an unorthodox use of Lagrangian duality. Whereas typically Lagrangian relaxation is used to drop complicating constraints and thereby simplify the constraint structure of the underlying problem, in contrast, we use Lagrangian duality to simplify the cost structure of the underlying problem by equalizing edge costs in certain subproblems. To elaborate (see Section 3.1), the algorithm in [14] for unweighted CCST can be viewed as taking a solution x to the natural linear-programming (LP) relaxation for MCCST, converting it to another feasible solution x′ satisfying a certain structural property, and exploiting this property to round x′ to a spanning tree. The main 1 Such general degree constraints arise in the context of finding thin trees [1], where S consists of all node sets, which turn out to be a very useful tool in devising approximation algorithms for asymmetric TSP. 2 bottleneck here in handling costs (as also noted in [14]) is that c⊺ x′ could be much larger than c⊺ x since the conversion ignores the ce s and works with an alternate “potential” function. ∗ Our crucial insight is that we can exploit Lagrangian duality to obtain perturbed edge costs {cye } such that the change in perturbed cost due to the conversion process is ∗bounded. Loosely speaking, if y y∗ the conversion process shifts weight from xf to xe , then we ensure that ce = cf (see Lemma 3.5); thus, ∗ ∗ (cy )⊺ x = (cy )⊺ x′ ! The perturbation also ensures that applying AOZ to x′ yields a tree whose perturbed cost ∗ ∗ ∗ is equal to (cy )⊺ x′ = (cy )⊺ x. Finally, we show that for an optimal LP solution x∗ , the “error” (cy − c)⊺ x∗ ∗ incurred in working with the cy -cost is O(OPT ); this yields the O(1), O(1) -approximation. We extend the above idea to an arbitrary cost-minimization problem with packing side-constraints as follows. Let x∗ be an optimal solution to the LP-relaxation, and P be the polytope obtained by dropping the packing constraints. We observe that the same Lagrangian-duality based perturbation ensures that all points on the minimal face of P containing x∗ have the same perturbed cost. Therefore, if we have an algorithm for the unweighted problem that rounds x∗ to a point x̂ on this minimal face, then we again obtain that ∗ ∗ (cy )⊺ x̂ = (cy )⊺ x∗ , which then leads to an O(1), O(1) -approximation (as in the case of MCCST). Related work. Whereas node-degree-bounded spanning-tree problems have been widely studied, relatively few results are known for spanning-tree problems with general degree constraints for a family S of node-sets. With the exception of the result of [14] for unweighted CCST, these other results [3, 1, 6, 2] all yield a tree of cost at most the optimum with an ω(1) additive- or multiplicative- factor violation of the degree bounds. Both [3] and [2] obtain additive factors via iterative rounding and relaxation. The factor in [3] is (r − 1) for an arbitrary S, where r is the maximum number of degree constraints involving an edge (which could be |V | even when S is a chain), while [2] yields an O(log |V |) factor when S is a laminar family (the factor does not improve when S is a chain). The dependent-rounding techniques in [1, 6] yield a    tree T satisfying |δT (S)| ≤ min O logloglog|S||S| bS , (1 + ǫ)bS + O logǫ|S| for all S ∈ S, for any family S.  For MBDST, Goemans [8] obtained the first O(1), O(1) -approximation; his result yields a tree of cost at most the optimum and at most +2 violation of the degree bounds. This was subsequently improved to an (optimal) additive +1 violation by [16]. Zenklusen [17] considers an orthogonal generalization of MBDST, where there is a matroid-independence constraint on the edges incident to each node, and obtains a tree of cost at most the optimum and “additive” O(1) violation (defined appropriately) of the matroid constraints. To our knowledge, this is the only prior work that obtains an O(1)-approximation to both the cost and packing constraints for a constrained spanning-tree problem where an edge participates in ω(1) packing constraints (albeit this problem is quite different from spanning tree with general degree constraints). Finally, we note that our Lagrangian-relaxation based technique is somewhat similar to its use in [11]. However, whereas [11] uses this to reduce uniform-degree MBDST to the problem of finding an MST of minimum maximum degree, which is another weighted problem, we utilize Lagrangian relaxation in a more refined fashion to reduce the weighted problem to its unweighted counterpart. 2 An LP-relaxation for MCCST and preliminaries We consider the following natural LP-relaxation for MCCST. Throughout, we use e to index the edges of the underlying graph G = (V, E). For a set S ⊆ V , let E(S) denote {uv ∈ E : u, v ∈ S}, and δ(S) denote 3 the edges on the boundary of S. For a vector z ∈ RE and an edge-set F , we use z(F ) to denote min X ce xe P e∈F ze . (P) e s.t.  x E(S) ≤ |S| − 1 x(E) = |V | − 1  x δ(S) ≤ bS x ≥ 0. ∀∅ = 6 S(V ∀S ∈ S (1) (2) (3) (4) For any x ∈ RE + , let supp(x) := {e : xe > 0} denote the support of x. It is well known that the polytope, PST (G), defined by (1), (2), and (4) is the convex hull of spanning trees of G. We call points in PST (G) fractional spanning trees. We refer to (1), (2) as the spanning-tree constraints. We will also utilize (Pλ ),  the modified version of (P) where we replace (3) with x δ(S) ≤ λbS for all S ∈ S, where λ ≥ 1. Let OPT (λ) denote the optimal value of (Pλ ), and let OPT := OPT (1). Preliminaries. A family L ⊆ 2V of sets is a laminar family if for all A, B ∈ L, we have A ⊆ B or B ⊆ A or A ∩ B = ∅. As is standard, we say that A ∈ L is a child of L ∈ L if L is the minimal set of L such  L , E L ) be the graph obtained from L, E(L) by contracting the that A ( L. For each L ∈ L, let GL = (V L L L children of L in L; we drop the superscript L when L is clear from the context. Given x ∈ PST (G), define a laminar decomposition L of x to be a (inclusion-wise) maximal laminar  family of sets whose spanning-tree constraints are tight at x, so x E(A) = |A| − 1 for all A ∈ L. Note that V ∈ L and {v} ∈ L for all v ∈ V . A laminar decomposition can be constructed in polytime (using network-flow techniques). For any L ∈ L, let xL L , or simply xL if L is clear from context, denote x restricted to EL . Observe that xL is a fractional spanning tree of GL . 3 An LP-rounding approximation algorithm 3.1 An overview We first give a high-level overview. Clearly, if (P) is infeasible, there is no spanning tree satisfying the degree constraints, so in the sequel, we assume that (P) is feasible. We seek to obtain a spanning tree T of cost c(T ) = O(OPT ) such that |δT (S)| = O(bS ) for all S ∈ S, where δT (S) is the set of edges of T crossing S. In order to explain the key ideas leading to our algorithm, we first briefly discuss the approach of Olver and Zenklusen [14] for unweighted CCST. Their approach ignores the edge costs {ce } and instead starts with a feasible solution x to (P) that minimizes a suitable (linear) potential function. They use this potential function to argue that if L is a laminar decomposition of x, then (x, L) satisfies a key structural property called rainbow freeness. Exploiting this, they give a rounding algorithm, hereby referred to as AOZ , that for every L ∈ L, rounds xL to a spanning tree TL of GL such that |δTL (S)| ≈ O xL (δ(S)) for all S ∈ S, so that concatenating the TL s yields a spanning tree T of G satisfying |δT (S)| = O x(δ(S)) = O(bS ) for all S ∈ S (Theorem 3.2). However, as already noted in [14], a fundamental obstacle towards generalizing their approach to handle the weighted version (i.e., MCCST) is that in order to achieve rainbow freeness, which is crucial for their rounding algorithm, one needs to abandon the cost function c and work with an alternate potential function. We circumvent this difficulty as follows. First, we note that the algorithm in [14] can be equivalently viewed as rounding an arbitrary solution x to (P) as follows. Let L be a laminar decomposition of x. Using the same potential-function idea, we can convert x to another solution x′ to (P) that admits a laminar 4 decomposition L′ refining L such that (x′ , L′ ) satisfies rainbow freeness (see Lemma 3.1), and then round x′ using AOZ . Of course, the difficulty noted above remains, since the move to rainbow freeness (which again ignores c and uses a potential function) does not yield any bounds on the cost c⊺ x′ relative to c⊺ x. We observe however that there is one simple property (*) under which one can guarantee that c⊺ x′ = c⊺ x, namely, if for every L ∈ L, all edges in supp(x) ∩ EL have the same cost. However, it is unclear how to utilize this observation since there is no reason to expect our instance to have this rather special property: for instance, all edges of G could have very different costs! Now let x∗ be an optimal solution to (P) (we will later modify this somewhat) and L be a laminar decomposition of x∗ . The crucial insight that allows us to leverage property (*), and a key notable aspect of our algorithm and analysis, is that one can leverage Lagrangian duality to suitably perturb the edge costs so that the perturbed costs satisfy property (*). More precisely, letting y ∗ ∈ RS+ denote the optimal values∗ of the dualPvariables corresponding to constraints (3), if we define the perturbed cost of edge e to ∗ be cye := ce + S∈S:e∈δ(S) yS∗ , then the cy -cost of all edges in supp(x∗ ) ∩ EL are indeed equal, for every L ∈ L (Lemma 3.5). In essence, this holds because for any e′ ∈ supp(x∗ ), by complementary P slackness, we have ce′ = (dual contribution to e′ from (1),(2)) − S∈S:e′ ∈δ(S) yS∗ . Since any two edges e, f ∈ supp(x∗ ) ∩ EL appear in the same sets of L, one can argue that the dual contributions to e and f ∗ ∗ from (1), (2) are equal, and thus, cye = cyf . ∗ Now since (x∗ , L∗ ) satisfies (*) with the perturbed costs cy , we can convert (x∗ , L∗ ) to (x′ , L′ ) satisfying rainbow freeness without altering the perturbed cost, and then round x′ to a spanning tree T using AOZ . This immediately yields |δT (S)| = O(bS ) for all S ∈ S. To bound the cost, we argue that P P ∗ ∗ c(T ) ≤ cy (T ) = e cye x∗e = c⊺ x∗ + S∈S bS yS∗ (Lemma 3.6), where the last equality followsPfrom complementary slackness. (Note that the perturbed costs are used only in the analysis.) However, S∈S bS yS∗ need not be bounded in terms of c⊺ x∗ . To fix this, we modify our starting solution x∗ : we solve (Pλ ) (which recall is (P) with inflated degree bounds {λbS }), where λ > 1, to obtain x∗ , and use this x∗ in our algorithm. Now, letting y ∗ be the optimal dual values corresponding to the inflated degree constraints, a simple duality P (λ) argument shows that S∈S bS yS∗ ≤ OPT (1)−OPT (Lemma 3.7), which yields c(T ) = O(OPT ) (see λ−1 Theorem 3.3). A noteworthy feature of our algorithm is the rather unconventional use of Lagrangian relaxation, where we use duality to simplify the cost structure (as opposed to the constraint-structure) of the underlying problem by equalizing edge costs in certain subproblems. This turns out to be the crucial ingredient that allows us to utilize the algorithm of [14] for unweighted CCST as a black box without worrying about the difficulties posed by (the move to) rainbow freeness. In fact, as we show in Sections 4 and 5, this Lagrangian-relaxation idea is applicable more generally, and yields a novel reduction from weighted problems to their unweighted counterparts. We believe that this reduction is of independent interest and will find use in other settings as well; indeed, we demonstrate another application of our ideas in Section 5.2. 3.2 Algorithm details and analysis To specify our algorithm formally, we first define the rainbow-freeness property and state the main result of [14] (which we utilize as a black box) precisely. For an edge e, define Se := {S ∈ S : e ∈ δ(S)}. Note that Se could be empty. We say that two edges e, f ∈ E form a rainbow if Se ⊆ Sf or Sf ⊆ Se . (This definition is slightly different from the one in [14], in that we allow Se = Sf .) We say that (x, L) is a rainbow-free decomposition if L is a laminar decomposition of x and for every set L ∈ L, no two edges of supp(x) ∩ EL form a rainbow. (Recall that GL = (VL , EL ) denotes the graph obtained from L, E(L) by contracting the children of L.) The following lemma shows that one can convert an arbitrary decomposition (x, L) to a rainbow-free one; we defer the proof to the Appendix. (As noted earlier, this lemma is used to equivalently view the algorithm in [14] as a rounding algorithm that rounds an arbitrary solution x to (P).) 5 Lemma 3.1. Let x ∈ PST (G) and L be a laminar decomposition of x. We can compute in polytime a fractional spanning tree x′ ∈ PST (G) and a rainbow-free decomposition (x′ , L′ ) such that: (i) supp(x′ ) ⊆ supp(x); (ii) L ⊆ L′ ; and (iii) x′ (δ(S)) ≤ x(δ(S)) for all S ∈ S. Theorem 3.2 ([14]). There is a polytime algorithm, AOZ , that given a fractional spanning tree x′ ∈ PST (G) and a rainbow-free decomposition (x′ , L′ ), returns a spanning tree TL ⊆ supp(x′ ) of GL for everyL ∈ L′ such that the concatenation T of the TL s is a spanning tree of G satisfying |δT (S)| ≤ 9x′ δ(S) for all S ∈ S. We can now describe our algorithm quite compactly. Let λ > 1 be a parameter. 1. Compute an optimal solution x∗ to (Pλ ), a laminar decomposition L of x∗ . 2. Apply Lemma 3.1 to (x∗ , L) to obtain a rainbow-free decomposition (x′ , L′ ). ′ ′ ′ 3. Apply AOZ to the input (x′ , L′ ) to obtain spanning trees TLL of GL L for every L ∈ L . Return the ′ concatenation T of all the TLL s. Analysis. We show that the above algorithm satisfies the following guarantee. Theorem 3.3. The above algorithm run with parameter λ > 1 returns a spanning tree T satisfying c(T ) ≤ λ λ−1 · OPT and |δT (S)| ≤ 9λbS for all S ∈ S. The bound on |δT (S)| follows immediately from Lemma 3.1 and Theorem 3.2 since x∗ , and hence x′ obtained in step 2, is a feasible solution to (Pλ ). So we focus on bounding c(T ). This will follow from ∗ three things. First, we define the perturbed cy -cost precisely. Next, Lemma 3.5 proves the key result that for every L ∈ L, all edges in supp(x∗ ) ∩ EL have the same perturbed cost. Using this it is easy to P P ∗ ∗ show that c(T ) ≤ cy (T ) = e cye x∗e = OPT (λ) + λ S∈S bS yS∗ (Lemma 3.6). Finally, we show that P OPT −OPT (λ) ∗ (Lemma 3.7), which yields the bound stated in Theorem 3.3. S∈S bS yS ≤ λ−1 To define the perturbed costs, we consider the Lagrangian dual of (Pλ ) obtained by dualizing the (inflated) degree constraints x δ(S) ≤ λbS for all S ∈ S:   X X max x(δ(S)) − λbS )yS . (LDλ ) ce xe + gλ (y) := min y∈RS + x∈PST (G) e S∈S  P P For y ∈ RS , let Gλ,y (x) := e ce xe + S∈S x(δ(S)) − λbS ySP= e cye xe − λ S∈S bS yS denote the objective function of the LP that defines gλ (y), where cye := ce + S∈S:e∈δ(S) yS . P P ∗ Let y ∗ be an optimal solution to (LDλ ). Our perturbed costs are {cye }. We prove the following preliminary lemma, then proceed to show that the perturbed costs satisfy property (*). Lemma 3.4. We have gλ (y ∗ ) = Gλ,y∗ (x∗ ) = OPT (λ). P Proof. For any y ∈ RS+ , we have gλ (y) + λ S∈S bS yS =  X  min cye xe s.t. x E(S) ≤ |S| − 1 ∀∅ = 6 S ( V, | e  X max − (|S| − 1)µS ∅6=S⊆V | {z x(E) = |V | − 1, (Pλ,y ) s.t. − X ∅6=S⊆V : e∈E(S) µS ≤ cye ∀e ∈ E, {z (Dλ,y ) 6  x≥0 = } µS ≥ 0 ∀∅ = 6 S(V  } where the second equality follows since (Dλ,y ) is the dual of (Pλ,y ). It follows that gλ (y ∗ ) = max gλ (y) = max − y∈RS + X ∅6=S⊆V (|S| − 1)µS − λ − s.t. X ∅6=S⊆V : e∈E(S) µS − X bS y S (Dλ ) S∈S X S∈S: e∈δ(S) yS ≤ ce y ≥ 0, µS ≥ 0 ∀e ∈ E ∀∅ = 6 S ( V. Notice that (Dλ ) is the dual of (Pλ ), hence, gλ (y ∗ ) = OPT (λ). Moreover, it also follows that ŷ is an optimal solution to (LDλ ) iff there exists µ̂ = (µ̂S )∅6=S⊆V such that (µ̂, ŷ) is an optimal solution to (Dλ ). So let µ∗ be such that (µ∗ , y ∗ ) is an optimal solution to (Dλ ). It follows that x∗ and (µ∗ , y ∗ ) satisfy  complementary slackness. So we have that if µ∗S > 0 then x∗ E(S) = |S| − 1, and if x∗e > 0 then P P P ∗ − ∅6=S⊆V :e∈E(S) µ∗S − S∈S:e∈δ(S) yS∗ = ce , or equivalently cye = − ∅6=S⊆V :e∈E(S) µ∗S . Therefore, Gλ,y∗ (x∗ ) = X e =− =− ∗ cye x∗e − λ X ∅6=S⊆V X ∅6=S⊆V X bS yS∗ = X − e S∈S X ∅6=S⊆V :e∈E(S) X  µ∗S x∗ E(S) − λ bS yS∗  X bS yS∗ µ∗S x∗e − λ S∈S S∈S (|S| − 1)µ∗S −λ X bS yS∗ = gλ (y ∗ ). S∈S ∗ Lemma 3.5. For any L ∈ L, all edges of supp(x∗ ) ∩ EL have the same cy -cost. y∗ Proof. Consider any two edges e, f ∈ supp(x∗ ) ∩ EL . Suppose for a contradiction that cy∗ e < cf . Obtain / {e, f }). Using the same x̂ from x∗ by increasing x∗e by ǫ and decreasing x∗f by ǫ (so x̂e′ = x∗e′ for all e′ ∈ argument as in the proof of Lemma 3.1, one can show that x̂ ∈ PST (G) for a sufficiently small ǫ > 0. Since ∗ ∗ cye < cyf , we have gλ (y ∗ ) ≤ Gλ,y∗ (x̂) < Gλ,y∗ (x∗ ) = gλ (y ∗ ), where the last equality follows from Lemma 3.4, and we obtain a contradiction. P ∗ P P Lemma 3.6. We have c(T ) ≤ e cye x∗e = e ce x∗e + λ S∈S bS yS∗ . ∗ Proof. Observe that c(T ) ≤ cy (T ) since ce ≤ cye for all e ∈ E as y ∗ ≥ 0. We now bound cy (T ). To ∗ L ∗ keep notation simple, we use GL = (VL , EL ) and x∗L to denote GL L and (x′ )L (which recall is x restricted ′ ′ ∗ L to ELL ) respectively, and P G′L = (VL′ , EL′ ) and x∗L to denote GL L and (x )L respectively. ∗ ∗ y y We have c (T ) = L∈L c (T ∩ EL ) since the sets {EL }L∈L partition E. Fix L ∈ L. Note that x∗L is a fractional spanning tree of GL = (VL , EL ) since for any ∅ = 6 Q ⊆ VL , if R is the subset of V corresponding to Q, and A1 , . . . , Ak areP the children of L whose corresponding contracted nodes lie in Q, we have x∗L EL (Q) = x∗ E(R) − ki=1 x∗ E(Ai ) ≤ |R \ (A1 ∪ . . . ∪ Ak )| + k − 1 = |Q| − 1 with equality holding when Q = VL . Note that T ∩ EL is a spanning tree of GL since T is obtained by concatenating spanning trees for the graphs {G′L′ }L′ ∈L′ , and L′ refines L. Also, all edges of supp(x∗ ) ∩ EL P ∗ ∗ ∗ have the same cy -cost by Lemma 3.5. So we have cy (T ∩ EL ) = e∈EL cye x∗e . It follows that ∗ ∗ cy (T ) = X ∗ cye x∗e = e = X e X ce x∗e + e ce x∗e + ∗ X S∈S yS∗ x∗ X yS∗ x∗e S∈S:e∈δ(S)  X  X δ(S) = ce x∗e + λ bS yS∗ . e 7 S∈S Lemma 3.7. We have P ∗ S∈S bS yS ≤ OPT (1)−OPT (λ) . λ−1 Proof. By Lemma 3.4, we have that OPT (λ) = gλ (y ∗ ) = Gλ,y∗ (x∗ ). Using Lemma 3.4 again, now with λ = 1, and since y ∗ is a feasible solution to (LD1 ), we obtain that OPT (1) = maxy∈RS g1 (y) ≥ g1 (y ∗ ). Note that the objective functions of the LPs defining g1 (y ∗ ) and + P gλ (y ∗ ) differ by a constant: G1,y∗ (x) − Gλ,y∗ (x) = (λ − 1) S∈S bS yS∗ for all x ∈ PST (G). Since x∗ is an optimal solution to minx∈PST (G) Gλ,y∗ (x), it is also an optimal solution to minx∈PST (G) G1,y∗ (x). It follows that OPT (1) ≥ g1 (y ∗ ) = G1,y∗ (x∗ ) . P Therefore, OPT (1) − OPT (λ) ≥ G1,y∗ (x∗ ) − Gλ,y∗ (x∗ ) = (λ − 1) S∈S bS yS∗ . Proof of Theorem 3.3. As noted earlier, the bounds on δT (S) from Lemma 3.1 and  follow immediately  ′ δ(S) ≤ 9x∗ δ(S) ≤ 9λb . The bound on c(T ) Theorem 3.2: for any S ∈ S, we have |δ (S)| ≤ 9x S PT follows from Lemmas 3.6 and 3.7 since e ce x∗e = OPT (λ). 4 A reduction from weighted to unweighted problems We now show that our ideas are applicable more generally, and yield bicriteria approximation algorithms for any cost-minimization problem with packing side-constraints, provided we have a suitable approximation algorithm for the unweighted counterpart. Thus, our technique yields a reduction from weighted to unweighted problems, which we believe is of independent interest. To demonstrate this, we first isolate the key properties of the rounding algorithm B used above for unweighted CCST that enable us to use it as a black box to obtain our result for MCCST; this will yield an alternate, illuminating explanation of Theorem 3.3. Note that B is obtained by combining the procedure in Lemma 3.1 and AOZ (Theorem 3.2). First, we of course utilize that B is an approximation algorithm  ∗ for unweighted CCST, so it returns a spanning tree T such that |δT (S)| = O x (δ(S)) for all S ∈ S. Second, we exploit the fact that B returns a tree T that preserves tightness of all spanning-tree constraints that are tight at x∗ . This is the crucial property that allows us to bound c(T ), since this implies (as we P y∗ ∗ ∗ explain below) that cy (T ) = e ce xe , which then yields the bound on c(T ) as before. The equality follows because the set of optimal solutions to the LP minx∈PST (G) Gλ,y∗ (x) is a face of PST (G); thus all points on the minimal face of PST (G) containing x∗ are optimal solutions to this LP, and the stated property implies that the characteristic vector of T lies on this minimal face. In other words, while AOZ proceeds by exploiting the notions of rainbow freeness and laminar decomposition, these notions are not essential to obtaining our result; any rounding algorithm for unweighted CCST satisfying the above two properties can be utilized to obtain our guarantee for MCCST. We now formalize the above two properties for an arbitrary cost-minimization problem with packing side-constraints, and prove that they suffice to yield a bicriteria guarantee. Consider the following abstract , and b ∈ Rm problem, where P ⊆ Rn+ is a fixed polytope: given c ∈ Rn+ , A ∈ Rm×n + , find + min c⊺ x s.t. x is an extreme point of P, Ax ≤ b. (QP ) Observe that we can cast MCCST as a special case of (QP ), by taking P = PST (G) (whose extreme points are spanning trees of G), c to be the edge costs, and Ax ≤ b to be the degree constraints. Moreover, by taking P to be the convex hull of a bounded set {x ∈ Zn+ : Cx ≤ d} we can use (QP ) to encode a discrete-optimization problem. 8 We say that B is a face-preserving rounding algorithm (FPRA) for unweighted (QP ) if given any point x ∈ P, B finds in polytime an extreme point x̂ of P such that: (P1) x̂ belongs to the minimal face of P that contains x. We say that B is a β-approximation FPRA (where β ≥ 1) if we also have: (P2) Ax̂ ≤ βAx.  ⊺ P P Let (RP λ ) denote the LP min c x : x ∈ P, Ax ≤ λb ; note that (R1 ) is the LP-relaxation of (Q ). Let opt(λ) denote the optimal value of (RP λ ), and let opt := opt(1). We say that an algorithm is a (ρ1 , ρ2 )approximation algorithm for (QP ) if it finds in polytime an extreme point x̂ of P such that c⊺ x̂ ≤ ρ1 opt and Ax̂ ≤ ρ2 b. Theorem 4.1. LetB be a β-approximation FPRA for unweighted (QP ). Then, given any λ > 1, one can λ obtain a λ−1 , βλ -approximation algorithm for (QP ) using a single call to B. Proof sketch. We dovetail the algorithm for MCCST and its analysis. We simply compute an optimal solution x∗ to (RP λ ) and round it to an extreme point x̂ of P using B. By property (P2), it is clear that Ax̂ ≤ β(Ax∗ ) ≤ βλb. y ⊺ For y ∈ Rm + , define c := c + A y. To bound the cost, as before, we consider the Lagrangian dual of (RP λ ) obtained by dualizing the side-constraints Ax ≤ λb.   h (y) := min H (x) , where Hλ,y (x) := (cy )⊺ x − λy ⊺ b. max λ λ,y m y∈R+ x∈P Let y ∗ = argmaxy∈Rm hλ (y). We can mimic the proof of Lemma 3.4 to show that x∗ is an optimal solution + to minx∈P Hλ,y∗ (x). The set of optimal solutions to this LP is a face of P. So all points on the minimal face of P containing x∗ are optimal solutions to this LP. By property (P1), x̂ belongs to this minimal face and so ∗ ∗ is an optimal solution to this LP. So (cy )⊺ x̂ = (cy )⊺ x∗ = c⊺ x∗ + (y ∗ )⊺ Ax∗ = opt(λ) + λ(y ∗ )⊺ b, where the last equality follows by complementary slackness. Also, by the same arguments as in Lemma 3.7, we ∗ ∗ λ . Since c ≤ cy , we have c⊺ x̂ ≤ (cy )⊺ x̂ ≤ λ−1 · opt. have (y ∗ )⊺ b ≤ opt(1)−opt(λ) λ−1  5 Towards a 1, O(1) -approximation algorithm for (QP )  A natural question that emerges from Theorems 3.3 and 4.1 is whether one can obtain a 1, O(1) -approximation, i.e., obtain a solution of cost at most opt that violates the packing side-constraints by an (multiplicative) O(1)-factor. Such results are known for degree-bounded spanning tree problems with various kinds of degree constraints [8, 16, 3, 17], so, in particular, it is natural to ask whether such a result also holds for MCCST. (Note that for MCCST, the dependent-rounding techniques in [1, 6] yield a tree T with    for all S ∈ S.) We show c(T ) ≤ OPT and |δT (S)| ≤ min O logloglog|S||S| bS , (1 + ǫ)bS + O logǫ|S| that our approach is versatile enough to yield such a guarantee provided we assume a stronger property from the rounding algorithm B for unweighted (QP ). Let Ai denote the i-th row of A, for i = 1, . . . , m. We say that B is an (α, β)-approximation FPRA for unweighted (QP ) if in addition to properties (P1) and (P2), it satisfies: (P3) ⊺ it rounds a feasible solution x to (RP α ) to an extreme point x̂ of P satisfying Ai x̂ ≥ such that A⊺i x = αbi . A⊺i x α for every i (For MCCST, property (P3) requires that |δT (S)| ≥ bS for every set S ∈ S whose degree constraint (in (Pα )) is tight at the fractional spanning tree x.) Theorem 5.1. Let B be an (α, β)-approximation FPRA for unweighted (QP ). Then, one can obtain a (1, αβ)-approximation algorithm for (QP ) using a single call to B. 9 Proof. We show that applying the algorithm from Theorem 4.1 with λ = α yields the claimed result. It is clear that the extreme point x̂ returned satisfies Ax̂ ≤ αβb. As in the proof of Theorem 4.1, let y ∗ be an optimal solution to maxy∈Rm hλ (y) (where λ = α). In Lemma 3.6 and the proof of Theorem 4.1, + ∗ ⊺ ⊺ y we use the weak bound c x̂ ≤ (c ) x̂. We tighten this to obtain the improved bound on c⊺ x̂. We have ∗ c⊺ x̂ = (cy )⊺ x̂ − (y ∗ )⊺ Ax̂, and (y ∗ )⊺ Ax̂ = X i:A⊺i x∗ =λbi yi∗ (A⊺i x̂) ≥ X i:A⊺i x∗ =λbi yi∗ A⊺i x∗ = α X yi∗ bi = (y ∗ )⊺ b. i:A⊺i x∗ =λbi The first and last equalities above follow because yi∗ > 0 implies that A⊺i x∗ = λbi . The inequality follows from property (P3). Thus, following the rest of the arguments in the proof of Theorem 4.1, we obtain that ∗ c⊺ x̂ ≤ (cy )⊺ x̂ − (y ∗ )⊺ b = c⊺ x∗ + (λ − 1)(y ∗ )⊺ b ≤ opt(1). 5.1 Obtaining an additive approximation for (QP ) and cost at most opt via an FPRA with two-sided additive guarantees We now present a variant of Theorem 5.1 that shows that we can achieve cost at most opt and additive approximation for the packing side constraints using an FPRA with two-sided additive guarantees. We give an application of this result in Section 5.2, where we utilize it to obtain improved guarantees for the k-budgeted matroid basis problem. Theorem 5.2. Let B be an FPRA for unweighted (QP ) that given x ∈ P returns an extreme point x̂ of P such that Ax − ∆ ≤ Ax̂ ≤ Ax + ∆, where ∆ ∈ Rm + may depend on A and c (but not on b). Using a single call to B, we can obtain an extreme point x̃ of P such that c⊺ x̃ ≤ opt and Ax̃ ≤ b + 2∆. The above result is obtained via essentially the  ⊺same arguments as those in Theorems 4.1 and 5.1. For P a vector ∆ ∈ Rm , let (W ) denote the LP min c x : x ∈ P, Ax ≤ b + ∆ . Let ~0 denote the all-zeros + ∆ vector, and note that (W~P ) is the LP-relaxation of (QP ). Let opt(∆) denote the optimum value of (WP ∆ ), 0 P and let opt := opt(~0). The Lagrangian dual of (W∆ ) obtained by dualizing the side-constraints Ax ≤ b+ ∆ is   ϕ (y) := min Φ (x) , (LD∆ ) max ∆ ∆,y m x∈P y∈R+ where Φ∆,y (x) := (cy )⊺ x − y ⊺ (b + ∆). (Recall that cy := c + A⊺ y.) Let x∗ be an optimal solution to (WP ∆) ∗ ϕ∆ (y). We have the following variants of Lemmas 3.4 and 3.7. and y = argmaxy∈Rm + Lemma 5.3. We have ϕ∆ (y ∗ ) = Φ∆,y∗ (x∗ ) = opt(∆). Proof. This follows by mimicking the arguments used in the proof of Lemma 3.4. Lemma 5.4. We have (y ∗ )⊺ ∆ ≤ opt(~0) − opt(∆). Proof. We mimic the proof of Lemma 3.7. By Lemma 5.3, we have that opt(∆) = ϕ∆ (y ∗ ) = Φ∆,y∗ (x∗ ) and opt(~0) = maxy∈RS ϕ~0 (y) ≥ ϕ~0 (y ∗ ). Note that Φ~0,y∗ (x) − Φ∆,y∗ (x) = (y ∗ )⊺ ∆, which is inde+ pendent of x. So since x∗ is an optimal solution to minx∈P Φ∆,y∗ (x), it is also an optimal solution to minx∈P Φ~0,y∗ (x). It follows that opt(~0) ≥ ϕ~0 (y ∗ ) = Φ~0,y∗ (x∗ ). Hence, opt(~0) − opt(∆) ≥ Φ~0,y∗ (x∗ ) − Φ∆,y∗ (x∗ ) = (y ∗ )⊺ ∆. 10 Proof of Theorem 5.2. The algorithm simply computes an optimal solution x∗ to (WP ∆ ), and rounds it to an extreme point x̃ of P using algorithm B. It is clear that Ax̃ ≤ Ax∗ + ∆ ≤ (b + ∆) + ∆ = b + 2∆. Next we argue that c⊺ x̃ ≤ opt. We have ∗ c⊺ x̃ = (cy )⊺ x̃ − (y ∗ )⊺ Ax̃, and X X (y ∗ )⊺ Ax̃ = yi∗ (A⊺i x̃) ≥ yi∗ (A⊺i x∗ − ∆i ) i:A⊺i x∗ =bi +∆i = X i:A⊺i x∗ =bi +∆i yi∗ bi = (y ∗ )⊺ b. i:A⊺i x∗ =bi +∆i By Lemma 5.3, x∗ is an optimal solution to minx∈P Ψ∆,y∗ (x). So all points on the minimal face of P containing x∗ are optimal solutions to this LP. In particular, since x̃ belongs to this minimal face (by property (P1)), x̃ is an optimal solution to this LP. This observation, along with the inequality above, yields c⊺ x̃ ≤ ∗ (cy )⊺ x∗ − (y ∗ )⊺ b = opt(∆) + (y ∗ )⊺ ∆. Finally, using Lemma 5.4 yields c⊺ x̃ ≤ opt(~0) as required. 5.2 Application to k-budgeted matroid basis Here, we seek toP find a basis S of a matroid M = (U, I) satisfying k budget constraints {di (S) ≤ Bi }1≤i≤k , where di (S) := e∈S di (e). Note that this can be cast a special case of (QP ), where P = P(M ) is the basis polytope of M , the objective function encodes a chosen budget constraint (say the k-th budget constraint), and Ax ≤ b encodes the remaining budget constraints. We show that our techniques, combined with a recent 1.5 randomized algorithm of [4], yields a (randomized) algorithm that, for any ǫ > 0, returns in nO(k /ǫ) time a basis that (exactly) satisfies the chosen budget constraint, and violates the other budget constraints by (at most) a (1 + ǫ)-factor, where n := |U | is the size of the ground-set of M . This matches the currentbest approximation guarantee of [9] (who give a deterministic algorithm) and the current-best running time of [4]. Theorem 5.5 ([4]). For some constant ν > 0, there exists a randomized FPRA, BBN , √ for unweighted (QP(M )√ ) that rounds any x ∈ P(M ) to an extreme point x̂ of P(M ) such that Ax − ν k∆ ≤ Ax̂ ≤ Ax + ν k∆, where ∆ = (max1≤j≤n aij )1≤i≤k−1 = (maxe∈U di (e))1≤i≤k−1 . Lemma 5.6. There exists √ a polytime randomized algorithm that finds a basis S of M such that dk (S) ≤ Bk , and di (S) ≤ Bi + 2ν k maxe∈U di (e) for all 1 ≤ i ≤ k − 1, or determines that the instance is infeasible. Proof. As explained above, we cast the problem as a special case of (QP ) by using the k-th budget constraint as the objective function, and the remaining budget constraints as packing side-constraints. If the LPrelaxation of (QP ) is infeasible, then the budgeted-matroid-basis instance is infeasible. Otherwise, the above guarantee follows by applying Theorem 5.2 with the algorithm B=BBN . Using ideas from [4], we combine the algorithm from Lemma 5.6 with a partial enumeration step as follows. We say an element e ∈ U is heavy if the inequality di (e) > 2νǫ√k Bi holds for at least one index i ∈ {1, . . . , k}. Let H denote the set of all heavy elements. We state our algorithm below. Let ǫ > 0 be a parameter. e ⊆ H of size |H| e ≤ 2νk1.5 , we do the following. 1. For every set H ǫ e and deleting the (a) Let M ′ be the matroid obtained from M by contracting the elements of H e elements of H \ H. e for i ∈ {1, . . . , k}. (b) Compute residual budgets Bi′ := Bi − di (H), (c) Run the algorithm from Lemma 5.6 on matroid M ′ with budgets {Bi′ }1≤i≤k . 11 (d) If the algorithm succeeds (that is, if the LP that it attempts to solve is feasible), then let T be e ∪ T . If S is a basis of M , dk (S) ≤ Bk , and the set of elements returned, and let S := H di (S) ≤ (1 + ǫ)Bi for all 1 ≤ i ≤ k − 1, then return S. 2. If step 1 does not return any set S, then return that the instance is infeasible. 1.5 Theorem 5.7. The algorithm above, run with parameter ǫ > 0, finds in nO(k /ǫ) time a basis S of M such that dk (S) ≤ Bk and di (S) ≤ (1 + ǫ)Bi for all 1 ≤ i ≤ k − 1, or determines that the instance is infeasible. 2νk1.5 1.5 = nO(k /ǫ) . Since steps 1(a)–1(d) run in Proof. Note that the number of iterations is at most n ǫ 1.5 /ǫ) O(k poly(n) time, the overall running time is n as claimed. If the instance is infeasible, then any outcome of the algorithm (infeasible, or a basis S) is correct. (Note that due to the verification done at the end of step 1(d), any set S returned must have the required properties.) So assume that the instance is feasible, and let S ∗ be a basis of M that exactly satisfies all the budget constraints. We argue that in this case the algorithm does indeed return a basis with the desired properties. Let H ∗ := S ∗ ∩H be the set of heavy elements that S ∗ contains. Note that since a heavy element uses up at least one budget to an extent greater than 2νǫ√k , and since S ∗ satisfies all the k budget constraints, 1.5 e = H ∗ (if the algorithm we must have |H ∗ | ≤ kǫ = 2νk . Note that at the iteration corresponding to H 2ν √ k ǫ reaches it), the set S ∗ \ H ∗ is feasible for the residual problem (with a matroid M ′ and residual budgets {Bi′ } defined in steps 1(a) and 1(b)). Further, note that this set also certifies that the resulting set S satisfies dk (S) = dk (H ∗ ) + dk (T ) ≤ dk (H ∗ ) + dk (S ∗ \ H ∗ ) = dk (S ∗ ) ≤ Bk . Finally, for every i ∈ {1, . . . , k − 1}, we have √ di (S) = di (H ∗ ) + di (T ) ≤ di (H ∗ ) + Bi′ + 2ν k max di (e) √ ǫ ≤ Bi + 2ν k √ Bi = (1 + ǫ)Bi , 2ν k e∈U \H and so the set S will pass the verification done at step 1(d) and will be returned by the algorithm. References [1] A. Asadpour, M. Goemans, A. Madry, S. Oveis Gharan, and A. Saberi. An O(log n/ log log n)approximation algorithm for the asymmetric traveling salesman problem. In Proceedings of the 20th SODA, pages 379–389, 2010. [2] N. Bansal, R. Khandekar, J. Könemann, V. Nagarajan, and B. Peis. On generalizations of network design problems with degree bounds. Mathematical Programming, 141(1-2):479–506, 2013. [3] N. Bansal, R. Khandekar, and V. Nagarajan. Additive guarantees for degree-bounded directed network design. SICOMP, 39(4):1413–1431, 2009. [4] N. Bansal and V. Nagarajan. Approximation-friendly discrepancy rounding. To appear in Proc., IPCO 2016. Also appears as arXiv:1512.02254, 2015. [5] K. Chaudhuri, S. Rao, S. Riesenfeld, and K. Talwar. What would Edmonds do? Augmenting paths and witnesses for degree-bounded MSTs. Algorithmica 55:157–189, 2009. [6] C. Chekuri, J. Vondrak, and R. Zenklusen. Dependent randomized rounding via exchange properties of combinatorial structures. In 51st FOCS, 2010. 12 [7] M. Fürer and B. Raghavachari. Approximating the minimum-degree Steiner Tree to within one of optimal. Journal of Algorithms 17(3):409–423, 1994. [8] M. Goemans. Minimum bounded degree spanning trees. In 47th FOCS, 2006. [9] F. Grandoni, R. Ravi, M. Singh, and R. Zenklusen. New approaches to multi-objective optimization. Mathematical Programming, 146(1-2):525–554, 2014. [10] K. Jain. A factor 2 approximation algorithm for the generalized Steiner network problem. Combinatorica, 21:39–60, 2001. [11] J. Könemann and R. Ravi. A matter of degree: improved approximation algorithms for degree-bounded minimum spanning trees. SICOMP, 31:1783–1793, 2002. SIAM Journal on Computing, 31:1783– 1793, 2002. [12] J. Könemann and R. Ravi. Primal-dual meets local search: approximating MST’s with nonuniform degree bounds. In Proceedings of the 35th STOC, 389–395 2003. [13] A. Linhares and C. Swamy. Approximating min-cost chain-constrained spanning trees: a reduction from weighted to unweighted problems. To appear in Proceedings of the 18th IPCO, 2016. [14] N. Olver and R. Zenklusen. Chain-constrained spanning trees. In Proceedings of the 16th IPCO, pages 324–335, 2013. [15] R. Ravi, M. Marathe, S. Ravi, D. Rosenkrantz, and H. Hunt III. Approximation algorithms for degreeconstrained minimum-cost network-design problems. Algorithmica 31(1):58–78, 2001. [16] M. Singh and L. Lau. Approximating minimum bounded degree spanning trees to within one of optimal. In Proceedings of the 39th STOC, pages 661–670. 2007. [17] R. Zenklusen. Matroidal degree-bounded minimum spanning trees. In Proceedings of the 23rd SODA, pages 1512–1521, 2012. A Proof of Lemma 3.1 This follows from essentially the same potential-function argument as used in [14] to obtain a rainbow-free solution. Sort the edges of supp(x) in increasing order of |Se | breaking ties arbitrarily. Let e1 , e2 , . . . , ek denote this ordering. Let w ∈ RE be any weight function such that we1 < we2 < · · · < wek (e.g., wei = i for all i). Let x′ be an optimal solution to the following LP. (Note that the LP has variables {ze }e∈E , and that the {xe }e∈E values are fixed.) X min we ze (P’) e s.t. z ∈ PST (G), ze = 0   z δ(S) ≤ x δ(S)  z E(L) = |L| − 1 ∀e ∈ / supp(x) ∀S ∈ S ∀L ∈ L. Properties (i) and (iii) hold by construction. Since we force the spanning-tree constraints corresponding to sets in L to be tight, we can start with L and extend it to obtain a laminar decomposition L′ of x′ that refines L, so (ii) holds. 13 It remains to show that (x′ , L′ ) is a rainbow-free decomposition. Consider any set L ∈ L′ and any two ′ edges e, f ∈ supp(x′ )∩ELL , and suppose that e, f form a rainbow. Let we < wf , so we must have Se ⊆ Sf . Now perturb x′ by adding ǫ to x′e (the argument below will show that x′e < 1) and subtracting ǫ from x′f , where ǫ > 0 is chosen to be suitably small; let x′′ be this perturbed vector. Clearly, wT x′′ < wT x′ , so if we show that x′′ is feasible to (P’), then we obtain a contradiction. Clearly, supp(x′′ ) ⊆    supp(x). Since Se ⊆ Sf it follows that x′′ δ(S) ≤ x δ(S) for all S ∈ S. Also, x′′ E(L) = x′ E(L) = |L| − 1 for all L ∈ L. Finally, we show that x′′ ∈ PST (G) for a sufficiently small ǫ > 0. (Hence, x′e < x′′e ≤ 1.) For A ⊆ V   such thatx′ E(A) < |A| − 1, we obtain x′′ E(A) ≤ |A| − 1 by taking ǫ > 0 suitably small; for A with x′ E(A) = |A| − 1, we obtain x′′ E(A) = |A| − 1 since the spanning-tree constraints for all L ∈ L′ are tight at (x′ and) x′′ and these span all other tight spanning-tree constraints. 14
8cs.DS
Networked Intelligence Towards Autonomous Cyber Physical Systems André Karpištšenko [email protected] Abstract Developing intelligent systems requires the combination of results from both industry and academia. In this report you ind an overview of relevant research ields and industrially applicable technologies for building large scale cyber physical systems. A conceptual architecture is used to illustrate how existing pieces may it together, and the maturity of the subsystems is estimated. The goal is to structure developments and the challenge of machine intelligence for Consumer and Industrial Internet technologists, cyber physical systems researchers and people interested in the convergence of data and the Internet of Things (IoT). This report will be useful for planning developments of intelligent systems. Acknowledgements: I would like to thank Ando Saabas for help in inding the focus, Lauri Koobas and Erki Suurjaak for pushing for brevity and clarity, Meelis Kull, Tambet Matiisen, Anna Leontjeva, Taivo Pungas and Kairit Sirts for improvements. I’d also like to thank Machine Learning Estonia presenters for providing the information on the latest state in machine learning, and Skype ML and AI reading group for updates in the ield. I am grateful to the early readers as well. ________ Technical Report, 2016 Technical Report Networked Intelligence, 2016 Executive Summary The bene its of intelligent systems are demonstrated by many arti icial narrow intelligence (ANI) applications used by businesses, governments and society. Some are highlighted later in the Applications section. In developing intelligent systems there is a positive feedback loop ‐ as the products, services and processes get better, the increase in pro itability is reinvested into further developments. There are many more innovations one can imagine. Only what exists on the market today is highlighted here. Cyber physical systems integrate computational and physical capabilities to interact with humans, machines, and the environment. This report brings together the progress in developments of such systems to develop a vision of a concept architecture for the machine intelligence challenge. To demonstrate the feasibility of the concept we give an overview of relevant existing research results and technologies necessary for building it. The report is structured as follows. In the Research Progress the focus is mainly on progress made in computer science, while highlighting some of the adjacent ields. The Technology Action provides an overview of trends in data and IoT. Core infrastructure such as data & IoT platforms and advanced analytics platforms are maturing with potential high‐value commercial applications. Relevant to the intelligent systems, the highest maturity is in data gathering and preprocessing, followed by advanced analytics. In the illustrative section How the Pieces Fit Together, a hierarchical system of systems approach is used, consisting of parts related to data preprocessing, models and self‐improvement. Higher‐order functions related to inding solutions with limited resources1 have been left out, while the aspects where the involvement of people is necessary are highlighted. This vision is not intended as a technical blueprint. I estimated that the concept illustrated here is achievable within a 5‐10 year time frame. Bringing together research and technology developments is necessary for engineering intelligent systems. Hopefully this report will spark developments and conversations that speed up the progress. The report is intended for Consumer and Industrial Internet technologists, cyber physical systems researchers and people interested in the convergence of data and the IoT. It will be invaluable for planning the development of intelligent systems, identifying bottlenecks, estimating resources and selecting technologies. How to read guide: The irst sections give the context for the vision. If you are practically minded, start from Technology Action. If you know the market and seek ideas for your system, start from the section How the Pieces Fit Together. 1 R. Kurzweil, How to Create a Mind: The Secret of Human Thought Revealed, Penguin Books, 2012 Technical Report Networked Intelligence, 2016 Research Progress The aim of this section is to describe the research ields directly relevant to developing and designing large scale autonomous cyber physical systems2. One of the foundations for developing large scale systems is the system of systems concept. That is, large scale integrated systems which are diverse and independently operable on their own, but are networked together for a common goal.3 The ield of arti icial general intelligence (AGI)4 is the forefront of related research ields. The approach here is pragmatic and business driven. Given the possible long road to practical AGI, there is no focus here on providing a complete overview. In the industry, combinations of ANIs are used to solve complex situations. The Figure 1 below illustrates how different research ields it together to form networked systems. It is assumed that creating intelligent systems is mainly a software and systems engineering challenge, thus ields like mechanical and electrical engineering, which focus on physical objects and their applications, are excluded. However, some of the relevant results from these ields are listed in the Appendix. Figure 1. Illustration of relevant research ields needed the for design and development of networks of systems In Figure 1, research is grouped into one of four categories depending on the key aspect they address. In the following sections you will ind a brief overview and highlights with links to technical material. 2 3 4 Partially inspired by IARPA Research Programs M. Jamshidi, Systems of Systems Engineering: Principles and Applications, CRC Press, 2008 P. Wang, B. Goertzel, Theoretical Foundations of Arti icial General Intelligence, Atlantis Press, 2012 Technical Report Networked Intelligence, 2016 Input Interfaces The ields most relevant to the systems’ ability to take input from external systems and to observe context and environment are information theory, information fusion5 and knowledge representation6. Information theory de ines the limits of systems coping with exponentially increasing7 amount of incoming data in processing and storage infrastructure. Information fusion deals with the art of merging information from heterogeneous sources. For cyber physical systems, a relevant subset of the ield is sensor fusion8. It is becoming commonplace that information fusion is a stream processing activity that operates with continuous data lows. In modern data processing and analysis systems, multimodal information integration is the most time consuming activity. This is due to high variety of data formats, versioning of data and variety in content. Successful fusion relies on data curation and domain knowledge that can be partially automated. Knowledge representation is about information required to understand incoming data. The extra structural, semantic and meta information allows machines to process raw data into something meaningful. There are different types of data that cyber physical systems transform into a knowledge‐base: textual data, usually in natural language, but also in formal languages; image data, for example photographs, satellite imagery and other; video data; audio data; numeric data and other binary signals. At large scales, a key aspect is to provide means to cope with large datasets which may also contain errors. Internal Processing The following research ields aim at making sense of the incoming and historic information and internal system state to ind patterns, make predictions and take decisions to deliver solutions for applications. The basis is to make stored data, information and knowledge available in machine‐readable and machine‐interpretable formats. Indexing and probabilistic retrieval methods decide what data can be ef iciently accessed and retrieved within query results. Information extraction and retrieval9 is a ield that has evolved rapidly after the onset of web era and is highly relevant to working with text, audio transcripts and image & video captions. Knowledge organization and validation related functionalities are further layers on top of related technologies. Probability theory that form the foundations for many aspects in intelligent systems, such as information retrieval, machine learning (ML) and knowledge discovery, requires highlighting. Probabilistic programming languages10 focus on simplifying software engineering that deals with probabilities, so that less code needs to be written. Bayesian inference and subjective Bayesian probability form an important basis for designing models capable of dynamic problem solving. 5 V. Torra, Information Fusion in Data Mining, Springer, 2003 R. Brachman, H. Levesque, Knowledge Representation and Reasoning, Morgan Kaufmann 2004 7 EMC Digital Universe with Research & Analysis by IDC 8 Mitchell, H. B. Multi‐sensor Data Fusion, Springer‐Verlag, 2007 9 C. Manning, P. Raghavan, H. Schütze, Introduction to Information Retrieval, Cambridge University Press, 2008 10 http://probabilistic‐programming.org/ 6 Technical Report Networked Intelligence, 2016 Machine Learning and Knowledge Discovery Machine Learning11 is a rapidly advancing ield with a range of different statistical learning methods12 which can be used for supervised, partially supervised and unsupervised learning. A method quickly gaining traction is deep learning13 which is about representation learning and automated feature engineering. The branch is used in many industrial applications. Other popular methods are random forests and gradient boosting. An increasing trend is one of hybrid intelligent systems where multiple methods are combined to bene it from the strengths of each14. The approach combines neural networks, expert systems, fuzzy logic, symbolic systems, genetic algorithms and case‐based reasoning. A common aspect of machine learning is its dependence on data. There exists a subset of intelligently solvable problems that require less data, like those based on chemical and physical processes. Such models are based on systems of differential equations and laws of nature. There is a trend of replacing some classical algorithms with neural network based approximations to improve performance15. In developing intelligent systems one must choose between models as well as create ensemble models. To ease the process of communication, models should be interpretable. See the example of random forests16. Computational Learning and Process Automation Computational learning theory deals with the design and analysis of machine learning algorithms, mainly concerned with proving algorithms. Here a broader approach is taken. Self‐improvement processes17 and the applications of machine learning to guide model development are not new. For example, neuroevolution uses evolutionary algorithms for training18 and online machine learning deals with continuous sequential data, updating the model at each step. As more models are produced, model curation and deployment automation is necessary. Development of new models involves data preparation steps such as normalization, semi‐automated feature extraction and dimensionality reduction. To perform data exploration for useful pattern discovery in high‐dimensional data, methods such as topological data analysis19 can be used. Some progress has been made in automating feature relationship identi ication20. Other Fields There are other important ields, such as data mining, that are not covered here. In building cyber physical systems there are more aspects than just working with the data and models. For example to decide on actions, statistical decision theory facilitates identi ication of decision input uncertainties and inding a solution. To 11 K. Murphy, Machine Learning: A Probabilistic Perspective, MIT Press, 2012 T. Hastie, R. Tibshirani, J. Friedman, The Elements of Statistical Learning: Data Mining, Inference, and Prediction, Second Edition, Springer, 2009 13 I. Goodfellow, Y. Bengio and A. Courville, Deep Learning, MIT Press (in preparation), 2016 14 L. Medsker, Hybrid Intelligent Systems, Springer, 2013 12 15 K. Abhishek, M.P. Singh, S. Ghosh, A. Anand, Weather Forecasting Model using Arti icial Neural Network, C3IT, 2012 A. Saabas, Interpreting random forests, Diving into data blog, 2014 17 J. Dunn, Introducing FBLearner Flow: Facebook's AI backbone, Facebook Code, 2016 18 D. Floreano, P. Dürr, C. Mattiussi, Neuroevolution, Evolutionary Intelligence, 2008 19 G. Carlsson, Topology and Data, Bulletin of the American Mathematical Society, 2009 20 D. Reshef, Y. Reshef, H. Finucane, S. Grossman, G. McVean, P. Turnbaugh, E. Lander, M. Mitzenmacher, P. Sabeti, Detecting novel associations in large datasets, Science, 2011 16 Technical Report Networked Intelligence, 2016 deal with optimally unsolvable situations,21 heuristics can be used. Attention based methods invest resources based on areas of interest22. In industries such as inance, where systems are in co‐opetition, means to think strategically are built using game theory23. While this aspect is not relevant for inding a solution in a one off application, it becomes relevant when operating continuously. Finding solutions for useful situations requires explicit accounting for internal and external resource constraints. Optimization theory deals with selecting the best element from a set of available alternatives. In machine learning, regularization deals with over itting. For autonomous systems, situation awareness that originated in human factors research has recently advanced to hierarchical situation awareness for cyber physical systems24. This is relevant to perceiving context and comprehending it. Neuroscience25, especially computational neuroscience, provides inspiration for ways of structuring intelligent systems. Progress in neuroscience26 can be applicable in creating autonomous cyber physical systems. Initial progress has been made with robots27. Output Interfaces For interacting with external systems and the environment, general system theory has broad applicability. The most relevant class is cyber physical systems28 that refers to systems with integrated computational and physical capabilities that interact with humans and machines. Systems have to deal with dynamic behaviour and control theory provides guidance for process control in order to steer a system towards a desired state. Many AI control challenge concepts and behaviours are manifested in simple setups29. Control interfaces can take many forms, especially for human‐machine interaction, for example natural language interfaces. Human‐machine interaction is an essential part of an intelligent system. Extended intelligence30 is an emerging ield studying intelligence as a fundamentally distributed phenomenon. Networked Processing System of systems forms a dynamically changing interactive network of processes that encode or decode information from one form to another. Network theory provides a means to understand the form and function of the system that the network represents31. Utilizing network theory, system designers can start to reason about its structure, network resilience and resistance to perturbations. Advancements in control of networks 32 provide an initial framework for controlling complex self‐organized systems. More speci ically, one can 21 C. Moore, S. Mertens, The Nature of Computation, Oxford University Press, 2011 A. Almahairi, N. Ballas, T. Cooijmans, Y. Zheng, H. Larochelle, A. C., Dynamic Capacity Networks, ICLR 2016 23 S. Hargreaves Heap, Y. Varoufakis, Game Theory: A Critical Introduction, Routledge, 1995 24 J. Preden, Enhancing Situation‐Awareness, Cognition and Reasoning of Ad‐Hoc Network Agents, Tallinn University of Technology, 2010 25 Human Brain Project, EU FET Flagship Initiative 26 B. Baars, Global workspace theory of consciousness: toward a cognitive neuroscience of human experience, Progress in Brain Research, 2005 27 S. Bringsjord, J. Licato, N. Govindarajulu, R. Ghosh, A. Sen, Real Robots that Pass Human Tests of Self‐Consciousness, IEEE Ro‐Man, 2015 28 R. Baheti, H. Gill, Cyber‐physical Systems, The Impact of Control Theory, IEEE Control Systems Society, 2011 29 J. Tallinn, Toy Model of the Control Problem, 2015, http://www.slideshare.net/AndrKarpitenko/ai‐control 30 http://www.pubpub.org/pub/extended‐intelligence 31 M. Newman, Networks: An Introduction, Oxford University Press, 2010 32 Y. Liu, J. Slotine, A. Barabasi, Controllability of Complex Networks, Nature, 2011 22 Technical Report Networked Intelligence, 2016 identify the set of driver nodes with time‐dependent control to guide the system’s entire dynamics. However, sparse inhomogeneous networks, which emerge in many real complex systems, are the most dif icult to control. In addition networked systems may be represented as multilayer structures33, even evolving as a function of time34. Methodologies dealing with such representations sets the contemporary directions in network science with straightforward applications in system design, IoT, and interdependent systems. Knowledge about the network can be classi ied and visualized for designers and operators35. Drawing the parallel between a dedicated system and an agent, a traditional multi‐agent systems approach provides concepts for structuring organizations of agents that interact with the environment. Using organizational theory as inspiration for organizing a cyber physical system of systems (for example the ields of self‐organization, scienti ic management and organizational processes) can aid designers in choosing the right protocols for evolving their systems. Risks emerge when a system interacts with people and other systems. Cybersecurity is about managing these risks with appropriate measures. For example cryptographic methods can be used for exchanging sensitive information. Information security is a cross‐cutting concern and an important aspect of any system, especially so for intelligent systems interacting with people and nature. Intelligent system design should factor in threat intelligence and modeling to account for the risks of its actions and operations. Technology Action An overview of state of the art in technologies relevant to large scale autonomous cyber physical systems36. These are fun times for anyone in software and systems engineering. The systems are becoming intelligent, boundaries between ields are blurring and the pace of development is increasing. Mature trends like mobile and new exponential trends like Industrial IoT, Consumer IoT, natural interfaces and data science are creating new commercial and technological opportunities. The list of technologies and companies is long, here a summary of some promising developments is provided. 33 Kivelä, M., Arenas, A., Barthelemy, M., Gleeson, J.P., Moreno, Y. and Porter, M.A., 2014. Multilayer networks. Journal of complex networks, 2(3), pp.203‐271. 34 Holme, P. and Saramäki, J., 2012. Temporal networks. Physics reports, 519(3), pp.97‐125. K. Börner, Atlas of Science: Visualizing What We Know, MIT Press, 2010 36 Inspired by market research done by Shivon Zilis and FirstMark Capital 35 Technical Report Networked Intelligence, 2016 Figure 2. Technology areas relevant to designing and building intelligent systems The technologies relevant to building cyber physical systems are grouped into three categories: Infrastructure Layer, Processing Layer and Usage Layer as illustrated in Figure 2. In the following sections you will ind an overview of the categories37. Infrastructure Layer The infrastructure offers basic building blocks for creating commercially viable cyber physical systems. The technologies de ine what is achievable in meeting non‐functional requirements. Details on the overview of the Infrastructure Layer are explained in the Appendix. The base infrastructure exists for development of autonomous cyber physical systems and is advancing fast. The Data & IoT Platforms, as well as Data Exchanges address the need to adapt to the increasing amount of devices, machines and protocols. Processing Layer The processing layer delivers the basis for building the core functionality of intelligent systems. 37 For paper readers, link to companies and technologies are provided, use the links to access the highlights directly. Technical Report Networked Intelligence, 2016 Data & IoT Platforms Data and devices are the cornerstones of cyber physical systems. The available datasets and data streams de ine the scope of applications. Processing, storing, indexing and querying the data (e.g. Drill) are the most fundamental functions. Data platforms address working with data, companies like Cloudera (recently launched Kudu), MapR and others provide open source and proprietary technologies that scale to very large data sizes. Company products like HortonWorks HDF further extend these technologies with IoT ready solutions that integrate open‐source technologies from organizations like LinkedIn (Ka ka), Twitter (Storm) and NSA (Ni i). Further progress is made by companies like DataBricks (Spark), Data Artisans (Flink) and others who commercialize open‐source research results of thought leaders in data systems like UC Berkeley (AMPLab), MIT (DBg), CMU (DB Group) and other institutions. A driving trend is the move from general purpose data warehouses and relational databases to purpose built databases for small‐data, columnar, time‐series, array, key‐value and other types data. Relevant to intelligent systems, probabilistic platforms are emerging. Cloud platform providers commoditize the most widely used data solutions for petabyte scale needs. While the solutions for big data are maturing and converging, the early phase of the IoT trend has seen a response by many different companies like Cisco Jasper and PTC ThingWorx who are competing for the leading position in different markets. Driven by the data and IoT trends, traditional companies like GE are rede ining themselves as software‐driven service companies and are strategically investing into partnerships 38 . Companies such as Pivotal are recognizing this major shift and deliver software for those enterprises. Younger companies for example Helium and others, are addressing IoT development needs to speed up the time it takes for new connected devices to reach mass markets. Many IoT development platforms, like Hologram, focus on the unique needs that come with dealing with many sensors, devices and data streams. Data and IoT trends converge in platforms like Planet OS that combine open‐source, proprietary and cloud technologies to deliver real value in demanding industries like energy. Reactive platforms like Lightbend form a good basis for building such platforms. Building upon such endeavours brings the bene it of machine and sensor independent data formats and protocols. Data Preprocessing and Exchanges Finding the right data, cleaning, curating and enriching it is one of the most time‐consuming activities in data science. An intelligent system depends on the quality of input directly. Thus it makes sense to rely on dedicated technologies like Tamr, Trifacta and CrowdFlower in these activities. For data integration, platforms like snapLogic and others exist. Preprocessing endeavours are commonly too large for a single entity. A solution is delivered by data syndication and publishing services, such as Xignite, Planet OS, Enigma, Qlik and potentially Microsoft Azure DataMarket, that provide high quality datasets and data streams via well‐de ined APIs. Building upon Data Exchanges and preprocessing related technologies is a good use of resources. 38 https://www.oracle.com/corporate/pressrelease/ge‐digital‐042116.html Technical Report Networked Intelligence, 2016 Advanced Analytics Platforms Advanced analytics is the part of Technology Action dealing directly with putting intelligence into systems. Given high quality input, model building, execution, optimization and postprocessing are the major steps in analytics. The major drivers are the need for increasing the speed of learning39 and the nature of diminishing returns in model improvements40. All analytical methods have limits to their precision and accuracy. The natural starting point for inding solutions to new situations is to use existing models that have solved similar situations before. Deep learning frameworks like Caffe provide such facilities. For more complex applications, training new models is possible via software libraries and services like deep learning focused Theano and DL4J, that simplify the creation and execution of distributed models. Advanced libraries like TensorFlow enable ef icient design of deep learning model architectures. Efforts similar to Keras, modularize and integrate these lower‐level libraries into easily usable solutions. Machine learning libraries such as Photon ML build upon existing data platforms. Investments by companies into products like Nervana Systems Neon and Preferred Networks Chainer focus on optimizing the use of GPUs. Widely used community efforts like scikit‐learn serve as the growing space for new ideas. Foundational building blocks are delivered by company products like Nvidia Deep Learning and Microsoft DMTK. Advanced Analytics technologies are mostly based on Java, Scala, Python, Lua and C++. Experimental and small scale model building frequently happens in R. When performing large scale model building, the move to machine learning platforms makes sense. There are many companies pushing the performance and capabilities of machine learning. ML platforms are developed by Continuum Analytics, H2O, Dato, Skytree and others. There are specialized companies like manufacturing and Industrial IoT focused Uptake and others. From a data science process perspective, generic solution companies like DataRobot are streamlining the entire process of model building, selection and deployment for organizations doing large scale model building. Some technologies and companies are specializing further in a particular step in model building like model optimization by Sigopt and deployment by Yhat. From a different angle, Wolfram is pushing mathematics‐based computational knowledge, and is gaining traction in R&D intensive industries like biotechnology. Interesting IoT venues are opened by cloud HPC simulation platform Rescale that provides scalable model execution for variety of models like those by Ansys. From knowledge creation, an interesting approach is taken by SparkBeyond that is automating research as well as the search for complex patterns in data. Relevant to knowledge analytics, semantic analytics technologies are developed by companies like Cycorp. Topological analysis for knowledge discovery is developed by Ayasdi. The frontier of AGI is developed by companies like Vicarious and stealth startups, with a focus on applications in analyzing images and video. As the saying goes, build what you must, buy what you can. 39 G‐B. Huang, Z. Bai, L. Lekamalage, C. Kasun, C. M. Vong, Local Receptive Fields Based Extreme Learning Machine, IEEE Computational Intelligence Magazine, 2015 40 D. Ferrucci, E. Brown, J. Chu‐Carroll, J. Fan, D. Gondek, A. Kalyanpur, A. Lally, J. Murdock, E. Nyberg, J. Prager, N. Schlaefer, C. Welty, Building Watson: An Overview of the DeepQA Project, AI Magazine, 2010 Technical Report Networked Intelligence, 2016 Data Speci ic Analytics Language, audio and vision are the most important means of communication and perceiving the world for humans. For machines to be able to interact seamlessly with people, the frontier of enabling technologies is developed by IBM Watson, Google and Microsoft, among others. Besides bigger players, there are younger companies specializing in speci ic types of data analysis. For example Dextro is focused on making videos discoverable, searchable and curatable. Vision.ai is pushing vision services to the cloud. In satellite imagery, Planet Labs and others are focused on analysing the very large datasets. Clarifai Vision uses deep learning for detecting duplicates and doing visual searches. Similarly, in audio analysis there are companies like Nuance Communications providing speech and imaging applications for businesses. Given the very large knowledge base that the written Internet represents, there are a lot of commercial activities to extract knowledge from it, see for example import.io. For building your own, high performing text parsers like SyntaxNet and industrial spaCy tokenizer provide the basis for ef icient natural language processing (NLP) in English language. State of the art, research focused, NLP libraries like Carmel, NLTK, Gate provide advanced features like semantic reasoning and information extraction. For automated statistical machine translation, academic software like Moses exist. Applications of deep convolutional neural networks are the most successful in dealing with perceptual data41. Overall, the ield of Data Speci ic Analytics is advancing fast and considerable progress has been made in making language, audio and vision understandable to machines. Usage Layer Technologies deliver value through Applications. Here are some examples of how organizations are applying technologies in the data and IoT trend and how people can interact with the technologies. Applications I explicitly list existing applications rather than communicate speculative promises. Refer to angel and venture capital investments42 and venues like KDD to see where the market is heading: ● A frequent and most basic generic application is event and outlier detection. ● In the automotive industry, route optimization based on traf ic, as demonstrated by Google Waze and Zubie, is relevant for transportation and logistics, like Uber and Didi Chuxing. ● In synthetic biology and organism engineering, Zymergen is demonstrating the use of automation, data architecture and machine learning. ● In investment inance, Alphasense and Bloomberg are leading data application frontier. ● In retail inance, Lendup, Af irm, Mirador Lending, Inventure and Earnest are applying data for better servicing their customers. ● Energy intelligence is developed by EnerNOC. ● In internal intelligence, Palantir is leading the way. ● In market intelligence look for Funderbeam, Quid, Mattermark and CB Insights. ● Bayes Impact is applying data science for non‐pro it initiatives. 41 42 http://www.computervisionblog.com/2016/06/deep‐learning‐trends‐iclr‐2016.html For example Data Collective, Founders Fund, DFJ, Khosla Ventures, Andreessen Horowitz, Y Combinator. Technical Report ● ● ● ● ● ● ● ● Networked Intelligence, 2016 In personal health, companies like Jawbone, Mis it and Garmin help people track their itness goals. In agriculture, the Climate Corporation has found a way to protect farmers against the climate change. John Deere is providing APIs for precision agriculture. In enterprise sales, Salesforce is leading the way with acquisitions like MetaMind, Implisit, MinHash and RelateIQ as well as pipeline management by InsideSales and Pipedrive. Gainsight is pushing with customer success software. In enterprise customer service, wise.io and NICE Systems lead to data driven decisions. In enterprise security and fraud detection, Feedzai and Sift Science are the frontier. In cloud infrastructure monitoring, Datadog. New generation of company wide business intelligence by companies like Looker and Domo. In adtech, Rocketfuel. In enterprise legal, Ravel. There are valuable uses of data in many other areas demonstrated by many companies. Human Interfaces Intelligent systems must have processes of communication and control that interface with people43. The report’s focus is on user endpoints, rather than on data visualization and communication44. Machines have to adapt to the needs of people, so that they can interact naturally. User and customer experience design has become an integral part of developing applications. The most recent transformative technologies in user interfaces are virtual reality and augmented reality technologies, such as developed by HTC Vive, Magic Leap, Facebook Oculus and Meta. In mobile technology, user interfaces like Facebook M and wit.ai, Microsoft Cortana, Google Voice Recognition, Apple Siri, Turing Robot and api.ai make interaction with devices more intuitive. Automated assistants for interaction with corporate processes, systems and people, are reducing the burden of high volume communication brought by the email, chat and mobile apps era. By 2020 it is estimated that at least 50% of all searches are going to be either through images or speech45. Some of the companies to follow are x.ai and ClaraBridge. Assistants in combination with solutions like IFTTT can automate and connect Internet services so that they work together for the bene it of people and make their lives feel more natural. A system moving in this direction is Viv, based on a dynamically evolving cognitive architecture extending intent of the user. Limitations There are many detailed, technical limitations and API designs of existing technologies that must be taken into account in systems architecture. Here are the upper bounds for some of the factors: ● Financial cost and latency numbers46 of storage, network and processing services. ● Geographical locations of data centers and CDNs. Physical iber networks layout, with bandwidths realistically in the range of 10GBps on planetary scale. Coverage and quality of mobile networks. These mainly follow the trends of population and the Internet adoption. ● Linear scalability and high availability of data‐center scale OS proven on 10,000s of nodes. 43 T. Mikolov, A. Joulin, M. Baroni, A Roadmap towards Machine Intelligence, arXiv, 2015 C. Viau, Try Datavis Now, Github Books (in preparation), 2016 45 http://www.fastcompany.com/3035721/ 46 http://people.eecs.berkeley.edu/~rcs/research/interactive_latency.html 44 Technical Report ● ● ● ● ● Networked Intelligence, 2016 Automatic scalability of Data & IoT platforms to billions of devices47, proven scalability to trillions of messages per day48. Proven scalability of storage services to a few exabytes49. Some organizations think in zettabytes and above. For benchmarks on data platforms see TPC50 related materials. Limitations of Data Exchanges focused on a few industries like inancial and geospatial. Resource intensity of machine learning training processes addressed with GPU and FPGA. Lack of good solutions for highly multidimensional data visualization and communication. How the Pieces Fit Together Illustration with a possible top down structure of a very large scale, autonomous cyber physical system concept. It is just one way of clustering and labeling a network of processes that form such a system. To bring different research and commercial results together I illustrate a hierarchical system of systems concept where different independent subsystems deal with different levels of abstractions. In designing the concept the approach of systems thinking is used. Systems thinking includes the idea of layered structure. Architecture is an abstract description of the entities of a system and the relationships between those entities 51 . The allocation of physical or informational elements of function into elements of form is one of the earliest and most important decisions. This vision is not intended as a technical blueprint52, it is an illustration. The actual systems architecture would bene it from principles like reactive systems53, microservices54 and patterns like the blackboard architecture to achieve non‐functional requirements and provide programmable APIs to subsystems that can be used independently and for system management. Figure 3. A concept architecture of an intelligent system. The colors represent components with varying degree of maturity based on Technology Action: blue stands for mature, grey for emerging and white for nascent commercial grade technologies. 47 https://aws.amazon.com/iot/how‐it‐works/ http://www.con luent.io/blog/apache‐ka ka‐hits‐1.1‐trillion‐messages‐per‐day‐joins‐the‐4‐comma‐club 49 http://www.slideshare.net/AmazonWebServices/stg306‐efs‐how‐to‐store‐8‐exabytes‐look‐good‐doing‐it 50 http://www.tpc.org/ 51 E. Crawley, ESD.34 Systems Architecting — Lecture Notes. MIT Engineering Systems Division, IAP, 2007 48 52 J. Spolsky, Don't Let Architecture Astronauts Scare You, Joel on Software, 2001 http://www.reactivemanifesto.org/ 54 http://microservices.io/ 53 Technical Report Networked Intelligence, 2016 The structure is based on a direct mapping from a more detailed Research Progress and Technology Actions analysis. Systems can be built on top of platforms such as those in the Infrastructure Layer and Processing Layer sections. There can be multiple instantiations of subsystems or the entire system. The lowest abstraction level of the system is in Preprocessing Data low, that has to cope with diverse input data from other systems and its own subsystem processes. With well‐prepared data, high quality features and input information, the next level of abstractions is addressed by modeling and advanced analytics focused Core Data low. These subsystems form the basis for intelligent systems. The system has to have a connection to the environment through well‐de ined Output Interfaces and Core Human Interfaces. In large systems, explicit attention to system management is necessary to help designers, developers and operators decide how to impact the overall system to evolve in a certain direction. It makes sense to observe and analyze its behaviour and interactions with explicit threat intelligence and modeling functions. Preprocessing Data low This part of the illustration deals with lower abstraction levels of data, information and knowledge produced by both external and internal systems. Figure 4. Illustration of the subsystems dealing with low‐abstraction levels of data, information and knowledge. * stands for a mature feature, / stands for emerging feature Input Data, Info Merger and Knowledge Manager To observe context and environments, the system has to have well‐de ined input APIs. Preprocessing is one of the most human resource intensive activities, so aiming for high levels of automation in this part of the system has a high return of investment. To accelerate the progress further, the preprocessing can build upon Data Exchanges available in speci ic industries with high quality, preprocessed data streams and data batches. Given that the incoming information may be in a format and structure not directly usable by the system, decoding of information is necessary. As Technical Report Networked Intelligence, 2016 the input data is growing exponentially, the system needs measures to manage the growth rate of information. For achieving this, compression, archival and in some cases iltering and aggregation may be used. The types of information relevant to adaptive systems vary a lot in the Input Data. To understand language, the system should be able to adapt to changes in the languages55. For effective processing of images, segmentation, captioning and classi ication is necessary. For processing video, video analytics conducting captioning and extraction of timed events from the content, is necessary. Processing audio with speech recognition can be transformed into textual representation that can be fed into next processing steps. Furthermore, both internal and external model output can provide high‐dimensional input that should be classi ied and clustered. Vectors and multidimensional arrays are the output of this initial preprocessing step. These can be fused together based on structure, semantics and meta information, such as location, time, source, channel and destination. As shown by Data Exchanges. As a result, the Core Data low receives a set of uni ied data streams and batches for conducting advanced analytics. For the system’s ability to remember history, ef icient methods of storing both structured and unstructured data, information and knowledge are necessary. The data must be indexed according to the expected queries. Ef iciency in indexing is mandatory as it can be larger than the data itself. Depending on the nature of the data, there could be means for probabilistic retrieval. Data Curator, Data Preparer & Explorer For ensuring the quality of input data and enabling knowledge discovery, further subsystems are required in the preprocessing part of very large scale intelligent systems. Namely, a Data Curator has to ind data through involving experts and browsing Data Exchanges. The functions for managing the data, based on its use frequency, must be implemented so that the contents in the Knowledge Manager can be grouped into hot, warm and cold data, all using different technologies with different retrieval latencies. The overall quality management function in the Data Curator should offer means for assigning a quality rank to the data as well as operate automated quality engineering processes on the data. Input Data and the contents of the Knowledge Manager can rarely be used directly by the processes conducting advanced analytics. A Data Preparer takes care of processes that clean, normalize and do overall data enrichment before the modeling step. The functions have to deal with errors and their distributions, interpreting which requires a high degree of domain knowledge possessed by dedicated people. As the content is high‐dimensional, guidance for machines is needed to indicate what are the best features for solving a situation at hand. Feature manufacturing is a key process56. The Data Explorer targets automated feature extraction, feature relationship identi ication and dimensionality reduction processes to narrow down the sets of possible input variables for models. Given the state of technologies and the need for domain knowledge, human involvement is necessary. They can utilize new methods like topological data analysis to discover the most important relationships in the data for the models. 55 http://blog.stephenwolfram.com/2015/11/how‐should‐we‐talk‐to‐ais/ 56 http://www.kdnuggets.com/2015/12/harasymiv‐lessons‐kaggle‐machine‐learning.html Technical Report Networked Intelligence, 2016 Core Data low This part of the illustration is responsible for taking high quality inputs from the Preprocessing Data low and the Knowledge Manager and turning those into metrics, estimates, predictions, simulations and projections. The core parts of the subsystem are the Model Engine, Interpreter and Self‐improvement subsystems. The Model Engine subsystems focus on providing a wide range of useful models with effective training, execution and combining. The Interpreter takes the output of the models and processes the results along with models, so that these can be effectively shared with other systems and people. The Self‐improvement is about automating the processes of data science related to models. Figure 5. Illustration of the subsystem functions in the Core Data low responsible for the base intelligence Base Library, Executor and Selector The Base Library consists of models as well as metadata pointers to other intelligent system APIs. The goal of the models is to ind patterns, simulate speci ic scenarios for speci ic conditions, make predictions, create insights and enable decision‐making. The machine learning methods and models in the Base Library can be supervised, partially‐supervised and unsupervised, which means that the Self‐improvement subsystem has to have means to produce and manage content in the library. Some models, especially those related to physical objects, can be models based on systems of differential equations. These require different execution mode compared to ML. The Executor schedules and allocates resources for running selected models from a prioritized processing backlog. The distribution of the execution of training, simulation, operational and online learning models is a must‐have. The Executor may break the processes into intermediate steps that may produce intermediate datasets. These can be reused for speeding up the use of models in recurring situations. Looking for patterns Technical Report Networked Intelligence, 2016 in the model execution steps will improve the contents of the Base Library with new models that deal with different levels of abstractions. Successful use of models is usually a combination of methods and algorithms. The Selector builds the knowledge base of model performance on speci ic input combinations and uses the content for facilitating decisions when a hybrid intelligence or an ensemble model should be used. The content is managed by the Self‐improvement subsystem. The Selector also holds information about the empirical resource use of models to build a library of heuristics that can serve as input for model selection. Self‐improvement and Interpreter Building applicable models is a process that involves people with data science and domain expertise. The processes have to be automated to a great extent to enable fast adaption to new situations and changing conditions. Model performance improvements demonstrate diminishing returns over time, thus it is necessary to be able to monitor these changes to make decisions about the maturity and applicability of solutions to different situations. Similar to Data Curation, there should be means for model curation, as some types of methods like online learning can produce hundreds of thousands of models. Situations that are mission critical or frequently encountered by a cyber physical system, must be addressed quickly, while non‐mission‐critical situations can be addressed with a certain latency. This means that models can also be classi ied as hot, warm and cold in the libraries. This information can be used by the Executor in allocating resources and doing model deployments to runtime environment. The output of the models, as well as the way a model produced the output, are important bits of information for sound decision‐making and collaboration. For evaluating different forms of bias and uncertainties, the Interpreter collects information from the Model Engine and monitors for important occurrences of events. Since the model output, model description and metrics can be very large, this data needs to be compressed and encoded for ef icient communication. This is the most speculative piece of the illustration. Output Interfaces and Core Human Interfaces The events, decisions and insights are communicated through Output APIs. De ining these early in the development of a system is a must‐have activity. It guides the design and provides means to de ine baseline subsystem implementation that can be improved over time. As with any interface that is used in real Applications, in‐depth versioning and planning is required. The Core Human Interfaces are the most important control measures next to the system management. De ining these early in the system architecture is important for success. These are also measures for safety of the entire system. For further measures of safety, there should be a chain of command built throughout the subsystems impacting system actions directly. This chain can introduce interruptibility57 into the system. Given the complexity of the interfaces to an Intelligent System, two main functions are proposed. One is visualization that translates data into understandable form for human decision making. The other is interactive bots with which text, audio, images and video can be exchanged. The communication with 57 http://intelligence.org/ iles/Interruptibility.pdf Technical Report Networked Intelligence, 2016 interactive bots is a high priority input channel for the Preprocessing Data low, introducing a direct feedback loop into the system for training models. Notes on the Architecture Architectural principles for systems of systems have been long explored in both industry and academia. In short, the elements must be able to usefully operate independently, have managerial independence and support evolutionary development. In communication, the interfaces have to be standardized between different layers, which allows for dedicated developments in each system. For successful software modularisation and architecture, one should assume most components will be replaced during the lifecycle of the software. Unable to centrally analyse the data in its entirety, a system of systems remains distributed, with speci ic groups addressing speci ic aspects of the global networked system. Data protection gap needs to be explicitly addressed in the systems architecture58. Continuous deployment, testing and monitoring enable development speed and meeting non‐functional requirements. The traditional 7 layers of OSI model are insuf icient to describe the richness of new systems. Examples are reactive systems based on the concept of Actors. Actors represent a system of completely decoupled components that interact only using (a)synchronous messages. While it can be argued that it is a part of the “applications layer”, it unnecessarily bloats the layer. For future systems, such communication could be better represented by a new layer not yet present; call it the “systems layer” if you will. This layer would present systems for dynamic analysis of interaction networks to infer properties of the whole system. Intelligent System Initiatives The realization of the illustrated concept would be a bottom‐up endeavour by numerous dedicated parties59. Minimum Viable Products would be in order. Independent parties develop technologies, products and research according to their own agenda. In short, there are three types of actions relevant to such systems: ● ● ● 58 59 60 Incremental improvement with immediate commercial impact: ● Preprocessing Data low: Info Merger, Knowledge Manager ● Core Data low: Executor Innovation and applied research with impact in 3‐5 years60: ● Preprocessing Data low: Input Data, Data Curator and Preparer & Explorer ● Core Data low: Selector, Base Library and Self‐improvement ● Output Interfaces, Core Human Interfaces Fundamental research with tangible commercial impact in 10+ years61: ● Core Data low: Interpreter http://www.gigya.com/resource/whitepaper/the‐2015‐state‐of‐consumer‐privacy‐personalization/ S. Berkun, The Myths of Innovation, O'Reilly, 2010 Based on a list of public investment sizes and rounds in companies related to the ield The timeframe estimate is based on the observation that the research is emerging and ACM SigSoft Impact Project conclusion that software engineering breakthroughs take 10‐15 years to reach wide scale practice. 61 Technical Report Networked Intelligence, 2016 Leading organizations who are pushing the boundaries of intelligent system developments are listed below. Smaller companies tend to keep a lower pro ile and are not listed. Keeping an eye on the publications, public releases and acquisitions by these companies can serve as an indicator of directions and progress in the ield: ● ● ● ● ● ● ● ● ● Google Microsoft Apple Facebook AWS IBM Baidu IARPA OpenAI It is important to release software early in order to understand the dynamics and to ind improvement areas in design and implementation. Iterations and increments are essential in software engineering. Building real cyber physical systems architecture has to be based on actual requirements. Conclusion The bene its of intelligent systems are demonstrated by many ANI applications used by businesses, governments and society. Research relevant to the ield offers good basis for tackling complex scenarios and advancing the ield. The core infrastructure like data & IoT platforms and advanced analytics platforms are maturing with potential high‐value commercial applications. Relevant to the intelligent systems, the highest maturity is in data gathering and preprocessing, followed by advanced analytics. The hierarchical system of systems concept, consisting of parts related to data preprocessing, models and self‐improvement, shows how the different pieces may it together. This vision is not intended as a technical blueprint. I estimate that the concept illustrated here is achievable within a 5‐10 year timeframe. Bringing together research and technology developments is necessary for engineering intelligent systems. Hopefully this writing sparks developments and conversations that speed up the progress. Technical Report Networked Intelligence, 2016 Appendix Background on the Infrastructure Layer that impacts building of cyber physical systems. Building Blocks The base components that drive advancements of systems are processors, memories, drives and chargers. These de ine the basis for non‐functional requirements, especially performance. Processors by companies like Intel62, Qualcomm63 and others are targeting the new IoT and data era. While the era of Moore’s Law is coming to an end64, new types of processors like Tensor Processing Units65 and increasingly ield‐programmable gate arrays (FPGA) and potentially HP Nanostores66 and adiabatic quantum optimization processors by DWave67 68, are pushing the boundaries of what is possible with data focused hardware. Visual computing technologies by companies like Nvidia offer step jump increases in performance of ML, as GPUs increase the bandwidth, reduce latency and communication costs with built in support for matrix algebra69. Mature drive technologies like Solid State Drives productized by companies like Nimble Storage, offer signi icant read performance improvements compared to traditional hard disk drives. Wireless charging using new technologies by companies like uBeam and WiTricity offer new means to charge independent devices without the hassle of cables. This unlocks the potential of smart, autonomous devices in many applications. Devices and Machines Devices are becoming open and extensible platforms that are capable of complex tasks independently from central control, the so‐called Fog70 and Mist Computing71 that complement Cloud Computing. This creates new means for cyber physical systems to interact with the world. Incumbent electronics, appliances and mobile device manufacturers like LG are continuously innovating in new types of consumer devices. At the same time new Industrial Internet machines and software are developed by giants like Siemens. Companies like NXP Semiconductors and Psikick are innovating in the foundations of circuit design suitable for IoT era. Very small electronic devices (MEMS) by companies such as mCube offer new means to interact and control devices. At the same time prototyping platforms like Arduino, Raspberry Pi and Xilinx reduce the speed and cost of innovation in creation of devices. New applications can be developed quickly. 62 Intel Xeon Processor E7 Family for data analytics Qualcomm Snapdragon for mobile devices 64 https://www.technologyreview.com/s/601102/intel‐puts‐the‐brakes‐on‐moores‐law/ 65 N. Jouppi, Google supercharges machine learning tasks with TPU custom chip, Google Cloud Platform Blog, 2016 66 Ranganathan, From Microprocessors to Nanostores: Rethinking Data‐Centric Systems, IEEE Computer, 2011 67 D‐Wave Quantum Hardware 68 https://plus.google.com/+QuantumAILab/posts/DymNo8DzAYi 69 http://www.nvidia.com/object/machine‐learning.html 70 http://www.cisco.com/c/en/us/solutions/internet‐of‐things/iot‐fog‐computing.html 71 http://www.thinnect.com/mist‐computing/ 63 Technical Report Networked Intelligence, 2016 Overall commoditization and maturity of electronic components has led to major innovations of devices operating on land, air, sea and space. For example on land, products like Google Self Driving Car and Tesla are creating autonomous cars. Furthermore, incumbent companies like Ford, are turning their products into open platforms. In air, companies like DJI are producing commercial and recreational unmanned aerial systems. These devices are getting information platforms for developing and operating them, for example Airware and Dreamhammer. On the sea, companies like Liquid Robotics are developing autonomous ocean robots capable of covering vast distances. In space, new entrants like SpaceX and BlueOrigin are creating rockets for orbital light. At the same time companies like Spire and Planet Labs are driving bringing down the costs of space with nanosatellites for applications like satellite imagery. A similar transformation is happening in home automation, where home hubs like Google Nest and Amazon Echo are changing how we connect devices like thermostats and appliances at home. Companies like Tado and View Dynamic Glass are changing the historically plain devices, such as air conditioners and windows, into smart devices. Home robotics like social robots by Jibo and cleaning robots by iRobot are changing household chores and social interaction. Incumbent companies like Samsung, Honeywell and Philips are also investing heavily into home automation. Industrial automation is evolving at a similar scale and pace. Amazon Robotics, Starship and other companies are creating mobile robotic ful illment systems. Industrial Internet machine producers like Bosch and ABB are producing heavy‐industry electronics and machinery. Younger companies like Rethink Robotics and Kuka Robotics are creating industrial robots and factory automation solutions so humans can focus on other tasks. Increasingly more devices are attached to people with the wearables trend. Devices like Apple Watch (3 GFlops) and Pebble bring new human interfaces and ease of use to the people. Big companies like Japanese Rakuten and South Korean Samsung, and smaller ones like HumanCondition and Ringly are turning clothes, jewelry and accessories into smart endpoints. Overall, these trends are a big enabler for builders of cyber physical systems. Innovative devices and machines enable rapid adaptation not only in software, but also on hardware side. Moravec’s paradox72 seems to be becoming less of a challenge thanks to working real‐life applications. Operating Systems For dealing with the diversity of devices, there is also diversity in operating systems (OS). Universal OS like Windows, Ubuntu, Debian and FreeBSD will continue to unify this layer of technologies, but the more specialized operating systems like OS X, Android, iOS, Micrium and TinyOS will have a continued role to play. This means that at least when developing applications, multiple platform support requires dedicated attention of software engineers. For universal OS, technologies like Docker simplify deployment. When planning systems of systems, combining computations into a dynamic network of data processing quickly becomes a complex task of managing clusters of devices. Thus, new ways of expressing computation are developed by abstracting the device layer into programmable concepts, which can be combined into computational process lows. An example is the data center OS Mesosphere and Stratoscale. In designing very large scale systems, it makes sense to utilize this abstraction level to increase the focus on the core functionality. 72 V. Rotenberg, Moravec's Paradox: Consideration in the context of two brain hemisphere functions, Activitas Nervosa Superior, 2013 Technical Report Networked Intelligence, 2016 Protocols Different intents of communicating systems call for different protocols. This is clearly observable in the evolution of protocols in the IoT era. Most common ixed and Wireless protocols like WiFi, Bluetooth, RFID and LTE are seeing numerous additions of new industry speci ic protocols like Zigbee, LoRa, MQTT, NFC, 6LoWPAN, DDS, LWM2M, and application speci ic protocols like BitX and M‐Bus. The important takeaway is that these protocols address speci ic needs like speed, power consumption, resource constraint, reliability, machine‐to‐machine communication and other aspects relevant to building cyber physical systems. Products like Eero, simplify the complexity for dedicated needs, like use at homes. The same can be expected for of ices and factories. In designing the input and output interfaces of systems we must ind ways to deal with the diversity of protocols. The Data & IoT Platforms, as well as Data Exchange address this. Networks and Connectivity Networks form an integral part of systems as they enable communication. The infrastructure is advancing towards open, programmable environments, capable of operating at 1GBit/s with ms latencies. Companies like Cisco, Thinnect and others continue to innovate in this arena with concepts like software de ined networks and network as a service. With the increase of machine‐to machine communication, companies like Texas Instruments, Atmel and others, traditionally not focused on networks, are pushing the solution space of M2M communications with components. Younger companies like goTenna and others design and market wireless connectivity products for decentralized communications. There are also dedicated connectivity companies like Sigfox, Sierra and others pulling together different technologies to target speci ic needs of IoT, for example city‐scale across the globe. Large scale networking equipment and solutions are operated by telecom operators who share the strategic vision of IoT and data intensity. Thus we see companies like T‐Mobile and Huawei focus on data centers. The bigger players like Verizon, AT&T, China Mobile, SoftBank, Bharti Airtel, Orange Telecom, Telefonica, Vodafone and others are all investing into their capabilities to meet the future needs of IoT and data era, where the number of devices communicating over the network is very large. The largest underdeveloped populated area of the planet is currently Africa, but with leadership by companies like Millicom and MTN Group, the network quality will increase in time. In more remote and less populated areas there is still a long way to go, but there are initiatives targeting this need as well73. Networked systems pose several challenges, such as variable time delays, failures, recon igurations, not only at the lower layers of the OSI model, but at the application layer. Given that telecom operators have moved into providing applications in multimedia, we will see continued improvement in guarantees provided by the infrastructure, developed in partnership with content delivery networks (CDN) like Akamai and cloud service providers. Thus it is assumed, that in designing cyber physical systems, the designers and developers have to mainly focus on the quality of the edge communications required by the new protocols and devices. 73 https://info.internet.org/ Technical Report Networked Intelligence, 2016 Cloud Platforms Cloud is the most mature concept compared to Fog and Mist Computing. Networked computation is being pushed to the edges of networks. This creates a dynamically changing infrastructure environment where functionality is continuously moving between the edges and centralized systems. Cloud services offer ways to meet many of the non‐functional requirements, such as security and scalability. Initiatives like OWASP de ine requirements and ways for systems to advance from the base offer to more secure solutions. Companies like Ionic Security offer data protection & control platforms. The main service providers are Google Cloud, Microsoft Azure and Amazon Web Services (AWS) who all target data and machine learning74 75 76 related functionalities at planetary scale. Other providers like Salesforce Heroku can be used for fast innovation in specialized applications. Active Companies A list of companies mentioned in the report. There are many more pushing the boundaries of possibilities. Category Mentioned Companies Infrastructure Layer Building Blocks Intel, Qualcomm, Google, HP, DWave, Nvidia, Nimble Storage, uBeam, WiTricity Devices and Machines LG, Siemens, NXP Semiconductors, Psikick, mCube, Arduino, Xilinx, Google, Tesla, Ford, DJI, Airware, Dreamhammer, Liquid Robotics, SpaceX, BlueOrigin, Spire, Planet Labs, Google, Amazon, Tado, View, iRobot, Samsung, Honeywell, Philips, Bosch, ABB, Rethink Robotics, Kuka Robotics, Apple, Pebble, Rakuten, HumanCondition, Ringly Operating Systems Microsoft, Apple, Canonical, Micrium, Docker, Mesosphere, Stratoscale Networks and Connectivity Cisco, Thinnect, Texas Instruments, Atmel, goTenna, Sigfox, Sierra, T‐Mobile, Huawei, Verizon, AT&T, China Mobile, SoftBank, Bharti Airtel, Orange Telecom, Telefonica, Vodafone, Millicom, MTN Group, Internet.org, Akamai Cloud Platforms Google Cloud, Microsoft Azure, Amazon Web Services, Salesforce Heroku Processing Layer Data & IoT Platforms 74 Cloudera, MapR, HortonWorks, LinkedIn, Twitter, DataBricks, Data Artisans, HP, Kx, Paradigm4, Facebook, Cisco Jasper, PTC Thingworx, GE, Pivotal, Helium, Hologram, Planet OS https://cloud.google.com/products/machine‐learning/ https://aws.amazon.com/machine‐learning/ 76 https://azure.microsoft.com/en‐us/services/machine‐learning/ 75 Technical Report Networked Intelligence, 2016 Data Preprocessing and Exchanges Tamr, Trifacta, CrowdFlower, snapLogic, Xignite, Planet OS, Enigma, Qlik, Microsoft Advanced Analytics Platforms Google, Nervana Systems, Preferred Networks, Nvidia, Microsoft, Continuum Analytics, H2O, Dato, Skytree, Uptake, DataRobot, Yhat, Sigopt, Wolfram, Rescale, SparkBeyond, Cycorp, Ayasdi, Vicarious Data Speci ic Analytics IBM Watson, Google, Microsoft, Dextro, Vision.ai, Planet Labs, Clarifai Vision, Nuance Communications, import.io Usage Layer Applications Google, Zymergen, Alphasense, Bloomberg, Lendup, Af irm, Mirador Lending, Inventure, Earnest, EnerNOC, Palantir, Funderbeam, Quid, Mattermark, CB Insights, Bayes Impact, Jawbone, Mis it, Garmin, Climate Corp, John Deere, Salesforce, InsideSales, Pipedrive, Gainsight, wise.io, NICE Systems, Feedzai, Sift Science, Datadog, Looker, Domo, Rocketfuel, Ravel Human Interfaces HTC, Magic Leap, Facebook Oculus, Meta, wit.ai, Microsoft, Apple, Turing Robot, api.ai, x.ai, ClaraBridge, IFTTT, Viv
3cs.SY
arXiv:1711.10331v1 [cs.LG] 25 Nov 2017 Complex Structure Leads to Overfitting: A Structure Regularization Decoding Method for Natural Language Processing Xu Suna , Weiwei Suna,b , Shuming Maa , Xuancheng Rena , Yi Zhanga , Wenjie Lic , Houfeng Wanga a MOE Key Laboratory of Computational Linguistics, Peking University of Computer Science and Technology, Peking University c Department of Computing, The Hong Kong Polytechnic University b Institute Abstract Recent systems on structured prediction focus on increasing the level of structural dependencies within the model. However, our study suggests that complex structures entail high overfitting risks. To control the structure-based overfitting, we propose to conduct structure regularization decoding (SR decoding). The decoding of the complex structure model is regularized by the additionally trained simple structure model. We theoretically analyze the quantitative relations between the structural complexity and the overfitting risk. The analysis shows that complex structure models are prone to the structure-based overfitting. Empirical evaluations show that the proposed method improves the performance of the complex structure models by reducing the structurebased overfitting. On the sequence labeling tasks, the proposed method substantially improves the performance of the complex neural network models. The maximum F1 error rate reduction is 36.4% for the third-order model. The proposed method also works for the parsing task. The maximum UAS improvement is 5.5% for the tri-sibling model. The results are competitive with or better than the state-of-the-art results. 1 Keywords: Structural complexity regularization, Structured prediction, Overfitting risk reduction, Linear structure, Tree structure, Deep Learning 1. Introduction Structured prediction models are often used to solve the structure dependent problems in a wide range of application domains including natural language processing, bioinformatics, speech recognition, and computer vision. To solve the structure dependent problems, many structured prediction methods have been developed. Among them Email addresses: [email protected] (Xu Sun), [email protected] (Weiwei Sun), [email protected] (Shuming Ma), [email protected] (Xuancheng Ren), [email protected] (Yi Zhang), [email protected] (Wenjie Li), [email protected] (Houfeng Wang) 1 This work is a substantial extension of a conference paper presented at NIPS 2014 [1]. Preprint submitted to Artificial Intelligence November 29, 2017 the representative models are conditional random fields (CRFs), deep neural networks, and structured perceptron models. In order to capture the structural information more accurately, some recent studies emphasize on intensifying structural dependencies in structured prediction by applying long range dependencies among tags, developing long distance features or global features, and so on. From the probabilistic perspective, complex structural dependencies may lead to better modeling power. However, this is not the case for most of the structured prediction problems. It has been noticed that some recent work that tries to intensify the structural dependencies does not really benefit as expected, especially for neural network models. For example, in sequence labeling tasks, a natural way to increase the complexity of the structural dependencies is to make the model predict two or more consecutive tags for a position. The new label for a word now becomes a concatenation of several consecutive tags. To correctly predict the new label, the model can be forced to learn the complex structural dependencies involved in the transition of the new label. Nonetheless, the experiments contradict the hypothesis. With the increasing number of the tags to be predicted for a position, the performance of the model deteriorates. In the majority of the tasks we tested, the performance decreases substantially. We show the results in Section 4.1.1. We argue that over-emphasis on intensive structural dependencies could be misleading. Our study suggests that complex structures are actually harmful to model accuracy. Indeed, while it is obvious that intensive structural dependencies can effectively incorporate the structural information, it is less obvious that intensive structural dependencies have a drawback of increasing the generalization risk. Increasing the generalization risk means that the trained models tend to overfit the training data. The more complex the structures are, the more instable the training is. Thus, the training is more likely to be affected by the noise in the data, which leads to overfitting. Formally, our theoretical analysis reveals why and with what degree the structure complexity lowers the generalization ability of the trained models. Since this type of overfitting is caused by the structural complexity, it can hardly be solved by ordinary regularization methods, e.g., the weight regularization methods, such as L2 and L1 regularization schemes, which are used only for controlling the weight complexity. To deal with this problem, we propose a simple structural complexity regularization solution based on structure regularization decoding. The proposed method trains both the complex structure model and the simple structure model. In decoding, the simpler structure model is used to regularize the complex structure model, deriving a model with better generalization power. We show both theoretically and empirically that the proposed method can reduce the overfitting risk. In theory, the structural complexity has the effect of reducing the empirical risk, but increasing the overfitting risk. By regularizing the complex structure with the simple structure, a balance between the empirical risk and the overfitting risk can be achieved. We apply the proposed method to multiple sequence labeling tasks, and a parsing task. The formers involve linear-chain models, i.e., LSTM [2] models, and the latter involves hierarchical models, i.e., structured perceptron [3] models. Experiments demonstrate that the proposed method can easily surpass the performance of both the simple structure model and the complex structure model. Moreover, the results are competitive with the state-of-the-art results or better than the state-of-the-arts. 2 To the best of our knowledge, this is the first theoretical effort on quantifying the relation between the structural complexity and the generalization risk in structured prediction. This is also the first proposal on structural complexity regularization via regularizing the decoding of the complex structure model by the simple structure model. The contributions of this work are two-fold: • On the methodology side, we propose a general purpose structural complexity regularization framework for structured prediction. We show both theoretically and empirically that the proposed method can effectively reduce the overfitting risk in structured prediction. The theory reveals the quantitative relation between the structural complexity and the generalization risk. The theory shows that the structure-based overfitting risk increases with the structural complexity. By regularizing the structural complexity, the balance between the empirical risk and the overfitting risk can be maintained. The proposed method regularizes the decoding of the complex structure model by the simple structure model. Hence, the structured-based overfitting can be alleviated. • On the application side, we derive structure regularization decoding algorithms for several important natural language processing tasks, including the sequence labeling tasks, such as chunking and name entity recognition, and the parsing task, i.e., joint empty category detection and dependency parsing. Experiments demonstrate that our structure regularization decoding method can effectively reduce the overfitting risk of the complex structure models. The performance of the proposed method easily surpasses the performance of both the simple structure model and the complex structure model. The results are competitive with the state-of-the-arts or even better. The structure of the paper is organized as the following. We first introduce the proposed method in Section 2 (including its implementation on linear-chain models and hierarchical models). Then, we give theoretical analysis of the problem in Section 3. The experimental results are presented in Section 4. Finally, we summarize the related work in Section 5, and draw our conclusions in Section 6. 2. Structure Regularization Decoding Some recent work focuses on intensifying the structural dependencies. However, the improvements fail to meet the expectations, and the results are even worse sometimes. Our theoretical study shows that the reason is that although the complex structure results in the low empirical risk, it causes the high structure-based overfitting risk. The theoretical analysis is presented in Section 3. According to the theoretical analysis, the key to reduce the overall overfitting risk is to use a complexity-balanced structure. However, such kind of structure is hard to define in practice. Instead, we propose to conduct joint decoding of the complex structure model and the simple structure model, which we call Structure Regularization Decoding (SR Decoding). In SR decoding, the simple structure model acts as a regularizer that balances the structural complexity. 3 As the structures vary with the tasks, the implementation of structure regularization decoding also varies. In the following, we first introduce the general framework, and then show two specific algorithms for different structures. One is for the linear-chain structure models on the sequence labeling tasks, and the other is for the hierarchical structure models on the joint empty category detection and dependency parsing task. 2.1. General Structure Regularization Decoding Before describing the method formally, we first define the input and the output of the model. Suppose we are given a training example (xx, y ), where x ∈ Xn is the input and y ∈ Yn is the output. Here, X stands for the feature space, and Y stands for the tag space, which includes the possible substructures regarding to each input position. In preprocessing, the raw text input is transformed into a sequence of corresponding features, and the output structure is transformed into a sequence of input position related tags. The reason for such definition is that the output structure varies with tasks. For simplicity and flexibility, we do not directly model the output structure. Instead, we regard the output structure as a structural combination of the output tags of each position, which is the input position related substructure. Different modeling of the structured output, i.e., different output tag space, will lead to different complexity of the model. For instance, in the sequence labeling tasks, Y could be the space of unigram tags, and then y is a sequence of y i . Y could also be the space of bigram tags. The bigram tag means the output regrading to the input feature x i involves two consecutive tags, e.g. the tag at position i, and the tag at position i + 1. Then, y is the combination of the bigram tags y i . This also requires proper handling of the tags at overlapping positions. It is obvious that the structural complexity of the bigram tag space is higher than that of the unigram tag space. Point-wise classification is donated by g(xx, k, y), where g is the model that assigns the scores to each possible output tag y at the position k. For simplicity, we denote g(xx, k) = argmaxy∈Y g(xx, k, y), so that g : Xn × R 7→ Y. Given a point-wise cost function c : Y × Y 7→ R, which scores the predicted output based on the gold standard output, the model can be learned as: g = argmin g |xx| X X c(g(xx, i), y i ) (xx,yy)∈S i=1 For the same structured prediction task, suppose we could learn two models g1 and g2 of different structural complexity, where g1 : Xn × R 7→ Y is the simple structure model, and g2 : Xn × R 7→ Z is the complex structure model. Given the corresponding point-wise cost function c1 and c2 , the proposed method first learns the models separately: g1 = argmin g g2 = argmin g |xx| X X c1 (g(xx, i), y i ) (xx,yy)∈S 1 i=1 |xx| X X (xx,zz)∈S 2 i=1 4 c2 (g(xx, i), z i ) Suppose there is a mapping T from Z to {y|y ∈ Y}, that is, the complex structure can be decomposed into simple structures. In testing, prediction is done by structure regularization decoding of the two models, based on the complex structure model: z = argmax z ∈Z|xx| |xx| X (g2 (xx, i, z i ) + X g1 (xx, i, y)) (1) y∈T (zzi ) i=1 In the decoding of the complex structure model, the simple structure model acts as a regularizer that balances the structural complexity. We try to keep the description of the method as straight-forward as possible without loss of generality. However, we do make some assumptions. For example, the general algorithm combines the scores of the complex model and the simple model at each position by addition. However, the combination method should be adjusted to the task and the simple structure model used. For example, if the model g is a probabilistic model, multiplication should be used instead of the addition. Besides, the number of the models is not limited in theory, as long as (1) is changed accordingly. Moreover, if the joint training of the models is affordable, the models are not necessarily to be trained independently. These examples are intended to demonstrate the flexibility of the structure regularization decoding algorithms. The detailed implementation should be considered with respect to the task and the model. In what follows, we show how structure regularization decoding is implemented on two typical structures in natural language processing, i.e. the sequence labeling tasks, which involve linear-chain structures, and the dependency parsing task, which involves hierarchical structures. We focus on the differences and the considerations when deriving structure regularization decoding algorithms. It needs to be reminded that the implementation of the structure regularization decoding method can be adapted to more kinds of structures. The implementation is not limited to the structures or the settings that we use. 2.2. SR Decoding for Sequence Labeling Tasks We first describe the model, and then explain how the framework in Section 2.1 can be implemented for the sequence labeling tasks. Sequence labeling tasks involve linear-chain structures. For a sequence labeling task, a reasonable model is to find a label sequence with the maximum probability conditioned on the sequence of observations, i.e. words. Given a sequence of observations x = x1 , x2 , · · · , xT , and a sequence of labels, y = y1 , y2 , ..., yT , where T denotes the sentence length, we want to estimate the joint probability of the labels conditioned on the observations as follows: p(yy|xx) = p(y1 , y2 , · · · , yT |x1 , x2 , · · · , xT ) If we model the preceding joint probability directly, the number of parameters that need to be estimated is extremely large, which makes the problem intractable. Most existing studies make Markov assumption to reduce the parameters. We also make an order-n Markov assumption. Different from the typical existing work, we decompose the original joint probability into a few localized order-n joint probabilities. The 5 multiplication of these localized order-n joint probabilities is used to approximate the original joint probability. Furthermore, we decompose each localized order-n joint probability to the stacked probabilities from order-1 to order-n, such that we can efficiently combine the multi-order information. By using different orders of the Markov assumptions, we can get different structural complexity of the model. For example, if we use the Markov assumption of order-1, we obtain the simplest model in terms of the structural complexity: p(yy|xx) = p(y1 , y2 , · · · , yT |x1 , x2 , · · · , xT ) , p(y1 |xx)p(y2 |xx) · · · p(yT |xx) = T Y (p (yt |xx)) t=1 If we use the Markov assumption with order-2, we estimate the original joint probability as follows: p(yy|xx) = p(y1 , y2 , · · · , yT |x1 , x2 , · · · , xT ) , p(y1 , y2 |xx)p(y2 , y3 |xx) · · · p(yT −1 , yT |xx) = T −1 Y (p (yt , yt+1 |xx)) t=1 This formula models the bigram tags with respect to the input. The search space expands, and entails more complex structural dependencies. To learn such models, we need to estimate the conditional probabilities. In order to make the problem tractable, a feature mapping is often introduced to extract features from conditions, to avoid a large parameter space. In this paper, we use BLSTM to estimate the conditional probabilities, which has the advantage that feature engineering is reduced to the minimum. Moreover, the conditional probabilities of higher order models can be converted to the joint probabilities of the output labels conditioned on the input labels. When using neural networks, learning of n-order models can be conducted by just extending the tag set from unigram labels to n-gram labels. In training, this only affects the computational cost of the output layer, which is linear to the size of the tag set. The models can be trained very efficiently with a affordable training cost. The strategy is showed in Figure 1. To decode with structure regularization, we need to connect the models of different complexity. Fortunately, the complex model can be decomposed into a simple model and another complex model. Notice that: p(yt , yt+1 |xx) = p(yt+1 |xx, yt )p(yt |xx) 6 𝑦 𝑦 SR decoding decoding BIO B BI BLSTM BLSTM 𝑥 𝑥 BIO Figure 1: Illustration of SR-decoding on sequence labeling task (Left: third-order BLSTM. Right: thirdorder BLSTM with SR-decoding). BLSTM decodes with third-order tags directly, while SR-decoding jointly decodes with first-order, second-order, and third-order tags. The original joint probability can be rewritten as: p(yy|xx) = p(y1 , y2 , · · · , yT |x1 , x2 , · · · , xT ) , (y1 , y2 |xx)p(y2 , y3 |xx) · · · p(yT −1 , yT |xx) = p(y2 |xx, y1 )p(y1 |xx)p(y3 |xx, y2 )p(y2 |xx) · · · p(yT |xx, yT −1 )p(yT −1 |xx) = T −1 Y (p (yt+1 |yt , x ) p (yt |xx)) t=1 In the preceding equation, the complex model is p(yt+1 |yt , x ). It predicts the next label based on the current label and the input. p(yt |xx) is the simplest model. In practice, we estimate p(yt+1 |yt , x ) also by BLSTMs, and the computation is the same with p(yt , yt+1 |xx). The derivation can also be generalized to an order-n case, which consists of the models predicting the length-1 to length-n label sequence for a position. Moreover, the equation explicitly shows a reasonable way of SR decoding, and how the simple structure model can be used to regularize the complex structure model. Figure 1 illustrates the method. However, considering the sequence of length T and an order-n model, decoding is not scalable, as the computational complexity of the algorithm is O(nT ). To accelerate SR decoding, we prune the tags of a position in the complex structure model by the topmost possible tags of the simplest structure model. For example, if the output tags of the complex structure are bigram labels, i.e. Z = Y×Y, the available tags for a position in the complex structure model are the combination of the most probable unigram tags of the position, and the position before. In addition, the tag set of the complex model is also pruned so that it only contains the tags appearing in the training set. The detailed algorithm with pruning, which we name scalable multi-order decoding, is given in Appendix B. 2.3. SR Decoding for Dependency Parsing We first give a brief introduction to the task. Then, we introduce the model, and finally we show the structure regularization decoding algorithm for this task. 7 root But it ∅1 is n’t clear how long GM would be willing ∅2 to fight ... ∅3 Figure 2: An example of the dependency parsing analysis augmented with empty elements from PTB. The dependency structure is according to Stanford Dependency. “∅” denotes an empty element. “∅1 ” indicates an expletive construction; “∅2 ” indicates that the subject for fight, i.e. GM, is located in another place; “∅3 ” indicates a wh-movement. The task in question is the parsing task, specifically, joint empty category detection and dependency parsing, which involves hierarchical structures. In many versions of Transformational Generative Grammars, e.g., the Government and Binding [4] theory, empty category is the key concept bridging S-Structure and D-Structure, due to its possible contribution to trace movements. Following the linguistic insights, a traditional dependency analysis can be augmented with empty elements, viz. covert elements [5]. Figure 2 shows an example of the dependency parsing analysis augmented with empty elements. The new representations leverages hierarchical tree structures to encode not only surface but also deep syntactic information. The goal of empty category detection is to find out all empty elements, and the goal of dependency parsing thus includes predicting not only the dependencies among normal words but also the dependencies between a normal word and an empty element. In this paper, we are concerned with how to employ the structural complexity regularization framework to improve the performance of empty category augmented dependency analysis, which is a complex structured prediction problem compared to the regular dependency analysis. A traditional dependency graph G = (V, A) is a directed graph, such that for sentence x = w1 , . . . , wn the following holds: 1. V = {0, 1, 2, . . . , n}, 2. A ⊆ V × V. The vertex set V consists of n + 1 nodes, each of which is represented by a single integer. Especially, 0 represents a virtual root node w0 , while all others corresponded to words in x. The arc set A represents the unlabeled dependency relations of the particular analysis G. Specifically, an arc (i, j) ∈ A represents a dependency from head wi to dependent w j . A dependency graph G is thus a set of unlabeled dependency relations between the root and the words of x. To represent an empty category augmented dependency tree, we extend the vertex set and define a directed graph as usual. To define a parsing model, we denote the index set of all possible dependencies as I = {(i, j)|i ∈ {0, · · · , n}, j ∈ {1, · · · , n}, i , j}. A dependency parse can then be represented as a vector y = {y(i, j) : (i, j) ∈ I} where y(i, j) = 1 if there is an arc (i, j) in the graph, and 0 otherwise. For a sentence x, 8 we define dependency parsing as a search for the highest-scoring analysis of x: y∗ (x) = arg max Score(x, y) y∈Y(x) (2) Here, Y(x) is the set of all trees compatible with x and Score(x, y) evaluates the event that tree y is the analysis of sentence s. In brief, given a sentence x, we compute its parse y∗ (x) by searching for the highest-scored dependency parse in the set of compatible trees Y(x). The scores are assigned by Score. In this paper, we evaluate structured perceptron and define Score(x, y) as w> Φ(x, y) ,where Φ(x, y) is a feature-vector mapping and w is the corresponding parameter vector. In general, performing a direct maximization over the set Y(x) is infeasible. The common solution used in many parsing approaches is to introduce a part-wise factorization: X φ(x, p) Φ(x, y) = p∈Part(y) Above, we have assumed that the dependency parse y can be factored into a set of parts p, each of which represents a small substructure of y. For example, y might be factored into the set of its component dependencies. A number of dynamic programming (DP) algorithms have been designed for first- [6], second- [7, 8], third- [9] and fourth-order [10] factorization. Parsing for joint empty category detection and dependency parsing can be defined in a similar way. We use another index set I0 = {(i, j)|i, j ∈ {1, · · · , n + (n + 1)2 }}, where i > n indicates an empty node. Then a dependency parse with empty nodes can be represented as a vector similar to y: z = {z(i, j) : (i, j) ∈ I0 }. Let Z(x) denote the set of all possible z for sentence x. We then define joint empty category detection and dependency parsing as a search for the highest-scoring analysis of x: X w> φ(x, z) (3) z∗ (x) = arg max z∈Z(x) p∈Part(z) When the output of the factorization function, namely Part(x), is defined as the collection of all sibling or tri-sibling dependencies, decoding for the above two optimization problems, namely (2) and (3), can be resolved in low-degree polynomial time with respective to the number of words contained in x [7, 9, 11]. In particular, the decoding algorithms proposed by Zhang et al. [11] are extensions of the algorithms introduced respectively by McDonald and Pereira [7] and Koo and Collins [9]. To perform structure regularization decoding, we need to combine the two models. In this problem, as the models are linear and do not involve probability, they can be easily combined together. Assume that f : Y → R and g : Z → R assign scores to parse trees without and with empty elements, respectively. In particular, the training data for estimating f are sub-structures of the training data for estimating g. Therefore, the training data for f can be viewed as the mini-samples of the training data for g. 9 A reasonable model to integrate f and g is to find the optimal parse by solving the following optimization problem: max. s.t. λ f (y) + (1 − λ)g(z) y ∈ Y, z ∈ Z y(i, j) = z(i, j), ∀(i, j) ∈ I (4) where λ is a weight for score combination. In this paper, we employ dual decomposition to resolve the optimization problem (4). We sketch the solution as follows. The Lagrangian of (4) is X L(y, z; u) = f (y) + g(z) + u(i, j)(y(i, j) − z(i, j)) (i, j)∈I where u is the Lagrangian multiplier. Then the dual is L(u) = max L(y, z; u) X X = max( f (y) + u(i, j)y(i, j)) + max(g(z) − u(i, j)z(i, j)) y∈Y,z∈Z y∈Y z∈Z (i, j)∈I (i, j)∈I We instead try to find the solution for min L(u). u By using a subgradient method to calculate maxu L(u), we have another SR decoding algorithm. Notice that, there is no need to train the simple model and the complex model separately. Algorithm 1 SR Decoding Algorithm for Dependency Parsing u(0) ← 0 for k = 0 → K do P y ← arg maxy∈Y ( f (y) + i, j u(i, j)y(i, j)) P z ← arg maxz∈Z (g(z) − i, j u(i, j)z(i, j)) if ∀(i, j) ∈ I, y(i, j) = z(i, j) then return z else u(k+1) ← u(k) − α(k) (y − z) end if end for return z 3. Theoretical Analysis: Structure Complexity vs. Overfitting Risk We first describe the settings for the theoretical analysis, and give the necessary definitions (Section 3.1). We then introduce the proposed method with the proper annotations for clearance of the analysis (Section 3.2). Finally, we give the theoretical 10 results on analyzing the generalization risk regarding to the structure complexity based on stability (Section 3.3). The general idea behind the theoretical analysis is that the overfitting risk increases with the complexity of the structure, because more complex structures are less stable in training. If some examples are taken out of the training set, the impact on the complex structure models is much severer compared to the simple structure models. The detailed relations among the factors are shown by the analysis. 3.1. Problem Settings of Theoretical Analysis In this section, we give the preliminary definitions necessary for the analysis, including the learning algorithm, the data, and the cost functions, and especially the definition of structural complexity. We also describe the properties and the assumptions we make to facilitate the theoretical analysis. A graph of observations (even with arbitrary structures) can be indexed and be denoted by an indexed sequence of observations O = {o1 , . . . , on }. We use the term sample to denote O = {o1 , . . . , on }. For example, in natural language processing, a sample may correspond to a sentence of n words with dependencies of linear chain structures (e.g., in part-of-speech tagging) or tree structures (e.g., in syntactic parsing). In signal processing, a sample may correspond to a sequence of n signals with dependencies of arbitrary structures. For simplicity in analysis, we assume all samples have n observations (thus n tags). In the analysis, we define structural complexity as the scope of the structural dependency. For example, a dependency scope of two tags is considered less complex than a dependency scope of three tags. In particular, the dependency scope of n tags is considered the full dependency scope which is of the highest structural complexity. A sample is converted to an indexed sequence of feature vectors x = {xx(1) , . . . , x (n) }, where x (k) ∈ X is of the dimension d and corresponds to the local features extracted from the position/index k. We can use an n × d matrix to represent x ∈ Xn . In other words, we use X to denote the input space on a position, so that x is sampled from Xn . Let Yn ⊂ Rn be structured output space, so that the structured output y are sampled from Yn . Let Z = (Xn , Yn ) be a unified denotation of structured input and output space. Let z = (xx, y ), which is sampled from Z, be a unified denotation of a (xx, y ) pair in the training data. Suppose a training set is S = {zz1 = (xx1 , y 1 ), . . . , z m = (xxm , y m )}, with size m, and the samples are drawn i.i.d. from a distribution D which is unknown. A learning algorithm is a function G : Zm 7→ F with the function space F ⊂ {Xn 7→ Yn }, i.e., G maps a training set S to a function GS : Xn 7→ Yn . We suppose G is symmetric with respect to S , so that G is independent on the order of S . Structural dependencies among tags are the major difference between structured prediction and non-structured classification. For the latter case, a local classification of g based on a position k can be expressed as g(xx(k−a) , . . . , x (k+a) ), where the term {xx(k−a) , . . . , x (k+a) } represents a local window. However, for structured prediction, a local classification on a position depends on the whole input x = {xx(1) , . . . , x (n) } rather than a local window, due to the nature of structural dependencies among tags (e.g., 11 graphical models like CRFs). Thus, in structured prediction a local classification on k should be denoted as g(xx(1) , . . . , x (n) , k). To simplify the notation, we define g(xx, k) , g(xx(1) , . . . , x (n) , k) Given a training set S of size m, we define S \i as a modified training set, which removes the i’th training sample: S \i = {zz1 , . . . , z i−1 , z i+1 , . . . , z m }, and we define S i as another modified training set, which replaces the i’th training sample with a new sample ẑ i drawn from D: S i = {zz1 , . . . , zi−1 , ẑi , zi+1 , . . . , zm }, We define the point-wise cost function c : Y × Y 7→ R+ as c[GS (xx, k), y (k) ], which measures the cost on a position k by comparing GS (xx, k) and the gold-standard tag y (k) . We introduce the point-wise loss as `(GS , z , k) , c[GS (xx, k), y (k) ] Then, we define the sample-wise cost function C : Yn × Yn 7→ R+ , which is the cost function with respect to a whole sample. We introduce the sample-wise loss as L(GS , z ) , C[GS (xx), y ] = n X `(GS , z , k) = k=1 n X c[GS (xx, k), y (k) ] k=1 Given G and a training set S , what we are most interested in is the generalization risk in structured prediction (i.e., the expected average loss) [12, 13]: R(GS ) = Ez h L(GS , z ) i n Unless specifically indicated in the context, the probabilities and expectations over random variables, including Ez (.), ES (.), Pz (.), and PS (.), are based on the unknown distribution D. Since the distribution D is unknown, we have to estimate R(GS ) from S by using the empirical risk: m Re (GS ) = m n 1 X 1 XX L(GS , z i ) = `(GS , z i , k) mn i=1 mn i=1 k=1 In what follows, sometimes we will use the simplified notations, R and Re , to denote R(GS ) and Re (GS ). To state our theoretical results, we must describe several quantities and assumptions which are important in structured prediction. We follow some notations and assumptions on non-structured classification [14, 15]. We assume a simple real-valued structured prediction scheme such that the class predicted on position k of x is the sign 12 of GS (xx, k) ∈ D. In practice, many popular structured prediction models have a realvalued cost function. Also, we assume the point-wise cost function cτ is convex and τ-smooth such that ∀y1 , y2 ∈ D, ∀y∗ ∈ Y |cτ (y1 , y∗ ) − cτ (y2 , y∗ )| ≤ τ|y1 − y2 | (5) While many structured learning models have convex objective function (e.g., CRFs), some other models have non-convex objective function (e.g., deep neural networks). It is well-known that the theoretical analysis on the non-convex cases are quite difficult. Our theoretical analysis is focused on the convex situations and hopefully it can provide some insight for the more difficult non-convex cases. In fact, we will conduct experiments on neural network models with non-convex objective functions, such as LSTM. Experimental results demonstrate that the proposed structural complexity regularization method also works in the non-convex situations, in spite of the difficulty of the theoretical analysis. Then, τ-smooth versions of the loss and the cost function can be derived according to their prior definitions: Lτ (GS , z ) = Cτ [GS (xx), y ] = n X `τ (GS , z , k) = k=1 n X cτ [GS (xx, k), y (k) ] k=1 Also, we use a value ρ to quantify the bound of |GS (xx, k)−GS \i (xx, k)| while changing a single sample (with size n0 ≤ n) in the training set with respect to the structured input x . This ρ-admissible assumption can be formulated as ∀k, |GS (xx, k) − GS \i (xx, k)| ≤ ρ||GS − GS \i ||2 · ||xx||2 (6) where ρ ∈ R+ is a value related to the design of algorithm G. 3.2. Structural Complexity Regularization Base on the problem settings, we give definitions for the common weight regularization and the proposed structural complexity regularization. In the definition, the proposed structural complexity regularization decomposes the dependency scope of the training samples into smaller localized dependency scopes. The smaller localized dependency scopes form mini-samples for the learning algorithms. It is assumed that the smaller localized dependency scopes are not overlapped. Hence, the analysis is for a simplified version of structural complexity regularization. We are aware that in implementation, the constraint can be hard to guarantee. From an empirical side, structural complexity works well without this constraint. Most existing regularization techniques are proposed to regularize model weights/parameters, e.g., a representative regularizer is the Gaussian regularizer or so called L2 regularizer. We call such regularization techniques as weight regularization. Definition 1 (Weight regularization). Let Nλ : F 7→ R+ be a weight regularization function on F with regularization strength λ, the structured classification based objective function with general weight regularization is as follows: Rλ (GS ) , Re (GS ) + Nλ (GS ) 13 (7) While weight regularization normalizes model weights, the proposed structural complexity regularization method normalizes the structural complexity of the training samples. Our analysis is based on the different dependency scope (i.e., the scope of the structural dependency), such that, for example, a tag depending on two tags in context is considered to have less structural complexity than a tag depending on four tags in context. The structural complexity regularization is defined to make the dependency scope smaller. To simplify the analysis, we suppose a baseline case that a sample z has full dependency scope n, such that all tags in z have dependencies. Then, we introduce a factor α such that a sample z has localized dependency scope n/α. In this case, α represents the reduction magnitude of the dependency scope. To simplify the analysis without losing generality, we assume the localized dependency scopes do not overlap with each other. Since the dependency scope is localized and non-overlapping, we can split the original sample of the dependency scope n into α mini-samples of the dependency scope of n/α. What we want to show is that, the learning with small and non-overlapping dependency scope has less overfitting risk than the learning with large dependency scope. Real-world tasks may have an overlapping dependency scope. Hence, our theoretical analysis is for a simplified “essential” problem distilled from the real-world tasks. In what follows, we also directly call the dependency scope of a sample as the structure complexity of the sample. Then, a simplified version of structural complexity regularization, specifically for our theoretical analysis, can be formally defined as follows: Definition 2 (Simplified structural complexity regularization for analysis). Let Nα : F 7→ F be a structural complexity regularization function on F with regularization strength α with 1 ≤ α ≤ n, the structured classification based objective function with structural complexity regularization is as follows2 : m Rα (GS ) , Re [G Nα (S ) ] = α m α n/α 1 XXX 1 XX L[GS 0 , z (i, j) ] = `[GS 0 , z (i, j) , k] (8) mn i=1 j=1 mn i=1 j=1 k=1 where Nα (zzi ) splits z i into α mini-samples {zz(i,1) , . . . , z (i,α) }, so that the mini-samples have a dependency scope of n0 = n/α. Thus, we get S 0 = {zz(1,1) , z(1,2) , . . . , z(1,α) , . . . , z(m,1) , z(m,2) , . . . , z(m,α) } | {z } | {z } α (9) α with mα mini-samples of expected structure complexity n/α. We can denote S 0 more compactly as S 0 = {zz01 , z 02 , . . . , z 0mα } and Rα (GS ) can be simplified as mα n/α mα Rα (GS ) , 1 XX 1 X L(GS 0 , z 0i ) = `[GS 0 , z 0i , k] mn i=1 mn i=1 k=1 (10) 2 The notation N is overloaded here. For clarity throughout, N with subscript λ refers to weight regularization function, and N with subscript α refers to structural complexity regularization function. 14 Note that, when the structural complexity regularization strength α = 1, we have S 0 = S and Rα = Re . Now, we have given a formal definition of structural complexity regularization, by comparing it with the traditional weight regularization. Below, we show that the structural complexity regularization can improve the stability of learned models, and can finally reduce the overfitting risk of the learned models. 3.3. Stability of Structured Prediction Because the generalization of a learning algorithm is positively correlated with the stability of the learning algorithm [14], to analyze the generalization of the proposed method, we instead examine the stability of the structured prediction. Here, stability describes the extent to which the resulting learning function changes, when a sample in the training set is removed. We prove that by decomposing the dependency scopes, i.e, by regularizing the structural complexity, the stability of the learning algorithm can be improved. We first give the formal definitions of the stability with respect to the learning algorithm, i.e., function stability. Definition 3 (Function stability). A real-valued structured classification algorithm G has “function value based stability” (“function stability” for short) ∆ if the following holds: ∀zz = (xx, y ) ∈ Z, ∀S ∈ Zm , ∀i ∈ {1, . . . , m}, ∀k ∈ {1, . . . , n}, |GS (xx, k) − GS \i (xx, k)| ≤ ∆ The stability with respect to the cost function can be similarly defined. Definition 4 (Loss stability). A structured classification algorithm G has “uniform loss-based stability” (“loss stability” for short) ∆l if the following holds: ∀zz ∈ Z, ∀S ∈ Zm , ∀i ∈ {1, . . . , m}, ∀k ∈ {1, . . . , n}, |`(GS , z , k) − `(GS \i , z , k)| ≤ ∆l G has “sample-wise uniform loss-based stability” (“sample loss stability” for short) ∆ s with respect to the loss function L if the following holds: ∀zz ∈ Z, ∀S ∈ Zm , ∀i ∈ {1, . . . , m}, |L(GS , z) − L(GS \i , z)| ≤ ∆ s It is clear that the upper bounds of loss stability and function stability are linearly correlated under the problem settings. Lemma 5 (Loss stability vs. function stability). If a real-valued structured classification algorithm G has function stability ∆ with respect to loss function `τ , then G has loss stability ∆l ≤ τ∆ and sample loss stability ∆ s ≤ nτ∆. 15 The proof is provided in Appendix A. Here, we show that lower structural complexity has lower bound of stability, and is more stable for the learning algorithm. The proposed method improves stability by regularizing the structural complexity of training samples. Theorem 6 (Stability vs. structural complexity regularization). With a training set S of size m, let the learning algorithm G have the minimizer f based on commonly used L2 weight regularization: f = argmin Rα,λ (g) = argmin g∈F g∈F mα   1 X λ Lτ (g, z 0j ) + ||g||22 mn j=1 2 (11) where α denotes the structural complexity regularization strength with 1 ≤ α ≤ n. Also, we have  1 X  λ 0 \i0 f \i = argmin Rα,λ (g) = argmin Lτ (g, z 0j ) + ||g||22 (12) mn j,i0 2 g∈F g∈F where j , i0 means j ∈ {1, . . . , i0 − 1, i0 + 1, . . . , mα}.3 Assume Lτ is convex and differentiable, and f (xx, k) is ρ-admissible. Let a local feature value is bounded by v such that x (k,q) ≤ v for q ∈ {1, . . . , d}.4 Let ∆ denote the function stability of f compared 0 with f \i for ∀zz ∈ Z with |zz| = n. Then, ∆ is bounded by ∆≤ dτρ2 v2 n2 , mλα2 (13) and the corresponding loss stability is bounded by ∆l ≤ dτ2 ρ2 v2 n2 , mλα2 and the corresponding sample loss stability is bounded by ∆s ≤ dτ2 ρ2 v2 n3 . mλα2 The proof is given in Appendix A. We can see that increasing the size of training set m results in linear improvement of ∆, and increasing the strength of structural complexity regularization α results in quadratic improvement of ∆. 0 The function stability ∆ is based on comparing f and f \i , i.e., the stability is based on removing a mini-sample. Moreover, we can extend the analysis to the function stability based on comparing f and f \i , i.e., the stability is based on removing a fullsize sample. 3 Note that, in some cases the notation i is ambiguous. For example, f \i can either denote the removing of a sample in S or denote the removing of a mini-sample in S 0 . Thus, when the case is ambiguous, we use different index symbols for S and S 0 , with i for indexing S and i0 for indexing S 0 , respectively. 4 Recall that d is the dimension of local feature vectors defined in Section 3.1. 16 Corollary 7 (Stability by removing a full sample). With a training set S of size m, let the learning algorithm G have the minimizer f as defined before. Also, we have f \i = argmin R\i α,λ (g) = argmin g∈F g∈F  1 X  λ Lτ (g, z 0j ) + ||g||22 mn j<i 2 (14) where j < i means j ∈ {1, . . . , (i − 1)α, iα + 1, . . . , mα}, i.e., all the mini-samples derived from the sample z i are removed. Assume Lτ is convex and differentiable, and f (xx, k) is ρ-admissible. Let a local feature value be bounded by v such that x (k,q) ≤ v for q ∈ {1, . . . , d}. Let ∆¯ denote the function stability of f comparing with f \i for ∀zz ∈ Z with |zz| = n. Then, ∆¯ is bounded by dτρ2 v2 n2 = α sup(∆), ∆¯ ≤ mλα (15) 0 where ∆ is the function stability of f comparing with f \i , and sup(∆) = described in Eq. (13). Similarly, we have dτρ2 v2 n2 , mλα2 as dτ2 ρ2 v2 n2 ∆¯ l ≤ = α sup(∆l ), mλα and dτ2 ρ2 v2 n3 = α sup(∆ s ). ∆¯ s ≤ mλα The proof is presented in Appendix A. In the case that a full sample is removed, increasing the strength of structural complexity regularization α results in linear improvement of ∆. 3.4. Reduction of Generalization Risk In this section, we formally describe the relation between the generalization and the stability, and summarize the relationship between the proposed method and the generalization. Finally, we draw our conclusions from the theoretical analysis. Now, we analyze the relationship between the generalization and the stability. Theorem 8 (Generalization vs. stability). Let G be a real-valued structured classification algorithm with a point-wise loss function `τ such that ∀k, 0 ≤ `τ (GS , z , k) ≤ γ. Let f , ∆, and ∆¯ be defined before. Let R( f ) be the generalization risk of f based on the expected sample z ∈ Z with size n, as defined before. Let Re ( f ) be the empirical risk of f based on S , as defined like before. Then, for any δ ∈ (0, 1), with probability at least 1 − δ over the random draw of the training set S , the generalization risk R( f ) is bounded by r   ln δ−1 ¯ ¯ (16) R( f ) ≤ Re ( f ) + 2τ∆ + (4m − 2)τ∆ + γ 2m 17 The proof is in Appendix A. The upper bound of the generalization risk contains the loss stability, which is rewritten as the function stability. We can see that better stability leads to lower bound of the generalization risk. By substituting the function stability with the formula we get from the structural complexity regularization, we get the relation between the generalization and the structural complexity regularization. Theorem 9 (Generalization vs. structural complexity regularization). Let the structured prediction objective function of G be penalized by structural complexity regularization with factor α ∈ [1, n] and L2 weight regularization with factor λ. The penalized function has a minimizer f : f = argmin Rα,λ (g) = argmin g∈F g∈F mα   1 X λ Lτ (g, z 0j ) + ||g||22 mn j=1 2 (17) Assume the point-wise loss `τ is convex and differentiable, and is bounded by `τ ( f, z , k) ≤ γ. Assume f (xx, k) is ρ-admissible. Let a local feature value be bounded by v such that x (k,q) ≤ v for q ∈ {1, . . . , d}. Then, for any δ ∈ (0, 1), with probability at least 1 − δ over the random draw of the training set S , the generalization risk R( f ) is bounded by r  ln δ−1 2dτ2 ρ2 v2 n2  (4m − 2)dτ2 ρ2 v2 n2 R( f ) ≤ Re ( f ) + + +γ (18) mλα mλα 2m The proof is in Appendix A.   q −1 2 2 2 2 2 2 2 2 ρ v n ρ v n ln δ We call the term 2dτmλα + (4m−2)dτ +γ mλα 2m in (18) as the “overfit-bound”. Reducing the overfit-bound is crucial for reducing the generalization risk bound. Most importantly, we can see from the overfit-bound that the structural complexity regularization factor α always stays together with the weight regularization factor λ, working together to reduce the overfit-bound. This indicates that the structural complexity regularization is as important as the weight regularization for reducing the generalization risk for structured prediction. Moreover, since τ, ρ, and v are typically small compared with other variables, especially m, (18) can be approximated as follows by ignoring the small terms: √  dn2 ln δ−1  R( f ) ≤ Re ( f ) + O (19) √ λα m First, (19) suggests that structure complexity n can increase the overfit-bound on a magnitude of O(n2 ), and applying weight regularization can reduce the overfit-bound by O(λ). Importantly, applying structural complexity regularization further (over weight regularization) can additionally reduce the overfit-bound by a magnitude of O(α). When α = 1, which means “no structural complexity regularization”, we have the worst overfit-bound. Also, (19) suggests that increasing the size of training set can reduce the overfit-bound on a square root level. Theorem 9 also indicates that too simple structures may overkill the overfit-bound but with a dominating empirical risk, while too complex structures may overkill the 18 empirical risk but with a dominating overfit-bound. Thus, to achieve the best prediction accuracy, a balanced complexity of structures should be used for training the model. By regularizing the complex structure with the simple structure, a balance between the empirical risk and the overfitting risk can be achieved. In the proposed method, the model of the complex structure and the simple structure are both used in decoding. In essence, the decoding is based on the complex model, for the purpose of keeping the empirical risk down. The simple model is used to regularize the structure of the output, which means the structural complexity of the complex model is compromised. Therefore, the overfitting risk is reduced. To summarize, the proposed method decomposes the dependency scopes, that is, regularizes the structural complexity. It leads to better stability of the model, which means the generalization risk is lower. Under the problem settings, increasing the regularization strength α can bring linear reduction of the overfit-bound. However, too simple structure may cause a dominating empirical risk. To achieve a balanced structural complexity, we could regularize the complex structure model with the simple structure model. The complex structure model has low empirical risk, while the simple structure model has low structural risk. The proposed method takes the advantages of both the simple structure model and the complex structure model. As a result, the overall overfitting risk can be reduced. 4. Experiments We conduct experiments on natural language processing tasks. We are concerned with two types of structures: linear-chain structures, e.g. word sequences, and hierarchical structures, e.g. phrase-structure trees and dependency trees. The natural language processing tasks concerning linear-chain structures include (1) text chunking, (2) English named entity recognition, and (3) Dutch named entity recognition. We also conduct experiments on a natural language processing task that involves hierarchical structures, i.e. (4) dependency parsing with empty category detection. 4.1. Experiments on Sequence Labeling Tasks Text Chunking (Chunking): The chunking data is from the CoNLL-2000 shared task [16]. The training set consists of 8,936 sentences, and the test set consists of 2,012 sentences. Since there is no development data provided, we randomly sampled 5% of the training data as development set for tuning hyper-parameters. The evaluation metric is F1-score. English Named Entity Recognition (English-NER): The English NER data is from the CoNLL-2003 shared task [17]. There are four types of entities to be recognized: PERSON, LOCATION, ORGANIZATION, and MISC. This data has 14,987 sentences for training, 3,466 sentences for development, and 3,684 sentences for testing. The evaluation metric is F1-score. Dutch Named Entity Recognition (Dutch-NER): We use the D-NER dataset [18] from the shared task of CoNLL-2002. The dataset contains four types of named entities: PERSON, LOCATION, ORGANIZATION, and MISC. It has 15,806 sentences for training, 2,895 sentences for development, and 5,195 sentences for testing. The evaluation metric is F1-score. 19 Test score BLSTM order1 BLSTM order2 BLSTM order2 + SR BLSTM order3 BLSTM order3 + SR Chunking 93.97 93.24 94.81 (+1.57) 92.50 95.23 (+2.73) English-NER 87.65 87.59 89.72 (+2.13) 87.16 90.59 (+3.43) Dutch-NER 76.04 76.33 80.51 (+4.18) 76.57 81.62 (+5.05) Table 1: Comparing SR decoding with the baseline BLSTM models. As we can see, when the order of the model increases, the performance of BLSTM deteriorates most of the time. With SR decoding, the structural complexity is controlled, so that the performance of the higher order model is substantially improved. It is also interesting that the improvement is larger when the order is higher. Chunking 96 91.0 F−score (%) 95 82.0 90.0 80.0 89.0 94 78.0 88.0 93 76.0 87.0 BLSTM BLSTM+SR 92 1 2 Order (a) Chunking 3 86.0 74.0 order-1 BLSTM order-2 order-3 BLSTM-STAD (b) English-NER order-1 BLSTM order-2 order-3 BLSTM-STAD (c) Dutch-NER Figure 3: Comparing SR decoding with baseline LSTM models. SR decoding can substantially improve the performance of the complex structure model. Moreover, it is clear that SR decoding improves the order-3 models more than the order-2 models. Since LSTM [19] is a popular implementation of recurrent neural networks, we highlight experiment results on LSTM. In this work, we use the bi-directional LSTM (BLSTM) as the implementation of LSTM, considering it has better accuracy in practice. For BLSTM, we set the dimension of input layer to 200 and the dimension of hidden layer to 300 for all the tasks. The experiments on BLSTM are based on the Adam learning method [20]. Since we find the default hyper parameters work satisfactorily on those tasks, following Kingma and Ba [20] we use the default hyper parameters as follows: β1 = 0.9, β2 = 0.99,  = 1 × 10−5 . For the tasks with BLSTM, we find there is almost no difference by adding L2 regularization or not. Hence, we do not add L2 regularization for BLSTM. All weight matrices, except for bias vectors and word embeddings, are diagonal matrices and randomly initialized by normal distribution. We implement our code with the python package Tensorflow. 4.1.1. Results First, we apply the proposed scalable multi-order decoding method on BLSTM (BLSTM-SR). Table 1 compares the scores of BLSTM-SR and BLSTM on standard test data. As we can see, when the order of the model is increased, the baseline model worsens. The exception is the result of the Dutch-NER task. When the order of the 20 Model Kudoh and Matsumoto [22] Kudo and Matsumoto [23] Sha and Pereira [24] McDonald et al. [25] Sun et al. [26] Collobert et al. [27] Sun [1] Huang et al. [28] This paper F1 93.48 93.91 94.30 94.29 94.34 94.32 94.52 94.46 95.23 Table 2: Text Chunking: comparing with previous work. Shen and Sarkar [21] also achieve 95.23%, but their result is based on noun phrase chunking. However, our result is based on all phrase chunking, which has more tags to predict and is more difficult. model is increased, the model is slightly improved. It demonstrates that, in practice, although complex structure models have lower empirical risks, the structural risks are more dominant. The proposed method easily surpasses the baseline. For Chunking, the F1 error rate reduction is 23.2% and 36.4% for the second-order model and the third-order model, respectively. For English-NER, the proposed method reduces the F1 error rate by 17.2% and 26.7% for the second-order model and the third-order model, respectively. For Dutch-NER, the F1 error rate reduction of 17.7% and 21.6% is achieved respectively for the second-order model and the third-order model. It is clear that the improvement is significant. We suppose the reason is that the proposed method can combine both low-order and high order information. It helps to reduce the overfitting risk. Thus, the F1 score is improved. Moreover, the reduction is larger when the order is higher, i.e., the improvement of order-3 models is better than that of order-2 models. This confirms the theoretical results that higher structural complexity leads to higher structural risks. This also suggests the proposed method can alleviate the structural risks and keep the empirical risks low. The phenomenon is better illustrated in Figure 3. Table 2 shows the results on Chunking compared to previous work. We achieve the state-of-the-art in all-phrase chunking. Shen and Sarkar [21] achieve the same score as ours. However, they conduct experiments in noun phrase chunking (NP-chunking). All phrase chunking contains much more tags than NP-chunking, which is more difficult. SR decoding also achieves better results on English NER and Dutch NER than existing methods. Huang et al. [28] employ a BLSTM-CRF model in the English NER task and achieve F1 score of 90.10%. The score is lower than our best F1 score. Chiu and Nichols [29] present a hybrid BLSTM with F1 score of 90.77%. The model slightly outperforms our method, which may be due to the external CNNs they used to extract word features. Gillick et al. [30] keep the best result of Dutch NER. However, the model is trained on corpora of multilingual languages. Their model trained with a single language gets 78.08% on F1 score and performs worse than ours. Nothman et al. [18] reach 78.6% F1 with a semi-supervised approach in Dutch NER. Our model 21 English Chinese train test train test #{Sent} 38667 2336 8605 941 #{Overt} 909114 54242 193417 21797 #{Covert} 57342 3447 13518 1520 Table 3: Numbers of sentences, overt and covert elements in training and test sets. still outperforms the method. 4.2. Experiments on Parsing Joint Empty Category Detection and Dependency Parsing For joint empty category detection and dependency parsing, we conduct experiments on both English and Chinese treebanks. In particular, English Penn TreeBank (PTB) [31] and Chinese TreeBank (CTB) [32] are used . Because PTB and CTB are phrase-structure treebanks, we need to convert them into dependency annotations. To do so, we use the tool provided by Stanford CoreNLP to process PTB, and the tool introduced by Xue and Yang [5] to process CTB 5.0. We use gold-standard POS to derive features for disambiguation. To simplify our experiments, we preprocess the obtained dependency trees in the following way. 1. We combine successive empty elements with identical head into one new empty node that is still linked to the common head word. 2. Because the high-order algorithm is very expensive with respect to the computational cost, we only use relatively short sentence. Here we only keep the sentences that are less than 64 tokens. 3. We focus on unlabeled parsing. The statistics of the data after cleaning are shown in Table 3. We use the standard training, validation, and test splits to facilitate comparisons. Accuracy is measured with unlabeled attachment score for all overt words (UASo ): the percentage of the overt words with the correct head. We are also concerned with the prediction accuracy for empty elements. To evaluate performance on empty nodes, we consider the correctness of empty edges. We report the percentage of the empty words in the right slot with correct head. The i-th slot in the sentence means that the position immediately after the i-th concrete word. So if we have a sentence with length n, we get n + 1 slots. 4.2.1. Results Table 4 lists the accuracy of individual models coupled with different decoding algorithms on the test sets. We focus on the prediction for overt words only. When we take into account empty categories, more information is available. However, the increased structural complexity affects the algorithms. From the table, we can see that the complex sibling factorization works worse than the simple sibling factorization in English, but works better in Chinese. The results of the tri-sibling factorization are exactly the opposite. The complex tri-sibling factorization works better than the 22 Factorization Sibling Sibling (complex) Tri-sibling Tri-sibling (complex) Empty Element No Yes No Yes English 91.73 91.70 92.23 92.41 Chinese 89.16 89.20 90.00 89.82 Table 4: UASo of different individual models on test data. The upper and bottom blocks present results obtained by sibling and tri-sibling models respectively. We cannot draw a conclusion whether the complex structure models performs better or not, because the results vary with the structural complexity and the data. This is expected, because structural complexity affects both the empirical risks and the structural risks. As the data (English vs. Chinese) and the structure (Sibling vs. Tri-sibling) are different, the relations between empirical risks and the structural risks are also different. Hence, the varied results. Method Sibling (complex) Sibling (complex) + SR Tri-sibling (complex) Tri-sibling (complex) + SR English 91.70 91.96 (+0.26) 92.41 92.71 (+0.30) Chinese 89.20 89.53 (+0.33) 89.82 90.38 (+0.56) Table 5: UASo of different SR decoding models on test data. As we can see, SR decoding consistently improves the complex structure models. All improvements are statistically significant. simple tri-sibling factorization in English, but works worse in Chinese. The results can be explained by our theoretical analysis. While the structural complexity is positively correlated with the overfitting risk, it is negatively correlated with the empirical risk. In this task, although the overfitting risk is increased when using the complex structure, the empirical risk is decreased more sometimes. Hence, the results vary both with the structural complexity and the data. Table 5 lists the accuracy of different SR decoding models on the test sets. We can see that the SR decoding framework is effective to deal with the structure-based overfitting. This time, the accuracy of analysis for overt words is consistently improved. For the second-order model, SR decoding reduces the error rate by 3.1% for English, and by 3.0% for Chinese. For the third-order model, the error rate reduction of 4.0% for English, and 5.5% for Chinese is achieved by the proposed method. Similar to the sequence labeling tasks, the third-order model is improved more. We suppose the consistent improvements come from the ability of reducing the structural risk of the SR decoding algorithm. Although in this task, the complex structure is sometimes helpful to the accuracy of the parsing, the structural risk still increases. By regularizing the structural complexity, further improvements can be achieved, on top of the decreased empirical risk brought by the complex structure. We use the Hypothesis Tests method [33] to evaluate the improvements. When the p-value is set to 0.05, all improvements in Table 5 are statistically significant. 5. Related Work The term structural regularization has been used in prior work for regularizing structures of features. For (typically non-structured) classification problems, there 23 are considerable studies on structure-related regularization. Argyriou et al. [34] apply spectral regularization for modeling feature structures in multi-task learning, where the shared structure of the multiple tasks is summarized by a spectral function over the tasks’ covariance matrix, and then is used to regularize the learning of each individual task. Xue et al. [35] regularize feature structures for structural large margin binary classifiers, where data points belonging to the same class are clustered into subclasses so that the features for the data points in the same subclass can be regularized. While those methods focus on the regularization approaches, many recent studies focus on exploiting the structured sparsity. Structure sparsity is studied for a variety of non-structured classification models [36, 37] and structured prediction scenarios [38, 39], via adopting mixed norm regularization [40], Group Lasso [41], posterior regularization [42], and a string of variations [43, 44, 45]. Compared with those pieces of prior work, the proposed method works on a substantially different basis. This is because the term structure in all of the aforementioned work refers to structures of feature space, which is substantially different compared with our proposal on regularizing tag structures (interactions among tags). There are other related studies, including the studies of Sutton and McCallum [46] and Samdani and Roth [47] on piecewise/decomposed training methods, and the study of Tsuruoka et al. [48] on a “lookahead” learning method. They both try to reduce the computational cost of the model by reducing the structure involved. Sutton and McCallum [46] try to simply the structural dependencies of the graphic probabilistic models, so that the model can be efficiently trained. Samdani and Roth [47] try to simply the output space in structured SVM by decomposing the structure into sub-structures, so that the search space is reduced, and the training is tractable. Tsuruoka et al. [48] try to train a localized structured perceptron, where the local output is searched by stepping into the future instead of directly using the result of the classifier. Our work differs from Sutton and McCallum [46], Samdani and Roth [47], Tsuruoka et al. [48], because our work is built on a regularization framework, with arguments and justifications on reducing generalization risk and for better accuracy, although it has the effect that the decoding space of the complex model is reduced by the simple model. Also, the theoretical results can fit general graphical models, and the detailed algorithm is quite different. On generalization risk analysis, related studies include Tsuruoka et al. [49], Bousquet and Elisseeff [14], Shalev-Shwartz et al. [15] on non-structured classification and Taskar et al. [12], London et al. [13, 50] on structured classification. This work targets the theoretical analysis of the relations between the structural complexity of structured classification problems and the generalization risk, which is a new perspective compared with those studies. 6. Conclusions We propose a structural complexity regularization framework, called structure regularization decoding. In the proposed method, we train the complex structure model. In addition, we also train the simple structure model. The simple structure model is used to regularize the decoding of the complex structure model. The resulting model 24 embodies a balanced structural complexity, which reduces the structure-based overfitting risk. We derive the structure regularization decoding algorithms for linear-chain models on sequence labeling tasks, and for hierarchical models on parsing tasks. Our theoretical analysis shows that the proposed method can effectively reduce the generalization risk, and the analysis is suitable for graphic models. In theory, higher structural complexity leads to higher structure-based overfitting risk, but lower empirical risk. To achieve better performance, a balanced structural complexity should be maintained. By regularizing the structural complexity, that is, decomposing the structural dependencies but also keeping the original structural dependencies, structurebased overfitting risk can be alleviated and empirical risk can be kept low as well. Experimental results demonstrate that the proposed method easily surpasses the performance of the complex structure models. Especially, the proposed method is also suitable for deep learning models. On the sequence labeling tasks, the proposed method substantially improves the performance of the complex structure models, with the maximum F1 error rate reduction of 23.2% for the second-order models, and 36.4% for the third-order models. On the parsing task, the maximum UAS improvement of 5.5% on Chinese tri-sibling factorization is achieved by the proposed method. The results are competitive with or even better than the state-of-the-art results. Acknowledgments This work was supported in part by National Natural Science Foundation of China (No. 61300063), and Doctoral Fund of Ministry of Education of China (No. 20130001120004). This work is a substantial extension of a conference paper presented at NIPS 2014 [1]. References References [1] X. Sun, Structure regularization for structured prediction, in: Advances in Neural Information Processing Systems 27: Annual Conference on Neural Information Processing Systems 2014, Montreal, Quebec, Canada, pp. 2402–2410. [2] S. Hochreiter, J. Schmidhuber, Long short-term memory, Neural Computation 9 (1997) 1735–1780. [3] M. Collins, Discriminative training methods for hidden markov models: Theory and experiments with perceptron algorithms, in: Proceedings of EMNLP’02, pp. 1–8. [4] N. Chomsky, Lectures on Government and Binding, Foris Publications, Dordecht, 1981. [5] N. Xue, Y. Yang, Dependency-based empty category detection via phrase structure trees, in: Proceedings of the 2013 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Association for Computational Linguistics, Atlanta, Georgia, 2013, pp. 1051–1060. [6] J. M. Eisner, Three new probabilistic models for dependency parsing: an exploration, in: Proceedings of the 16th conference on Computational linguistics - Volume 1, Association for Computational Linguistics, Stroudsburg, PA, USA, 1996, pp. 340–345. [7] R. McDonald, F. Pereira, Online learning of approximate dependency parsing algorithms, in: Proceedings of 11th Conference of the European Chapter of the Association for Computational Linguistics (EACL-2006)), volume 6, pp. 81–88. 25 [8] X. Carreras, Experiments with a higher-order projective dependency parser, in: J. Eisner (Ed.), EMNLP-CoNLL 2007, Proceedings of the 2007 Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning, ACL, Prague, Czech Republic, 2007, pp. 957–961. [9] T. Koo, M. Collins, Efficient third-order dependency parsers, in: Proceedings of the 48th Annual Meeting of the Association for Computational Linguistics, Association for Computational Linguistics, Uppsala, Sweden, 2010, pp. 1–11. [10] X. Ma, H. Zhao, Fourth-order dependency parsing, in: Proceedings of COLING 2012: Posters, The COLING 2012 Organizing Committee, Mumbai, India, 2012, pp. 785–796. [11] X. Zhang, W. Sun, X. Wan, The covert helps parse the overt, in: Proceedings of the 21st Conference on Computational Natural Language Learning (CoNLL 2017), Association for Computational Linguistics, Vancouver, Canada, 2017, pp. 343–353. [12] B. Taskar, C. Guestrin, D. Koller, Max-margin markov networks, in: S. Thrun, L. K. Saul, B. Schölkopf (Eds.), Advances in Neural Information Processing Systems 16 [Neural Information Processing Systems, NIPS 2003], MIT Press, Vancouver and Whistler, British Columbia, Canada, 2003, pp. 25–32. [13] B. London, B. Huang, B. Taskar, L. Getoor., Pac-bayes generalization bounds for randomized structured prediction, in: NIPS Workshop on Perturbation, Optimization and Statistics. [14] O. Bousquet, A. Elisseeff, Stability and generalization., Journal of Machine Learning Research 2 (2002) 499–526. [15] S. Shalev-Shwartz, O. Shamir, N. Srebro, K. Sridharan, Learnability and stability in the general learning setting, in: COLT 2009 - The 22nd Conference on Learning Theory, Montreal, Quebec, Canada, June 18-21, 2009. [16] E. T. K. Sang, S. Buchholz, Introduction to the CoNLL-2000 shared task: Chunking, in: Proceedings of CoNLL’00, pp. 127–132. [17] E. F. Sang, F. D. Meulder, Introduction to the CoNLL-2003 Shared Task: LanguageIndependent Named Entity Recognition, in: Proceedings of CoNLL-2003, pp. 142–147. [18] J. Nothman, N. Ringland, W. Radford, T. Murphy, J. R. Curran, Learning multilingual named entity recognition from wikipedia, Artificial Intelligence 194 (2013) 151–175. [19] J. Hammerton, Named entity recognition with long short-term memory, in: CoNLL, ACL, 2003, pp. 172–175. [20] D. P. Kingma, J. Ba, Adam: A method for stochastic optimization, CoRR abs/1412.6980 (2014). [21] H. Shen, A. Sarkar, Voting between multiple data representations for text chunking, in: Advances in Artificial Intelligence, 18th Conference of the Canadian Society for Computational Studies of Intelligence, Canadian AI 2005, Victoria, Canada, May 9-11, 2005, Proceedings, pp. 389–400. [22] T. Kudoh, Y. Matsumoto, Use of support vector learning for chunk identification, in: Fourth Conference on Computational Natural Language Learning, CoNLL 2000, and the Second Learning Language in Logic Workshop, LLL 2000, Held in cooperation with ICGI-2000, Lisbon, Portugal, September 13-14, 2000, pp. 142–144. [23] T. Kudo, Y. Matsumoto, Chunking with support vector machines, in: Proceedings of NAACL’01, pp. 1–8. [24] F. Sha, F. Pereira, Shallow parsing with conditional random fields, in: NAACL ’03: Proceedings of the 2003 Conference of the North American Chapter of the Association for Computational Linguistics on Human Language Technology, pp. 134–141. [25] R. T. McDonald, K. Crammer, F. Pereira, Flexible text segmentation with structured multilabel classification, in: HLT/EMNLP 2005, Human Language Technology Conference and Conference on Empirical Methods in Natural Language Processing, Proceedings of 26 [26] [27] [28] [29] [30] [31] [32] [33] [34] [35] [36] [37] [38] [39] [40] [41] [42] [43] the Conference, 6-8 October 2005, Vancouver, British Columbia, Canada, The Association for Computational Linguistics, 2005, pp. 987–994. X. Sun, L. Morency, D. Okanohara, Y. Tsuruoka, J. Tsujii, Modeling latent-dynamic in shallow parsing: A latent conditional model with imrpoved inference, in: COLING 2008, 22nd International Conference on Computational Linguistics, Proceedings of the Conference, 18-22 August 2008, Manchester, UK, pp. 841–848. R. Collobert, J. Weston, L. Bottou, M. Karlen, K. Kavukcuoglu, P. P. Kuksa, Natural language processing (almost) from scratch, Journal of Machine Learning Research 12 (2011) 2493–2537. Z. Huang, W. Xu, K. Yu, Bidirectional lstm-crf models for sequence tagging, arXiv preprint arXiv:1508.01991 (2015). J. P. C. Chiu, E. Nichols, Named entity recognition with bidirectional lstm-cnns., TACL 4 (2016) 357–370. D. Gillick, C. Brunk, O. Vinyals, A. Subramanya, Multilingual language processing from bytes, CoRR abs/1512.00103 (2015). N. Xue, F. Xia, F.-d. Chiou, M. Palmer, The penn Chinese treebank: Phrase structure annotation of a large corpus, Natural Language Engineering 11 (2005) 207–238. M. P. Marcus, M. A. Marcinkiewicz, B. Santorini, Building a large annotated corpus of english: the penn treebank, Computational Linguistics 19 (1993) 313–330. T. Berg-Kirkpatrick, D. Burkett, D. Klein, An empirical investigation of statistical significance in nlp, in: Proceedings of the 2012 Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning, Association for Computational Linguistics, Jeju Island, Korea, 2012, pp. 995–1005. A. Argyriou, C. A. Micchelli, M. Pontil, Y. Ying, A spectral regularization framework for multi-task structure learning, in: J. C. Platt, D. Koller, Y. Singer, S. T. Roweis (Eds.), Advances in Neural Information Processing Systems 20, Proceedings of the Twenty-First Annual Conference on Neural Information Processing Systems, Vancouver, British Columbia, Canada, December 3-6, 2007, Curran Associates, Inc., 2007, pp. 25–32. H. Xue, S. Chen, Q. Yang, Structural regularized support vector machine: A framework for structural large margin classifier., IEEE Transactions on Neural Networks 22 (2011) 573–587. C. A. Micchelli, J. Morales, M. Pontil, A family of penalty functions for structured sparsity., in: Proceedings of NIPS’10, Curran Associates, Inc., 2010, pp. 1612–1623. J. C. Duchi, Y. Singer, Boosting with structural sparsity, in: A. P. Danyluk, L. Bottou, M. L. Littman (Eds.), Proceedings of the 26th Annual International Conference on Machine Learning, ICML 2009, Montreal, Quebec, Canada, June 14-18, 2009, volume 382 of ACM International Conference Proceeding Series, ACM, 2009, pp. 297–304. M. W. Schmidt, K. P. Murphy, Convex structure learning in log-linear models: Beyond pairwise potentials., in: Proceedings of AISTATS’10, volume 9 of JMLR Proceedings, pp. 709–716. A. F. T. Martins, N. A. Smith, M. A. T. Figueiredo, P. M. Q. Aguiar, Structured sparsity in structured prediction., in: Proceedings of EMNLP’11, pp. 1500–1511. A. Quattoni, X. Carreras, M. Collins, T. Darrell, An efficient projection for l1,infinity regularization., in: Proceedings of ICML’09, p. 108. M. Yuan, Y. Lin, Model selection and estimation in regression with grouped variables, Journal of the Royal Statistical Society, Series B 68 (2006) 49–67. J. Graça, K. Ganchev, B. Taskar, F. Pereira, Posterior vs parameter sparsity in latent variable models, in: Proceedings of NIPS’09, pp. 664–672. F. Bach, R. Jenatton, J. Mairal, G. Obozinski, Structured sparsity through convex optimization, CoRR abs/1109.2397 (2011). 27 [44] G. Obozinski, B. Taskar, M. I. Jordan, Joint covariate selection and joint subspace selection for multiple classification problems., Statistics and Computing 20 (2010) 231–252. [45] J. Huang, T. Zhang, D. N. Metaxas, Learning with structured sparsity., Journal of Machine Learning Research 12 (2011) 3371–3412. [46] C. A. Sutton, A. McCallum, Piecewise pseudolikelihood for efficient training of conditional random fields., in: ICML’07, ACM, 2007, pp. 863–870. [47] R. Samdani, D. Roth, Efficient decomposed learning for structured prediction, in: Proceedings of the 29th International Conference on Machine Learning, ICML 2012, Edinburgh, Scotland, UK, June 26 - July 1, 2012, icml.cc / Omnipress, 2012. [48] Y. Tsuruoka, Y. Miyao, J. Kazama, Learning with lookahead: Can history-based models rival globally optimized models?, in: S. Goldwater, C. D. Manning (Eds.), Proceedings of the Fifteenth Conference on Computational Natural Language Learning, CoNLL 2011, Portland, Oregon, USA, June 23-24, 2011, ACL, 2011, pp. 238–246. [49] Y. Tsuruoka, J. Tsujii, S. Ananiadou, Stochastic gradient descent training for l1-regularized log-linear models with cumulative penalty, in: Proceedings of ACL’09, Suntec, Singapore, pp. 477–485. [50] B. London, B. Huang, B. Taskar, L. Getoor, Collective stability in structured prediction: Generalization from one example, in: Proceedings of the 30th International Conference on Machine Learning (ICML-13), pp. 828–836. [51] X. Sun, W. Li, H. Wang, Q. Lu, Feature-frequency-adaptive on-line training for fast and accurate natural language processing, Computational Linguistics 40 (2014) 563–586. [52] H. Noji, Y. Miyao, M. Johnson, Using left-corner parsing to encode universal structural constraints in grammar induction, in: Proceedings of the EMNLP’16, pp. 33–43. [53] Y. Miyao, R. Sætre, K. Sagae, T. Matsuzaki, J. Tsujii, Task-oriented evaluation of syntactic parsers and their representations, in: Proceedings of ACL’08, pp. 46–54. [54] X. Sun, T. Matsuzaki, D. Okanohara, J. Tsujii, Latent variable perceptron algorithm for structured classification, in: Proceedings of the 21st International Joint Conference on Artificial Intelligence (IJCAI 2009), pp. 1236–1242. [55] T. Matsuzaki, Y. Miyao, J. Tsujii, Probabilistic CFG with latent annotations, in: Proceedings of ACL’05, pp. 75–82. [56] T. Matsuzaki, J. Tsujii, Comparative parser performance analysis across grammar frameworks through automatic tree conversion using synchronous grammars, in: Proceedings of COLING’08, pp. 545–552. [57] J. Nivre, J. Hall, J. Nilsson, A. Chanev, G. Eryigit, S. Kübler, S. Marinov, E. Marsi, Maltparser: A language-independent system for data-driven dependency parsing, Natural Language Engineering 13 (2007) 95–135. [58] J. Nivre, Algorithms for deterministic incremental dependency parsing, Computational Linguistics 34 (2008) 513–553. [59] Y. Zhang, S. Clark, A tale of two parsers: Investigating and combining graph-based and transition-based dependency parsing, in: Proceedings of EMNLP’08, pp. 562–571. [60] Y. Zhang, S. Clark, Syntactic processing using the generalized perceptron and beam search, Computational Linguistics 37 (2011) 105–151. [61] O. Vinyals, L. Kaiser, T. Koo, S. Petrov, I. Sutskever, G. E. Hinton, Grammar as a foreign language, in: NIPS’15, pp. 2773–2781. [62] H. He, X. Sun, A unified model for cross-domain and semi-supervised named entity recognition in chinese social media, in: Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, February 4-9, 2017, San Francisco, California, USA., pp. 3216– 3222. [63] H. He, X. Sun, F-score driven max margin neural network for named entity recognition in chinese social media, in: Proceedings of the 15th Conference of the European Chapter 28 of the Association for Computational Linguistics, EACL 2017, Valencia, Spain, April 3-7, 2017, Volume 2: Short Papers, pp. 713–718. [64] X. Sun, Structure regularization for structured prediction: Theories and experiments, CoRR abs/1411.6243 (2014). Appendix A. Proof Our analysis sometimes needs to use McDiarmid’s inequality. Theorem 10 (McDiarmid, 1989). Let S = {q1 , . . . , qm } be independent random variables taking values in the space Qm . Moreover, let g : Qm 7→ R be a function of S that satisfies ∀i, ∀S ∈ Qm , ∀q̂i ∈ Q, |g(S ) − g(S i )| ≤ ci . Then ∀ > 0,  −2 2  PS [g(S ) − ES [g(S )] ≥ ] ≤ exp Pm 2 . i=1 ci Lemma 11 (Symmetric learning). For any symmetric (i.e., order-free) learning algorithm G, ∀i ∈ {1, . . . , m}, we have ES [R(GS ) − Re (GS )] = 1 ES ,ẑẑi [L(GS , ẑi ) − L(GS i , ẑi )] n Proof m  1  1X ES [R(GS ) − Re (GS )] = ES Ez (L(GS , z)) − L(GS , z j ) n m j=1 m =  1X  1 ES L(GS , z j ) ES ,ẑẑi L(GS , ẑ i ) − n m j=1   1 ES ,ẑẑi L(GS , ẑ i ) − ES L(GS , z i ) n   1 = ES ,ẑẑi L(GS , ẑ i ) − ES i L(GS i , ẑ i ) n  1 = ES ,ẑẑi L(GS , ẑ i ) − L(GS i , ẑ i ) n = where the 3rd step is based on ES L(GS , z i ) = ES L(GS , z j ) for ∀zzi ∈ S and ∀zz j ∈ S , given that G is symmetric. t u Appendix A.1. Proofs Proof of Lemma 5 29 According to (5), we have ∀i, ∀S , ∀zz, ∀k |`τ (GS , z, k) − `τ (GS \i , z, k)| = |cτ [GS (xx, k), y(k) ] − cτ [GS \i (xx, k), y(k) ]| ≤ τ|GS (xx, k) − GS \i (xx, k)| ≤ τ∆ This gives the bound of loss stability. Also, we have ∀i, ∀S , ∀zz |Lτ (GS , z) − Lτ (GS \i , z)| = ≤ n X k=1 n X cτ [GS (xx, k), y(k) ] − n X cτ [GS \i (xx, k), y(k) ] k=1 cτ [GS (xx, k), y (k) ] − cτ [GS \i (xx, k), y (k) ] k=1 n X ≤τ |GS (xx, k) − GS \i (xx, k)| k=1 ≤ nτ∆ t u This derives the bound of sample loss stability. Proof of Theorem 6 When a convex and differentiable function g has a minimum f in space F , its Bregman divergence has the following property for ∀ f 0 ∈ F : dg ( f 0 , f ) = g( f 0 ) − g( f ) With this property, we have 0 0 0 0 0 0 \i \i dRα,λ ( f \i , f ) + dR\i0 ( f, f \i ) = Rα,λ ( f \i ) − Rα,λ ( f ) + R\i α,λ ( f ) − Rα,λ ( f ) α,λ 0  0 \i0 \i0  = Rα,λ ( f \i ) − R\i α,λ ( f ) − Rα,λ ( f ) − Rα,λ ( f ) 1 1 0 Lτ ( f \i , z 0i0 ) − Lτ ( f, z 0i0 ) = mn mn 30 (A.1) Then, based on the property of Bregman divergence that dg+g0 = dg + dg0 , we have 0 0 0 0 dNλ ( f, f \i ) + dNλ ( f \i , f ) = d(R\i0 −R\iα 0 ) ( f, f \i ) + d(Rα,λ −Rα ) ( f \i , f ) α,λ 0 0 0 0 = dRα,λ ( f \i , f ) + dR\i0 ( f, f \i ) − dRα ( f \i , f ) − dR\iα 0 ( f, f \i ) α,λ (based on non-negativity of Bregman divergence) 0 0 ≤ dRα,λ ( f \i , f ) + dR\i0 ( f, f \i ) α,λ (using (A.1))  1 0 = Lτ ( f \i , z 0i0 ) − Lτ ( f, z 0i0 ) mn n/α  1 X 0 `τ ( f \i , z 0i0 , k) − `τ ( f, z 0i0 , k) = mn k=1 (A.2) n/α    1 X  \i0 0 cτ f (xxi0 , k), y 0i0 (k) − cτ f (xx0i0 , k), y 0i0 (k) ≤ mn k=1 n/α ≤ τ X \i0 0 f (xxi0 , k) − f (xx0i0 , k) mn k=1 (using (6)) ρτ 0 || f − f \i ||2 · ||xx0i0 ||2 ≤ mα Moreover, Nλ (g) = gence satisfies: λ 2 2 ||g||2 = λ 2 hg, gi is a convex function and its Bregman diver-  λ hg, gi − hg0 , g0 i − h2g0 , g − g0 i 2 λ = ||g − g0 ||22 2 dNλ (g, g0 ) = (A.3) Combining (A.2) and (A.3) gives 0 λ|| f − f \i ||22 ≤ ρτ 0 || f − f \i ||2 · ||xx0i0 ||2 mα (A.4) which further gives ρτ 0 ||xx 0 ||2 (A.5) mλα i Given ρ-admissibility, we derive the bound of function stability ∆( f ) based on sample z with size n. We have ∀zz = (xx, y ), ∀k, 0 || f − f \i ||2 ≤ 0 0 | f (xx, k) − f \i (xx, k)| ≤ ρ|| f − f \i ||2 · ||xx||2 (using (A.5)) τρ2 0 ≤ ||xx 0 ||2 · ||xx||2 mλα i 31 (A.6) With the feature dimension d and x (k,q) ≤ v for q ∈ {1, . . . , d} , we have ||xx||2 = || n X x (k) ||2 k=1 ≤ ||hnv, . . . , nvi||2 | {z } (A.7) d √ = dn2 v2 √ = nv d √ Similarly, we have ||xx0i0 ||2 ≤ nvα d because x 0i0 is with the size n/α. Inserting the bounds of ||xx||2 and ||xx0i0 ||2 into (A.6), it goes to 0 | f (xx, k) − f \i (xx, k)| ≤ dτρ2 v2 n2 mλα2 which gives (13). Further, using Lemma 5 derives the loss stability bound of and the sample loss stability bound of dτ2 ρ2 v2 n3 mλα2 on the minimizer f . (A.8) dτ2 ρ2 v2 n2 , mλα2 t u Proof of Corollary 7 The proof is similar to the proof of Theorem 6. First, we have \i \i dRα,λ ( f \i , f ) + dR\i ( f, f \i ) = Rα,λ ( f \i ) − Rα,λ ( f ) + R\i α,λ ( f ) − Rα,λ ( f ) α,λ  \i \i  = Rα,λ ( f \i ) − R\i α,λ ( f ) − Rα,λ ( f ) − Rα,λ ( f ) α α 1 X 1 X Lτ ( f \i , z (i, j) ) − Lτ ( f, z (i, j) ) = mn j=1 mn j=1 32 (A.9) Then, we have dNλ ( f, f \i ) + dNλ ( f \i , f ) = d(R\i \i α,λ −Rα ) ( f, f \i ) + d(Rα,λ −Rα ) ( f \i , f ) = dRα,λ ( f \i , f ) + dR\i ( f, f \i ) − dRα ( f \i , f ) − dR\iα ( f, f \i ) α,λ (based on non-negativity of Bregman divergence) ≤ dRα,λ ( f \i , f ) + dR\i ( f, f \i ) α,λ (using (A.9)) α α 1 X 1 X = Lτ ( f \i , z (i, j) ) − Lτ ( f, z (i, j) ) mn j=1 mn j=1 = ! n/α n/α α X 1 X X `τ ( f \i , z (i, j) , k) − `τ ( f, z (i, j) , k) mn j=1 k=1 k=1 ≤ 1 XX `τ ( f \i , z (i, j) , k) − `τ ( f, z (i, j) , k) mn j=1 k=1 ≤ τ X X \i f (xx(i, j) , k) − f (xx(i, j) , k) mn j=1 k=1 α n/α α n/α (A.10) (using (6), and define ||xx(i,max) ||2 = max ||xx(i, j) ||)2 ) ρτ ≤ || f − f \i ||2 · ||xx(i,max) ||2 m This gives λ|| f − f \i ||22 ≤ ∀j ρτ || f − f \i ||2 · ||xx(i,max) ||2 m (A.11) and thus ρτ ||xx(i,max) ||2 (A.12) mλ Then, we derive the bound of function stability ∆( f ) based on sample z with size n, and based on \i rather than \i0 . We have ∀zz = (xx, y ), ∀k, || f − f \i ||2 ≤ | f (xx, k) − f \i (xx, k)| ≤ ρ|| f − f \i ||2 · ||xx||2 (using (A.12)) τρ2 ||xx(i,max) ||2 · ||xx||2 mλ √ √ τρ2 nv d ≤ · · nv d mλ α dτρ2 v2 n2 = mλα (using (13)) ≤ (A.13) = α sup(∆) t u 33 Proof of Theorem 8 Let f \i be defined like before. Similar to the definition of f \i based on removing a sample from S , we define f i based on replacing a sample from S . Let R( f )\i denote [R( f )]\i = R\i ( f \i ). First, we derive a bound for |R( f ) − R\i ( f )|: 1 |Ez Lτ ( f, z ) − Ez Lτ ( f \i , z )| n n n X 1 X z = |Ez `τ ( f, , k) − Ez `τ ( f \i , z, k)| n k=1 k=1 |R( f ) − R( f )\i | = ≤ n n X 1 X `τ ( f \i , z , k)| `τ ( f, z , k) − Ez | n k=1 k=1 ≤ 1 X Ez |`τ ( f, z , k) − `τ ( f \i , z , k)| n k=1 (A.14) n ¯ (based on Lemma 5 and the definition of ∆) ¯ ≤ τ∆ Then, we derive a bound for |R( f ) − R( f )i |: |R( f ) − R( f )i | = |R( f ) − R( f )\i + R( f )\i − R( f )i | ≤ |R( f ) − R( f )\i | + |R( f )\i − R( f )i | (based on (A.14)) ≤ τ∆¯ + τ∆¯ = 2τ∆¯ Moreover, we derive a bound for |Re ( f ) − Re ( f )i |. Let ẑ i denote the full-size sample 34 (with size n and indexed by i) which replaces the sample z i , it goes to: m 1 X 1 1 X |Re ( f ) − Re ( f ) | = Lτ ( f i , z j ) − Lτ ( f, z j ) − Lτ ( f i , ẑi ) mn j=1 mn j,i mn 1 X 1 |Lτ ( f, z i ) − Lτ ( f i , ẑ i )| ≤ |Lτ ( f, z j ) − Lτ ( f i , z j )| + mn j,i mn i n ≤ 1 X 1 X |`τ ( f, z i , k) − `τ ( f i , ẑ i , k)| |Lτ ( f, z j ) − Lτ ( f i , z j )| + mn j,i mn k=1 (based on 0 ≤ `τ (GS , z , k) ≤ γ) γ 1 X |Lτ ( f, z j ) − Lτ ( f i , z j )| + ≤ mn j,i m  γ 1 X |Lτ ( f, z j ) − Lτ ( f \i , z j )| + |Lτ ( f \i , z j ) − Lτ ( f i , z j )| + ≤ mn j,i m (based on Lemma 5, and ∆( f i , f \i ) = ∆( f, f \i ) from the definition of stability)  γ 1 X ¯ ≤ nτ∆ + nτ∆¯ + mn j,i m = 2(m − 1)τ∆¯ + γ m (A.15) Based on the bounds of |R( f )−R( f )i | and |Re ( f )−Re ( f )i |, we show that R( f )−Re ( f ) ¯ ∆+γ satisfies the conditions of McDiarmid Inequality (Theorem 10) with ci = (4m−2)τ : m |[R( f ) − Re ( f )] − [R( f ) − Re ( f )]i | = |[R( f ) − R( f )i ] − [Re ( f ) − Re ( f )i ]| ≤ |R( f ) − R( f )i | + |Re ( f ) − Re ( f )i | 2(m − 1)τ∆¯ + γ ≤ 2τ∆¯ + m (4m − 2)τ∆¯ + γ = m 35 (A.16) Also, following the proof of Lemma 11, we can get a bound for ES [R( f ) − Re ( f )]: ES [R( f ) − Re ( f )] = = m  1  1X ES Ez (L( f, z )) − L( f, z j ) n m j=1 m  1X  1 ES ,ẑẑi L( f, ẑ i ) − ES L( f, z j ) n m j=1   1 ES ,ẑẑi L( f, ẑ i ) − ES L( f, z i ) n   1 = ES ,ẑẑi L( f, ẑ i ) − ES i L( f i , ẑ i ) n (A.17)  1 = ES ,ẑẑi L( f, ẑ i ) − L( f i , ẑ i ) n 1 ≤ ES ,ẑẑi |L( f, ẑ i ) − L( f i , ẑ i )| n 1 1 ≤ ES ,ẑẑi |L( f, ẑ i ) − L( f \i , ẑ i )| + ES ,ẑẑi |L( f \i , ẑ i ) − L( f i , ẑ i )| n n (based on Lemma 5 and the ∆¯ defined in (15)) ≤ τ∆¯ + τ∆¯ = = 2τ∆¯ Now, we can apply McDiarmid Inequality (Theorem 10):    −2 2  PS [R( f ) − Re ( f )] − ES [R( f ) − Re ( f )] ≥  ≤ exp Pm 2 i=1 ci (A.18) Based on (A.16) and (A.17), it goes to   PS R( f ) − Re ( f ) ≥ 2τ∆¯ +  ≤ exp Let δ = exp  −2m 2 2 ¯ (4m−2)τ∆+γ −2m 2  (4m − 2)τ∆¯ + γ 2 ! (A.19)  , we have r   = (4m − 2)τ∆¯ + γ  ln δ−1 2m (A.20) Based on (A.19) and (A.20), there is a probability no more than δ such that R( f ) − Re ( f ) ≥ 2τ∆¯ +  r ln δ−1 2m r ln δ−1 2m   = 2τ∆¯ + (4m − 2)τ∆¯ + γ Then, there is a probability at least 1 − δ such that   R( f ) ≤ Re ( f ) + 2τ∆¯ + (4m − 2)τ∆¯ + γ 36 (A.21) t u which gives (16). Proof of Theorem 9 2 2 2 v n According to (15), we have ∆¯ ≤ dτρmλα . Inserting this bound into (16) gives (18). t u Appendix B. Scalable Decoding with Pruning in Sequence Labeling Tasks Train time (overall) BLSTM order1 + SR BLSTM order2 + SR BLSTM order3 + SR Test time (overall) BLSTM order1 + SR BLSTM order2 + SR BLSTM order3 + SR Chunking 443.13 448.65 459.75 Chunking 10.71 13.64 44.81 English-NER 677.16 705.23 726.58 English-NER 10.08 13.13 20.43 Dutch-NER 484.74 511.08 520.85 Dutch-NER 15.89 26.60 28.66 Table B.6: Timing Results on varying the orders. SR decoding is implemented by extending the Viterbi decoding algorithm, and multi-order dependencies are jointly considered. Originally, we should consider all possible transition states for every position, which means the search space is very large because there are often too many high order tags. However, in the complete search space, we may compute many tag-transitions that are almost impossible in the best output tag sequence. Thus, it is crucial to adopt good pruning strategies to reduce the search space in decoding to avoid the unnecessary computation of the impossible state transitions. For scalability, we adopt two pruning techniques to greatly reduce the search space. First, we use low order information to prune the search space of high order information. There can be different implementations for this idea. In practice, we find a simple pruning strategy already works well. We simply use order-1 probability to prune the tag candidates at each position, such that only top-k candidates at each position are used to generate the search space for higher order dependencies. In practice we find top-5 pruning gives no loss on accuracy at all. Second, we prune the search space according to training set, such that only the tag dependencies appeared in the training data will be considered as probable tag dependencies in the decoding. We collect a dictionary of the tag dependencies from the training set, and the first pruning technique is based on this dictionary. With this implementation, our scalable multi-order decoding performs efficiently on various real-world NLP tasks and keeps good scalability. The overall training time and the overall test time on the tasks are shown in the Table B.6.5 5 The “overall” time of BLSTM-SR means that the time of all related orders are added together already. For example, BLSTM-SR-order3’s overall time already includes the time of order-1 and order-2 models. 37
2cs.AI
arXiv:1710.02067v1 [cs.IT] 5 Oct 2017 Codes Endowed With the Rank Metric Elisa Gorla Institut de Mathématiques Université de Neuchâtel, Switzerland [email protected] Alberto Ravagnani Department of Electrical and Computer Engineering University of Toronto, Canada [email protected] Abstract We review the main results of the theory of rank-metric codes, with emphasis on their combinatorial properties. We study their duality theory and MacWilliams identities, comparing in particular rank-metric codes in vector and matrix representation. We then investigate the combinatorial structure of MRD codes and optimal anticodes in the rank metric, describing how they relate to each other. Introduction A q-ary rank-metric code is a set of matrices over Fq equipped with the rank distance, which measures the rank of the difference of a pair of matrices. Rank-metric codes were first studied in [3] by Delsarte for combinatorial interest. More recently, codes endowed with the rank metric have been re-discovered for error correction in the context of linear network coding, and featured prominently in the coding theory literature. In linear network coding, a source attempts to transmit information packets to multiple destinations via a network of intermediate nodes. The nodes compute and forward in the direction of the sinks linear functions of the received packets, rather than simply routing them. In [1, 9] it was shown that linear network coding achieves the optimal multicast throughput over sufficiently large alphabets. Rank-metric codes were proposed in [8, 18] for end-to-end error correction in noisy and adversarial networks. In this context, as shown in [17], the correction capability of a rankmetric code is measured by a fundamental parameter, called the minimum rank distance of the code. 1 In this work we survey the main results of the mathematical theory of rank-metric codes, with emphasis on their combinatorial structure. In Section 1 we introduce the most important parameters of a rank-metric code, namely, the minimum distance, the weight distribution, and the distance distribution. We then define the trace-dual of a linear rank-metric code, and compare the duality theories of codes in matrix and vector representation. In particular, we show that the former generalizes the latter. Section 2 is devoted to the duality theory of codes endowed with the rank metric. We study how combinatorial properties of a linear code relate to combinatorial properties of the dual code. In particular, we show that the weight distribution of a linear code and the weight distribution of its dual code determine each other via a MacWilliams-type transformation. We also show an application of the MacWilliams identities for the rank metric to an enumerative combinatorics problem. In Section 3 we study codes that have the largest possible cardinality for their parameters. These are called Maximum Rank Distance codes (MRD in short) and have very remarkable properties. We first show the existence of linear MRD codes for all choices of the parameters and of the field size. Then we prove that the dual of a linear MRD code is MRD. Finally, we show that the distance distribution of a (possibly non-linear) rank-metric code is completely determined by its parameters. Section 4 is devoted to rank-metric anticodes, i.e., sets of matrices where the distance between any two of them is bounded from above by a given integer. We study how codes and anticodes relate to each other, deriving in particular an upper bound for the cardinality of any anticode of given parameters. We conclude the section showing that the dual of an optimal linear anticode is an optimal anticode. 1 Rank-metric codes In the sequel q denotes a fixed prime power, and Fq the finite field with q elements. Moreover, k and m denote positive integers with k ≤ m without loss of generality, and Fqk×m is the space of k × m matrices over Fq . Finally, for given integers a, b ∈ N we denote by   a b q the q-ary binomial coefficient of a and b, which counts the number of b-dimensional subspaces of an a-dimensional space over Fq . See e.g. [19, Section 1.7] for details. Definition 1. The rank distance is the function d : Fqk×m ×Fqk×m → N defined by d(M, N ) = rk(M − N ) for all M, N ∈ Fqk×m . It is easy to check that d is indeed a distance function on Fqk×m . Definition 2. A (rank-metric) code over Fq is a non-empty subset C ⊆ Fqk×m . When |C| ≥ 2, the minimum distance of C is the positive integer d(C) = min{d(M, N ) | M, N ∈ C, M 6= N }. A code C is linear if it is an Fq -linear subspace of Fqk×m . In this case its dual code is defined as C ⊥ = {N ∈ Fqk×m | Tr(M N t ) = 0 for all M ∈ C} ⊆ Fqk×m , where Tr(·) denotes the trace of a square k × k matrix. The map (M, N ) → Tr(M N t ) ∈ Fq is a scalar product on Fqk×m , i.e., it is symmetric, bilinear and non-degenerate. In particular, the dual of a linear code is a linear code of dimension dim(C ⊥ ) = km − dim(C). Other fundamental parameters of a rank-metric code are the following. 2 Definition 3. The weight distribution and the distance distribution of a code C are the collections {Wi (C) | i ∈ N} and {Di (C) | i ∈ N} respectively, where Di (C) = 1/|C| · |{(M, N ) ∈ C 2 | d(M, N ) = i}| Wi (C) = |{M ∈ C | rk(M ) = i}|, for all i ∈ N. If C is a linear code, then for all P ∈ C there are precisely |C| pairs (M, N ) ∈ C 2 such that M − N = P . Therefore X Di (C) = 1/|C| · |{(M, N ) ∈ C 2 | M − N = P }| = Wi (C) P ∈C rk(P )=i for all i ∈ N. Moreover, if |C| ≥ 2 then d(C) = min{rk(M ) | M ∈ C, M 6= 0}. In [5], Gabidulin proposed independently a different notion of rank-metric code, in which the codewords are vectors with entries from an extension field Fqm rather than matrices over Fq . Definition 4. The rank of a vector v = (v1 , ..., vk ) ∈ Fkqm is the dimension of the linear spaces generated over Fq by its entries, i.e., rkG (v) = dimFq hv1 , ..., vk i. The rank distance between vectors v, w ∈ Fkqm is dG (v, w) = rkG (v − w). One can check that dG is a distance function on Fkqm . Definition 5. A vector rank-metric code over Fqm is a non-empty subset C ⊆ Fkqm . When |C| ≥ 2, the minimum distance of C is the positive integer dG (C) = min{dG (v, w) | v, w ∈ C, v 6= w}. The code C is linear if it is an Fqm -linear subspace of Fkqm . In this case the dual of C is defined as ) ( k X ⊥ k vi wi = 0 for all v ∈ C ⊆ Fkqm . C = w ∈ Fq m | i=1 The map (v, w) 7→ vi wi is an Fqm -scalar product on Fkqm . Therefore for all linear vector rank-metric codes C ⊆ Fkqm we have P dimFqm (C ⊥ ) = k − dimFqm (C). Definition 6. The weight distribution and the distance distribution of a vector rankmetric code C are the integer vectors (Wi (C) | i ∈ N) and (Di (C) | i ∈ N) respectively, where Wi (C) = |{v ∈ C | rkG (v) = i}|, Di (C) = 1/|C| · |{(v, w) ∈ C 2 | dG (v, w) = i}| for all i ∈ N. There exists a natural way to associate to a vector rank-metric code a code in matrix representation with the same cardinality and metric properties. Definition 7. Let Γ = {γ1 , ..., γm } be a basis of Fqm over Fq . The matrix associated to a vector v ∈ Fkqm with respect to Γ is the k × m matrix Γ(v) with entries in Fq defined by vi = m X Γ(v)ij γj for all i = 1, ..., k. j=1 The rank-metric code associated to a vector rank-metric code C ⊆ Fkqm with respect to Γ is Γ(C) = {Γ(v) | v ∈ C} ⊆ Fqk×m . 3 Notice that in the previous definition the i-th row of Γ(v) is the expansion of the entry vi over the basis Γ. The proof of the following result is standard and left to the reader. Proposition 8. For every Fq -basis Γ of Fqm the map v 7→ Γ(v) is an Fq -linear bijective isometry (Fkqm , dG ) → (Fqk×m , d). In particular, if C ⊆ Fkqm is a vector rank-metric code, then Γ(C) has the same cardinality, rank distribution and distance distribution as C. Moreover, if |C| ≥ 2 then dG (C) = d(Γ(C)). In the remainder of the section we compare the duality theories of matrix and vector rankmetric codes, showing that the former generalizes the latter. The following results appear in [12]. Given an Fqm -linear vector rank-metric code C ⊆ Fkqm and a basis Γ of Fqm over Fq , it is natural to ask whether the codes Γ(C ⊥ ) and Γ(C)⊥ coincide or not. The answer is negative in general, as we show in the following example. Example 9. Let q = 3, k = m = 2 and F32 = F3 [η], where η is a root of the irreducible primitive polynomial x2 + 2x + 2 ∈ F3 [x]. Let ξ = η 2 , so that ξ 2 + 1 = 0. Set α = (ξ, 2), and let C ⊆ F232 be the 1-dimensional vector rank-metric code generated by α over F32 . Take Γ = {1, ξ} as basis of F32 over F3 . One can check that Γ(C) is generated over F3 by the two matrices     0 1 −1 0 Γ(α) = , Γ(ξα) = . 2 0 0 2 Let β = (ξ, 1) ∈ F232 . We have α1 β1 + α2 β2 = 1 6= 0, and so β ∈ / C ⊥ . It follows Γ(β) ∈ / Γ(C ⊥ ). On the other hand,   0 1 Γ(β) = , 1 0 and it is easy to see that Γ(β) is trace-orthogonal to both Γ(α) and Γ(ξα). Therefore Γ(β) ∈ Γ(C)⊥ , hence Γ(C)⊥ 6= Γ(C ⊥ ). Although the duality notions for matrix and vector rank-metric codes do not coincide, there is a simple relation between them via orthogonal bases of finite fields. m−1 for all Let Trace : Fqm → Fq be the map defined by Trace(α) = α + αq + · · · + αq ′ } of Fqm over Fq are called orthogonal α ∈ Fqm . Bases Γ = {γ1 , ..., γm } and Γ′ = {γ1′ , ..., γm if Trace(γi′ γj ) = δij for all i, j ∈ {1, ..., m}. It is well-known that every basis Γ of Fqm over Fq has a unique orthogonal basis Γ′ (see [10], page 54). Theorem 10. Let C ⊆ Fkqm be an Fqm -linear vector rank-metric code, and let Γ, Γ′ be orthogonal bases of Fqm over Fq . We have Γ′ (C ⊥ ) = Γ(C)⊥ . In particular, C has the same weight distribution as Γ(C), and C ⊥ has the same weight distribution as Γ(C)⊥ . ′ }. Let M ∈ Γ′ (C ⊥ ) and N ∈ Γ(C). There Proof. Write Γ = {γ1 , ..., γm } and Γ′ = {γ1′ , ..., γm ⊥ ′ exist α ∈ C and β ∈ C such that M = Γ (α) and N = Γ(β). By Definition 7 we have 0 = k X αi βi = i=1 m k X X i=1 j=1 Mij γj′ m X Nit γt = t=1 m m X k X X Mij Nit γj′ γt . i=1 j=1 t=1 Applying the function Trace : Fqm → Fq to both sides of equation (10) we obtain   k X m X m k X m X m X X 0 = Trace  Mij Nit Trace(γj′ γt ) = Tr(M N t ). Mij Nit γj′ γt  = i=1 j=1 t=1 i=1 j=1 t=1 4 (1) Therefore Γ′ (C ⊥ ) ⊆ Γ(C)⊥ . Proposition 8 implies that Γ′ (C ⊥ ) and Γ(C)⊥ have the same dimension over Fq . Hence the two codes are equal. The second part of the statement follows from Proposition 8. Theorem 10 shows that the duality theory of Fq -linear rank-metric codes in matrix representation can be regarded as a generalization of the duality theory of Fqm -linear vector rank-metric codes. For this reason, in the sequel we only treat rank-metric codes in matrix representation. 2 MacWilliams identities for the rank metric This section is devoted to the duality theory of codes endowed with the rank metric. We concentrate on linear rank-metric codes, and show that the weight distributions of a code C and its dual code C ⊥ determine each other via a MacWilliams-type transformation. This result was established by Delsarte in [3, Theorem 3.3] using the machinery of association schemes, and may be regarded as the rank-analogue of a celebrated theorem by MacWilliams on the weight distribution of linear codes endowed with the Hamming metric (see [11]). In this section we present a lattice-theoretic proof inspired by [13, Theorem 27]. Notation 11. We denote by colsp(M ) ⊆ Fkq the Fq -space generated by the columns of a matrix M ∈ Fqk×m . Given a code C ⊆ Fqk×m and an Fq -subspace U ⊆ Fkq , we let C(U ) = {M ∈ C | colsp(M ) ⊆ U } ⊆ Fqk×m be the set of matrices in C whose columnspace is contained in U . Note that for all M, N ∈ Fqk×m we have colsp(M + N ) ⊆ colsp(M ) + colsp(N ). As a consequence, if U ⊆ Fkq is an Fq -linear subspace and C ⊆ Fqk×m is a linear code, then C(U ) is a linear code as well. We start with a series of preliminary results. In the sequel we denote by U ⊥ the orthogonal (or dual) of an Fq -vector space U ⊆ Fkq with respect to the standard inner product of Fkq . It will be clear from context if by “⊥” we denote the trace-dual in Fqk×m or the standard dual in Fkq . Lemma 12. Let U ⊆ Fkq be a subspace. The following hold. 1. dim(Fqk×m (U )) = m · dim(U ). 2. Fqk×m (U )⊥ = Fqk×m (U ⊥ ). Proof. 1. Let s = dim(U ) and V = {(x1 , ..., xk ) ∈ Fkq | xi = 0 for i > s} ⊆ Fkq . There exists an Fq -isomorphism g : Fkq → Fkq that maps U to V . Let G ∈ Fqk×k be the invertible matrix associated to g with respect to the canonical basis {e1 , ..., ek } of Fkq , i.e., g(ej ) = k X Gij ei for all j = 1, ..., k. i=1 The map M 7→ GM is an Fq -isomorphism Fqk×m (U ) → Fqk×m (V ). Property 1 of the lemma now directly follows from the definition of Fqk×m (V ). 2. Let N ∈ Fqk×m (U ⊥ ) and M ∈ Fqk×m (U ). Using the definition of trace-product one Pm sees that Tr(M N t ) = i=1 hMi , Ni i, where h·, ·i is the standard inner product of Fkq , and Mi , Ni denote the i-th column of M and N (respectively). Each column of N belongs to U ⊥ , and each column of M belongs to U . Therefore Tr(M N t ) = 0, hence Fqk×m (U ⊥ ) ⊆ Fqk×m (U )⊥ . By property 1, the two spaces Fqk×m (U ⊥ ) and Fqk×m (U )⊥ have the same dimension over Fq . Therefore they are equal. 5 The following result is [12, Lemma 28]. Proposition 13. Let C ⊆ Fqk×m be a linear code, and let U ⊆ Fkq be a subspace of dimension u over Fq . Then |C| |C(U )| = m(k−u) |C ⊥ (U ⊥ )|. q Proof. We have C(U )⊥ = (C ∩ Fqk×m (U ))⊥ = C ⊥ + Fqk×m (U )⊥ = C ⊥ + Fqk×m (U ⊥ ), where the last equality follows from part 2 of Lemma 12. Therefore |C(U )| · |C ⊥ + Fqk×m (U ⊥ )| = q km . (2) On the other hand, part 1 of Lemma 12 gives dim(C ⊥ + Fqk×m (U ⊥ )) = dim(C ⊥ ) + m · dim(U ⊥ ) − dim(C ⊥ (U ⊥ )). As a consequence, q km · q m(k−u) . |C| · |C ⊥ (U ⊥ )| Combining equations (2) and (3) one obtains the proposition. |C ⊥ + Fqk×m (U ⊥ )| = (3) We will also need the following preliminary lemma, which is an explicit version of the Möbius inversion formula for the lattice of subspaces of Fkq . We include a short proof for completeness. See [19, Sections 3.7 – 3.10] for details. Lemma 14. Let P(Fkq ) be the set of all Fq -subspaces of Fkq , and let f : P(Fkq ) → Z be P any function. Define g : P(Fkq ) → Z by g(V ) = U⊆V f (U ) for all V ⊆ Fkq . Then for all i ∈ {0, ..., k} and for any subspace V ∈ P(Fkq ) with dim(V ) = i we have f (V ) = i X i−u 2 (−1)i−u q ( ) u=0 X g(U ). U⊆V dim(U)=u Proof. Fix an integer i ∈ {0, ..., k} and a vector space V ∈ P(Fkq ) with dim(V ) = i. We inductivelyPdefine a function µ : {U ∈ P(Fkq ) | U ⊆ V } → Z by µ(U ) = 1 if U = V , and µ(U ) = − U(S⊆V µ(S) if U ( V . By definition of g we have X X X X X µ(U )g(U ) = µ(U ) f (S) = f (S) µ(U ) = f (V ), U⊆V U⊆V S⊆U S⊆V S⊆U⊆V where the last equality immediately follows from the definition of µ. Therefore it suffices to show that for all U ⊆ V we have µ(U ) = (−1)i−u q ( i−j 2 ), (4) where u = dim(U ). We proceed by induction on i − u. If i = u then equation (4) is trivial. Now assume i > u. By definition of µ and the induction hypothesis we have   i X X i−j i−s i−s µ(U ) = − µ(S) = − (−1) q ( 2 ) s−u q s=u+1 U(S⊆V = − i X i−s (−1) s=u+1 = − i−u X s=0 = i−s 2 q(   ) i−u i−s q   s i−u i−u i−u ) ( 2 (−1) q + (−1) q ( 2 ) s q i−u (−1) s i−u 2 q( ), where the last equality follows from the q-Binomial Theorem (see [19], page 74). 6 We can now prove the main result of this section, first established by Delsarte in [3, Theorem 3.3]. A proof for the special case of Fqm -linear vector rank-metric codes using different techniques can be found in [6]. Theorem 15 (MacWilliams identities for the rank metric). Let C ⊆ Fqk×m be an linear rank-metric code. For all i ∈ {0, ..., k} we have Wi (C ⊥ ) =     k k X i−u 1 X k−u k−j i−u Wj (C) (−1) q mu+( 2 ) . k−i q u q |C| j=0 u=0 Proof. For all subspaces V ⊆ Fkq define f (V ) = |{M ∈ C ⊥ | colsp(M ) = V }|, g(V ) = X f (U ) = |C ⊥ (V )|. U⊆V By Lemma 14, for any i ∈ {0, ..., k} and for any vector space V ⊆ Fkq of dimension i we have f (V ) = i X (−1)i−u q ( i−u 2 ) u=0 = i X |C ⊥ (U )| U⊆V dim(U)=u i−u (−1) q( ) i−u 2 u=0 = X X |C ⊥ (T ⊥ )| T ⊆Fk q T ⊇V ⊥ dim(T )=k−u i i−u 1 X i−u (−1) q mu+( 2 ) |C| u=0 X |C(T )|, T ⊆Fk q ⊥ T ⊇V dim(T )=k−u where the last equality follows from Proposition 13. Now observe that X f (V ) Wi (C ⊥ ) = V ⊆Fk q dim(V )=i = = = i i−u 1 X (−1)i−u q mu+( 2 ) |C| u=0 i i−u 1 X i−u (−1) q mu+( 2 ) |C| u=0 X X ⊆Fk q V dim(V )=i |C(T )| T ⊆Fk q ⊥ T ⊇V dim(T )=k−u X T ⊆Fk q dim(T )=k−u   i i−u 1 X k−u i−u (−1) q mu+( 2 ) i−u q |C| u=0 X |C(T )| ⊆Fk q ⊥ V V ⊇T dim(V )=i X |C(T )|. T ⊆Fk q dim(T )=k−u On the other hand, X |C(T )| = X T ⊆Fk q T ⊆Fk q dim(T )=k−u dim(T )=k−u k−u X j=0 7 X S⊆T dim(S)=j |{M ∈ C | colsp(M ) = S}| (5) k−u X = X j=0 |{M ∈ C | colsp(M ) = S}| S⊆Fk q T ⊆Fk q dim(S)=j T ⊇S dim(T )=k−u k−u X = X j=0 k−j u  Wj (C). (6) q Combining equations (5) and (6) one obtains the desired result. Example 16. Let q = 2, k = 2, m = 3. Let generated over F5 ∼ = Z/5Z by the matrices   1 0 2 , 0 2 4 C ⊆ Fqk×m be the 2-dimensional linear code  2 1  3 0 . 4 0 We have W0 (C) = 1, W1 (C) = 8 and W2 (C) = 16. Applying Theorem 15 one can easily compute W0 (C ⊥ ) = 1, W1 (C ⊥ ) = 65 and W2 (C) = 560. Observe that C ⊥ has dimension 6 − 2 = 4, and that 1 + 64 + 560 = 625 = 54 , as expected. We now present a different formulation of the MacWilliams identities for the rank metric. The following result is [12, Theorem 31]. Theorem 17. Let C ⊆ Fqk×m be a linear code. For all 0 ≤ ν ≤ k we have k−ν X i=0   ν |C| X k−j ⊥ Wj (C ) . ν−j q q mν j=0   k−i Wi (C) = ν q Proof. Proposition 13 gives X |C(U )| |C| q mν = U⊆Fk q |C(U )| = |C ⊥ (U )|. (7) U⊆Fk q dim(U)=ν dim(U)=k−ν Observe that X X |{(U, M ) | U ⊆ Fkq , dim(U ) = k − ν, M ∈ C, colsp(M ) ⊆ U }| U⊆Fk q dim(U)=k−ν = X |{U ⊆ Fkq , dim(U ) = k − ν, colsp(M ) ⊆ U }| M∈C = k X X |{U ⊆ Fkq , dim(U ) = k − ν, colsp(M ) ⊆ U }| rk(M)=i k X X  i=0 = i=0 M∈C M∈C rk(M)=i    k−ν X k−i k−i Wi (C) . = ν q k−ν −i q (8) i=0 Using the same argument with C ⊥ and k − ν one shows that X U⊆Fk q dim(U)=ν ⊥ |C (U )| = k−ν X j=0  k−j Wj (C ) ν −j ⊥ The result now follows combining equations (7), (8) and (9). 8  q . (9) Remark 18. The two formulations of the MacWilliams identities for the rank metric given in Theorems 15 and 17 are equivalent. See [6, Corollary 1 and Proposition 3] and [12, Theorem 61] for details. The next theorem is [2, Theorem 27], and shows that the weight distribution of a linear code is determined by its parameters, together with the number of codewords of small weight. We state it without proof. An application of this result will be given in Section 3 (see Corollary 30). Theorem 19. Let C ⊆ Fqk×m be a linear code with 1 ≤ dim(C) ≤ km − 1, minimum distance d = d(C), and dual minimum distance d⊥ = d(C ⊥ ). Let ε = 1 if C is MRD, and ε = 0 otherwise. For all 1 ≤ i ≤ d⊥ we have k−d X  u  u − d⊥ + i − 1 i Wk−d⊥ +i (C) = (−1)i q (2) Wk−u (C) d⊥ − i q i−1 q ⊥ u=d +  k d⊥ − i  i−1−ε X q u=0     u ⊥ k − d⊥ + i ) ( 2 q dim(C)−m(d −i+u) − 1 . (−1) q u q u In particular, k, m, t, d, d⊥ and Wd (C), . . . , Wk−d⊥ (C) completely determine the weight distribution of C. We conclude this section showing how MacWilliams identities for the rank metric can be employed to solve certain enumerative problems of matrices over finite fields. The following result is [13, Corollary 52]. Corollary 20. Let I ⊆ {(i, j) ∈ {1, ..., k} × {1, ..., m} | i = j} be a set of diagonal entries. For all 0 ≤ r ≤ k the number of k × m matrices M over Fq having rank r and Mij = 0 for all (i, j) ∈ I is q −|I|      k k  X X r−u |I| k−u k−t (q − 1)t (−1)r−u q mu+( 2 ) . k−r q u q t u=0 t=0 Proof. Define the linear code C = {M ∈ Fqk×m | Mij = 0 for all (i, j) ∈ / I} ⊆ Fqk×m . Then dim(C) = |I|, Wt (C) = 0 for |I| < t ≤ k, and   |I| t Wt (C) = (q − 1) t for 0 ≤ t ≤ |I|. Moreover, C ⊥ = {M ∈ Fqk×m | Mij = 0 for all (i, j) ∈ I}. Therefore the number of matrices M ∈ Fqk×m having rank r and Mij = 0 for all (i, j) ∈ I is precisely Wr (C ⊥ ). The corollary now follows from Theorem 15. 3 MRD codes In this section we study rank-metric codes that have the largest possible cardinality for their parameters. We start with a Singleton-type bound for the cardinality of a rank-metric code of given minimum distance. A code is called MRD if it attains the bound. We then show that for any admissible choice of the parameters there exists a linear MRD code with those parameters. In the second part of the section we study general structural properties of MRD codes. We first prove in Theorem 26 that the dual of a linear MRD code is MRD. Then we show in Theorem 28 that the weight distribution of a possibly non-linear MRD code C ⊆ Fqk×m with 0 ∈ C is determined by k, m and d(C). As a corollary, we prove that these three parameters completely determine the distance distribution of any MRD code. Our proofs are inspired by the lattice-theory approach to the weight functions of coding theory proposed in [14] and [13]. 9 Theorem 21 (Singleton-like bound). Let C ⊆ Fqk×m be a rank-metric code with |C| ≥ 2 and minimum distance d. Then |C| ≤ q m(k−d+1) . (k−d+1)×m denote the projection on the last k − d + 1 rows. Since C has Proof. Let π : C → Fq minimum distance d, the map π is injective. Therefore |C| = |π(C)| ≤ q m(k−d+1) . A code is MRD if its parameters attain the Singleton-like bound. Definition 22. We say that C ⊆ Fqk×m is an MRD code if |C| = 1, or |C| ≥ 2 and |C| = q m(k−d+1) , where d = d(C). We now prove that for any choice of q, k, m and d there exists a linear rank-metric code C ⊆ Fqk×m that attains the bound of Theorem 21. This result was first shown by Delsarte in [3], and rediscovered independently by Gabidulin in [5] and by Kötter and Kschischang in [8] in the context of linear network coding. Theorem 23. For all 1 ≤ d ≤ k there exists an Fqm -linear vector rank-metric code C ⊆ Fkqm with dG (C) = d and dimFqm (C) = k − d + 1. In particular, there exists a linear MRD code C ⊆ Fqk×m with d(C) = d. We include an elegant proof for Theorem 23 from [8]. Recall that a linearized polynomial p over Fqm is a polynomial of the form s 2 p(x) = α0 x + α1 xq + α2 xq + · · · + αs xq , αi ∈ Fqm , i = 0, ..., s. The degree of p, denoted by deg(p), is the largest integer i ≥ 0 such that αi 6= 0. The Fqm vector space of linearized polynomials over Fqm of degree at most s is denoted by Linq (m, s). It is easy to see that dimFqm (Linq (m, s)) = s + 1. Remark 24. The roots of a linearized polynomial p over Fqm form an Fq -vector subspace of Fqm (see [10], Theorem 3.50), which we denote by V (p) ⊆ Fqm in the sequel. Clearly, for any non-zero linearized polynomial p we have dimFq V (p) ≤ deg(p) by the Fundamental Theorem of Algebra. Proof of Theorem 23. Let E = {β1 , ..., βk } ⊆ Fqm be a set of Fq -independent elements. These elements exist as k ≤ m by assumption. Define the Fqm -linear map evE : Linq (m, k − d) → Fkqm , evE (p) = (p(β1 ), ..., p(βk )) for p ∈ Linq (m, k − d). We claim that C = evE (Linq (m, k − d)) ⊆ Fkqm is a vector rank-metric code with the desired properties. Clearly, C is Fqm -linear. Now let p ∈ Linq (m, k − d) be a non-zero linearized polynomial, and let W ⊆ Fqm denote the space generated over Fq by the evaluations p(β1 ), ..., p(βk ). The polynomial p induces an Fq -linear evaluation map p : hβ1 , ..., βk iFq → Fqm . The image of p is W , and therefore by the rank-nullity theorem we have dimFq (W ) = k − dimFq V (p). By Remark 24 we conclude dimFq (W ) ≥ k − (k − d) = d. This shows that dG (C) ≥ d. In particular, as d ≥ 1, the map evE is injective, and the dimension of C is dimFqm (C) = k−d+1. Combining Proposition 8 and Theorem 21 we obtain dG (C) = d. The second part of the theorem immediately follows from Proposition 8. The MRD code construction in the proof of Theorem 23 was later generalized by Sheekey in [15], introducing a new class of MRD codes. The reminder of the section is devoted to the structural properties of MRD codes. We start with a preliminary result from [14, Chapter 7]. 10 Lemma 25. Let C ⊆ Fqk×m be an MRD code with |C| ≥ 2 and minimum distance d. For all subspaces U ⊆ Fkq with u = dim(U ) ≥ d − 1 we have |C(U )| = q m(u−d+1) . Proof. As in Lemma 12, define the space V = {(x1 , ..., xk ) ∈ Fkq | xi = 0 for i > u} ⊆ Fkq . Let g : Fkq → Fkq be an Fq -isomorphism with f (U ) = V . Denote by G ∈ Fqk×k the matrix associated to g with respect to the canonical basis of Fkq . Define the rank-metric code D = GC = {GM | M ∈ C}. Clearly, D has the same dimension and minimum distance as C. In particular, it is MRD. Observe moreover that C(U ) = D(V ). Now consider the maps π π 2 1 , −→ F(k−u)×m F(k−d+1)×m D −→ q q where π1 is the projection on the last k − d + 1 coordinates, and π2 is the projection on the last k − u coordinates. Since d(D) = d, π1 is injective. Since D is MRD, we have logq (|D|) = m(k − d + 1). Therefore π1 is bijective. The map π2 is Fq -linear and surjective. Therefore (k−u)×m |π2−1 (0)| = |π2−1 (M )| = q m(u−d+1) for all M ∈ Fq . Since π1 is bijective and π2 is surjective, the map π = π2 ◦ π1 is surjective. Moreover, (k−u)×m |π −1 (0)| = |π −1 (M )| = q m(u−d+1) for all M ∈ Fq . The lemma now follows from the identity C(U ) = D(V ) = π −1 (0). We can now show that the dual of a linear MRD code is MRD. The next fundamental result is [13, Theorem 5.5]. Theorem 26. Let C ⊆ Fqk×m be a linear MRD code. Then C ⊥ is MRD. Proof. The result is immediate if dim(C) ∈ {0, km}. Assume 1 ≤ dim(C) ≤ km − 1, and let d = d(C), d⊥ = d(C ⊥ ). Applying Theorem 21 to C and C ⊥ we obtain dim(C ⊥ ) ≤ m(k − d⊥ + 1). dim(C) ≤ m(k − d + 1), Therefore km = dim(C) + dim(C ⊥ ) ≤ 2mk − m(d + d⊥ ) + 2m, i.e., d + d⊥ ≤ k + 2. (10) Let U ⊆ Fkq be any Fq -subspace with dim(U ) = k − d + 1. By Proposition 13 we have |C ⊥ (U )| = |C ⊥ | q m(d−1) |C(U ⊥ )|. (11) Since dim(U ⊥ ) = d − 1, by Lemma 25 we have |C(U ⊥ )| = |C|/q m(k−d+1) = 1, where the last equality follows from the fact that C is MRD. Therefore (11) becomes |C ⊥ (U )| = |C ⊥ | q m(d−1) = q km /q m(d−1) = 1. q m(d−1) Since U is arbitrary with dim(U ) = k − d + 1, this shows d⊥ ≥ k − d + 2. Using (10) we conclude d⊥ = k − d + 2. The theorem now follows from dim(C ⊥ ) = km − dim(C) = km − m(k − d + 1) = m(k − d⊥ + 1). 11 The proof of Theorem 26 also shows the following useful characterization of linear MRD codes in terms of their minimum distance and dual minimum distance. Proposition 27. Let C ⊆ Fqk×m be a linear code with 1 ≤ dim(C) ≤ km − 1. The following are equivalent. 1. C is MRD, 2. C ⊥ is MRD, 3. d(C) + d(C ⊥ ) = k + 2. In the remainder of the section we concentrate on the weight and distance distributions of (possibly non-linear) MRD codes. We start with a result on the weight distribution of MRD codes containing the zero vector (see [14, Theorem 7.46]). Theorem 28. Let C be an MRD code with |C| ≥ 2 and 0 ∈ C. Let d = d(C). Then W0 (C) = 1, Wi (C) = 0 for 1 ≤ i ≤ d − 1, and Wi (C) = d−1 X i−u (−1) u=0         i X i−u k i i i−u (i−u +m(u−d+1) k ( ) ) 2 2 q + (−1) q i q u q i q u q u=d for d ≤ i ≤ k. Proof. Since 0 ∈ C, we have W0 (C) = 1 and Wi (C) = 0 for 1 ≤ i ≤ d − 1. For all subspaces V ⊆ Fkq define f (V ) = |{M ∈ C | colsp(M ) = V }|, g(V ) = X f (U ) = |C(V )|. U⊆V Fix 0 ≤ i ≤ k and a vector space V ⊆ Fkq of dimension i. By Lemma 14 we have f (V ) = i X i−u (−1) q( i−u 2 ) u=0 X g(U ). U⊆V dim(U)=u Using Lemma 25 and the fact that C is MRD with 0 ∈ C we obtain  1 if 0 ≤ dim(U ) ≤ d − 1, g(U ) = q m(u−d+1) if d ≤ dim(U ) ≤ k. Therefore f (V ) = d−1 X u=0 i−u (−1)     i X i−u i i−u (i−u +m(u−d+1) i ) ( ) 2 2 + (−1) q . q u q u q u=d The result now follows from the identity Wi (C) = X f (V ). ⊆Fk q V dim(V )=i Different formulas for the weight distribution of linear MRD codes were obtained in [4] using elementary methods. Theorem 28 implies the following [3, Theorem 5.6], which states that the distance distribution of any MRD code is determined by its parameters. 12 Corollary 29. Let C ⊆ Fqk×m be an MRD code with |C| ≥ 2 and minimum distance d. We have D0 (C) = 1, Di (C) = 0 for 1 ≤ i ≤ d − 1, and Di (C) = d−1 X (−1)i−u q ( u=0         i X i−u i k i ) k + (−1)i−u q ( 2 )+m(u−d+1) i q u q i q u q i−u 2 u=d for d ≤ i ≤ k. Proof. Fix an i with d ≤ i ≤ k. For N ∈ C define C − N = {M − N | M ∈ C}. By definition of distance distribution we have X |C| · Di (C) = |{(M, N ) ∈ C 2 | rk(M − N ) = i}| = Wi (C − N ). N ∈C For all N ∈ C the code C − N is MRD. Moreover, 0 ∈ C − N . The result now easily follows from Theorem 28. Corollary 29 shows in particular that the weight distribution of a linear MRD code is determined by k, m and d(C). Recall from Proposition 27 that an MRD code C ⊆ Fqk×m is characterized by the property d(C)+d(C ⊥ ) = k +2. We now prove that the weight distribution of a linear code C with d(C) + d(C ⊥ ) = k + 1 is determined by k, m and dim(C). The following result is [2, Corollary 28]. Corollary 30. Let C ⊆ Fqk×m be a linear rank-metric code with 1 ≤ dim(C) ≤ km − 1 and d(C) + d(C ⊥ ) = k + 1. Then dim(C) 6≡ 0 mod m d(C) = k − ⌈dim(C)/m⌉ + 1. and Moreover, for all d ≤ i ≤ k we have   k Wi (C) = i q i−d(C) X u=0     u i ) ( 2 (−1) q q dim(C)−m(k+u−i) − 1 . u q u Proof. Assume by contradiction that dim(C) = αm for some α. Applying Theorem 21 to C and C ⊥ we obtain d(C) ≤ k − α + 1, d(C ⊥ ) ≤ α + 1. (12) By Proposition 27, the two inequalities in (12) are either both equalities, or both strict inequalities. Since d(C) + d(C ⊥ ) = k + 1 by assumption, they must be both strict inequalities. Therefore d(C) ≤ k − α, d(C ⊥ ) ≤ α, hence d(C) + d(C ⊥ ) ≤ k, a contradiction. This shows that dim(C) 6≡ 0 mod m. Now write dim(C) = αm + β with 1 ≤ β ≤ m − 1. Applying again Theorem 21 to C and C ⊥ one finds     km − αm − β αm + β ⊥ + 1 = k − α, d(C ) ≤ k − = α + 1. d(C) ≤ k − m m Since d(C) + d(C ⊥ ) = k + 1, we must have     dim(C) αm + β +1=k− + 1, d(C) = k − m m as claimed. The last part of the statement follows from Theorem 19. 13 4 Rank-metric anticodes This section is devoted to rank-metric anticodes, i.e., rank-metric codes in which the distance between any two matrices is bounded from above by a given integer δ. In Theorem 33 we give a bound for the cardinality of a (possibly non-linear) anticode, using a code-anticode-type bound. We also characterize optimal anticodes in terms of MRD codes. Then we show that the dual of an optimal linear anticode is an optimal linear anticode. The main results of this section appear in [12] and [14]. Definition 31. Let 0 ≤ δ ≤ k be an integer. A (rank-metric) δ-anticode is a non-empty subset A ⊆ Fqk×m such that d(M, N ) ≤ δ for all M, N ∈ A. We say that A is linear if it is an Fq -linear subspace of Fqk×m . Example 32. Any A ⊆ Fqk×m with |A| = 1 is a 0-anticode. The ambient space Fqk×m is a k-anticode. The vector space of k × m matrices over Fq whose last k − δ rows are zero is a linear δ-anticode of dimension mδ. In the sequel we work with a fixed integer 0 ≤ δ ≤ k. Moreover, for A, C ⊆ Fqk×m we set A + C = {M + N | M ∈ A, N ∈ C}. Theorem 33. Let A ⊆ Fqk×m be a δ-anticode. Then |A| ≤ q mδ . Moreover, if δ ≤ k − 1 then the following are equivalent. 1. |A| = q mδ . 2. A + C = Fqk×m for some MRD code C with d(C) = δ + 1. 3. A + C = Fqk×m for all MRD codes C with d(C) = δ + 1. Proof. Let C ⊆ Fqk×m be any MRD code with d(C) = δ + 1. Such a code exists by Theorem 23. For all M ∈ A let [M ] = M + C = {M + N | N ∈ C}. Then [M ] ∩ [M ′ ] = ∅ for all M, M ′ ∈ A with M 6= M ′ . Moreover, by definition of MRD code we have |[M ]| = |C| = q m(k−δ) for all M ∈ A, hence |Fqk×m | ≥ [ M∈A [M ] = X |[M ]| = |A| · |C| = |A| · q m(k−δ) . M∈A Therefore |A| ≤ q mδ , and equality holds if and only if [ Fqk×m = [M ] = A + C. M∈A A similar argument shows that properties 1, 2 and 3 are equivalent. Definition 34. We say that a δ-anticode A is (cardinality)-optimal if it attains the bound of Theorem 33. Remark 35. Example 32 shows the existence of optimal linear δ-anticodes for all choices of the parameter δ. In the remainder of the section we prove that the dual of an optimal linear δ-anticode is an optimal (k − δ)-anticode. The result may be regarded as the analogue of Theorem 26 in the context of rank-metric anticodes. We start with a preliminary result on the weight distribution of MRD codes. Lemma 36. Let C ⊆ Fqk×m be an MRD code with 0 ∈ C, |C| ≥ 2 and d(C) = d. Then Wd+ℓ (C) > 0 for all 0 ≤ ℓ ≤ k − d. 14 Proof. By Theorem 28, we shall prove the lemma for a given MRD code C ⊆ Fqk×m of our choice with |C| ≥ 2, minimum distance d, and 0 ∈ C. We will first produce a convenient MRD code with the prescribed properties. Let C ⊆ Fkqm be the vector rank-metric code constructed in the proof of Theorem 23, with evaluation set E = {β1 , ..., βk } and evaluation map evE . Let Γ be a basis of Fqm over Fq . By Proposition 8, the set C = Γ(C) ⊆ Fqk×m is a linear code with dim(C) = m(k − d + 1) and the same weight distribution as C. In particular, C is a non-zero linear MRD code of minimum distance d. Now we prove the lemma for the MRD code C constructed above. Fix ℓ with 0 ≤ ℓ ≤ k − d. Define t = k − d − ℓ, and let U ⊆ Fqm be the Fq -subspace generated by {β1 , ..., βt }. If t = 0 we set U to be the zero space. By [10], Theorem 3.52, Y pU = (x − γ) γ∈U is a linearized polynomial over Fqm of degree t = k − d − ℓ ≤ k − d, i.e., pU ∈ Linq (n, k − d). Therefore by Proposition 8 it suffices to prove that evE (pU ) = (pU (β1 ), ..., pU (βk )) has rank d+ ℓ = k −t. Clearly, V (pU ) = U . In particular we have evE (pU ) = (0, ..., 0, pU (βt+1 ), ..., pU (βk )). We will show that pU (βt+1 ), ..., pU (βk ) are linearly independent overFq . Assumethat there Pk Pk exist at+1 , ..., ak ∈ Fq with i=t+1 ai pU (βi ) = 0. Then we have pU i=t+1 ai βi = 0, i.e., Pk Pt i=t+1 ai βi ∈ V (pU ) = U . It follows that there exist a1 , ..., at ∈ Fq such that i=1 ai βi = Pk Pt Pk i=t+1 ai βi , i.e., i=1 ai βi − i=t+1 ai βi = 0. Since β1 , ..., βk are independent over Fq , we have ai = 0 for all i = 1, ..., k. In particular ai = 0 for i = t + 1, ..., k. Hence pU (βt+1 ), ..., pU (βk ) are linearly independent over Fq , as claimed. The following proposition characterizes optimal linear anticodes in terms of their intersection with linear MRD codes. Proposition 37. Assume 0 ≤ δ ≤ k−1, and let A ⊆ Fqk×m be a linear code with dim(C) = mδ. The following are equivalent. 1. A is an optimal δ-anticode. 2. A ∩ C = {0} for all non-zero MRD linear codes C ⊆ Fqk×m with d(C) = δ + 1. Proof. By Theorem 33, it suffices to show that if A ∩ C = {0} for all non-zero MRD linear codes C ⊆ Fqk×m with d(C) = δ + 1, then A is a δ-anticode. By contradiction, assume that A is not a δ-anticode. Since A is linear, by definition of δ-anticode there exists N ∈ C with rk(N ) ≥ δ + 1. Let D be a non-zero linear MRD code with d(D) = δ + 1 (see Theorem 23 for the existence of such a code). By Lemma 36 there exists M ∈ D with rk(M ) = rk(N ). There exist invertible matrices A and B of size k × k and m× m, resp., such that N = AM B. Define C = ADB = {AP B | P ∈ D}. Then C ⊆ Fqk×m is a nonzero linear MRD code with d(C) = δ + 1 and such that N ∈ A ∩ C. Since rk(N ) ≥ δ + 1 ≥ 1, N is not the zero matrix. Therefore A ∩ C 6= {0}, a contradiction. We conclude the section showing that the dual of an optimal linear anticode is an optimal linear anticode. Theorem 38. Let A ⊆ Fqk×m be an optimal linear δ-anticode. Then A⊥ is an optimal linear (k − δ)-anticode. Proof. Let A ⊆ Fqk×m be an optimal linear δ-anticode. If δ = k then the result is trivial. From now on we assume 0 ≤ δ ≤ k − 1. By Definition 34 we have dim(A) = mδ, hence dim(A⊥ ) = m(k − δ). Therefore by Proposition 37 it suffices to show that A⊥ ∩ C = {0} for all non-zero linear MRD codes C ⊆ Fqk×m with d(C) = k − δ + 1. Let C be such a code. Then dim(C) = m(k − (k − δ + 1) + 1) = mδ < mk. 15 Combining Theorem 26 and Proposition 27 one shows that C ⊥ is a linear MRD code with d(C ⊥ ) = k − (k − δ + 1) + 2 = δ + 1. By Proposition 37 we have A ∩ C ⊥ = {0}. Since dim(A) + dim(C ⊥ ) = mδ + m(k − (δ + 1) + 1) = mk, we have A ⊕ C ⊥ = Fqk×m . Therefore {0} = (Fqk×m )⊥ = (A ⊕ C ⊥ )⊥ = A⊥ ∩ C. This shows the theorem. References [1] R. Ahlswede, N. Cai, S.-Y.R. Li, R.W. Yeung, Network information flow. IEEE Transactions on Information Theory 46 (2000), 4, pp. 1204 – 1216. [2] J. De la Cruz, E. Gorla, H. H. López, A. Ravagnani, Rank distribution of Delsarte codes. Designs, Codes and Cryptography (to appear). [3] P. Delsarte, Bilinear forms over a finite field, with applications to coding theory. Journal of Combinatorial Theory A, 25 (1978), 3, pp. 226 – 241. [4] J. G. Dumas, R. Gow, G. McGuire, J. Sheekey, Subspaces of matrices with special rank properties. Linear Algebra and Its Applications, 433 (2010), pp. 191 – 202. [5] E. Gabidulin Theory of codes with maximum rank distance. Problems of Information Transmission, 1 (1985), 2, pp. 1 – 12. [6] M. Gadouleau, Z. Yan MacWilliams Identities for Codes with the Rank Metric. EURASIP Journal on Wireless Communications and Networking, 2008. [7] E. Gorla, A. Ravagnani, Subspace codes from Ferrers diagrams. Journal of Algebra and Its Applications, 16 (2017), 7. [8] R. Kötter, F. R. Kschischang, Coding for Errors and Erasures in Random Network Coding. IEEE Transactions on Information Theory, 54 (2008), 8, pp. 3579 – 3591. [9] S.-Y.R. Li, R.W. Yeung, N. Cai, Linear network coding. IEEE Transactions on Information Theory, 49 (2003), 2, pp. 371 – 381. [10] R. Lidl, H. Niederreiter, Finite Fields. Addison-Wesley Publishing Company (1983). [11] F. J. MacWilliams, A Theorem on the Distribution of Weights in a Systematic Code. Bell System Technical Journal, 42 (1963), 1, pp. 79 – 94. [12] A. Ravagnani, Rank-metric codes and their duality theory. Designs, Codes and Cryptography, 80 (2016), 1, pp. 197 – 216. [13] A. Ravagnani, Duality of codes supported on regular lattices, with an application to enumerative combinatorics. Submitted. Online preprint: https://arxiv.org/abs/1510.02383. [14] A. Ravagnani, Properties and Constructions of Codes with the Rank and the Subspace Metric. PhD thesis, Université de Neuchâtel, 2016. [15] J. Sheekey, A New Family of MRD Codes. Advances in Mathematics of Communications, 10 (2016), 3. [16] D. Silva, F. R. Kschishang, On metrics for error correction in network coding. IEEE Transactions on Information Theory, 55 (2009), 12, pp. 5479 – 5490. [17] D. Silva, F. R. Kschischang, On metrics for error correction in network coding. IEEE Transactions on Information Theory, 55 (2009), 12, pp. 5479 – 5490. [18] D. Silva, E. S. Rogers, F. R. Kschishang, R. Koetter, A Rank-Metric Approach to Error Control in Random Network Coding. IEEE Transactions on Information Theory, 54 (2008), 9, pp. 3951 – 3967. [19] P. Stanley, Enumerative Combinatorics, vol. 1, Cambridge Stud. Adv. Math., vol. 49. Cambridge University Press (2012). 16
7cs.IT
arXiv:1711.11487v1 [cs.SY] 30 Nov 2017 FRAPpuccino: Fault-detection through Runtime Analysis of Provenance Xueyuan Han, Thomas Pasquier, Tanvi Ranjan, Mark Goldstein, Margo Seltzer Harvard University Abstract We present FRAPpuccino (or FRAP), a provenancebased fault detection mechanism for Platform as a Service (PaaS) users, who run many instances of an application on a large cluster of machines. FRAP models, records, and analyzes the behavior of an application and its impact on the system as a directed acyclic provenance graph. It assumes that most instances behave normally and uses their behavior to construct a model of legitimate behavior. Given a model of legitimate behavior, FRAP uses a dynamic sliding window algorithm to compare a new instance’s execution to that of the model. Any instance that does not conform to the model is identified as an anomaly. We present the FRAP prototype and experimental results showing that it can accurately detect application anomalies. 1 Introduction Platform as a service (PaaS) clouds have become increasingly popular for their efficient use of computational resources, providing users with an abstracted environment on which to easily deploy customized applications. Various market research companies estimate the growth of the PaaS market at about 30% annually for the next few years [28, 36]. However, PaaS cloud applications face two major challenges: 1) As an increasing number of businesses, enterprises, and organizations adopt cloud computing, cloud applications inevitably become a major target of cyber-attacks. For example, a recent DDoS attack against a top security blogger delivered by hijacked botnet was so aggressive that Akamai had to cancel the account [19]. According to the RightScale 2017 State of the Cloud Report [38], cloud security remains one of the top 5 challenges among cloud users; 2) PaaS clouds make it possible to build large-scale applications that can serve millions of users. A run-time fault introduced in an application can potentially render it useless. For example, a simple bug can repeatedly crash a server, making the service appear unavailable ( § 4). We introduce FRAPpuccino (Fault-detection through Runtime Analysis of Provenance or FRAP for short), a fault/intrusion detection framework. FRAP detects anomalous behavior of cloud applications by using runtime provenance data to model correct program execution and detecting deviations from the model to identify potentially malicious behavior. Provenance describes system behavior as a labelled directed acyclic graph (DAG) representing interactions between system-level entities (e.g., file, sockets, pipes), activities (i.e., processes) and agents (i.e., users, groups). Provenance data can be abundant, so FRAP implements a streaming algorithm, using a dynamic sliding window, to avoid storing this data. From each running instance, the algorithm extracts a feature vector, which is a projection of the graph as a point into an n-dimensional space. We assume that most instances exhibit legitimate behavior so that clustering on these features will clearly divide the instances into good and bad sets. Thus, our application model includes two parts: the extracted features and the parameters of the clusters. Once FRAP has constructed such a model, it monitors program executions, extracts features from them, and reports any instances whose features deviate significantly from good behavior. Unlike most behavioral-based intrusion/fault detection systems [29] that rely on system-call usage [14, 16, 41, 43, 47] to profile legitimate application behavior, FRAP uses provenance data that provides a more comprehensive view of program activities, including their effects on the underlying system. Prior research has shown that understanding the context of a program’s execution, which the provenance DAG provides, leads to greater accuracy in detecting program anomalies [15, 40, 47]. Moreover, the provenance records provide data that can be analyzed to assist in root cause analysis, ideally providing actionable information. Our use of end-to-end provenance capture to detect intrusions or faults differs from other end-to-end tracing approaches in two major ways: 1) by using runtime graphical and statistical analysis on provenance DAGs of normal instances of an application, FRAP requires no application instrumentation or annotation, while systems such as Pip [37] need developerprovided specifications of expected behavior; 2) FRAP analyzes interactions between potentially all executing applications and the system as naturally presented by provenance DAGs, while systems such as Magpie [6] and SpectroScope [39] use event logs, which represent a carefully curated subset of system activity, which may or may not capture the key actions. Our goal is to show an alternative approach and evidence of its efficacy in tackling a long-standing problem of intrusion/fault detection. The contributions of this work are: 1) a novel approach that combines provenance and graphical and statistical analysis to model the behavior of cloud applications; 2) a dynamic sliding window algorithm that allows efficient processing of large provenance data to achieve online detection; and 3) an implementation of our framework with demonstrated accuracy. 2 Background We build FRAP using two existing open-source tools: 1) CamFlow [33, 34], a state-of-the-art provenance capture system; and 2) GraphChi [2, 26], a highly-efficient graph processing framework. However, the concepts are not tied to either implementation. CamFlow [34]: Provenance records the chronology of ownership, change, and movement of an object or a resource. We use provenance data to understand the interactions between the monitored application, other applications, and the underlying operating system. There are many provenance capture systems available, including PASS [31], Hi-Fi [35], Linux Provenance Module [7], and CamFlow [34]. We chose to use CamFlow, because it tracks multiple applications, their interactions with the system, and their interactions with each other. Moreover, it both limits the amount of information captured (i.e., you can specify which applications to trace) and ensures completeness by propagating capture to any programs that a traced application invokes. The capture is built upon Linux Security Module (LSM) hooks that provide completeness guarantees [13, 17, 22]. CamFlow also provides a facility to conveniently stream the provenance data captured through messaging middleware such as MQTT[3], RabbitMQ[4], or Apache Flume[1]. GraphChi [26]: Provenance data is naturally represented as a DAG in which each node represents an entity, an activity, or an agent, and each directed edge represents an interaction between two nodes. For example, a file was generated by a process, or a process used a packet. Our framework uses type information in a provenance record as labels to construct a labeled DAG. DAGs can be efficiently processed by graph processing engines. We chose GraphChi, a vertex-centric graph processing model, to generate program models and to detect anomalies. GraphChi uses a parallel sliding window method to achieve efficient computation of vertices. 3 The FRAPpuccino Framework The FRAP framework consists of three stages: 1) the learning stage determines the size of the dynamic sliding window and creates a model of correct program behavior; 2) the detection stage periodically compares instances of a program’s execution with the model, notifying the user upon detection of unusual program behavior; and 3) the revision stage improves the model by incorporating additional information when we encounter a false positive. FRAP starts with the learning stage, iterates through the detection stage until it needs to revise the model, and transitions back to the detection stage after the revision. 3.1 Learning Stage The learning stage analyzes the provenance DAG of each instance of a program, creating a model to describe its legitimate behavior. Provenance data can grow infinitely large, making it impossible to analyze them as a whole. However, past research [16, 21] has shown that a program usually has a limited set of interactions with the system (e.g., writing to a file, sending a packet), repeating them in different orders as it executes. Therefore, we claim that one can learn most of a program’s behavior from a subset of its provenance data. We begin with an overview of our approach, followed by a more detailed discussion of each step. FRAP uses a simple but effective algorithm to determine the number of consecutive provenance records it needs to examine to create a program model, which is the dynamic sliding window size (used in the detection stage). Using this subset of records, FRAP transforms the provenance DAG into a multidimensional numerical feature vector. We construct this feature vector in three steps: First, we run a label propagation algorithm that constructs a label for each node, representing the structure of the graph around the node. Second, we count the number of instances of each unique label. Third, we construct a feature vector consisting of all the label counts. A feature vector is therefore the result of dimensionality reduction, abstracting a program’s behavior into numerical values. Finally, FRAP clusters the feature vectors with the goal of grouping all well-behaved instances together and leaving badly behaved instances in different clusters. Thus, our model consists of the feature vectors of well behaved instances and the parameters (centroid and radius) of the clusters in which they reside. Determining the Dynamic Sliding Window Size: The goal of finding a dynamically sized window is to minimize the number of provenance records needed to characterize an application. We determine the size during capture by maintaining two counts. The first counts every edge examined until we declare a window size. We 0, 1 c 2 a 0, 3 f f 0 a 3 3, 0 f 3, NULL f c 2, NULL 2, 0 a 1 b 2 b 2 b b 2, 2 b 2, 1 d 1 1, 2 b 2 d 1, 0 c 3 3, 0 f 3, NULL d 2 (a) Before relabeling 0, 1 c 2 a → 4 1, 2 b 2 d → 7 2, NULL → 8 2, 2 b → 11 3, 0 f → 13 Relabeling Map 0, 3 f → 5 1, 0 c → 6 2, 0 a 1 b 2 b → 9 2, 1 d → 10 3, NULL → 12 4, 5 → 14 7, 6 → 15 8, 9 → 16 11, 10 → 17 13, 12 → 18 (b) Populating Relabeling map 18, 14 18, NULL f 14, 15 16 18 14 14, 18 18 a f c b 16, NULL 15, 16 17 18 16 15 16, 14 15 17 15, 14 b d 18, 14 18, NULL 17, 16 17 17, 15 (c) After relabeling Figure 1: (a) Before the first iteration, we label each node with its own label, its neighboring nodes’ labels, and its incident edges’ labels. (b) Each node inserts its sorted in-edge neighbor label list and its sorted out-edge neighbor label list into the relabeling map, and gets a new label based on these two label lists. In-edge node relabeling is shown in red, out-edge node relabeling is shown in blue, and final relabeling is shown in black. (c) After relabeling, nodes have both new identities and new labels while edge labels are unchanged. calculate the second by the following process: We examine each edge and assign it a triple consisting of the original edge type and the types of each vertex. We count the number of edges processed until we encounter a triple we have never seen before, at which point we reset the count to 0. If the first counter reaches an implementationdefined threshold (§ 4), or if the second counter reaches a user-defined threshold, we set the dynamic window size to be the value of the first counter. Generating a Program Model: To generate a model, FRAP computes a feature vector for each instance, clusters those vectors, and discards the vectors in isolated clusters. FRAP generates a feature vector, using the following iterative algorithm: relabel each vertex in the DAG using the current vertex label and the labels of its incoming and outgoing neighbors. During the first iteration, we also incorporate the labels of a vertex’s incident edges ( Fig. 1), but need not include these in later iterations, because that information is already encoded in the labels of the neighboring vertices. After each iteration, new labels encode longer sequences of interactions between the program and the system. FRAP generates a vector containing counts of all seen labels, including the ones from previous iterations, and then clusters the vectors from all instances. We empirically determine that four iterations produces the best results. To cluster, FRAP uses symmetric Kullback-Leibler divergence [25] or Kullback-Leibler Distance (KLD) with back-off probability [30] as the distance metric to measure the similarity between two feature vectors. KLD has been used, for example, in statistical language modeling [12] and text categorization [8]. We use two applications of K-means clustering: first we cluster on distances between feature vectors, which helps us select K for the second K-means clustering, which computes the actual model. We assume that clusters containing many vectors represent legitimate behavior and want to discard feature vectors in clusters isolated from these good clusters. Wagstaff et al. [45] have shown that cluster accuracy improves when additional information is available to the problem domain. We use our assumption that most instances are well-behaved as this additional information. Specifically, we hypothesize that there exists an observable difference between inter-cluster and intra-cluster distances. First we set K equal to the total number of instances we are analyzing and run K-means clustering on the pairwise KL distance between each pair of instances. We then set K to the number of populated clusters and run a second K-means clustering on the feature vectors themselves. This produces our model consisting of the set of feature vectors in clusters containing more than one instance and the parameters of those clusters (e.g., centroid and radius). 3.2 Detection Stage FRAP monitors an instance by taking its provenance data from a window of execution, generating a feature vector as in § 3.1, and checking whether this vector fits into any clusters by comparing the distance between the feature vector and the centroids of the clusters. An instance is considered abnormal if it does not fit into any of the model’s clusters. Dynamic Sliding Window: FRAP uses a dynamic sliding window approach to continuously monitor an instance while it runs uninterrupted. FRAP only stores and analyzes the provenance DAG within this window. Once Example Detection Algorithm (Window Size = 4) 0 1 2 3 4 5 provenance data 6 7 8 ←−−−−−−−− streaming in (a) Learning Stage 0 1 2 3 4 5 6 provenance data 7 8 9 ←−−−−−−−− streaming in (b) Detection Stage (Right after a tentative model is generated) 0 1 2 3 4 5 6 7 provenance data 8 9 10 ←−−−−−−−− streaming in (c) Detection Stage (After one run of the detection algorithm) Figure 2: Black rectangles represent the provenance records in the window. White ones to the left of the arrow are captured but not yet processed, and to the right will be generated in the future. it determines that the DAG is part of a normal program execution, FRAP can safely discard the data. The size of the window is determined in the learning stage (§ 3.1). As shown in Fig. 2, records 0, 1, 2, 3 in 2a are used to generate a model while new provenance data (records 4 and 5) are streaming in. The window slides each time FRAP finishes running the detection algorithm (described in the next paragraph), to include new records for the next round of analysis ( 2b and 2c). Since the window slides incrementally, each record appears in many different windows, maintaining a holistic view of program execution. New records may contain vertices related to ones processed in previous windows. This overlapping preserves a vertex’s n-hop neighbors in which n becomes larger as the overlap increases. This means that a larger number of iterations becomes more meaningful, since longer sequences of program-system interactions can be preserved. Detection Algorithm: Given a feature vector of a window of execution, FRAP uses the same distance metrics (i.e., KLD) to see if the instance lies in an existing cluster (i.e., the distance between it and the centroid is smaller than the cluster’s radius). If it does not lie in an existing cluster, FRAP re-runs (the second) K-means clustering, and only then reports the instance as an anomaly if it still does not lie within a cluster of legitimate executions. Since the detection algorithm is entirely local between an instance and the model, the computation is parallelizable and scalable. 3.3 Revision Stage FRAP identifies and collects false-positive instances and re-clusters, including them in the model. This reclustering is fast, which is important, because instances are running concurrently. A fast transition from the revision stage to the detection stage ensures maximal overlap be- tween the windows before and after revision (§ 3.2). Our current false-positive identification is somewhat crude. We assume that most instances are correct and revise the model only when detecting a large number of abnormal instances. However, this assumption does not always hold. For example, a corrupted database may cause many client requests to fail. FRAP should not learn such behavior and include it in the model. Another problematic scenario is when a program has normal behavior (A, B, C), and the model contains only one behavior (A). When many instances are displaying behavior B and one instance is displaying C, then only B will be included in the model while that one instance will be considered unusual. Developing a more principled approach to this problem is left for future work. 4 Implementation and Results We describe our implementation [20], experimental results and future work. Implementation-specific Window Size: When we constantly receive unique provenance records, our implementation-defined threshold determines the window size (§ 3.1). GraphChi uses a parallel sliding window method to perform computation on the vertices inside the window in memory, write the results to disk, and move the window to load the next set of vertices to memory. To avoid high-latency I/O operations, the learning stage takes the provenance data of the maximum size of the memory for each instance and allows GraphChi to perform computation on all vertices in-memory. Program Models and Feature Vectors: GraphChi performs vertex relabeling to generate a feature vector for each instance. Our implementation uses a global map to achieve consistent relabeling. We need to handle GraphChi’s asynchronous model of computation, in which an update of a vertex label is immediately visible to its neighbors in the same iteration. This means if a vertex runs its computation after one of its neighbors updates itself, it will take that neighbor’s updated label, which should be used in the next iteration. We solve this problem by alternating the computation with an update phase and a swap phase. In the update phase (which consists of one iteration), each vertex computes its new label without broadcasting it to its neighbors. Therefore, within the same iteration, all vertices take their neighboring vertices’ labels from the previous update phase. The next iteration is the swap phase, where all vertices broadcast their new labels to their neighbors so that in the next update phase, they can all read the latest labels. Preliminary Results: We conducted a number of experiments to see if FRAP is able to capture instances with unusual behavior in a pool of well-behaved instances. We used both Hellinger distance [32] and Euclidian distance, in addition to KLD, to see how different similarity Metrics KLD Hellinger Euclidean Captured Bad Instance (Learning) Yes No Yes Captured Bad Instance (Detection) Yes No Yes Table 1: This experiment runs 10 clients sending requests to the server, one of which causes the server to behave abnormally during learning. The same bad behavior occurs again during detection. metrics affect FRAP’s performance. Table 1 shows the results of one of these experiments. In this experiment, we set up a Ruby server in a simulated cloud environment. The server handles requests from multiple clients, and causes an out-of-memory server crash[18] – a known system level Ruby vulnerability – for certain URLs. We see that all but Hellinger distance are able to identify the badly behaved Ruby instance. Hellinger distance does not work well, because it always produces values between 0 and 1, which make it difficult for K-means clustering to create meaningful clusters. Hellinger consistently placed all instances in a single cluster. After manual inspection, we also discovered that while Euclidean distance successfully identified the badly behaved instance, it mistakenly considered two normal instances as abnormal during the learning stage (i.e., false negatives), resulting in a slightly less accurate model than KLD. Appendix A provides a reference to the current prototype and other experimental datasets. Future Work: We plan to develop more sophisticated ways to identify false-positives as outlined in § 3. We also want to further optimize our current implementation and identify situations in which more sophisticated learning algorithms will improve accuracy. One important area of optimization is our global relabeling map. Since GraphChi processes vertices in parallel, we need to maintain map consistency and avoid race conditions. Our current implementation is a single-point of contention and can easily be a performance bottleneck. We also have to garbage collect the map to keep its size manageable. We also want to experiment other algorithms to improve our clustering. For example, Principle Component Analysis [23] might help us further reduce dimensionality of feature vectors and discard misleading features. Our current prototype does not have all the pieces integrated, so we used manual intervention to achieve the end to end pipeline. In particular, we do not directly stream the provenance to the analyzer. Instead, we capture the provenance and then run the analyzer over the provenance stream. Additionally, we have not yet integrated the revision stage. These will both be available in the next release of the software. 5 Related Work A number of systems use sequences of system calls to detect program/system anomalies. pH [43] uses temporally proximate system call sequences to model the behavior of a program. More recent systems have proposed more advanced analyses. For example, MaMaDroid [27] uses static program analysis to obtain a program’s call graph and dynamically builds a Markov-chain [24] model of the graph during runtime. The feature vector of their program model consists of the probabilities of each state transition in the Markov chain. CMarkov [47] includes calling context of system calls when performing static program analysis, which further refines their Markov model. FRAP uses provenance to build a program model without the help of static program analysis. Its relabelling mechanism concisely encodes system call sequences and their contexts. Moreover, FRAP can detect anomalies in complex applications composed of multiple processes including distributed ones by capturing, aggregating, and analyzing provenance data from multiple machines. It is not restrained by per-process system call sequences. We leave comparing FRAP performance with that of other detection systems for future work. Similar to FRAP, systems such as Magpie [6], Pinpoint [11], Pip [37] and SpectroScope [39] use end-toend tracing to detect anomalies that could indicate bugs. However, unlike FRAP, they all capture request flows within distributed systems and analyze event logs either on a per-event basis or on whole paths. More importantly, although these systems are able to infer bugs, they are mainly designed to diagnose performance problems, not intrusions, in distributed systems. Moreover, Pinpoint and Pip require manually annotating applications, an error-prone and significant burden on developers, while FRAP can analyze all applications as long as the underlying system captures provenance. For systems that do not have detailed end-to-end tracing capabilities, some black-box diagnosis techniques have been proposed, e.g., using message send/receive events to deploy black-box performance debugging [5]. Our graph analysis is related to work on graph kernels [44]. They are widely used in studying relationships between structured graphs [44]. In particular, our relabeling algorithm is based on the subtree Weisfeiler-Lehman graph kernel [42] and is a variation of the WeisfeilerLehman test of isomorphism [46]. 6 Conclusion We present a novel approach to detecting unusual behavior in programs running on PaaS clouds and demonstrate its usability via our implementation. We believe current advances in provenance capture systems open a new landscape for research in cloud computing and computer systems. Discussion Topics We assume that the provenance data we capture are trustworthy and that attackers cannot modify provenance data to mask the application’s execution trail. What should we do if this assumption does not hold in practice? Our system requires mitigation techniques to guard against nontrustworthy provenance data or detect provenance data tampering as a different form of intrusion. This problem has been explored in the literature [7, 9], and Zhou et al. [48] presented a solution to secure network provenance. Can we simply “plug-and-play” those mechanisms in our system? How do we comprehensively secure various sources of provenance used in our system? We propose that user involvement can help build a better model by allowing users to identify false-positives. What should we do to provide users with meaningful provenance information to assist their judgement? One possible solution is to apply differential provenance [10] to explain the sources of anomalies. However, differential provenance has only been applied to network provenance. How do we apply this technique to other domains? There are a variety of intrusion detection systems (IDS) for the cloud environment. Modi et al. [29] categorized them into eight different techniques, identifying both their strengths and weaknesses. FRAP is a behavioral-based detection system, but unlike other systems in this category, it uses provenance to model the behavior of an application. From what aspects does FRAP work better than other behavioral-based detection systems and than other cloud IDS’s at large? What kinds of intrusions are intrinsically hard for FRAP to detect but easy for other IDS’s? Acknowledgements We thank Daniel Margo for inspiring discussions of graph processing frameworks. This work was supported by the US National Science Foundation under grant SSI1450277 End-to-End Provenance. References [1] Apache flume. https://flume.apache.org. [2] Graphchi. https://github.com/GraphChi . [7] BATES , A. M., T IAN , D., B UTLER , K. R., AND M OYER , T. Trustworthy whole-system provenance for the linux kernel. In Usenix Security (2015), pp. 319–334. [8] B IGI , B. Using kullback-leibler distance for text categorization. In European Conference on Information Retrieval (2003), Springer, pp. 305–319. [9] B RAUN , U., S HINNAR , A., AND S ELTZER , M. I. Securing provenance. In HotSec (2008). [10] C HEN , A., W U , Y., H AEBERLEN , A., Z HOU , W., AND L OO , B. T. Differential provenance: Better network diagnostics with reference events. In Proceedings of the 14th ACM Workshop on Hot Topics in Networks (2015), ACM, p. 25. [11] C HEN , Y.-Y. M., A CCARDI , A., K ICIMAN , E., PATTERSON , D. A., F OX , A., AND B REWER , E. A. Path-based failure and evolution management. [12] D AGAN , I., L EE , L., AND P EREIRA , F. C. Similarity-based models of word cooccurrence probabilities. Machine learning 34, 1-3 (1999), 43–69. [13] E DWARDS , A., JAEGER , T., AND Z HANG , X. Runtime verification of authorization hook placement for the linux security modules framework. In Proceedings of the 9th ACM Conference on Computer and Communications Security (2002), ACM, pp. 225– 234. [14] F ENG , H. H., G IFFIN , J. T., H UANG , Y., J HA , S., L EE , W., AND M ILLER , B. P. Formalizing sensitivity in static analysis for intrusion detection. In Security and Privacy, 2004. Proceedings. 2004 IEEE Symposium on (2004), IEEE, pp. 194–208. [15] F ENG , H. H., K OLESNIKOV, O. M., F OGLA , P., L EE , W., AND G ONG , W. Anomaly detection using call stack information. In Security and Privacy, 2003. Proceedings. 2003 Symposium on (2003), IEEE, pp. 62–75. [16] F ORREST, S., H OFMEYR , S. A., S OMAYAJI , A., AND L ONGSTAFF , T. A. A sense of self for unix processes. In Security and Privacy, 1996. Proceedings., 1996 IEEE Symposium on (1996), IEEE, pp. 120–128. [17] G ANAPATHY, V., JAEGER , T., AND J HA , S. Automatic placement of authorization hooks in the linux security modules framework. In Proceedings of the 12th ACM conference on Computer and communications security (2005), ACM, pp. 330–339. [18] G AZIEV, A. How ruby 2.2 can cause an out-of-memory server crash, 2015. https://evilmartians.com/chronicles/ruby-2_2-oom. [19] G REENE , T. Largest ddos attack ever delivered by botnet of hijacked iot devices, 2016. http://www.networkworld.com/article/3123672/security/largest-ddos- [3] Mqtt. http://mqtt.org. [4] Rabbitmq. https://www.rabbitmq.com . [20] H AN , X. michael-hahn/frap: v1.1.1, 2017. DOI:10.5281/zenodo.571444, https://github.com/michael-hahn/frap . [5] A GUILERA , M. K., M OGUL , J. C., W IENER , J. L., R EYNOLDS , P., AND M UTHITACHAROEN , A. Performance debugging for distributed systems of black boxes. ACM SIGOPS Operating Systems Review 37, 5 (2003), 74–89. [21] H OFMEYR , S. A., F ORREST, S., AND S OMAYAJI , A. Intrusion detection using sequences of system calls. Journal of computer security 6, 3 (1998), 151–180. [6] BARHAM , P., D ONNELLY, A., I SAACS , R., AND M ORTIER , R. Using magpie for request extraction and workload modelling. In OSDI (2004), vol. 4, pp. 18–18. [22] JAEGER , T., E DWARDS , A., AND Z HANG , X. Consistency analysis of authorization hook placement in the linux security modules framework. ACM Transactions on Information and System Security (TISSEC) 7, 2 (2004), 175–205. [23] J OLLIFFE , I. Principal component analysis. Wiley Online Library, 2002. [24] K EMENY, J. G., S NELL , J. L., ET AL . Finite markov chains, vol. 356. van Nostrand Princeton, NJ, 1960. [25] K ULLBACK , S., AND L EIBLER , R. A. On information and sufficiency. The annals of mathematical statistics 22, 1 (1951), 79–86. [26] K YROLA , A., B LELLOCH , G. E., G UESTRIN , C., ET AL . Graphchi: Large-scale graph computation on just a pc. In OSDI (2012), vol. 12, pp. 31–46. [27] M ARICONTI , E., O NWUZURIKE , L., A NDRIOTIS , P., D E C RISTOFARO , E., ROSS , G., AND S TRINGHINI , G. Mamadroid: Detecting android malware by building markov chains of behavioral models. arXiv preprint arXiv:1612.04433 (2016). [40] S EKAR , R., B ENDRE , M., D HURJATI , D., AND B OLLINENI , P. A fast automaton-based method for detecting anomalous program behaviors. In Security and Privacy, 2001. S&P 2001. Proceedings. 2001 IEEE Symposium on (2001), IEEE, pp. 144–155. [41] S HARIF, M., S INGH , K., G IFFIN , J., AND L EE , W. Understanding precision in host based intrusion detection. In International Workshop on Recent Advances in Intrusion Detection (2007), Springer, pp. 21–41. [42] S HERVASHIDZE , N., S CHWEITZER , P., L EEUWEN , E. J. V., M EHLHORN , K., AND B ORGWARDT, K. M. Weisfeiler-lehman graph kernels. Journal of Machine Learning Research 12, Sep (2011), 2539–2561. [43] S OMAYAJI , A. B. Operating system stability and security through process homeostasis. PhD thesis, The University of New Mexico, 2002. [28] M ARKO , K. Cloud-first application plat[44] V ISHWANATHAN , S. V. N., S CHRAUDOLPH , N. N., K ONDOR , forms ? paas tools to watch in 2017, 2016. R., AND B ORGWARDT, K. M. Graph kernels. Journal of Mahttp://diginomica.com/2016/12/30/cloud-first-application-platforms-paas-tools-watch-2017/ . chine Learning Research 11, Apr (2010), 1201–1242. [29] M ODI , C., PATEL , D., B ORISANIYA , B., PATEL , H., PATEL , A., AND R AJARAJAN , M. A survey of intrusion detection techniques in cloud. Journal of Network and Computer Applications 36, 1 (2013), 42–57. [45] WAGSTAFF , K., C ARDIE , C., ROGERS , S., S CHR ÖDL , S., ET AL . Constrained k-means clustering with background knowledge. In ICML (2001), vol. 1, pp. 577–584. [30] M ORI , R. D. Spoken dialogues with computers. Academic Press, Inc., 1997. [46] W EISFEILER , B. J., AND L EMAN , A. A reduction of a graph to a canonical form and an algebra arising during this reduction, nauchno–technicheskaja informatsia, 9 (1968), 12–16. [31] M UNISWAMY-R EDDY, K.-K., H OLLAND , D. A., B RAUN , U., AND S ELTZER , M. I. Provenance-aware storage systems. In USENIX Annual Technical Conference, General Track (2006), pp. 43–56. [32] N IKULIN , M. S. Hellinger distance. Encyclopedia of Mathematics (2001). [33] PASQUIER , T. Camflow/camflowdev, 2017. DOI:10.5281/zenodo.571427, https://github.com/CamFlow/camflow-dev. [34] PASQUIER , T. F.-M., S INGH , J., BACON , J., AND E YERS , D. Information flow audit for paas clouds. In Cloud Engineering (IC2E), 2016 IEEE International Conference on (2016), IEEE, pp. 42–51. [35] P OHLY, D. J., M C L AUGHLIN , S., M C D ANIEL , P., AND B UTLER , K. Hi-fi: collecting high-fidelity whole-system provenance. In Proceedings of the 28th Annual Computer Security Applications Conference (2012), ACM, pp. 259–268. [47] X U , K., T IAN , K., YAO , D., AND RYDER , B. G. A sharper sense of self: Probabilistic reasoning of program behaviors for anomaly detection with context sensitivity. In Dependable Systems and Networks (DSN), 2016 46th Annual IEEE/IFIP International Conference on (2016), IEEE, pp. 467–478. [48] Z HOU , W., F EI , Q., N ARAYAN , A., H AEBERLEN , A., L OO , B. T., AND S HERR , M. Secure network provenance. In Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles (2011), ACM, pp. 295–310. A Availability The work presented in this paper is open-source and available for download at https://github.com/michael-hahn/frap [36] R ESEARCH , Z. M. Global public cloud platform as a service (paas) market worth usd 9.12 billion by 2021 - zion market research, 2016. https://globenewswire.com/news-release/2016/09/26/874593/0/en/Global-Public-Cloud-Platform-as-a-Service-PaaS-Market-worth-U [37] R EYNOLDS , P., K ILLIAN , C. E., W IENER , J. L., M OGUL , J. C., S HAH , M. A., AND VAHDAT, A. Pip: Detecting the unexpected in distributed systems. In NSDI (2006), vol. 6, pp. 115– 128. [38] R IGHT S CALE. Largest ddos attack ever delivered by botnet of hijacked iot devices, 2017. http://assets.rightscale.com/uploads/pdfs/RightScale-2017-State-of-the-Cloud-Report.pdf. [39] S AMBASIVAN , R. R., Z HENG , A. X., D E ROSA , M., K REVAT, E., W HITMAN , S., S TROUCKEN , M., WANG , W., X U , L., AND G ANGER , G. R. Diagnosing performance changes by comparing request flows. In NSDI (2011), pp. 43–56.
3cs.SY
Thick, syndetic, and piecewise syndetic subsets of Fraı̈ssé structures arXiv:1608.04286v2 [math.DS] 20 Mar 2017 Andy Zucker March 21, 2017 Abstract We define and undertake a systematic study of thick, syndetic, and piecewise syndetic subsets of a Fraı̈ssé structure. Each of these collections forms a family in the sense of Akin and Glasner [AG], and we define and study ultrafilters on each of these families, paying special attention to ultrafilters on the thick sets. In the process, we generalize many results of Bergelson, Hindman, and McCutcheon [BHM]. We also discuss some abstract questions about families implicit in the work of Akin and Glasner. 1 Introduction Let G be a discrete group, and let Fin(G) denote the finite subsets of G. Recall the following definitions (see either [BHM] or [HS]). Definition 1.1. • T ⊆ G is thick if for every E ∈ Fin(G), there is g ∈ G with gE ⊆ T ; equivalently, T is thick if the collection {T g −1 : g ∈ G} has the finite intersection property, • S⊆G if G \ S is not thick; equivalently, S is syndetic if there is E ∈ Fin(G) Sis syndetic −1 with g∈E Sg = G, S • P ⊆ G is piecewise syndetic if there is E ∈ Fin(G) with g∈E P g −1 thick. Note the left-right switch from the definitions found in [BHM] or [HS]; the reasons for this switch will be explained later. There are several equivalent formulations of these definitions. One such formulation uses the space 2G , which we identify with the space of subsets of G. G acts on 2G by right shift, i.e. for χA ∈ 2G and g, h ∈ G, we have χA · g(h) = χA (gh). We now have the following equivalent characterizations. 2010 Mathematics Subject Classification. Primary: 37B05; Secondary: 03C15, 03E15, 05D10, 22F50, 54D35, 54D80, 54H20. Key words and phrases. Fraı̈ssé theory, topological dynamics, ultrafilters, topological semigroups. The author was partially supported by NSF Grant no. DGE 1252522. 1 Fact 1.2. • T ⊆ G is thick iff χG ∈ χT · G, • S ⊆ G is syndetic iff χ∅ 6∈ χS · G, • P ⊆ G is piecewise syndetic iff there is syndetic S ⊆ G with χS ∈ χP · G. Another formulation uses βG, the space of ultrafilters on G. We view G as a subspace of βG by identifying g ∈ G with the principal ultrafilter containing g. To each subset A ⊆ G, we can form the clopen set A := {p ∈ βG : A ∈ p}, and these clopen sets form a basis for the topology of βG. We endow βG with the structure of a compact left-topological semigroup. Compact left-topological semigroups contain minimal right ideals which are always closed. In βG, each minimal right ideal is also a minimal (right) G-flow. We now have the following. Fact 1.3. • T ⊆ G is thick iff T ⊆ βG contains a minimal right ideal, • S ⊆ G is syndetic iff S ∩ M 6= ∅ for every minimal right ideal M ⊆ βG, • P ⊆ G is piecewise syndetic iff P ∩ M 6= ∅ for some minimal right ideal M ⊆ βG. The primary goal of this paper is to generalize these definitions and characterizations to the setting of countable first-order structures and their groups of automorphisms. We will be especially interested in ultrahomogeneous structures, structures where every isomorphism between finite substructures extends to an automorphism of the whole structure. If K is an ultrahomogeneous structure with automorphism group G, we endow G with the pointwise convergence topology. If A ⊆ K is a finite substructure, then the pointwise stabilizer GA := {g ∈ G : ∀a ∈ A(g · a = a)} is an open subgroup; these open subgroups form a neighborhood base for G at the identity. Now suppose that f : A → K is an embedding; we can identify f with the (non-empty!) set of g ∈ G which extend f . Notice that {g ∈ G : g|A = f } is a left coset of GA , and we can identify Emb(A, K) with the set of left cosets of GA . Our generalized notions of thick, syndetic, and piecewise syndetic will describe subsets of Emb(A, K). There are three difficulties worth previewing now. First, each finite substructure of K will give rise to different notions of thick, syndetic, and piecewise syndetic; we will need to understand how these different notions interact with each other. Second, note that when G is a countable discrete group, G acts on itself on both the left and the right. The right action is used in Definition 1.1, and the left action, which is needed to define the right shift action on 2G , is used in Fact 1.2. However, when G = Aut(K) and A ⊆ K is a finite substructure, there is a natural left G action on Emb(A, K), but no natural notion of right action. Third, when G = Aut(K), the space of ultrafilters on G is too fine a compactification to use. The correct compactificaton to use is the Samuel compactification of G, denoted S(G); we will need an explicit construction of S(G) to allow us to state something similar to Fact 1.3. A secondary goal of this paper will be to consider the notions of thick, syndetic, and piecewise syndetic sets as families, collections of subsets of a set X closed upwards under 2 inclusion. Families have been considered by Akin and Glasner [AG] and implicitly by Brian [B]. We will need to study the family of thick sets in some detail; along the way, we will define ultrafilters on families and address some general questions about how these ultrafilters interact with maps. 2 Background 2.1 Fraı̈ssé structures Recall that S∞ is the group of all permutations of a countable set X. Given a finite B ⊆ X, the pointwise stabilizer of B is the set NB = {g ∈ S∞ : ∀ b ∈ B (g(b) = b)}. We can endow S∞ with the pointwise convergence topology, where a basis of open sets at the identity is given by the collection {NB : B ∈ Pf in (X)}. This turns S∞ into a Polish group. Note that each NB is a clopen subgroup of S∞ . Fix now G a closed subgroup of S∞ . A convenient way to describe the G-orbits of finite tuples from X is given by the notions of a Fraı̈ssé class and structure. Definition 2.1. Let L be a relational language. A Fraı̈ssé class K is a class of L-structures with the following four properties. 1. K contains only finite structures, contains structures of arbitrarily large finite cardinality, and is closed under isomorphism. 2. K has the Hereditary Property (HP): if B ∈ K and A ⊆ B, then A ∈ K. 3. K has the Joint Embedding Property (JEP): if A, B ∈ K, then there is C which embeds both A and B. 4. K has the Amalgamation Property (AP): if A, B, C ∈ K and f : A → B and g : A → C are embeddings, there is D ∈ K and embeddings r : B → D and s : C → D with r ◦ f = s ◦ g. If D is an infinite L-structure, we write Age(D) for the class of finite L-structures which embed into D. The following is the major fact about Fraı̈ssé classes. Fact 2.2. If K is a Fraı̈ssé class, there is up to isomorphism a unique countably infinte L-structure K with Age(K) = K satisfying one of the following two equivalent conditions. 1. K is ultrahomogeneous: if f : A → B is an isomorphism between finite substructures of K, then there is an automorphims of K extending f . 2. K satisfies the Extension Property: if B ∈ K, A ⊆ B, and f : A → K is an embedding, there is an embedding h : B → K extending f . Conversely, if K is a countably infinite L-structure satisfying 1 or 2, then Age(K) is a Fraı̈ssé class. 3 Given a Fraı̈ssé class K, we write Flim(K), the Fraı̈ssé limit of K, for the unique structure K as above. We say that K is a Fraı̈ssé structure if K ∼ = Flim(K) for some Fraı̈ssé class. Our interest in Fraı̈ssé structures stems from the following result. Fact 2.3. For any Fraı̈ssé structure K, Aut(K) is isomorphic to a closed subgroup of S∞ . Conversely, every closed subgroup of S∞ is isomorphic to Aut(K) for some Fraı̈ssé structure K. Throughout the rest of the paper, fix S a Fraı̈ssé class K with Fraı̈ssé limit K. Set G = Aut(K). We also fix an exhaustion K = n An , with each An ∈ K and Am ⊆ An for m ≤ n. Write Hn = {gGn : g ∈ G}, where Gn = G ∩ NAn is the pointwise stabilizer of An ; we can identify Hn with Emb(An , K),Sthe set of embeddings of An into K. Note that under this identification, we have Hn = N ≥n Emb(An , AN ). For g ∈ G, we often write g|n for gGn , and we write in for Gn . The group G acts on Hn on the left; if x ∈ Hn and g ∈ G, we have g · x = g ◦ x. For m ≤ n, we let inm ∈ Emb(Am , An ) be the inclusion embedding. Each f ∈ Emb(Am , An ) gives rise to a dual map fˆ : Hn → Hm given by fˆ(x) = x ◦ f . Proposition 2.4. 1. For f ∈ Emb(Am , An ), the dual map fˆ : Hn → Hm is surjective. 2. For every f ∈ Emb(Am , An ), there is N ≥ n and h ∈ Emb(An , AN ) with h ◦ f = iN m. Proof. Item 1 is an immediate consequence of the extension property. For item 2, use ultrahomogeneity to find g ∈ G with g ◦ f = im . Let N ≥ n be large enough so that ran(g|n ) ⊆ AN , and set h = g|n . 2.2 Topological dynamics and the Samuel compactification We now want to investigate the dynamical properties of the group G. Though many of the following definitions and facts hold for more general topological groups, we will only consider the case G = Aut(K). A G-flow is a compact Hausdorff space X equipped with a continuous right G-action a : X × G → X. We suppress the action a by writing a(x, g) = x · g. If X is a G-flow, a subflow Y ⊆ X is a closed subspace which is G-invariant. The G-flow X is minimal if it contains no proper subflow; equivalently, X is minimal iff every orbit is dense. By Zorn’s lemma, every G-flow contains a minimal subflow. Given two G-flows X and Y , a G-map f is a continuous map f : X → Y satisfying f (x · g) = f (x) · g for every g ∈ G. A G-flow X is universal if for every minimal G-flow Y , there is a G-map f : X → Y . The following is an important fact of topological dynamics. Fact 2.5. There is up to G-flow isomorphism a unique G-flow M (G) which is both universal and minimal. We call M (G) the universal minimal flow of M (G). Any G-map from M (G) to M (G) is an isomorphism. One way of exhibiting the universal minimal flow is to consider the closely related notion of an ambit. A G-ambit is a pair (X, x0 ) with X a G-flow and x0 ∈ X a distinguished 4 point with dense orbit. If (X, x0 ) and (Y, y0 ) are G-ambits, a map of ambits f is a G-map f : X → Y with f (x0 ) = y0 . Note that there is at most one map of ambits from (X, x0 ) to (Y, y0 ), and such a map is always surjective. Fact 2.6. There is up to G-ambit isomorphism a unique G-ambit (S(G), 1) which admits a map of G-ambits onto every other G-ambit. We call (S(G), 1) the greatest G-ambit. The space S(G) is the Samuel compactification of G. Now suppose M ⊆ S(G) is a subflow. If Y is any minimal G-flow, pick any y0 ∈ Y and form the ambit (Y, y0 ). Let f : S(G) → Y be the unique map of ambits. Then f |M is a G-map. It follows that M ∼ = M (G). We now proceed with an explicit construction of S(G). Let f ∈ Emb(Am , An ). The dual map fˆ extends to a continuous map f˜ : βHn → βHm , where for a discrete space X, βX is the space of ultrafilters on X. If p ∈ βHn and f ∈ Emb(Am , An ), we will sometimes write p · f for f˜(p). Form the inverse limit lim βHn along the maps ı̃nm . We can identify G with a ←− dense subspace of lim βHn by associating to each g ∈ G the sequence of ultrafilters principal ←− on g|n . The space lim βHn turns out to be the Samuel compactification S(G) (see Corollary ←− 3.3 in [P]). To see that S(G) is the greatest ambit, we need to exhibit a right G-action on S(G). This might seem unnatural at first; after all, the left G-action on each Hn extends to a left G-action on βHn , and the maps ı̃nm are all G-equivariant, giving us a left G-action on S(G). Indeed, let Gd be the group G with the discrete topology; then the map πm : Gd → Hm given by πm (g) = gGm extends to a continuous map π̃m : βGd → Hm . As πm = ı̃nm ◦ πn for n ≥ m, we obtain a map π : βGd → S(G), and the left action just described on S(G) makes π G-equivariant, where βGd is given its standard left G-action. The problem is that the left action is not continuous when G is given its Polish topology. However, βGd also comes with a natural right G-action, and there is a unique way to equip S(G) with a right G-action to make the map π equivariant. This right G-action on S(G) is continuous. For α ∈ lim βHn , ←− g ∈ G, m ∈ N, and S ⊆ Hm , we have S ∈ αg(m) ⇔ {x ∈ Hn : x ◦ g|m ∈ S} ∈ α(n) where n ≥ m is large enough so that ran(g|m ) ⊆ An . Notice that if g|m = h|m = f , then αg(m) = αh(m) := α · f := λαm (f ). By distinguishing the point 1 ∈ lim βHn with ←− 1(m) principal on im , we endow S(G) with the structure of a G-ambit, and (S(G), 1) is the greatest ambit (see Theorem 6.3 in [Z]). Using the universal property of the greatest ambit, we can define a left-topological semigroup structure on S(G): Given α and γ in lim βHn , m ∈ N, and S ⊆ Hm , we have ←− S ∈ αγ(m) ⇔ {f ∈ Hm : S ∈ α · f } ∈ γ(m). If α ∈ S(G) and S ⊆ Hm , a useful shorthand is to put α−1 (S) = {f ∈ Hm : S ∈ α · f }. Then the semigroup multiplication can be written as S ∈ αγ(m) iff α−1 (S) ∈ γ(m). Notice that for fixed α, αγ(m) depends only on γ(m); indeed, if α ∈ lim βHn , p ∈ βHm , and ←− S ⊆ Hm , we have S ∈ α · p iff α−1 (S) ∈ p. In fact, α · p = λ̃αm (p), where the map λ̃αm is the continuous extention of λαm to βHm . 5 By continuity of left-multiplication, subflows of the G-flow lim βHn are exactly the closed ←− right ideals of the semigroup lim βHn . ←− Recall that if S is a semigroup, then u ∈ S is an idempotent if u · u = u. Fact 2.7. In compact left-topological semigroups, minimal right ideals exist, are always compact, and always contain idempotents. If Y, Y 0 ⊆ lim βHn are minimal right ideals, then ←− any G-map ϕ : Y → Y 0 is of the form ϕ(y) = αy for some α ∈ Y 0 , and each such G-map is an isomorphism. Furthermore, write Y = lim Yn , Y 0 = lim Yn0 , with Ym and Ym0 compact subsets of βHm . ←− ←− Given α ∈ Y 0 as above, we note that since αy(m) depends only on y(m), the isomorphism ϕ gives rise to homeomorphisms ϕm : Ym → Ym0 satisfying ı̃nm ◦ ϕn = ϕm ◦ ı̃nm for n ≥ m. Some quick remarks about notation are in order. Given f ∈ Emb(Am , An ) and S ⊆ Hm , we will often want to consider the set (fˆ)−1 (S); instead of “dualling twice,” we instead write f (S). Note that if x ∈ Emb(An , AN ), then we have x(f (S)) = (x ◦ f )(S), so this notation is justified. We also remark that whenever we write lim Ym for Ym ⊆ Hm closed, we are ←− implicitly assuming that ı̃nm (Yn ) = Ym . 3 The family of thick sets If X is an infinite set, a family S on X, or just (X, S), is a non-trivial collection of subsets of X closed upwards under inclusion. By non-trivial, we demand that X ∈ S and ∅ 6∈ S. An S-filter F on X is any filter F on X with F ⊆ S. An S-ultrafilter is any maximal S-filter. By Zorn, any S-filter can be extended to some S-ultrafilter. Write β(S) for the collection of S-ultrafilters. We borrow the term family from Akin and Glasner [AG], and the definition of an S-filter is implicit in [B]. If (X, S) is a family and f : X → Y is a map, we can push forward the family S to the family f (S) := {B ⊆ Y : f −1 (B) ∈ S}. In a similar way, any S-filter F pushes forward to an f (S)-filter f (F). We call a map f : (X, S) → Y strong if f −1 (f (A)) 6∈ S whenever A 6∈ S; we call f regular if f (β(S)) ⊆ β(f (S)), i.e. if the push forward of any S-ultrafilter is an f (S)-ultrafilter. Note that we always have β(f (S)) ⊆ f (β(S)), since given q ∈ β(f (S)), any p ∈ β(S) extending the S-filter generated by {f −1 (B) : B ∈ q} will satisfy f (p) = q. Here is a quick proposition to give some intuition about the definitions. Proposition 3.1. Any strong map is also regular. Proof. Suppose f : (X, S) → Y is strong, and let p ∈ β(S). To show f (p) ∈ β(f (S)), let B ⊆ Y with B ∈ f (S) \ f (p). Then f −1 (B) ∈ S \ p. As p ∈ β(S), there must be A ∈ p with A ∩ f −1 (B) 6∈ S. As f is strong, we have f (A ∩ f −1 (B)) = f (A) ∩ B 6∈ f (S). As f (A) ∈ f (p), we have shown that f (p) ∈ β(f (S)). We will be interested in studying the family Tm of thick subsets of Hm , and in particular understanding the members of β(Tm ). Our definitions of thick, syndetic, and piecewise syndetic will most closely follow the second set of definitions from the introduction. Indeed, since G acts on the left on Hm , this induces a right shift action on 2Hm 6 Definition 3.2. • T ⊆ Hm is thick iff χHm ∈ χT · G, • S ⊆ Hm is syndetic iff χ∅ 6∈ χS · G, • P ⊆ Hm is piecewise syndetic iff there is syndetic S ⊆ Hm with χS ∈ χP · G. Each of these notions is upwards closed, so forms a family. Write Sm and Pm for the families of syndetic and piecewise syndetic subsets of Hm , respectively. Note that T ⊆ Hm is thick iff Hm \ T is not syndetic, and vice versa. Let us briefly return to the setting of the introduction, where G is a discrete group. Definition 1.1 uses the right G-action on itself; given T ⊆ G, we need the right action to describe the sets T g −1 for g ∈ G. But the definition of “thick” given there also includes a more combinatorial characterization, where T is thick iff for every E ∈ Fin(G), there is g ∈ G with gE ⊆ T . When G = Z for instance, this amounts to saying that thick subsets of the integers are exactly those subsets containing arbitrarily long intervals. Since this characterization uses the left G-action on itself, we can hope to generalize it. We now return to the normal setting of the paper, where G = Aut(K). Proposition 3.3. T ⊆ Hm is thick iff for every n ≥ m, there is x ∈ Hn with x ◦ Emb(Am , An ) ⊆ T . Proof. Suppose T ⊆ Hm is thick, and let gn ∈ G be a sequence of group elements with χT · gn → χHm . By passing to a subsequence, we may assume that for each n ≥ m, we have χT · gn (f ) = 1 for every f ∈ Emb(Am , An ). It follows that gn |n ◦ Emb(Am , An ) ⊆ T . Conversely, suppose T ⊆ Hm is a set so that for every n ≥ m, there is xn ∈ Hn with xn ◦ Emb(Am , An ) ⊆ T . Find gn ∈ G with gn |n = xn . Then χ· gn → χHm , and T is thick. ~ = {xn : n < ω} with each xn ∈ Hn an exhausting sequence. Writing Call a sequence X S ~ := Emb(Am , X) n≥m (xn ◦ Emb(Am , An )), we can say that T ⊆ Hm is thick iff there is an ~ ⊆ T. exhausting sequence with Emb(Am , X) We now want something akin to the third set of definitions from the introduction. Before we can attempt a generalization, we need to understand how the thick families on different levels interact. The following proposition is implicit in section 4 of [Z] (see Lemma 4.2). Proposition 3.4. For any f ∈ Emb(Am , An ), we have that fˆ(Tn ) = Tm . Proof. We need to show that T ⊆ Hm is thick iff f (T ) ⊆ Hn is thick. Assume first that T is ~ is an exhausting sequence with Emb(Am , X) ~ ⊆ T . Then Emb(An , X) ~ ⊆ f (T ) thick and X ~ ~ (since Emb(An , X) ◦ f ⊆ Emb(Am , X)). ~ is an exhausting sequence with For the other direction, suppose f (T ) is thick and X ~ ⊆ f (T ). For each N ≥ m, find `N ≥ N large enough so that for each h ∈ Emb(An , X) Emb(Am , AN ), there is xh ∈ Emb(An , A`N ) with xh ◦ f = h. Let Y~ be the exhausing sequence given by yN = x`N ◦ i`NN . Then Emb(Am , Y~ ) ⊆ T . 7 A consequence of Proposition 3.4 is that for n ≥ m, f ∈ Emb(Am , An ), and F a Tn -filter on Hn , we have that fˆ(F ) is a Tm -filter on Hm . This will be especially important when f = inm . If T ⊆ Hm , set T = {p ∈ βHm : T ∈ p}, and set T̃ = {α ∈ lim βHn : T ∈ α(m)}. If ←− Ym ⊆ βHm T is closed, then the filter of clopen neighborhoods of Ym is the filter Fm on Hm so that Ym = T ∈Fm T . Conversely, if Fm is a filter on Hm , then the closed set for Fm is the T set T ∈Fm T . The following two theorems are the key to generalizing Fact 1.3 Theorem 3.5. Let Y = lim Yn ⊆ lim βHn = S(G) be compact, with Ym ⊆ βHm for m ∈ N. ←− ←− Let Fm be the filter of clopen neighborhoods of Ym . Then Y is a minimal right ideal iff each Fm is a member of β(Tm ). Theorem 3.6. If f ∈ Emb(Am , An ), then fˆ : (Hn , Tn ) → Hm is regular, As a consequence of both Theorems 3.5 and 3.6, notice that if Fm ∈ β(Tm ), then there is a minimal right ideal Y = lim Ym ⊆ S(G) with Fm the filter of clopen neighborhoods of Ym . ←− In particular, since every thick T ⊆ Hm belongs to some F ∈ β(Tm ), we have the following corollary, a generalization of Theorem 2.9(d) from [BHM]. Corollary 3.7. T ⊆ Hm is thick iff T̃ ⊆ S(G) contains a minimal right ideal. The first step is to characterize right ideals of lim βHn . The following is a generalization ←− of Theorem 8.7 from [Z]. Proposition 3.8. Let Y = lim Yn ⊆ lim βHn be compact, with Ym ⊆ βHm for m ∈ N. Let ←− ←− Fm be the filter of clopen neighborhoods of Ym . Then Y contains a right ideal iff each Fm is a Tm -filter. Proof. First assume that each Ym is thick. For W ⊆ G finite, m ∈ N, and S ∈ Fm , let YW,S consist of those α ∈ Y such that S ∈ αg(m) for each g ∈ W . Notice that YW,S ⊆ Y is closed, hence compact. Claim. First, let us show that YW,S is nonempty. Fix n large enough so that g(Am ) ⊆ An for each g ∈ W∪ {1G }. For  g ∈ G, set Tg = {f ∈ Hn : f ◦ g|m ∈ S}. We will show that the T set X := T1G \ g∈W Tg is not thick. If it were, pick N large enough so that g(An ) ⊆ AN for each g ∈ W ∪ {1G } and find h ∈ HN so that h ◦ Emb(An , AN ) ⊆ X. But now for each N g ∈ W , set xg = h ◦ g|n ◦ inm = h ◦ iN n ◦ g|m . Since g|n and in are both in Emb(An , AN ), we N have h ◦ g| Tn and h ◦ in in X. Since h ◦ g|n ∈ X ⊆ T1G , we have xg ∈ S. But this implies that N h ◦ in ∈ g∈W Tg , a contradiction. T Since Fn ∈ Tn and since T1G = inm (S) ∈ Yn , this means that ( g∈W ∪{1G } Tg ) ∈ p for some p ∈ Yn . Now any α ∈ Y with α(n) = p is a member of YW,S . This proves the claim. Now observe that if W1 , W2 are finite subsets of G, S1 ∈ Fm , and S2 ∈ Fn (m ≤ n), then letting S3 = inm (S1 ) ∩ S2 ∈ Fn , we have YW1 ,S1 ∩ YW2 ,S2 ⊇ YW1 ∪W2 ,S3 . In particular, since each YW,S is compact, there is α ∈ Y a member of all of them. Hence α · G ⊆ Y is a subflow of lim βHn . ←− For the other direction, suppose there were S ∈ Fm with S 6∈ Tm . Pick α ∈ Y ; we need to show that for some g ∈ G, S 6∈ αg(m). To the contrary, suppose that S ∈ αg(m) for 8 every g ∈ G, or equivalently, that S ∈ α · f for every f ∈ Hm . But then {x ∈ Hn : x ◦ f ∈ S for every f ∈ Emb(Am , An )} ∈ α(n), so in particular is non-empty. But this implies that S is thick, a contradiction. Before proving Theorem 3.5, we need a quick remark about topological dynamics. If X is a G-flow, then each point x ∈ X gives rise to the ambit (x · G, x). As such, there is a map of ambits ϕ : (S(G), 1) → (x · G, x), and we write ϕ(α) := x · α. Since ϕ is surjective, we have x · S(G) = x · G. If α, γ ∈ S(G), we also have x · (αγ) = (x · α) · γ. Now suppose that X = 2Hm , and T ⊆ Hm . Then if α ∈ S(G), we have χT · α = χα−1 (T ) . Proof of Theorem 3.5. (⇐) We prove a slightly stronger statement. Suppose Y = lim Yn is a closed subset of ←− lim βHn with Fm the filter of clopen neighborhoods of Ym . Say that for infinitely many ←− m ∈ N, we have Fm ∈ β(Tm ). By Proposition 3.4, we see that for every m ∈ N, Fm is a Tm -filter, so by Proposition 3.8, Y contains some right ideal. If Z = lim Zn ( Y is any ←− proper closed subset, then Zm ( Ym for any large enough m ∈ N. So fix a large m ∈ N with Fm ∈ β(Tm ). The filter Gm of clopen neighborhoods of Zm then properly contains Fm and thus cannot be in Tm . Hence Z is not a right ideal, so Y is a minimal right ideal. (⇒) If α ∈ lim βHn , then the left-multiplication map p → α · p on βHm is continuous. ←− Hence if X ⊆ βHm is a closed subset defined by the filter F , αX ⊆ βHm is also closed. It is defined by the filter αF := {S ⊆ Hm : α−1 (S) ∈ F }. Now suppose that F is a Tm -filter. Then for any α ∈ lim βHn , αF is also a Tm -filter. This ←− is because α−1 (S) ∈ Tm implies that for some α0 ∈ lim βHn , we have χS · αα0 = χHm . But ←− this implies that S ∈ Tm . Let Y = lim Ym be a minimal right ideal, with Fm the filter of clopen neighborhoods of ←− Ym . Suppose for sake of contradiction that for some m ∈ N, Fm 6∈ β(Tm ). Say Gm ) Fm with Gm ∈ β(Tm ). Inductively define for each n ≥ m Gn ∈ β(Tn ) so that Gn+1 is any Tn+1 -ultrafilter with ı̂n+1 n (Gn+1 ) = Gn . If Zm ⊆ βHm is the closed set for Gm , then by the proof of the right to left implication, lim Zn is a minimal right ideal. Fix α ∈ Z, and consider ←− αGm . As the left-multiplication map p → α · p is a homeomorphism from Ym to Zm , we have α(Zm ) ( Zm , so αGm ) Gm . However, αGm is a Tm -filter, and Gm is maximal. Taken together, this is a contradiction. We now turn to the proof of Theorem 3.6. First an easy lemma. Lemma 3.9. If f : (X, S) → Z is a regular map, and f = g ◦ h, with h : X → Y and g : Y → Z, then g : (Y, h(S)) → Z is regular. Proof. Let q ∈ β(h(S)), and set r = g(q). Pick p ∈ β(S) with h(p) = q. Then f (p) = r, so r ∈ β(f (S)) = β(g(h(S))). Proof of Theorem 3.6. By Proposition 2.4 and Lemma 3.9, it is enough to show that each ı̂nm is regular. Say Fn ∈ β(Tn ). Inductively define FN ∈ β(TN ) for each N ≥ n so that ı̂N N +1 (FN +1 ) = FN ; 9 letting Yn ⊆ βHn be the closed set for Fn , we have seen that lim Yn is a minimal right ideal. ←− It follows that Fm = ı̂nm (Fn ) is in β(Tm ). We end this section with a brief “sanity check.” Recall from section 2 the map πm : Gd → Hm with πm (g) = g|m . −1 Theorem 3.10. T ⊆ Hm is thick iff πm (T ) ⊆ Gd is thick. Proof. Say T ⊆ Hm is thick. Let g1 , ..., gk ∈ Gd . Write fi = πm (gi ), and find n ≥ m so that for each i ≤ k, we have fi ∈ Emb(Am , An ). By Proposition 3.3, there is x ∈ Hn with x ◦ Emb(A n ) ⊆ T . Find g ∈ Gd with g|n = x. Then for each i ≤ k, we have (ggi )|m ∈ T , T m, A −1 −1 so g ∈ i≤k πm (T )gi−1 6= ∅, and πm (T ) is thick. Conversely, say T is not thick, so that S := Hm \ T is syndetic. By Proposition 3.3, this means that there is n ≥ m so that for every x ∈ Hn , we have S ∩ (x ◦ Emb(Am , An )) 6= ∅. Let Emb(Am , An ) = {f1 , ..., fk }, and find g1 , ..., gk ∈ Gd with πmS(gi ) = fi . Fix g ∈ Gd . −1 Then for some i ≤ k, we have (ggi )|m ∈ S. But this implies that i≤k πm (S)gi−1 = Gd , so −1 −1 πm (T ) = Gd \ πm (S) is not thick. 4 Piecewise syndetic sets In the previous section, we successfully proved analogues of Definition 1.1 and Fact 1.3 for thick subsets of Hm using a definition resembling Fact 1.2. It easily follows that these analogues also hold for syndetic subsets of Hm , in turn providing a generalization of Theorem 2.9(c) from [BHM]. However, we can not yet conclude that these analogues hold for piecewise syndetic sets. Let’s briefly consider what this even means. As we have pointed out before, there is no right action on the set Hm , so it is not immediate what an analogue of Definition 1.1 even looks like for piecewise syndetic sets. Theorem 3.10 suggests the following statement. −1 Theorem 4.1. P ⊆ Hm is piecewise syndetic iff πm (P ) ⊆ Gd is piecewise syndetic. Proof. The surjection πm : Gd → Hm induces a continuous embedding π̂m : 2Hm → 2Gd , −1 where given S ⊆ Hm , we have π̂m (χS ) = χπm (S) . The group Gd acts on the right on both spaces, and the map π̂m is Gd -equivariant. The statements from Definition 3.2 do not depend on the topology of G, so also hold for Gd . Suppose P ⊆ Hm is piecewise syndetic, and let S ⊆ Hm be syndetic with χS ∈ χP · Gd . −1 −1 −1 Then χπm (S) ∈ χπm (P ) · Gd , and πm (S) ⊆ Gd is syndetic by Theorem 3.10. It follows that −1 πm (P ) is piecewise syndetic. −1 Conversely, suppose P ⊆ Hm is a set with πm (P ) ⊆ Gd piecewise syndetic. Then there Hm −1 is syndetic W ⊆ Gd with W ∈ χπm is compact, we must have that (P ) · Gd . But since 2 −1 W = πm (S) for some S ⊆ Hm , and this S is syndetic by Theorem 3.10. It follows that P is piecewise syndetic. Let us briefly return to the setting where G is a discrete group. It is a fact that P ⊆ G is piecewise syndetic iff P = S ∩ T for some syndetic S ⊆ G and thick T ⊆ G. Let us recall 10 one direction of the proof. Say P ⊆ G is piecewise syndetic, and let g1 , ..., gk ∈ G with T := P g1−1 ∪ · · · ∪ P gk−1 thick; we may assume that k is minimal and that g1 = 1G (if T is thick, then so is T g1 ). Then setting S = (G \ T ) ∪ P , we have that S is syndetic (since Sg1−1 ∪ · · · ∪ Sgk−1 = G) and that P = S ∩ T . Notice that T \ P ⊆ G \ S is not thick. Returning to the setting where G = Aut(K), we can ask whether these statements also hold for Hm . Given a thick T ⊆ Hm , set Dest(T ) = {P ⊆ Hm : T \ P is not thick}; if P ∈ Dest(T ), we say that P destroys T . The main theorems of this section are the following, generalizing Theorem 2.4 from [BHM]: Theorem 4.2. P ⊆ Hm is piecewise syndetic iff P ∈ Dest(T ) for some thick T ⊆ Hm . Theorem 4.3. P ⊆ Hm is piecewise syndetic iff there are thick T ⊆ Hm and syndetic S ⊆ Hm with P = S ∩ T . Let us remark that Theorems 4.2 and 4.3 are not corollaries of Theorem 4.1. The best we −1 (S)g −1 = πn−1 (g|m (S)) for n ≥ m can do is to note that given S ⊆ Hm and g ∈ G, we have πm large enough with g|m (Am ) ⊆ An . Then using Theorem 4.1, we can say that if P ⊆ Hm is piecewise syndetic, there is some n ≥ m and some thick T ⊆ Hn with inm (P ) ∈ Dest(T ). However, it is not immediately clear that we can take n = m. In the preprint [Z1], it is mistakenly asserted (see the discussion at the end of page 23) that Theorem 4.2 is somehow obvious. So while the result is true, the proof is a bit more difficult. Let us start by obtaining a more combinatorial characterization of piecewise syndetic sets. The proof is similar to the proof of Proposition 3.3. Proposition 4.4. P ⊆ Hm is piecewise syndetic iff there is n ≥ m and an exhausting ~ = {xN : N < ω} so that for every x ∈ Emb(An , X), ~ we have sequence X P ∩ (x ◦ Emb(Am , An )) 6= ∅. Proof. Suppose P ⊆ Hm is piecewise syndetic. Find gN ∈ G a sequence of group elements so that χP · gN → χS for some syndetic S ⊆ Hm . We may assume that χP · gN (f ) = χS (f ) for every f ∈ Emb(Am , AN ). Since S is syndetic, there is some n ≥ m with S ∩ (x ◦ Emb(Am , An )) 6= ∅ for every x ∈ Hn . Setting xN = gN |N , it follows that the conclusion holds. Conversely, suppose P ⊆ Hm is a set with the property described by the proposition. Find gN ∈ G with gN |N = xN . Pass to a subsequence so that χP · gN |N → χS for some S ⊆ Hm . This S has the property that S ∩ x ◦ Emb(Am , An ) 6= ∅ for every x ∈ Hn , so S is syndetic, and P is therefore piecewise syndetic. Recall that Pm is the collection of piecewise syndetic subsets of Hm . Given a set X and a family S on X, we say that S is partition regular if given S ∈ S, then whenever we write S = S1 ∪ S2 , some Si ∈ S. Theorem 4.5. Pm is partition regular. Proof. Let P = P1 ∪ P2 be piecewise syndetic; using Proposition 4.4, say this is witnessed by n ∈ N and (xN )N ≥n , xN ∈ HN . If P1 is not piecewise syndetic, then for each n0 ∈ N, there are N ∈ N and yn0 ∈ xN ◦ Emb(An0 , An ) with P1 ∩ (yn0 ◦ Emb(Am , An0 )) = ∅. But now we see that n ∈ N and (yn0 )n0 ≥n witness that P2 is piecewise syndetic. 11 Write Nm := P(Hm ) \ Pm for the collection of not-piecewise-syndetic subsets of Hm . We have just proven that Nm is an ideal. There is another natural ideal one could consider on Hm : Im := {A ⊆ Hm : ∀ T ∈ Tm (T \ A ∈ Tm )}. In other words, members of Im are exactly those sets which do not destroy any thick set. We will eventually see that Nm = Im , and we will use this to prove Theorems 4.2 and 4.3. Proposition 4.6. Nm ⊆ Im . Proof. Let W ∈ Nm , and fix T ∈ Tm . Find for each N ≥ m an xN ∈ HN so that xN ◦ Emb(Am , AN ) ⊆ T . As W is not piecewise syndetic, we can find for each n ≥ m an N ≥Sn and a yn ∈ xN ◦ Emb(An , AN ) with W ∩ (y ◦ Emb(Am , An )) = ∅. But now set U = n yn ◦ Emb(Am , AN ). We see that U is thick and U ⊆ T \ W . To prove the other inclusion, we need a characterization of piecewise syndetic sets similar to Fact 1.3. Call S ⊆ Hm minimal if χS · G is a minimal G-flow. Note that any non-empty minimal set is syndetic. Proposition 4.7. Let P ⊆ Hm . Then P is piecewise syndetic iff there is some minimal right ideal Y ⊆ lim βHn and some α ∈ Y with P ∈ α(m). Equivalently, P is piecewise ←− syndetic iff P̃ ⊆ S(G) meets some minimal right ideal. Proof. First, suppose there are Y and α ∈ Y as above with P ∈ α(m). Then χP · α · G is a minimal G-flow, so α−1 (P ) is a minimal set. Since im ∈ α−1 (P ), we see that α−1 (P ) is syndetic, so P is piecewise syndetic. For the converse, suppose P is piecewise syndetic, where S is syndetic and χS = χP · α, α ∈ lim βHn . By replacing α with α · γ for γ ∈ lim βHn in some minimal right ideal, we ←− ←− can assume that α is in some minimal right ideal Y . Fix g ∈ G with g|m ∈ α−1 (P ). Then P ∈ αg(m) and α · g ∈ Y . Lemma 4.8. Let Fm ∈ β(Tm ). Then for any A ∈ Im , we have Hm \ A ∈ Fm . Proof. Fix A ∈ Im , and let B = Hm \ A. Then for every T ∈ Tm , we have T ∩ B ∈ Tm . In particular, Fm ∪ {B} generates a thick filter, so by maximality of Fm we have B ∈ Fm . Theorem 4.9. Nm = Im . Proof. By Proposition 4.6, it is enough to prove Im ⊆ Nm . Suppose that P ⊆ Hm is piecewise syndetic. We need to show that P 6∈ Im . By Proposition 4.7, fix a minimal right ideal Y = lim Yn ⊆ lim βHn and an α ∈ Y with P ∈ α(m). Let Fn be the filter of clopen ←− ←− neighborhoods of Yn ; by Theorem 3.5, we have Fn ∈ β(Tn ) for each n ∈ N. But suppose P were in Im ; by Lemma 4.8, we have Hm \ P ∈ Fm , so in particular Hm \ P ∈ α(m). This is a contradiction. Note that Theorem 4.9 implies Theorem 4.2. We conclude this section with the (now short) proof of Theorem 4.3. 12 Proof of Theorem 4.3. Assume P is piecewise syndetic. As P 6∈ Im , find a thick T ⊆ Hm with T \ P not thick; we may assume P ⊆ T . So Hm \ (T \ P ) = P ∪ (Hm \ T ) := S is syndetic, and P = T ∩ S. For the other direction, say T ∈ Tm and S ∈ Sm . Then T \ T ∩ S is not thick, so T ∩ S is piecewise syndetic. Remark. The proof of Theorem 4.9 gives us the following strengthening of Corollary 4.3. If P ⊆ Hm is piecewise syndetic and P is F -positive for some F ∈ β(Tm ), then there is T ∈ F with T \ P not thick. As we may assume T ⊇ P , we have that Hm \ (T \ P ) := S is syndetic, and P = T ∩ S. 5 Questions In this final section, we collect some questions suggested by the previous results. The first question is an abstract one about families. Question 5.1. If (X, S) is a family and Y is a set, then what are necessary and sufficient conditions for ϕ : (X, S) → Y to be regular? The “map” language we have been using is somewhat misleading; whether or not a map ϕ : (X, S) → Y is regular or strong depends only on the equivalence relation Eϕ , where xEϕ x0 iff ϕ(x) = ϕ(x0 ). In particular, we can restrict our attention to the case where ϕ is surjective. When thinking about Question 5.1, it might be useful to “turn the problem around.” Fix a surjection ϕ : X → Y . If T is a family on Y , set ϕ−1 (T ) = {S : S is a family on X and ϕ(S) = T }. Two families in ϕ−1 (T ) are worth distinguishing. We set −1 ϕ−1 min (T ) = {A ⊆ X : ∃B ∈ T (ϕ (B) ⊆ A)}, ϕ−1 max (T ) = {A ⊆ X : ϕ(A) ∈ T }. −1 It is not hard to check that for any family S ∈ ϕ−1 (T ), we have ϕ−1 min (T ) ⊆ S ⊆ ϕmax (T ). Also note that ϕ : (X, S) → Y is strong iff S = ϕ−1 max (T ). When T and ϕ are understood and S ∈ ϕ−1 (T ), call S regular if the map ϕ : (X, S) → Y is regular. Proposition 5.2. S = ϕ−1 min (T ) is regular. Proof. Let p ∈ β(S). For A ⊆ X, let à denote the largest Eϕ -invariant subset of A. By our assumption that S = ϕ−1 min (T ), we have that if A ∈ p, then also à ∈ p. Suppose towards a contradiction that ϕ(p) ( q for some q ∈ β(T ). Fix B ∈ q \ ϕ(p). Then ϕ−1 (B) 6∈ p, so find A ∈ p with ϕ−1 (B) ∩ A 6∈ S. We may assume A = Ã. But now B ∩ ϕ(A) 6∈ T , a contradiction since we have B and ϕ(A) in q. Given S, S 0 ∈ ϕ−1 (T ), say that S 0 is a conservative over S if S ⊆ S 0 and for every p ∈ β(S 0 ), we have p ∩ S ∈ β(S). If S is regular and S 0 is conservative over S, then S 0 is also regular. 13 Proposition 5.3. With T and ϕ as above, S ∈ ϕ−1 (T ) is regular iff S is conservative over ϕ−1 min (T ). Proof. One direction is clear. For the other direction, suppose S is regular, and fix p ∈ β(S). −1 Towards a contradiction, suppose p ∩ ϕ−1 min (T ) ( q with q ∈ β(ϕmin (T )), and let A ∈ q \ p. We may assume A = Ã, i.e. that A is Eϕ -invariant. But we have ϕ(A) ∈ ϕ(q) = ϕ(p), so ϕ−1 (ϕ(A)) = A ∈ p, a contradiction. The next question concerns both abstract families and the families Tm of thick sets on Hm . Suppose X is a set and F , F 0 are filters on X. In a slight abuse of language, call F and F 0 disjoint if there are A ∈ F and B ∈ F 0 with A ∩ B = ∅. If S is a family on X, we say that S has disjointness if whenever p 6= q ∈ β(S), we have p and q disjoint. Question 5.4. Characterize those families S with disjointness. Suppose briefly that G is a discrete group. If T is the family of thick subsets of G, then T has disjointness. This is because the members of β(T ) are exactly the filters of clopen neighborhoods of minimal right ideals of βG, and minimal right ideals of βG are either identical or disjoint. Returning to the case that G = Aut(K), while it is still true that distinct minimal right ideals of S(G) are disjoint, this is not necessarily true on each level. So for the family Tm , Question 5.4 is equivalent to the following: Question 5.5. Let Y = lim Yn and Y 0 = lim Yn0 be distinct minimal right ideals of S(G) = ←− ←− lim βHn . If Ym 6= Ym0 , must we have Ym ∩ Ym0 = ∅? ←− The final question is specific to the families Tm , or at least to reasonably “definable” families. Theorem 4.2 guarantees that to every piecewise syndetic P ⊆ Hm , there is a thick T ⊆ Hm so that P destroys T . This question asks whether there is a ”definable” choice of T. Question 5.6. Let X = {(P, T ) ∈ 2Hm × 2Hm : T is thick and P ∈ Dest(T )}. Does X admit a Borel uniformization? In other words, is there a Borel partial function ψ : 2Hm → 2Hm with domain the piecewise syndetic sets so that ψ(P ) is thick and P destroys ψ(P )? In the setting where G is a countable discrete group, the answer to the analogous question is positive. If P is piecewise syndetic, search for a finite E = {g1 , ..., gk } ⊆ G with T := P g1 ∪ · · · ∪ P gk thick so that k is minimal. Then set ψ(P ) = T g1−1 . References [AG] E. Akin and E. Glasner, Is there a Ramsey-Hindman theorem?, preprint, http://arxiv.org/pdf/1504.00218v2.pdf, (2015). [B] W. R. Brian, P -sets and minimal right ideals in N∗ , Fund. Math. 229 (2015), 277–293. [BHM] V. Bergelson, N. Hindman, and R. McCutcheon, V. Bergelson, Notions of size and combinatorial properties of quotient sets in semigroups, Topology Proc. 23 (1998), 2360. 14 [HS] N. Hindman and D. Strauss, Algebra in the Stone-Čech Compactification, 2nd Edition, De Gruyter (2012). [P] V. Pestov, On free actions, minimal flows, and a problem by Ellis, Trans. Amer. Math. Soc., 350 (10), (1998), 4149–4165. [Z] Andy Zucker, Topological dynamics of automorphism groups, ultrafilter combinatorics, and the Generic Point Problem, Transactions of the American Mathematical Society, 368(9), (2016). [Z1] Andy Zucker, Topological dynamics of closed subgrops of S∞ , preprint, http://arxiv.org/pdf/1404.5057v2.pdf, (2014). Andy Zucker Carnegie Mellon University Pittsburgh, PA 15213 [email protected] 15
4math.GR
Deep Learning for Decoding of Linear Codes A Syndrome-Based Approach arXiv:1802.04741v1 [cs.IT] 13 Feb 2018 Amir Bennatan* , Yoni Choukroun* and Pavel Kisilev Huawei Technologies Co., Email: {amir.bennatan, yoni.choukroun, pavel.kisilev}@huawei.com Abstract— We present a novel framework for applying deep neural networks (DNN) to soft decoding of linear codes at arbitrary block lengths. Unlike other approaches, our framework allows unconstrained DNN design, enabling the free application of powerful designs that were developed in other contexts. Our method is robust to overfitting that inhibits many competing methods, which follows from the exponentially large number of codewords required for their training. We achieve this by transforming the channel output before feeding it to the network, extracting only the syndrome of the hard decisions and the channel output reliabilities. We prove analytically that this approach does not involve any intrinsic performance penalty, and guarantees the generalization of performance obtained during training. Our best results are obtained using a recurrent neural network (RNN) architecture combined with simple preprocessing by permutation. We provide simulation results that demonstrate performance that sometimes approaches that of the ordered statistics decoding (OSD) algorithm. I. I NTRODUCTION Interest in applying neural networks to decoding has existed since the 1980’s [6], [7], [8]. These early works, however, did not have a substantial impact on the field due to the limitations of the networks that were available at the time. More recently, deep neural networks were studied in [4], [5], [2]. A major challenge facing applications of deep networks to decoding is the avoidance of overfitting the codewords encountered during training. Specifically, training data is typically produced by randomly selecting codewords and simulating the channel transitions. Due to the large number of codewords (exponential in the block length), it is impossible to account for even a small fraction of them during training, leading to poor generalization of the network to new codewords. This issue was a major obstacle in [4], [5], constraining their networks to very short block lengths. Nachmani et al. [2], [3] proposed a deep learning framework which is modeled on the LDPC belief propagation (BP) decoder, and is robust to overfitting. A drawback of their design, however, is that to preserve symmetry, the design is constrained to closely mimic the message-passing structure of BP. Specifically, the connections between neurons are controlled to resemble BP’s underlying Tanner graph, as are the activations at neurons. This severely limits the freedom available to the neural networks design, and precludes the application of powerful architectures that have emerged in recent years [15]. * Both authors contributed equally to this work. In this paper, we present a method which overcomes this drawback while maintaining the resilience to overfitting of [2]. Our framework allows unconstrained neural network design, paving the way to the application of powerful neural network designs that have emerged in recent years. Central to our approach is a preprocessing step, which extracts from the channel output only the reliabilities (absolute values), and the syndrome of its hard decisions, and feeds them into the neural network. The network’s output is later combined with the channel output to produce an estimate of the transmitted codeword. Decoding methods that focus on the syndrome are well known in literature on algebraic decoding (see e.g. [12][Sec. 3.2]). The approach decouples the estimation of the channel noise from that of the transmitted codeword. In our context of deep learning, its potential lies in the elimination of the need to simulate codewords during training, thus overcoming the overfitting problem. A few early works that used shallow neural networks have employed syndromes (e.g. [6]). However, these works did not discuss its potential in terms of overfitting, presumably because the problem was not as acute in their relatively simple networks. Importantly, their approach does not apply in cases where the channel includes reliabilities (mentioned above). Our approach in this paper extends syndrome decoding to include channel reliabilities, and applies it to overcome the overfitting issue mentioned above. We provide a rigorous analysis which proves that our framework incurs no loss in optimality, in terms of bit error rate (BER) and mean square error (MSE). Our analysis utilizes some techniques developed by Burshtein et al. [14], Wiechman and Sason [13] and Richardson and Urbanke [11][Sec. 4.11]. Building on our analysis, we propose two deep neural network architectures for decoding of linear codes. The first is a vanilla multilayer network, and the second a moreelaborate recurrent neural network (RNN) based architecture. We also develop a preprocessing technique (beyond the abovementioned computation of the syndrome and reliabilities), which applies a permutation (an automorphism) to the decoder input to facilitate the operation of the neural network. This technique builds on ideas by Fossorier et al. [9], [10] and Dimnik and Be’ery [17] but does not involve list decoding. Finally, we provide simulation results for decoding of BCH codes which for the case of BCH(63,45), demonstrate performance approaches that of the ordered statistics algorithm (OSD) of [9], [10]. Summarizing, our main contributions are: 1) A novel deep neural network training framework for decoding, which is robust to overitting. It is based on the extension of syndrome decoding that is described below. 2) An extension of syndrome decoding which accounts for reliabilities. As with legacy syndrome decoding, we define a generic framework, leaving room for a noiseestimation algorithm which is specified separately. We provide analysis that proves that the framework involves no loss of optimality, and that regardless of the noiseestimation algorithm, performance is invariant to the transmitted codeword. 3) Two neural network designs for the noise-estimation algorithm, including an elaborate RNN-based architecture. 4) A simple preprocessing technique that applies permutations to boost the decoder’s performance. Our work is organized as follows. In Sec. II we introduce some notations and in Sec III we provide some bakground on neural networks. In Sec. IV we describe our syndrome-based framework and provide an analysis of it. In Sec. V we discuss deep neural network architectures as well as preprocessing by permutation. In Sec. VI we present simulation results. Sec. VII concludes the paper. II. N OTATIONS We will often use the superscripts b and s (e.g., xb and xs ) to denote binary values (i.e, over the alphabet {0, 1}) and bipolar values (i.e., over {±1}), respectively. We define the mapping from the binary to the bipolar alphabet, denoted bipolar(·), by 0 → 1, 1 → −1 and let bin(·) denote the inverse mapping. Note that the following identity holds: s s s s bin(x · y ) = bin(x ) ⊕ bin(y ), s s ∀x , y ∈ {±1} (1) where ⊕ denotes XOR. sign(x) and |x| denote the sign and absolute value of any real-valued x, respectively, In our analysis below, when applied to a vector, the operations bipolar(·), bin(·), sign(·) and | · | are assumed to be applied independently to each of the vector’s components. III. B RIEF OVERVIEW OF D EEP N EURAL N ETWORKS We now briefly describe the essentials of neural networks. Our discussion is in no way comprehensive, and there are many variations on the simple setup we describe. For an elaborate discussion, see e.g. [15]. for an associated computational algorithm. The nodes are called neurons and each performs (i.e., is associated with) a simple computation on inputs to produce a single output. The algorithm inputs are fed into the first-layer neurons, whose outputs are fed as inputs into the next layer and so forth. Finally, the outputs of the last layer neurons become the algorithm output. Deep networks are simply neural networks with many layers. The inputs and output at each neuron are real-valued numbers. To compute its output, each neuron first computes an affine function of its input (a weighted sum plus a bias). It then applies a predefined activation function, which is typically nonlinear (e.g., sigmoid or hyperbolic tangent), to render the output. The power of neural networks lies in their configurability. Specifically, the weights and biases at each neuron are parameters which can be tailored to produce a diverse range of computations. Typically, the network is configured by a training procedure. This procedure relies on a sample dataset, consisting of inputs, and in the case of supervised training, of desired outputs (known as labels). There are several training paradigms available, most of which are variations of gradient descent. Overfitting occurs typically when the training dataset is insufficiently large or diverse to be representative of all valid network inputs. The resulting network does not generalize well to inputs that were not encountered in the training set. IV. T HE P ROPOSED S YNDROME -BASED F RAMEWORK AND ITS A NALYSIS A. Framework Definition We begin by briefly discussing the encoder. We assume standard transmission that uses a linear code C. We let m ∈ {0, 1}K denote the input message, which is mapped to a codeword xb ∈ {0, 1}N (recall that the superscript b denotes binary vectors). We assume that xb is mapped to a bipolar vector x using the mapping defined in Sec. II, and x is transmitted over the channel. We let y denote the channel output. For convenience, we define m, xb , x and y to be column vectors. Decoder 𝐲𝒔 Channel output sign bin 𝐲𝒃 𝐲 abs Algorithm inputs |𝐲| 𝐻 𝐻𝐲 𝒃 Noise estimation F Estimate x sign 𝐱 Algorithm outputs Fig. 2. Decoder framework. The final sign operation is omitted when the system is designed to produce soft decisions. In Sec. V, we will implement F using a neural network. Layer 1 Fig. 1. Layer 2 Layer 3 Layer 4 Layer 5 Illustration of a multi-layer neural network. Fig. 1 depicts a simple multilayered neural network. The network is a directed graph whose structure is the blueprint Our decoder framework is depicted in Figure 2. The decoder’s main component is F, whose role is to estimate the channel noise, and which we will later (Section V) implement using a deep neural network. The discussion in this section, however, applies to arbitrary F. The inputs to F are the absolute value |y| and the syndrome Hyb , where H is a parity check matrix of the code C, yb is a vector of hard decisions, yb = bin(sign(y)) where bin(·) is simply the inverse of the above defined bipolar mapping. The multiplication by H is modulo-2. The output of F is multiplied (componentwise) by ys , which is the sign of y. Finally, when interested in hard decisions, we take the sign of the results and define this to be the estimate x̂. This final hard decision step (which is depicted in Fig. 2) is omitted when the system is required to produce soft decisions. B. Binary-Input Symmetric-Output (BISO) Channels Our analysis in the following section applies to a broad class of channels known as binary-input symmetric-output (BISO) channels. This class includes binary-input AWGN channels, binary-symmetric channels (BSCs) and many others. Our definition below follows Richarson et al. [1][Definition 1]. Definition 1. Consider a memoryless channel with input alphabet {±1}. The channel is BISO if its transition probability function satisfies: Pr[Y = y | X = 1] = Pr[Y = −y | X = −1], (2) for al y the channel output alphabet, where X and Y denote the random channel input and output (respectively). An important feature of BISO channels is that their random transitions can be modeled by [1][proof of Lemma 1], Y = X · Z̃, (3) where Z̃ is random noise which is independent of the transmitted X. The tilde in Z̃ serves to indicate that this is an equivalent statistical model, which might differ from the true physical one. To prove (3), we simply define Z̃ to be a random variable distributed as Pr[Y | X = 1] and independent of X. The validity now follows from (2). Outline. In Part 1 we neglect implementation concerns, and focus on realizations of F that try to optimally estimate the multiplicative noise z̃ (see (3)). By (3), given y, such estimation is equivalent to estimation of x. We argue that the pair |y| and Hyb is a sufficient statistic for estimation of z̃. To see this, observe that y is equivalent to the pair |y| and sign(y). The latter term, in turn, is equivalent to the pair Hyb and Ayb , where yb is as defined in Sec. II and A is a pseudo-inverse of the code’s generator matrix G. By (1) and (3), yb = xb ⊕z̃b and so Ayb is the sum of the transmitted message m = Axb and Az̃ (the projection of z̃ onto the code subspace). We argue that Ayb is independent of the noise and thus irrelevant to its estimation. This follows because m is independent of z̃, and we assume it to be uniformly distributed within the message space {0, 1}K . To prove Part 2 of the theorem, we allow F to be arbitrary and show that the decoder’s output can be modeled as f (z̃) · x for some vector-valued function f (·). Thus, its relationship with x (which determines the BER and MSE) depends on the noise z̃ alone. To see why this holds, first observe that the inputs to F (and consequently, its outputs) are dependent on the noise z̃ only. This follows because the syndrome Hyb equals Hz̃b . This in turns follows from the relation yb = xb ⊕ z̃b and the fact that xb is a codeword, and so Hxb = 0. By (3) and the bipolarity of x, the absolute value |y| equals |z̃|. It now follows that the output of F is dependent on z̃ alone. Multiplication by sign(y) (see Fig. 2) is equivalent to multiplying by sign(z̃) · x (by (3)) and the result follows. V. I MPLEMENTATION USING D EEP N EURAL N ETWORKS Theorem 1 proves that our framework does not intrinsically involve a loss of optimality. To realize its potential, we propose efficient implementations of the function F. In this section, we discuss deep neural network implementations as well as a simple preprocessing technique that enables the networks to achieve improved performance. A. Deep Neural Network Architectures C. Analysis We now show that the decoder framework involves no penalty in performance in terms of metrics mean-squared-error (MSE) or bit error rate (BER). That is, the decoder can be designed to achieve any one of them. Importantly, it addresses the overfitting problem that was described in Sec. I. Theorem 1. The follwing holds with respect to the framework of Sec. IV-A, assuming communication over a BISO channel: 1) The framework incurs no intrinsic loss of optimality, in the sense that with an appropriately designed F, the decoder can achieve maximum a-posteriori (MAP) or minimum MSE (MMSE) decoding. 2) For any choice of F, the decoder’s BER and MSE, conditioned on transmission of any codeword x, are both invariant to x. We provide an outline of the proof here, and defer the details to Appendix I. We consider the following two architectures: 1) Vanilla Multi-Layer: With this architecture, the neural network contains an array of fully-connected layers as illustrated in Fig. 3. It closely resembles simple designs [15] with the exception that we feed the network inputs into each of the layers, in addition to the output of the previous layer (this idea is borrowed from the belief propagation algorithm). The network includes 11 fully-connected layers, roughly equivalent to the 5 LDPC belief-propagation iterations as in [2]. We use rectified linear unit (ReLU) nonlinear activation functions [15]. Each of the first 10 layers consists of the same number of nodes (6N for block length N = 64 and 15N for block length N = 127). The final fully-connected layer has N nodes and produces the network output, using a hyperbolic tangent arctivation function. 2) Recurrent Neural Network (RNN): With this architecture, we build a deep RNN by stacking multiple recurrent … 𝐲, 𝐻𝐲 𝑏 𝐳 Network output Network input Output layer Layer 1 Fig. 3. Layer 2 Layer 10 codeword. With each training batch, we generate a new set of noise samples. While this procedure produced our best results, an alternative approach which fixes the training noise and uses other techniques (e.g., dropout) to overcome overfitting the noise, is worth exploring. With the RNN architecture, the network produces multiple outputs (at each time-step) and we use the following loss function: An instance of the Vanilla multi-layer architecture. L= hidden states on top of each other [19] as illustrated in Fig. 4. RNNs realize a design which is equivalent to a multi-layer architecture by maintaining a network hidden state (memory) which is updated via feedback connections. Note that from a practical perspective, this renders the network more memory-efficient. In many applications, this structure is useful to enable temporal processing, and stacking RNNs as in Fig. 4 enables operation at different timescales. In our setting, this interpretation does not apply, but we nonetheless continue to refer to RNN layers as “time steps.” Stacking multiple RNNs produces an effect that is similar to deepening the network. We use Gated Recurrent Unit (GRU) [20] cells which have shown peformance similar to well-known long shortterm memory (LSTM) cells [21], but have less parameters due to the lack of a reset gate, making them a faster inference alternative. We use the hyperbolic tangent nonlinear activation functions, the networks posses 4 RNN stacks (levels), the hidden state size is set to 5N and the RNN performs 5 time steps. T N 1 X X T −t γ HCE (z̃is , ẑis (t)), N t=1 i=1 where HCE is the cross-entropy function, z̃is is the sign of component i of the multiplicative noise and where ẑis (t) the network output corresponding to codebit i at RNN time step (layer) t. γ < 1 a discount factor (in our simulations, we used γ = 0.5). The loss for the vanilla architecture is a degenerate version of the RNN one, with time steps and discount factors removed. B. Preprocessing by Permutation The performance of the implementations described above can further be improved by applying simple preprocessing and postprocessing steps at the input and output of the decoder (respectively). Our approach is depicted in Fig. 5. Preprocessing involves applying a permutation to the components of the channel output vector, and postprocessing applies the inverse permutation to the decoder output. The approach draws on ideas from Fossorier et al. [9], [10] and Dimnik and Be’ery [17]. Note that the approach deviates from these works in that it does not involve computing a list of vectors. Decoder 𝑧(1) 𝑧(2) 𝐺𝑅𝑈𝑛 (1) 𝐺𝑅𝑈𝑛 (2) … … 𝑧(𝑇) … Select permutation 𝐺𝑅𝑈𝑛 (𝑇)  …  y 𝐺𝑅𝑈2 (1) 𝐺𝑅𝑈2 (2) … 𝐺𝑅𝑈2 (𝑇) 𝐺𝑅𝑈1 (1) 𝐺𝑅𝑈1 (2) … 𝐺𝑅𝑈1 (𝑇) … 𝒚 , 𝐻𝒚 𝑏 Fig. 4. Our implementation of stacked RNN layers where GRUi (t) represents the i-th level cell at RNN time step (layer) t. To train the networks, we simulate transmission of the allone codeword (assuming the bipolar alphabet, {±1}). We also simulate the multiplicative noise z̃, which in the case of an AWGN channel, is distributed as a mean-1 Gaussian random variable. In our training for Sec. VI, we set Eb /N0 to 4 dB. This was selected arbitrarily, and could potentially be improved. We use Google’s TensorFlow library and the Adam optimizer [16]. Testing proceeds in the same lines, except that we use randomly generated codewords rather than the all-one Decoder of Fig. 2 -1 x^ Fig. 5. Decoder with perprocessing and postprocessing components. Note that in Appendix II we show that this decoder has an equivalent representation which is a special case of Fig. 2. Similar to [9], [10], our decoder selects the preprocessing permutation so as to maximize the sum of the adjusted reliabilities of the first K components of the permuted channel output vector. Borrowing an idea from [17], however, we confine our permutations to subsets of the code’s automorphism group. We assume that the parity check matrix, by which the syndrome in Fig. 5 is computed, is arranged so that the last N −K columns are diagonal and correspond to parity bits of the code. We define the adjusted reliability of a channel component yi , denoted R(yi ) by, ∆ R(y) = I(X; Y | |Y | = |y|). (4) well as the algorithm of [2]. However, a gap remains to the OSD algorithm2 , which widens with Eb /N0 . With respect to the number of codewords simulated, with our algorithms, we simulated 105 codewords for each Eb /N0 point. With the OSD algorithm, we simulated 104 codewords for each Eb /N0 point. With the BP algorithm we simulated 103 for each point. The analysis of [2] also includes an mRRD framework, into which their algorithm can be plugged to obtain superior performance. While our algorithms can similarly be plugged into that framework, our interest in this paper is in methods whose primary components are neural networks. 1 Their paper [3] does not include results for this case. 1 10 2 10 3 Belief propagation (BP) Syndrome-based, vanilla Syndrome-based, stacked RNN Nachmani et al. best results OSD, order 2 1.0 Fig. 6. BER VI. S IMULATION R ESULTS Fig. 6 presents simulation results for communication with the BCH(63,45) code over an AWGN channel. We simulated our two architectures, namely syndrome-based vanilla and stacked-RNN. Note that in this case, we did not simulate permutations (Sec. V-B). Also plotted are results for the best method of Nachmani et al. [2],[3], the belief propagation (BP) algorithm, and for the ordered statistics decoding (OSD) algorithm [10] of order 2 (for this algorithm we simulated 104 codewords for each Eb /N0 point). As can be seen from the results, both our architectures substantially outperform the BP algorithm. Our stacked-RNN architecture, like that of [3], approaches the OSD algorithm very closely. Fig. 7 presents results for the BCH(127,64) code. We simulated our syndrome-based stacked RNN method, with and without preprocessing. As can be seen, the preprocessing step renders as a substantial benefit. Also plotted are results for the BP and the OSD algorithms as well as the best results of [2]1 . Both our methods outperform the BP algorithm as 10 BER That is, R(y) equals the mutual information of random variables X and Y , denoting the channel input and output, respectively, conditioned on the event that the absolute value |Y | equals |y|. X is uniformly distributed in {±1} and Y is related to it via the channel transition probabilities. With this definition, our permutation selection criterion is equivalent to concentrating as much as possible of the channel capacity within the first K channel output components. Unlike [10], we borrow an idea from [17] and restrict the set of allowed permutations to the code’s automorphism group [18]. Permutations in this group have the property that the permuted version of any codeword is guaranteed to be a codeword as well. In our context, confinement to such permutations ensures that the decoder input (the permuted channel output) continues to obey the communication model, namely being a noisy valid codeword. The decoder can thus continue to rely on the code’s structure to decode. When compared to framework of Fig. 2, the decoder of Fig. 5 has the added benefit of knowing that the K first channel outputs are consistently more reliable than the remaining components. That is, the input exhibits additional structure that the neural network can rely on. In Appendix II we discuss permutations for BCH codes like those we will use in Sec VI below, as well as efficient methods for computing the optimal permutation. We also discuss formal aspects related to applying the analysis of Sec. IV to the framework of Fig. 5. Note that to achieve good results, the added steps of Fig. 5 need to be included during training of the neural network. In Sec. VI we present simulation results for BCH(127,64) codes with and without the above preprocessing method, demonstrating the effectiveness of this approach. Note that with the shorter block length BCH(63,45) codes, preprocessing was not necessary, and we obtained performance that approaches the ordered statistics algorithm even without it. 2.0 2.5 Eb/No [dB] 3.0 3.5 4.0 BER results for a BCH (63,45) code. 10 1 10 2 10 3 10 4 10 5 Belief propagation (BP) Nachmani et al. best results Syndrome-based, stacked RNN, without preprocessing Syndrome-based, stacked RNN, preprocessing OSD, order 2 1 Fig. 7. 1.5 2 3 Eb/No [dB] 4 5 6 BER results for a BCH (127,64) code. 2 Note that for E /N of 4 dB or higher, we encountered no OSD errors 0 b for BCH(127,64), in our simulations. VII. C ONCLUSION Our work in this paper presents a promising new framework for the application of deep learning to error correction coding. An important benefit of our design is the elimination of the problem of overfitting to the training codeword set, which was experienced by [4], [5]. We achieve this by using syndrome decoding, and by extending it to account for soft channel reliabilities. Our approach enables the neural network to focus on the estimating the noise alone, rather than the transmitted codeword. It is interesting to compare our framework to that of Nachmani et al. [2]. While their approach also resolves the overfitting problem and achieves impressive simulation results, it is heavily constrained to follow the structure of the LDPC belief-propagation decoding algorithm. By contrast, our framework allows the unconstrained design of the neural network, and our architectures are free to draw from the rich experience that has emerged in recent years on neural network design. Our simulation results demonstrate that our framework can be applied to achieve strong performance that approaches OSD. Further research will examine additional neural network architectures (beyond the RNN-based) and preprocessing methods, to improve our performance further. It will also consider the questions of latency and complexity. We hope that research in these lines will produce powerful algorithms and have a substantial impact on error correction coding, rivaling the dramatic effect of deep learning on other fields. A PPENDIX I P ROOF OF T HEOREM 1 In this section we provide the rigorous details of the proof, whose outline was provided in Sec IV-C. We begin with the following lemma. Lemma 1. The following two claims hold with respect to the framework of Sec. IV-A: 1) There exists a matrix A with dimensions K × N , such that Axb = m for all m and xb defined as in Sec. IV-A (recall that m and xb are both column vectors). 2) Let B be a matrix obtained by concatenating the rows of H and A (i.e, B = [H T , AT ]T ). Then B has full column rank, and is thus injective (one-to-one) Note that in this lemma, we allow H to contain redundant, linear dependent rows, as long as its rank remains N − K. While we have not used such matrices in our work, the extra redundant rows could in theory be helpful in the design of effective neural networks for F. Proof of Lemma 1. Part 1 of the lemma follows simply from the properties of the generator matrix of the code C, denoted here G. This matrix has full column-rank and dimensions N × K and satisfies xb = Gm. Thus, we can define A to be its left-inverse, and Part 1 of the lemma follows. To prove Part 2 of the lemma, we first observe that we can assume without loss of generality the matrix H has full row-rank. This is because by removing redundant (linear dependent) rows from H we can obtain a full-rank paritycheck matrix, and such removal cannot affect the rank of the corresponding B. Let D be a right-inverse of the matrix H, whose existence follows from the fact that H has full rowrank. D has dimensions N × N − K. Consider the matrix [G, D] (obtained by concatenating the columns of G and D).      H  HG HD B · [G, D] = · G D = A AG AD   0 IN −K = , IK AD where IK and IN −K denote the identity matrices of dimensions K and N − K, respectively. The equality HG = 0 follows from the orthogonality of the generator and parity matrices, and equalities HD = IN −K , AG = IK follow from the definitions above of A and D. The resulting matrix has rank N , and thus B cannot have rank less than N . We now proceed to prove Part 1 of the theorem. We use the following notation: Vector are denoted by boldface (e.g., x) and scalars by normalface (e.g., x). Random variables are upper-cased (X) and their instantiations lower-cased (x). We use the notation of Fig. 2, replacing lowercase with uppercase wherever we need to denote random variables. Accordingly, we let X and Y denote random variables corresponding to the channel input and output (respectively). y is the realized channel output observed at the decoder and x ∈ {±1} an arbitrary value. Consider the string of equations ending in (5). In (a), Yis is a random variable defined as yis (Fig. 2) and equality Yis = yis follows from the condition Y = y. In (b), we have relied ∆ on (3) to replace Z̃is = Xi · Yis , where Z̃is = sign(Z̃i ). In ∆ (c), |Y| is the absolute value of Y and Ys = sign(Y). In (d), we have relied on (3) and the bipolarity of X to obtain |Z̃| = |Y|. We have also defined and Yb and yb as in Fig. 2. In (e), the matrix B was defined as in Lemma 1 and equality follows by the fact that B is injective. In (f ), we have used the definition B = [H T , AT ]T where A is as defined in Lemma 1. In (g), we have decomposed Yb = Xb ⊕ Z̃b . This follows from (1) and (3). In (h), we have relied on HXb = 0 which follows from the fact that Xb is a valid codeword. We have also replaced AXb = M, where M is the random message (see Fig. 2), following i Finally, in (i) we have made h Lemma 1. the observation that M ⊕ AZ̃b is independent of Z̃ and can therefore be omitted from the condition. This follows because M, being the transmitted message, is uniformly distributed in {0, 1}K (see Sec. IV-A) and independent of AZ̃b (and Z̃). The proof now follows from (5). To obtain the MAP decision for Xi given y we can define the components of N F as follows, for s ∈ {0, 1}N −K and a ∈ R+ . n o ∆ Fi (a, s) = argmax Pr[Z̃is = z̃ | |Z̃| = a, H Z̃b = s] z̃∈{±1} By (5), we now have MAP(Xi ) = yis Fi (|y|, Hyb ). Similarly, to obtain the MMSE estimate for Xi , we can define: ∆ Fi (a, s) = E[Z̃is | |Z̃| = a, H Z̃b = s] Pr[Xi = x | Y = y] (a) = Pr[Xi · Yis = xyis | Y = y] (b) = Pr[Z̃is = xyis | Y = y] (c) = Pr[Z̃is = xyis | |Y| = |y|, Ys = ys ] (d) = Pr[Z̃is = xyis | |Z̃| = |y|, Yb = yb ] (e) = Pr[Z̃is = xyis | |Z̃| = |y|, BYb = Byb ] (f ) = Pr[Z̃is = xyis | |Z̃| = |y|, HYb = Hyb , AYb = Ayb ] (g) = Pr[Z̃is = xyis | |Z̃| = |y|, H[Xb ⊕ Z̃b ] = Hyb , A[Xb ⊕ Z̃b ] = Ayb ] (h) = Pr[Z̃is = xyis | |Z̃| = |y|, H Z̃b = Hyb , M ⊕ AZ̃b = Ayb ] (i) Pr[Z̃is = xyis | |Z̃| = |y|, H Z̃b = Hyb ] = Recall from Fig. 2 that in this case the decoder is configured to produce soft decisions and so the final sign operation is omitted (see Fig. 2). This concludes the proof of Part 1 of the theorem. Turning to Part 2, in Sec IV-C we proved that the decoder’s output can always be modeled as f (z̃) · x for some vectorvalued function f (·). With respect to the BER metric, the indices where the vectors f (z̃) · x and x diverge coincide with the indices where f (z̃) equals -1, and thus are independent of x. With respect to the MSE metric (recall that in this case, the sign operation in Fig. 2 is omitted), we have MSE = kf (z̃)·x−xk2 = kf (z̃)−1k2 and thus the error is independent of x. A PPENDIX II AUTOMORPHISMS OF BCH CODES In this section, we discuss automorphisms of primitive narrow-sense binary BCH codes codes [18], which include the codes used in Sec VI. With the above codes, the blocklength N equals 2m − 1 for some positive integer m. Codewords are binary vectors c = [c0 , ..., cN −1 ] (i.e., defined over indices i = 0, ..., N − 1). Permutations are bijective functions π : {0, ..., N − 1} → {0, ..., N − 1}. Given a codeword c and a permutation π, we define the corresponding permuted codeword cπ by cπi = cπ(i) . The automorphism group of the above-mentioned BCH codes includes [18] [pp. 233] permutations of the form: πk,l (i) = 2k i + l mod N where k ∈ {0, ...m − 1} and l ∈ {0, ..., N − 1}. The inverse −1 permutation πk,l can be shown to equals πs,t shere s = m − k mod m and t = −2s · l mod N . We now address the question of efficiently finding the optimal permutation πk,l in the sense of Sec. V-B, i.e., the permutation that maximizes the sum of adjusted reliabilities (see (4)) over the first K components of the permuted codeword. For fixed k = 0, the set of permutations π0,l (i), l = 0, ..., N − 1 coincides with the set of cyclic permutations. Finding the optimal cyclic permutation can efficiently be achieved by computing the cumulative sum of the adjusted reliabilities. The case of arbitrary k is adressed by observing that πk,l (i) = π0,l (πk,0 (i)). The optimal permutation can (5) be achieved by first applying the permutation πk,0 and then repeating the above procedure for cyclic codes. Finally, the optimal permutation across all k is computed by combining the above results for each individual k = 0, ..., m−1. With respect to computation latency, we note that the cumulative sum can be computed in logarithmic time by recursively splitting the range 0, ..., N − 1. Strictly speaking, the decoder of Fig. 5 violates the framework of Sec. IV, because the preprocessing and postprocessing steps are not included in that framework. In the case of BCH codes, however, this formal obstacle is easily overcome by removing the two steps and redefining F to compensate. Specifically, the preprocessing permutation can equivalently be realized within F by permuting the vector |y| and manipulating the syndrome using identities detailed in [18]. The selection of the optimal permutation (which depends only on |y|) and the postprocessing step can be redefined to be included in F. The results of Sec. IV (particularly, resilience to overfitting) thus carry over to our setting. R EFERENCES [1] T. Richardson and R. Urbanke, “The capacity of low-density paritycheck codes under message-passing decoding,” IEEE Trans. Inf. Theory, vol. 47, pp. 599–618, Feb. 2001. [2] E. Nachmani, E. Marciano, L. Lugosch, Loren, W.J. Gross, D. Burshtein and Y. Be’ery, “ Deep learning methods for improved decoding of linear codes,” arXiv:1706.07043, 2017 [3] E. Nachmani, Y. Bachar, E. Marciano, D. Burshtein and Y. Be’ery “Near Maximum Likelihood Decoding with Deep Learning,” Int. Zurich Seminar on Inf. and Comm., 2018 [4] T. J. O’Shea and J. Hoydis, “An introduction to machine learning communications systems,” arXiv:1702.00832, 2017. [5] T. Gruber, S. Cammerer, J. Hoydis, and S. t. Brink, “On deep learningbased channel decoding,” 51st Annual Conference on Inf. Sciences and Systems (CISS), 2017. [6] L. G. Tallini and P. Cull, “Neural nets for decoding error-correcting codes,” Proc. IEEE Tech. Applicat. Conf. and Workshops Northcon95, pp. 89–94, Oct. 1995. [7] J.-L. Wu, Y.-H. Tseng, and Y.-M. Huang, “Neural network decoders for linear block codes,” Int. Journ. of Computational Engineering Science, vol. 3, no. 3, pp. 235–255, 2002. [8] J. Bruck and M. Blaum, “Neural networks, error-correcting codes, and polynomials over the binary n-cube.” IEEE Trans. Inf. Theory vol. 35(5), pp. 976–987, 1989. [9] M.P. Fossorier, S. Lin and J. Snyders. “Reliability-based syndrome decoding of linear block codes.” IEEE Trans. Inf. Theory vol. 44(1) pp. 388–398, Jan. 1998. [10] M.P. Fossorier and S. Lin, “Soft-decision decoding of linear block codes based on ordered statistics.” IEEE Trans. Inf. Theory, vol. 41(5), 1379– 1396, Sep. 1995. [11] T. Richardson and R. Urbanke, “Modern coding theory,” Cambridge university press. (2008) [12] S. Lin and D. J. Costello. “Error control coding,” 2nd edition, Prentice Hall, 2004. [13] G. Wiechman and I. Sason, I., “Parity-check density versus performance of binary linear block codes: New bounds and applications,” IEEE Trans. Inf. Theory vol. 53(2), pp. 550–579, Jan. 2007. [14] D. Burshtein, M. Krivelevich, S. Litsyn, S. and G. Miller, “Upper bounds on the rate of LDPC codes,”. IEEE Trans. Inf. Theory vol. 48(9), pp. 2437–2449, Sep. 2002. [15] I. Goodfellow, Y. Bengio, and A. Courville, “Deep learning.” MIT press, 2016. [16] D. Kingma and J. Ba, “Adam: A method for stochastic optimization.” arXiv preprint arXiv:1412.6980. Dec. 2014. [17] I. Dimnik and Y. Be’ery, “Improved random redundant iterative HDPC decoding.” IEEE Trans. Commu., 57(7), July 2009. [18] F. J. MacWilliams and N. J. A. Sloane, The Theory of Error-Correcting Codes. North-Holland, 1978. [19] A. Graves, M. Abdel-rahman and G. Hinton, “Speech recognition with deep recurrent neural networks” IEEE international conference on acoustics, speech and signal processing (icassp) 2013. [20] K. Cho, B. Van Merriënboer, C. Gulcehre , D. Bahdanau, F. Bougares ,H. Schwenk and Y. Bengio G. Hinton, “Learning phrase representations using RNN encoder-decoder for statistical machine translation” arXiv preprint arXiv:1406.1078 2014. [21] S. Hochreiter and J. Schmidhuber, “Long short-term memory” Neural computation 1997.
9cs.NE
Lazy Local Search Meets Machine Scheduling Chidambaram Annamalai∗ arXiv:1611.07371v2 [cs.DS] 13 Dec 2016 December 14, 2016 Abstract We study the restricted case of Scheduling on Unrelated Parallel Machines. In this problem, we are given a set of jobs J with processing times pj and each job may be scheduled only on some subset of machines Sj ⊆ M . The goal is to find an assignment of jobs to machines to minimize the time by which all jobs can be processed. In a seminal paper, Lenstra, Shmoys, and Tardos [LST87] designed an elegant 2-approximation for the problem in 1987. The question of whether approximation algorithms with better guarantees exist for this classic scheduling problem has since remained a source of mystery. In recent years, with the improvement of our understanding of Configuration LPs, it now appears an attainable goal to design such an algorithm. Our main contribution is to make progress towards this goal. When the processing times of jobs are√either 1 or ǫ ∈ (0, 1), we design an approximation algorithm whose guarantee tends to 1 + 3/2 ≈ 1.8660254, for the interesting cases when ǫ → 0. This improves on the 2 − ǫ0 guarantee recently obtained by Chakrabarty, Khanna, and Li [CKL15] for some constant ǫ0 > 0. Keywords: scheduling, unrelated parallel machines, restricted assignment, configuration linear programs. ∗ Department of Computer Science, ETH Zurich. Email: [email protected]. 1 Introduction We study a special case of the problem of Scheduling on Unrelated Parallel Machines. An instance I of this problem consists of machines M , jobs J, and a collection of positive processing times {pij }i∈M,j∈J for every machine–job pair. The goal is to assign all the jobs to the available machines such that the makespan of the resulting schedule is as small as possible. The makespan of a schedule σ : J 7→ M is defined as X max pij . i∈M j∈σ−1 (i) It is one of the major open questions [WS11] in the field of approximation algorithms to better understand the approximability of this problem. Curiously, the best known hardness result and approximation algorithm for the problem today were simultaneously established in the 1987 paper of Lenstra, Shmoys and Tardos [LST87]. Given the challenging nature of the problem, the road to a better understanding of its approximability has focused on two special cases that each isolate two difficult aspects associated with it—on the one hand a given job j ∈ J may be assigned with a finite processing time to an unbounded number of machines, and on the other hand, its processing time may vary considerably across those machines. In the graph balancing case, only instances where every job may be assigned to at most two machines with finite processing time are considered. In the restricted case, often referred to as the restricted assignment makespan minimization problem, the input processing times obey the condition pij ∈ {∞, pj } for each i ∈ M and j ∈ J, where pj is a machine independent processing time for job j. This has the natural interpretation that each job has a fixed processing time but may only be scheduled on some subset of the machines. The latter special case is the focus of this work. The elegant 2-approximation of Lenstra et al. [LST90] works by rounding extreme point solutions to a linear program called the Assignment LP. As this linear program has a matching integrality gap, one of the natural directions was to develop a stronger convex relaxation for the restricted case. An important step forward was made by Bansal and Sviridenko [BS06] who, among other things, introduced the Configuration LP for the problem, which has exponentially many decision variables. At the time, however, it was not clear if this new linear program was indeed stronger than the Assignment LP in the sense of a worst case integrality gap. A breakthrough in this direction was achieved by Svensson [Sve12] who proved that the integrality of the Configuration LP is no worse than 33/17 ≈ 1.94, and, therefore, strictly better than the Assignment LP. Tantalizingly, however, the proof of his result did not lead to an approximation algorithm with the same (or even similar) guarantee. This is a fairly strange situation for a problem, as we usually expect integrality gap upper bounds to accompany an approximation algorithm; indeed, it is often established as a consequence of the latter. The difficulties in turning the non-constructive aspects of Svensson’s result into an efficient algorithm mirror the situation faced in the restricted max-min fair allocation problem. In the latter problem, following a long line of work [BS06, Fei08, HSS11, AFS12, PS12, AKS15], a non-constructive integrality gap upper bound on the Configuration LP by Asadpour, Feige and Saberi [AFS12] was turned into an approximation algorithm [AKS15]. Although one might reasonably hope for a similar resolution in the restricted case, it has proved to be elusive thus far. Indeed, there have been works aimed at obtaining better-than-2 approximation algorithms for special cases, 2 and the gap between the 33/17 ≈ 1.94 (recently improved to 11/6 ≈ 1.83 [JR16]) integrality gap upper bound and the 2 approximation algorithm of Lenstra et al. [LST90] persists. Ebenlendr, Křćal and Sgall [EKS08] studied the case when jobs may be assigned to at most two machines and gave a 1.75 approximation in this case. Recently, Chakrabarty, Khanna, and Li [CKL15] designed a 2 − ǫ0 approximation algorithm, for some constant ǫ0 > 0, for the so-called (1, ǫ)-case where processing times of jobs are drawn from a set of size two. The special significance of (1, ǫ)-case is that it already proves to be hard from the perspective of the Configuration LP—the best known 1.5 factor integrality gap instances are of this type—and seems to adequately capture the difficulty of the restricted case in general. It is also interesting in its own right, and in a sense it is the simplest case of the problem that is not yet fully understood. Indeed, the case when processing times of all the jobs are equal can be solved optimally in polynomial time: this amounts to finding a maximum flow in an appropriate flow network with jobs as sources, machines as sinks, and setting the sink capacities to be uniformly equal to some guess on the optimum makespan. Our Results. After normalizing the job sizes, we assume without loss of generality that the jobs are of size 1 or ǫ for some 0 < ǫ < 1. Our main result is a new purely flow based local search algorithm for the (1, ǫ)-case. Theorem 1.1. Let 0 < ǫ < 1. For an arbitrary but fixed ζ > 0, the (1, ǫ)-case of restricted assignment makespan minimization admits a polynomial time 1 + R(ǫ, ζ) approximation algorithm where  ∆ 1 √ 3 − 2ǫ + ǫ + ζ. R(ǫ, ζ) = 2 From the point of view of better-than-2 approximation algorithms, the hard case is when√ǫ → 0. For this range of values, the approximation ratio guaranteed by Theorem 1.1 tends to 1 + 3/2 ≈ 1.87. By balancing against a simple algorithm based on bipartite matching we also derive an approximation guarantee independent of the size of small jobs. Theorem 1.2. Let 0 < ǫ < 1. For an arbitrary but fixed ζ > 0, the (1, ǫ)-case of restricted assignment makespan minimization admits a polynomial time 17/9+ζ approximation algorithm. Note that 17/9 ≈ 1.89. Our Techniques. We now give a very high level overview of the ideas behind the proof of Theorem 1.1 assuming that the optimum makespan is 1 for simplicity. Our local search algorithm continually increases the number of jobs P scheduled by an assignment σ : M 7→ J ∪ {TBD}1 that satisfies the 1 + R makespan bound i.e., j∈σ−1 (i) pij ≤ 1 + R for each i ∈ M . The algorithm takes a job j0 such that σ(j0 ) = TBD and attempts to assign it to one of the machines M while respecting the makespan bound of 1 + R. In general, it may be required to modify the assignment σ, which we call a partial schedule, before j0 can be successfully assigned along with the rest of the jobs in σ −1 (M ). The algorithm identifies a set of machines M0 such that sufficiently reducing the load on any of the machines i ∈ M0 suffices to assign j0 successfully. Once again, to reduce the load on one of the machines in M0 a new set of machines M1 that is disjoint from M0 is identified. In this way, in general there will be a sequence of disjoint machine sets M0 , M1 , . . . , Mℓ such that reducing the load on some Mi allows the load to be reduced on some 1 TBD for “to be decided” 3 machine in M0 ∪ . . . ∪ Mi−1 . At some point, it may turn out that a lot of machines in Mℓ have very little load, call them free machines, and therefore, it is possible for many of the jobs currently scheduled on some machine in M0 ∪ . . . ∪ Mℓ−1 to be relocated to free machines in Mℓ , which represents progress towards our goal of eventually scheduling j0 . The first property we require is large progress which ensures that many free machines in Mℓ implies that proportionally many jobs from σ −1 (M0 ∪ . . . ∪ Mℓ−1 ) can be relocated. Further, such relocations should be performed in a way as to maintain the same property for the machine sets of smaller indices. Large progress by itself would not guarantee that the algorithm terminates quickly if it does not happen often enough. To ensure that we find many free machines frequently, a second property ensures |Mi | ≥ µ|M0 ∪ . . . ∪ Mi−1 | so that large progress happens at least once every Oµ (log |M |) sets that are encountered. These two properties–and maintaining them as the partial schedule is continually modified by the algorithm–roughly correspond to the core technical difficulties of our approach. The proof of the first property (see Section 3.3.4) makes fairly extensive use of properties of maximum flows, while the second property (see Section 3.3.5) is based on new ideas for constructing dual unboundedness certificates for the Configuration LP. It is interesting to note that the construction of such certificates in the analysis, to prove the required property about the local search algorithm, effectively amounts to a second algorithm that is merely used to determine an assignment of values to the dual variables in the proof. Our final algorithm is a highly structured local search that performs job relocations only through flow computations in two kinds of flow networks. In essence, our approach can be seen as effectively reducing the scheduling problem we started with to polynomially many maximum flow computations in a structured fashion. The sets alluded to earlier correspond to certain “reachability graphs” associated with ǫ jobs whereas the number of such sets at any time is bounded by a function of the number of 1 jobs in the instance. We also stress that identifying such sets, which allow our analyses to prove these properties, requires a careful design of the algorithm in the first place, and is not clear at the outset that this can be achieved. Organization. The rest of the paper is organized as follows. In Section 2, we briefly go over some notation and state the Configuration LP for our problem. In Section 3.1 we explain some of the basic concepts such as flow networks and subroutines for job relocations used in the final local search algorithm. The algorithm and its running time analysis are presented in Sections 3.2 and 3.3 respectively, followed by the proof of the main theorem in the paper in Section 3.4. Proofs of some statements missing in the body of the paper appear in Appendix A. 2 2.1 Preliminaries Notation and Conventions Let I be the given instance of restricted assignment makespan minimization. By scaling all ∆ the processing times in the instance, we assume without loss of generality that pmax = max{pj | j ∈ J} = 1. We use OPT to denote the optimal makespan for I. P P For a subset of jobs S ⊆ J, we use the notation p(S) and pi (S) to refer to j∈S pj and j∈S pij respectively. We define Γ : J 7→ 2M to be a function that maps each job j ∈ J to the set of 4 all machines that it can be assigned to with a finite processing time. The input processing times {pij }i∈M,j∈J and {pj }j∈J satisfy ( pj , if i ∈ Γ(j), ∀i ∈ M ∀j ∈ J. pij = ∞, else. For S a collection of indexed sets {S0 , . . . , Sℓ } and 0 ≤ i ≤ ℓ we use the notation S≤i to refer to the set ij=0 Sj . 2.2 The Configuration Linear Program The Configuration LP is a feasibility linear program parametrized by a guess τ on the value of the optimal makespan for I, and is simply denoted by CLP (τ ). A configuration for machine i is a set of jobs with a total processing time at most τ on machine i. The collection of all such configurations for i is denoted as C(i, τ ). CLP (τ ) ensures that each machine receives at most one configuration fractionally, while ensuring that every job is assigned, also in the fractional sense. The constraints of CLP (τ ) are described in (2.1). X xiC ≤ 1, ∀i ∈ M, C∈C(i,τ ) X X i∈M C∈C(i,τ ) : j∈C xiC ≥ 1, ∀j ∈ J, (2.1) x ≥ 0. We can also write the dual of CLP (τ ) as follows. X X max zj − yi j∈J yi ≥ X j∈C i∈M zj , ∀i ∈ M and C ∈ C(i, τ ), (2.2) y, z ≥ 0. Let τ ∗ be the smallest value of τ for which CLP (τ ) is feasible. We refer to τ ∗ as the value of the Configuration LP. Observe that τ ∗ is a lower bound on OPT. As pmax = 1, τ ∗ must be at least 1. 3 The (1, ǫ) Case Let 0 < ǫ < 1. In the (1, ǫ)-case of restricted assignment makespan minimization, jobs j ∈ J have one of only two possible sizes: 1 or ǫ. We partition the jobs accordingly into the sets ∆ ∆ Jb = {j ∈ J | pj = 1} and Js = J \ Jb , which we will refer to as the sets of big and small jobs respectively. For the rest of the section fix some 0 < ǫ < 1 and ζ > 0. As ǫ and ζ are fixed constants, we refer to R(ǫ, ζ) as simply R. To prove Theorem 1.1 we describe an algorithm that terminates in polynomial time with a schedule of makespan at most τ ∗ + R for the given instance I. This algorithm, described in Section 3.2, is a local search algorithm which continually increases the size of a partial schedule. 5 Definition 3.1 (Partial schedule). A partial schedule is a map σ : J 7→ M ∪ {TBD} such that (a) ∀ i ∈ M , pi (σ −1 (i)) ≤ τ ∗ + R, (b) Jb ⊆ σ −1 (M ), and (c) ∀ i ∈ M , |σ −1 (i) ∩ Jb | ≤ 1. The size of a partial schedule σ is |σ −1 (M )|. Remark 3.2. Following the description and analysis of our algorithms, it will become clear that solving the Configuration LP on the input instance I, in order to determine τ ∗ , is not necessary. For the moment, however, it may be assumed that it is somehow known. We remark that τ ∗ can be computed in polynomial time upto any desired accuracy ν > 0 by using the ellipsoid algorithm with an appropriate separation oracle [BS06]. Of course, a partial schedule σ of size |J| is a schedule of makespan at most τ ∗ + R for our instance I. The following statement ensures that partial schedules exist in the first place. Lemma 3.3. Suppose 1 ≤ τ ∗ < 2. Then, there is a map from Jb to M such that i) no two big jobs are mapped to the same machine, and ii) every big job j ∈ Jb is mapped to a machine ij ∈ M such that ij ∈ Γ(j). Furthermore, such a map can be computed in polynomial time. 3.1 Flow Networks for Job Relocations Let σ be some partial schedule. We now define several quantities whose description depends on σ. Definition 3.4 (Job Assignment Graphs). Gσ = (M ∪ J, E) is a directed bipartite graph with machines and jobs in I as vertices. The edge set of Gσ is defined as ∆ E = {(i, j) | ∃ i ∈ M, j ∈ J : σ(j) = i} ∪ {(j, i) | ∃i ∈ M, j ∈ J : σ(j) 6= i, i ∈ Γ(j)}. ∆ We define the graph of small job assignments Gsσ = Gσ \ Jb and the graph of big job assignments ∆ Gbσ = Gσ \ Js . ∆ ∆ Definition 3.5 (Big and Small Machines). Let Mσb = {i ∈ M | σ −1 (i) ∩ Jb 6= ∅} and Mσs = M \ Mσb , which we refer to as big machines and small machines respectively. We need to define two flow networks which will facilitate the movement of the two kinds of jobs we have in our instance I. We will speak of the maximum flow in these flow networks, even though it may not necessarily be unique. In such cases it is implicitly assumed that there is fixed rule to obtain a particular maximum flow given a flow network. We also assume that flow decompositions of flows in such networks contain only source to sink paths (no cycles). First, we define the flow network for big jobs. Definition 3.6 (Flow Network for Big Jobs). For collections of machines S ⊆ Mσb , and T ⊆ Mσs , the flow network Hσb (S, T ) is defined on the directed graph Gbσ as follows. Each machine to job arc has a capacity of 1 whereas all other arcs have infinite capacity. S and T are the sources and sinks respectively in this flow network. Sinks have vertex capacities of 1. The value of maximum flow in this flow network is denoted as |Hσb (S, T )|. 6 The interpretation of the flow network Hσb (S, T ) is that it allows us to compute the maximum number of vertex disjoint paths in the graph Gbσ between the sets of vertices S and T . Proposition 3.7. For any S ⊆ Mσb and T ⊆ Mσs , there are |Hσb (S, T )| vertex disjoint paths in Gbσ with sources in S and sinks in T . These vertex disjoint paths suggest an update of the partial schedule σ in the natural way. Algorithm 3.1 formalizes the description of this task and Proposition 3.8 follows easily. Algorithm 3.1 BigUpdate(σ, X): Update σ using flow paths in X. Require: σ is a partial schedule and X is a flow in Hσb (Mσb , Mσs ) where ∀f ∈ X, p(σ −1 (f ∩ Mσs )) ≤ τ ∗ + R − 1. P ← Vertex disjoint paths corresponding to X as ensured by Proposition 3.7. for all p = i0 , j0 , . . . , jkp −1 , ikp ∈ P do for ℓ = 0, . . . , kp − 1 do σ(jℓ ) ← iℓ+1 . end for end for return σ. Proposition 3.8. For any partial schedule σ, and flow X in Hσb (Mσb , Mσs ) such that ∀f ∈ X, p(σ −1 (f ∩ Mσs )) ≤ τ ∗ + R − 1, BigUpdate(σ, X) returns a partial schedule σ ′ such that (a) σ ′−1 (M ) = σ −1 (M ), and (b) ∀f = i0 , j0 , . . . , jk−1 , ik ∈ X, σ ′−1 (i0 ) ∩ Jb = ∅. Now we define the flow network for small jobs. Definition 3.9 (Flow Network for Small Jobs). For two disjoint collections of machines S ⊆ Mσs and T ⊆ M , the flow network Hσs (S, T ) is defined on the directed graph Gsσ as follows. The arcs going from machines to jobs have capacity ǫ while arcs going from jobs to machines have infinite capacity. S and T are the sources and sinks respectively in this flow network. The sinks have vertex capacities are set as follows: ( 1 + τ ∗ + R − p(σ −1 (i)) − ǫ, if i ∈ Mσb , ∀i ∈ T, c(i) = τ ∗ + R − p(σ −1 (i)), else. The value of the maximum flow in this network is denoted as |Hσs (S, T )|. By construction it is clear that the maximum flow in both flow networks (3.6) and (3.9) is finite. By the max-flow min-cut theorem, infinite capacity arcs going from the source-side to the sink-side will therefore not cross any minimum capacity. We will use this fact later in our proof. Algorithm 3.2 interprets flows in Hσs (S, T ) as a collection of updates for σ. Proposition 3.10 is a statement about the partial schedule σ ′ output by SmallUpdate(. . .), and the flow X ′ computed at the end of the while loop in the procedure. For convenience we let f source and f sink denote the source and sink vertices, respectively, of a flow path f . 7 Algorithm 3.2 SmallUpdate(σ, S, T ): Update σ using Hσs (S, T ). Require: σ is a partial schedule, S ⊆ Mσs , T ⊆ M \ S. X0 ← Maximum flow in the network Hσs (S, {i ∈ T | p(σ −1 (i)) ≤ τ ∗ + R − ǫ}). X ← Augment X0 to a maximum flow in the network Hσs (S, T ). while ∃f = i0 , j0 , . . . , jkf −1 , ikf ∈ X : p(σ −1 (f sink )) ≤ τ ∗ + R − ǫ do for ℓ = 0, . . . , kf − 1 do σ(jℓ ) = iℓ+1 . end for X ← X \ {f }. end while return σ. Proposition 3.10. Let S ⊆ Mσs , T ⊆ M \ S, and X be the maximum flow in Hσs (S, T ). Then, SmallUpdate(σ, S, T ) returns a partial schedule σ ′ and computes a maximum flow X ′ in Hσs′ (S, T ) at the end of the while loop in Algorithm 3.2 such that (a) σ ′−1 (M ) = σ −1 (M ), (b) ∀i ∈ S, p(σ ′−1 (i)) − ǫ · |{f ∈ X ′ | f source = i}| = p(σ −1 (i)) − ǫ · |{f ∈ X | f source = i}|, and (c) ∀f ∈ X, p(σ ′−1 (f ∩ T )) > τ ∗ + R − ǫ. (d) There is no path in the graph Gsσ′ from S to some machine i ∈ T such that p(σ ′ −1 (i)) ≤ τ ∗ + R − ǫ. Proof. The first three properties follow directly from the updates performed in the while loop of Algorithm 3.2. To see that X ′ is a maximum flow in Hσs′ (S, T ), first observe that for each update of the partial schedule σ maintained by the algorithm, along some flow path f ∈ X from σ (b) to σ (a) in a single iteration of the while loop (superscripts for before and after), the graph Gsσ(a) can be obtained from Gsσ(b) by simply reversing the directions of arcs of the flow path in question. Suppose that X is a maximum flow in Hσs(b) (S, T ). By the max-flow min-cut theorem, the maximum flow is associated with a minimum capacity cut of equal value, and the latter observation implies that both the flow value in X \ {f } and the corresponding cut capacity in the new network Hσs(a) (S, T ) is less, than the flow value in X and its corresponding cut capacity in Hσs(b) (S, T ), by ǫ. This implies that X \ {f } is a maximum flow in Hσs(b) (S, T ). The final property follows from the particular way in which the maximum flow X in Hσs (S, T ) is constructed. Note that Algorithm 3.2 first computes a flow X0 that maximizes the flow to machines in {i ∈ T | p(σ −1 (i)) ≤ τ ∗ +R−ǫ}, and then augments X0 to a maximum flow in Hσs (S, T ). Suppose to the contrary that there is a path P in Gsσ′ from S to a machine i such that p(σ ′−1 (i)) ≤ τ ∗ +R−ǫ. We know that one can obtain Gsσ′ from Gsσ by reversing the arc directions of all the flow paths in X \X ′ i.e., the paths that were used to update the partial schedule in the while loop. So each arc in P is either i) present in some path of X \ X ′ in the opposite direction, or ii) not present in the paths of X \X ′ in the opposite direction and, therefore, also present in Gsσ . Now consider the residual flow network of the flow X \ X ′ in Hσs (S, T ). It is now easy to see that P is an augmenting path in this residual flow network because p(σ −1 (i)) + ǫ · |{f ∈ X \ X ′ | f sink = i}| = p(σ ′ −1 (i)) ≤ τ ∗ + R − ǫ, and, therefore, c(i) ≥ τ ∗ + R − p(σ −1 (i)) ≥ ǫ · |{f ∈ X \ X ′ | f sink = i}| + ǫ. This, however, contradicts the maximality of the flow X0 computed in the first step of the algorithm. 8 We now have the tools necessary to state our local search algorithm. 3.2 Flow Based Local Search In this section we describe the local search algorithm that takes as input τ ∗ , a partial schedule σ, and a small job j0 ∈ Js \ σ −1 (M ). It outputs a partial schedule σ ′ such that σ ′−1 (M ) = σ −1 (M ) ∪ {j0 }. The algorithm is parameterized by three constants 0 < µ1 , µ2 , δ ≤ 1. They are defined as: ∆ µ1 = min{1, ζ}/4, ∆ (3.1) µ2 = min{δ, ζ}/4,  ∆ √ 3 − 2ǫ − 1 /2. δ= The algorithm maintains certain sets of machines in layers L0 , . . . , Lℓ throughout its execution, where ℓ is some dynamically updated index variable that always points to the last layer. A layer Li is a tuple (Ai , Bi ) where Ai ⊆ Mσs , and Bi ⊆ M , except L0 which is defined to be ({j0 }, B0 ) for some B0 ⊆ M . In addition to layers, the algorithm also maintains a collection of machines {Ii }ℓi=0 that will be disjoint from the machines in L≤ℓ . We will describe the algorithm in a procedural style, and in the course of the execution the algorithm, sets and other variables will be modified. Function calls are specified in the pseudocode assuming call-by-value semantics. Concretely, this means that function calls have no side effects besides the assignment of the returned values at the call site. We abuse notation slightly and use Li to also refer to Ai ∪ Bi (for i = 0, as A0 is not a set of machines, we use L0 to just mean B0 ), so that L≤ℓ refers to a set of machines. For a subset of machines N ⊆ M we use Rσs (N ) denote the set of all machines reachable from vertices N in the graph Gsσ . Note that N ⊆ Rσs (N ) always holds. The description is now found in Algorithm 3.3. We refer to the while loop in Step 3 of Algorithm 3.3 as the main loop of the algorithm. Observe that, in Step 4, Algorithm 3.4 is used a subroutine, which constructs and returns a new layer while potentially modifying the partial schedule σ maintained by Algorithm 3.3. 3.3 Running Time Analysis ∆ The state of the algorithm is defined to be the dynamic tuple S = (σ, ℓ, {Li }ℓi=0 , {Ii }ℓi=0 ) which contains the variables and sets that are maintained by Algorithm 3.3. In the analysis it will be useful to compare quantities before and after certain operations performed by the algorithm, and we will consistently use S and S ′ to refer to the state of the algorithm before and after such an operation. For example, if S and S ′ denote the states of the algorithm before Step 4 and after Step 5 in Algorithm 3.3 respectively, then ℓ′ = ℓ + 1, Iℓ′ ′ = ∅, etc. 3.3.1 Basic Invariants of the Algorithm By observing the description of Algorithms 3.3 and 3.4 we can conclude certain basic properties which will come in handy when reasoning about its running time. Proposition 3.11. Consider some state S of the algorithm. (a) The sets in the collection {Ai }ℓi=1 ∪ {Bi }ℓi=0 ∪ {Ii }ℓi=0 are pairwise disjoint subsets of M . 9 Algorithm 3.3 LocalSearch(τ ∗ , σ, j0 ): Extend the partial schedule σ to include small job j0 . Require: σ is a partial schedule, j0 ∈ Js \ σ −1 (M ). s (Γ(j )). ⊲ Construction of layer L0 1: Set A0 ← {j0 }, B0 ← Rσ 0 2: Set ℓ ← 0 and I0 ← ∅. 3: while ∄ i ∈ B0 such that p(σ −1 (i)) ≤ τ ∗ + R − ǫ do ⊲ Main loop 4: (σ, Aℓ+1 , Bℓ+1 ) ← BuildLayer(σ, {Li }ℓi=0 , {Ii }ℓi=0 ). ⊲ Construction of layer Lℓ+1 5: Set ℓ ← ℓ + 1 and Iℓ+1 ← ∅. 6: while ℓ ≥ 1 and |{i ∈ Aℓ | p(σ −1 (i)) ≤ τ ∗ + R − 1}| ≥ µ2 |Aℓ | do 7: Set I ← {i ∈ Aℓ | p(σ −1 (i)) ≤ τ ∗ + R − 1}. 8: (I0′ , . . . , Iℓ′ , X) ← CanonicalDecomposition(σ, {Li }ℓi=0 , {Ii }ℓi=0 , I). 9: Set Ii ← Ii′ for all 1 ≤ i ≤ ℓ. 10: if ∃ 1 ≤ r ≤ ℓ : |Ir | ≥ µ1 µ2 |Br−1 ∩ Mσb | then 11: Choose the smallest such r. 12: σ ← BigUpdate(σ, {f ∈ X | f ∩ Ir 6= ∅}). 13: σ ← SmallUpdate(σ, Ar−1 , Br−1 ) unless r = 1. 14: Br−1 ← Rσs (Ar−1 ) \ (Ar−1 ∪ L≤r−2 ∪ I≤r−2 ) unless r = 1. 15: Discard all layers with indices greater than r − 1. 16: Set ℓ ← r − 1. 17: end if 18: end while 19: end while 20: Update σ using a path from j0 to i in Gsσ where p(σ −1 (i)) ≤ τ ∗ + R − ǫ. 21: return σ. 22: 23: 24: 25: 26: 27: 28: 29: 30: 31: 32: function CanonicalDecomposition(σ, {Li }ℓi=0 , {Ii }ℓi=0 , I) Let X be the maximum flow in Hσb (B0 ∩ Mσb , I≤ℓ ∪ I). for 1 ≤ i ≤ ℓ − 1 do Augment X to a maximum flow in Hσb (B≤i ∩ Mσb , I≤ℓ ∪ I). end for for 1 ≤ i ≤ ℓ do Set Ii′ to be the collection of sinks used by flow paths from X with sources in Bi−1 end for return (∅, I1′ , . . . , Iℓ′ , X). end function 10 Algorithm 3.4 BuildLayer(σ, {Li }ℓi=0 , {Ii }ℓi=0 ): Construct and return a new layer. 1: Let S ← ∅. 2: while ∃i ∈ M : IsAddableQ(i, σ, {Li }ℓi=0 , {Ii }ℓi=0 , S) do 3: σ ← SmallUpdate(σ, S ∪ {i}, T \ {i}) where T ← M \ (L≤ℓ ∪ I≤ℓ ∪ S). 4: S ← S ∪ {i}. 5: end while 6: Aℓ+1 ← S. s (A 7: Bℓ+1 ← Rσ ℓ+1 ) \ (Aℓ+1 ∪ L≤ℓ ∪ I≤ℓ ). 8: return (σ, Aℓ+1 , Bℓ+1 ). 9: 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: 20: 21: function IsAddableQ(i, σ, {Li }ℓi=0 , {Ii }ℓi=0 , S) ⊲ Decide if i can be added to S if i 6∈ Mσs \ (L≤ℓ ∪ I≤ℓ ∪ S) then return False. end if Set T ← M \ (L≤ℓ ∪ I≤ℓ ∪ S). if |Hσb (B≤ℓ ∩ Mσb , S ∪ {i})| = |Hσb (B≤ℓ ∩ Mσb , S)| + 1 then  if |Hσs (S ∪ {i}, T \ {i})| ≥ |Hσs (S, T )| + p(σ −1 (i)) − (τ ∗ − 1 + R − δ) then return True. end if end if return False. end function (b) For each i = 1, . . . , ℓ, the sets Ai have not been modified since the last time Li was initialized in some execution of Step 4 of Algorithm 3.3. Similarly, for i = 0, the sets A0 and B0 have not been modified since the execution of Step 1. (c) For each i ∈ B≤ℓ , p(σ −1 (i)) > τ ∗ + R − ǫ. (d) For every j ∈ σ −1 (L≤ℓ ) ∩ Js , Γ(j) ⊆ L≤ℓ ∪ I≤ℓ . Proof. (a) For a newly constructed layer Lℓ+1 in Step 4 of Algorithm 3.3, the sets Aℓ+1 and Bℓ+1 satisfy the properties by the construction of the set S and the setting in Step 7 Algorithm 3.4. Further, Iℓ+1 is initialized to the empty set in Step 5 of Algorithm 3.3. In future updates of Bℓ+1 (if any) in Step 14 of Algorithm 3.3, let S and S ′ be the states before Step 13 and after Step 14 of Algorithm 3.3 respectively. From the description of Algorithm 3.2, we see ′ from the that σ −1 (Ar−1 ) ⊇ σ ′−1 (Ar−1 ) = σ ′−1 (A′r−1 ), which then implies that Br−1 ⊇ Br−1 assignment in Step 14. (b) This follows directly from the description of the algorithm. (c) When a new layer Lℓ+1 is constructed during a call to BuildLayer(. . .), at the end of the while loop in Step 2 of Algorithm 3.4, we show in Claim 3.19, that a maximum flow X in Hσs (S, T ) is computed where T = M \ (L≤ℓ ∪ I≤ℓ ∪ S). So we can apply Proposition 3.10(d) and conclude that after the assignment in Step 7, there is no machine i ∈ Bℓ+1 such that p(σ −1 (i)) ≤ τ ∗ + R − ǫ. We can argue in exactly the same way in Steps 13 and 14 of Algorithm 3.3. 11 (d) This follows from Step 7 of Algorithm 3.4 and Step 14 of Algorithm 3.3. Definition 3.12 (Collapsibility of a layer). Layer L0 is collapsible if there is an i ∈ B0 such that p(σ −1 (i)) ≤ τ ∗ + R − ǫ. For ℓ ≥ 1, Lℓ is collapsible if Aℓ contains at least µ2 |Aℓ | machines i such that p(σ −1 (i)) ≤ τ ∗ + R − 1. Note the correspondence between Definition 3.12 and the conditions in Steps 3 and 6 of Algorithm 3.3. Lemma 3.13. At the beginning of each iteration of the main loop of Algorithm 3.3, none of the layers L0 , . . . , Lℓ are collapsible. In particular, for all 1 ≤ i ≤ ℓ, |{i′ ∈ Ai | p(σ −1 (i′ )) ≤ τ ∗ + R − 1}| < µ2 |Ai |. Proof. In the first iteration of the main loop of the algorithm, ℓ = 0, and the statement follows from the condition of the main loop of the algorithm. Assume the statement to hold at the beginning of some iteration of the main loop of the algorithm with the state (σ, ℓ, {Li }ℓi=0 , {Ii }ℓi=0 ). Observe that a new layer Lℓ+1 is created in Step 4 and it is tested for collapsibility in Step 6. Suppose that the while loop in the latter step executes at least once (if it happens infinitely many times, we are done). Let r denote the choice made in Step 11 in the last execution of the step. The layers L0 , . . . , Lr−2 continue to be non-collapsible by induction and Proposition 3.11(b), and layer Lr−1 is not collapsible because execution exits the while loop. Lemma 3.14. At the beginning of each iteration of the main loop of the algorithm, for every 0 ≤ i ≤ ℓ − 1, |Ii+1 | < µ1 µ2 |Bi ∩ Mσb |. Proof. The sets I0 , . . . , Iℓ maintained by the algorithm start out initialized to ∅ in Step 5 of Algorithm 3.3 when the corresponding layer is created. They are modified only within the while loop of Step 6 of Algorithm 3.3 through the computation of the canonical decomposition and assignment in Step 9. Within this loop, in Step 11, the smallest 1 ≤ r ≤ ℓ such that |Ir | ≥ µ1 µ2 |Br−1 ∩ Mσb | is chosen; layers with indices greater than r − 1 are discarded in Step 15; and ℓ is set to r − 1 at the end of the loop in Step 16. Therefore, the claim follows. 3.3.2 Maximum Flows and Canonical Decompositions We now recall some properties about network flows that will be of use later on in the proof our main theorem. For basic concepts related to flows, such as residual flow networks and augmenting paths, we refer the reader to the textbook by Cormen, Leiserson, Rivest and Stein [CLRS09]. Proposition 3.15. Let S ⊆ Mσb and T ⊆ Mσs . Let S ′ ⊆ Mσs and T ′ ⊆ M such that S ′ ∩ T ′ = ∅. (a) Let X be the maximum flow in Hσb (S, T ) and let CX denote the minimum capacity cut corresponding to X i.e., the set of vertices reachable from S in the residual flow network of X. Then, |Hσb (S, T ∪ {i})| > |Hσb (S, T )| for all i ∈ CX \ S. (b) Let Y be the maximum flow in Hσs (S ′ , T ′ ) and let CY denote the minimum capacity cut corresponding to Y . For any i ∈ M \ CY such that i is not used as a sink by a flow path in Y , let the corresponding maximum flow in Hσs (S ′ ∪ {i}, T ′ \ {i}) be Y ′ and minimum capacity cut be CY ′ . Then, CY ⊂ CY ′ and this inclusion is strict. 12 We state some consequences of the description of the procedure CanonicalDecomposition(. . .) in Algorithm 3.3. Proposition 3.16. For a given state S and I ⊆ Mσs , let (I0′ , . . . , Iℓ′ , X) be the tuple returned by CanonicalDecomposition(σ, {Li }ℓi=0 , {Ii }ℓi=0 , I). Then, X is a maximum flow in the network Hσb (B≤ℓ−1 ∩ Mσb , I≤ℓ ∪ I), such that (a) Ii′ is the collection of sinks used by flow paths from X with sources in Bi−1 for all i = 1, . . . , ℓ, and I0′ = ∅, ′ )| = |Hσb (B≤i ∩ Mσb , I≤ℓ ∪ I)|, for all i = 0, . . . , ℓ − 1, and (b) |Hσb (B≤i ∩ Mσb , I≤i+1 ′ ′ )|, for all i = 0, . . . , ℓ − 1. (c) |Hσb (B≤i ∩ Mσb , I≤i+1 )| = |Hσb (B≤i ∩ Mσb , I≤ℓ 3.3.3 Relating Set Sizes within Layers Lemma 3.17. Suppose that 1 ≤ τ ∗ < 2. At the beginning of each iteration of the main loop of the algorithm, |B0 ∩ Mσb | ≥ 1. Proof. After the execution of Step 1 of Algorithm 3.3, |A0 | = 1 and |B0 ∩ Mσb | ≥ 1. The latter inequality follows from the feasibility of CLP (τ ∗ ) and the fact that τ ∗ + R − ǫ ≥ τ ∗ . We omit its proof here since it is similar to Lemma 3.3. In the main loop of the algorithm, consider the first time (if at all) the schedule of big jobs on machines in B0 is altered in Step 12. Then it must be that |I1 | ≥ µ1 µ2 |B0 ∩ Mσb | > 0 from Step 10. Using Proposition 3.16(b) in Step 8, X contains a set of flow paths connecting sources in B0 ∩ Mσb to I1 . Then, Proposition 3.8(b) implies that |B0′ ∩ Mσb′ | < |B0 ∩ Mσb | after Step 12. Then, the condition of the main loop of the algorithm is no longer satisfied since p(σ ′−1 (i)) ≤ τ ∗ + R − 1 ≤ τ ∗ + R − ǫ for some i ∈ B0′ . The condition of the while loop in Step 6 is also not satisfied because ℓ = 0 after Step 16. Therefore, the main loop is exited in this case. Lemma 3.18. At the beginning of each iteration of the main loop of the algorithm, for every 1 ≤ i ≤ ℓ, |Bi ∩ Mσb | > (δ(1 − µ2 ) − 2µ2 ) · |Ai |. Proof. We first prove a general claim which will then ease the proof the lemma. Claim 3.19. The while loop in Step 2 of Algorithm 3.4 that iteratively builds S and modifies σ ∆ satisfies the following invariant, where, T = M \ (L≤ℓ ∪ I≤ℓ ∪ S), as defined in Step 3, and X denotes the maximum flow in the network Hσs (S, T ). ǫ|X| ≥ X i′ ∈S  p(σ −1 (i′ )) − (τ ∗ − 1 + R − δ) , ∀f ∈ X, f sink ∈ Mσb . 13 Proof. Before the first iteration of the while loop, S = ∅ and the statement is vacuously true. Suppose it is true before some iteration for a set S. Let T and X be as in the claim. If i ∈ M is chosen in Step 2 then, from the description of the procedure IsAddableQ(. . .) in Algorithm 3.4, we can conclude that 1. i ∈ Mσs \ (L≤ℓ ∪ I≤ℓ ∪ S), 2. |Hσb (B≤ℓ ∩ Mσb , S ∪ {i})| = |Hσb (B≤ℓ ∩ Mσb , S)| + 1, and  3. |Hσs (S ∪ {i}, T \ {i})| ≥ |Hσs (S, T )| + p(σ −1 (i)) − (τ ∗ − 1 + R − δ) . By the induction hypothesis and the first property, i cannot be a sink of some flow path in X. So, X is a valid flow in Hσs (S ∪ {i}, T \ {i}). Using the third property we therefore conclude that X can be augmented to a maximum flow X ′ in Hσs (S ∪ {i}, T \ {i}) such that X   p(σ −1 (i′ )) − (τ ∗ − 1 + R − δ) , ǫ|X ′ | ≥ ǫ|X| + p(σ −1 (i)) − (τ ∗ − 1 + R − δ) ≥ i′ ∈S∪{i} where the second inequality uses the induction hypothesis. In Step 3, a call to SmallUpdate(. . .) is made. In this call, a maximum flow in Hσs (S ∪ {i}, T \ {i}), say X̄, is computed at the beginning of the while loop in Algorithm 3.2. By using Proposition 3.10(b), we can conclude that a partial schedule σ ′ and a maximum flow X̄ ′ in Hσs′ (S ∪ {i}, T \ {i}) are computed at the of the while loop which satisfy the property  X  −1 ǫ|X̄ ′ | ≥ p(σ ′ (i′ )) − (τ ∗ − 1 + R − δ) . i′ ∈S∪{i} Furthermore, Proposition 3.10(c) implies that f sink ∈ Mσb for all f ∈ X̄ ′ . This is because the vertex capacities of small machine sinks i′ is defined to be τ ∗ + R − p(σ ′−1 (i′ )) in Definition 3.9, p(σ ′−1 (i′ )) > τ ∗ + R − ǫ, and flow paths carry flows of value ǫ. Let L0 , . . . , Lℓ denote the set of layers at the beginning of the current iteration. Fix some 1 ≤ i ≤ ℓ. By Lemma 3.13, |{i′ ∈ Ai | p(σ −1 (i′ )) ≤ τ ∗ + R − 1}| < µ2 |Ai |. Now, consider the iteration (some previous one) in which Li was constructed and let σ (b) be the partial schedule at the end of Step 6 in Algorithm 3.4 during the corresponding call to BuildLayer(. . .). Using Claim 3.19, after the assignments in Steps 6 and 7, X is a maximum flow in Hσs(b) (Ai , Bi ) such that  X  −1 ǫ|X| ≥ p(σ (b) (i)) − (τ ∗ − 1 + R − δ) > δ(1 − µ2 )|Ai | − 2µ2 |Ai |, i′ ∈Ai where we use Lemma 3.13 in the final step along with the bound (τ ∗ − 1 + R − δ) ≤ 2. Now consider −1 a sink f sink ∈ Mσb(b) used by some flow path f ∈ X. By Proposition 3.10(c), p(σ (b) (f ∩ T )) > τ ∗ + R − ǫ. Definition 3.9 states that the vertex capacity c(f sink ) = 1 + τ ∗ + R − p(σ ′−1 (f ∩ T )) − ǫ since f sink ∈ Mσb(b) from Claim 3.19. Thus, c(f sink ) < 1. This proves that at the iteration in which Li was constructed, by flow conservation, |Bi ∩ Mσb(b) | > (δ(1 − µ2 ) − 2µ2 )|Ai |. 14 In the intervening iterations, the variable r in Step 11 of Algorithm 3.3 might have been chosen to be i+1, and, therefore, |Bi ∩Mσb | may have reduced in Step 12 and |{i′ ∈ Ai | p(σ −1 (i′ )) > τ ∗ +R−1}| may have reduced in Step 13. In such an event, all the layers following layer Li would have been discarded in Step 15. But in our current iteration, the set of layers is L0 , . . . , Lℓ . So, it only remains to prove that |Bℓ ∩ Mσb | > (δ(1 − µ2 ) − 2µ2 ) |Aℓ | in the current iteration after one or more events where r was chosen to be ℓ + 1 in the intervening iterations. The claim is true in this case too by arguing as follows. In each intervening iteration, where r was chosen to be ℓ + 1, after Step 12, the partial schedule changes from σ (b) to σ (a) . Due to the way sink capacities were set in Definition 3.9, the new flow network Hσs(a) (Aℓ , Bℓ ) can be obtained from the old flow network Hσs(b) (Aℓ , Bℓ ) by increasing the capacities of the machines Mσb(b) \ Mσb(a) (those machines in Bℓ from which big jobs were moved in Step 12) by ǫ. Using the same arguments as before after applying Lemma 3.13 proves the lemma. 3.3.4 Maintaining Multiple Sets of Disjoint Paths We now prove an invariant of Algorithm 3.3 concerning the updates performed in Step 12 through the statement σ ← BigUpdate(σ, {f ∈ X | f ∩ Ir 6= ∅}). Theorem 3.20. At the beginning of each iteration of the main loop of the algorithm, for every 0 ≤ i ≤ ℓ − 1, |Hσb (B≤i ∩ Mσb , Ai+1 ∪ I≤i+1 )| ≥ |Ai+1 |. Furthermore, at the beginning of each execution of the while loop in Step 6 of Algorithm 3.3, for all 0 ≤ i ≤ ℓ − 1, |Hσb (B≤i ∩ Mσb , Ai+1 ∪ I≤i+1 )| ≥ |Ai+1 |. Proof. Consider the first statement. Before the first iteration of the main loop, there is nothing to prove. Assume the statement to be true at the beginning of iteration u of the main loop for some u ≥ 1. We will now show that the statement holds at the end of iteration u as well. Following Step 4 of iteration u, the newly created layer Lℓ+1 has the property Iℓ+1 = ∅ and b |Hσ (B≤ℓ ∩ Mσb , Aℓ+1 )| = |Aℓ+1 |, by the construction of set S in Step 2 of Algorithm 3.4. For 0 ≤ i ≤ ℓ − 1, the statement holds by the induction hypothesis and the fact that σ was not changed in Step 4 of Algorithm 3.3 in a way that affects the graph Gbσ (indeed, only small jobs are moved). As in Step 5 of the algorithm, we also update ℓ to ℓ + 1 in this proof, and so we have at the end of Step 5, for all 0 ≤ i ≤ ℓ − 1, |Hσb (B≤i ∩ Mσb , Ai+1 ∪ I≤i+1 )| ≥ |Ai+1 |. (3.2) Now iteration u of the main loop could potentially involve one or more iterations of the while loop in Step 6. If there are none, we are done using (3.2). The rest of the proof follows from Claim 3.21 which completes the induction on u, and also proves the second statement in Theorem 3.20. Claim 3.21. At the end of the execution of some iteration of the while loop in Step 6 of Algorithm 3.3, for all 0 ≤ i ≤ ℓ − 1, |Hσb (B≤i ∩ Mσb , Ai+1 ∪ I≤i+1 )| ≥ |Ai+1 |, assuming it holds at the beginning of the same iteration of the while loop. Proof. Assume the statement to be true at the beginning of some iteration of the while loop in question as stated in the hypothesis. We will now show that the statement holds at the end of that iteration as well. 15 ∆ As in Step 7, let I = {i ∈ Aℓ | p(σ −1 (i)) ≤ τ ∗ + R − 1}. In Step 8, we have the statement (I0′ , . . . , Iℓ′ , X) ← CanonicalDecomposition(σ, {Li }ℓi=0 , {Ii }ℓi=0 , I), ′ ) which has the properties which computes a specific maximum flow X in the network Hσb (B≤ℓ−1 , I≤ℓ ′ guaranteed by Proposition 3.16. Recall that the sets Ii are precisely the sinks used by flow paths from X with sources in Bi−1 . Additionally, for the purposes of this proof, define Xi to be the set of flow paths from X that end in sinks Ii′ , for each 1 ≤ i ≤ ℓ. Observe that X = X1 ∪ · · · ∪ Xℓ . Let r be the choice made in Step 11. In the algorithm, in Step 12, observe that only the flow paths Xr are used to modify the partial schedule from σ to σ ′ and therefore also change the graph Gbσ to Gbσ′ . Step 13 does not alter the set Ar−1 , even though it alters the partial schedule σ ′ by moving small jobs. Since it will not be important to consider these updates for the proof of Claim 3.21, which is a statement about the flow network for big jobs, we simply denote by σ ′ the partial schedule at the end of this step. After this update, all layers following layer Lr−1 are discarded in Step 15 and ℓ is updated to r − 1 in Step 16. So, to prove Claim 3.21, we only need to verify that for all 0 ≤ i ≤ r − 2, ′ )| ≥ |Ai+1 |. |Hσb ′ (B≤i ∩ Mσb′ , Ai+1 ∪ I≤i+1 (3.3) Fix i for the rest of the proof. Since 0 ≤ i ≤ r − 2 ≤ ℓ − 2, we have, by hypothesis, |Hσb (B≤i ∩ Mσb , Ai+1 ∪ I≤i+1 )| ≥ |Ai+1 |. So let Y be the maximum flow in Hσb (B≤i ∩ Mσb , Ai+1 ∪ I≤i+1 ), with at least |Ai+1 | flow paths. We now interpret the flow paths X and Y as vertex disjoint paths in Gbσ using Proposition 3.7. For a collection of vertex disjoint paths P in Gbσ let SP ⊆ Mσb and TP ⊆ Mσs denote the set of source and sink vertices respectively used by paths in P . Now, if it happens that SY ⊆ SX≤i+1 then we are done. This is because there must be some X ′ ⊆ X≤i+1 such that X ′ has cardinality at least |SY | = |Y | ≥ |Ai+1 |. Also, i + 1 ≤ r − 1 and therefore the paths Xr used to update the partial schedule σ are disjoint from the paths X ′ and hence, X ′ continues to be present in the new graph Gbσ′ following the update. Our goal is to show this generally in Claim 3.22. Note that it immediately implies that even after updating the partial schedule to σ ′ we will have a collection of at least |Y | ≥ |Ai+1 | many ′ vertex disjoint paths connecting the sources of Y to sinks in Ai+1 ∪ I≤i+1 in Gbσ′ . This proves (3.3) and completes the proof of the claim. Claim 3.22 (Source Alignment Lemma). There is a collection of vertex disjoint paths D in Gbσ such ′ that Xr ⊆ D, SY ⊆ SD\Xr , and each source in SY is connected by D to a sink in Ai+1 ∪ I≤i+1 . Proof. Recall the two sets of disjoint paths X = X1 ∪ · · · ∪ Xℓ and Y we have defined in the graph Gbσ . Paths in Xi connect sources in Bi−1 ∩ Mσb to sinks in Ii′ , whereas paths in Y connect sources from B≤i ∩ Mσb to sinks in Ai+1 ∪ I≤i+1 . We now describe a finite procedure which demonstrates the existence of paths D as in the claim. 16 D ← X. while ∃s ∈ SY \ SD do v ← s. while ¬(v ∈ SD ∨ v ∈ TY ) do if there is an incoming arc of some path p ∈ D at v then Set v to be the previous vertex along p. else if there is an outgoing arc of some path q ∈ Y at v then Set v to be the next vertex along q. end if end while Augment D using the set of edges traversed in the above loop. end while return D. Before we analyze this procedure, we wish to point out that the augmenting step is well-defined. Suppose D and Y are sets of disjoint paths before some iteration of the outer while loop; this is clearly true before the first iteration. Let s ∈ SY \ SD be chosen as the starting vertex for v. If at no point during the execution of the inner while loop, the if condition was satisfied, then it is trivial to see that the augmentation step is well-defined since the set of edges that are traversed in this case simply corresponds to some path y ∈ Y , whose source is s, and whose edges do not intersect with the edges of paths from D. On the other hand, consider the first time the if condition is satisfied. From that point onwards it is easy to see that the inner loop simply traverses the edges of some particular path x ∈ D in reverse order until it reaches the source of x, and the inner loop terminates. Here, we made use of the induction hypothesis that D is a collection of vertex disjoint paths. Therefore, we can conclude that the total set of edges traversed in this case are composed of two disjoint parts: i) edges from the prefix of the path y ∈ Y , whose source is s, followed by ii) edges from the prefix of the path x ∈ D in reverse order. Furthermore, the unique vertex, say v ∗ , at which the two parts have an incoming arc must be a machine vertex (since job vertices in Gbσ have at most one incoming arc and the two parts are disjoint). Also, v ∗ ∈ Mσb since v ∗ 6∈ TY , and the paths y and x must intersect at the unique edge e∗ = (v ∗ , j ∗ ) where j ∗ ∈ Jb : σ(j ∗ ) = v ∗ . Thus, deleting the set of edges traversed in the second part, and adding the set of edges traversed in the first part corresponds to a valid augmentation of D. We now prove that this procedure terminates after finite iterations of the outer while loop. We claim that, in each iteration, either |SY \SD | decreases, or |SY \SD | stays the same and the quantity ∆ Q= XX y∈Y x∈D N (x, y) decreases, where N (x, y) is defined as the total number of non-contiguous intersections between a pair of paths x and y in Gbσ (see Figure 1). Consider a particular iteration of the outer loop. If the if condition is never satisfied during the execution of the inner loop, then, by the arguments above, the number of disjoint paths in D increases after the augmentation, and further the vertex s chosen in the outer loop becomes a new source of D after the augmentation. On the other hand, suppose that the path chosen for augmentation is composed of two parts arising from two paths y ∈ Y and x ∈ D as argued before. Further, let sx be the source of x, and suppose that sx ∈ SY , as otherwise, once again |SY \ SD | decreases after augmenting D. Let y ′ ∈ Y be the path with source 17 x y Figure 1: The number N (x, y) of non-contiguous intersections between the pair of paths x ∈ D and y ∈ Y depicted here is 2. Arcs from Gbσ that are neither present in D nor in Y are shown in black. P P ′ ′ sx . After augmenting D it is seen that ′ N (x, y ) < x∈D N (x, y ), and for all other paths x∈D P P y ′′ ∈ Y \ {y ′ }, x∈D′ N (x, y ′′ ) ≤ x∈D N (x, y ′′ ), thereby proving that the procedure eventually terminates. For an example execution of a single iteration of the outer while loop of the procedure, see Figure 2. At the end of the procedure, we have SY ⊆ SD . As SY ⊆ B≤i , by the invariant of the procedure ′ . that we prove below in Claim 3.23, the paths in D with sources SY end in sinks from Ai+1 ∪ I≤i+1 Also, by Claim 3.23, Xr ⊆ D (because D3 = X≥i+2 ⊇ Xr ) and SY ⊆ SD\Xr (because B≥i+1 ⊇ SD3 ⊇ SXr ), which proves the claim. Claim 3.23 (The D Invariant). D is a collection of vertex disjoint paths in Gbσ which can be partitioned into D1 ∪ D2 ∪ D3 such that: ′ (a) SD1 ⊆ B≤i , TD1 = I≤i+1 , (b) SD2 ⊆ B≤i , TD2 ⊆ Ai+1 , and (c) D3 = X≥i+2 . Proof. Before the first iteration of the algorithm, D is initialized to X≤ℓ and therefore admits the decomposition into D1 = X≤i+1 , D2 = ∅, D3 = X≥i+2 which satisfy all of the above invariants. Notice here that i ≤ r − 2 ≤ ℓ − 2, so that this decomposition is well-defined. Assume the D invariant to hold for a collection of disjoint paths D at the beginning of some iteration of outer while loop. Following the augmentation let D ′ be the resulting collection of 18 y 00 v∗ y0 sy 2 S Y n S D sx Figure 2: There are three blue paths y, y ′ , y ′′ ∈ Y and one red path x ∈ D shown here. Starting from the vertex sy ∈ SY \ SD , the outer while loop of the procedure defined in Claim 3.22 traverses precisely the arcs which are dot-dashed and ends in sx , the source vertex of x, which in this case is the same as the source vertex of y ′ and therefore sx ∈ SY . disjoint paths. Let ∆ ′ D1′ = {p ∈ D ′ | T{p} ⊆ I≤i+1 }, ∆ D2′ = {p ∈ D ′ | T{p} ⊆ Ai+1 }, ∆ ′ }. D3′ = {p ∈ D ′ | T{p} ⊆ I≥i+2 First we prove that D1′ , D2′ , D3′ defines a valid partition of D ′ . As it is clear that the sets ′ . Recall that the augmenting path are disjoint, we only need to prove that TD′ ⊆ Ai+1 ∪ I≤ℓ either ends in a source vertex of D or a sink vertex of Y . In the first case, no new sinks are ′ . In the second case, the augmenting path ends in a sink introduced, i.e., TD′ = TD ⊆ Ai+1 ∪ I≤ℓ ′ from SY ⊆ Ai+1 ∪ I≤i+1 . Potentially this could introduce a sink from the set I≤i+1 \ I≤i+1 . But ′ ℓ in this case the computed canonical decomposition {Ii }i=0 would not be maximal since we now ′ have a collection of |I≤i+1 | + 1 vertex disjoint paths in D ′ with sources from B≤i and sinks in ′ ′ I≤i+1 ∪ I≤i+1 ⊆ I≤ℓ ∪ I. That is, this contradicts the fact that |Hσb (B≤i , I≤i+1 )| = |Hσb (B≤i , I≤ℓ ∪ I)| guaranteed by Proposition 3.16(b). In the remainder of the proof we show that the defined partition of D ′ satisfies the invariants. Since we do not lose any sinks in the augmentation of D to D ′ , by a basic property of flow augmen′ ′ ′ tation, it is true that |D1′ | = |I≤i+1 |, and therefore TD1′ = I≤i+1 . Next, TD2′ ⊆ Ai+1 and TD3′ ⊆ I≥i+2 follow by definition. Since the path used to augment D started from a vertex in SY \SD and SY ⊆ B≤i it is clear that SD1′ , SD2′ ⊆ B≤i unless we encountered a path from D3 during the augmentation process. However, 19 that would lead to a contradiction to the property of the canonical decomposition I1′ ∪ · · · ∪ Iℓ′ that ′ )| (note here again that i+1 ≤ r −1 ≤ ℓ−1) by Proposition 3.16(c). ′ )| = |Hσb (B≤i , I≤ℓ |Hσb (B≤i , I≤i+1 Therefore, we also have that SD1′ , SD2′ ⊆ B≤i . Finally, since we did not encounter any edges of D3 during the augmentation process, we not only have that SD3′ ⊆ B≥i+1 but that D3 = D3′ . 3.3.5 Proportionally Many Options for Big Jobs Theorem 3.24. Suppose that 1 ≤ τ ∗ < 2. At the beginning of each iteration of the main loop of the algorithm, for every 0 ≤ i ≤ ℓ − 1, |Ai+1 | ≥ µ1 |B≤i |. The statement also holds at the beginning of each iteration of the while loop of Step 6 of Algorithm 3.3. Proof. Let L0 , . . . , Lℓ be the set of layers maintained by the algorithm at the beginning of iteration of the main loop. It is sufficient to prove that following the construction of layer Lℓ+1 in Step 4 of Algorithm 3.3, |Aℓ+1 | ≥ µ1 |B≤ℓ |. The rest follows by applying Proposition 3.11(b). Suppose that the set S at the end of the while loop in Step 2 of Algorithm 3.4 is smaller than µ1 |B≤ℓ |. We now describe an assignment of values to the variables (y, z) from the dual of CLP (τ ∗ ) (defined in Section 2.2) in four parts. we will show P Then,P that the final setting of dual variables (ȳ, z̄) obtained in this way satisfies j∈J z̄j − i∈M ȳi > 0, while also respecting the constraints of (2.2). It then follows that the dual of CLP (τ ∗ ) is unbounded because for any λ > 0, (λȳ, λz̄) is a feasible dual solution as well. Therefore, by weak duality, CLP (τ ∗ ) must be infeasible, a contradiction. We now proceed to execute this strategy. Part I: Layers We set positive dual values to all machines that appear in the sets L≤ℓ ∪ I≤ℓ , and the corresponding jobs, as follows:  −1 (  R − δ, ∃i ∈ L≤ℓ : j ∈ σ (i) ∩ Jb , τ ∗ , i ∈ L≤ℓ ∪ I≤ℓ , (1) (1) zj = ǫ, yi = ∃i ∈ L≤ℓ : j ∈ σ −1 (i) ∩ Js ,  0, else.  0, else. The objective function of the assignment (y (1) , z (1) ) can be lower bounded as: X (1) X (1) zj − yi ≥ (2R − δ − ǫ − 1)|B≤ℓ | − τ ∗ |I≤ℓ | − (1 − µ2 )(1 − R)|A≤ℓ | − µ2 τ ∗ |A≤ℓ |. j∈J i∈M Let us explain the lower bound. For each machine i ∈ B≤ℓ , p(σ −1 (i)) > τ ∗ + R − ǫ from PropoP (1) (1) sition 3.11(c). This allows us to derive j∈σ−1 (i) zj − yi > τ ∗ + R − ǫ − (1 − (R − δ)) − τ ∗ = P (1) (1) 2R−δ −ǫ−1. For the machines i ∈ I≤ℓ , we have the trivial lower bound j∈σ−1 (i) zj −yi ≥ −τ ∗ . P (1) (1) Next, for each machine i ∈ A≤ℓ such that p(σ −1 (i)) > τ ∗ − 1 + R, we have j∈σ−1 (i) zj − yi ≥ 20 (CX [ Mσs ) n (M (1) [ S) e S i CX B≤` \ Mσb Figure 3: The cut CX arising from the flow X, whose paths are colored red, in the flow network Hσb (B≤ℓ ∩ Mσb , S) is shown here. All machines except those inside dotted circles are big machines. Every big machine is matched to a distinct big job except for the machine with the outgoing machine-job arc e, which crosses CX . The matching edges are dot-dashed and i has unit capacity. τ ∗ − 1 + R − τ ∗ = −1 + R, whereas for the rest of the machines in A≤ℓ , we use the trivial lower bound −τ ∗ . Thus, using Lemmas 3.13 and 3.14, we have X (1) X (1) zj − yi ≥ (2R − δ − ǫ − 1 − τ ∗ µ1 µ2 ) |B≤ℓ | − (1 − µ2 )(1 − R)|A≤ℓ | − µ2 τ ∗ |A≤ℓ |. (3.4) j∈J i∈M (1) At this point we have assigned a positive zj value to big jobs j assigned by σ to machines in L≤ℓ . However there could potentially be machines i ∈ M \ (L≤ℓ ∪ I≤ℓ ) such that i ∈ Γ(j) as well. Therefore, the current assignment (y (1) , z (1) solution P) does not necessarily constitute a dual feasible ∗ since it might violate the inequality yi ≥ j∈C zj , for a configuration C = {j} ∈ C(i, τ ) consisting ∆ of a single big job. We now fix this in the next part. For convenience, let M (1) = L≤ℓ ∪ I≤ℓ . Part II: Approximate Matchings Consider the flow network of big jobs Hσb (B≤ℓ ∩ Mσb , S) that was used to construct the set S. By the construction of the set S in the algorithm, there is a flow X in this network of value |S|. This flow naturally defines a minimum capacity cut: the cut CX is defined as the set of reachable jobs and machines from B≤ℓ ∩ Mσb in the residual flow network ∆ corresponding to X in Hσb (B≤ℓ ∩ Mσb , S). Let M (2) = (CX ∩ Mσb ) \ M (1) . We extend the assignment (y (1) , z (1) ) described in the first part in the following way. ( ( R − δ, ∃i ∈ M (2) : j ∈ σ −1 (i) ∩ Jb , R − δ, i ∈ M (2) , (2) (2) zj = yi = 0, else. 0, else. The capacity of the cut CX is |S| by the max-flow min-cut theorem. This in particular implies that no job-machine arcs can cross this cut as such arcs have infinite capacity. In other words, the only arcs crossing CX are machine-job arcs and machine-supersink arcs where the machine arises from S (recall that sink vertices have vertex capacity 1 in Hσb (B≤ℓ ∩ Mσb , S) according to Definition 3.6). 21 ρ ← σ. U ← S. V ← M \ (M (1) ∪ U ). Y ← Maximum flow in Hσs (U, V ). CY ← Mincut corresponding to Y in Hσs (U, V ). while ∃ i ∈ (CX ∩ Mρs ) \ (M (1) ∪ CY ) do Augment Y to a maximum flow in Hρs (U ∪ {i}, V \ {i}). ⊲ This is well-defined s CY ← Mincut corresponding to Y in Hρ (U ∪ {i}, V \ {i}). for f ∈ Y : the sink of f belongs to ((CX ∩ Mρs ) \ (M (1) ∪ CY )) do Update ρ by using the flow path f . Y ← Y \ {f }. end for ⊲ CY is still the mincut corresponding to Y U ← U ∪ {i}. V ← V \ {i}. end while return CY Figure 4: Mincut Growing Procedure For every big machine i that is present in CX , the corresponding big job assigned to i by σ is also present in CX with the exception of at most |S| big jobs as shown in Figure 3 (corresponding to the machine-job arcs that cross the cut CX ). Therefore, the total loss incurred in this step is at most |S|. In other words, X (2) X (2) zj − yi ≥ −(R − δ)|S|. (3.5) j∈J i∈M Part III: Growing Mincuts In this part and the next, we assign positive dual values to machines in S, machines in (CX ∩ Mσs ) \ M (1) , and some other machines, to complete the description of our dual assignment. To make such an assignment, we will use the algorithm described in Figure 4 in the analysis. The properties of the above procedure that we require in the proof are encapsulated in the following claim which we will prove inductively. Claim 3.25. The while loop of the above procedure maintains the following invariants. (a) ρ is a partial schedule. (b) Y is a maximum flow in Hρs (U, V ) and CY is the corresponding mincut. (c) The value of maximum flow Y can be upper bounded as X |Hρs (U, V )| ≤ (τ ∗ + R)|S| + (p(ρ−1 (i)) − (τ ∗ − 1 + R − δ)). i∈U \S (d) There is no flow path f ∈ Y that ends in a sink belonging to (CX ∩ Mρs ) \ (M (1) ∪ CY ). (e) For each i ∈ (CX ∩ Mρs ) \ (M (1) ∪ CY ), |Hρs (U ∪ {i}, V \ {i})| < |Hρs (U, V )| + (p(ρ−1 (i)) − (τ ∗ − 1 + R − δ)). 22 CY 0 g Y 00 C Ys P i0 i CX I = (CX \ Mρs0 ) n (M (1) [ CY 0 ) 0 ∆ Figure 5: The induction step in the proof of Claim 3.25. For an i ∈ (CX ∩ Mρss ) \ (M (1) ∪ CYs ), Y ′ is the maximum flow in Hρss (Us ∪{i}, Vs \{i}) shown in blue. It is partitioned as Y ′′ ∪P . The direction of the arcs in P is reversed, as shown in red, during the for loop from the procedure defined in Part III. The mincuts corresponding to the flows Y ′ and Ys obey the inclusion CY ′ ⊃ CYs . Proof. Before the first iteration of the while loop, Claim 3.25(c) is satisfied because U = S and ρ = σ is a partial schedule; Claim 3.25(d) is satisfied because Y is a flow that has the properties guaranteed by Claim 3.19; Claim 3.25(e) follows from the fact that the while loop in Step 2 of Algorithm 3.4 was exited. The last claim needs some more explanation. Note that every i ∈ (CX ∩ Mσs ) \ (M (1) ∪ CY ) satisfies the following two properties: • i ∈ Mσs \ (L≤ℓ ∪ I≤ℓ ∪ S), and • |Hσb (B≤ℓ ∩ Mσb , S ∪ {i})| = |Hσb (B≤ℓ ∩ Mσb , S)| + 1. The second property follows from Proposition 3.15(a) because i ∈ CX . Therefore, for all such i, it must be the case that Hσs (S ∪ {i}, T \ {i}) < Hσs (S, T ) + p(σ −1 (i)) − (τ ∗ − 1 + R − δ) . Suppose that the statement is true until the beginning of some iteration of the while loop. Let Ys be the maximum flow in Hρss (Us , Vs ) and CYs be the corresponding minimum cut maintained by this procedure. We now show it holds at the end of that iteration as well. Let the machine chosen in this iteration be i ∈ (CX ∩Mρss )\(M (1) ∪CYs ). The augmentation step is well defined because Ys is a flow in Hρss (Us , Vs ) that does not use any flow path with a sink belonging to (CX ∩Mρss )\(M (1) ∪CYs ) as guaranteed by Claim 3.25(d). Therefore, Ys is also a feasible flow in Hρss (Us ∪ {i}, Vs \ {i}), which can be augmented to a maximum flow in that network, say Y ′ . Let CY ′ be the corresponding mincut that is computed in the procedure. We remark that CYs ⊂ CY ′ where the inclusion is strict, because i ∈ CY ′ \ CYs , which follows from Proposition 3.15(b). We use this fact later. The execution now enters a for loop that modifies the flow Y and the partial schedule ρ maintained by the procedure, which currently assume the values Y ′ and ρs respectively. Let Y ′′ ⊆ Y ′ ∆ and ρ′ be the state of Y and ρ at the end of the for loop respectively, so that P = Y ′ \ Y ′′ is precisely the set of flow paths used to update the partial schedule ρ maintained by the procedure. It is seen that the Gsρ′ is obtained from the graph Gsρs by reversing the directions of the arcs contained in the paths of P . For an illustration, see Figure 5. 23 As only flow paths P ⊆ Y ′ ending in small machine sinks were used to update ρ, ρ′ is still a partial schedule (recall that Y ′ is a flow in the network Hρss (Us ∪ {i}, V \ {i})), which proves Claim 3.25(a). We also claim that Claim 3.25(b) holds. Claim 3.26. Y ′′ is a maximum flow in Hρs′ (Us ∪ {i}, Vs \ {i}) and CY ′ is the corresponding minimum cut. Proof. The first part is true, because, after every single iteration of the for loop, the value of the flow Y decreases by ǫ and so does the capacity of the arcs in Hρs (U ∪ {i}, V \ {i}) crossing the cut CY ; since the value of the flow Y ′ was equal to the capacity of the minimum cut CY ′ before the for loop, by the max-flow min-cut theorem, the claim follows (we apply the converse of the max-flow min-cut theorem at the end). The second part is true as well, because the set of vertices reachable from Us ∪ {i} in the reduced flow network corresponding to the flow Y ′ in Hρss (Us ∪ {i}, Vs \ {i}) (defined to be CY ′ ) is the same as the set of vertices reachable from Us ∪ {i} in the reduced flow network corresponding to the flow Y ′′ in Hρs′ (Us ∪ {i}, Vs \ {i}). Next, using Claims 3.25(e) and 3.25(c), we see that (i)) − (τ ∗ − 1 + R − δ)) |Hρss (Us ∪ {i}, Vs \ {i})| < |Hρss (Us , Vs )| + (p(ρ−1 | s {z } (∗) ≤ (τ ∗ + R)|S| + = (τ ∗ + R)|S| + X i′ ∈Us \S ′ ∗ (p(ρ−1 s (i )) − (τ − 1 + R − δ)) + (∗) X i′ ∈(Us ∪{i})\S ′ ∗ (p(ρ−1 s (i )) − (τ − 1 + R − δ)). In the final equality, note that i 6∈ S because i 6∈ CY ′ and CY ′ ⊇ Us ⊇ S (using the fact mentioned in our earlier remark). In each iteration of the for loop, we saw that the value of the quantities |Hρs (U ∪ {i}, V \ {i})| and p(ρ−1 (i)) reduces exactly by ǫ so that at the end of the for loop, we have |Hρs′ (Us ∪ {i}, Vs \ {i})| ≤ (τ ∗ + R)|S| + X i′ ∈(Us ∪{i})\S (p(ρ′−1 (i′ )) − (τ ∗ − 1 + R − δ)), which proves Claim 3.25(c). At the end of the for loop, Claim 3.25(d) is true as well because for every f ∈ Y ′′ the sink of ∆ f does not belong to I ′ = (CX ∩ Mρs′ ) \ (M (1) ∪ CY ′ ) by the postcondition of the loop, and using Claim 3.26. It only remains to prove Claim 3.25(e). Suppose towards contradiction that there is an i′ ∈ I ′ such that |Hρs′ (Us ∪ {i, i′ }, Vs \ {i, i′ })| ≥ |Hρs′ (Us ∪ {i}, Vs \ {i})| + (p(ρ′ −1 (i′ )) − (τ ∗ − 1 + R − δ)). Let F be some maximum flow in Hρs′ (Us ∪ {i, i′ }, Vs \ {i, i′ }) obtained by augmenting Y ′′ (which is well-defined because Y ′′ does not have flow paths that use vertices in I ′ as sinks). Construct a new flow network H ′ from Hρss (Us ∪ {i, i′ }, Vs \ {i, i′ }) by adding a copy of the vertex i′ and call it i′dummy (with identical neighborhood structure and vertex capacity). Interpret the flow P in H ′ so that none of the flow paths use i′ as as sink (they may use i′dummy however). In the residual flow network corresponding to this flow in H ′ , use the flow paths of F to augment the flow. This is well-defined 24 because of the way the graphs Gsρ′ and Gsρs are related (recall that, to obtain the former from the latter, we just need to reverse the directions of the arcs of paths in P ). It is important to note here that the resulting flow only contains paths and no cycles. Through this process we obtain a flow of value |F | + |P | in the network H ′ . By assumption, |F | + |P | ≥ |Y ′′ | + (p(ρ′ | ′ = |Y | + (∗) −1 (i′ )) − (τ ∗ − 1 + R − δ)) +|P | {z } (∗) = |Ys | + fi + (∗). The first equality follows from the definition of P ; the second equality follows from the fact that Ys was augmented in the flow network |Hρss (Us ∪ {i}, Vs \ {i})| to Y ′ so that Y ′ has exactly fi value flow paths with sources at i, and |Ys | value flow paths with sources in Us (here we make use of the fact that Ys is a maximum flow). Therefore, we have a flow of value at least |Ys | + fi + (∗) in the network H ′ . Since the latter flow was constructed by augmenting maximum flows, we can deduce that the it is composed of |Ys | value flow paths originating at Us , fi value flow paths originating at i and the rest originating at i′ . Deleting all flow paths leading to i′dummy , we have a resulting flow of value at least |Ys | + fi + (∗) − li′ , where li′ is the value of flow paths in P that end in i′ . Owing ′ to the way in which we updated ρ in the for loop, we can see that li′ = p(ρ′−1 (i′ )) − p(ρ−1 s (i )). −1 ′ ∗ Therefore there is a flow of value at least |Ys | + (p(ρs (i )) − (τ − 1 + R − δ)) in the network Hρss (Us ∪ {i′ }, Vs \ {i′ }), which then implies |Hρss (Us ∪ {i′ }, Vs \ {i′ })| ≥ |Hρss (Us , Vs )| + (p(ρs −1 (i′ )) − (τ ∗ − 1 + R − δ)), contradicting Claim 3.25(e). Returning to our proof, we now run this procedure with one modification: we add i to the set U maintained by the procedure only if, in addition to the condition in the while loop, the new set CY′ would have a size at least |CY | + 2. Let ρf and CY,f be the reallocation policy and the cut at the end of the exeuction of this modified procedure. We have as a postcondition that executing the body of the while loop once with an i ∈ (CX ∩ Mρsf ) \ (M (1) ∪ CY,f ) would result only in a set of size |CY,f | + 1 (note that i would be the new element in that case). Extend the dual assignment as follows. ( ( ∗, ǫ, j ∈ ρ−1 τ i ∈ C , Y,f (3) (3) f (i) ∩ Js : i ∈ CY,f , zj = yi = 0, else. 0, else. We now need to bound the total loss incurred in this part of the proof. Suppose the while loop in the procedure executes t ≥ 0 times. Let Uf , Vf , and Yf be the state of the (remaining) variables at the end of the procedure. For convenience assume that Uf = S ∪ {i1 , . . . , it }, where the numbering follows the order in which the machines are added to the variable U in the while loop. By Claim 3.25(b), Yf is a maximum flow in Hρsf (Uf , Vf ) and CY,f is the corresponding mincut. ∆ ∆ Let P = (CY,f \ Uf ) ∩ Mρsf and Q = CY,f ∩ Mρbf . Since the size of the mincut in the variable CY increased by at least 2 in each iteration, we have at the end that |P | + |Q| ≥ t. By the max-flow min-cut theorem, the value of the maximum flow equals the capacity of the 25 minimum cut, and therefore, by Claim 3.25(c), t X ∗ (p(ρ−1 (τ + R)|S| + f (ij )) − (τ − 1 + R − δ)) ∗ j=1 X > ci + X X (τ ∗ + 1 + R − p(ρ−1 (τ ∗ + R − p(ρ−1 f (i)) − ǫ), f (i))) + i∈Q i∈P i∈S∪{i1 ,...,it }∪P ∪Q where ci is the total capacity of machine-job arcs with i as one endpoint crossing the minimum cut CYf . The terms on the left together upper bound the value of maximum flow in the final network Hρsf (Uf , Vf ), whereas the terms on the right count the contributions to the minimum cut arising from machine-job arcs and machine-sink arcs. Splitting the first sum on the right, t X ∗ (p(ρ−1 (τ + R)|S| + f (ij )) − (τ − 1 + R − δ)) ∗ j=1 > X ci + i∈S X ci + i∈{i1 ,...,it }∪P X ci + i∈Q X X (τ ∗ + 1 + R − p(ρ−1 (τ ∗ + R − p(ρ−1 f (i)) − ǫ). f (i))) + i∈Q i∈P After rearranging the terms, (τ ∗ + R)|S| − t(τ ∗ − 1 + R − δ) > X i∈S ci − X i∈{i1 ,...,it }∪P (p(ρ−1 f (i)) − ci ) X ∗ − (p(ρ−1 f (i)) − 1 − ci ) + (|P | + |Q|)(τ + R) − |Q|ǫ, i∈Q we derive X − ci + i∈S X i∈{i1 ,...,it }∪P (p(ρ−1 f (i)) − ci ) + X (p(ρ−1 f (i)) − 1 − ci ) i∈Q > −(τ ∗ + R)|S| + t(τ ∗ − 1 + R − δ) + (|P | + |Q|)(τ ∗ + R) − |Q|ǫ ≥ −(τ ∗ + R)|S| + t(τ ∗ − 1 + R − δ) + (|P | + |Q|)(τ ∗ + R − ǫ). (3.6) We demonstrate that the assignment (y (3) , z (3) ) amortizes itself locally using (3.6). 26 X (3) X (3) zj − yi j∈J i∈M X = i∈S∪{i1 ,...,it }∪P ≥− | X ci + i∈S (p(ρ−1 f (i)) − ci ) + X (p(ρ−1 f (i)) i∈{i1 ,...,it }∪P X i∈Q ∗ (p(ρ−1 f (i)) − 1 − ci ) − τ (|S| + t + |P | + |Q|) − ci ) + {z X i∈Q ∗ (p(ρ−1 f (i)) − 1 − ci ) −τ (|S| + t + |P | + |Q|) } (3.6) > −(τ ∗ + R)|S| + t(τ ∗ − 1 + R − δ) + (|P | + |Q|)(τ ∗ + R − ǫ) − τ ∗ (|S| + t + |P | + |Q|) = −(τ ∗ + R)|S| + t(τ ∗ − 1 + R − δ) + (|P | + |Q|)(R − ǫ) − τ ∗ (|S| + t) = −(2τ ∗ + R)|S| + t(R − δ − 1) + (|P | + |Q|)(R − ǫ) ≥ −(2τ ∗ + R)|S| + t(R − δ − 1) + t(R − ǫ) = −(2τ ∗ + R)|S| + t (2R − δ − ǫ − 1) {z } | ≥ 0 follows from Claim A.1 ∗ ≥ −(2τ + R)|S|. (3.7) Part IV: The Rest As noted in Part III, we may now have machines i ∈ (CX ∩Mρsf )\(M (1) ∪CY,f ) that increase the size of the set CY,f described in the previous part by one. Let M (4) denote the set of such machines; note that they must necessarily be a subset of Mσs (which is the same as Mρsf ). By the postcondition of the modified procedure, we deduce that each machine in M (4) has at least τ ∗ − 1 + R − δ processing time small jobs assigned to it by ρf such that each of those jobs can be assigned to only machines in CY,f ∪ M (1) besides itself. Let ∆ (1) }. Si = {j ∈ ρ−1 f (i) ∩ Js | Γ(j) ⊆ {i} ∪ CY,f ∪ M We set the dual values of these machines as follows. (4) yi = (P 0, j∈ρ−1 f (i) (4) zj , i ∈ M (4) , (4) zj else. = ( ǫ, 0, j ∈ Si : i ∈ M (4) , else. The Dual Assignment Before we describe our final dual assignment (ȳ, z̄), let us note that the supports of (y (1) , z (1) ), (y (3) , z (3) ) and (y (4) , z (4) ) are disjoint by construction. Further, observe that the support of (y (2) , z (2) ) may only intersect with the support of (y (3) , z (3) ), and is disjoint from the other two. However, we can assume without loss of generality that they too are disjoint, as machines that receive both positive y (2) and y (3) values will only help us in the later arguments. (3) (2) The reasoning is that, for a machine i such that yi = τ ∗ and yi = R − δ, we will only consider (3) the contribution of yi to the final assignment ȳ in the feasibility whereas we will count both contributions towards the objective function i.e., we prove that the dual objective function of the final assignment is positive even after counting an extra contribution of R − δ for such machines. Note that there can be no jobs in the intersection of the supports of the dual assignments from the second and third parts. So we assume that the supports of the dual assignments from the four parts are disjoint. Set (ȳ, z̄) to be the union of the four assignments in the natural way. 27 P ∗ Feasibility Our assignment (ȳ, z̄) to the dual variables is such that j∈C z̄j ≤ τ for every i ∈ M, C ∈ C(i, τ ∗ ) because z̄j ≤ pj for every j ∈ J. Therefore, the constraints of (2.2) involving machines i for which ȳi = τ ∗ are satisfied. This leaves us to only consider the machines whose dual values were set in Parts II and IV. Let i ∈ M (2) and C ∈ C(i, τ ∗ ). By Proposition 3.11(d), the construction of the cut CY,f (note that infinite capacity job-machine arcs cannot cross this cut), and the dual setting of z (4) (where (4) we assigned positive zj values only to jobs in Si for some i ∈ M (4) ), there can be no j ∈ C ∩ Js such that z̄j > 0. As τ ∗ < 2, there is at most one big job in a configuration. Since it is assigned (4) a dual value of R − δ, all constraints involving such machines are satisifed. P Now let i ∈ M ∗ and ∗ ∗ C ∈ C(i, τ ). Recall that ȳi > τ − 1 + R − δ. If C contains a big job then j∈C z̄j ≤ R − δ + τ − 1. If C does not contain big jobs, then, X X X z̄j = z̄j ≤ z̄j = ȳi . j∈C j∈C:z̄j >0 j∈σ−1 (i) The inequality in the middle deserves explanation. This follows from the assertion that any job j ∈ C ∩ Js such that z̄j > 0 must be part of σ −1 (i) by Proposition 3.11(d), the construction of the cut CY,f , and the dual setting of z (4) . P P Positivity Now that we have described our dual assignment, we show j∈J z̄j − i∈M ȳi > 0 by counting the contributions to the objective function from the dual variable settings in each of the four previous parts. From (3.4) and (3.5), the total gain in the first and second part is at least (2R − δ − ǫ − 1 − τ ∗ µ1 µ2 ) |B≤ℓ | − (1 − µ2 )(1 − R)|A≤ℓ | − µ2 τ ∗ |A≤ℓ | − |S|. In the third part, using (3.7), the total loss is at most (2τ ∗ + R)|S|. In the fourth part there is no net loss or gain. So, we can lower bound the objective function value of our dual assignment (ȳ, z̄) as follows, making use of Lemma 3.17 and Lemma 3.18 in the second inequality. X X z̄j − ȳi j∈J i∈M ≥ (2R − δ − ǫ − 1 − τ ∗ µ1 µ2 ) |B≤ℓ | − (1 − µ2 )(1 − R)|A≤ℓ | − µ2 τ ∗ |A≤ℓ | − |S| − (2τ ∗ + R)|S| ≥ (2R − δ − ǫ − 1 − τ ∗ µ1 µ2 − (1 + 2τ ∗ + R)µ1 ) |B≤ℓ | − (1 − µ2 )(1 − R)|A≤ℓ | − µ2 τ ∗ |A≤ℓ | ≥ (2R − δ − ǫ − 1 − τ ∗ µ1 µ2 − (1 + 2τ ∗ + R)µ1 ) (δ(1 − µ2 ) − 2µ2 ) · |A≤ℓ | − ((1 − µ2 )(1 − R) − µ2 τ ∗ ) |A≤ℓ |   ≥ (2R − δ − ǫ − 1 − τ ∗ µ1 µ2 − (1 + 2τ ∗ + R)µ1 ) (δ(1 − µ2 ) − 2µ2 ) − (1 − µ2 )(1 − R) − µ2 τ ∗ |A≤ℓ |. | {z } (∗) Subtituting the values of R, µ1 , µ2 , δ as defined in the statement of Theorem 1.1 and (3.1), one can verify (see Claim A.1) that the bracketed expression (∗) is strictly positive for every 1 ≤ τ ∗ < 2, 0 < ǫ < 1 and ζ > 0. 3.3.6 Polynomial Bound on Loop Iterations Corollary 3.27. Suppose 1 ≤ τ ∗ < 2. In each execution of the while loop in Step 6 of Algorithm 3.3, the if condition in Step 10 is satisfied. 28 Proof. Consider the beginning of some iteration of the while loop in Step 6 of Algorithm 3.3 with ∆ a state S. By the condition in Step 6, ℓ ≥ 1 and |I| ≥ µ2 |Aℓ |, where I = {i ∈ Aℓ | p(σ −1 (i)) ≤ τ ∗ + R − 1}. Applying Theorem 3.20, |Hσb (B≤ℓ−1 ∩ Mσb , Aℓ ∪ I≤ℓ )| ≥ |Aℓ |. Since |I| ≥ µ2 |Aℓ | and I ⊆ Aℓ this means that |Hσb (B≤ℓ−1 ∩ Mσb , I ∪ I≤ℓ )| ≥ µ2 |Aℓ | ≥ µ1 µ2 |B≤ℓ−1 ∩ Mσb |, where the second inequality follows from Theorem 3.24. By Proposition 3.16(a), at least one of the sets Ii′ computed in Step 8 of Algorithm 3.3 must be of size at least µ1 µ2 |Bi−1 ∩ Mσb | for some 1 ≤ i ≤ ℓ. Given the state S of the algorithm at some point during its execution, the signature of a layer Li is defined as !  i k j 1 ∆ Bi ∩ Mσb + i, si = log 1 1−µ1 µ2 η ∆ where η = (δ(1 − µ2 ) − 2µ2 ) µ1 > 0 by Claim A.2. The signature vector corresponding to the given state is then defined as a vector in the following way: ∆ s = (s0 , . . . , sℓ , ∞). Lemma 3.28. Suppose 1 ≤ τ ∗ < 2. The signature vector satisfies the following properties. (a) At the beginning of each iteration of the main loop of the algorithm, ℓ = O(log |Jb |). (b) The coordinates of the signature vector are well-defined and increasing at the beginning of each iteration of the main loop of the algorithm. Proof. Consider the beginning of some iteration of the main loop of the local search algorithm. Let L0 , . . . , Lℓ be the set of layers maintained by the algorithm. Let 0 ≤ i ≤ ℓ. Observe that from the moment layer Li was constructed until now, Ai remains unmodified (even though the assignment of jobs by σ to machines in Aℓ may have changed). This is because Ai can be modified only if, in some intervening iteration of the main loop, the variable r from Step 11 of Algorithm 3.3 is chosen to be i′ for some i′ ≤ i. But in that case we discard all the layers Li′ , . . . , Lℓ in Step 15 and this includes layer Li as well. Therefore, for 0 ≤ i ≤ ℓ − 1, |Bi+1 ∩ Mσb | Lem 3.18 > (δ(1 − µ2 ) − 2µ2 ) |Ai+1 | Thm 3.24 ≥ (∗) (δ(1 − µ2 ) − 2µ2 ) · µ1 |B≤i | ≥ η|B≤i ∩ Mσb |. The second inequality above uses the fact that the layers L0 , . . . , Lℓ were not modified since construction as argued previously. As the final term in the chain of inequalities above is at least η|Bi ∩ Mσb |, this proves (b). As the sets B0 , . . . , Bℓ are disjoint by construction, |B≤i+1 ∩ Mσb | = |Bi+1 ∩ Mσb | + |B≤i ∩ Mσb | Using (∗) ≥ (1 + η)|B≤i ∩ Mσb |. As |B0 ∩ Mσb | ≥ 1 by Lemma 3.17, ℓ is O(log1+η |Mσb |) = O(log |Jb |), which proves (a). Lemma 3.29. Suppose 1 ≤ τ ∗ < 2. Only poly(|Jb |) many signature vectors are encountered during the execution of Algorithm 3.3. 29 Proof. By Lemma 3.28(a), and the definition of si , each coordinate is at most O(log |Jb |). Lemma 3.28(b) also implies that the coordinates of the signature vector are increasing at the beginning of the main loop. So every signature vector encountered at the beginning of the main loop can be unambiguously described as a subset of a set of size O(log |Jb |). Lemma 3.30. Suppose 1 ≤ τ ∗ < 2. The signature vector decreases in lexicographic value across each iteration of the main loop of the local search algorithm. Proof. Consider the beginning of some iteration of the main loop of the local search algorithm with the state S. So, L0 , . . . , Lℓ are the set of layers at the beginning of the iteration. During the iteration, a single new layer Lℓ+1 is created in Step 4, and zero or more layers from the set {L1 , . . . , Lℓ , Lℓ+1 } are discarded in Step 15. We consider two cases accordingly. • No layer is discarded. Therefore, at the end of this iteration, we will have layers L0 , . . . , Lℓ+1 and we can apply Lemma 3.28(b) at the beginning of the next iteration to prove this claim. Note here that we used the converse of Corollary 3.27 to deduce that the while loop in Step 6 of Algorithm 3.3 did not execute since no layer was discarded. • At least one layer is discarded. During each iteration of the while loop in Step 6, for some 1 ≤ r ≤ ℓ + 1 as chosen in Step 11, the if condition in Step 10 is satisfied by Corollary 3.27. Therefore, the size of |Br−1 ∩ Mσb | reduces to at most (1 − µ1 µ2 )|Br−1 ∩ Mσb |, and the (r − 1)th coordinate of the signature vector reduces by at least one, whereas the coordinates of the signature vector of the layers preceding r − 1 are unaffected. In other words, the signature vector at the beginning of the next iteration of the main loop (if any) would be s′ = (s0 , . . . , sr−2 , s′r−1 , ∞), where r ≤ ℓ + 1 and s′r−1 ≤ sr−1 − 1. An immediate corollary of Lemma 3.29 and Lemma 3.30 is that the local search algorithm described in Section 3.2 terminates after poly(|Jb |) iterations of the main loop under the assumption 1 ≤ τ ∗ < 2. Notice, however, that all statements proved in Section 3.3.6 also hold merely given the conclusions of Lemma 3.17 and Theorem 3.24 without necessarily assuming that τ ∗ ∈ [1, 2). 3.4 Proof of the Main Theorem Proof of Theorem 1.1. Let I be the given instance of the (1, ǫ) case of restricted assignment makespan minimization and OPT denote the optimum makespan. Assume for the moment that τ ∗ is known by solving the Configuration LP. If τ ∗ ≥ 2, then the algorithm of Lenstra, Shmoys and Tardos [LST90] for this problem gives an OPT + pmax approximation guarantee, which is of course at most 1.5OPT in this case. Suppose instead that 1 ≤ τ ∗ < 2. Start with a partial schedule σ guaranteed by Lemma 3.3. Let σ and j0 ∈ Js \ σ −1 (M ) denote the input partial schedule and small job to Algorithm 3.3. From its description it is clear that the partial schedule maintained by it is modified either in Step 20 or within the main loop. In the main loop, this occurs in exactly three places: Step 3 of Algorithm 3.4; Steps 12 and 13 of Algorithm 3.3. From Lemma 3.29 and Lemma 3.30, we deduce that the main 30 loop is exited after poly(|Jb |) iterations. Using Proposition 3.10(a), Proposition 3.8(a), and Step 20 of the local search algorithm, the output partial schedule σ ′ therefore satisfies the property σ ′−1 (M ) = σ −1 (M ) ∪ {j0 }. Repeating this algorithm a total of |Js | times yields a schedule of makespan at most τ ∗ + R for I in polynomial time. However, it is not necessary to know τ ∗ in advance by solving the Configuration LP. Suppose that τ ∈ [1, 2) is a guess on the value of τ ∗ . Let A(τ ) denote the following algorithm. Run the procedure outlined above after substituting τ in place of τ ∗ with two modifications to Algorithm 3.3: if |B0 ∩ Mσb | = 0 after Step 1, or if |Aℓ+1 | < µ1 |B≤ℓ | in any execution of Step 4, then terminate the procedure with an error claiming that the guessed value τ < τ ∗ . Suppose A(τ ) returns a schedule during a binary search over the range τ ∈ [1, 2), then it is guaranteed to have makespan at most τ + R. Note that the range of possible values for τ ∗ is discrete (1 + kǫ or kǫ for k ∈ Z). As the running time analysis in Section 3.3.6 of Algorithm 3.3 depends only on conclusions of Lemma 3.17 and Theorem 3.24, A(τ ) is always guaranteed to terminate in polynomial time irrespective of whether a schedule is returned or not. If A(τ ) does not return a meaningful result during the binary search then τ ∗ ≥ 2, and it suffices to return the schedule computed by the algorithm of Lenstra et al. [LST90]. 3.5 Balancing Against Bipartite Matching The approximation guarantee of the local search algorithm from Section 3.2 deteriorates with increasing ǫ. There is however a simple algorithm that performs better for the case of large ǫ. Theorem 3.31. Let 0 < ǫ < 1. The (1, ǫ) case of restricted assignment makespan minimization admits a 2 − ǫ approximation algorithm. Proof. Let OPT denote the makespan of an optimum solution to the input instance. Guess OPT through binary search. Construct a bipartite graph with ⌊OPT/ǫ − 1⌋ small nodes and 1 big node for each machine in the input instance. Each small job is connected by an edge to all the nodes of all the machines it can be assigned to with a finite processing time. Each big job is connected by an edge to all the big nodes of all the machines it can be assigned to with a finite processing time. It is easy to see that there is a perfect matching in this bipartite graph which corresponds to a schedule of makespan at most j k OPT − 1 ǫ + 1 ≤ OPT − ǫ + 1 ≤ OPT + (1 − ǫ)OPT = (2 − ǫ)OPT. ǫ Proof of Theorem 1.2. Run the algorithm in Theorem 1.1 with a parameter ζ ′ on the input instance to obtain a schedule with makespan at most (1 + R(ǫ, ζ ′ ))OPT. Run the algorithm in Theorem 3.31 to get a (2 − ǫ)OPT makespan schedule. The better of the two schedules has an approximation guarantee that is no worse than   √  1 ′ min 1 + ǫ + 3 − 2ǫ + ζ , 2 − ǫ . 2 31 Figure 6: The previous profile of the approximation guarantee as a function of 1 ≤ τ ∗ ≤ 3 and 0 < ǫ ≤ 3/4. The two surfaces making up the profile correspond to the guarantees 2 − ǫ from Theorem 3.31 and 1 + 1/τ ∗ from the algorithm of Lenstra, Shmoys and Tardos [LST90]. The work of Chakrabarty, Khanna and Li [CKL15] provided a 2 − ǫ0 guarantee for some positive ǫ0 > 0, which is indicated as a red dot at the apex of the profile. Suppose that 2 − ǫ ≥ 17/9 + ζ. Then, ǫ ≤ 1/9 − ζ. So, √ √   1 1 ǫ + 3 − 2ǫ + ζ ′ ≤ 1 + ǫ + 3 − 2ǫ 1+ 2 2 1 +ζ =1+ · 2 ǫ=1/9 ′  1 5 + 9 3  + ζ′ = 17 + ζ, 9 for ζ ′ = ζ. 4 Conclusion In this paper we presented a purely flow based local search algorithm for the (1, ǫ)-case of restricted assignment makespan minimization. The guarantees achieved by our algorithm improve significantly over the previous best one due to Chakrabarty et al. [CKL15]. For an illustration of the approximation profile for the problem, see Figures 6 and 7. We remark that the ideas presented in this paper do not crucially depend on the fact that the instances contain exactly two different job sizes. Nevertheless, we have chosen to present our results in the (1, ǫ)-case as there are still certain obstructions which prevent us from achieving 2 − ǫ0 guarantees for the restricted case in general. A second reason is that the algorithm for the case with two different job sizes admits a clean description in terms of maximum flows, as we have seen earlier in Section 3.2. 32 Figure 7: Now, following Theorem 1.2, the worst case guarantee is greatest (roughly 1.89) for instances with τ ∗ = 1 and ǫ ≈ 1/9 as shown in the figure. The third surface arises from the guarantee of 1 + R(ǫ, ζ)/τ ∗ for 1 ≤ τ ∗ < 2 from the proof of Theorem 1.1. References [AFS12] Arash Asadpour, Uriel Feige, and Amin Saberi. Santa claus meets hypergraph matchings. ACM Transactions on Algorithms (TALG), 8(3):24, 2012. 2 [AKS15] Chidambaram Annamalai, Christos Kalaitzis, and Ola Svensson. Combinatorial algorithm for restricted max-min fair allocation. In Proceedings of the Twenty-Sixth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2015, San Diego, CA, USA, January 4-6, 2015, pages 1357–1372, 2015. 2 [BS06] Nikhil Bansal and Maxim Sviridenko. The santa claus problem. In Proceedings of the thirty-eighth annual ACM symposium on Theory of computing, pages 31–40. ACM, 2006. 2, 6 [CKL15] Deeparnab Chakrabarty, Sanjeev Khanna, and Shi Li. On (1, ε)-restricted assignment makespan minimization. In Proceedings of the Twenty-Sixth Annual ACM-SIAM Symposium on Discrete Algorithms, pages 1087–1101. SIAM, 2015. 1, 3, 32 [CLRS09] Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, and Clifford Stein. Introduction to Algorithms (3. ed.). MIT Press, 2009. 12 [EKS08] Tomáš Ebenlendr, Marek Křćal, and Jiří Sgall. Graph balancing: a special case of scheduling unrelated parallel machines. In Proceedings of the nineteenth annual ACMSIAM symposium on Discrete algorithms, pages 483–490. Society for Industrial and Applied Mathematics, 2008. 3 33 [Fei08] Uriel Feige. On allocations that maximize fairness. In Proceedings of the nineteenth annual ACM-SIAM symposium on Discrete algorithms, pages 287–293. Society for Industrial and Applied Mathematics, 2008. 2 [HSS11] Bernhard Haeupler, Barna Saha, and Aravind Srinivasan. New constructive aspects of the lovasz local lemma. Journal of the ACM (JACM), 58(6):28, 2011. 2 [JR16] Klaus Jansen and Lars Rohwedder. On the configuration-lp of the restricted assignment problem. arXiv preprint arXiv:1611.01934, 2016. 3 [LST87] Jan Karel Lenstra, David B Shmoys, and Eva Tardos. Approximation algorithms for scheduling unrelated parallel machines. In Foundations of Computer Science, 1987., 28th Annual Symposium on, pages 217–224. IEEE, 1987. 1, 2 [LST90] Jan Karel Lenstra, David B Shmoys, and Éva Tardos. Approximation algorithms for scheduling unrelated parallel machines. Mathematical programming, 46(1-3):259–271, 1990. 2, 3, 30, 31, 32 [PS12] Lukas Polacek and Ola Svensson. Quasi-polynomial local search for restricted max-min fair allocation. In Automata, Languages, and Programming, pages 726–737. Springer, 2012. 2 [Sve12] Ola Svensson. Santa claus schedules jobs on unrelated machines. SIAM Journal on Computing, 41(5):1318–1341, 2012. 2 [WS11] David P Williamson and David B Shmoys. The design of approximation algorithms. Cambridge University Press, 2011. 2 A Appendix Proof of Lemma 3.3. Consider the bipartite graph G = (M ∪ Jb , E) where there is an edge {i, j} ∈ E if and only if i ∈ Γ(j). A perfect matching in G of size |Jb | corresponds to such a map. If there is no such perfect matching, by Hall’s condition, there is a set S ⊆ Jb such that |NG (S)| < |S|. Consider the following setting (y ∗ , z ∗ ) of variables in the dual of CLP (τ ∗ ). ( ( 1, if i ∈ S, 1, if i ∈ NG (S), ∗ ∗ and zj = yi = 0, else. 0, else. It is now easily verified that (y ∗ , z ∗ ) is a feasible solution to the dual of CLP (τ ∗ ) defined in (2.2). We use here the fact that configurations C ∈ C(τ ∗ , i) for any P machine Pi ∈ M∗ contain at most ∗ ∗ one big job since τ < 2. As the objective function value j∈J zj − i∈M yi attained by this feasible solution (y ∗ , z ∗ ) is strictly positive, it follows that the dual of CLP (τ ∗ ) is unbounded–for any λ > 0, (λy ∗ , λz ∗ ) is a feasible dual solution as well. Therefore, by weak duality, CLP (τ ∗ ) must be infeasible, a contradiction. Proof of Proposition 3.7. By flow decomposition, the maximum flow in Hσb (S, T ) has flow paths p1 , . . . , p|Hσb (S,T )| , each of which sends one unit of flow from some vertex in S to some vertex in T . The flow paths may not share a vertex in T as sinks have unit vertex capacities in Hσb (S, T ) as 34 defined in Definition 3.6. Each machine i ∈ M has at most one outgoing edge with unit capacity in Gbσ due to Definition 3.1(c) and Definition 3.4. So the flow paths may also not intersect in some vertex in M \ T since there is at most one outgoing arc with unit capacity. Similarly, they may not share a vertex in Jb as there is only one incoming arc of unit capacity to a vertex in Jb in Gbσ using Definition 3.1 and Definition 3.4 . Claim A.1. ∀1 ≤ τ ∗ < 2, 0 < ǫ < 1, ζ > 0,   (2R − δ − ǫ − 1 − τ ∗ µ1 µ2 − (1 + 2τ ∗ + R)µ1 ) · (δ(1 − µ2 ) − 2µ2 ) − (1 − µ2 )(1 − R) − µ2 τ ∗ > 0, where µ1 = min{1, ζ}/4, µ2 = min{δ, ζ}/4, δ = √   √ 3 − 2ǫ − 1 /2, and R = ǫ + 3 − 2ǫ /2 + ζ. Proof. The statement is true if it is true for τ ∗ = 2. To prove that the bracketed expression is positive we substitute the values of µ1 , µ2 , δ and R from (3.1) and the statement of Theorem 1.1, and additionally set τ ∗ = 2 to get the statement      √   1  1 √ 1 √ 1 min 2ζ + ǫ + 3 − 2ǫ − 2 3 − 2ǫ − 1 , ζ − 3 − 2ǫ − 1 , ζ − 1 2 2 4 2     √   1 1 √ 1 √ 3 − 2ǫ + 3 min 3 − 2ǫ − 1 , ζ − 3 − 2ǫ + 1 × + 16 4 2       √ √   1 √ 3 − 2ǫ − 1 , ζ + 2ζ + ǫ + 3 − 2ǫ + 10 − 4 4ζ + 3 − 2ǫ − 1 > 0. min{1, ζ} min 2 1 − min 2  Using a standard computer algebra system for eliminating quantifiers over reals, we can verify the truth of the above statement for all 0 < ǫ < 1 and ζ > 0. Claim A.2. ∀0 < ǫ < 1, ζ > 0, where µ2 = min{δ, ζ}/4, and δ = √ δ(1 − µ2 ) − 2µ2 > 0,  3 − 2ǫ − 1 /2. Proof. Substituting the values of µ2 and δ, the statement reads   √ √    1 √ 4 3 − 2ǫ − 1 > 3 − 2ǫ + 3 min 3 − 2ǫ − 1 , ζ . 2 It suffices to verify that statement √ assuming that the min term always evaluates to the first argument, which then reduces to ǫ + 3 3 − 2ǫ > 4. Let f (ǫ) denote the expression on the left. Then, √ f ′ (ǫ) = 1 − 3/( 3 − 2ǫ) is negative over the range [0, 1], f (0) − 4 > 0 and f (1) − 4 = 0. 35
8cs.DS
Causalities of the Taiwan Stock Market Julian Juhi-Lian Ting∗ arXiv:cond-mat/0304132v1 [cond-mat.stat-mech] 6 Apr 2003 No.38, Lane 93, Sec.2, Leou-Chuan E. Rd., Taichung, Taiwan 40312, ROC. (Dated: February 2, 2008) Volatility, fitting with first order Landau expansion, stationarity, and causality of the Taiwan stock market (TAIEX) are investigated based on daily records. Instead of consensuses that consider stock market index change as a random time series we propose the market change as a dual time series consists of the index and the corresponding volume. Therefore, causalities between these two time series are investigated. PACS numbers: 05.45.Tp,89.90.+n,05.40.-a I. INTRODUCTION Physicists are interested in studying stock markets as complex systems. Almost all questions asked can be summarized as searching for price formation theories. Previous researches shown the distribution of price change has pronounced tail distribution in contrast to Gaussian distribution expected. Furthermore, the auto-correlation of price change decays exponentially with a characteristic time scale around 5 minutes. Stock crash or rally have also been identified by physicists as a kind of herd behaviour[1]. Johansen and Sornette considered fitting most stock markets for the bubbles using Landau expansions of the index[2]. They showed evidence that market crashes as well as large corrections are preceded by speculative bubbles with two main characteristics: a power law acceleration of the market price decorated with log-periodic oscillations. For most markets the log-frequency ω/2π is close to unity. However, most data analysis were done for the index of more mature market like S & P 500. Not all market indexes are defined in the same way. Could different weighting methods reach the same conclusion? Will government intervention play a role in the conclusion? Johansen and Sornette further found emergent markets have larger fluctuations. They extended the expansion up to third order and successfully predicted Nikkei raise in the year 2000[3]. However, why do these fluctuations exist? The logperiodic oscillation appeared in a wide class of out of equilibrium dynamic systems, like ruptures in heterogeneous media, historic analysis of earthquakes data, and world population. Canessa tried to establish universality for the exponents from a renormalization group theory[4], and used a stochastic theory to show that the log-periodicities are a consequence of transient clusters introduced by an entropy-like term. As entropy in thermodynamics corresponds to the information in an information theory. The possibility to arrive at the log-periodic oscillation therefore suggests the log-periodic oscillation is a consequence of information exchange between different species of a large system[5]. The effect of volume is less analyzed in the literature. Volume is a measure of market liquidity while index means the price. Gopikrishnan et al.[6] analyzed the statistical properties of number of shares traded of a particular stock at a given time interval from an empirical rule saying that it takes volume to push the index. Bonanno et al.[7] also analyzed the number of shares traded of selected stocks and find a power spectrum of approximately 1/f . In the present work we considered the volume effects of Taiwan stock market (TAIEX). In particular, the causeeffect relation between the volume time series and the index time series is analyzed. Taiwan stock market is one of the largest emerging markets. Johansen and Sornette did not studied it because of availability of trading information. In the present work we tried to make up this missing piece. When people talk about the volume involved, sometimes they mean the number of shares traded, sometimes the amount of money involved. We consider money flow to be more important than share number flow if the whole market is considered, since the person or institute involved should have fixed amount of money. II. BASIC PROPERTIES Taiwan has two stock markets. TAIEX is the major market[8]. TAIEX definition is taken the yearly average of 1966 as 100. All stocks traded are taken into account. ∗ Electronic address: [email protected]; URL: http://www.chez.com/jlting 2 We analyzed our daily data of TAIEX from January 3, 1991 to December 30, 2000, which include 2814 trading days for a ten years period. Intra-day time is treated as continuous. Within our data time, several significant events can be identified. In August 26, 1997, the market reached a local peak 10116.84. The highest index happened at February 17, 2000 with an index 10202.2. The lowest point is at January 7, 1993 with an index 3135.56. In order to compare Taiwan stock market with other countries we need to know some basic properties studied in other markets. The first properties are of course daily index and volume histories. They are plotted in Fig.(1). 10000 9000 8000 7000 TAIEX 6000 5000 4000 3000 920930 940630 960402 971223 991102 971223 991102 date 3500 volume (x 10 8NT$) 3000 2500 2000 1500 1000 500 0 920930 940630 960402 date FIG. 1: Histories of TAIEX daily variations and the corresponding volumes. One of the most studied properties is volatility. It is found to be a good measure for long time behaviour and risk[9]. It is also the key input parameter for all option pricing models. Many different quantitative definitions of volatility are used in the literature. Following Liu et al. we define the price change G(t) as the change in the logarithm of the index, Z(t + ∆t) − Z(t) G(t) ≡ ln Z(t + ∆t) − ln Z(t) ∼ , = Z(t) (1) where ∆t is the sampling time interval. The absolute value of G(t) describes the amplitude of the fluctuation, as shown in Fig. (2). The large values of |G(t)| correspond to the crashes and big rallies. None of the |G(t)| ever be larger than 0.07 because government regulation limited maximum daily changes to 7%. We define the volatility as the average of |G(t)| over a time window T = n · ∆t, i.e., VT (t) ≡ t+n−1 1 X |G(t′ )| , n ′ t =t (2) 3 0.07 0.06 fluctuation |G(t)| 0.05 0.04 0.03 0.02 0.01 0.00 920930 940630 960402 971223 991102 date FIG. 2: Daily fluctuations amplitude, |G(t)|. in which n is the moving window size. Fig. (3) shows the calculated volatility VT (t) for a large averaging window T = 30 days. 0.035 0.030 volatility 0.025 0.020 0.015 0.010 0.005 0.000 921019 940720 960422 980114 991122 date FIG. 3: Volatility history over a time window T = 30 days. Dates are labeled at the centers of the average windows. Fig. (4) shows the probability density function P (VT ) of the volatility for several values of T with ∆t = 1 day. The 10-day data is further fitted with Gaussian distribution in Fig. (5). Apparently the data distribution deviates from the Gaussian curve in many places. The right hand side heel has much higher probability than the Gaussian fit. An important property need to be investigated for any time series analysis is its stationarity. Most empirical analysis assumes the time series to be stationary. A time series is stationary if its mean value and its variance do not vary systematically over time[10]. For TAIEX we choose a window of 1000 trading days, say, and calculate the corresponding mean value and variance. The result is plotted in Fig. (6). We find the averages of both index and volume have clear upward trend, while the variances of index oscillate. The volume average and its variance curves have a turning point around the year 1995, which marks a fundamental change of Taiwan economics. The index curve is further fitted with a linear curve. The slope is 1.6, which means if an investor holds a index portfolio for over 1000 days her expectation to profit is 1.6 point/day. PAnother test for stationarity is based on sample autocorrelation function, ρk = γk /γ0 , in which γk = (Yt − Ȳ )(Yt+k − Ȳ ) is the covariance at lag k. If ρk decays very fast with increasing k, the time series is stationary. The resulting correlogram is plotted in Fig.(7). Apparently, the index time series is more stochastic than the 4 6 days 10 days 21 days 200 180 160 140 probability 120 100 80 60 40 20 0 -20 0.01175 0.02175 0.03175 0.04175 volatility FIG. 4: Volatility distribution for various time windows with ∆t = 30 min. 180 160 140 frequency count 120 100 80 60 40 20 0 -20 0.01175 0.02175 0.03175 0.04175 volatility FIG. 5: Gaussian fit for the volatility distribution for T = 10 days and ∆t = 1 days. volume time series. The results of Fig.(6) and Fig.(7) are consistent. III. CRASHES In this section, we follow Johansen and Sornette to fit the index changes and obtain future trends prediction. However, our analysis differs from theirs in labeling the date. They convert all dates into decimal numbers. We labeled only by trading dates. Our labeling method will be more reliable in dating, since trading days spread irregularly amount years. Johansen and Sornette wrote down the first, second, and third order Landau expansion of the index starting or ending at the historical high tc . The first order expansion reads: p1 (t) ≈ A + Bτ α + Cτ α cos [ω ln (τ ) + φ] . (3) in which τ = |t − tc | is the absolute value of time difference from the critical time of the highest index tc . The parameter φ correspond to the time unit used, while the parameter A, B,and C are units determined by the index as 5 (a) index average volume average 3 8x10 3 7x10 3 TAIEX or Volume 6x10 3 5x10 3 4x10 3 3x10 3 2x10 3 1x10 910901 930113 940528 951010 970221 980706 date 2.4 2.2 (b) index variance volume variance 2.0 1.8 variance (x 10 6) 1.6 1.4 1.2 1.0 0.8 0.6 0.4 0.2 0.0 910901 930113 940528 951010 970221 980706 date FIG. 6: Stationarity test for TAIEX with a window size T = 1000 days for (a) average of the index and the corresponding volume (b) variance of the index and the corresponding volume. The window is labeled by its central date. well as the historical period. Only tc , α, and ω are the key parameters: α stands for the power law acceleration, while ω quantifies for the log-periodic oscillation. Numerically, A is roughly the index at tc . Our fitting start from January 7, 1993 to February 17, 2000. The result is shown in Fig.(8). The fitting does not appears good, since it is only a first order approximation while the fitting period is about 7 years. There exits a fitting solution with tc far beyond the highest index point. However, we cannot take that solution because it is obviously incorrect. The fitted tc has to come before the highest point. A theory will only be useful if it can also predict for the future. We used the same equation to fit from February 17,2000 in Fig.(9). We find the future is promising. However, in both cases the ω were found to be much higher than the previous authors’. IV. CAUSALITY TEST It is well known to the practitioner, as an empirical rule, that volume changes come before price change. A rule of thumb is that higher index will come after huge volume, and if the volume is reaching a minimum the bottom of the index will not be far. However, how much ahead? What kinds of correlation do they posses? Why is there a lag? This kind of dual series with one influencing the other has been analyzed in the econometric literature for GNP (gross national product)-money supply relation, for example[10, 11]. It is called causality as in the literature of physics. We have already known our time series are non-stationary. In order for the causality test to be meaningful, the two time series have to be cointegrated, i.e. their wave-lengths of variation have to be of the same order. Fig.(6)(b) and Fig.(7) 6 1.05 1.00 0.95 index Correlogram 0.90 0.85 0.80 0.75 0.70 volume 0.65 0.60 0 10 20 30 40 50 lag (k) FIG. 7: Correlogram plot for both index and the corresponding volume time series. 20000 TAIEX 10000 9000 8000 7000 6000 5000 4000 3000 2000 500 1000 1500 2000 2500 date FIG. 8: TAIEX fit by first order Landau expansion of the index starting from January 7,1993 to February 17,2000. Fitted parameters are: tc = 2147.999, α = 1.276, ω = 11.013, φ = 7.037, A = 8250.314, B = −0.49, and C = −0.236. show their time scale differs but not far. In the econometrics literature a linear functional form is used for the regression of these two time series. Furthermore, because the future cannot cause the past, we can write down a functional form for the future index, It and the future trading volume, Vt , as P P (4) It = i ai Vt−i + j bj It−j + ut P P (5) Vt = i li Vt−i + j kj It−j + vt . We fitted for 90-days from the history using the above functional form. The result is plotted in Fig.(10). Both the index fitting and the volume fitting show stronger dependence on the index history than on the volume history. However, only the previous trading day shows significance. Another plot is made for the index difference and the corresponding volume for the future index difference, It and the future trading volume, Vt , as P P (6) δIt = i ai Vt−i + j bj δIt−j + ut P P (7) Vt = i li Vt−i + j kj δIt−j + vt . The result is plotted in Fig.(11). The figure suggests the index difference time series indeed received slightly higher 7 11000 10000 9000 TAIEX 8000 7000 6000 5000 4000 50 100 150 200 250 date FIG. 9: TAIEX fit by first order Landau expansion of the index starting from February 17, 2000. Fitted parameters are: tc = −0.491, α = 1.106, ω = 12.650, φ = 5.558, A = 9776.675, B = −9.079, and C = 2.926. influence from the previous index difference and the previous volume. However, these effects are pretty small. Furthermore, these peaks will be changed with the truncation of the time series. V. CONCLUSION We tried to find the correlation between the volume of transactions involved and stock market fluctuations beyond simply considering temporal price series, using Taiwan stock market as an example in the present work. We find TAIEX volatility spread relatively uniformly in the past ten years, which can also be found in the stationarity test. The distribution of price change shows fat-heel behaviour. A slightly higher influence coefficient is found in the index difference fitting with previous index and previous volume. Johansen and Sornette’s result suggests us to try regression with log-periodic functional forms in the future. However, it does not seem meaningful to go beyond 90-days for the time lag, since companies will have their seasonal reports by that time. [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] Victor M. Eguiluz and Martin G. Zimmermann, Phys. Rev. Lett., 85, 5659 (2000). A. Johansen and D. Sornette, Int. J. Theor. and Applied. Finance, cond-mat/9810071. A. Johansen and D. Sornette, Int. J. Mod. Phys. C, 10, 563 (1999). E. Canessa, Euro. Phys. J. B, 20, 591 (2001) cond-mat/0008300. E. Canessa, J. Phys. A, 33, 9131 (2000) cond-mat/0012031. P. Gopikrishnan, V. Plerou, X. Gabaix, and H.E. Stanley, Phys. Rev. E, 62, R4493 (2000). G. Bonanno, F. Lillo, and R. N. Mantegna, cond-mat/9912006 Physica A. Official site for TAIEX located at http://www.tse.com.tw , see also http://www.sfi.org.tw/newsfi/intdb/menu/MainFrame.asp?Mitem=E Y. Liu, P. Gopikrishnan, P. Cizeau, M. Meyer, C.-K. Peng and H.E. Stanley, Phys. Rev. E, 60, 1390 (1999). D. N. Gujarati, Basic Econometrics, 3ed, (McGraw-Hill 1995). G. S. Maddala, Introduction to Econometrics, 2ed, (Macmillan Publishing Co. 1992). 8 bj ai 1.2 1.0 index coefficients 0.8 0.6 0.4 0.2 0.0 -0.2 0 20 40 60 80 lag/day 0.8 kj li 0.6 volume coefficients 0.4 0.2 0.0 -0.2 -0.4 -0.6 -0.8 0 20 40 60 80 lag/day FIG. 10: Causality coefficients for index and for volume. 9 bj ai 1 standardized index coefficients 0.3 0.2 79 0.1 0.0 -0.1 -0.2 -0.3 0 20 40 60 80 lag/day kj li 0.6 standardized volume coefficients 0.5 0.4 0.3 0.2 0.1 0.0 -0.1 0 20 40 60 80 lag/day FIG. 11: Causality coefficients for index difference and for the corresponding volume.
5cs.CE
Interactive Generative Adversarial Networks for Facial Expression Generation in Dyadic Interactions Behnaz Nojavanasghari University of Central Florida arXiv:1801.09092v2 [cs.CV] 30 Jan 2018 [email protected] Yuchi Huang Educational Testing Service [email protected] Saad Khan Educational Testing Service [email protected] Abstract A social interaction is a social exchange between two or more individuals, where individuals modify and adjust their behaviors in response to their interaction partners. Our social interactions are one of most fundamental aspects of our lives and can profoundly affect our mood, both positively and negatively. With growing interest in virtual reality and avatar-mediated interactions, it is desirable to make these interactions natural and human like to promote positive effect in the interactions and applications such as intelligent tutoring systems, automated interview systems and e-learning. In this paper, we propose a method to generate facial behaviors for an agent. These behaviors include facial expressions and head pose and they are generated considering the users affective state. Our models learn semantically meaningful representations of the face and generate appropriate and temporally smooth facial behaviors in dyadic interactions. 1. Introduction Designing interactive virtual agents and robots have gained a lot of attention in recent years [10, 21, 43]. The popularity and growing interest in these agents is partially because of their wide applications in real world scenarios. They can be used for variety of applications from education [30, 31], training [36] and therapy [7, 34] to elderly care [5] and companionship [6]. One of the most important aspects in human communication is social intelligence [3]. A part of social intelligence depends on understanding other people’s affective states and being able to respond appropriately. To have a natural human- machine interaction, it is critical to enable machines with social intelligence as well. The first step towards this capability is observing human communication dynamics and learning from the occurring behavioral patterns [33, 32]. In this paper, we focus on modeling dyadic interactions between two partners. The problem we are solving is given the affective Figure 1. The problem we are solving in this paper is, given affective state of one person in a dyadic interaction, we generate the facial behaviors of the other person. By facial behaviors, we refer to facial expressions, movements of facial landmarks and head pose. state of one partner, we are interested in generating nonverbal facial behaviors of the other partner. Figure 1 shows the overview of our problem. The affective states that we consider in generating facial expressions include joy, anger, surprise, fear, contempt, disgust, sadness and neutral. The non-verbal cues that we are generating in this work, are facial expressions and head pose. These cues help us generate head nods, head shakes, tilted head and various facial expressions such as smile which are behaviors that happen in our daily face to face communications. A successful model should learn meaningful factors of the face for generating of most appropriate responses for the agent. We have de- signed our methodology based on the following factors: 1) humans react to each others’ affective states from an early age and adjust their behavior accordingly [42]. 2) Each affective state is characterized by particular facial expressions and head pose[9]. 3) Each affective state can have different intensities, such as happy vs very happy. These factors (e.g. affective state and their intensities) effect how fast or slow or facial expressions and head pose changes over time[9]. There has been great deal of research on facial expression analysis where the effort is towards describing the facial expressions [40]. Facial expressions are a result of movements of facial landmarks such as raising eyebrows, smiling and wrinkling nose. A successful model for our problem, should learn the movements of these points in response to different affective states. We are using FACET SDK for extracting 8-dimensional affective state of one partner in the interaction. We then use it as a condition in generation of non-verbal facial behaviors of the other person. Our generation process relies on a conditional generative adversarial networks [29], where the conditioning vector is affective state of one party in the interaction. Our proposed methodology is able to extract meaningful information about the face and head pose and integrate the encoded information with our network to generate expressive and temporally smooth face images for the agent. 2. Related work Humans communicate using not only words but also non-verbal behaviors such as facial expressions, body posture and head gestures. In our daily interactions, we are constantly adjusting our non-verbal behavior based on other peoples behavior. In collaborative activities such as interviews and negotiations, people tend to unconsciously mimic other people’s behavior [4, 26]. With increasing interest in social robotics and virtual reality and their wide applications in social situations such as automated interview systems [17], companionship for elder care [5] and therapy for autism [7], there is a growing need to enable computer systems to understand, interpret and respond to people’s affective states appropriately. As a person’s face discloses important information about their affective state, it is very important to generate appropriate facial expressions in interactive systems as well. There has been a number of studies focusing on automatic generation of facial expressions. These efforts can be categorized into three main groups: 1) Rule based approaches where affective states are mapped into a predefined 2D or 3D face model [15]. 2) Statistical approaches where face shape is modeled as linear combination of prototypical expression basis [27]. 3) Deep belief networks where the models learn the variation of facial expressions in presence of various affective states and produce convinc- ing samples [39]. While generating facial expressions using previous approaches can result in promising results, it is important to consider other people’s affective states while generating facial expressions in dyadic interactions. There has been previous work in this area, [18] where researchers use conditional generative adversarial networks for generating facial expressions in dyadic interactions. While the proposed approach results in appropriate facial expression for one frame, it does not consider the temporal consistency in a sequence, which results in generating non-smooth facial expressions over time. Also, some of the attributes such as head position and orientation that are important cues for recognizing tilted head, head nods, head shakes are not captured by the model. In this paper, we address the problem of generating facial expressions in dyadic interactions while considering temporal constraints and additional facial behaviors such as head pose. Our proposed model extracts semantically meaningful encodings of the face regarding movements of facial landmarks and head pose and integrate it with the network which results in generation of appropriate and smooth facial expressions. 3. Methodology Generative adversarial networks (GANs) [13] have been widely used in the field of computer vision and machine learning for various applications such as image to image translation [20], face generation [12], semantic segmentation [28] and etc. GANs are a type of generative model which learn to generate based on generative and discriminative networks that are trained and updated at the same time. The generative network tries to find the true distribution of the data and generate realistic samples and the discriminator network tries to discriminate between the samples that are generated by generated and samples from real data. The general formulation of conditional GANs are as follows: min max L (D, G) = Ex,y∼pdata (x,y) [log D(x, y)]+ G D Ex∼pdata (x),z∼pz (z) [log(1 − D(x, G(x, z)))]. (1) Conditional GANs are generative models that learn a mapping from random noise vector z to output image y conditioned on auxiliary information x : G : {x, z} ⇒ y. A conditional GAN consists of a generator G(x, z) and a discriminator D(x, y) that compete in a two-player minimax game: the discriminator tries to distinguish real training data from generated images, and the generator tries to fail the discriminator. That is, D and G play the following game on V (D, G). As you can see the goal of these networks is to increase the probability of samples generated by generative networks to resemble the real data so that the discriminator network Figure 2. Overview of our affect-sketch network. In first stage of our two-stage facial expression generation, we generate face sketches conditioned on the affective state of the interviewee and using a z vector that carries contains semantically meaningful information about facial behaviors. This vector is sampled from generated distributions of rigid and non-rigid face shape parameters using our proposed methods. Figure 3. Overview of our sketch-image network. In the second stage of our two-stage facial expression generation, we generate face images conditioned on the generator sketch of the interviewer which is generated in the first stage of our network. fail to differentiate between the generated samples and the real data. Conditional generative adversarial networks (CGANs) are a type of GAN that generate samples considering a conditioning factor. As our problem is generation of facial expressions conditioned on affective states, we found CGANs as perfect candidate for addressing our problem. We chose to use CGANs to generate facial expressions of one party, conditioned on the affective state of the other partner in a dyadic interaction.The GAN formulation uses a continuous input noise vector z, that is an input to the generator. However, this vector is a source of randomness to the model and does not capture semantically meaningful information. However, using a meaningful distribution which corresponds to our objective and desired facial behaviors, can help the model integrate meaningful information with the network and improve the results of generation. For example, in case of generating facial behaviors, the important factors are the variation in locations of facial landmarks such as smiling and head pose such as tilted head. In this paper, we present a modification to the sampling process of the latent vector z which is an input to the CGAN network. We sample z from the meaningful distributions of facial behaviors that are generated by two different approaches 1) Affect-shape dictionary and 2) Conditional LSTM. This step helps the network to learn interpretable Figure 4. This figure shows 68 landmarks of the face that we intend to generate using our model. In the bottom row you see a visualization of non-rigid shape parameters which correspond to movements of facial landmarks such as opening the mouth. Our model aims to learn the distribution of these parameters and use them in generating temporally smooth sequences. and meaningful representation of facial behaviors. In the next sections we will first explain the two stage architecture of our network. Then we will explain preprocessing of the frames by going over the intuition behind our choice of face representation. Finally, we provide detailed description of our methods for generating distributions for vector z which is the input to our CGAN networks. 3.1. Two-Stage Conditional Generative Adversarial Network To generate facial behaviors for agent, we use a two stage architecture, both of which are based on conditional gener- ative adversarial networks. Figure 2 shows an overview of our first network. In the first stage we use a conditional generative adversarial network which takes face shape parameter as input for vector z as well as the conditioning vector which is the 8 affective states of one partner in the interaction, and it generates sketches of faces for the other partner in the interaction. Note that the z vector will be sampled using one of our proposed strategies, which are explained in the following sections. In the second stage, we input the generated sketches in the first stage as input to GAN and generate the final facial expressions. Figure 3 shows an overview of our second network. 3.2. Data Preprocessing and Face Representation Facial landmarks are the salient points on face located at the corners, tips or midpoints of facial components such as eyes, nose, mouth, etc [41]. Movements of these points form various facial expressions that can convey different affective states. For example, widening the eyes can communicate surprise and a smile can be an indication of happiness. Since the locations of facial landmarks alone are not particularly meaningful in communicating affect but rather their movements and change over time which plays a rule in affect recognition [38], we decided to measure their movements and change over time. To do so, we are projecting a 3D point distribution model on each image. This model has been trained on in the wild data [25]. The following equation is used to place a single feature point of the 3D PDM in a given input image: x̄i = s.R2D .(X̄i + φi q) + t In this equation, s shows scale, R shows the head rotation and t is the head translation which are known as rigid- shape parameters. X̄i = [x̄i , ȳi , z̄i ] is the mean value of i th feature , φi is principle component matrix and q is a matrix controlling the non-rigid shape parameters, which correspond to deviations of landmarks locations from an average (neutral) face. As described, shape parameters of the face carry rich information about head pose and facial expressions. Hence, we use them as our face representations. Figure 4 shows 68 facial landmarks that we have considered in this work. We have also included a visualization of non-rigid shape parameters at the bottom row for better understanding of these parameters. 3.3. Affect-Shape Dictionary Different facial expressions are indicative of different affective states [23]. Depending on the affective state and its intensity, the temporal dynamics and changes in landmarks can happen in various facial expressions such as a smile vs a frown and they can happen slow or fast depending on how intense is the affect [8]. Based on this knowledge, we propose the following strategies to learn meaningful distribu- tions of face shape parameters. Figure 5 shows an overview of our affect-shape dictionary generation. 3.3.1 Affect Clustering While in state of fear landmarks can change very sudden, in state of sadness or neutral the changes in locations of landmarks will be smaller and slower. In order to account for this point, we first cluster the calculated shape parameters for all input frames into 8 clusters, using k-means clustering [14] where clusters denote the following affective states: Joy, Anger, Surprise, Fear, Contempt, Disgust, Sadness and Neutral. This stage gives us distributions of possible facial expressions for each affective state. 3.3.2 Inter Affect Clustering The output of the first clustering step will give us groupings of shape parameters in 8 clusters corresponding to each category of affective states. Each affective state can have various arousal levels (a.k.a intensity)[24]. We did a second level of clustering of shape parameters inside each affect cluster. To do so, we used a hierarchical agglomerative clustering approach [11], where we put the constraint that each cluster should contain at least 100 videos. The result of this clustering gives us 3 to 9 sub clusters corresponding to different arousal levels of each affective state. Having information about the possible facial expressions that can happen in a particular affect category and what has been expressed in previous frames by the agent, we can sample z from an appropriate distribution which results in an expressive and temporally smooth sequence of facial expressions. To account for the temporal constraints, for generating nth frame, we pick z from the appropriate distribution based on the affective state which is the closest to the previously chosen z in terms of euclidean distance. 3.4. Conditional LSTM Long Short Term Memory networks (LSTM) have been known for their ability in learning long-term dependencies [16]. We are interested in learning the dynamics of facial expression, hence LSTMs are an appropriate candidate for our problem. As the problem we are solving is a conditional problem, we will use a conditional LSTM (C-LSTM) [2]. The input to CLSTM will be the concatenated vector of affective state of the interviewer and the shape parameters of the interviewee for n previous frames and the generated output will be the future shape parameters of the interviewee. We fix n to be 100 frames in our experiments. We use conditional LSTMS in two different settings which are described in the following subsections. Figure 6 shows an overview of our C-LSTM approach. Overlapping C-LSTM: In overlapping conditional LSTMS, we consider information across 100 frames as in- Figure 5. Overview of our affect-shape approach for generating clusters of face shape parameters. We first extract shape descriptors for all faces in the dataset. Then we cluster them into 8 affect classes corresponding to Joy, Anger, Surprise, Fear, Contempt, Disgust, Sadness and Neutral. Then, we do a further inter class clustering for each affect class. The purpose of the second clustering is to find the inter affect clusters, such as very joyful, joyful or little joyful.These clusters form the distributions from which the z vector is sampled in our generative models. Figure 6. Overview of our conditional LSTM approach for generating facial shape parameters. In this approach we consider the affective state of the interviewee and past frames of the interviewer’s facial expressions as conditioning vector and previous history. We then learn to generate the future frames of interviewer’s facial expressions using a conditional LSTM. The output result of this generation is the input for z vector in our generative models. put of the model and the output of the model is generation of shape parameters for one future frame. In each step, the newly generated frame is added to the history and the information from the first input frame is removed instead ( in first in, first out manner) , to predict futures frames. 4. Experiments Non-overlapping C-LSTM: In non-overlapping CLSTMs the input to the models is information across 100 frames and the output is generation of shape parameters for future 100 frames, with no overlap between the frames. 4.1. Dataset To assess the effectiveness of our proposed approaches in generating appropriate and temporally smooth facial expressions, we performed a number of experiments using the proposed frameworks approaches. Our experiments show the comparison between our models in terms of result and their pros and cons. The dataset used in this paper is 31 pair of dyadic interactions (videos) which are interviews for undergraduate Figure 7. Examples of generated sketches using both of our approaches. The first sequence corresponds to the result of affect-shape dictionary approach and the second row is generated using the conditional LSTM approach. Overall, our first approach generates smoother sequences. admissions process. The purpose of interviews is to assess English speaking ability of the prospective college. There are 16 male and 15 female candidates and each candidate is interviewed by the same interviewer (Caucasian female) who followed a predetermined set of academic and nonacademic questions designed to encourage open conversation. The interviews were conducted using Skype video conferencing so the participants could see and hear each other and the video data from each dyadic interaction was captured. The duration of interviews varies from 8 to 37 minutes and a total of 24 hours of video data. We have used 70,000 short video clips for training data and 7000 videos for evaluation. 4.2. Affect Recognition Framework For estimating the affective state of the interviewee, we have used Emotients Facet SDK [1] to process the frames and estimate 8- dimensional affect descriptor vectors, representing the likelihood of the following classes: joy, anger, surprise, fear, contempt, disgust, sadness and neutral. 4.3. Implementation Details To create our training set we randomly sampled 70,000 video clips of 100 frames each (3.3 seconds) from the interviewee videos and extracted their affect descriptor using Facet SDK. These affect descriptors are then combined into a single vector using the approach proposed by Huang et al. [18]. For each interviewee video clip a single frame from the corresponding interviewer video is also sampled for training. Our approach is to train the model to generate a single frame of the interviewer conditioned on facial expression descriptors from the preceding 100 frames of the interviewee. All face images are aligned and landmarks are estimated by the method proposed by kazem et al. [22] to generate ground truth face sketches. For creating our test data, we randomly sampled 7000 interviewee video clips of 400 frames each (no overlap with the training set) and used these as input to our two model to generate 7000 facial expression video clips. For training the first stage of our network (affect to sketch), we first estimate the landmarks of the interviewer using the proposed method by Kazemi et al. [22] which gives us 68 facial landmarks (See Figure 4). We then connect these points by linear lines of one pixel width to generate the sketch images. The generated sketches are used in a pair with the corresponding image of the interviewer for training the second network. We masked all training image pairs by an oval mask after roughly aligned all faces, to reduce the effect of appearance and lightening variation of the the face in generating our videos. In the generator, a sketch image is passed through an encoder-decoder network [20] each containing 8 layers of down sampling and up sampling, in order to generate the final image. We have adopted the idea proposed by Ronneberger et al. [37] and have connected feature maps at layer i and layer n-i where n is total number of layers in the network. In this network receptive fields after convolution are concatenated with the receptive fields in up-convolving process, which allows network to use original features in addition to features after upconvolution and results in overall better performance than a network that has access to only features after up-sampling. We adopted the architecture proposed by Radford et. al [35] for our generation framework and deep convolutional structure for generator and discriminator. We used modules of the form convolution-BatchNorm-ReLu [19] to stabilize optimization. In the training phase, we used mini-batch SGD and applied the Adam solver. To avoid the fast con- Figure 8. Examples of generated face images using the second stage of our architecture. The first sequence corresponds to a single step generation without considering the sketches and generating face images directly from the affect vector and noise. The second row shows the results related to generation of faces using our proposed two stage architecture that we have used in our experiments. Note that the quality of images in the second row is much better than the first row. vergence of discriminators, generators were updated twice for each discriminator update, which differs from original setting [35] in that the discriminator and generator update alternately. In order to generate temporally smooth sequences, for each new frame, z is sampled from a meaningful distribution and based on the previous frames. Note that the appropriateness of z for a frame is decided based on the possible variation between two adjacent frames in distribution of face shape parameters training data which correspond to the movements of facial landmarks and head pose. 4.4. Results and Discussions We generated sequences of non-verbal facial behaviors for an agent, based on affect-shape strategy and conditional LSTM. Figure 7 shows the output sketches generated by these two models. The first row corresponds to the affectshape dictionary approach and the second row shows the results based on Conditional LSTM. We observed that the results from dictionary based is more smooth. In results of conditional LSTM there seems to be grouping of smooth sequences followed by sudden jumps between the sequences (In Figure 7 see the transition between last and one before last frame in the second row). We think that this can happen because of number of frames we have considered as history, as in LSTM frameworks all of the history gets summarized and in unrolling step the time steps are not captured accurately and the generation is more based on an average of all frames. We compare the two proposed strategies in Table 1. The advantage of the dictionary based approach is that it does not require previous history of the face and it can run in real time. However, since z is randomly sampled from the possible distribution space, it generates a different sequence each time and it is hard to evaluate this approach. In table 2 we show an evaluation of conditional LSTM approach for generating the facial expressions. We have generated the facial expressions using C-LSTM by considering 100 frames as history and 1) generating the 101 st frame (complete overlap). 2) generating the next 100 frames (No overlap). As this method, tries to generate the closest sequence to ground truth, we have calculated mean squared error as an evaluation metric. As you can see, C-LSTM with 100 frame overlap has a smaller error value compared to the C-LSTM with no overlap. Intuitively, it is harder to predict future with no overlap than having overlap. Properties History Diversity Evaluation Speed Affect-Shape Dictionary No need for history. Generates diverse sequence. Hard to evaluate. Real time Conditional LSTM Needs history. Generates one particular sequence. Easier to evaluate. Not real time Table 1. Comparison between Affect-shape dictionary and conditional LSTM approaches in generating face shape parameters. Method C-LSTM w overlap C- LSTM w/o overlap MSE 0.101 0.183 Table 2. Comparison between performance of conditional LSTMs with and without overlap in history. We have also generated the final face images using our CGAN network. Figure 8 shows the generated images of the interviewer which is the final result of the our second network, sketch-image GAN. The top row shows the results of such images if we only had one network and directly went from affect vector and z into face images. The second row shows the results of a two step network where we first generate face sketches and then face images. Note that quality of the images in second row is significantly better than the first row. Also, as our final goal is to transfer these expressions to an avatar’s face, our mid-level results can be used to transfer the expressions to various virtual characters. 5. Conclusions and Future Work Human beings react to each other’s affective state and adjust their behaviors accordingly. In this paper we have proposed a method for generating facial behaviors in a dyadic interaction. Our model learns semantically meaningful facial behaviors such as head pose and movements of landmarks and generates appropriate and temporally smooth sequences of facial expressions. In our future work, we are interested in transferring the generated facial expressions to an avatar’s face and generating sequences of expressive avatars reacting to the interviewee’s affective state using the proposed approaches in this work. We then will run a user study using pairs of interviewee and generated avatar’s videos to study the most appropriate responses for each video and will use the result in building our final models of emotionally intelligent agents. References [1] imotions inc. manual of emotients Facet SDK. 2013. [2] I. Augenstein, T. Rocktäschel, A. Vlachos, and K. Bontcheva. Stance detection with bidirectional conditional encoding. arXiv preprint arXiv:1606.05464, 2016. [3] R. Bar-On, D. Tranel, N. L. Denburg, and A. Bechara. Emotional and social intelligence. Social neuroscience: key readings, 223, 2004. [4] S. Bilakhia, S. Petridis, and M. Pantic. Audiovisual detection of behavioural mimicry. In Affective Computing and Intelligent Interaction (ACII), 2013 Humaine Association Conference on, pages 123–128. IEEE, 2013. [5] J. Broekens, M. Heerink, H. Rosendal, et al. Assistive social robots in elderly care: a review. Gerontechnology, 8(2):94–103, 2009. [6] K. Dautenhahn, M. Walters, S. Woods, K. L. Koay, C. L. Nehaniv, A. Sisbot, R. Alami, and T. Siméon. How may i serve you?: a robot companion approaching a seated person in a helping context. In Proceedings of the 1st ACM SIGCHI/SIGART conference on Human-robot interaction, pages 172–179. ACM, 2006. [7] K. Dautenhahn and I. Werry. Towards interactive robots in autism therapy: Background, motivation and challenges. Pragmatics & Cognition, 12(1):1–35, 2004. [8] J. Decety, L. Skelly, K. J. Yoder, and K. A. Kiehl. Neural processing of dynamic emotional facial expressions in psychopaths. Social neuroscience, 9(1):36– 49, 2014. [9] P. Ekman. An argument for basic emotions. Cognition & emotion, 6(3-4):169–200, 1992. [10] T. Fong, I. Nourbakhsh, and K. Dautenhahn. A survey of socially interactive robots. Robotics and autonomous systems, 42(3):143–166, 2003. [11] P. Franti, O. Virmajoki, and V. Hautamaki. Fast agglomerative clustering using a k-nearest neighbor graph. IEEE Transactions on Pattern Analysis and Machine Intelligence, 28(11):1875–1881, 2006. [12] J. Gauthier. Conditional generative adversarial nets for convolutional face generation. Class Project for Stanford CS231N: Convolutional Neural Networks for Visual Recognition, Winter semester, 2014(5):2, 2014. [13] I. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley, S. Ozair, A. Courville, and Y. Bengio. Generative adversarial nets. In Advances in neural information processing systems, pages 2672–2680, 2014. [14] J. A. Hartigan and M. A. Wong. Algorithm as 136: A k-means clustering algorithm. Journal of the Royal Statistical Society. Series C (Applied Statistics), 28(1):100–108, 1979. [15] D. Heylen, M. Poel, A. Nijholt, et al. Generation of facial expressions from emotion using a fuzzy rule based system. In Australian Joint Conference on Artificial Intelligence, pages 83–94. Springer, 2001. [16] S. Hochreiter and J. Schmidhuber. Lstm can solve hard long time lag problems. In Advances in neural information processing systems, pages 473–479, 1997. [17] M. E. Hoque, M. Courgeon, J.-C. Martin, B. Mutlu, and R. W. Picard. Mach: My automated conversation coach. In Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing, pages 697–706. ACM, 2013. [18] Y. Huang and S. M. Khan. Dyadgan: Generating facial expressions in dyadic interactions. In Computer Vision and Pattern Recognition Workshops (CVPRW), 2017 IEEE Conference on, pages 2259–2266. IEEE, 2017. [19] S. Ioffe and C. Szegedy. Batch normalization: Accelerating deep network training by reducing internal covariate shift. In International Conference on Machine Learning, pages 448–456, 2015. [20] P. Isola, J.-Y. Zhu, T. Zhou, and A. A. Efros. Imageto-image translation with conditional adversarial networks. arXiv preprint arXiv:1611.07004, 2016. [21] T. Kanda, T. Hirano, D. Eaton, and H. Ishiguro. Interactive robots as social partners and peer tutors for children: A field trial. Human-computer interaction, 19(1):61–84, 2004. [22] V. Kazemi and J. Sullivan. One millisecond face alignment with an ensemble of regression trees. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 1867–1874, 2014. [23] D. Keltner, P. Ekman, G. C. Gonzaga, and J. Beer. Facial expression of emotion. 2003. [24] E. A. Kensinger and S. Corkin. Two routes to emotional memory: Distinct neural processes for valence and arousal. Proceedings of the National Academy of Sciences of the United States of America, 101(9):3310–3315, 2004. [25] M. Koestinger, P. Wohlhart, P. M. Roth, and H. Bischof. Annotated facial landmarks in the wild: A large-scale, real-world database for facial landmark localization. In Computer Vision Workshops (ICCV Workshops), 2011 IEEE International Conference on, pages 2144–2151. IEEE, 2011. [26] J. L. Lakin, V. E. Jefferis, C. M. Cheng, and T. L. Chartrand. The chameleon effect as social glue: Evidence for the evolutionary significance of nonconscious mimicry. Journal of nonverbal behavior, 27(3):145–162, 2003. [27] C. L. Lisetti and D. J. Schiano. Automatic facial expression interpretation: Where human-computer interaction, artificial intelligence and cognitive science intersect. Pragmatics & cognition, 8(1):185–235, 2000. [28] P. Luc, C. Couprie, S. Chintala, and J. Verbeek. Semantic segmentation using adversarial networks. arXiv preprint arXiv:1611.08408, 2016. [29] M. Mirza and S. Osindero. Conditional generative adversarial nets. arXiv preprint arXiv:1411.1784, 2014. [30] B. Nojavanasghari, T. Baltrušaitis, C. E. Hughes, and L.-P. Morency. Emoreact: a multimodal approach and dataset for recognizing emotional responses in children. In Proceedings of the 18th ACM International Conference on Multimodal Interaction, pages 137– 144. ACM, 2016. [31] B. Nojavanasghari, T. Baltrušaitis, C. E. Hughes, and L.-P. Morency. The future belongs to the curious: Towards automatic understanding and recognition of curiosity in children. In Workshop on Child Computer Interaction, pages 16–22, 2016. [32] B. Nojavanasghari, D. Gopinath, J. Koushik, T. Baltrušaitis, and L.-P. Morency. Deep multimodal fusion for persuasiveness prediction. In Proceedings of the 18th ACM International Conference on Multimodal Interaction, pages 284–288. ACM, 2016. [33] B. Nojavanasghari, C. Hughes, T. Baltrusaitis, L.p. Morency, et al. Hand2face: Automatic synthesis and recognition of hand over face occlusions. arXiv preprint arXiv:1708.00370, 2017. [34] B. Nojavanasghari, C. E. Hughes, and L.-P. Morency. Exceptionally social: Design of an avatar-mediated interactive system for promoting social skills in children with autism. In Proceedings of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems, pages 1932–1939. ACM, 2017. [35] A. Radford, L. Metz, and S. Chintala. Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv preprint arXiv:1511.06434, 2015. [36] J. Rickel. Intelligent virtual agents for education and training: Opportunities and challenges. In Intelligent virtual agents, pages 15–22. Springer, 2001. [37] O. Ronneberger, P. Fischer, and T. Brox. U-net: Convolutional networks for biomedical image segmentation. In International Conference on Medical Image Computing and Computer-Assisted Intervention, pages 234–241. Springer, 2015. [38] T. Senechal, V. Rapp, and L. Prevost. Facial feature tracking for emotional dynamic analysis. Advances Concepts for Intelligent Vision Systems, pages 495– 506, 2011. [39] J. M. Susskind, G. E. Hinton, J. R. Movellan, and A. K. Anderson. Generating facial expressions with deep belief nets. In Affective Computing. InTech, 2008. [40] Y. Tian, T. Kanade, and J. F. Cohn. Facial expression recognition. In Handbook of face recognition, pages 487–519. Springer, 2011. [41] Y. Tie and L. Guan. Automatic landmark point detection and tracking for human facial expressions. EURASIP Journal on Image and Video Processing, 2013(1):8, 2013. [42] E. Tronick. Still face experiment. Retrieved October, 22:2016, 2009. [43] B. Ulicny and D. Thalmann. Crowd simulation for interactive virtual environments and vr training systems. Computer Animation and Simulation 2001, pages 163–170, 2001.
1cs.CV
GENERAL HYPERPLANE SECTIONS OF THREEFOLDS IN POSITIVE CHARACTERISTIC arXiv:1703.00770v1 [math.AG] 2 Mar 2017 KENTA SATO AND SHUNSUKE TAKAGI Dedicated to Professor Lawrence Ein on the occasion of his sixty birthday. Abstract. In this paper, we study the singularities of a general hyperplane section H of a three-dimensional quasi-projective variety X over an algebraically closed field of characteristic p > 0. We prove that if X has only canonical singularities, then H has only rational double points. We also prove, under the assumption that p > 5, that if X has only klt singularities, then so does H. 1. Introduction Reid proved in his historic paper [25] that if a quasi-projective variety over an algebraically closed field of characteristic zero has only canonical singularities, then its general hyperplane section has only canonical singularities, too. This can be deduced from the Bertini theorem for base point free linear systems, and the same argument works for other classes of singularities in the minimal model program such as terminal, klt, log canonical singularities. Then what if the variety is defined over an algebraically closed field of positive characteristic? As a test case, we consider the following question: Question 1.1. Let X be a three-dimensional quasi-projective variety over an algebraically closed field k of positive characteristic and H be a general hyperplane section of X. If X has only terminal singularities, is H smooth? If X has only canonical (resp. klt, log canonical) singularities, does H have only rational double points (resp. klt singularities, log canonical singularities)? Since the Bertini theorem for base point free linear systems fails in positive characteristic, Reid’s argument does not work in this setting. Thanks to the recent development in birational geometry, we are able to find a resolution of singularities of X ([6], [7]) and to run the minimal model program if X has only klt singularities and the characteristic of k is larger than 5 ([12], [3], [4]), but we do not know in general how to overcome the difficulty arising from the lack of the Bertini theorem. The terminal case in Question 1.1 is proved affirmatively by the fact that threedimensional terminal singularities are isolated singularities. The other cases are much more subtle. For example, Reid proved, as a corollary of the result mentioned above, that all closed points of a complex canonical threefold, except finitely many of them, have an analytic neighborhood which is nonsingular or isomorphic to the product of a 2010 Mathematics Subject Classification. 14B05, 14J17, 13A35. Key words and phrases. Bertini theorem, canonical singularities, klt singularities, MJ-canonical singularities, strongly F -regular singularities. 1 2 K. SATO and S. TAKAGI rational double point and A1C . This does not hold in positive characteristic: HirokadoIto-Saito [18] and Hirokado [17] gave counterexamples in characteristic two and three. However, the canonical case in Question 1.1 has remained open. In this paper, we give an affirmative answer to the canonical and klt cases in Question 1.1, using jet schemes and F -singularities, while we need to assume that the characteristic of k is larger than 5 in the klt case. In both cases, we look at every codimension two point x of X. The normal surface singularity Spec OX,x is canonical or klt but is not defined over an algebraically closed field. In the canonical case, we observe, as in the case where the base field is algebraically closed, that Spec OX,x is a hypersurface singularity. In the klt case, we deduce from the following theorem, which is a generalization of a result of Hara [13], that Spec OX,x is strongly F -regular when the characteristic of k is larger than 5. Theorem 1.2 (Proposition 2.8, Theorem 5.7). Let (s ∈ S) be an F -finite normal surface singularity (not necessarily defined over an algebraically closed field) of characteristic p > 5 and B be an effective Q-divisor on S whose coefficients belong to the standard set {1 − 1/m | m ∈ Z>1 }. Then (s ∈ S, B) is klt if and only if (s ∈ S, B) is strongly F -regular. In the canonical case, we see from the above observation that X is MJ-canonical except at finitely many closed points. MJ-canonical singularities are defined in terms of Mather-Jacobian discrepancies instead of the usual discrepancies and can be viewed as a jet scheme theoretic counterpart of canonical singularities. Similarly, in the klt case, we see that if the characteristic of k is larger than 5, then X is strongly F -regular except at finitely many closed points. Strongly F -regular singularities are defined in terms of the Frobenius morphism and can be viewed as an F -singularity theoretic counterpart of klt singularities. Applying the Bertini theorem for MJ-canonical singularities due to Ishii-Reguera [20] to the canonical case and the Bertini theorem for strongly F -regular singularities due to Schwede-Zhang [28] to the klt case, we obtain the assertion. To be precise, we can prove a more general result involving a boundary divisor, which is stated as follows. Main Theorem (Proposition 4.1, Theorems 4.2 and 5.9). Let X be a three-dimensional normal quasi-projective variety over an algebraically closed field k of characteristic p > 0 and ∆ be an effective Q-divisor on X such that KX + ∆ is Q-Cartier. Let H be a general hyperplane section of X. (1) If (X, ∆) is terminal, then (H, ∆|H ) is terminal. (2) If (X, ∆) is canonical, then (H, ∆|H ) is canonical. (3) Suppose in addition that p > 5 and the coefficients of ∆ belong to the standard set {1 − 1/m | m ∈ Z>1 }. If (X, ∆) is klt, then (H, ∆|H ) is klt. Acknowledgments. The authors are indebted to Shihoko Ishii for helpful discussions, especially on the proof of Theorem 4.2. They are also grateful to Mircea Mustaţă and Hiromu Tanaka for useful conversations. The first author was partially supported by the Program for Leading Graduate Schools, MEXT, Japan. The second author was partially supported by JSPS KAKENHI 26400039. GENERAL HYPERPLANE SECTIONS OF THREEFOLDS 3 Convention. Throughout this paper, all rings are assumed to be commutative and with a unit element and all schemes are assumed to be noetherian and separated. A variety over a field k means an integral scheme of finite type over k. 2. Preliminaries 2.1. F -singularities. In this subsection, we recall the basic notions of F -singularities, which we will need in §4. Let X be a scheme of prime characteristic p > 0. We say that X is F -finite if the Frobenius morphism F : X −→ X is a finite morphism. When X = Spec R is an affine scheme, R is said to be F -finite if X is F -finite. For example, a field k of positive characteristic p > 0 is F -finite if and only if [k : k p ] < ∞. It is known by [22] that every F -finite scheme is locally excellent. Suppose in addition that X is a normal integral scheme. For an integer e > 1 and a Weil divisor D on X, we consider the following composite map: (F e )# F eι OX −−−→ F∗e OX −−∗→ F∗e OX (D), where F e : X −→ X is the e-th iteration of Frobenius and ι : OX −→ OX (D) is the natural inclusion. Strong F -regularity is one of the most basic classes of F -singularities. Definition 2.1. Let (R, m) be an F -finite normal local ring of positive characteristic p > 0 and ∆ be an effective Q-divisor on X = Spec R. Then the pair (R, ∆) is said to be strongly F -regular if for every nonzero element c ∈ R, there exists an integer e > 1 such that the map OX −→ F∗e OX (⌈(pe − 1)∆⌉ + divX (c)) splits as an OX -module homomorphism. When y is a point in an F -finite normal integral scheme Y and B is an effective Q-divisor on Y , we say that (y ∈ Y, B) is strongly F -regular if (OY,y , By ) is strongly F -regular. We say that the normal singularity (y ∈ Y ) is strongly F -regular if (OY,y , 0) is strongly F -regular. Remark 2.2. We have the following hierarchy of properties of normal singularities: regular =⇒ strongly F -regular =⇒ Cohen-Macaulay. Global F -regularity is defined as a global version of strong F -regularity. Definition 2.3. Let X be an F -finite normal integral scheme and ∆ be an effective Q-divisor on X. Then (X, ∆) is said to be globally F -regular if for every Cartier divisor D on X, there exists an integer e > 1 such that the map OX −→ F∗e OX (⌈(pe − 1)∆⌉ + D) splits as an OX -module homomorphism. Remark 2.4. If X is an affine scheme, then (X, ∆) is globally F -regular if and only if (x ∈ X, ∆) is strongly F -regular for all x ∈ X. However, in general, the former is much stronger than the latter. For example, a smooth projective variety of general type over an algebraically closed field of positive characteristic is not globally F -regular but strongly F -regular at all points. 4 K. SATO and S. TAKAGI 2.2. Singularities in the minimal model program. In this subsection, we recall the definition of singularities in the minimal model program. Note that we do not assume that the singularities are defined over an algebraically closed field. We start with the definition of canonical divisors on normal schemes. Suppose that π : Y −→ X is a separated morphism of finite type between schemes. If X has a dualizing complex (see [16, Chapter V, §2] for the definition of dualizing • complexes), then ωY• := π ! ωX is a dualizing complex on Y , where π ! is the twisted inverse image functor associated to π obtained in [16, Chapter VII, Corollary 3.4 (a)]. Since any F -finite affine scheme has a dualizing complex by [10], any scheme of finite type over an F -finite local ring has a dualizing complex. • Let X be an excellent integral scheme with a dualizing complex ωX . The canonical • sheaf ωX associated to ωX is the coherent OX -module defined as the first non-zero co• homology module of ωX . It is well-known that ωX satisfies the Serre’s second condition (S2 ) (see for example [1, (1.10)]). If X is a variety over an algebraically closed field k with structure morphism f : X −→ Spec k, then the canonical sheaf associated to f ! k coincides with the classical definition of the canonical sheaf of X. When X is a normal • scheme, a canonical divisor KX on X associated to ωX is any Weil divisor KX on X ∼ such that OX (KX ) = ωX . • Suppose that X is a normal scheme with a dualizing complex ωX and fix a canonical • divisor KX on X associated to ωX . Given a proper birational morphism π : Y −→ X from a normal scheme Y , we always choose a canonical divisor KY on Y which is • associated to π ! ωX and coincides with KX outside the exceptional locus of f . Definition 2.5. (i) We say that (x ∈ X) is a normal singularity if X = Spec R is an affine scheme with a dualizing complex where R is an excellent normal local ring and if x is the unique closed point of X. (ii) A proper birational morphism f : Y −→ X between schemes is said to be a resolution of singularities of X, or a resolution of X for short, if Y is regular. Suppose that X is a normal integral scheme and ∆ is a Q-divisor on X. A resolution f : Y −→ X is said to be a log resolution if the union of f −1 (Supp(∆)) and the exceptional locus of f is a simple normal crossing divisor. We are now ready to state the definition of singularities in the minimal model program. Definition 2.6. (i) Suppose that (x ∈ X) is a normal singularity with a dualizing • complex ωX and ∆ is an effective Q-divisor on X such that KX + ∆ is Q-Cartier. Given a proper birational morphism π : Y −→ X from a normal scheme Y , we choose • a canonical divisor KY on Y associated to π ! ωX such that X KY + π∗−1 ∆ = π ∗ (KX + ∆) + ai Ei , i π∗−1 ∆ where is the strict transform of ∆ by π, the ai are rational numbers and the Ei are π-exceptional prime divisors on Y . We say that (x ∈ X, ∆) is terminal (resp. canonical, klt, plt) if all the ai > 0 (resp. all the ai > 0, all the ai > −1 and ⌊∆⌋ = 0, all the ai > −1) for every proper birational morphism π : Y −→ X from a normal scheme Y . We say that (x ∈ X) is terminal (resp. canonical, klt, plt) if so is (x ∈ X, 0). GENERAL HYPERPLANE SECTIONS OF THREEFOLDS 5 (ii) Let X be an excellent integral normal scheme with a dualizing complex and ∆ be an effective Q-divisor on X such that KX + ∆ is Q-Cartier. Then (X, ∆) is terminal (resp. canonical, klt, plt) if so is the normal singularity (x ∈ X = Spec OX,x , ∆x ) for every x ∈ X. Remark 2.7. (i) If X is defined over a field of characteristic zero or dim X 6 3, then it is enough to check the condition in Definition 2.6 only for one f , namely, for a log resolution of (X, ∆). (ii) We have the following hierarchy of properties of Q-Gorenstein normal singularities: regular =⇒ terminal =⇒ canonical =⇒ klt. Strong F -regularity implies being klt. Proposition 2.8 ([15, Theorem 3.3]). Let (x ∈ X) be an F -finite normal singularity and ∆ be an effective Q-divisor on X such that KX + ∆ is Q-Cartier. If (x ∈ X, ∆) is strongly F -regular, then it is klt. 3. Brief review on surface singularities In this section, we briefly review the theory of surface singularities. All results are well-known if the singularity is defined over an algebraically closed field. Some of the results may be known to experts (even if it is not defined over an algebraically closed field), but we include their proofs here, because we have not been able to find any reference to them. Definition 3.1. We say that a scheme X is a surface if X is a two-dimensional excellent • separated integral scheme with a dualizing complex ωX and that a normal singularity (x ∈ X) is a surface singularity if dim OX,x = 2. Remark 3.2. From now on, we often use the results in [21] and [29]. We remark that the base scheme is assumed to be regular in these references, but this assumption is unnecessary in our framework, because our base scheme is a normal surface singularity and its dualizing complex is unique up to isomorphism. First we recall the definition and basic properties of intersection numbers. Let (x ∈ X) be a normal surface singularity and f : Y −→ X beSa proper birational morphism from a normal surface Y withP exceptional curves E = i Ei . For a Cartier divisor D on Y and a Weil divisor Z = i ai Ei on Y , We define the intersection number D · Z as follows: X D·Z = ai degEi /k(x) (OY (D)|Ei ), i where degEi /k(x) : Pic(Ei ) −→ Z is the degree morphism defined as in [9, Definition 1.4]. Proposition 3.3 ([9, Proposition 2.5], [21, Theorem 10.1]). With the notation above, the following hold. 6 K. SATO and S. TAKAGI (1) The intersection pairing M Div(X) × ZEi −→ Z, (D, Z) 7−→ D · Z i is a bilinear map. (2) If Z is Cartier and Supp D ⊆ E, then D · Z = Z · D. (3) If Y is regular, then the intersection matrix (Ei · Ej )i,j is a negative-definite symmetric matrix. Definition 3.4. Let (x ∈ X) be a normal surface singularity Swith a dualizing complex • ωX . A resolution f : Y −→ X with exceptional curves E = i Ei is said to be minimal • if a canonical sheaf KY on Y associated to the dualizing complex f ! ωX is f -nef, that is, KY · Ei > 0 for every i. A minimal resolution of X always exists by [21, Theorem 2.25]. We also recall the definition of rational singularities. A normal surface singularity (x ∈ X) is said to be a rational singularity if R1 f∗ OY = 0 for every resolution f : Y −→ X. Proposition 3.5. Let (x ∈ X) be a normal surface singularity. (1) ([23, Proposition 1.2]) (x ∈ X) is a rational singularity if and only if R1 f∗ OY = 0 for some resolution f : Y −→ X. (2) ([21, Proposition 2.28]) If there exists an effective Q-divisor ∆ on X such that (x ∈ X, ∆) is plt, then (x ∈ X) is a rational singularity. In the rest of this section, we work in the following setting. Setting 3.6. Suppose that (x ∈ X) is a normal surface singularity with a dualizing • complex curves S ωX and f : Y −→ X is a (nontrivial) resolution with ! exceptional • E = i Ei . Let KY denote a canonical divisor on Y associated to f ωX . Let Zf denote the fundamental cycle of f , that is, a unique minimal nonzero effective divisor Z on Y such that Supp Z ⊆ E and −Z is f -nef (such a divisor always exists by [21, Definition and Claim 10.3.6]). Let D be a divisor on Y and Z be a nonzero effective divisor on Y such that Supp Z ⊆ E. The Euler characteristic χ(Z, D) is defined by χ(Z, OY (D)|Z ) = dimk(x) H 0 (Z, OY (D)|Z ) − dimk(x) H 1 (Z, OY (D)|Z ). The following is the Riemann-Roch theorem for curves embedded in a regular surface. Proposition 3.7. For each divisor D on Y and each nonzero effective divisor Z = P a E on Y such that Supp Z ⊆ E, we have i i i (2D − KY − Z) · Z = χ(Z, 0) + D · Z. 2 P Proof. We will prove the assertion by induction on a := i ai . If a = 1, then Z = Ei for some i and the assertion immediately follows from [29, Theorem 2.5 (1) and Theorem χ(Z, D) = GENERAL HYPERPLANE SECTIONS OF THREEFOLDS 7 2.7] (see also Remark 3.2). Suppose that a > 2. Then there exists i such that ai > 1, so set Z ′ := Z − Ei and consider the exact sequence 0 −→ OEi (−Z ′ ) −→ OZ −→ OZ ′ −→ 0. By the additivity of the Euler characteristic and applying the induction hypothesis to Z ′ and Ei , one has χ(Z, D) = χ(Z ′ , D) + χ(Ei , D − Z ′ ) (2D − KY − Z ′ ) · Z ′ (2(D − Z ′ ) − KY − Ei ) · Ei + 2 2 (2D − KY − Z) · Z = . 2 =  Proposition 3.8 ([2]). Suppose that (x ∈ X) is a rational singularity. Let mx denotes the maximal ideal on X corresponding to x and e(x ∈ X) be the Hilbert-Samuel multiplicity of OX,x . Then the following hold for each integer n > 0. (1) mnx = H 0 (Y, OY (−nZf )). (2) dimk(x) mn /mn+1 = −nZf2 + 1. (3) e(x ∈ X) = −Zf2 . Proof. First note that mnx OY = OY (−nZf ), which follows from essentially the same argument as for [2, Theorem 4], where X is assumed to be defined over an algebraically closed field. Since in a rational surface singularity, the product of integrally closed ideals is again integrally closed (see [23, Theorem 7.2]), mnx is integrally closed. Therefore, mnx = H 0 (Y, mnx OY ) = H 0 (Y, OY (−nZf )). For (2), we consider the exact sequence 0 −→ OY (−(ℓ + 1)Zf ) −→ OY (−ℓZf ) −→ OZf (−ℓZf ) −→ 0 for each integer ℓ > 0. Since H 1 (Y, OY (−ℓZf )) = H 1 (Y, OY (−(ℓ + 1)Zf )) = 0 by [21, Proposition 10.9 (1)], χ(Zf , −ℓZf ) = dimk(x) H 0 (Zf , OZf (−ℓZf )) = dimk(x) H 0 (Y, OY (−ℓZf ))/H 0(Y, OY (−(ℓ + 1)Zf )) = dimk(x) mℓx /mℓ+1 x , where the last equality follows from (1). In particular, χ(Zf , 0) = 1. Thus, wee see from Proposition 3.7 that dimk(x) mnx /mn+1 = χ(Zf , −nZf ) = 1 − nZf2 . x Finally, (3) immediately follows from (2), because dimk(x) OX,x /mnx = n−1 X i=0 dimk(x) mix /mi+1 = x −Zf2 2 n + O(n). 2  8 K. SATO and S. TAKAGI We will use the following result to prove the canonical case of the main theorem in §3. Proposition 3.9. A normal surface singularity (x ∈ X) is canonical if and only if (x ∈ X) is either a regular point or a rational double point. In particular, a canonical surface singularity is a hypersurface singularity. Proof. We may assume by Proposition 3.5 that (x ∈ X) is a rational singularity. Since the assertion is obvious when X is regular, we can also assume that (x ∈ X) is not regular. Suppose that f : Y −→ X is a minimal resolution, and let ∆ = f ∗ KX − KY . Then ∆ is an anti-f -nef Q-divisor on Y , so ∆ > 0 by [21, Claim 10.3.5]. On the other hand, it follows from Proposition 3.7 that 2 = 2χ(Zf , 0) = −(KY + Zf ) · Zf = −KY · Zf − Zf2 = ∆ · Zf − Zf2 , which implies that ∆ · Zf = Zf2 + 2. If (x ∈ X) is a canonical singularity, then we have ∆ = 0 and hence Zf2 = −2. We see by Proposition 3.8 (3) that e(x ∈ X) = 2, that is, (x ∈ X) is a rational double point. Using Proposition 3.8 (2), (3), we can verify that every rational double point is a hypersurface singularity. Conversely, if (x ∈ X) is a rational double point, then Zf2 = −2 by Proposition 3.8 (3) and therefore ∆ · Zf = 0. Since −∆ is f -nef and Supp Zf = E, the intersection number ∆ · Ei has to be zero for all i. This means by [21, Claim 10.3.5] that ∆ = 0. It then follows from the fact that KY + ∆ = f ∗ KX and (Y, ∆) = (Y, 0) is canonical that (x ∈ X) is a canonical singularity.  4. Terminal and canonical singularities The terminal case of the main theorem is an immediate consequence of a Bertini theorem for Hilbert-Samuel multiplicity. Proposition 4.1. Let X be a three-dimensional normal quasi-projective variety over an algebraically closed field of characteristic p > 0 and ∆ be an effective Q-divisor on X such that KX + ∆ is Q-Cartier. Suppose that the pair (X, ∆) is terminal. Then (H, ∆|H ) is terminal for a general hyperplane section H of X. In particular, H is smooth. Proof. Let U be the locus of the points x ∈ X such that X is regular at x and multx (∆) < 1. Since the regular locus of X is open and Hilbert-Samuel multiplicity is upper semicontinuous, U is an open subset of X. Then every codimension two point x ∈ X lies in U by [21, Theorem 2.29 (1)], because (Spec OX,x , ∆x ) is a twodimensional terminal pair. Hence, X \ U consists of only finitely many closed points and a general hyperplane section H of X is contained in U. It follows from a Bertini theorem for Hilbert-Samuel multiplicity [8, Proposition 4.5], which holds in arbitrary characteristic, that H is smooth and multx (∆|H ) = multx (∆) < 1 for all x ∈ Supp ∆|H .  Thus, applying [21, Theorem 2.29 (1)] again, we see that (H, ∆|H ) is terminal. GENERAL HYPERPLANE SECTIONS OF THREEFOLDS 9 The canonical case of the main theorem can be deduced from a Bertini theorem for MJ-canonical singularities. The proof was inspired by a discussion with Shihoko Ishii, whom we thank. Theorem 4.2. Let X be a three-dimensional normal quasi-projective variety over an algebraically closed field k of characteristic p > 0 and ∆ be an effective Q-divisor on X such that KX + ∆ is Q-Cartier. Suppose that the pair (X, ∆) is canonical. Then (H, ∆|H ) is canonical for a general hyperplane section H of X. In particular, H has only rational double points. Proof. First we will show the case where ∆ = 0. Since X has only canonical singularities, Spec OX,x is a two-dimensional scheme with only canonical singularities for every codimension two point x ∈ X. It then follows from Proposition 3.9 that OX,x is a hypersurface singularity for every codimension two point x ∈ X. Since the l.c.i. locus of X is open by [11], X is a l.c.i. except at finitely many closed points. By the fact that l.c.i. canonical singularities are MJ-canonical (see for example [20, Remark 2.7 (iv)]), X has only MJ-canonical singularities except at finitely many closed points. Thus, applying a Bertini theorem for MJ-canonical singularities [20, Corollary 4.11], we see that H has only rational double points. Next we consider the case where ∆ 6= 0. Let U1 be the locus of the points x ∈ X such that X is regular at x and multx (∆) 6 1, and U2 = X \ Supp ∆. Note that U1 and U2 are both open subsets of X (the openness of U1 follows from the openness of the regular locus of X and the upper-semicontinuity of Hilbert-Samuel multiplicity). Then every codimension two point x ∈ X lies in U1 ∪ U2 by [21, Theorem 2.29 (2)], because (Spec OX,x , ∆x ) is a two-dimensional canonical pair. Hence, we may assume that X = U1 ∪ U2 . We have already seen that the assertion holds when ∆ = 0, so (H ∩ U2 , ∆|H∩U2 ) = (H ∩ U2 , 0) is canonical for a general hyperplane section H of X. On the other hand, it follows from a Bertini theorem for Hilbert-Samuel multiplicity [8, Proposition 4.5] that H ∩ U1 ( U1 is smooth and multx (∆|H∩U1 ) = multx (∆) 6 1 for all x ∈ Supp ∆|H∩U1 . Thus, applying [21, Theorem 2.29 (2)] again, we see that (H ∩ U1 , ∆|H∩U1 ) is canonical.  Corollary 4.3. Let X be a three-dimensional quasi-projective variety over an algebraically closed field k of characteristic p > 5 with only canonical singularities. Then there exists a zero-dimensional closed subscheme Z ⊂ X with the following property: for [ every closed point x ∈ X \ Z, the maximal-adic completion O X,x of the local ring of X b k k[[t]] at x is either regular or isomorphic to the formal tensor product k[[u, v, w]]/(f )⊗ of a rational double point k[[u, v, w]]/(f ) and the one-dimensional formal power series ring k[[t]]. Proof. An immediate application of Theorem 4.2 to [18, Theorem 3] yields the desired result.  Remark 4.4. When the characteristic p is less than 5, there exist counterexamples to Corollary 4.3 due to Hirokado-Ito-Saito [18] and Hirokado [17]. In particular, in characteristic three, an exhaustive list of examples is given in [18, Theorem 3]. 10 K. SATO and S. TAKAGI 5. Klt singularities In this section, we will prove the klt case of the main theorem. Since we often use the results of [21] and [29] in this section, the reader is referred to Remark 3.2. First we prepare some definitions and lemmas for Theorem 1.2. Definition 5.1. Let I ⊆ [0, 1] be a subset. We define the subset D(I) ⊆ [0, 1] by ) ( P m − 1 + nj=1 ij m ∈ Z>1 , n ∈ Z>0 , ij ∈ I for j = 1, . . . , n ∩ [0, 1]. D(I) := m In particular, D(∅) = {1 − 1/m | m ∈ Z>1 } is the set of standard coefficients. Lemma 5.2 (cf. [24, Lemma 4.3]). Let X be a normal surface and ∆ be an effective Q-divisor on X such that (X, ∆) is plt. Let C be a regular curve which is an irreducible component of ⌊∆⌋ and Diff C (B) be the different of B := ∆−C on C (see [21, Definition 2.34] for the definition of the Q-divisor Diff C (B)). If the coefficients of B belong to a subset I ⊂ [0, 1] ∩ Q, then the coefficients of Diff C (B) belong to D(I). Proof. We may assume that (x ∈ X) is a surface singularity, that is, X = Spec R for a two-dimensional normal local ring.SLet f : Y −→ X be a minimal log resolution of (X, C) with exceptional curves E = i Ei defined as in [21, Definition 2.25 (b)] and m be the determinant of the negative of the intersection matrix of the Ei . Then by [21, (3.36.1)], m−1 [x] + B|C . Diff C (B) = m P Let B = j bj Bj be the irreducible decomposition of B. Since mD is Cartier for every Weil divisor D on X by [21, Proposition 10.9 (3)], we see that ord[x] (mBj )|C is an integer. Thus, m − 1 X bj ord[x] Diff C (B) = + ord[x] (mBj )|C ∈ D(I), m m j which completes the proof of the proposition.  A log Fano pair (X, ∆) is a pair of a normal projective variety over a field k and an effective Q-divisor on X such that −(KX + ∆) is ample and (X, ∆) is klt. Proposition 5.3 (cf. [5, Corollary 4.1], [31, Theorem 4.2]). Let I ⊆ [0, 1] ∩ Q be a finite set. There exists a positive constant p0 (I) depending only on I with thePfollowing property: if k is an F -finite field of characteristic p > p0 (I) and (P1k , B = m i=1 ai Pi ) is a log Fano pair such that every coefficient ai belongs to D(I) and every point Pi is a k-rational point of P1k , then (P1k , B) is globally F -regular. Moreover, when I = ∅, we may take the constant p0 (I) to be 5. Proof. The proof is essentially the same as in the case where k is algebraically closed. When k is algebraically closed, the first assertion is nothing but [5, Theorem 4.1] and the second one follows from [31, Theorem 4.2].  GENERAL HYPERPLANE SECTIONS OF THREEFOLDS 11 Definition 5.4. A curve X over a field k is a one-dimensional integral scheme of finite type over k. The arithmetic genus g(X) of a complete curve X over k is defined to be dimk H 1 (X, OX )/ dimk H 0 (X, OX ). We remark that g(X) is independent of the choice of the base field k. We extend Proposition 5.3 to the case of an arbitrary curve of genus zero. Proposition 5.5. Let I ⊆ [0, 1]∩Q be a finite set. There exists a positive constant p1 (I) depending only on I with the following property: if k is an F -finite field of characteristic p > p1 (I) and (C, B) is a log Fano pair such that C is a complete curve over k and the coefficients of B belong to D(I), then (C, B) is globally F -regular. Moreover, when I = ∅, we may take p1 (I) to be 5. Proof. Let p0 (I) be the constant as in Proposition 5.3. Set a(I) = min{a ∈ D(I) | a 6= 0} and p1 (I) = max{p0 , ⌈2/a(I)⌉}. If I = ∅, then a(I) = 1/2, so we can take p1 (∅) = 5 by Proposition 5.3. We say that a pair (C, B) satisfies the condition (⋆) if C is a complete curve over an F -finite field of characteristic p > p1 (I) and (C, B) is a log Fano pair such that the coefficients of B belong to D(I). Note that if (C, B) satisfies (⋆), then C is a complete regular curve with g(C) = 0 by [29, Corollary 2.6]. Let (C, B) be a log Fano pair over a field k satisfying the condition (⋆). First, we will show that we can reduce to the case where C ∼ = P1k . Replacing k by its finite extension if necessary, we may assume that k = H 0 (C, OC ). Suppose that C ∼ 6= P1k . Then C is 2 isomorphic to a conic in Pk by [21, Lemma 10.6 (3)], and hence there exists a closed point P ∈ C whose residue field k(P ) is a quadratic extension of k. Let l := k(P ) and consider the pullback f : Cl := C ×Spec k Spec l −→ C of C. Note that Cl is connected, because [l : k] = 2 and l is not contained in the function field K(C) of C, so K(C) ⊗k l is a domain. Since p > p1 > 2 = [l : k], the pullback f is a surjective étale morphism. It follows from [21, Lemma 10.6 (3)] again, together with the fact that a regular conic with an l-rational point is isomorphic to P1l , that Cl ∼ = P1l . By the fact that being klt is preserved under surjective étale morphisms ([21, Proposition 2.15]), the pair (Cl , Bl := f ∗ B) satisfies the condition (⋆). On the other hand, a pair is globally F -regular if and only if its affine cone is strongly F -regular ([26, Proposition 5.3]), and strong F -regularity is preserved under finite étale morphisms of degree not divisible by p ([14, Theorem 3.3], [27, Corollary 6.31 and Proposition 7.4]). Therefore, (C, B) is globally F -regular if and only if so is (Cl , Bl ). Thus, replacing k by l and C by Cl , we may assume that C = P1k . Next, we will show that we can P reduce to the case where every point in Supp B is a k-rational point. Let B = i a i Pi be the irreducible decomposition of B. Since P 1 (C = Pk , B) is log Fano, we have i ai [k(Pi ) : k] = degP1k /k (B) < 2. In particular, [k(Pi ) : k] < 2/a(I) 6 p1 (I) < p for every i. Hence, there exists a Galois extension K/k such that k(Pi ) ⊆ K for every i and p does not divide [K : k]. Since the condition (⋆) and global F -regularity are preserved under finite Galois base field extensions of degree not divisible by p as we have seen above, replacing k by K and (P1k , B) by (P1K , BK ) if necessary, we may assume that every point in Supp B is a k-rational point. The assertion is now an immediate consequence of Proposition 5.3.  12 K. SATO and S. TAKAGI Lemma 5.6 (cf. [5, Proposition 2.13]). Let (x ∈ X) be a normal surface singularity • with a dualizing complex ωX and B be an effective Q-divisor on X such that KX + B is Q-Cartier. If (x ∈ X, B) is klt, then there exists a proper birational morphism f : Y −→ X from a normal surface Y such that (1) the exceptional locus C of f is a complete regular curve with g(C) = 0, (2) (Y, BY + C) is plt, where BY = f∗−1 B is the strict transform of B by f , and (3) −(KY + BY + C) is f -ample, where KY is a canonical divisor on Y associated • to the dualizing complex f ! ωX . Proof. We can apply essentially the same argument as in the case where X is defined over an algebraically closed field [5, Proposition 2.13], using the minimal model program for excellent surfaces [29, Theorem 1.1] instead of that for surfaces over an algebraically closed field. Then (2) and (3) are easily verified. Hence, it is enough to check (1). Since (Y, BY + C) is plt, the complete curve C has to be regular by [21, Theorem 2.31]. The pair (Y, BY + C) being plt also implies by Proposition 3.5 that Y has only rational singularities, from which it follows that g(C) = 0 (see [21, Lemma 10.8 (3)]).  Theorem 1.2 is a consequence of Proposition 2.8 and the following theorem, which gives a generalization of [5, Theorem 1.1] (see also [13]) to the case where the base field is not necessarily algebraically closed. Theorem 5.7 (cf. [13], [5, Theorem 1.1]). Let I ⊆ [0, 1]∩Q be a finite set. There exists a positive constant p1 (I) depending only on I with the following property: if (x ∈ X) be an F -finite normal surface singularity of characteristic p > p1 (I) and (x ∈ X, B) is a klt pair such that the coefficients of B belong to D(I), then (x ∈ X, B) is strongly F -regular. Moreover, when I = ∅, we can take p1 (I) to be 5. Proof. We employ the same strategy as the proof of [5, Theorem 1.1]. Let p1 (I) be the constant as in Proposition 5.5. Suppose that (x ∈ X, B) is a klt pair such that (x ∈ X) is an F -finite normal surface singularity of characteristic p > p1 (I) and the coefficients of B belong to D(I). Take a proper birational morphism f : Y −→ X with exceptional prime divisor C as in Lemma 5.6, and let BY = f∗−1 B be the strict transform of B by f and BC = Diff C (BY ) be the different of BY on C. Note that by Lemma 5.2 and [24, Lemma 4.4], the coefficients of BC belong to D(D(I)) = D(I) ∪ {1}. Since (C, BC ) is log Fano by adjunction ([21, Theorem 3.36 and Lemma 4.8]), the coefficients of BC are less than 1, and then (C, BC ) is globally F -regular by Proposition 5.5. Applying the same argument as in the case where X is defined over an algebraically closed field ([5, Proposition 2.11] and [12, Lemma 2.12]), we can conclude that (X, B) is strongly F -regular.  Example 5.8 (cf. [21, 2.26]). Let k be a non-algebraically closed field of characteristic p > 0 with an element a ∈ k that is not a cubic power in k. Let (0 ∈ X) be the origin of the hypersurface (x2 = y 3 − az 3 + y 4 + z 4 ) ⊂ A3k , which is a klt surface singularity. Its minimal resolution has two exceptional curves C1 , C2 and their dual graph is 1 7654 0123 2 3 0123 7654 2 , GENERAL HYPERPLANE SECTIONS OF THREEFOLDS 13 where the numbers above the circles are the dimk H 0 (Ci , OCi ) and the numbers inside the circles are the −Ci2 / dimk H 0 (Ci , OCi ). Note that this graph does not appear in the list of the dual graphs of exceptional curves for the minimal resolutions of klt surface singularities over an algebraically closed field (see [30]). On the other hand, (0 ∈ X) is strongly F -regular if and only if p > 3. We are now ready to prove the klt case of the main theorem. Theorem 5.9. Let X be a three-dimensional normal quasi-projective variety over an algebraically closed field of characteristic p > 5 and ∆ be an effective Q-divisor on X whose coefficients belong to the standard set {1−1/m | m ∈ Z>1 }. Suppose that KX +∆ is Q-Cartier and (X, ∆) is klt. Then (H, ∆|H ) is klt for a general hyperplane section H of X. Proof. Let U be the locus of the points x ∈ X such that (X, ∆) is strongly F -regular. Note that U is an open subset of X (the ∆ = 0 case was proved in [19, Theorem 3.3] and the general case follows from a very similar argument). Every codimension two point x ∈ X lies in U, because (Spec OX,x , ∆x ) is strongly F -regular by Theorem 5.7. Hence, X \ U consists of only finitely many closed points and a general hyperplane section H of X is contained in U. It then follows from a Bertini theorem for strongly F -regular pairs [28, Corollary 6.6] that (H, ∆|H ) is strongly F -regular. Since strongly F -regular pairs are klt by Proposition 2.8, we obtain the assertion.  References [1] Y. Aoyama, Some basic results on canonical modules, J. Math. Kyoto. Univ. 23 (1983), 85–94. [2] M. Artin, On isolated rational singularities of surfaces, Amer. J. Math. 88 (1966), 129–136. [3] C. Birkar, Existence of flips and minimal models for 3-folds in char p, Ann. Sci. Éc. Norm. Supér. (4) 49 (2016), 169–212. [4] C. Birkar and J. Waldron, Existence of Mori fibre spaces for 3-folds in char p, arXiv:1410.4511, preprint (2014). [5] P. Cascini, Y. Gongyo and K. Schwede, Uniform bounds for strongly F -regular surfaces, Trans. Amer. Math. Soc. 368 (2016), 5547–5563. [6] V. Cossart, O. Piltant, Resolution of singularities of threefolds in positive characteristic. I, J. Algebra 320 (2008), 1051–1082. [7] V. Cossart, O. Piltant, Resolution of singularities of threefolds in positive characteristic. II, J. Algebra 321 (2009), 1836–1976. [8] T. de Fernex, L. Ein, M. Mustaţă, Bounds for log canonical thresholds with applications to birational geometry, Math. Res. Lett. 10 (2003), 219–236. [9] W. Fulton, Intersection theory, second edition, Ergebnisse der Mathematik und ihrer Grenzgebiete, 3. Folge, Band 2, Springer, Berlin, 1998. [10] O. Gabber, Notes on some t-structures, Geometric aspects of Dwork theory. Vol. I, II, pp. 711– 734, Walter de Gruyter GmbH & Co. KG, Berlin, 2004. [11] S. Greco, M. G. Marinari, Nagata’s criterion and openness of loci for Gorenstein and complete intersection, Math. Z. 160 (1978), 207–216. [12] C. Hacon and C. Xu, On the three dimensional minimal model program in positive characteristic, J. Amer. Math. Soc. 28 (2015), 711–744. [13] N. Hara, Classification of two-dimensional F -regular and F -pure singularities, Adv. Math. 133 (1998), 33–53. [14] N. Hara and S. Takagi, On a generalization of test ideals, Nagoya Math. J. 175 (2004), 59–74. 14 K. SATO and S. TAKAGI [15] N. Hara and K.-i. Watanabe, F -regular and F -pure rings vs. log terminal and log canonical singularities, J. Alg. Geom. 11 (2002), 363–392. [16] R. Hartshorne, Residues and duality, Lecture notes of a seminar on the work of A. Grothendieck, given at Harvard 1963/64, With an appendix by P. Deligne, Lecture Notes in Mathematics, No.20 Springer-Verlag, Berlin-New York 1966. [17] M. Hirokado, Canonical singularities of dimension three in characteristic 2 which do not follow Reid’s rules, arXiv:1607.08664, preprint (2016). [18] M. Hirokado, H. Ito and N. Saito, Three dimensional canonical singularities in codimension two in positive characteristic, J. Algebra 373 (2013), 207–222. [19] M. Hochster and C. Huneke, Tight closure and strong F -regularity, Mém. Soc. Math. France 38 (1989), 119–133. [20] S. Ishii and J. Reguera, Singularities in arbitrary characteristic via jet schemes, arXiv:1510.05210, preprint (2015). [21] J. Kollár, Singularities of the minimal model program, Cambridge Tracts in Mathematics, 200, Cambridge University Press, Cambridge, 2013. [22] E. Kunz, On Noetherian rings of characteristic p, Amer. J. Math. 98 (1976), 999–1013. [23] J. Lipman, Rational singularities, with applications to algebraic surfaces and unique factorization, Inst. H́autes Etudes Sci. Publ. Math., No. 36, 1969, 195–279. [24] J. McKernan and Y. Prokhorov, Threefold thresholds, Manuscripta Math. 114 (2004), 281–304. [25] M. Reid, Canonical 3-folds, in: A. Beauville (Ed.), Journées de géométrie algébrique d’Angers 1979, Sijthoff & Noordhoff, Alphen, 1980, pp. 273–310. [26] K. Schwede and K. E. Smith, Globally F -regular and log Fano varieties, Adv. Math. 224 (2010), 863–894. [27] K. Schwede and K. Tcuker, On the behavior of test ideals under finite morphisms, J. Algebraic Geom. 23 (2014), 399–443. [28] K. Schwede and W. Zhang, Bertini theorems for F -singularities, Proc. London Math. Soc. 107 (2013), 851–874. [29] H. Tanaka, Minimal model programme for excellent surfaces, arXiv:1608.07676, preprint (2016). [30] K. Watanabe, Plurigenera of normal isolated singularities. I, Math. Ann. 250 (1980), 65–94. [31] K.-i. Watanabe, F -regular and F -pure normal graded rings, J. Pure Appl. Algebra 71 (1991), 341–350. Graduate School of Mathematical Sciences, University of Tokyo, 3-8-1 Komaba, Meguro-ku, Tokyo 153-8914, Japan E-mail address: [email protected] Graduate School of Mathematical Sciences, University of Tokyo, 3-8-1 Komaba, Meguro-ku, Tokyo 153-8914, Japan E-mail address: [email protected]
0math.AC
1 Modulus Zero-Forcing Detection for MIMO Channels arXiv:1801.00947v2 [cs.IT] 10 Jan 2018 Sha Hu and Fredrik Rusek Abstract We propose a modulus arithmetic based zero-forcing (MZF) detector for multi-input multi-output (MIMO) channels. Traditionally, a ZF detector completely eliminates interference from other symbol layers when detecting a particular symbol layer, which results in suboptimal performance due to noiseenhancement. The only constraint for application of our proposed MZF detector is that the transmitter must employ a finite cardinality M quadrature-amplitude-modulation (QAM) alphabet. With that, the modus operandi of the MZF is to allow for integer-valued interference and then remove it by modulus arithmetic operations. Index Terms Multi-input multi-output (MIMO), modulus, zero-forcing (ZF), quadrature-amplitude-modulation (QAM), pulse-amplitude-modulation (PAM), linear minimum-mean-square-error (LMMSE), sphere-decoding (SD), lattice-reduction (LR), Lenstra-Lenstra-Lovász (LLL). I. I NTRODUCTION We consider a standard multi-input multi-output (MIMO) channel model with a received signal ỹ expressed as ỹ = H̃ x̃ + ñ, (1) where H̃, x̃ and ñ are the complex-valued MIMO channel, transmitted symbols and Gaussian noise, respectively. The authors are with the Department of Electrical and Information Technology, Lund University, Lund, Sweden (email: {firstname.lastname}@eit.lth.se). 2 Given received signal model (1), detecting x̃ is referred to as a MIMO detection problem, which has a history that can be traced back about half a century and a review on it can be found in e.g., [1]. In general, maximum likelihood (ML) detection [2] yields optimal performance but with prohibitive complexity when the MIMO dimension and/or the input alphabet has large cardinality. Effective implementations of ML detection, such as sphere-decoding (SD) [3], [4] can significantly reduce the complexity, but not overcome an exponential complexity in the number of symbol layers CITE JALDEN’S PAPER. On the other hand, linear detectors [2] such as zeroforcing (ZF) and linear minimum-mean-square-error (LMMSE), have low complexities, but also suboptimal performances. One direction for improving linear detectors is lattice-aided-reduction (LAR) [5] based approaches, which use lattice-reduction (LR) algorithms, e.g., Lenstra-LenstraLovász (LLL), to find a short and nearly orthogonal basis for the lattice induced by the MIMO channel [6]. Other than the existing approaches [1], as the transmitted symbols are drawn from finite alphabets such as quadrature-amplitude-modulation (QAM) and pulse-amplitude-modulation (PAM) symbols, the modulus can also be used in MIMO detection for improving the detection performance. The modulus operation has been used in Tomlinson-Harashima precoding (THP) [7], [8] as suboptimal approximation for dirty-paper coding (DPC) [9], and recently it has also be considered in the designs of integer-forcing (IF) receives for MIMO channles [13], [15], [16]. The IF scheme in [13] requires the transmitter to employ a same lattice code [14] for each transmitted layer, which does not apply in most of current communication systems. Besides, when higher-oder modulations such as M -PAM are used, designing lattice code over ZM is challenging [14]. Simpler IF receivers dealing with linear binary codes such as turbo and LDPC are proposed in [15], [16], and the designs follow the same as in [13]. One disadvantage of the IF receivers in [13], [16] is that, each transmit antenna needs a separate encoding/decoding process, which is not the case in practical LTE systems where one codeword is split among transmit-antennas. Moreover, the IF design in [15] needs a separate encoding/decoding process per transmit antenna and per bit-layer in higher-order modulations. Another advantage is that, the receiver has to detect the linear combinations of codewords for all transmit-antennas first, followed by a matrix inversion (over a finite-field) process to recover the original codeword on each layer. To overcome these disadvantages in previous IF receiver designs, we consider a new approach to improve linear detection with modulus operation, namely, the proposed modulus ZF (MZF) 3 detection. Note that, MZF is conceptually different from previous IF receivers, although they share quite some similarities. The fundamental difference is that, with MZF, there is no encoding/decoding process needed which are implemented on a finite-filed with IF receivers to recover the transmit symbols (i.e., the linear combinations of codewords across all transmit-antennas). Alternatively, we design MZF detector such that the transmit symbols on each transmit-antenna can be recovered directly by modulating away the interferences from the remaining transmitantennas, and the symbol detection on different transmit-antenna is independent and fully in parallel. Such a principle simplifies the operation and can be well cooperated into practical systems such as LTE. To achieve such a nice property, with MZF the modulus matrix is carefully designed and optimized according to the specific modulation-order. II. P RELIMINARIES We start with reviewing the standard ZF detection. Before proceeding, without loss of generality, the matrix H̃ is always assumed to be a square matrix, obtained by a QR factorization or padding zero rows to the matrix if necessary. With the following definitions,         R{ỹ} R{x̃} R{ñ} R{H̃} −I{H̃} , x =  , n =  , H =  , y= I{ỹ} I{x̃} I{ñ} I{H̃} R{H̃} (2) we can rewrite (1) as a real-valued model y = Hx + n (3) where the K ×K channel matrix H is known to the receiver, x = [x1 . . . xK ]T contains PAM √ symbols from an alphabet A = {±1, ±3, . . . , ±( M − 1)}, and n is random Gaussian noise with a covariance matrix (N0 /2)I. As the transmit power depends on M , the signal-to-noise (SNR) is defined as SNR = 2E[|xk |2 ]/N0 . (4)  x̂ = QA H + y , (5) The ZF detector is given by where QA (·) denotes entry-wise quantization to the nearest point in A. This can be slightly rewritten as x̂k = QA (rk ), 1≤k≤K 4 with rk = δ k H + y (6) and δ k = [0| .{z . . 0} 1 0| .{z . . 0}]. k−1 K−k For later use, we note that we may just as well replace the “1” with any arbitrary scalar value and equivalently work with rk = τ xk + wk , (7) where wk is zero-mean complex Gaussian noise with variance τ 2 (N0 /2)kδ k H + k2 . Accordingly, the post-processing SNR, which is independent of τ , becomes γk = SNR , kδ k H + k2 (8) where SNR is defined in (4). III. D ESCRIPTION OF THE P ROPOSED MZF D ETECTION A main issue with ZF is that kδ k H + k2 in (8) is typically large and results in noise-enhancement. To combat that, we make use of the underlying idea of THP but apply it to detection, without any involvement of the transmitter. We propose to replace (6) with rk = (τ δ k + q k )H + y (9) where q k = [qk1 , qk2 , . . . qkK ] and qk` ∈ 2Z, i.e., the even integers. With that, rk = τ xk + K X qk` x` + wk , (10) `=1 and the post processing SNR changes to γk = τ 2 SNR , k(τ δ k + q k )H + k2 (11) rather than (8). Note that (10) coincides with the received signal per user in a vector perturbation (VP) system [10], [11]. Therefore, further processing of (10) follows the same steps as those for VP. Based on (10), hard-output detection of xk from rk can be obtained based on the following property. 5 Property 1. Let y =z+α M X p m bm , m=1 where α ≥ 1, |z| < 2, and pm , (bm −1) ∈ 2Z. Then,  M P   (y mod 4α) − 2α, if 12 pm is odd, z= m=1   (y + 2α) mod 4α − 2α, otherwise. (12)  Proof. See Appendix A. Let us now consider α = 1 (other values are considered in Section IV-A). In view of Property 1, we see that qk` and x` in (10) qualify as pm and bm . Further, from the condition |z| < 2 in Property 1, we have that τ must be selected so that √ τ max |a| = τ ( M − 1) < 2. a∈A To finalize the detector, we let  K P   (rk mod 4) − 2, if 21 qk` is odd, zk = `=1   (r + 2) mod 4 − 2, otherwise, k (13) (14) which can be expressed as zk = τ xk + w̃k , where w̃k has a complicated distribution due to the modulus operation. The detected symbol x̂k can now be obtained as x̂k = Qτ A (zk ), (15) where the quantization is implemented on τ A, with the definition τ A = {τ x : x ∈ A}. √ We remark that, the choice τ = 2/( M − 1) is not suitable in (13). This is so since if √ τ xk +wk = 2+, for some small  > 0, then zk = −2+. However, provided that τ  2/( M −1), such wrap seldomly happens at high SNR and w̃k = wk with high probability. Observe that for constellation points xk with small magnitude, then w̃k = wk with much higher probability than for constellation points xk of large magnitude. To ensure equal error probability for all constellation points, we design τ such that: The distance from 2 to the largest constellation point in τ A is half the distance between two points in τ A. 6 Following this rule results in √ τ = 2(1−log2 ( M )) , (16) √ where with out loss of generality we assume that log2 ( M ) is an integer in the rest of the paper. With that, we have that w̃k is “nearly” Gaussian at high SNR; see VP-PAPER for further details. To optimize the receiver, we should solve = arg max γk q opt k qk = arg min k(τ δ k + q k )H + k2 (17) qk where elements of q k are even integers. We rewrite (17) as + + 2 q opt k = arg min kτ δ k H − q k (−H )k qk = arg min kbk − q k Bk2 , (18) qk which is an instance of sphere detection over the integers [4], and bk = τ δ k H + , (19) B = −H + . (20) Without any further extensions, pseudo-code for implementation of the MZF detector is given in Algorithm 1. We remind the reader that the inputs H and y to the algorithm are assumed to be real-valued, while M denotes the cardinality of the complex-valued QAM constellation. We provide a worked out example of MZF detection in Appendix B to illustrate the process. A. Some Remarks on the MZF Detection With the principle of MZF detection introduced, we have a few important remarks as follows. Remark 1. The MZF is an extension of the ZF, where the latter is the special case of the former when q opt k − δk where q opt k 2 = 0, (21) denotes the Hadamard product. Therefore, from the perspective of post-processing SNR γk , MZF is always superior to ZF. 7 Remark 2. Following Remark 1, when (21) holds, the modulus operation degrades performance and should be removed. Remark 3. In general the minimum value achieved by q opt in (18) increases as τ decreases. k That is, for alphabets with large cardinality, the gain of MZF decreases. To resolve the issue in Remark 3 and to further improve performance, some useful extensions will be introduced in Sec. IV. B. Discussion on the Diversity-Multiplexing Trade-off (DMT) In the designs of IF receivers [13], [15], [16], the target is to directly optimize + 2 popt k = arg min kpk H k , (22) pk given the constraint that P ∈ ZK×K is full-rank1 over R, where P it the matrix comprises all vectors pk . Comparing to (17), it can be seen that, with MZF we constrain pk in (22) to be 1 pk = δ k + q k , τ (23) where q k comprises even integers. With (23) it holds that 1 P = I + Q, τ (24) where τ < 1 and the elements of Q are even integers. Therefore, with MZF, the degrees-offreedom (DoFs) in designing P is less than that of an IF receiver2 . Nevertheless, we have the following Property 2 (which is an extension of [13, Theorem 5]) that shows that, the MZF also achieves the optimal DMT [18] as IF receiver does. Therefore, from an information-theoretic perspective, the MZF detection does not scarifies much performance compared to an IF receiver, while the latter one has much higher encoding/decoding complexity. 1 The rationale behind is that, in order to have P mod p to be full-rank over Zp (to recover the codewords from their linear combinations after decoding on Zp ), it suffices to check whether P is full-rank over R, given that the magnitudes of the elements of P are upper-bounded by a constant [17, Th. 11]. 2 However, with MZF matrix P is not required to be full-rank. 8 Property 2. For a complex-valued MIMO channel with K transmit-antennas, N ≥ K receiveantennas, and independent and identically distributed (i.i.d.) Rayleigh fading, the achievable DMT with the MZF detection3 is  r dMZF = N 1 − , 0 ≤ r ≤ K. K (25)  Proof. See Appendix C. IV. E XTENSIONS OF THE MZF D ETECTION In this section we introduce some extensions to the basic MZF detector for further improving its performance. While Extension 1 and 4 are generalizations of the basic algorithm, Extension 2 is to resolve the issue mentioned for large cardinality alphabets and improve the performance for weak bit-layers, while Extension 3 is a decision feedback version of Extension 2. A. Extension 1: A scaled modulus This first extension arises from a slight relaxation of α = 1 in the MZF detector. From Property 1, we can replace (14) as  K P  (rk mod 4α) − 2α, qk` is odd, if 12 zk = `=1   (r + 2α) mod 4α − 2α, otherwise. k (26) This requires us to optimize, instead of (17), opt (q opt ) = arg min k(τ δ k + αq k )H + k2 . k ,α (27) |α|≥1, q k Solving (27) is harder than solving (17) since it can be regarded as an instance of non-coherent sphere detection. Instead, we solve (17) first, and then plug the optimal solution into (27) and solve for the optimal α. That is, q opt is obtained with (17), and k + 2 αopt = arg min k(τ δ k + αq opt k )H k , |α|≥1 (28) opt where we sligthly abused notation since the pair (q opt ) is in general not jointly optimal k ,α in the sense of (27). Although Extension 3 is intuitive, the gain seems marginal according to numerical results. 3 In this case, the size of H corresponding to the real-valued model in (3) is 2N ×2K. 9 B. Extension2: Bit-wise Modulus Zero-Forcing An underlying assumption of this extension is that the bit-mapping to the symbols in A is such that the constellation has an additive structure. By this we mean that a PAM symbol xk should be of the form √ log2 ( M ) X xk = ukb 2b−1 , (29) b=1 where ukb ∈ {±1} correspond to information bits. Using Algorithm 1, the bits ukb are determined by the output x̂k = Qτ A (zk ), with setting √ τ = 2(1−log2 ( M )) . As M increases, τ decreases and so are the gains of MZF detection. To resolve this for large values of M , we extend the symbol-based MZF detector in Algorithm 1 to a bit-wise version. Note that we can rewrite (10) as √ log2 ( M ) X rk = τ b−1 ukb 2 + K X qk` x` + wk . (30) `=1 b=1 Assuming that we are interested in the n-th bit ukn , we let x̃k = n X ukb 2b−1 , (31) b=1 which belongs to a 2n -PAM alphabet. Setting τ (n) = 21−n in (30) yields √ log2 ( M ) 1−n rk = 2 X x̃k + b−n ukb 2 b=n+1 It can be easily seen that 1 2 Plog2 (√M ) b=n+1 + K X qk` x` + wk . (32) `=1 ukb 2b−n is an odd integer so it qualifies as a valid value of qk` , and ukn can be detected as ûkn = sign(zk ). (33) Therefore, for each bit-layer, a different value of τ is used and only a sign operation is needed for detection. Extension 2 has a complexity increment over Algorithm 1 since an optimization to find q k is needed for each bit-layer. Note that, according to Remark 2, when detecting the last bit-layer and if (21) holds, the ZF estimate shall be used for detection, while for detecting the other layers, modulus operations are still needed to cancel the transmitted bits corresponding to higher bit-layers. Psuedo-code for the MZF with this extension is summarized in Algorithm 2. 10 C. Extension 3: A decision feedback version of Extension 2 An obstacle with Extension 2 is that τ (n) decreases as n grows, and as previously mentioned, performance deteriorates. Small values of n correspond to weak bit-layers, and large n correspond to strong bit-layers. Thus, with Extension 2, predominantly the weak bit-layers can gain by the MZF, while the gain could be minuscule for strong bit-layers. A gain for weak bit-layers is important since it is typically these bit-layers that limit ultimate performance. However, we can also harvest a gain for strong bit-layers via a decision feedback mechanism. To prevent error propagation in decision feedback equalization, strong bits are typically detected first and then canceled. That option is not available for MZF, rather we detect the weakest bit-layer first and then move on to stronger ones. The method works as follows. First set n = 1 and follow Extension 2 verbatim to obtain û1 = [û11 . . . ûK1 ]T . For notational convenience, define y 1 = y. Now construct y2 = 1 (y − H û1 ) . 2 1 (34) Provided that û1 is correct, y 2 is described with the same MIMO channel as y 1 , but with √ √ M /2-PAM rather than M -PAM inputs. Next, move on to n = 2 and keep τ (2) = 1. Since nor the value of τ (2) neither the channel H has changed, the optimal vector q k for n = 2 coincides with that already found for n = 1. We then have that for y 2 √ log2 ( M ) rk = uk2 + X b−2 ukb 2 b=3 + K X 1 qk` (x` − ûk1 ) + wk , 2 `=1 (35) and ûk2 is obtained by taking the sign of zk as in (33). We proceed by y3 = 1 (y − H û2 ) , 2 2 (36) and continue the process until all bit-layers have been detected. Similarly, according to Remark 2, whenever (21) holds, the ZF estimate shall be used. Pseudocode is provided in Algorithm 3. Extension 3 is similar to Extension 2 in the sense that, the detection for all bit-layers only needs to take the signs of zk as in (33), but it has less complexity since only one optimization of (17) is needed which is shared for all bit-layers. A drawback with Extension 3 is that, as for all decision-feedback based detectors, the processing of the bit-layers cannot be parallelized, which is however, possible with Extension 2. Another drawback is potential error-propagation at low SNRs. 11 D. Extension 4: Replacing ZF by LMMSE So far we have introduced modulus arithmetic detection using ZF, however, H + can also be replaced by other linear detectors4 such as LMMSE, which sets −1 H + = H H HH H + N0 I . (37) In vector form, and with the introduction of a matrix T , the received signal after equalization is  T H + y = T x + T H + H − I x + T H + n, where T = (τ I +Q). The target of optimizing q k in this case, is to minimize the interference plus noise power that equals q̃ k = arg min k(τ δ k + q k )Ek2 , (38)   E = H + H − I, N0 H + . (39) qk where Note that, when H + is the pseudo-inverse of H such as with ZF, E degrades to B, which shows the generalization of the MZF concept. The reason for introducing Extension 4 is that, the ZF detector is suboptimal to LMMSE at low SNRs, in which case the modulus operation based on LMMSE can improve performance. Therefore, it is beneficial to use LMMSE instead of ZF. Since only H + is replaced by LMMSE equalization in Extension 4, all Algorithms 1-3 still apply verbatim. There are also many other possible variations of the MZF, but which we will not pursue any further. Next we put an interest on comparing the MZF to a traditional LAR detector. The reason is that, solving (17) involves significant complexity, and we put forth an approximated solution based on LR with less computational efforts. V. A S OLUTION BASED ON , AND A C OMPARISON TO , L ATTICE R EDUCTION Except for approximately solving (17) with LR, another reason for comparing MZF with LR detection is that, the obtained MZF allows for a direct comparison to LAR detectors. In LAR as well as the MZF, the most burdening task is to execute the LLL algorithm (or other similar algorithms), thus the complexities of LAR and MZF become virtually identical. As we will demonstrate, the detection-performance of MZF is superior in some cases. 4 This is also known as regularized perturbation in VP [10]. 12 A. A quick review of LAR Given (3), LAR starts by performing the LLL algorithm on H, so that we obtain H̄ = HT where T is unimodular and H̄ is nearly orthogonal. With z = T −1 x we have y = H̄z + n. (40) Performing ZF based on H̄ and quantizing to the nearest integers gives ẑ = QZ (H̄ −1 y) (41) from which one can obtain x̂ = QA (T ẑ). Clearly, once H̄ has been established, the remaining steps are of miniscule complexity. At this point, a reasonable question is, what the relation between LAR and MZF is, and whether they are equivalent? The answers to these questions are that, they are closely related, but not equivalent. Prior to quantization in (41), we can write r = H̄ −1 y = T −1 x + w. (42) Since T is unimodular, so is T −1 . On the other hand, written in vector form, (9) equals r = (τ I + Q) H −1 y = (τ I + Q) x + w. (43) Comparing (42) and (43) with τ = 1, we see that in both cases r equals an integer-valued matrix multiplied with the data symbols, plus noise. However, the matrix T −1 in (42) has no particular structure (besides being unimodular) so the modulus operation in (14) is not available. This makes LAR, i.e., (42) and MZF, i.e., (43) fundamentally different, as the structure of (42) requires further processing in the form of (41) while (43) allows for further processing via (14). B. An approximate solution to (17) based on LLL In (17) we have the following problem to solve q opt = arg min kb − qBk2 , q (44) 13 where we removed the subscript k, and the vectors are row-vectors. Perform the LLL algorithm to B T so that we have B̄ = B T T . Since B = −H + the LLL algorithm needs, similar to LAR, to be executed only once per coherence interval. We can now proceed as in the LAR case, −1 ẑ = QZ (B̄ bT ) followed by q opt = [Q2Z (T ẑ)]T . (45) Note that, the optimization (44) itself is also a MIMO detection problem (but only needs to run once per coherence-interval), therefore, there are also other low-complexity suboptimal algorithms to solve (44), such as using ZF or partial marginalization [12]. In the simulations, we will focus on the optimal SD and the suboptimal LLL solutions for (44), respectively. VI. N UMERICAL R ESULTS In this section, we show some numerical results of the proposed MZF detector, as well as its extensions. In all tests, we test with K ×K real-valued MIMO channels (each element is an independent and identically distributed Gaussian variable with a zero-mean and unit-variance) √ with M -PAM modulated symbols that are transfered from K/2×K/2 complex-valued MIMO channels and M -QAM modulated symbols. We simulate 50,000 channel realizations for each of the tests. A. SINR improvements In Fig. 1 we show the post-processing SNR improvements with the MZF detector using Algorithm 1, and compare to a traditional ZF detector with different PAM modulations (i.e., τ values). As can be seen, the SNRs are greatly improved, especially for low-order modulations (or the weak bit-layers of high-order modulations with Extension 2). When τ decreases, the gains become smaller. We also test the MZF with Extension 1, where we can observe only marginal gains (not shown in Fig. 1). Therefore, in the remaining tests we set α = 1. 14 1 0.9 0.8 0.7 CDF 0.6 0.5 0.4 0.3 0.2 =1 = 1/2 = 1/4 0.1 0 0 2 4 6 8 10 12 14 16 SNR gain of MZF over ZF in dB Fig. 1. SNR gains under real-valued 12×12 MIMO with 2-PAM, 4-PAM and 8-PAM modulations, respectively. 100 10-1 BER 10-2 10-3 ZF, bit-layer 1 ZF, bit-layer 2 MZF-SD, bit-layer 1 MZF-SD, bit-layer 2 MZF-SD-Ext.2, bit-layer 1 MZF-SD-Ext.3, bit-layer 2 ML, bit-layer 1 ML, bit-layer 2 10-4 10-5 0 5 10 15 20 25 SNR [dB] Fig. 2. Uncoded BER under real-valued 6×6 MIMO with 4-PAM modulation. B. Uncoded bit-error-rate (BER) Next we show uncoded BER performance. In Fig. 2 we compare MZF with ZF and ML under 6×6 MIMO with 4-PAM modulation. The MZF uses SD to find the optimal q k . As can be seen, the MZF without extensions outperforms the ZF with more than 2 dB at 0.1% BER. With Extension 2, the BER of the first bit-layer (weaker layer) is greatly improved by more than 4 dB at 0.1% BER and outperforms the second bit-layer, which justifies the application of Extension 15 100 10-1 BER 10-2 10-3 ZF, bit-layer 1 ZF, bit-layer 2 ZF, bit-layer 3 MZF-SD-Ext.2, bit-layer 1 MZF-SD-Ext.2, bit-layer 2 ML, bit-layer 1 ML, bit-layer 2 ML, bit-layer 3 10-4 10-5 5 10 15 20 25 30 SNR [dB] Fig. 3. Uncoded BER under real-valued 4×4 MIMO with 8-PAM modulation. 100 ZF LAR MZF-LLL MZF-SD LMMSE MZF-SD-Ext.4 10-1 BER 10-2 10-3 10-4 10-5 0 2 4 6 8 10 12 14 16 SNR [dB] Fig. 4. Uncoded BER under real-valued 8×8 MIMO with 2-PAM modulation. 3. With Extension 3, where the feedbacks of the first bit-layer are used, the BER of the second bit-layer is also improved by more than 3 dB at 0.1% BER compared to MZF with Extension 2. The gaps between ZF and ML are significantly reduced by the MZF, and the slopes of BER with MZF are also much steeper than the ZF, and close to those with the ML. However, as also can be observed, the MZF has only marginal gains at low SNRs, and the decision-feedback approach performs even worse due to inaccurate feedbacks. This obstacle can be relieved by 16 using LMMSE based approaches, i.e., Extension 4. In Fig. 3 we repeat the tests in Fig. 2 under 4×4 MIMO with 8-PAM modulation, that is, three bit-layers are considered. The MZF with Extension 2 using SD is compared to ZF and ML. As already shown in Fig. 1, setting τ = 1/4 for detecting the third-layer (strongest layer) only has small gains, and the BER performance is also close to ZF and therefore are not shown in Fig. 3. Nevertheless, the BER of the first and second bit-layers are significantly boosted by MZF. As can be seen, the MZF performs around 3 dB better than the ZF at 0.1% BER for the second bit-layer, and 7 dB better for the first bit-layer. Since the weakest bit-layer usually has a stronger impact on the decoding performance, the gains for the first bit-layer is of importance. C. Comparison with LAR In Fig. 4 we compare the MZF with the LAR under 8×8 MIMO with 2-PAM modulation. The MZF uses both SD and the approximate LLL method to find the optimal q k . As can be seen, MZF outperforms LAR with more than 1.5 dB at 0.1% BER, with a similar complexity for running LLL algorithm for LR. Moreover, with Extension 4 (the LMMSE based detection), the BERs at low SNRs are also improved with the MZF which is inferior to the original ZF based MZF at high SNRs. Nevertheless, with Extension 4, the MZF is 4 dB better than a normal ZF, and more than 2dB better than a normal LMMSE detector at 0.1% BER. Another observation is that, the SD based MZF is more than 2 dB better than the LLL based MZF, which shows that optimal selection of q k is important. VII. S UMMARY We have proposed a novel modulus arithmetic based zero-forcing (MZF) detector for multiinput multi-output (MIMO) channels, with a number of possible extensions of the basic algorithm. The MZF detector shows significant gains in terms of post-processing signal-to-noise-ratio (SNR) and bit-error-rate (BER) compared to traditional linear detectors, at medium and high SNR scenarios and in particular for weak bit-layers. At low SNRs and with large cardinalities of the input alphabet, we have provided several possible extensions to improve the performance of the MZF. Finding the optimal modulus matrix itself is a burdening MIMO detection problem, but it needs to be done only once per a coherence-interval of the MIMO channel using spheredecoding (SD) or other suboptimal algorithms. In particular, with a similar complexity, MZF 17 with lattice-reduction (LR) based approaches outperforms the traditional lattice-aided-reduction (LAR) detector, which justifies its potential in MIMO detection. A PPENDIX A: P ROOF OF P ROPERTY 1 Since pm , (bm −1) ∈ 2Z, we let pm = 2p̃m and bm = 2b̃m +1, where p̃m , b̃m ∈ Z. Then, y = z+α M X p m bm m=1 = z + 4α M X p̃m b̃m + 2α m=1 Since |z| < 2 and α > 1, it holds that z +2α > 0. If M X p̃m . (46) m=1 1 2 M P M P pm = m=1 p̃m is odd, we have m=1 y mod 4α = z + 2α; Otherwise, if M P (47) p̃m is even, it also holds that m=1 (y + 2α) mod 4α = z + 2α. (48) Combing (47) and (48), z can be obtained as in (12). A PPENDIX B: A 4×4 EXAMPLE FOR APPLYING THE MZF DETECTION Below we give a 4×4 real-valued MIMO example with 4-PAM modulation to illustrate the process of MZF detection, with assuming the channel, transmitted symbol vector and received signal vector as  −6 0 −1 5   1   3         −3 −2 −1 1   −1   1       H = , x = , y =     ,  1 −5 −6 0   −1   15        1 −1 −3 −2 1 11 respectively. Then it can be shown that  −5 −55 30 −40     35 −59 −25 58  1   H+ =  , 185  −30 40 −5 −55    25 −58 35 −59 18 and the ZF estimate of x equals  x̃ZF −60     309  1   = H +y =  , 185  −730    −107 where only the third symbol is correctly detected. Next we use the basic MZF detection with Algorithm 1. Setting τ = 1 and run SD for optimization (17) yields an optimal Q as  −2   0  Q=  0  2 0 0 0   0   . 0 −2 0   0 0 −2 0 2 We first see that, the MZF shall reuse the ZF estimates for the first and third layers based on (21). Then, we see that with Q, the post-processing SNR (assuming the noise power equals 1) for the second bit-layer (which is identical to the fourth bit-layer) is increased from 1/kδ 2 H + k = 185/47 to 1/k(δ 2 + q 2 )H + k2 = 185/27. Next we compute estimates with the MZF for the these two layers. For the second layer, according to (14) we have  r2 = (δ 2 + q 2 )x̃ZF −60     309  −1151 1   [0 1 2 0]  , = =  −730  185 185   −107 and z2 = (r2 mod 4) − 2 = −7 . 38 Similarly, for the fourth layer we have  r4 = (δ 4 + q 4 )x̃ZF −60     309  −13 1   = [2 0 0 − 1]  , =  −730  185 185   −107 19 and z4 = (r4 mod 4) − 2 = 357 . 185 As can be seen, the MZF corrects both detections for the second and the fourth layers where the ZF fails. A PPENDIX C: P ROOF OF P ROPERTY 2 In the case where each transmit antenna encodes an independent data stream, the optimal DMT [18] is  r dML (r) = N 1 − , 0 ≤ r ≤ K, K (49) which can be achieved by joint maximum likelihood (ML) decoding, while the ZF (and also the LMMSE) receiver attains a DMT r dZF (r) = (N − K + 1) 1 − , 0 ≤ r ≤ K. K  (50) Since H̃ has i.i.d. Rayleigh entries, H̃ is full column rank with probability 1, and so is H ∈ Z2N ×2K which is the real-valued representation H̃. To prove that the MZF detection can achieve the optimal DMT, we follows a similar proof in [13] for IF receiver, which builds on a result in [23] that showed that, uncoded signaling coupled with LR can achieve the full diversity and with a multiplexing gain of zero. We define a lattices Λ and its dual Λ∗ generated by 2N ×2K matrix H and 2K ×2N matrix H + as [19]  Λ = Hp, p ∈ Z2K ,  Λ∗ = (H T )+ p, p ∈ Z2K , (51) (52) respectively. From [19]–[21], the i-th successive minimum i (Λ) of a lattice Λ is defined as the smallest length r (with respect to the Euclidean norm) such that, there are i vectors in Λ of length at most r that are linearly independent (with respect to R). By this definition, it holds that [13] 21 (Λ) = min kpH T k2 , p∈Z2K 22K (Λ∗ ) = min P ∈Z2K×2K rank(P )=2K max kpk H + k2 . 1≤k≤2K (53) (54) 20 Then, we state the following Lemma 1, which follows the proof in [13, Appendix C]. Lemma 1. Let Λ be the lattice generated by H lattice generated by H according to (51). Then, for a sufficiently large s > 0, the successive minimum 2K (Λ) of Λ satisfies   2 K (2K + 3) ∗ 2 >s P(2K (Λ ) > s) ≤ P 21 (Λ)  = P 21 (Λ) < s̃ (55) (56) ≤ −γs̃2N (ln s̃)1+N , (57) where 21 (Λ) is the first successive minimum for Λ, and r 2K + 3 s̃ = K . s (58) The inequality (55) follows from [13, Lemma 4], and the equality (56) holds by switching 21 (Λ) to the other side, and the inequality (57) is a result of [13, Lemma 5] when s̃ > 0 and is sufficiently small. With the post-processing SNR γk in MZF detection in (11), we can show that for a given target rate r ln SNR, the outage probability equals P (R < r ln SNR) = P max Q∈2Z2K×2K  ≤P  max 2K X 1 k=1 2 2K X 1 Q∈2Z2K×2K rank(Q)=2K k=1 2 ! ln(1 + γk ) < r ln SNR  ln(1 + γk ) < r ln SNR  ≤P   max Q∈2Z2K×2K min γk < SNRr/K  1≤k≤2K rank(Q)=2K  =P  2 max min Q∈2Z2K×2K 1≤k≤2K rank(Q)=2K τ SNR < SNRr/K  k(τ δ k + q k )H + k2  =P    min Q∈2Z2K×2K max k(τ δ k + q k )H + k2 > τ 2 SNR1−r/K . 1≤k≤2K (59) rank(Q)=2K Using the inequality k(τ δ k + q k )H + k2 ≤ kq k H + k2 + τ 2 kδ k H + k2 , (60) 21 and inserting (60) back into (59) yields  P (R < r ln SNR) ≤ P  min Q∈2Z2K×2K  max kq k H + k2 > τ 2 SNR1−r/K 1≤k≤2K   − kδ k H + k2  rank(Q)=2K    τ = P  min max kpk H + k2 > SNR1−r/K − kδ k H + k2  2K× 2K 1≤k≤2K 4 P ∈Z rank(P )=2K   τ2  + 2 1−r/K 2 ∗ = P 2K (Λ ) > SNR − kδ k H k , (61) 4  2 where the successive minimum 22K (Λ∗ ) is defined in (54). Comparing (61) to [13, Eq. (43)], it can be seen that the outage probability with MZF detection could be inferior to that with the IF receiver. However, the slope of the outage probability in high SNR regimes remains the same. Using Lemma 1, it holds that dMZF (r) = lim − ln P (R < r ln SNR) ln SNR    + 2 1−r/K τ2 ∗ 2 − ln P 2K (Λ ) > 4 SNR − kδ k H k SNR→∞ = lim SNR→∞ 2N ln SNR  1+N − ln −γŝ (ln ŝ) SNR→∞ ln SNR ≥ lim , (62) where 2K ŝ = τ s 2K + 3 SNR1−r/K − kδ k H + k2 2K ≥ τ r 2K + 3 . SNR1−r/K (63) Inserting (63) into (62), it holds that r dMZF (r) ≥ N 1 − . K  (64) But as the MZF detection is inferior to the ML detection, so is the DMT. Therefor, the equality in (64) holds. R EFERENCES [1] S. Yang and L. Hanzo, “Fifty years of MIMO detection: The road to large-scale MIMOs, ” IEEE Commun. Surveys & Tutorials, vol. 17, no. 4, pp. 1941-1988, Sep. 2015. [2] S. M. Kay, “Fundamentals of statistical signal processing, volume I: Estimation theory,” Prentice Hall signal processing series, 1993. 22 [3] A. Ghasemmehdi and E. Agrell, “Faster recursions in sphere decoding,” IEEE Trans. Inf. Theory, vol. 57, no. 6, pp. 3530-3536, Jun. 2011. [4] E. Agrell, T. Eriksson, A. Vardy and K. Zeger, “Closest point search in lattices,” IEEE Trans. Inf. Theory, vol. 48, no. 8, pp. 2201-2214, Aug. 2002. [5] D. Wubben, R. Bohnke, V. Kuhn and K. Kammeyer, “Near-maximum-likelihood detection of MIMO systems using MMSEbased lattice reduction,” IEEE Int. Conf. Commun. (ICC), Jun. 2004, pp. 798-802. [6] A. K. Lenstra, H. W. Lenstra and L. Lovász, “ Factoring polynomials with rational coefficients” Mathematische Annalen, vol. 261 no. 4, pp. 515-534, Jul. 1982. [7] M. Tomlinson, “New automatic equaliser employing modulo arithmetic,” Electronics Lett., vol. 7, no. 5, pp. 138-139, Mar. 1971. [8] H. Harashima and H. Miyakawa, “Matched-transmission technique for channels With intersymbol interference,” IEEE Trans. Commun., vol. 20, no. 4, pp. 774-780, Aug. 1972. [9] M. H. Costa, “Writing on dirty paper,” IEEE Trans. Inf. Theory, vol. 29, no. 2, pp. 439-441, May 1983. [10] B. M. Hochwald, C. B. Peel and A. L. Swindlehurst, “A vector-perturbation technique for near-capacity multiantenna multiuser communication - Part II: Perturbation,” IEEE Trans. Commun., vol. 53, no. 3, pp. 537-544, Mar. 2005. [11] J. Maurer, J. Jaldén, D. Seethaler and G. Matz, “Vector perturbation precoding revisited,” IEEE Trans. Signal Process., vol. 59, no. 1, pp. 315-328, Jan. 2011. [12] S. Hu and F. Rusek, “A soft-output MIMO detector with achievable information rate based partial marginalization,” IEEE Trans. Signal Processing, vol. 65, no.6, pp. 1622-1637, Mar. 2017. [13] J. Zhan, B. Nazer, U. Erez, and M. Gastpar, “Integer-forcing linear receivers,” IEEE Trans. Inform. Theory, vol. 60, no. 12, pp. 7661-7685, Dec. 2014. [14] S.-N. Hong and G. Caire, “Compute-and-forward strategies for cooperative distributed antenna systems,” IEEE Trans. Inform. Theory, vol. 59, no. 9, pp. 5227-5243, Sep. 2013. [15] S. H. Chae, M. Jang, and S.-K. Ah, “Multilevel coding scheme for integer-forcing MIMO receivers with binary codes”, IEEE Trans. Wireless. Commun., vol. 16, no. 8, pp. 5428-5441, Aug. 2017. [16] O. Ordentlich and U. Erez, “Achieving the gains promised by Integer-Forcing equalization with binary codes”, IEEE Conv. Elect. and Electron. Eng. in Israel (IEEEI), Nov. 2010, pp. 000703-000707. [17] B. Nazer and M. Gastpar, “Compute-and-forward: Harnessing interference through structured codes”, IEEE Trans. Inform. Theory, vol. 57, no. 10,pp. 6463-6486, Oct. 2011. [18] L. Zheng and D. N. C. Tse, “Diversity and multiplexing: A fundamental tradeoff in multiple-antenna channels, IEEE Trans. Inf. Theory,” IEEE Trans. Inform. Theory, vol. 49, no. 5, pp. 1073-1096, May 2003. [19] J. C. Lagarias, H. W. Lenstra, Jr., and C. P. Schnorr, “KorkinZolotarev bases and successive minima of a lattice and its reciprocal lattice,” Combinatorica, vol. 10, no. 4, pp. 333-348, Dec. 1990. [20] S. Lang, Introduction to Diophantine approximations, New York, NY, USA, Springer-Verlag, 1995. [21] I. Aliev and M. Henk, “Successive minima and best simultaneous Diophantine approximations,” Monatshefte Math., vol. 147, no. 2, pp. 95-101, 2006. [22] M. Taherzadeh, A. Mobasher, and A. K. Khandani, “Communication over MIMO broadcast channels using lattice-basis reduction”, IEEE Trans. Inform. Theory, vol. 53, no. 12, pp. 4567-4582, Dec. 2007. [23] M. Taherzadeh, A. Mobasher, and A. K. Khandani, “LLL reduction achieves the receive diversity in MIMO decoding”, IEEE Trans. Inform. Theory, vol. 53, no. 12, pp. 4801-4805, Dec. 2007. 23 Algorithm 1 Modulus Zero-Forcing (MZF) Algorithm H is K × K real-valued y is K × 1 real-valued 1: M is cardinality of QAM constellation function x̂ =M ODULAR ZF(H, y, M ) √ 2: τ = 2(1−log2 ( 3: B = −H + M )) Preprocessing for each coherence interval 4: for k = 1 to K 5: bk = τ δ k H + 6: 2 Solve : q opt k = arg min kbk − q k Bk qk 7: end for Executed for every channel observation 8: 9: 10: for k = 1 to K + rk = (τ δ k + q opt k )H y if q opt k −δ k if opt `=1 qk` is odd then zk = ((rk + 2) mod 4) − 2 16: end if 17: 21: PK else 15: 20: 1 2 zk = (rk mod 4) − 2 14: 19: = 0 then else 13: 18: 2 zk = bk y 11: 12: q opt k end if x̂k = Qτ A (zk ) end for end function 24 Algorithm 2 MZF Algorithm with Extension 2 H is K × K real-valued y is K × 1 real-valued 1: 2: M is cardinality of QAM constellation function x̂ =M ODULAR ZFE XT 2(H, y, M ) √ N = log 2( M ) 3: B = −H + 4: for n = 1 to N 5: 6: τ (n) = 21−n end for Preprocessing for each coherence interval 7: for k = 1 to K 8: bk = δ k H + 9: for n = 1 to N 10: bkn = τ (n)bk 11: 2 Solve : q opt k,n = arg min kbkn − q k Bk qk 12: 13: end for end for Executed for every channel observation 14: 15: for k = 1 to K for n = 1 to N if n = N and q opt k −δ k 16: q opt k zk = bk y 17: else 18: 19: + rk = (τ (n)δ k + q opt k )H y 20: zk = (rk mod 4) − 2 end if 21: ûkn = sign(zk ) 22: 23: 24: 25: end for end for end function 2 = 0, then 25 Algorithm 3 MZF Algorithm with Extension 3 H is K × K real-valued y is K × 1 real-valued 1: 2: 3: 4: M is cardinality of QAM constellation function x̂ =M ODULAR ZFE XT 3(H, y, M ) τ =1 √ N = log2 ( M ) B = −H + Preprocessing for each coherence interval 5: for k = 1 to K 6: bk = τ δ k H + 7: 2 Solve : q opt k = arg min kbk − q k Bk qk 8: end for Executed for every channel observation 9: ŷ = y 10: for n = 1 to N 11: ûn = 0 12: for k = 1 to K if q opt k −δ k 13: q opt k 2 = 0, then zk = τ δ k H + ŷ 14: else 15: 16: + rk = (τ δ k + q opt k )H ŷ 17: zk = (rk mod 4) − 2 18: end if 19: ûkn = sign(zk ) 20: end for 21: ûn = [û1n û2n . . . ûKn ]T 22: ŷ = (ŷ − H uˆn )/2 23: 24: end for end function
7cs.IT
Convergence Rate of Riemannian Hamiltonian Monte Carlo and Faster Polytope Volume Computation arXiv:1710.06261v1 [cs.DS] 17 Oct 2017 Yin Tat Lee∗, Santosh S. Vempala† October 18, 2017 Abstract We give the first rigorous proof of the convergence of Riemannian Hamiltonian Monte Carlo, a general (and practical) method for sampling Gibbs distributions. Our analysis shows that the rate of convergence is bounded in terms of natural smoothness parameters of an associated Riemannian manifold. We then apply the method with the manifold defined by the log barrier function to the problems of (1) uniformly sampling a polytope and (2) computing its volume, the latter by extending Gaussian cooling to the manifold setting. In both cases, the total number 2 of steps needed is O∗ (mn 3 ), improving the state of the art. A key ingredient of our analysis is a proof of an analog of the KLS conjecture for Gibbs distributions over manifolds. Contents . . . . . 3 3 5 6 7 7 2 Basics of Hamiltonian Monte Carlo 2.1 Hamiltonian Monte Carlo on Riemannian manifolds . . . . . . . . . . . . . . . . . . . 8 10 3 Convergence of Riemannian Hamiltonian Monte Carlo 3.1 Basics of geometric Markov chains . . . . . . . . . . . . . 3.2 Overlap of one-step distributions . . . . . . . . . . . . . . 3.2.1 Proof Outline . . . . . . . . . . . . . . . . . . . . . 3.2.2 Variation of Hamiltonian curve . . . . . . . . . . . 3.2.3 Local Uniqueness of Hamiltonian Curves . . . . . . 3.2.4 Smoothness of one-step distributions . . . . . . . . 3.3 Convergence bound . . . . . . . . . . . . . . . . . . . . . . 13 13 15 15 16 19 21 23 1 Introduction 1.1 Results . . . . 1.2 Approach and 1.3 Practicality . 1.4 Notation . . 1.5 Organization . . . . . . . . contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Improved analysis of the convergence 24 4.1 Improved one-to-one correspondence for Hamiltonian curve . . . . . . . . . . . . . . 25 4.2 Improved smoothness of one-step distributions . . . . . . . . . . . . . . . . . . . . . . 26 ∗ † University of Washington and Microsoft Research, [email protected] Georgia Tech, [email protected] 1 5 Gibbs sampling on manifolds 29 5.1 Isoperimetry for Hessian manifolds . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 5.2 Sampling with the log barrier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 6 Polytope volume computation: Gaussian cooling on manifolds 6.1 Algorithm: cooling schedule . . . . . . . . . . . . . . . . . . . . . 6.2 Correctness of the algorithm . . . . . . . . . . . . . . . . . . . . . 6.2.1 Initial and terminal conditions . . . . . . . . . . . . . . . 6.2.2 Variance of Yx . . . . . . . . . . . . . . . . . . . . . . . . 6.2.3 Main lemma . . . . . . . . . . . . . . . . . . . . . . . . . . 6.3 Volume computation with the log barrier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 32 32 32 35 37 38 7 Logarithmic barrier 7.1 Riemannian geometry on ML (G2 ) . . . . 7.2 Hamiltonian walk on ML . . . . . . . . . 7.3 Randomness of the Hamiltonian flow (ℓ0 ) 7.4 Parameters R1 , R2 and R3 . . . . . . . . . 7.5 Stability of L2 + L4 + L∞ norm (ℓ1 ) . . . 7.6 Mixing Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 39 40 42 46 53 55 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A Matrix ODE 59 B Concentration 61 C Calculus 61 D Basic definitions of Riemannian geometry 62 D.1 Curvature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 D.2 Hessian manifolds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 2 1 Introduction Hamiltonian dynamics provide an elegant alternative to Newtonian mechanics. The Hamiltonian H, which captures jointly the potential and kinetic energy of a particle, is a function of its position and velocity. First-order differential equations describe the change in both. ∂H(x, v) dx = , dt ∂v dv ∂H(x, v) =− . dt ∂x As we review in Section 2, these equations preserve the Hamiltonian H. Riemannian Hamiltonian Monte Carlo (or RHMC) [26, 25][6, 7] is a Markov Chain Monte Carlo method for sampling from a desired distribution. The target distribution is encoded in the definition of the Hamiltonian. Each step of the method consists of the following: At a current point x, 1. Pick a random velocity y according to a local distribution defined by x (in the simplest setting, this is the standard Gaussian distribution for every x). 2. Move along the Hamiltonian curve defined by Hamiltonian dynamics at (x, y) for time (distance) δ. For a suitable choice of H, the marginal distribution of the current point x approaches the desired target distribution. Conceptually, the main advantage of RHMC is that it does not require a Metropolis filter (as in the Metropolis-Hastings method) and its step sizes are therefore not severely limited even in high dimension. Over the past two decades, RHMC has become very popular in Statistics and Machine Learning, being applied to Bayesian learning, to evaluate expectations and likelihood of large models by sampling from the appropriate Gibbs distribution, etc. It has been reported to significantly outperform other known methods [2, 25] and much effort has been made to make each step efficient by the use of numerical methods for solving ODEs. In spite of all these developments and the remarkable empirical popularity of RHMC, analyzing its rate of convergence and thus rigorously explaining its success has remained an open question. 1.1 Results In this paper, we analyze the mixing rate of Hamiltonian Monte Carlo for a general function f as a Gibbs sampler, i.e., to generate samples from the density proportional to e−f (x) . The corresponding Hamiltonian is H(x, v) = f (x) + 21 log((2π)n det g(x)) + 12 v T g(x)−1 v for some metric g. We show that for x in a compact manifold, the conductance of the Markov chain is bounded in terms of a few parameters of the metric g and the function f . The parameters and resulting bounds are given in Corollary 28 and Theorem 30. Roughly speaking, the guarantee says that Hamiltonian Monte Carlo mixes in polynomial time for smooth Hamiltonians. We note that these guarantees use only the smoothness and Cheeger constant (expansion) of the function, without any convexity type assumptions. Thus, they might provide insight in nonconvex settings where (R)HMC is often applied. We then focus on logconcave densities in Rn , i.e., f (x) is a convex function. This class of functions appears naturally in many contexts and is known to be sampleable in polynomial-time given access to a function value oracle. For logconcave densities, the current fastest sampling algorithms use n4 function calls, even for uniform sampling [20, 23], and n2.5 oracle calls given a 3 warm start after appropriate rounding (linear transformation) [14]. In the prototypical setting of uniform sampling from a polytope Ax ≥ b, with m inequalities, the general complexity is no better, with each function evaluation taking O(mn) arithmetic operations, for an overall complexity of n4 · mn = mn5 in the worst case and n2.5 · mn after rounding from a warm start. The work of Kannan and Narayanan [11] gives an algorithm of complexity mn2 · mnω−1 from an arbitrary start and mn · mnω−1 from a warm start (here ω is the matrix multiplication exponent), which is better than the general case when the number of facets m is not too large. This was recently improved to mn0.75 · mnω−1 from a warm start [13]; the subquadratic complexity for the number of steps is significant since all known general oracle methods cannot below a quadratic number of steps. The leading algorithms and their guarantees are summarized in Table 1. Year 1997 [10] 2003 [21] 2009 [11] 2016 [13] 2016 [15] This paper Algorithm Ball walk# Hit-and-run# Dikin walk Geodesic walk Ball walk# RHMC Steps n3 n3 mn 3 mn 4 n2.5 2 mn 3 Cost per step mn mn mnω−1 mnω−1 mn mnω−1 Table 1: The complexity of uniform polytope sampling from a warm start, where each step of e every algorithm uses O(n) bit of randomness. The entries marked # are for general convex bodies presented by oracles, while the rest are for polytopes. In this paper, using RHMC, we improve the complexity of sampling polytopes. In fact we do this for a general family of Gibbs distributions, of the form e−αφ(x) where φ(x) is a convex function over a polytope. When φ(x) is the standard logarithmic barrier function and g(x) is its Hessian, 1 1 we get a sampling method that mixes in only n 6 m 2 + 1 2 2 n5 m5 1 1 α 5 +m− 5 + n3 α+m−1 steps from a warm start! When α = 1/m, the resulting distribution is very close to uniform over the polytope. Theorem 1. Let φ be the logarithmic barrier for a polytope M with m constraints and n variables. Hamiltonian Monte Carlo applied to the function f = exp(−αφ(x)) and the metric given by ∇2 φ with appropriate step size mixes in ! 1 2 1 3 3n3 1 1 n m e + m2 n6 O + α + m−1 α 31 + m− 13 steps where each step is the solution of a Hamiltonian ODE. In recent independent work, Mangoubi and Smith [24] analyze Euclidean HMC in the oracle setting, i.e., assuming an oracle for evaluating φ. Their analysis formally gives a dimension-independent convergence rate based on certain regularity assumptions such as strong convexity and smoothness of the Hamiltonian H. Unfortunately, these assumptions do not hold for the polytope sampling problem. An important application of sampling is integration. The complexity of integration for general logconcave functions is also n4 oracle calls. For polytopes, the most natural questions is computing its volume. For this problem, the current best complexity is n4 · mn, where the factor of O(mn) is the complexity of checking membership in a polytope. Thus, even for explicitly specified polytopes, the complexity of estimating the volume from previous work is asymptotically the same as that 4 for a general convex body given by a membership oracle. Here we obtain a volume algorithm with 2 complexity mn 3 · mnω−1 , improving substantially on previous algorithms. The volume algorithm is based using Hamiltonian Monte Carlo for sampling from a sequence of Gibbs distributions over polytopes. We remark that in the case when m = O(n)1 , the final complexity is o(n4 ) arithmetic operations, improving by more than a quadratic factor in the dimension over the previous best complexity of Õ(n6 ) operations for arbitrary polytopes. These results and prior developments are given in Table 2. Year 1989 [5] 1989-93 [17, 4, 1, 18, 19] 1997 [10] 2003 [22] 2015 [3] This paper Algorithm DFK many improvements DFK, Speedy walk, isotropy Annealing, hit-and-run Gaussian Cooling* RHMC + Gaussian Cooling Steps n23 n7 n5 n4 n3 2 mn 3 Cost per step mn mn mn mn mn mnω−1 e Table 2: The complexity of volume estimation, each step uses O(n) bit of randomness, all except * the last for general convex bodies (the result marked is for well-rounded convex bodies). The current paper applies to general polytopes, and is the first improvement utilizing their structure. Theorem 2. For any polytope P = {x : Ax ≥ b} with m constraints and n variables, and any ε > 0, the Hamiltonian volume algorithm estimates the volume of P to within 1 ± ε multiplicative   2 −2 e 3 factor using O mn ε steps where each step consists of solving a first-order ODE and takes time   e mnω−1 LO(1) logO(1) 1 and L is the bit complexity2 of the polytope. O ε A key ingredient in the analysis of RHMC is a new isoperimetric inequality for Gibbs distributions over manifolds. This inequality can be seen as an evidence of a manifold version of the KLS hyperplane conjecture. For the family of Gibbs distributions induced by convex functions with convex Hessians, the expansion is within a constant factor of that of a hyperplane cut. This result might be of independent interest. 1.2 Approach and contributions Traditional methods to sample from distributions in Rn are based on random walks that take straight line steps (grid walk, ball walk, hit-and-run). While this leads to polynomial-time convergence for logconcave distributions, the length of each step has to be small due to boundary effects, and a Metropolis filter (rejection sampling) has to be applied to ensure the limiting  distribution is the desired one. These walks cannot afford a step of length greater than δ = O √1n for a distribution in isotropic position, and take a quadratic number of steps even for the hypercube. The Dikin walk for polytopes [11], which explicitly takes into account the boundary of polytope at each step, has a varying step size, but still runs into similar issues and the bound on its convergence rate is O(mn) for a polytope with m facets. 1 We suspect that the LS barrier [12] might be used to get a faster algorithm even in the regime even if m is sub-exponential. However, our proof requires a delicate estimate of the fourth derivative of the barrier functions. Therefore, such a result either requires a new proof or a unpleasantly long version of the current proof. 2 L = log(m + dmax + kbk∞ ) where dmax is the largest absolute value of the determinant of a square sub-matrix of A. 5 In a recent paper [13], we introduced the geodesic walk. Rather than using straight lines in Euclidean space, each step of the walk is along a geodesic (locally shortest path) of a Riemannian metric. More precisely, each step first makes a deterministic move depending on the current point (drift), then moves along a geodesic in a random initial direction and finally uses a Metropolis filter. Each step can be computed by solving a first-order ODE. Due to the combination of drift and geodesic, the local 1-step distributions are smoother than that of the Dikin walk and larger steps can be taken while keeping a bounded rejection probability for the filter. For sampling polytopes, 3 the manifold/metric defined by the standard log barrier gives a convergence rate of mn 4 , going below the quadratic (or higher) bound of all previous sampling methods. One major difficulty with geodesic walk is ensuring the stationary distribution is uniform. For high dimensional problems, this necessitates taking a sufficiently small step size and then rejecting some samples according to the desired transition probabilities according to Metropolis filter. Unfortunately, computing these transition probabilities can be very expensive. For the geodesic walk, it entails solving an n × n size matrix ODE. Hamiltonian Monte Carlo bears some similarity to the geodesic walk — each step is a random (non-linear) curve. But the Hamiltonian-preserving nature of the process obviates the most expensive ingredient, Metropolis filter. Due to this, the step size can be made longer, and as a result we 2 obtain a faster sampling algorithm for polytopes that mixes in mn 3 steps (the per-step complexity remains essentially the same, needing the solution of an ODE). To get a faster algorithm for volume computation, we extends the analysis to a general family of Gibbs distributions, including f (x) = e−αφ(x) where φ(x) is the standard log-barrier and α > 0. We show that the smoothness we need for the sampling corresponding to a variant of self-concordance defined in Definition 46. Furthermore, we establish an isoperimetric inequality for this class of functions. This can be viewed as an extension of the KLS hyperplane conjecture from Euclidean to Riemannian metrics (the analogous case in Euclidean space to what we prove here is the isoperimetry of the Gaussian density function multiplied by any logconcave function, a case for which the KLS conjecture holds). The mixing rate for this family of functions is sublinear for α = Ω(1). Finally, we study the Gaussian Cooling schedule of [3]. We show that in the manifold setting, 2 the Gaussian distribution e−kxk /2 can be replaced by e−αφ(x) . Moreover, the speed of Gaussian Cooling depends on the “thin-shell” constant of the manifold and classical self-concordance of φ. Combining all of these ideas, we obtain a faster algorithm for polytope volume computation. The resulting complexity of polytope volume computation is the same as that of sampling uniformly 2 from a warm start: mn 3 steps. To illustrate the improvement, for polytopes with m = O(n) facets, 5 the new bound is n 3 while the previous best bound was n4 . 1.3 Practicality From the experiments, the ball walk/hit-and-run seem to mix in n2 steps, the geodesic walk seems to mix in sublinear number of steps (due to the Metropolis filter bottleneck) and RHMC seems to mix in only polylogarithmic number of steps. One advantage of RHMC compared to the geodesic walk is that it does not require the expensive Metropolis filter that involves solving n × n matrix ODEs. In the future, we plan to do an empirical comparison study of different sampling algorithms. We are hopeful that using RHMC we might finally be able to sample from polytopes in millions of dimensions after more than three decades of research on this topic! 6 1.4 Notation Throughout the paper, we use lowercase letter for vectors and vector fields and uppercase letter for d matrices and tensors. We use ek to denote coordinate vectors. We use dt for the usual derivative, df (c(t)) ∂ is the derivative of some function f along a curve c parametrized by t, we use ∂v for e.g. dt k th the usual partial derivative. We use D f (x)[v1 , v2 , · · · , vk ] for the k directional derivative of f at x along v1 , v2 , · · · , vk . We use ∇ for the usual gradient and the connection (manifold derivative, defined in Section D which takes into account the local metric), Dv for the directional derivative of a vector with respect to the vector (or vector field) v (again, defined in Section D), and Dt if the curve v(t) is clear from the context. We use g for the local metric. Given a point x ∈ M , g is a matrix with entries gij . Its inverse has entries g ij . Also, n is the dimension, m the number of inequalities. We use dT V for the total variation (or L1 ) distance between two distributions. 1.5 Organization In Section 2, we define the Riemannian Hamiltonian Monte Carlo and study its basic properties such as time-reversibility. In Section 3, we give the the first convergence rate analysis of RHMC. However, the convergence rate is weak for the sampling applications (it is polynomial, but not better than previous methods). In Section 4, we introduce more parameters and use them to get a tighter analysis of RHMC. In Section 5, we study the isoperimetric constant of f (x) = e−αφ(x) under the metric ∇2 φ(x). In Section 6, we study the generalized Gaussian Cooling schedule and its relation to the thin-shell constant. Finally, in Section 7, we compute the parameters we need for the log barrier function. 7 2 Basics of Hamiltonian Monte Carlo In this section, we define the Hamiltonian Monte Carlo method for sampling from a general distribution e−H(x,y) . Hamiltonian Monte Carlo uses curves instead of straight lines and this makes the walk time-reversible even if the target distribution is not uniform, with no need for a rejection sampling step. In contrast, classical approaches such as the ball walk require an explicit rejection step to converge to a desired stationary distribution. Definition 3. Given a continuous, twice-differentiable function H : M×Rn ⊂ Rn ×Rn → R (called the Hamiltonian, which often corresponds to the total energy of a system) where M is the x domain of H, we say (x(t), y(t)) follows a Hamiltonian curve if it satisfies the Hamiltonian equations ∂H(x, y) dx = , dt ∂y dy ∂H(x, y) =− . dt ∂x (2.1) def We define the map Tδ (x, y) = (x(δ), y(δ)) where the (x(t), y(t)) follows the Hamiltonian curve with the initial condition (x(0), y(0)) = (x, y). Hamiltonian Monte Carlo is the result of a sequence of randomly generated Hamiltonian curves. Algorithm 1: Hamiltonian Monte Carlo Input: some initial point x(1) ∈ M. for i = 1, 2, · · · , T do R 1 (k) Sample y (k+ 2 ) according to e−H(x ,y) /π(x(k) ) where π(x) = Rn e−H(x,y) dy. 1 With probability 12 , set (x(k+1) , y (k+1) ) = Tδ (x(k) , y (k+ 2 ) ). 1 Otherwise, (x(k+1) , y (k+1) ) = T−δ (x(k) , y (k+ 2 ) ). end Output: (x(T +1) , y (T +1) ). Lemma 4 (Energy Conservation). For any Hamiltonian curve (x(t), y(t)), we have that d H(x(t), y(t)) = 0. dt Proof. Note that ∂H dx ∂H dy ∂H ∂H ∂H ∂H d H(x(t), y(t)) = + = − = 0. dt ∂x dt ∂y dt ∂x ∂y ∂y ∂x Lemma 5 (Measure Preservation). For any t ≥ 0, we have that det (DTt (x, y)) = 1 where DTt (x, y) is the Jacobian of the map Tt at the point (x, y). 8 Proof. Let (x(t, s), y(t, s)) be a family of Hamiltonian curves given by Tt (x + sdx , y + sdy ). We write u(t) = ∂ ∂ x(t, s)|s=0 , v(t) = y(t, s)|s=0 . ∂s ∂s By differentiating the Hamiltonian equations (2.1) w.r.t. s, we have that du ∂ 2 H(x, y) ∂ 2 H(x, y) = u+ v, dt ∂y∂x ∂y∂y dv ∂ 2 H(x, y) ∂ 2 H(x, y) =− u− v, dt ∂x∂x ∂x∂y (u(0), v(0)) = (dx , dy ). This can be captured by the following matrix ODE ∂ 2 H(x(t),y(t)) ∂y∂x 2 − ∂ H(x(t),y(t)) ∂x∂x dΦ = dt ∂ 2 H(x(t),y(t)) ∂y∂y 2 − ∂ H(x(t),y(t)) ∂x∂y ! Φ(t) dx dy  Φ(0) = I using the equation DTt (x, y)  dx dy  =  u(t) v(t)  = Φ(t)  . Therefore, DTt (x, y) = Φ(t). Next, we observe that   d −1 d log det Φ(t) = Tr Φ(t) Φ(t) = Tr dt dt ∂ 2 H(x(t),y(t)) ∂y∂x 2 − ∂ H(x(t),y(t)) ∂x∂x ∂ 2 H(x(t),y(t)) ∂y∂y 2 − ∂ H(x(t),y(t)) ∂x∂y ! = 0. Hence, det Φ(t) = det Φ(0) = 1. Using the previous two lemmas, we now show that Hamiltonian Monte Carlo indeed converges to the desired distribution. Lemma 6 (Time reversibility). Let px (x′ ) denote the probability density of one step of the Hamiltonian Monte Carlo starting at x. We have that π(x)px (x′ ) = π(x′ )px′ (x) R for almost everywhere in x and x′ where π(x) = Rn e−H(x,y) dy. Proof. Fix x and x′ . Let Fδx (y) be the x component of Tδ (x, y). Let V+ = {y : Fδx (y) = x′ } and x (x) = x′ )}. Then, V− = {y : F−δ π(x)px (x′ ) = 1 2 Z y∈V+ 1 e−H(x,y)  + x 2 det DFδ (y) Z y∈V− e−H(x,y)  . x (y) det DF−δ We note that this formula assumed that DFδx is invertible. Sard’s theorem showed that Fδx (N ) is def measure 0 where N = {y : DFsx (y) is not invertible}. Therefore, the formula is correct except for a measure zero subset. 9 By reversing time for the Hamiltonian curve, we have that for the same V± , Z Z ′ ′ ′ ′ 1 e−H(x ,y ) e−H(x ,y ) 1   + π(x′ )px′ (x) = x′ (y ′ ) 2 y∈V+ det DF−δ 2 y∈V− det DFδx′ (y ′ ) (2.2) where y ′ denotes the y component of Tδ (x, y) and T−δ (x, y) in the first  and second  sum respectively. A B We compare the first terms in both equations. Let DTδ (x, y) = . Since Tδ ◦ T−δ = I C D and Tδ (x, y) = (x′ , y ′ ), the inverse function theorem shows that DT−δ (x′ , y ′ ) is the inverse map of DTδ (x, y). Hence, we have that   −1  A B · · · −A−1 B(D − CA−1 B)−1 ′ ′ DT−δ (x , y ) = . = ··· ··· C D ′ x (y ′ ) = −A−1 B(D − CA−1 B)−1 . Hence, we have that Therefore, we have that Fδx (y) = B and F−δ   −1 x′ = det DF−δ (y ′ ) = det A−1 det B det D − CA−1 B |det B|   . A B det C D   A B = 1 (Lemma 5), we have that C D   x′ det DF−δ (y ′ ) = |det (DFδx (y))| . Using that det (DTt (x, y)) = det Hence, we have that 1 2 Z y∈V+ 1 e−H(x,y)  = x 2 det DFδ (y) = 1 2 −H(x′ ,y ′ ) Z Z y∈V+ e−H(x,y)  x′ (y ′ ) det DF−δ ′ y∈V+ ′ e−H(x ,y )  x′ (y ′ ) det DF−δ where we used that e−H(x,y) = e (Lemma 4) at the end. For the second term in (2.2), by the same calculation, we have that Z Z ′ ′ 1 e−H(x,y) e−H(x ,y ) 1   = x (y) 2 y∈V− det DF−δ 2 y∈V+ det DFδx′ (y ′ ) Combining both terms we have the result. The main challenge in analyzing Hamiltonian Monte Carlo is to bound its mixing time. 2.1 Hamiltonian Monte Carlo on Riemannian manifolds Suppose we want to sample from the distribution e−f (x) . We define the following energy function H: 1 1 def (2.3) H(x, v) = f (x) + log((2π)n det g(x)) + v T g(x)−1 v. 2 2 One can view x as the location and v as the velocity. The following lemma shows that the first variable x(t) in the Hamiltonian curve satisfies a second-order differential equation. When we view the domain M as a manifold, this equation is simply Dt dx dt = µ(x), namely, x acts like a particle under the force field µ. (For relevant background on manifolds, we refer the reader to Appendix D). 10 Lemma 7. In Euclidean coordinates, The Hamiltonian equation for (2.3) can be rewritten as Dt dx =µ(x), dt dx (0) ∼N (0, g(x)−1 ) dt   where µ(x) = −g(x)−1 ∇f (x) − 12 g(x)−1 Tr g(x)−1 Dg(x) and Dt is the Levi-Civita connection on the manifold M with metric g. Proof. From the definition of the Hamiltonian curve, we have that dx = g(x)−1 v dt  1 dx T dv 1  dx = −∇f (x) − Tr g(x)−1 Dg(x) + Dg(x) . dt 2 2 dt dt Putting the two equations together, we have that dx dv d2 x = − g(x)−1 Dg(x)[ ]g(x)−1 v + g(x)−1 2 dt dt dt   1 dx dx 1 dx T dx = − g(x)−1 Dg(x)[ ] − g(x)−1 ∇f (x) − g(x)−1 Tr g(x)−1 Dg(x) + g(x)−1 Dg(x) . dt dt 2 2 dt dt Hence, T   dx dx 1 1 d2 x dx −1 −1 dx + g(x) Dg(x)[ ] − g(x) = − g(x)−1 ∇f (x) − g(x)−1 Tr g(x)−1 Dg(x) . Dg(x) 2 dt dt dt 2 dt dt 2 (2.4) Using the formula of Christoffel symbols Dt dx d2 x X dxi dxj k = 2 + Γ ek dt dt dt dt ij where Γkij = 1 X kl g (∂j gli + ∂i glj − ∂l gij ), 2 l ijk we have that Dt X dxi dxj d2 x 1 dx = 2 + g(x)−1 (∂j gli + ∂i glj − ∂l gij )el dt dt 2 dt dt ijl = T d2 x dx dx 1 dx −1 −1 dx + g(x) Dg(x)[ ] − g(x) Dg(x) . dt2 dt dt 2 dt dt Putting this into (2.4) gives Dt   dx 1 = − g(x)−1 ∇f − g(x)−1 Tr g(x)−1 Dg(x) . dt 2 Motivated by this, we define the Hamiltonian map as the first component of the Hamiltonian dynamics operator T defined earlier. For the reader familiar with Riemannian geometry, this is similar to the exponential map (for background, see Appendix D). 11 Definition 8. Let Hamx,δ (vx ) = γ(δ) where γ(t) be the solution of the Hamiltonian equation ′ Dt dγ dt = µ with initial conditions γ(0) = x and γ (0) = vx . We also denote Hamx,1 (vx ) by Hamx (vx ). We now give two examples of Hamiltonian Monte Carlo. Example 9. When g(x) = I, the Hamiltonian curve acts like stochastic gradient descent for the function f with each random perturbation drawn from a standard Gaussian. Dt dx = −∇f (x). dt When g(x) = ∇2 f (x), the Hamiltonian curve acts like a stochastic Newton curve for the function f + ψ: −1 dx Dt = − ∇2 f (x) ∇(f (x) + ψ(x)) dt where the volumetric function ψ(x) = log det ∇2 f (x). Next we derive a formula for the transition probability in Euclidean coordinates. Lemma 10. For any x ∈ M ⊂ Rn and s > 0, the probability density of the 1-step distribution from x is given by s   X 1 det (g(y)) 2 −1 exp − kvx kx (2.5) px (y) = |det(DHamx,δ (vx ))| (2π)n 2 vx :Hamx,δ (vx )=y where DHamx,δ (vx ) is the Jacobian of the Hamiltonian map Hamx,δ . Proof. We prove the formula by separately considering each vx ∈ Tx M s.t. Hamx,δ (vx ) = y, then summing up. In the tangent space Tx M, the point vx follows a Gaussian step. Therefore, the probability density of vx in Tx M is as follows:   1 1 2 exp − kv k pTxx M (vx ) = x x . 2 (2π)n/2 Let y = Hamx,δ (vx ) and F : Tx M → Rn be defined by F (v) = idM→Rn ◦ Hamx,δ (v). Here Rn is the same set as M but endowed with the Euclidean metric. Hence, we have DF (vx ) = DidM→Rn (y)DHamx,δ (vx ). The result follows from px (y) = |det(DF (vx ))|−1 pxTx M (vx ) and det DF (vx ) = det (DidM→Rn (y)) det (DHamx,δ (vx )) = det(g(y))−1/2 det (DHamx,δ (vx )) . 12 3 Convergence of Riemannian Hamiltonian Monte Carlo Hamiltonian Monte Carlo is a Markov chain on a manifold whose stationary stationary distribution has density q(x) proportional to exp(−f (x)). We will bound the conductance of this Markov chain and thereby its mixing time to converge to the stationary distribution. Bounding conductance involves showing (a) the induced metric on the state space satisfies a strong isoperimetric inequality and (b) two points that are close in metric distance are also close in probabilistic distance, i.e., the one-step distributions from two nearby points have large overlap. In this section and the next, we present general conductance bounds using parameters determined by the associated manifold. In Section 7, we bound these parameters for the manifold corresponding to the logarithmic barrier in a polytope. 3.1 Basics of geometric Markov chains For completeness, we will discuss some standard techniques in geometric random walks in this subsection. For a Markov chain with state space M, stationary distribution q and next step distribution pu (·) for any u ∈ M, the conductance of the Markov chain is R def S pu (M \ S)dq(u) φ = inf . S⊂M min {q(S), q(M \ S)} The conductance of an ergodic Markov chain allows us to bound its mixing time, i.e., the rate of convergence to its stationary distribution, e.g., via the following theorem of Lovász and Simonovits. Theorem 11 ([19]). Let qt be the distribution of the current point after t steps of a Markov chain with stationary distribution q and conductance at least φ, starting from initial distribution q0 . For any ε > 0, s  t dq0 (x) φ2 1 . Ex∼q0 dT V (qt , q) ≤ ε + 1− ε dq(x) 2 Definition 12. The isoperimetry of a metric space M with target distribution q is R d(S,x)≤δ q(x)dx − q(S) def ψ = inf min δ>0 S⊂M δ min {q(S), q(M \ S)} where d is the shortest path distance in M. The proof of the following theorem follows the standard outline for geometric random walks (see e.g., [29]). Lemma 13. Given a metric space M and a time-reversible Markov chain p on M with stationary distribution q. Fix any r > 0. Suppose that for any x, y ∈ M with d(x, z) < r, we have that dT V (px , py ) ≤ 0.9. Then, the conductance of the Markov chain is Ω(rψ). Proof. Let S be any measurable subset of M. Then our goal is to bound the conductance of the Markov chain R S px (M \ S) dq(x) = Ω (rψ) . min {q(S), q(M \ S)} R R Since the Markov chain is time-reversible (For any two subsets A, B, A px (B) dq(x) = B px (A) dq(x)), we can write the numerator of the left hand side above as ! Z Z 1 px (S) dq(x) . px (M \ S) dq(x) + 2 M\S S 13 Define S1 = {x ∈ S : px (M \ S) < 0.05} S2 = {x ∈ M \ S : px (S) < 0.05} S3 = M \ S1 \ S2 . Without loss of generality, we can assume that q(S1 ) ≥ (1/2)q(S) and q(S2 ) ≥ (1/2)q(M \ S) (if R not, S px (M \ S) dq(x) = Ω(1) and hence the conductance is Ω(1).) Next, we note that for any two points x ∈ S1 and y ∈ S2 , dT V (px , py ) > 0.9. Therefore, by the assumption, we have that d(x, y) ≥ r. Therefore, by the definition of ψr , we have that Z q(x)dx − q(S1 ) q(S3 ) ≥ d(S1 ,x)≤r ≥ rψ min {q(S1 ), q(M \ S1 )} ≥ rψ min {q(S1 ), q(S2 )} . Going back to the conductance, 1 2 Z S px (M \ S) dq(x) + Z ! px (S) dq(x) M\S 1 ≥ 2 Z (0.05)dq(x) S3 = Ω (rψ) min{q(S1 ), q(S2 )} = Ω (rψ) min{q(S), q(M \ S)}. Therefore, the conductance of the Markov chain is Ω(rψ). Combining Theorem 13 and Lemma 13 gives the following result for bounding mixing time of general geometric random walk. Lemma 14. Given a metric space M and a time-reversible Markov chain p on M with stationary distribution q. Suppose that there exist r > 0 and ψ > 0 such that 1. For any x, y ∈ M with d(x, z) < r, we have that dT V (px , py ) ≤ 0.9. 2. For any S ⊂ M, we have that Z 0<d(S,x)≤r q(x)dx ≥ rψ min {q(S), q(M \ S)} . Let qt be the distribution of the current point after t steps of a Markov chain with stationary distribution q starting from initial distribution q0 . For any ε > 0, s t 1 dq0 (x) Ex∼q0 1 − Ω(r 2 ψ 2 ) . dT V (qt , q) ≤ ε + ε dq(x) 14 3.2 Overlap of one-step distributions The mixing of the walk depends on smoothness parameters of the manifold and the functions f, g used to define the Hamiltonian. Since each step of our walk involves a Gaussian vector, many smoothness parameters depend on choices of the random vector. Formally, let γ be the Hamiltonian curve used in a step of Hamiltonian Monte Carlo. In the analysis, we need a large fraction of Hamiltonian curves from any point on the manifold to be well-behaved. A Hamiltonian curve can be problematic when its velocity or length is too large and this happens with non-zero probability. Rather than using supremum bounds for our smoothness parameters, it suffices to use large probability bounds, where the probability is over the random choice of Hamiltonian curve at any point x ∈ Ω. To capture the notion that “most Hamiltonian curves are well-behaved”, we use an auxiliary function ℓ(γ) ≥ 0 which assigns a real number to each Hamiltonian curve γ and measures how “good” the curve is. The smoothness parameters assume that this function ℓ is bounded and Lipshitz. One possible choice of such ℓ is ℓ(γ) = kγ ′ (0)kγ(0) which measures the initial velocity, but this will give us a weaker bound. Instead, we use the following which jointly bounds the change in position (first term) and change in velocity (second term). Definition 15. An auxiliary function ℓ is a non-negative real-valued function on the set of Hamiltonian curves, i.e., maps γ : [0, δ] → M , with bounded parameters ℓ0 , ℓ1 such that 1. For any variation γs of a Hamiltonian curve (see Definition 18) with ℓ(γs ) ≤ ℓ0 , we have ! d d ′ ℓ(γs ) ≤ ℓ1 γs (0) + δ Ds γs (0) γs (0) . ds ds γs (0)   1 min 1, ℓℓ10δ where γ ∼ x indicates a ran2. For any x ∈ M , Pγ∼x (ℓ(γ) ≤ 21 ℓ0 ) ≥ 1 − 100 dom Hamiltonian curve starting at x, chosen by picking a random Gaussian initial velocity according to the local metric at x. 3.2.1 Proof Outline To bound the conductance of HMC, we need to show that one-step distributions from nearby points have large overlap for reasonably large step size δ. To this end, recall that the probability density of going from x to y is given by the following formula s   X 1 det (g(y)) 2 −1 exp − kvx kx . px (y) = |det (DHamx,δ (vx ))| (2π)n 2 vx :Hamx,δ (vx )=y In Section 3.2.2, we introduce the concept of variations of Hamiltonian curves and use it to bound |det (DHamx,δ (vx ))|−1 . We can show that px (y) is in fact close to s   X 1 det (g(y)) 1 2 · exp − kvx kx . (3.1) pex (y) = δn (2π)n 2 vx :Hamx,δ (vx )=y To compare px (y) with pz (y), we need to relate vx and vz that map x and z to y respectively. In Section 3.2.3, we shows that if x and z are close enough, for every vx , there is a unique vz such that vx is close to vz and that Hamz,δ (vz ) = Hamx,δ (vx ). Combining these facts, we obtain our main theorem for this section, stated in Subsection 3.2.4. 15 In the analysis, we use three important operators from the tangent space to itself. The motivation for defining these operators comes directly from Lemma 19, which studies the variation in Hamiltonian curves as the solution of a Jacobi equation. In words, the operator R(.) below allows us to write the change in the Hamiltonian curve as an ODE. Definition 16. Given a Hamiltonian curve γ, let R(γ, t), M (γ, t) and Φ(γ, t) be the operators from T M to T M defined by R(t)u = R(u, γ ′ (t))γ ′ (t), M (t)u = Du µ(γ(t)), Φ(t)u = M (t)u − R(t)u. When γ is explicit from the context, we simply write them as R(t), M (t) and Φ(t). The key parameter R1 we use in this section is a bound on the Frobenius norm of Φ formally defined as follows. Definition 17. Given a manifold M with metric g and an auxiliary function ℓ with parameters ℓ0 , ℓ1 , we define the smoothness parameter R1 depending only on M and the step size δ such that kΦ(γ, t)kF,γ(t) ≤ R1 for any γ such that ℓ(γ) ≤ ℓ0 and any 0 ≤ t ≤ δ where the Frobenius norm kAkF,γ(t) is defined by kAk2F,γ(t) = Eα,β∼N (0,g(x)−1 ) (αT Aβ)2 . The above definitions are related to but different from our previous paper analyzing the geodesic walk [13]. 3.2.2 Variation of Hamiltonian curve To bound the determinant of the Jacobian of Hamx , we study variations of Hamiltonian curves. Definition 18. We call γs (t) a Hamiltonian variation if γs (·) satisfies the Hamiltonian equation for s every s. We call ∂γ ∂s a Jacobi field. The following lemma shows that a Jacobi field satisfies the following Jacobi equation. Lemma 19. Given a path c(s), let γs (t) = Hamc(s) (t(v + sw)) be a Hamiltonian variation. The def Jacobi field ψ(t) = ∂ ∂s γs (t)|s=0 satisfies the following Jacobi equation Dt2 ψ(t) = Φ(t)ψ(t) (3.2) Let Γt parallel transport from Tγ(t,0) M to Tγ(0,0) M and ψ(t) = Γt ψ(t). Then, ψ(t) satisfies the following ODE on the tangent space Tγ(0,0) M: ′′ ψ (t) = Γt Φ(t)Γ−1 t ψ(t) ′ ψ (0) = w, ψ(0) = Ds c(0). 16 ∀t ≥ 0, (3.3) Proof. Taking derivative Ds on both sides of Dt ∂γ ∂t = µ(γ), and using Fact 67, we get ∂γ ∂t ∂γ ∂γ ∂γ ∂γ + R( , ) = Dt Ds ∂t ∂s ∂t ∂t ∂γ ∂γ ∂γ ∂γ = Dt2 + R( , ) . ∂s ∂s ∂t ∂t Ds µ(γ) = Ds Dt In short, we have Dt2 ψ(t) = Φ(t)ψ(t). This shows (3.2). Equation (3.3) follows from the fact that Dt v(t) = Γt  d Γ−1 t v(t) dt ′ for any vector field on γ0 (t) (see Definition 11 in the appendix) applied to v(t) = ψ (t). We now proceed to estimate the determinant of the Jacobian of Hamx . For this we will use the following elementary lemmas describing the solution of the following second-order matrix ODE: d2 Ψ(t) = Φ(t)Ψ(t), dt2 d Ψ(0) = B, dt Ψ(0) = A. (3.4) Lemma 20. Consider the matrix ODE (3.4). Let λ = max0≤t≤ℓ kΦ(t)k2 . For any t ≥ 0, we have that √ √ kBk kΨ(t)k2 ≤ kAk2 cosh( λt) + √ 2 sinh( λt). λ Lemma 21. Consider the matrix ODE (3.4). Let λ = max0≤t≤ℓ kΦ(t)kF . For any 0 ≤ t ≤ have that   t3 2 kΨ(t) − A − BtkF ≤ λ t kAk2 + kBk2 . 5 √1 , λ we In particular, this shows that Ψ(t) = A + Bt +  with kE(s)kF ≤ λ s2 kAk2 + s3 5  kBk2 . Z t 0 (t − s)Φ(s)(A + Bs + E(s))ds The proofs of these lemmas are in Appendix A. We continue with the main proof here. Lemma 22. Let γ(t) = Hamx (tvx ) be a Hamiltonian curve and step size δ satisfy 0 < δ2 ≤ R11 where R1 = max0≤t≤h kΦ(t)kF,γ(t) . Then DHamx,δ is invertible with kDHamx,δ − δIkF,γ(δ) ≤ 5δ . Also, we have, log det  2  Z δ δ 2 R1 t(δ − t) 1 DHamx,δ (vx ) − TrΦ(t)dt ≤ . δ δ 10 0 17 (3.5) Proof. We want to compute DHamx,δ (vx )[w] for some w ∈ Tx M . By definition, we have that DHamx,δ (vx )[w] = ∂ γ(t, s)|t=δ,s=0 ∂s (3.6) where γ(t, s) = Hamx (t(vx + sw)). Define ψ(t) as in Lemma 19 with c(s) = x. So, Ds c(0) = 0, i.e., ψ(0) = 0. Then, by the lemma, ′′ ψ (t) = Γt Φ(t)Γ−1 t ψ(t), ′ ψ (0) = w, ψ(0) = 0. Now, we define Ψ be the solution of the matrix ODE Ψ′′ (t) = Γt Φ(t)Γ−1 t Ψ(t) ∀t ≥ 0, Ψ′ (0) = I, Ψ(0) = 0. By the definition of Ψ, we see that ψ(t) = Ψ(t)w. Therefore, we have that ∂ −1 γ(t, s)|s=0 = Γ−1 t ψ(t) = Γt Ψ(t)w. ∂s Combining it with (3.6), we have that DHamx,δ (vx ) = Γ−1 t Ψ(δ). Since Γt is an orthonormal matrix, we have that log det (DHamx,δ (vx )) = log det Ψ(δ). (3.7) Note that Γt Φ(t)Γ−1 t that F,γ(t) = kΦ(t)kF,γ(t) ≤ R1 for all 0 ≤ t ≤ δ. Using this, Lemma 21 shows 1 Ψ(δ) − I δ F,x ≤ R1  δ2 kIk2 5  ≤ 1 5 (3.8) Hence, Ψ(δ) is invertible, and so is DHamx . By Lemma 64, we have that 1 log det( Ψ(δ)) − Tr δ  1 Ψ(δ) − I δ  ≤  1 2 δ R1 5 2 . (3.9) Now we need to estimate Tr(Ψ(δ) − δI). Lemma 21 shows that Z δ Z δ (δ − t)Φ(t)E(t)dt t(δ − t)Φ(t)dt + Ψ(δ) = δI + 0 0 3 with kE(t)kF,γ(t) ≤ t 5R1 for all 0 ≤ t ≤ δ. Since  Z δ Z δ δ5 (δ − t) kΦ(t)kF,x kE(t)kF,x dt ≤ R12 , (δ − t)Φ(t)E(t)dt ≤ Tr 20 0 0 we have that Tr  1 Ψ(δ) − I − δ Z δ 0 t(δ − t) Φ(t)dt δ  ≤ δ4 2 R . 20 1 Combining (3.9) and (3.10), we have 2  2 Z δ δ 2 R1 t(δ − t) 1 2 δ4 2 1 TrΦ(t)dt ≤ δ R1 + R1 ≤ . log det( Ψ(δ)) − δ δ 5 20 10 0 Applying (3.7), we have the result. 18 (3.10) 3.2.3 Local Uniqueness of Hamiltonian Curves Next, we study the local uniqueness of Hamiltonian curves. We know that for every pair x, y, there can be multiple Hamiltonian curves connecting x and y. Due to this, the probability density px at y in M is the sum over all possible Hamiltonian curves connecting x and y. The next lemma establishes a 1-1 map between Hamiltonian curves connecting x to y as we vary x. Lemma 23. Let γ(t) = Hamx (tvx ) be a Hamiltonian curve and let the step size δ satisfy 0 < δ2 ≤ 1 R1 , where R1 = max0≤t≤δ kΦ(t)kF,γ(t) . Let the end points be x = γ(0) and y = γ(δ). Then there is an unique smooth invertible function v : U ⊂ M → V ⊂ T M such that y = Hamz,δ (v(z)) for any z ∈ U where U is a neighborhood of x and V is a neighborhood of vx = v(x). Furthermore, 5 we have that k∇η v(x)kx ≤ 2δ kηkx and 1 η + ∇η v(x) δ x ≤ 3 R1 δ kηkx . 2 Let γs (t) = Hamc(s) (t · v(c(s))) where c(s) is any path with c(0) = x and c′ (0) = η. Then, for all 0 ≤ t ≤ δ, we have that ∂ ∂s γs (t) s=0 γ(t) ≤ 5 kηkx and Ds γs′ (t) s=0 γ(t) ≤ 10 kηkx . δ Proof. Consider the smooth function f (z, w) = Hamz,δ (w). From Lemma 22, the Jacobian of w at (x, vx ) in the w variables, i.e., DHamx,δ (vx ), is invertible. Hence, the implicit function theorem shows that there is a open neighborhood U of x and a unique function v on U such that f (z, v(z)) = f (x, vx ), i.e. Hamz,δ (v(z)) = Hamx,δ (vx ) = y. To bound ∇η v(x), we let γs (t) = Hamc(s) (t · v(c(s))) and c(s) be any path with c(0) = x and ′ c (0) = η. Let Γt be the parallel transport from Tγ(t) M to Tγ(0) M. Define ψ(t) = Γt ∂ ∂s γs (t). s=0 Lemma 19 shows that ψ(t) satisfies the following ODE ′′ ψ (t) = Γt Φ(t)Γ−1 t ψ(t) ∀t ≥ 0, ′ ψ (0) = ∇η v(x), ψ(0) = η. Moreover, we know that ψ(δ) = 0 because γs (δ) = Hamc(s) (δ · v(c(s))) = Hamc(s),δ (v(c(s))) = y for small enough s. To bound k∇η v(x)kx , we note that Lemma 21 shows that   t 2 (3.11) ψ(t) − η − t · ∇η v(x) x ≤ R1 t kηkx + k∇η v(x)kx . 5 Since ψ(δ) = 0 and δ2 ≤ 1 R1 , we have that kη + δ · ∇η v(x)kx ≤ kηkx + 19 δ k∇η v(x)kx 5 which implies that δ k∇η v(x)kx − kηkx ≤ kηkx + Therefore, k∇η v(x)kx ≤ 5 2δ δ k∇η v(x)kx . 5 kηkx . More precisely, from (3.11), we have that 1 η + ∇η v(x) δ x ≤ 3 R1 δ kηkx . 2 Putting this into (3.11), for t ≤ δ we get ψ(t) x   5 1 2 ≤ kηkx + kηkx + R1 t kηkx + kηkx ≤ 5 kηkx . 2 2 Now, apply the conclusion of Lemma 21 after taking a derivative, we have that Z t ′ Φ(s)(η + s · ∇η v(x) + E(s))ds ψ (t) = ∇η v(x) + 0  where kE(s)kx ≤ R1 s2 kηkx + that t ≤ δ, we have ′ ψ (t) x s3 5 k∇η v(x)kx  ≤ 3 2 kηkx . Hence, bounding each term and noting   5 10 5 3 ≤ kηkx + δR1 1 + + kηkx . kηkx ≤ 2δ 2 2 δ When we vary x, the Hamiltonian curve γ from x to y varies and we need to bound ℓ(γ) over the variation. Lemma 24. Given a Hamiltonian curve γ(t) = Hamx (t · vx ) with step size δ satisfying δ2 ≤ R11 , let c(s) be any geodesic starting at γ(0). Let x = c(0) = γ(0) and y = γ(δ). Suppose that the auxiliary ℓ0 dc function ℓ satisfies ds ≤ 7ℓ and ℓ(γ) ≤ 21 ℓ0 . Then, there is a unique vector field v on c such c(0) 1 that y = Hamc(s),δ (v(s)). Moreover, this vector field is uniquely determined by the geodesic c(s) and any v(s) on this vector field. Also, we have that ℓ(Hamc(s),δ (v(s))) ≤ ℓ0 for all s ≤ 1. Proof. Let smax be the supremum of s such that v(s) can be defined continuously such that y = Hamc(s),δ (v(s)) and ℓ(γs ) ≤ ℓ0 where γs (t) = Hamc(s) (t · v(s)). Lemma 23 shows that there is a neighborhood N at x and a vector field u on N such that for any z ∈ N , we have that y = Hamz,δ (u(z)). Also, this lemma shows that u(s) is smooth and hence the parameter ℓ1 shows that ℓ(γs ) is Lipschitz in s. Therefore, ℓ(γs ) ≤ ℓ0 in a small neighborhood of 0. Hence smax > 0. Now, we show smax > 1 by contradiction. By the definition of smax , we have that ℓ(γs ) ≤ ℓ0 for dc 5 5 any 0 ≤ s < smax . Hence, we can apply Lemma 23 to show that kDs v(s)kγ(s) ≤ 2δ ds γ(s) = 2δ L where L is the length of c up to s = 1 (since the speed is constant on any geodesic and the curve is defined over [0, 1]). Therefore, the function v is Lipschitz and hence v(smax ) is well-defined and ℓ(γsmax ) ≤ ℓ0 by continuity. Hence, we can apply Lemma 23 at ℓ(smax ) and extend the domain of ℓ(s) beyond smax . 20 To bound ℓ(γs ) beyond smax , we note that kDs γs′ kγ(s) = kDs v(s)kγ(s) ≤ d ds c γ(0) = L. Hence, d ds ℓ(γs ) 5 2δ L and ≤ (L + 25 L)ℓ1 by the definition of ℓ1 . Therefore, if L ≤ that ℓ(γs ) ≤ ℓ(γ) + 21 ℓ0 ≤ ℓ0 for all s ≤ 1.01 wherever v(s) is the assumption that smax is the supremum. Hence, smax > 1. d ds c γ(s) ℓ0 7ℓ1 , = we have defined. Therefore, this contradicts The uniqueness follows from Lemma 23. 3.2.4 Smoothness of one-step distributions Lemma 25. For δ2 ≤ px , pz from x, z satisfy 1 √ 100 nR1 and δ3 ≤ √ℓ0 , 100 nR1 ℓ1 the one-step Hamiltonian walk distributions   1 1 dTV (px , pz ) = O d(x, z) + . δ 25 ℓ0 . Let c(s) be a unit speed geodesic connecting x and Proof. We first consider the case d(x, y) < 7ℓ 1 ℓ0 z of length L < 7ℓ1 .   def Let ℓe = min 1, ℓℓ10δ . By the definition of ℓ0 , with probability at least 1 − ℓe in paths γ start at x, we have that ℓ(γ) ≤ 21 ℓ0 . Let Vx be the set of vx such that ℓ(Hamx (t · vx )) ≤ 21 ℓ0 . Since the ℓ0 and ℓ(γ) ≤ 12 ℓ0 , for those vx , Lemma 24 shows there is a family distance from x to z is less than 7ℓ 1 of Hamiltonian curves γs that connect c(s) to y, and ℓ(γs ) ≤ ℓ0 for each of them. For any vx ∈ V , we have that ℓ(γs ) ≤ ℓ0 . When ℓ(γs ) ≤ ℓ0 , by the definition of R1 , we indeed have that kΦ(t)k ≤ R1 and hence Lemma 22 shows that 2   Z δ δ 2 R1 t(δ − t) 1 DHamx,δ (vx ) ≤ TrΦ(t)dt + log det δ δ 10 0 2 2 2 δ R1 1 e δ √ nR1 + ≤ ℓ ≤ 6 10 600 where we used our assumption on δ. We use p(vx ) to denote the probability density of choosing vx and s   det (g(Hamx (δ · vx ))) 1 def 2 exp − kvx kx . pe(vx ) = (2πδ2 )n 2 Hence, we have that C −1 · p(vx ) ≤ pe(vx ) ≤ C · p(vx ) (3.12) 1 e ℓ. As we noted, for every vx , there is a corresponding vz such that Hamz (δ·vz ) = y where C = 1+ 600 and ℓ(Hamz (t · vz )) ≤ ℓ0 . Therefore, we have that def (1 − C 2 )p(vx ) + C(e p(vx ) − pe(vz )) ≤ p(vx ) − p(vz ) ≤(1 − C −2 )p(vx ) + C −1 (e p(vx ) − pe(vz )).   R 1 Since Vx p(vx )dvx ≥ 1 − 100 min 1, ℓℓ10δ , we have that Z ℓe |p(vx ) − p(vz )| dvx + 100 Vx Z Z ℓe ≤ |e p(vx ) − pe(vz )| dvx p(vx )dvx ) + 2 (1 + 100 Vx Vx Z Z d ℓe +2 pe(vc(s) ) dsdvx ≤ 50 Vx s ds dT V (px , pz ) ≤ 21 (3.13) Note that d pe(v ) = ds c(s)  −  1 d kv(s)k2c(s) pe(vc(s) ). 2 ds Using (3.12), we have that pe(vc(s) ) ≤ 2 · p(vc(s) ) and hence Z Vx d pe(v ) dy ≤ ds c(s) Z d kv(s)k2c(s) p(vc(s) )dy Vx ds d kv(s)k2c(s) ≤Eℓ(γs )≤ℓ0 ds (3.14) Using that k∂s c(s)k = 1, Lemma 23 shows that 1 ∂s c(s) + Ds v(s) δ x 3 ≤ R1 δ. 2 Therefore, we have that d kv(s)k2c(s) = 2 hv(s), Ds v(s)ic(s) ds 2 hv(s), ∂s c(s)ic(s) + 3R1 δ kv(s)kc(s) . ≤ δ Since v(s) is a random Gaussian vector from the local metric, we have that hv(s), ∂s c(s)ic(s) = O(1) √ and kv(s)kc(s) = O( n) with high probability. Putting it into (3.14), we have that Eℓ(γs )≤ℓ0 d kv(s)k2c(s) = O ds   √ 1 + δR1 n . δ Putting this into 3.14, we have that   Z √ d 1 pe(vc(s) ) dy = O + δR1 n . δ Vx ds Putting this into (3.13), we get dTV (px , pz ) = O   √ ℓe 1 + δR1 n L + δ 50 ℓ0 for any L < 7ℓ . By taking a minimal length geodesic, and summing over segment of length 1 any x and z, we have   √ 1 1 + δR1 n d(x, z) + dTV (px , pz ) = O δ 25   1 1 =O d(x, z) + . δ 25 22 ℓ0 8ℓ1 , for 3.3 Convergence bound Combining Lemma 25 and Lemma 14, we have the following result. Theorem 26. Given a manifold M. Let ℓ0 , ℓ1 , R1 be the parameters of the Hamiltonian Monte Carlo defined in Definition 15 and 17. Let qt be the distribution of the current point after t steps Hamiltonian Monte Carlo with step size δ satisfying δ2 ≤ 1 √ 100 nR1 δ3 ≤ and ℓ √0 , 100 nR1 ℓ1 starting from initial distribution q0 . Let q be the distribution proportional to e−f . For any ε > 0, we have that s  t dq0 (x) (δψ)2 1 Ex∼q0 1− dT V (qt , q) ≤ ε + ε dq(x) 2 where ψ is the conductance of the manifold defined in Definition 12. For ℓ(γ) = kγ ′ (0)kγ(0) , we can bound ℓ0 and ℓ1 as follows: √ Lemma 27. For the auxiliary function ℓ(γ) = kγ ′ (0)kγ(0) , we have that ℓ0 = 10 n and ℓ1 = O( 1δ ). Furthermore, we have that γ ′ (t) γ(t) ≤ γ ′ (0) γ(0) + R0 t where R0 = supx∈M kµ(x)kx . √ Proof. For ℓ0 , we note that γ ′ (0) ∼ N (0, g(x)−1 ) and hence kγ ′ (0)kγ(0) ≤ 5 n with probability √ e−O( n) . For ℓ1 , we note that d d γ ′ (0) ℓ(γs ) = ds ds s = γs (0) ≤ 1 2 hDs γs′ (0), γs′ (0)iγs (0) d ds kγs′ (0)k2γs (0) kγs′ (0)kγs (0) kγs′ (0)kγs (0) ≤ Ds γs′ (0) γs (0) . Hence, we have that ℓ1 = 1δ . Next, we note that d γ ′ (t) dt 2 γ(t) = 2 Dt γ ′ (t), γ ′ (t) γ(t) ≤ 2 kµ(γ(t))kγ(t) γ ′ (t) γ(t) . Therefore, we get the last result. Combining Lemma 27 and Theorem 26, we have the following result. This result might be more convenient to establish an upper bound on the rate of convergence, as it depends on only two worst-case smoothness parameters. In the next section, we will see a more refined bound that uses the randomness of Hamiltonian curves via additional parameters. 23 Corollary 28. Given a manifold M. Let qt be the distribution of the current point after t steps Hamiltonian Monte Carlo with step size δ and q be the distribution proportional to e−f . Let R0 and R1 be parameters such that 1. kµ(x)kx ≤ R0 for any x ∈ M where µ is defined in Lemma 7. 2. Eα,β∼N (0,g(x)−1 ) hDα µ(x), βi2x ≤ R12 for any x ∈ M. 3. Eα,β∼N (0,g(x)−1 ) hR(α, v)v, βi 2x ≤ R12 for any x ∈ M and any kvkx ≤ Riemann curvature tensor of M. Suppose that δ ≤ √ n R0 and δ2 ≤ 1 √ , 100 nR1 √ n where R is the then for any ε > 0, we have that dT V (qt , q) ≤ ε + s 1 dq0 (x) Ex∼q0 ε dq(x)  1− (δψ)2 2 t where ψ is the conductance of the manifold defined in Definition 12. In short, the mixing time of Hamiltonian Monte Carlo is    2 √ R −2 0 e ψ . nR1 + O n Proof. The statement is basically restating the√ definition of R1 and R0 used in Lemma 27 and Theorem 26. The only difference is that if δ ≤ Rn0 , then we know that γ ′ (t) γ(t) ≤ γ ′ (0) γ(0) √ + R0 t = O( n) for all 0 ≤ t ≤ δ. Therefore, we can relax the constraints ℓ(γ) ≤ ℓ0 in the definition of R1 to simply √ kvkx ≤ n. It allows us to use R1 without mentioning the auxiliary function ℓ. 4 Improved analysis of the convergence Corollary 28 gives a polynomial mixing time for the log barrier function. There are two bottlenecks to improving the bound. First, the auxiliary function ℓ it used does not capture the fact each curve γ in Hamiltonian Monte Carlo follows a random initial direction. Second, Lemma 23 also does not take full advantage of the random initial direction. In this section, we focus on improving Lemma 23. Our main theorem for convergence can be stated as follows in terms of ψ and additional parameters ℓ0 , ℓ1 , R1 , R2 , R3 (see Definitions 12, 15, 16, 17, 33 and 31). It uses the following key lemma. Theorem 29. For δ2 ≤ x, z satisfy 1 R1 and δ5 ≤ ℓ0 , R21 ℓ1 the one-step Hamiltonian walk distributions px , pz from  1 1 dTV (px , pz ) = O δ R2 + + δR3 d(x, z) + . δ 25  2 Remark. The constant term at the end is an artifact that comes from bounding the probability of some bad events of the Hamiltonian walk, and can be made to arbitrary small. 24 We now prove this theorem. In a later section, we specialize to sampling distributions over polytopes using the logarithmic barrier, by defining a suitable auxiliary function and bounding all the parameters. The key ingredient is Theorem 29 about the overlap of one-step distributions, which we prove in the next section. Here is the consequence of Theorem 29 and Theorem 13. Theorem 30. Given a manifold M. Let ℓ0 , ℓ1 , R1 , R2 , R3 be the parameters of the Hamiltonian Monte Carlo defined in Definition 15, 17, 33 and 31. Let qt be the distribution of the current point after t steps Hamiltonian Monte Carlo starting from initial distribution q0 . Let q be the distribution proportional to e−f . Suppose that the step size δ satisfies δ2 ≤ 1 ℓ0 , δ5 ≤ 2 and δ3 R2 + δ2 R3 ≤ 1. R1 R1 ℓ 1 For any ε > 0, we have that s dT V (qt , q) ≤ ε + dq0 (x) 1 Ex∼q0 ε dq(x)  (δψ)2 1− 2 t where ψ is the conductance of the manifold. 4.1 Improved one-to-one correspondence for Hamiltonian curve In the previous section, we only used R1 to analyze how much a Hamiltonian curves change as one end point varies. Here we derive a more refined analysis of Lemma 23 using an additional parameter R3 . Definition 31. For a manifold M and auxiliary function ℓ, R3 is a constant such that for any Hamiltonian curve γ(t) of step size δ with ℓ(γ0 ) ≤ ℓ0 , if ζ(t) is the parallel transport of the vector γ ′ (0) along γ(t), then we have sup kΦ(t)ζ(t)kγ(t) ≤ R3 . 0≤t≤δ Lemma 32. Under the same assumptions as Lemma 23, we have that δ ∇η kv(x)k2x ≤ |hvx , ηix | + 3δ2 R3 kηkx . 2 Proof. Let χ = ∇η v(x). Define ψ(t) as in the proof of Lemma 23. Using Lemma 21 we get that 0 = ψ(δ) = η + δχ + Z 0 i.e., −δχ = η + with Z δ 0 kE(s)kx ≤ R1 δ (δ − s)Γs Φ(s)Γ−1 s (η + sχ + e(s))ds (δ − s)Γs Φ(s)Γ−1 s (η + sχ + E(s))ds  δ3 kχkx δ kηkx + 5 2 for all 0 ≤ s ≤ δ where we used k∇η v(x)kx ≤ 5 2δ  ≤ 2R1 δ2 kηkx kηkx at the end (by Lemma 23). 25 Therefore, δ |hv(x), χix | ≤ |hv(x), ηix | + δ2 sup hv(x), Γs Φ(s)Γ−1 s (η + sχ + E(s))ix . 2 0≤s≤δ Noting that kη + sχ + E(s)kx ≤ kηkx + δ kχkx + kE(s)kx ≤ (1 + 5 + 2R1 δ2 ) kηkx ≤ 6 kηkx , 2 δ |hv(x), χix | ≤ |hv(x), ηix | + 3δ2 sup x we have 0≤s≤δ = |hv(x), ηix | + 3δ2 sup 0≤s≤δ γ ′ (0)T Γs Φ(s)Γ−1 s Φ(s)Γs γ ′ (0) γ(s) kηkx kηkx ≤ |hv(x), ηix | + 3δ2 R3 kηkx . Finally, we note that 4.2 δ ∇η kv(x)k2x = δ hv(x), ∇η v(x)ix . 2 Improved smoothness of one-step distributions The proof of Theorem 29 is pretty similar to Lemma 25. First, we show that px (y) is in fact close to s  Z δ  X t(δ − t) 1 det (g(y)) 2 exp − TrΦ(t)dt − kvx kx . (4.1) pex (y) = (2πδ2 )n δ 2 0 vx :Hamx,δ (vx )=y Note that this is a more refined estimate than (3.1). We use Lemma 32 to bound the change of kvx k2x . For the change of TrΦ(t), we defer the calculation until the end of this section. Theorem 29. For δ2 ≤ x, z satisfy 1 R1 and δ5 ≤ ℓ0 , R21 ℓ1 the one-step Hamiltonian walk distributions px , pz from  1 1 dTV (px , pz ) = O δ R2 + + δR3 d(x, z) + . δ 25  Proof. We first consider the case d(x, y) < δ2 ≤ R11 and δ5 ≤ Rℓ20ℓ , we have that 2 ℓ0 7ℓ1 . By a similar argument as Lemma 25, using that 1 1 Z Z d ℓe +2 pe(vc(s) ) dsdvx dT V (px , pz ) ≤ 50 Vx s ds   def where ℓe = min 1, ℓℓ10δ . By direct calculation, we have d pe(v ) = ds c(s)  Z − δ 0  t(δ − t) d 1 d 2 ′ TrΦ(γs (t))dt − kv(s)kc(s) pe(vc(s) ). δ ds 2 ds By similar argument as (3.12), we have that pe(vc(s) ) ≤ 2 · p(vc(s) ) and hence  Z δ t(δ − t) d 1 d d 2 ′ pe(v ) ≤ 2 TrΦ(γs (t))dt + kv(s)kc(s) p(vc(s) ). ds c(s) δ ds 2 ds 0 26 (4.2) Since ℓ(γs ) ≤ ℓ0 , we can use Lemma 34 to get Z δ 0 Hence,  t(δ − t) d TrΦ(γs′ (t))dt ≤ O δ2 R2 . δ ds Z Z Z d 2 pe(vc(s) ) dvx ≤O(δ R2 ) p(vc(s) )dvx + Vx ds Vx Vx R For the first term, we note that Vx p(vc(s) )dvx ≤ 1. For the second term, we have that Z d kv(s)k2c(s) p(vc(s) )dvx ≤Eℓ(γs )≤ℓ0 Vx ds d kv(s)k2c(s) p(vc(s) )dvx . ds (4.3) d kv(s)k2c(s) . ds (4.4) By Lemma 32, we have that δ d kv(s)k2c(s) ≤ |hv(s), ∂s cix | + 3δ2 R3 k∂s ckx . 2 ds Since k∂s ckx = 1 and |hv(s), ∂s cix | = O(1) with high probability since v(s) is a Gaussian vector from the local metric. We have δ d kv(s)k2c(s) ≤ O(1) + 3δ2 R3 . 2 ds Putting it into (4.4) and (4.3), we have that   Z d 1 2 pe(vc(s) ) dvx = O δ R2 + + δR3 . δ Vx ds Putting this into 4.2, we get   1 ℓe dTV (px , pz ) = O δ R2 + + δR3 L + δ 50 2 ℓ0 . By taking a minimal length geodesic, and summing over segment of length for any L < 7ℓ 1 any x and z, we have   1 1 2 dTV (px , pz ) = O δ R2 + + δR3 d(x, z) + . δ 25 ℓ0 8ℓ1 , for Definition 33. Given a Hamiltonian curve γ(t) with ℓ(γ0 ) ≤ ℓ0 . Let R2 be a constant depending on the manifold M and the step size δ such that for any 0 ≤ t ≤ δ, any curve c(s) starting from γ(t) and any vector field v(s) on c(s) with v(0) = γ ′ (t), we have that ! dc d + δ k Ds v|s=0 kγ(t) R2 . TrΦ(v(s))|s=0 ≤ ds ds s=0 γ(t) 27 Lemma 34. For δ2 ≤ 1 R1 and ℓ(γs ) ≤ ℓ0 , we have Z δ 0  t(δ − t) d TrΦ(γs′ (t))dt ≤ O δ2 R2 δ ds where γs is a family of Hamiltonian curve that connect c(s) to y defined in Lemma 24. Proof. By Definition 33, we have that d TrΦ(γs′ (t)) ≤ ds ∂ ∂s γs (t) s=0 +δ γ(t) Ds γs′ (t) s=0 γ(t) ! · R2 . (4.5) d d d γs (0) = ds Hamc(s) (0) = ds c(s) is a unit vector and hence By definition of γs , we have that ds d ds γs (0) γ(0) = 1. Since Hamc(s),δ (v(s)) = y, Lemma 23 shows that ∂ ∂s γs (t) s=0 γ(t) ≤ 5 and Ds γs′ (t) Therefore, we have that d TrΦ(γs′ (t)) ≤ 15R2 . ds 28 s=0 γ(t) ≤ 10 . δ 5 5.1 Gibbs sampling on manifolds Isoperimetry for Hessian manifolds Here we derive a general isoperimetry bound, assuming that the manifold is defined by the Hessian of a convex function, and that the directional fourth directive is non-negative, a property satisfied, e.g., by the standard logarithmic barrier. Lemma 35. Let φ : [a, b] → R be a convex function such that φ′′ is also convex. For any x ∈ [a, b], we have that  Z b Z x p −φ(t) −φ(t) −φ(x) ′′ e dt . e dt, e ≥ 0.372 φ (x) min a x Let f (x) be the logconcave density proportional to VarX∼f (x) X ≤ e−φ(x) . Then, we have that O(1) . minx∈[a,b] φ′′ (x) p Proof. Case 1)p|φ′ (x)| ≥ a φ′′ (x) (we will pick a at the end). Without loss of generality, we have that φ′ (x) ≥ a φ′′ (x). Since φ is convex, we have that φ(t) ≥ φ(x) + φ′ (x)(t − x). Therefore, we have that Z Case 2) |φ′ (x)| ≤ a we have that p b x e−φ(t) dt ≤ Z ∞ ′ e−φ(x)−φ (x)(t−x) dt x e−φ(x) e−φ(x) = ′ ≤ p . φ (x) a φ′′ (x) φ′′ (x). Without loss of generality, we have that φ′′′ (x) ≥ 0. Since φ′′ is convex, φ′′ (t) ≥ φ′′ (x) + φ′′′ (x)(t − x) ≥ φ′′ (x) for t ≥ x. Hence, we have that ′ φ(t) = φ(x) + φ (x)(t − x) + Z t x (t − s)φ′′ (t)ds 1 ≥ φ(x) + φ (x)(t − x) + φ′′ (x)(t − x)2 2 ′ for all t ≥ x. Therefore, we have that Z Z b −φ(t) e dt ≤ x ∞ ′ 1 ′′ 2 e−φ(x)−φ (x)(t−x)− 2 φ (x)(t−x) ds −∞ Z ∞ 1 ′′ 2 ′ = e−φ(x) e−φ (x)s− 2 φ (x)s ds −∞ s 2 2π −φ(x)+ 21 φφ′′′(x) (x) = e φ′′ (x) s 2π −φ(x)+ a2 2 . e ≤ ′′ φ (x) 29 Hence, we have Z −φ(x) √ a2 e . 2πe 2 p φ′′ (x) x  2  − a2 e√ Combining both cases, the isoperimetric ratio is min a, 2π . Setting a to be the solution of p a2 ae 2 = √12π , this minimum is achieved at W (1/2π) > 0.372 where W is the inverse Lambert b e−φ(t) dt ≤ 1 . This proves the first result. function, i.e., W (x)eW (x) = 2π The variance of f follows from the fact that f is logconcave. This generalizes to higher dimension with no dependence on the dimension using localization, which we review next. Define an exponential needle E = (a, b, γ) as a segment [a, b] ⊆ Rn and γ ∈ R corresponding to the weight function eγt applied the segment [a, b]. The integral of an n-dimensional function h : Rn → R over this one dimensional needle is Z |b−a| Z b−a . h(a + tu)eγt dt where u = h= |b − a| 0 E Theorem 36 (Theorem 2.7 in [9]). Let f1 , f2 , f3 , f3 be four nonnegative continuous functions defined on Rn , and c1 , c2 > 0. Then, the following are equivalent: 1. For every logconcave function F defined on Rn with compact support,  c 1 Z  c 2 Z  c 1 Z Z F (x)f3 (x) dt ≤ F (x)f2 (x) dx F (x)f1 (x) dx Rn Rn Rn Rn F (x)f4 (x) dx  c2 2. For every exponential needle E, c 2 c 1 Z c 2 Z c 1 Z Z f4 f3 ≤ f2 f1 E E E E Lemma 37. Let φ : K ⊂ Rn → R be a convex function defined over a convex body K such that D 4 φ(x)[h, h, h, h] ≥ 0 for all x ∈ K and h ∈ Rn . Given any partition S1 , S2 , S3 of K with d = minx∈S1 ,y∈S2 d(x, y), i.e., the minimum distance between S1 and S2 in the Riemannian metric induced by φ. For any α > 0, we have that R −αφ(x) dx √ S3 e o = Ω( α · d) nR R min S1 e−αφ(x) dx, S2 e−αφ(x) dx Proof. By rescaling φ, we can assume α = 1. We write the desired inequality as follows, for a constant C, with χS being the indicator of set S: Z Z Z Z −φ(x) −φ(x) −φ(x) e−φ(x) χS3 (x) dx. e dx · e χS2 (x) dx ≤ e χS1 (x) dx · Cd Rn Rn Rn Rn Using the localization lemma for exponential needles (Theorem 36), with fi (x) being Cde−φ(x) χS1 (x), e−φ(x) χS2 (x), e−φ(x) and e−φ(x) χS3 (x) with respectively, it suffices to prove the following onedimensional inequality for functions φ defined on an interval and shifted by a linear term: Z 1 Z 1 e−φ((1−t)a+tb) e−ct χS2 ((1 − t)a + tb) dt e−φ((1−t)a+tb) e−ct χS1 ((1 − t)a + tb) dt · Cd 0 0 Z 1 Z 1 e−φ((1−t)a+tb) e−ct χS3 ((1 − t)a + tb) dt. e−φ((1−t)a+tb) e−ct dt · ≤ 0 0 30 Each Ti = {t : (1 − t)a + tb ∈ Si } is a union of intervals. By a standard argument (see [19]), it suffices to consider the case when each Si is a single interval and add up over all intervals in S3 . Thus it suffices to prove the statement in one dimension for all convex φ with convex φ′′ . In one-dimension, we have Z yp d(x, y) = φ′′ (t) dt. x Taking T3 = is [a′ , b′ ] ⊂ [a, b], the inequality we need to prove is that for any convex φ with convex φ′′ R a′ −φ(t) R b −φ(t) −φ(t) dt e dt b′ e a′ e ≥ Ω(1) a Rb R b′ p −φ(t) dt φ′′ (t) dt a e a′ R b′ −φ(t) e dt e−φ(x) ≥ minx∈[a′ ,b′ ] √ and that R ba′′ √ ′′ φ′′ (x) φ (t) dt a′ R b′ which is implied by noting 5.2 dt applying Lemma 35. Sampling with the log barrier For any polytope M = {Ax > b}, the logarithmic barrier function φ(x) is defined as φ(x) = − m X i=1 log(aTi x − bi ). Theorem 1. Let φ be the logarithmic barrier for a polytope M with m constraints and n variables. Hamiltonian Monte Carlo applied to the function f = exp(−αφ(x)) and the metric given by ∇2 φ with appropriate step size mixes in ! 1 2 1 3 3n3 1 1 n m e + m2 n6 O + α + m−1 α 31 + m− 13 steps where each step is the solution of a Hamiltonian ODE. √ Proof. Lemma 37 shows that the isoperimetric coefficient ψ is Ω( α). Also, we know that isoperi1 metric coefficient ψ is at worst Ω(m− 2 ) [16]. Lemma 61 shows that the condition of Theorem 30 is satisfied, thus implying the bound   √ e max( α, m− 12 )−2 δ−2 O    √ e max( α, m− 12 )−2 max n 32 , α 23 m 13 n 31 , αm 12 n 61 =O ! 2 1 1 1 1 2 3 + α 3 m 3 n 3 + αm 2 n 6 n e =O α + m−1 ! 1 2 1 3 3n3 1 1 n m e + m2 n6 =O + α + m−1 α 13 + m− 13 To implement the walk, we solve this ODE using the collocation method as described in [13]. The key lemma used in that paper is that the slack of the geodesic does not change by more than 1 ). Similarly in Lemma 53, we proved a constant multiplicative factor up to the step size δ = O( n1/4 the the Hamiltonian flow does not change by more than a constant multiplicative factor up to −1/3 n−1/4 √ ). Since the step size we use is Θ( n √ ), we can apply the the step size δ = O( 11/4 ) = O( 1+ α 1+ α M1 31 collocation method as described in [13] and obtain an algorithm to compute the Hamiltonian flow ω−1 logO(1) 1 ) time with additive error η distance in the local norm. Due to the exponential e in O(mn η convergence, it suffices for the sampling purpose with only a polylogarithmic overhead in the total running time. 6 Polytope volume computation: Gaussian cooling on manifolds The volume algorithm is essentially the Gaussian cooling algorithm introduced in [3]. Here we apply it to a sequence of Gibbs distributions rather than a sequence of Gaussians. More precisely, for a convex body K and a convex barrier function φ : K → R, we define (  exp −σ −2 φ(x) if x ∈ K 2 f (σ , x) = 0 otherwise and 2 F (σ ) = x∗ Z f (σ 2 , x) dx Rn where is the minimizer of φ (the center of K). Let µi be the probability distribution proportional to f (σi2 , x) where σi is the tempature of the Gibbs distribution to be fixed. The algorithm estimates each ratio in the following telescoping product: e−σ −2 φ(x∗ ) vol(K) ≈ F (σk ) = F (σ0 ) k 2 ) Y F (σi+1 i=1 F (σi2 ) for some large enough σk . 2 , x)/f (σ 2 , x). Then, Let x be a random sample point from µi and let Yx = f (σi+1 i Ex∼µi (Yx ) = 6.1 Algorithm: cooling schedule 6.2 Correctness of the algorithm 2 ) F (σi+1 . F (σi2 ) In this subsection, we prove the correctness of the algorithm. We separate the proof into two parts. In the first part, we estimate how small σ0 we start with should be and how large σk we end with should be. In the second part, we estimate the variance of the estimator Yx . 6.2.1 Initial and terminal conditions First, we need the following lemmas about self-concordance functions and logconcave functions: Lemma 38 ([27, Thm 2.1.1]). Let φ be a self-concordant function and x∗ be its minimizer. For any x such that φ(x) ≤ φ(x∗ ) + r 2 with r ≤ 12 , we have that φ(x) = φ(x∗ ) + 1 ± Θ(r) (x − x∗ )T ∇2 φ(x∗ )(x − x∗ ). 2 32 Algorithm 2: Volume(M , ε) Let σ02 = Θ(ε2 n−3 log−3 (n/ε)), 2 σi+1    σ 2 1 + √1 if ϑ ≤ nσi2 i n   = . σ 2 1 + min( √σi , 1 ) otherwise i 2 ϑ and ki = ( √ Θ( ε2n log nε ) Θ(( √ ϑ σi if ϑ ≤ nσi2 + 1)ǫ−2 log nε ) otherwise . Set i = 0. Compute x∗ = arg min φ(x). Assume that φ(x∗ ) = 0 by shifting the barrier function. Sample k0 points {X1 , . . . , Xk0 } from the Gaussian distribution centered at the minimizer x∗ −1 . of φ with covariance σ02 ∇2 φ(x∗ ) nϑ ϑ 2 while σi ≤ Θ(1) ε log ε do Sample ki points {X1 , . . . , Xk } using Hamiltonian Monte Carlo with target density f (σi2 , X) and the previous {X1 , . . . , Xk } as warm start. Compute the ratio ki 2 ,X ) f (σi+1 1 X j Wi+1 = · 2, X ) . ki f (σ j i j=1 Increment i. end n 1 Output: (2πσ02 ) 2 det(∇2 φ(x∗ ))− 2 W1 . . . Wi as the volume estimate. 33 Lemma 39 ([27, Prop 2.3.2]). For any ϑ-self-concordance barrier function φ on convex K, for any interior point x and y in K, we have that φ(x) ≤ φ(y) + ϑ ln 1 1 − πy (x) where πy (x) = inf{t ≥ 0|y + t−1 (x − y) ∈ K}. Lemma 40 ([23, Lem 5.16]). For any logconcave distribution f on Rn and any β ≥ 2, we have Px∼f (f (x) ≤ e−βn max f (y)) ≤ e−O(βn) . y 3 3 Lemma 41 (Large and small σ 2 ). Let φ be a ϑ-self concordant barrier function for K. If σn 2 log 2 1 1 1 and σn 2 log 2 σ1 ≤ 1, then we have that 1 σ ≤   3 1 3 1 n −2 ∗ ln F (σ) − ln e−σ φ(x ) (2πσ 2 ) 2 det(∇2 φ(x∗ ))− 2 ≤ O(σn 2 log 2 ). σ If σ 2 ≥ ϑ, then   −2 ∗ ln F (σ) − ln e−σ φ(x ) vol(K) ≤ O(σ −2 ϑ ln(σ 2 n/ϑ)). Proof. We begin with the first inequality. Let S be the set of x such that φ(x) ≤ φ(x∗ ) + βσ 2 n for some β ≥ 2 to be determined. Therefore, f (σ 2 , x) ≥ e−βn f (σ 2 , x∗ ) for all x ∈ S. Since f (σ 2 , x) is a logconcave function, Lemma 40 shows that Px∼f (S) ≤ e−O(βn) . Therefore, Z Z Z f (σ 2 , x) dx ≤ f (σ 2 , x) dx ≤ (1 + e−O(βn) ) f (σ 2 , x) dx. S S In short, we have −O(βn) F (σ) = (1 ± e ) Z f (σ 2 , x) dx. S By the construction of S, Lemma 38 and the fact that φ is self-concordant, if βσ 2 n ≤ 14 , we have that √ 1 ± Θ(σ βn) φ(x) = φ(x∗ ) + (x − x∗ )T ∇2 φ(x∗ )(x − x∗ ) 2 for all x ∈ S. Hence, Z √ σ −2 −2 ∗ ∗ T 2 ∗ ∗ F (σ) = (1 ± e−O(βn) )e−σ φ(x ) e−(1±O(σ βn)) 2 (x−x ) ∇ φ(x )(x−x ) dx. S Now we note that Z Z σ −2 σ −2 ∗ T 2 ∗ ∗ ∗ T 2 ∗ ∗ e−Θ( 2 (x−x ) ∇ φ(x )(x−x )) dx = e−O(βn) e− 2 (x−x ) ∇ φ(x )(x−x ) dx Sc because S σ −2 (x − x∗ )T ∇2 φ(x∗ )(x − x∗ ) = Ω(βn) 2 34 outside S. Therefore, F (σ) = (1 ± e−O(βn) )e−σ −O(βn) = (1 ± e −2 φ(x∗ ) Z 3 2 e−(1±O(σ √ Rn −σ−2 φ(x∗ ) ± O(σ(βn) ))e 3 = (1 ± e−O(βn) ± O(σ(βn) 2 ))e−σ −2 φ(x∗ ) −2 βn)) σ 2 (x−x∗ )T ∇2 φ(x∗ )(x−x∗ ) Z e− dx σ −2 (x−x∗ )T ∇2 φ(x∗ )(x−x∗ ) 2 dx Rn n 1 (2πσ 2 ) 2 det(∇2 φ(x∗ ))− 2 1 3 where we used that σ(βn) 2 = O(1) in first sentence and σ(βn) 2 = O(1) in the second sentence. Setting β = Θ(log σ1 ), we get the first result. For the second inequality, for any 0 ≤ t < 1 and any x ∈ x∗ + t(K − x∗ ), we have that πx∗ (x) ≤ t (πx∗ is defined in Lemma 39). Therefore, Lemma 39 shows that φ(x) ≤ φ(x∗ ) + ϑ ln 1 . 1−t Note that Px∼µ (x ∈ x∗ + t(K − x∗ )) = tn where µ is the uniform distribution in K. Therefore, for any 0 < β < 1, we have that Px∼µ (φ(x) ≤ φ(x∗ ) + ϑ ln 1 }) ≥ (1 − β)n . β Hence, vol(K) · e−σ −2 φ(x∗ ) ≥ F (σ 2 ) n  ≥ vol(K) · (1 − β) exp −σ −2  1 (φ(x ) + ϑ ln ) . β ∗ Setting β = σ −2 n−1 ϑ, we get the second result. 6.2.2 Variance of Yx Our goal is to estimate Ex∼µi (Yx ) within a target relative error. The algorithm estimates the quantity Ex∼µi (Yx ) by taking random sample points x1 , . . . , xk and computing the empirical estimate for Ex∼µi (Yx ) from the corresponding Yx1 , . . . , Yxk . The variance of Yxi divided by its expectation squared will give a bound on how many independent samples xi are needed to estimate Ex∼µi (Yx ) within the target accuracy. We have   R σ2 σi2 2φ(x) φ(x) − dx ) exp F ( 2σ2i+1 2 2 2 K σ σ i i+1 i −σi+1   Ex∼µi (Yx2 ) = = R φ(x) F (σi2 ) dx K exp − σ2 i and σ2 σ2 i ) F (σi2 )F ( 2σ2i+1 2 Ex∼µi (Yx2 ) i −σi+1 = 2 )2 Ex∼µi (Yx )2 F (σi+1 2 If we let σ 2 = σi+1 and σi2 = σ 2 /(1 + r), then we can further simplify as  2   2  σ σ 2 F 1+r F 1−r Ex∼µi (Yx ) = . Ex∼µi (Yx )2 F (σ 2 )2 35 (6.1) Lemma 42. For any 1 > r ≥ 0, we have that   2   2  σ σ Z r Z 1+t F 1−r F 1+r 1   = 4 Varx∼µs φ(x)dsdt ln σ 0 1−t F (σ 2 )2 2 where µs be the probability distribution proportional to f ( σs , x). 2 Proof. Fix σ 2 . Let g(t) = ln F ( σt ). Then, we have that   2   2    2   2  σ σ σ σ Z r F 1−r F 1+r d  F 1+t F 1−t    = dt ln ln F (σ 2 )2 F (σ 2 )2 0 dt Z r d d = g(1 + t) − g(1 − t)dt dt 0 dt Z r Z 1+t 2 d = g(s)dsdt. 2 ds 0 1−t For d2 g(s), ds2 (6.2) we have that Z  s  exp − 2 φ(x) dx σ K R  1 d K φ(x) · exp − σs2 φ(x) dx R  =− 2 · s σ ds K exp − σ2 φ(x) dx   2 ! R  2 R s 2 (x) · exp − s φ(x) dx φ(x) dx φ(x) · exp − φ 1 2 2 K R σ  σ − KR =  2 s 2 s σ K exp − σ2 φ(x) dx K exp − σ2 φ(x) dx   1 1 = 4 Ex∼µs φ2 (x) − (Ex∼µs φ(x))2 = 4 Varx∼µs φ(x). σ σ d2 d2 g(s) = ln ds2 ds2 Putting it into (6.2), we have the result. Now, we bound Varx∼µs φ(x). This can be viewed as a manifold version of the thin shell or variance hypothesis estimate. Lemma 43 (Thin shell estimates). Let φ be a ϑ-self concordant barrier function for K. Then, we have that  2  σ Varx∼µs φ(x) = O ϑ . s def Proof. Let Kt = {x ∈ K such that φ(x) ≤ t} and m be the number such that µs (Km ) = 21 . Let Km,r = {x such that d(x, y) ≤ r and y ∈ Km }. By repeatedly applying Lemma 37, we have that µs (Km,r ) = 1 − e−Ω( √ s r) σ . √ By our assumption on φ, for any x and y, we have that |φ(x) − φ(y)| ≤ ϑd(x, y). Therefore,√for √ s any x ∈ Km,r , we have that φ(x) ≤ m + ϑr. Therefore, with probability at least 1 − e−Ω( √σ r) √ √ s φ(x) ≥ m − ϑr. Hence, with 1 − e−Ω( σ r) in µs , it follows that φ(x) ≤ m + ϑr. Similarly, √ probability in µs , we have that |φ(x) − m| ≤ ϑr. The bound on the variance follows. 36 Now we are ready to prove the key lemma. Lemma 44. Let φ be a ϑ-self concordant barrier function for K. For any  Ex∼µi (Yx2 ) = O r 2 min 2 Ex∼µi (Yx )  1 2  ϑ ,n . σi2 > r ≥ 0, we have that Proof. Using Lemma 43 and Lemma 42, we have that   2   2  σ σ  2  F 1−r F 1+r r ϑ   =O . ln 2 σ2 F (σ 2 ) (6.3) This bounds is useful when σ 2 is large. case σ 2 is small, we recall that for any logconcave function f , the function a → RFor the n a a f (x) dx is logconcave (Lemma 3.2 in [8]). In particular, this shows that an F a1 is logconcave 1 1−r in a. Therefore, with a = 1+r σ2 , σ2 , σ2 ,we have 1 F (σ 2 )2 ≥ σ 4n  1+r σ2 n F Rearranging the term, we have that  2   2  σ σ F 1−r F 1+r F (σ 2 )2 Therefore, we have that  ln  F  σ2 1+r F  F  σ2 1+r ≤   σ2 1−r (σ 2 )2 1−r σ2 F  n . n 1 (1 + r)(1 − r) σ2 1−r  .  Combining (6.1), (6.3) and (6.4), we have the result. 6.2.3    = O nr 2 . (6.4) Main lemma Lemma 45. Given any ϑ-self-concordance barrier φ on a convex set K and 0 < ε < 12 , the algorithm Volume(M , ε) outputs the volume of K to within a 1 ± ε multiplicative factor. −2 ∗ n 1 Proof. By our choice of ε, Lemma 41 shows that e−σ0 φ(x ) (2πσ02 ) 2 det(∇2 φ(x∗ ))− 2 is an 1± 4ε mul−2 ∗ tiplicative approximation of F (σ0 ) and that e−σk φ(x ) vol(K) is a 1± 4ε multiplicative approximation of F (σk ). Note that we shifted the function φ such that φ(x∗ ) = 0. Therefore, k 2 n 1 Y F (σi+1 ) ε vol(K) = (1 ± )(2πσ02 ) 2 det(∇2 φ(x∗ ))− 2 2) . 2 F (σ i i=1 2 , X)/f (σ 2 , X) is upper In Lemma 44, we showed that the variance of the estimator Y = f (σi+1 i q √ 2 bounded by O(1)(EY ) . Note that the algorithm takes O( n) iterations to double σi if ϑn ≤ σi √ and O( ϑσi−1 ) iterations otherwise. By a simple analysis of variance, to have relative error ε, it e i ) samples in each phase. suffices to have O(k 37 6.3 Volume computation with the log barrier In this section, we prove the Theorem 2, restated below for convenience. Theorem 2. For any polytope P = {x : Ax ≥ b} with m constraints and n variables, and any ε > 0, the Hamiltonian volume algorithm estimates the volume of P to within 1 ± ε multiplicative   2 −2 e mn 3 ε factor using O steps where each step consists of solving a first-order ODE and takes time   e mnω−1 LO(1) logO(1) 1 and L is the bit complexity3 of the polytope. O ε 1 m e n− 3 ). Since the number n , the mixing time of HMC is O(m ·√ √ e 2n ), the total number of σ 2 is O( n) and since we samples O( ǫ Proof. In the first part, when σ 2 ≤ of sampling phases to double such steps of HMC is √    √  n − 31 e e e O mn =O ×O n ×O 2 ǫ In the second part, when σ 2 ≥ m n, 2 m · n3 ǫ2 ! . √ 1 2 e −2n 3 −1 + the mixing time of HMC is O( σ +m 1 m3 n3 σ −2 3 1 1 3 +m−√ 1 + m 2 n 6 ). m −2 e Since the number of sampling phases to double σ 2 is O(1+ σm ) and since we sample O(( σ +1)ε ) in each phase, the total number of steps of HMC is ! !  √   √  1 2 2 1 3 3 n3 3 1 1 m m · n n m m −2 e ( e e + m2 n6 × O 1 + + + 1)ε . ×O =O O σ −2 + m−1 σ − 32 + m− 13 σ σ ǫ2 Combining both parts, the total number of steps of HMC is ! 2 3 m · n e . O ǫ2 3 A. L = log(m + dmax + kbk∞ ) where dmax is the largest absolute value of the determinant of a square sub-matrix of 38 7 Logarithmic barrier For any polytope M = {Ax > b}, the logarithmic barrier function φ(x) is defined as φ(x) = − m X i=1 log(aTi x − bi ). We denote the manifold induced by the logarithmic barrier on M by ML . The goal of this section is to analyze Hamiltonian Monte Carlo on ML . In Section 7.1, we give explicit formulas for various Riemannian geometry concepts on ML . In Section 7.2, we describe the HMC specialized to ML . In Sections 7.3 to 7.5, we bound the parameters required by Theorem 30, resulting in Theorem 1. The following parameters that are associated with barrier functions will be convenient. Definition 46. For a convex function f , let M1 , M2 and M3 be the smallest numbers such that −1 1. M1 ≥ maxx∈M (∇f (x))T ATx Ax ∇f (x) and M1 ≥ n. 2. ∇2 f  M2 · ATx Ax . 3. Tr((ATx Ax )−1 ∇3 f (x)[v]) ≤ M3 kvkx for all v. For the case f = φ are the standard logarithmic barrier, these parameters are n, 1, tively. 7.1 √ n respec- Riemannian geometry on ML (G2 ) We use the following definitions throughout this section. Definition 47. For any matrix A ∈ Rm×n and vectors b ∈ Rm and x ∈ Rn , define 1. sx = Ax − b, Sx = Diag(sx ), Ax = Sx−1 A. 2. sx,v = Ax v, Sx,v = Diag(Ax v).   (2) = (Px )2ij . 3. Px = Ax (ATx Ax )−1 ATx , σx = diag(Px ), Σx = Diag(P ), Px ij 4. Gradient of φ: φi = − P ℓ  eTℓ Ax ei . −1    P T ej . eℓ Ax ei eTℓ Ax ej , gij = eTi ATx Ax 5. Hessian of φ and its inverse: gij = φij = ATx Ax ij =    P 6. Third derivatives of φ: φijk = −2 ℓ eTℓ Ax ei eTℓ Ax ej eTℓ Ax ek . 7. For brevity (overloading notation), we define sγ ′ = sγ,γ ′ , sγ ′′ = sγ,γ ′′ , Sγ ′ = Sγ,γ ′ and Sγ ′′ = Sγ,γ ′′ for a curve γ(t). In this section, we will frequently use the following identities derived from elementary calculus (using only the chain/product rules and the formula for derivative of the inverse of a matrix). For reference, we include proofs in Appendix C. Fact 48. For any matrix A and any curve γ(t), we have dAγ = −Sγ ′ Aγ , dt dPγ = −Sγ ′ Pγ − Pγ Sγ ′ + 2Pγ Sγ ′ Pγ , dt dSγ ′ = Diag(−Sγ ′ Aγ γ ′ + Aγ γ ′′ ) = −Sγ2′ + Sγ ′′ , dt 39 We also use these matrix inequalities: Tr(AB) = Tr(BA), Tr(P AP ) ≤ Tr(A) for any psd matrix A; Tr(ABAT ) ≤ Tr(AZAT ) for any B  Z; the Cauchy-Schwartz, namely, Tr(AB) ≤ 1 1 Tr(AAT ) 2 Tr(BB T ) 2 . We note Px2 = Px because Px is a projection matrix. Since the manifold ML is naturally embedded in Rn , we can identify Tx ML with Euclidean coordinates. We have that hu, vix = uT ∇2 φ(x)v = uT ATx Ax v. We will use the following two lemmas proved in [13]. Lemma 49. Let w(t) be a vector field defined on a curve z(t) in ML . Then, ∇z ′ w = −1 T −1 T dw dw Az Sz ′ sz,w = Az Sz,w sz ′ . − ATz Az − ATz Az dt dt In particular, the equation for parallel transport on a curve γ(t) is given by −1 T d Aγ Sγ ′ Aγ v. v(t) = ATγ Aγ dt (7.1) Lemma 50. Given u, v, w, x ∈ Tx ML , the Riemann Curvature Tensor at x is given by R(u, v)w = ATx Ax def −1 ATx (Sx,v Px Sx,w − Diag(Px sx,v sx,w )) Ax u and the Ricci curvature Ric(u) = TrR(u, u) is given by Ric(u) = sTx,u Px(2) sx,u − σxT Px s2x,u where R(u, u) is the operator defined above. 7.2 Hamiltonian walk on ML We often work in Euclidean coordinates. In this case, the Hamiltonian walk is given by the formula in the next lemma. To implement the walk, we solve this ODE using the collocation method as described in [13], after first reducing it to a first-order ODE. The resulting complexity is Õ(mnω−1 ) per step. Lemma 51. The Hamiltonian curve at a point x in Euclidean coordinates is given by the following equations γ ′′ (t) = ATγ Aγ ′ γ (0) = w, −1 ATγ s2γ ′ + µ(γ(t)) ∀t ≥ 0 γ(0) = x. where µ(x) = ATx Ax −1 ATx σx − (ATx Ax )−1 ∇f (x) and w ∼ N (0, (ATγ Aγ )−1 ). Proof. Recall from Lemma 7 that the Hamiltonian walk is given by Dt dγ =µ(γ(t)), dt dγ (0) ∼N (0, g(x)−1 ) dt 40   where µ(x) = −g(x)−1 ∇f (x)− 12 g(x)−1 Tr g(x)−1 Dg(x) . By Lemma 49, applied with w(t) = γ ′ (t), z(t) = γ(t), we have −1 T 2 dγ Dt Aγ sγ ′ . = γ ′′ (t) − ATγ Aγ dt For the formula of µ, we note that  ∂   1  1X (ATx Ax )−1 ij Tr g(x)−1 Dg(x) k = ATx Ax ji 2 2 ∂xk ij X X     (ATx Ax )−1 ij eTℓ Ax ei eTℓ Ax ej eTℓ Ax ek by Defn.47(6) = − ij =− = X ℓ ATx (ATx Ax )−1 Ax ℓ −ATx σx .  ℓℓ eTℓ Ax ek Therefore, µ(x) = −(ATx Ax )−1 ∇f (x) + ATx Ax −1  ATx σx . Many parameters for Hamiltonian walk depends on the operator Φ(t). Here, we give a formula of Φ(t) in Euclidean coordinates. Lemma 52. Given a curve γ(t), in Euclidean coordinates, we have that Φ(t) = M (t) − R(t) where −1  ATγ Sγ ′ Pγ Sγ ′ Aγ − ATγ Diag(Pγ s2γ ′ )Aγ   −1  T  Ax Sx,µ − 3Σx + 2Px(2) Ax − ∇2 f (x) . M (t) = ATγ Aγ R(t) = ATγ Aγ Proof. Lemma 50 with v = w = γ ′ , gives the formula for R(t). For M (t), Lemma 49 with w = µ(x), z ′ = u shows that Du µ(x) = ∇u µ(x) − (ATx Ax )−1 ATx Sx,µ Ax u. For the first term ∇u µ(x), we note that −1 −1 T ATx Sx,u Ax ATx Ax Ax σx  −1 ATx Sx,u σx − 3 ATx Ax −1 T + 2 ATx Ax Ax diag(Px Sx,u Px ) −1  −1 ∇f (x) ATx Sx,u Ax ATx Ax − 2 ATx Ax ∇u µ(x) =2 ATx Ax − (ATx Ax )−1 ∇2 f (x)u. 41 Therefore, we have that Du µ(x) −1 T (2) −1 T Ax Px Ax u Ax Σx Ax u + 2 ATx Ax ATx Diag(Px σx )Ax u − 3 ATx Ax     −1 −1 T ∇f (x) Ax u − (ATx Ax )−1 ∇2 f (x)u − (ATx Ax )−1 ATx Sx,µ Ax u Ax Diag Ax ATx Ax − 2 ATx Ax     −1 −1  T  ∇f (x) − Sx,µ − 3Σx + 2Px(2) Ax − ∇2 f (x) u Ax 2Diag(Px σx ) − 2Diag Aγ ATx Ax = ATx Ax   −1  T  = ATx Ax Ax 2Sx,µ − Sx,µ − 3Σx + 2Px(2) Ax − ∇2 f (x) u.   −1  T  = ATx Ax Ax Sx,µ − 3Σx + 2Px(2) Ax − ∇2 f (x) u. =2 ATx Ax −1 where we used the facts that µ = ATx Ax −1 ATx σx − (ATx Ax )−1 ∇f (x) Sx,µ = Ax µ = Diag(Px σx − Ax (ATx Ax )−1 ∇f (x)). Remark. Note that R(t) and M (t) is symmetric in h·, ·iγ , but not in h·, ·i2 . That is why the formula does not look symmetric. 7.3 Randomness of the Hamiltonian flow (ℓ0 ) Many parameters of a Hessian manifold relate to how fast a Hamiltonian curve approaches the boundary of the polytope. Since the initial velocity of the curve is drawn from a   Hamiltonian 1 Gaussian distribution, one can imagine that sγ ′ (0) ∞ = O √m sγ ′ (0) 2 (each coordinate of sγ ′ measures the relative rate at which the curve is approaching the corresponding facet). So the walk initial approaches/leaves every facet of the polytope at roughly the same slow pace. If this holds for the entire walk, it would allow us to get very tight bounds on various parameters. Although we are not able to prove that sγ ′ (t) ∞ is stable throughout 0 ≤ t ≤ δ, we will show that sγ ′ (t) 4 is stable and thereby obtain a good bound on sγ ′ (t) ∞ . Throughout this section, we only use the randomness of the walk to prove that both sγ ′ (t) 4 and sγ ′ (t) ∞ are small with high probability. Looking ahead, we will show that sγ ′ (t) √ √ and sγ ′ (t) ∞ = O( log n + M1 δ) (Lemma 55), we define sγ ′ (t) def ℓ(γ) = max 0≤t≤δ n1/2 + 2 1/4 M1 + sγ ′ (t) 1/4 M1 4 sγ ′ (t) √∞ +√ + log n + M1 δ sγ ′ (0) n1/2 2 + sγ ′ (0) n1/4 4 1/4 4 = O(M1 ) sγ ′ (0) ∞ + √ log n ! to capture this randomness involves in generating the geodesic walk. This allows us to perturb the geodesic (Lemma 24) without worrying about the dependence on randomness. We first prove the the walk is stable in the L4 norm and hence ℓ(γ) can be simply approximated by sγ ′ (0) 4 and sγ ′ (0) ∞ . Lemma 53. Let γ be a Hamiltonian flow in ML starting at x. Let v4 = 1 0≤t≤ 1/4 , we have that 12(v4 +M1 ) 42 sγ ′ (0) 4 . Then, for 1. sγ ′ (t) 1/4 4 ≤ 2v4 + M1 . 2. kγ ′′ (t)k2γ(t) ≤ 128v44 + 30M1 . Proof. Let u(t) = sγ ′ (t) 4 . Then, we have (using Holder’s inequality in the first step),  d du ≤ Aγ γ ′ dt dt ≤ Aγ γ ′′ 4 4 2 = Aγ γ ′′ − Aγ γ ′ + u (t). 2 4 (7.2) Under the Euclidean coordinates, by Lemma 51 the Hamiltonian flow is given by γ ′′ (t) = ATγ Aγ with µ(x) = ATx Ax −1 γ ′′ −1 ATγ s2γ ′ + µ(γ(t)) ATx σx − (ATx Ax )−1 ∇f (x). Hence, we have that 2 γ −1 T  T −1 T 2 Aγ sγ ′ Aγ Aγ Aγ Aγ Aγ ATγ Aγ −1 T  T −1 T + 3σγT Aγ ATγ Aγ Aγ Aγ Aγ Aγ Aγ σγ   −1 −1 + 3(∇f (x))T ATγ Aγ ATγ Aγ ATγ Aγ ∇f (x) X X  −1 ≤3 (s4γ ′ )i + 3 (σγ2 )i + 3(∇f (x))T ATγ Aγ ∇f (x) ≤3 s2γ ′ T i 4 i ≤3u (t) + 3(n + M1 ) ≤ 3u4 (t) + 6M1 Therefore, we have Aγ γ ′′ 4 ≤ Aγ γ ′′ 2 Plugging it into (7.2), we have that 1/4 (7.3) p ≤ 2u2 (t) + 3 M1 . p du ≤ 3u2 (t) + 3 M1 . dt Note that when u ≤ 2v4 + M1 , we have that p du 1/4 ≤ 12v42 + 9 M1 ≤ 12(v4 + M1 )2 . dt Since u(0) = v4 , for 0 ≤ t ≤ 1 1/4 , 12(v4 +M1 ) 1/4 we have that u(t) ≤ 2v4 + M1 and this gives the first inequality. Using (7.3), we get the second inequality. We can now prove that ℓ(γ) is small with high probability. Lemma 54. Assume that δ ≤ 1 1/4 , 36M1 ℓ1 = Ω(n1/4 δ) and n is large enough, we have that   ℓ0 1 min 1, Pγ∼x (ℓ(γ) ≥ 128) ≤ . 100 ℓ1 δ Therefore, we have ℓ0 ≤ 256. 43 Proof. From the definition of the Hamiltonian curve (Lemma 7), we have that Aγ γ ′ (0) = Bz −1/2 and z ∼ N (0, I). where B = Aγ ATγ Aγ First, we estimate kAγ γ ′ (t)k4 . Lemma 65 shows that   Pz∼N (0,I) kBzk44 ≤  3 Note that P eTi B i 4 2 = P 2 i (σγ )i Pγ ′ (0) def X eTi B i 4 2 !1/4 4  2 s + kBk2→4 s  ≤ 1 − exp(− ). 2 ≤ n and kBk2→4 ≤ kBk2→2 = 1. Putting s =  ′ Aγ γ (0) 4 4 n1/4 2 , we have that √ n ). ≤ 11n ≤ 1 − exp(− 8  Therefore, we have that v4 = kAγ γ ′ (0)k4 ≤ 2n1/4 with probability at least 1 − exp(− apply Lemma 53 to get that 1/4 1/4 sγ ′ (t) 4 ≤ 2v4 + M1 ≤ 5M1 √ n 8 ). Now, we 1 1/4 . 12(v4 +M1 ) for all 0 ≤ t ≤ Next, we estimate kAγ γ ′ (t)k∞ . Since eTi Aγ γ ′ (0) = eTi Bx ∼ N (0, σi ), we have  2 √  t T ′ . Pγ ′ (0) ei Aγ γ (0) ≥ σi t ≤ 2 exp − 2 Hence, we have that Pγ ′ (0)  ′ Aγ γ (0) ∞    X p 2 log n ≥ 2 log n ≤ 2 exp − σi i   P P n log n Since i exp − 2 log is concave in σ, the maximum of exp − on the feasible set {0 ≤ i σi σi P σ ≤ 1, σi = n} occurs on its vertices. Hence, we have that   p 2 Pγ ′ (0) Aγ γ ′ (0) ∞ ≥ 2 log n ≤ 2n exp (−2 log n) = . n √ √ Lemma 53 shows that kAγ γ ′′ k∞ ≤ kγ ′′ kγ(t) ≤ 46 n + 6 M1 . Hence, for any 0 ≤ t ≤ δ, we have that sγ ′ (t)   ∞ Z t Aγ(t) γ ′′ (r) ∞ dr ≤ Aγ(t) γ (0) ∞ + 0   Z δ sγ(t),i ′ ≤ max Aγ(r) γ ′′ (r) Aγ(0) γ (0) ∞ + i,0≤s≤t sγ(s),i 0    p sγ(t),i  p √ ≤ max 2 log n + (46 n + 6 M1 )δ i,0≤s≤t sγ(s),i    p sγ(t),i  p ≤ max 2 log n + 52 M1 δ . i,0≤s≤t sγ(s),i ′ 44 ∞ dr  (7.4) sγ(t),i sγ(s),i Let z(t) = maxi,0≤s≤t sγ(t),i = sγ(s),i exp Z . Note that  sγ ′ (α),i dα t r since (Aγ(t)−b)i = (Aγ(r)−b)i exp Z t r  ai · γ ′ (α) dα (Aγ(α) − b)i Hence, we have that z ′ (t) ≤ z(t) sγ ′ (t) ∞ Solving this, since z(0) = 1, we get z(t) ≤ Since t ≤ δ ≤ 1 1/4 , 36M1 1  . √ √ 1 − 2 log n + 52 M1 δ t we have that z(t) ≤ 1.05. Putting this into (7.4), we have that sγ ′ (t) Finally, we estimate sγ ′ (t) 2 X Pz∼N (0,I) kBzk22 ≤  P i eTi B 2 2 = P ∞ p p ≤ 3 log n + 55 M1 δ. = kAγ γ ′ (t)k2 . Lemma 65 shows that   Note that   p p ≤ z 2 (t) 2 log n + 52 M1 δ . eTi B i 2 2 !1/2 2  2 r + kBk2→2 r   ≤ 1 − exp(− ). 2 1/2 ≤ n and kBk2→2 ≤ 1. Putting s = n 3 , we have that   n 2 Pγ ′ (0) Aγ γ ′ (0) 2 ≤ 2n ≤ 1 − exp(− ). 18 i (σγ )i Therefore, kAγ γ ′ (0)k22 ≤ 2n with high probability. Next, we note that d Aγ γ ′ dt 2 2 = Aγ γ ′ , Aγ γ ′′ − s2γ ′ E D −1 T 2 Aγ sγ ′ + Aγ µ(γ(t)) − Aγ s2γ ′ = Aγ γ ′ , Aγ ATγ Aγ E D −1 T 2 Aγ sγ ′ − s2γ ′ + Aγ γ ′ , Aγ µ(γ(t)) = Aγ γ ′ , Aγ ATγ Aγ = Aγ γ ′ , Aγ µ(γ(t)) . Using that µ(x) = ATx Ax d Aγ γ ′ dt 2 2 = −1 ATx σx − (ATx Ax )−1 ∇f (x), we have that X X (γ ′ )i (∇f )i (sγ ′ )i (σγ )i − i i sX sX qX q 2 2 ≤ (sγ ′ )i (σγ )i + (sγ ′ )2i (∇f )T (ATγ Aγ )−1 (∇f ) i ≤ 2 Aγ γ ′ 2 p i M1 . √ ≤ M1 . Since δ ≤ d 1 ′ Therefore, we have that dt kAγ γ ′ k2 1/4 , we have that kAγ γ (t)k2 ≤ 36M1 1/4 1/4 √ √ M1 M1 1/4 kAγ γ ′ (0)k2 + 36 ≤ 2n + 36 . Therefore, we have that kAγ γ ′ (t)k2 ≤ 2 n + M1 with n probability at least 1 − exp(− 18 ). 45 Combining our estimates on sγ ′ (t) we have that sγ ′ (t) 2 1/4 1/2 n + M1 max P 0≤t≤δ + sγ ′ (t) 4 1/4 M1 2 , sγ ′ (t) +√ √ n 2 n ≤ exp(− ) + exp(− )+ . 18 8 n sγ ′ (t) log n + 4 and sγ ′ (t) √∞ M1 δ + ∞ sγ ′ (0) n1/2 and using the assumption on δ, 2 + sγ ′ (0) n1/4 4 sγ ′ (0) ∞ + √ log n ! ! ≥ 128 In Lemma 59, we indeed have that ℓ1 = Ω(n1/4 δ) and hence ℓℓ10δ = Ω(n−1/4 δ−2 ) = Ω(1). Therefore,   1 min 1, ℓℓ10δ when n is large enough. the probability is less than 100 Here, we collect some simple consequences of small ℓ(γ) that we will use later. Lemma 55. Given a Hamiltonian flow γ on ML with ℓ(γ) ≤ ℓ0 ≤ 256. For any 0 ≤ t ≤ δ, 1/4 1. kAγ γ ′ (t)k2 ≤ 256(n1/2 + M1 ), kAγ γ ′ (0)k2 ≤ 256n1/2 . 1/4 2. kAγ γ ′ (t)k4 ≤ 256M1 , kAγ γ ′ (0)k4 ≤ 256n1/4 .  √ √ √ 3. kAγ γ ′ (t)k∞ ≤ 256 log n + M1 δ , kAγ γ ′ (0)k∞ ≤ 256 log n. 4. kγ ′′ (t)k2γ ≤ 1013 M1 . Proof. The first three inequalities simply follow from the definition of ℓ(γ). Since kAγ γ ′ (0)k4 ≤ 1/4 256M1 , Lemma 53 shows the last inequality. 7.4 Parameters R1 , R2 and R3 Lemma 56. For a Hamiltonian curve γ on ML with ℓ(γ) ≤ ℓ0 , we have that sup kΦ(t)kF,γ(t) ≤ R1 0≤t≤ℓ √ √ with R1 = O( M1 + M2 n). Proof. Note that Φ(t) = M (t) − R(t) where  ATγ Sγ ′ Pγ Sγ ′ Aγ − ATγ Diag(Pγ s2γ ′ )Aγ ,  −1  T M (t) = ATγ Aγ Aγ (Sγ,µ − 3Σγ + 2Pγ(2) )Aγ − ∇2 f . R(t) = ATγ Aγ −1 We bound the Frobenius norm of Φ(t) separately. For kR(t)kF,γ , we note that kR(t)k2F,γ ≤2 (ATγ Aγ )−1/2 ATγ Sγ ′ Pγ Sγ ′ Aγ (ATγ Aγ )−1/2 =2TrPγ S Pγ S Pγ S Pγ S + γ′ ≤4 sγ ′ γ′ γ′ γ′ 2 F + 2 (ATγ Aγ )−1/2 ATγ Diag(Pγ s2γ ′ )Aγ (ATγ Aγ )−1/2 2TrPγ Diag(Pγ s2γ ′ )Pγ Diag(Pγ s2γ ′ ) 4 . 4 46 2 F For kM (t)kF,γ , we note that kM (t)k2F,γ ≤2 (ATγ Aγ )−1/2 ATγ (Sγ,µ − 3Σγ + 2Pγ(2) )Aγ (ATγ Aγ )−1/2 2 F + 2 (ATγ Aγ )−1/2 ∇2 f (ATγ Aγ )−1/2 2 F ≤6TrPγ Sγ,µ Pγ Sγ,µ + 54TrPγ Σγ Pγ Σγ + 24TrPγ Pγ(2) Pγ Pγ(2) + 2M22 n 2 ≤6TrSγ,µ + 54TrΣ2γ + 24Tr(Pγ(2) )2 + 2M22 n. (2) where we used that diag(Pγ ) 2 ≤ kσγ k2 ≤ n and TrPγ M Pγ M = TrPγ M Pγ M Pγ = TrPγ M M Pγ = TrM Pγ Pγ M ≤ TrM 2 . Note that 2 2 ksγ,µ k22 = kµ(γ)k2γ = Pγ σγ − Aγ (ATγ Aγ )−1 ∇f (γ) and Aγ ATγ Aγ Therefore, we have that −1 ∇f (γ(t)) 2 2 = ∇f (γ(t))T ATγ Aγ ≤ 2n + 2M1 ≤ 4M1 −1 ∇f (γ(t)) = M1 . kM (t)k2F,γ ≤ 102M1 + 2M22 n. The claim follows from Lemma 55. Lemma 57. Let γ be a Hamiltonian curve on ML with ℓ(γ) ≤ ℓ0 . Assume that δ2 ≤ √1n . For any 0 ≤ t ≤ δ, any curve c(r) starting from γ(t) and any vector field v(r) on c(r) with v(0) = γ ′ (t), we have that ! dc d + δ k Dr v|r=0 kγ(t) . TrΦ(v(r))|r=0 ≤ R2 dr dr r=0 γ(t) where 1/4 p √ M R2 = O( nM1 + nM1 δ2 + 1 + δ √ n log n √ + nM2 + M3 ). δ Proof. We first bound TrR(t). By Lemma 50, we know that (2) T Ric(v(r)) = sTc(r),v(r) Pc(r) sc(r),v(r) − σc(r) Pc(r) s2c(r),v(r) = Tr(Sc(r),v(r) Pc(r) Sc(r),v(r) Pc(r) ) − Tr(Diag(Pc(r) s2c(r),v(r) )Pc(r) ). For simplicity, we suppress the parameter r and hence, we have Ric(v) = Tr(Sc,v Pc Sc,v Pc ) − Tr(Diag(Pc s2c,v )Pc ). 47 d d c = c′ and dr v = v ′ (in Euclidean coordinates). Since We write dr d and dr Sc,v = −Sc′ Sc,v + Sc,v′ , we have that d dr Pc = −Sc′ Pc − Pc Sc′ + 2Pc Sc′ Pc d Ric(v) dr = −2Tr(Sc,v Sc′ Pc Sc,v Pc ) − 2Tr(Sc,v Pc Sc′ Sc,v Pc ) + 4Tr(Sc,v Pc Sc′ Pc Sc,v Pc ) −2Tr(Sc′ Sc,v Pc Sc,v Pc ) + 2Tr(Sc,v′ Pc Sc,v Pc ) +Tr(Diag(Pc s2c,v )Sc′ Pc ) + Tr(Diag(Pc s2c,v )Pc Sc′ ) − 2Tr(Diag(Pc s2c,v )Pc Sc′ Pc ) +Tr(Diag(Pc Sc′ s2c,v )Pc ) + Tr(Diag(Sc′ Pc s2c,v )Pc ) − 2Tr(Diag(Pc Sc′ Pc s2c,v )Pc ) +2Tr(Diag(Pc Sc,v Sc′ sc,v )Pc ) − 2Tr(Diag(Pc Sc,v sc,v′ )Pc ) = −6Tr(Sc,v Sc′ Pc Sc,v Pc ) + 4Tr(Sc,v Pc Sc′ Pc Sc,v Pc ) + 2Tr(Sc,v′ Pc Sc,v Pc ) +3Tr(Diag(Pc s2c,v )Sc′ Pc ) − 2Tr(Diag(Pc s2c,v )Pc Sc′ Pc ) +3Tr(Diag(Pc Sc′ s2c,v )Pc ) − 2Tr(Diag(Pc Sc′ Pc s2c,v )Pc ) −2Tr(Diag(Pc Sc,v sc,v′ )Pc ). d Let dr Ric(v) = (1) + (2) where (1) is the sum of all terms not involving v ′ and (2) is the sum of other terms. For the first term (1), we have that |(1)| ≤ 6 |Tr(Sc,v Sc′ Pc Sc,v Pc )| + 4 |Tr(Sc,v Pc Sc′ Pc Sc,v Pc )| +3 Tr(Diag(Pc s2c,v )Sc′ Pc ) + 2 Tr(Diag(Pc s2c,v )Pc Sc′ Pc ) +3 Tr(Diag(Pc Sc′ s2c,v )Pc ) + 2 Tr(Diag(Pc Sc′ Pc s2c,v )Pc ) sX sX 2 (sc,v )i (sc,v )2i + 4 ksc′ k∞ |Tr(Pc Sc,v Pc Sc,v Pc )| ≤ 6 ksc′ k∞ i i sX sX sX 4 4 (sc,v )i kSc′ k2 + 2 (sc,v )i (Pc Sc′ Pc )2ii +3 i i i sX sX sX sX (sc,v )4i (Pc )2ii + 2 ksc′ k∞ (sc,v )4i (Pc )2ii +3 ksc′ k∞ i ≤ ≤ i i 10 ksc′ k∞ ksc,v k22 + 3 ksc,v k24 ksc′ k2 √ 20 ksc′ k2 ksc,v k24 n. + √ 7 ksc′ k∞ ksc,v k24 n i 1/2 Since sc,v = sγ ′ at r = 0, we have that ksc,v k24 = O(M1 ) and hence p  |(1)| = O nM1 ksc′ k2 . For the second term (2), we have that |(2)| ≤ 2 Tr(Sc,v′ Pc Sc,v Pc ) + 2 Tr(Diag(Pc Sc,v sc,v′ )Pc ) sX √ (sc,v′ sc,v )2i ≤ 2 sc,v′ 2 ksc,v k2 + 2 n i    p p 1/4 n log n + nM1 δ sc,v′ ≤ O n1/2 + M1 sc,v′ 2 + O   p p 1/4 = O M1 + n log n + nM1 δ sc,v′ 2 48 2 where we used ksc,v k∞ = sγ ′ 1/4 M1 ) ∞ =O √ log n + √  M1 δ and at r = 0, we have ksc,v k2 = Aγ(0) γ ′ (0) sγ ′ 2 = O(n1/2 + in the second-to-last line. Note that at r = 0, by Lemma 49, we have Dr v = Therefore, −1 T dv − ATc Ac Ac Sc′ sc,v . dr sc,v′ = Ac v ′ = Ac (Dr v) − Ac ATc Ac and hence sc,v′ 2 ≤ kDr vk + Ac ATc Ac ≤ kDr vk + sγ ′ −1 −1 ATc Sc′ sc,v ATc Sc′ sc,v 2 ksc′ k2 ∞ Therefore,   p   p p p 1/4 |(2)| = O M1 + n log n + nM1 δ kDr vk + log n + M1 δ ksc′ k2 . Therefore, we have d Ric(v(r))|s=0 dr p    p p 1/4 =O nM1 ksc′ k2 + O M1 + n log n + nM1 δ kDr vk  p   p p p 1/4 log n + M1 δ ksc′ k2 + O M1 + n log n + nM1 δ p  p p √ √ 1/4 1/4 =O nM1 + M1 log n + M1 M1 δ + n log n + nM1 δ2 ksc′ k2 ! √ 1/4 M1 n log n p + + nM1 δ kDr vk +O δ δ ! √ 1/4 p √ n log n M1 2 =O (ksc′ k2 + δ kDr vk) . + nM1 + nM1 δ + δ δ √ √ 3/4 where we used M1 δ = O( nM1 δ2 + nM1 ) at the last line. Next, we bound TrM (t). Lemma 52 shows that TrM (r) =Tr((ATc Ac )−1 ATc (Sc,µ − 3Σc + 2Pc(2) )Ac − (ATc Ac )−1 ∇2 f ) =Tr(Pc (Sc,µ − 3Σc + 2Pc(2) )) − Tr((ATc Ac )−1 ∇2 f ) =σcT Pc σc − σcT Ac (ATc Ac )−1 ∇f − 3Tr(Σ2c ) + 2Tr(Pc(3) ) − Tr((ATc Ac )−1 ∇2 f ). where in the last step we used Sc,µ = Ac µ = Diag(Pc σc − Ac (ATc Ac )−1 ∇f ). 49 2 = Since d dr Pc = −Sc′ Pc − Pc Sc′ + 2Pc Sc′ Pc and d dr Ac = −Sc′ Ac , we have that d TrM (r) dr = − σcT Sc′ Pc σc − σcT Pc Sc′ σc + 2σcT Pc Sc′ Pc σc − 4σcT Pc Sc′ σc + 4σcT Pc diag(Pc Sc′ Pc ) + 3σcT Sc′ Ac (ATc Ac )−1 ∇f − 2diag(Pc Sc′ Pc )T Ac (ATc Ac )−1 ∇f − 2σcT Ac (ATc Ac )−1 ATc Sc′ Ac (ATc Ac )−1 ∇f − σcT Ac (ATc Ac )−1 ∇2 f · c′ + 12Tr(Sc′ Σ2c ) − 12Tr(Σc diag(Pc Sc′ Pc )) − 6Tr(Pc(2) Sc′ Pc + Pc(2) Pc Sc′ ) + 12Tr(Pc(2) Pc Sc′ Pc ) − 2Tr((ATc Ac )−1 ATc Sc′ Ac (ATc Ac )−1 ∇2 f ) − Tr((ATc Ac )−1 ∇3 f [c′ ]). Simplifying it, we have d TrM (r) dr = − 6σcT Sc′ Pc σc + 2σcT Pc Sc′ Pc σc + 4σcT Pc Pc(2) sc′ + 3σcT Sc′ Ac (ATc Ac )−1 ∇f − 2sTc′ Pc(2) Ac (ATc Ac )−1 ∇f − 2σcT Ac (ATc Ac )−1 ATc Sc′ Ac (ATc Ac )−1 ∇f − σcT Ac (ATc Ac )−1 ∇2 f · c′ + 12Tr(Sc′ Σ2c ) − 12σcT Pc(2) sc′ − 6Tr(Pc(2) Sc′ Pc + Pc(2) Pc Sc′ ) + 12Tr(Pc(2) Pc Sc′ Pc ) − 2Tr((ATc Ac )−1 ATc Sc′ Ac (ATc Ac )−1 ∇2 f ) − Tr((ATc Ac )−1 ∇3 f [c′ ]). d TrM (r) = (3) + (4) where (3) is the sum of all terms not involving f and (4) is the sum of Let dr other terms with f . For the first term (3), we have that |(3)| ≤6 σcT Sc′ Pc σc + 2 σcT Pc Sc′ Pc σc + 4 σcT Pc Pc(2) sc′ + 12 Tr(Sc′ Σ2c ) + 12 σcT Pc(2) sc′ + 6 Tr(Pc(2) Sc′ Pc + Pc(2) Pc Sc′ ) + 12 Tr(Pc(2) Pc Sc′ Pc ) q √ √ √ √ ≤6 σcT Sc2′ σc n + 2 ksc′ k∞ n + 4 n ksc′ k2 + 12 ksc′ k2 n + 12 kSc′ k2 n + 6 diag(Pc Pc(2) ) 2 ksc′ k2 + 6 diag(Pc(2) Pc ) ≤36n ksc′ k2 . 50 2 ksc′ k2 + 12 diag(Pc Pc(2) Pc ) 2 ksc′ k2 For the second term (4), we have that (4) ≤3 σcT Sc′ Ac (ATc Ac )−1 ∇f + 2 sTc′ Pc(2) Ac (ATc Ac )−1 ∇f + 2 σcT Ac (ATc Ac )−1 ATc Sc′ Ac (ATc Ac )−1 ∇f + σcT Ac (ATc Ac )−1 ∇2 f · c′ + 2 Tr((ATc Ac )−1 ATc Sc′ Ac (ATc Ac )−1 ∇2 f ) + Tr((ATc Ac )−1 ∇3 f [c′ ]) q q q q (2) (2) T T T T −1 ≤3 sc′ Σc sc′ ∇f (Ac Ac ) ∇f + sc′ Pc Pc Pc sc′ ∇f T (ATc Ac )−1 ∇f q q q q T T T −1 T + 2 σc Pc Sc′ Pc Sc′ Pc σc ∇f (Ac Ac ) ∇f + σc Pc σc c′ ∇2 f (ATc Ac )−1 ∇2 f · c′ + 2 diag(Ac (ATc Ac )−1 ∇2 f (ATc Ac )−1 ATc ) 2 ksc′ k2 + Tr((ATc Ac )−1 ∇3 f [c′ ]) p p √ ≤4 ksc′ k2 M1 + 2 ksc′ k∞ nM1 + 3 nM2 ksc′ k2 + M3 ksc′ k2  p  √ ≤ 6 M1 + 3 nM2 + M3 ksc′ k2 . Therefore,   p √ d TrM (s) ≤ O n + M1 + nM2 + M3 ksc′ k2 . dr Lemma 58. Let γ be a Hamiltonian curve on ML with ℓ(γ) ≤ ℓ0 . Assume that δ ≤ ζ(t) be the parallel transport of the vector γ ′ (0) on γ(t). Then, 1 1/4 . 36M1 sup kΦ(t)ζ(t)kγ(t) ≤ R3 0≤t≤δ where  1 2 R3 = O M1 p 3 4 1 4 log n + M1 n δ + M2 n 1 2  . Proof. By Lemma 52, we have that  −1  T Aγ (Sγ,µ − 3Σγ + 2Pγ(2) − Sγ ′ Pγ Sγ ′ + Diag(Pγ s2γ ′ ))Aγ − ∇2 f Φ(t) = ATγ Aγ = (1) + (2) where (2) is the last term − ATγ Aγ For the first term, we have that −1 ∇2 f . k(1)ζkγ = Pγ (Sγ,µ − 3Σγ + 2Pγ(2) − Sγ ′ Pγ Sγ ′ + Diag(Pγ s2γ ′ ))sγ,ζ ≤ (Sγ,µ − 3Σγ + 2Pγ(2) − Sγ ′ Pγ Sγ ′ + Diag(Pγ s2γ ′ ))sγ,ζ Pγ(2) sγ,ζ 2 2 + Sγ ′ Pγ Sγ ′ sγ,ζ 2 + Diag(Pγ s2γ ′ )sγ,ζ ≤ kSγ,µ sγ,ζ k2 + 3 kΣγ sγ,ζ k2 + 2 2   ≤ ksγ,ζ k∞ ksγ,µ k2 + kσγ k2 + Pγ s2γ ′ 2 + 2 Pγ(2) sγ,ζ + sγ ′ ∞ Sγ ′ sγ,ζ 2 2  p  √ 2 (2) ≤ ksγ,ζ k∞ 2 M1 + n + sγ ′ 4 + 2 Pγ sγ,ζ + sγ ′ ∞ sγ ′ 4 ksγ,ζ k4 2 51 2 Let where we used that ksγ,µ k22 = kµ(x)k2x ≤ 4M1 , kσγ k2 ≤ n. Now, we note that Pγ(2) sγ,ζ 2 2 = X i  2 X  (Pγ )2ij (sγ,ζ )j  j ≤ ksγ,ζ k2∞ = ksγ,ζ k2∞ X i X   X  (Pγ )2ij  j σγ2 i  i = n ksγ,ζ k2∞ . √ √ 1/4 ′ log n + M1 δ), we have that = O(M ) and s = O( γ 1 4 ∞  p  2 k(1)ζkγ ≤ ksγ,ζ k∞ 5 M1 + sγ ′ 4 + sγ ′ ∞ sγ ′ 4 ksγ,ζ k4   p 1/2 1/4 3/4 ≤ O M1 ksγ,ζ k∞ + O( log nM1 + M1 δ) ksγ,ζ k4 . Using also that sγ ′ For the second term, we have that k(1)ζkγ = Pγ ∇2 f ζ 2 2 ≤ ζ T ∇2 f · ζ ≤ M2 ksγ,ζ k2 . Combining both terms, we have that   p 1/4 3/4 1/2 kΦ(t)ζkγ = O M1 ksγ,ζ k∞ + O( log nM1 + M1 δ) ksγ,ζ k4 + M2 ksγ,ζ k2 . (7.5) Now, we bound ksγ,ζ k2 , ksγ,ζ k4 and ksγ,ζ k∞ . (7.1) shows that −1 T d ζ(t) = ATγ Aγ Aγ Sγ ′ Aγ ζ. dt Let wp (t) = kAγ ζ(t)kp . Then, we have that d d wp (t) ≤ Aγ ζ(t) dt dt p d ζ(t) dt ≤ Sγ ′ Aγ ζ(t) p + Aγ ≤ Sγ ′ Aγ ζ(t) p + Pγ Sγ ′ Aγ ζ ≤ sγ ′ d w2 (t) ≤ 2 sγ ′ For p = 2, we have that dt 1 that t ≤ δ ≤ 1/4 , we have ∞ w (t) + Sγ ′ Aγ ζ ∞ p w2 (t) ≤ e512( = O(n where we used that ζ(0) = γ ′ (0) and t ≤ O(n1/2 ). √ √ log n+ M1 δ)t 1/2 p . 2 w2 (t). Using that sγ ′ 36M1 p ∞ ≤ 256 √ log n + √  M1 δ and w2 (0) ) 1 1/4 12(v4 +M1 ) 52 at the end. Therefore, we have that ksγ,ζ k2 = For p = 4, we note that d w4 (t) ≤ sγ ′ ∞ w4 (t) + sγ ′ 4 ksγ,ζ k4 dt 1/4 ≤ 2 sγ ′ 4 w4 (t) = O(M1 w4 (t)). 1 1/4 , we have again 36M1 O(n1/4 ), we have that that w4 (t) = O(w4 (0)). Since w4 (0) = kAγ ζ(0)k4 = Since t ≤ δ ≤ kAγ γ ′ (0)k4 = w4 (t) = O(n1/4 ). For p = ∞, we note that d w∞ (t) ≤ sγ ′ ∞ w∞ (t) + sγ ′ 4 ksγ,ζ k4 dt 1/4 1/4 ≤ O(M1 w∞ (t)) + O(M1 n1/4 ). Again using t ≤ δ ≤ 1 1/4 , 36M1 √ 1/4 we have that w∞ (t) ≤ O( log n + M1 n1/4 δ). Combining our bounds on w2 , w4 , w∞ to (7.5), we get   1   3 3 1 p p 1 1 1 1 2 4 kΦ(t)ζkγ = O M1 log n + M1 n 4 δ + O( log nM14 n 4 + M14 n 4 δ) + O M2 n 2  1  3 p 1 1 2 4 4 2 = O M1 log n + M1 n δ + M2 n . 7.5 Stability of L2 + L4 + L∞ norm (ℓ1 ) Lemma 59. Given a family of Hamiltonian curves γr (t) on ML with ℓ(γ0 ) ≤ ℓ0 , for δ2 ≤ 1 √ √ , we have that M +M n 1 2   d 1 1/4 ℓ(γr ) ≤ O M1 δ + √ dr δ log n  1/4 Hence, ℓ1 = O M1 δ + Proof. For brevity, all d dr √1 δ log n d γr (0) dr  . are evaluated at r = 0. Since d sγ ′ dr r 2 ≤ sγr′ ∞ Aγr d γr dr d ′ dr sγr + δ Dr γr′ (0) γr (0) γr (0) ! (7.6) . d ′ = −Sγr , d γr sγr′ + Aγr dr γr , we have dr + Aγr 2 d ′ γ dr r . 2 For the last term, we note that Dr γr′ = Hence, we have Aγr d ′ γ dr r 2 ≤ Dr γr′ γr −1 T d ′ γr − ATγr Aγr Aγr Sγr , d γr sγr′ . dr dr + Sγr , d γr sγ ′ dr 53 2 ≤ Dr γr′ γr + sγr′ ∞ sγr , d γr dr 2 . Therefore, we have that d sγ ′ dr r 2 d + Dr γ ′ γr dr γr p  d p =O log n + M1 δ γr dr ≤ 2 sγr′ ∞ γ + Dr γr′ . (7.7) γr Since γr is a family of Hamiltonian curves, Lemma 19 shows that ′′ ψ (t) = Γt Φ(t)Γ−1 t ψ(t) where ψ(t) is the parallel transport of d ψ(t) = γr (0) + Dr γr′ (0)t + dr d dr γr (t) Z 0 t from γr (t) to γr (0). By Lemma 49, we have that (t − r)Γr Φ(r)Γ−1 r ( d γr (0) + Dr γr′ (0)r + E(r))dr dr def d with kE(r)kF ≤ O(1)∆ and ∆ = dr γr (0) γr (0) + δ kDr γr′ (0)kγr (0) where we used that kΦ(t)kF,γ = √ √ 1 √ O( M1 + M2 n) (Lemma 56) and that s2 ≤ δ2 ≤ √M +M . 1 2 n Therefore, we have that Z t d γr (t) = ψ(t) γr (0) ≤ ∆ + O(∆) (t − s) Γr Φ(s)Γ−1 dr r γr (0) dr 0 γr (t) ≤ O(∆) √ √ where we used again kΦ(s)kF,γ = O( M1 + M2 n) and s2 ≤ δ2 ≤ ′ Similarly, we have that kDr γr′ (t)kγr (t) = ψ (t) √1 , n Putting these into (7.7) and using h ≤ d sγ ′ dr r We write ℓ(γr ) = max 0≤t≤δ sγr′ (t) n1/2 + 2 1/4 M1 + sγr′ (t) 1 √ . M1 +M2 n ≤ O( ∆ δ ). we have  ∆ M1 δ ∆ + δ p  1 M1 δ + =O ∆. δ =O 2 γr (0) √ 4 1/4 M1 p log n + sγr′ (t) +√ log n + p √∞ M1 δ + sγr′ (0) (7.8) 2 n1/2 + According to same calculation as (7.7), we can improve the estimate on d sγ ′ (0) dr r 2 ≤ p log n d γr (0) dr ∆ ≤ . δ sγr′ (0) n1/4 d ′ dr sγr 2 4 sγ ′ (0) ∞ + √r log n ! . for t = 0 and get + Dr γr′ (0) γr (7.9) 54 Using (7.8) and (7.9), we have that d d ′ ′ dr sγr (t) 2 dr sγr (0) 2 √ max + 1/4 0≤t≤δ log n M1 ! √ M1 δ + 1δ 1 ∆ + √ 1/4 δ log n M1 d ℓ(γr ) = O dr =O =O 7.6  1/4 M1 δ 1 + √ δ log n  ! ∆. Mixing Time Lemma 60. If f (x) = α · φ(x) (logarithmic barrier), then, we have that M1 = n + α2 m, M2 = α √ and M3 = 2α · n. −1 Proof. For M1 , we note that (∇f (x))T ATx Ax ∇f (x) = α2 1T Ax (ATx Ax )−1 ATx 1 ≤ α2 m. Hence, M1 = n + α2 m. For M2 , it directly follows from the definition. For M3 , we note that Tr((ATx Ax )−1 ∇3 f (x)[v]) = −2αTr((ATx Ax )−1 ATx Sx,v Ax ) X σx,i (sx,v )i . = −2α i Hence, we have Tr((ATx Ax )−1 ∇3 f (x)[v]) sX sX √ 2 σx,i (sx,v )2i ≤ 2α n kvkx . ≤ 2α i i Using Theorem 29, we have the following Lemma 61. There is a universal constant c > 0 such that if the step size  1  1 1 1 1 1 1 δ ≤ c · min n− 3 , α− 3 m− 6 n− 6 , α− 2 m− 4 n− 12 , then, all the δ conditions for Theorem 30 are satisfied. Proof. In the previous section, we proved that if δ ≤ 1 1/4 36M1 and n is large enough, 1. ℓ0 = 256 (Lemma 54)   1/4 1 (Lemma 59) 2. ℓ1 = O M1 δ + δ√log n √ √ 3. R1 = O( M1 + M2 n) (Lemma 56) √ √ 4. R2 = O( nM1 + nM1 δ2 + 1/4 M1 δ + √ n log n δ + 55 √ nM2 + M3 ) (Lemma 57) 3 1√ 1 1 5. R3 = O(M12 log n + M14 n 4 δ + M2 n 2 ) (Lemma 58) 1 1 1 1 1 Substituting the value of M1 , M2 and M3 and using that δ . n− 3 , δ . α− 2 n− 3 and δ . α− 2 m− 4 , we have that  1 1  1 1. ℓ1 = O α 2 m 4 δ + δ√log n √ √ 2. R1 = O( n + α m) 1 √ √ √ 4 3. R2 = O(n + α nm + αm +δ n log n ) √ √ 3 3 1 4. R3 = O( n log n + α m log n + nδ + α 2 m 4 n 4 δ) Now, we verify all the δ conditions for Theorem 30. 1 1 1 Using δ . n− 3 and δ . α− 2 m− 4 , we have that δ2 . Using δ . n − 13 − 12 and δ . α m − 41 1 R1 . , we have that 1 1 1 δ5 R12 ℓ1 . δ5 (n + α2 m) · (α 2 m 4 δ + √ ) ≤ ℓ0 . δ log n For the last condition, we note that p √ √ 1 δ3 R2 + δ2 R3 .nδ3 + α nmδ3 + αm 4 δ2 + n log nδ2 p p 3 1 3 + n log nδ2 + α m log nδ2 + nδ3 + α 2 m 4 n 4 δ3 p p √ √ 3 1 1 3 . αm 4 δ2 + n log nδ2 + α m log nδ2 + nδ3 + α nmδ3 + α 2 m 4 n 4 δ3 p p √ 3 3 1 . n log nδ2 + α m log nδ2 + nδ3 + α nmδ3 + α 2 m 4 n 4 δ3 where we used that Therefore, if √ √ 1 αm 4 . (1 + α m) at the end  1  1 1 1 1 1 1 δ ≤ c · min n− 3 , α− 3 m− 6 n− 6 , α− 2 m− 4 n− 12 for small enough constant, then all the δ conditions for Theorem 30 are satisfied. Acknowledgement. We thank Ben Cousins for helpful discussions. This work was supported in part by NSF awards CCF-1563838, CCF-1717349 and CCF-1740551. References [1] D. Applegate and R. Kannan. Sampling and integration of near log-concave functions. In STOC, pages 156–163, 1991. [2] M. Betancourt. A Conceptual Introduction to Hamiltonian Monte Carlo. ArXiv e-prints, January 2017. [3] B. Cousins and S. Vempala. Bypassing KLS: Gaussian cooling and an O ∗ (n3 ) volume algorithm. In STOC, pages 539–548, 2015. [4] M. E. Dyer and A. M. Frieze. Computing the volume of a convex body: a case where randomness provably helps. In Proc. of AMS Symposium on Probabilistic Combinatorics and Its Applications, pages 123–170, 1991. 56 [5] M. E. Dyer, A. M. Frieze, and R. Kannan. A random polynomial time algorithm for approximating the volume of convex bodies. In STOC, pages 375–381, 1989. [6] M. Girolami, B. Calderhead, and S. A. Chin. Riemannian Manifold Hamiltonian Monte Carlo. ArXiv e-prints, July 2009. [7] Mark Girolami and Ben Calderhead. Riemann manifold langevin and hamiltonian monte carlo methods. Journal of the Royal Statistical Society: Series B (Statistical Methodology), 73(2):123– 214, 2011. [8] A. T. Kalai and S. Vempala. Simulated annealing for convex optimization. Math. Oper. Res., 31(2):253–266, 2006. [9] R. Kannan, L. Lovász, and M. Simonovits. Isoperimetric problems for convex bodies and a localization lemma. Discrete & Computational Geometry, 13:541–559, 1995. [10] R. Kannan, L. Lovász, and M. Simonovits. Random walks and an O ∗ (n5 ) volume algorithm for convex bodies. Random Structures and Algorithms, 11:1–50, 1997. [11] R. Kannan and H. Narayanan. Random walks on polytopes and an affine interior point method for linear programming. In STOC, pages 561–570, 2009. [12] Yin Tat Lee and Aaron Sidford. Path finding methods for linear programming: Solving linear programs in õ (vrank) iterations and faster algorithms for maximum flow. In Foundations of Computer Science (FOCS), 2014 IEEE 55th Annual Symposium on, pages 424–433. IEEE, 2014. [13] Yin Tat Lee and Santosh S. Vempala. Geodesic walks in polytopes. CoRR, abs/1606.04696, 2016. [14] Yin Tat Lee and Santosh Srinivas Vempala. Eldan’s stochastic localization and the KLS hyperplane conjecture: An improved lower bound for expansion. CoRR, abs/1612.01507, 2016. [15] Yin Tat Lee and Santosh Srinivas Vempala. Eldan’s stochastic localization and the KLS hyperplane conjecture: An improved lower bound for expansion. In Proc. of IEEE FOCS, 2017. [16] Yin Tat Lee and Santosh Srinivas Vempala. Geodesic walks in polytopes. In Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing, STOC 2017, Montreal, QC, Canada, June 19-23, 2017, pages 927–940, 2017. [17] L. Lovász and M. Simonovits. Mixing rate of Markov chains, an isoperimetric inequality, and computing the volume. In ROCS, pages 482–491, 1990. [18] L. Lovász and M. Simonovits. On the randomized complexity of volume and diameter. In Proc. 33rd IEEE Annual Symp. on Found. of Comp. Sci., pages 482–491, 1992. [19] L. Lovász and M. Simonovits. Random walks in a convex body and an improved volume algorithm. In Random Structures and Alg., volume 4, pages 359–412, 1993. [20] L. Lovász and S. Vempala. Fast algorithms for logconcave functions: sampling, rounding, integration and optimization. In FOCS, pages 57–68, 2006. [21] L. Lovász and S. Vempala. Hit-and-run from a corner. SIAM J. Computing, 35:985–1005, 2006. 57 [22] L. Lovász and S. Vempala. Simulated annealing in convex bodies and an O ∗ (n4 ) volume algorithm. J. Comput. Syst. Sci., 72(2):392–417, 2006. [23] L. Lovász and S. Vempala. The geometry of logconcave functions and sampling algorithms. Random Struct. Algorithms, 30(3):307–358, 2007. [24] Oren Mangoubi and Aaron Smith. Rapid mixing of hamiltonian monte carlo on strongly logconcave distributions. arXiv preprint arXiv:1708.07114, 2017. [25] Radford M. Neal. MCMC using Hamiltonian dynamics. Handbook of Markov Chain Monte Carlo, 54:113–162, 2010. [26] R.M. Neal. Bayesian Learning for Neural Networks. Lecture Notes in Statistics. Springer New York, 1996. [27] Yurii Nesterov, Arkadii Nemirovskii, and Yinyu Ye. Interior-point polynomial algorithms in convex programming, volume 13. SIAM, 1994. [28] Burt Totaro. The curvature of a hessian metric. 15(04):369–391, 2004. International Journal of Mathematics, [29] S. Vempala. Geometric random walks: A survey. MSRI Combinatorial and Computational Geometry, 52:573–612, 2005. 58 A Matrix ODE In this section, we prove Lemmas (20) and (21) for the solution of the ODE (3.4), restated below for convenience. d2 Ψ(t) = Φ(t)Ψ(t), dt2 d Ψ(0) = B, dt Ψ(0) = A. Lemma 62. Consider the matrix ODE (3.4). Let λ = max0≤t≤ℓ kΦ(t)k2 . For any t ≥ 0, we have that √ √ kBk kΨ(t)k2 ≤ kAk2 cosh( λt) + √ 2 sinh( λt). λ Proof. Note that Z ′ t Ψ(t) = Ψ(0) + tΨ (0) + (t − s)Ψ′′ (s)ds 0 Z t = A + tB + (t − s)Φ(s)Ψ(s)ds. (A.1) 0 Let a(t) = kΨ(t)k2 , then we have that a(t) ≤ kAk2 + t kBk2 + λ Z t (t − s)a(s)ds. 0 Let a(t) be the solution of the integral equation a(t) = kAk2 + t kBk2 + λ Z t 0 (t − s)a(s)ds. By induction, we have that a(t) ≤ a(t) for all t ≥ 0. By taking derivatives on both sides, we have that a′′ (t) = λa(t), a(0) = kAk2 , a′ (0) = kBk2 . Solving these equations, we have √ √ kBk kΨ(t)k2 = a(t) ≤ a(t) = kAk2 cosh( λt) + √ 2 sinh( λt) λ for all t ≥ 0. Lemma 63. Consider the matrix ODE (3.4). Let λ = max0≤t≤ℓ kΦ(t)kF . For any 0 ≤ t ≤ have that   t3 2 kΨ(t) − A − BtkF ≤ λ t kAk2 + kBk2 . 5 In particular, this shows that Ψ(t) = A + Bt +  with kE(s)kF ≤ λ s2 kAk2 + s3 5  kBk2 . Z t 0 (t − s)Φ(s)(A + Bs + E(s))ds 59 √1 , λ we Proof. Recall from (A.1) that Ψ(t) = A + tB + Z t 0 (A.2) (t − s)Φ(s)Ψ(s)ds. Let E(t) = Ψ(t) − (A + tB). Using Lemma 20, we have that kE(t)kF = Z ≤λ t 0 Z Z (t − s)Φ(s)Ψ(s)ds F t (t − s) kΨ(s)k2 ds 0 √ √ kBk (t − s) kAk2 cosh( λs) + √ 2 sinh( λs)ds λ  0 √ √ √ kBk2 = λ kAk2 (cosh( λt) − 1) + √ (sinh( λt) − λt) . λ ≤λ t √ √ √ Since 0 ≤ t ≤ √1λ , we have that cosh( λt) − 1 ≤ λt2 and sinh( λt) − λt ≤ the result. The last equality follows again from (A.2) λ3/2 t3 5 . This gives Next, we have an elementary lemma about the determinant. Lemma 64. Suppose that E is a matrix (not necessarily symmetric) with kEk2 ≤ 41 , we have |log det(I + E) − TrE| ≤ kEk2F . Proof. Let f (t) = log det(I + tE). Then, by Jacobi’s formula, we have  f ′ (t) = Tr (I + tE)−1 E , f ′′ (t) = −Tr((I + tE)−1 E(I + tE)−1 E). Since kEk2 ≤ 14 , we have that (I + tE)−1 f ′′ (t) = ≤ 2 ≤ 4 3 and hence Tr((I + tE)−1 E(I + tE)−1 E) T Tr(E T (I + tE)−1 (I + tE)−1 E) ≤ 2 Tr(E T E) = 2 kEk2F . The result follows from Z 1 (1 − s)f ′′ (s)ds f (1) = f (0) + f (0) + 0 Z 1 (1 − s)f ′′ (s)ds. = Tr(E) + ′ 0 60 B Concentration Lemma 65 ([13, Ver 3, Lemma 90]). For p ≥ 1, we have p    !1/p  2 p+1 X p/2 2 Γ( 2 ) t p p     √ + kAk2→p t Px∼N (0,I) kAxkp ≤ kai k2 . ≤ 1 − exp − π 2 i In particular, we have  and  Px∼N (0,I) kAxk44 ≤  3   Px∼N (0,I) kAxk22 ≤  C X i X i kai k42 kai k22 !1/4 !1/2 4   2 t   + kAk2→4 t ≤ 1 − exp − 2 2   2 t . + kAk2→2 t  ≤ 1 − exp − 2 Calculus Proof of Fact 48. Recall Definition 47 and write dSγ−1 dAγ = A dt dt dSγ −1 Sγ A = −Sγ−1 dt   d(Aγ − b) −1 = −Sγ Diag Aγ dt  = −Diag Sγ−1 Aγ ′ Aγ = −Diag(Aγ γ ′ )Aγ = −Sγ ′ Aγ . For the second, using the first, dAγ (ATγ Aγ )−1 ATγ dPγ = dt dt d(ATγ Aγ )−1 T dAγ T dAγ = (Aγ Aγ )−1 ATγ + Aγ (ATγ Aγ )−1 + Aγ Aγ dt dt dt d(ATγ Aγ ) T (Aγ Aγ )−1 ATγ = −Sγ ′ Pγ − Pγ Sγ ′ − Aγ (ATγ Aγ )−1 dt  = −Sγ ′ Pγ − Pγ Sγ ′ + 2Aγ (ATγ Aγ )−1 ATγ Sγ ′ Aγ (ATγ Aγ )−1 ATγ = −Sγ ′ Pγ − Pγ Sγ ′ + 2Pγ Sγ ′ Pγ . And for the last, dSγ ′ = Diag dt  dAγ ′ γ + Aγ γ ′′ dt  = Diag(−Sγ ′ Aγ γ ′ + Aγ γ ′′ ) = −Sγ2′ + Sγ ′′ . 61 D Basic definitions of Riemannian geometry Here we recall basic notions of Riemannian geometry. One can think of a manifold M as a ndimensional “surface” in Rk for some k ≥ n. 1. Tangent space Tp M : For any point p, the tangent space Tp M of M at point p is a linear subspace of Rk of dimension n. Intuitively, Tp M is the vector space of possible directions that are tangential to the manifold at x. Equivalently, it can be thought as the first-order linear d c(t) is tangent approximation of the manifold M at p. For any curve c on M , the direction dt ′ to M and hence lies in Tc(t) M . When it is clear from context, we define c (t) = dc dt (t). For any n n open subset M of R , we can identify Tp M with R because all directions can be realized by derivatives of some curves in Rn . 2. Riemannian metric: For any v, u ∈ Tp M , the inner product (Riemannianq metric) at p is given by hv, uip and this allows us to define the norm of a vector kvkp = hv, vip . We call a manifold a Riemannian manifold if it is equipped with a Riemannian metric. When it is clear from context, we define hv, ui = hv, uip . In Rn , hv, uip is the usual ℓ2 inner product. 3. Differential (Pushforward) d: Given a function f from a manifold M to a manifold N , we define df (x) as the linear map from Tx M to Tf (x) N such that df (x)(c′ (0)) = (f ◦ c)′ (0) for any curve c on M starting at x = c(0). When M and N are Euclidean spaces, df (x) is the Jacobian of f at x. We can think of pushforward as a manifold Jacobian, i.e., the first-order approximation of a map from a manifold to a manifold. 4. Hessian manifold: We call M a Hessian manifold (induced by φ) if M is an open subset of Rn with the Riemannian metric at any point p ∈ M defined by hv, uip = v T ∇2 φ(p)u where v, u ∈ Tp M and φ is a smooth convex function on M . 5. Length: For any curve c : [0, 1] → M , we define its length by L(c) = Z 1 0 d c(t) dt dt. c(t) 6. Distance: For any x, y ∈ M , we define d(x, y) be the infimum of the lengths of all paths connecting x and y. In Rn , d(x, y) = kx − yk2 . 7. Geodesic: We call a curve γ(t) : [a, b] → M a geodesic if it satisfies both of the following conditions: (a) The curve γ(t) is parameterized with constant speed. Namely, for t ∈ [a, b]. d dt γ(t) γ(t) is constant (b) The curve is the locally shortest length curve between γ(a) and γ(b). Namely, for any family of curve c(t, s) with c(t, 0) = γ(t) and c(a, s) = γ(a) and c(b, s) = γ(b), we have Rb d d c(t, s) c(t,s) dt = 0. that ds s=0 a dt 62 Note that, if γ(t) is a geodesic, then γ(αt) is a geodesic for any α. Intuitively, geodesics are local shortest paths. In Rn , geodesics are straight lines. 8. Exponential map: The map expp : Tp M → M is defined as expp (v) = γv (1) where γv is the unique geodesic starting at p with initial velocity γv′ (0) equal to v. The exponential map takes a straight line tv ∈ Tp M to a geodesic γtv (1) = γv (t) ∈ M . Note that expp maps v and tv to points on the same geodesic. Intuitively, the exponential map can be thought as point-vector addition in a manifold. In Rn , we have expp (v) = p + v. 9. Parallel transport: Given any geodesic c(t) and a vector v such that hv, c′ (0)ic(0) = 0, we define the parallel transport Γ of v along c(t) by the following process: Take h to be infinitesimally small and v0 = v. For i = 1, 2, · · · , 1/h, we let vih be the vector orthogonal to c′ (ih) that minimizes the distance on the manifold between expc(ih) (hvih ) and expc((i−1)h) (hv(i−1)h ). Intuitively, the parallel transport finds the vectors on the curve such that their end points are closest to the end points of v. For general vector v ∈ Tc′ (0) , we write v = αc′ (0) + w and we define the parallel transport of v along c(t) is the sum of αc′ (t) and the parallel transport of w along c(t). For a non-geodesic curve, see the definition in Fact 66. 10. Orthonormal frame: Given vector fields v1 , v2 , · · · , vn on a subset of M , we call {vi }ni=1 is an orthonormal frame if hvi , vj ix = δij for all x. Given a curve c(t) and an orthonormal frame at c(0), we can extend it on the whole curve by parallel transport and it remains orthonormal on the whole curve. 11. Directional derivatives and the Levi-Civita connection: For a vector v ∈ Tp M and a vector field u in a neighborhood of p, let γv be the unique geodesic starting at p with initial velocity γv′ (0) = v. Define u(h) − u(0) ∇v u = lim h→0 h where u(h) ∈ Tp M is the parallel transport of u(γ(h)) from γ(h) to γ(0). Intuitively, LeviCivita connection is the directional derivative of u along direction v, taking the metric into d u(x + tv). When u is defined on a curve account. In particular, for Rn , we have ∇v u(x) = dt d d n c, we define Dt u = ∇c′ (t) u. In R , we have Dt u(γ(t)) = dt u(γ(t)). We reserve dt for the usual derivative with Euclidean coordinates. We list some basic facts about the definitions introduced above that are useful for computation and intuition. Fact 66. Given a manifold M , a curve c(t) ∈ M , a vector v and vector fields u, w on M , we have the following: 1. (alternative definition of parallel transport) v(t) is the parallel transport of v along c(t) if and only if ∇c′ (t) v(t) = 0. 2. (alternative definition of geodesic) c is a geodesic if and only if ∇c′ (t) c′ (t) = 0. 3. (linearity) ∇v (u + w) = ∇v u + ∇v w. 4. (product rule) For any scalar-valued function f, ∇v (f · u) = 63 ∂f ∂v u + f · ∇v u. 5. (metric preserving) d dt hu, wic(t) = hDt u, wic(t) + hu, Dt wic(t) . ∂c 6. (torsion free-ness) For any map c(t, s) from a subset of R2 to M , we have that Ds ∂c ∂t = Dt ∂s where Ds = ∇ ∂c and Dt = ∇ ∂c . ∂s ∂t 7. (alternative definition of Levi-Civita connection) ∇v u is the unique linear mapping from the product of vector and vector field to vector field that satisfies (3), (4), (5) and (6). D.1 Curvature Roughly speaking, curvature measures the amount by which a manifold deviates from Euclidean space. Given vector u, v ∈ Tp M , in this section, we define uv be the point obtained from moving from p along direction u with distance kukp (using geodesic), then moving along direction “v” with distance kvkp where “v” is the parallel transport of v along the path u. In Rn , uv is exactly p + u + v and hence uv = vu, namely, parallelograms close up. For a manifold, parallelograms almost close up, namely, d(uv, vu) = o(kuk kvk). This property is called being torsion-free. 1. Riemann curvature tensor: Three-dimensional parallelepipeds might not close up, and the curvature tensor measures how far they are from closing up. Given vector u, v, w ∈ Tp M , we define uvw as the point obtained by moving from uv along direction “w” for distance kwkp where “w” is the parallel transport of w along the path uv. In a manifold, parallelepipeds do not close up and the Riemann curvature tensor how much uvw deviates from vuw. Formally, for vector fields v, w, we define τv w be the parallel transport of w along the vector field v for one unit of time. Given vector field v, w, u, we define the Riemann curvature tensor by R(u, v)w = d d −1 −1 τ τ τsu τtv w ds dt su tv . (D.1) t,s=0 Riemann curvature tensor is a tensor, namely, R(u, v)w at point p depends only on u(p), v(p) and w(p). 2. Ricci curvature: Given a vector v ∈ Tp M , the Ricci curvature Ric(v) measures if the geodesics starting around p in direction v converge together. Positive Ricci curvature indicates the geodesics converge while negative curvature indicates they diverge. Let S(0) be a small shape around p and S(t) be the set of point obtained by moving S(0) along geodesics in the direction v for t units of time. Then, volS(t) = volS(0)(1 − Formally, we define Ric(v) = t2 Ric(v) + smaller terms). 2 X ui (D.2) hR(v, ui )ui , vi where ui is an orthonormal basis of Tp M . Equivalently, we have Ric(v) = Eu∼N (0,I) hR(v, u)u, vi. kvk2 . For Rn , Ric(v) = 0. For a sphere in n + 1 dimension with radius r, Ric(v) = n−1 r2 Fact 67 (Alternative definition of Riemann curvature tensor). Given any M -valued function c(t, s), ∂c we have vector fields ∂c ∂t and ∂s on M . Then, for any vector field z, R( ∂c ∂c , )z = ∇ ∂c ∇ ∂c z − ∇ ∂c ∇ ∂c z. ∂t ∂s ∂s ∂t ∂t ∂s Equivalently, we write R(∂t c, ∂s c)z = Dt Ds z − Ds Dt z. 64 Fact 68. Given vector fields v, u, w, z on M , hR(v, u)w, zi = hR(w, z)v, ui = − hR(u, v)w, zi = − hR(v, u)z, wi . D.2 Hessian manifolds 2 Recall that a manifold is called Hessian if it is a subset of Rn and its metric is given by gij = ∂x∂i ∂xj φ for some smooth convex function φ. We let gij be entries of the inverse matrix of gij . For example, P 2 ∂3 we have j gij gjk = δik . We use φij to denote ∂x∂i ∂xj φ and φijk to denote ∂xi ∂x j ∂xk φ. Since a Hessian manifold is a subset of Euclidean space, we identify tangent spaces Tp M by Euclidean coordinates. The following lemma gives formulas for the Levi-Civita connection and curvature under Euclidean coordinates. Lemma 69 ([28]). Given a Hessian manifold M , vector fields v, u, w, z on M , we have the following: 1. (Levi-Civita connection) ∇v u = and the Christoffel symbol P ∂uk ik vi ∂xi ek Γkij = + P k ijk vi uj Γij ek where ek are coordinate vectors 1 X kl g φijl . 2 l 2. (Riemann curvature tensor) hR(u, v)w, zi = Rklij = 3. (Ricci curvature) Ric(v) = 1 4 P P ijlk Rklij ui vj wl zk where 1 X pq g (φjkp φilq − φikp φjlq ) . 4 pq ijlkpq g pq g jl (φjkpφilq − φikp φjlq ) vi vk . 65
8cs.DS
arXiv:1607.03010v1 [math.GR] 11 Jul 2016 INTERSECTING FREE SUBGROUPS IN FREE PRODUCTS OF LEFT ORDERED GROUPS S. V. IVANOV Abstract. A conjecture of Dicks and the author on rank of the intersection of factor-free subgroups in free products of groups is proved for the case of left ordered groups. 1. Introduction Recall that the Hanna Neumann conjecture [16] claims that if F is a free group of rank r(F ), r̄(F ) := max(r(F ) − 1, 0) is the reduced rank of F , and H1 , H2 are finitely generated subgroups of F , then r̄(H1 ∩ H2 ) ≤ r̄(H1 )r̄(H2 ). It was shown by Hanna Neumann [16] that r̄(H1 ∩ H2 ) ≤ 2r̄(H1 )r̄(H2 ). For more discussion and results on this problem, theQreader is referred to [2], [3], [6], [15], [17], [18]. ∗ More generally, let F = α∈I Gα be the free product of some groups Gα , α ∈ I. According to the classic theorem [13], every subgroup H of F is Q∗Kurosh subgroup −1 sα,β Hα,β sα,β , where Hα,β is a subgroup of Gα , sα,β ∈ F, a free product F (H) ∗ and F (H) is a free subgroup of F such that, for every s ∈ F and γ ∈ I, it is true that F (H) ∩ sGγ s−1 = {1}. We say that H is a factor-free subgroup of F if H = F (H) in the above form of H, i.e., for every s ∈ F and γ ∈ I, we have H ∩ sGγ s−1 = {1}. Since a factor-free subgroup H of F is free, the reduced rank r̄(H) := max(r(H) − 1, 0) of H is well defined. Let q ∗ = q ∗ (Gα , α ∈ I) denote the minimum of orders > 2 of finite subgroups of groups Gα , α ∈ I, and q ∗ := ∞ if ∗ there are no such subgroups. If q ∗ = ∞, define q∗q−2 := 1. It was shown by Dicks and the author [4] that if H1 , H2 are finitely generated factor-free subgroups of F, then ∗ r̄(H1 ∩ H2 ) ≤ 2 q∗q−2 r̄(H1 )r̄(H2 ). It was conjectured by Dicks and the author [4] that if groups Gα , α ∈ I, contain no involutions then, similarly to the Hanna Neumann conjecture, the coefficient 2 could be left out and ∗ r̄(H1 ∩ H2 ) ≤ q∗q−2 r̄(H1 )r̄(H2 ). (1) A special case of this generalization of the Hanna Neumann conjecture is established by Dicks and the author [5] by proving that if H1 , H2 are finitely generated factor-free subgroups of the free product F all of whose factors are groups of order ∗ 3, then, indeed, r̄(H1 ∩ H2 ) ≤ q∗q−2 r̄(H1 )r̄(H2 ) = 3r̄(H1 )r̄(H2 ). We remark that it follows from results of [4] that the last inequality (as well as (1)) is sharp and may not be improved. Here is another special case when the conjectured inequality (1) holds true. 2010 Mathematics Subject Classification. Primary 20E06, 20E07, 20F60, 20F65. Supported in part by the NSF under grant DMS 09-01782. 1 2 S. V. IVANOV Theorem 1. Suppose that Gα , α ∈ I, are left (or right) ordered groups, F = Q∗ G is their free product, and H1 , H2 are finitely generated factor-free subα α∈I groups of F. Then r̄(H1 ∩ H2 ) ≤ q∗ q∗ −2 r̄(H1 )r̄(H2 ) = r̄(H1 )r̄(H2 ). Moreover, let S(H1 , H2 ) denote a set of representatives of those double cosets H1 tH2 of F, t ∈ F, that have the property H1 ∩ tH2 t−1 6= {1}. Then X r̄(H1 ∩ sH2 s−1 ) ≤ r̄(H1 )r̄(H2 ). r̄(H1 , H2 ) := s∈S(H1 ,H2 ) We remark that Antolı́n, Martino, and Schwabrow [1] proved a more general result on Kurosh rank of the intersection of subgroups of free products of right ordered groups by utilizing the Bass–Serre theory of groups acting on trees and some ideas of Dicks [3]. Our proof of Theorem 1 seems to be of independent interest as it uses explicit geometric construction of graphs, representing subgroups of free products, that are often more suitable for counting arguments, see [9], [11]. It is fairly easy to see that Theorem 1 implies both the Hanna Neumann conjecture and the strengthened Hanna Neumann conjecture, put forward by W. Neumann [17], see Sect. 5. The strengthened Hanna Neumann conjecture claims that if H1 , H2 are finitely generated subgroups of a free group F , then X r̄(H1 ∩ sH2 s−1 ) ≤ r̄(H1 )r̄(H2 ), s∈S(H1 ,H2 ) where the set S(H1 , H2 ) is defined as in Theorem 1 with F in place in F. Recall that Friedman [6] proved the strengthened Hanna Neumann conjecture by making use of sheaves on graphs and Mineyev [15] gave a proof to the strengthened Hanna Neumann conjecture by using Hilbert modules and group actions, see also Dicks’s proof [3]. Similarly to Dicks [3] and Mineyev [15], we also use the idea of group ordering and special sets of edges, however, our arguments deal directly with core graphs of subgroups of free products that are analogous to Stallings graphs [18] representing subgroups of free groups. In Sect. 2, we introduce necessary definitions and basic terminology. In Sect. 3, we define and study strongly positive words in free products of left ordered groups. Sect. 4 contains the proof of Theorem 1. In Sect. 5, we briefly look at the case of free groups. 2. Preliminaries Q Let Gα , α ∈ I, be nontrivial groups, F = ∗α∈I Gα be their free product, and H a finitely generated factor-free subgroup of F, H 6= {1}. Consider an alphabet A = ∪α∈I Gα , where Gα ∩ Gα′ = {1} if α 6= α′ . Similarly to the graph-theoretic approach of article [9], in a simplified version suitable for finitely generated factor-free subgroups of F, see [7], [8], [10], we first define a labeled A-graph Ψ(H) which geometrically represents H in a fashion analogous to the way the Stallings graph represents a subgroup of a free group, see [18]. If Γ is a graph, V Γ denotes the vertex set of Γ and EΓ denotes the set of oriented edges of Γ. If e ∈ EΓ, e− , e+ denote the initial, terminal, resp., vertices of e and e−1 is the edge with opposite orientation, where e−1 6= e for every e ∈ EΓ, (e−1 )− = e+ , (e−1 )+ = e− . A finite path p = e1 . . . ek in Γ is a sequence of edges ei such that INTERSECTING FREE SUBGROUPS IN FREE PRODUCTS 3 (ei )+ = (ei+1 )− , i = 1, . . . , k − 1. Denote p− := (e1 )− , p+ := (ek )+ , and |p| := k, where |p| is the length of p. We allow the possibility |p| = 0 and p = {p− } = {p+ }. A finite path p is called closed if p− = p+ . An infinite path p = e1 . . . ek . . . is an infinite sequence of edges ei such that (ei )+ = (ei+1 )− for all i = 1, 2, . . . . If p = e1 . . . ek . . . and q = f1 . . . fℓ . . . are infinite paths such that (e1 )− = (f1 )− , then q −1 p := . . . fℓ−1 . . . f1−1 e1 . . . ek . . . is a biinfinite path. A path p is reduced if p contains no subpath of the form ee−1 , e ∈ EΓ. A closed path p = e1 . . . ek is cyclically reduced if |p| > 0 and both p and the cyclic permutation e2 . . . ek e1 of p are reduced paths. The core of a graph Γ, denoted core(Γ), is the minimal subgraph of Γ that contains every edge e which can be included into a cyclically reduced path in Γ. Let Ψ be a graph whose vertex set V Ψ consists of two disjoint parts VP Ψ, VS Ψ, so V Ψ = VP Ψ ∪ VS Ψ. Vertices in VP Ψ are called primary and vertices in VS Ψ are termed secondary. Every edge e ∈ EΨ connects primary and secondary vertices, hence Ψ is a bipartite graph. Ψ is called a labeled A-graph, or simply A-graph if Ψ is equipped with a map ϕ : EΨ → A, called labeling, such that, for every e ∈ EΨ, ϕ(e) ∈ A = ∪α∈I Gα , ϕ(e−1 ) = ϕ(e)−1 and if e+ = f+ ∈ VS Ψ, then ϕ(e), ϕ(f ) ∈ Gα for the same α = θ(e+ ) ∈ I, called the type of the vertex e+ ∈ VS Ψ and denoted α = θ(e+ ). If e+ ∈ VS Ψ, define θ(e) := θ(e+ ) and θ(e−1 ) := θ(e+ ). Thus, for every e ∈ Ψ, we have defined an element ϕ(e) ∈ A, called the label of e, and θ(e) ∈ I, the type of e. The reader familiar with van Kampen diagrams over a free product of groups, see [14], will recognize that our labeling function ϕ : EΨ → A is defined in the way analogous to labeling functions on van Kampen diagrams over free products of groups. Recall that van Kampen diagrams are planar 2-complexes whereas graphs are 1-complexes, however, apart from this, the ideas of cancelations and edge foldings work equally well for both diagrams and graphs. An A-graph Ψ is called irreducible if properties (P1)–(P3) hold true: (P1) If e, f ∈ EΨ, e− = f− ∈ VP Ψ, and e+ 6= f+ , then θ(e) 6= θ(f ). (P2) If e, f ∈ EΨ, e 6= f , and e+ = f+ ∈ VS Ψ, then ϕ(e) 6= ϕ(f ) in Gθ(e) . (P3) Ψ has no multiple edges, degΨ v > 0 for every v ∈ V Ψ, and there is at most one vertex of degree 1 in Ψ which, if exists, is primary. Suppose Ψ is a connected irreducible A-graph and a primary vertex o ∈ VP Ψ is distinguished so that degΨ o = 1 if Ψ happens to have a vertex of degree 1. Then o is called the base vertex of Ψ = Ψo . Q As usual, elements of the free product F = ∗α∈I Gα are regarded as words over the alphabet A = ∪α∈I Gα . A syllable of a word W over A is a maximal subword of W all of whose letters belong to the same factor Gα . The syllable length kW k of W is the number of syllables of W , whereas the length |W | of W is the number of all letters in W . A nonempty word W over A is called reduced if every syllable of W consists of a single letter. Clearly, |W | = kW k if W is reduced. An arbitrary nontrivial element of the free product F can be uniquely written as a reduced word. A word W is called cyclically reduced if W 2 is reduced. We write U = W if words U , W are equal as elements of F. The literal (or letter-by-letter) equality of words U , W is denoted U ≡ W . The significance of irreducible A-graphs for geometric interpretation of factorfree subgroups H of F is given in the following. 4 S. V. IVANOV Lemma Q∗ 1. Suppose H is a finitely generated factor-free subgroup of the free product F = α∈I Gα , H 6= {1}. Then there exists a finite connected irreducible A-graph Ψ = Ψo (H), with the base vertex o, such that a reduced word W over the alphabet A belongs to H if and only if there is a reduced path p in Ψo (H) such that p− = p+ = o, ϕ(p) = W in F, and |p| = 2|W |. Proof. The proof is based on Stallings’s folding techniques and is somewhat analogous to the proof of van Kampen lemma for diagrams over free products of groups, see [14] (in fact, it is simpler because foldings need not preserve the property of being planar for the diagram). A more general approach, suitable for an arbitrary subgroup of F, is discussed in Lemmas 1, 4 [9]. Let H = hV1 , . . . , Vk i be generated by reduced words V1 , . . . , Vk ∈ F. Consider e which consists of k closed paths p1 , . . . , pk such that they have a single a graph Ψ common vertex o = (pi )− , and |pi | = 2|Vi |, i = 1, . . . , k. Furthermore, we dise and call o primary, the vertices adjacent to o tinguish o as the base vertex of Ψ are called secondary vertices and so on. The labeling function ϕ on pi is defined so that ϕ(pi ) = Vi , i = 1, . . . , k, where ϕ(p) := ϕ(e1 ) . . . ϕ(eℓ ) if p = e1 . . . eℓ and e e1 , . . . , eℓ ∈ E Ψ. e e o is a finite connected A-graph with the base vertex o that has Clearly, Ψ = Ψ the following property e o such that (Q) A word W ∈ F belongs to H if and only if there is a path p in Ψ p− = p+ = o and ϕ(p) = W . e o need not be irreducible and we will do foldings of edges in Ψ e o which However, Ψ preserve property (Q) and which aim to achieve properties (P1)–(P2). e o so that Assume that property (P1) fails for edges e, f with e− = f− ∈ VP Ψ ′ e+ 6= f+ and θ(e) = θ(f ). Let us redefine the labels of all edges e with e′+ = e+ so that ϕ(e′ )ϕ(e)−1 does not change and ϕ(e) = ϕ(f ) in Gθ(e) . Now we identify the edges e, f and vertices e+ , f+ . Observe that this folding preserves property (Q) e o |. ((P2) might fail) and decreases the edge number |E Ψ If property (P2) fails for edges e, f and ϕ(e) = ϕ(f ) in Gθ(e) , then we identify the e o| edges e, f . Note property (Q) still holds ((P1) might fail) and the number |E Ψ decreases. e o such that Suppose property (P3) fails and there are two distinct edges e, f in Ψ e o . By property (Q), it follows from H being factor-free e− = f− , e+ = f+ ∈ VS Ψ that ϕ(e) = ϕ(f ) in Gθ(e) . Therefore, we can identify the edges e, f , thus preserving e o |. If property (P3) fails so that there property (Q) and decreasing the number |E Ψ is a vertex v of degree 1, different from o, then we delete v along with the incident e o | decreases. edge. Clearly, property (Q) still holds and the number |E Ψ e o |, in polynomial time of size of input, which is the Thus, by induction on |E Ψ Pk total length i=1 |Vi |, we can effectively construct an irreducible A-graph Ψo with property (Q). Other stated properties of Ψo are straightforward.  The following lemma further elaborates on the correspondence between finitely generated factor-free subgroups of the free product F and irreducible A-graphs. Lemma 2. Let Ψo be a finite connected irreducible A-graph with the base vertex o, and H = H(Ψo ) be a subgroup of F that consists of all words ϕ(p), where p INTERSECTING FREE SUBGROUPS IN FREE PRODUCTS 5 is a path in Ψo with p− = p+ = o. Then H is a factor-free subgroup of F and r̄(H) = −χ(Ψo ), where χ(Ψo ) = |V Ψo | − 21 |EΨo | is the Euler characteristic of Ψo . Proof. This follows from the facts that the fundamental group π1 (Ψo , o) of Ψo at o is free of rank −χ(Ψo ) + 1 and that the homomorphism π1 (Ψo , o) → F, given by p → ϕ(p), where p is a path with p− = p+ = o, has the trivial kernel following from properties (P1)–(P2).  Suppose H is a nontrivial finitely generated factor-free subgroup of a free product Q∗ F = α∈I Gα , and Ψo = Ψo (H) is an irreducible A-graph for H as in Lemma 1. Let Ψ(H) denote the core of Ψo (H). Clearly, Ψ(H) has no vertices of degree ≤ 1 and Ψ(H) is also an irreducible A-graph. It is easy to see that the graph Ψo (H) of H can be obtained back from the core graph Ψ(H) of H by attaching a suitable path p to Ψ(H) so that p starts at a primary vertex o, ends in p− ∈ VP Ψ(H), and then by doing foldings of edges as in the proof of Lemma 1. Now suppose H1 , H2 are nontrivial finitely generated factor-free subgroups of F. Consider a set S(H1 , H2 ) of representatives of those double cosets H1 tH2 of F, t ∈ F, that have the property H1 ∩ tH2 t−1 6= {1}. For every s ∈ S(H1 , H2 ), define the subgroup Ks := H1 ∩ sH2 s−1 . Analogously to the case of free groups, see [17], [18], we now construct a finite irreducible A-graph Ψ(H1 , H2 ) whose connected components are core graphs Ψ(Ks ), s ∈ S(H1 , H2 ). First we define an A-graph Ψ′o (H1 , H2 ). The set of primary vertices of Ψ′o (H1 , H2 ) is VP Ψ′o (H1 , H2 ) := VP Ψo1 (H1 ) × VP Ψo2 (H2 ). Let τi : VP Ψ′o (H1 , H2 ) → VP Ψoi (Hi ) denote the projection map, τi ((v1 , v2 )) = vi , i = 1, 2. The set of secondary vertices VS Ψ′o (H1 , H2 ) of Ψ′o (H1 , H2 ) consists of equivalence classes [u]α , where u ∈ VP Ψ′o (H1 , H2 ), α ∈ I, with respect to the minimal equivaα α lence relation generated by the following relation ∼ on VP Ψ′o (H1 , H2 ): Define v ∼ w if there are edges ei , fi ∈ EΨoi (Hi ) such that (ei )− = τi (v), (fi )− = τi (w), (ei )+ = (fi )+ , i = 1, 2, the edges ei , fi have type α, and ϕ(e1 )ϕ(f1 )−1 = ϕ(e2 )ϕ(f2 )−1 in α Gα . It is easy to see that ∼ is symmetric and transitive on distinct pairs and triples (but it could lack reflexive property). The edges in Ψ′o (H1 , H2 ) are defined so that u ∈ VP Ψ′o (H1 , H2 ) and [v]α ∈ VS Ψ′o (H1 , H2 ) are connected by an edge if and only if u ∈ [v]α . The type of a vertex [v]α ∈ VS Ψ′o (H1 , H2 ) is α and if e ∈ EΨ′o (H1 , H2 ), e− = u, e+ = [v]α , then ϕ(e) := ϕ(e1 ), where e1 ∈ EΨo1 (H1 ) is an edge of type α with (e1 )− = τ1 (u), when such an e1 exists, and ϕ(e1 ) := bα 6= 1, bα ∈ Gα , otherwise. It follows from the definitions and properties (P1)–(P2) of Ψoi (Hi ), i = 1, 2, that Ψ′o (H1 , H2 ) is an A-graph with properties (P1)–(P2). Hence, taking the core of Ψ′o (H1 , H2 ), we obtain an irreducible A-graph which we denote Ψ(H1 , H2 ). In addition, it is not difficult to see that, when taking the connected component Ψ′o (H1 , H2 , o) of Ψ′o (H1 , H2 ) that contains the vertex o = (o1 , o2 ) and inductively removing from Ψ′o (H1 ∩ H2 , o) vertices of degree 1 different from o, we obtain an irreducible A-graph Ψo (H1 ∩ H2 ) with the base vertex o that corresponds to the intersection H1 ∩ H2 as in Lemma 1. Observe that it follows from the definitions and property (P1) for Ψ(Hi ), i = 1, 2, that, for every edge e ∈ EΨ(H1 , H2 ) with e− ∈ VP Ψ(H1 , H2 ), there are unique edges ei ∈ EΨ(Hi ) such that τi (e− ) = (ei )− , i = 1, 2. Hence, by setting τi (e) = ei , 6 S. V. IVANOV τi (e+ ) = (ei )+ , i = 1, 2, we extend τi to the graph map τi : Ψ(H1 , H2 ) → Ψ(Hi ), i = 1, 2. It follows from definitions that τi is locally injective and τi preserves syllables of ϕ(p) for every path p with primary vertices p− , p+ . Lemma 3. Suppose H1 , H2 are finitely generated factor-free subgroups of the free product F and the set S(H1 , H2 ) is not empty. Then the connected components of the graph Ψ(H1 , H2 ) are core graphs Ψ(H1 ∩ sH2 s−1 ) of subgroups H1 ∩ sH2 s−1 , s ∈ S(H1 , H2 ). In particular, X r̄(H1 ∩ sH2 s−1 ) = −χ(Ψ(H1 , H2 )). r̄(H1 , H2 ) = s∈S(H1 ,H2 ) Proof. As in Lemma 1, let Ψoi (Hi ) be an irreducible A-graph, corresponding to the subgroup Hi of F, i = 1, 2, and Ψ(Hi ) denote the core of Ψoi (Hi ). Let vi ∈ VP Ψ(Hi ), i = 1, 2, and q(vi ) denote a path in Ψoi (Hi ) with q(vi )− = oi and q(vi )+ = vi . Suppose Xi ∈ F, i = 1, 2, and H1X1 ∩ H2X2 6= {1}, where HiXi := Xi Hi Xi−1 . Consider an irreducible A-graph Ψui (HiXi ), i = 1, 2. Note that the core graph Ψ(H1X1 ∩ H2X2 ) can be identified with a connected component, denoted Ψ(X1 ,X2 ) (H1 , H2 ), of the irreducible A-graph Ψ(H1 , H2 ). In addition, if w ∈ VP Ψ(X1 ,X2 ) (H1 , H2 ), then there are paths pi (w) in Ψui (HiXi ), i = 1, 2, such that (pi (w))− = ui , (pi (w))+ = τi (w), and ϕ(p1 (w)) = ϕ(p2 (w)). Furthermore, it follows from the definitions that Xi ϕ(q(τi (w)))ϕ(pi (w))−1 ∈ HiXi , i = 1, 2. Therefore, there are words Vi ∈ Hi , i = 1, 2, such that Xi Vi ϕ(q(τi (w))) = ϕ(pi (w)). Since ϕ(p1 (w)) = ϕ(p2 (w)), we further obtain X1−1 X2 = V1 ϕ(q(τ1 (w)))ϕ(q(τ2 (w)))−1 V2−1 . (2) Now we can draw the following conclusion. For every pair (X1 , X2 ) ∈ F × F such that H1X1 ∩ H2X2 6= {1} and a vertex w ∈ VP Ψ(X1 ,X2 ) (H1 , H2 ), there are words Vi ∈ Hi , i = 1, 2, such that the equality (2) holds. Since the paths q(τi (w)), i = 1, 2, in (2) depend only on a connected component of Ψ(H1 , H2 ), it follows from (2) that if (1, X), (1, Y ) are some pairs such that Ψ(1,X) (H1 , H2 ) = Ψ(1,Y ) (H1 , H2 ), then X ∈ H1 Y H2 ⊆ F. Conversely, if X ∈ H1 Y H2 , then the equality Ψ(1,X) (H1 , H2 ) = Ψ(1,Y ) (H1 , H2 ) is obviously true. Thus, the set S(H1 , H2 ) is in bijective correspondence with connected components of Ψ(H1 , H2 ) and, by Lemma 2, we have r̄(H1 ∩ sH2 s−1 ) = −χ(Ψ(1,s) (H1 , H2 )) for every s ∈ S(H1 , H2 ). Adding up over all s ∈ S(H1 , H2 ), we arrive to the required equality r̄(H1 , H2 ) = −χ(Ψ(H1 , H2 )).  3. Strongly positive words in free products of left ordered groups Recall that G is called a left ordered group if G is equipped with a total order ≤ which is left invariant, i.e., for every triple a, b, c ∈ G, the relation a ≤ b implies ca ≤ cb. If G is left ordered, then G can also be right ordered (and vice versa). Indeed, if ≤ is a left order on G then, setting a  b if and only if a−1 ≤ b−1 , we obtain a right order  on G. Q Let Gα , α ∈ I, be nontrivial left (or right) ordered groups and let F = ∗α∈I Gα be their free product. Since it will be more convenient to work with left order, we assume that Gα , α ∈ I, are left ordered. It is well known, see [12], and fairly easy INTERSECTING FREE SUBGROUPS IN FREE PRODUCTS 7 to show that there exists a total order  on F which extends the left orders on groups Gα , α ∈ I, and which turns F into a left ordered group. A reduced word W ∈ F is called positive if W ≻ 1. A reduced word W is called strongly positive, denoted W ≻≻ 1, if every nonempty suffix of W is positive, i.e., if W ≡ W1 W2 with |W2 | > 0, then W2 ≻ 1. Clearly, a strongly positive word is positive. Note if U, W are strongly positive and U W is reduced, then U W ≻≻ 1. A word U is (resp. strongly) negative if U −1 is (resp. strongly) positive. Lemma 4. Suppose S, T are strongly positive words and the word S −1 T is reduced. Then S −1 T is either strongly positive or strongly negative. Proof. Let S ≡ S1 S2 , T ≡ T1 T2 , where |S2 |, |T2 | > 0. Then S2 ≻ 1, T2 ≻ 1 by S, T ≻≻ 1. Since S −1 T is reduced, we have S −1 T 6= 1, hence S −1 T ≻ 1 or S −1 T ≺ 1. Assume S −1 T ≻ 1. Then T ≻ S = S1 S2 or S1−1 T ≻ S2 ≻ 1, hence, in view of T2 ≻ 1, all nonempty suffixes of S −1 T are positive. This implies S −1 T ≻≻ 1. If S −1 T ≺ 1, then, switching S and T , we can show as above that T −1 S ≻≻ 1, hence S −1 T is strongly negative.  Lemma 5. Suppose W is a reduced word. Then there exists a factorization W ≡ U1 U2−1 such that |U1 |, |U2 | ≥ 0 and each of U1 , U2 is either empty or strongly positive. Proof. Consider a factorization W ≡ U1ε1 . . . Ukεk , where, for every j, Uj ≻≻ 1 and εj = ±1, that would be minimal with respect to k. Since for every letter a of W either a ≻≻ 1 or a−1 ≻≻ 1, it follows that such a factorization exists and k ≤ |W |. Note if εj = εj+1 = 1, then Uj Uj+1 is reduced and so Uj Uj+1 ≻≻ 1. Similarly, if −1 εj = εj+1 = −1, then Uj−1 Uj+1 is reduced and so Uj+1 Uj ≻≻ 1. Hence, it follows from the minimality of k that εj 6= εj+1 for all j = 1, . . . , k − 1. If now εj = −1 and εj+1 = 1 for some j, then we can use Lemma 4 and conclude that either −1 Uj−1 Uj+1 ≻≻ 1 or Uj+1 Uj ≻≻ 1, contrary to minimality of k. Thus, it is proven that either k = 1 or k = 2 and ε1 = 1, ε2 = −1, as required.  Lemma 6. Suppose W is a cyclically reduced word. Then there exists a factorization W ≡ W1 W2 such that the cyclic permutation W̄ ≡ W2 W1 of W is either strongly positive or strongly negative. Proof. By Lemma 5, W ≡ U1 U2−1 , where |U1 |, |U2 | ≥ 0 and Uj ≻≻ 1 if |Uj | > 0, j = 1, 2. Since W 2 is reduced, U2−1 U1 is reduced and, by Lemma 4, either U2−1 U1 ≻≻ 1 or U2−1 U1 ≺≺ 1. Hence, W̄ ≡ U2−1 U1 is a desired cyclic permutation of W .  4. Proving Theorem 1 Let Gα , α ∈ I, be nontrivial left (or right) ordered groups and let F be their free product equipped with a left order . Also, fix a total order ≤ on the index set I. Let Ψ be a finite irreducible A-labeled graph, where A = ∪α∈I Gα . An edge e ∈ EΨ is called maximal if there are reduced infinite paths p = p(e) = e1 e2 . . . , q = q(e) = f1 f2 . . . in Ψ, where ej , fj ∈ EΨ, such that e = e1 , (e1 )− = (f1 )− is primary, θ(e1 ) > θ(f1 ), and, for every j ≥ 1, both ϕ(e1 . . . e2j ) ≺ 1 and ϕ(f1 . . . f2j ) ≺ 1. Note that the vertices (e1 . . . e2j )+ , (f1 . . . f2j )+ are primary and q −1 p = . . . f2−1 f1−1 e1 e2 . . . is a reduced biinfinite path. Lemma 7. Suppose Ψ is a finite irreducible A-labeled graph whose Euler characteristic is negative, χ(Ψ) < 0. Then Ψ contains a maximal edge. 8 S. V. IVANOV Proof. Since χ(Ψ) < 0, Ψ has a connected component Ψ1 with χ(Ψ1 ) < 0. Without loss of generality, we may assume that core (Ψ1 ) = Ψ1 . It is not difficult to see from χ(Ψ1 ) < 0 and from core (Ψ1 ) = Ψ1 that, for every pair h, h′ ∈ EΨ1 , there is a reduced path p = h . . . h′ whose first, last edges are h, h′ , resp.. Pick a primary vertex o in Ψ1 and two distinct edges t1 , u1 with (t1 )− = (u1 )− = o. Let t, u be some reduced paths such that first edges of t, u are t1 , u1 , resp., and t+ , u+ have degree > 2. Then it follows from the above remark that there are closed paths r0 , s0 starting at t+ , u+ , resp., such that the path tr02 t−1 us20 u−1 is reduced. Since Ψ1 is irreducible and r0 , s0 are reduced, it follows ϕ(r0 ) 6= 1, ϕ(s0 ) 6= 1 in F. Let r, s be some cyclic permutations of the closed paths r0 , s0 , resp., that start at some primary vertices and R = ϕ(r), S = ϕ(s) be reduced words. Clearly, R, S are cyclically reduced and |R| = |r|/2 > 1, |S| = |s|/2 > 1. By Lemma 6, there are cyclic permutations R̄, S̄ of R, S, resp., such that R̄εr , S̄ εs are strongly positive, where εr , εs ∈ {±1}. Switching from r0 , s0 to r0−1 , s−1 0 , resp., if necessary, we may assume that εr = εs = −1, i.e., R̄−1 , S̄ −1 ≻≻ 1. Let r̄, s̄ denote cyclic permutations of r, s, resp., such that ϕ(r̄) = R̄, ϕ(s̄) = S̄. Also, let r̄ = r̄1 r̄2 , s̄ = s̄1 s̄2 be factorizations of r̄, s̄, resp., defined by vertices t+ , u+ , resp.. Consider two infinite paths starting at o = t− = u− and defined as follows. Let T = tr0+∞ whose prefixes are tr0k , k ≥ 0, and U = us+∞ whose prefixes are usℓ0 , 0 ℓ ≥ 0. It follows from the definitions that T starts at t− = o, goes along t to t+ and then cycles around r0 infinitely many times, in particular, T is reduced. Similarly, U starts at u− = o, goes along u to u+ and then cycles around s0 . Denote T = t1 t2 . . . , where tj ∈ EΨ1 , and U = u1 u2 . . . , where uk ∈ EΨ1 . Let T (j1 , j2 ) := tj1 . . . tj2 , where j1 ≤ j2 , denote the subpath of T that starts at (tj1 )− and ends in (tj2 )+ . It is convenient to set T (j, j − 1) := {(tj )− } for all j ≥ 1. Similarly, U (j1 , j2 ) := uj1 . . . uj2 , where j1 ≤ j2 , and U (j, j − 1) := {(uj )− } if j ≥ 1. Suppose 2j > |t| + |r̄2 |. Then 2j − |t| − |r̄2 | > 0. Let m be the remainder of 2j − |t| − |r̄2 | when divided by |r|. Set mr := m if m > 0 and mr := |r| if m = 0. Note T (1, 2j) = T (1, 2j − mr )T (2j − mr + 1, 2j) and ϕ(T (2j − mr + 1, 2j)) ≡ R̄3 , where R̄3 is a prefix of ϕ(r̄) ≡ R̄3 R̄4 of even length mr > 0. Recall ϕ(r̄) = R̄ and R̄−1 ≻≻ 1, hence R̄3−1 ≻ 1 and R̄3 ≺ 1. Note R̄3 = ϕ(T (2j − mr + 1, 2j)) ≺ 1 implies, by left invariance of the order , that ϕ(T (1, 2j)) ≺ ϕ(T (1, 2j − mr )). (3) ′ Now suppose 2j > |u| + |s̄2 |. Let m be the remainder of 2j − |t| − |s̄2 | > 0 when divided by |s|. Set ms := m′ if m′ > 0 and ms := |s| if m′ = 0. Then we can derive from S̄ −1 ≻≻ 1, similar to (3), that ϕ(U (1, 2j)) ≺ ϕ(U (1, 2j − ms )). (4) The comparisons (3)–(4) prove that a maximal element of the infinite set {ϕ(T (1, 2j)), ϕ(U (1, 2k)) | j ≥ 0, k ≥ 1} ⊆ F (5) exists and it is the maximal element of the finite set { ϕ(T (1, 2j)), ϕ(U (1, 2k)) | 0 ≤ 2j ≤ |t| + |r̄2 |, 0 < 2k ≤ |u| + |s̄2 | } ⊂ F. Let ϕ(Q(1, 2jM )), where jM ≥ 0, Q ∈ {T, U }, denote the maximal element of the set (5). Note vM = Q(1, 2jM )+ is primary. Observe that elements ϕ(T (1, 2j)), ϕ(U (1, 2k)), j ≥ 0, k ≥ 1, in (5) are distinct and represent ϕ-labels of subpaths of the biinfinite path U −1 T that connect the primary vertex o = t− to all primary vertices of U −1 T along U −1 T (or its inverse). If we take another primary vertex v on INTERSECTING FREE SUBGROUPS IN FREE PRODUCTS 9 U −1 T and consider the set of labels of subpaths that connect v to primary vertices of U −1 T as above, then the resulting set can be obtained from (5) by multiplication on the left by ϕ(h(o, v))−1 , where h(o, v) = T (1, 2jv ) if v = T (1, 2jv )+ , 2jv ≥ 0, and h(o, v) = U (1, 2kv ) if v = U (1, 2kv )+ , 2kv > 0. Since left multiplication preserves the order, these remarks imply that the vertex vM = Q(1, 2jM )+ defines a factorization of the biinfinite path U −1 T = q −1 p into infinite paths q, p, where p = e1 e2 . . . , q = f1 f2 . . . , ej , fj are edges, j ≥ 1, so that, for every j ≥ 1, we have ϕ(e1 e2 . . . e2j ) ≺ 1 and ϕ(f1 f2 . . . f2j ) ≺ 1. Therefore, if θ(e1 ) > θ(f1 ), then e1 is a maximal edge of Ψ and if θ(f1 ) > θ(e1 ), then f1 is maximal in Ψ.  Suppose Γ is a finite graph. A set D ⊆ EΓ of edges is called good (for cutting) if the graph Γ \ (D ∪ D−1 ) consists of connected components whose Euler characteristics are 0. Clearly, Γ contains a good edge set if and only if no connected component of Γ is a tree. Lemma 8. Suppose Ψ is a finite connected irreducible A-graph with χ(Ψ) < 0. Then the set of all maximal edges of Ψ is good (for cutting). Proof. Arguing on the contrary, assume that D ⊆ EΨ is the set of all maximal edges of Ψ and D is not good. Then the graph Ψ \ (D ∪ D−1 ) contains a connected component Ψ′1 with either χ(Ψ′1 ) < 0 or χ(Ψ′1 ) > 0. If χ(Ψ′1 ) < 0, then the core Ψ1 = core(Ψ′1 ) of Ψ′1 is a finite irreducible A-graph with χ(Ψ1 ) < 0. By Lemma 7, Ψ1 contains a maximal edge e. However, it follows from the definition that e is also maximal for Ψ, hence, e ∈ D. This contradiction shows that χ(Ψ′1 ) > 0, hence Ψ′1 is a tree which we denote T . Let C denote the set that consists of all c ∈ EΨ such that c+ ∈ V T and c 6∈ ET . It follows from the definitions that if c ∈ C then c ∈ D or c−1 ∈ D. Since every d ∈ D is maximal, there are infinite reduced paths p(d) = e1 (d)e2 (d) . . . and q(d) = f1 (d)f2 (d) . . . such that e1 (d)− = f1 (d)− ∈ VP Ψ, e1 (d) = d, θ(e1 (d)) > θ(f1 (d)) and, for every j ≥ 1, ϕ(e1 (d) . . . e2j (d)) ≺ 1 and ϕ(f1 (d) . . . f2j (d)) ≺ 1. Pick an arbitrary c ∈ C. Suppose c− is primary. Since d− ∈ VP Ψ if d ∈ D and c or c−1 is in D, it follows that c ∈ D. Consider a shortest path of the form h(c) := e1 (c) . . . e2ℓ (c), ℓ ≥ 1, such that either e2ℓ (c)−1 ∈ C or e2ℓ (c)−1 ∈ T and e2ℓ+1 (c)−1 ∈ C. Define σ(c) := e2ℓ (c)−1 if e2ℓ (c)−1 ∈ C and σ(c) := e2ℓ+1 (c)−1 if e2ℓ+1 (c)−1 ∈ C. Since T is a finite tree, such a path h(c) exists, |h(c)| > 0, σ(c) 6= c, and ϕ(h(c)) ≺ 1. Note h(c)− , h(c)+ are primary vertices of c, σ(c), resp., and h(c) = chT (c)σ(c)−εσ(c) , where hT (c) is a subpath of h(c) in T with hT (c)− = c+ , hT (c)+ = σ(c)+ , and εσ(c) = 1 if σ(c)+ is secondary and εσ(c) = 0 if σ(c)+ is primary. Now assume that c+ is primary. Then c−1 = dc ∈ D. Consider a shortest path of the form h(c) := f1 (dc ) . . . f2ℓ−2 (dc ), where ℓ ≥ 1 and if ℓ = 1 then h(c) := {c+ }, such that either f2ℓ−2 (dc )−1 ∈ C or f2ℓ−2 (dc )−1 ∈ T (or f2ℓ−2 (dc ) is undefined if ℓ = 1) and f2ℓ−1 (dc )−1 ∈ C. Define σ(c) := f2ℓ−2 (dc )−1 if f2ℓ−2 (dc )−1 ∈ C and σ(c) := f2ℓ−1 (dc )−1 if f2ℓ−1 (dc )−1 ∈ C. Since T is a finite tree, such a path h(c) exists, |h(c)| ≥ 0, σ(c) 6= c, and ϕ(h(c))  1. In addition, the equality ϕ(h(c)) = 1 implies that h(c) = {c+ }, σ(c) = f1 (c)−1 and θ(σ(c)) = θ(f1 (dc )) < θ(e1 (dc )) = θ(c). As above, we remark that h(c)− , h(c)+ are primary vertices of c, σ(c), resp., and h(c) = hT (c)σ(c)−εσ(c) , where hT (c) is in T with hT (c)− = c+ , hT (c)+ = σ(c)+ , and εσ(c) = 1 if σ(c)+ is secondary and εσ(c) = 0 if σ(c)+ is primary. 10 S. V. IVANOV Let us summarize. For every c ∈ C, we have defined an edge σ(c) ∈ C, σ(c) 6= c, hence, σ : C → C is a function. Furthermore, there is a reduced path h(c) such that h(c) = cεc hT (c)σ(c)−εσ(c) , where hT (c) is in T with hT (c)− = c+ , hT (c)+ = σ(c)+ , εc = 1 if c+ ∈ VS Ψ and εc = 0 if c+ ∈ VP Ψ. In addition, εσ(c) = 1 if σ(c)+ ∈ VS Ψ and εσ(c) = 0 if σ(c)+ ∈ VP Ψ. Also, ϕ(h(c))  1 and ϕ(h(c)) = 1 implies that h(c) = {c+ } = {σ(c)+ } and θ(c) > θ(σ(c)). Finally, h(c)− , h(c)+ are primary vertices of c, σ(c), resp., whence h(c)+ = h(σ(c))− for every c ∈ C. Since C is finite, there is a cycle c, σ(c), . . . , σ k (c) = c, k ≥ 2, for some c ∈ C. Consider the closed path pc = h(c)h(σ(c)) . . . h(σ k−1 (c)). Since ϕ(h(σ j (c)))  1 for every j, we obtain that ϕ(pc )  1 and the equality ϕ(pc ) = 1 implies ϕ(h(σ j (c))) = 1 and h(σ j (c)) = {σ j (c)+ } for every j. On the other hand, pc = cεc hT (c)σ(c)−εσ(c) σ(c)εσ(c) hT (σ(c))σ 2 (c)−εσ2 (c) . . . σ k−1 (c)εσk−1 (c) hT (σ k−1 (c))σ k (c)−εσk (c) = cεc hT (c)hT (σ(c)) . . . hT (σ k−1 (c))c−εc following from σ k (c) = c. Since hT (c)hT (σ(c)) . . . hT (σ k−1 (c)) is a closed path in the tree T , we have ϕ(pc ) = 1 in F. Therefore, h(σ j (c)) = {σ j (c)+ } = {σ(c)+ } and θ(σ j (c)) > θ(σ j+1 (c)) for every j = 0, 1, . . . , k − 1, implying θ(c) > θ(σ k (c)) = θ(c). This contradiction completes the proof.  Proof of Theorem 1. As in Sect. 2, consider a finite irreducible A-graph Ψ(H1 , H2 ) whose connected components correspond to core graphs of subgroups H1 ∩ sH2 s−1 , s ∈ S(H1 , H2 ). Without loss of generality, we may assume that −χ(Ψ(H1 , H2 )) > 0. Let D be the set of all maximal edges in Ψ(H1 , H2 ). It is easy to see from the definitions that if d ∈ D, then τi (d) is maximal in Ψoi (Hi ), i = 1, 2. Hence, τi (D) ⊆ Di , where Di is the set of maximal edges of Ψoi (Hi ), i = 1, 2. By Lemma 8, Di is good for Ψoi (Hi ) and it follows from Lemma 3 and definitions that r̄(H1 , H2 ) = |D| ≤ |τ1 (D)| · |τ2 (D)| ≤ |D1 | · |D2 | = r̄(H1 ) · r̄(H2 ), as desired.  5. The Free Group Case Suppose H1 , H2 are finitely generated subgroups of a free group F = F (A), where A = {a1 , . . . , am } is a set of free generators of F . Let F (a, b) be a free group of rank 2 with free generators a, b. Note that the map µ : ai → ai bi a−i b−i , i = 1, . . . , m, extends to a monomorphism µ : F (A) → F (a, b) such that µ(H1 ), µ(H2 ) are factor-free subgroups of the free product F (a, b) = A ∗ B, where A = hai, B = hbi are infinite cyclic groups generated by a, b. We may assume that µ(S(H1 , H2 )) ⊆ S(µ(H1 ), µ(H2 )). Since a cyclic group is left ordered, it follows from Theorem 1 that X X r̄(µ(H1 ) ∩ tµ(H2 )t−1 ) r̄(H1 ∩ sH2 s−1 ) ≤ r̄(H1 , H2 ) = s∈S(H1 ,H2 ) t∈S(µ(H1 ),µ(H2 )) ≤ r̄(µ(H1 ))r̄(µ(H2 )) = r̄(H1 )r̄(H2 ). (6) We remark that there is a more direct way to prove the inequality (6) by repeating verbatim the arguments of Sect. 4 with a few changes in basic definitions. To do this, ±1 ±1 consider a graph U with V U = {oP , oS } and EU = {a±1 1 , a2 , a3 }, where (aj )− = oP and (aj )+ = oS , j = 1, 2, 3. The fundamental group F2 = π1 (U, oP ) of U at −1 −1 −1 oP is free of rank 2, and F2 = ha1 a−1 2 , a1 a3 i is freely generated by a1 a2 , a1 a3 . Let H1 , H2 be finitely generated subgroups of F2 , Xi be the Stallings graph of INTERSECTING FREE SUBGROUPS IN FREE PRODUCTS 11 Hi , i = 1, 2, and W be the core of the pullback X1 × X2 of X1 , X2 over U , see U [18]. If Q ∈ {X1 , X2 , W, U }, there is a canonical graph map ϕQ : Q → U which is locally injective and which we call labeling. If v ∈ V Q and ϕQ (v) = oP , v is called primary. If ϕQ (v) = oS , v is secondary. The image ϕQ (e) = a±1 is the label of an j edge e ∈ EQ and θ(e) := j ∈ {1, 2, 3} = I is the type of e. With this terminology, the definitions and arguments of Sect. 4 for graphs Q, W , X1 , X2 and the group F2 in place of Ψ, Ψ(H1 , H2 ), Ψo1 (H1 ), Ψo2 (H2 ) and F, resp., are retained. References [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] Y. Antolı́n, A. Martino, and I. Schwabrow, Kurosh rank of intersections of subgroups of free products of right-orderable groups, preprint, http://arxiv.org/abs/1109.0233v3 W. Dicks, Equivalence of the strengthened Hanna Neumann conjecture and the amalgamated graph conjecture, Invent. Math. 117(1994), 373–389. W. Dicks, Simplified Mineyev, preprint, http://mat.uab.cat/∼dicks/SimplifiedMineyev.pdf W. Dicks and S. V. Ivanov, On the intersection of free subgroups in free products of groups, Math. Proc. Cambridge Phil. Soc. 144(2008), 511–534. W. Dicks and S. V. Ivanov, On the intersection of free subgroups in free products of groups with no 2-torsion, Illinois J. Math. 54(2010), 223–248. J. Friedman, Sheaves on graphs, their homological invariants, and a proof of the Hanna Neumann conjecture: with an appendix by Warren Dicks, Mem. Amer. Math. Soc. 233(2014), no. 1100. xii+106 pp. S. V. Ivanov, On the intersection of finitely generated subgroups in free products of groups, Internat. J. Algebra and Comp. 9(1999), 521–528. S. V. Ivanov, Intersecting free subgroups in free products of groups, Internat. J. Algebra and Comp. 11(2001), 281–290. S. V. Ivanov, On the Kurosh rank of the intersection of subgroups in free products of groups, Adv. Math. 218(2008), 465–484. S. V. Ivanov, A property of groups and the Cauchy-Davenport theorem, J. Group Theory 13(2010), 21–39. S. V. Ivanov, Linear programming and the intersection of free subgroups in free products of groups, submitted. V. M. Kopytov and N. Y. Medvedev, Right ordered groups, Plenum Publ., New York, 1996. A. G. Kurosh, The theory of groups, Chelsea, 1956. R. C. Lyndon and P. E. Schupp, Combinatorial group theory, Springer-Verlag, 1977. I. Mineyev, Submultiplicativity and the Hanna Neumann conjecture, Ann. Math. 175(2012), 393–414. H. Neumann, On the intersection of finitely generated free groups, Publ. Math. 4(1956), 186–189; Addendum, Publ. Math. 5(1957), 128. W. D. Neumann, On the intersection of finitely generated subgroups of free groups, Lecture Notes in Math. (Groups-Canberra 1989) 1456(1990), 161–170. J. R. Stallings, Topology of finite graphs, Invent. Math. 71(1983), 551–565. Department of Mathematics, University of Illinois, Urbana, IL 61801, U.S.A. E-mail address: [email protected]
4math.GR
ON THE STRUCTURE OF INVOLUTIONS AND SYMMETRIC SPACES OF QUASI DIHEDRAL GROUP arXiv:1401.0112v3 [math.GR] 4 Jul 2017 ZAHID RAZA, IMRAN AND BIJAN DAVVAZ Abstract. Let G = QD8k be the quasi-dihedral group of order 8n and θ be an automorphism of QD8k of finite order. The fixed-point set H of θ is defined as Hθ = Gθ = {x ∈ G | θ(x) = x} and generalized symmetric space Q of θ is given by Qθ = {g ∈ G | g = xθ(x)−1 for some x ∈ G}. The characteristics of the sets H and Q have been calculated. It is shown that for any H and Q, H.Q 6= QD8k . The H-orbits on Q are obtained under different conditions. Moreover, the formula to find the order of v-th root of unity in Z2k for QD8k has been calculated. The criteria to find the number of equivalence classes denoted by C4k of the involution automorphism has also been constructed. Finally, the set of twisted involutions R = Rθ = { x ∈ G | θ(x) = x−1 } has been explored. 1. Introduction Serious work on groups generated by reflections began in the 19th century. The finite subgroups of O(3) generated by isometric reflections on the 2-sphere (or equivalently, by orthogonal linear reflections on R3 ) had been determined by Möbius in 1852. In the second half of the 19th century, work also began on finite reflection groups on S n for n > 2 (or equivalently, finite linear reflection groups on Rn+1 ). By the late 19′ s other groups generated by isometric reflections across the edges of polygons (with 3 or more edges) in the hyperbolic plane had been studied by Klein and Poincare. The group of symmetries of such a root system was a finite group generated by reflections had been shown by Weyl in 1925. This intimate connection with the classification of semi-simple Lie groups cemented reflection groups into a central place in mathematics. The two lines of research were united in (Coxeter, 1930). He classified discrete groups generated by reflections on the n-dimensional sphere or Euclidean space. The notion of an abstract reflection group introduced by Jacques Tits which he called a coxeter group. He considered pairs (W, S) with W a group and S a set of involutions which generate W so that the group has a presentation of the following form: the set of generators is S and the set of relations 2010 Mathematics Subject Classification. 20F28 . Key words and phrases. Automorphisms, involutions, fixed-point set, symmetric spaces, quasidihedral group. 1 2 ZAHID RAZA, IMRAN AND BIJAN DAVVAZ is {(st)m(s,t) }, where m(s, t) denotes the order of st and the relations range over all unordered pairs s, t ∈ S with m(s, t) 6= ∞. The pair (W, S) is a coxeter system and W is a coxeter group. This was demonstrated in (Bourbaki, 1968; Bjorner and Francesco, 2005). The early work by Helminck on symmetric spaces concerned some algebraic results about their structure(Helminck, 1988). Classification of the real symmetric spaces and their fine structure had been included in (Helminck, 1994). By considering an open subgroup H of the fixed point group Gθ of an involution θ of G, the result was proved that ‘‘ For k a field of characteristic not two, let G be a connected semi-simple algebraic k-group and θ an involution of G. Then θ is defined over k if and only if H θ is defined over k” (Helminck and Wang, 1993). They also proved that ‘‘ if G is a connected semi-simple algebraic group, θi involution of G and Hi = Gθi , (i = 1, 2). Let H1θ1 and H2θ2 be the identity components of H1 and H2 respectively. If H1θ1 = H2θ2 then θ1 = θ2 .” A mini-workshop on generalizations of symmetric spaces was organized by Ralf Kohl at.el in 2012. Mathematicians in this area brought together to present their current research projects or trigger new collaboration via comparison, analogy, transfer, generalization and unification of method in this workshop. The structure of automorphism group of dihedral group has been found by Cunningham at.el (2012). They also characterized the automorphism group with θ2 = id and calculated H and Q for each automorphism for the family of finite dihedral groups. They also proved that the set of involutions is partitioned in such a way that there are at most two distinct equivalence classes of involutions in each of the partition. In involution case, Q is always a subgroup of G. Moreover, the infinite dihedral group is also discussed. Let G = Dcn be the dicyclic group of order 4n. Let φ be an automorphism of G of order k. Bishop at.el (2013) describe φ and the generalized symmetric space Q of G associated with φ. When φ is an involution, they describe its fixed point group H along with the H-orbits and G-orbits of Q corresponding to the action of φ-twisted conjugation. In this paper, we extent the study to quasi-dihedral group QD8k . 2. Preliminaries The quasi-dihedral group is denoted by QD8k , where QD8k = ha, b : a4k = b2 = 1, ba = a2k−1 bi. In reset of the whole paper, we denote it by QD2m , where m = 4k and n = m2 = 2k. That is QD2m = ha, b : am = b2 = 1, ba = an−1 bi. It is clear from the presentation that ai bj ∈ QD2m is in normal form for some integer 0 ≤ i < m and j ∈ {0, 1}. In the whole study, Zn denotes the additive group of integers modulo n and Um denotes the multiplicative group of units of Zn and ON THE STRUCTURE OF INVOLUTIONS AND SYMMETRIC SPACES OF QUASI DIHEDRAL GROUP 3 r ∈ Um if and only if gcd(r, m) = 1. The v-th root of unity in Zn which can be v described by Rm = {r ∈ Um | r v = 1 (mod n)}. Let G be a group, then an element a is a conjugate with b in G if and only if there exists an element x such that a = xbx−1 . For a ∈ G, the function φa (x) = axa−1 ∀ x ∈ G is called an inner automorphism of G. Let θ1 , θ2 be two automorphisms, then θ1 ∼ θ2 if and only if they are conjugate to each other. If there exists another automorphism σ such that σθ1 σ −1 = θ2 . Definition 3. For any c ∈ Zn , we define ZDiv (c) = {y ∈ Zn | cy ≡ 0 (mod n)} and easy to see that | ZDiv (c) |= gcd(c, n) Notation 4. Let us fixed the following notations, which will be used in the whole paper. v • For fixed r ∈ Rm . The number of equivalence classes with fixed leading co-efficient r is denoted by Nr =| {θ̄ | θ = rx + s ∈ Autv (D2m )} | • Let us consider the subset of automorphism denoted by Autv (QD2m ) and is defined as Autv (QD2m ) = {θ ∈ Aut(QD2m ) | θv = id }. The following lemma is easy to prove. Lemma 5. If QD2m be the quasi-dihedral group, then (1) bai = ai(n−1) b for all i = 0, 1, . . . , (m − 1), (2) | a2i b |= 2 and | a2i+1 b |= 4 for all i = 0, 1, . . . , (n − 1). Lemma 6. The automorphism group of QD2m is isomorphic to the group of affine linear transformations of Zn . In particular, we have Aut(QD2m ) ∼ = Af f (Zn ) = {rx + s : Zn → Zn | r ∈ Um , s ∈ Zn } and the action of rx + s on elements of QD2m in normal form is given by (6.1) (rx + s)(aj bt ) = arj+[(t−1)n−(t−2)]s bt Proof. Let θ be an automorphism, then θ(a) = ar and θ(b) = (as b), where gcd(r, m) = 1, s = 0, 2, 4, . . . , (m − 2). Consider arbitrary element aj bt ∈ QD2m , and θ being homomorphism, (6.2) θ(aj bt ) = θ(aj )θ(bt ), then θ(aj ) = arj and θ(bt ) = (as b)(as b)(as b) . . . (as b) = as (bas )(bas )b . . . (as b). By Lemma 5, we have θ(bt ) = as [as(n−1) b](bas )(bas )b . . . (as b) = as+s(n−1) (b2 as )(bas )b . . . (as b) θ(bt ) = asn (b2 as )(bas )b . . . (as b) = asn (as(n−1) b2 )(bas )b . . . (as b) θ(bt ) = asn+sn−sb3 (bas )b . . . (as b) = a2sn−s b3 (bas )b . . . (as b) after t-steps, we have θ(bt ) = a(t−1)ns−(t−2)s bt . Put values in equation 6.2, we get θ(aj bt ) = arj .a(t−1)ns−(t−2)s bt = arj+(t−1)ns−(t−2)s bt = arj+[(t−1)n−(t−2)]s bt . Since b2 = 4 ZAHID RAZA, IMRAN AND BIJAN DAVVAZ 1, so t ∈ {0, 1}. If t = 0, then θ(aj ) = arj+(2−n)s =⇒ rx + (2 − n)s ∈ Af f (Zn ). If t = 1, then θ(aj b) = arj+s b =⇒ rx + s ∈ Af f (Zn ). Conversely, For f ∈ Af f (Zn ), that is f = rx + s where r ∈ Um , s ∈ Zn and it is given as a group action f (aj bt ) = arj+[(t−1)n−(t−2)]s bt for all aj bt ∈ QD2m . Now, we will show that f is an automorphism. For this let us define θ : QD2m −→ QD2m by θ(aj bt ) = f (aj bt ) = arj+[(t−1)n−(t−2)]s bt . We will show that θ is a bijective homomorphism. For this we will show that θ is one to one and onto. one to one: Suppose that θ(aj1 bt1 ) = θ(aj2 bt2 ), then arj1 +[(t1 −1)n−(t1 −2)]s bt1 = arj2 +[(t2 −1)n−(t2 −2)]s bt2 ⇒ arj1 +[(t1 −1)n−(t1 −2)]s−rj2−[(t2 −1)n−(t2 −2)]s bt1 −t2 = e. Case 1 : rj1 + [(t1 − 1)n − (t1 − 2)]s − rj2 − [(t2 − 1)n − (t2 − 2)]s = 0 and t1 − t2 = 2, since, t ∈ {0, 1} therefore t1 − t2 6= 2 not possible. Case 2 : rj1 + [(t1 − 1)n − (t1 − 2)]s − rj2 − [(t2 − 1)n − (t2 − 2)]s = m and t1 − t2 = 0 ⇒ r(j1 −j2 )+ns(t1 −t2 )−s(t1 −t2 ) = m ⇒ r(j1 −j2 ) = m ⇒ r | m but gcd(r, m) = 1, not possible. Now r(j1 − j2 ) = m will be only possible when j1 − j2 = 0, r 6= 0 j1 = j2 ⇒ aj1 = aj2 ⇒ aj1 bt1 = aj2 bt2 ⇒ θ is one to one. onto: It is cleared from the definition of the group action that for every arj+[(t−1)n−(t−2)]s bt there exists aj bt ∈ QD2m such that θ(aj bt ) = arj+[(t−1)n−(t−2)]s bt ⇒ θ is onto. Hence Aut(QD2m ) ∼ = Af f (Zn ).  7. Structure of Automorphisms of QD2m Proposition 7.1. For any integer v ≥ 1 and θ = rx + s be an automorphism of v QD2m then θv =id if and only if r ∈ Rm and s ∈ ZDiv(r v−1 + r v−2 + · · · + r + 1). Proof. We will use the mathematical induction on v to show first the following statement: θv (x) = r v x + (r v−1 + r v−2 + · · · + r + 1)s. For v = 2, 3 θ2 (x) = θ[θ(x)] = θ(rx + s) = r(rx + s) + s = r 2 x + rs + s = r 2 x + (r + 1)s. Similarly, θ3 (x) = r 3 x + r 2 s + rs + s = r 3 x + (r 2 + r + 1)s. Suppose that the statement is true for v = i that is i θ (x) = r i x + (r i−1 + r i−2 + · · · + r + 1)s. We will show that the statement is true for v = i + 1. Take θi+1 (x) = θ[θi (x)] = θ[r i x + (r i−1 + r i−2 + · · · + r + 1)s] θi+1 (x) = r[r i x + (r i−1 + r i−2 + · · · + r + 1)s] + s = r i+1 x + (r i + r i−1 + · · · + r + 1)s]. Hence , the statement is true for all positive values of v. We have identified the identity automorphism with x ∈ Af f (Zn ), thus r v ≡ 1 (mod n) and (r v−1 + r v−2 + v · · · + r + 1)s ≡ 0 (mod n) ⇔ r ∈ Rm and s ∈ ZDiv(r v−1 + r v−2 + · · · + r + 1) as required.  3 Example 7.2. Let G = QD56 and v = 3. In this case R28 = {1, 9, 11, 15, 23, 25}, take r = 9, then ZDiv(92 + 9 + 1) = ZDiv(91) = {0, 2, 4, 6, 8, 10, 12}. Now, consider ON THE STRUCTURE OF INVOLUTIONS AND SYMMETRIC SPACES OF QUASI DIHEDRAL GROUP 5 θ1 = 9x+6 ∈ Aut(QD56 ), then after simple calculation we get θ13 = x =id. Similarly, for θ2 = 9x + 12 ∈ Aut(QD56 ), we have θ23 = x =id. Proposition 7.3. For any m and v ≥ 1, we have X gcd(r v−1 + r v−2 + · · · + r + 1, n) |Autv (QD2m )| = r∈Rvm v Proof. This follows from above Proposition: for any r ∈ Rm there are |ZDiv(r v−1 + r v−2 + · · · + r + 1)| = gcd(r v−1 + r v−2 + · · · + r + 1, n) element s such that (r v−1 +r v−2 +· · ·+r +1)s ≡ 0 (mod n) and every automorphism θ ∈ Autv (QD2m ) must be of this form.  Proposition 7.4. Let θ1 = r1 x+s1 and θ2 = r2 x+s2 be two different automorphism of QD2m . Then θ1 ∼ θ2 if and only if r1 = r2 and f s1 − s2 ∈ hr1 − 1i ≤ Zn for some f ∈ Um . Proof. Given that θ1 = r1 x + s1 and θ2 = r2 x + s2 ∈ Aut(QD2m ). Suppose that σ = f x + g be any arbitrary automorphism of QD2m and define σ −1 = f −1 x − f −1 g. We will check that σ ·σ −1 = x. For this take σ ·σ −1 = σ(σ −1 (x)) = σ(f −1 x−f −1 g) = f (f −1 x − f −1 g) + g = x − g + g = x. Now, we calculate (7.1) σθ1 σ −1 = σ · (θ1 · σ −1 ) Take θ1 · σ −1 = θ1 [σ −1 (x)] = θ1 [f −1 x − f −1 g] = r1 (f −1 x − f −1 g) + s1 = r1 f −1 x − r1 f −1 g + s1 put in 7.1, we get σθ1 σ −1 = σ(r1 f −1 x − r1 f −1 g + s1 ) = f (r1 f −1 x − r1 f −1 g+s1 )+g σθ1 σ −1 = r1 x−r1 g+f s1 +g = r1 x+f s1 −g(r1 −1). Now, by definition σθ1 σ −1 = θ2 if and only if r1 = r2 and f s1 − g(r1 − 1) = s2 ⇒ f s1 − s2 = g(r1 − 1) ⇒ f s1 − s2 ∈ hr1 − 1i.  Example 7.5. Let G = QD64 and consider θ1 = 7x + 3, θ2 = 7x + 14, θ3 = 7x + 11 three automorphisms of QD64 . Then it is easy to check that θ1 ≁ θ2 because there does not exist such f ∈ U32 for which 3f − 14 ∈ h6i. And θ1 ∼ θ3 because there exist some f ∈ U32 for which 3f − 14 ∈ h6i. Proposition 7.6. Suppose m is fixed and let v ≥ 1. v (1) For any r ∈ Rm ; hr − 1i ≤ ZDiv(r v−1 + r v−2 + · · · + r + 1). v−1 +r v−2 +···+r+1) v (2) For any r ∈ Rm ; Um acts on the cosets ZDiv(r hr−1i . (3) The set Autv (QD2m ) is partitioned into equivalence classes indexed by pair v−1 +r v−2 +···+r+1) v (r, A), where r ∈ Rm and A is an orbit of Um on ZDiv(r hr−1i . Proof. (1) We know that (r − 1).(r v−1 + r v−2 + · · · + r + 1) = r v − 1 ≡ 0 (mod n) ⇒ (r − 1).(r v−1 + r v−2 + · · · + r + 1) ≡ 0 (mod n) ⇒ (r − 1) ∈ ZDiv(r v−1 + r v−2 + · · · + r + 1) ⇒ hr − 1i ≤ ZDiv(r v−1 + r v−2 + · · · + r + 1). 6 ZAHID RAZA, IMRAN AND BIJAN DAVVAZ (2) We simply recognize that Um = Aut(Zn ) acts on Zn by multiplication and since every subgroup is cyclic, Um must stabilize the subgroups of Zn . v−1 +r v−2 +···+r+1) . (3) It is simply Proposition 7.4 in terms of the Um -action on ZDiv(r hr−1i  Example 7.7. Let G = QD40 ,and v = 2. Then U20 = {1, 3, 7, 9, 11, 13, 17, 19} and Z10 = {0, 1, 2, . . . , 9}. 2 (1) Since v = 2, so R20 = {1, 9, 11, 19}. Take r = 9 then h9 − 1i = h8i = {0, 2, 4, 6, 8} and ZDiv(10) = {0, 1, 2, . . . , 9}. So, {0, 2, 4, 6, 8} ⊆ {0, 1, 2, . . . , 9} (2) For U20 action on the cosets ZDiv(r+1) . Take r = 9 then ZDiv(r+1) = ZDiv(10) = hr−1i hr−1i h8i E={0,1,2,...,9} F ={0,2,4,6,8} = x + F ∀ x ∈ E provide two sets F and F1 = {1, 3, 5, 7, 9}. Now, the action of U20 on the cosets (3) ZDiv(10) h8i has two sets. ZDiv(10) h8i = y.F = F ∀ y ∈ U20 and ZDiv(10) = y.F1 = F1 ∀ y ∈ U20 h8i ZDiv(10) The action of U20 on h8i = F, F1 . Then the number of equivalence classes 2 of Aut(QD40 ) indexed by the pair (r, A) where r ∈ R20 and A is an orbit of ZDiv(10) U20 on h8i is 8. v Theorem 7.8. If m is a fixed positive integer and r ∈ Rm , then the number v−1 v−2 ZD iv(r +r +···+r+1) of orbits of Um on is equal to the number of divisors of hr−1i gcd(r−1,n). gcd(r v−1 +r v−2 +···+r+1,n) . n Proof. The Um -orbit on Zn are indexed by the subgroups of Zn . Thus the Um -orbit v−1 +r v−2 +···+r+1) on ZDiv(r hr−1i are indexed by subgroups L ≤ Zn such that hr − 1i ≤ L ≤ ZDiv(r v−1 + r v−2 + · · · + r + 1). It is well known that the subgroup lattice of Zn is isomorphic to the divisor lattice of n. The subgroup hr − 1i corresponds to the divisor gcd(r − 1, n) and the subgroup n , ZDiv(r v−1 + r v−2 + · · · + r + 1) correspond to the divisor gcd(rv−1 +rv−2 +···+r+1,n) and the subgroups between these groups correspond to the divisor of n between n gcd(r − 1, n) and gcd(rv−1 +rv−2 in the divisor lattice. Finally, it is known +···+r+1,n) that this sub-lattice of the divisor of n is isomorphic to the divisor lattice of gcd(r − 1, n) gcd(r − 1, n). gcd(r v−1 + r v−2 + · · · + r + 1, n) = . n n gcd(r v−1 +r v−2 +···+r+1,n)  8. Fixed Ssts and Symmetric Spaces of Automorphisms In this section if θ is an automorphism the fixed-point set Hθ and the symmetric space Qθ will be discussed, where Hθ = {x ∈ G | θ(x) = x} and Qθ = {g ∈ G | g = ON THE STRUCTURE OF INVOLUTIONS AND SYMMETRIC SPACES OF QUASI DIHEDRAL GROUP 7 xθ(x)−1 for some x ∈ G}. When θ is understood to be fixed the subscript from our notation has been dropped. The following theorem characterizes the sets H and Q in the case of quasi-dihedral groups. Theorem 8.1. If θ = rx + s is an automorphism of G = QD2m of finite order, then ′ ′ H = {aj | j(r + 2s − 1) ≡ 0 (mod n)} ∪ {aj b | j (r + 2s − 1) ≡ −s (mod n)} and ′ Q = {aj | j ∈ hr + 2s − 1i ∪ [l(1 − r) − s] (mod n)} where, j and l are even numbers. Proof. Since, θ is an automorphism and θ(aj bt ) = arj+[(t−1)n−(t−2)]s bt . First we will find set the H. Let us consider aj ∈ G, then by definition of H, we have θ(aj ) = aj , θ(aj ) = a[r+(2−n)s]j = aj , ⇒ n | j(r + 2s − 1). ′ ′ ′ ′ ′ Now consider aj b ∈ G, then θ(aj b) = aj b so, aj b = a[r+(2−n)s]j as b, thus n | ′ ′ ′ (r+2s−1)j +s. Hence, H = {aj | j(r+2s−1) ≡ 0 (mod n)}∪{aj b | j (r+2s−1) ≡ ′ −s (mod n)}, where j is even number. Now we will find the set Q. L aj ∈ G be an arbitrary element and let ai be a fixed element of G, where j 6= i, then by definition of Q, aj = ai θ(ai )−1 = ai θ(a−i ) = ai .a−[r+(2−n)s]i = ai[1−r−(2−n)s] ⇒ j ≡ i[1 − (r + 2s)] (mod n) ⇒ j ∈ hr + 2s − 1i. Now consider al b ∈ G, where l is even number, then aj = (al b)θ(al b)−1 = (al b)θ(al b) = (al b)(arl+s b) = al (barl+s )b = al a(rl+s)(n−1) bb = al+(rl+s)(n−1) ⇒ j = l + (rl + s)(n − 1) ⇒ j = l[1 + r(n − 1)] + s(n − 1) ⇒ j ≡ l(1 − r) − s (mod n). So, Q = {aj | j ∈ hr + 2s − 1i ∪ [l(1 − r) − s] (mod n)}, where l is an even numbers.  Example 8.2. Let us consider G = QD64 and θ = 3x + 12 ∈ Aut(D64 ), then ′ ′ H = {aj | 10j ≡ 0 (mod 16)} ∪ {aj b | 10j ≡ −4 (mod 16)} = {1, a8 , a2 b, a10 b} and ′ Q = {aj | j ∈ h10i ∪ (14j + 4) (mod 16)} = {1, a2 , a4 , . . . , a14 } Using the descriptions of H and Q , we obtain further results as well. Corollary 8.3. If θ = rx + s is an automorphism of QD2m of finite order, where m = 4k, n = 2k and k is even, then H will be cyclic or non-cyclic according to the following conditions (1) Let gcd(r + 2s − 1, n) = d1 . If s = 2w + 1 is odd and d1 ∤ w then H will be cyclic that is H ∼ = ZDiv(r + 2s − 1) and | H |= d1 (2) Let gcd(r + 2s − 1, k) = d2 . If s = 2w is even and d2 | w then we have two cases a): If w is odd, then H will be cyclic | H |= d1 and H ∼ = ZDiv(r +2s−1). b): If w is even i): If d2 ∤ w then H will be cyclic | H |= d1 and H ∼ = ZDiv(r + 2s − 1). ii): If d2 | w then H will be non-cyclic. We have two cases 8 ZAHID RAZA, IMRAN AND BIJAN DAVVAZ k I-): if 4 ∤ k then | H |= 23 d1 H = {ha 2 i, a2l b, a2q b | l 6= q for some l, q ∈ {1, 2, ...k}}. It is not a subgroup of G. II-): if 4 | k then | H |= 2d1 and H ∼ = ZDiv(r + 2s − 1) × Z2 . Example 8.4. Let G = QD48 , then gcd(r, m) = 1 ⇒ r ∈ U24 = {1, 5, 7, 11, 13, 17, 19, 23} and s ∈ Z12 = {0, 1, 2, . . . , 11}. (1) Consider θ1 = 7x + 11 ∈ Aut(QD48 ) then r = 7, s = 2(5) + 1 = 11 ⇒ r + 2s − 1 = 4 and d1 = gcd(28, 12) = 4 ⇒ 4 ∤ 5 then H1 = {1, a3, a6 , a9 } is cyclic. and ZDiv4 = {0, 3, 6, 9} ⇒ H1 ∼ = ZDiv4 and O(H1) = d1 = 4 (2) a): Take θ2 = 11x + 10 ∈ Aut(QD48 ) then r = 11, s = 2(5) = 10 ⇒ r + 2s − 1 = 6 and d1 = gcd(6, 12) = 6, d2 = gcd(6, 6) = 6 then H2 = {1, a2 , a4 , . . . , a10 } is cyclic and ZDiv6 = {0, 2, 4, 6, 8, 10} ⇒ H2 ∼ = ZDiv6 and O(H2) = d1 = 6 b): i): For θ3 = 11x + 4 ∈ Aut(QD48 ) then r = 11, s = 2(2) = 4 ⇒ r + 2s − 1 = 6 and d1 = gcd(6, 12) = 6, d2 = gcd(6, 6) = 6 ⇒ 6 ∤ −2 then H3 = {1, a2 , a4 , . . . , a10 } is cyclic and ZDiv6 = {0, 2, 4, 6, 8, 10} ⇒ H3 ∼ = ZDiv6 and O(H3 ) = d1 = 6 ii): I-: For θ4 = 5x + 8 ∈ Aut(QD48 ) then r = 5, s = 2(4) = 8 ⇒ r + 2s − 1 = 8 and d1 = gcd(8, 12) = 4, d2 = gcd(8, 6) = 2 ⇒ 2 | −4 then H4 = {1, a3 , a6 , a9 , a2 b, a8 b} is non-cyclic and O(H4 ) = 32 .d1 = 6 II-: Take θ5 = 7x + 4 ∈ Aut(QD48 ) then r = 7, s = 2(2) = 4 ⇒ r + 2s − 1 = 2 and d1 = gcd(2, 12) = 2, d2 = gcd(2, 6) = 2 ⇒ 2 | −2 then H5 = {1, a6 , a4 b, a10 b} is non-cyclic and O(H5 ) = 2.d1 = 4 Corollary 8.5. If m = 4k, n = 2k and k is odd, then H will be cyclic or non-cyclic according to the following conditions (1) Let gcd(r + 2s − 1, n) = d1 . If s = 2w + 1 is odd then H will be cyclic | H |= d1 and H ∼ = ZDiv(r + 2s − 1). (2) Let gcd(r + 2s − 1, n) = d1 . If s = 2w is even then a): If d1 = n then H will be cyclic | H |= d1 = n and H ∼ = ZDiv(r + 2s − 1). b): If d1 = 2 then H will be non-cyclic | H |= 23 d1 = 23 (2) = 3 and H = {1, ak , a2l b} for some l ∈ {1, 2, ..., k} is not a subgroup of G. Example 8.6. Let G = QD40 where m = 20, n = 10, k = 5. Since gcd(r, m) = 1 ⇒ r ∈ U20 = {1, 3, 7, 9, 11, 13, 17, 19} and s ∈ Z10 = {0, 1, 2, . . . , 9}. (1) Consider θ1 = 3x + 5 ∈ Aut(QD40 ) then r = 3, s = 5 ⇒ r + 2s − 1 = 2 and gcd(2, 10) = 2 then H1 = {1, a5 } is cyclic and ZDiv2 = {0, 5} ⇒ H1 ∼ = ZDiv2 and | H1 |= 2 ON THE STRUCTURE OF INVOLUTIONS AND SYMMETRIC SPACES OF QUASI DIHEDRAL GROUP 9 (2) a): For θ2 = 7x + 2 ∈ Aut(QD40 ) then r = 7, s = 2 ⇒ r + 2s − 1 = 0 and gcd(0, 10) = 10 then H2 = {1, a2 , a3 , . . . , a9 } is cyclic and ZDiv0 = {0, 1, 2, . . . , 9} ⇒ H2 ∼ = ZDiv0 and | H2 |= 10 b): Take θ3 = 7x+4 ∈ Aut(QD40 ) then r = 7, s = 4 ⇒ r+2s−1 = 4 and gcd(4, 10) = 2 then H3 = {1, a5 , a4 b} is non-cyclic and | H3 |= 32 .2 = 3 Corollary 8.7. If θ = rx + s ∈ Autv (QD2m ) be of finite order, where m = 4k, n = 2k and k is even number, then Q will be cyclic or non-cyclic according to the following conditions (1) If s = 2w + 1 is odd, then Q will be non-cyclic. (2) Let gcd(r + 2s − 1, n) = d1 . If s = 2w is even, then ′ a): If d1 | (1 − r)j − s and i): if r + 2s − 1 6≡ k (mod n) then Q will be cyclic. ii): If r + 2s − 1 ≡ k (mod n) we have two cases • if 1 − r ≡ k (mod n) then Q will be cyclic. • If 1 − r 6≡ k (mod n) then Q will be non-cyclic. ′ b): If d1 ∤ (1 − r)j − s and i): if −s 6≡ k (mod n) then Q will be non-cyclic. ii): If −s ≡ k (mod n) then Q will be cyclic. Example 8.8. Let G = QD48 where m = 24, n = 12, k = 6. Since gcd(r, m) = 1 ⇒ r ∈ U24 = {1, 5, 7, 11, 13, 17, 19, 23} and s ∈ Z12 = {0, 1, 2, . . . , 11}. (1) Consider θ1 = 7x + 11 ∈ Aut(QD48 ) then r = 7, s = 11 ⇒ r + 2s − 1 = 4 then Q1 = {1, a, a4 , a8 } is non-cyclic. (2) a): i): For θ2 = 5x + 8 ∈ Aut(QD48 ) then r = 5, s = 8 ⇒ r + 2s − 1 = ′ ′ 8 6≡ k and d1 = gcd(8, 12) = 4, (1 − r)j − s = −4j − 8 at ′ j = 2 yeilds 4 | −16 then Q2 = {1, a4 , a8 } is cyclic. ii): Take θ3 = 7x + 6 ∈ Aut(QD48 ) then r = 7, s = 6 ⇒ r + 2s − 1 = ′ ′ 6 ≡ k and d1 = gcd(6, 12) = 6, (1 − r)j − s = −6j − 6 at ′ j = 2 yeilds 6 | −18 and 1 − r = −6 ≡ 6 ≡ k then Q3 = {1, a6 } is cyclic. And for θ4 = 11x + 4 ∈ Aut(QD48 ) then r = 11, s = 4 ′ ⇒ r + 2s − 1 = 6 ≡ k and d1 = gcd(6, 12) = 6, (1 − r)j − s = ′ ′ −10j − 4 at j = 2 yeilds 6 | −24 and 1 − r = −10 ≡ 2 6≡ k then Q4 = {1, a4 , a6 , a8 } is non-cyclic. b): i): Consider θ5 = x + 10 ∈ Aut(QD48 ) then r = 1, s = 10 ⇒ ′ ′ r + 2s − 1 = 8 and d1 = gcd(8, 12) = 4, (1 − r)j − s = 0j − 10 ≡ 2 ⇒ 4 ∤ 2 and −s = −10 ≡ 2 6≡ k then Q5 = {1, a2 , a4 , a8 } is non-cyclic. ii): For θ6 = 5x+ 6 ∈ Aut(QD48 ) then r = 5, s = 6 ⇒ r + 2s −1 = 4 ′ ′ ′ and d1 = gcd(4, 12) = 4, (1 − r)j − s = −4j − 6 for any j , 10 ZAHID RAZA, IMRAN AND BIJAN DAVVAZ ′ d1 ∤ −4j −6 and −s = −6 ≡ 6 ≡ k then Q6 = {1, a2 , a4 , . . . , a10 } is cyclic. Corollary 8.9. If m = 4k, n = 2k and k is odd number, then Q will be cyclic or non-cyclic according to the following conditions (1) If s = 2w is even then Q will be cyclic. (2) If s = 2w + 1 is odd a): Q will be non-cyclic if either r + 2s − 1 ≡ 0 (mod n) or 1 − r ≡ 0 (mod n). b): Q will be cyclic i): if 1 − r ≡ 0 and s ≡ k (mod n). ii): if r + 2s − 1 6≡ 0 and 1 − r 6≡ 0 (mod n). Example 8.10. Let G = QD40 where m = 20, n = 10, k = 5. Since gcd(r, m) = 1 ⇒ r ∈ U20 = {1, 3, 7, 9, 11, 13, 17, 19} and s ∈ Z10 = {0, 1, 2, . . . , 9}. (1) For θ1 = 7x + 6 ∈ Aut(QD40 ) then r = 7, s = 6 ⇒ r + 2s − 1 = 8 then Q1 = {1, a2 , a4 , a6 , a8 } is cyclic. (2) a): Take θ2 = x + 7 ∈ Aut(QD40 ) then r = 1, s = 7 ⇒ r + 2s − 1 = 4 and 1 − r = 0 then Q2 = {1, a2 , a3 , a4 , a6 , a8 } is non-cyclic. b): i): Consider θ3 = 11x + 5 ∈ Aut(QD40 ) then r = 11, s = 5 ⇒ r + 2s − 1 = 0, 1 − r = 0, s = 5 ≡ k then Q3 = {1, a5 } is cyclic. ii): For θ4 = 7x + 5 ∈ Aut(QD40 ) then r = 7, s = 5 ⇒ r + 2s − 1 = 6, 1 − r = −6 6≡ 0 then Q4 = {1, a, a2 , . . . , a9 } is cyclic. Corollary 8.11. Let θ = rx + s ∈ Autv (QD2m ) be of finite order, where m = 4k, n = 2k and k is even number. Then Q is isomorphic to a cyclic group as follows: (1) If | Q |= 2 then Q = hak : an = 1i and Q ∼ = hki. k (2) If | Q |= 2 then a): Let gcd(r + 2s − 1, n) = d1 . If n ∤ r + 2s − 1 then Q = had1 : an = 1i and Q ∼ = hd1 i. b): If n | r + 2s − 1 and gcd(r + 2s − 1, n) = n then Q = ha4 : an = 1i and Q ∼ = h4i. (3) If | Q |= k and gcd(r + 2s − 1, n) = d1 then ′ a): if (r + 2s − 1) ∩ (1 − r)j − s = ∅ then Q = had1 /2 : an = 1i and Q ∼ = h d21 i. ′ b): if (r+2s−1)∩(1−r)j −s 6= ∅ then Q = had1 : an = 1i and Q ∼ = hd1 i. Corollary 8.12. Let θ = rx + s ∈ Autv (QD2m ) be of finite order, if k is odd number. Then the conditions for Q to be cyclic and isomorphism relationship are: (1) If s is even, then ON THE STRUCTURE OF INVOLUTIONS AND SYMMETRIC SPACES OF QUASI DIHEDRAL GROUP 11 a): if r = 1, s = 0 | Q |= 1 then Q = {1} and Q ∼ = h0i. 2 n ∼ b): if | Q |= k then Q = ha : a = 1i = h2i. (2) If s is odd, then a): Let n | 1 − r, n | s − k. If | Q |= 2 then Q = hak : an = 1i ∼ = hki. b): if r + 2s − 1 6≡ 0 and 1 − r 6≡ 0 (mod n) and | Q |= n then Q = ha : an = 1i ∼ = h1i. Corollary 8.13. Let θ = rx + s ∈ Aut(QD2m ) be a fixed automorphism. Then for any H and Q, HQ = 6 QD2m . Example 8.13.1. Consider the involution θ1 = 17x + 8 of QD48 . Then H1 = {1, a3 , a6 , a9 , a2 b, a8 b} and Q1 = {1, a4 , a8 } ⇒ H1 Q1 6= QD48 . Now, consider the automorphism θ2 = 5x + 3 of order 4. Then H2 = {1, a6 b} and Q2 = {1, a2 , a4 , . . . , a10 , a, a5 , a9 } ⇒ H2 Q2 6= QD48 . Proposition 8.14. Let θ = rx + s ∈ Autv (QD2m ) and for any al ∈ Q. ′ i): If l is odd, then H\Q = {{aj } | j ∈ hr + 2s − 1i ∪ [(1 − r)j − s] (mod n)} ′ ii): If l is even then H\Q = {{aj , a−j } | j ∈ hr+2s−1i∪[(1−r)j −s] (mod n)} ′ where, j is any even number. In either case G\Q = {Q}, that is there is only a single G-orbit on Q. Proof. Since, H is fixed by θ thus the action of H on Q is simply by conjugation. Notice that Q ⊆ hai ≤ QD2m so, the action of H on general element al of Q. Let ai ∈ H then, ai .al .a−i = ai+l−i = al . So, hai fixes Q point wise. ′ ′ ′ ′ ′ ′ ′ Suppose ai b ∈ H, then (ai b).al .(ai b)−1 = ai (bal )b−1 a−i = ai (al(n−1) b)b−1 a−i = ′ ′ ′ l l ai +l(n−1)−i = al(n−1) = aln .a−l = (a2n ) 2 .a−l = (am ) 2 .a−l = a−l so, aj b takes ′ al to a−l ⇒ {aj , a−j } is an orbit ⇔ aj b ∈ H which is true ⇔ l is even. Now, for every element of Q is in G-orbit of 1 ∈ Q. Since, every element of Q are of the form al ∈ Q. and G has two type of elements ai and ai b. Now let us supposed that q1 = al = ai .θ(ai )−1 for some ai ∈ G, thus q1 = ai .θ(a−i ) = ai .a−ri+[2−n]y = ai−ri+[2−n]y = a−i(r−1)+(2−n)y = av(r−1)+(2−n)y , where v = −i. Also, al = (ai b).θ(ai b)−1 for some ai b ∈ G ⇒ al = (ai b).θ(ai b) = (ai b).(ari+y b) = i a (bari+y )b = ai .a(ri+y)(n−1) b.b = ai+(ri+y)(n−1) b2 Let us denote this element q2 = al = a−v+(y−vr)(n−1) , where v = −i. For a−v ∈ G, we have a−v .1.θ(a−v )−1 = a−v .θ(av ) = a−v .arv+(2−n)y = av(r−1)+(2−n)y = q1 . Now for a−v b ∈ G, we have (a−v b).1.θ(a−v b)−1 = (a−v b).θ(a−v b) = (a−v b).a−rv+y b = a−v (ba−rv+y )b = a−v .a(−rv+y)(n−1) b.b = a−v+(y−rv)(n−1) = q2 . Therefore, for any q ∈ Q there exist g ∈ G such that g.1.θ(g)−1 = q. Hence G\Q = {Q}, there is a single G-orbit on Q.  Example 8.14.1. Revisiting θ1 , θ2 of Example 8.13.1 applying Proposition 8.14 to obtain that for θ1 . Since all l are even, therefore H1 \Q1 = {{1}, {a4 , a−4 }, {a8, a−8 }}, 12 ZAHID RAZA, IMRAN AND BIJAN DAVVAZ for θ2 there exists even and odd powers of elements of Q. For all even powers H2 \Q2 = {{1}, {a2 , a−2 }, . . . , {a10 , a−10 }, {a, a−1 }, {a5 , a−5 }, {a9 , a−9 }} and odd powers H2 \Q2 = {{1}, {a2 }, . . . , {a10 }, {a}, {a5 }, {a9 }}. 9. Involutions in Aut(QD2m ) If θ = rx + s is an automorphism such that θ2 =id, then Proposition 7.1 gives 2 r ∈ Rm and s ∈ ZDiv(r + 1). Proposition 9.1. Suppose that m = 4pt11 pt22 , where the pi are distinct odd primes. 2 Then | Rm |= 8 Proof. Since, m = 4pt11 pt22 ⇒ n = 2pt11 pt22 . Suppose that r ∈ Zn with r 2 ≡ 1 (mod n) ∵ gcd(r, m) = 1 ⇒ gcd(r, 4pt11 pt22 ) = 1. But m is even therefore, r is odd. Assume that r = 2q + 1 for some 0 ≤ q < (n − 1). Now, r 2 = (2q + 1)2 = 4q 2 + 4q + 1 ⇒ 4q 2 +4q ≡ 0 (mod n) ⇒ 4q(q+1) = l.(2pt11 pt22 ) ∵ gcd(4, 2pt11 pt22 ) = 2 ⇒ 2q(q+1) = l.(pt11 pt22 ) (mod pt11 pt22 ). Either q or q + 1 is odd. l .pt11 pt22 ⇒ q = h.pt11 pt22 where 1 ≤ h ≤ 4. Now, (1) If q is even, then q = 2(q+1) r = 2q + 1 ⇒ r = 2h.pt11 pt22 + 1 ⇒ r ≡ 1(mod n) (2) If q + 1 is even, then q + 1 = 2ql .pt11 .pt22 ⇒ q + 1 = h.pt11 pt22 ⇒ q = h.pt11 pt22 − 1 where 1 ≤ h ≤ 4. Now, r = 2q + 1 ⇒ r = 2h.pt11 pt22 − 1 ⇒ r ≡ −1(mod n) ⇒ r ≡ ±1(mod n),  t Proposition 9.2. Suppose that m = 2α pt11 pt22 . . . pqq where the pi are distinct odd primes. Then   2q+1 α = 2 2 2q+2 α = 3 | Rm |=  q+3 2 α ≥ 4. Proof. Similar to the Propositions 10.1.  Example 9.3. Let G = QD192 , then U96 = {1, 5, 7, 11, 13, 17, 19, 23, 25, 29, 31, 35, 37, 2 41, 43, 47, 49, 53, 55, 59, 61, 65, 67, 71, 73, 77, 79, 83, 85, 89, 91, 95} and R96 = {1, 7, 17, 2 4 23, 25, 31, 41, 47, 49, 55, 65, 71, 73, 79, 89, 95} thus, | R96 |= 2 = 16 Corollary 9.4. |Aut2 (QD2m )| = X gcd(r + 1, n). r∈R2m 2 Theorem 9.5. Let r ∈ Rm , then the followings hold: (1) hr − 1i ≤ ZDiv(r + 1) iv(r+1) |≤ 2 (2) Nr =| ZDhr−1i ON THE STRUCTURE OF INVOLUTIONS AND SYMMETRIC SPACES OF QUASI DIHEDRAL GROUP 13 (3) Nr = 2 if and only if m = 2α l ; α ≥ 2, and l is odd, r ≡ ±1 (mod 2α−1 ). 2 (1) Given that r ∈ Rm , then (r − 1).(r + 1) = r 2 − 1 ≡ 0 ⇒ (r − 1) ≤ ZDiv(r + 1) ⇒ hr − 1i ≤ ZDiv(r + 1). (2) Suppose Proof. | (9.1) ZDiv(r + 1) |= j hr − 1i n It is well known that | hr − 1i |= gcd(r−1,n) and | ZDiv(r + 1) |= gcd(r + 1, n) put values in 9.1 gcd(r + 1, n) =j n gcd(r−1,n) (9.2) ⇒ gcd(r + 1, n). gcd(r − 1, n) = n.j t Now, suppose that m = 2α pt11 pt22 . . . pqq where α ≥ 2 ⇒ α − 1 ≥ 1 t ⇒ n = 2α−1 pt11 pt22 . . . pqq where pi are distinct odd primes and ti ≥ 1. Then gcd(r + 1, n) = 2α1 pa11 pa22 . . . paq q with α1 ≤ (α − 1) and 0 ≤ ai ≤ ti ∀ i and gcd(r − 1, n) = 2α2 pb11 pb22 . . . pbqq with α2 ≤ (α − 1) and 0 ≤ bi ≤ ti . Now, for all i ∈ {1, 2, . . . q} either ai = 0 or bi = 0. Indeed, if ai > 0 and bi > 0 then pi divides both (r + 1) and (r − 1) which is impossible. ∵ (pi > 2) Similarly, either α1 ≤ 1 or α2 ≤ 1. Otherwise 2min{α1 ,α2 } divides (r + 1) and (r − 1) which is impossible. Since, from 9.2 gcd(r + 1, n). gcd(r − 1, n) = n.j (2α1 pa11 pa22 . . . paq q ).(2α2 pb11 pb22 . . . pbqq ) = j.2α−1 pt11 pt22 . . . ptqq (2α1 +α2 pa11 +b1 pa22 +b2 . . . paq q +bq ) = j.2α−1 pt11 pt22 . . . ptqq Now, since ∀ i either ai = 0 or bi = 0 ⇒ ai + bi = ti t 2 (9.3) α1 +α2 = j.2 α−1 pt11 pt22 . . . pqq a +bq pa11 +b1 pa22 +b2 . . . pq q 2α1 +α2 = j.2α−1 . As α1 ≤ (α − 1) and α2 ≤ (α − 1) and since either α1 ≤ 1 or α2 ≤ 1, ⇒ (α − 1) ≤ (α1 + α2 ) ≤ α equation 9.3 ⇒ j = 2α1 +α2 −α+1 ⇒ 1 ≤ j ≤ 2. 14 ZAHID RAZA, IMRAN AND BIJAN DAVVAZ (3) By Theorem 7.8, Nr is the number of divisors of gcd(r − 1, n). gcd(r + 1, n) n and Nr is the number of divisor of j computed above. Therefore, Nr = 1 if j = 1 and Nr = 2 if j = 2. In either case, ZDiv(r + 1) | |≤ 2. hr − 1i Finally according to the proof of (2), j = 2 if and only if α1 = α − 1, α2 = 1 or α1 = 1, α2 = α − 1. If α1 = α − 1, α2 = 1 then 2α−1 divides (r + 1). If α1 = 1, α2 = α − 1 then 2α−1 divides (r − 1). ⇒ r ≡ ±1 (mod 2α−1 ).  Example 9.6. Let G = QD48 where m = 23 .3, α = 3, then 2 U24 = {1, 5, 7, 11, 13, 17, 19, 23} and R24 = {1, 5, 7, 11, 13, 17, 19, 23}. 2 (1) Let r = 5 ∈ R24 then hr − 1i = h4i = {0, 4, 8} = B1 and ZDiv(r + 1) = ZDiv6 = {0, 2, 4, 6, 8, 10} = B2 clearly, h4i ≤ ZDiv6. iv(6) = {0,2,4,6,8,10} = B2 = x + B ∀ x ∈ B (2) For r = 5, ZDh4i 1 2 {0,4,8} B1 0 + B1 = {0, 4, 8} = B1 , 2 + B1 = {2, 6, 10} = B3 4 + B1 = {4, 8, 0} = B1 , 6 + B1 = {6, 10, 2} = B3 8 + B1 = {8, 0, 4} = B1 , 10 + B1 = {10, 2, 6} = B3 = {B1 , B2 } ⇒ Nr = N5 = 2. U24 action on ZDiv6 h4i 3 (3) Since, m = 2 .3 ⇒ l = 3 > 1 is odd and r = 5 ≡ 1 (mod 22 ). Thus N5 = 2 as calculated in (2). t Corollary 9.7. Suppose that m = 2α pt11 pt22 . . . pqq , where the pi are distinct odd primes and α ≥ 2. Then the number of equivalence classes C4k of Aut2 (QD8k ) is given by  q+1 2 α=2 C4k = q+2 2 α ≥ 3. 2 Example 9.8. Let G = QD384 . Thus R192 = {1, 17, 31, 47, 49, 65, 79, 95, 97, 113, 127, 2 |= 24 . It is easy to check that the values r = 143, 145, 161, 175, 191} ⇒| R192 1, 65, 97, 161 satisfy r ≡ 1 (mod 25 ) and the values r = 31, 95, 127, 191 satisfy r ≡ −1 (mod 25 ). So, Cm =| {1, 31, 65, 95, 97, 127, 161, 191} |= 23 . Now for θ an involution, the set of twisted involutions is given in the followings porosities: ON THE STRUCTURE OF INVOLUTIONS AND SYMMETRIC SPACES OF QUASI DIHEDRAL GROUP 15 Proposition 9.9. If θ2 =id, then the set of twisted involutions is given as R = {ai | (r + 1)i ≡ −2s (mod n)} ∪ {ai b | (r − 1)i ≡ −s (mod n)} 2 Proof. Since, θ is an involution therefore, r ∈ Rm and s ∈ ZDiv(r + 1). To find the i i i −1 ri+(2−n)s set R, , let a ∈ G, then θ(a ) = (a ) ⇒ a = a−i ⇒ ri + (2 − n)s = −i ⇒ (r + 1)i + (2 − n)s = 0 ⇒ (r + 1)i ≡ −2s (mod n). Now for ai b ∈ G, we have, θ(ai b) = (ai b)−1 ⇒ ari+s b = ai b ⇒ ri + s = i ⇒ (r − 1)i ≡ −s (mod n), hence R = {ai | (r + 1)i ≡ −2s (mod n)} ∪ {ai b | (r − 1)i ≡ −s (mod n)}.  Corollary 9.10. If θ2 =id, m = 4k, n = 2k and k is even number, then Q is a subgroup of hai and the natural isomorphism ψ : hai −→ Zn gives using Theorem 8.1 and Corollary 8.7 and 8.11 (1) If | Q |= 2, then ψ(Q) = hki. (2) If | Q |= k2 then  hd1 i If n ∤ r + 2s − 1 and d1 = gcd(r + 2s − 1, n) ψ(Q) = h4i If n | r + 2s − 1 and n = gcd(r + 2s − 1, n). (3) If | Q |= k and gcd(r + 2s − 1, n) = d1 then ψ(Q) =  h d21 i If {(r + 2s − 1) ∩ [l(1 − r) − s]} = ∅ hd1 i If {(r + 2s − 1) ∩ [l(1 − r) − s]} = 6 ∅, where l is an even number. Corollary 9.11. If θ2 =id, m = 4k, n = 2k and k is even number, then Q is a subgroup of hai and the natural isomorphism ψ : hai −→ Zn gives using Theorem 8.1 and Corollary 8.9 and 8.12 (1) If s is even, then  h0i If r = 1, s = 0, | Q |= 1 ψ(Q) = h2i If | Q |= k. (2) If s is odd, then  hki | Q |= 2 If n | 1 − r and n | s − k ψ(Q) = h1i | Q |= n If n ∤ r + 2s − 1 and n ∤ 1 − r. Corollary 9.12. In any Case R 6= Q. References [1] A. Bishop, C. Cyr, J. Hutchens, C. May, N. Schwartz, and B. Turner (2013). ”On involutions and generalized symmetric spaces of dicyclic groups”. arXiv:1310.0121v1 [2] Anders Bjorner and Francesco Brenti (2005). ”Combinatorics of coxter groups” . Gradate Text in Mathematics, vol.231, Springer, New York. 16 ZAHID RAZA, IMRAN AND BIJAN DAVVAZ [3] Nicolas Bourbaki (2002). ”Lie groups and Lie algebras”. Chapter 4-6, Elements of Mathematics (Berlin), Springer-Verlag , Berlin , Translated from the (1968) French original by Andrew Pressley. [4] K. K. A. Cunningham, T. J. Edgar, A. G. Helminck, B. F. Jones, OH, R. Schwell , J.F. Vasquez. (2012). ”On the Structure of Involution and Symmetric Spaces of Dihedral Groups”. arXiv:1205.3207v1. [5] A. G. Helminck (1994). Symmetric k- varities. Proc. Sympos. Pure Math. 56, no. 1, 233-279. [6] A. G. Helminck (1988). ”Algebraic groups with a computing pair of involutions and semisimple symmetric spaces”. Adv. in Math 71 , 21-91. [7] A. G. Helminck and S.P. Wang (1993). ”On rationality properties of involutions of reductive groups”. Adv. in Math. 99, 26-96. [8] Gary L. Walls (1986). ”Automorphism groups”. Amer. Math. Monthly 93, no. 6, 459-462. Department of Mathematics, College of Sciences,University of Sharjah, UAE. E-mail address: [email protected] Department of Mathematics, National University of Computer and Emerging Sciences, Lahore, Pakistan. E-mail address: imran [email protected] Department of Mathematics, Yazd University, Yazd, Iran E-mail address: [email protected]
4math.GR
Tree-based Arithmetic and Compressed Representations of Giant Numbers Paul Tarau arXiv:1301.0114v1 [cs.PL] 1 Jan 2013 Department of Computer Science and Engineering University of North Texas e-mail: [email protected] Abstract. Can we do arithmetic in a completely different way, with a radically different data structure? Could this approach provide practical benefits, like operations on giant numbers while having an average performance similar to traditional bitstring representations? While answering these questions positively, our tree based representation described in this paper comes with a few extra benefits: it compresses giant numbers such that, for instance, the largest known prime number as well as its related perfect number are represented as trees of small sizes. The same also applies to Fermat numbers and important computations like exponentiation of two become constant time operations. At the same time, succinct representations of sparse sets, multisets and sequences become possible through bijections to our tree-represented natural numbers. 1 Introduction If extraterrestrials were to do arithmetic computations, would one assume that their numbering system should look the same? At a first thought, one might be inclined to think so, maybe with the exception of the actual symbols used to denote digits or the base of the system likely to match numbers of fingers or some other anthropocentric criteria. After some thinking about the endless diversity of the universe (or unconventional models of Peano’s axioms), one might also consider the possibility that the departure from our well-known number representations could be more significant. With more terrestrial uses in mind, one would simply ask: is it possible to do arithmetic differently, possibly including giant numbers and a radically different underlying data structure, while maintaining the same fundamentals – addition, multiplication, exponentiation, primality, Peano’s axioms behaving in the same way? Moreover, can such exotic arithmetic be as efficient as binary arithmetic, while possibly supporting massively parallel execution? We have shown in [1] that type classes and polymorphism can be used to share fundamental operations between natural numbers, finite sequences, sets and multisets. As a consequence of this line of research, we have discovered that it is possible to transport the recursion equations describing binary number arithmetics on natural numbers to various tree types. However, the representation proposed in this paper is different. It is arguably simpler, more flexible and likely to support parallel execution of operations. It also allows to easily compute average and worse case complexity bounds. We will describe it in full detail in the next sections, but for the curious reader, it is essentially a recursively self-similar run-length encoding of bijective base-2 digits. The paper is organized as follows. Section 2 describes our type class used to share generic properties of natural numbers. Section 3 describes binary arithmetic operations that are specialized in section 4 to our compressed tree representation. Section 5 describes efficient tree-representations of some important number-theoretical entities like Mersenne, Fermat and perfect numbers. Section 6 shows that sparse sets, multisets and lists have succinct tree representation. Section 7 describes generic isomorphisms between data types, centered around transformations of instances of our type class to their corresponding sets, multisets and lists. Section 8 shows interesting complexity reductions in other computations and section 9 compares the performance of our tree-representation with conventional ones. Section 10 discusses related work. Section 11 concludes the paper and discusses future work. To provide a concise view of our compressed tree data type and its operations, we will use the strongly typed functional language Haskell as a precise means to provide an executable specification. We have adopted a literate programming style, i.e. the code contained in the paper forms a self-contained Haskell module (tested with ghc 7.4.1), also available as a separate file at http: //logic.cse.unt.edu/tarau/research/2013/giant.hs . Also, a Scala package implementing the same tree-based computation is available from http: //code.google.com/p/giant-numbers/. We hope that this will encourage the reader to experiment interactively and validate the technical correctness of our claims. We mention, for the benefit of the reader unfamiliar with Haskell, that a notation like f x y stands for f (x, y), [t] represents sequences of type t and a type declaration like f :: s -> t -> u stands for a function f : s×t → u (modulo Haskell’s “currying” operation, given the isomorphism between the function spaces s × t → u and s → t → u). Our Haskell functions are always represented as sets of recursive equations guided by pattern matching, conditional to constraints (simple arithmetic relations following | and before the = symbol). Locally scoped helper functions are defined in Haskell after the where keyword, using the same equational style. The composition of functions f and g is denoted f . g. It is also customary in Haskell, when defining functions in an equational style (using =) to write f = g instead of f x = g x (“point-free” notation). The use of Haskell’s “call-by-need” evaluation allows us to work with infinite sequences, like the [0..] infinite list notation, corresponding to the set N itself. Our literate Haskell program is organized as the module Giant depending on a few packages, as follows: {-# LANGUAGE NoMonomorphismRestriction #-} -- needed to define toplevel isomorphisms module Giant where -- cabal install data-ordlist is required before importing this import Data.List.Ordered import Data.List hiding (unionBy) import System.CPUTime 2 Sharing axiomatizations with type classes Haskell’s type classes [2] are a good approximation of axiom systems as they describe properties and operations generically i.e. in terms of their action on objects of a parametric type. Haskell’s type instances approximate interpretations [3] of such axiomatizations by providing implementations of the primitive operations, with the added benefit of refining and possibly overriding derived operations with more efficient equivalents. We start by defining a type class that abstracts away properties of binary representations of natural numbers. The class N assumes only a theory of structural equality (as implemented by the class Eq in Haskell). It implements a representation-independent abstraction of natural numbers, allowing us to compare our tree representation with “ordinary” natural numbers represented as non-negative arbitrary large Integers in Haskell, as well as with a binary representation using bijective base-2 [4]. class Eq n ⇒ N n where An instance of this class is required to implement the following 6 primitive operations: e :: n o,o’,i,i’ :: n→n o_ :: n→Bool The constant function e can be seen as representing the empty sequence of binary digits. With the usual representation of natural numbers, e will be interpreted as 0. The constructors o and i can be seen as applying a function that adds a 0 or 1 digit to a binary string on {0,1}∗ . The deconstructors o’ and i’ undo these operations by removing the corresponding digit. The recognizer o detects that the constructor o is the last one applied, i.e. that the“string ends with the 0 symbol. It will be interpreted on N as a recognizer of odd numbers. This type class also endows its instances with generic implementations of the following derived operations: e_,i_ :: n→Bool e_ x = x == e i_ x = not (e_ x | | o_ x) with structural equality used implicitly in the definition of the recognizer predicate for empty sequences e and with the assumption that the domain is exhausted by the three recognizers in the definition of the recognizer i of sequences ending with 1, representing even positive numbers in bijective base 2. Successor s and predecessor s’ functions are implemented in terms of these operations as follows: s,s’ :: n→n s x | e_ x = o x s x | o_ x = i (o’ x) s x | i_ x = o (s (i’ x)) s’ x | x == o e = e s’ x | i_ x = o (i’ x) s’ x | o_ x = i (s’ (o’ x)) By looking at the code, one might notice that our generic definitions of operations mimic recognizers, constructors and destructors for bijective base-2 numbers, i.e. sequences in the language {0, 1}∗ , similar to binary numbers, except that 0 is represented as the empty sequence and left-delimiting by 1 is omitted. Proposition 1 Assuming average constant time for recognizers, constructors and destructors e ,o o,i ,i,o’,i’, successor and predecessor s and s’ are constant time, on the average. Proof. Clearly the first two rules are constant time for both s and s’ as they do not make recursive calls. To show that the third rule applies recursion a constant number of times on the average, we observe that the recursion steps are exactly given by the number of 0s or 1s that a (bijective base-2 number) ends with. As only half of them end with a 0 and another half of those end with another 0 etc. one can see that the average number of 0s is bounded by 21 + 14 + . . . = 1. The same reasoning applies to the average number of 1s a number can end with. The infinite stream of generic natural numbers is generated by iterating over the successor operation s: allFrom :: n→[n] allFrom x = iterate s x 3 Efficient arithmetic operations, generically We will first show that all fundamental arithmetic operations can be described in this abstract, representation-independent framework. This will make possible creating instances that, on top of symbolic tree representations, provide implementations of these operations with asymptotic efficiency comparable to the usual bitstring operations. We start with addition (add) and subtraction (sub): add add add add add add :: n→n→n x y | e_ x x y | e_ y x y | o_ x x y | o_ x x y | i_ x =y =x && o_ y = i (add (o’ x) (o’ y)) && i_ y = o (s (add (o’ x) (i’ y))) && o_ y = o (s (add (i’ x) (o’ y))) add x y | i_ x && i_ y = i (s (add (i’ x) (i’ y))) sub sub sub sub sub sub :: n→n→n x y | e_ y y x | o_ y y x | o_ y y x | i_ y y x | i_ y =x && o_ && i_ && o_ && i_ x x x x = = = = s’ (o (sub (o’ y) (o’ x))) s’ (s’ (o (sub (o’ y) (i’ x)))) o (sub (i’ y) (o’ x)) s’ (o (sub (i’ y) (i’ x))) It is easy to see that addition and subtraction are implemented generically, with asymptotic complexity proportional to the size of the operands. Comparison provides the expected total order of N on our type class: cmp :: n→n→Ordering cmp x y | e_ x && e_ y cmp x _ | e_ x = LT cmp _ y | e_ y = GT cmp x y | o_ x && o_ y cmp x y | i_ x && i_ y cmp x y | o_ x && i_ y down EQ = LT down r = r cmp x y | i_ x && o_ y up EQ = GT up r = r = EQ = cmp (o’ x) (o’ y) = cmp (i’ x) (i’ y) = down (cmp (o’ x) (i’ y)) where = up (cmp (i’ x) (o’ y)) where And based on it one can define the minimum min2 and maximum max2 functions as follows: min2,max2 :: n→n→n min2 x y = if LT==cmp x y then x else y max2 x y = if LT==cmp x y then y else x Next, we define multiplication: mul mul mul mul m m m :: n→n→n x _ | e_ x _ y | e_ y x y = s (m x y | e_ x x y | o_ x x y | i_ x =e =e (s’ x) (s’ y)) where =y = o (m (o’ x) y) = s (add y (o (m (i’ x) y))) as well as double of a number db and half of an even number hf, having both simple expressions: db,hf :: n→n db = s’ . o hf = s . i’ Power is defined as follows: pow :: n→n→n pow _ y | e_ y = o e pow x y | o_ y = mul x (pow (mul x x) (o’ y)) pow x y | i_ y = mul (mul x x) (pow (mul x x) (i’ y)) together with more efficient special instances, exponent of 2 (exp2) and multiplication by a power of 2 (leftshift): exp2 :: n→n exp2 x | e_ x = o e exp2 x = db (exp2 (s’ x)) leftshift :: n→n→n leftshift x y = mul (exp2 x) y Finally, division and reminder on N is a bit trickier but can be expressed generically as well: div_and_rem :: n→n→(n,n) div_and_rem x y | LT == cmp x y = (e,x) div_and_rem x y | not (e_ y) = (q,r) where (qt,rm) = divstep x y (z,r) = div_and_rem rm y q = add (exp2 qt) z divstep :: N n ⇒ n→n→(n,n) divstep n m = (q, sub n p) where q = try_to_double n m e p = mul (exp2 q) m try_to_double x y k = if (LT==cmp x y) then s’ k else try_to_double x (db y) (s k) divide,reminder :: n→n→n divide n m = fst (div_and_rem n m) reminder n m = snd (div_and_rem n m) And for the reader curious by now about how this maps to “arithmetic as usual”, here is an instance built around the (arbitrary length) Integer type, also usable as a witness on the time/space complexity of our operations. instance N Integer where e=0 o_ x = odd x o x = 2∗x+1 o’ x | odd x && x > 0 = (x-1) ‘div‘ 2 i x = 2∗x+2 i’ x | even x && x > 0 = (x-2) ‘div‘ 2 An instance mapping our abstract operations to actual constructors, follows in the form of the datatype B data B = B | O B | I B deriving (Show, Read, Eq) instance N B where e=B o=O i=I o’ (O x) = x i’ (I x) = x o_ (O _) = True o_ _ = False One can try out various operations on these instances: *Giant> mul 10 5 50 *Giant> exp2 5 32 *Giant> add (O B) (I (O B)) O (I B) 4 Computing with our compressed tree representations We will now show how our shared axiomatization framework can be implemented as a new, somewhat unusual instance, that brings the ability to do arithmetic computations with trees. First, we define the data type for our tree represented natural numbers: data T = T | V T [T] | W T [T] deriving (Eq,Show,Read) The intuition behind this “union type” is the following: – The type T corresponds to an empty sequence – the type V x xs counts the number x of o applications followed by an alternation of similar counts of i and o applications – the type W x xs counts the number x of i applications followed by an alternation of similar counts of o and i applications – the same principle is applied recursively for the counters, until the empty sequence is reached One can see this process as run-length compressed bijective base-2 numbers, represented as trees with either empty leaves or at least one branch, after applying the encoding recursively. First we define the 6 primitive operations: instance N T where e=T o T = V T [] o (V x xs) = V (s x) xs o (W x xs) = V T (x:xs) i T = W T [] i (V x xs) = W T (x:xs) i (W x xs) = W (s x) xs o’ (V T []) = T o’ (V T (x:xs)) = W x xs o’ (V x xs) = V (s’ x) xs i’ (W T []) = T i’ (W T (x:xs)) = V x xs i’ (W x xs) = W (s’ x) xs o_ (V _ _ ) = True o_ _ = False Next, we override two operations involving exponents of 2 as follows exp2 = exp2’ where exp2’ T = V T [] exp2’ x = s (V (s’ x) []) leftshift = leftshift’ where leftshift’ _ T = T leftshift’ n y | o_ y = s (vmul n (s’ y)) leftshift’ n y | i_ y = s (vmul (s n) (s’ y)) The leftshift’ operation uses an efficient implementation, specialized for the type T, of the repeated application (n times) of constructor o, over the second argument of the function vmul: vmul vmul vmul vmul T n n n y=y T = V (s’ n) [] (V y ys) = V (add (s’ n) y) ys (W y ys) = V (s’ n) (y:ys) Note that such overridings take advantage of the specific encoding, as a result of simple number theoretic observations. For instance, the operation exp2’ works in time proportional to s and s’, that can be shown to be constant on the average. The more complex leftshift’ operation observes that repeated application of the o operation, when adjusted based on being even or odd, provides an efficient implementation of multiplication with an exponent of 2. It is convenient at this point, as we target a diversity of interpretations materialized as Haskell instances, to provide a polymorphic converter between two different instances of the type class N as well as their associated lists, implemented by structural recursion over the representation to convert. The function view allows importing a wrapped object of a different instance of N, generically. view view view view :: (N a,N b)⇒a→b x | e_ x = e x | o_ x = o (view (o’ x)) x | i_ x = i (view (i’ x)) We can specialize view to provide conversions to our three data types, each denoted with the corresponding lower case letter, tt t, b and n for the usual natural numbers. t :: (N n) ⇒ n → T t = view b :: (N n) ⇒ n → B b = view n :: (N n) ⇒ n → Integer n = view One can try them out as follows: *Giant> t 42 W (V T []) [T,T,T] *Giant> b it I (I (O (I (O B)))) *Giant> n it 42 While space constraints forbid us from providing the correctness proofs of operations like exp2’ and leftshift’, we are able to illustrate their expected usage as follows: *Giant> t 5 V T [T] *Giant> exp2 it W T [V (V T []) []] *Giant> n it 32 *Giant> t 10 W (V T []) [T] *Giant> leftshift it (t 1) W T [W T [V T []]] *Giant> n it 1024 5 Efficient representation of some important number-theoretical entities Let’s first observe that Fermat, Mersenne and perfect numbers have all compact expressions with our tree representation of type T. fermat n = s (exp2 (exp2 n)) mersenne p = s’ (exp2 p) perfect p = s (V q [q]) where q = s’ (s’ p) And one can also observe that this contrasts with both the Integer representation and the bijective base-2 numbers B: *Giant> mersenne (b 127) O (O (O (O (O (O (O (O (O (O (O (O (O (O (O ... a few lines of Os and Is ))))))))))))))))))))))))))))))))))))))))) *Giant> mersenne (n 127) 170141183460469231731687303715884105727 *Giant> mersenne (t 127) V (W (V T [T]) []) [] The largest known prime number, found by the GIMP distributed computing project [5] is the 45-th Mersenne prime = 243112609 − 1. It is defined in Haskell as follows: -- its exponent prime45 = 43112609 :: Integer -- the actual Mersenne prime mersenne45 = s’ (exp2 (t p)) where p = prime45::Integer While it has a bitsize of 43112609, we have observed that its compressed tree representation using our type T is rather small: *Giant> mersenne45 V (W T [V (V T []) [],T,T,T,W T [],V T [],T,W T [],W T [],T,V T [],T,T]) [] One the other hand, displaying it with a decimal or binary representation would take millions of digits. And by folding replicated subtrees to obtain an equivalent DAG representation, one can save even more memory. Figure 1 shows this representation, involving only 6 nodes. It is interesting to note that similar compact representations can also be derived for perfect numbers. For instance, the largest known perfect number, derived from the largest known Mersenne prime as 243112609−1 (243112609 − 1), is: perfect45 = perfect (t prime45) V 0 W 1 6 0 2 3 4 7 10 5 11 8 9 V 12 13 0 V W 0 0 0 0 0 0 T Fig. 1. Largest known prime number: the 45-th Mersenne prime, represented as a DAG W 1 2 W 0 2 0 5 8 10 11 0 V 1 4 9 3 W 1 0 6 7 0 5 10 4 V 1 0 0 7 8 W 0 0 0 0 0 0 0 0 0 T Fig. 2. Largest known perfect number 1 2 3 6 9 11 12 Fig. 2 shows its DAG representation involving only 7 nodes. Similarly, the 11 largest Fermat number that has been factored so far, F11=22 + 1 is compactly represented as *Giant> fermat (t 11) V T [T,V T [W T [V T []]]] By contrast, its (bijective base-2) binary representation consists of 2048 digits. 6 Representing sparse sets, multisets and lists We will now describe bijective mappings between collection types as well as a Gödel numbering scheme putting them in bijection with natural numbers. Interestingly, natural number encodings for sparse instances of these collections will have space-efficient representations as natural numbers of type T, in contrast with bitstring or conventional Integer-based representations. The type class Collections will convert between natural numbers and lists, by using the bijection f (x, y) = 2x (2y + 1), implemented by the function c and its first and second projections c’ and c’’, inverting it. class (N n) ⇒ Collections n where c :: n→n→n c’,c’’ :: n→n c x y = mul (exp2 x) (o y) c’ x | not (e_ x) = if o_ x then e else s (c’ (hf x)) c’’ x | not (e_ x) = if o_ x then o’ x else c’’ (hf x) The bijection between natural numbers and lists of natural numbers, to list and its inverse from list apply repeatedly c and respectively c’ and c’’. to_list :: n→[n] to_list x | e_ x = [] to_list x = (c’ x) : (to_list (c’’ x)) from_list:: [n]→n from_list [] = e from_list (x:xs) = c x (from_list xs) Incremental sums are used to transform arbitrary lists to multisets and sets, inverted by pairwise differences. list2mset, mset2list, list2set, set2list :: [n]→[n] list2mset ns = tail (scanl add e ns) mset2list ms = zipWith sub ms (e:ms) list2set = (map s’) . list2mset . (map s) set2list = (map s’) . mset2list . (map s) By composing with natural number-to-list bijections, we obtain bijections to multisets and sets. to_mset, to_set :: n→[n] from_mset, from_set :: [n]→n to_mset = list2mset . to_list from_mset = from_list . mset2list to_set = list2set . to_list from_set = from_list . set2list We will add the usual instances to the type class Collections. A simple numbertheoretic observation connecting 2n and n applications of the constructor i, implemented by the function vmul, allows a shortcut that speeds up the bijection from lists to natural numbers, by overriding the functions c, c’, c’’ in instance T. instance Collections B instance Collections Integer instance Collections T where c = cons where cons n y = s (vmul n (s’ (o y))) c’ = hd where hd z | o_ z = T hd z = s x where V x _ = s’ z c’’ = tl where tl z | o_ z = o’ z tl z = f xs where V _ xs = s’ z f [] = T f (y:ys) = s (i’ (W y ys)) As the following example shows, trees of type T offer a significantly more compact representation of sparse sets. *Giant> from_set (map t [1,100,123,234]) W (V T []) [V T [T,W T [],T],T,V T [V T [],T],T,V T [W T [],T,T]] *Giant> from_set (map n [1,100,123,234]) 27606985387162255149739023449108112443629669818608757680508075841159170 *Giant> from_set (map b [1,100,123,234]) I (I (O (O (O (O (O (O (O (O (O (O (O (O (O (O (O (O (O ... ... a few lines ... ..))))))))))) Note that a similar compression occurs for sets of natural numbers with only a few elements missing, as they have the same representation size with type T as the dual of their sparse counterpart. Giant> from_set ([1,3,5]++[6..220]) 3369993333393829974333376885877453834204643052817571560137951281130 *Giant> t it W (V T []) [T,T,T,W (W T []) [T,T,T,T]] *Giant> dual it V (V T []) [T,T,T,W (W T []) [T,T,T,T]] *Giant> to_set it [T,V T [],W T [T],W T [T,W T [],T,T]] *Giant> map n it [0,1,4,220] As an application, we can define bitwise operations on our natural numbers by borrowing the corresponding ordered set operations, provided in Haskell by the package Data.List.Ordered. First we define the type class BitwiseOperations and the higher order function l op transporting a binary operation from ordered sets to natural numbers. class Collections n ⇒ BitwiseOperations n where l_op :: ([n]→[n]→[n])→n→n→n l_op op x y = from_set (op (to_set x) (to_set y)) Next we define the bitwise and, or and xor operations: l_and,l_or,l_xor,l_dif:: n→n→n l_and = l_op (isectBy cmp) l_or = l_op (unionBy cmp) l_xor = l_op (xunionBy cmp) l_dif = l_op (minusBy cmp) More complex operations like the ternary if-the-else can be defined as a combination of binary operations: l_ite l_ite ite c e :: n→n→n→n x y z = from_set (ite (to_set x) (to_set y) (to_set z)) where d a b = xunionBy cmp e b where = xunionBy cmp a b = isectBy cmp c d Finally, bitwise negation (requiring additional parameter l defining the bitlength of the operand) can be defined using set complement with respect to 2l − 1, corresponding to the set of all elements up to l. l_not :: Integer→n→n l_not l x | xl ≤ l = from_set (minusBy cmp ms xs) where xs = to_set x xl = genericLength xs ms = genericTake l (allFrom e) We will next generalize the iso-functor mechanism implemented generically by l op that transports operations back an forth between data types as a special data type, consisting of two higher order functions inverse to each other. 7 Isomorphisms between data types, generically Along the lines of [6] we can define isomorphisms between data types as follows: data Iso a b = Iso (a→b) (b→a) from (Iso f _) = f to (Iso _ f’) = f’ Morphing between data types as well as “lending” operations from one to another is provided by the combinators as, land1 and land2: as that this x = to that (from this x) lend1 op1 (Iso f f’) x = f’ (op1 (f x)) lend2 op2 (Iso f f’) x y = f’ (op2 (f x) (f y)) Assuming that the Haskell option NoMonomorphismRestriction is set on, we can now define generically “virtual types” centered around type class N: nat = Iso id id list = Iso from_list to_list mset = Iso from_mset to_mset set = Iso from_set to_set This results in a small “embedded language” that morphs between various instances of type class N and their corresponding list, multiset and set types, as follows: *Giant> as set nat 1234 [1,4,6,7,10] *Giant> map t it [V T [],W T [T],W (V T []) [],V (W T []) [],W (V T []) [T]] *Giant> as nat set it W (V T []) [V T [],T,T,V T [],V T []] *Giant> n it 1234 *Giant> lend1 s set [0,2,3] [1,2,3] *Giant> lend2 add set [0,2,3] [4,5] [0,2,3,4,5] 8 Complexity reduction in other computations A number of other, somewhat more common computations also benefit from our data representations. The type class SpecialComputations groups them together and provides their bitstring inspired generic implementations. The function dual flips o and i operations for a natural number seen as written in bijective base 2. class Collections dual :: n→n dual x | e_ x = dual x | o_ x = dual x | i_ x = n ⇒ SpecialComputations n where e i (dual (o’ x)) o (dual (i’ x)) The function bitsize computes the number of applications of the o and i operations: bitsize bitsize bitsize bitsize :: n→n x | e_ x = e x | o_ x = s (bitsize (o’ x)) x | i_ x = s (bitsize (i’ x)) The function repsize computes the representation size, which defaults to the bit-size in bijective base 2: -- representation size - defaults to bitsize repsize :: n→n repsize = bitsize The functions decons and cons provide bijections between N−{0} and N×N and can be used as an alternative mechanism for building bijections between lists, multisets and sets of natural numbers and natural numbers. They are based on separating o and i applications that build up a natural number represented in bijective base 2. decons ::n→(n,n) cons :: (n,n)→n decons z | o_ z = (x,y) where x0 = s’ (ocount z) y = otrim z x = if e_ y then (s’.o) x0 else x0 decons z | i_ z = (x,y) where x0 = s’ (icount z) y = itrim z x = if e_ y then (s’.i) x0 else x0 cons cons cons cons cons (x,y) (x,y) (x,y) (x,y) (x,y) | | | | | e_ o_ i_ o_ i_ x x x y y && e_ y = s e && e_ y = itimes (s (i’ (s x))) e && e_ y = otimes (s (o’ (s x))) e = itimes (s x) y = otimes (s x) y Implementing decons and cons requires counting the number of applications of o and i provided by ocount and icount, as well trimming the applications of o and i, performed by otrim and itrim. ocount,icount,otrim,itrim :: n→n ocount x | o_ x = s (ocount (o’ x)) ocount _ = e icount x | i_ x = s (icount (i’ x)) icount _ = e otrim x | o_ x = otrim (o’ x) otrim x = x itrim x | i_ x = itrim (i’ x) itrim x = x otimes,itimes :: n→n→n otimes x y | e_ x = y otimes x y = otimes (s’ x) (o y) itimes x y | e_ x = y itimes x y = itimes (s’ x) (i y) An alternative bijection between natural numbers and lists of natural numbers, to list’ and its inverse from list’ is obtained by applying repeatedly cons and respectively decons. to_list’ :: n→[n] to_list’ x | e_ x = [] to_list’ x = hd : (to_list’ tl) where (hd,tl)=decons x from_list’ :: [n]→n from_list’ [] = e from_list’ (x:xs) = cons (x,from_list’ xs) One can observe the significant reduction of asymptotic complexity with respect to the default operations provided by the type class SpecialComputations when overriding with tbitsize and tdual in instance T. instance SpecialComputations Integer instance SpecialComputations B instance SpecialComputations T where bitsize = tbitsize where tbitsize T = T tbitsize (V x xs) = s (foldr add1 x xs) tbitsize (W x xs) = s (foldr add1 x xs) add1 x y = s (add x y) dual = tdual where tdual T = T tdual (V x xs) = W x xs tdual (W x xs) = V x xs repsize = tsize where tsize T = T tsize (V x xs) = s (foldr add T (map tsize (x:xs))) tsize (W x xs) = s (foldr add T (map tsize (x:xs))) The replacement with special purpose code for the cons / decons functions is even more significant: decons decons decons decons cons cons cons cons cons (V (V (W (W x x x x []) = ((s’.o) x,T) (y:ys)) = (x,W y ys) []) = ((s’.i) x,T) (y:ys)) = (x,V y ys) (T,T) = V T [] (x,T) | o_ x = (x,T) | i_ x = (x,V y ys) = W (x,W y ys) = V W (i’ (s x)) [] V (o’ (s x)) [] x (y:ys) x (y:ys) One can also see that their complexity is now proportional to s and s’ given that the V and W operations perform in constant time the work of otimes and itimes. The following example illustrates their work: *Giant> map to_list’ [0..20] [[],[0],[1],[2],[0,0],[0,1],[3],[4],[0,2],[0,0,0],[1,0],[1,1], [0,0,1],[0,3],[5],[6],[0,4],[0,0,2],[1,2],[1,0,0],[0,0,0,0]] *Giant> map from_list’ it [0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20] Note the shorter lists created close to powers of 2, coming from the longer sequences of consecutive o and im operations in that region. 9 A performance comparison Our performance measurements (run on a Mac Air with 8GB of memory and an Intel i7 processor) serve two objectives: 1. to show that, on the average, our tree based representations perform on a blend of arithmetic computations within a small constant factor compared with conventional bitstring-based computations 2. to show that on interesting special computations they outperform the conventional ones due to the much lower asymptotic complexity of such operations on data type T. Objective 1 is served by the Ackerman function that exercises the successor and predecessor functions quite heavily, the prime generation and the LucasLehmer primality test for Mersenne numbers that exercise a blend of arithmetic operations. Objective 2 is served by the other benchmarks that take advantage of the overriding by instance T of operations like exp2 and bitsize, as well as the compressed representation of large numbers like the 45-th Mersenne prime and perfect numbers. In some cases the conventional representations are unable to Benchmark Integer binary type B tree type T Ackermann 3 7 9418 7392 12313 exp2 (exp2 14) 23 315 0 sparse set encoding 7560 2979 45 bitsize of Mersenne 45 ? ? 0 bitsize of Perfect 45 ? ? 2 generating primes 2722 2567 3591 Mersenne prime tests 6925 6431 15037 Fig. 3. Time (in ms.) on a few benchmarks run these benchmarks within existing computer memory and CPU-power limitations (marked with ? in the comparison table of Fig. 3). In other cases, like in the sparse set encoding benchmark, data type T performs significantly faster than binary representations. Together they indicate that our tree-based representations are likely to be competitive with existing bitstring-based packages on typical computations and significantly outperform them on some number-theoretically interesting computations. While the code of the benchmarks is omitted due to space constraints, it is part of the companion Haskell file at http://logic.cse.unt.edu/tarau/ Research/2013/giant.hs. 10 Related work We will briefly describe here some related work that has inspired and facilitated this line of research and will help to put our past contributions and planned developments in context. Several notations for very large numbers have been invented in the past. Examples include Knuth’s arrow-up notation [7] covering operations like the tetration (a notation for towers of exponents). In contrast to our tree-based natural numbers, such notations are not closed under addition and multiplication, and consequently they cannot be used as a replacement for ordinary binary or decimal numbers. The first instance of a hereditary number system, at our best knowledge, occurs in the proof of Goodstein’s theorem [8], where replacement of finite numbers on a tree’s branches by the ordinal ω allows him to prove that a “hailstone sequence” visiting arbitrarily large numbers eventually turns around and terminates. Numeration systems on regular languages have been studied recently, e.g. in [9] and specific instances of them are also known as bijective base-k numbers [4]. Arithmetic packages similar to our bijective base-2 view of arithmetic operations are part of libraries of proof assistants like Coq [10] and the corresponding regular languages have been used as a basis of decidable arithmetic systems like (W)S1S [11] and (W)S2S [12]. Arithmetic computations based on recursive data types like the free magma of binary trees (isomorphic to the context-free language of balanced parentheses) are described in [13] and [14], where they are seen as Gödel’s System T types, as well as combinator application trees. In [1] a type class mechanism is used to express computations on hereditarily finite sets and hereditarily finite functions. An emulation of Peano and conventional binary arithmetic operations in Prolog, is described in [15]. Their approach is similar as far as a symbolic representation is used. The key difference with our work is that our operations work on tree structures, and as such, they are not based on previously known algorithms. Arithmetic computations with types expressed as C++ templates are described in [16] and in online articles by Oleg Kiselyov using Haskell’s type inference mechanism. However, the algorithm described there is basically the same as [15], focusing on Peano and binary arithmetics. Efficient representation of sparse sets are usually based on a dedicated data structure [17] and they cannot be at the same time used for arithmetic computations as it is the case with our tree-based encoding. In [18] integer decision diagrams are introduced providing a compressed representation for sparse integers, sets and various other data types. However likewise [13] and [1], and by contrast to those proposed in this paper, they do not compress dense sets or numbers. Ranking functions (bijections between data types and natural numbers) can be traced back to Gödel numberings [19] associated to formulae. Together with their inverse unranking functions they are also used in combinatorial generation algorithms [20,21]. As a fresh look at the topic, we mention recent work in the context of functional programming on connecting heterogeneous data types through bijective mappings and natural number encodings [22,23,24]. 11 Conclusion and future work We have seen that the average performance of arithmetic computations with trees of type T is comparable, up to small constant factors, to computations performed with the binary data type B and it outperforms them by an arbitrarily large margin on the interesting special cases favoring the tree representations. Still, does that mean that such binary trees can be used as a basis for a practical arbitrary integers package? Native arbitrary length integer libraries like GMP or BigInteger take advantage of fast arithmetic on 64 bit words. To match their performance, we plan to switch between bitstring representations for numbers fitting in a machine word and a a tree representation for numbers not fitting in a machine word. We have shown that some interesting number-theoretical entities like Mersenne, Fermat and perfect numbers have significantly more compact representations with our tree-based numbers. One may observe their common feature: they are all represented in terms of exponents of 2, successor/predecessor and specialized multiplication operations. The fundamental theoretical challenge raised at this point is the following: can other number-theoretically interesting operations, with possible applications to cryptography be also expressed succinctly in terms of our tree-based data type? Is it possible to reduce the complexity of some other important operations, besides those found so far? The methodology to be used relies on two key components, that have been proven successful so far, in discovering succinct representations for Mersenne, Fermat and perfect numbers, as well as low complexity algorithms for operations like bitsize and exp2: – partial evaluation of functional programs with respect to known data types and operations on them, as well as the use of other program transformations – salient number-theoretical observations, provable by induction, that relate operations on our tree data types to known identities and number-theoretical algorithms References 1. Tarau, P.: Declarative modeling of finite mathematics. In: PPDP ’10: Proceedings of the 12th international ACM SIGPLAN symposium on Principles and practice of declarative programming, New York, NY, USA, ACM (2010) 131–142 2. Wadler, P., Blott, S.: How to make ad-hoc polymorphism less ad-hoc. In: POPL. (1989) 60–76 3. Kaye, R., Wong, T.L.: On Interpretations of Arithmetic and Set Theory. Notre Dame J. Formal Logic Volume 48(4) (2007) 497–510 4. Wikipedia: Bijective numeration — wikipedia, the free encyclopedia (2012) [Online; accessed 2-June-2012]. 5. Wikipedia: Great internet mersenne prime search — wikipedia, the free encyclopedia (2012) [Online; accessed 9-December-2012]. 6. Tarau, P.: “Everything Is Everything” Revisited: Shapeshifting Data Types with Isomorphisms and Hylomorphisms. Complex Systems (18) (2010) 475–493 7. Knuth, D.E.: Mathematics and Computer Science: Coping with Finiteness. Science 194(4271) (1976) 1235 –1242 8. Goodstein, R.: On the restricted ordinal theorem. Journal of Symbolic Logic (9) (1944) 33–41 9. Rigo, M.: Numeration systems on a regular language: arithmetic operations, recognizability and formal power series. Theoretical Computer Science 269(12) (2001) 469 – 498 10. The Coq development team: The Coq proof assistant reference manual. LogiCal Project. (2004) Version 8.0. 11. Büchi, J.R.: On a decision method in restricted second order arithmetic. International Congress on Logic, Method, and Philosophy of Science 141 (1962) 1–12 12. Rabin, M.O.: Decidability of second-order theories and automata on infinite trees. Transactions of the American Mathematical Society 141 (1969) 1–35 13. Tarau, P., Haraburda, D.: On Computing with Types. In: Proceedings of SAC’12, ACM Symposium on Applied Computing, PL track, Riva del Garda (Trento), Italy (March 2012) 1889–1896 14. Tarau, P.: Declarative Specification of Tree-based Symbolic Arithmetic Computations. In Russo, C., Zhou, N.F., eds.: Proceedings of PADL’2012, Practical Aspects of Declarative Languages, Philadelphia, PA, Springer, LNCS7149 (January 2012) 273–289 15. Kiselyov, O., Byrd, W.E., Friedman, D.P., Shan, C.c.: Pure, declarative, and constructive arithmetic relations (declarative pearl). In: FLOPS. (2008) 64–80 16. Kiselyov, O.: Type arithmetics: Computation based on the theory of types. CoRR cs.CL/0104010 (2001) 17. Briggs, P., Torczon, L.: An efficient representation for sparse sets. ACM Letters on Programming Languages and Systems 2 (1993) 59–69 18. Vuillemin, J.: Efficient Data Structure and Algorithms for Sparse Integers, Sets and Predicates. In: Computer Arithmetic, 2009. ARITH 2009. 19th IEEE Symposium on. (june 2009) 7 –14 19. Gödel, K.: Über formal unentscheidbare Sätze der Principia Mathematica und verwandter Systeme I. Monatshefte für Mathematik und Physik 38 (1931) 173– 198 20. Martinez, C., Molinero, X.: Generic algorithms for the generation of combinatorial objects. In Rovan, B., Vojtas, P., eds.: MFCS. Volume 2747 of Lecture Notes in Computer Science., Berlin Heidelberg, Springer (2003) 572–581 21. Knuth, D.: The Art of Computer Programming, Volume 4, draft (2006) http://www-cs-faculty.stanford.edu/∼knuth/taocp.html. 22. Vytiniotis, D., Kennedy, A.: Functional Pearl: Every Bit Counts. ICFP 2010 : The 15th ACM SIGPLAN International Conference on Functional Programming (September 2010) ACM Press. 23. Kobayashi, N., Matsuda, K., Shinohara, A.: Functional Programs as Compressed Data. ACM SIGPLAN 2012 Workshop on Partial Evaluation and Program Manipulation (January 2012) ACM Press. 24. Tarau, P.: A Unified Formal Description of Arithmetic and Set Theoretical Data Types. In Auxtier, S., ed.: Intelligent Computer Mathematics, 17th Symposium, Calculemus 2010, 9th International Conference AISC/Calculemus/MKM 2010, Paris, Springer, LNAI 6167 (July 2010) 247–261 Appendix This appendix contains some additional code, used for testing and benchmarking our functions, grouped in the type class Benchmarks. First we define a prime number generator working with all our instances. class SpecialComputations n ⇒ Benchmarks n where primes :: [n] primes = s (s e) : filter is_prime (odds_from (s (s (s e)))) where odds_from x = x : odds_from (s (s x)) is_prime p = [p]==to_primes p to_primes n = to_factors n p ps where (p:ps) = primes to_factors to_factors (q,r) = to_factors n p ps | cmp (mul p p) n == GT = [n] n p ps | e_ r = p : to_factors q p ps where div_and_rem n p n p (hd:tl) = to_factors n hd tl Next we define the Lucas-Lehmer fast primality test for Mersenne numbers: lucas_lehmer :: n → Bool lucas_lehmer p = e_ y where p_2 = s’ (s’ p) four = i (o e) m = exp2 p m’ = s’ m y = f p_2 four f k n | e_ k = n f k n = r where x = f (s’ k) n y = s’ (s’ (mul x x)) --r = reminder y m’ r = fastmod y m -- fast computation of k mod 2^p-1 fastmod k m | k == s’ m = e fastmod k m | LT == cmp k m = k fastmod k m = fastmod (add q r) m where (q,r) = div_and_rem k m -- exponents leading to Mersenne primes mersenne_prime_exps :: [n] mersenne_prime_exps = filter lucas_lehmer primes -- actual Mersenne primes mersenne_primes :: [n] mersenne_primes = map f mersenne_prime_exps where f p = s’ (exp2 p) The Ackerman function is a good benchmark for successor and predecessor operations: ack ack ack ack :: n→n→n x n | e_ x = s n m1 x | e_ x = ack (s’ m1) (s e) m1 n1 = ack (s’ m1) (ack m1 (s’ n1)) Next we define a variant of the 3x+1 problem / Collatz conjecture / Syracuse function (see http://en.wikipedia.org/wiki/Collatz_conjecture) that, some- what surprisingly, can be expressed as a mix of arithmetic operations and reflected list operations, to test the relative performance of some of our instances. It is easy to show that the Collatz conjecture is true iff the function nsyr, implementing the n-th iterate of the Syracuse function, always terminates: syracuse :: n→n -- n→c’’ (3n+2) syracuse n = c’’ (add n (i n)) nsyr :: n→[n] nsyr n | e_ n = [e] nsyr n = n : nsyr (syracuse n) Finally we close our type class with the usual instance declarations: instance Benchmarks Integer instance Benchmarks B instance Benchmarks T The following example illustrates the first 8 sequences of the Syracuse function: *Giant> map nsyr [0..7] [[0],[1,2,0],[2,0],[3,5,8,6,2,0],[4,3,5,8,6,2,0], [5,8,6,2,0],[6,2,0],[7,11,17,26,2,0]] Our generic benchmark function measures the CPU time for running a no argument toplevel function f received as a parameter. benchmark mes f = do x←getCPUTime print f y←getCPUTime let time=(y-x) ‘div‘ 1000000000 return (mes++" :time="++(show time)) The following benchmarks provide the code used in the section 9. bm1t = benchmark "ack 3 7 on t" (ack (t (toInteger 3)) (t (toInteger 7))) bm1b = benchmark "ack 3 7 on b" (ack (b (toInteger 3)) (b (toInteger 7))) bm1n = benchmark "ack 3 7 on n" (ack (n (toInteger 3)) (n (toInteger 7))) bm2t = benchmark "exp2 t" (exp2 (exp2 (t (toInteger 14)))) bm2b = benchmark "exp2 b" (exp2 (exp2 (b (toInteger 14)))) bm2n = benchmark "exp2 n" (exp2 (exp2 (n (toInteger 14)))) bm3 tvar = benchmark "sparse_set on a type" (n (bitsize (from_set ps))) where ps = map tvar [101,2002..100000] bm4t =benchmark "bitsize of Mersenne 45" (n (bitsize mersenne45)) bm5t = benchmark "bitsize of Perfect 45" (n (bitsize perfect45)) bm6t = benchmark "large leftshift" (leftshift n n) where n = t prime45 bm3’ tvar m = benchmark "to/from list on a type" (n (bitsize (from_list (to_list (from_list ps))))) where ps = map tvar [101,2002..3000+m] bm3’’ tvar m = benchmark "to/from list on a type" (n (bitsize (from_list (to_list (from_list ps))))) where ps = map (dual.tvar) [101,2002..3000+m] bm7t = benchmark "primes on t" (last (take 100 ps)) where ps = primes :: [T] bm7b = benchmark "primes on b" (last (take 100 ps)) where ps = primes :: [B] bm7n = benchmark "primes on n" (last (take 100 ps)) where ps = primes :: [Integer] bm8t = benchmark "mersenne (last (take 7 ps)) where bm8b = benchmark "mersenne (last (take 7 ps)) where bm8n = benchmark "mersenne (last (take 7 ps)) where on ps on ps on ps t" = mersenne_primes :: [T] b" = mersenne_primes :: [B] n" = mersenne_primes :: [Integer] The following tests the syracuse / Collatz conjecture up to m test_syr tvar m = maximum (map length (map (nsyr . tvar) [0..m])) compress_syr tvar m = r where nss = map (nsyr . tvar) [0..m] r = maximum (map (n.bitsize) (map from_list nss)) -- overflows for m>2 except for tvar=t compress_syr_twice tvar m = r where nss = map (nsyr . tvar) [0..m] r = (n.bitsize) (from_list (map from_list nss)) bm9 tvar = benchmark "test syracuse" (test_syr tvar 2000) bm10 tvar = benchmark "compress syracuse" (compress_syr tvar 100) bm11 tvar = benchmark "compress syracuse_twice" r where r = compress_syr_twice tvar 20 The following function computes the size of a tree-represented natural number: tsize T = 1 tsize (V x xs) = 1+ sum (map tsize (x:xs)) tsize (W x xs) = 1+ sum (map tsize (x:xs)) The function kth computes the k-th iteration of a function application. kth _ k x | e_ k = x kth f k x = f (kth f (s’ k) x) The following assertions are used for testing some of our operations: -- relation between iterations of o,i and power of 2 a1 k = pow (i e) k == s (kth o k e) a2 k = pow (i e) k == s (s (kth i (s’ k) e)) -a3 m u v relations between power operations and multiplication n b = (u==v,u,v) where = pow (i e) n = kth o n b = s’ (mul m (s b)) a4 x y = (a==b,a,b) where a = mul (pow (i e) x) y b = s (kth o x (s’ y))
6cs.PL
arXiv:cs/0405097v1 [cs.LO] 26 May 2004 A Coalgebraic Approach to Kleene Algebra with Tests∗ Riccardo Pucella Cornell University Ithaca, NY 14853 [email protected] Hubie Chen Cornell University Ithaca, NY 14853 [email protected] Abstract Kleene algebra with tests is an extension of Kleene algebra, the algebra of regular expressions, which can be used to reason about programs. We develop a coalgebraic theory of Kleene algebra with Tests, along the lines of the coalgebraic theory of regular expressions based on deterministic automata. Since the known automata-theoretic presentation of Kleene algebra with tests does not lend itself to a coalgebraic theory, we define a new interpretation of Kleene algebra with tests expressions and a corresponding automata-theoretic presentation. One outcome of the theory is a coinductive proof principle, that can be used to establish equivalence of our Kleene algebra with tests expressions. 1 Introduction Kleene algebra (KA) is the algebra of regular expressions [Conway 1971; Kleene 1956]. As is well known, the theory of regular expressions enjoys a strong connection with the theory of finite-state automata. This connection was used by Rutten [1998] to give a coalgebraic treatment of regular expressions. One of the fruits of this coalgebraic treatment is coinduction, a proof technique for demonstrating the equivalence of regular expressions [Rutten 2000]. Other methods for proving the equality of regular expressions have previously been established—for instance, reasoning by using a sound and complete axiomatization [Kozen 1994; Salomaa 1966], or by minimization of automata representing the expressions [Hopcroft and Ullman 1979]. However, the coinduction proof technique can give relatively short proofs, and is fairly simple to apply. Recently, Kozen [1997] introduced Kleene algebra with tests (KAT), an extension of KA designed for the particular purpose of reasoning about programs and their properties. The regular expressions of KAT allow one to intersperse boolean tests along with program actions, permitting the convenient modelling of programming constructs such as conditionals and while loops. The utility of KAT is evidenced by the fact that it subsumes propositional Hoare logic, providing a complete deductive system for Hoare-style inference rules for partial correctness assertions [Kozen 1999]. The goal of this paper is to develop a coalgebraic theory of KAT, paralleling the coalgebraic treatment of KA. Our coalgebraic theory yields a coinductive proof principle for demonstrating the equality of KAT expressions, in analogy to the coinductive proof principle for regular expressions. ∗ This paper is essentially the same as one that will appear in Theoretical Computer Science. A preliminary version appeared in the Proceedings of the Sixth International Workshop on Coalgebraic Methods in Computer Science, Electronic Notes in Theoretical Computer Science, Volume 82.1, 2003. 1 The development of our coalgebraic theory proceeds as follows. We first introduce a form of deterministic automaton and define the language accepted by such an automaton. Next, we develop the theory of such automata, showing that coinduction can be applied to the class of languages representable by our automata. We then give a class of expressions, which play the same role as the regular expressions in classical automata theory, and fairly simple rules for computing derivatives of these expressions. The difficulty of our endeavor is that the known automata-theoretic presentation of KAT [Kozen 2003] does not lend itself to a coalgebraic theory. Moreover, the notion of derivative, essential to the coinduction proof principle in this context, is not readily definable for KAT expressions as they are defined by Kozen [1997]. Roughly, these difficulties arise from tests being commutative and idempotent, and suggest that tests need to be handled in a special way. In order for the coalgebraic theory to interact smoothly with tests, we introduce a type system along with new notions of strings, languages, automata, and expressions, which we call mixed strings, mixed languages, mixed automata, and mixed expressions, respectively. (We note that none of these new notions coincide with those already developed in the theory of KAT.) All well-formed instances of these notions can be assigned types by our type system. Our type system is inspired by the type system devised by Kozen [1998, 2002] for KA and KAT, but is designed to address different issues. This paper is structured as follows. In the next section, we introduce mixed strings and mixed languages, which will be used to interpret our mixed expressions. In Section 3, we define a notion of mixed automaton that is used to accept mixed languages. We then impose a coalgebraic structure on such automata. In Section 4, we introduce a sufficient condition for proving equivalence that is more convenient than the condition that we derive in Section 3. In Section 5, we introduce our type system for KAT, and connect typed KAT expressions with the mixed language they accept. In Section 6, we give an example of how to use the coalgebraic theory, via the coinductive proof principle, to establish equivalence of typed KAT expressions. In Section 7, we show that our technique is complete, that is, it can establish the equivalence of any two typed KAT expressions that are in fact equivalent. We conclude in Section 8 with considerations of future work. 2 Mixed Languages In this section, we define the notions of mixed strings and mixed languages that we will use throughout the paper. Mixed strings are a variant of the guarded strings introduced by Kaplan [1969] as an abstract interpretation for program schemes; sets of guarded strings were used by Kozen [2003] as canonical models for Kleene algebra with tests. Roughly speaking, a guarded string can be understood as a computation where atomic actions are executed amidst the checking of conditions, in the form of boolean tests. Mixed strings will be used as an interpretation for the mixed expressions we introduce in Section 5. Mixed strings are defined over two alphabets: a set of primitive programs (denoted P) and a set of primitive tests (denoted B). We allow P to be infinite, but require that B be finite. (We will see in Section 3 where this finiteness assumption comes in. Intuitively, this is because our automata will process each primitive test individually.) Primitive tests can be put together to form more complicated tests. A literal l is a primitive test b ∈ B or its negation b; the underlying primitive test b is said to be the base of the literal, and is denoted by base(l). When A is a subset of B, lit(A) denotes the set of all literals over A. A test is a nonempty set of literals with distinct bases. 2 Intuitively, a test can be understood as the conjunction of the literals it comprises. The base of a test t, denoted by base(t), is defined to be the set {base(l) : l ∈ t}, in other words, the primitive tests the test t is made up from. We extend the notion of base to primitive programs, by defining the base of a primitive program p ∈ P as ∅. Example 2.1: Let P = {p, q}, and B = {b, c, d}. The literals lit(B) of B are {b, b, c, c, d, d}. Tests include {b, c, d} and {b, d}, but {b, b, c} is not a test, as b and b have the same base b. The base of {b, c, d} is {b, c, d}. Primitive programs and tests are used to create mixed strings. A mixed string is either the empty string, denoted by ǫ, or a sequence σ = a1 . . . an (where n ≥ 1) with the following properties: (1) each ai is either a test or primitive program, (2) for i = 1, . . . , n − 1, if ai is a test, then ai+1 is a primitive program, (3) for i = 1, . . . , n − 1, if ai is a primitive program, then ai+1 is a test, and (4) for i = 2, . . . , n − 1, if ai is a test, then base(ai ) = B. Hence, a mixed string is an alternating sequence of primitive programs and tests, where each test in the sequence is a “complete” test, except possibly if it occurs as the first or the last element of the sequence. This allows us to manipulate mixed strings on a finer level of granularity; we can remove literals from the beginning of a mixed strings and still obtain a mixed string. The length of the empty mixed string ǫ is 0, while the length of a mixed string a1 . . . an is n. Example 2.2: Let P = {p, q}, and B = {b, c, d}. Mixed strings include ǫ (of length 0), {b} and p (both of length 1), and {b}p{b, c, d}q{d} (of length 5). The sequence {b}p{b, d}q{d} is not a mixed string, since base({b, d}) 6= B. We define the concatenation of two mixed strings σ and σ ′ , denoted by σ · σ ′ , as follows. If one of σ, σ ′ is the empty string, then their concatenation is the other string. If both σ = a1 . . . an and σ ′ = b1 . . . bm have non-zero length, their concatenation is defined as: (1) τ = a1 . . . an b1 . . . bm if exactly one of an , b1 is a primitive program and τ is a mixed string; (2) τ = a1 . . . an−1 (an ∪ b1 )b2 . . . bm if an and b1 are tests such that base(an ) ∩ base(b1 ) = ∅ and τ is a mixed string; and is (3) undefined otherwise. Intuitively, concatenation of the two strings is obtained by concatenating the sequence of string elements, possibly by combining the last test of the first string with the first test of the second string, provided that the result is a valid mixed string. We note that concatenation of strings is an associative operation. Example 2.3: Let P = {p, q}, and B = {b, c, d}. The concatenation of the mixed strings p and {b, c, d}q is p{b, c, d}q. Similarly, the concatenation of the mixed strings {b}p{b, c} and {d}q{d} is the mixed string {b}p{b, c, d}q{d}. However, the concatenation of {b}p{b, c} and {b, d}q is not defined, as {b, c} ∩ {b, d} = 6 ∅. The concatenation of {b}p{b, c} and q is also not defined, as base({b, c}) 6= B, and thus {b}p{b, c}q is not a mixed string. 3 We assign one or more types to mixed strings in the following way. A type is of the form A → B, where A and B are subsets of B. Intuitively, a mixed string has type A → B if the first element of the string has base A, and it can be concatenated with an element with base B. It will be the case that a mixed string of type A → B can be concatenated with a mixed string of type B → C to obtain a mixed string of type A → C. The mixed string ǫ has many types, namely it has type A → A, for all A ∈ ℘(B). A mixed string of length 1 consisting of a single test t has type base(t) ∪ A → A, for any A ∈ ℘(B) such that A ∩ base(t) = ∅. A mixed string of length 1 consisting of a single program p has type ∅ → B. A mixed string a1 . . . an of length n > 1 has type base(a1 ) → B \ base(an ). Example 2.4: Let P = {p, q}, and B = {b, c, d}. The mixed string p{b, c, d} has type ∅ → ∅. The mixed string {d}p has type {d} → B. The mixed string {b}p{b, c, d}q{b, c} has type {b} → {d}. The concatenation of {b}p{b, c, d}q{b, c} and {d}p, namely {b}p{b, c, d}q{b, c, d}p, has type {b} → B. A mixed language is a set of mixed strings, and is typeable, with type A → B, if all of the mixed strings it contains have type A → B. In this paper, we will only be concerned with typeable mixed languages. We will be interested in different operations on mixed languages in the following sections. When L1 ,L2 , and L are mixed languages, we use the notation L1 · L2 to denote the set {σ1 · σ2 : σ1 ∈ L1 , σ2 ∈ L2 }, L0 to denote the set {ǫ}, and for n ≥ 1, Ln to denote the set L · Ln−1 . The following two operations will be useful in Section 5. The operator T , defined by T (L) = {σ : σ ∈ L, |σ| = 1, σ is a test} extracts from a language all the mixed strings made up of a single test. The operator ǫ, defined by ǫ(L) = L ∩ {ǫ} essentially checks if the empty mixed string ǫ is in L, since ǫ(L) is nonempty if and only if the empty mixed string is in L. 3 Mixed Automata Having introduced a notion of mixed strings, we now define a class of deterministic automata that can accept mixed strings. Mixed strings enforce a strict alternation between programs and tests, and this alternation is reflected in our automata. The transitions of the automata are labelled with primitive programs and literals. Given a mixed string, mixed automaton can process the tests in the string in many different orders; this reflects the fact that the tests that appear in mixed strings are sets of literals. A mixed automaton over the set of primitive programs P and set of primitive tests B is a 3-tuple M = (hSA iA∈℘(B) , o, hδA iA∈℘(B) ), consisting of a set SA of states for each possible base A 6= ∅ of a test as well as a set S∅ of program states, an output function o : SS ∅ → {0, 1}, and transition functions δ∅ : S∅ × P → SB and (for A 6= ∅) δA : SA × lit(A) → A∈℘(B) SA , subject to the following two conditions: A1. δA (s, l) ∈ SA\{base(l)} , and 4 A2. for every state s in SA , for every test t with base A, and for any two orderings hx1 , . . . , xm i, y1 ym x1 xm hy1 , . . . , ym i of the literals in t, if s −→ . . . −→ s1 and s −→ . . . −→ s2 then s1 = s2 . l (For convenience, we write s −→ s′ if δA (s, l) = s′ for A the base of s.) We give an example of a mixed automaton in Example 3.2. Intuitively, a state in SA can process a mixed string of type A → B, for some B. Condition A1 enforces the invariant that, as a string is being processed, the current state is in SA , for A the base of the first element of the string. Condition A2 is a form of “path independence”: regardless of the order in which we process the literals of a test, we end up in the same program state. Condition A2, and basing transitions on literals rather than tests, allow the manipulation of mixed expressions at a finer level of granularity. This is related to a similar choice we made when allowing mixed strings to start with a test that is not “complete”. This flexibility will be useful when we analyze mixed expressions in Section 5. The accepting states are defined via the output function o(s), viewed as a characteristic function. Accepting states are in S∅. As in the coalgebraic treatment of automata [Rutten 1998], and contrary to standard definitions, we allow both the state spaces SA and the set P of primitive programs to be infinite. We also do not force mixed automata to have initial states, for reasons that will become clear. We now define the mixed language accepted by a state of a mixed automaton. Call a sequence µ = e1 . . . em of primitive programs and literals a linearization of a mixed string σ = a1 . . . an if µ can be obtained from σ by replacing each test ai in σ with a sequence of length |ai | containing exactly the literals in ai . Example 3.1: Let P = {p, q}, and B = {b, c}. The mixed string {b}p{b, c}q{b, c} (of type {b} → ∅) has four linearizations: bpbcqbc, bpcbqbc, bpbcqcb, and bpcbqcb. Intuitively, a mixed string σ is accepted by an automaton if a linearization of σ is accepted by the automaton according to the usual definition. Formally, a mixed string σ is accepted by a state s of an automaton M if either (1) σ is ǫ and s is a program state with o(s) = 1 (i.e., s is an accepting program state), or e e 1 m (2) there exists a linearization e1 . . . em of σ such that s −→ . . . −→ s′ , s′ is a program state, ′ and o(s ) = 1. If σ is accepted (by a state s) in virtue of satisfying the second criterion, then every linearization is a witness to this fact— in other words, the existential quantification in the second criterion could be replaced with a universal quantification (over all linearizations of σ) without any change in the actual definition. This is because of condition A2 in the definition of a mixed automaton. We define the mixed language accepted by state s of automaton M , written LM (s), as the set of mixed strings accepted by state s of M . It is easy to verify that all the strings accepted by a state have the same type, namely, if s is in SA , then every string in LM (s) has type A → ∅, and hence LM (s) has type A → ∅. Example 3.2: Let P = {p, q}, and B = {b, c}. Consider the mixed automaton over P and B 5 b s1,{b} p s1,ø s2,{b,c} c b s2,{b} s2,{c} b c s2,ø Figure 1: A mixed automaton pictured in Figure 1, given by M = (hSA iA∈℘(B) , o, hδA iA∈℘(B) ), where: S{b,c} = {s2,{b,c} , ssink,{b,c} } S{b} = {s1,{b} , s2,{b} , ssink,{b} } S{c} = {s2,{c} , ssink,{c} } S∅ = {s1,∅, s2,∅, ssink,∅} and o(s1,∅) = 1 o(s2,∅) = 1 o(ssink,∅) = 0. The transition function δA can be read off from Figure 1; note that the sink states ssink,A as well as the transitions to the sink states are not pictured. Intuitively, any transition not pictured in the automaton can be understood as going to the appropriate sink state. For instance, we have δ{b,c} (s2,{b,c} , c) = ssink,{b} . We can check that the two conditions A1 and A2 hold in M . The language accepted by state s1,{b} is LM (s1,{b} ) = {{b}, {b}p{b, c}}. The language accepted by state s1,∅ is LM (s1,∅) = {ǫ, p{b, c}}. We define a homomorphism between mixed automata M and M ′ to be a family f = hfA iA∈℘(B) ′ such that: of functions fA : SA → SA 6 ′ (f (s), p), (1) for all s ∈ S∅, o(s) = o′ (f∅(s)), and for all p ∈ P, fB (δ∅(s, p)) = δ∅ ∅ ′ (f (s), l). (2) for all s ∈ SA (where A 6= ∅) and all l ∈ lit(A), fA\{base(l)} (δA (s, l)) = δA A A homomorphism preserves accepting states and transitions. We write f : M → M ′ when f is a homomorphism between automata M and M ′ . For convenience, we often write f (s) for fA (s) when the type A of s is understood. It is straightforward to verify that mixed automata form a category (denoted MA), where the morphisms of the category are mixed automata homomorphisms. We are interested in identifying states that have the same behaviour, that is, that accept the same mixed language. A bisimulation between two mixed automata M = (hSA iA∈℘(B) , o, hδA iA∈℘(B) ) ′ i ′ ′ ′ and M ′ = (hSA A∈℘(B) , o , hδA iA∈℘(B) ) is a family of relations hRA iA∈℘(B) where RA ⊆ SA × SA such that the following two conditions hold: ′ , if sR s′ , then o(s) = o′ (s′ ) and for all p ∈ P, δ (s, p)R δ ′ (s′ , p), (1) for all s ∈ S∅ and s′ ∈ S∅ ∅ ∅ B ∅ and ′ (where A 6= ∅), if sR s′ , then for all l ∈ lit(A), δ (s, l)R ′ ′ (2) for all s ∈ SA and s′ ∈ SA A A A\{base (l)} δA (s , l). A bisimulation between M and itself is called a bisimulation on M . Two states s and s′ of M having the same type B are said to be bisimilar, denoted by s ∼M s′ , if there exists a bisimulation hRA iA∈℘(B) such that sRB s′ . (We simply write s ∼ s′ when M is clear from the context.) For each M , the relation ∼M is the union of all bisimulations on M , and in fact is the greatest bisimulation on M . Proposition 3.3: If s is a state of M and s′ is a state of M ′ with s ∼ s′ , then LM (s) = LM ′ (s′ ). Proof: We show, by induction on the length of mixed strings that for all mixed strings σ, and for all states s, s′ such that s ∼ s′ , then σ ∈ LM (s) if and only if σ ∈ LM ′ (s′ ). For the empty mixed string ǫ, we have ǫ ∈ LM (s) if and only if o(s) = 1 if and only if o′ (s′ ) = 1 (by definition of bisimilarity) if and only if ǫ ∈ LM ′ (s′ ). Assume inductively that the results holds for mixed strings of length n. Let σ be a mixed string of length n + 1, of the form aσ ′ . Assume σ ∈ LM (s). By definition, there e1 em is a linearization e1 . . . em of a and a state s1 such that s −→ . . . −→ s1 and σ ′ ∈ LM (s1 ). By the e1 em ′ ′ ′ definition of bisimilar states, we have s −→ . . . −→ s1 and s1 ∼ s1 . By the induction hypothesis, σ ′ ∈ LM ′ (s′1 ). By the choice of s′1 , we have that σ ∈ LM ′ (s′ ), as desired. Conditions (1) and (2) of the definition of a bisimulation are analogous to the conditions in the definition of a homomorphism. Indeed, a homomorphism can be viewed as a bisimulation. Proposition 3.4: If f : M → M ′ is a mixed automataon homomorphism, then hRA iA∈℘(B) , defined by RA = {(s, fA (s)) : s ∈ SA } is a bisimulation. Proof: First, for all s ∈ S∅, sR∅s′ implies s′ = f∅(s), and o(s) = o′ (f∅(s)) = o′ (s′ ). Moreover, ′ (s′ , p) = δ ′ (f (s), p) = f (δ (s, l)), so that δ (s, l)R δ ′ (s′ , l), as for all p ∈ P, we have δ∅ B ∅ ∅ B ∅ ∅ ∅ required. Similarly, let s ∈ SA (where A 6= ∅); sRA s′ implies s′ = fA (s), and thus for all ′ (s′ , l) = δ ′ (f (s), l) = f ′ ′ l ∈ lit(A), δA A\{base(l)} (δA (s, l)), so that δA (s, l)RA\{base (l)} δA (s , l), A A as required, proving that hRA iA∈℘(B) is a bisimulation. An immediate consequence of this relationship is that homomorphisms preserve accepted languages. 7 Proposition 3.5: If f : M → M ′ is a mixed automaton homomorphism, then LM (s) = LM ′ (f (s)) for all states s of M . Proof: Immediate from Propositions 3.4 and 3.3. It turns out that we can impose a mixed automaton structure on the set of all mixed languages with type A → ∅. We take as states mixed languages of type A → ∅. A state is accepting if the empty string ǫ is in the language. It remains to define the transitions between states; we adapt the idea of Brzozowski derivatives [Brzozowski 1964]. Our definition of derivative depends on whether we are taking the derivative with respect to a program element or a literal. If the mixed language L has type ∅ → B and p ∈ P is a primitive program, define Dp (L) = {σ : p · σ ∈ L}. If the mixed language L has type A → B (for A 6= ∅) and l ∈ lit(A) is a literal, then Dl (L) = {σ : {l} · σ ∈ L}. Define LA to be the set of mixed languages of type A → ∅. Define L to be (hLA iA∈℘(B) , oL , hδA iA∈℘(B) ), where oL (L) = 1 if ǫ ∈ L, and 0 otherwise; δ∅(L, p) = Dp (L); and δA (L, l) = Dl (L), for A 6= ∅ and l ∈ lit(A). It is easy to verify that L is indeed a mixed automaton. The following properties of L are significant. Proposition 3.6: For a mixed automaton M with states hSA iA∈℘(B) , the maps fA : SA → L mapping a state s in SA to the language LM (s) form a mixed automaton homomorphism. Proof: We check the two conditions for the family hfA iA∈℘(B) to be a homomorphism. First, given s ∈ S∅, o(s) = 1 if and only if ǫ ∈ LM (s), which is equivalent to oL (f∅(s)) = 1. Moreover, given p ∈ B, fB (δ∅(s, p)) = LM (δ∅(s, p)) = {σ : p · σ ∈ LM (s)} = Dp (LM (s)) = Dp (f∅(s)), as required. Similarly, given s ∈ SA (where A 6= ∅), and l ∈ lit(A), fA\{base(l)} (δA (s, l)) = LM (δA (s, l)) = {σ : {l} · σ ∈ LM (s)} = Dl (LM (s)) = Dl (fA (s)), as required. Proposition 3.7: For any mixed language L in L, the mixed language accepted by state L in L is L itself, that is, LL (L) = L. Proof: We prove by induction on the length of linearizations of σ that for all mixed strings σ, σ ∈ L if and only if σ ∈ LL (L). For the empty mixed string ǫ, we have ǫ ∈ L ⇔ oL (L) = 1 ⇔ ǫ ∈ LL (L). For σ of the form pσ ′ , we have σ = p·σ ′ , and thus we have p·σ ′ ∈ L ⇔ σ ′ ∈ Dp (L), which by the induction hypothesis holds if and only if σ ′ ∈ LL (Dp (L)) ⇔ σ ′ ∈ Dp (LL (L)) (because LL is a mixed automaton homomorphism from L to L), which is just equivalent to p · σ ′ ∈ LL (L). For σ with a linearization le1 . . . em , letting σ ′ denote a string with linearization e1 . . . em , we have σ = {l} · σ ′ , and we can derive in an exactly similar manner that {l} · σ ′ ∈ L ⇔ σ ′ ∈ Dl (L) ⇔ σ ′ ∈ LL (Dl (L)) ⇔ σ ′ ∈ Dl (LL (L)) ⇔ {l} · σ ′ ∈ LL (L) ⇔ σ ∈ LL (L). These facts combine into the following fundamental property of L, namely, that L is a final automaton. 8 Theorem 3.8: L is final in the category MA, that is, for every mixed automaton M , there is a unique homomorphism from M to L. Proof: Let M be a mixed automaton. By Proposition 3.6, there exists a homomorphism f from M to the final automaton L, mapping a state s to the language LM (s) accepted by that state. Let f ′ be another homomorphism from M to L. To establish uniqueness, we need to show that for any state s of M , we have f (s) = f ′ (s): f (s) = LM (s) (by definition of f ) ′ = LL (f (s))(by Proposition 3.5) = f ′ (s) (by Proposition 3.7). Hence, f is the required unique homomorphism. The finality of L gives rise to the following coinduction proof principle for language equality, in a way which is by now standard [Rutten 2000]. Corollary 3.9: For two mixed languages K and L of type A → ∅, if K ∼ L then K = L. In other words, to establish the equality of two mixed languages, it is sufficient to exhibit a bisimulation between the two languages when viewed as states of the final automaton L. In the following sections, we will use this principle to analyze equality of languages described by a typed form of KAT expressions. 4 Pseudo-Bisimulations The “path independence” condition (A2) in the definition of a mixed automaton gives mixed automata a certain form of redundancy. It turns out that due to this redundancy, we can define a simpler notion than bisimulation that still lets us establish the bisimilarity of states. A pseudo-bisimulation (relative to the ordering b1 , . . . , b|B| of the primitive tests in B) between ′ i ′ ′ two mixed automata M = (hSA iA∈℘(B) , o, hδA iA∈℘(B) ) and M ′ = (hSA A∈℘(B) , o , hδA iA∈℘(B) ) ′ is a family of relations hRi ii=0,... ,|B| where Ri ⊆ SAi × SAi (with Ai denoting {bj : j ≤ i, j ∈ {1, . . . , |B|}}) such that the following two conditions hold: ′ , if sR s′ , then o(s) = o′ (s′ ) and for all p ∈ P, δ (s, p)R δ ′ (s′ , p), (1) for all s ∈ S∅ and s′ ∈ S∅ 0 ∅ |B| ∅ and ′ , if sR s′ , then for all l ∈ lit(b ), (2) for all i = 1, . . . , |B|, for all s ∈ SAi and s′ ∈ SA i i i ′ (s′ , l). δAi (s, l)Ri−1 δA i The sense in which pseudo-bisimulation is weaker than a bisimulation is that there need not be a relation for each element of ℘(B). As the following theorem shows, however, we can always complete a pseudo-bisimulation to a bisimulation. Theorem 4.1: If hRi ii=0,... ,|B| is a pseudo-bisimulation (relative to the ordering b1 , . . . , b|B| of the ′ i such that R′ = R for all i = 0, . . . , |B| primitive tests in B), then there exists a bisimulation hRA i Ai (with Ai denoting {bj : j ≤ i, j ∈ {1, . . . , |B|}}). 9 Proof: Let hRi ii=0,... ,|B| be a pseudo-bisimulation (relative to the ordering on primitive tests ′ ⊆ S × S ′ for each A ∈ ℘(B), and show b1 , . . . , b|B| ). We define a family of relations RA A A that it forms a bisimulation with the required property. The proof relies on the path independence condition A2 of mixed automata in a fundamental way. Given A ∈ ℘(B), let i(A) be the largest i ∈ {1, . . . , |B|} such that {b1 , . . . , bi } ⊆ A, and let c(A) be the relative complement of {b1 , . . . , bi(A) } defined by A \ {b1 , . . . , bi(A) }. We say that a sequence of literals l1 , . . . , lk is exhaustive over a set ′ as follows: sR′ s′ holds if and of bases A if A = {base(l1 ), . . . , base(lk )} and |A| = k. Define RA A l l l 1 1 k only if for all literal sequences l1 , . . . , lk exhaustive over c(A), we have s −→ . . . −→ s1 , s′ −→ l k ′ =R . . . −→ s′1 , and s1 Ri(A) s′1 . Clearly, if A = {b1 , . . . , bi(A) }, then RA i(A) , as required. We now ′ s′ , then sR s′ , and hence ′ ′ check that hRA iA∈℘(B) is a bisimulation. Clearly, since R∅ = R0 , if sR∅ 0 o(s) = o′ (s′ ), and for all p ∈ P, it holds that δ∅(s, p)R|B| δ∅(s′ , p), implying δ∅(s, p)RB′ δ∅(s′ , p). ′ , l ∈ lit(A), and assume sR′ s′ . Consider the following cases: Now, let A 6= ∅, s ∈ SA , s′ ∈ SA A ′ s′ , then sR ′ Case A = {b1 , . . . , bi(A) }, base(l) = bi(A) : Since sRA i(A) s , and by the properties ′ of pseudo-bisimulations, we have δA (s, l)Ri(A)−1 δA (s′ , l), which is exactly δA (s, l)RA\{base(l)} δA (s′ , l). ′ ′ ′ Case A = {b1 , . . . , bi(A) }, base(l) = bj , j < i(A): Since sRA s , then sRi(A) s . let l1 , . . . , lk ′ ′ be an arbitrary exhaustive sequence of literals over {bi(A) , . . . , bj+1 }. Let li(A) , . . . , lj+1 be the ′ ′ ′ arrangement of l1 , . . . , lk such that base(lm ) = bm . Consider the states s1 , s2 , s1 , s2 such that ′ li(A) ′ lj+1 ′ li(A) l ′ lj+1 l s −→ . . . −→ s1 −→ s2 , and s′ −→ . . . −→ s′1 −→ s′2 . By the definition of pseudo-bisimulation, ′ li(A) l we have that s2 Rj−1 s′2 . Now, by condition A2, we have states s3 , s′3 such that s −→ s3 −→ ′ lj+1 ′ li(A) l ′ lj+1 l l 1 k . . . −→ s2 and s′ −→ s′3 −→ . . . −→ s′2 . By condition A2 again, we have that s3 −→ . . . −→ s2 l l k 1 and s′3 −→ s′2 . Since l1 , . . . , lk was arbitrary, s2 Rj−1 s′2 and i(A \ {base(l)}) = j − 1, we . . . −→ ′ ′ ′ have s3 RA\{base(l)} s′3 , that is, δA (s, l)RA\{base (l)} δA (s , l). Case A ⊃ {b1 , . . . , bi(A) }, base(l) ∈ c(A)): Pick an arbitrary sequence l1 , . . . , lk of literals l l l k 1 that is exhaustive over c(A \ {base(l)}), and states s1 , s2 , s′1 , s′2 such that s −→ s2 −→ s1 , . . . −→ l l l 1 k ′ , we have s R ′ . . . −→ s′1 . By definition of RA and s′ −→ s′2 −→ 1 i(A) s1 . Since the sequence of ′ literals l1 , . . . , lk was arbitrary, and since i(A) = i(A \ {base(l)}), we have that s2 RA\{base(l)} s′2 , ′ that is, δA (s, l)RA\{base(l)} δA (s′ , l). Case A ⊃ {b1 , . . . , bi(A) }, base(l) = bi(A) : Pick an arbitrary sequence l1 , . . . , lk of literals l l l l 1 1 k k . . . −→ s1 and s′ −→ . . . −→ s′1 . that is exhaustive over c(A), and states s1 , s′1 such that s −→ l ′ , we have s R ′ By definition of RA 1 i(A) s1 . By definition of pseudo-bisimulation, if s1 −→ s2 and l l s′1 −→ s′2 , then we have s2 Ri(A)−1 s′2 . By condition A2, we have that for states s3 , s′3 , s −→ l l l l l 1 k 1 k . . . −→ s′2 . Thus, since l1 , . . . , lk was arbitrary, and s3 −→ . . . −→ s2 and s′ −→ s′3 −→ ′ ′ δA (s′ , l). i(A \ {base(l)}) = i(A) − 1, we have s3 RA\{base(l)} s′3 , that is, δA (s, l)RA\{base(l)} Case A ⊃ {b1 , . . . , bi(A) }, base(l) = bj , j < i(A): Pick an arbitrary sequence l1 , . . . , lk of literals that is exhaustive over c(A)∪{bi(A) , . . . , bj+1 }. Let l1′ , . . . , lk′ ′ be the elements of l1 , . . . , lk with bases in c(A). Let l1′′ , . . . , lk′′′′ be the elements of l1 , . . . , lk with bases in {bi(A) , . . . , bj+1 }. Let ′′′ , . . . , l′′′ be the arrangement of l′′ , . . . , l′′ such that base(l′′′ ) = b . Consider states s , s′ li(A) m 1 1 m 1 j+1 k ′′ l′ l′ ′ l′ l′ ′ 1 k 1 k ′ , we have s R ′ . . . −→ . . . −→ such that s −→ s1 and s′ −→ s′1 . By definition of RA 1 i(A) s1 . Now, 10 ′′′ li(A) ′′′ lj+1 l ′′′ li(A) ′′′ lj+1 l l l l l l consider states s2 , s3 , s′2 , s′3 such that s1 −→ . . . −→ s2 −→ s3 and s′1 −→ . . . −→ s′2 −→ s′3 . By the definition of pseudo-bisimulation, since s1 Ri(A) s′1 , we have that s3 Rj−1 s′3 . Now, by condition l 1 k 1 k . . . −→ s′3 . . . . −→ s3 and s′ −→ s′4 −→ A2, we have states s4 , s′4 such that s −→ s4 −→ ′ Since l1 , . . . , lk was arbitrary, and i(A \ {base(l)}) = j − 1, we have s4 RA\{base(l)} s′4 , that is, ′ ′ δA (s, l)RA\{base (l)} δA (s , l). Let us say that two states s, s′ are pseudo-bisimilar if they are related by some Ri in a pseudobisimulation hRi i; it follows directly from Theorem 4.1 that pseudo-bisimilar states are bisimilar. 5 Mixed Expressions and Derivatives A mixed expression (over the set of primitive programs P and the set of primitive tests B) is any expression built via the following grammar: e ::= 0 | 1 | p | l | e1 + e2 | e1 · e2 | e∗ (with p ∈ P and l ∈ lit(B)). For simplicity, we often write e1 e2 for e1 · e2 . We also freely use parentheses when appropriate. Intuitively, the constants 0 and 1 stand for failure and success, respectively. The expression p represents a primitive program, while l represents a primitive test. The operation + is used for choice, · for sequencing, and ∗ for iteration. These are a subclass of the KAT expressions as defined by Kozen [1997]. (In addition to allowing negated primitive tests, Kozen also allows negated tests.) We call them mixed expressions to emphasize the different interpretation we have in mind. In a way similar to regular expressions denoting regular languages, we define a mapping M from mixed expressions to mixed languages inductively as follows: M (0) = ∅ M (1) = {ǫ} M (p) = {p} M (l) = {{l}} M (e1 + e2 ) = M (e1 ) ∪ M (e2 ) M (e1 · e2 ) = M (e1 ) · M (e2 ) [ M (e∗ ) = M (e)n . n≥0 The mapping M is a rather canonical homomorphism from mixed expressions to mixed languages. (It is worth noting that we have not defined any axioms for deriving the “equivalence” of mixed expressions, and it is quite possible for distinct mixed expressions to give rise to the same mixed language.) Inspired by a type system devised by Kozen [1998, 2002] for KA and KAT expressions, we impose a type system on mixed expressions. The types have the form A → B, where A, B ∈ ℘(B), the same types we assigned to mixed strings in Section 2. We shall soon see that this is no accident. We assign a type to a mixed expression via a type judgment written ⊢ e : A → B. The following 11 inference rules are used to derive the type of a mixed expression: ⊢0:A→B ⊢1:A→A ⊢p:∅→B ⊢ l : A ∪ {base(l)} → A \ {base(l)} ⊢ e1 : A → B ⊢ e2 : A → B ⊢ e1 + e2 : A → B ⊢ e1 : A → B ⊢ e2 : B → C ⊢ e1 · e2 : A → C e:A→A . e∗ : A → A It is clear from these rules that any subexpression of a mixed expression having a type judgment also has a type judgment. The typeable mixed expressions (which intuitively are the “well-formed” expressions) induce typeable mixed languages via the mapping M , as formalized by the following proposition. Proposition 5.1: If ⊢ e : A → B, then M (e) is a mixed language of type A → B. Proof: A straightforward induction on the structure of mixed expressions. Our goal is to manipulate mixed languages by manipulating the mixed expressions that represent them via the mapping M . (Of course, not every mixed language is in the image of M .) In particular, we are interested in the operations T (L) and ǫ(L), as defined in Section 2, as well as the language derivatives Dp and Dl introduced in the last section. We now define operators on mixed expressions that capture those operators on the languages denoted by those mixed expressions. We define T̂ inductively on the structure of mixed expressions, as follows: T̂ (0) = 0 T̂ (1) = 1 T̂ (p) = 0 T̂ (l) = l T̂ (e1 + e2 ) = T̂ (e1 ) + T̂ (e2 ) T̂ (e1 · e2 ) = T̂ (e1 ) · T̂ (e2 ) T̂ (e∗ ) = T̂ (e)∗ (where p ∈ P and l ∈ lit(B)). The operator T̂ “models” the operator T (L), as is made precise in the following way. Proposition 5.2: If ⊢ e : A → B, then T̂ (e) is a typeable mixed expression such that T (M (e)) = M (T̂ (e)). 12 Proof: A straightforward induction on the structure of mixed expressions. We define ǫ̂ inductively on the structure of mixed expressions, as follows: ǫ̂(0) = 0 ǫ̂(1) = 1 ǫ̂(p) = 0 ǫ̂(l) = 0  0 ǫ̂(e1 + e2 ) = 1  1 ǫ̂(e1 · e2 ) = 0 if ǫ̂(e1 ) = ǫ̂(e2 ) = 0 otherwise if ǫ̂(e1 ) = ǫ̂(e2 ) = 1 otherwise ǫ̂(e∗ ) = 1 (where p ∈ P and l ∈ lit(B)). Note that ǫ̂(e) is always the mixed expression 0 or 1. In analogy to Proposition 5.2, we have the following fact connecting the ǫ and ǫ̂ operators. Proposition 5.3: If ⊢ e : A → B, then ǫ̂(e) is a typeable mixed expression such that ǫ(M (e)) = M (ǫ̂(e)). Proof: A straightforward induction on the structure of mixed expressions. Finally, we define, by induction on the structure of mixed expressions, the derivative operator D̂ for typeable mixed expressions. There are two forms of the derivative, corresponding to the two forms of derivative for mixed languages: the derivative D̂l with respect to a literal l ∈ lit(B), and the derivative D̂p with respect to a primitive program p ∈ P. The two forms of derivative are defined similarly, except on the product of two expressions. (Strictly speaking, since the definition of the derivative depends on the type of the expressions being differentiated, D̂ should take type derivations as arguments rather than simply expressions. To lighten the notation, we write D̂ as though it took mixed expressions as arguments, with the understanding that the appropriate types are available.) The derivative D̂p with respect to a primitive program p ∈ P is defined as follows: D̂p (0) = 0 D̂p (1) = 0  1 if p = q D̂p (q) = 0 otherwise D̂p (l) = 0 D̂p (e1 + e2 ) = D̂p (e1 ) + D̂p (e2 )  D̂p (e1 ) · e2 if B 6= ∅ D̂p (e1 · e2 ) = D̂p (e1 ) · e2 + ǫ̂(e1 ) · D̂p (e2 ) otherwise where ⊢ e1 : A → B and ⊢ e2 : B → C D̂p (e∗ ) = D̂p (e) · e∗ . 13 The derivative D̂l with respect to a literal l ∈ lit(B) is defined as follows: D̂l (0) = 0 D̂l (1) = 0 D̂l (p) = 0  1 if l = l′ ′ D̂l (l ) = 0 otherwise D̂l (e1 + e2 ) = D̂l (e1 ) + D̂l (e2 )  D̂l (e1 ) · e2 if base(l) ∈ /B D̂l (e1 · e2 ) = D̂l (e1 ) · e2 + T̂ (e1 ) · D̂l (e2 ) otherwise where ⊢ e1 : A → B and ⊢ e2 : B → C ∗ D̂l (e ) = D̂l (e) · e∗ . We have the following proposition, similar to the previous two, connecting the derivative D̂ to the previously defined derivative D on mixed languages. Proposition 5.4: Suppose that ⊢ e : A → B. If A = ∅, then for all p ∈ P, Dp (M (e)) = M (D̂p (e)). If A 6= ∅, then for all l ∈ lit(A), Dl (M (e)) = M (D̂l (e)). Proof: The proof is by induction on the structure of the mixed expression e. To illustrate the proof technique, we give one case of the proof. Suppose that ⊢ e1 : A → B and ⊢ e2 : B → C, and e = e1 · e2 . Suppose further that l ∈ lit(B) is a literal such that base(l) ∈ A and base(l) ∈ B. We will show that the proposition holds for the expression e, assuming (by the induction hypothesis) that the proposition holds for all subexpressions of e. We first establish three claims that will be needed. Claim 1: If t is a test which (as a mixed string) can be judged to have type A → B, then {t} · {σ : {l} · σ ∈ M (e2 )} = {σ ′ : {l} · σ ′ ∈ {t} · M (e2 )}. First suppose that σ is a mixed string such that {l} · σ ∈ M (e2 ). Then σ can be judged to have type B \ {base(l)} → C, and so {l} · {t} · σ = {t} · {l} · σ ∈ {t} · M (e2 ). It follows that t · σ ∈ {σ ′ : {l} · σ ′ ∈ {t} · M (e2 )}. For the other direction, suppose that σ ′ is a mixed string such that {l} · σ ′ ∈ {t} · M (e2 ). Then there exists a mixed string τ ∈ M (e2 ) such that {l} · σ ′ = {t} · τ . Since t can be judged to have type A → B and base(l) ∈ A ∩ B, base(l) ∈ / t and there exists a mixed string σ such that {l} · σ ′ = {t} · τ = {l} · {t} · σ. Thus σ ′ = {t} · σ where {l} · σ ∈ M (e2 ). Claim 2: If σ is a mixed string such that l · σ ∈ M (e1 ), then l · σ ∈ M (e1 ) \ T (M (e1 )). This claim holds because {l} · σ ∈ M (e1 ) implies that σ has type A \ {base(l)} → B; since B 6⊆ A′ , by the definition of the type of a mixed string, |σ| > 1 and so |{l} · σ| > 1. Claim 3: {σ : {l}·σ ∈ M (e1 )\T (M (e1 ))}·M (e2 ) = {σ : {l}·σ ∈ (M (e1 )\T (M (e1 )))·M (e2 )} The ⊆ direction is straightforward. For the ⊇ direction, let σ be a mixed string in the second set; then, there exist strings τ1 ∈ M (e1 ) \ T (M (e1 )) and τ2 ∈ M (e2 ) such that {l} · σ = τ1 · τ2 . All strings in M (e1 ) have type A → B; since base(l) ∈ B, there are no strings in M (e1 ) of length one consisting of a primitive program, and so |τ1 | > 3. Hence σ = σ ′ · τ2 for some mixed string σ ′ such that {l} · σ ′ ∈ M (e1 ) \ T (M (e1 )). 14 Using these three claims, we show that Dl (M (e)) = M (D̂l (e)): M (D̂l (e1 · e2 )) = M (D̂l (e1 ) · e2 + T̂ (e1 ) · D̂l (e2 )) (by definition of D̂l ) = M (D̂l (e1 )) · M (e2 ) ∪ M (T̂ (e1 )) · M (D̂l (e2 )) (by definition of M ) = Dl (M (e1 )) · M (e2 ) ∪ M (T̂ (e1 )) · D(M (e2 )) (by induction hypothesis) = Dl (M (e1 )) · M (e2 ) ∪ T (M (e1 )) · D(M (e2 )) (by Proposition 5.2) = {σ : {l} · σ ∈ M (e1 )} · M (e2 ) ∪ T (M (e1 )) · {σ : {l} · σ ∈ M (e2 ))} (by definition of Dl ) = {σ : {l} · σ ∈ M (e1 )} · M (e2 ) ∪ {σ : {l} · σ ∈ T (M (e1 )) · M (e2 ))} (by Claim 1) = {σ : {l} · σ ∈ M (e1 ) \ T (M (e1 ))} · M (e2 ) ∪ {σ : {l} · σ ∈ T (M (e1 )) · M (e2 ))} (by Claim 2) = {σ : {l} · σ ∈ (M (e1 ) \ T (M (e1 ))) · M (e2 )} ∪ {σ : {l} · σ ∈ T (M (e1 )) · M (e2 ))} (by Claim 3) = {σ : {l} · σ ∈ M (e1 ) · M (e2 )} = Dl (M (e1 ) · M (e2 )) (by definition of Dl ) = Dl (M (e1 · e2 )) (by definition of M ). The other cases are similar. 6 Example In this section, we use the notions of pseudo-bisimulation and the coinduction proof principle (Corollary 3.9), along with the derivative operator D̂, to prove the equivalence of two mixed languages specified as mixed expressions. Fix P to be the set of primitive programs {p, q}, and B to be the set of primitive tests {b, c}. Let [b] be a shorthand for (b + b). Define α to be the mixed expression (bp([b]cq)∗ c)∗ b and β to be the mixed expression bp([b]cq + bcp)∗ cb + b. Our goal is to prove that α and β are equivalent, in the sense that they induce the same language via the mapping M . In other words, we want to establish that M (α) = M (β). This example demonstrates the equivalence of the program while b do { p; while c do q } 15 and the program if b then { p; while b + c do if c then q else p } This equivalence is a component of the proof of the classical result that every while program can be simulated by a while program with at most one while loop, as presented by Kozen [1997]. We refer the reader there for more details. There are a few ways to establish this equivalence. One is to rely on a sound and complete axiomatization of the equational theory of KAT, and derive the equivalence of α and β algebraically [Kozen and Smith 1996]. Another approach is to first construct for each expression an automaton that accepts the language it denotes, and then minimize both automata [Kozen 2003]. Two expressions are then equal if the two resulting automata are isomorphic. In this paper, we describe a third approach, using the coinductive proof principle for mixed languages embodied by Corollary 3.9. Since the theory we developed in Section 3 applies only to mixed languages of type A → ∅, we verify that indeed we have ⊢ α : {b} → ∅ and ⊢ β : {b} → ∅, so that, by Proposition 5.1, M (α) and M (β) are languages of type {b} → ∅. We prove the equivalence of α and β by showing that the mixed languages M (α) and M (β) are pseudo-bisimilar, that is, they are related by some pseudo-bisimulation. More specifically, we exhibit a pseudo-bisimulation, relative to the ordering b1 = b, b2 = c, on the final automaton L, such that M (α) and M (β) are pseudo-bisimilar. This is sufficient for proving equivalence, since by Theorem 4.1, the languages M (α) and M (β) are then bisimilar, and by Corollary 3.9, M (α) = M (β). Define α′ to be the mixed expression ([b]cq)∗ cα and define β ′ to be the mixed expression ([b]cq + bcp)∗ cb. Notice that β = bpβ ′ + b. We note that (using the notation of the definition of pseudo-bisimulation), A0 = ∅, A1 = {b}, and A2 = {b, c}. We claim that the following three relations form a pseudo-bisimulation: R2 = {(M (α′ ), M (β ′ )), (M (0), M (0))} R1 = {(M ([b]qα′ ), M ([b]qβ ′ )), (M (α), M (β))} R0 = {(M (pα′ ), M (pβ ′ )), (M (qα′ ), M (qβ ′ )), (M (1), M (1)), (M (0), M (0))}. 16 It is straightforward to verify that hR0 , R1 , R2 i is a pseudo-bisimulation on L, using the operators defined in the previous section. For instance, consider Db (M (α)), which is equal to M (D̂b (α)) by Proposition 5.4. We compute D̂b (α) here: D̂b (α) = D̂b ((bp([b]cq)∗ c)∗ )b + T̂ ((bp([b]cq)∗ c)∗ )D̂b (b) = D̂b (bp([b]cq)∗ c)(bp([b]cq)∗ c)∗ b + T̂ ((bp([b]cq)∗ c)∗ )0 = p([b]cq)∗ c(bp([b]cq)∗ c)∗ b = pα′ . Hence, Db (M (α)) = M (D̂b (α)) = M (pα′ ). The other cases are similar. As we shall see shortly, there is a way to mechanically construct such a bisimulation to establish the equivalence of two mixed expressions. We remark that an alternative approach to establish equivalence of while programs based on coalgebras is described by Rutten [1999]. This approach uses the operational semantics of the programs instead of an algebraic framework. 7 Completeness Thus far, we have established a coinductive proof technique for establishing the equality of mixed languages (Section 3), and illustrated its use by showing the equality of two particular mixed languages specified by mixed expressions (Section 6), making use of the derivative calculus developed in Section 5. A natural question about this proof technique is whether or not it can establish the equivalence of any two mixed expressions that are equivalent (in that they specify the same mixed language). In this section, we answer this question in the affirmative by formalizing and proving a completeness theorem for our proof technique. In particular, we show that given two equivalent mixed expressions, a finite bisimulation relating them can be effectively constructed, by performing only simple syntactic manipulations. In fact, we exhibit a deterministic procedure for deciding whether or not two mixed expressions are equivalent. In order to state our completeness theorem, we need a few definitions. We say that two mixed ACI expressions e1 and e2 are equal up to ACI properties, written e1 = e2 , if e1 and e2 are syntactically equal, up to the associativity, commutativity, and idempotence of +. That is, e1 and e2 are equal up to ACI properties if the following three rewriting rules can be applied to subexpressions of e1 to obtain e2 : e + (f + g) = (e + f ) + g e+f =f +e e + e = e. Given a relation R̂ between mixed expressions, we define an induced relation R̂ACI as follows: ACI ACI e1 R̂ACI e2 if and only if there exists e′1 , e′2 such that e1 = e′1 , e2 = e′2 , and e′1 R̂e′2 . We define a syntactic bisimulation between two mixed expressions e1 and e2 having the same type B → ∅ (for some B ⊆ B) to be a family R̂ = hR̂A iA∈℘(B) of relations such that (1) for all mixed expressions e, e′ , if eR̂A e′ , then ⊢ e : A → ∅ and ⊢ e′ : A → ∅, 17 (2) eR̂B e′ , (3) for all mixed expressions e, e′ , if eR̂∅e′ , then ǫ̂(e) = ǫ̂(e′ ), and for all p ∈ P, D̂p (e)R̂BACI D̂p (e′ ), and ACI ′ (4) for all mixed expressions e, e′ , if eR̂A e′ (for A 6= ∅), then for all l ∈ lit(A), D̂l (e)R̂A\{base (l)} D̂l (e ). A syntactic bisimulation resembles a bisimulation, but is defined over mixed expressions, rather than over mixed languages. The next theorem shows that any two equivalent mixed expressions are related by a finite syntactic bisimulation, that is, a syntactic bisimulation R̂ where the number of pairs in each relation R̂A is finite. Theorem 7.1: For all mixed expressions e1 , e2 , of type A → ∅, M (e1 ) = M (e2 ) if and only if there exists a finite syntactic bisimulation between e1 and e2 . Proof: (⇐) It is easy to check that a syntactic bisimulation R̂ induces a bisimulation R such that e1 R̂A e2 if and only if M (e1 )RA M (e2 ). The result then follows by Corollary 3.9. (⇒) We first show how to construct, for every mixed expression e with ⊢ e : Ae → Be , a finitestate automaton M = (hSA iA∈℘(B)S, hδA iA∈℘(B) ) with transition functions δ∅ : S∅ × P → SB and (for A 6= ∅) δA : SA × lit(A) → A∈℘(B) SA , satisfying the conditions (1) δA (s, l) ∈ SA\{base(l)} , (2) the states of SA are mixed expressions having type A → Be , (3) e is a state of SAe , ACI (4) if δ∅(s1 , p) = s2 , then D̂p (s1 ) = s2 , and ACI (5) if δA (s1 , l) = s2 , then D̂l (s1 ) = s2 . We define the automaton by induction on the structure of e. The cases for 0, 1, p, l are straightforward. We focus on the remaining cases: Case e = e1 + e2 : Assume by induction that we have automata M1 , M2 for e1 and e2 . Define: SA = {f1 + f2 : f1 ∈ S1,A , f2 ∈ S2,A } δ∅(f1 + f2 , p) = δ∅(f1 , p) + δ∅(f2 , p) δA (f1 + f2 , l) = δ1,A (f1 , l) + δ2,A (f2 , l), for A 6= ∅, l ∈ lit(A). Case e = e1 · e2 : Let ⊢ e1 : A1 → B1 . Assume by induction that we have automata M1 ,M2 for 18 e1 and e2 . Define: P SA = {f · e2 + P t·g+ δ∅(f      g : g∈G (t,g)∈E f ∈ S1,A , E ⊆ Tests(A → B1 ) × S2,B1 , G ⊆ S2,A } P g, p) = · e2 + g∈G P δ2,∅(g, p) if B = ∅, ǫ̂(f ) = 1 δ1,∅(f, p) · e2 + δ2,∅(e2 , p) + g∈G P δ2,∅(g, p) otherwise δ1,∅(f, p) · e2 + g∈G P g, l) = t·g+ δA (f · e2 + g∈G (t,g)∈E  P P  δ2,A (g, l) if base(l) ∈ A \ B1 δ1,A (f, l) · e2 + Dl (t) · g +    g∈G (t,g)∈E  P P    δ1,A (f, l) · e2 + δ2,A (g, l) if base(l) 6∈ A ∪ B1 t · δ2,B1 (g, l) + P g∈G (t,g)∈E if base(l) ∈ B1   δ1,A (f,   P l) · e2 + T̂ (f ) · δ2,B P1 (e2 , l)+   δ2,A (g, l) t · δ (g, l) +  2,B 1  g∈G (t,g)∈E for A 6= ∅, l ∈ lit(A). Case e = e∗1 : Let ⊢ e1 : A1 → A1 . Assume by induction that we have an automaton M1 for e1 . Define:  P ∗  f · e∗1 : γ ∈ {0, 1}, F ⊆ S1,A1 } if A = A1  {γ · e1 + f ∈F P SA = otherwise f · e∗1 : F ⊆ S1,A }   { f ∈F P f · e∗1 , p) = δ∅(γ · e∗1 + f ∈F P P ǫ̂(f ) · δ1,∅(e, p) · e∗1 , δ1,∅(f, p) · e∗1 + γ · δ1,∅(e1 , p) · e∗1 + f ∈F f ∈F for A = A1 X X δ∅( f · e∗1 , p) = δ1,∅(f, p) · e∗1 , for A 6= A1 , f ∈F f ∈F f · e∗1 , l) = f ∈F P P ǫ̂(f ) · δ1,A (e, l) · e∗1 , δ1,A (f, l) · e∗1 + γ · δ1,A (e1 , l) · e∗1 + δA (γ · e∗1 + P f ∈F f ∈F for A 6= ∅, A = A1 , l ∈ lit(A) X X δA ( f · e∗1 , l) = δ1,A (f, l) · e∗1 , for A 6= ∅, A 6= A1 , l ∈ lit(A). f ∈F f ∈F It is straightforward (if tedious) to verify that the resulting automaton satisfies properties (1)-(5) given above. This completes the construction of the finite state mixed automaton corresponding to e. Given equivalent mixed expressions e1 and e2 of type A → ∅, a finite syntactic bisimulation R̂ can be constructed as follows. First, construct the automata M1 and M2 corresponding to e1 and 19 e2 . Then, initialize R̂ to contain the pair (e1 , e2 ), and iterate the following process: for every (e, e′ ) in R̂, add the pairs (δ1,B (e, x), δ2,B (e′ , x)) (where e, e′ have type B → ∅), for all x. Perform this iteration until no new pairs are added to R̂. This must terminate, because there are finitely many pairs of states (e, e′ ) with e in M1 and e′ in M2 . It is straightforward to check that R̂ is a syntactic bisimulation, under the assumption that M (e1 ) = M (e2 ). The procedure described in the proof of Theorem 7.1 can in fact be easily turned into a procedure for deciding if two mixed expressions are equivalent. To perform this decision, construct R̂, and verify that at all pairs of states (e, e′ ) in R̂, ǫ̂(e) = ǫ̂(e′ ). If this verification fails, then the two mixed expressions are not equivalent; otherwise, they are equivalent. The bisimulation in Section 6 is indeed a bisimulation induced by a syntactic bisimulation on the mixed expressions α and β. 8 Conclusions and Future Work We believe that proofs of equivalence between mixed expressions such as α and β via bisimulation are in general more easily derived than ones obtained through a sound and complete axiomatization of KAT. Given two equivalent mixed expressions, we can exhibit a bisimulation using the purely mechanical procedure underlying Theorem 7.1: use the derivative operators to construct a finite bisimulation in which the two expressions are paired. In contrast, equational reasoning typically requires creativity. The “path independence” of a mixed automaton (condition A2) gives any mixed automaton a certain form of redundancy. This redundancy persists in the definition of bisimulation, and is the reason why a pseudo-bisimulation, a seemingly weaker notion of bisimulation, gives rise to a bisimulation. An open question is to cleanly eliminate this redundancy; a particular motivation for doing this would be to make proofs of expression equivalence as simple as possible. Along these lines, it would be of interest to develop other weaker notions of bisimulation that give rise to bisimulations; pseudo-bisimulations require a sort of “fixed variable ordering” that does not seem absolutely necessary. Another issue for future work would be to give a class of expressions wider than our mixed expressions for which there are readily understandable and applicable rules for computing derivatives. In particular, a methodology for computing derivatives of the KAT expressions defined by Kozen [1997] would be nice to see. Intuitively, there seems to be a tradeoff between the expressiveness of the regular expression language and the simplicity of computing derivatives (in the context of KAT). Formal work towards understanding this tradeoff could potentially be quite useful. Acknowledgments The authors wish to thank Dexter Kozen for helpful comments on a draft of this paper, as well as the anonymous referees who helped improve the presentation of the results. The second author was supported by NSF under grant CTC-0208535, by ONR under grants N00014-00-1-03-41 and N00014-01-10-511, and by the DoD Multidisciplinary University Research Initiative (MURI) program administered by the ONR under grant N00014-01-1-0795. 20 References Brzozowski, J. A. (1964). Derivatives of regular expressions. Journal of the ACM 11(4), 481– 494. Conway, J. H. (1971). Regular Algebra and Finite Machines. London, UK: Chapman and Hall. Hopcroft, J. E. and J. D. Ullman (1979). Introduction to Automata Theory, Languages, and Computation. Addison Wesley. Kaplan, D. (1969). Regular expressions and the equivalence of programs. Journal of Computer and Systems Sciences 3, 361–386. Kleene, S. C. (1956). Representation of events in nerve nets and finite automata. In C. E. Shannon and J. McCarthy (Eds.), Automata Studies, pp. 3–41. Princeton, NJ: Princeton University Press. Kozen, D. (1994). A completeness theorem for Kleene algebras and the algebra of regular events. Information and Computation 110, 366–390. Kozen, D. (1997). Kleene algebra with tests. Transactions on Programming Languages and Systems 19(3), 427–443. Kozen, D. (1998). Typed Kleene algebra. Technical Report 98-1669, Computer Science Department, Cornell University. Kozen, D. (1999). On Hoare logic and Kleene algebra with tests. In Proceedings of the Conference on Logic in Computer Science (LICS’99), pp. 167–172. IEEE Computer Society Press. Kozen, D. (2002). On Hoare logic, Kleene algebra, and types. In Scope of Logic, Methodology, and Philosophy of Science: Volume 1 of the 11th Int. Congress Logic, Methodology and Philosophy of Science, Cracow, August 1999, Volume 315 of Studies in Epistemology, Logic, Methodology, and Philosophy of Science, pp. 119–133. Kluwer. Kozen, D. (2003). Automata on guarded strings and applications. Matématica Contemporânea 24, 117–139. Kozen, D. and F. Smith (1996). Kleene algebra with tests: Completeness and decidability. In Proceedings of the 10th Workshop on Computer Science Logic (CSL’96), Volume 1258 of Lecture Notes in Computer Science, pp. 244–259. Springer-Verlag. Rutten, J. J. M. M. (1998). Automata and coinduction (an exercise in coalgebra). In Proceedings of CONCUR’98, Volume 1466 of Lecture Notes in Computer Science, pp. 193–217. Rutten, J. J. M. M. (1999). A note on coinduction and weak bisimilarity for while programs. Theoretical Informatics and Applications (RAIRO) 33, 393–400. Rutten, J. J. M. M. (2000). Universal coalgebra: a theory of systems. Theoretical Computer Science 249(1), 3–80. Salomaa, A. (1966). Two complete axiom systems for the algebra of regular events. Journal of the ACM 13(1), 158–169. 21
2cs.AI
Block Sparse Memory Improved Proportionate Affine Projection Sign Algorithm gl  n   h  n   h0  n  h1  n  sgn   hˆ  n   [hˆ 0  n  , hˆ 1  n  , y  n    y  n  y  n  1 (2) gk  n   in which 1P hˆ k  n   2 (12) 1    2L  1    2 N  i 0 N 1 , g N 1  n  1P  (13) hˆ k  n  2 hˆ i  n    , (14) 2 is a P-length column vector of all ones, and  P hˆ 2 j 1 kN  j  n , k  0,1, , N 1 . The weight update equation for BS-MIP-ASPA is M most P  n   g  n  x  n  , P1  n  1 , x gs  n   P  n  sgn  e  n   , (4) (5) hˆ  n   hˆ  n  1  y  n  M  1 , (6) T  x gs  n    xTgs  n  x gs  n  where P1  n  1 also contains the first where M is called the projection order. In [5], MIP-APSA proposed the following weight update: , g L 1  n  , , hˆ N 1  n ], g  n   g0  n  1P , g1  n  1P , recent input vectors together: e  n   y  n   X  n  hˆ  n  1 ,  is a small then the control matrix g  n  in (7)-(8) is be replaced by hˆ  n  be the L1 adaptive filter coefficient vector which estimates the T M  1 columns of P  n  1 , and L  N  P , time index, and v  n  is the background noise plus near-end signals. Let x  n  M  1 , denotes the Hadamard Algorithm design: In network echo cancellation, the network echo path is typically characterized by a bulk delay dependent on network loading, encoding, and jitter buffer delays and an “active” dispersive region in the range of 8-12 ms duration [1]. Meanwhile, it is well-known that NLMS is preferred over PNLMS for dispersive system. Therefore, considering the block-sparse characteristic of the network impulse response, the BSPNLMS algorithm was proposed to improve the PNLMS algorithm by exploiting this special block-sparse characteristic, in which BS-PNLMS used the same step-size within each block and the step-sizes for each block were proportionate to their relative magnitude [7]. We propose to take in account the block-sparse characteristic and partition the MIPAPSA adaptive filter coefficients into N groups with group-length P , T denotes transposition, L is the filter length, n is the X  n   x  n  x  n  1 (11) , L  1 ,  is a small positive constant takes the sign of each element of a vector, and (3) true echo path vector h  n  at iteration n , and group the , positive constant. Compared with RIP-PAPSA, MIP-PAPSA takes into account the ‘proportionate history’ from the last M moments of time. More details can be found in [5]-[6]. (1) T (10)   xTgs  n  x gs  n  product, P1  n  1 contains the first T hL 1  n  , (9)  x gs  n  that avoids division by zero, the operation filtered through the echo path h  n  to get the desired signal y  n  . x  n  L  1 , (8) x  n  , P1  n  1 , where 1    1 , l  0,1, Review of MIP-APSA: For echo cancellation, the far-end signal x  n  is x  n    x  n  x  n  1 . L 1 2 i  0 hˆi  n    hˆ  n  1  hˆ  n   Introduction: Adaptive filters have been widely used in various applications of system identification in which the normalized least mean square (NLMS) algorithm is well-known due to its simplicity, but suffers from slow convergence for colored input [1]. The affine projection algorithm (APA) provides better convergence for colored input compared with NLMS [2]. Meanwhile, the family of affine projection sign algorithm (APSA) has been proposed to improve the performance of APA under impulsive noise together with lower complexity [3]. In order to exploit the sparsity of some echo paths, the real-coefficient improved proportionate APSA (RIP-APSA) was proposed [4], and a memory improved proportionate APSA (MIP-APSA) was further proposed to achieve improved steady-state misalignment with similar computational complexity compared with RIP-APSA [5]. Recently, the block-sparse improved proportionate NLMS (BS-IPNLMS) algorithm was proposed to improve the performance of IPNLMS for identifying block-sparse systems [7]. In this Letter, motived by both BS-PNLMS and MIP-APSA, we will propose a block sparse memory improved proportionate APSA (BS-MIP-APSA) algorithm, which not only inherits the performance improvement for block-sparse system identification, but also achieves robustness to impulsive noise and the efficiency of MIP-APSA. y(n)  xT (n)h(n)  v(n) 1    hˆl  n   x gs  n   P  n  sgn  e  n   , A block sparse memory improved proportionate affine projection sign algorithm (BS-MIP-APSA) is proposed for block sparse system identification under impulsive noise. The new BS-MIP-APSA not only inherits the performance improvement for block-sparse system identification, but also achieves robustness to impulsive noise and the efficiency of the memory improved proportionate affine projection sign algorithm (MIP-APSA). Simulations indicate that it can provide both faster convergence rate and better tracking ability under impulsive interference for block sparse system identification as compared to APSA and MIP-APSA. g  n   g0  n  , g1  n  , 2L P  n   g  n  J. Liu, and S. L. Grant super-script 1    (15) (16) (17) M  1 columns of P  n  1 . It should be noted that the proposed BS-MIP-APSA includes both APSA and MIP-APSA. The MIP-APSA algorithm is a special case of proposed BS-MIP-APSA with group length P  1 . Meanwhile, when P is chosen as L , the BS-MIP-APSA algorithm degenerates to APSA. (7) 1 Complexity: Compared with traditional RIP-APSA and MIP-APSA, the extra computational complexity of the BS-MIP-APSA arises from the computation of the l2 norm in (14), which requires 10 L multiplications 0 Normalized Misalignment and N square roots. The complexity of the square root could be reduced through a look up table or Taylor series [7]. Meanwhile, the increase in complexity can be offset by the performance improvement as shown in the simulation results. Simulation results: In our simulation, the echo path is a L  512 finite impulse response (FIR) filter, and the adaptive filter is the same length. We generated colored input signals by filtering white Gaussian noise through a first order system with a pole at 0.8. Independent white Gaussian noise is added to the system background with a signal-to-noise ratio (SNR) of 40 dB. The impulsive noise with signal-to-interference ratio (SIR) of 0 dB is generated as a Bernoulli-Gaussian (BG) distribution. BG is a product of a Bernoulli process and a Gaussian process, and the probability for Bernoulli process is 0.1. The performance was evaluated through the normalized misalignment: 10log10 ( h  hˆ 2 2 -10 -20 -30 -50 Normalized Misalignment 0 -0.5 100 150 200 250 (a) 300 350 400 450 2 3 4 Iterations 5 6 7 8 x 10 4 0 0.5 50 1 5 1 0 0 Fig. 2 Normalized misalignment of APSA, MIP-APSA, and BS-MIPAPSA for colored input signal. 2 h 2 ) . In order to evaluate the tracking ability, we switch the echo path from the one-cluster block-sparse system of Fig. 1(a) to the two-cluster blocksparse system of Fig. 1(b). -1 APSA MIP-APSA BS-MIP-APSA -40 -5 -10 -15 -20 -25 APSA MIP-APSA BS-MIP-APSA 500 -30 0.4 -35 0.2 0 1 2 3 4 Iterations 5 6 7 8 x 10 4 Fig. 3 Normalized misalignment of APSA, MIP-APSA, and BS-MIPAPSA for speech input signal. -0.2 -0.4 0 0 50 100 150 200 250 (b) 300 350 400 450 References 500 Fig. 1 Two block-sparse systems used in the simulations: (a) one-cluster block-sparse system, (b) two-cluster block-sparse system. 1 The APSA and MIP-APSA algorithms are compared with BS-MIPAPSA. The parameters are   0.001 ,   0.01 ,   0.01 ,   0 , 2 M  2 , and P  4 . In the first case, we show the normalized misalignment for colored input in Fig. 2. We could see that the proposed BS-MIP-APSA achieves both faster convergence rate and better tracking ability. In Fig. 3, the performance of BS-MIP-APSA is compared with APSA and MIP-APSA for speech input signal, and we found that our proposed algorithm demonstrates better performance too. 3 4 Conclusion: We have proposed a block-sparse memory improved affine projection sign algorithm to improve the performance of block-sparse system identification. Simulations demonstrate the proposed algorithm has both faster convergence speed and tracking ability for block-sparse system identification compared with APSA and MIP-APSA algorithms. 5 6 Acknowledgments: This work is supported by Wilkens Missouri Endowment. 7 J. Liu, and S. L. Grant (Department of Electrical and Computer Engineering, Missouri University of Science and Technology, Rolla, MO, USA) E-mail: [email protected] 2 Benesty, J., Gänsler, T., Morgan, D.R., Sondhi, M.M, and Gay, S.L., Advances in network and acoustic echo cancellation. Springer, 2001. Ozeki, K., and Umeda, T.: ‘’An adaptive filtering algorithm using an orthogonal projection to an affine subspace and its properties’, Electron. Commun. Jpn., 1984, 67-A, (5), pp. 1927 Shao, T., Zheng, Y. R., and Benesty, J.: ‘An affine projection sign algorithm robust against impulsive interferences’, IEEE Signal Process. Lett., 2010, 17, (4), pp. 327–330. Yang, Z., Zheng, Y.R., and Grant, S.L.: ‘Proportionate Affine Projection Sign Algorithms for Network Echo Cancellation’, IEEE Trans. Audio, Speech, Lang. Process., 19, (8), pp. 22732284. Albu, F., and Kwan, H.K.: ‘Memory improved proportionate affine projection sign algorithm’, Electron. Lett., 2012, 48, (20), pp. 1279-1281. Paleologu, C., Ciochina, S., and Benesty, J.: ‘An efficient proportionate affine projection algorithm for echo cancellation’, IEEE Signal Process. Lett., 2010, 17, (2), pp. 165–168 Liu, J., and Grant, S.L.: ‘Proportionate adaptive filtering for block-sparse system identification’, arXiv preprint arXiv:1508.04172, 2015
3cs.SY
arXiv:1311.5107v1 [math.AC] 20 Nov 2013 FACTORIZATION IN THE SELF-IDEALIZATION OF A PID GYU WHAN CHANG AND DANIEL SMERTNIG   a b Abstract. Let D be a principal ideal domain and R(D) = { | 0 a a, b ∈ D} be its self-idealization. It is known that R(D) is a commutative noetherian ring with identity, and hence R(D) is atomic (i.e., every nonzero nonunit can be written as a finite product of irreducible elements). In this paper, we completely characterize the irreducible elements of R(D). We then use this result to show how to factorize each nonzero nonunit of R(D) into irreducible elements. We show that every irreducible element of R(D) is a primary element, and we determine the system of sets of lengths of R(D). 1. Introduction Let R be a commutative noetherian ring. Then R is atomic, which means that every nonzero nonunit element of R can be written as a finite product of atoms (irreducible elements) of R. The study of non-unique factorizations has found a lot of attention. Indeed this area has developed into a flourishing branch of Commutative Algebra (see some surveys and books [3, 6, 8, 5]). However, the focus so far was almost entirely on commutative integral domains, and only first steps were done to study factorization properties in rings with zero-divisors (see [2, 7]). In the present note we study factorizations in a subring of a matrix ring over a principal ideal domain, which will turn out to be a commutative noetherian ring with zero-divisors. To begin with, we fix our notation and terminology. Let R be a commutative ring with identity and U (R) be the set of units of R. Two elements a, b ∈ R are said to be associates if aR = bR. Clearly, if a = ub for some u ∈ U (R), then a and b are associates. An a ∈ R is said to be irreducible if a = bc implies that either b or c is associated with a. We say that R is atomic if every nonzero nonunit of R is a finite product of irreducible elements. It is clear that noetherian rings are atomic (cf. [2, Theorem 3.2]) and that 0 ∈ R is irreducible if and only if R is an integral domain. A ring R is a half-factorial ring (HFR) (resp., bounded factorization ring (BFR)) if R is atomic and two factorizations of a nonzero nonunit into irreducible elements have the same length (resp., for each nonzero nonunit x ∈ R, there is an integer N (x) ≥ 1 so that for any factorization x = x1 · · · xn , where each xi is a nonunit, we have n ≤ N (x)). R is a FFR (finite factorization ring) if R is atomic and each nonzero nonunit has only finitely many factorizations into irreducibles, up to order and associates. A nonzero nonunit x ∈ R is said to be prime (resp., primary) if xR Date: 24.5.2013. 2010 Mathematics Subject Classification. 13A05, 13F15, 20M13, 20M14. Key words and phrases. non-unique factorizations, matrix ring, noetherian ring, sets of lengths. 1 2 G.W. CHANG AND D. SMERTNIG is a prime (resp., primary) ideal. Hence a prime element is primary but not vice versa (for example, if Z is the ring of integers, then 4 ∈ Z is primary but not prime). We say that R is a unique factorization ring (UFR) if every nonzero principal ideal of R can be written as a product of principal prime ideals (cf. [2, Theorem 4.9]). Clearly, a prime element is irreducible, and so a UFR is atomic. For x ∈ R a nonzero nonunit, its set of lengths is defined as L(x) = { k ∈ N | there exist irreducibles u1 , . . . , uk ∈ R with x = u1 · . . . · uk }. Clearly, x is irreducible if and only if L(x) = { 1 }. If x ∈ U (R), we set L(x) = { 0 }. The system of sets of lengths is defined as L(R) = L(x) | x ∈ R \ { 0 } . Sets of lengths and invariants derived from them are some of the classical invariants considered in non-unique factorization theory (see [8, Ch. 1.4]). The reader is referred to [8] for undefined definitions and notations. Let M be an R-module. The idealization R(+)M of M is a ring, which is defined as an abelian group R ⊕ M , whose ring multiplication is given by (a, b) · (x, y) = (ax, ay + bx) for all a, x ∈ R and b, y ∈ M . It is known that R(+)M is a noetherian ring if and only if R is noetherian and M is finitely generated [4, Theorem 4.8]. Let D be an  integral  domain, Mat2×2 (D) be the ring of 2 × 2 matrices over D, and a b R(D) = { | a, b ∈ D}. It is easy to show that R(D) is a commutative 0 a ring with identity under the usual matrix addition and multiplication;  in particular,  a 0 embeds D into R(D) is a subring of Mat2×2 (D). Clearly, the map a 7→ 0 a   a b R(D), and the map ϕ : D(+)D → R(D), given by ϕ(a, b) = , is a ring 0 a isomorphism. In view of this isomorphism, R(D) is called the self-idealization of D (cf.[13]). There is also an isomorphism D[X]/hX 2 i → R(D) mapping a+bX +hX 2 i a b to . Some factorization properties of R(+)M have been studied in [2, 0 a Theorem 5.2]. For more on basic properties of R(+)M (and hence of R(D)), see [4] or [11, Section 25]. Let D be a principal ideal domain (PID). Then R(D) is noetherian, and thus R(D) is atomic. In Section 2, we first characterize the irreducible elements of R(D), and we then use this result to show how to factorize each nonzero nonunit  of R(D)  0 1 into irreducible elements via the factorization of D. We show that is 0 0 the unique prime element (up to associates) of R(D). We prove that every nonzero nonunit of R(D) can be written as a product of primary elements. Finally, in Section 3, we completely describe the system of sets of lengths L(R(D)). We write N = { 1, 2, 3, . . . } for the set of positive integers, and N0 = N ∪ { 0 } for the set of non-negative integers. 2. Factorization in R(D) when D is a PID Let D be an integral domain, and   a b R(D) = { | a, b ∈ D} 0 a FACTORIZATION IN THE SELF-IDEALIZATION OF A PID 3   1 0 be the self-idealization of D. Clearly, is the identity of R(D). 0 1   a b If α = ∈ R(D), then nr(α) = a is the norm, and this is a ring homo0 a morphism R(D) → D. Observe that α is a zero-divisor if and only if a = 0. We write R(D)• for the monoid of non-zero-divisors of R(D). We begin this paper by characterizing the units of R(D), which is very useful in the proof of Theorem 5. Lemma 1. (cf. [11, Theorem 25.1(6)]) If D is an integral domain, then α =  a b ∈ R(D) is a unit of R(D) if and only if a is a unit of D. 0 a       x y 1 0 x y Proof. If α is a unit, then α · = for some ∈ R(D). 0 x 0 1 0 x Thus ax = 1, and  so a∈ U (D). Conversely,   assume  that  a is a unit,  and let a b u −bu2 1 0 u −bu2 −1 u = a . Then = and ∈ R(D). 0 a 0 u 0 1 0 u Thus α is a unit.  For an arbitrary commutative ring R, there can be two elements a, b ∈ R such that a and b are associates but a 6= ub for all u ∈ U (R) (see, for example, [2, Example 2.3]). This cannot happen in the self-idealization of an integral domain. Lemma 2. Let D a such that α = 0 be an integral  domain  and α, β ∈ R(D) and let a, b, x, y ∈ D b x y and β = . The following statements are equivalent. a 0 x (1) α and β are associates. (2) There exists θ ∈ U (R(D)) such that β = θα. (3) There exists u ∈ U (D) such that x = au and y ≡ bu mod a. Proof. (1) ⇒ (2): If α and β are associates, are some so  then there   γ, δ ∈ R(D)  a1 b 1 x1 y1 that α = βγ and β = αδ. Hence if γ = and δ = , then 0 a1 0 x1 a = xa1 and x = ax1 , and a1 , x1 ∈ U (D). Thus γ, δ ∈ U (R(D)) by Lemma 1.  so  u v (2) ⇒ (3): Let θ = . By Lemma 1, u ∈ U (D). From β = θα it follows 0 u that x = au and y = av + bu ≡ bu mod a.   u v (3) ⇒ (2) and (1): Let v ∈ D be such that y = bu + av. Define θ = . 0 u Then θ ∈ U (R(D)) by Lemma 1 and β = θα. Thus, α and β are associates.  We write α ≃ β if α, β ∈ R(D) are associates.   a b Lemma 3. Let D be a PID and let α = ∈ R(D)• . If a = cd with coprime 0 a c, d ∈ D, then there exist γ, δ ∈ R(D) with α = γδ and nr(γ) = c, nr(δ) = d. This representation is unique in the sense that, if γ ′ , δ ′ ∈ R(D) with α = γ ′ δ ′ and nr(γ ′ ) ≃ c, nr(δ ′ ) ≃ d, then γ ≃ γ ′ and δ ≃ δ ′ . 4 G.W. CHANG AND D. SMERTNIG Proof. Existence: Since 1 ∈  GCD(c,  d) and Dis a PID,  there exist e, f ∈ D such c e d f that b = cf + ed. Then γ = and δ = are as claimed. 0 c 0 d     ′ d′ f ′ c e′ with c′ , e′ , d′ , f ′ ∈ D and and δ ′ = Uniqueness: Let γ ′ = ′ 0 d′ 0 c suppose that α = γ ′ δ ′ . Let u, v ∈ U (D) such that c′ = cu and d′ = dv. Since c′ d′ = cd, necessarily v = u−1 . Since cf + ed = c′ f ′ + e′ d′ = c(f ′ u) + d(e′ v), we have c(f ′ u) ≡ cf mod d and f ′ u ≡ f mod d, i.e., f ′ ≡ f v mod d. Therefore δ ′ ≃ δ and similarly γ ′ ≃ γ.  Corollary 4. Let D be a PID and let α ∈ R(D)• \ U (R(D)). Then there exist β1 , . . . , βn ∈ R(D)• of pairwise distinct prime power norm, such that α = β1 ·. . .·βn . This representation is unique up to order and associates. Proof. Let nr(α) = pe11 · . . . · penn with n ≥ 0, p1 , . . . , pn ∈ D pairwise distinct prime elements and e1 , . . . , en ≥ 1. By induction on n and the previous lemma, there exist β1 , . . . , βn ∈ R(D)• such that α = β1 · . . . · βn and nr(βi ) = pei i for all i ∈ [1, n]. ′ Suppose α = β1′ · . . . βm is another such factorization. Since D is a UFD, then ′ m = n and there exists a permutation π ∈ Sn such that nr(βπ(i) ) ≃ nr(βi ) for all i ∈ [1, n]. The uniquenes statement of the previous lemma implies βi′ ≃ βi for all i ∈ [1, n].  As a consequence, to study factorizations of α ∈ R(D)• , it is sufficient to study factorizations of α ∈ R(D)• with prime power norm. We next give the first main result of this paper, which completely characterizes the irreducible elements of R(D) when D is a PID.   a b Theorem 5. Let D be a PID and α = ∈ R(D). Then α is irreducible 0 a if and only if either (i) a = 0 and b ∈ U (D), (ii) a = p or (iii) a = upn and 1 ∈ GCD(a, b) for some prime p ∈ D, u ∈ U (D), and integer n ≥ 2.     b 0 0 1 Proof. Necessity. Assume that a = 0, and let β = and γ = . 0 b 0 0 Then α = β · γ and αR(D)  6= βR(D)  because b 6= 0. Hence αR(D) = γR(D), and x y so γ = α · δ for some δ = ∈ R(D). Thus bx = 1. 0 x Next, assume that a 6= 0. If a is not of the form upn , then Lemma 3 implies that α = β · γ with nr(β) and nr(γ) nonzero nonunits. Hence α is not irreducible, a contradiction. Thus a = upn for some prime p ∈ D, u ∈ U (D), and integer n ≥ 1. If n = 1, then up is also a prime element of D and we have case (ii). Finally, assume that n ≥ 2 and pk ∈ GCD(a, b) for someinteger  k ≥ 1. Let p 0 and ξ = b = b1 pk , where b1 ∈ D. Then α = θ · ξ, where θ = 0 p   upn−1 b1 pk−1 , but θ, ξ 6∈ αR(D), a contradiction. This completes the proof. 0 upn−1     x2 y2 x1 y1 . We and γ = Sufficiency. Let α = β · γ, where β = 0 x2 0 x1 will show that β or γ is a unit, and thus α is irreducible. FACTORIZATION IN THE SELF-IDEALIZATION OF A PID 5 Case 1. a = 0 and b ∈ U (D). Note that x1 = 0 or x2 = 0; so for convenience, let x2 = 0. Then x1 y2 = b, and since b ∈ U (D), we have x1 ∈ U (D). Thus β is a unit of R(D) by Lemma 1. Case 2. a = p for a prime p ∈ D. Then α = β · γ implies that either x1 or x2 is a unit in D. Hence β or γ is a unit in R(D) by Lemma 1. Case 3. a = upn for a prime p ∈ D,u ∈ U (D), n≥ 2 and 1  ∈ GCD(a, b). Since p wpn−k y vpk x and γ = is a prime and α = β · γ, we have β = k 0 wpn−k 0 vp for some 0 ≤ k, n − k ≤ n, x, y ∈ D, and v, w ∈ U (D) with vw = u. Hence b = pk vy + pn−k wx, and thus k = 0 or n − k = 0 because a and b are coprime. Therefore β or γ is a unit in R(D) by Lemma 1.    a b Corollary 6. Let D be a PID and α = ∈ R(D) be a nonzero nonunit 0 a such that c ∈ GCD(a, b), a = ca1 , and b = cb1 for some c, a1 , b1 ∈ D. Let c = km upe11 · · · penn and a1 = q1k1 · · · qm (when a 6= 0) be prime factorizations of c and a1 , respectively, where u ∈ U (D). The following is a factorization of α into irreducible elements.    ei 0 u Qn pi 0 (1) If a = 0, then α = . i=1 0 0 0 pi !    ei k Qm qj j cj u 0 Qn pi 0 ) for some (2) If a 6= 0, then α = ( i=1 )( j=1 k 0 u 0 pi 0 qj j cj ∈ D with 1 ∈ GCD(cj , qj ). Proof. (1) Clear. (2) We first note that α =  c 0 0 c  =   c 0 u 0 0 u 0 c   a1 0 p1 0 0 p1 b1 a1  e1 ··· and  pn 0 0 pn en . Next, assume that a1 = b2 d2 for some b2 , d2 ∈ D with 1 ∈ GCD(b2 , d2 ). Then there are some x, y ∈ D such that b 2 (xb    1 ) + d2 (yb1 ) = b1 because D is a PID, a1 b 1 b2 yb1 d2 xb1 and hence = . Note that 1 ∈ GCD(a1 , b1 ); 0 a1 0 b2 0 d2 hence 1 ∈ GCD(b2 , yb1 ) and 1 ∈ GCD(d ! 2 , xb1 ). So by repeating this process, we   kj Qm cj q a1 b 1 for some cj ∈ D with 1 ∈ GCD(cj , qj ).  = j=1 j have k 0 a1 0 qj j Corollary 7. If D is a PID, then associates) of R(D).  0 1 0 0  is the unique prime element (up to Proof. Clearly, prime elements are and hence by Theorem 5, we have  irreducible,  a b three cases to consider. Let α = ∈ R(D) be irreducible. 0 a 6 G.W. CHANG AND D. SMERTNIG   0 1 Case 1. a = 0 and b ∈ U (D). Note that if we set I = , then α = 0 0     b 0 b 0 I· and ∈ U (R(D)) by Lemma 1; so α and I are associates. 0 b 0 b     x y c d Let β = ,γ = ∈ R(D). Then βγ ∈ IR(D) if and only if 0 x 0 c xc = 0; so if x = 0 (for convenience), then β ∈ IR(D). Thus I is a prime. Cases 2 and 3. a 6= 0. Note that  2  2  a b−1 a 2a(b − 1) = 0 a 0 a2    a b a b−2 = ∈ αR(D), 0 a 0 a   a b−1 but 6∈ αR(D) because a 6∈ U (D). Thus α is not a prime.  0 a For zero-divisors and elements with prime power norm, the following lemma further refines Corollary 6, by giving all possible factorizations, up to order and associates. The general case can be obtained in combination with Corollary 4.   a b Lemma 8. Let D be a PID, and let α = ∈ R(D) \ { 0 } with a, b ∈ D. 0 a (1) Suppose a = 0 and b = q1 · . . . · qn , with (possibly associated) prime powers q1 , . . . , qn ∈ D. Then, for every choice of a1 , . . . , an ∈ D,   n   0 1 Y qi ai α= , 0 qi 0 0 i=1 and this is a factorization into irreducibles if and only if for all i ∈ [1, n] either qi is prime or 1 ∈ GCD(qi , ai ). (2) Suppose a = pn with p ∈ D a prime element and n ∈ N. For all l ∈ [1, n] let ml ∈ N0 and for all j ∈ [1, ml ] let al,j ∈ D. Then  ml  l n Y Y p al,j α= 0 pl l=1 j=1 Pn Pn n−l Pml if and only if n = ( j=1 al,j ). This is a l=1 ml l and b = l=1 p product of irreducibles if and only if 1 ∈ GCD(al,j , p) for all l ∈ [2, n] and j ∈ [1, ml ]. Up to order and associativity of the factors, all the factorizations of α are of this form. Proof. This is checked by a straightforward calculation. The statement about the irreducibles follows from the characterization of the irreducible elements in Theorem 5. That every representation of α as a product of irreducibles is, up to order and associates, one of the stated ones also follows from this characterization.  Corollary 9. Let D be a PID. (1) R(D) is a BFR. FACTORIZATION IN THE SELF-IDEALIZATION OF A PID 7 (2) R(D) is a FFR if and only if D/pD is finite for all prime elements p ∈ D. (3) If D is a field, then every nonzero nonunit of R(D) is a prime, and hence R(D) is a UFR with a unique nonzero (prime) ideal.   a b Proof. (1) By Corollary 6, R(D) is atomic, and if α = ∈ R(D), then 0 a the lengths of factorizations of α into irreducible elements are less than or equal to that of the prime factorization of a or b in D, plus at most one. Thus R(D) is a BFR. (2) Suppose first that D/pD is finite for all prime elements p ∈ D. Then also D/pn D is finite for all n ≥ 1 and all prime elements p ∈ D. Hence, by the Chinese Remainder Theorem, D/cD is finite for all nonzero c ∈ D. Let c ∈ D• . By Lemma 2(3) there exist, up to associativity, only finitely many elements γ ∈ R(D) with nr(γ) ≃ c. If α ∈ R(D)• and γ|α, then nr(γ)| nr(α), and therefore there are, up to associativity, only finitely many irreducibles that can possibly divide α. Together with (1), this implies that every α ∈ R(D)• has only finitely many  factorizations.  0 b If α = ∈ R(D) is a zero-divisor, then every factorization has exactly one 0 0   0 1 factor associated to and if γ is any other factor in the factorization then 0 0 nr(γ) | b (cf. Lemma 8(1)). By the same argument as before, α has only finitely many factorizations. For the converse, suppose that p ∈ D is a prime element and |D/pD| = ∞. Since  2     p 0 p a p −a = , 0 p2 0 p 0 p  2  p 0 for all a ∈ D, has infinitely many (non-associated) factorizations in 0 p2 R(D).   a b (3) Let α = ∈ R(D) be a nonzero nonunit. Since D is a field, by 0 a   0 1 Lemma 1, a = 0 and b ∈ U (D). Hence α is associated with I := , and 0 0 so α is a prime by the proof of Corollary 7. Thus R(D) is a UFR and IR(D) is a unique nonzero (prime) ideal of R(D).  If D is a PID but not a field, we will see in Corollary 15 that R(D) is not a UFR, even when D is the ring of integers. We next prove that every nonunit of R(D) can be written as a (finite) product of primary elements. √ Lemma 10. Let R be a commutative ring. If a ∈ R is such that aR is a maximal ideal, then aR is primary. √ √ Proof. Let x, y ∈ R be such √ √ that xy ∈ aR but x√ 6∈ aR. Note that aR ( aR + xR; so aR + xR = aR + xR = R because aR is a maximal ideal. Hence 1 = as + xt for some s, t ∈ R. Thus y = y(as + xt) = a(ys) + (xy)t ∈ aR.  8 G.W. CHANG AND D. SMERTNIG Corollary 11. If D is a PID, then every irreducible element of R(D) is primary. In particular, each nonzero nonunit of R(D) can be written as a finite product of primary elements.   a b Proof. Let α = ∈ R(D) be irreducible. By Theorem 5, there are three 0 a cases that we have to consider. Case 1. a = 0 and b ∈ U (D). By Corollary 7, α is a prime, and hence a primary element. Cases 2 and 3. a = upn for some prime pelement p ∈ D, u ∈ U (D), and n ∈ N. By Lemma 10, it suffices to show that αR(D) is a maximal ideal. Let β =     p 0 d x y ∈ R(D), then δ 2 = 0, ∈ R(D) \ αR(D). Note that if δ = 0 0 0 x     p p x 0 upn 0 6∈ αR(D) and ∈ and hence δ ∈ αR(D). Hence 0 x 0 upn   p p p 0 αR(D). But then ∈ αR(D). Note also that if x ∈ pD, then 0 p      p x 0 p 0 x1 0 x = px1 for some x1 ∈ D, and so = ∈ αR(D), 0 x 0 p 0 x1 a contradiction. So x ∈ 6 pD, and hence xz + pz = 1 for some z1 , z 1 2 2 ∈ D. Thus        z1 0 1 0 z2 0 p 0 0 −yz1 =β· + + ∈ βR(D) + 0 z1 0 1 0 z2 0 p 0 0 p p αR(D). Therefore αR(D) is maximal.  Remark 12. In view of Corollary 11, Corollary 4 in fact corresponds to the (unique) primary decomposition of αR(D), as every prime ideal of R(D), except for 0(+)D, is maximal (cf. [4, Theorem 3.2]). Associativity is a congruence relation on (R(D)• , ·), and we denote by R(D)•red the corresponding quotient monoid. Corollary 4 may also be viewed as a monoid ` isomorphism R(D)•red ∼ = p R(D(p) )•red , where the coproduct is taken over all associativity classes of prime elements p of D, and D(p) is the localization at pD. 3. The sets of lengths in R(D) when D is a PID   a b Let D be an integral domain and R(D) = { | a, b ∈ D}. In this 0 a section, we characterize the sets of lengths in R(D) when D is a PID. Lemma 13. Let D be a PID and α, β ∈ R(D). (1) If αβ 6= 0, then L(α) + L(β) ⊂ L(αβ). (2) If nr(α) and nr(β) are coprime, then L(α) + L(β) = L(αβ). Proof. (1) Clear. (2) Let n ∈ L(αβ). Then there exist irreducible γ1 , . . . , γn ∈ R(D)• such that αβ = γ1 · . . . · γn . Then also nr(α) nr(β) = nr(γ1 ) · . . . · nr(γn ). Since 1 ∈ GCD(nr(α), nr(β)), we may without loss of generality assume nr(α) ≃ nr(γ1 ) · . . . · nr(γk ) and nr(β) ≃ nr(γk+1 ) · . . . · nr(γn ) for some k ∈ [0, n]. By Lemma 3, therefore α ≃ γ1 ·. . .·γk and β ≃ γk+1 ·. . .·γn , and n = k+(n−k) ∈ L(α)+L(β).  FACTORIZATION IN THE SELF-IDEALIZATION OF A PID 9 For a prime element p ∈ D we denote by vp : D → N0 ∪ { ∞ } the corresponding valuation, i.e., vp (0) = ∞ and vp (apk ) = k if k ∈ N0 and a ∈ D• is coprime to p.   a b Theorem 14. Let D be a PID, α ∈ R(D) and suppose α = with a, b ∈ D. 0 a (1) If a = 0, and b = pe11 · . . . · penn with pairwise non-associated prime elements p1 , . . . , pn ∈ D and e1 , . . . , en ∈ N, then L(α) = [1 + n, 1 + e1 + . . . + en ]. (2) Let p ∈ D be a prime element, n ∈ N and suppose a = pn and vp (b) = k ∈ N0 ∪ { ∞ }. Then L(α) = { 1 } if and only if k = 0 or n = 1. If k ≥ n − 1, then [3, n − 2] ∪ { n } ⊂ L(α) ⊂ [2, n − 2] ∪ { n }, and if k ∈ [1, n − 2], then [3, k + 1] ⊂ L(α) ⊂ [2, k + 1]. Moreover, if k ≥ 1, then 2 ∈ L(α) if and only if n is even or k < n 2. Proof. (1) This is clear from Lemma 8(1), as every factorization of b into prime powers gives a factorization of α (choose ai = 1), and conversely. (2) The cases k = 0 and n = 1 are clear from Theorem 5, so from now on we assume k ≥ 1 and n > 1. Let b = upk with u ∈ D and 1 ∈ GCD(u, p). We repeatedly make use of Lemma 8(2), and the notation used there to describe a factorization, without explicitly mentioning this fact every time. Claim A: L(α) ⊂ [2, min{ k + 1, n }]. Proof. Because α is not an atom, 1 6∈ L(α). Any factorization of α is associated to one in Lemma 8(2); we fix a factorization of α with notation as in the lemma. The P P length of the factorization is then t = nl=1 ml . Since nl=1 ml l = n, clearly t ≤ n. Pn P ml Moreover, necessarily ml = 0 for all l > n−(t−1). Since b = l=1 pn−l ( j=1 al,j ), therefore k = vp (b) ≥ vp (pn−(n−t+1) ) = t − 1, i.e., t ≤ k + 1. Claim B: 2 ∈ L(α) if and only if n is even or k < n 2. Proof. Suppose 2 ∈ L(α) and n is odd. Then n = l + (n − l) and b = pn−l al,1 + pl an−l,1 with 1 ∈ GCD(al,1 , p) and 1 ∈ GCD(an−l,1 , p). Since n is odd, then n − l 6= l and therefore k = vp (b) = min{ n − l, l } < n2 . For the converse suppose first 1 ≤ k < n2 . Then n = k + (n − k), n − k > k and b = pn−k · 1 + pk (u − pn−2k ) with 1 ∈ GCD(u − pn−2k , p). If n is even and k ≥ n2 , n n n then n = n2 + n2 and b = p 2 (1 + (upk− 2 − 1)) with 1 ∈ GCD(upk− 2 − 1, p). Claim C: If n − 1 ∈ L(α), then k = n − 2. Proof. For a corresponding factorization we must have m1 = n − 2, m2 = 1, and ml = 0 for all l > 2. Then b = pn−1 (a1,1 + . . . + a1,n−2 ) + pn−2 a2,1 with 1 ∈ GCD(a2,1 , p), whence k = vp (b) = n − 2. Claim D: Let n ≥ 3 and k ≥ 2. If either k = 2 or n 6= 4, then 3 ∈ L(α). Proof. Suppose first that n  p (1) α= 0 is odd and set b′ = b/p. Then   n−1  0 p b′ α′ with α′ = , p 0 pn−1 10 G.W. CHANG AND D. SMERTNIG and, by Claim B, 2 ∈ L(α′ ). Therefore 3 ∈ L(α). If n is even, n ≥ 6, and k ≥ 3, then  2 p α= 0 u p2   n−2 p 0  u(pk−2 − pn−4 ) , pn−2 where the first factor is irreducible and the second has a factorization of length 2 by Claim B. If k = 2, then  2  n−2  p 0 p u α= 0 p 0 pn−2 is a factorization of length 3. Claim E: If k ≥ n − 1, then n ∈ L(α). Proof. We use Lemma 8(2). Set m1 = n, a1,1 = upk−(n−1) and a1,2 = . . . = al,n = 0. Then pn−1 (upk−(n−1) + 0 + . . . + 0) = b. Claim F: If k ∈ [1, n − 2], then [3, k + 1] ⊂ L(α). Proof. If n ≤ 3 or k = 1, then the claim is trivially true, so we may assume k ≥ 2. We proceed by induction on n. Suppose n ≥ 4, and that the claim is true for n − 1. Let b′ = b/p and let α′ be as in (1). We have vp (b′ ) = k − 1 ≥ 1. ′ If k = 2, then 1 = k − 1 < n−1 2 , and hence 2 ∈ L(α ) (by Claim B). Therefore ′ { 3 } = [3, k + 1] ⊂ { 1 } + L(α ) ⊂ L(α). If k ≥ 3, then by induction hypothesis, [3, k] ⊂ L(α′ ), and thus [4, k + 1] = { 1 } + L(α′ ) ⊂ L(α), and by Claim D, also 3 ∈ L(α). Claim G: If k ≥ n − 1, then [3, n − 2] ⊂ L(α). Proof. If n ≤ 4, then the claim is trivially true. We again proceed by induction on n. Suppose n ≥ 5 (then k ≥ 4), and that the claim is true for n − 1. Let b′ = b/p and let α′ be as in (1). Again, vp (b′ ) = k − 1 ≥ 3 and by induction hypothesis [3, n − 3] ⊂ L(α′ ). Therefore [4, n − 2] ⊂ L(α) and by Claim D also 3 ∈ L(α). If k ≥ n − 1, then the claim of the theorem follows from claims A, B, C, E and G. If k ∈ [2, n − 2], then the claim of the theorem follows from claims A, B and F.  If α ∈ R(D) is a nonzero nonunit, and L(α) = { l1 , l2 , . . . , lk }, then theset of distances of α is defined as ∆(α) = { li − li−1 | i ∈ [2, k] }, and ∆ R(D) = S  ∆(α). For k ∈ N≥2 , set Uk R(D) = S α∈R(D),k∈L(α) L(α). α∈R(D)\ { 0 }∪U(R(D))   Corollary 15. If D is a PID, but not a field, then U2 R(D) = N≥2 and ∆ R(D) = { 1, 2 }. Proof. This follows directly from Theorem 14.  FACTORIZATION IN THE SELF-IDEALIZATION OF A PID 11 Corollary 16. Suppose D is a PID that has infinitely many pairwise non-associated prime elements. Then n o n o L(R(D)) = { 0 }, { 1 } ∪ [m, n] | m ∈ [2, n] n o ∪ [m, n] ∪ { n + 2 } | m ∈ [2, n] and n even n o ∪ [m, n] ∪ { n + 2 } | m ∈ [3, n] and n odd n ∪ m + 2[0, n] | with m ∈ N≥2n and n ∈ N }. Proof. The sets { 0 } and { 1 } correspond to units and irreducibles. For zerodivisors, the sets of lengths are discrete intervals and completely described in Theorem 14(1). By Corollary 4 and Lemma 13(2), the sets of lengths of nonunit non-zero-divisors are arbitrary sumsets of sets as in Theorem 14(2), i.e., of sets of the form { 1 }, [2, n] (for n ≥ 2), [3, n] (for n ≥ 3), [2, n] ∪ { n + 2 } for even n ≥ 2, and [3, n] ∪ { n + 2 } for odd n ≥ 3.  Finally, we remark that other important invariants of factorization theory (their definitions readily generalize to the zero-divisor case) are easily determined for R(D) using the characterization of sets of lengths and Corollary 4. Corollary 17. Let D be ring with  a PID but not a field. R(D)  is a locally tame  catenary degree c R(D) = 4. In particular, ∆ R(D) = [1, c R(D) − 2]. Proof. We first observe that the catenary degree (see [8, Chapter 1.6] for the definition in the non-zero-divisor case) of R(D) is 4: Let first α ∈ R(D) with nr(α) 6= 0. Using Corollary 4, we can reduce to the case where nr(α) is a prime power. Since then min L(α) ≤ 3, we can argue as in bifurcus semigroups (cf. [1, Theorem 1.1]), to find c(α) ≤ 4. In view of Lemma 8(1), and with a similar argument, the catenary degree of a zero-divisor is at most 2. Together this gives c(R(D)) ≤ 4. Since there exists an element with set of lengths { 2, 4 }, also c(R(D)) ≥ 4. We still have to show that R(D) is locally tame (see [8, Chapter 1.6] or [10] for definitions). For this we have to show t(R(D), γ) < ∞ for all irreducible γ ∈ R(D). Let α ∈ R(D) and γ ∈ R(D) be irreducible. If γ is prime, then t(R(D), γ) = 0, hence we may suppose that γ is associated to one of the non-prime irreducibles from Theorem 5, and hence there exist a prime element p ∈ D and n ∈ N such that nr(γ) = pn . If α ∈ R(D) is a zero-divisor, then t(α, γ) = n follows easily from Lemma 8(1). A standard technique allows us to show t(R(D)• , γ) < ∞: By [10, Proposition 3.8], it suffices to show that two auxiliary invariants, ω(R(D)• , γ) and τ (R(D)• , γ) are finite. Suppose I ⊂ (R(D)• , ·) is a divisorial ideal. If we denote by R(D) hIi the ideal of R(D) generated by I, one checks that R(D) hIi ∩ R(D)• = I. Since R(D) is noetherian, R(D)• is therefore v-noetherian. By [10, Theorem 4.2], ω(R(D)• , γ) is finite. Recalling the definition of τ (α, γ) (from [10, Definition 3.1]), it is immediate from Theorem 14 together with Corollary 4, that τ (R(D)• , γ) ≤ 3. Altogether, therefore t(R(D), γ) < ∞.  12 G.W. CHANG AND D. SMERTNIG Remark 18. Suppose D is a PID but not a field. (1) Trivially, Theorem 14(2) holds true for R(D)• . (2) Let K be the quotient field of D, and H = R(D)• . We have n a b  o | b ∈ D, a ∈ D• , H= 0 a and the complete integral closure of H is equal to o n a b  b= H | b ∈ K, a ∈ D• 0 a  n  n  a b a nan−1 b because for all a, b ∈ K and n ∈ N. This shows = 0 a 0 an b and even more we have f = (H : H) b = ∅ (note that (D : K) = ∅). H 6= H, Thus the monoid under discussion is neither a Krull nor a C-monoid, which have been extensively studied in recent literature (see [8, Chapters 2.9, 3.3, and 4.6], [9], [12]). Acknowledgements. The first author’s work was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (2010-0007069). The second author was supported by the Austrian Science Fund (FWF): W1230. We thank the anonymous referee for his/her careful reading and all the helpful comments, in particular on the concept of self-idealization. References [1] D. Adams, R. Ardila, D. Hannasch, A. Kosh, H. McCarthy, V. Ponomarenko, and R. Rosenbaum, Bifurcus semigroups and rings, Involve 2 (2009) 351–356. [2] D.D. Anderson and S. Valdes-Leon, Factorization in commutative rings with zero divisors, Rocky Mountain J. Math. 26 (1996) 439–480. [3] D.D. Anderson (ed.), Factorization in Integral Domains, Lect. Notes Pure Appl. Math., vol. 189, Marcel Dekker, 1997. [4] D.D. Anderson and M. Winders, Idealization of a Module, J. Commutative Algebra 1 (2009) 3–56. [5] N.R. Baeth and R.A. Wiegand, Factorization theory and decomposition of modules, Am. Math. Mon. 120 (2013), 3–34. [6] S.T. Chapman (ed.), Arithmetical Properties of Commutative Rings and Monoids, Lect. Notes Pure Appl. Math., vol. 241, Chapman & Hall/CRC, 2005. [7] C. Frei and S. Frisch, Non-unique factorization of polynomials over residue class rings of the integers, Comm. Algebra 39 (2011) 1482–1490. [8] A. Geroldinger and F. Halter-Koch, Non-unique factorizations, vol. 278 of Pure and Applied Mathematics (Boca Raton), Chapman & Hall/CRC, Boca Raton, FL, 2006. Algebraic, combinatorial and analytic theory. [9] A. Geroldinger and W. Hassler, Arithmetic of Mori domains and monoids, J. Algebra 329 (2008) 3419–3463. [10] A. Geroldinger and W. Hassler, Local tameness of v-noetherian monoids, J. Pure Appl. Algebra 212 (2008) 1509–1524. [11] J. Huckaba, Commutative rings with zero divisors, Dekker, New York, 1988. [12] A. Reinhart, On integral domains that are C-monoids, Houston J. Math., to appear. [13] L. Salce, Transfinite self-idealization and commutative rings of triangular matrices, in Commutative algebra and its applications, 333–347, Walter de Gruyter, Berlin, 2009. FACTORIZATION IN THE SELF-IDEALIZATION OF A PID 13 (Chang) Department of Mathematics, University of Incheon, Incheon 406-772, Korea. E-mail address: [email protected] (Smertnig) Institut für Mathematik und Wissenschaftliches Rechnen, Karl-FranzensUniversität Graz, Heinrichstraße 36, 8010 Graz, Austria E-mail address: [email protected]
0math.AC
arXiv:1705.02809v2 [math.GR] 1 Feb 2018 APPLICATIONS OF L SYSTEMS TO GROUP THEORY LAURA CIOBANU, MURRAY ELDER, AND MICHAL FEROV Abstract. L systems generalise context-free grammars by incorporating parallel rewriting, and generate languages such as EDT0L and ET0L that are strictly contained in the class of indexed languages. In this paper we show that many of the languages naturally appearing in group theory, and that were known to be indexed or context-sensitive, are in fact ET0L and in many cases EDT0L. For instance, the language of primitives and bases in the free group on two generators, the BridsonGilman normal forms for the fundamental groups of 3-manifolds or orbifolds, and the co-word problem of Grigorchuk’s group can be generated by L systems. To complement the result on primitives in rank 2 free groups, we show that the language of primitives, and primitive sets, in free groups of rank higher than two is context-sensitive. We also show the existence of EDT0L and ET0L languages of intermediate growth. 1. Introduction In this paper we show that many of the context-sensitive or indexed languages arising in problems in group theory and combinatorics are in fact ET0L or even EDT0L. The merit of giving this new formal language characterisation is that ET0L and EDT0L languages are a strict subclass of the indexed ones, and also, the descriptions of these languages are simpler and more algebraic than those based on indexed grammars or nested-stack automata that were given in the literature for the sets considered here. Both EDT0L and ET0L belong to the languages generated by L systems, which were introduced by Lindenmayer in the late 1960s in order to model the growth of various organisms. The acronym ET0L (respectively EDT0L) refers to Extended, Table, 0 interaction, and Lindenmayer (respectively Deterministic). ET0L and EDT0L languages have only recently featured in group theory; their first prominent appearance was in the work of the first two authors with Volker Diekert, in the context of equations in groups. The language of solutions of equations in free groups as tuples of reduced words is EDT0L [5], as are solutions in appropriate normal forms in virtually free groups [9] and partially commutative groups [10]. The result in [5] implies that the pattern languages studied by Jain, Miasnikov and Stephan are EDT0L as well [19]. Date: February 5, 2018. 2010 Mathematics Subject Classification. 20F10; 20F65; 68Q42. Key words and phrases. Free group; primitive; normal form; co-word problem; Grigorchuk group; indexed language; ET0L language; EDT0L language. 1 In Section 2 we give the necessary background on formal languages. In Section 3 we examine the gap between ET0L and indexed languages, and in Section 4 we revisit an example of Grigorchuk and Machı̀ of a language of intermediate growth and show that it is EDT0L. In the remaining sections we show why Lindenmeyer languages are relevant for group theory by presenting several instances where L systems appear naturally. In Section 5 we describe the set of primitives in the free group on two generators as EDT0L, improving on the context-sensitive characterisation by Silva and Weil [27]. Furthermore, we show that the set of primitives, and primitive sets, in free groups of rank higher than 2 is context-sensitive. In Section 6 we construct an explicit grammar to prove that the co-word problem in Grigorchuks group is ET0L, and thus take a different approach to that of Holt and Röver [18], who used nested-stack automata to describe the same set. In Section 7 we show that the Bridson-Gilman normal forms for the fundamental groups of 3-manifolds or orbifolds, proved in [2] to be indexed, are in fact ET0L. We conclude the paper with a list of open problems. 2. ET0L and EDT0L languages L systems were introduced by Lindenmayer in order to model the growth of various organisms and capture the fact that growth happens in parallel everywhere in the organism. Therefore the rewriting system had to incorporate parallelism, as opposed to the sequential behavior of context-free grammars. The difference between sequential and parallel grammars is well illustrated by the following example (page 2 in [26]). Example 1. Suppose we have an alphabet A = {a} and a single rewriting rule a −→ a2 , which is to be applied to a3 . If we apply this rule to one a inside a3 at a time, we get the set {ai | i ≥ 3}. If we apply the rule simultaneously to each a in a3 we obtain a6 after one rewrite, and the set i of words obtained via parallel rewriting is {a3·2 | i ≥ 0}. There is a vast literature on Lindenmayer systems, see for example [26, 25], with various acronyms such as D0L, DT0L, ET0L, HDT0L and so forth. The following inclusions hold: EDT0L ( ET0L ( indexed, and context-free ( ET0L. Furthermore, the classes of EDT0L and context-free languages are incomparable. Let V be a finite alphabet. A table for V is a finite subset of V × V ∗ , that can be represented as in Figure 1. V V∗ a −→ a, b, aba b −→ bbabb # −→ #, b Figure 1. A table for V = {a, b, #}. 2 If (c, v) is in some table t, we say that (c, v) is a rule for c and use the convention that if for some c ∈ V no rule for c is specified in t, then t contains the rule (c, c). We express the rewriting corresponding to the rule (c, v) in t as c −→t v. Definition 1 (ET0L). An ET0L-system is a tuple H = (V, A, T, I), where (1) V is a finite alphabet, (2) A ⊆ V is the subset of terminal symbols, (3) T is a finite set of tables for V , that is, each t ∈ T is a finite subset of V × V ∗ , and (4) I ⊆ V ∗ is a finite set of words called axioms. Let t ∈ T . We will write u −→t v to denote that a word v ∈ V ∗ can be produced from u ∈ V ∗ using the rules in t; that is, if u = c1 · · · cm and v = v1 · · · vm , where ci ∈ V and vi ∈ V ∗ , we write u −→t v to mean v was obtained via rules cj −→t vj from table t, applied to each cj appearing in u. More generally, u −→ v signifies u −→t v for some t ∈ T . If there exist u0 , . . . , uk ∈ V ∗ with ui −→ ui+1 for 0 ≤ i ≤ k−1, then we write u0 −→∗ uk . The language generated by H is defined as L(H) = {v ∈ A∗ | w −→∗ v for some w ∈ I}. A language is ET0L if it is equal to L(H) for some ET0L system H. Definition 2 (EDT0L). An EDT0L-system is an ET0L system where in each table there is exactly one rule for each letter in V . A language is EDT0L if it is equal to L(H) for some EDT0L system H. ET0L languages form a full AFL (abstract family of languages), that is, they are closed under homomorphisms, inverse homomorphisms, intersection with regular languages, union, concatenation and Kleene closure, while EDT0L are closed under all of the above except inverse homomorphism so do not form a full AFL [7, 1]. If for some words u1 , u2 , u3 and tables t1 , t2 we have u1 −→t1 u2 and u2 −→t2 u3 we will write u1 −→t1 t2 u3 to denote the composition of the rewriting. This can be naturally extended to any finite sequence of rewrites. Given a regular expression R over a finite set T = {t1 , . . . tn }, where t1 , . . . , tn are tables, we will sometimes abuse the notation and use u1 −→R u2 to denote that there is a word r in the language generated by the regular expression R such that u1 −→r u2 . Furthermore, if the system is deterministic, then every table is in fact a homomorphism on the free monoid V ∗ , and using this more algebraic notation we can give Asveld’s equivalent definition for E(D)T0L languages as follows [1]. Definition 3. Let A be an alphabet and L ⊆ A∗ . We say that L is an ET0L language if there is an alphabet C with A ⊆ C, a set H of tables (i.e. finite subsets of C × C ∗ ), a regular language R ⊆ H ∗ and a letter c ∈ C such that L = {w ∈ A∗ | c −→r w for some r ∈ R}. 3 In the case when every table h ∈ H is deterministic, i.e. each h ∈ H is in fact a homomorphism, we write r(c) = w and say that L is EDT0L. The set R is called the regular (or rational) control, the symbol c the start symbol and C the extended alphabet. Convention. In any description of rational control in this paper, the maps are always applied left to right, but in algebraic settings where f and g are morphisms f g(a) := f (g(a)). 3. Non-ET0L languages For completeness we present in this section a short survey of examples of languages which are not ET0L. The first examples turn out not to be indexed either. Let ϕ : N+ → N+ be such that limn→∞ ϕ(n) = ∞ and let U be an arbitrary infinite subset of N. Set K(ϕ, U ) = {(baϕ(k) )k | k ∈ U }. This construction gives us an infinite family of languages. It was proved in [11, Theorem 2] that K(ϕ, U ) is not ET0L regardless of the choice of ϕ and U . We show in Lemma 5 that these languages are not indexed. Lemma 4. [15, Theorem A] (Shrinking lemma) Let L be an indexed language over a finite alphabet Σ and let m > 0 be a given integer. There is a constant k > 0 such that each word w ∈ L with |w| ≥ k can be factorised as a product w = w1 . . . wr such that the following conditions hold: (i) m < r ≤ k, (ii) wi 6= ǫ for every i ∈ {1, . . . , r}, (iii) each choice of m factors is included in a proper subproduct which lies in L. Lemma 5. The language K(ϕ, U ) is not indexed for any choice of ϕ and U. Proof. The proof follows that of [15, Corollary 4]. Assume that K(ϕ, U ) is indexed and fix m = 1. Let k ∈ N be given by Lemma 4. Pick k′ ∈ U such that k′ > k and k′ = min(ϕ−1 (ϕ(k′ ))). Note that such ′ ′ ′ k exists as limn→∞ ϕ(n) = +∞. Then w = (baϕ(k ) )k can be factorised as w = w1 . . . wr , where 1 < r ≤ k < k ′ . As r < |w|b = k′ , by the pigeonhole principle we see that there is some 1 ≤ i ≤ r such that |wi |b ≥ 2, i.e. ′ wi contains baϕ(k ) b as a subword. By Lemma 4, wi can be included in a ′ proper subproduct v which lies in K(ϕ, U ). However, v contains baϕ(k ) b, so ′′ ′′ v = (baϕ(k ) )k for some k′′ ∈ N such that ϕ(k′ ) = ϕ(k′′ ). As v is a proper subproduct of w we see that k′′ < k ′ . However, this is a contradiction with k′ = min(ϕ−1 (ϕ(k′ ))), thus K(ϕ, U ) is not indexed.  Note that when ϕ is the identity function and U = N this was already established in [17, Theorem 5.3] and later in [15, Corollary 4]. An explicit example of an indexed language which is not ET0L was given in [14] as the language of tree-cuts. Informally speaking, a tree-cut is a 4 sequence of binary strings encoding the list of leaves of a proper rooted binary tree, i.e. a tree in which every vertex has exactly zero or two children. Formally, tree cuts can be defined in a recursive manner: (i) the sequence containing only the empty string, i.e. (ǫ), is a tree-cut; (ii) suppose that u1 , . . . , uk , v1 , . . . , vl ∈ {0, 1}∗ such that the sequences (u1 , . . . , uk ) and (v1 , . . . , vl ) are tree-cuts, then the sequence (0u1 , . . . , 0uk , 1v1 , . . . , 1vl ) is a tree-cut. A sequence (v1 , . . . , vk ), where v1 , . . . , vk ∈ {0, 1} is a tree-cut if and only if it can be obtained by repeatedly applying to the above mentioned rules. For example, the sequence (000, 001, 01, 10, 11) is a tree-cut, but the sequence (000, 111) is not. For more detail on tree-cuts see for example [14, Section 3]. Let a, b denote symbols distinct from 0 and 1. The language of cuts is then defined as L0 = {av1 0bv1 1 . . . avk 0bvk 1 | (v1 , . . . , vk ) is a cut} ⊆ {0, 1, a, b}∗ . Carefully checking the proof of [14, Lemma 3.3] one can verify that the language L0 is accepted by a nested stack automaton and hence L0 is indexed. It is then proved in [14, Lemma 3.4] that L0 is not ET0L. Another example of an indexed language that is not ET0L is given in [13, Corollary 2]. In fact, the paper suggests an infinite family of such languages. However, the statement of [13, Theorem 3] contains a misprint, so we give the correct statement here. For a word w ∈ Σ∗ let w denote its mirror image, i.e. if w = x1 . . . xn , where x1 , . . . , xn ∈ Σ, then w = xn . . . x1 . Theorem 6. (see [13, Theorem 3]) Let Σ be a finite alphabet and let Σ′ be a copy of Σ distinct from Σ. Let h : Σ∗ → Σ′∗ be a homomorphism defined by h(x) = x′ for every x ∈ Σ. Let K be a context-free language over Σ such that K is not EDT0L. Then the language MK = {kh(k) | k ∈ K} ⊆ (Σ ∪ Σ′ )∗ is indexed but not ET0L. It is a well known fact (see [12, Theorem 9]) that if K is the Dyck language on at least 8 letters, then K is context-free but not EDT0L, hence MK is indexed but not ET0L. In fact we observe below in Proposition 26 that the word problem for free groups of rank at least 2 is not EDT0L. 4. Growth of languages The growth of a language L ⊆ Σ∗ is the function f : N → N such that f (n) is the number of words in L of length n. If Σ is finite then the growth function is at most exponential. A language has intermediate growth if for any α, β > 1 there is an integer N ∈ N such that for all n > N we have 5 nα < f (n) < β n . Bridson and Gilman showed that there are no contextfree languages of intermediate growth [3], whereas Grigorchuk and Machı̀ [16, Theorem 1] give the following example of a language of intermediate growth which is recognisable by a one-way deterministic non-erasing stack automaton (1DNESE), so is indexed. They define the set A := {abi1 abi2 . . . abik | 0 ≤ i1 ≤ · · · ≤ ik , k ∈ N} over the alphabet {a, b}. Proposition 7. The language A is EDT0L. Proof. We show that A is generated by an EDT0L system as in Definition 3, with the following data: the extended alphabet is {a, b, q, q ′ }, the start symbol q, and the maps are ha , hb , h$ with ha (q) = qaq ′ , hb (q) = qb, hb (q ′ ) = q ′ b, h$ (q) = h$ (q ′ ) = ǫ. The rational control is given by R = {ha , hb }∗ ha h$ . Let g ∈ {ha , hb }∗ . We can easily prove by induction on the length of g as a word over {ha , hb } that g(q) = qbi1 aq ′ bi2 a . . . aq ′ bik where 0 ≤ i1 ≤ · · · ≤ ik , i.e the word starts with q, and then only q ′ appears. Then applying ha h$ to g(q) produces a word which starts with a and contains no more q, q ′ .  Corollary 8. There exist EDT0L (and ET0L) languages of intermediate growth. 5. Primitives and bases in free groups Given an alphabet Σ, we will always assume that a tuple (w1 , . . . , wt ), where w1 , . . . , wn ∈ Σ∗ , is encoded as a string w1 # . . . #w2 , where the symbol # is distinct from the ones contained in Σ. A free basis of a free group is a tuple of elements that freely generate the group, and a primitive (element) is an element that belongs to some free basis of the group. In this section we show that the set of bases and the set of primitives, written as reduced words over the standard free basis, is EDT0L for free groups of rank 2, and context-sensitive for higher rank. It is an open question whether the higher rank context-sensitive characterisation can be lowered to indexed or E(D)T0L. 5.1. Bases and primitives in the free group F2 are EDT0L. In [27] Silva and Weil showed that the set of primitives in the free group F2 on generators {a, b}, written as reduced words over {a, b, a−1 , b−1 }, is contextsensitive and not context-free. In this section we show that both the set of bases and the set of primitives are EDT0L. Proposition 9. The set of free bases and the set of primitives in F2 , as reduced words, are EDT0L. Proof. It is a classical result due to Nielsen that two elements g, h ∈ F2 form a basis of F2 if and only if the commutator [g, h] is conjugate either to 6 [a, b] or [b, a]. Hence the set of bases in F2 can be seen as the values X, Y satisfying the equations Z[X, Y ]Z −1 = [a, b] or Z[X, Y ]Z −1 = [b, a] where Z can take any value. By Corollary 2.2 in [5], for any equation in a free group the set of solutions, or any projections thereof, written as tuples in reduced words, is EDT0L. In this case the values of (X, Y ) will provide the set of bases, and the values of X the set of primitives.  5.2. Primitives in free groups of higher rank. While in F2 the set of free bases can be expressed in terms of solutions to equations, this does not hold in higher rank. It was shown in [21] that the set of primitives in free groups of higher rank is not definable in the first order theory of the group, and thus we cannot use our previous approach to give an EDT0L characterisation in this case. Another approach is to produce the set of primitives by applying all the maps in Aut(Fk ) to a free basis element. Since Aut(Fk ) is finitely generated, we would apply all the maps in Aut(Fk ), written as words over the generators of Aut(Fk ) - which can be seen as rational control, to a basis element which would play the role of the axiom. The set thus obtained would be EDT0L and contain all the primitives, but neither as reduced nor unique words. Since we are interested in establishing a formal language characterisation for primitives as reduced words, we use a different approach, based on Stallings’ folding of labeled graphs, and an algorithm for testing primitivity in a free group given in [6], to show here that they are context-sensitive. For the sake of keeping this note succinct, we do not define here the Stallings graph or what is meant by folding, but refer the reader to references such as [28] and [20]. If Γ is the Stallings graph of a finitely generated subgroup of a free group F , a pinch will signify the identification of two distinct vertices of Γ. A primitive set (as opposed to the set of primitives) in a free group F is a set of elements that can be extended to a basis of F . Lemma 10. [6, Theorem 4.4] Let n ≤ k and let W = {w1 , . . . , wn } be a set of reduced words in Fk = F (X), where X = {x1 , . . . , xk }, such that for every x ∈ X either x or x−1 appears in some w ∈ W . Let Γ be a graph representing the subgroup of Fk generated by W . Then W is a primitive set if and only if there is a sequence of pinches and folds, containing exactly k − n pinches, that transforms Γ into the elementary wedge on X. In the case that not every generator or inverse appears in the list of wi then the Lemma 10 can still decide primitivity by taking a smaller value for k. 7 A standard way to represent a Stallings graph Γ = (V Γ, EΓ) over an alphabet X would be as a collection of labeled oriented edges, where an edge γ ∈ EΓ is given as a triple (i(γ), t(γ), l(γ)), with i(γ) ∈ V Γ the initial vertex of γ, t(γ) ∈ V Γ the terminal vertex and l(γ) ∈ X ∪ X −1 the label of γ. Obviously, a word w ∈ F (X) can be represented by a graph Γw such that |V Γw |, |EΓw | ≤ n, where n = |w|. However, as there might be up to n vertices, and one needs log(n) space to encode the names of the vertices, the naı̈ve implementation of Γ would require n log(n) space. We propose a different representation of the Stallings graph, along with two additional types of moves, and show that Lemma 10 can be realised by a linear space algorithm. Instead of labelling an edge by a single symbol, we will label edges by subwords, that is, an edge γ ∈ EΓ will be represented by a triple (i(γ), t(γ), s(γ)), where i(γ) and t(γ) are as before and s(γ) ∈ F (X) is a reduced word. In this case we say that Γ is a segment graph. Adapting the terminology of Stallings graphs, we say that a segment graph Γ is folded if it does not contain a pair of incident edges whose labels share a common prefix or suffix. If a vertex v is incident to two edges with a common prefix or suffix, then we say that v is unfolded, and otherwise call it folded. Folding at a vertex v applies to segment graphs in three possible ways, depending on whether two segments incident to v have exactly the same label, or only common proper prefixes. More precisely, let γ1 , γ2 ∈ EΓ satisfy i(γ1 ) = v = i(γ2 ), s(γ1 ) = uw1 and s(γ2 ) = uw2 for some u, w1 , w2 ∈ F (X). I. If w1 = w2 = ǫ, then this is a usual folding of graphs. II. If w1 = ǫ and w2 6= ǫ, then we split γ2 into γ2′ and γ2′′ by introducing a new vertex v ′ on γ2 such that i(γ2′ ) = v, t(γ2′ ) = v ′ and s(γ2′ ) = u, and fold γ1 with γ2′ as in case I. III. If w1 , w2 6= ǫ, then we introduce a new vertex v ′ and a new edge γ, such that i(γ) = v, t(γ) = v ′ , s(γ) = u, and replace edges γ1 , γ2 by new edges γ1′ , γ2′ such that i(γ1′ ) = v ′ = i(γ2′ ), t(γ1′ ) = t(γ1 ), t(γ2′ ) = t(γ2 ), s(γ1′ ) = w1 and s(γ2′ ) = w2 . Pinching a segment graph is defined as follows. Let γ, γ ′ ∈ EΓ satisfy s(γ) = w1 w2 and s(γ ′ ) = w1′ w2′ for some w1 , w2 , w1′ , w2′ ∈ F (X). We remove the edges γ, γ ′ , introduce new vertex v and up to four new edges γ1 , γ2 , γ1′ , γ2′ given by γ1 : γ2 : γ1′ : γ2′ : i(γ1 ) = i(γ), t(γ1 ) = v, s(γ1 ) = w1 ; i(γ2 ) = v, t(γ2 ) = t(γ), s(γ2 ) = w2 ; i(γ1′ ) = i(γ ′ ), t(γ1′ ) = v, s(γ1′ ) = w1′ ; i(γ2′ ) = v, t(γ2′ ) = t(γ ′ ), s(γ2 ) = w2′ . If one of w1 , w2 , w1′ , w2′ is empty, i.e. when we are pinching a segment with a vertex, we don’t need to introduce the vertex v. Both foldings of type III and pinches can cause the numbers of edges and vertices to increase; the resulting graph could potentially not fit on a linear size tape, but the discussion below shows that this is not the case. 8 Recall that if Γ is a Stallings graph corresponding to some finite set W then the core of Γ (or the core graph for hW i), is the smallest subgraph of Γ in which we can read all the elements of hW i as reduced words along loops based at the base vertex of Γ. In particular, if Γ is finite then the core of Γ does not contain any vertices of degree one, with the exception of the base vertex of Γ. The core of a segment graph is defined in an analogous manner. Remark 1. (1) A set W = {w1 , . . . , wn } ⊆ Fk is primitive if and only if the set W g = {gw1 g−1 , . . . , gwn g−1 } is primitive for some (and thus for all) g ∈ Fk . As choosing a different base vertex in the core graph of hW i is the same as taking a conjugate of hW i, we will assume that the base vertex in any segment graph has degree at least 2. In fact, unless the graph is homeomorphic to a loop, we may assume that the base vertex is of degree at least three. (2) Furthermore, as the core graph will never contain any leaves other than the base vertex and as was already mentioned, we can always assume that the base vertex is of degree at least two, hence without loss of generality we may assume that the segment graph does not contain any leaves; this can be achieved by pruning, i.e. repeatedly removing vertices of degree 1 (along with corresponding edges). Note that for finite graphs this procedure always terminates. We say that a segment graph Γ is topological if all its vertices have degree ≥ 3, unless it consists of a single vertex, or a loop attached at a degree two vertex. Following Remark 1, we see that every segment graph can be transformed into a topological one (representing a subgroup conjugate to the original) by picking a different base vertex, pruning and merging edges: suppose γ1 , γ2 ∈ EΓ such that t(γ1 ) = v = i(γ2 ) and deg(v) = 2; then we can replace the edges γ1 , γ2 by a new edge γ such that i(γ) = i(γ1 ), t(γ) = t(γ2 ) and s(γ) = s(γ1 )s(γ2 ), and remove vertex v. The following lemma implies that pruning will need to be done at most once in the entire process corresponding to Lemma 10. Lemma 11. Let Γ be a folded graph that does not contain any vertex of degree 1 and let Γ′ be a graph obtained from Γ by performing a pinch and a folding. Then Γ′ does not contain vertices of degree 1. Proof. Suppose that there is v ′ ∈ V Γ′ such that deg(v ′ ) = 1. Without loss of generality we may assume that v ′ is the initial vertex of its unique adjacent edge γ ∈ EΓ′ . Note that the pinch and the subsequent folding uniquely define a surjective morphism of graphs f : V Γ0 → V Γ′ , where Γ can be obtained from Γ0 by merging. Note that Γ0 is folded and it does not contain vertices of degree 1. Let v ∈ f −1 (v ′ ) be arbitrary. Again, without loss of generality we may assume that v is the initial vertex of all of its adjacent edges. It follows that all the edges adjacent to v must share a common prefix with γ, meaning that v is not folded folded unless deg(v) = 1. As Γ0 is folded, deg(v) = 1 for every v ∈ f −1 (v ′ ), which contradicts the fact that 9 deg(u) > 1 for every u ∈ V Γ0 . Thus Γ′ does not contain vertices of degree 1.  The topological rank of a graph is the rank of its fundamental group. Lemma 12. Let Γ be a finite topological graph of topological rank r with r > 1. Then |EΓ| ≤ 3r − 3 and |V Γ| ≤ 2r − 2. Proof. As r > 1 we see that deg(v) ≥ 3 for every v ∈ V Γ. From the Euler characteristic formula r = |EΓ| − |V Γ| + 1, and since in any graph 2|EΓ| = P deg(v) by assumption 2|EΓ| ≥ 3|V Γ|, which gives the inequalities v∈V Γ above.  Remark 2. Folding does not cause the topological rank of a graph to increase, but pinching can increase it by 1. Corollary 13. Let Γ be a finite topological segment graph of topological rank r with a single unfolded vertex, and let Γ′ be the folded topological graph obtained from Γ by folding, merging and pruning. If r = 1 then |V Γ′ | = |EΓ′ | = 1, otherwise |V Γ′ | ≤ 2r − 2 and |EΓ′ | ≤ 3r − 3. Proof. Let r ′ denote the topological rank of the graph Γ′ ; note that r ′ ≤ r by Remark 2. If r ′ = 1 then, following the definition of topological graphs, we see that Γ′ is a single vertex with an attached loop and |V Γ′ | = |EΓ′ | = 1. If r ′ > 1 then the result follows by Lemma 12.  Proposition 14. Let Fk be a free group of rank k ≥ 2. Then the primitive sets in Fk can be recognised in linear space. Proof. We represent a graph with t edges on the tape of a Turing machine by the string #vi1 |vi2 |w1 ## . . . ##vi2t−1 |vi2t |wt #, where vij are binary numbers and the factor #v|v ′ |w# represents the segment γ with i(γ) = v, t(γ) = v ′ and s(γ) = w. On input a list of words w1 , w2 , . . . , wn , if n ≥ k we return NO, else we write on the tape #v0 |v0 |w1 ##v0 |v0 |w2 ## . . . ##v0 |v0 |wn # which describes the bouquet of loops labeled wi at a vertex v0 . Let k′ be the rank of the free group generated by the letters appearing in the wi , so k′ ≤ k. We perform folds of types I, II, III by modifying the tape as follows: I. Scan the tape to find factors #vi |vj |u# and #vi |vk |u#; erase the second factor and replace vk by vj everywhere on the tape. II. Scan the tape to find #vi |vj |u# and #vi |vk |up#; overwrite the second factor with #vj |vk |p#. 10 III. Scan the tape to find #vi |vj |uap# and #vi |vk |ubq# with a 6= b, a, b ∈ X ±1 ; erase both factors and write #vi |v|u##v|vj |ap##v|vk |bq# where the binary number v is some value not already in use. For pruning we scan the tape to find a factor #v|v ′ |u# such that the v (or v ′ ) does not appear in any other factor. If such a factor is found, we delete it. Similarly, for merging we scan the tape for a pair of factors #v|v ′ |u1 # and #v ′ |v ′′ |u2 # (or #v ′′ |v ′ |u2 #) such that v ′′ does not occur in any other factor. If such a pair is found, we replace them by #v|v ′′ |u1 u2 # (or #v|v ′′ |u1 u−1 2 #, respectively). We perform a pinch by choosing either: (1) two distinct vertices vi , vj and replacing vj by vi everywhere on the tape; (2) a vertex v and a segment (vi , vj , w1 w2 ) with |wi | > 0 and replacing #vi |vj |w1 w2 # by #vi |v|w1 ##v|vj |w2 #; (3) two segments (vi , vj , w1 w2 ), (vp , vq , w3 w4 ) with |wi | > 0, and replacing their encodings by #vi |v|w1 ##v|vj |w2 ##vp |v|w3 ##v|vq |w4 # where v is some value not already in use. Note that folding and pruning moves decrease the number of letters appearing as labels of segments, and pinching and merging moves preserve this number. The procedure starts by performing folding moves I, II, III in any order exhaustively, and each folding is followed by all possible pruning and merging. Then a pinch is applied, and the previous two steps repeat k′ − n times. Following Lemma 11 we see that we will only need to perform pruning moves before the first pinch. Note that during this process, the number of letters present in the labels might decrease. In this case we need to decrease k′ accordingly. Return YES if the tape contains #v|v|ai1 ## . . . ##v|v|aik′ −n # with all ij distinct and aij ∈ X ±1 , else return NO. Termination of the algorithm is guaranteed since each fold strictly decreases the number of letters from X ±1 appearing on the tape as labels of segments. The algorithm accepts precisely the primitive sets in Fk by Remark 1 and Lemma 10. Since the rank of all topological segment graphs considered is smaller than the rank of the ambient free group, by Corollary 13 the number of vertices in use at any time is at most 2k − 2, so in binary notation each vertex requires at most log(2k − 2) space, the total number of segments is at most 3k P − 3, and the number of letters from X ±1 appearing on the tape is at most ni=1 |wi | = N . Thus the amount of space required at any time 11 in the process is at most (3k − 3)(2 log(2k − 2) + 4) + n X |wi |, i=1 which is linear in the input size.  From the proposition it follows that for every k there is a linearly bounded Turing machine Tk which recognises primitive sets in Fk , hence we can state the following corollary. Corollary 15. Let Fk = F (X) be a free group over X, where |X| = k and n ≤ k. Then Pk,n = {w1 # . . . #wn | {w1 , . . . wn } is a primitive set in Fk } ∗ ⊆ X ∪ X −1 ∪ {#} is a context-sensitive language. In particular, the set Pk (=Pk,1 ) of primitive elements is context-sensitive. 6. Co-word problem for Grigorchuk group is ET0L In this section we show that the co-word problem for the Grigorchuk group is ET0L, improving on Holt and Röver’s result in [18], where they showed it is indexed. It is still an open question whether the co-word problem for the Grigorchuk’s group is context-free. 6.1. Generators and the word problem. We refer the reader to [8] for more details, here we give the essentials for our proof. Let T denote the infinite rooted binary tree and let A = Aut(T). Note that A ≃ A≀C2 ≃ (A× A) ⋊ C2 , where C2 = hα | α2 = 1i, so every g ∈ A can be uniquely expressed as g = (gL , gR )αg for some gL , gR ∈ A and αg ∈ C2 . The Grigorchuk group is G = ha, b, c, di ≤ A, where the generators a, b, c, d ∈ A are given by a = (1, 1)α, b = (a, c)1, c = (a, d)1, d = (1, b)1. One can easily verify that the following identities hold in G: (1) a2 = b2 = c2 = d2 = 1, bc = cb = d, cd = dc = b, db = bd = c. Starting with an arbitrary word w ∈ {a, b, c, d}∗ , one can rewrite w via the identities in (1) to a word w′ which represents the same element in G and does not contain any of aa, bb, cc, dd, bc, cb, bd, db, cd, dc as a subword. Thus w′ has the form w′ = x0 ax1 . . . xn−1 axn , where xi ∈ {1, b, c, d} for 0 ≤ i ≤ n and xi 6= 1 for 1 < i < n − 1, so we say that w′ is alternating or reduced. Every non-trivial element g ∈ G can be represented by a reduced word. The following remark has an analogous proof to that of the uniqueness of reduced words in free groups (see [23, Section I.1]). 12 Remark 3. Every word w ∈ {a, b, c, d}∗ can be rewritten via the identities in (1) to a unique reduced word. However, not every reduced word represents a nontrivial element: the word dadadada is reduced, yet it represents the identity in G. Let G1 be the subgroup of G consisting of all elements that fix the first level of T. Then |G : G1 | = 2, G1 = hb, c, d, aba, aca, adai and aba = (c, a)1, aca = (d, a)1, ada = (d, 1)1. Every element g ∈ G1 can be expressed as an alternating sequence g = x0 xa1 . . . xn−1 xan , where xi ∈ {1, b, c, d} and xai ∈ {1, aba, aca, ada} for 0 ≤ i ≤ n such that xi 6= 1 if i > 0 and xai 6= 1 if i < n. Let φL , φR : G1 → G be the group homomorphisms defined as     b → c, b → a,         → d, → a,   c c    d d → b, → 1, φR : φL :   aba → a, aba → c,           aca → a, aca → d,       ada → 1, ada → b, and define φ : G1 → G × G as φ(g) = (φL (g), φR (g)). Then φ is injective, and |φi (w)| < 12 |w| + 1 < |w| for every reduced w ∈ {a, b, c, d}∗ representing some element in G1 such that |w| > 1. Let LS be the set of words with an odd number of a’s, that is, LS = {w ∈ {a, b, c, d}∗ | |w|a ≡ 1 mod 2}. Notice that the parity of |w|a is invariant under the rewrite rules (1). Indeed, if w ∈ LS then w 6=G 1. The following is the outline of the word problem algorithm in Grigorchuk’s group (see [8, Section VIII.E] for more details and Figure 2 for an example). We use ǫ to denote the empty string. (1) reduce w (2) if w = ǫ answer YES (meaning w =G 1), (3) if w ∈ LS answer NO (meaning w 6=G 1), (4) otherwise answer (φL (w) =G 1 and φR (w) =G 1). Obviously, w 6=G 1 if and only if there are sequences w0 , . . . , wn ∈ {a, b, c, d} and φ1 , . . . , φn ∈ {φL , φR } such that wn =G w, wi−1 =G φi (wi ) for i = 1, . . . , n and w0 ∈ LS . The main idea behind our grammar is to invert this process, i.e. start with a word in w0 ∈ LS and generate a sequence of words w1 , . . . , wn such that wi−1 =G φi (wi ). 6.2. ET0L grammar. In this subsection we introduce the ET0L grammar used to generate the co-word problem for Grigorchuk’s group and give an informal explanation of the roles of the corresponding tables. 13 Our grammar works over the extended alphabet Σ = {S0 , S1 , a, b, c, d, δ, #}, where S0 is the start symbol, along with tables s, p, hL , hR , u, t and rational control R = s∗ {p∗ {hL , hR }u∗ t}∗ . The process of generating words can be split in three phases. It is important to note that the second and third phase can occur multiple times, as can be seen in Example 2. Phase 1: Generate LS . First we generate the language LS of words with an odd number of occurrences of a. This is done by table s, which can be seen as the grammar version of a two state finite automaton producing the regular language LS . We call the words in LS seeds. (s) Generate seeds S0 → aS1 , bS0 , cS0 , dS0 S1 → aS0 , bS1 , cS1 , dS1 , ǫ ∗ Lemma 16. Let w ∈ {a, b, c, d}∗ . Then w ∈ LS if and only if S0 −→s w. ∗ In particular, if S0 −→s w then w 6=G 1. Phase 2: Invert φL and φR . Once we have produced a seed w0 , we generate a sequence of words w1 , . . . , wn such that wi−1 =G φi (wi ), and we create wi from wi−1 by ‘inverting’ the maps φL and φR ; this is achieved via tables hL , hR : (hL , hR ) Invert a → b → c → d → δ → Invert a → b → c → d → δ → φL b, c ada aba aca d φR aba, aca d b c ada Table p introduces a new symbol δ, which serves as a placeholder for the empty word that resulted from applying φL and φR (recall that φL (d) = 1, φR (ada) = 1). (p) Insert a → b → c → d → δ a, δa, aδ b, δb, bδ c, δc, cδ d, δd, dδ Lemma 17. Let w, w′ ∈ {a, b, c, d}∗ and let i ∈ {L, R} be given. Then ∗ ∗ w =G φi (w′ ) if and only if w −→p hi w′ . In particular, if w −→p hi w′ and w 6=G 1 then w′ 6=G 1. The proof follows immediately from an analysis of the tables. 14 Phase 3: Use group relations and insert trivial subwords. The following table inverts the reduction process induced by the identities in (1). We introduce the symbol # as a placeholder for the reduction process. This means that # signifies the position of a subword that reduces to the trivial word. Unreduce a → a, #a, a# b → b, #b, b#, c#d, d#c c → c, #c, c#, b#d, d#b d → d, #d, d#, b#c, c#b # → #, a#a, b#b, c#c, d#d (u) At this stage we remove all the occurrences of the placeholder #. This is achieved by table t: Tidy # # → ǫ (t) Lemma 18. Let w, w′ ∈ {a, b, c, d}∗ be arbitrary. Then w can be obtained from w′ by reducing rules (induced by the identities in (1)) if and only if ∗ ∗ w −→u t w′ . In particular, if w −→u t w′ and w 6=G 1 then w′ 6=G 1. Example 2. Figure 2 demonstrates the word problem algorithm on input bcddacbabcaa, showing it to be nontrivial. bcddacbabcaa φL dadad φR 1b1 b1b 1 φL b φR c a ∈ LS Figure 2. Word problem algorithm applied to bcddacbabcaa. This word can be obtained from our grammar as follows. 15 Phase 1: S0 −→s aS1 −→s a Phase 2: a −→hL b Phase 3: b −→t b Phase 2: b −→p δb −→p δbδ −→hR dadad Phase 3: dadad −→u b#c#ac#bab#c −→u b#cd#dac#bab#c# −→u b#cd#dac#bab#ca#a −→t bcddacbabcaa. 6.3. Proof that the ET0L grammar generates exactly the co-word problem. Let L′ be the language generated by the ET0L grammar with alphabet Σ, tables s, p, hL , hR , u, c given above and rational control R = s∗ {p∗ {hL , hR }u∗ t}∗ . Note that the rational control R is equivalent to s∗ {p∗ hL u∗ t, p∗ hR u∗ t}∗ . Following Definition 3, L′ is ET0L. Now consider L = L′ ∩{a, b, c, d}∗ . As the class of ET0L languages is closed under intersection with regular languages, L is an ET0L language. Intersecting L′ with {a, b, c, d}∗ effectively discards all words containing symbols S0 , S1 . With this in mind, we will assume that we are only working with words that do not contain symbols S0 and S1 . Combining Lemmas 16, 17 and 18 we can immediately show that our grammar produces words that represent non-trivial elements in the group. Lemma 19. Let w ∈ {a, b, c, d}∗ be arbitrary. If w ∈ L then w 6=G 1. Proof. If w ∈ L then, by definition, there is a sequence of words w0 , w1 , w1′ , . . . , wn , wn′ ∈ {a, b, c, d}∗ and a sequence of tables h1 , . . . , hn ∈ {hL , hR } such that ∗ (1) s −→s w0 , ∗ (2) wi−1 −→p hi wi′ for i = 1, . . . , n ∗ (3) wi′ −→u c wi , (4) wn = w. We use induction on n. If n = 0 then by Lemma 16 we see that w0 ∈ LS , hence w0 6=G 1. Now suppose that the result has been established for all words that can be obtained via sequences of length ≤ n − 1. Then wn−1 6=G 1 by the induction hypothesis. Using Lemma 17 we see that wn−1 = φi (wn′ ), where φi = φL if hi = hL and φi = φR if hi = hR , thus wn′ 6=G 1. Using Lemma 18 we see that wn′ =G wn and hence wn 6=G 1, so w indeed represents a nontrivial element of Grigorchuk’s group.  The next lemma establishes the completeness of our grammar. 16 Lemma 20. Let {a, b, c, d}∗ be arbitrary. If w 6=G 1 then w ∈ L. Proof. Suppose that w 6=G 1. Following the algorithm described in Subsection 6.1 there is a sequence of words w0 , w0′ , . . . , wn , wn′ and a sequence of maps φ1 , . . . , φn ∈ {φL , φR } such that (1) wi is the reduced word obtained by reducing wi′ for i = 0, . . . , n, (2) |wi |a is even for i ≥ 1 and odd for i = 0, ′ is obtained from wi by applying φi , (3) wi−1 ′ (4) wn = w. Again, we proceed by induction on n. Suppose that n = 0, i.e. w0′ = w. As the parity of the number of occurrences of the symbol a is invariant with respect to the reduction rules, ∗ we see that |w|a is odd. It follows by Lemma 16 that S0 −→s w and thus w ∈ L. Now suppose that the statement holds for all w′ ∈ {a, b, c, d}∗ for which the word problem algorithm uses up to n−1 levels of recursion. In particular, S0 −→s ∗ {p∗ h Lu ∗ t,p∗ h Ru ∗ t}∗ ′ wn−1 . ∗ ′ −→p hn wn , where hn = hL if φn = φL Using Lemma 17 we see that wn−1 ∗ and hn = hR if φn = φR . Similarly, using Lemma 18 we see that wn −→u t ∗ ∗ ′ −→p hn u t w and therefore w ∈ L.  wn′ . Altogether we see that wn−1 Combining Lemma 19 and Lemma 20 we see that a word w ∈ {a, b, c, d}∗ represents a nontrivial element of Grigorchuk’s group if and only if w ∈ L, which implies the main result of this section. Theorem 21. The co-word problem in Grigorchuk’s group is an ETOL language. 7. ET0L languages and 3-manifold groups The goal of this section is to prove Theorem 22, which is a strengthening of Theorem B in [2], proved there for indexed instead of ET0L languages. In 1996 Bridson and Gilman stated the theorem for all manifolds satisfying the geometrisation conjecture, but since then Perelman [24] proved that all compact 3-manifolds do, so we can state the result in full generality. Theorem 22. Let M be a compact 3-manifold or orbifold, and let µ : Σ⋆ → π1 M be a choice of generators. Then there exists a set of normal forms L ⊆ Σ⋆ which satisfies the asynchronous fellow-traveler property and is an ET0L language. We follow in the footsteps of Bridson and Gilman, whose proof relies on (1) closure properties of AFL languages, and (2) showing that an appropriate set of normal forms for Z2 is ET0L. Note that standard regular normal forms for Z2 will not produce an appropriate language of normal forms for the extension Z2 ⋊ Z, which needs to satisfy the properties detailed in [2, page 541]. 17 For the sake of completeness we recall the relevant results on AFL languages. As in the paper of Bridson and Gilman (and much of the literature), we will call a set of normal forms satisfying the asynchronous fellow-traveler property a combing. Proposition 23 ([2]). Let A be a full AFL class of languages (such as regular, context-free, indexed, or ET0L). (1) (Prop. 2.9) If G1 and G2 both have an asynchronous A-combing, then so does the free product G1 ∗ G2 . (2) (Theorem 2.16) Let G be a finitely generated group, and H a subgroup of finite index. Then G admits an asynchronous A-combing if and only if H admits an asynchronous A-combing. We first recall the crossing sequence κ(m, n) of Bridson and Gilman, which gives the EDT0L normal form for Z2 . Let (m, n) ∈ Z2 have m > 0, n ≥ 0, and consider the line l(m, n+ ) in the plane from (0, 0) to (m, n+ ), where n+ is chosen slightly larger than n, but small enough to ensure that (1) l(m, n+ ) does not contain any lattice points except (0, 0), and (2) there are no lattice points in the interior of the triangle with vertices (0, 0), (m, n) and (m, n+ ). For the line l(m, n+ ), the sequence formed by recording an h each time a horizontal line in the plane is crossed and a v each time a vertical line is crossed is called the crossing sequence κ(m, n). For example, κ(2, 3) = hvhhv. Theorem 24. The set L = {κ(m, n) | m > 0, n ≥ 0} is an EDT0L language. That is, the indexed combing for Z2 in [2] is in fact EDT0L. Proof. The proof only focuses on the first quadrant in Z2 , and it can be easily extended to all of Z2 . As is described in [2], L can be generated by starting with an arbitrary v k , k > 0, and alternately replacing all v’s by hi v and all h’s by v j h. The EDT0L grammar thus first has to produce v k , and then apply maps which mimic the morphisms described. Let {q, v, h} be the extended alphabet, with q the start symbol. Let φq , φv , φh and φs be the maps defined by φq (q) = qv, φv (v) = hv, φh (h) = vh and φs (q) = v. Then φs φqk−1 (q) = v k generates the starting point of the crossing sequence, and then we apply any map in {φv , φh }⋆ to v k and obtain the set L. Thus by Definition 3 the set L is an EDT0L language.  We remark that the EDT0L characterisation for the Z2 combing cannot be lifted to Z2 ⋊Z and other more general groups, because EDT0L languages do not form a full AFL, which is essential in several proofs in [2]. Proposition 25. Every semidirect product of the form Z2 ⋊ Z admits an asynchronous ET0L combing. Proof. The proof is exactly as that of Corollary 3.5 in [2]. More precisely, let t be a generator of Z and L be the language of normal forms for Z2 from Theorem 24. By [2, Theorem 3.1], the language L0 = {t∗ ∪ (t−1 )∗ }L is an 18 asynchronous combing of Z2 ⋊Z, and since ET0L languages are closed under concatenation with a regular language and finite unions, we get that L0 is ET0L.  Proof. (of Theorem 22) The work of Thurston, Epstein and Perelman implies that any π1 M as in the hypothesis is commensurable to the free product of an automatic group and (possibly) finite extensions of groups of the form Z2 ⋊Z. Thus the proof follows immediately from Propositions 23 and 25.  8. Open problems Among the formal languages naturally appearing in group theory none is more prominent than the word problem, that is, the set of words representing the trivial element in a finitely generated group. Since EDT0L languages are not closed under inverse homomorphism, a priori a group may have EDT0L word problem for one finite generating set but not for another. However, we do not know of any infinite group which has EDT0L word or co-word problem for some finite generating set. Since EDT0L languages are relatively close in complexity to context-free languages, one might wonder whether the groups with context-free word problem have EDT0L word problem. A first negative answer is given below. Proposition 26. Let F be the free group of rank at least two. Then the word problem in F is not EDT0L. Proof. It was proved in [22] that if a language L is a context-free generator, i.e. for every context-free language K there is a regular language RK and a homomorphism hK such that K = hK (L ∩ RK ), then L is not EDT0L. It follows by the Chomsky-Schützenberger representation theorem [4] that every Dyck language on at least two letters is a context-free generator. It can be easily seen that the word problem in Fn , the free group on n generators, is isomorphic to Dn⋆ , the symmetric Dyck Language on n letters. It follows that if n > 1 then the word problem in Fn is not EDT0L.  Question 8.1. Is the word problem for Z (for some or every finite generating set) EDT0L? A related open problem is to determine the class of groups having ET0L word problem; a well known problem is to find a non-virtually free group with indexed word problem, so a reasonable conjecture here is that the only groups with ET0L word problem are virtually free. Conjecture 8.2. A group has EDT0L word problem if and only if it is finite. A group has ET0L word problem if and only if it is virtually free. Acknowledgments We would like to thank Sylvain Salvati for the EDT0L grammar used in the proof of Proposition 7 and Michel Latteux for the outline for Proposition 26. We also thank Claas Röver for interesting discussions. Further, we 19 would like to thank the anonymous referee for suggesting several simplifications of the submitted manuscript. The first two authors were partially supported by the Swiss National Science Foundation grant Professorship FN PP00P2-144681/1, and by a Follow-On grant of the International Centre of Mathematical Sciences in Edinburgh. All authors were supported by the Australian Research Council Discovery Project grant DP160100486. References [1] Peter R. J. Asveld. Controlled iteration grammars and full hyper-AFL’s. Information and Control, 34(3):248–269, 1977. [2] Martin R. Bridson and Robert H. Gilman. Formal language theory and the geometry of 3-manifolds. Comment. Math. Helv., 71(4):525–555, 1996. [3] Martin R. Bridson and Robert H. Gilman. Context-free languages of sub-exponential growth. J. Comput. System Sci., 64(2):308–310, 2002. [4] Noam Chomsky and Marcel P Schützenberger. The algebraic theory of context-free languages. Studies in Logic and the Foundations of Mathematics, 35:118–161, 1963. [5] Laura Ciobanu, Volker Diekert, and Murray Elder. Solution sets for equations over free groups are EDT0L languages. Internat. J. Algebra Comput., 26(5):843–886, 2016. [6] A. Clifford and R. Z. Goldstein. Sets of primitive elements in a free group. J. Algebra, 357:271–278, 2012. [7] Karel Culik, II. On some families of languages related to developmental systems. Internat. J. Comput. Math., 4:31–42, 1974. [8] Pierre de la Harpe. Topics in geometric group theory. Chicago Lectures in Mathematics. University of Chicago Press, Chicago, IL, 2000. [9] V. Diekert and M. Elder. Solutions of twisted word equations, EDT0L languages, and context-free groups. ArXiv e-prints, January 2017. ICALP 2017. [10] V. Diekert, A. Jeż, and M. Kufleitner. Solutions of Word Equations over Partially Commutative Structures. ArXiv e-prints, March 2016. [11] A. Ehrenfeucht and G. Rozenberg. On proving that certain languages are not ET0L. Acta Informat., 6(4):407–415, 1976. [12] Andrzej Ehrenfeucht and Grzegorz Rozenberg. On some context free languages which are not ET0L languages. 1974. [13] Andrzej Ehrenfeucht, Grzegorz Rozenberg, and Sven Skyum. A relationship between ET0L and EDT0L languages. Theoretical Computer Science, 1(4):325–330, 1976. [14] Joost Engelfriet, Erik Meineche Schmidt, and Jan van Leeuwen. Stack machines and classes of nonnested macro languages. J. Assoc. Comput. Mach., 27(1):96–117, 1980. [15] Robert H. Gilman. A shrinking lemma for indexed languages. Theoret. Comput. Sci., 163(1-2):277–281, 1996. [16] R. I. Grigorchuk and A. Machı̀. An example of an indexed language of intermediate growth. Theoret. Comput. Sci., 215(1-2):325–327, 1999. [17] Takeshi Hayashi. On derivation trees of indexed grammars: an extension of the uvwxy-theorem. Publ. Res. Inst. Math. Sci., 9:61–92, 1973/74. [18] Derek F. Holt and Claas E. Röver. Groups with indexed co-word problem. Internat. J. Algebra Comput., 16(5):985–1014, 2006. [19] Sanjay Jain, Alexei Miasnikov, and Frank Stephan. The complexity of verbal languages over groups. In Proceedings of the 2012 27th Annual ACM/IEEE Symposium on Logic in Computer Science, pages 405–414. IEEE Computer Soc., Los Alamitos, CA, 2012. [20] Ilya Kapovich and Alexei Myasnikov. Stallings foldings and subgroups of free groups. J. Algebra, 248(2):608–668, 2002. 20 [21] Olga Kharlampovich and Alexei Myasnikov. Definable sets in a hyperbolic group. Internat. J. Algebra Comput., 23(1):91–110, 2013. [22] Michel Latteux. Sur les générateurs algébriques et linéaires. Acta Inform., 13(4):347– 363, 1980. [23] Roger C. Lyndon and Paul E. Schupp. Combinatorial group theory. Springer-Verlag, Berlin, 1977. Ergebnisse der Mathematik und ihrer Grenzgebiete, Band 89. [24] Grigoriy Perelman. Ricci flow with surgery on three-manifolds. 2013. https://arxiv.org/abs/math/0303109. [25] G. Rozenberg and A. Salomaa, editors. Handbook of formal languages. Vol. 1. Springer-Verlag, Berlin, 1997. Word, language, grammar. [26] Grzegorz Rozenberg and Arto Salomaa. The Book of L. Springer, 1986. [27] Pedro V. Silva and Pascal Weil. Automorphic orbits in free groups: words versus subgroups. Internat. J. Algebra Comput., 20(4):561–590, 2010. [28] John R. Stallings. Topology of finite graphs. Invent. Math., 71(3):551–565, 1983. School of Mathematical and Computer Sciences, Heriot-Watt University, Edinburgh EH14 4AS, Scotland E-mail address: [email protected] University of Technology Sydney, Ultimo NSW 2007, Australia E-mail address: [email protected] University of Technology Sydney, Ultimo NSW 2007, Australia E-mail address: [email protected] 21
4math.GR
arXiv:1606.08995v4 [math.GR] 31 Jan 2017 MULTIFRACTION REDUCTION II: CONJECTURES FOR ARTIN-TITS GROUPS PATRICK DEHORNOY Abstract. Multifraction reduction is a new approach to the word problem for Artin-Tits groups and, more generally, for the enveloping group of a monoid in which any two elements admit a greatest common divisor. This approach is based on a rewrite system (“reduction”) that extends free group reduction. In this paper, we show that assuming that reduction satisfies a weak form of convergence called semi-convergence is sufficient for solving the word problem for the enveloping group, and we connect semi-convergence with other conditions involving reduction. We conjecture that these properties are valid for all Artin-Tits monoids, and provide partial results and numerical evidence supporting such conjectures. 1. Introduction Artin-Tits groups are those groups that admit a positive presentation with at most one relation s... = t... for each pair of generators s, t and, in this case, the relation has the form stst... = tsts..., both sides of the same length [4, 23]. It is still unknown whether the word problem is decidable for all Artin–Tits groups as, at the moment, decidability was established for particular families only: braid groups (E. Artin [3] in 1947), spherical type (P. Deligne [20] and E. Brieskorn–K. Saito [5] in 1972), large type (K.I. Appel–P.E. Schupp [2] in 1983), trianglefree (S. Pride [29] in 1986), FC type (J. Altobelli [1] and A. Chermak [7] in 1998). Later on, some of these groups were proved to be biautomatic or automatic [22, 6]. This paper, which follows [13] but is self-contained, continues the investigation of multifraction reduction, a new approach to the word problem for Artin-Tits groups and, more generally, for the enveloping group U(M ) of a cancellative monoid M in which any two elements admit a left and a right greatest common divisor (“gcd-monoid”). This approach is based on a certain algebraic rewrite system, called reduction, which unifies and (properly) extends all previous rewrite systems based on exploiting the Garside structure of Artin–Tits monoids [9, 30, 27]. It is proved in [13] that, if the monoid M satisfies various properties involving the divisibility relations, all true in every Artin–Tits monoid, together with an additional assumption called the 3-Ore condition, then reduction is convergent and every element of the enveloping group of M admits a unique representation by an irreducible multifraction, directly extending the classical result by Ø. Ore about representation by irreducible fractions. In the current paper, we address the case of a general gcd-monoid, when the 3-Ore condition is not assumed. In this case, reduction is not convergent, and there is no unique representation of the elements of the group U(M ) by irreducible multifractions. However, we introduce a new, weaker condition called semi-convergence, and prove that most of the applications of the convergence of reduction can be derived from its semi-convergence, in particular a solution of the word problem for U(M ) whenever convenient finiteness conditions are satisfied. This makes the following conjecture crucial: Conjecture A. Reduction is semi-convergent for every Artin-Tits monoid. 1991 Mathematics Subject Classification. 20F36, 20F10, 20M05, 68Q42, 18B40. Key words and phrases. Artin-Tits monoid; Artin-Tits group; gcd-monoid; enveloping group; word problem; multifraction; reduction; semi-convergence; cross-confluence; tame reduction; van Kampen diagram; embeddability. 1 2 PATRICK DEHORNOY A proof of Conjecture A would imply the decidability of the word problem for every ArtinTits group. The reasons for believing in Conjecture A are multiple. One abstract reason is that reduction is really specific and uses both the whole Garside structure of Artin–Tits monoids and, for the finiteness of the set of basic elements, some highly nontrivial properties of the associated Coxeter groups [15, 21]: this may be seen as more promising than a generic approach based on, say, a “blind” Knuth–Bendix completion. Next, we state several related conjectures (“B”, “C”, “Cunif ”), of which some partial cases are proven and which suggest the existence of a rich rigid structure. Another reason is the existence of massive computer tests supporting all the conjectures and, at the same time, efficiently discarding wrong variations and dead-ends. Finally, the existence of a proof in the special case of FC type is a positive point. In the same direction, a weak version of Conjecture A (sufficient for solving the word problem) was recently established for all Artin–Tits groups of sufficiently large type [18]: although saying nothing about A itself, this shows that reduction is relevant for a new family of Artin–Tits groups. We present below a state-of-the-art description of the known results involving multifraction reduction, and report about computer experiments supporting Conjecture A and its variants. The paper is organized as follows. We gather in Section 2 the needed prerequisites about multifractions, gcd-monoids, and reduction. Semi-convergence and Conjecture A are introduced in Section 3, and their consequences are established. In Section 4, we analyze specific cases of reduction, namely divisions and their extensions, tame reductions. This leads to a new property, stated as Conjecture B, which is stronger than Conjecture A but easier to experimentally check and maybe to establish. Then, we introduce in Section 5 cross-confluence, a new property of reduction that involves both reduction and a symmetric counterpart of it. This leads to Conjecture C and its uniform version Cunif , again stronger than Conjecture A but possibly more accessible. In Section 6, we analyze the case of small depth multifractions. We prove in particular that semi-convergence for multifractions of depth 2 is equivalent to M embedding into its enveloping group, and semi-convergence for multifractions of depth 4 is equivalent to a unique decomposition property for fractions in U(M ). Finally, we gather in Section 7 reports about computer experiments and a few comments about further possible developments. Acknowledgments. The author thanks Friedrich Wehrung for many discussions about the content of this paper. In particular, the notion of a lcm-expansion mentioned in Sec. 7.1 appeared during our joint work of interval monoids [19]. The author also thanks both the editor and the referee, whose many suggestions certainly improved the exposition significantly. 2. Multifraction reduction In this introductory section, we recall the notions of a multifraction and of a gcd-monoid, as well as the definition of multifraction reduction [13]. 2.1. Multifractions. If M is a monoid, we denote by U(M ) and ι the enveloping group of M and the canonical morphism from M to U(M ), characterized by the universal property that every morphism from M to a group factors through ι. By definition, every element g of U(M ) can be expressed as (2.1) ι(a1 )ι(a2 )−1 ι(a3 )ι(a4 )−1 ··· or ι(a1 )−1 ι(a2 )ι(a3 )−1 ι(a4 )···, with a1 , ..., an in M . We shall investigate U(M ) using such expressions. In [13], without loss of generality, we only considered, expressions (2.1) where the first term ι(a1 ) is positive (possibly trivial, that is, equal to 1). Here, in particular in view of Section 5, we skip that condition, and allow for both signs in the first entry. Definition 2.2. Let M be a monoid. Let M be a disjoint copy of M ; call the elements of M (resp., M ) positive (resp., negative). For n > 1, a positive (resp., negative) n-multifraction on M is a finite sequence (a1 , ..., an ) with entries in M ∪ M , alternating signs, and a1 in M MULTIFRACTION REDUCTION II 3 (resp., M ). The set of all multifractions (resp., all positive multifractions) completed with the empty sequence ∅ is denoted by FM± (resp., FM ). A multiplication is defined by   for an and b1 in M , (a1 , ..., an−1 , an b1 , b2 , ..., bp ) (a1 , ..., an ) · (b1 , ..., bp ) = (a1 , ..., an−1 , b1 an , b2 , ..., bp ) for an and b1 in M ,   (a1 , ..., an , b1 , ..., bp ) otherwise, extended with a · ∅ = ∅ · a = a for every a. We use a, b, ... as generic symbols for multifractions, and ai for the ith entry of a counted from 1. For a in FM± , the length of a (number of entries) is called its depth, written kak. We identify an element a of M with the depth one positive multifraction (a). Multfractions will play the role of iterated fractions, and the following convention is then convenient: Notation 2.3. For a1 , ..., an in M , we put (2.4) a1 /···/an := (a1 , a2 , a3 , a4 , ...) and /a1 /···/an := (a1 , a2 , a3 , a4 , ...). We say that i is positive (resp., negative) in a if ai (resp., ai ) occurs in the expansion of a. With this convention, we recover the notation of [13], where only positive multifractions are considered and M remains hidden. Multifractions are adequately illustrated by associating with every element a of M an arrow labeled a, concatenating arrows to represent the product in M , and associating with every multifraction the path made of (the arrows of) the successive entries with alternating orientations. The rules for the multiplication of a and b can be read in the following diagrams: an b1 an b 1 - n positive in a, 1 positive in b: · = an b1 an b 1 - n positive in a, 1 negative in b: · = an b1 an b 1 - n negative in a, 1 positive in b: · = a b b 1 an n 1 - n negative in a, 1 negative in b: · = Proposition 2.5. (i) The set FM± equipped with · and ∅ is a monoid generated by M ∪ M , and FM is the submonoid of FM± generated by M ∪ {1/a | a ∈ M }. The family of depth one multifractions is a submonoid isomorphic to M . (ii) Let ≃± be the congruence on FM± generated by (1, ∅) and the pairs (a/a, ∅) and (/a/a, ∅) with a in M . For a in FM± , let ι(a) be the ≃± -class of a. Then the group U(M ) is (isomorphic to) FM± /≃± and, for all a1 , ..., an in M , we have (2.6) ι(a1 /···/an ) = ι(a1 )ι(a2 )−1 ι(a3 )···, ι(/a1 /···/an ) = ι(a1 )−1 ι(a2 )ι(a3 )−1 ···. (iii) The restriction of ≃± to FM is the congruence ≃ generated by (1, ∅) and the pairs (a/a, ∅) and (1/a/a, ∅) with a in M . The group U(M ) is also isomorphic to FM /≃. The translation a 7→ 1 · a maps FM± onto FM and, for all a, b in FM± , the relation a ≃± b is equivalent to 1 · a ≃ 1 · b. Proof. The argument is similar to the proof of [13, Proposition 2.4], and we only point the differences due to using signed multifractions. For (i), associativity is checked directly, and the generating subsets for FM± and FM follow from the equalities a1 /···/an = a1 · a2 · a3 · a4 · ··· = a1 · 1/a2 · a3 · 1/a4 · ··· : (2.7) ± both hold in FM , and the second only involves positive multifractions. For (ii) and (iii), for every a in FM± , the definition of ≃± implies ι(a) = ι(a)−1 and, writing + ι (a) for the ≃-class of a, that of ≃ implies ι+ (1/a) = ι+ (a)−1 . Hence both FM± /≃± and FM /≃ are groups generated by M . One easily checks that the latter groups satisfy the universal property defining U(M ), and are therefore isomorphic to U(M ). Then (2.6) directly follows from (2.7). Next, for every a in FM± , the product 1 · a belongs to FM . Then, for a, b in FM± , write a ≈ b for 1 · a ≃ 1 · b. By considering all sign combinations and using relations like 1/ab ≃ 1/b · 1/a, 4 PATRICK DEHORNOY one checks that ≈ is a congruence on FM± , and it contains the pairs (1, ∅), (a/a, ∅), and (/a/a, ∅) that generate ≃± , as one finds for instance 1 · /a/a = 1/a/a ≃ ∅ = 1 · ∅. Hence ≈ includes ≃± . In the other direction, ≃± contains pairs that generate ≃ and, being compatible with multiplication in FM± , it is in particular compatible with multiplication in FM . So ≃ is included in ≃± , and a ≃± b implies 1 · a ≃ 1 · b since 1 is invertible mod ≃± . Hence, ≃± is included in ≈ and, finally, ≃± and ≈ coincide, which means that, for all a, b in FM± , we have (2.8) a ≃± b ⇐⇒ 1 · a ≃ 1 · b. For a positive, we have 1 · a = a, so (2.8) implies in particular that ≃ is the restriction of ≃± to FM , and the rest follows easily.  Hereafter, we identify U(M ) with FM± /≃± and FM /≃. This representation is redundant in that, for every a in M , the inverse ι(a)−1 of ι(a) is represented both by the depth 1 negative multifraction /a and the depth 2 positive multifraction 1/a. We conclude this introduction with some terminology that will be used frequently: Definition 2.9. A multifraction a is called unital if a ≃± 1 holds, i.e., if a represents 1 in the group U(M ). It is called trivial if all entries are equal to 1 or 1. For n > 0, we write 1n for 1/···/1, n terms; for n < 0, we write 1n for /1/1/···/1, |n| terms; in practice, we shall often omit the index and write 1 for a trivial multifraction. 2.2. Gcd-monoids. The reduction process we investigate requires that the ground monoid is a gcd-monoid. We recall the basic definitions, referring to [13] (and [16]) for more details. Let M be a monoid. For a, b in M , we say that a left divides b or, equivalently, that b is a right multiple of a, written a 6 b, if ax = b holds for some x in M . If M is a cancellative monoid and 1 is the only invertible element in M , the left divisibility relation is a partial order on M . In this case, when they exist, the greatest common 6-lower bound of two elements a, b is called their left gcd, denoted by a ∧ b, and their least common 6-upper bound is called their right lcm, denoted by a ∨ b. Symmetrically, we say that a right divides b or, equivalently, that b is a left multiple of a, e b, if xa = b holds for some x. Under the same hypotheses, 6 e is a partial order written a 6 e and ∨ e. on M , with the derived right gcd and left lcm written ∧ Definition 2.10. We say that M is a gcd-monoid if M is a cancellative monoid, 1 is the only invertible element in M , and any two elements of M admit a left gcd and a right gcd. Typical examples of gcd-monoids are Artin-Tits monoids. Many more examples are known. In particular, every Garside or preGarside monoid [11, 16, 25] is a gcd-monoid. Standard arguments [13, Lemma 2.15] show that a gcd-monoid admits conditional right and left lcms: it need not be true that any two elements admit a right lcm, but any two elements that admit a common right multiple admit a right lcm, and similarly on the left. The gcd and lcm operations of a gcd-monoid are connected in several ways with the product. We refer to [16, section II.2] for the (easy) proof of the rule for an iterated lcm: Lemma 2.11. If M is a gcd-monoid and a, b, c belong to M , then a ∨ bc exists if and only if a ∨ b and a′ ∨ c do, where a′ is defined by a ∨ b = ba′ , and then we have (2.12) a ∨ bc = a · b′ c′ = bc · a′′ . with a ∨ b = ba′ = ab′ and a′ ∨ c = a′ c′ = ca′′ . This implies in particular that a 6 bc holds if and only if a ∨ b exists and a′ 6 c holds, with a′ defined by a ∨ b = ba′ . Lemma 2.13. If M is a gcd-monoid and a, b, a′ , b′ , c belong to M and satisfy ab′ = ba′ , then a ∧ b = a′ ∧ c = 1 implies a ∧ bc = 1. Proof. Assume x 6 a and x 6 bc. By Lemma 2.11, b ∨ x must exist and, writing b ∨ x = bx′ , we must have x′ 6 c. On the other hand, x 6 a implies x 6 ab′ = ba′ . So ba′ is a common right MULTIFRACTION REDUCTION II 5 multiple of b and x, hence it is a right multiple of their right lcm bx′ . As M is left cancellative, bx′ 6 ba′ implies x′ 6 a′ . Hence x′ left divides both a′ and c, and a′ ∧ c = 1 implies x′ = 1, whence x 6 b. Then x left divides both a and b, and a∧b = 1 implies x = 1, hence a∧bc = 1.  We shall also need the notion of a noetherian monoid. If M is a gcd-monoid, we use < for the proper version of left divisibility: a < b holds if we have b = ax for some non-invertible x, e vs. 6. e i.e., for x 6= 1, and similarly for < e are well-founded, Definition 2.14. A monoid M is called noetherian if the relations < and < e i.e., every nonempty subset of M has a <-minimal element and a <-minimal element. Note that a monoid hS | Ri+ is noetherian whenever each relation in R is homogeneous, i.e., it has the form u = v with u, v of the same length: indeed, a < b implies that any word in S representing a is shorter than any word representing b, and an infinite <-descending sequence cannot exist. Artin-Tits monoids are typical examples. 2.3. Reduction of multifractions. Introduced in [13], our tool for investigating the congruence ≃± on FM± is reduction, a family of partial depth-preserving transformations that, when defined, map a multifraction to a ≃± -equivalent multifraction. These transformations are written as an action on the right: when defined, a • R is the result of applying R to a. Definition 2.15. If M is a gcd-monoid and a, b lie in FM± , then, for i > 1 and x in M , we declare that b = a • Ri,x holds if we have kbk = kak, bk = ak for k 6= i − 1, i, i + 1, and there exists x′ (necessarily unique) satisfying for for for for i=1 i=1 i>2 i>2 positive in a: negative in a: positive in a: negative in a: bi−1 bi−1 b i x = ai , xbi = ai , e ai , = x′ ai−1 , bi x = x′ ai = x ∨ = ai−1 x′ , xbi = ai x′ = x ∨ ai , bi+1 x = ai+1 , xbi+1 = ai+1 , bi+1 x = ai+1 , xbi+1 = ai+1 . We write a ⇒ b if a • Ri,x holds for some i and some x 6= 1, and use ⇒∗ for the reflexive– ± transitive closure of ⇒. The rewrite system RM so obtained on FM± is called reduction, and its restriction to FM (positive multifractions) is denoted by RM . A multifraction a is called R-reducible if a ⇒ b holds for at least one b, and R-irreducible otherwise. The system RM is the one investigated in [13], where only positive multifractions are consid± ered: the only difference between [13, Def. 3.4] and Def. 2.15 is the adjunction in RM of a rule for the reduction at level 1 of a negative multifraction. As Ri,x preserves the sign of multifractions, no specific notation is needed for the restriction of Ri,x to positive multifractions. ± The reduction systems RM and RM extend free reduction (deletion of factors x−1 x or xx−1 ): applying Ri,x to a consists in removing x from ai+1 and pushing it through ai using an lcm operation, see Figure 1. A multifraction a is eligible for R1,x if and only if x divides both a1 and a2 , on the side coherent with their signs, and, eligible for Ri,x with i > 2 if and only if x divides ai+1 and admits a common multiple with ai , on the due side again. ai ai−1 ... x′ bi−1 ⇐ bi ... x bi+1 ai ai−1 ai+1 x′ bi−1 ⇐ bi ai+1 ... x bi+1 Figure 1. The reduction rule Ri,x : starting from a (grey), we extract x from ai+1 , push it through ai by taking the lcm of x and ai (indicated by the small round arc), and incorporate the remainder x′ in ai−1 to obtain b = a • Ri,x (colored). The left hand side diagram corresponds to the case when i is negative in a, i.e., ai is crossed negatively, the right hand one to the case when i is positive in a, i.e., ai is crossed positively, with opposite orientations of the arrows. 6 PATRICK DEHORNOY e 2 , here written Example 2.16. Let M be the Artin-Tits monoid of type A ha, b, c | aba = bab, bcb = cbc, cac = acai+ , and let a := 1/c/aba. Then a is eligible for R2,a and R2,b , since a and b left divide aba and admit a common right multiple with c. We find a • R2,a = ac/ca/ba and a • R2,b = bc/cb/ab. The latter are eligible for no reduction R1,x , since ac and ca (resp., bc and cb) admit no nontrivial common right divisor, and for no reduction R2,x , since the only nontrivial left divisors of ba (resp., ab) are b and ba (resp., a and ab), which admit no common right multiple with ca (resp., ac). Hence these multifractions are R-irreducible. We now state the basic properties of reduction needed below. They directly extend those established for positive multifractions in [13]. Verifying them in the general case is easy. Lemma 2.17. Assume that M be a gcd-monoid. (i) The relation ⇒∗ is included in ≃± , i.e., a ⇒∗ b implies a ≃± b. (ii) The relation ⇒∗ is compatible with the multiplication of FM± . (iii) For all a, b and p, q, the relation a ⇒∗ b is equivalent to 1p · a · 1q ⇒∗ 1p · b · 1q . Proof. (i) It directly follows from the definition (and from Fig. 1) that b = a • Ri,x implies ι(ai−1 )ι(ai )−1 ι(ai+1 ) = ι(bi−1 )ι(bi )−1 ι(bi+1 ) (resp., ι(ai−1 )−1 ι(ai )ι(ai+1 )−1 = ι(bi−1 )−1 ι(bi )ι(bi+1 )−1 ) for i negative (resp., positive) in a. (ii) Assume b = a • Ri,x , and let c be an r-multifraction. If the signs of r in c and 1 in a are different, then c · a is the concatenation of c and a, similarly c · b is the concatenation of c and b, and c · b = (c · a) • Ri+r,x trivially holds. If r is positive in c and 1 is positive in a, we have c · a = c1 /···/cr−1 /cr a1 /a2 /··· and c · b = c1 /···/cr−1 /cr b1 /b2 /···, and we obtain c · b = (c · a) • Ri+r−1,x : the point is that, if x both right divides a1 and a2 , it a fortiori right divides cr a1 and a2 . Finally, assume that r negative in c and 1 is negative in a. Then we find c·a = c1 /···/a1 cr /a2 /··· and c · b = c1 /···/b1 cr /b2 /···: the argument is the same as above, mutatis mutandis: the assumption that a • R1,x is defined means that x both left divides a1 and a2 , which implies that it a fortiori left divides a1 cr and a2 . Hence (c·a)•Ri+r−1,x is defined and we find c·b = (c·a)•Ri+r−1,x again. This completes compatibility with left multiplication. The compatibility on the right is similar: adding extra entries cannot destroy the eligibility for reduction. Let n = kak. Everything is trivial for i < n − 1, so we assume i = n − 1. If the signs of n in a and of 1 in c are different, the multiplication is a concatenation, and we obtain b · c = (a · c) • Rn−1,x trivially. If n is positive in a and 1 is positive in c, the argument is the same as for Rn−1,x . Finally, assume that n is negative in a and 1 is negative in c. Then we find a · c = a1 /···/an−1 /c1 an /c2 /··· and b · c = b1 /···/bn−1 /c1 bn /c2 /···. The assumption that e an−1 exists and x right divides an , which implies that it a a • Rn−1,x is defined means that x ∨ fortiori right divides c1 an . Hence (a · c) • Rn−1,x is defined, yielding b · c = (a · c) • Rn−1,x again. Thus reduction is compatible with multiplication on the right. (iii) That a ⇒ b implies 1p · a · 1q ⇒ 1p · b · 1q follows from (ii) directly. Conversely, assume 1p · b · 1q = (1p · a • 1q ) • Ri,x with x 6= 1. Let n = kak = kbk, and assume that the entries of a occur in 1p · b · 1q from r + 1 to r + n (with r = p or r = p − 1 according to the sign of p in 1p and that of 1 in a). Then we necessarily have r + 1 6 i < r + n. Indeed, i < r and i > r + n are impossible, since the (i + 1)st entry of 1p · a · 1q is trivial. Moreover, in the case i = r + 1, the element x necessarily divides a1 , since, otherwise, the rth entry of 1p · b · 1q could not be trivial. Hence, a • Ri,x is defined, and it must be equal to b.  Finally, we have a simple sufficient condition for termination. ± Lemma 2.18. [13, Proposition 3.13] If M is a noetherian gcd-monoid, then RM is terminating: every sequence of reductions leads in finitely many steps to an R-irreducible multifraction. MULTIFRACTION REDUCTION II 7 We skip the proof, which is exactly the same in the signed case as in the positive case, and consists in observing that a ⇒ b forces b to be strictly smaller than a for some antilexicographical ordering on FM± (comparing multifractions starting from the highest entry). ± 2.4. The convergent case. The rewrite system RM (as any rewrite system) is called convergent if every element, here every multifraction a, admits a unique R-irreducible reduct, usually denoted by red(a). The main technical result of [13] is Proposition 2.19. If M is a noetherian gcd-monoid satisfying the 3-Ore condition: If three elements of M pairwise admit a common right (resp. left) multiple, (2.20) then they admit a common right (resp. left) multiple, ± then RM is convergent. When a monoid M is eligible for Proposition 2.19, one easily deduces that two multifractions a, b represent the same element of U(M ) if and only if red(a) · 1p = red(b) · 1q holds for some p, q and, from there, that the monoid M embeds in its enveloping group U(M ) and b ± is b every element of U(M ) is represented by a unique R-irreducible multifraction, where R M ± obtained from RM by adding a rule that removes trivial final entries. It is also proved in [13] that, under mild additional finiteness assumptions on M (see Section 3 below), the relation ⇒∗ on M is decidable and, from there, so is the word problem for U(M ) when the 3-Ore condition is satisfied. The above results are relevant for a number of gcd-monoids. We recall that an Artin-Tits monoid M = hS | Ri+ is said to be of spherical type if the Coxeter group obtained by adding to (S, R) the relation s2 = 1 for each s in S is finite [5]. And M is said to be of type FC if, for every subfamily S ′ of S such that, for all s, t in S ′ , there is a relation s... = t... in R, the submonoid of M generated by S ′ is spherical [1, 24]. Proposition 2.21. [13, Proposition 6.5] An Artin-Tits monoid satisfies the 3-Ore condition if and only if it is of type FC. However, a number of Artin-Tits monoids fail to be of type FC and therefore are not eligible e 2 considered in Example 2.16. So we are for Proposition 2.19, typically the monoid of type A left with the question of either weakening the assumptions for Proposition 2.19, or using a conclusion weaker than convergence. 3. Semi-convergence After showing in Subsection 3.1 that the 3-Ore assumption cannot be weakened when proving ± ± the convergence of RM , we introduce in Subsection 3.2 a new property of RM called semiconvergence, which, as the name suggests, is weaker than convergence. We conjecture that, ± for every Artin-Tits monoid, the system RM is semi-convergent (“Conjecture A”). We prove ± in Subsection 3.3 that most of the consequences known to follow from the convergence of RM follow from its semi-convergence, in particular in terms of controlling the group U(M ) from inside the monoid M and solving its word problem. Finally, we describe in Subsection 3.4 several variants of semi-convergence. 3.1. The strength of the 3-Ore condition. A first attempt for improving Proposition 2.19 ± could be to establish the convergence of RM from an assumption weaker than the 3-Ore condition. This approach fails, as the latter turns out to be not only sufficient, but also necessary. Hereafter we say that a monoid M satifies the right (resp., left) 3-Ore condition when (2.20) is valid for right (resp., left) multiples. First, we recall Lemma 3.1. [13, Lemma 2.12] If M is a gcd-monoid, and a, b, c, d are elements of M satisfying e d = 1. ad = bc, then ad is the right lcm of a and b if and only if c and d satisfy c ∧ Proposition 3.2. Let M be a gcd-monoid. (i) If RM is convergent, then M satisfies the right 3-Ore condition. ± (ii) If RM is convergent, then M satisfies the 3-Ore condition. 8 PATRICK DEHORNOY Proof. (i) Assume that x, y, z belong to M and pairwise admit common right multiples, hence right lcms. Write x ∨ y = xy ′ = yx′ , y ∨ z = yz ′ = zy ′′ , x ∨ z = xz ′′ = zx′′ . Let a := 1/x/y ∨ z. As in Example 2.16, we find b = a • R2,y = y ′ /x′ /z ′ and c = a • R2,z = z ′′ /x′′ /y ′′ . The assumption that RM is convergent implies that b and c both reduce to d := red(a). By construction, d is of depth 3, and d3 must be a common right divisor of b3 and c3 , which are z ′ e y ′′ = 1, whence d3 = 1. Therefore, there exist d1 and d2 and y ′′ . Now, Lemma 3.1 implies z ′ ∧ ∗ in M satisfying 1/x/y ∨ z ⇒ d1 /d2 /1. By Lemma 2.17, we deduce 1/x/y ∨ z ≃± d1 /d2 /1, hence, by (2.6), x−1 (y ∨ z) = d1 d−1 in U(M ). This implies xd1 = (y ∨ z)d2 in U(M ), hence 2 in M , since the assumption that RM is convergent implies that M embeds in U(M ). It follows that x and y ∨ z admit a common right multiple, hence that x, y, and z admit a common right multiple. Hence M satisfies the right 3-Ore condition. (ii) The argument is symmetric, with negative multifractions. Assume that x, y, z belong to M and pairwise admit common left multiples, hence left lcms. Write e y = y ′ x = x′ y, x∨ e z = z ′ y = y ′′ z, y∨ Let a := /1/x/y ∨ z, in FM± \ FM . Then we have b = a • R2,y = /y ′ /x′ /z ′ e z = z ′′ x = x′′ z. x∨ and c = a • R2,z = /z ′′ /x′′ /y ′′ . ± The assumption that RM is convergent implies that b and c admit a common R-reduct, say d. By construction, d is of depth 3, and d3 must be a common left divisor of b3 and c3 , which are z ′ and y ′′ . By the symmetric counterpart of Lemma 3.1, we have z ′ ∨ y ′′ = 1, whence d3 = 1. e ∗ /d1 /d2 /1. By Lemma 2.17, we deduce Therefore, there exist d1 and d2 in M satisfying a ⇒ ± −1 e z ≃ /d1 /d2 /1, hence, by (2.6), x(y ∨ e z) = d−1 e /1/x/y ∨ 1 d2 in U(M ), whence d1 x = d2 (y ∨ z) e z admit a common left multiple, hence that in U(M ), hence in M . This shows that x and y ∨ x, y, and z admit a common left multiple. Hence M satisfies the left 3-Ore condition.  Note that the argument for (i) cannot be used for (ii), because one should start with a := e z and then we know nothing about the first entry(ies) of red(a). 1/1/x/y ∨ In principle, the right 3-Ore condition is slightly weaker than the full 3-Ore condition, and ± the convergence of RM might be weaker than that of RM . However, when M is an Artin-Tits monoid, all the above conditions are equivalent to M being of type FC and, therefore, none is weaker. So it seems hopeless to improve Proposition 2.19. 3.2. Semi-convergence. We are thus led to explore the other way, namely obtaining useful ± information about U(M ) from a property weaker than the convergence of RM or RM . This is the approach we develop in the rest of this paper. When the system RM is not convergent, a ≃-class may contain several R-irreducible multifractions, and there is no distinguished one: in Example 2.16, the automorphism that exchanges a and b exchanges the two R-irreducible reducts of a, making them indiscernible. However, a direct consequence of convergence is ± Lemma 3.3. If M is a gcd-monoid and RM is convergent, then, for every a in FM± , (3.4) If a is unital, then a ⇒∗ 1 holds. ± Indeed, if RM is convergent, a ≃± 1 implies (and, in fact, is equivalent to) red(a) = red(1), hence red(a) = 1, since 1 is R-irreducible. Note that, by Lemma 2.17(i), the converse implication of (3.4) is always true: a ⇒∗ 1 implies that a and 1 represent the same element of U(M ), hence that a represents 1. ± When RM is not convergent, (3.4) still makes sense, and it is a priori a (much) weaker condition than convergence. This is the condition we shall investigate below: MULTIFRACTION REDUCTION II 9 ± Definition 3.5. If M is a gcd-monoid, we say that RM (resp., RM ) is semi-convergent if (3.4) ± holds for every a in FM (resp., in FM ). ± Thus Lemma 3.3 states that RM is semi-convergent whenever it is convergent. By Propo± sition 2.21, RM and RM are semi-convergent for every Artin-Tits monoid M of type FC. But, as can be expected, semi-convergence is strictly weaker than convergence. We refer to [19] for ± the construction of monoids for which RM is semi-convergent but not convergent. The main conjecture we propose is: Conjecture A. For every Artin-Tits monoid M , the system RM is semi-convergent. We shall report in Section 7 about experimental data supporting Conjecture A. For the moment, we just mention one example illustrating its predictions. e 2 . We saw in Example 2.16 that Example 3.6. Let M be the Artin-Tits monoid of type A ± RM is not convergent: a = 1/c/aba admits the two distinct irreducible reducts ac/ca/ba and bc/cb/ab. When we multiply the former by the inverse of the latter (see Subsection 3.3 below), we obtain the 6-multifraction b = ac/ca/ba/ab/cb/bc which, by construction, is unital. Then Conjecture A predicts that b must reduce to 1. This is indeed the case: we find b • R3,ab R4,cb R5,bc R1,ac R2,cbc R3,bc R1,bc = 1 (as well as b • R5,bc R3,ac R1,ac R3,b R4,c R2,c = 1: the reduction sequence is not unique). More generally, we can observe that, for every gcd-monoid M , if a′ and a′′ are two reducts of an n-multifraction a, then the 2n-multifraction b obtained by concatenating a′ and the inverse of a′′ is always reducible whenever a′′ is nontrivial: by construction, we have bn = a′n and bn+1 = a′′n . An obvious induction shows that a ⇒∗ a′ implies that a′n divides an (on the left or on the right, according to the sign of n in a) and, similarly, a′′n divides an . Hence bn and bn+1 admit a common multiple and, therefore, b is eligible for some reduction Rn,x with x 6= 1 whenever bn+1 , i.e., a′′n , is not 1. Finally, if a′′n = 1 holds, then b is eligible for R2n−m,a′′m , where m is the largest index such that a′′m is nontrivial. 3.3. Applications of semi-convergence. Most of the consequences of convergence already follow from semi-convergence—whence the interest of Conjecture A. We successively consider the possibility of controlling the congruence ≃± , the decidability of the word problem, and what is called Property H. Controlling ≃± . In order to investigate ≃± without convergence, we introduce a new operation on multifractions to represent inverses. e = ∅, and, for every n-multifraction a, Notation 3.7. We put ∅ ( /an /···/a1 if n is positive in a, (3.8) e a := an /···/a1 if n is negative in a. Lemma 3.9. (i) For all multifractions a, b, we have ag · b = eb · e a. a) = ι(1 · e a) = ι(a)−1 . (ii) For every multifraction a, we have ι(e Proof. (i) If a written as a sequence in M ∪ M is (x1 , ..., xn ), then e a is (xn , ..., x1 ) (where we · b = eb · e a directly follows from the definition of the product. put a = a for a in M ), and then ag Point (ii) comes from (2.6).  Lemma 3.9(ii) says that, if a represents an element g of U(M ), then both e a and 1 · e a represent g −1 . By definition, ke ak = kak always holds, and the operation e on FM± is involutive. a is posHowever, this operation does not restrict to FM : if a is a positive multifraction, then e itive if and only if kak is even. In order to represent inverses inside FM , one can compose e with a left translation by 1, thus representing the inverse of a by 1 · e a. The inconvenience is that involutivity is lost: for kak odd and b = 1 · e a, we find 1 · eb = 1 · a 6= a. 10 PATRICK DEHORNOY Lemma 3.10. If M is a gcd-monoid and RM is semi-convergent, then a ≃± b is equivalent to 1 · a · eb ⇒∗ 1 for all a, b in FM± . Proof. As we have 1 ≃± ∅ and b · eb ≃± ∅ by Lemma 3.9, a ≃± b is equivalent to 1 · a · eb ≃± ∅, hence, by (2.6), to 1 · a · eb being unital, i.e., to ι(1 · a · eb) = 1. By construction, 1 · a · eb lies in FM . So, if RM is semi-convergent, ι(1 · a · eb) = 1 is equivalent to 1 · a · eb ⇒∗ 1.  As a direct application, we obtain Proposition 3.11. If M is a gcd-monoid and RM is semi-convergent, then M embeds in its enveloping group U(M ). Proof. Assume a, b ∈ M and ι(a) = ι(b), i.e., a ≃± b. By Lemma 3.10, we must have a · eb ⇒∗ 1, which is a/b ⇒∗ 1/1. By definition of reduction, this means that there exists x in M satisfying a/b • R1,x = 1/1. This implies a = b ( = x ).  The word problem for U(M ). If S is any set, we denote by S ∗ the free monoid of all words in S, using ε for the empty word. For representing group elements, we consider words in S ∪ S, where S is a disjoint copy of S consisting of one letter s for each letter s of S, due to represent s−1 . If w is a word in S ∪ S, we denote by w the signed word obtained from w by exchanging s and s and reversing the order of letters. If M is a monoid, S is included in M , and w is a word in S, we denote by [w]+ the evaluation of w in M . We extend this notation to words in S ∪ S by defining [w]+ to be the multifraction [w1 ]+ /···/[wn ]+ , where (w1 , ..., wn ) is the unique sequence of words in S such that w can be decomposed as w1 w2 w3 w4 ··· with wi 6= ε for 1 < i 6 n. Lemma 3.12. [13, Lemma 2.5] For every monoid M , every generating family S of M , and every word w in S ∪ S, the following are equivalent: (i) The word w represents 1 in U(M ); (ii) The multifraction [w]+ satisfies [w]+ ≃± 1 in FM± . Thus solving the word problem for the group U(M ) with respect to the generating set S amounts to deciding the relation [w]+ ≃± 1, which takes place in FM± , hence essentially inside M , as opposed to U(M ). A few more definitions are needed. First, a gcd-monoid M is called strongly noetherian if there exists a map λ : M → N satisfying, for all a, b in M , (3.13) λ(ab) > λ(a) + λ(b), and λ(a) > 0 for a 6= 1. This condition is stronger than noetherianity, but it still follows from the existence of a presentation by homogeneous relations (same length on both sides): in this case, the word length induces a map λ as in (3.13). So every Artin-Tits monoid is strongly noetherian. Next, we need the notion of a basic element. Noetherianity implies the existence of atoms, namely elements that cannot be expressed as the product of two non-invertible elements. One shows [16, Corollary II.2.59] that, if M is a noetherian gcd-monoid, then a subfamily S of M generates M if and only if it contains all atoms of M . Definition 3.14. [11] If M is a noetherian gcd-monoid, an element a of M is called right basic if it belongs to the smallest family X that contains the atoms of M and is such that, if a, b belong to X and a ∨ b exists, then the element a′ defined by a ∨ b = ba′ still belongs to X. Left-basic elements are defined symmetrically. We say that a is basic if it is right or left basic. Note that, in the above definition, nothing is required when a ∨ b does not exist. The key technical result is as follows: Lemma 3.15. [13, Prop 3.27] If M is a strongly noetherian gcd-monoid with finitely many basic elements and atom set S, then the relation [w]+ ⇒∗ 1 on (S ∪ S)∗ is decidable. This result is not trivial, because deciding whether a multifraction is eligible for some reduction requires to decide whether two elements of the ground monoid admit a common multiple, MULTIFRACTION REDUCTION II 11 and this is the point, where the finiteness of the number of basic elements occurs crucially, as it provides an a priori upper bound on the size of this possible common multiple. Then, we immediately deduce: Proposition 3.16. If M is a strongly noetherian gcd-monoid with finitely many basic elements and RM is semi-convergent, then the word problem for U(M ) is decidable. Proof. Let S be the atom set of M . By Lemma 3.15, the relation [w]+ ⇒∗ 1 on words in S ∪ S is decidable. By (3.4) (and by Lemma 2.17(i)), [w]+ ⇒∗ 1 is equivalent to [w]+ ≃± 1. Finally, by Lemma 3.12, [w]+ ≃± 1 is equivalent to w representing 1 in U(M ). Hence the latter relation is decidable.  Note that, because the multifraction [w]+ is always defined to be positive, we only need semi-convergence for RM in the above argument. In the particular case of Artin-Tits monoids, we deduce Corollary 3.17. If Conjecture A is true, then the word problem for every Artin-Tits group is decidable. Proof. Let M be an Artin-Tits monoid. We noted that M is a gcd-monoid [5], and that it is strongly noetherian. Next, M has finitely many basic elements: this follows from (and, actually, is equivalent to) the result that every Artin-Tits monoid has a finite Garside family [15, 21]. Hence M is eligible for Proposition 3.16.  Let us conclude with algorithmic complexity. Lemma 3.15 says nothing about the complexity of reduction. We show now the existence of an upper bound for the number of reductions. Lemma 3.18. If M is a strongly noetherian gcd-monoid with finitely many basic elements, then the number of reduction steps from an n-multifraction a is at most Fn (λ(a1 ), ..., λ(an )), where λ satisfies (3.13), C is the maximum of λ(a) + 1 for a basic in M , and Fn is inductively defined by F1 (x) = x + 2 and Fn (x1 , ..., xn ) = (x1 + 1)C Fn−1 (x2 ,... ,xn) . Proof. An easy induction shows that the function Fn is increasing with respect to each variable and, for every 1 6 i < n, it satisfies the inequality (3.19) Fn (Cx1 , ..., Cxi , xi+1 − 1, xi+2 , ..., xn ) < Fn (x1 , ..., xn ). For a an n-multifraction, write T (a) for the maximal number of reduction steps from a and λ(a) for (λ(a1 ), ..., λ(an )). We prove using induction on ⇒ the inequality T (a) 6 Fn (λ(a)) for every n-multifraction a. Assume a • Ri,x = b with x an atom of M (what can assumed without loss of generality). We compare the sequences λ(a) and λ(b). By definition, bi+1 is a proper divisor of ai+1 , which implies λ(bi+1 ) < λ(ai+1 ). Next, ai is the product of at most λ(ai ) basic elements of M , hence so is bi , implying λ(bi ) 6 Cλ(ai ). Finally, ai−1 is the product of at most λ(ai−1 ) basic elements of M , hence bi−1 is the product of at most λ(ai−1 ) + 1 basic elements, implying λ(bi−1 ) 6 Cλ(ai−1 ). Then the induction hypothesis implies T (b) 6 Fn (b), so, plugging the upper bounds for bi , and using that Fn is increasing and (3.19), we find T (b) 6 Fn (Cλ(a1 ), ..., Cλ(ai ), λ(ai+1 )−1, λ(ai+2 ), ..., λ(an )) < Fn (λ(a1 ), ..., λ(an )) = Fn (λ(a)), and T (a) 6 T (b) + 1 implies T (b) 6 Fn (b).  The upper bound of Lemma 3.18 is not polynomial (very far from statistical data, which suggest a quadratic bound), but it is not very high either in the hierarchy of fast growing functions (it is “primitive recursive”). From there, one can easily deduce a similar upper bound (tower of exponentials) for the word problem for U(M ) when RM is semi-convergent. 12 PATRICK DEHORNOY Property H. One says [12, 17, 26] that Property H is true for a presentation (S, R) of a monoid M if a word w in S ∪ S represents 1 in U(M ) if and only if the empty word can be obtained from w using special transformations, namely positive and negative equivalence and left and right reversing. Positive equivalence means replacing a positive factor of w (no letter s) with an R-equivalent word, negative equivalence means replacing the inverse of a positive factor with the inverse of an R-equivalent word, whereas right reversing consists in deleting some length two factor ss or replacing some length two factor st with vu such that sv = tu is a relation of R, and left reversing consists in deleting some length two factor ss or replacing some length two factor st with uv such that vs = ut is a relation of R. Roughly speaking, Property H says that a word representing 1 can be transformed into the empty word without introducing new trivial factors ss or ss, a situation directly reminiscent of Dehn’s algorithm for hyperbolic groups, see [17, Section 1.2]. Say that a presentation (S, R) of a monoid M is a right lcm presentation if R consists of one relation su = tv for each pair of generators s, t that admit a common right multiple, with su and tv representing s ∨ t. The standard presentation of an Artin-Tits monoid is a right lcm presentation, and, symmetrically, a left lcm presentation. Proposition 3.20. If M is a gcd-monoid and RM is semi-convergent, Property H is true for every presentation of M that is an lcm presentation on both sides. The point is that applying a rule Ri,x to a multifraction [w]+ can be decomposed into a sequence of special transformations as defined above. The argument is the same as in the case ± when RM is convergent [13, Proposition 5.19], and we do not repeat it. Thus Conjecture A would imply the statement conjectured in [12]: Corollary 3.21. If Conjecture A is true, Property H is true for every Artin-Tits presentation. 3.4. Alternative forms. Here we mention several variants of semi-convergence. ± Proposition 3.22. If M is a noetherian gcd-monoid, then RM (resp., RM ) is semi-convergent ± if and only if for every a in FM (resp., FM ), (3.23) If a is unital, then a is either trivial or reducible. ± Proof. Assume that RM is semi-convergent, and let a be a nontrivial unital multifraction in FM± . ∗ By definition, a ⇒ 1 holds. As a is nontrivial, the reduction requires at least one step, so a cannot be R-irreducible. Hence, (3.23) is satisfied. ± Conversely, assume (3.23). As M is noetherian, the rewrite system RM is terminating, i.e., the relation ⇒ admits no infinite descending sequence. Hence we can use induction on ⇒ to establish (3.4). So let a be a unital multifraction in FM± . If a is ⇒-minimal, i.e., if a is Rirreducible, then, by (3.23), a must be trivial, i.e., we have a = 1, whence a ⇒∗ 1. Otherwise, a is R-reducible, so there exist i, x such that b = a • Ri,x is defined. By construction, b is ≃± equivalent to a, hence it is unital. By the induction hypothesis, we have b ⇒∗ 1. By transitivity ± of ⇒∗ , we deduce a ⇒∗ 1. Hence RM is semi-convergent. The proof is similar for RM .  Condition (3.23) can be restricted to more special unital multifractions. Definition 3.24. Call a multifraction a prime if, for every i that is positive (resp., negative) in a, the entries ai and ai+1 admit no nontrivial common right (resp., left) divisor. Since dividing adjacent entries by a common factor is a particular case of reduction, an R-irreducible multifraction must be prime. The converse need not be true: for instance, the 6-multifraction b of Example 3.6 is prime, and it is R-reducible. ± Proposition 3.25. If M is a noetherian gcd-monoid, then RM (resp., RM ) is semi-convergent ± if and only if for every a in FM (resp., FM ), (3.26) If a is unital and prime, then a is either trivial or reducible. MULTIFRACTION REDUCTION II 13 Proof. By Proposition 3.22, the condition is necessary, since (3.26) is subsumed by (3.23). For the converse implication, assume (3.26). As for Proposition 3.22, we establish (3.4) using induction on ⇒. Let a be a unital multifraction in FM± . If a is R-irreducible, then it must be prime, for, otherwise, it is eligible for at least one division, which is a special case of reduction. Hence, a must be 1 by (3.26). Otherwise, a is R-reducible, there exist i, x such that b = a • Ri,x is ± is semi-convergent. defined, the induction hypothesis implies b ⇒∗ 1, hence a ⇒∗ 1. Hence RM The proof for RM is similar.  Corollary 3.27. Conjecture A is true if and only if (3.26) holds for every Artin-Tits monoid M and every a in FM . We turn to another approach. Whenever the ground monoid M is noetherian, the rewrite ± systems RM and RM are terminating, hence they are convergent if and only if they are confluent, meaning that (3.28) If we have a ⇒∗ b and a ⇒∗ c, there exists d satisfying b ⇒∗ d and c ⇒∗ d (“diamond property”). We now observe that semi-convergence is equivalent to a weak form of confluence involving the unit multifractions 1. ± Proposition 3.29. If M is a gcd-monoid, then RM (resp., RM ) is semi-convergent if and only ± if for every a in FM (resp., FM ), (3.30) The conjunction of a ⇒∗ b and a ⇒∗ 1 implies b ⇒∗ 1. Relation (3.30) can be called 1-confluence for a, since it corresponds to the special case c = 1 of (3.28): indeed, (3.28) with c = 1 claims the existence of d satisfying b ⇒∗ d and 1 ⇒∗ d, and, as 1 is R-irreducible, we must have d = 1, whence b ⇒∗ 1, as asserted in (3.30). In order to establish Proposition 3.29, we need an auxiliary result, which connects ≃± with the symmetric closure of ⇒∗ and is a sort of converse for Lemma 2.17. Lemma 3.31. If M is a gcd-monoid and a, b belong to FM± , then a ≃± b holds if and only if there exist a finite sequence c0 , ..., c2r in FM± and p, q in Z satisfying (3.32) a · 1p = c0 ⇒∗ c1 ∗⇐ c2 ⇒∗ ··· ∗ ⇐ c2r = b · 1q . b ∗ b if a· ⇒∗ b · 1p holds for some p. By Lemma 2.17, a ⇒∗ b Proof. For a, b in FM± , write a ⇒ ∗ b ∗ is transitive. It is also compatible with implies a · 1r ⇒ b · 1r and, therefore, the relation ⇒ multiplication: on the left, this follows from Lemma 2.17 directly. On the right, a ⇒∗ b · 1p implies a · c ⇒∗ b · 1p · c for every c, and we observe that 1p · c ⇒∗ c · 1p always holds. Hence, the b ∗ is a congruence on FM± . As we have 1 ⇒∗ ∅ · 1, a/a ⇒∗ ∅ · 12 and symmetric closure ≈ of ⇒ ∗ /a/a ⇒ ∅ · 1−2 for every a in M , the congruence ≈ contains pairs that generate ≃± . Hence b ∗ and its inverse connecting a to b. Taking the a ≃± b implies the existence of a zigzag in ⇒ maximum of |r| for 1r occurring in the zigzag, one obtains (3.32).  ± Proof of Proposition 3.29. Assume that RM is semi-convergent, and we have a ⇒∗ b and a ⇒∗ 1. ± is semi-convergent, this By Lemma 2.17, we have a ≃± b and a ≃± 1, hence b ≃± 1. As RM ± implies b ⇒∗ 1. So (3.30) is satisfied, and RM is 1-confluent. ± Conversely, assume that RM is 1-confluent. We first show using induction on k that, when 0 ∗ 1 ∗ 2 we have a zigzag c ⇒ c ⇐ c ⇒∗ c3 ∗⇐ c4 ⇒∗ ···, then c0 = 1 implies ck ⇒∗ 1 for every k. For k = 0, this is the assumption. For k even non-zero, we obtain ck ⇒∗ ck−1 ⇒∗ 1 using the induction hypothesis, whence ck ⇒∗ 1 by transitivity of ⇒∗ . For k odd, we have ck−1 ⇒∗ 1 by the induction hypothesis and ck−1 ⇒∗ ck , whence ck ⇒∗ 1 by 1-confluence. Now assume that a is unital. Lemma 3.31 provides p, q, r and c0 , ..., c2r satisfying 1p = c0 ⇒∗ c1 ∗⇐ c2 ⇒∗ ··· ∗ ⇐ c2r = a · 1q . ± As shown above, we deduce a · 1q ⇒∗ 1, whence a ⇒∗ 1 by Lemma 2.17. Hence RM is semiconvergent. Once again, the proof for FM is the same.  14 PATRICK DEHORNOY Corollary 3.33. Conjecture A is true if and only if (3.30) holds for every Artin-Tits monoid M and every a in FM . Proposition 3.29 is important for testing Conjecture A, because it shows that, if a ⇒∗ 1 holds, then every sequence of reductions from a inevitably leads to 1. In other words, any reduction strategy may be applied without loss of generality. 4. Divisions and tame reductions When reduction is not convergent, it is not confluent either, and a multifraction may admit several reducts with no subsequent common reduct. However, by restricting to particular reductions, we can retrieve a (weak) form of confluence and let distinguished reducts appear. This is the approach we explore in this section. We start in Subsection 4.1 with divisions, which are particular reductions with good, but too weak properties. Then, in Subsection 4.2, we extend divisions into what we call tame reductions, which are those reductions that, in a sense, exclude no subsequent opportunities. Extending the example of divisions to tame reductions leads us in Subsection 4.3 to the natural notion of a maximal tame reduction and to Conjecture B about tame reductions from unital multifractions, which is stronger but more precise than Conjecture A. We feel that the many technical details, examples, and counter-examples appearing in this section and the next one are important, because they illustrate how subtle the mechanism of reduction is. Skipping such details would induce a superficial view and misleadingly suggest that things are more simple than they really are, possibly leading to naive attempts with no chance of success. 4.1. Divisions. Divisions are the most direct counterparts of free reductions in free monoids. They are the special cases of reduction when no remainder appears. No confluence result can be expected for divisions in a non-free monoid, but we shall see in Proposition 4.4, the main result of this subsection, that, for every multifraction a, there exists a unique, well-defined maximal reduct ∂a accessible from a by divisions. Following the model of reductions, we first fix notation for divisions. Definition 4.1. If M is a gcd-monoid and a, b belong to FM± , we declare that b = a • Di,x holds if we have b = a • Ri,x and, in addition, x right (resp., left) divides ai if i is positive (resp., ± negative) in a. We use DM for the family of all Di,x with x 6= 1, write a ⇒div b if some rule ± ∗ for the reflexive–transitive closure of ⇒div . of DM maps a to b, and ⇒div So a • Di,x is defined if and only if x divides ai and ai+1 on the due side, and applying Di,x means dividing ai and ai+1 by x. By definition, a is D-irreducible if and only if it is prime (Definition 3.24), i.e., the gcds of adjacent entries (on the relevant side) are trivial. ± Except in degenerated cases, e.g., free monoids, the system DM is not convergent: typically, + for M = ha, b | aba = babi (Artin’s 3-strand braid monoid) and a = a/aba/b, we find a • D2,b = a/ab/1 and a • D1,a = 1/ab/b, with no further division, and confluence can be restored only at the expense of applying some reduction Ri,x , here a • D2,b = a • D1,a R2,b . However, we shall see now that, for every multifraction a, there exists a unique, well-defined maximal R-reduct of a that can be obtained using divisions. The first step is to observe that, for each level i, there is always a maximal division at level i, namely dividing by the gcd of the ith and (i + 1)st entries (on the due side). Indeed, assuming for instance i positive in a, the multifraction a • Di,x is defined if and only if x right divides e ai+1 . both ai and ai+1 , hence if and only if x right divides the right gcd ai ∧ Notation 4.2. If M is a gcd-monoid and a is a multifraction on M , then, for i < kak, we write a • Dimax for a • Di,x with x the gcd of ai and ai+1 on the due side. Next, we observe that, contrary to general irreducibility, (local) primeness is robust, in that, once obtained, it cannot be destroyed by subsequent divisions: MULTIFRACTION REDUCTION II 15 Lemma 4.3. Say that a multifraction a is j-prime if a • Dj,y is defined for no y 6= 1. If a is j-prime, then so is a • Di,x for all i, x. Proof. Assume for instance j positive in a, and let b = a • Di,x . We have either bj = aj (for i < j − 1 and i > j) or bj 6 aj (for i = j − 1); similarly, we have either bj+1 = aj+1 (for i < j e ai+1 = 1 and i > j + 1) or bj+1 6 aj+1 (for i = j + 1). Hence, in all cases, the assumption ai ∧ e implies bi ∧ bi+1 = 1.  Hence, if we start with a multifraction a and apply, in any order, maximal divisions Dimax in such a way that every level between 1 and kak − 1 is visited at least one, we always finish with a prime multifraction. The latter may depend on the order of the divisions, but we shall now see that there exists a preferred choice. Proposition 4.4. Let M be a gcd-monoid. For every n-multifraction a on M , put max max ∂a := a • Dn−1 Dn−2 ···D1max . (4.5) Then, ∂a is prime, and, for every multifraction b on M , ∗ a ⇒div b (4.6) implies ∗ b ⇒div ∂b ⇒∗ ∂a. Thus ∂a is a reduct of every multifraction obtained from a using division. The proof of Proposition 4.4 is nontrivial and requires to precisely control the way divisions and reductions can be commuted. We begin with a confluence result. By [13, Lemma 4.6], there always exists a confluence solution for any two reductions at level i and i + 1. This applies of course when one of the reductions is a division, but, in that case, we can say more. Lemma 4.7. Assume that both a • Ri+1,x and a • Di,y are defined. Then we have a • Ri+1,x Di,z = a • Di,y Ri+1,x , where z is determined by the equalities ai = ay, x ∨ a = av, and vz = v ∨ y e a = va, and zv = v ∨ e y) for i positive (resp., negative) in a. Moreover, if y (resp., ai = ya, x ∨ is maximal for a (i.e., y is the gcd of ai and ai+1 ), then z is maximal for a • Ri+1,x . Proof. (Figure 2) Assume that i is positive in a, so ai+1 is negative in a. Put b := a • Ri+1,x and c := a • Di,y . By definition, there exists x′ satisfying bi−1 = ai−1 , bi = ai x′ , xbi+1 = ai+1 x′ = x ∨ ai+1 , xbi+2 = ai+2 , ci−1 = ai−1 , ci y = ai , ci y = ai , ci+2 = ai+2 . As ai+1 is ci+1 y, Lemma 2.11 implies the existence of u, v, and z satisfying (4.8) bi+1 = uz with ci+1 v = xu = x ∨ ci+1 and yx′ = vz = y ∨ v. By construction, we have bi = ai x′ = ci yx′ = ci vz, which shows that z right divides both bi and bi+1 . Hence d := b • Di,z is defined, and we have (4.9) di−1 = ai−1 , di = cv , di+1 = u, di+2 = bi+2 . On the other hand, by assumption, x left divides ci+2 , which is ai+2 , and x and ci+1 admit a common right multiple, namely their right lcm xu. Hence, c • Ri,x is defined, and comparing with (4.9) directly yields the expected equality c • Ri,x = b • Di,z . e ai+1 . It remains to prove that, if y is maximal for a, then z is maximal for b. So assume y = ai ∧ e We deduce ci ∧ ci+1 = 1. On the other hand, by Lemma 3.1, the assumption ci+1 v = ci+1 ∨ x e v = 1. Then (the symmetric counterpart of) Lemma 2.13 implies ci v ∧ e u = 1, whence implies u ∧ e bi ∧ bi+1 = z.  A symmetric argument applies when i is negative in a. Next, we observe that reduction and division commute when performed at distant levels: the result is easy for very distant levels, slightly more delicate when the levels are closer. Lemma 4.10. Assume b = a • Ri,x , and j 6= i, i + 1, i − 2 (resp., j = i − 2). Put a′ := a • Djmax max and b′ := b • Djmax . Then we have b′ = a′ • Ri,x (resp., b′ = a′ • Ri,x Di−2 ). 16 PATRICK DEHORNOY ai+2 bi+2 x ci ci+1 a v y ai−1 ai u bi+1 z x′ bi Figure 2. Proof of Lemma 4.7: if a is eligible both for Ri+1,x and Di,y , we can start with either and converge to the colored path. Proof. For j 6 i−3 or j > i+2, the reduction Ri,x does not change the jth and (j +1)st entries, so the greatest division at level j remains the same, and commutation is straightforward. For j = i − 1, Lemma 4.7 gives b′ = a′ • Ri,x . Assume j = i − 2. Then the reduction Ri,x does not change the jth entry, but it possibly increases the (j + 1)st entry. So, if Dj,y is the maximal j-division for a, then Dj,y applies to b, but it need not be the maximal j-division for b. Expanding the definitions, we obtain the commutation relation a • Ri,x Dj,y = a • Dj,y Ri,x , meaning b • Dj,y = a′ • Ri,x , together with max , as expected.  b′ = (b • Dj,y )Djmax , whence b′ = a′ • Ri,x Di−2 The last preliminary result, needed for the end of the proof of Proposition 4.4, connects ∂a and ∂b in the (very special) case when b is an elementary reduct of a and a is prime at every sufficiently large level. Lemma 4.11. If a and b are j-prime for j > i, then b = a • Ri+1,x implies ∂a ⇒∗ ∂b. max max Proof. By assumption, we have ∂a = a • Di−1 ···D1max and ∂b = b • Di−1 ···D1max . Put ai := a, i j j+1 j j+1 max max • D ,b =b • D for j decreasing from i − 1 to 1, b := b and, inductively, a = a j j 1 1 yielding ∂a = a and ∂b = b . We prove using induction on j decreasing from i to 1 that, for every y, there exist x0 , x1 , ..., xk with i−2k > j satisfying bj = aj • Ri+1,x0 Ri−1,x1 ···Rx−2k+1,xk . By assumption, the property is true for j = i, with k = 0 and x0 = x. Assume i > j > 1. By induction hypothesis, we have bj+1 = aj+1 • Ri+1,x0 Ri−1,x1 ···Ri−2k+1,xk for some x0 , ..., xk with i−2k > j+1. By repeated applications of Lemma 4.10, we deduce that each reduction Ri−2ℓ+1,xℓ commutes with Djmax , except the last one in the case i − 2k = j + 2, in which case Lemma 4.10 prescribes to add one more reduction (a division) Ri−2k−1,xk+1 . In this way, we obtain either bj = aj • Ri+1,x0 Ri−1,x1 ···Ri−2k+1,xk , or bj = aj • Ri+1,x0 Ri−1,x1 ···Ri−2k+1,xk Ri−2k−1,xk+1 , and the induction continues.  We can now complete the argument for Proposition 4.4. The proof that ∂a is prime is easy, but that of the relation (4.4) is more delicate. max Proof of Proposition 4.4. It follows from the definition that a • Dn−1 is (n − 1)-prime, then that max max a • Dn−1 Dn−2 is (n − 1)- and (n − 2)-prime, etc., hence that ∂a is i-prime for 1 6 i < n, hence it is prime. ∗ b implies ∂b ⇒∗ ∂a. For an induction, it is We now establish (4.6), i.e., prove that a ⇒div ∗ sufficient to prove that a ⇒div b implies ∂b ⇒ ∂a. So, we assume b = a • Di,z , and aim at ∗ ∂a. Put kak = n. By definition, ∂a and ∂b are obtained by performing n − 1 proving ∂b ⇒div successive divisions, and we shall establish a step-by-step connection summarized in Figure 3. Put an := a, bn := b, and let ai (resp., bi ) be obtained from ai+1 (resp., bi+1 ) by applying Dimax , so that we finally have ∂a = a1 and ∂b = b1 . We assume that i is positive in a. Consider first j > i + 2. Applying Lemma 4.10, we inductively obtain bj = aj • Di,z , implying the commutativity of the n − i − 2 left hand squares in the diagram of Figure 3. MULTIFRACTION REDUCTION II 17 Now let x = ai+1 ∧ ai+2 . By definition, we have ai+1 = ai+2 • Di+1,x . By Lemma 4.7, there exists c and z ′ satisfying c = ai+2 • Di+1,x Di,z′ = ai+2 • Di,z Ri+1,x , which reads c = ai+1 Di,z′ = bi+2 • Ri+1,x . Next, c is obtained from ai+1 by some i-division, whereas ai is obtained from ai+1 by the maximal i-division, hence ai must be obtained from c by some further i-division, namely the maximal i-division for c. So, ai = c • Dimax holds. On the other hand, bi+1 is obtained from bi+2 by the maximal (i + 1)-division, namely Di+1,y with y = bi+1 ∧ bi+2 . As we have x = ai+2 ∧ ai+2 and bi+2 = ai+2 , the relation bi+1 6 ai+1 implies y 6 x, say x = yx′ . If follows that reducing x at level i + 1 in bi+2 amounts to first dividing by y and then reducing x′ , i.e., we have b • Ri+1,x = b • Di+1,y Ri+1,x′ = bi+1 • Ri+1,x′ . Now, two reductions apply to bi+1 , namely Ri+1,x′ , which leads to c, and Dimax , which is, say, Di+1,y and leads to bi . Applying Lemma 4.7 again, we obtain the existence of y ′ satisfying bi+1 • Ri+1,x′ Di,y′ = bi+1 • Di,y Ri+1,x′ , which boils down to c • Di,y′ = bi • Ri+1,x′ . Moreover, as Di,y is the maximal i-division applying to bi+1 , Lemma 4.7 implies that Di,y′ is the maximal i-division applying to c. We obtained above ai = c • Dimax , so we deduce ai = bi • Ri+1,x′ . From there, we are in position for applying Lemma 4.11 (with a and b interchanged): we have ai = bi • Ri+1,x′ , and, by construction, ai and bi are j-prime for every j > i. Then Lemma 4.11  ensures b1 ⇒∗ a1 , which is ∂b ⇒∗ ∂a. an max Dn−1 an−1 Di,z b n max Dn−1 ai+2 Di,z b n−1 max Di+1 ai+1 Di,z b Dimax ai Di,z′ i+2 c Ri+1,x Dimax a i Ri+1,x′ b i+2 i+1 max Di+1 b Dimax max Di−1 ai−1 Ri+1,x′ b i max Di−1 a2 D1max Lemma 4.11 b i−1 b 2 D1max ∂a ∗ ∂b Figure 3. Comparing the computations of ∂a and ∂(a • Di,x ). Let us denote by Irr(a) the family of all R-irreducible reducts of a. The failure of confluence means that Irr(a) may content more than one element, and controlling Irr(a) is one of the main challenges in the current approach. As, for every multifraction a, we have now a distinguished ∗ reduct ∂a, a natural task is to compare Irr(∂a) with Irr(a). By definition, a ⇒div ∂a implies ∗ Irr(∂a) ⊆ Irr(a), and, by Proposition 4.4, a ⇒div b implies b ⇒ ∂a, whence Irr(∂a) ⊆ Irr(∂b). The next examples show these easy inclusions are the best we can expect in general. e 2 , let a = ab/aba/aca. Then one finds Example 4.12. In the Artin-Tits monoid of type A Irr(a) = {a1 , a2 }, with a1 = a • D2,a = ab/ba/ca and a2 = a • D1,ab R2,c = cb/bc/ac. Now, we obtain ∂a = a1 , whence Irr(∂a) = {a1 }: so, by performing divisions, we lost one of the irreducible reducts of a. On the other hand, for b = a • D1,ab = 1/b/aca, we find ∂b = b and Irr(∂b) = Irr(b) = {a1 , a2 } = Irr(a): so a ⇒div b does not imply Irr(∂b) ⊆ Irr(∂a). Remark 4.13. The order of divisions is important in the definition of ∂a and, even at the expense of using reductions instead of divisions, we cannot start from low levels in general. Indeed, for kak = 3, Lemma 4.7 implies ∂a = a • R1,x1 R2,x2 , with xi the (relevant) gcd of ai Q and ai+1 , but this expression of ∂a as a • i=kak−1 Ri,xi with xi gcd of ai and ai+1 does not work i=1 for kak > 4: for instance, for a := a/a/a/a, one finds a • R1,x1 R2,x2 R3,x3 = a/a/1/1 6= ∂a = 1. 4.2. Tame reductions. What motivates studying divisions specifically is that the latter satisfy a form of confluence: by Lemma 4.7 and the results of [13], if a multifraction a is eligible for a division Di,x and for another reduction Rj,y , a common reduct for a • Di,x and a • Rj,y always exists. Moreover, we saw in Proposition 4.4 that there always exists a maximal div-reduct with good compatibility properties of the associated operator ∂. However, because many prime 18 PATRICK DEHORNOY multifractions are not irreducible, and, in particular, many prime unital multifractions are not trivial, it is hopeless to analyze reduction in terms of divisions exclusively, making it natural to try to extend the family of divisions so as to preserve its main property, namely “guaranteed confluence”. This leads to tame reductions, and the main result here is that, exactly as in the case of divisions, there exists for each multifraction a and each level i a maximal tame i-reduction applying to a. Definition 4.14. If a is a multifraction, we say that x is an i-reducer for a if a • Ri,x is defined; we then say that an i-reducer x is tame for a if, for all j, y such that a • Rj,y is defined, a • Ri,x and a • Rj,y admit a common reduct; otherwise, x is called wild for a. Thus x is a tame i-reducer for a if reducing x in a leaves all possibilities for further reductions open, whereas reducing a wild i-reducer excludes at least one subsequent confluence. ± Example 4.15. If M is a gcd-monoid satisfying the 3-Ore condition, the system RM is confluent and, therefore, every reducer is tame for every multifraction it applies to. By contrast, in the e 2 , for a = 1/c/aba, both a and b are 2-reducers for a, but a • R2,a and Artin-Tits of type A a • R2,b admit no common reduct, hence a and b are wild 2-reducers for a. To prove the existence of the maximal tame i-reducer in Proposition 4.18 below, we shall use convenient characterizations of tame reducers established in Lemmas 4.16 and 4.17. Lemma 4.16. If M is a gcd-monoid, a is a multifraction on M , and a • Ri,x is defined, then x is a tame i-reducer for a if and only if for i positive (resp., negative) in a, the elements x, y, and ai admit a common right (resp., left) multiple whenever a • Ri,y is defined. Proof. Assume that x is a tame i-reducer for a, and let y be an i-reducer for a. By definition, a • Ri,x and a • Ri,y admit a common reduct, which is necessarily of the form a • Ri,z for some z. Then there exist u, v satisfying a • Ri,z = (a • Ri,x ) • Ri,u = (a • Ri,y ) • Ri,v . Assuming i negative in a, we deduce z = xu = yv. Hence z is a right multiple of x ∨ y and, therefore, a • Ri,x∨y is defined as well, implying that ai , x, and y admit a common right multiple. The argument is symmetric when i is positive in a. Conversely, assume that x is an i-reducer for a and, for every i-reducer y, the elements ai , x, and y admit a common multiple, say a common right multiple, assuming that i is negative in a. Then x ∨ y left divides ai+1 since x and y do, and ai and x ∨ y admit a common right multiple. Hence a • Ri,x∨y is defined. Then, writing x ∨ y = xy ′ = yx′ , we have a • Ri,x∨y = (a • Ri,x ) • Ri,y′ = (a • Rj,y ) • Ri,x′ , which shows that a • Ri,x and a • Ri,y admit a common reduct. On the other hand, for j 6= i, Lemmas 4.18 and 4.19 from [13] imply that a • Ri,x and a • Rj,y always admit a common reduct. Therefore, x is a tame i-reducer for a.  If M is a noetherian gcd-monoid, every nonempty family X of left divisors of an element a necessarily admits <-maximal elements, i.e., elements z such that there is no x with z < x in e the family: take z so that z −1 a is <-minimal in {x−1 a | x ∈ X}. Hence, in particular, for every multifraction a and every level i, there exist maximal i-reducers for a. Lemma 4.17. If M is a noetherian gcd-monoid and a is a multifraction on M , an i-reducer x for a is tame if and only if x divides every maximal i-reducer for a. Proof. Assume that x is a tame i-reducer for a, and y is a maximal i-reducer for a. By Lemma 4.16, ai , x, and y admit a common multiple, hence an lcm, and, therefore, the lcm of x and y is again an i-reducer for a. The assumption that y is maximal implies that this lcm is y, i.e., that x divides y (on the due side). Conversely, assume that x is an i-reducer for a that divides every maximal i-reducer. Let y be an arbitrary i-reducer for a. As M is noetherian, y divides at least one maximal i-reducer, MULTIFRACTION REDUCTION II 19 say z. By assumption, x divides z, hence so does the lcm of x and y. Since z is an i-reducer for a, so is its divisor the lcm of x and y and, therefore, a • Ri,x and a • Ri,y admit a common  reduct. Hence x is tame for a. Proposition 4.18. If M is a noetherian gcd-monoid and a is a multifraction on M , then, for every i < kak, there exists a unique greatest tame i-reducer for a, namely the gcd of all maximal i-reducers for a. The latter is a multiple of the gcd of ai and ai+1 . Proof. Let z be the gcd (on the relevant side) of all maximal i-reducers for a. Then z, and every divisor x of z, divides every maximal i-reducer for a, hence, by Lemma 4.17, it is a tame i-reducer for a. Conversely, if x is a tame i-reducer for a, then, by Lemma 4.17, x divides every maximal i-reducer for a, hence it divides their gcd z. Hence z is the greatest tame i-reducer for a. Finally, assume that x divides ai and ai+1 . Then a • Di,x , hence a fortiori a • Ri,x is defined, so x is an i-reducer for a. Let y be any i-reducer for a. Then the lcm of ai and y is a common multiple of ai , x, and y. Hence, by Lemma 4.16, x is a tame i-reducer for a. This applies in particular when x is the gcd of ai and ai+1 .  On the shape of what we did with divisions, we introduce Definition 4.19. If M is a noetherian gcd-monoid and a is a multifraction on M , then, for i < kak, the unique element x whose existence is stated in Proposition 4.18 is called the greatest tame i-reducer for a; we then write a • Rimax for a • Ri,x . Example 4.20. When M satisfies the 3-Ore condition, every reducer is tame, and a • Rimax coincides with the maximal i-reduct of a, as used in [13, Section 6]. Otherwise, wild reducers e 2, may exist and a • Rimax need not be a maximal i-reduct of a: in the Artin-Tits monoid of type A for a = 1/c/aba, we have a • R2max = a, since there is no nontrivial tame 2-reducer. By definition, the greatest tame i-reducer for a only depends on the entries ai and ai+1 , and on the sign of i in a. By Lemma 4.17, it can be computed easily as a gcd of maximal reducers. Note that the greatest tame i-reducer for a may be strictly larger than the gcd of ai e 2 , there exist two maximal 2-reducers and ai+1 : for instance, in the Artin-Tits monoid of type A for a := 1/a/cabab, namely caa and cab, both wild, and the greatest tame 2-reducer is their left gcd ca, a proper multiple of the left gcd of a and cabab, which is 1. If M is a noetherian gcd-monoid, starting from an arbitrary multifraction a and repeatedly performing (maximal) tame reductions leads in finitely many steps to a ≃± -equivalent multifraction that is tame-irreducible, meaning eligible for no tame reduction. By Proposition 4.18, a division is always tame, so a tame-irreducible multifraction is prime. Adapting the proof of Proposition 3.25 yields: ± Proposition 4.21. If M is a noetherian gcd-monoid, then RM (resp., RM ) is semi-convergent ± if and only if, for every a in FM (resp., FM ), (4.22) If a is unital and tame-irreducible, then a is either trivial or reducible. Corollary 4.23. Conjecture A is true if and only if (4.22) holds for every Artin-Tits monoid M and every a in FM . The above results suggest to investigate tame-irreducible multifractions more closely. By definition, only wild reductions may apply to a tame-irreducible multifraction. A possible approach for establishing (4.22) could be to study the irreducible reducts of tame-irreducible multifractions. It happens frequently that, if a is tame-irreducible and admits several (wild) reducts a1 , ..., am , then the reducts of the various ak s are pairwise disjoint, as if every such reduct kept a trace of ak . If true, such a property might lead to a proof of Conjecture A using Corollary 4.23 and arguments similar to those alluded to in the proof of Proposition 7.3. But e 2, the assumption is not readily correct. Indeed, always in the Artin-Tits monoid of type A the 6-multifraction a := 1/c/aba/bc/a/bcb is tame-irreducible, it admits four wild reducers, 20 PATRICK DEHORNOY namely a and b at level 2, and b and c at level 5, and the associated 2-reducts of a admit a common reduct (a • R2,a ) • R5,c R3,b R1,ac R2,b R3,c = bc/accb/ca/ab/ca/cb = (a • R2,b ) • R5,c R3,cb . However, in this example, there is no confluence for the 5-reducts, and, more generally, we have no example where the highest level wild reducts of a tame-irreducible multifraction admit a common reduct. 4.3. The operator redt and Conjecture B. Our main claim in this section is that, for every multifraction a, there exists a distinguished tame reduct of a, denoted redt (a), that can be computed easily, and that should be 1 whenever a is unital: this is what we call Conjecture B. Just mimicking the approach of Section 4.1 and trying to identify a unique maximal tame reduct on the shape of ∂a cannot work, because the tame reducts of a multifraction need e 2 again, a and b are tame 4-reducers not admit a common reduct: in the context of type A for a := 1/c/1/1/aba, but a • R4,a and a • R4,b admit no common reduct (by the way, in this case, the two irreducible reducts of a can be reached using tame reductions only, respectively R4,a R2,a R4,ba and R4,b R2,b R4,ab . However, it is shown in [13, Section 6] that, if M is a noetherian gcd-monoid satisfying the 3-Ore condition, hence in a case when all reductions are tame, there exists, for each n, a universal sequence of levels U (n) such that, starting with any n-multifraction a and applying the maximal (tame) reduction at the successive levels prescribed by U (n) inevitably leads to the unique R-irreducible reduct red(a) of a. It is then natural to copy the recipe in the general case, and to introduce: Definition 4.24. If M is a noetherian gcd-monoid, then, for every depth n multifraction a max on M , we put redt (a) := a • RU(n) , where U (n) is empty for n = 0, 1 and is (1, 2, ..., n − 1) ···Rimax . followed by U (n − 2) for n > 2, and, for i = (i1 , ..., iℓ ), we write a • Rimax for a • Rimax 1 ℓ Thus, by [13, Proposition 6.7], if M is a noetherian gcd-monoid satisfying the 3-Ore condition, red(a) = redt (a) holds for every a in FM . In this case, b ⇒∗ redt (a) holds for every reduct b of a, and redt (a) is always R-irreducible. It is easy to see that, in the general case, these properties do not extend to arbitrary (namely, not necessarily unital) multifractions. e 2 , let a := 1/c/aba. Then U (3) = (1, 2) Example 4.25. In the Artin-Tits monoid of type A leads to redt (a) = a • R1max R2max = a, since 1 and c have no nontrivial common divisor, and there is no tame 2-reducer for a. On the other hand, both a and b are 2-reducers for a, and neither a • R2,a ⇒∗ redt (a) nor a • R2,b ⇒∗ redt (a) holds. Next, let b := ac/aca/aba. We find redt (b) = b • D1,ac = 1/c/aba, to be compared with ∗ ′ b does not imply b′ ⇒∗ redt (b). ∂b = b • D2,a = ac/ca/ba. Then ∂b ⇒∗ redt (b) fails, so b ⇒div Finally, let c := 1/c/aba/cb. We find redt (c) = c • D3,b = 1/c/ba/c, which is not irreducible, nor even tame-irreducible: we have red2t (c) = redt (c) • R2,b R3,c = bc/cb/a/c. However, these negative facts say nothing about tame reductions starting from a unital multifraction, and, in spite of many tries, no counter-example was ever found so far to: Conjecture B. If M is an Artin-Tits monoid, then redt (a) = 1 holds for every unital multifraction a in FM . By definition, a ⇒∗ redt (a) holds, so redt (a) = 1 is a strengthening of a ⇒∗ 1 in which we assert not only that a reduces to 1 but also that it goes to 1 in some prescribed way. Thus: Fact 4.26. Conjecture B implies Conjecture A. Although Conjecture B is more demanding than Conjecture A, it might be easier to establish (or to contradict), as it predicts a definite equality rather than an existential statement. As recalled above, [13, Proposition 6.7] implies that Conjecture B is true for every Artin-Tits monoid of FC type. On the other hand, an example of a gcd-monoid (but not an Artin–Tits one) for which (the counterpart of) Conjecture A is true but (that of) Conjecture B is false is given in [19]. MULTIFRACTION REDUCTION II 21 5. Cross-confluence Besides tame reductions and Conjecture B of Section 4, we now develop another approach to e of R. The Conjecture A, involving both the reduction system R and a symmetric counterpart R properties of reduction and its counterpart are just symmetric, but interesting features appear when both are used simultaneously, in particular what we call cross-confluence, a completely novel property to the best of our knowledge. We are then led to a new statement, Conjecture C, which would imply Conjecture A and, from there, the decidability of the word problem. The section comprises four subsections. First, right reduction, the symmetric counterpart of (left) reduction, is introduced in Subsection 5.1, and its basic properties are established. Next, cross-conflence, which combines reduction and its counterpart, is introduced in Subsection 5.2, and partial results are established. Then Conjecture C and its uniform version Cunif are stated and discussed in Subsection 5.3. Finally, we briefly study in an Appendix the termination of the joint system obtained by merging left and right reduction, a natural topic with nontrivial results, but not directly connected so far to our main conjectures. 5.1. Right reduction. By definition, the reduction rule Ri,x of Definition 2.15 consists in pushing a factor x to the left (small index entries) in the multifraction it is applied to: for this reason, we shall call it a left reduction. From now on, we shall also consider symmetric counterparts, naturally called right reductions, where elements are pushed to the right. Definition 5.1. If M is a gcd-monoid and a, b lie in FM± , then, for i > 1 and x in M , we declare ei,x holds if we have kbk = kak, bk = ak for k 6= i − 1, i, i + 1, and there exists x′ that b = a • R (necessarily unique) satisfying for for for for i < kak i < kak i = kak i = kak positive in a: negative in a: positive in a: negative in a: xbi−1 = ai−1 , xbi = ai x′ = x ∨ ai , bi+1 = ai+1 x′ , e ai , bi+1 = x′ ai+1 , bi−1 x = ai−1 , bi x = x′ ai = x ∨ xbi−1 = ai−1 , xbi = ai , bi−1 x = ai−1 , b i x = ai . ei,x holds for some i and some x 6= 1, and use ⇒ e b if a • R e ∗ for the reflexive– We write a ⇒ ± ± eM so obtained on FM is called right reduction, transitive closure of ⇒. e The rewrite system R eM . and its restriction to FM (positive multifractions) is denoted by R ei,x is symmetric of that of Ri,x : one extracts x from ai−1 , lets it cross ai The action of R using an lcm, and incorporates the resulting remainder in ai+1 , thus carrying x from level i − 1 en,x for n = kak is adapted to to level i + 1, see Figure 4. As in the case of R1,x , the action of R avoid creating a (n + 1)st entry. Ri,x : ... ei,x : R ai ai−1 x′ ⇐ ... x ai ai−1 ai+1 x′ ⇐ ai+1 ... x bi−1 bi bi+1 bi−1 bi bi+1 ai−1 ai ai+1 ai−1 ai ai+1 ... x bi−1 ⇒ bi ... x′ bi+1 x bi−1 ⇒ bi ... x′ bi+1 ei,x : in the Figure 4. Comparing the left reduction Ri,x and the right reduction R first case (top), one pushes the factor x from ai+1 to ai−1 through ai , in the second case (bottom), one pushes x from ai−1 to ai+1 through ai . 22 PATRICK DEHORNOY Remark 5.2. Right reduction is not an inverse of left reduction: when the reduced factor x crosses (in one direction or the other) the entry ai , using the lcm operation cancels common ei,x amount to dividing by x and, factors. Typically, if x divides ai , then both Ri,x and R therefore, their actions coincide. See Remark 5.26 for more on this. The rest of this subsection is devoted to the basic properties of right reduction and their connection with those of left reduction, in particular with respect to convergence and semiconvergence. As can be expected, the convenient tool is an operation exchanging left and right reduction, in this case the duality map e of Notation 3.7. Lemma 5.3. If M is a gcd-monoid, then, for all a, b in FM± , (5.4) a ⇒ b is equivalent to e a ⇒ e eb. Proof. Comparing the definitions shows that, if a and b have depth n, then b = a • Ri,x is en+1−i,x , whence (5.4). a•R  equivalent to eb = e The following properties of right reduction follow almost directly from their counterpart involving left reduction. The only point requiring some care is the lack of involutivity of e, itself resulting from the lack of surjectivity of the map a 7→ 1 · a. Lemma 5.5. Assume that M is a gcd-monoid. e ∗ b implies a ≃± b. (i) The relation ⇒ e ∗ is included in ≃± , i.e., a ⇒ ∗ (ii) The relation ⇒ e is compatible with the multiplication of FM± . e ∗ b is equivalent to 1p · a · 1q ⇒ e ∗ 1p · b · 1q . (iii) For all a, b and p, q, the relation a ⇒ (iv) If a, b belong to FM , then a ⇒ b is equivalent to 1 · e a ⇒ e 1 · eb, and a ⇒ e b is equivalent e to 1 · e a ⇒ 1 · b. Proof. (i) By (5.4), a ⇒ e ∗ b implies e a ⇒∗ eb, whence ι(e a) = ι(eb) by Lemma 2.17(i), hence ± ι(a) = ι(b) by Lemma 3.9, i.e., a ≃ b. (ii) For all c, d, the relation a ⇒ e ∗ b implies e a ⇒∗ eb, whence e d·e a ·ec ⇒∗ e d·eb·ec by Lemma 2.17(ii), ∗ which is (c · a · d)e ⇒ (c · b · d)e by Lemma 3.9, and finally c · a · d ⇒∗ c · b · d by (5.4) again. (iii) Using duality as above, the result follows now from Lemma 2.17(iii). (iv) By (5.4), a ⇒ b is equivalent to e a ⇒ e eb, hence, by (iii), it is also equivalent to 1 · a ⇒ 1 · b. Similarly, by (5.4) again, a ⇒ e b is equivalent to e a ⇒ eb, hence, by Lemma 2.17, it is also  equivalent to 1 · e a ⇒ 1 · eb. By (5.4), an infinite sequence of right reductions would provide an infinite sequence of left ± ± eM reductions, and vice versa, so R is terminating if and only if RM is. Comparing irreducible elements is straightforward: Lemma 5.6. If M is a gcd-monoid, a multifraction a is R-irreducible if and only if e a is e e R-irreducible. For a positive with kak even, a is R-irreducible if and only if e a is R-irreducible. e e b. By (5.4), we deduce a = e a ⇒ eb, hence a is not R-irreducible. So a Proof. Assume e a ⇒ e being R-irreducible implies that e a is R-irreducible. Conversely, assume e a ⇒ b. By (5.4), we e e e e deduce a = e a ⇒ e b, hence a is not R-irreducible. So a being R-irreducible implies that e a is R-irreducible. For the second equivalence, use the involutivity of e on positive multifractions of even depth (but we claim nothing for positive multifractions of odd length).  Using the above technical results, we can compare convergence and semi-convergence for left and right reduction. Below, observe the difference between (i) and (ii), which involve only one direction but multifractions of both signs, and (iii), which only involves positive multifractions and requires using both left and right reductions. This distinction is one of the reasons for considering both positive and negative multifractions in this paper (contrary to [13]). MULTIFRACTION REDUCTION II 23 Proposition 5.7. For every gcd-monoid M , the following are equivalent: ± (i) The system RM is convergent (resp., semi-convergent); ± eM (ii) The system R is convergent (resp., semi-convergent); eM are convergent (resp., semi-convergent). (iii) The systems RM and R ± Proof. We begin with convergence. Assume that RM is convergent. Let a belong to FM± . Let a). By definition, we have e a ⇒∗ b. Then, by Lemmas 5.5 and 5.6, we have a ⇒ e ∗ eb b = red(e e e and eb is R-irreducible. Assume that c is R-irreducible and a ⇒ e ∗ c holds. By Lemmas 5.5 ± ∗ and 5.6 again, we deduce e a ⇒ ec and ec is R-irreducible. The assumption that RM is convergent ± e e eM implies ec = b, whence c = eb. Hence eb is the only R-irreducible R-reduct of a. Therefore, R is convergent, and (i) implies (ii). The converse implication is proved in the same way, so (i) is equivalent to (ii). e Since all R-reducts and R-reducts of a positive multifraction are positive, it is clear that (i) eM is convergent. Conversely, assume that implies that RM is convergent, and (ii) implies that R e both RM and RM are convergent. Let a be an arbitrary multifraction on M . Assume first that a is positive. Let b be the unique R-irreducible reduct of a. Assume now that a is negative. e e Then e a is positive. Let b be the unique R-irreducible R-reduct of e a. By Lemmas 5.5 and 5.6, eb ∗ is R-irreducible, and a ⇒ b holds. Now assume that c is R-irreducible and a ⇒∗ c holds. Then eM is convergent, we deduce ec = b, ec is R-irreducible and e a ⇒ e ∗ ec holds. As e a is positive and R ± whence c = eb. Hence RM is convergent, and (iii) implies (i). This completes the argument for convergence. ± Assume now that RM is semi-convergent. Let a be a unital multifraction. By Lemma 2.17, e a ± ∗ e ∗ e is unital as well, hence we must have e a ⇒ 1, which, by (5.4), implies a ⇒ e 1 = 1. Hence RM is semi-convergent. The converse implication is similar, so (i) and (ii) are equivalent in this case as eM well. On the other hand, (i) and (ii) clearly imply (iii). Finally, assume that both RM and R are semi-convergent. Let a be a unital multifraction. If a is positive, the assumption that RM is eM semi-convergent implies a ⇒∗ 1. If a is negative, then e a is positive, and the assumption that R ∗ ± ∗ e is semi-convergent implies e a ⇒ e 1, whence a ⇒ 1 = 1 by (5.4). Hence RM is semi-convergent. So (iii) implies (i), which completes the argument for semi-convergence.  f = (red(e a))e. In the convergent case, the above proof implies, with obvious notation, red(a) Remark 5.8. It is shown in [13, Sec. 3] that, when left reduction is considered, trimming final trivial entries essentially does not change reduction. This is not true for right reduction: deleting trivial final entries can change the reducts, as deleting trivial initial entries does in the case of left reduction. 5.2. The cross-confluence property. We now introduce our main new notion, a variant of confluence that combines left and right reduction. Definition 5.9. If M is a gcd-monoid, we say that RM is cross-confluent if, for all a, b, c in FM , (5.10) e ∗ b and a ⇒ e ∗ c, there exists d satisfying b ⇒∗ d and c ⇒∗ d. If we have a ⇒ So cross-confluence for RM means that left reduction provides a solution for the confluence ± pairs of right reduction. We shall naturally say that RM is cross-confluent if (5.10) holds for ± eM is cross-confluent if right reduction provides all a, b, c in FM . On the other hand, we say that R a solution for the confluence pairs of left reduction, that is, if (5.11) e ∗ d and c ⇒ e ∗ d. If we have a ⇒∗ b and a ⇒∗ c, there exists d satisfying b ⇒ ± eM is cross-confluent if (5.11) holds for all a, b, c in FM± . holds for all a, b, c in FM . Finally, R Remark 5.12. The definition of cross-confluence involves both left and right reduction. But, owing to the equivalence (5.4), it can alternatively be stated as a property involving left reduc± tion exclusively. Indeed, in the case of RM , cross-confluence is equivalent to (5.13) a ⇒∗ ec, there exists d satisfying b ⇒∗ d and c ⇒∗ d, If we have e a ⇒∗ eb and e 24 PATRICK DEHORNOY ± eM and similarly for R . In the case of RM , when we restrict to positive multifractions, we also have an alternative statement involving ⇒∗ exclusively, but it takes the less symmetric form (5.14) a ⇒∗ 1 · ec, If we have 1 · e a ⇒∗ 1 · eb and 1 · e there exists d satisfying b ⇒∗ d and c ⇒∗ d, because the e operation is not involutive in this case. e ± and that of their positive Using duality, we obtain for the cross-confluences of R± and R versions the same connection as in the case of convergence and semi-convergence: Proposition 5.15. For every gcd-monoid M , the following are equivalent: ± (i) The system RM is cross-confluent; ± eM (ii) The system R is cross-confluent; eM are cross-confluent. (iii) The systems RM and R ± Proof. Assume that RM is cross-confluent. Applying (5.10) to e a, eb, and ec and using (5.4), we ± e deduce (5.11), so RM is also cross-confluent. Doing the same from (5.11) returns to (5.10). So (i) and (ii) are equivalent. ± e Next, all R- and R-reducts of a positive multifraction are positive, so, if RM is cross± e confluent, its retriction to FM is also cross-confluent. Similarly, if RM is cross-confluent, its eM retriction to FM is cross-confluent. Hence (i) implies (iii). Finally, assume that RM and R ∗ ∗ ± are cross-confluent, and a, b, c belong to FM and satisfy a ⇒ e b and a ⇒ e c. If a, hence b and c as well, are positive, the assumption that RM is cross-confluent implies the existence of d satisfying (5.10). Assume now that a, hence b and c, are negative. Then e a, eb, ec are positive, and ∗ e ∗ eM is cross-confluent implies the existence we have e a ⇒ b and e a ⇒ ec. The assumption that R of d satisfying eb ⇒ e ∗ d and ec ⇒ e ∗ d. By (5.4), we deduce b ⇒∗ e d and c ⇒∗ e d. So (5.10) holds, ± RM is cross-confluent, and (iii) implies (i).  In view of our main purpose, namely establishing the semi-convergence of (left) reduction, the main result is the following connection, which locates cross-confluence as an intermediate between convergence and semi-convergence: Proposition 5.16. Assume that M is a noetherian gcd-monoid. ± ± (i) If RM is convergent, then RM is cross-confluent. ± ± (ii) If RM is cross-confluent, then RM is semi-convergent. (iii) Mutatis mutandis, the same implications hold for RM . We begin with an auxiliary result: Lemma 5.17. Assume that M is a gcd-monoid. ± e ∗ 1 are is cross-confluent, then, for every a in FM± , the relations a ⇒∗ 1 and a ⇒ (i) If RM equivalent. (ii) If RM is cross-confluent, then, for every a in FM , the relation a ⇒ e ∗ 1 implies a ⇒∗ 1. ± implies Proof. (i) Assume a ∈ FM± and a ⇒∗ 1. By Proposition 5.15, the cross-confluence of RM ± ∗ eM . By definition, we also have a ⇒ a. Then (5.11) implies the existence of d satisfying that of R e e ∗ d and a ⇒ e ∗ d. By definition, 1 is R-irreducible, so 1 ⇒ e ∗ d implies d = 1, whence a ⇒ e ∗ 1. 1 ⇒ ∗ ∗ Conversely, assume a ⇒ e 1. We have a ⇒ e a, and (5.10) implies the existence of d satisfying a ⇒∗ d and 1 ⇒∗ d, whence d = 1, and a ⇒∗ 1. (ii) When a lies in FM , the latter argument remains valid, and it shows again that a ⇒ e∗ 1 ∗ implies a ⇒ 1. (By contrast, the former argument need not extend, as there is a priori no eM .) reason why the cross-confluence of RM should imply that of R  Proof of Proposition 5.16. (i) Let a belong to FM± , and assume a ⇒ e ∗ b and a ⇒ e ∗ c. By ± ± ∗ ∗ Lemma 5.5, we have a ≃ b ≃ c, whence b ⇒ d and c ⇒ d, where d is the (unique) R-irreducible reduct of a. Hence (5.10) is satisfied. MULTIFRACTION REDUCTION II 25 ± (ii) Assume that RM is cross-confluent, and we have a ⇒∗ 1 and a ⇒∗ b for some a in FM± . ± By (5.11), which is valid since, by Proposition 5.15, the cross-confluence of RM implies that ± ∗ ∗ eM , there exists d satisfying b ⇒ e of R e d and 1 ⇒ e d. Since 1 is R-irreducible, we must have ± e ∗ 1. By Lemma 5.17, we deduce b ⇒∗ 1. Hence RM is 1-confluent and, d = 1, whence b ⇒ therefore, by Proposition 3.29, it is semi-convergent. (iii) For (i), the argument is the same in the case a ∈ FM . For (ii), assume that RM is cross-confluent, and we have a ⇒∗ 1 and a ⇒∗ b for some a in FM . By Lemma 5.5(iv), we have 1·e a ⇒ e ∗ 1 · 1 = 1 and 1 · a ⇒ e ∗ 1 · b, and 1 · e a is positive. As RM is cross-confluent, we deduce the ∗ e existence of d satisfying 1 ⇒ d and 1 · b ⇒∗ d. As 1 is R-irreducible, we have d = 1, whence 1 · eb ⇒∗ 1, and, by Lemma 5.5(iv) again, b ⇒ e ∗ 1. By Lemma 5.17(ii), we deduce b ⇒∗ 1. Hence RM is 1-confluent and, by Proposition 3.29, it is semi-convergent.  5.3. Conjectures C and Cunif . We thus arrive at what we think is the main conjecture in this paper: Conjecture C. For every Artin-Tits monoid M , the system RM is cross-confluent. By Proposition 5.16, Conjecture C implies Conjecture A, whence the decidability of the word problem of the group, and it is true for every Artin–Tits monoid of type FC. Note that Conjecture C is different from Conjectures A and B in that it predicts something for all multifractions, not only for unital ones. So, in a sense, it is a more structural property, which we think is interesting independently of any application. No proof of Conjecture C is in view so far in the general case, but we now observe that local cross-confluence, namely cross-confluence with single reduction steps on the left, is always true. Proposition 5.18. If M is a gcd-monoid, then, for all a, b, c in FM± , (5.19) (5.20) If we have a ⇒ e b and a ⇒ e c, there exists d satisfying b ⇒∗ d and c ⇒∗ d. If we have a ⇒ b and a ⇒ c, there exists d satisfying b ⇒ e ∗ d and c ⇒ e ∗ d. The proof relies on the following preparatory result: Lemma 5.21. Assume that M is a gcd-monoid and a is a multifraction on M such that a • Ri,x b be defined by ai x′ = ai ∨ x and is defined. If i is negative (resp., positive) in a, let x′ and x ′ e e x b = ai ∧ x (resp., x ai = ai ∨ x and x b = ai ∧ x). Then, we have ei,x′ = a • Di,bx . (5.22) a • Ri,x R Proof. (Figure 5) Let a′ = a • Ri,x . Assuming i negative in a, we have (5.23) a′i−1 = ai−1 x′ , xa′i = ai x′ = ai ∨ x, xa′i+1 = ai+1 . By construction, x′ right divides a′i−1 , and x′ and a′i admit a common left multiple, namely ai x′ . ei,x′ is defined, and it is determined by Hence a′′ = a′ • R (5.24) a′′i−1 x′ = a′i−1 , e x′ , a′′i x′ = x′′ a′i = a′i ∨ a′′i+1 = x′′ a′i+1 . By definition, the left lcm x′′ a′i of x′ and a′i left divides their common left multiple xa′i , which implies the existence of x b satisfying x = x bx′′ , and, from there, ai x′ = xa′i = x bx′′ a′i = x ba′′i x′ , ′′ ′′ ′′ ba′′i+1 = bai = ai , and x whence ai = x bai . Merging (5.23) and (5.24), we deduce ai−1 = ai−1 , x ′′ ai+1 , which shows that a is obtained from a by left dividing the ith and (i + 1)st entries by x b, i.e., by applying the division Di,bx .  The argument is symmetric when i is positive in a. ei,x is defined, a symmetric argument gives When a • R (5.25) ei,x Ri,x′ = a • Di−1,bx , a•R e x and x e x (resp., ai x′ = ai ∨ x and where x′ and x b are now defined by x′ ai = ai ∨ b = ai ∧ x b = ai ∧ x) if i is negative (resp., positive) in a. The index of the division is shifted (i − 1 ei+1,x . instead of i) relatively to (5.22), because, as a set of pairs, Di,x is included in R We can now complete the argument for Proposition 5.18. 26 PATRICK DEHORNOY ai ai−1 x′ a′i−1 a′′i x b x′′ a′i ai+1 x a′i+1 ei,x′ Figure 5. Composing the left reduction Ri,x and the inverse right reduction R amounts to performing the division Di,bx where x b is the gcd of ai and x. ei,x and c = a • R ej,y . By Lemma 5.21, we have Proof of Proposition 5.18. Assume b = a • R b • Ri,x′ = a • Di,bx and c′ • Rj,y′ = a • Dj,by for some x′ , x b and y ′ , yb. By Proposition 4.4, ∂a is a common reduct of all multifractions obtained from a by a division, hence in particular of a • Di,x′′ and a • Dj,y′′ . Thus b ⇒∗ ∂a and c ⇒∗ ∂b hold, hence (5.19) is satisfied with d = ∂a.  The proof of (5.20) is symmetric, using (5.25) instead of (5.22), and d = ∂a again. In the case of a single rewrite system, local confluence implies confluence whenever the system is terminating (by Berman’s well known diamond lemma). There is no hope of a similar result e is not terminating in general—see (5.30) below—and here, both because the union of R and R because, in the definition of cross-confluence, the arrows ⇒ and ⇒ e are not in a position for a natural induction. Remark 5.26. Right reduction is close to being an inverse of left reduction. Indeed, provided the ground monoid is noetherian, every reduction is a product of atomic reductions, namely ei,x with x an atom. Now, if x is an atom, the gcd of x and ai reductions of the form Ri,x or R is either ai , meaning that x divides ai , or 1. In the former case, a • Ri,x is a • Di,x , whereas, ei,x′ , i.e., left reducing x in a is the inverse in the latter, Lemma 5.21 implies a = (a • Ri,x ) • R ′ of right reducing x . Thus, writing D for the family of divisions and Rat for that of atomic left −1 e is generated by D ∪ Rat reductions, R is generated by D ∪ Rat , whereas R . By Lemma 4.7 and the results of [13], confluence between D and Rat is always true, whereas confluence between Rat −1 and Rat is trivial. Therefore, one might hope that cross-confluence diagrams can always be constructed by assembling the various types of elementary confluence diamonds. This is not true: using a tedious case-by-case argument, one can indeed establish cross-confluence in the case when, in (5.10), b and c are obtained from a by two atomic reduction steps, but there is no hope to go very far in this direction, both because of the counter-examples of Example 5.27, and because, in any case, cross-confluence cannot be true for an arbitrary noetherian gcd-monoid, since there exist such monoids for which the counterparts of Conjectures A and C fail [19]: if true, cross-confluence has to be a specific property of Artin–Tits monoids, or at least of a restricted family of gcd-monoids. The following examples are given to show that naive attempts to extend the local crossconfluence result of Proposition 5.18 are due to fail. Example 5.27. Proposition 5.18 shows that, if b is obtained by applying one right reductions to a, then applying one well chosen left reduction to b provides a multifraction c obtained by one division from a. The result fails when 1 is replaced by k > 2. Indeed, in the Artin-Tits e5,b = 1/1/ca/cb/1, (which is e3,a R e 2 , consider a = 1/a/ca/cb/b and b = a • R monoid of type A e R-irreducible). The only way to left reduce b is to start with R1,ca , leading to c = ca/1/cb/1, not reachable from a by two, or any number, of divisions. In the above case, we have c = a • R4,b R2,cac , and therefore there is no contradiction with the weaker conclusion that c is obtained both from a by applying k left reductions. The following example (with k = 3) shows that this is not true either. Indeed, consider a = ca/cb/bc/ba and e4,a = 1/1/ac/ab. As predicted by Conjecture C, a and b admit common left e2,ca R e3,bc R b = a•R reducts, but the latter are c and c • D2,c , with c = ac/cab/c/1 = a • R2,b R3,a D2,a R3,b D1,aa D2,b , not reachable from a using less than six left reductions. What is surprising here is that, if we MULTIFRACTION REDUCTION II 27 e2,ca = 1/1/aca/aba, then b′ left reduces to a, whereas b = b′ • D3,a only left e3,bc R put b′ := a • R reduces to c, very far from a: one single division may change left reducts completely. We conclude with one more conjecture. The conjunction of Propositions 4.4 and 5.18 shows not only that any two right reducts b, c of a multifraction a admit a common left reduct d, but even that there exists d only depending on a, namely ∂a, that witnesses for all elementary right reducts of a simultaneously. This suggests to consider a strong version of cross-confluence: Definition 5.28. If M is a gcd-monoid, we say that RM is uniformly cross-confluent if there exists a map ∇ from FM to itself such that, for every a in FM , the relation b ⇒∗ ∇a holds for every right reduct b of a. In the case when reduction is convergent, defining ∇a = red(a) provides a convenient witness, and therefore the conclusion of Proposition 5.16 can be strengthened to uniform crossconfluence. We propose: Conjecture Cunif . For every Artin-Tits monoid M , the system RM is uniformly cross-confluent. By the above observation, Conjecture Cunif is true for every Artin–Tits monoid of type FC, and no counter-example could be found so far in any other type. It implies Conjecture C and, therefore, Conjecture A, but it is more demanding. However, if an explicit definition of ∇a could be found, one can reasonably hope that the proof of Conjecture Cunif would then reduce to a series of verifications. But, here again, naive attempts fail: two natural candidates for ∇a could be either redt (a) (which works in the convergent case), or (if it always exists) a maximal common ancestor of all irreducible reducts in the tree of all left reducts of a, but the example of Figure 6 shows that neither of these choices works in every case. Appendix: Mixed termination. Although it is not directly connected with cross-confluence, we mention here one further result involving both left and right reduction. First, we know that, in a noetherian context, (left) reduction is terminating, meaning that there is no infinite sequence of reductions. It turns out that a stronger finiteness result holds: Proposition 5.29. If M is a finitely generated noetherian gcd-monoid, then every multifraction a on M admits only finitely many left reducts, and finitely many right reducts. Proof. As M is noetherian and contains no nontrivial invertible element, a subfamily of M is generating if and only if it contains all atoms. Hence, the assumption that M is finitely generated implies that the atom set A of M is finite. Let a belong to FM± . We construct a tree Ta , whose nodes are pairs (b, s), where b is a left reduct of a and s is a finite sequence in A × N: the root of Ta is (a, ε), and, using ⌢ for concatenation, the sons of (b, s) are all pairs (b • Ri,x , s⌢ (i, x)) such that b • Ri,x is defined. As A is finite, for every multifraction b, the number of pairs (i, x) with x in A and b • Ri,x defined is finite. Hence each node in Ta has finitely many immediate successors. On the other hand, the assumption that M is noetherian ± implies that RM is terminating and, therefore, the tree Ta has no infinite branch. Hence, by König’s lemma, Ta is finite. As every left reduct of a appears (maybe more than once) in Ta , the number of such reducts is finite. The argument for right reducts is symmetric.  Thus, it makes sense to wonder whether, starting from a multifraction a, the family of all multifractions that can be obtained from a using left and right reduction is finite. The argument for Proposition 5.29 does not extend, because the well-orders witnessing for the termination of left and right reductions are not the same, and it is easy to see that the result e 2 , we find itself fails in general: starting from a := 1/a/bc/1 in the Artin-Tits of type A e a • R2,b R3,a = ba/b/ca/ac, whence, repeating three times, (5.30) e3,c = bacbac/a/bc/acbacb = bacbac · a · acbacb. e3,b R2,a R e3,a R2,c R a • R2,b R e3,c )p make for p > 0 an infinite none3,b R2,a R e3,a R2,c R Hence the multifractions a • (R2,b R e terminating (and non-periodic) sequence with respect to R ∪ R. 28 PATRICK DEHORNOY a9 : /cbac/bcbb/aca R2,bc a12 : /ac/caba/acaab D3,b D3,c e2,a R R2,ca e2,a R D2,c a13 : /ac/cba/acaa a11 : a/c/ba/acaab a1 : a/bac/bb/aca D3,a a10 : /bac/bcb/aca D 2,b e3,a R a14 : /ac/cb/aca R3,ab D2,b R3,c e2,a R R2,c R3,a a2 : a/ac/b/aca D3,c e3,b R R3,c R3,c a3 : a/bcbac/ccb/ca D1,a a4 : a/babac/aab/ac D2,c a5 : /cbac/ccb/ca a6 : a/bcac/cb/ca D2,c a7 : /bac/cb/ca D1,a R3,a D2,a a8 : a/baac/ab/ac Figure 6. Left and right reducts of a1 := a/bac/bb/aca in the Artin-Tits monoid of e 2 : there are 8 left reducts (in grey), among which a7 and a8 are R-irreducible, type A e and 10 right reducts (dashed lines), among which a14 is R-irreducible. Plain (resp., dashed) arrows correspond to left (resp., right) reductions that are not divisions, double arrows correspond to divisions (which are both left and right reductions); all left reductions decrease the distance to the bottom. As Conjecture Cunif predicts, there exists a common left reduct for all right reducts: in this case, there is only one, namely a7 , and it is neither redt (a1 ) nor the maximal common ancestor of a7 and a8 , both equal to a2 . By contrast, let us mention without detailed proof a finiteness result valid whenever the ground monoid M is a Garside monoid [11, 16], i.e., a strongly noetherian gcd-monoid possessing in addition an element ∆ (“Garside element”) whose left and right divisors coincide, generate M , and are finite in number. Proposition 5.31. If M is a Garside monoid, then, for every multifraction a on M , the family e of all (R ∪ R)-reducts of a is finite. Proof (sketch). Let ∆ be a Garside element in M and let a be a multifraction on M . Then there exists a positive integer d such that the path associated with a can be drawn in the finite fragment of the Cayley graph of M made of the divisors of ∆d : this is the notion of a path “drawn in Div(∆d )” as considered in [10]. Then the family of all paths drawn in Div(∆d ) is closed under the special transformations alluded to in Subsection 3.3, and, therefore, all multifractions that e are drawn in the same finite fragment Div(∆d ) of the can be derived from a using ⇒ and ⇒ Cayley graph. As we consider multifractions with a fixed depth, only finitely many of them can be drawn in a finite fragment of a Cayley graph.  The argument extends to every Artin-Tits monoid M of type FC, replacing the finite family of divisors of the Garside element ∆ with the union of the finitely many finite families of divisors of the Garside elements ∆I , where I is a family of atoms of M that generates a spherical type submonoid of M . MULTIFRACTION REDUCTION II 29 6. Finite approximations ± The semi-convergence of RM and Conjectures A, B, and C, involve multifractions of arbitrary depth. Further results appear in the particular case of small depth multifractions. The cases of depth 2 and, more interestingly, of depth 4 are addressed in Subsections 6.1 and 6.2, where connections with the embeddability in the group and the uniqueness of fractional decompositions, respectively, are established. An application of the latter to partial orderings of the group is established in Subsection 6.3. Finally, we describe in Subsection 6.4 a connection between Conjecture B and van Kampen diagrams for unital n-multifractions. ± 6.1. The n-semi-convergence property. The rewrite system RM has been called semiconvergent if (3.4) holds for every multifraction on M , i.e., if a being unital implies a ⇒∗ 1. ± Definition 6.1. If M is a gcd-monoid, we say that RM (resp., RM ) is n-semi-convergent if (3.4) ± holds for every n-multifraction a in FM (resp., FM ). Accordingly, we shall use Conjecture An for the restriction of Conjecture A to depth n ± multifractions, and similarly for B and C. Some easy connections exist. Of course, if RM is n-semi-convergent, then so is its subsystem RM . ± Lemma 6.2. If M is a gcd-monoid and RM (resp., RM ) is n-semi-convergent, it is p-semiconvergent for p < n. Proof. Let a be a nontrivial unital p-multifraction, with p < n. There exists r (equal to n − p ± or n − p + 1) such that a · 1r has width n, and it is also nontrivial and unital. As RM is ± ∗ ∗ is n-semi-convergent, we have a · 1r ⇒ 1, which implies a ⇒ 1 by Lemma 2.17(iii). So RM p-semi-convergent.  On the other hand, by repeating the proof of Proposition 3.22, we obtain ± Lemma 6.3. If M is a noetherian gcd-monoid, then RM (resp., RM ) is n-semi-convergent if and only if (3.23) holds for every n-multifraction a in FM± (resp., FM ), i.e., if a is unital, then it is either trivial or reducible. We now address the cases of small depth. The case of depth one is essentially trivial, in that it follows from a sufficiently strong form of noetherinity and does not really involve the algebraic properties of the monoid: Proposition 6.4. Assume that M is a gcd-monoid that admits a length function, namely a map λ : M → N satisfying, for all a, b in M , (6.5) λ(ab) = λ(a) + λ(b), and λ(a) > 0 for a 6= 1. ± Then the system RM is 1-semi-convergent. Condition (6.5) is strong noetherianity (3.13) with > replaced by =. It holds in every ArtinTits monoid and, more generally, in every monoid with a homogeneous presentation. P P Proof. Extend the map λ to FM± by λ(a) := i positive in a λ(ai ) − i negative in a λ(ai ). Then λ is a homomorphism from the monoid FM± to (N, +), and, for every a in M , we have λ(a/a) = λ(/a/a) = λ(1) = λ(∅) = 0. By Proposition 2.5, the latter pairs generate ≃± as a congruence, hence λ is invariant under ≃± . Then a 6= 1 implies λ(a) 6= λ(1), whence a 6≃± 1. Hence the only ± unital 1-multifraction is 1, and RM is 1-semi-convergent.  The cases of depths 2 and 3 turn out to be directly connected with the embeddability of the considered monoid in its enveloping group. Proposition 6.6. If M is a gcd-monoid, the following are equivalent: (i) The system RM is 2-semi-convergent. ± (ii) The system RM is 2-semi-convergent. ± is 3-semi-convergent. (iii) The system RM (iv) The monoid M embeds in U(M ). 30 PATRICK DEHORNOY Proof. Assume that RM is 2-semi-convergent. Let a, b two elements of M satisfying ι(a) = ι(b). By (2.6), we have a/b ≃± 1. The assumption that RM is 2-semi-convergent implies a/b ⇒∗ 1. By definition, this means that there exists x in M satisfying a = x = b, whence a = b. So M embeds in U(M ). Hence (i) implies (iv). Clearly (ii) implies (i), and (iii) implies (ii) by Lemma 6.2. Finally, assume that M embeds in U(M ), and let a be a positive nontrivial unital 3multifraction. By assumption, we have a ≃± 1, whence ι(a1 )ι(a2 )−1 ι(a3 ) = 1 in U(M ) by (2.6), and, therefore, ι(a2 ) = ι(a3 )ι(a1 ) = ι(a3 a1 ) in U(M ). As M embeds in U(M ), this implies a2 = a3 a1 in M . Then a has the form a1 /a3 a1 /a3 , implying a • D1,a1 D2,a3 = 1/1/1. Thus RM is 3-semi-convergent. The argument is the same for a negative 3-multifraction a, finding ± is now ι(a1 )−1 ι(a2 )ι(a3 )−1 = 1, whence a2 = a1 a3 , and a • D1,a1 D2,a3 = /1/1/1. Hence RM 3-semi-convergent. So (iv) implies (iii).  ± Corollary 6.7. For every Artin-Tits monoid M , the system RM is n-semi-convergent for n 6 3. ± Proof. By Lemma 6.2, RM is 1-semi-convergent. Next, it is known [28] that M embeds ± into U(M ). Hence, by Proposition 6.6, RM is 2- and 3-semi-convergent.  In other words, Conjecture An is true for n 6 3. 6.2. Multifractions of depth 4. We now address 4-semi-convergence, which turns out to give rise to interesting phenomena. We begin with preliminary results about unital multifractions that are in some sense the simplest ones. Definition 6.8. If M is a monoid and a is an n-multifraction on M , with n even, we say that (x1 , ..., xn ) is a central cross for a if we have ( xi xi+1 for i positive in a, ai = xi+1 xi for i negative in a, a2 a3 x2 x1 x3 x4 a1 a4 with the convention xn+1 = x1 . The diagram of Definition 6.8 shows that a multifraction that admits a central cross is unital: if (x1 , ..., xn ) is a central cross for a positive multifraction a, we find ι(a) = ι(x1 x2 ) ι(x3 x2 )−1 ι(x3 x4 ) ··· (x1 xn )−1 = 1, and similarly when a is negative. It follows from the definition that a sequence (x1 , ..., xn ) is a central cross for a positive multifraction a if and only if (x2 , ..., xn , x1 ) is a central cross for /a2 /···/an /a1 . So, we immediately obtain Lemma 6.9. For every monoid M and every even n, a positive n-multifraction a admits a central cross if and only if the negative multifraction /a2 /···/an /a1 does. Multifractions with a central cross always behave nicely in terms of reduction: Lemma 6.10. If M is a gcd-monoid and a is a multifraction on M that admits a central cross, then redt (a) = 1 holds. Proof. We prove the result using induction on n > 2 even, and assuming a positive. Assume that (x1 , ..., xn ) is a central cross for a. For n = 2, the assumption boils down to a1 = a2 = x1 x2 , e x3 , with directly implying a • R1max = 1/1. Assume n > 4 and, say, a positive. Let x := x1 ∧ e a2 = xx2 , whence a • R1max = x′1 /x′3 /a3 /···/an . As x1 = x′1 x and x3 = x′3 x. Then we have a1 ∧ a3 = x3 x4 expands into a3 = x′3 xx4 , this can be rewritten as a • R1max = x′1 /x′3 /x′3 xx4 /···/an . We deduce (6.11) a • R1max R2max = x′1 xx4 /1/1/a4/···/an = x1 x4 /1/1/a4/···/an with a4 = x1 x4 for n = 4, and a4 = x5 x4 for n > 6. In every case, the subsequent action max of R3max ···Rn−1 is to push a4 , then a5 , etc. until an , through 1/1, leading to (6.12) max a • R1max ···Rn−1 = x1 x4 /a4 /···/an /1/1. MULTIFRACTION REDUCTION II 31 For n = 4, (6.12) reads a • R1max R2max R3max = x1 x4 /x1 x4 /1/1, and a further application of R1max yields 1. For n > 6, the assumption that (x1 , ..., xn ) is a central cross for a implies that (x1 , x4 , ..., xn ) is a central cross for the (n − 2)-multifraction x1 x4 /a4 /···/an . The induction hypothesis for the latter gives redt (x1 x4 /a4 /···/an ) = 1, which expands into max = 1n−2 . x1 x4 /a4 /···/an • RU(n−2) (6.13) max By Lemma 2.17(iii), (6.13) implies x1 x4 /a4 /···/an /1/1 • RU(n−2) = 1n . Merging with (6.12), max max max we deduce a • R1 ··· n−1 RU(n−2) = 1n , which is a • RU(n) = 1n , i.e., redt (a) = 1. The argument is similar when a is negative.  We now concentrate on 4-multifractions. A sort of transitivity of central crosses holds. Lemma 6.14. Assume that M is a gcd-monoid, a, b are 4-multifractions admitting a central cross, and c1 a4 = c4 b1 and c2 a3 = c3 b2 holds. Then c1 a1 /c2 a2 /c3 b3 /c4 b4 admits a central cross. In particular, a1 /a2 /b3 /b4 admits a central cross for a4 = b1 and a3 = b2 . Proof. (Figure 7) Let (x1 , ..., x4 ) and (y1 , ..., y4 ) be central crosses for a and b, respectively. By assumption, we have c2 x3 x4 = c2 a3 = c3 b2 = c3 y3 y2 , so x4 and y2 admit a common left e y2 = xx4 = yy2 , and there exists z3 satisfying c2 a3 = z3 xx4 = z3 yy2 = c3 b2 . multiple, say x4 ∨ Then a3 = x3 x4 and b2 = y3 y2 respectively imply (6.15) c2 x3 = z3 x and c3 y3 = z3 y. Arguing similarly from c1 x1 x4 = c1 a4 = c4 b1 = c4 y1 y2 , we deduce the existence of z1 satisfying c1 a4 = z1 xx4 = z1 yy2 = c4 b1 , leading to (6.16) c1 x1 = z1 x and c4 y1 = z1 y. Then (z1 , xx2 , z3 , yy4 ) is a central cross for c1 a1 /c2 a2 /c3 b3 /c4 b4 . c2 a2 a3 x3 x x2 x4 c3 z3 b2 y2 x a1 x1  y y3 b3 y4 y a4 z1 b1 y1 b4 c1 c4 Figure 7. Transitivity of the existence of a central cross. We deduce that reduction preserves the existence of a central cross in both directions. Lemma 6.17. Assume that M is a gcd-monoid and a, b are 4-multifractions on M satisfying a ⇒∗ b. Then a admits a central cross if and only if b does. Proof. It is enough to prove the result for a ⇒ b, say b = a • Ri,x . Assume that a is positive and (x1 , ..., x4 ) is a central cross for a. Our aim is to construct a central cross for b from that for a. Consider the case i = 2, see Figure 8. Let a2 x′ = x ∨ a2 . By definition, we have (6.18) b1 = a1 x′ , xb2 = a2 x′ , xb3 = a3 , b 4 = a4 . By assumption, x and x3 admit a common right multiple, namely a3 , hence they admit a right lcm, say x ∨ x3 = xy3 = x3 y. We have xb2 = a2 x′ = x3 (x2 x′ ), hence the right lcm of x and x3 left divides xb2 , i.e., we have xy3 6 xb2 , whence y3 6 b2 , say b2 = y3 y2 . Next, we have x3 x2 x′ = a2 x′ = xb2 = xy3 y2 = x3 yy2 , whence x2 x′ = yy2 by left cancelling x3 . Put y1 = x1 y. We find b1 = a1 x′ = x1 x2 x′ = x1 yy2 = y1 y2 . 32 PATRICK DEHORNOY On the other hand, by assumption, as both x and x3 left divide a3 , their right lcm x3 y left divide a3 , which is x3 x4 . So we have x3 y 6 x3 x4 , whence y 6 y4 , say x4 = yy4 . Then we find xb3 = a3 = x3 x4 = x3 yy4 = xy3 y4 , whence b3 = y3 y4 . Finally, we have b4 = a4 = x1 x4 = x1 yy4 = y1 y4 . So (y1 , ..., y4 ) is a central cross for b. The argument for i = 3 is similar, mutatis mutandis, and so is the one for i = 1: in this case, the counterpart of x′ is trivial, which changes nothing. Finally, the case when a is negative is treated symmetrically. So b admits a central cross whenever a does. For the other direction, assume again that a and b are positive, and that (y1 , ..., y4 ) is a central cross for b. Assume again i = 2, and (6.18). The equality xb2 = a2 x implies that (a1 , 1, a2 , x′ ) is a central cross for a1 /a2 /xb2 /b1 . On the other hand, (y1 , y2 , xy3 , y4 ) is a central cross for b1 /xb2 /a3 /a4 . So both a1 /a2 /xb2 /b1 and b1 /xb2 /a3 /a4 admit a central cross. By Lemma 6.14, this implies that a1 /a2 /a3 /a4 admits a central cross. So a admits a central cross whenever b does.  The above proof does not use the assumption that xb2 is the lcm of x and a2 , but only the fact that the equalities of (6.18) hold for some x, x′ , which is the case, in particular, for ei,x′ . So it also shows that every right reduct of a 4-multifraction with a central cross b = a•R admits a central cross, and conversely. a2 a3 x x3 b2 b3 y3 x4 x2 x′ y a1 y2 b1 x 1 y4 y1 a4 = b 4 Figure 8. Construction of a central cross for a • Ri,x starting from one for a. We deduce a complete description of the 4-multifractions that reduce to 1: Proposition 6.19. If M is a gcd-monoid, then, for every 4-multifraction a on M , the following are equivalent: (i) The relation a ⇒∗ 1 holds. (ii) The relation redt (a) = 1 holds. (iii) The multifraction a admits a central cross. Proof. The 4-multifractions 1/1/1/1 and /1/1/1/1 both admit the central cross (1, 1, 1, 1). Hence, by Lemma 6.17, every 4-multifraction satisfying a ⇒∗ 1/1/1/1 or a ⇒∗ /1/1/1/1 admits a central cross as well. Hence (i) implies (iii). Next, Lemma 6.10 says that redt (a) = 1 holds for every multifraction a that admits a central cross, so (iii) implies (ii). Finally, (ii) implies (i) by definition.  ± We return to the study of n-semi-convergence for RM , here for n = 4, 5. Proposition 6.20. If M is a gcd-monoid, the following are equivalent: (i) The system RM is 4-semi-convergent. ± (ii) The system RM is 4-semi-convergent. ± (iii) The system RM is 5-semi-convergent. (iv) Every unital 4-multifraction in FM admits a central cross. MULTIFRACTION REDUCTION II 33 Proof. Assume that RM is 4-semi-convergent. Let a be a unital positive 4-multifraction. As RM is 4-semi-convergent, we have a ⇒∗ 1. By Proposition 6.19, we deduce that a admits a central cross. Hence (i) implies (iv). By definition, (ii) implies (i), and, by Lemma 6.2, (iii) implies (ii). Finally, assume (iv), and let a be a unital 5-multifraction on M . Assume first that a is positive. Then the positive 4-multifraction a5 a1 /a2 /a3 /a4 is unital as well, hence, by assumption, it admits a central cross (x1 , ..., x4 ), which expands into a = a1 /x3 x2 /x3 x4 /x1 x4 /a5 with a5 a1 = x1 x2 . Then we obtain a ⇒∗ a1 /x2 /1/x1 /a5 via D2,x3 D3,x4 ∗ via R3,x1 R4,a5 ∗ via D1,a1 D2,a5 . ⇒ a1 /x1 x2 /a5 /1/1 = a1 /a5 a1 /a5 /1/1 ⇒ 1/1/1/1/1 If a is negative, then a2 /a3 /a4 /a1 a5 is unital and positive, hence admits a central cross by assumption, leading to a = /a1 /x1 x2 /x3 x2 /x3 x4 /a5 with a1 a5 = x1 x4 , and to a ⇒∗ 1, this time via D2,x2 D3,x3 R3,x4 R4,a5 D1,a1 D2,a5 . Thus, every unital 5-multifraction on M reduces ± is 5-semi-convergent. So (iv) implies (iii).  to 1, and RM We now establish alternative forms for the point (iv) in Proposition 6.20, connected with the uniqueness of the expression by irreducible fractions. Proposition 6.21. For every gcd-monoid M , the following are equivalent: (i) Every unital 4-multifraction in FM admits a central cross. (ii) For all a, b, c, d in M satisfying ι(a/b) = ι(c/d), there exist x, y in M satisfying (6.22) e b), a = x(a ∧ e b), b = y(a ∧ e d), c = x(c ∧ e d). d = y(c ∧ e b = 1 satisfy a 6 c and b 6 d. (iii) All a, b, c, d in M satisfying ι(a/b) = ι(c/d) and a ∧ e b = c∧ e d = 1 satisfy a = c and b = d. (iv) All a, b, c, d in M satisfying ι(a/b) = ι(c/d) and a ∧ e b = b ∧ c = 1 and ι(a/b/c) ∈ ι(M ) satisfy b = 1. (v) All a, b, c in M satisfying a ∧ Before establishing Proposition 6.21, we begin with two characterizations of 4-multifractions with a central cross: Lemma 6.23. If M is a gcd-monoid, a positive 4-multifraction a on M admits a central cross if and only if there exist x, y in M satisfying (6.24) e a2 ), a1 = x(a1 ∧ ′ ′ e a2 ), a2 = y(a1 ∧ if and only if there exist x , y in M satisfying (6.25) e a4 )x′ , a1 = (a1 ∧ e a3 )x′ , a2 = (a2 ∧ e a4 ), a3 = y(a3 ∧ e a3 )y ′ , a3 = (a2 ∧ e a4 ), a4 = x(a3 ∧ e a4 )y ′ . a4 = (a1 ∧ e x3 ) Proof. Assume that a is positive and (x1 , ..., x4 ) is a central cross for a. Write x1 = x(x1 ∧ e x3 ). Then we have x ∧ e y = 1, and a1 = x(x1 ∧ e x3 )x2 , a2 = y(x1 ∧ e x3 )x2 , and x3 = y(x1 ∧ e a2 = (x1 ∧ e x3 )x2 , and a1 = x(a1 ∧ e a2 ), a2 = y(a1 ∧ e a2 ). On the other hand, we whence a1 ∧ e x3 )x4 , a4 = x1 x4 = x(x1 ∧ e x3 )x4 , whence a3 ∧ e a4 = (x1 ∧ e x3 )x4 , also find a3 = x3 x4 = y(x1 ∧ e a4 ), d = x(a3 ∧ e a4 ). So we found x, y satisfying (6.24). and a3 = y(a3 ∧ The proof for (6.25) is similar, writing x2 = (x2 ∧ x4 )x′ and x4 = (x2 ∧ x4 )y ′ and deducing a1 ∧ a4 = x1 (x2 ∧ x4 ) and a2 ∧ a3 = x3 (x2 ∧ x4 ). e a2 , y, a3 ∧ e a4 ) is a central cross for a, In the other direction, if (6.24) is satisfied, (x, a1 ∧ whereas, if (6.25) is satisfied, so is (a1 ∧ a4 , x′ , a2 ∧ a3 , y).  Proof of Proposition 6.21. If ι(a/b) = ι(c/d) holds, the 4-multifraction a/b/d/c is unital, hence it admits a central cross if (i) is true. In this case, Lemma 6.23 gives (6.22). So (i) implies (ii). e b = 1 gives a = x and b = y, whence a 6 c and b 6 d. If, Next, applying (ii) in the case a ∧ e d = 1, we similarly obtain c 6 a and d 6 b, whence a = c and b = d. So in addition, we have c ∧ (ii) implies (iii) and (iv). On the other hand, (iv) implies (iii). Indeed, assume ι(a/b) = ι(c/d) e b = 1. Let e = c ∧ e d, with c = c′ e and c = d′ e. Then we have c′ ∧ e d′ = 1 and with a ∧ ′ ′ ′ ′ ι(a/b) = ι(c /d ). Then (iv) implies a = c 6 c and b = d 6 d. 34 PATRICK DEHORNOY e b = b ∧ c = 1 and ι(a/b/c) = ι(d) for some d in M . Then Now, let a, b, c in M satisfy a ∧ ι(a/b) = ι(d/c) holds so, if (ii) holds, we have a 6 d and b 6 c. Then the assumption b ∧ c = 1 implies b = 1. So (iii) implies (v). Finally, assume that a is a unital 4-multifraction in FM . Write a2 = xa′2 and a3 = xa′3 with e a′2 , x = a2 ∧ a3 , so that a′2 ∧ a′3 = 1 holds. Next, write a1 = a′1 y and a′2 = a′′2 with y = a1 ∧ ′ e ′′ ′ ′′ ′ ′ ′ so that a1 ∧ a2 = 1 holds. Then we have ι(a1 /a2 /a3 ) = ι(a1 /a2 /a3 ) = ι(a1 /a2 /a3 ), and the assumption ι(a) = 1 implies ι(a1 /a2 /a3 ) = ι(a4 ) ∈ ι(M ). Hence ι(a′1 /a′′2 /a′3 ) lies in ι(M ) with e a′′2 = 1 and a′2 ∧ a′3 = 1, whence a fortiori a′′2 ∧ a′3 = 1. If (v) is true, we deduce a′′2 = 1. a′1 ∧ This means that (a′1 , y, x, a′3 ) is a central cross for a. So (v) implies (i).  Putting things together, we obtain: Corollary 6.26. Conjectures A4 and B4 are equivalent, and they are equivalent to the property that, for every Artin-Tits monoid M , every element of U(M ) of the form ab−1 with a, b in M e b = 1. admits only one such expression with a ∧ Proof. Let M be an Artin-Tits monoid and a be a unital 4-multifraction on M . By Proposition 6.19, a ⇒∗ 1 implies redt (a) = 1, so Conjecture A4 implies Conjecture B4 . On the other hand, by Proposition 6.19 again, the property “a unital implies a ⇒∗ 1” is equivalent to “ a unital implies a admits a central cross” and, by Proposition 6.21, the latter is equivalent to the uniqueness of fractional decompositions.  6.3. An application to partial orderings on U(M ). If M is a Garside monoid, it is known [16, Sec. II.3.2] that the left and right divisibility relations of M can be extended into e h) for well-defined partial orders on the enveloping group U(M ) by declaring g 6 h (resp., g 6 g −1 h ∈ M (resp., gh−1 ∈ M ). The construction extends to every gcd-monoid, and we show ± that lattice properties are preserved whenever RM is 4-semi-convergent. Proposition 6.27. (i) If M is a gcd-monoid that embeds into U(M ), then declaring g 6 h for g −1 h ∈ ι(M ) provides a partial order on U(M ) that extends left divisibility on M . ± (ii) If RM is 4-semi-convergent, any two elements of U(M ) that admit a common 6-lower bound (resp., a common 6-upper bound) admit a greatest one (resp., a lowest one). Proof. (i) We identify M with its image under ι. As M is a semigroup in U(M ), the relation 6 is transitive on U(M ), and it is antisymmetric, as 1 is the only invertible element of M . Hence 6 is a partial order on U(M ). By definition, it extends left divisibility on M . (ii) Assume that g and h admit a common 6-lower bound f (see Figure 9 left). This means that we have g = f x and h = f y for some x, y in M . Let f0 := f (x ∧ y). Write x = (x ∧ y)x0 , y = (x ∧ y)y0 . Then we have g = f0 x0 and h = f0 y0 , whence f0 6 g and f0 6 h. Now assume that f1 is any common 6-lower bound of g and h, say g = f1 x1 and h = f1 y1 . In the −1 group U(M ), we have x0 x−1 1 = y0 y1 . Hence, the 4-multifraction x0 /x1 /y1 /y0 is unital, so, by assumption, it admits a central cross. Then Lemma 6.23 provides x′ , y ′ satisfying x0 = (x0 ∧ y0 )x′ , x1 = (x1 ∧ y1 )x′ , y1 = (x1 ∧ y1 )y ′ , y0 = (x0 ∧ y0 )y ′ . By definition of f0 , we have x0 ∧ y0 = 1, whence x′ = x0 and y ′ = y0 , and, from there, f1 (x1 ∧ y1 ) = f0 , hence f1 6 f0 , in U(M ). So f0 is a greatest 6-lower bound for g and h. The argument for lowest 6-upper bound is symmetric. Assume that g and h admit a common e y) and y = y0 (x ∧ e y). 6-upper bound f (see Figure 9 right). Write f = gx = hy, then x = x0 (x ∧ e e Put f0 := gx0 . We have f0 (x ∧ y) = f = hy = hy0 (x ∧ y), whence hy0 = f0 . So f0 is a common 6-upper bound of g and h. Now assume that f1 is any common 6-upper bound of g and h, say f1 = g1 x1 = hy1 . In U(M ), we have x0 y0−1 = x1 y1−1 , i.e., the 4-multifraction x0 /y0 /y1 /x1 is unital, hence it admits a central cross. Then Lemma 6.23 provides x, y satisfying e y0 ), x0 = x(x0 ∧ e y0 ), y0 = y(x0 ∧ e y1 ), x1 = x(x1 ∧ e y1 ). y1 = y(x1 ∧ e y0 = 1, whence x = x0 and y = y0 , leading in U(M ) to The definition of f0 gives x0 ∧ e y1 ) = f1 , hence f0 6 f1 . So f0 is a lowest 6-upper bound for g and h. f0 (x1 ∧  MULTIFRACTION REDUCTION II f y x∧ f1 y f 0 x0 x y0 ∧y 0 x0 ′ x g h x1 g ′ x1 y ∧y y1 y1 x1 e ∧y 1 h x x0 1 x1 35 y x0 e ∧y 0 x f1 y0 f0 x∧ e y y f Figure 9. Conditional lattice property for the poset (U(M ), 6): greatest lower bound on the left, lowest upper bound on the right. Of course, we have a symmetric extension for the right divisibility relation. Question 6.28. Is the assumption that M embeds in U(M ) sufficient to ensure that conditional greatest lower bounds and lowest upper bounds for 6 exist in U(M )? 6.4. Depth 6 and beyond. The results established in the case of 4-multifractions do not extend to depth 6 and beyond. In particular, unital 6-multifractions need not admit a central e 2 , let a := aba/aca/cac/cbc/bcb/bab and b := cross: in the Artin-Tits monoid of type A ab/ac/ca/cb/bc/ba. We have a ⇒ b ⇒∗ 1, and a admits a central cross, but b does not, as it is prime. So the counterparts of Lemma 6.17 and Proposition 6.19 fail. However, we shall see now that, for every n, Conjecture Bn implies a geometrical property of van Kampen diagrams that directly extends Prop 6.19. What the latter says is that, if we define (Γ4 , ∗) to be the pointed graph on the right, then, for every 4-multifraction a that reduces to 1, there exists an M -labeling of the edges of Γ4 such that the outer labels from ∗ are a1 , ..., a4 and the labels in each triangle induce equalities in M . ∗ If (Γ, ∗) is a finite, simply connected pointed graph, let us say that a multifraction a on a monoid M admits a van Kampen diagram of shape Γ if there is an M -labeling of Γ such that the outer labels from ∗ are a1 , ..., an and the labels in each triangle induce equalities in M . This notion is a mild extension of the usual one: if S is any generating set for M , then replacing the elements of M with words in S and equalities with word equivalence provides a van Kampen diagram in the usual sense for the word in S ∪ S then associated with a. Then, Proposition 6.19 says that every 4-multifraction reducing to 1 admits a van Kampen diagram of shape Γ4 . Conjecture B predicts similar results for every depth. Definition 6.29. For n > 6 even, let (Γn , ∗) be the graph obtained by appending n−2 adjacent copies of Γ4 around (Γn−2 , ∗) starting from ∗, with alternating orientations, and connecting the last copy of (Γ4 , ∗) with the first one, see Figure 10. Proposition 6.30. Let M be an Artin-Tits monoid. If Conjecture B is true, then every unital n-multifraction on M (with n even) admits a van Kampen diagram of shape Γn , see Figure 10. max = 1. Proof. Let a be a unital n-multifraction on M . Conjecture B predicts the equality a • RU(n) We shall see that the latter (and, more generally, any equality of the form a • RU(n),x = 1, with x maximal or not) implies that a admits a van Kampen diagram of shape Γn . In view on an induction, assume a • R1,x1 ···Rn−1,xn−1 = b · 12 , for some (necessarily unital) (n − 2)multifraction b. Let a0 := a and, inductively, ai := ai−1 • Ri,xi . We start from a loop of edges with alternating orientations labeled a0 . Then we inductively complete the graph using n − 1 steps of the type aii aii aii−1 aii−1 ai ai i+1 or xi ai+1 i−1 ai+1 i i+1 ai+1 i+1 xi ai+1 i−1 ai+1 i ai+1 i+1 36 PATRICK DEHORNOY ac aca ca ca 1 ab ba 1 bc bc c ba b cb ba ba 1 c a a ac ab cb ab 1 cb 1 1 bc bc 1 ab ab cb cb ∗ ∗ Figure 10. The graph Γ6 : on the left, the naked graph, with four juxtaposed copies of Γ4 around one (colored) copy of Γ4 ; it has fourteen vertices, namely four springs (one inner), five wells (two inner), and five 4-prongs; on the right, for M e 2 , the M -labeling of Γ6 that results from the first the Artin-Tits monoid of type A reduction in Example 3.6; it provides a van Kampen diagram for the 6-multifraction ab/ba/ca/ac/bc/ab. Conjecture B predicts that every 6-multifraction representing 1 in an Artin-Tits monoid admits a van Kampen diagram of shape Γ6 . according to the sign of i in a. Because the final two entries of an−1 are trivial, the last two n−1 steps take a simpler form: ann−1 = 1 is equivalent to an = xn−1 , whereas an−1 = 1 is equivalent −1 e an . to xn−2 an−1 6 a4 a5 We thus obtain an M -labeling of an annux 4 x3 lar graph made of n − 2 copies of Γ4 , whose outer boundary is labeled a, and whose ina3 a6 x5 ner boundary is labeled b, see the diagram x2 b4 b3 on the right, here in the case going from 8 b2 b5 to 6. Then we repeat the process with b, x6 a a7 2 etc., until a 4-multifraction is reached, and b1 b6 x1 we conclude using Proposition 6.19. This construction exactly corresponds to the ina8 = x7 a1 ductive definition of Γn .  It is well-known that, if a multifraction represents 1 in a group, then it admits a van Kampen diagram in the sense defined above. What is remarkable here is the existence of one single universal shape, with prescribed springs, wells, and 4-prongs, that works for every unital nmultifraction at the same time. Finally, one may wonder whether some counterparts of Lemma 6.10 and 6.17 might hold with Γn replacing Γ4 : maybe they do, but the natural argument for proving them requires that the ground monoid satisfies the 3-Ore condition, in which case it is known that every unital n-multifraction admits a van Kampen diagram of shape Γn , thus making the results trivial. 7. Miscellanea The main three properties addressed in this paper are Conjectures A, B, and C (together with the uniform version Cunif of the latter), which involve arbitrary Artin-Tits monoids, and are known to be true for those of FC type. Testing these statements with a computer is easy, and we report about experiments that, alltogether, support the conjectures and provide some experimental evidence. The involved program is available at [14], and the experiments are easy to repeat and confirm. We begin with a few remarks about implementation options (Subsection 7.1), then report about the obtained data (Subsection 7.2). Finally, we conclude with a few hints about further properties of reduction, including several counter-examples (Subsection 7.3). MULTIFRACTION REDUCTION II 37 7.1. Implementation options. ± Choice of the monoid. We are interested in Artin-Tits monoids M such that RM is not convergent, hence not of FC type. It is natural to look for monoids with a maximal convergence defect, meaning that the proportion of multifractions with more than one irreducible reduct is e 2 , and, maximal. As can be expected, the ratio is maximal for the Artin-Tits monoid of type A more generally, those with all relations of length 3 exactly: as divergent reducts may arise only with counter-examples to the 3-Ore property, it is natural that this happens more frequently e 2 and, more generwhen all atoms give rise to such counter-examples. Another advantage of A ally, Kn,3 , the Artin-Tits monoid whose Dynkin diagram is the complete graph with n vertices and all edges labeled 3, is the existence of an explicit description of basic elements (namely 1, atoms, and products of two distinct atoms) providing a better efficiency (and 100% correctness with no termination problem) for the implementation of the monoid operations (equality, lcms, e 2 , considered as the critical type (but any gcds, etc). Therefore, we mostly concentrated on A other choice is possible with [14]). Generation of random multifractions. Exhaustively enumerating multifractions up to a given length (sum of the lengths of the entries) is difficult, as, even in the case of 3 atoms, there are more than 2.6 × 109 multifractions of length up to 12. Therefore it is more realistic to use samples of random multifractions. Generating random elements of the monoid and, from there, random multifractions, is easy via random words in the atom alphabet (with a bias due to the relations). Generating random unital multifractions is more delicate. As the density of unital multifractions is negligible, generating random multifractions and selecting those that are unital is not a e2 good option (in addition, it requires a prior solution to the word problem, which exists for A but not in general). Two methods have been used. The first one (“brownian motion”) is to follow the definition of ≃, thus starting with an empty word and randomly adding or deleting pairs s/s and applying the Artin-Tits relations. Inserting right and left reversing steps (the special transformations of Property H, see Subsection 3.3) improves the efficiency. The second method (“lcm-expansions”) consists in starting from a multifraction that admits a random central cross, hence is unital of a very special type, and deriving new, more generic, unital multifractions as follows: Definition 7.1. (Figure 11) If M is a gcd-monoid and a is a unital n-multifraction on M , with n even, we say that b is an lcm-expansion of a if kbk = kak holds and, for each i, there exist decompositions ai = a′i a′′i , bi = b′i b′′i satisfying a′i b′′i−1 = a′i+1 b′′i = a′i ∨ a′i+1 for i negative in a, e a′′i+1 for i positive in a, with indices modulo n, i.e., n + 1 means 1. and b′i−1 a′′i = b′i a′′i+1 = a′′i ∨ ... ... b′i−2 bi−2 b′′i−2 a′′i−1 a′i−1 ai−1 b′′i−1 bi−1 a′i ai bi b′i−1 b′i a′′i a′′i+1 a′i+1 ai−1 b′′i b′′i+1 bi+1 a′i+2 b′i+1 a′′i+2 ai ... ... Figure 11. Lcm-expansion, here for i positive in a; the shift of the indices for b ensures that b has the same sign as a. Note the symmetry: starting with right divisors leads to the same notion. For b an lcm-expansion of a, one reads on Figure 11 the equality ι(b) = ι(a′1 b′′n )−1 ι(a)ι(a′1 b′′n ), hence lcm-expansion preserves unitality. Constructing lcm-expansions of a is easy: with the notation of Definition 7.1, once a left divisor a′i of ai is chosen for each i, all the remaining elements a′′i , b′i , b′′i are determined, and then so is b (but the choice leads to an lcm-expansion only if the lcms exist). The advantage is that the depth is controlled (which is more difficult with brownian motion), the inconvenience is that there is no guarantee that generic multifractions are obtained (but the expansion procedure can be iterated). 38 PATRICK DEHORNOY Maximal vs. atomic reduction steps. Implementing reduction is straightforward, once the lattice operations of the monoid are available. As a composition of i-reductions is again an i-reduction, one might think of restricting to maximal reduction steps, i.e., considering reducts a • Ri,x where x is a maximal i-reducer for a. This is not a good option, as some reducts may be missed: e 2 , let a = ab/ba/ca/bcbc. The only maximal Example 7.2. In the Artin-Tits monoid of type A reductions from a are R3,cc followed by D1,ab , leading to the unique irreducible 1/ab/ca/cb. However, one also finds a • R3,c D1,ab R2,c R3,b = cb/abbc/ba/bc, a second irreducible reduct of a not reachable by maximal steps. This however does not contradict the following (surprising?) result: Proposition 7.3. If M is a strongly noetherian gcd-monoid, and b, c are irreducible reducts of some multifraction, then there exists a finite sequence of maximal reductions and inverses of maximal reductions connecting b to c. Proof (sketch). Write b ⊲⊳ c when there exists a sequence as in the statement. Using induction on the ordinal λ(a), where λ satisfies (3.13), one proves the following general criterion: If ⊲⊳ is an equivalence relation on FM± such that, for every multifraction a that is i-prime and j-irreducible for j 6= i and every 1-reduct a′ of a, there exists a irreducible reduct b of a′ satisfying a ⊲⊳ b, then, for every a in FM± , any two irreducible reducts of a are ⊲⊳-equivalent.  7.2. Experimental data. Conjectures A and B. Testing the two of them is essentially the same thing: one generates a random unital multifraction a, and one checks a ⇒∗ 1 in the former case, redt (a) = 1 is the latter. Because semi-convergence implies 1-confluence, one can fix any reduction strategy for checking a ⇒∗ 1, for instance looking at each step for the smallest level i and the first atom x such that Ri,x applies. Although computing redt is slightly slower, as, at each step, all i-reducers have to be determined in order to take their gcds, both computations are fast. Precise numbers e 2 or K4,3 , the typical order of magnitude is 5 × 104 are not really significant here; in type A 4 (resp., 1.5 × 10 ) random unital multifractions of length 20 and depth 4 (resp., length 40 and e 3 , or C e 2 ), efficiency is diminished by depth 6) per hour of computation. In other types (e.g., A a factor 10 approximately. No counter-example to Conjecture A or B was ever found. As the density of visited (unital) multifractions becomes negligible when the length grows, the significance of such data is questionable. However, it may be noticed that, for the many properties considered in this paper and discarded by counter-examples, the length of the latter (all found by random search) is never more than 12 or so: this does not say anything about a possible counter-example to Conjecture A or B but, at the least, this shows that the considered lengths are not ridiculous. Conjecture A4 . For the special case of Conjecture A4 (and of Conjecture B4 , which, by Corollary 6.26, is equivalent), an exhaustive search makes sense, by systematically considering all possibilities for the central cross (up to a certain length). e 2 , Conjecture A4 is true for all lcm-expansions Fact 7.4. For the Artin-Tits monoid of type A of all multifractions that admits a central cross with entries of length at most 2. By contrast, the procedure applied to the monoid MC,4 of [19, Proposition 6.9] duly finds a counter-example, namely an irreducible lcm-expansion of a 4-multifraction with a central cross (with rays of length 1). What seems to discard a similar counter-example in an Artin-Tits monoid is the fact that Artin-Tits relations preserve the atoms occurring in an element (the “support”), but, even for this weak form of Conjecture A4 , we have no proof so far. Conjectures C and Cunif . Testing these conjectures is easier in that it involves arbitrary, not necessarily unital multifractions, but it is more difficult in that it requires to determine all right reducts of a multifraction a and then, for each pair of them, to determine all their left reducts. The complexity of constructing the tree Ta (as used in the proof of Proposition 5.29) MULTIFRACTION REDUCTION II 39 and its right counterpart Tea increases quickly with the depth. Beyond depth 4, the total number of reducts often becomes large (usually a few ones, but possibly several thousands), resulting in a huge computation time. Typically, in the current version of the program, one can test Conjecture Cunif for about 5 × 103 (resp., 4 × 103 ) random multifractions of length 20 (resp., length 30) and depth 3 per hour of computation. Going to depth 4 diminishes the speed by a factor 50. To overcome these bounds, we also tested (without size limitation) the following instance of Conjecture C: starting with a multifraction a, the determine the (not necessarily distinct) right reducts b1 , ..., b4 and left reducts c1 , ..., c4 of a obtained using the four natural strategies (levels from bottom or top, atoms in lexicographical or antilexicographical order), and check the property ∃k ∀j (bj ⇒∗ ck ), thus checking Conjecture C for {b1 , ..., b4 }. The cost is then comparable as the one for Conjecture B, with about 5 × 104 (resp., 5 × 103 ) random tries for length 20 (resp., 30) per hour of computation. The stronger conclusion ∀k ∀j (bj ⇒∗ ck ) is almost always valid but, as in the case of Figure 6, exceptions occur. 7.3. Further questions. We point to a few natural questions involving reduction. Most of them remain open, or gave rise to counter-examples. Normal forms for reductions. Distinguished expressions for sequences of reductions could be obtained by identifying skew commutation relations, typically of the form Ri,x Rj,y ⇛ Rj,y′ Ri,x′ , meaning that, if a • Ri,x Rj,y is defined, then so is a • Rj,y′ Ri,x′ and the results are equal. Typically, one could try to push divisions to one side, so that all remaining steps are invertible. This approach does not work well, as exceptions always appear. In the same vein, in view of a possible induction and building on the universal scheme U (n) that works in the 3-Ore case, one could conjecture that every reduction sequence is equivalent to one where the highest level occurs only once, or that, if an n-multifraction a is i-irreducible for i < n − 1, then reducing a can be done by a sequence of the form Rn−1,x1 Rn−3,x3 Rn−5,x5 ···. This need not be the case. e 2 , let a = 1/ba/cb/ca/ab. Then a is i-irreducible Example 7.5. In the Artin-Tits of type A for i 6 3, but the only sequence from a to an irreducible reduct is R4,a R2,bc R3,a R4,b , discarding the above two conjectures. Of course, Conjecture B is not contradicted, because a is not unital. In the same direction, one can study local confluence between left reductions Ri,x and right ej,y , with the hope of obtaining normal forms useful for cross-conflence. In almost reductions R all cases, there exists indeed local confluence solutions. However, the case j = i + 2 remains problematic in general. Moreover, using local confluence for an induction is unclear, because there is no common well-founded relation underlying both left and right reduction and, except in type FC, a multifraction may admit infinitely many left-right reducts. Homomorphisms. As reduction is constructed using multiplication and lcm operations, it is preserved by morphisms preserving these operations, namely lcm-morphisms [8]: if φ is an lcmmorphism from a gcd-monoid M to a gcd-monoid M ′ , then a ⇒∗ b implies φ(a) ⇒∗ φ(b) for all a, b in FM± . This however is not easy to use for, say, Conjecture A, because the implications ± go in the wrong direction. If if we study the semi-convergence of RM , mapping M to a gcd′ monoid M that satisfies the 3-Ore condition does not help: if a is unital in FM± , then φ(a) is unital in FM±′ , so φ(a) ⇒∗ 1 holds, but deducing a ⇒∗ 1 is problematic. In the other direction, if M ′ satisfies the 3-Ore condition and φ′ is an lcm-morphism from M ′ to M , then Imφ′ is ± included in some part of M where the 3-Ore condition is satisfied, and knowing that RM ′ is ′ (semi)-convergent will not help for multifractions on M outside Imφ . Morphisms (lcm-morphisms or not) might be useful for establishing particular properties, like Conjecture A4 , i.e., the fact that every unital 4-multifraction admits a central cross. If M is e 2 , one may think of using the classical embedding from M to the the Artin-Tits monoid of type A Artin-Tits group of type B3 , namely ha, b, c | abab = baba, bcb = cbc, ac = cai, that maps a to a−1 b−1 cba, and b and c to themselves, but the image is not included in the monoid. A probably better choice is to map M to the Artin-Tits monoid M ′ of type D4 , namely ha, b, c, d | 40 PATRICK DEHORNOY ada = dad, bdb = dbd, cdc = dcdi+ , by φ(s) = ds for s = a, b, c. If a is a unital 4-multifraction on M , then φ(a) admits a central cross in M ′ : to deduce that a admits a central cross in M , it suffices to show that at least one of the central crosses for φ(a) lies in Imφ. The problem is that Imφ is not closed under right divisor in M ′ : for instance, φ(a) 6 φ(bac) holds in M ′ , but a 6 bac fails in M . By the way, the following natural question seems to be open: Question 7.6 (F. Wehrung). Does the above morphism φ induce an embedding from the e 2 into the Artin-Tits group of type D4 ? Artin-Tits group of type A Reduction graphs. Almost nothing is known about the structural properties of the graph formed by the reducts of a multifraction, for instance their possible lattice properties: if we have a ⇒∗ b and a ⇒∗ c and if b and c admit a common reduct, does there exist a common reduct d of b and c such that every common reduct of b and c is a reduct of d? This is frequently true, but not always: e 2 , consider a = 1/a/bcb/bcb/a (which is Example 7.7. In the Artin-Tits monoid of type A unital). One finds b = a • R2,b = ba/ab/cb/bcb/a and c = a • R2,c = ca/ac/bc/bcb/a. Then b and c admit the two symmetric maximal common reducts, namely d′ = b • D3,b = c • R3,b D1,ca R2,b = ba/ab/c/bc/a, d′′ = b • R3,c D1,ba R2,c = c • D3,c = ca/ac/b/cb/a, and there is no common reduct d of b and c of which d′ and d′′ are reducts. A possible conclusion in view of the long list of counter-examples described in this paper could be that there is no hope for many further general properties of reduction, implying that a possible proof of semi-convergence has to involve the specific properties of the ground monoid in a deep way. In particular, a proof of Conjecture A, B, or C should require developing new specific tools for Artin-Tits groups. The results of [19] may suggest approaches. References [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] J. Altobelli. The word problem for Artin groups of type FC. J. Pure Appl. Algebra, 129:1–22, 1998. K.I. Appel and P.E. Schupp. Artin groups and infinite Coxeter groups. Invent. Math., 72:201–220 1983. E. Artin. Theory of Braids. Ann. of Math., 48:101–126, 1947. E. Brieskorn. Sur les groupe de tresses. In Séminaire Bourbaki 1971/72, volume 317 of Lectures Notes in Math., pages 21–44. Springer, 1973. E. Brieskorn and K. Saito. Artin-Gruppen und Coxeter-Gruppen. Invent. Math., 17:245–271, 1972. R. Charney. Problems related to Artin Groups. Amer. Inst. of Math., Problems in Geometric Group Theory wiki, http://people.brandeis.edu/∼charney/papers/Artin probs3.pdf, http://aimath.org/pggt. A. Chermak. Locally non-spherical Artin groups. J. Algebra, 200:56–98, 1998. J. Crisp. Injective maps between Artin groups. In Geom. Group Theory Down Under, pages 119–137. de Gruyter, Berlin, 1999. (Canberra 1996). P. Dehornoy. Preuve de la conjecture d’irréflexivité pour les structures distributives libres. C. R. Acad. Sci. Paris, 314:333–336, 1992. P. Dehornoy. A fast method for comparing braids. Adv. in Math., 125:200–235, 1997. P. Dehornoy. Groupes de Garside. Ann. scient. Éc. Norm. Sup. 4e série, 35:267–306, 2002. P. Dehornoy. The word reversing method. Intern. J. Alg. and Comput., 21:71–118, 2011. P. Dehornoy. Multifraction reduction I: The 3-Ore condition and Artin–Tits groups of type FC. J. Comb. Algebra, to appear, arXiv:1606.08991. P. Dehornoy. MoKa. Executable MacOS/Docker binaries; www.math.unicaen.fr/∼dehornoy/programs. P. Dehornoy, M. Dyer, and C. Hohlweg. Garside families in Artin–Tits monoids and low elements in Coxeter groups. Comptes Rendus Math., 353:403–408, 2015. P. Dehornoy, with F. Digne, E. Godelle, D. Krammer, and J. Michel. Foundations of Garside Theory. Number 22 in EMS Tracts in Mathematics. Europ. Math. Soc., 2015. P. Dehornoy and E. Godelle. A conjecture about Artin–Tits groups. J. Pure Appl. Algebra, 217:741–756, 2013. P. Dehornoy, D. Holt, and S. Rees. Multifraction reduction IV: Padding and Artin–Tits groups of sufficiently large type. arXiv:1701.06413. P. Dehornoy and F. Wehrung. Multifraction reduction III: The case of interval monoids. J. Comb. Algebra, to appear, arXiv:1606.09018. MULTIFRACTION REDUCTION II 41 [20] P. Deligne. Les immeubles des groupes de tresses généralisés. Invent. Math., 17:273–302, 1972. [21] M. Dyer and C. Hohlweg. Small roots, low elements, and the weak order in Coxeter groups. Advances in Math., 301:769–784, 2016. [22] D. Epstein, with J. Cannon, D. Holt, S. Levy, M. Paterson & W. Thurston. Word Processing in Groups Jones & Bartlett Publ (1992). [23] E. Godelle and L. Paris. Basic questions on Artin-Tits groups. Geometry, Combinatorics, and Topology, pages 399–311, 2012. [24] E. Godelle and L. Paris. K(π, 1) and word problems for infinite type Artin-Tits groups, and applications to virtual braid groups. Math. Z., 272:1339–1364, 2012. [25] E. Godelle and L. Paris. PreGarside monoids and groups, parabolicity, amalgamation, and FC property. Int. J. Alg. Comput., 23:1431–1467, 2013. [26] E. Godelle and S. Rees. Rewriting systems in sufficiently large Artin-Tits groups. arXiv:1511.02789. [27] S. Hermiller and J. Meier. Artin groups, rewriting systems and three-manifolds. J. Pure Appl. Algebra, 36(2):141–156, 1999. [28] L. Paris. Artin monoids embed in their groups. Comment. Math. Helv., 77(3):609–637, 2002. [29] S.J. Pride. On Tits’ conjecture and other questions concerning Artin and generalized Artin groups. Invent. Math., 86(2):347–356, 1986. [30] K. Tatsuoka. An isoperimetric inequality for Artin groups of finite type. Trans. Amer. Math. Soc., 339(2):537–551, 1993. Laboratoire de Mathématiques Nicolas Oresme, CNRS UMR 6139, Université de Caen, 14032 Caen cedex, France, and Institut Universitaire de France E-mail address: [email protected] URL: www.math.unicaen.fr/∼dehornoy
4math.GR
Nilpotent Evolution Algebras over arbitrary fields arXiv:1508.06860v1 [math.AC] 27 Aug 2015 A. S. Hegazi, Hani Abdelwahab Mathematics department, Faculty of Science, Mansoura University, Egypt [email protected] [email protected] Abstract The paper is devoted to the study of annihilator extensions of evolution algebras and suggests an approach to classify finite-dimensional nilpotent evolution algebras. Subsequently nilpotent evolution algebras of dimension up to four are classified. Keywords and phrases: Nilpotent evolution algebra, Annihilator extension, Automorphism group. 2010 Mathematics Subject Classification: 17D92, 17D99. 1 Introduction Evolution algebras were introduced in 2006 by J.P. Tian and P. Vojtechovsky in their paper “Mathematical concepts of evolution algebras in non-Mendelian genetics ” (see [10]). Later on, Tian laid the foundations of evolution algebras in his monograph [11]. These algebras present many connections with other mathematical fields including graph theory, group theory, Markov chains, dynamical systems, knot theory, 3-manifolds and the study of the Riemann-Zeta function (see [11]). Evolution algebras are in general non-associative and do not belong to any of the well-known classes of non-associative algebras such as Lie algebras, alternative algebras, or Jordan algebras. Therefore, the research on these algebras follows different paths (see [2], [3], [4], [8], [12]). One of the classical problems in study of any class of algebras is to know how many different (up to isomorphism) algebras exist for each dimension. In this way in [1], [6], [7] and [9], the classifications of nilpotent Jordan algebras, nilpotent Lie superalgebras, nilpotent associative algebras and nilpotent Lie algebras of low dimensions were given. In this paper we study the class of nilpotent evolution algebras. Our aim is to describe a method for classifying nilpotent evolution algebras. In [3], the equivalence between nilpotent evolution algebras and evolution algebras which are defined by upper triangular matrices is proved. In [11], J. Tian defined an evolution algebra associated to any directed graph. In [5], A. Elduque and A. Labra considered the reverse direction, a directed graph is attached to any evolution algebra and they proved that nilpotency of an evolution algebra is equivalent to the nonexistence of oriented cycles in the attached directed graph. The paper is organized as follows. In Section 2, we give some basic concepts about evolution algebras. Section 3 is devoted to the description of construction of evolution algebras with non-trivial annihilator as annihilator extensions of evolution algebras of lower dimensions. In Section 4, we describe a method for classifying nilpotent evolution algebras. In Section 5, we classify nilpotent evolution algebras of dimension up to three over arbitrary fields. In Section 6, four-dimensional nilpotent evolution algebras are classified over an algebraic closed field of any characteristic and over R. 2 Preliminaries Definition 1 [11] An evolution algebra is an algebra E containing a basis (as a vector space) B = {e1 , . . . , en } such that ei ej = 0 for any 1 ≤ i < j ≤ n. A basis with this property is called a natural basis. Given a natural basis B = {e1 , . . . , en } of an evolution algebra E, e2i = n X j=1 1 αij ej  for some scalars αij ∈ F, 1 ≤ i, j ≤ n. The matrix A = αij is the matrix of structural constants of the evolution algebra E, relative to the natural basis B. Definition 2 An ideal I of an evolution algebra E is an evolution algebra satisfying EI ⊆ I. Given an evolution algebra E, consider its annihilator ann (E) := {x ∈ E : xE = 0} . Lemma 3 [5, Lemma 2.7] Let B = {e1 , . . . , en } be a natural basis of an evolution algebra E. Then  ann (E) = span ei : e2i = 0 . Hence ann (E) is an ideal of the evolution algebra E. Let B ′ = {er+1 , . . . , en } be a natural basis of ann (E). Then the quotient E/ann (E) is an evolution algebra with a natural basis B ′′ = {ēi = ei + ann (E) : 1 ≤ i ≤ r}. Note that we can reorder the natural basis B of an evolution algebra E so that B ′ = {er+1 , . . . , en } be a natural basis of ann (E) . Given an evolution algebra, we introduce the following sequence of subspaces: E h1i = E, E hk+1i = E hki E. Definition 4 An algebra E is called nilpotent if there exists n ∈ N such that E hni = 0, and the minimal such number is called the index of nilpotency. One can easily verify that if E is nilpotent then ann (E) 6= 0. Moreover, E is nilpotent if and only if E/ann (E) is nilpotent. 3 Constructing Nilpotent evolution Algebra Let E be an evolution algebra with a natural basis BE = {e1 , . . . , em } and V be a vector space with a basis BV = {em+1 , . . . , en }. Let θ : E × E −→V be a bilinear map on E, set Eθ = E⊕V define a multiplication on Eθ by: ei ⋆ ej = ei ej |E +θ (ei , ej ) if 1 ≤ i, j ≤ m, and otherwise ei ⋆ ej = 0. Then Eθ is an evolution algebra with a natural basis BEθ = {e1 , . . . , en } if and only if θ (ei , ej ) = 0 for all i 6= j. Denote the space of all bilinear θ such that θ (ei , ej ) = 0 for all i 6= j by Z (E × E, V ). For θ ∈ Z (E × E, V ) with dim V = n − m, the evolution algebra Eθ = E⊕V is called a (n − m)-dimensional annihilator extension of E by V. Now, for a linear map f ∈ Hom (E, V ), if we define θ f : E × E −→V by θ f (ei , ej ) = f (ei ej ), then θf ∈ Z (E × E, V ). One can easily verify that the space defined by B (E × E, V ) = {θf : f ∈ Hom (E, V )} is a subspace of Z (E × E, V ). Lemma 5 Let E be an evolution algebra with a natural basis BE = {e1 , . . . , em } and V be a vector space with a basis BV = {em+1 , . . . , en }. Suppose that θ ∈ Z (E × E, V ) and θf ∈ B (E × E, V ). Then Eθ ∼ = Eθ+θf . Proof. Let x = n P αi ei ∈ Eθ , define a linear map σ : Eθ −→ Eθ+θf by i=1 σ n X i=1 αi ei ! n X α i ei + f = i=1 m X α i ei i=1 Then σ is an invertible linear transformation. Moreover, let x = n P ! α i ei , y = i=1 σ (x ⋆Eθ y) = σ m X i=1 = m X i=1 αi β i e2i . n P β i ei ∈ Eθ then i=1 ! m X   αi β i e2i + θ (ei , ei ) + f e2i = + θ (ei , ei ) i=1  αi β i e2i + (θ + θf ) (ei , ei ) = σ (x) ⋆Eθ+θf σ (y) . 2 Hence Eθ ∼ = Eθ+θf . Hence the isomorphism type of Eθ only depends on the element θ + B (E × E, V ). Therefore we consider the quotient space H (E × E, V ) = Z (E × E, V ) /B (E × E, V ) . The annihilator extension corresponding to θ = 0, and consequently corresponding to any element in B (E × E, V ) is called a trivial extension. Suppose that E is an evolution algebra with a natural basis BE = {e1 , . . . , em } and V be a vector space with a basis BV = {em+1 , . . . , en }. Then a symmetric bilinear map θ ∈ Z (E × E, V ) can be n−m P θj (ei , ei ) em+j , where θj ∈ Z (E × E, F). Further, θ ∈ B (E × E, V ) if and written as θ (ei , ei ) = j=1 only if all θj ∈ B (E × E, F). Lemma 6 dim H (E × E, F) = dim E − dim E h2i . Proof. We claim that dim B (E × E, F) = dim E h2i . Let x1 , x2 , . . . , xk be a basis of E h2i , then x∗1 , x∗2 , . . . , x∗k are linearly independent in E ∗ where x∗i is defined by x∗i (xi ) = 1 and x∗i (xj ) = 0 if i 6= j. Let θ f ∈ B (E × E, F), then θf = α1 θ x∗1 + α2 θ x∗1 + · · · + αk θx∗k and θx∗1 , θx∗1 , . . . , θx∗k are linearly independent in B (E × E, F). Hence dim B (E × E, F) = dim E h2i and dim H (E × E, F) = dim E − dim E h2i . Suppose that E is an evolution algebra with a natural basis BE = {e1 , . . . , em }. Let us denote by Sym (E) the space of all symmetric bilinear forms on E. Then Sym (E) = δ ei ,ej : 1 ≤ i ≤ j ≤ m while Z (E × E, F) = hδ ei ,ei : 1 = 1, 2, . . . , mi, where a bilinear form δ ei ,ej : E × E −→F is defined by δ ei ,ej (el , em ) = 1 if {i, j} = {l, m}, and otherwise it takes the value zero. Example 7 Let E : e21 = e2 be a 2-dimensional nilpotent evolution algebra. Here Z (E × E, F) = hδ e1 ,e1 , δ e2 ,e2 i, by Lemma 6, B (E × E, F) is spanned by θe∗2 . Let θe∗2 = αδ e1 ,e1 + βδ e2 ,e2 ∈ Z (E × E, F).   It follows that α = θe∗2 (e1 , e1 ) = e∗2 e21 = 1, and β = θe∗2 (e2 , e2 ) = e∗2 e22 = 0 then θe∗2 = δ e1 ,e1 . Hence B (E × E, F) = hδ e1 ,e1 i and H (E × E, F) = hδ e2 ,e2 i. Example 8 Let E : e21 = e3 , e22 = e3 be a 3-dimensional nilpotent evolution algebra. Here 3 P αi δ ei ,ei . Z (E × E, F) = hδ e1 ,e1 , δ e2 ,e2 , δ e3 ,e3 i, by Lemma 6, B (E × E, F) is spanned by θ e∗3 . Let θ e∗3 = i=1 Then α1 = α2 = 1, and α3 = 0. hδ e1 ,e1 , δ e3 ,e3 i. Hence B (E × E, F) = hδ e1 ,e1 + δ e2 ,e2 i and H (E × E, F) = Suppose that Eθ = E⊕V is an evolution algebra then V V = 0 and so ann(Eθ ) ⊇ V 6= 0. It means that by this way we construct evolution algebras with ann(Eθ ) 6= 0. Further, any evolution algebras with ann (E) 6= 0 can be obtained by this way. Lemma 9 Let E be an evolution algebra and ann (E) 6= 0. Then E is an annihilator extension of a lower dimensional evolution algebra. Proof. Suppose that E is an evolution algebra with a natural basis B = {e1 , . . . , en }. Let B ′ = {er+1 , . . . , en } be a natural basis of ann (E) then the quotient E/ann (E) is an evolution algebra with r P αi ēi ∈ E/ann (E) then we define a natural basis B ′′ = {ēi = ei + ann (E) : 1 ≤ i ≤ r}. If x̄ = an injective linear map σ : E/ann (E) −→ E by σ (x̄) = r P i=1 αi ei . For any x̄, ȳ ∈ E/ann (E) we i=1 have σ(x̄)σ(ȳ) − σ(x̄ȳ) ∈ ann (E) (let π : E −→ E/ann (E) be a projection map then π (σ (x̄)) = x̄ and hence σ(x̄)σ(ȳ) − σ(x̄ȳ) ∈ ker π). Then θ : E/ann (E) × E/ann (E) −→ ann (E) defined by θ(x̄, ȳ) = σ(x̄)σ(ȳ)−σ(x̄ȳ) ∈ Z (E × E, V ). It remains to show that (E/ann (E))θ = E/ann (E)⊕ann (E) is isomorphic to E. If x ∈ E, then x can be uniquely written as x = σ(ȳ) + z, where ȳ ∈ E/ann (E) and z ∈ ann (E). Defining φ : E −→ (E/ann (E))θ by φ(x) = φ (σ(ȳ) + z) = ȳ + z, then φ is bijective and φ(x1 x2 ) = = = φ ((σ(ȳ1 ) + z1 )(σ(ȳ2 ) + z2 )) = φ(σ(ȳ1 )σ(ȳ2 )) φ(σ(ȳ1 ȳ2 ) + θ(ȳ1 , ȳ2 )) = ȳ1 ȳ2 + θ(ȳ1 , ȳ2 ) (ȳ1 + z1 ) ⋆ (ȳ2 + z2 ) = φ(x1 ) ⋆ φ(x2 ). Then φ is an isomorphism. So in particular all nilpotent evolution algebras can be obtained by this way. 3 4 The Classification Method In Section 3, Lemma 9, we show that a nilpotent evolution algebra E can be obtained as an annihilator extension of M = E/ann (E) by V = ann (E). Now, suppose that Eθ is an annihilator extension of E by V , if ann(Eθ ) 6= V then Eθ can be obtained as an annihilator extension of E/ann (E) by ann (E). So we get Eθ as annihilator extensions of different algebras E and E/ann (E). Our aim is to avoid construct the same algebra by different algebras. Definition 10 Let θ ∈ Z (E × E, V ) then θ⊥ = {ei ∈ E : θ(ei , ei ) = 0} is called the radical of θ. If n−m P θj (ei , ei ) em+j where θj ∈ Z (E × E, F), then θ(ei , ei ) = j=1 ⊥ ⊥ θ⊥ = θ⊥ 1 ∩ θ 2 ∩ · · · ∩ θ n−m .   Lemma 11 Let θ ∈ Z (E × E, V ). Then ann(Eθ ) = θ ⊥ ∩ ann (E) ⊕ V. 2 2 Proof.  If ei ∈ ann(E  θ ) then ei ⋆ ei = ei + θ (ei , ei ) = 0, hence ei = θ (ei , ei ) = 0. It follows that ⊥ ei ∈ θ ∩ ann (E) ⊕ V . On the other hand, note that V ⊂ ann(Eθ ). If ei ∈ θ⊥ ∩ ann (E) then ei ⋆ ei = e2i + θ (ei , ei ) = 0 and hence ei ∈ ann(Eθ ). Corollary 12 Let θ ∈ Z (E × E, V ). Then ann(Eθ ) = V if and only if θ⊥ ∩ ann (E) = 0. Corollary 13 Let θ ∈ Z (E × E, V ) such that θ⊥ ∩ ann (E) = 0. Then Eθ can not be obtained as an annihilator extension of a different algebra. Proof. Consider ϑ ∈ Z(M × M, W ) such that ϑ⊥ ∩ ann(M) = 0. If Mϑ ∼ = Eθ , then ann (Mϑ ) ∼ = ann (Eθ ). Hence M ∼ = E. = Eθ /ann (Eθ ) ∼ = Mϑ /ann (Mϑ ) ∼ Thus to avoid constructing the same algebra as an annihilator extension of different algebras, we restrict θ to be such that θ⊥ ∩ ann (E) = 0. Suppose that E is an evolution algebra. Denote Aut (E) for the set of all automorphisms of E. Let φ ∈ Aut (E). For θ ∈ Z (E × E, V ) defining φθ (ei , ei ) = θ (φ (ei ) , φ (ei )) then φθ ∈ Z (E × E, V ) if and only if θ (φ (ei ) , φ (ej )) = 0 for all i 6= j. m P cii δ ei ,ei ∈ Z (E × E, F). Then θ can be Consider the matrix representation and assume that θ = i=1   represented by an m × m diagonal matrix cii , and then φθ = φt cii φ. Hence φθ ∈ Z (E × E, V ) if and only if φθ be a diagonal matrix. Now, suppose that E be an evolution algebra with a natural basis BE = {e1 , . . . , em } and V n−m P θ i (el , el )em+i , ϑ(el , el ) = be a vector space with a basis BV = {em+1 , . . . , en }. Let θ(el , el ) = i=1 n−m P ⊥ ⊥ ϑi (el , el )em+i ∈ H (E × E, V ) and θ ∩ ann (E) = ϑ ∩ ann (E) = 0, i.e., ann(Eθ ) = ann(Eϑ ) = V . i=1 Assume that Eθ and Eϑ are isomorphic, let φ : Eθ −→ Eϑ be an isomorphism then φ (ann(Eθ )) = ann(Eϑ ), i.e., ψ = φ |V ∈ Gl (V ). If φ (ei ) = yi + vi where yi ∈ E, vi ∈ V , then φ induces an isomorphism φ0 : E −→ E defined by φ0 (ei ) = yi and a linear map f : E −→ V defined by f (ei ) = vi . So, we can realize φ as a matrix of the form:   φ0 0 φ= ; φ0 ∈ Aut (E) , f ∈ Hom (E, V ) and ψ = φ |V ∈ Gl (V ) . f ψ Now, let x = n P ai ei ∈ Eθ = E ⊕ V then i=1 φ n X i=1 ai e i ! = φ0 m X i=1 ai e i ! +f m X i=1 4 ai e i ! +ψ n X i=m+1 ai e i ! . According to the definition of φ we have φ n X n X ai e i ⋆ Eθ ai e i i=1 i=1 L.H.S. = ! m X φ m X i=1 m X = i=1 R.H.S. = = " φ0 m X i=1  2 ! n X ⋆ Eϑ φ ai e i i=1  e2i + θ(ei , ei ) ! . !     a2i φ0 e2i + f e2i + ψ (θ(ei , ei ))    a2i φ0 e2i + (θf + ψ ◦ θ) (ei , ei ) . ai e i i=1 m X ai e i i=1 ai i=1 = =φ n X !#2 + ϑ φ0 m X ai e i i=1 ! , φ0 m X ai e i i=1 !!    a2i φ0 e2i + φ0 ϑ(ei , ei ) . This yields to: φ0 ϑ(ei , ei ) = (θ f + ψ ◦ θ) (ei , ei ) for i = 1, 2, ..., m. (1) i.e., φ0 υ = θf + ψ ◦ θ ∈ Z (E × E, V ). Thus Eθ and Eϑ are isomorphic if and only if there exist φ0 ∈ Aut (E) and ψ ∈ Gl (V ) such that φ0 υ = ψ ◦ θ modulo B (E × E, V ). Note that for all i 6= j we have 0 = φ (ei ⋆Eθ ej ) = φ (ei ) ⋆Eϑ φ (ej ) = ϑ (φ0 (ei ) , φ0 (ej )) . i.e., φ0 υ ∈ H (E × E, V ) . n−m P Now, for 1 ≤ i ≤ n − m, if ψ (em+i ) = aij em+j , then j=1 n−m X φ0 ϑi (el , el )em+i = θ i (el , el )ψ (em+i ) = n−m X n−m X aij θ i (el , el )em+j . j=1 i=1 i=1 i=1 Hence φ0 ϑj = n−m X n−m P aij θi modulo B (E × E, V ). It follows that the φ0 ϑi span the same subspace of i=1 H (E × E, V ) as the θi . We have proved Lemma 14 Let θ(el , el ) = n−m P θi (el , el )em+i and ϑ(el , el ) = n−m P ϑi (el , el )em+i be two elements of i=1 i=1 ⊥ H (E × E, V ). Suppose that θ ∩ ann (E) = ϑ⊥ ∩ ann (E) = 0. Then Eθ ∼ = Eϑ if and only if there is a φ ∈ Aut (E) such that the φϑi span the same subspace of H (E × E, F) as the θi . In case of θ = ϑ, we obtain from Equation (1) the following description of Aut(Eθ ). Lemma 15 Let E be a nilpotent evolution algebra and θ ∈ H (E × E, V ) such that θ ⊥ ∩ ann (E) = 0. Then Aut (Eθ ) consists of all linear operators of the matrix form   φ0 0 ; φ0 ∈ Aut (E) , f ∈ Hom(E, V ) and ψ = φ |V ∈ Gl (V ) . φ= f ψ  such that φ0 θ(ei , ei ) = f e2i + ψ (θ(ei , ei )) for i = 1, 2, ..., m. 5 Let E be an evolution algebra with a natural basis BE = {e1 , . . . , em }. If E = he1 , .., er−1 , er+1 , .., em i ⊕ Fer is the direct sum of two nilpotent ideals, the 1-dimensional ideal Fer is called an annihilator component of E. Any m-dimensional nilpotent evolution algebra with annihilator component is a 1-dimensional trivial extension of (m − 1)-dimensional nilpotent evolution algebra. Our aim is to avoid construct nilpotent algebras with annihilator components, and hence when we construct (n + 1)-dimensional nilpotent algebras, we have to add algebras E = I ⊕ Fen+1 where I be a nilpotent algebra with a natural basis BI = {e1 , . . . , en }. Lemma 16 Let θ(el , el ) = n−m P θi (el , el )em+i and θ⊥ ∩ ann (E) = 0. Then Eθ has an annihilator i=1 component if and only if θ1 , θ2 , . . . , θs are linearly dependent in H (E × E, F). Proof. Suppose that Eθ has an annihilator component. Then we can write Eθ = I ⊕ Fem+r where em+r ∈ V . Then θ : E × E −→ hem+1 , . . . , em+r−1 , em+r+1 , . . . , en−m i , and hence θr = 0. Then θ 1 , θ2 , . . . , θn−m are linearly dependent. On the other hand, suppose that s P ϑi (el , el )em+i where hϑi : i = 1, 2, . . . , si is a θ1 , θ2 , . . . , θn−m are linearly dependent, let ϑ(el , el ) = i=1 proper subspace of hθi : i = 1, 2, . . . , n − mi and span the same space as θi . Then by Lemma 14, we have Eθ ∼ = Eϑ . It follows that Eθ has an annihilator component. Suppose that E is an evolution algebra. For θ ∈ H (E × E, F), define a subgroup Sθ (E) of Aut (E) by Sθ (E) = {φ ∈ Aut (E) : θ (φ (ei ) , φ (ej )) = 0 ∀i 6= j} . Now, we have a procedure takes a nilpotent evolution algebra E of dimension m with a natural basis BE = {e1 , . . . , em } gives us all nilpotent evolution   algebras Ẽ of dimension n with a natural basis B = {e1 , . . . , em , em+1 , . . . , en } such that Ẽ/ann E˜ ∼ = E and Ẽ has no annihilator components. The Ẽ procedure runs as follows: 1. Determine Z (E × E, F) , B (E × E, F) and H (E × E, F). 2. Let V be a vector space with a basis BV = {em+1 , . . . , en }. Consider θ ∈ H (E × E, V ) with θ(el , el ) = n−m X θ i (el , el )em+i , i=1 where the θ i ∈ H (E × E, F) are linearly independent, and θ⊥ ∩ ann (E) = 0. Use the action of Sθ (E) on θ by hand calculations to get a list of orbit representatives as small as possible. 3. For each orbit found, construct the corresponding algebra. 5 Nilpotent evolution algebras of dimension ≤ 3 In this section we present a complete classification of nilpotent evolution algebras of dimension ≤ 3. We denote the j-th algebra of dimension i by Ei,j and among the natural basis of Ei,j the multiplication is specified by giving only the nonzero products. 5.1 Nilpotent evolution algebras of dimension 1 Let E be an evolution algebra of dimension 1 with natural basis {e1 }. If E is nilpotent then ann (E) = he1 i. Therefore, there is only one nilpotent evolution algebra of dimension 1, that is E1,1 with a natural basis {e1 } and E E1,1 Multiplication Table —————– H (E × E, F) hδ e1 ,e1 i ann (E) E1,1 Aut (E) GL (E1,1 ) Table 1: One-dimensional nilpotent evolution algebras 6 5.2 Nilpotent evolution algebras of dimension 2 Here we consider the classification of 2-dimensional nilpotent algebras. 5.2.1 Nilpotent algebras with annihilator component We consider the 1-dimensional trivial extensions ( corresponding to θ = 0) of algebras of dimension 1. We get E2,1 = E1,1 ⊕ E1,1 . 5.2.2 Nilpotent algebras with no annihilator component Here we consider 1-dimensional extensions of E1,1 . We get only one algebra E2,2 : e21 = e2 corresponding to θ = δ e1 ,e1 . Theorem 17 Up to isomorphism there exactly two nilpotent evolution algebras of dimension 2 with a natural basis B = {e1 , e2 }over a field F which are isomorphic to the following pairwise non-isomorphic algebras: E E2,1 Multiplication Table —————– B (E × E, F) 0 H (E × E, F) hδ e1 ,e1 , δe2 ,e2 i ann (E) E2,1 E2,2 e21 = e2 . hδ e1 ,e1 i hδ e2 ,e2 i he2 i Aut (E) GL  (E2,1 )  a 0 φ = 11 a21 a211 Table 2: Two-dimensional nilpotent evolution algebras 5.3 Nilpotent evolution algebras of dimension 3 Here we classify three-dimensional nilpotent evolution algebras over arbitrary fields based on nilpotent evolution algebras of dimension up to two. 5.3.1 Nilpotent algebras with annihilator component Here we consider the 1-dimensional trivial extensions of algebras of dimension 2. We get E3,1 = E2,1 ⊕ E1,1 and E3,2 = E2,2 ⊕ E1,1 . 5.3.2 Nilpotent algebras with no annihilator component 1-dimensional extension of E2,1 : Let θ = αδ e1 ,e1 + βδ e2 ,e2 and αβ 6= 0, otherwise θ⊥ ∩ ann(E2,1 ) 6= 0. The α−1 θ span the same subspace in H (E × E, F) as θ, so we may assume α = 1. For any α, β ∈ F∗ , let θα = δ e1 ,e1 +αδ e2 ,e2 , θβ = δ e1 ,e1 + βδ e2 ,e2 and assume that (E2,1 )θα is isomorphic to (E2,1 )θβ then by Lemma 14, there exist a     1 0 1 0 , it follows that φ = λ φ ∈ Aut (E2,1 ) and λ ∈ F∗ such that φθ α = λθβ . Thus φt 0 β 0 α   2  1 0 2 det φ , then α. On the other hand, assume β = δ α. Then φθ α = θβ where φ = β = δ= λ 0 δ by Lemma 14 (E2,1 )θα is isomorphic to (E2,1 )θβ . Hence (E2,1 )θα is isomorphic to (E2,1 )θβ if and only if there is a δ ∈ F∗ such that β = δ 2 α. So we get the algebras: α E3,3 : e21 = e3 , e22 = αe3 ; α ∈ F∗ /F∗2 . 1-dimensional extension of E2,2 : We get only one algebra E3,4 : e21 = e2 , e22 = e3 corresponding to θ = δ e2 ,e2 . 2-dimensional extension of E1,1 : Here we have H(E1,1 × E1,1 , F) = hδ e1 ,e1 i, so there is no 2-dimensional extension of E1,1 . 7 Theorem 18 Up to isomorphism any 3-dimensional nilpotent evolution algebras with a natural basis B = {e1 , e2 , e3 } over a field F is isomorphic to one of the following pairwise non-isomorphic nilpotent evolution algebras: E E3,1 Multiplication Table —————– E3,2 e21 = e2 . α∈F E3,3 ∗ F∗2 e21 = e3 , e22 = αe3 . e21 = e2 , e22 = e3 . E3,4 B (E × E, F) 0 H (E × E, F) Sym (E3,1 ) ann (E) E3,1 hδ e1 ,e1 i hδ e2 ,e2 , δ e3 ,e3 i he2 , e3 i hδ e1 ,e1 + δ e2 ,e2 i hδ e1 ,e1 , δ e3 ,e3 i he3 i hδ e1 ,e1 , δ e2 ,e2 i hδ e3 ,e3 i he3 i Aut (E) GL (E3,1 ) # " a11 0 0 φ = a21 a211 a23 a 0 a33 " 31 # a11 a12 0 φ = a21 a22 0 , a31 a32 a33 a211 + αa221 = a33 , a212 + αa222 = αa33 , a11 a12  + αa21 a22 = 0.  a11 0 0 φ =  0 a211 0  a31 0 a411 Table 3: Three-dimensional nilpotent evolution algebras From Theorem 18, up to isomorphism, the number of 3-dimensional nilpotent evolution algebras: Over an algebraic closed field F is Over R is Over Q is 4 5 ∞ Over any finite field is 5 if characteristic F is odd 4 if characteristic F is even Table 4: Number of 3-dimensional nilpotent Evolution algebras 6 Nilpotent evolution algebras of dimension 4 In this section we present a complete classification of 4-dimensional nilpotent evolution algebras over an algebraic closed field and R. We denote real nilpotent evolution algebras of dimension 4 by E4,j . 6.1 Nilpotent algebras with annihilator component Here we consider the 1-dimensional trivial extension corresponding to θ = 0 of algebras of dimension α=−1 α=1 3. We get E4,1 = E4,1 = E3,1 ⊕ E1,1 , E4,2 = E4,2 = E3,2 ⊕ E1,1 , E4,3 = E4,3 = E3,3 ⊕ E1,1 , E4,4 = E3,3 ⊕ E1,1 and E4,4 = E4,5 = E3,4 ⊕ E1,1 . 6.2 Nilpotent algebras with no annihilator component 1-dimensional extension of E3,1 : Let θ = αδ e1 ,e1 + βδ e2 ,e2 + γδ e3 ,e3 and αβγ 6= 0. After dividing we may assume that θ = δ e1 ,e1 + βδ e2 ,e2 + γδ e3 ,e3 and βγ 6= 0. Consider φ1 , φ2 , φ3 , φ4 ∈ Sθ (E3,1 ) such that φ1 φ4 1 0 1 = 0 β − 2 0 0  0  0 = 1 (−γ)− 2    1 0 0  , φ2 = 0 1 γ− 2 0  0 1 − 21 0 . (−β) 0 0 0 β − 21 0   0 1 0  , φ3 = 0 −1 0 (−γ) 2 0 0 1 γ− 2  0 1 (−β)− 2  , 0 • Over an algebraic closed field F: Here β, γ are squares then φ1 θ = δ e1 ,e1 + δ e2 ,e2 + δ e3 ,e3 . So we get the algebra E4,5 : e21 = e22 = e23 = e4 . • Over the real field R: 8 – – – – If If If If β β β β > 0, γ > 0, γ < 0, γ < 0, γ >0 <0 >0 <0 then then then then φ1 θ φ2 θ φ3 θ φ4 θ = θ1 = δ e1 ,e1 + δ e2 ,e2 + δ e3 ,e3 . = θ2 = δ e1 ,e1 + δ e2 ,e2 − δ e3 ,e3 . = θ2 = δ e1 ,e1 + δ e2 ,e2 − δ e3 ,e3 . = −θ2 = − (δ e1 ,e1 + δ e2 ,e2 − δ e3 ,e3 ). Therefore we have two representatives θ1 , θ2 . It remains to decide isomorphism between (E3,1 )θ1 , (E3,1 )θ2 . By Lemma 14, (E3,1 )θ1 is isomorphic to (E3,1 )θ2 if and only if there exist a φ ∈ Aut (E3,1 ) and λ ∈ R∗ such that φθ1 = λθ 2 . This amounts to (among others) the equations: a211 + a221 + a231 = λ, a212 + a222 + a232 = λ, a213 + a223 + a233 = −λ, which never have a solution in R. Thus (E3,1 )θ1 , (E3,1 )θ2 are non-isomorphic. So we get only two algebras: E4,6 : e21 = e22 = e23 = e4 . E4,7 : e21 = e22 = e4 , e23 = −e4 . 1-dimensional extension of E3,2 : Let θ = αδ e2 ,e2 + βδ e3 ,e3 and αβ 6= 0. We can divide to get α = 1. So we may assume that θ = δ e2 ,e2 + βδ e3 ,e3 . Consider φ1 , φ2 ∈ Sθ (E3,2 ) such that     1 0 0 1 0 0 0 . 0  , φ2 = 0 1 φ1 = 0 1 1 −1 0 0 β− 2 0 0 (−β) 2 • Over an algebraic closed field F: Here β is a square then φ1 θ = δ e2 ,e2 + δ e3 ,e3 . So we get the algebra E4,6 : e21 = e2 , e22 = e23 = e4 . • Over the real field R: – If β > 0 then φ1 θ = θ 1 = δ e2 ,e2 + δ e3 ,e3 . – If β < 0 then φ2 θ = θ 2 = δ e2 ,e2 − δ e3 ,e3 . Suppose that φ ∈ Aut (E3,2 ) and λ ∈ R∗ such that φθ1 = λθ 2 . Then we get (among others) the equations a222 + a232 = λ, a233 = −λ, which never have a solutions in R. Thus (E3,2 )θ1 , (E3,2 )θ2 are not isomorphic. So we get only two algebras: E4,8 : e21 = e2 , e22 = e23 = e4 . E4,9 : e21 = e2 , e22 = e4 , e23 = −e4 . α 1-dimensional extension of E3,3 : Let θ = γδ e1 ,e1 + βδ e3 ,e3 and β 6= 0. After dividing we may assume that θ = γ (δ e1 ,e1 + αδ e2 ,e2 ) + α such that δ e3 ,e3 . Consider φ1 , φ2 , φ3 ∈ Sθ E3,3       1 1 1 (−γ) 2 0 0 0 0 0 0 (−γ) 2 γ2 1 1 1      φ1 =  0 (−γ) 2 0 , φ2 = 0 γ 2 0 , φ3 = (−γ) 2 0 0 . 0 0 γ 0 0 −γ 0 0 −γ • Over an algebraic closed field F. In this case α = 1. If γ = 0 then we get θ1 = δ e3 ,e3 . If γ 6= 0 then φ2 θ = γ 2 (δ e1 ,e1 + δ e3 ,e3 ). Then after dividing α=1 and λ ∈ F∗ such that we may assume that θ2 = δ e1 ,e1 + δ e3 ,e3 . Suppose that φ ∈ Aut E3,3 φθ1 = λθ2 . a231 − a232 = λ, a233 = λ, a31 a32 = a31 a33 = a32 a33 = 0,   α=1 α=1 .Therefore we get the is not isomorphic to E3,3 which never have a solution. So, E3,3 θ2 θ1 following non-isomorphic algebras: E4,7 : e21 = e3 , e22 = e3 , e23 = e4 . E4,8 : e21 = e3 + e4 , e22 = e3 , e23 = e4 . 9 • Over the real field R. In this case α = ±1. Case1. α = 1: – If γ = 0, then we get θ1 = δ e3 ,e3 .  α=1 ×E α=1 – If γ < 0 then φ3 θ = γ 2 (−δ e2 ,e2 + δ e3 ,e3 ). Since B E3,3 3,3 , R = hδ e1 ,e1 + δ e2 ,e2 i,  α=1 2 ×E α=1 δ e1 ,e1 = −δ e2 ,e2 in H E3,3 3,3 , R . So, φ3 θ = γ (δ e1 ,e1 + δ e3 ,e3 ). So after dividing we may assume that θ2 = δ e1 ,e1 + δ e3 ,e3 . – If γ > 0 then φ2 θ = γ 2 (δ e1 ,e1 + δ e3 ,e3 ). Therefore we a gain get θ2 = δ e1 ,e1 + δ e3 ,e3 .  α=1 and λ ∈ F∗ such that φθ1 = λθ 2 . This then amounts to the Suppose that φ ∈ Aut E3,3 following equations: a231 − a232 = λ, a233 = λ, a31 a32 = a31 a33 = a32 a33 = 0,   α=1 α=1 which never have a solution in R. So, E3,3 is not isomorphic to E3,3 .Therefore we get θ1 θ2 the following non-isomorphic algebras: E4,10 : e21 = e3 , e22 = e3 , e23 = e4 . E4,11 : e21 = e3 + e4 , e22 = e3 , e23 = e4 . Case 2. α = −1: – If γ = 0 then we get θ1 = δ e3 ,e3 . – If γ < 0 then φ3 θ = −γ 2 (δ e1 ,e1 − δ e3 ,e3 ). So after dividing we may assume that θ2 = δ e1 ,e1 − δ e3 ,e3 . – If γ > 0 then φ2 θ = γ 2 (δ e1 ,e1 + δ e3 ,e3 ). So after dividing we may assume that θ3 = δ e1 ,e1 + δ e3 ,e3 .  α=−1 and λ ∈ R∗ such that φθ1 = λθ2 . Then we get the Firstly, suppose that φ ∈ Aut E3,3 following equations a231 + a232 = λ, a233 = −λ, a31 a32 = a31 a33 = a32 a33 = 0,   α=−1 α=−1 . is not isomorphic to E3,3 which never have a solution in R. So E3,3 θ2 θ1  α=−1 and λ ∈ R∗ such that φθ 1 = λθ3 . Then we get the equations Next, suppose that φ ∈ Aut E3,3 a231 + a232 = λ, a233 = λ, a31 a32 = a31 a33 = a32 a33 = 0,   α=−1 α=−1 which never have a solution in R. So E3,3 is not isomorphic to E3,3 . θ1 θ3  α=−1 and λ ∈ R∗ such that φθ3 = λθ2 . Then we get (among Finally, suppose that φ ∈ Aut E3,3 others) the equations a211 + a231 + a212 + a232 = λ, a233 = −λ,   α=−1 α=−1 . Hence we get is not isomorphic to E3,3 which never have a solution in R. So E3,3 θ3 θ2 the following pairwise non-isomorphic algebras: E4,12 : e21 = e3 , e22 = −e3 , e23 = e4 . E4,13 : e21 = e3 + e4 , e22 = −e3 , e23 = −e4 . E4,14 : e21 = e3 + e4 , e22 = −e3 , e23 = e4 . 1-dimensional extension of E3,4 : • Over an algebraic closed field F: Since H (E3,4 ×E 3,4 , F) = hδ e3 ,e3 i, we get only one algebra E4,9 : e21 = e2 , e22 = e3 , e23 = e4 . • Over the real field R: Also, H (E3,4 ×E 3,4 , R) = hδ e3 ,e3 i. So, we get only one algebra E4,15 : e21 = e2 , e22 = e3 , e23 = e4 . 2-dimensional extension of E2,1 : 10 • Over an algebraic closed field F: As H (E2,1 ×E 2,1 , F) = hδ e1 ,e1 , δ e2 ,e2 i, we get only one algebra E4,10 : e21 = e3 , e22 = e4 . • Over the real field R: Also, H (E2,1 ×E 2,1 , R) = hδ e1 ,e1 , δ e2 ,e2 i and so we get only one algebra E4,16 : e21 = e3 , e22 = e4 . 2-dimensional extension of E2,2 : Here H (E2,2 × E2,2 , F) = hδ e2 ,e2 i and hence E2,2 has no 2-dimensional extension. 3-dimensional extension of E1,1 : Here H (E1,1 × E1,1 , F) = hδ e1 ,e1 i and hence E1,1 has no 3-dimensional extension. Theorem 19 Up to isomorphism there exist 10 nilpotent evolution algebras of dimension four with a natural basis B = {e1 , e2 , e3 , e4 } over an algebraic closed field F which are isomorphic to one of the following pairwise non-isomorphic nilpotent evolution algebras: • E4,1 : All products are zeros. • E4,2 : e21 = e2 . • E4,3 : e21 = e3 , e22 = e3 . • E4,4 : e21 = e2 , e22 = e3 . • E4,5 : e21 = e4 , e22 = e4 , e23 = e4 . • E4,6 : e21 = e2 , e22 = e4 , e23 = e4 . • E4,7 : e21 = e3 , e22 = e3 , e23 = e4 . • E4,8 : e21 = e3 + e4 , e22 = e3 , e23 = e4 . • E4,9 : e21 = e2 , e22 = e3 , e23 = e4 . • E4,10 : e21 = e3 , e22 = e4 . Theorem 20 Up to isomorphism there exist 16 nilpotent evolution algebras of dimension four with a natural basis B = {e1 , e2 , e3 , e4 } over R which are isomorphic to one of the following pairwise nonisomorphic nilpotent evolution algebras: • E4,1 : All products are zeros. • E4,2 : e21 = e2 . • E4,3 : e21 = e3 , e22 = e3 . • E4,4 : e21 = e3 , e22 = −e3 . • E4,5 : e21 = e2 , e22 = e3 . • E4,6 : e21 = e4 , e22 = e4 , e23 = e4 . • E4,7 : e21 = e4 , e22 = e4 , e23 = −e4 . • E4,8 : e21 = e2 , e22 = e4 , e23 = e4 . • E4,9 : e21 = e2 , e22 = e4 , e23 = −e4 . • E4,10 : e21 = e3 , e22 = e3 , e23 = e4 . • E4,11 : e21 = e3 + e4 , e22 = e3 , e23 = e4 . • E4,12 : e21 = e3 , e22 = −e3 , e23 = e4 . • E4,13 : e21 = e3 + e4 , e22 = −e3 , e23 = −e4 . • E4,14 : e21 = e3 + e4 , e22 = −e3 , e23 = e4 . • E4,15 : e21 = e2 , e22 = e3 , e23 = e4 • E4,16 : e21 = e3 , e22 = e4 . 11 References [1] J. Ancochea Bermudez, J. Fresan, J. Bentabol, Contractions of Low-Dimensional Nilpotent Jordan Algebras, Communications In Algebra. 39 (2011) 1139–1151. [2] L. Camacho, J. Gomez, B. Omirov, R. Turdibaev, Some properties of evolution algebras, Bulletin Of The Korean Mathematical Society. 50 (2013) 1481–1494. [3] J. Casas, M. Ladra, B. Omirov, U. Rozikov, On Evolution Algebras, Algebra Colloq. 21 (2014) 331–342. [4] J. Casas, M. Ladra, B. Omirov, U. Rozikov, On nilpotent index and dibaricity of evolution algebras, Linear Algebra And Its Applications. 439 (2013) 90–105. [5] A. Elduque, A. Labra, Evolution algebras and graphs, arxiv.org. (2013). [6] A. Hegazi, Classification of Nilpotent Lie Superalgebras of Dimension Five. I, International Journal Of Theoretical Physics. 38 (1999) 1735–1739. [7] G. Mazzola, Generic finite schemes and Hochschild cocycles, Commentarii Mathematici Helvetici. 55 (1980) 267–293. [8] U. Rozikov, J. Tian, Evolution algebras generated by Gibbs measures, Lobachevskii Journal Of Mathematics. 32 (2011) 270–277. [9] C. Seeley, 7-Dimensional Nilpotent Lie Algebras, Transactions Of The American Mathematical Society. 335 (1993) 479. [10] J. Tian, P. Vojtechovsky, Mathematical concepts of evolution algebras in non-Mendelian genetics, in: Quasigroups and Related Systems, 2006: pp. 111–122. [11] J. Tian, Evolution algebras and their applications, Springer, Berlin, 2008. [12] J. Tian, Y. Zou, Finitely generated nil but not nilpotent evolution algebras, J. Algebra Appl. 13 (2014) 1350070. 12
0math.AC
Regularization and the small-ball method I: sparse recovery Guillaume Lecué1,3 Shahar Mendelson2,4,5 arXiv:1601.05584v2 [math.ST] 3 Jan 2017 January 4, 2017 Abstract We obtain bounds on estimation error rates for regularization procedures of the form ! N X 1 2 (Yi − f (Xi )) + λΨ(f ) fˆ ∈ argmin N i=1 f ∈F when Ψ is a norm and F is convex. Our approach gives a common framework that may be used in the analysis of learning problems and regularization problems alike. In particular, it sheds some light on the role various notions of sparsity have in regularization and on their connection with the size of subdifferentials of Ψ in a neighbourhood of the true minimizer. As ‘proof of concept’ we extend the known estimates for the LASSO, SLOPE and trace norm regularization. 1 Introduction The focus of this article is on regularization, which is one of the most significant methods in modern statistics. To give some intuition on the method and on the reasons behind its introduction, consider the following standard problem. Let (Ω, µ) be a probability space and set X to be distributed according to µ. F is a class of real-valued functions defined on Ω and Y is the unknown random variable that one would like to approximate using functions in F . Specifically, one would like to identify the best approximation to Y in F , say in the L2 sense, and find the function f ∗ that minimizes in F the squared loss functional f → E(f (X) − Y )2 ; that is, f ∗ = argminf ∈F E(f (X) − Y )2 , with the underlying assumption that f ∗ exists and is unique. Unlike problems in approximation theory, neither the target Y nor the underlying measure µ are known. Therefore, computing the L2 distance between functions in F and Y is 1 CNRS, CREST, ENSAE, 3, avenue Pierre Larousse, 92245 MALAKOFF. France. Department of Mathematics, Technion, I.I.T., Haifa, Israel and Mathematical Sciences Institute, The Australian National University, Canberra, Australia 3 Email: [email protected] 4 Email: [email protected] 5 Supported by the Israel Science Foundation. 2 1 impossible. Instead, one is given partial information: a random sample (Xi , Yi )N i=1 , selected independently according to the joint distribution of X and Y . Because of the random nature of the sample and the limited information it provides, there is no real hope of identifying f ∗ , but rather, only of approximating it. In an estimation problem one uses the sample to produce a random function fˆ ∈ F , and the success of the choice is measured by the distance between fˆ and f ∗ in the L2 (µ) sense. Thus, one would like to ensure that with high probability with respect to the samples (Xi , Yi )N i=1 , the error rate   2 2 = E fˆ(X) − f ∗ (X) |(Xi , Yi )N fˆ − f ∗ i=1 L2 (µ) is small. More accurately, the question is to identify the way in which the error rate depends on the structure of the class F and scales with the sample size N and the required degree of confidence (probability estimate). It is not surprising (and rather straightforward to verify) that the problem becomes harder the larger F is. In contrast, if F is small, chances are that f ∗ (X) is very far from Y , and identifying it, let alone approximating it, is pointless. In situations we shall refer to as learning problems, the underlying assumption is that F is indeed small, and the issue of the approximation error – the distance between Y and f ∗ is ignored. While the analysis of learning problems is an important and well-studied topic, the assumption that F is reasonably small seems somewhat restrictive; it certainly does not eliminate the need for methods that allow one to deal with very large classes. Regularization was introduced as an alternative to the assumption on the ‘size’ of F . One may consider large classes, but combine it with the belief that f ∗ belongs to a relatively small substructure in F . The idea is to penalize a choice of a function that is far from that substructure, which forces the learner to choose a function in the ‘right part’ of F . Formally, let E be a vector space, assume that F ⊂ E is a closed and convex set and let Ψ : E → R+ be the penalty. Here, we will only consider the case in which Ψ is a norm on E. Let λ > 0 and for a sample (Xi , Yi )N i=1 , set fˆ ∈ argmin f ∈F ! N 1 X (Yi − f (Xi ))2 + λΨ(f ) ; N i=1 fˆ is called a regularization procedure, Ψ is the regularization function and λ is the regularization parameter. In the classical approach to regularization, the substructure of f ∗ is quantified directly by Ψ. The underlying belief is that Ψ(f ∗ ) is not ‘too big’ and one expects the procedure to produce fˆ for which Ψ(fˆ) is of the order of Ψ(f ∗ ). Moreover, the anticipated error rate kfˆ − f ∗ kL2 (µ) depends on Ψ(f ∗ ). In fact, an optimistic viewpoint is that regularization could perform as well as the best learning procedure in the class {f : Ψ(f ) ≤ Ψ(f ∗ )}, but without knowing Ψ(f ∗ ) beforehand. 2 Among the regularization schemes that are based on the classical approach are reproducing kernel Hilbert spaces (RKHS), in which the RKHS norm serves as the penalty. Since RKHS norms capture various notions of smoothness, in RKHS regularization one is driven towards a choice of a smooth fˆ – as smooth as f ∗ is. In more modern regularization problems the situation is very different. Even when penalizing with a norm Ψ, one no longer cares whether or not Ψ(f ∗ ) is small; rather, one knows (or at least believes) that f ∗ is sparse in some sense, and the hope is that this sparsity will be reflected in the error rate. In other words, although one uses certain norms as regularization functions – norms that seemingly have nothing to do with ‘sparsity’ – the hope is that the sparse nature of f ∗ will be exposed by the regularization procedure, while Ψ(f ∗ ) will be of little importance. The most significant example in the context of sparsity-driven regularization is the celebrated LASSO estimator [33]. Let F = { t, · : t ∈ Rd } and set t∗ to be a minimizer in Rd of the functional t → E( t, X − Y )2 . The LASSO is defined by t̂ ∈ argmin t∈Rd N 1 X N i=1 t, Xi − Yi 2  + λΨ(t) Pd for the choice Ψ(t) = ktk1 = i=1 |ti |. The remarkable property of the LASSO (see [8] and [3]) is that for a well-chosen regularization parameter λ, if t∗ is supported on at most s coordinates (and under various assumptions on X and Y to which we will return later), then with high probability, kt̂ − t∗ k22 . s log(ed) . N Thus, the error rate of the LASSO does not depend on Ψ(t∗ ) = kt∗ k1 , but rather on the degree of sparsity of t∗ , measured here by the cardinality of its support kt∗ k0 = |{i : t∗i 6= 0}|. This fact seems almost magical, because to the naked eye, the regularization function ktk1 has nothing to do with sparsity; yet ℓ1 regularization leads to a sparsity-driven error rate. A standard (yet somewhat unconvincing) explanation of this phenomenon is that the penalty ktk1 is a convexified version of ktk0 = |{i : ti 6= 0}|, though this loose connection hardly explains why kt∗ k0 has any effect on the error rate of the LASSO. A similar phenomenon occurs for other choices of Ψ, such as the SLOPE and tracenorm regularization, which will be explored in detail in what follows. In all these cases and others like them, the regularization function is a norm that does not appear to be connected to sparsity, nor to other natural notions of low-dimensional structures for that matter. Yet, and quite mysteriously, the respective regularization procedure emphasizes those very properties of t∗ . The aim of this note is to offer a framework that can be used to tackle standard learning problems (small F ) and regularized problems alike. Moreover, using the framework, one may explain how certain norms lead to the emergence of sparsity-based bounds. 3 In what follows we will show that two parameters determine the error rate of regularization problems. The first one captures the ‘complexity’ of each set in the natural hierarchy in F Fρ = {f ∈ F : Ψ(f − f ∗ ) ≤ ρ}. Applying results from [20, 22, 19], the ‘complexity’ of each Fρ turns out to be the optimal (in the minimax sense) error rate of the learning problem in that set. To be more precise, the main ingredient in obtaining a sharp error rate of a learning problem in a class H is an accurate analysis of the empirical excess squared loss functional f → PN Lf = N N 1 X 1 X ∗ (f (Xi ) − Yi )2 − (f (Xi ) − Yi )2 . N N i=1 (1.1) i=1 Since the minimizer fˆ of the functional (1.1) satisfies PN Lfˆ ≤ 0, one may obtain an estimate on the error rate by showing that with high probability, if kf −f ∗ kL2 (µ) ≥ r then PN Lf > 0. This excludes functions in the set {f ∈ H : kf − f ∗ kL2 (µ) ≥ r} as potential empirical minimizers. That ‘critical level’ turns out to be the correct (minimax) error rate of a learning problem in H. That very same parameter is of central importance in regularization problems — specifically, the ‘critical level’ r(ρ) for each one of the sets {f ∈ F : Ψ(f − f ∗ ) ≤ ρ} (see Section 2.1 for an accurate definition of r(ρ) and its role in the analysis of learning problems and regularization problems). The second parameter, which is the main ingredient in our analysis of regularization problems, measures the ‘size’ of the subdifferential of Ψ in points that are close to f ∗ : recall that the subdifferential of Ψ in f is (∂Ψ)f = {z ∗ ∈ E ∗ : Ψ(f + h) ≥ Ψ(f ) + z ∗ (h) for every h ∈ E} where E ∗ is the dual space of the normed space (E, Ψ), and that if f 6= 0, the subdifferential consists of all the norm one linear functionals z ∗ for which z ∗ (f ) = Ψ(f ). Fix ρ > 0 and let Γf ∗ (ρ) be the collection of functionals that belong to the subdifferential (∂Ψ)f for some f ∈ F that satisfies Ψ(f − f ∗ ) ≤ ρ/20. Set Hρ = {f ∈ F : Ψ(f − f ∗ ) = ρ and kf − f ∗ kL2 (µ) ≤ r(ρ)} and let ∆(ρ) = inf sup h∈Hρ z ∗ ∈Γ f ∗ (ρ) z ∗ (h − f ∗ ). / {f ∈ F : Ψ(f − f ∗ ) ≤ ρ/20} Hence, Γf ∗ (ρ) is a subset of the unit sphere of E ∗ when 0 ∈ ∗ and it is the entire unit ball of E otherwise. And, since Hρ consists of functions whose Ψ norm is ρ, it is evident that ∆(ρ) ≤ ρ. Therefore, if ∆(ρ) ≥ αρ for a fixed 0 < α ≤ 1 then Γf ∗ (ρ) is rather large: for every h ∈ Hρ there is some z ∗ ∈ Γf ∗ (ρ) for which z ∗ (h) is ‘almost extremal’—that is, at least αρ. Our main result (Theorem 3.2 below) is that if Γf ∗ (ρ) is large enough to ensure that ∆(ρ) ≥ 4ρ/5, and the regularization parameter λ is set to be of the 4 r 2 (ρ) ρ , then with high probability, the regularized minimizer in F , fˆ, satisfies that kfˆ − f ∗ kL2 (µ) ≤ r(ρ) and Ψ(fˆ − f ∗ ) ≤ ρ. order of Theorem 3.2 implies that one may analyze regularization problems by selecting ρ wisely, keeping in mind that points in a Ψ-ball of radius ∼ ρ around f ∗ must generate a sufficiently large subdifferential. And the fact that functionals in Γf ∗ (ρ) need to be ‘almost extremal’ only for points in Hρ rather than for the entire sphere is crucial; otherwise, it would have forced Γf ∗ (ρ) to be unreasonably large – close to the entire dual sphere. As will be clarified in what follow, sparsity, combined with the right choice of Ψ, contributes in two places: firstly, if f ∗ is sparse in some sense and Ψ is not smooth on sparse elements, then Γf ∗ (ρ), which contains the subdifferential (∂Ψ)f ∗ , is large; secondly, for the right choice of ρ the ‘localization’ Hρ consists of elements that are well placed: if Ψ(f − f ∗ ) = ρ and kf − f ∗ kL2 (µ) ≤ r(ρ), there is some z ∗ ∈ Γf ∗ (ρ) for which z ∗ (f − f ∗ ) is large enough. The fact that Hρ is well placed is an outcome of some compatibility between Ψ and the L2 (µ) norm. Of course, to find the right choice of ρ one must first identify r(ρ), which is, in itself, a well-studied yet nontrivial problem. Before we dive into technical details, let us formulate some outcomes of our main result. We will show how it can be used to obtain sparsity-driven error rates in three regularization procedures: the LASSO, SLOPE and trace norm regularization. In all three cases our results actually extend the known estimates in various directions. The LASSO. The LASSO is defined for the class of linear functional F = { t, · : t ∈ Rd }. For a fixed t0 ∈ Rd , the goal P is to identify t0 using linear measurements, the regularization function is Ψ(t) = ktk1 = di=1 |ti |, and the resulting regularization procedure produces N 1 X t̂ ∈ argmin N t∈Rd i=1 t, Xi − Yi 2  + λktk1 . The LASSO has been studied extensively in the last two decades. Even though some recent advances [39, 35, 27] have shown the LASSO to have its limitation, historically, it has been the benchmark estimator of high-dimensional statistics — mainly because a high dimensional parameter space does not significantly affect its performance as long as t0 is sparse. This was shown for example, in [3, 15, 36, 37, 17, 26, 34] in the context of estimation and sparse oracle inequalities, in [16, 40, 2] for support recovery results; and in various other instances as well; we refer the reader to the books [5, 8] for more results and references on the LASSO. SLOPE. In some sense, SLOPE, introduced in [4, 31], is actually an extension of the LASSO, even though it has been introduced as an extension of multiple-test procedures. Again, the underlying class is F = { t, · : t ∈ Rd }, and to define the regularization function let 5 β1 ≥ β2 ≥ ... ≥ βd > 0 and set Ψ(t) = d X βi t♯i , i=1 (t♯i )di=1 where denotes the non-increasing re-arrangement of (|ti |)di=1 . Thus, the SLOPE norm is a sorted, weighted ℓ1 -norm, and for (β1 , ..., βd ) = (1, ..., 1), SLOPE regularization coincides with the LASSO. Trace-norm regularization. Consider the trace inner-product on Rm×T . Let F = { A, · : A ∈ Rm×T } and given a target Y put A∗ to be the matrix that minimizes A → E( A, X − Y )2 . The regularization function is the trace norm. Definition 1.1 Let A be a matrix and setP(σi (A)) to be its singular values, arranged in a non-increasing order. For p ≥ 1, kAkp = ( σip (A))1/p is the p-Schatten norm. Note that the trace-norm is simply the 1-Schatten norm, the Hilbert-Schmidt norm is the 2-Schatten norm and the operator norm is the ∞-Schatten norm. The trace norm regularization procedure is N 1 X   ∈ argmin (Yi − Xi , A )2 + λkAk1 A∈Rm×T N i=1 and it was introduced for the reconstruction of low-rank, high-dimensional matrices [28, 9, 29, 6, 7, 25]. As will be explained in what follows, our main result holds in rather general situations and may be implemented in examples once the ‘critical levels’ r(ρ) are identified. Since the examples we present serve mainly as “proof of concept”, we will focus only on one scenario in which r(ρ) may be completely characterized for an arbitrary class of functions. Definition 1.2 Let ℓM 2 be an M -dimensional inner product space and let µ be a measure on ℓM . The measure µ is isotropic if for every x ∈ ℓM 2 2 , Z 2 x, t dµ(t) = kxk2ℓM ; 2 it is L-subgaussian if for every p ≥ 2 and every x ∈ ℓM 2 , √ k x, · kLp (µ) ≤ L pk x, · kL2 (µ) . Hence, the covariance structure of an isotropic measure coincides with the inner product in ℓM 2 , and if µ is an L-subgaussian measure then the Lp (µ) norm of a linear form does not grow faster than the Lp norm of the corresponding Gaussian variable. 6 Assumption 1.1 Assume that the underlying measure µ is isotropic and L-subgaussian, and that for f ∗ = t∗ , · (or f ∗ = A∗ , · in the matrix case), the noise1 ξ = f ∗ (X) − Y belongs to Lq for some q > 2. When dealing with the LASSO and SLOPE, the natural Euclidean structure is the standard one in Rd , and for trace norm regularization, the natural Euclidean structure is endowed by the trace inner product in Rm×T . Remark 1.3 In the supplementary material we study a general X without assuming it is isotropic, which means dealing with less natural Euclidean structures in the examples we present. It is also possible to go beyond the subgaussian case, we refer the reader to [13] where other moment assumptions on X are considered. The second part of Assumption 1.1, that ξ ∈ Lq for some q > 2, is rather minimal. Indeed, for the functional f → E(f (X) − Y )2 to be well defined, one must assume that f (X) − Y ∈ L2 ; the assumption here is only slightly stronger. Applying our main result we will show the following: Theorem 1.4 Consider the LASSO under Assumption 1.1. Let 0 < δ < 1. Assume that there is some v ∈ Rd supported on at most s coordinates for which r log(ed) ∗ . kt − vk1 ≤ c1 (δ)kξkLq s N p If λ = c2 (L, δ)kξkLq log(ed)/N and N ≥ s log(ed/s), then with probability at least 1 − δ the LASSO estimator with regularization parameter λ satisfies that for every 1 ≤ p ≤ 2 r log(ed) ∗ 1/p t̂ − t p ≤ c3 (L, δ)kξkLq s . N The error rate in Theorem 1.4 coincides with the standard estimate on the LASSO (cf. [3]), but in a broader context: t∗ need not be sparse but only approximated by a sparse vector; the target Y is arbitrary and the noise ξ may be heavy tailed and need not be independent of X. Turning to SLOPE, let us recall the estimates from [31], where the setup is somewhat restricted: Let X be a Gaussian vector on Rd , set W to be a Gaussian random variable with variance σ 2 that is independent of X and put Y = t∗ , X + W . Consider some q ∈ (0, 1), let Φ−1 (α) be the α-th quantile of the standard normal distribution and put βi = Φ−1 (1 − iq/(2d)). 1 In what follows we will refer to ξ as ‘the noise’ even though it depends in general on Y and X. The reason for using that term comes from the situation in which Y = f ∗ (X) − W for a symmetric random variable W that is independent of X (independent additive noise); thus ξ = W . We have opted to call ξ ‘the noise’ because its role in the general case and its impact on the error rate is rather similar to what happens for independent noise. 7 Theorem 1.5 [31] Let 1 ≤ s ≤ d satisfy that s/d √ = o(1) and (s log d)/N = o(1) when N → ∞. If 0 < ε < 1, N → ∞ and λ = 2σ/ N , the SLOPE estimator with weights (βi )di=1 and regularization parameter λ satisfies   N t̂ − t∗ 2 2 > 1 + 3ε → 0. sup P r 2σ 2 s log(d/s) kt∗ k0 ≤s Note that Theorem 1.5 is asymptotic in nature and not ‘high-dimensional’. Moreover, it only holds for a Gaussian X, independent Gaussian noise W , a specific choice of weights (βi )di=1 and t∗ that is s-sparse. We consider a more general situation. Let βi ≤ C p log(ed/i) and set Ψ(t) = ♯ i=1 βi ti . Pd Theorem 1.6 There exists constants c1 , c2 and c3 that depend only on L, δ and C for which the following holds. Under Assumption 1.1, if there is v ∈ Rd that satisfies |supp(v)| ≤ s and  ed  s ∗ √ , Ψ(t − v) ≤ c1 kξkLq log s N √ then for N ≥ c2 s log(ed/s) and with the choice of λ = c2 kξkLq / N , one has  ed   ed  s s 2 and t̂ − t∗ 2 ≤ c3 kξk2Lq log Ψ(t̂ − t∗ ) ≤ c3 kξkLq √ log s N s N with probability at least 1 − δ. Finally, let us consider trace norm regularization. Theorem 1.7 Under Assumption 1.1 and if there is V ∈ Rm×T that satisfies that rank(V ) ≤ s and r max{m, T } kA∗ − V k1 ≤ c1 kξkLq s , N q } . Then with one has the following. Let N ≥ c2 s max{m, T } and λ = c3 kξkLq max{m,T N probability at least 1 − δ, for any 1 ≤ p ≤ 2 r max{m, T } .  − A∗ ≤ c4 kξkLq s1/p N p The constants c1 , c2 , c3 and c4 depends only on L and δ. A result of a similar flavour to Theorem 1.7 is Theorem 9.2 from [8]. Theorem 1.8 Let X be an isotropic and L-subgaussian vector, and W that is mean-zero, independent of X and belongs to the Orlicz space Lψα for some α ≥ 1. If Y = A∗ , X + W and ) ( r  kξk  √m(t + log N )(t + log m) m(t + log m) ψα 1/α , , kξkψα log λ ≥ c1 (L) max kξk2 N kξkL2 N then with probability at least 1 − 3 exp(−t) − exp(−c2 (L)N ) 2   − A∗ ≤ c3 min λ kA∗ k1 , λ2 rank(A∗ ) . 2 8 (1.2) Clearly, the assumptions of Theorem 1.8 are more restrictive than those of Theorem 1.7, as the latter holds for a heavy tailed ξ that need not be independent of X, and for A∗ that can be approximated by a low-rank matrix. Moreover, if kA∗ k1 is relatively large and the error rate in Theorem 1.8 is the sparsity-dominated λ2 rank(A∗ ), then the error rate in Theorem 1.7 is better by a logarithmic factor. The proofs of the error rates in all the three examples will be presented in Section 5. 1.1 Notation We end the introduction with some standard notation. Throughout, absolute constants are denoted by c, c1 ..., etc. Their value may change from line to line. When a constant depends on a parameter α it will be denoted by c(α). A . B means that A ≤ cB for an absolute constant c, and the analogous two-sided inequality is denoted by A ∼ B. In a similar fashion, A .α B implies that A ≤ c(α)B, etc. Let E ⊂ L2 (µ) be a vector space and set Ψ to be a norm on E. For a set A ⊂ E, t ∈ E and r > 0, let rA + t = {ra + t : a ∈ A}. Denote by BΨ = {w ∈ E : Ψ(w) ≤ 1} the unit ball of (E, Ψ) and set SΨ = {f ∈ E : Ψ(f ) = 1} to be the corresponding unit sphere. BΨ (ρ, f ) is the ball of radius ρ centred in f and SΨ (ρ, f ) is the corresponding sphere. Also, set D to be the unit ball in L2 (µ), S is the unit sphere there, and D(ρ, f ) and S(ρ, f ) are the ball and sphere centred in f and of radius ρ, respectively. A class of spaces we will be interested in consists of ℓdp , that is, Rd endowed with the ℓp norm; Bpd denotes the unit ball in ℓdp and S(ℓdp ) is the unit sphere. For every x = (xi )di=1 , (x♯i )di=1 denotes the non-increasing rearrangement of (|xi |)di=1 . 1 PN Finally, if (Xi , Yi )N i=1 is a sample, PN h = N i=1 h(Xi , Yi ) is the empirical mean of h. 2 Preliminaries: The regularized functional Let F ⊂ E be a closed and convex class of functions. Recall that for target Y , f ∗ is the minimizer in F of the functional f → E(f (X) − Y )2 . Since F is closed and convex, the minimum exists and is unique. Let Lf (X, Y ) = (f (X) − Y )2 − (f ∗ (X) − Y )2 be the excess squared loss functional and for λ > 0 let Lλf (X, Y ) = Lf + λ(Ψ(f ) − Ψ(f ∗ )) be its regularized counterpart. Thus, for a random sample (Xi , Yi )N i=1 , the empirical (regularized) excess loss functional is PN Lλf N 1 X = Lf (Xi , Yi ) + λ(Ψ(f ) − Ψ(f ∗ )), N i=1 Note that if ℓf (x, y) = (y − f (x))2 and fˆ minimizes PN ℓf + λΨ(f ) then fˆ also minimizes PN Lλf . Moreover, since Lλf∗ = 0, it is evident that PN Lλˆ ≤ 0. f 9 This simple observation shows that the random set {f ∈ F : PN Lλf > 0} may be excluded from our considerations, as it does not contain potential minimizers. Therefore, if one can show that with high probability, {f ∈ F : PN Lλf ≤ 0} ⊂ {f ∈ F : kf − f ∗ kL2 (µ) ≤ r}, then on that event, kfˆ − f ∗ kL2 (µ) ≤ r. We will identify when PN Lλf > 0 by considering the two parts of the empirical functional: the empirical excess loss PN Lf and the regularized part λ(Ψ(f ) − Ψ(f ∗ )). Because of its crucial role in obtaining error estimates in learning problems, the functional f → PN Lf has been studied extensively using the small-ball method, (see, e.g., [20, 22, 19]). Thus, the first component in the machinery we require for explaining both learning problems and regularization problems is well understood and ready-to-use; its details are outlined below. 2.1 The natural decomposition of PN Lf Set ξ = ξ(X, Y ) = f ∗ (X) − Y and observe that Lf (X, Y ) =(f − f ∗ )2 (X) + 2(f − f ∗ )(X) · (f ∗ (X) − Y ) =(f − f ∗ )2 (X) + 2ξ(f − f ∗ )(X). Since F is convex, the characterization of the nearest point map in a Hilbert space shows that E(f − f ∗ )(X) · (f ∗ (X) − Y ) ≥ 0 for every f ∈ F . Hence, setting ξi = f ∗ (Xi ) − Yi , one has PN Lλf N N 1 X  1 X ∗ 2 ≥ (f − f ) (Xi ) + 2 ξi (f − f ∗ )(Xi ) − Eξ(f − f ∗ )(X) N N i=1 i=1 ∗ +λ(Ψ(f ) − Ψ(f )). To simplify notation, for w ∈ L2 (µ) set Qw = w2 and Mw = ξw − Eξw. Thus, for every f ∈ F, (2.1) PN Lλf ≥ PN Qf −f ∗ + 2PN Mf −f ∗ + λ(Ψ(f ) − Ψ(f ∗ )). The decomposition of the empirical excess loss to the quadratic component (Qf −f ∗ ) and the multiplier one (Mf −f ∗ ) is the first step in applying the small-ball method to learning problems. One may show that on a large event, if kf − f ∗ kL2 (µ) is larger than some critical level then PN Qf −f ∗ ≥ θkf − f ∗ k2L2 and dominates PN Mf −f ∗ ; hence PN Lf > 0. To identify this critical level, let us define the following parameters: Definition 2.1 Let H ⊂ F be a convex class that contains f ∗ . Let (εi )N i=1 be independent, symmetric, {−1, 1}-valued random variables that are independent of (Xi , Yi )N i=1 . 10 For γQ , γM > 0 set rQ (H, γQ ) = inf ( r>0:E sup h∈H∩D(r,f ∗ ) let φN (H, s) = and put sup h∈H∩D(s,f ∗ ) N 1 X εi (h − f ∗ )(Xi ) ≤ γQ r N i=1 ) , N 1 X √ εi ξi (h − f ∗ )(Xi ) , N i=1 o n  √  rM (H, γM , δ) = inf s > 0 : P r φN (H, s) ≤ γM s2 N ≥ 1 − δ . The main outcome of the small-ball method is that for the right choices of γM and γQ , r = max{rM , rQ } is the above-mentioned ‘critical level’ in H, once H satisfies a weak small-ball condition. Assumption 2.1 (The small ball condition) Assume that there are constants κ > 0 and 0 < ε ≤ 1, for which, for every f, h ∈ F ∪ {0},  P r |f − h| ≥ κkf − hkL2 (µ) ≥ ε. There are numerous examples in which the small-ball condition may be verified for κ and ε that are absolute constants. We refer the reader to [12, 19, 10, 21, 22, 30] for some of them. Theorem 2.2 ([22]) Let H be a closed, convex class of functions that contains f ∗ and satisfies Assumption 2.1 with constants κ and ε. If θ = κ2 ε/16 then for every 0 < δ < 1, with probability at least 1 − δ − 2 exp(−N ε2 /2) one has: • for every f ∈ H, |PN Mf −f ∗ | ≤ n o θ 2 max kf − f ∗ k2L2 (µ) , rM (H, θ/10, δ/4) , 8 • If f ∈ H and kf − f ∗ kL2 (µ) ≥ rQ (H, κε/32) then PN Qf −f ∗ ≥ θkf − f ∗ k2L2 (µ) . In particular, with probability at least 1 − δ − 2 exp(−N ε2 /2), θ PN Lf ≥ kf − f ∗ k2L2 (µ) 2 for every f ∈ H that satisfies kf − f ∗ kL2 (µ) ≥ max {rM (H, θ/10, δ/4) , rQ (H, κε/32)} . From now on, we will assume that F satisfies the small-ball condition with constants κ and ε, and that θ = κ2 ε/16. 11 Definition 2.3 Let ρ > 0 and set rM (ρ) = rM F ∩ BΨ (ρ, f ∗ ), θ δ , 10 4 and rQ (ρ) = rQ F ∩ BΨ (ρ, f ∗ ), κε  . 32 In what follows we will abuse notation and omit the dependence of rM and rQ on f ∗ , κ, ε and δ. Let r(·) be a function that satisfies r(ρ) ≥ supf ∗ ∈F max{rQ (ρ), rM (ρ)}. Finally, put O(ρ) = sup f ∈F ∩BΨ (ρ,f ∗ )∩D(r(ρ),f ∗ ) PN Mf −f ∗ . Theorem 2.2 implies the following: Corollary 2.4 ([22]) Using the notation introduced above, on an event of probability at least 1 − δ − 2 exp(−N ε2 /2), if f ∈ F ∩ BΨ (ρ, f ∗ ) and kf − f ∗ kL2 (µ) ≥ r(ρ) then θ PN Lf ≥ kf − f ∗ k2L2 (µ) . 2 Moreover, on the same event, O(ρ) ≤ θ 2 r (ρ). 8 Remark 2.5 Let us stress once again that r(ρ) plays a central role in the analysis of empirical risk minimization in the set F ∩ BΨ (ρ, f ∗ ). Theorem 2.2 implies that with high probability, the empirical risk minimizer h̃ in F ∩ BΨ (ρ, f ∗ ) satisfies kh̃ − h∗ kL2 (µ) ≤ r(ρ). Moreover, it follows from [11] and [23] that under mild structural assumptions on F , r(ρ) is the best possible error rate of any learning procedure in F ∩ BΨ (ρ, f ∗ ) – i.e., the minimax rate in that class. Let A be the event from Corollary 2.4 and set γO (ρ) = sup O(ρ). w∈A γO will be of little importance in what follows, because it may be upper bounded by (θ/8)r 2 (ρ). However, it will be of the utmost importance in [13], where complexity-based regularization is studied (see Section 6 for more details). 3 The main result Let us turn to the second part of the regularized functional – namely, λ(Ψ(f ) − Ψ(f ∗)). Let E ∗ be the dual space to (E, Ψ) and set Ψ∗ to be the dual norm. BΨ∗ and SΨ∗ denote the dual unit ball and unit sphere, respectively; i.e., BΨ∗ consists of all the linear functionals z ∗ on E for which supΨ(x)=1 |z ∗ (x)| ≤ 1. 12 Definition 3.1 The functional z ∗ ∈ SΨ∗ is a norming functional for z ∈ E if z ∗ (z) = Ψ(z). In the language of Convex Analysis, a functional is norming for x if and only if it belongs to (∂Ψ)x , the subdifferential of Ψ in x. Let Γf ∗ (ρ) be the collection of functionals that are norming for some f ∈ BΨ (ρ/20, f ∗ ). In particular, Γf ∗ (ρ) contains all the norming functionals of f ∗ . Set ∆(ρ) = inf sup z ∗ (h − f ∗ ), h∈H z ∗ ∈Γ ∗ (ρ) f where the infimum is taken in the set H = F ∩ SΨ (ρ, f ∗ ) ∩ D(r(ρ), f ∗ ) = {h ∈ F : Ψ(h − f ∗ ) = ρ and kh − f ∗ kL2 (µ) ≤ r(ρ)}. Note that if z ∗ ∈ Γf ∗ (ρ) and h ∈ SΨ (ρ, f ∗ ) then |z ∗ (h − f ∗ )| ≤ Ψ(h − f ∗ ) = ρ. Thus, a lower bound of the form ∆(ρ) ≥ (1 − δ)ρ implies that Γf ∗ (ρ) is a relatively large subset of the dual unit sphere: each point in F ∩ SΨ (ρ, f ∗ ) ∩ D(r(ρ), f ∗ ) has an ‘almost norming’ functional in Γf ∗ (ρ). Our main result is that if Γf ∗ (ρ) is indeed large enough to ensure that ∆(ρ) ≥ 4/5ρ then with high probability kfˆ − f ∗ kL2 (µ) ≤ r(ρ) and Ψ(fˆ − f ∗ ) ≤ ρ. Theorem 3.2 Assume that F is closed and convex. Let ρ > 0 and set A to be an event on which Corollary 2.4 holds. If ∆(ρ) ≥ 4ρ/5 and 3 γO (ρ) θ r 2 (ρ) ≤λ< · , ρ 2 ρ then on the event A, a regularized empirical minimizer fˆ ∈ argminf ∈F PN Lλf satisfies Ψ(fˆ − f ∗ ) ≤ ρ and kfˆ − f ∗ kL2 (µ) ≤ r(ρ). Moreover, since rO (ρ) ≤ (θ/8)r 2 (ρ), the same assertion holds if θ r 2 (ρ) 3θ r 2 (ρ) · ≤λ< · . 8 ρ 2 ρ The proof of the theorem follows in three steps: first, one has to show that PN Lλf is positive on the set F ∩ SΨ (ρ, f ∗ ). Second, thanks to certain homogeneity properties of the functional, it is positive in F \BΨ (ρ, f ∗ ), because it is positive on the ‘sphere’ F ∩ SΨ (ρ, f ∗ ). Finally, one has to study the functional in F ∩ BΨ (ρ, f ∗ ) and verify that it is positive in that set, provided that kf − f ∗ kL2 (µ) ≥ r(ρ). Proof. Fix h ∈ F ∩ SΨ (ρ, f ∗ ) and we shall treat two different cases: when kh − f ∗ kL2 (µ) ≥ r(ρ) and when kh − f ∗ kL2 (µ) ≤ r(ρ). If kh − f ∗ kL2 ≥ r(ρ), then by the triangle inequality for Ψ, Ψ(h) − Ψ(f ∗ ) = Ψ(h − f ∗ + f ∗ ) − Ψ(f ∗ ) ≥ −Ψ(h − f ∗ ). 13 D(r(ρ), f ∗ ) f∗ SΨ (ρ, f ∗ ) h f Hence, for (Xi , Yi )N i=1 ∈ A and by the upper estimate in the choice of λ, θ θ PN Lλh ≥ kh − f ∗ k2L2 (µ) − λΨ(h − f ∗ ) ≥ r 2 (ρ) − λρ > 0. 2 2 (3.1) Next, if kh − f ∗ kL2 (µ) ≤ r(ρ) then PN Lλh ≥ −2O(ρ) + λ(Ψ(h) − Ψ(f ∗ )). Consider u, v ∈ E that satisfy f ∗ = u + v and Ψ(u) ≤ ρ/20. Let z ∗ be any norming functional of v; thus, z ∗ ∈ SΨ∗ and z ∗ (v) = Ψ(v). Since Ψ(h) = supx∗ ∈BΨ∗ x∗ (h) it follows that Ψ(h) − Ψ(f ∗ ) ≥Ψ(h) − Ψ(v) − Ψ(u) ≥ z ∗ (h − v) − Ψ(u) ≥ z ∗ (h − f ∗ ) − 2Ψ(u). This holds for any v ∈ BΨ (ρ/20, f ∗ ), and by the definition of ∆(ρ) and for an optimal choice of z ∗ , PN Lλh ≥ −2O(ρ) + λ(z ∗ (h − f ∗ ) − 2Ψ(u)) ≥ −2O(ρ) + λ(∆(ρ) − ρ/10) > 0, (3.2) where the last inequality holds because ∆(ρ) ≥ 4ρ/5 and λ ≥ 3γO (ρ)/ρ. Also, since γO (ρ) ≤ (θ/8)r 2 (ρ), it suffices that λ ≥ (3θ/8)r 2 (ρ)/ρ to ensure that PN Lλh > 0 in (3.2). This completes the proof of the first step – that PN Lλh > 0 on F ∩ SΨ (ρ, f ∗ ). Turning to the second step, one has to establish a similar inequality for functions outside BΨ (ρ, f ∗ ). To that end, let f ∈ F \BΨ (ρ, f ∗ ). Since F is convex and Ψ is homogeneous, f = f ∗ + α(h − f ∗ ) for some h ∈ F ∩ SΨ (ρ, f ∗ ) and α > 1. Therefore, PN Qf −f ∗ = α2 PN Qh−f ∗ and PN Mf −f ∗ = αPN Mh−f ∗ ; moreover, Ψ(f − f ∗ ) = αΨ(h − f ∗ ) and for every functional z ∗ , z ∗ (f − f ∗ ) = αz ∗ (h − f ∗ ). Thus, by (3.1), when kh − f ∗ kL2 (µ) ≥ r(ρ), PN Lλf > 0, and when kh − f ∗ kL2 (µ) ≤ r(ρ), PN Lλf ≥ α2 PN Qh−f ∗ + 2αPN Mh−f ∗ + λ(αz ∗ (h − f ∗ ) − 2Ψ(u))  ≥ α PN Qh−f ∗ + 2PN Mh−f ∗ + λ(z ∗ (h − f ∗ ) − 2Ψ(u)) > 0. Finally, when h ∈ F ∩ BΨ (ρ, f ∗ ) and kh − f ∗ kL2 (µ) ≥ r(ρ), (3.1) shows that PN Lλf > 0. 14 Remark 3.3 Note that if ρ ≥ Ψ(f ∗ ) there is no upper limitation on the choice of λ. Indeed, if kh − f ∗ kL2 (µ) ≥ r(ρ) and Ψ(h) = ρ ≥ Ψ(f ∗ ) then λ(Ψ(h) − Ψ(f ∗ )) ≥ 0, and PN Lλh > 0 just as in (3.1). The rest of the proof remains unchanged. It follows from the proof that the quadratic component PN Qf −f ∗ and the regularization one λ(Ψ(f ) − Ψ(f ∗ )) dominate the multiplier component 2PN Mf −f ∗ in different parts of F . The behaviour of PN Qf −f ∗ allows one to exclude the set (F ∩ Bψ (ρ, f ∗ ))\D(r(ρ), f ∗ ), as well as any point in F for which the interval [f, f ∗ ] intersects (F ∩ Sψ (ρ, f ∗ ))\D(r(ρ), f ∗ ). This exclusion is rather free-of-charge, as it holds with no assumptions on the norm Ψ. The situation is more subtle when trying to exclude points for which the interval [f, f ∗ ] intersects F ∩ Sψ (ρ, f ∗ ) ∩ D(r(ρ), f ∗ ). That is precisely the region in which the specific choice of Ψ is important and the regularization component is the reason why PN Lλf > 0. Figure 1 shows this idea: PN Lλf > 0 for two different reasons: either Q > M – the quadratic component dominates the multiplier component, or R > M – the regularization component dominates the multiplier component. Note that an output of the sparsity equation is that the descent cone TΨ (f ∗ ) = ∪τ >0 {h : Ψ(f ∗ +τ h) ≤ Ψ(f ∗ )} does not intersect SΨ (ρ, f ∗ )∩D(r(ρ), f ∗ ) when the “sparsity condition” ∆(ρ) ≥ 4ρ/5 is satisfied (cf. Figure 2). Q>M R>M TΨ (f ∗ ) SΨ (ρ, f ∗ ) R>M D(r(ρ), f ∗ ) Q>M Q>M f∗ R>M f∗ R>M Q>M Figure 1: The “Q > M and R > M ” decomposition. 4 Figure 2: TΨ (f ∗ ) ∩ SΨ (ρ, f ∗ ) ∩ D(r(ρ), f ∗ ) = ∅. The role of ∆(ρ) It is clear that ∆(ρ) plays a crucial role in the proof of Theorem 3.2, and that the larger Γf ∗ (ρ) is, the better the lower bound on ∆(ρ). Having many norming functionals of points in BΨ (ρ/20, f ∗ ) can be achieved somewhat artificially, by taking ρ ∼ Ψ(f ∗ ). If ρ is large enough, BΨ (ρ/20, f ∗ ) contains a Ψ-ball centred 15 in 0. Therefore, Γf ∗ (ρ) is the entire dual sphere and ∆(ρ) = ρ. This is the situation when one attempts to derive complexity-based bounds (see Section 6 and [13]), i.e., when one wishes to find fˆ that inherits some of f ∗ ’s ‘good qualities’ that are captured by Ψ(f ∗ ). Here, we are interested in cases in which ρ may be significantly smaller than Ψ(f ∗ ) and enough norming functionals have to be generated by other means. If Ψ is smooth, each f 6= 0 has a unique norming functional, and for a small ρ, the norming functionals of points in BΨ (ρ/20, f ∗ ) are close to the (unique) norming functional of f ∗ ; hence there is little hope that Γf ∗ (ρ) will be large enough to ensure that ∆(ρ) ∼ ρ. It is therefore reasonable to choose Ψ that is not smooth in f ∗ or in a neighbourhood of f ∗ . Another important fact is that Γf ∗ (ρ) need not be as large as the entire dual sphere to ensure that ∆(ρ) ∼ ρ. Indeed, it suffices if Γf ∗ (ρ) contains ‘almost norming’ functionals only to points that satisfy kwkL2 (µ) ≤ r(ρ)/ρ and Ψ(w) = 1, rather than to every point in the sphere SΨ . 4.1 ∆(ρ) and sparsity It turns out that the combination of the right notion of sparsity with a wise choice of a norm Ψ ensures that Γf ∗ (ρ) contains enough ‘almost norming’ functionals precisely for the subset of the sphere one is interested in. To give an indication of how this happens, let us show the following: Lemma 4.1 Let Z ⊂ SΨ∗ , W ⊂ SΨ and 0 < η1 , η2 < 1. If every w ∈ W can be written as w = w1 + w2 , where Ψ(w1 ) ≤ η1 Ψ(w) and supz ∗ ∈Z z ∗ (w2 ) ≥ (1 − η2 )Ψ(w2 ), then inf sup z ∗ (w) ≥ (1 − η1 )(1 − η2 ) − η1 w∈W z ∗ ∈Z In particular, if η1 , η2 ≤ 1/20 then inf w∈W supz ∗ ∈Z z ∗ (w) ≥ 4/5. Proof. Let w = w1 + w2 and observe that Ψ(w2 ) ≥ Ψ(w) − Ψ(w1 ) ≥ (1 − η1 )Ψ(w). Thus, for the optimal choice of z ∗ ∈ Z, z ∗ (w1 + w2 ) ≥(1 − η2 )Ψ(w2 ) + z ∗ (w1 ) ≥ (1 − η2 )Ψ(w2 ) − η1 Ψ(w).  ≥ (1 − η1 )(1 − η2 ) − η1 Ψ(w), and the claim follows because w ∈ SΨ . Let E = Rd viewed as a class of linear functionals on Rd . Set µ to be an isotropic 2 measure on Rd ; thus {t ∈ Rd : E t, X ≤ 1} = B2d . Assume that for t ∈ Rd that is supported on I ⊂ {1, ..., d}, the set of its norming functionals consists of functionals of the form z0∗ + (1 − η2 )u∗ for some fixed z0∗ that is supported on I and any u ∈ BΨ∗ that is supported on I c (such is the case, for example, when E = ℓd1 ). For every such t, consider w ∈ ρSΨ and set w1 = PI w and w2 = PI c w, the coordinate projections of w onto span(ei )i∈I and span(ei )i∈I c , respectively. Hence, there is a functional z ∗ = z0∗ + (1 − η2 )u∗ that is norming for t and also satisfies z ∗ (w2 ) = (1 − η2 )u∗ (w2 ) = (1 − η2 )Ψ(w2 ). 16 Therefore, Lemma 4.1 may be applied once Ψ(PI w) ≤ η1 Ψ(w). Naturally, such a shrinking phenomenon need not be true for every w ∈ SΨ ; fortunately, it is only required for w ∈ SΨ ∩ (r(ρ)/ρ)D – and we will show that it is indeed the case in the three examples we present. In all three, the combination of sparsity and the right choice of the norm helps in establishing a lower bound on ∆(ρ) in two ways: firstly, the set Γt∗ (ρ) consists of functionals that are ‘almost norming’ for any x whose support is disjoint from the support of t∗ ; and secondly, a coordinate projection ‘shrinks’ the Ψ norm of points in ρSΨ ∩ r(ρ)D. 4.2 ∆(ρ) in the three examples Let us show that in the three examples, the LASSO, SLOPE and trace norm regularization, ∆(ρ) ≥ (4/5)ρ for the right choice of ρ, and that choice depends on the degree of sparsity in each case. In all three examples, we will assume that the underlying measure is isotropic; thus the L2 (µ) norm coincides with the natural Euclidean structure: the ℓd2 norm for the LASSO and SLOPE, and the Hilbert-Schmidt norm for trace-norm regularization. The LASSO. Observe that if f ∗ = t∗ , · is the true minimizer of the functional t, · → E( t, X −Y )2 in F = { t, · : t ∈ Rd }, then any function ht = t, · for which kht − f ∗ kL2 ≤ r(ρ) and Ψ(ht − f ∗ ) = ρ is of the form ht = t, · = w + t∗ , · , where w ∈ ρS(ℓd1 ) ∩ r(ρ)B2d . Recall that the dual norm to k · k1 is k · k∞ , and thus ∆(ρ) = sup inf w∈ρS(ℓd1 )∩r(ρ)B2d z∈Γt∗ (ρ) z, w , where Γt∗ (ρ) is the set of all vectors z ∗ ∈ Rd that satisfy kz ∗ k∞ = 1 and z ∗ (v) = kvk1 for some v for which kv − t∗ k1 ≤ ρ/20. Lemma 4.2 If t∗ = v+u for u ∈ (ρ/20)B1d and 100|supp(v)| ≤ (ρ/r(ρ))2 then ∆(ρ) ≥ 4ρ/5. In other words, if t∗ is well approximated with respect to the ℓd1 norm by some v ∈ Rd that is s-sparse, and s is small enough relative to the ratio (ρ/r(ρ))2 , then ∆(ρ) ≥ (4/5)ρ. Just as noted earlier, we shall use two key properties of the ℓ1 norm and sparse vectors: firstly, that if x and y have disjoint supports, there is a functional that is simultaneously d for which norming for x and y, i.e., z ∗ ∈ B∞ z ∗ (x) = kxk1 and z ∗ (y) = kyk1 ; (4.1) secondly, that if kxk1 = ρ and kxk2 is significantly smaller than ρ, a coordinate projection ‘shrinks’ the ℓd1 norm: kPI xk1 is much smaller than kxk1 . Proof. Let w ∈ ρS(ℓd1 ) ∩ r(ρ)B2d . Since kt∗ − vk1 ≤ ρ/20 there exists z ∗ ∈ Γt∗ (ρ) that is norming for v. Moreover, if I = supp(v), then according to (4.1) one can choose z ∗ that is also norming for PI c w. Thus, kPI c wk1 = z ∗ (PI c w) and z ∗ (w) = z ∗ (PI w) + z ∗ (PI c w) ≥ kPI c wk1 − kPI wk1 ≥ kwk1 − 2 kPI wk1 . 17 √ √ s kPI wk2 ≤ sr(ρ). Therefore, √ z, w ≥ ρ − 2 sr(ρ) ≥ 4ρ/5 Since kwk2 ≤ r(ρ), one has kPI wk1 ≤ when 100s ≤ (ρ/r(ρ))2 . SLOPE. P Let β1 ≥ β2 ≥ ... ≥ βd > 0 and recall that Ψ(t) = di=1 βi t∗i . Note that Ψ(t) = supz∈Z z, t , for Z= ( d X εi βπi ei : (εi )di=1 i=1 ) d ∈ {−1, 1} , π is a permulation of {1, ..., d} . P Therefore, the extreme points of the dual unit ball are of the form di=1 εi βπi ei . Following the argument outlined above, let us show that if x is supported on a reasonably small I ⊂ {1, ..., d}, the set of norming functionals of x consists of ‘almost norming’ functionals for any y that is supported on I c . Moreover, and just like the ℓd1 norm, if Ψ(x) = ρ and kxk2 is significantly smaller than ρ, a coordinate projection of x ‘shrinks’ its Ψ norm. √ P Lemma 4.3 Let 1 ≤ s ≤ d and set Bs = i≤s βi / i. If t∗ is ρ/20 approximated (relative to Ψ) by an s-sparse vector and if 40Bs ≤ ρ/r(ρ) then ∆(ρ) ≥ 4ρ/5. Proof. Let t∗ = u + v, for v that is supported on at most s coordinates and u ∈ (ρ/20)BΨ . Set I ⊂ {1, ..., d} to be the support of v and let z = (zi )di=1 be a norming functional for v to be specified later; thus, z ∈ Γt∗ (ρ). Given t for which Ψ(t − t∗ ) = ρ and kt − t∗ k2 ≤ r(ρ), one has z(t − t∗ ) = z(t − v) − z(u) = z(PI c (t − v)) + z(PI (t − v)) − z(u) X X ≥ zi (t − v)i + zi (t − v)i − Ψ(u) ≥ = i∈I c i∈I X X i∈I c X i∈I c zi (t − v)i − zi (t − v)i − i≤s X i≤s βi (t − v − u)♯i − 2Ψ(u) βi (t − t∗ )♯i − 2Ψ(u) = (∗). Since v is supported in I, one may optimize the choice of z by selecting the right permutation of the coordinates in I c , and X X X zi (t − v)i ≥ βi (t − v)♯i ≥ βi (t − v − u)♯i − Ψ(u) i∈I c = d X i=1 i>s βi (t − t∗ )♯i − X i≤s i>s βi (t − t∗ )♯i − Ψ(u). 18 Therefore, (∗) ≥ d X i=1 βi (t − t∗ )♯i − 2 X i≤s βi (t − t∗ )♯i − 3Ψ(u) ≥ X 17 ρ−2 βi (t − t∗ )♯i . 20 i≤s √ Since kt − t∗ k2 ≤ r(ρ), it is evident that (t − t∗ )♯i ≤ r(ρ)/ i, and s X i=1 βi (t − t∗ )♯i s X β √i = r(ρ)Bs . ≤ r(ρ) i i=1 Hence, if ρ ≥ 40r(ρ)Bs then ∆(ρ) ≥ 4ρ/5. Trace-norm regularization. The trace norm has similar properties to the ℓ1 norm. Firstly, one may show that the dual norm to k · k1 is k · k∞ , which is simply the standard operator norm. Moreover, one may find a functional that is simultaneously norming for any two elements with ‘disjoint support’ (and of course, the meaning of ‘disjoint support’ has to be interpreted correctly here). Finally, it satisfies a ‘shrinking’ phenomenon for matrices whose Hilbert-Schmidt norm is significantly smaller than their trace norm. Lemma 4.4 If A∗ = V + U , where kU k1 ≤ ρ/20 and 400rank(V ) ≤ (ρ/r(ρ))2 , then ∆(ρ) ≥ 4ρ/5. The fact that a low-rank matrix has many norming functionals is well known and follows, for example, from [38]. Lemma 4.5 Let V ∈ Rm×T and assume that V = PI V PJ for appropriate orthogonal projections onto subspaces I ⊂ Rm and J ⊂ RT . Then, for every W ∈ Rm×T there is a matrix Z that satisfies kZk∞ = 1, and Z, V = kV k1 , Z, PI ⊥ W PJ ⊥ = kPI ⊥ W PJ ⊥ k1 , Z, PI W PJ ⊥ = 0 and Z, PI ⊥ W PJ = 0. Lemma 4.5 describes a similar phenomenon to the situation in ℓd1 , but with a different notion of ‘disjoint support’: if V is low-rank and the projections PI and PJ are non-trivial, one may find a functional that is norming both for V and for the part of W that is ‘disjoint’ of V . Moreover, the functional vanishes on the ‘mixed’ parts PI W PJ ⊥ and PI ⊥ W PJ . Proof of Lemma 4.4. Recall that S1 is the unit sphere of the trace norm and that B2 is the unit ball of the Hilbert-Schmidt norm. Hence, ∆(ρ) = inf sup W ∈ρS1 ∩r(ρ)B2 Z∈ΓA∗ (ρ) Z, W where ΓA∗ (ρ) is the set of all matrices Z ∈ Rm×T that satisfy kZk∞ = 1 and Z, V for some V for which kA∗ − V k1 ≤ ρ/20. 19 =1 Fix a rank-s matrix V = PI V PJ , for orthogonal projections PI and PJ that are onto subspaces of dimension s. Consider W ∈ Rm×T for which kW k1 = ρ and kW k2 ≤ r(ρ) and put Z to be a norming functional of V as in Lemma 4.5. Thus, Z ∈ ΓA∗ (ρ) and Z, W = Z, PI ⊥ W PJ ⊥ + Z, PI W PJ = kPI ⊥ W PJ ⊥ k1 − kPI W PJ k1 ≥kW k1 − kPI W PJ ⊥ k1 − kPI ⊥ W PJ k1 − 2kPI W PJ k1 . All that remains is to estimate the trace norms of the three components that are believed to be ‘low-dimension’ - in the sense that their rank is at most s. Recall that (σi (A)) are the singular values of A arranged in a non-increasing order. It is straightforward to verify (e.g., using the characterization of the singular values via low-dimensional approximation), that σi (PI W PJ ⊥ ), σi (PI ⊥ W PJ ), σi (PI W PJ ) ≤ σi (W ). Moreover, kW k2 ≤ r(ρ), therefore, being rank-s operators, one has kPI W PJ ⊥ k1 , kPI ⊥ W PJ k1 , kPI W PJ k1 ≤ implying that s X i=1 s 1/2 √ √ X σi (W ) ≤ s σi2 (W ) ≤ sr(ρ), i=1 √ Z, W ≥ ρ − 4r(ρ) s. Therefore, if 400s ≤ (ρ/r(ρ))2 , then ∆(ρ) ≥ 4ρ/5. 5 The three examples revisited The estimates on ∆(ρ) presented above show that in all three examples, when f ∗ is well approximated by a function whose ‘degree of sparsity’ is . (ρ/r(ρ))2 , then ∆(ρ) ≥ 4ρ/5 and Theorem 3.2 may be used. Clearly, the resulting error rates depend on the right choice of ρ, and thus on r(ρ). Because r(ρ) happens to be the minimax rate of the learning problem in the class F ∩ BΨ (ρ, f ∗ ), its properties have been studied extensively. Obtaining an estimate on r(ρ) involves some assumptions on X and ξ, and the one setup in which it can be characterized for an arbitrary class F is when the class is L-subgaussian and ξ ∈ Lq for some q > 2 (though ξ need not be independent of X). It is straightforward to verify that an L-subgaussian class satisfies the small-ball condition of Assumption 2.1 for κ = 1/2 and ε = c/L4 where c is an absolute constant. Moreover, if the class is L-subgaussian, the natural complexity parameter associated with it is the expectation of the supremum of the canonical Gaussian process indexed by the class. Definition 5.1 Let F ⊂ L2 (µ) and set {Gf : f ∈ F } to be the canonical Gaussian process indexed by F ; that is, each Gf is a centred Gaussian variable and the covariance structure of the process is endowed by the inner product in L2 (µ). The expectation of the supremum of the process is defined by ℓ∗ (F ) = sup{E sup Gf : F ′ ⊂ F is finite}. f ∈F ′ 20 It follows from a standard chaining argument that if F is L-subgaussian then N 1 X ℓ∗ (F ) E sup εi (h − f ∗ )(Xi ) . L √ . N f ∈F N i=1 Therefore, if Fρ,r = F ∩ BΨ (ρ, f ∗ ) ∩ D(r, f ∗ ) then for every ρ > 0 and f ∗ ∈ F n √ o rQ (ρ) ≤ inf r > 0 : ℓ∗ (Fρ,r ) ≤ C(L)r N . Turning to rM , we shall require the following fact from [18]. Theorem 5.2 (Corollary 1.10 in [18]) Let q > 2 and L ≥ 1. For every 0 < δ < 1 there is a constant c = c(δ, L, q) for which the following holds. If H is an L-subgaussian class and ξ ∈ Lq , then with probability at least 1 − δ, N 1 X sup √ εi ξi h(Xi ) ≤ ckξkLq ℓ∗ (H). N i=1 h∈H The complete version of Theorem 5.2 includes a sharp estimate on the constant c. However, obtaining accurate probability estimates is not the main feature of this note and deriving such estimates leads to a cumbersome presentation. To keep our message to the point, we have chosen not to present the best possible probability estimates in what follows. A straightforward application of Theorem 5.2 shows that n √ o rM (ρ) ≤ inf r > 0 : kξkLq ℓ∗ (Fρ,r ) ≤ cr 2 N for a constant c that depends on L, q and δ. Recall that we have assumed that X is isotropic, which means that the L2 (µ) norm coincides with the natural Euclidean structure on the space: the standard ℓd2 norm for the LASSO and SLOPE and the Hilbert-Schmidt norm for trace norm regularization. Since the covariance structure of the indexing Gaussian process is endowed by the inner product, it follows that ℓ∗ (ρBΨ ∩ rD) = E sup G, w w∈ρBΨ ∩rB2 for the standard Gaussian vector G = (g1 , ..., gd ) in the case of the LASSO and SLOPE and the Gaussian matrix G = (gij ) in the case of trace norm minimization. Hence, one may obtain a bound on r(ρ) by estimating this expectation in each case. The LASSO and SLOPE. Let (βi )di=1 be a non-increasing positive sequence and set P Ψ(t) = di=1 t♯i βi . Since the LASSO corresponds to the choice of (βi )di=1 = (1, ..., 1), it suffices to identify ℓ∗ (ρBΨ ∩ rB2d ) for the SLOPE norm and a general choice of weights. 21 Lemma 5.3 There exists an absolute constant C for which the following holds. If β and Ψ are as above, then ) ( r p  ed  log(ed/i) + ρ max E sup G, w ≤ C min r (k − 1) log i≥k k k−1 βi w∈ρBΨ ∩rB d 2 (and if k = 1, the first term is set to be 0). Proof. Fix 1 ≤ k ≤ d. Let J be the set of indices of the k largest coordinates of (|gi |)di=1 , and for every w let Iw be the sets of indices of the k largest coordinates of (|wi |)di=1 . Put Jw = J ∪ Iw and note that |Jw | ≤ 2k. Hence, sup d X w∈ρBΨ ∩rB2d i=1 wi gi ≤ sup .r X wi gi + sup w∈ρBΨ i∈J c w∈rB2d i∈Jw X i<k (gi♯ )2 !1/2 X wi gi w + sup X w∈ρBΨ i≥k g♯ wi♯ βi i βi .r X (gi♯ )2 i<k !1/2 + ρ max i≥k gi♯ . βi As a starting point, note that a standard binomial estimate shows that  d    p p ♯ P r i |g| ≥ t log(ed/i) P r gi ≥ t log(ed/i) ≤ i ≤2 exp(i log(ed/i) − i log(ed/i) · t2 /2). Applying the union bound one has that for t ≥ 4, with probability at least 1−2 exp(−(t2 /2)k log(ed/k)), p (5.1) gi♯ ≤ c3 t log(ed/i) for every i ≥ k. The same argument shows that E(gi♯ )2 . log(ed/i). Let Uk be the set of vectors on the Euclidean sphere that are supported on at most k coordinates. Set X 1/2 kxk[k] = (x♯i )2 = sup x, u u∈Uk i≤k and recall that by the Gaussian concentration of measure theorem (see, e.g., Theorem 7.1 in [14]), 1/q  √ √ ≤ EkGk[k] + c q sup k G, u kL2 ≤ EkGk[k] + c1 q. EkGkq[k] u∈Uk Moreover, since E(gi♯ )2 . log(ed/i), one has 1/2 p  X EkGk[k] ≤ E (gi♯ )2 . k log(ed/k). i≤k Therefore, by Chebyshev’s inequality for q ∼ k log(ed/k), for t ≥ 1, with probability at least 1 − 2t−c1 k log(ed/k) , 1/2 X p (gi♯ )2 ≤ c2 t k log(ed/k). i≤k 22 Turning to the ‘small coordinates’, by (5.1), gi♯ max . t max i≥k βi i≥k p log(ed/i) . βi It follows that for every choice of 1 ≤ k ≤ d, gi♯ E sup G, w . rE + ρE max i≥k βi w∈ρBΨ ∩rB2d i<k p p log(ed/i) , .r (k − 1) log(ed/(k − 1)) + ρ max i≥k βi X (gi♯ )2 1/2 and, if k = 1, the first term is set to be 0. d √ If β = (1, ..., 1) (which corresponds √ to the LASSO), then BΨ = B1 , and one may select k ∼ ρ/r, provided that r ≤ ρ ≤ r d. In that case, p E sup G, w . ρ log(edr 2 /ρ2 ). w∈ρB1d ∩rB2d √ The estimates when r ≥ ρ or r d ≤ ρ are straightforward. Indeed, if r ≥ ρ then ρB1d ⊂ rB2d and p ℓ∗ (ρB1d ∩ rB2d ) = ℓ∗ (ρB1d ) ∼ ρ log(ed), √ while if r d ≤ ρ then rB2d ⊂ ρB1d , and √ ℓ∗ (ρB1d ∩ rB2d ) = ℓ∗ (rB2d ) ∼ r d. The LASSO. A straightforward computation shows that  kξk2Lq d    N  2 rM (ρ) .L,q,δ r  ekξk d    L  1  ρ kξkL √ q log N q ρ N and 2 rQ (ρ) .L ( ρ2 N log 0  c(L)d N  if ρ2 N &L,q,δ kξk2Lq d2 otherwise, if N &L d otherwise. Proof of Theorem 1.4. We will actually prove a slightly stronger result, which gives an improved estimation error if one has prior information on the degree of sparsity. Using the estimates on rM and rQ , it is straightforward to verify that the sparsity condition of Lemma 4.2 holds when N &L,q,δ s log(ed/s) and for any r  ed  1 ρ &L,q,δ kξkLq s . log N s 23 It follows from Lemma 4.2 that if there is an s-sparse vector that belongs to t∗ + (ρ/20)B1d , then ∆(ρ) ≥ 4ρ/5. Finally, Theorem 3.2 yields the stated bounds on kt̂ − t∗ k1 and kt̂ − t∗ k2 once we set r  ed  1 r 2 (ρ) λ∼ . ∼L,q,δ kξkLq log ρ N s The estimates on kt̂ − t∗ kp for 1 ≤ p ≤ 2 can be easily verified because −1+2/p kxkp ≤ kxk1 2−2/p kxk2 . In case one has no prior information on s, one may take r 1 log(ed) ρ ∼L,q,δ kξkLq s N and λ ∼L,q,δ kξkLq r log(ed) . N The rest of the argument remains unchanged. SLOPE p Assume that βi ≤ C log(ed/i), which is the standard assumption for SLOPE [4, 31]. By considering the cases k = 1 and k = d, √ (5.2) G, w . min{Cρ, dr}. E sup w∈ρBΨ ∩rB2d Thus, one may show that 2 rQ (ρ) .L   0  ρ2 N if N &L d 2 and rM (ρ) .L,q,δ otherwise,  2 d   kξkLq N if ρ2 N &L,q,δ kξk2Lq d2   kξkL √ρ q N otherwise. p √ P Proof of Theorem 1.6. Recall that Bs = i≤s βi / i, and when βi ≤ C log(ed/i), one may verify that p Bs . C s log(ed/s). Hence, the condition Bs . ρ/r(ρ) holds when N &L,q,δ s log(ed/s) and  ed  s . ρ &L,q,δ kξkLq √ log s N It follows from Lemma 4.3 that ∆(ρ) ≥ 4ρ/5 when there is an s-sparse vector in t∗ + (ρ/20)BΨ ; therefore, one may apply Theorem 3.2 for the choice of λ∼ kξkL r 2 (ρ) ∼L,q,δ √ q . ρ N 24 The trace-norm. Recall that B1 is the unit ball of the trace norm, that B2 is the unit ball of the HilbertSchmidt norm, and that the canonical Gaussian vector here is the Gaussian matrix G = (gij ). Since the operator norm is the dual to the trace norm, p ℓ∗ (B1 ) = Eσ1 (G) . max{m, T }, and clearly, ℓ∗ (B2 ) = E kGk2 . √ mT . Thus, p √  ℓ∗ (ρBΨ ∩ rB2 ) = ℓ∗ (ρB1 ∩ rB2 ) ≤ min ρℓ∗ (B1 ), rℓ∗ (B2 ) . min{ρ max{m, T }, r mT }. Therefore, 2 rQ (ρ) .L  0 } ρ2 max{m,T N if N &L mT otherwise, and 2 rM (ρ) .L,q,δ      kξk2Lq ρkξkLq q mT N if ρ2 N &L,q,δ kξk2Lq mT (min {m, T })2 max{m,T } N otherwise. Proof of Theorem 1.7. It is straightforward to verify that if N &L,q,δ s max{m, T } then s . (ρ/r(ρ))2 when r max{m, T } ρ &L,q,δ kξkLq s N as required in Lemma 4.4. Moreover, if there is some V ∈ Rm×T for which kV − A∗ k1 . ρ and rank(V ) ≤ s, it follows that ∆(ρ) ≥ 4ρ/5. Setting r max{m, T } r 2 (ρ∗ ) , ∼L,q,δ kξkLq λ∼ ∗ ρ N Theorem 3.2 yields the bounds on k − A∗ k1 and k − A∗ k2 . The bounds on the Schatten −1+2/p 2−2/p norms k − A∗ kp for 1 ≤ p ≤ 2 hold because kAkp ≤ kAk1 kAk2 . 6 Concluding Remarks As noted earlier, the method we present may be implemented in classical regularization problems as well, leading to an error rate that depends on Ψ(f ∗ ) – by applying the trivial bound on ∆(ρ) when ρ ∼ Ψ(f ∗ ). The key issue in classical regularization schemes is the price that one has to pay for not knowing Ψ(f ∗ ) in advance. Indeed, given information on Ψ(f ∗ ), one may use a learning procedure taking values in {f ∈ F : Ψ(f ) ≤ Ψ(f ∗ )} such as Empirical Risk Minimization. This approach would result in an error rate of r(cΨ(f ∗ )), and the hope is that the error rate 25 of the regularized procedure is close to that – without having prior knowledge on Ψ(f ∗ ). Surprisingly, as we show in [13], that is indeed the case. The problem with applying Theorem 3.2 to the classical setup is the choice of λ. One has no information on Ψ(f ∗ ), and thus setting λ ∼ r 2 (ρ)/ρ for ρ ∼ Ψ(f ∗ ) is clearly impossible. A first attempt of bypassing this obstacle is Remark 3.3: if ρ & Ψ(f ∗ ), there is no upper 2 constraint on the choice of λ. Thus, one may consider λ ∼ supρ>0 r ρ(ρ) , which suits any ρ > 0. Unfortunately, that choice will not do, because in many important examples the supremum happens to be infinite. Instead, one may opt for the lower constraint on λ and select γO (ρ) , (6.1) λ ∼ sup ρ ρ>0 which is also a legitimate choice for any ρ, and is always finite. We will show in [13] that the choice in (6.1) leads to optimal bounds in many interesting examples – thanks to the first part of Theorem 3.2. An essential component in the analysis of regularization problems is bounding r(ρ), and we only considered the subgaussian case and completely ignored the question of the probability estimate. In that sense, the method we presented falls short of being completely satisfactory. Addressing both these issues requires sharp upper estimates on empirical and multiplier processes, preferably in terms of some natural geometric feature of the underlying class. Unfortunately, this is a notoriously difficult problem. Indeed, the final component in the chaining-based analysis used to study empirical and multiplier processes is to translate a metric complexity parameter (e.g., Talagrand’s γ-functionals) to a geometric one (for example, the mean-width of the set). Such estimates are known almost exclusively in the Gaussian case – which is, in a nutshell, Talagrand’s Majorizing Measures theory [32]. The chaining process in [18] is based on a more sensitive metric parameter than the standard Gaussian one. This leads to satisfactory results for other choices of random vectors that are not necessarily subgaussian, for example, unconditional log-concave random vectors. Still, it is far from a complete theory – as a general version of the Majorizing Measures Theorem is not known. Another relevant fact is from [24]. It turns out that if V is a class of linear functionals on Rd that satisfies a relatively minor symmetry property, and X is an isotropic random vector for which √ (6.2) sup k X, t kLp ≤ L p for 2 ≤ p . log d, t∈S d−1 then the empirical and multiplier processes indexed by V behave as if X were a subgaussian vector. In other words, for such “symmetric” problems it suffices to have a subgaussian moment growth up to p ∼ log d to ensure a subgaussian behaviour. This fact is useful because all the indexing sets considered here (and in many other sparsity-based regularization procedures as well) satisfy the required symmetry property. Finally, a word about the probability estimate in Theorem 5.2. The actual result from [18] leads to a probability estimate governed by two factors: the Lq space to which ξ belongs 26 and the ‘effective dimension’ of the class. For a class of linear functionals on Rd and an isotropic vector X, this effective dimension is  ∗  ℓ (V ) 2 D(V ) = , d2 (V ) where ℓ∗ (V ) = E supv∈V | G, v | and d2 (V ) = supv∈V kvkℓd . 2 One may show that with probability at least 1 − c1 w−q N −((q/2)−1) logq N − 2 exp(−c2 u2 D(V )), N  1 X sup √ ξi V, Xi − Eξ X, v . LwukξkLq ℓ∗ (V ). N i=1 v∈V (6.3) If ξ has better tail behaviour, the probability estimate improves; for example, if ξ is subgaussian then (6.3) holds with probability at least 1 − 2 exp(−cw2 N ) − 2 exp(−cu2 D(V )). The obvious complication is that one has to obtain a lower bound on the effective dimension D(V ). And while it is clear that D(v) & 1, in many cases (including our three examples) a much better bound is true. Let us mention that the effective dimension is perhaps the most important parameter in Asymptotic Geometric Analysis. Milman’s version of Dvoretzky’s Theorem (see, e.g., [1]) shows that D(V ) captures the largest dimension of a Euclidean structure hiding in V . In fact, this geometric observation exhibits why that part of the probability estimate in (6.3) cannot be improved. References [1] Shiri Artstein-Avidan, Apostolos Giannopoulos, and Vitali D. Milman. Asymptotic geometric analysis. Part I, volume 202 of Mathematical Surveys and Monographs. American Mathematical Society, Providence, RI, 2015. [2] Francis R. Bach. Structured sparsity-inducing norms through submodular functions. In Advances in Neural Information Processing Systems 23: 24th Annual Conference on Neural Information Processing Systems 2010. Proceedings of a meeting held 6-9 December 2010, Vancouver, British Columbia, Canada., pages 118–126, 2010. [3] Peter J. Bickel, Ya’acov Ritov, and Alexandre B. Tsybakov. Simultaneous analysis of lasso and Dantzig selector. Ann. Statist., 37(4):1705–1732, 2009. [4] Malgorzata Bogdan, Ewout van den Berg, Chiara Sabatti, Weijie Su, and Emmanuel J. Candès. SLOPE—Adaptive variable selection via convex optimization. Ann. Appl. Stat., 9(3):1103–1140, 2015. [5] Peter Bühlmann and Sara van de Geer. Statistics for high-dimensional data. Springer Series in Statistics. Springer, Heidelberg, 2011. Methods, theory and applications. [6] Emmanuel J. Candès and Yaniv Plan. Tight oracle inequalities for low-rank matrix recovery from a minimal number of noisy random measurements. IEEE Trans. Inform. Theory, 57(4):2342–2359, 2011. [7] David Gross. Recovering low-rank matrices from few coefficients in any basis. IEEE Trans. Inform. Theory, 57(3):1548–1566, 2011. [8] Vladimir Koltchinskii. Oracle inequalities in empirical risk minimization and sparse recovery problems, volume 2033 of Lecture Notes in Mathematics. Springer, Heidelberg, 2011. Lectures from the 38th Probability Summer School held in Saint-Flour, 2008, École d’Été de Probabilités de Saint-Flour. [Saint-Flour Probability Summer School]. 27 [9] Vladimir Koltchinskii, Karim Lounici, and Alexandre B. Tsybakov. Nuclear-norm penalization and optimal rates for noisy low-rank matrix completion. Ann. Statist., 39(5):2302–2329, 2011. [10] Vladimir Koltchinskii and Shahar Mendelson. Bounding the Smallest Singular Value of a Random Matrix Without Concentration. Int. Math. Res. Not. IMRN, (23):12991–13008, 2015. [11] Guillaume Lecué and Shahar Mendelson. Learning subgaussian classes: Upper and minimax bounds. Technical report, CNRS, Ecole polytechnique and Technion, 2013. [12] Guillaume Lecué and Shahar Mendelson. Sparse recovery under weak moment assumptions. Technical report, CNRS, Ecole Polytechnique and Technion, 2014. To appear in Journal of the European Mathematical Society. [13] Guillaume Lecué and Shahar Mendelson. Regularization and the small-ball method ii: complexity-based bounds. Technical report, CNRS, ENSAE and Technion, I.I.T., 2015. [14] Michel Ledoux. The concentration of measure phenomenon, volume 89 of Mathematical Surveys and Monographs. American Mathematical Society, Providence, RI, 2001. [15] Karim Lounici. Sup-norm convergence rate and sign concentration property of Lasso and Dantzig estimators. Electron. J. Stat., 2:90–102, 2008. [16] Nicolai Meinshausen and Peter Bühlmann. High-dimensional graphs and variable selection with the lasso. Ann. Statist., 34(3):1436–1462, 2006. [17] Nicolai Meinshausen and Bin Yu. Lasso-type recovery of sparse representations for high-dimensional data. Ann. Statist., 37(1):246–270, 2009. [18] Shahar Mendelson. Upper bounds on product and multiplier empirical processes. Technical report. To appear in Stochastic Processes and their Applications. [19] Shahar Mendelson. Learning without concentration for general loss function. Technical report, Technion, I.I.T., 2013. arXiv:1410.3192. [20] Shahar Mendelson. Learning without concentration. In Proceedings of the 27th annual conference on Learning Theory COLT14, pages pp 25–39. 2014. [21] Shahar Mendelson. A remark on the diameter of random sections of convex bodies. In Geometric aspects of functional analysis, volume 2116 of Lecture Notes in Math., pages 395–404. Springer, Cham, 2014. [22] Shahar Mendelson. Learning without concentration. J. ACM, 62(3):Art. 21, 25, 2015. [23] Shahar Mendelson. ’local vs. global parameters’, breaking the gaussian compexity barrier. Technical report, Technion, I.I.T., 2015. [24] Shahar Mendelson. On multiplier processes under weak moment assumptions. Technical report, Technion, I.I.T., 2015. [25] Sahand Negahban and Martin J. Wainwright. Restricted strong convexity and weighted matrix completion: optimal bounds with noise. J. Mach. Learn. Res., 13:1665–1697, 2012. [26] Sahand N. Negahban, Pradeep Ravikumar, Martin J. Wainwright, and Bin Yu. A unified framework for high-dimensional analysis of M -estimators with decomposable regularizers. Statist. Sci., 27(4):538–557, 2012. [27] Richard Nickl and Sara van de Geer. Confidence sets in sparse regression. Ann. Statist., 41(6):2852– 2876, 2013. [28] Benjamin Recht, Maryam Fazel, and Pablo A. Parrilo. Guaranteed minimum-rank solutions of linear matrix equations via nuclear norm minimization. SIAM Rev., 52(3):471–501, 2010. [29] Angelika Rohde and Alexandre B. Tsybakov. Estimation of high-dimensional low-rank matrices. Ann. Statist., 39(2):887–930, 2011. [30] Mark Rudelson and Roman Vershynin. Small ball probabilities for linear images of high dimensional distributions. Technical report, University of Michigan, 2014. International Mathematics Research Notices, to appear. [arXiv:1402.4492]. 28 [31] Weijie Su and Emmanuel Candès. SLOPE is adaptive to unknown sparsity and asymptotically minimax. Ann. Statist., 44(3):1038–1068, 2016. [32] Michel Talagrand. Upper and lower bounds for stochastic processes, volume 60 of Ergebnisse der Mathematik und ihrer Grenzgebiete. 3. Folge. A Series of Modern Surveys in Mathematics [Results in Mathematics and Related Areas. 3rd Series. A Series of Modern Surveys in Mathematics]. Springer, Heidelberg, 2014. Modern methods and classical problems. [33] Robert Tibshirani. Regression shrinkage and selection via the lasso. J. Roy. Statist. Soc. Ser. B, 58(1):267–288, 1996. [34] Sara van de Geer. Weakly decomposable regularization penalties and structured sparsity. Scand. J. Stat., 41(1):72–86, 2014. [35] Sara van de Geer, Peter Bühlmann, Ya’acov Ritov, and Ruben Dezeure. On asymptotically optimal confidence regions and tests for high-dimensional models. Ann. Statist., 42(3):1166–1202, 2014. [36] Sara A. van de Geer. The deterministic lasso. http://www.stat.math.ethz.ch/ geer/lasso.pdf. Technical report, ETH Zürich, 2007. [37] Sara A. van de Geer. High-dimensional generalized linear models and the lasso. Ann. Statist., 36(2):614– 645, 2008. [38] G. Alistair Watson. Characterization of the subdifferential of some matrix norms. Linear Algebra Appl., 170:33–45, 1992. [39] Cun-Hui Zhang and Stephanie S. Zhang. Confidence intervals for low dimensional parameters in high dimensional linear models. J. R. Stat. Soc. Ser. B. Stat. Methodol., 76(1):217–242, 2014. [40] Peng Zhao and Bin Yu. On model selection consistency of Lasso. J. Mach. Learn. Res., 7:2541–2563, 2006. 7 Supplementary material: non-isotropic design An inspection of Theorem 3.2 reveals no mention of an isotropicity assumption. There is no choice of a Euclidean structure, and in fact, the statement itself is not even finite dimensional. All that isotropicity has been used for was to bound the “complexity function” r(·) and the “sparsity function” ∆(·) in the three applications — the LASSO (in Theorem 1.4), SLOPE (in Theorem 1.6) and the trace norm regularization (in Theorem 1.7). We may apply Theorem 3.2 to situations that do not involve an isotropic vector and here we give an example of how this may be done. To simplify our presentation we will only consider ℓ1 and SLOPE regularization, which may both be written as d X βj t♯j , Ψ(t) = j=1 where β1 ≥ · · · ≥ βd > 0 and t♯1 ≥ · · · ≥ t♯d ≥ 0 is the nondecreasing rearrangement of (|tj |). As mentioned previously, the LASSO case is recovered for β1 = · · · = βd = 1 and the p SLOPE norm is obtained for βj = C log(ed/j) for some constant C. We also denote by BΨ (resp. SΨ ) the unit ball (resp. sphere) associated with the Ψ-norm. Let Σ ∈ Rd×d be the covariance matrix of X and set D = {x ∈ Rd : Σ1/2 x 2 ≤ 1} to be the corresponding ellipsoid. Naturally, if X is not isotropic than Σ is not the identity matrix. 29 In order to apply Theorem 3.2, we need to bound from above the expectation of the supremum of the Gaussian process indexed by ρBΨ ∩ rD: ℓ∗ (ρBΨ ∩ rD) = E Σ1/2 G, w sup (7.1) w∈ρBΨ ∩rD where G is a standard Gaussian vector in Rd . We also need to solve the “sparsity equation”—that is, find ρ∗ > 0 for which ∆(ρ∗ ) ≥ ∗ 4ρ /5 where, for every ρ > 0, ∆(ρ) = inf sup h∈ρSΨ ∩rD g∈Γ ∗ (ρ) t h, g and Γt∗ (ρ) is the collection of all subgradients of Ψ of vectors in t∗ + (ρ/20)BΨ . We will show that the same results that have been obtained for the LASSO and SLOPE in Theorem 1.4 and Theorem 1.6 actually hold under the following assumption. 1/2 Assumption 7.1 Let j ∈ {1, ..., d} and denote by Σj• the j-th row of Σ1/2 . Let s ∈ P √ {1, . . . , d} and set Bs = sj=1 βj / j. 1/2 1. There exists σ > 0 such that for all j ∈ {1, . . . , d}, Σj• 2. For all x ∈ (20Bs SΨ ) ∩ D, 2 Σ1/2 x 2 2 ≤ σ. ≥ sup|J|≤s kxJ k2 . SLOPE. We first control the Gaussian mean width in (7.1) when Ψ(·) is the SLOPE norm. p Lemma 7.1 Set βj = C log(ed/j) and let Σ be a d × d symmetric nonnegative matrix for 1/2 which maxj Σj• E 2 ≤ σ. If D = {x ∈ Rd : Σ1/2 x sup w∈ρBΨ ∩rD Σ 1/2 G, w ≤ min ( ρ C 2 ≤ 1} then ) √ r ! √ 3 6σ π +r ,r d 8 2 Proof. Note that E sup w∈ρBΨ ∩rD Σ 1/2 G, w ≤ rE sup G, Σ w∈D 1/2 w = rE kGk2 ≤ r  E kGk22 1/2 √ ≤ r d.  Next, let H : Rd → R be defined by H(u) = sup Σ1/2 u, w : w ∈ ρBΨ ∩ rD and recall that G is the standard Gaussian vector in Rd . It is straightforward to verify that H(G) ≤ sup w∈ρBΨ Σ 1/2 ξj♯ ρ max p G, w ≤ C 1≤j≤d log(ed/j) 30 where we set (ξj )dj=1 = Σ1/2 G and (ξj♯ )dj=1 is the non-increasing rearrangement of (|ξj |)dj=1 . Observe that for u, v ∈ Rd , |H(u) − H(v)| ≤ sup w∈ρBΨ ∩rD | Σ1/2 (u − v), w | ≤ r sup | u − v, w | = r ku − vk2 , w∈B2d implying that H is a Lipschitz function with constant r; thus, it follows from p. 21 in Chapter 1 of [14] that r π EH(G) ≤ Med(H(G)) + r , (7.2) 2 where Med(H(G)) is the median of H(G). Hence, to obtain the claimed bound on E supw∈ρBΨ Σ1/2 G, w it suffices to establish a suitable upper estimate on the median of max1≤j≤d √ ξj♯ log(ed/j) . With that in mind, let ξ1 , . . . , ξN be mean-zero Gaussian variables and assume that for every j = 1, . . . , d, E exp(ξj2 /L2 ) ≤ e (7.3) for some L > 0. Note that in our case, ξ1 , . . . , ξN satisfying (7.3) for L = 3σ/8. By Jensen’s inequality, ! !  2 j j d ♯ (ξk♯ )2 ξk 1X 1X ed 1 X (ξk )2 E exp E exp ≤ ≤ ≤ ; E exp 2 2 2 j L j L j L j k=1 k=1 k=1 hence, j Pr ♯ 1 X (ξk )2 ≥ 2 log (ed/j) j L2 k=1 ! ≤ exp (− log (ed/j)) = j . ed (7.4) Let q ≥ 0 be the integer that satisfies 2q ≤ d < 2q+1 . It follows from (7.4) that with probability at least q−1 ℓ X 2 2q − 1 1 1− =1− > , ed ed 2 ℓ=0 for every ℓ = 0, · · · , q − 1, ℓ (ξ2♯ ℓ )2 2 1 X ♯ 2 ≤ ℓ (ξj ) ≤ 2L2 log(ed/2ℓ ). 2 j=1 Moreover, for 2ℓ ≤ j < 2ℓ+1 , we have ξj♯ ≤ ξ2♯ ℓ and log(ed/2ℓ ) ≤ 2 log(ed/j); also for 2q ≤ j ≤ d, we have ξj♯ ≤ ξ2♯ q−1 and log(ed/2ℓ ) ≤ 3 log(ed/j). Therefore, Pr max p 1≤j≤d ξj♯ log(ed/j) proving the requested bound on Med(H(G)). 31 ≤ √ 6L ! 1 > , 2 (7.5) Observe that up to constant σ, we actually recover the same result as in (5.2); therefore, one may choose the same “complexity function” r(·) as in the proof of Theorem 1.6. Let us turn to a lower bound on the “sparsity function”. Lemma 7.2 There exists an absolute constant 0 < c < 80 for which the following holds. P √ Let s ∈ {1, . . . , d} and set Bs = j≤s βj / j. Assume that for every x ∈ (80Bs Sψ ) ∩ D one has Σ1/2 x 2 ≥ (1/2) sup|J|≤s kxJ k2 . Let ρ > 0 and assume further that there is a s-sparse vector in t∗ + (ρ/20)BΨ . If 80Bs ≤ ρ/r(ρ) then ∆(ρ) = inf sup h∈ρSΨ ∩r(ρ)D g∈Γt∗ (ρ) h, g ≥ 4ρ . 5 Proof. Let h ∈ ρSΨ ∩ r(ρ)D and denote by (h♯j ) the non-increasing rearrangement of (|hj |). It follows from the proof of Lemma 4.3 that X 17ρ sup h, g ≥ −2 βj h♯j . 20 g∈Γt∗ (ρ) j≤s Let h♯,s be the s-sparse vector with coordinates given by h♯j for 1 ≤ j ≤ s and 0 otherwise. We have     r(ρ) 1 h ∈ SΨ ∩ D D ⊂ SΨ ∩ ρ ρ 80Bs √ implying that 2 Σ1/2 h 2 ≥ h♯,s 2 . Furthermore, since h♯j ≤ h♯ 2 / j for every 1 ≤ j ≤ s, we have X βj h♯j ≤ h♯,s Bs ≤ 2Bs Σ1/2 h ≤ 2Bs r(ρ). 2 2 j≤s Hence, if ρ ≥ 80r(ρ)Bs then ∆(ρ) ≥ 4ρ/5. We thus recover the same condition as in Lemma 4.3, implying that Theorem 1.6 actually holds under the weaker Assumption 7.1: let X be an L-subgaussian random vector whose covariance matrix satisfies Assumption 7.1. The SLOPE estimator with regulariza√ tion parameter λ ∼ kξkLq / N satisfies, with probability at least 1 − δ − exp(−c0 N L8 ),  ed  s and Ψ(t̂ − t∗ ) ≤ c3 kξkLq √ log s N Σ1/2 (t̂ − t∗ ) 2 2 ≤ c3 kξk2Lq  ed  s log N s when N ≥ c4 s log(ed/s) and when there is a s-sparse vector close enough to t∗ . The LASSO. P √ √ Here, for every 1 ≤ j ≤ d, βj = 1; BΨ = B1d ; and Bs = sj=1 1/ j ≤ 2 s. 1/2 Lemma 7.3 Let Σ be a d × d symmetric nonnegative matrix for which maxj Σj• If D = {x ∈ Rd : Σ1/2 x E ≤ 1} then every ρ > 0 and r > 0, o n √ p Σ1/2 G, w ≤ min r d, ρσ log(ed) . sup 2 w∈ρB1d ∩rD 32 2 ≤ σ. Proof. Note that E sup w∈ρB1d ∩rD 1/2  √ Σ1/2 G, w ≤ rE sup G, Σ1/2 w = rE kGk2 ≤ r E kGk22 ≤ r d. w∈D Next, set (ξj )dj=1 = Σ1/2 G and let (ξj♯ )dj=1 be the non-increasing rearrangement of (|ξj |). Therefore, ξ1 , . . . , ξd are mean-zero Gaussian variables and satisfy E exp(ξj2 /L2 ) ≤ e for L = 3σ/8. It is evident that  ! !! ! d X ξj2 (ξ1♯ )2 (ξ1♯ )2  ≤ log (ed) , E exp ≤ log E exp ≤ log  E L2 L2 L2 j=1 and therefore, E sup w∈ρB1d ∩rD 1/2 3ρσL p  Σ1/2 G, w ≤ E sup Σ1/2 G, w ≤ ρE (ξ1♯ )2 ≤ log (ed). 8 w∈ρB d 1 Lemma 7.3 leads to a slightly different result than in the isotropic case (Lemma 5.3), and as a consequence, r(·) has to be slightly modified. A straightforward computation shows that ! r kξkLq d log(ed) 2 rM (ρ) .L,q,δ min , ρσ kξkLq N N and 2 rQ (ρ) .L ( ρ2 σ2 N 0  log c(L)d N if N &L d otherwise. and still r(ρ) = max{rM (ρ), rQ (ρ)}. Finally, let us prove the sparsity condition. Lemma 7.4 There exists an absolute constant 0 < c < 80 for which the following holds.  P √ Let s ∈ {1, . . . , d} and set Bs = j≤s 1/ j. Assume that for every x ∈ 20Bs S(ℓd1 ) ∩ D one has Σ1/2 x 2 ≥ (1/2) sup|J|≤s kxJ k2 . Let ρ > 0 and assume further that there is a s-sparse vector in t∗ + (ρ/20)B1d . If 20Bs ≤ ρ/r(ρ) then ∆(ρ) = inf sup h∈ρS(ℓd1 )∩r(ρ)D g∈Γt∗ (ρ) h, g ≥ 4ρ . 5 Proof. Let h ∈ ρS(ℓd1 ) ∩ r(ρ)D and denote by (h♯j ) the non-increasing rearrangement of (|hj |). It follows from the proof of Lemma 4.2 that X ♯ sup h, g ≥ ρ − 2 hj . g∈Γt∗ (ρ) j≤s 33 Let h♯,s be the s-sparse vector with coordinates given by h♯j for 1 ≤ j ≤ s and 0 otherwise. Observe that     r(ρ) 1 h d d ∈ S(ℓ1 ) ∩ D, D ⊂ S(ℓ1 ) ∩ ρ ρ 40Bs and therefore 2 Σ1/2 h 2 ≥ h♯,s It follows that X ♯ √ hj ≤ s h♯ j≤s 2 2 . ≤ Bs h♯ 2 ≤ 2Bs Σ1/2 h 2 ≤ 2Bs r(ρ), and in particular, if ρ ≥ 20r(ρ)Bs then ∆(ρ) ≥ 4ρ/5. Using the estimate on r(·) and Lemma 7.4, it is evident that when N &L,q,δ sσ 2 log(ed), one has ∆(ρ∗ ) ≥ 4ρ∗ /5 for r log(ed) ∗ ρ ∼L,q,δ kξkLq s N and if there is a s-sparse vector in t∗ + (ρ∗ /20)B1d . Finally, one may choose the regularization parameter by setting r log(ed) r 2 (ρ∗ ) ∼L,q,δ kξkLq s . λ∼ ∗ ρ N It follows that if X is an L-subgaussian random vector that satisfies Assumption 7.1 then with probability larger than 1 − δ − 2 exp(−c0 N L8 ), r r log(ed) s log(ed) 1/2 ∗ ∗ ∗ ∗ and Σ (t̂ − t ) ≤ r(ρ ) = c2 (L, δ) kξkLq . t̂ − t 1 ≤ ρ = c1 (δ) kξkLq s N N 2 34
10math.ST
Geometric operations implemented by conformal geometric algebra neural nodes Eckhard HITZER University of Fukui Abstract: Geometric algebra is an optimal frame work for calculating with vectors. The geometric algebra of a space includes elements that represent all the its subspaces (lines, planes, volumes, ...). Conformal geometric algebra expands this approach to elementary representations of arbitrary points, point pairs, lines, circles, planes and spheres. Apart from including curved objects, conformal geometric algebra has an elegant unified quaternion like representation for all proper and improper Euclidean transformations, including reflections at spheres, general screw transformations and scaling. Expanding the concepts of real and complex neurons we arrive at the new powerful concept of conformal geometric algebra neurons. These neurons can easily take the above mentioned geometric objects or sets of these objects as inputs and apply a wide range of geometric transformations via the geometric algebra valued weights. arXiv:1306.1358v1 [cs.CV] 6 Jun 2013 1. Introduction The co-creator of calculus W. Leibniz dreamed of a new type of mathematics in which every number, every operation and every relation would have a clear geometric counterpart. Subsequently the inventor of the concept of vector space and our modern notion of algebra H. Grassmann was officially credited to fulfill Leibniz’s vision. Contemporary to Grassmann was W. Hamilton, who took great pride in establishing the algebra of rotation generators in 3D, which he himself called quaternion algebra. About 30 years later W. Clifford successfully fused Grassmann’s and Hamilton’s work together in what he called geometric algebra. Geometric algebra can be understood as an algebra of a vector space and all its subspaces equipped with an associative and invertible geometric product of vectors. It is classic knowledge that adding an extra dimension for the origin point to a vector space leads to the projective geometry of rays, where Euclidean points correspond to rays. Adding one more dimension for the point of infinity allows to treat lines as circles through infinity, and planes as spheres through infinity and unifies their treatment. This socalled conformal geometric algebra represents geometric points, spheres and planes by 5D vectors. The inner product of two conformal points yields their Euclidean distance. Orthogonal transformations preserve inner products and in the 5D model Euclidean distances, provided that they also keep the point at infinity invariant. According to Cartan and Dieudonné all orthogonal transformations are products of reflections. Proper and improper Euclidean transformations can therefore be expressed nowadays in conformal geometric algebra as elegant as complex numbers express rotations in 2D. And the language is not limited to 3+2D, n+2D follows the very same principles. Transformation groups generated by products of reflections in geometric algebra are known as Clifford (or Lipschitz or versor) groups [7, 10]. Versors (Clifford group or Lipschitz elements) are simply the geometric products of the normal vectors to the (hyper) planes of reflection. These versors assume the role of geometric weights in concept of conformal geometric algebra neural nodes. Precursors for these nodes are complex [1], quaternion [3], and Clifford spinor [2, 6] neurons. They have also been named versor Clifford neurons [13], but regarding their fundamental geometric nature even the term geometric neurons seems fully justified. 2. Geometric algebra Definition 1 (Clifford geometric algebra). A Clifford geometric algebra Gp,q is defined by the associative geometric product of elements of a quadratic vector space Rp,q , their linear combination and closure. Gp,q includes the field of real numbers R and the vector space Rp,q as subspaces. The geometric product of two vectors is defined as ab = a · b + a ∧ b, (1) where a · b indicates the standard inner product and the bivector a ∧ b indicates Grassmann’s antisymmetric outer product. a ∧ b can be geometrically interpreted as the oriented parallelogram area spanned by the vectors a and b. Geometric algebras are graded, with grades (subspace dimensions) ranging from zero (scalars) to n = p + q (pseudoscalars, n-volumes). For example geometric algebra G3 = G3,0 of threedimensional Euclidean space R3 = R3,0 has an eightdimensional basis of scalars (grade 0), vectors (grade 1), bivectors (grade 2) and trivectors (grade 3). Trivectors in G3 are also referred to as oriented volumes or pseudoscalars. Using an orthonormal basis {e1 , e2 , e3 } for R3 we can write the basis of G3 as {1, e1 , e2 , e3 , e2 e3 , e3 e1 , e1 e2 , i = e1 e2 e3 }. (2) In (2) i is the unit trivector, i.e. the oriented volume of a unit cube. The even subalgebra G3+ of G3 is isomorphic to the quaternions H of Hamilton. We therefore call elements of G3+ rotors, because they rotate all elements of G3 . The role of complex (and quaternion) conjugation is naturally taken by reversion (a1 , a2 , . . . , as ∈ Rp,q , s ∈ N) (a1 a2 . . . as )∼ = as . . . a2 a1 . (3) The inverse of a non-null vector a ∈ Rp,q is a−1 = a . a2 (4) A reflection at a hyperplane normal a is x0 = −a−1 xa. (5) A rotation by the angle θ in the plane of a unit bivector i can thus be given as the product R = ab of two vectors a, b from the i-plane (i.e. geometrically as a sequence of two reflections) with angle θ/2, Rp,q 3 x → R−1 xR ∈ Rp,q , e0 · e∞ = −1, (7) e0 E = −e0 , Ee0 = e0 , e∞ E = e∞ , Ee∞ = −e∞ , E 2 = 1. Extracting a certain grade part from the geometric product of two blades Ak and Bl has a deep geometric meaning. One example is the grade l − k part (contraction [8]) of the geometric product Ak Bl , that represents the orthogonal complement of a k-blade Ak in an l-blade Bl , provided that Ak is contained in Bl (9) Another important grade part of the geometric product of Ak and Bl is the maximum grade l + k part, also called the outer product part Ak ∧ Bl = hAk Bl il+k . (10) If Ak ∧ Bl is non-zero it represents the union of the disjoint (except for the zero vector) subspaces represented by Ak and Bl . The dual of a multivector A is defined by geometric division with the pseudoscalar I = A∗ = A I − 1, which maps k-blades into (n − k)-blades, where n = p + q. Duality transforms inner products (contractions) to outer products and vice versa. The outer product null space representation (OPNS) of (8) is therefore transformed by duality into the socalled inner product null space (IPNS) representation x ∧ A = 0 ⇐⇒ x · A∗ = 0. (11) 2.1 Conformal geometric algebra Conformal geometric algebra embeds the geometric algebra G3 of R3 in the geometric algebra of R4,1 = R3+1,0+1 Given an orthonormal basis for R4,1 {e1 , e2 , e3 , e+ , e− } b= A n X (−1)k hAik . A Clifford (or Lipschitz) group is a subgroup in Gp,q generated by non-null vectors x ∈ Rp,q Γp,q = {m ∈ Gp,q | ∀x ∈ Rp,q , m b −1 x m ∈ Rp,q } (19) For every m ∈ Γp,q we have mm e ∈ R. Examples are m = a and m = R = ab for reflections and rotations, respectively. Clifford groups include Pin(p, q), Spin(p, q), and Spin+ (p, q) groups as covering groups of orthogonal O(p, q), special orthogonal SO(p, q) and SO+ (p, q) groups, respectively. Conformal transformation groups C(p, q) preserve inner products (angles) of vectors in Rp,q up to a change of scale. C(p, q) is isomorphic to O(p + 1, q + 1). The metric affine group (orthogonal transformations and translations) of Rp,q is a subgroup of O(p + 1, q + 1), and can be implemented as a Clifford group in Gp+1,q+1 . 2.2 Geometric objects The conformal geometric algebra G4,1 provides us with a superb model [7–9] of Euclidean geometry. The basic geometric objects in conformal geometric algebra are homogeneous conformal points 1 P = p + p2 e∞ + e0 , (20) 2 p where p ∈ R3 , p = p2 . The +e0 term shows that we include projective geometry. The second term + 12 p2 e∞ ensures, that conformal points are isotropic vectors P 2 = P P = P · P = 0. e21 = e22 = e23 = e2+ = −e2− = 1, (13) we introduce a change of basis for the two additional dimensions {e+ , e− } by 1 (e− − e+ ), 2 e∞ = e− + e+ . (14) The vectors e0 and e∞ are isotropic vectors, i.e. e20 = e2∞ = 0, (18) k=0 (12) with e0 = (17) As we will now see, conformal geometric algebra is advantageous for the unified representation of many types of geometric transformations. In the next section we will further consider the unified representation of eight different types of Euclidean geometric objects possible in conformal geometric algebra. Combining reflections (5) leads to an overall sign (parity) for odd and even numbers of (reflection plane) vectors a, b, etc. Therefore we define the grade involution x ∈ V = span[a1 , . . . ak ] ⇔ x∧a1 ∧a2 ∧. . .∧ak = 0. (8) Bl = hAk Bl il−k . (16) We further have the following useful relationships where |a|, and |b| are the lengths of a, b. This description corresponds exactly to using quaternions. Blades of grade k, 0 ≤ k ≤ n = p + q are the outer products of k vectors al (1 ≤ l ≤ k) and directly represent the k-dimensional vector subspaces V spanned by the set of vectors al (1 ≤ l ≤ k). This is also called the outer product null space (OPNS) representation. Ak E = e∞ ∧ e0 = e+ ∧ e− . (6) where the vectors a, b are in the plane of the unit bivector i ∈ Gp,q if and only if a ∧ i = b ∧ i = 0. The rotor R can also be expanded as R = ab = |a||b|exp(θi/2), and have inner and outer products of (15) (21) In general the inner product of two conformal points P1 and P2 gives their Euclidean distance 1 P1 · P2 = − (p1 − p2 )2 . 2 (22) Orthogonal transformations preserve this distance. The outer product of two conformal points spans a conformal point pair (in OPNS) as in Fig. 1 P p = P1 ∧ P2 . (23) Fig. 1 Conformal point pair P1 ∧ P2 with center C. This and the following illustrations were produced with the OpenSource visual software CLUCalc [14], which is also based on conformal geometric algebra. The outer product three conformal points gives a circle (cf. Fig. 2) Circle = P1 ∧ P2 ∧ P3 . (24) Fig. 4 Conformal line P1 ∧P2 ∧e∞ with 3D direction vector d. also called bivector moment of the line. Conformal planes (spheres through infinity, cf. Fig. 5) are represented by P lane = P1 ∧ P2 ∧ P3 ∧ e∞ = Circle ∧ e∞ . (27) Further flattened objects are Fig. 2 Conformal circle P1 ∧ P2 ∧ P3 with center C. The conformal outer product of four conformal points gives a sphere (cf. Fig. 3) Sphere = P1 ∧ P2 ∧ P3 ∧ P4 . (25) Fig. 5 Conformal plane P1 ∧ P2 ∧ P3 ∧ e∞ . P ∧ e∞ , (28) a (flat) finite–infinite point pair, and −is E = Sphere ∧ e∞ ∼ I5 = iE, (29) the in 5D embedded (flat) 3D Euclidean space R3 . 2.3 General reflection and motion operators (motors) As in G3 , 3D rotations around the origin in the conformal model G4,1 are still represented by rotors (6). The standard IPNS representation of a conformal plane, i.e. the dual of the direct OPNS representation (27) results in a vector, that both describes the unit normal direction n = c⊥ /|c⊥ | and the position (signed distance d = c⊥ · n from the origin) of a plane by µ = P lane∗ = n + de∞ . Fig. 3 Conformal sphere P1 ∧ P2 ∧ P3 ∧ P4 with center C. If one of the points is at infinity, we get conformal lines (circles through infinity, cf. Fig. 4) Line = P1 ∧ P2 ∧ e∞ = P p ∧ e∞ = 2r(d ∧ ce∞ − dE) ∝ m e∞ − dE, (26) where d is the direction vector of the line and c the 3D midpoint between P1 and P2 , 2r = |p2 − p2 |. c can be replaced by any point p on the line. m = d ∧ c = d ∧ p is (30) We can reflect the conformal point X at the general plane (30) similar to (5) with X 0 = −µ−1 Xµ. (31) A reflection of a general conformal object O (point, point pair, line, ..., sphere) at the general plane (30) similar to (31) with b O0 = µ−1 Oµ, (32) where the grade involution takes care of the sign changes. Just as we obtained rotations (6) by double reflections we now obtain rotations around arbitrary axis (lines of intersection of two planes) by double reflections at planes µ1 and µ2 X 0 = R−1 XR, R = µ1 µ2 . (33) And if the two planes µ1 and µ2 happen to be parallel, i.e. n1 = ±n2 , we instead get a translation by twice the Euclidean distance t/2 between the planes X 0 = T −1 XT, 1 1 T (t) = µ1 µ2 = 1 + te∞ = exp( te∞ ). 2 2 Table 2 Summary of motions and scaling O → W −1 OW in conformal GA. O is a general conformal object (point, point pair, circle, sphere, flat point, line, plane, 3D space). The conformal versor W represents the motion operator. Motion operator Versor W Rotor exp(θi/2) Translator exp( 12 te∞ ) Motor TR Scale operator T −1 (c) exp (E 21 log s) T (c) (34) A general motion operator (motor) results from combining rotations (33) and translations (34) to M = T R. (35) The standard IPNS representation of a sphere results in the vector 1 σ = S ∗ = C − r2 e∞ , 2 (36) which is exactly the dual S ∗ = S i−1 3 E of (25). The expression (36) shows that in conformal GA a point can be regarded as a sphere with zero radius. We can reflect (invert) the conformal point X at the sphere (36) [or at a conformal point] similar to (5) and (31) simply by X 0 = −σ −1 Xσ. (37) The double reflection at two concentric spheres σ1 and σ2 (centered at c) results in a rescaling operation [8] with factor s and center c X 0 = Z −1 XZ, Z = σ1 σ2 = T −1 (c) exp (E Fig. 6 Examples of combinations of geometric transformations: rotor R, translator T , scaling operator Z, motor and scaling op. Ms . 1 log s) T (c). 2 (38) The following illustrations have been produced with the socalled Space Group Visualizer [15], a symmetry visualization program for crystallographic space group, which is also based on conformal geometric algebra software. Figure 7 shows a glide reflection, i.e. a reflection combined with a translation parallel to the plane of reflection. Figure 8 shows a point inversion. Figure 9 shows a screw Table 1 summarizes the various reflections possible in conformal GA. Table 2 summarizes the motions and scaling posb in conforTable 1 Summary of reflections O → −W −1 OW mal GA. O is a general conformal object (point, point pair, circle, sphere, flat point, line, plane, 3D space). The conformal versor W represents the mirror. Mirror Versor W plane n + de∞ point p + 12 p2 e∞ + e0 sphere C − 12 r2 e∞ line m e∞ − dE Fig. 7 Examples of glide reflection, which is a reflection combined with a translation parallel to the plane of reflection. sible in conformal GA. 2.4 Combining elementary transformations All operations in Tables 1 and 2 can be combined to give further geometric transformations, like rotoinversions, glide reflections, etc.! Algebraically the combination is represented by simply computing the product of the multivector versors of the elementary transformations explained above. Figure 6 shows some examples of combinations of geometric transformations applied to a point pair P1 ∧ P2 . The overbars abbreviate the inverse of an operator. transformation, which is a rotation followed by a translation along the axis of the rotation. Figure 10 shows a rotoinversion, which is a combination of point inversion and rotation. A rotoinversion is also equivalent to a rotation followed by a reflection at a plane perpendicular to the axis of rotation. 3. Geometric neurons Conformal versors V describe in conformal Clifford group [10] representations the above mentioned transformations Fig. 8 Examples of point inversion. Fig. 10 Examples of a 90 degree rotoinversion, which is a combination of point inversion and a 90 degree rotation. 4. Fig. 9 Examples of a screw transformation. of arbitrary conformal geometric object multivectors X ∈ G(R3+1,1 ) of section 2.2 X 0 = (−1)v V −1 XV, (39) where the versor is a geometric product of v invertible vectors ∈ R3+1,1 . The geometric neuron (GN) is characterized by a twosided multiplication of a single multivector weight versor W ∈ G(R3+1,1 ), input multivectors X ∈ G(R3+1,1 ), and multivector thresholds Θ ∈ G(R3+1,1 ) Y = (−1)w W −1 XW + Θ, Conclusions We have introduced the concept of geometric algebra as the algebra of a vector space and all its subspaces. We have shown how conformal geometric algebra embeds and models Euclidean geometry. Outer products of points (including the point at infinity) model the elementary geometric objects of points, point pairs, flat points, circles, lines, spheres, planes and the embedded 3D space itself. The unified representation of affine Euclidean transformations (including translations) by orthogonal transformations in the conformal model allows the construction of a geometric neuron, whose versor weights can learn these transformations precisely. The transformations were illustrated in detail. (40) where w represents the number of vector factors (parity) in W . The theory, optimization and example simulation of such geometric neurons has been studied in [13]. It was shown that e.g. the inversion at a sphere can be learned exactly by a geometric neuron, outperforming linear networks and multilayer perceptrons with the same or higher number of degrees of freedom. Acknowledgments The author would like to thank K. Tachibana (COE FCS, Nagoya) and S. Buchholz (Kiel). He further wishes to thank God, the creator: Soli Deo Gloria, and his very supportive family. References [1] A. Hirose, Complex-Val. NNs, Springer, Berlin, 2006. [2] S. Buchholz, G. Sommer, Quat. Spin. MLP, Proc. ESANN 2000, d-side pub., pp. 377–382, 2000 [3] N. Matsui, et al, Quat. NN with geome. ops., J. of Intel. & Fuzzy Sys. 15 pp. 149-1164 (2004). [4] E. Hitzer, Multivector Diff. Calc., Adv. Appl. Cliff. Alg. 12(2) pp. 135-182 (2002). [5] D. Hestenes, G. Sobczyk, Cliff. Alg. to Geom. Calc., Kluwer, Dordrecht, 1999. [6] S. Buchholz, A Theory of Neur. Comp. with Cliff. Alg., TR No. 0504, Univ. of Kiel, May 2005. [7] D. Hestenes, H. Li, A. Rockwood, New Alg. Tools for Class. Geom., in G. Sommer (ed.), Geom. Comp. with Cliff. Alg., Springer, Berlin, 2001. [8] L. Dorst, D. Fontijne, S. Mann, Geom. Alg. for Comp. Sc., Morgan Kaufmann Ser. in Comp. Graph., San Francisco, 2007. [9] P. Angles, Conf. Groups in Geom. and Spin Struct., PMP, Birkhauser, Boston, 2007. [10] P. Lounesto, Cliff. Alg. and Spinors, 2nd ed., CUP, Cambridge, 2006. [11] S. Buchholz, K. Tachibana, E. Hitzer, Optimal Learning Rates for Cliff. Neurons, in LNCS 4668, Springer, Berlin, 2007, pp. 864–873. [12] E. Hitzer, et al. Carrier method f. gen. eval. & control of pose, molec. conform., tracking, and the like acc. Adv. in Appl. Cliff. Algs., 26 pp. (2008). [13] S. Buchholz, E. Hitzer, K. Tachibana, Coordinate independent update formulas for versor Clifford neurons Proceedings of Joint Conference SCIS & ISIS 2008, Nagoya, Japan, pp. 814–819, (2008). [14] C. Perwass, Visual Calculator CLUCalc, http://www.clucalc.info [15] C. Perwass, E. Hitzer, Space Group Visualizer, http://www.spacegroup.info
9cs.NE
IEEE TRANSACTIONS ON BIG DATA, VOL. XX, NO. X, JUNE 2016 1 Towards Real-Time Detection and Tracking of Spatio-Temporal Features: Blob-Filaments in Fusion Plasma arXiv:1505.03532v3 [cs.DC] 2 Jul 2016 Lingfei Wu, Kesheng Wu, Alex Sim, Michael Churchill, Jong Y. Choi, Andreas Stathopoulos, CS Chang, and Scott Klasky Abstract—A novel algorithm and implementation of real-time identification and tracking of blob-filaments in fusion reactor data is presented. Similar spatio-temporal features are important in many other applications, for example, ignition kernels in combustion and tumor cells in a medical image. This work presents an approach for extracting these features by dividing the overall task into three steps: local identification of feature cells, grouping feature cells into extended feature, and tracking movement of feature through overlapping in space. Through our extensive work in parallelization, we demonstrate that this approach can effectively make use of a large number of compute nodes to detect and track blob-filaments in real time in fusion plasma. On a set of 30GB fusion simulation data, we observed linear speedup on 1024 processes and completed blob detection in less than three milliseconds using Edison, a Cray XC30 system at NERSC. Index Terms—Big data analytics, spatio-temporal feature, real-time detection and tracking, blob-filaments, fusion plasma. F 1 I NTRODUCTION A W ide variety of “big data” such as simulations of diesel combustion and images of tissue from biopsy, are spatiotemporal in nature [1], [2]. When analyzing these data sets, a common task is to find coherent structure in space and time, for example, ignition kernels in combustion, and cancerous cells in medical images. There are many possible approaches to identify such a feature based on the application requirements [3], [4], [5], [6]. However, when faced with tight time constraints many of these techniques are too slow to produce an satisfactory answer. Our work was originally motivated by the need to detect spatio-temporal feature associated with instabilities in fusion plasma. Magnetic confinement fusion has the potential to be an inexhaustible source of clean energy; and billions of dollars have been invested in developing fusion reactors, like the ITER project [7]. However, steady-state plasma confinement is often interrupted by blob filaments driven by the edge turbulence. A blob filament (or blob) is a magneticfield-aligned plasma structure that appears near the edge of the confined plasma, and has significantly higher density and temperature than the surrounding plasma [8]. Blobs can • • • • L. Wu and A. Stathopoulos are with the Department of Computer Science, College of William and Mary, Williamsburg, VA, 23185. E-mail: {lfwu,andreas}@cs.wm.edu K. Wu and A. Sim are with Lawrence Berkeley National laboratory, Berkeley, CA, 94720. E-mail: {KWu,ASim}@lbl.gov M. Churchill and C. Chang are with Princeton Plasma Physics Laboratory, Princeton, NJ, 08536. E-mail: [email protected], [email protected] J. Choi and S. Klasky are with Oak Ridge National Laboratory, Oak Ridge, TN, 37831. E-mail: {choij,klasky}@ornl.gov Manuscript received in May 4th, 2015. Revised manuscript received in April 18th, 2016. also be considered as outliers because they are rare events that convect filaments of plasma outwards towards the containment wall, causing substantial heat loss, degradation of the plasma confinement, and erosion of the containment wall. By identifying and tracking these blob filaments from fusion plasma data streams, physicists can improve their understanding of the dynamics and interactions of such coherent structures (blobs) with edge turbulence. Fusion experiments and simulations could easily produce many terabytes per second; and features such as blobs have to be detected in milliseconds in order for the control system to have a chance to take mitigating actions. Though there are many well known feature extraction methods for detecting outliers, they often have some shortcomings. Classical multi-dimensional outlier detection techniques are designed to detect global outliers. However, these techniques do not distinguish between non-spatial attributes and spatial attributes and do not consider apriori information about the statistical distribution of the data [9]. Since spatiotemporal data types have unique characteristics and their relations are more complicated than ordinary data, dedicated outlier detection techniques are typically required to examine anomalies in data across space and time [5]. In this work, we propose an approach for detecting and tracking spatio-temporal features such as blobs by breaking down the process into three steps: (1) find cells that satisfying application specific requirements, (2) group cells into spatial features, and (3) track features by the amount of overlap in space. By varying the first step, this procedure could be applying to different applications. Earlier, this approach was applied to data from regular meshes [2], [10]. In this work, we will demonstrated that it can also be effectively applied to irregular mesh data. This work addresses several challenges exemplified by IEEE TRANSACTIONS ON BIG DATA, VOL. XX, NO. X, JUNE 2016 Blob Detection Data Stream 2 could satisfy the millisecond time requirement. Additional contributions of this work include: • Data Generation (Experiments or Simulations) Data Hub Blob Detection • Blob Detection Fig. 1: A real-time data analysis frame for finding blobfilaments in fusion plasma data streams the detection of blobs in fusion plasma. First off, fusion experiments and numerical simulations can easily generate massive amounts of data per run. During a magnetic fusion device experiment (or ”shot”), terabytes of data are generated over short time periods (on the order of hundreds of seconds). In the XGC1 fusion simulation [11], [12], a few tens of terabytes can be generated per second. Timely access to this amount of data can already be a challenge [13], [14], but analyzing all this data in real time is impractical. Currently, there are three types of analyses in most of fusion experiments: in-shot-analysis, between-shot-analysis, and post-run-analysis. All existing blob detection methods address post-run-analysis, but in this work, we focus on the more challenging first two cases to provide a real-time analysis so that scientists can monitor the progress of fusion experiments. Figure 1 presents a real-time analysis frame for finding blob-filaments in fusion plasma data streams. To perform this data analysis in real time, we utilize effectively modern supercomputers to address the high volume and velocity challenges arising from fusion plasma big data. This work has been integrated into the International Collaboration Framework for Extreme Scale Experiments (ICEE), a wide-area in-transit data analysis framework for near real-time scientific applications [15]. ICEE takes advantage of an efficient IO solution ADIOS [16], and a cuttingedge indexing solution FastBit [10], to design and construct a real-time remote data processing framework over widearea networks for international collaborations such as the ITER project. In this system, a blob detection algorithm is used to monitor the health of fusion experiments at the Korea Superconducting Tokamak Advanced Research (KSTAR). However, existing data analysis approaches are often single-threaded, only for post-run analysis, and take a long time to produce results. Also, compared to the simulation data, the resolution of the raw camera data may be coarse, but interesting features can still be identified after normalization. In order to meet real-time feedback requirement, we develop a real-time blob detection method, which can leverage in-situ raw data in the ICEE server and find blob-filaments efficiently during fusion experiments. Our blob detection algorithm is not limited to KSTAR only, and can be applied to other fusion experiments and simulations. In this research, we apply the three-step approach to detect and track blob structures in fusion data, with the goal of achieving millisecond response time on terabytes of data. With this response space, it is possible for the control system of the magnetic confinement fusion reactor to implement mitigating strategies in real time. To the best of our knowledge, this is the first time a blob detection method • • • We illustrate how to adopt the three-step approach to detect and track blob-filaments as an example of spatial-temporal feature on an irregular mesh. We propose a two-phase region outlier detection method for finding blob-filaments. In the first phase, we apply a distribution-based outlier detection scheme to identify blob candidate points. In the second phase, we adopt a fast two-pass connected component labeling (CCL) algorithm from [17] to find different region outliers on an irregular mesh. We develop a high-performance blob detection approach to meet real-time feedback requirements by exploiting many-core architectures in a large cluster. We propose a scheme to efficiently track the movement of region outliers by linking the centers of the region outlier over consecutive frames. We have implemented our blob detection algorithm with hybrid MPI/OpenMP, and demonstrated the effectiveness and efficiency of our implementation with a set of data from the XGC1 fusion simulations. Our tests show that we can achieve linear time speedup and complete blob detection in two or three milliseconds using a cluster at NERSC. In addition, we demonstrate that our method is more robust than recently developed state-of-the-art blob detection methods in [18], [19]. The rest of paper is organized as follows. In Section II, we give the problem formulation of the blob detection and discuss related work. In Section III we describe in detail our three-step approach consisting of a two-phase region outlier detection algorithm and a tracking scheme for identifying and tracking blobs. We then present a realtime blob detection approach by leveraging MPI/OpenMP parallelization in a large cluster in Section IV. The blob detection and tracking results and its real time evaluation are shown in Section V. We conclude the paper, and give our future plans in Section VI. 2 P ROBLEM D EFINITION AND R ELATED W ORK In this section, we introduce our problem definition and discuss previous work related to our study. For related work, we first discuss existing research work on outlier detection, and then review previous work on blob detection in fusion plasma domain. 2.1 Problem Definition Extracting spatial-temporal features play an important role in analyzing scientific and engineering applications, including behavior recognition [20], bioinformatics [21], video analysis c [22], and health informatics [23]. Depending on the applications, mining spatial features in one time frame and relationships among spatial objects in and across time frames are extremely challenging tasks due to three reasons. First, the extent and shape of a feature could be an important indicator in determining its influence. However, due to various data type (regular and irregular), it is not easy to apply a generic approach for all applications. Second, IEEE TRANSACTIONS ON BIG DATA, VOL. XX, NO. X, JUNE 2016 3 2.2 Fig. 2: A contour plot of the local normalized density in the region of interests in one time frame in fusion experiments or numerical simulations. A cross-section of the torus is called a poloidal plane. R and Z are cylindrical coordinates and the major radius of the torus is denoted by R. effectively incorporating the temporal information in the overall analysis is a necessity to uncover interesting upcoming events. Finally, how to process very large data sets in real time demands appropriately responding to extreme scale computing and big data challenges. In this work, we attack this problem by presenting a three-step approach for detecting and tracking spatio-temporal features in the context of blob-filament detection in fusion plasma. The definition of a blob is varied in the literature depending on fusion experiments or simulations as well as available diagnostic information for measurements [8]. This makes blob detection a challenging task. Figure 2 plots local normalized density distribution in the regions of interest in one time frame. We can observe that there are two reddish spots located at the left portion of the figure, which are associated with blob-filaments and are significantly different from their surrounding neighbors. It is clear that a reddish spot is not a single point but a group of connected points or a region. Therefore, we formulate the blob detection problem as a region outlier detection problem. Similar to the spatial outlier [9], a region outlier is a group of spatial connected objects whose non-spatial attribute values are significantly different from those of other spatial surrounding objects in its spatial neighborhood. Figure 2 shows blobs are region outliers. The number of region outliers detected is determined by pre-defined criteria provided by domain experts. The problem is to design an efficient and effective approach to detect and track different shapes of region outliers simultaneously in fusion plasma data streams. By identifying and monitoring these blob-filaments (region outliers), scientists can gain a better understanding about this phenomena. In addition, a data stream is an ordered sequence of data that arrives continuously and has to be processed online. Due to the high arrival rate of data, the blob detection must finish processing before the next data chunk arrives [24]. Therefore, another critical problem is to develop a high-performance blob detection approach in order to meet the real-time requirements. Outlier Detection The problem of outlier detection has been extensively studied and can be generally classified into four categories: distance-based, density-based, clustering-based, and distribution-based approaches [3], [25]. Distance-based methods [26] use a distance metric to measure the distances among data points. If the number of data points within a certain distance from the given point is less than pre-defined threshold, then this point is determined as an outlier. This approach could be very useful with accurate pre-defined threshold. However, it may not be proper to use a simple threshold if different densities in various regions of the data exhibit across space or time. Density-based methods [27] assign a local outlier factor (LOF) to each sample based on their local density. The LOF determines the degree of outlierness, where samples with high LOF value are identified as outliers. This approach does not require any prior knowledge of underlying distribution of the data. However, it has a high computational complexity since pair-wise distances have to be computed to obtain each local density value. Clustering-based methods [28] conduct clustering-based techniques on the sample points of the data to characterize the local data behavior. Since this method does not focus on outlier detection, the outliers are produced as by-products and it is not optimized for outlier detection. Distribution-based methods [9] applies machine learning techniques to estimate a probability distribution over the data and develop a statistical test to detect outliers. These methods use all dimensions to define a neighborhood for comparison and typically do not distinguish non-spatial attributes from spatial attributes. In the context of data streams, a line of research has been devoted to develop efficient outlier detection techniques [24], [29], [30], [31], [32], [33]. But their main focus is to solve the problem of event detection in sensor network [29], query processing [30], [32], clustering [31], and graph outliers [33]. Therefore, these methods cannot be easily generalized to region outlier detection problems. In addition, the problem of blob detection presents a special challenge, because the spatiotemporal attributes of the blob-filaments has to be considered together to study their various characteristics including speed, direction, movement, and size. More importantly, these methods are mostly single-threaded which cannot cope with real-time requirements in fusion plasma. A number of distributed outlier detection methods have also been studied in [29], [34], [35], [36], [37]. Most of these methods are seeking an efficient way to parallelize classical outlier detection methods such as distance-based outliers [35], [37], distribution-based outliers [29], densitybased outliers [35], density-based outliers [36], and PCAbased techniques [34]. However, there methods are not generally applicable to region outlier detection and tracking. In particular, in order to tackle high volume and velocity challenges arising from fusion plasma big data, specialized outlier detection scheme and suitable high performance computing technique are demanded to complete blob detection in the order of milliseconds. In the first two steps of our proposed approach, we apply distribution-based outlier detection to detect outlier points by considering only non-spatial attributes and then IEEE TRANSACTIONS ON BIG DATA, VOL. XX, NO. X, JUNE 2016 leverage fast CCL to construct the region outliers by taking into account spatial-attributes. We choose distribution-based outlier detection since it can solve the problem of finding outliers efficiently if an accurate approximation of a data distribution can be properly found [9], [29]. Normally the distribution of the stream data may change over time [5]. However, this assumption may not hold in fusion experiments since a fusion experiment lasts very short time period from a few seconds to hundreds of seconds. Therefore, we consider the simpler problem of fixed distribution parameters, noting that several fusion devices have shown similar distribution functions of blob events. Then we can perform exploratory data analysis to compute best fitted distribution parameters offline and then build an accurate online distribution model. We leave the more complicated problem of real-time distribution estimation for future work. 2.3 Blob Detection in Fusion Plasma Independently, fusion blob detection problems have been researched by the physics community in the context of coherent structures in fusion plasma [8]. Various post-run blob detection methods have been proposed to identify and track these structures, to study the impact of the size, movement and dynamics of blobs. A plasma blob is most commonly determined by some threshold, computed statistically in the local plasma density signal [38], [39], [40]. However, the exact criteria have varied from one experiment to another, which reflects the intrinsic variability and complexity of the blob structures. In [38], a conditional averaging approach is applied to analyze spatio-temporal fluctuation data. When the vorticity is larger than one standard deviation at some time frame, a blob is considered to be detected by the probe. In [39], the conditional averaging technique is also used to study the evolution of the blob-filaments using Langmuir probes and a fast camera. Without using a conditional averaging technique, [40] searches for blob structures can be done using local measurements of the 2D density data obtained from a 2D probe array. Identification of a blob is based on the choices of several constraints such as the threshold intensity level, the minimum distance of blob movement, and the maximum allowed blob movement between successive frames. The trajectories of the different blobs can be computed with the blob centers based on identification results in each time frame. The seminal work by Zweben, et. al. [40] was the first attempt to take only individual time frame data into account to detect blobs and track their movements, although the process of identification of a blob was somewhat arbitrary and oversimplified. Due to the emergence of fast cameras and beam emission spectroscopy in the last decade, the situations of insufficient diagnostic access and limited spatial and temporal resolution have been greatly improved. In the context of computer version, a number of methods have been developed to tackle blob detection problem, which is aimed to detect points or regions in the image that either brighter or darker than the surrounding [41]. Among them, scale-space methods based on the Laplacian of Gaussian [42], [43], [44] and Watershed detection methods based on local extrema in the intensity landscape [45] are two main classes of blob detectors. In 4 [46], Love and Kumath made the first attempt to apply an image analysis using Watershed techniques for identifying blobs in fusion plasma. The images are first processed to remove the noise spikes, followed by further smoothing using a Gaussian filter, and then identified by various image segmentation techniques. However, due to noise and lack of a ground truth image, this approach can be sensitive to the setting of parameters, and it is hard to use generic method for all images. In addition, the output from visualization is not convenient to feed into other analysis [2]. The regions of interest computed from this work can be more conveniently fed into other analyses. For instance, one can compute blobs in the regions of interest very quickly and transmit these compact meta information over internet to remote domain scientists for real-time analysis. Recently, several researchers [18], [19], [47] have developed a blob-tracking algorithm that uses raw fast camera data directly with GPI technique. In [18], [19], they leverage a contouring method, database techniques and image analysis software to track the blob motion and changes in the structure of blobs. After normalizing each frame by an average frame created from roughly one thousand frames around the target time frame, the resulting images are contoured and the closed contours satisfying certain size constraints are determined as blobs. Then, an ellipse is fitted to the contour midway between the smallest level contours and the peak. All information about blobs are added into a SQL database for more data analysis. This method is close to our approach but it can not be used for real-time blob detection since they compute time-averaged intensity to normalize the local intensity. Additionally, only closed contours are treated as blobs, which may miss blobs at the edges of the regions of interest. Finally, these methods are still post-run-analysis, which cannot provide real-time feedback in fusion experiments. 3 O UR PROPOSED APPROACH Given a fusion data stream, which consists of a time ordered sequence of sample frames that arrive continuously from fusion experiments or numerical simulations through remote direct memory access protocols. Our data sets are simulated electron density from the fusion simulation code XGC1 [11], [12]. In the present data sets, simulation data is captured every 2.5 microseconds for a total time window of 2.5 milliseconds. Each point si ∈ S in a time frame t has a spatial attribute (r, z, t) which defines its location in a triangulated measurement grid, and some non-spatial attributes including all important plasma quantities such as electron density ne (r, z, t) as well as connectivity information in a poloidal plane. The spatial neighborhoods are defined for each point from the connectivity database in a triangulated grid. Formally, an region outlier responding to a blob is defined as a spatial area in the regions of interest where a subset Bi ⊆ S is a group of connected points si . Our overall goal is to develop an approach to detect and track spatial region outliers (blobs) over time using a stream of fusion data. To achieve this, we break down the process into three steps: (1) find outlier points in the region of interests, (2) group these outlier points as different region outliers, and (3) track these regions outliers by the IEEE TRANSACTIONS ON BIG DATA, VOL. XX, NO. X, JUNE 2016 5 Density distribution fitting using 50 bins 4 7 Fusion data stream x 10 7 5 4 3 2 1 Outliers: (si, ne(ri, zi, t)) 0 0 Fig. 3: Two-phase region outlier detection for finding blobs Magnetic Fields in Poloidal Plane Poloidal Plane Region of Interests Reinfed Original 0.25 1 0.2 0.15 0.1 Z (m) Z (m) 0.5 0 0.05 0 −0.05 -0.5 −0.1 −0.15 -1 −0.2 -1.5 1 1.2 1.4 1.6 1.8 2 2.2 R (m) (a) Regions of interest 2.4 −0.25 2.25 2.26 2.27 2.28 2.29 R (m) 2.3 2.31 2.32 (b) Refined mesh Fig. 4: An example of the regions of interest and the comparison between refined and original triangular mesh vertices in the R (radial) direction and the Z (poloidal) direction. overlapping in space. We address the first two steps by presenting a two-phase approach, as shown in Figure 3. In the first phase, we apply a distribution-based outlier detection algorithm to the fusion data stream in order to detect outlier points which have significantly higher nonspatial attributes than other points. The outputs of this step are tuples (si , ne (ri , zi , t)), the 2D spatial attributes, and non-spatial attributes such as electron density. These tuples, as well as connectivity information, are used as input for the second phase, where region outlier are detected by applying a fast CCL [17] to efficiently find different connected components on the triangular mesh. The outputs of the CCL-based region outlier detection algorithm are a set of connected components with outlier points inside, which are associated with blobs if some criteria are satisfied. We address the last step by proposing an efficient blob tracking algorithm by leveraging cues from changes of blobs area and distance of center of blobs. Note that, by varying the first step, this procedure could be applying to different applications. In the following section, we describe the proposed twophase region outlier detection in detail. 3.1 4 3 2 4 6 8 Normalized electron density (n_e/n_e0) 10 12 0 0 2 4 6 8 Normalized electron density (n_e/n_e0) 10 12 (b) Log Normal Fig. 5: An example of exploratory data analysis to analyze the underlying distribution of the local normalized density over all poloidal planes and time frames. Region outliers: Blobs 1.5 5 1 2 (a) Extreme Value CCL-based region outlier detection x 10 6 Number of points in each bin Number of points in each bin 6 Distribution-based outlier detection Density distribution fitting using 50 bins 4 Distribution-Based Outlier detection The main task of this phase is to perform efficient outlier detection to determine outlier points which form the region outliers associated with blobs. To facilitate this goal, we propose a novel distribution-based outlier detection algorithm based on the electron density with various criteria for fusion plasma data streams. We separate spatial attributes from non-spatial attributes and consider the statistical distribution of the non-spatial attributes to develop a test based on distribution properties, since it is more suitable for detecting spatial outliers [9]. As claimed in [29], it is very efficient to find outliers by using a data distribution approximation if we estimate the underlying distribution of data accurately. Values for various criteria are determined by domain experts or subjectively by examining the resulting plotting and adjusting them until satisfied. In the proposed outlier detection we firstly preprocess the sample frame to compute needed quantities in the region of interests, as shown in Figure 4a. Then it is analyzed by normalizing the total electron density ne (r, z, t) (which includes fluctuations) with respect to the initial background electron density, ne (r, z, 1) (if using real diagnostic data from, e.g. GPI, actual emission intensity I(r, z, t) would be used instead of electron density). Note that using the initial time frame as the benchmark is an important factor to achieve real-time blob detection. The normalized electron density in the subsequent time frames can be easily computed, especially compared to the time-average electron density with a long time interval [19]. Algorithm 1 Triangular mesh refinement algorithm 1: 2: 3: 4: 5: Input/output: triGrid: connectivity array of the triangular mesh (r, z): spatial coordinate of each point ne : normalized electron density of each point Compute unique edges E and indices vector IE by sorting and removing duplicates based on triGrid Compute spatial coordinate of each new vertices in the middle of E based on (r, z) Compute electron density of each new vertices on E by performing linear interpolation based on ne Compute indices for each new vertices by adding vector index IE with the number of original points Compute a new triangular mesh by assigning appropriate indices from each new and old vertices To obtain meaningful region outliers using the CCL method, it is necessary to have fine grained connectivity information. This particular simulation mesh has coarse vertical resolution, so resolution enhancement techniques are applied to generate a higher resolution triangular mesh based on the original triangulated mesh. As shown in Algorithm 1, the resulting triangular mesh is refined to achieve IEEE TRANSACTIONS ON BIG DATA, VOL. XX, NO. X, JUNE 2016 6 four times better granularity. We split each original triangle into four smaller ones by linking three middle points of the original mesh edges in each triangle. The corresponding density of generated vertices can be obtained using linear interpolation of the original triangular mesh. This step can be applied recursively until the satisfactory resolution of the triangular mesh is computed. Figure 4b shows the resulting triangular mesh vertices after applying the triangular mesh refinement algorithm once. In order to apply an appropriate predefined quantile in two-phase distribution-based outlier detection, it is advised to perform exploratory data analysis to exploit main characteristics of the data sets. Figure 5 reveals that extreme value distribution and log normal distribution are fitted best with one of our sample data sets (after comparing over sixteen different common distributions). After analyzing the underlying distribution, a novel outlier detection is performed to determine outlier points in the regions of interest. The basic idea of the proposed two-step outlier detection is motivated from the observations that there are relatively high density areas (a half banded ellipse area with cyan color) in the edge and several significantly high density small regions (a few small areas with reddish yellow color) in these relatively high density areas, as shown in Figure 2. The proposed outlier detection method extends the previous approach that applies statistical detection with conditional averaging intensity value [38], [39], and applies more intelligent outlier detection with only considering individual time frame data. Compared to traditional single threshold segmentation approach, our approach is more generic, flexible and easier to tune a satisfactory result. In the first step, the standard deviation σ and the expected value µ are computed over all sixteen poloidal planes in one time frame. Using the best fitted distribution, we apply first step outlier detection to identify the relative high density areas with a specified predefined quantile: N (ri , zi , t) − µ > α ∗ σ, ∀(ri , zi ) ∈ Γ (1) where N is the normalized electron density, α is the multiple of σ associated to the specified predefined quantile and Γ is the domain in the region of interests. Once the relative high density regions are determined, we compute another standard deviation σ2 and the expected value µ2 in these areas. Then we employ second step outlier detection to identify the outlier points in the relative high density areas with an appropriately chosen predefined quantile: N (ri , zi , t) − µ2 > β ∗ σ2 , ∀(ri , zi ) ∈ Γ2 (2) where β is the multiple of σ2 associated to the judiciously chosen confidence level and Γ2 is the domain of blob candidates. In practice, α and β can be chosen to be same or different, depending on the characteristics of blob-filaments. In our experience, the α value is generally greater than β since the standard deviation σ over the region of interests is much smaller than the standard deviation σ2 from the relative high density areas. However, two-step outlier detection alone cannot be used to distinguish the blob candidates since identified blob candidates may actually have small density, which does not satisfy traditional definition of blobs. Therefore, the density of the mesh points in the outlier points smaller than a certain minimum absolute value criterion need to be filtered out. On the other hand, it is also possible that the middle areas between surrounding plasmas and outlier points have density higher than the given minimum absolute value criterion. Thus, we also apply a minimum relative value criterion to remove these unwanted points. To combine these two rules together, we have a more robust and flexible criterion: N (ri , zi , t) > max(dma , (dmr ∗ µ2 )), ∀(ri , zi ) ∈ Γ3 (3) where dma and dmr are minimum absolute value and minimum relative value respectively, and Γ3 is the domain of good blob candidates. 3.2 CCL-Based Region Outlier Detection The main task of the second phase is to apply an efficient connected component labeling algorithm adopted from [17] on a refined triangular mesh to find different blob candidate components. A connected component labeling algorithm generally considers the problem of labeling binary 2D images with either 4-connectedness or 8-connectedness. It performs an efficient scanning technique, and fills the label array labels so that the neighboring object pixels have the same label. Wu [17] presents an efficient two-pass labeling algorithm that is much faster than other state-of-theart methods and theoretically optimal. However, since we process a refined triangular mesh rather than the traditional 2D images, we have modified their CCL algorithm to take the special features of a triangular mesh into account. As shown in Algorithm 2, each triangle is scanned first rather than a point. Since we know the three vertices in a triangle are connected, we can reduce unnecessary memory accesses once any vertex in a triangle is found to be connected with another vertex in a different triangle. Then we compute the current minimum parent label in this triangle, and assign each vertex a parent label if its label has already filled or a label if its label has not initialized yet. If all three vertices in a triangle are scanned for the first time, then a new label number is issued and assigned to their labels and the associated parent label. After the label array is filled full, we need flatten the union and find tree. Finally, a second pass is performed to correct labels in the label array, and all blob candidates components are found. Note that to perform efficient union-find operations, the union-find data structure is implemented with a single array as suggested in [17]. After all blob candidates are determined, a blob is claimed to be found if the median of a blob candidate component satisfies a certain minimum absolute median value criterion. The reason we are setting this constraint to select the blobs is that the minimum value criterion has to be a reasonably small value in order to produce more blob candidate components. It is possible that if the minimum absolute median value criterion is too large, it may also remove the blobs. On the other hand, it is also possible if this value is too small, it does not have effect on filtering out unwanted components. Therefore, with the same philosophy of measurement, a minimum relative median value criterion is also applied to determine the blobs. However, in order to protect the blobs from being removed due to the extremely large mean value µ2 , we also set the maximum absolute IEEE TRANSACTIONS ON BIG DATA, VOL. XX, NO. X, JUNE 2016 7 Algorithm 2 Connected component labeling algorithm on triangular mesh to find various blob candidates components 1: 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: Input: triGrid: connectivity array of the triangular mesh Output: Bc : Region structure of each blob candidate Initialize label, parentLabel, and labnum for Scanning each triangle until the end of triGrid do if label of three vertices are all zero then Assign a new labnum to all three vertices Update label and parentLabel with labnum else Find the minimum parentLabel of all three vertices Update their label and parentLabel with this value end if end for for Scanning until the end of parentLabel do Update parentLabel by flattening union-find tree end for for Scanning until the end of Label do Update Label with latest parentLabel end for Find each Bc of points with same parentLabel median value criterion to limit the power of minimum relative median value criterion. We unify these three rules to be one: N (ri , zi , t) > max(dˆma , min((dˆmr ∗ µ2 ), dˆxa )), ∀(ri , zi ) ∈ Γ4 (4) where dˆma , dˆmr and dˆxa are minimum absolute and relative median values and maximum absolute median value respectively and Γ4 is the domain of blobs. 3.3 Tracking Region Outliers The objective of the third step is to track the direction and speed of the detected blobs over time. The blob tracking algorithm has to cope with the problem of tracking multiple region outliers simultaneously even when the blobs merge together or split into separated ones. On the other hand, the blob tracking method should be simple and efficient to meet real-time requirements. To achieve this goal, we propose an efficient blob tracking algorithm by leveraging cues from changes of blobs area and distance of center of blobs. We compute the correspondence between previously tracked blobs and currently detected blobs, and then recover the trajectories of the tracked blobs. To identify the location center of detected blob, we compute the density-weighted average of the spatial coordinates of each point inside a blob. (rc , zc ) = n 1 X (r, z)ne M i=1 (5) where M is summation of ne of all points in a blob. The density-weighted average is used to better capture the center of density of a blob. We track the movement of these detected blobs by linking the centers in consecutive time frames. In order to obtain the boundary of region outliers (blobs), we compute the convex hull [48] of a set of points in a blob. The area of a blob is computed by counting the number of points in a blob. Algorithm 3 Efficient blob tracking algorithm 1: 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: Input: B : Current detected blobs T : Previous blob tracks Output: T : Updated blob tracks with B appended Initialize hull, cen, and area hull = getBoundary(B ) cen = getCenter(B ) area = getArea(B ) for Scanning until the end of B do cenDis = getCenterDis(B ,T ) areaDif = getAreaDif(B ,T ) if cenDis ≤ maxJump ∧ areaDif ≤ maxDif then Find a blob track T with smallest cenDis Append current blob into this blob track T end if end for Update T with hull, cen, area, and computed speed As shown in Algorithm 3, the input parameters are current detected blobs and the previous blob tracks. The data structure of a blob track is composed of the track ID, the length of track, the area of previous blob, the timestamps, the center points, the boundary points, and the velocity. There are two heuristics to verify whether a blob is associated with an existing blob track. The first heuristic is based on the fact that the area of a blob between consecutive time frames cannot decrease or increase significantly. The second heuristic takes into account the distance of the centers of a blob does not change dramatically over very short time period (microseconds). The proper thresholds for these two heuristics are provided by domain experts. Since blobs can appear, disappear, merge together or split, a greedy scheme is applied to find the best matching pair of blob and track based on closest distance of the centers of current detected blob and the latest blob in a blob track. Based on computed correspondence between a blob track and the currently detected blobs, existing blob tracks are automatically processed through corresponding operations such as adding a blob into a track, creating a new track, and a track ending. If the length of a track is smaller than 3 consecutive time frames, the track will be treated an anomaly and deleted due to errors in data or inappropriate blob detection thresholds. The speed and direction of the blobs can thus be computed from two consecutive center points. Finally, we can recover the trajectories of the tracked blobs by monitoring the movement of blob centers. 4 A REAL - TIME BLOB DETECTION APPROACH Existing blob detection approaches cannot tackle the two challenges of the large amount of data produced in a shot and the real-time requirement. In addition, existing data analysis approaches are often operated in a single thread, only for post-run analysis and often take a few hours to generate the results [49]. In order to meet the real-time feedback IEEE TRANSACTIONS ON BIG DATA, VOL. XX, NO. X, JUNE 2016 8 Total number 24 of MPI × OpenMP Simulation or experiment data 8 MPI Blob Det Blob Det + Comm 7      Pi   OpenMP      T1        T2   …        Tm          Pn   OpenMP      T1          T2   …        Tm   Normalized Runtime      P0   OpenMP      T1        T2   …      Tm   Fig. 6: Hybrid MPI/OpenMP parallelization requirement, we address these challenges by developing a high performance blob detection approach, which can leverage in situ raw data and find blob-filaments efficiently in fusion experiments or numerical simulations. 4.1 A hybrid MPI/OpenMP parallelization The key idea is to exploit many cores in a large cluster system by running MPI to allocate n processes to process the data in one or several time frames at the high level, and by leveraging OpenMP to accelerate the computations using m threads at the low level. Figure 6 shows our hybrid MPI/OpenMP parallelization for blob detection. Using this approach, we can complete our blob detection in a few milliseconds with in situ evaluation. In order to achieve blob detection in real time, the goal is to minimize data movements in the memory and speed up computation. Ideally, the performance is optimal without any communication if we can perform the job correctly. The proposed blob detection algorithm in the previous section supports embarrassingly parallel since we only need the initial time frame and the target time frame to do the computation. This is an important difference between our blob detection method and recently developed methods [18], [19] in terms of real-time requirement. Furthermore, we explore many-core processor architectures to speed up the computation of each MPI task by taking full advantage of multithreading in the shared memory. Therefore, our real-time blob detection approach based on hybrid MPI/OpenMP parallelization is a natural choice and is expected to provide the optimal performance for fusion plasma data streams. A practical interesting issue is how to tune the number of MPI processes and OpenMP threads for the best performance by taking both analysis speed and memory size into account. As shown in Figure 7, we vary the number of MPI processes and OpenMP threads but fix the total number to be 24 for investigating the performance when processing the same amount of time frames data. A faster analysis speed is achieved when increasing the number of MPI processes since more data frames can be processed simultaneously. On the other hand, the analysis speed remains constant with a few OpenMP threads and degrades with more OpenMP threads due to lack of enough computation in one time frame. However, more OpenMP threads could significantly reduce the memory demands. Therefore, in this study, we choose the number of OpenMP threads to be four for each MPI task, to achieve a good trade off between analysis speed and memory savings. 6 5 4 3 2 1 0 0 5 10 15 Number of MPI 20 25 Fig. 7: Investigate the performance of hybrid MPI/OpenMP parallelization when varying number of MPI processes and OpenMP threads. The blue triangle denotes only normalized blob detection time. The red star denotes the normalized total time including both blob detection time and initial communication time for broadcasting the first time frame to all analysis nodes for normalization. 4.2 Outline of the implementation We implement our blob detection algorithm in C with a hybrid MPI/OpenMP parallelization. Algorithm 4 summarizes the proposed blob detection algorithm without considering OpenMP. Users can specify the regions of interest by (Rmin, Rmax, Zmin, Zmax), the range of target time frames by (t start, t end), and the location of the data sets. However, with in situ evaluation, there is no need to specify the file location since all data are already in memory. We use static scheduling to evenly divide the number of time frames for each MPI task for efficiency. The n MPI processes are allocated to process one or several time frames and m OpenMP threads are launched to accelerate the computation in one time frame. Note that the MPI process is also the master thread in the runtime environment. At the beginning, the initial time frame data is broadcasted to all MPI processes so that normalization can be performed with new coming time frames. Then each MPI process embarrassingly process the data in each time frame with multithreading in the shared memory. Only detected blobs information are maintained and added into local database. Since these local blobs information are very compact, they can be efficiently transmitted over internet to remote servers for real-time analysis by domain scientists. 5 E XPERIMENTS AND R ESULTS In this section we present experimental evaluations of our blob detection and tracking algorithms, and report the performance of the real-time blob detection under both strong and weak scaling. Before showing experimental results in the next section, we briefly introduce our experimental environment, data sets, and parameter setting in our blob detection and tracking algorithms. We have tested our implementation on the NERSC’s newest supercomputer Edison, where each compute node has two Intel “Ivy Bridge” processors (2.4GHz with 12 cores) and 64 GB of memory. IEEE TRANSACTIONS ON BIG DATA, VOL. XX, NO. X, JUNE 2016 Algorithm 4 A real-time blob detection approach 1: 2: 3: 4: 5: 6: 7: 8: 9: Input: Rmin, Rmax, Zmin, Zmax: specify region of interest t start, t end : start and end time frames FileDir: location where data sets locate Output: B : Detected region outliers (blobs) Apply static scheduling to assign equal amount of n time frames data to each MPI process Broadcast the initial time frame to all MPI processes for t = 1 : n do Process i loads raw data in one frame and computes normalized density ne (r, z, t) in region of interest Refine the triangular mesh. See Algorithm 1 Apply two-phase distribution-based outlier detection to identify outliers with various criteria Apply CCL-based region outlier detection on a triangular mesh to find blob components. See Algorithm 2 A blob is added into B if certain criteria is satisfied end for Our base data sets are simulation data sets with 1024 time frames based on the XGC1 simulation [11] [12] from the Princeton Plasma Physics Laboratory, which last around 2.5 milliseconds. One of our main goals is that we can control analysis speed by varying the number of processes to complete the blob detection on the entire data set in a time close to 2.5 milliseconds. It would indicate that our algorithm could monitor fusion experiments in real time (neglecting data transfer latency). If we consider internet transfer latency in real experiments or numerical simulation, the system needs at least 1 to 25 milliseconds to transfer one time frame data depending on size of data, which may give us more time for data analysis. Another goal is to validate the effectiveness of the proposed algorithms. In Algorithm 4, we apply various criteria to identify the blobs. The parameters for blob detection and tracking in our experiments are given in Table 1. One criterion we have not mentioned in the previous section is parameter “minArea”. This parameter is used to decide how many points a blob should have, which is used to remove impossibly small blobs. In our experiment, this parameter is set to three since there are at least three vertices connected as a 2D component in a triangular mesh. Another criteria are parameters “maxFrames” and “minFrames”, which are used to control the length of a blob track and remove noisy tracks. It is important to note that these parameters need to be tuned in order to achieve optimal performance in different fusion experiments or numerical simulations. The reasons for this uncertainty in the context of blob detection are from the intrinsic variability and complexity of the blob structures observed in different experiments [8]. 5.1 Performance comparison We first conduct experiments to compare our method with recently developed state-of-the-art blob detection methods in [18], [19]. Since their methods are based on the contouring methods and thresholding, we call their methods the contouring-based methods. We have to point out that 9 TABLE 1: Parameters setting for the proposed blob detection and tracking algorithms on XGC1 simulation data sets detection criteria minArea 3 minRden (dma ) 1.2 minAbsden (dmr ) 2.05 maxAbsMden (dˆxa ) 2.75 minMden (dˆma ) 1.3 minAbsMden (dˆmr ) 2.15 tracking criteria maxAreaChange 25 maxJump 0.04 maxFrames 100 minFrames 3 strictly quantitative comparisons are not possible since the blob itself is not well-defined [8]. Due to this reason, there are rarely direct comparisons between any new proposed method and existing ones in the literature in the domain of fusion plasma [18], [19], [38], [39], [40], [46], [47], [49]. However, in order to demonstrate that our methods is more robust than the contouring-based methods, we compare these two methods in two typical cases to shed light on their performance in terms of the detection accuracy. Figure 8 shows the comparison of the blob detection results between our region outlier detection method and the contouring-based methods in two different time frames. As shown in Figures 8a and 8b, we can see that our region outlier detection method does not miss detecting the blob at the edge of the regions of interest while the contouringbased methods fail the detection. The reason is that the contouring-based methods require the computed contours are closed, which do not exist at the edge of the regions of interest. In Figures 8c and 8d, we notice that our region outlier detection method can accurately detect all blobs. However, the contouring-based methods either yield the blobs with incorrect areas (much larger or smaller), or misdetect the wrong area as a blob. This is because that it is hard to use one single threshold to identify the blobs for various time frames even in the same experimental data. Our region outlier detection method does not have such problem since we use more flexible distribution-based outlier detection. 5.2 More blob detection results We perform more experiments to comprehensively examine the blob detection results in five continuous time frames and four different poloidal planes as shown in Figure 9. As we can see from the figure, our region outlier detection method can provide consistently good results in different situations. In addition, our method does not miss any blobs at the edge of the regions of interest, as shown in subfigures 9b, 9g, 9c and 9h. It is interesting to see that large-scale blob structures are often generated, which could cause substantial plasma transport [40]. As pointed out in [50], these large-scale structures are mainly contributed by the low-frequency and long-wavelength fluctuating components, which may be responsible for the observations of long-range correlations. We also noticed that different poloidal planes may display significant diversity in edge turbulence, even in the same time frame. We have shown that we are able to effectively detect the blobs and reveal some interesting results to help physicists improve their understanding of the characteristic of blobs and their correlation with other plasma properties. IEEE TRANSACTIONS ON BIG DATA, VOL. XX, NO. X, JUNE 2016 10 Blob Detection: time frame 45 and Poloidal plane 1 4 0.25 3.5 0.2 3 0.15 Z value 0.1 2.5 0.05 2 0 1.5 −0.05 −0.1 1 −0.15 0.5 −0.2 −0.25 2.25 2.26 2.27 2.28 R value 2.29 2.3 0 2.31 (a) Contouring-based methods (b) Region outlier detection method Blob Detection: time frame 87 and Poloidal plane 1 4 0.25 3.5 0.2 3 0.15 Z value 0.1 2.5 0.05 2 0 1.5 −0.05 −0.1 1 −0.15 0.5 −0.2 −0.25 2.25 2.26 2.27 2.28 R value 2.29 2.3 2.31 0 (c) Contouring-based methods (d) Region outlier detection method Fig. 8: Two examples of comparing our region outlier detection method with the Contouring-based methods in the R (radial) direction and the Z (poloidal) direction. The separatrix position is shown by a white line and the different pink and blue circles denote blobs. 5.3 Blob tracking results We investigate the blob tracking results in two different situations. Figure 10a exhibits a 2D trajectory of a blob. Again, the trajectory is generated by plotting the location of the density peak of the detected blobs over five consecutive time frames. We can see that our blob tracking algorithm can track two separate blobs simultaneously. The blob size can grow when they move towards confined plasma in the right region of separatrix. Figure 10b shows a 3D trajectory for a detected blob over fifteen consecutive time frames. In this case, the blob seems to maintain its size for a few time frames, then gradually decreases, and eventually disappears. Through these interesting results, physicists may be able to understand the characteristics of blobs better. 5.4 Real-time blob detection under strong scaling We have illustrated the effectiveness and robustness of the proposed blob detection and tracking methods. Next, we perform a set of experiments to demonstrate the performance of our real-time blob detection approach under strong scaling and weak scaling. We define the speedup of our parallel implementation on heterogeneous multi-core architecture as follows: runtime of Blob detection using single core speedup = runtime using P cores Our most encouraging results are that we can complete blob detection on the simulation data set described above in around 2 milliseconds with MPI/OpenMP using 4096 cores and in 3 milliseconds with MPI using 1024 cores. In Figure 11, we can achieve linear time speedup in blob detection time under strong scaling. The MPI and the MPI/OpenMP implementations accomplish 800 and 1200 times speedup respectively, when the number of processes is scaled to 1024. Also, we can see that the hybrid MPI/OpenMP implementation is about two times faster than the MPI implementation when varying the number of processes from 1 to 512. With 1024 processes, both of them achieve similar performance, but the MPI/OpenMP one is slightly better. This demonstrates that we are able to control analysis speed by varying the number of processes to achieve real-time analysis. 5.5 Real-time blob detection under weak scaling In this experiment, we evaluate the performance of our real-time blob detection under weak scaling. We replicate existing data sets (30GB) in order to obtain adequate experimental data sets (4.3TB). The basic unit data contains IEEE TRANSACTIONS ON BIG DATA, VOL. XX, NO. X, JUNE 2016 11 (a) Frame 82 and plane 1 (b) Frame 83 and plane 1 (c) Frame 84 and plane 1 (d) Frame 85 and plane 1 (e) Frame 86 and plane 1 (f) Frame 82 and plane 2 (g) Frame 83 and plane 2 (h) Frame 84 and plane 2 (i) Frame 85 and plane 2 (j) Frame 86 and plane 2 (m) Frame 84 and plane (k) Frame 82 and plane 3 (l) Frame 83 and plane 3 3 (n) Frame 85 and plane 3 (o) Frame 86 and plane 3 (p) Frame 82 and plane 4 (q) Frame 83 and plane 4 (r) Frame 84 and plane 4 (s) Frame 85 and plane 4 (t) Frame 86 and plane 4 Fig. 9: An example of the blob detection in five continuous time frames and four different poloidal planes in the R (radial) direction and the Z (poloidal) direction. The separatrix position is shown by a white line and the different blue circles denote blobs. Trajectory of region outlier (blobs) 158 156 Time frame 154 152 150 148 146 144 0.2 0.1 2.3 0 2.28 −0.1 Z value (a) 2D trajectory for detected blobs −0.2 2.26 R value (b) 3D trajectory for detected blobs Fig. 10: 2D and 3D center trajectories for detected blobs over consecutive time frames. The red solid polygon indicates the starting times of the blobs tracked while the blue broken polygons indicate subsequent times of the same blobs tracked. The centers of the moving blobs are linked to show their trajectories of the blob motion. The pink line represents the separatrix. 128 time frames and the size of data increases linearly with the number of processes. In Figure 12, the blob detection time remains almost constant under weak scaling, which indicates that our implementations scale very well to solve much larger problems. Also, both MPI and MPI/OpenMP implementations achieve high parallel efficiency as the IEEE TRANSACTIONS ON BIG DATA, VOL. XX, NO. X, JUNE 2016 12 Blob Detection Runtime: Strong Scaling 1 10 4 MPI Speedup MPI/OpenMP Speedup MPI Runtime MPI/OpenMP Runtime Speedup over sequatial 0 10 Runtime (Second) Blob Detection Speedup: Strong Scaling 10 −1 10 −2 10 2 10 1 10 0 −3 10 3 10 0 10 1 10 2 3 10 10 Number of processes 10 0 10 4 10 1 10 (a) Time 2 3 10 10 Number of processes 4 10 (b) Speedup Fig. 11: Blob detection time and speedup with MPI and MPI/OpenMP varying number of processes under strong scaling Blob Detection Runtime: Weak Scaling 0.5 Blob Detection Efficiency: Weak Scaling 1 MPI Runtime MPI/OpenMP Runtime 0.8 Parallel Efficiency Runtime (Second) 0.4 0.3 0.2 0.1 0.6 0.4 0.2 MPI Efficiency MPI/OpenMP Efficiency 0 0 10 1 10 2 3 10 10 Number of processes 4 10 (a) Time 0 0 10 1 10 2 3 10 10 Number of processes 4 10 (b) Speedup Fig. 12: Blob detection time and speedup with MPI and MPI/OpenMP varying number of processes under weak scaling number of processes increases from 1 to 1024. 6 C ONCLUSION AND FUTURE WORK Near real-time extraction of spatio-temporal features in very large-scale irregular data presents both opportunities and challenges responding to extreme scale computing and big data in many applications. In this paper, we propose, for the first time, a real-time blob detection and tracking approach for finding blob-filaments in fusion experiments or numerical simulations. The key idea of the proposed approach is to break down the overall process into three steps. The first two steps are based on a distribution-based outlier detection scheme with various criteria and a fast CCL method to find blob components. In the third step, an efficient blob tracking scheme is presented to recover the trajectories of the motions of blobs. Our hybrid MPI/OpenMP implementations demonstrate the effectiveness and efficiency of the proposed approach with a set of fusion plasma simulation data. Our tests show that we can achieve linear time speedup and complete blob detection in two or three milliseconds using a cluster at NERSC. We are currently working on integrating our blob detection algorithm into the ICEE system for consuming fusion plasma data streams where the blob detection function is used in a central data analysis component and the resulting detection results are monitored and controlled from portable devices, such as an iPad. We plan to test the proposed method in both simulations and real fusion experiments. ACKNOWLEDGMENTS The authors would like to thank the referees for their valuable comments. This work was supported by the Office of Advanced Scientific Computing Research, Office of Science, of the U.S. Department of Energy under Contract No. DE-AC02-05CH11231 and partially supported by NSF under grants No. CCF 1218349 and ACI SI2-SSE 1440700, and by DOE under a grant No. DE-FC02-12ER41890. The blobby plasma turbulence simulation was performed using resources of the Oak Ridge Leadership Computing Facility, which is a DOE Office of Science User Facility supported under Contract DE-AC05-00OR22. IEEE TRANSACTIONS ON BIG DATA, VOL. XX, NO. X, JUNE 2016 R EFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] N. Cressie and C. K. Wikle, Statistics for Spatio-Temporal Data. Wiley, 2011. K. Wu, R. R. Sinha, C. Jones, S. Ethier, S. Klasky, K.-L. Ma, A. Shoshani, and M. Winslett, “Finding regions of interest on toroidal meshes,” Computational Science & Discovery, vol. 4, no. 1, p. 015003, 2011. V. Chandola, A. Banerjee, and V. Kumar, “Anomaly detection: A survey,” ACM computing surveys (CSUR), vol. 41, no. 3, p. 15, 2009. J. Han, M. Kamber, and J. Pei, Data Mining: Concepts and Techniques, 3rd ed. San Francisco, CA, USA: Morgan Kaufmann Publishers Inc., 2011. M. Gupta, J. Gao, C. C. Aggarwal, and J. Han, “Outlier detection for temporal data: A survey,” IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 9, pp. 1–1, 2014. H. Yang, S. Parthasarathy, and S. Mehta, “A generalized framework for mining spatio-temporal patterns in scientific data,” in Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining. ACM, 2005, pp. 716–721. R. Aymar, P. Barabaschi, and Y. Shimomura, “The iter design,” Plasma Physics and Controlled Fusion, vol. 44, no. 5, p. 519, 2002. D. DIppolito, J. Myra, and S. Zweben, “Convective transport by intermittent blob-filaments: Comparison of theory and experiment,” Physics of Plasmas (1994-present), vol. 18, no. 6, p. 060501, 2011. S. Shekhar, C.-T. Lu, and P. Zhang, “A unified approach to detecting spatial outliers,” GeoInformatica, vol. 7, no. 2, pp. 139–166, 2003. K. Wu, S. Ahern, E. W. Bethel, J. Chen, H. Childs, E. CormierMichel, C. Geddes, J. Gu, H. Hagen, B. Hamann et al., “Fastbit: interactively searching massive data,” in Journal of Physics: Conference Series, vol. 180, no. 1. IOP Publishing, 2009, p. 012053. C. Chang, S. Ku, P. Diamond, Z. Lin, S. Parker, T. Hahm, and N. Samatova, “Compressed ion temperature gradient turbulence in diverted tokamak edgea),” Physics of Plasmas (1994-present), vol. 16, no. 5, p. 056108, 2009. S. Ku, C. Chang, and P. Diamond, “Full-f gyrokinetic particle simulation of centrally heated global itg turbulence from magnetic axis to edge pedestal top in a realistic tokamak geometry,” Nuclear Fusion, vol. 49, no. 11, p. 115021, 2009. B. Dong, S. Byna, and K. Wu, “Expediting scientific data analysis with reorganization of data,” in Cluster Computing (CLUSTER), 2013 IEEE International Conference on. IEEE, Sept 2013, pp. 1–8. ——, “Sds: A framework for scientific data services,” in Proceedings of the 8th Parallel Data Storage Workshop, ser. PDSW ’13. ACM, 2013, pp. 27–32. J. Y. Choi, K. Wu, J. C. Wu, A. Sim, Q. G. Liu, M. Wolf, C. Chang, and S. Klasky, “Icee: Wide-area in transit data processing framework for near real-time scientific applications,” in 4th SC Workshop on Petascale (Big) Data Analytics: Challenges and Opportunities in conjunction with SC13, 2013. J. F. Lofstead, S. Klasky, K. Schwan, N. Podhorszki, and C. Jin, “Flexible io and integration for scientific codes through the adaptable io system (adios),” in Proceedings of the 6th international workshop on Challenges of large applications in distributed environments. ACM, 2008, pp. 15–24. K. Wu, E. Otoo, and K. Suzuki, “Optimizing two-pass connectedcomponent labeling algorithms,” Pattern Analysis and Applications, vol. 12, no. 2, pp. 117–135, 2009. W. Davis, M. Ko, R. Maqueda, A. Roquemore, F. Scotti, and S. Zweben, “Fast 2-d camera control, data acquisition, and database techniques for edge studies on nstx,” Fusion Engineering and Design, vol. 89, no. 5, pp. 717–720, 2014. J. Myra, W. Davis, D. D’Ippolito, B. LaBombard, D. Russell, J. Terry, and S. Zweben, “Edge sheared flows and the dynamics of blobfilaments,” Nuclear Fusion, vol. 53, no. 7, p. 073013, 2013. P. Dollár, V. Rabaud, G. Cottrell, and S. Belongie, “Behavior recognition via sparse spatio-temporal features,” in 2005 IEEE International Workshop on Visual Surveillance and Performance Evaluation of Tracking and Surveillance. IEEE, 2005, pp. 65–72. J. Winkler, A. Seybert, L. König, S. Pruggnaller, U. Haselmann, V. Sourjik, M. Weiss, A. S. Frangakis, A. Mogk, and B. Bukau, “Quantitative and spatio-temporal features of protein aggregation in escherichia coli and consequences on protein quality control and cellular ageing,” The EMBO journal, vol. 29, no. 5, pp. 910– 923, 2010. 13 [22] Q. V. Le, W. Y. Zou, S. Y. Yeung, and A. Y. Ng, “Learning hierarchical invariant spatio-temporal features for action recognition with independent subspace analysis,” in Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on. IEEE, 2011, pp. 3361–3368. [23] K. Aminian, B. Najafi, C. Büla, P.-F. Leyvraz, and P. Robert, “Spatio-temporal parameters of gait measured by an ambulatory system using miniature gyroscopes,” Journal of biomechanics, vol. 35, no. 5, pp. 689–699, 2002. [24] S. Sadik and L. Gruenwald, “Research issues in outlier detection for data streams,” ACM SIGKDD Explorations Newsletter, vol. 15, no. 1, pp. 33–40, 2014. [25] V. J. Hodge and J. Austin, “A survey of outlier detection methodologies,” Artificial Intelligence Review, vol. 22, no. 2, pp. 85–126, 2004. [26] E. M. Knox and R. T. Ng, “Algorithms for mining distancebased outliers in large datasets,” in Proceedings of the International Conference on Very Large Data Bases. Citeseer, 1998, pp. 392–403. [27] M. M. Breunig, H.-P. Kriegel, R. T. Ng, and J. Sander, “Lof: identifying density-based local outliers,” in ACM sigmod record, vol. 29, no. 2. ACM, 2000, pp. 93–104. [28] Z. He, X. Xu, and S. Deng, “Discovering cluster-based local outliers,” Pattern Recognition Letters, vol. 24, no. 9, pp. 1641–1650, 2003. [29] S. Subramaniam, T. Palpanas, D. Papadopoulos, V. Kalogeraki, and D. Gunopulos, “Online outlier detection in sensor data using non-parametric models,” in Proceedings of the 32nd international conference on Very large data bases. VLDB Endowment, 2006, pp. 187–198. [30] D. Pokrajac, A. Lazarevic, and L. J. Latecki, “Incremental local outlier detection for data streams,” in Computational Intelligence and Data Mining, 2007. CIDM 2007. IEEE Symposium on. IEEE, 2007, pp. 504–515. [31] M. Elahi, K. Li, W. Nisar, X. Lv, and H. Wang, “Efficient clusteringbased outlier detection algorithm for dynamic data stream,” in Fuzzy Systems and Knowledge Discovery, 2008. FSKD’08. Fifth International Conference on, vol. 5. IEEE, 2008, pp. 298–304. [32] F. Angiulli and F. Fassetti, “Detecting distance-based outliers in streams of data,” in Proceedings of the sixteenth ACM conference on Conference on information and knowledge management. ACM, 2007, pp. 811–820. [33] C. C. Aggarwal, Y. Zhao, and P. S. Yu, “Outlier detection in graph streams,” in Data Engineering (ICDE), 2011 IEEE 27th International Conference on. IEEE, 2011, pp. 399–409. [34] H. Dutta, C. Giannella, K. D. Borne, and H. Kargupta, “Distributed top-k outlier detection from astronomy catalogs using the demac system.” in SDM. SIAM, 2007, pp. 473–478. [35] E. Lozano and E. Acufia, “Parallel algorithms for distance-based and density-based outliers,” in Data Mining, Fifth IEEE International Conference on. IEEE, 2005, pp. 4–pp. [36] M. E. Otey, A. Ghoting, and S. Parthasarathy, “Fast distributed outlier detection in mixed-attribute data sets,” Data Mining and Knowledge Discovery, vol. 12, no. 2-3, pp. 203–228, 2006. [37] E. Hung and D. W. Cheung, “Parallel mining of outliers in large database,” Distributed and Parallel Databases, vol. 12, no. 1, pp. 5–26, 2002. [38] M. Xu, P. Diamond, G. Tynan, C. Holland, P. Manz, N. Fedorczak, S. C. Thakur, J. Yu, K. Zhao, J. Dong et al., “Turbulent eddymediated particle, momentum, and vorticity transport in the edge of hl-2a tokamak plasma,” in 24th IAEA Fusion Energy Conference, San Diego, 2012. [39] G. Fuchert, G. Birkenmeier, B. Nold, M. Ramisch, and U. Stroth, “The influence of plasma edge dynamics on blob properties in the stellarator tj-k,” Plasma Physics and Controlled Fusion, vol. 55, no. 12, p. 125002, 2013. [40] S. Zweben, “Search for coherent structure within tokamak plasma turbulence,” Physics of Fluids, vol. 28, no. 3, p. 974, 1985. [41] H. Kong, H. C. Akakin, and S. E. Sarma, “A generalized laplacian of gaussian filter for blob detection and its applications,” IEEE transactions on cybernetics, vol. 43, no. 6, pp. 1719–1733, 2013. [42] I. Laptev and T. Lindeberg, “Space-time interest points,” International Conference on Computer VisionICCV’03, pp. 432–439, 2003. [43] T. Lindeberg, “Feature detection with automatic scale selection,” International Journal of Computer Vision, vol. 30, no. 2, pp. 79–116, 1998. [44] R. T. Collins, “Mean-shift blob tracking through scale space,” in Computer Vision and Pattern Recognition, 2003. Proceedings. 2003 IEEE TRANSACTIONS ON BIG DATA, VOL. XX, NO. X, JUNE 2016 [45] [46] [47] [48] [49] [50] IEEE Computer Society Conference on, vol. 2. IEEE, 2003, pp. II– 234. L. Vincent and P. Soille, “Watersheds in digital spaces: an efficient algorithm based on immersion simulations,” IEEE transactions on pattern analysis and machine intelligence, vol. 13, no. 6, pp. 583–598, 1991. N. S. Love and C. Kamath, “Image analysis for the identification of coherent structures in plasma,” Optical Engineering and Applications, pp. 66 960D–66 960D, 2007. R. Kube, O. E. Garcia, B. LaBombard, J. Terry, and S. Zweben, “Blob sizes and velocities in the alcator c-mod scrape-off layer,” Journal of Nuclear Materials, vol. 438, pp. S505–S508, 2013. T. M. Chan, “Optimal output-sensitive convex hull algorithms in two and three dimensions,” Discrete & Computational Geometry, vol. 16, no. 4, pp. 361–368, 1996. S. Müller, A. Diallo, A. Fasoli, I. Furno, B. Labit, G. Plyushchev, M. Podestà, and F. Poli, “Probabilistic analysis of turbulent structures from two-dimensional plasma imaging,” Physics of Plasmas (1994-present), vol. 13, no. 10, p. 100701, 2006. G. Xu, B. Wan, W. Zhang, Q. Yang, L. Wang, and Y. Wen, “Multiscale coherent structures in tokamak plasma turbulence,” Physics of Plasmas (1994-present), vol. 13, no. 10, p. 102509, 2006. Lingfei Wu is a 6th year Ph.D. candidate in the computer science department at College of William and Mary, advised by Dr. Andreas Stathopoulos. His research interests are in the areas of high-performance scientific computing, large-scale machine learning, and big data analytics. In summer 2014 and 2015, Lingfei was a summer research intern at Lawrence Berkeley National Laboratory and IBM T.J.Watson Research Center, respectively. Before joining William and Mary, Lingfei received his M.S. from University of Science and Technology of China (Hefei, 2010), following his B.E. from Auhui University (Hefei, 2007) Kesheng (John) Wu is a Senior Computer Scientist at Lawrence Berkeley National Laboratory. works actively on a number of topics in data analysis, data management, and highperformance computing. His recent algorithmic research work includes bitmap indexing techniques for searching large datasets, statistical methods for extract features from a variety of data, and restarting strategies for computing extreme eigenvalues. He authored and coauthored more than 100 technical publications, nine of which have more than 100 citations each. Alex Sim is a Senior Computing Engineer at Lawrence Berkeley National Laboratory. His current R& D activities focus on data mining and modeling, data analysis methods, distributed resource management, and high performance data systems. He authored and coauthored more than 100 technical publications, and released a few software packages under open source license. 14 Michael Churchill received his PhD in Nuclear Science and Engineering from the Massachusetts Institute of Technology, and his Bachelor’s degree in Electrical and Computer Engineering from Brigham Young University. He currently works as a postdoc under Dr. C.S. Chang at the Princeton Plasma Physics Laboratory, focusing on data management and analysis with the large-scale XGC plasma simulation codes. Jong Y. Choi is a researcher working in Scientific Data Group, Computer Science and Mathematics Division, Oak Ridge National Laboratory (ORNL), Oak Ridge, Tennessee, USA. He earned his Ph.D. degree in Computer Science at Indiana University Bloomington in 2012 and his MS degree in Computer Science from New York University in 2004. His areas of research interest span data mining and machine learning algorithms, high-performance data-intensive computing, parallel and distributed systems for Cloud and Grid computing. Andreas Stathopoulos received a bachelors degree in Mathematics from University of Athens, Greece in 1989, and an M.S. and Ph.D. degrees in Computer Science from Vanderbilt University, USA in 1991 and 1995 respectively. In 1995, he obtained an NSF CISE postdoctoral fellowship to work with Prof. Yousef Saad at the University of Minnesota, USA. In 1997, he joined the faculty of Computer Science at the College of William and Mary, USA, where he currently holds a full professor position. His research interests span the general area of parallel and high performance scientific computing. He is an expert on solving eigenvalue problems and has developed the state-of-the-art eigenvalue software PRIMME. Choong-Seock Chang is the head of the multiinstitutional multi-disciplinary US SciDAC Center for Edge Physics Simulation (EPSI), headquartered at Princeton Plasma Physics Laboratory, Princeton University, awarded by US Department of Energy, Office of Fusion Energy Science and Office of Advanced Scientific Computing Research, jointly. He has over 150 publications in peer reviewed internationally recognized journals, and has given countless invited talks, keynote speeches and tutorial lectures at major scientific conferences. Scott Klasky is currently a senior research scientist at Oak Ridge National Laboratory, and head of the end to end task in the scientific computing group at the National Center Computational Sciences. He has 20 years of experience in research and development of middleware for use in high performance computing, and is a author/co-author of over 40 papers in the field of physics and high performance computing. He received his PhD in physics from the University of Texas at Austin, and then went on to Syracuse University, and then the Princeton Plasma Physics Laboratory.
5cs.CE
Maximizing Non-monotone/Non-submodular Functions by Multi-objective Evolutionary Algorithms Chao Qian1 , Yang Yu2 , Ke Tang3 , Xin Yao3 , Zhi-Hua Zhou2∗ arXiv:1711.07214v1 [cs.NE] 20 Nov 2017 1 Anhui Province Key Lab of Big Data Analysis and Application, University of Science and Technology of China, Hefei, China 2 National Key Lab for Novel Software Technology, 3 Shenzhen Nanjing University, Nanjing, China Key Lab of Computational Intelligence, Southern University of Science and Technology, Shenzhen, China Abstract Evolutionary algorithms (EAs) are a kind of nature-inspired general-purpose optimization algorithm, and have shown empirically good performance in solving various real-word optimization problems. However, due to the highly randomized and complex behavior, the theoretical analysis of EAs is difficult and is an ongoing challenge, which has attracted a lot of research attentions. During the last two decades, promising results on the running time analysis (one essential theoretical aspect) of EAs have been obtained, while most of them focused on isolated combinatorial optimization problems, which do not reflect the general-purpose nature of EAs. To provide a general theoretical explanation of the behavior of EAs, it is desirable to study the performance of EAs on a general class of combinatorial optimization problems. To the best of our knowledge, this direction has been rarely touched and the only known result is the provably good approximation guarantees of EAs for the problem class of maximizing monotone submodular set functions with matroid constraints, which includes many NP-hard combinatorial optimization problems. The aim of this work is to contribute to this line of research. As many combinatorial optimization problems also involve non-monotone or non-submodular objective functions, we consider these two general problem classes, maximizing non-monotone submodular functions without constraints and maximizing monotone non-submodular functions with a size constraint. We prove that a simple multiobjective EA called GSEMO can generally achieve good approximation guarantees in polynomial expected running time. Key words: Evolutionary algorithms, submodular optimization, multi-objective evolutionary algorithms, running time analysis, computational complexity ∗ Corresponding author Email addresses: [email protected] (Chao Qian1 ), [email protected] (Yang Yu2 ), [email protected] (Ke Tang3 ), [email protected] (Xin Yao3 ), [email protected] (Zhi-Hua Zhou2 ) Preprint submitted for review November 21, 2017 1. Introduction Evolutionary algorithms (EAs) [3] are a kind of randomized metaheuristic optimization algorithm, inspired by the evolution process of natural species, i.e., natural selection and survival of the fittest. Starting from a random population of solutions, EAs iteratively apply reproduction operators to generate a set of offspring solutions from the current population, and then apply a selection operator to weed out bad solutions. EAs have been applied to diverse areas (e.g., antenna design [18], bioinformatics [23] and data mining [24]) and can produce human-competitive results [20]. Compared with the application, the theoretical analysis of EAs is, however, far behind. Many researchers thus have been devoted to understanding the behavior of EAs from a theoretical point of view, which is still an ongoing challenge. In the last two decades, a lot of progress has been made on the running time analysis of EAs, which is one essential theoretical aspect. The running time measures how many objective (i.e., fitness) function evaluations an EA needs until finding an optimal solution or an approximate solution. The running time analysis of EAs started with artificial example problems. In [7, 8], a simple singleobjective EA called (1+1)-EA was shown able to solve two well-structured pseudo-Boolean problems OneMax and LeadingOnes in Θ(n log n) and Θ(n2 ) (where n is the problem size) expected running time, respectively. These two problems are to maximize the number of 1-bits of a solution and the number of consecutive 1-bits counting from the left of a solution, respectively. Both of them have a short path with increasing fitness to the optimum. For some problems (e.g., SPC) where there is a short path with constant fitness to the optimum, the (1+1)-EA can also find an optimal solution in polynomial time [19]. But when the problem (e.g., Trap) has a deceptive path (i.e., a path with increasing fitness away from the optimum), the (1+1)-EA will need exponential running time [15]. More results can refer to [2]. The analysis on simple artificial problems disclosed theoretical properties of EAs (e.g., which problem structures are easy or hard for EAs), and also helped to develop approaches for analyzing more complex problems. The running time analysis of EAs was then extended to combinatorial optimization problems. For some P-solvable problems, EAs were shown able to find an optimal solution in polynomial time. For example, the minimum spanning tree problem can be solved by the (1+1)-EA and a simple multi-objective EA called GSEMO in O(m2 (log n + log wmax )) [29] and O(mn(n + log wmax )) [28] expected time, respectively. Note that m, n and wmax are the number of edges, the number of nodes and the maximum edge weight of a graph, respectively. For some NPhard problems, EAs were shown able to achieve good approximation ratios in polynomial time. For example, for the partition problem, the (1+1)-EA can achieve a (4/3)-approximation ratio in O(n2 ) expected time [36]; for the minimum set cover problem, the expected running time of the GSEMO 2 until obtaining a (log m + 1)-approximation ratio is O(m2 n + mn(log n + log cmax )) [11], where m, n and cmax denote the size of the ground set, the number of subsets and the maximum cost of a subset, respectively. More running time results of EAs on combinatorial optimization problems can refer to [30]. For the analysis of the GSEMO (which is a multi-objective EA) on single-objective optimization problems (e.g., minimum spanning tree and minimum set cover), the original single-objective problem is transformed into a multi-objective problem, which is then solved by the GSEMO. Note that multi-objective optimization here is just an intermediate process (which might be beneficial [11, 28, 31, 33]), and we still focus on the quality of the best solution w.r.t. the original single-objective problem, in the population found by the GSEMO. Running time analysis of EAs on real multi-objective optimization problems has also been investigated, where the running time is measured by the number of fitness evaluations until finding the Pareto front (which represents different optimal tradeoffs between the multiple objectives) or an approximation of the Pareto front. For example, Giel [12] proved that the GSEMO can solve the bi-objective pseudo-Boolean problem LOTZ in O(n3 ) expected time; for the NP-hard bi-objective minimum spanning tree problem, it was shown that the GSEMO can obtain a 2-approximation ratio in pseudo-polynomial time [27, 32]. The analysis on combinatorial optimization problems helped to reveal the ability of EAs. However, most of the previous promising results were obtained for isolated problems, while EAs are known to be general-purpose optimization algorithms, which can be applied to various problems. Thus, it is more desirable to provide a general theoretical explanation of the behavior of EAs, that is, to theoretically study the performance of EAs on a general class of combinatorial optimization problems. To the best of our knowledge, only two pieces of work in this direction have been reported. Reichel and Skutella [35] first studied the problem class of maximizing linear functions with k matroid constraints, which includes some well-known combinatorial optimization problems such as maximum matching, Hamiltonian path, etc. They proved that the (1+1)-EA can obtain a (1/k)-approximation ratio in O(nk+2 (log r + log wmax )) expected running time, where n, r and wmax denote the size of the ground set, the minimum rank of the ground set w.r.t. one matroid and the maximum weight of an element, respectively. Later, a generalization of this problem class, i.e., the objective function is relaxed to satisfy the monotone and submodular property, was considered in [10]. The (1+1)-EA 1 )-approximation ratio in O( 1ǫ n2p(k+1)+1 k log n) expected time, was shown able to achieve a ( k+1/p+ǫ where p ≥ 1 and ǫ > 0. Friedrich and Neumann [10] also studied a specific non-monotone case for the objective function, i.e., the objective function is symmetric. They proved that the expected run1 ning time until the GSEMO obtains a ( (k+2)(1+ǫ) )-approximation ratio for maximizing symmetric submodular functions with k matroid constraints is O( 1ǫ nk+6 log n). 3 The aim of this paper is to contribute to this line of research. Considering that the objective function of many combinatorial optimization problems can be non-monotone (not necessarily symmetric) or non-submodular, we study the performance of EAs on these two general problem classes, maximizing non-monotone submodular functions without constraints and maximizing monotone non-submodular functions with a size constraint. Note that the objective function is a set function f : 2V → R which maps a subset of the ground set V to a real value, and a size constraint means that the size of a subset is not larger than a budget k. We prove that for both problem classes, the GSEMO can obtain a good approximation guarantee in polynomial expected running time. Our main results can be summarized as follows. • For the problem class of maximizing non-monotone submodular functions without constraints, with special instances including maximum cut [13], maximum facility location [1] and variants of the maximum satisfiability problem [14], we prove that the GSEMO can achieve a constant approximation ratio of 1 3 − ǫ n in O( 1ǫ n4 log n) expected running time (i.e., Theorem 1), where n is the size of the ground set V and ǫ > 0. • For the problem class of maximizing monotone non-submodular functions with a size constraint, with special instances including sparse regression [6], dictionary selection [21] and robust influence maximization [5, 16], we prove the approximation guarantee of the GSEMO w.r.t. each notion of “approximate submodularity”, which measures how close a general set function f is to submodularity. (1) In [22], a set function f is ǫ-approximately submodular if the diminishing return property holds with some deviation ǫ ≥ 0, i.e., for any X ⊆ Y ⊆ V and v ∈ / Y , f (X ∪ {v}) − f (X) ≥ f (Y ∪{v})−f (Y )−ǫ. f is submodular iff ǫ = 0. We prove that the GSEMO within O(n2 (log n+k)) expected time can find a subset X with f (X) ≥ (1 − e−1 ) · (OP T − kǫ) (i.e., Theorem 2), where e is the base of the natural logarithm and OP T denotes the optimal function value. (2) In [6], the approximate submodularity notion of a set function f is characterized by a quantity γ called submodularity ratio. f is submodular iff γ = 1. We prove that the GSEMO within O(n2 (log n + k)) expected time can find a subset X with f (X) ≥ (1 − e−γ ) · OP T (i.e., Theorem 3). (3) In [17], a set function f is ǫ-approximately submodular if there exists a submodular set function g such that ∀X ⊆ V , (1 − ǫ)g(X) ≤ f (X) ≤ (1 + ǫ)g(X). f is submodular iff ǫ = 0. We prove that the GSEMO within O(n2 (log n + k)) expected time can find a subset X with f (X) ≥ 1 2kǫ 1+ 1−ǫ 1−ǫ k (1 − e−1 ( 1+ǫ ) ) · OP T (i.e., Theorem 4). Note that since EAs are general-purpose algorithms which utilize a small amount of problem knowledge, we cannot expect them to beat the best problem-specific algorithm. For the first problem class, the approximation ratio nearly 1/3 obtained by the GSEMO is worse than the best known one 4 1/2, which was previously obtained by the double greedy algorithm [4]. For the second problem class, the approximation ratio obtained by the GSEMO w.r.t. each notion of approximate submodularity reaches the best known one, which was previously obtained by the standard greedy algorithm [22, 6, 17]. Particularly, when the objective function is submodular, the obtained approximation ratio by the GSEMO becomes 1 − 1/e, which is optimal in general [25], and also consistent with the previous result in [10]. Our analytical results on general problem classes together with the previous ones [35, 10] provide a theoretical explanation for the empirically good behaviors of EAs in diverse applications. The rest of this paper is organized as follows. Section 2 introduces some preliminaries. The running time analyses for non-monotone and non-submodular cases are then presented in Sections 3 and 4, respectively. Section 5 concludes the paper. 2. Preliminaries In this section, we first introduce the two problem classes studied in this paper, and then introduce the multi-objective evolutionary algorithm GSEMO and also how to optimize the studied problem classes by the GSEMO. 2.1. Non-monotone/Non-submodular Function Maximization Let R and R+ denote the set of reals and non-negative reals, respectively. Given a finite nonempty set V = {v1 , v2 , . . . , vn }, we study the functions f : 2V → R defined on subsets of V . A set function f : 2V → R is monotone if for any X ⊆ Y , f (X) ≤ f (Y ). Without loss of generality, we assume that the monotone function is normalized, i.e., f (∅) = 0. A set function f is submodular [26] if for any X ⊆ Y ⊆ V and v ∈ / Y, f (X ∪ {v}) − f (X) ≥ f (Y ∪ {v}) − f (Y ); (1) or equivalently for any X ⊆ Y ⊆ V , f (Y ) − f (X) ≤ X v∈Y \X  f (X ∪ {v}) − f (X) . (2) We assume that a set function f is given by a value oracle, i.e., for a given subset X, an algorithm can query an oracle to obtain the value f (X). 5 Our first studied problem class as presented in Definition 1 is to maximize a non-monotone submodular set function. Without loss of generality, we assume that the objective function f is nonnegative. This problem generalizes many NP-hard combinatorial optimization problems including maximum cut [13], maximum facility location [1], variants of the maximum satisfiability problem [14], etc. The best known approximation guarantee is 1/2, which was achieved by the double greedy algorithm [4]. Definition 1 (Non-monotone Submodular Function Maximization without Constraints) Given a non-monotone submodular function f : 2V → R+ , it is to find a subset X ⊆ V such that arg maxX⊆V f (X). The second studied problem class is presented in Definition 2. The goal is to find a subset with at most k elements such that a given monotone non-submodular set function is maximized. This problem generalizes many NP-hard problems including sparse regression [6], dictionary selection [21] and robust influence maximization [5, 16], etc. When the objective function is submodular, it was well known that the standard greedy algorithm achieves the optimal approximation guarantee 1 − 1/e [25, 26]. For non-submodular cases, several notions of “approximate submodularity” [22, 6, 17] were introduced to measure to what extent a general set function f has the submodular property. For each approximately submodular notion, the best known approximation guarantee was achieved by the standard greedy algorithm [22, 6, 17], which iteratively adds one element with the largest f improvement until k elements are selected. Definition 2 (Monotone Non-submodular Function Maximization with a Size Constraint) Given a monotone non-submodular function f : 2V → R+ and a budget k , it is to find a subset X ⊆ V such that arg maxX⊆V f (X) s.t. |X| ≤ k. In [22], the approximate submodularity as presented in Definition 3 was defined based on the diminishing return property (i.e., Eq. (1)). That is, the approximately submodular degree depends on how large a deviation of ǫ the diminishing return property can hold with. It is easy to see that f is submodular iff ǫ = 0. The standard greedy algorithm was proved to find a subset X with f (X) ≥ (1 − e−1 ) · (OP T − kǫ) [22], where OP T denotes the optimal function value. Definition 3 (ǫ-Approximately Submodular [22]) Let ǫ ≥ 0. A set function f : 2V → R is ǫ-approximately submodular if for any X ⊆ Y ⊆ V and v ∈ / Y, f (X ∪ {v}) − f (X) ≥ f (Y ∪ {v}) − f (Y ) − ǫ. In [6], the submodularity ratio as presented in Definition 4 was introduced to measure the closeness of a set function f to submodularity. It is easy to see from Eq. (2) that f is submodular iff γU,k (f ) = 1 6 for any U and k. When f is clear in the paper, we will use γU,k shortly. The standard greedy algorithm was proved to find a subset X with f (X) ≥ (1 − e−γX,k ) · OP T [6]. Definition 4 (Submodularity Ratio [6]) Let f : 2V → R be a set function. The submodularity ratio of f with respect to a set U ⊆ V and a parameter k ≥ 1 is γU,k (f ) = min L⊆U,S:|S|≤k,S∩U=∅ P ∪ {v}) − f (L)) . f (L ∪ S) − f (L) v∈S (f (L The above two notions of approximate submodularity are based on the equivalent statements Eqs. (1) and (2) of submodularity, while in [17], the approximate submodularity of a set function f as presented in Definition 5 was defined based on the closeness to other submodular functions. It is easy to see that f is submodular iff ǫ = 0. The standard greedy algorithm was proved to find a subset X with f (X) ≥ 1 4kǫ 1+ (1−ǫ) 2 2k (1 − e−1 ( 1−ǫ 1+ǫ ) ) · OP T [17]. Definition 5 (ǫ-Approximately Submodular [17]) Let ǫ ≥ 0. A set function f : 2V → R is ǫ-approximately submodular if there exists a submodular set function g such that ∀X ⊆ V , (1 − ǫ) · g(X) ≤ f (X) ≤ (1 + ǫ) · g(X). 2.2. Multi-objective Evolutionary Algorithms To investigate the performance of EAs optimizing the two problem classes in Definitions 1 and 2, we consider a simple multi-objective EA called GSEMO, which has been widely used in previous theoretical analyses [11, 31, 32, 37]. The GSEMO as presented in Algorithm 1 is used for maximizing multi-objective pseudo-Boolean problems with m objective functions fi : {0, 1}n → R (1 ≤ i ≤ m). Note that a pseudo-Boolean function f : {0, 1}n → R naturally characterizes a set function f : 2V → R, since a subset X of V can be naturally represented by a Boolean vector x ∈ {0, 1}n, where the i-th bit xi = 1 means that vi ∈ X, and xi = 0 means that vi ∈ / X. Throughout the paper, we will not distinguish x ∈ {0, 1}n and its corresponding subset for notational convenience. Before introducing the GSEMO, we first introduce some basic concepts in multi-objective maximization. Since the objectives to be maximized are usually conflicted, there is no canonical complete order on the solution space. The comparison between two solutions relies on the domination relationship. For two solutions x and x′ , x weakly dominates x′ (i.e., x is better than x′ , denoted by x  x′ ) if ∀1 ≤ i ≤ m, fi (x) ≥ fi (x′ ); x dominates x′ (i.e., x is strictly better than x′ , denoted by x ≻ x′ ) if x  x′ and fi (x) > fi (x′ ) for some i. The domination relationship between two solutions x and x′ can be formally stated as follows: 7 Algorithm 1 GSEMO Algorithm Given m pseudo-Boolean objective functions f1 , f2 , . . . , fm , where fi : {0, 1}n → R, the GSEMO consists of the following steps: 1: Choose x ∈ {0, 1}n uniformly at random 2: P ← {x} 3: repeat 4: Choose x from P uniformly at random 5: Create x′ by flipping each bit of x with probability 1/n 6: Create x′′ ← V \ x′ 7: for y ∈ {x′, x′′ } 8: 9: 10: 11: 12: if ∄z ∈ P such that z ≻ y P ← (P \ {z ∈ P | y  z}) ∪ {y} end if end for until some criterion is met • x  x′ if ∀1 ≤ i ≤ m, fi (x) ≥ fi (x′ ); • x ≻ x′ if x  x′ and fi (x) > fi (x′ ) for some i. But if neither x is better than x′ nor x′ is better than x, we say that they are incomparable. A solution is Pareto optimal if there is no other solution that dominates it. The set of objective vectors of all the Pareto optimal solutions constitutes the Pareto front. The goal of multi-objective optimization is to find the Pareto front, that is, to find at least one corresponding solution for each objective vector in the Pareto front. The procedure of the GSEMO algorithm is presented in Algorithm 1. Starting from a random solution (lines 1-2), it iteratively tries to improve the quality of the solutions in the population P (lines 312). In each iteration, a new solution x′ is generated by randomly flipping bits of an archived solution x selected from the current population P (lines 4-5); the complementary set x′′ = V \ x′ of x′ is also generated (line 6); these two newly generated solutions are then used to update the population P (lines 7-11). In the updating procedure, if y ∈ {x′ , x′′ } is not dominated by (i.e., not strictly worse than) any previously archived solution (line 8), it will be added into P , and meanwhile those previously archived solutions weakly dominated by (i.e., worse than) y will be removed from P (line 9). It is easy to see that the population P will always contain a set of incomparable solutions due to the domination-based comparison. Note that the GSEMO here is a little different from its original version [11, 31, 32]. In the original GSEMO algorithm, only x′ is generated and used to update the population in each iteration, while here we also generate the complementary set of x′ and use both 8 of them to update the population. For optimizing the two problems in Definitions 1 and 2 by the GSEMO, each problem is transformed into a bi-objective maximization problem arg maxx∈{0,1}n (f1 (x), f2 (x)), where f1 (x) = f (x) and f2 (x) = −|x|. That is, the GSEMO is to maximize the objective function Pn f and minimize the subset size |x| simultaneously. Note that |x| = i=1 xi denotes the number of 1-bits of a solution x. When the GSEMO terminates after running a number of iterations, the best solution w.r.t. the original single-objective problem in the resulting population P will be returned. For the first problem in Definition 1, the solution with the largest f value in P (i.e., arg maxx∈P f (x)) will be returned. For the second problem in Definition 2, the solution with the largest f value satisfying the size constraint in P (i.e., arg maxx∈P,|x|≤k f (x)) will be returned. The running time of the GSEMO is measured by the number of fitness evaluations until the best solution w.r.t. the original single-objective problem in the population reaches some approximation guarantee for the first time. Since only the new solutions x′ and x′′ need to be evaluated in each iteration of the GSEMO, the number of fitness evaluations is just the double of the number of iterations of the GSEMO. Note that multi-objective optimization here is just an intermediate process, which has been shown helpful for solving some single-objective combinatorial optimization problems [11, 28, 31, 33]. We still focus on the quality of the best solution w.r.t. the original single-objective problem, in the population found by the GSEMO, rather than the quality of the population w.r.t. the transformed multiobjective optimization problem. 3. Non-monotone Submodular Function Maximization without Constraints In this section, we theoretically analyze the performance of the GSEMO for maximizing non-monotone submodular functions without constraints. We prove in Theorem 1 that the GSEMO can achieve a constant approximation ratio of nearly 1/3 in polynomial time. Note that OP T denotes the optimal function value. Inspired from the proof of Theorem 4 in [10], our proof idea is to follow the behavior of the local search algorithm [9], which iteratively tries to improve a solution by inserting or deleting one element. The proof relies on Lemma 1, which shows that it is always possible to improve a solution until a good approximation has been achieved. This lemma is extracted from Lemma 3.4 in [9]. Lemma 1 [9] Let x ∈ {0, 1}n be a solution such that no solution x′ with the objective value f (x′ ) > (1+ nǫ2 )·f (x) 9 can be achieved by inserting one element into x or deleting one element from x, where ǫ > 0. Then max{f (x), f (V \ x)} ≥ ( 13 − nǫ ) · OP T . Theorem 1 For maximizing a non-monotone submodular function without constraints, the expected running time of the GSEMO until finding a solution x with f (x) ≥ ( 31 − nǫ ) · OP T is O( 1ǫ n4 log n), where ǫ > 0. Proof. We divide the optimization process into three phases: (1) starts from an initial random solution and finishes until finding the special solution {0}n (i.e., ∅); (2) starts after phase (1) and finishes until finding a solution with the objective value at least OP T /n; (3) starts after phase (2) and finishes until finding a solution with the desired approximation guarantee. We analyze the expected running time of each phase, respectively, and then sum up them to get an upper bound on the total expected running time of the GSEMO. For phase (1), we consider the minimum number of 1-bits of the solutions in the population P , denoted by Jmin . That is, Jmin = min{|x| | x ∈ P }. Assume that currently Jmin = i > 0, and let x be the corresponding solution, i.e., |x| = i. It is easy to see that Jmin cannot increase because x cannot be weakly dominated by a solution with more 1-bits. In each iteration of the GSEMO, to decrease Jmin , it is sufficient to select x in line 4 of Algorithm 1 and flipping only one 1-bit of x in line 5. This is because the newly generated solution x′ now has the smallest number of 1-bits (i.e., |x′ | = i−1) and no solution in P can dominate it; thus it will be included into P . Let Pmax denote the largest size of P during the run of the GSEMO. The probability of selecting x in line 4 of Algorithm 1 is 1 |P | i n (1 ≥ − 1 Pmax 1 n−1 n) due to uniform selection, and the probability of flipping only one 1-bit of x in line 5 is ≥ i en , since x has i 1-bits. Thus, the probability of deceasing Jmin by at least 1 in each iteration of the GSEMO is at least i enPmax . Note that Jmin ≤ n. We can then get that the expected number of iterations of phase (1) (i.e., Jmin reaches 0) is at most n X enPmax i=1 i = O(nPmax log n). Note that the solution {0}n will be always kept in P once generated, since it has the smallest subset size 0 and no other solution can weakly dominate it. For phase (2), it is sufficient that in one iteration of the GSEMO, the solution {0}n is selected in line 4, and only a specific 0-bit corresponding to the best single element v ∗ (i.e., v ∗ ∈ arg maxv∈V f ({v})) is flipped in line 5. That is, the solution {v ∗ } is generated. Since the objective function f is submodular and non-negative, we easily have f ({v ∗ }) ≥ OP T /n. After generating the solution {v ∗ }, it will then be used to update the population P , which makes P always contain a solution z weakly dominating {v ∗ }, i.e., f (z) ≥ f ({v ∗ }) ≥ OP T /n and |z| ≤ |{v ∗ }| = 1. Thus, we only need to analyze the expected number of iterations of the GSEMO until generating the solution {v ∗ }. Since the probability 10 of selecting {0}n in line 4 of the GSEMO is at least 0-bit in line 5 is 1 n (1 − 1 n−1 n) ≥ 1 en , 1 Pmax and the probability of flipping only a specific the expected number of iterations of phase (2) is O(nPmax ). As in [9], we call a solution x a (1+α)-approximate local optimum if f (x\{v}) ≤ (1+α)·f (x) for any v ∈ x and f (x ∪ {v}) ≤ (1 + α) · f (x) for any v ∈ / x. According to Lemma 1, we know that a (1 + ǫ n2 )- approximate local optimum x satisfies that max{f (x), f (V \ x)} ≥ ( 31 − nǫ ) · OP T . For phase (3), we thus only need to analyze the expected number of iterations until generating a (1+ nǫ2 )-approximate local optimum x′ in line 5 of Algorithm 1. This is because both x′ and V \ x′ will be used to update the population P , and then for either one of x′ and V \ x′ , P will always contain one solution weakly dominating it, which implies that max{f (x) | x ∈ P } ≥ max{f (x′ ), f (V \ x′ )} ≥ ( 13 − ǫ n) · OP T . We then consider the largest f value of the solutions in the population P , denoted by Jmax . That is, Jmax = max{f (x) | x ∈ P }. After phase (2), Jmax ≥ OP T /n, and let x be the corresponding solution, i.e., f (x) = Jmax . It is obvious that Jmax cannot decrease, because x cannot be weakly dominated by a solution with a smaller f value. As long as x is not a (1 + nǫ2 )-approximate local optimum, we know that a new solution x′ with f (x′ ) > (1 + ǫ n2 )f (x) = (1 + nǫ2 )Jmax can be generated through selecting x in line 4 of Algorithm 1 and flipping only one specific 1-bit (i.e., deleting one specific element from x) or one specific 0-bit (i.e., adding one specific element into x) in line 5, the probability of which is at least 1 Pmax · n1 (1 − n1 )n−1 ≥ 1 enPmax . Since x′ now has the largest f value and no other solution in P can dominate it, it will be included into P . Thus, Jmax can increase by at least a factor of 1 + with probability at least 1 enPmax ǫ n2 in each iteration. Such an increase on Jmax is called a successful step. Thus, a successful step needs at most enPmax expected number of iterations. It is also easy to see that until generating a (1 + most log1+ ǫ n2 OP T OP T /n ǫ n2 )-approximate local optimum, the number of successful steps is at = O( 1ǫ n2 log n). Thus, the expected number of iterations of phase (3) is at most enPmax · O  1 2 n log n ǫ  =O   1 3 n Pmax log n . ǫ From the procedure of the GSEMO, we know that the solutions maintained in P must be incomparable. Thus, each value of one objective can correspond to at most one solution in P . Because the second objective f2 (x) = −|x| can only belong to {0, −1, . . . , −n}, we have Pmax ≤ n + 1. Hence, the expected running time of the GSEMO for finding a solution with the objective function value at least ( 13 − nǫ ) · OP T is O(nPmax log n) + O(nPmax ) + O  1 3 n Pmax log n ǫ 11  =O   1 4 n log n . ǫ 4. Monotone Non-submodular Function Maximization with a Size Constraint In this section, we analyze the performance of the GSEMO for maximizing monotone non-submodular functions with a size constraint. We prove the polynomial-time approximation guarantee of the GSEMO w.r.t. each notion of approximate submodularity (i.e., Definitions 3-5), respectively. Theorem 2 gives the approximation guarantee of the GSEMO w.r.t. the ǫ-approximately submodular notion in Definition 3, where OP T denotes the optimal function value. Note that this approximation guarantee obtained by the GSEMO reaches the best known one, which was previously obtained by the standard greedy algorithm [22]. Inspired from the proof of Theorem 2 in [10], our proof idea is to follow the behavior of the standard greedy algorithm, which iteratively adds one element with the currently largest improvement on f . The proof relies on the property of f in Lemma 2, that for any x ∈ {0, 1}n , there always exists another element, the inclusion of which can bring an improvement on f roughly proportional to the current distance to the optimum. Lemma 2 Assume that a set function f is monotone and ǫ-approximately submodular as in Definition 3. Then, / x such that for any x ∈ {0, 1}n, there exists one element v ∈ f (x ∪ {v}) − f (x) ≥ 1 (OP T − f (x)) − ǫ. k Proof. Let x∗ be an optimal solution, i.e., f (x∗ ) = OP T . We denote the elements in x∗ \ x by v1∗ , v2∗ , . . . , vl∗ , where |x∗ \ x| = l ≤ k. Then, we have f (x∗ ) − f (x) ≤ f (x ∪ x∗ ) − f (x) = l X j=1 ≤ l X j=1  ∗ f (x ∪ {v1∗ , . . . , vj∗ }) − f (x ∪ {v1∗ , . . . , vj−1 })  f (x ∪ {vj∗ }) − f (x) + ǫ , where the first inequality is by the monotonicity of f , and the last inequality is derived by Definition 3 since f is ǫ-approximately submodular. Let v ∗ = arg maxv∈x∗ \x f (x ∪ {v}). Then, we have f (x ∪ {v ∗ }) − f (x) ≥ 1 1 (f (x∗ ) − f (x)) − ǫ ≥ (OP T − f (x)) − ǫ. l k Theorem 2 For maximizing a monotone non-submodular function f with a size constraint, where f is ǫ-approximately submodular as in Definition 3, the expected running time of the GSEMO until finding a solution x with |x| ≤ k and f (x) ≥ (1 − e−1 ) · (OP T − kǫ) is O(n2 (log n + k)). 12 Proof. We divide the optimization process into two phases: (1) starts from an initial random solution and finishes until finding the special solution {0}n ; (2) starts after phase (1) and finishes until finding a solution with the desired approximation guarantee. As the analysis of phase (1) in the proof of Theorem 1, we know that the population P will contain the solution {0}n after O(nPmax log n) iterations in expectation. For phase (2), we consider a quantity Jmax , which is defined as (  Jmax = max j ∈ [0, k] | ∃x ∈ P, |x| ≤ j ∧ f (x) ≥ 1 1− 1− k j ! ) · (OP T − kǫ) . That is, Jmax denotes the maximum value of j ∈ [0, k] such that in the population P , there exists a solution x with |x| ≤ j and f (x) ≥ (1 − (1 − k1 )j ) · (OP T − kǫ). We analyze the expected number of iterations until Jmax = k, which implies that there exists one solution x in P satisfying that |x| ≤ k and f (x) ≥ (1 − (1 − k1 )k ) · (OP T − kǫ) ≥ (1 − e−1 ) · (OP T − kǫ). That is, the desired approximation guarantee is reached. The current value of Jmax is at least 0, since the population P contains the solution {0}n , which will always be kept in P once generated. Assume that currently Jmax = i < k. Let x be a corresponding solution with the value i, i.e., |x| ≤ i and f (x) ≥ (1 − (1 − k1 )i ) · (OP T − kǫ). It is easy to see that Jmax cannot decrease because cleaning x from P (line 9 of Algorithm 1) implies that x is weakly dominated by a newly generated solution y, which must satisfy that |y| ≤ |x| and f (y) ≥ f (x). By Lemma 2, we know that flipping one specific 0 bit of x (i.e., adding a specific element) can generate a new solution x′ , which satisfies that f (x′ ) − f (x) ≥ k1 (OP T − f (x)) − ǫ. Then, we have   i+1 !  1 1 1 ′ f (x ) ≥ 1 − f (x) + · OP T − ǫ ≥ 1 − 1 − · (OP T − kǫ), k k k where the last inequality is derived by f (x) ≥ (1−(1− k1 )i )·(OP T −kǫ). Since |x′ | = |x|+1 ≤ i+1, x′ will be included into P ; otherwise, x′ must be dominated by one solution in P (line 8 of Algorithm 1), and this implies that Jmax has already been larger than i, which contradicts with the assumption Jmax = i. After including x′ , Jmax ≥ i + 1. Thus, Jmax can increase by at least 1 in one iteration with probability at least 1 Pmax · n1 (1 − n1 )n−1 ≥ selecting x in line 4 of Algorithm 1 and 1 enPmax , 1 n (1 where 1 Pmax is a lower bound on the probability of − n1 )n−1 is the probability of flipping a specific bit of x while keeping other bits unchanged in line 5. Then, it needs at most enPmax expected number of iterations to increase Jmax . Thus, after at most k · enPmax iterations in expectation, Jmax must have reached k. As the proof of Theorem 1, we know that Pmax ≤ n + 1. Thus, by summing up the expected running time of two phases, we get that the expected running time of the GSEMO for finding a solution x with |x| ≤ k and f (x) ≥ (1 − e−1 ) · (OP T − kǫ) is O(nPmax log n + knPmax ) = O(n2 (log n + k)). 13 Theorem 3 gives the approximation guarantee of the GSEMO w.r.t. the submodularity ratio in Definition 4. Note that it was proved that the standard greedy algorithm can find a subset x with |x| = k and f (x) ≥ (1 − e−γx,k ) · OP T [6]. Thus, Theorem 3 shows that the GSEMO can achieve nearly this best known approximation guarantee. The proof of Theorem 3 is similar to that of Theorem 2. The main difference is that a different inductive inequality on f is used in the definition of the quantity Jmax , due to the change of the adopted notion of approximate submodularity. For concise illustration, we will mainly show the difference in the proof of Theorem 3. Lemma 3 [34] Assume that a set function f is monotone and non-submodular. Then, for any x ∈ {0, 1}n, there / x such that exists one element v ∈ f (x ∪ {v}) − f (x) ≥ γx,k (OP T − f (x)), k where γx,k is the submodularity ratio of f w.r.t. x and k as in Definition 4. Theorem 3 For maximizing a monotone non-submodular function f with a size constraint, the expected running time of the GSEMO until finding a solution x with |x| ≤ k and f (x) ≥ (1 − e−γmin ) · OP T is O(n2 (log n + k)), where γmin = minx:|x|=k−1 γx,k and γx,k is the submodularity ratio of f w.r.t. x and k as in Definition 4. Proof. The proof is similar to that of Theorem 2. We use a different Jmax , which is defined as      γmin j · OP T . Jmax = max j ∈ [0, k] | ∃x ∈ P, |x| ≤ j ∧ f (x) ≥ 1 − 1 − k It is easy to verify that Jmax = k implies that the desired approximation guarantee is reached, since there must exist one solution x in P satisfying that |x| ≤ k and f (x) ≥ (1 − (1 − (1 − e −γmin γmin k k ) ) · OP T ≥ ) · OP T . Assume that currently Jmax = i < k and x is a corresponding solution, i.e., |x| ≤ i and f (x) ≥ (1 − (1 − γmin i k ) ) · OP T . We then only need to show that flipping one specific 0 bit of x can generate a new solution x′ with f (x′ ) ≥ (1 − (1 − γmin i+1 ) k ) · OP T . By Lemma 3, we know that flipping one specific 0 bit of x can generate a new solution x′ , which satisfies that γx,k k (OP T − f (x)). Then, we have     γx,k  γx,k γmin i γx,k   f (x′ ) ≥ 1 − f (x) + 1− · OP T · OP T ≥ 1 − 1 − k k k k    γmin i+1 · OP T, ≥ 1− 1− k f (x′ ) − f (x) ≥ where the second inequality is by f (x) ≥ (1 − (1 − γmin i k ) ) · OP T , and the last inequality is by γx,k ≥ γmin , which can be easily derived from |x| < k and γx,k decreasing with x. Thus, the theorem holds. 14 Theorem 4 gives the approximation guarantee of the GSEMO w.r.t. the ǫ-approximately submodular ratio in Definition 5. Note that the standard greedy algorithm obtains the best known approximation guarantee f (x) ≥ 1 4kǫ 1+ (1−ǫ) 2 2k (1 − (1 − k1 )k ( 1−ǫ 1+ǫ ) ) · OP T [17]. Comparing with this, the approximation guarantee of the GSEMO is slightly better, since  k  k !  i k−1 X  1 1 1 1−ǫ 1−ǫ 1−ǫ 1 − 1 − 1 − = · 2kǫ k 1+ǫ k(1 + ǫ) i=0 k 1+ǫ 1 + 1−ǫ ! i   2 k  2k ! k−1  1 1 1−ǫ 1 1−ǫ (1 − ǫ)2 X 1− 1− 1− . = · ≥ 4kǫ k(1 + ǫ)2 i=0 k 1+ǫ k 1+ǫ 1 + (1−ǫ) 2 The proof of Theorem 4 is also similar to that of Theorem 2, except that a different inductive inequality on f is used in the definition of the quantity Jmax , due to the change of the adopted notion of approximate submodularity. Lemma 4 Assume that a set function f is monotone and ǫ-approximately submodular as in Definition 5. Then, / x such that for any x ∈ {0, 1}n, there exists one element v ∈ 1−ǫ 1−ǫ f (x) ≥ (OP T − f (x)). 1+ǫ k(1 + ǫ) f (x ∪ {v}) − Proof. Let x∗ be an optimal solution, i.e., f (x∗ ) = OP T . Let v ∗ = arg maxv∈x∗ \x f (x∪{v}). Since f is ǫ-approximately submodular as in Definition 5, we use g to denote one corresponding submodular function satisfying that for all x ∈ {0, 1}n, (1 − ǫ)g(x) ≤ f (x) ≤ (1 + ǫ)g(x). Then, we have g(x∗ ∪ x) − g(x) ≤ X v∈x∗ \x  g(x ∪ {v}) − g(x)  X  1 ≤ f (x ∪ {v}) − g(x) 1−ǫ v∈x∗ \x   1 f (x ∪ {v ∗ }) − g(x) , ≤k 1−ǫ where the first inequality is by the submodularity of g (i.e., Eq. (2)), the second inequality is by (1 − ǫ)g(x) ≤ f (x) for any x, and the last inequality is by the definition of v ∗ and |x∗ | ≤ k. By reordering the terms, we get   1 1−ǫ ∗ (1 − ǫ)g(x). g(x ∪ x) + 1 − f (x ∪ {v }) ≥ k k ∗ Since g(x) ≥ 1 ∗ 1+ǫ f (x) and g(x ∪x) ≥ 1 ∗ 1+ǫ f (x ∪x) ≥ 1 ∗ 1+ǫ f (x ) = 1 1+ǫ OP T (where the last inequality is by the monotonicity of f ), we have f (x ∪ {v ∗ }) ≥   1−ǫ 1 1−ǫ OP T + 1 − f (x). k(1 + ǫ) k 1+ǫ By reordering the terms, the lemma holds. 15 Theorem 4 For maximizing a monotone non-submodular function f with a size constraint, where f is ǫ-approximately submodular as in Definition 5, the expected running time of the GSEMO until finding a solution x with |x| ≤ k and f (x) ≥ 1 2kǫ 1+ 1−ǫ (1 − (1 − 1 k 1−ǫ k k ) ( 1+ǫ ) ) · OP T ≥ 1 2kǫ 1+ 1−ǫ k (1 − e−1 ( 1−ǫ 1+ǫ ) ) · OP T is O(n2 (log n + k)). Proof. The proof is similar to that of Theorem 2. We use a different Jmax , which is defined as ( ) j  j !  1 1−ǫ 1 Jmax = max j ∈ [0, k] | ∃x ∈ P, |x| ≤ j ∧ f (x) ≥ · OP T . 1− 1− 2kǫ k 1+ǫ 1 + 1−ǫ It is easy to verify that Jmax = k implies that the desired approximation guarantee is reached. Assume that currently Jmax = i < k and x is a corresponding solution, i.e., |x| ≤ i and f (x) ≥ 1 2kǫ 1+ 1−ǫ 1−ǫ i ) ) · OP T . We then only need to show that flipping one specific 0 bit of x (1 − (1 − k1 )i ( 1+ǫ can generate a new solution x′ with f (x′ ) ≥ 1 2kǫ 1+ 1−ǫ i+1 ) · OP T . By Lemma 4, (1 − (1 − k1 )i+1 ( 1−ǫ 1+ǫ ) we know that flipping one specific 0 bit of x can generate a new solution x′ , which satisfies that f (x′ ) − 1−ǫ 1+ǫ f (x) f (x′ ) ≥ ≥  ≥ 1− 1−ǫ k(1+ǫ) (OP T 1 k  1 2kǫ 1 + 1−ǫ − f (x)). Then, we have 1−ǫ 1−ǫ f (x) + · OP T 1+ǫ k(1 + ǫ)  i+1  i+1 ! 1 1−ǫ 1− 1− · OP T, k 1+ǫ where the last inequality is by f (x) ≥ 1 2kǫ 1+ 1−ǫ 1−ǫ i (1 − (1 − k1 )i ( 1+ǫ ) ) · OP T . Thus, the theorem holds. Thus, we have shown that for each notion of approximate submodularity, the GSEMO can always obtain the best known approximation guarantee. Particularly, when the objective function is submodular, the quantity characterizing the approximately submodular degree in Definitions 3-5 becomes ǫ = 0, γU,k = 1 and ǫ = 0, respectively; thus the approximation guarantees obtained by the GSEMO in Theorems 2-4 all become 1 − 1/e, which is optimal in general [25], and also consistent with the previous result in [10]. 5. Conclusion This paper theoretically studies the approximation performance of EAs for two general classes of combinatorial optimization problems, maximizing non-monotone submodular functions without constraints and maximizing monotone non-submodular functions with a size constraint. We prove that in polynomial expected running time, a simple multi-objective EA called GSEMO can achieve a constant approximation guarantee of nearly 1/3 for the first problem class, and can achieve the 16 best known approximation guarantee for the second problem class. These results together with the previous ones for the problem class of maximizing monotone submodular functions with matroid constraints [10, 35] provide a theoretical explanation for the empirically good performance of EAs in various applications. A question that will be investigated in the future is to investigate whether simple single-objective EAs such as the (1+1)-EA can achieve good approximation guarantees on the studied two problem classes. Most of the existing studies considered the problems where the objective function is a set function. We will also try to investigate the performance of EAs for optimizing functions over the integer lattice or continuous domains. References [1] A. A. Ageev and M. I. Sviridenko. An 0.828-approximation algorithm for the uncapacitated facility location problem. Discrete Applied Mathematics, 93(2):149–156, 1999. [2] A. Auger and B. Doerr. Theory of Randomized Search Heuristics: Foundations and Recent Developments. World Scientific, Singapore, 2011. [3] T. Bäck. Evolutionary Algorithms in Theory and Practice: Evolution Strategies, Evolutionary Programming, Genetic Algorithms. Oxford University Press, Oxford, UK, 1996. [4] N. Buchbinder, M. Feldman, J. Seffi, and R. Schwartz. A tight linear time (1/2)-approximation for unconstrained submodular maximization. SIAM Journal on Computing, 44(5):1384–1402, 2015. [5] W. Chen, T. Lin, Z. Tan, M. Zhao, and X. Zhou. Robust influence maximization. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD’16), pages 795–804, San Francisco, CA, 2016. [6] A. Das and D. Kempe. Submodular meets spectral: Greedy algorithms for subset selection, sparse approximation and dictionary selection. In Proceedings of the 28th International Conference on Machine Learning (ICML’11), pages 1057–1064, Bellevue, WA, 2011. [7] S. Droste, T. Jansen, and I. Wegener. A rigorous complexity analysis of the (1+1) evolutionary algorithm for separable functions with Boolean inputs. Evolutionary Computation, 6(2):185– 196, 1998. [8] S. Droste, T. Jansen, and I. Wegener. On the analysis of the (1+1) evolutionary algorithm. Theoretical Computer Science, 276(1-2):51–81, 2002. [9] U. Feige, V. S. Mirrokni, and J. Vondrak. Maximizing non-monotone submodular functions. SIAM Journal on Computing, 40(4):1133–1153, 2011. 17 [10] T. Friedrich and F. Neumann. Maximizing submodular functions under matroid constraints by evolutionary algorithms. Evolutionary Computation, 23(4):543–558, 2015. [11] T. Friedrich, J. He, N. Hebbinghaus, F. Neumann, and C. Witt. Approximating covering problems by randomized search heuristics using multi-objective models. Evolutionary Computation, 18(4):617–633, 2010. [12] O. Giel. Expected runtimes of a simple multi-objective evolutionary algorithm. In Proceedings of the 2003 IEEE Congress on Evolutionary Computation (CEC’03), pages 1918–1925, Canberra, Australia, 2003. [13] M. X. Goemans and D. P. Williamson. Improved approximation algorithms for maximum cut and satisfiability problems using semidefinite programming. Journal of the ACM, 42(6):1115– 1145, 1995. [14] J. Håstad. Some optimal inapproximability results. Journal of the ACM, 48(4):798–859, 2001. [15] J. He and X. Yao. Drift analysis and average time complexity of evolutionary algorithms. Artificial Intelligence, 127(1):57–85, 2001. [16] X. He and D. Kempe. Robust influence maximization. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD’16), pages 885–894, San Francisco, CA, 2016. [17] T. Horel and Y. Singer. Maximization of approximately submodular functions. In Advances In Neural Information Processing Systems 29 (NIPS’16), pages 3045–3053, Barcelona, Spain, 2016. [18] G. S. Hornby, A. Globus, D. S. Linden, and J. D. Lohn. Automated antenna design with evolutionary algorithms. In Proceedings of the 2006 American Institute of Aeronautics and Astronautics Conference on Space, pages 19–21, San Jose, CA, 2006. [19] T. Jansen and I. Wegener. Evolutionary algorithms-how to cope with plateaus of constant fitness and when to reject strings of the same fitness. IEEE Transactions on Evolutionary Computation, 5(6):589–599, 2001. [20] J. R. Koza, M. A. Keane, and M. J. Streeter. What’s AI done for me lately? Genetic programming’s human-competitive results. IEEE Intelligent Systems, 18(3):25–31, 2003. [21] A. Krause and V. Cevher. Submodular dictionary selection for sparse representation. In Proceedings of the 27th International Conference on Machine Learning (ICML’10), pages 567–574, Haifa, Israel, 2010. 18 [22] A. Krause, A. Singh, and C. Guestrin. Near-optimal sensor placements in Gaussian processes: Theory, efficient algorithms and empirical studies. Journal of Machine Learning Research, 9: 235–284, 2008. [23] P. C. Ma, K. C. Chan, X. Yao, and D. K. Chiu. An evolutionary clustering algorithm for gene expression microarray data analysis. IEEE Transactions on Evolutionary Computation, 10(3): 296–314, 2006. [24] A. Mukhopadhyay, U. Maulik, S. Bandyopadhyay, and C. A. C. Coello. A survey of multiobjective evolutionary algorithms for data mining: Part I. IEEE Transactions on Evolutionary Computation, 18(1):4–19, 2014. [25] G. L. Nemhauser and L. A. Wolsey. Best algorithms for approximating the maximum of a submodular set function. Mathematics of Operations Research, 3(3):177–188, 1978. [26] G. L. Nemhauser, L. A. Wolsey, and M. L. Fisher. An analysis of approximations for maximizing submodular set functions – I. Mathematical Programming, 14(1):265–294, 1978. [27] F. Neumann. Expected runtimes of a simple evolutionary algorithm for the multi-objective minimum spanning tree problem. European Journal of Operational Research, 181(3):1620– 1629, 2007. [28] F. Neumann and I. Wegener. Minimum spanning trees made easier via multi-objective optimization. Natural Computing, 5(3):305–319, 2006. [29] F. Neumann and I. Wegener. Randomized local search, evolutionary algorithms, and the minimum spanning tree problem. Theoretical Computer Science, 378(1):32–40, 2007. [30] F. Neumann and C. Witt. Bioinspired Computation in Combinatorial Optimization: Algorithms and Their Computational Complexity. Springer-Verlag, Berlin, Germany, 2010. [31] F. Neumann, J. Reichel, and M. Skutella. Computing minimum cuts by randomized search heuristics. Algorithmica, 59(3):323–342, 2011. [32] C. Qian, Y. Yu, and Z.-H. Zhou. An analysis on recombination in multi-objective evolutionary optimization. Artificial Intelligence, 204:99–119, 2013. [33] C. Qian, Y. Yu, and Z.-H. Zhou. On constrained Boolean Pareto optimization. In Proceedings of the 24th International Joint Conference on Artificial Intelligence (IJCAI’15), pages 389–395, Buenos Aires, Argentina, 2015. [34] C. Qian, J.-C. Shi, Y. Yu, K. Tang, and Z.-H. Zhou. Parallel Pareto optimization for subset selection. In Proceedings of the 25th International Joint Conference on Artificial Intelligence (IJCAI’16), pages 1939–1945, New York, NY, 2016. 19 [35] J. Reichel and M. Skutella. Evolutionary algorithms and matroid optimization problems. Algorithmica, 57(1):187–206, 2010. [36] C. Witt. Worst-case and average-case approximations by simple randomized search heuristics. In Proceedings of the 22nd Annual Symposium on Theoretical Aspects of Computer Science (STACS’05), pages 44–56, Stuttgart, Germany, 2005. [37] Y. Yu, X. Yao, and Z.-H. Zhou. On the approximation ability of evolutionary optimization with application to minimum set cover. Artificial Intelligence, 180:20–33, 2012. 20
9cs.NE
Ray: A Distributed Framework for Emerging AI Applications arXiv:1712.05889v1 [cs.DC] 16 Dec 2017 Philipp Moritz∗, Robert Nishihara,∗ Stephanie Wang, Alexey Tumanov, Richard Liaw, Eric Liang, William Paul, Michael I. Jordan, Ion Stoica UC Berkeley Abstract with learning to operate continuously within an uncertain environment [44]. RL-based applications have already led to remarkable results, such as Google’s AlphaGo beating a human world champion [43], and are finding their way into self-driving cars, UAVs [33], and robotic manipulation [23, 47]. There are three characteristics that distinguish RL applications from traditional supervised learning applications. First, they often rely heavily on simulations to explore states and discover the consequences of actions. A simulator could encode the rules of a computer game [11], the Newtonian dynamics of a physical system such as a robot [45], or the hybrid dynamics of virtual environments. This generally requires massive amounts of computation; for example, a realistic application might perform hundreds of millions of simulations. Second, the computation graph of an RL application is heterogeneous and evolves dynamically. A simulation can take from a few milliseconds to a few minutes, and the result of a simulation can determine the parameters of future simulations. Third, many RL applications, such as robotic control or autonomous driving, require actions to be taken quickly in response to a constantly changing environment. Furthermore, to choose the best action, the application may need to perform more simulations in real time. In summary, we need a computation framework that supports heterogeneous and dynamic computation graphs, while handling millions of tasks per second with millisecond-level latencies. Existing cluster computing frameworks fall short of adequately satisfying these requirements. MapReduce [18], Apache Spark [50], Dryad [25], Dask [38], and CIEL [32] support neither the throughput nor the latencies required by general RL applications, while TensorFlow [5], Naiad [31], MPI [21], and Canary [37] generally assume static computation graphs.1 The next generation of AI applications will continuously interact with the environment and learn from these interactions. These applications impose new and demanding systems requirements, both in terms of performance and flexibility. In this paper, we consider these requirements and present Ray—a distributed system to address them. Ray implements a dynamic task graph computation model that supports both the task-parallel and the actor programming models. To meet the performance requirements of AI applications, we propose an architecture that logically centralizes the system’s control state using a sharded storage system and a novel bottom-up distributed scheduler. In our experiments, we demonstrate sub-millisecond remote task latencies and linear throughput scaling beyond 1.8 million tasks per second. We empirically validate that Ray speeds up challenging benchmarks and serves as both a natural and performant fit for an emerging class of reinforcement learning applications and algorithms. 1 Introduction Artificial intelligence is currently emerging as the workhorse technology for a range of real-world applications [27]. To date, however, these applications have largely been based on a fairly restricted supervised learning paradigm in which a model is trained offline and deployed to serve predictions online. As the field matures, it will be necessary to consider a broader setting than standard supervised learning. Instead of making and serving a single prediction, machine learning applications must increasingly operate in dynamic environments, react to changes in the environment, and take sequences of actions to accomplish a goal [6, 34]. These broader requirements are naturally framed within the paradigm of reinforcement learning (RL), which deals ∗ equal 1 While deep learning frameworks like TensorFlow or MXNet are critical components of RL systems, they are not sufficient on their own. Existing distributed RL applications [3, 20, 39] that use these systems contribution 1 In this paper, we propose Ray, a cluster computing framework that satisfies these requirements. To support the heterogeneous and dynamic workloads imposed by these applications, Ray implements a dynamic task graph computation model, similar to CIEL [32]. However, Ray also provides an actor programming abstraction on top of this execution model, in addition to the task-parallel abstraction provided by CIEL. The actor abstraction enables Ray to support stateful components, such as thirdparty simulators. To achieve the stringent performance targets while supporting dynamic computation graphs, Ray employs a new distributed architecture that is horizontally scalable. The architecture is based on two key ideas. First, we store all of the control state of the system in a global control store, which enables all of the other components in the system to be stateless. As a result, each component can easily be scaled horizontally and restarted in the case of failures. In turn, the global control store can be scaled via sharding and made fault tolerant via replication. Second, we introduce a new bottom-up distributed scheduler, where tasks are submitted by workers and drivers to local schedulers (there is one local scheduler per node). Local schedulers may choose to schedule tasks locally or to forward tasks to a replicated global scheduler. This decreases task latency by allowing local decisions, and increases the system throughput by reducing the burden on the global scheduler. We make the following contributions: simple RL application to illustrate the key requirements for Ray. An RL system consists of an agent that interacts repeatedly with the environment (see Figure 1(a)). The goal of the agent is to learn a policy that maximizes some reward. A policy is a mapping from the state of the environment to an action to take. The definitions of environment, agent, state, action, and reward are applicationspecific (Table 1). Figure 2 shows an example of the pseudocode used by an agent to learn a policy. A typical procedure consists of two steps: (1) evaluate the current policy, and (2) improve the policy. To evaluate the policy, the pseudocode invokes rollout(environment, policy) to generate a set of rollouts, where a rollout is a trajectory of states and rewards collected by interacting with the environment using environment.step(action). An action is computed given the current policy and environment state via policy.compute(state). As trajectories are generated, train policy() uses completed trajectories to improve the current policy via policy.update(trajectories). This process is repeated until the policy converges. While simple, this application illustrates the key requirements of emerging AI applications. We group these requirements into three categories. Flexibility. The flexibility of a system is typically measured in terms of the diversity of the workloads it can support. We consider two aspects of flexibility: the heterogeneity of concurrently executing tasks and the generality and dynamicity of the execution graph. Concurrent, heterogeneous tasks. Concurrent tasks can be heterogeneous along three dimensions: • We specify the systems requirements for emerging AI applications: support for (a) heterogeneous, concurrent computations, (b) dynamic task graphs, (c) high-throughput and low-latency scheduling, and (d) transparent fault tolerance. • Functionality. In the case of a robot, assessing the environment’s state (e.g., environment.step(action)) involves processing the inputs of multiple sensors, such as video, microphone, and radar. This requires running multiple tasks in parallel, each implementing a different computation (see Figure 1(b)). • We provide the actor abstraction–in addition to the task-parallel programming abstraction–on top of a dynamic task graph computation model. • Duration. The time it takes to compute a trajectory can vary significantly (see rollout(policy, environment)). For example, in the case of a game, it could take just a few actions (moves) to lose the game, or it could take hundreds of moves to win it. • We propose a horizontally scalable architecture to meet the above requirements, and build Ray, a cluster computing system that realizes this architecture. 2 • Resource types. Computing an action by evaluating the policy (e.g., policy.compute(state)) is in many cases implemented by a deep neural network, which typically requires the use of GPUs. On the other hand, most of the other computations use CPUs. Motivation and Requirements While Ray can support a variety of workloads—as it provides both the task-parallel and the actor abstractions— we focus on RL workloads in this paper, as they are representative of emerging AI applications, and were the primary driver behind Ray’s design. Here, we consider a Note that these requirements are not naturally satisfied by the Bulk Synchronous Parallel (BSP) model [46], which is implemented by many of today’s popular cluster computing frameworks [18, 50]. With BSP, all tasks within rely on ad-hoc solutions or other distributed frameworks to implement task-parallelism and fault tolerance and to integrate stateful simulators. 2 (a) (b) (c) Figure 1: (a) An RL system. (b) Task graph for processing sensor inputs. (c) Task graph for learning policy. Application Go (game) Atari Pong Robot moving an object Environment Board and opponent Program Physical world Agent Player Player Control program State Board position Sequence of video frames Object and robot pose Action Place a piece Control joystick Actuate joints Reward Game outcome Pong score Object moved Table 1: Example RL applications. // generate a trajectory under a given policy rollout(policy, environment): trajectory ← [] state ← environment.initial state() while (not environment.has terminated()): action ← policy.compute(state) state, reward ← environment.step(action) trajectory.append(state, reward) return trajectory the environment and compute a new action in a matter of milliseconds. Similarly, simulations might take on the order of milliseconds as well. As such, we need to be able to schedule tasks in less than one millisecond. Otherwise the scheduling overhead could be significant. Given that clusters with tens of thousands of cores are common, we need to be able to schedule hundreds of thousands or even millions of tasks per second. Consider a cluster consisting of 100 servers, each with 32 cores, and suppose each task takes 5ms to execute. To fully utilize this cluster, we would need to schedule 640K tasks/sec. // learn a policy in a given environment train policy(environment): policy ← initial policy() while (policy has not converged): trajectories ← [] // generate k rollouts and use them to update policy for i from 1 to k: trajectories.append(rollout(policy, environment)) policy = policy.update(trajectories) return policy Ease of development. Since writing parallel applications is non-trivial, and since ML developers prefer to focus on their applications rather than on systems programming, simplifying development is paramount for the success of such a system. Deterministic replay and fault tolerance. The ability to deterministically replay a job dramatically simplifies debugging. Transparent fault tolerance obviates the need for users to handle faults explicitly. It also enables users to use cheap preemptible resources (e.g., spot instances on AWS), leading to substantial cost savings when running in a public cloud. Easy parallelization of existing algorithms. This involves providing a simple API and supporting existing languages, tools, and libraries. First, we need to provide support for Python, as Python is the language of choice for AI developers. Second, we need to provide tight integration with the wide range of available thirdparty libraries. These libraries include simulators such as OpenAI gym [13], DeepMind Lab [10], and the Mujoco physics simulator [45] as well as deep learning frameworks like TensorFlow [5], Theano [12], PyTorch [4], and Caffe [26]. As we will see, this requires augmenting the task-parallel model with an actor-like abstraction to wrap these third-party services. Figure 2: Pseudocode for a typical RL training application. the same stage2 typically perform the same computations (albeit on different data partitions) and take roughly the same amounts of time.3 Dynamic task graphs. Consider the train policy() function. Though not shown in Figure 2, it would be natural to update the policy as soon as a subset of rollouts finish (instead of waiting for all of them) and to launch new rollouts to maintain a pool of executing rollouts as in Figure 1(c). This makes the execution graph dynamic, as we cannot predict the order in which rollouts will complete or which rollouts will be used for a particular policy update. Performance. In the case of a robot interacting with the physical environment, we need to infer the state of 2A stage is the unit of parallelism in BSP. straggler mitigation techniques depend on this assumption [8]. 3 Many 3 3 Programming and Computation Model Ray provides basic support for stateful components in the form of actors. In Ray, an actor is a stateful process that exposes a set of methods that can be invoked as remote functions and that executes these methods serially. Ray implements a dynamic task graph computation model. On top, Ray provides both an actor and a taskparallel programming abstraction. This dual abstraction differentiates Ray from related systems, such as CIEL which only provides a task-parallel abstraction, and Orleans, which primarily provides an actor abstraction [14]. 3.1 3.2 Computation Model Ray employs a dynamic task graph computation model [19], in which the execution of both remote functions and actor methods is automatically triggered by the system when their inputs become available. In this section, we describe how the computation graph (Figure 3(b)) is constructed from a user program (Figure 3(a)). This program uses the API in Table 2 to implement the pseudocode from Figure 2. Ignoring actors first, there are two types of nodes in a computation graph: data objects and remote function invocations, or tasks. There are also two types of edges: data edges and control edges. Data edges capture the dependencies between data objects and tasks. More precisely, if data object D is an output of task T , we add a data edge from T to D. Similarly, if D is an input to T , we add a data edge from D to T . Control edges capture the computation dependencies that result from nested remote functions (Section 3.1): if task T1 invokes task T2 , then we add a control edge from T1 to T2 . Actor method invocations are also represented as nodes in the computation graph. They are identical to tasks with one key difference. To capture the state dependency across subsequent method invocations on the same actor, we add a third type of edge: a stateful edge. If method M j is called right after method Mi on the same actor, then we add a stateful edge from Mi to M j . Thus, all methods invoked on the same actor object form a chain connected by stateful edges (Figure 3(b)). This chain captures the order in which these methods were invoked. Stateful edges help us embed actors in an otherwise stateless task graph, as they capture the implicit data dependency between successive method invocations sharing the internal state of an actor. Stateful edges also enable us to maintain lineage. As in other dataflow systems [50], we track data lineage to enable reconstruction. By explicitly including stateful edges in the lineage graph, we can easily reconstruct lost data, whether produced by remote functions or actor methods (Section 4.2.3). Programming Model and API At its core, Ray provides a task-parallel programming model. Table 2 shows Ray’s API. When a remote function is invoked, a future that represents the result of the task is returned immediately. Futures can be retrieved using ray.get() and composed, i.e., a future can be passed as an argument into another remote function. This allows the user to express parallelism while capturing data dependencies. Remote functions operate on immutable objects, and are expected to be stateless and side-effect free: their outputs are determined solely by their inputs. This implies idempotence, which simplifies fault tolerance through function re-execution on failure. To satisfy the requirements for heterogeneity, flexibility, and ease of development given in Section 2, we augment the task-parallel programming model in four ways. First, to handle concurrent tasks with heterogeneous durations, we introduce ray.wait(). This call takes in a list of futures and returns the subset whose results are available, either after a timeout or when at least k are available. In contrast, ray.get() blocks until all requested futures are available. This is highly beneficial for RL applications, as simulations may have widely different durations, but complicates fault tolerance due to introduced nondeterminism. Second, to handle resource-heterogeneous tasks, we enable developers to specify resource requirements so that the Ray scheduler can efficiently manage resources. The resources specified for a remote function are only allocated during the function’s execution. Third, to improve flexibility, we enable nested remote functions, meaning that remote functions can invoke other remote functions. This is also critical for achieving high scalability (see Section 4), as it enables multiple processes to invoke remote functions in parallel (otherwise the driver becomes a bottleneck for task invocations). Finally, and most importantly, for ease of development and efficiency, we enhance our programming model with an actor abstraction. One limitation we encountered early in our development with stateless tasks was the inability to wrap third-party simulators, which do not expose their internal state. To address this limitation, 4 Architecture 4.1 Application Layer The application layer consists of three components: • Driver: A process executing the user program. 4 Name futures list = f.remote(args) obj list = ray.get(futures list) futures list done = ray.wait(futures list, k, timeout) actor = Class.remote(args) futures list = actor.method.remote(args) Description Execute function f () remotely. f () takes either object values or futures as arguments, and returns a list of futures. This is a non-blocking call. Return the values associated with a list of futures. This is a blocking call. Given a list of futures, return the futures whose corresponding tasks have completed as soon as either k of the tasks have completed or the timeout expires. Instantiate class Class as a remote actor, and return a reference to it. Call a method on the remote actor and return a list of futures. This is a non-blocking call. Table 2: Ray API T0 train_policy @ray.remote def create_policy(): # Initialize the policy randomly. return policy @ray.remote(num_gpus=2) def update_policy(policy, *rollouts): # Update the policy. return policy @ray.remote(num_gpus=1) @ray.remote class Simulator(object): def train_policy(): def __init__(self): # Create a policy. # Initialize the environment. policy_id = create_policy.remote() self.env = Environment() # Create 10 actors. def rollout(self, policy, num_steps): simulators = [Simulator.remote() for _ in range(10)] observations = [] # Do 100 steps of training. observation = self.env.current_state() for _ in range(100): for _ in range(num_steps): # Perform one rollout on each actor. action = compute(policy, observation) rollout_ids = [s.rollout.remote(policy) for s in simulators] observation = self.env.step(action) # Update the policy with the rollouts. observations.append(observation) policy_id = update_policy.remote(policy_id, return observations *rollout_ids) return ray.get(policy_id) A10 Simulator T1 create_policy A20 Simulator A11 rollout policy1 A21 rollout rollout21 rollout11 T2 update_policy policy2 A12 rollout rollout22 rollout12 … object data edges A22 rollout T3 update_policy … control edges (a) … task/method stateful edges (b) Figure 3: (a) Python code implementing the example in Figure 2 in Ray. Note that @ray.remote indicates remote functions and actors. Invocations of remote functions and actor methods return futures, which can be passed to subsequent remote functions or actor methods to encode task dependencies. Each actor has an environment object self.env shared between all of its methods. (b) The task graph corresponding to an invocation of train policy.remote(). Remote function calls and the actor method calls correspond to tasks in the task graph. The figure shows two actors. The method invocations for each actor (the tasks labeled A1i and A2i ) have stateful edges between them indicating that they share the mutable actor state. There are control edges from train policy to the tasks that it invokes. To train multiple policies in parallel, we could call train policy.remote() multiple times. • Worker: A stateless process that executes tasks (remote functions) invoked by a driver or another worker. Workers are started automatically and assigned tasks by the system layer. When a remote function is declared, the function is automatically published to all workers. A worker executes tasks serially. contrast, an actor is a stateful process in that the results of a method invocation can depend on the previous methods executed by that actor. 4.2 System Layer The system layer enables us to meet the performance and fault tolerance goals, as discussed in Section 2, by employing an architecture in which each component is horizontally scalable and fault-tolerant. This layer consists of three major components: a global control store, a distributed scheduler, and a distributed object store. • Actor: A stateful process that executes, when invoked, the methods it exposes. Unlike a worker, an actor is explicitly instantiated by a worker or a driver. Like workers, actors execute methods serially. Note that workers are stateless in that they do not maintain local state across tasks. Assuming deterministic execution, invoking the same remote function with the same arguments will return the same results no matter whether it is executed on the same worker or not. In 4.2.1 Global Control Store (GCS) At its core, our system leverages a global control store (GCS), which stores all up-to-date metadata and control state information in the system. This includes (1) a speci5 Figure 5: Bottom-up distributed scheduler. Tasks are submitted bottom-up, from drivers and workers to a local scheduler and forwarded to the global scheduler only if needed (Section 4.2.2). The thickness of each arrow is proportional to its request rate. Figure 4: Ray’s architecture consists of two parts: an application layer and a system layer. The application layer implements the API and the computation model described in Section 3, the system layer implements task scheduling and data management to satisfy the performance and fault-tolerance requirements. schedulers (e.g., Canary [37]); (3) parallel scheduling, where multiple global schedulers schedule tasks concurrently on all worker nodes (e.g., Sparrow [36]). Unfortunately, none of these approaches addresses Ray’s demands. Batch scheduling still requires the global scheduler to handle every task, which limits its scalability, hierarchical scheduling assumes the task graph is known in advance (i.e., the graph is static), and parallel scheduling assumes that every global scheduler schedules independent jobs. In contrast, we require a highly scalable scheduler to handle dynamic task graphs, possibly generated by a single job. Like existing hierarchical scheduling solutions, we employ a global scheduler and per-node local schedulers. However, unlike prior solutions, tasks created on a node are submitted to the node’s local scheduler first, not to a global scheduler (Figure 5). A local scheduler schedules tasks locally, unless the node is overloaded, or it cannot satisfy a task’s requirements (e.g., lacks GPU), or a task’s inputs are remote. If a local scheduler doesn’t schedule a task, it sends the task to the global scheduler. To determine the load, the local scheduler checks the current length of its task queue. If the length exceeds some configurable threshold, it concludes that the local node is overloaded. The value of this threshold enables the scheduling policy to span the continuum from centralized, when all tasks are handed over to the global scheduler, to decentralized, when all tasks are handled locally. Each local scheduler sends periodic heartbeats (e.g., every 100ms) to the GCS containing its load information. The GCS records this information and forwards it to the global scheduler. Upon receiving a task, the global scheduler uses the latest load information from every node along with the locations and sizes of the task’s inputs (from the GCS’s object metadata) to decide which node to assign the task to. If the global scheduler be- fication of every task, (2) the code for every remote function, (3) the computation graph, (4) the current locations of all objects, and (5) every scheduling event. The GCS also provides publish-subscribe infrastructure to facilitate communication between components. By storing and managing the entire control state in a centralized fashion, the GCS enables every other component to be stateless. This not only simplifies the support for fault tolerance (i.e., on failure, components restart and read the latest state from the GCS), but also makes it easy to horizontally scale every other component, as all the state shared by the component’s replicas or shards is accessible via the GCS. To scale the GCS, we use sharding. Since we can associate pseudo-random IDs to virtually every data entry in the GCS (e.g., objects, tasks, functions), it is relatively easy to balance the load across multiple shards. To provide fault-tolerance, we use a hot replica for each shard. Centralizing the system control information allows us to easily build debugging, profiling, and visualization tools on top of the GCS. The minimalist tools we’ve built so far have already proven useful in our development. 4.2.2 Bottom-Up Distributed Scheduler Many existing cluster computing frameworks, such as Apache Spark [50], CIEL [32], Dryad [25] and Hadoop [49], implement a centralized scheduler. While this simplifies the design, it hurts scalability. There are several approaches to improve scheduling scalability: (1) batch scheduling, where the scheduler submits tasks to worker nodes in batches to amortize fixed overheads related to task submission (e.g., Drizzle [48]); (2) hierarchical scheduling, where a global scheduler partitions the task graph across per-node local 6 N1 comes a bottleneck, we can instantiate more replicas and have each local scheduler randomly pick a replica to send its tasks to. This makes our scheduler architecture highly scalable. 4.2.3 @ray.remote def add(a, b): return a + b 0 idC = add.remote(a, b) c =ray.get(id) ida idb 1 @ray.remote def add(a, b): return a + b Object Table Object store 9 N1 N2 Object store 6 7 ida a To minimize task latency, we implement an in-memory distributed storage system to store the inputs and outputs of every task. This allows workers and actors to share data efficiently. On each node, we implement the object store via shared memory. This allows zero-copy data sharing between tasks running on the same node. Additionally, we use Apache Arrow [1], an efficient memory layout that is becoming the de facto standard in data analytics. If a task’s inputs are not local, the inputs are replicated to the local object store on the same node before execution. Tasks also write all outputs to the local object store. Replication eliminates the potential bottleneck due to hot data objects and minimizes task execution time as a task only reads and writes data in local memory. This increases throughput for computation-bound workloads, a profile shared by many AI applications. As with existing cluster computing frameworks, such as Apache Spark [50], and Dryad [25], the object store is limited to immutable data, which significantly simplifies the system design by obviating the need for complex consistency protocols (as it avoids concurrent updates), and by simplifying support for fault tolerance. For simplicity, our object store does not build in support for distributed objects, that is, each object fits on a single node. Distributed objects like large matrices or trees can be implemented at a higher level (e.g., the application level) as collections of futures. Worker Function Table @ray.remote def add(a, b): return a + b In-Memory Distributed Object Store N2 Global Control State (GCS) Driver 3 Local Scheduler 2 Global Scheduler 8 ida a idb b 5 Local Scheduler 4 (a) Executing a task remotely N1 N2 Global Control State (GCS) Driver Worker Function Table @ray.remote def add(a, b): return a + b @ray.remote def add(a, b): return a + b idC = add.remote(a, b) c =ray.get(id) 7 Object Table 2 1 ida a idc c @ray.remote def add(a, b): return a + b 5 ida idb idc N1 N2 N2, N1 3 4 idc c ida a idb b 6 Local Scheduler Global Scheduler Local Scheduler (b) Returning the result of a remote task Figure 6: An end-to-end example that adds a and b and returns c. Solid lines are data plane operations and dotted lines are control plane operations. (a) The function add() is registered with the GCS by node 1 (N1), invoked on N1, and executed on N2. (b) N1 gets add()’s result using ray.get(). The Object Table entry for c is created in step 4 and updated in step 6 after c is copied to N1. been lost. By walking backwards along data and stateful edges we reach A10 which has no input.4 Thus, to reconstruct rollout12 , we need to re-instantiate the actor by executing A10 , and then executing the methods A11 and A12 in order. Note that for any object whose lineage includes stateful edges, reconstruction will require reinstantiating the actor (e.g., A10 ) and replaying a possibly long chain of stateful edges (e.g., A11 , A12 , etc). Since actors are commonly used to wrap third-party simulators, which have a finite lifetime, we expect these chains to be bounded. However, we’ve also found actors to be useful for managing more general forms of state. To improve recovery time in such cases, we checkpoint the actor’s state periodically and allow the actor to recover from checkpoints. For low latency, we keep objects entirely in memory and evict them as needed to disk using a least-recentlyused eviction policy. In Section A, we briefly explain how our design satisfies the requirements outlined in Section 2. Object reconstruction. Component failure may result in object loss, which Ray recovers from through lineage re-execution. Ray tracks lineage by recording task dependencies in the GCS during execution. This is similar to the solution employed by other cluster computing systems like Apache Spark [50] and CIEL [32]. Also, like these systems, Ray assumes that objects are immutable and operators (i.e., remote functions and actor methods) are deterministic. However, unlike these systems, Ray adds support for stateful operator (i.e., actor) reconstruction. By integrating stateful edges directly into the computation graph, we can leverage the same reconstruction mechanism for both remote functions and actors. To reconstruct a lost object, we walk backward along data and stateful edges until we find tasks whose inputs are all present in the object store. We then replay the computation subgraph rooted at these inputs. Consider the example in Figure 3(b), and assume that rollout12 has 4 Since it has no input, all of its inputs are trivially in the object store. 7 4.3 Putting Everything Together The bottom-up distributed scheduler (Section 4.2.2) is 3.2KLoC and will undergo significant development as we refine Ray’s scheduling policies. In this section, we focus on the implementation details for achieving the performance targets dictated by real-time AI applications: (a) scheduler performance, (b) object store performance, and (c) end-to-end system performance. Figure 6 illustrates how Ray works end-to-end with a simple example that adds two objects a and b, which could be scalars or matrices, and returns result c. The remote function add() is automatically registered with the GCS upon initialization and distributed to every worker in the system (step 0 in Figure 6(a)). Figure 6(a) shows the step-by-step operations triggered by a driver invoking add.remote(a, b), where a and b are stored on nodes N1 and N2, respectively. The driver submits add(a, b) to the local scheduler (step 1), which forwards it to a global scheduler (step 2).5 Next, the global scheduler looks up the locations of add(a, b)’s arguments in the GCS (step 3) and decides to schedule the task on node N2, which stores argument b (step 4). The local scheduler at node N2 checks whether the local object store contains add(a, b)’s arguments (step 5). Since the local store doesn’t have object a, it looks up a’s location in the GCS (step 6). Learning that a is stored at N1, N2’s object store replicates it locally (step 7). As all arguments of add() are now stored locally, the local scheduler invokes add() at a local worker (step 8), which accesses the arguments via shared memory (step 9). Figure 6(b) shows the step-by-step operations triggered by the execution of ray.get() at N1, and of add() at N2, respectively. Upon ray.get(idc )’s invocation, the driver checks the local object store for the value c, using the future idc returned by add() (step 1). Since the local object store doesn’t store c, it looks up its location in the GCS. At this time, there is no entry for c, as c has not been created yet. As a result, N1’s object store registers a callback with the Object Table to be triggered when c’s entry has been created (step 2). Meanwhile, at N2, add() completes its execution, stores the result c in the local object store (step 3), which in turn adds c’s entry to the GCS (step 4). As a result, the GCS triggers a callback to N1’s object store with c’s entry (step 5). Next, N1 replicates c from N2 (step 6), and returns c to ray.get() (step 7), which finally completes the task. While this example involves a large number of RPCs, in many cases this number is much smaller, as most tasks are scheduled locally, and the GCS replies are cached by the global and local schedulers. 5 Bottom-up distributed scheduler. We implement both the local and global scheduler as event-driven, single-threaded processes. Internally, local schedulers maintain cached state for local object metadata, tasks waiting for inputs, and tasks ready for dispatch to a worker. As object dependencies become available, tasks become ready for dispatch. Worker availability triggers dispatch of as many tasks as possible under the node’s capacity constraints. The local scheduler sends periodic heartbeats (every 100ms) to the global schedulers, routed through the GCS via a publish-subscriber mechanism, containing the dispatch queue length and resource availability. This enables the global scheduler to balance the load across nodes. Object store. Ray’s object store is also implemented as a single-threaded event loop. It uses shared memory so workers on the same node can read data without copying it. Objects are immutable. An object is only made visible after a worker finishes creation. To minimize object creation overhead, the store pre-allocates a pool of large memory-mapped files. We use a SIMD-like memory copy to maximize the throughput of copying data from a worker to the object store’s shared memory. We also parallelize computation of an object’s content hash, which is used to detect non-deterministic computations. Ray uses Apache Arrow [1] to achieve high performance when serializing/deserializing Python objects. Global control store. We implement Ray’s Global Control Store (GCS) using one Redis [40] key-value store per shard (Redis can be easily swapped with other key-value stores). We shard the GCS tables by object and task IDs to scale, and we replicate every shard for fault tolerance. As we scale up the experiment, we distribute the shards across multiple nodes. Though our GCS implementation uses multiple Redis servers, our performance and fault tolerance requirements could also be met by existing systems like RAMCloud [35]. Implementation Ray is implemented in ≈ 40K lines of code (LoC), 72% in C++ for the system layer, 28% in Python for the application layer. The object store and our zero-copy serialization libraries have been factored out as standalone projects that can be used independently of Ray. Lastly, Ray’s monitor tracks system component liveness and reflects component failures in the GCS. Tasks and objects on failed cluster nodes are marked as lost, and objects are later reconstructed with lineage information, as necessary. 5 Note that the N1 local scheduler could also decide to schedule the task locally. 8 tasks (thousands) 10 20 30 40 50 60 number of nodes 5 10 nodes 15 20 Figure 8: Ray maintains balanced load. A driver on the first node submits 100K tasks, which are rebalanced by the global scheduler across the 21 available nodes. a linear fashion, leveraging the GCS and bottom-up distributed scheduler. Ray reaches 1 million tasks per second throughput with 60 m4.16xlarge nodes and processes 100 million tasks in under a minute. We omit x ∈ {70, 80, 90} due to cost. 20000 15 IOPS 15000 Evaluation 10 10000 5 5000 In this section, we demonstrate three key points. First, we examine the scalability of the system as a whole as well as the performance of its individual components (Section 6.1). Second, we demonstrate robustness and fault tolerance (Section 6.2). Third, we demonstrate that Ray is a natural fit for reinforcement learning applications, both in terms of performance and ease of development (Section 6.3). All experiments were run on Amazon Web Services. The specific instance types are reported below. 6.1 executed tasks submitted tasks 100 Figure 7: End-to-end scalability of the system is achieved in 6 100 80 60 40 20 00 0 throughput (GB/s) tasks per second (millions) 1.8 1.6 1.4 1.2 1.0 0.8 0.6 0.4 0.2 0.0 1KB 10KB 100KB 1MB 10MB 100MB 1GB object size 0 Figure 9: Object store write throughput and IOPS. From a single client, throughput exceeds 15GB/s (red) for large objects and 18K IOPS (cyan) for small objects on a 16 core instance (m4.4xlarge). It uses 8 threads to copy objects larger than 0.5MB and 1 thread for small objects. Bar plots report throughput with 1, 2, 4, 8, 16 threads. Results are averaged over 5 runs. Scalability and Performance Object store performance. We track two metrics for object store performance: IOPS (for small objects) and write throughput (for large objects) in Figure 9. As object size increases, the write throughput from a single client reaches 15GB/s. For larger objects, copying the object from the client dominates the time spent on object creation. For smaller objects, completion time is dominated by serialization overhead and IPC between the client and object store. The object store peaks at 18K IOPS, which corresponds to 56µs per operation. End-to-end scalability. One of the key benefits of the Global Control Store (GCS) is the ability to horizontally scale the system. We evaluate this ability in this section. In Fig. 7, we benchmark an embarrassingly parallel workload, increasing the cluster size on the x-axis. We observe near-perfect linearity in progressively increasing task throughput. Ray exceeds 1 million tasks per second throughput at 60 nodes and continues to scale linearly beyond 1.8 million tasks per second at 100 nodes. The rightmost datapoint shows that Ray can process 100 million tasks in less than a minute (54s). Variability (shown with black error bars) is minimal. As expected, increasing task duration reduces throughput proportionally to mean task duration, but the overall scalability remains linear. The global scheduler’s primary responsibility is to maintain balanced load throughout the system. In Figure 8, 100K tasks submitted on a single node are rebalanced across the available resources. Note that the node where the load originates processes more tasks as it maximizes utilization of the local node before forwarding tasks to the global scheduler. 6.2 Fault Tolerance Recovering from object failures. In Figure 10, we demonstrate Ray’s ability to transparently recover from worker node failures and elastically scale. The driver submits rounds of tasks where each task is dependent on a task in the previous round. As worker nodes are killed (at 25s, 50s, 100s), the surviving local schedulers automatically trigger reconstruction of the lost objects. During periods of reconstruction, the tasks originally submitted by the driver stall, since their dependencies cannot be satisfied. However, the overall task throughput remains 9 Original tasks Reexecuted tasks 0 50 100 150 Time since start (s) 200 method calls. The initial throughput is comparable to that without checkpointing. After node failure, the majority of reconstruction is done by executing checkpoint tasks to reconstruct the actor’s state (t = 210-270s). As a result, only 500 tasks need to be re-executed, and new method calls stall for 60s, versus 10K re-executions and 120s without checkpointing, respectively. In the future, we hope to further reduce actor reconstruction time, e. g. by allowing user annotations for read-only methods. Overhead from GCS replication. To make the GCS fault tolerant, we replicate each of the database shards. When a client writes to one of the shards of the GCS, it duplicates the writes to all replicas. For workloads in which we artificially make the GCS the bottleneck by reducing the number of GCS shards, the overhead of twoway replication is less than 10%. In most real workloads the slowdown is undetectable. 60 50 40 30 20 10 0 Number of nodes Throughput (tasks/s) 2000 1500 1000 500 0 Figure 10: Fully transparent fault tolerance for distributed tasks. The dashed line represents the number of nodes in the cluster. Curves show the throughput of new tasks (cyan) and re-executed tasks (red). The driver continually submits and retrieves rounds of 10000 tasks. Each task takes 100ms and depends on a task in the previous round. Each task has input and output of size 100KB. 600 500 400 300 200 100 0 Original tasks Reexecuted tasks Throughput (tasks/s) Throughput (tasks/s) 700 100 200 300 400 Time since start (s) (a) without checkpointing 700 600 500 Original tasks Reexecuted tasks Checkpoint tasks 6.3 Given the diverse and demanding requirements of reinforcement learning applications described in Section 2, reinforcement learning algorithms today are implemented on top of special-purpose ad-hoc systems that typically require substantial engineering effort to develop and which do not generalize to other algorithms. In this section, we implement two types of reinforcement learning algorithms in Ray and show that we are able to match or outperform the performance of specialized systems built specifically for these algorithms. Furthermore, using Ray to distribute these algorithms over clusters requires changing only a few lines of code in serial implementations of the algorithms. In addition, we test Ray in a latency-sensitive setting in which Ray is used to control a simulated robot under varying real-time requirements. 400 300 200 100 0 RL Applications 100 200 300 400 Time since start (s) (b) with checkpointing Figure 11: Fully transparent fault tolerance for actor methods. The driver continually submits tasks to the actors in the cluster. At t = 200s, we kill 2 of the 10 nodes, causing 400 of the 2000 actors in the cluster to be recovered on the remaining nodes. stable, fully utilizing the available resources until the lost dependencies are reconstructed. Furthermore, as more nodes are added back to the system at 210s, Ray is able to fully recover to its initial throughput. Recovering from actor failures. Next, we demonstrate Ray’s ability to transparently recover lost actors. By encoding each actor’s method calls into the dependency graph, we can reuse the same object reconstruction mechanism as in Figure 10. The workload in Figure 11a demonstrates the extreme case where no intermediate actor state is saved. All previous method calls for each lost actor must be re-executed serially (t = 210330s). Lost actors are automatically redistributed across the available nodes, and throughput fully recovers after reconstruction. To improve reconstruction time for long-lived actors, we provide transparent checkpointing of intermediate actor state. Figure 11b shows the same workload, but with an automatic checkpoint task on each actor every 10 6.3.1 Evolution Strategies To evaluate Ray on large-scale RL workloads, we implement the evolution strategies (ES) algorithm and compare to the reference implementation [39], which is a special-purpose system built for this algorithm. It uses a hierarchy of Redis servers as message buses and relies on low-level multiprocessing libraries for sharing data. As shown in Figure 12, a straightforward implementation on top of Ray is more scalable, scaling to 8192 physical cores, whereas the special-purpose system stops running after 1024 cores. The Ray implementation runs in a median time of 3.7 minutes, which is more than twice as fast as the best published result (10 minutes). The Ray implementation was also substantially simpler to develop. Parallelizing a serial implementation using Ray required modifying only 7 lines of code. In contrast, 10 Mean time to solve (minutes) 80 Reference ES Ray ES 60 ing p2.16xlarge (GPU) and m4.16xlarge (high CPU) instances, each of which has 32 physical cores. Ray’s API made it easy to take advantage of heterogeneous resources decreasing costs by a factor of 4.5 [2]. Ray tasks and actors can specify distinct resource requirements, allowing CPU-only tasks to be scheduled on cheaper high-CPU instances. In contrast, MPI applications often exhibit symmetric architectures, in which all processes run the same code and require identical resources, in this case preventing the use of CPU-only machines for scale-out. As shown in Figure 13, the Ray implementation outperforms the optimized MPI implementation in all experiments (hyperparameters listed in Section D) with a fraction of the GPUs. As with ES, we were able to parallelize PPO using Ray with minimal changes to the structure of the serial program. 40 20 0 256 512 x 1024 2048 Number of CPUs x4096 x8192 Figure 12: Time to reach a score of 6000 in the Humanoid- Mean time to solve (minutes) v1 task [13]. The Ray ES implementation scales well to 8192 cores. The special-purpose system failed to run beyond 1024 cores. With 8192 cores, we achieve a median time of 3.7 minutes, which is over twice as fast as the best published result. ES is faster than PPO (Section 6.3.2) on this benchmark but exhibits greater runtime variance. 500 MPI PPO Ray PPO 400 6.3.3 300 We show that Ray can meet soft real-time requirements by controlling a simulated robot in real time. A Ray driver runs the simulated robot and takes actions at fixed time steps varying from 1 millisecond to 30 milliseconds to simulate different real-time requirements. The driver submits tasks that compute actions to be taken using a policy that was trained offline. However, the actions are only taken if they are received by the driver within the relevant time step (otherwise the prior action is repeated). Latency budgets for real robots are on the order of 10 milliseconds, and we find that even if we run the simulation faster than real time (using a 3 millisecond time step), Ray is able to produce a stable walk. Table 3 shows the fraction of tasks that did not arrive fast enough to be used by the robot. 200 100 0 8x1 16x2 Controlling a Simulated Robot 32x4 64x8 128x16 256x32 512x64 CPUs x GPUs Figure 13: Time to reach a score of 6000 in the Humanoid-v1 task [13]. The Ray PPO implementation outperforms a specialized MPI implementation [3] with fewer GPUs and at a fraction of the cost. The MPI implementation required 1 GPU for every 8 CPUs, whereas the Ray version required at most 8 GPUs (and never more than 1 GPU per 8 CPUs). the reference implementation required several hundred lines of code to develop a custom protocol for communicating tasks and data between workers and could not be easily adapted to different algorithms or communication patterns. We include pseudocode illustrating this point in Section B.1. Time budget (ms) % actions dropped Stable walk? 30 0 Yes 20 0 Yes 10 0 Yes 5 0 Yes 3 0.4 Yes 2 40 No 1 65 No Table 3: Low-latency robot simulation results 6.3.2 Proximal Policy Optimization To evaluate Ray on single node and small cluster RL workloads, we implement Proximal Policy Optimization (PPO) [41] in Ray and compare to a highly-optimized reference implementation [3] that uses OpenMPI communication primitives.6 All experiments were run us- 7 Related Work Dynamic task graphs. Ray is closely related to CIEL [32]. They both support dynamic task graphs with nested tasks, implement the futures abstraction, and provide lineage-based fault tolerance. However, they differ in two important aspects. First, Ray extends the task model with an actor abstraction. Second, Ray employs a fully distributed control plane and scheduler, instead of relying on a single master. In addition, Ray adds the ray.wait() method, employs an in-memory (instead of a 6 Both implementations use TensorFlow to define neural networks but rely on the distributed frameworks (OpenMPI and Ray) for communication between processes. Though this algorithm could be implemented using TensorFlow alone, single-machine performance would be slow due to the Python global interpreter lock and distributed versions would look similar to MPI implementations (sending and receiving data via queues). 11 file-based) object store, and extends an existing programming language (Python), while CIEL provides its own scripting language (Skywriting). Ray is also closely related to Dask [38], which supports dynamic task graphs, including a wait-like primitive, and employs the futures abstraction in a Python environment. However, Dask uses a centralized scheduler, doesn’t offer an actor-like abstraction, and doesn’t provide fault tolerance. Data flow systems. Popular dataflow systems, such as MapReduce [18], Spark [51], and Dryad [25] have widespread adoption for analytics and ML workloads, but their computation model is more restrictive. Spark and MapReduce implement the BSP execution model, which assumes that tasks within the same stage perform the same computation and take roughly the same amount of time. Dryad relaxes this restriction but lacks support for dynamic task graphs. Furthermore, none of these systems provide an actor abstraction, nor implement a distributed scalable control plane and scheduler. Finally, Naiad [31] is a dataflow system that provides improved scalability for some workloads, but only supports static task graphs. Actor systems. Orleans [14] provides a virtual actorbased abstraction. Actors are perpetual and their state persists across invocations. For scaling out, Orleans also allows multiple instances of an actor to run in parallel when the actor operates on immutable state or has no state. These stateless actors can act as tasks in Ray. However, unlike Ray, the Orleans developer must explicitly checkpoint actor state and intermediate responses. In addition, Orleans provides at-least-once semantics. In contrast, Ray provides transparent fault tolerance and exactly-once semantics, as each method call is logged in the GCS and both arguments and results are immutable. We find that in practice these limitations do not affect the performance of our applications. Erlang [9] and C++ Actor Framework (CAF) [16], two other actor-based systems, also require the application to explicitly handle fault tolerance. Also, Erlang’s global state store is not suitable for sharing large objects such as ML models, while CAF does not support data sharing. Global control state and scheduling. The concept of logically centralizing the control plane has been previously proposed in software defined networks (SDNs) [15], distributed file systems (e.g., GFS [22]), resource management (e.g., Omega [42]), and distributed frameworks (e.g., MapReduce [18], BOOM [7]), to name a few. Ray draws inspiration from these pioneering efforts, but provides significant improvements. In contrast with SDNs, BOOM, and GFS which couple the control plane data and computation, Ray decouples the storage of the control plane information (e.g., GCS) from the logic implementation (e.g., schedulers). This allows both storage and computation layers to scale independently, which is key to achieving our scalability targets. Omega uses a distributed architecture in which schedulers coordinate via globally shared state. To this architecture, Ray adds global schedulers to balance load across local schedulers, and targets ms-level, not second-level, task scheduling. Ray implements a unique distributed bottom-up scheduler that is horizontally scalable, and can handle dynamically constructed task graphs. Unlike Ray, most existing cluster computing systems [18, 50, 32] use a centralized scheduler architecture. While Sparrow [36] is decentralized, its schedulers make independent decisions, limiting the possible scheduling policies, and all tasks of a job are handled by the same global scheduler. Mesos [24] implements a two-level hierarchical scheduler, but its top-level scheduler can be a bottleneck. Canary [37] achieves impressive performance by having each scheduler instance handle a portion of the task graph, but does not handle dynamic computation graphs. Machine learning frameworks. TensorFlow [5] and MXNet [17] target deep learning workloads and efficiently leverage both CPUs and GPUs. While they achieve great performance for workloads consisting of static DAGs of linear algebra operations, they have limited support for more general workloads. TensorFlow Fold [29] provides some support for dynamic task graphs, as well as MXNet through its internal C++ APIs, but neither fully supports the ability to modify the DAG during execution in response to task progress, task completion times, or faults. TensorFlow and MXNet in principle achieve generality by allowing the programmer to simulate low-level message-passing and synchronization primitives, but the pitfalls and user experience in this case are similar to those of MPI. OpenMPI [21] can achieve high performance, but it is relatively hard to program as it requires explicit coordination to handle heterogeneous and dynamic task graphs. Furthermore, it forces the programmer to explicitly handle fault tolerance. 8 Discussion and Experiences Since we released Ray several months ago, over one hundred people have downloaded and used it. Here we discuss our experience developing and using Ray, as well as some of the feedback we’ve received from early users. API. In designing the API, we have emphasized minimalism. Initially we started with a basic task abstraction. Later, we added the wait() primitive to accommodate rollouts with heterogeneous durations and the actor abstraction to accommodate third-party simulators and amortize the overhead of expensive initializations. While the resulting API is relatively low-level, it has proven both powerful and simple to use. Indeed, some teams report instructing developers to first write serial implementations and then to parallelize them using Ray. 12 To illustrate this point, next we briefly describe our experience with two other algorithms: Asynchronous Advantage Actor Critic (A3C) and hyperparameter search. A3C [30] is a state-of-the-art RL algorithm which leverages asynchronous policy updates to significantly improve training times over previous algorithms. To scale out this algorithm, we use a simple hierarchical scheme where multiple instances of A3C are trained in parallel and periodically aggregated to form an improved model. Implementing hierarchical A3C in Ray was straightforward, requiring 20 lines of Python code to extend the non-hierarchical version. Furthermore, this simple extension improved performance on the same hardware by 30%. We were able to implement a state-of-the-art hyperparameter search algorithm [28] in roughly 30 lines of Python code using Ray. Ray’s support for nested tasks was critical because multiple experiments had to be run in parallel, and each experiment typically used parallelism internally. The wait() primitive allowed us to process the results of experiments in the order that they completed and to adaptively launch new ones. The actor abstraction allowed us to pause and resume stateful experiments based on the progress of other experiments (see Section B.3). In contrast, most existing implementations have to wait for all experiments in the round to complete, leading to inefficient resource utilization. Ray’s API is still a work in progress. Based on early user feedback, we are considering enhancing the API to include higher level primitives, such as simple aggregation and map. These could also inform scheduling decisions in the Ray system layer (Section 4.2). Limitations. Given the workload generality, specialized optimizations are hard. For example, we must make scheduling decisions without full knowledge of the computation graph. Scheduling optimizations in Ray might require more complex runtime profiling. In addition, storing lineage for each task requires the implementation of garbage collection policies to bound storage costs in the GCS, a feature we are actively developing. Fault tolerance. We are often asked if fault tolerance is really needed for AI applications. After all, due to the statistical nature of many AI algorithms, one could simply ignore failed rollouts. Based on our experience, our answer is an unqualified “yes”. First, the ability to ignore failures makes applications much easier to write and reason about. Second, our particular implementation of fault tolerance via deterministic replay dramatically simplifies debugging as it allows us to easily reproduce most errors. This is particularly important since, due to their stochasticity, AI algorithms are notoriously hard to debug. Third, fault tolerance helps save money since it allows us to run on cheap resources like spot instances on AWS. Furthermore, as workloads scale, we expect fault tolerance to become even more important. Of course, this comes at the price of some overhead. However, we found this overhead to be minimal for our target workloads. GCS and Horizontal Scalability. The GCS dramatically simplified Ray development and debugging. Basic failure handling and horizontal scaling for all other components took less than a week to implement. The GCS enabled us to query the entire system state while debugging (instead of having to manually expose internal component state). This helped us find numerous bugs and generally understand system behavior. The GCS is instrumental to Ray’s horizontal scalability. In the experiments reported in Section 6.1, we were able to scale the results by adding more shards whenever the GCS became a bottleneck. The GCS also enables the global scheduler to scale by simply adding more replicas. While currently we are manually configuring the number of GCS shards and global schedulers, we are planning to develop adaptive algorithms in the future. Due to these advantages, we believe that centralizing control state will be a key design component of future distributed systems. 9 Conclusion Emerging AI applications present challenging computational demands. To meet these demands, Ray introduces a global control store and a bottom-up distributed scheduler. Together, this architecture implements dynamic task graph execution, which in turn supports both a task-parallel and an actor programming model. This programming flexibility is particularly important for RL workloads, which produce tasks diverse in resource requirements, duration, and functionality. Our evaluation demonstrates linear scalability past 1M tasks per second, transparent fault tolerance, and substantial performance improvements on several contemporary RL workloads. Thus, Ray provides a powerful combination of flexibility, performance, and ease of use for the development of future AI applications. References [1] Apache Arrow. https://arrow.apache.org/. [2] EC2 Instance Pricing. pricing/on-demand/. https://aws.amazon.com/ec2/ [3] OpenAI Baselines: high-quality implementations of reinforcement learning algorithms. https://github.com/openai/ baselines. [4] PyTorch: Tensors and dynamic neural networks in python with strong gpu acceleration. http://pytorch.org/. [5] A BADI , M., BARHAM , P., C HEN , J., C HEN , Z., DAVIS , A., D EAN , J., D EVIN , M., G HEMAWAT, S., I RVING , G., I SARD , 13 M., ET AL . TensorFlow: A system for large-scale machine learning. In Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI). Savannah, Georgia, USA (2016). [19] D ENNIS , J. B., AND M ISUNAS , D. P. A preliminary architecture for a basic data-flow processor. In Proceedings of the 2Nd Annual Symposium on Computer Architecture (New York, NY, USA, 1975), ISCA ’75, ACM, pp. 126–132. [6] AGARWAL , A., B IRD , S., C OZOWICZ , M., H OANG , L., L ANG FORD , J., L EE , S., L I , J., M ELAMED , D., O SHRI , G., R IBAS , O., S EN , S., AND S LIVKINS , A. A multiworld testing decision service. arXiv preprint arXiv:1606.03966 (2016). [20] D UAN , Y., C HEN , X., H OUTHOOFT, R., S CHULMAN , J., AND A BBEEL , P. Benchmarking deep reinforcement learning for continuous control. In Proceedings of the 33rd International Conference on International Conference on Machine Learning - Volume 48 (2016), ICML’16, JMLR.org, pp. 1329–1338. [7] A LVARO , P., C ONDIE , T., C ONWAY, N., E LMELEEGY, K., H ELLERSTEIN , J. M., AND S EARS , R. BOOM Analytics: exploring data-centric, declarative programming for the cloud. In Proceedings of the 5th European conference on Computer systems (2010), ACM, pp. 223–236. [21] G ABRIEL , E., FAGG , G. E., B OSILCA , G., A NGSKUN , T., D ONGARRA , J. J., S QUYRES , J. M., S AHAY, V., K AMBADUR , P., BARRETT, B., L UMSDAINE , A., C ASTAIN , R. H., DANIEL , D. J., G RAHAM , R. L., AND W OODALL , T. S. Open MPI: Goals, concept, and design of a next generation MPI implementation. In Proceedings, 11th European PVM/MPI Users’ Group Meeting (Budapest, Hungary, September 2004), pp. 97–104. [8] A NANTHANARAYANAN , G., K ANDULA , S., G REENBERG , A., S TOICA , I., L U , Y., S AHA , B., AND H ARRIS , E. Reining in the outliers in map-reduce clusters using mantri. In Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation (Berkeley, CA, USA, 2010), OSDI’10, USENIX Association, pp. 265–278. [22] G HEMAWAT, S., G OBIOFF , H., AND L EUNG , S.-T. The Google file system. In ACM SIGOPS operating systems review (2003), vol. 37, ACM, pp. 29–43. [9] A RMSTRONG , J., V IRDING , R., W IKSTR ÖM , C., AND W ILLIAMS , M. Concurrent programming in ERLANG. [23] G U *, S., H OLLY *, E., L ILLICRAP, T., AND L EVINE , S. Deep reinforcement learning for robotic manipulation with asynchronous off-policy updates. In IEEE International Conference on Robotics and Automation (ICRA 2017) (2017). [10] B EATTIE , C., L EIBO , J. Z., T EPLYASHIN , D., WARD , T., WAINWRIGHT, M., K ÜTTLER , H., L EFRANCQ , A., G REEN , S., VALD ÉS , V., S ADIK , A., ET AL . Deepmind lab. arXiv preprint arXiv:1612.03801 (2016). [24] H INDMAN , B., KONWINSKI , A., Z AHARIA , M., G HODSI , A., J OSEPH , A. D., K ATZ , R., S HENKER , S., AND S TOICA , I. Mesos: A platform for fine-grained resource sharing in the data center. In Proceedings of the 8th USENIX Conference on Networked Systems Design and Implementation (Berkeley, CA, USA, 2011), NSDI’11, USENIX Association, pp. 295–308. [11] B ELLEMARE , M. G., NADDAF, Y., V ENESS , J., AND B OWL ING , M. The arcade learning environment: An evaluation platform for general agents. J. Artif. Intell. Res.(JAIR) 47 (2013), 253–279. [25] I SARD , M., B UDIU , M., Y U , Y., B IRRELL , A., AND F ETTERLY, D. Dryad: Distributed data-parallel programs from sequential building blocks. In Proceedings of the 2nd ACM SIGOPS/EuroSys European Conference on Computer Systems 2007 (New York, NY, USA, 2007), EuroSys ’07, ACM, pp. 59– 72. [12] B ERGSTRA , J., B REULEUX , O., BASTIEN , F., L AMBLIN , P., PASCANU , R., D ESJARDINS , G., T URIAN , J., WARDE FARLEY, D., AND B ENGIO , Y. Theano: A cpu and gpu math compiler in python. In Proc. 9th Python in Science Conf (2010), pp. 1–7. [13] B ROCKMAN , G., C HEUNG , V., P ETTERSSON , L., S CHNEIDER , J., S CHULMAN , J., TANG , J., AND Z AREMBA , W. OpenAI gym. arXiv preprint arXiv:1606.01540 (2016). [26] J IA , Y., S HELHAMER , E., D ONAHUE , J., K ARAYEV, S., L ONG , J., G IRSHICK , R., G UADARRAMA , S., AND DARRELL , T. Caffe: Convolutional architecture for fast feature embedding. arXiv preprint arXiv:1408.5093 (2014). [14] B YKOV, S., G ELLER , A., K LIOT, G., L ARUS , J. R., PANDYA , R., AND T HELIN , J. Orleans: Cloud computing for everyone. In Proceedings of the 2nd ACM Symposium on Cloud Computing (2011), ACM, p. 16. [27] J ORDAN , M. I., AND M ITCHELL , T. M. Machine learning: Trends, perspectives, and prospects. Science 349, 6245 (2015), 255–260. [15] C ASADO , M., F REEDMAN , M. J., P ETTIT, J., L UO , J., M C KEOWN , N., AND S HENKER , S. Ethane: Taking control of the enterprise. SIGCOMM Comput. Commun. Rev. 37, 4 (Aug. 2007), 1–12. [28] L I , L., JAMIESON , K., D E S ALVO , G., ROSTAMIZADEH , A., AND TALWALKAR , A. Hyperband: A novel banditbased approach to hyperparameter optimization. arXiv preprint arXiv:1603.06560 (2016). [16] C HAROUSSET, D., S CHMIDT, T. C., H IESGEN , R., AND W ÄHLISCH , M. Native actors: A scalable software platform for distributed, heterogeneous environments. In Proceedings of the 2013 workshop on Programming based on actors, agents, and decentralized control (2013), ACM, pp. 87–96. [29] L OOKS , M., H ERRESHOFF , M., H UTCHINS , D., AND N ORVIG , P. Deep learning with dynamic computation graphs. arXiv preprint arXiv:1702.02181 (2017). [30] M NIH , V., BADIA , A. P., M IRZA , M., G RAVES , A., L ILLI CRAP, T. P., H ARLEY, T., S ILVER , D., AND K AVUKCUOGLU , K. Asynchronous methods for deep reinforcement learning. In International Conference on Machine Learning (2016). [17] C HEN , T., L I , M., L I , Y., L IN , M., WANG , N., WANG , M., X IAO , T., X U , B., Z HANG , C., AND Z HANG , Z. MXNet: A flexible and efficient machine learning library for heterogeneous distributed systems. In NIPS Workshop on Machine Learning Systems (LearningSys’16) (2016). [31] M URRAY, D. G., M C S HERRY, F., I SAACS , R., I SARD , M., BARHAM , P., AND A BADI , M. Naiad: A timely dataflow system. In Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles (New York, NY, USA, 2013), SOSP ’13, ACM, pp. 439–455. [18] D EAN , J., AND G HEMAWAT, S. MapReduce: Simplified data processing on large clusters. Commun. ACM 51, 1 (Jan. 2008), 107–113. 14 [32] M URRAY, D. G., S CHWARZKOPF, M., S MOWTON , C., S MITH , S., M ADHAVAPEDDY, A., AND H AND , S. CIEL: A universal execution engine for distributed data-flow computing. In Proceedings of the 8th USENIX Conference on Networked Systems Design and Implementation (Berkeley, CA, USA, 2011), NSDI’11, USENIX Association, pp. 113–126. [47] VAN D EN B ERG , J., M ILLER , S., D UCKWORTH , D., H U , H., WAN , A., F U , X.-Y., G OLDBERG , K., AND A BBEEL , P. Superhuman performance of surgical tasks by robots using iterative learning from human-guided demonstrations. In Robotics and Automation (ICRA), 2010 IEEE International Conference on (2010), IEEE, pp. 2074–2081. [33] N G , A., C OATES , A., D IEL , M., G ANAPATHI , V., S CHULTE , J., T SE , B., B ERGER , E., AND L IANG , E. Autonomous inverted helicopter flight via reinforcement learning. Experimental Robotics IX (2006), 363–372. [48] V ENKATARAMAN , S., PANDA , A., O USTERHOUT, K., G H ODSI , A., A RMBRUST, M., R ECHT, B., F RANKLIN , M., AND S TOICA , I. Drizzle: Fast and adaptable stream processing at scale. In Proceedings of the Twenty-Sixth ACM Symposium on Operating Systems Principles (2017), SOSP ’17, ACM. [34] N ISHIHARA , R., M ORITZ , P., WANG , S., T UMANOV, A., PAUL , W., S CHLEIER -S MITH , J., L IAW, R., N IKNAMI , M., J ORDAN , M. I., AND S TOICA , I. Real-time machine learning: The missing pieces. In Workshop on Hot Topics in Operating Systems (2017). [49] W HITE , T. Hadoop: The Definitive Guide. O’Reilly Media, Inc., 2012. [50] Z AHARIA , M., C HOWDHURY, M., DAS , T., DAVE , A., M A , J., M C C AULEY, M., F RANKLIN , M. J., S HENKER , S., AND S TOICA , I. Resilient distributed datasets: A fault-tolerant abstraction for in-memory cluster computing. In Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation (2012), USENIX Association, pp. 2–2. [35] O USTERHOUT, J., G OPALAN , A., G UPTA , A., K EJRIWAL , A., L EE , C., M ONTAZERI , B., O NGARO , D., PARK , S. J., Q IN , H., ROSENBLUM , M., ET AL . The RAMCloud storage system. ACM Transactions on Computer Systems (TOCS) 33, 3 (2015), 7. [36] O USTERHOUT, K., W ENDELL , P., Z AHARIA , M., AND S TO ICA , I. Sparrow: Distributed, low latency scheduling. In Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles (New York, NY, USA, 2013), SOSP ’13, ACM, pp. 69–84. [51] Z AHARIA , M., X IN , R. S., W ENDELL , P., DAS , T., A RM BRUST, M., DAVE , A., M ENG , X., ROSEN , J., V ENKATARA MAN , S., F RANKLIN , M. J., G HODSI , A., G ONZALEZ , J., S HENKER , S., AND S TOICA , I. Apache Spark: A unified engine for big data processing. Commun. ACM 59, 11 (Oct. 2016), 56–65. [37] Q U , H., M ASHAYEKHI , O., T EREI , D., AND L EVIS , P. Canary: A scheduling architecture for high performance cloud computing. arXiv preprint arXiv:1602.01412 (2016). [38] ROCKLIN , M. Dask: Parallel computation with blocked algorithms and task scheduling. In Proceedings of the 14th Python in Science Conference (2015), K. Huff and J. Bergstra, Eds., pp. 130 – 136. [39] S ALIMANS , T., H O , J., C HEN , X., AND S UTSKEVER , I. Evolution strategies as a scalable alternative to reinforcement learning. arXiv preprint arXiv:1703.03864 (2017). [40] S ANFILIPPO , S. Redis: An open source, in-memory data structure store. https://redis.io/, 2009. [41] S CHULMAN , J., W OLSKI , F., D HARIWAL , P., R ADFORD , A., AND K LIMOV, O. Proximal policy optimization algorithms. arXiv preprint arXiv:1707.06347 (2017). [42] S CHWARZKOPF, M., KONWINSKI , A., A BD -E L -M ALEK , M., AND W ILKES , J. Omega: Flexible, scalable schedulers for large compute clusters. In Proceedings of the 8th ACM European Conference on Computer Systems (New York, NY, USA, 2013), EuroSys ’13, ACM, pp. 351–364. [43] S ILVER , D., H UANG , A., M ADDISON , C. J., G UEZ , A., S IFRE , L., VAN D EN D RIESSCHE , G., S CHRITTWIESER , J., A NTONOGLOU , I., PANNEERSHELVAM , V., L ANCTOT, M., ET AL . Mastering the game of Go with deep neural networks and tree search. Nature 529, 7587 (2016), 484–489. [44] S UTTON , R. S., AND BARTO , A. G. Reinforcement Learning: An Introduction, vol. 1. MIT press Cambridge, 1998. [45] T ODOROV, E., E REZ , T., AND TASSA , Y. Mujoco: A physics engine for model-based control. In Intelligent Robots and Systems (IROS), 2012 IEEE/RSJ International Conference on (2012), IEEE, pp. 5026–5033. [46] VALIANT, L. G. A bridging model for parallel computation. Communications of the ACM 33, 8 (1990), 103–111. 15 A Satisfying the Requirements In this section, we briefly explain how our design satisfies the requirements outlined in Section 2. Flexibility: Ray extends the already general dynamic task model [32], by adding the ray.wait() primitive to efficiently handle tasks whose completion times are not known in advance, and the actor abstraction to handle third part simulators and amortize expensive setups. Finally, Ray supports heterogeneous resources, such as GPUs. Performance: Table 4 summarizes techniques for scaling each component and the associated overhead. The last column shows the average number of requests/sec that each component should handle as a function of system and workload parameters, where N is the number of nodes, s the number of GCS shards, g the number of global schedulers, w the average number of tasks/sec generated by a node, and ε, the percentage of tasks submitted to the global scheduler. For instance, on average, the local scheduler handles a number of requests proportional to w tasks/sec, where α1 , includes assigning the task to a worker or sending/receiving the task to/from the global scheduler. Similarly, the global scheduler handles a number of request proportional to the average number of tasks/sec it receives (εNw/g) times α, a factor that includes querying the GCS for task’s inputs’ locations; h represents the number of heartbeats/sec. Note that given the cluster size, N, and the average load generated by a node, w, we could pick the number of GCS shards, s and global schedulers, s to bound the load on each shard or global scheduler. This makes both GCS and the global scheduler horizontally scalable. Ease of development: Ray handles a variety of component failures, relieving the developer from writing complex software to handle failures. Ray achieves fault tolerance by using a variety of techniques, including stateless components, replication and, replay, summarized in Table 5. This also enables a user to run the system on cheap infrastructures where nodes may be preempted (e.g., AWS spot instances). The API shown in Table 2, while low-level, has proven to be a good fit for the RL applications in our experience. The fact that the API is provided in Python, the most popular language in the AI community, has been a big plus. Component Local Sched. Object Store Scaling Techniques By default, use 1 per node. By default, use 1 per node. GCS Use more shards (s). Global Sched. Use more replicas (g). Data Object Replicate objects to local node before task execution. Use nested tasks; spawn tasks from workers. Driver Requests/sec α1 w α2 w    β Ns w + h Ng s   α ε Ng s + h N/A N/A Table 4: Achieving scalability in Ray. By increasing the number of GCS shards s and the number of global scheduler replicas g, we can reduce the load on each GCS shard and global scheduler replica to a constant. N is the total number of nodes, w avg. number of tasks/node/sec, h avg. number of node heartbeats/sec, and α, α1 , α2 , β , and ε are constants. Component Global Control Store (GCS) Local and Global Schedulers, Workers Object Store, Actor Driver Description Replicate each shard. Stateless processes; restart and read state from the GCS. Use lineage stored in the GCS to reconstruct objects (Section 4.2.3). Restart it; can reuse objects already present in the Object Store. Table 5: Techniques for achieving fault tolerance in Ray 16 B Ease of Development B.1 Evolution Strategies In this section, we give code examples to illustrate why the evolution strategies algorithm from Section 6.3.1 is so easy to implement and customize on top of Ray and so difficult in the special-purpose reference system that we compare to. Suppose we wish to parallelize the following serial Python code. 1 2 3 4 5 6 7 def f (): return result def g ( N ): return [ f () for _ in range ( N )] results = [ g ( N ) for _ in range ( M )] Attempting to implement this code in MPI, distributed TensorFlow, or many specialized systems would involve writing a single program that is run by all workers. As shown in the code below, programs would need to branch based on the role of that worker and would likely only work for predetermined values of M and N. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 if WORKER_INDEX == 0: results = [] for i in range ( M ): child_index = 1 + i results . append ( RECEIVE ( child_index ) , i ) elif 1 <= WORKER_INDEX < M : i n t e rmediate_results = [] for i in range ( N ): child_index = M + 1 + WORKER_INDEX + M * i intermediate_results . append ( RECEIVE ( child_index )) SEND ( intermediate_results , 0) else : result = f () parent_index = ( WORKER_INDEX - M - 1) % M SEND ( result , parent_index ) This is complex for a number of reasons. Each worker has to decide what tasks to execute and has to explicitly dictate logic for optimizations such as batching, which normally a task scheduler could take care of. Secondly, allowing variable values of M and N would substantially complicate the program, but hard coding the values M and N will make it even more difficult to extend the code to deeper hierarchies in the future. Finally, this violates the lockstep assumptions that these frameworks make and would sacrifice performance by restricting the algorithm to a predefined scheduling layout. In contrast, the Ray version is clean, simple, and extensible. 1 2 3 4 5 6 7 8 9 @ray.remote def f (): return result @ray.remote def g ( N ): return ray.get([ f.remote() for _ in range ( N )]) results = ray.get([ g.remote( N ) for _ in range ( M )]) We believe that Ray’s API will allow developers to easily develop more complex distributed schemes. 17 B.2 Tree Reduce Consider the scenario where one wants to perform an aggregation operation on multiple data points in a distributed fashion. With Ray, the programmer would be able to easily aggregate data in an efficient manner. 1 2 3 4 5 6 7 8 dataset = [ data1 , data2 , data3 , data4 , data5 , data6 , data7 , data8 ] dataset_1 = [ aggregate . remote ( dataset [ i ] , dataset [ i +1]) for i in range (0 , 8 , step =2)] dataset_2 = [ aggregate . remote ( dataset_1 [ i ] , dataset_1 [ i +1]) for i in range (0 , 4 , step =2)] result = ray.get( aggregate . remote ( dataset_2 [0] , dataset_2 [1])) Note that this implementation can be written in a more concise fashion. 1 2 3 4 while len ( data ) > 1: data = data [2:] + [ aggregate.remote( data [0] , data [1])] result = ray.get( data [0]) In contrast, systems such as MPI and Spark provide specialize tree-reduction operators (i.e. MPI Allreduce and rdd.treeAggregate), since hierarchical computations are not easily expressed in their APIs. 18 B.3 Hyperparameter Search Ray enables developers to build hyperparameter search programs in a readable and simple manner. In this example, assume we have an experiment class with the following interface. We add a single decorator to the class to convert it into an actor. 1 2 3 4 5 6 7 8 @ray.remote class Experiment (): def __init__ ( self , hyperparameters ): # ... def training_step ( self ): # ... return accuracy Assume also that we have these helper functions predefined. is promising(results) returns True if the model is doing well and False otherwise. In practice, this function will may more information than the current result. generate hyperparameters defines a queue for many hyperparameter configurations, enumerating the space that the programmer wants to search over. 1 2 3 4 5 def is_promising ( results ): return True def g e n e r a t e_ h y p er p a r am e t e rs (): return hyperparameter_queue Here is a simple and straightforward implementation of a hyperparameter search program. Notice that more complicated management schemes can be implemented fairly easily, but we chose to leave those out in favor of readability. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 hp_queue = g e n e ra t e _ hy p e r pa r a m et e r s () experiment_list = [ Experiment.remote( next ( hp_queue )) for i in range (10)] paused = [] current_exps = { exp . training_step.remote(): exp for exp in experiment_list } while True : ex pe riment_futures = current_exps . keys () [ ready_id ] , remaining = @ray.wait( experiment_futures , num_returns =1) current_exp = current_exps [ ready_id ] current_accuracy = ray.get( ready_id ) if is_promising ( current_accuracy ): current_exps [ current_exp . training_step.remote()] = current_exp else : paused . append ( current_exp ) new_exp = Experiment.remote( next ( hp_queue )) current_exps [ new_exp . training_step.remote()] = new_exp 19 C Hyperparameters for Evolution Strategies Hyperparameter Noise standard deviation Adam stepsize L2 coefficient Episodes per batch D Value 0.02 0.01 0.005 5000 Hyperparameters for Proximal Policy Optimization Hyperparameter Timesteps per batch SGD minibatch size SGD epochs per iteration Adam stepsize PPO clip param GAE parameter (λ ) Discount (γ) 20 Value 320000 32768 20 1e-4 0.2 0.95 0.995
2cs.AI
Searching critical values for floating-point programs⋆ Hélène Collavizza, Claude Michel, and Michel Rueher arXiv:1511.01080v2 [cs.PL] 5 Aug 2016 University of Nice–Sophia Antipolis, I3S/CNRS BP 121, 06903 Sophia Antipolis Cedex, France [email protected] Abstract. Programs with floating-point computations are often derived from mathematical models or designed with the semantics of the real numbers in mind. However, for a given input, the computed path with floating-point numbers may significantly differ from the path corresponding to the same computation with real numbers. As a consequence, developers do not know whether the program can actually produce very unexpected outputs. We introduce here a new constraint-based approach that searches for test cases in the part of the over-approximation where errors due to floating-point arithmetic could lead to unexpected decisions. 1 Introduction In numerous applications, programs with floating-point computations are derived from mathematical models over the real numbers. However, computations on floating-point numbers are different from calculations in an idealised semantics1 of real numbers [8]. For some values of the input variables, the result of a sequence of operations over the floating-point numbers can be significantly different from the result of the corresponding mathematical operations over the real numbers. As a consequence, the computed path with floating-point numbers may differ from the path corresponding to the same computation with real numbers. This can entail wrong outputs and dangerous decisions of critical systems. That’s why identifying these values is a crucial issue for programs controlling critical systems. Abstract interpretation based error analysis [3] of finite precision implementations computes an over-approximation of the errors due to floating-point operations. The point is that state-of-the-art tools [6] may generate numerous false alarms. In [16], we introduced a hybrid approach combining abstract interpretation and constraint programming techniques that reduces the number of false alarms. However, the remaining false alarms are very embarrassing since we cannot know whether the predicted unstable behaviors will occur with actual data. ⋆ 1 This work was partially supported by ANR COVERIF (ANR-15-CE25-0002) That’s to say, computations as close as possible to the mathematical semantics of the real numbers; for instance, computations with arbitrary precision or computer algebra systems. More formally, consider a program P , a set of intervals I defining the expected input values of P , and an output variable x of P on which depend critical decisions, e.g., activating an anti-lock braking system. Let [xR , xR ] be a sharp approximation over the set of real numbers R of the domain of variable x for any input of P . [xF , xF ] stands for the domain of variable x in the over-approximation computed over the set of floating-point F for input values of I. The range [xR , xR ] can be determined by calculation or from physical limits. It includes a small tolerance to take into account approximation errors, e.g. measurement, statistical, or even floating-point arithmetic errors. This tolerance – specified by the user– defines an acceptable loss of accuracy between the value computed over the floating-point numbers and the value calculated over the real numbers. Values outside the interval [xR , xR ] can lead a program to misbehave, e.g. take a wrong branch in the control flow. The problem we address in this paper consists of verifying whether there exist critical values in I for which the program can actually produce a result value of x inside the suspicious intervals [xF , xR ) and (xR , xF ]. To handle this problem, we introduce a new constraint-based approach that searches for test cases that hit the suspicious intervals in programs with floating-point computations. In other words, our framework reduces this test case generation problem to a constraint-solving problem over the floating-point numbers where the domain of a critical decision variable has been shrunk to a suspicious interval. A constraint solver –based on filtering techniques designed to handle constraints over floating-point numbers– is used to search values for the input data. Preliminary results of experiments on small programs with classical floating-point errors are encouraging. The CPBPV FP, the system we developed, outperforms generate and test methods for programs with more than one input variable. Moreover, these search strategies can prove in many cases that no critical value exists. 2 Motivating example Before going into the details, we illustrate our approach on a small example. Assume we want to compute the area of a triangle from the lengths of its sides a, b, and c with Heron’s formula: p s ∗ (s − a) ∗ (s − b) ∗ (s − c) where s = (a + b + c)/2. The C program in Fig. 1 implements this formula, when a is the longest side of the triangle. The test of line 5 ensures that the given lengths form a valid triangle. Now, suppose that the input domains are a ∈ [5, 10] and b, c ∈ [0, 5]. Over the real numbers, s is greater than any of the sides of the triangle and squared_area cannot be negative. Moreover, squared_area cannot be greater than 156.25 over the real numbers since the triangle area is maximized for a right triangle with /∗ Pre−condition : a ≥ b and a ≥ c ∗/ float heron(float a, float b, float c) { 3 float s, squared_area; 4 squared_area = 0.0f; 5 if (a <= b + c) { 6 s = (a + b + c) / 2.0f; 7 squared_area = s*(s-a)*(s-b)*(s-c); 8 } 9 return sqrt(squared_area); 10 } 1 2 Fig. 1. Heron √ b = c = 5 and a = 5 2. However, these properties may not hold over the floatingpoint numbers because absorption and cancellation phenomena can occur2 . Tools performing value analysis over the floating-point numbers [6,15] approximate the domain of squared_area to the interval [−1262.21, 979.01]. Since this domain is an over-approximation, we do not know whether input values leading to squared_area < 0 or squared_area > 156.25 actually exist. Note that input domains –here a ∈ [5,10] and b, c ∈ [0,5]– are usually provided by the user. Assume the value of the tolerance3 ε is 10−5 , the suspicious intervals for squared_area are [−1262.21, −10−5) and (156.25001, 979.01]. CPBPV FP, the system we developed, generated test cases for both intervals: – a = 5.517474, b = 4.7105823, c = 0.8068917, and squared_area equals −1.0000001 · 10−5 ; – a = 7.072597, b = c = 5, and squared_area equals 156.25003. CPBPV FP could also prove the absence of test cases for a tolerance ε = 10−3 with squared_area > 156.25 + ε. In order to limit the loss of accuracy due to cancellation [8], line 7 of Heron’s program can be rewritten as follows: squared_area = ((a+(b+c))*(c-(a-b))*(c+(a-b))*(a+(b-c)))/16.0f; However, there are still some problems with this optimized program. Indeed, CPBPV FP found the test case a = 7.0755463, b = 4.350216, c = 2.72533, and squared_area equals −1.0000001·10−5 for interval [−1262.21, −10−5) of squared_area . There are no more problems in the interval (156.25001, 979.01] and CPBPV FP did prove it. 2 3 Let’s remind that absorption in an addition occurs when adding two numbers of very different order of magnitude, and the result is the value of the biggest number, i.e., when x + y with y 6= 0 yields x. Cancellation occurs in s − a when s is so close to a that the subtraction cancels most of the significant digits of s and a. Note that even this small tolerance may lead to an exception in statement 9. 3 Framework for generating test cases This section details the framework we designed to generate test cases reaching suspicious intervals for a variable x in a program P with floating-point computations. The kernel of our framework is FPCS [14,13,1,12], a solver for constraints over the floating-point numbers; that’s to say a symbolic execution approach for floating-point problems which combines interval propagation with explicit search for satisfiable floating-point assignments. FPCS is used inside the CPBPV bounded model checking framework [5]. CPBPV FP is the adaptation of CPBPV for generating test cases that hit the suspicious intervals in programs with floating-point computations. The inputs of CPBPV FP are: P , an annotated program; a critical test ct for variable x; [xF , xR ) or (xR , xF ], a suspicious interval for x. Annotations of P specify the range of the input variables of P as well as the suspicious interval for x. The latter assertion is just posted before the critical test ct. To compute the suspicious interval for x, we approximate the domain of x over the real numbers by [xR , xR ], and over the floating-point numbers by [xF , xF ]. These approximations are computed with rAiCp [16], a hybrid system that combines abstract interpretation and constraint programming techniques in a single static and automatic analysis. The current implementation of rAiCp is based upon the abstract interpreter Fluctuat [6], the constraint solver over the reals RealPaver [10] and FPCS. The suspicious intervals for variable x are denoted [xF , xR ) and (xR , xF ]. CPBPV FP performs first some pre-processing: P is transformed into DSAlike form4 . If the program contains loops, CPBPV FP unfolds loops k times where k is a user specified constant. Loops are handled in CPBPV and rAiCp with standard unfolding and abstraction techniques5 . So, there are no more loops in the program when we start the constraint generation process. Standard slicing operations are also performed to reduce the size of the control flow graph. In a second step, CPBPV FP searches for executable paths reaching ct. For each of these paths, the collected constraints are sent to FPCS, which solves the corresponding constraint systems over the floating point numbers. FPCS returns either a satisfiable instantiation of the input variables of P , or ∅. As said before, FPCS [14,13,1,12] is a constraint solver designed to solve a set of constraints over floating-point numbers without losing any solution. It uses 2Bconsistency along with projection functions adapted to floating-point arithmetic [13,1] to filter constraints over the floating-point numbers. FPCS also provides stronger consistencies like kB-consistencies, which allow better filtering results. The search of solutions in constraint systems over floating numbers is trickier than the standard bisection-based search in constraint systems over intervals of 4 5 DSA stands for Dynamic Single Assignment. In DSA-like form, all variables are assigned exactly once in each execution path In bounded model checking, k is usually increased until a counter-example is found or until the number of time units is large enough for the application. float slope(float x0, float h) { float x1 = x0 + h; float x2 = x0 - h; float fx1 = x1*x1; float fx2 = x2*x2; float res = (fx1 - fx2) / (2.0*h); return res; } Fig. 2. Approximation of the derivative of x2 by a slope float polynomial(float a, float b, float c) { float poly = (a*a + b + 1e-5f) * c; return poly; } Fig. 3. Computation of polynomial (a2 + b + 10−5 ) ∗ c real numbers. Thus, we have also implemented different strategies combining selection of specific points and pruning. Details on theses strategies are given in the experiments section. CPBPV FP ends up with one of the following results: – a test case proving that P can produce a suspicious value for x; – a proof that no test case reaching the suspicious interval can be generated: this is the case if the loops in P cannot be unfolded beyond the bound k (See [5] for details on bounded unfolding) ; – an inconclusive answer: no test case could be generated but the loops in P could be unfolded beyond the bound k. In other words, the process is incomplete and we cannot conclude whether P may produce a suspicious value. 4 Preliminary experiments We experimented with CPBPV FP on six small programs with cancellation and absorption phenomena, two very common pitfalls of floating-point arithmetic. The benchmarks are listed in the first two columns of table 1. First two benchmarks concern the heron program and the optimized heron program with the suspicious intervals described in the section 1. Program slope (see Fig. 2) approximates the derivative of the square function f (x) = x2 at a given point x0 . More precisely, it computes the slope of a nearby (x0 −h) secant line with a finite difference quotient: f ′ (x0 ) ≈ f (x0 +h)−f . Over the 2h real numbers, the smaller h is, the more accurate the formula is. For this function, the derivative is given by f ′ (x) = 2x which yields exactly 26 for x = 13. Over the floats, Fluctuat [6] approximates the return value of the slope program to the interval [0, 25943] when h ∈ [10−6 , 10−3 ] and x0 = 13. Program polynomial in Fig. 3 illustrates an absorption phenomenon. It computes the polynomial (a2 +b+10−5)∗c. For input domains a ∈ [103 , 104 ], b ∈ [0, 1] and c ∈ [103 , 104 ], the minimum value of the polynomial over the real numbers is equal to 1000000000.01. simple interpolator and simple square are two benches extracted from [9]. The first bench computes an interpolator, affine by sub-intervals while the second is a rewrite of a square root function used in an industrial context. All experiments were done on an Intel Core 2 Duo at 2.8 GHz with 4 GB of memory running 64-bit Linux. We assume C programs handling IEEE 754 compliant floating-point arithmetic, intended to be compiled with GCC without any optimization option and run on a x86 64 architecture managed by a 64bit Linux operating system. Rounding mode was to the nearest, i.e., where ties round to the nearest even digit in the required position. 4.1 Strategies and solvers We run CPBPV FP with the following search strategies for the FPCS solver: – std: standard prune & bisection-based search used in constraint-systems over intervals : splits the selected variable domain in two domains of equal size; – fpc: splits the domain of the selected variable in five intervals: • Three degenerated intervals containing only a single floating point number: the smallest float l, the largest float r, and the mid-point m; • Two open intervals (l, m) and (m, r); – fp3s: selects 3 degenerated intervals containing only a single floating point number: the smallest float l, the largest float r, and the mid-point m. Hence, fp3s is an incomplete method that might miss some solutions. For all these strategies, we select first the variables with the largest domain and we perform a 3B−consistency filtering step before starting the splitting process. We compared CPBPV FP with CBMC [4] and CDFL [7], two state-of-theart software bounded model checkers based on SAT solvers that are able to deal with floating-point computations. We also run a simple generate & test strategy: the program is run with randomly generated input values and we test whether the result is inside the suspicious interval. The process is stopped as soon as a test case hitting the suspicious interval is found. 4.2 Results Table 1 reports the results for the other strategies and solvers. Since strategy fpc3s is incomplete, we indicate whether a test case was found or not. Column s? specifies whether a test case actually exists. Note that the computation times of CBMC and CDFL include the pre-processing time for generating the constraint systems; the pre-processing time required by CPBPV is around 0.6s but CPBPV is a non-optimised system written in java. Name Condition CDFL CBMC std fpc fpc3s s? area < 10−5 3.874s 0.280s > 180 0.705 0.022 (n) y area > 156.25 + 10−5 > 180s 34.512s 22.323 7.804 0.083 (n) y optimized_heron area < 10−5 7.618s 0.932s > 180 0.148 0.022 (n) y area > 156.25 + 10−5 > 180s > 180s 8.988 30.477 0.101 (n) n slope with dh < 26.0 − 1.0 2.014s 1.548s 0.021 0.012 0.012 (y) y h ∈ [10−6 , 10−3 ] dh > 26.0 + 1.0 1.599s 0.653s 0.055 0.011 0.011 (y) y dh < 26.0 − 10.0 0.715s 1.108s 0.006 0.006 0.007 (n) n dh > 26.0 + 10.0 1.025s 1.080s 0.006 0.006 0.006 (n) n polynomial r < 109 + 0.170s 0.295s 0.022 0.006 0.006 (y) y 0.0099999904 − 10−3 simple_interpolator res < −10−5 0.296s 0.264s 0.018 0.012 0.012 (y) y simple_square S > 1.453125 −− 1.079s 0.012 0.012 0.012 (n) n heron Table 1. Results of the different solvers and strategies on the benchmarks 5 5.1 Discussion Results analysis The generate & test strategy behaves quite well on programs with only one input variable when a test case exists but it is unable to find any test case for programs with more than one input variable. More precisely, it found a test case in less than 0.008s for the 6 suspicious intervals of program slope and for program simple_interpolator . The generate & test strategy failed to find a test within 180s in all other cases.Of course, this strategy cannot show that there is no test case reaching the suspicious interval; so, it is of little interest here. Strategy fpc is definitely the most efficient and most robust one on all these benchmarks. Note that CBMC and CDFL could neither handle the initial, nor the optimized version of program heron in a timeout of 20 minutes whereas FPCS found solutions in a reasonable time. These preliminary results are very encouraging: they show that CPBPV FP is effective for generating test cases for suspicious values outside the range of acceptable values on small programs with classical floating-point errors. More importantly, a strong point of CPBPV FP is definitely its refutation capabilities. Of course, experiments on more significant benchmarks and on real applications are still necessary to evaluate the full capabilities and limits of CPBPV FP. 5.2 Related and further work The goals of software bounded model checkers based on SAT solvers are close to our approach. The point is that SAT solvers tend to be inefficient on these problems due to the size of the domains of floating-point variables and the cost of bit-vector operations [7]. CDFL [7] tries to address this issue by embedding an abstract domain in the conflict driven clause learning algorithm of a SAT solver. SAT solvers often use bitwise representations of numerical operations, which may be very expensive (e.g., thousands of variables for one equation in CDFL). Brain and al [11,2] have recently introduced a bit-precise decision procedure for the theory of floating-point arithmetic. The core of their approach is a generalization of the conflict-driven clause-learning algorithm used in modern SAT solvers. Their technique is significantly faster than a bit-vector encoding approach. Note that the constraint programming techniques used in our approach are better suited to generate several test cases than these SAT-based approaches. The advantage of CP is that it provides a uniform framework for representing and handling integers, real numbers and floats. A new abstract-interpretation based robustness analysis of finite precision implementations has recently been proposed [9] for sound rounding error propagation in a given path in presence of unstable tests. A close connection between our floating-point solvers and the two abovementioned approaches is certainly worth exploring. A second direction for further work concerns the integration of our constraintbased approach with new abstract-interpretation based robustness analysis of finite precision implementations for sound rounding error propagation in a given path in presence of unstable tests. References 1. Bernard Botella, Arnaud Gotlieb, and Claude Michel. Symbolic execution of floating-point computations. Software Testing, Verification and Reliability, 16(2):97–121, 2006. 2. Martin Brain, Vijay D’Silva, Alberto Griggio, Leopold Haller, and Daniel Kroening. Interpolation-based verification of floating-point programs with abstract cdcl. In Proc. of 20th Int. Symposium SAS, volume 7935 of LNCS. Springer, 2013. 3. Liqian Chen, Antoine Miné, and Patrick Cousot. A sound floating-point polyhedra abstract domain. In Proc. of APLAS ’08, pages 3–18. Springer-Verlag, 2008. 4. Edmund Clarke, Daniel Kroening, and Flavio Lerda. A tool for checking ANSI-C programs. In TACAS, volume 2988 of LNCS, pages 168–176, 2004. 5. Hélène Collavizza, Michel Rueher, and Pascal Van Hentenryck. A constraintprogramming framework for bounded program verification. Constraints Journal, 15(2):238–264, 2010. 6. David Delmas, Eric Goubault, Sylvie Putot, Jean Souyris, Karim Tekkal, and Franck Védrine. Towards an industrial use of FLUCTUAT on safety-critical avionics software. In FMICS, volume 5825 of LNCS, pages 53–69. Springer, 2009. 7. Vijay D’Silva, Leopold Haller, Daniel Kroening, and Michael Tautschnig. Numeric bounds analysis with conflict-driven learning. In Proc. TACAS, volume 7214 of Lecture Notes in Computer Science, pages 48–63. Springer, 2012. 8. David Goldberg. What every computer scientist should know about floating point arithmetic. ACM Computing Surveys, 23(1):5–48, 1991. 9. Eric Goubault and Sylvie Putot. Robustness analysis of finite precision implementations. In Programming Languages and Systems - 11th Asian Symposium, APLAS, volume 8301 of LNCS, pages 50–57. Springer, 2013. 10. Laurent Granvilliers and Frédéric Benhamou. Algorithm 852: RealPaver: an interval solver using constraint satisfaction techniques. ACM Transactions on Mathematical Software, 32(1):138–156, 2006. 11. Leopold Haller, Alberto Griggio, Martin Brain, and Daniel Kroening. Deciding floating-point logic with systematic abstraction. In Formal Methods in ComputerAided Design, FMCAD, pages 131–140. IEEE, 2012. 12. Bruno Marre and Claude Michel. Improving the floating point addition and subtraction constraints. In CP, volume 6308 of LNCS, pages 360–367. Springer, 2010. 13. Claude Michel. Exact projection functions for floating-point number constraints. In 7th International Symposium on Artificial Intelligence and Mathematics, 2002. 14. Claude Michel, Michel Rueher, and Yahia Lebbah. Solving constraints over floating-point numbers. In Proc.of CP 2001, LNCS 2239: 524–538, 2001. 15. Olivier Ponsini, Claude Michel, and Michel Rueher. Refining abstract interpretation based value analysis with constraint programming techniques. In Michela Milano, editor, 18th International Conference on Principles and Practice of Constraint Programming (CP 2012), volume 7514 of Lecture Notes in Computer Science, pages 593–607. Springer, 2012. 16. Olivier Ponsini, Claude Michel, and Michel Rueher. Verifying floating-point programs with constraint programming and abstract interpretation techniques. Autom. Softw. Eng., 23(2):191–217, 2016.
8cs.DS
Tensor Network alternating linear scheme for MIMO Volterra system identification Kim Batselier a , Zhongming Chen a , Ngai Wong a , arXiv:1607.00127v2 [cs.NA] 18 Oct 2016 a The Department of Electrical and Electronic Engineering, The University of Hong Kong Abstract This article introduces two Tensor Network-based iterative algorithms for the identification of high-order discrete-time nonlinear multipleinput multiple-output (MIMO) Volterra systems. The system identification problem is rewritten in terms of a Volterra tensor, which is never explicitly constructed, thus avoiding the curse of dimensionality. It is shown how each iteration of the two identification algorithms involves solving a linear system of low computational complexity. The proposed algorithms are guaranteed to monotonically converge and numerical stability is ensured through the use of orthogonal matrix factorizations. The performance and accuracy of the two identification algorithms are illustrated by numerical experiments, where accurate degree-10 MIMO Volterra models are identified in about 1 second in Matlab on a standard desktop pc. Key words: Volterra series; tensors; MIMO; identification methods; system identification 1 Introduction Volterra series [26] have been extensively studied and applied in applications like speech modeling [17], loudspeaker linearization [13], nonlinear control [8], active noise control [22], modeling of biological and physiological systems [16], nonlinear communication channel identification and equalization [4], distortion analysis [24] and many others. Their applicability has been limited however to “weakly nonlinear systems”, where the nonlinear effects play a nonnegligible role but are dominated by the linear terms. Such limitation is not inherent to the Volterra series themselves, as they can represent a wide range of nonlinear dynamical systems, but is due to the exponentially growing number of Volterra kernel coefficients as the degree increases. Indeed, assuming a finite memory M , the dth-order response of a discrete-time single-input single-output (SISO) Volterra system is given by yd (t) = M −1 X hd (k1 , . . . , kd ) k1 ,...,kd =0 d Y u(t − ki ), i=1 where y(t), u(t) are the scalar output and input at time t respectively and the dth-order Volterra kernel hd (k1 , . . . , kd ) Email addresses: [email protected] (Kim Batselier), [email protected] (Zhongming Chen), [email protected] (Ngai Wong). Preprint submitted to Automatica is described by M d numbers. For a multiple-input multipleoutput (MIMO) Volterra system with p inputs the situation gets even worse, where the dth-order Volterra kernel for one particular output is characterized by (pM )d numbers. This problem is also commonly known as the curse of dimensionality. The paradigm used in this article to break this curse is to trade storage for computation. This means that all the Volterra coefficients are replaced by only a few numbers, from which all Volterra coefficients can be computed. This idea is not new, e.g. Volterra kernels have been expanded on orthonormal basis functions in order to reduce their complexity [2,6]. Tensors (namely, multi-dimensional arrays that are generalizations of matrices to higher orders) are also suitable candidates for this purpose. In [7] both the canonical polyadic [3, 10] and Tucker tensor decompositions [23] were used. The canonical polyadic decomposition can suffer from instability however, and the determination of its rank is known to be a NP-hard problem [12], which can be ill-posed [5]. The main disadvantage of the Tucker decomposition of the Volterra kernels, which is in fact an expansion onto a set of orthonormal basis functions, is that it still suffers from an exponential complexity. This motivates us to develop and introduce a new description of discrete-time MIMO Volterra systems in terms of particular Tensor Networks (TN) [18]. For the particular case of multiple-input-single-output (MISO) systems, these Tensor Networks will turn out to be Trains (TTs) [19]. A TN 19 October 2016 representation does not suffer from any instability or exponential complexity and can represent all Volterra kernels combined by O(d(pM + 1)r2 ) elements, where r is a to-bedetermined number called the TN-rank. TNs were originally developed in the physics community. Of particular importance is the Density Matrix Renormalization Group (DMRG) algorithm [25], which is an iterative algorithm originally developed for the determination of the ground state of a entangled multi-body quantum system. Its applicability however is not limited to problems in quantum physics, as demonstrated by recent interest in the scientific computing community [11, 20, 21]. i3 i2 i1 21 22 23 24 A d-way or dth-order tensor is denoted A ∈ Rn1 ×n2 ×···×nd and hence each of its entries ai1 i2 ···id is determined by d indices. The numbers n1 , n2 , . . . , nd are called the dimensions of the tensor. A tensor is cubical if all its dimensions are equal. A cubical tensor is symmetric when all its entries satisfy ai1 i2 ···id = aπ(i1 ,i2 ,...,id ) , where π(i1 , i2 , . . . , id ) is any permutation of the indices. An example 3-way tensor with dimensions 4, 3, 2 is shown in Fig. 1. For practical purposes, only real tensors are considered. We use boldface capital calligraphic letters A, B, . . . to denote tensors, boldface capital letters A, B, . . . to denote matrices, boldface letters a, b, . . . to denote vectors, and Roman letters a, b, . . . to denote scalars. The transpose of a matrix A or vector a are denoted by AT and aT , respectively. The unit matrix of order n is denoted In . (1) we derive a new description of discrete-time MIMO Volterra systems using the TN format, (2) we derive two iterative MIMO Volterra identification algorithms that estimate all Volterra kernels in the TN format from given input-output data. In each step of the iterative identification a small linear system needs to be solved. The main computational tools are the singular value decomposition (SVD) and the QR decomposition [9]. These orthogonal matrix factorizations ensure the numerical stability of the methods [11]. The first identification method, which is called the Alternating Linear Scheme (ALS) method, has the lowest computational complexity but assumes that the TN-ranks rk ’s are fixed. The second identification method, called the Modified Alternating Linear Scheme (MALS), removes this limitation and allows for the adaptive updating of the TN-ranks during the iterations. The TN-ranks are determined numerically by means of a SVD. This is reminiscent of the determination of the order of linear systems in subspace identification algorithms [14]. Monotonic convergence of both the ALS and MALS methods under certain conditions is discussed in [21]. We now give a brief description of some required tensor operations and properties. The generalization of the matrixmatrix multiplication to tensors involves a multiplication of a matrix with a d-way tensor along one of its d possible modes (equiv. indices/axes). Definition 2.1 (Tensor k-mode product)( [15, p. 460]) The k-mode product B = A ×k U of a tensor A ∈ Rn1 ×···×nk ×···×nd with a matrix U ∈ Rpk ×nk is defined by The outline of this article is as follows. In Section 2 we give a brief overview of important tensor concepts, operations and properties. The MIMO Volterra TN framework is introduced in Section 3. The two iterative identification algorithms are derived in Section 4 and applied on two examples in Section 5. To our knowledge, this is the only time where MIMO Volterra systems of degree 10 were identified in about 1 second on a standard computer. Matlab/Octave implementations of our algorithms are freely available from https://github.com/kbatseli/MVMALS. 2.1 5 9 6 10 7 11 8 12 17 18 19 20 Fig. 1. A 4 × 3 × 2 tensor where each entry is determined by three indices i1 , i2 , i3 . In this article, we adopt the DMRG method in the TN format for the identification of MIMO discrete-time Volterra systems. The contributions of this article are twofold: 2 1 2 3 4 13 14 15 16 bi1 ···ik−1 jik+1 ···id = nk X ujik ai1 ···ik−1 ik ik+1 ···id , (1) ik =1 and B ∈ Rn1 ×···×nk−1 ×pk ×nk+1 ×···×nd . The following illustrative example rewrites the familiar matrix multiplication as a 1-mode and 2-mode product. Example 1 (Matrix multiplication as mode products) For matrices A, B, C with matching dimensions we have that Preliminaries A ×1 B ×2 C := B A C T . Tensor basics An interesting observation is that the definition of the kmode product also includes the multiplication of a tensor Tensors in this article are multi-dimensional arrays that generalize the notions of vectors and matrices to higher orders. 2 A with d vectors. The following example highlights a very important case. n3 n1 Example 2 Consider a symmetric d-way tensor A with dimensions n and a vector x ∈ Rn . The multidimensional  n1 r2 r2 A r1 (2) A (3) n3 n2 is the scalar A xd := A ×1 xT ×2 xT ×3 · · · ×d xT , Fig. 2. The TT-cores of a 3-way tensor A are two matrices A(1) , A(3) and a 3-way tensor A(2) . (2) Definition 2.4 (Vectorization)( [15, p. 460]) The vectorization of a tensor A, denoted vec(A), rearranges all its entries into one column vector. which is obtained as a homogeneous polynomial of degree d in the variables x1 , . . . , xn . Example 4 For the tensor in Fig. 1, we have The Kronecker product plays a crucial role in our description of MIMO Volterra systems. vec(A) = reshape(A, [24, 1]) = Definition 2.2 (Kronecker product)( [15, p. 461]) If B ∈ Rm1 ×m2 and C ∈ Rn1 ×n2 , then their Kronecker product B ⊗ C is an m1 × m2 block matrix whose (i3 , i4 )th block is the n1 × n2 matrix bi3 i4 C    b11 · · · b1n1 b11 C · · · b1n1 C  . .   . . .. ..  . .. ..  ⊗ C =  .. . .  .   bm1 1 · · · bm1 n1 A = A (1) n2 T contraction of A with x = x1 x2 · · · xn r1 1 2 · · · 24 T . The importance of the vectorization lies in the following equation  vec(A ×1 U1 ×2 · · · ×d Ud ) = (Ud ⊗ · · · ⊗ U1 )vec(A). (5)  .  bm1 1 C · · · bm1 n1 C Observe how the order in the Kronecker product is reversed with respect to the ordering of the mode products. Equation (5) allows us to rewrite (2) as (3) We use the notation x d := x ⊗ x ⊗ · · · ⊗ x for the d-times repeated Kronecker product. The mixed-product property of the Kronecker product states that if A, B, C and D are matrices of such sizes that one can form the matrix products AC and BD, then (A ⊗ B) (C ⊗ D) = AC ⊗ BD.  A xd = vec(A)T x d , (6) which tells us how the k-mode products of a tensor A with a vector x can be computed. When A in (5) is also a matrix, we then obtain the following useful property (4) vec(U1 A U2T ) = (U2 ⊗ U1 ) vec(A). Definition 2.3 (Reshaping)( [15, p. 460]) Reshaping is another often used tensor operation. The most common reshaping is the matricization, which reorders the entries of A into a matrix. We adopt the Matlab/Octave reshape operator “reshape(A, [n1 , n2 , n3 · · · ])”, which reshapes the tensor A into a tensor with dimensions n1 , n2 , n3 , . . .. The total number of elements of A must be the same as n1 × n2 × n3 · · · . 2.2 (7) Tensor Train decomposition The Tensor Network representation used in this article lies conceptually very close to the Tensor Train decomposition [19]. We therefore first discuss the Tensor Train representation. A TT-decomposition represents a d-way tensor A in terms of d 3-way tensors A(1) , . . . , A(d) , which are called the TT-cores. The kth TT-core has dimensions rk−1 , nk , rk , where rk−1 , rk are called the TT-ranks. Specifically, each entry of A ∈ Rn1 ×···×nd is determined by Example 3 We illustrate the reshaping operator on the 4 × 3 × 2 tensor of Fig. 1   1 5 9 13 17 21   2 6 10 14 18 22   reshape(A, [4, 6]) =  . 3 7 11 15 19 23   4 8 12 16 20 24 (1) (2) (d) ai1 i2 ···id = Ai1 Ai2 · · · Aid , (k) (8) where Aik is the rk−1 ×rk matrix obtained from specifying ik . Since ai1 i2 ···id is a scalar, it immediately follows that r0 = rd = 1. The TT-decomposition is illustrated for a 3way tensor in Fig. 2. Note that when all TT-ranks are equal to r, then the storage of a cubical d-way tensor with dimensions n in the TT format needs O(dnr2 ) elements. Small TT-ranks Probably the most important reshaping of a tensor is the vectorization. 3 therefore result in a significant reduction of required storage cost. In order to describe MIMO Volterra systems we will need to remove the constraint that r0 = 1 and therefore obtain a slightly more general TN. Observe that the removal of this constraint implies that the left-hand side of (8) will then be a r0 × 1 vector. The following multidimensional contraction in the TN format turns out to be very important for Volterra systems. Definition 3.1 (SISO Volterra tensor) Given a discrete-time SISO Volterra system of degree d and memory M as described in (10), then the d-way cubical Volterra tensor V of dimension M + 1 is defined by Lemma 2.1 ( [19, p. 2309]) Given a cubical tensor A ∈ Rn×···×n in the TT format and a vector x ∈ Rn . The multidimensional contraction A xd can then be computed as  T ut := 1 u(t) u(t − 1) · · · u(t − M + 1) ∈ RM +1 . y(t) = V udt , where Axd = (A(1) ×2 xT ) (A(2) ×2 xT ) · · · (A(d) ×2 xT ). (9) The extension of this definition to the MIMO case is straightforward. Indeed, the ith output yi (t) is then a multivariate polynomial of degree d in u1 (t), . . . , u1 (t − M + 1), u2 (t), . . . , u2 (t − M + 1), . . . , up (t − M + 1). This implies that the vector ut in Definition 3.1 needs to be extended with these additional inputs, which results in an increase in the dimension of the corresponding Volterra tensor. In addition, the order of the Volterra tensor is incremented to accommodate for the multiple number of outputs. Again, in the MIMO case this contraction will result in a r0 × 1 vector where now each entry is the evaluation of a homogeneous polynomial. The numerical stability of the two identification algorithms described in this article relies on the TN-cores being either left or right orthogonal. Definition 3.2 (MIMO Volterra tensor) Given a discrete time p-input l-output Volterra system of degree d and memory M , then the d + 1-way Volterra tensor V of dimensions l × pM + 1 × · · · × pM + 1 is defined by Definition 2.5 (Left orthogonal and right orthogonal TNcores)( [11, p. A689]) A TN-core A(i) is left orthogonal if it can be reshaped into an ri−1 ni × ri matrix A for which AT A = Iri   y1 (t)   y2 (t)   y(t) :=  .  = V ×2 uTt ×3 uTt · · · ×d+1 uTt , (11)  ..    yl (t) applies. Similarly, a TN-core A(i) is right orthogonal if it can be reshaped into an ri−1 × ni ri matrix A for which A AT = Iri−1 where ut is the (pM + 1) × 1 vector with entries 1, u1 (t), u2 (t), . . . , up (t), . . . , u1 (t − M + 1), u2 (t − M + 1), . . . , up (t − M + 1). applies. 3 Tensor description of MIMO Volterra systems The MIMO Volterra tensor consists of l (pM + 1)d entries, which can quickly become practically infeasible to store as M and d grow. We therefore propose to store the Volterra tensor V in the TN format V (1) , . . . , V (d) , where the first TN-core V (1) has dimensions l × pM + 1 × r1 . The other TN-cores have sizes ri−1 × pM + 1 × ri , with rd = 1 for the last core. The TN format reduces to a TT for the MISO case (l = 1). This change in representation reduces the storage requirement to O((d−1)(pM +1)r2 +(pM +1)lr). Lemma 2.1 then immediately tells us how to simulate the output samples at time t as To keep the notation simple, we first consider the following discrete-time SISO Volterra system of degree d, namely, y(t) = y0 (t) + y1 (t) + y2 (t) + · · · + yd (t), = h0 + d X M −1 X i=1 k1 ,...,ki =0 hi (k1 , . . . , ki ) i Y u(t − kj ), j=1 (10) where y(t), u(t) are the scalar output and input at time t respectively, M is the memory length and hi (k1 , . . . , ki ) denotes the ith Volterra kernel. Previous work that uses tensors in Volterra series describes each Volterra kernel as a separate symmetric tensor [7]. Realizing from (10) that y(t) is a multivariate polynomial in u(t), . . . , u(t − M + 1), we define the SISO Volterra tensor as follows. y(t) = (V (1) ×2 uTt ) (V (2) ×2 uTt ) · · · (V (d) ×2 uTt ), (12) with a computational complexity of O(d(pM +1)r+dr3 ). In [1] a much faster simulation complexity of O(dRN log N ) 4 is called a set of persistent exciting inputs of order d. for computing N samples is obtained by using a symmetric polyadic representation for each of the Volterra kernels separately. However, the method only works for the SISO case and the identification of such a representation can be problematic, since computation of the canonical rank R is an NP-hard problem [12], which can be ill-posed [5]. 4 We will from here on always assume that the inputs are persistent exciting and that N ≥ rank(U ). The truncated Volterra series for one particular output is a polynomial in  +d pM variables of degree d and therefore has pM coeffipM cients. A solution V (1) of the matrix equation (14) that con +d sists of only l pM distinct entries therefore must correpM spond with l symmetric tensors, where each column of V (1) corresponds with one particular d-way symmetric tensor. As a result, persistent exciting inputs and sufficient number of samples N together with Lemma 4.1 has the following consequences: MIMO Volterra system identification In what follows we always consider the MIMO case. Observe now that we can rewrite (11) as y(t)T = (ut d )T (V (1) )T , (13) (1) the identification problem (14) has an infinite number of solutions, (2) the l unique minimal norm solutions of (14) correspond with l symmetric tensors, (3) the unicity of the symmetric solutions implies that no other symmetric solutions exist, (4) any solution V (1) of (14) can be turned into l minimal norm solutions by symmetrizing each of the tensors given by the columns of V (1) . where V (1) is the Volterra tensor reshaped into a l × (pM + 1)d matrix. Writing out (13) for t = 0, 1, . . . , N − 1 leads to the following matrix equation Y = U (V (1) )T , (14) where  T Y := y(0) y(1) y(2) · · · y(N − 1) ,  T U := u0 d u1 d u2 d · · · uN −1 d . Ideally, one would solve (14) for the minimal norm solutions, which acts as a regularization of the problem such that the solution is uniquely defined. The two iterative methods which we describe in the next subsections do not guarantee convergence to the minimal norm solutions. However, in practice we observe that the norms of the obtained solutions are quite close to the minimal ones. Essentially, MIMO Volterra system identification is in its most basic form solving the matrix equation (14). This immediately reveals the difficulty, as the size of the U matrix is N × (pM + 1)d , which quickly becomes prohibitive even for SISO systems and moderate degree d. This motivates us to solve the following problem. 4.1 Problem 1 For a given set of measured time series y1 , . . . , yl , u1 , . . . , up , memory M and degree d, solve the matrix equation (14) for V in the TN format. Alternating Linear Scheme method The first method that we derive is the Alternating Linear Scheme (ALS) method. The key idea of this method is to fix the TN-ranks r1 , r2 , . . . , rd−1 and choose a particular initial guess for V (1) , . . . , V (d) . Each of the TN-cores is then updated separately in an iterative fashion until convergence has been reached. Once the core V (d) is updated, the algorithm “sweeps” back towards V (1) and so on. It turns out that updating one of the cores is equivalent with solving a much smaller linear system, which can be done very efficiently. Before describing the form of the reduced linear system, we first introduce the following notation Before presenting the two numerical algorithms that solve Problem 1, we first give an upper bound on the rank of U , together with some important implications. Lemma  4.1 The rank of the matrix U is upper bounded by pM +d pM . Proof 1 Each row of U consists of (pM +1)d entries formed d by the repeated  Kronecker product uk . There are however pM +d only pM distinct entries. vk−1 := (V (1) ×2 uTt ) · · · (V (k−1) ×2 uTt ) ∈ Rl×rk−1 , vk+1 := (V (k+1) ×2 uTt ) · · · (V (d) ×2 uTt ) ∈ Rrk ×1 . Lemma 4.1 motivates us to define a particular set of inputs such that this upper bound is achieved. Theorem 4.1 For outputs y1 , . . . , yl described by a MIMO Volterra system (12) we have that Definition 4.1 A set of input signals u1 , u2 , . . . , up such that   pM + d rank(U ) = pM T y(t) = (vk+1 ⊗ uTt ⊗ vk−1 ) vec(V (k) ). 5 (15) Proof 2 We first rewrite (12) as downloaded from https://github.com/kbatseli/ MVMALS. y(t) = vk−1 (V (k) ×2 uTt ) vk+1 . Algorithm 1 MIMO Volterra ALS Identification Input: N samples of inputs u1 , . . . , up , outputs y1 , . . . , yl , degree d, memory M , TN ranks r1 , . . . , rd−1 Output: TN-cores V (1) , . . . , V (d) that solve Problem 1 Initialize right orthogonal TN-cores V (1) , . . . , V (d) of prescribed ranks while termination criterion not satisfied do for i = 1, . . . , d − 1 do vec(V (i) ) ← Compute and solve (16) Vi ← reshape(V (i) , [ri−1 , (pM + 1)ri ]) Compute thin QR decomposition of Vi V (i) ← reshape(Q, [ri−1 , (pM + 1), ri ]) Vi+1 ← reshape(V (i+1) , ri , (pM + 1)ri+1 ]) V (i+1) ← reshape(RVi+1 , [ri , (pM + 1), ri+1 ]) end for Repeat the above loop in the reverse order end while This equation holds since it is the product of the l × rk−1 matrix vk−1 with the rk−1 × rk matrix (V (k) ×2 uTt ) with the rk × 1 vector vk+1 , resulting in the l × 1 vector y(t). We then have that y(t) = vk−1 (V (k) ×2 uTt ) vk+1 , T = (vk+1 ⊗ vk−1 ) vec(V (k) ×2 uTt ), T = (vk+1 ⊗ vk−1 ) vec(V (k) ×1 Irk−1 ×2 uTt ×3 Irk ), T = (vk+1 ⊗ vk−1 ) (Irk ⊗ uTt ⊗ Irk−1 ) vec(V (k) ), T = (vk+1 ⊗ 1 ⊗ vk−1 ) (Irk ⊗ uTt ⊗ Irk−1 ) vec(V (k) ), T = (vk+1 ⊗ uTt ⊗ vk−1 ) vec(V (k) ), where the second equation is obtained from (7), the fourth equation is obtained from using (5) and the final equation follows from (4). This concludes the proof. A few remarks on the ALS method are in order. The importance of Theorem 4.1 lies in the fact that it describes how the reduced linear system to update V (k) can be constructed. Indeed, suppose we want to update V (k) and keep all other TN-cores fixed. By using (15) for t = 0, . . . , N − 1 the following linear system is obtained vec(Y T ) = Uk vec(V (k) ), • The iterations can be terminated when the solution does not exhibit any further improvement or when a certain fixed maximal number of sweeps has been executed. In our implementation we set a tolerance on the relative residual ||Y − Ŷ ||2 /||Y ||2 , where Ŷ is the simulated output from the obtained solution. • It is proved in [11, 21] that under certain conditions the ALS method enjoys strictly monotonous convergence. Convergence to the unique minimal norm solutions cannot be guaranteed however. • Also in [11, p. A701], it is proved that the QR decomposition step ensures that the condition number of each Uk matrix in (16) is upper bounded by the condition number of the large U matrix. This ensures the numerical stability of the ALS method. (16) where Uk is a lN × rk−1 (pM + 1)rk matrix. Next to the obvious savings in computational complexity compared to solving (14), this effectively requires much fewer samples N to perform the identification. Indeed, one only has to make sure that lN ≥ rk−1 (pM + 1)rk . Computing the minimal norm solution of (16) requires the computation of the pseudo-inverse of Uk , which requires O(4N l(rk−1 (pM + 1)rk )2 + 8(rk−1 (pM + 1)rk )3 ) computations. Numerical stability of the ALS algorithm is guaranteed by the use of an orthogonalization step [11, p. A690]. The key idea is that all TN-cores are initialized to be right orthogonal and are kept orthogonal during each step. After updating V (1) by solving (16), this tensor is reshaped into a r0 (pM + 1) × r1 matrix from which a thin QR decomposition [9, p. 230] is computed. This takes O(2l(pM + 1)r12 + 2r13 /2) flops. The orthogonal matrix Q is then chosen as a new left orthogonal V (1) TN-core. The corresponding R matrix is then absorbed into the V (2) core by reshaping the core into a r1 ×(pM +1)r2 matrix V2 and computing R V2 . Next, V (2) is updated and orthogonalized, after which V (3) is updated and so forth. When the iterative “sweep” has reached the end of the TN, it reverses direction and in a similar way all cores are made right orthogonal by QR decomposition. The whole algorithm is presented as pseudocode in Algorithm 1. A Matlab/Octave implementation of Algorithm 1 can be freely While the ALS method has a small computational complexity, it suffers from the problem that all TN-ranks need to be specified a priori. Finding a good choice can be quite difficult when d is large. This is the main motivation for the development of the Modified Alternating Linear Scheme (MALS) algorithm, which not only updates the TN-cores but also adapts the TN-ranks during each step. An additional benefit is that the TN-cores are guaranteed to be either left or right orthogonal so that no stabilizing QR step is required anymore. These benefits, however, come at the cost of a higher computational complexity. 4.2 Modified Alternating Linear Scheme method The main idea of the MALS is in fact a simple one, namely, to update two TN-cores V (k) , V (k+1) at a time by considering them as one “super-core” and keeping all other cores 6 where U , V are orthogonal matrices and S is a diagonal matrix with positive entries s1 ≥ . . . ≥ sq , with q = min(rk−1 (pM +1), (pM +1)rk+1 ). Its computation requires 2 O(4(rk−1 (pM + 1)3 rk+1 ) + 8(rk−1 (pM + 1)3 rk+1 )2 + 3 9((pM + 1)3 rk+1 ) flops. The numerical rank rk can be determined from a given tolerance τ such that s1 ≥ · · · ≥ srk ≥ τ ≥ · · · ≥ sq . If the sweep is going from left to right then we update V (k) , V (k+1) as fixed. The updated super-core is then decomposed into one orthogonal and one non-orthogonal part, which are used as updates for both V (k) and V (k+1) . This decomposition step is achieved by computing a singular value decomposition (SVD) and it is here where the TN-rank rk is updated. This updating procedure is repeated in the same sweeping fashion as with the ALS method until the solution has converged. We now derive the reduced linear system for computing a new super-core. The entries of the super-core V (k,k+1) are defined as the contraction of V (k) with V (k+1) by summing over all possible rk values (k,k+1) V i1 [i2 i3 ]i4 = rk X (k) V (k) := reshape(U , [rk−1 , (pM + 1), rk ]), V (k+1) := reshape(SV T , [rk , (pM + 1), rk+1 ]), which makes V (k) left orthogonal. If the sweep is going from right to left then the updates are (k+1) V i1 i2 j V ji3 i4 . j=1 V (k) := reshape(U S, [rk−1 , (pM + 1), rk ]), The square brackets around i2 i3 indicate that these indices need to be interpreted as one single multi-index such that V (k,k+1) is an rk−1 × (pM + 1)2 × rk+1 3-way tensor. Observe that the formation of the super-core has removed all information on rk . It is now straightforward to verify that V (k+1) := reshape(V T , [rk , (pM + 1), rk+1 ]), where now V (k+1) is right orthogonal. The pseudocode for the MALS algorithm is given in Algorithm 2. A Matlab/Octave implementation of Algorithm 2 can also be freely downloaded from https://github.com/kbatseli/ MVMALS. (V (k) ×2 uTt )(V (k+1) ×2 uTt ) = V (k,k+1) ×2 (uTt ) 2 holds. Using the same notation as in the ALS method we now derive the reduced linear system for the MALS. Algorithm 2 MIMO Volterra MALS Identification Input: N samples of inputs u1 , . . . , up , outputs y1 , . . . , yl , degree d, memory M Output: TN-cores V (1) , . . . , V (d) that solve Problem 1 Initialize right orthogonal TN-cores V (1) , . . . , V (d) of ranks 1 while termination criterion not satisfied do for i = 1, . . . , d − 1 do vec(V (i,i+1) ) ← Compute and solve (18) Vi,i+1 ← reshape(V (i,i+1) , [ri−1 (pM +1), (pM + 1)ri+1 ]) Compute the SVD of Vi,i+1 Determine numerical rank ri V (i) ← reshape(U , [ri−1 , (pM + 1), ri ]) V (i+1) ← reshape(SV T , [ri , (pM + 1), ri+1 ]) end for Repeat the above loop in the reverse order end while Theorem 4.2 For outputs y1 , . . . , yl described by a MIMO Volterra system (12) we have that T y(t) = (vk+2 ⊗ (uTt ) 2 ⊗ vk−1 ) vec(V (k,k+1) ). (17) Proof 3 By rewriting (12) this time as y(t) = vk−1 (V (k,k+1) ×2 (uTt ) 2 ) vk+2 , it can be clearly seen that the rest of the proof is now identical to the ALS case. Application of Theorem 4.2 for t = 0, . . . , N −1 now results in the reduced linear system vec(Y T ) = Uk,k+1 vec(V (k,k+1) ), The same remarks as in the ALS case apply. The tolerance τ for the determination of the numerical rank rk can be chosen such that the error is below a certain threshold. In our implementation we opted for the default choice in Matlab/Octave, which is τ =  s1 max(ri−1 (pM +1), (pM +1)ri+1 ), where  is the machine precision. If the tolerance on the obtained solution is set too low then the MALS algorithm will have the tendency to increase the TN-ranks to very high values, resulting in higher computational complexity. However, it does not make sense in system identification to require that the solution interpolates the measured output to a high accuracy (say up to the machine precision), which is essentially overfitting. (18) where Uk,k+1 is an lN × rk−1 (pM + 1)2 rk+1 matrix. The minimal norm solution of (18) can by computed in O(4N l(rk−1 (pM + 1)2 rk+1 )2 + 8(rk−1 (pM + 1)2 rk+1 )3 ) flops. Once the new super-core has been computed, it can be reshaped into an rk−1 (pM +1)×(pM +1)rk+1 matrix Vk,k+1 . The SVD of Vk,k+1 is Vk,k+1 = U S V T , 7 5 Table 1 Run times, maximal TT-rank and number of estimated Volterra tensor elements for an increasing degree d. d Run time [seconds] max TT-rank (pM + 1)d Numerical Experiments In this section we demonstrate the two proposed identification algorithms. All computations were done on an Intel i5 quad-core processor running at 3.3 GHz with 16 GB RAM. We are not aware of any other publicly available algorithms that are able to identify high-degree MIMO Volterra systems, say, at d = 10. 5.1 Decaying multi-dimensional exponentials First, we demonstrate the validity of Algorithms 1 and 2 by means of an artificial SISO example. Symmetric Volterra kernels were generated up to degree d = 10 for a fixed memory M = 7 and containing exponentially decaying coefficients. The ith symmetric Volterra kernel hi contains the entries U †y ALS MALS 2 0.017 0.240 0.077 6 64 3 0.253 0.223 0.251 8 512 4 39.36 1.771 0.415 8 4096 5 NA 4.288 0.587 8 32768 6 NA 3.065 0.791 8 262144 7 NA 6.783 0.961 8 2097152 8 NA 13.11 1.199 8 16777216 9 NA 14.42 1.384 8 134217728 10 NA 18.37 1.576 8 1.0737e9 hi (k1 , . . . , ki ) = exp (−k12 − k22 − · · · − ki2 ). Each of the ki indices attain the values 0, 0.1, 0.2, . . . , 0.6. For each degree d a random input signal of 5000 samples, uniformly distributed over the interval [0, 1], was generated. The Volterra kernel was estimated by solving (14) directly using the pseudoinverse of U where possible. The MALS algorithm was used to determine a solution for which ||y − ŷ||2 /||y||2 < 1e−4 was satisfied. The TT-ranks determined by the MALS algorithm were then used to determine a solution with the same relative accuracy using the ALS method. Both the MALS and ALS algorithms always ran with the first 700 samples of the input and output. Table 1 lists the run times in seconds for the three methods, the maximal TT-rank and the total number of identified Volterra kernel elements for each degree. Starting from degree d = 5 it was not possible anymore to obtain the Volterra tensor directly since this would require the inversion of a 32768 × 32768 matrix. From d = 3, the maximal TT-rank stabilizes to 8 for all TT-cores. Even though the ALS method exhibits low computational complexity, its convergence is much slower than MALS, resulting in larger run times. The obtained solutions were validated by simulating the output using the 4300 remaining input points. Fig. 3 shows both the real and simulated output from the MALS solution for samples 1640 up to 1700. The two output signals are almost indistinguishable. No difference between the ALS and MALS solutions could be observed. 5.2 Fig. 3. Real and simulated output from the MALS solution with d = 10, M = 7. are added to the measured RF output, generating signals with signal-to-noise (SNR) ratios ranging from 11dB up to 25dB. The first 700 samples of the inputs and the noisy output are then used to identify an M = 2, d = 11 two-input oneoutput Volterra system using the ALS method. The Volterra kernel consists in this case of 9765625 entries. The TT-ranks are all fixed to 2M + 1 = 5. The identified models were then used to simulate the remaining 4300 samples of the output. The SNR of the simulated output was computed by comparing the simulated output with the original noiseless output. Table 2 lists the SNR of the signals used in the identification (ID SNR), the relative residual of the simulated output, the run time of the identification in seconds and the SNR of the simulated signal (SIM SNR). As expected, a gradual improvement of the relative residual can be seen as the SNR of the signals used for identification increases. Although the residual remains high throughout the different SNR levels, the SNR of the simulated output is much better, with a consistent increase of 11dB. The run time varies between 2 and 6 seconds. Fig. 4 shows the simulated output Double balanced mixer In this example we consider a double balanced mixer used for upconversion. The output radio-frequency (RF) signal is determined by a 100Hz sine low-frequency (LO) signal and a 300Hz square-wave intermediate-frequency (IF) signal. A phase difference of π/8 is present between the LO and IF signals. All time series were sampled at 5 kHz for 1 second. We investigate the effect of additive output noise on the identified models. We define 5 different noise levels which 8 6 This article presented two new and remarkably efficient identification algorithms for high-order MIMO Volterra systems. The identification problem was rephrased in terms of the Volterra tensor, which is never explicitly constructed but instead always stored in the highly economic TT format. Both proposed identification algorithms are iterative, starting from an initial orthogonal guess for the TT-cores and updating them until a desired accuracy is acquired. The algorithms are guaranteed to monotonically converge and numerical stability is ensured by retaining orthogonality in the TT-cores. The efficiency of both identification algorithms was demonstrated by numerical examples, where reliable MIMO Volterra systems of degrees 10 were estimated in only a few seconds. Even though its computational complexity is lower, the ALS method was found to converge slower than the MALS algorithm when producing solutions with the same accuracy. The MALS method showed a tendency to increase the TT-ranks under the presence of high noise levels. Extending the robustness of these methods to noisy data will be the subject of further research. Fig. 4. Real and simulated output from the ALS identified models under different SNRs. on the validation data for three Volterra models identified under three different SNR levels (11dB, 16dB, 25 dB). Next, the MALS algorithm was run on the same data to also identify M = 2, d = 11 Volterra models. Based on the ALS results we set the tolerance on the relative residual to 0.5. This resulted in all TT-ranks being 5 for all cases. Table 3 lists the SNR of the signals used in the identification (ID SNR), the relative residual of the simulated output, the run time of the identification in seconds and the SNR of the simulated signal (SIM SNR). The relative residuals and SNRs of the simulated output are very close to the results obtained by the ALS identification. Just as in Example 5.1, MALS is able to finish the identification faster than the ALS method. Furthermore, the run time does not vary as much as in the ALS case. Lowering the tolerance for the data with low SNR resulted in the MALS method increasing the TT ranks significantly, up to the point that the 5000 samples were not sufficient anymore. This indicates a tendency of the MALS method to overfit. Table 2 ALS identification for 5 different SNR levels. 11dB 13dB 16dB 19dB ID SNR References [1] K. Batselier, Z. Chen, H. Lui, and N. Wong. A tensor-based Volterra series black-box nonlinear system identification and simulation framework. In 2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 2016. [2] R. J. G. B. Campello, G. Favier, and W. C. do Amaral. Optimal expansions of discrete-time Volterra models using Laguerre functions. Automatica, 40(5):815 – 822, 2004. [3] J. D. Carroll and J. J. Chang. Analysis of individual differences in multidimensional scaling via an n-way generalization of “EckartYoung” decomposition. Psychometrika, 35(3):283–319, 1970. [4] C.H. Cheng and E.J. Powers. Optimal Volterra kernel estimation algorithms for a nonlinear communication system for PSK and QAM inputs. IEEE Transactions on Signal Processing, 49(1):147–163, 2001. [5] V. de Silva and L.H. Lim. Tensor rank and the ill-posedness of the best low-rank approximation problem. SIAM J. on Matrix Anal. Appl., 30(3):1084–1127, 2008. 25dB ||y−ŷ||2 ||y||2 .255 .208 .151 .105 .052 Run time 2.3s 5.3s 6.4s 3.2s 2.2s SIM SNR 22dB 24dB 27dB 30dB 37dB [6] C. Diouf, M. Telescu, P. Cloastre, and N. Tanguy. On the Use of Equality Constraints in the Identification of Volterra-Laguerre Models. IEEE Signal Processing Letters, 19(12):857–860, Dec 2012. [7] G. Favier, A. Y. Kibangou, and T. Bouilloc. Nonlinear system modeling and identification using Volterra-PARAFAC models. Int. J. Adapt. Control Signal Process, 26(1):30–53, January 2012. [8] Doyle FJ III, Ronald K Pearson, and Babatunde A Ogunnaike. Identification and control using Volterra models. Springer Science & Business Media, 2012. Table 3 MALS identification for 5 different SNR levels with tolerance of 0.5. 11dB 13dB 16dB 19dB 25dB ID SNR ||y−ŷ||2 ||y||2 .251 .214 .152 .105 .055 Run time 1.3s 1.1s 1.1s 1.1s 1.1s SIM SNR 24dB 25dB 28dB 31dB 37dB Conclusions [9] G.H. Golub and C.F. Van Loan. Matrix Computations. The Johns Hopkins University Press, 3rd edition, October 1996. [10] R. A. Harshman. Foundations of the PARAFAC procedure: Models and conditions for an “explanatory” multi-modal factor analysis. UCLA Working Papers in Phonetics, 16(1):84, 1970. [11] S. Holtz, T. Rohwedder, and R. Schneider. The alternating linear scheme for tensor optimization in the tensor train format. SIAM Journal on Scientific Computing, 34(2):A683–A713, 2012. 9 [12] J. Håstad. Tensor rank is NP-complete. Journal of Algorithms, 11(4):644–654, 1990. [13] Y. Kajikawa. Subband parallel cascade Volterra filter for linearization of loudspeaker systems. In 2008 16th European Signal Processing Conference, pages 1–5, Aug 2008. [14] T. Katayama. Subspace Methods for System Identification. Communications and Control Engineering. Springer London, 2005. [15] T. Kolda and B. Bader. Tensor decompositions and applications. SIAM Review, 51(3):455–500, 2009. [16] M.J. Korenberg and I.W. Hunter. The identification of nonlinear biological systems: Volterra kernel approaches. Annals of biomedical engineering, 24(2):250–268, 1996. [17] E. Mumolo and D. Francescato. Adaptive predictive coding of speech by means of Volterra predictors. In IEEE Winter Workshop on Nonlinear Digital Signal Processing, 1993, pages 2.1.4.1–2.1.4.4, 1993. [18] R. Orus. A Practical Introduction to Tensor Networks: Matrix Product States and Projected Entangled Pair States. Annals Phys., 349:117– 158, 2014. [19] I. Oseledets. Tensor-train decomposition. SIAM Journal on Scientific Computing, 33(5):2295–2317, 2011. [20] I. V. Oseledets. DMRG approach to fast linear algebra in the TT– format. Comput. Meth. Appl. Math., 11(3):382–393, 2011. [21] T. Rohwedder and A. Uschmajew. On local convergence of alternating schemes for optimization of convex problems in the tensor train format. SIAM Journal on Numerical Analysis, 51(2):1134–1162, 2013. [22] L. Tan and J. Jiang. Adaptive Volterra filters for active control of nonlinear noise processes. IEEE Transactions on Signal Processing, 49(8):1667–1676, Aug 2001. [23] L. R. Tucker. Some mathematical notes on three-mode factor analysis. Psychometrika, 31(3):279–311, 1966. [24] P. Wambacq and W.M. Sansen. Distortion Analysis of Analog Integrated Circuits. Kluwer Academic Publishers, Norwell, MA, USA, 1998. [25] S R. White. Density matrix formulation for quantum renormalization groups. Phys. Rev. Lett., 69:2863–2866, Nov 1992. [26] N. Wiener, J.A. Stratton, and M.I.O. Technology. Nonlinear Problems in Random Theory. Literary Licensing, LLC, 2013. 10
5cs.CE
Entropy on abelian groups ∗ arXiv:1007.0533v2 [math.GR] 3 May 2016 Dikran Dikranjan † Anna Giordano Bruno ‡§ [email protected] [email protected] Dipartimento di Matematica e Informatica, Dipartimento di Matematica e Informatica, Università di Udine, Università di Udine, Via delle Scienze, 206 - 33100 Udine, Italy Via delle Scienze, 206 - 33100 Udine, Italy Dedicated to Professor Justin Peters Abstract We introduce the algebraic entropy for endomorphisms of arbitrary abelian groups, appropriately modifying existing notions of entropy. The basic properties of the algebraic entropy are given, as well as various examples. The main result of this paper is the Addition Theorem showing that the algebraic entropy is additive in appropriate sense with respect to invariant subgroups. We give several applications of the Addition Theorem, among them the Uniqueness Theorem for the algebraic entropy in the category of all abelian groups and their endomorphisms. Furthermore, we point out the delicate connection of the algebraic entropy with the Mahler measure and Lehmer Problem in Number Theory. 1 Introduction Inspired by the notion of entropy invented by Clausius in Thermodynamics in the fifties of the nineteenth century, Shannon introduced entropy in Information Theory by the end of the forties of the last century. A couple of years later, Kolmogorov in [31] and Sinai in [42] introduced the measure entropy in Ergodic Theory. By an appropriate modification of their definition, Adler, Konheim and McAndrew in [2] obtained the topological entropy htop for continuous self-maps of compact topological spaces. Moreover, they briefly sketched an idea on how to define an algebraic entropy for endomorphisms of discrete abelian groups. Weiss in [48] developed this idea and studied the algebraic entropy for endomorphisms of torsion abelian groups. Later on, Peters in [36] modified this notion of algebraic entropy for automorphisms of arbitrary abelian groups. The interest in algebraic entropy was renewed after the recent article [16], where the case of endomorphisms of torsion abelian groups is thoroughly studied. We introduce some notation in order to discuss in detail the above mentioned notions of algebraic entropy, with the aim to extend Peters’ definition to arbitrary endomorphisms of abelian groups. Let G be an abelian group and let φ ∈ End(G). For a non-empty subset F of G and n ∈ N+ , the n-th φ-trajectory of F is Tn (φ, F ) = F + φ(F ) + . . . + φn−1 (F ), ∗ MSC2010: 20K30; 37A35; 37B40; 11R06. Keywords: discrete dynamical system, algebraic entropy, group endomorphism, abelian group, addition theorem, Mahler measure, Lehmer problem. † The first named author gratefully acknowledges the FY2013 Long-term visitor grant L13710 by the Japan Society for the Promotion of Science (JSPS). ‡ The second named author is supported by Programma SIR 2014 by MIUR (project GADYGR, number RBSI14V2LI, cup G22I15000160008). § Work partially supported by the Fondazione Cassa di Risparmio di Padova e Rovigo (Progetto di Eccellenza “Algebraic structures and their applications”) and by the “National Group for Algebraic and Geometric Structures, and Their Applications” (GNSAGA - INdAM). 1 and the φ-trajectory of F is X T (φ, F ) = φn (F ). n∈N For a finite subgroup F of G, the limit H(φ, F ) = lim n→∞ log |Tn (φ, F )| n exists (see Fact 2.4) and it is the algebraic entropy of φ with respect to F . According to [2, 48], the algebraic entropy ent of φ is defined as ent(φ) = sup{H(φ, F ) : F finite subgroup of G}. Clearly, this notion is more suitable for endomorphisms of torsion abelian groups, as ent(φ) = ent(φ ↾t(G) ), where t(G) is the torsion part of G. We refer to [16] as a convenient reference for the algebraic entropy ent. Peters introduced a different notion of algebraic entropy for automorphisms φ of abelian groups, using instead of Tn (φ, F ) = F + φ(F ) + . . . + φn−1 (F ), the “negative part of the trajectory” Tn− (φ, F ) = F + φ−1 (F ) + . . . + φ−n+1 (F ) = Tn (φ−1 , F ), and instead of finite subgroups F of G just non-empty finite subsets F of G. Therefore, Peters’ algebraic entropy may have non-zero values also for torsion-free abelian groups. Obviously, this definition can be given using Tn (φ, F ) as well, since Tn− (φ, F ) = Tn (φ−1 , F ). The approach with the “positive” partial trajectories Tn (φ, F ) has the advantage to be applicable to any endomorphism φ (whereas Tn− (φ, F ) may be infinite when φ is not injective). Hence, we define the algebraic entropy h for endomorphisms φ of abelian groups G as follows. For a non-empty finite subset F of G, the limit log |Tn (φ, F )| n→∞ n H(φ, F ) = lim (1.1) still exists (see Lemma 2.2(b)), and we call it the algebraic entropy of φ with respect to F . The algebraic entropy of φ is h(φ) = sup{H(φ, F ) : F ∈ [G]<ω }, where [G]<ω denotes the family of all non-empty finite subsets of G. For endomorphisms of torsion abelian groups, h coincides with ent. More precisely, if G is an abelian group and φ ∈ End(G), then ent(φ) = ent(φ ↾t(G) ) = h(φ ↾t(G) ). The definition of h can be extended to the non-abelian case. However, here we prefer to keep the exposition in the abelian setting, due to the differences and the technical difficulties that naturally appear considering non-abelian groups. The reader interested in the non-abelian case and in the connection to the growth rate of finitely generated groups may see [11, 13]. For other related algebraic entropy functions see [5, 6, 15, 21]. The main result of this paper is the following key additivity property of the algebraic entropy, called Addition Theorem. The torsion case of this theorem is covered by the Addition Theorem for ent proved in [16]. Theorem 1.1 (Addition Theorem). Let G be an abelian group, φ ∈ End(G), H a φ-invariant subgroup of G and φ ∈ End(G/H) the endomorphism induced by φ. Then h(φ) = h(φ ↾H ) + h(φ). In terms of the following diagram describing the above situation H φ↾H  H /G φ  /G 2 / G/H φ  / G/H (1.2) the equality (1.2) of the Addition Theorem reads: the algebraic entropy of the mid endomorphism is the sum of the algebraic entropies of the two side ones. We adopt the notation ATh (G, φ, H) for an abelian group G, φ ∈ End(G) and a φ-invariant subgroup H of G, to indicate briefly that “the equality (1.2) holds for the triple (G, φ, H)”. A relevant part of the proof of the Addition Theorem is based on the so called Algebraic Yuzvinski Formula (see Theorem 1.2 below), recently proved in [25]. To state the Algebraic Yuzvinski Formula, we need to recall the notion of Mahler measure, playing an important role in Number Theory and Arithmetic Geometry (see [20, Chapter 1] and [29]). For a primitive polynomial f (t) = a0 + a1 t + . . . + ak tk ∈ Z[t], let α1 , . . . , αk ∈ C be the roots of f (t) taken with their multiplicity. The Mahler measure of f (t) is X log |αi |. m(f (t)) = log |ak | + |αi |>1 The Mahler measure of a linear transformation φ of a finite dimensional rational vector space Qn , n ∈ N+ , is defined as follows. Let g(t) ∈ Q[t] be the characteristic polynomial of φ. Then there exists a smallest s ∈ N+ such that sg(t) ∈ Z[t] (so sg(t) is primitive). The Mahler measure of φ is m(φ) = m(sg(t)). Theorem 1.2 (Algebraic Yuzvinski Formula). For n ∈ N+ and φ ∈ End(Qn ), h(φ) = m(φ). The counterpart of this formula for the topological entropy was proved by Yuzvinski in [50] (see also [33]). A direct proof (independent from the topological case) of the Algebraic Yuzvinski Formula was recently given in [25], extending results from [46] and using the properties of the Haar measure on locally compact abelian groups. A weaker form for the case of zero algebraic entropy is proved in [17] using basic linear algebra. The Algebraic Yuzvinski Formula gives one of the two “normalization axioms” that entail uniqueness of h; in fact, Theorem 1.3(e) concerns the values h(φ) = m(φ), where φ ∈ End(Qn ) and n ∈ N+ . The other one is furnished by the following family of group endomorphisms. For any abelian group K the (right) Bernoulli shift βK : K (N) → K (N) is defined by (x0 , x1 , x2 , . . .) 7→ (0, x0 , x1 , . . .). Then h(βK ) = log |K|, with the usual convention that log |K| = ∞ if K is infinite (see Example 2.10). The value h(βK ), when K runs over all finite abelian groups, is the condition in Theorem 1.3(d). The Uniqueness Theorem for the algebraic entropy is our second main result, its proof uses the Addition Theorem and the Algebraic Yuzvinski Formula (see Theorem 1.3 below, where the algebraic entropy h is considered as a collection h = {hG : G abelian group} of functions hG : End(G) → R≥0 ∪ {∞} defined by hG (φ) = h(φ) for every φ ∈ End(G)). It extends the Uniqueness Theorem given in [16] for ent in the class of torsion abelian groups, that was inspired, in turn, by the Uniqueness Theorem for the topological entropy of Stojanov (see [44]). If G and H are abelian groups, φ ∈ End(G) and η ∈ End(H), we say that φ and η are conjugated if there exists an isomorphism ξ : G → H such that η = ξφξ −1 . Sometimes we specify also the isomorphism ξ by saying that φ and η are conjugated by ξ. Theorem 1.3 (Uniqueness Theorem). The algebraic entropy h of the endomorphisms of abelian groups is the unique collection h = {hG : G abelian group} of functions hG : End(G) → R≥0 ∪ {∞} such that: (a) if φ ∈ End(G) and η ∈ End(H) are conjugated, then hG (φ) = hH (η) (i.e., h is invariant under conjugation); (b) if G is an abelian group, φ ∈ End(G) and G is a direct limit of φ-invariant subgroups {Gi : i ∈ I}, then hG (φ) = supi∈I hGi (φ ↾Gi ); (c) AThG (G, φ, H) for every abelian group G, every φ ∈ End(G) and every φ-invariant subgroup H of G; 3 (d) hK (N) (βK ) = log |K| for any finite abelian group K; (e) hQn (φ) = m(φ) for every n ∈ N+ and every φ ∈ End(Qn ). Another application of the Addition Theorem in this paper concerns Lehmer Problem from Number Theory (see Problem 1.4), posed by Lehmer in 1933, and still open (see [20, 29, 34, 43]). Let L := inf{m(f (t)) > 0 : f (t) ∈ Z[t] primitive} (obviously, L = inf{m(f (t)) > 0 : f (t) ∈ Z[t] monic}). Problem 1.4 (Lehmer Problem). Is L > 0? Let us see the connection of Lehmer Problem to algebraic entropy. Note first that the finite values of the algebraic entropy ent belong to the set log N+ := {log n : n ∈ N+ } (see Fact 2.4). Then inf{ent(φ) > 0 : G abelian group, φ ∈ End(G)} = log 2. (1.3) Consider now the infimum of the positive values of the algebraic entropy h: ε := inf{h(φ) > 0 : G abelian group, φ ∈ End(G)}. The next theorem shows that the problem of deciding whether ε > 0 is equivalent to Lehmer Problem. The counterpart of this theorem for the topological entropy is apparently well-known. Theorem 1.5. The equalities ε = inf{h(φ) > 0 : n ∈ N+ , φ ∈ Aut(Qn )} = L hold. Finally, we see that a positive solution to Lehmer Problem is equivalent to the realization of the finite values of the algebraic entropy, in the following sense. Definition 1.6. Let G be an abelian group and φ ∈ End(G) with h(φ) < ∞. We say that h(φ) realizes if there exists F ∈ [G]<ω such that h(φ) = H(φ, F ). Theorem 1.7 (Realization Theorem). The following conditions are equivalent: (a) L > 0; (b) h(φ) realizes for every abelian group G and every φ ∈ End(G) with h(φ) < ∞. An application of the Addition Theorem and the Uniqueness Theorem is the so called Bridge Theorem, given in [10]. In more detail, both Weiss in [48] and Peters in [36] connected the algebraic entropy to the topological entropy by using Pontryagin duality. For an abelian group G and φ ∈ End(G), we b the Pontryagin dual of G and by φb : G b→G b the dual endomorphism of φ (see [28, 38]). It denote by G b is known that G is compact, and it is also metrizable when G is countable. Theorem 1.8 (Bridge Theorem). Let G be an abelian group and φ ∈ End(G). b (a) [48] If G is torsion, then ent(φ) = htop (φ). b (b) [36] If G is countable and φ is an automorphism, then h(φ) = htop (φ). b remains true for arbitrary abelian groups It was proved in [10] that the conclusion h(φ) = htop (φ) and their endomorphisms φ. Two proofs of this result are given in [10], one is based on the Addition Theorem, the Algebraic Yuzvinski Formula and their counterparts for the topological entropy, the second uses the Uniqueness Theorem. For another extension of Theorem 1.8(a) to the case of (totally disconnected) locally compact abelian groups, see [14]. We do not discuss here this extension as well as similar results from [37, 47], since this paper is limited to the discrete case; various definitions of algebraic entropy in the general case of locally compact abelian groups can be found in [37, 46, 47]. Let us mention, finally, another application of the Addition Theorem given in [8], connecting the algebraic entropy with the growth rate of abelian groups with respect to endomorphisms. For further details on this and other applications of the Addition Theorem and the Algebraic Yuzvinski Formula refer to [11, 13, 19, 26] (see also the survey [19]). 4 The paper is organized as follows. Section 2 contains first of all the proof of the existence of the limit in (1.1) defining the algebraic entropy h. Then, the basic properties of h are listed and verified (see Lemma 2.7 and Proposition 2.8); they are counterpart of the properties of ent proved in [16, 48], as well as of the known properties of the topological entropy. Moreover, basic examples are given, among them the Bernoulli shift. In Section 3 we consider various properties of the algebraic entropy of endomorphisms φ of torsionfree abelian groups G. We underline the preservation of the algebraic entropy under the extension of an endomorphism φ of G to the divisible hull of G (see Proposition 3.7). As examples, the algebraic entropy of the endomorphisms of Z and Q is computed (see Examples 3.1 and 3.11). The aim of Section 4 is to reduce the computation of the algebraic entropy to the case of appropriately small groups. We see in a first reduction that this means endomorphisms of countable abelian groups (see Lemma 4.6). Moreover, we consider the structure of Z[t]-module induced on an abelian group G by the action of its endomorphism φ, and we denote by Gφ the group G considered as a Z[t]-module under the action of φ. One can compute the algebraic entropy of φ as the supremum of the algebraic entropies of the restrictions of φ to the finitely generated Z[t]-submodules of Gφ (see Lemma 4.4). In particular, Proposition 4.7 reduces the proof of the Addition Theorem to the case when Gφ is a finitely generated Z[t]-module and G has finite rank. Section 5 is dedicated to the Addition Theorem. Its proof is exposed in several steps, which are partial reductions gradually restricting the class of groups. We start by showing ATh (G, φ, t(G)) (see Proposition 5.4). This allows us to focus on the case of torsion-free abelian groups. Using the properties established in the previous sections, we reduce to endomorphisms of finite-rank divisible torsion-free abelian groups, i.e., to endomorphisms φ : Qn → Qn for some n ∈ N+ . The next step (see Proposition 5.8) is to see that φ can be supposed injective (hence, also surjective). The ultimate case of automorphisms of Qn can be managed through the Algebraic Yuzvinski Formula (see Theorem 5.9). In Section 6 we prove the Uniqueness Theorem. We give a direct proof of this result, but we show also how it can be deduced from a theorem by Vámos on length functions (see Definition 6.1 below, and [35, 45]). The approach based on length functions is powerful and clarifies the role of the five axioms in the statement of the Uniqueness Theorem. Indeed, the first three axioms witness the fact that the algebraic entropy is a length function of the category ModZ[t] of all Z[t]-modules, while the fourth and the fifth are used as normalizations. More precisely, a length function of ModZ[t] is determined by its values on the cyclic modules of the form Z[t]/p, where p is a prime ideal of Z[t]. The “Bernoulli normalization axiom” gives the value of the algebraic entropy in the first case, while the “Yuzvinski axiom” in the second case. A different relation between algebraic entropy and length functions can be found in [40]. In the final Section 7 we consider the relation of the algebraic entropy to the Mahler measure and Lehmer Problem. We give the proof of Theorem 1.5, making use of the Addition Theorem. Moreover, we end the section and the paper by proving the Realization Theorem. The deduction of the Addition Theorem from the Algebraic Yuzvinski Formula was obtained already in [7]. But at that time no direct proof of the Algebraic Yuzvinski Formula was available. On the other hand, its validity for automorphisms of finite dimensional rational vector spaces could be deduced from its counterpart for the topological entropy and Theorem 1.8(b). As it was underlined in [7], “the value of the Addition Theorem would be much higher if a purely algebraic proof of the Algebraic Yuzvinski Formula would be available”. Indeed, we apply the Algebraic Yuzvinski Formula in the proof of the Addition Theorem and from these two results we deduce the Uniqueness Theorem and the Realization Theorem. As mentioned above, another important application is given in [10], where Theorem 1.8(a) is extended to a general Bridge Theorem for all the endomorphisms of arbitrary abelian groups, obtaining in this way also a completely new proof of Theorem 1.8(b) (the original proof makes a heavy use of convolutions). Finally, using the Bridge Theorem and the Uniqueness Theorem for the algebraic entropy, one can obtain also a Uniqueness Theorem for the topological entropy of the endomorphisms of compact abelian groups (see [10, Corollary 3.3]). 5 Notation and terminology We denote by Z, N, N+ , Q and R respectively the set of integers, the set of natural numbers, the set of positive integers, the set of rationals and the set of reals. Let R≥0 = {r ∈ R : r ≥ 0}. For m ∈ N+ , we use Z(m) for the finite cyclic group of order m. Let G be an abelian group. With a slight divergence with the standard use, we denote by [G]<ω the set of all non-empty finite subsets of G. If H is a subgroup of G, we indicate this by H ≤ G. For a subset X of G we denote by hXi the subgroup of G generated by X. The free rank of G is denoted by r(G). The subgroup of torsion elements of G L is t(G), while D(G) denotes the divisible hull of G. For a cardinal α we denote by G(α) the direct sum α G of α many copies of G. Moreover, End(G) is the ring of all endomorphisms of G. We denote by 0G and idG respectively the endomorphism of G which is identically 0 and the identity endomorphism of G. If G is torsion-free and φ ∈ End(G), we denote by φe : D(G) → D(G) the unique extension of φ to D(G). If G is an abelian group, φ ∈ End(G) and H is a φ-invariant subgroup of G, we denote by φH ∈ End(G/H) the endomorphism induced by φ on the quotient G/H. When there is no possibility of confusion, we write simply φ. If R is a ring, M is an R-module and r ∈ R, we denote by µr : M → M the group endomorphism of M defined by µr (x) = rx for every x ∈ M . To avoid confusion, we write also µM r , when more precision is necessary. 2 Basic properties of entropy Let G be an abelian group and φ ∈ End(G). For F ∈ [G]<ω , the φ-trajectory T (φ, F ) need not be a subgroup of G, so let V (φ, F ) = hφn (F ) : n ∈ Ni = hT (φ, F )i . This is the smallest φ-invariant subgroup of G containing F . For g ∈ G, we write simply V (φ, g) in place of V (φ, {g}). So, for F ∈ [G]<ω , one has X V (φ, F ) = V (φ, g). g∈F Definition 2.1. Let G be an abelian group and φ ∈ End(G). We say that G is finitely φ-generated by F ∈ [G]<ω if G = V (φ, F ). As a start, we prove that the limit in (1.1) defining the algebraic entropy exists. Lemma 2.2. Let G be an abelian group, φ ∈ End(G) and F ∈ [G]<ω . For every n ∈ N+ let cn = log |Tn (φ, F )|. (a) The sequence {cn }n∈N+ is subadditive, i.e., cn+m ≤ cn + cm for every n, m ∈ N+ . (b) The limit H(φ, F ) = limn→∞ cn n exists and H(φ, F ) = inf n∈N+ cn n . Proof. (a) By definition Tn+m (φ, F ) = F + φ(F ) + . . . + φn−1 (F ) + φn (F ) + . . . + φn+m−1 (F ) = Tn (φ, F ) + φn (Tm (φ, F )). Consequently, cn+m = log |Tn+m (φ, F )| ≤ log(|Tn (φ, F )| · |Tm (φ, F )|) = cn + cm . (b) By item (a) the sequence {cn }n∈N+ is subadditive. Then the sequence { cnn : n ∈ N+ } has limit and limn→∞ cnn = inf n∈N+ cnn by a folklore fact from Calculus, due to Fekete (see [22]). Remark 2.3. Let G be an abelian group and φ ∈ End(G). (a) The function H(φ, −) is non-decreasing, that is, H(φ, F ) ≤ H(φ, F ′ ) for every F, F ′ ∈ [G]<ω with F ⊆ F ′. 6 (b) By item (a), if F is a cofinal subfamily of [G]<ω with respect to inclusion, then h(φ) = sup{H(φ, F ) : F ∈ F }. In particular, it is possible to calculate h(φ) supposing without loss of generality that 0 ∈ F , that is, h(φ) = sup{H(φ, F ) : F ∈ [G]<ω , 0 ∈ F }. The definition of H(φ, F ) in (1.1) shows that the algebraic entropy H(φ, F ) of φ with respect to F ∈ [G]<ω measures the growth rate of the partial trajectories Tn (φ, F ) when they approximate the trajectory T (φ, F ). Our next comment concerns the case when T (φ, F ) = V (φ, F ) is a subgroup. This occurs for example when F is a finite subgroup of G. In such a case, it was proved in [16] that H(φ, F ) = log m, where m > 0 is a divisor of |F |. The number m can be found, without any computation of limits, as follows. Fact 2.4. Let G be an abelian group, φ ∈ End(G) and F is finite subgroup of G. First, we note that N = T (φ, F ) is a torsion subgroup of G. Moreover, with φ1 = φ ↾N , one has H(φ, F ) = H(φ1 , F ), i.e., the computation of H(φ, F ) can be carried out in the torsion φ-invariant subgroup N of G. The equality N = F + φ(N ) shows that N/φ(N ) is a quotient of the finite subgroup F , so |N/φ(N )| is a divisor of |F |. It was proved in [9] that H(φ, F ) = log |N/φ(N )|, provided φ is injective. This formula was stated without a proof and without asking φ to be injective by Yuzvinski in [49]. A first proof was provided in [19], where it was pointed out that the formula is wrong if φ is not injective (e.g., when φ = 0G and |F | > 1). Finally, in [9, Lemma 4.1] ker φ ∩ N was proved to be finite and the following more precise equality was obtained in the general case: H(φ, F ) = log T (φ, F ) − log | ker φ ∩ T (φ, F )|. φ(T (φ, F )) We consider now the two most natural examples. Example 2.5. If G is an abelian group, then h(0G ) = h(idG ) = 0. The equality h(0G ) = 0 is obvious. To show that also h(idG ) = 0, let F = {f1 , . . . , ft } be a finite subset of G. As Tn (idG , F ) = F + . . . + F for all n ∈ N+ , every x ∈ Tn (idG , F ) can be written {z } | n Pt Pt t as x = i=1 mi fi , for some mi ∈ N with i=1 mi = n. Clearly, (m1 , . . . , mt ) ∈ {0, 1, . . . , n} , so t |Tn (idG , F )| ≤ (n + 1) . Hence, H(idG , F ) = 0, and consequently h(idG ) = 0 by the arbitrariness of F ∈ [G]<ω . For G an abelian group and φ ∈ End(G), the hyperkernel of φ is [ ker φn . ker∞ φ = n∈N+ The subgroup ker∞ φ is φ-invariant and also invariant for inverse images. Hence, the induced endomorphism φ : G/ ker∞ φ → G/ ker∞ φ is injective. Proposition 2.6. Let G be an abelian group and φ ∈ End(G). Then h(φ ↾ker∞ φ ) = 0. Proof. Let F ∈ [G]<ω with F ⊆ ker∞ φ and assume without loss of generality that 0 ∈ F (see Remark 2.3(b)). There exists m ∈ N+ such that φm (F ) = 0. Consequently, Tn (φ, F ) = Tm (φ, F ) for every n ∈ N with n ≥ m. Hence, H(φ, F ) = 0, and we conclude that h(φ ↾ker∞ φ ) = 0 by the arbitrariness of F . In the next lemma we show that h is monotone under taking restrictions to invariant subgroups and under taking induced endomorphisms on quotients over invariant subgroups. Lemma 2.7. Let G be an abelian group, φ ∈ End(G) and H a φ-invariant subgroup of G. Then h(φ) ≥ max{h(φ ↾H ), h(φ)}. Proof. For every F ∈ [H]<ω , obviously H(φ ↾H , F ) = H(φ, F ), so H(φ ↾H , F ) ≤ h(φ). Hence, h(φ ↾H ) ≤ h(φ). Now assume that F ∈ [G/H]<ω and F = π(F0 ) for some F0 ∈ [G]<ω , where π : G → G/H is the canonical projection. Then π(Tn (φ, F0 )) = Tn (φ, F ) for every n ∈ N+ . Therefore, h(φ) ≥ H(φ, F0 ) ≥ H(φ, F ) and by the arbitrariness of F this proves h(φ) ≥ h(φ). 7 The next proposition collects the basic properties of h, which are also typical properties of the known entropy functions. Indeed, they are inspired by similar properties of the algebraic entropy ent (see [48] and [16]) and the topological entropy (see [2] and [44]). In the case of h they were proved in [36] for automorphisms, here we extend them for endomorphisms. We shall refer to them as, respectively, Invariance under conjugation, Logarithmic Law, Continuity for direct limits and weak Addition Theorem. Proposition 2.8. Let G be an abelian group and φ ∈ End(G). (a) If H is another abelian group, η ∈ End(H) and φ and η are conjugated, then H(φ, F ) = H(η, ξ(F )) for every F ∈ [G]<ω ; in particular, h(φ) = h(η). (b) For every k ∈ N+ , h(φk ) = kh(φ). If φ is an automorphism, then h(φk ) = |k|h(φ) for every k ∈ Z. (c) If G is a direct limit of φ-invariant subgroups {Gi : i ∈ I}, then h(φ) = supi∈I h(φ ↾Gi ). (d) If G = G1 × G2 , φ = φ1 × φ2 with φi ∈ End(Gi ) and Fi ∈ [Gi ]<ω , i = 1, 2, then H(φ, F1 × F2 ) = H(φ1 , F1 ) + H(φ2 , F2 ); consequently, h(φ1 × φ2 ) = h(φ1 ) + h(φ2 ) Proof. (a) For F ∈ [G]<ω and n ∈ N+ , Tn (η, ξ(F )) = ξ(F )+ξ(φ(F ))+. . .+ξ(φn−1 (F )), as ξφk = φk ξ for k = 1, 2, . . . , n − 1. Since ξ is an isomorphism, |Tn (φ, F )| = |Tn (η, ξ(F ))|, and so H(φ, F ) = H(η, ξ(F )). This proves that h(φ) = h(η). (b) Fix k ∈ N+ . First, we prove the inequality h(φk ) ≤ kh(φ). Let F ∈ [G]<ω , assuming without loss of generality that 0 ∈ F (see Remark 2.3(b)). Let n ∈ N+ , then Tn (φk , F ) ⊆ Tkn−k+1 (φ, F ) and so log |Tn (φk , F )| log |Tkn−k+1 (φ, F )| ≤ lim n→∞ n→∞ n n kn − k + 1 log |Tkn−k+1 (φ, F )| · lim = lim n→∞ n→∞ kn − k + 1 n log |Tkn−n+1 (φ, F )| = k lim = kH(φ, F ) ≤ kh(φ). n→∞ kn − k + 1 H(φk , F ) = lim Therefore, h(φk ) ≤ kh(φ). To check the inequality h(φk ) ≥ kh(φ), let F ∈ [G]<ω and n ∈ N+ . With F1 = Tk (φ, F ) one has Tn (φk , F1 ) = Tkn (φ, F ). Then 1 log |Tn (φk , F1 )| log |Tkn (φ, F )| 1 h(φk ) ≥ H(φk , F1 ) = lim = lim = H(φ, F ). n→∞ n→∞ k k kn kn Therefore, h(φk ) ≥ kh(φ). Now assume that φ is an automorphism. It suffices to prove that h(φ−1 ) = h(φ). Let F ∈ [G]<ω and n ∈ N+ . Then Tn (φ−1 , F ) = φ−n+1 (Tn (φ, F )); in particular, |Tn (φ−1 , F )| = |Tn (φ, F )|, as φ is an automorphism. This yields H(φ−1 , F ) = H(φ, F ), hence h(φ−1 ) = h(φ). (c) By Lemma 2.7, h(φ) ≥ h(φ ↾Gi ) for every i ∈ I and so h(φ) ≥ supi∈I h(φ ↾Gi ). To check the converse inequality, let F ∈ [G]<ω . Since G = lim{Gi : i ∈ I} and {Gi : i ∈ I} is a directed family, −→ there exists j ∈ I such that F ⊆ Gj . Then H(φ, F ) = H(φ ↾Gj , F ) ≤ h(φ ↾Gj ). This proves that h(φ) ≤ supi∈I h(φ ↾Gi ). (d) For every n ∈ N+ , Tn (φ, F1 × F2 ) = Tn (φ1 , F1 ) × Tn (φ2 , F2 ) Hence, H(φ, F1 × F2 ) = H(φ1 , F1 ) + H(φ2 , F2 ). (2.1) <ω Consequently, h(φ) ≥ h(φ1 )+h(φ2 ). Since every F ∈ [G] is contained in some F1 ×F2 , for Fi ∈ [Gi ]<ω , i = 1, 2, and so H(φ, F ) ≤ H(φ, F1 × F2 ). Therefore, (2.1) proves also that h(φ) ≤ h(φ1 ) + h(φ2 ). The following easy remark can be deduced directly either from item (a) or from item (b) of Proposition 2.8: if G is an abelian group and φ ∈ End(G), then h(−φ) = h(φ). The next is a direct consequence of Proposition 2.8(b). 8 (2.2) Corollary 2.9. Let G be an abelian group and φ ∈ End(G). Then: (a) h(φ) = 0 if and only if h(φk ) = 0 for some k ∈ N+ ; (b) h(φ) = ∞ if and only if h(φk ) = ∞ for some k ∈ N+ . The next somewhat technical consequence of Proposition 2.8(a) is frequently applied in the following sections. Let G be an abelian group, φ ∈ End(G) and H, K two φ-invariant subgroups of G. Consider φH ∈ End(G/H) and let π : G → G/H be the canonical projection. The subgroup π(K) of G/H is φH -invariant, and π(K) = K + H/H ∼ = K/H ∩ K. Let φ ↾K ∈ End(K/H ∩ K) be the induced endomorphism, then φH ↾π(K) is conjugated to φ ↾K , so Proposition 2.8(a) gives the equality h(φH ↾π(K) ) = h(φ ↾K ). (2.3) In the following example we compute the algebraic entropy of the Bernoulli shift. Example 2.10. For any abelian group K, h(βK ) = log |K|, with the usual convention that log |K| = ∞, if |K| is infinite. It is proved in [16] that h(βK ) = ent(βK ) = log |K| for every finite abelian group K. We verify now that h(βZ ) = ∞. Indeed, let G = Z(N) ; for every prime p, the subgroup pG of G is βZ -invariant, so βZ induces an endomorphism βZ : G/pG → G/pG. Since G/pG ∼ = Z(p)(N) , and βZ is conjugated to βZ(p) through this isomorphism, h(βZ ) = h(βZ(p) ) = log p by Proposition 2.8(a). Therefore, h(βZ ) ≥ log p for every prime p by Lemma 2.7, and so h(βZ ) = ∞. Assume that K is an infinite abelian group. If K is non-torsion, then K contains a subgroup C∼ = Z, so K (N) contains the βK -invariant subgroup C (N) isomorphic to Z(N) . Moreover, βK ↾C (N) = βC is conjugated to βZ . Hence, by Lemma 2.7, Proposition 2.8(a) and the previous part of this example, h(βK ) ≥ h(βC ) = h(βZ ) = ∞. If K is torsion, then K contains arbitrarily large finite subgroups H. Consequently, K (N) contains the βK -invariant subgroup H (N) . By Lemma 2.7 and the first part of this example, h(βK ) ≥ h(βH ) = log |H| for every H. So h(βK ) = ∞. In [3], extending the notion of Bernoulli shift, for every self-map λ : X → X of a non-empty set X, the generalized shift σλ of an arbitrary Cartesian power K X of an abelian group K was introduced by letting σλ ((xi )i∈X ) = (xλ(i) )i∈X for every (xi )i∈X ∈ K X . In case λ is finitely many-to-one, the subgroup K (X) is σλ -invariant, so one can consider also the generalized shift σλ : K (X) → K (X) . In [3] and [24], h(σλ ) was computed on direct sums and on direct products, respectively. Remark 2.11. There is a remarkable connection between entropy and recurrence in the spirit of Poincaré recurrence theorem. We do not pursue this topic in the present paper, here we only recall some recent results from [8]. Let G be an abelian group and φ ∈ End(G). An element x ∈ G is quasi-periodic if there exist n > m in N such that φn (x) = φm (x); φ is locally quasi-periodic if every x ∈ G is a quasi-periodic point of φ. Moreover, φ is quasi-periodic if there exist n > m in N such that φn (x) = φm (x) for every x ∈ G. If G is finitely φ-generated and φ is locally quasi-periodic, then φ is quasi-periodic. The set Q(G, φ) of all quasi-periodic points of φ in G is a φ-invariant subgroup of G containing ker∞ φ. It follows from Proposition 2.8(b) that either h(φ) = 0 or h(φ) = ∞ whenever φ is quasi-periodic, but one can prove more. According to [8], there exists a greatest φ-invariant subgroup P = P (G, φ) of G such that h(φ ↾P ) = 0. Moreover, P (G/P, φ̄) = 0 and P contains Q(G, φ) (so h(φ) = 0 in case φ is locally quasi-periodic). On the other hand, φ ∈ End(G) is called algebraically ergodic if Q(G, φ) = 0. Then φ is algebraically ergodic if and only if P is trivial. Therefore, φ ∈ End(G/P ) is algebraically ergodic and h(φ) = h(φ) (see [8]). 3 Entropy on torsion-free abelian groups Here we dedicate more attention to the torsion-free abelian groups. We start by computing the algebraic entropy of the endomorphisms of Z, for the counterpart for Q see Example 3.11. 9 Example 3.1. (a) For every non-zero k ∈ Z, µk ∈ End(Z) has h(µk ) = log |k|. As h(µk ) = h(µ−k ) by (2.2), we may assume without loss of generality that k ∈ N+ . For k = 1 the conclusion follows from Example 2.5. Assume that k > 1 and let F0 = {0, 1, . . . , k − 1} ∈ [Z]<ω and n ∈ N+ . Every m ∈ N with m < k n can be uniquely written in the form m = f0 + f1 k + . . . + fn−1 k n−1 with all fi ∈ F0 . Then Tn (µk , F0 ) = {m ∈ N : m < k n }, and so |Tn (µk , F0 )| = k n . Consequently H(µk , F0 ) = log k and this yields h(µk ) ≥ log k. To prove the converse inequality h(µk ) ≤ log k, fix m ∈ N+ and let Fm = {0, ±1, ±2, . . . , ±m} ∈ [Z]<ω and n ∈ N+ . Then |x| ≤ mk n for every x ∈ Tn (µk , Fm ). So |Tn (µk , Fm )| ≤ 3mk n , hence H(µk , Fm ) ≤ log k. Since each F ∈ [Z]<ω is contained in Fm for some m ∈ N+ , we obtain h(µk ) ≤ log k. (b) For n, k ∈ N+ and µk : Zn → Zn , h(µk ) = n log k. This follows from Proposition 2.8(d) and item (a). Item (a) of the above example shows a difference with the torsion case. In fact, for an abelian group G and φ ∈ End(G), φ is integral if there exists f (t) ∈ Z[t] \ {0} such that f (φ) = 0. According to [16, Lemma 2.2], if G is torsion and φ is integral, then ent(φ) = 0. On the other hand, for k > 1 the endomorphism µk : Z → Z in (a) of the above example is integral over Z (as µk (x) − kx = 0 for all x ∈ Z), nevertheless, h(µk ) = log k > 0. Example 3.2. Fix k ∈ Z and consider the automorphism φ : Z2 → Z2 defined by φ(x, y) = (x + ky, y) for all (x, y) ∈ Z2 . Then h(φ) = 0. Let m ∈ N+ and Fm = {0, ±1, ±2, . . . , ±m} × {0, ±1, ±2, . . . , ±m} ∈ [Z2 ]<ω . Every F ∈ [Z2 ]<ω is contained in Fm for some m ∈ N. Therefore, it suffices to show that H(φ, Fm ) = 0. One can prove by induction that, for every n ∈ N+ , Tn (φ, Fm ) is contained in a parallelogram with sides 2nm and nm(2 + nk − k), so |Tn (φ, Fm )| ≤ 2n2 m2 (2 + nk − k). Thus H(φ, Fm ) = 0 for every m ∈ N and so h(φ) = 0. Next we give some properties of the algebraic entropy for endomorphisms φ of (finitely φ-generated) abelian groups. Lemma 3.3. Let G be an abelian group and φ ∈ End(G). If V (φ, g) has infinite rank for some g ∈ G, then V (φ, g) is torsion-free and h(φ ↾V (φ,g) ) = h(φ) = h(φ) = ∞, where φ ∈ End(G/t(G)) is the induced endomorphism. Proof. Let H := V (φ, g). To prove that H is torsion-free consider the canonical projection π : H → H/t(H), where H/t(H) = π(V (φ, g)) = V (φ, π(g)) is torsion-free and D has infinite D m E E rank. Hence, Lm−1 k φ (π(g)) ∩Tm (φ, hπ(g)i) = 0 for every m ∈ N+ , so Tm (φ, hπ(g)i) = k=0 φ (π(g)) and π(V (φ, g)) = D k E L ∼ φ (π(g)) = Z(N) . Suppose that x ∈ H is torsion, then π(x) is torsion as well, so π(x) = 0 k∈N Pm Pm i i as H/t(H) is torsion-free. If x = i=0 ki φ (g), then π(x) = i=0 ki φ (π(g)) = 0. This entails k0 = . . . = km = 0, so x = 0. Hence, t(H) = 0, and so H is torsion-free. Since φ ↾H is conjugated to βZ , by Proposition 2.8(a) and Example 2.10 we conclude that h(φ ↾H ) = h(βZ ) = ∞. Therefore, h(φ) = ∞ and h(φ) = ∞ by Lemma 2.7. The following are consequences of Lemma 3.3. Corollary 3.4. Let G be a torsion-free abelian group and φ ∈ End(G). (a) If G is finitely φ-generated, then G has finite rank if and only if h(φ) < ∞. (b) If h(φ ↾V (φ,g) ) = ∞ for some g ∈ G, then h(φ ↾V (φ,z) ) = ∞ for every z ∈ V (φ, g) \ {0}. e < ∞, and so h(φ) ≤ h(φ) e <∞ Proof. (a) If r(G) = n is finite, then D(G) ∼ = Qn . Theorem 1.2 gives h(φ) by Lemma 2.7. Now assume that h(φ) < ∞. Since G is finitely φ-generated, then G is a sum of φ-invariant subgroups of the form V (φ, gi ) for finitely many gi ∈ G. Lemma 3.3 implies that all r(V (φ, gi )) are finite, hence r(G) is finite as well. (b) By item (a), h(φ ↾V (φ,g) ) = ∞ implies r(V (φ, g)) infinite. For z ∈ V (φ, g) \ {0}, it is easy to see that r(V (φ, z)) is infinite as well, and so h(φ ↾V (φ,z) ) = ∞ by Lemma 3.3. 10 By Corollary 3.4(a), if G is a torsion-free abelian group, φ ∈ End(G) and g ∈ G, then h(φ ↾V (φ,g) ) = ∞ if and only if r(V (φ, g)) is infinite. Moreover, in view of Corollary 3.4(b), if h(φ ↾V (φ,g) ) = ∞, then for every φ-invariant subgroup H of V (φ, g) one has the following striking dichotomy: either H = 0 or h(φ ↾H ) = ∞. The next is a consequence of Lemma 3.3 and Corollary 3.4 that completes Lemma 3.3 from the point of view of the Addition Theorem. Lemma 3.5. Let G be an abelian group and φ ∈ End(G) such that V (φ, g) has infinite rank for some g ∈ G. Then h(φ) = ∞ and ATh (G, φ, H) for every subgroup H of G. Proof. As V (φ, g) has infinite rank, h(φ) = ∞ and V (φ, g) is torsion-free by Lemma 3.3. Let H be a subgroup of G and suppose that V (φ, g) ∩ H 6= 0. As V (φ, g) is torsion-free, we can apply Corollary 3.4(b) to φ ↾V (φ,g) to deduce that h(φ ↾V (φ,g)∩H ) = ∞. By Lemma 2.7, h(φ ↾H ) = ∞ as well. Then h(φ) = h(φ ↾H ) = ∞ and in particular ATh (G, φ, H). Assume now that V (φ, g)∩H = 0. Let π : G → G/H be the canonical projection. Therefore, V (φ, g) projects injectively in the quotient G/H and so π(V (φ, g)) = V (φ, π(g)) has infinite rank. So h(φ) = ∞ by Lemma 3.3. Hence, h(φ) = h(φ) = ∞ by Lemma 2.7 and in particular ATh (G, φ, H). A subgroup H of an abelian group G is essential if and only if for every x ∈ G \ {0} there exists k ∈ Z such that kx ∈ H \ {0}. In case G is torsion-free, H is an essential subgroup of G if and only if G/H is torsion. Corollary 3.6. Let G be a torsion-free abelian group, φ ∈ End(G) and let H be an essential φ-invariant subgroup of G. If h(φ) < ∞, then h(φ) = 0. Proof. Since G/H is torsion, it suffices to see that h(φ ↾(G/H)[p] ) = 0 for every prime p, by [16, Proposition 1.18]. To this end we have to show that every x ∈ (G/H)[p] has finite trajectory under φ. By Lemma 3.3, V (φ, x) has finite rank, say n ∈ N. Then there exist ki ∈ Z, i = 0, . . . , n, such that P n i i=0 ki φ (x) = 0. Since G is torsion-free, we can assume without loss of generality that at least one of P i these coefficient is not divisible by p. Now, projecting in G/H, we conclude that ni=0 ki φ (x) = 0 is a non-trivial linear combination in (G/H)[p]. Hence, x ∈ (G/H)[p] has finite trajectory under φ. The next result reduces the computation of the algebraic entropy for endomorphisms of torsion-free abelian groups to the case of endomorphisms of divisible torsion-free abelian groups. Item (b) was announced without proof by Yuzvinski in [50]. Proposition 3.7. Let G be a torsion-free abelian group and φ ∈ End(G). Then: e mF ) = H(φ, e F ); (a) if F ∈ [D(G)]<ω and m ∈ N+ satisfy mF ⊆ G, then H(φ, mF ) = H(φ, e (b) h(φ) = h(φ). e Hence, Proposition 2.8(a) yields H(φ, mF ) = Proof. (a) The automorphism µm of D(G) commutes with φ. e e H(φ, mF ) = H(φ, F ). e by Lemma 2.7. By the arbitrariness of F in item (a), we have also (b) Obviously, h(φ) ≤ h(φ) e h(φ) ≥ h(φ). Proposition 3.7 may fail if the abelian group G is not torsion-free. Indeed, for G = Z(2)(N) and βZ(2) ∈ End(G) one has h(βZ(2) ) = ent(βZ(2) ) = log 2. On the other hand, for D(G) = Z(2∞ )(N) the endomorphism βZ(2∞ ) extends βZ(2) and has h(βZ(2∞ ) ) = ent(βZ(2∞ ) ) = ∞ (see Example 2.10). The properties from the next lemma, frequently used in the sequel, are well known and easy to prove. Recall that a subgroup H of an abelian group G is pure in G if H ∩ mG = mH for every m ∈ Z. The purification H∗ of H in G is the smallest pure subgroup of G containing H. Lemma 3.8. Let G be an abelian group and H a subgroup of G. 11 (a) If H is divisible, then H is pure. (b) If G is divisible, then H is divisible if and only if H is pure. (c) If G is torsion-free, then H is pure if and only if G/H is torsion-free. Now we see that in the torsion-free case it suffices to compute the algebraic entropy in an essential invariant subgroup. As a by-product, this proves ATh (G, φ, H) for a torsion-free abelian group G, φ ∈ End(G) and an essential φ-invariant subgroup H of G. Corollary 3.9. Let G be a torsion-free abelian group, φ ∈ End(G) and H a φ-invariant subgroup of G. (a) The purification H∗ of H in G is φ-invariant and h(φ ↾H ) = h(φ ↾H∗ ). (b) If H is essential in G, then h(φ) = h(φ ↾H ). Consequently, ATh (G, φ, H). Proof. Even if (b) follows from (a) with H∗ = G, we shall prove first (b). Consider the common divisible hull D of H and G. Then φe : D → D is the (unique) common extension of φ and φ ↾H . Proposition 3.7 e = h(φ ↾H ). For the second assertion note that applies to the pairs D, G and D, H, giving h(φ) = h(φ) this equality implies ATh (G, φ, H) in case h(φ) = ∞. If h(φ) < ∞, then h(φ) = 0 by Corollary 3.6 and so ATh (G, φ, H) follows again. Now we can deduce (a) from (b). The verification of the first assertion is immediate (see for example [41, Lemma 3.3(a)]). The second assertion follows from (b) applied to H∗ , φ ↾H∗ ∈ End(H∗ ) and the φ-invariant subgroup H of H∗ . The final part of item (b) of this corollary can be stated equivalently as ATh (G, φ, H) whenever G is torsion-free and G/H is torsion. The next corollary is another consequence of Proposition 3.7 and Corollary 3.9. It shows that the verification of the Addition Theorem for torsion-free abelian groups and their pure subgroups can be reduced to the case of divisible ones. Corollary 3.10. Let G be a torsion-free abelian group, φ ∈ End(G) and H a pure φ-invariant subgroup of G. Considering D(H) as a subgroup of D(G), one has e h(φ ↾H ) = h(φe ↾D(H) ) and h(φ) = h(φ), e h(φ) = h(φ), where φ ∈ End(G/H) and φe ∈ End(D(G)/D(H)). In particular, e D(H)). ATh (G, φ, H) ⇔ ATh (D(G), φ, (3.1) e and h(φ ↾H ) = h(φe ↾D(H) ). h(φ) = h(φ) (3.2) Proof. Since the purification H∗ of H in D(G) is divisible in view of Lemma 3.8(b), H∗ = D(H) and H = D(H) ∩ G, by the purity of H in G. By Proposition 3.7, Let π : D(G) → D(G)/D(H) be the canonical projection. Then π(G) is essential in D(G)/D(H) and e = h(φe ↾π(G) ) by Corollary 3.9(b). Since G/H ∼ h(φ) = π(G), and φ is conjugated to φe ↾π(G) by this e The conclusion follows isomorphism, h(φ) = h(φe ↾π(G) ) by Proposition 2.8(a). Hence, h(φ) = h(φ). from this equality and (3.2). The validity of the right-hand-side of (3.1), i.e., ATh (D, ψ, K), for a finite-rank divisible torsion-free abelian group D, ψ ∈ End(D) and a pure ψ-invariant subgroup K of D, is established in Theorem 5.9 below. We conclude the section computing the algebraic entropy of the endomorphisms of Q. Example 3.11. (a) Let φ ∈ End(Q). Then there exists r ∈ Q such that φ = µr . If r = 0, ±1, then h(φ) = 0 by Example 2.5 and (2.2). By (2.2) we can assume that r > 0, and applying Proposition 2.8(b) we may assume also that r > 1. Let r = ab , where (a, b) = 1. We prove that h(φ) = log a. 12 To prove that h(φ) ≥ log a, take F0 = {0, 1, . . . , a − 1} and let n ∈ N+ . It is easy to check n−1 that all sums f0 + f1 ab + . . . + fn−1 abn−1 , with fi ∈ F0 , are pairwise distinct. This shows that |Tn (φ, F0 )| = an , and so H(φ, F0 ) = log a, witnessing h(φ) ≥ log a. To prove the inequality h(φ) ≤ log a, note that the subgroup H of Q formed by all fractions having as denominators powers of b (i.e., the subring of Q generated by 1b ) is essential and φinvariant. Hence, h(φ) = h(φ ↾H ) by Corollary 3.9(b). Now for any m ∈ N+ consider Fm =  r ± bm : 0 ≤ r ≤ mbm . So Fm = b1mh ∩ [−m, m],i where the interval [−m, m] is taken in H. Let us observe that φk (Fm ) ⊆ 1 bm+k k k ∩ −m abk , m abk , consequently Tn (φ, Fm ) ⊆ M . . + M} | + .{z n where M = 1 bm+n−1 i h n−1 n−1 n−1 ∩ −m abn−1 , m abn−1 . Therefore, |Tn (φ, Fm )| ≤ 2nbm+n−1 m abn−1 . Hence, log |Tn (φ, Fm )| ≤ log 2n + m log b + (n − 1) log a. Thus H(φ, Fm ) ≤ log a. Since each F ∈ [H]<ω is contained in Fm for some m ∈ N+ , this proves that h(φ) = h(φ ↾H ) ≤ log a. (b) For n ∈ N+ and r = ab ∈ Q with a > b > 0, consider µr : Qn → Qn . Applying Proposition 2.8(d) and item (a) we conclude that h(µr ) = n log a. (c) Let G be a torsion-free abelian group and consider µk : G → G for some k ∈ N with k > 1. Then ( r(G) log k if r(G) is finite, h(µk ) = ∞ if r(G) is infinite. According to Proposition 3.7, we can assume without loss of generality that G is divisible. Let Q(α) α = r(G). Then G ∼ : Q(α) → Q(α) . If α ∈ N, then = Q(α) , with µk conjugated to µk (α) h(µk ) = h(µQ ) = α log k, by item (b) and Proposition 2.8(a). If α is infinite, by Lemma 2.7 and k in view of the finite case, h(µk ) > n log k for every n ∈ N. Hence, h(µk ) = ∞. In item (a) of the above example we have computed explicitly the algebraic entropy of µr : Q → Q, with r = ab > 1 and (a, b) = 1. One can also apply the Algebraic Yuzvinski Formula; indeed, the unique eigenvalue of µr is ab > 1, and so the Algebraic Yuzvinski Formula 1.2 gives h(µr ) = log a. This formula b was proved by Abramov in [1] for the topological entropy of the automorphisms of Q. 4 Entropy of finitely generated flows Consider the category AbGrp of all abelian groups and their homomorphisms. One can introduce the category FlowAbGrp of flows of AbGrp with objects the pairs (G, φ) with G ∈ AbGrp and φ ∈ End(G) (named algebraic flows in [12]). A morphism u : (G, φ) → (H, ψ) in FlowAbGrp between two algebraic flows (G, φ) and (H, ψ) is given by a homomorphism u : G → H such that the diagram φ G −−−−→   uy G  u y (4.1) H −−−−→ H ψ in AbGrp commutes. Two algebraic flows (G, φ) and (H, ψ) are isomorphic in FlowAbGrp precisely when the homomorphism u : G → H in (4.1) is an isomorphism in AbGrp. If G is an abelian group and φ ∈ End(G), then G admits a structure of Z[t]-module with multiplication determined by tx = φ(x) for every x ∈ G; we denote by Gφ the abelian group G seen as a Z[t]-module under the action of φ. One has an isomorphism of categories FlowAbGrp ∼ = ModZ[t] , 13 (4.2) given by the functor F : FlowAbGrp → ModZ[t] , associating to an algebraic flow (G, φ) the Z[t]module Gφ (see [12, Theorem 3.2]). In particular, for a morphism u : (G, φ) → (H, ψ) in FlowAbGrp , F (u) = u : Gφ → Hψ is a homomorphism of Z[t]-modules. In the opposite direction consider the functor F ′ : ModZ[t] → FlowAbGrp , which associates to M ∈ ModZ[t] the algebraic flow (M, µt ), where we denote still by M the underling abelian group of the module M . If u : M → N is a homomorphism in ModZ[t] , then F ′ (u) = u : (M, µt ) → (N, µt ) is a morphism in FlowAbGrp . Remark 4.1. By the isomorphism (4.2), every function f : FlowAbGrp → R≥0 ∪ {∞} defined on endomorphisms of abelian groups can be viewed as a function f : ModZ[t] → R≥0 ∪ {∞} by letting f (M ) = f (M, µt ) = f (µt ). In particular, this holds for the algebraic entropy, so we can consider h : ModZ[t] → R≥0 ∪ {∞}, letting h(Gφ ) = h(φ) for every Gφ ∈ ModZ[t] . Definition 4.2 (see Definition 2.1). Let (G, φ) be an algebraic flow. We say that (G, φ) is a finitely generated flow if Gφ is a finitely generated Z[t]-module (i.e., G is finitely φ-generated). Clearly, the supporting group of a finitely generated flow is countable. Our aim is to reduce the computation of algebraic entropy to the case of finitely generated flows. We start from basic properties. Lemma 4.3. Let G be an abelian group, φ ∈ End(G) and assume that G is finitely φ-generated. (a) If H is a φ-invariant subgroup of G, then H is finitely φ ↾H -generated and G/H is finitely φgenerated. (b) There exists m ∈ N+ such that m · t(G) = 0; so there exists a torsion-free subgroup K of G such that G ∼ = K × t(G). Proof. (a) The first assertion follows from the fact that the ring Z[t] is Noetherian, the second one is obvious. (b) By (a) t(G) is finitely generated as a Z[t]-module, that is, t(G) = V (φ, F ′ ) for some F ′ ∈ [t(G)]<ω . Since F ′ is finite, there exists m ∈ N+ such that mF ′ = 0. Then m · t(G) = 0. The second assertion follows from a theorem of Kulikov (see [23, Section 27.5]). For an abelian group G and φ ∈ End(G), let F(G, φ) := {V (φ, F ) : F ∈ [G]<ω } be the family of all finitely φ-generated subgroups of G. All these subgroups are clearly φ-invariant. Lemma 4.4. Let G be an abelian group and φ ∈ End(G). Then G = lim F(G, φ), and so −→ h(φ) = sup{h(φ ↾N ) : N ∈ F(G, φ)}. (4.3) Proof. The family F(G, φ) is a direct system, as N1 + N2 ∈ F(G, φ) for N1 , N2 ∈ F(G, φ). That h(φ) = sup{h(φ ↾N ) : N ∈ F(G, φ)} follows from Proposition 2.8(c). Since h is defined “locally”, Lemma 4.4 permits to reduce the computation of the algebraic entropy to finitely generated flows. We see now that for every algebraic flow (G, φ) there exists a countable φ-invariant subgroup S of G such that h(φ) = h(φ ↾S ). Definition 4.5. Let G be an abelian group and φ ∈ End(G). An entropy support of (G, φ) is a countable φ-invariant subgroup S of G such that h(φ ↾S ) = h(φ). Clearly, every countable φ-invariant subgroup of G containing an entropy support of (G, φ) has the same property. This means that such a subgroup is not uniquely determined. The family S(G, φ) of all entropy supports of (G, φ) is always non-empty: 14 Lemma 4.6. Let G be an abelian group and φ ∈ End(G). Then there exists an entropy support of (G, φ). <ω Proof. such that h(φ) = supn∈N H(φ, Fn ). Then P By (4.3), there exists a subfamily {Fn }n∈N ⊆ [G] S = n∈N V (φ, Fn ) is a countable φ-invariant subgroup of G such that h(φ) = sup H(φ, Fn ) = sup H(φ ↾S , Fn ) = h(φ ↾S ). n∈N n∈N Hence, S ∈ S(G, φ). The next proposition reduces the proof of the Addition Theorem to the case of finitely φ-generated abelian groups of finite rank. Proposition 4.7. Let G be an abelian group, φ ∈ End(G) and H a φ-invariant subgroup of G. Denote by π : G → G/H the canonical projection. Then: (a) F(H, φ ↾H ) = {L ∩ H : L ∈ F(G, φ)} and F(G/H, φ) = {π(L) : L ∈ F(G, φ)}; (b) there exists a chain {Ln }n∈N in F(G, φ) such that h(φ) = lim h(φ ↾Ln ), h(φ ↾H ) = lim h(φ ↾Ln ∩H ) and h(φ) = lim h(φ ↾π(Ln ) ); n→∞ n→∞ n→∞ (4.4) (c) if ATh (N, φ, N ∩ H) for all N ∈ F(G, φ), then ATh (G, φ, H); (d) if ATh (N, φ, N ∩ H) for all N ∈ F(G, φ) of finite rank, then ATh (G, φ, H). Proof. (a) The first equality follows from Lemma 4.3(a) and the second is clear. (b) By Lemma 4.6, there exist S ∈ S(G, φ), S1 ∈ S(H, φ ↾H ) and S2 ∈ S(G/H, φ). We can assume without loss of generality that S ⊇ S1 and π(S) ⊇ S2 . Then π(S) ∈ S(G/H, φ). Moreover, K := ker π ↾S = S ∩ H ⊇ S1 , K ∈ S(H, φ ↾H ), and K is a φ-invariant subgroup of S such that S/K ∼ = π(S). Let φ ↾S ∈ End(S/K), which is conjugated to φ ↾π(S) . By hypothesis and by Proposition 2.8(a), (4.5) h(φ) = h(φ ↾S ), h(φ ↾H ) = h(φ ↾K ) and h(φ) = h(φ ↾π(S) ) = h(φ ↾S ). Let S = {gn : n ∈ N}, and for every n ∈ N let Fn = {g0 , . . . , gn }. Then S is increasing union of the subsets Fn and consequently of the subgroups Ln = V (φ, Fn ), n ∈ N. For every F ∈ [S]<ω there exists n ∈ N such that F ⊆ Fn , hence V (φ, F ) ⊆ Ln and this shows that the countable chain {Ln }n∈N is cofinal in F(S, φ). Since Ln ∩ K = Ln ∩ H for every n ∈ N, it follows from (a) that {Ln ∩ H}n∈N is a countable cofinal chain in F(K, φ ↾K ); moreover, {π(Ln )}n∈N is a countable cofinal chain in F(π(S), φ ↾π(S) ). By the cofinality of {Ln }n∈N in F(S, φ), and by Lemma 4.4, one has h(φ ↾S ) = supn∈N h(φ ↾Ln ). Since {h(φ ↾Ln ) : n ∈ N} is a non-decreasing sequence, this supremum becomes a limit h(φ ↾S ) = limn→∞ h(φ ↾Ln ). Analogously, h(φ ↾K ) = limn→∞ h(φ ↾Ln ∩K ) and h(φ ↾π(S) ) = limn→∞ h(φ ↾π(Ln) ). Now the required equalities follow from (4.5). (c) According to the hypothesis, for every N ∈ F(G, φ), h(φ ↾N ) = h(φ ↾N ∩H ) + h(φ ↾N ), where φ ↾N ∈ End(N/(N ∩ H)) is the induced endomorphism. In view of (2.3), h(φ ↾N ) = h(φ ↾N/(N ∩H) ). (4.6) By item (b), there exists a chain {Ln }n∈N in F(G, φ) with (4.4). Moreover, (4.6) (applied to N = Ln ) entails h(φ) = lim h(φ ↾π(Ln) ) = lim h(φ ↾Ln ). n→∞ n→∞ As Ln ∈ F(G, φ), one has h(φ) = lim h(φ ↾Ln ) = lim h(φ ↾Ln∩H ) + lim h(φ ↾Ln ) = h(φ ↾H ) + h(φ), n→∞ n→∞ n→∞ that is, ATh (G, φ, H). (d) If r(V (φ, g)) is infinite for some g ∈ G, then ATh (G, φ, H)) by Lemma 3.5. Hence, we can assume that r(V (φ, g)) is finite for all g ∈ G. Then r(N ) is finite for all N ∈ F(G, φ). Hence, our hypothesis entails ATh (N, φ, N ∩ H)) for all N ∈ F(G, φ). Now (c) yields ATh (G, φ, H). 15 5 The Addition Theorem The aim of this section is to give a complete proof of the Addition Theorem. 5.1 Skew products Let K and H be abelian groups, and let φ1 ∈ End(K) and φ2 ∈ End(H). The direct product π = φ1 × φ2 : K × H → K × H is defined by π(x, y) = (φ1 (x), φ2 (y)) for every pair (x, y) ∈ K × H. For a homomorphism s : K → H, the skew product of φ1 and φ2 via s is φ ∈ End(K × H) defined by φ(x, y) = (φ1 (x), φ2 (y) + s(x)) for every (x, y) ∈ K × H. We say that the homomorphism s is associated to the skew product φ. When s = 0 one obtains the usual direct product endomorphism φ = π = φ1 × φ2 . Identifying H with the φ-invariant subgroup 0 × H of K × H, the endomorphism induced by φ on K∼ = (K ×H)/H is precisely φ1 . Let us see that the skew products arise precisely in such a circumstance. Remark 5.1. If G is an abelian group and φ ∈ End(G), suppose to have a φ-invariant subgroup H of G that splits as a direct summand, that is G = K × H for some subgroup K of G. Let us see that φ is a skew product. Indeed, let ι : G/H → K be the natural isomorphism and let φ ∈ End(G/H). Denote by φ1 : K → K the endomorphism φ1 = ιφι−1 of K, and let φ2 = φ ↾H . It follows from the definition of φ1 that for every x ∈ K there exists an element sφ (x) ∈ H such that φ(x, 0) − (φ1 (x), 0) = (0, sφ (x)). The map sφ : K → H is a homomorphism with φ(x, 0) = (φ1 (x), sφ (x)) for every x ∈ K. Hence, φ(x, y) = (φ1 (x), φ2 (y) + sφ (x)) for every (x, y) ∈ G = K × H. Therefore, φ is the skew product of φ1 and φ2 via sφ . As the next example shows, a natural instance to this effect are the fully invariant subgroups. Example 5.2. If G is a abelian group and φ ∈ End(G), then t(G) is fully invariant, so necessarily φ-invariant. According to Remark 5.1, φ is a skew product when t(G) splits in G, that is, G = K × t(G) where K is a torsion-free subgroup of G. In the sequel, for a skew product φ : G = K × H → K × H, we denote by φ1 : K → K the endomorphism of K conjugated to φ, and we let φ2 = φ ↾H . We refer to πφ = φ1 × φ2 as the direct product associated to the skew product φ. We can extend to G = K × H the homomorphism sφ : K → H associated to the skew product, defining it to be 0 on H. This allows us to consider sφ ∈ End(G × H) and to speak of the composition s2φ = 0, as well as φ = πφ + sφ in the ring End(G). In other words, the difference sφ = φ − πφ measures how much the skew product φ fails to coincide with its associated direct product πφ . Proposition 5.3. Let G be an abelian group and φ ∈ End(G). Assume that G = K × T for some subgroups K and T of G, with T torsion and φ-invariant, and suppose that φ is a skew product such that sφ (K) is finite. Then: (a) for every n ∈ N+ we have Tn (πφ , F1 × F2 ) = Tn (φ, F1 × F2 ) for every F1 ∈ [K]<ω and F2 ∈ [T ]<ω with F2 a subgroup of T containing sφ (K); (b) h(φ) = h(πφ ), consequently ATh (G, φ, T ). Proof. (a) We have πφn (F1 × F2 ) = φn1 (F1 ) × φn2 (F2 ) and so Tn (πφ , F1 × F2 ) = Tn (φ1 , F1 ) × Tn (φ2 , F2 ) for every n ∈ N+ . One can prove by induction that, for every x ∈ K and every n ∈ N+ , φn (x, 0) = (φn1 (x), φ2n−1 (sφ (x)) + φ2n−2 (sφ (φ1 (x))) + . . . + φ2 (sφ (φ1n−2 (x))) + sφ (φ1n−1 (x))). Since sφ (K) ⊆ F2 , we conclude that φn (x, 0) ∈ (φn1 (x), 0) + (0 × (φ2n−1 (F2 ) + φ2n−2 (F2 ) + . . . + φ2 (F2 ) + F2 )) = (φn1 (x), 0) + (0 × Tn (φ2 , F2 )); as 0 × Tn (φ2 , F2 ) = Tn (φ, 0 × F2 ) is a subgroup of G, we deduce that φn (x, 0) ∈ (φn1 (x), 0) + (0 × Tn (φ2 , F2 )) and (φn1 (x), 0) ∈ φn (x, 0) + Tn (φ, 0 × F2 ). 16 (5.1) Fix m ∈ N and an m-tuple a0 , a1 , . . . , am−1 ∈ F1 . Applying the first and the second part of (5.1) to an for n = 0, 1, . . . , m − 1, we get respectively m−1 X φn (an , 0) ∈ n=0 and m−1 X (φn1 (an ), 0) ∈ n=0 m−1 X (φn1 (an ), 0) + (0 × Tm (φ2 , F2 )) ⊆ Tm (φ1 , F1 ) × Tm (φ2 , F2 ) (5.2) φn (an , 0) + Tm (φ, 0 × F2 ) ⊆ Tm (φ, F1 × 0) + Tm (φ, 0 × F2 ). (5.3) n=0 m−1 X n=0 In other words, (5.2) and (5.3) yield Tm (φ, F1 × 0) ⊆ Tm (φ1 , F1 ) × Tm (φ2 , F2 ) and Tm (φ1 , F1 ) × 0 ⊆ Tm (φ, F1 × 0) + Tm (φ, 0 × F2 ). (5.4) As 0 × Tm (φ2 , F2 ) = Tm (φ, 0 × F2 ) is a subgroup of G, the two parts of (5.4) give respectively Tm (φ, F1 × F2 ) = Tm (φ, F1 × 0) + Tm (φ, 0 × F2 ) ⊆ Tm (φ1 , F1 ) × Tm (φ2 , F2 ) = Tm (πφ , F1 × F2 ) and Tm (πφ , F1 × F2 ) = Tm (φ1 , F1 ) × Tm (φ2 , F2 ) ⊆ Tm (φ, F1 × 0) + Tm (φ, 0 × F2 ) = Tm (φ, F1 × F2 ). These two inclusions prove the required equality Tn (πφ , F1 × F2 ) = Tn (φ, F1 × F2 ). (b) Let F ∈ [G]<ω . Then F ⊆ F1 × F2 , for some F1 ∈ [K]<ω and F2 ∈ [T ]<ω . By Remark 2.3(b), we can assume without loss of generality that (0, 0) ∈ F1 × F2 and that F2 is a subgroup of T with F2 ⊇ sφ (K). The conclusion follows from item (a) and Remark 2.3(b). To prove the second assertion of (b), consider φ ∈ End(G/T ). By Proposition 2.8(d), h(πφ ) = h(φ1 ) + h(φ2 ). Moreover, by definition, φ2 = φ ↾T and φ1 is conjugated to φ, so h(φ) = h(φ1 ) by Proposition 2.8(a). Now we show that the Addition Theorem holds with respect to the torsion subgroup. Proposition 5.4. Let G be an abelian group and φ ∈ End(G). Then ATh (G, φ, t(G)). Proof. By Proposition 4.7(d), we can assume that r(G) is finite and G is finitely φ-generated. By Lemma 4.3(b) there exists m ∈ N+ such that m · t(G) = 0 and there exists a torsion-free subgroup K of G such that G ∼ = K × t(G). Since t(G) is a φ-invariant subgroup of G that splits, by Remark 5.1 this gives rise to a skew product, that is, there exists a homomorphism sφ : K → t(G) such that φ(x, y) = (φ1 (x), φ2 (y) + sφ (x)) for every (x, y) ∈ G; moreover, φ1 ∈ End(K) is conjugated to φ ∈ End(G/t(G)) by the isomorphism K ∼ = G/t(G), and φ2 = φ ↾t(G) . To show that sφ (K) is finite, we notice first that K/mK is finite by [4, Theorem 0.1], since K is torsion-free of finite rank. As sφ (mK) = msφ (K) ⊆ mt(G) = 0, sφ factorizes through the canonical projection π : K → K/mK, i.e., there exists a homomorphism ψ : K/mK → t(G) such that sφ = ψ ◦ π. Therefore, sφ (K) = ψ(K/mK) is finite. Now Proposition 5.3 applies and gives ATh (G, φ, t(G)). 5.2 Addition Theorem with respect to two invariant subgroups In the sequel ∧ stays for conjunction. Proposition 5.5. Let G be an abelian group, φ ∈ End(G) and H, K two φ-invariant subgroups of G. Then ATh (G, φ, K) ∧ ATh (H, φ ↾H , H ∩ K) ∧ ATh (K, φ ↾K , H ∩ K)∧ ∧ ATh (G/H, φH , (H + K)/H) ∧ ATh (G/K, φK , (H + K)/K) =⇒ ATh (G, φ, H). 17 Proof. The situation is described by the following diagrams involving the triples (G, φ, H) and (G/K, φK , (H+ K)/K). H  φ↾H / H  (H + K)/K  φK ↾(H+K)/K / (H + K)/K   G φ  /G  G/K φK  / G/K  G/H φH  / G/H  (G/K)/((H + K)/K) φK  / (G/K)/((H + K)/K) Our hypotheses imply that: (i) h(φ) = h(φ ↾K ) + h(φK ); (ii) h(φ ↾H ) = h(φ ↾H∩K ) + h(φ ↾H ); (iii) h(φ ↾K ) = h(φ ↾H∩K ) + h(φ ↾K ); (iv) h(φH ) = h(φH ↾(H+K)/H ) + h(φH ); (v) h(φK ) = h(φK ↾(H+K)/K ) + h(φK ). The composition of the isomorphisms (G/K)/((H + K)/K) ∼ = G/(H + K) ∼ = (G/H)/((H + K)/H) commutes with φK : (G/K)/((H+K)/K) → (G/K)/((H+K)/K) and φH : (G/H)/((H+K)/H) → (G/H)/((H+K)/H), i.e., φK and φH are conjugated. So Proposition 2.8(a) yields h(φH ) = h(φK ), (5.5) h(φ ↾H ) = h(φK ↾H+K/K ) and h(φ ↾K ) = h(φH ↾H+K/H ). (5.6) Moreover, by (2.3), we have From (i), (iii), (v), (5.5), (5.6), (ii) and (iv), we deduce h(φ) = h(φ ↾K ) + h(φK ) = (h(φ ↾H∩K ) + h(φ ↾K )) + (h(φK ↾(H+K)/K ) + h(φK )) = h(φ ↾H∩K ) + h(φH ↾H+K/H ) + h(φ ↾H ) + h(φH ) = (h(φ ↾H∩K ) + h(φ ↾H )) + (h(φH ↾H+K/H ) + h(φH )) = h(φ ↾H ) + h(φH ). Therefore, h(φ) = h(φ ↾H ) + h(φH ). The following corollary can be deduced easily from Proposition 5.5. Corollary 5.6. Let G be an abelian group, φ ∈ End(G) and H, K two φ-invariant subgroups of G with H ⊆ K. Then: (a) ATh (G, φ, H) ∧ ATh (K, φ ↾K , H) ∧ ATh (G/H, φ, K/H) =⇒ ATh (G, φ, K); and (b) ATh (G, φ, K) ∧ ATh (K, φ ↾K , H) ∧ ATh (G/H, φ, K/H) =⇒ ATh (G, φ, H). Proposition 5.5 and Corollary 5.6 have the following useful consequences, that are applied below in the proof of the Addition Theorem. 18 Lemma 5.7. Let G be an abelian group, φ ∈ End(G) and H a φ-invariant subgroup of G. Then ATh (G, φ, H) if one of the following conditions holds: (a) G/H is torsion; (b) H is torsion. Proof. (a) Our aim is to apply Proposition 5.5 with K = t(G), so we check that its hypotheses are satisfied: (i) ATh (G, φ, t(G)) and ATh (H, φ ↾H , t(H)), according to Proposition 5.4; (ii) ATh (t(G), φ ↾t(G) , t(H)) and ATh (G/H, φH , (H + t(G))/H), because t(G) and G/H are torsion, so the Addition Theorem for torsion abelian groups from [16] applies; (iii) ATh (G/t(G), φt(G) , (H+t(G))/t(G)) by Corollary 3.9, as G/t(G) is torsion-free and (H+t(G))/t(G) is essential in G/t(G), being G/(H + t(G)) torsion as a quotient of the torsion abelian group G/H. As t(H) = H ∩ t(G), Proposition 5.5 applies to conclude the proof. (b) The subgroup t(G)/H of G/H is precisely t(G/H), so both ATh (G/H, φ, t(G)/H) and ATh (G, φ, t(G)) by Proposition 5.4. On the other hand, ATh (t(G), φ ↾t(G) , H) as t(G) is torsion (apply the Addition Theorem for the torsion abelian groups from [16]). Now Corollary 5.6(b) applies to the triple H ⊆ t(G) ⊆ G. 5.3 The torsion-free case If the abelian group G is torsion-free, then for any φ ∈ End(G) the subgroup ker∞ φ is pure in G. The next result reduces the computation of the algebraic entropy of endomorphisms of finite-rank torsion-free abelian groups to the case of injective ones. Proposition 5.8. Let G be a torsion-free abelian group of finite rank and φ ∈ End(G). Then h(φ) = h(φker∞ φ ). Consequently, ATh (G, φ, ker∞ φ). Proof. We prove that h(φ) = h(φ), then this implies immediately ATh (G, φ, ker∞ φ), since h(φ ↾ker∞ φ ) = 0 by Proposition 2.6. Suppose first that G is divisible. Since G has finite rank, ker∞ φ has finite rank as well. Then there exists n ∈ N, such that ker∞ φ = ker φn . Let γ = φn and γ ∈ End(G/ ker γ) the endomorphism n induced by γ. Then h(γ) = nh(φ) by Proposition 2.8(b). Since γ = φ , it follows that h(γ) = nh(φ) again by Proposition 2.8(b). So, if we prove that h(γ) = h(γ), it follows that h(φ) = h(φ). Note that γ 2 (G) = γ(G). This shows that we can suppose without loss of generality that ker∞ φ = ker φ and φ2 (G) = φ(G). Let φ ∈ End(G/ ker φ). From [27, Section 58, Theorem 1] it follows that G∼ = ker φ × φ(G). Proposition 2.6 gives h(φ ↾ker φ ) = 0 and so h(φ) = h(φ ↾φ(G) ) by Proposition 2.8(d). Since φ(G) ∼ = G/ ker φ, and φ ↾φ(G) and φ are conjugated by this isomorphism, h(φ ↾φ(G) ) = h(φ) by Proposition 2.8(a). Hence, h(φ) = h(φ). We consider now the general case. Since ker∞ φe is pure in D(G), it is divisible by Lemma 3.8(b). e i.e., there exists n ∈ N+ such that e Indeed, let x ∈ ker∞ φ, Moreover, ker∞ φ is essential in ker∞ φ. n e φ (x) = 0. Since G is essential in D(G) there exists k ∈ Z such that kx ∈ G \ {0}. Furthermore, φn (kx) = φen (kx) = k φen (x) = 0 and so kx ∈ ker∞ φ \ {0}. It follows that ker∞ φe = D(ker∞ φ). By the e = h(φ), e is the induced endomorphism. By e where φe ∈ End(D(G)/ ker∞ φ) first part of the proof, h(φ) e e Proposition 3.7 h(φ) = h(φ) and by Corollary 3.10 h(φ) = h(φ). Hence, h(φ) = h(φ). Our next aim is to prove the Addition Theorem for torsion-free abelian groups (see Proposition 5.10). We start from the divisible case in Theorem 5.9, where we apply the Algebraic Yuzvinski Formula. Theorem 5.9. Let n ∈ N+ , φ ∈ End(Qn ) and let H be a pure φ-invariant subgroup of Qn . Then h(φ) < ∞ and ATh (Qn , φ, H). 19 Proof. Let D = Qn . Theorem 1.2 implies h(φ) < ∞. Assume first that φ is an automorphism. Let r(H) = k ∈ N, that is, H ∼ = Qk . Let B = {v1 , . . . , vk , vk+1 , . . . , vn } be a basis of D over Q such that BH = {v1 , . . . , vk } is a basis of H over Q. Then the matrix of φ with respect to B has the following block-wise form:   A1 B , A= 0 A2 where A1 is the matrix of φ ↾H with respect to BH . Let π : D → D/H be the canonical projection and φ ∈ End(D/H) the endomorphism induced by φ. Then B = {π(vk+1 ), . . . , π(vn )} is a basis of D/H ∼ = Qn−k and A2 is the matrix of φ with respect to B. Let α1 , . . . , αk be the eigenvalues of A1 and let αk+1 , . . . , αn be the eigenvalues of A2 . Then α1 , . . . , αn are the eigenvalues of A. Let χ and χ1 , χ2 ∈ Q[t] be the characteristic polynomials of A and A1 , A2 respectively. Then χ = χ1 χ2 . Let s1 and s2 be the least common multiples of the denominators of the coefficients of χ1 and χ2 respectively. This means that p1 = s1 χ1 and p2 = s2 χ2 ∈ Z[t] are primitive. By Gauss Lemma p = p1 p2 is primitive and so for s = s1 s2 the polynomial p = sχ ∈ Z[t] is primitive. Now the Algebraic Yuzvinski Formula 1.2 applied to φ, φ ↾H , φ gives X log |αi | h(φ) = log s + 1≤i≤n,|αi |>1 X = log(s1 s2 ) + log |αi | + 1≤i≤k,|αi |>1  = log s1 + X 1≤i≤k,|αi |>1 = h(φ ↾H ) + h(φ). X log |αi |  k+1≤i≤n,|αi |>1  log |αi | + log s2 + X k+1≤i≤n,|αi |>1  log |αi | This proves ATh (Qn , φ, H). Consider now the general case of φ ∈ End(G) and let π : D → D/ ker∞ φ be the canonical projection. Then π(H) = (H + ker∞ φ)/ ker∞ φ is a φ-invariant pure (i.e., divisible) subgroup of D/ ker∞ φ and we have the following two diagrams. H  φ↾H / H  π(H)   D φ  /D  D/ ker∞ φ  D/H φH  / D/H  (D/ ker∞ φ)/π(H) φ↾π(H) / π(H)  φ  / D/ ker∞ φ φπ(H)  / (D/ ker∞ φ)/π(H) To establish ATh (D, φ, H) we intend to apply Proposition 5.5. To this end we check in the sequel the validity of its hypotheses: (i) ATh (D, φ, ker∞ φ), ATh (H, φ ↾H , H ∩ker∞ φ) and ATh (D/H, φH , (H +ker∞ φ)/H) by Proposition 5.8, as H ∩ ker∞ φ = ker∞ φ ↾H and (H + ker∞ φ)/H = ker∞ φ; (ii) ATh (ker∞ φ, φ ↾ker∞ φ , H ∩ ker∞ φ), as h(φ ↾ker∞ φ ) = 0 by Proposition 2.6; (iii) ATh (D/ ker∞ φ, φ, (H + ker∞ φ)/ ker∞ φ) by the the first part of the proof (as φ is bijective, being injective). Now Proposition 5.5 yields that ATh (D, φ, H). The next result settles the torsion-free case of the Addition Theorem. 20 Proposition 5.10. Let G be a torsion-free abelian group, φ ∈ End(G) and let H be a φ-invariant subgroup of G. Then ATh (G, φ, H). Proof. By Proposition 4.7(d), we can assume that G has finite rank. The purification H∗ of H is φ-invariant too. We are going to deduce ATh (G, φ, H) from Corollary 5.6(b) applied to the chain H ⊆ H∗ ⊆ G. The validity of ATh (G, φ, H∗ ) is granted by Theorem 5.9 and Corollary 3.10. Since H is an essential subgroup of H∗ , Corollary 3.9(a) yields ATh (H∗ , φ ↾H∗ , H). Finally, ATh (G/H, φ, H∗ /H) follows from Proposition 5.4, as H∗ /H = t(G/H). Now we can prove the Addition Theorem: Proof of Theorem 1.1. One has ATh (G, φ, t(G)) and ATh (H + t(G), φ ↾H+t(G) , t(G)) by Proposition 5.4, and ATh (G/t(G), φ, H + t(G)/t(G)) by Proposition 5.10. Then ATh (G, φ, H + t(G)) by Corollary 5.6(a) applied to the triple t(G) ⊆ H + t(G) ⊆ G. Since H + t(G)/H is torsion, Lemma 5.7(a) yields ATh (H + t(G), φ ↾H+t(G) , H). Finally, as the subgroup (H + t(G))/H of G/H is torsion, by Lemma 5.7(b) ATh (G/H, φ, (H + t(G))/H). Now Corollary 5.6(b) applies to the triple H ⊆ H + t(G) ⊆ G to conclude the proof. 6 The Uniqueness Theorem We start this section by proving the Uniqueness Theorem for the algebraic entropy h in the category of all abelian groups. In other words, we have to show that, whenever a collection h∗ = {h∗G : G abelian group} of functions h∗G : End(G) → R≥0 ∪ {∞} satisfies (a)–(e) of Theorem 1.3, then h∗ (φ) = h(φ) for every abelian group G and every φ ∈ End(G). We shall provide two proofs of this fact, but first we need to point out three easy consequences of the hypotheses (a)–(e) of Theorem 1.3 to be used in both proofs. (A) Item (c) implies that h∗ is monotone with respect to taking restrictions to invariant subgroups and to taking induced endomorphisms of the quotient groups with respect to invariant subgroups. (B) Item (d) says that h∗ and h coincide on all Bernoulli shifts βK , where K is a finite abelian group. This can be extended also to βZ , by showing that h∗ (βZ ) = ∞ as follows. Let G = Z(N) . For every prime p, the subgroup pG of G is βZ -invariant, so βZ induces an endomorphism βZ : G/pG → G/pG. Since G/pG ∼ = Z(p)(N) and βZ is conjugated to βZ(p) through this isomorphism, ∗ ∗ h (βZ ) = h (βZ(p) ) = log p by item (a). Therefore, h∗ (βZ ) ≥ log p for every prime p by (A), and so h∗ (βZ ) = ∞. (C) Item (e) means that h∗ and h coincide on all endomorphisms of Qn , when n ∈ N+ varies. Roughly speaking, (B) and (C) (that are (d) and (e) of Theorem 1.3, respectively) ensure the coincidence of h and h∗ on all endomorphisms of Qn for every n ∈ N+ and all Bernoulli shifts. We have to show that along with the properties (a), (b) and (c), this forces h∗ to coincide with h on all endomorphisms of all abelian groups. Proof of Theorem 1.3. In the sequel G is an arbitrary abelian group, φ ∈ End(G) and H a φinvariant subgroup of G. To prove that h∗ (φ) = h(φ) we consider various cases depending on the group G. (i) If G is torsion, then h∗ (φ) = ent(φ) = h(φ) by the Uniqueness Theorem for ent [16, Theorem 6.1]. Obviously, item (e) becomes vacuous in this case. (ii) It suffices to consider the torsion-free case. Indeed, assume that h and h∗ coincide on endomorphisms of torsion-free abelian groups. One has h∗ (φ) = h∗ (φ ↾t(G) ) + h∗ (φ) by (c) and h(φ) = h(φ ↾t(G) 21 )+h(φ) by the Addition Theorem 1.1. Since G/t(G) is torsion-free, our hypothesis implies h∗ (φ) = h(φ). Since h∗ (φ ↾t(G) ) = h(φ ↾t(G) ) by (i), we conclude that h∗ (φ) = h(φ). (iii) If G is torsion-free and r(G) = n is finite, then h∗ (φ) = h(φ). Indeed, D(G) ∼ = Qn and D(G)/G is torsion. Let φ ∈ End(D(G)/G) be the endomorphism induced by φe : D(G) → D(G). By e = h(φ), e and this value is finite. Since D(G)/G the Algebraic Yuzvinski Formula 1.2 and by (e) h∗ (φ) ∗ e ∗ ∗ is torsion, h (φ) = h(φ) by (i). By (c) h (φ) = h (φ) + h∗ (φ) and by the Addition Theorem 1.1 e = h(φ) + h(φ). Then h∗ (φ) = h∗ (φ) e − h∗ (φ) = h(φ) e − h(φ) = h(φ). h(φ) (iv) If G is torsion-free, G = V (φ, g) for some g ∈ G and r(G) is infinite, thenLh∗ (φ) = ∞ = h(φ). The second equality follows from Lemma 3.5. To check the first one, note that G ∼ = Z(N) = n∈N hφn (g)i ∼ and φ is conjugated to βZ through this isomorphism. Hence, h∗ (φ) = ∞, because h∗ (φ) = h∗ (βZ ) by (a) and h∗ (βZ ) = ∞ by (B). (v) If G is torsion-free and G = V (φ, F ) for some F ∈ [G]<ω , then h∗ (φ) = h(φ). To prove this, let F = {f1 , . . . , fk }. Then G = V (φ, f1 ) + . . . + V (φ, fk ). If r(V (φ, fi )) is finite for every i ∈ {1, . . . , k}, then r(G) is finite as well, and h∗ (φ) = h(φ) by (iii). If r(V (φ, fi )) is infinite for some i ∈ {1, . . . , k}, then h∗ (φ ↾V (φ,fi ) ) = ∞ = h(φ ↾V (φ,fi ) ) by (iv). By (A) and by Lemma 2.7, h∗ (φ) = ∞ = h(φ). Consider now the general case. By (ii) we can suppose without loss of generality that G is torsionfree. By Lemma 4.4, G = lim{V (φ, F ) : F ∈ [G]<ω }, and by (v), h∗ (φ ↾V (φ,F ) ) = h(φ ↾V (φ,F ) ) for −→ every F ∈ [G]<ω . Therefore, (b) and Proposition 2.8(c) give h∗ (φ) = supF ∈[G]<ω h∗ (φ ↾V (φ,F ) ) = supF ∈[G]<ω h(φ ↾V (φ,F ) ) = h(φ). Note that the Uniqueness Theorem [16, Theorem 6.1] for ent in the torsion case uses one more axiom that is not present in our list (a)–(e), namely the Logarithmic Law. As shown in [39], in the torsion case it follows from (a)–(d). We have seen in the Uniqueness Theorem for h that also in the general case the Logarithmic Law is not among the properties necessary to give uniqueness of h in the category of all abelian groups, that is, the Logarithmic Law follows automatically from (a)–(e). It is possible to prove the Uniqueness Theorem also in a less direct way, that is, using a known theorem by Vámos [45] on length functions. We expose this alternative proof in the remaining part of the section, considering the algebraic entropy as a function h : ModZ[t] → R≥0 ∪ {∞} (see Remark 4.1). Let R be a unitary commutative ring, and consider the category ModR of all R-modules and their homomorphisms. An invariant i : ModR → R≥0 ∪ {∞} is a function such that i(0) = 0 and i(M ) = i(M ′ ) if M ∼ = M ′ in ModR . For M ∈ ModR , denote by F (M ) the family of all finitely generated submodules of M . Definition 6.1. [35, 45] Let R be a unitary commutative ring. A length function L of ModR is an invariant L : ModR → R≥0 ∪ {∞} such that: (a) L(M ) = L(M ′ ) + L(M ′′ ) for every exact sequence 0 → M ′ → M → M ′′ → 0 in ModR ; (b) L(M ) = sup{L(F ) : F ∈ F (M )}. An invariant satisfying (a) is said additive and an invariant with the property in (b) is called upper continuous. So a length function is an additive upper continuous invariant of ModR . Proposition 6.2. If h∗ = {h∗G : G abelian group} is a collection of functions h∗G : End(G) → R≥0 ∪{∞} satisfying (a)–(e) of Theorem 1.3, then h∗ is a length function of ModZ[t] . In particular, h is a length function of ModZ[t] . Proof. In terms of Definition 6.1, h∗ and h are upper continuous and additive invariants of ModZ[t] , respectively in view of the properties (a), (b) and (c) of Theorem 1.3, and by Example 2.5, the Addition Theorem 1.1 and Proposition 2.8(c). As noted in [45], the values of a length function L of ModR are determined by its values on the finitely generated R-modules. In case R is a Noetherian commutative ring, L is determined by its values L(R/p) for prime ideals p of R (see [45, Corollary of Lemma 2]). 22 Second proof of Theorem 1.3. Let h∗ = {h∗G : G abelian group} be a collection of functions h∗G : End(G) → R≥0 satisfying (a)–(e) of Theorem 1.3. Let R = Z[t]. By Proposition 6.2, h∗ is a length function of ModR . In view of the above mentioned results from [45], it suffices only to check that h∗ (R/p) = h(R/p) for all prime ideals p of R. Let us recall that R has Krull dimension 2, so the non-zero prime ideals p of R are either minimal of maximal. In particular, if p is a minimal prime ideal of R, then p = (f (t)), where f (t) ∈ R is irreducible (either f (t) = p is a prime in Z, or f (t) is irreducible with deg f (t) > 0). On the other hand, a maximal ideal m of R is of the form m = (p, f (t)), where p is a prime in Z and f (t) ∈ R is irreducible modulo p and deg f (t) > 0. (i) For p = 0, we prove that h∗ (R) = ∞ = h(R). To this end we have to show that µt : R → R has h (µt ) = ∞ = h(µt ). The flow (R, µt ) is isomorphic to the flow (Z(N) , βZ ). By (a) and by Proposition 2.8(a) respectively, this yields h∗ (µt ) = h∗ (βZ ) and h(µt ) = h(βZ ). As h∗ (βZ ) = ∞ = h(βZ ) by (B) and Example 2.10, we are done. ∗ (ii) To see that h∗ (R/m) = h(R/m) for a maximal ideal p = m of R, it suffices to show that R/m is finite and apply the Uniqueness Theorem for the torsion case [16, Theorem 6.1]. Indeed, m = (p, f (t)), where p ∈ Z is a prime and f (t) ∈ R is irreducible modulo p. So, R/m ∼ = (Z/pZ)[t]/(fp (t)), where fp (t) is the reduction of f (t) modulo p. Hence, R/m is finite. (iii) It remains to see that h∗ (R/p) = h(R/p) when p is a minimal prime ideal of R. Assume first that p = (p) for some prime p ∈ Z. We show that h∗ (R/p) = log p = h(R/p). Indeed, R/(p) ∼ = (Z/pZ)[t] and (Z/pZ)[t] ∼ = Z(p)(N) as abelian groups. Moreover, µt : (Z/pZ)[t] → (Z/pZ)[t] is conjugated to βZ(p) through this isomorphism. By (a), (B) and Proposition 2.8(a), we get the required equality. Suppose now that p = (f (t)), where f (t) = a0 + a1 t + . . . + an tn ∈ Z[t] is irreducible (so, primitive) with deg f (t) = n > 0. Let M = R/p. We verify that h∗ (M ) = h(M ). Let J be the principal ideal generated by f (t) in Q[t] and D = Q[t]/J. Let π : Q[t] → D be the canonical projection. Since J ∩ R = p, π induces an injective homomorphism M → D and we can think without loss of generality that M is a subgroup of D (identifying M with π(R)). Since D ∼ = Qn as abelian groups and r(M ) ≥ n, M is essential in D. Consider µt : D → D and µt ↾M : M → M . Since D/M is torsion, h∗ (µt ) = h(µt ) = 0 by the Uniqueness Theorem for the torsion case [16, Theorem 6.1]. By (C), h∗ (µt ) = m(f (t)) = h(µt ) < ∞. Moreover, h∗ (µt ↾M ) = h∗ (µt ) − h∗ (µt ), by (c); while h(µt ↾M ) = h(µt ) − h(µt ) by the Addition Theorem 1.1. This yields h∗ (µt ↾M ) = h(µt ↾M ), i.e., h∗ (M ) = h(M ). 7 7.1 Entropy vs Mahler measure Computation of entropy via Mahler measure For an algebraic number α ∈ C, the Mahler measure m(α) of α is the Mahler measure of sf (t), where f (t) is the minimal polynomial of α over Q and s is the least positive common multiple of the denominators of f . In order to characterize the algebraic numbers α with m(α) = 0 one need the following: Theorem 7.1 (Kronecker Theorem). [30] Let f (t) ∈ Z[t] be a monic polynomial with roots α1 , . . . , αk . If α1 is not a root of unity, then |αi | > 1 for at least one i ∈ {1, . . . , k}. Corollary 7.2. Let f (t) ∈ Z[t] \ {0} be a primitive polynomial. Then m(f (t)) = 0 if and only if f (t) is cyclotomic (i.e., all the roots of f (t) are roots of unity). Consequently, if α is an algebraic integer, then m(α) = 0 if and only if α is a root of unity. Proof. Let f (t) = a0 + a1 t + . . . + ak tk and deg f (t) = k. Assume that all roots α1 , . . . , αk of f (t) are roots of unity. Then there exists m ∈ N+ such that every αi is a root of tm − 1. By Gauss Lemma f (t) divides tm − 1 in Z[t]. Therefore, ak = ±1, and hence m(f (t)) = 0. Suppose now that m(f (t)) = 0. This entails that f (t) is monic. Moreover, |αi | ≤ 1 for every i ∈ {1, . . . , k}. By Kronecker Theorem 7.1 each αi is a root of unity. 23 This determines completely the case of zero Mahler measure. For the greatest lower bound of the positive values of the Mahler measure one has Lehmer Problem 1.4, that can be reformulated also as follows: Problem 7.3. Is inf{m(α) > 0 : α algebraic integer} > 0? Obviously, the problem can be formulated equivalently for algebraic numbers, as m(α) ≥ log 2 for every algebraic number α that is not an algebraic integer. We prove now that L = ε, that is, that the infimum of the positive values of the Mahler measure coincides with the infimum of the positive values of the algebraic entropy. Proof of Theorem 1.5. We start by proving the first equality in Theorem 1.5, namely ε = inf{h(φ) > 0 : n ∈ N+ , φ ∈ Aut(Qn )}. (7.1) We split the proof in three steps of reductions. (i) Let G be an abelian group, φ ∈ End(G) and φ ∈ End(G/t(G)). Since h(φ ↾t(G) ) = ent(φ ↾t(G) ), we can suppose that h(φ ↾t(G) ) = 0, otherwise h(φ) ≥ h(φ ↾t(G) ) ≥ log 2 by Lemma 2.7 and (1.3). By the Addition Theorem 1.1 h(φ) = h(φ). In other words, we can consider only torsion-free abelian groups G. (ii) By (i), we can assume that G is a torsion-free abelian group and φ ∈ End(G). If there exists g ∈ G such that r(V (φ, g)) is infinite, then h(φ) ≥ h(φ ↾V (φ,g) ) = ∞ by Lemma 2.7 and Corollary 3.4(b). Hence, we can assume that r(V (φ, g)) is finite for every g ∈ G. Then r(V (φ, F )) is finite for every F ∈ [G]<ω . By Lemma 4.4, h(φ) = supF ∈[G]<ω h(φ ↾V (φ,F ) ). So, we can consider only torsion-free e by Theorem 3.7, and hence we can reduce to abelian groups of finite rank. Furthermore, h(φ) = h(φ) divisible torsion-free abelian groups of finite rank. (iii) By (ii) and by Proposition 2.8(a), we can assume that G = Qn for some n ∈ N+ . Let φ ∈ End(Qn ). By Proposition 5.8 h(φ) = h(φ), where the induced endomorphism φ ∈ End(Qn / ker∞ φ) is injective (hence, surjective). Moreover, Qn / ker∞ φ ∼ = Qm for some m ∈ N, m ≤ n, as ker∞ φ is pure in n n Q (so Q / ker∞ φ is divisible and torsion-free by Lemma 3.8(c)). Therefore, φ ∈ Aut(Qm ), and this proves the equality in (7.1). The equality L = ε follows from (7.1) and the Algebraic Yuzvinski Formula 1.2. Following [11], for an abelian group G, let Ealg (G) = {h(φ) : φ ∈ End(G)} and let Ealg be the union of all Ealg (G) when G varies among the class of all abelian groups. Then Ealg is a submonoid of the monoid (R≥0 ∪ {∞}, +, 0), and L = inf(Ealg \ {0}) by Theorem 1.5. Moreover, let A = {log |α| : α algebraic number, |α| ≥ 1}, which is a dense countable submonoid of (R≥0 , +, 0). The next theorem collects some equivalent forms of L = 0 (a proof can be found in [11]). Theorem 7.4. The following conditions are equivalent: (a) Ealg = R≥0 ∪ {∞}; (b) L = 0; S (c) inf( n∈N+ Ealg (Zn ) \ {0}) = 0. If L > 0, then Ealg ⊆ A ∪ {∞}, so in particular it is countable. The inclusion Ealg ⊆ A ∪ {∞} is proper in case L > 0 by the density of the set A in R≥0 . Remark 7.5. By the Algebraic Yuzvinski Formula 1.2, the algebraic entropy h(φ) of an endomorphism φ : Qn → Qn , n ∈ N+ , is equal to the Mahler measure of a polynomial f (t) ∈ Z[t], namely f (t) = sg(t) ∈ Z[t], where g(t) ∈ Q[t] is the characteristic polynomial of φ and s is the least positive common multiple of the denominators of g(t). One can read this in the opposite direction, that is, the Mahler 24 measure of a polynomial f (t) ∈ Z[t] of degree n is equal to the algebraic entropy of some endomorphism φ of Qn . Indeed, let f (t) = a0 + a1 t + . . . + an tn ∈ Z[t] with deg f (t) = n and let  0 1   C(f ) =  0 .  .. 0 0 0 1 .. . 0 ... ... .. . .. . ... 0 0  − aan0 a1  − an   a2  − an  ..  .  0 .. . 1 − an−1 an (7.2) be the companion matrix associated to f (t). The characteristic polynomial of C(f ) is f (t), and C(f ) is associated to an endomorphism φ of Qn (see also Remark 7.6 about this endomorphism). Then m(f (t)) = h(φ) by the Algebraic Yuzvinski Formula 1.2. Finally, we present the above situation from a different point of view, namely the algebraic entropy associated to the multiplication by an element in a commutative ring, defined in [51]. Remark 7.6. Let α ∈ C be an algebraic number of degree n ∈ N+ over Q and let f (t) ∈ Q[t] be its minimal polynomial, with deg f (t) = n. Let K = Q(α) be the simple field extension of Q associated to α; then K ∼ = Qn as abelian groups. Inspired by [51], call algebraic entropy h(α) of α the algebraic entropy h(µα ), where µα is the multiplication by α in K. Let an be the smallest positive integer such that an f (t) = a0 + a1 t + . . . + an tn ∈ Z[t]. With respect to the basis {1, α, . . . , αn−1 } of K, the matrix associated to µα is the companion matrix C(f ) in (7.2). The characteristic polynomial of C(f ) is f (t). By the Algebraic Yuzvinski Formula 1.2, h(µα ) = m(f (t)), i.e., h(α) = m(α). This means that the algebraic entropy of an algebraic number coincides with its Mahler measure. 7.2 Lehmer Problem and realization of entropy This section is dedicated to the proof of the Realization Theorem, showing that Lehmer Problem is equivalent to the “realization problem” of the finite values of the algebraic entropy. In the next lemma we collect known results showing the validity of the Realization Theorem for finitely generated flows satisfying some additional restraint. Lemma 7.7. Let G be an abelian group, φ ∈ End(G) and assume that G is finitely φ-generated by F ∈ [G]<ω . (a) [16] If G is torsion, then h(φ) = H(φ, F ). (b) [8] If H(φ, F ) = 0, then h(φ) = 0 (in particular, h(φ) = H(φ, F )). The conclusion h(φ) = H(φ, F ) in the above lemma does not hold true in general. Indeed, consider µ3 : Z → Z and F = {0, 1}; now H(µ3 , F ) ≤ log |F | = log 2, while h(µ3 ) = log 3. This can be generalized to any non-torsion infinite finitely generated abelian group G with F a finite set of generators of G; in this case, for every k ∈ N+ with k > |F |, one has h(µk ) ≥ log k > log |F |. The following is a direct consequence of Proposition 3.7. e Corollary 7.8. Let G be a torsion-free abelian group and φ ∈ End(G) with h(φ) < ∞. Then h(φ) realizes if and only if h(φ) realizes. e by Proposition 3.7(b), then also h(φ) e realizes. Assume now Proof. If h(φ) realizes, since h(φ) = h(φ) <ω e e e that h(φ) realizes. Then there exists F ∈ [D(G)] such that h(φ) = H(φ, F ). By Proposition 3.7 there e = H(φ, e F ) = H(φ, mF ), therefore, h(φ) realizes. exists m ∈ N+ such that mF ⊆ G and h(φ) = h(φ) The following technical lemma is needed in the proof of Proposition 7.10. Lemma 7.9. Let G be an abelian group and φ ∈ End(G) with h(φ) < ∞. Let {Vn }n∈N be an increasing chain of φ-invariant subgroups of G, such that V0 = 0 and h(φ) = supn∈N h(φ ↾Vn ). Let φn = φ ↾Vn and φn ∈ End(Vn /Vn−1 ) be the induced endomorphism for n ∈ N+ . Assume that η > 0 and that h(φn ) is either 0 or ≥ η for every n ∈ N+ . Then h(φ) = h(φn ) for some n ∈ N. 25 Proof. For the sake of completeness let φ0 = φ ↾V0 and note that φ1 = φ1 . The sequence {h(φn )}n∈N is an increasing sequence of non-negative real numbers. For every n ∈ N+ , let dn = h(φn ) − h(φn−1 ). By the Addition Theorem 1.1, h(φn ) = h(φn−1 ) + h(φn ) for every n ∈ N+ . Hence, dn = h(φn ), and so dn is either 0 or ≥ η by hypothesis. Therefore, for every n ∈ N, h(φn ) = n X di ≥ mn η, where mn = |{di 6= 0 : 1 ≤ i ≤ n}|. i=1 Since h(φn ) ≤ h(φ) for every n ∈ N, we have that mn ≤ h(φ) . η Consequently, there are finitely many dn 6= 0, and this means that the sequence {h(φn )}n∈N stabilizes. By hypothesis, h(φ) = supn∈N h(φn ), hence h(φ) = h(φn ) for every sufficiently large n ∈ N. From Lemma 7.9 and Corollary 7.8 we deduce respectively item (a) and item (b) of the following result. Proposition 7.10. Let G be an abelian group and φ ∈ End(G) with h(φ) < ∞. Then h(φ) realizes when: (a) G is torsion; (b) G is torsion-free of finite rank. Proof. (a) By Proposition 4.7 there exists a chain {Vn }n∈N in F(G, φ) such that h(φ) = limn→∞ h(φ ↾Vn ). We can apply Lemma 7.9 with η = log 2 to find n ∈ N such that h(φ) = h(φ ↾Vn ). We have Vn = V (φ, F ) for some F ∈ [G]<ω . Since G is torsion, F ′ = hF i is finite and Vn = V (φ, F ′ ) = T (φ, F ′ ). By Lemma 7.7(a), h(φ ↾Vn ) = H(φ, F ′ ), and hence h(φ) = h(φ ↾Vn ) = H(φ, F ′ ). (b) If G is a torsion-free abelian group of finite rank, by Corollary 7.8 we can assume that G is also divisible and then G ∼ = Qn for some n ∈ N+ . By [25, Theorem 4.18] there exist infinitely many <ω F ∈ [G] such that h(φ) = H(φ, F ). We are now in position to prove the Realization Theorem for the algebraic entropy: Proof of Theorem 1.7. (b)⇒(a) Assume that L = 0. By Theorem 7.4 this is equivalent to Ealg = R≥0 ∪ {∞}. Hence, for every P φn ∈ End(Gn ) such that Lan abelian group Gn and L n ∈ N there exist h(φn ) = 21n . Now let G = n∈N Gn and φ = n∈N φn . Then h(φ) = n∈N 21n = 1 by Proposition 2.8(c,d). To conclude it suffices to note that for every FP∈ [G]<ω there exists n ∈ N such that n F ⊆ G0 ⊕ . . . ⊕ Gn , and so H(φ, F ) ≤ h(φ0 ⊕ . . . ⊕ φn ) = i=0 21i < 1 by Proposition 2.8(d). Then h(φ) = 1, but h(φ) does not realize. (a)⇒(b) By Proposition 4.7 there exists a chain {Vn }n∈N in F(G, φ) such that h(φ) = limn→∞ h(φ ↾Vn ). As L > 0, by Lemma 7.9 (with η = L) there exists n ∈ N such that h(φ) = h(φ ↾Vn ). Hence, we can assume without loss of generality that G is finitely φ-generated by some F ∈ [G]<ω . Since h(φ) < ∞, Lemma 3.3 implies that V (φ, g) has finite rank for every g ∈ G. Then G has finite rank as well, and by Lemma 4.3(b) there exists a finite-rank torsion-free subgroup K of G such that G∼ = K × t(G). By Example 5.2, φ is the skew product of φ1 and φ2 , where φ1 : K → K is conjugated to φ : G/t(G) → G/t(G) by the isomorphism K ∼ = G/t(G), and φ2 = φ ↾t(G) ; moreover, sφ (K) is finite. By Proposition 7.10(a) there exists F2 ∈ [t(G)]<ω such that h(φ2 ) = H(φ2 , F2 ). We can assume without loss of generality that sφ (K) ⊆ F2 . Since K ∼ = G/t(G) is torsion-free of finite rank, by Proposition 7.10(b) there exists F1 ∈ [K]<ω such that h(φ1 ) = H(φ1 , F1 ). By Proposition 2.8(d) and Proposition 5.3, for πφ = φ1 × φ2 one has h(φ) = h(πφ ) = h(φ1 ) + h(φ2 ) = H(φ1 , F1 ) + H(φ2 , F2 ) = H(φ1 × φ2 , F1 × F2 ) = H(φ, F1 × F2 ), as Tn (πφ , F1 ×F2 ) = Tn (φ, F1 ×F2 ) for every n ∈ N+ . This concludes the proof for the case G = V (φ, F ), and so the proof of the theorem. 26 References [1] L. M. Abramov, The entropy of an automorphism of a solenoidal group, Teor. Veroyatnost. i Primenen 4 (3) (1959) 249–254. [2] R. L. Adler, A. G. Konheim, M. H. McAndrew, Topological entropy, Trans. Amer. Math. Soc. 114 (1965) 309–319. [3] M. Akhavin, F. Ayatollah Zadeh Shirazi, D. Dikranjan, A. Giordano Bruno, A. Hosseini, Algebraic entropy of shift endomorphisms on abelian groups, Quaest. Math. 32 (4) (2009) 529–550. [4] D. Arnold, Finite Rank Torsion Free Abelian Groups and Rings, L.N.M. n. 931, Springer 1982. [5] R. Bowen, Entropy and the fundamental group, in: The Structure of Attractors in Dynamical Systems (Proc. Conf. North Dakota State Univ., Frago, 1977), Lecture Notes in Math. 668 (1978) 21–29. [6] D. Dikranjan, A. Giordano Bruno, L. Salce, Adjoint algebraic entropy, Journal of Algebra 324 (2010) 442–463. [7] D. Dikranjan, A. Giordano Bruno, Entropy on abelian groups, arxiv.org/pdf/1007.0533v1.pdf (2010). [8] D. Dikranjan, A. Giordano Bruno, The Pinsker subgroup of an algebraic flow, Jour. Pure Appl. Algebra 216 (2012) 364–376. [9] D. Dikranjan, A. Giordano Bruno, Limit free computation of entropy, Rend. Istit. Mat. Univ. Trieste 44 (2012) 297–312. [10] D. Dikranjan, A. Giordano Bruno, The connection between topological and algebraic entropy, Topology Appl. 159 (13) (2012) 2980–2989. [11] D. Dikranjan, A. Giordano Bruno, Topological and algebraic entropy for group endomorphisms, Proceedings ICTA2011 Islamabad, Pakistan July 4-10, 2011 Cambridge Scientific Publishers (2012) 133–214. [12] D. Dikranjan, A. Giordano Bruno, Entropy in a category, Appl. Categ. Structures 21 (1) (2013) 67–101. [13] D. Dikranjan, A. Giordano Bruno, Discrete dynamical systems in group theory, Note Mat. 33 (1) (2013) 1-48. [14] D. Dikranjan, A. Giordano Bruno, The Bridge Theorem for totally disconnected LCA groups, Topology Appl. 169 (1) (2014) 21–32. [15] D. Dikranjan, A. Giordano Bruno, L. Salce, S. Virili, Intrinsic algebraic entropy, J. Pure Appl. Algebra 219 (2015) 2933–2961. [16] D. Dikranjan, B. Goldsmith, L. Salce, P. Zanardo, Algebraic entropy of endomorphisms of abelian groups, Trans. Amer. Math. Soc. 361 (2009) 3401–3434. [17] D. Dikranjan, K. Gong, P. Zanardo, Endomorphisms of abelian groups with small algebraic entropy, Linear Algebra Appl. 439 (7) (2013) 1894–1904. [18] D. Dikranjan, I. Prodanov, L. Stoyanov, Topological Groups: Characters, Dualities and Minimal Group Topologies, Pure and Applied Mathematics, Vol. 130, Marcel Dekker Inc., New York-Basel, 1989. [19] D. Dikranjan, M. Sanchis, S. Virili, New and old facts about entropy on uniform spaces and topological groups, Topology Appl. 159 (7) (2012) 1916–1942. [20] G. Everest, T. Ward, Heights of polynomials and entropy in algebraic dynamics, Universitext. Springer-Verlag London Ltd., London 1999. [21] K. Falconer, B. Fine, D. Kahrobaei, Growth rate of an endomorphism of a group, Groups Complex. Cryptol. 3 (2011) no. 2 285–300. [22] M. Fekete, Über die Verteilung der Wurzeln bei gewisser algebraichen Gleichungen mit ganzzahlingen Koeffizienten, Math. Zeitschr. 17 (1923) 228–249. [23] L. Fuchs, Infinite Abelian Groups, Vol. I and II, Academic Press, 1970 and 1973. 27 [24] A. Giordano Bruno, Algebraic entropy of shift endomorphisms on products, Comm. Algebra 38 (11) (2010) 4155–4174. [25] A. Giordano Bruno, S. Virili, The Algebraic Yuzvinski Formula, J. Algebra 423 (2015) 114–147. [26] A. Giordano Bruno, S. Virili, About the Algebraic Yuzvinski Formula, Topol. Algebra and its Appl. 3 (1) (2015) 86–103. [27] P. Halmos, Finite-Dimensional Vector Spaces, Undergraduate Texts in Mathematics, SpringerVerlag, New York - Heidelberg - Berlin, 1987. [28] E. Hewitt, K. A. Ross, Abstract harmonic analysis I, Springer-Verlag, Berlin-Heidelberg-New York, 1963. [29] E. Hironaka, What is. . . Lehmer’s number?, Not. Amer. Math. Soc. 56 (3) (2009) 374–375. [30] L. Kronecker, Zwei Sätze über Gleichungen mit ganzzahligen Coefficienten, Jour. Reine Angew. Math. 53 (1857) 173–175. [31] A. N. Kolmogorov, New metric invariants of transitive dynamical systems and automorphisms of Lebesgue spaces, Doklady Akad. Nauk. SSSR 119 (1958) 861–864 (in Russian). [32] D. H. Lehmer, Factorization of certain cyclotomic functions, Ann. of Math. 34 (1933) 461–469. [33] D. Lind, T. Ward, Automorphisms of solenoids and p-adic entropy, Ergodic Theory Dynam. Systems 8 (3) (1988) 411–419. [34] M. J. Mossinghoff, G. Rhin, Q. Wu, Minimal Mahler measures, Experiment. Math. 17 (4) (2008) 451–458. [35] D. G. Northcott, M. Reufel, A generalization of the concept of length, Quart. J. of Math. (Oxford) (2) 16 (1965) 297–321. [36] J. Peters, Entropy on discrete Abelian groups, Adv. Math. 33 (1979) 1–13. [37] J. Peters, Entropy of automorphisms on L.C.A. groups, Pacific J. Math. 96 (2) (1981) 475–488. [38] L. S. Pontryagin, Topological Groups, Gordon and Breach, New York 1966. [39] L. Salce, Some results on the algebraic entropy, Groups and Model Theory, Contemporary Math. 576 (2012) 297–304. [40] L. Salce, P. Vámos, S. Virili, Length functions, multiplicities and algebraic entropy, Forum Math. 25 (2) (2013) 255–282. [41] L. Salce, P. Zanardo, A general notion of algebraic entropy and the rank entropy, Forum Math. 21 (4) (2009) 579–599. [42] Y. G. Sinai, On the concept of entropy of a dynamical system, Doklady Akad. Nauk. SSSR 124 (1959) 786–781 (in Russian). [43] C. Smyth, On the product of conjugates outside the unit circle of an algebraic integer, Bull. London Math. Soc. 3 (1971) 169–175. [44] L. N. Stoyanov, Uniqueness of topological entropy for endomorphisms on compact groups, Boll. Un. Mat. Ital. B (7) 1 (3) (1987) 829–847. [45] P. Vámos, Additive Functions and Duality over Noetherian Rings, Quart. J. of Math. (Oxford) (2) 19 (1968) 43–55. [46] S. Virili, Entropy for endomorphisms of LCA groups, Topology Appl. 159 (9) (2012) 2546–2556. [47] S. Virili, Algebraic and topological entropy of group actions, preprint. [48] M. D. Weiss, Algebraic and other entropies of group endomorphisms, Math. Systems Theory 8 (3) (1974/75) 243–248. [49] S. Yuzvinski, Metric properties of endomorphisms of compact groups, Izv. Acad. Nauk SSSR, Ser. Mat. 29 (1965) 1295–1328 (in Russian). English Translation: Amer. Math. Soc. Transl. (2) 66 (1968) 63–98. [50] S. A. Yuzvinski, Calculation of the entropy of a group-endomorphism, Sibirsk. Mat. Z̆. 8 (1967) 230–239. [51] P. Zanardo, Algebraic entropy of endomorphisms over local one-dimensional domains, J. Algebra Appl. 8 (6) (2009) 759–777. 28
4math.GR
Social Event Scheduling ? Nikos Bikakis † , Vana Kalogeraki † , Dimitrios Gunopulos # † Athens University of Economics & Business, Greece arXiv:1801.09973v2 [cs.DS] 6 Mar 2018 [email protected] # [email protected] Abstract—A major challenge for social event organizers (e.g., event planning and marketing companies, venues) is attracting the maximum number of participants, since it has great impact on the success of the event, and, consequently, the expected gains (e.g., revenue, artist/brand publicity). In this paper, we introduce the Social Event Scheduling (SES) problem, which schedules a set of social events considering user preferences and behavior, events’ spatiotemporal conflicts, and competing events, in order to maximize the overall number of attendees. We show that SES is strongly NP-hard, even in highly restricted instances. To cope with the hardness of the SES problem we design a greedy approximation algorithm. Finally, we evaluate our method experimentally using a dataset from the Meetup event-based social network. Keywords-Social Event Planning, Attendance Maximization, Social Event Arrangement, Event Organizers, Event Participants I. I NTRODUCTION The wide adoption of social media and networks has recently given rise to a new type of social networks that focus on online event management, called Event-based Social Networks (EBSN) [7]. In the most predominant EBSN platforms, such as Meetup, Eventbrite or Whova, users organize, manage and share social events and activities. In conjunction with the events’ organizers in EBSNs, several entities such as event planning and marketing companies (e.g., Jack Morton, GPJ), organizations (e.g., IEEE), as well as venues (e.g., theaters, night clubs), organize and manage a variety of social events (music concerts, conferences, promotion parties). A major challenge for event organizers is attracting the maximum number of participants, since it has great impact on the success of the event, and consequently, on the expected gains from it, for all involved (e.g., revenue, artist/brand publicity). Consider the following real-world scenario. A company is going to organize the Summerfest festival. Summerfest is an 11-day music festival, featuring 11 stages and attracting more than 800K people each year. Throughout the festival, in addition to the music concerts, numerous multi-themed events take place (e.g., theatrical performances). Assume that Alice enjoys listening to Pop music, and is a fashion lover. On Monday from 7:00 to 10:00pm, a concert of a famous Pop band is scheduled to take place at the festival. At the same day, on a different stage, a fashion show is taking place from 7:00 to 9:00pm. Furthermore, from 6:00 to 8:00pm on that day, a music concert of a Pop singer has been organized by a nearby (competing) venue. Despite the fact that Alice is interested in all three events, she is only able to attend one of them. In another scenario, assume that a Pop concert is hosted ? This paper appears in 34th IEEE Intl. Conference on Data Engineering (ICDE 2018) University of Athens, Greece [email protected] by the festival on Tuesday evening, but Alice is not capable of attending this event, because on Tuesdays she works until late at night. The above example illustrates the major aspects that should be considered in events scheduling scenarios. In order to attract as many attendances as possible, organizers have to carefully select the events that are going to take place during the festival, possibly picking among from numerous candidate events, as well as the date/time on which each event is going to take place. During the event scheduling process, at least the following aspects have to be considered: user preferences, user habits (e.g., availability), spatiotemporal conflicts between scheduled events, and possible third parties events (e.g., organized by a third party company) which might attract potential attendees (i.e., competing events). In this work, we introduce the Social Event Scheduling (SES) problem, which considers the aforementioned aspects and the goal is to maximize the overall number of participants in the scheduled events. In short, given a set of events, a set of time periods and a set of users, our objective is to determine how to assign events on the time periods, so that the maximum participant enrollment is achieved. Recently, a number of works have been proposed in the context of event-participant planing [2], [5], [6], [11]–[15]. These works examine a problem from a different perspective: given a set of pre-scheduled events, they focus on finding the most appropriate assignments for the users (i.e., participants) attending the events. The determined user-event assignments aim at maximizing the satisfaction of the users. However, these works fail to consider a crucial issue in event management, which is the “satisfaction” (e.g., revenue, publicity) of the entities involved in the event organization (e.g., organizer, artist, sponsors, services’ providers). Here, in contrast to existing works, our objective is to maximize the satisfaction of the event-side entities. To this end, instead of assigning users to events, we assign events to time intervals, so that the number of events attendees is maximized. Briefly, we study an “event-centric” problem, while the existing approaches focus on “user-centric” problems. Therefore, our objective is substantially different compared to the existing works. The same holds for the solution; in our problem, the solution is a set of event-time assignments, while in existing works is a set of user-event assignments. Additionally, in order to solve our problem we have to find a subset from a set of candidate events (i.e., some events may not be included in the solution), while in other works the solution contains all the users (i.e., each user is assigned to events). Finally, beyond the user and event entities which are also considered in existing works, in our problem more core entities are involved (e.g., event organizer, competing events). Thus, overall, the objective, the solution and the setting of our problem substantially differ from existing works. II. S OCIAL E VENT S CHEDULING P ROBLEM In this section we first introduce the Social Event Scheduling (SES) problem; and then we study its complexity. Before we formally introduce our problem, we present some necessary definitions. Organizer & Time intervals. We assume that the event organizer (e.g., company, venue) is associated with a number of (available) resources θ ∈ R+ . For example, as resources we can consider the agents (i.e., staff) which are responsible to setup and coordinate the events. Let T be a set of candidate time intervals, representing time periods that are available for organizing events. Note that the intervals contained in T are disjoint. Candidate Events. Assume a set E of available events to be scheduled, referred as candidate events. Each e ∈ E is associated with a location `e representing the place (e.g., a stage) that is going to host the event. Further, each event e requires a specific amount of resources ξe ∈ R+ 0 for its organization, referred as required resources. denoted as µu,h , that models the interest of user u over h. The interest value (i.e., affinity) can be estimated by considering a large number of factors (e.g., preferences, social connections)1 . Moreover, for each user u and time interval t a social activity probability σut is considered, representing the probability of user u participating in a social activity at t. Formally we have σ : U × T → [0, 1]. This probability can be estimated by examining the user’s past behavior (e.g., number of checkins)1 . Note that, user data can either be gathered by analyzing organizer data (e.g., registered users profiles) or be provided by a market research company. Attendance. Assume a user u and a candidate event e ∈ E that is scheduled by S to take place at time interval t; ρtu,e denotes the probability of u attending e at t. Considering the Luce’s choice theory, the probability ρtu,e is influenced by the social activity probability σ of u at t, and the interest µ of u over e, Ct and Et (S). We define the probability of u attending e at t as1 : ∀c∈Ct Feasibility. A schedule S is said to be feasible if the following constraints are satisfied: (1) ∀t ∈ T holds that @ei , ej ∈ Et (S) with P `ei = `ej (location constraint); and (2) ∀t ∈ T holds that ξe ≤ θ (resources constraint). In analogy, an assignment ∀e∈Et (S) αet is said to be feasible if the aforementioned constraints hold for t. Further, we call valid assignment, an assignment αet when the assignment is feasible and e ∈ / E(S). (1) ∀p∈Et (S) Furthermore, considering all users U, we define the expected attendance for an event e scheduled to take place at t as: ωet = αet denotes that the Schedule & Assignment. An assignment candidate event e ∈ E is scheduled to take place at t ∈ T . An event schedule S is a set of assignments, where there exist no two assignments referring to the same event. Given a schedule S, we denote as E(S) the set of all candidate events that are scheduled by S; and Et (S) the candidate events that are scheduled by S to take place at t (i.e., assigned to t). Formally, E(S) = {ei ∈ E | ateii ∈ S} and Et (S) = {ei ∈ E | ateii ∈ S with ti = t}. Further, for a candidate event e ∈ E(S), we denote as te (S) the time interval on which S assigns e. µu,e P µu,c + µu,p ρtu,e = σut P X ρtu,e (2) ∀u∈U Total Utility. The total utility for a schedule S, denoted as Ω(S), is computed by considering the expected attendance over all scheduled events. Thus, we have: Ω(S) = X ωete (S) (3) ∀e∈E(S) We formally define the Social Event Scheduling (SES) problem as follows: Social Event Scheduling Problem (SES). Given an integer k, a set of candidate time intervals T ; a set of competing events C; a set of candidate events E; and a set of users U; our goal is to find a feasible schedule Sk that determines how to assign k candidate events such that the total utility Ω is maximized; i.e., Sk = arg max Ω(S) and |S| = k. Next, we show that even in highly restricted instances the SES problem is strongly NP-hard. Competing Events. Let C be a set of competing events. As competing events we define events that have already been scheduled by third parties (e.g., organized by a third party marketing company), and will possibly attract potential attendees of the candidate events. Based on its scheduled time, each competing event c ∈ C is associated with a time interval tc ∈ T . Further, as Ct we denote the competing events that are associated with the time interval t; i.e., Ct = {c ∈ C | tc = t}. P ROOF S KETCH . Our reduction is from the Multiple Knapsack Problem with Identical bin capacities (MKPI), which is known to be strongly NP-hard [8]. In MKPI there are multiple items and bins. Each item has a weight and a profit and all bins have the same capacity. In the reduction, we use the following associations between the MKPI and the SES: (1) bins to Users. Consider a set of users U, for each user u ∈ U and event h ∈ E ∪ C, there is a function µ : U × (E ∪ C) → [0, 1], 1 Event-based mining methods can be used to compute this value, e.g., [1], [3], [4], [10], [16]–[18]. However, this is beyond the scope of this work. Theorem 1. The SES problem is strongly NP-hard. time intervals; (2) capacity to number of available resources; (3) items to events; (4) weight to number of required resources; (5) item profit to likeness; and (6) total profit to expected attendance. Further, in the proof, we consider the following restricted instance of SES: (1) the users are as many as the candidate events; (2) there is only one competing event in each time interval; (3) all users have the same interest value K over the competing events; (4) each user likes only one event and each event is liked only by one user; (5) the K , where p is item profit; (6) the interest function is µ = p 1−p social activity probability is the same for each user and time interval; and (7) there are no location constraints.  Algorithm 1. GRD (k, T , E, C, U) Input: k: number of scheduled events; T : time intervals; E: candidate events; C: competing events; U : users; Output: S: feasible schedule containing k assignments Variables: L: assignment list 6 S ← ∅; L ← ∅; foreach (e, t) ∈ E × T do compute αte .S insert αte into L while |S| < k do t αepp ← popTopAssgn(L) 7 if αepp is valid then 1 2 3 4 5 t 10 11 Assignment Score. Assume a schedule S and an assignment αrt , where r is not previously assigned by S (i.e., r ∈ / E(S)). As assignment score (also referred as score) of an assignment αrt , denoted as αrt .S, we define the gain in the expected attendance by including αrt in S. The assignment score (based on Eq. 2) is defined as: αrt .S = X ωe0 jt − ∀ej ∈ Et (S)∪{r} X ωet i (4) ∀ei ∈ Et (S) Note that, the expected attendance ω 0 of each event after assigning r, differs from the expected attendance ω before the assignment. Also, based on Eq. 2 & 4, it is apparent that the score of an assignment referring to interval t is determined based on all the events assigned to t. Finally, given a set of assignments, the term top assignment refers to the assignment with the largest score. Algorithm Outline. Here we describe a simple greedy algorithm, referred as Greedy algorithm (GRD). The basic idea of GRD is that the assignments between all pairs of event and interval are initially generated. Then, in each step/iteration, the assignment with the largest score is selected. After selecting an assignment, a part of the potential assignment’s scores have to updated. Recall that the assignment’s score is defined w.r.t. the events assigned in the assignment’s interval (Eq. 4). Thus, when an assignment αet is selected, we have to recompute (update) the scores of the assignments referring to t interval. Algorithm Description. Algorithm 1 presents the pseudocode of GRD. At the beginning the algorithm calculates the score, for all possible assignments (line 3). The generated assignments are inserted into list L (line 4). Then, in each step the t assignment αepp with the largest score is found and popped (line 6). If the popped assignment is feasible and the event t ep is not previous assigned (i.e., assignment is valid), αepp is inserted into schedule S (line 8). Until a valid assignment is selected, the assignment with the largest score is popped t and checked. After selecting αepp , the algorithm traverses L, updating the appropriate assignments (loop in line 11). 14 //find & remove the assignment with largest score //insert the top and valid assignment into schedule insert αepp into S if |S| < k then foreach αte ∈ L do //update assignments if t = tp and αte is valid then compute new αte .S; //by Eq. 4 else if αte is not valid then remove αte from L; 8 9 12 First, we define the assignment score; and then we present the GRD algorithm. //by Eq. 4 //initialize assignment list t 13 III. G REEDY A LGORITHM (GRD) //generate assignments return S Finally, the algorithm terminates when k assignments are selected. Complexity Analysis. Initially, the GRD computes the assignments for all event-interval pairs (loop in line 2), which requires O(|E||T ||U|). Note that, each assignment score (Eq. 4) is computed in O(|U|). In the next phase (loop in line 5), the GRD performs k iterations. In each iteration, the popTopAssgn operation (line 6) traverses the L list of size |T |(|E| − i), where 0 P ≤ i ≤ k − 1. Thus, in sum, the k−1 cost for traversing L is O( i=0 |T |(|E| − i)). Additionally, in each iteration (except the last), |E| − (i + 1) assignment updates are performed, in the worst case. Hence, the overall Pk−2 cost for updates is O(|U| i=0 |E| − i − 1)). Therefore, the overall computation cost of GRD in the worst case is O(|U||C| + |E||T ||U| + k|E||T | + k|E||U | − k 2 |T | − k 2 |U|). Finally, the space complexity is O(|E||T |). IV. E XPERIMENTAL A NALYSIS A. Setup Data. In our experiments we use the largest Meetup dataset from [9], which contains data from California. Adopting the same approach as in [11]–[13], [15], in order to define the interest of a user to an event, we associate the events with the tags of the group who organize it. Then, we compute the likeness value using Jaccard similarity over the user-event tags. After preprocessing, we have the Meetup dataset containing 42,444 users and about 16K events. Parameters. Adopting the same setting as in the related works [6], [11]–[13], [15], we set the the default and maximum value of the of scheduled events k, to 100 and 500, respectively. Also, we vary the number of time intervals |T |, from k5 up to 3k, with default value set to 3k 2 . Further, the number of candidate events |E| is set to 2k. In order to select the values for the number of competing events per interval, we analyze the two Meetup datasets from [9]. From the analysis, we found that, on average, 8.1 events are taking place during overlapping intervals. Therefore, the number of competing events per interval is selected by a uniform distribution having 8.1 as mean value. (a) Utility vs. k (b) Time vs. k (c) Utility vs. |T | (d) Time vs. |T | Fig. 1: Varying the number of: (1) scheduled events k; and (2) time intervals |T | Regarding the value for the number of available events’ locations, we consider the percentage of pairs of events that are spatio-temporally conflicting, as specified in [11]. As a result, we set the number of available locations to 25. The social activity probability σut is defined using a Uniform distribution. The performance and the effectiveness of the examined methods are marginally affected by the available/required resources parameters (here as resources we consider organizer’s staff). Hence, we choose a reasonable number based on our scenario, setting the number of available resources to 20. Also, the number of required resources is selected by a uniform distribution defined over the interval [1, 20 3 ]. Methods. In our evaluation we study our method GRD, as well as two baselines. The first baseline method, TOP, computes the assignment scores for all the events and selects the events with top-k score values. The second, denoted as RAND assigns events to intervals, randomly. Note that, since the objective, the solution and the setting of our problem are substantially different (see Sect. I) from the related works [2], [5], [6], [11]–[15], the existing methods cannot be used to solve the SES problem. All algorithms were written in C++ and the experiments were performed on an 2.67GHz Intel Xeon E5640 with 32GB of RAM. B. Results In the first experiment, we study the effect of varying the number of scheduled events k. In terms of utility (Fig. 1a), we observe that, in all cases, GRD outperforms significantly both baselines. The difference between RAND and GRD increases as k increases. This is expected considering the fact that the larger the k, the larger the number of “better”, compared to random, selected assignments. Finally, TOP reports considerably low utility scores in all cases. The results regarding the execution time are depicted in Figure 1b. Note that the computations that are performed due to updates increase with k, while the number of initially computed scores is the same for all k. Also, TOP performs only the initial scores’ computations (there are no score updates). That’s why the difference between the GRD and the TOP increases with k. In the next experiment, we vary the number of time intervals |T |. Regarding utility (Fig. 1c), we observe that, as the number of intervals increases, the utility of GRD and TOP methods increases too. This happens because the increase of available intervals results to a smaller number of events assigned in the same interval, as well as to a larger number of candidate assignments. In terms of execution time (Fig. 1d), for the same reason as in the first experiment, the difference between the GRD and the TOP increases with |T |. V. C ONCLUSIONS This paper introduced the Social Event Scheduling (SES) problem. The goal of SES is to maximize the overall events’ attendance considering several events’ and users’ factors. We showed that SES is strongly NP-hard and we developed a greedy algorithm. ACKNOWLEDGMENT This research has been financed by the European Union through the FP7 ERC IDEAS 308019 NGHCS project, the Horizon2020 688380 VaVeL project and a 2017 Google Faculty Research Award. R EFERENCES [1] I. Boutsis, S. Karanikolaou, and V. Kalogeraki. Personalized event recommendations using social networks. In MDM, 2015. [2] Y. Cheng, Y. Yuan, L. Chen, C. G. Giraud-Carrier, G. Wang. Complex event-participant planning and its incremental variant. In ICDE, 2017. [3] R. Du, Z. Yu, T. Mei, Z. Wang, Z. Wang, and B. Guo. Predicting Activity Attendance in Event-based Social Networks: Content, Context and Social Influence. In UbiComp, 2014. [4] K. Feng, G. Cong, S. S. Bhowmick, and S. Ma. In Search of Influential Event Organizers in Online Social Networks. In SIGMOD, 2014. [5] J. Huang, Y. Zhou, X. Jia, and H. Sun. A novel social event organization approach for diverse user choices. The Computer Journal, 2016. [6] K. Li, W. Lu, S. Bhagat, L. V. Lakshmanan, and C. Yu. On Social Event Organization. In KDD, 2014. [7] X. Liu, Q. He, Y. Tian, W. Lee, J. McPherson, J. Han. Event-based social networks: linking the online and offline social worlds. KDD 2012 [8] S. Martello and P. Toth. Knapsack Problems: Algorithms and Computer Implementations. John Wiley & Sons, 1990. [9] T. N. Pham, X. Li, G. Cong, Z. Zhang. A General Graph-based Model for Recommendation in Event-based Social Networks. In ICDE, 2015. [10] D. Romero, K. Reinecke, L. Robert. The influence of early respondents: information cascade effects in online event scheduling. WSDM 2017 [11] J. She, Y. Tong, and L. Chen. Utility-Aware Social Event-Participant Planning. In SIGMOD, 2015. [12] J. She, Y. Tong, L. Chen, and C. C. Cao. Conflict-aware Eventparticipant Arrangement. In ICDE, 2015. [13] J. She, Y. Tong, L. Chen, and C. C. Cao. Conflict-aware Eventparticipant Arrangement and Its Variant for Online Setting. TKDE, 2016. [14] J. She, Y. Tong, L. Chen, and T. Song. Feedback-Aware Social EventParticipant Arrangement. In SIGMOD, 2017. [15] Y. Tong, J. She, and R. Meng. Bottleneck-aware Arrangement Over Event-based Social Networks: The Max-Min Approach. WWWJ, 2015. [16] T.Xu, H.Zhong, H Zhu, H Xiong, E Chen, G Liu. Exploring the impact of dynamic mutual influence on social event participation. In SDM 2015 [17] W. Zhang, J. Wang, W. Feng. Combining Latent Factor Model with Location Features for Event-based Group Recommendation. KDD, 2013. [18] X. Zhang, J. Zhao, and G. Cao. Who Will Attend? - Predicting Event Attendance in Event-based Social Network. In MDM, 2015.
8cs.DS
1 Bitwise Retransmission Schemes for Resources Constrained Uplink Sensor Networks arXiv:1707.09696v1 [cs.IT] 31 Jul 2017 Mohamed A. M. Hassanien, Pavel Loskot, Salman M. Al-Shehri, Tolga Numanoǧlu, and Mehmet Mert Abstract—Novel bitwise retransmission schemes are devised which retransmit only the bits received with small reliability. The retransmissions are used to accumulate the reliabilities of individual bits. Unlike the conventional automatic repeat request (ARQ) schemes, the proposed scheme does not require a checksum for the error detection. The bits to be retransmitted are reported as a combination number, or two synchronized random number generators (RNGs) at the transmitter and receiver are used to greatly compress the feedback message. The bitwise retransmission decisions and/or combining can be performed after the demodulation or after the channel decoding at the receiver. The bit-error rate (BER) expressions are derived for the case of one and two retransmissions, and verified by computer simulations. Assuming three specific retransmission strategies, the scheme parameters are optimized to minimize the overall BER. For the same number of retransmissions and packet length, the proposed schemes always outperform the frequently used stop-and-wait ARQ. The impact of feedback errors is also considered. Finally, practical designs of the bitwise retransmissions for data fusion from sensor nodes in Zigbee, Wifi and Bluetooth networks are presented. Index Terms—Automatic repeat request, data fusion protocol, feedback signaling, performance analysis, retransmissions. I. I NTRODUCTION It is well-known that feedback cannot improve the information theoretic capacity of memoryless channels [1]. However, the availability of feedback can greatly simplify the encoding and decoding complexity [2]. A good example of such schemes with the reduced implementation complexity due to feedback are the ARQ retransmission schemes [3], [4]. The retransmission schemes are optimized to trade-off the reliability (e.g., the BER), the throughput (or equivalently, delay) and the implementation complexity [5] or the energy consumption [6]. For instance, the retransmissions can comprise a smaller number of bits than in the original packet. The incremental redundancy hybrid ARQ (IR-HARQ) or typeII HARQ schemes progressively reduce the coding rate of the forward error correction (FEC) code with each additional retransmission at the expense of increasing the decoding delay and reducing the throughput [7]. The retransmission decision delays in HARQ schemes were reduced in [8] by exploiting the structure of tail-biting convolutional codes. The permutations of bits in the retransmitted packets are used in MAH, PL and SMA are with the College of Engineering, Swansea University, Bay Campus, Swansea SA1 8EN, United Kingdom (email: {mohmmedali25,salman777881}@hotmail.com, [email protected]) TN and MM are with Aselsan A.S., Communications and IT Division, Ankara, Turkey (email: {tnumanoglu,mmert}@aselsan.com.tr) Corresponding author: Pavel Loskot, tel.: +44 1792 602619, fax: +44 1792 295676 [9] and [10] to improve the reliability of ARQ schemes. A holistic design of the complexity-constrained type-II hybrid ARQ schemes with turbo codes is considered in [11]. The joint design of FEC coding for forward data delivery and reverse feedback signaling is studied in [12] and [13]. The IR diversity and the time-repetition (TR) diversity are compared in [14]. The time and superposition-coding packet sharing between two independent information flows is optimized in [15]; the latter is shown to have a slightly better performance at the expense of larger design and implementation complexity. Such transmission sharing strategies can significantly outperform the conventional HARQ schemes when signal-to-noise ratio (SNR) is sufficiently large [15]. Assuming Gaussian transmission codebooks, the achievable throughput of the HARQ schemes are compared to the ergodic channel capacity in [15], and to the delay-limited channel capacity in [14]. The transmission powers of ARQ schemes are optimized in [14]. Since the received packets typically contain only a few transmission errors, the retransmission efficiency can be improved by the partial ARQ schemes [16]. A truncated type II hybrid ARQ over block fading channels is considered in [17]. In addition to ARQ schemes exploiting a variable number of retransmissions, the variable rate ARQ schemes optimize the number of bits in each retransmission [14], [18], [19]. The number of retransmission bits required for a successful decoding is estimated from the mutual information in [19] and [15]. The pre-defined retransmission patterns are assumed in [16]. The reactive rate-adaptive ARQ strategies [7] usually outperform the proactive strategies [18]. The FEC coding to recover from the transmission errors may be preferred to the ARQ retransmissions in case of multimedia [20]. Except the stop-and-wait ARQ schemes, the go-back-N ARQ retransmissions are optimized, for example, in [21]. A multibit feedback signaling to improve the ARQ performance is considered in [22] and [15]. Other papers account for more realistic design constraints such as a noisy feedback [14], [17], and the channel estimation in [16]. It is shown in [14] that the errors of 1 and 2-bit feedback messages can be neglected if their bit error probability is less than 10−3 , or if these errors are compensated by a non-uniform allocation of the transmission powers. Furthermore, the repetition diversity appears to be more robust to feedback errors than the IR-HARQ [14]. In our conference paper [22], we assumed a multi-bit error-free feedback to evaluate the performance trade-offs between the throughput and the reliability of the segmentationbased and the bitwise ARQ retransmission schemes. Both schemes were found to outperform the stop-and-wait ARQ with the bitwise ARQ providing larger reliability gains than 2 the segmentation-based ARQ, albeit at the expense of a greater complexity of the feedback signaling. In this paper, we revisit the selective bitwise retransmission scheme proposed in [22] to carry out more rigorous performance analysis and to optimize its design. Recall that the proposed scheme aims to accumulate the reliabilities of the least reliable individual bits in the received packet, so it does not require the cyclic redundancy check (CRC) bits to make the retransmission decisions. It can be combined with other FEC coding schemes where the bit reliability is evaluated either before or after the FEC decoding. From the implementation point of view, it is useful to keep the number of retransmitted bits as well as the number of retransmissions constant, for example, to maintain a constant transmission delay and throughput for each data packet. However, a variable rate scheme that retransmits all bits having their reliability below a given threshold is also investigated. The bits with small reliabilities are reported back to the sender using either a binomial combination number, or using a deterministic sequence of bit-permutations. Our analysis assumes multi-bit error free feedback signaling, however, we also evaluate the conditions when such assumption is justifiable. Finally, we consider a more specific systemlevel design of the proposed bitwise retransmission scheme to be employed in an uplink data collection scenario from the resources-constrained sensors to a data fusion access point assuming time-sharing of the transmission channel among the network nodes. The resulting transmission protocol creates fully occupied packets with the retransmitted bits having a higher priority than the newly arrived information bits. The rest of this paper is organized as follows. System model is introduced in Section II. The mathematical theoretic analysis of the proposed bitwise retransmission scheme is carried out in Section III. The retransmission protocols are presented and optimized in Section IV. The uplink data fusion bitwise ARQ scheme is designed in Section V. Conclusions are given in Section VI. The design and analysis of the proposed bitwise retransmission scheme assumes a point-to-point duplex communication link between a source node and a destination node. As shown in [14], the feedback errors in ARQ schemes can be neglected provided that their probability of error is sufficiently small. Hence, in our analysis, we assume the error-free feedback, and in Section IV, we estimate the acceptable probability of feedback bit errors when such assumption is justified in practice. Assuming that M-ary modulation is used for transmission from the source to the destination node, prior to the FEC decoding, the reliability of the received bit bi can be calculated as [23], Pr(bi = 0|y) , i = 1, 2, . . . , log2 M Pr(bi = 1|y) where h is a residual attenuation, possibly after the (multipath) equalization, and w is a zero-mean sample of AWGN. The loglikelihood ratio (LLR) (1) can be then rewritten as,  ∑s∈S(bi =0) exp −|y − hs|2/N0 (2) Λ(bi |y) = log ∑s∈S(bi =1) exp (−|y − hs|2/N0 ) where the M-ary modulation constellation is partitioned as, S = S(bi = 0) ∪ S(bi = 1), depending on the value of the i-th bit bi in modulation symbols, N0 is the power spectral density of the AWGN, and | · | denotes the absolute value. The LLR (1) can be also used as the soft-input decisions to the FEC decoder. On the other hand, we can also use the soft-output decisions produced by the decoder to make the retransmission decisions. In this case, the sums in (2) are done over the corresponding codewords mapped to sequences of M-ary modulation symbols, and the sums in (2) are often approximated using the formula, log ∑i exp(−ai ) ≈ min(ai ). In order to simplify the analysis and illustrate the main concepts, in the sequel, we consider a binary antipodal modulation. Generalization to higher order modulations is straightforward by scaling the demodulated binary symbols by appropriate constants computed for a given M-ary modulation√scheme. Hence, √ assume the transmitted binary symbols S1 = Eb and S2 = − Eb , so the received N-bit packet can be written as, ri = S ji + wi , i = 1, 2, . . . , N where S ji ∈ {S1 , S2 }, and the zero-mean AWGN samples wi  have the constant variance, E |wi |2 = σ2w = N0 /(2|h|2 ). Then, the reliabilities of the received bits are [23], Λ(bi |ri ) ∝ |ri /σw | ≡ |r̄i |. II. S YSTEM M ODEL Λ(bi |y) = log the reception of modulation symbols can be mathematically modeled as, y = hs+ w (1) where y is the received M-ary modulation symbol. For equally probable modulation symbols, assuming coherent detection in a channel with additive white Gaussian noise (AWGN), Finally, the SNR per binary modulation symbol is defined as γb = Eb /N0 . If Rf denotes a fraction of information bits in the sequence of all bits transmitted from the source to the destination, for a fair comparison of different schemes with various rates Rf , we assume the SNR per bit, γb = Eb Rf /N0 . A. Bitwise retransmissions After the initial transmission of N-bit data packet, the destination uses the received bit reliabilities to decide which Wd binary symbols among N received, 0 ≤ Wd ≤ N, should be retransmitted, where d = 1, 2, . . . , D denotes the retransmission index. The retransmission request is a feedback message of Cd ≥ 1 bits sent to the source node from the destination node via a reverse (feedback) link. Consequently, after D retransmissions, the total number of bits sent over the forward link to the destination is, D Nf = N + ∑ Wd d=1 3 C1 N t0 C2 W1 t1 t1 + T1 CD W2 t2 + T2 t2 reverse link WD t3 forward link t tD + TD tD+1 Figure 1. The timings of the proposed bitwise retransmission protocol. whereas the total number of bits sent from the destination to the source over the reverse link is, D Nr = ∑ Cd . d=1 For instance, the conventional stop-and-wait ARQ scheme has the parameters Wd = N and Cd = 1 (ACK or NACK). The retransmitted bits are combined using a maximum ratio (MRC) or other combining method to improve their reliability. The timings of the bitwise retransmission protocol are shown in Fig. 1 where Td represents the delay until the start of transmission of the window of Wd retransmitted bits. The forward transmission rate is then defined as, N N Rf (D) = (3) = N W N + ∑D f d=1 d and the reverse transmission rate is defined as, Nr ∑D d=1 Cd . Rr (D) = = D N + Nr N + ∑d=1 Cd Note that the feedback delays Td are not included in the definition of these rates, since during these time intervals, both forward and reverse links are possibly available for other transmissions. In order to simplify the notation, let W1 = W2 = . . . = WD = W , and C1 = C2 = . . . = CD = C, and we drop the bit index within the packet unless stated otherwise. The W least reliable bits requested for the next retransmission can be identified by sorting the received bits by their reliabilities. A typical sorting algorithm has the complexity O(N log N) [24]. The locations of these W bits within the packet of N bits can be reported back to the sender by the corresponding binomial number. The number of bits representing such feedback message is,    N C = log2 W  N where W is the binomial number, and ⌈·⌉ is the ceiling function. More importantly, even though typically C > W , we always have that, Rf ≫ Rr , as in many other ARQ protocols. Thus, the multi-bit feedback can be very beneficial to improve the performance of ARQ protocols [22]. III. P ERFORMANCE A NALYSIS Given the values of N, W , C, D and γb , we now derive the average BER of the proposed bitwise retransmission scheme. We first assume the case of a single retransmission, i.e., D = 1. We optimize the number of feedback message bits C the forward throughput Rf to minimize the BER, and compare our scheme to the conventional stop-and-wait ARQ. We then perform the similar analysis for D = 2 retransmissions before generalizing the obtained BER expressions to the case of D > 2 retransmissions. Without any retransmissions (i.e., immediately after the new data packet of N bits was received), the conditional probability density function (PDF) of the received bit reliability r̄ can be written as, r √ 2 Eb ) 1 No − (r̄No −2 4N o e fr̄ (r̄|S1 , D = 0) = 2r π √ 2 Eb ) 1 No − (r̄No +2 4N o fr̄ (r̄|S2 , D = 0) = e . 2 π Since the bits are selected for retransmission based on their reliability, we first obtain the BER conditioned on the reliability interval, LD ≤ |r̄| ≤ UD , for some positive constants UD ≥ LD ≥ 0. This BER is equal to the probability of the error event ‘ e’ that S1 was transmitted, however, S2 is decided at the receiver when −UD ≤ r̄ ≤ −LD . With no retransmissions, the probability of such error event is equal to,  Pr ( e|S1 , D = 0) = Pr −U0 ≤ r̄ ≤ −L0 S1 Z −L0 √Eb fr̄ (r̄|S1 , D = 0) dr̄ = √ −U E   0  b    p p L0 U0 2γb 2γb =Q +1 −Q +1 2γb 2γb R 2 where Q(x) = x∞ √12π e−t /2 dt is the Q-function, and due to symmetry, we have, Pr (e|S1 , D = 0) = Pr (e|S2 , D = 0). Assuming the a priori transmission probabilities, Pr (S1 ) = Pr (S2 ) = 1/2, the overall average BER for L0 = 0 becomes,    p  p U0 2γb − Q 2γb +1 . (4) BER0 = Q 2γb Note that, for U0 → ∞, the BER (4) corresponds to the √ BER of uncoded binary antipodal signaling, i.e., BER = Q( 2γb ) [3]. Subsequently, the probability that the reliability of the received bit is in the interval LD ≤ |r̄| ≤ UD without any retransmissions is computed as,   P0|S1 = Pr L0 ≤ |r̄| ≤ U0 S1 Z −L0 Z U0 fr̄ (r̄|S1 , D = 0) dr̄ fr̄ (r̄|S1 , D = 0) dr̄ + L0 −U0       p p L0 U0 2γb 2γb = Q +1 −Q +1 + 2γ 2γ  b  b     p p L0 U0 −1 −Q −1 . Q 2γb 2γb 2γb 2γb = For L0 = 0, this probability is equal to,       p p U0 U0 P0|S1 = 1−Q 2γb 2γb +1 −Q −1 2γb 2γb and P0|S1 → 1 for U0 → ∞. Due to symmetry, and for equally probable symbols Si , we get, P0 = P0|S1 = P0|S2 . Furthermore, if Z is the (random) number of bits having the reliabilities in the interval, 0 ≤ |r̄| ≤ U0 , the mean value of Z, E[Z] = N P0 , can be used to optimize the retransmission window size. For example, by letting W = E[Z], we can control the target BER after the first retransmission. 4 In general, it is convenient to re-scale the received bits after every retransmission and subsequent MRC combining to maintain the constant average energy of the received symbols. In particular, the received symbol after combining the initially received sample r̄0 with the retransmitted and scaled samples r̄d , d = 1, 2, . . . , D, can be written as, ! D 1 r̄MRC = r̄0 + ∑ r̄d . D+1 d=1 In the sequel, let Ld = 0 for ∀d ≥ 0, and, without loss of generality, we assume that the packet of N symbols S1 was transmitted. In the appendix, we show that BER1 can be accurately approximated as,   p  p U0 + 1) + Q 2γb ( 4γb − BER1 ≈ Q 2γb n  2 √  Ak −α− (U )γ ∑ √1 + 2Bk e k,1 0 b Q β+k,1 (U0) γb + k=1  + √ o e−αk,1 (U0 )γb Q β− k,1 (U0 ) γb where the coefficients Ak and Bk , are given in the appendix, and the auxiliary functions, α− k,d (U) = A. BER with one retransmission After the first transmission of the packet of N bits, only those bits that have the reliabilities in the interval 0 ≤ |r̄| ≤ U0 are requested to be retransmitted. After the first retransmission, the bit samples are combined as,  1 2 (r̄0 + r̄1 ) for |r̄0 | ≤ U0 r̄MRC = r̄0 for |r̄0 | > U0 . The random variable r̄0 has the PDF, fr̄ (r̄|S1 , D = 0), whereas the PDF of the random variable r̄1 can be obtained by conditioning on |r̄0 | ≤ U0 . Since the random received samples r̄0 and r̄1 are statistically independent, the PDF of r̄MRC is given by the convolution (denoted as ∗), i.e., fr̄MRC (r̄|S1 , D = 1) = where fr̄ (r̄|S1 , d = 0)φ1 (r̄,U0 )  ∗ fr̄ (r̄|S1 , d = 0) Pr |r̄0 | ≤ U0 S1 , D = 0 φ1 (r̄,U0 ) = η(r̄ + U0 ) (1 − η(r̄ − U0)) and η(r̄) is the unit-step function, i.e., η(r̄) = 1 if r̄ ≥ 0, and 0 otherwise. After some manipulations, the PDF of r̄MRC can be written as, fr̄MRC (r̄|S1 , D = 1) = χ1 (r̄,U0 )  Pr |r̄0 | ≤ U0 S1 , D = 0 where we defined the function, χd (r̄,U0 ) = r r 2  γ r̄−2 Nb o − 4 (d+1)No 1 (d + 1)No e × 4 ! rπ n (d + 1)No (U0 − r̄) + erf 4d ! r o (d + 1)No erf (U0 + r̄) 4d and erf(·) denotes the error function [3]. Assuming that all bits with the reliabilities |r̄0 | ≤ U0 are retransmitted, and then combined using the MRC, the overall BER1 after the first retransmission is computed as [3], BER1 = = Pr (e|d = 0, S1 ) Pr (d = 0|S1 ) + Pr (e|d = 1, S1 ) Pr (d = 1|S1 ) Z −U0 −∞ fr̄ (r̄|S1 , d = 0) dr̄ + Z 0 −∞ χ1 (r̄,U0 ) dr̄. α+ k,d (U) = β− k,d (U) = Bk (d + 1)(2 − U/γb)2 2d(1 + 2Bd k ) Bk (d + 1)(2 + U/γb)2 1 − BdγkUb r , 2B 1+ d k 2(d+1) 2d(1 + 2Bd k ) β+ k,d (U) = 1 + BdγkUb r . 2B 1+ d k 2(d+1) B. BER with two retransmissions Consider now the case with two retransmissions. After the second retransmission, the received bits having the reliabilities |r̄| ≤ U1 are combined with the retransmitted samples r̄2 . The threshold value U1 is chosen to be greater than U0 due to improvement of the bit reliabilities after the first retransmission. More generally, we assume that, UD−1 ≥ UD−2 . . . ≥ U1 ≥ U0 . Hence, the bit-samples after two retransmissions can be written as,  1 (r̄0 + r̄1 + r̄2 ) for |r̄0 | ≤ U0 , 21 |r̄0 + r̄1 | ≤ U1    3 1 for |r̄0 | ≤ U0 , 12 |r̄0 + r̄1 | > U1 2 (r̄0 + r̄1 ) r̄MRC = 1  for U0 < |r̄0 | ≤ U1  2 (r̄0 + r̄2 )  r̄0 for |r̄0 | > U1 . (5) However, in order to make the analysis mathematically tractable, we merge the first two conditions in (5), and consider instead the retransmission scheme,  1  3 (r̄0 + r̄1 + r̄2 ) for |r̄0 | ≤ U0 1 r̄MRC = (6) for U0 < |r̄0 | ≤ U1 2 (r̄0 + r̄2 )  r̄0 for |r̄0 | > U1 having the upper-bound performance than the scheme (5). The scheme (6) can be interpreted as making the decision about the number of retransmissions for each bit already after receiving the initial data packet of N bits. Even though the scheme (6) may unnecessarily retransmit some bits even if their reliability have already reached the desired threshold, our numerical results indicate that, for D = 2, the performance difference is not significant (less than 1 dB). Consequently, the number of retransmissions for each bit can be determined by quantization of the initial reliabilities |r̄0 | using the thresholds U0 and U1 . The bits having the reliabilities |r̄0 | ≤ U0 are always combined with two other retransmitted bits, whereas the received bits 5 with the reliabilities U0 < |r̄0 | ≤ U1 are combined with exactly one retransmission. The PDF fr̄MRC (r̄|S1 , d = 2) of r̄MRC , for |r̄| ≤ U0 , is given as, χ1 (r̄,U0 )  fr̄MRC (r̄|S1 , d = 2) = Pr |r̄0 | ≤ U0 S1 , d = 0 and for U0 < |r̄0 | ≤ U1 , it is given as, fr̄MRC (r̄|S1 , d = 2) = where λd (r̄,Ud ,Ud−1 ) = ( q erf 1 4 q λ1 (r̄,U1 ,U0 )  Pr U0 < |r̄0 | ≤ U1 S1 , d = 0 (d+1)No π exp −  r̄−2 q γb No 4 (d+1)No 2 ! ×  q  (d+1)No (d+1)No (Ud + r̄) + erf (Ud − r̄) − 4d 4d  q ) q (d+1)No (d+1)No (Ud−1 + r̄) −erf (Ud−1 − r̄) . erf 4d 4d For |r̄0 | > U1 , the PDF fr̄MRC (r̄|S1 , d = 2) is given by the PDF fr̄ (r̄|S1 , d = 0). The overall BER2 is obtained using the law of the total probability, i.e., 2 BER2 = ∑ Pr (e|d, S1) Pr (d|S1) = d=0 + Z 0 −∞ Z −U1 −∞ λ1 (r̄,U1 ,U0 ) dr̄ + fr̄ (r̄|S1 , D = 0) dr̄ Z 0 −∞ where the auxiliary functions, θ+− k,d (U) = D −U) √ + √1N + Bk (U d γb U √D 2 γb 1+ d k (d+1)No D +U) √1 + Bk (U√ d γb No − 2B 1+ d k (d+1)No U √D 2 γb D +U) √ + √1N + Bk (U d γb o 2B 1+ d k (d+1)No = |µ(U)| 2 µ(U) = UD √ − γb θ−− k,d (U) o 2B θ−+ k,d (U) = θ++ k,d (U) = U √D 2 γb r (d + 1)No (1 + √2 No 2Bk ) d √kU + 2B γb 1 + 2Bk and sign(·) is the sign function. C. BER with multiple retransmissions For D ≥ 1 retransmissions, the overall BER is calculated as, D BERD = ∑ Pr (e|d, S1) Pr (d|S1) . d=0 χ2 (r̄,U0 ) dr̄ where the probability of the second retransmission of the  same bit is, Pr (d = 2|S1 ) = Pr r̄ ≤ −U1 S1 , d = 1 . As for one retransmission, BER2 can be approximated (see the appendix), √  √  U1 BER2 ≈ Q 2γb ( 2γ + 1) + Q 6γb nb −  √  −α (U )γ Ak (U ) e k,2 0 b Q β+ γb − ∑2k=1 √1+B 0 k,2 k  o √ −α+ (U )γ + e k,2 0 b Q β− k,2 (U0 ) γb n  √  −α− (U )γ 2 √ Ak + ∑t=1 1+2B e k,1 0 b Q β+ (U ) γb 0 k   k,1 √ −α+ (U )γ + e k,1 0 b Q β− (U0 ) γb  k,1 √  −α− (U )γ + 1 b − e k,1 Q βk,1 (U1 ) γb  √ o −α+ (U )γ − e k,1 1 b Q β− . k,1 (U1 ) γb Recall that, for the sake of mathematical tractability, we assume that the received bits with their initial reliability within the interval |r̄| ≤ U0 will be retransmitted D times, the bits with the reliability in the interval U0 < |r̄| ≤ U1 will be retransmitted D − 1 times and so on. The number of the received copies for each reliability range after D retransmissions is shown in Fig. 2. Consequently, the overall BER can be expressed using the functions χD (r̄,UD−1 ) and λD (r̄,UD ,UD−1 ) as, R −U BERD = −∞ D−1 fr̄ (r̄|S1 , D = 0) dr̄ R0 R0 + ∑D−1 i=1 −∞ λi (r̄,UD−i ,UD−i−1 ) dr̄ + −∞ χD (r̄,U0 ) dr̄ where the middle term is zero for D = 1 retransmission. This BER can be accurately approximated as,  p  √  UD−1 + 1 + Q 2γ (D + 1) BERD ≈ Q 2γb 2γ b nb −  √  Ak 2 q − e−αk,D (U0 )γb Q β+ ∑k=1 The probability that the received reliability is in the interval k,D (U0 ) γb 2Bk 1+ D  + U0 ≤ |r̄| ≤ U1 is evaluated as, √ o γb + e−αk,D (U0 )γb Q β− (U )  0 k,D n  P1 = Pr |r̄| ≤ U1 S1 , d = 0 Pr (d = 0|S1 ) + − √  −α (U  D−1 2 R U1 k,i D−i−1 )γb Q β+ (U q Ak + e ) γb ∑ ∑ D−i−1 k=1 i=1 k,i Pr |r̄| ≤ U1 S1 , d = 1 Pr (d = 1|S1 ) = −U1 fr̄ (r̄|S1 , D = 0) dr̄ 2B 1+ i k R U1 R U0   √ − U0 fr̄ (r̄|S1 , D = 0) dr̄ + −U1 χ1 (r̄,U0 ) dr̄. −α+ (U )γ + e k,i D−i−1 b Q β− k,i (UD−i−1 ) γb   This probability can be efficiently approximation as, √ −α− (U )γ − e k,i D−i b Q β+ (UD−i ) γb  √  √ k,i U0 U0  + 1) + Q 2γb ( 2γ − 1) P1 ≈ Q 2γb ( 2γ √ o −α+ (U )γ b b − e k,i D−i b Q β− .  √  √ k,i (UD−i ) γb U1 U1 + 1) − Q − 1) −Q 2γb ( 2γ 2γ ( b 2γ b b The probability PD that the received reliability is in the interval UD−1 ≤ |r̄| ≤ UD is evaluated as, √  √ √  √ +Q 2 γb − U1 /n γb − Q 2 γb+ U1 / γb Z UD Z U0 +  √  Ak e−αk,1 (U0 )γb erf θ+− (U ) γ − ∑2k=1 2√1+2B 0 b P = f (r̄|S , D = 0) dr̄ − fr̄ (r̄|S1 , D = 0) dr̄ k,1 D r̄ 1 k   −UD −U0   ++ √  √ −α− (U )γ −+ 0 b +erf θk,1 (U0 ) γb + e k,1 erf θk,1 (U0 ) γb Z UD D−1 Z UD   o √ λ (r̄,U ,U ) dr̄ + χD (r̄,U0 ) dr̄ + −− i D−i D−i−1 ∑ +sign(µ(U0 )) erf θk,1 (U0 ) γb −UD −UD i=1 6 with the third term being zero for D = 1 retransmission. It is again possible to obtain the approximation of the probability PD for D > 2. However, the resulting expression is much more involved than in the case of P1 and P2 , so it is not presented here. D. BER for slowly varying fading channels Since the wireless links are typically subject to time-varying fading, we can average the BER expressions obtained in the previous subsection over the time-varying received power, for example, following the chi-square distribution. In this  case, γb 1 the received SNR has the PDF, fγb (γb ) = γ¯b exp − γ¯b , where γ¯b = E[γb ] is the average SNR. Moreover, we assume that the SNR variations are sufficiently slow (e.g., assuming that the nodes are nomadic or even stationary), so the SNR can be considered to be constant during the first packet transmission as well as during the subsequent D retransmissions. Then, the long-term average BER is evaluated using the expectation [3], BERD = Z ∞ 0 BERD (γb ) fγb (γb ) dγb . The computationally efficient formula for calculating BERD is displayed below Fig. 2 on the next page. Similarly, the average probability PD is evaluated as, P̄D = Z ∞ 0 PD (γb ) fγb (γb ) dγb . IV. B ITWISE R ETRANSMISSION P ROTOCOLS We consider three specific bitwise retransmission strategies and optimize their parameters to maximize the transmission reliability rather than to maximize their throughput. We also verify mathematical formulas derived in the previous section by computer simulations assuming error-free feedback. This assumption is revisited at the end of this section. A. Fixed rate technique In this design, we assume a constant retransmission window size W determined as,    N 1 −1 W= D Rf for a priori given parameters N, D and the forward rate Rf . Since the window size W is constrained as 1 ≤ W ≤ N, the 1 possible forward rates are restricted to the interval, 1+D < Rf ≤ 1 N . Thus, for W = N, the rate R = , and the proposed f D+N 1+D retransmission scheme corresponds to a block repetition code (BRC) with D repetitions of the original packet. We have the following proposition. Proposition 1: For a given SNR, the fixed rate retransmission technique achieves the minimum BER for some specific value of the rate Rf . The optimum value of Rf minimizing the BER increases with the SNR. Prop. 1 can be proved by letting the derivative ( d/ dRf ) BERD to be equal to zero. For large values of SNR and N, the forward rate Rf approaches its maximum value of 1, so in such case, the overhead due to retransmissions can be neglected. Moreover, when N is large or W = N, the BER of the fixed rate retransmission scheme approaches the BER of the BRC. Fig. 3 and Fig. 4 show the BER of the forward link versus the forward rate Rf for the different number of retransmissions D at two SNR values γb = 0 dB and γb = 5 dB, respectively. We observe that the minimum BER value is more pronounced (i.e., the optimization is more important) for larger values of SNR. The BER curves in Fig. 3 and Fig. 4 also compare the simulations with the approximate expressions given in the previous section; for D > 1, the difference between the approximate expressions and the simulations is negligible. The forward rates Rf yielding the minimum BER are shown in Fig. 5 for the different number of retransmissions D. Finally, Fig. 6 shows the BER versus the SNR γb for the different number of retransmissions D assuming that the forward rate Rf is optimized for each SNR value γb to minimize the achieved BER. Note again that such optimization becomes more effective if the SNR is increased. B. Fixed window technique As for the fixed rate technique, the retransmission window size is fixed, and it is determined as, W = ⌈N P⌋ where the retransmission decision thresholds Ud are set, so that the probabilities P = P0 = P1 = . . . = PD−1 , which have been obtained in the previous section, have the same value. Then, given N, D and W , the forward rate is calculated as, 1 . Rf = 1 + DW /N We have the following proposition. Proposition 2: For a given SNR, the fixed window technique achieves the minimum BER for some value of the retransmission window size. The optimum window size value decreases with the SNR. Prop. 2 can be again proved by letting the derivative, ( d/ dW ) BERD to be equal to zero. When the ratio W /N approaches unity, the BER of the fixed window technique approaches the BER of the BRC. On the other hand, when the ratio W /N approaches zero, the retransmission overhead can be neglected. Fig. 7 and Fig. 8 show the BER versus the normalized window size W /N for the different number of retransmissions D and the SNR values γb = 0 dB and γb = 5 dB, respectively. We again observe a negligible difference between the approximate and the simulated BER curves, especially for larger values of D. In addition, the minimum BER values are more pronounced when the SNR is increased. Fig. 9 shows the normalized window size W /N corresponding to the minimum BER for the different number of retransmissions D. Fig. 10 shows the BER versus the SNR γb for the different number of retransmissions D assuming the optimum value of W /N for each γb minimizing the BER. Note that such minimization of the BER is more effective when the SNR is large. Finally, for the different number of retransmission D, Fig. 11 shows the BER for a slowly varying chi-square distributed, unit-mean received power, provided that the parameters are optimized to minimize the BER. 7 Figure 2. The quantization levels of the bit reliability with D retransmissions. BERD ≈ 1 − 12 t  4 γ¯b (UD−1 /γb +2)2 + ∑ q Ak2B k=1 1+ Dk ( ×  −1/2 −1/2  1 − 12 1 + γ¯ (D+1) b r 1 + γ¯b α− k,D (U0 ) + + 1 + γ¯b(α+ k,D (U0 ) + ( +1 β+ (U0 ) β+ (U0 ) k,D √ ( k,D√2 2 β− (U0 ) β− (U0 ) k,D √ ( k,D√2 2 + r 1 γ¯b r  − β− k,i (UD−i−1 ) βk,i (UD−i−1 ) √ √ (U ) + + 1 + γ¯b α+ ( + D−i−1 k,i 2 2  − β− D−i ) βk,i (UD−i ) k,i (U √ − 1 + γ¯b α+ ( √2 + k,i (UD−i ) + 2 C. Fixed threshold technique Unlike the previous two techniques, the fixed threshold technique allows for different retransmission window sizes while assuming the single constant reliability threshold, U0 = U1 = . . . = UD−1 = U, during each retransmission. Given U, we obtain the probabilities Pd , d = 1, 2, . . . , D, defined previously, and calculate the retransmission window sizes as, Wd = ⌈NPd ⌋ . The corresponding forward rate is given as, Rf = 1 . 1 + ∑D d=1 Wd /N We have the following proposition. Proposition 3: For a given SNR, the fixed threshold technique achieves the minimum BER value for some specific threshold U. This optimum threshold value is increasing with the SNR. Prop. 3 can be again proved by letting the derivative, ( d/ dU) BERD to be equal to zero. 1 γ¯b + α+ k,D (U0 ) +  + β+ k,i (UD−i−1 ) βk,i (UD−i−1 ) √ √ (U ) + 1 + γ¯b α− ( + D−i−1 k,i 2 2  + β+ D−i ) βk,i (UD−i ) k,i (U √ √ (U ) + − 1 + γ¯b α− ( + D−i k,i 2 2 + 2 1 γ¯b r + α− k,D (U0 ) + β− k,D (U0 ) 2 2 !−1 ) ) + α− k,i (UD−i−1 ) + 1 γ¯b β+ k,D (U0 ) 2 !  −1 D−1 t + ∑ ∑ β+ k,i (UD−i−1 ) 2 2  β− k,i (UD−i−1 ) + α+ (U ) + D−i−1 k,i 2 r β+ k,i (UD−i ) + α− (U ) + D−i k,i 2 2 1 γ¯b r β− k,i (UD−i ) + α+ k,i (UD−i ) + 2 2 1 γ¯b   q Ak 2B 1+ k !−1 i i=1 k=1 !−1 !−1 ) 2  × !−1 . Fig. 12 and√ Fig. 13 show the BER versus the normalized threshold U/ Eb for the different number of retransmissions D and the SNR values γb = 0 dB and γb = 5 dB, respectively. Since the approximate BER expressions were already verified for the other two techniques considered, the BER curves in Fig. 12 and Fig. 13 only show these derived expressions. We again observe that the minimum BER values are more apparent when the SNR√is increased. Fig. 14 shows the normalized thresholds U/ Eb having the minimum BER for the different number of retransmissions D. Finally, Fig. 15 shows the BER versus the √SNR γb for different D assuming the optimum thresholds U/ Eb for each SNR γb that achieves the minimum BER. We again find that √ minimization of the BER by optimizing the threshold U/ Eb is more effective when the SNR is increased. D. Feedback signaling There are two main issues when designing practical feedback signaling schemes. The first issue is how to constrain the 8 1 10 sim, D=1 math, D=1 sim, D=2 math, D=2 sim, D=3 math, D=3 sim, D=4 math, D=4 -1.2 D =1 D=2 D=3 D=4 0.95 0.9 Rf BER 0.85 0.8 10 -1.3 0.75 0.7 PSfrag replacements eplacements 0.55 0.6 0.65 0.7 0.75 Rf 0.8 0.85 0.9 0.95 Figure 3. The BER versus the forward rate R f for SNR = 0 dB and the different number of retransmissions D. 10 0.65 0 1 3 4 5 γb [dB] 6 7 8 9 10 0 10 -2 binary, theory BRC sim, D=1 math, D=1 sim, D=2 math, D=2 sim, D=3 math, D=3 sim, D=4 math, D=4 -1 10 -2 10 BERD BER 2 Figure 5. The rate R f yielding the minimum BER versus the SNR γb for the different number of retransmissions D. sim, D=1 math, D=1 sim, D=2 math, D=2 sim, D=3 math, D=3 sim, D=4 math, D=4 10 1 -3 -3 10 -4 10 PSfrag replacements eplacements 10 -4 0.55 0.6 0.65 0.7 0.75 Rf 0.8 0.85 0.9 0.95 1 0 1 2 3 4 5 γb [dB] 6 7 8 9 10 Figure 4. The BER versus the forward rate R f for SNR = 5 dB and the different number of retransmissions D. Figure 6. The BERD versus the SNR γb for the different number of retransmissions D. number of feedback bits. The second issue is the transmission errors of feedback bits. Sending a small number of feedback bits in a dedicated packet is very inefficient due to the associated protocol overheads. In practice, it is common to reserve a few bits within the packet payload for the feedback signaling, so the packet overhead is shared by the feedback as well as data. In such case, it is beneficial to minimize the number of feedback bits in order to increase the data payload. Here, we reduce the number of feedback bits sent from the destination to the source over the reverse link by considering a deterministic sequence of bit permutations synchronously generated at the transmitter and at the receiver to encode the feedback message. Such sequence is conveniently generated as pseudo-random permutations of N-tuples, (1, 2, . . . , N), using the two synchronized RNGs. In addition, the transmitter and the receiver RNGs synchronously advance by exactly 2C1 permutations every symbol period. For every generated permutation, the receiver checks whether a sufficient number of bits with small reliabilities fall into a predefined window of W bits; for instance, we can assume that the retransmission window is represented by the the first W bit positions. When such permutation is found, the feedback message to notify the source is a binary representation of the permutation order modulo 2C1 . The source then selects the corresponding W bits in the packet, and retransmits them to the destination. In particular, for the window size W , the number of permutations K searched until the desired one has been found can be expressed as, K = 2C1 I + (K mod 2C1 ) 9 0.35 0.3 W/N, W/N, W/N, W/N, D D D D 8 9 =1 =2 =3 =4 0.25 -1.2 BER W /N 10 0.2 0.15 sim, D=1 math, D=1 sim, D=2 math, D=2 sim, D=3 math, D=3 D=4 PSfragsim, replacements math, D=4 -1.3 10 replacements 0 0.2 0.4 W /N 0.6 0.8 0.1 0.05 0 0 1 Figure 7. The BER versus the normalized window size W /N for SNR = 0 dB and the different number of retransmissions D. 1 2 3 4 5 γb [dB] 6 7 10 Figure 9. The normalized window size W /N yielding the minimum BER versus the SNR γb for the different number of retransmissions D. -2 0 10 10 binary, theory BRC sim, D=1 math, D=1 sim, D=2 math, D=2 sim, D=3 math, D=3 sim, D=4 math, D=4 -1 10 -2 BERD BER 10 -3 10 sim, D=1 math, D=1 sim, D=2 math, D=2 sim, D=3 math, D=3 sim, D=4 PSfrag replacements math, D=4 replacements -4 10 0 0.1 0.2 0.3 0.4 0.5 W /N 0.6 0.7 0.8 0.9 Figure 8. The BER versus the normalized window size W /N for SNR = 5 dB and the different number of retransmissions D. where I is an integer number of the idle symbol periods. The key property is that,   N C1 (K mod 2 ) ≪ W  N whereas, on average, E[K] = W . Hence, the feedback message is only represented by C1 bits. The value of C1 is a design parameter, and it trade-offs the feedback message size, and the required delay until the start of the next retransmission [22]. More importantly, given some target BER, the window size W and the average number of searched permutations E[K] are decreasing with the SNR. As shown in Fig. 16, E[K] is only about 30 for all N ≤ 64 when the SNR is at least 10 dB, and thus, the feedback of C1 = 5 bits can be used to find the desired permutation during one symbol period. -3 10 -4 10 0 2 4 γb [dB] 6 8 10 Figure 10. The BERD versus the SNR γb for the different number of retransmissions D. The average forward throughput with one retransmission can be defined as, N ζ1 = . E[I + 1] By simulations, we found that there exists an optimum value C1∗ which minimizes the expected delay E[I + 1], i.e., which maximizes the throughput ζ1 . This optimum value is given as, C1∗ = ⌈−0.5 + log2 E[K]⌋ and it is plotted in Fig. 17 for different values of the packet length N. The corresponding maximum throughput ζ∗1 is shown in Fig. 18. For comparison, the throughput 1/2 of the BRC corresponding to the conventional stop-and-wait ARQ with one retransmission is also shown in Fig. 18. More importantly, we observe that the proposed scheme can achieve better 10 0 -2 10 10 binary, theory D=1 D=2 D=3 -1 10 math, D=1 math, D=2 math, D=3 math, D=4 -3 10 -2 BER BER 10 -3 10 -4 10 -4 10 PSfrag replacements eplacements -5 10 -5 0 1 2 3 4 5 γb [dB] 6 7 8 9 10 10 0 1 √ 3 U/ Eb 2 4 -1.1 15 U/Eb , U/Eb , U/Eb , U/Eb , math, D=1 math, D=2 math, D=3 math, D=4 -1.2 10 6 √ Figure 13. The BER versus the normalized threshold U/ Eb for the SNR γb = 5 dB and the different number of retransmissions D. Figure 11. The average BER versus the SNR γb over the slowly varying chi-square distributed transmission power. 10 5 D D D D =1 =2 =3 =4 10 -1.3 √ U/ Eb BER 10 -1.4 10 5 -1.5 10 eplacements -1.6 10 PSfrag replacements 0 0.5 1 √ 1.5 U/ Eb 2 2.5 √ Figure 12. The BER versus the normalized threshold U/ Eb for the SNR γb = 0 dB and the different number of retransmissions D. throughput than the rate 1/D repetition code for the same number of retransmissions D, especially at the medium to large values of SNR. Furthermore, we can show that the throughput of the fixed window technique in the limit of very large SNR N converges to, limγb →∞ ζ1 ≈ N+1 , since limγb →∞ W /N = 0. Finally, we reconsider the assumption of the error-free feedback which is often adopted in many papers concerning the ARQ retransmission schemes. Recall that it was shown in [14] that errors of 1 and 2-bit feedback messages can be neglected if their bit error probability is less than 10−3. This result can be readily modified for the case of multi-bit feedback messages which are utilized in our bitwise retransmission schemes. In particular, assuming the feedback errors are independent, and they are occurring with the probability pr , we have the following proposition. 3 0 0 1 2 3 4 5 γb [dB] 6 7 8 9 10 √ Figure 14. The values of the normalized threshold U/ Eb corresponding to the minimum BER versus the SNR γb for the different number of retransmissions D. Proposition 4: The errors in the feedback messages of C bits can be tolerated, provided that their bit-error probability is bounded as, 1/C pr ≤ 1 − Pmin where the required minimum probability of the error-free feedback messages was established in [14] to be, Pmin = 1 − 10−3 = 99.9%. The proof of Prop. 4 follows from the binomial distribution of independent and equally probable errors. Hence, the longer the feedback message, the smaller the feedback bit error probability pr is required. 11 0 2 10 10 binary, theory BRC math, D=1 math, D=2 math, D=3 math, D=4 -1 10 N=8 N=16 N=32 N=64 -2 1 C1∗ BERD 10 10 -3 10 -4 10 replacements PSfrag replacements 0 0 2 4 γb [dB] 6 8 10 10 Figure 15. The BERD versus the SNR γb for the different number of retransmissions D. 0 1 2 3 4 5 γb [dB] 6 7 8 9 10 Figure 17. The optimum values C1∗ with D = 1 retransmission versus the SNR γb and the different packet length N. 9 10 1 N=8 N=16 N=32 N=64 8 10 0.9 7 10 0.8 6 10 5 10 ζ∗1 E[K] fixed win, N =64 fixed win, N =32 fixed win, N =16 BRC 0.7 4 10 0.6 3 10 0.5 2 10 eplacements PSfrag replacements 1 10 0 1 2 3 4 5 γb [dB] 6 7 8 9 10 0.4 0 5 γb [dB] 10 15 Figure 16. The expected number of permutations E[K] versus the SNR γb and the different packet length N. Figure 18. The throughput ζ∗1 corresponding to the optimum values C1∗ versus the SNR γb and the different packet length N. V. DATA F USION A PPLICATION node technologies: Zigbee 802.15.4, Wifi 802.11b and Bluetooth v. 4.2 802.15.1. The parameters of these three technologies are summarized in Table. I. Their BER expressions have been obtained by fitting the sum of exponentials (the Prony method, [25]) to the performance curves reported in [26]. It is obvious that Zigbee is the most energy efficient technology for the sensor nodes, and it can operate at small SNR values. The specific design examples of the bitwise retransmission schemes with a constant retransmission window size employing the binomial number feedback and the packet segmentation are listed in Table. II. Therein, p f is the BER of the forward link, pr is the BER of the reverse link, Nseg is the number of segments of the disjoint partitioning of the N bit packet, Wseg is the retransmission window size per segment, and Ctot is the total length of the feedback message (in bits) required We now illustrate the use of the proposed bitwise retransmission schemes in a practical scenario of data fusion from a group of L sensor nodes into a single central access point (AP). A time-division multiple access (TDMA) protocol with (L + 1) time slots is used to share the communication channel. The time-division duplex (TDD) protocol further divides the available time slots into L uplink time slots to transmit data from the L sensor nodes, and one time slot is allocated for the feedback signaling from the AP. Each time slot can carry at most N bits of information including the protocol overhead. The AP is assumed not to be battery powered, so the transmit power in the downlink can be much larger than in the battery constrained uplink. More specifically, we consider the following three sensor 12 Table I T RANSMISSION PARAMETERS OF THE THREE SENSOR NODE TECHNOLOGIES Zigbee BER 10−2 10−3 10−4 10−5 10−6 Packet [bytes] N [bits] Segments Pb (γb ) = 1.5203 e−9.5611γb γb [dB] -2.79 -1.16 0.03 0.96 1.73 header 6 payload 127 (6 + 127) × 8 = 1064 14×76, 19×56, 28×38 38×28, 56×19, 76×14 133×8, 152×7, 266×4 532×2, 1064×1 Wifi Pb (γb ) = Bluetooth 0.2436 e−0.4997γb +0.2436 e−0.4997γb γb [dB] 8.91 10.93 12.30 13.34 14.18 header+CRC 2+2 payload 252 (4 + 252) × 8 = 2048 10.0 e−3.4535γb Pb (γb ) +1.1066 e−2.0247γb γb [dB] 3.88 5.43 6.63 7.59 8.37 preamble+header 15–24 payload 1500 (24 + 1500) × 8 = 12192 16×762, 32×381, 48×254 96×127, 127×96, 254×48 381×32, 508×24, 762×16 1016×12, 1524×8, 2032×6 3048×4, 4064×3, 6096×2 12192×1 for the whole packet. Hence, N/Nseg is the segment length, Wseg Nseg = W is the total number of retransmitted bits, and Ctot /Nseg is the length of the feedback message per segment. Furthermore, P̃f is the probability that there are at most Wseg errors in any segment (i.e., the closer the value of P̃f to 1.0, the better), and P̃r is the probability that there is at least one error among the Ctot feedback bits received at the source (i.e., the probability that the feedback message is received incorrectly at the source). As shown in the previous section, it is required that P̃r < Pmin = 10−3 in order to neglect the effect of feedback errors on the performance. Other system parameters are given in Table. I including the packet size N and the required SNR for given values of p f . We found that, to obtain efficient designs of the proposed bitwise retransmission schemes, the BER p f of the forward link should be at most 10−3 , and the BER pr of the reverse link should be at most 10−5. In terms of the minimum required SNR for bidirectional connections, the Zigbee requires −1.16 dB and 0.96 dB, the Wifi requires 5.43 dB and 7.59 dB, and the Bluetooth requires 10.93 dB and 13.34 dB, respectively. Such SNR levels can be satisfied for all three wireless technologies considered, provided that the reverse link has 3 dB larger transmit power than the forward link. Such transmission power unbalances can be readily obtained in the sensor networks with the centralized mains-powered AP. Next, we consider scheduling of the packet contents for our single-cell TDMA/TDD multiple access protocol. We assume that the parameters W , D, N, L and Ctot are constant, even though they can be optimized for the uplink and downlink BERs p f and pr . Recall that all packets have the maximum length of N bits. In the uplink, the nodes send their data as well as schedule the retransmitted bits for the previously transmitted data packets. In the downlink, the AP broadcasts the retransmission requests to all sensor nodes at once. The contents in the uplink packets are scheduled following the following two rules. 1) Include the retransmitted sequences in the order corre- = 16×128, 32×64, 64×32 128×16, 256×8, 512×4 1024×2, 2048×1 Table II T HE BITWISE RETRANSMISSION DESIGNS WITH THE CONSTANT WINDOW SIZE AND THE PACKET SEGMENTATION pf pr Nseg Wseg Ctot P̃f P̃r Zigbee 10−3 10−3 10−3 10−4 10−4 10−4 10−4 10−4 10−4 10−4 10−4 10−5 10−5 10−5 10−5 10−5 10−5 10−5 10−5 10−5 10−5 10−5 2 1 1 4 2 2 2 1 1 1 1 3 4 5 1 1 2 3 1 2 3 4 50 36 44 36 20 36 50 11 20 28 36 0.9978 0.9953 0.9992 0.9997 0.9986 1.0000 1.0000 0.9947 0.9998 1.0000 1.0000 Wifi 10−3 10−4 10−4 10−4 10−4 10−4 10−4 10−4 10−4 10−4 10−6 10−6 10−6 10−6 10−6 10−6 10−6 10−6 10−6 10−6 5.0 · 10−4 3.6 · 10−4 4.4 · 10−4 3.6 · 10−4 2.0 · 10−4 3.6 · 10−4 5.0 · 10−4 1.1 · 10−4 2.0 · 10−4 2.8 · 10−4 3.6 · 10−4 1 4 3 2 2 1 1 1 1 1 21 2 2 3 4 4 5 6 7 8 220 92 69 72 92 50 61 72 83 94 0.9928 0.9962 0.9917 0.9965 0.9996 0.9917 0.9984 0.9997 1.0000 1.0000 Bluetooth 10−2 10−3 10−3 10−3 10−3 10−4 10−4 10−4 10−4 10−4 10−4 10−6 10−6 10−6 10−6 10−6 10−5 10−5 10−5 10−5 10−5 10−5 2 2 1 1 1 4 2 2 1 1 1 18 4 6 7 8 1 1 2 2 3 4 256 72 57 65 73 36 20 38 21 31 40 0.9913 0.9960 0.9949 0.9987 0.9997 0.9987 0.9951 0.9998 0.9988 0.9999 1.0000 2.2 · 10−4 9.2 · 10−5 6.9 · 10−5 7.2 · 10−5 9.2 · 10−5 5.0 · 10−5 6.1 · 10−5 7.2 · 10−5 8.3 · 10−5 9.4 · 10−5 2.6 · 10−4 7.2 · 10−5 5.7 · 10−5 6.5 · 10−5 7.3 · 10−5 3.6 · 10−4 2.0 · 10−4 3.8 · 10−4 2.1 · 10−4 3.1 · 10−4 4.0 · 10−4 sponding to the previously transmitted packets. Only one retransmitted sequence per each previously transmitted packet can be scheduled. 2) Add data bits from the buffered information blocks to 13 Table III T HE UPLINK PACKET CONTENTS FOR N = 1064, W = 4, D = 3, Lpac = 10 # 1 2 3 4 5 6 7 8 9 10 11 12 13 14 packet content D1 (1064) R1,1 (4), D2 (1060) R1,2 (4), D2 (4), D3 (1056) R1,3 (4), R2,1 (4), D3 (8), D4 (1048) R2,2 (4), R3,1 (4), D4 (16), D5 (1040) R2,3 (4), R3,2 (4), R4,1 (4), D5 (24), D6 (1028) R3,3 (4), R4,2 (4), R5,1 (4), D6 (36), D7 (1016) R4,3 (4), R5,2 (4), R6,1 (4), D7 (48), D8 (1004) R5,3 (4), R6,2 (4), R7,1 (4), D8 (60), D9 (992) R6,3 (4), R7,2 (4), R8,1 (4), D9 (72), D10 (980) R7,3 (4), R8,2 (4), R9,1 (4), D10 (84) R8,3 (4), R9,2 (4), R10,1 (4) R9,3 (4), R10,2 (4) R10,3 (4) fill in the whole packet of N bits. Hence, the transmitted packet can contain retransmitted bits for multiple previously transmitted packets, and also data bits from multiple information blocks. As an example, assuming first-in first-out (FIFO) buffering of the information blocks of Nbuf = N = 1064 bits (Zigbee protocol) with Nseg = 2 segments, Wseg = 2 bits, i.e., the retransmission window of W = 2 × 2 = 4 bits, D = 3 retransmissions, and in total Lpac = 10 data packets to be transmitted, the packets content schedule is shown in Table. III. Therein, we use the notation Dl (n) to denote a sequence of n bits belonging to the l-th information block, and Rl,d (m) is the sequence of m retransmitted bits in the d-th retransmission for the l-th information block where the sequence indexes, 1 ≤ l ≤ Lpac , 1 ≤ n ≤ N, 1 ≤ d ≤ D and 1 ≤ m ≤ W . We have the following proposition. Proposition 5: For N ≫ DW , Nbuf = N and Lpac ≥ 1, only the very first information block is completely transmitted in the first packet whereas all other information blocks are split into exactly 2 subsequent packets. The D retransmissions are scheduled into D subsequent packets immediately after the transmission of the corresponding information block was completed. Moreover, only the first Lpac transmitted packets are fully occupied with N bits. The available transport capacity in the last (D + 1) transmitted packets can be used to transmit additional information blocks with the progressively shorter block lengths and/or smaller number of retransmissions. The main assumption required in Prop. 5 is that the total number of retransmitted bits D · W is much smaller than the block length N. If this condition is not satisfied, the packet structure of the retransmission protocol is less predictable. We conclude our discussion about the bitwise retransmission scheme for the uplink data fusion from L sensor nodes by considering the packets structure in the downlink. According to Prop. 5, the AP (the data fusion center) sends the retransmission requests for the l-th information block during the time slots {1, 2, . . . , D}, if l = 1, and {l + 1, l + 2, . . ., l + D}, if l ≥ 2. However, since the information blocks with the index l ≥ 2 are transmitted exactly in 2 subsequent packets with the indexes l and l + 1, the number of retransmission requests contained in the downlink packet first raises to the maximum value of D requests per sensor node. The number of the requests then remain constant until it is gradually decremented to 1 request in the last (D − 1) transmissions. Consequently, we have the last proposition. Proposition 6: The maximum number of sensor nodes Lmax which can be supported by the proposed retransmission scheme is bounded as,   N − Novh Lmax ≤ D ·Ctot where Novh is the protocol overhead, and Ctot is the total number of feedback bits per retransmission and sensor node. For the example presented in Table. III, assuming Novh = 106 bits (10% of N), we have Ctot = 36 bits, so Lmax ≤ 8. A larger number of sensor nodes can be supported by trading off the number of feedback bits Ctot with the number of retransmissions. In addition, it is possible that different sensor nodes set their retransmission parameters differently, for example, to match the SNR they experience in the uplink and downlink. In this case, the value of Lmax in Prop. 6 can be calculated by assuming the maximum total number of feedback bits, max(D ·Ctot ), allowed per any sensor node. VI. C ONCLUSIONS A novel bitwise retransmission scheme was presented to selectively retransmit only the bits which were received with a small reliability. The bitwise retransmission decisions as well as combining can be done either immediately after demodulating the received symbols, or after the channel decoding. In case of the turbo decoding, the bit reliabilities are available as the soft-input (i.e., channel output) or the soft-output values [23]. The locations of the bits to be retransmitted are reported to the source as a binomial combination number. Since the proposed scheme does not involve any complex operations, it does not limit the processing throughput at the receiver nor at the transmitter. The analysis presented in the paper assumes uncoded binary modulation for mathematical tractability and clarity of the presentation. However, the proposed scheme can be readily generalized to non-binary modulations by appropriately scaling the demodulated bits. We derived the overall BER conditioned on the error-free feedback link. The accurate closed-form BER expressions as well as their computationally efficient approximations were presented assuming one and two retransmissions. The approximations were verified by computer simulations. We showed that the bitwise retransmissions can be optimized for the given SNR, especially in the forward link, since the BER curves are convex in the transmission rates as well as in the reliability threshold. In addition to minimizing the BER as investigated in this paper, it is possible to maximize the throughput instead. We next compared the BER and throughput performances of the three specific retransmission strategies which are referred to as the fixed rate technique, the fixed window technique, and the fixed threshold technique. It was shown that, for the same number of retransmissions, and the same packet length, the proposed schemes always outperform the repetition diversity, and, in some cases including the transmissions over time-varying channels, the performance improvement can be 14 significant. Furthermore, in order to reduce the number of feedback bits, we proposed to use two synchronized RNGs at the transmitter and at the receiver which can greatly compress the transmitted binary feedback sequences at the expense of larger delays. We also derived a condition when the impact of feedback errors to the overall performance can be neglected. We then considered practical design issues of multi-user bitwise retransmission schemes for data fusion applications where the sensor nodes forward data packets in the uplink into a centralized AP. The retransmission requests are broadcasted to the sensor nodes from the AP in the downlink. Assuming TDMA/TDD and the Zigbee, Wifi and Bluetooth protocols, we presented the design examples of retransmission parameters. These examples suggest that the efficient designs of the bitwise retransmission schemes can be obtained provided that the BER of the forward link is below 10−3 and the BER of the reverse link is below 10−5 . If the bidirectional link has the same or similar BERs in both directions, the smaller BER in the reverse link can be readily achieved by increasing the transmit power in the downlink (i.e., at the AP). We also devised scheduling of the information and retransmission bits utilizing the FIFO buffering of the information blocks in order to fully fill up the transmitted packets. Finally, we calculated the upper bound on the number of sensor nodes which can be supported by the proposed bitwise retransmission schemes. A PPENDIX We obtain several approximations to efficiently evaluate the integrals in the BER expressions. The approximations are based on the Prony approximation of the Q(x) function [25], 2 Q(x) = 2 ∑ Ak e−Bk x k=1 where A1 = 0.208, A2 =  0.147,B1 = 0.971, and B2 = 0.525. √ Since erf(x) = 1 − 2Q 2x , assuming positive constants H > 0, and hi > 0, i = 1, 2, 3, 4, 5, the expressions for BERD and PD can be approximated using the following expressions. These approximations are used and verified numerically in the figures presented in Section IV. R0 −∞ h1 e (r̄−h2 )2 h3 ≈ ∑tk=1 ≈ R0 − −∞ h1 e Q(h4 (h5 − r̄)) dr̄ R0 −∞ h1 e q h1 A k 2 h1 +h4 2 Bk e 3 − (r̄−h2 )2 h3 ≈ ∑tk=1 A e dr̄  √ π erfc √  Q(h4 (h5 + r̄)) dr̄ R0 −∞ h1 e − (r̄−h2 )2 h3 h1 h3 A k h3 (1+h3 h4 2 Bk ) ≈ √ 2 (r̄−h2 )2 −Bk (h4 (h5 −r̄))2 h3 k 2 B h (h −h )2 − k 4 22 5 h2 +h3 h4 2 h5 Bk 1+h3 h4 Bk h3 (1+h3 h4 2 Bk ) − 2 Ak e−Bk (h4 (h5 +r̄)) dr̄   Bk h4 2 (h2 +h5 )2 − √ 2 2 π erfc √h2 −h3 h4 h52Bk e 1+h3 h4 Bk h3 (1+h3 h4 Bk ) RH −H h1 e RH − (r̄−h2 )2 h3 Q(h4 (h5 − r̄)) dr̄ (r̄−h )2 RH 2 − h2 3 Ak e−Bk (h4 (h5 −r̄)) dr̄ −H h1 e 2 2   B h (h −h ) √ √ − k 4 22 5 n h2 +H+h3 h4 2 (h5 +H)Bk h1 A k h3 π 1+h3 h4 Bk √ e ≈ √ erf 2 h3 (1+h3 h4 2 Bk ) 2 1+h  3 h4 B k  h2 +h3 h4 2 h5 Bk +sign H − 1+h h 2 B 3 4 k o q h2 +h3 h4 2 h5 Bk 2 1 H − + h B ×erf 4 k 2 h3 1+h3 h4 Bk ≈ ∑tk=1 −H h1 e − (r̄−h2 )2 h3 ≈ ∑tk=1 Q(h4 (h5 + r̄)) dr̄ RH −H h1 e √ − (r̄−h2 )2 h3 2 Ak e−Bk (h4 (h5 +r̄)) dr̄ B h 2 (h +h )2 − k 4 22 5 1+h3 h4 Bk ≈ √ h1 h3 Ak π2 e 2 h3 (1+h3 h4 Bk )   o n  2 H−h2 +h3 h4 2 (H+h5 )Bk 5 )Bk √2 +h3 h4 (H−h √ + erf × erf H+h 2 2 h3 (1+h3 h4 Bk ) h3 (1+h3 h4 Bk ) R EFERENCES [1] Goldsmith A, Varaiya P. Capacity of fading channels with channel side information. IEEE Trans. Inform. Theory Nov 1997; 43(6):1986–1992. [2] Cover TM, Thomas JA. Elements of Information Theory. 2nd edn., John Wiley & Sons, 1991. [3] Proakis JG. Digital Communications. 4th edn., McGraw-Hill, 2001. [4] Lin S, Costello DJ. Error Control Coding: Fundamentals and Applications. Prentice-Hall, 1983. [5] Beh KC, Doufexi A, Armour SMD. Performance evaluation of hybrid ARQ schemes of 3GPP LTE OFDMA system. Proc. PIMRC, 2007; 1–5. [6] Wang G, Wu J, Zheng YR. Optimum energy- and spectral-efficient transmissions for delay-constrained hybrid ARQ systems. IEEE Trans. Vehic. Tech. Jul 2016; 65(7):5212–5221. [7] Ji T, Stark W. Rate-adaptive transmission over correlated fading channels. IEEE Trans. Commun. Oct 2005; 53(10):1663–1670. [8] Pai HT, Han YS, Chu YJ. New HARQ scheme based on decoding of tailbiting convolutional codes in IEEE 802.16e. IEEE Trans. Vehic. Tech. Mar 2011; 60(3):912–918. [9] Wengerter C, von Elbwart AGE, Seidel E, Velev G, Schmitt M. Advanced hybrid ARQ technique employing a signal constellation rearrangement. Proc. VTC, vol. 4, 2006; 2002–2006. [10] Jung J, Park H, Lim J. A novel hybrid ARQ scheme based on shift column permutation bit interleaving for OFDM systems. Proc. VTC, 2006; 1–5. [11] Chen H, Maunder RG, Hanzo L. A survey and tutorial on lowcomplexity turbo coding techniques and a holistic hybrid ARQ design example Nov 2013; 15(4):1546–1566. [12] Lucani DE, Médard M, Stojanovic M. On coding for delay-network coding for time-division duplexing. IEEE Trans. Inform. Theory Apr 2012; 58(4):2330–2348. [13] Moreira A, Lucani DE. Coded schemes for asymmetric wireless interfaces: Theory and practice. IEEE J. Select. Areas Commun. Feb 2015; 33(2):171–184. [14] Makki B, i Amat AG, Eriksson T. On noisy ARQ in block-fading channels. IEEE Trans. Vehic. Tech. Feb 2014; 63(2):731–746. [15] Jabi M, Hamss AE, Szczecinski L, Piantanida P. Multipacket hybrid ARQ: Closing gap to the ergodic capacity. IEEE Trans. Commun. Dec 2015; 63(12):5191–5205. [16] Ahmed A, Muhammad Z, Mahmood H, Saqib NA. Partial automatic repeat request transceiver for bandwidth and power efficient multipleinput-multiple-output orthogonal frequency division multiplexing systems 2015; 9(4):476–486. [17] Malkamäki E, Leib H. Performance of truncated type-II hybrid ARQ schemes with noisy feedback over block fading channels. IEEE Trans. Commun. Sep 2000; 48(9):1477–1487. [18] Modiano E. An adaptive algorithm for optimizing the packet size used in wireless arq protocols. Wireless Nets. 1999; 5:279–286. [19] Ahmad RA, Lacan J, Arnal F, Gineste M, Clarac L. Enhancing satellite system throughput using adaptive HARQ for delay tolerant services in mobile communications. WTS, 2015; 1–7. [20] Shih CH, Kuo CI, Shieh CK, Chou YK. Small-block interleaving for low-delay cross-packet forward error correction over burst-loss channels. Int. J. Commun. Syst. 2014; 27:3980–3995. 15 [21] Fujii S, Kaneko T, Hayashida Y. Effectiveness of copy-transmission in Go-Back-N ARQ system with selective repeat in intra-block and with limited retransmissions. Proc. COMSNETS, 2010; 187–192. [22] Hassanien MAM, Loskot P. Improving link reliability complexity tradeoff by exploiting reliable feedback signal. Proc. ISWCS, 2010; 775–779. [23] Biglieri E. Coding For Wireless Channels. Springer, 2005. [24] Knuth D. The Art of Computer Programm. Addison-Wesley, 1998. [25] Loskot P, Beaulieu NC. Prony and polynomial approximations for evaluation of the average probability of error over slow-fading channels. IEEE Trans. Vehic. Tech. Mar 2009; 58(3):119–138. [26] Petrova M, Riihijarvi J, Mahonen P, Labella S. Performance study of IEEE 802.15.4 using measurements and simulations. Proc. WCNC, vol. 1, 2006; 487–492.
7cs.IT
arXiv:1607.02480v1 [cs.AI] 8 Jul 2016 Real-Time Anomaly Detection for Streaming Analytics Subutai Ahmad Numenta, Inc., 791 Middlefield Road, Redwood City, CA 94063 USA SAHMAD @ NUMENTA . COM Scott Purdy Numenta, Inc., 791 Middlefield Road, Redwood City, CA 94063 USA SPURDY @ NUMENTA . COM Abstract Much of the worlds data is streaming, time-series data, where anomalies give significant information in critical situations. Yet detecting anomalies in streaming data is a difficult task, requiring detectors to process data in real-time, and learn while simultaneously making predictions. We present a novel anomaly detection technique based on an on-line sequence memory algorithm called Hierarchical Temporal Memory (HTM). We show results from a live application that detects anomalies in financial metrics in realtime. We also test the algorithm on NAB, a published benchmark for real-time anomaly detection, where our algorithm achieves best-in-class results. 1. Introduction Across every industry, we are seeing an exponential increase in the availability of streaming, time-series data. Largely driven by the rise of the Internet of Things (IoT) and connected real-time data sources, we now have an enormous number of applications with sensors that produce important, continuously changing data. The detection of anomalies in real-time streaming data has practical and significant applications across many industries. There are numerous use cases for anomaly detection, including preventative maintenance, fraud prevention, fault detection, and monitoring. The use cases can be found throughout numerous industries such as finance, IT, security, medical, energy, e-commerce, and social media. We define an anomaly as a point in time where the behavior of the system is unusual and significantly different from past behavior. Under this definition, an anomaly does not necessarily imply a problem. A change might be for a negative reason like the temperature sensor on an engine going up, indicating a possible imminent failure. Or the change might be for a positive reason like web clicks on a new product page are abnormally high, showing strong demand. Either way, the data is unusual and may require action. Anomalies can be spatial, meaning the value is outside the typical range like the first and third anomalies in Figure 1. They can also be temporal, where the value isn’t outside the typical range but the sequence in which it occurs is unusual. The middle anomaly in Figure 1 is a temporal anomaly. Real-time applications impose their own unique constraints for machine learning. Anomaly detection in streaming applications is particularly challenging. The detector must process data and output a decision in real-time, rather than making many passes through batches of files. In most scenarios the number of sensor streams is large and there is little opportunity for human, let alone expert, intervention. As such, operating in an unsupervised, automated fashion (e.g. without manual parameter tweaking) is often a necessity. The underlying system is often non-stationary, and detectors must continuously learn and adapt to changing statistics while simultaneously making predictions. The goal of this paper is to introduce a novel anomaly detection technique designed for such real-time applications. We show how to use Hierarchical Temporal Memory (HTM) networks (Hawkins & Ahmad, 2016; Padilla et al., 2013; Rozado et al., 2012) in a principled way to robustly detect anomalies in a variety of conditions. The resulting system is efficient, extremely tolerant to noisy data, continously adapts to changes in the statistics of the data, and detects very subtle anomalies while minimizing false positives. We show qualitative examples from a real-time financial anomaly detection application. We also report leading results on an open benchmark for real-time anomaly detection. The algorithm has been deployed commercially, and we discuss some of the practical lessons learned from these deployments. We have made the complete source code (including end application code) available in open source Real-Time Anomaly Detection repositories 1 . Figure 2. CPU utilization (percent) for an Amazon EC2 instance. A change to the software running on the machine caused the CPU usage to change. Continuous learning is essential for performing anomaly detection on streaming data like this. Figure 1. The figure shows real-world temperature sensor data from an internal component of a large industrial machine. Anomalies are labeled with red circles. The first anomaly was a planned shutdown. The third anomaly is a catastrophic system failure. The second anomaly, a subtle but observable change in the behavior, indicated the actual onset of the problem that led to the eventual system failure. 2. Related Work Anomaly detection in time-series is a heavily studied area, dating back to (Fox, 1972). Some techniques, like classification-based methods, are supervised or semisupervised. While labelled data can be used to improve results, supervised techniques are typically unsuitable for anomaly detection (Görnitz et al., 2013). Figure 2 illustrates the need for continuous learning, which is not typically possible with supervised algorithms. Other techniques, like simple thresholds, clustering, and exponential smoothing, are only capable of detecting spatial anomalies. Holt-Winters is an example of the latter that is commonly implemented for commercial applications (Szmit & Szmit, 2012). Also commonly used in practice are change point detection methods, which are capable of identifying temporal anomalies. The typical approach is to model the time series in two independent moving windows and detect when there is a significant deviation in the time series metrics (Basseville & Nikiforov, 1993). These methods are often extremely fast to compute and have low memory overhead. The detection performance of these statistical techniques can be sensitive to the size of the windows and thresholds. This sometimes results in many false positives as the data changes, requiring frequent updates to the thresholds in order to detect anomalies while minimizing false positives. 1 Please see http://numenta.org The Skyline project provides an open source implementation of a number of statistical techniques for detecting anomalies in streaming data (Stanway, 2013). The different algorithms can be combined into an ensemble. The Skyline algorithms are included in our results. There are other algorithms capable of detecting temporal anomalies in complex scenarios. ARIMA is a general purpose technique for modeling temporal data with seasonality (Bianco et al., 2001). It is effective at detecting anomalies in data with regular daily or weekly patterns. It is not capable of dynamically determining the period of seasonality, although extensions have been developed for doing so (Hyndman & Khandakar, 2008). A technique for applying ARIMA to multivariate data has also been studied (Tsay, 2000). Bayesian change point detection methods are a natural approach to segmenting time series and can be used for online anomaly detection (Adams & Mackay, 2007; Tartakovsky et al., 2013). Some additional techniques for general purpose anomaly detection on streaming data include (Keogh et al., 2005; Rebbapragada et al., 2009). Yahoo released the open source EGADS framework for time series anomaly detection that pairs time series forecasting techniques with common anomaly detection algorithms (Laptev et al., 2015). Twitter released its own open source anomaly detection algorithms for time series data (Kejariwal, 2015). Both are capable of detecting spatial and temporal anomalies. Empirical comparison with Twitter’s detection software are included in our results. There have been a number of model-based approaches applied to specific domains. These tend to be extremely specific to the domain they are modeling. Examples include anomaly detection in aircraft engine measurements (Simon & Rinehart, 2015), cloud datacenter temperatures (Lee et al., 2013), and ATM fraud detection (Klerx et al., 2014). While these approaches may have success in a spe- Real-Time Anomaly Detection cific domain, they are not suitable for general purpose applications. We have reviewed some of the algorithms most relevant to our work. A comprehensive literature review is outside the scope of this paper but there are several thorough reviews of anomaly detection techniques for further reading (Chandola et al., 2009; Hodge & Austin, 2004; Chandola et al., 2008). In this paper we focus on using Hierarchical Temporal Memory (HTM) for anomaly detection. HTM is a machine learning algorithm derived from neuroscience that models spatial and temporal patterns in streaming data (Hawkins & Ahmad, 2016; Rozado et al., 2012). HTM compares favorably with some state of the art algorithms in sequence prediction, particularly complex non-Markovian sequences (Cui et al., 2015; Padilla et al., 2013). HTMs are continuously learning systems that automatically adapt to changing statistics, a property particularly relevant to streaming analytics. perform anomaly detection we utilize two different internal representations available in the HTM. Given an input xt , the vector a(xt ) is a sparse binary code representing the current input. We also utilize an internal state vector π(xt ) which represents a prediction for a(xt+1 ), i.e. a prediction of the next input xt+1 . The prediction vector incorporates inferred information about current sequences. In particular, a given input will lead to different predictions depending on the current detected sequence and the current inferred position of the input within the sequence. The quality of the prediction is dependent on how well the HTM is modeling the current data stream. See (Hawkins & Ahmad, 2016) for a more detailed explanation of these representations. Figure 3. The primary functional steps in our algorithm. 3. Anomaly Detection Using HTM Typical streaming applications involve analyzing a continuous stream of data occurring in real-time. Such applications contain some unique challenges. We formalize this as follows. Let the vector xt represent the state of a real-time system at time t. The model receives a continuous stream of inputs: . . . , xt−2 , xt−1 , xt , xt+1 , xt+2 , . . . (1) a(xt ) and π(xt ) are recomputed at every iteration but do not directly represent anomalies. In order to create a robust anomaly detection system we introduce two additional steps. We first compute a raw anomaly score from the two sparse vectors. We then compute an anomaly likelihood value which is thresholded to determine whether the system is anomolous. Figure 3 shows a block diagram of our algorithm. These two steps are detailed below. We then describe how to robustly handle a larger system consisting of multiple distinct models. Consider for example, the task of monitoring a datacenter. Components of xt might include CPU usage for various servers, bandwidth measurements, latencies of servicing requests, etc. At each point in time t we would like to determine whether the behavior of the system up to that point is unusual. One of the key challenges is that the determination must be made in real-time, i.e. before time t + 1 and without any look ahead. In practical applications, the statistics of the system can change dynamically. For example, in a production datacenter, software upgrades might be installed at any time that alter the behavior of the system (Figure 2). Any retraining of a model must be done on-line, again before time t + 1. Finally, the individual measurements are not independent and contain significant temporal patterns that can be exploited. The raw anomaly score will be 0 if the current input is perfectly predicted, 1 if it is completely unpredicted, or somewhere in between depending on the similarity between the input and the prediction. HTM is a learning algorithm that appears to match the above constraints. HTM networks are continuously learning and model the spatiotemporal characteristics of their inputs. HTMs have been shown to work well for prediction tasks (Cui et al., 2015; Padilla et al., 2013) but HTM networks do not directly output an anomaly score. In order to An interesting aspect of this score is that branching sequences are handled correctly. In HTMs, multiple predictions are represented in π(xt ) as a binary union of each individual prediction. Similar to Bloom filters, as long as the vectors are sufficiently sparse and of sufficient dimensionality, a moderate number of predictions can be represented 3.1. Computing the Raw Anomaly Score We compute a raw anomaly score that measures the deviation between the model’s predicted input and the actual input. It is computed from the intersection between the predicted and actual sparse vectors. At time t the raw anomaly score, st , is given as: st = 1 − π(xt−1 ) · a(xt ) |a(xt )| (2) Real-Time Anomaly Detection simultaneously with exponentially small chance of error (Bloom, 1970; Ahmad & Hawkins, 2016). The anomaly score handles branching sequences gracefully in the following sense. If two completely different inputs are both possible and predicted, receiving either input will lead to a 0 anomaly score. Any other input will generate a positive anomaly score. Changes to the underlying system are also handled gracefully due to the continuous learning nature of HTMs. If there is a shift in the behavior of the system, the anomaly score will be high at the point of the shift, but will automatically degrade to zero as the model adapts to the “new normal”. Shifts in the temporal characteristics of the system are handled in addition to spatial shifts in the underlying metric values. (See Results section for some examples.) step. Rather than thresholding the raw score directly, we model the distribution of anomaly scores and use this distribution to check for the likelihood that the current state is anomalous. The anomaly likelihood is thus a metric defining how anomalous the current state is based on the prediction history of the HTM model. To compute the anomaly likelihood we maintain a window of the last W raw anomaly scores. We model the distribution as a rolling normal distribution where the sample mean and variance are continuously updated from previous anomaly scores as follows: Pi=W −1 i=0 µt = σt2 = st−i (3) k Pi=W −1 (st−i − µt )2 k−1 i=0 (4) We then compute a recent short term average of anomaly scores, and apply a threshold to the Gaussian tail probability (Q-function, (Karagiannidis & Lioumpas, 2007)) to decide whether or not to declare an anomaly2 . We define the anomaly likelihood as the complement of the tail probability:  Lt = 1 − Q µ̃t − µt σt  (5) where: Figure 4. A very noisy, unpredictable stream. The data shows the latency (in seconds) of a load balancer on a production website. The red dot shows the approximate location of an unusual increase in latencies. 3.2. Computing Anomaly Likelihood The raw anomaly score described above represents an instantaneous measure of the predictability of the current input stream. This works well for predictable scenarios but in many practical applications, the underlying system is inherently noisy and unpredictable. In these situations it is often the change in predictability that is indicative of anamolous behavior. As an example, consider Figure 4. This data shows the latency of a load balancer in serving HTTP requests on a production web site. Although the latency is generally low, it is not unusual to have occasional random jumps, and the corresponding spike in anomaly score. Thresholding the raw anomaly score directly would lead to many false positives. However, a sustained increase in the frequency of high latency requests, as shown in the second half of the figure, is unusual and thus reported as an anomaly. To handle this class of scenarios, we introduce a second Pi=W 0 −1 µ̃t = i=0 st−i j (6) W 0 here is a window for a short term moving average, where W 0  W . We threshold Lt and report an anomaly if it is very close to 1: anomaly detected ≡ Lt ≥ 1 −  (7) It is important to note that this test is applied to the distribution of anomaly scores, not to the distribution of underlying metric values xt . As such, it is a measure of how well the model is able to predict, relative to the recent history. In clean predictable scenarios Lt behaves similarly to st . In these cases the distribution of scores will have very small variance and will be centered near 0. Any spike in st will similarly lead to a corresponding spike in Lt . However in scenarios with some inherent randomness or noise, the variance will be wider and the mean further from 0. A 2 The Guassian tail probability is the probability that a Gaussian variable will obtain a value larger than x standard deviations above the mean. Real-Time Anomaly Detection single spike in st will not lead to a significant increase in Lt but a series of spikes will. Interestingly, a scenario that goes from wildly random to completely predictable will also trigger an anomaly. Since thresholding Lt involves thresholding a tail probability, there is an inherent upper limit on the number of alerts. With  very close to 0 it would be unlikely to get alerts with probability much higher than . This also imposes an upper bound on the number of false positives. Under the assumption that anomalies themselves are also extremely rare, the hope is that the ratio of true positives to false positives is always in a healthy range (see Results below). Although we use HTM as the underlying temporal model, the likelihood technique is not specific to HTMs. It could be used with any other algorithm that outputs a sparse code or scalar anomaly score. The overall quality of the detector will be dependent on the ability of the underlying model to represent the domain. 3.3. Combining Multiple Independent Models Many industrial or complex environments contain a large number of sensory data streams. In theory, given sufficient resources, it is possible to create one large complex model with the entire vector stream as input. In practice, it is common to decompose a large system into a number of smaller models. It is easier to train smaller models because the complexity of training and inference grows much faster than linearly with the size of the input dimensionality (Bishop, 2006). Thus decomposing the solution into a set of smaller models may lead to improved accuracy and much faster performance. However, even with such a decomposition, it is important to compute a global measure that accumulates the results of individual models and indicates whether those portions of the system are in an unusual state. As an example, consider a datacenter running a production website. An automated alerting system might need to continually decide whether to generate an alarm and possibly wake up the on-call engineer. We assume the inputs representing the system are broken up into M distinct models. Let xm t be the input at time t to the m’th model, and sm t be the raw anomaly scores associated with each model. We wish to compute a global metric indicating the overall likelihood of an anomaly in the system (see Figure 5). One possible approach is to estimate the joint distribution −1 P (s0t , . . . , sM ) and apply a threshold to the tail probat bility. It can be challenging to model the joint distribution, particularly in a streaming context. If we further assume the models are independent, we could simplify and instead estimate: Figure 5. Functional diagram illustrating a complex system with multiple independent models. −1 P (s0t , . . . , sM )= t i=M Y−1 P (sit ) (8) i=0 Given this, a version of our anomaly likelihood can be computed as: 1− i=M Y−1 i=0  Q µ̃it − µit σti  (9) There is one flaw with the above methodology. In real-time dynamic scenarios, critical problems in one part of the system can often cascade to other areas. Thus there are often random temporal delays built in, which can in turn lead to different temporal delays between anomaly scores in the various models (Kim et al., 2013). For example, a situation where multiple unusual events occur close to one another in different models is far more unlikely and unusual than a single event in a single model. It is precisely these situations which are valuable to detect and capture in a complex system. Ideally we would be able to estimate a joint distribution of anomaly scores that go back in time, i.e. −2 M −1 P (s0t−j , s1t−j , . . . , sM , st ). In theory this would capt ture all the dependencies, but this is even harder to estimate than the earlier joint probability. Alternatively, in situations where the system’s topology is relatively clear and under your control, it is possible to create an explicit graph of dependencies, monitor expected behavior between pairs of nodes, and detect anomalies with respect to those expectations. This technique has been shown to enable very precise determination of anomalies in websites where specific calls between services are monitored (Kim et al., 2013). However in most applications this technique is also impractical. It may be difficult to model the various dependencies and it is often infeasible to instrument arbitrary systems to create this graph. Real-Time Anomaly Detection We would like to have a system that is fast to compute, makes relatively few assumptions, and is adaptive. We propose a simple general purpose mechanism for handling multiple models by modifying Eq. (9) to incorporate a smooth temporal window. A windowing mechanism allows the system to incorporate spikes in likelihood that are close in time but not exactly coincident. Let G be a Gaussian convolution kernel: G(x; σ) = √ x2 1 exp− 2σ2 2πσ (10) We apply this convolution to each individual model to obtain a final anomaly likelihood score3 : Lt = 1 − i=M Y−1 2(G ∗ Q)( i=0 µ̃it − µit ) σti system is not extremely sensitive to this setting. In all our experiments below, σ = 6. Computational efficiency is important for real-time applications. In our implementation each model requires less than 10 milliseconds per input vector on a current high end laptop. A server based deployment running multiple models in parallel can run about 5,000 models on a high end server. This figure assumes that each input arrives once every 5 minutes (thus each of the 5,000 models needs to output one score every 5 minutes). As a service to the community, we have released the complete source code to the algorithms as well as the server application codebase as open source5 . (11) As before, we detect an anomaly if the combined anomaly likelihood is greater than a threshold Lt ≥ 1−. Eq. 11 represents a principled yet pragmatic approach for detecting anomalies in complex real time streaming applications4 . As before, Lt is an indirect measure, computed on top of the raw anomaly scores from each model. It reflects the underlying predictability of the models at a particular point in time and does not directly model the sensor measurements themselves. Figure 6. Real-time stock anomalies for Feb 4, 2016. 4. Results 3.4. Practical Considerations There are three parameters in the single model scenario: W , W 0 , and . W is the duration for computing the distribution of anomaly scores. The system performance is not sensitive to W as long as it is large enough to compute a reliable distribution. The number W 0 controls the short term average of anomaly scores. In all our experiments below, we use a generous value of W = 8000 and W 0 = 10. The parameter  is perhaps the most important parameter. It controls how often anomalies are reported, and the balance between false positives and false negatives. In practice we have found that  = 10−5 works well across a large range of domains. Intuitively, this should represent one false positive about once every 10,000 records. The muliple model scenario introduces one additional parameter, the window width σ. This is somewhat domain dependent but due to the soft Gaussian convolution, the 3 Since this is a real-time system with no look-ahead, the kernel only applies to time ≤ t. As such we use a half-normal distribution as the kernel, hence the additional factor of 2. 4 Due to numerical precision issues with products of probabilities, in our implementation we follow common practice and use summation of log probabilities. We first show examples from a deployed application that qualitatively demonstrates the behavior of our algorithm. We then show quantitative results on benchmark data. We have integrated our anomaly detection algorithm into a live real-time product. The application continuously monitors a large set of financial and social media metrics for a range of securities and alerts users in real time when significant anomalies occur. Figure 6 shows two screenshots from our application that demonstrate the value of realtime anomaly detection to end users. In this example, an anomaly in the volume of Twitter activity (related to a decrease in dividends) preceded a sharp drop in stock price. The Twitter anomaly occurred well before market opening. The underlying data streams are extremely noisy and many of the important anomalies are temporal in nature. Figure 7 shows raw data extracted from our application demonstrating one such anomaly. The figure plots stock trading volume for Facebook for a few hours. Each point represents average trading volume for a period of five minutes. It is normal to see a single spike in trading volume but it is extremely unusual to see two consecutive spikes. Two con5 Please see https://github.com/numenta, specifically the nupic and numenta-apps repositories. Real-Time Anomaly Detection secutive spikes therefore represents a temporal anomaly in this stream. The red dashed line indicates the point at which our algorithm detected the anomaly, i.e. the point in time where Lt ≥ 1 − 10−5 . Figure 8. Q-values derived from two Comcast metrics on Feb 4, 2016. The red dashed line shows the point at which our algorithm detected an anomaly. Figure 7. Stock trading volume for Facebook on Feb 2, 2016. The red dashed line shows the point at which our algorithm detected an anomaly. In this stream two consecutive spikes are highly unusual and represent an anomaly. Figure 8 shows a more detailed example demonstrating the value of combining multiple metrics. The two solid lines indicate the Q-values in Eq (5) for two separate metrics related to Comcast shares. The lower the curve, the more likely it is that the underlying metric is anomalous. When looking at single models independently, an anomaly would only be detected if one of these values drops below  = 10−5 . In this case no anomaly would be detected since neither one dips below that value. However, as shown by the drops, both metrics are behaving unusually. The red dashed line shows the result of detecting an anomaly based on our combined metric, Eq. (11). Because the blue curve is so close to 10−5 , incorporating both metrics correctly flags an anomaly as soon as the black curve dips below 10−1 . As can be appreciated from the chart, it is difficult to line up two metrics precisely, hence the value of the smooth temporal window. 4.1. Results on Real-World Benchmark Data The above sections demonstrate qualitative results on individual data streams. In this section we provide quantitative benchmark results. NAB is a benchmark containing 58 streams with over 350,000 records of real-time streaming data taken from a variety of different applications (Lavin & Ahmad, 2015). The dataset is labeled with anomalies. The first 15% of each data file is reserved for autocalibration. NAB also includes a window around each anomaly, and incorporates a time-sensitive scoring mech- A LGORITHM P ERFECT HTM T WITTER ADV EC E TSY S KYLINE BAYES . C HANGE P T. S LIDING T HRESHOLD R ANDOM NAB S CORE L OW FP L OW FN 100.0 65.3 47.1 35.7 17.7 15.0 11.0 100.0 58.6 33.6 27.1 3.2 0.0 1.2 100.0 69.4 53.5 44.5 32.2 30.1 19.5 Table 1. Performance on the NAB benchmark. The first column indicates the standard NAB score for each algorithm. The last two columns indicate the score for the “prefer low FP” and “prefer low FN” profiles of NAB, representing two specific points on the ROC curve. For comparison we include a “Perfect” detector, an idealized detector that makes no mistakes. anism that favors early detection (as long as detections are within the anomaly windows). ”Application profiles” define the weighting for false positives and false negatives to illustrate scenarios where fewer missed detections or fewer erroneous detections are more valued. The benchmark requires models to use a single set of parameters across all streams to mimic automation in real-world deployments. We ran our HTM based anomaly detector on NAB. Table 1 contains our scores as well as scores for several other algorithms, including Etsy Skyline, Twitter AnomalyDetectionVec (ADVec), and a variant of Bayesian online change point detection (Adams & Mackay, 2007)6 . We include the score for a “Perfect” detector, i.e. an idealized detector that 6 Please see the NAB repository at https://github. com/numenta/NAB for specific implementation and parameter tuning details. Real-Time Anomaly Detection Figure 9. Example NAB results for three different data streams. The shapes correspond to different detectors: HTM, Skyline, and ADVec are diamond, square, and plus respectively. True positives are labeled in black, and false positives are colored red. The pink shaded regions denote NAB’s anomaly windows; any detection within a window is considered a true positive. detects every anomaly as early as possible and generates no false positives. We also include the scores for “sliding threshold” and “random” detectors as baselines for comparison. The HTM detector achieves the best overall score, followed by Twitter ADVec and Etsy Skyline. However, as can be seen by the performance of the Perfect detector, the benchmark is a challenging one with significant room for future improvements. data shown in Figure 1. The anomaly on the left is a somewhat subtle temporal anomaly where the temporal behavior is unusual but individual readings are within the expected range. This anomaly (which preceded the catastrophic failure on February 8) is only detected by HTM. All three detectors detect the anomaly on the right, although Skyline and HTM detect it earlier than ADVec. In this plot HTM and Skyline also each have a false positive. The NAB benchmark doesn’t measure an explicit ROC curve but includes two additional “application profiles” that tradeoff the weighting between false positives and false negatives. The “reward low FP” profile applies a higher cost to false positives. Conversely the “reward low FN” profile applies a higher cost to false negatives. The last two columns of Table 1 show our scores for those two profiles. Although there are individual variations (Twitter in particular improves significantly in the “reward low FN” column), our detector performs best overall indicating that it achieves a good tradeoff between false positives and false negatives. We chose these examples because they illustrate common situations that occur in practice. Qualitatively we have found that temporal changes in behavior often precede a larger, easily detectable, shift. Temporal and sequence based anomaly detection techniques may be able to detect anomalies in streaming data before they are easily visible. We speculate that the early detection in Figure 9(b) is due to the temporal modeling in HTMs as the earlier shift is difficult to detect through purely spatial means. This provides hope that such algorithms can be used in production to provide early warning and perhaps help avoid problems far more reliably than spatial techniques. A closer look at the errors illustrates some interesting situations that arise in real time applications. Figure 9(a) demonstrates the value of continuous learning. This file shows CPU usage on a production server over time and contains two anomalies. The first is a simple spike detected by all algorithms. The second is a sustained shift in the usage. Skyline and HTM both detect the change but then adapt to the new normal (with Skyline adapting quickest). Twitter ADVec however continues to generate anomalies for several days. Skyline scored highest on this stream. Low scores for Bayesian change point detection are due to its strong assumptions regarding a Gaussian or Gamma distribution of data points. Real-world streaming data is messy and these assumptions do not hold in many applications. In data where it does hold (e.g. Figs 2, 9a) the algorithm works well but for most streams (e.g. Figs 1, 4) it does not. Indeed, it is this lack of any consistent distribution across streaming applications that led us to model the distribution of anomaly scores rather than the distribution of metric values. Figure 9(b) and (c) demonstrate temporal anomalies and their importance in early detection. Figure 9(b) is an example demonstrating early detection. All three detectors detect the anomaly but HTM detects it three hours earlier due to a subtle shift in metric dynamics. Figure 9(c) shows a close up of the results for the machine temperature sensor From the standpoint of computational efficiency, on the first author’s laptop, it takes 48 minutes to run NAB’s complete dataset of 365,558 records. This represents an average of 8 milliseconds per record. Real-Time Anomaly Detection 5. Discussion With the increase in connected real-time sensors, the detection of anomalies in streaming data is becoming increasingly important. The use cases cut across a large number of industries; anomaly detection might represent the most significant near-term application for machine learning in IoT. In this paper we have discussed a novel anomaly detection algorithm for real-time streaming applications. Based on HTMs, the algorithm is capable of detecting spatial and temporal anomalies in predictable and noisy domains. A probabilistic formulation allows the user to control the rate of false positives, an important consideration in many applications. We have discussed an extension to large systems with multiple independent models that incorporate temporal windows. Our results show that the algorithm can achieve best in class results on a benchmark of real world data sources. Our system is practical in that it is computationally efficient, automatically adapts to changing statistics, and requires little to no parameter tuning. It is currently in use in commercial applications, and the complete source code to the algorithm is available as open source software7 . There are a number of possible extensions to the algorithm. The error analysis from NAB indicates that the errors from our algorithm are not necessarily correlated with errors from the other two algorithms. As such an ensemble based approach might provide a significant increase in accuracy. The assumption of a Gaussian distribution for anomaly scores is not always correct. Exploring other distributions represents another possible extension that could potentially improve the results. Acknowledgements We thank Alex Lavin, Yuwei Cui, and Jeff Hawkins for many helpful comments and suggestions. References Adams, Ryan Prescott and Mackay, David J. C. Bayesian Online Changepoint Detection. arXiv.org, pp. 7, 2007. doi: arXiv:0710.3742v1. URL http://arxiv.org/ abs/0710.3742. Ahmad, Subutai and Hawkins, Jeff. How do neurons operate on sparse distributed representations? A mathematical theory of sparsity, neurons and active dendrites. pp. arXiv:1601.00720 [q–bio.NC], jan 2016. URL http: //arxiv.org/abs/1601.00720. Basseville, M and Nikiforov, I V. Detection of Abrupt 7 Please see http://numenta.com/nab Changes, volume 2. 1993. Bianco, A. M., Garcı́a Ben, M., Martı́nez, E. J., and Yohai, V. J. Outlier detection in regression models with ARIMA errors using robust estimates. Journal of Forecasting, 20 (8):565–579, 2001. Bishop, Christopher M. Pattern Recognition and Machine Learning, volume 4. Springer, 2006. ISBN 9780387310732. Bloom, Burton H. Space/time trade-offs in hash coding with allowable errors, 1970. ISSN 00010782. Chandola, V., Mithal, V., and Kumar, V. Comparative Evaluation of Anomaly Detection Techniques for Sequence Data. 2008 Eighth IEEE International Conference on Data Mining, pp. 743–748, 2008. ISSN 1550-4786. doi: 10.1109/ICDM.2008.151. Chandola, Varun, Banerjee, A, and Kumar, V. Anomaly detection: A survey. ACM Computing Surveys (CSUR), (September):1–72, 2009. Cui, Yuwei, Surpur, Chetan, Ahmad, Subutai, and Hawkins, Jeff. Continuous online sequence learning with an unsupervised neural network model. pp. arXiv:1512.05463 [cs.NE], 2015. URL http:// arxiv.org/abs/1512.05463. Fox, A J. Outliers in time series. Journal of the Royal Statistical Society, Series B (Methodological), 34(3):350– 363, 1972. ISSN 00359246. Görnitz, Nico, Kloft, Marius, Rieck, Konrad, and Brefeld, Ulf. Toward supervised anomaly detection. Journal of Artificial Intelligence Research, 46:235–262, 2013. ISSN 10769757. doi: 10.1613/jair.3623. Hawkins, Jeff and Ahmad, Subutai. Why Neurons Have Thousands of Synapses, a Theory of Sequence Memory in Neocortex. Frontiers in Neural Circuits, 10(23):1–13, mar 2016. ISSN 1662-5110. doi: 10.3389/fncir.2016.00023. URL http: //journal.frontiersin.org/article/ 10.3389/fncir.2016.00023/abstract. Hodge, Victoria J. and Austin, Jim. A survey of outlier detection methodologies, 2004. ISSN 02692821. Hyndman, Rob J and Khandakar, Yeasmin. Automatic time series forecasting : the forecast package for R Automatic time series forecasting : the forecast package for R. Journal Of Statistical Software, 27(3):1–22, 2008. Karagiannidis, George K. and Lioumpas, Athanaszsios S. An improved approximation for the Gaussian Q-function. IEEE Communications Letters, 11(8):644– 646, 2007. Real-Time Anomaly Detection Kejariwal, Arun. Twitter Engineering: Introducing practical and robust anomaly detection in a time series [Online blog], 2015. URL http://bit.ly/1xBbX0Z. Keogh, Eamonn, Lin, Jessica, and Fu, Ada. HOT SAX: Efficiently finding the most unusual time series subsequence. In Proceedings - IEEE International Conference on Data Mining, ICDM, pp. 226–233, 2005. ISBN 0769522785. doi: 10.1109/ICDM.2005.79. Kim, Myunghwan, Sumbaly, Roshan, and Shah, Sam. Root cause detection in a service-oriented architecture. ACM International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS ’13), pp. 93, 2013. doi: 10.1145/2465529.2465753. Klerx, Timo, Anderka, Maik, Buning, Hans Kleine, and Priesterjahn, Steffen. Model-Based Anomaly Detection for Discrete Event Systems. In 2014 IEEE 26th International Conference on Tools with Artificial Intelligence, pp. 665–672. IEEE, nov 2014. ISBN 978-1-4799-65724. doi: 10.1109/ICTAI.2014.105. Laptev, Nikolay, Amizadeh, Saeed, and Flint, Ian. Generic and Scalable Framework for Automated Time-series Anomaly Detection. In Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1939–1947. ACM, 2015. Lavin, Alexander and Ahmad, Subutai. Evaluating Realtime Anomaly Detection Algorithms the Numenta Anomaly Benchmark. In 14th International Conference on Machine Learning and Applications (IEEE ICMLA’15), Miami, Florida, 2015. IEEE. doi: 10.1109/ ICMLA.2015.141. Lee, Eun Kyung, Viswanathan, Hariharasudhan, and Pompili, Dario. Model-based thermal anomaly detection in cloud datacenters. Proceedings - IEEE International Conference on Distributed Computing in Sensor Systems, DCoSS 2013, pp. 191–198, 2013. doi: 10.1109/ DCOSS.2013.8. Padilla, Daniel E., Brinkworth, Russell, and McDonnell, Mark D. Performance of a hierarchical temporal memory network in noisy sequence learning. In 2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM), pp. 45– 51. IEEE, dec 2013. ISBN 978-1-4673-6053-1. doi: 10.1109/CyberneticsCom.2013.6865779. Rebbapragada, Umaa, Protopapas, Pavlos, Brodley, Carla E., and Alcock, Charles. Finding anomalous periodic time series : An application to catalogs of periodic variable stars. Machine Learning, 74(3):281–313, 2009. ISSN 08856125. doi: 10.1007/s10994-008-5093-3. Rozado, David, Rodriguez, Francisco B., and Varona, Pablo. Extending the bioinspired hierarchical temporal memory paradigm for sign language recognition. Neurocomputing, 79:75–86, mar 2012. ISSN 09252312. doi: 10.1016/j.neucom.2011.10.005. Simon, Donald L and Rinehart, Aidan W. A Model-Based Anomaly Detection Approach for Analyzing Streaming Aircraft Engine Measurement Data. Technical Report 2015-218454, NASA, 2015. Stanway, A. Etsy Skyline, 2013. github.com/etsy/skyline. URL https:// Szmit, MacIej and Szmit, Anna. Usage of modified holtwinters method in the anomaly detection of network traffic: Case studies. Journal of Computer Networks and Communications, 2012, 2012. ISSN 20907141. doi: 10.1155/2012/192913. Tartakovsky, Alexander G., Polunchenko, Aleksey S., and Sokolov, Grigory. Efficient Computer Network Anomaly Detection by Changepoint Detection Methods. IEEE Journal of Selected Topics in Signal Processing, 7(1):4–11, feb 2013. ISSN 19324553. doi: 10.1109/JSTSP.2012.2233713. URL http://ieeexplore.ieee.org/lpdocs/ epic03/wrapper.htm?arnumber=6380529. Tsay, R. S. Outliers in multivariate time series. Biometrika, 87(4):789–804, dec 2000. ISSN 0006-3444. doi: 10. 1093/biomet/87.4.789.
3cs.SY
SCK: A SPARSE CODING BASED KEY-POINT DETECTOR Thanh Hong-Phuoc, Yifeng He, Ling Guan Ryerson Multimedia Research Laboratory, Ryerson University, Toronto, Canada M5B 2K3 ABSTRACT All current popular hand-crafted key-point detectors such as Harris corner, MSER, SIFT, SURF… rely on some specific pre-designed structures for the detection of corners, blobs, or junctions in an image. In this paper, a novel sparse coding based key-point detector which requires no particular predesigned structures is presented. The key-point detector is based on measuring the complexity level of each block in an image to decide where a key-point should be. The complexity level of a block is defined as the total number of non-zero components of a sparse representation of that block. Generally, a block constructed with more components is more complex and has greater potential to be a good keypoint. Experimental results on Webcam and EF datasets [1, 2] show that the proposed detector achieves significantly high repeatability compared to hand-crafted features, and even outperforms the matching scores of the state-of-the-art learning based detector. Index Terms— Key-point, interest point, feature detector, sparse coding, sparse representation 1. INTRODUCTION Detection of key-points has been researched for decades, and a large number of successful key-point detectors have been proposed, which provide a foundation for a vast number of applications in computer vision such as image matching, image registration and object tracking. Currently, there are two main categories of key-point detectors: hand-crafted detectors and learning based detectors. Hand-crafted detectors have attracted much attention since the introduction of corner detection works by Forstner et al., and Harris et al. in the 1980s [3, 4]. Several other outstanding hand-crafted detectors are SIFT [5], SURF [6], MSER [7], and SFOP [8]. Although hand-crafted detectors generally produce good results, they often rely on specific pre-designed structures. In fact, hand-crafted features are known not to be very flexible in different contexts [1, 9] probably due to the nature of pre-designed structures. In practice, there are situations in which a large number of high quality key-points are expected, but cannot be easily located by one specific detector. A common solution is a careful re-selection of an alternative detector or combination of multiple. However, in such cases, if multiple structure types could be detected with a single detector, it would be a simple but very effective solution. Learning based detectors have received increased focus with the recent success of deep learning. The typical examples of learning based detectors are TIDLE [1] and its following work [9]. These works demonstrate significant improvements in the repeatability of the detected key-points in many challenging datasets. However, to achieve this high performance, the state-of-the-art learning based feature detector [9] relies on the output of TIDLE which was trained on a dataset originating from the results of SIFT detectors. Thus, the development of hand-crafted detectors or other type of detectors for creating reliable inputs for the machine learning algorithms is still an important task. In this paper, we introduce a key-point detector which requires no particular pre-designed structures. The proposed detector is shown to be able to detect all types of structures. The detector outperforms the existing hand-crafted feature detectors in terms of the repeatability metric developed by Mikolajczyk et al. [10] on Webcam and EF datasets [1, 2]. Experimental results show that the proposed detector even works better than the current top learning based detector on the matching score metric [10]. The proposed key-point detector is based on counting the total number of non-zero components in the sparse representation of each block in an image. We define the number of non-zero components in a sparse representation as the complexity measure. A formal mathematical definition of the measure is presented in Section 3.2. In general, the more components a block requires to construct, the more complex the block is. Any blocks with the complexity measures falling in a specified range can be considered as good key-points. In the event, the number of expected key-points is limited, suitable key-points can be selected based on a proposed novel strength measure. Our contributions are summarized below: 1. 2. We propose a novel sparse coding based key-point detector requiring no particular hand-crafted structure. We introduce a measure to compare the strength of any key-points detected by the proposed detector. The rest of the paper is organized as follows. In Section 2, we review some popular hand crafted features, and two top learning based feature detectors. In Section 3, the proposed key-point detector is presented. The evaluation results of the proposed detector are reported in Section 4, and the conclusion is presented in Section 5. 2. RELATED WORK 2.1. Hand-crafted feature detector The development of hand-crafted detectors often begins with a human designed structure such as a corner, blob, or junction with some specially predefined characteristics such that the structures are stable and easily found in different images under various transformations. Some typical examples of the detectors of this type are Harris corners [4] for corner detection, SIFT [5], SURF [6], MSER [7] for blob detection, and SFOP [8] for junction detection. Besides the list of the aforementioned detectors, there are a vast number of detectors such as SIFER [11], D-SIFER [12], WADE [13], Edge Foci [2] targeting detection of different structures with various customizations. Although current detectors rely on some more or less different pre-designed structures, the structures share a common factor in that they have some levels of complexity. If we can measure the complexity of the structures of all blocks in an image, we do not need a predefined structure for a key-point detector, which is the motivation for our work. 2.2. Learning based feature detector Recently, a new trend has emerged regarding the enhanced repeatability of key-point based learning methods. Two of the most prominent works are TIDLE [1] and the work in [9] which is developed based on TIDLE’s output. In TIDLE, the key-points in overlapped images captured at different times and seasons with the same viewpoints are first detected by SIFT detectors. Then only blocks around key-points with sufficiently high repeatability are selected as positive samples to train their systems. In [9], the outputs of TIDLE are used as standard patches to train their systems. Both works deliver outstanding improvements in repeatability compared to purely hand-crafted features. However, the works more or less rely on the selection of hand-crafted features to build the training datasets. In other words, a good method to detect reliable key-points as inputs to the training systems is still necessary. The learning based feature detectors, on the other hand, are good ways to enhance the performance in terms of higher repeatability or faster computation. 3. SPARSE CODING BASED KEY-POINT DETECTOR Sparse coding has been widely applied in many different disciplines such as machine learning, neuroscience, and signal processing [14, 15]. The idea of sparse coding is to represent an input signal as the sparsest combination of atoms in a given dictionary. In this section, the proposed sparse coding based algorithm for the detection of key-points in a gray-scale image is presented as follows: 3.1. Pre-filtering A small size low pass filter such as a Gaussian filter is applied to remove noise and small structures in the image. 3.2. Sparse coding based key-point detection A loop through every block 𝑿 of size 𝑛 by 𝑛 in the image is created. For each block, after reshaping 𝑿 to the size 𝑛2 by 1, the mean is subtracted from 𝑿 . Then the difference is normalized to unit amplitude which is noted as 𝑿′ . Next, the sparse representation of the block is found by solving the following optimization problem: 𝜶 = argmin(‖𝑿′ − 𝑫𝜶‖ + 𝜆‖𝜶‖𝑙1 ) (1) where 𝜶 is the sparse representation of the block, 𝑫 is a complete or over-complete dictionary of the sparse coding. The size of the dictionary is 𝑛2 by 𝑘 where k is the number of atoms in the dictionary. The size of 𝜶 is k by 1. The complexity measure (𝑪𝑴) is then defined as follows: 𝑪𝑴 = ‖𝜶‖𝑙0 (2) where ‖𝜶‖𝑙0 is the total number of non-zero components in the sparse representation. If the 𝑪𝑴 of a block falls into a range specified between a lower and upper limit, the point at the center of the block is considered as a key-point. The lower limit is used to guarantee that the detected key-point has a high enough complexity level to be distinct from other points in the image. The upper limit is used to avoid the detection of overly distinctive key-points, which may not be repeatable in different images of the same scenes. The size of the key-point is then selected as the square root of 2 multiplied by half of the block size to cover all pixels (all possible positions of the key-point) belonging to the block. For example, if a center of a block of size 9x9 is considered as a key-point, the size of the key-point is 4.5√2 . The key-point and size selection techniques are application configurable parameters, which provide flexibility. Depending on application, the entire block may be considered as a key-point, or the size of the keypoint may be defined in difference ways. Since biological evidence has revealed that sparse representations are similar to the receptive fields of simple cells in the primary visual cortex [16], sparse coding has been extensively applied in many saliency detectors such as [16, 17], which look similar to the presented detection method at the first glance. However, the saliency detection works are different from ours, since we only consider the structure based key-points, while the saliency detectors focus on visual contents that attract human attention. 3.3. Strength measure (𝑺𝑴) of a key-point Some applications need a limited number of key-points such as top hundred or top thousand points. In such cases, a metric to measure the strength of the detected key-points is necessary, since many key-points given in Section 3.2 have the same level of complexity, this measure cannot be used to sort the points. Therefore, we propose a strength measure for the detector, which is conceptually similar to the corner response in many corner detectors. After thorough experiments, the following metric currently generates the best results in terms of repeatability and matching score: 𝑺𝑴 = 𝑎1 ‖𝜶‖𝑙0 + 𝑎2 ‖𝜶‖𝑙1 (3) where 𝑎1 , 𝑎2 are any positive parameters, which are selected as 1 in our experiments. The proposed metric satisfies the three following conditions to measure the strength of a keypoint given by our detector: 1. 2. 3. A key-point is stronger if more non-zero components are required for the construction of the block around it. A key-point is stronger if larger summation of quantities (coefficients) of each component is required for the construction of the block around it. The metric should provide chance for lower 𝑪𝑴 keypoints to be stronger than higher 𝑪𝑴 key-points. This condition is to diversify the types of the detected keypoints, which means not only key-points with top 𝑪𝑴 values, but also those with lower 𝑪𝑴s could be detected even though only a limited number of key-points are expected. 3.4. Non-maxima suppression After calculating the 𝑺𝑴s of all detected key-points, a small window is slid through all key-points in the image. At any position, a key-point is kept if its 𝑺𝑴 is higher than all of the 𝑺𝑴 s of its neighborhood key-points. Otherwise, it is suppressed. The suppression process contributes to the spreading of the detected key-point types, since it diminishes many nearby key-points which have very similar 𝑪𝑴s. The suppression also helps improve the distribution of key-points in the image, which is good for some situations such as occlusion in which points around a neighborhood are blocked by other objects and unable to be detected by the detector. 4. EXPERIMENTAL RESULTS 4.1. Experimental setup Currently, the sparse coding step is implemented using SPAMs library [14, 15] while other parts are implemented solely with Matlab. The dictionary used is Haar provided by Matlab. The block size is 11 by 11. The two benchmark Webcam and EF datasets [1, 2] are used for the evaluation. They are challenging datasets since the images are captured at different scenes in different contexts such as drastic changes in time, seasons, illumination, or background clutter. Two metrics for the evaluation are repeatability and matching scores [10]. The evaluation code is provided by Mikolajczyk et al. and VLBenchmarks [10, 18]. As defined in [10], the repeatability is the ratio between the number of corresponding feature regions and the smaller number of regions in the common part of an image pair. With a known transformation between two images, two feature regions are considered corresponding if the overlap error of one region in an image and the projected region from another image is less than 0.4. The matching score, meanwhile, is the ratio between the number of correct matches and the smaller detected region number in the image pair. If the distance of a corresponding pair is the minimum in the descriptor space, the match is considered a correct one. Since a large number of features may lead to random matching of features and unreasonably high performance, 1000 key-points per image are considered as in [1, 9]. 4.2. Quantitative results As shown in Table 1, we compare our average repeatability with hand-crafted features such as SIFT [5], SURF [6], MSER [7], SFOP [8], Hessian Laplace [19], Harris Laplace [19], Hessian Affine [19], Harris Affine [19]. Except for our method, the performances of other detectors are collected from [9]. Since we evaluate our method with the same benchmarks, the same evaluation methods, and the same number of key-points (1000/per image), it is a fair comparison. As demonstrated in Table 1, our detector outperforms all hand-crafted detectors by a large margin in Webcam dataset. For EF dataset, it is higher than the top hand-crafted feature by 0.2%. For the matching score, we compare our method with SIFT [5], Hessian Affine (HesAff) [19], and some state-of-the-art learning based features such as T-P24 (the best version of TIDLE) [1], Covariant point detector (CovDet) [20], and state-of-the-art detector [9]. The same evaluation procedure with SIFT descriptor is used, so the data is again collected from [9]. Table 2 shows that our detector outperforms even the top learning based detector on both datasets and has the highest average score. Our score is, however, lower than SIFT on EF. One probable reason is that unlike others, our detector is not currently implemented with the scale invariant algorithm. EF, in fact, contains drastic changes in scale, and the selection of a correct pyramid level affects the descriptor values in the evaluation. The general high performance of our detector could be explained as follows: 1. 2. Since all types of structures such as corners, blobs, junctions or even more sophisticated structures could be detected (See Section 5.2), we have the overall benefits of all different distinctive structures that a detector for a single type structure does not have. Since all low quality structures are filtered out, these structures have no chance to decrease the performance. Other detectors for detecting a specific structure may include high and low quality structures of the type, since other structures cannot be detected to cover the lack of quality. Table 1. Repeatability (%) of different methods on the two benchmark datasets. Method SIFT SURF MSER SFOP Hessian Laplace Harris Laplace Hessian Affine Harris Affine Ours Webcam 29.5 46.0 45.1 43.8 51.1 48.2 42.5 38.4 60.4 5.2. The capacity of detecting all types of structures In basic linear algebra, any vector 𝑿 ∈ 𝑅𝑁𝑥1 can be represented as a linear combination of a complete basis set of vectors of the same dimensions. Since the dictionary we used in the sparse coding step is a complete or over-complete dictionary, whether a block 𝑿 represents a corner, a blob, a junction, or any other sophisticated structure, it can be decomposed into a linear combination of our basis set. If the number of nonzero components in the combination satisfies a predefined complexity range, it will be detected as a keypoint by our method. To illustrate the capacity of detecting all types of structures, Figure 1 is plotted. The x-axis shows the relative 𝑪𝑴 compared to the maximum 𝑪𝑴 available in Figure 2. The y-axis shows the percentage of key-points of other methods that can also be detected by our method. By decreasing 𝑪𝑴 from 100% to 0%, our method gradually detects all the points given by other methods. EF 20.8 39.7 37.1 36.1 38.8 35.7 26.6 22.7 39.9 Table 2. Matching score (%) of different methods on the two benchmark datasets. Dataset Webcam EF Average Detector SIFT HesAff T-P24 CovDet [9] Ours 12.9 10.2 11.6 13.8 5.4 9.6 13.4 5.2 9.3 12.0 4.8 8.4 19.4 6.2 12.8 20.4 6.5 13.5 Figure 1. An illustration for the capacity of detection of all types of structures. 5. DISCUSSION 5.1. The selection of sparse coding technique for the keypoint detector The purpose of sparse coding is to represent an input block with the least number of the components. The ideal case is one or zero component for each block. However, the number of components required to represent each block often varies and is larger for more complex blocks even under the pressure of the sparse coding algorithm. These complex blocks are considered distinctive blocks and good key-points for the detector. This point, in fact, separates our work from other detectors, since we consider the distinctiveness of a key-point based on the number of primitive components for the construction of the block around it, while state-of-the-art detectors consider the distinctiveness as the distinctive shapes existing in the block. Figure 2. An image in Webcam dataset (The image was resized for displaying). 6. CONCLUSIONS We have developed a new type of key-point detector based on sparse coding which requires no particular human designed structures to detect distinctive points in images. Experimental results have shown that our key-point detector demonstrates excellent results on two benchmark datasets. The current work opens a new direction for the researchers in the key-point detector field, and can potentially be applied in numerous vision based applications. 7. REFERENCES [1] Y. Verdie, Kwang Moo Yi, P. Fua and V. Lepetit, "TILDE: A Temporally Invariant Learned DEtector," 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Boston, MA, 2015, pp. 5279-5288. [2] C. L. Zitnick and K. Ramnath, "Edge foci interest points," 2011 International Conference on Computer Vision, Barcelona, 2011, pp. 359-366. [3] W. Forstner and E. Gulch, “A Fast Operator for Detection and Precise Location of Distinct Points, Corners and Centres of Circular Features,” ISPRS Intercommission Conference on Fast Processing of Photogrammetric Data, 1987. [4] C. Harris and M. Stephens, “A Combined Corner and Edge Detector,” Fourth Alvey Vision Conference, 1988. [5] David G. Lowe, "Distinctive image features from scale-invariant keypoints," International Journal of Computer Vision, 60, 2 (2004), pp. 91-110. [6] Herbert Bay, Tinne Tuytelaars, Luc Van Gool, "SURF: Speeded Up Robust Features", Proceedings of the ninth European Conference on Computer Vision, May 2006. [7] J. Matas, O. Chum, M. Urban, and T. Pajdla, “Robust wide baseline stereo from maximally stable extremal regions,” Image and vision computing, 2004. [8] W. Förstner, T. Dickscheid and F. Schindler, "Detecting interpretable and accurate scale-invariant keypoints," 2009 IEEE 12th International Conference on Computer Vision, Kyoto, 2009, pp. 2256-2263. [9] X. Zhang, F. X. Yu, S. Karaman and S. F. Chang, "Learning Discriminative and Transformation Covariant Local Feature Detectors," 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Honolulu, HI, 2017, pp. 4923-4931. [10] K. Mikolajczyk, T. Tuytelaars, C. Schmid, A. Zisserman, J. Matas, F. Schaffalitzky, T. Kadir and L. Van Gool, “A comparison of affine region detectors,” International Journal of Computer Vision, 65(1/2):43-72, 2005. [11] P. Mainali, G. Lafruit, Q. Yang, B. Geelen, L. Van Gool, and R. Lauwereins, “SIFER: Scale-Invariant Feature Detector with Error Resilience,” International Journal of Computer Vision, 104(2):172– 197, 2013. [12] P. Mainali, G. Lafruit, K. Tack, L. Van Gool and R. Lauwereins, "Derivative-Based Scale Invariant Image Feature Detector With Error Resilience," in IEEE Transactions on Image Processing, vol. 23, no. 5, pp. 2380-2391, May 2014. [13] S. Salti, A. Lanza and L. Di Stefano, "Keypoints from symmetries by wave propagation," 2013 IEEE Conference on Computer Vision and Pattern Recognition, Portland, OR, 2013, pp. 2898-2905. [14] J. Mairal, F. Bach and J. Ponce, “Sparse Modeling for Image and Vision Processing,” Foundations and Trends in Computer Graphics and Vision. vol 8. number 2-3. pages 85--283. 2014 [15] J. Mairal, F. Bach, J. Ponce and G. Sapiro, “Online Learning for Matrix Factorization and Sparse Coding,” Journal of Machine Learning Research, volume 11, pages 19-60. 2010. [16] J. Han, S. He, X. Qian, D. Wang, L. Guo and T. Liu, "An Object-Oriented Visual Saliency Detection Framework Based on Sparse Coding Representations," in IEEE Transactions on Circuits and Systems for Video Technology, vol. 23, no. 12, pp. 2009-2021, Dec. 2013. [17] J. Yan, M. Zhu, H. Liu and Y. Liu, "Visual Saliency Detection via Sparsity Pursuit," in IEEE Signal Processing Letters, vol. 17, no. 8, pp. 739-742, Aug. 2010. [18] K. Lenc, V. Gulshan, and A. Vedaldi, VLBenchmarks, http://www.vlfeat.org/benchmarks/, 2012. [19] K. Mikolajczyk and C. Schmid, “Scale & affine invariant interest point detectors,” International Journal of Computer Vision, 60(1):63-86, 2004. [20] K. Lenc and A. Vedaldi, “Learning covariant feature detectors,” ECCV Workshop on Geometry Meets Deep Learning, 2016.
1cs.CV
On Packet Scheduling with Adversarial Jamming and Speedup∗ Martin Böhm1 , Lukasz Jeż2 , Jiřı́ Sgall1 , and Pavel Veselý1 1 Computer Science Institute of Charles University, Prague, Czech Republic, {bohm,sgall,vesely}@iuuk.mff.cuni.cz 2 Institute of Computer Science, University of Wroclaw, Poland, [email protected] arXiv:1705.07018v2 [cs.DS] 5 Oct 2017 Abstract In Packet Scheduling with Adversarial Jamming packets of arbitrary sizes arrive over time to be transmitted over a channel in which instantaneous jamming errors occur at times chosen by the adversary and not known to the algorithm. The transmission taking place at the time of jamming is corrupt, and the algorithm learns this fact immediately. An online algorithm maximizes the total size of packets it successfully transmits and the goal is to develop an algorithm with the lowest possible asymptotic competitive ratio, where the additive constant may depend on packet sizes. Our main contribution is a universal algorithm that works for any speedup and packet sizes and, unlike previous algorithms for the problem, it does not need to know these properties in advance. We show that this algorithm guarantees 1-competitiveness with speedup 4, making it the first known algorithm to maintain 1-competitiveness with a moderate speedup in the general setting of arbitrary packet sizes. We also prove a lower bound of φ + 1 ≈ 2.618 on the speedup of any 1-competitive deterministic algorithm, showing that our algorithm is close to the optimum. Additionally, we formulate a general framework for analyzing our algorithm locally and use it to show upper bounds on its competitive ratio for speedups in [1, 4) and for several special cases, recovering some previously known results, each of which had a dedicated proof. In particular, our algorithm is 3-competitive without speedup, matching the algorithm and the lower bound of Jurdzinski et al. [7]. We use this framework also for the case of divisible packet sizes in which the size of a packet divides the size of any larger packet, to show that a slight modification of our algorithm is 1-competitive with speedup 2 and it achieves the optimal competitive ratio of 2 without speedup, again matching the algorithm and the lower bound of [7]. 1 Introduction We study an online packet scheduling model recently introduced by Anta et al. [1] and extended by Jurdzinski et al. [7]. In our model, packets of arbitrary sizes arrive over time and they are to be transmitted over a single communication channel. The algorithm can schedule any packet of its choice at any time, but cannot interrupt its subsequent transmission; in the scheduling jargon, there is a single machine and no preemptions. There are, however, instantaneous jamming errors or faults at times chosen by the adversary, which are not known to the algorithm. A transmission taking place at the time of jamming is corrupt, and the algorithm learns this fact immediately. The packet whose transmission failed can be retransmitted immediately or at any later time. The objective is to maximize the total size of packets successfully transmitted. In particular, the goal is to develop an online algorithm with the lowest possible competitive ratio. We focus on algorithms with resource augmentation, namely on online algorithms that transmit packets s ≥ 1 times faster than the offline optimum solution they are compared against; such algorithm is often said to be speed-s, running at speed s, or having a speedup of s. We note that this notion has been introduced for a similar job scheduling problem [8], in which speedup is required for constant ratio. In contrast, our problem allows constant ratio with no speedup, so we consider the competitive ratio as a function of it. This deviates ∗ Work partially supported by GA ČR project 17-09142S, GAUK project 634217 and Polish National Science Center grant 2016/21/D/ST6/02402. 1 from previous work, which focused on the case with no speedup or on the speedup sufficient for ratio 1, ignoring intermediate cases. The distinguishing feature of the model is that the number of different packet sizes is a constant and that these packet sizes are considered to be constants. Thus, the additive term in the definition of the competitive ratio may depend on the number and values of the packet sizes. (It is easy to observe that, at speed 1, without such additive term, it is impossible to attain constant competitive ratio that does not depend on packet sizes, even for only two sizes.) 1.1 Previous Results The model was introduced by Anta et al. [1], who resolved it for two packet sizes: If γ > 1 denotes the ratio of the two sizes, then the optimum ratio for deterministic algorithms is (γ + bγc)/bγc, which is always in the range [2, 3). Anta et al. [1] note that their lower bound strategy applies to randomized algorithms as well, but their argument only applies to the adaptive adversary model. To our best knowledge, randomized algorithms for the more common oblivious adversary model were never considered in this setting. Anta et al. [1] demonstrate the necessity of instantaneous error feedback by proving that discovering errors upon completed transmission rules out constant competitive ratio. They also provide improved results for a stochastic online setting. These results were extended by Jurdzinski et al. [7], who proved that the optimum ratio for the case of multiple (though fixed) packet sizes is given by the same formula for the two packet sizes which maximize it. Moreover, Jurdzinski et al. [7] gave further results for divisible packet sizes, i.e., instances in which every packet size divides every larger packet size, for which the optimum ratio is 2. Namely, they generalized the 2-competitive algorithm to a setting with f independent transmission channels (or machines in scheduling parlance); jamming errors on each channel are independent, and a packet can only be transmitted on one channel at a time. Furthermore, for the single channel divisible case, they proved that speed 2 is sufficient for 1-competitiveness in the resource augmentation setting. 1.2 Our results Our main new results concern the analysis of the non-divisible case with speedup, where we show that speed 4 is sufficient for a competitive ratio of 1 (Section 5). However, our major contribution is a uniform algorithm that works well in every setting, together with a uniform analysis framework (Section 4). This contrasts with the results of Jurdzinski et al. [7], where each upper bound was attained by a dedicated algorithm with independently crafted analysis. Moreover, unlike those algorithms, which all require prior knowledge of all possible packet sizes and speedup, in the sense that there are different algorithms for speeds 1 and 2 (only divisible case), with none for intermediate speeds, our algorithm is oblivious in that it requires no such information. Furthermore, our algorithm is more appealing as it is significantly simpler and “work-conserving” or “busy”, i.e., transmitting some packet whenever there is one pending, which is desirable in practice. See Section 2 for the description of our algorithm. To recover the 1-competitiveness at speed 2 and also 2-competitiveness at speed 1 for divisible instances, we have to modify our algorithm slightly, as otherwise we can guarantee 1-competitiveness for divisible instances only at speed 2.5. This is to be expected, as divisible instances are a very special case. The analysis of the modified algorithm for divisible instances is in Section 7. On the other hand, we prove that our original algorithm is 1-competitive on far broader class of “well-separated” instances at sufficient speed: If the ratio between two successive packet sizes (in their sorted list) is no smaller than α ≥ 1, our algorithm is 1-competitive if its speed is at least Sα , which is a non-increasing function of α such that S1 = 4 and limα→∞ Sα = 2; see Section 4.2 for the precise definition of Sα . In Section 3 we demonstrate that the analyses of our algorithm are mostly tight, i.e., that (a) on general instances, the algorithm is no better than (1 + 2/s)-competitive for s < 2 and no better than 4/s-competitive for s ∈ [2, 4), (b) on divisible instances, it is no better than 4/3-competitive for s < 2.5, and (c) it is at least 2-competitive for s < 2, even for two divisible packet sizes. See Figure 1 for a graph of our bounds on the competitive ratio depending on the speedup. In Section 6 we complement these results with two lower bounds on speed that is necessary to achieve 1-competitiveness by a deterministic algorithm. The first one proves that even for two divisible packet sizes, speed 2 is required to attain 1-competitiveness, establishing optimality of our modified algorithm 2 3 Local analysis upper bounds Upper bound from Theorem 4.1 Hard instances for MAIN Competitive ratio 2.5 2 1.5 1 1 2 3 4 5 6 Speedup Figure 1: A graph of our upper and lower bounds on the competitive ratio of MAIN (s). The upper bounds are from Section 4 and the lower bounds are by hard instances from Section 3. and that of Jurdzinski et al. [7] for the divisible case. The second lower bound strengthens the previous construction by showing that for non-divisible instances with more packet sizes, speed φ + 1 ≈ 2.618 is required for 1-competitiveness. Both results hold even if all packets are released together. 1.3 Related Results We first mention a few results concerning the model with adversarial jamming. Anta et al. [3] consider essentially the same problem but with a different objective: minimizing the number and/or the total size of pending (i.e., not yet transmitted) packets. They focus on multiple channels (or machines, as therein the problem is formulated as job scheduling), and investigate what speedup is necessary and sufficient for competitiveness. Note that for 1-competitiveness, minimizing the total size of pending packets is equivalent to our objective. In Sections 4-7 they obtain a tight bound of 2 on speedup necessary for 1-competitiveness for two packet sizes, although in their lower bound of 2 they do not release all packets together, unlike we do in our lower bound constructions. In Section 8 they claim to have a 1-competitive algorithm with speedup 7/2, but the proof is incorrect; even the example in Section 3 showing that our algorithm is no better than 4/s-competitive for s ∈ [2, 4) works the same way for their algorithm. Georgio et al. [6] consider the same problem without any speedup, restricted to jobs of unit size, under various efficiency and correctness measures, again focusing on multiple machines/channels. This article is motivated by distributed computation, and thus distinguishes between different information models and ways in which the machines communicate. In yet another work, Anta et al. [2] consider latency on top of the previous two objectives, and study the competitiveness of popular scheduling algorithms for all these measures. Garncarek et al. [5] consider “synchronized” parallel channels that all suffer errors at the same time. This work distinguishes between “regular” jamming errors and “crashes”, which also cause the algorithm’s state to reset, losing any information stored about the past√events and proves that for two packet sizes the optimum ratio tends to 4/3 for the former and to φ = ( 5 + 1)/2 ≈ 1.618 for the latter as the number f of channels tends to infinity. As mentioned before, Kalyanasundaram and Pruhs [8] introduced resource augmentation. Among other results they proved that a constant competitive ratio is possible with a constant speedup for a preemptive variant of real-time scheduling where each job has a release time, deadline, processing time and a weight and the objective is to maximize the weight of jobs completed by their deadlines on a single machine. Subsequently resource augmentation was applied in various scenarios. Of the most relevant for 3 us are those that considered algorithms with speedup that are 1-competitive, i.e., as good as the optimum. We mention two models that still contain interesting open problems. For real-time scheduling, Phillips et al. [12] considered the underloaded case in which there exists a schedule that completes all the jobs. It is easy to see that on a single machine, the earliest deadline first (EDF) algorithm is then an optimal online algorithm. Phillips et al. [12] proved that EDF on m machines is 1-competitive with speedup 2 − 1/m. (Here the weights are not relevant.) Intriguingly, finding a 1-competitive algorithm with minimal speedup is wide open: It is known that speedup at least 6/5 is necessary, it has been conjectured that speedup e/(e − 1) is sufficient, but the best upper bound proven is 2 − 2/(m + 1) from [11]. See Schewior [13] for more on this problem. Later these results were extended to real-time scheduling of overloaded systems, where for uniform density (i.e., weight equal to processing time) Lam et al. [10] have shown that a variant of EDF with admission control is 1-competitive with speedup 2 on a single machine and with speedup 3 on more machines. For non-uniform densities, the necessary speedup is a constant if each job is tight (its deadline equals its release time plus its processing time) [9]. Without this restriction it is no longer constant, depending on the ratio ξ of the maximum and minimum weight. It is known that it is at least Ω(log log ξ) and at most O(log ξ) [4, 10]; as far as we are aware, closing this gap is still an open problem. 2 Algorithms, preliminaries, notations The general idea of the algorithm is that after each error, we start by transmitting packets of small sizes, only increasing the size of packets after a sufficiently long period of uninterrupted transmissions. It turns out that the right tradeoff is to transmit a packet only if it would have been transmitted successfully if started just after the last error. It is also crucial that the initial packet after each error has the right size, namely to ignore small packet sizes if the total size of remaining packets of those sizes is small compared to a larger packet that can be transmitted. In other words, the size of the first transmitted packet is larger than the total size of all pending smaller packets and we choose the largest such size. This guarantees that if no error occurs, all currently pending packets with size equal to or larger than the size of the initial packet are eventually transmitted before the algorithm starts a smaller packet. We start by some notations. We assume there are k distinct non-zero packet sizes denoted by `i and ordered so that `1 < · · · < `k . For convenience, we define `0 = 0. We say that the packet sizes are divisible if `i divides `i+1 for all i = 1, . . . , k − 1. For a packet p, let `(p) denote the size of p. For a set of packets A, let `(A) denote the total size of all the packets in A. During the run of an algorithm, at time t, a packet is pending if it is released before or at t, not completed before or at t and not started before t and still running. At time t, if no packet is running, the algorithm may start any pending packet. As a convention of our model, if a fault (jamming error) happens at time t and this is the completion time of a previously scheduled packet, this packet is considered completed. Also, at the fault time, the algorithm may start a new packet. Let LALG (i, Y ) denote the total size of packets of size `i completed by an algorithm ALG during a time interval Y . Similarly, LALG (≥ i, Y ) (resp. LALG (< i, Y )) denotes the total size of packets of size at least `i (resp. less than `i ) completed by an algorithm ALG during a time interval Y ; formally we define Pk Pi−1 LALG (≥ i, Y ) = j=i LALG (j, Y ) and LALG (< i, Y ) = j=1 LALG (j, Y ). We use the notation LALG (Y ) with a single parameter to denote the size LALG (≥ 1, Y ) of packets of all sizes completed by ALG during Y and the notation LALG without parameters to denote the size of all packets of all sizes completed by ALG at any time. By convention, the schedule starts at time 0 and ends at time T , which is a part of the instance unknown to an online algorithm until it is reached. (This is similar to the times of jamming errors, one can also alternatively say that after T the errors are so frequent that no packet is completed.) Algorithm ALG is called R-competitive, if there exists a constant C, possibly dependent on k and `1 , . . . , `k , such that for any instance and its optimal schedule OPT we have LOPT ((0, T ]) ≤ R · LALG ((0, T ]) + C. We remark that in our analyses we show only a crude bound on C. We denote the algorithm ALG with speedup s ≥ 1 by ALG(s). The meaning is that in ALG(s), packets of size L need time L/s to process. In the resource-augmentation variant, we are mainly interested in finding the smallest s such that ALG(s) is 1-competitive, compared to OPT = OPT (1) that runs at speed 1. 4 2.1 Algorithms MAIN and DIV We now give a common description of the two algorithms, MAIN for general packet sizes and DIV for divisible sizes. We divide the run of the algorithm into phases. Each phase starts by an invocation of the initial step in which we need to carefully select a packet to transmit as discussed above. The phase ends by a fault, or when there is no pending packet, or when there are pending packets only of sizes larger than the total size of packets completed in the current phase. The periods of idle time do not belong to any phase. Formally, throughout the algorithm, t denotes the current time. The time tB denotes the start of the current phase; initially tB = 0. We set rel(t) = s · (t − tB ). Since the algorithm does not insert unnecessary idle time, rel(t) denotes the amount of transmitted packets in the current phase. (Note that we use rel(t) only when there is no packet running at time t, so there is no partially executed packet.) Thus rel(t) can be thought as a measure of time relative to the start of the current phase (scaled by the speed of the algorithm). Note also that the algorithm can evaluate rel(t) without knowing the speedup, as it can simply observe the total size of the transmitted packets. Let P <i denote the set of pending packets of sizes `1 , . . . , `i−1 at any given time. The description of MAIN and DIV differ only in Step (3), where DIV enforces an additional divisibility condition. Algorithm MAIN and DIV (1) If no packet is available, stay idle until the next release time. (2) Let i be the maximal i ≤ k such that there is a pending packet of size `i and `(P <i ) < `i . Schedule a packet of size `i and set tB = t. (3) Choose the maximum i such that (i) there is a pending packet of size `i , (ii) `i ≤ rel(t) and (iii) in case of DIV , `i divides rel(t). Schedule a packet of size `i . Repeat Step (3) as long as such i exists. (4) If no packet satisfies the condition in Step (3), go to Step 1. We first note that the algorithm is well-defined, i.e., that it is always able to choose a packet in Step (2) if it has any packets pending, and that if it succeeds in sending it, the length of thus started phase can be related to the total size of the packets completed in it. Lemma 2.1. Let ALG be either MAIN or DIV . In Step (2), ALG always chooses some packet if it has any pending. Moreover, if ALG completes the first packet in the phase, then LALG(s) ((tB , tE ]) > s·(tE −tB )/2, where tB denotes the start of the phase and tE its end (by a fault or Step (4)). Proof. For the first property, note that the packet of the smallest size is eligible. For the second property, note that there is no idle time in the phase, and that only the last packet chosen by ALG in the phase may not complete due to a jam. By the condition in Step (3), the size of this jammed packet is no larger than the total size of all the packets ALG previously completed in this phase, which yields the bound. The following lemma shows a crucial property of the algorithm, namely that if packets of size `i are pending, the algorithm schedules packets of size at least `i most of the time. Its proof also explains the reasons behind our choice of the first packet in a phase in Step (2) of the algorithm. We give the statement and proof of the lemma for MAIN . For DIV , the first part of the lemma still holds, while the divisibility condition makes the proof a bit more tedious; on the other hand divisibility of packet sizes ensures that the bound in the second part of the lemma can be improved. We postpone this tightened analysis to Section 7 where we analyze DIV . Lemma 2.2. Let u be a start of a phase in MAIN (s) and t = u + `i /s. (i) If a packet of size `i is pending at time u and no fault occurs in (u, t), then the phase does not end before t. (ii) Suppose that v > u is such that any time in [u, v) a packet of size `i is pending and no fault occurs. Then the phase does not end in (u, v) and LMAIN (s) (< i, (u, v]) < `i + `i−1 . (Recall that `0 = 0.) 5 Proof. (i) Suppose for a contradiction that the phase started at u ends at time t0 < t. We have rel(t0 ) < rel(t) = `i . Let `j be the smallest packet size among the packets pending at t0 . As there is no fault, the reason for a new phase has to be that rel(t0 ) < `j , and thus Step (3) did not choose a packet to be scheduled. Also note that any packet scheduled before t0 was completed. This implies, first, that there is a pending packet of size `i , as there was one at time u and there was insufficient time to complete it, so j is well-defined and j ≤ i. Second, all packets of sizes smaller than `j pending at u were completed before t0 , so their total size is at most rel(t0 ) < `j . However, this contradicts the fact that the phase started by a packet smaller than `j at time u, as a pending packet of the smallest size equal to or larger than `j satisfied the condition in Step (2) at time u. (Note that it is possible that no packet of size `j is pending at u; however, at least a packet of size `i is pending.) (ii) By (i), the phase that started at u does not end before time t if no fault happens. A packet of size `i is always pending by the assumption of the lemma, and it is always a valid choice of a packet in Step (3) from time t on. Thus, the phase that started at u does not end in (u, v), and moreover only packets of sizes at least `i are started in [t, v). It follows that packets of sizes smaller than `i are started only before time t and their total size is thus less than rel(t) + `i−1 = `i + `i−1 . The lemma follows. 3 Examples for MAIN and DIV Before analyzing the algorithms, we show some hard instances obtaining some lower bounds on the performance of the algorithms, in some cases matching our upper bounds from later sections. At the same time, the examples are instructive in understanding some of the choices both in the analysis and the design of algorithms. 3.1 Examples with general packet sizes First we give an instance which shows that MAIN (s) has competitive ratio at least 1 + 2/s for s < 2, matching Theorem 4.4. Choose a large enough integer N . At time 0 the following packets are released: 2N packets of size 1, one packet of size 2 and N packet of size 4/s − ε for a small enough ε > 0 such that it holds 2 < 4/s − ε. These are all packets in the instance. First there are N phases, each of length 4/s − ε and ending by a fault. OPT completes a packet of size 4/s − ε in each phase, while MAIN (s) completes 2 packets of size 1 and then it starts a packet of size 2 which is not finished. Then there is a fault every 1 unit of time, so that OPT completes all packets of size 1, while the algorithm has no pending packet of size 1 and as s < 2 the length of the phase is not sufficient to finish a longer packet. Overall, OPT completes packets of total size 2 + 4/s − ε per phase, while the algorithm completes packets of total size only 2 per phase. The ratio thus tends to 1 + 2/s as ε → 0. Next we prove that for s ∈ [2, 4), the ratio of MAIN (s) is at least 4/s > 1, which shows that the speedup of MAIN (s) in Theorem 5.1 cannot be improved. Choose a large enough integer y. There will be four packet sizes: 1, x, y and z such that 1 < x < y < z, z = x + y − 1, and x = y · (s − 2)/2 + 2; as s ≥ 2 it holds x > 1 and as s < 4 we have x ≤ y − 1 for a large enough y. We will have N phases again. At time 0 the adversary releases all N (y − 1) packets of size 1, all N packets of size y and a single packet of size z (never completed by either OPT or MAIN (s)), whereas the packets of size x are released one per phase. In each phase MAIN (s) completes, in this order: y − 1 packets of size 1 and then a packet of size x, which has arrived just after the y − 1 packets of size 1 are completed. Next, it will start a packet of size z and fail due to a jam. We show that OPT will complete a packet of size y. To this end, it is required that y < 2(x + y − 1)/s, or equivalently x > y · (s − 2)/2 + 1 which holds by the choice of x. After these N phases, we will have jams every 1 unit of time, so that OPT can complete all the N (y − 1) packets of size 1, while MAIN (s) will be unable to complete any packet (of size y or larger). 6 The ratio per phase is OPT y−1+y 2y − 1 2y − 1 = = = y·s y·(s−2) MAIN (s) y−1+x y−1+ 2 +2 2 +1 which tends to 4/s as y → ∞. 3.2 Example with two packet sizes Our next example shows that both algorithms have ratio no smaller than 2 when s < 2, even if packet sizes are only 1 and ` ≥ max{s + , /(2 − s)} for an arbitrarily small  > 0. This matches upper bounds given in Theorem 4.4 for MAIN (2) and an upper bound of 2 for DIV . We denote either algorithm by ALG. There will be N phases, that all look the same: In each phase, issue one packet of size ` and ` packets of size 1, and have the phase end by a fault at time (2` − ε)/s ≥ ` which holds by the bounds on `. Then ALG will complete all ` packets of size 1 but will not complete the one of size `. By the previous inequality, OPT can complete the packet of size ` within the phase. Once all N phases are over, the jams occur every 1 unit of time, which allows OPT completing all N ` remaining packets of size 1. However, ALG is unable to complete any of the packets of size `. Thus the ratio is 2. 3.3 Example for MAIN in the divisible case We give an example that shows that MAIN is not very good for divisible instances, in particular it is not 1-competitive for any speed s < 2.5 and thus the bound in Theorem 4.5 is tight. In fact, we show that it is not better than 4/3-competitive. We use packets of sizes 1, `, and 2` and we take ` sufficiently large compared to the given speed or competitive ratio. There are many packets of size 1 and 2` available at the beginning, the packets of size ` arrive at specific times where MAIN schedules them immediately. The faults occur at times divisible by 2`, so the optimum schedules one packet of size 2` in each phase between two faults. We have N such phases, N (2` − 1) packets of size 1 and N packets of size 2` available at the beginning. In each phase, MAIN (s) schedules 2` − 1 packets of size 1, then a packet of size ` arrives and is scheduled, and then a packet of size 2` is scheduled. The algorithm would need speed 2.5 − 1/(2`) to complete it. So, for ` large, the algorithm completes only packets of total size 3` − 1 per phase. After these N phases, we have faults after time 1, so the optimum schedules all packets of size 1. The optimum thus finishes all packets 2` plus all small packets, a total of 4` − 1 per phase. Thus the ratio tends to 4/3 as ` → ∞. 4 Local analysis and results In this section we formulate a general method for analyzing our algorithms by comparing locally within each phase the size of “large” packets completed by the algorithm and by the adversary. This method simplifies a complicated induction used in [7]; we easily obtain the same upper bounds of 2 and 3 on competitiveness for divisible and unrestricted packet sizes respectively at no speedup, as well as several new results for the non-divisible cases included in this section. In Section 5, we use a more complex charging scheme to obtain our main result. We postpone the use of local analysis for the divisible case to Section 7. For the analysis, let ALG denote one of the algorithms MAIN and DIV , and let s ≥ 1 be the speedup. We fix an instance and its schedules for ALG(s) and OPT . 4.1 Critical times and Master Theorem The common scheme is the following. We carefully define a sequence of critical times Ck ≤ Ck−1 ≤ · · · ≤ C1 ≤ C0 , where C0 = T is the end of the schedule, satisfying two properties: (1) the algorithm has completed almost all pending packets of size `i released before Ci and (2) in (Ci , Ci−1 ], a packet of size `i is always pending. Properties (1) and (2) allow us to relate LOPT (i, (0, Ci ]) and LOPT (≥ i, (Ci , Ci−1 ]) respectively to their “ALG counterparts”. As each packet completed by OPT belongs to exactly one of 7 `k `k `i `i−1 `1 Ck Ci−1 Ci C2 C1 C0 Figure 2: An illustration of dividing the schedule of OPT in the local analysis. Rows correspond to packet sizes and the X-axis to time. Gray horizontal rectangles thus correspond to LOPT (i, (0, Ci ]) and hatched rectangles correspond to LOPT (≥ i, (Ci , Ci−1 ]). these sets, summing the bounds gives the desired results. These two facts together imply R-competitiveness of the algorithm for appropriate R and speed s. See Figure 2 for an illustration. We first define the notion of i-good times so that they satisfy property (1), and then choose the critical times among their suprema so that those satisfy property (2) as well. Definition 1. Let ALG be one of the algorithms MAIN and DIV , and let s ≥ 1 be the speedup. For i = 1, . . . k, time t is called i-good if one of the following conditions holds: (i) At time t, algorithm ALG(s) starts a new phase by scheduling a packet of size larger than `i , or (ii) at time t, no packet of size `i is pending for ALG(s), or (iii) t = 0. We define critical times C0 , C1 , . . . , Ck iteratively as follows: • C0 = T , i.e., it is the end of the schedule. • For i = 1, . . . , k, Ci is the supremum of i-good times t such that t ≤ Ci−1 . Note that all Ci ’s are defined and Ci ≥ 0, as time t = 0 is i-good for all i. The choice of Ci implies that each Ci is of one of the three types (the types are not disjoint): • Ci is i-good and a phase starts at Ci (this includes Ci = 0), • Ci is i-good and Ci = Ci−1 , or • there exists a packet of size `i pending at Ci , however, any such packet was released at Ci . If the first two options do not apply, then the last one is the only remaining possibility (as otherwise some time in a non-empty interval (Ci , Ci−1 ] would be i-good); in this case, Ci is not i-good but only the supremum of i-good times. First we bound the total size of packets of size `i completed before Ci ; the proof actually only uses the fact that each Ci is the supremum of i-good times and justifies the definition above. Lemma 4.1. Let ALG be one of the algorithms MAIN and DIV , and let s ≥ 1 be the speedup. Then, for any i, LOPT (i, (0, Ci ]) ≤ LALG(s) (i, (0, Ci ]) + `k . Proof. If Ci is i-good and satisfies condition (i) in Definition 1, then by the description of Step (2) of the algorithms, the total size of pending packets of size `i is less than the size of the scheduled packet, which is at most `k and the lemma follows. In all the remaining cases it holds that ALG(s) has completed all the jobs of size `i released before Ci . Thus the inequality holds trivially even without the additive term. Our remaining goal is to bound LOPT (≥ i, (Ci , Ci−1 ]). We divide (Ci , Ci−1 ] into i-segments by the faults. We prove the bounds separately for each i-segment. One important fact is that for the first i-segment we use only a loose bound, as we can use the additive constant. The critical part is then the bound for i-segments started by a fault, this part determines the competitive ratio and is different for each case. We summarize the general method by the following definition and master theorem. Definition 2. The interval (u, v] is called an initial i-segment if u = Ci and v is either Ci−1 or the first time of a fault after u, whichever comes first. 8 The interval (u, v] is called a proper i-segment if u ∈ (Ci , Ci−1 ) is a time of a fault and v is either Ci−1 or the first time of a fault after u, whichever comes first. Note that there is no i-segment if Ci−1 = Ci . Theorem 4.2 (Master Theorem). Let ALG denote one of the algorithms MAIN and DIV , and let s ≥ 1 be the speedup. Suppose that R ≥ 1 satisfies that for each i = 1, . . . , k and each proper i-segment (u, v] with v − u ≥ `i we have (R − 1)LALG(s) ((u, v]) + LALG(s) (≥ i, (u, v]) ≥ LOPT (≥ i, (u, v]) . (4.1) Suppose furthermore that for the initial i-segment (u, v] we have LALG(s) (≥ i, (u, v]) > s(v − u) − 4`k . (4.2) Then ALG(s) is R-competitive. Proof. First note that for a proper i-segment (u, v], u is a fault time. Thus if v − u < `i , then LOPT (≥ i, (u, v]) = 0 and (4.1) is trivial. It follows that (4.1) holds even without the assumption v − u ≥ `i . Now consider an initial i-segment (u, v]. We have LOPT (≥ i, (u, v]) ≤ `k + v − u, as at most a single packet started before u can be completed. Combining this with (4.2) and using s ≥ 1, we get LALG(s) (≥ i, (u, v]) > s(v − u) − 4`k ≥ v − u − 4`k ≥ LOPT (≥ i, (u, v]) − 5`k . Summing this with (4.1) for all proper i-intervals and using R ≥ 1 we get (R − 1)LALG(s) ((Ci , Ci−1 ]) + LALG(s) (≥ i, (Ci , Ci−1 ]) + 5`k ≥ LOPT (≥ i, (Ci , Ci−1 ]) . (4.3) Note that for Ci = Ci−1 , Equation (4.3) holds trivially. To complete the proof of the theorem, note that each completed job in the optimum contributes to exactly one among the 2k terms LOPT (≥ i, (Ci , Ci−1 ]) and LOPT (i, (0, Ci ]); similarly for LALG(s) . Thus by summing both (4.3) and Lemma 4.1 for all i = 1, . . . , k we obtain LOPT = k X LOPT (≥ i, (Ci , Ci−1 ]) + i=1 ≤ k X k X (R − 1)LALG(s) ((Ci , Ci−1 ]) + i=1 + LOPT (i, (0, Ci ]) i=1 k X k X LALG(s) (≥ i, (Ci , Ci−1 ]) + 5`k  i=1 LALG(s) (i, (0, Ci ]) + `k  i=1 ≤ (R − 1)LALG(s) + LALG(s) + 6k`k = R · LALG(s) + 6k`k . The theorem follows. 4.2 Analysis of MAIN The first part of the following lemma implies the condition (4.2) for the initial i-segments in all cases. The second part of the lemma is the base of the analysis of a proper i-segment, which is different in each situation. Lemma 4.3. (i) If (u, v] is an initial i-segment then LMAIN (s) (≥ i, (u, v]) > s(v − u) − 4`k . (ii) If (u, v] is a proper i-segment and s(v − u) ≥ `i then LMAIN (s) ((u, v]) > s(v − u)/2 and LMAIN (s) (≥ i, (u, v]) > s(v − u)/2 − `i − `i−1 . (Recall that `0 = 0.) Proof. (i) Let (u, v] be an initial i-segment. If the phase that starts at u or contains u ends before v, let u0 be its end; otherwise let u0 = u. We have u0 ≤ u + `i /s, as otherwise any packet of size `i , pending throughout the i-segment by definition, would be an eligible choice in Step (3) of the algorithm, and the phase would not end before v. Using Lemma 2.2(ii), we have LMAIN (s) (< i, (u0 , v]) < `i + `i−1 < 2`k . 9 Since at most one packet at the end of the segment is unfinished, we have LMAIN (s) (≥ i, (u, v]) ≥ LMAIN (s) (≥ i, (u0 , v]) > s(v − u0 ) − 3`k > s(v − u) − 4`k . (ii) Let (u, v] be a proper i-segment. Thus u is a start of a phase that contains at least the whole interval (u, v] by Lemma 2.2(ii). By the definition of Ci , u is not i-good, so the phase starts by a packet of size at most `i . If v −u ≥ `i then the first packet finishes (as s ≥ 1) and thus LMAIN (s) ((u, v]) > s(v −u)/2 by Lemma 2.1. The total size of completed packets smaller than `i is at most `i + `i−1 by Lemma 2.2(ii), and thus LMAIN (s) (≥ i, (u, v]) > s(v − u)/2 − `i − `i−1 . The next theorem gives a tradeoff of the competitive ratio of MAIN (s) and the speedup s using our local analysis. While Theorem 5.1 shows that MAIN (s) is 1-competitive for s ≥ 4, here we give a weaker result that reflects the limits of the local analysis. However, for s = 1 our local analysis is tight as already the lower bound from [1] shows that no algorithm is better than 3-competitive (for packet sizes 1 and 2 − ε). See Figure 1 for an illustration of our upper and lower bounds on the competitive ratio of MAIN (s). Theorem 4.4. MAIN (s) is Rs -competitive where: Rs = 1 + 2/s for s ∈ [1, 4), Rs = 2/3 + 2/s for s ∈ [4, 6), and Rs = 1 for s ≥ 6. Proof. Lemma 4.3(i) implies the condition (4.2) for the initial i-segments. We now prove (4.1) for any proper i-segment (u, v] with v − u ≥ `i and appropriate R. The bound then follows by the Master Theorem. Since there is a fault at time u, we have LOPT (≥ i, (u, v]) ≤ v − u. For s ≥ 6, Lemma 4.3(ii) implies LMAIN (s) (≥ i, (u, v]) > s(v − u)/2 − 2`i ≥ 3(v − u) − 2(v − u) = v − u ≥ LOPT (≥ i, (u, v]) , which is (4.1) for R = 1. For s ∈ [4, 6), by Lemma 4.3(ii) we have LMAIN (s) ((u, v]) > s(v − u)/2 and by multiplying it by (2/s − 1/3) we obtain    2 1 s − (v − u) . · LMAIN (s) ((u, v]) > 1 − s 3 6 Thus to prove (4.1) for R = 2/3 + 2/s, it suffices to show that LMAIN (s) (≥ i, (u, v]) > s (v − u) , 6 as clearly v − u ≥ LOPT (≥ i, (u, v]). The remaining inequality again follows from Lemma 4.3(ii), but we need to consider two cases: If (v − u) ≥ 6s `i , then LMAIN (s) (≥ i, (u, v]) > s s s s (v − u) − 2`i ≥ (v − u) − (v − u) = (v − u) . 2 2 3 6 On the other hand, if (v − u) < 6s `i , then using s ≥ 4 as well, LMAIN (s) (≥ i, (u, v]) > s (v − u) − 2`i ≥ 0 , 2 therefore MAIN (s) completes a packet of size at least `i which implies LMAIN (s) (≥ i, (u, v]) ≥ `i > s (v − u) . 6 For s ∈ [1, 4), by Lemma 4.3(ii) we get (2/s) · LMAIN (s) ((u, v]) > v − u ≥ LOPT (≥ i, (u, v]), where the last inequality holds as there is a fault at time u. This implies (4.1) for R = 1 + 2/s. 10 5 (4α + 2)/α2 2 + 2/α 3 + 1/α for α < α1 Upper bound from Theorem 4.6 Speedup sufficient for 1-competitiveness Speedup 4 3 2 1 1 α0 α1 2 α 3 Figure 3: A graph of Sα and the bounds on the speedup that we use in Theorem 4.6. We can obtain better bounds on the speedup necessary for 1-competitiveness if the packet sizes are sufficiently different. Namely, we call the packet sizes `1 , . . . , `k α-separated if `i ≥ α`i−1 holds for i = 2, . . . , k. We start by analyzing MAIN (s) for the case of divisible packet sizes, which is a special case of 2-separated packet sizes. Note that by examples in Section 3 the bound of 2.5 cannot be improved for our algorithm. Theorem 4.5. If the packet sizes are divisible, then MAIN (s) is 1-competitive for s ≥ 2.5. Proof. Lemma 4.3(i) implies (4.2). We now prove (4.1) for any proper i-segment (u, v] with v − u ≥ `i and R = 1. The bound then follows by the Master Theorem. Since there is a fault at time u, we have LOPT (≥ i, (u, v]) ≤ v − u. By divisibility we have LOPT (≥ i, (u, v]) = n`i for some nonnegative integer n. We distinguish two cases based on the size of the last packet started by MAIN in the i-segment (u, v], which is possibly unfinished due to a fault at v. If the unfinished packet has size at most n`i , then LMAIN (s) (≥ i, (u, v]) > 5(v − u)/2 − 3`i /2 − n`i ≥ 5n`i /2 − 3`i /2 − n`i ≥ (n − 1)`i by Lemma 2.1 and Lemma 2.2(ii). Divisibility now implies LMAIN (s) (≥ i, (u, v]) ≥ n`i = LOPT (≥ i, (u, v]). Otherwise by divisibility the size of the unfinished packet is at least (n + 1)`i and the size of the completed packets is larger by the condition in Step (3) of the algorithm; here we also use the fact that MAIN (s) completes the packet started at u, as its size is at most `i ≤ v − u. Thus LMAIN (s) (≥ i, (u, v]) > (n + 1)`i − 3`i /2 ≥ (n − 1/2)`i . Divisibility again implies LMAIN (s) (≥ i, (u, v]) ≥ n`i = LOPT (≥ i, (u, v]). The theorem now follows by the Master Theorem. Next, we show that for α-separated packet sizes, MAIN (Sα ) is 1-competitive for the following Sα . We define 1 1√ α0 = + 33 ≈ 1.46 , which is the positive root of 3α2 − 3α − 2. 2 6 √ 3 + 17 ≈ 1.78 , which is the positive root of 2α2 − 3α − 1. α1 = 4  4α + 2   for α ∈ [1, α0 ],   α2 Sα = 3 + 1 for α ∈ [α0 , α1 ), and α     2 2+ α for α ≥ α1 . 11 See Figure 3 for a graph of Sα and all the bounds on it that we use. The value of α0 is chosen as the point where (4α + 2)/α2 = 2 + 2/α. The value of α1 is chosen as the point from which the argument in case (viii) of the proof below works, which allows for a better result for α ≥ α1 . If s ≥ Sα then s ≥ (4α + 2)/α2 and s ≥ 2 + 2/α for all α and also s ≥ 3 + 1/α for α < α1 ; these facts follow from inspection of the functions and are useful for the analysis. Note that Sα is decreasing in α, with a single discontinuity at α1 . We have S1 = 6, matching the upper bound for 1-competitiveness using local analysis. We have S2 = 3, i.e., MAIN (3) is 1-competitive for 2-separated packet sizes, which includes √ the case of divisible packet sizes studied above. The limit of Sα for α → +∞ is 2. For α < (1 + 3)/2 ≈ 1.366, we get Sα > 4, while Theorem 5.1 shows that MAIN (s) is 1-competitive for s ≥ 4; the weaker result of Theorem 4.6 below reflect the limits of the local analysis. Theorem 4.6. Let α > 1. If the packet sizes are α-separated, then MAIN (s) is 1-competitive for any s ≥ Sα . Proof. Lemma 4.3(i) implies (4.2). We now prove for any proper i-segment (u, v] with v − u ≥ `i that LMAIN (s) (≥ i, (u, v]) ≥ LOPT (≥ i, (u, v]) , (4.4) which is (4.1) for R = 1. The bound then follows by the Master Theorem. Let X = LOPT (≥ i, (u, v]). Note that X ≤ v − u. Lemma 4.3(ii) together with `i−1 ≤ `i /α gives LMAIN (s) (≥ i, (u, v]) > M for M = sX/2 − (1 + 1/α)`i . As in the case of divisible packet sizes, we use the fact that both X and LMAIN (s) (≥ i, (u, v]) are sums of some packet sizes `j , j ≥ i, and thus only some of the values are possible. Here the situation is more complicated, as for example `i+1 , `i+2 , 2`i , `i + `i+1 are possible values, but their ordering may vary. We distinguish several cases based on X and α. We note in advance that the first five cases suffice for α < α1 ; only after completing the proof for α < α1 , we analyze the additional cases needed for α ≥ α1 . Case (i): X = 0. Then (4.4) is trivial. Case (ii): X = `i . Using s ≥ 2 + 2/α, we obtain M ≥ 0. Thus LMAIN (s) (≥ i, (u, v]) > M ≥ 0 which implies LMAIN (s) (≥ i, (u, v]) ≥ `i = X and (4.4) holds. Case (iii): X = `i+1 ≤ 2`i . Using s ≥ (4α + 2)/α2 and X = `i+1 ≥ α`i , we obtain M ≥ (2 + 1/α)`i − (1 + 1/α)`i = `i . Thus LMAIN (s) (≥ i, (u, v]) > `i which together with `i+1 ≤ 2`i implies LMAIN (s) (≥ i, (u, v]) ≥ `i+1 = X and (4.4) holds. Case (iv): X ≥ α2 `i . (Note that this includes all cases when a packet of size at least `i+2 contributes to X.) We first show that s ≥ 2(1 + 1/α2 + 1/α3 ) by straightforward calculations with the golden ratio φ: If α ≤ φ, we have 1/α + 1/α2 − 1 ≥ 0 and thus s ≥ (4α + 2)/α2 = 2(2/α + 1/α2 ) ≥ 2(1 + 1/α2 + 1/α3 ), as 2/α ≥ 1 + 1/α3 is equivalent to (α − 1)(α2 − α − 1) ≤ 0, which holds for α ∈ (1, φ). If on the other hand α ≥ φ, then s ≥ 2(1 + 1/α) ≥ 2(1 + 1/α2 + 1/α3 ), as 1/α ≥ 1/α2 + 1/α3 holds for α ≥ φ. Now we obtain       s  1 1 1 1 M −X ≥ −1 X − 1+ `i ≥ 1 + 2 + 3 − 1 X − 1 + `i 2 α α α α     1 1 1 + 3 α2 `i − 1 + `i = 0 , ≥ 2 α α α and (4.4) holds. Case (v): X ≥ 2`i and α < α1 . (Note that, as long as α < α1 , this includes all cases when at least two packets contribute to X.) Using s ≥ 3 + 1/α we obtain           1 1 1 1 1 1 M −X ≥ 3+ −1 X − 1+ `i ≥ 1+ 2`i − 1 + `i = 0 , 2 α α 2 α α and (4.4) holds. Proof for α < α1 : We now observe that for α < α1 , we have exhausted all the possible values of X. Indeed, if (v) does not apply, then at most a single packet contributes to X, and one of the cases (i)-(iv) applies, as (iv) covers the case when X ≥ `i+2 . Thus (4.4) holds and the proof is complete. Proof for α ≥ α1 : We now analyze the remaining cases for α ≥ α1 . 12 Case (vi): X ≥ (α + 1)`i . (Note that this includes all cases when two packets not both of size `i contribute to X.) Using s ≥ 2 + 2/α we obtain       1 1 1 1 `i ≥ (α + 1)`i − 1 + `i = 0 M −X ≥ 1+ −1 X − 1+ α α α α and (4.4) holds. Case (vii): X = n · `i < (α + 1)`i for some n = 2, 3, . . .. Since α > α1 > φ, we have `i+1 > `i + `i−1 . This implies that the first packet of size at least `i that is scheduled in the phase has size equal to `i by the condition in Step (3) of the algorithm. Thus, if also a packet of size larger than `i contributes to LMAIN (s) (≥ i, (u, v]), we have LMAIN (s) (≥ i, (u, v]) ≥ `i+1 + `i ≥ (α + 1)`i > X by the case condition and (4.4) holds. Otherwise LMAIN (s) (≥ i, (u, v]) is a multiple of `i . Using s ≥ 2 + 2/α, we obtain M ≥ (n − 1)(1 + 1/α)`i > (n − 1)`i . This, together with divisibility by `i implies LMAIN (s) (≥ i, (u, v]) ≥ n · `i = X and (4.4) holds again. Case (viii): X = `i+1 > 2`i . We distinguish two subcases depending on the size of the unfinished packet of MAIN (s) in this phase. If the unfinished packet has size at most `i+1 , the size of the completed packets is bounded by   2 LMAIN (s) ((u, v]) > sX − `i+1 = (s − 1)`i+1 ≥ 1 + `i+1 , α using s ≥ 2 + 2/α. Since the total size of packets smaller than `i is less then (1 + 1/α)`i by Lemma 2.2(ii), we obtain   2`i+1 1 LMAIN (s) (≥ i, (u, v]) − X > − 1+ `i > 0 , α α as `i+1 /α ≥ `i . Thus (4.4) holds. Otherwise the unfinished packet has size at least `i+2 and, by Step (3) of the algorithm, also LMAIN (s) ((u, v]) > `i+2 . We have `i+2 ≥ α`i+1 and by the case condition `i+1 > 2`i we obtain     1 1 `i > 2(α − 1)`i − 1 + `i ≥ 0 , LMAIN (s) (≥ i, (u, v]) − X > (α − 1)`i+1 − 1 + α α as the definition of α1 implies that 2(α − 1) ≥ 1 + 1/α for α ≥ α1 . Thus (4.4) holds. We now observe that we have exhausted all the possible values of X for α ≥ α1 . Indeed, if at least two packets contribute to X, either (vi) or (vii) applies. Otherwise, at most a single packet contributes to X, and one of the cases (i)-(iv) or (viii) applies, as (iv) covers the case when X ≥ `i+2 . Thus (4.4) holds and the proof is complete. 5 MAIN with speed 4 In this section we prove that speed 4 is sufficient for MAIN to be 1-competitive. Examples in Section 3 show that speed 4 is also necessary for our algorithm. Theorem 5.1. MAIN (s) is 1-competitive for s ≥ 4. Intuition. For s ≥ 4 we have that if at the start of a phase MAIN (s) has a packet of size `i pending and the phase has length at least `i , then MAIN (s) completes a packet of size at least `i . To show this, assume that the phase starts at time t. Then the first packet p of size at least `i is started before time t + 2`i /s by Lemma 2.2(ii) and by the condition in Step (3) it has size smaller than 2`i . Thus it completes before time t + 4`i /s ≤ t + `i , which is before the end of the phase. This property does not hold for s < 4. It is important in our proof, as it shows that if the optimal schedule completes a job of some size, and such job is pending for MAIN (s), then MAIN (s) completes a job of the same size or larger. However, 13 this is not sufficient to complete the proof by a local (phase-by-phase) analysis similar to the previous section, as the next example shows. Assume that at the beginning, we release N packets of size 1, N packets of size 1.5 − 2ε, one packet of size 3 − 2ε and a sufficient number of packets of size 1 − ε, for a small ε > 0. Our focus is on packets of size at least 1. Supposing s = 4 we have the following phases: • First, there are N phases of length 1. In each phase the optimum completes a packet of size 1, while among packets of size at least 1, MAIN (s) completes a packet of size 1.5 − 2ε, as it starts packets of sizes 1 − ε, 1 − ε, 1.5 − 2ε, 3 − 2ε, in this order, and the last packet is jammed. • Then there are N phases of length 1.5 − 2ε where the optimum completes a packet of size 1.5 − 2ε while among packets of size at least 1, the algorithm completes only a single packet of size 1, as it starts packets of sizes 1 − ε, 1 − ε, 1, 3 − 2ε, in this order. The last packet is jammed, since for s = 4 the phase must have length at least 1.5 − ε to complete it. In phases of the second type, the algorithm does not complete more (in terms of total size) packets of size at least 1 than the optimum. Nevertheless, in our example, packets of size 1.5 − 2ε were already finished by the algorithm, and this is a general rule. The novelty in our proof is a complex charging argument that exploits such subtle interaction between phases. Outline of the proof. We define critical times Ci0 similarly as before, but without the condition that 0 they should be ordered, i.e., Ci0 is simply the supremum of i-good times; consequently, either Ci0 ≤ Ci−1 0 0 or Ci > Ci−1 may hold. Our plan is to define, for each i, charges between packets of size `i up to time Ci0 , since nearly each packet of size `i completed by the adversary before Ci0 must be completed by the algorithm before Ci0 . Each such charge from an adversary’s packet leads to an algorithm’s packet of the same size and each algorithm’s packet receives at most one such charge; we thus call these charges 1-to-1 charges. We want to charge the remaining adversary’s packets of size `i (scheduled after Ci0 ) to some algorithm’s packets in the same phase. For technical reasons it is actually more convenient to partition the schedule not into phases but into blocks inbetween successive faults. A block can contain several phases of the algorithm separated by an execution of Step (4); however, in the most important and tight part of the analysis the blocks coincide with phases. After the critical time Ci0 , packets of size `i are always pending for the algorithm, and thus (as we observed above) the algorithm schedules a packet of size at least `i in blocks in which the adversary completes a packet of size `i . In the crucial lemma of the proof, based on these observations and their refinements, we show that we can assign the remaining adversary’s packets (i.e., those without 1-to-1 charges) to algorithm’s packets in the same block so that for each algorithm’s packet q the total size of packets assigned to it is at most `(q). However, we cannot use this assignment directly to charge the remaining packets, as some of the algorithm’s big packets may receive 1-to-1 charges, and in this case the analysis needs to handle the interaction of different blocks. This very issue can be seen even in our introductory example. To deal with this, we process blocks in the order of time from the beginning to the end of the schedule, simultaneously completing the charging to the packets in the current block of MAIN (s) schedule and possibly modifying ADV (the schedule of the adversary) in the future blocks. In fact, in the assignment described above, we include not only the packets in ADV without 1-to-1 charge but also packets in ADV with a 1-to-1 charge to a later block. After creating the assignment, if we have a packet q in ALG that receives a 1-to-1 charge from a packet p in a later block of ADV , we remove p from ADV in that later block and replace it there by the packets assigned to q (that are guaranteed to be of smaller total size than p). After these swaps, the 1-to-1 charges together with the assignment form a valid charging that charges the remaining not swapped packets in ADV in this block together with the removed packets from the later blocks in ADV to the packets of MAIN (s) in the current block. This charging is now independent of the other blocks, so we can continue with the next block. Furthermore, to analyze blocks in which the algorithm does not complete any packet, we shift the targets of the 1-to-1 charges backward in time by accounting for the first few packets of each size completed by the adversary at the beginning of the schedule and after Ci0 in the additive constant of the competitive ratio. Preliminaries. We define the notions of blocks and (modified) critical times. 14 Ci0 ALG: ... ADV: Figure 4: An illustration of back, up, and forward 1-to-1 charges for size `i . Crossed packets are included in the set A (and thus contribute to the additive constant). Definition 3. Let f1 , f2 , . . . , fN be the times of faults. Let f0 = 0 and fN +1 = T is the end of schedule. Then the time interval (fi , fi+1 ], i = 0, . . . , N , is called a block. Definition 4. For i = 1, . . . k, the critical time Ci0 is the supremum of i-good times t ∈ [0, T ], where T is the end of the schedule and i-good times are as defined in Definition 1. All Ci0 ’s are defined, as t = 0 is i-good for all i. Similarly to Section 4.1, each Ci0 is of one of the following types: (i) Ci0 starts a phase and a packet larger than `i is started, (ii) Ci0 = 0, (iii) Ci0 = T , or (iv) just before time Ci0 no packet of size `i is pending but at time Ci0 one or more packets of size `i are pending; in this case Ci0 is not i-good but only the supremum of i-good times. We observe that in each case, at time Ci0 the total size of packets p of size `i pending for MAIN (s) and released before Ci0 is less than `k . 1-to-1 charges and the additive constant. Next we define the set of packets that contribute to the additive constant. Definition 5. Let the set A contain for each i = 1, . . . , k: (i) the first d4`k /`i e packets of size `i completed by the adversary, and (ii) the first d4`k /`i e packets of size `i completed by the adversary after Ci0 . If there are not sufficiently many packets of size `i completed by the adversary in (i) or (ii), we take all the packets in (i) or all the packets completed after Ci0 in (ii), respectively. For each i, we put into A packets of size `i of total size at most 10`k . Thus we have `(A) = O(k`k ) which implies that packets in A can be counted in the additive constant. We define 1-to-1 charges for packets of size `i as follows. Let p1 , p2 , . . . , pn be all the packets of size `i started by the adversary before Ci0 that are not in A. We claim that MAIN (s) completes at least n packets of size `i before Ci0 . Indeed, before time Ci0 at least n + d4`k /`i e packets of size `i are started by the adversary and thus released; by the definition of Ci0 at time Ci0 fewer than `k /`i of them are pending for MAIN (s), one may be running and the remaining ones must be completed. We now charge each pm to the mth packet of size `i completed by MAIN (s). We call a 1-to-1 charge starting and ending in the same block an up charge, a 1-to-1 charge from a block starting at u to a block ending at v 0 ≤ u a back charge, and a 1-to-1 charge from a block ending at v to a block starting at u0 ≥ v a forward charge. A charged packet is a packet charged by a 1-to-1 charge. The definition of A implies the following two important properties. See Figure 4 for an illustration. Lemma 5.2. Let p be a packet of size `i , started by the adversary at time t, charged by a forward charge to a packet q started by MAIN (s) at time t0 . Then at any time τ ∈ [t − 3`k , t0 ), more than `k /`i packets of size `i are pending for MAIN (s). Proof. Let m be the number of packets of size `i that MAIN (s) completes before q. Then, by the definition of A, the adversary completes m + d4`k /`i e packets of size `i before p. As fewer than 3`k /`i of these packets are started in (t − 3`k , t], the remaining more than m + `k /`i packets have been released before or at time t − 3`k . As only m of them are completed by MAIN (s) before t0 , the remaining more than `k /`i packets are pending at any time τ ∈ [t − 3`k , t0 ). Lemma 5.3. Let p 6∈ A be a packet of size `i started by the adversary at time t that is not charged. Then t − 4`k ≥ Ci0 and thus at any τ ≥ t − 4`k , a packet of size `i is pending for MAIN (s). Proof. Any packet of size `i started before Ci0 + 4`k is either charged or put in A, thus t − 4`k ≥ Ci0 . After Ci0 , a packet of size `i is pending by the definition of Ci0 . 15 Processing blocks. Initially, let ADV be an optimal (adversary) schedule. First we remove all packets in A from ADV . Then we process blocks one by one in the order of time. When we process a block, we modify ADV so that we (i) remove some packets from ADV , so that the total size of removed packets is at most the total size of packets completed by MAIN (s) in this block, and (ii) reschedule any remaining packet in ADV in this block to one of the later blocks, so that the schedule of remaining packets remains feasible. Summing over all intervals, (i) guarantees that MAIN (s) is 1-competitive with an additive constant `(A). When we reschedule a packet in ADV , we keep the packet’s 1-to-1 charge (if it has one), however, its type may change due to rescheduling. Since we are moving packets only to later times only, the release times are automatically respected. Also it follows that we can apply Lemmata 5.2 and 5.3 even to ADV after rescheduling. After processing of a block, there will remain no charges to or from it. For the charges from the block this is automatic, as there remain no packets to be charged. For the charges to the block, this is guaranteed as in the process we remove from ADV all the packets in later blocks charged by back charges to the current block. From now on, let (u, v] be the current block that we are processing; all previous blocks ending at v 0 ≤ u are processed. As there are no charges to the previous blocks, any packet scheduled in ADV in (u, v] is charged by an up charge or a forward charge, or else it is not charged at all. We distinguish two main cases of the proof, depending on whether MAIN (s) finishes any packet in the current block. Main case 1: Empty block. The algorithm does not finish any packet in (u, v]. We claim that ADV does not finish any packet. The processing of the block is then trivial. For a contradiction, assume that ADV starts a packet p of size `i at time t and completes it. The packet p cannot be charged by an up charge, as MAIN (s) completes no packet in this block. Thus p is either charged by a forward charge or not charged. Lemma 5.2 or 5.3 implies that at time t some packet of size `i is pending for MAIN (s). Since MAIN does not idle unnecessarily, this means that some packet q of size `j for some j is started in MAIN (s) at time τ ≤ t and running at t. As MAIN (s) does not complete any packet in (u, v], the packet q is jammed by the fault at time v. This implies that j > i, as `j > s(v − τ ) ≥ v − t ≥ `i ; we also have t − τ < `j . Moreover, q is the only packet started by MAIN (s) in this block, thus it starts a phase. As this phase is started by packet q of size `j > `i , the time τ is i-good and Ci0 ≥ τ . All packets ADV started before time Ci0 + 4`k /s are charged, as the packets in A are removed from ADV and packets in ADV are rescheduled only to later times. Packet p is started before v < τ + `j /s < Ci0 + `k /s, thus it is charged. It follows that p is charged by a forward charge. We now apply Lemma 5.2 again and observe that it implies that at τ > t − `j there are more than `k /`i packets of size `i pending for MAIN (s). This is in contradiction with the fact that at τ , MAIN (s) started a phase by q of size `j > `i . Main case 2: Non-empty block. Otherwise, MAIN (s) completes a packet in the current block (u, v]. Let Q be the set of packets completed by MAIN (s) in (u, v] that do not receive an up charge. Note that no packet in Q receives a forward charge, as the modified ADV contains no packets before u, so packets in Q either get a back charge or no charge at all. Let P be the set of packets completed in ADV in (u, v] that are not charged by an up charge. Note that P includes packets charged by a forward charge and uncharged packets, as no packets are charged to a previous block. We first assign packets in P to packets in Q so that for each packet q ∈ Q the total size of packets assigned to q is at most `(q). Formally, we iteratively define a provisional assignment f : P → Q such that `(f −1 (q)) ≤ `(q) for each q ∈ Q. Provisional assignment. We maintain a set O ⊆ Q of occupied packets that we do not use for a future assignment. Whenever we assign a packet p to q ∈ Q and `(q) − `(f −1 (q)) < `(p), we add q to O. This rule guarantees that each packet q ∈ O has `(f −1 (q)) > `(q)/2. We process packets in P in the order of decreasing sizes as follows. We take the largest unassigned packet p ∈ P of size `(p) (if there are more unassigned packets of size `(p), we take an arbitrary one) and choose an arbitrary packet q ∈ Q \ O such that `(q) ≥ `(p); we prove in Lemma 5.4 below that such a q exists. We assign p to q, that is, we set f (p) = q. Furthermore, as described above, if `(q) − `(f −1 (q)) < `(p), we add q to O. We continue until all packets are assigned. 16 If a packet p is assigned to q and q is not put in O, it follows that `(q) − `(f −1 (q)) ≥ `(p). This implies that after the next packet p0 is assigned to q, we have `(q) ≥ `(f −1 (q)), as the packets are processed from the largest one and thus `(p0 ) ≤ `(p). If follows that at the end we obtain a valid provisional assignment. Lemma 5.4. The assignment process above assigns all packets in P . Proof. For each size `j we show that all packets of size `j in P are assigned, which is clearly sufficient. We fix the size `j and define a few quantities. Let n denote P the number of packets of size `j in P . Let o denote the total occupied size, defined as o = `(O) + q∈Q\O `(f −1 (q)) at the time just before we start assigning the packets of size `j . Note that the rule for adding P packets to O implies that `(f −1 (Q)) ≥ o/2. Let a denote the current total available size defined as a = q∈Q\O:`(q)≥`j (`(q) − `(f −1 (q))). First we claim that it is sufficient to show that a > (2n − 2)`j before we start assigning the packets of size `j . As long as a > 0, there is a packet q ∈ Q \ O of size at least `j and thus we may assign the next packet (and, as noted before, actually a ≥ `j , as otherwise q ∈ O). Furthermore, assigning a packet p of size `j to q decreases a by `j if q is not added to O and by less than 2`j if q is added to O. Altogether, after assigning the first n − 1 packets, a decreases by less than (2n − 2)`j , thus we still have a > 0, and we can assign the last packet. The claim follows. We now split the analysis into two cases, in each we prove that the available space a is sufficiently large before assigning the packets of size `j . In the first case, we suppose that a packet of size `j is pending for MAIN (s) at all times in [u, v). Let z be the total size of packets of size at least `j charged by up charges in this block. The size of packets in P already assigned is at least `(f −1 (Q)) ≥ o/2 and we have n yet unassigned packets of size `j in P . As ADV has to schedule all these packets and the packets with up charges in this block, its size satisfies v − u ≥ `(P ) + z ≥ n`j + o/2 + z. Now consider the schedule of MAIN (s) in this block. By Lemma 2.2, there is no end of phase in (u, v) and jobs smaller than `j scheduled by MAIN (s) have total size less than 2`j . All the other completed packets contribute to one of a, o, or z. Using Lemma 2.1, the previous bound on v − u and s ≥ 4, the total size of completed packets is at least s(v − u)/2 ≥ 2n`j + o + 2z. Hence a > (2n`j + o + 2z) − 2`j − o − z ≥ (2n − 2)`j , which completes the proof of the lemma in this case. Otherwise, in the second case, there is a time in [u, v) when no packet of size `j is pending for MAIN (s). Let τ be the supremum of times τ 0 ∈ [u, v] such that MAIN (s) has no pending packet of size at least `j at time τ 0 ; if no such τ 0 exists we set τ = u. Let t be the time when the adversary starts the first packet p of size `j from P . Since p is charged using a forward charge or p is not charged, we can apply Lemma 5.2 or 5.3, which implies that packets of size `j are pending for MAIN (s) from time t − 3`k till at least v. By the case condition, there is a time in [u, v) when no packet of size `j is pending, and this time is thus before t − 3`k , implying u < t − 3`k . The definition of τ now implies that τ ≤ t − 3`k . Towards bounding a, we show that (i) MAIN (s) runs a limited amount of small packets after τ and thus a + o is large, and that (ii) f −1 (Q) contains only packets run by ADV from τ on, and thus o is small. We claim that the total size of packets smaller than `j completed in MAIN (s) in (τ, v] is less than 3`k . This claim is similar to Lemma 2.2 and we also argue similarly. Let τ1 < τ2 < . . . < τα be all the ends of phases in (τ, v) (possibly there is none, then α = 0); also let τ0 = τ . For i = 1, . . . , α, let ri denote the packet started by MAIN (s) at τi ; note that ri exists since after τ there is a pending packet at any time in [τ, v] by the definition of τ . First note that any packet started at or after time τα + `k /s has size at least `j , as such a packet is pending and satisfies the condition in Step (3) of the algorithm. Thus the total amount of the small packets completed in (τα , v]) is less than `k + `k−1 < 2`k . The claim now follows for α = 0. Otherwise, as there is no fault in (u, v), at τi , i = 1, . . . , α, Step (4) of the algorithm is reached and thus no packet of size at most s(τi − τi−1 ) is pending. In particular, this implies that `(ri ) > s(τi − τi−1 ) for i = 1, . . . , α. This also implies that the amount of the small packets completed in (τ0 , τ1 ] is less than `k and the claim for α = 1 follows. For α ≥ 2 first note that by Lemma 2.2(i), s(τi − τi−1 ) ≥ `j for all i = 2, . . . , α and thus ri is not a small packet. Thus for i = 3, . . . , α, the amount of small packets in (τi−1 , τi ] is at most s(τi−1 − τi ) − `(ri−1 ) < `(ri ) − `(ri−1 ). The amount of small packets completed in (τ1 , τ2 ] is at most s(τ2 − τ1 ) < `(r2 ) and the amount of small packets completed in (τα , v] is at most 2`k − `(rα ). Summing this together, the amount of small packets completed in (τ1 , v] is at most 2`k and the claim follows. Let z be the total size of packets of size at least `j charged by up charges in this block and completed by MAIN (s) after τ . After τ , MAIN (s) processes packets of total size more than s(v − τ ) − `k and all of 17 `i 2`i ≥ `j `j `i 2`i ≥ `j `j ALG: ADV: `i `i `j `j Figure 5: An illustration of the provisional assignment on the left; note that a packet of size `j with a forward charge is also assigned. Full arcs depict 1-to-1 charges and dashed arcs depict the provisional assignment. The result of modifying the adversary schedule on the right. these packets contribute to one of a, o, z, or the volume of less than 3`k of small packets from the claim above. Thus, using s ≥ 4, we get a > 4(v − τ ) − o − z − 4`k . (5.1) Now we derive two lower bounds on v − τ using ADV schedule. Observe that no packet contributing to z except for possibly one (the one possibly started by MAIN (s) before τ ) is started by ADV before τ , as otherwise it would be pending for MAIN (s) just before τ , contradicting the definition of τ . Also, observe that in (u, τ ], ADV runs no packet p ∈ P with `(p) > `j : For a contradiction, assume that such a p exists. As τ ≤ Cj 0 for any j 0 > j, such a p is charged. As p ∈ P , it is charged by a forward charge. However, then Lemma 5.2 implies that at all times between the start of p in ADV and v a packet of size `(p) is pending for MAIN (s); in particular such a packet is pending in the interval before τ , contradicting the definition of τ . These two observations imply that in [τ, v], ADV starts and completes all the assigned packets from P , the n packets of size `j from P , and all packets except possibly one contributing to z. This gives v − τ ≥ `(f −1 (Q)) + n`j + z − `k ≥ o/2 + n`j + z − `k . To obtain the second bound, we observe that the n packets of size `j from P are scheduled in [t, v] and together with t ≥ τ + 3`k we obtain v − τ = v − t + t − τ ≥ n`j + 3`k . Summing the two bounds on v − τ and multiplying by two we get 4(v − τ ) ≥ 4n`j + 4`k + o + 2z. Summing with (5.1) we get a > 4n`j + z ≥ 4n`j . This completes the proof of the second case. As a remark, note that in the previous proof, the first case deals with blocks after Cj , it is the typical and tight case. The second case deals mainly with the block containing Cj . (The blocks that are before Cj may fall in either of the cases.) This brings some technical difficulties, but it is a case which has slack. This is similar to the situation in the local analysis using Master Theorem. Modifying the adversary schedule. Now all the packets from P are provisionally assigned by f and for each q ∈ Q we have that `(f −1 (q)) ≤ `(q). We process all packets q completed by MAIN (s) in (u, v] one by one according to one of the following three cases; in each case we remove from ADV one or more packets with total size at most `(q). If q 6∈ Q then the definition of P and Q implies that q is charged by an up charge from some packet p 6∈ P of the same size. We remove p from ADV . If q ∈ Q does not receive a charge, we remove f −1 (q) from ADV . We have `(f −1 (q)) ≤ `(q), so the size is as required. If any packet p ∈ f −1 (q) is charged (necessarily by a forward charge), we remove this charge. If q ∈ Q receives a charge, it is a back charge from some packet p of the same size. We remove p from ADV and in the interval where p was scheduled, we schedule packets from f −1 (q) in an arbitrary order. As `(f −1 (q)) ≤ `(q), this is feasible. If any packet p ∈ f −1 (q) is charged, we keep its charge to the same packet in MAIN (s); the charge was necessarily a forward charge, so it leads to some later block. See Figure 5 for an illustration. After we have processed all the packets q, we have modified ADV by removing an allowed total size of packets and rescheduling the remaining packets in (u, v] so that any remaining charges go to later blocks. This completes processing of the block (u, v] and thus also the proof of 1-competitiveness. 18 τ ≥ t + `/s − 2 t ALG: ADV: ` ` Figure 6: An illustration of Case (D3). 6 Lower Bounds In this section we study lower bounds on the speed necessary to achieve 1-competitiveness. We start with a lower bound of 2 which holds even for the divisible case. It follows that our algorithm DIV and the algorithm in Jurdzinski et al. [7] are optimal. Note that this lower bound follows from results of Anta et al. [3] by a similar construction, although the packets in their construction are not released together. Theorem 6.1. There is no 1-competitive deterministic online algorithm running with speed s < 2, even if packets have sizes only 1 and ` for ` > 2s/(2 − s) and all of them are released at time 0. Proof. For a contradiction, consider an algorithm ALG running with speed s < 2 that is claimed to be 1-competitive with additive constant A where A may depend on `. At time 0 the adversary releases N1 = dA/`e + 1 packets of size ` and N0 = d(2/s) · N1 · (s − 1) · `2 + (2/s) · ` · (A + 1)e packets of size 1. These are all packets in the instance. The adversary’s strategy works by blocks where a block is a time interval between two faults, where the first block begins at time 0. The adversary ensures that in each such block ALG completes no packet of size ` and moreover ADV either completes an `-sized packet or completes more 1’s (packets of size 1) than ALG. Let t be the time of the last fault; initially t = 0. Let τ ≥ t be the time when ALG starts the first `-sized packet after t; we set τ = ∞ if it does not happen. Note that we use here that ALG is deterministic. In a block beginning at time t, the adversary proceeds according to the first case below that applies. (D1) If ADV has less than 2`/s pending packets of size 1, then the end of the schedule is at t. (D2) If ADV has all packets of size ` completed, then it stops the current process and issues a fault at times t + 1, t + 2, . . . Between each two consecutive faults after t it completes one packet of size 1 and it continues issuing faults until it has no pending packet of size 1. Then there is the end of the schedule. Clearly, ALG may complete only packets of size 1 after t as ` > 2s/(2 − s) > s. (D3) If τ ≥ t + `/s − 2, then the next fault is at time t + `. In the current block, the adversary completes a packet `. ALG completes at most s · ` packets of size 1 and then it possibly starts ` at τ (if τ < t + `) which is jammed, since it would be completed at   2` 2 ` −2=t+`+ −1 `−2>t+` τ + ≥t+ s s s  where the last inequality follows from 2s − 1 ` > 2 which is equivalent to ` > 2s/(2 − s). Thus the `-sized packet would be completed after the fault. See Figure 6 for an illustration. (D4) Otherwise, if τ < t + `/s − 2, then the next fault is at time τ + `/s − ε for a small enough ε > 0. In the current block, ADV completes as many packets of size 1 as it can, that is bτ + `/s − ε − tc packets of size 1; note that by Case (D1), ADV has enough 1’s pending. Again, the algorithm does not complete the packet of size ` started at τ , because it would be finished at τ + `/s. See Figure 7 for an illustration. First notice that the process above ends, since in each block the adversary completes a packet. We now show LADV > LALG + A which contradicts the claimed 1-competitiveness of ALG. 19 t ALG: ADV: τ < t + `/s − 2 ` Gain = 7 Gain = 8 Figure 7: An illustration of Case (D4). If the adversary’s strategy ends in Case (D2), then ADV has all `’s completed and then it schedules all 1’s, thus LADV = N1 · ` + N0 > A + N0 . However, ALG does not complete any `-sized packet and hence LALG ≤ N0 which concludes this case. Otherwise, the adversary’s strategy ends in Case (D1). We first claim that in a block (t, t0 ] created in Case (D4), ADV finishes more 1’s than ALG. Indeed, let o be the number of 1’s completed by ALG in (t, t0 ]. Then τ ≥ t + o/s where τ is from the adversary’s strategy in (t, t0 ], and we also have o < ` − 2s or equivalently ` > o + 2s, because τ < t + `/s − 2 in Case (D4). The number of 1’s scheduled by ADV is         ` o ` o o + 2s 2 τ + −ε−t ≥ t+ + −ε−t ≥ + −ε = o+2−ε s s s s s s   2 o+1 ≥o+1 ≥ s and we proved the claim. Let α be the number of blocks created in Case (D3); note that α ≤ N1 , since in each such block ADV finishes one `-sized packet. ALG completes at most s` packets of size 1 in such a block, thus LADV ((u, v]) − LALG ((u, v]) ≥ (1 − s) · ` for a block (u, v] created in Case (D3). Let β be the number of blocks created in Case (D4). We have   s 2` s · N0 β> · N0 − = − 1, 2` s 2` because in each such block ADV schedules less than 2`/s packets of size 1 and less than 2`/s of these packets are pending at the end. By the claim above, we have LADV ((u, v]) − LALG ((u, v]) ≥ 1 for a block (u, v] created in Case (D4). Summing over all blocks and using the value of N0 we get LADV − LALG ≥ α · (1 − s) · ` + β s · N0 −1 2` ≥ N1 · (1 − s) · ` + N1 · (s − 1) · ` + A + 1 − 1 = A > N1 · (1 − s) · ` + where we used s ≥ 1 which we may suppose w.l.o.g. This concludes the proof. Our main lower bound of φ + 1 = φ2 ≈ 2.618 generalizes the construction of Theorem 6.1 for more packet sizes, which are no longer divisible. Still, we make no use of release times. Theorem 6.2. There is no 1-competitive deterministic online algorithm running with speed s < φ + 1, even if all packets are released at time 0. Proof. The adversary chooses ε > 0 small enough and k ∈ N large enough so that s < φ + 1 − 1/φk−1 . For convenience, the smallest size in the instance is ε instead of 1. There will be k + 1 packet sizes in the instance, namely `0 = ε, and `i = φi−1 for i = 1, . . . , k. Suppose for a contradiction that there is an algorithm ALG running with speed s < φ + 1 that is claimed to be 1-competitive with additive constant A where A may depend on `i ’s, in particular on ε and k. The adversary issues Ni packets of size `i at time 0, for i = 0, . . . , k; Ni ’s are chosen so that N0  N1  · · ·  Nk . These are all packets in the instance. 20 ALG: ADV: ε 1 φ3 φ φ2 Figure 8: An illustration of Case (B5). Pk More precisely, Ni ’s are defined inductively so that it holds Nk > A/`k , Ni > `k φs j=i+1 Nj + A/`i Pk for i = k − 1, . . . , 1, and finally N0 > φ`k (A + 1 + sφ`k i=1 Ni )/ε2 . The adversary’s strategy works by blocks where a block is again a time interval between two faults and the first block begins at time 0. Let t be the time of the last fault; initially t = 0. Let τi ≥ t be the time when ALG starts the first packet of size `i after t; we set τi = ∞ if it does not happen. Again, we use here that ALG is deterministic. Let τ≥i = minj≥i τj be the time when ALG starts the first packet of size at least `i after t. Let PADV (i) be the total size of `i ’s (packets of size `i ) pending for the adversary at time t. In a block beginning at time t, the adversary proceeds according to the first case below that applies. Each case has an intuitive explanation which we make precise later. (B1) If there are less than φ`k /ε packets of size ε pending for ADV , then the end of the schedule is at time t. Lemma 6.3 below shows that in blocks in which ADV schedules ε’s it completes more than ALG in terms of total size. It follows that the schedule of ADV has much bigger total size for N0 large enough, since the adversary scheduled nearly all packets of size ε; see Lemma 6.8. (B2) If there is i ≥ 1 such that PADV (i) = 0, then ADV stops the current process and continues by Strategy Finish described below. (B3) If τ1 < t + `1 /(φ · s), then the next fault occurs at time τ1 + `1 /s − ε, so that ALG does not finish the first `1 -sized packet. ADV schedules as many ε’s as it can. In this case, ALG schedules `1 too early and in Lemma 6.3 we show that the total size of packets completed by ADV is larger than the total size of packets completed by ALG. (B4) If τ≥2 < t + `2 /(φ · s), then the next fault is at time τ≥2 + `2 /s − ε, so that ALG does not finish the first packet of size at least `2 . ADV again schedules as many ε’s as it can. Similarly as in the previous case, ALG starts `2 or a larger packet too early and we show that ADV completes more in terms of size than ALG, again using Lemma 6.3. (B5) If there is 1 ≤ i < k such that τ≥i+1 < τi , then we choose the smallest such i and the next fault is at time t + `i . ADV schedules a packet of size `i . See Figure 8 for an illustration. Intuitively, this case means that ALG skips `i and schedules `i+1 (or a larger packet) earlier. Lemma 6.5 shows that the algorithm cannot finish its first packet of size at least `i+1 (thus it also does not schedule `i ) provided that this case is not triggered for a smaller i, or previous cases are not triggered. (B6) Otherwise, the next fault occurs at t + `k and ADV schedules a packet of size `k in this block. Lemma 6.6 shows that ALG cannot complete an `k -sized packet in this block. See Figure 9 for an illustration. We remark that the process above eventually ends either in Case (B1), or in Case (B2), since in each block ADV schedules a packet. Also note that the length of each block is at most φ`k . We describe Strategy Finish, started in Case (B2). Let i be the smallest index i0 ≥ 1 such that PADV (i0 ) = 0. For brevity, we call a packet of size at least `i long, and a packet of size `j with 1 ≤ j < i short; note that ε’s are not short packets. In a nutshell, ADV tries to schedule all short packets, while preventing the algorithm from completing any long packet. Similarly to Cases (B3) and (B4), if ALG is starting a long packet too early, ADV schedules ε’s and gains in terms of total size. 21 ALG: ADV: ε 1 φ φ2 φk ... φk Figure 9: An illustration of Case (B6). Adversary’s Strategy Finish works again by blocks. Let t be the time of the last fault. Let τ ≥ t be the time when ALG starts the first long packet after t; we set τ = ∞ if it does not happen. The adversary proceeds according to the first case below that applies: (F1) If PADV (0) < φ`k , then the end of the schedule is at time t. (F2) If ADV has no pending short packet, then the strategy Finish ends and ADV issues a fault at times t + ε, t + 2ε, . . . Between each two consecutive faults after t it completes one packet of size ε and it continues issuing faults until it has no pending ε. Then there is the end of the schedule. Clearly, ALG may complete only ε’s after t if ε is small enough. Note that for i = 1 this case is immediately triggered, as `0 -sized packets are not short, hence there are no short packets whatsoever. (F3) If τ < t + `i /(φ · s), then the next fault is at time τ + `i /s − ε, so that ALG does not finish the first long packet. ADV schedules as many ε’s as it can. Note that the length of this block is less than `i /(φ · s) + `i /s ≤ φ`k . Again, we show that ADV completes more in terms of size using Lemma 6.3. (F4) Otherwise, τ ≥ t + `i /(φ · s). ADV issues the next fault at time t + `i−1 . Let j be the largest j 0 < i such that PADV (j 0 ) > 0. ADV schedules a packet of size `j which is completed as j ≤ i − 1. Lemma 6.7 shows that ALG does not complete the long packet started at τ . Again, in each block ADV completes a packet, thus Strategy Finish eventually ends. Note that the length of each block is less than φ`k . We now prove the lemmata mentioned above. In the following, t is the beginning of the considered block and t0 is the end of the block, i.e., the next fault after t. Recall that LALG ((t, t0 ]) is the total size of packets completed by ALG in (t, t0 ]. We start with a general lemma that covers all cases in which ADV schedules many ε’s. Lemma 6.3. In Cases (B3), (B4), and (F3) it holds LADV ((t, t0 ]) ≥ LALG ((t, t0 ]) + ε. Proof. Let i and τ be as in Case (F3); we set i = 1 and τ = τ1 in Case (B3), and i = 2 and τ = τ≥2 in Case (B4). Note that the first packet of size (at least) `i is started at τ with τ < t + `i /(φ · s) and that the next fault occurs at time τ + `i /s − ε. Furthermore, PADV (0, t) ≥ φ`k by Cases (B1) and (F1). As t0 − t ≤ φ`k it follows that ADV has enough ε’s to fill nearly the whole block with them, so in particular LADV ((t, t0 ]) > t0 − t − ε. Let a = LALG ((t, t0 ]). Since ALG does not complete the `i -sized packet we have τ ≥ t + a/s and thus also a < `i /φ as τ < t + `i /(φ · s). If a < `i /φ − 3sε/φ which is equivalent to `i > φ · a + 3sε, then we show the required inequality by the following calculation: LADV ((t, t0 ]) + ε > t0 − t = τ + `i a `i a + φ · a + 3sε −ε−t≥ + −ε> − ε > a + 2ε . s s s s Otherwise, a is nearly `i /φ and thus large enough. Then we get LADV ((t, t0 ]) + ε > t0 − t = τ + `i a `i a φa −ε−t≥ + −ε> + − ε > a + 2ε s s s s s where the penultimate inequality follows by `i > φa, and the last inequality holds as (1 + φ)a/s > a + 3ε for ε small enough and a ≥ `i /φ − 3sε/φ. 22 − 1 and Si = Si−1 + `i for i = 1, . . . , k. Thus Si = Pi For brevity, we inductively define S0 = φ i+1 ` + φ − 1 and a calculation shows S = φ − 1. We prove a useful observation. i i j=1 Lemma 6.4. Fix j ≥ 2. If Case (B3) and Case (B5) for i < j are not triggered in the block, then τi+1 ≥ t + Si /s for each i < j. Proof. We have τ1 ≥ t + `1 /(φ · s) = t + (φ − 1)/s by Case (B3) and τi+1 ≥ τi + `i /s for any i < j, since Case (B5) was not triggered for i < j and the first `i -sized packet needs to be finished before starting the next packet. Summing the bounds gives the inequalities in the lemma. Lemma 6.5. In Case (B5) the algorithm does not complete any packet of size `i or larger. Proof. Recall that we have τ≥i+1 < τi , thus the first packet p of size at least `i has size at least `i+1 . It suffices to prove `i+1 τ≥i+1 + − t > `i , (6.1) s which means that p would be completed after the next fault at time t + `i . We start with the case i = 1 in which τ≥2 < τ1 . Since Case (B4) was not triggered, we have τ≥2 ≥ t + `2 /(φ · s) = t + 1/s. We show (6.1) by the following calculation: τ≥2 + `2 1 `2 1+φ −t≥ + = > 1 = `1 , s s s s where the strict inequality holds by s < φ + 1. Now consider the case i ≥ 2. By the minimality of i satisfying the condition of Case (B5) we use Lemma 6.4 for j = i to get τi−1 ≥ t + Si−2 /s. Since a packet `i−1 is started at τi−1 , it holds τ≥i+1 ≥ t + (Si−2 + `i−1 )/s = t + Si−1 /s. Thus τ≥i+1 + `i+1 Si−1 + `i+1 φi − 1 + φi −t≥ = s s s φi+1 + φi−2 − 1 φi+1 = ≥ ≥ φi−1 = `i , s s where the penultimate inequality holds by i ≥ 2 and the last inequality by s < φ + 1. (We remark that the penultimate inequality has a significant slack for i > 2.) Lemma 6.6. In Case (B6) ALG does not complete a packet of size `k . Proof. It suffices to prove  1 τk > t + 1 − s since then ALG completes the first `k -sized packet  `k >t+ 1− τk + s  `k , (6.2) at  1 `k = t + `k , `k + s s thus after the fault. Since Case (B3) and Case (B5) are not triggered, we use Lemma 6.4 for j = k to get τk ≥ t + Sk−1 /s = t + (φk − 1)/s. Recall that k is large enough so that s < φ + 1 − 1/φk−1 which is equivalent to (φk − 1)/s > (1 − 1/s)φk−1 . This shows (6.2), because τk − t ≥ (φk − 1)/s and `k = φk−1 . Lemma 6.7. In Case (F4) ALG does not complete any long packet. Proof. Recall that the first long packet p is started at τ and it has size of at least `i , thus it would be completed at least at τ + `i /s. We show τ + `i /s − t > `i−1 by the following calculation: τ+ `i `i `i φ`i `i −t≥ + = > = `i−1 , s φ·s s s φ where the strict inequality holds by s < φ + 1. This implies that the long packet p would be completed after the next fault at time t + `i−1 . 23 We are ready to prove that at the end of the schedule LADV > LALG + A holds, which contradicts the claimed 1-competitiveness of ALG. We inspect all the cases in which the instances may end, starting with Cases (B1) and (F1). We remark that we use only crude bounds to keep the analysis simple. Lemma 6.8. If the schedule ends in Case (B1) or (F1), we have LADV > LALG + A. Proof. Recall that each block (t, t0 ] has length of at most φ`k , thus LALG ((t, t0 ]) ≤ sφ`k and LADV ((t, t0 ]) ≤ φ`k . We call a block in which ADV schedules many ε’s small, other blocks are big. Note that Cases (B3), (B4), and (F3) concern small blocks, whereas Cases (B5), (B6), and (F4) concern big blocks. Using Lemma 6.3, we have that in each small block (t, t0 ] it holds LADV ((t, t0 ]) ≥ LALG ((t, t0 ]) + ε. Let β be the number of small blocks. We observe that   N0 − φ`εk ε β≥ , φ`k because in each such block ADV schedules at most φ`k /ε packets of size ε and PADV (0) < φ`k at the end in Cases (B1) and (F1). Pk The number of big blocks is at most i=1 Ni , since in each such block ADV schedules a packet of size at least `1 . For each such block we have LADV ((t, t0 ]) − LALG ((t, t0 ]) ≥ −sφ`k which is only a crude bound, but it suffices for N0 large enough. Summing over all blocks we obtain   k k N0 − φ`εk ε2 X X − sφ`k Ni LADV − LALG ≥ βε − sφ`k Ni ≥ φ`k i=1 i=1 > A + sφ`k k X Ni − sφ`k i=1 where (6.3) follows from N0 > φ`k (A + 1 + sφ`k k X Ni = A , (6.3) i=1 Pk i=1 Ni )/ε2 . It remains to prove the same for termination by Case (F2). Lemma 6.9. If Strategy Finish ends in Case (F2), then LADV > LALG + A. Proof. Note that ADV schedules all short packets and all ε’s, i.e., those of size less than `i . In particular, we have LADV (< i) ≥ LALG (< i). Call a block in which ALG completes a packet of size at least `i bad. As the length of any block is at most φ`k we get that LALG (≥ i, (t, t0 ]) ≤ sφ`k for a bad block (t, t0 ]. Bad blocks are created only in Cases (B5) and (B6), but in each bad block ADV finishes a packet strictly larger than `i ; note that Pk here we use Lemmata 6.5 and 6.6. Hence the number of bad blocks is bounded by j=i+1 Nj . As ADV completes all `i ’s we obtain LADV (≥ i) − LALG (≥ i) ≥ `i Ni − `k φs k X Nj j=i+1 > `i `k φs k X Nj + A − `k φs j=i+1 k X Nj ≥ A , j=i+1 Pk where in the strict inequality we used Nk > A/`k for i = k and Ni > `k φs j=i+1 Nj + A/`i for i < k. By summing it with LADV (< i) ≥ LALG (< i) we conclude that LADV > LALG + A. Using Lemmata 6.8 and 6.9 we conclude the proof of the theorem. 24 7 Analysis of DIV In this section we analyze DIV , giving a simple proof that it matches the performance of the algorithms from [7] on divisible instances. We use the framework of local analysis from Section 4. Throughout the section we assume that the packet sizes are divisible. We start by a few observations on divisibility that lead to a strengthening of Lemma 2.2. Recall that rel(t) = s · (t − tB ) is the relative time after the start of the current phase tB , scaled by the speed of the algorithm. Lemma 7.1. (i) If DIV starts or completes a packet of size `i at time t, then `i divides rel(t). (ii) Let t be a time with rel(t) divisible by `i and rel(t) > 0. If a packet of size `i is pending at time t, then DIV starts or continues running a packet of size at least `i at time t. (iii) If at the beginning of phase at time u a packet of size `i is pending and no fault occurs before time t = u + `i /s, then the phase does not end before t. Proof. (i) follows trivially from the description of the algorithm. (ii): If DIV continues running some packet at t, it cannot be a packet smaller than `i by (i) and the claim follows. If DIV starts a new packet, then a packet of size `i is pending by the assumption. Furthermore, it satisfies all the conditions from Step 3 of the algorithm, as rel(t) is divisible by `i and rel(t) ≥ `i (from rel(t) > 0 and divisibility). (iii): We proceed by induction on i. Assume that no fault happens before t. If the phase starts by a packet of size at least `i , the claim holds trivially, as the packet is not completed before t. This also proves the base of the induction for i = 1. It remains to handle the case when the phase starts by a packet smaller than `i . Let P <i be the set of all packets of size smaller than `i pending at time u. By the Step (2) of the algorithm, `(P <i ) ≥ `i . We show that all packets of P <i are completed if no fault happens, which implies that the phase does not end before t. Let j be such that `j is the maximum size of a packet in P <i ; note that j exists, as the phase starts by a packet smaller than `i . By the induction assumption, the phase does not end before time t0 = u + `j /s. From time t0 on, the conditions in Step (3) guarantee that the remaining packets from P <i are processed from the largest ones, possibly interleaved with some of the newly arriving packets of larger sizes, as rel(τ ) for the current time τ is always divisible by the size of the largest pending packet from P <i . This shows that the phase cannot end before all packets from P <i are completed, if no fault happens. Now we prove a stronger analogue of Lemma 4.3. Lemma 7.2. (i) If (u, v] is an initial i-segment then LDIV (s) (≥ i, (u, v]) > s(v − u) − 3`k . (ii) If (u, v] is a proper i-segment and s(v − u) ≥ `i then LDIV (s) (≥ i, (u, v]) > s(v − u)/2 − `i ; furthermore LDIV (s) ((u, v]) > s(v − u)/2 and LDIV (s) ((u, v]) is divisible by `i . Proof. Suppose that time t ∈ [u, v) satisfies that rel(t) divisible by `i and rel(t) > 0. Then observe that Lemma 7.1(ii) together with the assumption that a packet of size `i is always pending in [u, v) implies that from time t on only packets of size at least `i are scheduled, and thus the current phase does not end before v. For a proper i-segment (u, v], the previous observation for t = u + `i /s immediately implies (ii): Observe that t ≤ v by the assumption of (ii). Now LDIV (s) (< i, (u, v]) is either equal to 0 (if the phase starts by a packet of size `i at time u) or equal to `i (if the phase starts by a smaller packet). In both cases `i divides LDIV (s) (< i, (u, v]) and thus also LDIV (s) ((u, v]). As in the analysis of MAIN , the total size of completed packets is more than s(v − u)/2 and (ii) follows. For an initial i-segment (u, v] we first observe that the claim is trivial if s(v − u) ≤ 2`i . So we may assume that u + 2`i /s ≤ v. Now we distinguish two cases: 1. The phase of u ends at some time u0 ≤ u + `i /s: Then, by Lemma 7.1(iii) and the initial observation, the phase that immediately follows the one of u does not end in (u0 , v) and from time u0 + `i /s on, only packets of size at least `i are scheduled. Thus LDIV (s) (< i, (u, v]) ≤ 2`i . 2. The phase of u does not end by time u + `i /s: Thus there exists t ∈ (u, u + `i /s] such that `i divides rel(t) and also rel(t) > 0 as t > u. Using the initial observation for this t we obtain that the phase does not end in (u, v) and from time t on only packets of size at least `i are scheduled. Thus LDIV (s) (< i, (u, v]) ≤ `i . 25 In both cases LDIV (s) (< i, (u, v]) ≤ 2`i , furthermore only a single packet is possibly unfinished at time v. Thus LDIV (s) (≥ i, (u, v]) > s(v − u) − 2`i − `k and (i) follows. Theorem 7.3. Let the packet sizes be divisible. Then DIV (1) is 2-competitive. Also, for any speed s ≥ 2, DIV (s) is 1-competitive. Proof. Lemma 7.2(i) implies (4.2). We now prove (4.1) for any proper i-segment (u, v] with v − u ≥ `i and appropriate R. The theorem then follows by the Master Theorem. Since u is a time of a fault, we have LOPT (≥ i, (u, v]) ≤ v − u. If LOPT (≥ i, (u, v]) = 0, (4.1) is trivial. Otherwise LOPT (≥ i, (u, v]) ≥ `i , thus v − u ≥ `i ≥ `i /s and the assumption of Lemma 7.2(ii) holds. For s ≥ 2, Lemma 7.2(ii) implies LDIV (s) (≥ i, (u, v]) > s(v − u)/2 − `i ≥ v − u − `i ≥ LOPT (≥ i, (u, v]) − `i . Since both LDIV (s) (≥ i, (u, v]) and LOPT (≥ i, (u, v]) are divisible by `i , this implies LDIV (s) (≥ i, (u, v]) ≥ LOPT (≥ i, (u, v]), i.e., (4.1) holds for R = 1. For s = 1, Lemma 7.2(ii) implies LDIV ((u, v]) + LDIV (≥ i, (u, v]) > (v − u)/2 + (v − u)/2 − `i ≥ v − u − `i ≥ LOPT (≥ i, (u, v]) − `i . The divisibility of LDIV ((u, v]), LDIV (≥ i, (u, v]), and LOPT (≥ i, (u, v]) by `i implies LDIV ((u, v]) + LDIV (≥ i, (u, v]) ≥ LOPT (≥ i, (u, v]), i.e., (4.1) holds for R = 1. References [1] Antonio Fernández Anta, Chryssis Georgiou, Dariusz R. Kowalski, Joerg Widmer, and Elli Zavou. Measuring the impact of adversarial errors on packet scheduling strategies. J. Scheduling, 19(2):135– 152, 2016. Also appeared in Proc. of SIROCCO 2013: 261–273. URL: http://dx.doi.org/10. 1007/s10951-015-0451-z. [2] Antonio Fernández Anta, Chryssis Georgiou, Dariusz R. Kowalski, and Elli Zavou. Competitive analysis of task scheduling algorithms on a fault-prone machine and the impact of resource augmentation. In Proc. of the 2nd Int. Workshop on Adaptive Resource Management and Scheduling for Cloud Computing (ARMS-CC@PODC), LNCS 9438, pages 1–16, 2015. URL: http://dx.doi.org/10.1007/978-3-319-28448-4_1. [3] Antonio Fernández Anta, Chryssis Georgiou, Dariusz R. Kowalski, and Elli Zavou. Online parallel scheduling of non-uniform tasks: Trading failures for energy. Theor. Comput. Sci., 590:129–146, 2015. Also appeared in Proc. of FCT 2013: 145-158. URL: http://dx.doi.org/10.1016/j.tcs. 2015.01.027. [4] Marek Chrobak, Leah Epstein, John Noga, Jiřı́ Sgall, Rob van Stee, Tomáš Tichý, and Nodari Vakhania. Preemptive scheduling in overloaded systems. J. Comput. Syst. Sci., 67:183–197, 2003. URL: http://dx.doi.org/10.1016/S0022-0000(03)00070-9. [5] P. Garncarek, T. Jurdziński, and K. Loryś. Fault-tolerant online packet scheduling on parallel channels. In 2017 IEEE International Parallel and Distributed Processing Symposium (IPDPS), pages 347–356, May 2017. doi:10.1109/IPDPS.2017.105. [6] Chryssis Georgiou and Dariusz R. Kowalski. On the competitiveness of scheduling dynamically injected tasks on processes prone to crashes and restarts. J. Parallel Distrib. Comput., 84:94–107, 2015. URL: http://dx.doi.org/10.1016/j.jpdc.2015.07.007. [7] Tomasz Jurdzinski, Dariusz R. Kowalski, and Krzysztof Loryś. Online packet scheduling under adversarial jamming. In Proc. of the 12th Workshop on Approximation and Online Algorithms (WAOA), LNCS 8952, pages 193–206, 2014. See http://arxiv.org/abs/1310.4935 for missing proofs. URL: http://dx.doi.org/10.1007/978-3-319-18263-6_17. 26 [8] Bala Kalyanasundaram and Kirk Pruhs. Speed is as powerful as clairvoyance. J. of the ACM, 47(4):617–643, 2000. Also appeared in Proc. of the 36nd IEEE Symp. on Foundations of Comput. Sci. (FOCS), pages 214–221, 1995. URL: http://doi.acm.org/10.1145/347476.347479. [9] Chiu-Yuen Koo, Tak Wah Lam, Tsuen-Wan Ngan, Kunihiko Sadakane, and Kar-Keung To. On-line scheduling with tight deadlines. Theor. Comput. Sci., 295:251–261, 2003. URL: http://dx.doi. org/10.1016/S0304-3975(02)00407-3. [10] Tak Wah Lam, Tsuen-Wan Ngan, and Kar-Keung To. Performance guarantee for EDF under overload. J. Algorithms, 52:193–206, 2004. URL: http://dx.doi.org/10.1016/j.jalgor.2003.10.004. [11] Tak Wah Lam and Kar-Keung To. Trade-offs between speed and processor in hard-deadline scheduling. In Proc. of the 10th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pages 623–632. ACM/SIAM, 1999. URL: http://dl.acm.org/citation.cfm?id=314500.314884. [12] Cynthia A. Phillips, Clifford Stein, Eric Torng, and Joel Wein. Optimal time-critical scheduling via resource augmentation. Algorithmica, 32:163–200, 2002. URL: http://dx.doi.org/10.1007/ s00453-001-0068-9. [13] Kevin Schewior. Deadline Scheduling and Convex-Body Chasing. PhD dissertation, TU Berlin, 2016. URL: http://dx.doi.org/10.14279/depositonce-5427. 27
8cs.DS
Isotropic Dynamic Hierarchical Clustering Victor Sadikov Oliver Rutishauser at&t 200 S Laurel Av. A5-2D20 Middletown, NJ 07748 (732) 420-7453 Atlantic Style P.O.Box 9 Oakhurst, NJ 07755 (732) 455-2081 [email protected] [email protected] ABSTRACT We face a business need of discovering a pattern in locations of a great number of points in a high-dimensional space. We assume that there should be a certain structure, so that in some locations the points are close while in other locations the points are more dispersed. Our goal is to group the close points together. The process of grouping close objects is known under the name of clustering. 1. We are particularly interested in a hierarchical structure. A plain structure may reduce the number of objects, but the data are still difficult to manage or present. 2. The classical technique suited for the task at hand is a B-Tree. The key properties of the B-Tree are that it is hierarchical and balanced, and it can be dynamically constructed from the input data. In these terms, B-Tree has certain advantages over other clustering algorithms, where the number of clusters needs to be defined a priori. The BTree approach allows to hope that the structure of input data will be well determine without any supervised learning. 3. The space is Euclidean and isotropic. This is the most challenging part of the project, because currently there are no B-Tree implementations processing indices in a symmetrical and isotropical way. Some known implementations are based on constructing compound asymmetrical indices from point coordinates, where the main index works as a key, while the function of other (999!) indices is lost; and the other known implementations split the nodes along the coordinate hyper-planes, sacrificing the isotropy of the original space. In the latter case the clusters become coordinate parallelepipeds, which is a rather artificial and unnecessary assumption. Our implementation of a B-Tree for a high-dimensional space is based directly on concepts of factor analysis. 4. We need to process a great deal of data, something like tens of millions of points in a thousand-dimensional space. The application has to be scalable, even though, technically, out task is not considered a true Big Data problem. We use dispersed data structures, and optimized algorithms. Ideally, a cluster should be an ellipsoid in a high-dimensional space, but such implementation would require to store O(n2) ellipse axes, which is impractical. So, we are using multi-dimensional balls defined by the centers and radii. On the other hand, calculation of statistical Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. The only reasonable numbers are zero, one, and infinity. Willem Louis van der Poel values like the mean and the average deviation, can be done in an incremental way. This mean that when adding a point to a tree, the statistical values for nodes of all levels may be recalculated in O(1) time. The node statistical values are used to split the overloaded nodes in an optimal way. We support both, brute force O(2n) and greedy O(n2) split algorithms. Statistical and aggregated node information also allows to manipulate (to search, to delete) aggregated sets of closely located points. 5. Hierarchical information retrieval. When searching, the user is provided with the highest appropriate nodes in the tree hierarchy, with the most important clusters emerging in the hierarchy automatically. Then, if interested, the user may navigate down the tree to more specific points. The system is implemented as a library of Java classes representing Points in multi-dimensional space, Sets of points with aggregated statistical information (mean, standard deviation,) B-tree, and Nodes with a support of serialization and storage in a MySQL database. CCS Concepts ➝ • Theory of computation Theory and algorithms for application domains Machine learning theory Unsupervised learning Mathematical and clustering • Mathematics of computing software Statistical software • Information systems Information retrieval Retrieval tasks and goals Clustering and classification ➝ ➝ ➝ ➝ ➝ ➝ ➝ Keywords Clustering; Hierarchical clustering; Dynamic clustering; Isotropic clustering; Multi-dimensional space; B-tree; Factor analysis. 1. ( Points, Implementation ) In a high-dimensional space we assume that a considerable number of coordinates will contain zero values. To optimize the memory and storage space we would like to keep non-zero coordinates only. Thus, a Point object contains 3 fields: the number of non-zero coordinates, the array of sorted coordinate indices, and the array of corresponding coordinate values. class Point { int N = 0; int[] key; float[] val; } // # of non-zero coordinates // array of coordinate indices // array of coordinate values The Point class provides methods for calculating the Euclidean length of the point vector, getting a particular coordinate (or zero,) adding another point to the given point, calculating a few useful functions like distance to another point, dot product, and serializing to a base-64 string. Some functions, e.g. adding a point, may change the number of non-zero coordinates. The main loop for adding two points looks like the following. int Ix = 0; int Ip = 0; int Iz = 0; for(; Ix != this.N && Ip != p.N ;) { if(this.key[Ix] == p.key[Ip]) { z.key[Iz] = this.key[Ix]; z.val[Iz] = this.val[Ix] + p.val[Ip]; Ix++; Ip++; Iz++; } else if(this.key[Ix] < p.key[Ip]) { z.key[Iz] = this.key[Ix]; z.val[Iz] = this.val[Ix]; Ix++; Iz++; } else { z.key[Iz] = p.key[Ip]; z.val[Iz] = p.val[Ip]; Ip++; Iz++; } } 2. ( Sets, Mathematics ) The next step of our approach is the introduction of Sets of Points. The Sets allow calculation of aggregated statistical values. The most important value is the number of points (N) in the Set. It needs to be corrected each time a new point is added to the Set. The obvious way of calculating the new number of points is to increment the current number by one. N = N + 1; Other important statistical values of the set of points are arithmetic mean and the standard deviation. These values should also be adjusted every time a point is added to the Set. We could recalculate the arithmetical mean (M) from scratch, but we would like to follow the incremental approach and move it towards the newly added point (P) by the 1/N of the distance. M = M + (P - M) /N; As for standard deviation, at first sight, it seems to be a value that requires the full recalculation. Fortunately, this is not the case. We can store and adjust the standard deviation in an incremental way too, based on the following formula. E[X – E(X)]2 = E[X2] – (E[X]) 2 This means that to calculate the standard deviation it is enough to store the sum of the squares of point coordinates (S,) which can be adjusted incrementally. S = S + |P|2; And when we need to calculate the standard deviation we will do the following. D = sqrt( S/N - |M|2 ); 3. ( Clustering, Example ) Clustering basically means grouping similar objects together. If the objects have a number of numerical attributes they may be represented as points in a multidimensional space. The clustering will mean to partition the whole set of points into a number of disjoint sub-sets. Let's consider an example in a one-dimensional space. The example is free of the challenges related to multidimensional clustering and is easy to comprehend. Assume we are given the set of five numbers { 0. 4. 5. 9. 13.} Figure 1 We can see that initially the points occupy the segment [0, 13.] Assume we need to split the set of the given points on the number line into two clusters then the resulting clusters will be sub-segments. Even in this simple example two different splits are possible. The first splits makes segments [0, 5] and [9, 13] while the other makes segments [0, 4] and [5, 13] (see Figure 1.) In terms of segments, the first split looks better, because it finds two compact segments rich of points, while the second split covers almost the whole initial segment. In terms of statistical variables, the first split is better too, because the sum of the deviations of the resulting sets is minimal. 4. ( Dynamic Clustering, Approach ) If we continue adding new points, then we need to decide which sub-segment each new point belongs to. Points below 5 we can add to the first sub-segment, and points above 9 we add to the second sub-segment. We may place points between 5 and 9 into either subsegment. Our criterion here is to avoid big segments, or (which is the same) to keep the sum of deviations minimal. But we always need to update the boundaries of the subsegments so that we can exactly know in which segment a particular point is to be found. If the points are well spread, knowing exact boundaries of the segments may also improve unsuccessful search. After adding a certain number of points to a sub-segment, we will need to split this sub-segment into two subsegments with a smaller number of points. This can be done exactly in the same manner as we split the initial segment. After that we will be adding new points to the set of three sub-segments. Then we will need to split another sub-segment. And the number of sub-segments will increase again. Unlike the static approach where the set of all objects exists before the procedure of clustering starts; dynamic approach assumes that clusters are incrementally adjusted each time a new object gets added into the set. This eliminates the dedicated step of clustering for the price of a longer time needed to include objects. Dynamic clustering provides better flexibility and can be performed with less a priori known information about the data, e.g. when the total number of target clusters is unknown. 5. ( Hierarchical Clustering, Approach ) The bigger the number of points in our data set, the bigger the number segments. Soon it gets big enough, and we may need to introduce the next level of hierarchy, when smaller clusters are, in their turn, grouped into clusters of the higher level. The approach of adding points, splitting segments, and adding new levels when necessary is quite similar to adding objects to a B-tree [1.] The tree starts with the root node, responsible for all points stored in the tree. At each level, the parent node consist of a number of sub-nodes. The points in each sub-node are close one to another. A classical one-dimensional B-tree design focuses on minimization of the information stored at the node level. Namely, a parent node stores a number of adjacent values in ascending order, with the sub-nodes being placed between adjacent values, plus one at the beginning and one at each end. Thus we know that the elements of each subtree are greater than the left adjacent value and less than the right one. On the contrary, our design prefers to store excessive boundary and statistical information about the sub-nodes. In the case of one-dimensional space, each node occupies a segment and sub-nodes of one parent do not intersect. The boundary segment can be defined by its two ends, or by the middle point (C) and the distance (R) to the ends. The letter way will occupy less memory in a general multidimensional case. We also keep the number of points in each sub-tree, their arithmetic mean and standard deviation. As we stated above, statistical values facilitate splitting the nodes in the optimal way, while the boundary information allows us in some cases to terminate an unsuccessful search heuristically. 6. ( Isotropic B-tree, Approach ) B-trees do their work great, as long as the attributes of the objects are one-dimensional. Unfortunately, there are some problem with direct extension of B-tree to a multidimensional case. The two common approaches are the following. The mix approach assumes composing the compound index based on the component indices, and then making use of a one-dimensional B-tree. The problem with this approach is that the component indices are treated by far not equally. One index plays the main role, while the role of the others is insignificant. The other approach is more complicated. R-tree [2] is a variant of B-tree where the nodes are bound by coordinate rectangles. This approach is more symmetrical in terms of using indices. But the directions along the coordinate axes are still different from arbitrary ones. We would like to build a variant of B-tree, where the nodes are bound with circles or ellipses. This decision ensures that the essential property of isotropy of the physical space is not ignored. 7. ( Isotropic Dynamic Hierarchical Clustering, Two-Dimensional Case ) The circles are defined by the center point (C) and the radius (R.) It the 2-dimensional space, the center is defined by the two coordinates, and so we need to store 3 real values. Alternatively, if we decided to present clusters as ellipses in general orientation, we will need to store the semi-principal axes and the angles, which would require O(n2) memory, with n being the number of dimensions in the space. In the picture to the right, the circles corresponding to the sub-nodes of one and the same parent do not intersect. The biggest circle (P) corresponds to the parent node, while C1, C2, and C3 correspond to the sub-nodes. Keeping on adding new points to the tree we cannot avoid the situation where the sub-nodes start to intersect. We will dwell on the intersecting areas later in this paper. 7.1 Selecting a Sub-Node As mentioned in section 4, while adding a new point outside any bounding circle, we need to select the most appropriate sub-node. To do this, we will try to add the new point to each sub-node, and calculate the new bounding radii. Then we will select a sub-node so that the sum of the new squared radii should be minimal, because our goal is to make eventually all sub-node circles of about the same absolute size in the given space. Let’s assume that the old radius was Ri, then the new radius will be Ri+Hi/2, where Hi is the distance from the new point to the circle Ci. If we select the i-th sub-node, the sum of new squared radii will grow by (Ri+Hi/2)2 – Ri2, i.e. by RiHi+Hi2/4, so we need to select the sub-node where Ti= 4RiHi+Hi2 is minimal. 7.2 Splitting the Overloaded Node When a node gets overloaded, i.e. it includes more than the maximum number of sub-nodes or points; the node needs to be split into two nodes at the same level. In the classical B-tree the node is split into two nodes with the equal number of elements. In our case, we can split the node taking into account the following criteria: • the maximum radius of the two new circles is minimal; • the new nodes intersect with the minimal area; • the sum of standard deviations of the new nodes is minimal. To this goal, first we will find the pair of points at the longest distance. In the figure to the right, such a pair consists of points a and b. If these points both belonged to one and the same bounding circle, the radius of this circle would be greater than the distance Da,b/2, which, as we assume, is the maximum distance. So, to minimize the maximum radius we need to distribute points a and b to the different bounding circles Ca and Cb. Now we will find point c, so that the distance from c to either of circles Ca and Cb is the longest. In the picture above, it is the distance between point c and circle Ca (which now consists of just one point a.) Once again, to minimize the would-be radii, we need to distribute point c to the other circle, Cb. Continuing in the same manner, we will ultimately get circles Ca and Cb, as shown in the picture. 7.3 Adjusting Bounding Circles Let’s assume that we need to add a new point (Q) to the tree. We start from the root and go down the tree, level by level. At each level we need to select the most appropriate sub-node. E.g. at the parent level P, we need to select one of the sub-nodes, C1, C2, or C3. Logically, there are two different cases. If the new point belongs to a particular bounding circle, no adjustment is needed. But if the new point is outside of any bounding circle, we need to select the most appropriate sub-node; to add the new point to the selected sub-node; and to adjust the corresponding bounding circle, so that it should include the new point as well as all old points. See the figure below. points. In the 2-dimensional case, the new minimal bounding circle can be exactly calculated. In the figure above, the minimal circle is the circle circumscribed about the triangle of the first two points and point Q. It can be calculated from the coordinates of these E.g. the radius of the circumscribed circle is L1*L2*L3/sqrt( (L1+L2+L3)*(L2+L3-L1)*(L1-L2+L3)*(L1+L2-L3) ), where L1, L2 and L3 are the lengths of the sides. In a multi-dimensional space, the situation is much more complicated. Fortunately, we do not need the exact minimal bounding circles. The bounding circles are very useful in many procedures where they heuristically allow to reduce the amount of calculation, but fortunately they are not critical. So, we would recommend to use a less exact but easier to calculate approximation. We can easily construct the new bounding circle (C’) about the old bounding circle (C) and the newly added point (Q) as shown in the figure to the right. First, we calculate the distance (H) from the point Q to the circle C. Then we move the center of the circle C towards Q by H/2. This will be the center of C’. The radius of the new circle will be the old radius (R) plus H/2. Thus, the circle C’ will surely contain all old points as well as the new point. Moreover, the new bounding circle (C’) can be easily optimized. By construction, the new circle has to lie through the point Q, but it doesn’t probably lie through any other actual points. So, we can shrink the circle, so that it lies through yet another point. Let’s shift the center (O) of the circle towards the point Q, so that the new circle with the center Oa lies both through points Q and A. See the picture above. The value of the shift can be calculated based on the points Q, O and A. When we shift the center for the point A, this doesn’t necessarily mean that any other point B will belong to the new shrunken circle. But we can repeat this procedure for all points of the set, and find the largest shrunken circle, corresponding to the shortest allowed shift. That circle will work for all the points of the set. 7.4 Calculation of a Quasi-Minimal Bounding Circle Let’s assume that point T is the foot of the perpendicular dropped from point A on the line (Q,O.) Then |A T|2 + |T Q|2 = |A Q|2. and |A T|2 + |T Oa|2 = |A Oa|2. But |T Oa| = |T Q| - |Oa Q| and |Oa Q| = |Oa A|. So, finally, |Oa Q| should be |A Q|2 / 2 |T Q|, where |T Q| is the projection of the vector [Q A] on line (Q,O) and can be calculated by means of the dot product. 7.5 Exact Minimal Bounding Circle Please notice that, in some cases, the exact minimal bounding circle may be slightly smaller than the quasi-minimal circle constructed above. Moreover, the shrunken circle (C’) depends on the initial circle C. If the set consists of just one point, the exact minimal circle is the circle with the center in that point and the radius of zero. If the set contains two points, the exact minimal circle is the circle from the center of mass and the radius of half the distance between the points. If the set contains three points, there are two cases. Either, the exact minimal circle is the circle circumscribed around these three points. Or, the circle built on the two of the three points as a diameter, provided that the third point lies inside it. If we want to build the circle for the second case, we need first to find the two (out of the three) points with the longest distance between them. Then, we need to check that the third point (X) will make an obtuse-angled triangle. I.e. |A X|2 + |X B|2 < |A B|2. Sets of more than three points are quite similar. So, to find whether point x belongs to the circle C1, we need to calculate |O1 - x|2 - |O2 - x|2 - R12 + R22, and to compare it with zero. If we do not want to build the exact minimal circle, we may use the shrinking technique. But we will need a good first approximation for the minimal circle. As shown above, the circle build on the longest segment plays an essential role in construction of minimal circles; besides, and it is easy to calculate. This makes it a good first approximation for building quasi-minimal bounding areas. While splitting the node, we expect that the results nodes will have bounding areas with smaller radii. Let’s assumes that a and b are the points with the greatest distance between them, as in the picture above. If we ultimately put these points into one and the same node, the radius of the bounding circle for that node can not be less than |a b|, which is almost the radius of the bounding circle for the original node. To avoid this, we have to put a and b into different nodes. Now we have nodes Ca and Cb, consists of points a and b, correspondingly. 8. ( Multi-Dimensional S-Tree, Full Details) So far we have clearly described what we would like to achieve in our multi-dimensional S-Tree. A real implementation is not so smooth, and requires solutions to a number of complicated issues. 8.1 Overlapped Circle As mentioned in Section 7, some sub-nodes of a given node may overlap. Such cases may occur when a new point is added to a sub-node, which results in adjusting the bounding circle of this sub-node, or when a sub-node is split into two sub-nodes at the same level, as discussed in Section 7.2. In this case the actual areas of sub-nodes are not circle, but they are rather “cut” circles, as shown in the picture below. The reason for the sub-node areas to be nothing but the “cut” circles is that the areas need to be convex. Now, the more complicated form of the areas makes us change the way we calculate the appropriate sub-node when the given point x belongs to both bounding circles. In the two-dimensional space we use line L, to determine where point x belongs to. All points at one side of line L belong to one sub-node, while all the points at the other side belong to the other sub-node. Analogically, in the multi-dimensional space, the border line L will become a plane. All points at one side of the plane will belong to one sub-node, and all points at the other side of the plane L will belong to the other sub-node. 8.2 Splitting the Node When a node gets overloaded, i.e. it includes more than the maximum number of sub-nodes or points; the node needs to be split into two nodes at the same level. At the next step let’s consider, say, the point c. We can either put it into Ca or Cb. And we need to estimate how good or bad it would be to put it into a particular node. E.g. we can try to optimize (to keep minimal) the maximum radius of Ca and Cb. But, now we know that there is something more unpleasant than just big radii; it is overlapped circles. So we may want to keep the circles overlapped in the minimal possible measure. In the previous section we have introduced the expression L2 – (R2 – r2). It shows in what manner the circles are overlapped, and should be greater than zero. We will try to optimize (to keep maximal) this expression. It gives the same rules for selecting points a, b, and c, but gives better results at next steps. 9. ( Example, Two-Dimensional Case ) The most challenging task of implementing a B-tree is a split of overloaded nodes. When a node is split into two nodes, there appears a new boundary. All sub-nodes of the given node may need to be recursively split by the new boundary. The picture below illustrates the result of a split for a two-dimensional case. Every plane in the multi-dimensional space can be defined by its normal vector and the distance from the point of origin. The only drawback is that theoretically we will need a border plane for each pair of sub-nodes. E.g. if a parent node has, say, 5 sub-nodes, we will need to store 10 border plains. A more memory-effective way would be to calculate the equation of the plane L on the fly, based on the bounding circles. Namely, as we discussed, the circle C1 can be defined by its center, O1, and the radius R1. Analogically, we define the circle C2 by the center O2 and the radius R2. It is easy to see that the border plane L is the set of all the point such as the difference between their squared distances to points O1 and O2 is constant. |O1 - x|2 - |O2 - x|2 = F1,2 To be precise, the constant F1,2 is the difference between the squared radii of the circles in question, i.e. F1,2 = R12 – R22 Here the new boundary is highlighted in red. The new sub-trees are painted olive and violet. The higher levels are darker than lower levels, so that it would be easier to trace the centers of clusters. 10. ( Illustration, Three-Dimensional Case ) As we discussed in Section 8.1, ideally, the clusters of a particular level should form isotropic ellipsoids. The result we would like to get should look like soap foam bubbles. Now we can define a target point in a 1024-dimensional space where each dimension corresponds to a meaning. The coordinates of the target point are calculated by accumulating all weights corresponding to particular meanings. It also seems reasonable to divide the coordinates by the number of the words in the text, so that repletion of sentences or words does not affect the meaning of the text. 12. CONCLUSIONS Arbitrary points in multi-dimensional space can be isotropically clustered into a balanced hierarchical structure, similar to a B-tree. Clustering into a multi-dimensional B-tree does not require any supervision or any a priori given information, like the number of clusters. Clustering into a multi-dimensional tree can be done dynamically and efficiently. Adding new points to the tree requires only incremental updates of statistical values associated with nodes. Text pages can be mapped to points into 1000-dimentional semantic space. The search of pages close to a given semantic point can return a hierarchically ordered results, allowing the user to select more general or more specific topics. 11. ( Example, Multi-Dimensional Case ) As an example we will cluster wiki pages. 1. The first step is to parse an HTML page and to extract pure text. There are several tools available for this purpose. We use JavaCC, an open source parser and lexical analyzer generator. The generator accepts a formal grammar definition, written in .JJ file, which also allows to define additional custom code. The input to the lexical analyzer is a sequence of characters; the output is a sequence of tokens. In our example, we are interested in skipping HTML tags and parsing the text further, so that it become a list of words. At this stage we are dropping everything what is not a word, i.e. numbers, email addresses, references to web pages, expressions, identifiers, etc. 2. Then, we analyze the text and map it to a point in a semantic space. For each word in text we will find the root. Basically, for verbs we drop endings as -s, -ed, -ing; for nouns we drop ending – s. Actually, the procedure is a bit more complicated due to language exceptions. Secondly, we calculate the weight of the word. We assume that more frequent words should have a lighter weight than infrequent words. So, we distributed all the words to 256 sets with about equal frequencies. Thirdly, we find the meaning of the word in question. We have split all words to 1024 groups with similar meanings. Please notice, that one word can have more than one meanings, with only one of them being actualized in the text. Without knowing what the actual meaning is, we have to add all meaning with the same weights depending on the frequency of the word. 13. ACKNOWLEDGMENTS This research was not sponsored by National Science Foundation or any other financial source. 14. REFERENCES [1] Donald E. Knuth, 1973, Sorting and Searching, volume 3, The Art of Computer Programming, Addison-Wesley. [2] Antonin Guttman, 1984, R-trees: a dynamic index structure for spatial searching, ACM, New York, USA. (1984-r-treeguttman.pdf) [3] Sean Owen et al. 2011, Mahout in Action, Manning Publications Co., New York, USA. (ISBN 9781935182689, Mahout.in.Action.pdf) [4] Richard A. Reyment, K. G. Joereskog, 1993, Applied Factor Analysis in the Natural Sciences, Cambridge University Press, UK. [5] George A. Miller, 2003, WordNet Lexical Database of English Language, Cognitive Science Laboratory of Princeton University [6] Roget's Thesaurus, 2006, Electronic Lexical Knowledge Base (ELKB) http://www.nzdl.org/ELKB [7] Adam Kilgarriff, 1995, BNC Database and Word Frequency Lists, http://www.kilgarriff.co.uk/bnc-readme.html [8] Brian Goetz's, 2003, HTML Parser.
8cs.DS
arXiv:1211.6555v1 [math.AC] 28 Nov 2012 Vertex covers and sensor networks MAURIZIO IMBESI Faculty of Sciences, Department of Mathematics, University of Messina Viale Ferdinando Stagno d’Alcontres, 31 − I 98166 Messina, Italy e-mail: [email protected] MONICA LA BARBIERA Faculty of Sciences, Department of Mathematics, University of Messina Viale Ferdinando Stagno d’Alcontres, 31 − I 98166 Messina, Italy e-mail: [email protected] Abstract We consider algebraic developments of graph theory through suitable applications in real connection problems. We investigate ideals of vertex covers for the edge ideals associated to a significative class of connected graphs. It is shown that algebraic procedures linked to minimal vertex covering of such graphs are good instruments concerned about how sensor networks can be encoded and their properties measured. Moreover algebraic properties of such ideals are studied. Using the notion of linear quotients, standard algebraic invariants are computed and these ideals are stated to be Cohen-Macaulay. AMS 2010 Subject Classification: 05C25, 05E40, 13C15. Key words and phrases: Ideals of vertex covers. Sensor network. Linear quotients and standard invariants. Introduction In this paper we are interested in studying standard properties of monomial ideals arising from a class of graphs in order to explain how algebraic models, built through graph theory, are useful for setting suitable solutions of several problems concerning network areas (infrastructure nets, circuits electrical workers, urban and territorial analysis, wireless sensor networks, etc...). In the last years, Commutative and Combinatorial Algebra have paid particular attention to large classes of monomial ideals derived from graphs in order to describe algebraic properties of them. Such ideals turn out to be very interesting from a combinatorial point of view too. Classical topics include graph algebraic theory, in particular the edge ideals, namely monomial ideals generated in degree two which descend from the edges of a graph. Moreover, using the notion of minimal covering for the nodes of a graph, recent results show that it is possible to attach to graphs the so-called ideals of vertex covers; an intensive study of them carries to solve interesting and unthinkable problems related to these fields. More precisely, the ideals of vertex covers of a wide class of simple graphs are examined and useful properties are studied. Moreover, we explain how algebraic methods arising from graph theory are suitable solutions for several problems concerning the wireless sensor networks. Wireless sensor networks (WSNs) are an important technology for large-scale monitoring, providing sensor measurements at high temporal and spatial resolution. A sensor network is composed of a large number of sensor nodes, which are densely deployed either inside the phenomenon or very close to it. These sensor nodes, which consist of sensing, data processing, and communicating components, leverage the idea of sensor networks based on collaborative effort of a large number of nodes. Sensor nodes are fitted with an on-board processor. Instead of sending the raw data to the nodes responsible for the fusion, sensor nodes use their processing abilities to locally carry out simple computations and transmit only the required and partially processed data. The above described features ensure a wide range of monitoring applications for sensor networks. Some of the application areas are environmental, military, security and commercial ([1]). We consider the problem of the placement of as few as possible leader nodes which collect the information received by the sensors and send them to a base station, so that each sensor is near to at least one of them. This problem is related to the energy saving of the sensors. The suitable model to represent this situation is a simple graph G and the problem is linked to the study of the minimal vertex covers of G. We introduce a class of simple graphs and some algebraic aspects linked to the minimal vertex covers are analyzed. We show that the algebraic procedures introduced are good instruments concerned how this problem related to wireless sensor networks can be encoded and solved. Let G be a graph on n vertices v1 , . . . , vn . An algebraic object attached to G is the edge ideal I(G), a monomial ideal of the polynomial ring in n variables R = K[X1 , . . . , Xn ], K a field. When G is a simple graph, I(G) is generated by squarefree  monomials of degree two in R, I(G) = {Xi Xj | {vi , vj } is an edge of G } . The ideal of vertex covers of I(G), denoted by Ic (G) is the ideal of R generated by all the monomials Xi1 · · · Xik such that (Xi1 , . . . , Xik ) is an associated 2 prime ideal of I(G) ([9]). Under special situations, I(G) reflects properties of Ic (G) and the study of I(G) states some properties of Ic (G). In particular, the Cohen-Macaulay property of the ideals Ic (G) was studied by G. Lyubeznik in [8] using graph theoretical methods; the central notion is that of chordal graph, that is the right notion to express some homological properties of edge ideals and the Cohen-Macaulay property of the ideal of vertex covers. We examine a wide class of squarefree edge ideals associated to connected graphs H consisting of the union of a complete graph Km and star graphs with centers the vertices of Km . The ideals of vertex covers for the edge ideals associated to the these graphs were described in [6]. The generators of these ideals give all the minimal vertex covers and their cardinality. If H is considered to be the model of a WSN, then the vertex covers with minimum cardinality give the position of the leaders in the sensor network that H represents. Moreover we study some algebraic aspects of the ideals Ic (H). We prove that Ic (H) has linear quotients. In general, if a monomial ideal of R generated in one degree has linear quotients, then it has a linear resolution ([2], Lemma 4.1). In our case, Ic (H) has linear quotients, but in general Ic (H) has not a linear resolution because it is not generated in the same degree. Using some properties of the graph H and of its edge ideal we can obtain conditions such that Ic (H) has a linear resolution and some algebraic invariants are computed. Starting from theoretic properties of the graph H and of its edge ideal we can obtain information about the Cohen-Macaulay property of I(H) and of its ideal of vertex covers. The work is subdivided as follows. In section 1 we describe the developments of graph theory to networks concerning of problems of minimal vertex covers. The class of graphs H and the ideals of vertex covers Ic (H) are analyzed as a geometric model of a WSN using computational and algebraic methods. In section 2 we examine algebraic properties of Ic (H). We prove that these ideals have linear quotients and we investigate conditions such that they have a linear resolution. Moreover using the technique of studying the linear quotients of such ideals, as previously employed in [7], standard algebraic invariants are calculated. 1 Developments of graph theory to networks The aim of this section is to explain how algebraic and geometric models, built through graph theory, are useful for setting suitable solutions of several problems concerning the wireless sensor networks. A wireless sensor network (WSN) consists of spatially distributed autonomous 3 sensors (called sensor nodes) to monitor physical or environmental conditions (such as temperature, sound, vibration, pressure, humidity,...) and to pass their data through the network to a main location. The sensors collect data of interest and send them to special gateway nodes, which collect the information received by the sensors and send them to a base station. The sensor networks can improve the quality of information: for example, can guarantee a high fidelity, can provide information in real time and can reduce the cost of transmitting the same information. Current research indicates highly developments for this type of wireless networks which are already in use in many fields. Useful applications of sensor networks are environmental, military, and commercial. Area monitoring is a common application of WSNs that are deployed over a region where some phenomenons are to be monitored: the urban traffic or natural phenomena such as glaciers, volcanoes and earthquakes. Some environmental applications of sensor networks include tracking the movements of small animals; detecting foreign chemical agents in the air and the water, irrigation; precision agriculture; environmental monitoring in marine; forest fire detection; meteorological or geophysical research. Some of the commercial applications are monitoring product quality; interactive museums; monitoring disaster area; transportation; vehicle tracking and detection ([1]). Consider a sensor network in which each sensor must send information it has collected to the nearest gateway node. The problem is the placement of as few as possible gateway nodes so that each sensor is near to at least one of them. This problem is related to the energy saving of the sensors. The formalization of the model to represent the sensor network is given by a graph G = (V (G), E(G)), V (G) = {v1 , . . . , vn } is the set of nodes and E(G) = {{vi , vj }|vi 6= vj , vi , vj ∈ V (G)} is the set of edges (if two nodes v1 and v2 are adjacent then {v1 , v2 } ∈ E(G)). Our problem consists of finding a set of nodes leaders (gateway nodes) to be responsible to send messages to nodes belonging to the higher level. Such leaders must have the feature of being near to all nodes. This means that we want to find a subset of nodes C ⊂ V (G) such that each node in V (G) \ C is joined to a node in C. This is a problem of minimum vertex cover. The optimization problem of minimum vertex cover is looking for a covering of vertices of a graph that has minimum cardinality. The corresponding decision problem of vertex cover is, given a graph G and an integer k, if there is a vertex covering of G of minimal cardinality k or of cardinality at most k. The basic network topologies are represented by complete graphs, meshes, star graphs, trees. A single network may consist of several interconnected subnets of different topologies. We consider as a network topology a class of simple graphs union of a complete graph and star graphs, and some algebraic 4 aspects linked to this problem of minimal vertex covers are analyzed. Let’s introduce some preliminary notions. Let G be a graph. A cycle of G of length q is a subgraph Cq of G such that E(Cq ) = {{vi1 , vi2 }, {vi2 , vi3 }, . . . , {viq−1 , viq }, {viq , vi1 }}, where {vi1 , . . . , viq } ∈ V (G) and vij 6= vik if ij 6= ik . A chord of a cycle Cq is an edge {vij , vik } of G such that vij and vik are vertices of Cq with {vij , vik } ∈ / E(Cq ). A graph G is said chordal or triangulated if every cycle Cq in G, q > 3, has a chord. A graph G on n vertices v1 , . . . , vn is complete if there exists an edge for all pairs {vi , vj } of vertices of G.  It is denoted by Kn . A star graph on vertex set {vi }, {v1 , . . . , vi−1 , vi+1 , vn } with center vi , denoted by stari (n), i = 1, . . . , n , is a complete bipartite graph of the form K1, n−1 . The complementary graph of a graph G on {v1 , . . . , vn } is the graph G on {v1 , . . . , vn } whose edge set E(G) consists of those 2-element subset {vi , vj } for which {vi , vj } ∈ / E(G). If V (G) = {v1 , . . . , vn } and R = K[X1 , . . . , Xn ] is the polynomial ring over a field K such that each variable Xi corresponds to the vertex vi , the edge ideal I(G) associated to G is the ideal {Xi Xj | {vi , vj } ∈ E(G)} ⊂ R . Definition 1.1. Let G be a graph with vertex set V (G) = {v1 , . . . , vn }. A subset C of V (G) is said a minimal vertex cover for G if: (1) every edge of G is incident with one vertex in C; (2) there is no proper subset of C with this property. If C satisfies condition (1) only, then C is called a vertex cover of G and C is said to cover all the edges of G. The smallest number of vertices in any minimal vertex cover of G is said vertex covering number. We denote it by α0 (G). We consider some algebraic aspects linked to the minimal vertex covers of a graph G with set of edges E(G). More precisely, starting by the notion of minimal vertex cover, recent results show that is possible to attach to graphs the so-called ideals of vertex covers ([9]). There exists a one to one correspondence between the minimal vertex covers of G and the minimal prime ideals of I(G). In fact, ℘ is a minimal prime ideal of I(G) if and only if ℘ = (C), for some minimal vertex cover C of G ([9], Prop. 6.1.16). Hence ht(I(G)) = α0 (G). Thus the primary decomposition of the edge ideal of G is given by I(G) = (C1 ) ∩ · · · ∩ (Cp ), where C1 , . . . , Cp are the minimal vertex covers of G. Definition 1.2. The ideal of vertex covers of I(G), denoted by Ic (G) , is the ideal of R generated by all monomials Xi1 · · · Xik such that (Xi1 , . . . , Xik ) is an associated prime ideal of I(G). 5 Hence Ic (G) = ({Xi1 · · · Xik | {vi1 , . . . , vik } is a vertex cover of G}) and the minimal generators of Ic (G) correspond to the minimal vertex covers. Now we study this topic for a wide class of connected graphs and we show how it is possible to apply the results to the problem related to wireless sensor networks. More precisely, H is the connected graph on n vertices v1 , . . . , vn consisting of the union of a complete graph Km and star graphs in the vertices of Km : H = Km ∪ starj (k), where Km is the complete graph on m vertices v1 , . . . , vm , m < n, and starj (k) is the star graph on k vertices with center vj , for some j = 1, . . . , m, k ≤ n − m. We observe that V (starj (k)) ∩ V (Km ) = {vj } for j = 1, . . . , m. We denote |E(starj (k))| = ij , for j = 1, . . . , m. The edge ideal I(H) ⊂ R = K[X1 , . . . , Xn ] is stated in [6]: I(H) = (X1 Xm+1 , X1 Xm+2 , . . . , X1 Xm+i1 , X1 X2 , X2 Xm+i1 +1 , X2 Xm+i1 +2 , . . . , X2 Xm+i1 +i2 , X2 X3 , X1 X3 , X3 Xm+i1 +i2 +1 , X3 Xm+i1 +i2 +2 , . . . , X3 Xm+i1 +i2 +i3 , X3 X4 , X2 X4 , X1 X4 , . . . , Xm Xm+i1 +i2 +···+im−1 +1 , Xm Xm+i1 +i2 +···+im−1 +2 , . . . , Xm Xm+i1 +i2 +···+im−1 +im ). Remark 1.1. I(H) has a linear resolution ([6], Prop 1.1). R. Fröberg proved that the edge ideal of a simple graph has a linear resolution if and only if its complementary graph is chordal ([3]; [4], Th. 9.2.3). Hence H is chordal. In [6] it is given the structure of the ideal of vertex cover of I(H). In order to describe Ic (H) we rename the vertices of the complete graph Km vα1 , . . . , vαm , 1 6 α1 < α2 < . . . < αm = n, and α1 = 1 if there is not the star graph with center vα1 . The following proposition gives explicitly the generators of the ideals of vertex covers for the edge ideals I(H) when at least a vertex of Km has degree m − 1. Proposition 1.1. ([6], Prop. 2.1) Let H = Km ∪ starj (k) with n vertices v1 , . . . , vn and Km , m < n, with vertices vα1 , . . . , vαm , 1 6 α1 < α2 < . . . < αm = n. Let starj (k) be of the type starα1 (α1 ) on vertices v1 , . . . , vα1 , or starαi (αi − αi−1 ), for some i = 2, . . . , m. Then Ic (H) has m monomial squarefree generators and it is: (X1 ··· Xα1 −1 Xα2 ··· Xαm , Xα1 Xα3 ··· Xαm , . . . , Xα1 ··· Xαm−1 ), if i = 1, or (Xα2 ··· Xαm , . . . , Xα1 ··· Xαi−1 Xαi−1 +1··· Xαi+1−1 Xαi+1 ··· Xαm , . . . , Xα1 ··· Xαm−1 ), otherwise. More in general, it is given the structure of the ideal of vertex covers of I(H) when all the vertices of Km have degree at least m. 6 Theorem 1.1. ([6], Th. 2.1) Let H = Km ∪ starj (k) with m star graphs with centers each of the vertices of Km . The ideal of vertex covers of I(H) has m + 1 monomial squarefree generators and Ic (H) is (Xα1 Xα2 ··· Xαm , X1··· Xα1 −1 Xα2 ··· Xαm , Xα1 Xα1 +1··· Xα2 −1 Xα3 ··· Xαm , . . . , Xα1 · ·· Xαm−2 Xαm−2 +1 ··· Xαm−1 −1 Xαm , Xα1 ··· Xαm−1 Xαm−1 +1 ··· Xαm −1 ) . The monomial ideal Ic (H) is generated in degree ≥ m. Hence using the previous results we give the answer to the decision problem of vertex cover : given the graph H there is a vertex covering of H of minimum cardinality m, where m is the number of vertices of the complete graph Km . Moreover the generators of Ic (H) give the structure of each vertex covering of H. Example 1.1. Let H be the simple graph with V (H) = {v1 , . . . , v11 } H = K4 ∪ star2 (2) ∪ star6 (4) ∪ star8 (2) ∪ star11 (3). This graph is the model of a wireless sensor network. Ic (H) is generated by {X1 X6 X8 X11 , X2 X6 X8 X11 , X2 X6 X7 X11 , X2 X6 X8 X9 X10 , X2 X3 X4 X5 X8 X11 }. The minimal vertex covers of H are: C1 = {v1 , v6 , v8 , v11 }, C2 = {v2 , v6 , v8 , v11 }, C3 = {v2 , v6 , v7 , v11 }, C4 = {v2 , v6 , v8 , v9 , v10 }, C5 = {v2 , v3 , v4 , v5 , v8 , v11 }. Choose C1 = {v1 , v6 , v8 , v11 } among the three vertex covers with minimum cardinality. C1 gives the position of the leaders in the sensor network that H represents: 7 2 Algebraic properties of Ic(H) The class of monomial ideals Ic (H) is a suitable algebraic model to solve problems of minimal vertex covers. Moreover Ic (H) is an interesting class of monomial ideals for its good algebraic properties. In this section we study some of them. Let R = K[X1 , . . . , Xn ] be the polynomial ring in n variables over a field K with deg Xi = 1, for all i = 1, . . . , n. For a monomial ideal I ⊂ R we denote by G(I) its unique minimal set of monomial generators. Definition 2.1. A monomial ideal I ⊂ R has linear quotients if there is an ordering u1 , . . . , ut of monomials belonging to G(I) such that the colon ideal (u1 , . . . , uj−1) : (uj ) is generated by a subset of {X1 , . . . , Xn }, for 2 6 j 6 t . For a monomial ideal I of R having linear quotients with respect to the ordering u1 , . . . , ut of the monomials of G(I), let qj (I) denote the number of the variables which is required to generate the ideal (u1 , . . . , uj−1) : (uj ). Set q(I) = max26j6t qj (I). The integer q(I) is independent on the choice of the ordering of the generators that gives linear quotients ([5]). Proposition 2.1. Ic (H) has linear quotients. Proof. 1) If at least a vertex of Km has degree m − 1 (Proposition 1.1), then Ic (H) has m monomial squarefree generators. We have the following cases: a) H is formed by the union of a complete graph Km , m < n, with vertices vα1 , . . . , vαm , 1 6 α1 < α2 < . . . < αm = n, and of a star graph starα1 (α1 ) on vertices v1 , . . . , vα1 . Then we set the following order for the monomial generators of Ic (H): f1 = Xα1 ··· Xαm−1 , f2 = Xα1 ··· Xαm−2 Xαm , . . ., fm−1 = Xα1 Xα3 ··· Xαm , fm = X1 ··· Xα1 −1 Xα2 ··· Xαm . It results: (f1 ) : (f2 ) = (Xαm−1 ), (f1 , f2 ) : (f3 ) = (Xαm−2 ), . . ., and so on up to (f1 , . . . , fm−1 ) : (fm ) = (Xα1 ). b) H is formed by the union of a complete graph Km , m < n, with vertices vα1 , . . . , vαm , 1 6 α1 < α2 < . . . < αm = n, and of a star graph starαi (αi − αi−1 ), for some i = 2, . . . , m . Then we set the following order for the monomial generators of Ic (H): f1 = Xα1 ··· Xαm−1 , f2 = Xα1 ··· Xαm−2 Xαm , . . ., fm−1 = Xα1 Xα2 ··· Xαm , fm = Xα2 ··· Xαm . Hence: (f1 ) : (f2 ) = (Xαm−1 ), (f1 , f2 ) : (f3 ) = (Xαm−2 ), . . ., and so on up to (f1 , . . . , fm−1 ) : (fm ) = (Xα1 ). 2) If all the vertices of Km have degree at least m (Theorem 1.1), then we set the following order for the monomial generators of Ic (H): f1 = Xα1 Xα2···Xαm , f2 = Xα1 ··· Xαm−1 Xαm−1 +1··· Xαm −1 , f3 = Xα1 ··· Xαm−2 Xαm−2 +1··· Xαm−1 −1 Xαm , . . . , fm = Xα1 Xα1 +1···Xα2 −1 Xα3···Xαm , fm+1 = X1···Xα1 −1 Xα2···Xαm . It results: (f1 ) : (f2 ) = (Xαm ), (f1 , f2 ) : (f3 ) = (Xαm−1 ), (f1 , f2 , f3 ) : (f4 ) = (Xαm−2 ), 8 . . ., and so on up to (f1 , . . . , fm ) : (fm+1 ) = (Xα1 ). Hence Ic (H) has linear quotients. Remark 2.1. If a monomial ideal I of R generated in one degree has linear quotients, then I has a linear resolution ([2], Lemma 4.1). Ic (H) has linear quotients, but in general it has not a linear resolution because it is not generated in the same degree. Using some properties of the graph H and of its edge ideal I(H) we can obtain the conditions for which Ic (H) has a linear resolution. Theorem 2.1. (([6], Th. 1.1) Let R = K[X1 , . . . , Xn ] and I(H) ⊂ R, H = Km ∪ starj (k). Let |E(starj (k))| = ij , for j = 1, . . . , m. Then: 1) dimR (R/I(H)) = n − m . 2) pdR (R/I(H)) = m + max16j6m ij − 1 . 3) depthR (R/I(H)) = n − m − max16j6m ij + 1 . 4) regR (R/I(H)) = 1 . Proposition 2.2. Let I(H) ⊂ R = K[X1 , . . . , Xn ]. I(H) is Cohen Macaulay if and only if k = 2. Proof. Let I(H) be the edge ideal of the graph H as described in section 1. By Theorem 2.1 one has dimR (R/I(H)) = n−m and depthR (R/I(H)) = n− m−max16j6m ij +1. I(H) is Cohen Macaulay if and only if dimR (R/I(H)) = depthR (R/I(H)). Hence the equality holds if and only if max16j6m ij = 1. This is equivalent to say that |E(starj (k))| = 1 for all j = 1, . . . , m, i.e. starj (k) has k = 2 vertices for all j = 1, . . . , m. Proposition 2.3. Let H = Km ∪ starj (k). Then Ic (H) has linear resolution if and only if k = 2. Proof. I(H) has linear resolution ([6], Prop. 1.1), that is equivalent to say that the complementary graph of H is chordal ([4], Th. 9.2.3). By Proposition 2.2, k = 2 if and only if I(H) is Cohen-Macaulay. Hence by [9] (Prop. 6.7.15) this is equivalent to say that Ic (H) has linear resolution. \ (Xi , Xj ). In general for a graph G one has Ic (G) = Xi Xj ∈I(G) i6=j Hence Ic (G) is an unmixed ideal of height two ([9]). But in general it is not Cohen-Macaulay. The Cohen-Macaulay property of the ideal Ic (G) was 9 studied in [8]. The notion of chordal graph is used to express this algebraic property and to study an interesting duality between I(G) and Ic (G) ([3]). For the class of graphs H starting by some properties of the graph H and of its edge ideal, we state information about the Cohen-Macaulay property of Ic (H). Proposition 2.4. Ic (H) is Cohen-Macaulay. Proof. I(H) has linear resolution ([6], Prop. 1.1). Hence the complementary graph H of H is chordal ([4], Th. 9.2.3). This is equivalent to say that Ic (H) is Cohen-Macaulay ([8]). The study of the linear quotients is useful in order to investigate algebraic invariants of R/Ic (H): the dimension, dimR (R/Ic (H)), the depth, depth(R/Ic (H)), the projective dimension, pdR (R/Ic (H)). Lemma 2.1. Let R = K[X1 , . . . , Xn ] and Ic (H) ⊂ R. Then q(Ic (H)) = 1. Proof. By the computation of the linear quotients (Proposition 2.1), the number of the variables which is required to generate the ideal (f1 , . . . , fh−1 ) : (fh ) is 1, for all h = 1, . . . , t, t ≤ m + 1. Theorem 2.2. Let R = K[X1 , . . . , Xn ] and Ic (H) ⊂ R. Then: 1) pdR (R/Ic (H)) = 2 2) depthR (R/Ic (H)) = n − 2 3) dimR (R/Ic (H)) = n − 2 4) regR (R/Ic (H)) = max{deg(vαi )} − 1, i = 1, . . . , m. Proof. 1) The length of the minimal free resolution of R/Ic (H) over R is equal to q(Ic (H)) + 1 ([5], Corollary 1.6). Then pdR (R/Ic (H)) = 2 . 2) As a consequence of 1), by Auslander-Buchsbaum formula, one has depthR (R/Ic (H)) = n − pdR (R/Ic (H)) = n − 2. 3) By Proposition 2.4 Ic (H) is Cohen-Macaulay, hence dimR (R/Ic (H)) = depthR (R/Ic (H)) = n − 2. 4) By [2] (Lemma 4.1) the Castelnuovo-Mumford regularity is regR (R/Ic (H)) = max{deg(f )| f minimal generator of Ic (H)} − 1. By the structure of generators of Ic (H) it follows that max{deg(f )| f minimal generator of Ic (H)} = m − 1 − max{deg(vαi )} − (m − 1) = max{deg(vαi )}, i = 1, . . . , m. Hence regR (R/Ic (H)) = max{deg(vαi )} − 1, i = 1, . . . , m. 10 Example 2.1. Let H = K3 ∪ star1 (2) ∪ star2 (2) ∪ star3 (2) on vertices {v1 , . . . , v6 }. R = K[X1 , . . . , X6 ], I(H) = (X1 X2 , X2 X6 , X2 X4 , X4 X6 , X3 X4 , X5 X6 ). Ic (H) = (X2 X4 X6 , X2 X4 X5 , X2 X3 X6 , X1 X4 X6 ) is generated in the same degree 3. Ic (H) has linear quotients, hence linear resolution: 0 → R3 (−4) → R4 (−3) → R → R/Ic (H) → 0 One has: 1) pdR (R/Ic (H)) = 2 . 2) dimR (R/Ic (H)) = depthR (R/Ic (H)) = 4 . 3) regR (R/Ic (H)) = 2 References [1] Akyildiz I.F., Su W., Sankarasubramaniam Y., Cayirci E. - Wireless sensor networks: a survey. Computer Networks 38 (2002), 393-422. [2] Conca, A., and Herzog, J. - Castelnuovo-Mumford regularity of product of ideals. Collect. Math. 54 (2003), 137–152. [3] Fröberg, R. - On Stanley-Reisner rings. Topics in Algebra (1990), 57–70. [4] Herzog, J., and Hibi, T. - Monomial Ideals. Springer, Graduate Texts in Mathematics 260 (2011). [5] Herzog, J., and Takayama, Y. - Resolutions by mapping cones. Homology, Homotopy Appl. 4, 2 (2002), 277–294. [6] Imbesi, M., and La Barbiera M. - Monomial ideals of graphs with loops. Anal. Sţiinţ. Univ. Al. I Cuza din Iaşi, Sect. Mat., In press. [7] La Barbiera M. - On a class of monomial ideals generated by s-sequences. Math. Reports, 12(62), 3 (2010), 201–216. [8] Lyubeznik, G. - The minimal non-Cohen-Macaulay monomial ideals. J. Pure and Applied Algebra, 51 (1988), 261–266. [9] Villarreal, R.H. - Monomial Algebras. M. Dekker Inc., New York, Pure and Appl. Math. 238 (2001). 11
0math.AC
Swift: Compiled Inference for Probabilistic Programming Languages arXiv:1606.09242v1 [cs.AI] 30 Jun 2016 Yi Wu UC Berkeley [email protected] Lei Li Toutiao.com [email protected] Abstract A probabilistic program defines a probability measure over its semantic structures. One common goal of probabilistic programming languages (PPLs) is to compute posterior probabilities for arbitrary models and queries, given observed evidence, using a generic inference engine. Most PPL inference engines—even the compiled ones—incur significant runtime interpretation overhead, especially for contingent and open-universe models. This paper describes Swift, a compiler for the BLOG PPL. Swift-generated code incorporates optimizations that eliminate interpretation overhead, maintain dynamic dependencies efficiently, and handle memory management for possible worlds of varying sizes. Experiments comparing Swift with other PPL engines on a variety of inference problems demonstrate speedups ranging from 12x to 326x. 1 Introduction Probabilistic programming languages (PPLs) aim to combine sufficient expressive power for writing real-world probability models with efficient, general-purpose inference algorithms that can answer arbitrary queries with respect to those models. One underlying motive is to relieve the user of the obligation to carry out machine learning research and implement new algorithms for each problem that comes along. Another is to support a wide range of cognitive functions in AI systems and to model those functions in humans. General-purpose inference for PPLs is very challenging; they may include unbounded numbers of discrete and continuous variables, a rich library of distributions, and the ability to describe uncertainty over functions, relations, and the existence and identity of objects (so-called open-universe models). Existing PPL inference algorithms include likelihood weighting (LW) [Milch et al., 2005b], parental Metropolis– Hastings (PMH) [Milch and Russell, 2006; Goodman et al., 2008], generalized Gibbs sampling (Gibbs) [Arora et al., 2010], generalized sequential Monte Carlo [Wood et al., 2014], Hamiltonian Monte Carlo (HMC) [Stan Development Team, 2014], variational methods [Minka et al., 2014; Kucukelbir et al., 2015] and a form of approximate Bayesian Stuart Russell Rastislav Bodik UC Berkeley University of Washington [email protected] [email protected] computation [Mansinghka et al., 2013]. While better algorithms are certainly possible, our focus in this paper is on achieving orders-of-magnitude improvement in the execution efficiency of a given algorithmic process. A PPL system takes a probabilistic program (PP) specifying a probabilistic model as its input and performs inference to compute the posterior distribution of a query given some observed evidence. The inference process does not (in general) execute the PP, but instead executes the steps of an inference algorithm (e.g., Gibbs) guided by the dependency structures implicit in the PP. In many PPL systems the PP exists as an internal data structure consulted by the inference algorithm at each step [Pfeffer, 2001; Lunn et al., 2000; Plummer, 2003; Milch et al., 2005a; Pfeffer, 2009]. This process is in essence an interpreter for the PP, similar to early Prolog systems that interpreted the logic program. Particularly when running sampling algorithms that involve millions of repetitive steps, the overhead can be enormous. A natural solution is to produce model-specific compiled inference code, but, as we show in Sec. 2, existing compilers for general open-universe models [Wingate et al., 2011; Yang et al., 2014; Hur et al., 2014; Chaganty et al., 2013; Nori et al., 2014] miss out on optimization opportunities and often produce inefficient inference code. The paper analyzes the optimization opportunities for PPL compilers and describes the Swift compiler, which takes as input a BLOG program [Milch et al., 2005a] and one of three inference algorithms (LW, PMH, Gibbs) and generates target code for answering queries. Swift includes three main contributions: (1) elimination of interpretative overhead by joint analysis of the model structure and inference algorithm; (2) a dynamic slice maintenance method (FIDS) for incremental computation of the current dependency structure as sampling proceeds; and (3) efficient runtime memory management for maintaining the current-possible-world data structure as the number of objects changes. Comparisons between Swift and other PPLs on a variety of models demonstrate speedups ranging from 12x to 326x, leading in some cases to performance comparable to that of hand-built model-specific code. To the extent possible, we also analyze the contributions of each optimization technique to the overall speedup. Although Swift is developed for the BLOG language, the overall design and the choices of optimizations can be applied to other PPLs and may bring useful insights to similar AI Classical Probabilistic Program Optimizations (insensitive to inference algorithm) Classical Algorithm Optimizations (insensitive to model) Inference Code 𝑷𝑰 Probabilistic Program (Model) 𝑷𝑴 𝓕𝑰 𝑷𝑴 → 𝑷𝑰 Algorithm-Specific Code 𝓕cg 𝑷𝑰 → 𝑷𝑻 Target Code (C++) 𝑷𝑻 Model-Specific Code Our Optimization: FIDS (combine model and algorithm) Figure 1: PPL compilers and optimization opportunities. systems for real-world applications. 2 Figure 2: The urn-ball model Our Optimization: Data Structures for FIDS Existing PPL Compilation Approaches In a general purpose programming language (e.g., C++), the compiler compiles exactly what the user writes (the program). By contrast, a PPL compiler essentially compiles the inference algorithm, which is written by the PPL developer, as applied to a PP. This means that different implementations of the same inference algorithm for the same PP result in completely different target code. As shown in Fig. 1, a PPL compiler first produces an intermediate representation combining the inference algorithm (I) and the input model (PM ) as the inference code (PI ), and then compiles PI to the target code (PT ). Swift focuses on optimizing the inference code PI and the target code PT given a fixed input model PM . Although there have been successful PPL compilers, these compilers are all designed for a restricted class of models with fixed dependency structures: see work by Tristan [2014] and the Stan Development Team [2014] for closed-world Bayes nets, Minka [2014] for factor graphs, and Kazemi and Poole [2016] for Markov logic networks. Church [Goodman et al., 2008] and its variants [Wingate et al., 2011; Yang et al., 2014; Ritchie et al., 2016] provide a lightweight compilation framework for performing the Metropolis–Hastings algorithm (MH) over general openuniverse probability models (OUPMs). However, these approaches (1) are based on an inefficient implementation of MH, which results in overhead in PI , and (2) rely on inefficient data structures in the target code PT . For the first point, consider an MH iteration where we are proposing a new possible world w0 from w accoding to the proposal g(·) by resampling random variable X from v to v 0 . The computation of acceptance ratio α follows   g(v 0 → v) Pr[w0 ] α = min 1, . (1) g(v → v 0 ) Pr[w] Since only X is resampled, it is sufficient to compute α using merely the Markov blanket of X, which leads to a much simplified formula for α from Eq.(1) by cancelling terms in Pr[w] and Pr[w0 ]. However, when applying MH for a contingent model, the Markov blanket of a random variable cannot be determined at compile time since the model dependencies vary during inference. This introduces tremendous runtime overhead for interpretive systems (e.g., BLOG, Figaro), which track all the dependencies at runtime even though typically only a tiny portion of the dependency structure may change per iteration. Church simply avoids keeping track of dependencies and uses Eq.(1), including a potentially huge overhead for redundant probability computations. For the second point, in order to track the existence of the variables in an open-universe model, similar to BLOG, Church also maintains a complicated dynamic string-based hashing scheme in the target code, which again causes interpretation overhead. Lastly, techniques proposed by Hur et al. [2014], Chaganty et al. [2013] and Nori et al. [2014] primarily focus on optimizing PM by analyzing the static properties of the input PP, which are complementary to Swift. 3 Background This paper focuses on the BLOG language, although our approach also applies to other PPLs with equivalent semantics [McAllester et al., 2008; Wu et al., 2014]. Other PPLs can be also converted to BLOG via static single assignment form (SSA form) transformation [Cytron et al., 1989; Hur et al., 2014]. 3.1 The BLOG Language The BLOG language [Milch et al., 2005a] defines probability measures over first-order (relational) possible worlds; in this sense it is a probabilistic analogue of first-order logic. A BLOG program declares types for objects and defines distributions over their numbers, as well as defining distributions for the values of random functions applied to objects. Observation statements supply evidence, and a query statement specifies the posterior probability of interest. A random variable in BLOG corresponds to the application of a random function to specific objects in a possible world. BLOG naturally supports open universe probability models (OUPMs) and context-specific dependencies. Fig. 2 demonstrates the open-universe urn-ball model. In this version the query asks for the color of the next random pick from an urn given the colors of balls drawn previously. Line 4 is a number statement stating that the number variable #Ball, corresponding to the total number of balls, is uniformly distributed between 1 and 20. Lines 5–6 declare a random function color(·), applied to balls, picking Blue or Green with a biased probability. Lines 7–8 state that each draw chooses a ball at random from the urn, with replacement. Fig. 3 describes another OUPM, the infinite Gaussian mixture model (∞-GMM). The model includes an unknown • Provide efficient memory management and fast data structures for Monte Carlo sampling algorithms to avoid interpretive overhead at runtime. Figure 3: The infinite Gaussian mixture model Algorithm 1: Metropolis–Hastings algorithm (MH) 1 Input: M, E, Q, N ; Output: samples H initialize a possible world w(0) with E satisfied; 2 for i ← 1 to N do 6 randomly pick a variable X from w(i−1) ; w(i) ← w(i−1) and v ← X(w(i−1) ); propose a value v 0 for X via proposal g ; X(w(i) ) ← v 0 and ensure w(i) is self-supporting; 7  α ← min 1, 3 4 5 g(v 0 →v) Pr[w(i) ] g(v→v 0 ) Pr[w(i−1) ] (i) if rand(0, 1) ≥ α then w H ← H + (Q(w(i) )); 8  ; ← w(i−1) number of clusters as stated in line 3, which is to be inferred from the data. 3.2 Generic Inference Algorithms All PPLs need to infer the posterior distribution of a query given the observed evidence. The great majority of PPLs use Monte Carlo sampling methods such as likelihood weighting (LW) and Metropolis–Hastings MCMC (MH). LW samples unobserved random variables sequentially in topological order, conditioned on evidence and sampled values earlier in the sequence; each complete sample is weighted by the likelihood of the evidence variables appearing in the sequence. The MH algorithm is summarized in Alg. 1. M denotes a BLOG model, E its evidence, Q a query, N the number of samples, w a possible world, X(w) the value of random variable X in w, Pr[X(w)|w-X ] denotes the conditional probability of X in w, and Pr[w] denotes the likelihood of possible world w. In particular, when the proposal distribution g in Alg.1 samples a variable conditioned on its parents, the algorithm becomes the parental MH algorithm (PMH). Our discussion in the paper focuses on LW and PMH but our proposed solution applies to other Monte Carlo methods as well. 4 For the first goal, we propose a novel framework, FIDS (Framework for Incrementally updating Dynamic Slices), for generating the inference code (PI in Fig. 1). For the second goal, we carefully choose data structures in the target C++ code (PT ). For convenience, r.v. is short for random variable. We demonstrate examples of compiled code in the following discussion: the inference code (PI ) generated by FIDS in Sec. 4.1 is in pseudo-code while the target code (PT ) by Swift shown in Sec. 4.2 is in C++. Due to limited space, we show the detailed transformation rules only for the adaptive contingency updating (ACU) technique and omit the others. 4.1 Optimizations in FIDS Our discussion in this section focuses on LW and PMH, although FIDS can be also applied to other algorithms. FIDS includes three optimizations: dynamic backchaining (DB), adaptive contingency updating (ACU), and reference counting (RC). DB is applied to both LW and PMH while ACU and RC are specific to PMH. Dynamic backchaining Dynamic backchaining (DB) [Milch et al., 2005a] constructs a dynamic slice incrementally in each LW iteration and samples only those variables necessary at runtime. DB in Swift is an example of compiling lazy evaluation: in each iteration, DB backtracks from the evidence and query and samples an r.v. only when its value is required during inference. For every r.v. declaration random T X ∼ CX ; in the input PP, FIDS generates a getter function get X(), which is used to (1) sample a value for X from its declaration CX and (2) memoize the sampled value for later references in the current iteration. Whenever an r.v. is referred to during inference, its getter function will be evoked. Compiling DB is the fundamental technique for Swift. The key insight is to replace dependency look-ups and method invocations from some internal PP data structure with direct machine address accessing and branching in the target executable file. For example, the inference code for the getter function of x(d) in the ∞-GMM model (Fig. 3) is shown below. The Swift Compiler Swift has the following design goals for handling openuniverse probability models. • Provide a general framework to automatically and efficiently (1) track the exact Markov blanket for each random variable and (2) maintain the minimum set of random variables necessary to evaluate the query and the evidence (the dynamic slice [Agrawal and Horgan, 1990], or equivalently the minimum self-supporting partial world [Milch et al., 2005a]). memoization denotes some pseudo-code snippet for performing memoization. Since get_z(·) is called before get_mu(·), only those mu(c) corresponding to non-empty clusters will be sampled. Notably, with the inference code above, no explicit dependency look-up is ever required at runtime to discover those non-empty clusters. When sampling a number variable, we need to allocate memory for the associated variables. For example, in the urnball model (Fig. 2), we need to allocate memory for color(b) after sampling #Ball. The corresponding generated inference code is shown below. allocate_memory_color(val) denotes some pseudocode segment for allocating val chunks of memory for the values of color(b). Reference Counting Reference counting (RC) generalize the idea of DB to incrementally maintain the dynamic slice in PMH. RC is an efficient compilation strategy for the interpretive BLOG to dynamically maintain references to variables and exclude those without any references from the current possible world with minimal runtime overhead. RC is also similar to dynamic garbage collection in programming language community. For an r.v. being tracked, say X, RC maintains a reference counter cnt(X) defined by cnt(X) = |Chw (X)|. Chw (X) denote the children of X in the possible world w. When cnt(X) becomes zero, X is removed from w; when cnt(X) become positive, X is instantiated and added back to w. This procedure is performed recursively. Tracking references to every r.v. might cause unnecessary overhead. For example, for classical Bayes nets, RC never excludes any variables. Hence, as a trade-off, Swift only counts references in open-universe models, particularly, to those variables associated with number variables (e.g., color(b) in the urn-ball model). Take the urn-ball model as an example. When resampling drawn(d) and accepting the proposed value v, the generated code for accepting the proposal will be w[X ← v] may require instantiating new variables not existing in w due to dependency changes. Computing P arw (X) for X is straightforward by executing its generation process, CX , within w, which is often inexpensive. Hence, the principal challenge for maintaining the Markov blanket is to efficiently maintain a children set Ch(X) for each r.v. X with the aim of keeping identical to the true set Chw (X) for the current possible world w. With a proposed possible world (PW) w0 = w[X ← v], it is easy to add all missing dependencies from a particular r.v. U . That is, for an r.v. U and every r.v. V ∈ P arw0 (U ), since U must be in Chw0 (V ), we can keep Ch(V) up-to-date by adding U to Ch(V) if U 6∈ Ch(V). Therefore, the key step is tracking the set of variables, ∆(w[X ← v]), which will have a set of parents in w[X ← v] different from w. ∆(W [X ← v]) = {Y : P arw (Y ) 6= P arw[X←v] (Y )} Precisely computing ∆(w[X ← v]) is very expensive at runtime but computing an upper bound for ∆(w[X ← v]) does not influence the correctness of the inference code. Therefore, we proceed to find an upper bound that holds for any value v. We call this over-approximation the contingent set Contw (X). Note that for every r.v. U with dependency that changes in w(X ← v), X must be reached in the condition of a control statement on the execution path of CU within w. This implies ∆(w[X ← v]) ⊆ Chw (X). One straightforward idea is set Contw (X) = Chw (X). However, this leads to too much overhead. For example, ∆(·) should be always empty for models with fixed dependencies. Another approach is to first find out the set of switching variables SX for every r.v. X, which is defined by SX = {Y : ∃w, v P arw (X) 6= P arw[Y ←v] (X)}, This brings an immediate advantage: SX can be statically computed at compile time. However, computing SX is NPComplete1 . Our solution is to derive the approximation SbX by taking the union of free variables of if/case conditions, function arguments, and set expression conditions in CX , and then set Contw (X) = {Y : Y ∈ Chw (X) ∧ X ∈ SbY }. The function inc_cnt(X) and dec_cnt(X) update the references to X. The function accept_value_drawn() is specialized to r.v. drawn(d): Swift analyzes the input program and generates specialized codes for different variables. Adaptive contingency updating The goal of ACU is to incrementally maintain the Markov Blanket for every r.v. with minimal efforts. CX denotes the declaration of r.v. X in the input PP; P arw (X) denote the parents of X in the possible world w; w[X ← v] denotes the new possible world derived from w by only changing the value of X to v. Note that deriving Contw (X) is a function of the sampling variable X and the current PW w. Likewise, for every r.v. X, we maintain a runtime contingent set Cont(X) identical to the true set Contw (X) under the current PW w. Cont(X) can be incrementally updated as well. Back to the original focus of ACU, suppose we are adding new the dependencies in the new PW w0 = w[X ← v]. There are three steps to accomplish the goal: (1) enumerating all the variables U ∈ Cont(X), (2) for all V ∈ P arw0 (U ), add U to Ch(V), and (3) for all V ∈ P arw0 (U ) ∩ SbU , add U to Cont(V). These steps can be also repeated in a similar way to remove the vanished dependencies. Take the ∞-GMM model (Fig. 3) as an example , when resampling z(d), we need to change the dependency of r.v. x(d) 1 Since the declaration CX may contain arbitrary boolean formulas, one can reduce the 3-SAT problem to computing SX . Fc (M = random T Id([T Id ,]∗ ) ∼ C) = void Id::add_to_Ch() { Fcc (C, Id, {}) } void Id::accept_value(T v) { for(u in Cont(Id)) u.del_from_Ch(); Id = v; for(u in Cont(Id)) u.add_to_Ch(); } Here |w| denotes the total number of random variables existing in w, which can be maintained via RC. Finally, the computation time of ACU is strictly shorter than that of acceptance ratio α (Eq. 2). 4.2 Fcc (C = Exp, X, seen) = Fcc (Exp, X, seen) Fcc (C = Dist(Exp), X, seen) = Fcc (Exp, X, seen) Fcc (C = if (Exp) then C1 else C2 , X, seen) = Fcc (Exp, X, seen); if (Exp) { Fcc (C1 , X, seen ∪ F V (Exp)); } else { Fcc (C2 , X, seen ∪ F V (Exp)); } Fcc (Exp, X, seen) = /* emit a line of code for every r.v. U in the corresponding set */ ∀ U ∈ ((F V (Exp) ∩ SbX )\seen) : Cont(U) += X; ∀ U ∈ (F V (Exp)\seen) : Ch(U) += X; Figure 4: Transformation rules for outputting inference code with ACU. F V (Expr) denote the free variables in Expr. We assume the switching variables SbX have already been computed. The rules for number statements and case statements are not shown for conciseness—they are analogous to the rules for random variables and if statements respectively. since Contw (z(d)) = {x(d)} for any w. The generated code for this process is shown below. We omit the code for del_from_Ch() for conciseness, which is essentially the same as add_to_Ch(). The formal transformation rules for ACU are demonstrated in Fig. 4. Fc takes in a random variable declaration statement in the BLOG program and outputs the inference code containing methods accept value() and add to Ch(). Fcc takes in a BLOG expression and generates the inference code inside method add to Ch(). It keeps track of already seen variables in seen, which makes sure that a variable will be added to the contingent set or the children set at most once. Code for removing variables can be generated similarly. Since we maintain the exact children for each r.v. with ACU, the computation of acceptance ratio α in Eq. 1 for PMH can be simplified to min 1, 0 |w| Pr[X = v|w-X ] Q |w0 | Pr[X = v 0 |w-X ] U ∈Chw0 (X) Q 0 Pr[U (w0 )|w-U ] V ∈Chw (X) ! Pr[V (w)|w-V ] (2) Implementation of Swift Lightweight memoization Here we introduce the implementation details of the memoization code in the getter function mentioned in section 4.1. Objects will be converted to integers in the target code. Swift analyzes the input PP and allocates static memory for memoization in the target code. For open-universe models where the number of random variables are unknown, the dynamic table data structure (e.g., vector in C++) is used to reduce the amount of dynamic memory allocations: we only increase the length of the array when the number becomes larger than the capacity. One potential weakness of directly applying a dynamic table is that, for models with multiple nested number statements (e.g. the aircraft tracking model with multiple aircrafts and blips for each one), the memory consumption can be large. In Swift, the user can force the target code to clear all the unused memory every fixed number of iterations via a compilation option, which is turned off by default. The following code demonstrates the target code for the number variable #Ball and its associated color(b)’s in the urn-ball model (Fig. 2) where iter is the current iteration number. Note that when generating a new PW, by simply increasing the counter iter, all the memoization flags (e.g., mark color for color(·)) will be automatically cleared. Lastly, in PMH, we need to randomly select an r.v. to sample per iteration. In the target C++ code, this process is accomplished via polymorphism by declaring an abstract class with a resample() method and a derived class for every r.v. in the PP. An example code snippet for the ∞-GMM model is shown below. Efficient proposal manipulation Although one PMH iteration only samples a single variable, generating a new PW may still involve (de-)instantiating an arbitrary number of random variables due to RC or sampling a number variable. The general approach commonly adopted by many PPL systems is to construct the proposed possible world in dynamically allocated memory and then copy it to the current world [Milch et al., 2005a; Wingate et al., 2011], which suffers from significant overhead. In order to generate and accept new PWs in PMH with negligible memory management overhead, we extend the lightweight memoization to manipulate proposals: Swift statically allocates an extra memoized cache for each random variable, which is dedicated to storing the proposed value for that variable. During resampling, all the intermediate results are stored in the cache. When accepting the proposal, the proposed value is directly loaded from the cache; when rejection, no action is needed due to our memoization mechanism. Here is an example target code fragment for mu(c) in the ∞-GMM model. proposed vars is an array storing all the variables to be updated if the proposal gets accepted. Supporting new algorithms We demonstrate that FIDS can be applied to new algorithms by implementing a translator for the Gibbs sampling [Arora et al., 2010] (Gibbs) in Swift. Gibbs is a variant of MH with the proposal distribution g(·) set to be the posterior distribution. The acceptance ratio α is always 1 while the disadvantage is that it is only possible to explicitly construct the posterior distribution with conjugate priors. In Gibbs, the proposal distribution is still constructed from the Markov blanket, which again requires maintaining the children set. Hence, FIDS can be fully utilized. However, different conjugate priors yield different forms of posterior distributions. In order to support a variety of proposal distributions, we need to (1) implement a conjugacy checker to check the form of posterior distribution for each r.v. in the PP at compile time (the checker has nothing to do with FIDS); (2) implement a posterior sampler for every conjugate prior in the runtime library of Swift. 5 Experiments In the experiments, Swift generates target code in C++ with C++ standard <random> library for random number generation and the armadillo package [Sanderson, 2010] for matrix computation. The baseline systems include BLOG (version 0.9.1), Figaro (version 3.3.0), Church (webchurch), Infer.NET (version 2.6), BUGS (winBUGS 1.4.3) and Stan (cmdStan 2.6.0). 5.1 Benchmark models We collect a set of benchmark models2 which exhibit various capabilities of a PPL (Tab. 1), including the burglary model (Bur), the hurricane model (Hur), the urn-ball model (U-B(x,y) denotes the urn-ball model with at most x balls and y draws), the TrueSkill model [Herbrich et al., 2007] (T-K), 1-dimensional Gaussian mixture model (GMM, 100 points with 4 clusters) and the infinite GMM model (∞-GMM). We also include a real-world dataset: handwritten digits [LeCun et al., 1998] using the PPCA model [Tipping and Bishop, 1999]. All the models can be downloaded from the GitHub repository of BLOG. 5.2 Speedup by FIDS within Swift We first evaluate the speedup promoted by each of the three optimizations in FIDS individually. Dynamic Backchaining for LW We compare the running time of the following versions of code: (1) the code generated by Swift (“Swift”); (2) the modified compiled code with DB manually turned off (“No DB”), which sequentially samples all the variables in the PP; (3) the hand-optimized code without unnecessary memoization or recursive function calls (“Hand-Opt”). 2 Most models are simplified to ensure that all the benchmark systems can produce an output in reasonably short running time. All of these models can be enlarged to handle more data without adding extra lines of BLOG code. Bur R CT CC OU CG Hur X X X X U-B X X X T-K GMM ∞-GMM PPCA X X X X X X X X X 30 25 20 2.3x No RC Swift 15 10 5 X Table 1: Features of the benchmark models. R: continuous scalar or vector variables. CT: context-specific dependencies (contingency). CC: cyclic dependencies in the PP (while in any particular PW the dependency structure remains acyclic). OU: open-universe. CG: conjugate priors. Alg. Bur Hur U-B(20,2) U-B(20,8) Running Time (s): Swift v.s. No DB No DB 0.768 1.288 2.952 5.040 Swift 0.782 1.115 1.755 4.601 Speedup 0.982 1.155 1.682 1.10 Running Time (s): Swift v.s. Hand-Optimized Hand-Opt 0.768 1.099 1.723 4.492 Swift 0.782 1.115 1.755 4.601 Overhead 1.8% 1.4% 1.8% 2.4% Calls to Random Number Generator No DB 3 ∗ 107 3 ∗ 107 1.35 ∗ 108 1.95 ∗ 108 Swift 3 ∗ 107 2.0 ∗ 107 4.82 ∗ 107 1.42 ∗ 108 Calls Saved 0% 33.3% 64.3% 27.1% Table 2: Performance on LW with 107 samples for Swift, the version without DB and the hand-optimized version We measure the running time for all the 3 versions and the number of calls to the random number generator for “Swift” and “No DB”. The result is concluded in Tab. 2. The overhead due to memoization compared against the hand-optimized code is less than 2.4%. We can further notice that the speedup is proportional to the number of calls saved. Reference Counting for PMH RC only applies to open-universe models in Swift. Hence we focus on the urn-ball model with various model parameters. The urn-ball model represents a common model structure appearing in many applications with open-universe uncertainty. This experiment reveals the potential speedup by RC for realworld problems with similar structures. RC achieves greater speedup when the number of balls and the number of observations become larger. We compare the code produced by Swift with RC (“Swift”) and RC manually turned off (“No RC”). For “No RC”, we traverse the whole dependency structure and reconstruct the dynamic slice every iteration. Fig. 5 shows the running time of both versions. RC is indeed effective – leading to up to 2.3x speedup. Adaptive Contingency Updating for PMH We compare the code generated by Swift with ACU (“Swift”) and the manually modified version without ACU (“Static Dep”) and measure the number of calls to the likelihood function in Tab. 3. The version without ACU (“Static Dep”) demonstrates the 0 U-B(10,5) U-B(20,5) U-B(40,5) U-B(40,10) U-B(40,20) U-B(40,40) Figure 5: Running time (s) of PMH in Swift with and without RC on urn-ball models for 20 million samples. Alg. Bur Hur U-B(20,10) U-B(40,20) Running Time (s): Swift v.s. Static Dep Static Dep 0.986 1.642 4.433 7.722 Swift 0.988 1.492 3.891 4.514 Speedup 0.998 1.100 1.139 1.711 Calls to Likelihood Functions Static Dep 1.8 ∗ 107 2.7 ∗ 107 1.5 ∗ 108 3.0 ∗ 108 7 7 7 Swift 1.8 ∗ 10 1.7 ∗ 10 4.1 ∗ 10 5.5 ∗ 107 Calls Saved 0% 37.6% 72.8% 81.7% Table 3: Performance of PMH in Swift and the version utilizing static dependencies on benchmark models. best efficiency that can be achieved via compile-time analysis without maintaining dependencies at runtime. This version statically computes an upper bound of the children set c by Ch(X) = {Y : X appears in CY } and again uses Eq.(2) to compute the acceptance ratio. Thus, for models with fixed dependencies, “Static Dep” should be faster than “Swift”. In Tab. 3, “Swift” is up to 1.7x faster than “Static Dep”, thanks to up to 81% reduction of likelihood function evaluations. Note that for the model with fixed dependencies (Bur), the overhead by ACU is almost negligible: 0.2% due to traversing the hashmap to access to child variables. 5.3 Swift against other PPL systems We compare Swift with other systems using LW, PMH and Gibbs respectively on the benchmark models. The running time is presented in Tab. 4. The speedup is measured between Swift and the fastest one among the rest. An empty entry means that the corresponding PPL fails to perform inference on that model. Though these PPLs have different host languages (C++, Java, Scala, etc.), the performance difference resulting from host languages is within a factor of 23 . 5.4 Experiment on real-world dataset We use Swift with Gibbs to handle the probabilistic principal component analysis (PPCA) [Tipping and Bishop, 1999], with real-world data: 5958 images of digit “2” from the handwritten digits dataset (MNIST) [LeCun et al., 1998]. We compute 10 principal components for the digits. The training and testing sets include 5958 and 1032 images respectively, each with 28x28 pixels and pixel value rescaled to [0, 1]. Since most benchmark PPL systems are too slow to handle this amount of data, we compare Swift against other two 3 http://benchmarksgame.alioth.debian.org/ PPL Bur Church Figaro BLOG Swift Speedup 9.6 15.8 8.4 0.04 196 Church Figaro BLOG Swift Speedup 12.7 10.6 6.7 0.11 61 BUGS Infer.NET Swift Speedup 87.7 1.5 0.12 12 Hur U-B (20,10) T-K LW with 106 samples 22.9 179 57.4 24.7 176 48.6 11.9 189 49.5 0.08 0.54 0.24 145 326 202 PMH with 106 samples 25.2 246 173 59.6 17.4 18.5 30.4 38.7 0.15 0.4 0.32 121 75 54 Gibbs with 106 samples 0.19 0.34 ∞ ∞ - GMM ∞-GMM 1627 997 998 6.8 147 1038 235 261 1.1 214 3703 151 72.5 0.76 95 1057 62.2 68.3 0.60 103 84.4 77.8 0.42 185 0.86 ∞ Table 4: Running time (s) of Swift and other PPLs on the benchmark models using LW, PMH and Gibbs. scalable PPLs, Infer.NET and Stan, on this model. Both PPLs have compiled inference and are widely used for real-world applications. Stan uses HMC as its inference algorithm. For Infer.NET, we select variational message passing algorithm (VMP), which is Infer.NET’s primary focus. Note that HMC and VMP are usually favored for fast convergence. Stan requires a tuning process before it can produce samples. We ran Stan with 0, 5 and 9 tuning steps respectively4 . We measure the perplexity of the generated samples over test images w.r.t. the running time in Fig. 6, where we also visualize the produced principal components. For Infer.NET, we consider the mean of the approximation distribution. Swift quickly generates visually meaningful outputs with around 105 Gibbs iterations in 5 seconds. Infer.NET takes 13.4 seconds to finish the first iteration5 and converges to a result with the same perplexity after 25 iterations and 150 seconds. The overall convergence of Gibbs w.r.t. the running time significantly benefits from the speedup by Swift. For Stan, its no-U-turn sampler [Homan and Gelman, 2014] suffers from significant parameter tuning issues. We also tried to manually tune the parameters, which does not help much. Nevertheless, Stan does work for the simplified PPCA model with 1-dimensional data. Although further investigation is still needed, we conjecture that Stan is very sensitive to its parameters in high-dimensional cases. Lastly, this experiment also suggests that those parameter-robust inference engines, such as Swift with Gibbs and Infer.NET with VMP, would be preferred at practice when possible. 4 We also ran Stan with 50 and 100 tuning steps, which took more than 3 days to finish 130 iterations (including tuning). However, the results are almost the same as that with 9 tuning steps. 5 Gibbs by Swift samples a single variable while Infer.NET processes all the variables per iteration. Figure 6: Log-perplexity w.r.t running time(s) on the PPCA model with visualized principal components. Swift converges faster. 6 Conclusion and Future Work We have developed Swift, a PPL compiler that generates model-specific target code for performing inference. Swift uses a dynamic slicing framework for open-universe models to incrementally maintain the dependency structure at runtime. In addition, we carefully design data structures in the target code to avoid dynamic memory allocations when possible. Our experiments show that Swift achieves orders of magnitudes speedup against other PPL engines. The next step for Swift is to support more algorithms, such as SMC [Wood et al., 2014], as well as more samplers, such as the block sampler for (nearly) deterministic dependencies [Li et al., 2013]. Although FIDS is a general framework that can be naturally extended to these cases, there are still implementation details to be studied. Another direction is partial evaluation, which allows the compiler to reason about the input program to simplify it. Shah et al. [2016] proposes a partial evaluation framework for the inference code (PI in Fig. 1). It is very interesting to extend this work to the whole Swift pipeline. Acknowledgement We would like to thank our anonymous reviewers, as well as Rohin Shah for valuable discussions. This work is supported by the DARPA PPAML program, contract FA875014-C-0011. References [Agrawal and Horgan, 1990] Hiralal Agrawal and Joseph R Horgan. Dynamic program slicing. In ACM SIGPLAN Notices, volume 25, pages 246–256. ACM, 1990. [Arora et al., 2010] Nimar S. Arora, Rodrigo de Salvo Braz, Erik B. Sudderth, and Stuart J. Russell. Gibbs sampling in open-universe stochastic languages. In UAI, pages 30–39. AUAI Press, 2010. [Chaganty et al., 2013] Arun Chaganty, Aditya Nori, and Sriram Rajamani. Efficiently sampling probabilistic programs via program analysis. In AISTATS, pages 153–160, 2013. [Cytron et al., 1989] Ron Cytron, Jeanne Ferrante, Barry K Rosen, Mark N Wegman, and F Kenneth Zadeck. An efficient method of computing static single assignment form. In Proceedings of the 16th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pages 25–35. ACM, 1989. [Goodman et al., 2008] Noah D. Goodman, Vikash K. Mansinghka, Daniel M. Roy, Keith Bonawitz, and Joshua B. Tenenbaum. Church: A language for generative models. In UAI, pages 220–229, 2008. [Herbrich et al., 2007] Ralf Herbrich, Tom Minka, and Thore Graepel. Trueskill(tm): A bayesian skill rating system. In Advances in Neural Information Processing Systems 20, pages 569–576. MIT Press, January 2007. [Homan and Gelman, 2014] Matthew D Homan and Andrew Gelman. The no-u-turn sampler: Adaptively setting path lengths in hamiltonian monte carlo. The Journal of Machine Learning Research, 15(1):1593–1623, 2014. [Hur et al., 2014] Chung-Kil Hur, Aditya V. Nori, Sriram K. Rajamani, and Selva Samuel. Slicing probabilistic programs. In Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI ’14, pages 133–144, New York, NY, USA, 2014. ACM. [Kazemi and Poole, 2016] Seyed Mehran Kazemi and David Poole. Knowledge compilation for lifted probabilistic inference: Compiling to a low-level language. 2016. [Kucukelbir et al., 2015] Alp Kucukelbir, Rajesh Ranganath, Andrew Gelman, and David Blei. Automatic variational inference in Stan. In NIPS, pages 568–576, 2015. [LeCun et al., 1998] Yann LeCun, Léon Bottou, Yoshua Bengio, and Patrick Haffner. Gradient-based learning applied to document recognition. Proceedings of the IEEE, 86(11):2278–2324, 1998. [Li et al., 2013] Lei Li, Bharath Ramsundar, and Stuart Russell. Dynamic scaled sampling for deterministic constraints. In AISTATS, pages 397–405, 2013. [Lunn et al., 2000] David J. Lunn, Andrew Thomas, Nicky Best, and David Spiegelhalter. WinBUGS - a Bayesian modelling framework: Concepts, structure, and extensibility. Statistics and Computing, 10(4):325–337, October 2000. [Mansinghka et al., 2013] Vikash K. Mansinghka, Tejas D. Kulkarni, Yura N. Perov, and Joshua B. Tenenbaum. Approximate Bayesian image interpretation using generative probabilistic graphics programs. In NIPS, pages 1520–1528, 2013. [McAllester et al., 2008] David McAllester, Brian Milch, and Noah D Goodman. Random-world semantics and syntactic independence for expressive languages. Technical report, 2008. [Milch and Russell, 2006] Brian Milch and Stuart J. Russell. General-purpose MCMC inference over relational structures. In UAI. AUAI Press, 2006. [Milch et al., 2005a] Brian Milch, Bhaskara Marthi, Stuart Russell, David Sontag, Daniel L. Ong, and Andrey Kolobov. BLOG: Probabilistic models with unknown objects. In IJCAI, pages 1352–1359, 2005. [Milch et al., 2005b] Brian Milch, Bhaskara Marthi, David Sontag, Stuart Russell, Daniel L. Ong, and Andrey Kolobov. Approximate inference for infinite contingent Bayesian networks. In Tenth International Workshop on Artificial Intelligence and Statistics, Barbados, 2005. [Minka et al., 2014] T. Minka, J.M. Winn, J.P. Guiver, S. Webster, Y. Zaykov, B. Yangel, A. Spengler, and J. Bronskill. Infer.NET 2.6, 2014. [Nori et al., 2014] Aditya V Nori, Chung-Kil Hur, Sriram K Rajamani, and Selva Samuel. R2: An efficient MCMC sampler for probabilistic programs. In AAAI Conference on Artificial Intelligence, 2014. [Pfeffer, 2001] Avi Pfeffer. IBAL: A probabilistic rational programming language. In In Proc. 17th IJCAI, pages 733–740. Morgan Kaufmann Publishers, 2001. [Pfeffer, 2009] Avi Pfeffer. Figaro: An object-oriented probabilistic programming language. Charles River Analytics Technical Report, 2009. [Plummer, 2003] Martyn Plummer. JAGS: A program for analysis of Bayesian graphical models using Gibbs sampling. In Proceedings of the 3rd International Workshop on Distributed Statistical Computing, volume 124, page 125. Vienna, 2003. [Ritchie et al., 2016] Daniel Ritchie, Andreas Stuhlmüller, and Noah D. Goodman. C3: Lightweight incrementalized MCMC for probabilistic programs using continuations and callsite caching. In AISTATS 2016, 2016. [Sanderson, 2010] Conrad Sanderson. Armadillo: An open source c++ linear algebra library for fast prototyping and computationally intensive experiments. 2010. [Shah et al., 2016] Rohin Shah, Emina Torlak, and Rastislav Bodik. SIMPL: A DSL for automatic specialization of inference algorithms. arXiv preprint arXiv:1604.04729, 2016. [Stan Development Team, 2014] Stan Development Team. Stan Modeling Language Users Guide and Reference Manual, Version 2.5.0, 2014. [Tipping and Bishop, 1999] Michael E. Tipping and Chris M. Bishop. Probabilistic principal component analysis. Journal of the Royal Statistical Society, Series B, 61:611–622, 1999. [Tristan et al., 2014] Jean-Baptiste Tristan, Daniel Huang, Joseph Tassarotti, Adam C Pocock, Stephen Green, and Guy L Steele. Augur: Data-parallel probabilistic modeling. In NIPS, pages 2600–2608. 2014. [Wingate et al., 2011] David Wingate, Andreas Stuhlmueller, and Noah D Goodman. Lightweight implementations of probabilistic programming languages via transformational compilation. In International Conference on Artificial Intelligence and Statistics, pages 770–778, 2011. [Wood et al., 2014] Frank Wood, Jan Willem van de Meent, and Vikash Mansinghka. A new approach to probabilistic programming inference. In Proceedings of the 17th International conference on Artificial Intelligence and Statistics, pages 2–46, 2014. [Wu et al., 2014] Yi Wu, Lei Li, and Stuart J. Russell. BFiT: From possible-world semantics to random-evaluation semantics in open universe. In Neural Information Processing Systems, Probabilistic Programming workshop, 2014. [Yang et al., 2014] Lingfeng Yang, Pat Hanrahan, and Noah D. Goodman. Generating efficient MCMC kernels from probabilistic programs. In AISTATS, pages 1068–1076, 2014.
6cs.PL
Proceedings of Machine Learning Research vol 75:1–15, 2018 Stable recovery of deep linear networks under sparsity constraints arXiv:1706.00342v2 [math.OC] 20 Feb 2018 François Malgouyres MALGOUYRES @ MATH . UNIV- TOULOUSE . FR Institut de Mathématiques de Toulouse ; UMR5219 Université de Toulouse ; CNRS UPS IMT F-31062 Toulouse Cedex 9, France Address 1 Joseph Landsberg Department of Mathematics Mailstop 3368 Texas A& M University JML @ MATH . TAMU . EDU Abstract We study a deep linear network expressed under the form of a matrix factorization problem. It takes as input a matrix X obtained by multiplying K matrices (called factors and corresponding to the action of a layer). Each factor is obtained by applying a fixed linear operator to a vector of parameters satisfying a sparsity constraint. In machine learning, the error between the product of the estimated factors and X (i.e. the reconstruction error) relates to the statistical risk. The stable recovery of the parameters defining the factors is required in order to interpret the factors and the intermediate layers of the network. In this paper, we provide sharp conditions on the network topology under which the error on the parameters defining the factors (i.e. the stability of the recovered parameters) scales linearly with the reconstruction error (i.e. the risk). Therefore, under these conditions on the network topology, any successful learning tasks leads to robust and therefore interpretable layers. The analysis is based on the recently proposed Tensorial Lifting. The particularity of this paper is to consider a sparse prior. As an illustration, we detail the analysis and provide sharp guarantees for the stable recovery of convolutional linear network under sparsity prior. As expected, the condition are rather strong. Keywords: Stable recovery, deep linear networks, convolutional linear networks, feature robustess. 1. Introduction Let K ∈ N∗ , m1 . . . mK+1 ∈ N, write m1 = m, mK+1 = n. We impose the factors to be structured matrices defined by a number S of unknown parameters. More precisely, for k = 1 . . . K, let Mk : RS −→ Rmk ×mk+1 , h 7−→ Mk (h) be a linear map. We assume that we know the matrix X ∈ Rm×n which is provided by X = M1 (h1 ) · · · MK (hK ) + e, (1) for an unknown error term e, such that kek ≤ δ, and parameters h = (hk )k=1..K ∈ RS×K . Moreover, considering a family of possible supports M (e.g., all the supports of size S ′ , for a c 2018 J. Landsberg. given S ′ ≤ S), we assume that theh satisfy a sparsity constraint of the form : there exists S =  (S k )k=1..K ∈ M such that supp h ⊂ S (i.e.: ∀k, supp hk ⊂ S k ). This work investigates necessary and sufficient conditions imposed on the constituents of (1) for which we can (up to obvious scale rearrangement) stably recover the parameters h from X. Beside such that these conditions, we assume that we have a way to find S ∗ ∈ M and h∗ ∈ RS×K S∗ η = kM1 (h∗1 ) . . . MK (h∗K ) − Xk , is small. (2) As we will discuss later, at the writing, the success of algorithms for constructing h∗ is mostly supported by empirical evidence and lack theoretical justifications. These aspects of the problem are out of the scope of the present paper. However, in machine learning problems, the reconstruction error η represents the risk. There is therefore no point in analyzing the properties of h∗ , if η is large. The established upper-bound on the recovery error of the parameters linearly depends on δ + η. Therefore, when the learning algorithm is successful (i.e. the sum of the risk η and noise δ is sufficiently small), if the deep linear network satisfies the conditions established in this paper the estimation of the parameters is stable. The latter property is required if one wants to interpret the features provided by the machine learning algorithm. That is the main interest of the proposed analysis. Notice that we also establish that the conditions are sharp. Also, the study considers deep linear networks instead of deep neural networks. As can be deduced from Eldan and Shamir (2016), this significantly diminishes the expressiveness of the network. The main argument for studying deep linear networks (as is done in the present paper) comes from a remark in Safran and Shamir (2016). For the rectified linear unit activation function (ReLU)1 , between each layer every entry is multiplied by an element of the discrete set {0, 1}. As a consequence, the parameter space RS×K can be partitioned into subsets such that, on every subset, the action of the non-linear network is the same deep linear network (i.e. the activation function has a constant action when h varies in the subset). Therefore, the objective function optimized in deep learning is made of pieces and on every piece it is the objective function of a deep linear network. As a consequence, properties of the objective function for deep neural networks generalize properties of the objective function for deep linear networks. Restricting the analysis to linear networks is legitimate as a step towards the study of deep neural networks. Notice, that the authors of Choromanska et al. (2015a,b); Kawaguchi (2016) use a different argument but also end-up studying deep linear networks. The simplifying assumption assumes the independence of the activation to the input. Taking the expectation then leads to linear networks that the authors analyse. As explained by the same authors in Choromanska et al. (2015b), this is however a moderatly convincing argument. We prefer to say clearly that we consider deep linear networks. Finally, S ∗ and h∗ are typically found by an algorithm (most often a heuristic) that tries to lower kM1 (h1 ) . . . MK (hK ) − Xk2 (3) while avoiding overfit. A classical strategy is the dropout of Srivastava et al. (2014). This is perfectly compatible with the assumption (2). However, even if we ignore the overfit issue and restrict the analysis to the minimization of (3), we see that it is non-convex. Again, we do not address this minimization issue but there is significant empirical evidence suggesting that (3) can be minimized efficiently in a surprisingly large number of situations. Despite an increasing theoretical activity 1. ReLU is the most common activation function. 2 S TABLE RECOVERY OF DEEP LINEAR NETWORKS UNDER SPARSITY CONSTRAINTS related to that question the theory explaining this phenomenon is still far from satisfactory when K ≥ 3 (see Livni et al. (2014); Haeffele and Vidal (2015); Kawaguchi (2016); Choromanska et al. (2015a,b); Safran and Shamir (2016) ). The approach developed in this paper extends to K ≥ 3 existing results for K ≤ 2. In particular, when K = 1, the considered problems boils down to a compressed sensing problem Elad (2010). When K = 2 and when extended to other constraints on the parameters h, the statements apply to already studied problems such as: low rank approximation Candes et al. (2013), Non-negative matrix factorization Lee and Seung (1999); Donoho and Stodden (2003); Laurberg et al. (2008); Arora et al. (2012), dictionary learning Jenatton et al. (2012), phase retrieval Candes et al. (2013), blind deconvolution Ahmed et al. (2014); Choudhary and Mitra (2014); Li et al. (2016). Most of these papers use the same lifting property we are using. They further propose to convexify the problem. A more general bilinear framework is considered in Choudhary and Mitra (2014). The only existing statements when K ≥ 3 are very recent Malgouyres and Landsberg (2017). They are also applied to deep linear networks but do not include sparsity constraint. The present work describes an alternative analysis, specialized to sparsity constraints, of the results exposed in Malgouyres and Landsberg (2017). Doing so, we obtain better bounds (defined with an analogue of the lower-RIP) and weaker constraints on the model. Its application to sparse convolutional linear networks leads to simple necessary and sufficient conditions of stable recovery, for a large class of solvers. The stability inequality (see Theorem 5) only involves explicit and simple ingredients of the problem. The condition on the network topology is rather strong but takes an simple format. Implementing a test checking if the condition is met is easy and the test only requires to apply the networks as many times as the network has leaves, for every couple of supports. 2. Notations and preliminaries on Tensorial Lifting = {h ∈ RS×K , ∀k = 1..K, khk k = 6 0}. Define an equivalence Set NK = {1, . . . , K} and RS×K ∗ S×K S×K , h ∼ g if and only if there exists (λk )k=1..K ∈ RK such relation in R∗ : for any h, g ∈ R that K Y λk = 1 and ∀k = 1..K, hk = λk gk . k=1 Denote the equivalence class of h ∈ RS×K by [h]. For any p ∈ [1,∞], we denote the usual ℓp norm ∗ S×K by k.kp and define the mapping dp : (R∗ / ∼) × (RS×K / ∼) → R by ∗ dp ([h], [g]) = inf S×K h′ ∈[h]∩Rdiag kh′ − g′ kp , , ∀h, g ∈ RS×K ∗ (4) S×K g′ ∈[g]∩Rdiag where RS×K = {h ∈ RS×K , ∀k = 1..K, khk k∞ = kh1 k∞ }. diag ∗ / ∼. It is proved in Malgouyres and Landsberg (2017) that dp is a metric on RS×K ∗ The real valued tensors of order K whose axes are of size S are denoted by T ∈ RS×...×S . The K K space of tensors is abbreviated RS . We say that a tensor T ∈ RS is of rank 1 if and only if there exists a collection of vectors h ∈ RS×K such that, for any i = (i1 , . . . , iK ) ∈ NK S, Ti = h1,i1 . . . hK,iK . 3 The set of all the tensors of rank 1 is denoted by Σ1 . Moreover, we parametrize Σ1 ⊂ RS the Segre embedding K using K P : RS×K −→ Σ1 ⊂ RS h 7−→ (h1,i1 h2,i2 . . . hK,iK )i∈NK (5) S As stated in the two next theorems, we can control the distortion of the distance induced by P and its inverse. Theorem 1 Stability of [h] from P (h), see Malgouyres and Landsberg (2017) Let h and g ∈ RS×K be such that kP (g) − P (h)k∞ ≤ 21 max (kP (h)k∞ , kP (g)k∞ ). For all ∗ p, q ∈ [1, ∞],   1 1 1 −1 −1 K K , kP (g)k∞ kP (h) − P (g)kq . (6) dp ([h], [g]) ≤ 7(KS) p min kP (h)k∞ Theorem 2 Lipschitz continuity of P , see Malgouyres and Landsberg (2017) We have for any q ∈ [1, ∞] and any h and g ∈ RS×K , ∗   1 1 K−1 1 1− K 1− K 1− kP (h) − P (g)kq ≤ S q K q max kP (h)k∞ , kP (g)k∞ dq ([h], [g]). (7) The Tensorial Lifting (see Malgouyres and Landsberg (2017)) states that there exists a unique linear map K A : RS −→ Rm×n , such that for all h ∈ RS×K M1 (h1 )M2 (h2 ) . . . MK (hK ) = AP (h). (8) The intuition leading to this equality is that every entry in M1 (h1 )M2 (h2 ) . . . MK (hK ) is a multivariate polynomial whose variables are in h. Moreover, every monomial of the polynomials is of the form ai P (h)i for i ∈ NK S , where ai is a coefficient depending on M1 , . . . , MK . The great property of the Tensorial Lifting is to express any deep linear network using the Segre Embedding and a linear operator A. The Segre embedding is non-linear and might seem difficult to deal with at the first sight, but it is always the same whatever the network topology, the sparsity pattern, the action of the ReLU activation function. . . These constituents of the problem only influence the lifting linear operator A. In the next section, we study what properties of A are required to obtain the stable recovery. In Section 4, we study these properties when A corresponds to a sparse convolutional linear network. 3. General conditions for the stable recovery under sparsity constraint From now on, the analysis differs from the one presented in Malgouyres and Landsberg (2017). It is dedicated to models that enforce sparsity. In this particular situation, we can indeed have a different view of the geometry of the problem. In order to describe it, we first establish some notation. 4 S TABLE RECOVERY OF DEEP LINEAR NETWORKS UNDER SPARSITY CONSTRAINTS We define a support by S = (Sk )k=1..K , with Sk ⊂ NS , and denote the set of all supports by K K P(NK S ) (the parts of NS ). For a given support S ∈ P(NS ), we denote = {h ∈ RS×K | hk,i = 0, for all k = 1..K and i 6∈ Sk } RS×K S (i.e., for all k, supp (hk ) ⊂ Sk ) and RSS K K = {T ∈ RS | Ti = 0, if ∃k = 1..K, such that ik 6∈ Sk }. K K We also denote by PS the orthogonal projection from RS onto RSS . We trivially have for all K T ∈ RS and all i ∈ NK S  Ti , if i ∈ S, (PS T )i = 0 , otherwise. As explained in the introduction, we assume that there exists a known family of admissible S×K supports M ⊂ P(NK that we S ), an unknown support S ∈ M and unknown parameters h ∈ RS would like to estimate from the noisy matrix product X = M1 (h1 ) . . . MK (hK ) + e. (9) We assume that there exists δ ≥ 0 such that the error satisfies kek ≤ δ. (10) Also, we consider an inexact minimization and assume that we have a way to find S ∗ ∈ M and h∗ ∈ RS×K S∗ η = kM1 (h∗1 ) . . . MK (h∗K ) − Xk is small. We remind that, in machine learning problems, η represents the risk. In the geometrical view described in the sequel, we consider different linear operators AS , with S×K S ∈ P(NK S ), such that for all h ∈ RS AS P (h) = M1 (h1 ) . . . MK (hK ). In order to achieve that, considering (8), we simply define for any S ∈ P(NK S) AS = APS . (11) The following property will turn out to be necessary and sufficient to guarantee the stable recovery property. Definition 1 Deep-M-Null Space Property Let γ ≥ 1 and ρ > 0, we say that A satisfies the deep-M-Null Space Property (deep-M-NSP ) )+P (RS×K ) satisfying with constants (γ, ρ) if and only if for all S and S ′ ∈ M, any T ∈ P (RS×K S S′ ′ kAS∪S ′ T k ≤ ρ and any T ∈ Ker (AS∪S ′ ), we have kT k ≤ γkT − PS∪S ′ T ′ k. 5 (12) )+ Geometrically, the deep-M-NSP does not hold when PS∪S ′ Ker (AS∪S ′ ) intersects P (RS×K S P (RS×K ) away from the origin or tangentially at 0. It holds when the two sets intersect ”transverS′ sally” at 0. Despite an apparent abstract nature, we will be able to characterize precisely when the lifting operator corresponding to a convolutional linear network satisfies the deep-M-NSP (see Section 4). We will also be able to calculate the constants (γ, ρ). Proposition 1 Sufficient condition for deep-M-NSP K If Ker (A) ∩ RSS∪S ′ = {0}, for all S and S ′ ∈ M, then A satisfies the deep-M-NSP with constants (γ, ρ) = (1, +∞). Proof In order to prove the proposition, let us consider S and S ′ ∈ M, T ′ ∈ Ker (AS∪S ′ ). We have K APS∪S ′ T ′ = 0 and therefore PS∪S ′ T ′ ∈ Ker (A). Moreover, by definition, PS∪S ′ T ′ ∈ RSS∪S ′ . Therefore, applying the hypothesis of the proposition, we obtain PS∪S ′ T ′ = 0 and (12) holds for any T , when γ = 1. Therefore, A satisfies the deep-M-NSP with constants (γ, ρ) = (1, +∞). If NK S ∈ M, the condition becomes Ker (A) = {0}, which is sufficient but obviously not necessary for the deep-M-NSP to hold. However, when M truly imposes sparsity, the condition Ker (A) ∩ K RSS∪S ′ = {0} says that the elements of Ker (A) shall not be sparse in some (tensorial) way. This nicely generalizes the case K = 1. Definition 2 Deep-lower-RIP constant There exists a constant σM > 0 such that for any S and S ′ ∈ M and any T in the orthogonal complement of Ker (AS∪S ′ ) (13) σM kPS∪S ′ T k ≤ kAS∪S ′ T k. We call σM Deep-lower-RIP constant of A with regard to M. Proof The existence of σM is a straightforward consequence of the fact that the restriction of AS∪S ′ on the orthogonal complement of Ker (AS∪S ′ ) is injective. We therefore have for all T in the orthogonal complement of Ker (AS∪S ′ ) kAS∪S ′ T k ≥ σS∪S ′ kT k ≥ σS∪S ′ kPS∪S ′ T k, where σS∪S ′ > 0 is the smallest non-zero singular value of AS∪S ′ . We obtain the existence of σM by taking the minimum of the constants σS∪S ′ over the finite family of S and S ′ ∈ M. Theorem 3 Sufficient condition for stable recovery Assume A satisfies the deep-M-NSP with the constants γ ≥ 1, ρ > 0. For any S ∗ ∈ M and ∗ as in (2) with η + δ ≤ ρ, we have h ∈ RS×K S∗ kP (h∗ ) − P (h)k ≤ γ (δ + η), σM where σM is the Deep-lower-RIP constant of A with regard to M. Moreover, if σγM (δ + η) ≤ 12 max kP (h∗ )k∞ , kP (h)k∞ , then   1 1 1 γ −1 ∗ ∗ K −1 K p dp ([h ], [h]) ≤ 7(KS) min kP (h)k∞ , kP (h )k∞ (δ + η). σM 6 S TABLE RECOVERY OF DEEP LINEAR NETWORKS UNDER SPARSITY CONSTRAINTS Proof We have kAS ∗ ∪S (P (h∗ ) − P (h))k = kAS ∗ ∪S P (h∗ ) − AS ∗ ∪S P (h)k = kAP (h∗ ) − AP (h)k ≤ kAP (h∗ ) − Xk + kAP (h) − Xk ≤ δ+η If we further decompose (the decomposition is unique) where T ′ ∈ Ker AS ∗ ∪S  P (h∗ ) − P (h) = T + T ′ ,  and T is orthogonal to Ker AS ∗ ∪S , we have kAS ∗ ∪S (P (h∗ ) − P (h))k = kAS ∗ ∪S T k ≥ σM kPS ∗ ∪S T k, where σM is the Deep-lower-RIP constant of A with regard to M. We finally obtain, since PS ∗ ∪S P (h∗ ) = P (h∗ ) and PS ∗ ∪S P (h) = P (h), kP (h∗ ) − P (h) − PS ∗ ∪S T ′ k = kPS ∗ ∪S T k ≤ δ+η . σM Since A satisfies the deep-M-NSP with constants (γ, ρ) and δ + η ≤ ρ, we have kP (h∗ ) − P (h)k ≤ γkP (h∗ ) − P (h) − PS ∗ ∪S T ′ k δ+η ≤ γ σM When δ + η satisfy the condition in the theorem, we can apply Theorem 1 and obtain the last inequality. Theorem 3 differs from the analogous theorem in Malgouyres and Landsberg (2017). In particular, it is dedicated to sparsity constraint with much weaker hypotheses on A. The constant of the upper bound is also different. One might again ask whether the condition “A satisfies the deep-M-NSP ” is sharp or not. As stated in the following proposition, the answer is affirmative. Theorem 4 Necessary condition for stable recovery Assume the stable recovery property holds: There exists M, C and δ > 0 such that for any , any X = AP (h) + e, with kek ≤ δ, and any S ∗ ∈ M and S ∈ M and any h ∈ RS×K S S×K ∗ h ∈ RS ∗ such that kAP (h∗ ) − Xk ≤ kek we have ∗  1 −1 K d2 ([h ], [h]) ≤ C min kP (h)k∞ Then, A satisfies the deep-M-NSP with constants K−1 √ K σmax γ = CS 2 ∗ 1 −1 K , kP (h )k∞ and  kek. ρ = δ, where σmax is the spectral radius of A. The proof is very similar to the proof of the Theorem 6, in Malgouyres and Landsberg (2017) and the proof of the analogous converse statement in Cohen et al. (2009). It is provided in Appendix A. 7 edges of depth 3 2 1 RN RN RN root r leaves RN RN Figure 1: Example of the considered convolutional linear network. To every edge/neuron is attached a convolution kernel. The network does not involve non-linearities or sampling. 4. Application to convolutional linear network under sparsity prior We consider a sparse convolutional linear network as depicted in Figure 1. The network typically aims at performing a linear analysis or synthesis of a signal living in RN . The considered convolutional linear network is defined from a rooted directed acyclic graph G(E, N ) composed of nodes N and edges E. Each edge connects two nodes. The root of the graph is denoted by r and the set containing all its leaves is denoted by F. We denote by Pa the set of all paths connecting the leaves and the root. We assume, without loss of generality, that the length of any path between any leaf and the root is independent of the considered leaf and equal to some constant K ≥ 0. We also assume that, for any edge e ∈ E, the number of edges separating e and the root is the same for all paths between e and r. This length is called the depth of e. For any k = 1..K, we denote the set containing all the edges of depth k, by E(k). For e ∈ E(k), we also say that e belongs to the layer k. Moreover, to any edge e is attached Pa convolution kernel of maximal support Se ⊂ NN . We assume (without loss of generality) that e∈E(k) |Se | is independent of k (|Se | denotes the cardinality of Se ). We take X S= |Se |. e∈E(1) For any edge e, we consider the mapping Te : RS −→ RN that maps any h ∈ RS into the convolution kernel he , attached to the edge e, whose support is Se . It simply writes at the right location (i.e. those in Se ) the entries of h defining the kernel on the edge e. As in the previous section, we assume a sparsity constraint and will only consider a family M of possible supports S ⊂ NK S. At each layer k, the convolutional linear network computes, for all e ∈ E(k), the convolution between the signal at the origin of e; then, it attaches to any ending node the sum of all the convolutions arriving at that node. Examples of such convolutional linear networks includes wavelets, wavelet packets Mallat (1998) or the fast transforms optimized in Chabiron et al. (2014, 2016). It is similar to the usual convolutional neural network except that the linear network does not involve any non-linearity and the supports are not fixed. It is clear that the operation performed at any layer depends linearly on the parameters h ∈ RS and that its results serves as inputs for the next layer. 8 S TABLE RECOVERY OF DEEP LINEAR NETWORKS UNDER SPARSITY CONSTRAINTS The convolutional linear network therefore depends on parameters h ∈ RS×K and takes the form X = M1 (h1 ) . . . MK (hK ), where the operators Mk satisfy the hypothesis of the present paper. This section applies the results of the preceding section  in order to identify conditions such that any unknown parameters h ∈ RS×K satisfying supp h ⊂ S, for a given S ∈ M, can be stably recovered from X = M1 (h1 ) . . . MK (hK ) (possibly corrupted by an error). In order to do so, let us define a few notations. Notice first that, we apply the convolutional linear network to an input x ∈ RN |F | , where x is the concatenation of the signals xf ∈ RN for f ∈ F. Therefore, X is the (horizontal) concatenation of |F| matrices X f ∈ RN ×N such that X Xx = X f xf , for all x ∈ RN |F | . f ∈F Let us consider the convolutional linear network defined by h ∈ RS×K as well as f ∈ F and n = 1..N . The column of X corresponding to the entry n in the leaf f is the translation by n of X T p (h) (14) p∈Pa (f ) where Pa (f ) contains all the paths of Pa starting from the leaf f and T p (h) = Te1 (h1 ) ∗ . . . ∗ TeK (hK ) , where p = (e1 , . . . , eK ). Moreover, we define for any k = 1..K the mapping ek : NS −→ E(k) which provides for any i = 1..S the unique edge of E(k) such that the ith entry of h ∈ RS contributes to Tek (i) (h). Also, for any i ∈ NK S , we denote pi = (e1 (i1 ), . . . , eK (iK )) and, for any S ∈ M,  IS = i ∈ NK S |i ∈ S and pi ∈ Pa . The latter contains all the indices of S corresponding to a valid path in the network. For any set of parameters h ∈ RS×K and any path p ∈ Pa , we also denote by hp the restriction of h to its indices i S×K by contributing to the kernels on the path p. We also define, for any i ∈ NK S,h ∈R  1 , if j = ik i hk,j = , for all k = 1..K and j = 1..S. (15) 0 otherwise We can deduce from (14) that, when i ∈ IS , AP (hi ) simply convolves the entries at one leaf with a dirac delta function. Thefore, all the entries of AP (hi ) are in {0, 1} and we denote Di = {(i, j) ∈ NN × NN |F | |AP (hi )i,j = 1}. We also denote 1 ∈ RS a vector of size S with all its entries equal to 1. For any edge e ∈ E, 1e ∈ RS consists of zeroes except for the entries corresponding to the edge e which are equal to 1. For any S ⊂ NS , we define 1S ∈ RS which consists of zeroes except for the entries corresponding to the indexes in S. For any p = (e1 , . . . , eK ) ∈ Pa , the support of M1 (1e1 ) . . . MK (1eK ) is denoted by D p . Finally, we remind that because of (8), there exists a unique mapping A : RS K −→ RN ×N |F | 9 such that , for all h ∈ RS×K , AP (h) = M1 (h1 ) . . . MK (hK ) where P is the Segre embedding defined in (5). Proposition 2 Necessary condition of identifiability of a sparse network ′ ′ Either RS×K is not identifiable or, for any S and S ′ ∈ M, all the entries of M1 (1S∪S ) . . . MK (1S∪S ) belong to {0, 1}. When the latter holds : ′ 1. For any distinct p and p′ ∈ Pa , we have D p ∩ D p = ∅. K 2. Ker (AS∪S ′ ) = {T ∈ RS |∀i ∈ IS∪S ′ , Ti = 0}. Proof ′ ′ Let us assume that: There exist S and S ′ ∈ M and an entry of M1 (1S∪S ) . . . MK (1S∪S ) that does not belong to {0, 1}. Using (14), we know that there is f ∈ F and n = 1..N such that X T p (1) n ≥ 2. p∈Pa (f ) As a consequence, there is i and j ∈ S ∪ S ′ with i 6= j and T pi (hi ) n = T pj (hj ) n = 1. Therefore, AP (hi ) = AP (hj ) and the network is not identifiable. This proves the first statement. ′ ′ Let us assume that: For any S and S ′ ∈ M, all the entries of M1 (1S∪S ) . . . MK (1S∪S ) belong to {0, 1}. We immediately observe that (14) leads to the item 1 of the Proposition. To prove the second item, we can easily check that (P (hi ))i6∈IS∪S ′ forms a basis of {T ∈ K RS |∀i ∈ IS∪S ′ , Ti = 0}. We can also easily check using (14) and (11) that, for any i 6∈ IS∪S ′ ,  0 , if i 6∈ S ∪ S ′ i AS∪S ′ P (h ) = M1 (hi1 ) . . . MK (hiK ) = 0 , if i ∈ S ∪ S ′ and pi 6∈ Pa K As a consequence, {T ∈ RS |∀i ∈ IS∪S ′ , Ti = 0} ⊂ Ker (AS∪S ′ ). To prove the converse inclusion, we observe that for any distinct i and j ∈ IS∪S ′ , we have Di ∩ Dj = ∅. This implies that K rk (AS∪S ′ ) ≥ |IS∪S ′ | = S K − dim({T ∈ RS |∀i ∈ IS∪S ′ , Ti = 0}). K Finally, we deduce that dim(Ker (AS∪S ′ )) ≤ dim({T ∈ RS |∀i ∈ IS∪S ′ , Ti = 0}) and therefore K Ker (AS∪S ′ ) = {T ∈ RS |∀i ∈ IS∪S ′ , Ti = 0}. 10 S TABLE RECOVERY OF DEEP LINEAR NETWORKS UNDER SPARSITY CONSTRAINTS Proposition 2 extends Proposition 8 of Malgouyres and Landsberg (2017) by considering several possible supports. Said differently, Proposition 8 of Malgouyres and Landsberg (2017) corresponds to Proposition 2 when M = {NK S }. The interest of the condition in Proposition 2 is that it can easily be computed by applying the network to dirac delta functions, when |M| is not too large. Notice that, beside the known examples in blind-deconvolution (i.e. when K = 2 and |Pa | = 1) Ahmed et al. (2014); Bahmani and Romberg (2015), there are known convolutional linear networks (with K ≥ 2) that satisfy the condition of the first statement of Proposition 2. For instance, the convolutional linear network corresponding to the un-decimated Haar wavelet2 transform is a tree and for any of its leaves f ∈ F, |Pa (f )| = 1. Moreover, the support of the kernel living on the edge e, of depth k, on this path is {0, 2k }. It is not difficult to check that the first condition of Proposition 2 holds. Otherwise, it is clear that the necessary condition will be rarely satisfied. Proposition 3 If |Pa | = 1 and if, for any S and S ′ ∈ M, all the entries of M1 (1S∪S ) . . . MK (1S∪S ) K belong to {0, 1}, then Ker (AS∪S ′ ) is the orthogonal complement of RSS∪S ′ and A satisfies the deepM-NSP√with constants (γ, ρ) = (1, +∞). Moreover, the deep-lower-RIP of A with regard to M is σM = N . ′ K ′ Proof The fact that, Ker (AS∪S ′ ) is the orthogonal complement of RSS∪S ′ is a direct consequence of Proposition 2 and the fact that, when |Pa | = 1, IS∪S ′ = S ∪ S ′ . We then trivialy deduce that, for any T ′ ∈ Ker (AS∪S ′ ), PS∪S ′ T ′ = 0. A straightforward consequence is that A satisfies the deep-M-NSP with constants (γ, ρ) = (1, +∞). To calculate σM , let us considerP S, S ′ ∈ M and T in the orthogonal complement of Ker (AS∪S ′ ). We express T under the form T = i∈I ′ Ti P (hi ), where hi is defined (15). Let us also remind S∪S that, applying Proposition 2, the supports of AP (hi ) and AP (hj ) are disjoint, when i 6= j. Let us finally add that, since AP (hj ) is the matrix of a convolution with a Dirac mass, we have |Dj | = N . We finally have X kAT k2 = k Ti AP (hi )k2 , i∈I = N X i∈I Ti2 = N kT k2 , from which we deduce the value of σM . In the sequel, we establish stability results for a convolutional linear network estimator. In order to do so, we consider a convolutional linear network of known structure G(E, N ), (Se )e∈E and M. The convolutional linear network is defined by unknown parameters h ∈ RS×K satisfying a  constraint supp h ⊂ S for an unknown support S ∈ M. We consider the noisy situation where X = M1 (h1 ) . . . MK (hK ) + e, 2. Un-decimated means computed with the ”Algorithme à trous”, Mallat (1998), Section 5.5.2 and 6.3.2. The Haar wavelet is described in Mallat (1998), Section 7.2.2, p. 247 and Example 7.7, p. 235 11 with kek ≤ δ and an estimate h∗ ∈ RS×K such that kM1 (h∗1 ) . . . MK (h∗K ) − Xk ≤ η. The equivalence relationship ∼ does not suffise to group parameters leading to the same network action. Indeed, with networks, we can rescale the kernels on different path differently. Therefore, we say that two networks sharing the same topology and defined by the parameters h and g ∈ RS×K are equivalent if and only if Y ∀p ∈ Pa , ∃(λe )e∈p ∈ Rp , such that λe = 1 and ∀e ∈ p, Te (g) = λe Te (h). e∈p We trivially observe that applying the networks defined by equivalent parameters lead to the same result. The equivalence class of h ∈ RS×K is denoted by {h}. For any p ∈ [1, +∞], we define  δp ({h}, {g}) =  1 p X p p p dp ([h ], [g ]) p∈Pa , where we remind that hp (resp gp ) denotes the restriction of h (resp g) to the path p and dp is defined in (4). Since dp is a metric, we easily prove that δp is a metric between network classes. Theorem 5 If for any S and S ′ ∈ M, all the entries of M1 (1S∪S ) . . . MK (1S∪S ) belong to {0, 1} and if there exists ε > 0 such that for all e ∈ E, kTe (h)k∞ ≥ ε then ′ ′ 1 (KS) p δp ({h }, {h}) ≤ 7 √ (δ + η). N εK−1 ∗ Proof Let us consider a path p ∈ Pa , using (14), since all the entries of M1 (1S∪S ) . . . MK (1S∪S ) belong to {0, 1}, the restriction of the network to p satisfy the same property. Therefore, we can apply Proposition 3 and Theorem 3 to the restriction of the convolutional linear network to p and obtain for any p ∈ [1, ∞] ′ 1 (KS) p 1−K p dp ([(h ) ], [h ]) ≤ 7 √ ε (δ + η p ), N ∗ p p where δp and η p are the restrictions of the errors on D p . Finally, using item 1 of Proposition 2  1 p 1 p (KS) 1−K  δp ({h }, {h}) ≤ 7 √ ε (δp + η p )p  , N p∈Pa ∗ 1 X (KS) p ≤ 7√ (δ + η). N εK−1 12 ′ S TABLE RECOVERY OF DEEP LINEAR NETWORKS UNDER SPARSITY CONSTRAINTS Acknowledgments Joseph Landsberg is supported by NSF DMS-1405348. References Arif Ahmed, Benjamin Recht, and Justin Romberg. Blind deconvolution using convex programming. IEEE Transactions on Information Theory, 60(3):1711–1732, 2014. Sanjeev Arora, Rong Ge, Ravindran Kannan, and Ankur Moitra. Computing a nonnegative matrix factorization–provably. In Proceedings of the forty-fourth annual ACM symposium on Theory of computing, pages 145–162. ACM, 2012. Sohail Bahmani and Justin Romberg. Lifting for blind deconvolution in random mask imaging: Identifiability and convex relaxation. SIAM Journal on Imaging Sciences, 8(4):2203–2238, 2015. Emmanuel J Candes, Thomas Strohmer, and Vladislav Voroninski. Phaselift: Exact and stable signal recovery from magnitude measurements via convex programming. Communications on Pure and Applied Mathematics, 66(8):1241–1274, 2013. Olivier Chabiron, François Malgouyres, Jean-Yves Tourneret, and Nicolas Dobigeon. Toward fast transform learning. International Journal of Computer Vision, pages 1–22, 2014. Olivier Chabiron, François Malgouyres, Herwig Wendt, and Jean-Yves Tourneret. Optimization of a fast transform structured as a convolutional tree. preprint HAL, (hal-01258514), 2016. Anna Choromanska, Mikael Henaff, Michael Mathieu, Gérard Ben Arous, and Yann LeCun. The loss surfaces of multilayer networks. In Artificial Intelligence and Statistics, pages 192–204, 2015a. Anna Choromanska, Yann LeCun, and Gérard Ben Arous. Open problem: The landscape of the loss surfaces of multilayer networks. In Conference on Learning Theory, pages 1756–1760, 2015b. Sunav Choudhary and Urbashi Mitra. Identifiability scaling laws in bilinear inverse problems. arXiv preprint arXiv:1402.2637, 2014. Albert Cohen, Wolfgang Dahmen, and Ronald DeVore. Compressed sensing and best -term approximation. Journal of the American mathematical society, 22(1):211–231, 2009. David L Donoho and Victoria Stodden. When does non-negative matrix factorization give a correct decomposition into parts? 2003. Michael Elad. Sparse and Redundant Representations: From Theory to Applications in Signal and Image Processing. Springer, 2010. Ronen Eldan and Ohad Shamir. The power of depth for feedforward neural networks. In Conference on Learning Theory, pages 907–940, 2016. Benjamin D Haeffele and René Vidal. Global optimality in tensor factorization, deep learning, and beyond. arXiv preprint arXiv:1506.07540, 2015. 13 Rodolphe Jenatton, Rémi Gribonval, and Francis Bach. Local stability and robustness of sparse dictionary learning in the presence of noise. arxiv, 2012. Kenji Kawaguchi. Deep learning without poor local minima. In Advances in Neural Information Processing Systems, pages 586–594, 2016. Hans Laurberg, Mads Græsbøll Christensen, Mark D Plumbley, Lars Kai Hansen, and Søren Holdt Jensen. Theorems on positive data: On the uniqueness of nmf. Computational intelligence and neuroscience, 2008, 2008. Daniel D Lee and H Sebastian Seung. Learning the parts of objects by non-negative matrix factorization. Nature, 401(6755):788–791, 1999. Xiaodong Li, Shuyang Ling, Thomas Strohmer, and Ke Wei. Rapid, robust, and reliable blind deconvolution via nonconvex optimization. CoRR, abs/1606.04933, 2016. URL http://arxiv.org/abs/1606.04933. Roi Livni, Shai Shalev-Shwartz, and Ohad Shamir. On the computational efficiency of training neural networks. In Advances in Neural Information Processing Systems, pages 855–863, 2014. François Malgouyres and Joseph Landsberg. Stable recovery of the factors from a deep matrix product and application to convolutional network. arXiv preprint arXiv:1703.08044, 2017. Stéphane Mallat. A Wavelet Tour of Signal Processing. Academic Press, Boston, 1998. Itay Safran and Ohad Shamir. On the quality of the initial basin in overspecified neural networks. In International Conference on Machine Learning, pages 774–782, 2016. Nitish Srivastava, Geoffrey E Hinton, Alex Krizhevsky, Ilya Sutskever, and Ruslan Salakhutdinov. Dropout: a simple way to prevent neural networks from overfitting. Journal of machine learning research, 15(1):1929–1958, 2014. Appendix A. Proof of Theorem 4   ′ ′ S×K and Proof Let S and S ′ ∈ M. Let h ∈ RS×K h ∈ R be such that kA P (h) − P (h ) k≤ ′ S S δ. Throughout the proof, we also consider T ′ ∈ Ker (AS∪S ′ ). We assume that kP (h)k∞ ≤ ′ ′ kP (h )k∞ . If it is not the case, we simply switch the role of h and h in the definition of X and e, below. We denote ′ X = AP (h) and e = AP (h) − AP (h ). ′ We have X = AP (h ) + e with kek ≤ δ. Moreover, when S and h play the role of S ∗ and h∗ in the hypothesis, since h ∈ RS×K and kek ≤ δ, we have S ′ ′ 1 K d2 ([h ], [h]) ≤ CkP (h )k∞ 14 −1 kek. S TABLE RECOVERY OF DEEP LINEAR NETWORKS UNDER SPARSITY CONSTRAINTS ′ Using the fact that e = AS∪S ′ (P (h) − P (h )), for any T ′ ∈ Ker (AS∪S ′ ) ′ kek = kAS∪S ′ (P (h) − P (h ) − T ′ )k, ′ ≤ σmax kPS∪S ′ (P (h) − P (h ) − T ′ )k, ′ = σmax kP (h) − P (h ) − PS∪S ′ T ′ k, where σmax is the spectral radius of A. Therefore, ′ ′ 1 K d2 ([h ], [h]) ≤ CkP (h )k∞ −1 ′ σmax kP (h) − P (h ) − PS∪S ′ T ′ k, ′ Finally, using Theorem 2 and the fact that kP (h)k∞ ≤ kP (h )k∞ , we obtain ′ K−1 2 ′ 1 1− 1 ′ K 1− 2 kP (h )k∞ K d2 ([h ], [h]) K−1 √ ′ ≤ CS 2 K σmax kP (h) − P (h ) − PS∪S ′ T ′ k kP (h ) − P (h)k ≤ S ′ = γkP (h) − P (h ) − PS∪S ′ T ′ k K−1 √ for γ = CS 2 K σmax . Summarizing, we conclude that under the hypothesis of the theorem: For any S and S ′ ∈ M ) + P (RS×K ) such that kAT k = kAS∪S ′ T k ≤ δ, we have for any T ′ ∈ and any T ∈ P (RS×K S S′ Ker (AS∪S ′ ) kT k ≤ γkT − PS∪S ′ T ′ k. In words, A satisfies the deep-M-NSP with the constants of Theorem 4. 15
10math.ST
Learning Deep Similarity Models with Focus Ranking for Fabric Image Retrieval Daiguo Denga , Ruomei Wanga , Hefeng Wub,∗, Huayong Hea , Qi Lic , Xiaonan Luod a Sun Yat-sen University, Guangzhou 510006, China University of Foreign Studies, Guangzhou 510006, China c Western Kentucky University, Bowling Green, KY, 42101, USA d Guilin University of Electronic Technology, Guilin 541004, China b Guangdong arXiv:1712.10211v1 [cs.CV] 29 Dec 2017 Abstract Fabric image retrieval is beneficial to many applications including clothing searching, online shopping and cloth modeling. Learning pairwise image similarity is of great importance to an image retrieval task. With the resurgence of Convolutional Neural Networks (CNNs), recent works have achieved significant progresses via deep representation learning with metric embedding, which drives similar examples close to each other in a feature space, and dissimilar ones apart from each other. In this paper, we propose a novel embedding method termed focus ranking that can be easily unified into a CNN for jointly learning image representations and metrics in the context of fine-grained fabric image retrieval. Focus ranking aims to rank similar examples higher than all dissimilar ones by penalizing ranking disorders via the minimization of the overall cost attributed to similar samples being ranked below dissimilar ones. At the training stage, training samples are organized into focus ranking units for efficient optimization. We build a large-scale fabric image retrieval dataset (FIRD) with about 25,000 images of 4,300 fabrics, and test the proposed model on the FIRD dataset. Experimental results show the superiority of the proposed model over existing metric embedding models. Keywords: convolutional neural network, fabric image retrieval, metric embedding, focus ranking 2010 MSC: 00-01, 99-00 1. Introduction Fabric image retrieval, as a special case of generic image retrieval, benefits a wide range of applications, e.g., large-scale clothing searching, online shopping and cloth modeling. Given a query fabric image, a retrieval algorithm is expected to output fabric images that are identical or similar to the query image. It remains a challenging task due to severe variations in illuminations, orientations, scales and wrinkles among fabric images. Traditional methods for image retrieval mainly involve two critical components: i) design a robust and discriminative image representation, and ii) determine an effective distance or similarity metric for a given image representation. Image representations used in a traditional method are usually hand-crafted, e.g., SIFT [1], GIST [2, 3], Bag of Words (BoW) [4], Fisher Vector (FV) [5, 6], and VLAD [7]. Although achieving reasonable successes in image retrieval, these methods depend heavily on feature engineering. More seriously, the two components are designed or learned separately, leading to a sub-optimal solution. Recently, methods were proposed to learn an image representation and a distance or similarity metric jointly [8, 9] based on Convolutional Neural Networks (CNN) [10, 11], which can be used seamlessly in image retrieval. Specifically, these methods trained a CNN with metric learning embedding. Two simple yet effective metric learning embedding methods are pair ∗ Corresponding author. Email address: [email protected] (Hefeng Wu) Preprint submitted to Image and Vision Computing [12, 13] and triplet embedding [14, 15]. These two embedding methods are optimized to pull samples of different labels apart from each other and push samples with the same labels close to each other. The most important advantage of these discriminative models is that they can jointly learn an image representation and semantically meaningful metric, which is more robust against intra-class variations and inter-class confusions. An image retrieval system aims to find out samples with the same labels against a great many negative ones. But pair and triplet embedding methods model a metric with no more than one negative image as reference, which are extremely rough approximation to a real setting. In this paper, we propose a novel embedding method named focus ranking, which can easily be unified into a CNN for a joint optimization. In particular, the proposed model aims to rank a sample with the same label (i.e., the matched sample) top over all negative ones. Hence, we penalize any ranking disorder by minimizing the overall cost of the matched samples ranked below any negative ones. At the training stage, we organize training samples into focus ranking units, each of which consists of a probe sample, a matched sample, and a reference set, for an efficient optimization. It learns to rank the matched sample top over all the negative ones in the reference set. To the best of our knowledge, there are not fabric image retrieval datasets publicly available. We build a large-scale fabric image retrieval datasets (FIRD). It contains 4,300 fabrics, each of which has five to ten instances. We divide the FIRD dataset into two partitions, via randomly selecting half of the fabrics as the training set and the rest as the test set. We randomly January 1, 2018 select 2/5 images as queries for each fabric in the test set and the rest form the retrieval set. Given a query image, we aim to find out the ones of the same fabric at the retrieval set. Extensive experiments on FIRD demonstrate that the proposed model outperforms existing ones by a large margin. In summary, this paper makes four main contributions to the community. [16] hierarchically quantized local descriptors to a hierarchical vocabulary, which improves not only the retrieval efficiency but also its quality. Jegou et al. [17] presented a contextual dissimilarity measure for accurate and efficient image search, while Fraundorfer et al. [18] proposed a binning scheme for fast hard drive based image search. Jegou et al. [19, 20] developed a more precise representation by integrating hamming embedding and weak geometric consistency within the inverted file. Some works also aggregated a set of local descriptors into global ones for large scale image retrieval, e.g., Fisher Vector (FV) [5, 6], and Vector of Locally Aggregated Descriptors (VLAD) [7]. Perronnin et al. [21] represented an image as a Fisher Vector, and compressed Fisher Vectors using the binarization technique to reduce their memory footprint and speed up the retrieval. VLAD can jointly optimize dimensionality reduction and indexing algorithms, and thus produce a more compact representation for image retrieval. Although achieving significant progress in visual retrieval, these works depended heavily on hand-crafted features, which were not always optimized for particular tasks. • We propose a novel focus ranking embedding method, which aims to rank the matched sample top over any negative ones. This method can be easily unified into a CNN to learn a deep similarity model by optimizing the image representation and metric jointly. Compared to existing embedding methods, it can learn more robust and discriminative representation to reduce intra-class variations and enhance inter-class discrimination. • We apply focus ranking unit generation to model training, which highlights the focus by the negative-positive ratio in the process of training. It can also help increase the diversity of training samples, which is greatly important to learning. 2.2. Deep representation learning Recently, deep representation learning has been success• We build a large-scale fabric image retrieval dataset (FIRD), fully applied to various computer vision areas, such as image which contains 4,300 fabrics and about 25,000 images for classification [10, 22, 23], object detection [24, 25, 26], pixeltraining and test. To the best of our knowledge, it is the wise image labeling [27, 28] and human centric analysis [29, first large-scale dataset for this task. 30]. We review some recent works that applied deep learning • Extensive experiments demonstrate the superiority of the to image retrieval [31, 32, 8, 33, 34, 35]. Babenko et al. [31] proposed method over existing metric embedding methextracted global features for image retrieval from the fully conods. We also carefully evaluate and discuss key componected layer of CNN pre-trained with an image classification nents of our model that improve the performance. dataset [36], and demonstrated fine-tuning the network with annotated target images could boost the retrieval performance. The rest of this paper is organized as follows. Related works Their succeeding work [32] simply aggregated the average and are reviewed in Section 2. The proposed model is presented in max pooling of the last convolutional layer as image repreSection 3, and the FIRD dataset is described in Section 4. Secsentation and achieved better results than using fully convotion 5 presents an extensive evaluation and comparison between lutional layer. Perronnin and Larlus [34] proposed a hybrid the proposed method and several state-of-the-art methods, in image retrieval architecture that combined the strengths of suaddition to the component analysis of the proposed method. pervised deep representation and unsupervised Fisher Vectors Section 6 concludes the paper. [5, 6]. However, these methods extracted deep features using the CNN trained with a classification objective function, which merely focused on feature learning and ignored metric learning. 2. Related Works In this section, we review three topics most related to this work according to its objective and the technical components. These three topics are traditional descriptors, deep representation learning and distance learning. 2.3. Distance learning Distance metric learning (DML) plays an important role in many computer vision tasks such as face recognition, person re-identification and image retrieval. Xing et al. [37] proposed to learn a distance metric from given examples of similar pairs and demonstrated the learned distance metric can improve clustering performance significantly. Zheng et al. [38] formulated distance learning as a probabilistic relative distance comparison model to maximize the likelihood in which the examples from a matched pair have smaller distance than those from a mismatched pair. Mignon and Jurie [39] proposed a new distance learning method with sparse pairwise constraints. The success of deep learning also inspired recent works that applied neural network models to address the distance learning problem [40, 41, 42]. 2.1. Traditional descriptors Traditional image retrieval systems mainly focus on designing discriminative hand-crafted image representations for matching two images. Scale-Invariant Feature Transform (SIFT) [1] was used widely in image retrieval, due to its distinct invariance to image translation, scaling, and rotation. Many works applied Bag of Features (BOF) using SIFT features for large scale image retrieval, such as [4]. They first quantized local feature vectors into visual words, and represented the image by the frequency histogram of visual words. Nister and Stewenius 2 the scenario that has K categories of fabrics, in which the jth category has nj images. Suppose there are N training images X = {xi |i = 1, 2, 3, ..., N }, so the training set is T = {(xi , yi )|i = 1, 2, 3, ..., N }, where xi is the i-th training image and yi ∈ {1, 2, 3, ..., K} denotes the fabric category the image xi belongs to. Given an image x, there exist some images with the same label, which are the positive ones and denoted by X + . All the others are considered to be negative ones, denoted by X − . A CNN is applied to model the transformation f (·) from a raw image to its feature vector. Given an image x, it is expected that the distances between f (x) and f (x+ ) should be smaller than those between f (x) and f (x− ), for ∀x+ ∈ X + and ∀x− ∈ X − , i.e., The following works are related to our work in spirit of deep metric embedding. Hu et al. [43] presented a new discriminative deep metric learning (DDML) method for face verification in the wild. Bell and Bala [41] learned deep metric for visual search in interior design using contrastive embedding. In [44], Rippel et al. proposed to maintain an explicit model of the distributions of different classes in representation space and employ it to achieve local discrimination in DML by penalizing class distribution overlap. Wang et al. [8] used a multi-scale CNN trained using triplet embedding for learning fine-grained image similarity directly from the image pixels. Similar ideas were employed in [14] and [45] for face verification and hash learning, respectively. Two common embedding methods are closely related to our focus ranking embedding method, i.e., pair [12, 13] and triplet [14, 15] embedding. The goal of all the three embedding methods are to push the samples with the same labels close to each other and pull the samples of different labels apart from each other. However, they are quite different in training and optimization. The pair method builds its energy function on a training set composed of image pairs and optimize to assign small distance to similar pairs and large distance to dissimilar pairs. The training set of the triplet method is arranged into image triplets (a probe image, a matched one and a reference one). The resulting optimization aims to make the distance of the matched image to the probe image smaller than that of the negative reference one. However, these two methods do not address the challenging fine-grained fabric image retrieval problem well. The proposed focus ranking method arranges the training set into focus ranking units (see Section 3.3), with much larger number of reference images in contrast to the matched one. Then our optimization penalizes any ranking disorder that negative images in the reference set rank over the matched one. Extensive experimental validation demonstrates that the deep similarity model optimized with our focus ranking embedding method outperforms previous models favorably. D(f (x), f (x+ )) < D(f (x), f (x− )), ∀x+ ∈ X + , ∀x− ∈ X − , (1) where D(·, ·) denotes the distance between two feature vectors. In this paper, we apply L2 -norm to measure the distance, i.e., D(f (x), f (y)) = kf (x) − f (y)k22 . Intuitively, we penalize the ranking disorder cases that are D(f (x), f (x+ )) > D(f (x), f (x− )). Formally, we apply a 0-1 function to measure the penalty, so the ranking loss of x with respective to X + and X − can be expressed as loss(x|X + , X − ) = X X x+ ∈X + x− ∈X − 1(D(f (x), f (x− ))−D(f (x), f (x+ )) < 0), (2) where 1(·) is the indictor function whose value is 1 if the expression is true, and 0 otherwise. The loss function can be formulated P by summing up the ranking loss over the training set: L = x∈X loss(x|X + , X − ). Optimizing the above loss function can minimize the ranking disorder cases and benefit for top ranking the positive samples. However, the 0-1 loss function is non-differential in optimization, so it is difficult to be jointly optimized with the CNN. One common solution for this problem is to apply a differential upper-bound function of the 0-1 function. Inspired by [46], we replace the 1(x < 0) by the logistic function σ(x) = log2 (1 + 2−x ). The loss function can then be expressed as X X X L= σ(D(f (x), f (x− ))−D(f (x), f (x+ ))). 3. Deep Similarity Model with Focus Ranking In this section, we describe the proposed deep focus ranking model in detail. In the training stage, we first arrange training images into focus ranking units, each of which contains one probe image, one image of the same fabric (i.e., positive image), and a number of images of different fabrics (i.e., negative images). Then, images in each focus ranking unit are fed into a CNN to derive features, based on which the “probe-topositive” and “probe-to-negative” distances will be computed, respectively. Recall that the probe-to-positive distance is expected to be constantly smaller than the probe-to-negative distance. Thus, we penalize ranking disorders in all units. For each pair of input images, the trained CNN will be applied to extract their features separately and then compute their distance directly in the test stage. x∈X x+ ∈X + x− ∈X − (3) It is worth noting that the proposed model successfully integrates feature extraction and metric learning. In a traditional method, features are usually hand-crafed, and the selection of a metric is done separately from feature extraction. In this work, we take advantage of the CNN for feature learning and optimize the two components jointly. We will introduce the detailed network architecture and the optimization in the following subsections. 3.2. Network architecture We build our deep focus ranking model on the popular CNN architecture Alex-Net [10]. The first seven layers of Alex-Net are used as the early layers of our network architecture, and then we add auxiliary structure to fulfill similarity evaluation. Our network architecture is illustrated in Fig. 1. Specifically, the 3.1. Deep metric formulation We first present some notations that would be used throughout this article. Without loss of generalization, we consider 3 fc 3 fc conv 96 conv 384 Stride 4 27 227 Max-pooling 3x3 kernel, stride 2 Normalization Input image Layer1 Kernel 5x5x96 Stride 1 256 13 Kernel 3x3x256 Stride 1 13 13 13 27 55 conv 384 13 55 227 conv conv 256 Kernel 11x11x3 Max-pooling 3x3 kernel, stride 2 Layer3 1 Loss layer Kernel 3x3x384 Kernel 3x3x384 Stride 1 Stride 1 Max-pooling 3x3 kernel, stride 2 Normalization Layer2 13 Layer4 Layer5 4096 Layer6 4096 Layer7 Figure 1: Illustration of our network architecture. mentioned σ(x) = log2 (1 + 2−x ), we first obtain first five of the seven layers are convolutional layers and the remaining two are fully connected layers. The first convolutional layer takes an image of size 227 × 227 × 3 as input and has 96 kernels of size 11 × 11 × 3 with a stride of 4 pixels, resulting in 96 feature maps of size 55 × 55. The second convolutional layer has 256 kernels of size 5 × 5 × 96 and outputs 256 feature maps of size 27 × 27. The output feature maps of the first two convolutional layers are max-pooled (3 × 3 kernel with stride 2) and normalized before being fed into the next convolutional layer. The third, fourth, and fifth convolutional layers have 384 kernels of size 3 × 3 × 256, 384 kernels of size 3 × 3 × 384, and 256 kernels of size 3 × 3 × 384, respectively. The output feature maps of the third and fourth convolutional layers are not intervened by any pooling or normalization, while the output of the fifth convolutional layer is max-pooled (3 × 3 kernel with stride 2) and results in 256 feature maps of size 6 × 6. The sixth and seventh fully-connected layers have 4096 neurons each. Moreover, the outputs of all the seven layers are immediately filtered by a rectified linear unit (ReLU) before any pooling or normalization operation. Finally, we add an auxiliary layer to calculate the loss function (3). " #  X X −δ(x, x+ , x− ) ∂D(f (x), f (x− )) ∂L ∂D(f (x), f (x+ ))   = −    ∂f (x) 1 + δ(x, x+ , x− ) ∂f (x) ∂f (x)  x∈X x− ∈Ux     " #   + − − X X  ∂L −δ(x, x , x ) ∂D(f (x), f (x )) ∂D(f (x), f (x+ )) = − ∂f (x+ ) 1 + δ(x, x+ , x− ) ∂f (x+ ) ∂f (x+ )   x∈X x− ∈Ux    " #    X X  ∂L −δ(x, x+ , x− ) ∂D(f (x), f (x− )) ∂D(f (x), f (x+ ))   = −   ∂f (x− ) 1 + δ(x, x+ , x− ) ∂f (x− ) ∂f (x− ) x∈X − x ∈Ux where δ(x, x+ , x− ) = 2−[D(f (x),f (x − ))−D(f (x),f (x+ ))] . (5) Remembering that D(·, ·) is the L2 norm, then we can obtain the derivatives as follows:  X X −δ(x, x+ , x− )     ∂L = 2 f (x+ ) − f (x− )   + −  ∂f (x) 1 + δ(x, x , x )  x∈X x− ∈Ux     X X −δ(x, x+ , x− )   ∂L  = 2 f (x) − f (x+ ) +) + , x− ) ∂f (x 1 + δ(x, x   x∈X x− ∈Ux    X X −δ(x, x+ , x− )   ∂L     = 2 f (x− ) − f (x)  ∂f (x− ) + −  1 + δ(x, x , x ) − 3.3. Optimization with focus ranking unit generation We optimize the proposed model using stochastic gradient descent (SGD) algorithm with momentum [47]. It need to feed the whole dataset into the GPU memory if directly using loss function (3), which is almost intractable for large scale optimization. To tackle this problem, similar to [14, 30], we organize the training data into ranking units to optimize the model. Specifically, for a probe image x, we take one positive image x+ ∈ X + and a small subset of X − , i.e., Ux ⊂ X − , into consideration. Note that x+ , randomly sampled from X + , is the positive match and Ux randomly sampled from X − , is the reference set, for probe image x. So a focus ranking unit is defined to contain a probe image x, a positive match image x+ and the reference set Ux . Then the loss can be expressed as X X L= σ(D(f (x), f (x− )) − D(f (x), f (x+ ))). (4) x∈X x ∈Ux (6) We employ the unit sampling generation to optimize the model for the following serval reasons. First, taking a random subset in each iteration and applying sufficient iterations is approximately equivalent to using the whole reference set. Second, it is more efficient and practical to take a subset for training, especially for large-scale learning. Third, training the model with a random subset introduces a high degree of diversity, which is of great importance to learning. 4. Fabric Image Retrieval Dataset (FIRD) To the best of our knowledge, there are not public datasets for the fabric image retrieval problem. Since fabric image retrieval benefits a wide range of application, e.g., large-scale clothing searching and online shopping, we construct a largescale fabric image retrieval dataset (FIRD). Specifically, we collect 4,300 fabrics, and take different photos for each fabric. In x∈X x− ∈Ux The gradients of the loss with respective to the feature vector can be computed according to the chain rule. With the afore4 Figure 2: Samples from the FIRD dataset under different photographing conditions. (the ith fabric labelled i). We randomly select half of the 4,300 fabrics as training set and the rest as test set. So both training and test sets contain 2,150 categories of fabric. During testing, we randomly select 2/5 images of each category in the test set as query images, and arrange the rest images as a retrieval set. Given a query image, we aim to find the ones with the same label. order to imitate real application scenarios, we vary the collecting conditions from the following perspectives. Photographing device: Without loss of generalization, we use cell phones for collecting images as most of clothing searching and online shopping applications are used in cell phones. We use varied cell phones, from Android to iOS, from low- to highend, to increase the diversity of collected images. Photographing circumstance: We take photos of a fabric in varied circumstances, including different scenes (indoor and outdoor), time (day and night), and illumination conditions. Photographing view: We change viewing conditions as follows: (1) we rotate the fabric to collect images with different angles; (2) we take photos in near and far views to collect images with different scales; (3) we wrinkle the fabric to collect fabric images with various degrees of wrinkle. Figure 2 illustrates some samples from the FIRD dataset. It is a challenging dataset due to the complex variations in illumination, rotation, scale and wrinkle. All the 4,300 fabrics are incorporated in the dataset and, for each fabric, 5–10 images are collected under different above-mentioned conditions. The images of the same fabric are annotated by the same label 5. Experiments In this section, we will present experimental comparions between the proposal method and existing metric learning methods. We will also present intra-model comparisons to analyze the contribution of focus ranking unit generation. 5.1. Evaluation protocols We utilize the following measures to give an extensive evaluation and analysis of the tested methods’ performance. Recall@K. One of the critical measures for evaluating the retrieval performance is the recall at particular ranks, i.e., Recall@K [42, 48]. In this measure, given a query image, the 5 images with top K smallest distances to it are retrieved, and Recall@K is the ratio of retrieved relevant images over the total relevant images. The Recall@K on the dataset is then computed by averaging the scores of all query images. mAP. Another commonly used measure is the mean average precision (mAP) [49]. For each query image, a precision/recall curve can be obtained, and its average precision (the area under the curve) is computed. The mAP is obtained as the mean over all the queries. F1 and NMI scores. To further demonstrate the superiority of the proposed model, we also apply F1 and NMI scores [50] to evaluate the performance. The Normalized Mutual Information (NMI) score is calculated by conducting clustering experiments on the test set with the learned features. 5.3. Comparison results Note that the original feature dimensions of all models are 4,096, and they are too large for an efficient retrieval system. Therefore, we follow Babenko et al. [31] to apply the Principal Component Analysis (PCA) [52] to reduce the dimension to smaller ones (i.e., 512, 64, 16, 8), and perform comparisons on various feature dimensions. We first perform comparisons on the FIRD test set. For each fabric, we randomly select 2/5 images of each category as queries and use the rest as retrieval ones, making up a retrieval set of about 7,500 images. The comparison results of Recall@K are presented in Figure 3. It can be observed that all the other tested models perform well beyond the Alex baseline one. In addition, Figure 3(a) reveals that, as the feature dimension is reduced from 4,096 to 16, the recall rates of the four metric embedding models are nearly fixed but the Alex baseline and Softmax models suffer from a severe drop, suggesting that models with metric embedding can generate more compact and discriminative features. Among the four metric embedding models, our model can still outperform the other three by a large margin. For example, with the feature dimension of 4096, although the pair, Magnet and triplet models can achieve the high recall rates of 83.9%, 85.6% and 88.5% respectively, our model further improves them to 93.9%. Figure 3(b) reports the Recall@K scores when changing the number of retrieved images K from 1 to 32 and fixing the the feature dimension as 256. Since more relevant images can be retrieved when K increases, so the scores of all the tested methods will also monotonously increase. The figure shows that our method has a superior performance over the other methods at each value of K. Figure 4 shows the comparison results measured in mAP with respect to the feature dimension. It reveals again the other tested models all perform better than the Alex baseline one. It should be noted that the Softmax model with fine-tuning on the FIRD training set has significant performance gain from the Alex one. The evaluation results in mAP further demonstrate the superiority of our model. It suggests that our model can perform much better than the existing ones in fabric image retrieval systems. We also present the comparison results of F1 and NMI scores in Figure 5. The F1 score takes both accuracy and recall into consideration, and the results depicted in Figure 5(a) give further approval in the effectiveness of our model. We also conduct clustering experiments on the FIRD test set using the features extracted by all the tested models, and Figure 5(b) reports the comparison results measured in NMI. Our model performs much better than all the others, suggesting that it can also achieve much better clustering quality. In summary, observed from the quantitative performance of all the tested models in different measures, the effectiveness of the proposed method is sufficiently verified. We also observe that the pair model’s performance is the least sensitive to feature dimension changes, while the triplet model’s performance ranks second in most measures. The Softmax model exhibits impressive performance improvement from the Alex baseline model and can outperform the pair model in some measures, 5.2. Compared methods and implementation details We compare our model with five methods, i.e., Alex baseline, Softmax, pair, triplet and Magnet. Among them, the Alex baseline method applies the Alex-net model [10], which is trained on the ImageNet classification dataset [36] using the Caffe framework [51], and extracts the features of the first fully connected layer (i.e., fc6), so that the best performance can be ensured, as suggested in [31]. The Softmax method uses the Alex-net model pre-trained on ImageNet and then fine-tunes it on our FIRD training set. Afterwards, the feature extracted on the fc6 layer is used for evaluation. We also note that, for fair comparison, all the other tested methods are based on the Alex-net model and use the feature from the fc6 layer. The Magnet model applies the Magnet loss [44]. It is a recent deep metric embedding method and sculpts the feature representation by identifying and handling intra-class variation and inter-class similarity. We use its publicly available TensorFlow code1 and the Alex-net tensorflow model2 pre-trained on ImageNet to train on our FIRD dataset. We initialize the learning rate as 0.01, with momentum of 0.9, weight decay of 0.0005, and batch size of 80 (each batch randomly selects 16 classes and 5 images for each class). The two common deep metric embedding methods (i.e., pair and triplet) and the proposed method are implemented in the Caffe framework. These models are initialized with the parameters of the Alex-net model pre-trained on ImageNet and fine-tuned on our training set using the SGD method with backpropagation. For pair and triplet models, we initialize the learning rate as 0.001, with momentum of 0.9, weight decay of 0.0005, and batch sizes of 80 and 120 respectively. For our focus ranking model, we fix the positive and negative ratio as 1:32 in the focus ranking unit, which can well approximate the proposed model. During training, the images are resized to 256 × 256. In addition, the images are randomly cropped and randomly mirrored horizontally for data augmentation. During inference, all images are resized to 256 × 256 and cropped 227 × 227 at the image center for feature extraction. All experiments were tested on a single NVIDIA Tesla K40 GPU. 1 https://github.com/pumpikano/tf-magnet-loss 2 http://www.cs.toronto.edu/˜guerzhoy/tf alexnet/ 6 100 87 92 Recall@K (%) Recall@K (%) 95 79 Alex Softmax 71 84 Alex Softmax 76 Pair Pair magnet 63 magnet 68 Triplet Triplet Ours Ours 55 60 8 16 64 512 4096 1 2 4 Feature Dimension 8 16 32 Top K (a) (b) Figure 3: Comparison on the FIRD dataset using the Recall@K measure. (a) Recall@K vs. feature dimension with K=16. (b) Recall@K vs. K with the feature dimension of 256. Best viewed in color. 75 mAP score (%) 65 55 Alex 45 Softmax Pair magnet 35 Triplet Ours 25 8 16 64 512 4096 Feature Dimension 42 95 37 91 NMI score (%) F1 Score (%) Figure 4: Comparison on the FIRD dataset using the mAP measure. Best viewed in color. 32 Alex 27 Softmax 87 Alex 83 Softmax Pair Pair magnet 22 magnet 79 Triplet Triplet Ours 17 Ours 75 8 16 64 512 4096 8 Feature Dimension 16 64 512 4096 Feature Dimension (a) (b) Figure 5: Comparison on the FIRD dataset with F1 and NMI scores. (a) F1 score vs. feature dimension. (b) NMI score vs. feature dimension. Best viewed in color. which shows that fine-tuning on the target dataset can boost the baseline model’s performance. For the Magnet model, it does not work quite well in our experiments. We should note that it is implemented in TensorFlow, different from the others, and better explicit models of distributions of classes and more careful fine-tuning may boost its performance further. To give a qualitative analysis of our method, Figure 6 presents the top 8 retrieved images of some random query examples and Figure 7 presents those of some failure cases. We find that, in most cases, our model can successfully retrieve the images be- longing to the same fabric, despite of the complex variations in illumination, rotation, scale, and wrinkle. Moreover, most images of the same fabric rank top, and other retrieved ones also have very similar textural pattern with the query ones, which is also very essential for real-world systems. On the other hand, for the failure examples, most retrieved images come from the fabrics with subtle differences to the query. In order to better mimic the real-world scenarios, we further do experiments with a much larger dataset. We collect 100,000 fabrics and take one image for each fabric under the varied pho7 Figure 6: Retrieval results of query images randomly selected from the FIRD dataset. The first column are the query images, and the rest are the retrieved ones, arranged according to the distance to the corresponding query images. The retrieved images of the same class to the query image are marked in red boxes. Figure 7: Retrieval results of failure query images selected from the FIRD dataset. The first column are the query images, and the rest are the retrieved ones, arranged according to the distance to the corresponding query images. 8 95 81 83 Recall@K (%) Recall@K (%) 93 69 Alex 57 Softmax 71 Alex Softmax 59 Pair Pair magnet 45 magnet 47 Triplet Triplet Ours Ours 33 35 8 16 64 512 4096 1 2 4 Feature Dimension 8 16 32 Top K (a) (b) 95 98 92 93 Recall@K (%) Recall@K (%) Figure 8: Comparison on the FIRD dataset with additional 100,000 fabric images. (a) Recall@K vs. feature dimension with K=16. (b) Recall@K vs. K with the feature dimension of 256. Best viewed in color. 89 Ours (1:1) Ours (2:1) 86 88 Ours (1:1) Ours (2:1) 83 Ours (4:1) Ours (4:1) Ours (8:1) 83 Ours (8:1) 78 Ours (16:1) Ours (16:1) Ours (32:1) Ours (32:1) 80 73 8 16 64 512 4096 1 2 4 Feature Dimension 8 16 32 Top K (a) (b) Figure 9: Analysis of focus ranking unit generation. (a) Recall@K vs. feature dimension with K=16. (b) Recall@K vs. K with the feature dimension of 256. Best viewed in color. tographing conditions, making up a dataset of 100,000 fabric images. The original retrieval set of about 7,500 images and these 100,000 images are mixed to construct a new retrieval set. The retrieval results using the new retrieval set are presented in Figure 8 with the Recall@K measure. It shows that our model again suppresses all other methods by an even larger margin, suggesting our model is more suitable for real-world large scale fabric retrieval systems. increasing the ratio further can hardly obtain more improvement on the recall rate. These experimental results show that increasing the ratio may boost the performance by quite a large margin, but it becomes near saturation when the ratio reaches 32:1. It also suggests that a ratio of 32:1 can well approximate our ranking model. 5.4. Analysis of focus ranking unit generation In this paper, we propose a novel focus ranking embedding method, which aims to rank similar examples top over all dissimilar ones. The focus ranking method can easily be unified into a deep CNN to jointly learn an image representation and a metric. At the training stage, we apply focus ranking unit generation to approximate the proposed model for efficient training, and at the inference stage, a test image can be directly fed into the learnt CNN to extract the features in one shot. Extensive experimental results suggest that our deep focus ranking model shows superior performance over existing metric embedding methods. 6. Conclusion In this work, we generate focus ranking units by sampling to approximate our ranking model in the process of model optimization, and the negative-positive ratio is a very critical parameter. In this section, we analyze the ranking unit generation algorithm by evaluating the performance when training the model with the negative-positive ratio of 1:1, 2:1, 4:1, 8:1, 16:1 and 32:1 on the FIRD dataset. Figure 9 presents the quantitative evaluation results measured in Recall@K. It shows that there are obvious improvement consistently when increasing the ratio from 1:1 to 16:1. However, the improvement of recall rate when increasing the ratio from 16:1 to 32:1 is negligible, and 9 Acknowledgment [20] H. Jégou, M. Douze, C. Schmid, Improving bag-of-features for large scale image search, International Journal of Computer Vision 87 (3) (2010) 316–336. [21] F. Perronnin, Y. Liu, J. Sánchez, H. Poirier, Large-scale image retrieval with compressed fisher vectors, in: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2010, pp. 3384–3391. [22] J. Zhu, S. Liao, Z. Lei, S. Z. Li, Multi-label convolutional neural network based pedestrian attribute classification, Image and Vision Computing 58 (2017) 224–229. [23] Z. Wang, T. Chen, G. Li, R. Xu, L. Lin, Multi-label image recognition by recurrently discovering attentional regions, in: Proceedings of IEEE International Conference on Computer Vision (ICCV), 2017. [24] R. Girshick, J. Donahue, T. Darrell, J. Malik, Rich feature hierarchies for accurate object detection and semantic segmentation, in: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2014, pp. 580–587. [25] R. Girshick, Fast R-CNN, in: Proceedings of IEEE International Conference on Computer Vision (ICCV), 2015, pp. 1440–1448. [26] T. Chen, L. Lin, W. Zuo, X. Luo, L. Zhang, Learning a wavelet-like autoencoder to accelerate deep neural networks, in: Proceedings of AAAI Conference on Artificial Intelligence, 2018. [27] J. Long, E. Shelhamer, T. Darrell, Fully convolutional networks for semantic segmentation, in: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2015, pp. 3431–3440. [28] T. Chen, L. Lin, L. Liu, X. Luo, X. Li, DISC: deep image saliency computing via progressive representation learning, IEEE Transactions on Neural Networks and Learning Systems 27 (6) (2016) 1135–1149. [29] L. Lin, K. Wang, W. Zuo, M. Wang, J. Luo, L. Zhang, A deep structured model with radius-margin bound for 3D human activity recognition, International Journal of Computer Vision 118 (2) (2016) 256–273. [30] S.-Z. Chen, C.-C. Guo, J.-H. Lai, Deep ranking for person reidentification via joint representation learning, IEEE Transactions on Image Processing 25 (5) (2016) 2353–2367. [31] A. Babenko, A. Slesarev, A. Chigorin, V. Lempitsky, Neural codes for image retrieval, in: Proceedings of European Conference on Computer Vision (ECCV), 2014, pp. 584–599. [32] A. Babenko, V. Lempitsky, Aggregating local deep features for image retrieval, in: Proceedings of IEEE International Conference on Computer Vision (ICCV), 2015, pp. 1269–1277. [33] M. Paulin, M. Douze, Z. Harchaoui, J. Mairal, F. Perronin, C. Schmid, Local convolutional features with unsupervised training for image retrieval, in: Proceedings of IEEE International Conference on Computer Vision (ICCV), 2015, pp. 91–99. [34] F. Perronnin, D. Larlus, Fisher vectors meet neural networks: A hybrid classification architecture, in: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2015, pp. 3743–3752. [35] N. Jammalamadaka, A. Zisserman, C. V. Jawahar, Human pose search using deep networks, Image and Vision Computing 59 (2017) 31–43. [36] O. Russakovsky, J. Deng, H. Su, J. Krause, S. Satheesh, S. Ma, Z. Huang, A. Karpathy, A. Khosla, M. Bernstein, et al., Imagenet large scale visual recognition challenge, International Journal of Computer Vision 115 (3) (2015) 211–252. [37] E. P. Xing, A. Y. Ng, M. I. Jordan, S. J. Russell, Distance metric learning with application to clustering with side-information, in: Proceedings of Advances in Neural Information Processing Systems (NIPS), 2002, pp. 505–512. [38] W. Zheng, S. Gong, T. Xiang, Person re-identification by probabilistic relative distance comparison, in: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2011, pp. 649–656. [39] A. Mignon, F. Jurie, PCCA: A new approach for distance learning from sparse pairwise constraints, in: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2012, pp. 2666–2672. [40] H. Liu, B. Ma, L. Qin, J. Pang, C. Zhang, Q. Huang, Set-label modeling and deep metric learning on person re-identification, Neurocomputing 151 (2015) 1283–1292. [41] S. Bell, K. Bala, Learning visual similarity for product design with convolutional neural networks, ACM Transactions on Graphics 34 (4) (2015) 98. [42] H. O. Song, Y. Xiang, S. Jegelka, S. Savarese, Deep metric learning via lifted structured feature embedding, in: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2016, pp. 4004– This work was supported in part by the National Natural Science Foundation of China (61379112, 61402120, 61672547, 61472455, 61370186). The authors would like to thank Shenzhen Micro Vision Technology Co., Ltd. for providing the large-scale dataset of 100,000 fabric images for evaluation. References [1] D. G. Lowe, Distinctive image features from scale-invariant keypoints, International Journal of Computer Vision 60 (2) (2004) 91–110. [2] A. Oliva, A. Torralba, Modeling the shape of the scene: A holistic representation of the spatial envelope, International Journal of Computer Vision 42 (3) (2001) 145–175. [3] M. Douze, H. Jégou, H. Sandhawalia, L. Amsaleg, C. Schmid, Evaluation of GIST descriptors for web-scale image search, in: Proceedings of the ACM International Conference on Image and Video Retrieval, 2009, pp. 19:1–8. [4] J. Sivic, A. Zisserman, Video google: A text retrieval approach to object matching in videos, in: Proceedings of IEEE International Conference on Computer Vision (ICCV), 2003, pp. 1470–1477. [5] F. Perronnin, C. Dance, Fisher kernels on visual vocabularies for image categorization, in: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2007, pp. 1–8. [6] F. Perronnin, J. Sánchez, T. Mensink, Improving the fisher kernel for large-scale image classification, in: Proceedings of European Conference on Computer Vision (ECCV), 2010, pp. 143–156. [7] H. Jégou, M. Douze, C. Schmid, P. Pérez, Aggregating local descriptors into a compact image representation, in: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2010, pp. 3304– 3311. [8] J. Wang, Y. Song, T. Leung, C. Rosenberg, J. Wang, J. Philbin, B. Chen, Y. Wu, Learning fine-grained image similarity with deep ranking, in: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2014, pp. 1386–1393. [9] E. Hoffer, N. Ailon, Deep metric learning using triplet network, in: Proceedings of International Workshop on Similarity-Based Pattern Recognition, 2015, pp. 84–92. [10] A. Krizhevsky, I. Sutskever, G. E. Hinton, Imagenet classification with deep convolutional neural networks, in: Proceedings of Advances in Neural Information Processing Systems (NIPS), 2012, pp. 1097–1105. [11] M. D. Zeiler, R. Fergus, Visualizing and understanding convolutional networks, in: Proceedings of European Conference on Computer Vision (ECCV), 2014, pp. 818–833. [12] R. Hadsell, S. Chopra, Y. LeCun, Dimensionality reduction by learning an invariant mapping, in: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Vol. 2, 2006, pp. 1735–1742. [13] S. Chopra, R. Hadsell, Y. LeCun, Learning a similarity metric discriminatively, with application to face verification, in: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Vol. 1, IEEE, 2005, pp. 539–546. [14] F. Schroff, D. Kalenichenko, J. Philbin, Facenet: A unified embedding for face recognition and clustering, in: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2015, pp. 815–823. [15] K. Q. Weinberger, L. K. Saul, Distance metric learning for large margin nearest neighbor classification, Journal of Machine Learning Research 10 (2009) 207–244. [16] D. Nister, H. Stewenius, Scalable recognition with a vocabulary tree, in: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2006, pp. 2161–2168. [17] H. Jegou, H. Harzallah, C. Schmid, A contextual dissimilarity measure for accurate and efficient image search, in: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2007, pp. 1–8. [18] F. Fraundorfer, H. Stewénius, D. Nistér, A binning scheme for fast hard drive based image search, in: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2007, pp. 1–6. [19] H. Jegou, M. Douze, C. Schmid, Hamming embedding and weak geometric consistency for large scale image search, in: Proceedings of European Conference on Computer Vision (ECCV), 2008, pp. 304–317. 10 4012. [43] J. Hu, J. Lu, Y.-P. Tan, Discriminative deep metric learning for face verification in the wild, in: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2014, pp. 1875–1882. [44] O. Rippel, M. Paluri, P. Dollár, L. D. Bourdev, Metric learning with adaptive density discrimination, Proceedings of International Conference on Learning Representations (ICLR) (2016) 1–15. [45] R. Zhang, L. Lin, R. Zhang, W. Zuo, L. Zhang, Bit-scalable deep hashing with regularized similarity learning for image retrieval and person re-identification, IEEE Transactions on Image Processing 24 (12) (2015) 4766–4779. [46] H. Yun, P. Raman, S. Vishwanathan, Ranking via robust binary classification, in: Proceedings of Advances in Neural Information Processing Systems (NIPS), 2014, pp. 2582–2590. [47] L. Bottou, Stochastic gradient descent tricks, in: Neural Networks: Tricks of the Trade, 2012, pp. 421–436. [48] H. Jegou, M. Douze, C. Schmid, Product quantization for nearest neighbor search, IEEE Transactions on Pattern Analysis and Machine Intelligence 33 (1) (2011) 117–128. [49] J. Philbin, O. Chum, M. Isard, J. Sivic, A. Zisserman, Object retrieval with large vocabularies and fast spatial matching, in: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2007, pp. 1–8. [50] C. D. Manning, P. Raghavan, H. Schütze, Introduction to information retrieval, Cambridge University Press, Cambridge, 2008. [51] Y. Jia, E. Shelhamer, J. Donahue, S. Karayev, J. Long, R. Girshick, S. Guadarrama, T. Darrell, Caffe: Convolutional architecture for fast feature embedding, in: Proceedings of the ACM International Conference on Multimedia, 2014, pp. 675–678. [52] I. Jolliffe, Principal component analysis, Springer-Verlag, New York, 2002. 11
1cs.CV
arXiv:1504.07697v2 [cs.CC] 11 Jul 2016 POLYNOMIAL FACTORIZATION OVER FINITE FIELDS BY COMPUTING EULER-POINCARE CHARACTERISTICS OF DRINFELD MODULES ANAND KUMAR NARAYANAN [email protected] Abstract. We propose and rigorously analyze two randomized algorithms to factor univariate polynomials over finite fields using rank 2 Drinfeld modules. The first algorithm estimates the degree of an irreducible factor of a polynomial from Euler-Poincare characteristics of random Drinfeld modules. Knowledge of a factor degree allows one to rapidly extract all factors of that degree. As a consequence, the problem of factoring polynomials over finite fields in time nearly linear in the degree is reduced to finding Euler-Poincare characteristics of random Drinfeld modules with high probability. The second algorithm is a random Drinfeld module analogue of Berlekamp’s algorithm. During the course of its analysis, we prove a new bound on degree distributions in factorization patterns of polynomials over finite fields in certain short intervals. 1. Introduction 1.1. Current State of the Art. Let Fq denote the finite field with q elements and Fq [t] the polynomial ring in one indeterminate. The fastest known randomized algorithm for factorization in Fq [t] is the Kaltofen-Shoup algorithm [KS98, § 2] implemented by Kedlaya-Umans fast modular composition [KU08]. It belongs in the Cantor-Zassenhaus [CZ81] framework and to factor a polynomial of degree n takes e 3/2 log q + n log2 q) expected time by employing the following sequence of steps1. The first is square O(n free factorization where the polynomial in question is written as a product of square free polynomials. A square free polynomial is one that does not contain a square of an irreducible polynomial as a factor. The second step known as distinct degree factorization takes a monic square free polynomial and decomposes it into factors each of which is a product of irreducible polynomials of the same degree. The final step is equal degree factorization which splits a polynomial all of whose irreducible factors are of the same degree into irreducible factors. The bottleneck is distinct degree factorization and currently the difficulty appears to be in finding the factor degrees. Given the degree of a factor, one can extract all factors of e log2 q) expected time [KU08]. that degree in O(n 1.2. Polynomial Factorization and Euler-Poincare Characteristic of Drinfeld Modules. We propose a novel procedure to read off the smallest factor degree of a monic square free polynomial h ∈ Fq [t] from the Euler-Poincare characteristic χφ,h of a random rank 2 Drinfeld module φ reduced at h. The reduction of φ at h is a finite Fq [t]-module and its Euler-Poincare characteristic χφ,h ∈ Fq [t] (see Q Definition 2.1) is an Q Fq [t] valued cardinality measure. If h factors into monic irreducible factors as h = i pi , then χφ,h = i χφ,pi . A Drinfeld module analogue of Hasse’s theorem for elliptic curves, due to Gekeler [Gek91], asserts for each pi that χφ,pi = pi + cφ,i for some cφ,i ∈ Fq [t] with deg(cφ,i ) ≤ deg(pi )/2. Hence, the leading coefficients of h and χφ,h agree and the number of agreements reveals information about the degree of the smallest degree factor of h. In § 3, we prove, The author was partially supported by NSF grant CCF 1423544. 1The soft O e notation suppresses no(1) and logo(1) q terms for ease of exposition. 1 2 ANAND KUMAR NARAYANAN √ Theorem 1.1. For n ≤ q/2, the smallest factor degree of a degree n square free h ∈ Fq [t] can be inferred in O(n log q) time from χφ,h with probability at least 1/4 for a randomly chosen φ. Consider an algorithm B that takes a square free h ∈ Fq [t] and a random Drinfeld module φ as inputs such that with constant probability the output B(h, φ) is χφ,h . That is, B is a montecarlo algorithm to compute Euler-Poincare characteristics. By choosing φ at random and invoking Theorem 1.1, we establish that a non trivial factor can be found in nearly linear time with oracle access to B. e log2 q) expected time algorithm (with oracle access to B) to find an Corollary 1.2. There exists an O(n √ irreducible factor of a square free polynomial h ∈ Fq [t] of degree n ≤ q/2 with only O(1) queries to B, each of the form B(h). √ The requirement q ≥ 2n in Theorem 1.1 and Corollary 1.2 is without loss of generality since if q were √ smaller, we could choose a small power q ′ of q that satisfies q ′ ≥ 2n and obtain the factorization over Fq′ [t] with the running time unchanged up to polylogarithmic factors in n (see Remark 3.2). Given oracle access to B, obtaining the complete factorization by naively extracting one factor at a time using Corollary 1.2 leads to a 3/2 running time exponent on n. For instance, a polynomial of degree n with one irreducible factor each of degree 1, 2, 3, . . . , m − 1, m where m = Θ(n1/2 ) requires Θ(n1/2 ) extractions. In [GNU15], an algorithm to quickly obtain the complete factorization given a procedure to extract a non trivial factor as a subroutine is described. As a consequence, an algorithm for implementing B with exponent less than 3/2 would lead to a polynomial factorization algorithm with exponent less than 3/2. As an illustration, in § 3.2, we obtain the following corollary of Theorem 1.1 describing an implication of a nearly linear time algorithm for computing Euler-Poincare characteristic of random Drinfeld modules. e logO(1) q) expected time for Corollary 1.3. An implementation of the oracle function B that takes O(n O(1) 4/3 e inputs of degree n yields an O(n log q) expected time polynomial factorization algorithm. We describe our first complete polynomial factorization algorithm by presenting an implementation of B. Assuming the matrix multiplication exponent ω is 2, our implementation of B and hence the polynomial factorization algorithm both have running time exponent 3/2 in the input degree. A faster implementation of B would break the 3/2 exponent barrier in polynomial factorization. Thus, the problem of computing Euler-Poincare characteristics of random Drinfeld modules warrants a thorough investigation. The problem is analogous to point counting on elliptic curves over finite fields and the question as to if there is a Drinfeld module analogue of Schoof’s algorithm [Sch95] is immediate. We next briefly sketch our implementation of B. The obvious procedure to compute χφ,h for a given a square free h ∈ A and a rank 2 Drinfeld module φ, is to compute the characteristic polynomial of the (Fq linear) φ action on Fq [t]/(h). However, the complexity of such generic linear algebraic techniques is equivalent to inverting square matrices of dimension deg(h). We devise a faster implementation of B by exploiting the fact that the input φ to B is chosen at random. For q ≥ 2 deg(h)4 , which we may assume without loss of generality, we prove it is likely that the reduction of a random φ at h is a cyclic Fq [t]module and further that χφ,h coincides with the order (that is, the monic generator of the annihilator) of a random element in φ reduced at h. Implementing B is thus reduced to the finding the order of a random element in a random Drinfeld module φ reduced at h with constant probability. In § 3.1, we solve the order finding problem by posing it as an instance of the automorphism projection problem of e (1+ω)/2 log q + n log2 q) expected time algorithm to find Kaltofen-Shoup [KS98] and thereby obtain an O(n a factor. In § 3.2, we describe how to obtain the complete factorization. POLYNOMIAL FACTORIZATION AND EULER-POINCARE CHARACTERISTICS OF DRINFELD MODULES 3 1.3. Drinfeld Module Analog of Berlekemp’s Algorithm. Our second algorithm is a randomized Drinfeld analogue of Berlekamp’s algorithm [Ber67] wherein Fq [t]-modules twisted by the Frobenius action is replaced with reductions of random rank-2 Drinfeld modules. It has the distinction of being the only polynomial factorization algorithm over finite fields that does not involve a quadratic residuosity like map. To factor h ∈ Fq [t], Berlekamp’s algorithm proceeds by finding a basis for the Berlekamp subalgebra, which is the fixed space of the q th power Frobenius τ acting on Fq [t]/(h). Then (as in the Cantor-Zassenhaus [CZ81] variant) a random element β in the Berlekamp subalgebra is generated by taking a random Fq linear combination of the basis elements. When q is odd, with probability at least half, the greatest common divisor of h and a lift of β (q−1)/2 − 1 is a non trivial factor of h. In place of the Fq [t]-module Fq [t]/(h) and its Berlekamp subalgebra (which is the τ − 1 torsion in Fq [t]/(h)), our second algorithm works over a random Drinfeld module reduced at h and its torsion corresponding to low degree polynomials in the Drinfeld action. These low degree polynomials are precisely the low degree factors of χφ,h . In terms of implementation, the algorithm closely resembles the fast black-box algorithm e (1+ω)/2+o(1) log q + n log2 q) expected running time. of Kaltofen-Shoup [KS98, § 3] and shares its O(n Our analysis of the Drinfeld analogue of Berlekamp’s algorithm relies on bounds on the degree distribution of factorization patterns of polynomials in short intervals in Fq [t]. We prove the required bounds, but only when q is very large compared to n. When q is not large enough, the claimed running times hold under a widely believed conjecture (see Conjecture 4.2) and a slower running time bound is proven unconditionally (see Remark 5.3). We next state the bounds for large q since they might be of independent interest. 1.4. Factorization Patterns of Polynomials in Short Intervals. For a partition λ of a positive integer d, let P (λ) denote the fraction of permutations on d letters whose cycle decompositions correspond to λ. When q is large enough compared to d, a random polynomial in Fq [t] of degree d has a factorization pattern corresponding to a partition λ of d with probability about P (λ) [Coh]. In § 4, we prove that the degree distribution of a random polynomial in the interval If,m := {f + a|a ∈ Fq [t], deg(a) ≤ m} around f ∈ Fq [t] is not far from the degree distribution of a random polynomial of degree d. Theorem 1.4. For every f ∈ Fq [t] of degree d bounded by log q ≥ 3d log d, for every m ≥ 2 and for every partition λ of d,     |{g ∈ If,m |λg = λ}| 1 1 P (λ) ≤ ≤ 1+ √ 1− √ P (λ) q |If,m | q where λg denotes the partition of deg(g) induced by the degrees of the irreducible factors of g. 1.5. Related Work. Our algorithms draw inspiration from Lenstra’s elliptic curve integer factorization [Len87] where the role of multiplicative groups modulo primes in Pollard’s p − 1 algorithm [Pol74] was recast with the group of rational points on random Elliptic curves modulo primes. Our first algorithm for degree estimation using Euler-Poincare characteristic is a random Drinfeld module analogue of an algorithm described in the author’s Ph.D thesis [Nar14, Chap 7] using Carlitz modules. To our knowledge, the use of Drinfeld modules to factor polynomials over finite fields originated with Panchishkin and Potemine [PP89] whose algorithm was rediscovered by van der Heiden [vdH04] (see also [vdH04-1]). Our Drinfeld module analogue of Berlekamp’s algorithm shares some similarities with the algorithm in [vdH04] but they differ in the following aspects. In contrast to our algorithm, the algorithm in [vdH04] only works for equal degree factorization and targets torsion corresponding to large degree polynomials to aid in the splitting; resulting in a slower running time. Further, its analysis was merely supported by heuristics. Using Theorem 1.4 and Lemma 2.3, the proof of Lemma 5.2 can be extended to rigorously analyze the algorithm in [vdH04] for large q when restricted to rank 2 Drinfeld modules. 4 ANAND KUMAR NARAYANAN 1.6. Organization. The analysis of our algorithms rely critically on the distribution of the characteristic polynomial (of the Frobenius endomorphism in the representation of the endomorphism ring) of a random rank 2 Drinfeld module (on its ℓ-adic Tate modules). In § 2, we prove Lemma 2.3, the required equidistribution lemma on the aforementioned characteristic polynomial. We begin § 2 by recounting the theory of rank 2 Drinfeld modules followed by § 2.1, where the structure of rank 2 Drinfeld modules in terms of its characteristic polynomial is described. In § 2.2, we state a weighted class number formula for isomorphism classes of Drinfeld modules with a given characteristic polynomial (due to Gekeler [Gek08]) and from it derive Lemma 2.3. Gekeler’s weighted class number formula is obtained through complex multiplication theory, that is, a correspondence between isomorphism classes of Drinfeld modules and Gauss class numbers in certain imaginary quadratic orders. While they hold in even characteristic, for ease of exposition, we assume in § 2.2 and consequently in the analysis of our algorithms that q is odd. In § 3, we state and analyze our first algorithm, namely to estimate factor degrees by computing EulerPoincare characteristic and prove Theorem 1.1 and Corollaries 1.2 and 1.3. Theorem 1.4 concerning factorization patterns of polynomials in short intervals is proven in § 4, which can be read independent of the rest of the paper. The Drinfeld analogue of Berlekamp’s algorithm is described and analyzed in § 5. A remarkable feature of our algorithms andQreductions is that we address the factorization of a square Q free h = i pi ∈ Fq [t] by looking at χφ,h = i χφ,pi for random φ. We may view χφ,h as a perturbation of h, since χφ,pi is the irreducible factor pi of h perturbed within a half degree (of pi ) interval. These intervals widen with Drinfeld modules of increasing rank. Theorem 1.4 and Lemma 2.3 together imply that even for rank 2, the intervals are large enough for χφ,pi to exhibit random factorization patterns. This allowed us to pose the worst case complexity of polynomial factorization in terms of an average complexity statement (Corollary 1.3) concerning Drinfeld modules. It would be interesting to see if this perturbation leads to worst case to average case reductions for other multiplicative problems. 2. Finite Rank-2 Drinfeld Modules Let A = Fq [t] denote the polynomial ring in the indeterminate t and let K be a field with a non zero ring homomorphism γ : A → K. Necessarily, K contains Fq as a subfield. Fix an algebraic closure K̄ of K and let τ : K̄ −→ K̄ denote the q th power Frobenius endomorphism. The ring of endomorphisms of the additive group scheme Ga over K can be identified with the skew polynomial ring Khτ i where τ satisfies the commutation rule ∀u ∈ K, τ u = uq τ . A rank-2 Drinfeld module over K is (the A-module structure on Ga given by) a ring homomorphism φ : A −→ Khτ i t 7−→ γ(t) + gφ τ + ∆φ τ 2 for some gφ ∈ K and ∆φ ∈ K × . For a ∈ A, let φa denote the image of a under φ. We will concern ourselves primarily with rank 2 Drinfeld modules and unless otherwise noted, a Drinfeld module will mean a rank 2 Drinfeld module. To every A-algebra L over K̄, the Drinfeld module φ endows a new A-module structure (which, we denote by φ(L)) through the A-action ∀f ∈ L, ∀a ∈ A, a ∗ f = φa (f ). For every A-algebra homomorphism ρ : L −→ L, ∀a ∈ A and ∀f ∈ L, ρ(φ(f )) = φ(ρ(f )). Thus ρ, when thought of as a map from φ(L) −→ φ(L), is an A-module homomorphism. For every direct product L × L′ of A-algebras over K̄, we hence have the corresponding direct sum of A-modules ∼ φ(L) ⊕ φ(L′ ). φ(L × L′ ) = POLYNOMIAL FACTORIZATION AND EULER-POINCARE CHARACTERISTICS OF DRINFELD MODULES 5 Henceforth, we restrict our attention to Drinfeld modules φ : A −→ Fq (t) over Fq (t) (with γ : A → Fq (t) being the inclusion (identity map), gφ ∈ A and ∆φ ∈ A× ) and their reductions. For a proper ideal f ⊂ A, let Ff denote A/f. For a prime ideal p ⊂ A, if ∆φ is non zero modulo p, then the reduction φ/p := φ ⊗ Fp of φ at p is defined through the ring homomorphism φ/p : A −→ Fp hτ i t 7−→ t + (gφ mod p)τ + (∆φ mod p)τ 2 and the image of a ∈ A under φ/p is denoted by (φ/p)a . Even if ∆φ is zero modulo p, one can still obtain the reduction (φ/p) of φ at p through minimal models of φ (c.f. [Gek91]). We refrain from addressing this case since our algorithms do not require it. As before, the Drinfeld module φ/p endows a new A-module structure (denoted by (φ/p)(L)) to every A-algebra L over the algebraic closure of Fp through the A-action ∀f ∈ L, ∀a ∈ A, a ∗ f = (φ/p)a (f ) ′ and for every direct product L × L of A-algebras over the algebraic closure of Fp , (φ/p)(L × L′ ) ∼ = (φ/p)(L) ⊕ (φ/p)(L′ ). Further, for every A-algebra L over the algebraic closure of Fp , φ(L) ∼ = (φ/p)(L). Define the annihilator Ann(L) of a finite A-module L to be the monic generator of the annihilator ideal {a ∈ A|aL = 0} of L. Define the A-order Ord(α) of an element α in a finite A-module L to be the monic generator of the annihilator ideal {a ∈ A|aα = 0} of α. For f ∈ A, denote by (f ) the ideal generated by f and by deg(f ) the degree of f . For a non zero ideal f ⊂ A, let deg(f) denote the degree of its monic generator. For f, g ∈ A, by gcd(f, g) we mean the monic generator of the ideal generated by f and g. Definition 2.1. Following [Gek91], the Euler-Poincare characteristic of a finite A-module L is defined as the unique monic polynomial χ(L) ∈ A such that (1) If L ∼ = A/p for a prime ideal p ⊆ A, then (χ(L)) = p, (2) If 0 → L1 → L → L2 → 0 is exact, then χ(L) = χ(L1 )χ(L2 ). The above definition is a minor departure from [Gek91], where χ(L) was defined as an ideal, not a monic generator. For a non zero ideal f ⊂ A and a Drinfeld module φ, let χφ,f denote χ(φ(Ff )). By definition, Ann(φ(Ff )) divides χφ,f. 2.1. Frobenius Distributions and the Structure of Rank 2 Drinfeld Modules. In this subsection, we recount the characterization of the A-module structure of reductions of Drinfeld modules at primes due to Gekeler. Unless stated otherwise, proofs of claims made here are in [Gek91]. For Drinfeld modules φ, ψ with reduction at a prime p ⊂ A, a µ ∈ Fp hτ i such that ∀a ∈ A, µ(φ/p)a = (ψ/p)a µ is called as a morphism from φ/p to ψ/p. Let EndFp (φ) denote the endomorphism ring of φ/p. The Frobenius at p, τ deg(p) is in EndFp (φ) and there exists a polynomial Pφ,p (X) = X 2 − aφ,p X + bφ,p ∈ A[X] (called the characteristic polynomial of the Frobenius at p) such that Pφ,p (τ deg(p) ) = 0 in EndFp (φ). The polynomial Pφ,p is called as the characteristic polynomial because it is the characteristic polynomial of 6 ANAND KUMAR NARAYANAN τ deg(p) in the representations of EndFp (φ) on the ℓ-adic Tate modules for prime ideals ℓ ⊂ A. Furthermore, a rank-2 Drinfeld module analogue of Hasse’s theorem for elliptic curves states that (bφ,p ) = p , deg(aφ,p ) ≤ deg(p)/2. To be precise, the coefficient bφ,p = ǫφ,p p where p is the monic generator of p and ǫφ,p = 1/((−1)deg p NFp /Fq (∆φ )) ∈ F× q where NFp /Fq is the norm from Fp to Fq . As in the elliptic curve case, aφ,p is referred to as the Frobenius trace; a consequence of the aforementioned connection to Tate modules. Since τ deg(p) acts as the identity on φ(Fp ), Pφ,p (1) kills φ(Fp ) (that is, (φ/p)Pφ,p (1) is the zero element in EndFp (φ)). In fact, (χφ,p ) = (Pφ,p (1)) ⇒ χφ,p = p − (aφ,p − 1)/ǫφ,p. As a consequence of φ being of rank 2, φ(Fp ) is either a cyclic A-module or a direct sum of two cyclic A-modules. That is, there exists monic polynomials mφ,p , nφ,p ∈ A (not necessarily relatively prime) such that as A-modules φ(Fp ) ∼ = A/(mφ,p ) ⊕ A/(mφ,p nφ,p ). In particular, χφ,p = p − (aφ,p − 1)/ǫφ,p = m2φ,p nφ,p , Ann(φ(Fp )) = lcm(mφ,p , mφ,p nφ,p ) = mφ,p nφ,p . Further still, when q is odd, mφ,p and nφ,p are completely determined by Pφ,p and a precise characterization of mφ,p and nφ,p in terms of aφ,p and ǫφ,p is described by Cojocaru and Papikian [CP14, Cor3]. Seeing that the characteristic polynomial completely determines the A-module structure of a Drinfeld module reduced at a prime p, the question as to which polynomials can arise as such characteristic polynomials is immediate and is addressed in [Dri77], [Gek91] and [Yu95]. Yu [Yu95] relates the number of isomorphism classes of Drinfeld modules (φ/p) with a given characteristic polynomial X 2 − aX + ǫp to class numbers of orders in imaginary quadratic extensions over K. This relation arises from a theory that bears likeness to the complex multiplication theory of elliptic curves. Gekeler [Gek08] using the complex multiplication theory proved a precise characterization of the number of isomorphism classes of Drinfeld modules (φ/p) with a given characteristic polynomial X 2 − aX + ǫp. Gekeler’s characterization implies a certain equidistribution of the probability of X 2 − aX + ǫp being Pφ,p for a randomly chosen φ and is discussed in the subsequent subsection. 2.2. Frobenius Distributions of Rank 2 Drinfeld Modules. Let p ⊂ A be a prime of degree d and let p be its monic generator. Analysis of our algorithms will involve counting Drinfeld modules (φ/p) with characteristic polynomial Pφ,p (X) = X 2 − aX + ǫp for a given ǫ ∈ F× q and a ∈ A of degree at most d/2. Such precise counts were proven by Gekeler [Gek08] by building on the connection between isomorphism classes of Drinfeld modules over Fp and class numbers of imaginary quadratic orders established by Yu [Yu95]. We begin the section by stating the result of Gekeler in equation 2.1 and later prove lemmas that will find use in the analysis of our algorithms. We identify a Drinfeld module (φ/p) with the tuple (gφ mod p, ∆φ mod p). The number of Drinfeld × modules (φ/p) is |Fp ||F× p | since we get to pick gφ mod p from Fp and ∆φ mod p from Fp . Two Drinfeld × modules (φ/p) and (ψ/p) are isomorphic over Fp if and only if there is a c ∈ Fp such that gψ = cq−1 gφ 2 mod p and ∆ψ = cq −1 ∆φ mod p. As a consequence, the automorphism group AutFp (φ) depends on if gφ mod p = 0. If gφ mod p = 0 and POLYNOMIAL FACTORIZATION AND EULER-POINCARE CHARACTERISTICS OF DRINFELD MODULES 7 ∼ F×2 . Else, AutF (φ) ∼ if further Fp contains a quadratic extension (call Fq2 ) of Fq , then AutFp (φ) = = F× p q . q × ∼ The former case AutFp (φ) = Fq2 corresponds to φ having complex multiplication by Fq2 [t] and is rare. For ǫ ∈ F× q and a ∈ A not necessarily monic and of degree at most deg(p)/2, denote by H(a, ǫ, p) a set of representatives of isomorphism classes of Drinfeld modules (φ/p) with Pφ,p (X) = X 2 − aX + ǫp. Define X q−1 h∗ (a, ǫ, p) := #AutFp (φ) (φ/p)∈H(a,ǫ,p) which might be thought of as a weighted count of the isomorphism classes of Drinfeld modules with Pφ,p (X) = X 2 − aX + ǫp where the weight (q − 1)/AutFp (φ) is 1 except in rare cases. We next describe the connection between class numbers of certain imaginary quadratic orders and h∗ (a, ǫ, p). Fix an ǫ ∈ F× q and an a ∈ A of degree at most deg(p)/2. Let C be the A-algebra generated by a root of X 2 − aX + ǫp and let E be the quotient field of C. It turns out that E is an imaginary quadratic extension of k. Yu [Yu95] proved that two Drinfeld modules are isogenous if and only if they have the same characteristic polynomial and further established that the number of isomorphism classes of Drinfeld modules with characteristic polynomial X 2 − aX + ǫp equals the Gauss class number of C. This connection is analogous to a similar statement concerning elliptic curves due to Deuring [Deu41]. Further, the weighted count h∗ (a, ǫ, p) equals a certain appropriately weighted Gauss class number of C which was explicitly computed by Gekeler [Gek08] using an analytic class number formula. We next summarize this result of Gekeler assuming for ease of exposition that Fq is of odd characteristic throughout this section. Let B be the integral closure of A in E. Let D denote the discriminant a2 − 4ǫp and f the largest monic square factor of D. Let D0 = D/f . Then C = A + f B. Let ξ denote the Dirichlet character associated with E and for ℜ(s) > 1 define the L-function Y −1 L(s, χ) := . 1 − ξ(ℓ)|ℓ|−s ℓ prime of k The unique prime at infinity ∞ is ramified in E/k if deg(D0 ) is odd and is inert if deg(D0 ) is even. Let η denote the ramification index of ∞ in E/k (that is, η = 2 if deg(D0 ) is odd and η = 1 otherwise). Let g denote the genus of the algebraic curve associated with E. Then h∗ (a, ǫ, p) = ηq g S(f )L(1, ξ) where S(f ) := X f′ |f |Ff′ | Y (1 − ξ(ℓ)|Fℓ |−1 ). ℓ|f′ Here f ⊆ A is the ideal generated by f , the summation is over proper ideals f′ dividing f and the product is over prime ideals ℓ dividing f′ . When f is not A, we have The conductor cond(ξ) of ξ is S(f ) ≥ |Ff |. ( (D0 ) if deg(D0 ) is even cond(ξ) = (D0 ).∞ if deg(D0 ) is odd 8 ANAND KUMAR NARAYANAN But for a couple of exceptional cases, the genus g is determined by cond(ξ) as g = deg(cond(ξ))/2 − 1. The inequality 2.1 we arrive at for h∗ (a, ǫ, p) will be accurate in those exceptional cases as well. Thus we refrain from mentioning the exceptional cases referring instead the interested reader to [Gek08]. Thus ( q deg(D0 )/2−1 if deg(D0 ) is even qg = q deg(D0 )/2−1/2 if deg(D0 ) is odd and ( |Ff |q g = q deg(D)/2−1 q deg(D)/2−1/2 if deg(D) is even if deg(D) is odd. In summary, (2.1) ∗ h (a, ǫ, p) ≥ ( 1 deg(D)/2 L(1, ξ) qq √2 q deg(D)/2 L(1, ξ) q if deg(D) is even if deg(D) is odd Lemma 2.2. Let p ⊂ A be a prime ideal and p its monic generator. For every S ⊆ {(a, ǫ) ∈ A × 2 F× q | deg(a − 4ǫp) = deg(p)}, ( p X √ if deg(p) is even |S| |Fp |(1 − deg(p) q )/q ∗ p h (a, ǫ, p) ≥ deg(p) √ 2|S| |Fp |(1 − √q )/ q if deg(p) is odd. (a,ǫ)∈S Proof. We first lower bound L(1, ξ) for a ξ corresponding to an arbitrary (a, ǫ). Y −1 1 L(1, ξ) = 1 − ξ(ℓ)|ℓ|−1 − (1 − ξ(∞)|∞| 1) ℓ prime of A ≥ Y ℓ prime of A 1 − ξ(ℓ)|ℓ|−1 −1 since ξ(∞) ∈ {0, 1} and |∞| = q. From Weil’s proof of the Riemann hypothesis for curves over finite √ fields, there exists wi ∈ C with |wi | = q such that Y ℓ prime of A 1 − ξ(ℓ)|ℓ| Since deg(cond(ξ)) − 1 ≤ deg(p), deg(cond(ξ))−1  Y i=1 1− wi q  −1 −1  ≥ = deg(cond(ξ))−1  Y i=1 wi 1− q  .  deg(p) 1 deg p 1− √ ≥1− √ . q q For all (a, ǫ) ∈ S, since deg(a2 − 4ǫp) = deg(p), inequality 2.1 implies ( p X √ |S| |Fp |(1 − deg(p) if deg(p) is even q )/q ∗ p h (a, ǫ, p) ≥ deg(p) √ √ 2|S| |Fp |(1 − q )/ q if deg(p) is odd. (a,ǫ)∈S  POLYNOMIAL FACTORIZATION AND EULER-POINCARE CHARACTERISTICS OF DRINFELD MODULES 9 Lemma 2.3. Let p ⊂ A be a prime ideal and p its monic generator. For every S ⊆ {(a, ǫ) ∈ A × 2 F× q | deg(a − 4ǫp) = deg(p)}, the number of Drinfeld modules (φ/p) over Fp with (aφ,p , ǫφ,p ) ∈ S is lower bounded by ( × p √ if deg(p) is even |Fp ||S| |Fp |(1 − deg(p) q )/(q(q − 1)) p |{(φ/p)|(aφ,p , ǫφ,p ) ∈ S}| ≥ √ deg(p) × √ 2|Fp ||S| |Fp |(1 − q )/( q(q − 1)) if deg(p) is odd. 2 Proof. Fix an S ⊆ {(a, ǫ) ∈ A × F× q | deg(a − 4ǫp) = deg(p)}. |{(φ/p)|(aφ,p , ǫφ,p ) ∈ S}| = = X X (a,ǫ)∈S (φ/p)∈H(a,ǫ,p) |F× p| AutFp (φ) X |F× p| h∗ (a, ǫ, p). q−1 (a,ǫ)∈S Applying Lemma 2.2, we get |{(φ/p)|(aφ,p , ǫφ,p ) ∈ S}| ≥ ( p deg(p) |F× if deg(p) is even p ||S| |Fp |(1 − √q )/(q(q − 1)) p √ deg(p) × 2|Fp ||S| |Fp |(1 − √q )/( q(q − 1)) if deg(p) is odd.  3. Degree Estimation and Euler-Poincare Characteristic of Drinfeld Modules Q Henceforth, let h ∈ A denote the monic square free reducible polynomial whose factorization h =Q i pi into monic irreducible polynomials pi ∈ A we seek. By the chinese reminder theorem, Fh = i Fpi where h and pi s are the principal ideals generated by h and the pi s respectively. We next present a novel algorithm to compute the degree (call sh ) of the smallest degree factor of h using Drinfeld modules. For a Drinfeld module φ that has reduction at each prime dividing h, Y Y M M (pi − (aφ,pi − 1)/ǫφ,pi ) . χφ,pi = (φ/pi )(Fpi ) ⇒ χφ,h = φ(Fpi ) ∼ φ(Fh ) ∼ = = i i i i Since ∀i, deg((aφ,pi − 1)/ǫφ,pi ) ≤ deg(pi )/2, χφ,h = h + terms of smaller degree. In fact, h − χφ,h = X i:deg(pi )=sh   Y − 1 a  φ,pi pj  + (terms of degree < (deg(h) − ⌈sh /2⌉)) ǫφ,pi j6=i ⇒ deg(h − χφ,h ) ≤ deg(h) − ⌈sh /2⌉. When φ is chosen at random, the equidistribution theorem of Gekeler suggests, with high probability,    Y X − 1 a φ,p i  pj  = deg(h) − ⌈sh /2⌉ ⇒ deg(h − χφ,h ) = deg(h) − ⌈sh /2⌉ deg  ǫφ,pi i:deg(pi )=sh j6=i leading to the following algorithm to compute sh . Algorithm 3.1. Input : Monic square free reducible polynomial h ∈ A of degree n. 10 ANAND KUMAR NARAYANAN (1) Choose a Drinfeld module φ by picking gφ ∈ A and ∆φ ∈ A× each of degree less than deg(h) independently and uniformly at random. (2) If gcd(∆φ , h) 6= 1, output it as a factor. Else φ has reduction at primes dividing h and we proceed. (3) Compute χφ,h . (4) Output: n − deg(h − χφ,h ). The running time of the algorithm is dominated by step (3). One way to compute χφ,h is as the characteristic polynomial of φt viewed as a linear transformation on Fh . Computing characteristic polynomials of linear transformations over finite fields can be performed in polynomial time [Sto01]. The output is at least ⌈sh /2⌉. We prove in the ensuing lemma that when q is large enough compared to n, the output is ⌈sh /2⌉ with probability at least 1/4. We are thus ensured of finding ⌈sh /2⌉ with probability 1 − δ with only O(log(1/δ)) repetitions of the algorithm. From ⌈sh /2⌉, we infer that sh is s either 2⌈sh /2⌉ − 1 or 2⌈sh /2⌉. We can test which one is correct by checking if gcd(tq h − t, h) is non trivial and further extract the product of factors of degree sh . Remark 3.2. In the analysis of our algorithms, we may assume without loss of generality that q ≥ c1 nc2 for some absolute positive constants c1 and c2 . If q were smaller, we could choose the smallest prime c that satisfies q c ≥ c1 nc2 and obtain the factorization in Fqc [t] with the running time unchanged up to polylogarithmic factors in n. Factors of h irreducible over Fq and of degree prime to c remain irreducible over Fqc . Factors of h that are irreducible over Fq of degree (say d) divisible by c will split into c c c distinct Q irreducible factors over Fq . From the factorization over Fq thus obtained, express h as h = Q h where h ∈ F [t] are irreducible factors that remained irreducible over Fqc and hd ∈ Fqc [t] h d i q i d i is the product of all irreducible factors of h in Fqc [t] (but not in Fq [t]) of degree d/c. In fact, hd is the product of all Fq [t] irreducible factors of h of degree d and hence hd ∈ Fq [t]. We may perform equal degree factorization on hd to obtain all Fq [t] irreducible degree d factors of h. Since c is bounded by an absolute constant, the post processing steps after obtaining the factorization over Fqc take at most O(n1+o(1) (log q)1+o(1) + n(log q)2+o(1) ) expected time. √ Lemma 3.3. If q is odd and q ≥ 2n, algorithm 3.1 outputs ⌈sh /2⌉ with probability at least 1/4. Proof. For the output deg(h) − deg(h − χφ,h ) of algorithm 3.1 to be ⌈sh /2⌉, it suffices for    Y X − 1 a  φ,pi pj  = deg(h) − ⌈sh /2⌉ deg  ǫφ,pi i:deg(pi )=sh j6=i to hold. Since pi are all monic, this is equivalent to X aφ,pi ,⌊sh /2⌋ (3.1) 6= 0 ǫφ,pi i:deg(pi )=sh where aφ,pi ,⌊sh /2⌋ ∈ Fq denotes the coefficient of the t⌊sh /2⌋ term in aφ,pi . Fix a factor pj of h of degree sh . Since gφ ∈ A and ∆φ ∈ A× are each chosen of degree less than deg(h) independently and uniformly at random (with gcd(∆φ , h) =Q 1), by the chinese remainder theorem, the tuple {(gφ mod pi , ∆φ mod pi )}i is distributed uniformly in i (Fpi × F× pi ). POLYNOMIAL FACTORIZATION AND EULER-POINCARE CHARACTERISTICS OF DRINFELD MODULES 11 In particular, ∀i 6= j, (aφ,pi , ǫφ,pi ) and (aφ,pj , ǫφ,pj ) are independent and         X X X aφ,pj ,⌊sh /2⌋ aφ,pi ,⌊sh /2⌋ aφ,pi ,⌊sh /2⌋ P r  6= 0 = = −θ P r 6= θ  Pr  ǫφ,pi ǫφ,pi ǫφ,pj θ∈Fq i:deg(pi )=sh  ⇒ Pr  (3.2) Fix a θ ∈ Fq and let X i:deg(pi )=sh i:deg(pi )=sh ,i6=j  aφ,pi ,⌊sh /2⌋ 6= 0 ≥ min P r θ∈Fq ǫφ,pi   aφ,pj ,⌊sh /2⌋ 6= θ . ǫφ,pj 2 Sθ := {(a, ǫ) ∈ A × F× q | deg(a − 4ǫpj ) = deg(pj ), a⌊sh /2⌋ /ǫ 6= θ} where a⌊sh /2⌋ ∈ Fq denotes the coefficient of the t⌊sh /2⌋ term in a. We next count elements in Sθ to lower bound its size. The condition deg(a2 −4ǫpj ) = deg(pj ) implies that we are only allowed to pick a ∈ A of degree at most deg(pj )/2. If deg(pj ) is odd, deg(a2 − 4ǫpj ) = deg(pj ) is always satisfied for every a ∈ A of degree at most deg(pj )/2. To pick an element in Sθ , but for the coefficient a⌊sh /2⌋ , we may choose the coefficients of a ∈ A arbitrarily of degree at most deg(pj )/2 and 2 arbitrarily choose ǫ ∈ F× q . For each such choice, to satisfy deg(a − 4ǫpj ) = deg(pj ) and a⌊sh /2⌋ /ǫ 6= θ, we need to exclude at most two choices for a⌊sh /2⌋ if deg(pj ) is even and at most one choice if deg(pj ) is odd. Thus ( p (q − 2) |Fpj |q if deg(pj ) is even p |Sθ | ≥ √ (q − 1) |Fpj | q if deg(pj ) is odd. Applying Lemma 2.3 for Sθ , we get Thus, for √    1 deg(pj ) 1− |Fpj ||F× {(φ/pj )|(aφ,pj , ǫφ,pj ) ∈ Sθ } ≥ 1 − √ pj |. q q−1 q ≥ 2 deg(h) ≥ 2 deg(pj ),      aφ,pj ,⌊sh /2⌋ 1 1 deg(pj ) 1− ≥ 6= θ ≥ 1 − √ Pr ǫφ,pj q q−1 4 and by equation 3.2 the lemma follows.  Proof of Theorem 1.1 and Corollary 1.2: Theorem 1.1 follows from the proof of correctness (Lemma 3.3) of Algorithm 3.1. Corollary 1.2 follows by considering lines one and three in algorithm 3.1 to be performed by the black box B in Corollary 1.2. The case gcd(∆φ , h) 6= 1 for a random φ is unlikely to happen and hence step 2 of algorithm 3.1 may be ignored in the reduction. When q is large enough (say q ≥ 2 deg(h)4 ), it is likely for a randomly chosen φ that φ(Fh ) is a cyclic A-module. Further, for a random α ∈ φ(Fh ), it is likely that Ord(α) = Ann(φ(Fh )). Since φ(Fh ) being cyclic implies χφ,h = Ann(φ(Fh )), it is likely that Ord(α) = χφ,h . Thus, instead of computing χφ,h in Algorithm 3.1, we could compute Ord(α) for a random α ∈ φ(Fh ) and be assured that the output deg(h) − deg(h − Ord(α)) likely is ⌈sh /2⌉. Algorithm 3.4. Input : Monic square free reducible polynomial h ∈ A of degree n. (1) Choose a Drinfeld module φ by picking gφ ∈ A and ∆φ ∈ A× each of degree less than deg(h) independently and uniformly at random. 12 ANAND KUMAR NARAYANAN (2) If gcd(∆φ , h) 6= 1, output it as a factor. Else φ has reduction at primes dividing h and we proceed. (3) Choose α ∈ φ(Fh ) at random and compute Ord(α) with constant probability. (4) If deg(Ord(α)) = deg(h), Output: n − deg(h − Ord(α)). Every step except for (3) can be performed in O(n log q) time. In § 3.1, we show that the order of an element in φ(Fh ) (and hence step (3)) can be computed with probability arbitrarily close to 1 in O(n(1+ω)/2 + o(1)(log q)1+o(1) + n1+o(1) (log q)2+o(1) ) expected time. In the subsequent lemma, we prove a lower bound on the probability that reductions of Drinfeld modules are cyclic and use it in Theorem 3.6 to prove that Algorithm 3.4 outputs sh with constant probability. Consequently, we have an O(n(1+ω)/2 + o(1)(log q)1+o(1) + n1+o(1) (log q)2+o(1) ) expected time algorithm to extract a non trivial factor. Lemma 3.5. For odd q, for everyprime ideal p ⊂ A, the probability that φ(Fp ) is a cyclic A-module for a randomly chosen φ/p is at least 1 − deg(p)+1/2 . 2(q−1) Proof. Let p ⊂ A be a prime ideal and p its monic generator. Cojocaru and Papikian [CP14, Cor 3] determined the following precise characterization of the A-module structure of finite Drinfeld modules when Fq is of odd characteristic. For a Drinfeld module φ with reduction at p, let fφ,p ∈ A denote the largest monic square factor of the discriminant a2φ,p − 4ǫφ,p p of Pφ,p . As A-modules φ(Fp ) ∼ = A/(mφ,p ) ⊕ A/(mφ,p nφ,p ) where mφ,p = gcd(fφ,p , aφ,p − 2). In particular, φ(Fp ) is A-cyclic if and only if gcd(fφ,p , aφ,p − 2) = 1. Let 2 2 Sp := {(a, ǫ) ∈ A × F× q | deg(a − 4ǫp) = deg(p), gcd(a − 4ǫp, a − 2) = 1}. We next estimate the size of Sp . An element in Sp can be chosen as follows. Pick a ∈ A arbitrarily of degree at most deg(p)/2. For such a chosen a, to satisfy gcd(a2 − 4ǫp, a − 2) = 1, pick ǫ such that for all monic irreducible polynomials ℓ dividing a − 2, a2 − 4ǫp 6= 0 mod ℓ. For a fixed monic irreducible 2 ℓ dividing a − 2, there is at most one ǫ ∈ F× q such that a − 4ǫp = 0 mod ℓ for if there were two, then that would imply ℓ divides p which contradicts the fact that p is irreducible and of degree higher than ℓ. Thus, for a chosen a, to ensure a2 − 4ǫp and a − 2 are relatively prime, we need to exclude at most deg(p)/2 values for ǫ. When deg(p) is even, for a chosen a, to ensure deg(a2 − 4ǫp) = deg(p), we need to exclude at most one choice for ǫ. ( p if deg(p) is even (q − 2 − deg(p)/2) |Fpj |q p ⇒ |Sp | ≥ √ (q − 1 − deg(p)/2) |Fpj | q if deg(p) is odd. Applying Lemma 2.3 for Sp , we get   deg(p) + 1/2 |Fp ||F× 1− p |. 2(q − 1)   Thus φ(Fp ) is A-cyclic with probability at least 1 − deg(p)+1/2 . 2(q−1) |{(φ/p)|(aφ,p , ǫφ,p ) ∈ Sp }| ≥  Theorem 3.6. There exists a positive constant c such that for q odd and at least 2n4 , algorithm 3.4 outputs ⌈sh /2⌉ with probability at least c. Proof. Assume q is odd and q ≥ 2n4 . For a choice of α and φ made in algorithm 3.4, if the following three conditions hold, then clearly the output is ⌈sh /2⌉. • Ord(α) = Ann(φ(Fh )), • Ann(φ(Fh )) = χφ,h , POLYNOMIAL FACTORIZATION AND EULER-POINCARE CHARACTERISTICS OF DRINFELD MODULES 13 • deg(h) − deg(h − χφ,h ) = ⌈sh /2⌉. For a fixed φ and a random α ∈ φ(Fh ), from the A-module decomposition of φ(Fh ) into invariant factors, we infer that Ord(α) = Ann(φ(Fh )) with probability at least 1 |{a ∈ A| deg(a) < deg(Ann(φ(Fh ))), gcd(a, Ann(φ(Fh ))) = 1}| ≥ (1 − 1/q)deg(h) ≥ 1 − deg(h)/q ≥ . 2 q deg(Ann(φ(Fh ))) The last inequality is a consequence of q ≥ 2 deg(h)4 . If φ(Fh ) is a cyclic A-module, then by definition χφ,h = Ann(φ(Fh )). Hence, to claim the theorem, it suffices to prove that for a Drinfeld module φ chosen at random as in algorithm 3.4, the following two conditions hold with constant probability • φ(Fh ) is a cyclic A-module, • deg(h) − deg(h − χφ,h ) = ⌈sh /2⌉. The proof proceeds by induction on the factors of h. Let m denote the number of irreducible facQ tors of h. Without loss of generality relabel the irreducible factors of h such that h = m p where i i=1 Qi deg(p1 ) ≥ deg(p2 ) ≥ . . . ≥ deg(pm ). In particular, deg(pm ) = sh . Let hi := j=1 pj and hi := (hi ).  Induction Hypothesis: For i < m, assume φ(Fhi ) is a cyclic A-module with probability at least 1 − The initial case i = 1 of the induction hypothesis (that is, h1 is prime), follows from Lemma 3.5. deg(hi ) √ q i−1 We next lower bound the probability that φ(Fh ) (= φ(Fhm )) is A-cyclic and deg(h) − deg(h − χφ,h )) = ⌈sh /2⌉ conditioned on φ(Fhm−1 ) being A-cyclic. Since gφ ∈ A and ∆φ ∈ A× are each chosen of degree less than deg(h) independently and uniformly at random (with gcd(∆φ , h) = 1),Qby the chinese remainder theorem, the tuple {(gφ mod pi , ∆φ mod pi )}i is distributed uniformly in i (Fpi × F× pi ). In particular, (aφ,pm , ǫφ,pm ) is independent of the structure of φ(Fhm−1 ). Consequently, instead of conditioning on φ(Fhm−1 ) being A-cyclic, we fix a tuple Y (gφ mod pi , ∆φ mod pi ) i<m such that φ(Fhm−1 ) is A-cyclic. In particular, χφ,hm−1 is fixed. In the remainder of the proof, the only randomness in φ comes from choosing (gφ mod pm , ∆φ mod pm ) uniformly at random from Fpm × F× pm . As reasoned in the proof of Lemma 3.3, for deg(h) − deg(h − χφ,h ) to be ⌈sh /2⌉, it suffices for X (3.3) (aφ,pi ,⌊sh /2⌋ /ǫφ,pi ) 6= 0 i:deg(pi )=sh to hold where aφ,pi ,⌊sh /2⌋ ∈ Fq denotes the coefficient of the t⌊sh /2⌋ term in aφ,pi . Since ∀i 6= j, (gφ mod pi , ∆φ mod pi ) is fixed, X θ := (aφ,pi ,⌊sh /2⌋ /ǫφ,pi ) i:deg(pi )=sh ,i6=m is fixed. Clearly equation 3.3 holds if and only if (aφ,pm ,⌊sh /2⌋ /ǫφ,pm ) 6= θ. Since φ(Fhm−1 ) is A-cyclic, if φ(Fpm ) is A-cyclic and χφ,pm is relative prime to χφ,hm−1 , then φ(Fh ) is A-cyclic. Thus, to ensure φ(Fh ) is A-cyclic, it suffices if gcd(pm − (aφ,pm − 1)ǫφ,pm , χφ,hm−1 ) = 1 and . 14 ANAND KUMAR NARAYANAN gcd(a2φ,pm − 4ǫφ,pm pm , aφ,pm − 2) = 1. The argument as to why is identical to the discussion in the proof of Lemma 3.5. For a ∈ A, denote by a⌊sh /2⌋ ∈ Fq the coefficient of t⌊sh /2⌋ in a. To summarize, the set Spm of tuples (a, ǫ) ∈ A × F× q that satisfy the four conditions (i) (ii) (iii) (iv) deg(a2 − 4ǫpm ) = deg(pm ), a⌊sh /2⌋ 6= θǫ, gcd(ǫpm − (a − 1), χφ,bh ) = 1, gcd(a2 − 4ǫpm , a − 2) = 1, has the property that if (aφ,pm , ǫφ,pm ) ∈ Spm then φ(Fh ) is A-cyclic and deg(h) − deg(h − χφ,h ) = ⌈sh /2⌉. We estimate a lower bound on the size of Spm by choosing a ∈ A arbitrarily of degree at most deg(pm )/2 and for each choice of a, picking only those ǫ such that the four conditions are satisfied. To ensure the first condition, we need to exclude at most one choice each for ǫ. To satisfy the fourth condition, for a fixed choice of a, we need to exclude at most deg(a − 2) ≤ deg(pm )/2 choices for ǫ. This is because for 2 each monic irreducible polynomial ℓ dividing a − 2, there is at most one ǫ ∈ F× q such that a − 4ǫpm = 0 mod ℓ. For if there were two, then ℓ would divide pm , which is an irreducible polynomial of degree higher than deg(ℓ). To satisfy the third condition, for a fixed choice of a 6= 1, we need to exclude at most deg(hm−1 ) choices for ǫ. This is because for each monic irreducible polynomial ℓ dividing χφ,hm−1 , there is at most one ǫ ∈ F× q such that ǫpm − (a − 1) = 0 mod ℓ. For if there were two, then ℓ would divide pm in which case restricting to a 6= 1 assures that ǫpm − (a − 1) 6= 0 mod ℓ. If θ 6= 0, to satisfy the second condition we need to exclude at most one choice for ǫ which implies (p if deg(pm ) is even |Fp | − 1(q − deg(hm−1 ) − deg(pm )/2 − 3)q θ 6= 0 ⇒ |Spm | ≥ p m √ |Fpm | − 1(q − deg(hm−1 ) − deg(pm )/2 − 3) q if deg(pm ) is odd. For θ = 0, the second condition can be satisfied by restricting the count to non zero a⌊sh /2⌋ and we get (p if deg(pm ) is even |Fp | − 1(q − deg(hm−1 ) − deg(pm )/2 − 2)(q − 1)/q θ = 0 ⇒ |Spm | ≥ p m √ |Fpm | − 1(q − deg(hm−1 ) − deg(pm )/2 − 2)(q − 1)/ q if deg(pm ) is odd. Applying Lemma 2.3 for Spm and assuming q ≥ 2 deg(h)4 , we get   deg(h) |{(φ/pm )|(aφ,pm , ǫφ,pm ) ∈ Spm }| ≥ 1 − √ |Fpm ||F× pm |. q The probability that φ(Fh ) is A-cyclic and deg(h) − deg(h − Ann(φ(Fh ))) = ⌈sh /2⌉ conditioned on φ(Fhm−1 ) being A-cyclic is hence at least 1− deg(h) √ . q By induction φ(Fh ) is A-cyclic and deg(h) − deg(h(t) − Ann(φ(Fh ))) = ⌈sh /2⌉ with probability at least  m deg(h) m deg(h) deg(h)2 1− √ ≥1− ≥1− √ √ q q q which is lower bounded by a constant since q ≥ 2 deg(h)4 and the theorem follows.  POLYNOMIAL FACTORIZATION AND EULER-POINCARE CHARACTERISTICS OF DRINFELD MODULES 15 3.1. Order Finding in Finite Drinfeld Modules. We sketch a Montecarlo randomized algorithm to compute Ord(α) with probability arbitrarily close to 1 in O(n(1+ω)/2+o(1) (log q)1+o(1) + n1+o(1) (log q)2 ) time2. The algorithm works for every φ with reduction at h and every α ∈ φ(Fh ). Fix a φ with reduction at h and an α ∈ φ(Fh ). Compute the minimal polynomial of the linear sequence {U(φjt (α)), j ∈ Z≥0 } where U : Fh −→ Fq is a random Fq linear map. The minimal polynomial of the linear sequence divides Ord(α) and with probability at least half equals Ord(α). Hence the least common multiple of the minimal polynomials of the resulting linear sequences of O(log(δ)) independent trials is Ord(α) with probability at least 1 − δ. For a trial, the minimal polynomial of a sequence can be computed in O(n1+o(1) log q) time using the fast Berlekamp Massey algorithm given the first 2 deg(h) − 1 elements in the sequence. Hence the critical step is the computation of 2 deg(h)−2 {U(α), U(φt (α)), U(φ2t (α)), . . . , U(φt (3.4) (α))} for a randomly chosen U. This is virtually identical to the automorphism projection problem of KaltofenShoup. The difference being that the Frobenius endomorphism modulo h is replaced by the Drinfeld endomophism φt modulo h. In Kaltofen-Shoup apart from being an Fq linear endomorphism of Fh , the e 1+o(1) (log q)2 ) time only property of the Frobenius exploited is that τ (t mod h) can be computed in O(n using the vonzur Gathen-Shoup algorithm. To adapt the automorphism projection algorithm of Kaltofen and Shoup [KS98][§ 3.2] to apply in our setting, we merely have to demonstrate how to efficiently compute φt (t mod h) given h, gφ mod h and ∆φ mod h. Since φt (t mod h) = t2 mod h + τ (t mod h) + τ 2 (t mod h), we can compute φt (t mod h) in O(n1+o(1) (log q)2 ) time with three Frobenius powers and two additions modulo h thereby making the Katofen-Shoup algorithm applicable to our setting. 3.2. Obtaining the Complete Factorization from a Factor Finding Procedure. In this subsection, we prove that given access to a blackbox D that takes as input a square free f ∈ A and outputs an irreducible factor, there is an O(n4/3+o(1) (log q)1+o(1) ) expected time algorithm F to factor a polynomial of degree n over Fq into its irreducible factors. Further, this algorithm makes at most n1/3 calls to D. Thereby, Corollary 1.3 would follow from Theorem 1.1. Without loss of generality, assume that the input h ∈ A to F is square free and of degree n. Obtaining the factorization of h by extracting one irreducible factor at a time using D could in the worst √ case take Θ( n) calls to D. A faster alternative is to use the Kaltofen-Shoup algorithm with fast modular composition to extract small degree factors of h and then invoke D to extract the large degree factors one at a time. In particular, using [KU08, Lem 8.4, Thm 8.5], extract all the irreducible factors of h of degree at most n2/3 in O(n4/3+o(1) (log q)1+o(1) ) expected time. The remaining irreducible factors of h each have degree at least ⌈n2/3 ⌉. Hence there are at most n1/3 irreducible factors of h remaining and the complete factorization of h can be obtained by extracting a factor at a time with at most n1/3 calls to D. Remark 3.7. Kaltofen and Shoup [KS98, § 3.1] through the blackbox Berlekamp algorithm [KL94] reduced polynomial factorization in time nearly linear in degree to two problems that are transposes of each other, namely automorphism projection and automorphism evaluation. Being transposes, a straight line program that computes Fq linear forms in the input for one would in linear time yield a straight line program for the other of the same complexity. In particular, there is nearly linear polynomial factorization algorithm if there is a nearly linear time Fq linear solution to the automorphism projection problem. Our order finding problem is no harder than automorphism projection. We hence arrive at the stronger assertion that polynomial factorization is reducible to automorphism projection. In particular, 2We may replace (1 + ω)/2 with ω /2, where ω is the exponent of n × n by n × n2 matrix multiplication (see [KU08]). 2 2 16 ANAND KUMAR NARAYANAN no assumptions on the Fq linearity of automorphism projection algorithm is made. We must however remark that the automorphism projection we consider (see equation 3.4) is broader than that stated in [KS98, § 3.2] where only the Frobenius automorphism is considered. 3.3. Degree Estimation Using Carlitz Modules. The degree estimation algorithm framework also gives rise to variants where there is no randomization with respect to the choice of Drinfeld modules. In fact, the following deterministic example from the author’s Ph.D thesis [Nar14] using Carlitz modules (rank 1 Drinfeld modules) partly motivated the randomized version. The Carlitz module based algorithm is suited to the case when the characteristic of Fq does not divide the number of factors of the smallest degree. Example 3.8. Factor Degree Estimation using Carlitz Modules. Input : Monic square free reducible polynomial h ∈ A. (1) Choose the Carlitz module φ (the rank 1 Drinfeld module φ with gφ = 1 and ∆φ = 0). (2) Compute χφ,h . (3) Output: deg(h) − deg(h − χφ,h ). In [Nar14] it is shown that the output is exactly sh provided the number of factors of degree sh is not divisible by the characteristic of Fq . This is true since for the Carlitz module φ, for all prime ideals p ⊂ A, χφ,p = p − 1 where p is the monic generator of p. Curiously for the Carlitz module φ, finding χφ,h is easily seen to be no harder than factoring h. Computing χφ,h is linear time reducible to factoring h since given the factorization of h, it is trivial to write down χφ,h in O(deg(h) log q) time. 4. Factorization Patterns of Polynomials in Small Intervals Our analysis of the Drinfeld module analogue of the black-box Berlekamp algorithm relies on the degree distribution in factorization patterns of polynomials in short intervals which we study in this section. For a partition λ of a positive integer e, let Cλ := {σ ∈ Se |λσ = λ} denote its conjugacy class where Se is the symmetric group on e elements and λσ is the partition of e induced by the factorization of σ into disjoint cycles. Let P (λ) := |Cλ |/|Se |. For a polynomial f ∈ A, let λ(f ) denote the partition of deg(f ) induced by the degrees of the irreducible factors in the factorization of f in A. For f ∈ A and a positive integer m < deg(f ), define the interval around f corresponding to the degree bound m as Im (f ) := {f + a|a ∈ A, deg(a) ≤ m}. For I ⊂ A where each polynomial in I is of degree exactly d > 1 and a partition λ of d, define Bq (I, λ) := {a ∈ I|λ(a) = λ} and πq (I, λ) := |Bq (I, λ)|. Bank, Bary-Soroker and Rosenzweig [BBR14] recently proved the following theorem when the field size q tends to infinity while d is fixed. Theorem 4.1. ([BBR14, Thm 1]) For all monic f ∈ A of fixed degree d, for all positive integers 2 < m < d and for all partitions λ of d, πq (Im (f ), λ) ∼ P (λ)|Im (f )| It is widely conjectured (see [BBR14]) that as q → ∞. POLYNOMIAL FACTORIZATION AND EULER-POINCARE CHARACTERISTICS OF DRINFELD MODULES Conjecture 4.2. For all monic f ∈ A of degree d such that 3 < d < πq (Im (f ), λ) ∼ P (λ)|Im (f )| as 17 √ q/2 and for all partitions λ of d, q d → ∞. In the next subsection § 4.1, by applying an effective Lang-Weil bound to the argument in [BBR14], we prove an effective version of Theorem 4.1 that holds for log q > 5d log(d). 4.1. A High Dimensional Variant of the Function Field Chebotarev Density Theorem. Let E denote the rational function field Fq (t1 , . . . , tm ) in the m indeterminates t1 , . . . , tm . Let F/E be a finite Galois extension of E. Fix an algebraic closure Fq of Fq and let α : Gal(F/E) −→ Gal((Fq ∩ F )/Fq ) denote the restriction map. Let V = Spec(Fq [t1 , . . . , tm ]) and let Vur (Fq ) ⊂ V (Fq ) denote the subset of Fq rational places in V that are etale in the extension F/E. Let OF denote the integral closure of Fq [t1 , . . . , tm ] in F and let W = Spec(OF ). For a place B ∈ W lying above a place p ∈ V that is etale in F/E, let σB ∈ Gal(F/E) denote its Artin symbol. For a place p ∈ V that is etale in F/E, let Θp := {σB |B ∈ W, B|p} ⊆ ker(α) denote the conjugacy class of Artin symbols above p. Lemma 4.3. If q ≥ 2(m + 1)[F : E]2 , for every conjugacy class Θ ⊆ ker(α),   |Θ| |Θ| qm m 13/3 m−1 |{p ∈ Pur (Fq )|Θp = Θ}| − q ≤ q ([F : E] − 1)([F : E] − 2) √ + 5[F : E] . |ker(α)| |ker(α)| q Proof. Fix a conjugacy class Θ ⊆ ker(α) and let U := {p ∈ Pur (Fq )|Θp = Θ}. Let ρ : W −→ V denote the norm map from W down to V . Applying [Bar12][Prop. 2.2] to (V,W,ρ, Θ) c and a finite separable morphism implies the existence of a smooth irreducible affine Fq -variety W c π : W −→ V such that c) = U , (i) π(W (ii) deg(π) = |ker(α)|, c (Fq )| = |ker(α)|/|Θ|. (iii) ∀p ∈ U, |π −1 (p) ∩ W c −→ V is finite, W c and V have the same dimension, namely m. Further, W and W c are twists Since π : W c of each other [Bar12]. As a consequence, W and W have the same degree, namely [F : E]. c (Fq ) using an effective Lang-Weil bound [CM06], Bounding the size of W qm c (Fq )| − q m ≤ ([F : E] − 1)([F : E] − 2) √ + 5[F : E]13/3 q m−1 . |W q c ) = U and ∀p ∈ U, |π −1 (p) ∩ W c (Fq )| = |ker(α)|/|Θ|, |W c (Fq )| = |ker(α)||U| Since π(W |Θ|   m |Θ| q |Θ| ⇒ |U | − ([F : E] − 1)([F : E] − 2) √ + 5[F : E]13/3 q m−1 . qm ≤ |ker(α)| |ker(α)| q  Theorem 4.4. For every positive integer m ≥ 2, for every monic f ∈ A of degree greater than m and for every partition λ of deg(f ), if log q ≥ 5 deg(f ) log(deg(f )) then 1 |πq (Im (f ), λ) − P (λ)|Im (f )|| ≤ P (λ)|Im (f )|. 2 18 ANAND KUMAR NARAYANAN Proof. Fix a monic non constant polynomial f ∈ A of degree at least m and let m X xi ti−1 . Ff := f (t) + i=1 Since the indeterminate x1 only appears in Ff as the linear term x1 , Ff is absolutely irreducible and separable in t. Thus the splitting field Ff of Ff over E = Fq (x1 , . . . , xm ) is Galois. We will shortly apply Lemma 4.3 to the extension Ff /E. Before doing so, we argue that Ff /E is a geometric extension. The splitting field of Ff over Fq (x1 , . . . , xm ) is the composite Ff .Fq and we have Gal(Ff .Fq /Fq (x1 , . . . , xm )) = Gal(Ff .Fq /Fq (x1 , . . . , xm )) ≤ Gal(Ff /E) ≤ Sdeg(f ) . By [BBR14][Prop 3.6], Gal(Ff .Fq /Fq (x1 , . . . , xm )) ∼ = Sdeg(f ) ⇒ Gal(Ff .Fq /Fq (x1 , . . . , xm )) ∼ = Gal(Ff /E) ∼ = Sdeg(f ) ⇒ Ff ∩ Fq = Fq . Hence Ff /E is a geometric extension. Since Gal(Ff ∩ Fq /Fq ) is trivial, the restriction map αf : Gal(Ff /E) −→ Gal(Ff ∩ Fq /Fq ) has kernel ker(αf ) = Gal(Ff /E) ∼ = Sdeg(f ) . Since Gal(Fq /Fq ) = hτ i ∼ = Z where τ is the q th power Frobenius, homomorphisms from Gal(Fq /Fq ) to Sdeg(f ) are parametrized by the permutations in Sdeg(f ) they map τ to. That is, σ ∈ Sdeg(f ) corresponds to θσ ∈ Hom(Gal(Fq /Fq ), Sdeg(f ) ) that takes τ to σ. Fix a partition λ of deg(f ). For the conjugacy class Θλ := {θσ |σ ∈ Cλ } ⊆ ker(αf ), |Cλ | |Θλ | = = P (λ) | ker(α)| |Sdeg(f ) | ∼ Sdeg(f ) and |Θλ | = |Cλ | and the second where the first equality follows from the fact that ker(α) = equality follows from the definition of P (λ). (4.1) Equation 4.1 together with Lemma 4.3 applied to the extension Ff /E yields ||{p ∈ Vur,f (Fq )|Θp = Θλ }| − P (λ)q m | ≤ 2P (λ)[Ff : E]m+1 q m/2 where Vur,f (Fq ) ⊆ V (Fq ) is the set of Fq -rational places in E that are etale in Ff . Identifying V (Fq ) with Am (Fq ), a prime p = (a1 , . . . , am ) ∈ Vur,f (Fq ) has Θp = Θλ if and only if λ(Ff (a1 , . . . , am , t)) ∈ Cλ ([Bar12, Lem 2.1]). Thus For q > 20 deg(f )5 , ||{(a1 , . . . , am ) ∈ Vur,f (Fq )|λ(Ff (a1 , . . . , am , x)) = λ}| − P (λ)q m |   qm 13/3 m−1 ≤ P (λ) (deg(f ) − 1)(deg(f ) − 2) √ + 5 deg(f ) . q q 1 (deg(f ) − 1)(deg(f ) − 2) 5 deg(f )13/3 + ≤ , √ q q 2 3P (λ) P (λ) |Im (f )| ≤ πq (Im (f ), λ) ≤ |Im (f )| + πqra (Im (f ), λ) ⇒ 2 2 where πqra (Im (f ), λ) := {(a1 , . . . , am ) ∈ V (Fq ) \ Vur,f (Fq )|λ(Ff (a1 , . . . , am , x)) = λ}| POLYNOMIAL FACTORIZATION AND EULER-POINCARE CHARACTERISTICS OF DRINFELD MODULES 19 accounts for ramified primes with the factorization pattern corresponding to λ. The ramified part πqra (Im (f ), λ) is bounded by the number of Fq points in the variety defined by the discriminant ∆t (Ff ) ∈ Fq [x1 , . . . , xm ] of Ff with respect to t. By expressing ∆t (Ff ) as the resultant of Ff and its derivative with respect to t, we see, deg(∆t (Ff )) ≤ 2[Ff : E] − 1. Applying an effective version of the Lang-Weil bound [CM06], πqra (Im (f ), λ) turns out to be negligible in our computation. Since [Ff : E] = deg(f )!, for log q > 5 deg(f ) log(deg(f )), 1 3 P (λ)|Im (f )| ≤ πq (Im (f ), λ) ≤ P (λ)|Im (f )| 2 2 and the theorem follows.  Remark 4.5. Recent break through algorithms for discrete logarithm computation [Jou][BGJT] over a small characteristic finite field (say Frd ) have the following initial polynomial search step. Given r and d, search for h0 , h1 ∈ Fr2 [t], each of degree 2 such that the factorization of h1 tr − h0 over Fr2 [t] has an irreducible factor of degree d. The search is known to succeed only under heuristic assumptions. If Theorem 4.4 were true for q ≥ (n − 1)2 , then as a corollary (by setting q = r2 , f = tr+1 and m = 2), the search provably succeeds (even when h1 is fixed as h1 = t) without making any heuristic assumptions. More generally, if Theorem 4.4 holds for q ≥ c1 nc2 for some positive absolute constants c1 , c2 , then the heuristic assumptions in the polynomial selection step (with appropriate modifications) may be removed. 5. Drinfeld Module Analog of Berlekamp’s Algorithm We motivate the Drinfeld module analog of Berlekamp’s algorithm with a brief description of Lenstra’s algorithm for integer factorization. Pollard’s p-1 algorithm [Pol74] is designed to factor an integer that has a prime factor modulo which the multiplicative group has smooth order. Say for instance that a positive integer n has a prime factor p such that every prime power factor of p − 1 is bounded by b. The algorithm proceeds by choosing a positive integer B as the smoothness bound and computes m, the product of all prime powers bounded by B. A positive integer a < n is then chosen at random. Assume a is prime to n for otherwise gcd(a, n) is a non trivial factor of n. If B ≥ b, since p − 1 divides m, am − 1 = (ap−1 )m/(p−1) − 1 ∼ = 0 mod p ⇒ p | am − 1 and gcd(am − 1, n) is likely a non trivial factor of n. The running time is at least exponential in the size of B. For typical n, B needs to be as big as the smallest factor of n and thus the running time is typically exponential in the size of the smallest factor of n. Lenstra’s elliptic curve factorization algorithm [Len87] factors every n in (heuristic) expected time subexponential in the size of the smallest factor p of n. A key insight of Lenstra was to substitute the multiplicative group (Z/pZ)× in Pollard’s p-1 algorithm with the group E(Fp ) of Fp rational points of a random elliptic curve E over Fp . The running time depends on the smoothness of the group order |E(Fp )| √ for a randomly chosen E. The Hasse-Weil bound guarantees that ||E(Fp )| − (p + 1)| ≤ 2 p and Lenstra proved that his algorithm runs in expected time subexponential in the size of p assuming a heuristic on √ √ the probability that a random integer in the interval [p + 1 − 2 p, p + 1 + 2 p] is smooth. Our algorithm can be thought of as an analogue of Berlekamp’s algorithm wherein the Frobenius action is replaced with a random rank-2 Drinfeld action; much like Lenstra’s algorithm is an analogue of Pollard’s p − 1 obtained through replacing the multiplicative group modulo a prime with a random elliptic curve group. Before outlining the algorithm, a few remarks regarding notation are in order. For a 20 ANAND KUMAR NARAYANAN positive integer b, we call a polynomial b-smooth if all its irreducible factors are of degree at most b. For a Drinfeld module φ (with reduction at primes dividing h) and β ∈ φ(Fh ), by gcd(β, h) we really mean the gcd of h and a lift of β to A. Drinfeld Module Analogue of the Black-box Berlekamp Algorithm. Input : Monic square free reducible polynomial h ∈ A. (1) Pick a smoothness bound b ≥ 1. (2) Choose a Drinfeld module φ at random by picking gφ ∈ A and ∆φ ∈ A× each of degree less than deg(h) independently and uniformly at random. (3) Choose a random non zero α ∈ φ(Fh ) and compute Ord(α). (4) Find a monic b-smooth factor f of Ord(α) (if one exists). (5) Output: gcd(φOrd(α)/f (α), h) is likely a non trivial factor of h. There is flexibility on how the smooth factor f is determined once b is chosen. One extreme is to set f to be the largest b-smooth factor of Ord(α). The other, is to further factor the largest b-smooth factor of Ord(α) (recursively or by other means) and to set f to one of the b-smooth irreducible factors of Ord(α). A rigorous analysis of the former choice with b = 1 is in § 5.1. An informal discussion of why the algorithm is likely to succeed with the latter choice follows keeping in mind that M φ(Fpi ) , χφ,pi = pi − (aφ,pi − 1)/ǫφ,pi , ∀i. φ(Fh ) ∼ = i For d > 0, a random polynomial of degree d has a linear factor with at least constant probability. Assume the plausible hypothesis (which is for large q true by Theorem 1.4) that for every i, the probability of a polynomial in the interval Ipi := {pi + a | a ∈ A, deg(a) ≤ deg(pi )/2} around pi possessing a b-smooth factor roughly equals the probability of a random polynomial of degree deg(pi ) possessing a bsmooth factor. This smoothness hypothesis along with the equidistribution of characteristic polynomials (equation 2.1) suggests it is likely for every b > 0 that there exists a j such that χφ,pj = pj −(aφ,pj −1)/ǫφ,pj has a b-smooth factor. Since Ann(φ(Fpj )) divides χ(φ(Fpj )), it is thus likely that Ann(φ(Fh )) (which is the least common multiple of {Ann(φ(Fpi ))}i ) has a b-smooth factor. Assuming that is the case, since α is chosen at random, with probability at least 1 − 1/q there is a monic b-smooth polynomial dividing Ord(α). The algorithm picks one such monic irreducible factor f of Ord(α). The fact that the reduction of φ at h is random and equidistribution of characteristic polynomials (equation 2.1) imply the likely existence of k such that f (t) does not divide χφ,pk . Consequently Y φOrd(α)/f (α) ∼ pi = 0 mod pk , φOrd(α)/f (α) ≇ 0 mod i6=k and thus gcd(φOrd(α)/f (α), h) is likely a non trivial factor of h. The computation of Ord(α) can be performed efficiently through linear algebra as discussed in § 3.1. This is in stark contrast to the integer analog, where finding the order of an element in the multiplicative group modulo a composite appears hard. A consequence is that unlike Lenstra’s algorithm, our success probability is reliant not on χφ,p being smooth but merely on it possessing a smooth factor. The running times are thus bounded by a polynomial in the problem size. 5.1. Drinfeld Module Analogue of Berlekamp’s Algorithm With Linear Smoothness. In this section we formally state and analyze the version of the Drinfeld analog of blackbox Berlekamp algorithm where the smooth factor chosen is the product of all linear factors of the order of a randomly chosen element in φ(Fh ). POLYNOMIAL FACTORIZATION AND EULER-POINCARE CHARACTERISTICS OF DRINFELD MODULES 21 Algorithm 5.1. Input : Monic square free reducible polynomial h ∈ A of degree n. (1) Choose a Drinfeld module φ by picking gφ ∈ A and ∆φ ∈ A× each of degree less than deg(h) independently and uniformly at random. (2) If gcd(∆φ , h) 6= 1, output it as a factor. Else φ has reduction at primes dividing h and we proceed. (3) Choose α ∈ φ(Fh ) at random and compute Ord(α). (4) Compute f = gcd(tq − t, Ord(α)). (5) Compute φOrd(α)/f (α). (6) Output: gcd(h, φOrd(α)/f (α)). The running time of the algorithm is dominated by steps (3) and (5). As in § 3.1 , step (3) can be performed with O(n(1+w)/2+o(1) (log q)o(1) + n1+o(1) (log q)2 ) expected time by adapting the automorphism projection algorithm of Kaltofen-Shoup. Step (5) poses the transpose problem of step (3) and can be performed in identical expected time as step 3 by the transposition principle (see [KS98, § 3.2]). The rest of the section is devoted to showing that algorithm 5.1 outputs a non trivial factor of h with constant probability. In fact, we prove something stronger in Lemma 5.2 by showing that there exists positive constants c1 and c2 such that for every factor pi of h, pi divides gcd(h, φOrd(α)/f (α)) with probability at least c1 and pi does not divide gcd(h, φOrd(α)/f (α)) with probability at least c2 . As a consequence, not merely a factor but the complete factorization of h can be obtained by recursing the algorithm with recursion depth bounded by O((log n)2 ) (see [KS98, § 3]). Lemma 5.2. There exists positive a constant c such that, for q odd and log q ≥ 5n log n, at the termination of algorithm 5.1, for every prime factor p of h with monic generator p, p divides gcd(h, φOrd(α)/f (α)) with probability at least c and p does not divide gcd(h, φOrd(α)/f (α)) with probability at least c. Proof. Fix a prime factor p of h with monic generator p. Assume q is odd, log q ≥ 3n log n and let 2 q Sin := {(a, ǫ) ∈ A × F× q | deg(a − 4ǫp) = deg(p), gcd(t − t, p − (a − 1)/ǫ) = 1}, 2 q Sout := {(a, ǫ) ∈ A × F× q | deg(a − 4ǫp) = deg(p), gcd(t − t, p − (a − 1)/ǫ) 6= 1}. b denote the set of partitions of deg(p) Let Λ denote the set of partitions of deg(p) that contain 1 and let Λ that do not contain 1. Since deg(a2 − 4ǫp) = deg(p) is always true when deg(p) is odd and deg(a) ≤ 2 deg(p), by Theorem 4.4 it follows for deg(p) odd that !√ X q(q − 1) q |Fp |, |Sin | ≥ P (λ) 2 λ∈Λ   √ X q(q − 1) q   |Sout | ≥ P (λ) |Fp |. 2 b λ∈Λ When deg(p) is even, since the characteristic of Fq is assumed odd, we can enforce deg(a2 − 4ǫp) = deg(p) by restricting the choice of ǫ to ensure 4ǫ is not a square in F× q and picking a ∈ A arbitrarily of degree at most deg(p)/2. There are at least (q − 1)/2 such choices for ǫ and applying Theorem 4.4 once for each such choice we get for deg(p) even and Fq of odd characteristic, ! q X q(q − 1) |Fp |, 2|Sin | ≥ P (λ) 2 λ∈Λ 22 ANAND KUMAR NARAYANAN  2|Sout | ≥  X b λ∈Λ  q(q − 1) P (λ) 2 q |Fp |. The number of permutations in Sdeg(p) with no fixed points is ⌈deg(p)!/e⌉ if deg(p) is even and ⌊deg(p)!/e⌋ otherwise. Thus X X ⌊deg(p)!/e⌋ ⌈deg(p)!/e⌉ P (λ) ≥ and P (λ) ≥ 1 − deg(p)! deg(p)! λ∈Λ b λ∈Λ and there exists positive constants b1 , b2 such that X X P (λ) ≥ b1 and P (λ) ≥ b2 . λ∈Λ b λ∈Λ Applying Lemma 2.3 once each to Sin and Sout , there exists positive constants d1 and d2 such that, {(φ/p)|(aφ,p , ǫφ,p ) ∈ Sin } ≥ d1 |Fp ||F× p |, {(φ/p)|(aφ,p , ǫφ,p ) ∈ Sout } ≥ d2 |Fp ||F× p |. Since gφ ∈ A and ∆φ ∈ A× are each chosen of degree less than deg(h) independently and uniformly at random and gcd(∆φ , h) = 1, by the chinese remainder theorem (gφ mod p, ∆φ mod p) is distributed uniformly in Fpi × F× pi . Thus the probability that Ann(φ(Fp )) has a linear factor is at least d1 and the probability that Ann(φ(Fp )) does not have a linear factor is at least d2 . Since the projection of a random α ∈ φ(Fh ) into φ(Fp ) has order Ann(φ(Fp )) with probability at least (1 − 1/q) ≥ 1/2, the lemma follows.  Remark 5.3. If q < 5n log n, we may work over a finite extension F′q /Fq such that q ′ ≥ 3n log n and by Lemma 5.2 be assured that the algorithm 5.1 succeeds, however, we incur an extra factor of n in the expected running time. If Conjecture 4.2 is true, then Lemma 5.2 holds with only the requirements that √ √ q is odd and q ≥ 2n. The assumption q ≥ 2n may be made without loss in generality (Remark 3.2). Acknowledgement I thank Lior Bary-Soroker, Zeyo Guo, Ming-Deh Huang and Chris Umans for valuable discussions. References [BBR14] E. Bank, L. Bary-Soroker and L Rosenzweig, Prime polynomials in short intervals and in arithmetic progressions, http://arxiv.org/abs/1302.0625 [BGJT] R. Barbulescu, P. Gaudry, A. Joux , E. Thome, “A quasi-polynomial algorithm for discrete logarithm in finite fields of small characteristic”, http://arxiv.org/abs/1306.4244 [Bar12] L. Bary-Soroker, Irreducible values of polynomials, Adv. Math., 229 (2), 854-874 (2012). [Ber67] E. R. Berlekamp, Factoring Polynomials Over Finite Fields, Bell System Tech. J., 46:1853-1849. 1967. [CM06] A. Cafure and G. Matera, Improved explicit estimates on the number of solutions of equations over a finite field, Finite Fields and Their Applications Volume 12, Issue 2, April 2006, Pages 155185 [Coh] S. D. Cohen, The Distribution of Polynomials over Finite Fields, Acta Arith., 17 (1970), 255-271. [CZ81] D. G. Cantor and H. Zassenhaus, A new algorithm for factoring polynomials over finite fields, Math. Comp., vol. 36, 587592, 1981. [CP14] A. C. Cojocaru and M. Papikian, Drinfeld Modules, Frobenius Endomorphisms, and CM-Liftings, Int Math Res Notices (2014) [Cor99] G. Cornellison, Deligne’s congruence and supersingular reduction of Drinfeld modules, Arch. Math. 72 (1999) 346-353. [Del74] P. Deligne, “La conjecture de Weil. I”, Publications Mathematiques de l’IHES (43): 273-307. [Deu41] M. Deuring, Die Typen der Multiplikatorenringe elliptischer Funktionenkorper, Abh. Math. Sem. Hamburg 14 (1941), 197272. MR0005125. POLYNOMIAL FACTORIZATION AND EULER-POINCARE CHARACTERISTICS OF DRINFELD MODULES 23 [Dor] D. R. Dorman, On singular moduli for rank 2 Drinfeld modules, Compositio Mathematica (1991) Volume: 80, Issue: 3, page 235-256. [Dri74] V. G. Drinfeld, Elliptic modules, Mat. Sb. (N.S.), 1974, Volume 94(136), Number 4(8), Pages 594627 [Dri77] V. G. Drinfeld, Elliptic modules. II, Mat. Sb. (N.S.), 102(144):2 (1977), 182-194. [vzGS92] J. von zur Gathen and V. Shoup, Computing Frobenius maps and factoring polynomials, Comput. Complexity, vol. 2, 187-224, 1992. [Gek08] E-U Gekeler, Frobenius distributions of Drinfeld modules over finite fields, Trans. Amer. Math. Soc. 360 (2008), 1695-1721. [Gek91] E-U Gekeler, On finite Drinfeld modules, Journal of Algebra, Volume 141, Issue 1, 1 August 1991, Pages 187-203. [Gos96] D. Goss, Basic Structures of Function Field Arithmetic, Ergeb. Math. Grenzgeb. (3), vol. 35, Springer, Berlin, 1996. [GNU15] Z. Guo, A. Narayanan and C. Umans, Algebraic problems equivalent to beating the 3/2 exponent for polynomial factorization over finite fields, In preparation. [vdH04] G. J. van der Heiden, Factoring polynomials over finite fields with Drinfeld modules, Math. Comp. 73 (2004), 317-322. [vdH04-1] G. J. van der Heiden, Addendum to “Factoring polynomials over finite fields with Drinfeld modules”,Math. Comp. 73(2004), Number 248, Page 2109 [Jou] Antoine Joux. A new index calculus algorithm with complexity L(1/4 + o(1)) in very small characteristic. Cryptology ePrint Archive, Report 2013/095, 2013. [KL94] E. Kaltofen and A. Lobo, Factoring high-degree polynomials by the black box Berlekamp algorithm, ISSAC ’94 Proceedings of the international symposium on Symbolic and algebraic computation Pages 90 - 98. [KS98] E. Kaltofen and V. Shoup, Subquadratic-time factoring of polynomials over finite fields, Math. Comput., 67(223):1179-1197, July 1998. [KU08] K. Kedlaya and C. Umans, Fast modular composition in any characteristic, Proceedings of the 49th Annual IEEE Symposium on Foundations of Computer Science (FOCS). pages 146-155. 2008. [Len87] H. W. Lenstra Jr, Factoring integers with elliptic curves, Annals of Mathematics 126 (3): 649673. (1987). [Nar14] A. K. Narayanan, Computation of Class Groups and Residue Class Rings of Function Fields over Finite Fields, Ph.d Dissertation, Computer Science Department, University of Southern California 2014. [PP89] A. Panchishkin and I. Potemine, An algorithm for the factorization of polynomials using elliptic modules, In Proceedings of the Conference, Constructive methods and algorithms in number theory, p. 117. Mathematical Institute of AN BSSR, Minsk, 1989 (Russian). [Pol74] J. M. Pollard, Theorems of factorization and primality testing, Proceedings of the Cambridge Philosophical Society 76 (3): 521-528. (1974). [Sch95] R. Schoof: Counting Points on Elliptic Curves over Finite Fields. J. Theor. Nombres Bordeaux 7:219254, 1995. [Sto01] A. Storjohann, Deterministic computation of the Frobenius form, In Proc. 42nd Annual Symp. Foundations of Comp. Sci., pages 368-377, 2001. [VS] G. D. Villa Salvador, Topics in the Theory of Algebraic Function Fields, 2006. Birkhauser, 2006. [Yu95] J-K Yu, Isogenies of Drinfeld modules over finite fields, J. Number Th. 54 (1995), 161-171. [Yun76] D. Y. Y. Yun, On square-free decomposition algorithms, Proc. 1976 ACM Symp. on Symbolic and Algebraic Computation ISSAC 76. Anand Kumar Narayanan, Department of Computing and Mathematical Sciences, California Institute of Technology, Pasadena, California, USA, 91125 E-mail address: [email protected]
8cs.DS
On geodesic ray bundles in hyperbolic groups Nicholas Touikan arXiv:1706.01979v1 [math.GR] 6 Jun 2017 June 8, 2017 Abstract We construct a Cayley graph CayS (Γ) of a hyperbolic group Γ such that there are elements g, h ∈ Γ and a point γ ∈ ∂∞ Γ = ∂∞ CayS (Γ) such that the sets RB (g, γ) and RB (h, γ) in CayS (Γ) of vertices along geodesic rays from g, h to γ have infinite symmetric difference; thus answering a question of Huang, Sabok and Shinko. 1 Introduction To every infinite finite valence tree T we can associate a boundary at infinity ∂∞ T corresponding to ends of infinite rays. ∂∞ T is homeomorphic to a Cantor set. A metric space is called δ-hyperbolic if, roughly speaking, up to an error term δ it has a tree-like structure. Analogously to a tree, to a δ-hyperbolic space X, one can assign a Gromov boundary ∂∞ X which is a compact, metrizable, yet oftentimes exotic set, corresponding to equivalence classes of ends of infinite geodesic rays. A group Γ is called hyperbolic if one of its Cayley graphs is is a δ-hyperbolic metric space for some δ ≥ 0. In this case to Γ we can assign a canonical Gromov boundary ∂∞ Γ on which Γ acts non-trivially. The deep connections between the properties of ∂∞ Γ and the group Γ makes it highly a structured, and therefore fascinating, object to study. In [HSS17] Huang, Sabok and Shinko investigate Borel equivalence relations on ∂∞ Γ. They show that if Γ is a hyperbolic group with the additional property that Γ acts properly discontinuously and cocompactly on a CAT(0) cube complex, i.e. Γ is cubulated, then the action of Γ on its boundary ∂∞ Γ is hyperfinite. This generalizes a result of Dougherty, Jackson and Kechris [DJK94, Corollary 8.2] from the class of free groups to the larger class of cubulated hyperbolic groups. Although the result of [HSS17] feels like it should be true for all hyperbolic groups, an additional cubulation requirement is needed to prove a key lemma, [HSS17, Lemma 1.3], which states that for any two vertices x, y of a δ-hyperbolic CAT(0) cube complex C and for any point γ ∈ ∂∞ C the sets, called ray bundles, RB (x, γ) and RB (y, γ) of vertices of C that occur along geodesic rays from x and y (respectively) to γ ∈ ∂∞ C have finite symmetric difference. The authors pose [HSS17, Question 1.4] which asks if [HSS17, Lemma 1.3] holds for any Cayley graph of a hyperbolic groups. Not only would a positive 1 answer immediately imply that the action of any hyperbolic group Γ on ∂∞ Γ is hyperfinite, but this is also a very natural question to ask from the point of view of geometric group theory. This paper gives a negative answer by giving examples of Cayley graphs CayS (Γ) of hyperbolic groups Γ with vertices x, y and some γ ∈ ∂∞ CayS (Γ) such that the ray bundles RB (x, γ) and RB (y, γ) have infinite symmetric difference. This example, if anything, reinforces the relevance of [HSS17, Lemma 1.3]. The methods of this paper will be familiar to geometric group theorists, but, since this paper is aimed at a broader audience, necessary background is included to make it self-contained. That being said, the reader is expected to know the following notions from topology: group presentations, fundamental groups, the Seifert-van Kampen theorem, and universal covering spaces. 1.1 Acknowledgements I first wish to thank Michael Hull and Jindrich Zapletal for the invitation to the South Eastern Logic Symposium 2017, which greatly increased my appreciation of the contemporary work of descriptive set theorists. I also wish to thank Marcin Sabok for posing this question about symmetric differences of ray bundles, specifically about the embedability of bad ladders into Cayley graphs, and for an interesting discussion, encouragement and feedback. Finally I am grateful to Bob Gilman and Paul Schupp for conversations that confirmed that the main result of this paper is probably not a trivial consequence of what is known about the automaticity of the language of geodesics in hyperbolic groups. 2 Hyperbolic groups and their boundary The author recommends [Aea91] for an accessible yet thorough treatment of the topics in this section. Given a group Γ and a generating set S of Γ we can construct a Cayley graph CayS (Γ) which is a directed graph whose vertices are the elements of Γ and for each g ∈ Γ and s ∈ S we draw the edge g s I gs . By declaring each edge to be an isometric copy of the closed unit interval, we make graphs into connected metric spaces via the path metric. If X is a graph we say that a path starting at a vertex v and ending at a vertex u is geodesic if it is the shortest possible path between u, v. Typically there will be multiple geodesics between a pair of vertices. A metric space is δ-hyperbolic if it has the following property: for any three vertices u, v, w if α, β, and γ are geodesics from u to v, v to w, and w to u respectively then α is contained in a δ-neighbourhood of β ∪ γ. If a group Γ has a δ-hyperbolic Cayley graph with respect to one finite generating set, then for any other finite generating set the corresponding Cayley graph will also be δ 0 -hyperbolic, though possibly with δ 0 6= δ. Such a group will therefore be called a hyperbolic group. For example, if A is a finite set of symbols and F(A) is the free group on A, then, taking A as a generating set of F(A), the Cayley graph CayA (F(A)) 2 is a regular tree with valence |A| and in particular for any geodesics α, β, and γ as above, α ⊂ β ∪ γ so that CayA (F(A)) is in fact 0-hyperbolic. Let us now give a precise definition of the Gromov boundary ∂∞ Γ. Let S be a finite generating set of Γ. A geodesic ray is a continuous map ρ : [0, ∞) → CayS (Γ) such that for every pair of positive integers m < n, ρ(m) is a vertex and the segment ρ([n, m]) is a geodesic. ∂∞ Γ is the set of geodesic rays of CayS (Γ) modulo the relation: ρ ∼ ρ0 ⇔ there is some R ≥ 0 such that ρ ([0, ∞)) is contained in an R−neighbourhood of ρ0 ([0, ∞)) and ρ0 ([0, ∞)) is contained in an R−neighbourhood of ρ ([0, ∞)). We recommend the following exercises: • If Γ = F(A) is a free group as above, then ∂Γ is naturally identified with a Cantor set. • If Γ = hai ⊕ hbi, the free abelian group of rank two (which is not a hyperbolic group), then ∂∞ CayA (Γ) can be identified with the circle at infinity for R2 , but the action of Γ (induced by translating rays) yields a trivial action on ∂∞ Γ. That ∂∞ Γ, thus given, is well-defined, non-trivial, canonical for Γ, and admits a non-trivial Γ action is a consequence of δ-hyperbolicity. The reader may consult [GdlH90, §6-§8] or [KB02] for a complete treatment of the topic. 3 The bad ladder Consider the infinite graph L consisting of two sides, copies of R, with a vertex at each integer point, and countably many rungs, edges connecting vertices at corresponding integral vertices on each side. Add a vertex to the middle of each rung. The resulting graph L is shown in Figure 1. Figure 1: A ladder with a vertex x on a side and a vertex y in the middle of a rung. We note that any two geodesic rays either go to the left or to the right, and if they go in the same direction, they remain at a bounded distance. It follows that ∂∞ L consists of two points. Proposition 3.1. Let x be a vertex on a side of L, let y be a vertex in the middle of a rung and let γ ∈ ∂∞ L = {±∞} correspond to one of the ends of the ladder. Then the sets RB (x, γ) and RB (y, γ) have infinite symmetric difference. 3 Proof. Without loss of generality we may assume that γ corresponds to +∞. As any geodesic ρ travels towards γ it must eventually stay within one of the sides of L. If ρ originates at x then it is allowed to travel once through a rung to reach the other side. It follows that every vertex on a rung that is “greater” than x is in RB (x, γ). If ρ originates at y in the middle of a rung, then once it enters a side s1 it is no longer able to switch because if that happens then there is some initial segment ρ0 of ρ whose length does not realize the distance between y and the first point it encounters in s2 6= s1 . See Figure 1. It follows that RB (y, γ) doesn’t contain any vertices contained in rungs; thus the two sets have infinite symmetric difference. Although L is a hyperbolic graph, due to its nonhomogeniety, it cannot be the Cayley graph of a group. We will now construct the Cayley graph of a group, in fact a free group, which contains a ladder L as a convex subgraph. That is to say any geodesic connecting two points on the ladder inside this larger graphs must stay within the ladder. To show this we must reach a sufficiently complete understanding of the geometry of a Cayley graph. Although it is not invoked explicitly, the proof is informed by the Bass-Serre theory of groups acting on trees and corresponding decompositions into graphs of spaces [SW79, Ser03]. 4 Embedding bad ladders into Cayley graphs We will take some liberties with notation and identify group presentations with the groups they present. First consider the presentation Γ0 = p, q, t | t−1 ptq −1 ≈ F2 . For any group presentation, there is a standard construction known as a presentation complex, which is a CW-complex P (Γ0 ) obtained by gluing polygons (corresponding to relations) to graphs (edges correspond to generators) in such a way (as a consequence of the Seifert-van Kampen Theorem) that π1 (P (Γ0 )) ≈ Γ0 . In this case presentation complex P (Γ0 ) consists of a graph with one vertex, three directed edges labelled p, q, t, and a square along whose boundary the word t−1 ptq −1 can be read. This word specifies the identifying map between the boundary of the square and a closed loop in the graph, making the latter nullhomotopic. As a topological space P (Γ0 ) can also be obtained by taking a cylinder A = [−1, 1] × S 1 , picking a point on each boundary component and identifying them. This is shown on Figure 2. Remark 4.1. The 1-skeleton of the universal cover P^ (Γ0 ) corresponds to the Cayley graph Cay{p,q,t} (F2 ), i.e. the Cayley graph relative to the generating set explicitly given by the group presentation. This is true for any presentation complex. The universal cover P^ (Γ0 ) is a tree of spaces obtained by taking an infinite collection of copies of strips corresponding to connected components of the lift A ⊂ P (Γ0 ) in P^ (Γ0 ) attached by points. We call these pq-strips. This is 4 Figure 2: The presentation complex P (Γ0 ) shown if Figure 3. There is also a collection of bi-infinite lines in P^ (Γ0 ) along which we read . . . ttt . . ., we call these t-lines. Consider now the amalgamated Figure 3: The universal cover of P (Γ0 ). Decorated edges are labelled t. pq-strips are shaded grey. free product: Γ1 = Γ0 ∗t=s2 hsi = p, q, t, s | t−1 ptq −1 , s2 t−1 ≈ F2 corresponding to adjoining a square root s to the basis element t ∈ F2 . By the Seifert-van Kampen Theorem, it can be realized as the fundamental group of a space P1 , which is not a presentation complex, obtained by taking a copy of P (Γ0 ), a circle C = S 1 , and attaching another cylinder D = [−1, 1] × S 1 so that the attaching map {−1} × S 1 → P (Γ0 ) wraps with degree 1 around the loop corresponding to the edge with label t and the other attaching map {1} × S 1 → C wraps with degree 2. See Figure 4. 5 f1 . Below, how the CW-complex Figure 4: On top, a portion of the universal cover P P1 is obtained from P0 . f1 , P (Γ0 ) ⊂ P1 lifts to a countable collecIn the universal covering space P tion of disjoint copies of P^ (Γ0 ) called Γ0 -pieces and the circle C ⊂ P1 lifts to a countable collection of disjoint lines called C-lines. The connected components of lifts of the cylinder D are called D−strips, copies of [−1, 1] × R connecting t-lines in Γ0 -pieces to C-lines. In particular each C-line is attached to two D-strips. Globally, the universal cover has the structure of a tree of spaces. See Figure 5. f1 depicted as a tree of spaces obtained by attaching Γ0 -pieces Figure 5: A portion of P to D-strips (shown in grey) along t-lines. Note that although drawn as “pancakes” the Γ0 -pieces are actually copies of the space shown in Figure 3. Our final presentation Γ is obtained via the following Tietze transformation: Γ1 = p, q, t, s | t−1 ptq −1 , s2 t−1 ≈ p, q, s | s−2 ps2 q = Γ. This Tietze transformation corresponds to the fact that, since s2 = t, we can remove t from the generating set. Geometrically the resulting presentation complex is obtained by collapsing the [−1, 1] factor in the cylinder D = S 1 × [−1, 1] ⊂ P1 to a point. See Figure 6. The universal cover of the presentation ^ f1 , subdividing each complex P (Γ) can be obtained by taking the Γ0 -pieces in P t-labelled edge into a length 2 edge path labelled ss, replacing t−lines with 6 Figure 6: Collapsing D-strips (shaded grey) onto lines as seen from the universal cover, and the resulting pq-ladders, contained in a Γ0 -piece. s-lines, and then identifying two s-lines in different Γ0 -pieces if they were both f1 has a large scale connected by D-strips to the same C-line. In this way P tree of spaces structure obtained taking resulting Γ0 -pieces and attaching them along s−lines. Furthermore we observe that each Γ0 -piece contains a ladder L obtained by gluing together squares labelled s−2 ps2 q along segments labelled s2 . We call such a ladder a pq-ladder. See Figure 6. ^ In this way P (Γ) admits a depth 2 hierarchical decomposition as a tree of spaces. At the top level we have Γ0 -pieces connected along s-lines as a tree of spaces, then the Γ0 -pieces themselves are trees of pq-ladders, connected by vertices. ^ Proposition 4.2. A pq-ladder L is convex in the 1-skeleton of P (Γ). Furthermore any geodesic ray starting in L and going to one of the ends of L must stay in L. Proof. Let p be the Γ0 -piece containing a pq-ladder L. Let u, v ∈ L be vertices and let ρ be a geodesic connecting u and v. Claim 1: ρ cannot exit p. Suppose towards the contrary that this was the case then, by the tree of spaces structure, ρ must exit p at some point a contained in some s-line s, and then re-enter p by at some other point b ∈ s in the same s-line. It follows that if ρ is geodesic it cannot exit p because the subsegment ρ([na , nb ]), where ρ(na ) = a, ρ(nb ) = b, can be replaced the strictly shorter segment from a to b contained within s. Claim 2: If ρ stays in the Γ0 -piece p, it cannot exit L. Indeed each piece consists of a tree of pq-ladders connected by points; since it is the same space as the one shown in Figure 3 except with each edge labelled t replaced by a path of length 2 labelled ss. If ρ leaves L at some vertex p, then to re-enter L it must pass through p again, contradicting that it is geodesic. The convexity of L now follows. This implies that any infinite path that stays in the p or q side of L is a geodesic ray. It remains to show that any geodesic ray starting at x ∈ L going to γ ∈ ∂∞ L stays in L. Let ρ be one such ^ geodesic ray and let β : [0, ∞) → P (Γ) be another arc-length parameterized 7 geodesic ray from x to γ. Suppose that β exits L at the point β(N ). By convexity of L, β cannot re-enter L, but it could still travel close to it. By definition of the Gromov boundary there must be some bound R such that for all z, d(β(z), ρ) ≤ R. However, since β is geodesic and arc-length parameterized, d(β(N + M ), β(N )) = M and since the shortest path from β(N + M ) to L must pass through β(N ) we conclude that d(β(N + M ), ρ) ≥ d(β(N + M ), L) = M. Since β is an infinite ray we may take M > R which yields a contradiction. Proposition 3.1 and 4.2 immediately imply the main result: Corollary 4.3. Let Γ = p, q, s | s−2 ps2 q ≈ F2 and let X = Cay{p,q,s} (Γ). If γ ∈ ∂∞ X = ∂∞ Γ corresponds to an end of a pq-ladder L, x is a vertex contained in a side of L, and y is a vertex contained in a rung of L, then RB (x, γ) and RB (y, γ) have infinite symmetric difference. 4.1 A one-ended example The example we just gave is somewhat unsatisfying since it is a free group. We will outline another construction, which was the original example found by the author. This group is not free since it is one-ended, which in the torsion-free case means it does not decompose as a non-trivial free product. Consider first the presentation Σ0 = a, b, p, q, t | abpa−1 b−1 q, ptqt−1 . This is an explicit decomposition of Σ0 as an HNN extension of a free group of rank 3 and the presentation complex is homeomorphic to an orientable closed surface of genus 2. We then repeat the construction in the previous section Σ1 = a, b, p, q, t | abpa−1 b−1 q, ptqt−1 ∗t=s2 s2 ≈ a, b, p, q, s | abpa−1 b−1 q, ps2 qs−2 = Σ to embed a bad ladder into a the Cayley graph corresponding to the presentation Σ. Since Σ0 is a closed surface group, therefore one-ended, and hsi cannot act with an infinite orbit on a tree if s2 fixes a point, [Tou15, Theorem 3.1] implies that Σ is one-ended. In particular Σ is not free. Hyperbolicity follows from the combination theorems [BF92, BF96, KM98]. Again the universal cover is a tree of spaces obtained by gluing hyperbolic planes H2 along s-lines and the proof goes similarly to Proposition 4.2. The first claim goes through as is, we leave the proof of Claim 2 (convexity of pq-ladders) as an exercise in small cancellation theory (one can use [MW02, Theorem 9.4].) 4.2 Cubulating bad ladders A bad ladder consists of a chain of hexagons glued along edges. As an illustration of [HSS17, Lemma 1.3], observe that if we cubulate a bad ladder, i.e. 8 Figure 7: A cubulated bad ladder make it into a cube complex, (see Figure 7) the conclusion of Proposition 3.1 no longer holds. In fact both groups shown in this paper can be cubulated and therefore do not give counterexamples to the conjecture that the action of every hyperbolic group Γ on ∂∞ Γ is hyperfinite, a conjecture that this author believes to be true. References [Aea91] J. M. Alonso and et al. Notes on word hyperbolic groups. In Group theory from a geometrical viewpoint (Trieste, 1990), pages 3–63. World Sci. Publ., River Edge, NJ, 1991. Edited by H. Short. [BF92] M. Bestvina and M. Feighn. A combination theorem for negatively curved groups. J. Differential Geom., 35(1):85–101, 1992. [BF96] Mladen Bestvina and Mark Feighn. Addendum and correction to: “A combination theorem for negatively curved groups” [J. Differential Geom. 35 (1992), no. 1, 85–101; MR1152226 (93d:53053)]. J. Differential Geom., 43(4):783–788, 1996. [DJK94] Randall Dougherty, Steve Jackson, and Alexander S Kechris. The structure of hyperfinite borel equivalence relations. Transactions of the American Mathematical Society, 341(1):193–225, 1994. [GdlH90] Étienne Ghys and Pierre de la Harpe. Sur les groupes hyperboliques d’apres Mikhael Gromov, volume 83 of Progress in Mathematics. Birkhäuser Boston, Inc., Boston, MA, 1990. [HSS17] Jingyin Huang, Marcin Sabok, and Forte Shinko. Hyperfiniteness of boundary actions of cubulated hyperbolic groups. arXiv preprint arXiv:1701.03969, 2017. [KB02] Ilya Kapovich and Nadia Benakli. Boundaries of hyperbolic groups. Combinatorial and geometric group theory (New York, 2000/Hoboken, NJ, 2001), 296:39–93, 2002. [KM98] O. Kharlampovich and A. Myasnikov. Hyperbolic groups and free constructions. Trans. Amer. Math. Soc., 350(2):571–613, 1998. [MW02] Jonathan P. McCammond and Daniel T. Wise. Fans and ladders in small cancellation theory. Proc. London Math. Soc. (3), 84(3):599– 644, 2002. [Ser03] Jean-Pierre Serre. Trees. Springer Monographs in Mathematics. Springer-Verlag, Berlin, 2003. Translated from the French original 9 by John Stillwell, Corrected 2nd printing of the 1980 English translation. [SW79] Peter Scott and Terry Wall. Topological methods in group theory. In Homological group theory (Proc. Sympos., Durham, 1977), volume 36 of London Math. Soc. Lecture Note Ser., pages 137–203. Cambridge Univ. Press, Cambridge, 1979. [Tou15] Nicholas Touikan. On the one-endedness of graphs of groups. Pacific Journal of Mathematics, 278(2):463–478, 2015. 10
4math.GR
arXiv:1302.4766v1 [math.AC] 19 Feb 2013 ELASTICITY IN POLYNOMIAL-TYPE EXTENSIONS MARK BATELL AND JIM COYKENDALL Abstract. The elasticity of an atomic integral domain is, in some sense, a measure of how far the domain is from being a unique factorization domain (or, more properly, a half-factorial domain). We consider the relationship between the elasticity of a domain, R, and the elasticity of its polynomial ring R[x]. For example, if R has at least one atom, a sufficient condition for the polynomial ring R[x] to have elasticity 1 is that every nonconstant irreducible polynomial f ∈ R[x] be irreducible in K[x]. We will determine the integral domains R whose polynomial rings satisfy this condition. 1. Introduction and Motivation In this paper, R will always be an integral domain with quotient field K. The notation Irr(R) will stand for the irreducible elements of R, A(R) will be the elements of R that can be expressed as a product of atoms, U (R) and Cl(R) will respectively denote the unit group and the class group of R. For a nonzero nonunit element x ∈ A(R), we define the elasticity of x to be n |x = π1 π2 · · · πn = ξ1 ξ2 · · · ξm } m where each πi , ξj is an irreducible element of R. For example, if x is a product of primes or is an element of a half-factorial domain, then ρ(x) = 1. If x ∈ / A(R) then ρ(x) is undefined. For an integral domain R, the elasticity is defined by ρ(x) = sup{ ρ(R) = sup{ρ(x)|x ∈ A(R)}. As previously, we say that the elasticity of a domain without any atoms is undefined. It is well-known that if R is atomic, then ρ(R) = 1 if and only if R is an HFD, but in the nonatomic case, the situation can be more exotic. For example in [CZ] a domain was constructed with a unique (up to associates) irreducible element. Such a domain, R, is necessarily nonatomic, but ρ(R) = 1. More generally in [CM] it is shown that any atomic monoid can be realized as the “atomic part” of an integral domain (again, usually non-atomic). Hence, one can construct nonatomic domains that display any prescribed elasticity. Given an integral domain, R, it is natural to ask what is the relationship between ρ(R) and ρ(R[x]). Since any factorization of a constant in R[x] must be a factorization in R, it is easy to see that, in general, ρ(R[x]) ≥ ρ(R). More generally, one can ask if we have the sequence of integral domains R = R0 ⊆ R1 ⊆ R2 ⊆ · · · ⊆ K 2000 Mathematics Subject Classification. Primary: 13F15. Key words and phrases. Factorization, unique factorization. 1 2 MARK BATELL AND JIM COYKENDALL what is the relationship between ρ(R0 + R1 x + R2 x2 + · · · ) and the collection of data ρ(Ri )? Some special cases of this general construction worth noting are the polynomial ring (Ri = R for all i ≥ 0), the construction R + xK[x] (R0 = R and Ri = K for all i ≥ 1), and R + Rx + x2 K[x] (R0 = R1 = R and Ri = K for all i ≥ 2). 2. Some Polynomial-Type Constructions We begin this section with some preliminary lemmata, but first we recall the notion of an AP-domain. Definition 2.1. We say that the integral domain, R, is an AP-domain if every irreducible (atom) in R is prime. Lemma 2.2. Let R be an AP-domain with at least one irreducible element, then ρ(R) = 1. Proof. Of course, if R is an AP-domain vacuously (that is, in the case that R has no atoms), then ρ(R) is undefined. Suppose, on the other hand, that Irr(R) is nonempty. Since all atoms in an AP-domain, are prime, any irreducible factorization is a prime factorization and therefore is unique. Hence ρ(x) = 1 for all x ∈ A(R) and so ρ(R) = 1.  Lemma 2.3. Let R be a domain, p ∈ R be a nonzero prime element, and a ∈ A(R). Then ρ(a) ≥ ρ(ap). Proof. Suppose we have the following irreducible factorization of ap: ap = ξ1 ξ2 · · · ξn , where each ξi ∈ Irr(R) for all 1 ≤ i ≤ n. Since p ∈ R is prime, p must be associated with one of the ξi ; we will say, without loss of generality, that ξn = up for some u ∈ U (R). Since R is an integral domain, we cancel the factor of p to obtain a = ξ1 ξ2 · · · ξn−1 u. The upshot is that an arbitrary irreducible factorization of ap is (up to associates) p times an irreducible factorization of a. Hence there is a factorization of ap of length m + 1, if and only if there is a corresponding factorization of a of length m. m+1 Since m ≥ k ≥ 1 implies that m k ≥ k+1 , we have that ρ(a) ≥ ρ(ap).  Remark 2.4. To tie up a loose end, we note √that the inequality in the previous result can be strict. For example, in the ring Z[ −14] the element 81 has precisely two irreducible factorizations (up to associates and reordering): √ √ 81 = (3)(3)(3)(3) = (5 + 2 −14)(5 − 2 −14). √ So ρ(81) = 2. Now consider the element 81 as an element of Z[ −14][x]. As before 81 has only two irreducible factorizations (the ones mentioned previously) and x is a prime element. An easy check shows that ρ(81x) = 35 < 2. We now present the following theorem. ELASTICITY IN POLYNOMIAL-TYPE EXTENSIONS 3 Theorem 2.5. Let R be an integral domain with quotient field K. If R contains at least one atom, then ρ(R) = ρ(R + xK[x]). If R has no atoms (that is, R is an antimatter domain) then ρ(R) is undefined and ρ(R + xK[x]) = 1. Proof. Let g(x) be a nonconstant polynomial in R + xK[x]. We claim that if g(x) is irreducible, then g(x) is (up to associates) either x or of the form 1 + xf (x) where 1 + xf (x) ∈ Irr(K[x]). To see this, note that if g(x) is nonconstant, then g(x) = r + xk(x) with k(x) ∈ K[x] \ {0}. If r = 0 then the stipulation that g(x) is irreducible forces the condition k(x) ∈ U (R). On the other hand, if r 6= 0, then the factorization g(x) = r(1 + r1 xk(x)) shows that if g(x) is irreducible, then r ∈ U (R) and 1 + r1 xk(x) ∈ Irr(K[x]). This establishes the claim. We also note that the elements x and 1 + xf (x) ∈ Irr(K[x]) are, in fact, prime elements of R+xK[x]. The fact that x is prime is straightforward. For an irreducible of the form 1 + xf (x), note that if 1 + xf (x) divides the product h(x)k(x) (with h(x), k(x) ∈ R + xK[x]) then without loss of generality, 1 + xf (x) divides h(x) in K[x]. We say that h(x) = (1 + xf (x))q(x), and comparing constant terms, we see that q(x) ∈ R + xK[x]. Hence x and irreducibles of the form 1 + xf (x) are prime in R + xK[x]. From the previous observations, we see that if R is an antimatter domain, then R + xK[x] is an AP-domain (with Irr(R + xK[x]) nonempty) and hence ρ(R + xK[x]) = 1 by Lemma 2.2. Now suppose that R has at least one irreducible element. Since any element of R, factored as an element of R[x], has only factors from R (and any irreducible in R remains irreducible in R[x]), we have that ρ(R + xK[x]) ≥ ρ(R). On the other hand, let f (x) ∈ A(R + xK[x]). We factor f (x) into irreducibles as follows: f (x) = π1 π2 · · · πm g1 (x)g2 (x) · · · gk (x) with πi ∈ Irr(R) and gi (x) ∈ Irr(R + xK[x]) of degree at least 1. By our previous remarks, each gi (x) is prime. Hence by Lemma 2.3, ρ(f (x)) ≤ ρ(π1 π2 · · · πm ). Hence ρ(R + xK[x]) ≤ ρ(R) and so, we have equality.  In stark contrast, the next result shows that a minor tweaking of the previous construction can yield a domain with infinite elasticity. This also gives a strong indication of the level of difficulty of determining the elasticity of R0 +R1 x+R2 x2 + · · · in terms of the elasticities ρ(Ri ). Proposition 2.6. Let R be a domain that contains at least one atom, then ρ(R + Rx + x2 K[x]) = ∞. Proof. Let π ∈ Irr(R). For all n ∈ N0 the polynomial (π n ± x) ∈ Irr(R + Rx + x2 K[x]). The irreducible factorizations (π n + x)(π n − x) = π 2n (1 − 1 2 x ) π 2n have lengths 2 and 2n + 1 respectively. Hence we see that ρ(R + Rx + x2 K[x]) = ∞.  4 MARK BATELL AND JIM COYKENDALL We now specialize to the case R[x]. In comparing the elasticities ρ(R) and ρ(R[x]), there are two dynamics to consider. The first is the factorization of constants (which is reflected in ρ(R)) and the different factorizations that may result from the polynomial structure. To illustrate we consider the following examples. √ Example 2.7. It is well-known (see for example [C1]) that √ Z[ −3] is a halffactorial domain (and hence has elasticity 1). The domain Z[ −3][x] is not an HFD. The irreducible factorizations √ √ (2x + (1 + −3))(2x + (1 − −3)) = (2)(2)(x2 + x + 1) demonstrates that the elasticity of the polynomial extension exceeds 1. A close look at√the mechanics of the previous example reveals that the failure of the domain Z[ −3] to be integrally closed allowed the creation of this “bad factorization.” In the proof of the main theorem in [C2] it is shown that if R is not integrally closed, a simliar effect occurs. It is known (see [Za]) that if R is a Krull domain, then R[x] is an HFD if and only if |Cl(R)| ≤ 2. It is also known from [Ca] that if R is a ring of algebraic integers (and hence, certainly a Krull domain), then R is an HFD if and only if |Cl(R)| ≤ 2. Hence if R is a ring of algebraic integers with |Cl(R)| ≤ 2, then R is an HFD and so is R[x]. In this case ρ(R) = ρ(R[x]), but the equality can be delicate as we will demonstrate in the following example. The following example should be constrasted with the previous as it is integrally closed. √ Example 2.8. The integral domain R := Z[ −5] is a ring of integers of class number precisely 2 (see, for example, the tables in [Co]) and hence is an HFD that does not have unique factorization. But although ρ(R[x]) √ = 1, the factorizations √ can be exotic. The elements 2x2 + 2x + 3, 2, 2x + 1 + −5, and 2x + 1 − −5 are all elements of Irr(R[x]). Consider the factorizations √ √ (2)(2x2 + 2x + 3) = (2x + 1 + −5)(2x + 1 − −5). The upshot is that even in this relatively “nice” domain, the factorizations of elements can depend on how the polynomials break down (with respect to degree) in a nontrivial way. It is well-known that if R is a UFD with quotient field K, then any irreducible polynomial over R[x] remains irreducible over K[x]. More generally, domains, R, for which every irreducible polynomial of degree at least one remains irreducible in K[x] would seem to be the basic case to solve. For these domains, it would seem likely that there is a more direct correlation between ρ(R) and ρ(R[x]), since there must be a one to one correspondence between irreducible factors of degree at least 1 for any two irreducible factorizations of the same element. Certainly, bad factorizations of the ilk of the previous two examples are precluded (although we feel obligated to point out again that the second example is an HFD). Although it may seem reasonable to consider domains where irreducibles of degree at least one in R[x] remain irreducible in K[x], it is not obvious that in this case ρ(R) = ρ(R[x]). To illustrate the problem, consider the irreducible factorizations π1 π2 · · · πk f1 (x)f2 (x) · · · fm (x) = ξ1 ξ2 · · · ξt g1 (x)g2 (x) · · · gn (x) with each πi , ξj ∈ Irr(R) and fi (x), gj (x) all irreducible of degree at least one. ELASTICITY IN POLYNOMIAL-TYPE EXTENSIONS 5 Even if we have that m = n and each fi (x) and gj (x) pair off (up to units in K), there is no guarantee that the ratio of k and t are within the elasticity bounds of R (precisely because there is ambiguity up to units in K). That being said, we present the following theorem. The rest of the paper will be devoted to establishing this result. The theorem will follow quickly from our classification of domains with this property. Theorem 2.9. Let R be a domain such that every irreducible of R[x] of degree greater than or equal to 1 is irreducible in K[x]. Then if ρ(R) is defined, then ρ(R) = ρ(R[x]). As noted before, these conditions are not necessary as Example 2.8 shows. 3. Irreducibles of R[x] versus irreducibles of K[x] In this section, we use the following facts and definitions many times without further mention. a) If F is a nonzero fractional ideal of R, then Fv = (F −1 )−1 . b) The elements a1 , a2 , · · · , an ∈ R have a greatest common divisor provided that (a1 , a2 , · · · , an )v is principal. c) If f ∈ K[x], the ideal generated by the coefficients of f is denoted Af . d) The greatest common divisor of a1 , a2 , · · · , an ∈ R will be denoted [a1 , a2 , · · · , an ] if it exists. Our goal in this last section is to characterize those domains R having the following property: (P) every nonconstant irreducible polynomial f ∈ R[x] is irreducible in K[x] The techniques used in the proof we shall give strongly resemble those used in the classical proof that every polynomial ring R[x] over a UFD is again a UFD. The proof of this classical result boils down to showing that any UFD, R, satisfies property (P) above. Gauss’s Lemma, which states that the product of two primitive polynomials is primitive, is the key which allows this proof to go through in the UFD case. Conditions under which the product of two primitive polynomials remains primitive has been studied in more general domains (see for instance, [T]). It turns out that the domains satisfying property (P) must satisfy a condition somewhat stronger than Gauss’s Lemma; they must satisfy what is called the PSP-property. Definition 3.1. A domain R has the PSP-property if whenever a0 +a1 x+· · ·+an xn is a primitive polynomial over R and z ∈ (a0 , a1 , · · · , an )−1 , then z ∈ R. Polynomials a0 + a1 x + · · · + an xn satisfying the above definition are called superprimitive. Thus a domain has the PSP-property if every primitive polynomial is superprimitive. For integral domains, the following implications are well-known UFD =⇒ GCD =⇒ PSP-property =⇒ GL-property =⇒ AP-property. and in [AQ] it is shown that all of these types are equivalent for atomic domains. Arnold and Sheldon [AS, Example 2.5] gave an example of a domain satisfying Gauss’s Lemma (such domains are said to have the GL-property), but failing to have the PSP-property. The domain they considered was the domain F [{xα : α > 6 MARK BATELL AND JIM COYKENDALL 0}, {y α : α > 0}, {z αxβ : α, β > 0}, {z αy β : α, β > 0}]. Here, all exponents α and β are understood to be taken from the field Q of rational numbers. This is an example of a monoid domain, and can intuitively be thought of as the ring of all formal polynomials in the given ”indeterminates” with coefficients in F , the field of two elements. We note that yt + x is a primitive polynomial in t that fails to be superprimitive, as z ∈ (x, y)−1 . This leads us to the following theorem. Proposition 3.2. Assume every nonconstant irreducible f ∈ R[x] is irreducible in K[x]. Then R is integrally closed and has the PSP-property. Proof. Assume R is not integrally closed. Choose an element ω ∈ K that satisfies a monic irreducible polynomial f ∈ R[x] of degree ≥ 2. Since ω is a root of f , the division algorithm in K[x] implies that f = (x − ω)g, where g is a polynomial in K[x] of degree ≥ 1. Hence f is irreducible over R but reducible over K. This is a contradiction. Next, we assume R does not have the PSP-property. Let y0 + y1 x + · · · + yn xn be a primitive polynomial and let z ∈ K be such that z ∈ (y0 , y1 , · · · , yn )−1 but z∈ / R. In the collection of all primitive polynomials that are not superprimitive, we assume that I := y0 + y1 x + · · · + yn xn is one of minimal degree. In K[x] we have the factorization yn xn+1 + (yn−1 + zyn)xn + · · · + (y0 + zy1 )x + zy0 = (x + z)(yn xn + yn−1 xn−1 + · · · + y1 x + y0 ) where the polynomial f on the left hand side belongs to R[x]. We claim that f is irreducible over R. If f = gh for some g, h ∈ R[x] then x+z divides g or h in K[x], say g = (x + z)p(x). Since R is integrally closed, p(x) ∈ R[x] (see [G, Theorem 10.4]), say p(x) = ak xk + ak−1 xk−1 + · · · + a1 x + a0 . Then g(x) = ak xk+1 +(ak−1 +zak )xk +· · ·+(a0 +za1 )x+za0 , so that za0 , za1 , · · · , zak ∈ R, and hence p(x) is not superprimitive. But p(x) is a factor of the primitive polynomial I. Hence p(x) is primitive, so that the minimality assumption on I implies that k = n. It follows that h is a unit so that f is irreducible over R, but not over K, the desired contradiction.  Thus in our search for the domains satisfying property (P), we may restrict our attention to integrally closed domains having the PSP-property. To show that a particular domain actually has property (P), one would probably employ the following strategy: Suppose f ∈ R[x] is a nonconstant polynomial that is irreducible over R, but fails to be irreducible over the field of fractions K, say f = gh in K[x]. Now “clear the denominators,” that is, choose nonzero b, d ∈ R such that bdf = (bg)(dh) and bg, dh ∈ R[x]. At this point in the proof, we would probably need to find some way to cancel out b and d to get a contradiction, namely, that f = g ′ h′ for some g ′ , h′ ∈ R[x]. It turns out that if R has the PSP-property, then we can assert, after clearing denominators, that the greatest common divisor of the coefficients of bdf exists and is equal to bd, as shown by the following. Proposition 3.3. Let R be a domain. The following are equivalent. a) R has the PSP-property. b) Whenever the elements a1 , a2 , · · · , an ∈ R have a greatest common divisor and 0 6= b ∈ R, then [ba1 , ba2 , · · · , ban ] = b[a1 , a2 , · · · , an ]. Proof. Assume R has the PSP-property and [a1 , a2 , · · · , an ] = g. Given b ∈ R, it is clear that bg is a common divisor of ba1 , ba2 , · · · , ban . If x is some other common a1 a2 an −1 . This implies bg divisor, then bg x ∈ ( g , g ,··· , g ) x ∈ R since R is PSP. In other words, x|bg so that [ba1 , ba2 , · · · , ban ] = bg ELASTICITY IN POLYNOMIAL-TYPE EXTENSIONS 7 Conversely, assume b) holds and rs ∈ (a1 , a2 , · · · , an )−1 , where a0 + a1 x + · · · + an xn is some primitive polynomial over R. Then s|rai for all i, so b) implies that  s|r. Thus rs ∈ R, so that R is PSP. Proposition 3.4. Let R be an integrally closed PSP-domain. The following are equivalent. a) Every nonconstant irreducible polynomial f ∈ R[x] is irreducible in K[x] b) Whenever f = gh in R[x] and the greatest common divisor of the coefficients of f exists, then the greastest common divisor of the coefficients of g exists Proof. b) =⇒ a). Assume b) holds. Let f ∈ R[x] be a nonconstant irreducible polynomial (hence the greatest common divisor of the coefficients is 1). Suppose f = gh, where g, h ∈ K[x] have degrees > 1. Choose nonzero b, d ∈ R such that bg, dh ∈ R[x]. Then we have the equation bdf = (bg)(dh) in R[x], and since R is PSP, Proposition 3.3 implies that the greatest common divisor of the coefficients of bdf exists and is equal to bd. Hence the greatest common divisor of the coefficients of bg exists, say u, and the greatest common divisor of the coefficients of dh exists, bd say v. Note that uv divides the coefficients of bdf . Hence uv f = g1 h1 , where g1 , h1 bd bd is a unit. But are primitive. Since R has the GL-property, uv f is primitive, so uv then f is reducible over R, a contradiction. a) =⇒ b). Assume a) holds. Suppose f = gh in R[x] and the greatest common divisor of the coefficients of f exists, say s. We can assume deg f > 1. Then f = sf ′ , where f ′ is primitive. Since f ′ is primitive, f ′ is the product of irreducibles, say f ′ = f1 f2 · · · fk . By unique factorization in K[x], g = uf1 f2 · · · fr for some r 6 k (without loss of generality) and some u ∈ K. Since R is PSP, u ∈ R and the greatest common divisor of the coefficients of g equals u.  In the paper [AS], Arnold and Sheldon proved the following theorem. Theorem 3.5. Let R be a domain with quotient field K. The following are equivalent. 1) R[x] is an AP-Domain 2) R[x] is a GL-Domain 3) Each of the following holds: (α) R has the PSP-property (β) R is integrally closed, and (γ) Whenever B, C are finitely generated fractional ideals of R such that (BC)v = R, then Bv is principal Condition (γ) clearly has a resemblance to condition b) of the proposition we just proved. In fact, we have the following theorem. Proposition 3.6. Let R be an integrally closed PSP-domain. The following are equivalent. a) Every nonconstant irreducible polynomial f ∈ R[x] is irreducible in K[x] b) Whenever f = gh in R[x] and the greatest common divisor of the coefficients of f exists, then the greatest common divisor of the coefficients of g exists c) Whenever B, C are finitely generated fractional ideals of R such that (BC)v = R, then Bv is principal Proof. We already proved the equivalence of a) and b). 8 MARK BATELL AND JIM COYKENDALL b) =⇒ c). Suppose (BC)v = R. Let g be a polynomial whose coefficients are the generators of B (if generators of B are chosen in order B = (b0 , b1 , · · · , bn ) we will define, g = b0 + b1 x + · · · + bn xn ) and let h be defined similarly with respect to chosen generators of C. Choose nonzero b, c ∈ R such that bg, ch ∈ R[x]. Since R is integrally closed, (Agh )v = (Ag Ah )v [G, Proposition 34.8], so that (Agh )v = R. Since (bcAgh )v = bc((Agh )v ) [G, Proposition 32.1(1)], we therefore have (bcAgh )v = bcR. This implies that the greatest common divisor of the coefficients of bcgh equals bc. Since bcgh = (bg)(ch), it follows by assumption that the greatest common divisor of the coefficients of bg exists, so that (Abg )v = (bB)v is principal [AQ, Theorem 3.3]. Hence Bv is principal. c) =⇒ b). Suppose f = gh in R[x] and the greatest common divisor of the coefficients of f exists, say s. Let f1 = fs and h1 = hs . Then (Ag Ah1 )v = (Agh1 )v = (Af1 )v , so (Ag Ah1 )v = R. Hence (Ag )v is principal. Hence the greatest common divisor of the coefficients of g exists.  Putting together the results of this section we obtain our main result, which is the following. Theorem 3.7. Let R be a domain with quotient field K. The following are equivalent. 1) Every nonconstant irreducible polynomial f ∈ R[x] is irreducible in K[x] 2) R[x] is an AP-Domain 3) R[x] is a GL-Domain 4) Each of the following holds: (α) R has the PSP-property (β) R is integrally closed, and (γ) Whenever B, C are finitely generated fractional ideals of R such that (BC)v = R, then Bv is principal We close with a few observations. First, it is of note that if R[x] is atomic, then R[x] is an AP-domain if and only if R is a UFD. Also we note that our main theorem of the previous section has its resolution in this stronger result. Indeed, if we have the hypothesis of Theorem 2.9, then R[x] is an AP-domain. Hence R is an AP-domain. If R has at least one atom then ρ(R) = ρ(R[x]) = 1. Finally, if R is a Prüfer domain satisfying property (P) then since every finitely generated ideal is invertible we must have Bv principal for each B. Hence R is a GCD-domain. And if [a0 , · · · , an ] = 1, then (a0 , · · · , an )−1 = R. Hence there exist r0 , · · · , rn ∈ R such that r0 a0 + · · · + rn an = 1. We conclude that the greatest common divisor of a finite set of elements is a linear combination of that set, and so R is a Bezout domain. Thus we obtain [G, Theorem 28.8], which says (paraphrasing) that a Prüfer domain R has property (P) iff R is Bezout. References [AQ] [AS] [Ca] [Co] [C1] D.D. Anderson and R.O. Quintero, Some generalizations of GCD-domains, Lecture Notes in Pure and Appl. Math., 189, Marcel Dekker, 1997, 189–195. J. Arnold and P. Sheldon, Integral domains that satisfy Gauss’s lemma, Michigan Math. J. 22 (1975), 39–51. L. Carlitz, A characterization of algebraic number fields with class number two, Proc. Amer. Math. Soc. 11 (1960), 391–392. H. Cohn, “Advanced Number Theory,” Dover Publications, New York, 1980. J. Coykendall, Half-factorial domains in quadratic fields, J. Algebra, 235 (2001), 417–430. ELASTICITY IN POLYNOMIAL-TYPE EXTENSIONS [C2] [CM] [CZ] [G] [T] [Za] 9 J. Coykendall, A characterization of polynomial rings with the half-factorial property, Lecture Notes in Pure and Appl. Math., 189, Marcel Dekker, 1997, 291–294. J. Coykendall and B. Mammenga, An embedding theorem, J. Algebra, 325 (2011), 177– 185. J. Coykendall and M. Zafrullah, AP-domains and unique factorization, J. Pure Appl. Algebra, 189 (2004), 27–35. R. Gilmer, Multiplicative Ideal Theory, Marcel Dekker, 1972. H. Tang, Gauss’ lemma, Proc. Amer. Math. Soc. 35 (1972), 372–376. A. Zaks, Half-factorial domains, Israel J. Math., 37 (1980), 281–302. Department of Mathematics, North Dakota State University, Fargo, ND 58108 E-mail address: [email protected] Department of Mathematics, North Dakota State University, Fargo, ND 58108 E-mail address: [email protected]
0math.AC
Towards Practical, Precise and Parametric Energy Analysis of IT Controlled Systems Bernard van Gastel Marko van Eekelen Faculty of Management, Science and Technology, Open University of the Netherlands, Heerlen, The Netherlands Institute for Computing and Information Sciences, Radboud University, Nijmegen, The Netherlands {Bernard.vanGastel,Marko.vanEekelen}@ou.nl Energy consumption analysis of IT-controlled systems can play a major role in minimising the overall energy consumption of such IT systems, during the development phase, or for optimisation in the field. Recently, a precise energy analysis was developed, with the property of being parametric in the hardware. In principle, this creates the opportunity to analyse which is the best software implementation for given hardware, or the other way around: choose the best hardware for a given algorithm. The precise analysis was introduced for a very limited language: ECA. In this paper, several important steps are taken towards practical energy analysis. The ECA language is extended with common programming language features. The application domain is further explored, and threats to the validity are identified and discussed. Altogether, this constitutes an important step towards analysing energy consumption of IT-controlled systems in practice. 1 Introduction Energy analysis of IT systems is an important emerging field. Its focus is on analysing the software that controls the IT system using models of the components of the system under analysis. Components can vary from small components such as a sensor in the Internet of Things to large subsystems as present in self-driving cars. As traditionally many savings did occur on the hardware side of a computer, energy consumption is almost a blind spot when developing software. Each next hardware generation consumed less energy to perform the same amount of work. However, recently this development has lost its pace. At the same time, it becomes more and more clear that software has a huge impact on the behaviour and the properties of devices it runs on. A recent example of software influencing the working of a device is the Volkswagen scandal. The car manufacturer used software to detect if the car was being tested. If this was found to be the case, the diesel motor was programmed to operate in such a way that it exhausted less toxic gases and fumes. In [13] it is calculated that 44,000 years of human life are lost in Europe because of the fraud, which lasted at least six years. Another example is fridges from Panasonic, which could detect if a test was going on and suppressed energy intensive defrost cycles during this test. These are negative examples, but they do make clear that the software is in control of the device and its (energy) behaviour. G. Bonfante, G. Moser (Eds.): 8th Workshop on Developments in Implicit Computational complExity and 5th Workshop on Foundational and Practical Aspects of Resource Analysis (DICE-FOPARA 2017) EPTCS 248, 2017, pp. 24–37, doi:10.4204/EPTCS.248.7 c B. van Gastel and M. van Eekelen This work is licensed under the Creative Commons Attribution License. B. van Gastel and M. van Eekelen 25 Although the software is evidently in control of the devices, there is almost no time dedicated in most computer science curricula to the energy efficiency of software. This is peculiar since energy is of vital importance to the modern (software) industry. For years, data centres have been located at places where the energy is cheap, and since the rise of the smartphone more software engineers recognise that to get good user reviews, their software should not rapidly deplete the battery charge of the user’s phone. Due to this lack of educational attention to energy-aware programming, most aspiring programmers never learn to produce energy efficient code. Software engineers have trouble assessing how much energy will be consumed by their software on a target device, especially when the software is run on a multitude of different systems. With the advent of the internet of things, where software is increasingly embedded in our daily life, the software industry should become aware of their energy footprint, and methods must be developed to assist in reducing this footprint. Furthermore, the combination of many individual negative effects can also affect our society at large. Although this effect is less direct, it is no less essential. If devices that are present in large quantities in our society all exhibit the same negative behaviour, such as incurring needlessly a too high energy consumption, they can impact public utilities and our economy and will consume the finite resources of Earth even faster. Governments increasingly recognise this societal effect, as indicated by the new laws in the European Union issuing ecodesign requirements for many kinds of devices. One of the aims of these requirements is to make devices more energy efficient. Examples of product categories with ecodesign requirements include vacuum cleaners, electrical motors, lighting, heaters, cooking appliances, televisions and coffee machines. Even requirements leading to relative small improvements in energy efficiency can yield large results at scale, even in the case of devices of which one would expect no significant electricity savings to be possible. Modern devices and appliances are controlled by software, which makes analysing the energy consumption challenging of these devices, as the behaviour of its software is difficult to predict. To analyse the consumption of hardware, the software controlling the hardware needs to be analysed together with the hardware. Our approach To this end, we proposed in [5] a hybrid approach, joining energy behaviour models of the hardware with the energy-aware semantics of software and a program transformation. The interface between hardware and software is made explicit and has to be well defined, allowing for exchanging of hardware or software components. Using this parametric approach, multiple implementations can be analysed. Such an approach can be used on design level or for optimisation. One can e.g. choose the best software implementation for given hardware, or the other way around: choose the best hardware for a given algorithm. The described approach derives energy consumption functions. These energy functions signify the exact energy behaviour when the software is executing and controlling the modelled hardware. Hardware is modelled as a finite state machine, with both the states and transitions labelled with energy consumption. The programs that can be analysed are written in the software language ECA, which is an imperative language inspired by C and Java. Currently, only a limited set of program constructs is supported. The most important contributions of this article are: • extended support for common language features in the software to be analysed: adding types, data structures, global variables, and recursion; 26 Towards Practical, Precise and Parametric energy Analysis of IT Controlled Systems • description of application domain of the ECA energy analysis method; • identified threats to the validity of proposed approach and a discussion of how to deal with these threats. Overview Section 2 introduces the ECA energy analysis. In section 3 extensions of the ECA language are defined including the new derivation rules that are needed for the analysis. Section 4 explores the application domain of ECA. The validity of the results of the analysis is discussed in section 5. Finally, we conclude with related work, future work and conclusions in sections 6 and 7. 2 Introduction to energy analysis with ECA Energy analysis combines hardware modelling with the energy-aware semantics of software. To this end the language ECA is specified, on which our analysis is targeted. Based on this, a semantics of this language can be defined, which includes energy consumption. Using this energy-aware semantics, a program transformation is given. This transformation generates an executable model, using a parametric function. If both a concrete input and one or multiple hardware models are specified, the parametric function will result in the energy consumption occurring when running the software on the given hardware. To illustrate this process, we start with the hardware modelling and continue with describing for some program constructs the semantic rules, the program transformations and the effect on hardware. This is an introductory overview. For further details, the reader is referred to [5, 6, 10]. The hardware conceptually consists of a component state and a set of component functions which operate on the component state. We use finite state models to model these hardware components, with the transitions constituting function calls on the hardware. Energy usage is expressed by labelling both the vertices and edges with energy consumption, which can be in any unit. Labels on vertices constitute time-bound energy consumption, i.e. power draw. Edges are labelled with the consumption of a certain amount of energy, not time-bound but corresponding to the transition. Depending on your needs, you can model energy consumption in one way or the other. Besides the ones above described, there are no additional requirements. We use the power draw function φ which translates a component state to a power draw. The result of this function is used to calculate energy consumption for the time spent in a specific state. All transitions in a component model are explicit in the ECA source code. We use the notation C:: f to refer to a function f() operating on a component C. Multiple different hardware components can be used simaltaniously from the same program, the components are differentiated by a unique name (substituted in the rules for C). Besides this addition, the ECA language is a fairly default imperative language sporting functions, a single signed integer type, conditionals, looping constructs and expressions that can be used as statements. Next, we move on to the semantics, for now without energy added. Besides the function environment ∆ and the program state σ , we have the (hardware) component states Γ. This makes the effect on the hardware explicit. The effect of the component function C:: f is split into two: the effect function δ C:: f and a function rvC:: f calculating the return value of the component call. Both are working on the component B. van Gastel and M. van Eekelen 27 8J 1 J/s b 4J start a 3J c 10 J 8 J/s 0 J/s 1J d 4 J/s Figure 1: Hardware model with the energy consumption expressed in Joule. state retrieved from Γ (by Γ(C)). The straightforward semantic definition of the component function sCmp, not taking energy into account, is given below. e ∆ ` he1 , σ , Γi → − ha, σ 0 , Γ0 i e ∆,C:: f = (δ C:: f , rvC:: f ) ` hC:: f (e1 ), σ , Γi → − hrvC:: f (Γ0 (C), a), σ 0 , Γ0 [C ← δ C:: f (Γ0 (C), a)]i (sCmp) Adding to it, the energy cost of a component function call consists of including the time taken to execute this function and the explicit energy cost attributed to this call resulting in rule esCmp. e ∆; Φ ` he1 , σ , Γi → − ha, σ 0 , Γ0 , E 0 i e ∆,C:: f = (. . . , . . . ,t f , E f ); Φ ` hC:: f (e1 ), σ , Γi → − h. . ., . . ., . . ., E 0 + Φ(Γ0 ) · t f + E f i (esCmp) The approach works by transforming these semantic rules into higher order expressions. When executed on a concrete program state PState and component state CState, this expression yields the energy consumption (and new states and possible value of an ECA expression). Expressions from the ECA language are transformed into rules that result in a tuple of three elements: a value function V , a state update function Σ (for both program state and the hardware state), and an energy consumption function E. Statements from the ECA language are only transformed into the latter two. These compositional expressions are composed with higher order combinators. One of these combinators is the composition operator >>>, which first applies the left-hand side, and on the resulting state applies the right-hand side. Another is the + operator, which is a higher order addition operator: when executed, it calculates the energy consumptions of the two operands based on the input states and adds them together. To explain the component call rule btCmp and function call rule btCall, we need an operator for higher order scoping. This operator creates a new program environment but retains the component state. It can even update the component state given a Σ function, which is needed because this Σ needs to be evaluated 28 Towards Practical, Precise and Parametric energy Analysis of IT Controlled Systems using the original program state. The definition is as follows: [x 7→ V, Σ] : Var ×(PState × CState → Value) × (PState × CState → PState × CState) → (PState × CState → PState × CState) [x 7→ V, Σ](ps, cs) = ([x 7→ V (ps, cs)], cs0 ) where ( , cs0 ) = Σ(ps, cs) We also need an additional operator split, because the program state is isolated, but the component state is not. The split function forks the evaluation into two state update functions and joins the results together. The first argument defines the resulting program state; the second defines the resulting component state. ∆ ` e : hVex , Σex , . . .i ∆, C:: f = (xf ,Vf , Σf , . . . , . . .) ` C:: f (e) : h[xf 7→ Vex , Σex ] >>> Vf , split(Σex , [xf 7→ Vex , Σex ] >>> Σf ), . . .i (btCmp) The environment ∆ is extended for each component function C :: f with two elements: an energy judgment E f and a run-time t f . Time independent energy usage can be encoded into this E f function. For functions defined in the language, the derived energy judgement is inserted into the environment. Using the patterns described above the component function call is expressed as: ∆ ` e : hVex , Σex , Eex i ∆, C:: f = (xf , . . . , . . . , E f ,t f ) ` C:: f (e) : h. . ., . . ., Eex + (Σex >>> (tdec (t f ) + E f ))i (etCmp) This concludes the short introduction to energy analysis with ECA. For a more thorough coverage, see [5, 6, 10]. 3 Increasing the expressivity of ECA To bridge the gap between practical programming languages and ECA, several extensions to ECA are introduced in this section: adding data structures and types, global variables and recursion. 3.1 Adding data structures and types The only supported type in the ECA language was a signed integer. There were no explicit Booleans, floating point numbers or data structures. To add those, types of variables need to be supported. We need multiple modifications for this change: modifying the grammar, and adding type distinction to both the semantic environments and program transformations. We consider variables to be passed by-value. Functions can have side effects on the components and, as introduced in section 3.2, on the global variables. Functions are statically scoped. Recursion is now supported, and the changes needed to the semantic rules and program transformations are discussed in section 3.3. B. van Gastel and M. van Eekelen 29 The extended BNF grammar for the ECA language is defined in listing 2. We presume there is a way to differentiate between identifiers that represent variables hvari, function names hfun-namei, components hcomponenti, and constants hconsti. Functions on components can now have a variable number of arguments and optionally return a value (if not, the type void should be used). A constructor for data structures is included, with a syntax like a function call with as name the type of the data structure), and a construct to access fields of a data structure (with the . operator). A type checking phase is now needed to detect typing errors, like using a data structure as a condition in the if construct. Only correctly typed programs are considered. The language retains an explicit construct for operations on hardware components (e.g. memory, storage or network devices). The notation C:: f refers to a function f() operating on a component C. This allows us to reason about components in a straightforward manner. hprogrami ::= hstruct-def i hprogrami | hfun-def i hprogrami | htypei hvari ‘=’ hexpri | ε hstruct-def i ::= ‘struct’ hstruct-namei ‘begin’ hstruct-fieldsi ‘end’ hstruct-fieldsi ::= htypei hfield-namei ‘;’ hstruct-fieldsi | ε htypei ::= ‘void’ | ‘bool’ | ‘int’ | ‘float’ | hstruct-namei hfun-def i ::= htypei hfun-namei ‘(’ [hfun-argsi] ‘)’ ‘begin’ hexpri ‘end’ hfun-argsi ::= htypei hnamei ‘,’ hfun-argsi | htypei hnamei hbin-opi ::= ‘+’ | ‘-’ | ‘*’ | ‘>’ | ‘>=’ | ‘==’ | ‘!=’ | ‘<=’ | ‘<’ | ‘and’ | ‘or’ hexpri ::= | | | | | | | hargsi ::= hexpri ‘,’ hargsi | hexpri hstmti ::= | | | hconsti | hvari | hexpri hbin-opi hexpri hstruct-namei ‘(’ hargsi ‘)’ hexpri ‘.’ hfield-namei htypei hvari ‘=’ hexpri hvari ‘=’ hexpri hcomponenti ‘::’ hfun-namei ‘(’ [hargsi] ‘)’ hfun-namei ‘(’ [hargsi] ‘)’ hstmti ‘,’ hexpri ‘skip’ | hstmti ‘;’ hstmti | hexpri ‘if’ hexpri ‘then’ hstmti [‘else’ hstmti] ‘end’ ‘repeat’ hexpri ‘begin’ hstmti ‘end’ ‘while’ hexpri ‘begin’ hstmti ‘end’ Listing 2: Extended BNF grammar for the ECA language, with types and data structures added, as well as one construct in hprogrami for global variable support (see next section). 30 Towards Practical, Precise and Parametric energy Analysis of IT Controlled Systems A typical (predictive recursive descent) parser of this extended language is in the LL(2) class of parsers, with a small second pass. This second pass is needed, to avoid a possible infinite lookahead that is needed to differentiate between expressions and statements. During the first phase expressions and statements are combined into one construct. The small post-processing step differentiates between the two. In this way, the language can still be efficiently parsed in a simple manner. Next are the adjustments to the semantic rules. Because a type checking phase was added, no typing error can occur when applying the semantic rules. Although the meaning differs, the syntax of the rules remains largely the same. Likewise, we adjust the program transformation rules. To support the new grammar rules, we add additional rules to the existing body of rules. Below is the rule for field access on a variable listed. e ∆; Φ ` he, σ , Γi → − hv, σ 0 , Γ0 , E 0 i e ∆; Φ ` he.a, σ , Γi → − hv(a), σ 0 , Γ0 , E 0 + Φ(Γ0 ) · tfieldaccess i 3.2 (esField) Global variables Control software often works with global variables. To support analysis of this control software we consequently need support in our ECA language for global variables. Hardware components are already handled as global state. To also support global variables, we need to introduce an additional global program state environment in addition to the local program state environment as it is currently used. In the semantics, an additional global program state G is added to all tuples in every rule. Lookups are first performed in the local scope, the already existing σ . Although for scoping a layered program state can be preferred, or one based on indirections, we use a different approach. Because of special handling of the, by definition global, hardware components, the global program state is handled in the same manner as the global hardware component states. We add rules in the semantics for global variable definitions. The assignment rule is split depending if you assign a global or local variable. The variable loop is adjusted to first look in the local scope and if nothing is found, continue in the global scope. We start with introducing the global assignment rule. e ∆; Φ ` he1 , σ , G, Γi → − hn, σ 0 , G0 , Γ0 , E 0 i e ∆; Φ ` hx := e1 , σ , G, Γi → − hn, σ 0 , G0 [x ← n], Γ0 , E 0 + Φ(Γ0 ) · tassign i (esGlobAssign) Next, we adjust the variable lookup rule, with a ∪ defined on two program environments. This ∪ creates one environment, according to the scoping rules. It a variable is defined in both, the left-hand argument to the ∪ is normative. e ∆; Φ ` hx, σ , GiΓ → − h(σ ∪ G)(x), σ , G, Γ, Φ(Γ) · tvar i (esVar) For the program transformation rules, more extensive changes are needed. We extend the (global) component states CState with a global program state of type PState. For clarity of presentation, we introduce the type GState (global state) which is a combination of PState × CState. In this way, only the higher order combinators need to be changed, as the rules themselves remain intact. Most changes are only to the signature of those combinators. As a result, these combinators retain their compositional B. van Gastel and M. van Eekelen 31 properties. As an example, the higher order scoping rule of section 2 is redefined below. [x 7→ V, Σ] : Var ×(PState × GState → Value) × (PState × GState → PState × GState) → (PState × GState → PState × GState) [x 7→ V, Σ](ps, gs) = ([x 7→ V (ps, gs)], gs0 ) where ( , gs0 ) = Σ(ps, gs) The lookup function that the variable lookup rule depends on is redefined as follows: lookupx : PState × GState → Value lookupx (ps, gs) = ps(x) if x exists in local program scope ps lookupx (ps, gs) = Variables(gs)(x) 3.3 if x exists in the global variables part of gs Adding recursion We can define the function call in a similar way as the component call, which was introduced in section 2. However, to support recursion, a special subst higher order function is introduced to unfold the function definition once, just before it is executed on a concrete environment. The subst is defined as follows, with PState signifying a program state, GState signifying the global state (extended in section 3.2 to be both the component states and the global variables) and T a type variable (depending on whether a state update or a value function is substituted): subst : (PState × GState → T ) × (PState × GState → T ) → (PState × GState → T ) subst(T, R)(ps, gs) = (T [R ← subst(T, R)])(ps, gs) A recursive call is represented by the abstract higher-order function rec, which is a placeholder for applying substitution on. There are multiple variants, depending on the resulting type, with the recV one for a resulting value function, and the recΣ one for a resulting state update function. recV : PState × GState → Value recΣ : PState × GState → PState × GState If there is a function body B computing a Value with for example recV in it, the value of the recursive function can be computed by executing subst(B, recV ). As long as the original function terminates on the given input environment, this analysis will terminate on the same input. This is the essential difference from the btCmp rule, as can be seen in the definition of btCall below: ∆, f = (xf ,Vf , Σf ) ` e : hVex , Σex i ∆v , f = (xf ,Vf , Σf ) ` f (e) : h[xf 7→ Vex , Σex ] >>> subst(Vf , recV ( f )), split(Σex , [xf 7→ Vex , Σex ] >>> subst(Σf , recΣ ( f ))) i (btCall) 32 Towards Practical, Precise and Parametric energy Analysis of IT Controlled Systems For each language function, a definition is placed in ∆v using the btFuncDef rule. The body of the function is analysed, and recursive calls to the function are replaced with rec placeholders using the btRec rule. To support this, the function definition rule inserts a special definition in the function environment ∆v , on which the btRec rule works. This leads to the following definition of btFuncDef, with P the remaining program definition: ∆v , f = (x) ` e : hVex , Σex i ∆v , f = (x,Vex , Σex ) ` P : Σst (btFuncDef) ∆v ` function f (x) begin e end P : Σst The placeholders are inserted using the btRec rule. This rule analyses the expression used as the argument, like the component and function call rules do. The definition is in fact very similar to those definitions: ∆v , f = (xf ) ` e : hVex , Σex i ∆v , f = (xf ) ` f (e) : h[xf 7→ Vex , Σex ] >>> recV ( f ), split(Σex , [xf 7→ Vex , Σex ] >>> recΣ ( f ))i 4 (btRec) Exploring the application domain of ECA The foreseen application area of the proposed analysis is in predicting the energy consumption of control systems, where software controls peripherals. This includes control systems in factories, cars, aeroplanes, smart-home applications, etc. Examples of hardware components range from heaters to engines, motors and urban lighting. Depending on the target device energy consumption can be electricity, gas, water, or any other resources where the consumption increases monotonically. The proposed analysis can predict the energy consumption of multiple algorithms and different hardware configurations. The choice of algorithm or configuration may depend on the expected workload. This makes the proposed technique useful for both programmers and operators. Below, we discuss the application domain of ECA in a way which is partly and informally published in the lecture notes for the TACLe PhD summer school in 2016 in Yspertal, Austria [7]. The possibility to abstract from the actual hardware specification makes the proposed approach still applicable even when no final hardware component is available for basing the hardware model on, or when such a model is not yet created. We observe that many decisions are based on relative properties between systems. Abstracting hardware models can be used to focus e.g. on the relative differences between component methods and component states. Compared to the Hoare logic in [10], many restrictions are not present in ECA. Foremost, this type system does not have the limitation that state change cannot depend on the argument of a component function nor that the return value of a component function cannot depend on the state of the component. More realistic models can, therefore, be used. This widens the number of applications, as behaviour of hardware can be modelled that previously could not be expressed in the modelling. However, there are still certain properties hardware models must satisfy for ECA to be applicable. Foremost, the models have to be discrete. Energy consumption that gradually increases or decreases over time can therefore not be modelled directly. However, discrete approximations may be used. Secondly, every state change has to be the consequence of an explicit application of a component function. So, implicit state changes by hardware components cannot be expressed. B. van Gastel and M. van Eekelen 33 The quality of the derived energy expressions is directly related to the quality of the used hardware models. Depending on the goal, it is possible to use multiple models for one and the same hardware component. For instance, if the hardware model is constructed as a worst-case model, this approach will produce worst-case information. Similarly one can use average-case models to derive average case information. It can be difficult to obtain detailed hardware models, sometimes for the simple reason that the hardware is yet to be developed and not ready. We expect that, in cases where multiple software implementations are to be compared, the relative consumption information will be sufficient to support design decisions. This allows for constructing abstract models, with not much detail but including the relevant information which is needed to make a proper comparison. However, this abstraction could impact the validity of the results (as a realistic model could yield different results). A class of applications where the approach described in this article could be useful is a company that produces many variations of the same device. Variations occur based on local requirements, or on regional differences in the electric grid, or on different requirements set by integrators or consumers, or any combination thereof. The ECA approach allows for quickly designing those variations, and having a clear view on how changes will impact all those variations. 5 Validity The analysis is sound and complete as can be proven by induction on the syntactic structure of the program in a similar way as in an earlier version of our analysis described in [14], in which the proof is more complex due to the presence of approximations. An analysis method may be in itself sound and complete but the validity of applying the method in practice can not automatically be inferred from that. There are several validity constraints to the technique as it is discussed in this article. The quality of the results depends directly on the quality of the component models used. There are severe restrictions on component models, e.g. the power draw is assumed to be constant in every state of the component. This is in practice not true for most devices, e.g. the power draw can be a function of time. This has to be modelled in an abstract discretised component model. It is to be seen whether with discrete approximations for real world hardware component models can be created with a level of precision that is suited to make accurate energy estimates. It is hard to construct and validation such component models on the right level of abstraction, as there are several real world practical issues. If basing the component model on specifications from hardware vendors, all kinds of errors in the specification are transferred to the component model. Production errors in the hardware, and eventually the degradation of hardware, can induce erratic energy consumption behaviour that does not conform to the specification/component model. Validating a component model with a test setup is hard, as energy is hard to measure. Small differences in energy consumption are hard to measure correctly, and outside conditions like temperature can influence the results greatly. Energy differs significantly from other kinds of resources (e.g. memory and time), which are measurable with great precision within a computer by the computer itself. Introducing a standard energy consumption measurement interval might help in making measurements more uniform. Validating if the number of states of a component model is the same as the actual number of states of 34 Towards Practical, Precise and Parametric energy Analysis of IT Controlled Systems an actual hardware component, is a hard problem by itself. With powerful models, the actual validation process with real hardware might just take too much time forcing the user to settle for a feasible but not fully validated model. There is another potential source of not matching the actual energy consumption of a realistic situation. Compiler errors and optimisations can impact the (energy) behaviour of a source program greatly. The compiler has influence on the timing of high-level language constructs. The timing constants used for these language constructs should match the time it takes to execute those language constructs. Such a match could be guaranteed by creating a resource consumption certified compiler in a similar way as was done in the CompCert certified compiler project [11]. Of course this would require the availability of energy aware semantics both on the source and the target level. An even more complicating matter may be the complex design of modern processors executing the software. Even relatively small embedded microprocessors have features (register bypass e.g.), which impact the execution timing of statements significantly. Proper documentation of such features may be hard to find since e.g. the inner details of the pipeline of modern CPU’s can often not be found in the documentation. These constraints on modelling hardware components and validity implications should be lifted and further investigated to make the technique discussed applicable to general, real-world problems. However, depending on the context and the precision needed, the current technique can already be applicable now. If the hardware component is relatively simple, a suited component model can be constructed. Another valid area for the techniques discussed is to give feedback to a prospective programmer, such that during construction of software the developer can optimise the energy consumption for various hardware configurations. 6 Related work and future work A few options are available to a programmer who wants to write energy-efficient code. The programmer can look for programming guidelines and design patterns, which in most cases produce more energyefficient programs, e.g. [15, 3]. Then, he/she might make use of a compiler that optimises for energyefficiency, e.g. [20]. If the programmer is lucky, there is an energy analysis available for the specific platform at hand, such as [9] in which the energy consumption of a processor is modelled in SimpleScalar. However, for most platforms, this is not a viable option. In that case, the programmer might use dynamic analysis with a measurement set-up. This, however, is not a trivial task and requires a complex set-up [8, 4]. Moreover, it only yields information for a specific benchmark [12]. Nevertheless, these approaches are always applicable. A programmer might, however, prefer an approach that yields additional insight in a more predictive manner. In future work, we aim to fully implement this precise analysis to evaluate its suitability for larger systems and further explore practical applicability. We intend to experiment with additional implementations of various derived approximating analyses to evaluate which techniques/approximations work best in which context. A current limitation of the analysis is that it allows only one control process (processor). Actual systems often consist of a network of interacting systems. Therefore, incorporating interacting systems would increase the applicability of the approach. Such systems can be seen as hybrid automata. Theoretical and practical results in modelling hybrid automata [1, 2] might be a useful starting point for further research. B. van Gastel and M. van Eekelen 35 To make the presentation more concise, it might be useful to use as a subject language a first-order strictevaluation functional programming language. One can expect that this will alleviates the need to have a separate basic dependent type system which transforms all variables into expressions over input variables. However, expressions would still need to be expressed in terms over input variables. To support the analysis of data types, a size analysis of data types might be useful to enable iteration over data structures, e.g. using techniques similar to [16, 17]. On the language level, the type system is precise. However, it does not take into account optimisations and transformations below the language level. This can be achieved by analysing the software on a lower level, for example, the intermediate representation of a modern compiler, or even the binary level. For increased accuracy, this may certainly be worthwhile. Another motivation to use such an intermediate representation as the language that is analysed is the ability to support (combinations of) many higher level languages. In this way, programs written in and consisting of multiple languages can be analysed. It can also account for optimisations (such as common subexpression elimination, inlining, statically evaluating expressions), which in general reduce the execution time of the program and therefore impact the time-dependent energy usage (calls with side effects like component function calls are not optimised). Compared with [10], the ECA energy consumption in this paper is precise instead of over-approximated. Future research can show if the expressions derived by this type system can be transformed in such a way that also upper bound expressions are derived. To support this, recursion and loops should be transformed in a Cost Relation System (CRS), a special case of recurrence relations. Solving this CRS, one can acquire a direct formula expressing the energy consumption of the recursive function or loop. Another approach to providing more precise estimates is described in [19]. In this approach suitable program inputs are identified through which, by measurement, more precise results can be achieved in combination with an auxiliary energy model taking into account the energy consumption of instructions in relation to each other. Finally, a systematic approach to constructing component models should be looked into. One can create a model from the specifications given by the vendor. Another way is using model learning [18] techniques, which create a finite state model from black box testing and measuring. All the states should have a time dependent energy consumption assigned to them, and all the transitions should be assigned incidental energy consumption. Such a model can then be used as a component model. 7 Conclusion Energy analysis consists of a hybrid approach in analysing both hardware and software together, to derive energy consumptions when executing the software on the hardware. This can be used during the development phase, or for optimisation. One can e.g. choose the best software implementation for given hardware, or the other way around: choose the best hardware for a given algorithm. The key to analysing larger systems is compositionality. Many programs encountered in the real world feature language constructs such as global variables and recursion. To analyse these programs, support in the ECA language and program transformations is required. This article extends ECA with language support for multiple types, support for recursive functions and global variables. Important properties are retained: it remains a composable, precise, and parametric energy analysis. 36 Towards Practical, Precise and Parametric energy Analysis of IT Controlled Systems Furthermore, to gain additional insights in the feasibility of the approach, the article explores the (im)possibilities of using the approach in practice by discussing validity and applications. All in all, this constitutes a practical step towards the application of the proposed energy analysis on real world problems. References [1] Rajeev Alur, Costas Courcoubetis, Thomas A. Henzinger & Pei-Hsin Ho (1992): Hybrid Automata: An Algorithmic Approach to the Specification and Verification of Hybrid Systems. In Robert L. Grossman, Anil Nerode, Anders P. Ravn & Hans Rischel, editors: Hybrid Systems, Lecture Notes in Computer Science 736, Springer, pp. 209–229, doi:10.1007/3-540-57318-6 30. [2] Rajeev Alur, Salar Moarref & Ufuk Topcu (2016): Compositional Synthesis with Parametric Reactive Controllers. In Alessandro Abate & Georgios E. Fainekos, editors: Proceedings of the 19th International Conference on Hybrid Systems: Computation and Control, HSCC 2016, Vienna, Austria, April 12-14, 2016, ACM, pp. 215–224, doi:10.1145/2883817.2883842. [3] Steven te Brinke, Somayeh Malakuti, Christoph Bockisch, Lodewijk Bergmans & Mehmet Aksit (2013): A design method for modular energy-aware software. In Sung Y. Shin & José Carlos Maldonado, editors: Proceedings of the 28th Annual ACM Symposium on Applied Computing, SAC ’13, Coimbra, Portugal, March 18-22, 2013, ACM, pp. 1180–1182, doi:10.1145/2480362.2480584. [4] Miguel A Ferreira, Eric Hoekstra, Bo Merkus, Bram Visser & Joost Visser (2013): SEFLab: A lab for measuring software energy footprints. In: 2nd International Workshop on Green and Sustainable Software (GREENS), 2013, IEEE, pp. 30–37, doi:10.1109/GREENS.2013.6606419. [5] Bernard van Gastel, Rody Kersten & Marko C. J. D. van Eekelen (2015): Using Dependent Types to Define Energy Augmented Semantics of Programs. In Marko C. J. D. van Eekelen & Ugo Dal Lago, editors: Foundational and Practical Aspects of Resource Analysis - 4th International Workshop, FOPARA 2015, London, UK, April 11, 2015, Revised Selected Papers, Lecture Notes in Computer Science 9964, pp. 20–39, doi:10.1007/978-3-319-46559-3 2. [6] Bernard van Gastel (2016): Assessing sustainability of software; analysing correctness, memory and energy consumption. Ph.D. thesis, Open Universiteit. Available at http://sustainablesoftware.info/ download/thesis-met-cover.pdf. [7] Bernard van Gastel & Marko van Eekelen (2016): Lecture notes on ‘Analysing energy consumption by software’, for the TACLe Summerschool 2016 in Yspertal, Austria. Technical Report, Radboud University Nijmegen. Available at https://pms.cs.ru.nl/iris-diglib/src/getContent.php?id= 2016-van-Eekelen-EnergyAnalysing. [8] Erik A. Jagroep, Jan Martijn van der Werf, Sjaak Brinkkemper, Giuseppe Procaccianti, Patricia Lago, Leen Blom & Rob van Vliet (2016): Software Energy Profiling: Comparing Releases of a Software Product. In: Proceedings of the 38th International Conference on Software Engineering Companion, ICSE ’16, ACM, New York, NY, USA, pp. 523–532, doi:10.1145/2889160.2889216. [9] Ramkumar Jayaseelan, Tulika Mitra & Xianfeng Li (2006): Estimating the Worst-Case Energy Consumption of Embedded Software. In: Proceedings of the 12th IEEE Real-Time and Embedded Technology and Applications Symposium, IEEE, pp. 81–90, doi:10.1109/RTAS.2006.17. [10] Rody Kersten, Paolo Parisen Toldin, Bernard van Gastel & Marko van Eekelen (2014): A Hoare Logic for Energy Consumption Analysis. In: Proceedings of the Third International Workshop on Foundational and Practical Aspects of Resource Analysis (FOPARA’13), LNCS 8552, Springer, pp. 93–109, doi:10.1007/9783-319-12466-7 6. B. van Gastel and M. van Eekelen 37 [11] Xavier Leroy (2009): Formal verification of a realistic compiler. Communications of the ACM 52(7), pp. 107–115, doi:10.1145/1538788.1538814. Available at http://gallium.inria.fr/~xleroy/publi/ compcert-CACM.pdf. [12] F. A. Moghaddam, T. Geenen, P. Lago & P. Grosso (2015): A user perspective on energy profiling tools in large scale computing environments. In: Sustainable Internet and ICT for Sustainability (SustainIT), 2015, pp. 1–5, doi:10.1109/SustainIT.2015.7101364. [13] Rik Oldenkamp, Rosalie van Zelm & Mark A.J. Huijbregts (2016): Valuing the human health damage caused by the fraud of Volkswagen. Environmental Pollution 212, pp. 121 – 127, doi:10.1016/j.envpol.2016.01.053. Available at http://www.sciencedirect.com/science/article/pii/S0269749116300537. [14] Paolo Parisen Toldin, Rody Kersten, Bernard van Gastel & Marko van Eekelen (2013): Soundness proof for a Hoare logic for energy consumption analysis. Technical Report ICIS–R13009, Radboud University Nijmegen. Available at https://pms.cs.ru.nl/iris-diglib/src/getContent.php?id= 2013-ParisenToldin-SoundnessLogic. [15] Eric Saxe (2010): Power-efficient software. doi:10.1145/1646353.1646370. Communications of the ACM 53(2), pp. 44–48, [16] Olha Shkaravska, Marko C. J. D. van Eekelen & Alejandro Tamalet (2013): Collected Size Semantics for Strict Functional Programs over General Polymorphic Lists. In Ugo Dal Lago & Ricardo Peña, editors: Foundational and Practical Aspects of Resource Analysis - Third International Workshop, FOPARA 2013, Bertinoro, Italy, August 29-31, 2013, Revised Selected Papers, Lecture Notes in Computer Science 8552, Springer, pp. 143–159, doi:10.1007/978-3-319-12466-7 9. [17] Alejandro Tamalet, Olha Shkaravska & Marko C.J.D. van Eekelen (2009): Size Analysis of Algebraic Data Types. In Peter Achten, Pieter Koopman & Marco T. Morazán, editors: Trends in Functional Programming, Trends in Functional Programming 9, Intellect, pp. 33–48. Available at http://www.intellectbooks.co. uk/books/view-Book,id=4648/. ISBN 978-1-84150-277-9. [18] Frits W. Vaandrager (2017): Model learning. Commun. ACM 60(2), pp. 86–95, doi:10.1145/2967606. [19] Peter Wagemann, Tobias Distler, Timo Honig, Heiko Janker, Rudiger Kapitza & Wolfgang SchroderPreikschat (2015): Worst-Case Energy Consumption Analysis for Energy-Constrained Embedded Systems. 2015 27th Euromicro Conference on Real-Time Systems (ECRTS) 00, pp. 105–114, doi:10.1109/ECRTS.2015.17. [20] Dmitry Zhurikhin, Andrey Belevantsev, Arutyun Avetisyan, Kirill Batuzov & Semun Lee (2009): Evaluating power aware optimizations within GCC compiler. In: GROW-2009: International Workshop on GCC Research Opportunities, pp. 1–9, doi:10.1.1.470.8078.
6cs.PL
VARIABLE SELECTION IN MULTIVARIATE LINEAR MODELS WITH HIGH-DIMENSIONAL COVARIANCE MATRIX ESTIMATION arXiv:1707.04145v1 [math.ST] 13 Jul 2017 M. PERROT-DOCKÈS, C. LÉVY-LEDUC, L. SANSONNET, AND J. CHIQUET Abstract. In this paper, we propose a novel variable selection approach in the framework of multivariate linear models taking into account the dependence that may exist between the responses. It consists in estimating beforehand the covariance matrix Σ of the responses and to plug this estimator in a Lasso criterion, in order to obtain a sparse estimator of the coefficient matrix. The properties of our approach are investigated both from a theoretical and a numerical point of view. More precisely, we give general conditions that the estimators of the covariance matrix and its inverse have to satisfy in order to recover the positions of the null and non null entries of the coefficient matrix when the size of Σ is not fixed and can tend to infinity. We prove that these conditions are satisfied in the particular case of some Toeplitz matrices. Our approach is implemented in the R package MultiVarSel available from the Comprehensive R Archive Network (CRAN) and is very attractive since it benefits from a low computational load. We also assess the performance of our methodology using synthetic data and compare it with alternative approaches. Our numerical experiments show that including the estimation of the covariance matrix in the Lasso criterion dramatically improves the variable selection performance in many cases. 1. Introduction The multivariate linear model consists in generalizing the classical linear model, in which a single response is explained by p variables, to the case where the number q of responses is larger than 1. Such a general modeling can be used in a wide variety of applications ranging from econometrics (Lütkepohl (2005)) to bioinformatics (Meng et al. (2014)). In the latter field, for instance, multivariate models have been used to gain insight into complex biological mechanisms like metabolism or gene regulation. This has been made possible thanks to recently developed sequencing technologies. For further details, we refer the reader to Mehmood et al. (2012). However, the downside of such a technological expansion is to include irrelevant variables in the statistical models. To circumvent this, devising efficient variable selection approaches in the multivariate setting has become a growing concern. A first naive approach to deal with the variable selection issue in the multivariate setting consists in applying classical univariate variable selection strategies to each response separately. Some well-known variable selection methods include the least absolute shrinkage and selection operator (LASSO) proposed by Tibshirani (1996) and the smoothly clipped absolute deviation (SCAD) approach devised by Fan and Li (2001). However, such a strategy does not take into account the dependence that may exist between the different responses. In this paper, we shall consider the following multivariate linear model: (1) Y = XB + E, Date: July 14, 2017. 1 2 M. PERROT-DOCKÈS, C. LÉVY-LEDUC, L. SANSONNET, AND J. CHIQUET where Y = (Yi,j )1≤i≤n,1≤j≤q denotes the n × q random response matrix, X denotes the n × p design matrix, B denotes a p×q coefficient matrix and E = (Ei,j )1≤i≤n,1≤j≤q denotes the n×q random error matrix, where n is the sample size. In order to model the potential dependence that may exist between the columns of E, we shall assume that for each i in {1, . . . , n}, (2) (Ei,1 , . . . , Ei,q ) ∼ N (0, Σ), where Σ denotes the covariance matrix of the ith row of the error matrix E. We shall moreover assume that the different rows of E are independent. With such assumptions, there is some dependence between the columns of E but not between the rows. Our goal is here to design a variable selection approach which is able to identify the positions of the null and non null entries in the sparse matrix B by taking into account the dependence between the columns of E. This issue has recently been considered by Lee and Liu (2012) who extended the approach of Rothman et al. (2010). More precisely, Lee and Liu (2012) proposed three approaches for dealing with this issue based on penalized maximum likelihood with a weighted `1 regularization. In their first approach B is estimated by using a plug-in estimator of Σ−1 , in the second one, Σ−1 is estimated by using a plug-in estimator of B and in the third one, Σ−1 and B are estimated simultaneously. Lee and Liu (2012) also investigate the asymptotic properties of their methods when the sample size n tends to infinity and the number of rows and columns q of Σ is fixed. In this paper, we propose to estimate Σ beforehand and to plug this estimator in a Lasso criterion, in order to obtain a sparse estimator of B. Hence, our methodology is close to the first approach of Lee and Liu (2012). However, there are two main differences: The first one is the asymptotic framework in which our theoretical results are established and the second one is the strategy that we use for estimating Σ. More precisely, in our asymptotic framework, q is allowed to depend on n and thus to tend to infinity as n tends to infinity at a polynomial rate. Moreover, in Lee and Liu (2012), Σ−1 is estimated by using an adaptation of the Graphical Lasso (GLASSO) proposed by Friedman et al. (2008). This technique has also been considered by Yuan and Lin (2007), Banerjee et al. (2008) and Rothman et al. (2008). In this paper, we give general conditions that the estimators of Σ and Σ−1 have to satisfy in order to be able to recover the support of B that is to find the positions of the null and non null entries of the matrix B. We prove that when Σ is a particular Toeplitz matrix, namely the covariance matrix of an AR(1) process, the assumptions of the theorem are satisfied. Let us now describe more precisely our methodology. We start by “whitening” the observations Y by applying the following transformation to Model (1): (3) Y Σ−1/2 = XB Σ−1/2 + E Σ−1/2 . The goal of such a transformation is to remove the dependence between the columns of Y . Then, for estimating B, we proceed as follows. Let us observe that (3) can be rewritten as: (4) Y = X B + E, with (5) Y = vec(Y Σ−1/2 ), X = (Σ−1/2 )0 ⊗ X, B = vec(B) and E = vec(E Σ−1/2 ), where vec denotes the vectorization operator and ⊗ the Kronecker product. VARIABLE SELECTION IN MULTIVARIATE LINEAR MODELS 3 With Model (4), estimating B is equivalent to estimate B since B = vec(B). Then, for estimating B, we use the classical LASSO criterion defined as follows for a nonnegative λ:  b (6) B(λ) = ArgminB kY − X Bk22 + λkBk1 , where k.k1 and k.k2 denote the classical `1 -norm and `2 -norm, respectively. Inspired by Zhao and Yu (2006), Theorem 1 established some conditions under which the positions of the null b and non null entries of B can be recovered by using B. In practical situations, the covariance matrix Σ is generally unknown and has thus to be b denote an estimator of Σ. Then, the estimator Σ b −1/2 of Σ−1/2 is such that estimated. Let Σ b −1 = Σ b −1/2 (Σ b −1/2 )0 . Σ b −1/2 , (3) becomes When Σ−1/2 is replaced by Σ b −1/2 = XB Σ b −1/2 + E Σ b −1/2 , YΣ (7) which can be rewritten as follows: e Ye = XeB + E, (8) where (9) b −1/2 ), Xe = (Σ b −1/2 )0 ⊗ X, B = vec(B) and Ee = vec(E Σ b −1/2 ). Ye = vec(Y Σ In Model (8), B is estimated by (10) n o e B(λ) = ArgminB kYe − XeBk22 + λkBk1 . By extending Theorem 1, Theorem 5 gives some conditions on the eigenvalues of Σ−1 and b and its inverse to Σ and Σ−1 , respectively, under which the on the convergence rate of Σ e positions of the null and non null entries of B can be recovered by using B. We prove in Section 2.3 that when Σ is a particular Toeplitz matrix, namely the covariance matrix of an AR(1) process, the assumptions of Theorem 5 are satisfied. This strategy has been implemented in the R package MultiVarSel, which is available on the Comprehensive R Archive Network (CRAN), for more general Toeplitz matrices Σ such as the covariance matrix of ARMA processes or general stationary processes. For a successful application of this methodology to particular “-omic” data, namely metabolomic data, we refer the reader to Perrot-Dockès et al. (2017). For a review of the most recent methods for estimating highdimensional covariance matrices, we refer the reader to Pourahmadi (2013). The paper is organized as follows. Section 2 is devoted to the theoretical results of the paper. The assumptions under which the positions of the non null and null entries of B can be recovered are established in Theorem 1 when Σ is known and in Theorem 5 when Σ is unknown. Section 2.3 studies the specific case of the AR(1) model. We present in Section 3 some numerical experiments in order to support our theoretical results. The proofs of our main theoretical results are given in Section 4. 2. Theoretical results 2.1. Case where Σ is known. Let us first introduce some notations. Let (11) C= 1 0 X X and J = {1 ≤ j ≤ pq, Bj 6= 0}, nq 4 M. PERROT-DOCKÈS, C. LÉVY-LEDUC, L. SANSONNET, AND J. CHIQUET where X is defined in (5) and where Bj denotes the jth component of the vector B defined in (5). Let also define 1 1 (12) CJ,J = (X•,J )0 X•,J and CJ c ,J = (X•,J c )0 X•,J , nq nq where X•,J and X•,J c denote the columns of X belonging to the set J defined in (11) and to its complement J c , respectively. More generally, for any matrix A, AI,J denotes the partitioned matrix extracted from A by considering the rows of A belonging to the set I and the columns of A belonging to the set J, with • indicating all the rows or all the columns. The following theorem gives some conditions under which the estimator Bb defined in (6) is sign-consistent as defined by Zhao and Yu (2006), namely,   b = sign(B) → 1, as n → ∞, P sign(B) where the sign function maps positive entries to 1, negative entries to -1 and zero to 0. Theorem 1. Assume that Y = (Y1 , Y2 , . . . , Ynq )0 satisfies Model (4). Assume also that there exist some positive constants M1 , M2 , M3 and positive numbers c1 , c2 such that 0 < c1 + c2 < 1/2 satisfying: (A1) for all n ≥ 1, for all j ∈ {1, . . . , pq}, n1 (X•,j )0 X•,j ≤ M1 , where X•,j is the jth column of X defined in (5), (A2) for all n ≥ 1, n1 λmin ((X 0 X )J,J ) ≥ M2 , where λmin (A) denotes the smallest eigenvalue of A, (A3) |J| = O(q c1 ), where J is defined in (11) and |J| is the cardinality of the set J, (A4) q c2 minj∈J |Bj | ≥ M3 . Assume also that the following strong Irrepresentable Condition holds: (IC) There exists a positive constant vector η such that (X 0 X )J c ,J ((X 0 X )J,J )−1 sign(BJ ) ≤ 1 − η, where 1 is a (pq − |J|) vector of 1 and the inequality holds element-wise. Then, for all λ that satisfies     1 λ λ = o q −(c1 +c2 ) , as n → ∞, (L) q = qn = o n 2(c1 +c2 ) , √ → ∞ and n n we have   b P sign(B(λ)) = sign(B) → 1, as n → ∞, b where B(λ) is defined by (6). Remark 1. Observe that if c1 + c2 < (2k)−1 , for some positive k, then the first condition of (L) becomes q = o(nk ). Hence for large values of k, the size q of Σ is much larger than n. The proof of Theorem 1 is given in Section 4. It is based on Proposition 2 which is an adaptation to the multivariate case of Proposition 1 in Zhao and Yu (2006). b Proposition 2. Let B(λ) be defined by (6). Then   b P sign(B(λ)) = sign(B) ≥ P(An ∩ Bn ), VARIABLE SELECTION IN MULTIVARIATE LINEAR MODELS 5 where  (13) An = −1 (CJ,J ) WJ < √   λ −1 nq |BJ | − |(CJ,J ) sign(BJ )| 2nq and  (14) Bn = −1 CJ c ,J (CJ,J ) WJ − WJ c   λ −1 , 1 − CJ c ,J (CJ,J ) sign(BJ ) ≤ √ 2 nq √ with W = X 0 E/ nq. In (13) and (14), CJ,J and CJ c ,J are defined in (12) and WJ and WJ c denote the components of W being in J and J c , respectively. Note that the previous inequalities hold element-wise. The proof of Proposition 2 is given in Section 4. We give in the following proposition which is proved in Section 4 some conditions on X and Σ under which Assumptions (A1) and (A2) of Theorem 1 hold. Proposition 3. If there exist some positive constants M10 , M20 , m1 , m2 such that, for all n ≥ 1, (C1) for all j ∈ {1, . . . , p}, n1 (X•,j )0 X•,j ≤ M10 , (C2) n1 λmin (X 0 X) ≥ M20 , (C3) λmax (Σ−1 ) ≤ m1 , (C4) λmin (Σ−1 ) ≥ m2 , then Assumptions (A1) and (A2) of Theorem 1 are satisfied. Remark 2. Observe that (C1) and (C2) hold in the case where the columns of the matrix X are orthogonal. We give in Proposition 6 in Section 2.3 some conditions under which Condition (IC) holds in the specific case where Σ is the covariance matrix of an AR(1) process. 2.2. Case where Σ is unknown. Similarly as in (11) and (12), we introduce the following notations: e = 1 Xe0 Xe (15) C nq and eJ,J = 1 (Xe•,J )0 Xe•,J and C eJ c ,J = 1 (Xe•,J c )0 Xe•,J , C nq nq (16) where Xe•,J and Xe•,J c denote the columns of Xe belonging to the set J defined in (11) and to its complement J c , respectively. A straightforward extension of Proposition 2 leads to the following proposition for Model (8). e Proposition 4. Let B(λ) be defined by (10). Then   e fn ∩ B fn ), P sign(B(λ)) = sign(B) ≥ P(A where  (17) fn = A   λ e √ −1 f −1 e (CJ,J ) WJ < nq |BJ | − |(CJ,J ) sign(BJ )| 2nq 6 M. PERROT-DOCKÈS, C. LÉVY-LEDUC, L. SANSONNET, AND J. CHIQUET and  (18) fn = B eJ c ,J (C eJ,J )−1 W fJ C fJ c −W  λ  −1 eJ c ,J (C eJ,J ) sign(BJ ) , ≤ √ 1− C 2 nq e √nq. In (17) and (18), C eJ,J and C eJ c ,J are defined in (16) and W fJ and with W = Xe0 E/ fJ c denote the components of W f being in J and J c , respectively. Note that the previous W inequalities hold element-wise. The following theorem extends Theorem 1 to the case where Σ is unknown and gives some conditions under which the estimator Be defined in (10) is sign-consistent. The proof of Theorem 5 is given in Section 4 and is based on Proposition 4. Theorem 5. Assume that Assumptions (A1), (A2), (A3), (A4), (IC) and (L) of Theorem 1 hold. Assume also that, there exist some positive constants M4 , M5 , M6 and M7 , such that for all n ≥ 1, (A5) k(X 0 X)/nk∞ ≤ M4 , (A6) λmin ((X 0 X)/n) ≥ M5 , (A7) λmax (Σ−1 ) ≤ M6 , (A8) λmin (Σ−1 ) ≥ M7 . Suppose also that b −1 k∞ = OP ((nq)−1/2 ), as n tends to infinity, (A9) kΣ−1 − Σ b = OP ((nq)−1/2 ), as n tends to infinity. (A10) ρ(Σ − Σ) e Let B(λ) be defined by (10), then   e P sign(B(λ)) = sign(B) → 1, as n → ∞. In the previous assumptions, λmax (A), λmin (A), ρ(A) and kAk∞ denote the largest eigenvalue, the smallest eigenvalue, the spectral radius and the infinite norm (induced by the associated vector norm) of the matrix A. Remark 3. Observe that Assumptions (A5) and (A6) hold in the case where the columns of the matrix X are orthogonal. Note also that (A7) and (A8) are the same as (C3) and (C4) in Proposition 3. In order to estimate Σ, we propose the following strategy: • Fitting a classical linear model to each column of the matrix Y in order to have access b of the random error matrix E. It is possible since p is assumed to to an estimation E be fixed and smaller than n. b by assuming that Σ has a particular structure, Toeplitz for • Estimating Σ from E instance. b defined in the first step is such that: More precisely, E  b = IdRn − X(X 0 X)−1 X 0 E =: ΠE, (19) E which implies that (20) where E is defined in (5). b = [IdRq ⊗ Π] E, Eb = vec(E) VARIABLE SELECTION IN MULTIVARIATE LINEAR MODELS 7 We prove in Proposition 7 below that our strategy for estimating Σ provides an estimator satisfying the assumptions of Theorem 5 in the case where (E1,t )t , (E2,t )t , ..., (En,t )t are assumed to be independent AR(1) processes. 2.3. The AR(1) case. 2.3.1. Sufficient conditions for Assumption (IC) of Theorem 1. The following proposition gives some conditions under which the strong Irrepresentable Condition (IC) of Theorem 1 holds. Proposition 6. Assume that (E1,t )t , (E2,t )t , ..., (En,t )t in Model (1) are independent AR(1) processes satisfying: Ei,t − φ1 Ei,t−1 = Zi,t , ∀i ∈ {1, . . . , n}, where the Zi,t ’s are zero-mean i.i.d. Gaussian random variables with variance σ 2 and |φ1 | < 1. Assume also that X defined in (1) is such that X 0 X = νIdRp , where ν is a positive constant. Moreover, suppose that if j ∈ J, then j > p and j < pq − p. Suppose also that for all j, j − p or j + p is not in J. Then, the strong Irrepresentable Condition (IC) of Theorem 1 holds. The proof of Proposition 6 is given in Section 4. 2.3.2. Sufficient conditions for Assumptions (A7), (A8), (A9) and (A10) of Theorem 5. The following proposition establishes that in the particular case where the (E1,t )t , (E2,t )t , ..., (En,t )t are independent AR(1) processes, our strategy for estimating Σ provides an estimator satisfying the assumptions of Theorem 5. Proposition 7. Assume that (E1,t )t , (E2,t )t , ..., (En,t )t in Model (1) are independent AR(1) processes satisfying: Ei,t − φ1 Ei,t−1 = Zi,t , ∀i ∈ {1, . . . , n}, where the Zi,t ’s are zero-mean i.i.d. Gaussian random variables with variance σ 2 and |φ1 | < 1. Let   1 φb1 φb21 . . . φbq−1 1   φb 1 φb1 . . . φbq−2 1   1 1  ..  .. .. .. .. b  . . . Σ= .  ,  . 1 − φb21  . . . . . .. .. ..  ..   .. q−1 ... ... ... 1 φb1 where Pn Pq b b `=2 Ei,` Ei,`−1 b (21) φ1 = i=1 , Pn Pq−1 b 2 E i=1 `=1 i,` b = (E bi,` )1≤i≤n,1≤`≤q is defined in (19). Then, Assumptions (A7), (A8), (A9) and where E (A10) of Theorem 5 are valid. The proof of Proposition 7 is given in Section 4. It is based on the following lemma. Lemma 8. Assume that (E1,t )t , (E2,t )t , ..., (En,t )t in Model (1) are independent AR(1) processes satisfying: Ei,t − φ1 Ei,t−1 = Zi,t , ∀i ∈ {1, . . . , n}, 8 M. PERROT-DOCKÈS, C. LÉVY-LEDUC, L. SANSONNET, AND J. CHIQUET where the Zi,t ’s are zero-mean i.i.d. Gaussian random variables with variance σ 2 and |φ1 | < 1. Let Pn Pq b b `=2 Ei,` Ei,`−1 b , φ1 = i=1 Pn Pq−1 b 2 i=1 `=1 Ei,` b = (E bi,` )1≤i≤n,1≤`≤q is defined in (19). Then, where E √ nqn (φb1 − φ1 ) = Op (1), as n → ∞. Lemma 8 is proved in Section 4. Its proof is based on Lemma 10 in Section 5. 3. Numerical experiments The goal of this section is twofold: i) to provide sanity checks for our theoretical results in a well-controlled framework; and ii) to investigate the robustness of our estimator to some violations of the assumptions of our theoretical results. The latter may reveal a broader scope of applicability for our method than the one guaranteed by the theoretical results. We investigate i) in the AR(1) framework presented in Section 2.3. Indeed, all assumptions made in Theorems 1 and 5 can be specified with well-controllable simulation parameters in the AR(1) case with balanced design matrix X. Point ii) aims to explore the limitations of our theoretical framework and assess its robustness. To this end, we propose two numerical studies relaxing some of the assumptions of our theorems: first, we study the effect of an unbalanced design – which violates the sufficient condition of the irrepresentability condition (IC) given in Proposition 6 – on the sign-consistency; and second, we study the effect of other types of dependence than an AR(1). In all experiments, the performance are assessed in terms of sign-consistency. In other words, we evaluate the probability for the sign of various estimators to be equal to sign(B). We compare the performance of three different estimators: • Bb defined in (6), which corresponds to the LASSO criterion applied to the data whitened with the true covariance matrix Σ; we call this estimator oracle. Its theoretical properties are established in Theorem 1. • Be defined in (10), which corresponds to the LASSO criterion applied to the data b we refer to this estimator as whitened with an estimator of the covariance matrix Σ; whitened-lasso. Its theoretical properties are established in Theorem 5. • the LASSO criterion applied to the raw data, which we call raw-lasso hereafter. Its theoretical properties are established only in the univariate case in Alquier and Doukhan (2011). 3.1. AR(1) dependence structure with balanced one-way ANOVA. In this section, we consider Model (1) where X is the design matrix of a one-way ANOVA with two balanced groups. Each row of the random error matrix E is distributed as a centered Gaussian random vector as in Equation (2) where the matrix Σ is the covariance matrix of an AR(1) process defined in Section 2.3. In this setting, Assumptions (A1), (A2) and Condition (IC) of Theorem 1 are satisfied, see Propositions 3 and 6. The three remaining assumptions (A3), (A4) and (L) are related to more practical quantities: (A3) controls the sparsity level of the problem, involving c1 ; (A4) basically controls the signal-to-noise ratio, involving c2 and (L) links the sample size n, q and the two constants c1 , c2 , so that an appropriate range of penalty λ exists for having a large probability of support recovery. This latter assumption is used in our experiments to tune VARIABLE SELECTION IN MULTIVARIATE LINEAR MODELS 9 the difficulty of the support recovery as follows: we consider different values of n, q, c1 , c2 and we choose a sparsity level |J| and a minimal magnitude in B such that Assumptions (A3) and (A4) are fulfilled. Hence, the problem difficulty is essentially driven by the validity of Assumption (L) where q = o(nk ) with c1 + c2 = 1/2k, and so by the relationship between n, q and k. We consider a large range of sample sizes n varying from 10 to 1000 and three different values for q in {10, 50, 1000}. The constants c1 , c2 are chosen such that c1 + c2 = 1/2k with c1 = c2 and k in {1, 2, 4}. Additional values of c1 and c2 have also been considered and the corresponding results are available upon request. Finally, we consider two values for the parameter φ1 appearing in the definition of the AR(1) process: φ1 ∈ {0.5, 0.95}. Note that in this AR(1) setting with the estimator φb1 of φ1 defined in (21) , all the assumptions of Theorem 5 are fulfilled, see Proposition 7. The frequencies of support recovery for the three estimators averaged over 1000 replications is displayed in Figure 1. k= 1 1.00 ● ● ● ● ● ● ● ● ●● k= 2 ● ● ● ● ● ● ●●●● ● ● ● ● ● ●●● ● ●● ● ●● k= 4 ● ● ● ● ● ● ●●●● ● ●●● ● ● ● ● ● ● ● ● ● ● ● ●● ● ● ●● ● ● ● ● ● ●●●● ●●●● ● ● ●● ● 0.75 ● q= 10 ● ● ● 0.50 ● ● ● ● ● ● ● ● 0.25 φ1 0.00 1.00 ● ● ● ● ● ●●●● ● ● ● ● ●●●● ● ● ● ●● 0.75 ● ● ● ●● ●● ●● ●●● ● ● ● ● ● ● ● 0.5 ● ● ● ● ●●●● 0.95 ● ● ● ● ● ● ● ● ● ● ● ●● ● ● ● ● ● ● ● ● 0.25 ● ● q= 50 0.50 ● ● ●● ● ● ● ● oracle ● 0.00 ● ● ● raw−lasso 1.00 ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● 0.00 10 ● ●● 100 ● ● ● ● ● ● ● ● ● ● ● ● ● whithened−lasso ● ● ● ● ●●●● ● ● ● ● ● ● ● ● ● ● ● 0.25 ●● ● ● ● ● q= 1000 ● 0.50 ● ● ● 0.75 ● ● ● ● ●●●● ● 1000 10 ● ● 100 1000 10 100 1000 n Figure 1. Frequencies of support recovery in a multivariate one-way ANOVA model with two balanced groups and an AR(1) dependence. 10 M. PERROT-DOCKÈS, C. LÉVY-LEDUC, L. SANSONNET, AND J. CHIQUET We observe from Figure 1 that whitened-lasso and oracle have similar performance since φ1 is well estimated. These two approaches always exhibit better performance than raw-lasso, especially when φ1 = 0.95. In this case, the sample size n required to reach the same performance is indeed ten time larger for raw-lasso than for oracle and whitened-lasso. Finally, the performance of all estimators are altered when n is too small, especially in situations where the signal to noise ratio (SNR) is small and the signal is not sparse enough, these two characteristics corresponding to small values of k. 3.2. Robustness to unbalanced designs and correlated features. The goal of this section is to study some particular design matrices X in Model (1) that may lead to violation of the Irrepresentability Condition (IC). To this end, we consider the multivariate linear model (1) with the same AR(1) dependence as the one considered in Section 3.1. Then, two different matrices X are considered: First, an one-way ANOVA model with two unbalanced groups with respective sizes n1 and n2 such that n1 + n2 = n; and second, a multiple regression model with p correlated Gaussian predictors such that the rows of X are i.i.d. N (0, ΣX ). For the one-way ANOVA, violation of (IC) may occur when r = n1 /n is too different from 1/2, as stated in Proposition 6. For the regression model, we choose for ΣX a 9 × 9 matrix X (p = 9) such that ΣX i,i = 1, Σi,j = ρ, when i 6= j. The other simulation parameters are fixed as in Section 3.1. We report in Figure 2 the results for the case where q = 1000 and k = 2 both for unbalanced one-way ANOVA (top panels) and regression with correlated predictors (bottom panels). For the one-way ANOVA, r varies in {0.4, 0.2, 0.1}. For the regression case, ρ varies in {0.2, 0.6, 0.9}. In both cases, the gray lines correspond to the ideal situation (that is, either unbalanced or uncorrelated) denoted Ideal in the legend of Figure 2. The probability of support recovery is estimated over 1000 runs. From this figure, we note that correlated features or unbalanced designs deteriorate the support recovery of all estimators. This was expected for these LASSO-based methods which all suffer from the violation of the irrepresentability condition (IC). However, we also note that whitened-lasso and oracle have similar performance, which means that the estimation of Σ is not altered, and that whitening always improves the support recovery. 3.3. Robustness to more general autoregressive processes. In this section, we consider the case where X is the design matrix of a one-way ANOVA with two balanced groups and where Σ is the covariance matrix of an AR(m) process with m in {5, 10}. Figure 3 displays the performance of the different estimators when q = 500. Here, for computing b in whitened-lasso, the parameters φ1 , . . . , φm of the AR(m) process are estimated as Σ b defined in (19) the estimations follows. They are obtained by averaging over the n rows of E (i) (i) b by using standard estimation approaches for AR φb1 , . . . , φbm obtained for the ith row of E processes described in Brockwell and Davis (1990). As previously, we observe from this figure that whitened-lasso and oracle have better performance than raw-lasso. 4. Proofs Proof of Proposition 2. For a fixed nonnegative λ, by (6),  b Bb = B(λ) = ArgminB kY − X Bk22 + λkBk1 . VARIABLE SELECTION IN MULTIVARIATE LINEAR MODELS r = 0.4 1.00 ● ● ● ● ● ● r = 0.2 ● ● ● ● ● ● ● ● r = 0.1 ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● 0.50 ● ● ● 0.25 0.00 ● ● ● ● ● ● ● ● ● ● ● ● ●●● ● ● ● ● 0 250 500 ● ● ● ● ● ● ● ● ● ● ● ● ● ●● ● ● ● q = 1000 0.75 11 750 1000 0 250 500 750 1000 0 250 500 750 1000 n ρ = 0.2 1.00 ● ● ● ● ●● ● ● ● ● ρ = 0.6 ● ● ● ● ● ● ●● 0.50 0.25 ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ●● ● ● ● ●●● ● ●● 0.00 0 250 500 750 1000 0 250 500 ● oracle ● raw−lasso ● whithened−lasso ● oracle raw−lasso ● ● ●● ● Ideal ρ = 0.8 q = 1000 0.75 ● ● 750 1000 0 ● ● 250 ● ● ● 500 ● ● ● whithened−lasso ● 750 1000 n Figure 2. Frequencies of support recovery in general linear models with unbalanced designs: one-way ANOVA and regression. m= 5 1.00 ● m= 10 ● ● ● ● ● 0.75 ● ● ● ● q= 500 ● 0.50 ● ● ● ● ● ● ● 0.25 ● 0.00 0 ● 100 200 300 400 500 0 raw−lasso whithened−lasso ● ● ● oracle 100 200 300 400 500 n Figure 3. Frequencies of support recovery in one-way ANOVA with AR(m) covariance matrix. Denoting u b = Bb − B, we get b 2 + λkBk b 1 = kX B + E − X Bk b 2 + λkb kY − X Bk u + Bk1 = kE − X u bk22 + λkb u + Bk1 2 2 = kEk22 − 2b u0 X 0 E + u b0 X 0 X u b + λkb u + Bk1 . 12 M. PERROT-DOCKÈS, C. LÉVY-LEDUC, L. SANSONNET, AND J. CHIQUET Thus, u b = Argminu V (u), where √ √ √ V (u) = −2( nqu)0 W + ( nqu)0 C( nqu) + λku + Bk1 . Since the first derivative of V with respect to u is equal to  √ √ 2 nq C( nqu) − W + λ sign(u + B), u b satisfies λ λ √ CJ,J ( nqb uJ ) − WJ = − √ sign(b uJ + BJ ) = − √ sign(BbJ ), if b uJ + BJ = BbJ 6= 0 2 nq 2 nq and λ √ CJ c ,J ( nqb uJ ) − WJ c ≤ √ . 2 nq Note that, if |b uJ | < |BJ |, then BbJ 6= 0 and sign(BbJ ) = sign(BJ ). Let us now prove that when An and Bn , defined in (13) and (14), are satisfied then there exists u b satisfying: (22) (23) (24) λ √ CJ,J ( nqb uJ ) − WJ = − √ sign(BJ ), 2 nq |b uJ | < |BJ |, λ √ CJ c ,J ( nqb uJ ) − WJ c ≤ √ . 2 nq Note that An implies: (25)     λ λ √ √ −1 −1 −1 (CJ,J ) sign(BJ ) < (CJ,J ) WJ < nq |BJ | + (CJ,J ) sign(BJ ) . nq −|BJ | + 2nq 2nq By denoting (26) 1 λ u bJ = √ (CJ,J )−1 WJ − (CJ,J )−1 sign(BJ ), nq 2nq we obtain from (25) that (22) and (23) hold. Note that Bn implies:  λ − √ 1 − CJ c ,J (CJ,J )−1 sign(BJ ) 2 nq  λ ≤ CJ c ,J (CJ,J )−1 WJ − WJ c ≤ √ 1 + CJ c ,J (CJ,J )−1 sign(BJ ) . 2 nq Hence,   λ λ −1 −1 CJ c ,J (CJ,J ) WJ − √ (CJ,J ) sign(BJ ) − WJ c ≤ √ , 2 nq 2 nq which is (24) by (26). This concludes the proof. Proof of Theorem 1. By Proposition 2,   b P sign(B(λ)) = sign(B) ≥ P(An ∩ Bn ) = 1 − P(Acn ∪ Bnc ) ≥ 1 − P(Acn ) − P(Bnc ),  VARIABLE SELECTION IN MULTIVARIATE LINEAR MODELS 13 where An and Bn are defined in (13) and (14). It is thus enough to prove that P(Acn ) and P(Bnc ) tend to zero as n tends to infinity. By definition of An ,    λ √ c −1 −1 P(An ) = P (CJ,J ) WJ ≥ nq |BJ | − |(CJ,J ) sign(BJ )| 2nq    λ √ (27) |bj | , ≤ sup P |ξj | ≥ nq |Bj | − 2nq j∈J where 1 ξ = (ξj )j∈J = (CJ,J )−1 WJ = √ (CJ,J )−1 (X•,J )0 E =: HA E, nq and b = (bj )j∈J = (CJ,J )−1 sign(BJ ). By definition of Bn and (IC),    λ −1 c −1 1 − CJ c ,J (CJ,J ) sign(BJ ) P(Bn ) = P CJ c ,J (CJ,J ) WJ − WJ c > √ 2 nq   λ −1 c c ≤ P CJ ,J (CJ,J ) WJ − WJ > √ η 2 nq   λ (28) ≤ sup P |ζj | > √ η , c 2 nq j∈J where  1 ζ = (ζj )j∈J c = CJ c ,J (CJ,J )−1 WJ − WJ c = √ CJ c ,J (CJ,J )−1 (X•,J )0 − (X•,J c )0 E =: HB E. nq Note that, for all j in J, |bj | ≤ X  1/2 X p p |bj | ≤ |J|  b2j  = |J|kbk2 . j∈J j∈J Moreover, kbk2 = k(CJ,J )−1 sign(BJ )k2 ≤ k(CJ,J )−1 k2 p p |J| := λmax ((CJ,J )−1 ) |J|, where λmax (A) denotes the largest eigenvalue of the matrix A. Observe that (29) λmax ((CJ,J )−1 ) = 1 q q = ≤ , 0 λmin (CJ,J ) λmin ((X X )J,J )/n M2 by Assumption (A2) of Theorem 1. Thus, for all j in J, (30) |bj | ≤ q|J| . M2 By Assumption (A4) of Theorem 1, we get thus that for all j in J, (31)        λ λ λq|J| √ √ √ −1 −c2 nq |Bj | − (CJ,J ) sign(BJ ) j = nq |Bj | − |bj | ≥ nq M3 q − . 2nq 2nq 2nqM2 14 M. PERROT-DOCKÈS, C. LÉVY-LEDUC, L. SANSONNET, AND J. CHIQUET Thus, P(Acn ) (32)  ≤ sup P |ξj | ≥ √ j∈J   λq|J| −c2 . nq M3 q − 2nqM2 Since E is a centered Gaussian random vector having a covariance matrix equal to identity, ξ = HA E is a centered Gaussian random vector with a covariance matrix equal to: 0 HA HA = 1 (CJ,J )−1 (X•,J )0 X•,J (CJ,J )−1 = (CJ,J )−1 . nq Hence, by (29), we get that for all j in J, Var(ξj ) = (CJ,J )−1  jj −1 ≤ λmax (CJ,J )≤ q . M2 Thus, √       λq|J| M2 λq|J| √ −c2 −c2 √ P |ξj | ≥ nq M3 q − ≤ P |Z| ≥ √ M3 q nq − √ , 2nqM2 q 2 nqM2 where Z is a standard Gaussian random variable. By Chernoff inequality, we thus obtain that for all j in J,     2 ! λq|J| M λq|J| √ √ 2 P |ξj | ≥ nq M3 q −c2 − M3 q −c2 nq − √ ≤ 2 exp − . 2nqM2 2q 2 nqM2 By Assumption (A3) of Theorem 1, we get that under the last condition of (L), λq|J| √  = o q −c2 nq , as n → ∞. √ nq (33) Thus, P(Acn ) → 0, as n → ∞. (34) Let us now bound P(Bnc ). Observe that ζ = HB E is a centered Gaussian random vector with a covariance matrix equal to: 1 0 −1 (CJ c ,J (CJ,J )−1 (X•,J )0 − X•,J CJ,J c − X•,J c ) c )(X•,J (CJ,J ) nq  1 = CJ c ,J c − CJ c ,J (CJ,J )−1 CJ,J c = (X•,J c )0 IdRnq − X•,J ((X•,J )0 X•,J )−1 (X•,J )0 X•,J c nq   1 (X•,J c )0 IdRnq − ΠIm(X•,J ) X•,J c , = nq 0 HB HB = where ΠIm(X•,J ) denotes the orthogonal projection onto the column space of X•,J . Note that, for all j in J c ,    1  Var(ζj ) = (X•,J c )0 IdRnq − ΠIm(X•,J ) X•,J c nq jj    1 1 (X•,J c )0 X•,J c jj − = (X•,J c )0 ΠIm(X•,J ) X•,J c nq nq jj  M 1 1 (X•,J c )0 X•,J c jj ≤ , ≤ nq q VARIABLE SELECTION IN MULTIVARIATE LINEAR MODELS 15 where the inequalities come from Lemma 9 and Assumption (A1) of Theorem 1. Thus, for all j in J c ,     √ λ q λ P |ζj | > √ η ≤ P |Z| > √ √ η , 2 nq 2 M1 nq where Z is a standard Gaussian random variable. By Chernoff inequality, for all j in J c , ( 2 )    λ λ 1 √ √ η . P |ζj | > √ η ≤ 2 exp − 2 nq 2 2 M1 n Hence, under the following assumption λ √ → ∞, n which is the second condition of (L), (35) P(Bnc ) → 0, as n → ∞.  Proof of Proposition 3. Let us first prove that (C1) and (C3) imply (A1). For j ∈ {1, . . . , pq}, by considering the Euclidian division of j − 1 by p given by (j − 1) = pkj + rj , we observe that (X•,j )0 X•,j = (((Σ−1/2 )0 ⊗ X)•,j )0 ((Σ−1/2 )0 ⊗ X)•,j = ((Σ−1/2 ) ⊗ X 0 )j,• )((Σ−1/2 )0 ⊗ X)•,j = ((Σ−1/2 )kj +1,• ⊗ (X•,rj +1 )0 )(((Σ−1/2 )•,kj +1 )0 ⊗ X•,rj +1 ) = (Σ−1/2 )kj +1,• ((Σ−1/2 )•,kj +1 )0 ⊗ (X•,rj +1 )0 X•,rj +1 = (Σ−1 )kj +1,kj +1 ⊗ (X•,rj +1 )0 X•,rj +1 = (Σ−1 )kj +1,kj +1 (X•,rj +1 )0 X•,rj +1 . Hence, using (C1), we get that for all j in {1, . . . , pq}, 1 (X•,j )0 X•,j ≤ M10 (Σ−1 )kj +1,kj +1 ≤ M10 sup ((Σ−1 )k+1,k+1 ) n k∈{0,...,q−1} ≤ M10 λmax (Σ−1 ) ≤ M10 m1 , where the last inequality comes from (C3), which gives (A1). Let us now prove that (C2) and (C4) imply (A2). Note that (X 0 X )J,J = (((Σ−1/2 )0 ⊗ X)0 ((Σ−1/2 )0 ⊗ X))J,J = (Σ−1/2 (Σ−1/2 )0 ⊗ X 0 X)J,J = (Σ−1 ⊗ X 0 X)J,J . Then, by Theorem 4.3.15 of Horn and Johnson (1986), λmin ((X 0 X )J,J ) = λmin ((Σ−1 ⊗ X 0 X)J,J ) ≥ λmin (Σ−1 ⊗ X 0 X) (36) = λmin (X 0 X)λmin (Σ−1 ). 16 M. PERROT-DOCKÈS, C. LÉVY-LEDUC, L. SANSONNET, AND J. CHIQUET Finally, by using Conditions (C2) and (C4), we obtain 1 1 λmin (X 0 X )J,J ≥ λmin (X 0 X)λmin (Σ−1 ) ≥ M20 m2 , n n which gives (A2).  Proof of Theorem 5. By Proposition 4,   e en ∩ B en ) = 1 − P(A ec ∪ B e c ) ≥ 1 − P(A ec ) − P(B e c ), P sign(B(λ)) = sign(B) ≥ P(A n n n n en and B en are defined in (17) and (18). By definition of A en , we get where A    λ e √ c −1 f −1 e e P(An ) = P (CJ,J ) WJ ≥ nq |BJ | − |(CJ,J ) sign(BJ )| . 2nq Observing that   eJ,J )−1 W fJ = (CJ,J )−1 WJ + (CJ,J )−1 W fJ − WJ (C   eJ,J )−1 − (CJ,J )−1 WJ + (C    fJ − WJ , eJ,J )−1 − (CJ,J )−1 W + (C   eJ,J )−1 sign(BJ ) = (CJ,J )−1 sign(BJ ) + (C eJ,J )−1 − (CJ,J )−1 sign(BJ ), (C and using the triangle inequality, we obtain that   √  nq λ −1 −1 c e (CJ,J ) WJ ≥ (CJ,J ) sign(BJ ) P(An ) ≤ P |BJ | − 5 2nq   √    nq λ −1 f −1 WJ − W J ≥ +P (CJ,J ) (CJ,J ) sign(BJ ) |BJ | − 5 2nq     √  nq λ −1 −1 −1 eJ,J ) − (CJ,J ) WJ ≥ (C +P |BJ | − (CJ,J ) sign(BJ ) 5 2nq    √    nq λ −1 −1 −1 e f WJ − WJ ≥ +P (CJ,J ) − (CJ,J ) |BJ | − (CJ,J ) sign(BJ ) 5 2nq   √    nq λ λ −1 −1 −1 e ( C ) − (C ) sign(B ) ≥ |B | − (C ) sign(B ) . +P √ J,J J,J J J J,J J 2 nq 5 2nq (37) The first term in the r.h.s of (37) tends to 0 by the definition of Acn and (34). By (31), the last term of (37) satisfies, for all j ∈ J:     2nq λ −1 −1 −1 eJ,J ) − (CJ,J ) P (C sign(BJ ) ≥ |BJ | − (CJ,J ) sign(BJ ) 5λ 2nq       2nq λq|J| −1 −1 −c2 e (CJ,J ) − (CJ,J ) ≥ ≤P sign(BJ ) M3 q − . 5λ 2nqM2 j VARIABLE SELECTION IN MULTIVARIATE LINEAR MODELS 17 eJ,J )−1 − (CJ,J )−1 and s = sign(BJ ) then for all j in J: Let U = (C |(U s)j | = (38) X Ujk sk ≤ p |J|kU k2 . k∈J We focus on eJ,J )−1 − (CJ,J )−1 k2 = k(C eJ,J )−1 (CJ,J − C eJ,J )(CJ,J )−1 k2 ≤ k(C eJ,J )−1 k2 kCJ,J − C eJ,J k2 k(CJ,J )−1 k2 k(C ≤ eJ,J ) eJ,J ) ρ(CJ,J − C ρ(CJ,J − C ≤ , eJ,J )λmin (CJJ ) eJ,J )(M2 /q) λmin (C λmin (C where the last inequality comes from Assumption (A2) of Theorem 1, which gives that q (39) k(CJ,J )−1 k2 ≤ . M2 Using Theorem 4.3.15 of Horn and Johnson (1986), we get eJ,J )−1 − (CJ,J )−1 k2 ≤ k(C e qρ(C − C) . e 2 λmin (C)M e given in (11) and (15), respectively, we get By definition of C and C (40) C= 0 b −1 Σ−1 ⊗ (X 0 X) e = Σ ⊗ (X X) . and C nq nq By using that the eigenvalues of the Kronecker product of two matrices is equal to the product of the eigenvalues of the two matrices, we obtain b −1 )λmax ((X 0 X)/n)q b −1 )λmax (Σ)λ b max ((X 0 X)/n)q ρ(Σ−1 − Σ ρ(Σ−1 − Σ ≤ b −1 )λmin ((X 0 X)/n)M2 λmin ((X 0 X)/n)M2 λmin (Σ   b −1 ) ρ(Σ b − Σ) + λmax (Σ) λmax ((X 0 X)/n)q ρ(Σ−1 − Σ ≤ , λmin ((X 0 X)/n)M2 eJ,J )−1 − (CJ,J )−1 k2 ≤ k(C (41) where the last inequality follows from Theorem 4.3.1 of Horn and Johnson (1986). Thus, by Assumptions (A5), (A6), (A8), (A9) and (A10), we get that (42) eJ,J )−1 − (CJ,J )−1 k2 = OP (q(nq)−1/2 ), as n → ∞. k(C Hence, by (38), we get for all j in J that     eJ,J )−1 − (CJ,J )−1 sign(BJ ) P (C   λq|J| 2nq M3 q −c2 − ≥ 5λ 2nqM2 j    √ p 2 nq λq|J| −1 −1 −c2 √ e ≤P |J| k(CJ,J ) − (CJ,J ) k2 ≥ M3 q nq − √ . 5λ 2 nqM2 By (33), (42) and (A3), it is enough to prove that  nq −c2  P q c1 /2 q(nq)−1/2 ≥ q → 0, as n → ∞. λ By the last condition of (L), nq −c2 λ q → ∞, as n → ∞, q 1+c1 18 M. PERROT-DOCKÈS, C. LÉVY-LEDUC, L. SANSONNET, AND J. CHIQUET and the result follows since n tends to infinity. Hence, the last term of (37) tends to zero as n tends to infinity. Let us now study the second term in the r.h.s of (37).      1  e0 e fJ − WJ = √1 W Xe0 Ee − X 0 E J = √ X E − X 0E nq nq J J      i 1 h b −1/2 b −1/2 )0 ⊗ IdRn Vec(E) − Σ−1/2 ⊗ X 0 (Σ−1/2 )0 ⊗ IdRn Vec(E) =√ Σ ⊗ X 0 (Σ nq J (43)  o i 1 hn b −1 d =√ Σ − Σ−1 ⊗ X 0 Vec(E) = AZ, nq J where Z is a centered Gaussian random vector having a covariance matrix equal to identity and  on oi 1 hn b −1 (44) A= √ . Σ − Σ−1 ⊗ X 0 (Σ1/2 )0 ⊗ IdRn nq J,• By Cauchy-Schwarz inequality, we get for all K × nq matrix B, and all nq × 1 vector U that for all k in {1, . . . , K}, |(BU )k | = (45) nq X Bk,` U` ≤ kBk2 kU k2 . `=1 Thus, for all j in J, for all γ in R and all |J| × |J| matrix D,       fJ − WJ (46) P D W ≥ γ = P (DAZ)j ≥ γ ≤ P (kDk2 kAk2 kZk2 ≥ γ) , j where A is defined in (44) and Z is a centered Gaussian random vector having a covariance matrix equal to identity. Hence, for all j in J,   √     nq λ −1 f −1 WJ − WJ P (CJ,J ) ≥ |Bj | − (CJ,J ) sign(BJ ) j 5 2nq j    √ nq λq|J| −c2 −1 M3 q − ≤ P k(CJ,J ) k2 kAk2 kZk2 ≥ . 5 2nqM2 Let us bound kAk2 . Observe that  on oi hn b −1 − Σ−1 ⊗ X 0 Σ (Σ1/2 )0 ⊗ Id =ρ h  J,• 2    i b −1 − Σ−1 Σ Σ b −1 − Σ−1 ⊗ (X 0 X) Σ   1/2 1/2 J,J b −1 − Σ−1 Σ Σ b −1 − Σ−1 Σ λmax X 0 X    b −1 − Σ−1 λmax (Σ)1/2 λmax X 0 X 1/2 , ≤ρ Σ ≤ρ (47) 1/2 VARIABLE SELECTION IN MULTIVARIATE LINEAR MODELS 19 where the first inequality comes from Theorem 4.3.15 of Horn and Johnson (1986). Hence, by (A5), (A8) and (A9)  on oi hn 1 b −1 − Σ−1 ⊗ X 0 = OP (q −1/2 (nq)−1/2 ). Σ (Σ1/2 )0 ⊗ Id (48) kAk2 = √ nq J,• 2 By (33), (39) and (48), it is enough to prove that ! nq X P Zk2 ≥ nq n q −2c2 → 0, as n → ∞. k=1 The result follows from the Markov inequality and the first condition of (L). Let us now study the third term in the r.h.s of (37). Observe that   i 1 h −1/2 WJ = √ Σ ⊗ X 0 (Σ−1/2 )0 ⊗ IdRn Vec(E) nq J h  i  1 d (49) Z =: A1 Z, =√ Σ−1 ⊗ X 0 (Σ1/2 )0 ⊗ IdRn nq J,• where Z is a centered Gaussian random vector having a covariance matrix equal to identity and i  1 h −1 (50) A1 = √ . Σ ⊗ X 0 (Σ1/2 )0 ⊗ IdRn nq J,• Using (45), we get for all j in J, for all γ in R and all |J| × |J| matrix D,     (51) P (D WJ )j ≥ γ = P (DA1 Z)j ≥ γ ≤ P (kDk2 kA1 k2 kZk2 ≥ γ) , where A1 is defined in (50) and Z is a centered Gaussian random vector having a covariance matrix equal to identity. Hence, for all j in J,    √     nq λ −1 −1 −1 e WJ P (CJ,J ) − (CJ,J ) ≥ |Bj | − (CJ,J ) sign(BJ ) j 5 2nq j   √  nq λq|J| −1 −1 −c2 e ≤ P (CJ,J ) − (CJ,J ) kA1 k2 kZk2 ≥ M3 q − . 5 2nqM2 2 Let us now bound kA1 k2 . Note that h i  Σ−1 ⊗ X 0 (Σ1/2 )0 ⊗ IdRn J,• 2 = h i Σ−1/2 ⊗ X 0 J,• 2   1/2  1/2 = ρ Σ−1 ⊗ (X 0 X) J,J ≤ ρ Σ−1 ⊗ (X 0 X) ≤ λmax (Σ−1 )1/2 λmax (X 0 X)1/2 , where the first inequality comes from Theorem 4.3.15 of Horn and Johnson (1986). Hence, by (A5) and (A7), 1 (52) kA1 k2 ≤ λmax (Σ−1 )1/2 λmax (X 0 X)1/2 = OP (q −1/2 ). nq By (33), (42) and (52) it is thus enough to prove that ! nq X 2 −2c2 P Zk ≥ nq n q → 0, as n → ∞. k=1 The result follows from the Markov inequality and the first condition of (L). 20 M. PERROT-DOCKÈS, C. LÉVY-LEDUC, L. SANSONNET, AND J. CHIQUET Let us now study the fourth term in the r.h.s of (37). By (46), for all j in J,   P  ≤P eJ,J )−1 − CJ,J )−1 (C  √   nq λ ≥ |Bj | − (CJ,J )−1 sign(BJ ) j 5 2nq j  √  nq λq|J| −c2 M3 q − , kAk2 kZk2 ≥ 5 2nqM2   fJ − WJ W eJ,J )−1 − CJ,J )−1 (C 2 where A is defined in (44). By (33), (42) and (48), it is thus enough to prove that P nq X ! Zk2 ≥ (nq) n2 q 1−2c2 → 0, as n → ∞. k=1 The result follows from the Markov inequality and the fact that c2 < 1/2. en ). By definition of B en , we get that Let us now study P(B enc ) = P P(B   λ  −1 f −1 e f e e e c c c CJ ,J (CJ,J ) WJ − WJ ≥ √ 1 − |CJ ,J (CJ,J ) sign(BJ )| . 2 nq Observe that eJ c ,J (C eJ,J )−1 W fJ − W fJ c = CJ c ,J (CJ,J )−1 WJ − WJ c C   fJ − WJ + CJ c ,J (CJ,J )−1 W   eJ,J )−1 − (CJ,J )−1 WJ + CJ c ,J (C    eJ,J )−1 − (CJ,J )−1 W fJ − WJ + CJ c ,J (C   eJ c ,J − CJ c ,J (CJ,J )−1 WJ + C     fJ − WJ eJ c ,J − CJ c ,J (CJ,J )−1 W + C    eJ c ,J − CJ c ,J (C eJ,J )−1 − (CJ,J )−1 WJ + C     fJ − WJ eJ c ,J − CJ c ,J (C eJ,J )−1 − (CJ,J )−1 W + C fJ c . + WJ c − W Moreover, eJ c ,J (C eJ,J )−1 sign(BJ ) = CJ c ,J (CJ,J )−1 sign(BJ ) C   eJ,J )−1 − (CJ,J )−1 sign(BJ ) + CJ c ,J (C   eJ c ,J − CJ c ,J (CJ,J )−1 sign(BJ ) + C    eJ c ,J − CJ c ,J (C eJ,J )−1 − (CJ,J )−1 sign(BJ ). + C VARIABLE SELECTION IN MULTIVARIATE LINEAR MODELS By (IC) and the triangle inequality, we obtain that   λ c −1 e ) ≤ P CJ c ,J (CJ,J ) WJ − WJ c ≥ √ η P(B n 24 nq     λ −1 f WJ − WJ ≥ √ η + P CJ c ,J (CJ,J ) 24 nq     λ −1 −1 e +P CJ c ,J (CJ,J ) − (CJ,J ) WJ ≥ √ η 24 nq      λ −1 −1 e f +P CJ c ,J (CJ,J ) − (CJ,J ) WJ − WJ ≥ √ η 24 nq     λ eJ c ,J − CJ c ,J (CJ,J )−1 WJ ≥ √ +P C η 24 nq       λ −1 fJ − WJ ≥ √ η eJ c ,J − CJ c ,J (CJ,J ) W +P C 24 nq      λ −1 −1 e e +P CJ c ,J − CJ c ,J (CJ,J ) − (CJ,J ) WJ ≥ √ η 24 nq       λ −1 −1 f e e WJ − WJ ≥ √ η +P CJ c ,J − CJ c ,J (CJ,J ) − (CJ,J ) 24 nq   λ fJ c ≥ √ η +P WJ c − W 24 nq n   o eJ,J )−1 − (CJ,J )−1 sign(BJ ) ≥ η +P CJ c ,J (C 12 n   η o −1 e +P CJ c ,J − CJ c ,J (CJ,J ) sign(BJ ) ≥ 12 n    η o −1 −1 e e +P sign(BJ ) ≥ . CJ c ,J − CJ c ,J (CJ,J ) − (CJ,J ) 12 (53) The first term in the r.h.s of (53) tends to 0 by (35). Let us now study the second term of (53). By (46), we get that for all j in J c ,     λ −1 f P CJ c ,J (CJ,J ) WJ − WJ ≥ √ η 24 nq j   λ −1 ≤ P kCJ c ,J k2 k(CJ,J ) k2 kAk2 kZk2 ≥ √ η . 24 nq Observe that  k(X•,J c )0 k2 kX•,J k2 (X•,J c )0 X•,J (X•,J )0 X•,J c 1/2 1 kCJ c ,J k2 = ρ = (X•,J c )0 X•,J 2 ≤ √ √ nq nq nq nq nq  1/2  1/2 0 0 (X•,J c ) X•,J c (X•,J ) X•,J ρ ≤ρ nq nq λmax (Σ−1 ) (54) = ρ(CJ c J c )1/2 ρ(CJ,J )1/2 ≤ ρ(C) = λmax (X 0 X/n) = OP (q −1 ). q  21 22 M. PERROT-DOCKÈS, C. LÉVY-LEDUC, L. SANSONNET, AND J. CHIQUET In (54) the last inequality and the fourth equality come from Theorem 4.3.15 of Horn and Johnson (1986) and (40), respectively. The last equality comes from (A5) and (A7). By (39), (48) and (54), it is thus enough to prove that 2 !  2 !  nq nq X X λ λ √ P Zk2 ≥ (nq)1/2 q √ → 0, as n → ∞, =P Zk2 ≥ (nq) √ nq n k=1 k=1 which holds true by the second condition of (L) and Markov inequality. Hence, the second term of (53) tends to zero as n tends to infinity. Let us now study the third term of (53). By (51), we get that for all j in J c ,      λ −1 −1 e P CJ c ,J (CJ,J ) − (CJ,J ) WJ ≥ √ η 24 nq j   λ −1 −1 e ≤ P kCJ c ,J k2 k(CJ,J ) − (CJ,J ) k2 kA1 k2 kZk2 ≥ √ η . 24 nq By (42), (52) and (54), it is thus enough to prove that 2 !   !  nq nq X X λ λ 2 2 2 1/2 √ q√ =P Zk ≥ (nq) √ → 0, as n → ∞, P Zk ≥ (nq) nq n k=1 k=1 which holds true by the second condition of (L) and Markov inequality. Hence, the third term of (53) tends to zero as n tends to infinity. Let us now study the fourth term of (53). By (46), it amounts to prove that   λ −1 −1 e P kCJ c ,J k2 k(CJ,J ) − (CJ,J ) k2 kAk2 kZk2 ≥ √ η → 0, as n → ∞. 24 nq By (54), (42) and (48) it is enough tho prove that   ! nq X λ 2 2 P Zk ≥ (nq) (nq) √ → 0, as n → ∞, n k=1 which holds true by the second condition of (L). Hence, the fourth term of (53) tends to zero as n tends to infinity. Let us now study the fifth term of (53). By (51), proving that the fifth term of (53) tends to 0 amounts to proving that   λ −1 e c c P CJ ,J − CJ ,J k(CJ,J ) k2 kA1 k2 kZk2 ≥ √ η → 0, as n → ∞. 24 nq 2 eJ c ,J k2 . Let us now bound kCJ c ,J − C CJ c ,J ≤ (55) =  eJ c ,J −C e C −C 2  =  J c ,J 1 b −1 Σ−1 − Σ q  e C −C e C −C   J c ,J 2 1/2 J c ,J ∞ X 0X ∞ n ≤ =ρ   e C −C e C −C   J c ,J   e C −C e C −C 1/2 ∞ 1/2  J c ,J e ≤ C −C = OP (q −1 (nq)−1/2 ), ∞ as n tends to infinity, where the last equality comes from (A5) and (A9). ∞ VARIABLE SELECTION IN MULTIVARIATE LINEAR MODELS 23 By (39), (52) and (55), to prove that the fifth term of (53) tends to zero as n tends to infinity, it is enough to prove that  !  nq X λ 2 2 → 0, as n → ∞, P Zk ≥ nq √ n k=1 which holds using Markov’s inequality and the second condition of (L). Using similar arguments as those used for proving that the second, third and fourth terms of (53) tend to zero, we get that the sixth, seventh and eighth terms of (53) tend to zero, as n tends to infinity, by replacing (54) by (55). Let us now study the ninth term of (53). Replacing J by J c in (43), (44), (46, (47) and (48) in order to prove that the ninth term of (53) tends to 0 it is enough to prove that  2 ! nq X λ P Zk2 ≥ nq √ → 0, as n → ∞, n k=1 which holds using Markov’s inequality and the second condition of (L). Let us now study the tenth term of (53). Using the same idea as the one used for proving (38), we get that  n  o eJ,J )−1 − (CJ,J )−1 sign(BJ ) ≥ η P CJ c ,J (C 12  p η −1 −1 e ≤P |J| kCJ c ,J k2 (CJ,J ) − (CJ,J ) ≥ , 12 2 which tends to zero as n tends to infinity by (A3), (42), (54) and the fact that c1 < 1/2. Let us now study the eleventh term of (53). Using the same idea as the one used for proving (38), we get that  o n  eJ c ,J − CJ c ,J (CJ,J )−1 sign(BJ ) ≥ η P C 12  p −1 eJ c ,J − CJ c ,J k(CJ,J ) k2 ≥ η , ≤P |J| C 12 2 which tends to zero as n tends to infinity by (A3), (39) and (55) and the fact that c1 < 1/2. Finally, the twelfth term of (53) can be bounded as follows: n    o eJ c ,J − CJ c ,J (C eJ,J )−1 − (CJ,J )−1 sign(BJ ) ≥ η C P 12  p η −1 −1 eJ c ,J − CJ c ,J eJ,J ) − (CJ,J ) ≤P |J| C (C ≥ , 12 2 2 which tends to zero as n tends to infinity by (A3), (42) and (55) and the fact that c1 < 1/2.  Proof of Proposition 6. Observe that  1 −φ1 0 ··· 0 2 ··· 0 −φ1 1 + φ1 −φ1  .. .. ..  −1 . . −φ1 . (56) Σ = 0  . . .  .. .. . . 1 + φ2 −φ 1 1 0 0 ··· −φ1 1     .   24 M. PERROT-DOCKÈS, C. LÉVY-LEDUC, L. SANSONNET, AND J. CHIQUET Let S = X 0 X = Σ−1 ⊗ X 0 X. Then,  nri +1    (1 + φ21 )nri +1 Si,j = −φ1 nri +1    0 if j = i and ki ∈ {0, q − 1} if j = i and ki ∈ / {0, q − 1} , if j = i + p or if j = i − p otherwise where i − 1 = (p − 1)ki + ri corresponds to the Euclidean division of (i − 1) by (p − 1). In order to prove (IC), it is enough to prove that kSJ c ,J (SJ,J )−1 k∞ ≤ 1 − η, where η ∈ (0, 1). Since for all j, (j − p) ∈ J c or (j + p) ∈ J c , kSJ c ,J k∞ = ν|φ1 |. Let A = SJ,J . Since A = (ai,j ) is a diagonally dominant matrix, then, by Theorem 1 of Varah (1975), 1 X kA−1 k∞ ≤ . mink (ak,k − ak,j ) 1≤j≤|J| j6=k Using that for all j, (j − p) ∈ Jc J c, or (j + p) ∈ X ak,j ≤ ν|φ1 |. 1≤j≤|J| j6=k If k ∈ J then k > p and k < pq − p. Thus, ak,k ≥ ν(1 + φ21 ). Hence, kA−1 k∞ ≤ 1 ν(1 + φ21 − |φ1 |) and |φ1 | . 1 + φ21 − |φ1 | Since |φ1 | < 1, the strong Irrepresentability Condition holds when kSJ c ,J (SJ,J )−1 k∞ ≤ kSJ c ,J k∞ k(SJ,J )−1 k∞ ≤ |φ1 | ≤ (1 − η)(1 + |φ1 |2 − |φ1 |), which is true for a small enough η. Proof of Proposition 7. Since |φ1 | < 1, kΣ−1 k∞ ≤ |φ1 | + |1 + φ21 | ≤ 3, which gives (A7) by Theorem 5.6.9 of Horn and Johnson (1986). Observe that !   q−1 X 3 − |φ1 | 1 1 2 3 h kΣk∞ ≤ 1+2 |φ1 | ≤ = ≤ , 1+ 2 2 2 1 − |φ1 | 1 − φ1 1 − φ1 1 − φ1 1 − φ21 h=1 which gives (A8) by Theorem 5.6.9 of Horn and Johnson (1986).  VARIABLE SELECTION IN MULTIVARIATE LINEAR MODELS 25 c1 b −1 has the same expression as Σ−1 defined in (56) except that φ1 is replaced by φ Since Σ defined in (21), we get that b −1 Σ−1 − Σ ∞  2 ≤ 2 φ1 − φb1 + φ1 − φb1 , which implies Assumption (A9) of Theorem 5 by Lemma 8. Let us now check Assumption (A10) of Theorem 5. Since, by Theorem 5.6.9 of Horn and b ≤ kΣ − Σk b ∞ , it is enough to prove that Johnson (1986), ρ(Σ − Σ) b Σ−Σ ∞ = OP ((nq)−1/2 ), as n → ∞. Observe that b Σ−Σ ∞ ≤ q−1 X 1 φh1 φbh1 1 − + 2 − 1 − φ21 1 − φb21 1 − φ21 1 − φb21 h=1 q−1 q−1 X X φh1 − φbh1 ≤ +2 φbh1 +2 1 − φ21 (1 − φ21 )(1 − φb21 ) h=1 h=1 φ21 − φb21 1 1 − 2 1 − φ1 1 − φb21 ! ! q−1 q−1   X X φh1 − φbh1 1 (φ1 − φb1 )(φ1 + φb1 ) 1 ≤ +2 +2 φbh1 − φh1 − 1 − φ21 1 − φ21 1 − φb21 (1 − φ21 )(1 − φb21 ) h=1 h=1 ! q−1 X 1 1 h +2 φ1 − 1 − φ21 1 − φb21 h=1 ! q−1   (φ1 − φb1 )(φ1 + φb1 ) (φ1 − φb1 )(φ1 + φb1 ) X bh 2 1 ≤ 1+ +2 φ1 − φh1 . 2| + 2 2 2 2 b b 1 − |φ | |1 − φ 1 (1 − φ1 )(1 − φ1 ) (1 − φ1 )(1 − φ1 ) 1 h=1 Moreover, q−1 X φbh1 − φh1 ≤ φb1 − φ1 h=1 ≤ φb1 − φ1 q−1 X h−1 X k |φ1 | |φb1 |h−k−1 ≤ φb1 − φ1 h=1 k=0 1 1 − |φb1 | ! 1 1 − |φ1 | 1 − |φb1 |q−1 1 − |φb1 | ! 1 − |φ1 |q−1 1 − |φ1 |   . Thus, by Lemma 8, b Σ−Σ ∞ = OP ((nq)−1/2 ), which implies Assumption (A10) of Theorem 5. Proof of Lemma 8. In the following, for notational simplicity, q = qn . Observe that Pn Pq b b √1 i=1 √ b `=2 Ei,` Ei,`−1 nq nq φ1 = . P P q−1 b 2 n 1 i=1 `=1 Ei,` nq  26 M. PERROT-DOCKÈS, C. LÉVY-LEDUC, L. SANSONNET, AND J. CHIQUET By (19), q n X X bi,` E bi,`−1 = E i=1 `=2 q X b•,`−1 = b•,` )0 E (E `=2 `=2 (57) = q X q X (ΠE•,` )0 (ΠE•,`−1 ) (φ1 ΠE•,`−1 + ΠZ•,` )0 (ΠE•,`−1 ) `=2 q−1 X = φ1 0 (ΠE•,` ) (ΠE•,` ) + `=1 q X (ΠZ•,` )0 (ΠE•,`−1 ), `=2 where (57) comes from the definition of (Ei,t ). Hence, Pq 0 √1 √ `=2 (ΠZ•,` ) (ΠE•,`−1 ) nq b nq(φ1 − φ1 ) = . 1 Pn Pq−1 b 2 i=1 `=1 Ei,` nq √ In order to prove that nq(φb1 − φ1 ) = OP (1), it is enough to prove that n q−1 n q−1 1 XX 2 1 X X b2 Ei,` − Ei,` = oP (1), as n → ∞, nq nq (58) i=1 `=1 i=1 `=1 by Lemma 10 and q 1 X (ΠZ•,` )0 (ΠE•,`−1 ) = OP (1), as n → ∞. √ nq (59) `=2 Let us first prove (58). By (20), Eb = [IdRq ⊗ Π] E := AE. Note that b = A(Σ ⊗ IdRn )A0 = Σ ⊗ Π. Cov(E) Hence, for all i Var(Ebi ) ≤ λmax (Σ). Since the covariance matrix of E is equal to Σ ⊗ IdRn , for all i Var(Ei ) ≤ λmax (Σ). By Markov inequality, q q n q−1 n q−1 n n 1 X X b2 1 XX 2 1 X X b2 1 XX 2 Ei,` − Ei,` = Ei,` − Ei,` + oP (1) nq nq nq nq i=1 `=1 i=1 `=1 i=1 `=1 i=1 `=1  1  b 2 + oP (1). = kEk22 − kEk 2 nq Observe that b 2 = kEk2 − kAEk2 = E 0 E − E 0 A0 AE = E 0 (IdRnq − IdRq ⊗ Π) E kEk2 − kEk 2 0 2 2 2 = E (IdRq ⊗ (IdRn − Π)) E = pq X i=1 Eei2 , VARIABLE SELECTION IN MULTIVARIATE LINEAR MODELS 27 where Ee = OE, where O is an orthogonal matrix. Using that e i,i ≤ λmax (Σ), E(Eei2 ) = Cov(E) and Markov inequality, we get (58). Let us now prove (59). By definition of (Ei,t ) and since |φ1 | < 1, E[(ΠZ•,` )0 (ΠE•,`−1 )] = 0. Moreover,   2  !2  ! n q X q n n X X X X (ΠZ•,` )0 (ΠE•,`−1 )  = E  Πi,k Zk,`  E Πi,j Ej,`−1   `=2 i=1 `=2 = X X k=1 j=1 Πi,k Πi0 ,k0 Πi,j Πi0 ,j 0 E Zk,` Zk0 ,`0 Ej,`−1 Ej 0 ,`0 −1  2≤`,`0 ≤q 1≤i,j,k,i0 ,j 0 ,k0 ≤n = X X Πi,k Πi0 ,k0 Πi,j Πi0 ,j 0 2≤`,`0 ≤q 1≤i,j,k,i0 ,j 0 ,k0 ≤n X  φr1 φs1 E Zk,` Zk0 ,`0 Zj,`−1−r Zj 0 ,`0 −1−s , r,s≥0 since the (Ei,t ) are AR(1) processes with |φ1 | < 1. Note that E(Zk,` Zk0 ,`0 Zj,`−1−r Zj 0 ,`0 −1−s ) = 0 except when ` = `0 , k = k 0 , j = j 0 and r = s. Thus,    !2  q q X X X X 0 4 2r    (ΠZ•,` ) (ΠE•,`−1 ) =σ E φ1 Πi,k Πi0 ,k Πi,j Πi0 ,j r≥0 `=2 = `=2 1≤i,j,k,i0 ≤n qσ 4 nqσ 4 Tr(Π) ≤ , 2 1 − φ1 1 − φ21 where Tr(Π) denotes the trace of Π, which concludes the proof of (59) by Markov inequality.  5. Technical lemmas Lemma 9. Let A ∈ Mn (R) and Π an orthogonal projection matrix. For any j in {1, . . . , n} (A0 ΠA)jj ≥ 0. Proof of Lemma 9. Observe that (A0 ΠA) = A0 Π0 ΠA = (ΠA)0 (ΠA), since Π is an orthogonal projection matrix. Moreover, (A0 ΠA)jj = e0j (ΠA)0 (ΠA)ej ≥ 0, since (ΠA)0 (ΠA) is a positive semidefinite symmetric matrix, where ej is a vector containing null entries except the jth entry which is equal to 1.  Lemma 10. Assume that (E1,t )t , (E2,t )t , ..., (En,t )t are independent AR(1) processes satisfying: Ei,t − φ1 Ei,t−1 = Zi,t , ∀i ∈ {1, . . . , n}, where the Zi,t ’s are zero-mean i.i.d. Gaussian random variables with variance σ 2 and |φ1 | < 1. Then, n qn −1 σ2 1 XX 2 P Ei,` −→ , as n → ∞. nqn 1 − φ21 i=1 `=1 28 M. PERROT-DOCKÈS, C. LÉVY-LEDUC, L. SANSONNET, AND J. CHIQUET 2 ) = Proof of Lemma 10. In the following, for notational simplicity, q = qn . Since E(Ei,` σ 2 /(1 − φ21 ), it is enough to prove that n q−1  P 1 XX 2 2 Ei,` − E(Ei,` ) −→ 0, as n → ∞. nq i=1 `=1 Since 2  2 Ei,` = X φj1 Zi,`−j  = (60) = n q−1  1 XX 2 2 Ei,` − E(Ei,` ) nq 1 (nq)2 i=1 `=1 n X X X 0 φj1 φj1 Zi,`−j Zi,`−j 0 , j,j 0 ≥0 j≥0 Var X ! n 1 X = (nq)2 X i=1 0 X 2 2 Cov(Ei,` ; Ei,` 0) 1≤`,`0 ≤q−1 0 φj1 φj1 φk1 φk1 Cov(Zi,`−j Zi,`−j 0 ; Zi,`0 −k Zi,`0 −k0 ). i=1 1≤`,`0 ≤q−1 j,j 0 ≥0 k,k0 ≥0 By Cauchy-Schwarz P inequality | Cov(Zi,`−j Zi,`−j 0 ; Zi,`0 −k Zi,`0 −k0 )| is bounded by a positive constant. Moreover j≥0 |φ1 |j < ∞, hence (60) tends to zero as n tend to infinity, which concludes the proof of the lemma.  References Alquier, P. and P. Doukhan (2011). Sparsity considerations for dependent variables. Electron. J. Statist. 5, 750–774. Banerjee, O., L. E. Ghaoui, and A. D’aspremont (2008). Model selection through sparse maximum likelihood estimation for multivariate gaussian or binary data. Journal of Machine Learning Research 9, 485–516. Brockwell, P. J. and R. A. Davis (1990). Time Series: Theory and Methods. New York, NY, USA: Springer-Verlag New York, Inc. Fan, J. and R. Li (2001). Variable selection via nonconcave penalized likelihood and its oracle properties. Journal of the American Statistical Association 96 (456), 1348–1360. Friedman, J., T. Hastie, and R. Tibshirani (2008). Sparse inverse covariance estimation with the graphical lasso. Biostatistics 9 (3), 432. Horn, R. A. and C. R. Johnson (1986). Matrix Analysis. New York, NY, USA: Cambridge University Press. Lee, W. and Y. Liu (2012). Simultaneous Multiple Response Regression and Inverse Covariance Matrix Estimation via Penalized Gaussian Maximum Likelihood. J. Multivar. Anal. 111, 241–255. Lütkepohl, H. (2005). New introduction to multiple time series analysis. Berlin: Springer. Mehmood, T., K. H. Liland, L. Snipen, and S. Saebo (2012). A review of variable selection methods in partial least squares regression. Chemometrics and Intelligent Laboratory Systems 118, 62 – 69. Meng, C., B. Kuster, A. C. Culhane, and A. M. Gholami (2014). A multivariate approach to the integration of multi-omics datasets. BMC Bioinformatics 15 (1), 162. Perrot-Dockès, M., C. Lévy-Leduc, J. Chiquet, L. Sansonnet, M. Brégère, M. P. Étienne, S. Robin, and G. Genta-Jouve (2017). A multivariate variable selection approach for analyzing LC-MS metabolomics data. arXiv:1704.00076. VARIABLE SELECTION IN MULTIVARIATE LINEAR MODELS 29 Pourahmadi, M. (2013). High-Dimensional Covariance Estimation. Wiley Series in Probability and Statistics. Rothman, A. J., P. J. Bickel, E. Levina, and J. Zhu (2008). Sparse permutation invariant covariance estimation. Electron. J. Statist. 2, 494–515. Rothman, A. J., E. Levina, and J. Zhu (2010). Sparse multivariate regression with covariance estimation. Journal of Computational and Graphical Statistics 19 (4), 947–962. Tibshirani, R. (1996). Regression shrinkage and selection via the Lasso. J. Royal. Statist. Soc B. 58 (1), 267–288. Varah, J. (1975). A lower bound for the smallest singular value of a matrix. Linear Algebra and its Applications 11 (1), 3 – 5. Yuan, M. and Y. Lin (2007). Model selection and estimation in the gaussian graphical model. Biometrika 94 (1), 19–35. Zhao, P. and B. Yu (2006). On model selection consistency of lasso. Journal of Machine Learning Research 7, 2541–2563. UMR MIA-Paris, AgroParisTech, INRA, Université Paris-Saclay, 75005, Paris, France E-mail address: [email protected] UMR MIA-Paris, AgroParisTech, INRA, Université Paris-Saclay, 75005, Paris, France E-mail address: [email protected] UMR MIA-Paris, AgroParisTech, INRA, Université Paris-Saclay, 75005, Paris, France E-mail address: [email protected] UMR MIA-Paris, AgroParisTech, INRA, Université Paris-Saclay, 75005, Paris, France E-mail address: [email protected]
10math.ST
A Survey Of Methods For Explaining Black Box Models Riccardo Guidotti1,2 , Anna Monreale1 , Franco Turini1 , Dino Pedreschi1 , Fosca Giannotti2 1 University of Pisa, {name.surname}@di.unipi.it ISTI-CNR, Pisa, {name.surname}@isti.cnr.it arXiv:1802.01933v2 [cs.CY] 19 Feb 2018 2 Abstract. In the last years many accurate decision support systems have been constructed as black boxes, that is as systems that hide their internal logic to the user. This lack of explanation constitutes both a practical and an ethical issue. The literature reports many approaches aimed at overcoming this crucial weakness sometimes at the cost of scarifying accuracy for interpretability. The applications in which black box decision systems can be used are various, and each approach is typically developed to provide a solution for a specific problem and, as a consequence, delineating explicitly or implicitly its own definition of interpretability and explanation. The aim of this paper is to provide a classification of the main problems addressed in the literature with respect to the notion of explanation and the type of black box system. Given a problem definition, a black box type, and a desired explanation this survey should help the researcher to find the proposals more useful for his own work. The proposed classification of approaches to open black box models should also be useful for putting the many research open questions in perspective. Keywords: Open The Black Box, Explanations, Interpretability, Transparent Models 1 Introduction The last decade has witnessed the rise of ubiquitous opaque decision systems. These black box systems exploit sophisticated machine learning models to predict individual information that may also be sensitive. We can consider credit score, insurance risk, health status, as examples. Machine learning algorithms build predictive models which are able to map user features into a class (outcome or decision) thanks to a learning phase. This learning process is made possible by the digital traces that people leave behind them while performing everyday activities (e.g., movements, purchases, comments in social networks, etc.). This enormous amount of data may contain human biases and prejudices. Thus, decision models learned on them may inherit such biases, possibly leading to unfair and wrong decisions. 2 R. Guidotti et al. The European Parliament recently adopted the General Data Protection Regulation (GDPR), which will become law in May 2018. An innovative aspect of the GDPR, which has been much debated, are the clauses on automated (algorithmic) individual decision-making, including profiling, which for the first time introduce, to some extent, a right of explanation for all individuals to obtain “meaningful explanations of the logic involved” when automated decision making takes place. Despite divergent opinions among legal scholars regarding the real scope of these clauses [31,101,15], everybody agrees that the need for the implementation of such a principle is urgent and that it represents today a huge open scientific challenge. Without an enabling technology capable of explaining the logic of black boxes, the right to an explanation will remain a “dead letter”. By relying on sophisticated machine learning models trained on massive datasets thanks to scalable, high-performance infrastructures, we risk to create and use decision systems that we do not really understand. This impacts not only information on ethics, but also on safety and on industrial liability. Companies increasingly market services and products by embedding machine learning components, often in safety-critical industries such as self-driving cars, robotic assistants, and personalized medicine. Another inherent risk of these components is the possibility of inadvertently making wrong decisions, learned from artifacts or spurious correlations in the training data, such as recognizing an object in a picture by the properties of the background or lighting, due to a systematic bias in training data collection. How can companies trust their products without understanding and validating the underlying rationale of their machine learning components? Gartner predicts that “by 2018 half of business ethics violations will occur through the improper use of Big Data analytics”. Explanation technologies are an immense help to companies for creating safer, more trustable products, and better managing any possible liability they may have. Likewise, the use of machine learning models in scientific research, for example in medicine, biology, socio-economic sciences, requires an explanation not only for trust and acceptance of results, but also for the sake of the openness of scientific discovery and the progress of research. As a consequence, explanation is at the heart of a responsible, open data science, across multiple industry sectors and scientific disciplines. Different scientific communities studied the problem of explaining machine learning decision models. However, each community addresses the problem from a different perspective and provides a different meaning to explanation. Most of the works in the literature come from the machine learning and data mining communities. The first one is mostly focused on describing how black boxes work, while the second one is more interested in explaining the decisions even without understanding the details on how the opaque decision systems work in general. Despite the fact that interpretable machine learning has been a topic for quite some time and received recently much attention, today there are many ad-hoc scattered results, and a systematic organization and classification of these methodologies is missing. Many questions feed the papers in the literature proposing methodologies for interpreting black box systems [106,34]: What Open The Black Box Survey 3 does it mean that a model is interpretable or transparent? What is an explanation? When a model or an explanation is comprehensible? Which is the best way to provide an explanation and which kind of model is more interpretable? Which are the problems requiring interpretable models/predictions? What kind of decision data are affected? Which type of data records is more comprehensible? How much are we willing to lose in prediction accuracy to gain any form of interpretability? We believe that a clear classification considering simultaneously all these aspects is needed to organize the body of knowledge about research investigating methodologies for opening and understanding the black box. Existing works tend to provide just a general overview of the problem [59] highlighting unanswered questions and problems [24]. On the other hand, other works focus on particular aspects like the impact of representation formats on comprehensibility [36], or the interpretability issues in term of advantages and disadvantages of selected predictive models [27]. Consequently, after recognizing four categories of problems and a set of ways to provide an explanation, we have chosen to group the methodologies for opening and understanding black box predictors by considering simultaneously the problem they are facing, the class of solutions proposed for the explanation, the kind of data analyzed and the type of predictor explained. The rest of the paper is organized as follows. Firstly, in Section 3 we discuss what interpretability is. Section 2 show which are the motivations for requiring explanation for black box systems by illustrating some real cases. In Section 4 we formalize our problem definitions used to categorize the state of the art works. Details of the classification and crucial points distinguishing the various approaches and papers are discussed in Section 5. Sections 6, 7, 8 and 9 present the details of the solutions proposed. Finally, Section 10 summarizes the crucial aspects emerged from the analysis of the state of the art and discusses which are the open research questions and future research directions. 2 Needs for Interpretable Models Which are the real problems requiring interpretable models and explainable predictions? In this section, we briefly report some cases showing how and why black boxes can be dangerous. Indeed, delegating decisions to black boxes without the possibility of an interpretation may be critical, can create discrimination and trust issues. Training a classifier on historical datasets, reporting human decisions, could lead to the discovery of endemic preconceptions [76]. Moreover, since these rules can be deeply concealed within the trained classifier, we risk to consider, maybe unconsciously, such practices and prejudices as general rules. We are warned about a growing “black box society” [74], governed by “secret algorithms protected by industrial secrecy, legal protections, obfuscation, so that intentional or unintentional discrimination becomes invisible and mitigation becomes impossible.” 4 R. Guidotti et al. Automated discrimination is not new and is not necessarily due to “black box” models. A computer program for screening job applicants were used during the 1970s and 1980s in St. George’s Hospital Medical School (London). The program used information from applicants’ forms, without any reference to ethnicity. However, the program was found to unfairly discriminate against ethnic minorities and women by inferring this information from surnames and place of birth, and lowering their chances of being selected for interview [62]. More recently, the journalists of propublica.org have shown that the COMPAS score, a predictive model for the “risk of crime recidivism” (proprietary secret of Northpointe), has a strong ethnic bias. Indeed, according to this score, a black who did not re-offend were classified as high risk twice as much as whites who did not re-offend, and white repeat offenders were classified as low risk twice as much as black repeat offenders3 . Similarly, a study at Princeton [11] shows how text and web corpora contain human biases: names that are associated with black people are found to be significantly more associated with unpleasant than with pleasant terms, compared to names associated with whites. As a consequence, the models learned on such text data for opinion or sentiment mining have a possibility of inheriting the prejudices reflected in the data. Another example is related to Amazon.com. In 2016, the software used to determine the areas of the US to which Amazon would offer free same-day delivery, unintentionally restricted minority neighborhoods from participating in the program (often when every surrounding neighborhood was allowed)4 . With respect to credit bureaus, it is shown in [12] that banks providing credit scoring for millions of individuals, are often discordant: in a study of 500, 000 records, 29% of consumers received credit scores that differed by at least fifty points among three major US banks (Experian, TransUnion, and Equifax). Such a difference might mean tens of thousands of dollars over the life of a mortgage. So much variability implies that the three scoring systems either have a very different and undisclosed bias, or are highly arbitrary. As example of bias we can consider [27] and [84]. In these works, the authors show how accurate black box classifiers may result from an accidental artifact in the training data. In [27] the military trained a classifier to recognize enemy tanks from friendly tanks. The classifier resulted in a high accuracy on the test set, but when it was used in the field had very poor performance. Later was discovered that enemy photos were taken on overcast days, while friendly photos on sunny days. Similarly, in [84] is shown that a classifier trained to recognize wolves and husky dogs were basing its predictions to classify a wolf solely on the presence of snow in the background. Nowadays, Deep Neural Networks (DNNs) have been reaching very good performances on different pattern-recognition tasks such as visual and text classification which are easily performed by humans: e.g., saying that a tomato is displaced in a picture or that a text is about a certain topic. Thus, what differ3 4 http://www.propublica.org/article/machine-bias-risk-assessments-in-criminal-sentencing http://www.techinsider.io/how-algorithms-can-be-racist-2016-4 Open The Black Box Survey 5 ences remain between DNNs and humans? Despite the excellent performance of DNNs it seems to be a lot. In [93] it is shown the alteration of an image (e.g. of a tomato) such that the change is undetectable for humans can lead a DNN to tag the image as something else (e.g., labeling a tomato as a dog). In [69] a related result is shown. It is easy to produce images that DNNs believe to be recognizable with 99.99% confidence, but which are completely unrecognizable to humans (e.g., labeling white static noise as a tomato). Similarly in [46] visually-indistinguishable training-set are created using DNNs and linear models. With respect to text, in [58] effective methods to attack DNN text classifiers are presented. Experiments show that the perturbations introduced in the text are difficult to be perceived by a human but are still able to fool a state-of-the-art DNN to misclassify a text as any desirable class. These results show interesting differences between humans and DNNs, and raise reasonable doubts about trusting such black boxes. In [112] it is shown how conventional regularization and small generalization error fail to explain why DNNs generalize well in practice. Specifically, they prove that established state-of-the-art CNN trained for image classification easily fits a random labeling of the training data. This phenomenon occurs even if the true images are replaced by unstructured random noise. 3 Interpretable, Explainable and Comprehensible Models Before presenting the classification of the problems addressed in the literature with respect to black box predictors, and the corresponding solutions and models categorization, it is crucial to understand what interpretability is. Thus, in this section, we discuss what an interpretable model is, and we analyze the various dimensions of interpretability as well as the desiderata for an interpretable model. Moreover, we also discuss the meaning of words like interpretability, explainability and comprehensibility which are largely used in the literature. To interpret means to give or provide the meaning or to explain and present in understandable terms some concept5 . Therefore, in data mining and machine learning, interpretability is defined as the ability to explain or to provide the meaning in understandable terms to a human [24]. These definitions assume implicitly that the concepts expressed in the understandable terms composing an explanation are self-contained and do not need further explanations. Essentially, an explanation is an “interface” between humans and a decision maker that is at the same time both an accurate proxy of the decision maker and comprehensible to humans. As shown in the previous section another significant aspect to mention about interpretability is the reason why a system, a service or a method should be interpretable. On the other hand, an explanation could be not required if there are no decisions that have to be made on the outcome of the prediction. For example, if we want to know if an image contains a cat or not and this information is not required to take any sort of crucial decision, or there are no consequences 5 https://www.merriam-webster.com/ 6 R. Guidotti et al. for unacceptable results, then we do not need an interpretable model, and we can accept any black box. 3.1 Dimensions of Interpretability In the analysis of the interpretability of predictive models, we can identify a set of dimensions to be taken into consideration, and that characterize the interpretability of the model [24]. Global and Local Interpretability: A model may be completely interpretable, i.e., we are able to understand the whole logic of a model and follow the entire reasoning leading to all the different possible outcomes. In this case, we are speaking about global interpretability. Instead, we indicate with local interpretability the situation in which it is possible to understand only the reasons for a specific decision: only the single prediction/decision is interpretable. Time Limitation: An important aspect is the time that the user is available or is allowed to spend on understanding an explanation. The user time availability is strictly related to the scenario where the predictive model has to be used. Therefore, in some contexts where the user needs to quickly take the decision (e.g., a disaster is imminent), it is preferable to have an explanation simple to understand. While in contexts where the decision time is not a constraint (e.g., during a procedure to release a loan) one might prefer a more complex and exhaustive explanation. Nature of User Expertise: Users of a predictive model may have different background knowledge and experience in the task: decision-makers, scientists, compliance and safety engineers, data scientists, etc. Knowing the user experience in the task is a key aspect of the perception of interpretability of a model. Domain experts may prefer a larger and more sophisticated model over a smaller and sometimes more opaque one. The works reviewed in the literature only implicitly specify if their proposal is global or local. Just a few of them take into account the nature of user expertise [29,84,87], and no one provides real experiments about the time required to understand an explanation. Instead, some of the works consider the “complexity” of an explanation through an approximation. For example, they define the model complexity as the model’s size (e.g. tree depth, number of rules, number of conjunctive terms) [22,32,40,84]. In the following, we further discuss issues related to the complexity of an explanation. 3.2 Desiderata of an Interpretable Model An interpretable model is required to provide an explanation. Thus, to realize an interpretable model it is necessary to take into account the following list of desiderata which are mentioned by a set of papers in the state of art [5,24,27,38]: – Interpretability: to which extent the model and or the prediction are human understandable. The most addressed discussion is related to how the Open The Black Box Survey 7 interpretability can be measured. In [27] a component for measuring the interpretability is the complexity of the predictive model in terms of the model size. According to the literature, we refer to interpretability also with the name comprehensibility. – Accuracy: to which extent the model accurately predict unseen instances. The accuracy of a model can be measured using various evaluation measures like the accuracy score, the F1-score [95], etc. Producing an interpretable model maintaining competitive levels of accuracy is the most common target among the papers in the literature. – Fidelity: to which extent the model is able to accurately imitate a black-box predictor. The fidelity captures how much is good an interpretable model in the mimic of the behavior of a black-box. Similarly to the accuracy, the fidelity is measured in terms of accuracy score, F1-score, etc. but with respect to the outcome of the black box which is considered as an oracle. Moreover, besides these features strictly related to interpretability, yet according to [5,24,27,38] a data mining and machine learning model should have other important desiderata. Some of these desiderata are related to ethical aspects such as fairness and privacy. The first principle requires that the model guarantees the protection of groups against (implicit or explicit) discrimination [85]; while the second one requires that the model does not reveal sensitive information about people [4]. The level of interpretability of a model together with the standards of privacy and non-discrimination which are guaranteed may impact on how much human users trust that model. The degree of trust on a model increases if the model is built by respecting constraints of monotonicity given by the users [66,75,99]. A predictor respecting the monotonicity principle is, for example, a predictor where the increase of the values of a numerical attribute tends to either increase or decrease in a monotonic way the probability of a record of being member of a class [27]. Another property that influences the trust level of a model is usability: people tend to trust more models providing information that assist them to accomplish a task with awareness. In this line, an interactive and queryable explanation results to be more usable than a textual and fixed explanation. Data mining and machine learning models should have other important desiderata such as reliability, robustness, causality, scalability and generality. This means that a model should have the ability to maintain certain levels of performance independently from the parameters or from the input data (reliability/robustness) and that controlled changes in the input due to a perturbation affect the model behavior (causality). Moreover, since we are in the Big Data era, it is opportune to have models able to scale to large input data with large input spaces. Finally, since often in different application scenarios one might use the same model with different data, it is preferable to have portable models that do not require special training regimes or restrictions (generality). 8 R. Guidotti et al. Fig. 1. Example of decision tree. 3.3 Recognized Interpretable Models In the state of the art a small set of existing interpretable models is recognized: decision tree, rules, linear models [27,36,84]. These models are considered easily understandable and interpretable for humans. A decision system based on a decision tree exploits a graph structured like a tree and composed of internal nodes representing tests on features or attributes (e.g., whether a variable has a value lower than, equals to or grater than a threshold, see Figure 1), and leaf nodes representing a class label. Each branch represents a possible outcome [79]. The paths from the root to the leaves represent the classification rules. Indeed, a decision tree can be linearized into a set of decision rules with the if-then form [77,78,26]: if condition1 ∧ condition2 ∧ condition3 then outcome. Here, the outcome corresponds to the class label of a leaf node while the conjunctions of conditions in the if clause correspond to the different conditions in the path from the root to that leaf node. More generally, a decision rule is a function which maps an observation to an appropriate action. Decision rules can be extracted by generating the socalled classification rules, i.e., association rules that in the consequence have the class label [3]. The most common rules are if-then rules where the if clause is a combination of conditions on the input variables. In particular, it may be formed by conjunctions, negations and disjunctions. However, methods for rule extraction typically take into consideration only rules with conjunctions. Other types of rules are: m-of-n rules where given a set of n conditions if m of them are verified then the consequence of the rule is considered true [68]; list of rules where given an ordered set of rules is considered true the consequent of the first rule which is verified [109]; falling rule lists consists of a list of if-then rules ordered with respect to the probability of a specific outcome and the order identifies the example to be classified by that rule [102]; decision sets where an unordered set of classification rules is provided such that the rules are not connected by else statements, but each rule is an independent classifier that can assign its label without regard for any other rules [53]. The interpretation of rules and decision trees is different with respect to different aspects [27]. Decision trees are widely adopted for their graphical representation, while rules have a textual representation. The main difference is Open The Black Box Survey 9 Fig. 2. Example of feature importance for a linear model. that textual representation does not provide immediately information about the more relevant attributes of a rule. On the other hand, the hierarchical position of the features in a tree gives this kind of clue. Attributes’ relative importance could be added to rules by means of positional information. Specifically, rule conditions are shown by following the order in which the rule extraction algorithm added them to the rule. Even though the representation of rules causes some difficulties in understanding the whole model, it enables the study of single rules representing partial parts of the whole knowledge (“local patterns”) which are composable. Also in a decision tree, the analysis of each path separately from the leaf node to the root, enables users to focus on such local patterns. However, if the tree is very deep in this case it is a much more complex task. A further crucial difference between rules and decision trees is that in a decision tree each record is classified by only one leaf node, i.e., the class predicted are represented in a mutually exclusive and exhaustive way by the set of leaves and their paths to the root node. On the other hand, a certain record can satisfy the antecedent of rules having as consequent a different class for that record. Indeed, rule based classifiers have the disadvantage of requiring an additional approach for resolving such situations of conflicting outcome [107]. Many rule based classifiers deal with this issue by returning an ordered rule list, instead of an unordered rule set. In this way it is returned the outcome corresponding to the first rule matching the test record and ignoring the other rules in the list. We notice that ordered rule lists may be harder to interpret than classical rules. In fact, in this model a given rule cannot be considered independently from the precedent rules in the list [107]. Another widely used approach consists in considering the top-k rules satisfying the test record where the ordering is given by a certain weight (e.g. accuracy, Laplace accuracy, etc.). Then, the outcome of the rules with the average highest weight among the top-k is returned as predicted class [109]. Finally, explanations can also be provided through linear models [47,84]. This can be done by considering and visualizing both the sign and the magnitude of the contribution of the attributes for a given prediction (see Figure 2). If the contribution of an attribute-value is positive, then it contributes by increasing the model’s output. Instead, if the sign is negative then the attribute-value decreases the output of the model. If an attribute-value has an higher contribution than another, then it means that it has an higher influence on the prediction of the model. The produced contributions summarize the performance of the model, thus the difference between the predictions of the model and expected 10 R. Guidotti et al. predictions, providing the opportunity of quantifying the changes of the model prediction for each test record. In particular, it is possible to identify the attributes leading to this change and for each attribute how much it contributed to the change. As last remark we point out that in general, when an explanation for a prediction is provided, it is often useful to analyze besides the explanation (satisfied rules, branch of the tree, set of weights, etc.), also instances which are exceptions with respect to the “boundaries” provided by the explanation, or with very few differences with respect to the prototypes returned as explanation. For example, instances covered by the rule body but with an outcome label different from the class of the outcome predicted. Even though this sort of exception analysis is hardly performed, it can be more informative than the direct explanation, and it can also provide clues about the application domain [73]. 3.4 Explanations and Interpretable Models Complexity In the literature, very little space is dedicated to a crucial aspect: the model complexity. The evaluation of the model complexity is generally tied to the model comprehensibility, and this is a very hard task to address. As a consequence, this evaluation is generally estimated with a rough approximation related to the size of the model. Moreover, complexity is often used as an opposed term to interpretability. In [32] the complexity is identified by the number of regions, i.e., the parts of the model, for which the boundaries are defined. In [84] as complexity for linear models is adopted the number of non-zero weights, while for decision trees the depth of the tree. In [22] the complexity of a rule (and thus of an explanation) is measured by the length of the rule condition, defined as the number of attribute-value pairs in the condition. Given two rules with similar frequency and accuracy, the rule with a smaller length may be preferred as it is more interpretable. Similarly, in case of lists of rules the complexity is typically measured considering the total number of attribute-value pairs in the whole set of rules. However, this could be a suitable way for measuring the model complexity, since in an ordered rule list different test records need distinct numbers of rules to be evaluated [27]. In this kind of model, a more honest measure could be the average number of conditions evaluated to classify a set of test records [72]. However, this is more a “measure of the explanation” of a list of rules. Differently from the not flexible representation of decision tree where the prediction of a single record is mutually exhaustive and exclusive, rules characterization contains only significant clauses. As a consequence, an optimal set of rules does not contain any duplicated information, given the fact that an outcome label can appear only one time in the consequent of a set of rules, while in a decision tree it typically comes out more than once. Moreover, rules do not capture insignificant clauses, while decision trees can also have insignificant branches. This happens because rule based classifier generally select one attribute-value while expanding a rule, whereas decision tree algorithms usually select one attribute while expanding the tree [27]. Considering these aspects to Open The Black Box Survey 11 estimate the complexity is very difficult. Consequently, even though a model equivalence exists, the estimation of the fact that a different representation for the same model (or explanation) is more complex than another when using decision trees or rules can be very subjective with respect to the interpreter. 3.5 Interpretable Data for Interpretable Models The types of data used for classification may have diverse nature. Different types of data present a different level of interpretability for a human. The most understandable data format for humans is the table [36]. Since matrices and vectors are the typical data representation used by the vast majority of data mining and machine learning techniques, tables are also easily managed by these algorithms without requiring specific transformations. Other forms of data which are very common in human daily life are images and texts. They are perhaps for human brain even more easily understandable than tables. On the other hand, the processing of these data for predictive models requires their transformation into vectors that make them easier to process by algorithms but less interpretable for humans. Indeed, on images and texts, the state of art techniques typically apply predictive models based on super vector machine, neural networks or deep neural networks that are usually hard to be interpreted. As a consequence, certain recognized interpretable models cannot be directly employed for this type of data in order to obtain an interpretable model or a human understandable explanation. Transformations using equivalences, approximations or heuristics are required in such a way that images and texts can be employed by prediction systems and used for providing the interpretation of the model and/or the prediction at the same time. Finally, there exist other forms of data such as sequence data, spatio-temporal data and complex network data that may be used by data mining and machine learning algorithms. However in the literature, to the best of our knowledge, there is no work addressing the interpretability of models for data different from images, texts, and tabular data. 4 Open The Black Box Problems An accurate analysis and review of the literature lead to the identification of different categories of problems. At a very high level, we can distinguish between reverse engineering and design of explanations. In the first case, given the decision records produced by a black box decision maker the problem consists in reconstructing an explanation for it. The original dataset upon which the black box is trained is generally not known in real life. Details about reverse engineering approaches are discussed at the end of this section. On the other hand, it is used and exploited to build the explanations by most of the works presented in this survey. In the second case, given a dataset of training decision records the task consists in developing an interpretable predictor model together with its explanations. 12 R. Guidotti et al. Fig. 3. Classification Problem. Through a deep analysis of the state of the art we are able to further refine the first category obtaining three different problems. We name them black box model explanation problem, black box outcome explanation problem, and black box inspection problem. We name the second category transparent box design problem. All these problems can be formalized as specific cases of the general classification problems with the common target of providing an interpretable and accurate predictive model. Details of the formalization are provided in the following sections. Other important variants are generally not treated in the literature making the problem of discovering an explanation increasingly difficult: (i) Is it allowed to query the black box at will to obtain new decision examples, or only a fixed dataset of decision records is available? (ii) Is the complete set of features used by the decision model known, or instead only part of these features is known? In this survey we do not address these issues as in the literature there is not sufficient material. 4.1 Problem Formulation In the following, we generalize the classification problem (see Figure 3). A predictor, also named model or classifier, is a function b : X m → Y where m X is the feature space with m corresponding to the number of features, and Y is the target space. The feature space X can correspond to any basic data type like the set of integers X = Im , reals X = Rm , booleans X = {0, 1}m , and strings X = S m , where S = Σ ∗ and Σ = {a, b, c, . . . , } is the alphabet (a finite non-empty set of symbols). The feature space X can also be a complex data type composed of different basic data type. For example, X = I × R2 × S contains an integer feature, two real features and a string feature. On the other hand, the target space Y (with dimensionality equals to one) contains the different labels (classes or outcomes) and identifies a semantic concept where Y can be a set of booleans, integers or strings. A predictor b is the output of a learner function Lb such that Lb : (X n×m × n Y ) → (X m → Y). The learner Lb takes as input a dataset D = {X, Y } with n samples where X ∈ X n×m and Y ∈ Y n and returns the predictor b. Given a data record in the feature space x ∈ X m , the predictor b can be employed to predict the target value ŷ, i.e., b(x) = ŷ. Typically, in supervised learning [95], a training dataset Dtrain is used for training the learner Lb (Dtrain ) which builds the predictor b, and a test dataset Dtest is used for evaluating the performance of b. Given Dtest = {X, Y }, the Open The Black Box Survey 13 evaluation is performed by observing for each couple of data record and target value (x, y) ∈ Dtest the number of correspondences between y and b(x) = ŷ. In the following we indicate with b a black box predictor belonging to the set of uninterpretable data mining and machine learning models. According to Section 3, b is a black box because the reasoning behind the function is not understandable by humans and the outcome returned does not provide any clue for its choice. In real-world applications, b is an opaque classifier resulting from a learning Lb . Similarly, we indicate with c a comprehensible predictor for which is available a global or a local explanation. The performance of the comprehensible predictor c is generally evaluated by two measures. The accuracy is used to evaluate how good are the performance of both the black box predictor b and the comprehensible predictor c. The fidelity is employed to evaluate how good is the comprehensible predictor c in mimicking the black box predictor b. Indeed, given a data set D = {X, Y } we can apply to each record x ∈ X S both the predictors: (i) for the black box b we get the set of predictions Ŷ = x∈X b(x),Swhile (ii) for the comprehensible predictor c we get the set of predictions Ȳ = x∈X c(x). Thus, we can evaluate the accuracy of the black box b and of the comprehensible predictor c by comparing the real target values Y against the predicted target values Ŷ , and Ȳ with accuracy(Ŷ , Y ) and accuracy(Ȳ , Y ), respectively. Moreover, we can evaluate the behavior of the predictor c with respect to b evaluating the fidelity of c by means of the function fidelity(Ŷ , Ȳ ). Note that the fidelity score can be calculated by applying the same calculus of the accuracy function where as target value is used the prediction Ȳ of the black box b instead of the real values Y . Black Box Model Explanation Given a black box model solving a classification problem, the black box explanation problem consists in providing an interpretable and transparent model which is able to mimic the behavior of the black box and which is also understandable by humans (see Figure 4). In other words, the interpretable model approximating the black box must be globally interpretable. As consequence, we define the black box model explanation problem as follows: Definition 1 (Black Box Model Explanation). Given a black box predictor b and a dataset D = {X, Y }, the black box model explanation problem consists in finding a function f : (X m → Y) × (X n×m × Y n ) → (X m → Y) which takes as input a black box b and a dataset D, and returns a comprehensible global predictor cg , i.e., f (b, D) = cg , such that cg is able to mimic the behavior of b, and exists a global explanator function εg : (X m → Y) → E that can derive from cg a set of explanations E ∈ E modeling in a human understandable way the logic behind cg , i.e., εg (cg ) = E. A large set of the papers reviewed in this survey describe various designs for the function f to solve the black box explanation problem. The set of explanations E can be modeled for example by a decision tree or by a set of rules [36], 14 R. Guidotti et al. Fig. 4. Black Box Model Explanation Problem. Fig. 5. Black Box Outcome Explanation Problem. while the comprehensible global predictor cg is the predictor returning as global explanation εg the decision tree or the set of rules. Black Box Outcome Explanation Given a black box model solving a classification problem, the black box outcome explanation problem consists in providing an interpretable outcome, that is a method for providing an explanation for the outcome of the black box. In other words, the interpretable model must return the prediction together with an explanation about the reasons for that prediction, i.e., the prediction is only locally interpretable. It is not required to explain the whole logic behind the black box but only the reasons for the choice of a particular instance. Consequently, we define the black box outcome explanation problem as: Definition 2 (Black Box Outcome Explanation). Given a black box predictor b and a dataset D = {X, Y }, the black box outcome explanation problem consists in finding a function f : (X m → Y) × (X n×m × Y n ) → (X m → Y) which takes as input a black box b and a dataset D, and returns a comprehensible local predictor cl , i.e., f (b, D) = cl , such that cl is able to mimic the behavior of b, and exists a local explanator function εl : ((X m → Y) × (X m → Y) × X m ) → E which takes as input the black box b, the comprehensible local predictor cl , and a data record x with features in X m , and returns a human understandable explanation e ∈ E for the data record x, i.e., εl (b, cl , x) = e. We report in this survey recent works describing very diversified approaches to implement function f , overcoming the limitations of explaining the whole model (illustrated in Section 6). As an example, in this view of the problem, we can consider that the explanation el may be either a path of a decision tree or an association rule [27]. Open The Black Box Survey 15 Fig. 6. Black Box Inspection Problem. Black Box Inspection Problem Given a black box model solving a classification problem, the black box inspection problem consists in providing a representation (visual or textual) for understanding either how the black box model works or why the black box returns certain predictions more likely than others. Definition 3 (Black Box Inspection Problem). Given a black box predictor b and a dataset D = {X, Y }, the black box inspection problem consists in finding a function f : (X → Y) × (X n × Y n ) → V which takes as input a black box b and a dataset D, and returns a visual representation of the behavior of the black box, f (b, D) = v with V being the set of all possible representations. For example, the function f may be a technique based on sensitivity analysis that, by observing the changing occurring in the predictions when varying the input of b, returns a set of visualizations (e.g, partial dependence plots [48], or variable effect characteristic curve [17]) highlighting the feature importance for the predictions. Transparent Box Design Problem Given a classification problem the transparent box design problem consists in providing a model which is locally or globally interpretable on its own. Definition 4 (Transparent Box Design Problem). Given a dataset D = {X, Y }, the transparent box design problem consists in finding a learning function Lc : (X n×m ×Y) → (X m → Y) which takes as input the dataset D = {X, Y } and returns a (locally or globally) comprehensible predictor c, i.e., Lc (D) = c. This implies that there exists a local explanator function εl or a global explanator function εg (defined as before) that takes as input the comprehensible predictor c and returns a human understandable explanation e ∈ E or a set of explanations E. For example, the functions Lc and c may be the decision tree learner and predictor respectively, while the global explanator εg may return as explanation a system for following the choices taken along the various branches of the tree, and εl may return a textual representation of the path followed according to the decision suggested by the predictor. 16 R. Guidotti et al. Fig. 7. Transparent Box Design Problem. Thus, according to our problem definitions, in this survey, when we say that a method is able to open the black box, we are referring to one of the following statements: (i) it explains the model, (ii) it explains the outcome, (iii) it can inspect the black box internally, (iv) it provides a transparent solution. 5 Problem And Explanator Based Classification In this survey, we propose a classification based on the type of problem faced and on the explanator adopted to open the black box. In particular, in our classification we take into account the following features: – – – – the the the the type type type type of of of of problem faced (according to the definitions in Section 4); explanator adopted to open the black box; black box model that the explanator is able to open; data used as input by the black box model. In each section we group together all the papers that share the same problem definition, while the subsections correspond to the different solutions adopted to develop the explanators. In turn, in each subsection, we group the papers that try to explain the same type of black box. Finally, we keep the type of data used by the black box as a feature which is specified for each work analyzed. We organize the sections discussing the different problems as follows. In Section 6 we analyze the papers presenting approaches to solve the black box model explanation problem. These approaches provide a globally interpretable predictor which is able to mimic the black box. On the other hand, in Section 7 are reviewed the methods solving the black box outcome explanation problem: the predictor returned is locally interpretable and provides an explanation only for a given record. In Section 8 we discuss the papers proposing methodologies for inspecting black boxes, i.e., not providing a comprehensible predictor but a visualization tool for studying how the black box work internally, and what can happen when a certain input is provided. Finally, in Section 9 we report the papers designing a transparent predictor to overcome the “obscure” limitation of black boxes. These approaches try to provide a global or local interpretable model without sacrificing the accuracy of a black box learned to solve the same task. Open The Black Box Survey 17 For each of the sections above, we propose a further categorization with respect to the type of explanator adopted. This categorization reflects on the papers grouped into the various subsections: – Decision Tree (DT) or Single Tree. It is commonly recognized that decision tree is one of the more interpretable and easily understandable models, primarily for global, but also for local, explanations. Indeed, a very widespread technique for opening the black box is the so-called “single tree approximation”. – Decion Rules (DR) or Rule Based Explanator. Decision rules are among the more human understandable techniques. There exist various types of rules (illustrated in Section 3.3). They are used to explain the model, the outcome and also for the transparent design. We remark the existence of techniques for transforming a tree into a set of rules. – Features Importance (FI). A very simple but effective solution acting as either global or local explanation consists in returning as explanation the set of features used by the black box together with their weight. – Salient Mask (SM). An efficient way of pointing out what causes a certain outcome, especially when images or texts are treated, consists in using “masks” visually highlighting the determining aspects of the record analyzed. They are generally used to explain deep neural networks. – Sensitivity Analysis (SA). It consists of evaluating the uncertainty in the outcome of a black box with respect to different sources of uncertainty in its inputs. It is generally used to develop visual tools for black box inspection. – Partial Dependence Plot (PDP). These plots help in visualizing and understanding the relationship between the outcome of a black box and the input in a reduced feature space. – Prototype Selection (PS). This explanator consists in returning, together with the outcome, an example very similar to the classified record, in order to make clear which criteria the prediction was returned. A prototype is an object that is representative of a set of similar instances and is part of the observed points, or it is an artifact summarizing a subset of them with similar characteristics. – Neurons Activation (NA). The inspection of neural networks and deep neural network can be carried out also by observing which are the fundamental neurons activated with respect to particular input records. In the following, we list all the black boxes opened in the reviewed papers. These black boxes are all supervised learning algorithm designed to solve a classification problem [95]. – Neural Network (NN). Inspired by biological neural networks, artificial neural networks learn to do tasks by considering examples. A NN is formed by a set of connected neurons. Each link between neurons can transmit a signal. The receiving neuron can process the signal and then transmit to downstream neurons connected to it. Typically, neurons are organized in layers. Different layers perform different transformations on their inputs. Signals 18 R. Guidotti et al. travel from the input layer, to the output layer, passing through the hidden layer(s) in the middle multiple times. Neurons and connections may also have a weight that varies as learning proceeds, which can increase or decrease the strength of the signal that it sends. – Tree Ensemble (TE). Ensemble methods combine more than one learning algorithm to improve the predictive power of any of the single learning algorithms that they combines. Random forests, boosted trees and tree bagging are examples of TEs. They combine the predictions of different decision trees each one trained on an independent subset of the input data. – Support Vector Machine (SVM). Support Vector Machines utilize a subset of the training data, called support vectors, to represent the decision boundary. A SVN is a classifier that searches for hyperplanes with the largest margin for the decision boundary. – Deep Neural Network (DNN). A DNN is a NN that can model complex nonlinear relationship with multiple hidden layers. A DNN architecture is formed by a composition of models expressed as a layered combination of basic units. In DNNs the data typically flows from the input to the output layer without looping back. The most used DNN are Recurrent Neural Networks (RNNs). A peculiar component of RNNs are Long Short-Term Memory (LSTM) nodes which are particularly effective for language modeling. On the other hand, in image processing Convolutional Neural Networks (CNNs) are typically used. Moreover, recently agnostic approaches for explaining black boxes are being developed. An Agnostic Explanator (AGN) is a comprehensible predictor which is not tied to a particular type of black box, explanation or data type. In other words, in theory, an agnostic predictor can explain indifferently a neural network or a tree ensemble using a single tree or a set of rules. Since only a few approaches in the literature describe themselves to be fully agnostic, and since the principal task is to explain a black box predictor, in this paper, if not differently specified, we term agnostic the approaches defined to explain any type of black box. The types of data used as input of black boxes analyzed in this survey are the following: – Tabular (TAB). With tabular data, we indicate any classical dataset in which every record shares the same set of features and each feature is either numerical, categorical or boolean. – Image (IMG). Many black boxes work with labeled images. These images can be treated as they are by the black box or can be preprocessed (e.g, re-sized in order to have all the same dimensions). – Text (TXT). As language modeling is one of the tasks most widely assessed nowadays together with image recognition, labeled datasets of text are generally used for tasks like spam detection or topic classification. In data mining and machine learning many other types of data are also used like sequences, networks, mobility trajectories, etc. However, they are not used as input in the methods of the papers proposing a solution for opening the black box. Open The Black Box Survey 19 Fig. 8. Reverse Engineering approach: the learned black box predictor is queried with a test dataset to produce an oracle which associate to each record a label which is not real but assigned by the black box. Table 1 lists the methods for opening and explaining black boxes and summarizes the various fundamental features and characteristics listed so far, together with additional information that we believe could be useful for the reader. The columns Examples, Code and Dataset indicates if any kind of example of explanation is shown in the paper, and if the source code and the dataset used in the experiments are publicly available, respectively. The columns General and Random are discussed in the following section. We point out that Table 1 reports the main references only, while existing extensions or derived works are discussed in the survey. Table 2 reports the legend of Table 1, i.e., the expanded acronym and the meaning of the features in Table 1. Moreover, in order to provide the reader with a useful tool to find a particular set of papers with determined characteristics, Appendix A provides Tables 3, 4 and 5, in which are reported the list of the papers with respect to each problem, explanator and black box, respectively. Reverse Engineering: A Common Approach For Understanding The Black Box Before proceeding in the detailed analysis and classification of papers proposing method f for understanding black boxes b, we present in this section the most largely used approach to solve the black box model and outcome explanation problems and the black box inspection problem. We refer to this approach as reverse engineering because the black box predictor b is queried with a certain test dataset in order to create an oracle dataset that in turn will be used to train the comprehensible predictor (see Figure 8). The name reverse engineering comes from the fact that we can only observe the input and output of the black box. With respect to the black box model and outcome explanation problems, the possibility of action tied with this approach relies on the choice of adopting a particular type of comprehensible predictor, and in the possibility of querying the black box with input records created in a controlled way and/or by using random perturbations of the initial train or test dataset. Regarding the random perturbations of the input used to feed the black box, it is important to recall that recent studies discovered that DNN built for classification problems on texts and images can be easily fooled (see Section 2). Not human perceptible changes in an image can lead a DNN to label the record as something else. Thus, according 20 R. Guidotti et al. Trepan DecText GPDT Tree Metrics CCM STA CDT TSP Conj Rules G-REX REFNE RxREN SVM+P inTrees GoldenEye PALM CAM Grad-CAM LIME MES NID GDP IG VEC VIN ICE Prospector Auditing OPIA TreeView IP CPAR FRL BRL TLBR IDS Rule Set 1Rule PS BCM OT-SpAMs [20] Craven et al. [50] Krishnan et al. [9] Boz [39] Johansson et al. [14] Chipman et al. [23] Domingos et al. [29] Gibbons et al. [114] Zhou et al. [87] Schetinin et al. [32] Hara et al. [94] Tan et al. [19] Craven et al. [37] Johansson et al. [115] Zhou et al. [6] Augasta et al. [70] Nunez et al. [28] Fung et al. [22] Deng [61] Lou et al. [33] Henelius et al. [51] Krishnan et al. [97] Tolomei et al. [108] Xu et al. [25] Fong et al. [113] Zhou et al. [89] Selvaraju et al. [56] Lei et al. [83] Ribeiro et al. [98] Turner et al. [71] Olden et al. [7] Baehrens [92] Sundararajan [16] Cortez et al. [35] Hooker [30] Goldstein et al. [48] Krause et al. [2] Adler et al. [1] Adebayo et al. [110] Yosinski et al. [96] Thiagarajan et al. [90] Shwartz et al. [81] Radford [109] Yin et al. [102] Wang et al. [57] Letham et al. [91] Su et al. [53] Lakkaraju et al. [104] Wang et al. [64] Malioutov et al. [8] Bien et al. [44] Kim et al. [63] Mahendran et al. [47] Kononenko et al. [103] Wang et al. 1996 1999 2002 2009 1998 1998 2013 2016 2007 2016 2016 1994 2003 2003 2012 2002 2005 2014 2013 2014 2017 2017 2015 2017 2016 2016 2016 2016 2016 2002 2010 2017 2011 2004 2015 2016 2016 2016 2015 2016 2017 2017 2003 2015 2015 2015 2016 2016 2017 2011 2014 2015 2010 2015 Model Expl. Model Expl. Model Expl. Model Expl. Model Expl. Model Expl. Model Expl. Model Expl. Model Expl. Model Expl. Model Expl. Model Expl. Model Expl. Model Expl. Model Expl. Model Expl. Model Expl. Model Expl. Model Expl. Model Expl. Model Expl. Model Expl. Outcome Expl. Outcome Expl. Outcome Expl. Outcome Expl. Outcome Expl. Outcome Expl. Outcome Expl. Inspection Inspection Inspection Inspection Inspection Inspection Inspection Inspection Inspection Inspection Inspection Inspection Inspection Transp. Design Transp. Design Transp. Design Transp. Design Transp. Design Transp. Design Transp. Design Transp. Design Transp. Design Transp. Design Transp. Design Transp. Design DT DT DT DT DT DT DT DT DT DT DT DR DR DR DR DR DR DR FI FI DT FI SM SM SM SM SM FI DR SA SA SA SA PDP PDP PDP PDP PDP NA DT NA NA DR DR DR DR DR DR DR PS PS PS FI DT NN NN NN NN TE TE TE TE TE TE TE NN NN NN NN SVM SVM TE AGN AGN AGN TE DNN DNN DNN DNN DNN AGN AGN NN AGN DNN AGN AGN AGN AGN AGN AGN DNN DNN DNN DNN - TAB TAB TAB TAB TAB TAB TAB TAB TAB TAB TAB TAB TAB TAB TAB TAB TAB TAB TAB TAB ANY TAB IMG IMG IMG IMG TXT ANY ANY TAB TAB ANY TAB TAB TAB TAB TAB TAB IMG TAB TAB TXT TAB TAB TAB TAB TAB TAB TAB ANY ANY IMG TAB TAB X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X at as e t X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X D de Co pl es X X X X X X X X X X X X X X X X X Ex am G en er al R an do m Ty pe D at a Bo x Bl ac k Ex pl an at or lem Pr ob r Ye a ho rs A ut ef . R N am e Table 1. Summary of methods for opening and explaining black boxes. X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X Open The Black Box Survey 21 Table 2. Legend of Table 1. In the following are described the features reported and the abbreviations adopted. Feature Problem Description Model Explanation, Outcome Explanation, Black Box Inspection, Transparent Design Explanator DT - Decision Tree, DR - Decision Rules, FI - Features Importance, SM Saliency Masks, SA - Sensitivity Analysis, PDP - Partial Dependence Plot, NA - Neurons Activation, PS - Prototype Selection Black Box NN - Neural Network, TE - Tree Ensemble, SVM - Support Vector Machines, DNN - Deep Neural Network, AGN - AGNostic black box Data Type TAB - TABular, IMG - IMaGe, TXT - TeXT, ANY - ANY type of data General Indicates if an explanatory approach can be generalized for every black box, i.e., it does not consider peculiarities of the black box to produce the explanation Random Indicates if any kind of random perturbation or permutation of the original dataset is required for the explanation Examples Indicates if example of explanations are shown in the paper Code Indicates if the source code is available Dataset Indicates if the datasets used in the experiments are available to these discoveries, the methods treating images or text, in theory, should not be enabled to use completely random perturbations of their input. However, this is not always the case in practice [84]. Such reverse engineering approach can be classified as generalizable or not (or pedagocial vs. decompsitional as described in [65]). We say that an approach is generalizable when a purely reverse engineering procedure is followed, i.e., the black box is only queried with different input records to obtain an oracle used for learning the comprehensible predictor (see Figure 9-(left)). In other words, internal peculiarities of the black box are not exploited to build the comprehensible predictor. Thus, if an approach is generalizable, even though it is presented to explain a particular type of black box, in reality, it can be used to interpret any kind of black box predictor. That is, it is an agnostic approach for interpreting black boxes. On the other hand, we say that an approach is not generalizable if it can be used to open only that particular type of black box for which it was designed for (see Figure 9-(right)). For example, if an approach is designed to interpret random forest and internally use a concept of distance between trees, then such approach can not be utilized to explain predictions of a NN. A not generalizable approach can not be black box agnostic. In Table 1 we keep track of these aspects with the two features General and Random. With General we indicate if an explanatory approach can be generalized for every black box, while with Random we indicate if any kind of random perturbation or permutation of the original dataset is used by the explanatory approach. In light of these concepts, as the reader will discover below, a further classification not explicitly indicated emerges from the analysis of these papers. This 22 R. Guidotti et al. Fig. 9. (Left) Generalizable reverse engineering approach: internal peculiarities of the black box are not exploited to build the comprehensible predictor. (Right) Not Generalizable reverse engineering approach: the comprehensible predictor is the result of a procedure involving internal characteristics of the black box. fact can be at the same time a strong point or a weakness of the current state of the art. Indeed, we highlight that the works for opening the black box are realized for two cases. The first (larger) group contains approaches proposed to tackle a particular problem (e.g., medical cases) or to explain a particular type of black box, that is, the solutions are specific for the problem instance. The second group contains general purpose solutions that try to be general as much as possible and propose agnostic and generalizable solutions. 6 Solving the Black Box Model Explanation Problem In this section we review the methods for opening the black box facing the black box model explanation problem (see Section 4.1). That is, the proposed methods provide globally interpretable models which are able to mimic the behavior of black boxes and which are also understandable by humans. We recognized different groups of approaches. In Section 6.1 we analyze the proposals using a decision tree as explanator, while in Section 6.2 they use rules. Section 6.3 describes the methods which are designed to work with any type of black box. Finally, Section 6.4 contains the remaining ones. 6.1 Explanation via Single Tree Approximation In this section we present a set of works addressing the black box model explanation problem by implementing in different ways the function f . All the following works adopt a decision tree as comprehensible global predictor cg , and consequently represent the explanation εg with the decision tree itself. Moreover, we point out that all the methods presented in this section work on tabular data. Explanation of Neural Networks. The following papers describe the implementation of functions f which are able to interpret a black box b consisting in a Neural Network (NN) [95] with a comprehensible global predictor cg consisting in a decision tree. In these works, the NNs are considered black-boxes, i.e., Open The Black Box Survey 23 the only interface permitted is presenting an input x to the neural network b and obtaining the outcome ŷ. The final goal is to comprehend how the neural networks behave by submitting to it a large set of instances and analyzing their different predictions. Single tree approximations for NNs were first presented in 1996 by Craven et al. [20]. The comprehensible representations of the neural network b is returned by Trepan which is the implementation of function f . Trepan queries the neural network b to induce a decision tree cg approximating the concepts represented by the networks by maximizing the gain ratio [95] together with an estimation of the current model fidelity. Another advantage of Trepan with respect to common tree classifiers like ID3 or C4.5 [95] is that, thanks to the black box b, it can use as many instances as desired for each split, so that also the node splits near to the bottom of the tree are realized using a considerable amount of training data. In [50], Krishnan et al. present a three step method f . The first step generates a sort of “prototype” for each target class in Y by using genetic programming to query the trained neural network b. The input features dataset X is exploited for constraining the prototypes. The second step selects the best prototypes for inducing the learning of the decision tree cg in the third step. This approach leads to get more understandable and smaller decision trees starting from smaller data sets. In [9], Boz describes DecText, another procedure that uses a decision tree c to explain neural network black boxes b. The overall procedure recalls Trepan [20] with the innovation of four splitting methods aimed at finding the most relevant features during the tree construction. Moreover, since one of the main purposes of the tree is to maximize the fidelity while keeping the model simple, a fidelity pruning strategy to reduce the tree size is defined. A set of random instances are generated. Then, starting from the bottom of the tree, for each internal node a leaf is created with the majority label using the labeling of the random instances. If the fidelity of the new tree overtakes the old one, than the maximum fidelity and the tree are updated. In [39] Johansson et al. use Genetic Programming to evolve Decision Trees (the comprehensible global predictor cg ), in order to mimic the behavior of a neural network ensemble (the black box b). The dataset D used by genetic programming (implementing function f ) consists of a lot of different combinations of the original data and oracle data labeled by b. The paper shows that trees based only on original training data have the worst performance in terms of accuracy in the test data, while the trees evolved using both the oracle guide and the original data produce significantly more accurate trees cg . We underline that, even though these approaches are developed to explain neural networks, since peculiarities of the neural networks are not used by f , which uses b only as an oracle, these approaches can be potentially adopted as agnostic explanators, i.e., they can be used to open any kind of black box and represent it with a single tree. 24 R. Guidotti et al. Explanation of Tree Ensembles. Richer collections of trees provide higher performance and less uncertainty in the prediction. On the other hand, it is generally difficult to make sense of the resultant forests. The papers presented in this section describe functions f for approximating a black box model b consisting in Tree Ensembles (TE) [95] (e.g. random forests) with a global comprehensible predictor cg in the form of a decision tree, and explanation εg as a the decision tree as before. Unlike previous works, the tree ensembles are not only viewed as black boxes, but also some of their internal features are used to derive the global comprehensible model cg . For example, Chipman et al., in [14] observe that although hundreds of distinct trees are identified by random forests, in practice, many of them generally differ only by few nodes. In addition, some trees may differ only in the topology, but use the same partitioning of the feature space X . The paper proposes several measures of dissimilarity for trees. Such measures are used to summarize forest of trees through clustering, and finally use archetypes of the associated clusters as model explanation. Here, f corresponds to the clustering procedure, and the global comprehensible predictor cg is the set of tree archetypes minimizing the distance among all the trees in each cluster. In this approach, f does not extend the input dataset D with random data. On the other hand, random data enrichment and model combination are the basis for the Combined Multiple Model (CCM) procedure f presented in [23]. Given the tree ensemble black box b, it first modifies n times the input dataset D and learns a set of n black boxes bi ∀i = 1, . . . , n, and then it randomly generates data record x which are labeled using a combination (e.g. bagging) of the n black boxes bi , i.e., Cb1 ,...,bn (x) = ŷ. In this way, the training dataset D = D ∪ {x, ŷ} is increased. Finally, it builds the global comprehensible model cg as a decision tree (C4.5 [79]) on the enriched dataset D. Since it is not exploiting particular features of the tree ensemble b, also this approach can be generalized with respect to the black box b. In line with [23], the authors of [29] generate a very large artificial dataset D using the prediction of the random forest b, then explain b by training a decision tree cg on this artificial dataset in order to mime the behavior of the random forest. Finally, they improve the comprehensibility of cg by cutting the decision tree with respect to a human understandable depth (i.e., from 6 to 11 nodes of depth). [114] proposes Single Tree Approximation (STA), an extension of [29] which empowers the construction of the final decision tree cg by using test hypothesis to understand which are the best splits observing the Gini indexes on the trees of the random forest b. Schetinin et al. in [87] present an approach for the probabilistic interpretation of the black box b Bayesian decision trees ensembles [10] through a quantitative evaluation of uncertainty of a Confident Decision Tree (CDT) cg . The methodology f for interpreting b is summarized as follows: (i) the classification confidence for each tree in the ensemble is calculated using the training data D, (ii) the decision tree cg that covers the maximal number of correct training examples is selected, keeping minimal the amount of misclassifications on the remaining examples by sub-sequentially refining the training dataset D. Similarly to [14], Open The Black Box Survey 25 also this explanation method f does not extend the input dataset D with random data and cannot be generalized to other black boxes but can be used only with Bayesian decision tree ensembles. In [32], Hara et al. reinterpret Additive Tree Models (ATM) (the black box b) using a probabilistic generative model interpretable by humans. An interpretable ATM has a sufficiently small number of regions. Therefore, their aim is to reduce the number of regions in an ATM while minimizing the model error. To satisfy these requirements, they propose a post processing method f that works as follows. First, it learns an ATM b generating a number of regions. Then, it mimics b using a simpler model (the comprehensible global predictor cg ) where the number of regions is fixed as small, e.g., ten. In particular, to obtain the simpler model an Expectation Maximization algorithm is adopted [95] minimizing the Kullback-Leibler divergence from the ensemble b. The authors of [94] propose Tree Space Prototype (TSP), an approach f for interpretating tree ensembles (the black box b) by finding tree prototypes (the comprehensible global predictor cg ) in the tree space. The main contributions for f are: (i) the definition of the random forest proximity between trees, and (ii) the design of the procedure to extract the tree prototypes used for classification. 6.2 Explanation via Rule Extraction Another commonly used state of the art interpretable and easily understandable model is the set of rules. When a set of rules describing the logic behind the black box model is returned the interpretability is provided at a global level. In the following, we present a set of reference works solving the black box model explanation problem by implementing in different ways function f , and by adopting any kind of decision rules as comprehensible global predictor cg . Hence, the global explanation εg change accordingly to the type of rules extracted by cg . Similarly to the previous section, also all the methods presented in this section work on tabular data. Explanation of Neural Networks. The following papers describe the implementation of functions f which are able to interpret a black box b consisting in a Neural Network (NN) [95]. In the literature already exists a survey specialized on techniques extracting rules from neural networks [5]. It provides an overview of mechanisms designed to (i) insert knowledge into neural networks (knowledge initialization), (ii) extract rules from trained NNs (rule extraction), and (iii) use NNs to refine existing rules (rule refinement). The approaches presented in [5] are strongly dependent on the black box b and on the specific type of decision rules cg . Thus, they are not generalizable and can not be employed to solve other instances of the black box model explanation problem. The survey [5] classifies the methods according to the following criteria: – Expressive power of the extracted rules. – Translucency: that is decompositional, pedagogical and eclectic properties. – Portability of the rule extraction technique. 26 R. Guidotti et al. – Quality of the rules extracted. Quality includes accuracy, fidelity, consistency, i.e., different training of the NN extract the rules that lead to the same classification of unseen examples. – Algorithmic complexity. A typical paper analyzed in [5] is [19] where Craven et al. present a method f to explain the behavior of a neural network b by transforming rule extraction (which is a search problem) into a learning problem. The original training data D and a randomized extension of it are provided as input to the black box b. If the input x ∈ D with outcome ŷ is not covered by the set of rules, then a conjunctive (or m-of-n) rule is formed from {x, ŷ} considering all the possible antecedents. The procedure ends when all the target classes have been processed. In [40] Johansson et al. exploit G-REX [37], an algorithm for rule extraction, as function f to explain a neural network b. They use the classical reverse engineering schema where random permutations of the original dataset D are annotated by b, and such dataset is used as input by G-REX, which corresponds with cg in this case. In particular, G-REX extracts rules by exploiting genetic programming as a key concept. In subsequent works, the authors show that the proposed methodology f can be also employed to interpret trees ensembles. [38] extends G-REX for handling regression problems by generating regression trees, and classification problems by generating fuzzy rules. In [115] the authors present REFNE, an approach f to explain neural network ensembles b. REFNE uses ensembles for generating instances and then, extracts symbolic rules cg from those instances. REFNE avoids useless discretizations of continuous attributes, by applying a particular discretization leading to discretize different continuous attributes using different intervals. Moreover, REFNE can also be used as a rule learning approach, i.e., it solves the transparent box design problem (see Section 4.1). Also in [6] Augasta et al. propose RxREN a rule extraction algorithm cg which returns the explanation of a trained NN b. The method f works as follows. First, it prunes the insignificant input neurons from trained NNs and identifies the data range necessary to classify the given test instance with a specific class. Second, using a reverse engineering technique, through RxREN generates the classification rules for each class label exploiting the data ranges previously identified, and improve the initial set of rules by a process that prunes and updates the rules. Explanation of Support Vector Machines. The following papers show implementations of functions f for explaining a black box b consisting in a Support Vector Machine (SVM) [95] still returning a comprehensible global predictor cg consisting in a set of decision rules. The authors of [70] propose the SVM+Prototypes (SVM+P) procedure f for rule extraction cg from support vector machines b. It works as follows: it first determines the decision function by means of a SVM, then a clustering algorithm is used to find out a prototype vector for each class. By using geometric methods, these points are joined with the support vectors for defining ellipsoids in the input space that can be transformed into if-then rules. Open The Black Box Survey 27 Fig. 10. From [65]: pedagogical (a) and decompositional (b) rule extraction techniques. Fung et al., in [28], describe as function f an algorithm based on constraint programming for converting linear SVM b (and other hyperplane-based linear classifiers) into a set of non overlapping and interpretable rules cg . These rules are asymptotically equivalent to the original linear SVM. Each iteration of the algorithm for extracting the rules is designed to solve a constrained optimization problem having a low computational cost. We underline that this black box explanation solution f is not generalizable and can be employed only for Linear SVM-like black boxes. In [65] the authors propose a qualitative comparison of the explanations returned by techniques for extraction of rules from SVM black boxes (e.g. SVM+P [70], Fung method [28]) against the redefining of methods designed for explaining neural networks, i.e., C4.5 [95], Trepan [20] and G-REX [37]. How we anticipated in the previous section, the authors delineate the existence of two type of approaches to extract rules: pedagogical and decompositional. Pedagogical techniques f directly extract rules which relate the inputs and outputs of the predictor (e.g. [20,37]), while decompositional approaches are closely intertwined with the internal structure of the SVM (e.g. [70,28]). We recall that, in Table 1 we identify with the term generalizable the pedagogical approaches. Explanation of Tree Ensembles. Finally, in [22], Deng proposes the inTrees framework f to explain black boxes b defined as Tree Ensembles (TE) by returning a set of decision rules cg . In particular, InTrees extracts, measures, prunes and selects rules from tree ensembles, and calculates frequent variable interactions. The set of black boxes b that inTrees can explain is represented by any kind of tree ensemble like random forests, regularized random forests and boosted trees. InTrees framework can be used for both classification and regression problems. The technique described by InTrees is also known as Simplified Tree Ensamble Learner (STEL): it extracts the most supported and simplest rules form the trees ensemble. 28 6.3 R. Guidotti et al. Agnostic Explanator Recent approaches for interpretation are agnostic (AGN) with respect to the black box to be explained. In this section, we present a set of works solving the black box model explanation problem by implementing function f such that any type of black box b can be explained. These approaches do not return a specific comprehensible global predictor cg , thus the type of explanation εg change with respect to f and cg . By definition all these approaches are generalizable. Probably the first attempt of an agnostic solution was proposed in [60]. Lou et al. propose a method f which exploits Generalized Additive Models (GAMs) and it is able to interpret regression splines (linear and logistics), single trees and tree ensembles (bagged trees, boosted trees, boosted bagged trees and random forests). GAMs are presented as the gold standard for intelligibility when only univariate terms are considered. Indeed, the explanation εc is returned as the importance of the contribution of the individual features in b together with their shape function, such that the impact of each predictor can be quantified. A shape function is the plot of a function capturing the linearities and nonlinearities together with its shape. It works on tabular data. A refinement of the GAM approach is proposed by the same authors in [61]. A case study on health care showing the application of the GAM the refinement is presented in [13]. In particular, this approach is used for the prediction of the pneumonia risk and hospital 30-day readmission. In [33] the authors present an iterative algorithm f that allows finding features and dependencies exploited by a classifier when producing a prediction. The attributes and the dependencies among the grouped attributes depict the global explanation εg . The proposed approach f named GoldenEye is based on tabular data randomization (within class permutation, dataset permutation, etc.) and on grouping attributes with interactions have an impact on the predictive power. In [51], PALM is presented (Partition Aware Local Model ) to implement f . In particular, PALM is a method that is able to learn and summarize the structure of the training dataset to help the machine learning debugging. PALM mimes a black box b using a meta-model for partitioning the training dataset, and a set of sub-models for approximating and miming the patterns within each partition. As meta-model it uses a decision tree (cg ) so that the user can examine its structure and determine if the rules detected follow the intuition or not, and link efficiently problematic test records to the responsible train data. The submodels linked to the leaves of the tree can be a arbitrarily complex model able to catch elaborate local patterns, but yet interpretable by humans. Thus, with respect to the final sub-models PALM is not only black box agnostic but also explanator agnostic. Moreover, PALM is also data agnostic; i.e., it can work on any kind of data. 6.4 Explanation via Other Approaches In [97] a solution for the black box model explanation problem is presented. It adopts an approach that can not be classified as one of the previous. The proposed approach f uses the internals of a random forest model b to produce Open The Black Box Survey 29 recommendations on the transformation of true negative examples into positively predicted examples. These recommendations, which are strictly related to the feature importance, corresponds to the comprehensible global predictor cg . In particular, the function f aims at transforming a negative instance into a positive instance by analyzing the path on the trees in the forest predicting such instance as positive or negative. The explanation of b is provided by means of the helpfulness of the features in the paths adopted for changing the instance outcome from negative to positive. 7 Solving the Black Box Outcome Explanation Problem In this section we review the methods solving the black box outcome explanation problem (see Section 4.1). These methods provide a locally interpretable model which is able to explain the prediction of the black box in understandable terms for humans. This category of approaches using a local point of view with respect to the prediction is becoming the most studied in the last years. Section 7.1 describes the methods providing the salient parts of the record for which a prediction is required using Deep Neural Networks (DNNs), while Section 7.2 analyzes the methods which are able to provide a local explanation for any type of black box. 7.1 Explanation of Deep Neural Network via Saliency Masks In the following works the opened black box b is a DNN and the explanation is provided by using a Saliency Mask (SM), i.e. a subset of the original record which is mainly responsible for the prediction. For example, as salient mask we can consider the part of an image or a sentence in a text. A saliency image summarizes where a DNN looks into an image for recognizing their predictions. The function f to extract the local explanation εl is always not generalizable and often strictly tied with the particular type of network, i.e., convolutional, recursive, etc. The work [108] introduces an attention based model f which automatically identifies the contents of an image. The black box is a neural network which consists of a combination of a Convolutional NN (CNN) for the features extraction and a Recursive NN (RNN) containing Long Short Term Memory (LSTM), nodes producing the image caption by generating a single word for each iteration. The explanation εl of the prediction is provided through a visualization of the attention (area of an image, see Figure 11-left) for each word in the caption. A similar result is obtained by Fong et al. in [25]. In this work the authors propose a framework f of explanations cl as meta-predictors. In their view, an explanation εl , and thus a meta-predictor, is a rule that predicts the response of a black box b to certain inputs. Moreover, they propose to use saliency maps as explanations for black boxes to highlight the salient part of the images (see Figure 11-right). 30 R. Guidotti et al. Fig. 11. Saliency Masks for explanation of deep neural network. (Left) From [108] the elements of the image highlighted. (Right) From [25] the mask and the level of accuracy on the image considering and not considering the learned mask. Similarly, another set of works produce saliency masks incorporating network activations into their visualizations. This kind of approaches f are named Class Activation Mapping (CAM). In [113], global average pooling in CNN (the black box b) is used for generating the CAM. A CAM (the local explanation εl ) for a particular outcome label indicates the discriminative active region that identifies that label. [89] defines its relaxed generalization Grad-CAM which visualizes the linear combination of a late layer’s activations and label-specific weights (or gradients for [113]). All these approaches arbitrarily invoke different back propagation and/or activation, which results in aesthetically pleasing, heuristic explanations of image saliency. Their solution is not black box agnostic limited to NN, but it requires specific architectural modifications [113] or access to intermediate layers [89]. With respect to texts, in [56] the authors develop an approach f which incorporates rationales as part of the learning process of b. A rationale is a simple subset of words representing a short and coherent piece of text (e.g., phrases), and alone must be sufficient for the prediction of the original text. A rational is the local explanator εl and provides the saliency of the text analyzed, i.e., indicates the reason for a certain outcome. 7.2 Agnostic Explanator In this section we present the agnostic solutions proposed for the black box outcome explanation problem implementing function f such that any type of black box b can be explained. All these approaches are generalizable by definition and return a comprehensible local predictor cl . Thus, they can be employed for diversified data types. In [84], Ribeiro et al. present the Local Interpretable Model-agnostic Explanations (LIME) approach f which does not depend on the type of data, nor on the type of black box b to be opened, nor on a particular type of comprehensible local predictor cl or explanation εl . In other words, LIME can return an understandable explanation for the prediction obtained by any black box. The main intuition of LIME is that the explanation may be derived locally from the records generated randomly in the neighborhood of the record to be explained, and weighted according to their proximity to it. In their experiments, the authors adopt linear models as comprehensible local predictor cl returning the importance of the features as explanation εl . As black box b the following classifiers are Open The Black Box Survey 31 tested: decision trees, logistic regression, nearest neighbors, SVM and random forest. A weak point of this approach is the required transformation of any type of data in a binary format which is claimed to be human interpretable. [83] and [82] propose extensions of LIME with an analysis of particular aspects and cases. A similar approach is presented in [98], where Turner et al. design the Model Explanation System (MES) f that augments black box predictions with explanations by using a Monte Carlo algorithm. In practice, they derive a scoring system for finding the best explanation based on formal requirements and consider that the explanations εl are simple logical statements, i.e., decision rules. The authors test logistic regression and SVMs as black box b. 8 Solving the Black Box Inspection Problem In this section we review the methods for opening the black box facing the black box inspection problem (see Section 4.1). Given a black box solving a classification problem, the inspection problem consists in providing a representation for understanding either how the black box model works or why the black box returns certain predictions more likely than others. In [88], Seifet et al. provide a survey of visualizations of DNNs by defining a classification scheme describing visualization goals and methods. They found that most papers use pixel displays to show neuron activations. As in the previous sections, in the following we propose a classification based on the type of technique f used to provide the visual explanation of how the black box works. Most papers in this section try to inspect NNs and DNNs. 8.1 Inspection via Sensitivity Analysis In this section we review the works solving the black box inspection problem by implementing function f using Sensitivity Analysis (SA). Sensitivity analysis studies the correlation between the uncertainty in the output of a predictor and that one in its inputs [86]. All the following methods work on tabular datasets. Sensitivity analysis for “illuminating” the black box was first proposed by Olden in [71] where a visual method for understanding the mechanism of NN is described. In particular, they propose to assess the importance of axon connections and the contribution of input variables by means of sensitivity analysis and Neural Interpretation Diagram (NID) to remove not significant connections and improve the network interpretability. In [7] the authors propose a procedure based on Gaussian Process Classification (GDP) which allows explaining the decisions of any classification method through an explanation vector. That is, the procedure f is black box agnostic. The explanation vectors are visualized to highlight the features that were most influential for the decision of a particular instance. Thus, we are dealing with an inspection for outcome explanation εl . In [21], Datta et al. introduce a set of Quantitative Input Influence (QII) measures f capturing how much inputs influence the outputs of black box predictors. These measures provide a foundation for transparency reports of black 32 R. Guidotti et al. Fig. 12. (Left). From [16] VEC curve and histogram for the pH input feature (x-axis) and the respective high quality wine probability outcome (left of y-axis) and frequency (right of y-axis). (Right). From [48] Age at enrollment shown as line plot (top) and partial dependence bar (middle). Color denotes the predicted risk of the outcome. box predictors. In practice, the output consists in the feature importance for outcome predictions. [92] studies the problem of attributing the prediction of a DNN (the black box b) to its input features. Two fundamental axioms are identified: sensitivity and implementation invariance. These axioms guide the design of an attribution method f , called Integrated Gradients (IG), that requires no modification to the original network. Differently from the previous work, this approach is tested on different types of data. Finally, Cortez in [16,17] uses sensitivity analysis based and visualization techniques f to explain black boxes b. The sensitivity measures are variables calculated as the range, gradient, variance of the prediction. Then, the visualizations realized are barplots for the features importance, and Variable Effect Characteristic curve (VEC) [18] plotting the input values (x-axis) versus the (average) outcome responses (see Figure 12 - (left)). 8.2 Inspection via Partial Dependence In this section we report a set of approaches solving the black box inspection problem by implementing a function f which returns a Partial Dependence Plot (PDP). Partial dependence plot is a tool for visualizing the relationship between the response variable and predictor variables in a reduced feature space. All the approaches presented in this section are black box agnostic and are tested on tabular datasets. In [35], the authors present an approach f aimed at evaluating the importance of non-additive interactions between any set of features. The implementa- Open The Black Box Survey 33 tion uses the Variable Interaction Network (VIN) visualization generated from the use of ANOVA statistical methodology (a technique to calculate partial dependence plots). VIN allows to visualize the importance of the features together with their interdependences. Goldstein et al. provide in [30] a technique f which extends classical PDP named Individual Conditional Expectation (ICE) to visualize the model approximated by a black box b that help in visualizing the average partial relationship between the outcome and some features. ICE plots improves PDP by highlighting the variation in the fitted values across the range of covariates. In [48], Krause et al. introduce random perturbations on the black box b input values to understand to which extent every feature impact the prediction through a visual inspection using the PDPs f . The main idea of Prospector is to observe how the output varies by varying the input changing one variable at a time. It provides an effective way to understand which are the most important features for a certain prediction εl so that it can help in providing a valuable interpretation (see Figure 12 - (right)). In [2] the authors propose a method f for auditing (i.e., inspecting) black box predictors b, studying to which extent existing models benefit of specific features in the data. This method does not assume any knowledge on the models behavior. In particular, the method f focuses on indirect influence and visualizes the global inspection εg through an obscurity vs. accuracy plot (the features are obscured one after the other). Yet, the dependence of a black box b on its input features is relatively quantified by the procedure f proposed in [1], where the authors present an iterative procedure based on Orthogonal Projection of Input Attributes (OPIA), for enabling the interpretability of black box predictors. 8.3 Inspection via Other Approaches In the following, we present solutions for the black box inspection problem that adopt an approach f which can be categorized as none of the previous ones. They all refer to DNNs as black box b and are not generalizable. [110] proposes two tools for visualizing and interpreting DNNs and for understanding what computations DNNs perform at intermediate layers and which neurons activate. These tools visualize the activations of each layer of a trained CNN during the process of images or videos. Moreover, they visualize the features of the different layers by regularized optimization in image space. Yosinski et al. found that by analyzing the live activations, changing in correspondence of different inputs, helps to generate an explanation on the DNNs behave. [96] shows the extraction of a visual interpretation of a DNN using a decision tree. The method TreeView f works as follows. Given the black box b as a DNN, it first decomposes the feature space into K (user defined) potentially overlapping factors. Then, it builds a meta feature for each of the K clusters and a random forest that predicts the cluster labels. Finally, it generates and shows a surrogate decision tree from the forest as an approximation of the black box. Shwartz-Ziv et al. in [90] showed the effectiveness of the Information Plane f visualization of DNNs highlighting that the empirical error minimization of 34 R. Guidotti et al. each stochastic gradient descent phase epoch is always followed by a slow representation compression. Finally, it is worth mentioning that [81] presents the discovery that a single neuron unit of a DNN can perform alone a sentiment analysis task after the training of the network reaching the same level of performance of strong baselines. Also in [111], Zeiler et al. backtrack the network computations to identify which image patches are responsible for certain neural activations. 9 Solving the Transparent Box Design Problem In this section we review the approaches designed to solve the classification problem using a transparent method which is locally or globally interpretable on its own, i.e., solving the transparent box design problem (see Section 4.1). 9.1 Explanation via Rule Extraction In this section we present the most relevant state of the art works solving the transparent box design problem by means of comprehensible predictors c based on rules. In these cases, cg is a comprehensible global predictor providing the whole set of rules leading to any possible decision: a global explanator εg is made available by cg . All the methods presented in this section work on tabular data. In [109] the authors propose the approach f named CPAR (Classification based on Predictive Association Rules) combining the positive aspects of both associative classification and traditional rule-based classification. Indeed, following the basic idea of FOIL [80], CPAR does not generate a large set of candidates as in associative classification, and applies a greedy approach for generating rules cg directly from training data. Wang and Rudin, in [102] propose a method f to extract falling rule lists cg (see Section 3.3) instead of classical rules. The falling rule lists extraction method f relies on a Bayesian framework. In [57], the authors tackle the problem to build a system for medical scoring which is interpretable and characterized by high accuracy. To this end, they propose Bayesian Rule Lists (BRL) f to extract the comprehensible global predictor cg as a decision list. A decision list consists of a series of if-then statements discretizing the whole feature space into a set of simple and directly interpretable decision statements. A Bayesian approach is followed also in [91]. The authors propose algorithms f for learning Two-Level Boolean Rules (TLBR) in Conjunctive Normal Form or Disjunctive Normal Form cg . Two formulations are proposed. The first one is an integer program whose objective function combines the total number of errors and the total number of features used in the rule. The second formulation replaces the 0-1 classification error with the Hamming distance from the current two-level rule to the closest rule that correctly classifies a sample. In [54] the authors propose a method f exploiting a two-level boolean rule predictor to Open The Black Box Survey 35 solve the black box model explanation, i.e., the transparent approach is used in the reverse engineering approach to explain the black box. Yet another type of rule is exploited in [53]. Here, Lakkaraju et al. propose a framework f for generating prediction models, which are both interpretable and accuratem, by extracting Interpretable Decision Sets (IDS) cg , i.e., independent if-then rules. Since each rule is independently applicable, decision sets are simple, succinct, and easily to be interpreted. In particular, this approach can learn accurate, short, and non-overlapping rules covering the whole feature space. Rule Sets are adopted in [104] as comprehensible global predictor cg . The authors present a Bayesian framework f for learning Rule Sets. A set of parameters is provided to the user to encourage the model to have a desired size and shape in order to conform with a domain-specific definition of interpretability. A Rule Set consists of a small number of short rules where an instance is classified as positive if it satisfies at least one of the rules. The rule set provides reasons for predictions, and also descriptions of a particular class. Finally, in [64] an approach f is designed to learn both sparse conjunctive and disjunctive clause rules from training data through a linear programming solution. The optimization formulation leads the resulting rule-based global predictor cg (1Rule) to automatically balance accuracy and interpretability. 9.2 Explanation via Prototype Selection In this section we present the design of a set of approaches f for solving the transparent box design problem returning a comprehensible predictor cg equipped with a human understandable global explanator function εg . A prototype, also referred to with the name artifact or archetype, is an object that is representative of a set of similar instances. A prototype can be an instance x part of the training set D = {X, Y }, or can lie anywhere in the space X m ×Y of the dataset D. Having only prototypes among the observed points is desirable for interpretability, but it can also improve the classification error. As an example of a prototype we can consider the record minimizing the sum of the distances with all the other points of a set (like in K-Medoids) or the record generated averaging the value of the features of a set of points (like in K-Means) [95]. Different definitions and requirements to find a prototype are specified in each work using the prototypes to explain the black box. In [8], Bien et al. design the transparent Prototype Selection (PS) approach f that first seeks for the best prototype (two strategies are proposed), and then assigns the points in D to the label corresponding to the prototype. In particular, they face the problem of recognizing hand written digits. In this approach, every instance can be described by more than one prototype, and more than a prototype can refer to the same label (e.g., there can be more than one prototype for digit zero, more than one for digit one, etc.). The comprehensible predictor cg provides a global explanation in which every instance must have a prototype corresponding to its label in its neighborhood; no instances should have a prototype with a different label in its neighborhood, and there should be as few prototypes as possible. 36 R. Guidotti et al. Kim et al. in [44,45] design the Bayesian Case Model (BCM) comprehensible predictor cl able to learn prototypes by clustering the data and to learn subspaces. Each prototype is the representative sample of a given cluster, while the subspaces are set of features which are important in identifying the cluster prototype. That is, the global explanator εg returns a set of prototypes together with their fundamental features. Possible drawbacks of this approach are the high number of parameters (e.g., number of clusters) and various types of probability distributions which are assumed to be correct for each type of data. [42] proposes an extension of BCM which exploits humans interaction to improve the prototypes. Finally, in [43] the approach is further expanded to include criticisms, where a criticism is an instance that does not fit the model very well, i.e., a counter-example part of the cluster of a prototype. With respect to prototypes and DNN, [63] proposes a method b to change the image representations in order to use only information from the original image representation and from a generic natural image prior. This task is mainly related to image reconstruction rather than black box explanation, but it is realized with the aim of understanding the example to which the DNN b is related to producing a certain prediction by realizing a sort of artificial image prototype. There is a significant amount of work in understanding the representation of DNN by means of artifact images, [41,100,105,111]. We conclude this section presenting how [25] deals with artifacts in DNNs. Finding a single representative prototype by perturbation, deletion, preservation, and similar approaches has the risk of triggering artifacts of the black box. As discussed in Section 8.3, NN and DNN are known to be affected by surprising artifacts. For example, [52] shows that a nearly-invisible image perturbation can lead a NN to classify an object for another; [69] constructs abstract synthetic images that are classified arbitrarily; [63] finds deconstructed versions of an image which are indistinguishable from the viewpoint of the DNN from the original image, and also with respect to texts [58] inserts typos and random sentences in real texts that are classified arbitrarily. These examples demonstrate that it is possible to find particular inputs that can drive the DNN to generate nonsensical or unexpected outputs. While not all artifacts look “unnatural”, nevertheless they form a subset of images that are sampled with negligible probability when the network is normally operated. In our opinion, two guidelines should be followed to avoid such artifacts in generating explanations for DNNs, and for every black box in general. The first one is that powerful explanations should, just like any predictor, generalize as much as possible. Second, the artifacts should not be representative of natural perturbations. 9.3 Explanation via Other Approaches In the following we present solutions for the transparent box design problem adopting approaches f that can not be categorized as the previous ones. [47] describes a method f based on Naive Bayes aimed to explain individual predictions εl of black boxes b. The proposed approach exploits notions from coalitional game theory, and explains predictions utilizing the contribution of the value of Open The Black Box Survey 37 different individual features εl (see Figure 2). The method is agnostic with respect to the black box used and is tested only on tabular data. Finally, in [103] Wang et al. propose a method f named OT-SpAMs based on oblique tree sparse additive models for obtaining a global interpretable predictor cg as a decision tree. OT-SpAMs divides the feature space into regions using a sparse oblique tree splitting and assigns local sparse additive experts (leaf of the tree) to individual regions. Basically, OT-SpAMs passes from complicated trees/linear models to an explainable tree εg . 10 Conclusion In this paper we have presented a comprehensive overview of methods proposed in the literature for explaining decision systems based on opaque and obscure machine learning models. First, we have identified the different components of the family of the explanation problems. In particular, we have provided a formal definition of each problem belonging to that family capturing for each one the proper peculiarity. We have named these problems: black box model explanation problem, black box outcome explanation problem, black box inspection problem and transparent box design problem. Then, we have proposed a classification of methods studied in the literature which take into account the following dimensions: the specific explanation problem addressed, the type of explanator adopted, the black box model opened, and the type of data used as input by the black box model. As shown in this paper, a considerable amount of work has already been done in different scientific communities and especially in the machine learning and data mining communities. The first one is mostly focused on describing how the black boxes work, while the second one is more interested into explaining the decisions even without understanding the details on how the opaque decision systems work in general. The analysis of the literature conducted in this paper has led to the conclusion that despite many approaches have been proposed to explain black boxes, some important scientific questions still remain unanswered. One of the most important open problems is that, until now, there is no agreement on what an explanation is. Indeed, some works provide as explanation a set of rules, others a decision tree, others a prototype (especially in the context of images). It is evident that the research activity in this field completely ignored the importance of studying a general and common formalism for defining an explanation, identifying which are the properties that an explanation should guarantee, e.g., soundness, completeness, compactness and comprehensibility. Concerning this last property, there is no work that seriously addresses the problem of quantifying the grade of comprehensibility of an explanation for humans, although it is of fundamental importance. The study of measures able to capture this aspect is challenging because it also consider also aspects like the expertise of the user or the amount of time available to understand the explanation. The definition of a (mathematical) formalism for explanations and of tools for measuring how 38 R. Guidotti et al. much an explanation is comprehensible for humans would improve the practical applicability of most of the approaches presented in this paper. Moreover, there are other open research questions related to black boxes and explanations that are starting to be treated by the scientific community and that deserve attention and more investigation. A common assumption of all categories of works presented in this paper is that the features used by the black box decision system are completely known. However, a black box might use additional information besides that explicitly asked to the user. For example, it might link the user’s information with different data sources for augmenting the data to be exploited for the prediction. Therefore, an important aspect to be investigated is to understand how an explanation might also be derived in cases where black box systems make decisions in presence of latent features. An interesting starting point for this research direction is the framework proposed in [55] by Lakkaraju et al. for the evaluation of the prediction models performances on labeled data where the decision of decisionmakers (either humans or black-boxes) is taken in the presence of unobserved features. Another open research question is related to providing explanations in the field of recommender systems. When a suggestion is provided to a customer, it should come together with the reasons for this recommendation. In [67] the authors define a case-based reasoning approach to generate recommendations with the opportunity of obtaining both the explanation of the recommendation process and of the produced recommendations. Lastly, a further interesting point is the fact that explanations are important on their own and predictors might be learned directly from explanations. A starting study of this aspect is [49] that presents a software agent learned to simulate the Mario Bros game only utilizing explanations rather than the logs of previous plays. Table 3. Summary of methods for opening and explaining black boxes with respect to the problem faced. Problem Model Explanation Outcome Explanation Black Box Inspection Transparent Design References [20], [50], [9], [39], [14], [29], [114], [87], [32], [94], [5], [19], [37], [115], [6], [70], [28], [65], [22], [61], [33], [51], [97] [108], [25], [113], [89], [56], [83], [98] [71], [7], [92], [16], [35], [30], [48], [2], [1], [110], [96], [90], [81] [109], [102], [57], [91], [53], [104], [64], [8], [44], [63], [47], [103] Open The Black Box Survey A 39 Supplementary Materials Acknowledgement This work is partially supported by the European Community’s H2020 Program under the funding scheme “INFRAIA-1-2014-2015: Research Infrastructures”, grant agreement 654024, SoBigData, http://www.sobigdata.eu. References 1. J. Adebayo and L. Kagal. Iterative orthogonal feature projection for diagnosing bias in black-box models. arXiv preprint arXiv:1611.04967, 2016. 2. P. Adler, C. Falk, S. A. Friedler, G. Rybeck, C. Scheidegger, B. Smith, and S. Venkatasubramanian. Auditing black-box models for indirect influence. In Data Mining (ICDM), 2016 IEEE 16th International Conference on, pages 1–10. IEEE, 2016. 3. R. Agrawal, R. Srikant, et al. Fast algorithms for mining association rules. In Proc. 20th int. conf. very large data bases, VLDB, volume 1215, pages 487–499, 1994. 4. Y. A. A. S. Aldeen, M. Salleh, and M. A. Razzaque. A comprehensive review on privacy preserving data mining. SpringerPlus, 4(1):694, 2015. 5. R. Andrews, J. Diederich, and A. B. Tickle. Survey and critique of techniques for extracting rules from trained artificial neural networks. Knowledge-based systems, 8(6):373–389, 1995. 6. M. G. Augasta and T. Kathirvalavakumar. Reverse engineering the neural networks for rule extraction in classification problems. Neural processing letters, 35(2):131–150, 2012. 7. D. Baehrens, T. Schroeter, S. Harmeling, M. Kawanabe, K. Hansen, and K.-R. MÞller. How to explain individual classification decisions. Journal of Machine Learning Research, 11(Jun):1803–1831, 2010. 8. J. Bien and R. Tibshirani. Prototype selection for interpretable classification. The Annals of Applied Statistics, pages 2403–2424, 2011. Table 4. Summary of methods for opening and explaining black boxes with respect to the explanator adopted. Explanator Decition Tree (DT) Decision Rules (DR) Features Importance (FI) Saliency Mask (SM) Sensitivity Analysis (SA) Partial Dependence Plot (PDP) Neurons Activation (NA) Prototype Selection (PS) References [20], [50], [9], [39], [14], [23], [29], [114], [87], [32], [94], [51], [96], [103] [5], [19], [37], [115], [6], [70], [28], [65], [22], [98], [109], [102], [57], [91], [53], [104], [64] [61], [33], [97], [83] [108], [25], [113], [89], [56] [71], [7], [92], [16] [35], [30], [48], [2], [1] [110], [90], [81] [8], [44], [63] 40 R. Guidotti et al. 9. O. Boz. Extracting decision trees from trained neural networks. In Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining, pages 456–461. ACM, 2002. 10. L. Breiman, J. Friedman, C. J. Stone, and R. A. Olshen. Classification and regression trees. CRC press, 1984. 11. A. Caliskan-Islam, J. J. Bryson, and A. Narayanan. Semantics derived automatically from language corpora necessarily contain human biases. arXiv preprint arXiv:1608.07187, 2016. 12. C. Carter, E. Renuart, M. Saunders, and C. C. Wu. The credit card market and regulation: In need of repair. NC Banking Inst., 10:23, 2006. 13. R. Caruana, Y. Lou, J. Gehrke, P. Koch, M. Sturm, and N. Elhadad. Intelligible models for healthcare: Predicting pneumonia risk and hospital 30-day readmission. In Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 1721–1730. ACM, 2015. 14. H. Chipman, E. George, and R. McCulloh. Making sense of a forest of trees. Computing Science and Statistics, pages 84–92, 1998. 15. G. Comandè. Regulating algorithms regulation? first ethico-legal principles, problems, and opportunities of algorithms. In Transparent Data Mining for Big and Small Data, pages 169–206. Springer, 2017. 16. P. Cortez and M. J. Embrechts. Opening black box data mining models using sensitivity analysis. In Computational Intelligence and Data Mining (CIDM), 2011 IEEE Symposium on, pages 341–348. IEEE, 2011. 17. P. Cortez and M. J. Embrechts. Using sensitivity analysis and visualization techniques to open black box data mining models. Information Sciences, 225:1–17, 2013. 18. P. Cortez, J. Teixeira, A. Cerdeira, F. Almeida, T. Matos, and J. Reis. Using data mining for wine quality assessment. In Discovery Science, volume 5808, pages 66–79. Springer, 2009. 19. M. Craven and J. W. Shavlik. Using sampling and queries to extract rules from trained neural networks. In ICML, pages 37–45, 1994. 20. M. Craven and J. W. Shavlik. Extracting tree-structured representations of trained networks. In Advances in neural information processing systems, pages 24–30, 1996. 21. A. Datta, S. Sen, and Y. Zick. Algorithmic transparency via quantitative input influence: Theory and experiments with learning systems. In Security and Privacy (SP), 2016 IEEE Symposium on, pages 598–617. IEEE, 2016. 22. H. Deng. Interpreting tree ensembles with intrees. arXiv preprint arXiv:1408.5456, 2014. Table 5. Summary of methods for opening and explaining black boxes with respect to the black box explained. Black Box Neural Network (NN) Tree Ensemble (TE) Support Vector Machines (SVM) Deep Neural Network (DNN) Agnostic black box (AGN) References [20], [50], [9], [39], [23], [5], [19], [37], [115], [6], [71] [14], [23], [29], [114], [87], [32], [94], [22], [97] [70], [28], [65] [108], [25], [113], [89], [56], [92], [110], [96], [90], [81] [61], [33], [51], [83], [98], [7], [16], [35], [30], [48], [2], [1] Open The Black Box Survey 41 23. P. Domingos. Knowledge discovery via multiple models. Intelligent Data Analysis, 2(1-4):187–202, 1998. 24. F. Doshi-Velez and B. Kim. Towards a rigorous science of interpretable machine learning. 2017. 25. R. Fong and A. Vedaldi. Interpretable explanations of black boxes by meaningful perturbation. arXiv preprint arXiv:1704.03296, 2017. 26. E. Frank and I. H. Witten. Generating accurate rule sets without global optimization. 1998. 27. A. A. Freitas. Comprehensible classification models: a position paper. ACM SIGKDD explorations newsletter, 15(1):1–10, 2014. 28. G. Fung, S. Sandilya, and R. B. Rao. Rule extraction from linear support vector machines. In Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining, pages 32–40. ACM, 2005. 29. R. D. Gibbons, G. Hooker, M. D. Finkelman, D. J. Weiss, P. A. Pilkonis, E. Frank, T. Moore, and D. J. Kupfer. The cad-mdd: a computerized adaptive diagnostic screening tool for depression. The Journal of clinical psychiatry, 74(7):669, 2013. 30. A. Goldstein, A. Kapelner, J. Bleich, and E. Pitkin. Peeking inside the black box: Visualizing statistical learning with plots of individual conditional expectation. Journal of Computational and Graphical Statistics, 24(1):44–65, 2015. 31. B. Goodman and S. Flaxman. Eu regulations on algorithmic decision-making and a right to explanation. In ICML workshop on human interpretability in machine learning (WHI 2016), New York, NY. http://arxiv. org/abs/1606.08813 v1, 2016. 32. S. Hara and K. Hayashi. Making tree ensembles interpretable. arXiv preprint arXiv:1606.05390, 2016. 33. A. Henelius, K. Puolamäki, H. Boström, L. Asker, and P. Papapetrou. A peek into the black box: exploring classifiers by randomization. Data mining and knowledge discovery, 28(5-6):1503–1529, 2014. 34. J. M. Hofman, A. Sharma, and D. J. Watts. Prediction and explanation in social systems. Science, 355(6324):486–488, 2017. 35. G. Hooker. Discovering additive structure in black box functions. In Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining, pages 575–580. ACM, 2004. 36. J. Huysmans, K. Dejaeger, C. Mues, J. Vanthienen, and B. Baesens. An empirical evaluation of the comprehensibility of decision table, tree and rule based predictive models. Decision Support Systems, 51(1):141–154, 2011. 37. U. Johansson, R. König, and L. Niklasson. Rule extraction from trained neural networks using genetic programming. In 13th International Conference on Artificial Neural Networks, pages 13–16, 2003. 38. U. Johansson, R. König, and L. Niklasson. The truth is in there-rule extraction from opaque models using genetic programming. In FLAIRS Conference, pages 658–663, 2004. 39. U. Johansson and L. Niklasson. Evolving decision trees using oracle guides. In Computational Intelligence and Data Mining, 2009. CIDM’09. IEEE Symposium on, pages 238–244. IEEE, 2009. 40. U. Johansson, L. Niklasson, and R. König. Accuracy vs. comprehensibility in data mining models. In Proceedings of the seventh international conference on information fusion, volume 1, pages 295–300, 2004. 41. H. Kato and T. Harada. Image reconstruction from bag-of-visual-words. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 955–962, 2014. 42 R. Guidotti et al. 42. B. Kim, E. Glassman, B. Johnson, and J. Shah. ibcm: Interactive bayesian case model empowering humans via intuitive interaction. 2015. 43. B. Kim, O. O. Koyejo, and R. Khanna. Examples are not enough, learn to criticize! criticism for interpretability. In Advances In Neural Information Processing Systems, pages 2280–2288, 2016. 44. B. Kim, C. Rudin, and J. A. Shah. The bayesian case model: A generative approach for case-based reasoning and prototype classification. In Advances in Neural Information Processing Systems, pages 1952–1960, 2014. 45. B. Kim, J. A. Shah, and F. Doshi-Velez. Mind the gap: A generative approach to interpretable feature selection and extraction. In Advances in Neural Information Processing Systems, pages 2260–2268, 2015. 46. P. W. Koh and P. Liang. Understanding black-box predictions via influence functions. arXiv preprint arXiv:1703.04730, 2017. 47. I. Kononenko et al. An efficient explanation of individual classifications using game theory. Journal of Machine Learning Research, 11(Jan):1–18, 2010. 48. J. Krause, A. Perer, and K. Ng. Interacting with predictions: Visual inspection of black-box machine learning models. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pages 5686–5697. ACM, 2016. 49. S. Krening, B. Harrison, K. M. Feigh, C. L. Isbell, M. Riedl, and A. Thomaz. Learning from explanations using sentiment and advice in rl. IEEE Transactions on Cognitive and Developmental Systems, 9(1):44–55, 2017. 50. R. Krishnan, G. Sivakumar, and P. Bhattacharya. Extracting decision trees from trained neural networks. Pattern recognition, 32(12), 1999. 51. S. Krishnan and E. Wu. Palm: Machine learning explanations for iterative debugging. In Proceedings of the 2nd Workshop on Human-In-the-Loop Data Analytics, page 4. ACM, 2017. 52. A. Kurakin, I. Goodfellow, and S. Bengio. Adversarial examples in the physical world. arXiv preprint arXiv:1607.02533, 2016. 53. H. Lakkaraju, S. H. Bach, and J. Leskovec. Interpretable decision sets: A joint framework for description and prediction. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 1675–1684. ACM, 2016. 54. H. Lakkaraju, E. Kamar, R. Caruana, and J. Leskovec. Interpretable & explorable approximations of black box models. arXiv preprint arXiv:1707.01154, 2017. 55. H. Lakkaraju, J. Kleinberg, J. Leskovec, J. Ludwig, and S. Mullainathan. The selective labels problem: Evaluating algorithmic predictions in the presence of unobservables. In Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 275–284. ACM, 2017. 56. T. Lei, R. Barzilay, and T. Jaakkola. Rationalizing neural predictions. arXiv preprint arXiv:1606.04155, 2016. 57. B. Letham, C. Rudin, T. H. McCormick, D. Madigan, et al. Interpretable classifiers using rules and bayesian analysis: Building a better stroke prediction model. The Annals of Applied Statistics, 9(3):1350–1371, 2015. 58. B. Liang, H. Li, M. Su, P. Bian, X. Li, and W. Shi. Deep text classification can be fooled. arXiv preprint arXiv:1704.08006, 2017. 59. Z. C. Lipton. The mythos of model interpretability. arXiv preprint arXiv:1606.03490, 2016. 60. Y. Lou, R. Caruana, and J. Gehrke. Intelligible models for classification and regression. In Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 150–158. ACM, 2012. Open The Black Box Survey 43 61. Y. Lou, R. Caruana, J. Gehrke, and G. Hooker. Accurate intelligible models with pairwise interactions. In Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 623–631. ACM, 2013. 62. S. Lowry and G. Macpherson. A blot on the profession. British medical journal (Clinical research ed.), 296(6623):657, 1988. 63. A. Mahendran and A. Vedaldi. Understanding deep image representations by inverting them. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 5188–5196, 2015. 64. D. M. Malioutov, K. R. Varshney, A. Emad, and S. Dash. Learning interpretable classification rules with boolean compressed sensing. In Transparent Data Mining for Big and Small Data, pages 95–121. Springer, 2017. 65. D. Martens, B. Baesens, T. Van Gestel, and J. Vanthienen. Comprehensible credit scoring models using rule extraction from support vector machines. European journal of operational research, 183(3):1466–1476, 2007. 66. D. Martens, J. Vanthienen, W. Verbeke, and B. Baesens. Performance of classification models from a user perspective. Decision Support Systems, 51(4):782–793, 2011. 67. D. McSherry. Explanation in recommender systems. Artificial Intelligence Review, 24(2):179–197, 2005. 68. P. M. Murphy and M. J. Pazzani. Id2-of-3: Constructive induction of m-of-n concepts for discriminators in decision trees. In Proceedings of the eighth international workshop on machine learning, pages 183–187, 1991. 69. A. Nguyen, J. Yosinski, and J. Clune. Deep neural networks are easily fooled: High confidence predictions for unrecognizable images. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 427–436, 2015. 70. H. Núñez, C. Angulo, and A. Català. Rule extraction from support vector machines. In Esann, pages 107–112, 2002. 71. J. D. Olden and D. A. Jackson. Illuminating the black box: a randomization approach for understanding variable contributions in artificial neural networks. Ecological modelling, 154(1):135–150, 2002. 72. F. E. Otero and A. A. Freitas. Improving the interpretability of classification rules discovered by an ant colony algorithm. In Proceedings of the 15th annual conference on Genetic and evolutionary computation, pages 73–80. ACM, 2013. 73. G. L. Pappa, A. J. Baines, and A. A. Freitas. Predicting post-synaptic activity in proteins with data mining. Bioinformatics, 21(suppl 2):ii19–ii25, 2005. 74. F. Pasquale. The black box society: The secret algorithms that control money and information. Harvard University Press, 2015. 75. M. J. Pazzani, S. Mani, W. R. Shankle, et al. Acceptance of rules generated by machine learning among medical experts. Methods of information in medicine, 40(5):380–385, 2001. 76. D. Pedreshi, S. Ruggieri, and F. Turini. Discrimination-aware data mining. In Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 560–568. ACM, 2008. 77. J. R. Quinlan. Generating production rules from decision trees. In ijcai, volume 87, pages 304–307, 1987. 78. J. R. Quinlan. Simplifying decision trees. International journal of man-machine studies, 27(3):221–234, 1987. 79. J. R. Quinlan. C4. 5: Programs for Machine Learning. Elsevier, 1993. 80. J. R. Quinlan and R. M. Cameron-Jones. Foil: A midterm report. In European conference on machine learning, pages 1–20. Springer, 1993. 44 R. Guidotti et al. 81. A. Radford, R. Jozefowicz, and I. Sutskever. Learning to generate reviews and discovering sentiment. arXiv preprint arXiv:1704.01444, 2017. 82. M. T. Ribeiro, S. Singh, and C. Guestrin. Model-agnostic interpretability of machine learning. arXiv preprint arXiv:1606.05386, 2016. 83. M. T. Ribeiro, S. Singh, and C. Guestrin. Nothing else matters: Modelagnostic explanations by identifying prediction invariance. arXiv preprint arXiv:1611.05817, 2016. 84. M. T. Ribeiro, S. Singh, and C. Guestrin. Why should i trust you?: Explaining the predictions of any classifier. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 1135–1144. ACM, 2016. 85. A. Romei and S. Ruggieri. A multidisciplinary survey on discrimination analysis. The Knowledge Engineering Review, 29(5):582–638, 2014. 86. A. Saltelli. Sensitivity analysis for importance assessment. Risk analysis, 22(3):579–590, 2002. 87. V. Schetinin, J. E. Fieldsend, D. Partridge, T. J. Coats, W. J. Krzanowski, R. M. Everson, T. C. Bailey, and A. Hernandez. Confident interpretation of bayesian decision tree ensembles for clinical applications. IEEE Transactions on Information Technology in Biomedicine, 11(3):312–319, 2007. 88. C. Seifert, A. Aamir, A. Balagopalan, D. Jain, A. Sharma, S. Grottel, and S. Gumhold. Visualizations of deep neural networks in computer vision: A survey. In Transparent Data Mining for Big and Small Data, pages 123–144. Springer, 2017. 89. R. R. Selvaraju, A. Das, R. Vedantam, M. Cogswell, D. Parikh, and D. Batra. Grad-cam: Why did you say that? visual explanations from deep networks via gradient-based localization. arXiv preprint arXiv:1610.02391, 2016. 90. R. Shwartz-Ziv and N. Tishby. Opening the black box of deep neural networks via information. arXiv preprint arXiv:1703.00810, 2017. 91. G. Su, D. Wei, K. R. Varshney, and D. M. Malioutov. Interpretable two-level boolean rule learning for classification. arXiv preprint arXiv:1511.07361, 2015. 92. M. Sundararajan, A. Taly, and Q. Yan. Axiomatic attribution for deep networks. arXiv preprint arXiv:1703.01365, 2017. 93. C. Szegedy, W. Zaremba, I. Sutskever, J. Bruna, D. Erhan, I. Goodfellow, and R. Fergus. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199, 2013. 94. H. F. Tan, G. Hooker, and M. T. Wells. Tree space prototypes: Another look at making tree ensembles interpretable. arXiv preprint arXiv:1611.07115, 2016. 95. P.-N. Tan et al. Introduction to data mining. Pearson Education India, 2006. 96. J. J. Thiagarajan, B. Kailkhura, P. Sattigeri, and K. N. Ramamurthy. Treeview: Peeking into deep neural networks via feature-space partitioning. arXiv preprint arXiv:1611.07429, 2016. 97. G. Tolomei, F. Silvestri, A. Haines, and M. Lalmas. Interpretable predictions of tree-based ensembles via actionable feature tweaking. In Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 465–474. ACM, 2017. 98. R. Turner. A model explanation system. In Machine Learning for Signal Processing (MLSP), 2016 IEEE 26th International Workshop on, pages 1–6. IEEE, 2016. 99. W. Verbeke, D. Martens, C. Mues, and B. Baesens. Building comprehensible customer churn prediction models with advanced rule induction techniques. Expert Systems with Applications, 38(3):2354–2364, 2011. Open The Black Box Survey 45 100. C. Vondrick, A. Khosla, T. Malisiewicz, and A. Torralba. Hoggles: Visualizing object detection features. In Proceedings of the IEEE International Conference on Computer Vision, pages 1–8, 2013. 101. S. Wachter, B. Mittelstadt, and L. Floridi. Why a right to explanation of automated decision-making does not exist in the general data protection regulation. International Data Privacy Law, 7(2):76–99, 2017. 102. F. Wang and C. Rudin. Falling rule lists. In Artificial Intelligence and Statistics, pages 1013–1022, 2015. 103. J. Wang, R. Fujimaki, and Y. Motohashi. Trading interpretability for accuracy: Oblique treed sparse additive models. In Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 1245– 1254. ACM, 2015. 104. T. Wang, C. Rudin, F. Velez-Doshi, Y. Liu, E. Klampfl, and P. MacNeille. Bayesian rule sets for interpretable classification. In Data Mining (ICDM), 2016 IEEE 16th International Conference on, pages 1269–1274. IEEE, 2016. 105. P. Weinzaepfel, H. Jégou, and P. Pérez. Reconstructing an image from its local descriptors. In Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on, pages 337–344. IEEE, 2011. 106. A. Weller. Challenges for transparency. arXiv preprint arXiv:1708.01870, 2017. 107. D. Wettschereck, D. W. Aha, and T. Mohri. A review and empirical evaluation of feature weighting methods for a class of lazy learning algorithms. In Lazy learning, pages 273–314. Springer, 1997. 108. K. Xu, J. Ba, R. Kiros, K. Cho, A. Courville, R. Salakhudinov, R. Zemel, and Y. Bengio. Show, attend and tell: Neural image caption generation with visual attention. In International Conference on Machine Learning, pages 2048–2057, 2015. 109. X. Yin and J. Han. Cpar: Classification based on predictive association rules. In Proceedings of the 2003 SIAM International Conference on Data Mining, pages 331–335. SIAM, 2003. 110. J. Yosinski, J. Clune, A. Nguyen, T. Fuchs, and H. Lipson. Understanding neural networks through deep visualization. arXiv preprint arXiv:1506.06579, 2015. 111. M. D. Zeiler and R. Fergus. Visualizing and understanding convolutional networks. In European conference on computer vision, pages 818–833. Springer, 2014. 112. C. Zhang, S. Bengio, M. Hardt, B. Recht, and O. Vinyals. Understanding deep learning requires rethinking generalization. arXiv preprint arXiv:1611.03530, 2016. 113. B. Zhou, A. Khosla, A. Lapedriza, A. Oliva, and A. Torralba. Learning deep features for discriminative localization. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 2921–2929, 2016. 114. Y. Zhou and G. Hooker. Interpreting models via single tree approximation. arXiv preprint arXiv:1610.09036, 2016. 115. Z.-H. Zhou, Y. Jiang, and S.-F. Chen. Extracting symbolic rules from trained neural network ensembles. Ai Communications, 16(1):3–15, 2003.
2cs.AI
1 Phase Noise Compensation for OFDM Systems arXiv:1708.05443v1 [cs.IT] 17 Aug 2017 Amir Leshem and Michal Yemini Abstract—We describe a low complexity method for time domain compensation of phase noise in OFDM systems. We extend existing methods in several respects. First we suggest using the Karhunen-Loève representation of the phase noise process to estimate the phase noise. We then derive an improved datadirected choice of basis elements for LS phase noise estimation and present its total least square counterpart problem. The proposed method helps overcome one of the major weaknesses of OFDM systems. We also generalize the time domain phase noise compensation to the multiuser MIMO context. Finally we present simulation results using both simulated and measured phased noise. We quantify the tracking performance in the presence of residual carrier offset. I. I NTRODUCTION OFDM has become a prominent technology that is utilized in many modern communication systems including cellular systems such as 3GPP LTE [2], wireless LAN (WLAN) [3] and WiMax [4]. In future LTE systems (see 802.11ac) multicarrier modulations such as Generalized frequency division multiplex (GFDM), Filter bank multi-carrier (FBMC), Universal filtered multi-carrier (UFMC) and Filtered OFDM (fOFDM) [5]–[8] may be implemented. In spite of its popularity and robustness to multipath propagation, OFDM is known to be extremely affected by phase noise (PN) and frequency offset [9]–[13]. MIMO OFDM receivers are very sensitive to the phase noise coming from the difference between the carrier frequency and the local oscillator (LO). In the case of very high data rates this is actually the limiting factor on performance. High order modulations such as 256 QAM are also severely affected by phase noise. Phase noise is typically modeled as a multiplicative noise. When the LO is locked to the carrier frequency, the phase noise is lower and is modeled as a finite power random process. When the LO is not locked the phase noise is modeled as a Wiener process with infinite power, the effect of such phase noise is analyzed from an information theoretic perspective in [14]. In all typical 802.11 and LTE implementations the LO is locked; hence, we will concentrate on the first model. Phase noise can be considered to have two components: a common phase error (CPE) that is common to all carriers, and a time varying part that is frequency dependent. This part is typically weaker than the CPE and generates the undesirable and harmful ICI. A popular approach to ICI mitigation is the use of an MMSE equalizer in the frequency domain that balances the AWGN and the colored ICI. This approach can be found in many The phase noise compensation scheme presented in this paper is patented [1]. The authors are with the Faculty of Engineering, Bar-Ilan University, Ramat Gan 52900, Israel (email: [email protected], [email protected]). This work was supported by the Israel Science Foundation under Grant 903/2013. articles including [13], [15]–[18]. The alternative approach of PN cancellation/mitigation aims at jointly detecting the data and cancelling the PN as described in [19], [20], or jointly estimating the channel and PN [21]–[25] and even jointly estimating the channel, detecting the data and compensating for the PN as in [26]–[29]. These schemes suffer from high complexity that is impractical to implement at high rates and in high spectral efficiency communication systems. Yet a third approach to reducing ICI is time domain processing. Casas et al. [30] proposed a LS approach in the time domain where they represented the noise using one of two fixed bases: DFT or DCT. The dominant phase noise components are then estimated using LS fitting of a few basis vectors (typically the low frequency components due to phase noise properties). When a single basis vector is used, the method reduces to that of [15]–[17]. The main drawback of the method in [30] is that typically phase noise cannot be compactly represented in the fixed basis. Another LS PN compensation scheme estimates both the channel coefficients and the PN with assumed low complexity; however, the assumption that the number of pilot subcarriers is larger than the number of transmitting antennas leads to high complexity in massive MIMO communication systems [31]–[33]. Another issue we consider is time variation of the statistical properties of the PN process. Even when the LO is locked, the statistical properties of the PN are time varying due to external conditions such as temperature; e.g., heat from the mobile device, thus making real time basis selection very desirable for practical implementations. Therefore, statistical knowledge of the PN covariance matrix should be acquired. Phase noise is present in many communication systems such as WLAN, millimeter wave systems, full-duplex systems and massive MIMO systems. Full-duplex systems are especially affected by phase noise since self-interference is performed in order to extract the received signals, see for example [34]– [36]. The phase noise prevents transmitters from properly subtract their self-interference, this is especially harmful in high order modulations which demand high values of received SNR which are translated to low values of error vector magnitudes (EVM). OFDM millimeter wave systems are also affected by phase noise, see for example [37], [38] ; here, as in other systems the effect of phase noise is most severe when using high order modulations, and is a key issue in implementing these systems. Phase noise is also present in optical communication systems using coherent optical OFDM [39]. In such networks the phase is estimated digitally without using a optical phase-locked loop, however, this estimation is not perfect and thus phase noise is cause this imperfect estimation. The phase compensation scheme that we present is adaptable to the transmission of OFDM symbols in all of these systems. 2 In this paper we replace the fixed basis proposed in previous works with an adaptive basis which is the best representation of the noise with respect to the L2 norm for a random noise process [1]. Since in locked systems the phase noise behavior is quite stationary we can either pre-calibrate the phase noise PSD and then use an eigen-decomposition of the covariance matrix or estimate in real time the basis elements as well as the LS coefficients of the phase noise. The latter is more robust to environmental changes such as temperature which might affect the statistical properties of the phase noise. We can also replace the LS estimation of the coefficient with a total least square estimation [40] that considers imperfection of the model. The main contributions of this article are: 1) Utilizing the Karhunen-Loève representation of the phase noise process covariance matrix as basis elements. This dramatically improves the results of [30]. 2) The introduction of the implementation of the total least square estimator for phase noise mitigation schemes. 3) We efficiently track of the subspace of the covariance matrix of the phase noise process for system with no information regarding the covariance matrix of the phase noise process. This is performed utilizing the PAST algorithm [41] and behaves well even in the presence of carrier frequency offset. 4) We extended the above contributions for multiuser uplink beamforming OFDM systems. This paper is organized as follows: in section II we present the phase noise model. Section III presents our results on phase noise compensation in SISO systems and discusses the computational aspects of the compensation scheme. In Section IV we discuss two enhancements to the compensation method. Section V is dedicated to tracking the dominant subspace of the Karhunen-Loève (KL) representation presented in Section III. In Section VI we present simulation and measured results of the proposed phase noise compensation method. Section VI-A covers simulated phase noise whereas Section VI-B discusses measured phase noise. Section VI-C analyzes simulations of the tracking algorithm proposed in Section V for the measured phase noise. Finally, Section VII concludes the paper. Notations: We denote the convolution between two continuous time signals x and y at time t by x ∗ y(t); for discrete time we denote the convolution between the two discrete time signals x and y at time k by x ∗ y(k). Vectors and matrices appear in bold. Let a be a vector, we denote by aT the transpose vector of a and by a∗ the conjugate transpose of a; note that if a is of dimension 1; i.e., scalar, then a∗ is equal to the conjugate of a. Moreover, M † is the Moore-Penrose pseudoinverse of a matrix M . Finally, k · k denotes the L2 norm and k · kF denotes the Frobenius norm. where ωk = ω0 + k∆ω is the frequency of the k’th channel, k = − N2 , . . . , N2 , ω0 is the carrier frequency and 2π Ts ∆ω = (2) is the angular sampling frequency. Additionally, s(k) is the symbol transmitted of the k’th channel and is independent of symbols transmitted over other channels. The OFDM symbol passes through a time invariant channel (we assume a quasistationary fading process) and the received signal y(t) is given by y(t) = h ∗ x(t) + n(t). (3) Phase noise is multiplicative noise resulting from the jitter of the LO of the OFDM system. We can model the received signal with the effect of the phase noise as z(t) = y(t)ejφ(t) , (4) where φ(t) is a random process that can be considered to be a filtered Gaussian process with PSD Pφ (f ). The process ψ (t) = ejφ(t) is the multiplicative noise process that can also include the residual frequency offset (a linear phase component) and the common phase error that is constant across frequencies. We want to estimate this and remove its effect, since it introduces inter-channel interference (ICI). We assume that ψ (t) is a stationary process with a known covariance rψ (τ ) = E [ψ (t) ψ ∗ (t − τ )]. This assumption is very reasonable when the LO is locked to a stable frequency source through a Phase-Locked Loop (PLL). T Let ψ = (ψ1 , . . . , ψN ) be a vector of N consecutive samples of the phase noise process ψm = ψ (mTs ). We define the covariance matrix of the phase noise process by Rψψ  E (ψ1 ψ1∗ )  .. = . E (ψN ψ1∗ ) ... .. . ...  ∗ E (ψ1 ψN )  .. . . ∗ E (ψN ψN ) (5) When trying to represent the phase noise along a single OFDM symbol it is natural to use the basis of the eigenvectors of Rψψ . We decompose Rψψ using an eigen-decomposition as Rψψ = N −1 X µi ui u∗i , (6) i=0 II. P HASE NOISE MODEL In this section we describe a mathematical model for the phase noise process and its effects on OFDM systems. Consider an OFDM system described by N −1 1 X s(k)ejωk t , x(t) = √ N k=0 0 ≤ t ≤ Ts (1) where µ0 , . . . , µN −1 denote the eigenvalues of Rψψ and u0 , . . . , uN −1 denote their respective eigenvectors. We now describe the received signal and channel. We begin with a SISO model and then extend it to a SIMO model. Note that we are only interested in the SIMO case since the phase noise is identical on all spatial channels. We assume that the OFDM symbols are synchronized and that the cyclic prefix 3 has been removed, so that the channel matrix can be assumed to be circulant, and thus be given by   h0 h1 · · · ··· hN −1    hN −1 h0 . . . hN −2      .. .. .. .. .. (7) H= . . . . . .     .. .. .. ..   . . . . h1 · · · · · · hN −1 h0 Furthermore, we consider a single OFDM symbol. The time domain OFDM symbol is given by x = F ∗N s (8) where s = [s0 , . . . , sN −1 ] T (9) III. T IME DOMAIN COMPENSATION IN SISO SYSTEMS We now describe a time domain method for reducing the phase noise. The idea is to use available pilot data to estimate the coefficients of a representation of the phase noise. We first present the phase compensation algorithm in [30]. Then we discuss the choice of basis for the phase noise compensation. We show that using a fixed basis such as Fourier vectors or discrete cosine transform vectors does not yield large gains in terms of ICI cancellation. We then propose the use of data directed basis selection and show the improvement achieved through this approach. This is important for ICI cancellation since common phase noise removal involves choosing the first basis vector to be the N dimensional all ones vectors 1N = T [1, . . . , 1] . Let v 0 , . . . , v N −1 be a basis for CN . Denote the phase  T and let γ = noise realization by ejϕ = ejφ0 , . . . , ejφN−1 T [γ0 , . . . , γN−1 ] satisfy N −1 X −jϕ is the frequency domain OFDM symbol, and γk v k , (16) e = k=0   1 1 ... 1 −2π·1·1/N −2π·1·(N −1)/N   or equivalently 1 e . . . e 1   F N = √ .  .. .. . . . e−jϕ = V γ, (17)  N . . . . −2π(N −1)·1/N −2π·(N −1)·(N −1)/N 1 e ... e where V = [v 0 , . . . , v N −1 ]. If we allow only d basis vectors (10) V (d) = [v , . . . , v 0 d−1 ] we can pose the problem as a least squares problem. Had we known the vector e−jϕ our objective is the DFT matrix. Let n = [n0 , . . . , nN −1 ] be the additive would have been finding γ̂ ∈ CN such that V (d) γ cancels the white Gaussian noise. It follows that phase noise optimally (in LS sense), i.e. y = HF ∗N s + n = Hx + n (11) γ̂ = arg min e−jϕ − V (d) γ γ is the received signal when no phase noise is present. T The received OFDM symbol z = [z0 , . . . , zN −1 ] is given by z = ejΦ (Hx + n) 2 . (18) However, since e−jϕ is the vector which we want to estimate, we cannot use this naive approach. We discuss ways to overcome this issue below. (12) A. LS compensation based on [30] where Φ = diag (φ0 , . . . , φN−1 ) (13) is the phase noise vector. Define a received data matrix Z; this matrix is given by   z0   jΦ .. Z = diag(z) =  (14) =Ye . zN −1 where   Y = diag(y) =   y0 .. . yN −1  . (15) Our problem is to estimate the phase noise and construct a time domain vector that cancels out the harmful effect of the phase noise. Since we do not know the phase noise e−jϕ we rely on known OFDM pilot tones. In this case we need to modify (18) T assuming that we have known values sp = [si1 , . . . , sir ] ∈ npilot ×1 C . Let ŷ be an estimate of the time domain symbol with the phase noise removed: ŷ = ZV (d) γ̂ ' Hx + n = HF ∗N s + n (19) Since H is diagonalized by the DFT matrix F N ; i.e., H = F ∗N ΛF N , we obtain that ŝ = Λ−1 F N ZV (d) γ̂. (20) is an estimate of the received OFDM frequency domain symbol. Defining W = Λ−1 F N ZV (d) , (21) we obtain that our LS estimate of γ is given by 2 γ̂ = arg min ks − W γk . γ (22) 4 Therefore, we obtain that γ̂ = C. The basis vectors W †p sp , (23) where W p is obtained by choosing the rows that correspond to pilot tones alone. The estimate of the phase noise cancellation vector is now given by e−jϕ = V γ̂. (24) Figure 1 depicts this phase noise compensation scheme. Note that the components of Z are affected by noise and the noise is multiplied by Λ−1 F N . This suggests that the estimation of γ can be improved using total least squares (TLS) instead of the LS described above. We discuss this in the next section. B. TLS compensation As discussed above, in the training period, the training symbols spilot are sent over the channel. Since these training symbols are predefined and known by the receiver, our compensation problem can be represented as a data least squares (DLS) problem [42]. However, since we use the basis V (d) of size d ≤ N we also consider discrepancies in sp . By Eq. (20) we have that s ≈ Λ−1 F N ZV (d) γ̂. (25) The uncertainty in the model is caused by the estimation of the channel matrix H, the additive noise of the channel and the reduced basis dimensions. It it therefore natural to consider the TLS estimation of γ. Let ∆W and ∆s be such that (W p + ∆W )γ = sp + ∆s (26) where as before, W p is obtained by choosing the rows that correspond to pilot tones alone. The TLS problem is then arg s.t.: min γ,∆W ,∆s k[∆W , ∆s]kF (W p + ∆W )γ = sp + ∆s (27) where as stated above (Section I) the notationk · kF denotes the Frobenius norm. The solution in terms of γ̂ is obtained by following Algorithm 1 in [40] which we describe next. Let W p and sp as stated above and let [W p , sp ] = U ΣQT (28) be the singular value decomposition (SVD) of [W p , sp ] ∈ Cnpilot ×(d+1) . Denote   q 11 q 12 Q, (29) q 21 q22 where q 11 ∈ Cd×d , q 12 ∈ Cd×1 , q 21 ∈ C1×d and q22 ∈ C. If q22 6= 0 , note that q22 is scalar, then γ̂ TLS = −q 12 /q22 . (30) When q22 = 0, there is no solution and we set γ̂ TLS = γ̂ LS . Note that in some practical implementations we trade off accuracy for lower complexity. However, if an SVD computation engine is available because of beamforming, for example, then this SVD engine can be used for solving the TLS problem in (28). We now turn to the question of the choice of the basis vectors v 0 , . . . , v N −1 . The authors of [30] proposed using either the columns of the DFT matrix F N or the columns of the DCT matrix. As will be seen in the simulations, this typically leads to minor improvement over simply cancelling the common phase but the ICI is still significant. We suggest a different approach and choose the basis elements using the properties of the phase noise process. We assume that the phase noise process has covariance Rψψ = N X µk uk u∗k (31) k=1 where u0 , . . . , uN −1 are the eigenvectors corresponding to eigenvalues µ0 > . . . > µN−1 , respectively. This basis is the best choice for representing random realizations of a random process with covariance Rψψ (this is basically a KL representation of the process). Since the statistical properties of the phase noise process are stationary for quite long periods they can be calibrated in advance. D. Computational aspects The compensation of the phase noise involves O((N log N ) × d + npilot × d2 ) complex multiplications where d is the number of the basis elements. This is due to the FFT complexity adding d multiplications per symbol and the additional complexity of the LS itself. We next explain these values in more detail. Forming the matrix W involves computing W = Λ−1 F N ZV (d) . (32) Matrices Λ and Z are diagonal matrices and matrix F n is symmetric. Thus, calculating of the multiplication ZV (d) requires at most N × d complex multiplication operations. Using the fast Fourier transform (FFT), we have that the complexity of calculating F N ZV (d) is O((N log N ) × d). The, additional multiplication by Λ−1 does not increase the complexity. Solving the LS problem (22) only involves matrices of size npilot × d resulting in O(npilot × d2 ) operations. It follows that the complexity depends on d and npilot and is O((N log N ) × d + npilot × d2 ). We note that the complexity of calculating the eigenvectors of the covariance matrix is O(N 3 ). This is done once and thus the complexity over time vanishes. However, since phase noise statistics can slowly vary due to frequency offset variations, we also provide a tracking solution. In Section V we demonstrate that we can track the d leading eigenvectors with a complexity of O(N d) operations per update. We can conclude that the complexity of our compensation scheme is O((N log N ) × d + npilot × d2 ) even if tracking the d leading eigenvectors is performed. This is on par with the complexity of the compensation scheme presented in [30] while providing superior results due to the better and adaptive basis selection. 5 V̂ 1 Rψψ Compute SVD of Rψψ Select V̂ 1 , . . . , V̂ d . .. as basis elements V̂ 1 ... V̂ d V̂ d ... V̂11 pilot 1 γ̂1 .. . pilot kp null tone 1 .. . LS (TLS) solver ⊗ V̂1N ... ... V̂d1 ⊗ .. . γ̂d ⊗ null tone kn ⊗ P z1 V̂dN P ⊗ zN y1 ⊗ yN ... FFT ... To FEQ Fig. 1: Phase noise compensation process without subspace tracking. IV. E XTENSIONS We now describe two extensions to the proposed method. These extensions can contribute substantially to the performance of the proposed scheme by increasing the number of available equations for PN mitigation. A. Using null tones While channel estimation can only use tones in which energy has been transmitted, null tones can also provide information on ISI. This depends, of course, on the amount of adjacent channel suppression; however, when the adjacent channel suppression is good, the ICI can be estimated based on the null tones as well. B. Phase estimation in MIMO system When a MIMO system is used, typically all transceiver chains use the same LO. Hence the phase noise can be jointly estimated based on the pilot symbols from all the receive antennas. This extra information substantially enhances the applicability of the proposed method and improves the quality of the LS fitting of the coefficients, especially in modern 802.11ac and massive MIMO systems. Next we provide a detailed example for adapting the algorithm presented in this paper to multiuser uplink beamforming OFDM. The example assumes transmitter phase compensation [43], [44], for this reason it focuses on compensating for the receiver phase noise. Under the assumption of proper phase noise compensation at the transmitters, the phase noise at the receiver is the dominating noise compared with the compensated phase noise at the transmitters. Suppose that a receiver with Nr antennas serves Nu single antenna users. Each user ku ∈ {1, . . . , Nu } sends the vector of symbols sku = [sku ,0 , . . . , sku ,N −1 ]T , by aiming to transmit the signal N −1 1 X sku ,k ejωk t , xku (t) = √ N k=0 0 ≤ t ≤ Ts . (33) Denote by φku (t) the residual phase noise at transmitter ku after performing phase noise compensation at the transmitter. The transmitted signal with the residual phase noise is given by1 x̃ku (t) = ejφku (t) xku (t) ≈ xku (t) (34) Denote by hku ,kr (t) the channel between user ku and the receiver antenna kr . The receiving signal at antenna kr is ykr (t) = Nu X ku =1 hku ,kr ∗ x̃ku (t) + nkr (t). (35) Assuming a common LO for all the receiving antennas (which is the case in many communication systems), we can model the received signal with the effect of the phase noise at the receiver as zkr (t) = ejφ(t) ykr (t); (36) 1 Note that (34) displays our assumption that adequate phase noise compensation was performed by the transmitters, thus the remaining phase noise at the transmitters is negligible. 6 an example of multiple LOs at the receiving end is discussed for example in [45]. Since we discuss in this example systems with transmitter phase noise compensation, we can reasonably assume that ejφ(t) is considerably larger than ejφku (t) . Also, as before, we assume that the OFDM symbols are synchronized and that the cyclic prefix has been removed, so that the channel matrix can be assumed to be circulant, and thus for every antenna the channel is given by H ku ,kr =  hku ,kr ,0   hku ,kr ,N −1   ..  .   ..  . ··· .. . .. . .. . ··· hku ,kr ,1 hku ,kr ,0 .. . ··· hku ,kr ,1 ··· .. . .. . hku ,kr ,N −1 hku ,kr ,N −2 .. . .. . hku ,kr ,0 hku ,kr ,N −1      .    (47) where 1Nr is a column vector of ones of size Nr . Define W = (I Nu ⊗ F N )BZ(I Nr ⊗ V )(1Nr ⊗ I N ). (48) Since (1Nr ⊗ (V γ)) = (I Nr ⊗ V )(1Nr ⊗ I N )γ (49) it follows from (47) and from our assumption that adequate phase noise compensation was performed by the transmitters s ≈ W γ. (50) We can obtain the linear LS estimation by solving 2 γ̂ = arg min ks − W γk . γ [xT1 , . . . , xTNu ]T (51) Therefore, as before, we obtain that F ∗N sku . (38) γ̂ = W †p sp , x̃ku = ejΦku xku (39) where W p is obtained by choosing the rows that correspond to pilot tones alone of the different users. Alternatively, we can solve the respective TLS problem. xku = Further, let where Φku = diag (φku ,0 , . . . , φku ,N −1 ) and φku ,m = φku (mTs ). Let x̃ = [x̃T1 , . . . , x̃TNu ]T , we have that Nu X H ku ,kr x̃ku + nkr (52) V. T RACKING THE DOMINANT SUBSPACE OF THE K ARHUNEN L O ÈVE REPRESENTATION   jΦ  z1 e y1  ..    .. jΦ z= . =  = (I Nr ⊗ e )y. . z Nr ejΦ y Nr (43) Y = diag(y) (44) There are several methods to obtain the correlation matrix Rψψ . The first is to pre-calibrate it and generate fixed basis vectors that are either measured or computed from the LO design. Hence, one can estimate Rψψ from the data and apply an eigen-decomposition to obtain the basis vectors. These alternatives are hard to implement since they depend on component variability in manufacturing and therefore needs to be performed for each chip separately. This might also lead to performance degradation due to environmental changes such as temperature or vendor dependent behavior. Furthermore, residual carrier offset also affects the optimal basis. A better choice that makes it possible to overcome the non-stationarity of the phase noise process is to track a basis for the phase noise subspace. To track the phase noise vectors we propose using the PAST algorithm [41]. Since we do not require our basis elements to be orthogonal we do not need the deflation approach of PAST-d (see [41]). Alternatively, the subspace can be tracked using traditional methods such that appear in [46]. The PAST algorithm is implemented as follows. Z , diag(z) = Y (I Nr ⊗ ejΦ ), (45) A. The PAST algorithm for subspace tracking ku =1 = H kr x̃ + nkr . (40) Defining Φ as in (13), we write z kr = ejΦ y kr = ejΦ (H kr x̃ + nkr ). Now, let H = [H T1 , . . . , H TNr ]T and define y and z as follows    H 1 x̃ + n1 y1  ..   .. y= . = . y Nr H Nr x̃ + nNr  Denote s ≈ (I Nu ⊗ F N )BZ(1Nr ⊗ (V γ)) (37) Let H kr = [H 1,kr , . . . , H Nu ,kr ] and x = where y kr = Choosing a ZF beamforming matrix B and assuming that Nr > Nu , we have that (41) n = [nT1 , . . . , nTNr ]T ;    = H x̃ + n (42) it follows that 2 where ⊗ is the Kronecker product . Let V be defined to be a basis of Rψψ (see (5)), and define γ as in (16) and (17). We can conclude that (I Nr ⊗ ejΦ )(I Nr ⊗ (V γ)) = I N ·Nr (46) 2 We note that in Figure 1 and Figure 2 the symbol ⊗ denotes the scalar multiplication. However, this is a special case of the Kronecker product. (d) Let V 0 be a matrix composed of the d low frequency vectors of the DFT matrix or any other a-priori estimate of the phase noise dominant eigenvectors (i.e., eigenvectors of Rψψ corresponding to higher eigenvalues). Let P 0 = I d×d . (d) At OFDM symbol m we use V m−1 to perform the phase noise removal in the time domain as described above. The estimated symbols in the frequency domain ŝ(m) (k) are used to remove 7 Let λ be an eigenvalue of Rψψ and v its respective eigenvec∗ −1 tor. By the definition of c, diag (c) = diag (c) , thus Initialize β, (d) y m = (V m−1 )∗ ϕ̂m , ∗ Rψ̃ψ̃ diag (c) v = diag (c) Rψψ diag (c) diag (c) v hm = P m−1 y m , 1 gm = β+y ∗ m hm Pm = 1 β = diag (c) Rψψ diag (c) hm , −1 diag (c) v = diag (c) Rψψ v (P m−1 − g m h∗m ) , = λdiag (c) v (58) (d) em = xm − V m−1 y m , (d) (d) V m = V m−1 + em g ∗m . TABLE I: PAST algorithm for subspace tracking. the desired signal from the received time domain signal and estimate the phase noise process at each time by ϕ̂m (t) = e   P −1 (m) −1 j] zm (t)( N (k)ĥ(m) (k)ejωk t ) k=0 ŝ , 0 ≤ t ≤ Ts . (53) Rψψ is updated by m−1 ∗ Rm ψψ = (1 − α)Rψψ + αϕm ϕm . (54) (d) Vm is updated using the PAST algorithm as described in Table I (see [41]). Note that to track the subspace we do not need to compute Rψψ and that is optional. Figure 2 depicts this phase noise compensation scheme with subspace tracking. and we conclude that diag (c) v is an eigenvector of Rψ̃ψ̃ for the eigenvalue λ. It follows that the basis elements of Rψψ ; i.e., the covariance matrix of the PN process without the residual frequency offset, are multiplied by exponentials of the form c(t) = ej2π∆f t . This is especially appealing when we implement the adaptive tracking of the KLT basis elements, as will be demonstrated in the simulations. Note that the subspace tracking algorithm, does not require ∆f to be known, but it is affected by it implicitly. C. The asymptotic behavior of the PAST algorithm The asymptotic behavior of the PAST and PASTd algorithms is discussed in [47]–[49] for real valued independent identically distributed (i.i.d.) Gaussian random vectors. Under the reasonable assumption that the random process ψ is M -dependent, we can sample ψ every M + 1 samples. This will slow the convergence by a linear factor of M + 1. To use the results of [47]–[49] the problem can be represented as a real problem, using standard transformation. Let,   Re(V ) −Im(V ) V 2rep = (59) Im(V ) Re(V ) it follows that B. Residual carrier offset In the presence of residual carrier offset there is another time varying multiplicative noise; namely, the slowly varying residual carrier. While for small values (e.g., 1 ppm) the residual carrier does not affect the decoding, it does have a detrimental effect on the common phase error estimation since the phase is no longer fixed at the pilots. Interestingly, this residual carrier can be incorporated into the KLT representation of the phase noise process by replacing ψ(t) with the random process ψ̃(t) ψ̃(t) = ej2π∆f t ψ(t) = ej(φ(t)+2π∆f t) (55) and then tracking the subspace of Rψ̃ψ̃ instead of Rψψ . We note that ψ̃(mTs ) and ψ̃ are defined similarly to the scenario in which there is no residual carrier offset; that is, ψ̃m = ψ̃(mTs ) and ψ̃ = [ψ̃1 , . . . , ψ̃N ]T . Let c(t) = ej2π∆f t and cm = c(mTs ). We can represent Rψ̃ψ̃ by the following identity ∗ Rψ̃ψ̃ = diag (c) Rψψ diag (c) (56) c = [c1 , . . . , cN ]T . (57) where     Re(e−jϕ ) Re(γ) = V 2rep Im(e−jϕ ) Im(γ) (60) and we can track the subspace of the matrix V 2rep . Thus, assuming that the vectors ψ are circularly symmetric complex normal vector, we can utilize the results of [48], [49] and have that under mild conditions, the subspace V (d) m converges to V (d) with probability 1 as m → ∞. VI. E XPERIMENTAL A NALYSIS In this section we present the simulated and experimental analysis of the proposed PN compensation scheme in subsection III-A. This section is divided into three parts: Section VI-A covers simulation tests of the PN compensation scheme with no tracking. Section VI-B is dedicated to the analysis of the compensation scheme with no tracking performed on the measured PN. Last, Section VI-C is dedicated to the analysis of the tracking algorithm that was proposed in Section V. This analysis is carried out on the measured PN of Section VI-B. A detailed description of the measurements that were used to produce the figure in this sections is included in [50]. The SNR was chosen such that the phase noise is the dominant noise, and limits the reception of 256 QAM. Still, a noise figure of 7 dB is quite high and even with this strong noise the phase noise is still dominant. Additionally, PN compensation complicates the design of the receiver, therefore 8 ϕ1 .. . PAST algorithm Table I .. . ϕN V̂ 1 ... ... V̂ d V̂ 1 ... V̂11 pilot 1 γ̂1 null tone 1 .. . LS (TLS) solver ... V̂1N ⊗ .. . pilot kp V̂ d ... V̂d1 V̂dN ⊗ .. . γ̂d ⊗ null tone kn ⊗ P z1 P ⊗ ⊗ zN y1 yN ... FFT ... To FEQ Fig. 2: Phase noise compensation process utilizing the PAST algorithm. Channels frequency response it is the most cost effective when the PN is the dominant noise which typically occurs when transmitting high order constellations (i.e., high SNR) together with multi-antenna receiver. We now present a simulated experiment testing the performance of the algorithm on real WLAN channels. This set of simulations assumes that the actual estimate of the eigenvectors of Rψψ is given. An example of a measured channel is depicted in Figure 3. The transmitted power was 10 dBm, the assumed noise figure was 7 dB, the thermal noise was −174 dBm/Hz and the bandwidth was 20 MHz. The phase noise process was generated using a second order Chebychev type I and a PSD of the phase noise process is depicted in Figure 4. The standard deviation of the phase noise was σφ = 3◦ . At each time we used two receive channels and tone numbers 1−7, 21, 43, 58−64 at each of the two receivers for pilot symbols np = 16. The OFDM had 64 tones; i.e., N = 64 and the modulation was 256 QAM. Figure 5 depicts the dependence of the residual Error Vector Magnitude (EVM) on the number of basis elements using KL basis vectors and DFT basis vectors which the algorithm that was presented in [30]. The KL eigenvectors were computed based on 10 OFDM symbols. We averaged the EVM over 300 measured pairs of channels (1 × 2 systems, i.e., one transmitting antenna and two receiving antennas). For each channel we averaged the EVM over 100 OFDM symbols. Note that for a large number of basis elements, the EVM may be larger due to the insufficient number of equations when WLAN channel 1 WLAN channel 2 −70 Amplitude [dB] A. Simulation tests −65 −75 −80 −85 −90 −95 −100 0 2 4 6 8 10 12 14 16 18 20 Freq [MHz] Fig. 3: Two 20 MHz receive channels. more basis elements are used than pilot symbols. The large gain of our compensation scheme compared to the DFT basis presented in [30] is clearly visible. Furthermore, the maximal tolerated EVM for 256 QAM for 5G is -32dB for a SISO transmission. The typical values for EVM are between -40dB and -35dB for MIMO channels. As can be seen, the method of [30] narrowly meets the requirements while our compensation scheme is well in the desired region. To obtain performance under good phase noise and channel conditions we repeated the experiment with a simulated phase noise with standard deviation of σφ = 0.7◦ and with the channel attenuation reduced by 5dB compared to Figure 3. 9 Simulated phase noise PSD 0 −20 −20 Power Spectrum Magnitude [dB] Power Spectrum Magnitude [dB] Simulated phase noise PSD 0 −40 −60 −80 −100 −120 −140 −160 −40 −60 −80 −100 −120 −140 −160 0 2 4 6 8 10 12 14 16 18 −180 20 0 2 4 6 Frequency [MHz] Fig. 4: Simulated phase noise process PSD. σφ = 3◦ . 12 14 16 18 20 EVM vs. estimation order −25 KL based compensation DFT based compensation [30] −15 10 Fig. 6: Simulated phase noise PSD. σφ = 0.7◦ . EVM vs. estimation order −10 8 Frequency [MHz] KL based compensation DFT based compensation [30] −30 −35 −25 EVM [dB] EVM [dB] −20 −30 −35 −40 −45 −40 −50 −45 −50 0 2 4 6 8 10 12 14 16 18 20 No. of basis elements Fig. 5: EVM vs. number of basis elements for DFT (which is the compensation scheme in [30]) and KL based methods. Phase noise 3◦ . 0 - No compensation. 1 - CPE compensation. σφ = 3◦ The results are presented in Figures 6-7. Even in this case there was a substantial gain achieved by cancelling the phase noise although the phase noise performance was reasonable even with CPE compensation alone. We also simulated the performance of our phase noise compensation scheme and that of Casas et al. [30], as a function of the of the standard deviation of the phase noise. That is, we chose a fixed number of 8 basis elements, and simulated the EVM as a function of the phase noise standard deviation. The results of this simulation are depicted in Figure 8. It is clear that our scheme outperformed the scheme presented in [30]. Specifically, using DFT basis, a phase noise with standard deviation of 3◦ is the maximal phase noise which can be tolerated for a constellation of 256QAM, whereas our scheme can tolerate up to 8◦ standard deviation phase noise. As before we used in this simulation 300 pairs of measured channels. For each pair channel we used 100 OFDM symbols; the phase noise process was produced for each of these channels as −55 0 2 4 6 8 10 12 14 16 18 20 No. of basis elements Fig. 7: EVM vs. number of basis elements for DFT (see [30]) and KL based methods. 0 - No compensation. 1 - CPE compensation. σφ = 0.7◦ described at the beginning of Section VI-A. In addition, we performed a coded simulation using a convolutional code with rate 12 , interleaver and soft-decision Viterbi decoding; its results are depicted in Figure 9. As before we used in this simulation 300 pairs of measured channels. For each pair channel we used 100 OFDM symbols; in total we used 7.68 × 106 uncoded bits. The phase noise process was produced for each of these channels as described at the beginning of Section VI-A. As can be seen from Figure 9 phase noise compensation is essential for correct decoding at the receiver. Further, the KL compensation scheme continued to outperform the DFT compensation scheme with bit error rate (BER) of less than 10−6 . The last simulation of this section depicts the performance of the phase noise compensation scheme for multi user MIMO system (see Section IV-B) with two single antenna transmitters and two antenna receiver (2 × 2 system); Figure 10 depicts an example of the channels of a 2×2 communication system. The transmitted power of each transmitting antenna was 10 dBm. 10 EVM vs. phase noise standard deviation Channels frequency response −10 −65 −15 −70 Amplitude [dB] EVM [dB] −20 −25 −30 −35 −75 −80 −85 −90 −40 −45 KL based compensation DFT based compensation [30] −50 1 2 3 4 5 6 7 8 9 10 11 −100 12 2 4 6 8 10 channel channel channel channel 12 14 11 22 12 21 16 18 20 Freq [MHz] Fig. 8: EVM vs. phase noise standard deviation. 8 basis elements. Fig. 10: Four 20 MHz receive channels of 2×2 communication system. EVM vs. receiver phase noise standard deviation◦ BER vs. phase noise standard deviationcirc −10 KL based compensation DFT based compensation [30] No PN compensation 10−1 0 ◦ Standard deviation 100 WLAN WLAN WLAN WLAN −95 −15 −20 EVM [dB] BER 10−2 10−3 10−4 −25 −30 −35 −40 10−5 10−6 KL based compensation DFT based compensation [30] KL based compensation - TX PN DFT based compensation - TX PN [30] −45 1 1.5 2 2.5 3 3.5 4 4.5 5 5.5 6 ◦ Standard deviation −50 1 1.5 2 2.5 3 3.5 4 4.5 5 5.5 6 Receiver’s phase noise standard deviation◦ Fig. 9: BER vs. phase noise standard deviation. 8 basis elements. Fig. 11: EVM vs. phase noise standard deviation (at the receiver). 8 basis elements. For each of the transmitting antennas we generated a phase noise process with standard deviation of 1◦ which represents the residual phase noise process at the transmitter. The two phase noise processes at the transmitters were generated independently, and were also independent of the receiver phase noise process. We compared the performance of the system with and without transmitter phase noise. The results of the simulation are presented in Figure 11, the receiver phase noise standard deviation was varied from 1◦ to 6◦ . We can clearly see from Figure 11 that when the receiver phase noise standard deviation is greater than 1◦ , the performance of the phase noise compensation schemes with or without transmitter phase noise are very close to one another. Clearly, the method presented in this paper does not break down in the presence of independent residual transmitter phase noise. Note that as before we used in this simulation 300 pairs of measured channels. For each pair channel we used 100 OFDM symbols; the receiver phase noise process was produced for each of these channels as described at the beginning of Section VI-A. B. Measured phase noise analysis In the second set of simulated experiments we used measured phase noise samples. The measured signal comprised a sine wave at 5 MHz, sampled at 40 MHz and then filtered to remove the original sine wave of 5 MHz, thus only the phase noise remained. The PSD of the phase noise is depicted in Figure 12. We repeated the experiment above with samples of the measured phase noise. The results are depicted in Figure 13. There was a clear gain of 5dB for 5 basis elements and above. C. Simulations of the tracking algorithm for measured phase noise In this section we analyze the tracking capability of the PAST algorithm combined with decision direction. We used 3 We note that the two spikes in the PSD of the measured phase noise process are due to residual of the sine and its harmony of the sine wave at 5 MHz. 11 EVM with phase noise compensation and tracking −28 −20 −30 Smoothed EVM (64 symbols) [dB] Power Spectrum Magnitude [dB] Measured phase noise PSD 0 −40 −60 −80 −100 −120 −140 −160 −180 −200 0 2 4 6 8 10 12 14 16 18 −32 −34 −36 −38 −40 −42 −44 −48 20 CPE compensation DFT 4 basis elements [30] Tracking using PAST −46 0 100 200 EVM vs. estimation order Smoothed EVM (64 symbols) [dB] EVM [dB] −25 −30 −35 −40 −45 0 1 2 3 4 5 6 600 700 800 900 1,000 −30 −20 −50 500 EVM with phase noise compensation and tracking KL based compensation DFT based compensation [30] −15 400 Fig. 14: Tracking performance of PAST. σφ = 3.5◦ , residual carrier 1 ppm, 4 basis vectors. . Fig. 12: PSD of measured phase noise.3 −10 300 OFDM symbol no. Frequency [MHz] 7 8 9 10 No. of basis elements Fig. 13: EVM vs. number of basis elements for DFT and KL based methods. No. of basis element: 0 - No compensation. 1 - CPE compensation. Measured phase noise. the same system as in previous sections with the measured phased noise (scaled to 3.5◦ total phase noise) and 4 basis elements. However, we also added a 1ppm residual carrier to model carrier offset for a carrier frequency of 5 GHz. It is clear (see Figure 14) that our tracking scheme yields better phase and residual carrier compensation of 5dB, compared to the other methods, i.e., the DFT of [30] and a simple CPE compensation. To test the stationarity of the basis elements after convergence was achieved; we repeated the experiment when no residual carrier was present and limited the training phase to 300 symbols. This is important for the quality of the initial basis, based on previous estimates. We performed two simulations whose results appear in Figure 15 and Figure 16. Figure 15 depicts the results of the simulation for the two receive channels that are depicted in Figure 3. Figure 16 depicts the results of the simulation averaged over 300 pairs of receive channels. It is clear that the basis vectors were relatively stationary since the EVM was fixed for the duration −32 −34 −36 −38 −40 −42 −44 −46 CPE compensation DFT 4 basis elements [30] Tracking using PAST −48 −50 0 500 1,000 1,500 2,000 2,500 3,000 OFDM symbol no. Fig. 15: Limited training of 300 symbols. No residual carrier, σφ = 3.5◦ and β = 0.9, one pair of receive channels . of the next 2700 symbols. Further, the estimates were quite good and the mean EVM remained constant. This suggests that our stationarity assumption was sufficiently good. Note that both common phase removal and DFT based compensation were not as good and led to a 2 − 4dB loss. To depict the advantages of tracking we performed the following simulation over the measured channels, we set the residual carrier to be 5 ppm and simulated phase noise of 3.5◦ , we averaged the results over 300 pairs of channels. We stopped the tracking of the limited tracking after 250 OFDM symbols and performed the tracking for the “Tracking using PAST” line during the whole simulation. As can be seen from Figure 17, tracking dramatically improves the behavior of the phase noise compensation scheme presented in this paper. VII. C ONCLUSION We presented a novel phase noise estimation technique. This technique leads to considerable reduction in phase noise and in 12 EVM with phase noise compensation and tracking −30 Smoothed EVM (64 symbols) [dB] −32 −34 −36 −38 −40 −42 −44 −46 CPE compensation DFT 4 basis elements [30] Tracking using PAST −48 −50 0 500 1,000 1,500 2,000 2,500 3,000 OFDM symbol no. Fig. 16: Limited training of 300 symbols. No residual carrier, σφ = 3.5◦ and β = 0.9, averaged over 300 pairs of receive channels . EVM with phase noise compensation and tracking Smoothed EVM (64 symbols) [dB] −15 −20 −25 −30 −35 CPE compensation DFT 4 basis elements [30] Limited Tracking using PAST Tracking using PAST −40 −45 0 100 200 300 400 500 600 700 800 900 1,000 OFDM symbol no. Fig. 17: Comparison of the performance of phase noise compensation schemes with or without tracking. particular works very well for strong phase noise. The specific basis proposed in this paper (using the eigenvectors of the noise correlation process) accounts primarily for its success compared to previous work. We identified several possible extensions of the method to multi user MIMO systems as well as online calibration and exploitation of null tones. Finally, we tested the possibility of decision directed tracking of the basis vectors. The tracking results using measured phase noise and residual carrier offset suggest that our stationarity assumption also holds. ACKNOWLEDGEMENT The authors would like to thank the anonymous reviewers and the associate editor for their helpful and constructive comments which helped improve the content of this paper. R EFERENCES [1] A. Leshem, Patent US 7 609 789 B2, October, 2009. [2] 3GPP, “3GPP Home Page.” [Online]. Available: http://www.3gpp.org/ technologies/keywords-acronyms/98-lte [3] IEEE, “IEEE Standards Association.” [Online]. Available: http: //standards.ieee.org/about/get/802/802.11.html [4] ——, “IEEE Standards Association.” [Online]. Available: https: //standards.ieee.org/about/get/802/802.16.html [5] P. Banelli, S. Buzzi, G. Colavolpe, A. Modenini, F. Rusek, and A. Ugolini, “Modulation formats and waveforms for 5G networks: Who will be the heir of OFDM?: An overview of alternative modulation schemes for improved spectral efficiency,” IEEE Signal Processing Magazine, vol. 31, no. 6, pp. 80–93, Nov 2014. [6] F. Schaich and T. Wild, “Waveform contenders for 5G - OFDM vs. FBMC vs. UFMC,” in Communications, Control and Signal Processing (ISCCSP), 2014 6th International Symposium on, May 2014, pp. 457– 460. [7] F. Schaich, T. Wild, and Y. Chen, “Waveform contenders for 5G suitability for short packet and low latency transmissions,” in 2014 IEEE 79th Vehicular Technology Conference (VTC Spring), May 2014, pp. 1– 5. [8] C. Ibars, U. Kumar, H. Niu, H. Jung, and S. Pawar, “A comparison of waveform candidates for 5G millimeter wave systems,” in 2015 49th Asilomar Conference on Signals, Systems and Computers, Nov 2015, pp. 1747–1751. [9] L. Tomba, “On the effect of wiener phase noise in OFDM systems,” IEEE Transactions on Communications, vol. 46, no. 5, pp. 580–583, May 1998. [10] A. G. Armada and M. Calvo, “Phase noise and sub-carrier spacing effects on the performance of an OFDM communication system,” IEEE Communications Letters, vol. 2, no. 1, pp. 11–13, Jan 1998. [11] L. Piazzo and P. Mandarini, “Analysis of phase noise effects in OFDM modems,” IEEE Transactions on Communications, vol. 50, no. 10, pp. 1696–1705, Oct 2002. [12] A. G. Armada, “Understanding the effects of phase noise in orthogonal frequency division multiplexing (OFDM),” IEEE Transactions on Broadcasting, vol. 47, no. 2, pp. 153–159, Jun 2001. [13] D. Petrovic, W. Rave, and G. Fettweis, “Effects of phase noise on OFDM systems with and without PLL: Characterization and compensation,” IEEE Transactions on Communications, vol. 55, no. 8, pp. 1607–1616, Aug 2007. [14] L. Barletta, M. Magarini, and A. Spalvieri, “The information rate transferred through the discrete-time wiener’s phase noise channel,” Journal of Lightwave Technology, vol. 30, no. 10, pp. 1480–1486, May 2012. [15] S. Wu and Y. Bar-Ness, “A phase noise suppression algorithm for OFDM-based WLANs,” IEEE Communications Letters, vol. 6, no. 12, pp. 535–537, Dec 2002. [16] ——, “OFDM systems in the presence of phase noise: consequences and solutions,” IEEE Transactions on Communications, vol. 52, no. 11, pp. 1988–1996, Nov 2004. [17] S. Wu, P. Liu, and Y. Bar-Ness, “Phase noise estimation and mitigation for OFDM systems,” IEEE Transactions on Wireless Communications, vol. 5, no. 12, pp. 3616–3625, December 2006. [18] K. Nikitopoulos, S. Stefanatos, and A. K. Katsaggelos, “Decision-aided compensation of severe phase-impairment-induced inter-carrier interference in frequency-selective OFDM,” IEEE Transactions on Wireless Communications, vol. 8, no. 4, pp. 1614–1619, April 2009. [19] Y. Gong and X. Hong, “A new algorithm for OFDM joint data detection and phase noise cancellation,” in 2008 IEEE International Conference on Communications, May 2008, pp. 636–640. [20] D. D. Lin and T. J. Lim, “The variational inference approach to joint data detection and phase noise estimation in OFDM,” IEEE Transactions on Signal Processing, vol. 55, no. 5, pp. 1862–1874, May 2007. [21] S. Suyama, H. Suzuki, K. Fukawa, and J. Izumi, “Iterative receiver employing phase noise compensation and channel estimation for millimeterwave OFDM systems,” IEEE Journal on Selected Areas in Communications, vol. 27, no. 8, pp. 1358–1366, October 2009. [22] F. Munier, T. Eriksson, and A. Svensson, “An ICI reduction scheme for OFDM system with phase noise over fading channels,” IEEE Transactions on Communications, vol. 56, no. 7, pp. 1119–1126, July 2008. [23] F. Septier, Y. Delignon, A. Menhaj-Rivenq, and C. Garnier, “Monte carlo methods for channel, phase noise, and frequency offset estimation with unknown noise variances in OFDM systems,” IEEE Transactions on Signal Processing, vol. 56, no. 8, pp. 3613–3626, Aug 2008. [24] J. Tao, J. Wu, and C. Xiao, “Estimation of channel transfer function and carrier frequency offset for OFDM systems with phase noise,” IEEE 13 [25] [26] [27] [28] [29] [30] [31] [32] [33] [34] [35] [36] [37] [38] [39] [40] [41] [42] [43] [44] [45] Transactions on Vehicular Technology, vol. 58, no. 8, pp. 4380–4387, Oct 2009. D. D. Lin, R. A. Pacheco, T. J. Lim, and D. Hatzinakos, “Joint estimation of channel response, frequency offset, and phase noise in OFDM,” IEEE Transactions on Signal Processing, vol. 54, no. 9, pp. 3542–3554, Sept 2006. H. Huang, W. G. J. Wang, and J. He, “Phase noise and frequency offset compensation in high frequency MIMO-OFDM system,” in 2015 IEEE International Conference on Communications (ICC), June 2015, pp. 1280–1285. Q. Zou, A. Tarighat, and A. H. Sayed, “Compensation of phase noise in OFDM wireless systems,” IEEE Transactions on Signal Processing, vol. 55, no. 11, pp. 5407–5424, Nov 2007. O. H. Salim, A. A. Nasir, H. Mehrpouyan, W. Xiang, S. Durrani, and R. A. Kennedy, “Channel, phase noise, and frequency offset in OFDM systems: Joint estimation, data detection, and hybrid Cramér-Rao lower bound,” IEEE Transactions on Communications, vol. 62, no. 9, pp. 3311–3325, Sept 2014. R. Wang, H. Mehrpouyan, M. Tao, and Y. Hua, “Channel estimation, carrier recovery, and data detection in the presence of phase noise in OFDM relay systems,” IEEE Transactions on Wireless Communications, vol. 15, no. 2, pp. 1186–1205, Feb 2016. R. Casas, S. Biracree, and A. Youtz, “Time domain phase noise correction for OFDM signals,” IEEE trans. on Broadcasting, vol. 48, no. 3, pp. 230–236, September 2002. F. Rusek, D. Persson, B. K. Lau, E. G. Larsson, T. L. Marzetta, O. Edfors, and F. Tufvesson, “Scaling up MIMO: Opportunities and challenges with very large arrays,” IEEE Signal Processing Magazine, vol. 30, no. 1, pp. 40–60, Jan 2013. J. Hoydis, S. ten Brink, and M. Debbah, “Massive MIMO in the UL/DL of cellular networks: How many antennas do we need?” IEEE Journal on Selected Areas in Communications, vol. 31, no. 2, pp. 160–171, February 2013. E. G. Larsson, O. Edfors, F. Tufvesson, and T. L. Marzetta, “Massive MIMO for next generation wireless systems,” IEEE Communications Magazine, vol. 52, no. 2, pp. 186–195, February 2014. A. Sahai, G. Patel, C. Dick, and A. Sabharwal, “Understanding the impact of phase noise on active cancellation in wireless full-duplex,” in 2012 Conference Record of the Forty Sixth Asilomar Conference on Signals, Systems and Computers (ASILOMAR), 2012, pp. 29–33. L. Samara, M. Mokhtar, . zdemir, R. Hamila, and T. Khattab, “Residual self-interference analysis for full-duplex OFDM transceivers under phase noise and I/Q imbalance,” IEEE Communications Letters, vol. 21, no. 2, pp. 314–317, Feb 2017. X. Quan, Y. Liu, S. Shao, C. Huang, and Y. Tang, “Impacts of phase noise on digital self-interference cancellation in full-duplex communications,” IEEE Transactions on Signal Processing, vol. 65, no. 7, pp. 1881–1893, April 2017. R. C. Daniels and R. W. H. Jr., “60 GHz wireless communications: emerging requirements and design recommendations,” IEEE Vehicular Technology Magazine, vol. 2, no. 3, pp. 41–50, Sept 2007. P. Smulders, “Exploiting the 60 GHz band for local wireless multimedia access: prospects and future directions,” IEEE Communications Magazine, vol. 40, no. 1, pp. 140–147, Jan 2002. X. Yi, W. Shieh, and Y. Ma, “Phase noise effects on high spectral efficiency coherent optical OFDM transmission,” Journal of Lightwave Technology, vol. 26, no. 10, pp. 1309–1316, May 2008. I. Markovsky and S. V. Huffel, “Overview of total least-squares methods,” Signal Processing, vol. 87, no. 10, pp. 2283 – 2302, 2007, special Section: Total Least Squares and Errors-in-Variables Modeling. B. Yang, “Projection approximation subspace tracking,” IEEE trans. on Signal processing, vol. 49, no. 1, pp. 95–107, January 1995. R. D. DeGroat and E. M. Dowling, “The data least squares problem and channel equalization,” IEEE trans. on Signal processing, vol. 41, no. 1, pp. 407–411, January 1993. W. Peng, Q. Gao, X. Zhang, S. Zhou, and X. Xu, “Analysis of transmitter phase noise in ofdm system and its mitigation,” in VTC Spring 2009 IEEE 69th Vehicular Technology Conference, April 2009, pp. 1–5. Z. Xu, G. Ren, and Y. Zhang, “Phase noise pre-correction scheme for SC-FDMA signals in LTE-uplink,” Chinese Journal of Electronics, vol. 26, no. 3, pp. 634–639, 2017. M. R. Khanzadi, G. Durisi, and T. Eriksson, “Capacity of SIMO and MISO phase-noise channels with common/separate oscillators,” IEEE Transactions on Communications, vol. 63, no. 9, pp. 3218–3231, Sept 2015. [46] P. Comon and G. H. Golub, “Tracking a few extreme singular values and vectors in signal processing,” Proceedings of the IEEE, vol. 78, no. 8, pp. 1327–1343, Aug 1990. [47] B. Yang and F. Gersemsky, “Asymptotic distribution of recursive subspace estimators,” in 1996 IEEE International Conference on Acoustics, Speech, and Signal Processing Conference Proceedings, vol. 5, May 1996, pp. 2856–2859. [48] B. Yang, “Convergence analysis of the subspace tracking algorithms PAST and PASTd,” in 1996 IEEE International Conference on Acoustics, Speech, and Signal Processing Conference Proceedings, vol. 3, May 1996, pp. 1759–1762. [49] ——, “Asymptotic convergence analysis of the projection approximation subspace tracking algorithms,” Signal Processing, vol. 50, no. 1-2, pp. 123–136, April 1996. [50] A. Leshem, N. Tal, L. Kravitz, and E. Gerson, “Super-resolution technique for estimating MIMO WLAN channels with application to 5 GHz channel measurements,” in 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. 4, May 2004, pp. IV–945–948. Amir Leshem (M’98-SM’06) received the B.Sc. degree (cum laude) in mathematics and physics and the M.Sc. (cum laude) and Ph.D. degrees in mathematics from the Hebrew University, Jerusalem, Israel, in 1986, 1990, and 1998, respectively. He is a Professor and one of the founders of the Faculty of Engineering at Bar-Ilan University, Ramat-Gan, Israel, where he heads the Communications track. He held visiting positions with Delft University, Delft, The Netherlands, and Stanford University, Stanford, CA, USA, in 2008 to 2009. From 2000 to 2003, he was Director of Advanced Technologies with Metalink Broadband, Yakum, Israel, where he was responsible for research and development of new DSL and wireless MIMO modem technologies and served as a member of ITU-T SG15, ETSI TM06, NIPP-NAI, and IEEE 802.3 and 802.11. From 2000 to 2002, he was also a Visiting Researcher with Delft University of Technology. From 2003 to 2005, he was the Technical Manager of the U-BROAD consortium developing technologies to provide 100 Mb/s and beyond over copper lines. From 1998 to 2000, he was with the Faculty of Information Technology and Systems, Delft University of Technology, as a Postdoctoral Fellow working on algorithms for the reduction of terrestrial electromagnetic interference in radio-astronomical radiotelescope antenna arrays and signal processing for communication. His main research interests include multichannel wireless and wireline communication, applications of game theory to dynamic and adaptive spectrum management of communication networks, software defined networks, array and statistical signal processing with applications to multiple-element sensor arrays and networks, wireless communications, radio-astronomical imaging and brain research, Information processing in social networks, set theory, logic, and foundations of mathematics. Prof. Leshem served as an Associate Editor for the IEEE TRANSACTIONS ON SIGNAL PROCESSING from 2008 to 2011 and as a Guest Editor for several special issues of the IEEE Signal Processing Magazine and the IIEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING. Since 2010, he has been a member of the IEEE technical committee on Signal Processing for Communications and Networking. Michal Yemini received the B.Sc. in computer engineering from the Technion-Israel Institute of Technology, Haifa, Israel, in 2011. She is currently completing her Ph.D. degree in the joint M.Sc.-Ph.D. program in the Faculty of Engineering, Bar-Ilan University, Ramat-Gan, Israel. Her main research interests include information theory, connectivity of large heterogeneous networks, dynamic spectrum allocation and resource management for wireless networks.
7cs.IT
arXiv:0907.0749v1 [cs.PL] 4 Jul 2009 Function Interface Models for Hardware Compilation: Types, Signatures, Protocols Dan R. Ghica University of Birmingham [email protected] February 24, 2013 Abstract The problem of synthesis of gate-level descriptions of digital circuits from behavioural specifications written in higher-level programming languages (hardware compilation) has been studied for a long time yet a definitive solution has not been forthcoming. The argument of this essay is mainly methodological, bringing a perspective that is informed by recent developments in programming-language theory. We argue that one of the major obstacles in the way of hardware compilation becoming a useful and mature technology is the lack of a well defined function interface model, i.e. a canonical way in which functions communicate with arguments. We discuss the consequences of this problem and propose a solution based on new developments in programming language theory. We conclude by presenting a prototype implementation and some examples illustrating our principles. 1 Introduction The problem of hardware compilation turned out to be surprisingly difficult. Although the pioneering work of van Berkel [31], Page, Luk and the Oxford hardware compilation group [23, 18, 13] yielded promising initial results, more than a decade later this technology has yet to enter the mainstream of digital design. Several C-to-gates hardware compilers, such as Roccc [7], Cash [6] and HandelC [8] have been developed, but their take-up was limited. Recently, Mentor has introduced its own C-to-gates compiler, Catapult-C1 but it is too early to evaluate its impact. In this paper, when we refer to existing hardware compilers we mean these above. We will not refer to design flows based on SystemC2 or CoWare3 , hardware compilers based on process calculi (e.g. [33, 1 http://www.mentor.com/products/c-based_design/catapult_c_synthesis 2 http://www.systemc.org 3 http://www.coware.com 1 30]), or higher-order structural languages such as Lava [5]; these are interesting and useful, but conceptually different ways of approaching VLSI design. So, why did hardware compilers not meet expectations? Part of the answer has to do with performance, as higher-level behavioural design is unlikely to be as efficient as structural or low-level, hand-crafted designs. However, the economics of reconfigurable architectures such as fieldprogrammable gate arrays (FPGAs) or other complex programmable logic devices (CPLDs) are such that the design costs can often become the overriding concern, allowing for weaker performance as a trade-off, especially since their competition is often not custom-design application-specific circuits (ASIC) but (embedded) software. This is a well known consideration, so hardware compilers often target reconfigurable architectures. Another performance-related issue is that of concurrency; the performance advantage of hardware comes from its potential for massive parallelism, rather than high clock rates. Conventional programming languages that can serve as candidates for compilation into hardware (C, Java, etc.) have either no built-in support for it or offer unsuitable concurrency models such as threads or processes. This is a serious dilemma, because a concurrency model needs to be both low-level enough to reflect the underlying capabilities of the platform (“closeto-metal ”) and thus give predictable performance, but also high-level enough to unburden the programmer from detailed management and book-keeping of resources. An example of a successful such trade-off is Nvidia’s CUDA platform4 . However, the importance of this argument must not be overstated. A recent study showed that a large class of non-trivial structural designs can be recreated automatically by a hardware compiler from behavioural specifications, using standard optimisation techniques such a parallelisation [27]. While the arguments above carry some strength and reflect the conventional wisdom on the topic, we will argue that we must look deeper in order to discover the key problems that beset hardware compilation, and to find ways to address them. In this essay we propose that one such key problem is the lack of canonical function interface models (FIM). We will briefly examine their traditional role in software compilation and operating systems, and explain the possible reasons for their absence in hardware compilers. We also propose a simple but nontrivial FIM, illustrating it with several typical examples and explain how such FIMs can be canonically designed. § In modern programming-language theory the notion of type is paramount. Beyond just classifying data in various categories such as integers, floating-point, strings, etc., types fill a much more fundamental role. It is difficult to give a better summary that does justice to the importance of types than Robert Harper’s5 : 4 http://www.nvidia.com/cuda 5 http://www.cs.cmu.edu/ ~rwh/research.htm 2 Over the last two decades type theory has emerged as the central organizing framework for the design and implementation of programming languages. Type theory (the study of type systems) provides the theoretical foundation for safe component integration. In the words of John Reynolds, “a type system is a syntactic discipline for enforcing levels of abstraction”. By syntactic we mean that the type system is part of the program, rather than purely in the mind of the implementer. By discipline we mean that type restrictions are enforced; ill-typed combinations are ruled out by the type system. By levels of abstraction we mean the clean separation between conceptually distinct data objects that may, in a particular program or compiler, have the same or similar representations. Implicit in this definition is an important principle: the power of a type system lies as much in what it precludes as what it allows. The most powerful type system of all is the one that rules out all programs. However, such a type system, while surely preventing safety violations, is hardly very useful. The goal of type system design is to increase expressiveness by admitting useful programs, but without compromising safety. We will see in the following how type systems are indeed essential in hardware compilation of programming languages because of the special challenge of “safe component integration” in hardware, as opposed to software. 2 Function interface models Functions and related concepts (procedures, methods, subroutines, etc.) are the main mechanism for implementing abstraction in a programming language. The importance of using functional abstractions lies at the core of any good programming methodology and its benefits have long been established. Functions play a fundamental role in the operation of a conventional stored-program computer and they were in fact a feature of the first such computer, the EDSAC [34]. Except for very early models such as the HP 2100, microprocessors always supported function call in their instruction set directly (e.g. Intel’s x86) or at least provided instructions for stack management, meant mainly to implement function calls (RISC architectures). All three initial major modern programming languages (Fortran, Lisp, Cobol) provided support for functions, albeit sometimes in a clumsy or limited way. Of the three, the most advanced support for functions is found in Lisp. Not only does it support higher-order functions (functions that take functions as arguments) but it also introduced the new concept of a Foreign Function Interface: a way for a program written in Lisp to call functions written in another programming language. This idea was adopted by all subsequent programming languages that had mature compilers, under one name or another6 . A special 6 In Java it is called the Java Native Interface (JNI). 3 and privileged position is that of the C programming language; because of the close relationship between C and the operating system its own calling convention is usually implemented directly by the OS and is called the Application binary interface (ABI). One of the decisions of the C and Unix designers with the farthest-reaching consequences was to make the details of the calling convention public [16]. The positive effects of this decision cannot be overstated, as it massively improved the interoperability of applications by opening the OS functionality to other programming languages and by facilitating support for stand-alone languageindependent libraries. In this paper, to avoid ambiguity, we introduce the terminology of function interface model (FIM) to encompass the closely-related issues of the FFI and ABI. 2.1 FIMs and hardware compilation It is taken as a given that stored-program computers must offer well-defined FIMs. It is inconceivable to design a modern operating system or compiler if this fundamental requirement is not met. On the other hand, in the world of hardware the concept of a FIM simply did not arise. The net-lists (boxes and wires) that are the underlying computational models of hardware languages are not structured in a way that suggests any obvious native FIM. The abstraction mechanism common in hardware languages such as Verilog or VHDL, the module 7 , is a form of placing a design inside a conceptual box with a specified interface. This does serve the purpose of hiding the implementation details of the module from its user, which is one of the main advantages of abstraction. However, a module is a less powerful than functional abstraction as found in programming languages in several significant ways: 1. Modules are always first order. A module can only take data as input and not other modules; in contrast, functions can take other functions as input. 2. Modules must be explicitly instantiated. The hardware designer must manually keep track of the names of each module occurrence and its ports, which must be connected explicitly by wires to other elements of the design. In contrast, the run-time management of various instances of functions is managed by the OS (using activation records) in a way that is transparent to the programmer. 3. Sharing a module from various points in a design is not supported by hardware design languages. The designer must design ad hoc circuitry, such as multiplexers or de-multiplexers and ad hoc protocols to achieve this. The lack of language support for sharing makes this a delicate and error-prone task. 7 Not to be confused with “modules” as encountered in programming languages such as ML. 4 These limitations may seem inconsequential, and in a certain sense they are so. They are not limitations on the expressiveness of hardware design languages or the performance of the circuits synthesised. However, the impact of these limitations becomes more serious as designs become more complex. For the design of, say, an adder the limitations above are irrelevant. But if the design is an implementation of a complex algorithm that uses many instances of the same kind of modules, interacting in non-trivial ways the burden of micro-managing modules and ports and the inability to use generic algorithms such as mapreduce, which are inherently higher-order, can become extremely taxing. The burden of managing sharing is also substantial, and the conventional solutions to this problem, such as bus or network-on-chip (NOC) architectures, are complex, heavy-duty and not provided with language-level support. Generally, existent hardware compilers are not built around well-defined FIMs. What would be the unthinkable in the world of software compilation is the norm in the world of hardware compilation. But this is not entirely surprising, considering the fact that hardware does not have a “native” FIM to offer. Its absence damages the usability and the performance of the compilers, imposes restrictions on interoperability and prevents library support. Let us briefly consider how functions are managed in the hardware compilers mentioned earlier. Roccc only supports functions via inlining, i.e. the textual substitution of the body of the function at the point of call. This on-the-cheap solution to the problem of functional abstraction has a serious problem: it makes sharing of resources impossible. Inlining is a compiler optimisation that targeted to a conventional computer is sometimes justified, trading off better execution time for increased program size. However, from a hardware compilation perspective it is inefficient as it amounts to the re-instantiating the module implementing the function every time it is called. The example that illustrates the failure of this approach best is compilation of floatingpoint programs: the circuits implementing floating-point operations are expensive and the requirement to re-instantiate multiplication or division every time they are used cannot be satisfied. The hardware-compilation of floating-point programs is impossible if these elementary circuits cannot be shared in the program. Cash proposes a token-based mechanism that allows the implementation of a function to be shared, therefore avoiding the need for re-instantiation. The token-based mechanism is powerful enough to support recursive functions, which is expressive but inefficient. This is a promising approach, and the token-based mechanism represents a genuine FIM. The problem with this approach, inspired by tagged-token data-flow [3], is that it is unnecessarily heavy-duty. The management of the tokens require sophisticated circuitry and access to an external RAM for each function call. This is likely to be expensive in both time and foot-print, and frequent RAM access represents a bottleneck for concurrency. A beta version of the compiler has been announced but is not available yet, so we can only speculate regarding the 5 performance penalty that must be paid in overheads for this token-based mechanism. Handel C seems to provide static support for functions. The details of the FIM are not disclosed by Celoxica but evidence can be seen in the generated HDL. Unfortunately, the simultaneous support for sharing and concurrency in the absence of a type system that would control such behaviour leads to some surprising race conditions. For example the execution of the concurrent statement par {x=f(1); y=f(0);} always stores the same values in registers x,y, regardless of what function f() computes. The reason is that the simple-minded run-time sharing of the implementation for f() causes a race condition on its shared inputs. Having a race condition even in the absence of side-effects is too surprising for a conventional programmer and it must be considered a serious defect in the design of the language. It is not a defect in the implementation of the language because the Handel C manual warns that such race conditions may occur. But, concurrent programming, difficult enough as is, becomes almost impossible when confronted with such recondite sources of racing behaviour. Catapult C and a score of other commercial compilers are difficult to asses. The system is a closed one, and Mentor does not publish the details of the support it provides for functions in its technical literature8 . Even if such languages do have internally a well-defined FIM the fact that it is undisclosed still represents a significant barrier to interoperability and run-time support. The closest correspondence to a FIM in hardware is the concept of bus, a mechanism for establishing logical connections between several components using the same set of wires. High-performance bus architectures such as ARM’s AMBA9 or IBM’s CoreConnect10 are marketed as especially relevant for “systemson-chip” (SoC) designs, as a way of managing complexity and reduce design cost and time. The aims of using a bus architecture are similar to those of using FIMs, but the techniques involved are substantially different. Whereas a bus is a global mechanism of communication between components, a FIM is a local mechanism for providing access to a component. Therefore, bus protocols are complex and layered, more similar to network or distributed-communication protocols. They can handle transmission delay, transmission errors and transactions. In comparison, the FIMs assume perfect, instantaneous (synchronous) communication between components. As a result, interfacing components using a bus requires high overhead and is potential bottleneck for parallelism, whereas managing the FIMs requires typically very low overhead and has some support for parallel access. Buses work best at the architectural level, to connect large components over long distances (e.g. across the boundaries of a chip or of a 8 http://www.mentor.com/products/esl/techpubs/ 9 http://www.arm.com/products/solutions/AMBAHomePage.html 10 http://www-306.ibm.com/chips/products/coreconnect/ 6 board) whereas FIMs are meant to handle local connections, with low overhead, low latency (at most one clock cycle in our prototype compiler) and high throughput. A further elaboration of the concept of bus is the so-called “network on chip” architecture, which makes communication between components even more network-like. For complex applications such as SOC it can be a notable improvement in functionality over the simpler bus technology, but at a correspondingly increased cost [17]. 3 The design of a hardware FIM The previous section looked at the state-of-play in hardware compilation. Hopefully the reader will have accepted the basic point that well-defined FIMs are important and useful and it is next to impossible to imagine a mature compiler without them. From here on we will propose a way to derive hardware-friendly FIMs in a canonical way using some recent developments from programming language theory. It is a well-known fact that relying on the primitive concepts of channel, event and communication makes process calculi good intermediate abstractions for hardware, and refining processes into hardware-level representation has been extensively studied [32]. On the other hand, there has been significant research work regarding the encoding of (prototypical) functional programming languages into process calculi [19]. Game Semantics [1, 15] is a process-calculus-like model for programming languages introduced in the mid-90s, which proved to be extremely successful at giving precise interpretations for a variety of languages, thus solving longstanding open problems in the theory of programming languages. Process calculi are versatile but have little structure, whereas game semantics encapsulates the right mathematical structure needed to interpret programming languages. Like process calculi, it is event-oriented and can be refined into hardware. Therefore we propose the following methodological principle: Principle 1 Hardware compilation of programming languages via game semantics is a natural approach based on solid foundational results. In the design of the FIM we will consider the following key topics: the static aspects of the FIM, the dynamic aspects of the FIM, and language-level support for FIM compliance. To give focus to our presentation we will use a particular language as a case-study, with the following defining features: a functional fragment based on the affine lambda calculus, combined with the simple imperative language (locally-scoped block variables, iteration, branching), with boolean variables only11 . This language is a simplified version of Syntactic Control of Interference (SCI), a language which has been studied extensively [24, 25, 21, 20]. 11 Adding other finite data-types such as integers or floating point is conceptually straightforward, but the technical complications would detract from the main point. 7 The primitive types of the language are commands, memory cells and (boolean) expressions: σ ::= com | cell | exp. Additionally, the language contains function types and products: θ ::= σ | θ × θ0 | θ → θ. What is peculiar about the types above is that pairs of terms may share identifiers but functions may not share identifiers with their arguments. Terms have types, described by typing judgments of the form Γ ` M : θ, where Γ = x1 : θ1 , . . . xn : θn is a variable type assignment, M is a term and θ the type of the term. Identity x:θ`x:θ Γ`M :θ Weakening Γ, x : θ0 ` M : θ Γ, x : θ0 ` M : θ → Introduction Γ ` λx.M : θ0 → θ Γ ` F : θ0 → θ ∆ ` M : θ0 → Elimination Γ, ∆ ` F M : θ Γ ` M : θ0 Γ`N :θ × Introduction Γ ` hM, N i : θ0 × θ The language contains the standard constructs for structured state manipulation and control. It is convenient to present these constructs in a functional form: 1 : exp constant 0 : exp constant skip : com no-op asg : cell × exp → com assignment der : cell → exp dereferencing seq : com × com → com sequencing par : com → com → com parallel execution op : exp × exp → exp logical operations if : exp × com × com → com while : exp × com → com branching iteration newvar : (cell → com) → com local variable. Product has syntactic precedence over arrow, which associates to the right. For example, a term with conventional syntax, such as integer x; x = 0; if (x<>y) x=!x; would be written as newvar(λx. 8 seq(asg(x, 0), if(neq, asg(x, not x), skip))). The interesting structural feature of the type system SCI is allowing sharing of identifiers (contraction) in product-formation but disallowing it in function application. Reynolds, the inventor of SCI, was interested in this rule to eliminate covert interference between terms that ostensibly do not share identifiers, hence the name. This type system facilitates reasoning about program correctness and it has eventually led to the development of bunched [22] and separation logic [26]. This restriction can be exploited in several ways, as noticed in the different type signature on sequential (uncurried) versus parallel (curried) composition. This makes terms such as λx.x; x are legal, while λx.x || x is illegal. Another consequence of this restriction is that nested function application as in λf λx.f (f (x)) is also banned. We note that the type-system SCI is an instance of the type-system Syntactic Control of Concurrency (SCC), which has been studied using game semantics [12]12 . 3.1 Static interfaces for FIM in hardware As one would perhaps expect, there will be a strong connection between the interface of a hardware module and the signature of the function or, more generally, the term, it implements. The game-semantic model interprets types as so-called arenas, which are structured sets of basic actions called moves. Definition 1 An arena A is a triple hMA , λA , `A i where • MA is a set of moves, • λA : MA → {O, P } × {Q, A} is a function determining for each m ∈ MA whether it is an Opponent or a Proponent move, and a question or an answer. • `A is a binary relation on MA , called enabling, satisfying – if m `A n for no m then λA (n) = (O, Q), OP – if m `A n then λOP A (m) 6= λA (n), – if m `A n then λQA A (m) = Q. QA We write λOP A , λA for the composite of λA with respectively the first and second projections. If m `A n we say that m enables n. We shall write IA for the set of all moves of A which have no enabler; such moves are called initial. Note that an initial move must be an Opponent question. The arenas for the basic types are as follows: 12 SCI is SCC with all concurrency bounds set to the unit value. 9 • JcomK = h{q, a}, {q 7→ (O, Q), a 7→ (P, A)}, {(q, a)}i. This tells us that a command has two observable actions, corresponding to a request for execution and an acknowledgement that the execution completed successfully. • JexpK = h{q, t, f }, {q 7→ (O, Q), t 7→ (P, A), f 7→ (P, A)}, {(q, t), (q, f )}i. A boolean expression has three observable actions, a request for execution and two possible outcomes. • JcellK = h{q, t, f, wt, wf, a}, {q 7→ (O, Q), t 7→ (P, A), f 7→ (P, A), wt 7→ (O, Q), wf 7→ (O, Q), a 7→ (P, A)}, {(q, t), (q, f ), (wt, a), (wf, a)}i. A memory cell has three actions for reading, the same as in the case of a boolean expression, and three actions for writing: requests to write true or write false and an acknowledgement. The enabling relation reflects, intuitively, the basic causal connection between moves: for a base type, an answer must be ’enabled’ by a question. Composite types are interpreted by composite arenas constructed as follows: • MA×B = MA + MB , [λA , λB ], `A + `B . The product arena is simply the structure-preserving disjoint union of the two arenas. • MA→B = MA + MB , [λA , λB ], `A + `B + IB × IA , where λm = (O, x) if and only if λm = (P, x). The arrow arena is similar to the product arena but it involves the switching of polarities Proponent-Opponent for the arena in the contra-variant position, and extending the enabling relation so that initial moves of the argument are justified by the initial moves of the function. The computational intuition for reversing polarities is that, in the case of an argument the “inputs” become “outputs” and vice-versa. The extension of the enabling relation is motivated by establishing a causal connection between computations executed by the argument and those executed by the main body of the function. For example, the arena for type com → com is: • M = {q1, q2, a1, a2} • λ = {q1 7→ OQ, q2 7→ OQ, a1 7→ P A, a2 7→ P A} • ` = {(q1, q2), (q1, a1), (q2, a2)}. In the definition of the set of moves, Mcom→com = Mcom + Mcom we defined the two injections associated to the disjoint sum as ini (x) = xi. There is a natural and elegant connection between an arena and an interface: 10 Principle 2 There is an immediate connection between the following game-semantic and hardware concepts: • An arena corresponds to an interface. • A move corresponds to a port in the interface. • A Proponent move is an output port. • An Opponent move is an input port. • A question is a request. • An answer is an acknowledgment. A term of type Γ ` M : T is interpreted in arena JΓK → JT K. This means that this term will be compiled into a circuit with interface defined by its arena. For example, for a term x : com ` M : com, the interface will be given by the arena com → com discussed above: q2 q1 a2 M a1 What is not obvious in the conventional interface depiction above is the enabling relation, which plays an essential role in the definition of the semantics and of the FIM. In fact the concept of enabling does not have any obvious hardware equivalent. 4 The sequentially reentrant access protocol In the previous section we gave a method for defining an interface for any type as a structured set of ports. In this section we give a protocol which governs access to these interfaces, rules which will be formulated in an assume-guarantee way: assuming the environment is well behaved in the way it provides input actions, a circuit must guarantee that its outputs will behave in a certain way. This protocol will be derived directly from the game-semantic model. Let us start again with some basic game-semantic definitions. A justified sequence in arena A is a finite sequence of moves of A so that the first move is initial and each subsequent occurrence of a move n must have a uniquely associated earlier occurrence of a move m such that m `A n. We say that n is (explicitly) justified by m or, when n is an answer, that n answers m. If a question does not have an answer in a justified sequence, we say that it is pending in that sequence. In what follows we use the letters q and a to refer to question- and answer-moves respectively, m will be used for arbitrary moves and mA will be a move from MA . A justified sequence is a legal move if it satisfies: y Fork : In any prefix s0 = · · · q · · · m of s, the question q must be pending before m is played. 11 Wait : In any prefix s0 = · · · be answered. q z ··· a of s, all questions justified by q must Serial : In any prefix s0 = · · · q · · · q the first occurrence of q cannot be pending when the second one is played. The simplest sequences of moves that violate Fork, Wait and Serial respectively are: su m Fork : q1 a1 Wait : q1 sw Serial : q1 q2 sw q2 a1 q2 For an arena A, the set of all plays satisfying these conditions is PA , its set of (legal) plays. The intuition behind these game rules is intimately connected to the language SCI. We can think of a question as the start of a process and an answer as its termination. The Fork rule says essentially that only a “live” process can spawn children; Join stipulates that a process can only terminate if all its children processes have terminated. This is essentially the static nature of concurrency in our language, where the only concurrent construct is par. The final rule, Serial, restricts any process to only one active instance at any given time, which is a consequence of our banning of sharing in concurrent contexts; in the context of hardware it means that each module may receive a new initial request only when the previous initial request has been acknowledged. The consequence of the Serial rule is the following: Theorem 2 ([12]) The representation of the game model for any term Γ ` M : T of SCI is a regular language. This justifies our choice of SCI as an interesting target language, as it has both higher-order functional features, imperative features, and a finite-state model at any term which recommends it for efficient hardware compilation. Principle 3 There is an immediate connection between the following game-semantic and hardware concepts: • An occurrence of a move is a signal on a port. • A justified sequence in an arena is a waveform on an interface. • The set of plays on an interface is a protocol of access to the interface. In the above we abstract the definition of a “signal,” i.e. its precise phase encoding. Below, to keep the presentation focused we assume a standard low-high-low encoding, but other encodings can be equally used. This also affects the exact shape of the waveform. 12 Let us call the protocol corresponding to the SCI game model the Sequentially Reentrant Access Protocol (SRAP). For instance, any communication mediated by interface Jcom → comK must behave following the following pattern: 1. the first action must be an input request on q1; 2. the second action may be an output request on q2 which indicates that the function is requesting an evaluation of its procedural argument 3. then, the third action must be an input acknowledgment on a2 indicating successful completion of the procedural argument’s execution; 4. the protocol continues from Step 2; 5. the second action may also be an output acknowledgment on a1 indicating that the main procedure has completed execution. If Steps 2 and 3 are omitted then we have a function that is ignoring its argument (i.e. non-strict). According to this protocol, all SRAP-compliant traces for this interface are captured by the regular expression q1(q2 · a2)∗ a1. § The game-semantic model is denotational, i.e. inductively defined on the syntax of the language. The model of a term is a strategy, i.e. a set of plays indicating how the Proponent will respond to any Opponent action, given the play up to that point. A strategy is subject to certain closure conditions, which are not relevant for our discussion here. More relevant is a property of strategies (thread-independence [11, Sec. 2.6.2]) that says that repeated plays of the same strategy will be essentially the same, i.e. the strategy has no hidden state information preserved between its initial question and its (final) answer. We call this property “Reset” noting that it is not a property of the protocol, but it is a property that circuits that participate in the protocol must satisfy. Note that it is known that circuits that are meant to be used compositionally must satisfy this self-resetting property [29]. One of the important properties of strategies is that they compose in a way that preserves both the legality of the resulting composite plays and the closure conditions of the resulting composite strategy. The details of composition are not relevant for our current discussion, but the following consequence is: Theorem 3 (Compositionality) If A and B are two SRAP-compliant circuits with interfaces JT1 → T2 K and JT2 → T3 K respectively, then the circuit B ◦ A of interface JT1 → T3 K formed by connecting the ports T2 in the two circuits will be SRAP-compliant: T1 T2 13 T3 B ... ... ... ... A T2 q1 q1,q2,a2,a1 q2 q1,q2,a2,a1 a1/q2,a2,a1 q1/q1,q2,a2 vs. ,q2 q1 a1 a2 2 ,q 1 ,q 1 /a q2 a1 q1 1, ,a2 /a a2 a 2, q1,q2,a2,a1 Figure 1: Asynchronous vs. synchronous model for com → com The compositionality of a protocol rarely receives the emphasis it deserves. This property reduces substantially the burden of proof in creating complex composite circuits. It is enough to show that each individual module is protocolcompliant, then using compositionality we can safely assume that any interconnection of the sub-circuits that is compatible with the signature of the interface will result in a protocol-compliant circuit. Principle 4 Interface-access protocols should be compositional in order to simplify the design of complex circuits. Note that the Reset property is also compositional in the same sense. 4.1 Synchronous versus asynchronous SRAP and related optimisations Conventional game-semantic models exhibit an asynchronous view of concurrency. This makes them naturally suitable for the design of asynchronous hardware. When using game models to target synchronous (clocked) hardware one must take into account the possibility of several moves/signals occurring simultaneously. Note that this is level of synchronicity is simply used to to enhance performance, processing several inputs at once and issuing outputs instantaneously is faster, but has no bearing on correctness. A synchronous version of a protocol can be immediately derived using round abstraction [2]. For example, the (asynchronous) set of plays for com → com and its round-abstracted (synchronous) version can be seen in Fig. 1 (simultaneous signals are separated by commas, alternate labellings for a transition are separated by a slash). The use of a asynchronous versus synchronous implementation has a serious impact on performance. The round-abstraction algorithm guarantees that the synchronous version of state machine has fewer (or equal) states, but may have more transitions. It is difficult to assess apriori the impact of round abstraction on the logical complexity of a circuit, but the synchronous version has an obvious 14 speed advantage. Whereas the asynchronous model alternates between receiving inputs and producing outputs the synchronous model responds instantly (i.e. in the same clock cycle) to an input, and can handle several inputs at once. This makes implementation of constants and simple and ubiquitous functional constants (such as sequential composition) far more efficient, because they no longer introduce any delays at all, but respond instantly to input; in fact for both constants (true, false) and sequential composition the implementation is simply wires connected the right input and output ports. The fact that our circuits work under a set protocol (SRAP) raises new opportunities for optimisation through automaton minimisation. Minimisation algorithms such as Hopcroft’s [14] work by identifying bisimulation-equivalent states; however, when the protocol is set, it means that the automaton can only receive inputs from a restricted language, that of the protocol, which raises new possibilities for optimisation. Note that the more restrictive the protocol the greater the possibility of optimisation. The trivially extreme case of an empty protocol would allow any automaton to be reduced to the one-state automaton accepting all strings. Because we are working with a fully abstract gamesemantic model, it means that the underlying protocol is the most restricted possible which still allows the compilation of any program. In other words, any finite interaction which is SRAP-compliant can be realised by a program [12]. This point is illustrate in Figs. 2–4. In it we show three basic programming language constructs: the true constant, sequential composition and iteration. In the figure we show the resulting configurations on an FPGA (Xilinx XC5VLX50) for the original asynchronous game model, the round-abstracted synchronous version and its optimisation under the assumed SRAP-compliant behaviour. These circuits are intended only to give a concrete feel for the effectiveness of the algorithms. The reduction of true and seq to simply connectors is a remarkable optimisation which has a tremendous impact on the overall efficiency (time and space) of the circuits generated. Also, we should emphasise that the synchronous versions of the circuits we obtain are well-behaved under instant feedback, a wellknown problem in conventional synchronous languages such as Esterel [4]. 4.2 Activation managers The development up to this point addresses gives a FIM consisting of a static definition (the interface) and a dynamic set of rules (the protocol) which solves the first problem we identified earlier: designing interfaces that correspond to (possibly higher-order) functions. In this section we shall see how re-instantiation can be avoided by using sharing instead. This also solves the problem of bookkeeping of names for modules and ports. Suppose that we have a (slave) circuit P with interface JT K, and suppose it is used twice by a (master) circuit Q. In order to avoid instantiating P twice we will use a special circuit called an activation manager (AM): 15 Asynchronous: Synchronous: Minimised: Figure 2: Circuit for the constant true P P T T T1 Q P vs. T Am T2 Q If Q makes the initial request on a root port of JT1 K then AM will establish a logical connection between P and the ports of T1 ; it can be seen that AM works just like a local simple bus for P . If P is large and AM small this can vastly improve the total footprint. We will see an example in the next section. The question to ask at this point is: How can we implement an AM? Or even a more basic question: What does it mean for an AM to be correct? Note that the AM is not one circuit, but a family of circuits indexed by any type in the language. The correctness of the AM is precisely captured by the diagram above, which can be written equationally as Q ◦ hP, P i = Q ◦ Am ◦ P. In order for the composition to type-check, we need the circuits involved to have the following interfaces: P : X → T , Q : T × T → Y and Am : T → T × T . In fact the mention of Q is irrelevant, what we need is simply hP, P i = Am ◦ P. These above are circuits, but now if we trace our intuitions back through the game-semantic model to the programming language it is quite obvious that we 16 Asynchronous: Synchronous: Minimised: Figure 3: Circuit for sequential composition 17 Asynchronous: Synchronous: Minimised: Figure 4: Circuit for iteration 18 want Am to represent the denotation of the diagonal function λx.hx, xi that given an argument returns a pairing of the argument with itself. Note that this need for circuits to behave similarly under sharing versus replication is a main reason why they need to have the self-resetting property. Clearly, if P above has internal state that is changes in a way that survives a round of usage—let us say that P has an internal counter for the number of times it is activated—then it is not possible to expect the same behaviour in the shared scenario as in the replicated scenario, as the shared P will be used twice as many times as the replicated instances. Fortunately, we can extract a representation for the diagonal, at any type directly from the game-semantic model [12]: this is the Application Manager! From Thm. 2 we know that this is a finite-state model which can be mapped into hardware using standard methods (the synchronous version of the diagonal must undergo round abstraction, as explained before). In Fig. 5 we show the asynchronous model for the diagonal com → com × com, the synchronous model and the circuits resulting from mapping the two diagonals on a Xilinx Virtex-5 (XC5VLX50) FPGA. The asynchronous AM requires 7 flip-flops (FF) and 22 look-up tables (LUT), while the synchronous version requires 3 FFs and 6 LUTs. Finally, note that the AM for com → com × com has both the same signature and the same behaviour as the CALL logical module in the micro-pipelines framework [28]. It is reasonable to claim that application managers are a generalisation across all type signatures of the concept of a CALL module. 4.3 Protocol compliance through type systems As seen from the previous section, the proper operation of an AM is premised on it being used to connect SRAP-compliant, self-resetting components. The AMs themselves satisfy these conditions and, using the compositionality property (Thm. 3) the resulting circuits are also SRAP-compliant and can participate in other larger circuits structured using AMs. This is perfectly consistent with Harper’s earlier quote: Principle 5 In hardware, type systems must be realised as compositional protocols. In hardware compilation the compositionality of SRAP simplifies the compilation process in the following way. Each basic construct of the language is compiled into a simple, SRAP-compliant circuit. Composition of sub-programs with disjoint sets of identifiers can be realised by wiring the corresponding circuits in a way that is consistent with the typing of their interfaces (cf. Theorem 3). Sharing of identifiers is then realised through AMs. The type system of the language will automatically allow sharing of identifiers in pairing but disallow it in function application. As already mentioned, according to the type system it is legal to form terms such as hf (x); f (x)i but illegal to form f (f (x)) or f (x) || f (x). 19 ?r2.0,!r.0,?d.0,!d2.0 ?r1.0,!r.0,?d.0,!d1.0 ?r1.0 ?r2.0 ?r2.0,!r.0 ?d.0,!d2.0 !d1.0 !r.0 !r.0 ?d.0,!d1.0 !d2.0 ?d.0,!d2.0,?r2.0,!r.0 ?r1.0,!r.0 ?d.0,!d1.0,?r2.0,!r.0 ?d.0 ?d.0 ?d.0,!d2.0,?r1.0,!r.0 ?d.0,!d1.0,?r1.0,!r.0 Figure 5: Asynchronous and synchronous AMs for com → com × com 20 Skip Skip Seq Q'_1 A'_1 A_1 CK A'_2 Q'_0 A'_0 Am A_0 Q'_2 Q_1 A_2 Q_0 Q_2 Figure 6: Sequential function call Because the circuits are a direct representation of the semantics of the type system and the language, a compiler can be constructed denotationally. Function application is simply circuit composition, contraction is implemented by AMs of the right type, and lambda abstraction is, through the currying isomorphism, only a relabelling of ports. The implementations for the constants is a hardware representation of their game model. Additionally, the fact that all circuits are SRAP-compliant means that the FSM representation for their game model can be optimized beyond conventional minimisation [14], taking into account that certain input combinations, which violate the access protocol, are not possible [10]. 4.4 Working with application managers First lets look at an example of SRAP-compliant use of the activation manager. The representation of the game-semantic model (synchronous and optimized) of skip and seq are simply connectors, so the (legal) compiled program f (skip); f (skip) has schematic in Fig. 6, where AM is the diagonal for (com → com) → (com → com) × (com → com). Its behaviour is as follows: it will call the interface for f twice, and each time f asks for an argument it will provide skip, which is implemented as a wire between its own Q and A ports. A typical (legal) trace on this AM is Q02 Q00 Q0 Q2 A2 A0 A00 A02 Q01 Q00 Q0 Q1 A1 A0 A00 A01 . If we attempt to synthesise the invalid program f (f (skip)) we obtain the schematic in Fig. 7, with skip implemented as a connector and function application implemented as wiring. 21 Skip Application Q'_1 A'_1 A_1 A'_2 CK Q'_0 A'_0 Am A_0 Q_1 Q'_2 A_2 Q_2 Q_0 Figure 7: Nested function call To be more precise, the circuit above is λf.(λf 0 .(π1 f 0 )((π2 f 0 )(skip)))(δf )). Where δ = λx.hx, xi is the diagonal, implemented as Am. The AM, same as before, must handle now traces of the form Q02 Q00 Q0 Q2 Q01 Q00 Q0 Q1 A1 A0 A00 A01 A2 A0 Note the nesting of request and acknowledgements Q0 and A0 , which breaks serialization. Simulating the circuit in a tool such as Xilinx ISE we can see that the activation manager simply deadlocks after this trace and it never produces the A0 . The reason is that after A01 the AM has established a communication channel with the first projection, so the input on A2 is unexpected and cannot be handled. Keeping track of nested function calls requires more than static resources and is substantially more expensive to implement. § The second typical way to violate SRAP is by trying to use concurrent access to interface components, as in the the program for par(f (skip))(f (skip)), synthesised as in Fig. 8, where par is part of the implementation of parallel composition. The problems here are obvious and no trace analysis is required. AM is not equipped to arbitrate the simultaneous initial requests on Q01 , Q02 , but even if it did, they are forwarded at the same time to the same instance of f via Q00 ! This is precisely the source of the bug in HandelC. 22 Par Q'_1 A'_1 A_1 CK A'_2 Q'_0 par A_0 A'_0 Am Q'_2 Q_1 A_2 Q_0 Q_2 Skip Figure 8: Concurrent function call 5 Conclusion The effectiveness of this approach can be easily argued, as all the weaknesses enumerated before, arising form the lack of a FIM are resolved using the gamesbased approach. We are able to define interfaces that implement higher-order functions and thanks to the well-defined SRA protocol we can construct (automatically) light-weight AMs, at least as compared to alternatives such as buses or NOC, that can efficiently (in time and space) share (self-resetting) modules with any SRAP-compliant signature. An earlier version of this work was the Geometry of Synthesis (GOS) [9], a direct circuit-based semantics for a similar language (lacking parallel composition). The difference between GOS and the simpler method we propose here is that the former is inspired by game semantics, whereas the latter is simply game semantics. Using the game semantic model has certain advantages, such as eliminating the need for re-proving soundness. Using the game-semantic model also has some other, subtler advantages that take advantage of the full-abstraction property of the model to realize further optimizations of the concrete representation of the game model [10]. Also, establishing a methodology for the semantic-directed compilation of game models into hardware, preserving correctness, allows us to take advantage of the rich game-semantic literature, which provides fully abstract models for a large variety of programming languages. A proof-of-concept compiler was implemented using this approach. One of the test applications was a back-propagation neural-network with 12 4-bit neurons. The project was carried out by a student with no training in digital design. Using a standard textbook algorithm of 167 lines of source code, the compiler produced a design that fitted comfortably on a Spartan XC3S200 FPGA, using 10% of available FFs, 13% of available LUTs and 19% of available slices, clocked 23 at maximum frequency. The argument of this paper is a methodological one: FIMs, access protocols, application managers and language-support through type systems, all fit naturally in the game-semantic framework and can be immediately and naturally translated into relevant hardware concepts. These concepts can overcome the absence of FIMs in hardware compilation, which is a significant obstacle in the way of producing mature and usable hardware compilers. Without well defined FIMs it is not possible to support separate compilation units, which greatly restricts library support and run-time inter-operability of components. Another immediate consequence of having a well defined FIM is the ability to implement activation managers, circuits that can share the functionality of other circuits. We have presented a simple (but non-trivial) example for a FIM and an associated access protocol that guarantees the correct usage of circuits that implement the interface. The SRA Protocol supports a rich type system and has built-in support for safe concurrency, which is an important step forward compared to the state-of-the-art in hardware compilation. Principle 6 Lessons learned decades ago concerning the design and implementation of compilers must not be ignored, but must be adapted to hardware compilation. References [1] S. Abramsky, R. Jagadeesan, and P. Malacaria. Full abstraction for PCF. Inf. Comput., 163(2):409–470, 2000. [2] R. Alur and T. A. Henzinger. Reactive modules. Formal Methods in System Design, 15(1):7–48, 1999. [3] Arvind and R. S. Nikhil. Executing a program on the mit tagged-token dataflow architecture. IEEE Trans. Computers, 39(3):300–318, 1990. [4] G. Berry and G. Gonthier. The Esterel synchronous programming language: Design, semantics, implementation. Sci. Comput. Program., 19(2):87–152, 1992. [5] P. Bjesse, K. Claessen, M. Sheeran, and S. Singh. Lava: hardware design in haskell. In ICFP, pages 174–184, 1998. [6] M. Budiu and S. C. Goldstein. Compiling application-specific hardware. In FPL, pages 853–863, 2002. [7] B. Buyukkurt, Z. Guo, and W. A. Najjar. Impact of loop unrolling on area, throughput and clock frequency in Roccc: C to VHDL compiler for FPGAs. In ARC, pages 401–412, 2006. [8] Celoxica. Handel-C Reference Manual. http://www.celoxica.com. [9] D. R. Ghica. Geometry of Synthesis: a structured approach to VLSI design. In POPL, pages 363–375, 2007. [10] D. R. Ghica. Geometry of Synthesis 2: Compiling finite-bound concurrency into hardware. Workshop on Games for Logic and Programming Languages IV, March 2009. [11] D. R. Ghica and A. Murawski. Angelic semantics of fine-grained concurrency. Annals of Pure and Applied Logic, 151(2-3):89–114, 2008. [12] D. R. Ghica, A. S. Murawski, and C.-H. L. Ong. Syntactic control of concurrency. Theor. Comput. Sci., 350(2-3):234–251, 2006. 24 [13] S. Guo and W. Luk. Compiling Ruby into FPGAs. In FPL, pages 188–197, 1995. [14] J. E. Hopcroft. An nlogn algorithm for minimizing the states in a finite automaton. In Z. Kohave, editor, The Theory of Machines and Computations. Academic Press, New York, 1971. [15] J. M. E. Hyland and C.-H. L. Ong. On full abstraction for PCF: I, II, and III. Inf. Comput., 163(2):285–408, 2000. [16] S. C. Johnson and D. M. Ritchie. The C language calling sequence. Technical Report Computer Science 102, Bell Laboratories, September 1981. [17] S. Kumar, A. Jantsch, J.-P. Soininen, M. Forsell, M. Millberg, J. Oberg, K. Tiensyrja, and A. Hemani. A network on chip architecture and design methodology. In Proceedings. IEEE Computer Society Annual Symposium on VLSI., pages 105– 112, 2002. [18] W. Luk, D. Ferguson, and I. Page. Structured hardware compilation of parallel programs. In W. Moore and W. Luk, editors, More FPGAs. Abingdon EE&CS Books, 1994. [19] R. Milner. Functions as processes. In ICALP 17, volume 443 of LNCS, pages 167–180, 1990. [20] P. W. O’Hearn. On bunched typing. J. Funct. Program., 13(4):747–796, 2003. [21] P. W. O’Hearn, J. Power, M. Takeyama, and R. D. Tennent. Syntactic control of interference revisited. Theor. Comput. Sci., 228(1-2):211–252, 1999. [22] P. W. O’Hearn and D. J. Pym. The logic of bunched implications. Bulletin of Symbolic Logic, 5(2):215–244, 1999. [23] I. Page and W. Luk. Compiling Occam into FPGAs. In W. Moore and W. Luk, editors, FPGAs, pages 271–283. Abingdon EE&CS Books, 1991. [24] J. C. Reynolds. Syntactic control of interference. In POPL, pages 39–46, 1978. [25] J. C. Reynolds. Syntactic control of inference, part 2. In ICALP, pages 704–722, 1989. [26] J. C. Reynolds. Separation logic: A logic for shared mutable data structures. In LICS, pages 55–74, 2002. [27] S. Sirowy. C is for circuits: Capturing FPGA circuits as sequential code for portability. In FPGA, 2008. [28] I. E. Sutherland. Micropipelines. Commun. ACM, 32(6):720–738, 1989. Turing Award Paper. [29] I. E. Sutherland and J. K. Lexau. Designing fast asynchronous circuits. In Seventh International Symposium on Asynchronous Circuits and Systems, pages 184–194, 2001. [30] The University of Manchester Advanced Processor Technologies. BALSA Reference Manual. http://www.cs.manchester.ac.uk/apt/projects/tools/balsa/. [31] C. H. van Berkel and R. W. J. J. Saeijs. Compilation of communicating processes into delay-insensitive circuits. In Proceedings of ICCD, 1988. [32] K. van Berkel. Handshake circuits: An intermediary between communicating processes and VLSI. PhD thesis, Technische Univ., Eindhoven (Netherlands), 1992. [33] K. van Berkel, J. Kessels, M. Roncken, R. Saeijs, and F. Schalij. The VLSIprogramming language Tangram and its translation into handshake circuits. In EURO-DAC, pages 384–389, 1991. [34] M. V. Wilkes, D. J. Wheeler, and S. Gill. The Preparation of Programs for an Electronic Digital Computer. Addison Wesley, 1951. 25
6cs.PL
A Practical and Worst-Case Efficient Algorithm for Divisor Methods of Apportionment Raphael Reitzig∗ Sebastian Wild∗ arXiv:1504.06475v4 [cs.DS] 5 Dec 2017 December 6, 2017 Proportional apportionment is the problem of assigning seats to parties according to their relative share of votes. Divisor methods are the de-facto standard solution, used in many countries. In recent literature, there are two algorithms that implement divisor methods: one by Cheng and Eppstein [CE14] has worst-case optimal running time but is complex, while the other [Puk14] is relatively simple and fast in practice but does not offer worst-case guarantees. We demonstrate that the former algorithm is much slower than the other in practice and propose a novel algorithm that avoids the shortcomings of both. We investigate the running-time behavior of the three contenders in order to determine which is most useful in practice. 1. Introduction The problem of proportional apportionment arises whenever we have a finite supply of k indivisible, identical resource units which we have to distribute across n parties fairly, that is according to the proportional share of publicly known and agreed-upon P values v1 , . . . , vn (of the sum V = vi of these values). We elaborate in this section on applications of and solutions for this problem. ∗ Department of Computer Science, University of Kaiserslautern; {reitzig, wild} @ cs.uni-kl.de 1 1. Introduction Apportionment arises naturally in politics. Here are two prominent examples: • In a proportional-representation electoral system we have to assign seats in parliament to political parties according to their share of all votes. The resources are seats, and the values are vote counts. • In federal states the number of representatives from each component state often reflects the population of that state, even though there will typically be at least one representative for any state no matter how small it is. Resources are again seats, values are the numbers of residents. In order to use consistent language throughout this article, we will stick to the first metaphor. That is, we assign k seats to parties [1..n] proportionally to their respective votes vi , and we call k the house size. A fair allocation should assign vi /V seats to party i, where V = v1 + · · · + vn is the total vote count of all parties. In case of electoral systems which exclude parties below a certain threshold of overall votes from seat allocation altogether, we assume they have already been removed from our list of n parties. As seats are indivisible, this is only possible if, by chance, all vi /V are integers; otherwise we have to come up with some rounding scheme. This is where apportionment methods come into play. The books by Balinski and Young [BY01] and Pukelsheim [Puk14] give comprehensive introductions into the topic with its historical, political and mathematical dimensions. Mathematically speaking, an apportionment method is a function f : Rn>0 × N → Nn0 that maps vote counts v = (v1 , . . . , vn ) and house size k to a seat allocation s = (s1 , . . . , sn ) := f (v, k) so that s1 + · · · + sn = k. We interpret s as party i getting si seats. There are many conceivable such methods, but there are at least three natural properties one would like apportionment systems to have: (P1) Pairwise vote monotonicity: When votes change, f should not take away seats from a party that has gained votes while at the same time awarding seats to one that has lost votes. (P2) House monotonicity: f should not take seats away from any party when the house grows (in number of seats) but votes do not change. (P3) Quota rule: The number of seats of each party should be its proportional share, rounded either up or down. Balinski and Young have shown that • (P1) implies (P2) [BY01, Cor. 4.3.1], • no method can always guarantee (P1) and (P3) [BY01, Thm. 6.1], and 2 1. Introduction Method Divisor Sequence δ(x) Sandwich Smallest divisors 0, 1, 2, 3, . . . x — Greatest divisors 1, 2, 3, 4, . . . x+1 — Sainte-Laguë 1, 3, 5, 7, . . . 2x + 1 — Modified Sainte-Laguë Equal Proportions 1.4, 3, 5, 7, . . . √ √ √ 0, 2, 6, 12, . . . Harmonic Mean 0, 43 , 12 24 5 , 7 , ... Imperiali 2, 3, 4, 5, . . . Danish 1, 4, 7, 10, . . .  2x+1 x(x + 1) x+ 2x(x+1) 2x+1 6 5 1 4 x+ 1 4 x≥1 1.6x+1.4 x<1 p 2x + x+2 — 3x + 1 — ± ± ± 1 5 1 4 1 4 Table 1: Commonly used divisor methods [CE14, Table 1]. For each of the methods, we give a possible continuation δ of the respective divisor sequence (cf. Section 2) as well as linear sandwich bounds on δ, if non-trivial (cf. Lemma 2). • (P1) holds exactly for divisor methods [BY01, Thm. 4.3]. Property (P1) is essential for upholding the principle of “one-person, one-vote”, an ideal pursued by electoral systems around the globe and occasionally enforced by law [Puk14, Section 2.4]. Therefore, divisor a. k. a. Huntington methods can be the only choice, for the price of (P3). Other choices can be made, of course; the aforementioned books [BY01; Puk14] discuss different trade-offs. Divisor methods are characterized by divisor sequences which control the notion of “fairness” implemented by the respective method. There are many popular choices (cf. Table 1). It is not per se clear which divisor sequence is the best; there still seems to be active discussion, e. g., for the U. S. House of Representatives. One reason is that no-one has yet been able to propose a convincing, universally agreed-upon mathematical criterion that would single out one method as superior to the others. In fact, there are competing notions of fairness, each favoring a different divisor method [BY01, Section A.3]. A reasonable approach is therefore to run computer simulations of different methods and compare their outcomes empirically, for example w. r. t. the distribution of final average votes per seat vi /si . For this purpose, many apportionments have to be computed, so efficient algorithms can become an issue. We thus study the problem of computing the final seat allocation by divisor methods (given by their divisor sequences) according to vote counts and house size. For the case of almost linear divisor sequences, the problem can be solved in time O(n); this has been shown by Cheng and Eppstein [CE14] who propose a worst-case runningtime-optimal algorithm which we call ChengEppsteinSelect. It is quite involved and rather difficult to implement (cf. Appendix C.3). 3 2. Divisor Methods Formalized Pukelsheim [Puk14], on the other hand, proposes algorithm JumpAndStep whose running time is not asymptotically optimal in the worst case but tends to perform well in practice, at least if some insight about the used divisor sequence is available and inputs are good-natured (cf. Appendix C.2). After introducing divisor methods formally in Section 2, we propose a new algorithm in Section 3 that also attains the O(n) worst-case running time bound but is straight-forward to implement and efficient in practice as well. It is based on a generalization of our solution for the envy-free stick-division problem [RW15b]. We finally compare the performance of the three contending algorithms with extensive running time experiments, an executive summary of which we give in Section 4. Additional material includes an index of notation in Appendix F. 2. Divisor Methods Formalized Let d = (dj )∞ j=0 be an arbitrary divisor sequence, i. e. a nonnegative, strictly increasing and unbounded sequence of real numbers. We formally set d−1 := −∞. We require that there is a smooth continuation of d on the reals which is easy to invert. That is, we assume a function δ : R≥0 → R≥d0 with i) δ is continuous and strictly increasing, ii) δ −1 (x) for x ≥ d0 can be computed with a constant number of arithmetic operations, and iii) δ(j) = dj (and thus δ −1 (dj ) = j) for all j ∈ N0 . All the divisor sequences used in practice fulfill these requirements; cf. Table 1. For convenience, we continue δ −1 on the complete real line requiring iv) δ −1 (x) ∈ [−1, 0) for x < d0 . Corollary 1: Assuming i) to iv), δ −1 (x) is continuous and strictly increasing on R≥d0 . Furthermore, it is the inverse of j 7→ dj in the sense that bδ −1 (x)c = max{j ∈ Z≥−1 | dj ≤ x} for all x ∈ R.  In particular, bδ −1 (x)c = j for dj ≤ x < dj+1 so the floored δ −1 is the (zero-based) rank function for the set of all dj as long as x ≥ d0 . Note how this reproduces what is called d-rounding in the literature [BY01; Puk14]; we obtain an efficient way of calculating this function via δ −1 . 4 2. Divisor Methods Formalized Now the set of all seat assignments that are valid w. r. t. d is given by [BY01] S(v, k) = n s ∈ Nn0 n X i=1 si = k ∧ ∃ a > 0. ∀ i ∈ [1..n]. si ∈ bδ −1 (vi · a)c + {0, 1} . o We call a realization of a proportionality constant a∗ ; intuitively, every seat corresponds to roughly 1/a∗ votes. An equivalent definition is by the set of possible results of the following algorithm [BY01, Prop. 3.3]. Algorithm 1: IterativeMethodd (v, k) : Step 1 Initialize s = 0n . Step 2 While k > 0, Step 2.1 Determine I = arg minni=1 dsi /vi . Step 2.2 Update sI ← sI + 1 and k ← k − 1. Step 3 Return s. We can obtain a proportionality constant [Puk14, 59f] by a∗ = max{dsi −1 /vi | 1 ≤ i ≤ n}, (1) which in turn defines the set S(v, k). Note that we work with dj /vi instead of vi /dj in the classical literature; Cheng and Eppstein [CE14] and we prefer the reciprocals because the case d0 = 0 then handles gracefully and without special treatment. Therefore, our a∗ is also the reciprocal of the proportionality constant as e. g. Pukelsheim [Puk14] defines it, we multiply by a in the definition of S and we take the minimum in IterativeMethod. It is important to note that the defined set S remains unchanged by this switch. Following the notation of Cheng and Eppstein [CE14], we furthermore define for given votes v = (v1 , . . . , vn ) ∈ Qn>0 the sets Ai := ai,j j = 0, 1, 2, . . . n o with ai,j := dj vi and their multiset union A := n ] Ai . i=1 As we will see later, the relative rank of elements in A turns out to be of interest; we therefore define the rank function r(x, A) which denotes the number of elements in 5 3. Fast Apportionment by Rank Selection multiset A that are no larger than x, that is r(x, A) := A ∩ (−∞, x] = n X i=1 (2) |{ai,j ∈ A | ai,j ≤ x}|. We write r(x) instead of r(x, A) when A is clear from context. We need two more convenient shorthands: Assuming we have a∗ ≤ x, we denote with Ix :=  (3) i ∈ {1, . . . , n} | vi > d0 /x the set of parties that can hope for a seat, and with x A := dj ∈A <x vi vi ]  dj i∈Ix  = n  ] dj i=1 dj ∈A <x vi vi  = A ∩ (−∞, x) (4) the multiset of elements from sequences of these parties that are smaller than x, i. e. reasonable candidates for a∗ . 3. Fast Apportionment by Rank Selection From (1) together with strict monotonicity of d, we obtain immediately that a∗ = A(k) , i. e. the kth smallest element of A (counting duplicates) is a suitable proportionality constant. This allows us to switch gears from the iteration-based world of Pukelsheim [Puk14] to selection-based algorithms, as previously seen by Cheng and Eppstein [CE14]. Note that even though A is infinite, A(k) always exists because the terms ai,j = dj/vi are strictly increasing in j for all i ∈ {1, . . . , n}. Borrowing terminology from the field of mathematical optimization, we call a feasible if r(a) ≥ k, otherwise it is infeasible. Feasible a 6= a∗ are called suboptimal. Our goal is to find a subset of A that contains a∗ but as few infeasible or suboptimal a as possible; we can then apply a rank-selection algorithm on this subset and obtain (via a∗ ) the solution to the apportionment problem. Now since d is unbounded, setting any upper bound x on the ai,j yields a finite search space Ax . By choosing any such bound that maintains |Ax | ≥ k, we retain the property that a∗ is the kth smallest element under consideration. One naive way is to make sure that the party with the most votes (which should get the most seats) contributes at least k values to A. This can be achieved by letting x = dk−1 / max v + ε (cf. the proof of Theorem 3). This alone, however, leads only to an algorithm with worst-case running time in Θ(kn), which is worse than even IterativeMethod (with priority queues). We can actually not improve this upper bound x; it is tight for the case that one party has many more votes than all others and gets (almost) all of the seats. We can, however, 6 3. Fast Apportionment by Rank Selection exclude many individual elements in Ax because they are too small to be feasible or too large to be optimal. Towards finding suitable upper and lower bounds on a∗ , we investigate its rank in the multiset A of all candidates. All we know is that k ≤ r(a∗ ) ≤ k + |Ix | since we may have any number between one and |Ix | parties that tie for the last seat. We can still make an ansatz with r(a) ≥ k + |Ix | and r(a) < k, express rank function r in terms of δ −1 (cf. Lemma 4 in Appendix B) and derive that X i∈Ix and δ −1 (vi · a) ≤ k − |Ix | X i∈Ix δ −1 (vi · a) ≥ k. (5) This pair of inequalities is indeed a sufficient condition for admissible pairs of bounds (a, a); we can conclude that a ≤ a∗ ≤ a. For a formal proof, see Lemma 5 in Appendix B. We now want to derive a sandwich on a∗ by fulfilling the inequalities in (5) as tightly as possible. Depending on δ −1 , this may be hard to do analytically. However, we can make the same assumption as Cheng and Eppstein [CE14] and explicitly compute suitable bounds for divisor sequences which behave roughly linearly. This does not limit the scope of our investigation by much; see Appendix A for more on this. Lemma 2: Assume the continuation δ of divisor sequence d fulfills αx + β ≤ δ(x) ≤ αx + β for all x ∈ R≥0 with α > 0, β ∈ [0, α] and β ≥ 0. Let further some x > a∗ be given. Then, the pair (a, a) defined by  a := max 0, with Vx := P i∈Ix αk − (α − β) · |Ix | Vx  and a := αk + β · |Ix | Vx vi fulfills the conditions of Lemma 5, that is a ≤ a∗ ≤ a. Moreover,  A ∩ [a, a] ≤ 2 1 + β−β α  · |Ix |. The proof consists mostly of rote calculation towards applying Lemma 5; see Appendix B for the details. We have now derived our main improvement over the work by Cheng and Eppstein [CE14]; where they have only a one-sided bound on a∗ and thus have to employ an involved search on A, we have sandwiched a∗ from both sides, and so tightly that the remaining search space is small enough for a simple rank selection to be efficient. 7 3. Fast Apportionment by Rank Selection Building on the bounds from Lemma 2, we can improve upon the naive idea using only x by excluding also many more elements from A which are for sure not a∗ . Since we remove in particular too small elements, this means that we also have to modify the rank we select; we will see that our bounds are chosen so that we can use δ −1 to count the number of elements we discard exactly. Recall that we assume a fixed apportionment scheme, that is fixed d with known α, β and β as per Lemma 2. Algorithm 2: SandwichSelect(v, k)d : Step 1 Find the v (1) = max{v1 , . . . , vn }. Step 2 Set x := dk−1 /v (1) + ε for suitable1 constant ε > 0. Step 3 Compute Ix as per (3). Step 4 Compute a and a as per Lemma 2. Step 5 Initialize  := ∅ and k̂ := k. Step 6 For all i ∈ Ix , do: Step 6.1 Compute j := max 0, δ −1 (vi · a)    and j := bδ −1 (vi · a)c. Step 6.2 Add all dj /vi to  for which j ≤ j ≤ j. Step 6.3 Update k̂ ← k̂ − j. Step 7 Select and return Â(k̂) . Theorem 3: Algorithm 2 computes a∗ in time O(n) for any divisor sequence d that fulfills the requirements of Lemma 2. Proof: First, we have to show that Ix as we compute it in Steps 1-3 is correct. We have x > a∗ = Ax as already r(x − ε) = r(dk−1 /v (1) ) ≥ k; at least the k elements d d0 (1) . We thus never need to consider elements , . . . , vk−1 (1) ∈ A are no larger than dk−1 /v v (1) a ≥ x, and in particular A(k) = Ax(k) as Ax = A ∩ (−∞, x). So far, we have needed no additional restriction on ε in Step 2; we only need it to be positive so we do not discard a∗ by accident if it is exactly dk−1 /v (1) . However, the size of Ax can be arbitrarily large – depending on the input values vi which we do not want. Therefore, we require 0<ε< 1 dk − dk−1 ; v (1) (6) Neither correctness nor Θ-running-time is affected by the choice of ε here since it affects only the size of Ix , which is bounded by n in any case. In particular, the size of  is affected only up to a constant factor. For tweaking performance in practice, see the proof of Theorem 3. 8 4. Comparison of Algorithms such exists because d is strictly increasing. Note how then x < dk /v (1) so we do not keep any additional suboptimal values. From Step 4 on, we then construct multiset  ⊆ A as the subsequent union of Ai ∩ [a, a], that is  = ]  dj i∈Ix vi ]  dj = i∈Ix vi ]  dj = i∈Ix ] = i∈Ix vi  j(i) ≤ j ≤ j(i) ∈A δ −1 (vi · a) ≤ j ≤ δ ∈ A vi · a ≤ dj ≤ vi · a dj dj ∈A a≤ ≤a vi vi −1 (vi · a)    = A ∩ [a, a]. In particular, the last step follows from (4) with x > a∗ . By Lemma 2, we know that a ≤ a∗ ≤ a for the bounds computed in Step 4, so we get in particular that a∗ ∈ Â. It remains to show that we calculate k̂ correctly. Clearly, we discard with (ai,0 , . . . , ai,j−1 ) exactly j elements in Step 6.2, that is |Ai ∩ (−∞, a)| = j(i). Therefore, we compute with k̂ = k − X i∈Ix Ai ∩ (−∞, a) = r(a∗ , A) − A ∩ (−∞, a) = r(a∗ , Â) the correct rank of a∗ in Â. For the running time, we observe that the computations in steps 1 to 5 are easily done with O(n) primitive instructions. The loop in Step 6 and therewith steps 6.1 and 6.3 are executed |Ix | ≤ n times. The overall number of set operations in Step 6.2 is |Â| ∈ O(|Ix |) ⊆ O(n) (cf. Lemma 2). Finally, Step 7 runs in time O(|Â|) ⊆ O(n) when using a (worst-case) linear-time rank selection algorithm (e. g., the median-of-medians algorithm [Blu+73]).  We have obtained a relatively simple algorithm that implements many divisor methods and has optimal asymptotic running time in the worst case. It remains to be seen if it is also efficient in practice. 4. Comparison of Algorithms We have implemented all algorithms mentioned above in Java [RW15a] with a focus on clarity and performance. Reviewing the algorithms resp. implementations (cf. Appendix C), 9 4. Comparison of Algorithms Average running time in µs/n (α, β) = (2, 1) and k = 100n (α, β) = (1, 3/4) and k = 10n 4 0.6 3 0.4 2 0.2 1 0 2 4 6 n 8 0 10 0 50 100 n 150 200 Figure 1: This figure shows average running times of SandwichSelect , ChengEppsteinSelect , JumpAndStep with naive resp. priority-queue minimum selection, and IterativeMethod with naive resp. priority-queue minimum selection, normalized by the number of parties n. The inputs are random apportionment instances with vote counts vi drawn i. i. d. uniformly from [1, 3]. The numbers of parties n, house size k and method parameters (α, β) have been chosen to resemble national parliaments in Europe (left) and the U. S. House of Representatives (right), respectively. we observe that neither IterativeMethod nor JumpAndStep are asymptotically worst-case efficient whereas ChengEppsteinSelect does not seem to be practical regarding implementability. SandwichSelect does not have either deficiency and is still the shortest of the non-trivial algorithms. We evaluate relative practical efficiency by performing running time experiments on artificial instances; we fix the number of parties n, house size k and the used divisor method and draw multiple vote vectors v at random according to different distributions. Where possible, we draw votes from a continuous distribution with fixed expectation; this ensures that vote proportions do not devolve to trivial situations as n grows. In order to keep the parameter space manageable, we use n as free variable and fix k to a multiple of n. For ease of implementation, we restrict ourselves to divisor sequences of the form (αj + β)j∈N0 ; this still allows us to cover a range of relevant divisor methods at least approximately (cf. Table 1). We describe the machine configuration used for the experiments and further details of the setup in Appendix D. Figure 1 shows the results of two experiments with practical parameter choices. It is clear that JumpAndStep dominates the field; of the other algorithms, only SandwichSelect comes close in performance. These observations are stable across many parameter choices; see also Appendix E. We will therefore restrict ourselves to JumpAndStep and SandwichSelect in the sequel. Towards understanding what influences the performance of these algorithms the most, 10 4. Comparison of Algorithms Running time in ms 8 10 6 4 5 2 0 0 0 1,000 2,000 0 3,000 0.5 1 |Â| |∆a | 1.5 ·105 Figure 2: Running times on individual inputs plotted against |∆a | for JumpAndStep (left) resp. |Â| for SandwichSelect (right). Inputs are random with exponentially distributed vi for n ∈ {1 , 5 , 10 , 20 , 30 , 40 , 50 , 75 , 100 }·103 and k = 5n; they have been apportioned w. r. t. (α, β) = (2, 1). we have investigated how ∆a (the number of seats JumpAndStep assigns too much, i. e. P k − si ) resp. |Â| (the number of candidates SandwichSelect selects from) relate to the measured running times. While the connection is clear for SandwichSelect, we need to look at cases where Pukelsheim’s estimators are bad; as long as |∆a |  n, the Θ(n) portions of JumpAndStep dominate. Figure 2 exhibits such a setting. While JumpAndStep is faster than SandwichSelect in the experiments of Figure 1 and similar ones, we observe that SandwichSelect is more robust against changing parameters. Figure 3 exhibits this for switching between different vote distributions: the average running times of SandwichSelect are close to each other where those of JumpAndStep spread out quite a bit. It may be noteworthy that each algorithm has one “outlier” distribution but they are not the same. JumpAndStep does indeed seem to outperform SandwichSelect consistently so far, if not by much in some cases. We have found a parameterization which, even though it is admittedly rather artificial, clearly suggests that JumpAndStep does indeed have ω(n) worst-case behavior and that SandwichSelect can be faster; see Figure 4. The question after realistic settings for which this is the case remains open. In summary, we have seen that SandwichSelect provides good performance in a reliable way, i. e., its efficiency does not depend much on divisor sequence or input. On the other hand, JumpAndStep is faster on average when good estimators are available, but can be slower in certain settings. 11 Average running time in µs/n 4. Comparison of Algorithms 0.1 0.1 8 · 10−2 8 · 10−2 6 · 10−2 6 · 10−2 50 100 n 150 4 · 10−2 200 0 50 100 n 150 200 0.12 0.26 0.1 0.24 8 · 10−2 |∆a |/n Average running time in µs/n Figure 3: Normalized average runtimes of SandwichSelect (left) and JumpAndStep (right) on vi drawn randomly from uniform , exponential , Poisson and Pareto distributions, respectively, and with k = 5n and (α, β) = (2, 1). 6 · 10−2 0.22 4 · 10−2 2 · 10−2 0.2 0 0 0.2 0.4 0.6 n 0.8 1 0 0.2 0.4 0.6 n ·105 0.8 1 ·105 Figure 4: The left plot shows normalized running times of SandwichSelect and JumpAndStep on instances with k = 2n and Pareto-distributed vi for (α, β) = (1.0, 0.001). The right plot shows that the average of |∆a | seems to converge towards a constant fraction of n in this case. 12 5. Conclusion 5. Conclusion We have derived an algorithm implementing divisor methods of apportionment that is worst-case efficient, simple and practicable. As such, it does not have the shortcomings of previously known algorithms. Even though it can not usually outperform JumpAndStep, its robustness against changing parameters makes it a viable candidate for use in practice. Acknowledgments We thank Chao Xu for pointing us towards the work by Cheng and Eppstein [CE14] and noting that the problem of envy-free stick-division [RW15b] is related to proportional apportionment as discussed there. He also observed that our approach for cutting sticks – the core ideas of which turned out to carry over to this article – could be improved to run in linear time. Furthermore, we owe thanks to an anonymous reviewer whose constructive feedback sparked broad changes which have greatly improved the article over its first incarnation. References [Blu+73] Manuel Blum et al. “Time Bounds for Selection.” In: Journal of Computer and System Sciences 7.4 (Aug. 1973), pp. 448–461. doi: 10.1016/S00220000(73)80033-9. [BY01] Michel L. Balinski and H. Peyton Young. Fair Representation. Meeting the Ideal of One Man, One Vote. 2nd. Brookings Institution Press, 2001. isbn: 978-0-8157-0111-8. [CE14] Zhanpeng Cheng and David Eppstein. “Linear-time Algorithms for Proportional Apportionment.” In: International Symposium on Algorithms and Computation (ISAAC) 2014. Springer, 2014. doi: 10 . 1007 / 978 - 3 - 319 13075-0_46. [GKP94] Ronald L. Graham, Donald E. Knuth, and Oren Patashnik. Concrete mathematics: a foundation for computer science. Addison-Wesley, 1994. isbn: 978-0-20-155802-9. [Puk14] Friedrich Pukelsheim. Proportional Representation. Apportionment Methods and Their Applications. 1st ed. Springer, 2014. isbn: 978-3-319-03855-1. doi: 10.1007/978-3-319-03856-8. [RW15a] Raphael Reitzig and Sebastian Wild. Companion Source Code. revision db43ee7f05. 2015. url: https://github.com/reitzig/2015_apportionment. [RW15b] Raphael Reitzig and Sebastian Wild. Efficient Algorithms for Envy-Free Stick Division With Fewest Cuts. 2015. arXiv: 1502.04048. 13 References [SW11] Robert Sedgewick and Kevin Wayne. Algorithms. 4th. Addison-Wesley, 2011. isbn: 978-0-321-57351-3. url: http://algs4.cs.princeton.edu. 14 A. Our Scope of different Methods of Apportionment A. Our Scope of different Methods of Apportionment As we have seen in Section 2 there are many possible divisor sequences. For our main result (cf. page 7) we follow Cheng and Eppstein [CE14] and require the sequences to be “almost” linear; we should check that we do not unduly restrict the scope of our investigation. We refer to the recent reference work by Pukelsheim [Puk14] and, by extension, to Balinski and Young [BY01] who classify different divisor methods of apportionment in terms of signpost sequences, a concept equivalent to the divisor sequences we use. They distinguish these classes of such sequences (cf. [Puk14, Sections 3.11-12]): • stationary sign-posts of the form s(n) = n − 1 + r with r ∈ (0, 1); • power-mean sign-posts defined by s̃p (0) = 0, s̃p (n) =  (n − 1)p + np 2 1/p , for p 6= −∞, 0, ∞; • and special cases s̃−∞ (n) = n − 1, s̃0 (n) = (n − 1)n, and s̃∞ (n) = n. p It is easy to see that stationary sign-posts correspond do divisor sequences dj = j + β with β ∈ (0, 1) (up to a shift by one); as such, Lemma 2 applies immediateley with α = 1 and β = β = β, and yields a particularly nice (and tight, for our choices of a and a) upper bound on the size of the candidate set A. We cover the special cases as well; see Table 1 for the corresponding sandwich bounds. As for the remaining power-mean sign-posts, the trivial bounds β = 0 and β = 1 already work. One can apply the power-mean inequality and use the slightly better bounds for p ∈ {−∞, −1, 0, 1, ∞} as given in Table 1. Even better bounds can be gleaned from observing that s̃p (n) converges to n − 1/2 from one side, and quickly so; s̃p (1) thus determines either β or β and the other can be chosen as 1/2. In summary, our algorithm SandwichSelect applies to all divisor methods treated by Pukelsheim [Puk14] and Balinski and Young [BY01] B. Lemmata and Proofs Lemma 4: For rank function r(x, A), r(x, A) = n X i=1 bδ −1 (vi · x)c + 1. 15 B. Lemmata and Proofs Moreover, for x < x we have r(x, A) = X bδ −1 (vi · x)c + 1 i∈Ix with Ix = i ∈ {1, . . . , n} | vi > d0 /x .  B.1. Proof of Lemma 4 By eq. (2) on page 6, it suffices to show that {ai,j | ai,j ≤ x} = bδ −1 (vi · x)c + 1 for each i ∈ {1, . . . , n}. Now, if x ≥ ai,j = dj/vi for some j, then vi · x ≥ dj , and so bδ −1 (vi · x)c is the largest index j 0 for which ai,j 0 = dj 0 /vi ≤ x. As dj is zero-based, there are j 0 + 1 ≥ 1 such elements ai,j ≤ x and the equation follows. Otherwise, that is ai,j > x for all j, we have j 0 = bδ −1 (vi · x)c = −1 by iv) and Corollary 1 and the equality holds with 0 on both sides. For the second equality, we only have to show that the omitted summands are zero. So let i ∈ / Ix be given, that is vi ≤ d0 /x. For x < x, we have vi · x ≤ d0 d0 ·x < · x = d0 , x x and hence bδ −1 (vi · x)c = −1 by iv). Lemma 5: Let x > a∗ and assume a and a are chosen so that they fulfill X i∈Ix δ −1 (vi · a) ≤ k − |Ix | X and i∈Ix δ −1 (vi · a) ≥ k. Then, a ≤ a∗ ≤ a. The lemma follows more or less directly; one uses the sandwich bounds on r to show that a < a are infeasible, i. e., r(a) < k, and that a is feasible, and thus all a > a are suboptimal since a∗ is the smallest feasible element in A. B.2. Proof of Lemma 5 As a direct consequence of Lemma 4 together with the fundamental bounds y−1 < byc ≤ y on floors, we find that X i∈Ix δ −1 (vi · x) < r(x, A) ≤ X i∈Ix δ −1 (vi · x) + 1 16  = |Ix | + X i∈Ix δ −1 (vi · x) (7) B. Lemmata and Proofs for any x and all x < x. We can therewith pin down the value of r to an interval of width |Ix | using only δ −1 . We can use this to derive upper and lower bounds on a∗ . We show that smaller a are infeasible and larger a are clearly suboptimal, so the optimal a∗ must lie in between. Let us first consider a < a. There are two cases: if there is a vi , such that vi a ≥ d0 , we get by strict monotonicity of δ −1 r(a) ≤ |Ix | + (7) < |Ix | + X i∈Ix X i∈Ix δ −1 (vi · a) δ −1 (vi · a) ≤ k and a is infeasible. If otherwise vi a < d0 , i. e., a < d0 /vi , for all i, a must clearly have rank r(a) = 0 as it is smaller than any element ai,j ∈ A. In both cases we found that a < a has rank r(a) < k. Now consider the upper bound, i. e., we have a > a. In case a ≥ x, we have a > x > a∗ by assumption and any such a cannot be optimal. Otherwise, for a < x, we have r(a) > (7) X i∈Ix δ −1 (vi · a) ≥ k, so a is feasible. Any element a > a can thus not be the optimal solution a∗ , which is the minimal a with r(a) ≥ k. B.3. Proof of Lemma 2 We consider the linear divisor sequence continuations δ(j) = αj + β and δ(j) = αj + β for all j ∈ R≥0 and start by noting that the inverses are δ −1 (x) = x/α − β/α and δ −1 (x) = x/α − β/α for x ≥ δ(0) = β and x ≥ δ(0) = β, respectively. For smaller x, we are free to choose the value of the continuation from [−1, 0) (cf. iv)); noting that x/α − β/α < 0 for x < β, a choice that will turn out convenient is δ −1 x β (x) := max − , −1 α α   resp. δ −1 x β (x) := max − , −1 . α α   (8) We state the following simple property for reference; it follows from δ(j) ≤ δ(j) ≤ δ(j) and the definition of the inverses (recall that β ≤ α): x β x β − ≤ δ −1 (x) ≤ δ −1 (x) ≤ δ −1 (x) ≤ − , α α α α 17 for x ≥ 0. (9) B. Lemmata and Proofs Equipped with these preliminaries, we compute a = ⇐⇒ αk + β|Ix | . Vx a X β · vi = k + · |Ix |, α i∈I α x ⇐⇒ k = X  vi · a α i∈Ix β − α  X ≤ (9) i∈I x δ −1 (vi · a), so a satisfies the condition of Lemma 5. Similarly, we find a = αk − (α − β) · |Ix | , Vx a · Vx = k − (1 − β/α) · |Ix |, α  X  vi · a X β ⇐⇒ k = |Ix | + ≥ |Ix | + − δ −1 (vi · a), α α (9) i∈I i∈I ⇐⇒ x x that is a also fulfills the conditions of Lemma 5. For the bound on the number of elements falling between a and a, we compute A ∩ [a, a] = X i∈Ix = Ai ∩ [a, a] X  i∈Ix = ≤ j ∈ N0 δ −1 (vi · a) ≤ j ≤ δ −1 (vi · a) X  X i∈Ix X (9) i∈I x ≤ j ∈ N0 j ∈ N0 vi · a ≤ dj ≤ vi · a i∈Ix ≤ δ −1 (vi · a) − δ −1 (vi · a) + 1 δ −1 (vi · a) − δ X  vi · a − β α (9) i∈I x = X 1+ i∈Ix =  X  i∈Ix = dj a≤ ≤a vi  1+ − −1 (vi · a) + 1    vi · a − β +1 α β−β vi · a − vi · a  + α α β−β α  · |Ix | + (a − a) · 18 Vx α C. Implementing the Algorithms = β−β 1+ α   β−β = 2 1+ α  · |Ix | +  (α + β − β) · |Ix | Vx · Vx α · |Ix |. C. Implementing the Algorithms In this section, we review existing algorithms for divisor methods. In particular, we elaborate on how we have implemented them for our experiments [RW15a], and on problems we have encountered in this process. We have taken care not to render the algorithm unnecessarily inefficient in order to perform a fair comparison of running times; the result is to the best of our abilities conditioned on a limited time budget. In particular, all of our implementations have been refined on the programming level to roughly the same degree. For the purpose of a fair comparison, all implementation have to conform to the same interface. Parameters: A pair (α, β) ∈ R2 with α > 0 and β > 0. Input: Votes v and house size k. Output: A (symbolic) representation of all seat assignments valid w. r. t. divisor sequence (αj + β)j≥0 , as well as proportionality constant a∗ . More specifically, the output is encoded as a vector of undisputed seats and a binary vector indicating which parties are tied for the remaining seats. We skip the step from a∗ resp. a valid seat assignment to this representation in the pseudo code since it is elementary: all parties with “current” resp. “next” value vi /dsi −1 resp. vi /dsi equal a∗ are tied. A simple Θ(n)-time post-processing identifies these in all cases. We have established confidence in the correctness of our implementations by extensive random testing [RW15a, TestMain.java]; every implementation has been run on thousands of instances. The correctness of the results has been confirmed, besides rudimentary sanity checks such as matching vector dimensions, by checking Pukelsheim’s Max-Min Inequality [Puk14, Theorem 4.5]. All implementations share the same numerical weakness, though: using fixed-precision arithmetics, two computations that should lead to the same result (say, a∗ ) yield different numbers. We compensate for that by using fuzzy comparisons: we identify numbers if they are within some constant  of each other. Thus, we can reliably identify tied parties, for instance. There is a drawback, though: if distinct values vi /dj are closer than  (or, even without the adaption, the resolution of the chosen fixed-precision number representation), we may identify them and thus compute wrong seat assignments. 19 C. Implementing the Algorithms This issue can not be circumvented on the algorithmic level. The only robust resort we know of is using arbitrary-precision arithmetics, inevitably slowing down all the algorithms. C.1. Iterative Divisor Method Implementing IterativeMethod is straight-forward. An implementation using a priority queue implementation from the standard library runs in time Θ(n + k log n). Since we expect overhead for the queue to be significant for small n, we also implement a variant which determines I using a simple linear scan, resulting in a total running time in Θ(kn). Shared code aside, IterativeMethod takes about 50 resp. 65 lines of code with resp. without priority queues. C.2. Jump-and-Step The jump-and-step algorithm [Puk14, Section 4.6] can be formulated using our notation as follows: Algorithm 3: JumpAndStepd (v, k) : Step 1 Compute an estimator a for a∗ . Step 2 Initialize si = bδ −1 (vi · a)c + 1. Step 3 Iterate similarly to IterativeMethod until I=  arg maxn i=1 vi /dsi , P si < k; arg minn P si > k. i=1 vi /dsi −1 , P si = k with The performance of this algorithm clearly depends on ∆a := si − k after Step 2; the running time is in Θ(n + |∆a | · log n) when using priority queues for Step 3 (which may not be advisable in practice if |∆a | can be expected to be very small). As such, the running time is not per se bounded in n and k. P We follow the recommendations of Pukelsheim and use the estimator [Puk14, Section 6.1] α k + n · (β/α − 1/2), a := · V k + n · bβ/αc,  0 ≤ β/α ≤ 1; else. The first case corresponds to Pukelsheim’s recommended estimator for stationary signpost sequences, the second to his good universal estimator generalized to divisor sequences that are not signpost sequences in the strict sense. The additional factor α rescales the value appropriately; Pukelsheim only considers α = 1. 20 C. Implementing the Algorithms Given that these estimators guarantee |∆a | ≤ n in the worst case, we can assume that JumpAndStep runs in time O(n log n). Furthermore, Pukelsheim claims that the recommended estimator is good in practice in the sense that |∆a | ∈ O(1) in expectation, so JumpAndStep may be efficient in practice for large n as well. Since their proof is limited to uniformly distributed votes and k → ∞, we investigate this in Section 4. Shared code aside, JumpAndStep takes about 120 lines of code, with or without priority queues. C.3. The Algorithm of Cheng and Eppstein Cheng and Eppstein [CE14] do not give pseudocode for the main procedure of their algorithm which would combine the individual steps to compute A(k) . For the reader’s convenience and for clarity concerning our running-time comparisons we give this top-level procedure as we have inferred it. Algorithm 4: ChengEppsteinSelectd (v, k) : Step 1 Compute a suitable finite representation of A. Step 2 C := FindContributingSequences(A, k). Step 3 ξ := s−1 (k) [CE14, (3)]. Step 4 If r(ξ, A) ≥ k then ξ := LowerRankCoarseSolution(A, k, ξ). Step 5 Return CoarseToExact(A, k, ξ). The subroutines are given in sufficient detail in their Algorithms 1 to 3, respectively. The pseudo code given uses some high-level set operations which we did not implement naively due to performance concerns; we compute several steps during a single iteration over the respective sets of sequences. Note that we have (hopefully) fixed an off-by-one mistake in the text. The definition of rank r(x, A) is, “the number of elements of A less than or equal to x”; that is, the rank of A(j) is j + 1 since A is zero-based (the first element is A(0)). However, the authors continue to say that r(x, A) “is the index j such that A(j) ≤ x < A(j + 1).” Regarding performance, Cheng and Eppstein show that their algorithm runs in time Θ(n) in the worst case. Since ChengEppsteinSelect computes a linear number of medians and requires a linear number of evaluations of rank function r(x, A) (with geometrically shrinking |A| – otherwise the algorithm would not run in linear time), it is unclear whether the algorithm is efficient in practice. Shared code aside, ChengEppsteinSelect take about 300 lines of code. By this measure, it is the most complex of the algorithms we consider. 21 C. Implementing the Algorithms Additional Issues with Numerics In addition to the concerns expressed above, there are additional numerical issues when implementing ChengEppsteinSelect using fixed-precision floating-point arithmetics. In short, we have to compute certain floors and ceilings of real numbers exactly or we may compute a wrong result. More specifically, we evaluate r(x, A) several times by computing terms of the form bδ −1 (_)c (cf. Lemma 4). The problem is that the result of δ −1 (_) is non-integral in general, but is integral when the argument evaluates exactly to a dj . With the usual floating-point arithmetic the result might be slightly smaller, though. We then erroneously round down to the next smaller integer – a critical error! In practice, we can add a small constant to the mantissa before taking the floor. This constant has to be chosen large enough to cover potential rounding errors, but also small enough so as to not change subsequent calculations; ChengEppsteinSelect may compute a wrong answer otherwise. This is a very delicate requirement we do not know how to fulfill in general. C.4. SandwichSelect We already discuss our algorithm at length in Section 3. Since we want to investigate practical performance, we implement rank-selection using average-case efficient Quickselect as opposed to using a linear-time algorithm with large constant factors. We want to emphasize that our final algorithm SandwichSelect is conceptually simple in the sense that there is little hidden complexity. We need exactly one call to a rank selection algorithm on a linear-size list which takes five additional linear-time operations to come up with: finding the maximal value v (1) , constructing index set Ix , computing Vx , constructing multiset  and computing k̂. These are all quite elementary tasks in that they use one for-loop each which run for at most n iterations with only few operations in each. We therefore think that we can outperform ChengEppsteinSelect in practice, and should not be far behind JumpAndStep, either. Regarding implementation, the delicate part was to get the bounds on j (cf. Step 6.1) right. We use floor and ceiling functions on real numbers, so rounding errors that occur in fixed-precision floating-point arithmetic can cause harm. We can circumvent this by adding (subtracting) a conservatively large constant to the mantissa of the floats before taking floors (ceilings). If this constant is larger than necessary for covering rounding errors, we might add slightly more candidates to  (at most two per party) which would slightly degrade performance. Correctness, however, is not affected (in contrast to ChengEppsteinSelect). We also remark here that the code [RW15a] for the experimental results discussed in Section 4 is based on an earlier version of Lemma 2 with slightly weaker bounds (cf. 22 D. Experimental Setup Appendix G). Experiments with the updated code are to follow, and might yield slight improvements for SandwichSelect. Shared code aside, SandwichSelect takes about 100 lines of code. By this measure, it is the least complex of the non-trivial algorithms we consider. D. Experimental Setup We have run the experiments with Java 7 on Ubuntu 14.04 LTS running kernel 3.13.0-34generic x86_64 GNU/Linux. The hardware platform is a ThinkPad T430s Tablet with the following core parameters according to lshw. CPU: Intel R CoreTM i5-3320M CPU @ 2.60GHz Cache: L1 32KiB, L2 256KiB, L3 3MiB RAM: 4+4GiB SODIMM DDR3 Synchronous 1600 MHz (0.6 ns) As our code is written in Java, we include a warm-up phase to trigger just-in-time compilation of the relevant methods. All times are measured using the built-in method System.nanoTime(). We use the same set of inputs for all algorithms, all of which have to construct the full set S(v, k) for each input (v, k) during the measurement. In order to increase accuracy, we repeat the execution of each algorithm on each input several times and measure the total time; we then report the average time per execution. For the selection-based algorithms, we use the randomized Quickselect-based implementation by Sedgewick and Wayne [SW11] as published on the book website. We use the (pseudo) random number generators for several distributions from the same library (download of stdlib-package.jar on August 11th, 2015). For reproducing our running time experiments, make sure you have working GNU/Linux2 installation with Ruby, Java 7 and Ant; then execute ruby run_experiments.rb arxiv.experiment for the data represented in Section 4 and Appendix E. Be warned: this may run for a long time, and it will create lots of images (provided you have gnuplot installed). E. More Running-Time Experiments We apologize to only offer draft graphics without commentary for the time being. 2 Our framework may work on other platforms, maybe with small adjustments to the Ruby code, but we have not tried. See README.md for a workaround. 23 E. More Running-Time Experiments Average normalized runtimes for several input distributions and across several orders of magnitudes of n. 24 E. More Running-Time Experiments Normalized runtimes of ChengEppsteinSelect for several input distributions and across several orders of magnitudes of n. 25 E. More Running-Time Experiments Normalized runtimes of JumpAndStep for several input distributions and across several orders of magnitudes of n. 26 E. More Running-Time Experiments Normalized runtimes of SandwichSelect for several input distributions and across several orders of magnitudes of n. 27 E. More Running-Time Experiments Normalized ∆a of JumpAndStep for several input distributions and across several orders of magnitudes of n. 28 E. More Running-Time Experiments Normalized |Â| of SandwichSelect for several input distributions and across several orders of magnitudes of n. 29 E. More Running-Time Experiments Runtimes against ∆a of JumpAndStep for several input distributions and across several orders of magnitudes of n. Each color stands for one n. 30 E. More Running-Time Experiments Runtimes against |Â| of SandwichSelect for several input distributions and across several orders of magnitudes of n. Each color stands for one n. 31 F. Index of Used Notation F. Index of Used Notation In this section, we collect the notation used in this paper. Some might be seen as “standard”, but we think including them here hurts less than a potential misunderstanding caused by omitting them. Generic Mathematical Notation bxc, dxe . . . . . . . . floor and ceiling functions, as used in [GKP94]. M(k) . . . . . . . . . . The kth smallest element of (multi)set/vector M (assuming it exists); if the elements of M can be written in non-decreasing order, M is given by M(1) ≤ M(2) ≤ M(3) ≤ · · · . Example: For M = {5, 8, 8, 8, 10, 10}, we have M(1) = 5, M(2) = M(3) = M(4) = 8, and M(5) = M(6) = 10. M (k) . . . . . . . . . . Similar to M(k) , but M (k) denotes the kth largest element. x = (x1 , . . . , xd ) . . . to emphasize that x is a vector, it is written in bold; components of the vector are written in regular type. M . . . . . . . . . . . to emphasize that M is a multiset, it is written in calligraphic type. M1 ] M2 . . . . . . . multiset union; multiplicities add up. Notation Specific to the Problem party, seat, vote (count), chamber size Parties are assigned seats (in parliament), so that the number of seats si that party i is assigned is (roughly) proportional to that party’s vote count vi and the overall number of assigned seats equals the chamber size k. d = (dj )∞ j=0 . . . . . . the divisor sequence used in the highest averages method; d must be a nonnegative, (strictly) increasing and unbounded sequence. δ, δ −1 . . . . . . . . . a continuation of j 7→ dj on the reals and its inverse, both of which can be evaluated in constant time. n . . . . . . . . . . . . number of parties in the input. v, vi . . . . . . . . . . v = (v1 , . . . , vn ) ∈ Qn>0 , vote counts of the parties in the input. V . . . . . . . . . . . . the sum v1 + · · · + vn of all vote counts. k . . . . . . . . . . . . k ∈ N, the number of seats to be assigned; also called house size. s, si . . . . . . . . . . s = (s1 , . . . , sn ) ∈ N0 , the number of seats assigned to the respective parties; the result. ai,j . . . . . . . . . . . ai,j := dj /vi , the ratio used to define divisor methods; i is the party, j is the number of seats i has already been assigned. 32 G. Changelog Ai . . . . . . . . . . . For party i, Ai := {ai,0 , ai,1 , ai,2 , . . .} is the list of (reciprocals of) party i’s ratios. a . . . . . . . . . . . . We use a as a free variable when an arbitrary ai,j is meant. A . . . . . . . . . . . . A := A1 ] · · · ] An is the multiset of all averages. r(x, A) . . . . . . . . . the rank of x in A, that is the number of elements in multiset A that are no larger than x; r(x) for short if A is clear from context. a∗ . . . . . . . . . . . . the ratio a∗ = ai∗,j ∗ selected for assigning the last (i. e. the kth) seat; corresponds to s by si = r(a∗ , Ai ); a∗ = A(k) (cf. Section 2 and Section 3). x . . . . . . . . . . . . an upper bound x > a∗ ; we use x = dk−1 /v1 + ε, where ε > 0 is a suitable constant. Ix . . . . . . . . . . . . Ix := {i | vi > d0 /x}; the set of parties i whose vote count is large enough, so that ai,0 < x, i. e. so that they contribute to the rank of x in A. Vx . . . . . . . . . . . the sum of the vote counts of all parties in Ix . Ax . . . . . . . . . . . the elements in A that are smaller than x, i. e., A ∩ (−∞, x). a, a . . . . . . . . . . . lower and upper bounds on candidates a ≤ a ≤ a such that still a∗ ∈ A ∩ [a, a]. G. Changelog The following (substantial) changes have been made from arXiv version 2 to 3. • Lemma 2 has been strengthened; both a and the upper bound on |A ∩ [a, a]| have been improved. Both changes are due to the observation that we could require β ≤ α without loss of generality. Related notation update: (β̌, β) (β, β). • We have added Appendix A in order to clarify that the assumptions we make for our main result do restrict the scope of divisor methods we cover by too much. 33
8cs.DS
Histogram of Oriented Depth Gradients for Action Recognition Nachwa ABOU BAKR1 James CROWLEY2 Univ. Grenoble Alpes, INRIA, Grenoble INP, CNRS, Laboratoire LIG 1 [email protected] 2 [email protected] arXiv:1801.09477v1 [cs.CV] 29 Jan 2018 Résumé Cet article présente des expériences menées sur la perception de la profondeur de mouvements dans le cadre de la reconnaissance visuelle d’actions à partir de mesures locales extraites de séquences vidéo RGBD encodées selon la norme MPEG. Nous démontrons que ces mesures peuvent être combinées avec des descripteurs RGB spatio-temporels locaux pour l’élaboration d’une méthode de calcul efficace pour la reconnaissance d’actions. Des vecteurs de Fisher sont utilisés pour encoder et concaténer un descripteur de profondeur avec les descripteurs existants RGB locaux. Ces vecteurs sont ensuite utilisés pour la reconnaissance d’actions manuelles à l’aide d’un classifieur linéaire SVM. Nous comparons l’efficacité de ces mesures à l’état de l’art sur deux jeux de données récents pour la reconnaissance d’actions dans des environnements culinaires. Mots Clef Vision, Profondeur, Reconnaissance d’Actions, Codage MPEG. Abstract In this paper, we report on experiments with the use of local measures for depth motion for visual action recognition from MPEG encoded RGBD video sequences. We show that such measures can be combined with local space-time video descriptors for appearance to provide a computationally efficient method for recognition of actions. Fisher vectors are used for encoding and concatenating a depth descriptor with existing RGB local descriptors. We then employ a linear SVM for recognizing manipulation actions using such vectors. We evaluate the effectiveness of such measures by comparison to the state-of-the-art using two recent datasets for action recognition in kitchen environments. Keywords Vision, Depth, Action Recognition, MPEG encoding. 1 Introduction Visual action recognition is the process of labelling image sequences with action labels. In this work we investigate the use of dense local descriptors for action recognition. Dense sampling has been shown to improve results when compared to sparse interest points for action recognition [3]. Requirements for reduced computational time have lead some authors to investigate methods that extract motion vectors directly from compressed video signals. For example, methods have been proposed to extract flow directly from MPEG encoded video [4]. The resulting method has been shown to provide useful description of Dense Trajectories (DT) [5], at the cost of some loss of recognition accuracy. This has led us to ask if this approach can be extended to provide fast computation of dense local descriptors from the depth channel of MPEG encoded RGBD image sequences. In the following, we report the results on experiments in recognition of action labels using features extracted from depth channel of Kinect-like sensors using MPEG encoded motion flow. We describe a new descriptor based on oriented gradients of depth extracted from the motion channel of RGBD image sequences. This descriptor is used in addition to the MPEG Flow (MF) descriptors based on the RGB channels from the same sequence. Local video descriptors using Dense Trajectories [5] and MPEG Flow [4] are employed as baseline descriptors for comparison. DT, as a video descriptor for action recognition, starts by sampling interest points densely at regular fixed grids. Detected interest points are then tracked over time and points for which no motion is detected are eliminated. This set of trajectories are then used as space-time interest points and descriptors are computed around those points. Four descriptors have been used in DT : Histogram of Oriented Gaussian (HOG), Histogram of Optical Flow (HOF), Motion Boundary Histogram in x,y directions (MBHx , MBHy ). An analysis on computational requirements of DT shows that 61% of the running time is spent on the computation of optical flows. Reducing this computational burden is an interesting challenge. The MF method exploits the estimated motion vectors used for video compression and uses them as interest points. This change provides a significant improvement in the time required for extraction of features at the cost of a small decrease in recognition accuracy [4]. Both DT and MF are video descriptors computed around motion trajectories. The primary differences between these two methods are that the interest points to be described in MF are at sparse positions of motion fields. In DT, points are sampled at the positions of a regular fixed grid, and they are tracked over time to build trajectories. Motion is encoded in DT using Gunnar-Farnebäck optical flows while MF uses estimated motion fields during video compression. Our goal is to determine if it is possible to improve MF results by exploiting data from depth channel of Kinect-like sensors. 2 Histogram of Oriented Depth Gradients Depth can capture the structural features of objects. In addition to encoding the position of objects in space. Thus it is reasonable to ask if we can improve the results of MF video descriptor by including the depth channel to better describe the scene. To do so, we compute gradients of depth which encodes the structure of the depth image. As in MF, interest points are a sparse set of points extracted while compressing video. This ensures describing area around motion points. Practically, a volume of 32 × 32 × 15 is computed around interest points. This volume is divided by a grid of 2 which produces a grid cell of 16 × 5. For each grid cell, we extract the gradients by applying the Sobel filter [1, 0, −1] in a 16 × 16 pixels. Then, an 8-orientation bins discretized histogram is built to encode the gradient orientations. Gradient magnitudes are used to weight the gradient orientations. For each temporal slice the gradient is normalized using l2-normalization. After that descriptors are encoded by transforming the collection of local video descriptors {xi , . . . , xN } into a fixedsize vector representation. Following [4], we chose to use Fisher Vectors (FV) [6] for descriptor encoding. In particular, only first-order differences of FV are used. Action categories are then classified by a linear one-vs-rest SVM classifier. 3 Experiments Experiments are performed on two publicly available datasets : 50 salads [1] and Actions of Cooking Eggs (ACE) [2]. For 50 salads dataset ; we used provided annotations of core actions only as verbs without taking into account their corresponding objects ; in total, we used 6 different action labels. ACE also provides 6 different annotated actions but only one level of granularity which includes pre- and post movements of performed actions. For the evaluation, we measured the mean of Average Precision (mAP). We consider two image sequences ; one provides an RGB view of the scene and the other encodes scene depth. To study the impact of motion depth image sequences in describing actions, we extracted a Histogram of Oriented Depth Gradients (HODG) from depth image sequences. We extracted as well RGB descriptors of DT 1 and MF 2 . Combining both descriptors improves the results of MF method on two datasets as shown in Table 1 where RGB+HODG is a concatenation of encoded descriptors by FV. We compare the results to DT since MF follows the same structure and set of descriptors. DT approach achieved the best results in this experiment at the cost of the computation time. In the other hand, adding HODG to MF descriptors achieves better results than [4] while preserving the computational cost 3 . Table 2 shows the number of processed frames per second while computing both RGB-based and HODG using the implementation of DT and MF. From the tables, we can also see that HODG alone performs relatively good in action recognition. DT(RGB) MF(RGB) MF(HODG) MF(RGB+HODG) 50salads 99.60% 90.56% 86.29% 94.73% ACE 94.12% 92.04% 89.94% 99.15% TABLE 1 – The results of our experiments using mAP. RGB (HOG, HOF, MBH) Depth (HODG) DT (fps) 3.87 6.41 MF (fps) 27.78 111.13 TABLE 2 – The number of processed frames per second while descriptors extraction for 50 salads dataset. that can be treated in parallel with no additional cost or sequentially while preserving a close to real-time capability. The idea is to combine the gradients of depth image sequences (HODG) extracted at sparse motion fields which are estimated in video compression to the set of RGB descriptors of MF [4]. Both RGB and Depth descriptors are encoded using FV. We found that trajectories of depth image sequences, described by HODG, can describe manipulation actions with an acceptable recognition precision. To this end, we evaluated our proposed method on two recent datasets ; 50 salads, and ACE. We recorded the computational time during extraction of descriptors using both methods. Results show a significant improvement in recognition precision with almost no significant additional cost. Références [1] Stein, S. and McKenna, S.J. "Combining embedded accelerometers with computer vision for recognizing food preparation activities." Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing. ACM, 2013. [2] Shimada, A., Kondo, K., Deguchi, D., Morin, G. and Stern, H. "Kitchen scene context based gesture recognition : A contest in ICPR2012". Advances in depth image analysis and applications. Springer Berlin Heidelberg, 2013. 168-185. [3] Wang, H., Ullah, M.M., Klaser, A., Laptev, I. and Schmid. "Evaluation of local spatio-temporal features for action recognition". BMVC 2009-British Machine Vision Conference. BMVA Press, 2009. [4] Kantorov, V. and Laptev, I. "Efficient feature extraction, encoding and classification for action recognition". In Proc. Computer Vision and Pattern Recognition (CVPR), IEEE, 2014. [5] Wang, H., Kläser, A., Schmid, C. and Liu, C.L. "Action recognition by dense trajectories". Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference 4 Conclusion on. IEEE, 2011. [6] Sánchez, J., Perronnin, F., Mensink, T. and Verbeek, In this work, we reported an improvement of the results of J. "Image classification with the fisher vector : Theory MF method by using the benefit of depth channel in Kinectand practice". International journal of computer vision like sensors. Since depth channels provide separate images 105.3 (2013) : 222-245. 1. https://lear.inrialpes.fr/people/wang/dense_trajectories [7] Pedregosa, Fabian, et al. "Scikit-learn : Machine lear2. https://github.com/vadimkantorov/cvpr2014 ning in Python." Journal of Machine Learning Research 3. Each channel of the sensor can be treated individually in the descriptor extraction process 12.Oct (2011) : 2825-2830.
1cs.CV
Classifying Time-Varying Complex Networks on the Tensor Manifold Romeil Sandhu [email protected] arXiv:1708.07904v1 [cs.SY] 25 Aug 2017 Departments of Biomedical Informatics, Computer Science and Applied Mathematics/Statistics Stony Brook University, Stony Brook, NY 11794 Abstract At the core of understanding dynamical systems is the ability to maintain and control the systems behavior that includes notions of robustness, heterogeneity, and/or regimeshift detection. Recently, to explore such functional properties, a convenient representation has been to model such dynamical systems as a weighted graph consisting of a finite, but very large number of interacting agents. This said, there exists very limited relevant statistical theory that is able cope with real-life data, i.e., how does perform simple analysis and/or statistics over a “family” of networks as opposed to a specific network or network-to-network variation. Here, we are interested in the analysis of network families whereby each network represents a “point” on an underlying statistical manifold. From this, we explore the Riemannian structure of the statistical (tensor) manifold in order to define notions of “geodesics” or shortest distance amongst such points as well as a statistical framework for time-varying complex networks for which we can utilize in higher order classification tasks. 1. Introduction Notions of robustness, heterogeneity, and phase changes are ubiquitous concepts employed in understanding complex dynamical systems with a variety of applications [1, 2, 3, 4]. This is seen in Figure 1. While recent advancements in network analysis has arisen through the usage of spectral techniques [5], expander graphs [6], percolation theory [7], information theoretic approaches [8, 9], scale-free networks [4], and a myriad of graph measures reliant on the underlying discrete graph space (e.g., degree distribution [10], shortest path [8], centrality [11, 12, 13]), such measures rarely incorporate the underlying dynamics in its construction. Limitations of such static measures can be more aptly seen in multilayer networks whereby standard network measures are immediately ambiguous; shortest paths Figure 1. This work focuses on the exploiting the underlying geometry in a statistical framework to elucidate regime-shifts and bifurcation detection in dynamical systems. We apply our analysis towards broader cell differentiation and signaling promiscuity in biological systems with cancer applications (e.g., inducing terminal homogeneous state from a pluripotent stem-cell like state) (geodesics) are non-trivial [14] while centrality measures [15], clustering methods [16], and diffusion models [17] require simplifications to make sense of real-world configurations. Moreover, static properties have been unable to model time-varying nonlinear higher order effects (e.g., targeted therapy [18], cellular reprogramming [19]) which can be seen pictorially in Figure 1 and Figure 2. This is akin to waterbed theory which refers to the observation of when a complex behavior is “pushed” down, the invariable effect of complexity causes for that behavior to “pop-up” elsewhere [20]. To this end, we have previously developed fundamental relationships between network functionality [8, 21] and certain topological and geometric properties of the corresponding graph [22, 23]. In particular, recent work of ours has shown the geometric notion of curvature (a measure of “flatness”) is positively correlated with a system’s robustness or its ability to adapt to dynamic changes [24, 25]. This can be seen in Figure 3A. In this regard, network curvature may relate to anomaly detection [26], congestion in communication [27, 28], drug resistance [29], supply chain risk [30], to Figure 2. Current modeling of static network properties leads to ill-posed “whack-a-mole”-based solutions whereby to alter functionality, one “whacks” a vulnerabilities of a system at a given time t. However, due to heterogeneity, this leads to new vulnerabilities and further (perhaps accelerated) breakdown via feedback. even systemic risk in banking systems [31, 32]. Moreover, this is particularly compelling since curvature can be readily computed for large-scale networks using theory from optimal mass transport [33], and more importantly, highlights the significance of employing geometry in network analysis. This said, there exists very limited relevant statistical theory that is able cope with a family of networks and one often focuses on a given network or is limited to measures that exploit network-to-network variations as it pertains to functionality. Here, we are interested in expounding upon previous work [24] in order to exploit statistics over a family of networks such that higher order classification tasks can be performed to better understand regime shifts. To do so, we are interested in studying geometry of networks as a dynamical system that evolves over time in which each given network or observation may represent a “point” (encoded by some matrix-based positive definite model) on an underlying Riemannian manifold. From this, we are interested in defining geodesics such that distances between “points” (networks) in a given a family can be measured and proper statistical analysis can be achieved. For a broad range of problems, such information may include, but not limited to, vector-valued time series, power spectral density [34], to density matrices from quantum mechanics that aptly describes the mixed state of the system [35]. In general, the set of Hermitian positive definite (PD) matrices plays a fundamental role in a variety of engineering applications with the most recent attention renewed on developing lower order statistics [36, 37, 38, 39]. In relationship to this mathematical structure, significant related work on employing statistical analysis for Riemannian manifolds has focused on directional statistics, statistics on shape spaces, as well as specific manifolds - we refer the reader [40, 41, 42] and references therein. This being said, while these methods are mostly extrinsic whereby one embeds the manifold in an ambient Euclidean space, we are interested in studying intrinsic Riemannian metrics that can be naturally applied to the network setting without restrictions on the network topology. For example, from a network geometric per- spective, there has been very interesting work modeling the space of tree-like structures in understanding phylogenetic trees for cancer and evolutionary biology [43, 44]. Recently, phylogenetic trees were shown to live in a negatively curved space [43] resulting in a new push to develop an appropriate statistical framework (i.e., if a manifold is negatively curved, then one can define a unique geodesic). This has led to methods in hierarchical learning and clustering [45]. Nevertheless, as seen in Figure 4, non tree-like networks still “live” upon some Riemannian (statistical) manifold for which we need to construct a framework capable of resolving unique geodesics (shortest path) amongst such points. In turn, we can then perform statistics on this space allowing us to classify certain behaviors and operating regimes which will be key to maintaining control and avoiding shotgunbased solutions during “black swan” events [46] whereby the continuous failing of interacting agents may result in catastrophic failure. The remainder of the present paper is outlined as follows: In the next section, we first provide important preliminaries in motivating the theoretical need of understanding geometry by revisiting curvature and entropy as it pertains to functionality. Here, we see that changes in the geometry provides intrinsic information about the dynamic system and thus, its exploration fits towards a larger program developed in this paper and current related work [24, 25]. From this, Section 3 lays the foundation of a Riemannian framework previously employed for Diffusion Tensor Imaging whereby we now adapt such notions towards complex networks. Then, Section 4 presents preliminary results on synthetic and biological data. We conclude with a summary and future work in Section 5. 2. Geometry and System Behavior To illustrate how geometry elucidates the functional behavior of a dynamical system and how such ingredients are ever-important the analysis and control of time-varying networks, let us revisit optimal mass transport (OMT) [33]. Figure 3. Visual illustration of curvature. (A) The thematic and motivating vision of this work is based on the above-illustrated result [24, 25]. (B) Other forms of curvature that play important roles in (projective) geometry and machine learning. The first notion of OMT was proposed by Gaspar Monge in 1781 with the concern of finding the minimal transportation cost for moving a pile of soil from one site to another. The modern formulation, given by Kantorovich, has been ubiquitously used in fields of econometrics, fluid dynamics, to shape analysis [33, 47, 48] and recently, has received a renewed mathematical interest [49, 50]. More formally, let (X, µ0 ) and (Y, µ1 ) be two probability spaces and let π(µ0 , µ1 ) denote the set of all couplings on X × Y whose marginals are µ0 and R µ1 . As such, the Kantorovich costs seeks to minimize c(x, y)dπ(x, y)∀π ∈ π(µ0 , µ1 ) where c(x, y) is the cost for transporting one unit of mass from x to y. The cost originally defined in a distance form on a metric space leads to the Lp Wasserstein distance as follows:  Wp (µ1 , µ2 ) := Z Z inf  p1 d(x, y) dµ(x, y)) p µ∈π(µ0 ,µ1 ) (1) From this, let us begin considering M to be a Riemannian manifold for which “points” are now defined Z  P := µ ≥ 0 : µ dvol(M ) = 1 Z (2)  Tµ P := η : η dvol(M ) = 0 as the space of probability densities and the tangent space at a given point µ, respectively. Due to the work of Benamou and Brenier [48], one can naturally compute the geodesic (in the Wasserstein sense) between two densities µ0 , µ1 ∈ P as the below optimal control problem: Z Z 1 inf µ(t, x)k∇g(t, x)kdtdvol(M ) µ,g 0 subject to ∂u + div(µ∇g) = 0 ∂t  µ(0, .) = µ0 , (3) µ(1, .) = µ1 which leads us to give P a Riemannian structure due to some very nice work of Jordan et. al [51]. Armed with this, we are now able to see how changes to the underlying geometry (namely curvature) may serve as a proxy for system behavior (namely functional robustness). As such, let Z H(µt ) := log µt dvol(M ) (4) M represent Boltzmann entropy where the dependency on x has been dropped for convenience and we consider a family of densities evolving over time. Taking the second variation with respect to time t in the Wasserstein sense (i.e., our gradient steps are taken to minimize or maximize the Wasserstein distance rather than the classical Euclidean norm) and noting that, by construction, η := ∂µ ∂t |t = 0, we have that d2 H(µt )|t=0 = hHess(H)(η), ηiW dt2 Z  1 =− h∇gη , ∇∆gη i + ∆ k∇gη k2 µ0 dvol(M ) (5) 2 M where µ0 and gη satisfy equation (3). Using the Bochner formula [54], which relates harmonic functions on a Riemannian manifold to Ricci curvature (a geometric measure of “flatness” and herein denoted as “Ric”), we can further assume Ric ≥ kI as quadratic forms where k is a constant and I is the identity matrix. Then, due to a beautiful result of Sturm [53] as well as Lott and Villani [33], one can show that the Hess(H) is k-convex with respect to the Wasserstein norm: H(µt )≤ tH(µ0 )+(1 − t)H(µ1 ) − φ(k, t, µ0 , µ1 )∀t ∈ [0, 1] (6) where the right hand portion of the above equation denoted as φ(.) can be shown to be φ(k, t, µ0 , µ1 ) = k2 t(1 − t)W2 (µ0 , µ1 )2 allowing for k-convexity. That is, changes in entropy and curvature are positively correlated, i.e., ∆H × ∆Ric ≥ 0. Now, let p (t) denote that probability that the mean of a given observable deviates by more than  from the original (unperturbed) value at time t. Then from large deviations theory, one can define a rate function as:   1 R := lim − log p (t) (7) t→∞,→0 t Therefore, a large R means a fast return to the original state (robustness), and a small R corresponds to a slow return (fragility). In thermodynamics, it is well-known that entropy and rate functions from large deviations are closely related [21]; the Fluctuation Theorem [8] is an expression of this fact for complex networks and may be expressed as ∆H × ∆R ≥ 0. With the result of equation (6), we have ∆Ric × ∆R ≥ 0 (8) which states that changes in Ricci curvature are positively correlated to changes in robustness. Perhaps more importantly, the manner in which the underlying geometry changes elucidates certain behaviors of a complex dynamical system and this stylized fact, sets the motivation for this note in which we attempt to generalize statistics to a family of networks that live on a certain manifold. 2.1. Scalar Model: Network-to-Network Analysis As highlighted in the previous section, geometry of networks plays an integral role in understanding functionality. In particular, in the scalar case with the structure given by equation (2), one can discretely defined Ricci Curvature (due to Ollivier [22]) between any two “points” x and y as: κ(x, y) := 1 − W1 (µx , µy ) d(x, y) (9) This definition, motivated by coarse geometry, is applicable to the graph setting whereby the geodesic distance d(x, y) is given by the hop metric and W1 can be computed simply via linear programming [55]. However, this measure is limited to local network-to-network variation as opposed to a family of networks and as such, we require a generalization to the matrix valued setting; a non-trivial problem that has been recently studied [50]. Therefore, this note and latter (future) work will seek to construct matrix-valued curvature based measures. To do so, we first need notion of matrixvalued distance dM (x, y). 3. Manifold of Time-Varying Networks This section will introduce a framework capable of defining statistics on a family of networks as seen in Figure 4. 3.1. Geodesics on the Network Manifold Consider a dynamical system that evolves over time and whose information is encapsulated by a positive definite matrix (tensor). In this regard, it is well-known that the space of tensors is not a vector space, but instead forms a Riemannian manifold M [56]. In particular, we will leverage the theory of symmetric spaces which has been extensively studied since the seminal work of Nomizu [57]; a comprehensive work on tensor manifolds can be found in [58, 59]. Riemannian manifolds are endowed with a metric that smoothly assign to each point ρ ∈ M an inner product on Tρ , the tangent space to M at ρ. More formally, let us denote Υ and Υ+ and as the set of all Hermitian matrices and the cone of positive-definite matrices, respectively. We may then define an analogous structure to equation (2) as:  Λ+ := ρ ∈ Υ+ | tr(ρ) = 1  Tρ := χ ∈ Υ | tr(χ) = 0 (10) where Λ+ represents our space of networks and Tρ is the corresponding tangent space. From this, we let the observations of our dynamic system be recorded as {ρ0 , ρ1 , ρ2 , ..., ρt } and where each “point” (network) ρi ∈ Υ+ is given by a tensor. As seen in Figure 4, we need a sensible notion of distance that is dependent on the underlying geometry to define statistics for classification. To do, one defines the exponential map as the function that maps → + to each vector − ρ− 0 ρ1 ∈ Tρ0 , the point ρ1 ∈ Λ on the manifold M that is reached after unit time by the geodesic starting at ρ0 with this tangent vector. The exponential map, herein denoted as expρ : Tρ 7→ M at point ρ is defined on the whole tangent space and for the particular space of tensors, this map is also one-to-one. Moreover, one can also define a unique inverse map denoted as the logarithm map Logρ0 : M 7→ Tρ0 that maps a point ρ1 ∈ M to the unique tangent vector χ ∈ Tρ0 at ρ0 whose initial velocity is that of the unique geodesic γ with γ(0) = ρ0 and γ(1) = ρ1 . Thus, the problem of classifying time-varying networks amounts to being able to properly computing geodesics on this space and for which, we must now consider a family of curves γ(t) on the manifold and its speed vector γ̇(t). Then, in the general setting, our geodesic will be a curve that realizes the minimum distance (length) between any two points, e.g., ρ0 and ρ1 . That is, we want to compute: Lρρ10 = min γ Z ρ1 ρ0 Z ρ1 = min γ kγ̇(t)kγ(t) dt   hγ̇(t), γ̇(t)iγ(t) (11) ρ0 where γ(0) = ρ0 and γ(1) = ρ1 . Given this, we seek to exploit the Riemannian structure of the tensor space proposed by Pennec [59] towards the network setting; most recently used in Diffusion Tensor Imaging [60, 61]. Here, authors utilize a result from differential geometry regarding geodesics for invariant metrics on affine symmetric spaces [62, 63] together with the Sylvester equation from control, to propose an affine invariant metric whereby the unique geodesic curve from point ρ (and at the origin) on our network manifold with a tangent vector χ can be shown to be 1 1 1 1 γ(t)(ρ,χ) = ρ 2 exp(tρ− 2 χρ− 2 )ρ 2 γ(t)(I,χ) = exp(tχ) (12) Figure 4. (A) To understand more global functionality, we treat time-varying networks as “points” on a manifold. (B) The study geodesics is needed in order to compute a statistical framework for a family of networks. (C) Manifold of Positive Definite Matrices P+∞ k where exp(χ) = k=0 = χk! is the usual matrix exponential. From this, the speed vector γ̇(t) can be computed: dγ(t) d = exp(tχ) dt dt  tχ e 1,1 d  0 Q = dt 0 0 etχ2,2 0  = QDIAG χi exp(tχi ) QT 1  ! ... 0 T  ... 0 Q ... etχn,n 1 Σ= = exp(tχ) 2 χ exp(tχ) 2 ) 1 2 = γ(t)(I,χ) ?χ (13) T where the A ? B = ABA . Noting the geodesic γ(t)(ρ,χ) between any two points ρ0 , ρ1 ∈ M where ρ1 = expρ0 (χ) at t = 1, the logarithm map can be seen as 1 −1 −1 1 γ(1)(ρ0 ,χ) = ρ1 = ρ02 exp(ρ0 2 χρ0 2 )ρ02 −1 −1 −1 It has been noted that although no closed form expression for the mean exists, the above converges towards a steadystate solution in a few iterations. As in the traditional Euclidean distance and similar to the Karcher or Frechet mean, the above mean is constructed on the premise that we seek a “point” the sum of squared distance.e., PN that minimizes 2 ρ = dist (ρ, ρ ). In a similar fashion, the variance i i=1 can be computed as follows: − 12 log(ρ0 2 ρ1 ρ0 2 ) = ρ0 2 χρ0 1 1 −1 −1 → ρ02 log(ρ0 2 ρ1 ρ0 2 )ρ02 = χ = − ρ− 0 ρ1 = Logρ0 (ρ1 ) (14) From this, the distance between networks can finally be computed as dist2 (ρ0 , ρ1 ) = kLogρ0 (ρ1 )k2ρ0 −1 −1 = klog(ρ0 2 ρ1 ρ0 2 )k22 . (15) We now have a natural distance that measures the length of the geodesic curve that connects any two “points” on our network manifold. This is particularly important as we can now begin to perform statistics over a family of networks. 3.2. Mean, Variance, Mahalanobis Distance Given the above geodesic distance, one can formulate necessary statistics on our network manifold. Using the framework established by Pennec [59] with the above affine invariant metric, the unique mean ρ̄ of N “points” {ρ0 , ρ1 , ρ2 , ..., ρN } on the tensor manifold can be computed via gradient descent:  X N  1  1 1 1 − −1 ρ̄t+1 = ρ̄t2 exp log ρ̄t 2 ρi ρ̄t 2 ρ̄t2 (16) N i=1 N  T 1 X Vecρ̄ Logρ̄ (ρi ) Vecρ̄ Logρ̄ (ρi ) (17) N − 1 i=1  where Vecρ̄ (ρi ) = VecI log(ρ̄ ? ρi ) and where the operation VecI (A) is a vectorized projection of the independent coefficients of our √ tensor in√the above√formulation, i.e., VecI (A) = (a1,1 , 2a1,2 , ... 2a1,n , ... 2an−1,n , an,n ). From this, one obtains a generalized form of the Gaussian distribution on the tensor manifold as:   1 N(ρ̄,Σ) (ρi ) = k exp ξ(ρ̄,Σ) (ρi ) (18) 2 where ξ(ρ̄,Σ) represents the classic Mahalanobis distance now defined in the Riemannian setting as seen below T  ξ(ρ̄,Σ) (ρi ) = Vecρ̄ Logρ̄ (ρi ) Σ Vecρ̄ Logρ̄ (ρi ) . (19) While the above provides a few basic tools, we have omitted, for the sake of brevity varying other advantages that can be employed towards the network setting through the framework established above. This will be a subject of future work in which powerful tools, previously employed for DTI imaging, will now be used to exploit time-varying networks. Of course, to do so, we need to define our matrixbased model that will allow for networks to be represented on the tensor manifold. This is discussed next. 3.3. Matrix-Based Model: Graph Laplacian Given that we are focused network control, we employ an approximated graph Laplacian as our matrix-based model whose structure provides a global representation of a given network with many useful properties that are intrinsically tied to system functionality. While a complete review Figure 5. (A) Graphical view of the three synthetic “toy” graphs that can be representative of varying types of communication networks, each with 200 nodes and 400edges (i.e., only topology changes). (B) Distances of network-to-network under varying weights or “noise.” We see that the proposed framework is able to properly quantify difference as compared to Euclidean measure, i.e., the star-like network is “closest” to the random network as supported in [8, 24]. is beyond the scope of this note (we refer the reader to [5]), a few areas that have garnered attention have included construction of expander graphs [6] to Cheegers inequality with increasing attention on connections between spectral graph theory and its respective geometry [64]. Mathematically, one can define the Laplacian P operator for a specific network as ∆f (x) = f (x) − y f (y)µx (y) with f being a realvalued function which coincides with the usual normalized graph Laplacian given by: 1 1 L = I − D− 2 AD− 2 (20) It is interesting to note in this connection that if k ≤ κ(x, y) is a lower bound for Ricci curvature defined in equation (9), then the eigenvalues of Laplacian is bounded k ≤ λ2 ≤ ... ≤ λN ≤ 2 − k [64]. This relationship is important since 2 − λN measures the deviation of the graph from being bipartite, i.e., a graph whose vertices can be divided into two disjoints sets U and V such that every edge connects a vertex in U to one in V . As such ideas appear in resource allocation and control, the study of such structures in the time-varying setting motivate our focus on the Laplacian matrix. Lastly, while one can form a normalized Laplacian with unitary trace, we note that the Laplacian matrix by definition is a positive semi-definite matrix. Therefore, to enforce positive definiteness, we utilized an approximated Laplacian L̂ := L + L I where 0 < L << 1 such that xT L̂x > 0 for all nonzero x ∈ Rn . 4. Results We now present preliminary results. While these experiments are by no means exhaustive (and will be extended), these results highlight potential of the above framework for time-varying network analysis. 4.1. Toy Network Configurations To provide initial intuition of the proposed framework, we constructed three toy “communication” based networks. As one can see in Figure 5, the networks are composed of 200 nodes and 400 edges with varying topology that represents a chain, a random, and a star-like network. Similar to our earlier work [24], we are interested in using the proposed framework to measure distances amongst these structures under varying “noise”. As highlighted by network curvature [24] and network entropy[8], one should expect from a communication perspective the star-like network is “closer” to a “random” network. That is, given that their functional properties such as robustness (a measure of “flatness”) are similar compared towards the chain-like network, we should expect that such networks on the manifold lie closer to one another. This is exactly what is shown in Figure 5B. Moreover, as we move from an unweighted graph to a weighted graph in which weights are chosen randomly in a uniform manner, this relationship still holds. On the other hand, if we utilize the classical Euclidean distance (Frobenius norm) to measure network-to-network distance, we find that the chain-like network is in fact “closer” to the star-like network. From a communications perspective, this does not make sense and highlights the proposed framework. Lastly, it is interestingly to see that as we increase the support of weight selection, the distances between such networks increases as to be expected. 4.2. Scale-Free and Random Networks This section presents clustering results and the importance of exploiting the underlying geometry as it relates scale-free networks. In particular, we generate 50 scale-free networks (i.e., degree distribution follows power law) [1] and 50 random (Erdos-Renyi) networks with each network composed 200 nodes and 1164 edges (differences are only in topology). Such scale-free networks stylistically could represent “business as usual” behavior while such random networks may represent a particular crisis in which structure (correlation of agents) breaks down. From this, one can generate an approximated normalized graph Laplacian Figure 6. Heat map of distances between scale-free and random networks measured by the proposed Riemannian metric to that of the Frobenius norm. (B) Average distance of network-to-network under varying weights or “noise.” We see that the proposed framework is able to properly quantify difference as compared to Euclidean measure. Note: Each random and scale-free network possess same number of nodes and edges, only topology changed. as defined in Section 3.3 whereby each network now represents a point on our tensor manifold. In doing so, we compute pairwise distances amongst all potential network pairs based on the Euclidean distance, defined by the Frobenius norm, as well as the Riemannian distance, defined by equation (15). Figure 6A presents a “heat map” of the distances. As one can see, Euclidean distance fails to cluster networks as the distance between scale-free to random networks are “closer” than random to random networks. The framework proposed here is able to properly cluster the aforementioned networks highlighting the thematic importance of using Riemannian geometry when exploiting distances and/or similarity measures. Figure 6B also presents average distances amongst scale-free-to-scale-free, randomto-scale-free, and random-to-random networks. Lastly, we note that if the above experiments were repeated and/or the number of nodes/edges were changed, the clustering result would still hold. 4.3. Waddingtons Landscape: Cell Differentiation In this section, we now turn our attention in utilizing the proposed framework towards a regime shifts of cellular differentiation of Waddington’s Landscape as depicted in Figure 1. This epigenetic landscape provides a stylistic hierarchal view cellular differentiation [65], i.e., landscape elevation associates to varying degrees of pluripotency or the ability for a cell to differentiate to multiple function specific tissues. That is, pluripotent and progenitor cells are “higher” compared to a further differentiated state whether that be another function specific stem-cell or tissue. Nevertheless, at a high level, one can consider the intricate and complex processes of cellular differentiation as a interconnected dynamical system (network) whereby such bifurcations or regime-shift relate to differentiated states that lie on Waddington’s landscape [66]. To illustrate this and from a classification perspective, we accessed the Gene Expression Omnibus (GEO). In particular, we selected two public datasets, GSE11508 and GSE 30652, that possess 59 pluripotent / 160 non-pluripotent and 159 pluripotent / 32 non-pluripotent cell samples, respectively. Within each pluripotent samples of both datasets, there contains varying types that include human embryonic stem cells (hESCs) and induced pluripotent stem cells (iPSCs). This results in a potential mix of differentiation, i.e., iPSCs pluripotency may be much lower than hESCs yet are deemed pluripotent. Here, we are primarily interested to examine how “far” apart differentiated samples are from their counterparts and would be key in devising a necessary quantitive framework characterizing Waddingtons Landscape. As such, through the use of the KEGG database downloaded from Pathway Commons, we construct a single pluripotent network whereby the weights are the gene-to-gene correlation of twenty random pluripotent samples selected from each of the respective data sets. This was done similarly for a single non-pluripotent network. Together, this was repeated to generate 50 pluripotent and non-pluripotent networks from each GSE11508 and GSE 30652. Figure 7 presents heat map results as well as the average network distance between such networks. As one can see, we see a marked increase in distance between pluro and non-pluro samples. We note the Frobenius norm follows this same pattern and can primarily be attributed to the fact that we fixed the topology between pluro/non-pluro networks, the small number of samples for correlation, as well as the dependency of our underlying interactome KEGG network. This said, we have presented such results here to motivate the need for future work. 5. Summary & Conclusion This note introduces a statistical geometric framework [59] towards time-varying network analysis. While such Figure 7. Heat map of Riemannian distances between pluripotent and non-pluripotent networks under two public datasets. (B) Average numerical distance between the pluro and non-pluro networks. We see the proposed measure is able to classify such samples as well as the Euclidean measure. We note the topology here is fixed across each networks unlike previous synthetic results. mathematical concepts have been successfully employed for DTI Imaging [61], the underlying structure is equally relevant in the classification of regime-shifts in networks. To illustrate the importance of geometry in this setting, we presented preliminary results that show classical Euclidean distances are unable to properly differentiate between not only toy network configurations, but that of scale-free and random networks. We concluded with an example of how the proposed framework may be utilized on real-life biological stem-cell data. Putting this all together, these preliminary results and methodology set the foundation for a more expansive study on global notions of robustness, heterogeneity, and/or regime-shift detection. References [1] A. Barabasi. “The Network Takeover,” Nature Physics. 2012. 1, 6 [2] H. Kitano. “Cancer as a robust system: implications for anticancer therapy.” Nature Reviews Cancer. 2004. 1 [3] M. Csete and J. Doyle. “Reverse engineering of biological complexity.” Science. 2002. 1 [4] A. Barbasi and R. Albert. “Emergence of Scaling Random Networks.” Science. 1999. 1 [5] R.K. Fan Chung. “Spectral Graph Theory.” American Mathematical Society. 1997. 1, 6 [6] S. Hoory, N. Linial, and A. Widgerson. “Expander Graphs and Their Applications.” American Mathematical Society. 2006. 1, 6 [9] J. West, G. Bianconi, S. Severini, and A. Teschendorff. “Differential Network Entropy Reveals Cancer System Hallmarks.” Nature (Scientific reports) 2012. 1 [10] I. Taylor, R. Lindling, D. Warde-Farley, Y. Liu, C. Pesquita, D. Faria, S. Bull, T. Pawson, Q. Morris, and J. Wrana. “Dynamic Modularity in Protein Interactions Networks Predicts Breast Cancer Outcome.” Nature Biotechnology. 2009 1 [11] S. Borgatti. “Centrality and Network Flow.” Social Networks. (2005). 1 [12] S. Borgatti and M. Everett. “A Graph-Theoretic Perspective on Centrality.” Social Networks. (2006). 1 [13] G. Ghoshal and A. Barabasi. “Ranking Stability and Super-Stable Nodes in Complex Networks.” Nature Communications. 2011. 1 [14] P. Brodka, P. Stawiak, and P. Kazienko. “Shortest Path Discovery in the Multilayered Social Network.? International Conference on Advances in Social Networks Analysis. 2011. 1 [15] M. Domenico, A. Ribalta, E. Omodei, S. Gomez, and A. Arenas. “Ranking in Interconnected Multilayer Networks Reveals Versatile Nodes.” Nature Communications. 2015. 1 [16] P. Mucha, T. Richardson, K. Macon, M. Porter, and J.P. Onnela. “Community Structure in Time- Dependent, Multiscale, and Multiplex Networks.” Science. 2010. 1 [7] D. Stauffer and A. Aharony. “Introduction to Percolation Theory.” Taylor and Francis. 1994 1 [17] M. Domenico, C. Granell, M. Porter, A. Arenas. “The Physics of Spreading Processes in Multilayer Networks,” Nature Physics. 2016. 1 [8] L. Demetrius and T. Manke. “Robustness and Network Evolution: Entropic principle.” Physica A: Statistical Mechanics and its Applications. 2005. 1, 4, 6 [18] L. Kwong, T. Heffernan, L. Chin. “A systems biology approach to personalizing therapeutic combinations.” Cancer Discovery. 2013. 1 [19] J. Utikal, J. Polo, M. Stadtfeld, N. Maherali, W. Kulalert, R. Walsh, A. Khalil, J. Rheinwald, and K Hochedlinger. “Immortalization eliminates a roadblock during cellular reprogramming into iPS cells.” Nature. 2009. 1 [33] C. Villani. Optimal Transport, Old and New. SpringerVerlag. 2008. 2, 3 [20] E. Nicola. “When Bode meets Shannon: Controloriented feedback communication schemes.” IEEE transactions on Automatic Control. 2004. 1 [35] S. Gustafson and I. M. Sigal. Mathematical Concepts of Quantum Mechanics. Springer. 2011. 2 [21] S. R. S. Varadhan. “Large Deviations and Applications.” SIAM. 1984. 1, 4 [36] Z. Chebb and M. Moahker. “Means of Hermitian positive-definite matricies based on the logdeterminant alpha-divergence function.” Linear Algebra and Applications. 2012. 2 [22] Y. Ollivier. “Ricci Curvature of Markov Chains on Metric spaces.” Journal of Functional Analysis. 2009. 1, 4 [23] Y. Ollivier. “Ricci Curvature of Metric Spaces.” C. R. Math. Acad. Sci. Paris. 2007. 1 [24] R. Sandhu, T. Georgiou, E. Reznik, L. Zhu, I. Kolesov, Y. Senbabaoglu, and A. Tannenbaum. “Graph Curvature for Differentiating Cancer Networks.” Nature (Scientific Reports). 2015. 1, 2, 3, 6 [25] R. Sandhu, T. Georgiou, and A. Tannenbaum. “Ricci Curvature: An Economic Indicator for Market Fragility and Systemic Risk.” Science (Science Advances). 2016. 1, 2, 3 [26] B. Anderson, D. Quist, J. Neil, C. Storlie, and T. Laine. “Graph-Based Malware Detection Using Dynamic Analysis.” Journal in Computer Virology. 2011. 1 [27] C. Wang, E. Jonckheere, and R. Banirazi. “Wireless network capacity versus Ollivier-Ricci curvature under Heat Diffusion (HD) protocol.” IEEE American Control Conference. 2014. 1 [28] P. Ranjan and E.H. Abed. “Nonlinear dynamics of TCP with RED control.” Workshop on Large-Scale Communication Networks: Topology, Routing, Traffic, and Control. Institute for Pure and Applied Mathematics (IPAM). 2002. 1 [29] R. Sandhu, S. Lamhamedi-Cherradi, S. Tannenbaum, J. Ludwig, and A. Tannenbaum. “An Analytical Approach for Insulin-like Growth Factor Receptor 1 and Mammalian Target of Rapamycin Blockades in Ewing Sarcoma,” arXiv. 2016. 1 [30] S. Wagner and N. Neshat. “Assessing the Vulnerability of Supply Chains Using Graph Theory.” International Journal of Production Economics. 2010. 1 [34] T. Georgiou. “An Instrinisc metric for Power Spectral Density Functions.” IEEE Signal Processing Letters. 2007. 2 [37] F. Hai and D. Petz. “Riemannian geometry on positive definite matricies related to means.” Linear Algebra and Applications. 2009. 2 [38] S. Bonnabel and R. Sepulchre. “Geometric distance and mean for positive semi-definite matrices of fixed rank.” SIAM Journal of Matrix Analysis and Applications. 2009. 2 [39] H. Karcher. “Riemannian center of mass and mollifer smoothing.” Communications on Pure and Applied Mathematics.1977. 2 [40] P. Jupp and K. Mardia. “A unfied view of the theory of directional statistics.” International Statistical Review. 1989. 2 [41] M. Moakher. “Means and averaging in the group of rotations.” SIAM Journal of Matrix Analysis and Applications. 2002. 2 [42] A. Edelman, T. Arias, and S Smith. “The Geometry of Algorithms with Orthonganlity Constraints.” SIAM Journal of Matrix Analysis and Applications. 2002. 2 [43] L. Billera, S. Holmes, K. Vogtmann. “Geometry of the space of phylogenetic trees.” Advances in Applied Mathematics. 2001. 2 [44] C. Whidden and F. Matsen. “Ricci-Ollivier curvature of the rooted phylogenetic subtree-prune-regraft graph.” Theoretical Computer Science. 2017. 2 [45] S. Zairis, H. Khiabanian, A. Blumberg, R. Rabadan. “Moduli spaces of phylogenetic trees describing tumor evolutionary patterns.” Lectures Notes in Computer Science. 2014. 2 [46] N. Taleb. “The Black Swan: The Impact of the Highly Improbable.” Random House. 2007. 2 [31] A. Haldane and R. May. “Systemic risk in banking ecosystems.” Nature 2011. 1 [47] S. Haker, L. Zhu, and A. Tannenbaum. “Optimal Mass Transport for Registration and Warping,” International Journal of Computer Vision. 2004. 3 [32] S. Battiston, G. Caldarelli, C. Georg, R. May, and J. Stiglitz. “Complex derivatives.” Nature Physics. 2013. 1 [48] J. Benamou and Y. Brenier. “A Computational Fluid Mechanics Solution to the Monge-Kantrovich Mass Transfer Problem.” Numerische Mathematik. 2000. 3 [49] W. Li, S. Osher, and W. Gangbo. “A Fast Algorithm for Earth Mover?s Distance based on Optimal Transport and L1 Type Regularization.” arXiv. 2016. 3 [50] Y. Chen, T. Georgiou, and A. Tannenbaum. “Matrix Optimal Mass Transport: A Quantum Mechanical Approach.” arXiv. 2016. 3, 4 [51] R. Jordan, D. Kinderlehrer, and F. Otto. “The Variational Formulation of the Fokker-Planck Equation.” SIAM Journal on Mathematical Analysis. 1998. 3 [52] J. Lott and C. Villani. “Ricci Curvature for MetricMeasure Spaces via Optimal Transport.” Annals of Mathematics. 2009. [53] K. Sturm. “On the geometry of metric measure spaces.” Acta Math. 2006. 3 [54] B. Chow, P. Lu, L. Ni. “Hamilton?s Ricci Flow.” American Mathematical Society. 2006. 3 [55] Y. Rubner, C. Tomasi, and L. Guibas. “The Earth Mover’s Distance as a Metric for Image Retrieval.” International Journal on Computer Vision. 2000. 4 [56] M. DoCarmo. Riemannian Geometry. Birkhauser. 1992. 4 [57] K. Nomizu. “Invariant affine connections on homogeneous spaces.” American Journal of Math. 1954. 4 [58] P. Fletcher and S. Joshi. “Principal geodesic analysis on symmetric spaces: Statistics of diffusion tensors.” ECCV. 2004 4 [59] X. Pennec, P. Fillard, and N. Ayache. “A Riemannian Framework for Tensor Computing.” IJCV. 2005. 4, 5, 7 [60] V. Arsingy, P. Fillard, X. Pennec, and N. Ayache. “Log-Euclidean metrics for fast and simple calculus on diffusion tensors.” Magnetic Resonance in Medicine. 2006. 4 [61] Y. Rathi, A. Tannenbaum, O. Michailovich. “Segmenting Images on the Tensor Manifold.” CVPR. 2007 4, 8 [62] S. Helgason. Differential Geometry, Lie Groups, and Symmetric Spaces. Academic Press. 1978 4 [63] S. Kobayashi and K. Nomizu. Foundations of Differential Geometry. Interscience Tracts in Pure and Applied Mathematics. 1969 4 [64] F. Bauer, J. Jost, and S. Liu. “Ollivier-Ricci Curvature and the Spectrum of the Normalized Graph Laplace Operator.” arXiv. 2013. 6 [65] G Keller. “Embryonic stem cell differentiation: emergence of a new era in biology and medicine.” Genes Dev 19, 1129?1155 2005. 7 [66] C. Banerji, D. Saavedra, S. Severini, M. Widshwendter, T. Enver, J. Zhou, and A. Teschendorff. “Cellular network entropy as the energy potential in Waddington differentiation landscape.” Nature (Scientific Reports). 2013. 7
3cs.SY
Robustly Learning a Gaussian: Getting Optimal Error, Efficiently Ilias Diakonikolas∗ CS, USC [email protected] arXiv:1704.03866v2 [cs.DS] 5 Nov 2017 Jerry Li § EECS & CSAIL, MIT [email protected] Gautam Kamath† EECS & CSAIL, MIT [email protected] Ankur Moitra¶ Math & CSAIL, MIT [email protected] Daniel M. Kane‡ CSE & Math, UCSD [email protected] Alistair Stewartk CS, USC [email protected] November 7, 2017 Abstract We study the fundamental problem of learning the parameters of a high-dimensional Gaussian in the presence of noise — where an ε-fraction of our samples were chosen by an adversary. We give robust estimators that achieve estimation error O(ε) in the total variation distance, which is optimal up to a universal constant that is independent of the dimension. In the case√where just the mean is unknown, our robustness guarantee is optimal up to a factor of 2 and the running time is polynomial in d and 1/ε. When both the mean and covariance are unknown, the running time is polynomial in d and quasipolynomial in 1/ε. Moreover all of our algorithms require only a polynomial number of samples. Our work shows that the same sorts of error guarantees that were established over fifty years ago in the one-dimensional setting can also be achieved by efficient algorithms in high-dimensional settings. ∗ Supported by NSF CAREER Award CCF-1652862, a Sloan Research Fellowship, and a Google Faculty Research Award. † Supported by NSF CCF-1551875, CCF-1617730, CCF-1650733, and ONR N00014-12-1-0999. ‡ Supported by NSF CAREER Award CCF-1553288 and a Sloan Research Fellowship. § Supported by NSF CAREER Award CCF-1453261, CCF-1565235, a Google Faculty Research Award, and an NSF Graduate Research Fellowship. ¶ Supported by NSF CAREER Award CCF-1453261, CCF-1565235, a Packard Fellowship, a Sloan Research Fellowship, a grant from the MIT NEC Corporation, and a Google Faculty Research Award. k Supported by a USC startup grant. 1 Introduction 1.1 Background The most popular and widely used modeling assumption is that data is approximately Gaussian. This is a convenient simplification to make when modeling velocities of particles in an ideal gas [Goo15], measuring physical characteristics across a population (after controlling for gender), and even modeling fluctuations in a stock price on a logarithmic scale. However, real data is not actually Gaussian and is at best crudely approximated by a Gaussian (e.g., with heavier tails). What’s worse is that estimators designed under this assumption can perform poorly in practice and be heavily biased by just a few errant samples that do not fit the model. For over fifty years, the field of robust statistics [HR09, HRRS86, RL05] has studied exactly this phenomenon — the sensitivity or insensitivity of estimators to small deviations in the model. Unsurprisingly, one of the central questions that shaped its development was the problem of learning the parameters of a one-dimensional Gaussian distribution when a small fraction of the samples are arbitrarily corrupted. More precisely, in 1964, Huber [Hub64] introduced the following model: Definition 1. In Huber’s contamination model, we are given samples from a distribution D = (1 − ε)N (µ, σ 2 ) + εZ , where N (µ, σ 2 ) is a Gaussian of mean µ and variance σ 2 , and Z is an arbitrary distribution chosen by an adversary. Intuitively, among our samples, about a (1−ε) fraction will have been generated from a Gaussian and are called inliers, and the rest are called outliers or gross corruptions. We will work with an even more challenging1 model — called the strong contamination model (Definition 2) — where the adversary is allowed to look at the inliers and then decide on the outliers. The literature on robust statistics has given numerous explanations and empirical investigations [GCSR14, Ham01] into how such outliers might arise as the result of equipment failure, data being entered incorrectly, or even from a subpopulation that was not accounted for in a medical study. These types of errors are erratic and difficult to model, so instead our goal is to design a procedure that accurately estimates µ and σ 2 without making any assumptions about them. In one dimension, the median and median absolute deviation are well-known robust estimators for the mean and variance respectively. In particular, given samples X1 , X2 , . . . , Xn , we can compute µ b = median(X1 , X2 , . . . , Xn ) and σ b= median(|Xi − µ b|) , −1 Φ (3/4) where Φ is the cumulative distribution of the standard Gaussian. (This scaling constant is needed to ensure that σ b is an unbiased estimator when there is no noise.) If n ≥ C logε21/δ , then with probability at least 1 − δ we have that dT V (N (µ, σ 2 ), N (b µ, σ b2 )) ≤ Cε. In Huber’s contamination model, this is the strongest type of error guarantee we could hope for2 and captures both the task of learning the underlying parameters µ and σ 2 , and finding the approximately best fit to the observed distribution within the family of one-dimensional Gaussians. In fact there are plentifully many other estimators — such as the trimmed mean, winsorized mean, Tukey’s biweight function, 1 None of the results in our paper were previously known in Huber’s contamination model either. The reason we work with this stronger model is because we can — nothing in our analysis relies on the inliers and outliers being independent. 2 See Lemma 17. 1 and the interquartile range — that achieve the same sorts of error guarantees, up to constant factors. The design of robust estimators for location (e.g., estimating µ) and scale (e.g., estimating σ 2 ) is guided by certain overarching principles, such as the notion of the influence curve [HRRS86] or the notion of breakdown point [RL05]. In some cases, it is even possible to design robust estimators that are minimax optimal [Hub64]. These days, much of modern data analysis revolves around high-dimensional data — for example, when we model documents [BNJ03], images [OF96], and genomes [NJB+ 08] as vectors in a very high-dimensional space. The need for robust estimators is even more pressing in these applications, since it is infeasible to remove obvious outliers by inspection. However, adapting robust statistics to high-dimensional settings is fraught with challenges. The principles that guided the design of robust estimators in one dimension seem to inherently lead to high-dimensional estimators that are hard to compute [Ber06, HM13]. In this paper, we focus on the central problem of learning the parameters of a multivariate Gaussian N (µ, Σ) in the strong contamination model. The textbook estimators for the mean and covariance – such as the Tukey median [Tuk75] and minimum volume enclosing ellipsoid [Rou85] – essentially search for directions where the projection of D is suitably non-Gaussian. However, trying to find a direction where the projection is non-Gaussian can be like looking for a needle in an exponentially-large haystack – these statistics are not efficiently computable, in general. Furthermore, a random projection will look Gaussian with high probability [Kla07]. In this paper, our main result is an efficiently computable estimator for a high-dimensional Gaussian that achieves error b ≤ Cε dT V (N (µ, Σ), N (b µ, Σ)) in the strong contamination model, for a universal constant C that is independent of the dimension. For a Gaussian distribution, we consider estimation in terms of total variation distance, which is equivalent to estimating the parameters under the natural measures. Our main idea is to use various regularity conditions satisfied by the inliers to make the problem of searching for non-Gaussian projections easier. When just the mean µ is unknown, our algorithm runs in time polynomial in the dimension d and 1/ε. When both the mean and covariance are unknown, our algorithm runs in time polynomial in d and quasi-polynomial in 1/ε. All of our algorithms achieve polynomial sample complexity. Prior to our work, the best known algorithm of Diakonikolas et al. [DKK+ 16] achieved estimation error O(ε log 1/ε) for this problem3 , again with respect to total variation distance. Concurrently, Lai, Rao and Vempala [LRV16] gave an algorithm which achieves estimation error roughly O(ε1/2 log1/2 d). In fact, the algorithm of Diakonikolas et al. [DKK+ 16] works in a stronger model than what we consider here, where an adversary gets to look at the samples and then decides on an ε-fraction to move arbitrarily. Such errors are both additive and subtractive (because inliers are removed). Interestingly, Diakonikolas, Kane and Stewart [DKS17] proved that any Statistical Query learning algorithm that works in such an additive and subtractive model and achieves an error guarantee asymptotically better than O(ε log1/2 1/ε) must make a super-polynomial number of statistical queries. Our work shows a natural conclusion that in an additive only model it is possible to algorithmically achieve the same error guarantees as are possible in the one-dimensional case, up to a universal constant. 3 We note that, as stated, the results in [DKK+ 16] give estimation error O(ε log3/2 1/ε). However, combining the techniques in [DKK+ 16] with the arguments in Section 7 of this paper gives the stated bound. This argument will be included in the full version of [DKK+ 16]. 2 1.2 Our Results and Techniques In what follows, we will explain both our work as well as prior work through the following lens: At the core of any robust estimator is some procedure to certify that the estimates have not been moved too far away from the true parameters by a small number of corruptions. First, we consider the subproblem where the covariance Σ = I is known and only the mean µ is unknown. In the terminology of robust statistics, this is called robust estimation of location. If we could compute the Tukey median, we would have an estimate that satisfies dT V (N (µ, I), N (b µ, I)) ≤ Cε. The way that the Tukey median guarantees that it is close to the true mean is that along every direction u it is close to the median of the projection of the samples. More precisely, at least a 1−ε T T b, and at least a 1−ε fraction of the samples satisfy 2 fraction of the samples satisfy u Xi ≥ u µ 2 T T u µ b ≥ u Xi . However, if we have a candidate µ b, finding a direction u that violates this condition is again like searching for a needle in an exponentially large haystack. The approach of Diakonikolas et al. [DKK+ 16] was essentially a data-dependent way to search for appropriate directions u, by looking for directions where the empirical variance is larger than it should be (if there were no corruptions). However, because their approach considers only a single direction at a time, it naturally gets stuck at error Θ(ε log1/2 1/ε). This is because along the direction u, only when a point is Ω(log1/2 1/ε) away from most of the rest of the samples can we be relatively confident that it is an outlier. Thus, an adversary could safely place all the corruptions in the tails and move the mean by as much as Θ(ε log1/2 1/ε). This would not affect the Tukey median by as much, but would affect an estimate based on the empirical mean (because the algorithm could find no other outliers to remove) by considerably more. Our approach is to consider logarithmically many directions at once. Even though an inlier can be logarithmically many standard deviations away from the mean along a single direction u with reasonable probability, it is unlikely to be that many standard deviations away simultaneously across many orthogonal directions. Essentially, this allows us to remove the influence of outliers on all but a logarithmic dimensional subspace. Combining this with an algorithm for robustly learning the mean in time exponential in the dimension (but polynomial in the number of samples), we obtain our first main result: Theorem 1. Suppose we are given a set of n = poly(d, 1/ε) samples from the strong contamination model, where the underlying d-dimensional Gaussian is N (µ, I). Let ε ≤ ε0 , where ε0 is a positive universal constant. For any β > 0, there is an algorithm to learn an estimate N (b µ, I) that with high probability satisfies    1 1 2 ε. dT V (N (µ, I), N (b µ, I)) ≤ √ + O √ + ε β 2 Moreover, the algorithm runs in time poly(n, (1/ε)β ). We prove an almost matching lower bound of 2ε + Ω(ε2 ) on the estimation error. Thus, our √ robustness guarantee is optimal up to a factor√of 2, even among computationally inefficient robust estimators. Interestingly, our extra factor of 2 comes from the following geometric fact which we make crucial √ use of: Any convex body of diameter D in any dimension can be covered by a ball of radius D/ 2, and moreover such a ball can be (approximately) found in time exponential in the dimension. Suppose that along some direction u we have an estimate p that is guaranteed to be within ε/2 of the projection of the true mean µ. We can now confine µ to a slab of width ε, and by taking the intersection of all such slabs we get a convex body that contains µ and has diameter of 3 √ at most ε. By covering √ the body with a ball of radius ε/ 2, we are guaranteed that the center of the ball is within ε/ 2 of the true mean. This gives us a general way to combine one-dimensional robust estimates along a net of directions. We note that, for general isotropic sub-Gaussian distributions, the bound of O(ε log1/2 1/ε) of [DKK+ 17] is optimal for robust mean estimation, even in one dimension. See Section A for a proof of this fact. However, our results can be seen to hold more generally than stated above – indeed, the same arguments work for a class of symmetric isotropic sub-Gaussian distributions which are sufficiently smooth near their mean. More precisely, we require that along any univariate projection, the mean is robustly estimated by the median. We next consider the subproblem where the mean µ = 0 is known and only the covariance Σ is unknown. In the terminology of robust statistics, this is called robust estimation of scale. In this b that satisfies4 kΣ − Σk b F ≤ Cε. When Σ b does not satisfy case, we want to compute an estimate Σ this condition, it can be shown (in Section 6.2.3) that there is a degree-two polynomial p(X), where E [p(X)] = 1 and X∼N (0,Σ) E [p(X)] = 1 + C ′ ε . b X∼N (0,Σ) It turns out that, even given the polynomial p(X), deciding whether or not the above conditions b we can certainly compute E approximately hold is challenging. Given p(X) and Σ, b [p(X)]. X∼N (0,Σ) But given only contaminated samples from N (0, Σ) and without knowing what Σ is, can we estimate EX∼N (0,Σ) [p(X)]? Often, univariate robust estimation problems are considered easy, with a simple recipe: Construct an unbiased estimator for the statistic for which each sample point has low influence. However, in our setting, it is highly non-trivial to construct such an estimator. The naive attempt in this case would be the median – this immediately fails since the distribution of p(X) is asymmetric. Even if there were no noise, that would not necessarily be an unbiased estimator. So how can we dampen the influence of outliers, if there is no natural symmetry in the distribution? We construct a robust estimator crucially using the fact that p(X) is the weighted sum of chi-squared random variables when there is no noise. The key structural fact we exploit is the following: Given two sums of chi-squared random variables, if the random variables are far in total variation distance, most of their difference must lie close to their means. We use this fact to show how, given a weak estimate of the mean (i.e., one which is only accurate up ω(ε)), one can improve the estimate by a constant factor. Our result follows by an iterative application of this technique. However, there is still a major complication in utilizing our low-dimensional estimator to obtain a high-dimensional estimator. In the unknown mean case, we knew the higher-order moments (since we assumed that the covariance is the identity). Here, we do not have control over the higher-order moments of the unknown Gaussian. Overcoming this difficulty requires several new techniques, which are quite complicated, and we defer the full details to Section 6. Our second main result is: Theorem 2. Suppose we are given a set of n = poly(d, 1/ε) samples from the strong contamination model, where the underlying d-dimensional Gaussian is N (0, Σ). There is an algorithm to learn an b that runs in time poly(n, (1/ε)O(log 4 1/ε) ) and with high probability satisfies estimate N (0, Σ) b ≤ Cε , dT V (N (0, Σ), N (0, Σ)) for a universal constant C that is independent of the dimension. 4 More precisely, to obtain O(ε) error guarantee with respect to the total variation distance, we need to robustly approximate Σ within O(ε) in Mahalanobis distance, which is a stronger metric than the Frobenius norm. As part of our approach, we are able to efficiently reduce to the case that Σ is close to the identity matrix, in which case the Frobenius error suffices. 4 A key technical problem arises when we attempt to combine estimates for the covariance restricted to a subspace and its orthogonal complement. We refer to this as a stitching problem, where if we write Σ as   ΣV AT , Σ= A ΣV ⊥ and have accurate estimates for ΣV and ΣV ⊥ , we still need to accurately estimate A. Our algorithm utilizes an unexpected connection to the unknown mean case: We show that, under a carefully chosen projection scheme, we can simulate noisy samples from a Gaussian with identity covariance, where the mean of this distribution encodes the information needed to recover A. We defer the full details to Section 6.4. It turns out that we can solve the general case when both µ and Σ are unknown, by directly reducing to the previous subproblems, exactly as was done in [DKK+ 16] (with some caveats, addressed in Section 4.4). Since all of our error guarantees are optimal up to constant factors, there is only a constant factor loss in this reduction. Finally, we obtain the following corollary: Corollary 1. Suppose we are given a set of n = poly(d, 1/ε) samples from the strong contamination model, where the underlying d-dimensional Gaussian is N (µ, Σ). There is an algorithm to learn an b that runs in time poly(n, (1/ε)O(log 4 1/ε) ) and with high probability satisfies estimate N (b µ, Σ) b ≤ Cε , dT V (N (µ, Σ), N (b µ, Σ)) for a universal constant C that is independent of the dimension. This essentially settles the complexity of robustly learning a high-dimensional Gaussian. The sample complexity of our algorithm depends polynomially on d and 1/ε, and the running time depends polynomially on d and quasi-polynomially on 1/ε. Up to a constant factor, ours is the first high-dimensional algorithm that achieves the same error guarantees as in the one-dimensional case, where results were known for more than fifty years! It is an interesting open problem to reduce the running time to polynomial in 1/ε (while still being polynomial in d). As we explain in Section 6.6, this seems to require fundamentally new ideas. More Related Work In addition to the works mentioned above, there has been an exciting flurry of recent work on robust high-dimensional estimation. This includes studying graphical models in the presence of noise [DKS16], tolerating much more noise by allowing the algorithm to output a list of candidate hypotheses [CSV17], formulating general conditions under which robust estimation is possible [SCV18], developing robust algorithms under sparsity assumptions [Li17, DBS17, BDLS17] where the number of samples is sublinear in the dimension, and leveraging theoretical insights to give practical algorithms that can be applied to genomic data [DKK+ 17]. We note that, in comparison to all these other works, ours is the only to efficiently achieve the information-theoretically optimal error guarantee (up to constant factors). Despite all of this rapid progress, there are still many interesting theoretical and practical questions left to explore. 1.3 Organization In Section 2, we go over preliminaries and notation that we will use throughout the paper. In Section 3, we describe an algorithm for robustly estimating the mean of a Gaussian in low-dimensional settings, and crucially apply it in the design of an algorithm for mean-estimation in high dimensions, described in Section 4. Similarly, in Section 5, we give an algorithm for robustly estimating 5 the mean of degree-two polynomials in certain settings, which is applied in the context of our covariance-estimation algorithm in Section 6. Finally, we put these tools together and describe our general algorithm for robustly estimating a Gaussian in Section 7. 2 Preliminaries In this section, we give various definitions and lemmata we will require throughout the paper. First, given a distribution F , we let EF [f (X)] = EX∼F [f (X)] denote the expectation of f (X) under F . If S is a finite set, we let ES [f (X)] = EX∼unif(S) [f (X)] denote the expectation of f (X) under the uniform distribution over points in S (i.e., the empirical mean of f under S). Given any subspace V ⊆ Rd , we let ΠV : Rd → Rd be the projection operator onto V . If V = span(v) is 1-dimensional, we will denote this projection as Πv . 2.1 The Strong Contamination Model Here we formally define the strong contamination model. Definition 2. Fix ε > 0. We say a set of samples X1 , . . . , Xn was generated from the strong contamination model on a distribution F , if it was generated via the following process: 1. We produce (1 − ε)n i.i.d. samples G from F . 2. An adversary is allowed to observe these samples and add εn points E arbitrarily. We are then given the set of samples G ∪ E in random order. Also, we will say that the samples X1 , . . . , Xn are ε-corrupted. Moreover given an ε-corrupted set of samples S, we will write S = (G, E) where G is the set of uncorrupted points and E is the set of corrupted points. Moreover, given a subset S ′ ⊂ S, we will also write S ′ = (G′ , E ′ ), where G′ = S ′ ∩ G and E ′ = S ′ ∩ E denote the set of uncorrupted points and corrupted points remaining in S ′ . L will denote G \ G′ , which is the set of “lost” uncorrupted points. Given a contaminated set S ′ = (G′ , E ′ ) and a set G so that G′ ⊆ G, define the following quantities φ(S ′ , G) = |G \ G′ | , |S ′ | ψ(S ′ , G) = |E ′ | , |S ′ | ∆(S ′ , G) = ψ(S ′ , G) + φ(S ′ , G) log 1 . φ(S ′ , G) (1) In particular, observe that if ∆(S ′ , G) < O(ε), then a simple calculation implies that φ(S ′ , G) ≤ O(ε/ log 1/ε). Equivalently, we have removed at most an O(ε/ log 1/ε) fraction of good points from G. This is crucial, as if we throw out an ε-fraction of good points then we essentially put ourselves in the subtractive model, and there our guarantees no longer hold. There are two differences between the strong contamination model and Huber’s contamination model. First, the number of corrupted points is fixed to be εn instead of being a random variable. However, this difference is negligible. It follows from basic Chernoff bounds that n samples from Huber’s contamination model with parameter ε (for n sufficiently large) can be simulated by a (1 + o(1))ε-corrupted set of samples, except with negligible failure probability. Hence, we lose only an additive o(ε) term when translating from Huber’s contamination model to the strong contamination model, which will not change any of the guarantees in our paper. The second difference is that the adversary is allowed to inspect the uncorrupted points before deciding on the corrupted points. This makes the model genuinely stronger since the samples we are given are no longer completely independent of each other. 6 2.2 Deterministic Regularity Conditions In analyzing our algorithms, we only need certain deterministic regularity conditions to hold on the uncorrupted points. In this subsection, we formally state what these conditions are. It follows from known concentration bounds that these conditions all hold with high probability given a polynomial number of samples. Now with these regularity conditions defined once and for all, we will be able to streamline our proofs in the sense that each step in the analysis will only ever use one of these fixed set of conditions and will not use the randomness in the sampling procedure. We remark that some subroutines in our algorithm only need a subset of these conditions to hold, so we could improve the sample complexity by changing the regularity conditions we need at each step. However, since we will not be concerned with optimizing the sample complexity beyond showing that it is polynomial, we choose not to complicate our proofs in this manner. 2.2.1 Regularity Conditions for Unknown Mean In the unknown mean case, we will require the following condition: Definition 3. Let G be a multiset of points in Rd and η, δ > 0. We say that G is (η, δ)-good with respect to N (µ, I) if the following hold: p • For all x ∈ G we have kx − µk2 ≤ O( d log(|G|/δ)). • For every affine function L : Rd → R we have | PrG (L(X) ≥ 0) − PrN (µ,I) (L(X) ≥ 0)| ≤ η/(d log(d/ηδ)) . • We have that k EG [X] − EN (µ,I) [X]k2 ≤ η. • We have that kCovG [X] − Ik2 ≤ η/d. • For any even degree-2 polynomial p : Rd → R we have that E[p(X)] − G E[p2 (X)] − G E [p(X)] ≤ η N (µ,I) E [p2 (X)] ≤ η N (µ,I) E [p2 (X)]1/2 , N (µ,I) E [p2 (X)], and N (µ,I) Pr[p(X) ≥ 0] ≤ Pr [p(X) ≥ 0] + G N (µ,I) η . d log(|G|/δ) It is easy to show (see Lemma 6) that given enough samples from N (µ, I), the empirical data set will satisfy these conditions with high probability. 2.2.2 Regularity Conditions for Unknown Covariance In the unknown covariance case, we will require the following condition: Definition 4. Let G be a set of n points of Rd , and η, δ > 0. We say that G is (η, δ)-good with respect to N (0, Σ) if the following hold: • For all x ∈ G we have that xT Σ−1 x = O(d log(|G|/δ)). 7 • For any even degree-2 polynomial p : Rd → R we have E[p(X)] − G E[p2 (X)] − G E [p(X)] ≤ η N (0,Σ) E [p2 (X)] ≤ η N (0,Σ) E [p2 (X)]1/2 , N (0,Σ) E [p2 (X)] and N (0,Σ) Pr [p(X) ≥ 0] ≤ Pr [p(X) ≥ 0] + X∼G N (0,Σ) η2 . d log(|G|/δ) • For any even degree-4 polynomial p : Rd → R we have E[p(X)] − G E [p(X)] ≤ η Var [p(X)]1/2 , N (0,Σ) N (0,Σ) Pr[p(X) ≥ 0] ≤ Pr [p(X) ≥ 0] + G N (µ,I) η2 . 2 log(1/ε)(d log(|G|/δ))2 As before, it is easy to show (see Lemma 14) that given enough samples from N (0, Σ), the empirical data set will satisfy these conditions with high probability. 2.3 Bounds on the Total Variation Distance We will require some simple bounds on the total variation distance between two Gaussians. These bounds are well-known. Roughly speaking, they say that the total variation distance between two Gaussians with identity covariance is governed by the ℓ2 norm between their means, and the total variation distance between two Gaussians with mean zero is governed by the Frobenius norm between their covariance matrices, provided that the matrices are close to the identity. Lemma 1. Let µ1 , µ2 ∈ Rd be such that kµ1 − µ2 k2 = ε for ε < 1. Then   1 dTV (N (µ1 , I), N (µ2 , I)) = √ + o(1) ε . 2π For clarity of exposition we defer this calculation to the Appendix. We also need to bound the total variation distance between two Gaussians with zero mean and different covariance matrices. The natural norm to use is the Mahalanobis distance. But in our setting, we will be able to use the more convenient Frobenius norm instead (because we effectively reduce to the case that the covariance matrices will be close to the identity): b be such that kΣ−IkF ≤ O(ε log 1/ε), and kΣ− Σk b F ≤ Lemma 2 (Cor. 2.14 in [DKK+ 16]). Let Σ, Σ b ≤ O(ε). Cε. Then dTV (N (0, Σ), N (0, Σ)) These lemmata show that parameter estimation and approximation in total variation distance are essentially equivalent. Indeed, in this paper, we achieve both guarantees, but state our results in terms of total variation estimation. 3 Robustly Learning the Mean in Low Dimensions This section is dedicated to the proof of the following theorem: 8 Theorem 3. Fix µ ∈ Rd , and let ε, γ, δ > 0. Let S0 = (G0 , E0 ) be such that G0 is a (γε, δ)-good set with respect to N (µ, I), and |E0 |/|S0 | ≤ ε. Let S = (G, E) be another set with ∆(S, S0 ) < ε. Let V ⊆ Rd be a subspace. For all 0 < ρ < 1, the algorithm LearnMeanLowD(V, γ, ε, δ, S, ρ) runs in time poly(d, |S|, (1/ρ)O(dim(V )) , log(ρε/(1 − ρ)), log(1/ρ)) and returns a µ e so that kΠV (µ − µ e)k2 =  γ  1 + 2ρ √ ε. π+O 1−ρ d √ In particular, as we let ρ, γ → 0, the √ parameter estimation error approaches πε (corresponding to a total variation approximation of ε/ 2). In Lemma 17 p in the Appendix we show√that no algorithm can achieve parameter estimation error better than π2 ε. Thus, we achieve a 2 approximation to the optimal error. For simplicity, in the rest of this section, we will let V = Rd , that is, we assume there is no projection. It should be clear that this can be done without loss of generality. Our algorithm proceeds as follows: First, we show that in one dimension, the median produces an estimate which is optimal, up to lower order terms, if the sample set is (γε, δ)-good with respect to the underlying d Gaussian. Then, we show that p π by using a net argument, we can produce a convex body in R with diameter at most 2R = 2( 2 + o(1))ε which must contain the true mean. Finally, we use an old √ result of Jung [Jun01] that such a set can be circumscribed by a ball of radius 2R (see [BW41] for an English language version of the result). We use the center of the ball as our estimate µ e. 3.1 Robustness of the Median First we show that if we projectponto one dimension, then the median of the corrupted data differs from the true mean by at most π2 ε + o(ε). Our proof will rely only on the notion of a (γε, δ)-good set with respect to N (µ, I) and thus it works even in the strong contamination model. Formally, we show: Lemma 3. Fix any v ∈ Rd . Fix µ ∈ Rd , and let δ > 0. Let S0 = (G0 , E0 ) be so that G0 be a set  with (γε, δ)-good set with respect to N (µ, I), and |E0 |/|S0 | ≤ ε. Let S = (G, E) be another pπ γ ε. ∆(S, S0 ) < ε. Let b be the median of S when projected onto v. Then, |b − Πv µ| ≤ 2 +O d Proof. For any a ∈ R, we have Pr [hv, Xi > a] = X∼S Observe that we have |E| |S| |G| |E| Pr [hv, Xi > a] + Pr [hv, Xi > a] . |S| X∼G |S| X∼E PrX∼E [hv, Xi > a] ≤ ψ(S, G). Moreover, by simple calculation we have Pr [hv, Xi > a] − Pr [hv, Xi > a] ≤ 2φ(S, G) . X∼G X∼G0 Hence, we have Pr [hv, Xi > a] − X∼S |G| Pr [hv, Xi > a] ≤ ψ(S, G) + o(ε) , |S| X∼G0 since by assumption ∆(S, G) ≤ ε. Similarly, we have that for all a ∈ R, Pr [hv, Xi < a] − X∼S |G| Pr [hv, Xi < a] ≤ ψ(S, G) + o(ε) . |S| X∼G0 9 For |a| = O(ε) we have that PrN (0,I) [X > a] = 12 − √12π a + O(ε3 ). Thus, by (γε, δ)-goodness of G0 , this implies that for |a| = O(ε), we have    γε  |G| 1 1 Pr [hv, Xi > Πy µ + a] − . (2) − √ a ≤ ψ(S, G) + O X∼S |S| 2 d 2π Thus, for |a| = O(ε) we have r    γε  |G| 1 1 |E| π + o(ε) a] ≤ −√ a + +O Pr [hv, Xi > Πy µ + X∼S 2 |S| 2 |S| d 2π  γε  1 |G| 1 |E| √ a+ ≤ − + o(ε) . +O 2 |S| 2π 2|S| d   pπ  p In particular, we see that if a > π2 ε + O γε d  + o(ε), then PrX∼S p π hv, Xi > Πy µ + 2 ε < 1/2. By symmetric logic, we also have that Pr hv, Xi > Πy µ − 2 ε > 1/2. Thus, the median in pX∼S π direction v differs from Πy µ by at most 2 ε + O γε d + o(ε). 3.2 Finding a Minimum Radius Circumscribing Ball For any x ∈ Rd and r > 0, let B(x, r) = {y ∈ Rd : kx − yk2 ≤ r} denote the closed ball of radius r centered at x. The following classical result of Gale gives a bound on the radius of the circumscribing ball of any convex set in terms of its diameter: Theorem 4 (see [Jun01, BW41]). Fix R > 0. Let C ⊆ Rd be a convex √ body so that for all x, y ∈ C, we have kx − yk2 ≤ 2R. Then C is contained within a ball of radius R 2. The bound is asymptotically achieved for the standard simplex as we increase its dimension. The goal of this subsection is to show that the (approximately) minimum radius circumscribing ball can be found efficiently. We will assume we are given an approximate projection oracle for the convex body that given a point y ∈ Rd , outputs a point which is almost the closest point in C to x: Definition 5. A ρ-projection oracle for a convex body C is a function O : Rd → Rd , which, given a point y ∈ Rd , outputs a point x ∈ C so that kx − yk2 ≤ inf x′ ∈C kx′ − yk2 + ρ. Our first step is to use such an oracle to construct a net for C. First, we need the following well-known bound on the size of the net. Claim 1. Fix r > 0. Then, for any β > 0, there is a β-net F for the sphere of radius r around 0 in Rd of size (r/β)O(d) . Moreover, this net can be constructed in time poly(d, |F|). With this, we can show: Lemma 4. Fix R, C as in Theorem 4, and let 1 > ρ > 0. Let x ∈ C be arbitrary. Let O be a (ρR/3)-projection oracle for C. Suppose a call to O runs in time T . Then, there is an algorithm CircumscribeNet(R, ρ, O, x) which runs in time poly((R/ρ)O(d) , T ) and outputs a set X ⊆ Rd so that X is a (ρR)-net for C, and moreover, |X | ≤ (R/ρ)O(d) . The algorithm is fairly straightforward. First, we observe that C is contained within B(x, 2R). We then form a (ρR)/3-net of B(x, 2R) using Claim 1. We then iterate over every element v of this net, and use our projection oracle to (approximately) find the closest point in C to v. If this point is too far away, we throw it out, otherwise, we add this projected point into the net. The formal pseudocode for CircumscribeNet is given in Algorithm 1. 10 Algorithm 1 Generating a net of C 1: function CircumscribeNet(R, ρ, O, x) 2: Form an ρ/3-net F ′ of the sphere of radius 2 of size (1/ρ)O(d) as in Claim 1. 3: Let F = R · F ′ + x. 4: Let X ← ∅ 5: for each v ∈ F do 6: Let uv ← O(v) 7: if kv − uv k2 ≤ 2ρR/3 then 8: Add uv to X 9: end if 10: end for 11: return X 12: end function Proof. The runtime bound follows from Claim 1. We now turn our attention to correctness. By Claim 1, and rescaling and shifting, the set F is clearly a (ρR)/3-net for a ball B of radius 2R containing C. We now claim that the set X is indeed a (ρR)/3-net for C. Fix y ∈ C. Since C ⊆ B, this implies there is some v ∈ F so that ky − vk2 ≤ ρR/3. Thus, in Line 7, when processing v, we must find some uv ∈ C so that kuv − vk2 ≤ 2ρR/3. The claim then follows from the triangle inequality. With this, we obtain: Corollary 2. Fix R, C, ρ, O, x as in Lemma 4. Suppose a call to O runs in time T . Then, there is O(d) , T ) and returns a point an algorithm Circumscribe(R, ρ, O, x) which runs √ in time poly((R/ρ) yb so that C is contained within a ball of radius 2(1 + 2ρ)R. The algorithm at this point is very simple. Using the output of CircumscribeNet, we iterate over all points √ in a net over B(x, 2R), find an x in this net so that the distance to all points in the net is at most 2(1 + ρ)R, and output any such point. The formal pseudocode for Circumscribe is given in Algorithm 2. Algorithm 2 Finding a circumscribing ball of small radius 1: function Circumscribe(R, ρ, O, x) 2: Form an ρ/3-net F ′ of B(0, 2) of size (1/ρ)O(d) as in Claim 1. 3: Let F = R · F ′ + x. 4: Let X ← CircumscribeNet(R, ρ, O, x). 5: for each v ∈ F do √ 6: if for all u ∈ X , we have ku − vk2 ≤ 2(1 + ρ)R then 7: return u 8: end if 9: end for 10: end function Proof. The√runtime bound is immediate. By Theorem 4, there is some y ∈ B(x, √ 2R) so that ′ C ⊆ B(y, R 2). Thus, by the triangle inequality, there is some y ∈ F so that C ⊆ B(y, 2(1+ρ)R). Thus, the algorithm will output some point y ′′ ∈ F. By an additional application of the triangle √ ′′ inequality, since X is a ρR-net for C, this implies that C ⊆ B(y , 2(1 + 2ρ)R), as claimed. 11 3.3 The Full Low-Dimensional Algorithm We now have all the tools to describe the full algorithm in low-dimensions. Let S be our corrupted dataset as in Theorem 3. Fix ρ > 0. We first produce a ρ-net F over the unit sphere in Rd . By (a slight modification of) Claim 1, this net has size (1/ρ)O(d) and can be constructed in time poly(d, |F|). For each v ∈ F, we project all points in S onto v, and take the median of these points to produce bv . We then construct the following set: \ C= {y ∈ Rd : hv, yi ∈ [bv − β, bv + β]} , (3) v∈F pπ γε  where β = 2 ε + O d + o(ε) is as in Lemma 3. We now show two properties of this set, which in conjunction with the machinery above, allows us to prove Theorem 3. The first shows that C has small diameter: Claim 2. For all x, y ∈ C, we have kx − yk2 ≤ 2β/(1 − ρ). Proof. Fix any x, y ∈ C. By definition of C, it follows that for all v ∈ F, we have |hx − y, vi| ≤ 2β. For any u with kuk2 = 1, there is some v ∈ F with ku − vk2 ≤ ε, and so we have |hx − y, ui| ≤ |hx − y, vi| + |hx − y, u − vi| ≤ 2β + ρkx − yk2 . Taking the supremum over all unit vectors u and simplifying yields that kx − yk2 ≤ 2β/(1 − ρ), as claimed. The second property shows that we may find an α-projection oracle for C efficiently. Claim 3. Fix ρ′ > 0. There is a ρ′ -projection oracle ProjOracle(y, ρ′ , C) for C which runs in time poly((1/ρ)O(d) , log(γε/(1 − ρ)), log(1/ρ′ )). Proof. The projection problem may be stated as min kx − yk2 s.t.hv, yi ∈ [bv − β, bv + β], ∀v ∈ F . This is a convex minimization problem with linear constraints. By the classical theory of optimization [GLS88], finding a ρ-approximate y can be done in poly(d, log(vol(C)/ρ′ )) queries to a separation oracle for C. Since the separation oracle must only consider the constraints induced by F, this can be done in time (1/ρ)O(d) . Since by Claim 2 we have vol(C) ≤ (2β/(1 − ρ))O(d) , the desired runtime follows immediately. We now finally describe LearnMeanLowD. Using convex optimization, we first find an arbitrary x ∈ C. By Lemma 3 we know µ ∈ C and so this step succeeds. After constructing C, we run Circumscribe with appropriate parameters, and return the outputted point. The formal pseudocode for LearnMeanLowD is given in Algorithm 3. Proof. The runtime claim follows from the runtime claims for Circumscribe and ProjOracle. Thus, it suffices to prove correctness of this algorithm. C. By √ 1+2ρBy Lemma 3, we know that µ√∈ 1+2ρ Claim 2 and Corollary 2, the output y satisfies B(y, 2 1−ρ β). Thus, we have kµ−yk2 ≤ 2 1−ρ β, as claimed. 12 Algorithm 3 Finding a circumscribing ball of small radius 1: function LearnMeanLowD(ε, δ, S, ρ) 2: Form a ρ-net F of B(0, 1) of size (1/ρ)O(d) as in Claim 1. 3: for each v ∈ F do 4: Let bv be the median of S projected onto v. 5: end for 6: Form C as in Equation (3). 7: Find an p x ∈ C using convex optimization.  + o(ε) 8: Let β = π2 ε + O γε d 9: Let R = β/(1 − ρ) 10: Let O(·) = ProjOracle(·, (ρR)/3, C) 11: return the output of Circumscribe(R, ρ, O, x) 12: end function 4 Robustly Learning the Mean in High Dimensions In this section, we prove the following theorem, which is our first main result: Theorem 5. Fix ε, γ, δ > 0, and let X1 , . . . , Xn be an ε-corrupted set of points from N (µ, I), where kµk2 ≤ O(ε log 1/ε), and where   (d log(d/γεδ))6 . n=Ω γ 2 ε2 Then, for every α, β > 0, there is an algorithm RecoverMean(X1 , . . . , Xn , ε, δ, γ, α, β) which runs in timepoly(d, 1/γ, 1/εβ , 1/α, log 1/δ) and outputs a µ b so that with probability 1 − δ, we have √ π+O(γ) 1 kb µ − µk2 ≤ + √β ε. 1−α In particular, observe that Theorem 5, in conjunction with Lemma 1, gives us Theorem 1, if we set γ = o(1). With this, we may state our primary algorithmic contribution: Theorem 6. Fix ε, γ, α, δ, β > 0, and let S0 = (G0 , E0 ) be an ε-corrupted set of samples of size n from N (µ, I), where kµk2 ≤ O(ε log 1/ε), and where n = poly(d, 1/(γε), log 1/δ). Suppose that G0 is (γε, δ)-good with respect to N (µ, I). Let S ⊆ S0 be a set so that ∆(S, G0 ) ≤ ε. Then, there exists an algorithm FilterMeanOpt that given S, ε, γ, α, β outputs one of two possible outcomes: √  π+O(γ) √1 + ε. (i) A µ b, so that kb µ − µk2 ≤ 1−α β (ii) A set S ′ ⊂ S so that ∆(S ′ , G0 ) < ∆(S, G0 ). Moreover, FilterMeanOpt runs in time poly(d, 1/γ, 1/εβ , 1/α, log 1/δ). + By p first running the algorithm of [DKK 16] to obtain an estimate of the mean to error O(ε log 1/ε), then running FilterMeanOpt at most polynomially many times, we clearly recover the guarantee in Theorem 5. Thus, the rest of the section is dedicated to the proof of Theorem 6. At a high level, the structure of the argument is as follows: We first show that if there is a subspace of eigenvectors of dimension at least O(log 1/ε) of the empirical covariance matrix with large associated eigenvalues, then we can produce a filter using a degree-2 polynomial (Section 4.1). Otherwise, we know that there are at most O(log 1/ε) eigenvectors of the empirical covariance 13 with a large eigenvalue. We can learn the mean in this small dimensional subspace using our learning algorithm from the previous section, and then we can argue that the empirical mean on the remaining subspace is close to the true mean (Section 4.2). This outline largely follows the structure of the filter arguments given in [DKK+ 16], however, the filtering algorithm we use here requires a couple of crucial new ideas. First, to produce the filter, instead of using a generic degree-2 polynomial over this subspace, we construct an explicit, structured, degree-2 polynomial which produces such a filter. Crucially, we can exploit the structure of this polynomial to obtain very tight tail bounds, e.g., via the Hanson-Wright inequality. This is critical to avoid a quasi-polynomial runtime. If instead we used arbitrary degree-2 polynomials in this subspace, it would need to be of dimension O(log2 1/ε) and the low-dimensional algorithm in the second step would take quasi-polynomial time. Second, we must be careful to throw out far fewer good points than corrupted points. In particular, by our definition of ∆ (which gives an additional logarithmic penalty to discarding good points) and our guarantee that ∆ decreases, our filter can only afford to throw out an ε/ log(1/ε) fraction of good points in total, since ∆ is initially ε. This is critical, as if we threw away an ε-fraction of good points, then proving that the problem remains efficiently solvable becomes problematic. In particular, if these points were thrown away arbitrarily, then this becomes the full additive and subtractive model, for which a statistical query lower bound prevents us from getting an O(ε)-approximate answer in polynomial time [DKS17]. To avoid discarding too many good points, we exploit tight exponential tail bounds of Gaussians, and observe that by slightly increasing the threshold at which we filter away points, we decrease the fraction of good points thrown away dramatically. 4.1 Making Progress with Many Large Eigenvalues We now give an algorithm for the case when there are many eigenvalues which are somewhat large. Formally, we show: Theorem 7. Fix ε, γ, δ, α, β > 0, and let S0 = (G0 , E0 ) be an ε-corrupted set of samples of size n from N (µ, I), where kµk2 ≤ O(ε log 1/ε), and where n = poly(d, 1/(γε), log 1/δ). Suppose that b be the G0 is (γε, δ)-good with respect to N (µ, I). Let S ⊆ S0 be a set so that ∆(S, G0 ) ≤ ε. Let Σ sample covariance of S, let µ b be the sample mean of S, and let V be the subspace of all eigenvectors b − I with eigenvalue more than 1 ε. Then, there exists an algorithm FilterMeanManyEig of Σ β that given S, ε, γ, δ, α, β outputs one of two possible outcomes: 1. If dim(V ) ≥ C1 β log(1/ε), then it outputs an S ′ so that ∆(S ′ , G0 ) < ∆(S, G0 ). 2. Otherwise, the algorithm outputs “OK”, and outputs an orthonormal basis for V . b − I, and if there are too Our algorithm works as follows: It finds all large eigenvalues of Σ many, produces an explicit degree-2 polynomial which, as we will argue, produces a valid filter. The formal pseudocode for our algorithm is in Algorithm 4. For clarity of exposition, we defer the proof of Theorem 7 to Appendix C. 4.2 Returning an Estimate When There are Few Large Eigenvalues At this point, we have run the filter of Algorithm 4 until there are few large eigenvalues. In the subspace with large eigenvalues, we again run the low dimensional algorithm to obtain an estimate for the mean in this subspace. Recall that Lemma 3 guarantees the accuracy of this estimator within this subspace. In the complement of this subspace, where the empirical covariance is very 14 Algorithm 4 Filter if there are many large eigenvalues of the covariance 1: function FilterMeanManyEig(S, ε, γ, δ, α, β) 2: Let C1 , C2 , C3 > 0 be sufficiently large constants. b be the empirical mean and covariance of S, respectively. 3: Let µ b and Σ b − I with eigenvalue more than 4: Let V be the subspace of Rd spanned by eigenvectors of Σ 1 β ε. 5: if dim(V ) ≥ C1 β log(1/ε) then 6: Let V ′ be a subspace of V of dimension C1 β log(1/ε). √ 7: Let µ̃ be an approximation to ΠV ′ (µ) with ℓ2 -error π+O(γ) 1−α ε, computed using LearnMeanLowD(V, γ, ε, δ, S, γ). 8: Let p(x) be the quadratic polynomial p(x) = kΠV ′ (x) − µ̃k22 − dim(V ′ ). 9: Find a value T > 0 so that either: (a) T > C2 d log(|S|/δ) and p(x) > T for at least one x ∈ S, or (b) T > 2C3 log(1/ε)/c0 and PrS (p(x) > T ) > exp(−c0 T /(2C3 )) + γε/(d log(|S|/δ)). 10: 11: 12: 13: 14: return S ′ = {x ∈ S : p(x) ≤ T } else return an orthonormal basis for V . end if end function close to the identity, Lemma 5 (stated below) shows that the empirical mean is close to the true mean. This leads to a simple algorithm which outputs an estimate for the mean, described in Algorithm 5. Algorithm 5 Return a mean if there are few large eigenvalues of the covariance 1: function FilterMeanFewEig(S, ε, γ, δ, α, β, V ) √ π+O(γ) 2: Let µ̃V be an approximation to ΠV (µ) with ℓ2 -error 1−α ε, computed using LearnMeanLowD(V, γ, ε, δ, S, γ). 3: Let µ̃V ⊥ be the empirical mean on V ⊥ , ΠV ⊥ µ̂. 4: return µ̃V + µ̃V ⊥ . 5: end function Lemma 5. Let µ, η, G0 , S be as in Theorem 7. Let µ b be the sample mean of S, and let v be a unit ε vector. Suppose that hv, µ − µ bi > β 1/2 . Then VarS [hv, Xi] > 1 + βε . For clarity of exposition, we defer the proof of Lemma 5 to Appendix C. 4.3 The Full High-Dimensional Algorithm We now have almost all the pieces needed to prove the full result. The last ingredient is the fact that, given enough samples, the good set condition is satisfied by the samples from the true distribution. Formally, Lemma 6. Fix η, δ > 0. Let X1 , . . . , Xn be independent samples from N (µ, I), where n = Ω((d log(d/ηδ))6 /η 2 ). Then, S = {X1 , . . . , Xn } is (η, δ)-good with respect to N (µ, I) with probability at least 1 − δ. 15 Proof. This follows from Lemmas 8.3 and 8.16 of [DKK+ 16]. At this point, we conclude with the proof of Theorem 5. Within the subspace V , Lemma √ π+O(γ) 3 guarantees that the mean is accurate up to ℓ2 -error 1−α ε. Within the subspace V ⊥ , the ε contrapositive of the statement of Lemma 5 guarantees the mean is accurate up to ℓ2 -error β 1/2 . The desired result follows from the Pythagorean theorem. 4.4 An Extension, with Small Spectral Noise For learning of arbitrary Gaussians, we will need a simple extension that allows us to learn the mean even in the presence of some spectral norm error in the covariance matrix. Since the algorithms and proofs are almost identical to the techniques above, we omit them for conciseness. Formally, we require: Theorem 8. Fix χ, ε, δ > 0, and let X1 , . . . , Xn be an ε-corrupted set of points from N (µ, Σ), where kΣ − Ik2 ≤ O(χ), kµk2 ≤ O(ε log 1/ε), and where n = poly(d, 1/χ, 1/ε, log 1/δ). For any γ > 0, there is an algorithm RecoverMeanNoisy(X1 , . . . , Xn , ε, δ, γ, χ) which runs in time poly(d, 1/χ, 1/ε, log 1/δ) and outputs a µ b so that with probability 1 − δ, we have kb µ − µk2 ≤ (C + γ)ε + O(χ). This extension follows from two elementary observations: 1. For the learning in low dimensions, observe that the median is naturally robust to error in the covariance, and in general, by the same calculation we did, the error of the median becomes O(ε + α). 2. For the filter, observe that we only need concentration of squares of linear functions, and whatever error we have in this concentration goes directly into our error guarantee. Thus, by the same calculations that we had above, if we filtered for eigenvalues above 1 + O(ε + α), we would immediately get the desired bound. 5 Robustly Estimating the Mean of Degree Two Polynomials In this section, we give robust estimates of E[p2 (X)] for degree-2 polynomials p in subspaces of small dimension, which is an important prerequisite to learning the covariance in high-dimensions. A crucial ingredient in our algorithm is the following improvement theorem (stated and proved in the next section) which shows how to take any weak high-dimensional estimate for the covariance and use it to get an even better robust estimate for E[p2 (X)]. 5.1 Additional Preliminaries Here we give some additional preliminaries we require for the low-dimensional learning algorithm we present here. We will need the following well-known tail bound for degree-2 polynomials: Lemma 7 (Hanson-Wright Inequality [LM00, Ver10]). Let X ∼ N (0, I) ∈ Rd and A be a d × d matrix. Then for some absolute constant c0 , for every t ≥ 0,    2  t t T T , . Pr X AX − E[X AX] > t ≤ 2 exp −c0 · min kAk2F kAk2 We will also require the following lemmata: 16 Lemma 8 (Hölder’s inequality for Schatten norms). Let A, B be matrices. Then, for all p, q so that 1p + 1q = 1, we have kABkS 1 ≤ kAkS p kBkS q . This implies the following corollary: b M be so that kΣ − Σk b F ≤ O(δ), and so that kM kF = 1. Then, we have Corollary 3. Let Σ, Σ, 1/2 1/2 1/2 1/2 b b kΣ M Σ − Σ M Σ kS 1 ≤ 5δ. Proof. We have b 1/2 M Σ b 1/2 kS 1 ≤ kΣ1/2 M Σ1/2 − M kS 1 + kM − Σ b 1/2 M Σ b 1/2 kS 1 . kΣ1/2 M Σ1/2 − Σ We will bound the first term on the RHS by 5δ/2; the second term is bounded symmetrically. We have kΣ1/2 M Σ1/2 − M kS 1 ≤ kΣ1/2 M Σ1/2 − M Σ1/2 kS 1 + kM Σ1/2 − M kS 1 kΣ1/2 − IkS 2 kM Σ1/2 kS 2 + kΣ1/2 − IkS 2 kM kS 2 ≤ 5δ/2 , where the last line follows from Hölder’s inequality for Schatten norms. 5.2 An Improvement Theorem Here we state and prove one of the main technical ingredients in our algorithm for robustly learning the covariance. Theorem 9. Fix ε, δ, τ > 0. Let Σ be so that kΣ − IkF ≤ O(ε log 1/ε), and fix a p ∈ P2 , where P2 denotes the set of even degree-2 polynomials in d variables. Let G0 be an (ε, δ)-good set of samples from N (0, Σ), and let S = {X1 , . . . , Xn } be so that ∆(S, G0 ) ≤ ε. Then, for any C > 0 there is an algorithm LearnMeanChiSquared which, given p, X1 , . . . , Xn , and ε, outputs a µ b so that with probability 1 − τ over the randomness of the algorithm, µ b− E X∼N (0,Σ) [p(X)] ≤ kΣ − IkF /C + O(log(C)ε) . Moreover, the algorithm runs in time O(|S| + log(1/τ )/ε2 ). The way to think about how this result fits into the overall strategy is that robustly estimating the covariance is equivalent to robustly estimating the mean of every (normalized) degree-two polynomial p. The above theorem shows how a weak estimate in high-dimensions can be used to obtain stronger estimates in one dimension, which ultimately we will use to improve the highdimensional estimate as well. The above theorem is the workhorse in our proof. Our algorithm itself is simple, however, its correctness is quite non-trivial. We define some threshold T . Given our corrupted set of samples from N (0, Σ), we use our corrupted data set to estimate the mean of p(X) conditioned on the event that |p(X)| ≤ T . Then, to estimate the contribution of the mean from points X so that |p(X)| > T , we estimate this by EX∼N (0,I) [p(X)1|p(X)|>T ]. In other words, we are replacing the contribution of the true tail by an estimate of the contribution of p(X) when X ∼ N (0, I) on this tail. The formal pseudocode is given in Algorithm 6. Intuitively, this algorithm works because of two reasons. First, it is not hard to show that the influence of points p(X) within the threshold T on the estimator are bounded by at most T . Hence, the adversary cannot add corrupted points within this threshold and cause our estimator to deviate 17 too much. Secondly, because we know that kΣ − IkF is small, by carefully utilizing smoothness properties of sums of chi-squared random variables, we are able to show that our estimate for the contribution of the tail is not too large. At a high level, this is because “most” of the distance between two chi-squared random variables must remain close to the means, so the difference in the tails is much smaller. Proving that this holds in a formal sense is the majority of the technical work of this section. Proof. We know the distribution of p(X ′ ) for X ′ ∼ N (0, I) explicitly and wish to use this to get a better estimate for the mean of p(X) for X ∼ N (0, Σ) than might be given by the mean of the ε-corrupted set of samples. Algorithm 6 Approximating E[p(X)] for X ∼ N (0, Σ) with corrupted samples. 1: function LearnMeanChiSquared(X1 , . . . , Xn , p(x), ε, τ ) 2: Let T = O(log  C).  x − T, for x ≥ T 3: Let f (x) = 0, for |x| ≤ T .   x + T, for x ≤ −T P 4: Compute α = ni=1 (p(Xi ) − f (p(Xi )))/n. ′ from X ′ ∼ N (0, I). 2 5: Simulate m = O((ln X1′ , . . . , Xm Pmτ )/ε ) samples ′ 6: Return µ b = α + i=1 f (p(Xi ))/n. 7: end function It follows from (ε, δ)-goodness that | PrX ′ ∼N (0,Σ) [p(X ′ ) > t] − #{Xi : p(Xi ) > t}/n| ≤ 2ε for all t. We need to express the expectation in terms that we can use this to bound. For Z = p(X ′ ), we have that Z T Z T Pr[Z < −t]dt . Pr[Z > t]dt − E[Z − f (Z)] = E[max{T, min{−T, Z}}] = 0 0 Similarly, the samples have α= n X i=1 (p(Xi ) − f (p(Xi ))/n = Z T 0 #{Xi : p(Xi ) > t} dt − n Z t 0 #{Xi : p(Xi ) < −t} dt . n Thus, we have | E[Z − f (Z)] − α| ≤ 2T ε. Since p ∈ P2 , we have E[p(X ′ )] = 1 for X ′ ∼ N (0, I). Thus, we have Var[f (p(X ′ ))] ≤ E[f (p(X ′ ))2 ] ≤ E[p(X ′ )2 ] = 1. It follows by results that the empirical after Pstandard concentration ′ )/n − E[p(X ′ )]| ≤ ε with probability 1 − τ . taking m = O(ln(1 − τ )/ε2 ) samples has | m f (p(X ) i i=1 When this holds, we have µ b− E X∼N (0,Σ) [p(X)] ≤ (2T + 1)ε + E [f (p(X))] − X∼N (0,I) E [f (p(X))] . X∼N (0,Σ) To prove the correctness of the algorithm it remains to show that: Lemma 9. For any constant C > 0, for T = O(log C), we obtain E [f (p(X))] − X∼N (0,I) E [f (p(X ′ ))] ≤ X ′ ∼N (0,Σ) 18 kΣ − IkF . C Proof. Let M be the symmetric matrix with kM kF = 1 such that p(x) = xT M x for x ∈ Rd . We can write p(X) with X ∼ N (0, I) as p(X) + tr(M ) = X T M X = X T O T DOX = Y T DY = d X ai Yi2 , i=1 where O is orthogonal, D is diagonal, ai are the eigenvalues of M , and Y ∼ N (0, I) hence Yi are P 2 i.i.d. from N (0, 1). Since kM kF = 1, here we have ai = 1. If instead we express p(X ′ ) in terms of X ′ ∼ N (0, σ 2 ), we obtain: ′ p(X ) + tr(M ) = Y ′T Σ 1/2 MΣ 1/2 ′ Y =Y ′T ′T ′ ′ ′ T ′ O DOY =Y DY = d X bi Yi2 , i=1 where O′ is orthogonal, D ′ is diagonal, bi are the eigenvalues of Σ1/2 M Σ1/2 , and Y ′ , Y ∼ N (0, I) hence Yi are i.i.d. from N (0, 1). P By Corollary 3, we have that i |bi − ai | ≤ (5/2)kΣ − IkF . Now consider the random variables Zi,λ = −tr(M ) + where d X j=1 cj (Yi2 − 1) ,    bj , cj = (1 − λ)ai + λbi   aj for j < i for j = i , for j > i for 1 ≤ i ≤ d and 0 ≤ λ ≤ 1. Note that Zi,1 = Zi+1,0 , for 1 ≤ i ≤ d − 1. Note that, to prove the lemma, it suffices to show that X 2|bi − ai |/5C . | E[f (Z1,0 )] − E[f (Zd,1 )]| ≤ i To this end, Pconsider how P E[f (Zi,λ )] varies with λ. We can write Zi,λ = Z−i + Zi , where Z−i = −tr(M ) + j<i bj Yj2 + j>i aj Yj2 ; and Zi = ci Yi2 , where ci = ((1 − λ)ai + λbi ). We assume for now that ci 6= 0. Since only Zi depends on λ, we have d E[f (Zi,λ )] d = E[f (Z−i + Zi )] dλ dλ   d E [f (Z−i + Zi )] = E Z−i dλ Zi  Z ∞  d = E f (Z−i + x)Pi (x)dx Z−i dλ −∞  Z ∞ f (Z−i + x)dPi (x)/dλdx , = E Z−i −∞ where Pi (x) is the probability density function of the random variable Zi . Standard results about the χ2 distribution give that: Fact 1. Let Y1 , Y2 , Y3 ∼ N (0, 1). Then the probability density function of Y12 is Y12 + Y22 is 1 −x/2 , 2e and of Y12 + Y22 + Y32 is √ √ x e−x/2 . 2π 19 √ 1 e−x/2 , 2πx of This gives that Pi (x) = √ 1 e−x/2ci . 2πxci Now consider the derivative: 1 1 /dλ · e−x/2ci + √ · de−x/2ci /dλ 2πxci 2πxci 1 dci x 1 dci −x/2ci =− √ · 2 · e−x/2ci · ·e +√ · 3/2 dλ dλ 2πxci 2ci 2 2πxci √ (bi − ai ) x −x/2ci bi − a i e−x/2ci + √ e =− √ 3/2 5/2 2 2πxci 2πci dPi (x)/dλ = d √ (3) = ((bi − ai )/2ci )(Pi (x) − Pi (x)) , (3) where Pi (x) is the distribution of Zi + Zi′ + Zi′′ , where Zi′ and Zi′′ are i.i.d. copies of Zi . We thus have  Z ∞ d E[f (Zi,λ )] f (Z−i + x)dPi (x)/dλdx = E Z−i dλ −∞ = ((bi − ai )/2ci ) E [E[f (Z−i + Zi )] − E[f (Z−i + Zi + Zi′ + Zi′′ )]] Z−i = ((bi − ai )/2ci ) E[f (Zi,λ ) − f (Zi,λ + Zi′ + Zi′′ )] = ((bi − ai )/2ci ) E [f (Zi,λ ) − ′E ′′ [f (Zi,λ + Zi′ + Zi′′ )]] . Zi,λ Zi ,Zi Since f has Lipschitz constant 1, |f (Zi,λ ) − EZi′ ,Zi′′ [f (Zi,λ + Zi′ + Zi′′ ]| ≤ E[Zi′ + Zi′′ ] = 2ci whatever value Zi,λ takes. Using the probability distribution of Zi′ + Zi′′ , in the case ci > 0, we have for all |z| ≤ T , Z ∞ ′′ ′ e−x/2ci /2ci · (z + x − T )dx E ′′ [f (z + Zi + Zi )] = ′ Zi ,Zi T −z −(T −z)/2ci =e (z − T + 2ci + (T − z)) = 2ci e−(T −z)/2ci . Since ci ≤ max ai , bi ≤ 1 + O(ε log(1/ε)) ≤ 2, for large enough T = O(log C), we have e−(T /2)/2ci ≤ 1/C 2 T . We assume that this holds. For −T ≤ z ≤ T /2, we have 2ci e−(T −z)/2ci ≤ 2ci /C 2 T . A similar argument when ci < 0 gives that for −T /2 ≤ z ≤ T , we have 2|ci |e−(T −z)/2ci ≤ 2|ci |/C 2 T . Now we have enough to show that d E[f (Zi,λ )] ≤ |(bi − ai )/2ci || E [f (Zi,λ ) − ′E ′′ [f (Zi,λ ) + Zi′ + Zi′′ )]| Zi,λ dλ Zi ,Zi ≤ Pr [|Zi,λ − tr(M )| ≥ T /2]|(bi − ai )| + |(bi − ai )|/C 2 . Zi,λ By the Hanson-Wright inequality, we have that for any x, √ Pr [|Zi,λ − E[Zi,λ ]| ≥ 2kck2 x + kck∞ x] ≤ 2e−x , Zi,λ where c = (b1 , . . . , bi − 1, ci , ai+1 , . . . , ad ). Note that kck2 ≤ 1 + O(kΣ − IkF ) ≤ 2. Also, E[Zi,λ ] + P tr(M ) is the sum of coordinates of c, and so | E[Zi,λ ]| ≤ ij=1 |bj − aj | ≤ O(kΣ − IkF ) ≤ 1. Putting this together, we obtain Pr [|Zi,λ − tr(M )| ≥ T /2] ≤ 2 exp(−((T − 1)/8)2 ) ≤ 1/C 2 . Zi,λ 20 Finally, we have that, assuming ci 6= 0, d E[f (Zi,λ )] ≤ 2|(bi − ai )|/C 2 . dλ Now we need to deal with the special case ci = 0. Note that since f is Lipschitz, for any β ∈ R, we have | E[f (Z−i + βYi2 ) − f (Z−i )]|/|β| ≤ | E[Yi2 ]| ≤ 1. By considering the limit as β tends to d E[f (Zi,λ )] ≤ 1. zero from above or below, we get that when ci = 0, the derivative still exists and dλ Since the limit 2|(bi − ai )|/C 2 only does not apply at one point where E[f (Zi,λ )] is still continuous as a function of λ, this is not an issue. We still obtain that | E[f (Zi,0 )] − E[f (Zi,1 )]| ≤ 2|(bi − ai )|/C 2 . Recalling that Zi,1 = Zi+1,0 with Z1,0 = p(X ′ ) and Zd,1 = p(X) for X ′ ∼ N (0, 1) and X ∼ N (0, Σ), we have by the Mean Value Theorem, that X | E[f (p(X ′ ))] − E[f (p(X)]| ≤ | E[f (Zi,0 )] − E[f (Zi,1 )]| i ≤ 2|(bi − ai )|/C 2 ≤ O(kΣ − IkF /C 2 ) ≤ kΣ − IkF /C , as required. This completes the proof of the theorem. 5.3 Working in a Low-Dimensional Space of Degree-Two Polynomials We now show that via similar techniques as before, we can patch our estimates together to find a matrix which agrees with the ground truth on all degree-two polynomials in a fixed subspace of low dimension. Formally, we show: Theorem 10. Fix ε, τ > 0. Let Σ be so that kΣ−IkF ≤ O(ε log 1/ε). Let G0 be an (ε, δ)-good set of samples from N (0, Σ), and let S = {X1 , . . . , Xn } be so that ∆(S, G0 ) ≤ ε. Let W1 be a subspace of degree-2 polynomials, and let W2 be an orthogonal subspace of degree-2 polynomials, so that we have b so that EX∼N (0,Σ) [p(X)] − E aΣ b [p(X)] ≤ ξ for all p ∈ W2 . Then there is an algorithm X∼N (0,Σ) b runs in time poly(d, |S|, 2O(dim(W1 )) , log 1/τ ), LearnMeanPolyLowD which given ε, S, W1 , W2 , Σ and returns a Σ′ so that E N (0,Σ) [p(X)] − E [p(X)] ≤ 4 (kΣ − IkF /C + O(log(C)ε) + ξ , N (0,Σ′ ) for all p ∈ span(W1 ∪ W2 ) ∩ P2 , with probability 1 − τ . In particular, this implies: Corollary 4. Fix ε, τ > 0. Let Σ be so that kΣ − IkF ≤ O(ε log 1/ε). Let G0 be an (ε, δ)good set of samples from N (0, Σ). Let S = {X1 , . . . , Xn } be so that ∆(S, G0 ) ≤ ε. Let V be a subspace of Rd . Then there is an algorithm LearnCovLowDim which given S, ε, ξ, τ, V runs in 2 time poly(|S|, 2O(dim(V ) ) , log 1/τ ) and returns a Σ′ so that  kΠV Σ − Σ′ ΠV k2 ≤ 4 (kΣ − IkF /C + O(log(C)ε) , with probability 1 − τ . 21 Proof. Observe that the dimension of the space of degree-2 polynomials W in V is O(dim(V )2 ). Run the algorithm in Theorem 10 with the same parameters as before, with W1 = W and W2 = ∅ (so that we may take ξ = 0), and then the guarantee of that algorithm, along with Lemma 10, gives our desired guarantee. We now describe the algorithm for Theorem 10. Essentially, we do the same thing as we did for low-dimensional learning in the unknown mean case: we take a constant net over V ∩ P2 , l earn the mean over every polynomial in the net, and then find a Σ′ which is close in each direction to the learned mean. Since we will not attempt to optimize the constant factor here, will will use a naive LP-based approach to find a point which is close to optimal. The formal pseudocode is given in Algorithm 7. Algorithm 7 Filter if there are many large eigenvalues of the covariance 1: function LowDimCovLearning(S, ε, ξ, τ, W1 , W2 ) 2: Generate a 1/2-cover C for W1 ∩ P2 . 3: Let τ ′ = 2−|C| τ 4: for p ∈ C do 5: Compute mp = LearnMeanChiSquared(S, p, ε, τ ′ ). 6: Generate a linear constraint cp (Σ′ ): EN (0,Σ′ ) [p(X)] − mp ≤ kΣ − IkF /C + O(log(C))ε. 7: end for 8: Generate the convex constraint that EN (0,Σ′ ) [p(X)] − EN (0,Σ′ ) [p(X)] ≤ ξ for all p ∈ W2 . 9: Using a convex program, return any matrix Σ′ which obeys cp (Σ′ ) for all p ∈ C. 10: end function Observe that every constraint for each polynomial in W1 is indeed linear in Σ′ , by Lemma 10. Moreover, the constraint for W2 has an explicit separation oracle, since it induces a norm, and for any p ∈ W2 , we may explicitly compute EN (0,Σ′ ) [p(X)] − EN (0,Σ′ ) [p(X)]. Thus, we may use separating hyperplane techniques to solve this convex program in the claimed running time. Proof of Theorem 10. Let us condition on the event that LearnMeanChSquared succeeds for each p ∈ C. By a union bound, this occurs with probability at least 1 − τ . Thus, in each p ∈ C, we have that |mp − EX∼N (0,Σ) [p(X)]| ≤ β, where β = kΣ − IkF /C + O(log(C))ε. Let Σ′ be the matrix we find. By the triangle inequality, we then have that for every p ∈ C, that | EN (0,Σ′ ) [p(X)] − EN (0,Σ) [p(X)]| ≤ 2β. Hence, by the usual net arguments, we know that for every p ∈ V ∩ P2 , | E [p(X)] − N (0,Σ′ ) E [p(X)]| ≤ 4β . N (0,Σ) Moreover, by triangle inequality, for every p ∈ W2 , we have EN (0,Σ′ ) [p(X)] − EN (0,Σ′ ) [p(X)] ≤ 2ξ. The result then follows from the Pythagorean theorem. 6 Robustly Learning the Covariance in High-Dimensions In this section, we show how to robustly estimate the covariance of a mean-zero Gaussian in highdimensions up to error O(ε). We use our low-dimensional learning algorithm from the previous section as a crucial subroutine in what follows. Our main algorithmic contribution is as follows: Theorem 11. Fix ε, δ > 0, and let S0 = (G0 , E0 ) be an ε-corrupted set of samples of size n from N (0, Σ), where kΣ − IkF ≤ ξ where ξ = O(ε log 1/ε), and where n = poly(d, 1/ε, log 1/δ). Suppose 22 that G0 is (ε, δ)-good with respect to N (0, Σ). Let S ⊆ S0 be a set so that ∆(S, G0 ) ≤ ε. Then, there exists an algorithm ImproveCov that given S, ξ, ε, fails with probability at most poly(ε, 1/d, δ), and otherwise outputs one of two possible outcomes: b so that kΣ b − ΣkF ≤ kΣ − IkF /2. (i) A matrix Σ, (ii) A set S ′ ⊂ S so that ∆(S ′ , G0 ) < ∆(S, G0 ). Moreover, ImproveCov runs in time poly(d, (1/ε)O(log 4 1/ε) , log 1/δ). By first applying the algorithm in [DKK+ 16] to produce an initial estimate for Σ, and then iterating the above algorithm polynomially many times, this immediately yields: Corollary 5. Fix ε, δ > 0, and let G0 be a set of i.i.d. samples from N (0, Σ), where n = poly(d, 1/ε, log 1/δ). Let S be so that ∆(S, G0 ) ≤ ε. There is an universal constant C and an b so that with probability 1 − δ, we have kΣ b −1/2 ΣΣ b −1/2 − IkF ≤ Cε. In algorithm which outputs a Σ particular, this implies that   b ≤ 2Cε . dTV N (0, Σ), N (0, Σ) 6.1 Technical Overview Our strategy for obtaining a high-dimensional estimate for the covariance based on solving lowdimensional subproblems will be substantially more challenging than it was for the unknown mean case. The natural approach is to take the poly log(1/ε)-dimensional subspace of degree-2 polynomials of largest empirical variance and construct a filter. However, this fails because, unlike in the mean case, we do not know the variance of these degree-2 polynomials to small error. For the unknown mean case, because we assumed that we knew the covariance was the identity (or spectrally close to the identity), this was not an issue. Now, the variance of our polynomials depends on the (unknown) covariance of the true Gaussian, which may be more than O(ε)-far from our current estimate. Indeed, it is not difficult to come up with counterexamples where there are many large eigenvalues of the empirical covariance matrix, but no filter can make progress. We overcome this hurdle in several steps. First, in Section 6.3, we show how to find a filter if there are many medium-sized eigenvalues of the empirical covariance matrix. This will proceed roughly in the same way that the filter for the unknown mean does. If no filter is created, then we know there are at most logarithmically large eigenvalues of the empirical covariance. In the subspace V ⊆ Rd spanned by their eigenvectors, we can then learn the covariance to high accuracy using our low-dimensional estimator. Then, in Section 6.3, we show that if we restrict to the orthogonal subspace, i.e., the subspace where the empirical covariance matrix does not have large eigenvalues, we can indeed either produce a filter or improve our estimate of the covariance restricted to this subspace using our low-dimensional estimator. While the blueprint is similar to the filter for the unknown mean, the techniques are much more involved and subtle. Supposing we have not yet created a filter, we have now estimated the covariance on a polylogarithmic dimensional subspace V , and on V ⊥ . This does not in general imply that we have learned the covariance in Frobenius norm. In block form, if we write   ΣV AT , Σ= A ΣV ⊥ 23 where here Rd is written as V ⊕ V ⊥ , this implies we have learned ΣV and ΣV ⊥ to high accuracy. Thus, it remains to estimate the cross term A. In Section 6.4, we show, given a polylogarithmically sized subspace V , and a good estimate of the covariance matrix on V and V ⊥ , how to fill in the entire covariance matrix. Roughly, we do this by randomly fixing directions in V , and performing rejection sampling based on the correlation in the direction in V , and showing that the problem reduces to one of robustly learning the mean of a Gaussian, which (conveniently) we have already solved. These steps together yield our overall algorithm ImproveCov. Finally, in Section 6.6 we explain why there is a natural barrier that makes reducing the running time from quasi-polynomial to polynomial (in 1/ε) difficult. 6.2 Additional Preliminaries Here we give some additional preliminaries we will require in this Section. 6.2.1 The Agnostic Tournament We also require the following classical result, which allows us to do agnostic hypothesis selection with corrupted samples (see e.g., [DL01, DDS12, DK14, DDS15]). Theorem 12. Fix ε, δ > 0. Let D1 , . . . , Dk , D be a set of distributions where mini dTV (Di , D) = γ. 1/δ . There is an algorithm Tournament which given oracles for evaluating Set n = Ω log k+log ε2 the pdfs of D1 , . . . , Dk along with n independent samples X1 , . . . Xn from D, outputs a Di so that dTV (Di , D) ≤ 3γ + ε with probability 1 − δ. Moreover, the running time and number of oracle calls needed is at most O(n2 /ε2 ). Remark 1. As a simple corollary of the agnostic tournament, observe that this allows us to do agnostic learning without knowing the precise error rate ε. Throughout the paper, we assume the algorithm knows ε. However, if the algorithm is not given this information, and instead given an η and asked to return something with error at most O(ε + η), we may simply grid over {η, (1 + γ)η, (1 + γ)2 η, . . . , 1} (here γ is some arbitrary constant that governs a tradeoff between runtime and accuracy), run our algorithm with ε set to each element in this set, and perform hypothesis selection via Tournament. Then it is not hard to see that we are guaranteed to output something which has error at most O(ε + (1 + γ)η). 6.2.2 The Fourth Moment Tensor of a Gaussian As in [DKK+ 16], it will be crucial for us to understand the behavior of the fourth moment tensor of a Gaussian. Let ⊗ denote the Kronecker product on matrices. We will make crucial use of the following definition: 2 Definition 6. For any matrix M ∈ Rd×d , let M ♭ ∈ Rd denote its canonical flattening into a vector 2 2 in Rd , and for any vector v ∈ Rd , let v ♯ denote the unique matrix M ∈ Rd×d so that M ♭ = v. We will also require the following definition: 2 Definition 7. Let Ssym = {M ♭ ∈ Rd : M is symmetric}. The following result was proven in [DKK+ 16]: Theorem 13 (Theorem 4.15 in [DKK+ 16]). Let X ∼ N (0, Σ). Let M be the d2 × d2 matrix given by M = E[(X ⊗ X)(X ⊗ X)T ]. Then, as an operator on Ssym , we have    T . M = 2Σ⊗2 + Σ♭ Σ♭ 24 6.2.3 Polynomials in Gaussian Space Here we review some basic facts about polynomials under Gaussian measure, which will be crucial for our algorithm for learning Gaussians with unknown covariance. We equip the set of polynomials over Rd with the Gaussian inner product, defined by hf, gi = EX∼N (0,I) [f (X)g(X)], and we let kf k22 = hf, f i. For any symmetric M with kM kF = 1, define the degree-2 polynomial p(x) = √12 (xT M x − tr(M )). We call p the polynomial associated to M . Observe that p is even (i.e., has no degree-1 terms). We will use the following properties of such polynomials: Lemma 10. Let M be symmetric, so that kM kF = 1. Let p be its associated polynomial. Then, we have: (i) EX∼N (0,I) [p(X)] = 0. (ii) More generally, for any positive definite matrix Σ, we have EX∼N (0,Σ) [p(X)] = hM, Σ − Ii. (iii) VarX∼N (0,I) [p(X)] = EX∼N (0,I) [p2 (X)] = hp, pi = 1. (iv) More generally, for any positive definite matrix Σ, we have 2 T 1 E [p2 (X)] = M ♭ Σ⊗2 M ♭ + hΣ − I, M ♭ i . 2 X∼N (0,Σ) Proof. The first three properties are a straightforward calculation. We show the last one here. By definition, we have E X∼N (0,Σ) 1 E [(X T M X − tr(M ))2 ] 2 X∼N (0,Σ) 1 E [(X T M X)2 − 2(X T M X)tr(M ) + tr(M )2 ] = 2 X∼N (0,Σ)   1 T ♭ 2 ♭T = E [M (X ⊗ X)(X ⊗ X) M ] − 2hM, Σitr(M ) + tr(M ) 2 X∼N (0,Σ)    T T (a) 1 M ♭ 2Σ⊗2 + Σ♭ Σ♭ M ♭ − 2hM, Σitr(M ) + tr(M )2 = 2  T 1 ♭ = M ♭ Σ⊗2 M ♭ + hM , Σi2 − 2hM, Σitr(M ) + tr(M )2 2 2 1 ♭ ♭ T ⊗2 =M Σ M + hΣ − I, M ♭ i , 2 [p2 (X)] = as claimed, where (a) follows from Theorem 13. Observe that Lemma 10(iv) implies that if we take the top eigenvector of the d2 × d2 matrix Σ⊗2 + on the linear subspace 1  ♭   ♭ ⊤ M M 2 V = {M ♭ : M is a symmetric d × d matrix} , then the associated polynomial maximizes EX∼N (0,Σ) [p2 (X)], and so we can find these polynomials efficiently. More generally, if we take any linear subspace of degree two polynomials with associated 25 matrix subspace V ′ , so that V ′ ⊆ V , then the top eigenvector of the same matrix restricted to V ′ allows us to find the polynomial in this subspace which maximizes EX∼N (0,Σ) [p2 (X)] efficiently. We have the following tail bound for degree-2 polynomials in Gaussian space: We will use ΠV (x) and ΠV (S) to denote projection to a subspace V , of a point x and a set of points S, respectively. We will also need the following hypercontractivity theorem for low-degree polynomials in Gaussian space: Theorem 14 (Hypercontractivity in Gaussian space, see e.g. [O’D14]). Let p : Rd → R be a degree √ m polynomial, and let q ≥ 2 be even. Then EX∼N (0,I) [p(X)q ]1/q ≤ ( q − 1)m kpk2 . We need the following definition: Definition 8. Let Pk denote the set of even degree-k polynomials over d variables satisfying VarX∼N (0,1) [p(X)] = 1. Moreover, for any subspace W ⊆ Rd , let Pk (W ) denote the set of even polynomials over d variables which only depend on the coordinates in W . b Then by the arguments above, we have that for any two matrices Σ, Σ, ! b F = sup kΣ − Σk E [p(X)] − E [p(X)] . p∈P2 X∼N (0,Σ) b X∼N (0,Σ) In particular, by Lemma 2, this implies that when kΣ − Ik2 is small, then learning a Gaussian with unknown covariance in total variation distance is equivalent to learning the expectation of every even degree-2 polynomial. Theorem 14 implies the following concentration for degree-4 (more generally, low-degree) polynomials of Gaussians: Corollary 6. Let p be a degree-4 polynomial. Then there is some A, C ≥ 0 so that for all t ≥ C, we have   Pr [|p(X) − E [p(X)]| ≥ tkpk2 ] ≤ exp −At1/2 . N (0,I) N (0,I) Proof. Hypercontractivity in particular implies the following moment bound: for all q ≥ 2 even, we have E [(p(X) − E [p(X)])q ] ≤ (q − 1)qm/2 kp(X) − E [p(X)]kq2 . N (0,I) N (0,I) N (0,I) By a typical moment argument, and optimizing the choice of q, this gives the desired bound. Hermite polynomials Hermite polynomials are what arise by Gram-Schmidt orthogonalization applied with respect to this inner product. For a vector of non-negative integers a = (a1 , . . . , ad ), we let Ha (x) : Rd → R be the Hermite Pd polynomial associated with multi-index a. It is well-known that the degree of Ha is |a| = i=1 ai , and moreover, hHa , Hb i = δa,b . In particular, for any r ≥ 1, the Hermite polynomials of degree at most r form an orthonormal basis with respect to the Gaussian inner product for all polynomials with degree at most r. Therefore, given any polynomial p : Rd → R with degree r, we may write it uniquely as X p(x) = ca (p)Ha (x), where ca (p) = hp, Ha i . |a|≤r We define the kth harmonic component of p to be X p[k](x) = ca (p)Ha (x) , |a|=k and we say p is harmonic of degree k if it equals its kth part. 26 6.3 Working with Many Large Eigenvalues of the Second and Fourth Moment As in the unknown mean case, we will need a filter to detect if there are many directions of the empirical covariance which have too large an eigenvalue. Formally, we need: Theorem 15. Fix ε, δ > 0. Assume kΣ − IkF ≤ ξ, where ξ = O(ε log 1/ε). Suppose that G0 b = ES [XX T ]. is (ε, δ)-good with respect to N (0, Σ). Let S be a set so that ∆(S, G0 ) ≤ ε. Let Σ Then there is an algorithm FilterCovManyDeg2Eig and a universal constant C such that the following guarantee holds: b − I has more than O(log 1/ε) eigenvalues larger than Cξ, then the algorithm outputs a 1. If Σ ′ S so that ∆(S ′ , G0 ) < ∆(S, G0 ). 2. Otherwise, the algorithm outputs “OK”, and outputs an orthonormal basis v1 , . . . , vk for the b − I with eigenvalue larger than Cξ. subspace V of vectors spanned by all eigenvectors of Σ The filter developed here is almost identical to the one developed for unknown mean. Thus, for conciseness we describe and prove the theorem in Appendix D.1. We will also need a subroutine to enforce the condition that not only does the fourth moment tensor have spectral norm which is at most O(ε log2 1/ε) (restricted to a certain subspace of polynomials), but there can only be at most O(poly log 1/ε) directions in which the eigenvalue is large. However, the techniques here are a bit more complicated, for a number of reasons. Intuitively, the main complication comes from the fact that we do not know what the fourth moment tensor looks like, whereas in the unknown mean case, we knew that the covariance was the identity by assumption. Our main result in this subsection is the following subroutine: Theorem 16 (Filtering when there are many large eigenvalues). Fix ε, δ > 0. Assume kΣ − IkF ≤ ξ, where ξ = O(ε log 1/ε). Let C be the universal constant in FilterCovManyDeg2Eig. Let W ⊆ Rd be a subspace, so that for all v ∈ W with kvk2 = 1, we have v T ES [XX T ]v ≤ 1 + Cξ. Suppose that G0 is (ε, δ)-good with respect to N (0, Σ). Let S be a set so that ∆(S, G0 ) ≤ ε. Let k = O(log4 1/ε). Then there is an algorithm FilterCovManyDeg4Eig and universal constants C1 , C2 such that the following guarantee holds: 1. If there exist p1 , . . . , pk ∈ P2 (W ) so that hpj , pℓ i = δjℓ for all j, ℓ, and so that ES [p2j (Y )] − 1 ≥ C1 ε for all j, then the algorithm outputs an S ′ so that ∆(S ′ , G0 ) < ∆(S, G0 ). 2. Otherwise, the algorithm outputs “OK”, and outputs an orthonormal basis p1 , . . . , pk′ for a subspace V of degree-2 polynomials in P2 (W ) with k′ ≤ k so that for all p ∈ V ⊥ ∩ P2 , we have ES [p2 (X)] − 1 ≤ C2 ε. Moreover, FilterCovManyEig runs in time poly(d, 1/ε, log 1/δ). Roughly, we will show that if there are many polynomials with large empirical variance, this implies that there is a degree-four polynomial whose value is much larger than it could be if w were the set of uniform weights over the uncorrupted points. Moreover, we can explicitly construct this polynomial, and it has a certain low-rank structure which allows us to use the concentration bounds we have previously derived. 6.4 Stitching Together Two Subspaces This section is dedicated to giving an algorithm which allows us to fully reconstruct the covariance matrix given that we know it up to small error on a low-dimensional subspace V and on W = V ⊥ . 27 Algorithm 8 Filter if there are many large eigenvalues of the fourth moment tensor 1: function FilterCovManyEig(S, ε, ξ, δ, W ) b = ES [XX T ] 2: Let Σ 3: Let C1 , C2 , C3 be some universal constants sufficiently large 4: Let A be the constant in Corollary 6 5: Let B be the constant in Claim 20 6: Let m = 0 7: Let k = O(log4 1/ε) 8: while there exists p ∈ P2 (W ) so that p ∈ V ⊥ and ES [p2 (X)] − 1 > C1 ξ do 9: Let Vm+1 = span(Vm ∪ p) 10: Let m ← m + 1 11: end while 12: Let p1 , . . . , pm be an orthonormal basis for Vm 13: if m ≥ k then [4] 14: Let qi = (p2i ) be the 4th harmonic component of p2i 15: Let ri = p2i − qi be the degree-2 component of p2i P 16: Let Q(x) = ki=1 qi 17: Find a T so that either: √ • T > C3 d2 k log(|S|) and p(X) > T for at least one x ∈ S ′ , OR √ • T > 4A2 C2 B k log2 (1/ε) and √ Pr [Q(X) > T ] > exp(−A(T /4B k)1/2 ) + ε2 /(d log(|S|/δ))2 . X∈u S 18: 19: 20: 21: 22: return the set S ′ = {X ∈ S : Q(X) ≤ T } else return “OK”, and output p1 , . . . , pm end if end function Theorem 17. Let 1 > ξ > η > ε > 0, and let τ > 0. Let Σ so that kΣ − IkF ≤ ξ. Suppose that Rd is written as V ⊕ W for orthogonal subspaces V and W with dim(V ) = O(log(1/ε)). Suppose furthermore that   ΣV AT , Σ= A ΣW with kΣV − IV kF , kΣW − IW kF = O(η). Let S0 = (G0 , E0 ) be an ε-corrupted set of samples from N (0, Σ), and let S ⊆ S0 with ∆(S, G) ≤ O(ε) of size poly(d, 1/η, log 1/δ). Then, there exists a universal constant C5 and an algorithm Stitching that given V, W, ξ, η, ε, τ and S runs in polynomial time and with probability at least 1 − τ returns a matrix Σ0 with kΣ0 − ΣkF = C5 η + O(ξ 2 ). In the latter, we will show the algorithm works when τ = 2/3. As usual the probability of success can be boosted by repeating it independently.5 The basic idea of the proof is as follows. Since we already know good approximations to ΣV and ΣW , it suffices to find an approximation to 5 Observe the only randomness at this point is in the random choices made by the algorithm. Thus, one can just (j) (ℓ) (1) run this algorithm O(log 1/δ) times to obtain Σ0 , . . . , Σ0 and find any Σ0 which is O(η + ξ 2 ) close to at least a 2/3 + o(1) fraction of the other outputs. 28 A. In order to do this, we note that if we take a sample x from G conditioned on its projection to V being some vector v, we find that the distribution over W is a Gaussian with mean approximately Av. Running our algorithm for approximating the mean of a noisy-Gaussian, we can then compute the mapping v → Av, which will allow us to compute A. There are three main technical obstacles to this approach. The first is that we cannot condition on xV taking a particular value, as we will likely see no samples from X with exactly that projection. Instead, what we will do is given samples from X we will reject them with probabilities depending on their projections to V in such a way to approximate the conditioning we require. The second obstacle is that the errors in X may well be concentrated around some particular projection to V . Therefore, some of these conditional distributions may have a much larger percentage of errors than ε. To circumvent this, we will show that by carefully choosing how we do our conditioning and by carefully picking the correct distribution over vectors v, that on average these errors are only O(ε). Finally, we need to be able to reconstruct A from a collection of noisy approximations to Av. We show that this can be done by computing these approximations at a suitably large random set of v’s, and finding the matrix A that minimizes the average ℓ2 error between Av and its approximation. Our algorithm is given in Algorithm 9: Algorithm 9 Stitching the two subspaces together 1: function Stitching(V, W, δ, ε, τ, S) 2: Given a vector x, let xV and xW be the projections onto V and W , respectively. 3: Let C be a sufficiently large constant (where C may depend on the constants in the big-O terms in the guarantee that dim(V ) = O(log(1/ε))). 4: Generate a set V = {v1 , . . . , vm } of (n/ε)C independent random samples from N (0, 2IV ). 5: for v ∈ V do 6: For each sample x ∈ S, add xW to a new set T independently with probability exp(−kxV − vk2 /2) . 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: Treat T as a collection of independent samples from a noisy Gaussian with covariance matrix IW + O(η). Set av equal to 0 if T did not contain enough samples for our algorithm or if kµ̃k2 > C log(1/ε). for ε ∈ {1, 1/2, 1/4, 1/8, . . . , η} do Let µ e be the output of RecoverMeanNoisy(T, ε, (ε/n)2C , o(1), O(η)). end for Run Tournament with the output hypotheses. Set av = µ̃, where µ e is the winning hypothesis. end for Use linear programming to find the dim(W ) × dim(V )-matrix B that minimizes the convex function Ev∈u S [|av − Bv|]. return   IV 2B T . Σ0 = 2B IW end function Before we prove Theorem 17, we will need the following definition. 29 Definition 9. A function f : Rd → R is a positive measure if f ≥ 0 and R |f |1 = f , and we say f1 ≤ f2 if f1 (x) ≤ f2 (x) pointwise. R f ≤ 1. We write Proof of Theorem 17. Throughout this proof, let G = N (0, Σ). It is clear that this algorithm has polynomial runtime and sample complexity. We have yet to show correctness. The first thing that we need to understand is the procedure of rejection sampling, where we reject x except with probability exp(−kxV − vk2 /2). Therefore, given a distribution D, we let the positive measure Dv be what is obtained by sampling from D and accepting a sample x only with probability exp(−kxV − vk2 /2). We need to understand the distributions Gv and Xv . Note that the pdf of G is given by p (2π)−n/2 det(Σ−1 ) exp(−xΣ−1 x/2)dx. Therefore, the density of Gv is p (2π)−n/2 det(Σ−1 ) exp(−xΣ−1 x/2 − kxV − vk22 /2)dx p =(2π)−n/2 det(Σ−1 ) exp(−x(Σ−1 + IV )x/2 + x · v − kvk22 /2)dx. Note that letting µv := (Σ−1 + IV )−1 v = v/2 + O(δkvk2 ) that this equals p =(2π)−n/2 det(Σ−1 ) exp(−(x − µv )(Σ−1 + IV )(x − µv )/2 − kvk22 /2 + µv · v/2)dx p =(2π)−n/2 det(Σ−1 ) exp(−(x − µv )(Σ−1 + IV )(x − µv )/2 − kvk22 (1 + O(δ))/4)dx. Note that this is a Gaussian with mean µv weighted by s det(Σ−1 ) exp(−kvk22 (1 + O(δ))/4) = Θ(2− dim(V )/2 exp(−kvk22 /4)) , det(Σ−1 + IV ) so long as kvk2 ≪ δ−1/2 . Therefore, if this condition holds, a random sample from G is accepted by this procedure with probability Θ(2− dim(V ) exp(−kvk22 /4). We also need to understand the fraction of samples from Xv that are erroneous. In a slight abuse of notation, let E also denote the distribution which is uniform over the points in E, and let L be the distribution which is uniform over the points in L. Therefore, we define εv := 2n/2 exp(kvk22 /4)(|Ev |1 + |Lv |1 log(1/ε)) , that is approximately the fraction of samples from Xv that are errors (where subtractive errors are weighted more heavily). p Note that so long as kvk2 < C log(1/ε) that so long as |Lv |1 = o(1) that T in Step 5 will have sufficiently many samples with high probability. Furthermore, if this is the case, we have (assuming our mean estimation algorithm succeeds) that kµ̃ − πW (µv )k2 ≤ O(εv + η). Therefore, unless kµv k2 = Ω(C log(1/ε)) (which can only happen in kvk2 = Ω(C log(1/ε))), we have with high probability that kav − πW (µv )k2 = O(εv + η). In fact, we assume that this holds for all v ∈ S with kvk2 ≪ (C log(1/ε)). In order to show that this is generally a good approximation, we need to know that εv is not too large on average. In particular, we show: Lemma 11. If v ∼ N (0, 2IV ), then Ev [εv ] = O(ε). 30 Proof. Letting F = E + log(1/ε)L, we have that Z − dim(V )/2 E[εv ] = (2π) exp(kvk22 /4) exp(−kvk22 /4)dFv dv v Z Z − dim(V )/2 2 = (2π) exp(−kx − vk /2)dF (x)dv = dF = O(ε). Note that πW (µv ) = M v, where M = πW (Σ−1 + IV )−1 πVT . Let B be any dim(W ) × dim(V ) matrix. Note that E [kBv − M vk22 ] = 2kB − M k2F . v∼N (0,2IV ) Therefore, Ev∼N (0,2IV ) [kBv − M vk2 ] = O(kB − M kF ). Since kBv − M vk22 is a degree-2 polynomial in v, by Corollary 4 in [Kan12], # " r E [kBv − M vk42 ]/2 > 1/81. Pr [kBv − M vk2 > kB − M kF /2] > Pr kBv − M vk22 > v∼N (0,2IV ) v∼N (0,2IV ) v∼N (0,2IV ) Combining these we find that E [kBv − M vk2 ] = Θ(kB − M kF ) . v∼N (0,2IV ) Next we show that our choice of S derandomizes this result. Lemma 12. With high probability over the choice of S, we have that E [kBv − M vk2 ] = Θ(kB − M kF ). v∈u S for all dim(W ) × dim(V ) matrices B. Proof. This is equivalent to showing that for all matrices U = B − M it holds E [kU vk] = Θ(kU kF ). v∈u S By the standard scaling laws, it suffices to show this only for U with kU kF = 1. We also note that it suffices to show this only for U in an ε-net for all such matrices. This is because if kU − U ′ kF < ε and if U ′ satisfies the desired condition, then E [kU vk2 ] = E [kU ′ vk2 ] + O( E [k(U − U ′ )vk2 ]) = Θ(1) + O(ε) E [kvk2 ] , v∈u S v∈u S v∈u S v∈u S and with high probability Ev∈u S [kvk2 ] = O(log(1/ε)). Note that such nets exist with size exp(poly(n/ε)). Therefore, it suffices to show that this condition holds for each such U with probability exp(−(n/ε)Ω(C) ). As noted above, it suffices that E [kU vk2 ] = O( E [kU vk2 ]) = O(1) v∈u S v∈u S and that Pr [kU vk2 > 1/4] ≥ Pr [kU vk2 ≥ 1/4] − 1/100. v∈u S v∈u S The first follows because if S = {v1 , . . . , vm } then Ev∈u S [kU vk2 ] is a degree-2 polynomial in the √ vi with mean O(1) and variance O(1/ m), so by standard concentration results, is O(1) with 1 − exp(−Ω(|S|)) probability. The latter follows from standard concentration bounds. This completes the proof. 31 We also note that the random choice of S has another nice property: Lemma 13. With S and av as above, with high probability we have that E [kav − M vk2 ] = O(η) . v∈u S Proof. Let S = {v1 , . . . , vm }. Then kf (vi ) − M vi k2 are independent random variables with mean E[O(εv + η)] = O(η) and variance at most E[kav k22 + kM vk22 ] ≤ O(log2 (1/ε)) + E[kvk22 ] = O(log2 (1/ε)). The result follows by Chernoff bounds. Now by Lemmas 12 and 13 with high probability over the choice of S in Step 4, and the av in Step 5 we have that for all dim(W ) × dim(V )-matrices B that E [kBv − M vk2 ] = Θ(kB − M kF ), v∈u S and have that E [kav − M vk2 ] = O(η). v∈u S Combining these statements, we have that for all dim(W ) × dim(V )-matrices B that E [kav − Bk2 ] = Θ(kB − M kF ) + O(η). v∈u S Note that by taking B = M , this quantity is O(η). Therefore, the B found in Step 15 satisfies O(ε) = E [kav − Bk2 ] = Θ(kB − M kF ) + O(η) , v∈u S and therefore, kB − M kF = O(η). The rest of the proof is a simple computation of the matrices involved. In particular, recall that     IV AT ΣV AT + O(η) , = Σ= A IW A ΣW where the O(η) denotes a matrix with Frobenius norm O(η) and where kAkF = O(δ). It is easy to see that   I −AT + O(η + δ2 ). Σ−1 = V −A IW Therefore, Σ −1 Hence, (Σ −1  2IV −AT + O(η + δ2 ). + IV = −A IW  −1 + IV )   IV /2 AT /2 = + O(η + δ2 ). A/2 IW Therefore, M = A/2 + O(η + δ2 ). Therefore, A = 2M + O(η + δ2 ) = 2B + O(η + δ2 ). And finally, we conclude that   IV 2B T + O(η + δ2 ) = Σ0 + O(η + δ2 ). Σ= 2B IW 32 6.5 The Full High-Dimensional Algorithm We now show how to prove Theorem 11, given the pieces we have. We first show that given enough samples from N (0, Σ), the empirical data set without corruptions satisfies the regularity conditions in Section 2.2.2 with high probability. For clarity of exposition, the proof of this lemma is deferred to Appendix D.3. Lemma 14. Fix η, δ > 0. Let X1 , . . . , Xn be independent samples from N (µ, I), where n = poly(d, 1/η, log 1/δ). Then, S = {X1 , . . . , Xn } is (η, δ)-good with respect to N (µ, I) with probability at least 1 − δ. Finally, we require the following guarantee, which states that if there is a degree-2 polynomial whose expectation under S and the truth differs by a lot (equivalently, if the empirical covariance differs from the true covariance in Frobenius norm substantially), then it must also have very large variance under S. Lemma 15. Fix ε, δ > 0. Assume kΣ − IkF ≤ ξ, where ξ = O(ε log 1/ε). Suppose that G0 is (ε, δ)-good with respect to N (0, Σ), and let S ⊆ S0 be a set so that ∆(S, G0 ) ≤ ε. There is some √ absolute constant C5 so that if p ∈ P2 is a polynomial so that ES [p(X)] − EN (0,Σ) [p(X)] > C5 ξε, then ES [p2 (X)] − 1 > C1 ξ. We defer the proof of this lemma to the Appendix. We are now ready to present the full algorithm as Algorithm 10. Algorithm 10 Filter if there are many large eigenvalues of the covariance 1: function ImproveCov(S, ξ, ε, δ) 2: Let C be the universal constant in FilterCovManyDeg2Eig 3: Let τ = poly(ε, 1/d, δ). 4: Run FilterCovManyDeg2Eig(S, ε, ξ) 5: if FilterCovManyDeg2Eig outputs S ′ then 6: return S ′ 7: else 8: Let V be the subspace returned by FilterCovManyDeg2Eig 9: Let W = V ⊥ . 10: Run FilterCovManyDeg4Eig(S, ε, ξ, δ, W ) 11: if FilterCovManyDeg4Eig outputs S ′ then 12: return S ′ 13: else 14: Let U1 be the subspace of degree 2 polynomials over W it returns 15: Let U2 be the perpendicular subspace of degree 2 polynomials over W b = ES [XX T ] 16: Let Σ 17: Let ΣV = LearnCovLowDim(S, ε, ξ, τ, V ) b 18: Let ΣW = LearnMeanPolyLowD(S, ε, ξ, τ, U1 , U2 , Σ) ′ 19: Take poly(n, 1/ε) fresh ε-corrupted samples S 20: return Stitching(V, W, ΣV , ΣW , ξ, ε, S ′ ). 21: end if 22: end if 23: end function 33 Proof of Theorem 11. Condition on the events that neither LearnCovLowDim nor Stitching fail. This happens with probability at least poly(ε, 1/d, δ). Observe that if we pass the “if” statement in Line 5, then by the guarantee of FilterCovManyDeg2Eig this is indeed an S ′ satisfying the desired properties. Otherwise, by the guarantees of FilterCovManyDeg2Eig, we have that W satisfies the conditions needed by FilterCovManyDeg4Eig. Hence, if we pass the “if” statement in Line 11, then the guarantee of FilterCovManyDeg4Eig this is indeed a S ′ satisfying the desired properties. Otherwise, by Lemma 15, we know √ that for all polynomials p ∈ P2 over W orthogonal to U1 , we have | EN (0,Σ) − ES [XX T ]| ≤ C5 ξε. Thus, ΣW satisfies the conditions needed by Stitching. By Corollary 4, we know that ΣV satisfies the conditions for Stitching, and so the correctness of the algorithm follows from Theorem 17. 6.6 The Barrier at Quasi-Polynomial Here we explain why improving the running time from quasi-polynomial to polynomial in 1/ε will likely be rather difficult. Recall that our strategy is to project the problem onto lower dimensional subproblems and stitch together the answer. We need the dimension of the subspace to be large enough that we can find a polynomial Q that is itself the sum of squares of k orthogonal degree two polynomials pi so that the value of Q on the corrupted points is considerably larger than the value on the uncorrupted points. More precisely, if we let S = (G, E) denote our corrupted set of samples then we want EE [Q(X)] to be larger than Q(X) for all but a poly(ε) fraction of X ∈ G. We then remove all points X ∈ S with large Q(X) and by the properties of Q we are guaranteed that we throw out mostly corrupted points. It √ turns out that the most aggressive we could be is removing points where Q(X) is more than k standard deviations away from its expectation under the true Gaussian. But since Q is a degree-four polynomial and we want Q(X) √ to be smaller than our cutoff for all but a poly(ε) fraction of X ∈ G, we are forced to choose k = Ω(log 1/ε), which means that we need to reduce to k = Ω(log2 1/ε) dimensional subproblems. Thus, if we solve low-dimensional subproblems in time exponential in the dimension, we naturally arrive at a quasi-polynomial running time. It seems that any approach for reducing the running time to polynomial would require fundamentally new ideas. 7 The General Algorithm We now have all the tools to robustly learn the mean and covariance of an arbitrary high-dimensional Gaussian. We first show how to reduce the problem of robustly learning the covariance of N (µ, Σ) to learning the covariance of N (0, Σ), by at most doubling error, a trick previously used in [DKK+ 16] and [LRV16]. Given an √ ε-corrupted set of samples X1 , . . . , X2n of size 2n from N (µ, Σ), we may let Yi = (Xi − Xn+i )/ 2. Then we see that if Xi and Xn+i are uncorrupted, then Yi ∼ N (0, Σ). Moreover, at most 2εn of the Yi can be corrupted, since there are at most 2εn corrupted Xi . Therefore, by doubling the error rate, we may assume that µ = 0. We may then apply the algorithm b so that with high probability, we have kΣ b −1/2 ΣΣ b −1/2 − IkF ≤ O(ε) in Corollary 5 to obtain a Σ 4 O(log 1/ε) with polynomially many samples, and in poly(d, (1/ε) ) time. b −1/2 X ′ . We may then take an additional set of ε-corrupted samples {Xi′ , . . . , Xn′ }, and let Yi′ = Σ i ′ ′ b we have that if X is uncorrupted, then Y ∼ N (0, Σ) e where Then, by our guarantee on Σ, i i e − IkF ≤ O(ε). We then run RecoverMeanNoisy with the Y ′ to obtain a µ kΣ b so that i −1/2 −1/2 b e b b kb µ−Σ µk2 ≤ O(ε). This guarantees that dTV (N (b µ, Σ), N (Σ µ, Σ)) ≤ O(ε), which in turn b N (µ, Σ)) ≤ O(ε), as claimed. implies that dTV (N (b µ, Σ), 34 Therefore, we have shown: Theorem 18. Fix ε, δ > 0. Given an ε-corrupted set of samples S from N (µ, Σ), where n = poly(d, 1/ε, log 1/δ), there is an algorithm RecoverGaussian which takes as input S, ε, δ, and b so that outputs a µ b, Σ b ≤ O(ε) . dTV (N (µ, Σ), N (b µ, Σ)) Moreover, the algorithm runs in time poly(d, (1/ε)O(log 4 1/ε) , log 1/δ). References [BDLS17] S. Balakrishnan, S. S. Du, J. Li, and A. Singh. Computationally efficient robust sparse estimation in high dimensions. In Proceedings of the 30th Annual Conference on Learning Theory, COLT ’17, 2017. [Ber06] T. Bernholt. Robust estimators are hard to compute. Technical report, University of Dortmund, Germany, 2006. [BNJ03] D. M Blei, A. Y. Ng, and M. I. Jordan. Latent dirichlet allocation. Journal of machine Learning research, 3(Jan):993–1022, 2003. [BW41] L. M. Blumenthal and G. E. Wahlin. On the spherical surface of smallest radius enclosing a bounded subset of n-dimensional euclidean space. Bull. Amer. Math. Soc., 47:771–777, 1941. [CSV17] M. Charikar, J. Steinhardt, and G. Valiant. Learning from untrusted data. In Proc. 49th Annual ACM Symposium on Theory of Computing (STOC), pages 47–60. ACM Press, 2017. [CW01] A. Carbery and J. Wright. Distributional and Lq norm inequalities for polynomials over convex bodies in Rn . Mathematical Research Letters, 8(3):233–248, 2001. [DBS17] S. S. Du, S. Balakrishnan, and A. Singh. Computationally efficient robust estimation of sparse functionals. CoRR, abs/1702.07709, 2017. [DDS12] C. Daskalakis, I. Diakonikolas, and R.A. Servedio. Learning Poisson Binomial Distributions. In Proceedings of the 44th Symposium on Theory of Computing, pages 709–728, 2012. [DDS15] A. De, I. Diakonikolas, and R. Servedio. Learning from satisfying assignments. In Proceedings of the 26th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2015, pages 478–497, 2015. [DK14] C. Daskalakis and G. Kamath. Faster and sample near-optimal algorithms for proper learning mixtures of gaussians. In Proceedings of The 27th Conference on Learning Theory, COLT 2014, pages 1183–1213, 2014. [DKK+ 16] I. Diakonikolas, G. Kamath, D. M. Kane, J. Li, A. Moitra, and A. Stewart. Robust estimators in high dimensions without the computational intractability. In Proceedings of FOCS’16, 2016. 35 [DKK+ 17] I. Diakonikolas, G. Kamath, D. M. Kane, J. Li, A. Moitra, and A. Stewart. Being robust (in high dimensions) can be practical. In Proceedings of the 34th International Conference on Machine Learning, ICML ’17, pages 999–1008. JMLR, Inc., 2017. [DKS16] I. Diakonikolas, D. M. Kane, and A. Stewart. Robust learning of fixed-structure bayesian networks. CoRR, abs/1606.07384, 2016. [DKS17] I. Diakonikolas, D. M. Kane, and A. Stewart. Statistical query lower bounds for robust estimation of high-dimensional gaussians and gaussian mixtures. In Proceedings of the 58th Annual IEEE Symposium on Foundations of Computer Science, FOCS ’17, Washington, DC, USA, 2017. IEEE Computer Society. [DL01] L. Devroye and G. Lugosi. Combinatorial methods in density estimation. Springer Series in Statistics, Springer, 2001. [GCSR14] A. Gelman, J. B. Carlin, H. S. Stern, and D. B. Rubin. Bayesian data analysis, volume 2. Chapman & Hall/CRC Boca Raton, FL, USA, 2014. [GLS88] M. Grötschel, L. Lovász, and A. Schrijver. Geometric Algorithms and Combinatorial Optimization, volume 2. Springer, 1988. [Goo15] R. Goodell. Personal communication, 2015. [Ham01] F. Hampel. Robust statistics: A brief introduction and overview. In First International Symposium on Robust Statistics and Fuzzy Techniques in Geodesy and GIS. A. Carosio, H. Kutterer (editors), Swiss Federal Institute of Technology Zurich (ETH), Institute of Geodesy and Photogrammetry, IGP-Bericht, number 295, pages 13–17, 2001. [HM13] M. Hardt and A. Moitra. Algorithms and hardness for robust subspace recovery. In COLT 2013, pages 354–375, 2013. [HR09] P.J. Huber and E. M. Ronchetti. Robust statistics. Wiley New York, 2009. [HRRS86] F. R. Hampel, E. M. Ronchetti, P. J. Rousseeuw, and W. A. Stahel. Robust statistics. The approach based on influence functions. Wiley New York, 1986. [Hub64] P. J. Huber. Robust estimation of a location parameter. The Annals of Mathematical Statistics, 35(1):73–101, 1964. [Jun01] H. W. E. Jung. Über die kleinste kugel, die eine räumliche figur einschliesst. J. Reine Angew. Math, 123:241–257, 1901. [Kan12] D. M. Kane. A structure theorem for poorly anticoncentrated gaussian chaoses and applications to the study of polynomial threshold functions. In FOCS, pages 91–100, 2012. [Kla07] B. Klartag. A central limit theorem for convex sets. 168(1):91–131, 2007. [Li17] J. Li. Robust sparse estimation tasks in high dimensions. CoRR, abs/1702.05860, 2017. [LM00] B. Laurent and P. Massart. Adaptive estimation of a quadratic functional by model selection. Ann. Statist., 28(5):1302–1338, 2000. 36 Inventiones mathematicae, [LRV16] K. A. Lai, A. B. Rao, and S. Vempala. Agnostic estimation of mean and covariance. In Proceedings of FOCS’16, 2016. [NJB+ 08] J. Novembre, T. Johnson, K. Bryc, Z. Kutalik, A. R. Boyko, A. Auton, A. Indap, K. S. King, S. Bergmann, M. R. Nelson, et al. Genes mirror geography within europe. Nature, 456(7218):98–101, 2008. [O’D14] R. O’Donnell. Analysis of Boolean Functions. Cambridge University Press, 2014. [OF96] B. A. Olshausen and D. J. Field. Emergence of simple-cell receptive field properties by learning a sparse code for natural images. Nature, 381(6583):607, 1996. [RL05] P. J. Rousseeuw and A. M. Leroy. Robust regression and outlier detection, volume 589. John Wiley & Sons, 2005. [Rou85] P. Rousseeuw. Multivariate estimation with high breakdown point. Mathematical Statistics and Applications, pages 283–297, 1985. [SCV18] J. Steinhardt, M. Charikar, and G. Valiant. Resilience: A criterion for learning in the presence of arbitrary outliers. In Proc. of the 9th Conference on Innovations in Theoretical Computer Science, 2018. to appear. [Tuk75] J. W. Tukey. Mathematics and picturing of data. In Proceedings of ICM, volume 6, pages 523–531, 1975. [Ver10] R. Vershynin. Introduction to the non-asymptotic analysis of random matrices, 2010. A Lower Bounds on Agnostic Learning In this section, we prove information theoretic lower bounds for robust distribution learning. In particular, we will prove that no algorithm (efficient or inefficient) can learn a general distribution ε . We note that our lower from an ε-corrupted set of samples to total variation distance less than 1−ε bound applies in more general settings than we consider in this paper in couple of ways: 1. Our construction is univariate; 2. Our construction works for any pair of distributions which are Gaussian distributions; and ε 1−ε -close, and not just for 3. Our construction holds for Huber’s ε-contamination model, which is weaker than the noise model studied in this paper. In Huber’s ε-contamination model, data is drawn from a mixture distribution (1 − ε)P + εQ, where P is some distribution that we wish to estimate and Q is arbitrary (in particular, it might ε -close can be made indistindepend on P ). We will show that any two distributions which are 1−ε guishable under this contamination model. ε Lemma 16. Let p1 and p2 be two distributions such that dTV (p1 , p2 ) = 1−ε . Then there exist Huber ε-contaminations p1′ and p2′ of p1 and p2 respectively, such that p1′ = p2′ . Therefore, no ε in Huber’s ε-contamination model. algorithm can learn a distribution p up to accuracy < 1−ε 37 Proof. Since dTV (p1 , p2 ) = ε 1−ε , we can write   ε ε p1 = 1 − q1 , pc + 1−ε 1−ε   ε ε p2 = 1 − q2 , pc + 1−ε 1−ε where pc , q1 , q2 are distributions. Let p1′ be the Huber ε-contamination of p1 with q2 , p2′ be the Huber ε-contamination of p2 with q1 . In other words, p1′ = (1 − 2ε) pc + εq1 + εq2 , p2′ = (1 − 2ε) pc + εq2 + εq1 , and thus p1′ = p2′ as desired. We note that a similar lower bound holds when p1 and p2 are required to be Gaussians, but weakened by a factor of 2. This is due to the geometry of the space of Gaussian distributions, and we note that in the case where the variance is known, this is achieved by the median. Lemma 17.pNo algorithm can output an estimate for the mean of a unit-variance Gaussian at  π accuracy < 2 − o(1) ε with probability > 1/2 in Huber’s ε-contamination model. Consequently,  by Lemma 1, no algorithm can learn a Gaussian to total variation distance < 12 − o(1) ε in Huber’s ε-contamination model. Proof. We will consider the distributions p1 = N (−α, 1) and p2 = N (α, 1), where α is to be specified later. We note that if p1 and p2 can be ε-corrupted into the same distribution, then the best estimate for the mean is to output 0 (by symmetry), and the result holds. 2 (x)} and We will show that p1 can be ε-corrupted into a distribution f , where f (x) = max{p1 (x),p η η is a normalizing constant (the case of p2 follows similarly). In other words, f can be written as (1 − ε)p1 + εq1 for some distribution q1 . Since q1 is a distribution, it is non-negative, and thus we 2 (x)} require that (1 − ε)p1 (x) ≤ f (x) for all x ∈ R. Note that f (x) = max{p1 (x),p ≥ p1η(x) . η We can compute η as follows: Z ∞ Z ∞ p2 (x)dx max {p1 (x), p2 (x)} dx = 2 η= 0 −∞ r      α α 1 1 2 + erf √ α − O(α3 ) = 1 + erf √ =1+ =2 2 2 π 2 2 Thus, p (x) p1 (x) q 1 = f (x) ≥ ≥ η 1 + π2 α − O(α3 ) 1− r ! 2 α + O(α2 ) p1 (x). π q Again, since we require that (1 − ε)p1 (x) ≤ f (x), it suffices that 1 − ε ≤ 1 − π2 α + O(α2 ) and thus q  pπ that π2 α − O(α2 ) ≤ ε. This corresponds to α ≤ 2 − o(1) ε, and the proof is complete. Observe that this lower bound can be strengthened by a factor of two in the subtractive adversary model, where the adversary is able to both remove εN samples and add εN samples. In this 38 infinite sample regime, this means that a distribution can be corrupted to any distribution which is ε-far in total √ variation  distance. By noting that N (−α, 1) and N (α, 1) are both ε-far from N (0, 1) for α = 2π + o(1) ε, we obtain the following lemma. Note that this lower bound is also achieved by the median in this model. Lemma 18.√No algorithm  can output an estimate for the mean of a unit-variance Gaussian at 2π + o(1) ε with probability > 1/2 in the subtractive adversary model. Consequently, accuracy < by Lemma 1, no algorithm can learn a Gaussian to total variation distance < ε in the subtractive adversary model. Finally, we conclude by sketching a lower bound for mean estimation of sub-Gaussian distributions. Lemma 19. No algorithm can output an estimate for the mean of a sub-Gaussian distribution at accuracy o(ε log1/2 (1/ε)) with probability > 1/2 in the Huber’s ε-contamination model. Proof. We start with the distribution q = N (0, 1). We construct p1 by truncating the right tail of q at the point xr = c1 log1/2 (1/ε) for some constant c1 , and rescaling the rest of the distribution appropriately. Observe that, for an appropriate choice of c1 :   1 ; • p1 is sub-Gaussian with a constant of O 1−ε • The mean of p1 is −c2 ε log1/2 (1/ε) for some constant c2 ; • p1 can be corrupted in Huber’s ε-contamination model to be q. We can similarly consider p2 , which is constructed by truncating the left tail of q at the point xl = −c1 log1/2 (1/ε). Since p1 and p2 are indistinguishable when they are both ε-corrupted to q, and the mean of all three distributions are separated by ≥ c2 ε log1/2 (1/ε), the lemma follows. B B.1 Omitted Proofs from Section 2 Proof of Lemma 1 Proof. Observe that by rotational and translational invariance, it suffices to consider the problem when µ1 = −εe1 /2 and µ2 = εe1 /2, where e1 is the first standard basis vector. By the decomposability of TV distance, we have that the TV distance can in fact be written as a 1 dimensional integral: Z ∞ 1 1 2 2 dTV (N (µ1 , I), N (µ2 , I)) = · √ e−(x−ε/2) /2 − e−(x+ε/2) /2 dx . 2 2π −∞ 2 /2 The value of the function f (x) = e−(x−ε/2) when x > 0, hence this integral becomes 2 /2 − e−(x+ε/2) is negative when x < 0 and positive Z ∞ 1 2 2 e−(x−ε/2) /2 − e−(x+ε/2) /2 dx dTV (N (µ1 , I), N (µ2 , I)) = √ 2π 0 = F (ε/2) − F (−ε/2) , 39 Rx 2 where F (x) = √12π −∞ e−t /2 dt is the CDF of the standard normal Gaussian. By Taylor’s theorem, and since F ′′ (x) is bounded when x ∈ [−1, 1], we have F (ε/2) − F (−ε/2) = F ′ (−ε/2)ε + O(ε3 ) 1 2 = √ e−(ε/2) /2 ε + O(ε3 ) 2π   1 = √ + o(1) ε , 2π which proves the claim. C Omitted Proofs from Section 4 C.1 Proof of Theorem 7 First, we require the following several claims about p(x) under various distributions, including the true Gaussian and from choosing points uniformly at random from the sets of interest. Note that throughout this section we will use Lemma 3, which implies that kΠV ′ µ − µ̃k2 < 2ε when the parameters α, γ are chosen appropriately. Claim 4. EN (µ,I) [p(X)] = kΠV ′ µ − µ̃k22 . Proof. Letting v1 , . . . , vC1 β log(1/ε) be an orthonormal basis of V ′ , we have C1 β log(1/ε) E [p(X)] = N (µ,I) X i=1 C1 β log(1/ε) E N (viT µ,1) 2 [hvi , X − µ̃i − 1] = X i=1 (viT (µ − µ̃))2 = kΠV ′ µ − µ̃k22 . Claim 5. For some absolute constant c0 and all t ≥ kΠV ′ µ − µ̃k22 ,    (t − kΠV ′ µ − µ̃k22 )2 2 Pr (p(X) > t) ≤ 2 exp −c0 · min , t − kΠV ′ µ − µ̃k2 . C1 β log(1/ε) N (µ,I) Proof. This follows from Lemma 7, after re-centering the polynomial using Claim 4 and noting that the spectral norm and squared Frobenius norm of the corresponding A matrix are at most 1 and C1 β log(1/ε), respectively. Claim 6. ES [p(X)] ≥ C1 ε log(1/ε). Proof. Recall that µ̂ is the empirical mean of the point set. E[p(X)] = E[kΠV ′ X − µ̃k22 ] − dim(V ′ ) S S ≥ E[kΠV ′ X − ΠV ′ µ̂k22 ] − dim(V ′ ) S   1 ≥ 1 + ε dim(V ′ ) − dim(V ′ ) = C1 ε log(1/ε) . β Claim 7. EG0 [p(X)] ≤ kµ − µ̃k22 + O(γ)ε. 40 Proof. E [p(X)] ≤ G0 ≤ ≤ Z 0 Z ∞ Pr[p(X) ≥ t]dt G0 O(d log(d/εδ)) Pr[p(X) ≥ t]dt G0 0 Z O(d log(d/εδ)) Pr [p(X) ≥ t]dt + O(γ)ε N (µ,I) 0 ≤ kµ − µ̃k22 + O(γ)ε The inequalities follow from (γε, δ)-goodness and Claim 4. Claim 8. φ(S, G0 ) EL [p(X)] = (C1 β + O(γ) + o(1))ε. Proof. φ(S, G0 ) E[p(X)] = L Z ∞ φ(S, G0 ) Pr[p(X) > t]dt L 0 = Z O(d log(|G|/δ)) φ(S, G0 ) Pr[p(X) > t]dt = Z (4) L 0 C1 β log(1/ε)+4ε2 φ(S, G0 ) Pr[p(X) > t]dt 0 + Z L O(d log(|G|/δ)) C1 β log(1/ε)+4ε2 φ(S, G0 ) Pr[p(X) > t]dt L 2 ≤ (C1 β log(1/ε) + 4ε )φ(S, G0 ) + 2 Z O(d log(|G|/δ)) Pr[p(X) > t]dt C1 β log(1/ε)+4ε2 G0 ≤ (C1 β log(1/ε) + 4ε2 )φ(S, G0 ) Z O(d log(|G|/δ)) Pr [p(X) > t] + +2 C1 β log(1/ε)+4ε2 N (µ,I) 2 γε dt d log(|G|/δ) ≤ (C1 β log(1/ε) + 4ε )φ(S, G0 ) + O(γε) + 8εc0 C1 β ≤ (C1 β + O(γ) + o(1))ε. (5) (6) (7) (4) and (5) follow from G0 being (γε, δ)-good, (6) is from Claim 5, and (7) is because φ(S, G0 ) log(1/φ(S, G0 )) ≤ (1 + o(1))ε . This gives: Claim 9. ψ EE [p(X)] ≥ C1 ε log 1/ε − (C1 β + 1 + O(γ) + o(1))ε. Proof. This immediately follows from Claims 6, 7, and 8. We now show that in the case that there are many large eigenvalues, there will be a T satisfying the conditions of the filter. Claim 10. Suppose dim(V ) ≥ C1 β log(1/ε). Then there is a T satisfying the conditions in the algorithm. 41 Proof. Suppose not. Then, we have ψ E[p(X)] ≤ E Z 2C3 log(1/ε)/c0 0 ψ Pr[p(X) ≥ t]dt + E ≤ 2(C3 /c0 )ψ log 1/ε + ≤ 2(C3 /c0 )ψ log 1/ε + ≤ (2C3 /c0 )ε log 1/ε + Z Z Z C2 d log |S|/δ Z 2(C3 /c0 ) log(1/ε) C2 d log |S|/δ ∞ 2C3 log(1/ε)/c0 ψ Pr[p(X) ≥ t]dt E ψ Pr[p(X) ≥ t]dt E Pr[p(X) ≥ t]dt 2(C3 /c0 ) log(1/ε) S C2 d log |S|/δ Pr[p(X) ≥ t]dt . 2(C3 /c0 ) log(1/ε) S By applying the contradiction assumption, we have   c0 T γε Pr[p(X) ≥ t]dt ≤ exp − dt + 2C3 d log |S|/δ 2(C3 /c0 ) log(1/ε) S 2(C3 /c0 ) log(1/ε)   Z C2 d log |S|/δ c0 T exp − ≤ dt + C2 γε 2C3 2(C3 /c0 ) log(1/ε)   Z ∞ c0 T dt + C2 γε exp − ≤ 2C3 2(C3 /c0 ) log(1/ε) Z ∞ exp (−t) dt + C2 γε ≤ (C3 /c0 ) Z Z C2 d log |S|/δ C2 d log |S|/δ 2 log(1/ε) 2 ≤ (C3 /c0 ) · O(ε ) + C2 γε , and thus, we have ψ E[p(X)] ≪ C1 ε log 1/ε − (C1 β + 1 + O(γ) + o(1))ε , E which contradicts Claim 9. It now suffices to prove that if we construct a filter, then the invariant that ∆ decreases is preserved. Formally, we show: Claim 11. Suppose dim(V ) ≥ C1 β log(1/ε). Let S ′ be the set of points we return. Then ∆(S ′ , G) < ∆(S, G). Proof. Let T be the threshold we pick. If T > C2 d log(|S|/δ) then the invariant is satisfied since we remove no good points, by (γε, δ)-goodness. It suffices to show that in the other case, we remove log(1/ε) times many more bad points than good points. By definition we remove at least     γε c0 T + . |S| · exp − 2C3 d log |S|/δ points. On the other hand, by (γε, δ)-goodness, Claim 5, we know that we throw away at most |G| · Pr[p(X) > T ] ≤ |G0 | · Pr[p(X) > T ] G G0      γε (T − kµ − µ̃k22 )2 2 , (T − kµ − µ̃k2 ) + ≤ |G0 | exp −c0 · min . C1 β log(1/ε) 2 log(1/ε)(d log(|S|/δ)) 42 By our choice of T , and since kµ − µ ek2 ≤ O(δ) ≪ 1, the first term is upper bounded by       (C3 − 1)2 (T − kµ − µ̃k22 )2 2 , (T − kµ − µ̃k2 ) ≤ exp −c0 · min T, (C3 − 1)T ) exp −c0 · min C1 β log(1/ε) C1 β and so  exp −c0 · min     (C3 − 1)2 c0 T T, (C3 − 1)T ) ≤ exp − C1 β C3   c0 T 2 = exp − 2C3   c0 T ·ε ≤ exp − 2C3   1 c0 T ≪ . exp − 2C3 log2 1/ε Since we have maintained this invariant so far, in particular, we have thrown away more bad points than good points, and so |G0 | ≤ (1 + ε)|S|.     γε c0 T Therefore, we have log(1/ε) · |G| · PrG [p(X) > T ] ≤ |S| · exp − 2C + d log |S|/δ , and hence, 3 the invariant is satisfied. Claims 10 and 11 together imply the correctness of Theorem 7. C.2 Proof of Lemma 5 We require the following basic fact of good sets (see, e.g., Fact 8.6 in [DKK+ 16]): Fact 2. Let v ∈ Rd be any unit vector. Let G be (η, δ)-good with respect to N (µ, I). Then for any T > 0, Pr(|v · (X − µ)| > T ) ≤ 2 exp(−T 2 /2) + η/(d log(d/ηδ)) , G and Pr (|v · (X − µ)| > T ) ≤ 2 exp(−T 2 /2). N (µ,I) ε Proof. Let hv, µ − µ bi = R > β 1/2 . Observe that by direct calculation, we have ES [hv, X − 2 2 2 µi ] − ES [hv, bi ] ≤ 3R . Hence, it suffices to show that ES [hv, X − µi2 ] ≥ 1 + Ω(R2 /ε) −  X − µ  ε. γ + O β1 We write S = (G0 \ L, E) where |E| = ψ|S| and |L| = φ|S|. First we consider the expectation of v · X over X in S. This is µ0 − φµL + ψµE . 1−φ+ψ where µ0 is the mean over G0 , µL the mean over L and µE the mean over E. By (γε, δ)-goodness, we have that |hv, µ0 − µi| ≤ γε. We also have that Z ∞ Pr [|hv, X − µi| ≥ t] dt |hv, µL − µi| ≤ L 0 Z √ O( d log(d/εδ)) Pr [|hv, X − µi| ≥ t] dt = L 0 43 Since we have   |G0 | Pr [|hv, X − µi| > t] , Pr [|hv, (X − µ)i| > t] ≤ min 1, L |L| G0 (8) by Fact 2 and the calculations done in the proof of Corollary 8.8 in [DKK+ 16], we have that ε , |hv, µL − µi| ≤ O(log |S|/|L|) ≤ O(log 1/φ). Since by assumption we have hv, µ − µ bi = R > β 1/2 this implies that hv, µE − µi = Ω(R/ε). In particular, this implies that   E hv, X − µi2 ≥ E [hv, X − µi]2 E E  2 R ≥Ω . ε2 Next we consider the expectation of hv, X −µi2 . By (γε, δ)-goodness, we have EG0 [hv, X −µi2 ] = 1 + O(ε). We also have that Z ∞     2 φ Pr |hv, X − µi|2 ≥ t dt φ E hv, X − µi ≤ L 0 L 5 ≤ log(1/ε)φ + β ≤ 5 log(1/ε)φ + β Z O(d log d/εδ) (5/β) log(1/ε) Z O(d log d/εδ)   φ Pr |hv, X − µi|2 ≥ t dt L   Pr |hv, X − µi|2 ≥ t dt (5/β) log(1/ε) G0 Z O(d log d/εδ)   5 Pr |hv, X − µi|2 ≥ t dt + γε log(1/ε)φ + β (5/β) log(1/ε) N (µ,I)     1 = O + γ + o(1) ε. β = Since EG0 [hv, (X − µ)i2 ] − φ EL [hv, (X − µ)i2 ] + ψ EE [hv, (X − µ)i2 ] , S 1−φ+ψ    ε. this is at least 1 + Ω(R2 /ε) − γ + O β1 E[hv, (X − µ)i2 ] = D D.1 Omitted Proofs from Section 6 Proof of Theorem 15 b − I, and Our algorithm works as follows, just as for Algorithm 4. It finds all large eigenvalues of Σ if there are too many, produces an explicit degree-2 polynomial which, as we will argue, produces a valid filter. The formal pseudocode for our algorithm is in Algorithm 11. The proofs of the following claims are identical to the proofs of Claim 6-9, by applying the corresponding property of (γε, δ)-goodness for this setting, and so we omit them. Claim 12. ES [p(x)] ≥ Cξ. Claim 13. EG0 [p(X)] ≤ ε . (d log 1/ε)2 Claim 14. φ(S, G0 ) EL [p(X)] = (C + O(γ) + o(1))ε. 44 Algorithm 11 Filter if there are many large eigenvalues of the covariance 1: function FilterCovManyDeg2Eig(S, ε, ξ, δ) b be the empirical second moment of S, respectively. 2: Let Σ b − I with eigenvalue more than 3: Let V be the subspace of Rd spanned by eigenvectors of Σ Cξ. 4: if dim(V ) ≥ C1 log(1/ε) then 5: Let V ′ be a subspace of V of dimension C1 log(1/ε). 6: Let p(x) be the quadratic polynomial p(x) = kΠV ′ (x)k22 − dim(V ′ ). 7: Find a value T > 0 so that either: • T > C2 d log(|S|/δ) and p(x) > T for at least one x ∈ S, or • T > 2C3 log(1/ε)/c0 and PrS (p(x) > T ) > exp(−c0 T /(2C3 )) + ε/(d log(|S|/δ)). 8: return S ′ = {x ∈ S : p(x) ≤ T } . else return an orthonormal basis for V . 11: end if 12: end function 9: 10: Claim 15. ψ EE [p(X)] ≥ Cξ − (C1 + 1 + O(γ) + o(1))ε. These claims imply just as before that there is a T with the desired properties. Again, the proof is identical. Formally: Claim 16. Suppose dim(V ) ≥ C log(1/ε). Then there is a T satisfying the conditions in the algorithm. Finally, we show the invariant that ∆ decreases. This is almost identical to the proof of Claim 11, however, we need to slightly change our application of the Hanson-Wright inequality. Formally, we show: Claim 17. Suppose dim(V ) ≥ C1 log 1/ε. Let S ′ be the set of points we return. Then ∆(S ′ , G) < ∆(S, G). Proof. Let T be the threshold we pick. If T > C2 d log(|S|/δ) then the invariant is satisfied since we remove no good points, by (γε, δ)-goodness. It suffices to show that in the other case, we remove log 1/ε times many more bad points than good points. By definition we remove at least     c0 T ε |S| · exp − + 2C3 d log |S|/δ points. On the other hand, observe that if v1 , . . . , vk is an orthonormal basis for V , we have X kΠV xk22 = hvi , Xi2  X vi viT Σ1/2 X , = yΣ1/2 45 so that ifPX ∼ N (0, Σ), we have Y ∼ N (0, I). Let M = Σ1/2 kM kF ≤ ni=1 kΣk2 ≤ (1 + ξ)k, and kM k2 ≤ kΣk2 ≤ (1 + ξ). Since E [kΠV xk22 ] − k = N (0,Σ) ≤ k X i=1 k X i=1 P  vi viT Σ1/2 . We have that viT (Σ − I)vi kΣ − Ik2 ≤ (1 + ξ)k , we have by Hanson-Wright that Pr N (0,Σ)      (T − (1 + ξ)k)2 , (T − kµ − (1 + ξ)kk22 ) , kΠV xk22 − dim(V ) > T ≤ exp −c0 · min C1 log(1/ε) so by our choice of T , we have       (T − kµ − µ̃k22 )2 (C3 − 1)2 2 exp −c0 · min , (T − kµ − µ̃k2 ) ≤ exp −c0 · min T, (C3 − 1)T ) . C1 log(1/ε) C1 The remaining proof now proceeds identically to the proof of Claim 17. D.2 Proof of Theorem 16 Clearly, the only non-trivial condition to certify for Theorem 16 is that if we are in Case (1), the returned set satisfies the desired properties. Our proof will roughly follow the same structure as the proof of Theorem 7. We will first show that the empirical average of the polynomial Q can only be large because of the contribution of the points in E (Claim 21). We will then show that this implies that there exists a threshold T which the algorithm will find in this case (Claim 22). Finally, we will show that for any such T we find, the returned set of points will indeed satisfy ∆(S ′ , G0 ) < ∆(S, G0 ), which implies the correctness of the algorithm (Claim 23). We first show the following claim: Claim 18. ES [ri ] − EN (0,Σ) [ri ] ≤ (4C + 1)ξ √ Proof. Let us suppose that pi corresponds to the matrix Ai , given by (Ai )a,b = ∇a ∇b pi / 2!, so that the Ai are orthonormal with respect to the Frobenius norm. Then the constant harmonic 2 2 2 part √ of2 pi corresponds to kAi kF ≤ 1. The degree-2 harmonic part of p2i corresponds to the matrix 2 2Ai . This is because if we let Bi be the matrix corresponding to pi , we have   1 ∇a ∇b p2i (X) E (Bi )a,b = √ 2 X∼N (0,I) 2 =√ E [∇b (pi (X)∇a pi (X))] 2 X∼N (0,I) 2 E [∇a pi (X)∇b pi (X) + pi (X)∇a ∇b pi (X)] =√ 2 X∼N (0,I) 2 =√ E [∇a pi (X)∇b pi (X)] 2 X∼N (0,I) √ = 2 2h(Ai )a , (Ai )b i , 46 where the second to last line follows since ∇a ∇b pi (X) is a constant, and the last line follows from explicit computation. In particular,√this implies that the non-constant component of Pri corresponds to matrix with trace norm at most 2 2 ≤ 4. Therefore, r can be written as r (x) = αi hvi , xi2 +C0 i i P for some constant C0 , where |αi | ≤ 4. Thus, by our assumption, we have ES [ri ] ≤ 1 + Cξ. The claim then follows since Σ and I are differ in Frobenius norm by at most ξ. Claim 19. ES [Q(X)] − EX∼N (0,Σ) [Q(X)] ≥ (C1 − 6)ξk Proof. Observe that since kΣ − IkF ≤ ξ, in particular we have kΣ⊗2 − I ⊗2 k2 ≤ ξ, and hence by Lemma 10 we have that EN (0,Σ) [p2 (X)] − EX∼N (0,I) [p2 (X)] ≤ 2ξ for all p ∈ P2 . Hence, in particular, we have E[p2i (X)] − E [p2i (X)] ≥ (C1 − 2)ξ . S By Claim 18, we have E S " In particular, this implies that N (0,Σ) k X i=1 # ri − E [Q(X)] − S E N (0,Σ) " k X i=1 # ri ≤ (4C + 1)k . E [Q(X)] ≥ (C1 − 4C − 5)ξk , N (0,I) as claimed. We now show: Claim 20. There is some universal constant B so that E √ [Q2 (X)]1/2 ≤ B k . X∼N (0,Σ) Before we prove this, we need the following lemma: Lemma 20. For any degree-4 polynomial p, and any Σ, if we let F (y, p, Σ) denote the yth percentile of p under Σ, then we have F (1/4, p2 , Σ), F (3/4, p2 , Σ) = Θ(EX∼N (0,Σ) [p2 (X)]). Proof. Let µ′ = EX∼N (0,Σ) [p2 (X)]. First, we note that Pr(p2 (X) > 4µ′ ) ≤ 1/4, so F (3/4, p2 , Σ) ≤ 4µ′ . On the other hand, anti-concentration bounds [CW01], we have that Pr(p2 (X) ≤ √ ′ by known 1/8 ′ εµ ) = Pr(|p(X)| ≤ εµ ) = O(ε ). So, for ε a sufficiently small constant, Pr(p2 (X) ≤ εµ′ ) < 1/4, and therefore, F (1/4, p2 , Σ) ≥ εµ′ . Since εµ′ ≤ F (1/4, p2 , Σ) ≤ F (3/4, p2 , Σ) ≤ 4µ′ , this completes our proof. Proof of Claim 20. Since dTV (N (0, Σ), N (0, I)) = O(ε log 1/ε) = o(1), we have that F (3/4, Q2 , Σ) ≤ F (1/4, Q2 , Σ), so by the above lemma, we have that E [Q2 (X)]1/2 ≤ O( X∼N (0,Σ) E [Q2 (X)]1/2 ) . X∼N (0,I) Hence, it suffices to bound kQk22 . 47 √ Let us again suppose that pi corresponds to the matrix Ai , given by (Ai )a,b = ∇a ∇b pi / 2!. Note that the Ai are symmetric matrices that form an orthonormal set. We note that qi is the harmonic degree-4 polynomial corresponding to the rank-4 tensor √ Ta,b,c,d = ∇a ∇b ∇c ∇d qi / 24 √ = ∇a ∇b ∇c ∇d (p2i )/ 24 √ = (2(∇a ∇b pi )(∇c ∇d pi ) + 2(∇a ∇c pi )(∇b ∇d pi ) + 2(∇a ∇d pi )(∇b ∇c pi ))/ 24 √ = (4(Ai )a,b (Ai )c,d + 4(Ai )a,c (Ai )b,d + 4(Ai )a,d (Ai )b,c )/ 24 √ = 6Sym(Ai ⊗ Ai ). √ P By linearity, Q corresponds to the rank-4 tensor T = 6 ki=1 Sym(Ai ⊗ Ai ). It thus suffices to show that kT k2 = O(k), where here k · k2 denotes the square root of the sum of the squares of the entries of the tensor. In order to show this, we note that kT k2 = supkV k2 =1 hV, T i. Therefore, it √ suffices to show that for all 4-tensors V with kV k2 ≤ 1, that hV, T i = O( k). We note that + + * * k k X X √ √ hV, T i = 6 V, Sym(Ai ) ⊗ Ai = 6 Sym(V ), Ai ⊗ Ai . i=1 i=1 Note that Sym(V ) is a symmetric 4-tensor of ℓ2 norm at most 1. Thinking of Sym(V ) as a symmetric Pn 2 matrix over 2-Tensors, we can write it as Sym(V ) = j=1 λj Bj ⊗ Bj , where the Bj ’s are an Pn 2 2 orthonormal basis for the set of 2-tensors and j=1 λj = kSym(V )k22 ≤ 1. Then, if ci,j := hAi , Bj i, P and cj = ki=1 c2i,j , we have that 2 2 k n n X √ X √ X c2i,j = 6 λj λj cj . hV, T i = 6 i=1 j=1 j=1 Since the Ai are orthonormal, cj ≤ 1 for all j. Furthermore, 2 2 n X cj = c2i,j = k X i=1 i=1 j=1 j=1 Therefore, n k X X kAi k2F = k. v v u n2 u n2 n2 uX √ √ √ X √ uX hV, T i = 6 λj cj ≤ 6t λ2j t c2j ≤ 6 · 1 · k = O( k) . j=1 j=1 j=1 Let µ′ = EX∼N (0,Σ) [Q(X)]. We now show that since G0 is ε-good, then almost all of the difference in Claim 19 must be because of the points in E. Claim 21. EE [Q(Y )] − µ′ ≥ C1 −6 2 · ξk φ Proof. It suffices to show that E[Q(X)] − µ′ ≤ G 48 C1 − 6 ξk , 2 (9) that is, the good points do not contribute  √ much to the difference. By (ε, δ)-goodness of G0 and ′ Claim 20 we have E0 [Q(Y )] − µ ≤ O ε k . Moreover, we have φ(E[Q(X)] − L E [Q(X)]) ≤ X∼N (0,Σ) (a) = Z ∞ 0 Z   φ Pr Q(X) − µ′ ≥ t dt L √ 2 O( kd log |S|/δ)   φ Pr Q(X) − µ′ ≥ t dt L 0 Z √ 2 ≤ φ · O( k log 1/ξ) + √ ≤ φ · O( k log2 1/ξ) + √ ≤ φ · O( k log2 1/ξ) + (b) √ O( kd2 log |S|/δ) φ Pr √ L O( k log2 1/ξ) Z O(√kd2 log |S|/δ)  Pr √ G0 O( k log2 1/ξ) Z O(√kd2 log |S|/δ)  Q(X) − µ′ ≥ t dt  Q(X) − µ′ ≥ t dt Pr [Q(X) − µ′ ≥ t]dt + O(ξ) √ O( k log2 1/ξ) N (0,Σ) √ ≤ O(ξ k) + exp(−Ω(log 1/ξ)) (c)  ≪ 5ξk , where (a) follows from the boundedness condition of (ε, δ)-goodness, (b) follows from the last condition of goodness, and (c) follows from hypercontractivity. This shows (9), which completes the proof. We now show that this implies that there must be a T satisfying the conditions in Algorithm 8. Claim 22. If dim(Vm ) ≥ k, then Algorithm 8 returns a T satisfying the conditions in the algorithm. Proof. Suppose not. By the assumption that kI − ΣkF ≤ ξ, we have |µ′ | = | EX∼N (0,Σ) [Q(X)]| ≤ P 2ξkQk2 ≤ ki=1 kpi k2 + kri k2 ≤ 5ξk. Thus, we have     C1 − 6 C1 − 6 − 5 ξk ≫ E[Q(X)] ≥ ξk . E 2ψ 3ψ But since we assume there is no T satisfying the conditions in Algorithm 8, we have Z ∞ Pr[p(X) > t]dt ψ E [p(X)] ≤ ψ X∈E 0 E √ 2 ≤ ψ · 4B k log (1/ξ) + ≤ 4Bψ · √ k log2 (1/ξ) + ≤ 4C2 Bψ · √ Z √ O(d2 k log(|S|/δ)) ψ Pr[p(X) √ E 4B k log2 1/ξ Z O(d2 √k log(|S|/δ)) Pr[p(X) √ S 4B k log2 1/ξ Z O(d2 √k log(|S|/δ)) k log2 (1/ξ) + √ 4A2 C2 B k log2 1/ξ √ Z ∞ √ ≤ 4A2 C2 Bψ k log2 (1/ξ) + 4B k √ e 2 ) ≪ 10ξk , ≤ O( kξ) + O(ε A2 log2 1/ξ > t]dt > t]dt  t √ exp −A 4B k 1/2 ! ε2 + 2 d log |G|/δ e 2) exp(−Ω(t1/2 ))dt + O(ε which is a contradiction, for our choice of C1 , C2 , C3 , and since we chose k = O(log4 1/ε). 49 ! dt The final thing we must verify is that the number of good points we remove is much smaller than the number of bad points we remove. Formally, we show: Claim 23. If dim(Vm ) ≥ k, then Algorithm 8 returns a S ′ satisfying ∆(S ′ , G0 ) < ∆(S, G0 ). √ Proof. Let T be the threshold we pick. If T > C3 d2 k log(|S|) then the invariant is satisfied since we remove no good points, by (ε, δ)-goodness. It suffices to show that we remove log 1/ε times many more bad points than good points. Otherwise, by definition we remove a total of ! 1/2 !  ε2 T √ + 2 |S| · exp −A d log2 |S|/δ 2B k points. On the other hand, by (ε, δ)-goodness, hypercontractivity, and Claim 20, we know that the total number of points we throw away is at most |G| · Pr[Q(X) > T ] ≤ |G0 | · Pr[Q(X) > T ] G G0 −1/2 ! ! ε2 + ≤ |G0 | exp −A 2 log(1/ε)(d log(|G|/δ))2 !  1/2 ! T ε2 √ ≤ |G0 | exp −A . + 2 log(1/ε)(d log(|G|/δ))2 B k  T kQk2 Since we have maintained this invariant so far, in particular, we have√ thrown away more bad points than good points, and so |G0 | ≤ (1 + ε)|S|. Moreover, since T ≥ 4B k log2 1/ε, we have exp −A  T √ B k 1/2 ! = exp −A ≤ exp −A ≤ exp −A ≤ exp −A     T √ 4B k T √ 4B k T √ 4B k T √ 4B k 1/2 !2 1/2 ! 1/2 ! 1/2 !  · exp −A · ε−1 · !1/2  √ 2 4B k log 1/ε  √ 4B k 1 . log 1/ε    1/2  Therefore, we have log(1/ε) · |G| · PrG [Q(X) > T ] ≤ |S| · exp −A 4BT√k + hence, the invariant is satisfied. ε2 d2 log |G|/δ  , and Claims 22 and 23 together prove the theorem. D.3 Proof of Lemma 6 By Lemma 8.16 in [DKK+ 16], the first two items hold together with probability 1 − O(δ) after taking O(poly(d, 1/η, log 1/δ)) samples. Thus, it suffices to show that the last property holds with probability 1 − O(δ) given O(poly(d, 1/η, log 1/δ)) samples. We may clearly WLOG take Σ = I. Moreover, these properties are clearly invariant under scaling, and hence, it suffices to prove them 50 for degree-four polynomials with VarN (0,I) [p(X)] = 1. For any fixed degree-4 polynomial p, by P hypercontractivity, since P (X) = n1 ni=1 p(Xi ) has variance Var[P (X)] = n1 , we have that " # n   1X Pr p(Xi ) − E [p(X)] ≥ t ≤ exp −At1/2 n1/4 . n N (0,I) i=1 In particular, if we take n=Ω then Pr "  log4 1/δ η2  , # n 1X p(Xi ) − E [p(X)] ≥ η ≤ O(δ) . n N (0,I) i=1 4 Since there is a 1/3-net over all degree-4polynomials with unit variance of size (1/3)O(d ) , by union  d4 log1/δ samples, then the second to last property holds bounding, we obtain that if we take Ω η2 with probability 1 − δ. Finally, the same net technique used to prove Lemma 8.16, along with hypercontractivity, may be used to show the last property holds when given poly(d, log 1/η, log 1/δ) samples. D.4 Proof of Lemma 15 Proof. Let µ′ = EN (0,Σ) [p(X)], s = EN (0,Σ) [p2 (X)], and let ES [p(X)] − EN (0,Σ) [p(X)] = K. By (ε, δ)-goodness and Lemma 10, we have E [p(X)] − µ′ ≤ ε E [p2 (X)]1/2 ≤ 2ε . G0 N (0,Σ) (10) Moreover, for some appropriate choice of β1 , we have Z ∞ ′ φ Pr [|p(X) − µ| ≥ t] dt φ E[p(X)] − φµ ≤ L 0 L ≤ β1 φ log 1/ε + (a) Z ≤ β1 φ log 1/ε + (b) ≤ β1 φ log 1/ε + (c) O(d log |S|/δ) β1 log 1/ε |G0 | |S| |G0 | |S| Z Z φ Pr [|p(X) − µ| ≥ t] dt L O(d log |S|/δ) β1 log 1/ε O(d log |S|/δ) β1 log 1/ε Pr [|p(X) − µ| ≥ t] dt G0 Pr [|p(X) − µ| ≥ t] dt + O(ε) N (0,Σ) ≤ β1 φ log 1/ε + εO(β1 ) + O(ε) = O(ε) , (11) where (a), (b), follows from the definition of goodness, and (c) follows from standard Guassian concentration bounds. In particular, (10) and (11) together imply that 2K K ≥ E[p(X) − µ′ ] ≥ , E ψ 2ψ 51 so this implies K2 . 4ψ 2 E[(p(X) − µ′ )2 ] ≥ E Expanding this yields that E[(p(X) − µ′ )2 ] = E[p2 (X)] − 2µ′ E[p(X)] + (µ′ )2 , E E E so since |µ′ | ≤ kΣ − IkF ≤ ξ, we have E[p2 (X)] ≥ E 2K K2 − + O(ξ 2 ) . 4ψ 2 ψ (12) On the other hand, by Lemma 10, we have 1 |s − 1| ≤ kΣ⊗2 − I ⊗2 k2 + kΣ − Ik2F 2 ≤ ξ + O(ξ 2 ) . (13) Also, by (ε, δ)-goodness and Lemma 10, we have E [p2 (X)] − s ≤ ε(1 + O(ξ)) , (14) G0 and, for A as in Corollary 6, and β appropriately chosen, Z ∞ 2 φ(E[p (X)] − s) ≤ φ Pr[|p2 (X) − s| ≥ t]dt L 0 L 2 ≤ βAφ log 1/ε + Z O((d log |S|/δ)2 ) |G0 | ≤ βAφ log 1/ε + |S| 2 (a) ≤ βAφ log2 1/ε + (b) ≤ βAφ log2 1/ε + φ Pr[|p2 (X) − s| ≥ t]dt L 2A log2 1/ε |G0 | |S| Z ∞ Z O((d log |S|/δ)2 ) βA log 1/ε Z Pr[|p2 (X) − s| ≥ t]dt G0 2 O((d log |S|/δ)2 ) 2 βA log 1/ε 1/2 /2 e−At 2 Pr [|p2 (X) − s| ≥ t]dt + O(ε2 ) N (0,Σ) dt + O(ε2 ) βA log 1/ε 2 ≪ 2βAξ + O(ε) + O(ε ) , (15) where (a) follows from goodness, and (b) follows from Corollary 6 and since kΣ − IkF = o(1). Thus, (12), (13), (14), and (15) together imply that E[p2 (X)] − 1 ≥ 1 − (ξ + O(ξ 2 )) − O(ε) − 2βAξO(ε) + S and so since K ≥ Ω √  εξ , this gives the desired bound. 52 K2 − 2K + O(ξ 2 ) , 4ψ
7cs.IT
POSTNIKOV-SHAPIRO ALGEBRAS, GRAPHICAL MATROIDS AND THEIR GENERALIZATIONS arXiv:1509.08736v4 [math.CO] 5 Mar 2017 GLEB NENASHEV Abstract. A.Postnikov and B.Shapiro introduced a class of commutative algebras which enumerate forests and trees of graphs. Our main result is that the algebra counting forests depends only on graphical matroid and the converse. By these algebras we motivate generalization of the definition of spanning forests and trees for hypergraphs and the corresponding "hypergraphical" matroid. We present 3 different equivalent definitions, which can be read independently from other parts of the paper. Contents 1. Introduction 1 2. Algebras and Matroids 4 3. Algebras associated with t-labelled forests 10 4. Vector configurations and Hypergraphs 13 5. Algebras corresponding to spanning trees, Problems 18 References 20 1. Introduction There are a lot of results about enumeration of spanning trees and forests of graphs. The famous matrix-tree theorem of Kirchhoff (see [16] and p. 138 in [26]) claims that the number of spanning trees of a given graph G equals the determinant of the Laplacian matrix of G. Many generalizations of the classical matrix-tree theorem were constructed in a long period, e.g. for directed graphs, matrix-forest theorems, etc (see e.g. [8], see [6] and references therein). It is also well known that the number of maximal spanning forests of G (or equivalently trees for connected G) equals TG (1, 1) while the number of all spanning forests of G equals TG (2, 1), where TG is the Tutte polynomial of G (see p. 237 in [26]). We focus here on algebras introduced by A. Postnikov and B. Shapiro in [22] and on graphical matroids, both objects enumerate spanning Key words and phrases. Commutative algebra, Graph, Hypergraph, Matroid, Spanning trees and forests, Tutte polynomial. 1 2 G. NENASHEV trees and forests. Before our paper there was no direct relation between them, only across the Tutte polynomial, Critical group (Sandpile model). Also with the motivation given by these algebras we introduce 3 equivalent definitions of spanning trees (forests) of a hypergraph and present corresponding "hypergraphical" matroid. If you are interested only in the latter, scroll to section 4.2. The field K of zero characteristic is fixed throughout this paper, for example C or R. By a graph we always mean an undirected graph without loops (multiple edges are allowed). We use the standard notation: E(G) and e(G) are the set and the number of edges of graph G; V (G) and v(G) are the set and the number of vertices of G; c(G) is the number of connected components of G and TG (x, y) is the Tutte polynomial of G. At first, we present two definitions of Postnikov-Shapiro algebras counting spanning forests. Notation 1.1. Take an undirected graph G on n vertices. (I) Let ΦFG be the commutative algebra over K generated by {φe : e ∈ E(G)} satisfying the relations φ2e = 0, for any e ∈ E(G). Fix any linear order of vertices of G. For i = 1, . . . , n, set X Xi = ci,e φe , e∈G where ci,e    1 if e = (i, j), i < j; = −1 if e = (i, j), i > j;   0 otherwise. Denote by CGF the subalgebra of ΦFG generated by X1 , . . . , Xn . (II) Consider the ideal JGF in the ring K[x1 , · · · , xn ] generated by !DI +1 X pFI = xi , i∈I where I ranges over all nonempty subsets of vertices, and DI is the total number of edges between vertices in I and vertices outside I. Define F the algebra BG as the quotient K[x1 , . . . , xn ]/JGF . Remark 1.1. In the first definition, the order of vertices is not important. Easy to see that all such algebras are isomorphic to the above definition of CGF , even though we can separately choose the "smallest" vertex for each edge. For an orientation G of graph G, we denote by CGF the subalgebra of {φe : e ∈ E(G)}, where ci,e = 1 for the end of e and −1 for the beginning of e. The original motivation of these algebras is that, for the complete graph Kn , the algebra is isomorphic to the cohomology ring of the flag POSTNIKOV-SHAPIRO ALGEBRAS AND MATROIDS 3 manifold F ln , see [23] and [24]. Algebras of complete graphs are also related to Fomin-Kirillov and Orlik-Terao algebras, see their definition in [11], [20] and relations between the last two in [18]. In paper [4] a big class of algebras was considered, which includes our case, Orlik-Terao and others. Postnikov-Shapiro algebras have direct connections with G-parking functions (see [22], [9]), whose are stable configurations of the sandpile model introduced in [10]. F T There are a few generalizations of BG and BG in the literature (the latter algebra counts trees in G instead of forests, see notation in section 5), see the most important generalizations in papers [2] and [13]. In both papers the main object of the generalizations is the algebra of the second definition (quotient algebra), they defined the so called Zonotopal algebras, where dimensions of algebras are numbers of lat∆ tice points of corresponding zonotops. In [14] the definitions of BG and ∆ CG were given in terms of some simplex complex ∆ on the set of verF T tices of G. With this definition algebras BG and BG become particular cases corresponding to different simplexes. We need the following classic notation, which was constructed by Tutte for his original definition of the polynomial. Notation 1.2. Fix some linear order on the set E(G) of edges of G. Let F be any spanning forest in G. By actG (F ) denote the number of all externally active edges of F , i.e. the number of edges e ∈ E(G) \ F such that (i) subgraph F + e has a cycle; (ii) e is the minimal edge in this cycle in the above linear order. Denote by F + the set of edges of the forest F together with all externally active edges, and denote by F − = E(G) \ F + the set of externally nonactive edges. The following theorem is the main result of [22], which shows that both definitions are equivalent and why it is called algebra counting spanning forests. F Theorem 1.1 (cf. [22]). For any graph G, algebras BG and CGF are isomorphic, their total dimension over K is equal to the number of spanning forests in G. Moreover, the dimension of the k-th graded component of these algebras equals the number of spanning forests F of G with external activity e(G) − e(F ) − k. In fact, the second part of Theorem 1.1 claims that the above Hilbert polynomial is a specialization of the Tutte polynomial of G. Corollary 1.1. Given a graph G, the Hilbert series of the algebra CGF is given by   1 HCGF (t) = TG 1 + t, · te(G)−v(G)+c(G) , t 4 G. NENASHEV where c(G) is the number of the connected components of G. Both definitions of algebras are important, and sometimes it is easier to use the first and sometimes the second. For example: if you want to use computer algebra, then the first is better, because it has less relations, but in fact, the first definition is subalgebra of the bigger algebra ΦFG . The structure of the paper is the following: In § 2 we show that the Postnikov-Shapiro algebras counting spanning forests and graphical matroids are in one to one correspondence, see Theorem 2.1. It means that these algebras store almost all information about the graphs. In § 3 we consider t-labelled analouge of algebras, namely we use the condition φt+1 = 0 instead φ2e = 0. The similar properties hold and a e new property that we can reconstruct the Tutte polynomial from the Hilbert series of the algebra corresponding to large t, see Theorem 3.3. In § 4 we construct a family of algebras corresponding to a given hypergraph, and we present a natural definition of a matroid of a hypergraph such the Hilbert series of algebras is a specialization of the Tutte polynomial corresponding to this matroid. In § 5 we discuss similar problems for algebras counting spanning trees and formulate Conjecture 1. Acknowledgement. I am grateful to my supervisor Boris Shapiro for introducing me to this area, for his comments and editorial help with this text. 2. Algebras and Matroids Obviously, the original Postnikov-Shapiro algebra corresponding to a disconnected graph G is the Cartesian product of the algebras corresponding to the connected components of G. In particular, it is also true for 2-connected components (maximal connected subgraphs such that they remain connected, after removal of any vertex). The same fact is also true for matroids. In this section we prove the following result. F F Theorem 2.1. Algebras BG and BG for graphs G1 and G2 are iso1 2 morphic if and only if the graphical matroids of these graphs coincide. P.S. The algebraic isomorphism can be thought of either as graded or as non-graded, the statement holds in both cases. In the subsequent paper [19] filtered algebras are considered, that distinguish graphs. The proof is based on some ideas from this paper and on another trick, that makes a proof easier. Here we should proof both sides and in the proof of Theorem 2.1 we use the following theorem of H. Whitney. POSTNIKOV-SHAPIRO ALGEBRAS AND MATROIDS 5 Theorem 2.2 (Whitney’s 2-isomorphism theorem, see [27], [21]). Let G1 and G2 be two graphs. Then their graphical matroids are isomorphic if and only if G1 can be transformed to a graph, which is isomorphic to G2 by a sequence of operations of vertex identification, cleaving and twisting. These three operations are defined below. 1a) Identification: Let v and v ′ be vertices from different connected components of the graph. We modify the graph by identifying v and v ′ as a new vertex v ′′ . 1b) Cleaving (the inverse of identification): A graph can only be cleft at a cut-vertex. 2) Twisting: Suppose that the graph G is obtained from two disjoint graphs G1 and G2 by identifying vertices u1 of G1 and u2 of G2 as the vertex u of G and additionally identifying vertices v1 of G1 and v2 of G2 as the vertex v of G. In a twisting of G about {u, v}, we identify u1 with v2 and u2 with v1 to get a new graph G′ . We split our proof of Theorem 2.1 in two parts presented in § 2.1 and in § 2.2. 2.1. Algebras are isomorphic if their matroids are isomorphic. F Because algebras BG and CGF are isomorphic for any graph by Theorem 1.1, it suffices to prove Theorem 2.1 for algebras CGF 1 and CGF 2 . Lemma 2.1. If graphs G and G′ differ by a sequence of Whitney’s deformations, then the algebras CGF and CGF ′ are isomorphic. Proof. It is sufficient to check the claim for each deformation separately. 1◦ Identification and Cleaving. We need to prove our fact only for cleaving, because identification is the inverse of cleaving. In this case algebras doesn’t change, because the linear subspace defined by Xi for vertices doesn’t change. This holds, because if we split a vertex k into k ′ and k ′′ , then in the new graph, Xk′ equals to the minus sum of Xi corresponding to the vertices from its component except k ′ (sum of all X. from one connected component is zero), i.e. Xk′ belongs to the linear space <X1 , . . . , Xk−1 , Xk+1, . . . , Xn >. Similarly Xk′′ belongs to the linear space <X1 , . . . , Xk−1 , Xk+1, . . . , Xn >. Hence, <X1 , . . . , Xk′ , Xk′′ , . . . , Xn > is a subspace of the linear space <X1 , . . . , Xn >. The equation, Xk = Xk′ + Xk′′ implies that these linear spaces coincide. 2◦ Whitney’s deformation of the second kind. Define the digraph G as the orientation of the graph G, where each arrow goes to the "smallest" vertex (see Remark 1.1). Let us make a twist of the vertices u and v. Let G1 and G2 be the orientations of G1 and G2 corresponding to G. Let G′ be the orientation of G′ corresponding to the gluing G1 and G2 with reversing each arrow 6 G. NENASHEV from G2 . Vertex u′ in G′ is obtained by gluing of u1 and v2 ; v ′ is obtained by gluing of v1 and u2 . Let Xk , X1,k , X2,k and Xk′ be the sums with signs of edges incident to vertex k in graphs G, G1 , G2 and G′ . For a vertex k of G1 except u1 and v1 , we get Xk = X1,k = Xk′ . For a vertex k of G2 except u2 and v2 , we get Xk = X2,k = −Xk′ , because we reverse the orientation in the second part of twisting. For other vertices we have: Xu = X1,u1 + X2,u2 ; Xv = X1,v1 + X2,v2 ; Xu′ ′ = X1,u1 − X2,v2 = Xu − (X2,u2 + X2,v2 ); Xv′ ′ = X1,v1 − X2,u2 = Xv − (X2,u2 + X2,v2 ). We know that the sum of variables corresponding to the vertices of any graph is zero, because each edge goes with a plus to one vertex and with a minus to another. We have X X2,k = 0, X k∈G2 X2,k + X2,u2 + X2,v2 = 0, k∈G2 \u2 ,v2 X2,u2 + X2,v2 = − X X2,k = − k∈G2 \{u2 ,v2 } Xu′ ′ Xv′ ′ X Xk . k∈G2 \{u2 ,v2 } belong to the linear space generated by Xk , where and Hence, k ∈ G. In other words, the linear space for G′ is a linear subspace of the space for G. Similarly we can prove the converse. Then, the linear spaces coincide, and since we have the same relations (φ2e = 0 for any edge), the algebras in these bases coincide.  We have proved the first part of Theorem 2.1, because if the corresponding graphical matroids are isomorphic, then there exists such a sequence of Whitney’s operations. Corollary 2.1. The algebra corresponding to a graph G is the Cartesian product of the algebras corresponding to the 2-connected components of G. 2.2. Reconstruction of the matroid. Lemma 2.2. It is possible to reconstruct a matroid of a graph G from the algebra CGF . Remark 2.1. We assume that we only know CGF as an algebra. I.e. we assume that we do not know the basis corresponding to the vertices of G, and that we have no information about the graded components of CGF . POSTNIKOV-SHAPIRO ALGEBRAS AND MATROIDS 7 Proof. For an element Y ∈ CGF , we define its length ℓ(Y ) as the minimal number such that Y ℓ+1 is zero (the length can be infinite). WePcall an element Y ∈ CGF irreducible if there is no representation Y = i Z2i−1 Z2i such that ℓ(Zj ) is finite for any j. Consider a basis {Y1 , ..., Ym } of the algebra CGF with the following conditions: • Each Yj is irreducible; • For any k 6 m, different nonzero numbers r1 , . . . , rk ∈ K, any r1′ , . . . , rk′ ∈ K and different i1 , . . . , ik ∈ [m], we have ℓ(r1 Yi1 + · · · + rk Yik ) > ℓ(r1′ Yi1 + · · · + rk′ Yik ); • For any linear combination Y of {Y1 , ..., Ym } and a reducible Z, P ℓ(Y ) 6 ℓ(Y + Z); • i ℓ(Yi ) is minimal. Such a basis of CGF always exists. For example, the basis X1 , . . . , Xn (corresponding to the vertices) satisfies the first three conditions. However, the sum of lengths of Xi is not minimal. For an element Y ∈ CGF , we define its linear part as Y and its remainder as Yb , where Y = Y + Yb , Y belongs to the 1-graded component of CGF and Yb belongs to the linear span of the other graded components. Observe that we do not know this decomposition explicitly, because we do not know the 1-graded component. We say that an edge e belongs to Y if Y includes the variable φe corresponding to the edge e with a nonzero coefficient. Proposition 2.3. A basis {Y1 , ..., Ym } as above satisfies additionally the following conditions: (1) The set {Y 1 , ..., Y m } is a basis; (2) For any linear combination Y of {Y1 , ..., Ym }, ℓ(Y ) = ℓ(Y ); (3) Each edge belongs to one or two Y i and Y j . If it belongs to two, then with the opposite coefficients; (4) Each Y i has edges only from one 2-connected component. Proof. (1). We know that {Y1 , ..., Ym } is a basis. Hence, the 1-graded component of CGF coincides with a linear span of <Y 1 , ..., Y m >. Then, <Y 1 , ..., Y m > is also a basis. (2). For any i ∈ [m], the part Ybi is reducible, otherwise ℓ(Yi ) is infinite, and the sum in the last condition is infinite. However for the basis corresponding to the vertices this sum is finite. Then for any linear combination Y of {Y1 , ..., Ym }, we have ℓ(Y ) 6 ℓ(Y ) < ∞ (by third condition of choice). However, it is clear that ℓ(Y ) > ℓ(Y ). Hence, ℓ(Y ) = ℓ(Y ) for any Y from the linear space <Y1 , ..., Ym >. 8 G. NENASHEV (3). Obviously, each edge belongs to at least one Y j , because any edge belongs to some Xi and this Xi is a linear combination of Y 1 , ..., Y m . Assume that there is an edge e, which belongs to Y i1 , Y i2 and Y i3 . Then there are different nonzero numbers r1 , r2 and r3 such that, for Y = r1 Y1 + r2 Y2 + r3 Y3 , Y without e. Then ℓ(Y ) is at most the number of all edges in Y i1 , Y i2 and Y i3 minus one. Consider r1′ , r2′ and r3′ in general position, then, for Y ′ = r1′ Y1 + r2′ Y2 + r3′ Y3 , ℓ(Y ′ ) is the number of all edges in Y i1 , Y i2 and Y i3 . We have ℓ(r1 Y1 + r2 Y2 + r3 Y3 ) < ℓ(r1′ Y1 + r2′ Y2 + r3′ Y3 ). Using (2) we also have ℓ(r1 Y1 + r2 Y2 + r3 Y3 ) < ℓ(r1′ Y1 + r2′ Y2 + r3′ Y3 ), which contradicts our choice of the basis. We proved the first part of condition (3); the proof of the second part is the same, but only for two different r1 and r2 . (4). Assume the opposite, i.e. that there is Y i which has edges belonging to two different 2-connected components. We know that the algebra is the Cartesian product of the subalgebras corresponding to 2-connected components. Then there are Z1 and Z2 from the 1-graded component, such that Y i = Z1 + Z2 and ℓ(Z1 ), ℓ(Z2 ) < ℓ(Y i ).(For example, Z1 is a part corresponding to some 2-connected component and Z2 is another part). Because Z1 and Z2 belong to the linear space <Y 1 , ..., Y m >, we can change Y i to Z1 or Z2 in the basis {Y 1 , ..., Y m }. (Indeed if we can not do it, then Z1 and Z2 belong to <Y 1 , . . . Y i−1 , Y i−1 , . . . Y m >. Therefore Y i = Z1 + Z2 also belongs to the latter space). Let us {Y 1 , . . . Y i−1 , Z1 , Y i−1 , . . . Y m } is also a basis. We have a new basis {Y 1 , . . . Y i−1 , Z1 , Y i−1 , . . . Y m }, whose sum of lengths is less than the sum of lengths of {Y 1 , . . . , Y m }, which is equal to the sum of lengths of {Y1 , . . . , Ym }. And for this basis, the first three conditions of a choice of basis hold, and the sum of lengths is smaller. Then we should choose the basis {Y 1 , . . . Y i−1 , Z1 , Y i−1 , . . . Y m } instead of {Y1 , . . . , Ym }. Contradiction.  Let us now construct the cut space of G. This will finish the proof, because we can define the graphical matroid in terms of the cut space of a graph. By a cut we mean a set C of edges such that the subgraph G \ C has more connected components than G. By an elementary cut we mean a minimal cut, i.e. a cut, whose arbitrary subset is not a cut. POSTNIKOV-SHAPIRO ALGEBRAS AND MATROIDS 9 P i P i The sum 2 Yi = 2 Yi has each edge with a nonzero coefficient by (2) of Proposition 2.3. Hence, ! ! m m X X e(G) = ℓ 2i Y i = ℓ 2i Y i . i=1 i=1 Therefore we know the number of edges in the graph. Consider the set τ = {ψ1 , . . . , ψe(G) } consisting of e(G) elements and a family of subsets K1 , . . . , Km constructed by the following rules. ℓ(Y )+ℓ(Y )−ℓ(Y +Y ) j i j own ele• For each pair i and j, we prescribe i 2 ments from τ and add them to both Zi and Zj ; P ℓ(Y )+ℓ(Yj )−ℓ(Yi +Yj ) • For every i, we choose ℓ(Yi ) − j6=i ( i ) own el2 ements from τ and add them to Zi . In fact, for any edge e from G, we choose the corresponding element ψk(e) and add it to Zi if and only if e belongs to Y i . Consider the space Γ of subsets in τ with the operation ∆ (symmetric difference) generated by Z1 , . . . , Zm . We want to prove that Γ is isomorphic to the cut space of G. Let C be an elementary cut of G. Let XC be the sum of Xi corresponding to the vertices, which belong to some new component of G \ C (hence, XC is in 1-graded component). Then XC has an edge with a nonzero coefficient if and only if the edge belongs to C. Consider the minimal t such that there is a linear combination XC = a1 Y i1 + . . . + at Y it ; consider the sum XC′ = Y i1 + . . . + Y it . Obviously, XC′ is nonzero and has edges only from the cut C, because an edge belongs to the sum XC′ if and only if it is exactly in one of Y i1 , . . . , Y it . Assume that XC′ has not all edges from XC . Let C ′ be a subset of the edges of C belonging to XC′ . The set of edges C ′ is not a cut of G, because C is an elementary cut. Hence, for any edge e ∈ C ′ , there is a path e1 , . . . , ek in G \ C ′ , such that e, e1 , . . . , ek is a simple cycle. Let the edge e connect vertices bk and b0 , and the edge ei connect bi−1 and bi P for any i ∈ [k]. Because XC′ belongs to the 1-graded component, ′ XC = ni=1 abi Xi , where abi ∈ K and Xi are the elements corresponding to the vertices of G. For i ∈ [k], the edge ei does not belong to XC′ , however variable φei belongs only to Xbi−1 and Xbi from {X1 , . . . , Xn }. Furthermore it belongs to one of {Xbi−1 , Xbi } with coefficient 1 and to another with −1, hence, b abi−1 = b abi . Then, we also have b ab0 = b abk . ′ Hence the variable φe belongs to XC with a zero coefficient. Contradiction. We concluded that a subset of τ corresponding to an elementary cut belongs to the space Γ. To finish the proof, we need to show, that if a subset of τ belongs to Γ, then it either corresponds to a cut or to the empty set. 10 G. NENASHEV Assume the contrary, i.e. assume that there is Zi1 ∆Zi2 ∆ · · · Zis is not a cut. Let C be a set of edges from Y i1 + Y i2 + · · · + Y is , then C is not a cut in G. By Proposition 2.3 we can split the summation into the summations inside individual connected components (and even inside 2-connected component). Then, for any connected component it is not a cut. Let Y ij1 + Y ij2 + · · · + Y ijr corresponds to a connected component ′ G , and has the set of edges C ′ . Then X av Xv . Y ij1 + Y ij2 + · · · + Y ijr = v∈V (G′ ) We know that G′ \ C ′ is connected. Therefore there is a spanning tree T in G′ \ C ′ . For any edge P vi vj from T , we have avi = avj ; otherwise the edge vi vj belongs to v∈V (G′ ) av Xv with a nonzero coefficient. ′ Since P T is a spanningPtree of G , all coefficients av are the same. Thus v∈V (G′ ) av Xv = a( v∈V (G′ ) Xv ) = 0; the last sum is zero, because the sum of variables corresponding to vertices from a connected component is zero. Then we also have Y i1 + Y i2 + · · · + Y is = 0, hence, Zi1 ∆Zi2 ∆ · · · Zis is the empty set. Therefore the space Γ is isomorphic to the cut space of G, i.e. there is a unique graphical matroid corresponding to CGF .  3. Algebras associated with t-labelled forests In this section we substitute the square-free algebra ΦFG for the (t+1)free algebra ΦFGt . Notation 3.1. Take an undirected graph G on n vertices. Let t > 0 be a positive integer. (I) Let ΦFGt be a commutative algebra over K generated by {φe : e ∈ E(G)} satisfying the relations φt+1 = 0, for any e ∈ E(G). e Fix any linear order on the vertices of G. For i = 1, . . . , n, set X Xi = ci,e φe , e∈G where ci,e as in the notation 1.1. Denote by CGFt the subalgebra of ΦFGt generated by X1 , . . . , Xn . (II) Consider the ideal JGFt in the ring K[x1 , · · · , xn ] generated by !tDI +1 X xi pFI t = , i∈I where I ranges over all nonempty subsets of vertices, and DI is the total number of edges between vertices in I and vertices outside I. Define Ft as the quotient K[x1 , . . . , xn ]/JGFt . the algebra BG POSTNIKOV-SHAPIRO ALGEBRAS AND MATROIDS 11 It enumerates the so-called t-labelled spanning forests. Consider a finite labelling set {1, 2, . . . , t} containing t different labels. Definition 3.2. A spanning forest of a graph G with a label from {1, 2, . . . , t} on each edge is called a t-labelled forest. The weight of a t-labelled forest F , denoted by ω(F ), is the sum of the labels of all its edges. Ft Theorem 3.1. For any graph G and a positive integer t, algebras BG and CGFt are isomorphic. Their total dimension over K is equal to the number of t-labelled forests in G. Ft is The dimension of the k-th graded component of the algebra BG equal to the number of t-labelled forests F of G with the weight t · (e(G) − actG (F )) − k. b the graph on n vertices and with t · e(G) edges Proof. Denote by G b In such that each edge of G corresponds to its t clones in the graph G. other words, each edge of G is substituted by its t copies with labels b are 1, 2, . . . , t. For each edge e ∈ E(G), its clones e1 , . . . , et ∈ E(G) ordered according to their numbers; clones of different edges have the same linear order as the original edges. Thus we obtain a linear order b of the edges of G. Consider the following bijection between t-labelled forests in G and b each t-labelled forest F ⊂ G corresponds to the usual forests in G: ′ b such that for each edge e ∈ E(F ), the forest F ′ has the forest F ⊂ G, clone of the edge e whose number is identical to the label of the edge e in the forest F . Obviously, actGb (F ′ ) = t · actG (F ) + ω(F ) − e(F ), b = t · e(G). Since BFt and BF are the same, the Hilbert series and e(G) G b G Ft F of the algebra BG coincides with the Hilbert series of the algebra BG b, which settles the second part of Theorem 3.1. Ft F and BG To prove the first part of this Theorem, observe that BG b are F F isomorphic, and algebras CGb and BGb are isomorphic. Thus we must show that algebras CGFb and CGFt are isomorphic. This is indeed true, because for every edge e ∈ E(G), the elements φe , . . . , φte are linearly independent in the algebra ΦFGt with coefficients containing no φe . Also elements (φe1 + · · · + φet ), . . . , (φe1 + · · · + φet )t are linearly independent in the algebra ΦFGb with coefficients containing no φe1 , . . . , φet , and (φe1 + · · · + φet )t+1 = 0. Moreover elements φei only occur in the sum (φe1 +  · · · + φet ) in the algebra ΦFGb . 12 G. NENASHEV Ft was calculated in papers [2] and [17]. In fact Hilbert Series of BG b where each edge Furthermore, the Hilbert Series was computed for G, is replaced by its own number of edges. The Hilbert series is a specialization of the multivariate Tutte polynomial (see definition in [25]). When "t" is the same for every edge, the multivariate Tutte polynomial is calculated from the usual Tutte polynomial. So in our case the Ft Hilbert Series of BG is a specialization of the Tutte polynomial of G. Ft is Theorem 3.2. The dimension of the k-th graded component of BG equal to the coefficient of the monomial y t·e(G)−v(G)+c(G)−k in the polynomial  t v(G)−c(G)   t+1 y −1 y −1 t ,y . · TG y−1 y t+1 − y b constructed in the proof of Theorem 3.1. We Consider the graph G need the following technical lemma which was proved in [5]. Lemma 3.1 (Lemma 6.3.24 in [5]). v(G)−c(G)   t  t y − y + x(y − 1) t y −1 ,y . · TG TGb (x, y) = y−1 yt − 1 After the substitution x → 1 + y1 , we get the following equality. Corollary 3.1. v(G)−c(G)    t  t+1  y −1 y −1 t 1 ,y . · TG TGb 1 + , y = y y−1 y t+1 − y Ft F is isomorphic to the algebra BG Proof of Theorem 3.2. Algebra BG b (which was shown in the proof of Theorem 3.1), furthermore they are isomorphic as graded algebras. So it is enough to show that dimenF sion of the k-th graded component of BG b is equal to the coefficient of b b b the monomial y t·e(G)−v(G)+c(G)−k = y e(G)−v(G)+c(G)−k in the polynomial TGb (1 + y1 , y). This fact is true by Corollary 1.1.  Theorem 3.3. For any positive integer t > n, it is possible to restore the Tutte polynomial of any connected graph G on n vertices knowing Ft . only the dimensions of each graded component of the algebra BG Proof. By Theorem 3.1 we know that the degree of the maximal Ft nonempty graded component of BG is equal to the maximum of t · (e(G) − actG (F )) − ω(F ) taken over F . It attains its maximal value for the empty forest (i.e. F = ∅). Then we know the value of t · e(G), and hence, we know the number of edges of the graph G. Since we know that t · e(G) − v(G) + c(G) = t · e(G) − n + 1 (G is connected, i.e., c(G) = 1), by Theorem 3.2 we can calculate the polynomial  t v(G)−c(G)   t+1 y −1 y −1 t ,y · TG y−1 y t+1 − y POSTNIKOV-SHAPIRO ALGEBRAS AND MATROIDS 13  t+1  −1 from the Hilbert series. Then we can also calculate TG yyt+1 −y , yt . It is well P known that for any graph G, its Tutte polynomial TG (x, y) is equal to F (x − 1)c(F )−c(G) y actG (F ) , where the summation is taken over all spanning forests of G. Then we obtain TG  y t+1 − 1 t ,y y t+1 − y = X F  = X  y t+1 − 1 F y t+1 − y 1 t−1 y(y + · · · + 1) −1 n−1−e(F ) n−1−e(F ) y t·actG (F ) = y t·actG (F ) . Hence, we can restore the polynomial X e(F ) t·act (F )+e(F ) y t−1 + · · · + 1 y G . (∗) F Since e(F ) < t, we can compute the number of usual spanning forests with a fixed pair of parameters e(F ) and actG (F ). Indeed, consider the monomial of the minimal degree in the polynomial (∗), and represent it in the form s · y m . Observe that s is the number   of spanning forests F such that F ≡ m (mod t) and actG (F ) = mt . Remove from the polynomial (∗) all summands for these spanning forests, and repeat this operation until we get 0. P Note again that TG (x, y) = a,b #{F : e(F ) = a, act(F ) = b} · (x − n−1−a 1) · y b. Therefore we know the whole Tutte polynomial of G, since we know the number of usual spanning forests with any fixed number of edges and any fixed external activity.  4. Vector configurations and Hypergraphs 4.1. Algebra corresponding to vector configuration. The following algebra was introduced by A. Postnikov, B. Shapiro and M. Shapiro in [23]. Notation 4.1. Given a finite set A = {a1 , . . . , am } of vectors in Kn , let ΦFm be the commutative algebra over K generated by {φi : i ∈ [m]} with relations φ2i = 0, for each P i ∈ [m]. For i = 1, . . . , n, set Xi = k∈[m] ak,i φk . Denote by CA the subalgebra of ΦFm generated by X1 , . . . , Xn . The Hilbert series of CA also corresponds to a specialization of the Tutte polynomial of the corresponding vector matroid, see Theorem 3 in [23]. Theorem 4.1 (cf. [23]). The dimension of algebra CA is equal to the number of independent subsets in V . Moreover, the dimension of the 14 G. NENASHEV k-th graded component is equal to the number of independent subsets S ⊂ A such that k = m − |S| − act(S). Corollary 4.1. Given a vector configuration A in Kn , the Hilbert series of algebra CA is   1 HCA (t) = TA 1 + t, · t|A|−rk(A), t where TA is the Tutte polynomial corresponding to A, |A| is the number of vectors in the configuration and rk(A) is the dimension of the linear span of these vectors. The set of different vector configurations depends on continuous parameters. Additionally, there are uncountably many non-isomorphic algebras each corresponding to its vector configuration. At the same time the number of matroids is countable, and it is finite for a fixed number of vectors. It means that there are many different vector configurations with the same corresponding matroid. In other words, it is in principle impossible to reconstruct a vector configuration and its algebra from the corresponding matroid. 4.2. Hypergraphs. In this subsection we present a family of algebras corresponding to a hypergraph. Almost all algebras from this family (generic algebras) have the same Hilbert series and this generic Hilbert series counts forests of this hypergraph. There are many definitions of spanning trees of a hypergraph, for example: a spanning cacti in [1]; a hypertree in [7] (also known as an arboreal hypergraph in [3]). However all these definitions allow trees to have different number of edges, whence spanning tree of a usual graph should have the same number of edges. We define spanning trees such that this property holds and also other natural properties hold. Also we define the hypergraphical matroid and the corresponding Tutte polynomial, whose points T (2, 1) and T (1, 1) calculate the numbers of spanning forests and of spanning trees, resp. Similar definition of spanning trees and forests was presented in [15], for that definition there is also Tutte polynomial for a hypergraph, however, there is no matroid. First we define the family of algebras. Given a hypergraph H on n vertices, let us associate commuting variables φe , e ∈ H to all edges of H. Set ΦH be the algebra generated by {φe : e ∈ H} with relations 2 φe = 0, for any e ∈ H. Define C = {ci,e ∈ K : i ∈ [n], e ∈ H} as a set of parameters of H, for any edge e ∈ H, ci,e = 0 for vertices non-incident to e, and P n i=1 ci,e = 0. POSTNIKOV-SHAPIRO ALGEBRAS AND MATROIDS For i = 1, . . . , n, set Xi = X 15 ci,e φe , e∈H F CH(C) Denote by the subalgebra of ΦH generated by X1 , . . . , Xn , and F b denote by CH the family of such subalgebras. The following trivial properties hold for this family of algebras. Proposition 4.2. P(I) For a hypergraph H, the dimension of the space of parameters is e∈E (|e| − 1). (II) Given a set of parameters C and non-zero numbers ae , e ∈ E, let C ′ be the set of parameters such that c′i,e = ae ci,e for any i ∈ [n] and e ∈ E. Then the subalgebras for C and for C ′ are isomorphic. Corollary 4.2. For a usual graph G, almost all algebras from CbG are isomorphic to CG . We define a hypergraphical matroid using the definition of an independent set of edges of a hypergraph. Definition 4.2. Let H be a hypergraph on n vertices. A set F of edges is called independent if there is a set of parameters C of H, such that vectors corresponding to edges from F are linearly independent. In other words, F is independent if, for a generic set of parameters of H, vectors are linearly independent. Define the hypergraphical matroid of H as the matroid with the ground set E(H). There is a combinatorial definition of an independent set of edges. First we need to define a cycle of H. Definition 4.3. A subset of edges C ⊂ E is called a cycle if • |C| = | ∪e∈C e| • There is no subset |C ′ ⊂ C|, such that the first property holds for C ′ . Definitions of dependence and of a cycle are similar. Theorem 4.3. A subset of edges X ⊂ E is dependent if and only if there is a cycle C ⊂ X. We present a proof of this theorem after Theorem 4.6. Definition 4.4. A set of edges F is called a spanning forest if F has no cycles, in other words, F is forest if and only if F is an independent set (by Theorem 4.3). A set of edges T ⊂ H is called a spanning tree if it is a forest and T has exactly v(H) − 1 edges. A hypergraph H is called strongly connected if it has at least one spanning tree. Proposition 4.4. Maximal spanning forests of a hypergraph have the same number of edges. In fact, if H = (V, E) is a strongly connected 16 G. NENASHEV hypergraph, then for any spanning forest F ⊂ E there is a spanning tree T which contains F (i.e. F ⊂ T ⊂ E). Proof. By Theorem 4.3 we know that a spanning forest is the same as an independent set of edges. Then we can add edges to a forest until the number of edges is less than the dimension of the linear space. Then all maximal spanning forests have the same size. Hence, if a hypergraph is strongly connected, then any spanning forest is contained in some spanning tree.  F The Hilbert series of algebras in CbH are also counting forests of H. F Theorem 4.5. For a hypergraph H, generic algebras from CbH have the same Hilbert series. The dimension of the k-th graded component of a generic algebra equals the number of spanning forests F in H with the external activity e(H) − e(F ) − k. Proof. By Theorem 4.3 we can change the definition of spanning forests to independent sets. Consider a generic set of parameters C. By TheF and it is the same for all orem 4.1 we know the Hilbert series of CH(C) generic sets of parameters.  We define the Tutte polynomial of H as the Tutte polynomial of the corresponding hypergraphical matroid. By the theorems above we know that • TH (2, 1) is the number of spanning forests; • TH (1, 1) is the number of maximal spanning forests. In fact, TH (1, 1) is the number of spanning trees if H is srongly connected. By Theorem 4.5, we get that a generic Hilbert series is a specialization of the Tutte polynomial of H. Corollary 4.3. Given a hypergraph H and its generic set of parameters F C, the Hilbert series of the algebra CH(C) is given by   1 HCH (C)F (t) = TG 1 + t, · te(H)−rkH , t where rkH is the size of a maximal spanning forest of H. There is another definition of forests/trees of H, which again shows that it is a generalization of forests/trees of a usual graph. Theorem 4.6. A subset of edges X ⊂ E is a forest (tree) if and only if there is map from edges to pairs: ek → (i, j), where vi , vj ∈ ek , such that these pairs form a forest (tree) in the complete graph Kn . Proof. Consider our forest F and the hypergraph H, add to them n − 1 − e(F ) full edges, i.e. edges of type V . We get a new hypergraph H ′ and a subset of edges F ′ . It is clear that F ′ is a tree, because there is POSTNIKOV-SHAPIRO ALGEBRAS AND MATROIDS 17 no cycle without new edges, and with at least one new edge we need to cover all vertices and their number is bigger than number of edges. So let F ′ = T and we will prove our Theorem for a spanning tree. Consider the bipartite graph B with two sets of vertices: the first set are edges of T and the second are vertices V \ v1 , where there is an edge between ei and vj if and only if vj ∈ ei . There is a perfect matching in B, because we can use Hall’s marriage theorem (see [12] or any classical book). We know that e(T ) = |V \ v1 | and, for any X ⊂ T , they cover at least e(X) vertices (otherwise these edges cover these vertices and may be v1 and then X has cycle). Consider a bijection f from T to V \ v1 constructed by this perfect matching. Now we construct by recursion a map g from T to pairs of vertices: (1) A := {v1 } and B := T (2) repeat until A 6= V : • choose the minimal edge ei from B such that ei ∩ A 6= ∅ • g(ei ) = (u, f (ei )), where u ∈ ei ∩ A • A := A ∪ {f (ei )} and B := B \ {ei } It works, otherwise we can not chose such an edge ei , then either B = ∅ or B 6= ∅ at this moment. We know that |A| + |B| = n, then in the first case we already have A = V ; in the second case edges from B have vertices only from V \ A, then there is a cycle on these edges, i.e. T is not a tree. Then this algorithm gives some usual tree.  Proof of Theorem 4.3. Assume the contrary, then there is a subset X ⊂ E, which is dependent and without cycles, i.e. X is a spanning forest. By Theorem 4.6 we know that there is map g from X to the pairs of vertices, which gives a usual forest. Consider the vector set {ae := zg1 (e) − zg2 (e) , e ∈ X}, where zv = (0, . . . , 0, 1, 0, . . . , 0) is the unit vertex correspinding to the vertex v. Since g gives the usual forest, these vectors are independent. Hence, generic vectors {be , e ∈ X} are also linear independent. We get that the edges are independent, contradiction.  By the induced subgraph on vertices V ′ ⊂ V , we assume a hypergraph (V ′ , E ′ ), where E ′ are all edges of E, which have vertices only from V ′ (i.e. e ∈ E ′ if e ⊂ V ′ ). This definition works well with colorings of hypergraphs, because if we want to color a hypergraph such a way that there are no monochromatic edges, then it is the same as splitting vertices into sets with empty induced subgraphs. Also this definition works well with standard sense of connectivity. Proposition 4.7. Let V1 and V2 be the subsets of vertices such that the induced subgraphs of H on Vj are strongly connected and V1 ∩ V2 6= ∅. Then the induced subgraph of H on V1 ∪ V2 is also strongly connected 18 G. NENASHEV Proof. For any vertex vi ∈ V we will consider the corresponding unit vector zvi = (0, . . . , 0, 1, 0, . . . , 0). Fix a vertex u, which lie in the intersection V1 ∩ V2 . Let H1 and H2 be induced subgraphs on V1 and V2 , resp. Consider vectors bi corresponding to ei ∈ E1 . We know that there is a spanning tree of the graph H1 , then the dimension of the linear space of such vectors is |V1 | − 1, furthermore any sum of coordinates of any vector is zero. Hence, for any v ∈ V1 , zv − zu ∈ span{bi : ei ∈ E1 }. Similarly we get the same for H2 and, hence, we have the same for H1 ∪ H2 . We get that for any v ∈ V1 ∪ V2 , zv − zu ∈ span{bi : ei ∈ E1 ∪ E2 }. Hence, the hypergraph H1 ∪ H2 has |V1 ∪ V2 | − 1 independent edges, then has a spanning tree. We have that the induced subgraph of H on vertices V1 ∪ V2 is strongly connected, since it has all edges from H1 ∪ H2 .  5. Algebras corresponding to spanning trees, Problems In this section we discuss analogous algebras counting spanning trees. T Recall the definition of algebras BG and CGT borrowed from [22]. Notation 5.1. Take an undirected graph G with n vertices. (I) Let ΦTG be the commutative algebra over Q K generated by {φe : e ∈ 2 G} with relations φe = 0, for any e ∈ G, and e∈H φe = 0, for any cut H ⊂ E(G). Fix a linear order of vertices of G. For i = 1, . . . , n, set X Xi = ci,e φe , e∈E(G) where ci,e as in Notation 1.1. Denote by CGT the subalgebra of ΦTG generated by X1 , . . . , Xn . (II) Consider the ideal JGT in the ring K[x1 , · · · , xn ] generated by p[n] = x1 + . . . + xn and by pTI = X i∈I xi ! DI , where I ranges over all nonempty proper subsets of vertices, and DI is the total number of edges between vertices in I and vertices outside I. T Define the algebra BG as the quotient K[x1 , . . . , xn ]/JGT . The case of disconnected graphs is not interesting, because both algebras are trivial. In the paper [22] the following result was proved: POSTNIKOV-SHAPIRO ALGEBRAS AND MATROIDS 19 T Theorem 5.1 (cf. [22]). For any connected graph G, algebras BG and T CG are isomorphic; their total dimension over K is equal to the number of spanning trees in G. Moreover, the dimension of the k-th graded component of these algebras equals the number of spanning trees of G with external activity e(G) − v(G) + 1 − k. Corollary 5.1. Given a connected graph G, the Hilbert series of the algebra CGT is given by   1 HCGT (t) = TG 1, · te(G)−v(G)+c(G) , t where c(G) is the number of connected components of G. 5.1. Algebras and matroids. For graph G, we define its bridge-free matroid as the usual graphical matroid of the graph G′ which is obtained from G after removing all its bridges. Proposition 5.2. For any pair of connected graphs G1 and G2 with T T isomorphic bridge-free matroids, their algebras BG and BG are iso1 2 morphic. Proof. Notice that, if we add an edge e and a vertex v to G, such that v is an endpoint of e and another endpoint of e is some vertex of G, then algebra BT does not change (this is obvious because e is a bridge, and hence, φe is one of the generators of the ideal). This operation doesn’t change bridge-free matroid. Therefore it is enough to prove Proposition 5.2 only for graphs with the same number of edges. Assume that |E(G1 )| = |E(G2 )|. In this case an isomorphism of bridge-free matroids is equivalent to an isomorphism of matroids of graphs G1 and G2 . In fact, in Lemma 2.1 we construct orientations G1 and G2 of graphs G1 and G2 on the same set of edges E(G1 ) = E(G2 ) (it was constructed for graphs differ in one Whitney’s deformation, so we can extend it to a sequence of deformations), such that they give the same graphical matroid on edges and with these orientations the algebras CGF 1 and CGF 2 coincide as subalgebras of ΦFGi (ΦFG1 and ΦFG2 are the same, because graphs have common set of edges). Let I be the ideal generated by the products of edges from the cuts of G1 in ΦFG1 . Because the variables on edges in G1 and G2 are the same and C is a cut in G1 if and only if C is a cut in G2 , then I is also the ideal generated by the cuts of G2 . Thus we have ΦTG1 = ΦFG1 /I, hence, CGT 1 = CGF 1 /I, similarly CGT 2 = CGF 2 /I. 20 G. NENASHEV It means that the algebras CGT 1 and CGT 2 are also the same in orientations G1 and G2 .  We formulate the following converse conjecture. T T Conjecture 1. Algebras BG and BG for the connected graphs G1 1 2 and G2 are isomorphic if and only if their bridge-free matroids are isomorphic. 5.2. t-labelled trees. It is possible to introduce similar algebras which Tt enumerate t-labelled trees, but it is not veryPexciting. Let BG be an DI algebra in which we change the generators ( i∈I xi ) of the ideal by P ( i∈I xi )tDI . The definition of CGTt will change in a more complicated way. However, there is no result about a reconstruction of the Tutte polynomial from the Hilbert series, because all trees have the same number of edges and then HBTt (x) = (1 + x)n−1 HBGT (xt ). In other words, the G Tt T and of BG contain the same information about the Hilbert series of BG graph. 5.3. Algebras for hypergraphs. The main problem is to construct T a family CbH of algebras, which count spanning trees of H. By paper [23], for a hypergraph H and a set of parameters C, we can F F . We can consider the as a quotient algebra, i.e, as BH(C) present CH(C) F T algebra BH(C) , which is obtained from BH(C) by changing the powers of the generators of the ideal (writing always one less). By paper [2] algeT bra BH(C) should count spanning trees of H. However at this moment, T we can not present ΦTH such that its generic subalgebra CH(C) counts spanning trees of H. Probably, we need to add to ΦFH relations corresponding to cuts, where a cut is a subset of edges such that without it H has no spanning trees. However, we need to prove it and if we want to do something similar to the proof of Theorem 5.1, then we need to define H-parking functions for a hypergraph. References [1] A. Abdesselam, The Grassmann-Berezin calculus and theorems of the matrixtree type, Advances in Applied Mathematics 33(1) (2004), pp. 51-70. [2] F. Ardila, A. Postnikov, Combinatorics and geometry of power ideals, Trans. Amer. Math. Soc., 362(8) (2010), pp. 4357-4384. [3] C. Berge, Hypergraphs, North-Holland Mathematical Library 45, 1989. [4] A. Berget, Products of linear forms and Tutte polynomials, European J. Combin. 31 no. 7 (2010), pp. 1924-1935. [5] T. Brylawski, J. Oxley, The Tutte polynomial and its applications, chapter in Matroid Applications, Encyclopedia of Mathematics and its Applications 40 (1992). POSTNIKOV-SHAPIRO ALGEBRAS AND MATROIDS 21 [6] Y. Burman, A. Ploskonosov, A. Trofimova, Matrix-tree theorems and discrete path integration, Linear Algebra and its Applications, 466 (2014), pp. 64-82. [7] A. Brandstadt, F. Dragan, V. Chepoi, V. Voloshin, Dually chordal graphs, SIAM Journal on Discrete Mathematics 11(3) (1998), pp. 437-455. [8] S. Chaiken, D. J. Kleitman, Matrix Tree Theorems, Journal of Combinatorial Theory, Series A 24 (1978), pp. 377-381. [9] D. Chebikin, P. Pylyavskyy, A family of bijections between G-parking functions and spanning trees, Journal of Combinatorial Theory, Series A 110 (2005), pp. 31-41. [10] D. Dhar, Self-organised critical state of the sandpile automaton models, Physical Review Letters 64 no. 14 (1990), 1613-1616. [11] S. Fomin, A. N. Kirillov, Quadratic algebras, Dunkl elements, and Schubert calculus, Advances in geometry, volume 172 of Progr. Math. (1999), pp. 147-182. [12] P. Hall, On Representatives of Subsets, J.London Math. Soc. 10(1) (1935), pp. 26-30. [13] O. Holtz, A. Ron, Zonotopal algebra, Advances in Mathematics, 227 (2011), pp. 847-894. [14] B. Huang, Monomization of Power Ideals and Generalized Parking Functions, https://math.mit.edu/research/highschool/primes/materials/2014/Huang.pdf. [15] T. Kálmán, A version of Tutte’s polynomial for hypergraphs, Advances in Mathematics 244 (2013), pp. 823-873. [16] G. Kirchhoff, Uber die Auflösung der Gleichungen, auf welche man bei der untersuchung der linearen verteilung galvanischer Ströme geführt wird, Ann. Phys. Chem. 72 (1847), pp. 497-508. [17] M. Lenz, Hierarchical Zonotopal Power Ideals, European Journal of Combinatorics 33 (2012), pp. 1120-1141. [18] R. I. Liu, On the commutative quotient of Fomin-Kirillov algebras, European Journal of Combinatorics Volume 54 (2016), pp. 65-75. [19] G. Nenashev, B. Shapiro, "K-theoretic" analog of Postnikov-Shapiro algebra distinguishes graphs, Journal of Combinatorial Theory, Series A, 148 (2017), pp. 316-332. [20] P. Orlik, H. Terao, Commutative algebras for arrangements, Nagoya Math. J. 134 (1994), pp. 65-73. [21] J. G. Oxley, Matroid theory, Oxford University Press, New York (1992). [22] A. Postnikov, B. Shapiro, Trees, parking functions, syzygies, and deformations of monomial ideals, Trans. Amer. Math. Soc. 356 (2004), pp. 3109-3142. [23] A. Postnikov, B. Shapiro, M. Shapiro, Algebra of curvature forms on homogeneous manifolds, AMS Trans. Ser 2, vol. 194 (1999), pp. 227-235. [24] B. Shapiro, M. Shapiro, On ring generated by Chern 2-forms on SLn /B, C. R. Acad. Sci. Paris Sér. I Math. 326(1) (1998), pp. 75-80. [25] A. Sokal, The multivariate Tutte polynomial (alias Potts model) for graphs and matroids, In Surveys in Combinatorics (2005), pp. 173-226. [26] W. T. Tutte, Graph Theory, Cambridge University Press (2001). [27] H. Whitney, 2-isomorphic graphs, American Journal of Mathematics 55 (1933), pp. 245-254. Department of Mathematics, Stockholm University, SE-106 91 Stockholm, Sweden, E-mail address: [email protected]
0math.AC
Efficient Black-Box Reductions for Separable Cost Sharing Tobias Harks∗ Martin Hoefer† Anja Huber‡ Manuel Surek§ Abstract arXiv:1802.10351v1 [cs.GT] 28 Feb 2018 In cost sharing games with delays, a set of agents jointly allocates a finite subset of resources. Each resource has a fixed cost that has to be shared by the players, and each agent has a nonshareable player-specific delay for each resource. A prominent example is uncapacitated facility location (UFL), where facilities need to be opened (at a shareable cost) and clients want to connect to opened facilities. Each client pays a cost share and his non-shareable physical connection cost. Given any profile of subsets allocated by the agents, a separable cost sharing protocol determines cost shares that satisfy budget balance on every resource and separability over the resources. Moreover, a separable protocol guarantees existence of pure Nash equilibria in the induced strategic game for the agents. In this paper, we study separable cost sharing protocols in several general combinatorial domains. We provide black-box reductions to reduce the design of a separable cost-sharing protocol to the design of an approximation algorithm for the underlying cost minimization problem. In this way, we obtain new separable cost-sharing protocols in games based on arbitrary playerspecific matroids, single-source connection games without delays, and connection games on nseries-parallel graphs with delays. All these reductions are efficiently computable – given an initial allocation profile, we obtain a cheaper profile and separable cost shares turning the profile into a pure Nash equilibrium. Hence, in these domains any approximation algorithm can be used to obtain a separable cost sharing protocol with a price of stability bounded by the approximation factor. ∗ Universität Augsburg, Institut für Mathematik, Germany. [email protected] Goethe University Frankfurt, Institute of Computer Science, Germany. [email protected] ‡ Universität Augsburg, Institut für Mathematik, Germany. [email protected] § Universität Augsburg, Institut für Mathematik, Germany. [email protected] † 1 1 Introduction Cost sharing is a fundamental task in networks with strategic agents and has attracted a large amount of interest in algorithmic game theory. Traditionally, cost sharing has been studied in a cooperative sense, i.e., in the form of cooperative games or mechanism design. Many of these approaches treat cost in a non-separable way and return a single, global cost share for each agent. In contrast, when agents jointly design a resource infrastructure in large networks, it is much more desirable to provide algorithms and protocols for separable cost sharing that specify which agent needs to pay how much to each resource. Here the natural approach are strategic cost sharing games with n players that allocate subsets of m resources. Each resource generates a cost depending on the subset of players allocating it. A protocol determines a cost share for each resource and each player using it. In addition to separability, there are further natural desiderata for such protocols, such as budget-balance (distribute exactly the arising cost of each resource) and existence of a pure Nash equilibrium (PNE), i.e., allow the resulting game to stabilize. Perhaps the most prominent such protocol is the fair-share protocol, in which the cost of each resource is allocated in equal shares to the players using it. This approach has been studied intensively (see our discussion below), but there are several significant drawbacks. It can be PLS-hard to find [50] a PNE, even in connection games on undirected networks. The price of stability (PoS), i.e., the total cost of the best Nash equilibrium compared to the cost of the optimal allocation, can be as large as Ω(log n) [5, 17], even though much better solutions can often be found in polynomial time. In this paper, we study a slight generalization of cost sharing games, where every resource has a shareable cost component and a non-shareable player-specific delay component. The shareable cost needs to be shared by the players using it, the non-shareable player-specific delay represents, e.g., a physical delay and is thus unavoidable. This setting arises in several relevant scenarios, such as uncapacitated facility location (UFL) [36]. Here players share the monetary cost of opened facilities but additionally experience delays measured by the distance to the closest open facility. Another important example appears in network design, where players jointly buy edges of a graph to connect their terminals. Besides the monetary cost for buying edges, each player experiences player-specific delays on the chosen paths. In such a distributed network environment, it is not clear a priori if an optimal solution can be stable – i.e., if the shareable costs can be distributed among the players in a separable way so that players do not want to deviate from it. This question leads directly to the design of protocols that distribute the costs in order to induce stable and good-quality solutions of the resulting strategic game. Our results are three polynomial-time black-box reductions for the price of stability of separable cost sharing protocols in combinatorial resource allocation problems. Our domains represent broad generalizations of UFL – arbitrary, player-specific matroids, single-source connection games without delays, and connection games on undirected n-series-parallel graphs with delays. In each of these domains, we take as input an arbitrary profile and efficiently turn it into a cheaper profile and a sharing of the shareable costs such that it is a Nash equilibrium. Our protocols are polynomial-time in several ways. Firstly, the games we study are succinctly represented. In matroids, we assume that strategies are represented implicitly via an independence oracle. For connection games on graphs, the strategies of each player are a set of paths, which is implicitly specified by terminal vertices of the player and the graph structure. The cost sharing protocol is represented by a strategy profile S and a sharing of the shareable costs arising in S on each resource. While in principle the protocol must specify a sharing of the costs for all of the other (possibly exponentially many) strategy profiles, one can do so implicitly by a simple lexicographic assignment rule. It guarantees that the profile S becomes a PNE. As such, starting from an arbitrary initial profile S ′ , we can give in polynomial time the Nash equilibrium profile S, the cost shares for S, and the assignment rule for cost shares in the other profiles. Hence, if S ′ is polynomial-time computable, then both protocol and Nash equilibrium S are both polynomial-time computable and polynomial-space representable. 2 1.1 Our Results We present several new polynomial-time black-box reductions for separable cost sharing protocols with small price of stability (PoS). We study three domains that represent broad generalizations of the uncapacitated facility location problem. In each domain, we devise an efficient black-box reduction that takes as input an arbitrary strategy profile and computes a new profile of lower cost together with a separable cost sharing protocol inducing the cheaper profile as a PNE. Thus, any polynomialtime α-approximation of the social cost can be turned into a separable cost sharing protocol with PoS at most α. Matroidal Set Systems. In Section 3 we provide a black-box reduction for matroidal set systems. Our results even apply to the broad class of subadditive cost functions that include fixed costs and discrete concave costs even with weighted players as a special case. Here we assume access to a value oracle for the subadditive cost function for each resource. Matroidal set systems with player-specific delays include uncapacitated facility location as a special case, since these correspond to matroid games, where each player has a uniform rank 1 matroid. For metric UFL, there is for instance a 1.488-approximation algorithm [44] using ideas of a previous 1.5-approximation algorithm [11]. This leads to a separable cost sharing protocol with PoS of 1.488. Also, the existing hardness results for UFL carry over to the design of separable cost sharing protocols, and for metric UFL there is a lower bound of 1.46 [31]. Connection Games with Fixed Costs. In Section 4 we consider cost sharing games on graphs, where the set systems correspond to paths connecting a player-specific source with a player-specific terminal. The underlying optimization problem is Steiner forest. For multi-terminal connection games without delays, we observe that a simple greedy algorithm for the underlying Steiner forest problem combined with the idea of Prim-Sharing [17] yields a separable protocol in polynomial time. Since the greedy algorithm has recently been shown to provide a constant-factor approximation [32], the protocol yields a constant PoS. For single-source multi-terminal connection games we again provide a polynomial-time black-box reduction. Our result improves significantly over the existing Prim-Sharing [17] with a price of stability of 2. We obtain separable protocols based on any approximation algorithm for Steiner tree, such as, e.g., the classic 1.55-approximation algorithm [48], or the celebrated recent 1.39-approximation algorithm [12]. Our black-box reduction continues to hold even for directed graphs, where we can use any algorithm for the Directed Steiner Tree problem [15], or games based on the (directed or undirected) Group Steiner Tree problem [16, 26]. Similarly, all lower bounds on approximation hardness translate to the price of stability of polynomial-time computable separable protocols. Connection Games with Delays. Finally, in Section 5 we study multi-terminal connection games with delays and fixed costs. For directed graphs, an optimal Steiner forest is not enforceable by a separable cost sharing protocol, even for two players [17]. Very recently, a similar result was shown even for two-player games on undirected graphs [34]. Thus, for general graphs, we cannot expect separable protocols with optimal or close-to-optimal equilibria, or (efficient) black-box reductions. We introduce a class of so-called n-series-parallel graphs, which allows to obtain a black-box reduction in polynomial time. The transformation directly implies that the n-series-parallel graphs always admit a separable cost sharing protocol inducing an optimal Steiner forest as an equilibrium. The reduction also applies to discrete-concave cost functions and player-specific delays, however, we do not know if polynomial running time is guaranteed. n-series-parallel graphs have treewidth at most 2, thus, for fixed edge costs and no delays, it is possible to compute efficiently even an optimal Steiner forest [7]. Hence, in this case we obtain a separable protocol with PoS of 1 in polynomial time. We finally demonstrate that the specific setting of n-series-parallel graphs is in 3 some sense necessary: Even for generalized series-parallel graphs we give a counterexample showing that a black-box reduction is impossible to achieve. 1.2 Preliminaries and Related Work Cooperative cost sharing games have been studied over the last decades for a variety of combinatorial optimization problems, such as minimum spanning tree [10], Steiner tree [29, 30, 45, 51], facility location [28], vertex cover [22], and many more. Cooperative cost sharing games have interesting implications for (group-)strategyproof cost sharing mechanisms [40, 41, 46, 47]. For Bayesian costsharing mechanisms there even exist efficient black-box reductions from algorithm to mechanism design [27]. A major difference to our work is that cooperative cost sharing is not separable. The most prominent example of a separable cost sharing protocol is the fair-share protocol, in which the cost of each resource is divided in equal shares among the players that allocate it. This protocol is also anonymous, and it implies that the resulting game is a congestion game [49]. It guarantees the smallest price of stability within a class of anonymous protocols [17]. The fair-share protocol has attracted a serious amount of research interest over the last decade [1, 5, 8, 33], especially the notorious open problem of a constant price of stability for connection games in undirected graphs [9, 23, 25, 42, 43]. However, as a significant drawback, outside of the domain of undirected connection games the price of stability is often as large as Ω(log n). Moreover, computing a PNE is PLS-hard, even for undirected connection games [50]. More general separable protocols have been studied mostly in terms of the price of anarchy, e.g., for scheduling (or matroid games) [6, 13, 19, 24, 52] or single-source network design with [20, 21] and without uncertainty [17]. The best result here is a price of anarchy (and stability) of 2 via PrimSharing [17], a protocol inspired by Prim’s MST algorithm. A protocol with logarithmic price of stability was shown for capacitated UFL games [36]. We note here that separable protocols with low PoS can be obtained using results for cost sharing games with so-called arbitrary sharing. In cost sharing games with arbitrary sharing, each agent i ∈ N specifies as strategy a set Si of allocated resources and a payment P pi,e for every resource e ∈ E. A resource e ∈ E is bought if the total P payments exceed the costs i pi,e ≥ ce (S). The private cost of player i is the sum of all payments e pi,e if all resources e ∈ Si are bought, and ∞ otherwise. Note that for games with fixed costs ce (S) = ce , one usually drops the explicit allocation Si from the strategy of a player. Instead, each player P i ∈ N simply specifies strategic payments pi,e for each e ∈ E. Then the private cost of player i is e pi,e if payments suffice to buy at least one feasible set in Si , and ∞ otherwise. The following proposition is an interesting, straightforward insight. It has been observed before in the special case of single-source connection games [17, Proposition 6.5]. Proposition 1. If for a cost sharing model, the non-cooperative game with arbitrary sharing has a pure Nash equilibrium, then there is a separable cost sharing protocol with the same pure Nash equilibrium. Proof. It is easy to see that in a PNE (S, p) for a game with arbitrary sharing, every player i ∈ N contributes only to resources from one feasible set Si ∈ Si . Moreover, the cost of every resource is exactly paid for. Finally, if a player i deviates to a different feasible set Si′ , then for each e ∈ Si′ \ Si she only needs to contribute the marginal costs that arise due to her presence. In particular, for fixed costs, she can use all resources bought by others for free. Hence, given a PNE (S, p) for the game with arbitrary sharing, we obtain a basic and separable protocol Ξ as follows. If in profile S ′ a resource e is allocated by the set Ne (S), then we assign ξe,i (S ′ ) = pi,e for every i ∈ Ne (S). For a profile S ′ , in which at least one other player i ∈ Ne (S ′ )\Ne (S) allocates e, we pick one of these players i, and she has to pay the full cost ξi,e (S ′ ) = ce (S ′ ). If players from a strict subset Ne (S ′ ) ⊂ Ne (S) allocate e in S ′ , we can use an arbitrary budget-balanced sharing 4 of ce (S ′ ). It is straightforward to verify that such a protocol is basic and separable, and the state S is a PNE. This implies existence of separable protocols with optimal PNE and price of stability 1 for a variety of classes of games, including matroid games with uniform discrete-concave costs [35], uncapacitated facility location with fixed [14] and discrete-concave costs [38], connection games (single-source [2, 37] and other classes [3, 4, 39]) with fixed costs, and more. However, the large majority of these results are inefficient, i.e., there is no polynomial-time algorithm that computes the required optimal equilibrium. Alternatively, one may resort to approximate equilibria in games with arbitrary sharing that are efficiently computable. The most prominent technique works via reducing costs by an additive value ε to ensure polynomial running time (put forward for single-source connection games in [2] and used in much of the follow-up work [3, 4, 14, 37]). This approach does not translate to separable protocols, since a player must eventually contribute to all resources. This is impossible for the model we consider here. 2 Separable Cost Sharing Protocols We are given a finite set N of players and a finite set E of resources. Each player i ∈ N is associated with a predefined family of subsets Si ⊆ 2E from which player i needs to pick at least one. The space of strategy profiles is denoted by S := ×i∈N Si . For S ∈ S we denote by Ne (S) = {i ∈ N : e ∈ Si } the set of players that allocate resource e. Every resource e ∈ E has a fixed cost ce ≥ 0, e ∈ E that is assumed to be shareable by the players. In addition to the shareable costs, there are player-specific constant costs di,e ≥P 0, i ∈ N, e ∈ E that are not shareable. If player i chooses subset Si , then the player-specific costsP e∈Si di,e must Pbe paid P completely by player i. The total cost of a profile S is defined as C(S) = e∈∪i∈N Si ce + i∈N e∈Si di,e . A cost sharing protocol Ξ assigns cost share functions ξi,e : S → R≥0 for all i ∈ N and e ∈ E and thus induces theP strategic game (N, S, ξ). For a player i, her total private cost of strategy Si in profile S is ξi (S) := e∈Si (ξi,e (S) + di,e ). We assume that every player picks a strategy in order to minimize her private cost. A prominent solution concept in non-cooperative game theory are pure Nash equilibria. Using standard notation in game theory, for a strategy profile S ∈ S we denote by (Si′ , S−i ) := (S1 , . . . , Si−1 , Si′ , Si+1 , . . . , Sn ) ∈ S the profile that arises if only player i deviates to strategy Si′ ∈ Si . A profile is a pure Nash equilibrium (PNE) if for all i ∈ N it holds ξi (S) ≤ ξi (Si′ , S−i ) for all Si′ ∈ Si . In order to be practically relevant, cost sharing protocols need to satisfy several desiderata. In this regard, separable cost sharing protocols are defined as follows [17]. Definition 2 (Cost Sharing Protocols and Enforceability). A cost sharing protocol Ξ is 1. stable if it induces only games that admit at least one pure Nash equilibrium. 2. budget balanced, if for all e ∈ E with Ne (S) 6= ∅ X ce = ξi,e (S) and ξi,e (S) = 0 for all i 6∈ Ne (S). i∈Ne (S) 3. separable if it is stable, budget-balanced and induces only games for which in any two profiles S, S ′ ∈ S for every resource e ∈ E, Ne (S) = Ne (S ′ ) ⇒ ξi,e (S) = ξi,e (S ′ ) for all i ∈ Ne (S). 5 4. polynomial time computable, if the cost sharing functions ξ can be computed in polynomial time in the encoding length of the cost sharing game. We say that a strategy profile S is enforceable, if there is a separable protocol inducing S as a pure Nash equilibrium. Separability means that for any two profiles S, S ′ the cost shares on e are the same if the set of players using e remains unchanged. Still, separable protocols can assign cost share functions that are specifically tailored to a given congestion model, for example based on an optimal profile. In this paper, we are additionally interested in polynomial-time computable protocols that we introduce here. 3 Matroid Games In this section, we consider matroid games. As usual in matroid theory, we will write Bi instead of Si , and B instead of S, when considering S matroid games. The tupel M = (N, E, B, (ce )e∈E , (di,e )e∈E,i∈N ) is called a matroid game if E = i∈N Ei , and each set system Bi ⊆ 2Ei forms the base set of some matroid Mi = (Ei , Bi ). While seemingly abstract, the class includes several prominent application domains, such as UFL games. In a UFL game, the resources are facilities (e.g. common transport hubs) and the players incur delay di,e in addition to their cost shares for opening used facilities. Every player i chooses exactly one resource, that is |Bi | = 1 for all Bi ∈ Bi and i ∈ N and hence Bi corresponds to a uniform matroid of rank one. Recall that every base B of a matroid Mi = (Ei , Bi ) has the same cardinality which we denote with rki (the rank of Mi ). In the following, instead of fixed costs on the resource, we allow for general subadditive cost functions ce : 2N → R+ , e ∈ E. ce is called subadditive, if it satisfies (1) ce (S) ≤ ce (T ) for all S ⊆ T ⊆ N , and (2) ce (S + {i}) ≤ ce (S) + ce ({i}) for all S ⊂ N, i ∈ N . Note that subadditive functions include fixed costs and discrete concave costs as a special case including the possibility of weighted demands as in weighted congestion games. Let us denote the cost of the cheapest alternative of player i to resource e for profile B ∈ B (cf (Bi + f − e, B−i ) + di,f ). Here we use the intuitive notation ce (B) := by ∆ei (B) := min f ∈E Bi +f −e∈Bi ce (Ne (B)). We recapitulate a characterization of enforceable strategy profiles obtained in [36].1 Lemma 3. A collection of bases B = (B1 , . . . , Bn ) is enforceable by a separable protocol if and only if the following two properties are satisfied. Note that (D1) implies that each summand ∆ei (B) − di,e in (D2) is nonnegative. di,e ≤ ∆ei (B) for all i ∈ N, e ∈ Bi X (∆ei (B) − di,e ) for all e ∈ E. ce (B) ≤ (D1) (D2) i∈Ne (B) Remark 4. The characterization was used in [36] to prove that an optimal collection of bases is enforceable. This implies a PoS of 1 for a separable cost sharing protocol that relies on the optimal profile. As such, the protocol is not efficiently computable (unless P = N P ). In the following, we devise a black-box reduction in Algorithm 1. It takes as input an arbitrary collection of bases B and transforms them in polynomial time into an enforceable set of bases B ′ of lower cost C(B ′ ) ≤ C(B). We define for each i ∈ N, e ∈ E a virtual cost value πie = ce ({i})+ di,e , and 1 The original characterization in [36] was proven for weighted players and load-dependent non-decreasing cost functions but the proof also works for subadditive cost functions. 6 Algorithm 1: Transforming any profile B into an enforceable profile B ′ Input: Congestion model (N, B, c, d) and profile B ∈ B Output: Enforceable profile B ′ with C(B ′ ) ≤ C(B). 1 2 Set B ′ ← B while there is e ∈ E that satisfies at least one of the following conditions: ¯ e (B ′ ) for some i ∈ Ne (B ′ ) di,e > ∆ (1) or i X  ¯ e (B ′ ) − di,e (2) do ∆ ce (B ′ ) > i i∈Ne (B ′ ) 3 4 5 6 7 8 9 10 if (1) holds true for some i ∈ Ne (B ′ ) then Let fi ∈ arg min πif Update f ∈E Bi′ +f −e∈Bi Bi′ ← Bi′ + fi − e else if (2) holds true then while (2) holds true on e do ¯ e (B ′ ) Pick i ∈ Ne (B ′ ) with πei > ∆ i Let fi ∈ arg min πif Update f ∈E Bi′ +f −e∈Bi Bi′ ← Bi′ + fi − e ¯ e (B) = min for each B ∈ B, i ∈ N, e ∈ E a virtual deviation cost ∆ i f ∈E Bi +f −e∈Bi πif . The algorithm now iteratively checks whether (D1) and (D2) from Lemma 3 hold true (in fact it checks this condition for smaller values on the right hand side given by the virtual values), and if not, exchanges one element of some player. We show that the algorithm terminates with an enforceable profile after polynomially many steps. Theorem 5. Let B be a strategy profile for a matroid congestion model with subadditive costs. There is an enforceable strategy B ′ with C(B ′ ) ≤ C(B) that can be computed in at most n·m·rk(B) iterations of the while-loop in Algorithm 1, where rk(B) = maxi∈N rki . ¯ e (B) ≤ Proof. First, observe that if (D1) and (D2) from Lemma 3 hold true for smaller values 0 ≤ ∆ i ∆ei (B), i ∈ N, e ∈ E, then the profile B is also enforceable. Hence, if the algorithm terminates, the resulting strategy profile B ′ will be enforceable. To show 8. By subadditivity P that the algorithm ′ is well-defined, we only′ need Pto check ¯Line e ′ we get i∈Ne (B ′ ) ce ({i}) ≥ ce (B ). Thus, whenever ce (B ) > i∈Ne (B ′ ) ∆i (B ) − di,e , there is an ¯ e (B ′ ). i ∈ Ne (B ′ ) with ce ({i}) + di,e > ∆ i It is left to bound the running time. For this we consider player i and the matroid bases Bi . We interpret a basis Bi ∈ Bi as distributing exactly rki unit sized packets over the resources in E. This way, we can interpret the algorithm as iteratively moving packets away from those resources e ∈ E for which either (1) or (2) holds true. We give each packet a unique ID ik , k = 1, . . . , rki . For Bi ∈ Bi , let eik denote the resource on which packet ik is located. We now analyze the two types of packet movements during the execution of the algorithm. For a packet movement executed in Line 5 of ¯ e (B ′ ), thus, when packet ik located on e = ei is moved to fi , it holds Algorithm 1, we have di,e > ∆ i k eik ¯ e (B ′ ) = π fi . For packet movements executed in Line 10, then by the choice that πi = πie ≥ di,e > ∆ i i ei ¯ e (B ′ ) = π fi . of player i ∈ Ne (B ′ ) (see Line 8) for the corresponding packet ik it holds πi k = πie > ∆ i i In both cases we obtain πie > πifi . Hence, every movement of a single packet ik is in strictly decreasing 7 order of virtual value of the resource. Note that the virtual cost value πie does not depend on the profile B. Thus, there are at most m different virtual cost values that a packet ik of player i can experience, and thus packet ik can move at most m −P 1 times. The following is an upper bound on the total number of packet movements for all players i∈N rki ·(m − 1) ≤ n · m · rk(B). It is left to argue that the final output B ′ has lower cost. We prove this inductively by the different types of packet movements. Consider first a packet movement of type (1). Let B and B ′ be the profiles before and after packet ik has been moved from e to fi , respectively. We obtain C(B ′ ) − C(B) = (cfi (B ′ ) − cfi (B) + di,fi ) − (ce (B) − ce (B ′ ) + di,e ) ≤ cfi ({i}) + di,fi − (ce (B) − ce (B ′ ) + di,e ) ¯ ei (B) − di,e + (ce (B ′ ) − ce (B)) =∆ ¯ e (B) − di,e ≤∆ i < 0. The first inequality follows from subadditivity, the second inequality from monotonicity of costs ce . The last strict inequality follows from assumption (1). Now consider packet movements of type (2). We treat all movements occurring in one run of the while loop in Line 7. Let B denote the profile before and B ′ after all these movements. Let Te (B) ⊆ Ne (B) denote S the set of those players whose packet ik on e is moved to fi during the while loop. Let Fe (B) = i∈Te (B) {fi } and for i ∈ Te (B) define Tfi (B) = {j ∈ Te (B) | fj = fi }. We derive some useful observations. Before entering the while loop, it holds     X  X X  ¯ ei (B) − di,e = ¯ ei (B) − di,e + ¯ ei (B) − di,e . (3) ce (B) > ∆ ∆ ∆ i∈Ne (B) i∈Ne (B)\Te (B) Moreover, after exiting the while loop it holds X ce (B ′ ) ≤ i∈Te (B)   ¯ e (B) − di,e . ∆ (4) i i∈Ne (B)\Te (B) Thus, combining (3) and (4) we get ce (B) − ce (B ′ ) >  X  ¯ ei (B) − di,e . ∆ (5) i∈Te (B) Putting everything together, we obtain   X X X  cfi (B ′ ) − cfi (B) + di,fi − ce (B) − ce (B ′ ) + di,e C(B ′ ) − C(B) = fi ∈Fe (B) ≤ X i∈Te (B) X cfi ({j}) + fi ∈Fe (B) j∈Tfi (B) = X i∈Te (B) X i∈Te (B)  di,fi − ce (B) − ce (B ′ ) + i∈Te (B)  ¯ e (B) − ce (B) − ce (B ′ ) + ∆ i X i∈Te (B) X i∈Te (B) di,e  < di,e  0, where the first inequality follows from subadditivity and the last inequality follows from (5). 4 Connection Games without Delays In this section, we study connection games in an undirected graph G = (V, E) with a common source vertex s ∈ V . Every player i wants to connect a player-specific terminal node ti ∈ V to s. Consequently, every strategy Pi of player i is an (s, ti )-path in G. We denote the set of paths for player i by Pi and the set of profiles by P. 8 Note that when each edge cost contains a player-specific delay component di,e , we can take any multi-source multi-terminal connection game and introduce a new auxiliary source vertex s. Then connect s to each si with an auxiliary edge ei , which has cost di,ei = 0 and dj,ei = M , for some prohibitively large constant M . Now in any equilibrium and any optimal state of the resulting game, player i will choose an (s, ti )-path which begins with edge ei . Moreover, ei does not generate additional cost for player i. As such, the optimal solutions, the Nash equilibria, and their total costs correspond exactly to the ones of the original multi-source multi-terminal game. Hence, in games with non-shareable player-specific delays, the assumption of a common source is without loss of generality and existing lower bounds on the price of stability apply [17, 34]. In this section, we instead focus on connection games with fixed shareable costs ce ≥ 0 and no player-specific delays di,e = 0, for all players i and all edges e ∈ E. For the general multi-terminal multi-source case with such costs, it is straightforward to observe that the greedy algorithm analyzed by Gupta and Kumar [32] can be turned into a separable protocol via the Prim-Sharing idea [17]. This implies that we can obtain separable cost sharing protocols with a constant price of stability in polynomial time. Proposition 6. For every connection game in undirected graphs with fixed costs, there is an enforceable profile that can be computed in polynomial time and yields a separable cost sharing protocol with constant price of stability. For single-source games with fixed costs, existing results for cost sharing games with arbitrary sharing imply that an optimal profile is always enforceable [2, 17]. We here provide a significantly stronger result for polynomial-time computation of cheap enforceable profiles. Theorem 7. Let P be a strategy profile for a single-source connection game with fixed costs. There is an enforceable strategy P ′ with C(P ′ ) ≤ C(P ) that can be computed by Algorithm 2 in polynomial time. It is straightforward that for fixed costs we can transform each profile P into a cheaper tree profile P̂ , in which the union of player paths constitute a tree T . Over the course of the algorithm, we adjust this tree and construct a cost sharing for it in a bottom-up fashion. The approach has similarities to an approach for obtaining approximate equilibria for single-source cost sharing games with arbitrary sharing [2]. However, our algorithm exploits crucial properties of separable protocols, thereby providing an exact Nash equilibrium and polynomial running time. When designing a separable protocol based on a state P̂ , we can always assume that when a player i deviates unilaterally to one or more edges e ∈ G \ P̂i , she needs to pay all of ce . As such, player i always picks a collection of shortest paths with respect to ce between pairs of nodes on her current path P̂i . All these paths in G are concisely represented in the algorithm as “auxiliary edges”. The algorithm initially sets up an auxiliary graph Ĝ given by T and the set of auxiliary edges based on P̂ . It adjusts the tree T by removing edges of T and adding auxiliary edges in a structured fashion. We first show in the following lemma that this adjustment procedure improves the total cost of the tree, and that the final tree T̂ is enforceable in Ĝ. In the corresponding cost sharing, every auxiliary edge contained in T̂ is completely paid for by a single player that uses it. In the subsequent proof of the theorem, we only need to show that for the auxiliary edges in T̂ , the edge costs of the corresponding shortest paths in G can be assigned to the players such that we obtain a Nash equilibrium in G. The proof shows that the profile P ′ evolving in this way is enforceable in G and only cheaper than P . Lemma 8. Algorithm 2 computes a cost sharing of a feasible tree T̂ in the graph Ĝ. The total cost C(T̂ ) ≤ C(T ), every auxiliary edge in T̂ is paid for by a single player, and the corresponding profile P̂ is enforceable in Ĝ. 9 Algorithm 2: Transforming any profile P into an enforceable profile P ′ Input: Connection game (N, G, (t1 , . . . , tn ), s, c) and profile P ∈ P Output: Enforceable profile P ′ with C(P ′ ) ≤ C(P ). S 1 Transform P into a tree profile P̂ and let T ← i P̂i 2 ĉe (i) ← 0, for all e ∈ T, i ∈ N 3 Insert T into empty graph G′ , root T in s, number vertices of T in BFS order from s 4 foreach i ∈ N and each vk , vk ′ ∈ P̂i with k > k ′ do 5 Add to Ĝ an auxiliary edge e = (vk , vk′ ) in G from vk to vk′ 6 P (vk , vk′ ) ← shortest path P 7 For all j ∈ N , set ĉe (j) ← f ∈P (vk ,v ′ ) cf k 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 Label every e ∈ T as “open” foreach open e ∈ T in bottom-up order do ĉe (i) ← ce , for all i ∈ Ne (P̂ ) Pd (i) ← P in Ĝ for edge costs ĉe (i) Pshortest (s, ti )-path ∆ei ← e′ ∈Pd (i) ĉe′ (i) − e′ ∈P̂i ,e′ 6=e ĉe′ (i) P if ce ≤ i∈Ne (P̂ ) ∆ei then P For all i ∈ Ne (P̂ ), assign ĉe (i) ∈ [0, ∆ei ] such that i∈Ne (P̂ ) ĉe (i) = ce Label e as “closed” else D ← set of highest deviation vertices PT (e, v) ← path between higher node of e and v in T Remove all paths PT (e, v) from T and Ĝ foreach v ∈ D do Pick one auxiliary edge e′ ∈ Pd (i), for some i ∈ Ne (P̂ ), such that e′ = (v, u) with u a node above e in T , and add e′ to T P̂i ← Pd (i) foreach player j 6= i with tj below v in T do P̂j ← (P̂j from tj to v) ∪ (Pd (i) from v to s) ĉe′ (j) ← 0 Label e′ as “closed” For every i ∈ N , compute Pi′ by replacing in P̂i every auxiliary edge e = (u, v) by the corresponding shortest path P (u, v) in G Proof. After building Ĝ, the algorithm considers T rooted in the source s. Initially, all edges of T are assumed to have zero cost for all players. All edges of T are labelled “open”. Our proof works by induction. We assume that players are happy with their strategies P̂i if all open edges of T have cost 0, all open edges outside T have cost ĉe for every player, and the closed edges e ∈ T are shared as determined by ĉe . The algorithm proceeds in a bottom-up fashion. In an iteration, it restores the cost of an open edge e to its original value. It then considers how much each player i ∈ Ne (P̂ ) is willing to contribute to e. The maximum contribution ∆ei is given by the difference in the cheapest costs to buy an (s, ti )path for i when (1) e has cost 0 and (2) e has cost ce . By induction, for case (1) we can assume that i is happy with P̂i when e has cost 0. In case (2), suppose i deviates from (parts of) his current path P̂i and buys auxiliary edges. 10 Since by induction i is happy with P̂i when e has cost 0, there is no incentive to deviate from P̂i between two vertices of P̂i below e. Moreover, clearly, there is no incentive to deviate from P̂i between two vertices above e (since edges of T above e are assumed to have zero cost). Hence, if in case (2) the path Pd (i) includes e, then Pd (i) = P̂i , so ∆ei = ce . Otherwise, player i finds a path that avoids e. By the observations so far, Pd (i) can be assumed to follow P̂i from ti up to a vertex v, then picks a single auxiliary edge (v, u) to node u above e, and then follows P̂i to s. We call the vertex v the deviation vertex of Pd (i). Based on Pd (i), the algorithm computes a maximum contribution ∆ei for each player i ∈ Ne (P̂ ), which i is willing to pay for edge e currently under consideration. If in total these contributions suffice to pay for e, then we determine an arbitrary cost sharing of ce such that each player i ∈ Ne pays at most ∆ei . Thereby, every player i ∈ Ne (P̂ ) remains happy with his path P̂i , and the inductive assumptions used above remain true. We can label e as closed and proceed to work on the next open edge in the tree T . Otherwise, if the contributions ∆ei do not suffice to pay for ce , then for every i ∈ Ne (P̂ ) the path Pd (i) avoids e and contains a deviation vertex. The algorithm needs to drop e and change the strategy of every such player. It considers the “highest” subset D of deviation vertices, i.e., the unique subset such that D contains exactly one deviation vertex above each terminal ti . The algorithm removes all edges from T that lie below and including e and above any v ∈ D. For each v ∈ D, it then adds one auxiliary edge from the corresponding Pd (i) to T . As observed above, these edges connect v to some node u above e, and thereby yield a new feasible tree T in Ĝ. Since Pd (i) is a best response for player i, we assign i to pay for the cost of the auxiliary edge. After this update, i is clearly happy with P̂i . Moreover, every other player j ∈ Ne (P̂ ) that now uses the auxiliary edge paid by player i is happy with his new strategy P̂j . The auxiliary edge has cost zero for player j, and the path from ti to the deviation vertex v has not changed. By induction j was happy with this path after we finished paying for the last edge below v. Thus, we can label all auxiliary edges added to T as closed and proceed to work on the next open edge in the tree T . By induction, this proves that the algorithm computes a cost sharing that induces a separable protocol with the final tree T ′ being a Nash equilibrium in Ĝ. Moreover, if we change the tree during the iteration for edge e, it is straightforward to verify that the total cost of the tree strictly decreases. Proof of Theorem 7. The previous lemma shows that the algorithm computes a cost sharing of a tree T̂ in Ĝ, such that every player is happy with the path P̂i and every auxiliary edge in T̂ is paid for completely by a single player. We now transform P̂ into P ′ by replacing each auxiliary edge e = (u, v) ∈ P̂i by the corresponding shortest path P (u, v) in G. We denote by Ei the set of edges introduced in the shortest paths for auxiliary edges in P̂i . For the total cost of the resulting profile we have that C(P ′ ) ≤ C(P̂ ) ≤ C(P ), since the sets Ei can overlap with each other or the non-auxiliary edges of T̂ . We show that P ′ is enforceable by transforming the cost sharing constructed in function ĉ into separable cost sharing functions as follows. Initially, set ξi,e (P ′ ) = 0 for all e ∈ E and i ∈ N . Then, for each non-auxiliary edge e ∈ T̂ we assign ξi,e (P ′ ) = ĉe (i) if e ∈ P̂i and ξi,e (P ′ ) = 0 otherwise. Finally, number players arbitrarily P from 1 to n and proceed in that order. For player i, consider the edges in Ei . For every e ∈ Ei , if j<i ξj,e (P ′ ) = 0, then set ξi,e (P ′ ) = ce . This yields a budget-balanced assignment for state P ′ . As usual, if a player i deviates in P ′ from ′ Pi to Pi′′ , we can assume player i is assigned to pay the full cost ce for every edge e ∈ Pi′′ \ Pi′ . To show that there is no profitable deviation from P ′ , we first consider a thought experiment, where every edge in Ei comes as a separate edge bought by player i. Then, clearly P ′ is enforceable – the cost of Pi′ with ξ is exactly the same as the cost of P̂ with ĉ in Ĝ. Moreover, any deviation Pi′′ can be interpreted as an (s, ti )-path in Ĝ by replacing all subpaths consisting of non-auxiliary edges in P ′′ by the corresponding auxiliary edge of Ĝ. As such, the cost of Pi′′ is exactly the same as the cost 11 of the corresponding deviation in Ĝ. Now, there is not a separate copy for every edge in Ei . The set Ei can overlap with other sets Ej and/or non-auxiliary edges. Then player i might not need to pay the full cost on some e ∈ Ei . Note, however, every edge for which player i pays less than ce is present in Pi′ as well. Hence, Pi′′ cannot improve over Pi′ due to this property. The result continues to hold for various generalizations. For example, we can immediately apply the arguments in directed graphs, where every player i seeks to establish a directed path between ti and s. Moreover, the proof can also be applied readily for a group-connection game, where each player wants to establish a directed path to s from at least one node of a set Vi ⊂ V . For this game, we simply add a separate super-terminal ti for every player i and draw a directed edge of cost 0 from ti to every node in Vi . Corollary 9. Let P be a strategy profile for a single-source group-connection game in directed graphs with fixed costs. There is an enforceable profile P ′ with C(P ′ ) ≤ C(P ) that can be computed by Algorithm 2 in polynomial time. 5 Connection Games and Graph Structure In this section, we consider connection games played in undirected graphs G = (V, E) with playerspecific source-terminal pairs. Each player i ∈ N has a source-terminal-pair (si , ti ). Note that we can assume w.l.o.g. that (G, (s1 , t1 ), . . . , (sn , tn )) is irredundant, meaning that each edge and each vertex of G is contained in at least one (si , ti )-path for some player i ∈ N (nodes and edges which are not used by any player can easily be recognized (and then deleted) by Algorithm Irredundant at the end of the section; adapted from Algorithm 1 in [18]). Harks et al. [34] characterized enforceability for the special case with di,e = 0 for all i ∈ N, e ∈ E via an LP. We can directly adapt this characterization as follows: X LP(P ) max ξi,e i∈N,e∈Pi X s.t.: ξi,e ≤ ce ∀e ∈ E with Ne (P ) 6= ∅ i∈Ne (P ) X (ξi,e + di,e ) ≤ e∈Pi \Pi′ X (ce + di,e ) ∀Pi′ ∈ Pi ∀i ∈ N (NE) e∈Pi′ \Pi ξi,e ≥ 0 ∀e ∈ Pi ∀i ∈ N Theorem 10. The strategy profile P = (P1 , . . . , Pn ) is enforceable if and only if there is an optimal solution (ξi,e )i∈N,e∈Pi for LP(P ) with X ξi,e = ce ∀e ∈ E with Ne (P ) 6= ∅. (BB) i∈Ne (P ) Given an optimal solution (ξi,e )i∈N,e∈Pi for LP(P ) with the property (BB), the profile P becomes a PNE in the game induced by ξ, which assigns for each i ∈ N and e ∈ E and each strategy profile P ′ = (P1′ , . . . , Pn′ ) the following cost shares (these cost shares resemble those introduced in [52]):   ξi,e , if i ∈ Se (P ′ ) = Se (P ),    c , if i ∈ (S (P ′ ) \ S (P )) and i = min(S (P ′ ) \ S (P )), e e e e e ξi,e (P ′ ) = ′ ′  ce , if i ∈ Se (P ) ( Se (P ) and i = min Se (P ),    0, else. 12 We now introduce a subclass of generalized series-parallel graphs for which we design a polynomial time black-box reduction that computes, for a given strategy profile P , an enforceable strategy profile with smaller cost. Definition 11 (n-series-parallel graph). An irredundant graph (G, (s1 , t1 ), . . . , (sn , tn )) is n-seriesparallel if, for all i ∈ N , the subgraph Gi (induced by Pi ) is created by a sequence of series and/or parallel operations starting from the edge si − ti . For an edge e = u − v, a series operation replaces it by a new vertex w and two edges u − w, w − v; A parallel operation adds to e = u − v a parallel edge e′ = u − v. The following theorem summarizes our results for n-series-parallel graphs. Theorem 12. If (G, (s1 , t1 ), . . . , (sn , tn )) is n-series-parallel, the following holds: (1) Given an arbitrary strategy profile P , an enforceable strategy profile P ′ with cost C(P ′ ) ≤ C(P ), and corresponding cost share functions ξ, can be computed in polynomial time. (2) For all cost functions c, d, every optimal strategy profile of (G, (s1 , t1 ), . . . , (sn , tn ), c, d) is enforceable. (3) For all edge costs c, an optimal Steiner forest of (G, (s1 , t1 ), . . . , (sn , tn ), c) can be computed in polynomial time. To prove Theorem 12, we need to introduce some notation. Let (ξi,e )i∈N,e∈Pi be an optimal solution for LP(P ). For i ∈ N and P f ∈ Pi , we consider allPpaths Pi′ ∈ Pi with f ∈ / Pi′ , Pi ∪ Pi′ ′ contains a unique cycle C(Pi ) and e∈Pi′ \Pi (ce + di,e ). Among all these e∈Pi \Pi′ (ξi,e + di,e ) = ′ paths, choose one for which the number of edges in C(Pi ) ∩ Pi is minimal. The corresponding path Ai,f := C(Pi′ ) ∩ Pi′ is called a smallest tight alternative of player i for f . If we say that player i substitutes f by using Ai,f , we mean that the current path Pi of player i is changed by using Ai,f instead of the subpath C(Pi′ ) ∩ Pi (which contains f ). Figure 1 illustrates the described concepts. Note that Ai,f is also smallest in the sense that every other (tight) alternative for f substitutes a superset of the edges substituted by Ai,f . We are now able to prove Theorem 12. Proof of Theorem 12. We first describe how to compute, given an arbitrary strategy profile P = (P1 , . . . , Pn ), an enforceable strategy profile with cost at most C(P ). Assume that P is not enforceable (otherwise there is nothing to do). Let (ξi,e )i∈N,e∈Pi be an optimal solution for LP(P ). In the following, we denote the variables (ξi,e )i∈N,e∈Pi as cost shares, although they do not correspond to a budget-balanced cost sharing protocol (since PP is not enforceable). There is at least one edge f which is not completely paid, i.e. for which i∈Nf (P ) ξi,f < cf holds. The optimality of the cost shares (ξi,e )i∈N,e∈Pi for LP(P ) implies that each player i ∈ Nf (P ), i.e. each user of f , has an alternative path Pi′ with f ∈ / Pi′ , for which equality holds in the corresponding LP(P )-inequality (otherwise increasing ξi,f by a small amount, while all other cost shares remain unchanged, would yield a feasible LP-solution with higher objective function value). Using the notation introduced above, each user i of f has a smallest tight alternative Ai,f for f . Furthermore, if Pi contains more than one edge which is not completely paid, there is a combination of smallest tight alternatives so that all edges which are not completely paid are substituted (see Figure 2, where f, g, h are not completely paid and we substitute all these edges by combining Ai,g and Ai,h ). We now consider the strategy profile P ′ = (P1′ , . . . , Pn′ ) which results from P if all players with unpaid edges in their paths substitute all these edges by a combination of smallest tight alternatives. 13 si ti f (a) Example for Pi (thick) and all alternative paths with tight inequality in LP(P ). si ti f (b) Dashed path Pi′ with f ∈ / Pi′ , with f ∈ / Pi′ , but no unique cycle with Pi . si ti f (c) Dashed path Pi′ unique cycle C(Pi′ ) with Pi , but not smallest for f . Ai,f f si ti (d) Substituting f by using smallest tight alternative Ai,f . Figure 1: Illustration of the introduced concepts. si g f h ti Figure 2: Illustration of combining smallest tight alternatives. Furthermore we define cost shares (again not necessarily budget-balanced) for P ′ as follows: For each player i and each edge e ∈ Pi′ : ( ξi,e , for e ∈ Pi′ ∩ Pi , ξi,e (P ′ ) = ce , for e ∈ Pi′ \ Pi . Note that the private cost of player i under P P equals the private cost of i under P ′ since the players use tight alternatives. Furthermore note that i∈Ne (P ′ ) ξi,e (P ′ ) > ce is possible (for example if there are two players which did not use it in P ′ and P use an edge ′e with ce > 0 in their paths under P , but ′ therefore both pay ce ). If i∈Ne (P ′ ) ξi,e (P ) ≥ ce holds for all edges e with Ne (P ) 6= ∅, we found a strategy profile with the desired properties: P ′ is cheaper than P since X XX C(P ) = ce + di,e e∈E:Ne (P )6=∅ > XX i∈N e∈Pi (ξi,e + di,e ) i∈N e∈Pi = XX ξi,e (P ′ ) + di,e i∈N e∈Pi′ = X X  ξi,e (P ′ ) + e∈E:Ne (P ′ )6=∅ i∈Ne (P ′ ) ≥ X e∈E:Ne (P ′ )6=∅ ce + XX i∈N e∈Pi′ 14 XX i∈N e∈Pi′ di,e = C(P ′ ). di,e The strict inequality holds since P is not enforceable, the following equality because the private costs remain unchanged, and the last inequality because of our assumption above. Furthermore, P ′ is enforceable since the cost shares (ξi,e (P ′ ))i∈N,e∈Pi′ induce a feasible solution of LP(P ′ ) with (BB) if we decrease the cost shares for overpaid edges arbitrarily until P we reach budget-balance. Thus assume that there is at least one edge f for which i∈Nf (P ′ ) ξi,f (P ′ ) < cf holds. First note, for each player i ∈ Nf (P ′ ), that f ∈ Pi has to hold, since all edges in Pi′ \ Pi are completely paid (player i pays ce for e ∈ Pi′ \ Pi ). As we will show below, all i ∈ Nf (P ′ ) have a smallest tight alternative Ai,f for f . We can therefore again update the strategy profile (resulting in P ′′ ) by letting all players deviate from all nonpaid edges using a combination of smallest tight alternatives. Figure 3 illustrates this second phase of deviation, where the edges r and s are now not completely paid. Note that Ai,r is not unique in this example, and to use Ai,s , we need to deviate from Ai,h (which player i uses in Pi′ ). si r s h ti si r s h ti Figure 3: Illustration for the second phase of deviation. The cost shares are again adapted, that means for each player i and each edge e ∈ Pi′′ : ( ξi,e , for e ∈ Pi′′ ∩ Pi , ξi,e (P ′′ ) = ce , for e ∈ Pi′′ \ Pi . It is clear that the private costs of the players again remain unchanged and therefore, if all edges are now completely paid, the cost of P ′′ is smaller than the cost of P and P ′′ is enforceable. We now show that the tight alternatives used in the second phase of deviation exist. Assume, by contradiction, that there is a player j, an edge f ∈ Pj′ which is not completely paid according to P ′ , and player j has no tight alternative for f . Now recall that, whenever an edge f is not completely paid in P ′ , all users i ∈ Nf (P ′ ) already used f in P and therefore ξi,f (P ′ ) = ξi,f holds for all i ∈ Nf (P ′ ) ⊆ Nf (P ). Furthermore f was completely paid according to the cost shares of P since we substituted all unpaid edges in the first phase of deviation from P to P ′ . We get X X X X ξi,f + ξi,f = cf > ξi,f (P ′ ) = ξi,f , i∈Nf (P ′ ) i∈Nf (P )\Nf (P ′ ) i∈Nf (P ′ ) i∈Nf (P ′ ) thus there has to be at least one player k which used f in Pk , but not in Pk′ , and with ξk,f > 0. Let Ak,g be the smallest tight alternative that player k used (to substitute the edge g which was not completely paid in P ), and also substituted f . The situation is illustrated in Figure 4. We now show that the LP(P )-solution cannot be optimal. Since player j has no tight alternative for f , increasing ξj,f by some suitably small amount, and decreasing ξk,f by the same amount, yields a feasible LP(P )-solution. But now player k has no tight alternative for g anymore, since all tight alternatives for g also substitute f . Therefore we can increase ξk,g by some small amount, leading to a feasible LP(P )-solution with higher objective function value, contradiction. Thus we showed that the tight alternatives used in the second phase of deviation exist. 15 g sk f sj tk tj (a) Illustration of the paths Pj and Pk (given by the thick edges). Ak,g g sk f sj tk tj (b) Situation after the first phase of deviation (player k used Ak,g ). Figure 4: Illustration for the proof that tight alternatives exist. As already mentioned above, if all edges in P ′′ are completely paid, P ′′ is enforceable and cheaper than P and we are finished. Thus we again assume that there is at least one edge which is not completely paid. Analogously as for P ′ we can show that, for each such edge f and each player i ∈ Nf (P ′′ ), f ∈ Pi has to hold. Furthermore all users of a nonpaid edge have a tight alternative for this edge (the proof that this holds is a little bit more complicated as above, we possibly need to involve three players now): Assume that a player i does not have a tight alternative for an edge f ∈ Pi which is not completely paid according to P ′′ , but was completely paid before (i.e. according to P ′ and also according to P ). Thus there has to be a player j ∈ Nf (P ) with ξj,f > 0 who deviated from f by using Aj,g in some phase before. If player j did this in the first phase of deviation, the edge g was not completely paid according to P and we can change the LP(P )-solution as described above to get a contradiction. If the deviation happened in the second phase, the edge g was completely paid according to P . Thus there has to be a third player k (but k = i possible) with ξk,g > 0 which used some Ak,h in the first phase of deviation that also substituted g. We are now able to change the cost shares of P to get a contradiction: First, player i increases ξi,f , while player j decreases ξj,f . Now player j increases ξj,g , while player k decreases ξk,g . Finally player k increases ξk,h . By suitably small changes, we get a feasible solution for LP(P ) with higher objective function value than the original optimal cost shares; contradiction. Therefore, in a third phase of deviation, all players with nonpaid edges deviate from all those edges by a combination of smallest tight alternatives. If we proceed in this manner, we finally have to reach a strategy profile for which all edges are completely paid (and thus it is enforceable and cheaper than the profile P ): In each phase of deviation, at least one edge is substituted by all players which use this edge in P . Furthermore, players never return to substituted edges. Therefore, after at most |P | phases of deviation, we reach a strategy profile with the desired property (where |P | denotes the number of edges in the union of the paths P1 , . . . , Pn ). The existence of the needed tight alternatives in the kth phase of deviation can be shown as follows: Assume that P (k) is the current strategy profile, f an edge which is not completely paid according to P (k) , and there is a player i which uses an edge f , but has no tight alternative for it. Then there has to be a player j with ξj,f > 0 who deviated from f in some phase ℓ ≤ k − 1 by using Aj,g , where g was not completely paid in the corresponding strategy profile P (ℓ) . If ℓ = 1 holds, we can decrease ξj,f and increase ξi,f , ξj,g ; contradiction. For ℓ ≥ 2, the edge g was completely paid in P and therefore, there has to be a player p with ξp,g > 0 which substituted g in some phase ≤ ℓ − 1 by using Ap,h , and so on. This yields a sequence of players and edges (i, f ), (j, g), (p, h), . . . , (q, s), where the edge s was not completely paid according to P . We can now change the cost shares along this sequence (as described above for the third phase of deviation) to 16 get a contradiction. Algorithm n-SePa summarizes the described procedure for computing an enforceable strategy profile P ′ with cost C(P ′ ) ≤ C(P ) and corresponding cost share functions ξ. To complete the proof of the first statement of Theorem 12, it remains to show that P ′ and ξ can be computed in polynomial time, i.e. Algorithm n-SePa has polynomial running time. As a first step, we show how to compute an optimal solution for LP(P ) in polynomial time. To this end we show that, for every player i, we do not need to consider all paths Pi′ ∈ Pi in (NE) of LP(P ), which can be exponentially many paths, but only a set of alternatives Ai of polynomial cardinality. Recall that the graph Gi (induced by Pi ) essentially looks like displayed in Figure 5, and we can w.l.o.g. assume that Pi is given by the thick edges. si ti Figure 5: Structure of Gi , where Pi is given by the thick edges. An arbitrary (si , ti )-path Pi′ consists of subpaths of Pi together with some of the “arcs”. We call these arcs alternatives (according to Pi ), and formally, an alternative is a path A which connects two nodes of Pi , but is edge-disjoint with Pi . The subpath of Pi with the same endnodes as A is denoted by PiA , and we say that this subpath is substituted by A (cf. Figure 6 for illustration). Note that there can be different alternatives which substitute the same subpath of Pi (in Figure 6, this holds for example for the two arcs on the left which both substitute the second and third edge of Pi ). Whenever this is the case, we choose such an alternative with smallest sum of edge costs plus player i’s delays, and denote this alternative A as a cheapest alternative for PiA . Let Ai be the set of all cheapest alternatives according to Pi . It is clear that X X (ξi,e + di,e ) ≤ (ce + di,e ) ∀Pi′ ∈ Pi e∈Pi \Pi′ e∈Pi′ \Pi holds if and only if X e∈PiA (ξi,e + di,e ) ≤ X (ce + di,e ) ∀A ∈ Ai e∈A holds. Since the paths in Ai are edge-disjoint, |Ai | is bounded by |E|. Algorithm Alternatives(i) computes Ai in polynomial time. Thus, we can solve LP(P ) in polynomial time. A si ti Figure 6: Alternative A (dashed); substituted subpath PiA (thick). To complete the proof that Algorithm n-SePa has polynomial running time, it remains to show that the combination of smallest tight alternatives in Line 7 of Algorithm n-SePa can be found in polynomial time (recall that there will be at most |P | ≤ |E| calls of the repeat-loop; and all other steps are obviously polynomial). Since |Ai | ≤ |E| holds for all i ∈ N , we can find, for each edge f which is not completely paid and each user i of f , a smallest tight alternative Ai,f in polynomial time. If player i uses more than one edge which is not completely paid, a combination of the corresponding smallest tight alternatives can also easily be found; thus step 7 is polynomial. 17 Overall we showed that the first statement of Theorem 12 holds. The second statement, i.e. that every optimal strategy profile of (G, (s1 , t1 ), . . . , (sn , tn ), c, d) is enforceable, follows very easily from the proof of statement (1). Note that, if P is not enforceable, Algorithm n-SePa computes a strategy profile with strictly smaller cost. Since this would lead to a contradiction if P is an optimal, but not enforceable strategy profile, every optimal strategy profile has to be enforceable. We finally want to show the last statement of Theorem 12, i.e. that an optimal Steiner forest can be computed in polynomial time (for di,e = 0 for all i ∈ N, e ∈ E). To this end we want to use the result of Bateni et al. [7] that the Steiner forest problem can be solved in polynomial time on graphs with treewidth at most 2. Thus it is sufficient to show that G has treewidth at most 2, or, since generalized series-parallel graphs have treewidth at most 2 (what can easily be seen by induction on the number of operations), that G is generalized series-parallel (note that we can assume w.l.o.g. that G is connected, otherwise we can obviously treat each connected component separately). Recall that generalized series-parallel graphs are created by a sequence of series, parallel, and/or add operations starting from a single edge, where an add-operation adds a new vertex w and connects it to a given vertex v by the edge w − v. We show that G can be created like this. It is clear that this holds for each Gi since they are series-parallel; but since the Gi s are (in general) neither equal nor disjoint, it is not completely obvious that this also holds for their union G. We now show, starting with the subgraph G1 which is generalized series-parallel, that we can consecutively choose one player and add the vertices and edges of her paths which are not already contained in the subgraph constructed so far by add, series, and parallel operations. Since this again yields a generalized series-parallel graph, we finally conclude that G is generalized series-parallel. Let G′ 6= G be the generalized series-parallel subgraph constructed so far. Choose a player i so that Gi is not node-disjoint with G′ (exists since G is connected). Let Pi be an (si , ti )-path which is not node-disjoint with G′ and subdivide Pi into the following three subpaths Pi1 , Pi2 , Pi3 (where some of the subpaths may consist of only one node): Pi1 starts in si and ends in the first node u which is contained in G′ ; Pi2 starts in u and ends in the last node v which is in G′′ , and Pi3 starts in v and ends in ti . Note that Gi consists of Pi together with all alternatives of player i (according to Pi ). The following points show that Gi \ G′ can be added to G′ by series, parallel and add operations: 1. Pi1 (Pi3 ) can obviously be added by an add operation at u (v) and series operations. 2. Pi2 is completely contained in G′′ . Thus Pi2 does not need to be added. 3. Any alternatives where both endnodes are in Pi1 or Pi3 are internal node-disjoint with G′′ and can therefore be added by parallel and series operations during the addition of Pi1 and Pi3 . 4. Alternatives with both endnodes in Pi2 are already contained in G′′ . 5. There are no alternatives with endnodes in different subpaths. Note that 2.-5. holds since otherwise there would be a new (sj , tj )-path for a player j already added; contradiction. This completes the proof of statement (3). Hence, Theorem 12 is shown. Remark 13. The first two results of Theorem 12 can be generalized to nonnegative, nondecreasing and discrete-concave shareable edge cost functions. However, we do not know whether or not polynomial running time can be guaranteed. We now demonstrate that the assumption of n-sepa graphs is in some sense well justified. Theorem 14. For n ≥ 3 players, there is a generalized series-parallel graph with fixed edge costs and no player-specific delays, so that the unique optimal Steiner forest is not enforceable. Therefore, a black-box reduction as for n-series-parallel graphs is impossible for generalized series-parallel graphs (even without player-specific delays). 18 Proof. To prove Theorem 14, consider Figure 7. The displayed graph G is generalized series-parallel since it can be created from a K2 by a sequence of series- and parallel-operations (as executed in Figure 8). But the unique optimal Steiner forest OPT of (G, (s1 , t1 ), (s2 , t2 ), (s3 , t3 ), c), given by the solid edges, is not enforceable. To see this, note that the cost of OPT is C(OPT) = 346. Furthermore, we can upper-bound the sum of cost shares that the players will pay for using their paths in OPT by 100 + 69 + 170 = 339 < C(OPT), thus showing that OPT is not enforceable: Player 1 will pay at most 100, because she can use the edge s1 − t1 with cost 100. Player 3 could use the edge s3 − t3 with cost 69, thus she will pay at most 69. It remains to analyze the cost shares of Player 2. Instead of using the subpath from s2 to s1 of her path in OPT, Player 2 could use the edge s2 − s1 with cost 84. Furthermore, she could use the edge t3 − t2 with cost 86 instead of her subpath from t3 to t2 . Since the mentioned subpaths cover the complete path of Player 2 in OPT, she will pay at most 84 + 86 = 170. For n ≥ 4, we obviously get an instance with the properties stated in Theorem 14 by choosing an arbitrary node v of G and setting si = ti = v for all i ∈ {4, . . . , n}. s1 s3 60 84 100 s2 57 t1 71 38 38 69 t3 82 86 t2 Figure 7: Graph G with three source-terminal pairs (s1 , t1 ), (s2 , t2 ), (s3 , t3 ), fixed edge costs c given on the edges, and no player-specific delays d. Figure 8: Verification that G is generalized series-parallel. Algorithm 3: Irredundant Data: Undirected graph G, source-terminal pairs (s1 , t1 ), . . . , (sn , tn ) Result: Maximum irredundant subgraph G′ 1 C ← set of cut vertices of G; 2 for each i ∈ {1, . . . , n} do 3 Gi ← G; 4 for each c ∈ C do 5 Remove from Gi all vertices in the components of G − c containing neither si nor ti (if any) 6 7 G′ ← G; Delete from G′ all nodes and edges which are not contained in any Gi . 19 Algorithm 4: n-SePa Data: Connection Game (N, G, (s1 , t1 ), . . . , (sn , tn ), c, d) with n-series-parallel graph (G, (s1 , t1 ), . . . , (sn , tn )); strategy profile P = (P1 , . . . , Pn ) Result: Enforceable strategy profile P ′ with cost C(P ′ ) ≤ C(P ); cost share functions ξ so that P ′ is PNE 1 Solve LP(P ); let (ξi,e )i∈N,e∈Pi be the computed optimal solution; 2 P′ ← P; 3 ξi,e (P ′ ) ← ξi,e for all i ∈ N , e ∈ Pi′ ; 4 if (BB) does not hold then 5 Let S be the set of edges which are not completely paid according to P ′ ; 6 repeat 7 All players with edges in S deviate from all unpaid edges by using a combination of smallest tight alternatives; 8 Update P ′ accordingly; 9 Update the cost shares (for each player i and each edge e ∈ Pi′ ): ′ ξi,e (P ) = 10 11 12 ( ξi,e , for e ∈ Pi′ ∩ Pi , ce , for e ∈ Pi′ \ Pi . Update S (set of edges which are not completely paid according to P ′ ); until S = ∅; If there are overpaid edges, decrease the corresponding cost shares arbitrarily until these edges are exactly paid; output P ′ and ξ (induced by (ξi,e (P ′ ))i∈N,e∈Pi′ ); Algorithm 5: Alternatives(i) Data: Connection Game (N, G, (s1 , t1 ), . . . , (sn , tn ), c, d) with n-series-parallel graph (G, (s1 , t1 ), . . . , (sn , tn )); player i ∈ N ; path Pi ∈ Pi Result: Set of cheapest alternatives Ai according to Pi 1 Define c̃e := ce + di,e for all e ∈ Gi ; 2 Delete all edges of Pi ; 3 repeat 4 Let u be the first node of Pi which is not yet deleted; 5 repeat 6 Starting in u, execute a (partial) BFS in Gi , stop if a new node of Pi is reached; 7 if a new node v of Pi is reached then 8 Compute a shortest u − v-path Ai (shortest according to c̃); 9 Insert Ai in Ai ; 10 Delete all nodes (different from u, v) and edges of Ai from Gi ; 11 Mark v as visited; 12 else 13 Delete all nodes (∈ / Pi ) and edges of the connected component of u; 14 Delete u; 15 Remove all marks. 16 17 until u has been deleted; until all nodes of Pi have been deleted; 20 References [1] N. Andelman, M. Feldman, and Y. Mansour. Strong price of anarchy. Games Econom. Behav., 65(2):289–317, 2009. [2] E. Anshelevich, A. Dasgupta, É. Tardos, and T. Wexler. Near-optimal network design with selfish agents. Theory of Computing, 4(1):77–109, 2008. [3] E. Anshelevich and B. Caskurlu. Exact and approximate equilibria for optimal group network formation. Theor. Comput. Sci., 412(39):5298–5314, 2011. [4] E. Anshelevich and B. Caskurlu. Price of stability in survivable network design. Theory Comput. Syst., 49(1):98–138, 2011. [5] E. Anshelevich, A. Dasgupta, J. Kleinberg, T. Roughgarden, É. Tardos, and T. Wexler. The price of stability for network design with fair cost allocation. SIAM J. Comput., 38(4):1602–1623, 2008. [6] G. Avni and T. Tamir. Cost-sharing scheduling games on restricted unrelated machines. Theor. Comput. Sci., 646:26–39, 2016. [7] M. Bateni, M. Hajiaghayi, and D. Marx. Approximation schemes for steiner forest on planar graphs and graphs of bounded treewidth. JACM, 58(5):21:1–21:37, 2011. [8] V. Biló, A. Fanelli, M. Flammini, and L. Moscardelli. When ignorance helps: Graphical multicast cost sharing games. Theoretical Computer Science, 411(3):660 – 671, 2010. [9] V. Bilò, M. Flammini, and L. Moscardelli. The price of stability for undirected broadcast network design with fair cost allocation is constant. In Proc. 54th Symp. Foundations of Computer Science (FOCS), pages 638–647, 2013. [10] C. Bird. On cost allocation for a spanning tree: A game theoretic approach. Networks, 6:335–350, 1976. [11] J. Byrka and K. Aardal. An optimal bifactor approximation algorithm for the metric uncapacitated facility location problem. SIAM Journal on Computing, 39(6):2212–2231, 2010. [12] J. Byrka, F. Grandoni, T. Rothvoß, and L. Sanità. Steiner tree approximation via iterative randomized rounding. J. ACM, 60(1):6:1–6:33, 2013. [13] I. Caragiannis, V. Gkatzelis, and C. Vinci. Coordination mechanisms, cost-sharing, and approximation algorithms for scheduling. In N. R. Devanur and P. Lu, editors, Web and Internet Economics, pages 74–87, 2017. [14] J. Cardinal and M. Hoefer. Non-cooperative facility location and covering games. Theor. Comput. Sci., 411:1855–1876, March 2010. [15] M. Charikar, C. Chekuri, T.-Y. Cheung, Z. Dai, A. Goel, and S. Guha. Approximation algorithms for directed Steiner problems. J. Algorithms, 33(1):192–200, 1999. [16] C. Chekuri and M. Pál. A recursive greedy algorithm for walks in directed graphs. In Proc. 46th Symp. Foundations of Computer Science (FOCS), pages 245–253, 2005. [17] H.-L. Chen, T. Roughgarden, and G. Valiant. Designing network protocols for good equilibria. SIAM J. Comput., 39(5):1799–1832, 2010. 21 [18] X. Chen, Z. Diao, and X. Hu. Network characterizations for excluding Braess’s paradox. Theory Comput. Syst., 59(4):747–780, 2016. [19] G. Christodoulou, V. Gkatzelis, and A. Sgouritsa. Cost-sharing methods for scheduling games under uncertainty. In Proc. 18th ACM Conf. Economics and Computation (EC), pages 441–458, 2017. [20] G. Christodoulou, S. Leonardi, and A. Sgouritsa. Designing cost-sharing methods for bayesian games. In Proc. 9th Intl. Symp. Algorithmic Game Theory (SAGT), pages 327–339, 2016. [21] G. Christodoulou and A. Sgouritsa. Designing networks with good equilibria under uncertainty. In Proc. 27th Symp. Discrete Algorithms (SODA), pages 72–89, 2016. [22] X. Deng, T. Ibaraki, and H. Nagamochi. Algorithmic aspects of the core of combinatorial optimization games. Math. Oper. Res., 24(3):751–766, 1999. [23] Y. Disser, A. Feldmann, M. Klimm, and M. Mihalák. Improving the Hk -bound on the price of stability in undirected shapley network design games. Theoret. Comput. Sci., 562:557–564, 2015. [24] M. Feldman and T. Tamir. Conflicting congestion effects in resource allocation games. Oper. Res., 60(3):529–540, 2012. [25] A. Fiat, H. Kaplan, M. Levy, S. Olonetzky, and R. Shabo. On the price of stability for designing undirected networks with fair cost allocations. In Proc. 33rd Intl. Coll. Automata, Languages and Programming (ICALP), volume 1, pages 608–618, 2006. [26] N. Garg, G. Konjevod, and R. Ravi. A polylogarithmic approximation algorithm for the Group Steiner tree problem. J. Algorithms, 37:66–84, 2000. [27] K. Georgiou and C. Swamy. Black-box reductions for cost-sharing mechanism design. In Proc. 23rd Symp. Discrete Algorithms (SODA), pages 896–913, 2012. [28] M. X. Goemans and M. Skutella. Cooperative facility location games. J. Algorithms, 50(2):194– 214, 2004. [29] D. Granot and G. Huberman. On minimum cost spanning tree games. Math. Prog., 21:1–18, 1981. [30] D. Granot and M. Maschler. Spanning network games. Int. J. Game Theory, 27:467–500, 1998. [31] S. Guha and S. Khuller. Greedy strikes back: Improved facility location algorithms. J. Algorithms, 31:228–248, 1999. [32] A. Gupta and A. Kumar. Greedy algorithms for Steiner forest. In Proc. 47th Symp. Theory of Computing (STOC), pages 871–878, 2015. [33] T. D. Hansen and O. Telelis. Improved bounds for facility location games with fair cost allocation. In Proc. 3rd Intl. Conf. Combinatorial Optimization and Applications (COCOA), pages 174–185, 2009. [34] T. Harks, A. Huber, and M. Surek. A characterization of undirected graphs admitting optimal cost shares. In N. R. Devanur and P. Lu, editors, Web and Internet Economics, pages 237–251, Cham, 2017. Springer International Publishing. [35] T. Harks and B. Peis. Resource buying games. Algorithmica, 70(3):493–512, 2014. 22 [36] T. Harks and P. von Falkenhausen. Optimal cost sharing for capacitated facility location games. European Journal of Operational Research, 239(1):187–198, 2014. [37] M. Hoefer. Non-cooperative tree creation. Algorithmica, 53:104–131, 2009. [38] M. Hoefer. Competitive cost sharing with economies of scale. Algorithmica, 60:743–765, 2011. [39] M. Hoefer. Strategic cooperation in cost sharing games. Internat. J. Game Theory, 42(1):29–53, 2013. [40] K. Jain and V. Vazirani. Applications of approximation algorithms to cooperative games. In Proc. 33rd Symp. Theory of Computing (STOC), pages 364–372, 2001. [41] J. Könemann, S. Leonardi, G. Schäfer, and S. van Zwam. A group-strategyproof cost sharing mechanism for the steiner forest game. SIAM J. Comput., 37(5):1319–1341, 2008. [42] E. Lee and K. Ligett. Improved bounds on the price of stability in network cost sharing games. In Proc. 14th Conf. Electronic Commerce (EC), pages 607–620, 2013. [43] J. Li. An o(log(n)/log(log(n))) upper bound on the price of stability for undirected shapley network design games. Inf. Process. Lett., 109(15):876–878, 2009. [44] S. Li. A 1.488 approximation algorithm for the uncapacitated facility location problem. Inf. Comput., 222:45–58, 2013. [45] N. Megiddo. Cost allocation for Steiner trees. Networks, 8(1):1–6, 1978. [46] H. Moulin and S. Shenker. Strategyproof sharing of submodular costs: budget balance versus efficiency. Econom. Theory, 18(3):511–533, 2001. [47] M. Pál and É. Tardos. Group strategyproof mechanisms via primal-dual algorithms. In FOCS, pages 584–593, 2003. [48] G. Robins and A. Zelikovsky. Tighter bounds for graph Steiner tree approximation. SIAM J. Disc. Math., 19(1):122–134, 2005. [49] R. Rosenthal. A class of games possessing pure-strategy Nash equilibria. Int. J. Game Theory, 2:65–67, 1973. [50] V. Syrgkanis. The complexity of equilibria in cost sharing games. In A. Saberi, editor, Proc. 6th Internat. Workshop on Internet and Network Econom., LNCS, pages 366–377, 2010. [51] A. Tamir. On the core of network synthesis games. Math. Prog., 50:123–135, 1991. [52] P. von Falkenhausen and T. Harks. Optimal cost sharing for resource selection games. Math. Oper. Res., 38(1):184–208, 2013. 23
8cs.DS
arXiv:1609.07613v1 [math.RA] 24 Sep 2016 Higher-dimensional absolute versions of symmetric, Frobenius, and quasi-Frobenius algebras Mitsuyasu Hashimoto∗ Department of Mathematics, Okayama University Okayama 700–8530, JAPAN [email protected] Abstract In this paper, we define and discuss higher-dimensional and absolute versions of symmetric, Frobenius, and quasi-Frobenius algebras. In particular, we compare these with the relative notions defined by Scheja and Storch. We also prove the validity of codimension two-argument for modules over a coherent sheaf of algebras with a 2-canonical module, generalizing a result of the author. 1. Introduction (1.1) Let (R, m) be a semilocal Noetherian commutative ring, and Λ a module-finite R-algebra. In [6], we defined the canonical module KΛ of Λ. The purpose of this paper is two fold, each of which is deeply related to KΛ . This work was supported by JSPS KAKENHI Grant Number 26400045. 2010 Mathematics Subject Classification. Primary 16E65; Secondary 14A15. Key Words and Phrases. canonical module; symmetric algebra; Frobenius algebra; quasi-Frobenius algebra; n-canonical module. ∗ 1 (1.2) In the first part, we define and discuss higher-dimensional and absolute notions of symmetric, Frobenius, and quasi-Frobenius algebras and their nonCohen–Macaulay versions. In commutative algebra, the non-Cohen–Macaulay version of Gorenstein ring is known as quasi-Gorenstein rings. What we discuss here is a non-commutative version of such rings. Scheja and Storch [7] discussed a relative notion, and our definition is absolute in the sense that it depends only on Λ and is independent of the choice of R. If R is local, our quasi-Frobenius property agrees with Gorensteinness discussed by Goto and Nishida [1], see Proposition 3.7 and Corollary 3.8. (1.3) In the second part, we show that the codimension-two argument using the existence of 2-canonical modules in [4] is still valid in non-commutative settings. For the definition of an n-canonical module, see (2.8). Codimensiontwo argument, which states (roughly speaking) that removing a closed subset of codimension two or more does not change the category of coherent sheaves which satisfy Serre’s (S2′ ) condition, is sometimes used in algebraic geometry, commutative algebra and invariant theory. For example, information on the canonical sheaf and the class group is retained when we remove the singular locus of a normal variety over an algebraically closed field, and then these objects are respectively grasped as the top exterior power of the cotangent bundle and the Picard group of a smooth variety. In [4], almost principal bundles are studied. They are principal bundles after removing closed subsets of codimension two or more. We prove the following. Let X be a locally Noetherian scheme, U an open subset of X such that codimX (X \ U) ≥ 2. Let i : U → X be the inclusion. Let Λ be a coherent OX -algebra. If X possesses a 2-canonical module ω, then the inverse image i∗ induces the equivalence between the category of coherent right Λ-modules which satisfy the (S2′ ) condition and the category of coherent right i∗ Λ-modules which satisfy the (S2′ ) condition. The quasi-inverse is given by the direct image i∗ . What was proved in [4] was the case that Λ = OX . If, moreover, ω = OX (that is to say, X satisfy the (S2 ) and (G1 ) condition), then the assertion has been well-known, see [3]. (1.4) 2-canonical modules are ubiquitous in algebraic geometry. If I is a dualizing complex of a Noetherian scheme X, then the lowest non-vanishing cohomology group of I is semicanonical. A rank-one reflexive sheaf over a normal variety is 2-canonical. 2 (1.5) Section 2 is for preliminaries. Section 3 is devoted to the discussion of the first theme mentioned in the paragraph (1.2), while Section 4 is for the second theme mentioned in (1.3). (1.6) Acknowledgments: Special thanks are due to Professor Osamu Iyama for valuable advice and discussion. The essential part of this paper has first appeared as [5, sections 9–10]. When it is published as [6], they have been removed after the requirement to shorten the paper (also, the title has been changed slightly). Here we revive them as an independent paper. 2. Preliminaries (2.1) Throughout this paper, R denotes a Noetherian commutative ring. For a module-finite R-algebra Λ, a Λ-module means a left Λ-module. Λop denotes the opposite algebra of Λ, and thus a Λop -module is identified with a right Λ-module. A Λ-bimodule means a Λ ⊗R Λop -module. The category of finite Λ-modules is denoted by Λ mod. The category Λop mod is also denoted by mod Λ. (2.2) Let (R, m) be semilocal and Λ be a module-finite R-algebra. For an R-module M, the m-adic completion of M is denoted by M̂. For a finite Λ-module M, by dim M or dimΛ M we mean dimR M, which is independent of the choice of R. By depth M or depthΛ M we mean depthR (m, M), which is independent of R. We say that M is globally Cohen–Macaulay (GCM for short) if dim M = depth M. We say that M is globally maximal Cohen– Macaulay (GMCM for short) if dim Λ = depth M. If R happens to be local, then M is GCM (resp. GMCM) if and only if M is Cohen–Macaulay (resp. maximal Cohen–Macaulay) as an R-module. (2.3) For M ∈ Λ mod, we say that M satisfies (Sn′ )Λ,R , (Sn′ )R or (Sn′ ) if depthRP MP ≥ min(n, htR P ) for every P ∈ Spec R (this notion depends on R). (2.4) Let X be a locally Noetherian scheme and Λ a coherent OX -algebra. For a coherent Λ-module M, we say that M satisfies (Sn′ ) or (Sn′ )Λ,X , or sometimes M ∈ (Sn′ )Λ,X , if depthOX,x Mx ≥ min(n, dim OX,x ) for every x ∈ X. 3 (2.5) Assume that (R, m) is complete semilocal, and Λ 6= 0 a module-finite R-algebra. Let I be a normalized dualizing complex of R. The lowest noni vanishing cohomology group Ext−s R (Λ, I) (ExtR (Λ, I) = 0 for i < −s) is denoted by KΛ , and is called the canonical module of Λ. If Λ = 0, then we define that KΛ = 0. For basics on the canonical modules, we refer the reader to [6]. Note that KΛ depends only on Λ, and is independent of R. (2.6) Assume that (R, m) is semilocal which may not be complete. We say that a finitely generated Λ-bimodule K is a canonical module of Λ if K̂ is isomorphic to the canonical module KΛ̂ as a Λ̂-bimodule. It is unique up to isomorphisms, and denoted by KΛ . We say that K ∈ mod Λ is a right (resp. left) canonical module of Λ if K̂ is isomorphic to KΛ̂ in mod Λ̂ (resp. Λ̂ mod). If KΛ exists, then K is a right canonical module if and only if K ∼ = KΛ in mod Λ. (2.7) We say that ω is an R-semicanonical right Λ-module if for any P ∈ Spec R, RP ⊗R ω is the right canonical module RP ⊗R Λ for any P ∈ suppR ω. (2.8) Let C ∈ mod Λ. We say that C is an n-canonical right Λ-module over R if C ∈ (Sn′ )R , and for each P ∈ Spec R with ht P < n, we have that CP is an RP -semicanonical right ΛP -module. 3. Symmetric and Frobenius algebras (3.1) Let (R, m) be a Noetherian semilocal ring, and Λ a module-finite Ralgebra. Let KΛ denote the canonical module of Λ, see [6]. We say that Λ is quasi-symmetric if Λ is the canonical module of Λ. That is, Λ ∼ = KΛ as Λ-bimodules. It is called symmetric if it is quasi-symmetric and GCM. Note that Λ is quasi-symmetric (resp. symmetric) if and only if Λ̂ is so. Note also that quasi-symmetric and symmetric are absolute notion, and is independent of the choice of R in the sense that the definition does not change when we replace R by the center of Λ, because KΛ is independent of the choice of R. (3.2) For (non-semilocal) Noetherian ring R, we say that Λ is locally quasisymmetric (resp. locally symmetric) over R if for any P ∈ Spec R, ΛP is a quasi-symmetric (resp. symmetric) RP -algebra. This is equivalent to say that for any maximal ideal m of R, Λm is quasi-symmetric (resp. symmetric), see [6, (7.6)]. 4 In the case that (R, m) is semilocal, Λ is locally quasi-symmetric (resp. locally symmetric) over R if it is quasi-symmetric (resp. symmetric), but the converse is not true in general. Lemma 3.3. Let (R, m) be a Noetherian semilocal ring, and Λ a module-finite R-algebra. Then the following are equivalent. 1 ΛΛ is the right canonical module of Λ. 2 ΛΛ is the left canonical module of Λ. Proof. We may assume that R is complete. Then replacing R by a Noether normalization of R/ annR Λ, we may assume that R is regular and Λ is a faithful R-module. We prove 1⇒2. By [6, Lemma 5.10], KΛ satisfies (S2′ )R . By assumption, ΛΛ satisfies (S2′ )R . As R is regular and dim R = dim Λ, KΛ = Λ∗ = HomR (Λ, R). So we get an R-linear map ϕ : Λ ⊗R Λ → R such that ϕ(ab ⊗ c) = ϕ(a ⊗ bc) and that the induced map h : Λ → Λ∗ given by h(a)(c) = ϕ(a ⊗ c) is an isomorphism (in mod Λ). Now ϕ induces a homomorphism h′ : Λ → Λ∗ in Λ mod given by h′ (c)(a) = ϕ(a ⊗ c). To verify that this is an isomorphism, as Λ and Λ∗ are reflexive R-modules, we may localize at a prime P of R of height at most one, and then take a completion, and hence we may further assume that dim R ≤ 1. Then Λ is a finite free R-module, and the matrices of h and h′ are transpose each other. As the matrix of h is invertible, so is that of h′ , and h′ is an isomorphism. 2⇒1 follows from 1⇒2, considering the opposite ring. Definition 3.4. Let (R, m) be semilocal. We say that Λ is a pseudo-Frobenius R-algebra if the equivalent conditions of Lemma 3.3 are satisfied. If Λ is GCM in addition, then it is called a Frobenius R-algebra. Note that these definitions are independent of the choice of R. Moreover, Λ is pseudo-Frobenius (resp. Frobenius) if and only if Λ̂ is so. For a general R, we say that Λ is locally pseudo-Frobenius (resp. locally Frobenius) over R if ΛP is pseudo-Frobenius (resp. Frobenius) for P ∈ Spec R. Lemma 3.5. Let (R, m) be semilocal. Then the following are equivalent. 1 (KΛ̂ )Λ̂ is projective in mod Λ̂. 5 2 Λ̂ (KΛ̂ ) is projective in Λ̂ mod, where ˆ? denotes the m-adic completion. Proof. We may assume that (R, m, k) is complete regular local and Λ is a faithful R-module. Let ¯? denote the functor k⊗R ?. Then Λ̄ is a finite dimensional k-algebra. So mod Λ̄ and Λ̄ mod have the same number of simple modules, say n. An indecomposable projective module in mod Λ is nothing but the projective cover of a simple module in mod Λ̄. So mod Λ and Λ mod have n indecomposable projectives. Now HomR (?, R) is an equivalence between add(KΛ )Λ and add Λ Λ. It is also an equivalence between add Λ (KΛ ) and add ΛΛ . So both add(KΛ )Λ and add Λ (KΛ ) also have n indecomposables. So 1 is equivalent to add(KΛ )Λ = add ΛΛ . 2 is equivalent to add Λ (KΛ ) = add Λ Λ. So 1⇔2 is proved simply applying the duality HomR (?, R). (3.6) Let (R, m) be semilocal. If the equivalent conditions in Lemma 3.5 are satisfied, then we say that Λ is pseudo-quasi-Frobenius. If it is GCM in addition, then we say that it is quasi-Frobenius. These definitions are independent of the choice of R. Note that Λ is pseudo-quasi-Frobenius (resp. quasi-Frobenius) if and only if Λ̂ is so. Proposition 3.7. Let (R, m) be semilocal. Then the following are equivalent. 1 Λ is quasi-Frobenius. 2 Λ is GCM, and dim Λ = idim Λ Λ, where idim denotes the injective dimension. 3 Λ is GCM, and dim Λ = idim ΛΛ . Proof. 1⇒2. By definition, Λ is GCM. To prove that dim Λ = idim Λ Λ, we may assume that R is local. Then by [1, (3.5)], we may assume that R is complete. Replacing R by the Noetherian normalization of R/ annR Λ, we may assume that R is a complete regular local ring of dimension d, and Λ its maximal Cohen–Macaulay (that is, finite free) module. As add Λ Λ = add Λ (KΛ ) by the proof of Lemma 3.5, it suffices to prove idim Λ (KΛ ) = d. Let IR be the minimal injective resolution of the R-module R. Then J = HomR (Λ, IR ) is an injective resolution of KΛ = HomR (Λ, R) as a left Λ-module. As the length of J is d and ExtdΛ (Λ/mΛ, KΛ ) ∼ = ExtdR (Λ/mΛ, R) 6= 0, 6 we have that idim Λ (KΛ ) = d. 2⇒1. We may assume that R is complete regular local and Λ is maximal Cohen–Macaulay. By [1, (3.6)], we may further assume that R is a field. Then Λ Λ is injective. So (KΛ )Λ = HomR (Λ, R) is projective, and Λ is quasiFrobenius, see [8, (IV.3.7)]. 1⇔3 is proved similarly. Corollary 3.8. Let R be arbitrary. Then the following are equivalent. 1 For any P ∈ Spec R, ΛP is quasi-Frobenius. 2 For any maximal ideal m of R, Λm is quasi-Frobenius. 3 Λ is a Gorenstein R-algebra in the sense that Λ is a Cohen–Macaulay R-module, and idimΛP ΛP ΛP = dim ΛP for any P ∈ Spec R. Proof. 1⇒2 is trivial. 2⇒3. By Proposition 3.7, we have idim Λm Λm = dim Λm for each m. Then by [1, (4.7)], Λ is a Gorenstein R-algebra. 3⇒1 follows from Proposition 3.7. (3.9) Let R be arbitrary. We say that Λ is a quasi-Gorenstein R-algebra if ΛP is pseudo-quasi-Frobenius for each P ∈ Spec R. Definition 3.10 (Scheja–Storch [7]). Let R be general. We say that Λ is symmetric (resp. Frobenius) relative to R if Λ is R-projective, and Λ∗ := HomR (Λ, R) is isomorphic to Λ as a Λ-bimodule (resp. as a right Λ-module). It is called quasi-Frobenius relative to R if the right Λ-module Λ∗ is projective. Lemma 3.11. Let (R, m) be local. 1 If dim Λ = dim R, R is quasi-Gorenstein, and Λ∗ ∼ = Λ as Λ-bimodules ∗ ∼ ∗ (resp. Λ = Λ as right Λ-modules, Λ is projective as a right Λ-module), then Λ is quasi-symmetric (resp. pseudo-Frobenius, pseudo-quasi-Frobenius). 2 If R is Gorenstein and Λ is symmetric (resp. Frobenius, quasi-Frobenius) relative to R, then Λ is symmetric (resp. Frobenius, quasi-Frobenius). 3 If Λ is nonzero and R-projective, then Λ is quasi-symmetric (resp. pseudoFrobenius, pseudo-quasi-Frobenius) if and only if R is quasi-Gorenstein and Λ is symmetric (resp. Frobenius, quasi-Frobenius) relative to R. 7 4 If Λ is nonzero and R-projective, then Λ is symmetric (resp. Frobenius, quasi-Frobenius) if and only if R is Gorenstein and Λ is symmetric (resp. Frobenius, quasi-Frobenius) relative to R. Proof. We can take the completion, and we may assume that R is complete local. 1. Let d = dim Λ = dim R, and let I be the normalized dualizing complex (see [6, (5.2)]) of R. Then −d ∼ KΛ = Ext−d (I)) ∼ = Hom(Λ, KR ) ∼ = Hom(Λ, R) = Λ∗ R (Λ, I) = HomR (Λ, H as Λ-bimodules, and the result follows. 2. We may assume that Λ is nonzero. As R is Cohen–Macaulay and Λ is a finite projective R-module, Λ is a maximal Cohen–Macaulay R-module. By 1, the result follows. 3. The ‘if’ part follows from 1. We prove the ‘only if’ part. As Λ is R-projective and nonzero, dim Λ = dim R. As Λ is R-finite free, KΛ ∼ = ∗ ∗ Λ ⊗ K . As K is R-free and Λ ⊗ K is nonzero and is HomR (Λ, KR ) ∼ = R R Λ R R isomorphic to a direct sum of copies of KR , we have that KR is R-projective, and hence R is quasi-Gorenstein, and KR ∼ = Λ∗ , and the = R. Hence KΛ ∼ result follows. 4 follows from 3 easily. (3.12) Let (R, m) be semilocal. Let a finite group G act on Λ by R-algebra automorphisms. L Let Ω = Λ ∗ G, the twisted group algebra. That is, Ω = Λ ⊗R RG = g∈G Λg as an R-module, and the product of Ω is given by ′ ′ (ag)(a g ) = (a(ga′ ))(gg ′) for a, a′ ∈ Λ and g, g ′ ∈ G. This makes Ω a modulefinite R-algebra. (3.13) We simply call an RG-module a G-module. We say that M is a (G, Λ)-module if M is a G-module, Λ-module, the R-module structures coming from that of the G-module structure and the Λ-module structure agree, and g(am) = (ga)(gm) for g ∈ G, a ∈ Λ, and m ∈ M. A (G, Λ)-module and an Ω-module are one and the same thing. (3.14) By the action ((a ⊗ a′ )g)a1 = a(ga1 )a′ , we have that Λ is a (Λ ⊗ Λop ) ∗ G-module in a natural way. So it is an Ω-module by the action (ag)a1 = a(ga1 ). It is also a right Ω-module by the action a1 (ag) = g −1 (a1 a). If the action of G on Λ is trivial, then these actions make an Ω-bimodule. 8 (3.15) Given an Ω-module M and an RG-module V , M ⊗R V is an Ωmodule by (ag)(m ⊗ v) = (ag)m ⊗ gv. HomR (M, V ) is a right Ω-module by (ϕ(ag))(m) = g −1 ϕ(a(gm)). It is easy to see that the standard isomorphism HomR (M ⊗R V, W ) → HomR (M, HomR (V, W )) is an isomorphism of right Ω-modules for a left Ω-module M and G-modules V and W . (3.16) Now consider the case Λ = R. Then the pairing φ : RG ⊗R RG → R given by φ(g ⊗ g ′ ) = δgg′ ,e (Kronecker’s delta) is non-degenerate, and induces an RG-bimodule isomorphism Ω = RG → (RG)∗ = Ω∗ . As Ω = RG is a finite free R-module, we have that Ω = RG is symmetric relative to R. Lemma 3.17. If Λ is quasi-symmetric (resp. symmetric) and the action of G on Λ is trivial, then Ω is quasi-symmetric (resp. symmetric). Proof. Taking the completion, we may assume that R is complete. Then replacing R by a Noether normalization of R/ annR Λ, we may assume that R is a regular local ring, and Λ is a faithful R-module. As the action of G on Λ is trivial, Ω = Λ ⊗R RG is quasi-symmetric (resp. symmetric), as can be seen easily. (3.18) In particular, if Λ is commutative quasi-Gorenstein (resp. Gorenstein) and the action of G on Λ is trivial, then Ω = ΛG is quasi-symmetric (resp. symmetric). (3.19) In general, Ω Ω ∼ = Λ ⊗R RG as Ω-modules. Lemma 3.20. Let M and N be right Ω-modules, and let ϕ : M → N be a homomorphism of right Λ-modules. Then ψ : M ⊗ RG → N ⊗ RG given by ψ(m ⊗ g) = g(ϕ(g −1m)) ⊗ g is an Ω-homomorphism. In particular, 1 If ϕ is a Λ-isomorphism, then ψ is an Ω-isomorphism. 2 If ϕ is a split monomorphism in mod Λ, then ψ is a split monomorphism in mod Ω. Proof. Straightforward. Proposition 3.21. Let G be a finite group acting on Λ. Set Ω := Λ ∗ G. 1 If the action of G on Λ is trivial and Λ is quasi-symmetric (resp. symmetric), then so is Ω. 9 2 If Λ is pseudo-Frobenius (resp. Frobenius), then so is Ω. 3 If Λ is pseudo-quasi-Frobenius (resp. quasi-Frobenius), then so is Ω. Proof. 1 is Lemma 3.17. To prove 2 and 3, we may assume that (R, m) is complete regular local and Λ is a faithful module. 2. (KΩ )Ω ∼ = HomR (Λ, R) ⊗ (RG)∗ ∼ = KΛ ⊗ RG = HomR (Λ ⊗R RG, R) ∼ as right Ω-modules. It is isomorphic to ΛΩ ⊗ RG ∼ = ΩΩ by Lemma 3.20, 1, ∼ since KΛ = Λ in mod Λ. Hence Ω is pseudo-Frobenius. If, in addition, Λ is Cohen–Macaulay, then Ω is also Cohen–Macaulay, and hence Ω is Frobenius. 3 is proved similarly, using Lemma 3.20, 2. Note that the assertions for Frobenius and quasi-Frobenius properties also follow easily from Lemma 3.11 and [7, (3.2)]. 4. Codimension-two argument (4.1) This section is the second part of this paper. In this section, we show that the codimension-two argument using the existence of 2-canonical modules in [4] is still valid in non-commutative settings, as announced in (1.3). (4.2) Let X be a locally Noetherian scheme, U its open subscheme, and Λ a coherent OX -algebra. Let i : U ֒→ X be the inclusion. (4.3) Let M ∈ mod Λ. That is, M is a coherent right Λ-module. Then by restriction, i∗ M ∈ mod i∗ Λ. (4.4) For a quasi-coherent i∗ Λ-module N , we have an action 1⊗u a i∗ N ⊗OX Λ −−→ i∗ N ⊗OX i∗ i∗ Λ → i∗ (N ⊗OU i∗ Λ) − → i∗ N , where u is the unit map for the adjoint pair (i∗ , i∗ ). So we get a functor i∗ : Mod i∗ Λ → Mod Λ, where Mod i∗ Λ (resp. Mod Λ) denote the category of quasi-coherent i∗ Λ-modules (resp. Λ-modules). Lemma 4.5. Let the notation be as above. Assume that U is large in X op (that is, codimX (X \ U) ≥ 2). If M ∈ (S2′ )Λ ,X , then the canonical map u : M → i∗ i∗ M is an isomorphism. 10 Proof. Follows immediately from [4, (7.31)]. Proposition 4.6. Let the notation be as above, and let U be large in X. Assume that there is a 2-canonical right Λ-module. Then we have the following. 1 If N ∈ (S2′ )i ∗ Λop ,U , then i∗ N ∈ (S2′ )Λ 2 i∗ : (S2′ )Λ ,X → (S2′ )i inverse each other. op ∗ Λop ,U op ,X . and i∗ : (S2′ )i ∗ Λop ,U → (S2′ )Λ op ,X are quasi- Proof. The question is local, and we may assume that X is affine. 1. There is a coherent subsheaf Q of i∗ N such that i∗ Q = i∗ i∗ N = N by [2, Exercise II.5.15]. Let V be the Λ-submodule of i∗ N generated by Q. That is, the image of the composite Q ⊗OX Λ → i∗ N ⊗OX Λ → i∗ N . Note that V is coherent, and i∗ Q ⊂ i∗ V ⊂ i∗ i∗ N = i∗ Q = N . Let C be a 2-canonical right Λ-module. Let ?† := HomΛop (?, C), Γ = EndΛ C, and ?‡ := HomΓ (?, C). Let M be the double dual V †‡ . Then M ∈ op (S2′ )Λ ,X , and hence M∼ = i∗ i∗ M ∼ = i∗ i∗ (V †‡ ) ∼ = i∗ (i∗ V)†‡ ∼ = i∗ (N †‡ ) ∼ = i∗ N . op So i∗ N ∼ = M lies in (S2′ )Λ ,X . 2 follows from 1 and Lemma 4.5 immediately. References [1] S. Goto and K. Nishida, Towards a theory of Bass numbers with applications to Gorenstein algebras, Colloq. Math. 91 (2002), 191– 253. [2] R. Hartshorne, Algebraic Geometry, Graduate Texts in Math. 52, Springer Verlag (1977). [3] R. Hartshorne, Generalized divisors on Gorenstein schemes, KTheory 8 (1994), 287–339. [4] M. Hashimoto, Equivariant class group. III. Almost principal fiber bundles, arXiv:1503.02133v1 11 [5] M. Hashimoto, Canonical and n-canonical modules on a Noetherian algebra, arXiv:1508.07552v1 [6] M. Hashimoto, Canonical and n-canonical modules of a Noetherian algebra, to appear in Nagoya Math. J. [7] G. Scheja and U. Storch, Quasi-Frobenius-Algebren und lokal vollständige Durchschnitte, Manuscripta Math. 19 (1976), 75–104. Addendum: 20 (1977), 99–100. [8] A. Skowroński and K. Yamagata, Frobenius Algebras. I., Basic Representation Theory, European Mathematical Society (2011). 12
0math.AC